Using Symantec Critical System Protection for Patch Mitigation and Securing Legacy Out-of- Support Platforms - Case Study: Windows XP, 2000 and ...
←
→
Page content transcription
If your browser does not render page correctly, please read the page content below
WHITE PAPER: TECHNICAL Using Symantec Critical System Protection for Patch Mitigation and Securing Legacy Out-of- Support Platforms Case Study: Windows XP, 2000 and Windows NT 4.0 End of Support Symantec Security Group Technical Field Enablement Team
Table of Contents Contents INTRODUCTION................................................................................................................... 3 THE CHALLENGES OF MANAGING OUT-OF-SUPPORT SYSTEMS ................................................................... 4 Understanding the impact of Microsoft’s Support Lifecycle ............................................................... 4 Microsoft Vulnerabilities: Ratings and Trends........................................................................ 7 Vulnerabilities and the Patch Cycle........................................................................................ 10 SURVEYING AVAILABLE OPTIONS .............................................................................. 15 SYMANTEC CRITICAL SYSTEM PROTECTION ..................................................................... 16 Key features and Benefits ....................................................................................................... 17 Patch Mitigation with Symantec Critical System Protection ..................................................................... 17 SUMMARY ........................................................................................................................... 22 Where to get more information .............................................................................................. 22
Patch Mitigation with Symantec Critical System Protection Introduction End of Support (EOS) for software products are a normal and expected part of enterprise IT lifecycle planning. However, unlike point applications whose EOS milestones may affect just one line of business, the end of support for a commonly used operating system such as Windows 2000 or XP has a far reaching impact to an IT organization. Given that operating systems comprise core technologies affecting many systems and business units, IT groups face the difficult effort and costly exercise of upgrading or replacing many production systems throughout the enterprise—even though there is often no actual business benefit in doing so. Companies prefer to control the pace of system upgrades appropriate to their business needs, rather than conforming to a deadline imposed by an operating system vendor. As a result, many companies choose to stay with these unsupported—yet perfectly functional—systems until there is absolutely compelling business reason to change. Increasingly this compelling driver to upgrade comes from the escalating number of vulnerabilities and higher security risks these legacy systems pose to an organization. Patching has traditionally been seen as the only way to mitigate these vulnerabilities and risks. However, the continuing cost to patch these legacy systems becomes so excessive that companies feel forced to upgrade to a newer, supported OS simply to address these security concerns. This white paper illustrates how Symantec Critical System Protection provides an alternate approach to mitigating legacy system vulnerabilities and risks. By examining two popular yet unsupported environments—Windows XP, 2000 system and Windows NT—this paper will demonstrate how Symantec Critical System Protection helps customers to: Improve legacy system security and risk management Realize cost savings from reduced patch management and remediation efforts Gain control over the legacy OS upgrade cycle for business—not security—reasons 3
Patch Mitigation with Symantec Critical System Protection The challenges of managing out-of-support systems This section summarizes the challenges faced by organizations that choose to run unsupported products. These challenges and risks can include: The lack of operating system security patches and updates, resulting in significantly increased security risks for unpatched systems The high cost to purchase security updates for a subset of known vulnerabilities The system threat exposure due to patch windows and zero day vulnerabilities The ongoing patch management costs and business impacts Understanding the impact of Microsoft’s Support Lifecycle Understanding the Microsoft Support Lifecycle is a prerequisite to appreciate the potential risks of out- support systems. This section summarizes how Security Updates are handled generally as well as specific implications for Windows XP, 2000 and Windows NT.1 Security Update Policy Microsoft provides Security Updates for a minimum of 10 years from initial product release for Business products such as Windows XP, 2000 and Windows NT. The support is divided into two phases, referred to as Mainstream Support and Extended Support each spanning five years in length. During this 10 year period Security Updates (patches) are available to fix identified vulnerabilities. Microsoft advises customers to install the latest supported service pack to continue to receive and install security updates and remain as secure as possible. After 10 years, the product enters the “End of Extended Support” Phase and all security updates cease. Impact on Windows XP, 2000 and NT systems Given that Windows 2000 has just recently passed its End-of-Support date on July 13, 2010, Windows NT 4.0 has been unsupported for over 5 years and Windows XP is approaching end of Support, Microsoft no longer issues security updates for Windows 2000 or Windows NT 4.0. Customers running these systems receive: No new security updates (or even identification in security bulletins that a vulnerability may also affect these out-of-support products) 1 Key timelines for product retirement and applicable support services in different phases of the lifecycle are documented by Microsoft at http://support.microsoft.com/gp/lifeselect 4
Patch Mitigation with Symantec Critical System Protection No non-security hotfixes No free or paid assisted support options No option to engage Microsoft’s product development resources No updates to online content (Knowledge Base articles, etc.) Microsoft guidance: simple in theory but not always practical Microsoft’s guidance to customers running these systems is not surprising: migrate to the supported products. While Microsoft understandably wants customers to purchase an upgrade to a newer product, there is often no compelling business need on the customer end to upgrade. The support lifecycle policy does not invalidate the life of a purchased license or dictate how when IT shops must stop using a product. Ending support for old operating system versions is the main way Microsoft pushes customers into buying and implementing newer operating system versions such as Windows 2008, even if there is no tangible business benefit in doing so. With security updates cut off, customers running production systems are essentially left unprotected by Microsoft once these operating systems have reached the end of extended support. Costly and Onerous “Custom Support” A last-chance option that Microsoft offers desperate customers is a very expensive “custom support” program that comes with some very onerous business terms and implications. This program provides customers with the opportunity to receive a subset of Security Updates on legacy versions of some Microsoft products and service packs that have reached the end of support. This level of support is negotiated and available for purchase for those customers who have not been able to complete their migration to a supported product and as such absolutely need additional support from Microsoft. The Custom Support offerings include access to some security hotfixes and are specifically designed to help customers bridge the support gap while they complete their migration. 5
Patch Mitigation with Symantec Critical System Protection Table 1-1 summarizes the terms and security update implications for the available support offerings: Custom Support Standard, for customers with a large number of unsupported devices, and Custom Support Essentials, for customers who have a small number of unsupported devices. Table 1-1 Microsoft Custom Support Offerings Offering Availability Restrictions and notable terms Estimated Cost Standard Additional fees for “Important” vulnerability fixes $200,000 -- $500,000 per No fixes for “Moderate” or “Low” vulnerabilities year for ‘critical’ Additional fix fee for “non-security” hotfixes vulnerability fixes2 Problem Resolution Support requires the purchasing of Premier Support hours Requires purchase of Premium Support contract First year after a Must ensure operating system is up to a specified product or service release level pack leaves support Must provide Microsoft an OS migration plan Essentials Windows 2000 No fixes available for “Important”, Moderate” or Tens of thousands of eligible until July 2011 “Low” vulnerabilities dollars for a pre-set Windows XP eligible Additional fix fee and per device fee for Non-security number of devices3 until April 2015 hotfixes Windows NT not Problem Resolution Support requires the purchasing eligible of Premier Support hours Must purchase a “premium” support contract Must ensure operating system is up to a specified release level Must provide Microsoft an OS migration plan The forced upgrade cycles of the Microsoft Windows platforms have completely reversed the leverage customers normally wield over their suppliers. In many cases, customers have seen little utility in switching to newer versions of Windows but have little choice in the matter. These older Windows programs—which in many cases are still perfectly functional—must either be redeveloped for a newer Windows platform, or replaced. The application upgrades place yet another migration cost on top of the OS upgrade itself. 2 Derived from “NT holdouts paying a price,” Network Work (http://www.networkworld.com/news/2005/011005msextended.html?tw). Other anecdotal evidence with Symantec custoemrs indicates the cost is at least a half million per year. 3 Estimate drawn from 2006 Network World article “Microsoft expands support program” 6
Patch Mitigation with Symantec Critical System Protection KEY TAKEAWAYS Unsupported operating systems no longer have Security Updates available for free Yearly Custom Support contracts from Microsoft to obtain Security patches are expensive and burdensome Even under contract, patches are not made available for all vulnerabilities Customers are at a severe disadvantage when dealing with Microsoft regarding upgrades. Microsoft uses the security “hammer” to force customers to upgrade to newer OS products even when the business case does not otherwise justify the migration Microsoft Vulnerabilities: Ratings and Trends A key implication to the Microsoft’s process of deploying Security fixes to vulnerabilities for unsupported products is that “Critical” fixes are made available at a steep cost while “Important” fixes are even harder to come by and fixes for “Moderate” to “Low” vulnerabilities are not obtainable at any price. This section provides a review of the Microsoft rating system as well as a statistical review of the frequency and distribution of vulnerabilities across the various severity levels over the past decade. The following table summarizes Microsoft’s severity rating system, which provides a single rating for vulnerability in a software product. Table 1-2 : Severity Rating System Rating Definition Critical Vulnerability whose exploitation could allow propagation of an internet worm without user action Important Vulnerability whose exploitation could result in compromise of the confidentiality, integrity, or availability of users’ data, or of the integrity or availability of processing resources. Moderate Exploitability is mitigated to a significant degree by factors such as default configuration, auditing, or difficulty of exploitation Low A vulnerability whose exploitation is extremely difficult, or whose impact is minimal The severity rating has a couple of implications to be aware of. First, the higher the vulnerability severity, the greater the damage an exploit can inflict. The exploit may also be easier to create and have a higher chance of succeeding. The lower ratings indicate the vulnerability is more difficult to exploit and that the potential damage may be limited and mitigation activities can reduce the risk further. One would hope that most reported vulnerabilities would fall into the Low to Moderate rating levels. 7
Patch Mitigation with Symantec Critical System Protection Unfortunately, the opposite is true. Nearly half (213 of 448) are Windows 2000 and NT 4.0 critical vulnerabilities and three quarters of all items are in the top two severity categories (critical/important). The number of Critical Vulnerabilities per year has not varied much over the last 8 years, averaging about 2 per month with total vulnerabilities averaging 41 per year, as shown below. Table 1-3 : Vulnerabilities Count (2000—2010) Severity Count Critical 2010 47 23 2009 49 32 2008 39 20 2007 36 26 2006 45 27 2005 43 23 2004 28 13 2003 31 21 2002 38 24 2001 36 4 2000 56 Total 448 213 Avg/yr 41 23 8
Patch Mitigation with Symantec Critical System Protection Given the constant stream of Critical and Important severity vulnerabilities, there is significant pressure on organizations to apply patches as soon as possible because the potential security risk is so huge. However, this activity goes against the best instincts of IT change management to ensure adequate testing of any software changes before being deployed to production systems. As a result, many enterprises still do not deploy the patches right away and are caught between two vastly competing time elements: patch as soon as possible to close the exposures but take enough time to ensure the changes won’t break critical business processes. A second implication regarding severity rating has to do with customers paying Microsoft for Custom Support on unsupported operating systems. Microsoft will not produce and will not deliver any patches for security vulnerabilities with a Moderate or Low severity rating. As seen in the previous section, Custom Support Essentials customers cannot get “Important” fixes. Custom Support Standard customers may have to pay additional fees to get “Important” fixes (as per the terms and conditions in the Microsoft Custom Support Agreement). The bottom line is that not all vulnerabilities have fixes available. KEY TAKEAWAYS Vulnerabilities always exist and will continue to exist in the future The rate and severity of vulnerabilities is likely to continue Unsupported systems accumulate unpatched vulnerabilities making legacy systems riskier over time The continuing rate of Critical/Important vulnerabilities and zero day exploits points out the lack of protection both unsupported (and supported) operating systems have when relying on patching as the primary security defense mechanism 9
Patch Mitigation with Symantec Critical System Protection Vulnerabilities and the Patch Cycle This section focuses on how security fixes are made available to customers and provides a look at the security implications and costs associated with a Patch Cycle. Microsoft Patch Tuesday (and “Exploit Wednesday”) Patch Tuesday is the second Tuesday of each month when Microsoft releases a consolidated set of the latest security patches. In order to reduce the costs related to the deployment of patches, security patches are accumulated over a period of one month and then dispatched all at once on the second Tuesday of the month, an event for which system administrators can prepare and plan for. Just because support has ended for an operating system doesn’t mean vulnerabilities and new risks have stopped – in fact recently the pace has been has been accelerating. In October 2010 Microsoft released its largest Patch Tuesday, when it provided fixes for 49 security vulnerabilities in a “monster” Patch Tuesday update, including a privilege escalation bug exploited by Stuxnet, worm that targets industrial control systems and exploited a privilege escalation vulnerability in the Windows kernel-mode drivers. One dangerous side effect of this model is that the following day is known by some as “Exploit Wednesday,” when exploits are created and launched against the newly announced vulnerabilities. Organizations that do not deploy the fixes immediately are at an increased risk of attack once the patches are available. The sheer volume of the patches Microsoft releases each month makes it difficult for even the most adept IT department to get every patch out to all of the affected systems in a reasonable amount of time. Automated Patch management systems can certainly help, but it still takes lots of manpower to rollout many patches to a large enterprise. Microsoft, like any other organization, has finite resources and its Security Response Center staff can only build and test so many fixes in a given month. That means that some vulnerabilities remain unpatched for months at a time, even when there is exploit code publicly available and confirmed attacks going on. 10
