SlideShare a Scribd company logo
1 of 58
Download to read offline
Red Hat Security Seminar
Shawn D. Wells (swells@redhat.com)
Solutions Architect, Federal Team
2
Agenda
 Start: 10:30 am
 End: 1:00 pm, ish
 Red Hat Emerging Technologies
 Red Hat Security
 Summary & Close
3
Hands On & Labs
4
Red Hat Development Model
5
Open Source – A Better Way
 Returns control
 Security reinforced through transparency
 Multiplies the development capacity
Bugs per 1000 Lines of Code
Linux 2.6 Kernel 0.17 Stanford University/Coverity
Proprietary Software 10 to 20 Carnegie Mellon Cylab
Wired Magazine, Dec 2004
6
Open Source as a Security Innovation
 Time from a critical issue being known to the public until the day that fix available
 Red Hat Enterprise Linux 4
 FEB 2005 – FEB 2006
7
SELinux: Building Security Openly
NSA Develops
SELinux
Integrated into
Linux Kernel
Integrated into
Open Source
Project
Enabled By
DEFAULT In RHEL
Customers, NSA, Community, and
Red Hat continue evolution
8
Red Hat Security Certifications
NIAP/Common Criteria: The most evaluated operating system platform
●
Red Hat Enterprise Linux 2.1 – EAL 2 (Completed: February 2004)
●
Red Hat Enterprise Linux 3 EAL 3+/CAPP (Completed: August 2004)
●
Red Hat Enterprise Linux 4 EAL 4+/CAPP (Completed: February 2006)
●
Red Hat Enterprise Linux 5 EAL4+/CAPP/LSPP/RBAC (Completed: June 2007)
DII-COE
●
Red Hat Enterprise Linux 3 (Self-Certification Completed: October 2004)
●
Red Hat Enterprise Linux: First Linux platform certified by DISA
DCID 6/3
●
Currently PL3/PL4: ask about kickstarts.
●
Often a component in PL5 systems
DISA SRRs / STIGs
●
Ask about kickstarts.
FIPS 140-2
●
Red Hat / NSS Cryptography Libraries certified Level 2
9
Security Standards Work
Extensible Configuration Checklist Description Format (XCCDF)
 Enumeration for configuration requirements
 DISA FSO committed to deploying STIG as XCCDF
 Others working with NIST
 Security policy becomes one file
Open Vulnerability & Assessment Language (OVAL)
 Machine-readable versions of security advisories
Common Vulnerability and Exposures (CVE) Compatibility
 Trace a vulnerability through multiple vendors
10
Questions?
Red Hat Emerging Technologies
12
13
The Xen Hypervisor
●
Flexible IT Services
●
Disaster Tolerance
●
Life Cycle Management
●
Live Migration
14
Introduction to libvirt API
 Hypervisor agnostic
 Stable API for tool/app development
 CIM providers; Python, C bindings, scriptable
 Allows authenticated/encrypted
sessions to remote hypervisors
 Current support for
 Xen Hypervisor
 KVM Hypervisor
 QEMU Hypervisor
15
Introduction to virt-manager
 Graphical virtual guest management
 Add/Remove resources
dynamically
 Live performance graphs
 Graphical & Serial Console
Emulation
 Connect to remote
hosts
16
Introduction to oVirt
 Currently in development
 Utilizes libvirt
 Web-Based GUI
 Automate clustering,
load balancing,
and SLA maintenance
 Designed for enterprise
management
 Built on Ruby on Rails
 Performance tools built-in
ADMIN NODE
oVirt Web GUI
FreeIPA
DNS/DHCP/TFTP
ISCSI Storage
NODE 1 NODE 2
Guest 1
Guest 2
Guest 3
Guest 4
17
18
19
20
MRG: Messaging
 Provides messaging that is up to 100-fold faster than before
 Spans fast messaging, reliable messaging, large-file messaging
 Implements AMQP, the industry's first open messaging standard, for
unprecedented interoperability that is cross-language, cross-platform, multi-
vendor, spans hardware and software, and extends down to the wire level
 Uses Linux-specific optimizations to achieve optimal performance on Red Hat
Enterprise Linux and MRG Realtime
● Takes advantage of RHEL clustering, IO, kernel, and more
● Includes new high-performance AIO Journal for durable messaging
● Provides native infiniband support for transient messaging
21
About AMQP
 AMQP is an open specification for messaging
● It is a complete specification
● Anyone may use the AMQP specification to create useful implementations
without being charged for the IP rights to do so
 AMQP aims to be technology and language-neutral
● Available in C, C++, Java, JMS, .NET, C#, Ruby, Python, etc.
● Requires IP, and can be used with TCP, UDP, SCTP, Infiniband, etc.
 Products complying with AMQP are inter-operable
● AMQP is a Wire-Level protocol based on the ubiquitous IP
● Wire-level compatibility means it can be embedded in the network
● Applications written to Product X will plug into servers running Product Y
 Red Hat is a founding member of the AMQP Working Group
22
MRG Realtime
 Determinism
Ability to schedule high priority tasks predictably and
consistently
 Priority
Ensure that highest priority applications are not blocked by
low priority
 Quality Of Service (QoS)
Trustworthy, consistent response times
 Proven results
 Average of 38% improvement over stock RHEL5
 Timer event precision enhanced to μ s level, rather than
ms
23
24
MRG: Grid
 Brings advantages of scale-out and flexible deployment to any application
 Delivers better asset utilization, allowing applications to to take advantage of all
available computing resources
 Dynamically provisions additional peak capacity for “Christmas Rush”-like
situations
 Executes across multiple platforms and in virtual machines
 Provides seamless and flexible High Throughput Computing (HTC) and High
Performance Computing (HPC) across
 Local grids
 Remote grids
 Remote clouds (Amazon EC2)
 Cycle-stealing from desktop PCs
25
 Project
 Open Source
 www.freeipa.org
 Started and contributed to by
Red Hat
 Open to all
 IPA = Identity, Policy, Audit
 Big vision
 Start with centralized user
identity management for
UNIX/Linux
 Add robust, shared sense of
machine, service and data
identity
 Provide centrally managed
admin access control for
UNIX/Linux
 Give ability to externalize
policy and add to it easily
 Add centralized audit
 With this you can enable
flexible cross-enterprise policy
and rational audit
26
IPAv1 (February target) will provide
Single Sign on for users
 Tie together Directory and Kerberos
 User Kerberos ticket for SS) to
UNIX/Linux, JBoss, other apps
Centralized authentication point for IT
 Unite Directory, Kerberos, RADIUS
servers, SAMBA
 From Apps, UNIX/Linux, VPNs,
WLANs
Easy for IT to set up, migrate to, and manage
 Simple IPA install
 Intuitive web interface, Command line
 Tools migrate from NIS
Key Data replicated via Directory
Process identity via a Kerberos principal
27
IPAv2 (July target) will provide
Identify and group machines, Vms, services
Simplified service authentication and
establishment of secure communication
 Machine identity via Kerberos,
certificate
 Process identity via Kerberos
principal
Management of machine certificate
Centrally managed access control
 Extensible policy framework
 Set policy of which users can access
which apps on which machines
 Centrally managed scoped admin
control
Central audit database
 Centrally audit security event, logs,
keystrokes (?), compliance with
lockdown
28
RHEL5 Security: Smart Card Support
29
Questions?
SELinux
A Wonderland of Obscure Subsystems
31
Access Control Mechanisms (ACMs)
 Control which users and processes can access different files, devices, interfaces, 
etc., in a computer system.
 This is a primary consideration when securing a computer system or network of any 
size.
 Discretionary Access Control (DAC)
 Access Control Lists (ACLs)
 SELinux
 Mandatory Access Control (MAC)
 Role­Based Access Control (RBAC)
 Multi­Level Security (MLS)
32
Discretionary Access Controls (DAC)
 Basic access controls for objects in a filesystem
 Typical access control provided by file permissions, sharing, etc
 Access is generally at the discretion of the owner of the object (file, directory,
device, etc.).
