SlideShare uma empresa Scribd logo
1 de 17
Application Explosion
  How to manage
  productivity vs. security




Mel Beckman           Chris Merritt       David Murray
     Senior              Director of      Senior Product
Technical Director   Solution Marketing      Manager
     Penton             Lumension          Lumension
Agenda

• Application vulnerabilities
• Key application control points
• Application identification trickiness
• Application control flow
• Microsoft’s default tools: SRP & AppLocker
• AppLocker limitations & gotchas
• Free application security controls
• Attributes of commercial application control
• The value of integration
Application Vulnerabilities
                   What Weʼre Up Against
1.   Undesired Applications            5.   Bloatware
      Social networking, VoIP,               Installed along with legitimate
      chat, shopping, games                  software, such as Adobe Reader
      Twitter, Skype, eBay, WoW              Adobe DL Mgr, Google Chrome

2.   Unauthorized Packages             6.   Ad/Spy/Scare/Zombieware
       Personal utilities, hacking           Apps users want that have
      tools, unlicensed software             ulterior motives
      iTunes, WireShark, PhotoShop           WeatherBug, SystemFix, Gator

3.   Liability Software                7.   Malware, Bots, and Trojans
      Peer-to-peer, copy cracking,           Malicious code out to steal
      network scanners                       contacts, data and identities
      Limelight, freeme2, nmap               Qhost, ZeuS, Trojan-BNK

4.   Resource Hogs                     8.   Rootkits and Back Doors
      Distributed computing, file            Programs that modify the OS
      sharing, streaming media               to permit future hacker re-entry
      seti@home, bittorrent, NetFlix         TDSS, StormWorm, Stuxnet
Key Application Control Points

 • Software installation
    - .msi, .msp, .zip
 • Binary program execution
    - .exe, .com
 • Scripts
    - .bat, .cmd, .jar, .js, .jse, .mdb, .pif, .ps1,
    .scr, .vb, .vbe, .vbs
 • DLL & ActiveX
    - .dll, .ocx
Key Application Control Points
     • Control approach: default permit or deny?
         - There are an infinite number of applications
            that you don’t want to authorized
         - Only a finite number of applications you do
     • Default deny is the only viable approach
         - Explicitly permit specific positively identified
            applications
         - Vulnerabilties are resilient** so it’s critical that you
            don’t let them in in the first place!
         - Anti-virus blacklists known threats, but AC rules
            primarily specify which applications are         permitted,
            they are collectively termed a whitelist
     • But there are exceptions
         - Privileged users (e.g., local admin)
         - Subdirectories
         - Trusted publishers
     **Secunia Yearly Report, February 14, 2012
     http://secunia.com/company/2011_yearly_report
Application Identification Trickiness
• How to reliably identify an application?
   - Name? File Size? Path? Contents? Source?
   - What about changes: patches (good),
   hacking (bad)
• Known application identification methods
   - Path (including name)
   - Hash (numeric signature of contents)
   - Publisher (via digital signing)
   - Source (during installation)
   - Registry paths
   - A combination of the above
• A single application can exist within a user
population in dozens of variations
Application Control Flow


             Whitelist




                         Application
Inventory    Audit
                           Control     Assess
                         Automation
                            Tools


             Enforce
Microsoft’s default tools:
SRP & AppLocker
 • Software Restriction Policies (SRP)
    - Windows XP, Windows 2003, Windows 2008, Vista,
       and Windows 7 below Ultimate
    - Implemented via Group Policy Objects (GPO)
       and registry path restrictions
    - Simple rule structure
 • AppLocker
    - Window 7 Ultimate & Enterprise only
    - Also uses GPO
    - Built into Windows 7 kernel
    - Extended rule structure (e.g., exceptions)
       (but no registry path restrictions)
    - Whitelist wizards (default and analysis)
 • SRP & AppLocker are mutually exclusive
   (when AppLocker rules exist, they supercede SRP)
AppLocker Control Flow
AppLocker Limitations
 • Capability limitations
    - Supports only Win7 Ultimate & Enterprise
    - Computer-based, rather than user-based
 • Security limitations
    - Local admin can circumvent (e.g., stopping appld srv)
    - Scripts vulnerable to exploitation
 • Reliability limitations
    - Application updates break rules
 • Usability limitations
    - Generated whitelists are large and complex
    - Default rules too permissive
    - DLL filtering impacts performance
    - Event logs exist only on local machine
       (LogsMicrosoftWindowsAppLocker)
    - Limited reporting
AppLocker Gotchas
 • Can inadvertently lock user out of Windows
 • DLL filtering can break applications in mysterious
    ways (ergo, it’s off by default)
 • WindowsInstaller objects can execute even when
    unsigned
 • WindowsTemp is world write-able, world-
   executable
 • Inadvertently grant permissions by crea5ng an
    excep5on to a Deny rule
 • LOAD_IGNORE_CODE_AUTHZ_LEVEL          exploit
    - http://tinyurl.com/LOAD-IGNORE
 • SANDBOX_INERT exploit
    - http://tinyurl.com/SANDBOX-INERT
Free Application Security Controls

