Minacce informatiche il sistema operativo come
Transcript
Minacce informatiche il sistema operativo come
Minacce Informatiche Il Sistema Operativo come prima linea di difesa Attenti a quei due… Luca Bechelli Freelance Security Consultant Dario Brambilla Senior Premier Field Engineer Apple User Microsoft padawan Past: Linux, Windows, other *nix Past: real life The best operating system ever… http://www.thetoptens.com/ # OS 1 Windows 7 2 Windows 8 3 Ubuntu 4 Windows 8.1 5 Windows XP Pro 6 Linux Mint 7 Mac OS X 8 Android 9 Windows XP 10 Fedora Perché ne parliamo… Defacement 0,4% DDoS Malware 1,4% 98,2% Dati Fastweb – Rapporto Clusiti 2016 Copyright(C) Luca Bechelli - tutti i diritti riservati – Roma Novembre 2015 4 Perché ne parliamo… Nuovi malware individuati durante il periodo della manifestazione 4000 3463 3500 3000 2500 2000 1685 1408 1500 1000 698 397 500 150 35 0 APR-15 MAG-15 Dati Cisco– Rapporto Clusiti 2016 GIU -15 394 244 L U G - 15 AGO-15 S E T - 15 OTT-15 N O V - 15 D I C - 15 Perché ne parliamo… Sistemi Operativi rilevati durante il periodo della manifestazione: Dati Cisco– Rapporto Clusiti 2016 Perché ne parliamo Livello di allarme rispetto a diverse tipologie di incidente Dati IDC– Rapporto Clusiti 2016 Perché ne parliamo… Maggiori rischi rilevati presso le aziende 100% 90% 80% 70% 60% 50% 40% 30% 20% 10% 0% Dati Microsoft– Rapporto Clusiti 2016 100% 100% 90% 90% 90% 90% 80% 80% 80% 60% 50% 30% 20% David McCandless at InformationIsBeautiful.net Complessità Leggende metropolitane E’ più sicuro Ci pensa l’app store Cifra i dati Non ci sono virus Basta aggiornare l’antivirus Leggende metropolitane Ma… Windows e Android sono i maggiori bersagli del malware Per qualche settimana ancora si può convivere su OSX / Linux senza antivirus Su IOS l’antivirus non è neppure possibile installarlo (!?) E’ una questione di Modello di Sicurezza Common mistakes “Any piece of malware is one password or vulnerability away from taking full control of the device”(wwdc15 – session 706) I meccanismi che garantivano la sicurezza “ieri”, sono il "minimo” di oggi I cattivi sanno quali porte garantiscono maggiori possibilità di accesso Le password saranno sempre deboli Gli utenti faranno sempre click Le porte che non devono essere aperte hanno una maniglia Tutti i file sono uguali, i criteri di protezione anche Per accedere a dati e funzionalità critiche, non è (sempre) necessario passare dal kernel (es: man-in-the-browser) Sappiamo cosa manca, cosa serve, ma… I dati da proteggere sono frammentati Gli utenti sono bersagliati da malware e phishing Il 99% delle applicazioni devono funzionare in un certo modo, ad esempio: u u u u u u Dovrebbero comunicare con alcuni siti e non altri Non dovrebbero scrivere o leggere in determinate location (e se sì, lo si dovrebbe sapere…) Dovrebbero essere autentiche Non dovrebbero modificare delle impostazioni di sistema, in particolare di sicurezza Dovrebbero utilizzare meccanismi di sicurezza verificati o verificabili Non dovrebbero gestire, scrivere, leggere, conoscere autonomamente password u Non dovrebbero usare dati sensibili dell’utente u Dovrebbero usare protocolli sicuri Sappiamo cosa manca, cosa serve, ma… L’awareness non è sufficiente e… … gli end-user non saranno mai Amministratori di Sistema …le notifiche di sicurezza e le richieste di permessi non sono alla portata di tutti Sappiamo cosa manca, cosa serve, ma… Il PC di un end user è un’estensione del web (non il contrario). Ma i modelli di sicurezza che arrivano dal web offrono talvolta protezioni più sicure per password, informazioni personali, etc… Il browser è la “porta di casa”, non un pilastro della casa Si può fare facilmente anche quello che non serve … e ci sono cose che alla fine è meglio non consentire di fare (by default) Sappiamo cosa manca, cosa serve, ma… Non tutte le funzionalità sono uguali. Alcune sono “in presence”, la maggior parte Mancano ancora i “trusted path”. Ad esempio, non