Sei sulla pagina 1di 7

Tutorial:Overview

How To Conduct A
Security Audit
Information security encompasses more than just IT systems - people who use the systems
can also inadvertently open security loopholes. A security audit aims to detect and highlight
any problem areas within the IT infrastructure and staff behaviours.

By Justin Kapp

B efore you can assess what you


are securing or about to audit it
is important to understand
what it is you are protecting. Your final
rity audit comprises a number of
stages, summarised in Figure 1. These
stages will be covered in more detail
later.
pertise and ability to communicate the
findings of the audit.
It is also important that the auditor
has an understanding of the organisa-
goal is to have your information se- You can choose to focus the audit on tion under review. When auditing sys-
cured and to minimise the risk of los- different areas, such as the firewall, tems that hold data which requires
ing this information. host or network. However, a security security clearance from government,
Firstly we should define what infor- audit will address issues with your IT then the auditor must have the re-
mation security is. Information is an systems, including software and hard- quired clearances in order to access the
asset; like other important business as- ware, your infrastructure (such as systems holding the data.
sets it has a value to an organisation mains power, telecomms), your proce- When you perform a security audit
and consequently it needs to be pro- dures and business processes and your it is important to look beyond the IT
tected. Information security protects people. systems and consider also the human
this business asset from a wide range Information is key. Once the audit interface to your IT. Your IT system
of threats in order to preserve business has been completed you will have in- may be perfectly secure, but your users
continuity, maximise return on invest- formation on the compliance level of may be involved in practices that com-
ment and reduce damage to business. the users and systems under your con- promise the security of the IT systems
Information exists in many forms. It trol, with an idea of the risk exposure in place.
can be printed or written on paper, and security level of these systems. As a result any audit must attempt
stored electronically, transmitted by You will also have an idea of the po- to identify all the possible risks. Your
post or email. Whatever form the in- tential damage that could occur if the IT systems are at risk from compro-
formation takes and however it is worst came to the worst - this enables mise from a number of sources, includ-
stored, its important to protect it ap- you to plan and develop a strategy to ing poorly-managed or badly-con-
propriately. ensure minimal damage. figured systems, internal users, exter-
Information security is charac- You can choose to carry out an audit nal users and external attackers (some-
terised as the preservation of confiden- internally or to use an external contrac- times known as crackers or hackers).
tiality, integrity and availability of the tor. Whoever carries out the audit Even authorised system users can
information under your control. Infor- should have the relevant technical ex- be the source of a security breach, so
mation security is achieved by imple-
menting a suitable set of controls -
policies, practices, procedures, organ-
isational structures and software func- When performing your audit you
tions. Information security is not just
about your IT measures but also about
the human interface to the information.
will use any security policy that your
organisation has as a basis for the work
The Security Audit
you are undertaking. You need to treat
A security audit is a policy-based
assessment of the procedures and the policy initially as a threat.
practices of a site, assessing the level of
risk created by these actions. A secu-

