Connecting a Classified Network to the Internet

Published on March 2017 | Categories: Documents | Downloads: 50 | Comments: 0 | Views: 300
of 10
Download PDF   Embed   Report

Comments

Content

Interested in learning more about security?

SANS Institute InfoSec Reading Room
This paper is from the SANS Institute Reading Room site. Reposting is not permitted without express written permission.

Connecting a Classified Network to the Internet. A case study.
A classified (computer) network is one that stores information that is sensitive and should not be made available to the general public. The purpose of this document is to point out some common elements from the guidelines published to regulate computer security and suggest administrative action and technical solutions to build a network that may be connected to the Internet, and still obtain/retain a classification up to and including NATO RESTRICTED. The author is not aware of any standard that will allow a system cl...

Copyright SANS Institute Author Retains Full Rights

AD

Henrik Kram

- GSEC Practical version 1.2e

Connecting a classified network to the Internet. A case study. Introduction A classified (computer) network is one that stores information that is sensitive and should not be made available to the general public. This may be; • Military secrets • Financial records • Personnel records • Trade secrets Generally only the first type of information, military secrets, will make classification

Key mandatory, fingerprint but = AF19 2F94 998D FDB5 DE3D F8B5 or 06E4 A169 4E46 lowerFA27 classifications (NATO RESTRICTED equivalent) may be
imposed by civil law. The purpose of this document is to point out some common elements from the guidelines published to regulate computer security and suggest administrative action and technical solutions to build a network that may be connected to the Internet, and still obtain/retain a classification up to and including NATO RESTRICTED. The author is not aware of any standard that will allow a system classified at NATO CONFIDENTIAL or higher to be connected to a public network (Internet). Note that the standards mentioned (BS7799, ITSEC, CommonCriteria a.s.o.) only tell what to achieve, not how. In Europe certification schemes are coordinated by the European co-operation for Accreditation and will be quite similar. The US have adopted the Common Criteria initiative (www.commoncriteria.org), but not to ISO17799, so there might be some differences here to be aware of. Nevertheless it should be noted that there is differences from country to country when it comes to accreditation and the reader is advised to contact the accrediting agency, or a private IS security company for guidance before committing to a any strategy.

What’s changed?

For years the standard way to protect R-networks from intrusion was to simply not connect them to any external nets. The rationale here was that the hacker can’t compromise what he or she can’t physically connect to. This holds true today; network devices such as hubs, routers and switches merely extend the physical cable. Interrupt the stream of electrons (or radiowaves /optic signals, and data traffic is stopped instantly!

Key With fingerprint = AF19 FA27 998D FDB5 DE3D F8B5 06E4Even A169 4E46 the widespread use of 2F94 the Internet, the situation has changed. organizations
that have information that must remain protected, find that they need an Internetconnection in their day to day tasks, or that their employees demand it. A lot of them have simply connected their R-net to the Internet just separated by a network device called a ”firewall”, and pray that they will not be compromised.

© SANS Institute 2002,

©

SA

NS

In

For the rest of this document the internal, classified network will be referred to as the R-net. (R=Restricted)

As part of the Information Security Reading Room.

sti

tu

te

20

02

,A

ut

ho

rr

eta

ins

fu ll r igh ts.

Author retains full rights.

Where to start.

Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46
The procedures in this document might be helpful in these situations: • The network will be connected to the Internet and is storing classified data. • The network is presently connected to the Internet, and you’re going to store classified data. • You are presently both connected to the Internet and storing classified data and praying your firewall will protect you (bad idea…). Although this document assume that the reason for protecting the internal network is to obtain/retain an official classification, more and more organizations realize that they store sensitive information that they are morally and maybe legally required to protect. The first thing to get in place is backing from management. To do this, an official information security policy (ISP) identifying what assets need protecting and why, should be written, and signed by the CEO. This is altso the first document an accrediting body will look at. It is not easy to find templates for security policies, but the research project ”What do I put in a security policy” by William Farnsworth (http://www.sans.org/infosecFAQ/p olicy/policy.htm) on the GSEC pages of SANS is a good starting point. You might find that the provided sample Security Policy has all you need.

Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46
Now you are ready to plan how you will meet the demands set by the policy (or the approving body) on your network. A good roadmap to

©

SA

NS

In

sti

tu

te

© SANS Institute 2002,

As part (reproduced of the Information Security Reading Room. with permission of
Gamma Secure Systems Ltd.)

20

02

Figure1

,A

ut

ho

rr

eta

ins

fu ll r igh ts.

In most countries the fact that organizations, both governmental and private, store information that may be highly sensitive on networks that might be accessible from the public Internet is unnerving. Governments in the western world including the United States and most of the European Union have now passed laws that require all classified networks to be protected. In Europe usually a government agency is required to check and approve a network before it may store classified information. These agencies altso publish guidelines to how a network can conform to the standards of a given classification. In the US the National Security Agency Infosec Service Center(http://www.nsa.gov/isso/index.html) publish guides on network security, but it is unknown to the author if they inspect and certify computer networks.

Author retains full rights.

this process is the British Standard 7799 (BS7799 or ISO/IEC 17799). It comes in two parts; 1. The standard code of practice. 2. Information Security Management System (ISMS) standard specification. It is part 2, the management standard, which is interesting at this point. The process is described in the graphic Figure 1 on the previous page. • • Step one, the Information Security Policy, is not discussed in detail here.

Control Objectives and Controls Here you describe, in detail, how you plan to implement the ISMS. Key fingerprint =list AF19 FA27 2F94 998D FDB5 DE3D 06E4 A169 security 4E46 a) A of all the documents that is needed to F8B5 regulate computer (contingency plan, access policy, and computer security policy.) b) The hardware (secure placement, cabling, marking and electronic radiation protection). c) Handling of data storage devices (floppy’s, tapes, harddisks and so on).



© SANS Institute 2002,

©

SA

NS

In

As part of the Information Security Reading Room.

sti

tu

te

20

02

,A

ut

ho

rr



Risk analysis and Risk management. Since the assets and their value are defined What is risk? Here is a definition: in the ISP you now need to evaluate the Risk is the combination of a threat risk of loss to each of these values. exploiting some vulnerability that Arrange the results in a matrix. The could cause harm to some asset. highest valued asset with the most risk of loss will be your first priority. You then proceed all the way to the opposite end of the matrix (least valued asset with little risk of loss). This is now your prioritized list of objects to protect. With your risk analysis in mind you need to describe how you want to safeguard your assets (risk management). You may choose one or a combination of the following: 1. Reduce the threat. 2. Reduce the vulnerability. 3. Reduce the value of the asset. This may be difficult to understand so lets do an example; You decide that your customer database is a valuable asset, so you regulate access to it by setting a password. You have now reduced the threat of someone viewing, altering or deleting data. You may then install a system patch to stop unauthorized users accessing the database through some exploit. You have reduced the vulnerability of the database system. Finally you encrypt the tables in the database, so to make it unreadable to an intruder. You have reduced the value of the asset (at least for the thief…).

eta

ins

To define the scope of the ISMS you should describe the following: Conceptual aspects of security. a) The extent and purpose of the network. b) What classification you want to obtain. Key fingerprint c) How = AF19 traffic FA27 between 2F94 the 998D classified FDB5 and DE3D unclassified F8B5 06E4 network A169 should 4E46 be handled. d) If commercial hardware and software (COTS) or tailor made solutions should be used . e) A drawing of the network as you plan to implement it.

fu ll r igh ts.

Author retains full rights.

d) Handling of print devices e) Data Communication (e.g. encryption; yes/no, what kind) f) System configuration control and maintenance. Note that this part of the plan is what will differ the most based on regional laws. Often the requirement specification is a direct copy of some official document. Save yourself a lot of work and check this first! It is beyond the scope of this document to go into detail on the technical solutions. For some pointers, please se the sample at the end of the project. Finally you should produce a document called the Statement of Applicability. The document identify all your controls, justify how they will mediate the risk, and how they map to the BS7799 or whatever standard you are using. If you deviate from the= standard you must be able to explain why F8B5 your implementation is better. Key fingerprint AF19 FA27 2F94 998D FDB5 DE3D 06E4 A169 4E46 The classification process. OK. With all your paperwork in order you should contact whatever body you want to classify your network (either government agency or high level management). If you don’t seek official classification you should altso present a cost analysis at this point. Management might care about this aspect, a government agency will not! Note that few or none of the countermeasures in your plan are in place, but not to worry. When you first present your plan, an official body more often than not have some additions or changes you need to include. Finally, when you get acceptance of your policy and plan then its time to start thinking about implementation. •