• Open source and free tools
     - Ad Hoc blocking of installed apps
     - Application inventory
        • OCS Inventory NG (ocsinventory.sourceforge.net)
        • CFEngine Nova (cfengine.com)
        • Open PC Server Integration (opsi.org)
        • Uranos (uranos.sourceforge.net)
• Example: Windows Application Blocker
   (    http://tinyurl.com/winappblocker )
     - Per-application password lock
     - Must be manually configured
     - No central administration
Free Application Security Controls




 • Uranos open source: software inventory only
 • No application control capability
Attributes of Commercial App Control
 • Full Windows spectrum:
    - XP, Vista, 2003, 2008, all Win7 editions
 • Cohesive whitelist generation
    - Driven by site-wide application discovery
    - Automatically optimize rules
 • Flexible whilelist policy structure
    - Multiple filter types
    - User-based policies for consistent desktop and laptop
       enforcement
    - Extend coverage to local admin user
 • Ability to approve trusted patches and identify
    patched applications
 • Situational awareness
    - Centralized event monitoring
    - Comprehensive reporting
The Value of Integration
 • Application control is an
    endpoint problem
 • Other endpoint problems
    - Network Access Control (NAC)
    - Antivirus remediation
    - Patch management
 • Integrated endpoint tools have frameworks that:
    - Deliver a consistent, cohesive user interface
    - Consolidate client enumeration and agent tracking
    - Provide a centralized database for objects and events
    - Streamline auditing and reporting
 • Integrated tools deliver better overall protection
    - Event correlation provides early warning of trouble
    - Situational awareness provides defense in depth
The story so far...
 • Bad application are a prime source of endpoint
    vulnerabilities in the enterprise
 • Applications must be controlled at installation, and
    then by positive identification
 • Applications come in many forms and change
    frequently, making them hard to identify reliably
 • Application control has a procedural flow
 • Microsoft’s SRP & AppLocker don’t do the job
 • Free security tools are not enterprise-grade
 • Select commercial tools based on key features
 • Integrated endpoint security tool sets ultimately
    deliver more capability and are easier to administer
More Information

•Overview of Lumension® Intelligent Whitelisting™
     » http://www.lumension.com/Resources/Demo-Center/Overview-Endpoint-
       Protection.aspx


•Application Scanner Tool
     » http://www.lumension.com/Resources/Security-Tools/Application-Scanner-Tool-2-
       0.aspx


•Whitepapers
     » Think Your Anti-Virus Software is Working? Think Again.
         • http://www.lumension.com/Resources/WhitePapers/Think-Your-AntiVirus-
           Software-Is-Working-Think-Again.aspx
     » Intelligent Whitelisting: An Introduction to More Effective and Efficient Security
         • http://www.lumension.com/Resources/Whitepapers/Intelligent-Whitelisting-An-
           Introduction-to-More-Effective-and-Efficient-Endpoint-Security.aspx


17

Mais conteúdo relacionado

Mais procurados

WTF is Penetration Testing
WTF is Penetration TestingWTF is Penetration Testing
WTF is Penetration Testing
NetSPI
 
