diff options
Diffstat (limited to 'doc/rfc/rfc1244.txt')
-rw-r--r-- | doc/rfc/rfc1244.txt | 5659 |
1 files changed, 5659 insertions, 0 deletions
diff --git a/doc/rfc/rfc1244.txt b/doc/rfc/rfc1244.txt new file mode 100644 index 0000000..0bd5be9 --- /dev/null +++ b/doc/rfc/rfc1244.txt @@ -0,0 +1,5659 @@ + + + + + + +Network Working Group P. Holbrook +Request for Comments: 1244 CICNet +FYI: 8 J. Reynolds + ISI + Editors + July 1991 + + + Site Security Handbook + +Status of this Memo + + This handbook is the product of the Site Security Policy Handbook + Working Group (SSPHWG), a combined effort of the Security Area and + User Services Area of the Internet Engineering Task Force (IETF). + This FYI RFC provides information for the Internet community. It + does not specify an Internet standard. Distribution of this memo is + unlimited. + +Contributing Authors + + The following are the authors of the Site Security Handbook. Without + their dedication, this handbook would not have been possible. + + Dave Curry (Purdue University), Sean Kirkpatrick (Unisys), Tom + Longstaff (LLNL), Greg Hollingsworth (Johns Hopkins University), + Jeffrey Carpenter (University of Pittsburgh), Barbara Fraser (CERT), + Fred Ostapik (SRI NISC), Allen Sturtevant (LLNL), Dan Long (BBN), Jim + Duncan (Pennsylvania State University), and Frank Byrum (DEC). + +Editors' Note + + This FYI RFC is a first attempt at providing Internet users guidance + on how to deal with security issues in the Internet. As such, this + document is necessarily incomplete. There are some clear shortfalls; + for example, this document focuses mostly on resources available in + the United States. In the spirit of the Internet's "Request for + Comments" series of notes, we encourage feedback from users of this + handbook. In particular, those who utilize this document to craft + their own policies and procedures. + + This handbook is meant to be a starting place for further research + and should be viewed as a useful resource, but not the final + authority. Different organizations and jurisdictions will have + different resources and rules. Talk to your local organizations, + consult an informed lawyer, or consult with local and national law + enforcement. These groups can help fill in the gaps that this + document cannot hope to cover. + + + +Site Security Policy Handbook Working Group [Page 1] + +RFC 1244 Site Security Handbook July 1991 + + + Finally, we intend for this FYI RFC to grow and evolve. Please send + comments and suggestions to: ssphwg@cert.sei.cmu.edu. + +Table of Contents + +1. Introduction..................................................... 3 +1.1 Purpose of this Work............................................ 3 +1.2 Audience........................................................ 3 +1.3 Definitions..................................................... 4 +1.4 Related Work.................................................... 4 +1.5 Scope........................................................... 4 +1.6 Why Do We Need Security Policies and Procedures?................ 5 +1.7 Basic Approach.................................................. 7 +1.8 Organization of this Document................................... 7 +2. Establishing Official Site Policy on Computer Security........... 9 +2.1 Brief Overview.................................................. 9 +2.2 Risk Assessment................................................. 10 +2.3 Policy Issues................................................... 13 +2.4 What Happens When the Policy Is Violated........................ 19 +2.5 Locking In or Out............................................... 21 +2.6 Interpreting the Policy......................................... 23 +2.7 Publicizing the Policy.......................................... 23 +3. Establishing Procedures to Prevent Security Problems............. 24 +3.1 Security Policy Defines What Needs to be Protected.............. 24 +3.2 Identifing Possible Problems.................................... 24 +3.3 Choose Controls to Protect Assets in a Cost-Effective Way....... 26 +3.4 Use Multiple Strategies to Protect Assets....................... 26 +3.5 Physical Security............................................... 27 +3.6 Procedures to Recognize Unauthorized Activity................... 27 +3.7 Define Actions to Take When Unauthorized Activity is Suspected.. 29 +3.8 Communicating Security Policy................................... 30 +3.9 Resources to Prevent Security Breaches.......................... 34 +4. Types of Security Procedures..................................... 56 +4.1 System Security Audits.......................................... 56 +4.2 Account Management Procedures................................... 57 +4.3 Password Management Procedures.................................. 57 +4.4 Configuration Management Procedures............................. 60 +5. Incident Handling................................................ 61 +5.1 Overview........................................................ 61 +5.2 Evaluation...................................................... 65 +5.3 Possible Types of Notification.................................. 67 +5.4 Response........................................................ 71 +5.5 Legal/Investigative............................................. 73 +5.6 Documentation Logs.............................................. 77 +6. Establishing Post-Incident Procedures............................ 78 +6.1 Overview........................................................ 78 +6.2 Removing Vulnerabilities........................................ 78 +6.3 Capturing Lessons Learned....................................... 80 + + + +Site Security Policy Handbook Working Group [Page 2] + +RFC 1244 Site Security Handbook July 1991 + + +6.4 Upgrading Policies and Procedures............................... 81 +7. References....................................................... 81 +8. Annotated Bibliography........................................... 83 +8.1 Computer Law.................................................... 84 +8.2 Computer Security............................................... 85 +8.3 Ethics.......................................................... 91 +8.4 The Internet Worm............................................... 93 +8.5 National Computer Security Center (NCSC)........................ 95 +8.6 Security Checklists............................................. 99 +8.7 Additional Publications......................................... 99 +9. Acknlowledgements................................................101 +10. Security Considerations.........................................101 +11. Authors' Addresses..............................................101 + +1. Introduction + +1.1 Purpose of this Work + + This handbook is a guide to setting computer security policies and + procedures for sites that have systems on the Internet. This guide + lists issues and factors that a site must consider when setting their + own policies. It makes some recommendations and gives discussions of + relevant areas. + + This guide is only a framework for setting security policies and + procedures. In order to have an effective set of policies and + procedures, a site will have to make many decisions, gain agreement, + and then communicate and implement the policies. + +1.2 Audience + + The audience for this work are system administrators and decision + makers (who are more traditionally called "administrators" or "middle + management") at sites. This document is not directed at programmers + or those trying to create secure programs or systems. The focus of + this document is on the policies and procedures that need to be in + place to support any technical security features that a site may be + implementing. + + The primary audience for this work are sites that are members of the + Internet community. However, this document should be useful to any + site that allows communication with other sites. As a general guide + to security policies, this document may also be useful to sites with + isolated systems. + + + + + + + +Site Security Policy Handbook Working Group [Page 3] + +RFC 1244 Site Security Handbook July 1991 + + +1.3 Definitions + + For the purposes of this guide, a "site" is any organization that + owns computers or network-related resources. These resources may + include host computers that users use, routers, terminal servers, + PC's or other devices that have access to the Internet. A site may + be a end user of Internet services or a service provider such as a + regional network. However, most of the focus of this guide is on + those end users of Internet services. + + We assume that the site has the ability to set policies and + procedures for itself with the concurrence and support from those who + actually own the resources. + + The "Internet" is those set of networks and machines that use the + TCP/IP protocol suite, connected through gateways, and sharing a + common name and address spaces [1]. + + The term "system administrator" is used to cover all those who are + responsible for the day-to-day operation of resources. This may be a + number of individuals or an organization. + + The term "decision maker" refers to those people at a site who set or + approve policy. These are often (but not always) the people who own + the resources. + +1.4 Related Work + + The IETF Security Policy Working Group (SPWG) is working on a set of + recommended security policy guidelines for the Internet [23]. These + guidelines may be adopted as policy by regional networks or owners of + other resources. This handbook should be a useful tool to help sites + implement those policies as desired or required. However, even + implementing the proposed policies isn't enough to secure a site. + The proposed Internet policies deal only with network access + security. It says nothing about how sites should deal with local + security issues. + +1.5 Scope + + This document covers issues about what a computer security policy + should contain, what kinds of procedures are need to enforce + security, and some recommendations about how to deal with the + problem. When developing a security policy, close attention should + be made not only on the security needs and requirements of the local + network, but also the security needs and requirements of the other + interconnected networks. + + + + +Site Security Policy Handbook Working Group [Page 4] + +RFC 1244 Site Security Handbook July 1991 + + + This is not a cookbook for computer security. Each site has + different needs; the security needs of a corporation might well be + different than the security needs of an academic institution. Any + security plan has to conform to the needs and culture of the site. + + This handbook does not cover details of how to do risk assessment, + contingency planning, or physical security. These things are + essential in setting and implementing effective security policy, but + this document leaves treatment of those issues to other documents. + We will try to provide some pointers in that direction. + + This document also doesn't talk about how to design or implement + secure systems or programs. + +1.6 Why Do We Need Security Policies and Procedures? + + For most sites, the interest in computer security is proportional to + the perception of risk and threats. + + The world of computers has changed dramatically over the past + twenty-five years. Twenty-five years ago, most computers were + centralized and managed by data centers. Computers were kept in + locked rooms and staffs of people made sure they were carefully + managed and physically secured. Links outside a site were unusual. + Computer security threats were rare, and were basically concerned + with insiders: authorized users misusing accounts, theft and + vandalism, and so forth. These threats were well understood and + dealt with using standard techniques: computers behind locked doors, + and accounting for all resources. + + Computing in the 1990's is radically different. Many systems are in + private offices and labs, often managed by individuals or persons + employed outside a computer center. Many systems are connected into + the Internet, and from there around the world: the United States, + Europe, Asia, and Australia are all connected together. + + Security threats are different today. The time honored advice says + "don't write your password down and put it in your desk" lest someone + find it. With world-wide Internet connections, someone could get + into your system from the other side of the world and steal your + password in the middle of the night when your building is locked up. + Viruses and worms can be passed from machine to machine. The + Internet allows the electronic equivalent of the thief who looks for + open windows and doors; now a person can check hundreds of machines + for vulnerabilities in a few hours. + + System administrators and decision makers have to understand the + security threats that exist, what the risk and cost of a problem + + + +Site Security Policy Handbook Working Group [Page 5] + +RFC 1244 Site Security Handbook July 1991 + + + would be, and what kind of action they want to take (if any) to + prevent and respond to security threats. + + As an illustration of some of the issues that need to be dealt with + in security problems, consider the following scenarios (thanks to + Russell Brand [2, BRAND] for these): + + - A system programmer gets a call reporting that a + major underground cracker newsletter is being + distributed from the administrative machine at his + center to five thousand sites in the US and + Western Europe. + + Eight weeks later, the authorities call to inform + you the information in one of these newsletters + was used to disable "911" in a major city for + five hours. + + - A user calls in to report that he can't login to his + account at 3 o'clock in the morning on a Saturday. The + system staffer can't login either. After rebooting to + single user mode, he finds that password file is empty. + By Monday morning, your staff determines that a number + of privileged file transfers took place between this + machine and a local university. + + Tuesday morning a copy of the deleted password file is + found on the university machine along with password + files for a dozen other machines. + + A week later you find that your system initialization + files had been altered in a hostile fashion. + + - You receive a call saying that a breakin to a government + lab occurred from one of your center's machines. You + are requested to provide accounting files to help + trackdown the attacker. + + A week later you are given a list of machines at your + site that have been broken into. + + - A reporter calls up asking about the breakin at your + center. You haven't heard of any such breakin. + + Three days later, you learn that there was a breakin. + The center director had his wife's name as a password. + + + + + +Site Security Policy Handbook Working Group [Page 6] + +RFC 1244 Site Security Handbook July 1991 + + + - A change in system binaries is detected. + + The day that it is corrected, they again are changed. + This repeats itself for some weeks. + + - If an intruder is found on your system, should you + leave the system open to monitor the situation or should + you close down the holes and open them up again later? + + - If an intruder is using your site, should you call law + enforcement? Who makes that decision? If law enforcement asks + you to leave your site open, who makes that decision? + + - What steps should be taken if another site calls you and says + they see activity coming from an account on your system? What + if the account is owned by a local manager? + +1.7 Basic Approach + + Setting security policies and procedures really means developing a + plan for how to deal with computer security. One way to approach + this task is suggested by Fites, et. al. [3, FITES]: + + - Look at what you are trying to protect. + - Look at what you need to protect it from. + - Determine how likely the threats are. + - Implement measures which will protect your assets in a + cost-effective manner. + - Review the process continuously, and improve things every time + a weakness is found. + + This handbook will concentrate mostly on the last two steps, but the + first three are critically important to making effective decisions + about security. One old truism in security is that the cost of + protecting yourself against a threat should be less than the cost + recovering if the threat were to strike you. Without reasonable + knowledge of what you are protecting and what the likely threats are, + following this rule could be difficult. + +1.8 Organization of this Document + + This document is organized into seven parts in addition to this + introduction. + + The basic form of each section is to discuss issues that a site might + want to consider in creating a computer security policy and setting + procedures to implement that policy. In some cases, possible options + are discussed along with the some of the ramifications of those + + + +Site Security Policy Handbook Working Group [Page 7] + +RFC 1244 Site Security Handbook July 1991 + + + choices. As far as possible, this document tries not to dictate the + choices a site should make, since these depend on local + circumstances. Some of the issues brought up may not apply to all + sites. Nonetheless, all sites should at least consider the issues + brought up here to ensure that they do not miss some important area. + + The overall flow of the document is to discuss policy issues followed + by the issues that come up in creating procedures to implement the + policies. + + Section 2 discusses setting official site policies for access to + computing resources. It also goes into the issue of what happens + when the policy is violated. The policies will drive the procedures + that need to be created, so decision makers will need to make choices + about policies before many of the procedural issues in following + sections can be dealt with. A key part of creating policies is doing + some kind of risk assessment to decide what really needs to be + protected and the level of resources that should be applied to + protect them. + + Once policies are in place, procedures to prevent future security + problems should be established. Section 3 defines and suggests + actions to take when unauthorized activity is suspected. Resources + to prevent secruity breaches are also discussed. + + Section 4 discusses types of procedures to prevent security problems. + Prevention is a key to security; as an example, the Computer + Emergency Response Team/Coordination Center (CERT/CC) at Carnegie- + Mellon University (CMU) estimates that 80% or more of the problems + they see have to do with poorly chosen passwords. + + Section 5 discusses incident handling: what kinds of issues does a + site face when someone violates the security policy. Many decisions + will have to made on the spot as the incident occurs, but many of the + options and issues can be discussed in advance. At very least, + responsibilities and methods of communication can be established + before an incident. Again, the choices here are influenced by the + policies discussed in section 2. + + Section 6 deals with what happens after a security violation has been + dealt with. Security planning is an on-going cycle; just after an + incident has occurred is an excellent opportunity to improve policies + and procedures. + + The rest of the document provides references and an annotated + bibliography. + + + + + +Site Security Policy Handbook Working Group [Page 8] + +RFC 1244 Site Security Handbook July 1991 + + +2. Establishing Official Site Policy on Computer Security + +2.1 Brief Overview + + 2.1.1 Organization Issues + + The goal in developing an official site policy on computer + security is to define the organization's expectations of proper + computer and network use and to define procedures to prevent and + respond to security incidents. In order to do this, aspects of + the particular organization must be considered. + + First, the goals and direction of the organization should be + considered. For example, a military base may have very different + security concerns from a those of a university. + + Second, the site security policy developed must conform to + existing policies, rules, regulations and laws that the + organization is subject to. Therefore it will be necessary to + identify these and take them into consideration while developing + the policy. + + Third, unless the local network is completely isolated and + standalone, it is necessary to consider security implications in a + more global context. The policy should address the issues when + local security problems develop as a result of a remote site as + well as when problems occur on remote systems as a result of a + local host or user. + + 2.1.2 Who Makes the Policy? + + Policy creation must be a joint effort by technical personnel, who + understand the full ramifications of the proposed policy and the + implementation of the policy, and by decision makers who have the + power to enforce the policy. A policy which is neither + implementable nor enforceable is useless. + + Since a computer security policy can affect everyone in an + organization, it is worth taking some care to make sure you have + the right level of authority in on the policy decisions. Though a + particular group (such as a campus information services group) may + have responsibility for enforcing a policy, an even higher group + may have to support and approve the policy. + + 2.1.3 Who is Involved? + + Establishing a site policy has the potential for involving every + computer user at the site in a variety of ways. Computer users + + + +Site Security Policy Handbook Working Group [Page 9] + +RFC 1244 Site Security Handbook July 1991 + + + may be responsible for personal password administration. Systems + managers are obligated to fix security holes and to oversee the + system. + + It is critical to get the right set of people involved at the + start of the process. There may already be groups concerned with + security who would consider a computer security policy to be their + area. Some of the types of groups that might be involved include + auditing/control, organizations that deal with physical security, + campus information systems groups, and so forth. Asking these + types of groups to "buy in" from the start can help facilitate the + acceptance of the policy. + + 2.1.4 Responsibilities + + A key element of a computer security policy is making sure + everyone knows their own responsibility for maintaining security. + A computer security policy cannot anticipate all possibilities; + however, it can ensure that each kind of problem does have someone + assigned to deal with it. + + There may be levels of responsibility associated with a policy on + computer security. At one level, each user of a computing + resource may have a responsibility to protect his account. A user + who allows his account to be compromised increases the chances of + compromising other accounts or resources. + + System managers may form another responsibility level: they must + help to ensure the security of the computer system. Network + managers may reside at yet another level. + +2.2 Risk Assessment + + 2.2.1 General Discussion + + One of the most important reasons for creating a computer security + policy is to ensure that efforts spent on security yield cost + effective benefits. Although this may seem obvious, it is + possible to be mislead about where the effort is needed. As an + example, there is a great deal of publicity about intruders on + computers systems; yet most surveys of computer security show that + for most organizations, the actual loss from "insiders" is much + greater. + + Risk analysis involves determining what you need to protect, what + you need to protect it from, and how to protect it. Is is the + process of examining all of your risks, and ranking those risks by + level of severity. This process involves making cost-effective + + + +Site Security Policy Handbook Working Group [Page 10] + +RFC 1244 Site Security Handbook July 1991 + + + decisions on what you want to protect. The old security adage + says that you should not spend more to protect something than it + is actually worth. + + A full treatment of risk analysis is outside the scope of this + document. [3, FITES] and [16, PFLEEGER] provide introductions to + this topic. However, there are two elements of a risk analysis + that will be briefly covered in the next two sections: + + 1. Identifying the assets + 2. Identifying the threats + + For each asset, the basic goals of security are availability, + confidentiality, and integrity. Each threat should be examined + with an eye to how the threat could affect these areas. + + 2.2.2 Identifying the Assets + + One step in a risk analysis is to identify all the things that + need to be protected. Some things are obvious, like all the + various pieces of hardware, but some are overlooked, such as the + people who actually use the systems. The essential point is to + list all things that could be affected by a security problem. + + One list of categories is suggested by Pfleeger [16, PFLEEGER, + page 459]; this list is adapted from that source: + + 1. Hardware: cpus, boards, keyboards, terminals, + workstations, personal computers, printers, disk + drives, communication lines, terminal servers, routers. + + 2. Software: source programs, object programs, + utilities, diagnostic programs, operating systems, + communication programs. + + 3. Data: during execution, stored on-line, archived off-line, + backups, audit logs, databases, in transit over + communication media. + + 4. People: users, people needed to run systems. + + 5. Documentation: on programs, hardware, systems, local + administrative procedures. + + 6. Supplies: paper, forms, ribbons, magnetic media. + + + + + + +Site Security Policy Handbook Working Group [Page 11] + +RFC 1244 Site Security Handbook July 1991 + + + 2.2.3 Identifying the Threats + + Once the assets requiring protection are identified, it is + necessary to identify threats to those assests. The threats can + then be examined to determine what potential for loss exists. It + helps to consider from what threats you are trying to protect your + assets. + + The following sections describe a few of the possible threats. + + 2.2.3.1 Unauthorized Access + + A common threat that concerns many sites is unauthorized access + to computing facilities. Unauthorized access takes many forms. + One means of unauthorized access is the use of another user's + account to gain access to a system. The use of any computer + resource without prior permission may be considered + unauthorized access to computing facilities. + + The seriousness of an unauthorized access will vary from site + to site. For some sites, the mere act of granting access to an + unauthorized user may cause irreparable harm by negative media + coverage. For other sites, an unauthorized access opens the + door to other security threats. In addition, some sites may be + more frequent targets than others; hence the risk from + unauthorized access will vary from site to site. The Computer + Emergency Response Team (CERT - see section 3.9.7.3.1) has + observed that well-known universities, government sites, and + military sites seem to attract more intruders. + + 2.2.3.2 Disclosure of Information + + Another common threat is disclosure of information. Determine + the value or sensitivity of the information stored on your + computers. Disclosure of a password file might allow for + future unauthorized accesses. A glimpse of a proposal may give + a competitor an unfair advantage. A technical paper may + contain years of valuable research. + + 2.2.3.3 Denial of Service + + Computers and networks provide valuable services to their + users. Many people rely on these services in order to perform + their jobs efficiently. When these services are not available + when called upon, a loss in productivity results. + + Denial of service comes in many forms and might affect users in + a number of ways. A network may be rendered unusable by a + + + +Site Security Policy Handbook Working