Agreed, this kind of advice is what I was hoping to get on LibTech!

On Thu, 28 Feb 2013 14:16:56 +0000 canto...@hushmail.com wrote:
>Thanks excellent advice - much to think about.
>
>On Thu, 28 Feb 2013 14:09:39 +0000 "Tom Ritter" <t...@ritter.vg> 
>wrote:
>>On 28 February 2013 07:39,  <anonymous2...@nym.hush.com> wrote:
>>> Hi,
>>> We are a human rights NGO that is looking to invest in the best
>>> possible level of network security (protection from high-level
>>> cyber-security threats, changing circumvention/proxy to protect 
>
>>IP
>>> address etc, encryption on endpoints and server, IDS/Physical 
>>and
>>> Software Firewall/File Integrity Monitoring, Mobile Device
>>> Management, Honeypots) we can get for a our internal network. I 
>
>>was
>>> wondering if people would critique the following network, add
>>> comments, suggestions and alternative methods/pieces of 
>>software.
>>> (Perhaps if it goes well we could make a short paper out of it, 
>
>>for
>>> others to use.)
>>>
>>> -Windows 2012 Server
>>> -VMWare virtual machines running Win 8 for remote access
>>
>>Windows doesn't scare me, full remote access scares me.  (I'm 
>>amazed
>>at how many people are saying "X is insecure" with no 
>explanations 
>>how
>>or why an alternative is more secure.) Obviously you'll need 
>>something
>>for remote workers, but see the next section...
>>
>>> -Industry standard hardening and lock down of all OS systems.
>>
>>Industry 'Standard' hardening isn't particularly good because
>>'Standard' is 'Standard' and 'Standard' is also hacked over and 
>>over
>>again.  Upgrading your RDP authentication level is a good idea 
>and
>>'Standard' - but what you want most of all is separation of 
>>privilege.
>> I don't mean "Bob the sysadmin is the only person who can 
>>administer
>>the mailserver" I mean "Bob the sysadmin is the only person who 
>>can
>>administer the mailserver, and he can only do it from a separate
>>computer that's on a separate airgapped network and he doesn't 
>use 
>>USB
>>keys".
>>
>>Airgapping brings thoughts of crazy military-levels of paranoia - 
>
>>but
>>it's not all that difficult and it's getting more and more 
>>important.
>>Get a couple cheapish laptops, a separate consumer-level 
>broadband
>>connection, and run red cables plus blue to a few people's desks.
>>
>>Think about it terms of compartmentalisation, both airgapped and
>>non-airgapped-but-separate-Domains/VLANs/Authorisation contexts. 
>>Draw
>>out your network, and then fill an entire section with Red - 
>>that's
>>what the attacker controls.  How does he move to another section? 
>
>>What
>>data does he get?  Brainstorm this part heavily, consider putting 
>
>>it
>>up on a permanent whiteboard and referring to it every time 
>>someone
>>comes in and needs access to X group's fileserver, or what-have-
>>you.
>>
>>> -Constantly changing proxies
>>
>>I have no idea what you intend to accomplish with this.  
>>Performing
>>*more* logging of your employees, or not disabling WPAD sounds 
>>like
>>the opposite of what you'd want.  (And a note on the WPAD item:
>>disable IPv6 too.)
>>
>>> -Sophos Enterprise Protection, Encryption and Patch management
>>> -Sophos mobile management
>>
>>Uh, I guess.  I guess I shouldn't disparage something I've never
>>reviewed and haven't worked with... But my opinion of "Enterprise
>>Protection" products isn't too high until I've seen an 
>independent
>>security firm see how secure the product is and how much it 
>attack
>>surface it adds.
>>
>>> -Encrypted voice calls for mobile and a more secure alternative 
>
>>to
>>> Skype via Silent Circle.
>>
>>So I guess that's RedPhone?
>>
>>> -TrueCrypt on all drives - set to close without use after a
>>> specific time
>>
>>Bitlocker is a fine alternative, and probably easier to 
>>manage/query
>>via Group Policy.
>>
>>> -False and poison pill files
>>> -Honeypots
>>
>>Ooookay.  This isn't a bad idea, but it's pretty damn complicated 
>
>>to
>>set up - you're moving more and more towards something that 
>>requires a
>>24/7 SOC (Security Operations Center) and further away from
>>"Architecting a secure network."
>>
>>> -Snort IDS
>>> -Tripwire
>>
>>And someone full time (or 2 people, really probably a team of 
>>folks
>>operating 24/7) to monitor these?  Cause this stuff doesn't help 
>>you
>>if no one's looking at it.
>>
>>> -Easily controlled kill commands
>>
>>... Huh?
>>
>>> -No wifi
>>
>>Good luck with that.  I guess no one's going to have any 
>>productive
>>meetings or use any MacBook airs, tablets, or phones for work
>>purposes.  (Unlikely.)  Having everyone use the cell towers isn't 
>
>>a
>>great idea either.  This sounds like you haven't done a 
>>requirements
>>gathering phase with your users.
>>
>>-tom
>>--
>>Too many emails? Unsubscribe, change to digest, or change 
>password 
>>by emailing moderator at compa...@stanford.edu or changing your 
>>settings at 
>>https://mailman.stanford.edu/mailman/listinfo/liberationtech
>
>--
>Too many emails? Unsubscribe, change to digest, or change password 
>by emailing moderator at compa...@stanford.edu or changing your 
>settings at 
>https://mailman.stanford.edu/mailman/listinfo/liberationtech

--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech

Reply via email to