OWASP Khartoum - Top 10 A6 - 8th meeting - Security Misconfiguration
OWASP Khartoum - Top 10 A6 - 8th meeting - Security MisconfigurationOWASP Khartoum - Top 10 A6 - 8th meeting - Security Misconfiguration
OWASP Khartoum - Top 10 A6 - 8th meeting - Security Misconfiguration
OWASP Khartoum
 

Mais procurados (20)

Application Risk Prioritization - Overview - Secure360 2015 - Part 1 of 2
Application Risk Prioritization - Overview - Secure360 2015 - Part 1 of 2Application Risk Prioritization - Overview - Secure360 2015 - Part 1 of 2
Application Risk Prioritization - Overview - Secure360 2015 - Part 1 of 2
 
Penetration Testing vs. Vulnerability Scanning
Penetration Testing vs. Vulnerability ScanningPenetration Testing vs. Vulnerability Scanning
Penetration Testing vs. Vulnerability Scanning
 
WTF is Penetration Testing
WTF is Penetration TestingWTF is Penetration Testing
WTF is Penetration Testing
 
Security Testing for Web Application
Security Testing for Web ApplicationSecurity Testing for Web Application
Security Testing for Web Application
 
Vapt pci dss methodology ppt v1.0
Vapt pci dss methodology ppt v1.0Vapt pci dss methodology ppt v1.0
Vapt pci dss methodology ppt v1.0
 
Penetration testing dont just leave it to chance
Penetration testing dont just leave it to chancePenetration testing dont just leave it to chance
Penetration testing dont just leave it to chance
 
The Complete Web Application Security Testing Checklist
The Complete Web Application Security Testing ChecklistThe Complete Web Application Security Testing Checklist
The Complete Web Application Security Testing Checklist
 
Vulnerability assessment and penetration testing
Vulnerability assessment and penetration testingVulnerability assessment and penetration testing
Vulnerability assessment and penetration testing
 
Application Security-Understanding The Horizon
Application Security-Understanding The HorizonApplication Security-Understanding The Horizon
Application Security-Understanding The Horizon
 
Owasp security testing methodlogies –part2
Owasp security testing methodlogies –part2Owasp security testing methodlogies –part2
Owasp security testing methodlogies –part2
 
Mobile platform security models
Mobile platform security modelsMobile platform security models
Mobile platform security models
 
Introduction to security testing raj
Introduction to security testing rajIntroduction to security testing raj
Introduction to security testing raj
 
Security testing
Security testingSecurity testing
Security testing
 
Mobile Apps Security Testing -1
Mobile Apps Security Testing -1Mobile Apps Security Testing -1
Mobile Apps Security Testing -1
 
Develop, Test & Maintain Secure Systems (While Being PCI Compliant)
Develop, Test & Maintain Secure Systems (While Being PCI Compliant)Develop, Test & Maintain Secure Systems (While Being PCI Compliant)
Develop, Test & Maintain Secure Systems (While Being PCI Compliant)
 
Breaking Secure Mobile Applications - Hack In The Box 2014 KL
Breaking Secure Mobile Applications - Hack In The Box 2014 KLBreaking Secure Mobile Applications - Hack In The Box 2014 KL
Breaking Secure Mobile Applications - Hack In The Box 2014 KL
 
Client-Side Penetration Testing Presentation
Client-Side Penetration Testing PresentationClient-Side Penetration Testing Presentation
Client-Side Penetration Testing Presentation
 
Vapt( vulnerabilty and penetration testing ) services
Vapt( vulnerabilty and penetration testing ) servicesVapt( vulnerabilty and penetration testing ) services
Vapt( vulnerabilty and penetration testing ) services
 
OWASP Khartoum - Top 10 A6 - 8th meeting - Security Misconfiguration
OWASP Khartoum - Top 10 A6 - 8th meeting - Security MisconfigurationOWASP Khartoum - Top 10 A6 - 8th meeting - Security Misconfiguration
OWASP Khartoum - Top 10 A6 - 8th meeting - Security Misconfiguration
 
penetration testing
penetration testingpenetration testing
penetration testing
 

Semelhante a Application Explosion How to Manage Productivity vs Security

Windows Phone 8 Security and Testing WP8 Apps
Windows Phone 8 Security and Testing WP8 AppsWindows Phone 8 Security and Testing WP8 Apps
Windows Phone 8 Security and Testing WP8 Apps
Jorge Orchilles
 
ch03Threat Modeling - Locking the Door to Vulnerabilities.ppt
ch03Threat Modeling - Locking the Door to Vulnerabilities.pptch03Threat Modeling - Locking the Door to Vulnerabilities.ppt
ch03Threat Modeling - Locking the Door to Vulnerabilities.ppt
gealehegn
 
