352
Chapter 9
■
Security Vulnerabilities, Threats, and Countermeasures
■
It’s essential to separate and isolate processes that run in user and supervisory modes
so that unauthorized and unwanted access to high-privilege processes and capabilities
is prevented.
■
Protection domains should be created so that compromise of a client won’t automati-
cally compromise an entire network.
■
Disks and other sensitive materials should be clearly labeled as to their security classi-
fication or organizational sensitivity; procedural processes and system controls should
combine to help protect sensitive materials from unwanted or unauthorized access.
■
Files on desktop machines should be backed up, as well as files on servers—ideally,
using some form of centralized backup utility that works with
client agent software to
identify and capture files from clients stored in a secure backup storage archive.
■
Desktop users need regular security awareness training to maintain proper security
awareness; they also need to be notified about potential threats and instructed on how
to deal with them appropriately.
■
Desktop computers and their storage media require protection against environmental
hazards (temperature, humidity, power loss/fluctuation, and so forth).
■
Desktop computers should be included in disaster recovery and business continuity
planning because they’re potentially as important as (if not more important than) other
systems and services within an organization for [or in] getting their users back to work
on other systems.
■
Developers of custom software built in and for distributed environments also need
to
take security into account, including using formal methods for development and
deployment, such as code libraries, change control mechanisms, configuration manage-
ment, and patch and update deployment.
In general, safeguarding distributed environments means understanding the vulnerabili-
ties to which they’re subject and applying appropriate safeguards. These can (and do) range
from technology solutions and controls to policies and procedures that manage risk and
seek to limit or avoid losses, damage,
unwanted disclosure, and so on.
A reasonable understanding of countermeasure principles is always important when
responding to vulnerabilities and threats. Some specific countermeasure principles are dis-
cussed in Chapter 2, “Personnel Security and Risk Management Concepts,” in the section
“Risk Management.” But a common general principle is that of defense in depth.
Defense
in depth
is a common security strategy used to provide a protective multilayer barrier
against various forms of attack. It’s reasonable to assume that there is greater difficulty in
passing bad traffic or data through a network heavily fortified by a firewall, an IDS, and a
diligent administration staff than one with a firewall alone. Why shouldn’t
you double up
your defenses? Defense in depth (aka
multilayered defense
and
diversity of defense
) is the
use of multiple types of access controls in literal or theoretical concentric circles. This form
of layered security helps an organization avoid a
monolithic security stance
. A monolithic
or
fortress mentality
is the belief that a single security mechanism is all that is required to
provide sufficient security. Unfortunately, every individual security mechanism has a flaw
Distributed Systems and Endpoint Security
353
or a workaround just waiting to be discovered and abused by a hacker. Only through the
intelligent combination of countermeasures is a defense constructed
that will resist signifi-
cant and persistent attempts of compromise.
Do'stlaringiz bilan baham: