-
Key Terms:
-
Baselining:
- The process of measuring changes in networking, hardware, software, and so on.
-
Baseline Reporting:
- Identification of the security posture of an application, system, or network.
-
Security Posture:
- The risk level to which a system, or other technology element, is exposed.
-
Security Posture Assessment:
- An assessment that uses baseline reporting and other analyses to discover vulnerabilities and weaknesses in systems and networks.
-
Creating a Baseline
-
To create a baseline for a critical system process, use a reliable system monitoring tool to take measurements of the system process at regular intervals over a period of time.
-
An example of one of these tools is the Windows Performance Monitor, which may be used to measure:
- CPU usage (%)
- System uptime (availability)
- Free RAM
- Free hard drive space
- CPU temperature
- Fan speed
- S.M.A.R.T. (Self-Monitoring, Analysis and Reporting Technology) data
- Note: The primary function of S.M.A.R.T. monitoring is to detect and report on the reliability of the HDDs (Hard Disk Drives), SSDs (Solid State Drives), and eMMCs (embedded Multi-Media Cards)
-
To create a baseline of critical network processes, use SPAN (Switch Protocol Analyzer) and IP SLA (IP Service Level Agreement), along with a Network Protocol Analyzer such as Wireshark, SolarWinds, or Nessus to confirm the network measurements of your network hardware.
- Alternatively, if you have access to a centralized SDN environment, such as the Cisco APIC (Application Programmable Interface Controller) or APIC-EM (Application Programmable Interface Controller Enterprise Module), the Northbound Interface API can be used to automatically measure the network baseline with the ACL Path Trace Tool.
-
Protocol Analyzers
-
Wireshark
-
Port Mirroring (SPAN):
- When you configure one or more ports on a switch to forward all packets to another port. Often used when capturing packets.
- Explain the difference between Port Mirroring and a Network Tap:
- Port Mirroring refers to configuring one or more (Layer 2) switch ports to copy and forward frames to another switch port.
- A Network Tap is a physical device that intercepts traffic between two points of the network. A network tap typically has three ports: One for each monitored port, and one for the computer performing packet capture.
-
Network adapters (NICs) may operate in one of two modes:
-
Promiscuous Mode:
- The network adapter captures all packets that it has access to regardless of the destination of those packets.
-
Non-Promiscuous Mode:
- The network adapter captures only the packets specifically addressed to it. Flooded traffic from broadcasts, multicasts, and unknown unicasts are discarded without first being inspected.
- Broadcast Storm:
- The accumulation of broadcast and multicast traffic on a computer network.
-
SNMP
-
Simple Network Management Protocol (SNMP):
- A TCP/IP protocol that monitors network-attached devices and computers. It's usually incorporated as part of a network management system.
-
Describe the three components of an SNMP system:
-
Managed Devices:
- A network node that implements an SNMP interface that allows unidirectional (Read-Only, RO) or bidirectional (Read-Write, RW) access to node-specific information.
- Managed devices exchange node-specific information with the NMS.
-
SNMP Agents:
- A network-management software module that resides on a managed device.
- An agent has local knowledge of Objects and their associated Object IDs (OIDs) held within the Management Information Base (MIB), and translates that information to or from an SNMP-specific form.
-
SNMP Manager (NMS):
- A Network Management Station executes applications that monitor and control managed devices.
- One or more NMS provide the bulk of the processing and memory resources required for network management.
-
SNMP uses ports 161 and 162:
- SNMP agents receive requests from the NMS on port 161.
- The NMS receives notifications from SNMP agents on port 162.
-
In-Band vs Out-Of-Band (OOB):
-
There are primarily two ways to manage a network:
- In-Band:
- Network management is performed from within the local network, using SSH, SNMP, or OpenFlow.
- In-band is the most common way to manage a network.
- Out-of-Band:
- Network management is performed from outside the local network.
- Use Cases:
- In large organizations, network dependent organizations, and/or organizations that highly value redundancy and resiliency, out-of-band network management may be deployed in combination to in-band management as a failsafe or secondary system.
- In systems that do not have access to a direct (local) network connection, such as SCADA, PLC, and other embedded systems used in critical infrastructure and manufacturing, out-of-band network management is also an option.
-
Windows
-
Describe how to view and monitor remotely-accessed file shares in Windows OS:
- In Windows, any files and shares that are being accessed by remote computers can be monitored within Computer Management (Run > compmgmt.msc).
-
Inside Computer Management, navigate to System Tools > Shared Folders. From there you can see what shares and open files are being accessed, and what network sessions are open to that computer.
- Note: On some versions of Windows, the Performance Monitor utility can also be found within Computer Management.
-
To view the files opened locally, use the openfiles command, which also allows you to see files opened by remote computers.
- The openfiles command must be run in elevated mode within the Command Prompt. The Maintain Objects List global flag must be enabled, with the following syntax:
- openfiles /local on
- Then run the openfiles command to see what files are opened locally, and by remote computers.
- To view a list of options that may be performed with the openfiles command, issue the /? option.
-
Provide the syntax for the Windows openfiles command, which enables an administrator to list or disconnect files and folders that have been opened on a system:
- OPENFILES /parameter [arguments]
- Description: Enables an administrator to list or disconnect files and folders that have been opened on a system.
-
Parameter List:
- /Disconnect: Disconnects one or more open files.
- /Query: Displays files opened locally or from shared folders.
- /Local: Enables / Disables the display of local open files.
- /?: Displays this help message.
-
Examples:
- OPENFILES /Disconnect /?
- OPENFILES /Query /?
- OPENFILES /Local /?
-
Automation
- Security baselines often require hundreds or thousands of individual security settings on a particular device.
- Automation technologies are used to rapidly deploy configuration templates across a large number of systems.
-
Example: Windows
-
Administrators can create a standard configuration template for all end user Windows systems, and then apply that template using:
- Group Policy Objects
- Active Directory
-
Monitoring
- Once administrators set baseline requirements and deploy those baselines across the enterprise, they should continue to monitor systems for compliance with the baseline.
- Automated monitoring solutions allow administrators to rapidly check thousands of systems against the baseline and quickly identify any deviations that require further investigation.