CyberCrime in the Cloud and How to defend Yourself
CyberCrime in the Cloud and How to defend Yourself CyberCrime in the Cloud and How to defend Yourself
CyberCrime in the Cloud and How to defend Yourself
Alert Logic
 

Semelhante a Application Explosion How to Manage Productivity vs Security (20)

Windows Phone 8 Security and Testing WP8 Apps
Windows Phone 8 Security and Testing WP8 AppsWindows Phone 8 Security and Testing WP8 Apps
Windows Phone 8 Security and Testing WP8 Apps
 
Brief Tour about Android Security
Brief Tour about Android SecurityBrief Tour about Android Security
Brief Tour about Android Security
 
ch03Threat Modeling - Locking the Door to Vulnerabilities.ppt
ch03Threat Modeling - Locking the Door to Vulnerabilities.pptch03Threat Modeling - Locking the Door to Vulnerabilities.ppt
ch03Threat Modeling - Locking the Door to Vulnerabilities.ppt
 
Web App Security Presentation by Ryan Holland - 05-31-2017
Web App Security Presentation by Ryan Holland - 05-31-2017Web App Security Presentation by Ryan Holland - 05-31-2017
Web App Security Presentation by Ryan Holland - 05-31-2017
 
PCI and Vulnerability Assessments - What’s Missing
PCI and Vulnerability Assessments - What’s MissingPCI and Vulnerability Assessments - What’s Missing
PCI and Vulnerability Assessments - What’s Missing
 
NextGen Endpoint Security for Dummies
NextGen Endpoint Security for DummiesNextGen Endpoint Security for Dummies
NextGen Endpoint Security for Dummies
 
How to Test Security and Vulnerability of Your Android and iOS Apps
How to Test Security and Vulnerability of Your Android and iOS AppsHow to Test Security and Vulnerability of Your Android and iOS Apps
How to Test Security and Vulnerability of Your Android and iOS Apps
 
CNIT 128 Ch 4: Android
CNIT 128 Ch 4: AndroidCNIT 128 Ch 4: Android
CNIT 128 Ch 4: Android
 
Zero Trust And Best Practices for Securing Endpoint Apps on May 24th 2021
Zero Trust And Best Practices for Securing Endpoint Apps on May 24th 2021Zero Trust And Best Practices for Securing Endpoint Apps on May 24th 2021
Zero Trust And Best Practices for Securing Endpoint Apps on May 24th 2021
 
Is av dead or just missing in action - avar2016
Is av dead or just missing in action - avar2016Is av dead or just missing in action - avar2016
Is av dead or just missing in action - avar2016
 
Owasp Mobile Risk Series : M4 : Unintended Data Leakage
Owasp Mobile Risk Series : M4 : Unintended Data LeakageOwasp Mobile Risk Series : M4 : Unintended Data Leakage
Owasp Mobile Risk Series : M4 : Unintended Data Leakage
 
Practical White Hat Hacker Training - Vulnerability Detection
Practical White Hat Hacker Training - Vulnerability DetectionPractical White Hat Hacker Training - Vulnerability Detection
Practical White Hat Hacker Training - Vulnerability Detection
 
Is Antivirus (AV) Dead or Just Missing in Action
Is Antivirus (AV) Dead or Just Missing in Action Is Antivirus (AV) Dead or Just Missing in Action
Is Antivirus (AV) Dead or Just Missing in Action
 
CyberCrime in the Cloud and How to defend Yourself
CyberCrime in the Cloud and How to defend Yourself CyberCrime in the Cloud and How to defend Yourself
CyberCrime in the Cloud and How to defend Yourself
 
Threat_Modelling.pdf
Threat_Modelling.pdfThreat_Modelling.pdf
Threat_Modelling.pdf
 
