11
RBAC Defense in Depth Authors: Brad Ruppert & Russell Meyer

RBAC Defense in Depth Authors: Brad Ruppert & Russell Meyer

Embed Size (px)

Citation preview

Page 1: RBAC Defense in Depth Authors: Brad Ruppert & Russell Meyer

RBAC Defense in Depth

Authors: Brad Ruppert & Russell Meyer

Page 2: RBAC Defense in Depth Authors: Brad Ruppert & Russell Meyer

RBAC defense in depth for GIAC Enterprises GIAC Enterprises is a small company that sells fortune cookies over

the web The company is comprised of a CEO, CFO, Sales Manager,

Product Manager, Developer, and System Admin Most of the every day work (producing, selling and marketing) will

be done through external partners, which is why the headcount initially is rather low. Considering many partners and suppliers will need access to company resources, it becomes increasingly important for the perimeters to have tight security.

The network consists of 14 servers DMZ (Web, MetaFrame, IPS, Email Gateway) Internal (Email, DC, DNS, Web, App, DB, Antivirus, File/Print, IPS, HR)

Sales staff has access via MetaFrame to internal network

Page 3: RBAC Defense in Depth Authors: Brad Ruppert & Russell Meyer

Background on RBAC

Role Based Access Control (RBAC) is a methodology of limiting access to objects based on permissions assigned to a specific role

Roles can be synonymous with job duties or functions and can be associated with individual users or groups

These roles can have permissions associated to systems, files, folders, and other objects within an enterprise

The goal in role development is to determine all the permissions in advance that a user might require to perform a specific task or job function and bind these permissions to the specific role

Scalability and efficiency gains are two significant benefits of role-based administration, allowing fewer system administrators to manage higher volumes of users and resources

Page 4: RBAC Defense in Depth Authors: Brad Ruppert & Russell Meyer

RBAC for GIAC Enterprises

The small scale of GIAC Enterprises is both a plus and minus for implementing RBAC

Smaller companies will most likely mean users will be assuming multiple roles within the organization thus making it difficult to create static roles for each users or process. Example: initially the domain admin may be the DBA as well depending upon the

size of the IT department. Once the company can support additional staff, roles should be defined that separate developer from production support.

At first glance the implementation of RBAC in a company with under 10 employees may seem simple. If roles are not properly identified and categorized, scalability becomes a problem. The sooner you can implement principles of least privilege and segregation of duties, the more reliable your process will become.

At a high level GIAC Enterprises can be broken into four divisions Business (CEO, CFO, Sales Manager, Product Manager) Development (Developer) Administration (System Administrator) Audit (External Resource)

Page 5: RBAC Defense in Depth Authors: Brad Ruppert & Russell Meyer

RBAC in the DMZ The DMZ houses the Email gateway, IPS, Web Server, and MetaFrame Presentation

Server Windows systems (Email, MetaFrame) use Active Directory (AD) for maintaining role-

based access controls Linux systems (Web, App, IPS) use Vintela Authentication Services (VAS) which sits

on the AD framework for administering role-based access controls Within AD, the following roles are defined specific to the DMZ:

User - read-only access to web pages Administrator - read/write access to deploy changes made by developer Auditor – read-only access to specified systems

Windows group policy security settings are used to lock down systems restricting access of to specific files/folders based on the role. Linux group policies and security scripts are deployed to multiple systems as well using the VAS interface through the AD management console

Inbound access to systems from business partners and employees is via MetaFrame which uses role based access controls defined within AD & VAS group policies

Access to the web interface utilizes Vintela’s Java based Single Sign On component which validates users and their access to confidential web pages

Page 6: RBAC Defense in Depth Authors: Brad Ruppert & Russell Meyer

RBAC for Internal Systems

Access to the majority of GIAC Enterprise’s internal systems (Email, File, HR, Antivirus, DC, DNS) is governed by Windows Active Directory (AD)

Access to the Linux/Apache web server and the Solaris/Weblogic App Server is controlled via Vintela Authentication Services (VAS) managed through AD

Internally the following roles are defined: User - read-only access to web pages Administrator - read/write access to deploy changes to production after they’ve been made by a developer Developer – read/write access to development partitions of web/app/db servers Auditor – read-only access to specified systems