Issue 120 (July 2000) Page 3 PC Network Advisor File: T04123.1


www.itp-journals.com
Tutorial:Overview

identifying possible lapses that could of attack for the audit of the IT systems. You must decide which platform to
allow this is just as important as pre- During the audit you may need to re- use for your audit. The best choice will
venting external attack. strict access to some of the systems have a high level of security. It should
under test; these tests should be per- not run any network services, and
Risk Analysis formed out of business hours to mini- should be configured as if the machine
mise impact on day-to-day operations. was to be used as a firewall or other
During the audit you will need to You will also need to schedule time form of secure host. Another impor-
understand a little about Risk Analysis with a selection of staff members to tant factor is that physical access is
and Risk Management - a security assess how they operate within the se- required to use the machine.
audit is all about assessing the risks of curity policy. You need to prepare a The ideal hardware platform is a
loss, compromise or damage to infor- series of questions to use during the notebook computer, with a good dis-
mation. discussions with staff members. play, 64 MB of RAM and a large hard
Risk analysis is the process of iden- Before you begin you need to verify disk (4 GB plus). It is also important to
tifying and assessing the risk of some- your audit tools and environment. have network connectivity (usually
thing happening. Space does not allow This includes the golden rule of all via a PC Card); in order to provide
us to cover risk management and security auditing - you must verify filtering and logging, in fact, it is useful
analysis in detail, but its principles are that all tools used for the audit are to have more than one network con-
summarised here: untampered with; if the results of the nection. There are many brands of
auditing tools cannot be trusted, the notebook available which would fit
The establishment of mechanisms audit is useless. the bill - for instance, the HP Omni-
to keep risks under review and to You many suffer from a chicken book 4150. Sometimes discreet moni-
make sure they are being addressed and egg problem when it comes to toring may be required, so machines
A means of identifying the poten- verifying your audit tools. In order to such as the sub-notebook, which can
tial risks to the business verify your audit tools you need to use easily be hidden, are often useful.
An assessment of the likelihood of the audit tools. So how do you estab- On the audit platform a suitable op-
each risk materialising lish the trust in your audit tools? You erating system (OS) should be chosen.
An assessment of the probable im- could write them yourself or find a The operating system considered
pact of each risk trusted source such as a person or com- should be able to be secured, have suit-
The formulation of measures to pany. The easiest solution is to use a able audit tools available, have various
avoid each risk occurring tool such as md5sum to create a check- development tools available such as
The development and deployment sum of the file, which can be used to Perl and a C/C++ compiler. It is also a
of fallback measures to mitigate the verify the tool later - or to use a digital large advantage to have the OS source
risks if avoidance actions fail signature of the tool created with PGP. code to prove the security of the oper-
The determination of the urgency ating system. Another important fea-
of the risk and of taking appropri- What Tools? ture for the audit platform operating
ate counter measures. system is that, once put into a network
Over the last few years a number of to be audited, the operating system
It is recommended that those who tools have been developed to aid the doesnt alter the normal operation of
will be carrying out the security audit system administrator. These tools run the environment to be tested.
familiarise themselves further with on a number of platforms including If you are choosing a Unix, then you
risk management and analysis theory Win32 (Windows NT/9x), Linux, So- have a number of choices including
before commencing. laris and FreeBSD. There are a number Linux, FreeBSD, Solaris and SunOS.
of types of tool - those that detect Choosing the right one depends on the
Preparation changes in system configuration, tools hardware you are planning to use and
that test for known security issues and
During your preparation for the a class of tools that are used to monitor
audit you have to decide how you are systems in real time, such as network Stage % Of Total Time
going to bias your audit. You need to sniffers.
decide in what depth you are going to Figure 2 shows a small selection of Preparation 10
audit the systems. the audit tools that are available today. Reviewing Policy/Docs 10
IT systems comprise a number of Tools that run on Windows platforms Talking/Interviewing 10
components, including hosts, servers, tend to be commercial in nature. A Technical Investigation 15
firewalls and the network; you must large number of the tools available for Reviewing Data 20
Writing Up 20
decide how deep you plan to delve the various types on Unix are non-
Report Presentation 5
into each of these components. Some commercial and can be obtained at no Post Audit Actions 10
systems, by their nature, require a charge from the Internet. Unix tools
greater level of scrutiny to determine are often supplied in source code, so
the security issues that may be present. testing the authenticity of the tool is Figure 1 - Summary of the stages
It is also important to plan the angle easier. of a security audit.