Further you need to decide how you should handle traffic going to and from the public network to your protected network (or how to avoid it). Usually your greatest concern is to stop data from your protected network being sent to the public network thus compromising the confidentiality of your data, but having unwanted data from the public network getting in is not good either, basically threatening both integrity and availability.

Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46
You need to do some degree of auditing. At a minimum you must log all file transfer from your classified network to your unclassified network. It will not stop sensitive data from being compromised, but you will have accountability! You should altso configure your e-mail system so that it will search for some kind of verification that

© SANS Institute 2002,

©

SA

When this is done you should turn your attention to your physical network. You will need to evaluate if you are going for a strong perimeter defense, hardening the inside or both. Of course a strong perimeter defense AND a hard inside is ideal, but building this to perfection might be a daunting task…

NS

In

As part of the Information Security Reading Room.

sti

The first part of implementation is a lot or writing. You will need to write procedures for just about every aspect of your IT operation; backup, restore, user management, file and print access, logging, mail and web access, and so on. You altso need a full detailed inventory of your computer network configuration. The procedures are referenced in the applicable policy.

tu

te

20

02

Doing the work

,A

ut

ho

rr

eta

ins

fu ll r igh ts.

Author retains full rights.

an outbound message is unclassified (like having the sender write “unclassified” in the subject field…) before sending it out. Again accountability, not prevention is the objective here. You will probably need to decide on and buy software and hardware in this process. If possible, you should consult the list of software/hardware tested by the Common Criteria or ITSEC (http://www.itsec.gov.uk/). If you find what you need in the list chances for a smooth accrediting process is much better. And, you get software and hardware you can trust! Some items, like backup software, are necessary in all networks. Others are specialized for securing data communication. At a minimum there must be some mechanism to control traffic access between the R-net and the Internet. For most this be at the and protocol level, andDE3D implemented by a packet-filtering Key will fingerprint =IP-address AF19 FA27 2F94 998D FDB5 F8B5 06E4 A169 4E46 router (a “firewall”). Be aware that the firewall(s) are your most important network object and will be vigorously inspected and tested. Make sure it is evaluated to a level of E3, and configured to the standard of the classification body. The firewall can be implemented on each host instead, but administrative overhead has made this a less popular option. The router may be complemented with an application layer gateway, or proxy, which has access control on a higher level (application layer). But beware the no firewall (packet-filtering, statefull, proxy or other) is secure out of the box. For example; some well-known firewalls are default configured to allow all connections initialized from the inside. This is not desirable since if a Trojan is introduced in the R-net it may be able to open an outbound connection to its “master”. Many implementations, like the one in the example, require an extra network segment between the R-net and the Internet. Let’s call it the controlled network (C-net). Its function is to be a controlled buffer zone that can prevent or delay an attack on the Rnet, and to host services not able to run in the most secured environment. Such an implementation requires duplication of several systems, like the mail-server. Of course you will altso need a second firewall. Since logging is part of the requirements you might need some centralized logging functionality. You don’t want to run around checking each and every log on every network object in the middle of a hacker attack!!! There are COTS-products that can send both UNIX and NT events to a syslog server. Some kind of database is needed to systemize and store entries from the syslog. Although not usually mentioned as a formal requirement the author strongly believe that the following should be found in all secure networks: • Some form of user verification/authentication other than that of the host OS (Tacacs, Radius, and RSA…) • An Intrusion Detection System (ISS, Shadow, Cisco Secure…)

Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46
Remember that your certification depends on the level of trust the classification body has in your network configuration and countermeasures. Going that extra mile can only give an impression that you are truly serious about security!