# ls -L /demos/Harris/
33
Access Control Lists (ACLs)
 Evolution of DAC
 Delegate access decisions to specific user/groups/subsets
 -rw-rw-r--+
# sudo -u hr_worker cat HR_PayrollData
# setfacl -m u:hr_worker:r HR_PayrollData
# sudo -u hr_worker cat HR_PayrollData
34
SELinux Basics: Goals
 Systems Must Be Tamperproof
There must be no way for attackers or others on the system to intentionally or
accidentally disable it or otherwise interfere with its operation
 Systems Must Be Nonbypassable
There must be no way to gain access to system resources except through
mechanisms that use the reference monitor to make access control decisions
 Access Must Be Verifiable
There must be a way to convince third-party evaluators (i.e. Auditors) that the
system will always enforce MLS correctly
 No Covert Channels
Eliminate footprints of other processes on the system (process threads, resource
utilization, disk activities, etc)
35
SELinux Basics: MAC vs DAC
●
DAC does not clearly separate the privileges of users and
applications action on the users behalf, increasing the damage that
can be caused by application exploits.
36
Recent SELinux Examples
37
Recent SELinux Examples
38
Recent SELinux Examples
The Result
39
Using SELinux...
 Apache should not be allowed to overwrite content
 Therefore, Apache – and any program started by Apache – is not given write
access to the data
 SELinux constrains the program, regardless of the user running executable
 The content is protected, even if the Apache PHP/CGI user owns the files
 When attacker uses the same exploit, with SELinux turned on:
Mar 3 23:02:04 rhel4-u4-as kernel: audit(1170820924.171:108):
avc: denied { write } for pid=26760 comm="sh"
name="phpbb" dev=dm-0 ino=1114119
scontext=root:system_r:httpd_sys_script_t
tcontext=root:object_r:httpd_sys_content_t tclass=dir
40
Key Points
 The attack would have been prevented simply by turning
SELinux on, without any further configuration!
 SELinux implements comprehensive control over all
resources, including files, directories, devices, sockets,
networking, IPC, etc.
 SELinux and Linux DAC are orthogonal (both security
checks must pass)
41
SELinux Basics: RHEL5 Improvements
Expanded SELinux targeted policy coverage
●
Provides coverage for all core system services, versus 11 in
Red Hat Enterprise Linux 4
●
Includes support for Multi Level Security (MLS) enforcement model
●
In addition to existing RBAC and TE models
An additional level of protection against security exploits
●
Fine-grained policies via kernel-enforced mandatory access controls
●
Limits the scope of security vulnerabilities
●
Beyond what any other general-purpose OS can deliver
42
SELinux Basics: RHEL5 Improvements, Cont
Loadable Policy Modules
●
In the past, all policy changes had to be made to the policy source
●
Required the entire policy re-compiled
●
Requiring a full set of policy development tools on production systems.
●
Modules allow for the creation of self-contained policy modules
●
Safely linked together to create system policies
●
Add policy on the fly
●
Remove policy on the fly
●
Framework to allow ISV/OEM partners to ship their own modular SELinux
policy
Further Information
●
http://sepolicy-server.sourceforge.net/index.php?page=module-
overview
43
SELinux Basics: RHEL5 Improvements, Cont
ExecShield
 Prevent any memory that was writable from becoming executable.
 Prevents an attacker fromwriting his code into memory and then
executing it
Stack Smashing protection (Canary values)
 Places a canary value at a randomized point above the stack.
 This canary value is verified during normal operation.
 If the stack has been smashed, the canary value will have been
overwritten, indicating that the stack has been smashed.
 This is a method to detect buffer overflows early.
44
SELinux Basics: RHEL5 Improvements, Cont
FORTIFY_SOURCE GCC option
 Compiler knows the size of a buffer
 Functions operate on the buffer to make sure it will not overflow at
runtime.
 This works to help catch format string flaws as well as buffer
overflows.
Unconfined Memory
 Unconfined is a domain that was added to SELinux specifically to
allow applications in this domain to run as if they were not running
on an SELinux system.
 With RHEL5, memory protections have been added to the
unconfined domain.
45
SELinux Compatible Applications
●
SELinux can control all Linux applications.
●
Since policy dictates how processes will access domains, all
one needs to do is construct a policy for their application.
●
Once the policy is constructed, it can be loaded, tested, and
distributed with the application.
