Advanced Best Practices Using USP

Managing network security is an increasingly complex and complicated task, with a typical network consisting of both physical and virtual devices from multiple vendors. Take proactive control of your network security by creating, monitoring, and enforcing best practice policies with SecureTrack's Unified Security Policy.

This topic will show you how to create advanced best practices USP matrices for identifying, monitoring and blocking risky services, and for enforcing the use of rule properties for devices. Each tool and service used in this example is categorized in one of four risk levels - Critical, High, Medium, Low. A USP matrix is created for each of the risk levels, identifying the restrictions on the services and protocols for that risk level. The required rule properties for all device rules if also defined, and assigned to one of the risk level matrices.

Overview

To implement best practices or the compliance regulations of a standard, you need to create a USP Matrix containing the compliance zones required by the standard. The compliance zones are placeholder zones into which you place your network zones, using SecureTrack zone hierarchies. Your existing zones can then be collected into these compliance zones, to ensure compliance monitoring of your entire network. To ensure that you maintain ongoing compliance as your network topology evolves, we recommend that you periodically review the hierarchy of your compliance zones.

Prior to creating the USP, you need to determine the services and protocols currently used in your organization, as follows:

  1. Identify the services and protocols utilized across your network.
  2. Determine which services and protocols are or are not allowed between the network zones.
  3. Assign each service/protocol a compliance risk level in the appropriate zone matrix.

The Advanced Best Practices USP is a matrix of three example zones: Corporate, Internet and DMZ.

Create a USP that Implements Advanced Best Practices

Before you create this USP, make sure all the required compliance zones have been created (see Network Zones).

  1. Browser > USP Viewer.
  2. Click +ADD USP.
  3. Select Advanced Best Practices from the menu. The zones required for Advanced Best Practices appear.

  4. For each required zone displayed, select the appropriate compliance zone.

  5. (optional) Enter the USP description.

  6. Click Create.

The Advanced Best Practices USP has now been created. You can click on the card to view the matrix in the USP Builder and modify the policy as needed.

Critical Risk Level Example

The services and protocols identified as critical risk are:

From Zone

To Zone

Title

Details

Services Checked

All

Corporate

DMZ

Microsoft services

Risky Microsoft services can pass authentication credentials and data across the network without encryption. Risky Microsoft services can contribute to data leakage.

137 UDP, 138 UDP, 135 TCP, 135 UDP, 139 TCP, 445 TCP, 445 UDP, 593 TCP, 3389 TCP

All

Corporate

DMZ

R-services

Risky R-services can pass authentication credentials and data across the network without encryption. Risky R-services services can contribute to data leakage. R-services can provide direct shell access on server.

512 TCP, 513 TCP, 514 TCP

All

Corporate

DMZ

Telnet services

Telnet services can pass authentication credentials and data across the network without encryption. Telnet services can contribute to data leakage and information exposure. Telnet services can provide direct shell access on server.Telnet services can also be used to launch denial of service attacks and exploits against servers

23 TCP, 23 UDP, 89 UDP, 89 TCP, 107 UDP, 107 TCP, 992 TCP, 992 UDP

DMZ

Corporate

Microsoft services

Risky Microsoft services can pass authentication credentials and data across the network without encryption. Risky Microsoft services can contribute to data leakage.

137 UDP, 138 UD, 135 TCP, 135 UDP, 139 TCP, 445 TCP, 445 UDP, 593 TCP, 3389 TCP

DMZ

Corporate

POP services

POP services pass authentication credentials and data across the network without encryption. POP services carry data and contribute to data leakage.

109 TCP, 110 TCP

DMZ

Corporate

IMAP services

IMAP services pass authentication credentials and data across the network without encryption. IMAP services carry data and contribute to data leakage.

143 TCP

DMZ

Corporate

HTTP/HTTPS services

HTTP and HTTPS services should not be allowed to Internal networks.

80 TCP, 443 TCP

The following requirements should be enforced on all device rules, using USP rule properties:

  • All rules must have comments - Documenting rules helps you manage the rule lifecycle, and may be required for audits.
  • Rule logging must be enabled - Logging provides ongoing insight into how the rules are utilized.
  • Rules may not allow 'Any' service - Allowing any service is more permissive than required. Explicitly specify which services should be allowed.

    You can use Automatic Policy Generation to replace overly permissive rules with more optimized rules.

High Risk Level Example

The services and protocols identified as high risk are:

From Zone

To Zone

Title

Details

Services Checked

All

Corporate

DMZ

Microsoft SQL services

Microsoft SQL services can pass authentication credentials and data across the network without encryption. Microsoft SQL services can contribute to data leakage.