Group [Page 12] + +RFC 1244 Site Security Handbook July 1991 + + + rogue packet, jamming, or by a disabled network component. A + virus might slow down or cripple a computer system. Each site + should determine which services are essential, and for each of + these services determine the affect to the site if that service + were to become disabled. + +2.3 Policy Issues + + There are a number of issues that must be addressed when developing a + security policy. These are: + + 1. Who is allowed to use the resources? + 2. What is the proper use of the resources? + 3. Who is authorized to grant access and approve usage? + 4. Who may have system administration privileges? + 5. What are the user's rights and responsibilities? + 6. What are the rights and responsibilities of the + system administrator vs. those of the user? + 7. What do you do with sensitive information? + + These issues will be discussed below. In addition you may wish to + include a section in your policy concerning ethical use of computing + resources. Parker, Swope and Baker [17, PARKER90] and Forester and + Morrison [18, FORESTER] are two useful references that address + ethical issues. + + 2.3.1 Who is Allowed to use the Resources? + + One step you must take in developing your security policy is + defining who is allowed to use your system and services. The + policy should explicitly state who is authorized to use what + resources. + + 2.3.2 What is the Proper Use of the Resources? + + After determining who is allowed access to system resources it is + necessary to provide guidelines for the acceptable use of the + resources. You may have different guidelines for different types + of users (i.e., students, faculty, external users). The policy + should state what is acceptable use as well as unacceptable use. + It should also include types of use that may be restricted. + + Define limits to access and authority. You will need to consider + the level of access various users will have and what resources + will be available or restricted to various groups of people. + + Your acceptable use policy should clearly state that individual + users are responsible for their actions. Their responsibility + + + +Site Security Policy Handbook Working Group [Page 13] + +RFC 1244 Site Security Handbook July 1991 + + + exists regardless of the security mechanisms that are in place. + It should be clearly stated that breaking into accounts or + bypassing security is not permitted. + + The following points should be covered when developing an + acceptable use policy: + + o Is breaking into accounts permitted? + o Is cracking passwords permitted? + o Is disrupting service permitted? + o Should users assume that a file being world-readable + grants them the authorization to read it? + o Should users be permitted to modify files that are + not their own even if they happen to have write + permission? + o Should users share accounts? + + The answer to most of these questions will be "no". + + You may wish to incorporate a statement in your policies + concerning copyrighted and licensed software. Licensing + agreements with vendors may require some sort of effort on your + part to ensure that the license is not violated. In addition, you + may wish to inform users that the copying of copyrighted software + may be a violation of the copyright laws, and is not permitted. + + Specifically concerning copyrighted and/or licensed software, you + may wish to include the following information: + + o Copyrighted and licensed software may not be duplicated + unless it is explicitly stated that you may do so. + o Methods of conveying information on the + copyright/licensed status of software. + o When in doubt, DON'T COPY. + + Your acceptable use policy is very important. A policy which does + not clearly state what is not permitted may leave you unable to + prove that a user violated policy. + + There are exception cases like tiger teams and users or + administrators wishing for "licenses to hack" -- you may face the + situation where users will want to "hack" on your services for + security research purposes. You should develop a policy that will + determine whether you will permit this type of research on your + services and if so, what your guidelines for such research will + be. + + Points you may wish to cover in this area: + + + +Site Security Policy Handbook Working Group [Page 14] + +RFC 1244 Site Security Handbook July 1991 + + + o Whether it is permitted at all. + o What type of activity is permitted: breaking in, releasing + worms, releasing viruses, etc.. + o What type of controls must be in place to ensure that it + does not get out of control (e.g., separate a segment of + your network for these tests). + o How you will protect other users from being victims of + these activities, including external users and networks. + o The process for obtaining permission to conduct these + tests. + + In cases where you do permit these activities, you should isolate + the portions of the network that are being tested from your main + network. Worms and viruses should never be released on a live + network. + + You may also wish to employ, contract, or otherwise solicit one or + more people or organizations to evaluate the security of your + services, of which may include "hacking". You may wish to provide + for this in your policy. + + 2.3.3 Who Is Authorized to Grant Access and Approve Usage? + + Your policy should state who is authorized to grant access to your + services. Further, it must be determined what type of access they + are permitted to give. If you do not have control over who is + granted access to your system, you will not have control over who + is using your system. Controlling who has the authorization to + grant access will also enable you to know who was or was not + granting access if problems develop later. + + There are many schemes that can be developed to control the + distribution of access to your services. The following are the + factors that you must consider when determining who will + distribute access to your services: + + o Will you be distributing access from a centralized + point or at various points? + + You can have a centralized distribution point to a distributed + system where various sites or departments independently authorize + access. The trade off is between security and convenience. The + more centralized, the easier to secure. + + o What methods will you use for creating accounts and + terminating access? + + From a security standpoint, you need to examine the mechanism that + + + +Site Security Policy Handbook Working Group [Page 15] + +RFC 1244 Site Security Handbook July 1991 + + + you will be using to create accounts. In the least restrictive + case, the people who are authorized to grant access would be able + to go into the system directly and create an account by hand or + through vendor supplied mechanisms. Generally, these mechanisms + place a great deal of trust in the person running them, and the + person running them usually has a large amount of privileges. If + this is the choice you make, you need to select someone who is + trustworthy to perform this task. The opposite solution is to + have an integrated system that the people authorized to create + accounts run, or the users themselves may actually run. Be aware + that even in the restrictive case of having a mechanized facility + to create accounts does not remove the potential for abuse. + + You should have specific procedures developed for the creation of + accounts. These procedures should be well documented to prevent + confusion and reduce mistakes. A security vulnerability in the + account authorization process is not only possible through abuse, + but is also possible if a mistake is made. Having clear and well + documented procedure will help ensure that these mistakes won't + happen. You should also be sure that the people who will be + following these procedures understand them. + + The granting of access to users is one of the most vulnerable of + times. You should ensure that the selection of an initial + password cannot be easily guessed. You should avoid using an + initial password that is a function of the username, is part of + the user's name, or some algorithmically generated password that + can easily be guessed. In addition, you should not permit users + to continue to use the initial password indefinitely. If + possible, you should force users to change the initial password + the first time they login. Consider that some users may never + even login, leaving their password vulnerable indefinitely. Some + sites choose to disable accounts that have never been accessed, + and force the owner to reauthorize opening the account. + + 2.3.4 Who May Have System Administration Privileges? + + One security decision that needs to be made very carefully is who + will have access to system administrator privileges and passwords + for your services. Obviously, the system administrators will need + access, but inevitably other users will request special + privileges. The policy should address this issue. Restricting + privileges is one way to deal with threats from local users. The + challenge is to balance restricting access to these to protect + security with giving people who need these privileges access so + that they can perform their tasks. One approach that can be taken + is to grant only enough privilege to accomplish the necessary + tasks. + + + +Site Security Policy Handbook Working Group [Page 16] + +RFC 1244 Site Security Handbook July 1991 + + + Additionally, people holding special privileges should be + accountable to some authority and this should also be identified + within the site's security policy. If the people you grant + privileges to are not accountable, you run the risk of losing + control of your system and will have difficulty managing a + compromise in security. + + 2.3.5 What Are The Users' Rights and Responsibilities? + + The policy should incorporate a statement on the users' rights and + responsibilities concerning the use of the site's computer systems + and services. It should be clearly stated that users are + responsible for understanding and respecting the security rules of + the systems they are using. The following is a list of topics + that you may wish to cover in this area of the policy: + + o What guidelines you have regarding resource consumption + (whether users are restricted, and if so, what the + restrictions are). + o What might constitute abuse in terms of system performance. + o Whether users are permitted to share accounts or let others + use their accounts. + o How "secret" users should keep their passwords. + o How often users should change their passwords and any other + password restrictions or requirements. + o Whether you provide backups or expect the users to create + their own. + o Disclosure of information that may be proprietary. + o Statement on Electronic Mail Privacy (Electronic + Communications Privacy Act). + o Your policy concerning controversial mail or postings to + mailing lists or discussion groups (obscenity, harassment, + etc.). + o Policy on electronic communications: mail forging, etc. + + The Electronic Mail Association sponsored a white paper on the + privacy of electronic mail in companies [4]. Their basic + recommendation is that every site should have a policy on the + protection of employee privacy. They also recommend that + organizations establish privacy policies that deal with all media, + rather than singling out electronic mail. + + They suggest five criteria for evaluating any policy: + + 1. Does the policy comply with law and with duties to + third parties? + + 2. Does the policy unnecessarily compromise the interest of + + + +Site Security Policy Handbook Working Group [Page 17] + +RFC 1244 Site Security Handbook July 1991 + + + the employee, the employer or third parties? + + 3. Is the policy workable as a practical matter and likely to + be enforced? + + 4. Does the policy deal appropriately with all different + forms of communications and record keeping with the office? + + 5. Has the policy been announced in advance and agreed to by + all concerned? + + 2.3.6 What Are The Rights and Responsibilities of System + Administrators Versus Rights of Users + + There is a tradeoff between a user's right to absolute privacy and + the need of system administrators to gather sufficient information + to diagnose problems. There is also a distinction between a + system administrator's need to gather information to diagnose + problems and investigating security violations. The policy should + specify to what degree system administrators can examine user + files to diagnose problems or for other purposes, and what rights + you grant to the users. You may also wish to make a statement + concerning system administrators' obligation to maintaining the + privacy of information viewed under these circumstances. A few + questions that should be answered are: + + o Can an administrator monitor or read a user's files + for any reason? + o What are the liabilities? + o Do network administrators have the right to examine + network or host traffic? + + 2.3.7 What To Do With Sensitive Information + + Before granting users access to your services, you need to + determine at what level you will provide for the security of data + on your systems. By determining this, you are determining the + level of sensitivity of data that users should store on your + systems. You do not want users to store very sensitive + information on a system that you are not going to secure very + well. You need to tell users who might store sensitive + information what services, if any, are appropriate for the storage + of sensitive information. This part should include storing of + data in different ways (disk, magnetic tape, file servers, etc.). + Your policy in this area needs to be coordinated with the policy + concerning the rights of system administrators versus users (see + section 2.3.6). + + + + +Site Security Policy Handbook Working Group [Page 18] + +RFC 1244 Site Security Handbook July 1991 + + +2.4 What Happens When the Policy is Violated + + It is obvious that when any type of official policy is defined, be it + related to computer security or not, it will eventually be broken. + The violation may occur due to an individual's negligence, accidental + mistake, having not been properly informed of the current policy, or + not understanding the current policy. It is equally possible that an + individual (or group of individuals) may knowingly perform an act + that is in direct violation of the defined policy. + + When a policy violation has been detected, the immediate course of + action should be pre-defined to ensure prompt and proper enforcement. + An investigation should be performed to determine how and why the + violation occurred. Then the appropriate corrective action should be + executed. The type and severity of action taken varies depending on + the type of violation that occurred. + + 2.4.1 Determining the Response to Policy Violations + + Violations to policy may be committed by a wide variety of users. + Some may be local users and others may be from outside the local + environment. Sites may find it helpful to define what it + considers "insiders" and "outsiders" based upon administrative, + legal or political boundaries. These boundaries imply what type + of action must be taken to correct the offending party; from a + written reprimand to pressing legal charges. So, not only do you + need to define actions based on the type of violation, you also + need to have a clearly defined series of actions based on the kind + of user violating your computer security policy. This all seems + rather complicated, but should be addressed long before it becomes + necessary as the result of a violation. + + One point to remember about your policy is that proper education + is your best defense. For the outsiders who are using your + computer legally, it is your responsibility to verify that these + individuals are aware of the policies that you have set forth. + Having this proof may assist you in the future if legal action + becomes necessary. + + As for users who are using your computer illegally, the problem is + basically the same. What type of user violated the policy and how + and why did they do it? Depending on the results of your + investigation, you may just prefer to "plug" the hole in your + computer security and chalk it up to experience. Or if a + significant amount of loss was incurred, you may wish to take more + drastic action. + + + + + +Site Security Policy Handbook Working Group [Page 19] + +RFC 1244 Site Security Handbook July 1991 + + + 2.4.2 What to do When Local Users Violate the Policy of a Remote + Site + + In the event that a local user violates the security policy of a + remote site, the local site should have a clearly defined set of + administrative actions to take concerning that local user. The + site should also be prepared to protect itself against possible + actions by the remote site. These situations involve legal issues + which should be addressed when forming the security policy. + + 2.4.3 Defining Contacts and Responsibilities to Outside + Organizations + + The local security policy should include procedures for + interaction with outside organizations. These include law + enforcement agencies, other sites, external response team + organizations (e.g., the CERT, CIAC) and various press agencies. + The procedure should state who is authorized to make such contact + and how it should be handled. Some questions to be answered + include: + + o Who may talk to the press? + o When do you contact law enforcement and investigative agencies? + o If a connection is made from a remote site, is the + system manager authorized to contact that site? + o Can data be released? What kind? + + Detailed contact information should be readily available along + with clearly defined procedures to follow. + + 2.4.4 What are the Responsibilities to our Neighbors and Other + Internet Sites? + + The Security Policy Working Group within the IETF is working on a + document entitled, "Policy Guidelines for the Secure Operation of + the Internet" [23]. It addresses the issue that the Internet is a + cooperative venture and that sites are expected to provide mutual + security assistance. This should be addressed when developing a + site's policy. The major issue to be determined is how much + information should be released. This will vary from site to site + according to the type of site (e.g., military, education, + commercial) as well as the type of security violation that + occurred. + + 2.4.5 Issues for Incident Handling Procedures + + Along with statements of policy, the document being prepared + should include procedures for incident handling. This is covered + + + +Site Security Policy Handbook Working Group [Page 20] + +RFC 1244 Site Security Handbook July 1991 + + + in detail in the next chapter. There should be procedures + available that cover all facets of policy violation. + +2.5 Locking In or Out + + Whenever a site suffers an incident which may compromise computer + security, the strategies for reacting may be influenced by two + opposing pressures. + + If management fears that the site is sufficiently vulnerable, it may + choose a "Protect and Proceed" strategy. This approach will have as + its primary goal the protection and preservation of the site + facilities and to provide for normalcy for its users as quickly as + possible. Attempts will be made to actively interfere with the + intruder's processes, prevent further access and begin immediate + damage assessment and recovery. This process may involve shutting + down the facilities, closing off access to the network, or other + drastic measures. The drawback is that unless the intruder is + identified directly, they may come back into the site via a different + path, or may attack another site. + + The alternate approach, "Pursue and Prosecute", adopts the opposite + philosophy and goals. The primary goal is to allow intruders to + continue their activities at the site until the site can identify the + responsible persons. This approach is endorsed by law enforcement + agencies and prosecutors. The drawback is that the agencies cannot + exempt a site from possible user lawsuits if damage is done to their + systems and data. + + Prosecution is not the only outcome possible if the intruder is + identified. If the culprit is an employee or a student, the + organization may choose to take disciplinary actions. The computer + security policy needs to spell out the choices and how they will be + selected if an intruder is caught. + + Careful consideration must be made by site management regarding their + approach to this issue before the problem occurs. The strategy + adopted might depend upon each circumstance. Or there may be a + global policy which mandates one approach in all circumstances. The + pros and cons must be examined thoroughly and the users of the + facilities must be made aware of the policy so that they understand + their vulnerabilities no matter which approach is taken. + + The following are checklists to help a site determine which strategy + to adopt: "Protect and Proceed" or "Pursue and Prosecute". + + + + + + +Site Security Policy Handbook Working Group [Page 21] + +RFC 1244 Site Security Handbook July 1991 + + + Protect and Proceed + + 1. If assets are not well protected. + + 2. If continued penetration could result in great + financial risk. + + 3. If the possibility or willingness to prosecute + is not present. + + 4. If user base is unknown. + + 5. If users are unsophisticated and their work is + vulnerable. + + 6. If the site is vulnerable to lawsuits from users, e.g., + if their resources are undermined. + + Pursue and Prosecute + + 1. If assets and systems are well protected. + + 2. If good backups are available. + + 3. If the risk to the assets is outweighed by the + disruption caused by the present and possibly future + penetrations. + + 4. If this is a concentrated attack occurring with great + frequency and intensity. + + 5. If the site has a natural attraction to intruders, and + consequently regularly attracts intruders. + + 6. If the site is willing to incur the financial (or other) + risk to assets by allowing the penetrator continue. + + 7. If intruder access can be controlled. + + 8. If the monitoring tools are sufficiently well-developed + to make the pursuit worthwhile. + + 9. If the support staff is sufficiently clever and knowledgable + about the operating system, related utilities, and systems + to make the pursuit worthwhile. + + 10. If there is willingness on the part of management to + prosecute. + + + +Site Security Policy Handbook Working Group [Page 22] + +RFC 1244 Site Security Handbook July 1991 + + + 11. If the system adminitrators know in general what kind of + evidence would lead to prosecution. + + 12. If there is established contact with knowledgeable law + enforcement. + + 13. If there is a site representative versed in the relevant + legal issues. + + 14. If the site is prepared for possible legal action from + its own users if their data or systems become compromised + during the pursuit. + +2.6 Interpreting the Policy + + It is important to define who will interpret the policy. This could + be an individual or a committee. No matter how well written, the + policy will require interpretation from time to time and this body + would serve to review, interpret, and revise the policy as needed. + +2.7 Publicizing the Policy + + Once the site security policy has been written and established, a + vigorous process should be engaged to ensure that the policy + statement is widely and thoroughly disseminated and discussed. A + mailing of the policy should not be considered sufficient. A period + for comments should be allowed before the policy becomes effective to + ensure that all affected users have a chance to state their reactions + and discuss any unforeseen ramifications. Ideally, the policy should + strike a balance between protection and productivity. + + Meetings should be held to elicit these comments, and also to ensure + that the policy is correctly understood. (Policy promulgators are + not necessarily noted for their skill with the language.) These + meetings should involve higher management as well as line employees. + Security is a collective effort. + + In addition to the initial efforts to publicize the policy, it is + essential for the site to maintain a continual awareness of its + computer security policy. Current users may need periodic reminders + New users should have the policy included as part of their site + introduction packet. As a condition for using the site facilities, + it may be advisable to have them sign a statement that they have read + and understood the policy. Should any of these users require legal + action for serious policy violations, this signed statement might + prove to be a valuable aid. + + + + + +Site Security Policy Handbook Working Group [Page 23] + +RFC 1244 Site Security Handbook July 1991 + + +3. Establishing Procedures to Prevent Security Problems + + The security policy defines what needs to be protected. This section + discusses security procedures which specify what steps will be used + to carry out the security policy. + +3.1 Security Policy Defines What Needs to be Protected + + The security policy defines the WHAT's: what needs to be protected, + what is most important, what the priorities are, and what the general + approach to dealing with security problems should be. + + The security policy by itself doesn't say HOW things are protected. + That is the role of security procedures, which this section + discusses. The security policy should be a high level document, + giving general strategy. The security procedures need to set out, in + detail, the precise steps your site will take to protect itself. + + The security policy should include a general risk assessment of the + types of threats a site is mostly likely to face and the consequences + of those threats (see section 2.2). Part of doing a risk assessment + will include creating a general list of assets that should be + protected (section 2.2.2). This information is critical in devising + cost-effective procedures. + + It is often tempting to start creating security procedures by + deciding on different mechanisms first: "our site should have logging + on all hosts, call-back modems, and smart cards for all users." This + approach could lead to some areas that have too much protection for + the risk they face, and other areas that aren't protected enough. + Starting with the security policy and the risks it outlines should + ensure that the procedures provide the right level of protect for all + assets. + +3.2 Identifing Possible Problems + + To determine risk, vulnerabilities must be identified. Part of the + purpose of the policy is to aid in shoring up the vulnerabilities and + thus to decrease the risk in as many areas as possible. Several of + the more popular problem areas are presented in sections below. This + list is by no means complete. In addition, each site is likely to + have a few unique vulnerabilities. + + 3.2.1 Access Points + + Access points are typically used for entry by unauthorized users. + Having many access points increases the risk of access to an + organization's computer and network facilities. + + + +Site Security Policy Handbook Working Group [Page 24] + +RFC 1244 Site Security Handbook July 1991 + + + Network links to networks outside the organization allow access + into the organization for all others connected to that external + network. A network link typically provides access to a large + number of network services, and each service has a potential to be + compromised. + + Dialup lines, depending on their configuration, may provide access + merely to a login port of a single system. If connected to a + terminal server, the dialup line may give access to the entire + network. + + Terminal servers themselves can be a source of problem. Many + terminal servers do not require any kind of authentication. + Intruders often use terminal servers to disguise their actions, + dialing in on a local phone and then using the terminal server