File: T04123.2 PC Network Advisor Issue 120 (July 2000) Page 4


www.itp-journals.com
Tutorial:Overview

Security Audit

written policies in plain English -


many of the people who have to read
You need to determine usage patterns, these documents are not technically
minded.
and whether users have seen and read the It is also important to look for com-
pleteness in the policy document. You
security policy. Find out what they can need to determine whether the policy
components specify who can use the
and cant do, in their own words. resources and whether they define the
proper use of the resources available.
Information needs to be provided re-
garding the procedure for granting ac-
the features required by the audit tools to CD. This tamperproof image can cess by administrators and what
you are using. For instance, a tool such then later be used to restore the test should be done with sensitive infor-
as nmap will require certain OS fea- machine to a known state if required mation. Information should be pro-
tures in order for you to get the best out during the audit - or for a future audit. vided regarding the types of privileges
of the tool. available to administrators and to us-
If you are choosing a Windows plat- The Security Policy ers.
form you only have one real choice - Consider whether the security con-
Windows NT Workstation. This When performing your audit you figurations are comprehensive. The
should be configured with the latest will use any security policy that your details are important; do they address
service packs and hotfixes. However, organisation has as a basis for the work specific technical issues? Is allowable
some of the more useful tools do not you are undertaking. When perform- trust clearly outlined, and are specific
run on Windows platforms. ing an audit, you need to treat the pol- tools that are used defined?
It is a good idea to be able to boot icy initially as a threat. You need to You also need to determine the dis-
the machine into more than one oper- determine whether the policy covers semination procedures for the security
ating system. That way you have ac- all the basic components of security policy. A security policy is worthless
cess to multiple test platforms to try policy documents. Are the security unless people read and understand the
different tools to audit the network. configurations comprehensive? document. You need to assess how
Once you have built your test platform Is the policy a threat? Badly written well staff understand the security pol-
it is a good idea to create a machine policies are worse than none at all; icy. It is important that there is a pro-
image using an application such as however, good policies are very rare. cedure for disseminating the
Norton Ghost, and to burn the image So it is important to look for clearly document; this procedure could use
any transport method but, once re-
ceived, it is important that there is a
Tool Platforms Type method for acknowledging the receipt
and reading of the document.
COPS/Tiger Linux, Solaris, Change/Intrusion What happens if there isnt a secu-
Other Unix Detection rity policy? In order to complete a se-
Crack Windows, Linux, Password cracking curity audit successfully you need to
Solaris, Other Unix have an idea of boundaries. If there is
L0phtCrack Windows NT Password cracking no defined security policy it may be
ISS Windows NT, Linux, Suite - Port scanner, necessary, before you start, to define
Solaris, HP-UX network information one or, at least, once the audit is com-
nmap Linux, Solaris, Port Scanner plete, recommend that one is created.
Other Unix If you continue without a security pol-
tcpdump Linux, Solaris, Network Monitoring icy then, while the audit is underway,
Other Unix you should use a guide to best practice
sniffit Linux, Solaris, Network Monitoring for policy guidance. The Site Security
Other Unix Handbook, RFC 2196 is a good starting
CyberCop Windows NT, Linux Suite - Port Scanner, point.
Security Scanner Password cracking,
network information
Nessus Linux, Windows NT, Exploit tester Gathering Info
Other Unix The actual audit involves perform-
TripWire Unix Change/Intrusion ing interviews with staff members and
Detection talking to people in a more informal
manner. This element is often over-
Figure 2 - Useful audit tools. looked and it is quite important. You