Patch Mitigation with Symantec Critical System Protection The Window of Exposure Every day there are new vulnerabilities discovered, new exploits written, and new threats emerge. Whenever a new way to attack a host is discovered, there exists a window of exposure until that attack method is prevented. In the general case, someone discovers a new attack technique that renders some hosts vulnerable to the exploit and the exposure grows as more people learn about this vulnerability. Sometimes the window of exposure grows very slowly: there are attacks that are known by a few researchers and no one else. Other times, the window grows very quickly (e.g., a developer writes an exploit that takes advantage of the vulnerability and distributes it freely on the Internet.) Sometimes the software vendor patches the vulnerable software quickly, and sometimes the vendor takes months or even years. And some IT departments install patches quickly and religiously, while others never do. Ultimately, there isn't a single window of exposure, but rather an overlay of many windows of exposure that differ for each vulnerability and exploit. The result is a constant state of exposure and risk within corporate systems. The window remains open until the vendor patches the vulnerability and the system administrator installs the patches or applies some mitigating technique to shield the system from the hole. Ideally, the vendor will distribute the patch before any exploits are written but this neither a given nor is it certain that system administrators will completely install the patch in all affected systems without missing a few outliers. A key characteristic of this exposure time period is that it the majority of the exposure period is not under the control of security administrators but under the control of hackers and the underlying software vendor. All the administrators can do is install patches if and when they become available. In some circumstances, Microsoft has decided that it is “infeasible” to correct the flaw in older operating systems due to inherent design or implementation issues. These older platforms were developed before most of the current computing models were in use and the threat landscape was much more limited. For example, the security kernel of Windows NT 4.0 was written before there was a World Wide Web and before TCP/IP was the default communications protocol. Similarly, the security kernel of Windows 2000 Server was written before web Services were widely deployed, before exploit tool kits were generally available, and before most IT professionals had ever heard of a buffer overflow. 11
Patch Mitigation with Symantec Critical System Protection As a result, there are some vulnerabilities that cannot reasonably be corrected. Vulnerabilities will always exist on any system, and with Windows NT 4.0 and Windows 2000/XP, there is an extra handicap in that those systems were never designed to withstand the processing or threat environment that exists today. An alternative approach to securing systems is necessary since it is never possible to fix all known and unknown vulnerabilities. Reducing or Closing the Window of Exposure Relying on a single security methodology such as patching as the only countermeasure to vulnerabilities is both reactive and insufficient from a security perspective given the windows of exposure discussed above. The best practice is not a reactive patch-centric security model but one based on multiple countermeasures that include proactive prevention, detection and response. Preventive countermeasures provide defense in two ways: they provide a hard barrier (or barriers) that an attacker must overcome and when coupled with a good detection and response mechanism it makes it much more difficult for the attack to hide its activities. Attackers can be detected and blocked inside the host, regardless of which old or new vulnerability they used to enter. In many cases, the window of exposure can be completely closed. Even if a customer paid for the maximum Microsoft Custom Support they would still not receive the “Moderate” patch and may have to pay extra for the Important patches. In addition a customer also has to worry about obtaining and applying patches for the old application versions such as web servers, databases, industrial control and other third party apps running on the host – this may constitute an even larger (and generally unknown) patching burden than does the OS itself. For customers with unsupported Windows NT 4.0 and 2000 environments that are not receiving any new patches have in essence an indefinite exposure and must look to other means to mitigate the risk and secure their systems. Thus with the realization that vulnerabilities and risks will always be present no matter how hard one tries to patch, it simply makes sense to take steps to defend the system with a comprehensive host-based solution designed to protect and against a broad array of exploits without relying on patch availability or signatures. 12
Patch Mitigation with Symantec Critical System Protection KEY TAKEAWAYS Organizations need to consider alternative approaches to securing their systems rather than simply believing that a quicker patch cycle will protect them Defensive countermeasures that include proactive prevention, detection and response capabilities to stop known and unknown threats are the best way to close or reduce the exposure window Comprehensive HIPS/HIDS Security products such as Symantec Critical Systems Protection provide the most effective way for IT organizations to reduce patch cycle frequency, reduce downtime and save manpower while improving overall endpoint security posture The Patch Cycle and the Associated Costs Determining that a new security vulnerability exists and a patch is available from the vendor is only the first step for a customer in a costly and time consuming security patch cycle. A patch cycle facilitates the application of standard patch releases and updates within the organization. The tasks performed for each patch cycle typically include the following: Patch Research, Prioritization and Scheduling—Security and operational staff determine the nature of the vulnerability, the components to be patched, and the priority of the patch within the organization. Patch Testing—Detailed patch testing requirements are created and vary by system criticality and availability requirements, available resources, patch severity and software impacted. Change Management—Patches and updates are performed and tracked through the change management system, with associated contingency and backout plans. Patch Installation and Deployment—Patches actually applied patches and productions systems updated. Automated tools can help with this but often there are outliers that need to be patched manually. Audit and Assessment—Determines what systems need to be patched for any given vulnerability/bug and whether systems that are supposed to be updated were actually patched. Post Implementation Consistency and Compliance—Controls put in place to ensure that newly deployed and rebuilt systems are updated to reflect the just deployed patches. 13