to + go out to the local network. Some terminal servers are configured + so that intruders can TELNET [19] in from outside the network, and + then TELNET back out again, again serving to make it difficult to + trace them. + + 3.2.2 Misconfigured Systems + + Misconfigured systems form a large percentage of security holes. + Today's operating systems and their associated software have + become so complex that understanding how the system works has + become a full-time job. Often, systems managers will be non- + specialists chosen from the current organization's staff. + + Vendors are also partly responsible for misconfigured systems. To + make the system installation process easier, vendors occasionally + choose initial configurations that are not secure in all + environments. + + 3.2.3 Software Bugs + + Software will never be bug free. Publicly known security bugs are + common methods of unauthorized entry. Part of the solution to + this problem is to be aware of the security problems and to update + the software when problems are detected. When bugs are found, + they should be reported to the vendor so that a solution to the + problem can be implemented and distributed. + + 3.2.4 "Insider" Threats + + An insider to the organization may be a considerable threat to the + security of the computer systems. Insiders often have direct + access to the computer and network hardware components. The + ability to access the components of a system makes most systems + + + +Site Security Policy Handbook Working Group [Page 25] + +RFC 1244 Site Security Handbook July 1991 + + + easier to compromise. Most desktop workstations can be easily + manipulated so that they grant privileged access. Access to a + local area network provides the ability to view possibly sensitive + data traversing the network. + +3.3 Choose Controls to Protect Assets in a Cost-Effective Way + + After establishing what is to be protected, and assessing the risks + these assets face, it is necessary to decide how to implement the + controls which protect these assets. The controls and protection + mechanisms should be selected in a way so as to adequately counter + the threats found during risk assessment, and to implement those + controls in a cost effective manner. It makes little sense to spend + an exorbitant sum of money and overly constrict the user base if the + risk of exposure is very small. + + 3.3.1 Choose the Right Set of Controls + + The controls that are selected represent the physical embodiment + of your security policy. They are the first and primary line of + defense in the protection of your assets. It is therefore most + important to ensure that the controls that you select are the + right set of controls. If the major threat to your system is + outside penetrators, it probably doesn't make much sense to use + biometric devices to authenticate your regular system users. On + the other hand, if the major threat is unauthorized use of + computing resources by regular system users, you'll probably want + to establish very rigorous automated accounting procedures. + + 3.3.2 Use Common Sense + + Common sense is the most appropriate tool that can be used to + establish your security policy. Elaborate security schemes and + mechanisms are impressive, and they do have their place, yet there + is little point in investing money and time on an elaborate + implementation scheme if the simple controls are forgotten. For + example, no matter how elaborate a system you put into place on + top of existing security controls, a single user with a poor + password can still leave your system open to attack. + +3.4 Use Multiple Strategies to Protect Assets + + Another method of protecting assets is to use multiple strategies. + In this way, if one strategy fails or is circumvented, another + strategy comes into play to continue protecting the asset. By using + several simpler strategies, a system can often be made more secure + than if one very sophisticated method were used in its place. For + example, dial-back modems can be used in conjunction with traditional + + + +Site Security Policy Handbook Working Group [Page 26] + +RFC 1244 Site Security Handbook July 1991 + + + logon mechanisms. Many similar approaches could be devised that + provide several levels of protection for assets. However, it's very + easy to go overboard with extra mechanisms. One must keep in mind + exactly what it is that needs to be protected. + +3.5 Physical Security + + It is a given in computer security if the system itself is not + physically secure, nothing else about the system can be considered + secure. With physical access to a machine, an intruder can halt the + machine, bring it back up in privileged mode, replace or alter the + disk, plant Trojan horse programs (see section 2.13.9.2), or take any + number of other undesirable (and hard to prevent) actions. + + Critical communications links, important servers, and other key + machines should be located in physically secure areas. Some security + systems (such as Kerberos) require that the machine be physically + secure. + + If you cannot physically secure machines, care should be taken about + trusting those machines. Sites should consider limiting access from + non-secure machines to more secure machines. In particular, allowing + trusted access (e.g., the BSD Unix remote commands such as rsh) from + these kinds of hosts is particularly risky. + + For machines that seem or are intended to be physically secure, care + should be taken about who has access to the machines. Remember that + custodial and maintenance staff often have keys to rooms. + +3.6 Procedures to Recognize Unauthorized Activity + + Several simple procedures can be used to detect most unauthorized + uses of a computer system. These procedures use tools provided with + the operating system by the vendor, or tools publicly available from + other sources. + + 3.6.1 Monitoring System Use + + System monitoring can be done either by a system administrator, or + by software written for the purpose. Monitoring a system involves + looking at several parts of the system and searching for anything + unusual. Some of the easier ways to do this are described in this + section. + + The most important thing about monitoring system use is that it be + done on a regular basis. Picking one day out of the month to + monitor the system is pointless, since a security breach can be + isolated to a matter of hours. Only by maintaining a constant + + + +Site Security Policy Handbook Working Group [Page 27] + +RFC 1244 Site Security Handbook July 1991 + + + vigil can you expect to detect security violations in time to + react to them. + + 3.6.2 Tools for Monitoring the System + + This section describes tools and methods for monitoring a system + against unauthorized access and use. + + 3.6.2.1 Logging + + Most operating systems store numerous bits of information in + log files. Examination of these log files on a regular basis + is often the first line of defense in detecting unauthorized + use of the system. + + - Compare lists of currently logged in users and past + login histories. Most users typically log in and out + at roughly the same time each day. An account logged + in outside the "normal" time for the account may be in + use by an intruder. + + - Many systems maintain accounting records for billing + purposes. These records can also be used to determine + usage patterns for the system; unusual accounting records + may indicate unauthorized use of the system. + + - System logging facilities, such as the UNIX "syslog" + utility, should be checked for unusual error messages + from system software. For example, a large number of + failed login attempts in a short period of time may + indicate someone trying to guess passwords. + + - Operating system commands which list currently executing + processes can be used to detect users running programs + they are not authorized to use, as well as to detect + unauthorized programs which have been started by an + intruder. + + 3.6.2.2 Monitoring Software + + Other monitoring tools can easily be constructed using standard + operating system software, by using several, often unrelated, + programs together. For example, checklists of file ownerships + and permission settings can be constructed (for example, with + "ls" and "find" on UNIX) and stored off-line. These lists can + then be reconstructed periodically and compared against the + master checklist (on UNIX, by using the "diff" utility). + Differences may indicate that unauthorized modifications have + + + +Site Security Policy Handbook Working Group [Page 28] + +RFC 1244 Site Security Handbook July 1991 + + + been made to the system. + + Still other tools are available from third-party vendors and + public software distribution sites. Section 3.9.9 lists + several sources from which you can learn what tools are + available and how to get them. + + 3.6.2.3 Other Tools + + Other tools can also be used to monitor systems for security + violations, although this is not their primary purpose. For + example, network monitors can be used to detect and log + connections from unknown sites. + + 3.6.3 Vary the Monitoring Schedule + + The task of system monitoring is not as daunting as it may seem. + System administrators can execute many of the commands used for + monitoring periodically throughout the day during idle moments + (e.g., while talking on the telephone), rather than spending fixed + periods of each day monitoring the system. By executing the + commands frequently, you will rapidly become used to seeing + "normal" output, and will easily spot things which are out of the + ordinary. In addition, by running various monitoring commands at + different times throughout the day, you make it hard for an + intruder to predict your actions. For example, if an intruder + knows that each day at 5:00 p.m. the system is checked to see that + everyone has logged off, he will simply wait until after the check + has completed before logging in. But the intruder cannot guess + when a system administrator might type a command to display all + logged-in users, and thus he runs a much greater risk of + detection. + + Despite the advantages that regular system monitoring provides, + some intruders will be aware of the standard logging mechanisms in + use on systems they are attacking. They will actively pursue and + attempt to disable monitoring mechanisms. Regular monitoring + therefore is useful in detecting intruders, but does not provide + any guarantee that your system is secure, nor should monitoring be + considered an infallible method of detecting unauthorized use. + +3.7 Define Actions to Take When Unauthorized Activity is Suspected + + Sections 2.4 and 2.5 discussed the course of action a site should + take when it suspects its systems are being abused. The computer + security policy should state the general approach towards dealing + with these problems. + + + + +Site Security Policy Handbook Working Group [Page 29] + +RFC 1244 Site Security Handbook July 1991 + + + The procedures for dealing with these types of problems should be + written down. Who has authority to decide what actions will be + taken? Should law enforcement be involved? Should your + organization cooperate with other sites in trying to track down an + intruder? Answers to all the questions in section 2.4 should be + part of the incident handling procedures. + + Whether you decide to lock out or pursue intruders, you should + have tools and procedures ready to apply. It is best to work up + these tools and procedures before you need them. Don't wait until + an intruder is on your system to figure out how to track the + intruder's actions; you will be busy enough if an intruder + strikes. + +3.8 Communicating Security Policy + + Security policies, in order to be effective, must be communicated to + both the users of the system and the system maintainers. This + section describes what these people should be told, and how to tell + them. + + 3.8.1 Educating the Users + + Users should be made aware of how the computer systems are + expected to be used, and how to protect themselves from + unauthorized users. + + 3.8.1.1 Proper Account/Workstation Use + + All users should be informed about what is considered the + "proper" use of their account or workstation ("proper" use is + discussed in section 2.3.2). This can most easily be done at + the time a user receives their account, by giving them a policy + statement. Proper use policies typically dictate things such + as whether or not the account or workstation may be used for + personal activities (such as checkbook balancing or letter + writing), whether profit-making activities are allowed, whether + game playing is permitted, and so on. These policy statements + may also be used to summarize how the computer facility is + licensed and what software licenses are held by the + institution; for example, many universities have educational + licenses which explicitly prohibit commercial uses of the + system. A more complete list of items to consider when writing + a policy statement is given in section 2.3. + + 3.8.1.2 Account/Workstation Management Procedures + + Each user should be told how to properly manage their account + + + +Site Security Policy Handbook Working Group [Page 30] + +RFC 1244 Site Security Handbook July 1991 + + + and workstation. This includes explaining how to protect files + stored on the system, how to log out or lock the terminal or + workstation, and so on. Much of this information is typically + covered in the "beginning user" documentation provided by the + operating system vendor, although many sites elect to + supplement this material with local information. + + If your site offers dial-up modem access to the computer + systems, special care must be taken to inform users of the + security problems inherent in providing this access. Issues + such as making sure to log out before hanging up the modem + should be covered when the user is initially given dial-up + access. + + Likewise, access to the systems via local and wide-area + networks presents its own set of security problems which users + should be made aware of. Files which grant "trusted host" or + "trusted user" status to remote systems and users should be + carefully explained. + + 3.8.1.3 Determining Account Misuse + + Users should be told how to detect unauthorized access to their + account. If the system prints the last login time when a user + logs in, he or she should be told to check that time and note + whether or not it agrees with the last time he or she actually + logged in. + + Command interpreters on some systems (e.g., the UNIX C shell) + maintain histories of the last several commands executed. + Users should check these histories to be sure someone has not + executed other commands with their account. + + 3.8.1.4 Problem Reporting Procedures + + A procedure should be developed to enable users to report + suspected misuse of their accounts or other misuse they may + have noticed. This can be done either by providing the name + and telephone number of a system administrator who manages + security of the computer system, or by creating an electronic + mail address (e.g., "security") to which users can address + their problems. + + 3.8.2 Educating the Host Administrators + + In many organizations, computer systems are administered by a wide + variety of people. These administrators must know how to protect + their own systems from attack and unauthorized use, as well as how + + + +Site Security Policy Handbook Working Group [Page 31] + +RFC 1244 Site Security Handbook July 1991 + + + to communicate successful penetration of their systems to other + administrators as a warning. + + 3.8.2.1 Account Management Procedures + + Care must be taken when installing accounts on the system in + order to make them secure. When installing a system from + distribution media, the password file should be examined for + "standard" accounts provided by the vendor. Many vendors + provide accounts for use by system services or field service + personnel. These accounts typically have either no password or + one which is common knowledge. These accounts should be given + new passwords if they are needed, or disabled or deleted from + the system if they are not. + + Accounts without passwords are generally very dangerous since + they allow anyone to access the system. Even accounts which do + not execute a command interpreter (e.g., accounts which exist + only to see who is logged in to the system) can be compromised + if set up incorrectly. A related concept, that of "anonymous" + file transfer (FTP) [20], allows users from all over the + network to access your system to retrieve files from (usually) + a protected disk area. You should carefully weigh the benefits + that an account without a password provides against the + security risks of providing such access to your system. + + If the operating system provides a "shadow" password facility + which stores passwords in a separate file accessible only to + privileged users, this facility should be used. System V UNIX, + SunOS 4.0 and above, and versions of Berkeley UNIX after 4.3BSD + Tahoe, as well as others, provide this feature. It protects + passwords by hiding their encrypted values from unprivileged + users. This prevents an attacker from copying your password + file to his or her machine and then attempting to break the + passwords at his or her leisure. + + Keep track of who has access to privileged user accounts (e.g., + "root" on UNIX or "MAINT" on VMS). Whenever a privileged user + leaves the organization or no longer has need of the privileged + account, the passwords on all privileged accounts should be + changed. + + 3.8.2.2 Configuration Management Procedures + + When installing a system from the distribution media or when + installing third-party software, it is important to check the + installation carefully. Many installation procedures assume a + "trusted" site, and hence will install files with world write + + + +Site Security Policy Handbook Working Group [Page 32] + +RFC 1244 Site Security Handbook July 1991 + + + permission enabled, or otherwise compromise the security of + files. + + Network services should also be examined carefully when first + installed. Many vendors provide default network permission + files which imply that all outside hosts are to be "trusted", + which is rarely the case when connected to wide-area networks + such as the Internet. + + Many intruders collect information on the vulnerabilities of + particular system versions. The older a system, the more + likely it is that there are security problems in that version + which have since been fixed by the vendor in a later release. + For this reason, it is important to weigh the risks of not + upgrading to a new operating system release (thus leaving + security holes unplugged) against the cost of upgrading to the + new software (possibly breaking third-party software, etc.). + Bug fixes from the vendor should be weighed in a similar + fashion, with the added note that "security" fixes from a + vendor usually address fairly serious security problems. + + Other bug fixes, received via network mailing lists and the + like, should usually be installed, but not without careful + examination. Never install a bug fix unless you're sure you + know what the consequences of the fix are - there's always the + possibility that an intruder has suggested a "fix" which + actually gives him or her access to your system. + + 3.8.2.3 Recovery Procedures - Backups + + It is impossible to overemphasize the need for a good backup + strategy. File system backups not only protect you in the + event of hardware failure or accidental deletions, but they + also protect you against unauthorized changes made by an + intruder. Without a copy of your data the way it's "supposed" + to be, it can be difficult to undo something an attacker has + done. + + Backups, especially if run daily, can also be useful in + providing a history of an intruder's activities. Looking + through old backups can establish when your system was first + penetrated. Intruders may leave files around which, although + deleted later, are captured on the backup tapes. Backups can + also be used to document an intruder's activities to law + enforcement agencies if necessary. + + A good backup strategy will dump the entire system to tape at + least once a month. Partial (or "incremental") dumps should be + + + +Site Security Policy Handbook Working Group [Page 33] + +RFC 1244 Site Security Handbook July 1991 + + + done at least twice a week, and ideally they should be done + daily. Commands specifically designed for performing file + system backups (e.g., UNIX "dump" or VMS "BACKUP") should be + used in preference to other file copying commands, since these + tools are designed with the express intent of restoring a + system to a known state. + + 3.8.2.4 Problem Reporting Procedures + + As with users, system administrators should have a defined + procedure for reporting security problems. In large + installations, this is often done by creating an electronic + mail alias which contains the names of all system + administrators in the organization. Other methods include + setting up some sort of response team similar to the CERT, or + establishing a "hotline" serviced by an existing support group. + +3.9 Resources to Prevent Security Breaches + + This section discusses software, hardware, and procedural resources + that can be used to support your site security policy. + + 3.9.1 Network Connections and Firewalls + + A "firewall" is put in place in a building to provide a point of + resistance to the entry of flames into another area. Similarly, a + secretary's desk and reception area provides a point of + controlling access to other office spaces. This same technique + can be applied to a computer site, particularly as it pertains to + network connections. + + Some sites will be connected only to other sites within the same + organization and will not have the ability to connect to other + networks. Sites such as these are less susceptible to threats + from outside their own organization, although intrusions may still + occur via paths such as dial-up modems. On the other hand, many + other organizations will be connected to other sites via much + larger networks, such as the Internet. These sites are + susceptible to the entire range of threats associated with a + networked environment. + + The risks of connecting to outside networks must be weighed + against the benefits. It may be desirable to limit connection to + outside networks to those hosts which do not store sensitive + material, keeping "vital" machines (such as those which maintain + company payroll or inventory systems) isolated. If there is a + need to participate in a Wide Area Network (WAN), consider + restricting all access to your local network through a single + + + +Site Security Policy Handbook Working Group [Page 34] + +RFC 1244 Site Security Handbook July 1991 + + + system. That is, all access to or from your own local network + must be made through a single host computer that acts as a + firewall between you and the outside world. This firewall system + should be rigorously controlled and password protected, and + external users accessing it should also be constrained by + restricting the functionality available to remote users. By using + this approach, your site could relax some of the internal security + controls on your local net, but still be afforded the protection + of a rigorously controlled host front end. + + Note that even with a firewall system, compromise of the firewall + could result in compromise of the network behind the firewall. + Work has been done in some areas to construct a firewall which + even when compromised, still protects the local network [6, + CHESWICK]. + + 3.9.2 Confidentiality + + Confidentiality, the act of keeping things hidden or secret, is + one of the primary goals of computer security practitioners. + Several mechanisms are provided by most modern operating systems + to enable users to control the dissemination of information. + Depending upon where you work, you may have a site where + everything is protected, or a site where all information is + usually regarded as public, or something in-between. Most sites + lean toward the in-between, at least until some penetration has + occurred. + + Generally, there are three instances in which information is + vulnerable to disclosure: when the information is stored on a + computer system, when the information is in transit to another + system (on the network), and when the information is stored on + backup tapes. + + The first of these cases is controlled by file permissions, access + control lists, and other similar mechanisms. The last can be + controlled by restricting access to the backup tapes (by locking + them in a safe, for example). All three cases can be helped by + using encryption mechanisms. + + 3.9.2.1 Encryption (hardware and software) + + Encryption is the process of taking information that exists in + some readable form and converting it into a non-readable form. + There are several types of commercially available encryption + packages in both hardware and software forms. Hardware + encryption engines have the advantage that they are much faster + than the software equivalent, yet because they are faster, they + + + +Site Security Policy Handbook Working Group [Page 35] + +RFC 1244 Site Security Handbook July 1991 + + + are of greater potential benefit to an attacker who wants to + execute a brute-force attack on your encrypted information. + + The advantage of using encryption is that, even if other access + control mechanisms (passwords, file permissions, etc.) are + compromised by an intruder, the data is still unusable. + Naturally, encryption keys and the like should be protected at + least as well as account passwords. + + Information in transit (over a network) may be vulnerable to + interception as well. Several solutions to this exist, ranging + from simply encrypting files before transferring them (end-to- + end encryption) to special network hardware which encrypts + everything it sends without user intervention (secure links). + The Internet as a whole does not use secure links, thus end- + to-end encryption must be used if encryption is desired across + the Internet. + + 3.9.2.1.1 Data Encryption Standard (DES) + + DES is perhaps the most widely used data encryption + mechanism today. Many hardware and software implementations + exist, and some commercial computers are provided with a + software version. DES transforms plain text information + into encrypted data (or ciphertext) by means of a special + algorithm and "seed" value called a key. So long as the key + is retained (or remembered) by the original user, the + ciphertext can be restored to the original plain text. + + One of the pitfalls of all encryption systems is the need to + remember the key under which a thing was encrypted (this is + not unlike the password problem discussed elsewhere in this + document). If the key is written down, it becomes less + secure. If forgotten, there is little (if any) hope of + recovering the original data. + + Most UNIX systems provide a DES command that enables a user + to encrypt data using the DES algorithm. + + 3.9.2.1.2 Crypt + + Similar to the DES command, the UNIX "crypt" command allows + a user to encrypt data. Unfortunately, the algorithm used + by "crypt" is very insecure (based on the World War II + "Enigma" device), and files encrypted with this command can + be decrypted easily in a matter of a few hours. Generally, + use of the "crypt" command should be avoided for any but the + most trivial encryption tasks. + + + +Site Security Policy Handbook Working Group [Page 36] + +RFC 1244 Site Security Handbook July 1991 + + + 3.9.2.2 Privacy Enhanced Mail + + Electronic mail normally transits the network in the clear + (i.e., anyone can read it). This is obviously not the optimal + solution. Privacy enhanced mail provides a means to + automatically encrypt electronic mail messages so that a person + eavesdropping at a mail distribution node is not (easily) + capable of reading them. Several privacy enhanced mail + packages