tutti i programmi devono installare software o modificare configurazioni del sistema Le funzionalità di sicurezza sono utili se isolate le une dalle altre E poi… TPM, Disk Encryption, Code Signature, TLS, MdM, Antivirus, IPS, Event Management, …. non sono più roba per pochi La retro-compatibilità non può essere una caratteristica, è una funzionalità da gestire, solo a chi serve, per quello che serve Windows Security Features Key Threats Key Threats Key Threats Key Threats Key Threats Key Threats • • • • • • • • • • • • Melissa (1999), Love Letter (2000) Mainly leveraging social engineering • • • • Code Red and Nimda (2001), Blaster (2003), Slammer (2003) 9/11 Mainly exploiting buffer overflows Script kiddies Time from patch to exploit: Several days to weeks • • • • • Zotob (2005) Attacks «moving up the stack» (Summer of Office 0-day) Rootkits Exploitation of Buffer Overflows Script Kiddies Rise of Phishing User running as Admin Organized Crime Botnets Identity Theft Conficker (2008) Time from patch to exploit: days • • • • • • • 2001 2004 2007 2009 Organized Crime, potential state actors Sophisticated targeted attacks Aurora (2009) and Stuxnet (2010) Password and digital identity theft and misuse Signatures based AV unable to keep up Digital signature tampering Browser plug-in exploits Data loss on BYOD device • • • • • 2012 Nation states active attacking private institutions CryptoLocker (2013) and APT’s at scale Adding disruption and terror to playbook Rampant Passwords theft and abuse Pass the Hash becomes part of the default playbook AV unable to keep up 2015 Windows XP Windows XP SP2 Windows Vista Windows 7 Windows 8 Windows 10 • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • Logon (Ctrl+Alt+Del) Access Control User Profiles Security Policy Encrypting File System (File Based) Smartcard and PKI Support Windows Update • • • • • • Address Space Layout Randomization (ASLR) Data Execution Prevention (DEP) Security Development Lifecycle (SDL) Auto Update on by Default Firewall on by Default Windows Security Center WPA Support • • • • • • Bitlocker Improved ASLR and DEP Full SDL User Account Control Internet Explorer Smart Screen Filter Digital Right Management Firewall improvements Signed Device Driver Requirements TPM Support Windows Integrity Levels Secure “by default” configuration (Windows features and IE) • • • • • Improved ASLR and DEP Full SDL Improved IPSec stack Managed Service Accounts Improved User Account Control Enhanced Auditing Internet Explorer Smart Screen Filter AppLocker BitLocker to Go Windows Biometric Service Windows Action Center Windows Defender • • • • • • • • • • • • • Firmware Based TPM UEFI (Secure Boot) Trusted Boot (w/ELAM) Measured Boot Significant Improvements to ASLR and DEP AppContainer Internet Explorer 10 (Plugin-less and Enhanced Protected Modes) Application Reputation moved into Core OS Device Encryption (All SKU) BitLocker improvements and MBAM Virtual Smartcards Dynamic Access Control Built-in AV (Windows Defender) Improved Biometrics TPM Key Protection and Attestation Certificate Reputation Provable PC Health Remote Business Data Removable • • • • • • • • • Virtual Secure Mode Virtual TPM Control Flow Guard Microsoft Passport Windows Hello Biometric Framework Improvements (Iris, Facial) Broad OEM support for Biometric enabled devices Enterprise Data Protection Device Encryption supported on broader range of devices DMA Attack Mitigations Device Guard URL Reputation Improvements App Reputation Improvements Windows Defender Improvements Provable PC Health Improvements Security Strategy ü Secure Boot Virtual Secure Mode Device Guard Code Integrity Applocker Device Health Attestation Windows Defender Windows Firewall ü Windows Update for Business ü ü ü ü ü ü ü Hardware - UEFI Ø Ø Ø Ø Ø Ø UEFI (Unified Extensible Firmware Interface) is a standard firmware interface for PCs, designed to replace BIOS (basic input/output