Patch Mitigation with Symantec Critical System Protection Clearly, patching is costly and manpower intensive. For many organizations 13-16 patch cycles per year are not uncommon when following the monthly Patch Tuesday schedule, as well as accommodating 2-3 emergency critical patches during the year. Given the frequency of security patches, critical systems face downtime and potential risk of patch breakage more than once a month. For organizations with thousands of servers affected, patching introduces an enormous impact to system downtime, to say nothing of the additional burden on the IT operations staff. For critical flaws, it may be simply unacceptable for some organizations to run with these known vulnerabilities without other compensating controls in place. In these cases, immediate patch deployment is required often within 48 to 72 hours. PATCH COST EXAMPLE—EMERGENCY PATCH Scenario: One large scale financial organization estimates an emergency patch costs the organization an additional $1M to deploy an out-of-cycle patch to 35,000 hosts within 48 hours. Cost drivers for the emergency patch: Overtime pay for personnel—Systems Administrators, Security Engineers, QA Specialists, Operations staff, Configuration Control board members, Help Desk Staff (to handle failed patches or malfunctioning systems/applications), Managers Production system downtime—Outages of business systems (reboots are usually required) as well as the need to bring up and coordinate standby systems Additional organizational costs—Productivity losses for users and staff, including delays and impacts to other business projects from re-directed staff. Also included coordination costs (one of the largest costs is lost labor time in coordinating people and systems) Avoiding the costs with host-based intrusion prevention system: Mitigating the risk of a vulnerability from a “critical” rating to a lower severity by using otherprotective measures (such as HIPS) allows the IT department to defer the emergency patch to a normally scheduled patch cycle yielding major cost savings for the organization PATCH COST EXAMPLE – SMALL SCALE LEGACY ENVIRONMENT Scenario: An organization with 300 Windows 2000 servers under Microsoft Custom Support contact estimates it costs more than $1M a year to maintain patched environment. Cost drivers: Microsoft Support fees for out-of-support Security Fixes Monthly patch cycle costs Reducing costs by reducing patch cycles: 14
Patch Mitigation with Symantec Critical System Protection PATCH COST EXAMPLE – SMALL SCALE LEGACY ENVIRONMENT Customer estimates reducing the number of patch cycles from 10-12 per year to 1-2 could save the company $300-500K per year. Another $500K could potentially be saved by avoiding or reducing the Microsoft Custom Support fees Surveying available options Customers running legacy operating systems have basically three main options or approaches for addressing patch mitigation. This section evaluates each of these approaches. Option 1 – Traditional Patch Approach In this option, the customer pays the Microsoft Custom Support fees and continues the same frequency of patching as when the OS was supported. This is by far the most costly option but does provide explicit protection from the vulnerabilities that are actually patched. The downside is it does not address zero day vulnerabilities (vulnerabilities where no patch is made available and other windows of exposure that leave the systems open for attack.) All of the money and effort applied with this approach has not changed the fundamental security of the platform but simply maintains the same security as the previous month before the new vulnerabilities were made known. Option 2 – Do Nothing Approach With this option, the customer decides not to pay the Microsoft Support fees and therefore no longer gets vulnerability patches for the unsupported platforms and thus has no upfront security related patching costs. This option bets that the legacy systems will not be the subject of an attack. This is certainly the lowest cost option in the short term but has a number of disadvantages and risks, including: Possible violation of compliance or regulatory mandates to which an organization may be subject, perhaps resulting in fines or penalties Potential exposure to a data breach that damages the company or brand, the cost of which far outweighs the cost for establish protection Increased labor resources to remediate the environment once an attack occurs Increased range and number of exploits likely to be successful in their attack due to the cumulative effect of “doing nothing” across many separate vulnerabilities The customer ultimately needs to decide from a “risk management” standpoint whether the cost savings more than offset the possible damage to the systems or the company. 15
Patch Mitigation with Symantec Critical System Protection Option 3 – Harden systems using host-based IPS/IDS security agents In this option the customer deploys HIPS/HIDS based security agents at the endpoints to harden the operating system and applications, mitigate vulnerabilities and stop known and unknown threats. This is the only option that actually improves the overall security posture of the hosts and gives flexible choices to the customer to reduce the patch frequency and reduce or eliminate the Microsoft support fees. This is the most cost effective option with savings in patching costs, support fees, downtime and remediation efforts more than offsetting the initial acquisition and deployment costs. Option 3 clearly provides the best choice – better and more consistent host security, lower overall costs, and the return of control to the customer with regard to legacy system replacement. The main concerns for a customer are likely to be the effort involved to deploy and manage a new endpoint security agent; and the compatibility of that agent within their legacy system environment. A Proof of concept is usually the best way to demonstrate ease of deployment, manageability, legacy system compatibility, security efficacy and the value of the overall solution. Symantec Critical System Protection When it comes to selecting the best product to protect legacy systems and offset patching costs there is a very short list of appropriate products that have the necessary platform support, technical capability, industry presence, and proven track record to be considered for protecting the legacy systems. Symantec Critical System Protection (Symantec Critical System Protection) easily exceeds these key criteria: Platform Support—Windows XP, NT and Windows 2000, as well a broad array of other platforms as well including Windows 2003, 2008, XP, Solaris, AIX, Linux, ESX and others. Technical Capability—Full featured HIPS/HIDS features with extensive out-of-the-box policies for comprehensive system and application protection Industry Presence—Symantec is the world-wide leader in IT security with best in class products including endpoint protection Proven Track Record—the HIPS/HIDS technologies in Symantec Critical System Protection have been defending Windows XP, 2000 and Windows NT enterprise systems for the last seven years This section reviews the Symantec Critical System Protection product architecture and capabilities appropriate to protecting legacy systems and use in Patch Mitigation Detailed description of the technology. Include visual elements to reinforce the learning. 16
Patch Mitigation with Symantec Critical System Protection Key features and Benefits Symantec Critical System Protection is the industry leader in defending endpoints against targeted attacks, malicious mobile code, rootkits, worms, and day-zero attacks. Zero-update protection is critical when addressing brand exploits or variants that take advantage of published and unpublished system and application vulnerabilities. Symantec Critical System Protection continuously defends critical servers that cannot be taken out of service to apply operating system or application-specific vulnerability patches. This reduces emergency patching of systems in response to vulnerability announcements and minimizes patch-related downtime and IT staff expenses. Benefits for Critical System Protection include: Significant reduction of Patching Costs by Reducing the frequency of patch cycles and the costs associated with Microsoft custom support fees Reducing the business impacts from system downtime, breaches and expensive remediation efforts Reducing the staffing burden by replacing the reactive and often urgent patch management process with a steady, predictable software maintenance cycle Significant improvement of security posture of host systems Shields systems from OS and application vulnerabilities and exploits Provides proactive, system wide prevention against known and unknown vulnerabilities (compared to Patch management that is only effective against known, vendor-corrected vulnerabilities) Provides centralized policy management to control system, application and user behaviors across a wide range of Unix, Linux and Windows systems including legacy Windows XP, NT and 2000 systems and virtualized environments. Provides extraordinary insight and control over important system security events Increased control over legacy system replacement strategy and timeline Extend use of legacy systems without the continued pressure of increasing security risks and costs Extend use of legacy systems and further reduce IT costs using virtualization where appropriate Patch Mitigation with Symantec Critical System Protection Patch relief—the ability to delay deployment of security patches to lengthen the patch cycle time frame—is a key security-related benefit of Symantec Critical System Protection. When using Symantec Critical System Protection, the vulnerabilities may still be present on a system, but any exploit potential is limited. Symantec Critical System Protection protects systems with known or unknown vulnerabilities by limiting the scope of resources and capabilities for programs and users to only those features they need to access for normal operations. To support Symantec’s contention that customers can delay patching efforts for Windows XP, 2000 and NT, Symantec maintains a running document listing past Microsoft vulverablitlies and exploits, accompanied by explanations on how Symantec Critical System Protection could have addressed them. To date, over 400 vulnerabilities have been addressed (more than 200 were deemed critical by Microsoft). 17
Patch Mitigation with Symantec Critical System Protection For Symantec Critical System Protection, the typical response is that the customer is already protected if they have deployed the out-of-the-box prevention policy. Since Symantec Critical System Protection is a behavioral-based product, its policies are not associated with particular exploits or signatures. No matter how an exploit reached the system—via any number of vulnerabilities when it attempts undesired behaviors such as inserting a rootkit, performing unwanted network access, modifying the registry run list, or other malicious behaviors—the activity is blocked. Just a few examples of the many examples are presented in this section4. IIS Protection Response Sample The out-of-the-box Symantec Critical System Protection policies provide significant protection against Internet Information Server (IIS) attacks. No policy updates are necessary. As soon as the injected code attempts behavior that is not normal for the program it was injected into, Symantec Critical System