are currently being developed and deployed on the + Internet. + + The Internet Activities Board Privacy Task Force has defined a + draft standard, elective protocol for use in implementing + privacy enhanced mail. This protocol is defined in RFCs 1113, + 1114, and 1115 [7,8,9]. Please refer to the current edition of + the "IAB Official Protocol Standards" (currently, RFC 1200 + [21]) for the standardization state and status of these + protocols. + + 3.9.3 Origin Authentication + + We mostly take it on faith that the header of an electronic mail + message truly indicates the originator of a message. However, it + iseasy to "spoof", or forge the source of a mail message. Origin + authentication provides a means to be certain of the originator of + a message or other object in the same way that a Notary Public + assures a signature on a legal document. This is done by means of + a "Public Key" cryptosystem. + + A public key cryptosystem differs from a private key cryptosystem + in several ways. First, a public key system uses two keys, a + Public Key that anyone can use (hence the name) and a Private Key + that only the originator of a message uses. The originator uses + the private key to encrypt the message (as in DES). The receiver, + who has obtained the public key for the originator, may then + decrypt the message. + + In this scheme, the public key is used to authenticate the + originator's use of his or her private key, and hence the identity + of the originator is more rigorously proven. The most widely + known implementation of a public key cryptosystem is the RSA + system [26]. The Internet standard for privacy enhanced mail + makes use of the RSA system. + + 3.9.4 Information Integrity + + Information integrity refers to the state of information such that + it is complete, correct, and unchanged from the last time in which + + + +Site Security Policy Handbook Working Group [Page 37] + +RFC 1244 Site Security Handbook July 1991 + + + it was verified to be in an "integral" state. The value of + information integrity to a site will vary. For example, it is + more important for military and government installations to + prevent the "disclosure" of classified information, whether it is + right or wrong. A bank, on the other hand, is far more concerned + with whether the account information maintained for its customers + is complete and accurate. + + Numerous computer system mechanisms, as well as procedural + controls, have an influence on the integrity of system + information. Traditional access control mechanisms maintain + controls over who can access system information. These mechanisms + alone are not sufficient in some cases to provide the degree of + integrity required. Some other mechanisms are briefly discussed + below. + + It should be noted that there are other aspects to maintaining + system integrity besides these mechanisms, such as two-person + controls, and integrity validation procedures. These are beyond + the scope of this document. + + 3.9.4.1 Checksums + + Easily the simplest mechanism, a simple checksum routine can + compute a value for a system file and compare it with the last + known value. If the two are equal, the file is probably + unchanged. If not, the file has been changed by some unknown + means. + + Though it is the easiest to implement, the checksum scheme + suffers from a serious failing in that it is not very + sophisticated and a determined attacker could easily add enough + characters to the file to eventually obtain the correct value. + + A specific type of checksum, called a CRC checksum, is + considerably more robust than a simple checksum. It is only + slightly more difficult to implement and provides a better + degree of catching errors. It too, however, suffers from the + possibility of compromise by an attacker. + + Checksums may be used to detect the altering of information. + However, they do not actively guard against changes being made. + For this, other mechanisms such as access controls and + encryption should be used. + + + + + + + +Site Security Policy Handbook Working Group [Page 38] + +RFC 1244 Site Security Handbook July 1991 + + + 3.9.4.2 Cryptographic Checksums + + Cryptographic checksums (also called cryptosealing) involve + breaking a file up into smaller chunks, calculating a (CRC) + checksum for each chunk, and adding the CRCs together. + Depending upon the exact algorithm used, this can result in a + nearly unbreakable method of determining whether a file has + been changed. This mechanism suffers from the fact that it is + sometimes computationally intensive and may be prohibitive + except in cases where the utmost integrity protection is + desired. + + Another related mechanism, called a one-way hash function (or a + Manipulation Detection Code (MDC)) can also be used to uniquely + identify a file. The idea behind these functions is that no + two inputs can produce the same output, thus a modified file + will not have the same hash value. One-way hash functions can + be implemented efficiently on a wide variety of systems, making + unbreakable integrity checks possible. (Snefru, a one-way hash + function available via USENET as well as the Internet is just + one example of an efficient one-way hash function.) [10] + + 3.9.5 Limiting Network Access + + The dominant network protocols in use on the Internet, IP (RFC + 791) [11], TCP (RFC 793) [12], and UDP (RFC 768) [13], carry + certain control information which can be used to restrict access + to certain hosts or networks within an organization. + + The IP packet header contains the network addresses of both the + sender and recipient of the packet. Further, the TCP and UDP + protocols provide the notion of a "port", which identifies the + endpoint (usually a network server) of a communications path. In + some instances, it may be desirable to deny access to a specific + TCP or UDP port, or even to certain hosts and networks altogether. + + 3.9.5.1 Gateway Routing Tables + + One of the simplest approaches to preventing unwanted network + connections is to simply remove certain networks from a + gateway's routing tables. This makes it "impossible" for a + host to send packets to these networks. (Most protocols + require bidirectional packet flow even for unidirectional data + flow, thus breaking one side of the route is usually + sufficient.) + + This approach is commonly taken in "firewall" systems by + preventing the firewall from advertising local routes to the + + + +Site Security Policy Handbook Working Group [Page 39] + +RFC 1244 Site Security Handbook July 1991 + + + outside world. The approach is deficient in that it often + prevents "too much" (e.g., in order to prevent access to one + system on the network, access to all systems on the network is + disabled). + + 3.9.5.2 Router Packet Filtering + + Many commercially available gateway systems (more correctly + called routers) provide the ability to filter packets based not + only on sources or destinations, but also on source-destination + combinations. This mechanism can be used to deny access to a + specific host, network, or subnet from any other host, network, + or subnet. + + Gateway systems from some vendors (e.g., cisco Systems) support + an even more complex scheme, allowing finer control over source + and destination addresses. Via the use of address masks, one + can deny access to all but one host on a particular network. + The cisco Systems also allow packet screening based on IP + protocol type and TCP or UDP port numbers [14]. + + This can also be circumvented by "source routing" packets + destined for the "secret" network. Source routed packets may + be filtered out by gateways, but this may restrict other + legitimate activities, such as diagnosing routing problems. + + 3.9.6 Authentication Systems + + Authentication refers to the process of proving a claimed identity + to the satisfaction of some permission-granting authority. + Authentication systems are hardware, software, or procedural + mechanisms that enable a user to obtain access to computing + resources. At the simplest level, the system administrator who + adds new user accounts to the system is part of the system + authentication mechanism. At the other end of the spectrum, + fingerprint readers or retinal scanners provide a very high-tech + solution to establishing a potential user's identity. Without + establishing and proving a user's identity prior to establishing a + session, your site's computers are vulnerable to any sort of + attack. + + Typically, a user authenticates himself or herself to the system + by entering a password in response to a prompt. + Challenge/Response mechanisms improve upon passwords by prompting + the user for some piece of information shared by both the computer + and the user (such as mother's maiden name, etc.). + + + + + +Site Security Policy Handbook Working Group [Page 40] + +RFC 1244 Site Security Handbook July 1991 + + + 3.9.6.1 Kerberos + + Kerberos, named after the dog who in mythology is said to stand + at the gates of Hades, is a collection of software used in a + large network to establish a user's claimed identity. + Developed at the Massachusetts Institute of Technology (MIT), + it uses a combination of encryption and distributed databases + so that a user at a campus facility can login and start a + session from any computer located on the campus. This has + clear advantages in certain environments where there are a + large number of potential users who may establish a connection + from any one of a large number of workstations. Some vendors + are now incorporating Kerberos into their systems. + + It should be noted that while Kerberos makes several advances + in the area of authentication, some security weaknesses in the + protocol still remain [15]. + + 3.9.6.2 Smart Cards + + Several systems use "smart cards" (a small calculator-like + device) to help authenticate users. These systems depend on + the user having an object in their possession. One such system + involves a new password procedure that require a user to enter + a value obtained from a "smart card" when asked for a password + by the computer. Typically, the host machine will give the + user some piece of information that is entered into the + keyboard of the smart card. The smart card will display a + response which must then be entered into the computer before + the session will be established. Another such system involves + a smart card which displays a number which changes over time, + but which is synchronized with the authentication software on + the computer. + + This is a better way of dealing with authentication than with + the traditional password approach. On the other hand, some say + it's inconvenient to carry the smart card. Start-up costs are + likely to be high as well. + + 3.9.7 Books, Lists, and Informational Sources + + There are many good sources for information regarding computer + security. The annotated bibliography at the end of this document + can provide you with a good start. In addition, information can + be obtained from a variety of other sources, some of which are + described in this section. + + + + + +Site Security Policy Handbook Working Group [Page 41] + +RFC 1244 Site Security Handbook July 1991 + + + 3.9.7.1 Security Mailing Lists + + The UNIX Security mailing list exists to notify system + administrators of security problems before they become common + knowledge, and to provide security enhancement information. It + is a restricted-access list, open only to people who can be + verified as being principal systems people at a site. Requests + to join the list must be sent by either the site contact listed + in the Defense Data Network's Network Information Center's (DDN + NIC) WHOIS database, or from the "root" account on one of the + major site machines. You must include the destination address + you want on the list, an indication of whether you want to be + on the mail reflector list or receive weekly digests, the + electronic mail address and voice telephone number of the site + contact if it isn't you, and the name, address, and telephone + number of your organization. This information should be sent + to SECURITY-REQUEST@CPD.COM. + + The RISKS digest is a component of the ACM Committee on + Computers and Public Policy, moderated by Peter G. Neumann. It + is a discussion forum on risks to the public in computers and + related systems, and along with discussing computer security + and privacy issues, has discussed such subjects as the Stark + incident, the shooting down of the Iranian airliner in the + Persian Gulf (as it relates to the computerized weapons + systems), problems in air and railroad traffic control systems, + software engineering, and so on. To join the mailing list, + send a message to RISKS-REQUEST@CSL.SRI.COM. This list is also + available in the USENET newsgroup "comp.risks". + + The VIRUS-L list is a forum for the discussion of computer + virus experiences, protection software, and related topics. + The list is open to the public, and is implemented as a + moderated digest. Most of the information is related to + personal computers, although some of it may be applicable to + larger systems. To subscribe, send the line: + + SUB VIRUS-L your full name + + to the address LISTSERV%LEHIIBM1.BITNET@MITVMA.MIT.EDU. This + list is also available via the USENET newsgroup "comp.virus". + + The Computer Underground Digest "is an open forum dedicated to + sharing information among computerists and to the presentation + and debate of diverse views." While not directly a security + list, it does contain discussions about privacy and other + security related topics. The list can be read on USENET as + alt.society.cu-digest, or to join the mailing list, send mail + + + +Site Security Policy Handbook Working Group [Page 42] + +RFC 1244 Site Security Handbook July 1991 + + + to Gordon Myer (TK0JUT2%NIU.bitnet@mitvma.mit.edu). + Submissions may be mailed to: cud@chinacat.unicom.com. + + 3.9.7.2 Networking Mailing Lists + + The TCP-IP mailing list is intended to act as a discussion + forum for developers and maintainers of implementations of the + TCP/IP protocol suite. It also discusses network-related + security problems when they involve programs providing network + services, such as "Sendmail". To join the TCP-IP list, send a + message to TCP-IP-REQUEST@NISC.SRI.COM. This list is also + available in the USENET newsgroup "comp.protocols.tcp-ip". + + SUN-NETS is a discussion list for items pertaining to + networking on Sun systems. Much of the discussion is related + to NFS, NIS (formally Yellow Pages), and name servers. To + subscribe, send a message to SUN-NETS-REQUEST@UMIACS.UMD.EDU. + + The USENET groups misc.security and alt.security also discuss + security issues. misc.security is a moderated group and also + includes discussions of physical security and locks. + alt.security is unmoderated. + + 3.9.7.3 Response Teams + + Several organizations have formed special groups of people to + deal with computer security problems. These teams collect + information about possible security holes and disseminate it to + the proper people, track intruders, and assist in recovery from + security violations. The teams typically have both electronic + mail distribution lists as well as a special telephone number + which can be called for information or to report a problem. + Many of these teams are members of the CERT System, which is + coordinated by the National Institute of Standards and + Technology (NIST), and exists to facilitate the exchange of + information between the various teams. + + 3.9.7.3.1 DARPA Computer Emergency Response Team + + The Computer Emergency Response Team/Coordination Center + (CERT/CC) was established in December 1988 by the Defense + Advanced Research Projects Agency (DARPA) to address + computer security concerns of research users of the + Internet. It is operated by the Software Engineering + Institute (SEI) at Carnegie-Mellon University (CMU). The + CERT can immediately confer with experts to diagnose and + solve security problems, and also establish and maintain + communications with the affected computer users and + + + +Site Security Policy Handbook Working Group [Page 43] + +RFC 1244 Site Security Handbook July 1991 + + + government authorities as appropriate. + + The CERT/CC serves as a clearing house for the + identification and repair of security vulnerabilities, + informal assessments of existing systems, improvement of + emergency response capability, and both vendor and user + security awareness. In addition, the team works with + vendors of various systems in order to coordinate the fixes + for security problems. + + The CERT/CC sends out security advisories to the CERT- + ADVISORY mailing list whenever appropriate. They also + operate a 24-hour hotline that can be called to report + security problems (e.g., someone breaking into your system), + as well as to obtain current (and accurate) information + about rumored security problems. + + To join the CERT-ADVISORY mailing list, send a message to + CERT@CERT.SEI.CMU.EDU and ask to be added to the mailing + list. The material sent to this list also appears in the + USENET newsgroup "comp.security.announce". Past advisories + are available for anonymous FTP from the host + CERT.SEI.CMU.EDU. The 24-hour hotline number is (412) 268- + 7090. + + The CERT/CC also maintains a CERT-TOOLS list to encourage + the exchange of information on tools and techniques that + increase the secure operation of Internet systems. The + CERT/CC does not review or endorse the tools described on + the list. To subscribe, send a message to CERT-TOOLS- + REQUEST@CERT.SEI.CMU.EDU and ask to be added to the mailing + list. + + The CERT/CC maintains other generally useful security + information for anonymous FTP from CERT.SEI.CMU.EDU. Get + the README file for a list of what is available. + + For more information, contact: + + CERT + Software Engineering Institute + Carnegie Mellon University + Pittsburgh, PA 15213-3890 + + (412) 268-7090 + cert@cert.sei.cmu.edu. + + + + + +Site Security Policy Handbook Working Group [Page 44] + +RFC 1244 Site Security Handbook July 1991 + + + 3.9.7.3.2 DDN Security Coordination Center + + For DDN users, the Security Coordination Center (SCC) serves + a function similar to CERT. The SCC is the DDN's clearing- + house for host/user security problems and fixes, and works + with the DDN Network Security Officer. The SCC also + distributes the DDN Security Bulletin, which communicates + information on network and host security exposures, fixes, + and concerns to security and management personnel at DDN + facilities. It is available online, via kermit or anonymous + FTP, from the host NIC.DDN.MIL, in SCC:DDN-SECURITY-yy- + nn.TXT (where "yy" is the year and "nn" is the bulletin + number). The SCC provides immediate assistance with DDN- + related host security problems; call (800) 235-3155 (6:00 + a.m. to 5:00 p.m. Pacific Time) or send email to + SCC@NIC.DDN.MIL. For 24 hour coverage, call the MILNET + Trouble Desk (800) 451-7413 or AUTOVON 231-1713. + + 3.9.7.3.3 NIST Computer Security Resource and Response Center + + The National Institute of Standards and Technology (NIST) + has responsibility within the U.S. Federal Government for + computer science and technology activities. NIST has played + a strong role in organizing the CERT System and is now + serving as the CERT System Secretariat. NIST also operates + a Computer Security Resource and Response Center (CSRC) to + provide help and information regarding computer security + events and incidents, as well as to raise awareness about + computer security vulnerabilities. + + The CSRC team operates a 24-hour hotline, at (301) 975-5200. + For individuals with access to the Internet, on-line + publications and computer security information can be + obtained via anonymous FTP from the host CSRC.NCSL.NIST.GOV + (129.6.48.87). NIST also operates a personal computer + bulletin board that contains information regarding computer + viruses as well as other aspects of computer security. To + access this board, set your modem to 300/1200/2400 BPS, 1 + stop bit, no parity, and 8-bit characters, and call (301) + 948-5717. All users are given full access to the board + immediately upon registering. + + NIST has produced several special publications related to + computer security and computer viruses in particular; some + of these publications are downloadable. For further + information, contact NIST at the following address: + + + + + +Site Security Policy Handbook Working Group [Page 45] + +RFC 1244 Site Security Handbook July 1991 + + + Computer Security Resource and Response Center + A-216 Technology + Gaithersburg, MD 20899 + Telephone: (301) 975-3359 + Electronic Mail: CSRC@nist.gov + + 3.9.7.3.4 DOE Computer Incident Advisory Capability (CIAC) + + CIAC is the Department of Energy's (DOE's) Computer Incident + Advisory Capability. CIAC is a four-person team of computer + scientists from Lawrence Livermore National Laboratory + (LLNL) charged with the primary responsibility of assisting + DOE sites faced with computer security incidents (e.g., + intruder attacks, virus infections, worm attacks, etc.). + This capability is available to DOE sites on a 24-hour-a-day + basis. + + CIAC was formed to provide a centralized response capability + (including technical assistance), to keep sites informed of + current events, to deal proactively with computer security + issues, and to maintain liaisons with other response teams + and agencies. CIAC's charter is to assist sites (through + direct technical assistance, providing information, or + referring inquiries to other technical experts), serve as a + clearinghouse for information about threats/known + incidents/vulnerabilities, develop guidelines for incident + handling, develop software for responding to + events/incidents, analyze events and trends, conduct + training and awareness activities, and alert and advise + sites about vulnerabilities and potential attacks. + + CIAC's business hours phone number is (415) 422-8193 or FTS + 532-8193. CIAC's e-mail address is CIAC@TIGER.LLNL.GOV. + + 3.9.7.3.5 NASA Ames Computer Network Security Response Team + + The Computer Network Security Response Team (CNSRT) is NASA + Ames Research Center's local version of the DARPA CERT. + Formed in August of 1989, the team has a constituency that + is primarily Ames users, but it is also involved in + assisting other NASA Centers and federal agencies. CNSRT + maintains liaisons with the DOE's CIAC team and the DARPA + CERT. It is also a charter member of the CERT System. The + team may be reached by 24 hour pager at (415) 694-0571, or + by electronic mail to CNSRT@AMES.ARC.NASA.GOV. + + + + + + +Site Security Policy Handbook Working Group [Page 46] + +RFC 1244 Site Security Handbook July 1991 + + + 3.9.7.4 DDN Management Bulletins + + The DDN Management Bulletin is distributed electronically by + the DDN NIC under contract to the Defense Communications Agency + (DCA). It is a means of communicating official policy, + procedures, and other information of concern to management + personnel at DDN facilities. + + The DDN Security Bulletin is distributed electronically by the + DDN SCC, also under contract to DCA, as a means of + communicating information on network and host security + exposures, fixes, and concerns to security and management + personnel at DDN facilities. + + Anyone may join the mailing lists for these two bulletins by + sending a message to NIC@NIC.DDN.MIL and asking to be placed on + the mailing lists. These messages are also posted to the + USENET newsgroup "ddn.mgt-bulletin". For additional + information, see section 8.7. + + 3.9.7.5 System Administration List + + The SYSADM-LIST is a list pertaining exclusively to UNIX system + administration. Mail requests to be added to the list to + SYSADM-LIST-REQUEST@SYSADMIN.COM. + + 3.9.7.6 Vendor Specific System Lists + + The SUN-SPOTS and SUN-MANAGERS lists are discussion groups for + users and administrators of systems supplied by Sun + Microsystems. SUN-SPOTS is a fairly general list, discussing + everything from hardware configurations to simple UNIX + questions. To subscribe, send a message to SUN-SPOTS- + REQUEST@RICE.EDU. This list is also available in the USENET + newsgroup "comp.sys.sun". SUN-MANAGERS is a discussion list + for Sun system administrators and covers all aspects of Sun + system administration. To subscribe, send a message to SUN- + MANAGERS-REQUEST@EECS.NWU.EDU. + + The APOLLO list discusses the HP/Apollo system and its + software. To subscribe, send a message to APOLLO- + REQUEST@UMIX.CC.UMICH.EDU. APOLLO-L is a similar list which + can be subscribed to by sending + + SUB APOLLO-L your full name + + to LISTSERV%UMRVMB.BITNET@VM1.NODAK.EDU. + + + + +Site Security Policy Handbook Working Group [Page 47] + +RFC 1244 Site Security Handbook July 1991 + + + HPMINI-L pertains to the Hewlett-Packard 9000 series and HP/UX + operating system. To subscribe, send + + SUB HPMINI-L your full name + + to LISTSERV%UAFSYSB.BITNET@VM1.NODAK.EDU. + + INFO-IBMPC discusses IBM PCs and compatibles, as well as MS- + DOS. To subscribe, send a note to INFO-IBMPC-REQUEST@WSMR- + SIMTEL20.ARMY.MIL. + + There are numerous other mailing lists for nearly every popular + computer or workstation in use today. For a complete list, + obtain the file "netinfo/interest-groups" via anonymous FTP + from the host FTP.NISC.SRI.COM. + + 3.9.7.7 Professional Societies and Journals + + The IEEE Technical Committee on Security & Privacy publishes a + quarterly magazine, "CIPHER". + + IEEE Computer Society, + 1730 Massachusetts Ave. N.W. + Washington, DC 2036-1903 + + The ACM SigSAC (Special Interest Group on Security, Audit, and + Controls) publishes a quarterly magazine, "SIGSAC Review". + + Association for Computing Machinery + 11 West 42nd St. + New York, N.Y. 10036 + + The Information Systems Security Association publishes a + quarterly magazine called "ISSA Access". + + Information Systems Security Association + P.O. Box 9457 + Newport Beach, CA 92658 + + "Computers and Security" is an "international journal for the + professional involved with computer security, audit and + control, and data integrity." + + + + + + + + + +Site Security Policy Handbook Working Group [Page 48] + +RFC 1244 Site Security Handbook July 1991 + + + $266/year, 8 issues (1990) + + Elsevier Advanced Technology + Journal Information Center + 655 Avenue of the Americas + New York, NY 10010 + + The "Data Security Letter" is published "to help data security + professionals by providing inside information and knowledgable + analysis of developments in computer and communications + security." + + $690/year, 9 issues (1990) + + Data Security Letter + P.O. Box 1593 + Palo Alto, CA 94302 + + 3.9.8 Problem Reporting Tools + + 3.9.8.1 Auditing + + Auditing is an important tool that can be used to enhance the + security of your installation. Not only does it give you a + means of identifying who has accessed your system (and may have + done something to it) but it also gives you an indication of + how your system is being used (or abused) by authorized users + and attackers alike. In addition, the audit trail + traditionally kept by computer systems can become an invaluable + piece of evidence should your system be penetrated. + + 3.9.8.1.1 Verify Security + + An audit trail shows how the system is being used from day + to day. Depending upon how your site audit log is + configured, your log files should show a range of access + attempts that can show what normal system usage should look + like. Deviation from that normal usage could be the result + of penetration from an outside source using an old or stale + user account. Observing a deviation in logins, for example, + could be your first indication that something unusual is + happening. + + 3.9.8.1.2 Verify Software Configurations + + One of the ruses used by attackers to gain access to a + system is by the insertion of a so-called Trojan Horse + program. A Trojan Horse program can be a program that does + + + +Site Security Policy Handbook Working Group [Page 49] + +RFC 1244 Site Security Handbook July 1991 + + + something useful, or merely something interesting. It + always does something