Issue 120 (July 2000) Page 5 PC Network Advisor File: T04123.3


www.itp-journals.com
Tutorial:Overview

should be considering more or less attention to details that have a security little user intervention, thus saving
every staff member; you should not bias. You need to review your hard- you a large amount of time in the proc-
only talk to technical staff but also ware and software inventory, the net- ess. These tools should be run in a
normal system users, managers and work topology, key personnel and reconnaissance mode, thus not per-
even cleaning staff. Anyone who has contact details for emergencies. You forming invasive or DoS-style tests.
access to the site and as a result the need to look at documentation for You need to review the system logs
computer systems should be included. emergency procedures and reporting for all systems being audited; look for
You need to determine usage pat- incidents. usage patterns, sites which disallow or
terns, and whether users have seen restrict user access, and possible suspi-
and read the security policy. Find out Technical Investigations cious use. It is important to check sys-
what they can and cant do, in their Your technical investigations tems against know vulnerability
own words. Are they able to obtain should include performing scans with advisories from groups such as CERT,
root or system admin privileges? Find various static audit tools such as ISS, bugtraq, NTBugtraq and other alterna-
out what the systems are used for, and CyberCop or SATAN. These tools tive groups such as L0pht (see box be-
which are the critical systems. Finally gather a vast amount of information low). Groups like L0pht are the
you need to determine how the users based on what the tools have pre-pro- so-called white hat hacker groups;
view the security audit. grammed into them; they automate these people spend an awfully large
You must review all the documen- the processes of gathering information amount of time investigating common
tation that exists already for the sys- and are extremely useful, as they can systems to look for vulnerabilities and
tems in place, paying particular be set off running and usually require publish this information on the In-
ternet.
You should also spend time looking
Resources at the startup processes of the systems
being audited. You need to look for
It is important when conducting a security audit that you have as much processes that arent supposed to be
information as possible in order to better assess security issues. Remember there, and compare the startup with
that there are both Black Hat and White Hat Web sites that contain the applications that are supposed to
security information, and they are both equally useful. Some of the more be installed on the machine or have
useful starting points are detailed below: been previously documented. You
need to examine the static items of the
packetstorm.security.com systems to check for alteration and to
PacketStorm Security is a very good source of the latest security issues. determine if they include unnecessary
www.rootshell.com or dangerous commands.
Rootshell is another source of security issue information. This site hasnt It is important to search the systems
been updated in a while - however, the information provided is useful. for applications and programs that run
in a privileged state - anything that
www.securityfocus.com
runs as root. You need to examine the
Bugtraq is a mailing list for the discussion and announcement of computer
environment, execution and configu-
security vulnerabilities. Details of how to subscribe and archive for the
ration files for these applications.
mailing list can be found at the above Web site.
Check for network services that are
www.ntbugtraq.com surplus to requirements, such as Web
NTBugtraq is the Windows platform version of the Bugtraq mailing list. and Usenet servers. Also check for re-
www.cs.purdue.edu/coast/coast.html placement programs such as TCP
COAST (Computer Operations, Audit and Security Technology) is a re- wrappers and wu-ftpd. Check for pro-
search project into computer security at the Computer Sciences Department grams that are disguised as legitimate
at Purdue University. COAST also boasts a large catalog of security and services, such as Back Orifice, NetBus
audit-related applications in their ftp archive. and even the SETI@Home client. Look
for services that are not supposed to be
www.ciac.org/ciac/ running - for example, a user may have
CIAC (Computer Incident Advisory Capability) provides tools and advi- installed the Windows DUN server on
sory information. their machine with a modem con-
www.cert.org nected, which would pose a serious
CERT (Computer Emergency Response Team) provides information re- security risk as this is not a sanctioned
garding many security issues, including advisory information. network service.
You should examine the trust rela-
www.l0pht.com tionships between the components of
L0pht is a Black Hat group that performs testing of commonly used tools the network, such as your Windows
for security issues. L0pht also produces a number of useful tools for testing NT domain trust relationships and
system security. replication of your servers. There are

