arounddavid
驱动牛犊
驱动牛犊
  • 注册日期2004-04-07
  • 最后登录2004-08-24
  • 粉丝0
  • 关注0
  • 积分0分
  • 威望0点
  • 贡献值0点
  • 好评度0点
  • 原创分0分
  • 专家分0分
阅读:1940回复:3

看看这篇老外的文章 --The 2004 Security Survivor\'s Guide

楼主#
更多 发布于:2004-05-11 14:00
在网上查到一篇文章,觉得很不错,和大家一起分享

The 2004 Security Survivor\'s Guide
 
By Mike Fratto, Network Computing
 
Introduction
 
A spate of new security products promises to ward off every evil from spam to worms. But even while the IT security field has mushroomed, most of the products are either evolutionary, adding new features, or existing concepts under a new guise.
Meanwhile, you\'re bombarded by conflicting messages from industry analysts, vendors, self-proclaimed gurus and even mainstream news outlets. Should you really consider dropping Windows from the desktop and moving to Mac or Linux? Is either OS really secure? Should you buy an IDS (intrusion-detection system), or should you buy more departmental firewalls and deploy them in targeted locations? Should you purchase a firewall today, or hold off until deep packet-inspection firewalls--whatever they are--come to market?
You won\'t find the answers by poring over vendors\' marketing materials. Sure, you\'ll learn that deep packet inspection, the next-generation firewall, makes decisions based on packet content. But you won\'t be told that this feature has been around for years, in the form of application proxy firewalls, IDSs that configure firewalls, multifunction box appliances (which are making a comeback) and network IPSs (intrusion-prevention systems). You won\'t find the silver bullet that stops network attacks by active response, because the vendors can\'t provide it. Their protection, based not on allowing what\'s authorized but on stopping what\'s known, is in the wrong place.
Bottom line, you have to find the right combination of products that will give you protection both inside and outside your network, from the host to the desktop to the perimeter. And you need a sound patching strategy that you can implement and maintain effectively. Above all, your security plan must never get in the way of the business. If the plan hinders the company\'s main function, it\'ll be an uphill battle getting security measures adopted.
You must comprehend security technology as it applies to your business\' specific needs so that you can sell your security strategy internally, in 2004 and well into the future.
The Network\'s Soft, Chewy Center
Any traffic that traverses the internal network will pass unhindered. This year\'s worm attacks, such as SQL Slammer and Welchia, show just how vulnerable the internal network is. Even when the perimeter is locked down, all it takes is one infected laptop connected to the internal network to wreak havoc.
The coupling of multiple agents, such as firewall, antivirus, VPN, host IDS and host-vulnerability assessment products, may lead you to believe that integrated suites are necessary. In many cases, they\'re not. Yes, the desktop firewall has to let the VPN client function properly, and the HIDS has to see activity on the host without interruption by the firewall. But these are implementation issues for the most part, because the firewall, VPN and HIDS, for example, are all trying to monitor or shim the IP stack.
More important than integration is that the products are running and current when a mobile computer connects to the internal network over a VPN or is connected directly after being off the network. Worms that had no way to enter a network over the network firewall were carried in by mobile users. If your patched mobile systems were using current antivirus software and you had the proper desktop firewall controls, worm propagation would have been unlikely.
Be wary of products that claim to do it all. Standalone products tend to be more robust and thorough than general-purpose multifunction appliances. And with multiple standalones, you can choose and implement the solutions you need. In a recent reader survey conducted by our sister publication Secure Enterprise, only 11 percent of respondents said they standardize on a single vendor for security; the rest use best of breed.
(Page 1 of 6)