unexpected, like steal passwords or + copy files without your knowledge [25]. Imagine a Trojan + login program that prompts for username and password in the + usual way, but also writes that information to a special + file that the attacker can come back and read at will. + Imagine a Trojan Editor program that, despite the file + permissions you have given your files, makes copies of + everything in your directory space without you knowing about + it. + + This points out the need for configuration management of the + software that runs on a system, not as it is being + developed, but as it is in actual operation. Techniques for + doing this range from checking each command every time it is + executed against some criterion (such as a cryptoseal, + described above) or merely checking the date and time stamp + of the executable. Another technique might be to check each + command in batch mode at midnight. + + 3.9.8.2 Tools + + COPS is a security tool for system administrators that checks + for numerous common security problems on UNIX systems [27]. + COPS is a collection of shell scripts and C programs that can + easily be run on almost any UNIX variant. Among other things, + it checks the following items and sends the results to the + system administrator: + + - Checks "/dev/kmem" and other devices for world + read/writability. + + - Checks special or important files and directories for + "bad" modes (world writable, etc.). + + - Checks for easily-guessed passwords. + + - Checks for duplicate user ids, invalid fields in the + password file, etc.. + + - Checks for duplicate group ids, invalid fields in the + group file, etc.. + + - Checks all users' home directories and their ".cshrc", + ".login", ".profile", and ".rhosts" files for security + problems. + + - Checks all commands in the "/etc/rc" files and "cron" + + + +Site Security Policy Handbook Working Group [Page 50] + +RFC 1244 Site Security Handbook July 1991 + + + files for world writability. + + - Checks for bad "root" paths, NFS file systems exported + to the world, etc.. + + - Includes an expert system that checks to see if a given + user (usually "root") can be compromised, given that + certain rules are true. + + - Checks for changes in the setuid status of programs on the + system. + + The COPS package is available from the "comp.sources.unix" + archive on "ftp.uu.net", and also from the UNIX-SW repository + on the MILNET host "wsmr-simtel20.army.mil". + + 3.9.9 Communication Among Administrators + + 3.9.9.1 Secure Operating Systems + + The following list of products and vendors is adapted from the + National Computer Security Center's (NCSC) Evaluated Products + List. They represent those companies who have either received + an evaluation from the NCSC or are in the process of a product + evaluation. This list is not complete, but it is + representative of those operating systems and add on components + available in the commercial marketplace. + + For a more detailed listing of the current products appearing + in the NCSC EPL, contact the NCSC at: + + National Computer Security Center + 9800 Savage Road + Fort George G. Meade, MD 20755-6000 + (301) 859-4458 + + + + + + + + + + + + + + + + +Site Security Policy Handbook Working Group [Page 51] + +RFC 1244 Site Security Handbook July 1991 + + + Version Evaluation +Evaluated Product Vendor Evaluated Class +----------------------------------------------------------------------- +Secure Communications Honeywell Information 2.1 A1 +Processor (SCOMP) Systems, Inc. + +Multics Honeywell Information MR11.0 B2 + Systems, Inc. + +System V/MLS 1.1.2 on UNIX AT&T 1.1.2 B1 +System V 3.1.1 on AT&T 3B2/500and 3B2/600 + +OS 1100 Unisys Corp. Security B1 + Release 1 + +MPE V/E Hewlett-Packard Computer G.03.04 C2 + Systems Division + +AOS/VS on MV/ECLIPSE series Data General Corp. 7.60 C2 + +VM/SP or VM/SP HPO with CMS, IBM Corp. 5 C2 +RACF, DIRMAINT, VMTAPE-MS, +ISPF + +MVS/XA with RACF IBM Corp. 2.2,2.3 C2 + +AX/VMS Digital Equipment Corp. 4.3 C2 + +NOS Control Data Corp. NOS + Security C2 + Eval Product + +TOP SECRET CGA Software Products 3.0/163 C2 + Group, Inc. + +Access Control Facility 2 SKK, Inc. 3.1.3 C2 + +UTX/32S Gould, Inc. Computer 1.0 C2 + Systems Division + +A Series MCP/AS with Unisys Corp. 3.7 C2 +InfoGuard Security +Enhancements + +Primos Prime Computer, Inc. 21.0.1DODC2A C2 +Resource Access Control IBM Corp. 1.5 C1 +Facility (RACF) + + + + +Site Security Policy Handbook Working Group [Page 52] + +RFC 1244 Site Security Handbook July 1991 + + + Version Candidate +Candidate Product Vendor Evaluated Class +----------------------------------------------------------------------- +Boeing MLS LAN Boeing Aerospace A1 M1 + +Trusted XENIX Trusted Information + Systems, Inc. B2 + +VSLAN VERDIX Corp. B2 + +System V/MLS AT&T B1 + +VM/SP with RACF IBM Corp. 5/1.8.2 C2 +Wang SVS/OS with CAP Wang Laboratories, Inc. 1.0 C2 + + + 3.9.9.2 Obtaining Fixes for Known Problems + + It goes without saying that computer systems have bugs. Even + operating systems, upon which we depend for protection of our + data, have bugs. And since there are bugs, things can be + broken, both maliciously and accidentally. It is important + that whenever bugs are discovered, a should fix be identified + and implemented as soon as possible. This should minimize any + exposure caused by the bug in the first place. + + A corollary to the bug problem is: from whom do I obtain the + fixes? Most systems have some support from the manufacturer or + supplier. Fixes coming from that source tend to be implemented + quickly after receipt. Fixes for some problems are often + posted on the network and are left to the system administrators + to incorporate as they can. The problem is that one wants to + have faith that the fix will close the hole and not introduce + any others. We will tend to trust that the manufacturer's + fixes are better than those that are posted on the net. + + 3.9.9.3 Sun Customer Warning System + + Sun Microsystems has established a Customer Warning System + (CWS) for handling security incidents. This is a formal + process which includes: + + - Having a well advertised point of contact in Sun + for reporting security problems. + - Pro-actively alerting customers of worms, viruses, + or other security holes that could affect their systems. + - Distributing the patch (or work-around) as quickly + as possible. + + + +Site Security Policy Handbook Working Group [Page 53] + +RFC 1244 Site Security Handbook July 1991 + + + They have created an electronic mail address, SECURITY- + ALERT@SUN.COM, which will enable customers to report security + problems. A voice-mail backup is available at (415) 688-9081. + A "Security Contact" can be designated by each customer site; + this person will be contacted by Sun in case of any new + security problems. For more information, contact your Sun + representative. + + 3.9.9.4 Trusted Archive Servers + + Several sites on the Internet maintain large repositories of + public-domain and freely distributable software, and make this + material available for anonymous FTP. This section describes + some of the larger repositories. Note that none of these + servers implements secure checksums or anything else + guaranteeing the integrity of their data. Thus, the notion of + "trust" should be taken as a somewhat limited definition. + + 3.9.9.4.1 Sun Fixes on UUNET + + Sun Microsystems has contracted with UUNET Communications + Services, Inc., to make fixes for bugs in Sun software + available via anonymous FTP. You can access these fixes by + using the "ftp" command to connect to the host FTP.UU.NET. + Then change into the directory "sun-dist/security", and + obtain a directory listing. The file "README" contains a + brief description of what each file in this directory + contains, and what is required to install the fix. + + 3.9.9.4.2 Berkeley Fixes + + The University of California at Berkeley also makes fixes + available via anonymous FTP; these fixes pertain primarily + to the current release of BSD UNIX (currently, release 4.3). + However, even if you are not running their software, these + fixes are still important, since many vendors (Sun, DEC, + Sequent, etc.) base their software on the Berkeley releases. + + The Berkeley fixes are available for anonymous FTP from the + host UCBARPA.BERKELEY.EDU in the directory "4.3/ucb-fixes". + The file "INDEX" in this directory describes what each file + contains. They are also available from UUNET (see section + 3.9.9.4.3). + + Berkeley also distributes new versions of "sendmail" and + "named" from this machine. New versions of these commands + are stored in the "4.3" directory, usually in the files + "sendmail.tar.Z" and "bind.tar.Z", respectively. + + + +Site Security Policy Handbook Working Group [Page 54] + +RFC 1244 Site Security Handbook July 1991 + + + 3.9.9.4.3 Simtel-20 and UUNET + + The two largest general-purpose software repositories on the + Internet are the hosts WSMR-SIMTEL20.ARMY.MIL and + FTP.UU.NET. + + WSMR-SIMTEL20.ARMY.MIL is a TOPS-20 machine operated by the + U.S. Army at White Sands Missile Range (WSMR), New Mexico. + The directory "pd2:<unix-c>" contains a large amount of UNIX + software, primarily taken from the "comp.sources" + newsgroups. The directories "pd1:<msdos>" and + "pd2:<msdos2>" contains software for IBM PC systems, and + "pd3:<macintosh>" contains software for the Apple Macintosh. + + FTP.UU.NET is operated by UUNET Communications Services, + Inc. in Falls Church, Virginia. This company sells Internet + and USENET access to sites all over the country (and + internationally). The software posted to the following + USENET source newsgroups is stored here, in directories of + the same name: + + comp.sources.games + comp.sources.misc + comp.sources.sun + comp.sources.unix + comp.sources.x + + Numerous other distributions, such as all the freely + distributable Berkeley UNIX source code, Internet Request + for Comments (RFCs), and so on are also stored on this + system. + + 3.9.9.4.4 Vendors + + Many vendors make fixes for bugs in their software available + electronically, either via mailing lists or via anonymous + FTP. You should contact your vendor to find out if they + offer this service, and if so, how to access it. Some + vendors that offer these services include Sun Microsystems + (see above), Digital Equipment Corporation (DEC), the + University of California at Berkeley (see above), and Apple + Computer [5, CURRY]. + + + + + + + + + +Site Security Policy Handbook Working Group [Page 55] + +RFC 1244 Site Security Handbook July 1991 + + +4. Types of Security Procedures + +4.1 System Security Audits + + Most businesses undergo some sort of annual financial auditing as a + regular part of their business life. Security audits are an + important part of running any computing environment. Part of the + security audit should be a review of any policies that concern system + security, as well as the mechanisms that are put in place to enforce + them. + + 4.1.1 Organize Scheduled Drills + + Although not something that would be done each day or week, + scheduled drills may be conducted to determine if the procedures + defined are adequate for the threat to be countered. If your + major threat is one of natural disaster, then a drill would be + conducted to verify your backup and recovery mechanisms. On the + other hand, if your greatest threat is from external intruders + attempting to penetrate your system, a drill might be conducted to + actually try a penetration to observe the effect of the policies. + + Drills are a valuable way to test that your policies and + procedures are effective. On the other hand, drills can be time- + consuming and disruptive to normal operations. It is important to + weigh the benefits of the drills against the possible time loss + which may be associated with them. + + 4.1.2 Test Procedures + + If the choice is made to not to use scheduled drills to examine + your entire security procedure at one time, it is important to + test individual procedures frequently. Examine your backup + procedure to make sure you can recover data from the tapes. Check + log files to be sure that information which is supposed to be + logged to them is being logged to them, etc.. + + When a security audit is mandated, great care should be used in + devising tests of the security policy. It is important to clearly + identify what is being tested, how the test will be conducted, and + results expected from the test. This should all be documented and + included in or as an adjunct to the security policy document + itself. + + It is important to test all aspects of the security policy, both + procedural and automated, with a particular emphasis on the + automated mechanisms used to enforce the policy. Tests should be + defined to ensure a comprehensive examination of policy features, + + + +Site Security Policy Handbook Working Group [Page 56] + +RFC 1244 Site Security Handbook July 1991 + + + that is, if a test is defined to examine the user logon process, + it should be explicitly stated that both valid and invalid user + names and passwords will be used to demonstrate proper operation + of the logon program. + + Keep in mind that there is a limit to the reasonableness of tests. + The purpose of testing is to ensure confidence that the security + policy is being correctly enforced, and not to "prove" the + absoluteness of the system or policy. The goal should be to + obtain some assurance that the reasonable and credible controls + imposed by your security policy are adequate. + +4.2 Account Management Procedures + + Procedures to manage accounts are important in preventing + unauthorized access to your system. It is necessary to decide + several things: Who may have an account on the system? How long may + someone have an account without renewing his or her request? How do + old accounts get removed from the system? The answers to all these + questions should be explicitly set out in the policy. + + In addition to deciding who may use a system, it may be important to + determine what each user may use the system for (is personal use + allowed, for example). If you are connected to an outside network, + your site or the network management may have rules about what the + network may be used for. Therefore, it is important for any security + policy to define an adequate account management procedure for both + administrators and users. Typically, the system administrator would + be responsible for creating and deleting user accounts and generally + maintaining overall control of system use. To some degree, account + management is also the responsibility of each system user in the + sense that the user should observe any system messages and events + that may be indicative of a policy violation. For example, a message + at logon that indicates the date and time of the last logon should be + reported by the user if it indicates an unreasonable time of last + logon. + +4.3 Password Management Procedures + + A policy on password management may be important if your site wishes + to enforce secure passwords. These procedures may range from asking + or forcing users to change their passwords occasionally to actively + attempting to break users' passwords and then informing the user of + how easy it was to do. Another part of password management policy + covers who may distribute passwords - can users give their passwords + to other users? + + Section 2.3 discusses some of the policy issues that need to be + + + +Site Security Policy Handbook Working Group [Page 57] + +RFC 1244 Site Security Handbook July 1991 + + + decided for proper password management. Regardless of the policies, + password management procedures need to be carefully setup to avoid + disclosing passwords. The choice of initial passwords for accounts + is critical. In some cases, users may never login to activate an + account; thus, the choice of the initial password should not be + easily guessed. Default passwords should never be assigned to + accounts: always create new passwords for each user. If there are + any printed lists of passwords, these should be kept off-line in + secure locations; better yet, don't list passwords. + + 4.3.1 Password Selection + + Perhaps the most vulnerable part of any computer system is the + account password. Any computer system, no matter how secure it is + from network or dial-up attack, Trojan horse programs, and so on, + can be fully exploited by an intruder if he or she can gain access + via a poorly chosen password. It is important to define a good + set of rules for password selection, and distribute these rules to + all users. If possible, the software which sets user passwords + should be modified to enforce as many of the rules as possible. + + A sample set of guidelines for password selection is shown below: + + - DON'T use your login name in any form (as-is, + reversed, capitalized, doubled, etc.). + + - DON'T use your first, middle, or last name in any form. + + - DON'T use your spouse's or child's name. + + - DON'T use other information easily obtained about you. + This includes license plate numbers, telephone numbers, + social security numbers, the make of your automobile, + the name of the street you live on, etc.. + + - DON'T use a password of all digits, or all the same + letter. + + - DON'T use a word contained in English or foreign + language dictionaries, spelling lists, or other + lists of words. + + - DON'T use a password shorter than six characters. + + - DO use a password with mixed-case alphabetics. + + - DO use a password with non-alphabetic characters (digits + or punctuation). + + + +Site Security Policy Handbook Working Group [Page 58] + +RFC 1244 Site Security Handbook July 1991 + + + - DO use a password that is easy to remember, so you don't + have to write it down. + + - DO use a password that you can type quickly, without + having to look at the keyboard. + + Methods of selecting a password which adheres to these guidelines + include: + + - Choose a line or two from a song or poem, and use the + first letter of each word. + + - Alternate between one consonant and one or two vowels, up + to seven or eight characters. This provides nonsense + words which are usually pronounceable, and thus easily + remembered. + + - Choose two short words and concatenate them together with + a punctuation character between them. + + Users should also be told to change their password periodically, + usually every three to six months. This makes sure that an + intruder who has guessed a password will eventually lose access, + as well as invalidating any list of passwords he/she may have + obtained. Many systems enable the system administrator to force + users to change their passwords after an expiration period; this + software should be enabled if your system supports it [5, CURRY]. + + Some systems provide software which forces users to change their + passwords on a regular basis. Many of these systems also include + password generators which provide the user with a set of passwords + to choose from. The user is not permitted to make up his or her + own password. There are arguments both for and against systems + such as these. On the one hand, by using generated passwords, + users are prevented from selecting insecure passwords. On the + other hand, unless the generator is good at making up easy to + remember passwords, users will begin writing them down in order to + remember them. + + 4.3.2 Procedures for Changing Passwords + + How password changes are handled is important to keeping passwords + secure. Ideally, users should be able to change their own + passwords on-line. (Note that password changing programs are a + favorite target of intruders. See section 4.4 on configuration + management for further information.) + + However, there are exception cases which must be handled + + + +Site Security Policy Handbook Working Group [Page 59] + +RFC 1244 Site Security Handbook July 1991 + + + carefully. Users may forget passwords and not be able to get onto + the system. The standard procedure is to assign the user a new + password. Care should be taken to make sure that the real person + is requesting the change and gets the new password. One common + trick used by intruders is to call or message to a system + administrator and request a new password. Some external form of + verification should be used before the password is assigned. At + some sites, users are required to show up in person with ID. + + There may also be times when many passwords need to be changed. + If a system is compromised by an intruder, the intruder may be + able to steal a password file and take it off the system. Under + these circumstances, one course of action is to change all + passwords on the system. Your site should have procedures for how + this can be done quickly and efficiently. What course you choose + may depend on the urgency of the problem. In the case of a known + attack with damage, you may choose to forcibly disable all + accounts and assign users new passwords before they come back onto + the system. In some places, users are sent a message telling them + that they should change their passwords, perhaps within a certain + time period. If the password isn't changed before the time period + expires, the account is locked. + + Users should be aware of what the standard procedure is for + passwords when a security event has occurred. One well-known + spoof reported by the Computer Emergency Response Team (CERT) + involved messages sent to users, supposedly from local system + administrators, requesting them to immediately change their + password to a new value provided in the message [24]. These + messages were not from the administrators, but from intruders + trying to steal accounts. Users should be warned to immediately + report any suspicious requests such as this to site + administrators. + +4.4 Configuration Management Procedures + + Configuration management is generally applied to the software + development process. However, it is certainly applicable in a + operational sense as well. Consider that the since many of the + system level programs are intended to enforce the security policy, it + is important that these be "known" as correct. That is, one should + not allow system level programs (such as the operating system, etc.) + to be changed arbitrarily. At very least, the procedures should + state who is authorized to make changes to systems, under what + circumstances, and how the changes should be documented. + + In some environments, configuration management is also desirable as + applied to physical configuration of equipment. Maintaining valid + + + +Site Security Policy Handbook Working Group [Page 60] + +RFC 1244 Site Security Handbook July 1991 + + + and authorized hardware configuration should be given due + consideration in your security policy. + + 4.4.1 Non-Standard Configurations + + Occasionally, it may be beneficial to have a slightly non-standard + configuration in order to thwart the "standard" attacks used by + some intruders. The non-standard parts of the configuration might + include different password encryption algorithms, different + configuration file locations, and rewritten or functionally + limited system commands. + + Non-standard configurations, however, also have their drawbacks. + By changing the "standard" system, these modifications make + software maintenance more difficult by requiring extra + documentation to be written, software modification after operating + system upgrades, and, usually, someone with special knowledge of + the changes. + + Because of the drawbacks of non-standard configurations, they are + often only used in environments with a "firewall" machine (see + section 3.9.1). The firewall machine is modified in non-standard + ways since it is susceptible to attack, while internal systems + behind the firewall are left in their standard configurations. + +5. Incident Handling + +5.1 Overview + + This section of the document will supply some guidance to be applied + when a computer security event is in progress on a machine, network, + site, or multi-site environment. The operative philosophy in the + event of a breach of computer security, whether it be an external + intruder attack or a disgruntled employee, is to plan for adverse + events in advance. There is no substitute for creating contingency + plans for the types of events described above. + + Traditional computer security, while quite important in the overall + site security plan, usually falls heavily on protecting systems from + attack, and perhaps monitoring systems to detect attacks. Little + attention is usually paid for how to actually handle the attack when + it occurs. The result is that when an attack is in progress, many + decisions are made in haste and can be damaging to tracking down the + source of the incident, collecting evidence to be used in prosecution + efforts, preparing for the recovery of the system, and protecting the + valuable data contained on the system. + + + + + +Site Security Policy Handbook Working Group [Page 61] + +RFC 1244 Site Security Handbook July 1991 + + + 5.1.1 Have a Plan to Follow in Case of an Incident + + Part of handling an incident is being prepared to respond before + the incident occurs. This includes establishing a suitable level + of protections, so that if the incident becomes severe, the damage + which can occur is limited. Protection includes preparing + incident handling guidelines or a contingency response plan for + your organization or site. Having written plans eliminates much + of the ambiguity which occurs during an incident, and will lead to + a more appropriate and thorough set of responses. Second, part of + protection is preparing a method of notification, so you will know + who to call and the relevant phone numbers. It is important, for + example, to conduct "dry runs," in which your computer security + personnel, system administrators, and managers simulate handling + an incident. + + Learning to respond efficiently to an incident is important for + numerous reasons. The most important benefit is directly to human + beings--preventing loss of human life. Some computing systems are + life critical systems, systems on which human life depends (e.g., + by controlling some aspect of life-support in a hospital or + assisting air traffic controllers). + + An important but often overlooked benefit is an economic one. + Having both technical and managerial personnel respond to an + incident requires considerable resources, resources which could be + utilized more profitably if an incident did not require their + services. If these personnel are trained to handle an incident + efficiently, less of their time is required to deal with that + incident. + + A third benefit is protecting classified, sensitive, or + proprietary information. One of the major dangers of a computer + security incident is that information may be irrecoverable. + Efficient incident handling minimizes this danger. When + classified information is involved, other government regulations + may apply and must be integrated into any plan for incident + handling. + + A fourth benefit is related to public relations. News about + computer security incidents tends to be damaging to an + organization's stature among current or potential clients. + Efficient incident handling minimizes the potential for negative + exposure. + + A final benefit of efficient incident handling is related to legal + issues. It is possible that in the near future organizations may + be sued because one of their nodes was used to launch a network + + + +Site Security Policy Handbook Working Group [Page 62] + +RFC 1244 Site Security Handbook July 1991 + + + attack. In a similar vein, people who develop patches or + workarounds may be sued if the patches or workarounds are + ineffective, resulting in damage to systems, or if the patches or + workarounds themselves damage systems. Knowing about operating + system vulnerabilities and patterns of attacks and then taking + appropriate measures is critical to circumventing possible legal + problems. + + 5.1.2 Order of Discussion in this Session Suggests an Order for + a Plan + + This chapter is arranged such that a list may be generated from + the Table of Contents to