Nomura UCCSC 2009
Nomura UCCSC 2009Nomura UCCSC 2009
Nomura UCCSC 2009
 
128-ch4.pptx
128-ch4.pptx128-ch4.pptx
128-ch4.pptx
 
Catch Me If You Can - Finding APTs in your network
Catch Me If You Can - Finding APTs in your networkCatch Me If You Can - Finding APTs in your network
Catch Me If You Can - Finding APTs in your network
 
Cyber-Security-Unit-4.pptx
Cyber-Security-Unit-4.pptxCyber-Security-Unit-4.pptx
Cyber-Security-Unit-4.pptx
 
Untitled 1
Untitled 1Untitled 1
Untitled 1
 

Mais de Lumension

Using SCCM 2012 r2 to Patch Linux, UNIX and Macs
Using SCCM 2012 r2 to Patch Linux, UNIX and MacsUsing SCCM 2012 r2 to Patch Linux, UNIX and Macs
Using SCCM 2012 r2 to Patch Linux, UNIX and Macs
Lumension
 
Using SCUP (System Center Updates Publisher) to Security Patch 3rd Party Apps...
Using SCUP (System Center Updates Publisher) to Security Patch 3rd Party Apps...Using SCUP (System Center Updates Publisher) to Security Patch 3rd Party Apps...
Using SCUP (System Center Updates Publisher) to Security Patch 3rd Party Apps...
Lumension
 
Careto: Unmasking a New Level in APT-ware
Careto: Unmasking a New Level in APT-ware Careto: Unmasking a New Level in APT-ware
Careto: Unmasking a New Level in APT-ware
Lumension
 
2014 Security Trends: SIEM, Endpoint Security, Data Loss, Mobile Devices and ...
2014 Security Trends: SIEM, Endpoint Security, Data Loss, Mobile Devices and ...2014 Security Trends: SIEM, Endpoint Security, Data Loss, Mobile Devices and ...
2014 Security Trends: SIEM, Endpoint Security, Data Loss, Mobile Devices and ...
Lumension
 
2014 Data Protection Maturity Survey: Results and Analysis
2014 Data Protection Maturity Survey: Results and Analysis2014 Data Protection Maturity Survey: Results and Analysis
2014 Data Protection Maturity Survey: Results and Analysis
Lumension
 
Windows XP is Coming to an End: How to Stay Secure Before You Migrate
Windows XP is Coming to an End: How to Stay Secure Before You MigrateWindows XP is Coming to an End: How to Stay Secure Before You Migrate
Windows XP is Coming to an End: How to Stay Secure Before You Migrate
Lumension
 
Adobe Hacked Again: What Does It Mean for You?
Adobe Hacked Again: What Does It Mean for You? Adobe Hacked Again: What Does It Mean for You?
Adobe Hacked Again: What Does It Mean for You?
Lumension
 
Real World Defense Strategies for Targeted Endpoint Threats
Real World Defense Strategies for Targeted Endpoint Threats Real World Defense Strategies for Targeted Endpoint Threats
Real World Defense Strategies for Targeted Endpoint Threats
Lumension
 
APTs: The State of Server Side Risk and Steps to Minimize Risk
APTs: The State of Server Side Risk and Steps to Minimize RiskAPTs: The State of Server Side Risk and Steps to Minimize Risk
APTs: The State of Server Side Risk and Steps to Minimize Risk
Lumension
 
2014 Ultimate Buyers Guide to Endpoint Security Solutions
2014 Ultimate Buyers Guide to Endpoint Security Solutions2014 Ultimate Buyers Guide to Endpoint Security Solutions
2014 Ultimate Buyers Guide to Endpoint Security Solutions
Lumension
 
Java Insecurity: How to Deal with the Constant Vulnerabilities
Java Insecurity: How to Deal with the Constant VulnerabilitiesJava Insecurity: How to Deal with the Constant Vulnerabilities
Java Insecurity: How to Deal with the Constant Vulnerabilities
Lumension
 

Mais de Lumension (20)

Using SCCM 2012 r2 to Patch Linux, UNIX and Macs
Using SCCM 2012 r2 to Patch Linux, UNIX and MacsUsing SCCM 2012 r2 to Patch Linux, UNIX and Macs
Using SCCM 2012 r2 to Patch Linux, UNIX and Macs
 