© SANS Institute 2002,

©

SA

NS

In

As part of the Information Security Reading Room.

sti

tu

te

20

02

,A

ut

ho

rr

eta

ins

fu ll r igh ts.

Author retains full rights.

An example network The network diagram below designed to give mail and web browsing capabilities, display a physical network layout that should pass most basic inspections. Just remember that you altso need documentation and routines in place. How it works: NOTE: In the graphic the term modem is used for all types of interface (Frame Relay, dialup and so on.) to a WAN network

Internet browsing is altso performed through the Terminal server. There can be no transfer of internet-data into the R-net. • The (not required) intrusion detection system here is set up with two agents, one on the C-net to detect intrusion from the internet that has passed the external firewall, and one on the R-net to spot any activity that may indicate that an insider is trying to defeat your countermeasures in order to compromise security. • Any services offered to the Internet should be placed in a separate segment, DMZ, as is god practice in any network. • The syslog-server is configured to accept messages from both C-net and R-net. For additional security, have a separate syslog-server on the R-net so that you can minimize traffic through the firewall from the R-net to the C-net. To get a central logging point, copy the syslog data (on a zip-disk, tape or other removable media) from C-net up to R-net. Key • fingerprint = AF19 FA27 DE3D F8B5 06E4 A169 4E46be If data transfer from the2F94 R-net998D to the FDB5 C-net is absolutely necessary, it would possible to open up the internal firewall for FTP to a specific FTP-server on the Cnet and give the user permission to put a file in a write only directory. The security officer should then manually screen the file before it is put in a folder

© SANS Institute 2002,

©

SA

NS

In

As part of the Information Security Reading Room.

sti



tu

te

IF the message need a reply, the recipient must to open a channel from his client to the external mail-server. In the example this is done with a Terminal Server. Through the TS the recipient can respond on the copy still available on the Cnet mail-server. The TS-client is configured not to allow cut and paste from the internal network to the TS-session, thus preventing a user to add any attachments containing data from the R-net.

20

02

,A

ut

ho

rr

• Email: e-mail the external firewall is Key When fingerprint =reach AF19 FA27 2F94 998D it FDB5 DE3D F8B5 06E4 A169 4E46 forwarded to the anti-virus scanner. If it is clean the AV-scanner pass the message to the mailserver on the C-net. The mail-server in turn pushes a copy of the message through the internal firewall to the R-net mail-server. There is no session because the receiving mail-server is denied outbound connections.

eta

ins

fu ll r igh ts.

Author retains full rights.

where the user can retrieve it from his Terminal Server session. This workaround may NOT be acceptable in all countries. Virtual Private Networks Although not strictly belonging in this discussion, I want to mention the issue of VPN in the context of classified networks. A VPN is an encrypted channel that uses a public network (usually the Internet) to transport non-public data between two LAN’s. Since the sender and receiver don’t exercise traffic control over the public network there is no guarantee privacy. That means others might pick up the transmissions and read the data. This can’t be avoided, only mitigated by encrypting each datapacket to make its contents unreadable and ensure that the information is not altered. are several COTS solutions for VPN, butDE3D none is evaluated toA169 a level acceptable Key There fingerprint = AF19 FA27 2F94 998D FDB5 F8B5 06E4 4E46 for general classification. If you really need a VPN connection into your network, there are few references on what to choose and how to configure. First and foremost: The chance of getting acceptance for a configuration that employ a VPN connection into the R-net is at best slim. The most viable alternative is to use a C-net/R-net configuration and terminate the VPN-connection in the external firewall, or in parallel with it. There are other actions you can take to better your chances of certification: • Buy the VPN with the best encryption algorithm and bit length you can get your hands on. • If there is a national manufacturer of a VPN product, or if a specific VPN has been chosen by a military or important governmental organization in your country, try to get that. • Hardware crypto is usually more secure and faster than software crypto. • Avoid VPN servers that depend on a well-known OS like Windows or UNIX if you can. • If the number of VPN connections is small, go for a symmetric or private cryptosystem. Practice ”perfect forward secrecy”, which means that you change the keys frequently, giving an intruder a very narrow timeframe to access the system. Summary It’s quite easy to obtain a given classification for a single computer, or for host on a LAN segment. That’s because access to the data is easy to restrict and control. When a classified network is to be connected to the Internet, this triggers a whole new classification process, because new ways into the network exist. As the risk of exposure, loss of data or loss of data integrity increases, Systems Admins around the world see the need of better protection for their networks. Connecting classified networks to the Internet bring new, often conflicting, aspects into the situation. By following some commonly accepted principles, the likelihood of Key succeeding fingerprint in = securing AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46 the network increase. The BS7799 standard contain, among other things, a roadmap on how to plan, build and certify a internet-connected network that will contain classified data. The Common Criteria standard describe how to test hardware and software designs to a