provide a starting point for creating a + policy for handling ongoing incidents. The main points to be + included in a policy for handling incidents are: + + o Overview (what are the goals and objectives in handling the + incident). + o Evaluation (how serious is the incident). + o Notification (who should be notified about the incident). + o Response (what should the response to the incident be). + o Legal/Investigative (what are the legal and prosecutorial + implications of the incident). + o Documentation Logs (what records should be kept from before, + during, and after the incident). + + Each of these points is important in an overall plan for handling + incidents. The remainder of this chapter will detail the issues + involved in each of these topics, and provide some guidance as to + what should be included in a site policy for handling incidents. + + 5.1.3 Possible Goals and Incentives for Efficient Incident + Handling + + As in any set of pre-planned procedures, attention must be placed + on a set of goals to be obtained in handling an incident. These + goals will be placed in order of importance depending on the site, + but one such set of goals might be: + + Assure integrity of (life) critical systems. + Maintain and restore data. + Maintain and restore service. + Figure out how it happened. + Avoid escalation and further incidents. + Avoid negative publicity. + Find out who did it. + Punish the attackers. + + + + +Site Security Policy Handbook Working Group [Page 63] + +RFC 1244 Site Security Handbook July 1991 + + + It is important to prioritize actions to be taken during an + incident well in advance of the time an incident occurs. + Sometimes an incident may be so complex that it is impossible to + do everything at once to respond to it; priorities are essential. + Although priorities will vary from institution-to-institution, the + following suggested priorities serve as a starting point for + defining an organization's response: + + o Priority one -- protect human life and people's + safety; human life always has precedence over all + other considerations. + + o Priority two -- protect classified and/or sensitive + data (as regulated by your site or by government + regulations). + + o Priority three -- protect other data, including + proprietary, scientific, managerial and other data, + because loss of data is costly in terms of resources. + + o Priority four -- prevent damage to systems (e.g., loss + or alteration of system files, damage to disk drives, + etc.); damage to systems can result in costly down + time and recovery. + + o Priority five -- minimize disruption of computing + resources; it is better in many cases to shut a system + down or disconnect from a network than to risk damage + to data or systems. + + An important implication for defining priorities is that once + human life and national security considerations have been + addressed, it is generally more important to save data than system + software and hardware. Although it is undesirable to have any + damage or loss during an incident, systems can be replaced; the + loss or compromise of data (especially classified data), however, + is usually not an acceptable outcome under any circumstances. + + Part of handling an incident is being prepared to respond before + the incident occurs. This includes establishing a suitable level + of protections so that if the incident becomes severe, the damage + which can occur is limited. Protection includes preparing + incident handling guidelines or a contingency response plan for + your organization or site. Written plans eliminate much of the + ambiguity which occurs during an incident, and will lead to a more + appropriate and thorough set of responses. Second, part of + protection is preparing a method of notification so you will know + who to call and how to contact them. For example, every member of + + + +Site Security Policy Handbook Working Group [Page 64] + +RFC 1244 Site Security Handbook July 1991 + + + the Department of Energy's CIAC Team carries a card with every + other team member's work and home phone numbers, as well as pager + numbers. Third, your organization or site should establish backup + procedures for every machine and system. Having backups + eliminates much of the threat of even a severe incident, since + backups preclude serious data loss. Fourth, you should set up + secure systems. This involves eliminating vulnerabilities, + establishing an effective password policy, and other procedures, + all of which will be explained later in this document. Finally, + conducting training activities is part of protection. It is + important, for example, to conduct "dry runs," in which your + computer security personnel, system administrators, and managers + simulate handling an incident. + + 5.1.4 Local Policies and Regulations Providing Guidance + + Any plan for responding to security incidents should be guided by + local policies and regulations. Government and private sites that + deal with classified material have specific rules that they must + follow. + + The policies your site makes about how it responds to incidents + (as discussed in sections 2.4 and 2.5) will shape your response. + For example, it may make little sense to create mechanisms to + monitor and trace intruders if your site does not plan to take + action against the intruders if they are caught. Other + organizations may have policies that affect your plans. Telephone + companies often release information about telephone traces only to + law enforcement agencies. + + Section 5.5 also notes that if any legal action is planned, there + are specific guidelines that must be followed to make sure that + any information collected can be used as evidence. + +5.2 Evaluation + + 5.2.1 Is It Real? + + This stage involves determining the exact problem. Of course + many, if not most, signs often associated with virus infections, + system intrusions, etc., are simply anomalies such as hardware + failures. To assist in identifying whether there really is an + incident, it is usually helpful to obtain and use any detection + software which may be available. For example, widely available + software packages can greatly assist someone who thinks there may + be a virus in a Macintosh computer. Audit information is also + extremely useful, especially in determining whether there is a + network attack. It is extremely important to obtain a system + + + +Site Security Policy Handbook Working Group [Page 65] + +RFC 1244 Site Security Handbook July 1991 + + + snapshot as soon as one suspects that something is wrong. Many + incidents cause a dynamic chain of events to occur, and an initial + system snapshot may do more good in identifying the problem and + any source of attack than most other actions which can be taken at + this stage. Finally, it is important to start a log book. + Recording system events, telephone conversations, time stamps, + etc., can lead to a more rapid and systematic identification of + the problem, and is the basis for subsequent stages of incident + handling. + + There are certain indications or "symptoms" of an incident which + deserve special attention: + + o System crashes. + o New user accounts (e.g., the account RUMPLESTILTSKIN + has unexplainedly been created), or high activity on + an account that has had virtually no activity for + months. + o New files (usually with novel or strange file names, + such as data.xx or k). + o Accounting discrepancies (e.g., in a UNIX system you + might notice that the accounting file called + /usr/admin/lastlog has shrunk, something that should + make you very suspicious that there may be an + intruder). + o Changes in file lengths or dates (e.g., a user should + be suspicious if he/she observes that the .EXE files in + an MS DOS computer have unexplainedly grown + by over 1800 bytes). + o Attempts to write to system (e.g., a system manager + notices that a privileged user in a VMS system is + attempting to alter RIGHTSLIST.DAT). + o Data modification or deletion (e.g., files start to + disappear). + o Denial of service (e.g., a system manager and all + other users become locked out of a UNIX system, which + has been changed to single user mode). + o Unexplained, poor system performance (e.g., system + response time becomes unusually slow). + o Anomalies (e.g., "GOTCHA" is displayed on a display + terminal or there are frequent unexplained "beeps"). + o Suspicious probes (e.g., there are numerous + unsuccessful login attempts from another node). + o Suspicious browsing (e.g., someone becomes a root user + on a UNIX system and accesses file after file in one + user's account, then another's). + + None of these indications is absolute "proof" that an incident is + + + +Site Security Policy Handbook Working Group [Page 66] + +RFC 1244 Site Security Handbook July 1991 + + + occurring, nor are all of these indications normally observed when + an incident occurs. If you observe any of these indications, + however, it is important to suspect that an incident might be + occurring, and act accordingly. There is no formula for + determining with 100 percent accuracy that an incident is + occurring (possible exception: when a virus detection package + indicates that your machine has the nVIR virus and you confirm + this by examining contents of the nVIR resource in your Macintosh + computer, you can be very certain that your machine is infected). + It is best at this point to collaborate with other technical and + computer security personnel to make a decision as a group about + whether an incident is occurring. + + 5.2.2 Scope + + Along with the identification of the incident is the evaluation of + the scope and impact of the problem. It is important to correctly + identify the boundaries of the incident in order to effectively + deal with it. In addition, the impact of an incident will + determine its priority in allocating resources to deal with the + event. Without an indication of the scope and impact of the + event, it is difficult to determine a correct response. + + In order to identify the scope and impact, a set of criteria + should be defined which is appropriate to the site and to the type + of connections available. Some of the issues are: + + o Is this a multi-site incident? + o Are many computers at your site effected by this + incident? + o Is sensitive information involved? + o What is the entry point of the incident (network, + phone line, local terminal, etc.)? + o Is the press involved? + o What is the potential damage of the incident? + o What is the estimated time to close out the incident? + o What resources could be required + to handle the incident? + +5.3 Possible Types of Notification + + When you have confirmed that an incident is occurring, the + appropriate personnel must be notified. Who and how this + notification is achieved is very important in keeping the event under + control both from a technical and emotional standpoint. + + + + + + +Site Security Policy Handbook Working Group [Page 67] + +RFC 1244 Site Security Handbook July 1991 + + + 5.3.1 Explicit + + First of all, any notification to either local or off-site + personnel must be explicit. This requires that any statement (be + it an electronic mail message, phone call, or fax) provides + information about the incident that is clear, concise, and fully + qualified. When you are notifying others that will help you to + handle an event, a "smoke screen" will only divide the effort and + create confusion. If a division of labor is suggested, it is + helpful to provide information to each section about what is being + accomplished in other efforts. This will not only reduce + duplication of effort, but allow people working on parts of the + problem to know where to obtain other information that would help + them resolve a part of the incident. + + 5.3.2 Factual + + Another important consideration when communicating about the + incident is to be factual. Attempting to hide aspects of the + incident by providing false or incomplete information may not only + prevent a successful resolution to the incident, but may even + worsen the situation. This is especially true when the press is + involved. When an incident severe enough to gain press attention + is ongoing, it is likely that any false information you provide + will not be substantiated by other sources. This will reflect + badly on the site and may create enough ill-will between the site + and the press to damage the site's public relations. + + 5.3.3 Choice of Language + + The choice of language used when notifying people about the + incident can have a profound effect on the way that information is + received. When you use emotional or inflammatory terms, you raise + the expectations of damage and negative outcomes of the incident. + It is important to remain calm both in written and spoken + notifications. + + Another issue associated with the choice of language is the + notification to non-technical or off-site personnel. It is + important to accurately describe the incident without undue alarm + or confusing messages. While it is more difficult to describe the + incident to a non-technical audience, it is often more important. + A non-technical description may be required for upper-level + management, the press, or law enforcement liaisons. The + importance of these notifications cannot be underestimated and may + make the difference between handling the incident properly and + escalating to some higher level of damage. + + + + +Site Security Policy Handbook Working Group [Page 68] + +RFC 1244 Site Security Handbook July 1991 + + + 5.3.4 Notification of Individuals + + o Point of Contact (POC) people (Technical, Administrative, + Response Teams, Investigative, Legal, Vendors, Service + providers), and which POCs are visible to whom. + o Wider community (users). + o Other sites that might be affected. + + Finally, there is the question of who should be notified during + and after the incident. There are several classes of individuals + that need to be considered for notification. These are the + technical personnel, administration, appropriate response teams + (such as CERT or CIAC), law enforcement, vendors, and other + service providers. These issues are important for the central + point of contact, since that is the person responsible for the + actual notification of others (see section 5.3.6 for further + information). A list of people in each of these categories is an + important time saver for the POC during an incident. It is much + more difficult to find an appropriate person during an incident + when many urgent events are ongoing. + + In addition to the people responsible for handling part of the + incident, there may be other sites affected by the incident (or + perhaps simply at risk from the incident). A wider community of + users may also benefit from knowledge of the incident. Often, a + report of the incident once it is closed out is appropriate for + publication to the wider user community. + + 5.3.5 Public Relations - Press Releases + + One of the most important issues to consider is when, who, and how + much to release to the general public through the press. There + are many issues to consider when deciding this particular issue. + First and foremost, if a public relations office exists for the + site, it is important to use this office as liaison to the press. + The public relations office is trained in the type and wording of + information released, and will help to assure that the image of + the site is protected during and after the incident (if possible). + A public relations office has the advantage that you can + communicate candidly with them, and provide a buffer between the + constant press attention and the need of the POC to maintain + control over the incident. + + If a public relations office is not available, the information + released to the press must be carefully considered. If the + information is sensitive, it may be advantageous to provide only + minimal or overview information to the press. It is quite + possible that any information provided to the press will be + + + +Site Security Policy Handbook Working Group [Page 69] + +RFC 1244 Site Security Handbook July 1991 + + + quickly reviewed by the perpetrator of the incident. As a + contrast to this consideration, it was discussed above that + misleading the press can often backfire and cause more damage than + releasing sensitive information. + + While it is difficult to determine in advance what level of detail + to provide to the press, some guidelines to keep in mind are: + + o Keep the technical level of detail low. Detailed + information about the incident may provide enough + information for copy-cat events or even damage the + site's ability to prosecute once the event is over. + o Keep the speculation out of press statements. + Speculation of who is causing the incident or the + motives are very likely to be in error and may cause + an inflamed view of the incident. + o Work with law enforcement professionals to assure that + evidence is protected. If prosecution is involved, + assure that the evidence collected is not divulged to + the press. + o Try not to be forced into a press interview before you are + prepared. The popular press is famous for the "2am" + interview, where the hope is to catch the interviewee off + guard and obtain information otherwise not available. + o Do not allow the press attention to detract from the + handling of the event. Always remember that the successful + closure of an incident is of primary importance. + + 5.3.6 Who Needs to Get Involved? + + There now exists a number of incident response teams (IRTs) such + as the CERT and the CIAC. (See sections 3.9.7.3.1 and 3.9.7.3.4.) + Teams exists for many major government agencies and large + corporations. If such a team is available for your site, the + notification of this team should be of primary importance during + the early stages of an incident. These teams are responsible for + coordinating computer security incidents over a range of sites and + larger entities. Even if the incident is believed to be contained + to a single site, it is possible that the information available + through a response team could help in closing out the incident. + + In setting up a site policy for incident handling, it may be + desirable to create an incident handling team (IHT), much like + those teams that already exist, that will be responsible for + handling computer security incidents for the site (or + organization). If such a team is created, it is essential that + communication lines be opened between this team and other IHTs. + Once an incident is under way, it is difficult to open a trusted + + + +Site Security Policy Handbook Working Group [Page 70] + +RFC 1244 Site Security Handbook July 1991 + + + dialogue between other IHTs if none has existed before. + +5.4 Response + + A major topic still untouched here is how to actually respond to an + event. The response to an event will fall into the general + categories of containment, eradication, recovery, and follow-up. + + Containment + + The purpose of containment is to limit the extent of an attack. + For example, it is important to limit the spread of a worm attack + on a network as quickly as possible. An essential part of + containment is decision making (i.e., determining whether to shut + a system down, to disconnect from a network, to monitor system or + network activity, to set traps, to disable functions such as + remote file transfer on a UNIX system, etc.). Sometimes this + decision is trivial; shut the system down if the system is + classified or sensitive, or if proprietary information is at risk! + In other cases, it is worthwhile to risk having some damage to the + system if keeping the system up might enable you to identify an + intruder. + + The third stage, containment, should involve carrying out + predetermined procedures. Your organization or site should, for + example, define acceptable risks in dealing with an incident, and + should prescribe specific actions and strategies accordingly. + Finally, notification of cognizant authorities should occur during + this stage. + + Eradication + + Once an incident has been detected, it is important to first think + about containing the incident. Once the incident has been + contained, it is now time to eradicate the cause. Software may be + available to help you in this effort. For example, eradication + software is available to eliminate most viruses which infect small + systems. If any bogus files have been created, it is time to + delete them at this point. In the case of virus infections, it is + important to clean and reformat any disks containing infected + files. Finally, ensure that all backups are clean. Many systems + infected with viruses become periodically reinfected simply + because people do not systematically eradicate the virus from + backups. + + Recovery + + Once the cause of an incident has been eradicated, the recovery + + + +Site Security Policy Handbook Working Group [Page 71] + +RFC 1244 Site Security Handbook July 1991 + + + phase defines the next stage of action. The goal of recovery is + to return the system to normal. In the case of a network-based + attack, it is important to install patches for any operating + system vulnerability which was exploited. + + Follow-up + + One of the most important stages of responding to incidents is + also the most often omitted---the follow-up stage. This stage is + important because it helps those involved in handling the incident + develop a set of "lessons learned" (see section 6.3) to improve + future performance in such situations. This stage also provides + information which justifies an organization's computer security + effort to management, and yields information which may be + essential in legal proceedings. + + The most important element of the follow-up stage is performing a + postmortem analysis. Exactly what happened, and at what times? + How well did the staff involved with the incident perform? What + kind of information did the staff need quickly, and how could they + have gotten that information as soon as possible? What would the + staff do differently next time? A follow-up report is valuable + because it provides a reference to be used in case of other + similar incidents. Creating a formal chronology of events + (including time stamps) is also important for legal reasons. + Similarly, it is also important to as quickly obtain a monetary + estimate of the amount of damage the incident caused in terms of + any loss of software and files, hardware damage, and manpower + costs to restore altered files, reconfigure affected systems, and + so forth. This estimate may become the basis for subsequent + prosecution activity by the FBI, the U.S. Attorney General's + Office, etc.. + + 5.4.1 What Will You Do? + + o Restore control. + o Relation to policy. + o Which level of service is needed? + o Monitor activity. + o Constrain or shut down system. + + 5.4.2 Consider Designating a "Single Point of Contact" + + When an incident is under way, a major issue is deciding who is in + charge of coordinating the activity of the multitude of players. + A major mistake that can be made is to have a number of "points of + contact" (POC) that are not pulling their efforts together. This + will only add to the confusion of the event, and will probably + + + +Site Security Policy Handbook Working Group [Page 72] + +RFC 1244 Site Security Handbook July 1991 + + + lead to additional confusion and wasted or ineffective effort. + + The single point of contact may or may not be the person "in + charge" of the incident. There are two distinct rolls to fill + when deciding who shall be the point of contact and the person in + charge of the incident. The person in charge will make decisions + as to the interpretation of policy applied to the event. The + responsibility for the handling of the event falls onto this + person. In contrast, the point of contact must coordinate the + effort of all the parties involved with handling the event. + + The point of contact must be a person with the technical expertise + to successfully coordinate the effort of the system managers and + users involved in monitoring and reacting to the attack. Often + the management structure of a site is such that the administrator + of a set of resources is not a technically competent person with + regard to handling the details of the operations of the computers, + but is ultimately responsible for the use of these resources. + + Another important function of the POC is to maintain contact with + law enforcement and other external agencies (such as the CIA, DoD, + U.S. Army, or others) to assure that multi-agency involvement + occurs. + + Finally, if legal action in the form of prosecution is involved, + the POC may be able to speak for the site in court. The + alternative is to have multiple witnesses that will be hard to + coordinate in a legal sense, and will weaken any case against the + attackers. A single POC may also be the single person in charge + of evidence collected, which will keep the number of people + accounting for evidence to a minimum. As a rule of thumb, the + more people that touch a potential piece of evidence, the greater + the possibility that it will be inadmissible in court. The + section below (Legal/Investigative) will provide more details for + consideration on this topic. + +5.5 Legal/Investigative + + 5.5.1 Establishing Contacts with Investigative Agencies + + It is important to establish contacts with personnel from + investigative agencies such as the FBI and Secret Service as soon + as possible, for several reasons. Local law enforcement and local + security offices or campus police organizations should also be + informed when appropriate. A primary reason is that once a major + attack is in progress, there is little time to call various + personnel in these agencies to determine exactly who the correct + point of contact is. Another reason is that it is important to + + + +Site Security Policy Handbook Working Group [Page 73] + +RFC 1244 Site Security Handbook July 1991 + + + cooperate with these agencies in a manner that will foster a good + working relationship, and that will be in accordance with the + working procedures of these agencies. Knowing the working + procedures in advance and the expectations of your point of + contact is a big step in this direction. For example, it is + important to gather evidence that will be admissible in a court of + law. If you don't know in advance how to gather admissible + evidence, your efforts to collect evidence during an incident are + likely to be of no value to the investigative agency with which + you deal. A final reason for establishing contacts as soon as + possible is that it is impossible to know the particular agency + that will assume jurisdiction in any given incident. Making + contacts and finding the proper channels early will make + responding to an incident go considerably more smoothly. + + If your organization or site has a legal counsel, you need to + notify this office soon after you learn that an incident is in + progress. At a minimum, your legal counsel needs to be involved + to protect the legal and financial interests of your site or + organization. There are many legal and practical issues, a few of + which are: + + 1. Whether your site or organization is willing to risk + negative publicity or exposure to cooperate with legal + prosecution efforts. + + 2. Downstream liability--if you leave a compromised system + as is so it can be monitored and another computer is damaged + because the attack originated from your system, your site or + organization may be liable for damages incurred. + + 3. Distribution of information--if your site or organization + distributes information about an attack in which another + site or organization may be involved or the vulnerability + in a product that may affect ability to market that + product, your site or organization may again be liable + for any damages (including damage of reputation). + + 4. Liabilities due to monitoring--your site or organization + may be sued if users at your site or elsewhere discover + that your site is monitoring account activity without + informing