2015 Endpoint and Mobile Security Buyers Guide
2015 Endpoint and Mobile Security Buyers Guide2015 Endpoint and Mobile Security Buyers Guide
2015 Endpoint and Mobile Security Buyers Guide
 
Top 10 Things to Secure on iOS and Android to Protect Corporate Information
Top 10 Things to Secure on iOS and Android to Protect Corporate InformationTop 10 Things to Secure on iOS and Android to Protect Corporate Information
Top 10 Things to Secure on iOS and Android to Protect Corporate Information
 
2014 BYOD and Mobile Security Survey Preliminary Results
2014 BYOD and Mobile Security Survey Preliminary Results2014 BYOD and Mobile Security Survey Preliminary Results
2014 BYOD and Mobile Security Survey Preliminary Results
 
Using SCUP (System Center Updates Publisher) to Security Patch 3rd Party Apps...
Using SCUP (System Center Updates Publisher) to Security Patch 3rd Party Apps...Using SCUP (System Center Updates Publisher) to Security Patch 3rd Party Apps...
Using SCUP (System Center Updates Publisher) to Security Patch 3rd Party Apps...
 
Careto: Unmasking a New Level in APT-ware
Careto: Unmasking a New Level in APT-ware Careto: Unmasking a New Level in APT-ware
Careto: Unmasking a New Level in APT-ware
 
Securing Your Point of Sale Systems: Stopping Malware and Data Theft
Securing Your Point of Sale Systems: Stopping Malware and Data TheftSecuring Your Point of Sale Systems: Stopping Malware and Data Theft
Securing Your Point of Sale Systems: Stopping Malware and Data Theft
 
2014 Security Trends: SIEM, Endpoint Security, Data Loss, Mobile Devices and ...
2014 Security Trends: SIEM, Endpoint Security, Data Loss, Mobile Devices and ...2014 Security Trends: SIEM, Endpoint Security, Data Loss, Mobile Devices and ...
2014 Security Trends: SIEM, Endpoint Security, Data Loss, Mobile Devices and ...
 
2014 Data Protection Maturity Survey: Results and Analysis
2014 Data Protection Maturity Survey: Results and Analysis2014 Data Protection Maturity Survey: Results and Analysis
2014 Data Protection Maturity Survey: Results and Analysis
 
Greatest It Security Risks of 2014: 5th Annual State of Endpoint Risk
Greatest It Security Risks of 2014: 5th Annual State of Endpoint RiskGreatest It Security Risks of 2014: 5th Annual State of Endpoint Risk
Greatest It Security Risks of 2014: 5th Annual State of Endpoint Risk
 
Windows XP is Coming to an End: How to Stay Secure Before You Migrate
Windows XP is Coming to an End: How to Stay Secure Before You MigrateWindows XP is Coming to an End: How to Stay Secure Before You Migrate
Windows XP is Coming to an End: How to Stay Secure Before You Migrate
 
Adobe Hacked Again: What Does It Mean for You?
Adobe Hacked Again: What Does It Mean for You? Adobe Hacked Again: What Does It Mean for You?
Adobe Hacked Again: What Does It Mean for You?
 
Real World Defense Strategies for Targeted Endpoint Threats
Real World Defense Strategies for Targeted Endpoint Threats Real World Defense Strategies for Targeted Endpoint Threats
Real World Defense Strategies for Targeted Endpoint Threats
 
APTs: The State of Server Side Risk and Steps to Minimize Risk
APTs: The State of Server Side Risk and Steps to Minimize RiskAPTs: The State of Server Side Risk and Steps to Minimize Risk
APTs: The State of Server Side Risk and Steps to Minimize Risk
 
2014 Ultimate Buyers Guide to Endpoint Security Solutions
2014 Ultimate Buyers Guide to Endpoint Security Solutions2014 Ultimate Buyers Guide to Endpoint Security Solutions
2014 Ultimate Buyers Guide to Endpoint Security Solutions
 
Data Protection Rules are Changing: What Can You Do to Prepare?
Data Protection Rules are Changing: What Can You Do to Prepare?Data Protection Rules are Changing: What Can You Do to Prepare?
Data Protection Rules are Changing: What Can You Do to Prepare?
 