system). This standard was created by over 140 technology companies as part of the UEFI consortium, including Microsoft. It's designed to improve software interoperability and address limitations of BIOS. Some advantages of UEFI firmware include: Better security by helping to protect the pre-startup—or pre-boot—process against bootkit attacks. Faster startup times and resuming from hibernation. Support for drives larger than 2.2 terabytes (TB). Support for modern, 64-bit firmware device drivers that the system can use to address more than 17.2 billion gigabytes (GB) of memory during startup. Capabililty to use BIOS with UEFI hardware. Hardware – UEFI - Revisions 2.0 2.1 2.2 2.3.1 2.4 2.5 2.6 January, 2006 January, 2007 November, 2010 April, 2011 June, 2013 April, 2015 January, 2016 Hardware - TPM Trusted Platform Module offers facilities for the secure generation of cryptographic keys, and limitation of their use, in addition to a random number generator. Does not rely on the operating system and is not exposed to vulnerabilities that might exist in the operating system or application software TPM has special physical security: Ø Active shield Ø Ø Ø Ø Ø Over/under voltage detection Low/high frequency sensor Reset filter Memory encryption Tamper-detection and response circuits Hardware – TPM - Revisions 1.2 62 85 October, 2003 February, 2005 103 ISO/IEC 11889-1:2009 July, 2007 May, 2009 116 March, 2011 2.0 96 99 1.07 1.16 ISO/IEC 11889:2015 March, 2013 October, 2013 March, 2014 October, 2014 December, 2015 TPM 2.0 Compliance for Windows 10 in the future All shipping devices for Windows 10 across all SKU types must be using TPM 2.0 discrete or firmware from July 28, 2016. This requirement will be enforced through our Windows Hardware Certification program. Windows 10 for desktop editions (Home, Pro, Enterprise, and Education) Ø With Windows 10 as with Windows 8, all connected standby systems are required to include TPM 2.0 support. Ø For Windows 10 and later, if a SoC is chosen that includes an integrated fTPM2.0, the device must ship with the fTPM FW support or a discrete TPM 1.2 or 2.0. Ø Starting July 28th, 2016 all devices shipping with Windows 10 desktop must implement TPM 2.0 and ship with the TPM enabled. Windows 10 Mobile Ø All devices shipping with Windows 10 Mobile must implement TPM 2.0 and ship with the TPM enabled. IoT Core Ø TPM is optional on IoT Core. Windows Server 2016 Technical Preview Ø TPM is optional for Windows Server SKUs unless the SKU meets the additional qualification (AQ) criteria for the Host Guardian Services scenario in which case TPM 2.0 is required Secure Boot Layer of security on top of UEFI Ø UEFI verifies the boot loader Ø Can be configured to only load verified files Ø Required for Windows 8 hardware certification Virtualization Based Security features VirtualTPM LocalSecurity AuthService Apps Kernel Kernel(+HVCI) Windows VirtualSecureMode(VSM) Hypervisor Hardware Device Guard Workflow Device Guard Platform Secure Boot VBS - HVCI UEFI Secure Boot Definitions: UEFI = Unified Extensible Firmware Interface VBS = Virtualization based Security HVCI = Hypervisor based Code Integrity KMCI = Kernel-mode Code Integrity UMCI = User-mode Code Integrity KMCI UMCI App Locker ELAM = Early Launch Anti-Malware Microsoft Confidential | Shared under NDA Applocker • • • • • An application control solution which prevents execution of unwanted and/or unknown applications (and scripts, installers) Allows IT administrators to specify exactly what users are allowed to run in the desktop environment AppLocker provides security protection and operational & compliance benefits AppLocker can enforce application standardisation AppLocker can be one component of an organisation’s overall security strategy Device Health Attestation: WindowsCloudAttestation &Intune Attestation Request MDMs TO GATE ACCESS BASED ON DEVICE INTEGRITY AND HEALTH Attestation Response 3 4 Importantresources 