© SANS Institute 2002,

©

SA

NS

In

As part of the Information Security Reading Room.

sti

tu

te

20

02

,A

ut

ho

rr

eta

ins

fu ll r igh ts.

Author retains full rights.

given security level, and national independent evaluation facilities carry out certification test on specific products. If the ultimate goal is to get acceptance for a gateway onto the Internet, just following the common standards might not be satisfactory to your countries approving body. Additions and alterations to the generally accepted standard are quite common. Remember that a classification is not a guarantee that your network is safe from intrusion or tampering, it’s just an expression of the level of trust the certifying body has in your countermeasures being able to mediate the identified risks.

Building a secure network is not just a matter of buying and configuring a firewall. The organization needs policies to regulate the access and use of the network, and to the flow of data. The process of obtaining classification is just as much an Key control fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46 organizational process as a technical one.

Bibliography

Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46

© SANS Institute 2002,

©

SA

NS

In

As part of the Information Security Reading Room.

sti

Elizabeth D Zwicky, Simon Cooper – “Building Internet Firewalls, 2.ed” O’Reilly & Associates 2000 (URL) www.oreilly.com

tu

te

Forsvarets Overkommando/Sikkerhetstaben – ”Datasikkerhetsdirektivet” (URL) http://www.fo.mil.no/sikkerhetsstab/dsd/innhold.html

20

02

Checkpoint Software Tech. – ”Virtual Private Network Security Components” (URL) http://cgi.us.checkpoint.com/rl/resourcelib.asp

,A

Gamma Secure Systems – ”How It Works, Part 2: The management standard” (URL) http://www.gammassl.co.uk/bs7799/works.html

ut

ho

Commonwealth of Australia – ”Gateway certification guide” (URL) http://www.dsd.gov.au/infosec/Gateway/

rr

eta

ins

fu ll r igh ts.

Author retains full rights.

Last Updated: November 20th, 2011

Upcoming SANS Training
Click Here for a full list of all Upcoming SANS Events by Location
SANS San Antonio 2011 SANS London 2011 SANS CDI 2011 SANS Perth 2011 SANS Security East 2012 DoD Cyber Crime 2012 North American SCADA 2012 SANS Monterey 2012 SANS Phoenix 2012 San Antonio, TX London, United Kingdom Washington, DC Perth, Australia New Orleans, LA Atlanta, GA Lake Buena Vista, FL Monterey, CA Phoenix, AZ Nov 28, 2011 - Dec 05, 2011 Dec 03, 2011 - Dec 12, 2011 Dec 09, 2011 - Dec 16, 2011 Dec 12, 2011 - Dec 17, 2011 Jan 17, 2012 - Jan 26, 2012 Jan 20, 2012 - Jan 23, 2012 Jan 21, 2012 - Jan 29, 2012 Jan 30, 2012 - Feb 04, 2012 Feb 13, 2012 - Feb 18, 2012 Nov 26, 2011 - Dec 04, 2011 Anytime Live Event Live Event Live Event Live Event Live Event Live Event Live Event Live Event Live Event Live Event Self Paced

European SCADA and Process Control System Security Summit OnlineItaly 2011 SANS OnDemand Books & MP3s Only

Sponsor Documents

Or use your account on DocShare.tips

Hide

Forgot your password?

Or register your new account on DocShare.tips

Hide

Lost your password? Please enter your email address. You will receive a link to create a new password.

Back to log-in

Close