Although traditional network protection aims to keep intruders away from the perimeter, the host bears the brunt of most attacks. Firewalls are important, but they can\'t tell you anything about what\'s happening within the computer. HIP (host intrusion prevention) products, such as Cisco Security Agent, Network Associates Entercept and Computer Associates eTrust Access Control, go beyond firewall technologies by controlling access to system resources by applications or users.
Unfortunately, only Cisco Security Agent, which features a full set of configuration tools, is designed to run on the desktop. The other downside of this category is that few HIP products prevent applications from executing harmful actions such as stopping a database from executing a SQL query to drop a table or add a user. Entercept\'s database protection supports only Microsoft SQL Server 2000.
Because HIP products lock down systems, you\'ll have to modify any change-control processes to include the modification of the HIP and the updating of the access-control policies when patching a protected system or application. Also, because everyday business applications are so complex, host security products must learn normal application behavior and how to enforce it.
Embrace the Desktop Firewall
The next line of defense is the desktop. If that\'s where the data is, shouldn\'t that be where the protection is concentrated? We lay out an asset-centric view in \"Secure to the Core\". If you don\'t have a desktop-firewall deployment for remote users, make it a priority. Properly configured desktop firewalls stop attacks from external users, and may be effective in combating the spread of worms by preventing the worm code from accessing network resources.
To be effective, a desktop firewall must keep intruders out and restrict the network access of the calling application and any loaded modules. An ACL (access-control list), for example can prevent all programs from listening on TCP Port 25, thus disabling one popular method for spreading e-mail-borne worms.
But network-access control isn\'t perfect. The dialog boxes that ask if an application can access the network don\'t always provide the user enough information to make a decision, and it\'s human nature to want to allow access. If you\'re thinking about deploying desktop firewalls, make sure you can configure and enforce policy centrally.
Clearly, the desktop battlefield is on the minds of the biggest companies\' developers. At the 2003 Gartner Fall Symposium, Microsoft CEO Steve Ballmer described technologies, planned for inclusion in Windows XP and Windows 2003, that will allow the inspection of computers and shield vulnerable systems via a distributed firewall. But unless Microsoft plans on adding that protection to all the supported versions of Windows, the cottage industry of desktop firewalls from ISS, Sygate, ZoneAlarm and others will still be viable.
(Page 3 of 6)
Along with strong protection around your key data centers, perimeter protection plays a key role. But antivirus, content-inspection, intrusion-detection and intrusion-prevention remedies all employ reactive technologies: Unless a signature for the threat exists, they won\'t detect the problem. Organizations that rely solely on blocking unwelcome traffic at the perimeter are bound to lose--imagine protecting your king with nothing but pawns.
Still, the perimeter is the first point of attack, so you must have a strategy here, too. To choose the right product, determine where your traffic ends up once it traverses the perimeter. For a small network on which all traffic flows through a single network connection to the Internet, a multifunction firewall may be viable, especially in shops with little IT support. Such a product is easy to use, but limited. For instance, if you rely on the firewall to scan your e-mail for viruses and your e-mail server is on the trusted side of the network, e-mail sent from one internal user to another won\'t be scanned. Your e-mail server must have antivirus software.
For more complex networks, consider pushing perimeter protection like Web services filtering and network-intrusion prevention on to specialized devices. As attacks become data-driven and protocols such as SOAP (Simple Object Access Protocol) and XML-RPC (Extensible Markup Language Remote Procedure Call) become prevalent, the traditional perimeter devices are hard-pressed to keep up. Processing these protocols takes additional system resources, which can lead to performance bottlenecks. A dedicated security device will bring better performance, both at the perimeter and inside it.
 E-poll results: CSO vs. CSIO click to enlarge
Network intrusion-prevention offerings are hot right now, but don\'t believe the hype. These perimeter products are only as good and as current as the signatures that drive them. They require even more care and feeding than intrusion-detection systems, as you have to figure out which attacks to block and how.
IPSs aren\'t fire and forget, either, because you have to make sure legitimate traffic isn\'t being blocked. Since many standards documents are vague about protocol specification, multiple developers may implement the same standards differently. So even with legitimate traffic, the products won\'t necessarily comply with a given specification or trigger IDS/IPS alerts. Moving to an IPS makes sense now only if your organization is doing an initial IDS deployment or is looking to replace an existing IDS deployment
(Page 4 of 6)
Regardless of which products you install, it\'s critical to address software problems by applying patches and service packs. A patching system should support multiple versions of Windows, keep track of patch dependencies, ensure that files and registry keys conform to the current patch levels, and monitor new patches. Deployment strategies should be configurable based on whether the user is local or remote.
For 2004, Microsoft has promised some enhancements to Software Update Services that might relieve some of the patching burden, but we need more. Effective patch management means identifying systems that need patching, then installing and testing new patches and identifying new vulnerabilities.
Patch-management products must be married with vulnerability-assessment tools. These products will produce a financial payoff. Centrally deploying and monitoring patches, thereby avoiding the cleanup from a worm attack, for instance, saves time and money.