Java Insecurity: How to Deal with the Constant Vulnerabilities
Java Insecurity: How to Deal with the Constant VulnerabilitiesJava Insecurity: How to Deal with the Constant Vulnerabilities
Java Insecurity: How to Deal with the Constant Vulnerabilities
 
BYOD & Mobile Security: How to Respond to the Security Risks
BYOD & Mobile Security: How to Respond to the Security RisksBYOD & Mobile Security: How to Respond to the Security Risks
BYOD & Mobile Security: How to Respond to the Security Risks
 
3 Executive Strategies to Reduce Your IT Risk
3 Executive Strategies to Reduce Your IT Risk3 Executive Strategies to Reduce Your IT Risk
3 Executive Strategies to Reduce Your IT Risk
 
The Evolution of Advanced Persistent Threats_The Current Risks and Mitigation...
The Evolution of Advanced Persistent Threats_The Current Risks and Mitigation...The Evolution of Advanced Persistent Threats_The Current Risks and Mitigation...
The Evolution of Advanced Persistent Threats_The Current Risks and Mitigation...
 

Último

Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Último (20)

Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 

Application Explosion How to Manage Productivity vs Security

  • 1. Application Explosion How to manage productivity vs. security Mel Beckman Chris Merritt David Murray Senior Director of Senior Product Technical Director Solution Marketing Manager Penton Lumension Lumension
  • 2. Agenda • Application vulnerabilities • Key application control points • Application identification trickiness • Application control flow • Microsoft’s default tools: SRP & AppLocker • AppLocker limitations & gotchas • Free application security controls • Attributes of commercial application control • The value of integration
  • 3. Application Vulnerabilities What Weʼre Up Against 1. Undesired Applications 5. Bloatware Social networking, VoIP, Installed along with legitimate chat, shopping, games software, such as Adobe Reader Twitter, Skype, eBay, WoW Adobe DL Mgr, Google Chrome 2. Unauthorized Packages 6. Ad/Spy/Scare/Zombieware Personal utilities, hacking Apps users want that have tools, unlicensed software ulterior motives iTunes, WireShark, PhotoShop WeatherBug, SystemFix, Gator 3. Liability Software 7. Malware, Bots, and Trojans Peer-to-peer, copy cracking, Malicious code out to steal network scanners contacts, data and identities Limelight, freeme2, nmap Qhost, ZeuS, Trojan-BNK 4. Resource Hogs 8. Rootkits and Back Doors Distributed computing, file Programs that modify the OS sharing, streaming media to permit future hacker re-entry seti@home, bittorrent, NetFlix TDSS, StormWorm, Stuxnet
  • 4. Key Application Control Points • Software installation - .msi, .msp, .zip • Binary program execution - .exe, .com • Scripts - .bat, .cmd, .jar, .js, .jse, .mdb, .pif, .ps1, .scr, .vb, .vbe, .vbs • DLL & ActiveX - .dll, .ocx
  • 5. Key Application Control Points • Control approach: default permit or deny? - There are an infinite number of applications that you don’t want to authorized - Only a finite number of applications you do • Default deny is the only viable approach - Explicitly permit specific positively identified applications - Vulnerabilties are resilient** so it’s critical that you don’t let them in in the first place! - Anti-virus blacklists known threats, but AC rules primarily specify which applications are permitted, they are collectively termed a whitelist • But there are exceptions - Privileged users (e.g., local admin) - Subdirectories - Trusted publishers **Secunia Yearly Report, February 14, 2012 http://secunia.com/company/2011_yearly_report
  • 6. Application Identification Trickiness • How to reliably identify an application? - Name? File Size? Path? Contents? Source? - What about changes: patches (good), hacking (bad) • Known application identification methods - Path (including name) - Hash (numeric signature of contents) - Publisher (via digital signing) - Source (during installation) - Registry paths - A combination of the above • A single application can exist within a user population in dozens of variations
  • 7. Application Control Flow Whitelist Application Inventory Audit Control Assess Automation Tools Enforce