users. + + Unfortunately, there are no clear precedents yet on the + liabilities or responsibilities of organizations involved in a + security incident or who might be involved in supporting an + investigative effort. Investigators will often encourage + organizations to help trace and monitor intruders -- indeed, most + + + +Site Security Policy Handbook Working Group [Page 74] + +RFC 1244 Site Security Handbook July 1991 + + + investigators cannot pursue computer intrusions without extensive + support from the organizations involved. However, investigators + cannot provide protection from liability claims, and these kinds + of efforts may drag out for months and may take lots of effort. + + On the other side, an organization's legal council may advise + extreme caution and suggest that tracing activities be halted and + an intruder shut out of the system. This in itself may not + provide protection from liability, and may prevent investigators + from identifying anyone. + + The balance between supporting investigative activity and limiting + liability is tricky; you'll need to consider the advice of your + council and the damage the intruder is causing (if any) in making + your decision about what to do during any particular incident. + + Your legal counsel should also be involved in any decision to + contact investigative agencies when an incident occurs at your + site. The decision to coordinate efforts with investigative + agencies is most properly that of your site or organization. + Involving your legal counsel will also foster the multi-level + coordination between your site and the particular investigative + agency involved which in turn results in an efficient division of + labor. Another result is that you are likely to obtain guidance + that will help you avoid future legal mistakes. + + Finally, your legal counsel should evaluate your site's written + procedures for responding to incidents. It is essential to obtain + a "clean bill of health" from a legal perspective before you + actually carry out these procedures. + + 5.5.2 Formal and Informal Legal Procedures + + One of the most important considerations in dealing with + investigative agencies is verifying that the person who calls + asking for information is a legitimate representative from the + agency in question. Unfortunately, many well intentioned people + have unknowingly leaked sensitive information about incidents, + allowed unauthorized people into their systems, etc., because a + caller has masqueraded as an FBI or Secret Service agent. A + similar consideration is using a secure means of communication. + Because many network attackers can easily reroute electronic mail, + avoid using electronic mail to communicate with other agencies (as + well as others dealing with the incident at hand). Non-secured + phone lines (e.g., the phones normally used in the business world) + are also frequent targets for tapping by network intruders, so be + careful! + + + + +Site Security Policy Handbook Working Group [Page 75] + +RFC 1244 Site Security Handbook July 1991 + + + There is no established set of rules for responding to an incident + when the U.S. Federal Government becomes involved. Except by + court order, no agency can force you to monitor, to disconnect + from the network, to avoid telephone contact with the suspected + attackers, etc.. As discussed in section 5.5.1, you should + consult the matter with your legal counsel, especially before + taking an action that your organization has never taken. The + particular agency involved may ask you to leave an attacked + machine on and to monitor activity on this machine, for example. + Your complying with this request will ensure continued cooperation + of the agency--usually the best route towards finding the source + of the network attacks and, ultimately, terminating these attacks. + Additionally, you may need some information or a favor from the + agency involved in the incident. You are likely to get what you + need only if you have been cooperative. Of particular importance + is avoiding unnecessary or unauthorized disclosure of information + about the incident, including any information furnished by the + agency involved. The trust between your site and the agency + hinges upon your ability to avoid compromising the case the agency + will build; keeping "tight lipped" is imperative. + + Sometimes your needs and the needs of an investigative agency will + differ. Your site may want to get back to normal business by + closing an attack route, but the investigative agency may want you + to keep this route open. Similarly, your site may want to close a + compromised system down to avoid the possibility of negative + publicity, but again the investigative agency may want you to + continue monitoring. When there is such a conflict, there may be + a complex set of tradeoffs (e.g., interests of your site's + management, amount of resources you can devote to the problem, + jurisdictional boundaries, etc.). An important guiding principle + is related to what might be called "Internet citizenship" [22, + IAB89, 23] and its responsibilities. Your site can shut a system + down, and this will relieve you of the stress, resource demands, + and danger of negative exposure. The attacker, however, is likely + to simply move on to another system, temporarily leaving others + blind to the attacker's intention and actions until another path + of attack can be detected. Providing that there is no damage to + your systems and others, the most responsible course of action is + to cooperate with the participating agency by leaving your + compromised system on. This will allow monitoring (and, + ultimately, the possibility of terminating the source of the + threat to systems just like yours). On the other hand, if there + is damage to computers illegally accessed through your system, the + choice is more complicated: shutting down the intruder may prevent + further damage to systems, but might make it impossible to track + down the intruder. If there has been damage, the decision about + whether it is important to leave systems up to catch the intruder + + + +Site Security Policy Handbook Working Group [Page 76] + +RFC 1244 Site Security Handbook July 1991 + + + should involve all the organizations effected. Further + complicating the issue of network responsibility is the + consideration that if you do not cooperate with the agency + involved, you will be less likely to receive help from that agency + in the future. + +5.6 Documentation Logs + + When you respond to an incident, document all details related to the + incident. This will provide valuable information to yourself and + others as you try to unravel the course of events. Documenting all + details will ultimately save you time. If you don't document every + relevant phone call, for example, you are likely to forget a good + portion of information you obtain, requiring you to contact the + source of information once again. This wastes yours and others' + time, something you can ill afford. At the same time, recording + details will provide evidence for prosecution efforts, providing the + case moves in this direction. Documenting an incident also will help + you perform a final assessment of damage (something your management + as well as law enforcement officers will want to know), and will + provide the basis for a follow-up analysis in which you can engage in + a valuable "lessons learned" exercise. + + During the initial stages of an incident, it is often infeasible to + determine whether prosecution is viable, so you should document as if + you are gathering evidence for a court case. At a minimum, you + should record: + + o All system events (audit records). + o All actions you take (time tagged). + o All phone conversations (including the person with whom + you talked, the date and time, and the content of the + conversation). + + The most straightforward way to maintain documentation is keeping a + log book. This allows you to go to a centralized, chronological + source of information when you need it, instead of requiring you to + page through individual sheets of paper. Much of this information is + potential evidence in a court of law. Thus, when you initially + suspect that an incident will result in prosecution or when an + investigative agency becomes involved, you need to regularly (e.g., + every day) turn in photocopied, signed copies of your logbook (as + well as media you use to record system events) to a document + custodian who can store these copied pages in a secure place (e.g., a + safe). When you submit information for storage, you should in return + receive a signed, dated receipt from the document custodian. Failure + to observe these procedures can result in invalidation of any + evidence you obtain in a court of law. + + + +Site Security Policy Handbook Working Group [Page 77] + +RFC 1244 Site Security Handbook July 1991 + + +6. Establishing Post-Incident Procedures + +6.1 Overview + + In the wake of an incident, several actions should take place. These + actions can be summarized as follows: + + 1. An inventory should be taken of the systems' assets, + i.e., a careful examination should determine how the + system was affected by the incident, + + 2. The lessons learned as a result of the incident + should be included in revised security plan to + prevent the incident from re-occurring, + + 3. A new risk analysis should be developed in light of the + incident, + + 4. An investigation and prosecution of the individuals + who caused the incident should commence, if it is + deemed desirable. + + All four steps should provide feedback to the site security policy + committee, leading to prompt re-evaluation and amendment of the + current policy. + +6.2 Removing Vulnerabilities + + Removing all vulnerabilities once an incident has occurred is + difficult. The key to removing vulnerabilities is knowledge and + understanding of the breach. In some cases, it is prudent to remove + all access or functionality as soon as possible, and then restore + normal operation in limited stages. Bear in mind that removing all + access while an incident is in progress will obviously notify all + users, including the alleged problem users, that the administrators + are aware of a problem; this may have a deleterious effect on an + investigation. However, allowing an incident to continue may also + open the likelihood of greater damage, loss, aggravation, or + liability (civil or criminal). + + If it is determined that the breach occurred due to a flaw in the + systems' hardware or software, the vendor (or supplier) and the CERT + should be notified as soon as possible. Including relevant telephone + numbers (also electronic mail addresses and fax numbers) in the site + security policy is strongly recommended. To aid prompt + acknowledgment and understanding of the problem, the flaw should be + described in as much detail as possible, including details about how + to exploit the flaw. + + + +Site Security Policy Handbook Working Group [Page 78] + +RFC 1244 Site Security Handbook July 1991 + + + As soon as the breach has occurred, the entire system and all its + components should be considered suspect. System software is the most + probable target. Preparation is key to recovering from a possibly + tainted system. This includes checksumming all tapes from the vendor + using a checksum algorithm which (hopefully) is resistant to + tampering [10]. (See sections 3.9.4.1, 3.9.4.2.) Assuming original + vendor distribution tapes are available, an analysis of all system + files should commence, and any irregularities should be noted and + referred to all parties involved in handling the incident. It can be + very difficult, in some cases, to decide which backup tapes to + recover from; consider that the incident may have continued for + months or years before discovery, and that the suspect may be an + employee of the site, or otherwise have intimate knowledge or access + to the systems. In all cases, the pre-incident preparation will + determine what recovery is possible. At worst-case, restoration from + the original manufactures' media and a re-installation of the systems + will be the most prudent solution. + + Review the lessons learned from the incident and always update the + policy and procedures to reflect changes necessitated by the + incident. + + 6.2.1 Assessing Damage + + Before cleanup can begin, the actual system damage must be + discerned. This can be quite time consuming, but should lead into + some of the insight as to the nature of the incident, and aid + investigation and prosecution. It is best to compare previous + backups or original tapes when possible; advance preparation is + the key. If the system supports centralized logging (most do), go + back over the logs and look for abnormalities. If process + accounting and connect time accounting is enabled, look for + patterns of system usage. To a lesser extent, disk usage may shed + light on the incident. Accounting can provide much helpful + information in an analysis of an incident and subsequent + prosecution. + + 6.2.2 Cleanup + + Once the damage has been assessed, it is necessary to develop a + plan for system cleanup. In general, bringing up services in the + order of demand to allow a minimum of user inconvenience is the + best practice. Understand that the proper recovery procedures for + the system are extremely important and should be specific to the + site. + + It may be necessary to go back to the original distributed tapes + and recustomize the system. To facilitate this worst case + + + +Site Security Policy Handbook Working Group [Page 79] + +RFC 1244 Site Security Handbook July 1991 + + + scenario, a record of the original systems setup and each + customization change should be kept current with each change to + the system. + + 6.2.3 Follow up + + Once you believe that a system has been restored to a "safe" + state, it is still possible that holes and even traps could be + lurking in the system. In the follow-up stage, the system should + be monitored for items that may have been missed during the + cleanup stage. It would be prudent to utilize some of the tools + mentioned in section 3.9.8.2 (e.g., COPS) as a start. Remember, + these tools don't replace continual system monitoring and good + systems administration procedures. + + 6.2.4 Keep a Security Log + + As discussed in section 5.6, a security log can be most valuable + during this phase of removing vulnerabilities. There are two + considerations here; the first is to keep logs of the procedures + that have been used to make the system secure again. This should + include command procedures (e.g., shell scripts) that can be run + on a periodic basis to recheck the security. Second, keep logs of + important system events. These can be referenced when trying to + determine the extent of the damage of a given incident. + +6.3 Capturing Lessons Learned + + 6.3.1 Understand the Lesson + + After an incident, it is prudent to write a report describing the + incident, method of discovery, correction procedure, monitoring + procedure, and a summary of lesson learned. This will aid in the + clear understanding of the problem. Remember, it is difficult to + learn from an incident if you don't understand the source. + + 6.3.2 Resources + + 6.3.2.1 Other Security Devices, Methods + + Security is a dynamic, not static process. Sites are dependent + on the nature of security available at each site, and the array + of devices and methods that will help promote security. + Keeping up with the security area of the computer industry and + their methods will assure a security manager of taking + advantage of the latest technology. + + + + + +Site Security Policy Handbook Working Group [Page 80] + +RFC 1244 Site Security Handbook July 1991 + + + 6.3.2.2 Repository of Books, Lists, Information Sources + + Keep an on site collection of books, lists, information + sources, etc., as guides and references for securing the + system. Keep this collection up to date. Remember, as systems + change, so do security methods and problems. + + 6.3.2.3 Form a Subgroup + + Form a subgroup of system administration personnel that will be + the core security staff. This will allow discussions of + security problems and multiple views of the site's security + issues. This subgroup can also act to develop the site + security policy and make suggested changes as necessary to + ensure site security. + +6.4 Upgrading Policies and Procedures + + 6.4.1 Establish Mechanisms for Updating Policies, Procedures, + and Tools + + If an incident is based on poor policy, and unless the policy is + changed, then one is doomed to repeat the past. Once a site has + recovered from and incident, site policy and procedures should be + reviewed to encompass changes to prevent similar incidents. Even + without an incident, it would be prudent to review policies and + procedures on a regular basis. Reviews are imperative due to + today's changing computing environments. + + 6.4.2 Problem Reporting Procedures + + A problem reporting procedure should be implemented to describe, + in detail, the incident and the solutions to the incident. Each + incident should be reviewed by the site security subgroup to allow + understanding of the incident with possible suggestions to the + site policy and procedures. + +7. References + + [1] Quarterman, J., "The Matrix: Computer Networks and Conferencing + Systems Worldwide", Pg. 278, Digital Press, Bedford, MA, 1990. + + [2] Brand, R., "Coping with the Threat of Computer Security + Incidents: A Primer from Prevention through Recovery", R. Brand, + available on-line from: cert.sei.cmu.edu:/pub/info/primer, 8 June + 1990. + + [3] Fites, M., Kratz, P. and A. Brebner, "Control and Security of + + + +Site Security Policy Handbook Working Group [Page 81] + +RFC 1244 Site Security Handbook July 1991 + + + Computer Information Systems", Computer Science Press, 1989. + + [4] Johnson, D., and J. Podesta, "Formulating a Company Policy on + Access to and Use and Disclosure of Electronic Mail on Company + Computer Systems", Available from: The Electronic Mail + Association (EMA) 1555 Wilson Blvd, Suite 555, Arlington VA + 22209, (703) 522-7111, 22 October 1990. + + [5] Curry, D., "Improving the Security of Your UNIX System", SRI + International Report ITSTD-721-FR-90-21, April 1990. + + [6] Cheswick, B., "The Design of a Secure Internet Gateway", + Proceedings of the Summer Usenix Conference, Anaheim, CA, June + 1990. + + [7] Linn, J., "Privacy Enhancement for Internet Electronic Mail: Part + I -- Message Encipherment and Authentication Procedures", RFC + 1113, IAB Privacy Task Force, August 1989. + + [8] Kent, S., and J. Linn, "Privacy Enhancement for Internet + Electronic Mail: Part II -- Certificate-Based Key Management", + RFC 1114, IAB Privacy Task Force, August 1989. + + [9] Linn, J., "Privacy Enhancement for Internet Electronic Mail: Part + III -- Algorithms, Modes, and Identifiers", RFC 1115, IAB Privacy + Task Force, August 1989. + + [10] Merkle, R., "A Fast Software One Way Hash Function", Journal of + Cryptology, Vol. 3, No. 1. + + [11] Postel, J., "Internet Protocol - DARPA Internet Program Protocol + Specification", RFC 791, DARPA, September 1981. + + [12] Postel, J., "Transmission Control Protocol - DARPA Internet + Program Protocol Specification", RFC 793, DARPA, September 1981. + + [13] Postel, J., "User Datagram Protocol", RFC 768, USC/Information + Sciences Institute, 28 August 1980. + + [14] Mogul, J., "Simple and Flexible Datagram Access Controls for + UNIX-based Gateways", Digital Western Research Laboratory + Research Report 89/4, March 1989. + + [15] Bellovin, S., and M. Merritt, "Limitations of the Kerberos + Authentication System", Computer Communications Review, October + 1990. + + [16] Pfleeger, C., "Security in Computing", Prentice-Hall, Englewood + + + +Site Security Policy Handbook Working Group [Page 82] + +RFC 1244 Site Security Handbook July 1991 + + + Cliffs, N.J., 1989. + + [17] Parker, D., Swope, S., and B. Baker, "Ethical Conflicts: + Information and Computer Science, Technology and Business", QED + Information Sciences, Inc., Wellesley, MA. + + [18] Forester, T., and P. Morrison, "Computer Ethics: Tales and + Ethical Dilemmas in Computing", MIT Press, Cambridge, MA, 1990. + + [19] Postel, J., and J. Reynolds, "Telnet Protocol Specification", RFC + 854, USC/Information Sciences Institute, May 1983. + + [20] Postel, J., and J. Reynolds, "File Transfer Protocol", RFC 959, + USC/Information Sciences Institute, October 1985. + + [21] Postel, J., Editor, "IAB Official Protocol Standards", RFC 1200, + IAB, April 1991. + + [22] Internet Activities Board, "Ethics and the Internet", RFC 1087, + Internet Activities Board, January 1989. + + [23] Pethia, R., Crocker, S., and B. Fraser, "Policy Guidelines for + the Secure Operation of the Internet", CERT, TIS, CERT, RFC in + preparation. + + [24] Computer Emergency Response Team (CERT/CC), "Unauthorized + Password Change Requests", CERT Advisory CA-91:03, April 1991. + + [25] Computer Emergency Response Team (CERT/CC), "TELNET Breakin + Warning", CERT Advisory CA-89:03, August 1989. + + [26] CCITT, Recommendation X.509, "The Directory: Authentication + Framework", Annex C. + + [27] Farmer, D., and E. Spafford, "The COPS Security Checker System", + Proceedings of the Summer 1990 USENIX Conference, Anaheim, CA, + Pgs. 165-170, June 1990. + +8. Annotated Bibliography + + The intent of this annotated bibliography is to offer a + representative collection of resources of information that will help + the user of this handbook. It is meant provide a starting point for + further research in the security area. Included are references to + other sources of information for those who wish to pursue issues of + the computer security environment. + + + + + +Site Security Policy Handbook Working Group [Page 83] + +RFC 1244 Site Security Handbook July 1991 + + +8.1 Computer Law + + [ABA89] + American Bar Association, Section of Science and + Technology, "Guide to the Prosecution of Telecommunication + Fraud by the Use of Computer Crime Statutes", American Bar + Association, 1989. + + [BENDER] + Bender, D., "Computer Law: Evidence and Procedure", + M. Bender, New York, NY, 1978-present. + + Kept up to date with supplements. + Years covering 1978-1984 focuses on: Computer law, + evidence and procedures. The years 1984 to the current + focus on general computer law. Bibliographical + references and index included. + + [BLOOMBECKER] + Bloombecker, B., "Spectacular Computer Crimes", Dow Jones- + Irwin, Homewood, IL. 1990. + + [CCH] + Commerce Clearing House, "Guide to Computer Law", (Topical + Law Reports), Chicago, IL., 1989. + + Court cases and decisions rendered by federal and state + courts throughout the United States on federal and state + computer law. Includes Case Table and Topical Index. + + [CONLY] + Conly, C., "Organizing for Computer Crime Investigation and + Prosecution", U.S. Dept. of Justice, Office of Justice + Programs, Under Contract Number OJP-86-C-002, National + Institute of Justice, Washington, DC, July 1989. + + [FENWICK] + Fenwick, W., Chair, "Computer Litigation, 1985: Trial + Tactics and Techniques", Litigation Course Handbook + Series No. 280, Prepared for distribution at the + Computer Litigation, 1985: Trial Tactics and + Techniques Program, February-March 1985. + + [GEMIGNANI] + Gemignani, M., "Viruses and Criminal Law", Communications + of the ACM, Vol. 32, No. 6, Pgs. 669-671, June 1989. + + + + + +Site Security Policy Handbook Working Group [Page 84] + +RFC 1244 Site Security Handbook July 1991 + + + [HUBAND] + Huband, F., and R. Shelton, Editors, "Protection of + Computer Systems and Software: New Approaches for Combating + Theft of Software and Unauthorized Intrusion", Papers + presented at a workshop sponsored by the National Science + Foundation, 1986. + + [MCEWEN] + McEwen, J., "Dedicated Computer Crime Units", Report + Contributors: D. Fester and H. Nugent, Prepared for the + National Institute of Justice, U.S. Department of Justice, + by Institute for Law and Justice, Inc., under contract number + OJP-85-C-006, Washington, DC, 1989. + + [PARKER] + Parker, D., "Computer Crime: Criminal Justice Resource + Manual", U.S. Dept. of Justice, National Institute of Justice, + Office of Justice Programs, Under Contract Number + OJP-86-C-002, Washington, D.C., August 1989. + + [SHAW] + Shaw, E., Jr., "Computer Fraud and Abuse Act of 1986, + Congressional Record (3 June 1986), Washington, D.C., + 3 June 1986. + + [TRIBLE] + Trible, P., "The Computer Fraud and Abuse Act of 1986", + U.S. Senate Committee on the Judiciary, 1986. + + +8.2 Computer Security + + [CAELLI] + Caelli, W., Editor, "Computer Security in the Age of + Information", Proceedings of the Fifth IFIP International + Conference on Computer Security, IFIP/Sec '88. + + [CARROLL] + Carroll, J., "Computer Security", 2nd Edition, Butterworth + Publishers, Stoneham, MA, 1987. + + [COOPER] + Cooper, J., "Computer and Communications Security: + Strategies for the 1990s", McGraw-Hill, 1989. + + [BRAND] + Brand, R., "Coping with the Threat of Computer Security + Incidents: A Primer from Prevention through Recovery", + + + +Site Security Policy Handbook Working Group [Page 85] + +RFC 1244 Site Security Handbook July 1991 + + + R. Brand, 8 June 1990. + + As computer security becomes a more important issue in + modern society, it begins to warrant a systematic approach. + The vast majority of the computer security problems and the + costs associated with them can be prevented with simple + inexpensive measures. The most important and cost + effective of these measures are available in the prevention + and planning phases. These methods are presented in this + paper, followed by a simplified guide to incident + handling and recovery. Available on-line from: + cert.sei.cmu.edu:/pub/info/primer. + + [CHESWICK] + Cheswick, B., "The Design of a Secure Internet Gateway", + Proceedings of the Summer Usenix Conference, Anaheim, CA, + June 1990. + + Brief abstract (slight paraphrase from the original + abstract): AT&T maintains a large internal Internet that + needs to be protected from outside attacks, while + providing useful services between the two. + This paper describes AT&T's Internet gateway. This + gateway passes mail and many of the common Internet + services between AT&T internal machines and the Internet. + This is accomplished without IP connectivity using a pair + of machines: a trusted internal machine and an untrusted + external gateway. These are connected by a private link. + The internal machine provides a few carefully-guarded + services to the external gateway. This configuration + helps protect the internal internet even if the external + machine is fully compromised. + + This is a very useful and interesting design. Most + firewall gateway systems rely on a system that, if + compromised, could allow access to the machines behind + the firewall. Also, most firewall systems require users + who want access to Internet services to have accounts on + the firewall machine. AT&T's design allows AT&T internal + internet users access to the standard services of TELNET and + FTP from their own workstations without accounts on + the firewall machine. A very useful paper that shows + how to maintain some of the benefits of Internet + connectivity while still maintaining strong + security. + + + + + + +Site Security Policy Handbook Working Group [Page 86] + +RFC 1244 Site Security Handbook July 1991 + + + [CURRY] + Curry, D., "Improving the Security of Your UNIX System", + SRI International Report ITSTD-721-FR-90-21, April 1990. + + This paper describes measures that you, as a system + administrator can take to make your UNIX system(s) more + secure. Oriented primarily at SunOS 4.x, most of the + information covered applies equally well to any Berkeley + UNIX system with or without NFS and/or Yellow Pages (NIS). + Some of the information can also be applied to System V, + although this is not a primary focus of the paper. A very + useful reference, this is also available on the Internet in + various locations, including the directory + cert.sei.cmu.edu:/pub/info. + + [FITES] + Fites, M., Kratz, P. and A. Brebner, "Control and + Security of Computer Information Systems", Computer Science + Press, 1989. + + This book serves as a good guide to the issues encountered + in forming computer security policies and procedures. The + book is designed as a textbook for an introductory course + in information systems security. + + The book is divided into five sections: Risk Management (I), + Safeguards: security and control measures, organizational + and administrative (II), Safeguards: Security and Control + Measures, Technical (III), Legal Environment and + Professionalism (IV), and CICA Computer Control Guidelines + (V). + + The book is particularly notable for its straight-forward + approach to security, emphasizing that common sense is the + first consideration in designing a security program. The + authors note that there is a tendency to look to more + technical solutions to security problems while overlooking + organizational controls which are often cheaper and much + more effective. 