Protection blocks that behavior. Since the goal of most attacks is to use the program's privileges in unauthorized ways, most attacks will be blocked. Some specific examples: All Symantec Critical System Protection policies provide tight confinement around the IIS service. Attacks that attempt to modify resources other than the small set of resources required by normal IIS service behavior are blocked. All Symantec Critical System Protection policies block the IIS service from launching suspicious programs. So if the attack code tries to download and run a Trojan program, it won't be able to launch the Trojan. This is true whether the attack is made via this vulnerability or any other method. All Symantec Critical System Protection policies block incoming network connections by default, thus preventing access to this vulnerability from remote systems. If inbound network connections are required, the customer must configure the policy to allow specific remote networks to connect. Unknown (and potentially malicious) remote systems would still be blocked. In addition, the Symantec Critical System Protection policies block other services from modifying the IIS content directories. (This is due to the standard Symantec Critical System Protection policy controls that only allow services access to the resources they need to do their jobs.) Thus, if attackers find vulnerabilities in other Windows Services that would allow them to add or modify files in the IIS content directories, the Symantec Critical System Protection policies would block those changes. By default the Symantec Critical System Protection policies allow services read access to most of the file system. To protect against information disclosure vulnerabilities, customers can configure the policy so the IIS programs cannot even read certain files or folders. This would be appropriate for sensitive areas of the file system that are not normally accessed by the programs and would further limit the damage that information disclosure attacks could cause. Generic Windows Service Protection The out-of-the-box Symantec Critical System Protection policies provide significant protection against these buffer overflows, similar to how they protect against any type of injected code. No policy updates 4 To view the entire set of detailed written responses from the Symantec Critical System Protection engineering team provided in response to vulnerability/patch announcements, see the document titled: Symantec Critical System Protection Response to Microsoft Vulnerabilities (Feb 2006 - Sept 2010). 18
Patch Mitigation with Symantec Critical System Protection are necessary. As soon as the injected code attempts behavior that is not normal for the program it was injected into, Symantec Critical System Protection blocks that behavior. Since the goal of most attacks is to use the program's privileges in unauthorized ways, most attacks will be blocked. Some specific examples: All Symantec Critical System Protection policies block services from modifying critical Windows files or registry values. So if the attack code tries to damage the system, it won’t be able to. All Symantec Critical System Protection policies block incoming network connections by default, thus preventing access to this vulnerability from remote systems. If inbound network connections are required, the customer must configure the policy to allow specific remote networks to connect. Unknown (and potentially malicious) remote systems would still be blocked. All Symantec Critical System Protection policies block services from writing executables to disk and from launching suspicious programs. So if the attack code tries to download and run a Trojan program, it won't be able to launch the Trojan. This is true whether the attack is made via this vulnerability or any other method and whether it is injected from a remote system or a malicious local program. Specific exploit vectors The following are just a few examples of how Symantec Critical System Protection addresses specific exploit vectors comment to operating system threats. Exploit Strategy Mitigation by Symantec Critical System Protection Placing malicious programs and Blocks by default the dropping or modification of executables on disk executable components (CMD, EXE, DLL, SYS files, etc.) onto the host system by untrusted programs or users. Prohibits the dropping or modification of any files (of any file extension) into critical system areas (such as Windows/system32 Creation or Modification of Uses default blocking mechanisms (cited above) to Critical System Registry Keys prevent exploit payload from persisting on the system in and configuration files an executable form and from registering and launching itself after a reboot Remote command and control Tightly limits networking ability of processes on the (phone home) systems to communicate external to the host. Provides firewall settings to block activity and control network access by program, user, ports, protocol and IP address Buffer overflow and code Ensures that running authorized software cannot be injection hijacked by code injected via buffer overflow or thread injection. Privilege Escalation/Abuse Treats these privileged processes as any other contained program. As such they cannot violate defined policy behaviors even if the Windows operating system grants them complete system permissions and accesses 19