1433 TCP, 1434 UDP

All

Corporate

DMZ

NFS services

NFS services can pass authentication credentials and data across the network without encryption. NFS services can contribute to data leakage.

2049 TCP, 2049 UDP

All

Corporate

DMZ

LDAP services

LDAP services can pass authentication credentials and data across the network without encryption. LDAP services can contribute to data leakage.

389 TCP, 389 UDP, 379 TCP, 390 TCP, 3268 TCP

All

Corporate

DMZ

TCP Small services

TCP Small services can pass authentication credentials and data across the network without encryption. TCP Small services can contribute to data leakage, information exposure and denial of service attacks.

1-19 TCP

All

Corporate

DMZ

Finger services

Finger services can contribute to data leakage and information exposure.

79 TCP

All

Corporate

DMZ

BGP services

BGP is a dynamic routing protocol used by boarder routers connected to the Internet, it should generally not be allowed to propagate to the Internal networks and DMZ networks. BGP services can contribute to data leakage and information exposure.

179 TCP

All

Corporate

DMZ

SOCKS services

SOCKS services can pass authentication credentials and data across the network without encryption. SOCKS services can contribute to data leakage and information exposure.

1080 TCP, 1080 UDP

All

Corporate

DMZ

SNMP services

SNMP is a network management protocol that can configure and control network equipment, and should be restricted to trusted sources. SNMP services can pass authentication credentials and data across the network without encryption. SNMP services can contribute to data leakage and information exposure.

161 TCP, 161 UDP, 162 TCP, 162 UDP, 1993 TCP, 1993 UDP, 5161 TCP

All

Corporate

DMZ

Known P2P services

P2P services are common virus propagation points and lead to data leakage.

Kazaa (1214 TCP, 1214 UDP), edonkey (4661-4672 TCP, 4661-4672 UDP), winmx and napster (6257 TCP, 6257 UDP, 6699 TCP, 6699 UDP), bittorrent (6881-6889 TCP, 6881-6889 UDP), gnutella (6346 TCP, 6346 UDP), eMule (5555 TCP, 4242 TCP, 3306 TCP, 2323 TCP, 6667 TCP, 7778 TCP)

All

Corporate

DMZ

OSPF services

OSPF is a dynamic routing protocol used by internal organization routers. It should generally not be allowed to propagate from the External network to the Internal and DMZ networks. OSPF services can contribute to data leakage and information exposure.

IP protocol 89

All

Corporate

DMZ

RIP services

RIP is a dynamic routing protocol. It should generally not be allowed to propagate from the External network to the Internal and DMZ networks. RIP services can contribute to data leakage and information exposure.

520 UDP

All

Corporate

DMZ

IRC services

IRC services pass authentication credentials and data across the network without encryption. IRC services are also common virus propagation points and lead to data leakage.

TCP ports 194,531,6660-6664,6665-6669,6679,6697; UDP ports 194, 531

Medium Risk Level Example

The services and protocols identified as a medium risk are:

From Zone

To Zone

Title

Details

Services Checked

All

Corporate

DMZ

X11 services

X-11 services can pass authentication credentials and data across the network without encryption. X-11 services can also be used to launch denial of service attacks and exploits against servers.

6000-6255 TCP

All

Corporate

DMZ

SNMP services

SNMP is a network management protocol that can configure and control network equipment, and should be restricted to trusted sources. SNMP services can pass authentication credentials and data across the network without encryption. SNMP services can contribute to data leakage and information exposure.

161 TCP, 161 UDP, 162 TCP, 162 UDP, 1993 TCP, 1993 UDP, 5161 TCP

All

Corporate

DMZ

LOCKD services

The lockd daemon manages RPC connections between the client and the server for the Network Lock Manager (NLM) protocol. LOCKD services can pass authentication credentials and data across the network without encryption.

4045 TCP, 4045 UDP

All

Corporate

DMZ

POP services

POP services pass authentication credentials and data across the network without encryption. POP services carry data and contribute to data leakage.

109 TCP, 110 TCP

All

Corporate

DMZ

IMAP services

IMAP services pass authentication credentials and data across the network without encryption. IMAP services carry data and contribute to data leakage.

143 TCP

Low Risk Level Example

The services and protocols identified as low risk are:

From Zone

To Zone

Title

Details

Services Checked

Corporate

DMZ

All

NNTP services

NNTP services pass authentication credentials and data across the network without encryption. NNTP services are also common virus propagation points and lead to data leakage.

119 TCP, 119 UDP, 433 TCP, 433 UDP, 563 TCP, 563 UDP

Corporate

DMZ

All

NTP services

NTP services can contribute to information exposure and denial of service attacks.

23 TCP, 123 UDP