Employees access the sales and HR database utilizing a web-to-app interface thereby abiding by a 3-tier architecture

Systems are partitioned and segmented into development and production environments to facilitate configuration management practices

Page 7: RBAC Defense in Depth Authors: Brad Ruppert & Russell Meyer

RBAC for Network Devices Cisco’s Network Admission Control (NAC) is used to control workstations and laptop

access to the internal network IBNS and 802.1x is integrated into NAC (next slide) 802.1x provides controls for both wired and wireless devices NAC Profiler is used to automatically identify and assess non-PC devices such as

Voice over IP phones and printers Appropriate device roles are created. For example, business user, guest user, etc... NAC is used to isolate vender connections (i.e. visiting laptops), while still allowing

Internet access Ensure that authorized endpoint devices have been patched (operating systems,

critical applications, anti-virus, anti-spyware, etc..) via the policy server. If the device is not up-to-date, it is quarantined and allowed access only to the

remediation server If the device can not be updated, treat device as a “guest”, restrict access to only the

MetaFrame servers. GIAC Enterprises uses PGP’s “Whole Disk Encryption” solution to secure data on

laptops and at-risk desktops and removable storage.

Page 8: RBAC Defense in Depth Authors: Brad Ruppert & Russell Meyer

RBAC for Infrastructure Use Cisco’s AAA & TACACS+ via Cisco Secure Access Control Server & Active

Directory for centralized router and firewall Authentication, Authorization, and Accounting.

Use Cisco's Identity-Based Networking Services (IBNS) identity management solution IBNS is based on 802.1x and offers authentication, access control, and user policies

to secure the network 802.1X allows enforcement of port based network access control when devices

attempt to access the network IBNS leverages Cisco's switches, Wireless APs, Cisco Secure ACS and Cisco

Secure Services Client Cisco’s Role-Based CLI Access is used to define auditor and helpdesk views These views are configured to restrict access to Cisco IOS commands and

configuration while allowing timely problem resolution and audit access to the IOS If SSH is needed, Quest OpenSSH provides password-less, secure, encrypted

remote login and file transfer services for Vintela Authentication Services (VAS). The Cisco solution can also support VLANs and VPNs (if needed)

Page 9: RBAC Defense in Depth Authors: Brad Ruppert & Russell Meyer

RBAC for Separation of Duties

GIAC Enterprises has developed roles to separate job duties User administration - The person authorizing the new user or access should

not be the same one that establishes new user or access Accounting - The person approving the payment of an invoice should not be

the same one that can create a company\vendor in the accounting system IT Administrator vs. IT auditor. While the auditor would need the same

‘read’ or access rights as an it administrator, they would not need ‘write’ or ‘modify’ rights

The developer would require access to the development area but should not be allowed access to the production area

Data Owner vs. Data Custodian, i.e. the IT administrator. In some cases, access to the data may need to be restricted to the data owner. IT would not be granted access, but would be required to ensure the security of it

As mentioned, physical access can also be controlled via AD enabled key cards. This prevents access to unauthorized areas

Page 10: RBAC Defense in Depth Authors: Brad Ruppert & Russell Meyer

RBAC for Auditing

RBAC will ease auditing of network and systems Enforces unique usernames; only one username per user Define ‘read’ or ‘view’ only access to auditing roles Auditors can then be granted access to audit roles Appropriate event logs from servers, Active Directory, IPS, routers,

Vintela Authentication Services, NAC, key card system and other network infrastructure devices are stored in a centralized log server

Access to the centralized log server data is restricted, IT can not access, modify or delete logs without audit’s permission

An event correlation and reporting server is used by both IT and audit to correlate and review the data

Page 11: RBAC Defense in Depth Authors: Brad Ruppert & Russell Meyer

Conclusion

GIAC Enterprises can benefit from Role Based Access Control by gaining scalability and efficiency

By leveraging Active Directory and implementing the appropriate roles, GIAC Enterprises can increase security and reduce system administration costs

While Role Based Access Control is considered a best practice at the system or application level, it becomes increasingly difficult to implement when scaling for large enterprises

RBAC is not a product that can be implemented per se. Implementing RBAC involves careful planning for each systems and should involve users, management and policies for success

Care should be taken when implementing RBAC in the Enterprise. If costs outweigh the benefits, RBAC implementation may need to be scaled back