Policy management goes hand in hand with patch management. This becomes particularly valuable in a cross-platform environment, where centralized management of all systems is important. If you\'re running an all-Windows environment and simply need to enforce a common desktop policy, use the Group Policy Object. If you want to audit and enforce policies outside the GPO\'s scope, a policy-management system such as Bindview bv-Control, ConfigureSoft Enterprise Configuration Manager or Pedestal Software Security Expressions is probably worth the time and money. Policy-management systems\' main value comes from imposing order over chaos. If you document and enforce your organization\'s network configurations, however, you may not benefit from these systems. Compare your methods with the compliance checking these products offer.
The policy-management vendors are hawking compliance templates for the Gramm-Leach-Bliley Act, the Health Insurance Portability and Accountability Act, the Sarbanes-Oxley Act of 2002 and other regulations or initiatives. Although the policy templates may be useful, you still need to comb through them to ensure that they address your specific regulatory needs. Furthermore, these products come with support costs. Agents must be deployed or administrative accounts gathered up so the products can query the managed hosts. In light of other security-spending needs, you can accomplish the same thing with a few good books on network policy definition and Web resources.
(Page 4 of 6)
Regardless of which products you install, it\'s critical to address software problems by applying patches and service packs. A patching system should support multiple versions of Windows, keep track of patch dependencies, ensure that files and registry keys conform to the current patch levels, and monitor new patches. Deployment strategies should be configurable based on whether the user is local or remote.
For 2004, Microsoft has promised some enhancements to Software Update Services that might relieve some of the patching burden, but we need more. Effective patch management means identifying systems that need patching, then installing and testing new patches and identifying new vulnerabilities.
Patch-management products must be married with vulnerability-assessment tools. These products will produce a financial payoff. Centrally deploying and monitoring patches, thereby avoiding the cleanup from a worm attack, for instance, saves time and money.
Policy management goes hand in hand with patch management. This becomes particularly valuable in a cross-platform environment, where centralized management of all systems is important. If you\'re running an all-Windows environment and simply need to enforce a common desktop policy, use the Group Policy Object. If you want to audit and enforce policies outside the GPO\'s scope, a policy-management system such as Bindview bv-Control, ConfigureSoft Enterprise Configuration Manager or Pedestal Software Security Expressions is probably worth the time and money. Policy-management systems\' main value comes from imposing order over chaos. If you document and enforce your organization\'s network configurations, however, you may not benefit from these systems. Compare your methods with the compliance checking these products offer.
The policy-management vendors are hawking compliance templates for the Gramm-Leach-Bliley Act, the Health Insurance Portability and Accountability Act, the Sarbanes-Oxley Act of 2002 and other regulations or initiatives. Although the policy templates may be useful, you still need to comb through them to ensure that they address your specific regulatory needs. Furthermore, these products come with support costs. Agents must be deployed or administrative accounts gathered up so the products can query the managed hosts. In light of other security-spending needs, you can accomplish the same thing with a few good books on network policy definition and Web resources.
(Page 5 of 6)
By now, you should have host, desktop and perimeter protection on your mind while you rethink your patching and policy-management strategies. Yet your network remains vulnerable: Remote users are traveling time bombs.
VPN technologies such as IPsec (IP security) and PPTP (Point-to-Point Tunneling Protocol) secure remote access. PPTP is used because it\'s simple to configure, but IPsec is more secure. Unfortunately, both technologies have serious deployment limitations. Neither one provides standardized NAT-T (network address translation traversal), and IPsec offers no remote IP address management without proprietary modifications by vendors.
IETF\'s IPsec Working Group is close to finalizing IKE (Internet Key Exchange) version 2, which addresses NAT detection and traversal, remote-node IP configuration, and support for legacy-authentication mechanisms. But client support and protocol access through firewalls remain thorny issues. Fat clients can be preinstalled and managed centrally, and can perform advanced protection tasks, such as configuration checking. However, remote users may be on a network that doesn\'t allow IPsec VPN connection, or at a kiosk with no way to install software. In many cases, an SSL VPN can replace IPsec VPN, providing equal or better protection.
SSL VPNs are strong competitors to conventional VPNs for remote users because the browser is the client and, at a basic level, most modern browsers are supported. Also, SSL typically is allowed to pass through firewalls and has no trouble with NAT. For Web applications, little more than a browser is needed. However, support for non-HTTP applications requires either a fat client or an ActiveX or Java Applet downloaded and run locally along with other potential changes to the remote desktop. In any case, SSL VPN offerings let you securely connect remote users to internal networks and can enforce access controls centrally.
So Many Choices
 E-poll results: Security Admin click to enlarge
With all the different security technologies available, making the purchase decision difficult. But whether you\'re flush or cash-starved, protecting your assets isn\'t about the coolest hardware or software. Effective product purchases start with knowing which assets you need to protect and the risks to those assets.
Once you\'ve done your homework, you can select the right product for the right purpose, match the product features to business needs, and leverage existing products and processes.
So do your homework: Read the vendors\' glossies, review the analysts\' reports, read product reviews, and when you sit down across the table from a vendor or integrator, demand technical details--and proof--on how a product will solve your IT security problems. If a vendor comes knocking with a silver bullet, run.
Mike Fratto is a senior technology editor based in Network Computing\'s Syracuse University Real-World Labs (R); he covers all security-related topics. Prior to joining this magazine, Mike worked as an independent consultant in central New York. Write to him at mfratto@nwc.com.