File: T04123.4 PC Network Advisor Issue 120 (July 2000) Page 6


www.itp-journals.com
Tutorial:Overview

Security Audit

various services that have some form


of trust relationship between compo-
nents. They include NIS, NFS, SQL Interview staff to locate key hosts.
Server, Oracle, DNS, Windows NT do-
mains, WINS and directory services Look for critical functionality or sensitive
such as LDAP.
In-House Code
information, and also understand how
Any home-grown applications these hosts fit into the network.
should be subjected to a full code re-
view. This will often require the audi-
tor to be assisted by the original
developer or another developer if the Unix and Windows systems, provides hosts, information and data may be
auditor does not have the skills re- a dynamic view of the currently open incomplete.
quired for the language the application or active network connections on the The larger the network is, the more
was developed in. The review should machine, and is useful for locating net- difficult it can be to get an accurate
attempt to locate any possible devel- work services that are running the ma- picture - so more time should be al-
oper errors that could result in a secu- chine. Tools such as filemon and lsof lowed for the audit. In view of the
rity issue developing. display the currently open files, while amount of information, it is important
The kind of errors that could occur regmon shows which registry entries that the auditor understands how the
can include buffer overflows or under- are open on Windows platforms. The network is used. It may be necessary to
flows, backdoors and poor coding. various process viewers will show reduce the size of the audit. As a result,
Also look for signs that the program which applications are running on the prioritise, choose key areas and hosts
attempts to elevate during execution machines. and perform random spot checks.
the security context, such as changing Interview staff to locate key hosts.
from running as a normal user to run- Active Testing Look for critical functionality or sensi-
ning with a system account. The final part of the technical inves- tive information, and also understand
If the program doesnt have docu- tigation stage is the active testing of the how these hosts fit into the network.
mentation or comments within the systems. Tools such as ISS, NESSUS You should gather extra host audit
source code then this is a bad sign. It and CyberCop all offer a series of tests data for key hosts.
will also hamper your review and that have the potential to cause De- Look at network traffic: examine
should be noted for the final report. nial of Service (DoS) attacks. The idea the flow, what, where and when. Look
Some applications on some systems is to determine exactly how good those at the type of traffic - be it IPX, TCP/IP
may become naturally large; however, defences you have in place really are. or NetBEUI - and note whether the
sometimes, on some operating sys- If you manage to run through all traffic is encrypted. Look at the impor-
tems, an application that is uncom- these tests without causing any ma- tant hardware and software, such as
monly large for its type can be a bad chine to fail its a good sign. You switches, routers and home-grown or
sign. should also try the various exploits special software.
that are available to determine their All in all, networks require more
Dynamic Tools effect. Such tests may adversely affect time to audit, so do more preparation.
On Unix there are a number of tools the network and consequently should 99% of hosts should play no role, and
such as ps, netstat, lsof and top whose be run out of normal working hours. you may never get the true picture.
output is important in determining the Before performing these tests you External connections can be hard to
dynamic status of a system. On Win- should decide if they are really neces- map, and network and host admini-
dows platforms you should use the sary, as some of the tests can poten- stration can be very different from site
Task Manager, NETSTAT and tially cause actual damage. If you do to site.
Perfmon on Windows NT systems choose to perform the tests then make
along with third-party tools such as sure that the systems are fully backed The Data
filemon and regmon from System In- up and that the backups are usable.
ternals (www.sysinternals.com). On What happens to your collected
Windows 9x systems you should use a Network Auditing data? All data collected during an
Process Viewer (one is available as audit, whether written or in electronic
part of the Microsoft Visual C++ and There are some differences between form, needs to be preserved for future
the Win32 SDK, and is called host and network auditing. When con- reference. This data shouldnt be kept
PVIEW.EXE) and NETSTAT along ducting a network audit youll get online - it should be stored in a secure
with the filemon and regmon tools. mountains of audit information. Youll location safe from unauthorised access
Each of these tools provide a dy- need to switch from a tactical to a stra- and natural disasters.
namic view of the various states of the tegic view when auditing. As net- Any electronic data should be
machine. Netstat is available for both works tend to be understood less than stored in an encrypted form. Only the