1 AuthenticatedAccessRequest 2 ProveyouareHealthy 5 Hereistheproof Windows Defender Windows Persisted ANTIMALWARE Antimalware Behavior Dynamic Vulnerability Monitoring Translation Shielding Defender Offline Store PLATFORM MVI AMSI Internet Explorer IExtension Validation (IEV) Smart UAC Secure Events OS Hardening Early Launch Antimalware (ELAM) Available only in Windows 10 (or full functionality only in Windows 10) Shields Up Device Guard AppLocker MVI – Microsoft Virus Initiative AMSI – Antimalware Scan Interface UAC – User Account Control ETW – Event Tracing for Windows Security Strategy ü ü ü Credential Guard Microsoft Password Windows Hello Credential Guard Architecture High Level OS (HLOS) VSM LSASS LSAIso NTLMsupport Clear secrets Kerberos Kerberossupport Boot Hypervisor NTLM Persistent IUMsecrets Microsoft Passport Microsoft Passport Anewapproach 1 Userprovesidentity 2 “Trustmyuniquekey” IDP ActiveDirectory Azure AD Google Facebook Microsoft Account Intranet resources 4 “Wetrust tokensfromIDP" Windows10 3 “Hereisyour authenticationtoken” Introducing Windows PIN Simplestimplementationoption Worksonexistingdevices Userfamiliarity Biometrics Enablesmulti-factor Easeofuse Impossibletoforget Accessing credentials MicrosoftPassport Your credential fornetworks, sites, andservices WindowsHello Unlocks your device with biometrics andgives access toyour “Microsoft Passport” Security Strategy ü ü ü ü Bitlocker Right Management Services Conditional Access Enterprise Data Protection Bitlocker Ø Ø Ø Ø Ø BitLocker Drive Encryption (BDE) is a data protection feature that provides encryption for entire volumes By default, BitLocker is using Advanced Encryption Standard (cipher block chaining—CBC) with a 128-bit key (Windows10addsupportXTS-AES encryption algorithm) BitLocker is meant to prevent offline attacks (lost, stolen laptop) Not meant to protect from online attacks (can be combined with Encrypting File System (EFS)) 256bit Integrity checking of early boot components SizecontrolledbyGPO: 128bit/256bit FVEK VMK 2048bitRSA OperatingSystem Volume BootVolume SRK Microsoft Rights Management Authentication and collaboration Client integration User Authentication Integration Client integration BYO Key Enterprise Data Protection Ø Provides user-friendly data separation and containment (corporate device vs. personal device) Ø Enables data protection wherever the data is located Ø Ensures only trusted apps can access your data Corporate network Virtualization Based Security features Windows Security Features Virtualization extensions (Intel VT-X, AMD-v) Second Level Address Translation IOMMU (Intel VT-d, AMD-V) Funzionalità Home TPM Support Secure Boot Device Guard X Pro Enterprise X X X X X Note Credential Guard X Require UEFI 2.3.1; Intel VT-x, AMD-V; SLAT (Intel VT-x EPT, AMD-NPT); x64; IOMMU (Intel VT-d, AMD-V); TPM 1.2 or 2.0 optional; BIOS Lockdown Require UEFI 2.3.1; Intel VT-x, AMD-V; SLAT (Intel VT-x EPT, AMD-NPTI); x64; IOMMU (Intel VT-d, AMD-V); BIOS Lockdown; Requires TPM 2.0 (TH2 will allow TPM 1.2 for testing and verification but no attestation is possible. Microsoft strongly recommend 2.0 for deploying Credential Guard.) Device Health Attestation Virtual Smartcard with key attestation Windows Defender Windows Firewall Windows Update Windows Update for Business Current Branch for Business Long Term Servicing Branch X X Require TPM 2.0 Require TPM 1.2 (TPM 2.0 recommended) Applocker Windows Hello Microsoft Password Bitlocker Righ Management Service Conditional Access Enterprise Data Protection X X X X X X X X X X X X X X X X X X X X X X X X X X X X X Require TPM 1.2 (TPM 2.0 recommended) KeyAttestation– TPM2.0 TokenBinding– TPM2.0 KeyEncryption(TPMGenerationofKeys)– TPM2.0 Require TPM 1.2; UEFI 2.3.1 Not available with the current build Link http://security.windows.com https://blogs.technet.microsoft.com/mniehaus/2016/03/1 0/documentation-updates-for-windows-10-1511/