Patch Mitigation with Symantec Critical System Protection Zero-day exploits (Blaster and Stuxnet) With its behavior-based, lease privilege protection model, Symantec Critical System Protection is able to easily thwart new and unknown threats. This section covers two examples of infamous zero-day exploits that are years and worlds apart in complexity: Blaster and Stuxnet. Blaster Protection Example The Blaster Worm (also known as Lovsan, Lovesan or MSBlast) was a computer worm that quickly spread on computers running the Microsoft operating systems, including Windows XP and Windows 2000 during August 2003. The worm spread by exploiting a buffer overflow discovered in the Windows DCOM RPC service on the affected operating systems, for which a patch had been released one month earlier in MS03-026 and later in MS03-039. This allowed the worm to spread without users opening attachments simply by spamming itself to large numbers of random IP addresses. As with most attacks, multiple steps are involved to exploit the vulnerability, land a payload, execute the payload, persist the threat and infect other hosts. The diagram below shows these multiple attack steps (buffer overflow, outbound network connection, insert file into root directory, modify system registry key, and so on) for this exploit and also shows that these actions are blocked by the Symantec Critical System Protection policy. The reason these actions are blocked is that they violate the behavior-based policy rules established for the Windows RPC service. The RPC service performs a very specific set of operations and accesses that has been codified into the policy. Abnormal behaviors represent an attack and thus are blocked by default. Thus, the Blaster exploit is neither successful in damaging the system nor infecting other hosts. This containment model is the core foundation that Symantec Critical System Protection uses to stop known and unknown threats. Stuxnet Protection Example Stuxnet, a recent and highly sophisticated targeted attack seen to date, had the followings characteristics: • Includes 4 zero day vulnerabilities (some of which are still not fixed by Microsoft) and at least 2 known vulnerabilities • Contains multiple attack vectors (8 or more) • Targets industrial control systems • Replicates across the network as well as across “the air gap” (using thumb drives & removable media) 20
Patch Mitigation with Symantec Critical System Protection For Symantec Critical System Protection, however, Stuxnet is just another threat trying to modify critical system files and registry keys and violate network containment rules. Without requiring a policy change, the Symantec Critical System Protection environment thwarts the attempt to break out of the hardened environment. Elements of Stuxnet Attack Symantec Critical System Protection’s Automated Defenses Uses a Window Spooler network Prohibits Windows Spooler service (spoolsv.exe) from vulnerability (MS10-061) to write any executable (or for that matter any file) into the replicate itself %SYSTEM% directory Uses a Windows rootkit to hide Default policy blocks writing of the Stuxnet driver .SYS files Windows binaries as parent process is not a trusted program allowed to perform driver installs Tries to register driver files as a Default Policy blocks modification of relevant driver service and starts running before registration keys the system boots up in the next successive system starts Uses root kit techniques to hide Default policy denies command shells from being launched injected PLC code from within SQL Server (a common SQL Injection attack technique). Communicates with C&C servers Leverages customer best practice configuration to limit using HTTP activity to specific customer networks and block outbound communication to external C&C servers Communicates with other C&C Likely blocked depending on how the approved network IP hosts address/subnet lists were set up during initial policy deployment Symantec Critical Protection’s behavioral rules are not affected by the time lag between discovery of a new exploit and the release of a corresponding signature to combat it. Given how rapidly new exploits are introduced, the ability to proactively stop a new and unknown attack the first time it appears is a tremendous benefit. Protection against zero-day threats yields significant financial benefits by avoiding the costs of remediation and recovery from an outbreak. Symantec Critical System Protection gives staff the time to properly test and deploy system patches and alleviates the urgency of emergency system patches. 21
Patch Mitigation with Symantec Critical System Protection Summary Symantec Critical System Protection provides proactive control and security features that enable significant gains in patch relief. Vulnerabilities and responses presented for Windows XP, 2000 and NT demonstrate that Symantec Critical System Protection would have enabled significant patch cycle reduction opportunities over the last 4 years with equal savings to be had in future years. In all cases noted above regarding vulnerabilities and exploits examined, the IT staff would have had the option of delaying critical patch activities until a later, planned patching window. With patch cycle frequency rising to double digits per year for many customers, eliminating even one or two patch cycle per year can provide sizable cost savings. Reducing security patches to 2 or 3 for an entire year would yield huge benefits in cost and manpower savings. In summary, with Symantec Critical System Protection, you can patch less frequently, less urgently, cost effectively and on your own schedule. Where to get more information For more information on Symantec Critical System Protection, visit http://www.symantec.com/business/critical-system-protection 22
About Symantec Symantec is a global leader in providing security, storage and systems management solutions to help businesses and consumers secure and manage their information. Headquartered in Cupertino, Calif., Symantec has operations in 40 countries. More information is available at www.symantec.com. For specific country offices and Symantec Corporation Copyright © 2010 Symantec Corporation. All rights reserved. Symantec and the Symantec logo are trademarks or registered trademarks contact numbers, please visit World Headquarters of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their our Web site. For product 20330 Stevens Creek Boulevard respective owners. 11/10 information in the U.S., call Cupertino, CA 95014 USA toll-free 1 (800) 745 6054. +1 (408) 517 8000 1 (800) 721 3934 www.symantec.com
You can also read