poweruser
驱动老牛
驱动老牛
  • 注册日期2003-02-26
  • 最后登录2008-07-18
  • 粉丝0
  • 关注0
  • 积分652分
  • 威望72点
  • 贡献值0点
  • 好评度64点
  • 原创分0分
  • 专家分0分
沙发#
发布于:2004-05-11 17:40
哇,好长

多谢
老虎不发威,你当我是Hello Kitty!
arounddavid
驱动牛犊
驱动牛犊
  • 注册日期2004-04-07
  • 最后登录2004-08-24
  • 粉丝0
  • 关注0
  • 积分0分
  • 威望0点
  • 贡献值0点
  • 好评度0点
  • 原创分0分
  • 专家分0分
板凳#
发布于:2004-05-12 13:19
to poweruser  
终于找到知音了,好高兴。

虽然文章很长,但是值得一读,因为分析的有一定深度。
walkonthesky
驱动中牛
驱动中牛
  • 注册日期2003-11-26
  • 最后登录2012-11-06
  • 粉丝0
  • 关注0
  • 积分1分
  • 威望20点
  • 贡献值0点
  • 好评度0点
  • 原创分0分
  • 专家分0分
地板#
发布于:2004-05-25 09:12
好文章

可惜观点不是很新
国内早见到类似的说法
[img]http://www.driverdevelop.com/forum/upload/walkonthesky/2004-07-08_2004-07-07_b847.gif[/img]
游客

返回顶部