Introduction to Linux Host Security
Objectives
After completing this presentation, you should be able to: Define the importance of IT security Describe some common threats to IT security Define a basic security architecture model List common security services List Linux mechanisms for host security List general guidelines for security policies
Why Protect Systems?
"Our losses from terrorism could be as high as $50 million. Our biggest risk is losing our customers' trust; we'd have to be born again with a new name to recover." A commercial bank executive
Defining Security
Reduction of risk
Protection against threats
Introduction to Security Architecture
Security Model
ISO 7498-02 Security Services
Identification and authentication Access control Confidentiality Data integrity Non-repudiation Security management including audit
Security Management Cycle
Implementing a Security Policy
As a system security administrator or implementer you:
Must understand how to evaluate a statement of security requirements Have a primary responsibility in managing the organization Are required to:
Translate information used in creating the security policy Implement the policy to ensure fair treatment to every user Understand general guidelines for goals and policies
Security Threats and Business Risks
Other Security Threats
System Mechanisms (1 of 2)
Hardware User Group Password System resource management
System Mechanisms (2 of 2)
File management Log management Printing Backup and restore Auditing System monitoring Problem reporting Intrusion detection
Linux Mechanisms
Services and mechanisms covered in this course include: User administration Configuring access control Monitoring access control System file integrity (including devices and key management files) Delegation of authority (sudo) Accountability (auditing mechanisms)
Linux Security Details
User authentication Login process Login tracking Administrative roles with sudo Groups Access control lists File and directory permissions Security-related files Auditing
Staying Current with Security
New security issues are discovered daily. If you do not stay up-to-date with security you will be vulnerable. What you don't know can hurt you and your organization. There are many security communities for both discussion and information on topics ranging from Linux-specific security to more general UNIX security to OS independent security topics. Mailing lists tend to be best for active discussion. Web sites are better for documentation and information. Know your vulnerabilities; those who would want to compromise your system certainly will. Constant education is simply part of the job of maintaining an effective security policy.
Linux Security Web Sites
http://www.cert.org/ http://www.securityfocus.com/ http://www.linuxsecurity.com/ http://lsap.org/ http://www.faqs.org/faqs/computer-security/
Linux Security Mailing Lists
http://online.securityfocus.com/archive http://www.redhat.com/mailing-lists/linuxsecurity/ http://www.suse.com/us/support/mailinglists/ http://lists.insecure.org/ http://www.linuxsecurity.com/general/mailing lists.html
Other Sources of Information
USENET newsgroups:
comp.os.linux.security comp.os.unix.security http://www.linux.org/groups/ http://www.redhat.com/apps/community/LUG/ http://lugww.counter.li.org/
Local Linux user group directories
What You Will Learn
Among the various mechanisms and facilities provided by Linux, we will cover the following topics: Installing Linux Identification and Authentication Access Control and Authorization Availability System Integrity Auditing Intrusion Management Application Security
What Comes Next?
TCP/IP network security Network services:
Secure shell and secure copy Socks proxy Standard proxies DNS E-mail VPN
Firewalls Network address translation
Checkpoint
1. What are some of the possible losses due to a compromised system? 2. What are the five main steps in the security management cycle? 3. What would you use to allow a trusted user to perform some specific system maintenance on a regular basis, instead of giving out the root password? 4. What are some of the possible threats to system security? 5. Once intruders have infiltrated a system, they may install a program that allows them to gain root privileges in a system.What is this type of program called?
Unit Summary
Having completed this unit, you should understand: The importance of security to your organization The types of threats to look out for Some basic security concepts and ideas The major security features of Linux