298 pages, including references and index. + + [GARFINKEL] + Garfinkel, S, and E. Spafford, "Practical Unix Security", + O'Reilly & Associates, ISBN 0-937175-72-2, May 1991. + + Approx 450 pages, $29.95. Orders: 1-800-338-6887 + (US & Canada), 1-707-829-0515 (Europe), email: nuts@ora.com + + This is one of the most useful books available on Unix + + + +Site Security Policy Handbook Working Group [Page 87] + +RFC 1244 Site Security Handbook July 1991 + + + security. The first part of the book covers standard Unix + and Unix security basics, with particular emphasis on + passwords. The second section covers enforcing security on + the system. Of particular interest to the Internet user are + the sections on network security, which address many + of the common security problems that afflict Internet Unix + users. Four chapters deal with handling security incidents, + and the book concludes with discussions of encryption, + physical security, and useful checklists and lists of + resources. The book lives up to its name; it is filled with + specific references to possible security holes, files to + check, and things to do to improve security. This + book is an excellent complement to this handbook. + + [GREENIA90] + Greenia, M., "Computer Security Information Sourcebook", + Lexikon Services, Sacramento, CA, 1989. + + A manager's guide to computer security. Contains a + sourcebook of key reference materials including + access control and computer crimes bibliographies. + + [HOFFMAN] + Hoffman, L., "Rogue Programs: Viruses, Worms, and + Trojan Horses", Van Nostrand Reinhold, NY, 1990. + (384 pages, includes bibliographical references and index.) + + [JOHNSON] + Johnson, D., and J. Podesta, "Formulating A Company Policy + on Access to and Use and Disclosure of Electronic Mail on + Company Computer Systems". + + A white paper prepared for the EMA, written by two experts + in privacy law. Gives background on the issues, and presents + some policy options. + + Available from: The Electronic Mail Association (EMA) + 1555 Wilson Blvd, Suite 555, Arlington, VA, 22209. + (703) 522-7111. + + [KENT] + Kent, Stephen, "E-Mail Privacy for the Internet: New Software + and Strict Registration Procedures will be Implemented this + Year", Business Communications Review, Vol. 20, No. 1, + Pg. 55, 1 January 1990. + + + + + + +Site Security Policy Handbook Working Group [Page 88] + +RFC 1244 Site Security Handbook July 1991 + + + [LU] + Lu, W., and M. Sundareshan, "Secure Communication in + Internet Environments: A Hierachical Key Management Scheme + for End-to-End Encryption", IEEE Transactions on + Communications, Vol. 37, No. 10, Pg. 1014, 1 October 1989. + + [LU1] + Lu, W., and M. Sundareshan, "A Model for Multilevel Security + in Computer Networks", IEEE Transactions on Software + Engineering, Vol. 16, No. 6, Page 647, 1 June 1990. + + [NSA] + National Security Agency, "Information Systems Security + Products and Services Catalog", NSA, Quarterly Publication. + + NSA's catalogue contains chapter on: Endorsed Cryptographic + Products List; NSA Endorsed Data Encryption Standard (DES) + Products List; Protected Services List; Evaluated Products + List; Preferred Products List; and Endorsed Tools List. + + The catalogue is available from the Superintendent of + Documents, U.S. Government Printing Office, Washington, + D.C. One may place telephone orders by calling: + (202) 783-3238. + + [OTA] + United States Congress, Office of Technology Assessment, + "Defending Secrets, Sharing Data: New Locks and Keys for + Electronic Information", OTA-CIT-310, October 1987. + + This report, prepared for congressional committee considering + Federal policy on the protection of electronic information, is + interesting because of the issues it raises regarding the + impact of technology used to protect information. It also + serves as a reasonable introduction to the various encryption + and information protection mechanisms. 185 pages. Available + from the U.S. Government Printing Office. + + [PALMER] + Palmer, I., and G. Potter, "Computer Security Risk + Management", Van Nostrand Reinhold, NY, 1989. + + [PFLEEGER] + Pfleeger, C., "Security in Computing", Prentice-Hall, + Englewood Cliffs, NJ, 1989. + + A general textbook in computer security, this book provides an + excellent and very readable introduction to classic computer + + + +Site Security Policy Handbook Working Group [Page 89] + +RFC 1244 Site Security Handbook July 1991 + + + security problems and solutions, with a particular emphasis on + encryption. The encryption coverage serves as a good + introduction to the subject. Other topics covered include + building secure programs and systems, security of database, + personal computer security, network and communications + security, physical security, risk analysis and security + planning, and legal and ethical issues. 538 pages including + index and bibliography. + + [SHIREY] + Shirey, R., "Defense Data Network Security Architecture", + Computer Communication Review, Vol. 20, No. 2, Page 66, + 1 April 1990. + + [SPAFFORD] + Spafford, E., Heaphy, K., and D. Ferbrache, "Computer + Viruses: Dealing with Electronic Vandalism and Programmed + Threats", ADAPSO, 1989. (109 pages.) + + This is a good general reference on computer viruses and + related concerns. In addition to describing viruses in + some detail, it also covers more general security issues, + legal recourse in case of security problems, and includes + lists of laws, journals focused on computers security, + and other security-related resources. + + Available from: ADAPSO, 1300 N. 17th St, Suite 300, + Arlington VA 22209. (703) 522-5055. + + [STOLL88] + Stoll, C., "Stalking the Wily Hacker", Communications + of the ACM, Vol. 31, No. 5, Pgs. 484-497, ACM, + New York, NY, May 1988. + + This article describes some of the technical means used + to trace the intruder that was later chronicled in + "Cuckoo's Egg" (see below). + + [STOLL89] + Stoll, C., "The Cuckoo's Egg", ISBN 00385-24946-2, + Doubleday, 1989. + + Clifford Stoll, an astronomer turned UNIX System + Administrator, recounts an exciting, true story of how he + tracked a computer intruder through the maze of American + military and research networks. This book is easy to + understand and can serve as an interesting introduction to + the world of networking. Jon Postel says in a book review, + + + +Site Security Policy Handbook Working Group [Page 90] + +RFC 1244 Site Security Handbook July 1991 + + + "[this book] ... is absolutely essential reading for anyone + that uses or operates any computer connected to the Internet + or any other computer network." + + [VALLA] + Vallabhaneni, S., "Auditing Computer Security: A Manual with + Case Studies", Wiley, New York, NY, 1989. + + +8.3 Ethics + + [CPSR89] + Computer Professionals for Social Responsibility, "CPSR + Statement on the Computer Virus", CPSR, Communications of the + ACM, Vol. 32, No. 6, Pg. 699, June 1989. + + This memo is a statement on the Internet Computer Virus + by the Computer Professionals for Social Responsibility + (CPSR). + + [DENNING] + Denning, Peter J., Editor, "Computers Under Attack: + Intruders, Worms, and Viruses", ACM Press, 1990. + + A collection of 40 pieces divided into six sections: the + emergence of worldwide computer networks, electronic breakins, + worms, viruses, counterculture (articles examining the world + of the "hacker"), and finally a section discussing social, + legal, and ethical considerations. + + A thoughtful collection that addresses the phenomenon of + attacks on computers. This includes a number of previously + published articles and some new ones. The previously + published ones are well chosen, and include some references + that might be otherwise hard to obtain. This book is a key + reference to computer security threats that have generated + much of the concern over computer security in recent years. + + [ERMANN] + Ermann, D., Williams, M., and C. Gutierrez, Editors, + "Computers, Ethics, and Society", Oxford University Press, + NY, 1990. (376 pages, includes bibliographical references). + + [FORESTER] + Forester, T., and P. Morrison, "Computer Ethics: Tales and + Ethical Dilemmas in Computing", MIT Press, Cambridge, MA, + 1990. (192 pages including index.) + + + + +Site Security Policy Handbook Working Group [Page 91] + +RFC 1244 Site Security Handbook July 1991 + + + From the preface: "The aim of this book is two-fold: (1) to + describe some of the problems created by society by computers, + and (2) to show how these problems present ethical dilemmas + for computers professionals and computer users. + + The problems created by computers arise, in turn, from two + main sources: from hardware and software malfunctions and + from misuse by human beings. We argue that computer systems + by their very nature are insecure, unreliable, and + unpredictable -- and that society has yet to come to terms + with the consequences. We also seek to show how society + has become newly vulnerable to human misuse of computers in + the form of computer crime, software theft, hacking, the + creation of viruses, invasions of privacy, and so on." + + The eight chapters include "Computer Crime", "Software + Theft", "Hacking and Viruses", "Unreliable Computers", + "The Invasion of Privacy", "AI and Expert Systems", + and "Computerizing the Workplace." Includes extensive + notes on sources and an index. + + [GOULD] + Gould, C., Editor, "The Information Web: Ethical and Social + Implications of Computer Networking", Westview Press, + Boulder, CO, 1989. + + [IAB89] + Internet Activities Board, "Ethics and the Internet", + RFC 1087, IAB, January 1989. Also appears in the + Communications of the ACM, Vol. 32, No. 6, Pg. 710, + June 1989. + + This memo is a statement of policy by the Internet + Activities Board (IAB) concerning the proper use of + the resources of the Internet. Available on-line on + host ftp.nisc.sri.com, directory rfc, filename rfc1087.txt. + Also available on host nis.nsf.net, directory RFC, + filename RFC1087.TXT-1. + + [MARTIN] + Martin, M., and R. Schinzinger, "Ethics in Engineering", + McGraw Hill, 2nd Edition, 1989. + + [MIT89] + Massachusetts Institute of Technology, "Teaching Students + About Responsible Use of Computers", MIT, 1985-1986. Also + reprinted in the Communications of the ACM, Vol. 32, No. 6, + Pg. 704, Athena Project, MIT, June 1989. + + + +Site Security Policy Handbook Working Group [Page 92] + +RFC 1244 Site Security Handbook July 1991 + + + This memo is a statement of policy by the Massachusetts + Institute of Technology (MIT) on the responsible use + of computers. + + [NIST] + National Institute of Standards and Technology, "Computer + Viruses and Related Threats: A Management Guide", NIST + Special Publication 500-166, August 1989. + + [NSF88] + National Science Foundation, "NSF Poses Code of Networking + Ethics", Communications of the ACM, Vol. 32, No. 6, Pg. 688, + June 1989. Also appears in the minutes of the regular + meeting of the Division Advisory Panel for Networking and + Communications Research and Infrastructure, Dave Farber, + Chair, November 29-30, 1988. + + This memo is a statement of policy by the National Science + Foundation (NSF) concerning the ethical use of the Internet. + + [PARKER90] + Parker, D., Swope, S., and B. Baker, "Ethical Conflicts: + Information and Computer Science, Technology and Business", + QED Information Sciences, Inc., Wellesley, MA. (245 pages). + + Additional publications on Ethics: + + The University of New Mexico (UNM) + + The UNM has a collection of ethics documents. Included are + legislation from several states and policies from many + institutions. + + Access is via FTP, IP address ariel.umn.edu. Look in the + directory /ethics. + + +8.4 The Internet Worm + + [BROCK] + Brock, J., "November 1988 Internet Computer Virus and the + Vulnerability of National Telecommunications Networks to + Computer Viruses", GAO/T-IMTEC-89-10, Washington, DC, + 20 July 1989. + + Testimonial statement of Jack L. Brock, Director, U. S. + Government Information before the Subcommittee on + Telecommunications and Finance, Committee on Energy and + + + +Site Security Policy Handbook Working Group [Page 93] + +RFC 1244 Site Security Handbook July 1991 + + + Commerce, House of Representatives. + + [EICHIN89] + Eichin, M., and J. Rochlis, "With Microscope and Tweezers: + An Analysis of the Internet Virus of November 1988", + Massachusetts Institute of Technology, February 1989. + + Provides a detailed dissection of the worm program. The + paper discusses the major points of the worm program then + reviews strategies, chronology, lessons and open issues, + Acknowledgments; also included are a detailed appendix + on the worm program subroutine by subroutine, an + appendix on the cast of characters, and a reference section. + + [EISENBERG89] + Eisenberg, T., D. Gries, J. Hartmanis, D. Holcomb, + M. Lynn, and T. Santoro, "The Computer Worm", Cornell + University, 6 February 1989. + + A Cornell University Report presented to the Provost of the + University on 6 February 1989 on the Internet Worm. + + [GAO] + U.S. General Accounting Office, "Computer Security - Virus + Highlights Need for Improved Internet Management", United + States General Accounting Office, Washington, DC, 1989. + + This 36 page report (GAO/IMTEC-89-57), by the U.S. + Government Accounting Office, describes the Internet worm + and its effects. It gives a good overview of the various + U.S. agencies involved in the Internet today and their + concerns vis-a-vis computer security and networking. + + Available on-line on host nnsc.nsf.net, directory + pub, filename GAO_RPT; and on nis.nsf.net, directory nsfnet, + filename GAO_RPT.TXT. + + [REYNOLDS89] + The Helminthiasis of the Internet, RFC 1135, + USC/Information Sciences Institute, Marina del Rey, + CA, December 1989. + + This report looks back at the helminthiasis (infestation + with, or disease caused by parasitic worms) of the + Internet that was unleashed the evening of 2 November 1988. + This document provides a glimpse at the infection,its + festering, and cure. The impact of the worm on the Internet + community, ethics statements, the role of the news media, + + + +Site Security Policy Handbook Working Group [Page 94] + +RFC 1244 Site Security Handbook July 1991 + + + crime in the computer world, and future prevention is + discussed. A documentation review presents four publications + that describe in detail this particular parasitic computer + program. Reference and bibliography sections are also + included. Available on-line on host ftp.nisc.sri.com + directory rfc, filename rfc1135.txt. Also available on + host nis.nsf.net, directory RFC, filename RFC1135.TXT-1. + + [SEELEY89] + Seeley, D., "A Tour of the Worm", Proceedings of 1989 + Winter USENIX Conference, Usenix Association, San Diego, CA, + February 1989. + + Details are presented as a "walk thru" of this particular + worm program. The paper opened with an abstract, + introduction, detailed chronology of events upon the + discovery of the worm, an overview, the internals of the + worm, personal opinions, and conclusion. + + [SPAFFORD88] + Spafford, E., "The Internet Worm Program: An + Analysis", Computer Communication Review, Vol. 19, + No. 1, ACM SIGCOM, January 1989. Also issued as Purdue + CS Technical Report CSD-TR-823, 28 November 1988. + + Describes the infection of the Internet as a worm + program that exploited flaws in utility programs in + UNIX based systems. The report gives a detailed + description of the components of the worm program: + data and functions. Spafford focuses his study on two + completely independent reverse-compilations of the + worm and a version disassembled to VAX assembly language. + + [SPAFFORD89] + Spafford, G., "An Analysis of the Internet Worm", + Proceedings of the European Software Engineering + Conference 1989, Warwick England, September 1989. + Proceedings published by Springer-Verlag as: Lecture + Notes in Computer Science #387. Also issued + as Purdue Technical Report #CSD-TR-933. + + +8.5 National Computer Security Center (NCSC) + + All NCSC publications, approved for public release, are available + from the NCSC Superintendent of Documents. + + NCSC = National Computer Security Center + + + +Site Security Policy Handbook Working Group [Page 95] + +RFC 1244 Site Security Handbook July 1991 + + + 9800 Savage Road + Ft Meade, MD 20755-6000 + + CSC = Computer Security Center: + an older name for the NCSC + + NTISS = National Telecommunications and + Information Systems Security + NTISS Committee, National Security Agency + Ft Meade, MD 20755-6000 + + [CSC] + Department of Defense, "Password Management Guideline", + CSC-STD-002-85, 12 April 1985, 31 pages. + + The security provided by a password system depends on + the passwords being kept secret at all times. Thus, a + password is vulnerable to compromise whenever it is used, + stored, or even known. In a password-based authentication + mechanism implemented on an ADP system, passwords are + vulnerable to compromise due to five essential aspects + of the password system: 1) a password must be initially + assigned to a user when enrolled on the ADP system; + 2) a user's password must be changed periodically; + 3) the ADP system must maintain a 'password + database'; 4) users must remember their passwords; and + 5) users must enter their passwords into the ADP system at + authentication time. This guideline prescribes steps to be + taken to minimize the vulnerability of passwords in each of + these circumstances. + + [NCSC1] + NCSC, "A Guide to Understanding AUDIT in Trusted Systems", + NCSC-TG-001, Version-2, 1 June 1988, 25 pages. + + Audit trails are used to detect and deter penetration of + a computer system and to reveal usage that identifies + misuse. At the discretion of the auditor, audit trails + may be limited to specific events or may encompass all of + the activities on a system. Although not required by + the criteria, it should be possible for the target of the + audit mechanism to be either a subject or an object. That + is to say, the audit mechanism should be capable of + monitoring every time John accessed the system as well as + every time the nuclear reactor file was accessed; and + likewise every time John accessed the nuclear reactor + file. + + + + +Site Security Policy Handbook Working Group [Page 96] + +RFC 1244 Site Security Handbook July 1991 + + + [NCSC2] + NCSC, "A Guide to Understanding DISCRETIONARY ACCESS CONTROL + in Trusted Systems", NCSC-TG-003, Version-1, 30 September + 1987, 29 pages. + + Discretionary control is the most common type of access + control mechanism implemented in computer systems today. + The basis of this kind of security is that an individual + user, or program operating on the user's behalf, is + allowed to specify explicitly the types of access other + users (or programs executing on their behalf) may have to + information under the user's control. [...] Discretionary + controls are not a replacement for mandatory controls. In + any environment in which information is protected, + discretionary security provides for a finer granularity of + control within the overall constraints of the mandatory + policy. + + [NCSC3] + NCSC, "A Guide to Understanding CONFIGURATION MANAGEMENT + in Trusted Systems", NCSC-TG-006, Version-1, 28 March 1988, + 31 pages. + + Configuration management consists of four separate tasks: + identification, control, status accounting, and auditing. + For every change that is made to an automated data + processing (ADP) system, the design and requirements of the + changed version of the system should be identified. The + control task of configuration management is performed + by subjecting every change to documentation, hardware, and + software/firmware to review and approval by an authorized + authority. Configuration status accounting is responsible + for recording and reporting on the configuration of the + product throughout the change. Finally, though the process + of a configuration audit, the completed change can be + verified to be functionally correct, and for trusted + systems, consistent with the security policy of the system. + + [NTISS] + NTISS, "Advisory Memorandum on Office Automation Security + Guideline", NTISSAM CONPUSEC/1-87, 16 January 1987, + 58 pages. + + This document provides guidance to users, managers, security + officers, and procurement officers of Office Automation + Systems. Areas addressed include: physical security, + personnel security, procedural security, hardware/software + security, emanations security (TEMPEST), and communications + + + +Site Security Policy Handbook Working Group [Page 97] + +RFC 1244 Site Security Handbook July 1991 + + + security for stand-alone OA Systems, OA Systems + used as terminals connected to mainframe computer systems, + and OA Systems used as hosts in a Local Area Network (LAN). + Differentiation is made between those Office Automation + Systems equipped with removable storage media only (e.g., + floppy disks, cassette tapes, removable hard disks) and + those Office Automation Systems equipped with fixed media + (e.g., Winchester disks). + +Additional NCSC Publications: + + [NCSC4] + National Computer Security Center, "Glossary of Computer + Security Terms", NCSC-TG-004, NCSC, 21 October 1988. + + [NCSC5] + National Computer Security Center, "Trusted + Computer System Evaluation Criteria", DoD 5200.28-STD, + CSC-STD-001-83, NCSC, December 1985. + + [NCSC7] + National Computer Security Center, "Guidance for + Applying the Department of Defense Trusted Computer System + Evaluation Criteria in Specific Environments", + CSC-STD-003-85, NCSC, 25 June 1985. + + [NCSC8] + National Computer Security Center, "Technical Rationale + Behind CSC-STD-003-85: Computer Security Requirements", + CSC-STD-004-85, NCSC, 25 June 85. + + [NCSC9] + National Computer Security Center, "Magnetic Remanence + Security Guideline", CSC-STD-005-85, NCSC, 15 November 1985. + + This guideline is tagged as a "For Official Use Only" + exemption under Section 6, Public Law 86-36 (50 U.S. Code + 402). Distribution authorized of U.S. Government agencies + and their contractors to protect unclassified technical, + operational, or administrative data relating to operations + of the National Security Agency. + + [NCSC10] + National Computer Security Center, "Guidelines for Formal + Verification Systems", Shipping list no.: 89-660-P, The + Center, Fort George G. Meade, MD, 1 April 1990. + + + + + +Site Security Policy Handbook Working Group [Page 98] + +RFC 1244 Site Security Handbook July 1991 + + + [NCSC11] + National Computer Security Center, "Glossary of Computer + Security Terms", Shipping list no.: 89-254-P, The Center, + Fort George G. Meade, MD, 21 October 1988. + + [NCSC12] + National Computer Security Center, "Trusted UNIX Working + Group (TRUSIX) rationale for selecting access control + list features for the UNIX system", Shipping list no.: + 90-076-P, The Center, Fort George G. Meade, MD, 1990. + + [NCSC13] + National Computer Security Center, "Trusted Network + Interpretation", NCSC-TG-005, NCSC, 31 July 1987. + + [NCSC14] + Tinto, M., "Computer Viruses: Prevention, Detection, and + Treatment", National Computer Security Center C1 + Technical Report C1-001-89, June 1989. + + [NCSC15] + National Computer Security Conference, "12th National + Computer Security Conference: Baltimore Convention Center, + Baltimore, MD, 10-13 October, 1989: Information Systems + Security, Solutions for Today - Concepts for Tomorrow", + National Institute of Standards and National Computer + Security Center, 1989. + + +8.6 Security Checklists + + [AUCOIN] + Aucoin, R., "Computer Viruses: Checklist for Recovery", + Computers in Libraries, Vol. 9, No. 2, Pg. 4, + 1 February 1989. + + [WOOD] + Wood, C., Banks, W., Guarro, S., Garcia, A., Hampel, V., + and H. Sartorio, "Computer Security: A Comprehensive Controls + Checklist", John Wiley and Sons, Interscience Publication, + 1987. + + +8.7 Additional Publications + + Defense Data Network's Network Information Center (DDN NIC) + + The DDN NIC maintains DDN Security bulletins and DDN Management + + + +Site Security Policy Handbook Working Group [Page 99] + +RFC 1244 Site Security Handbook July 1991 + + + bulletins online on the machine: NIC.DDN.MIL. They are available + via anonymous FTP. The DDN Security bulletins are in the + directory: SCC, and the DDN Management bulletins are in the + directory: DDN-NEWS. + + For additional information, you may send a message to: + NIC@NIC.DDN.MIL, or call the DDN NIC at: 1-800-235-3155. + + [DDN88] + Defense Data Network, "BSD 4.2 and 4.3 Software Problem + Resolution", DDN MGT Bulletin #43, DDN Network Information + Center, 3 November 1988. + + A Defense Data Network Management Bulletin announcement + on the 4.2bsd and 4.3bsd software fixes to the Internet + worm. + + [DDN89] + DCA DDN Defense Communications System, "DDN Security + Bulletin 03", DDN Security Coordination Center, + 17 October 1989. + + IEEE Proceedings + + [IEEE] + "Proceedings of the IEEE Symposium on Security + and Privacy", published annually. + + IEEE Proceedings are available from: + + Computer Society of the IEEE + P.O. Box 80452 + Worldway Postal Center + Los Angeles, CA 90080 + + Other Publications: + + Computer Law and Tax Report + Computers and Security + Security Management Magazine + Journal of Information Systems Management + Data Processing & Communications Security + SIG Security, Audit & Control Review + + + + + + + + +Site Security Policy Handbook Working Group [Page 100] + +RFC 1244 Site Security Handbook July 1991 + + +9. Acknowledgments + + Thanks to the SSPHWG's illustrious "Outline Squad", who assembled at + USC/Information Sciences Institute on 12-June-90: Ray Bates (ISI), + Frank Byrum (DEC), Michael A. Contino (PSU), Dave Dalva (Trusted + Information Systems, Inc.), Jim Duncan (Penn State Math Department), + Bruce Hamilton (Xerox), Sean Kirkpatrick (Unisys), Tom Longstaff + (CIAC/LLNL), Fred Ostapik (SRI/NIC), Keith Pilotti (SAIC), and Bjorn + Satdeva (/sys/admin, inc.). + + Many thanks to Rich Pethia and the Computer Emergency Response Team + (CERT); much of the work by Paul Holbrook was done while he was + working for CERT. Rich also provided a very thorough review of this + document. Thanks also to Jon Postel and USC/Information Sciences + Institute for contributing facilities and moral support to this + effort. + + Last, but NOT least, we would like to thank members of the SSPHWG and + Friends for their additional contributions: Vint Cerf (CNRI), + Dave Grisham (UNM), Nancy Lee Kirkpatrick (Typist Extraordinaire), + Chris McDonald (WSMR), H. Craig McKee (Mitre), Gene Spafford (Purdue), + and Aileen Yuan (Mitre). + +10. Security Considerations + + If security considerations had not been so widely ignored in the + Internet, this memo would not have been possible. + +11. Authors' Addresses + + J. Paul Holbrook + CICNet, Inc. + 2901 Hubbard + Ann Arbor, MI 48105 + + Phone: (313) 998-7680 + EMail: holbrook@cic.net + + + Joyce K. Reynolds + University of Southern California + Information Sciences Institute + 4676 Admiralty Way + Marina del Rey, CA 90292 + + Phone: (213) 822-1511 + EMail: JKREY@ISI.EDU + + + + +Site Security Policy Handbook Working Group [Page 101] +
\ No newline at end of file |