Issue 120 (July 2000) Page 7 PC Network Advisor File: T04123.5


www.itp-journals.com
Tutorial:Overview

coherent message and outcome of the


audit process. You should prioritise
Any home-grown applications should be and summarise all recommendations.
Grade or evaluate the total system
subjected to a full code review. The review level of security. Also detail the state
of the collected audit data, where it is
should attempt to locate any possible stored, how it is kept secure, how it can
be recovered, who should be allowed
developer errors that could result in a access and how to gain access.
The appendices should include de-
security issue developing. tails of the tools used during the audit,
and any details of the systems or net-
works examined that couldnt fit into
the main report body. Include signifi-
people who need to know should The report should have a logical cant output from audit tools that
have access to the information. The structure, and should include an ex- couldnt fit into the report body - eg,
information held on the test machine ecutive summary and prioritised rec- cracked passwords, machine configu-
used for the audit should be archived ommendations, the scope of the audit, ration data etc. Lists of security
to CD. A useful tool to use would be more detailed information, followed patches and OS updates that are re-
something like Norton Ghost, which by final conclusions and detailed rec- quired for the systems audited should
creates a image of the machine which ommendations. be listed, with details of how to obtain
can be stored in a file and written to a The executive summary should be them. A bibliography of suggested
CD-R. no more than one or two pages, and reading of books, papers, and Web
At the end of the security audit you should state the reasons for doing the sites should also be included.
will have a large amount of informa- audit and a brief overview of the sys-
tion that needs to be presented. This tems audited. It should also include Conclusion
should be presented in a report, which details of changes in security since the
explains your findings clearly to your last audit if any, and should briefly Once the report has been written
intended audience. Your audience detail the compliance status of the or- and presented, all responsible person-
may comprise board-level directors, ganisation to published policies. nel should meet to discuss what action
(other) MIS/IT managers and your IT The main report body should be items should arise from the results of
staff. complete and educate the reader. Ex- the audit. It is vital that due dates are
plain and defend all the recommenda- attached to each action item in order to
Report Structure tions and claims with the evidence ensure that necessary changes are
gathered during the audit. If there made swiftly, and before the company
The level of technical detail should have been previous audits, then com- falls prey to one of the security prob-
increase as the report goes on. Most pare/contrast this audit with the pre- lems identified.
high-level staff such as directors dont vious audit. You need to break any
need to know the technical details, so problems into smaller pieces, provid-
having everything they need to know ing details of what was looked at and PCNA
in the first quarter of the report is im- why it was reviewed. If in previous
portant, and it is essential to present audits problems were found, you
this information in clear, non-technical should detail whether the problems
language. were fixed and whether the policy was
changed to reflect the problems. If pre-
vious problems were not fixed, why Copyright ITP, 2000
Commercial Tools not? Were any new problems found,
and what were they?
CyberCop Security Scanner When breaking problems into
Network Associates Inc smaller pieces, look for key elements The Author
www.nai.com such as host-level security and security
architecture. Next discuss the scope of Justin Kapp (justin.kapp@itp-
Internet Scanner journals.com) is a consultant for
System Scanner the section, the importance of this sec-
tion to the audited systems, what tools Reaper Technologies, an IT secu-
Internet Security Systems Inc rity consultancy. He specialises in
www.iss.net and methods were used, and what was
discovered as a result. cryptography and Windows plat-
Tripwire The final conclusions and detailed form security, and is the original
Tripwire Security Systems Inc recommendations section unifies the author of the RSAEuro Crypto-
www.tripwiresecurity.com executive summary and body into a graphic Library.

File: T04123.6 PC Network Advisor Issue 120 (July 2000) Page 8


www.itp-journals.com
New Reviews from Tech Support Alert

Anti-Trojan Software Reviews


A detailed review of six of the best anti trojan software programs. Two products
were impressive with a clear gap between these and other contenders in their
ability to detect and remove dangerous modern trojans.

Inkjet Printer Cartridge Suppliers


Everyone gets inundated by hundreds of ads for inkjet printer cartridges, all
claiming to be the cheapest or best. But which vendor do you believe? Our
editors decided to put them to the test by anonymously buying printer cartridges
and testing them in our office inkjet printers. Many suppliers disappointed but we
came up with several web sites that offer good quality cheap inkjet cartridges
with impressive customer service.

Windows Backup Software


In this review we looked at 18 different backup software products for home or
SOHO use. In the end we could only recommend six though only two were good
enough to get our Editors Choice award

The 46 Best Freeware Programs


There are many free utilities that perform as well or better than expensive
commercial products. Our Editor Ian Richards picks out his selection of the very
best freeware programs and he comes up with some real gems.

Tech Support Alert


http://www.techsupportalert.com

Potrebbero piacerti anche