5.2. Defining Security Baselines

One of the first steps in developing a secure environment is to develop a baseline of the minimum security needs of your organization. A security baseline defines the level of security that will be implemented and maintained. You can choose to set a low baseline by implementing next to no security or a high baseline that doesn't allow users to make any changes at all to the network or their systems. In practice, most implementations fall between the two extremes; you must determine what is best for your organization.

The security baseline, which can also be called a performance baseline, provides the input needed to design, implement, and support a secure network. Developing the baseline includes gathering data on the specific security implementation of the systems with which you'll be working.

One of the newest standards for security is Common Criteria (CC). (As of this writing, the latest version of the standard is 3.1, and it's available for viewing at http://www.commoncriteriaportal.org. The website also maintains a registry of products certified by CC.) This document is a joint effort between Canada, France, Germany, the Netherlands, the United Kingdom, and the United States. The standard outlines a comprehensive set of evaluation criteria, broken down into seven Evaluation Assurance Levels (EALs). EAL 1 to EAL 7 are discussed here:


EAL 1

EAL 1 is primarily used when the user wants assurance that the system will operate correctly but threats to security aren't viewed as serious.


EAL 2

EAL 2 requires product developers to use good design practices. Security isn't considered a high priority in EAL 2 certification.


EAL 3

EAL 3 requires conscientious development efforts to provide moderate levels of security.


EAL 4

EAL 4 requires positive security engineering based on good commercial development practices. It is anticipated that EAL 4 will be the common benchmark for commercial systems.


EAL 5

EAL 5 is intended to ensure that security engineering has been implemented in a product from the early design phases. It's intended for high levels of security assurance. The EAL documentation indicates that special design considerations will most likely be required to achieve this level of certification.


EAL 6

EAL 6 provides high levels of assurance of specialized security engineering. This certification indicates high levels of protection against significant risks. Systems with EAL 6 certification will be highly secure from penetration attackers.


EAL 7

EAL 7 is intended for extremely high levels of security. The certification requires extensive testing, measurement, and complete independent testing of every component.

EAL certification has replaced the Trusted Computer Systems Evaluation Criteria (TCSEC) system for certification. The recommended level of certification for commercial systems is EAL 4.

Implementing a Secure Server Environment

You've been appointed to the panel that will make decisions regarding the purchase of a new server for your organization. The new server needs to be relatively secure and suitable for storing sensitive information. It will also be part of an e-commerce environment. How can you assist the panel?

You can be of real value to the panel by determining the operating systems that have been certified for the common criteria. You can visit the website http://www.commoncriteriaportal.org/products_OS.html#OS to identify which operating systems and products have been EAL 4 certified. Encourage your IT staff members to make their decision based on the data available about security as opposed to vendor claims. Most vendors claim to have a secure environment when in fact they don't. The CC certification proves that an impartial third party did an evaluation.


Currently, only a few operating systems have been approved at the EAL 4 level, and even though an operating system straight out of the box may be, that doesn't mean your own individual implementation of it is functioning at that level. If your implementation doesn't use the available security measures, then you're operating below that level.

As an administrator, you should know and thoroughly understand that just because the operating system you have is capable of being certified at a high level of security doesn't mean that your implementation is at that level.

Security from a Windows Server 2003 Administrator's View

As a security administrator, you'll need to evaluate the security issues for Windows Server 2003:

  1. Beneath the Download link (on the right), choose Get the Windows Server 2003 Security Guide. Read it and pay particular attention to the Threats and Countermeasures discussion.

  2. Go to http://www.microsoft.com/technet/community/columns/sectip/st0805.mspx and read the Security and Compliance Solutions Guidance list posted there. Clicking on Security Tip of the Month columns will open up a plethora of useful articles.


NOTE

It cannot be overstated enough—the network is only as strong as its weakest component. If users can install software, delete files, and change configurations, then the actions they perform can also be performed by illicit software programs such as viruses and malware as well.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
18.224.66.196