  • 8. Microsoft’s default tools: SRP & AppLocker • Software Restriction Policies (SRP) - Windows XP, Windows 2003, Windows 2008, Vista, and Windows 7 below Ultimate - Implemented via Group Policy Objects (GPO) and registry path restrictions - Simple rule structure • AppLocker - Window 7 Ultimate & Enterprise only - Also uses GPO - Built into Windows 7 kernel - Extended rule structure (e.g., exceptions) (but no registry path restrictions) - Whitelist wizards (default and analysis) • SRP & AppLocker are mutually exclusive (when AppLocker rules exist, they supercede SRP)
  • 10. AppLocker Limitations • Capability limitations - Supports only Win7 Ultimate & Enterprise - Computer-based, rather than user-based • Security limitations - Local admin can circumvent (e.g., stopping appld srv) - Scripts vulnerable to exploitation • Reliability limitations - Application updates break rules • Usability limitations - Generated whitelists are large and complex - Default rules too permissive - DLL filtering impacts performance - Event logs exist only on local machine (LogsMicrosoftWindowsAppLocker) - Limited reporting
  • 11. AppLocker Gotchas • Can inadvertently lock user out of Windows • DLL filtering can break applications in mysterious ways (ergo, it’s off by default) • WindowsInstaller objects can execute even when unsigned • WindowsTemp is world write-able, world- executable • Inadvertently grant permissions by crea5ng an excep5on to a Deny rule • LOAD_IGNORE_CODE_AUTHZ_LEVEL exploit - http://tinyurl.com/LOAD-IGNORE • SANDBOX_INERT exploit - http://tinyurl.com/SANDBOX-INERT
  • 12. Free Application Security Controls • Open source and free tools - Ad Hoc blocking of installed apps - Application inventory • OCS Inventory NG (ocsinventory.sourceforge.net) • CFEngine Nova (cfengine.com) • Open PC Server Integration (opsi.org) • Uranos (uranos.sourceforge.net) • Example: Windows Application Blocker ( http://tinyurl.com/winappblocker ) - Per-application password lock - Must be manually configured - No central administration
  • 13. Free Application Security Controls • Uranos open source: software inventory only • No application control capability
  • 14. Attributes of Commercial App Control • Full Windows spectrum: - XP, Vista, 2003, 2008, all Win7 editions • Cohesive whitelist generation - Driven by site-wide application discovery - Automatically optimize rules • Flexible whilelist policy structure - Multiple filter types - User-based policies for consistent desktop and laptop enforcement - Extend coverage to local admin user • Ability to approve trusted patches and identify patched applications • Situational awareness - Centralized event monitoring - Comprehensive reporting
  • 15. The Value of Integration • Application control is an endpoint problem • Other endpoint problems - Network Access Control (NAC) - Antivirus remediation - Patch management • Integrated endpoint tools have frameworks that: - Deliver a consistent, cohesive user interface - Consolidate client enumeration and agent tracking - Provide a centralized database for objects and events - Streamline auditing and reporting • Integrated tools deliver better overall protection - Event correlation provides early warning of trouble - Situational awareness provides defense in depth
  • 16. The story so far... • Bad application are a prime source of endpoint vulnerabilities in the enterprise • Applications must be controlled at installation, and then by positive identification • Applications come in many forms and change frequently, making them hard to identify reliably • Application control has a procedural flow • Microsoft’s SRP & AppLocker don’t do the job • Free security tools are not enterprise-grade • Select commercial tools based on key features • Integrated endpoint security tool sets ultimately deliver more capability and are easier to administer
  • 17. More Information •Overview of Lumension® Intelligent Whitelisting™ » http://www.lumension.com/Resources/Demo-Center/Overview-Endpoint- Protection.aspx •Application Scanner Tool » http://www.lumension.com/Resources/Security-Tools/Application-Scanner-Tool-2- 0.aspx •Whitepapers » Think Your Anti-Virus Software is Working? Think Again. • http://www.lumension.com/Resources/WhitePapers/Think-Your-AntiVirus- Software-Is-Working-Think-Again.aspx » Intelligent Whitelisting: An Introduction to More Effective and Efficient Security • http://www.lumension.com/Resources/Whitepapers/Intelligent-Whitelisting-An- Introduction-to-More-Effective-and-Efficient-Endpoint-Security.aspx 17