46
SELinux Basics: Policy Types
 Targeted Policy (Default)
Applications run unconfined unless explicitly defined policy exists
 Strict Policy
All application actions explicitly allowed through SELinux, else
actions denied
 MLS
Polyinstantiated file systems
Allows for different “views” based on clearance level
47
SELinux: Exploring Contexts
●
All objects have a security context
● user:role:type[:sensitivity:category]
●
Stored as extended attribute on the inode
User
● Strict: audit_u, admin_u, etc.
● Targeted: root, system_u, user_u
Role
● Targeted: files are object_r, processes are system_r
Type
● Type v. domain: httpd_exec_t v. httpd_t
●
Sensitivity: s0-s15, aka “SystemLow-SystemHigh”
●
Category: c0-c1023
●
Set math!
48
SELinux: Exploring Contexts
# ps -axZ
Notice context of ntpd, versus bash
# ls -Z /home
Notice context of ntpd, versus bash
Apache Example
49
SELinux: End-User View
 sealert Notification
50
SELinux: End-User View
 sealert Browser
51
SELinux: System Administrator View
 sealert Browser
52
SELinux: System Administrator View
53
SELinux: System Administrator View
 Using audit2allow & semanage
You are experiencing SELinux errors
You know that these errors are blocking legitimate
usage
Be aware that changes to your SELinux policy could
compromise the security of your system.
54
SELinux: System Administrator View
 Red Hat gives employees a “Corporate Standard Build”
Customized RHEL Desktop
Includes VPN Configuration
 VPN Broke in last update!
time->Wed Mar 5 07:22:55 2008
type=SYSCALL msg=audit(1204719775.306:738): arch=40000003 syscall=54 success=no
exit=-19 a0=4 a1=8933 a2=bfcec1bc a3=bfcec1bc items=0 ppid=3900 pid=5003 auid=501
uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="ip"
exe="/sbin/ip" subj=user_u:system_r:ifconfig_t:s0 key=(null)
type=AVC msg=audit(1204719775.306:738): avc: denied { sys_module } for pid=5003
comm="ip" capability=16 scontext=user_u:system_r:ifconfig_t:s0
tcontext=user_u:system_r:ifconfig_t:s0 tclass=capability
55
SELinux: System Administrator View
<snip>
.............
comm="ip" exe="/sbin/ip" subj=user_u:system_r:ifconfig_t:s0 key=(null)
type=AVC msg=audit(1204719775.306:738): avc: denied { sys_module } for pid=5003
comm="ip" capability=16 scontext=user_u:system_r:ifconfig_t:s0
tcontext=user_u:system_r:ifconfig_t:s0 tclass=capability
.............
</snip>
# ausearch -x "/sbin/ip" | audit2allow -M myVPNfix
# semodule -i myVPNfix
56
SELinux: Auditor View
 Centralized Logging is a must!
aureport
 # aureport –summary
ausearch
 # ausearch -ul swells
57
aide
 Intrusion Detection program
 Ships with RHEL5
# yum install aide
# aide –init
# chmod 777 /etc/hosts
# aide - -check
AIDE found differences between database and filesystem!!
Changed files:
changed:/etc/hosts
Detailed information about changes:
File: /etc/hosts
Permissions: -rw-r--r-- , -rwxrwxrwx
58
aide v auditd
 auditd built into RHEL
 Used in Common Criteria, DCID, STIG compliance
-a exit,possible -S chmod -F arch=${ARCH} -F success=0 -F success!=0
-a exit,always -S open -S pipe -S mkdir -S creat -F arch=${ARCH} -F success=0
-a exit,always -S rename -F arch=${ARCH} -F success!=0

More Related Content

What's hot

VMworld 2013: Technical Deep Dive: Build a Collapsed DMZ Architecture for Opt...
VMworld 2013: Technical Deep Dive: Build a Collapsed DMZ Architecture for Opt...VMworld 2013: Technical Deep Dive: Build a Collapsed DMZ Architecture for Opt...
VMworld 2013: Technical Deep Dive: Build a Collapsed DMZ Architecture for Opt...VMworld
 
VMworld Europe 2014: Advanced Network Services with NSX
VMworld Europe 2014: Advanced Network Services with NSXVMworld Europe 2014: Advanced Network Services with NSX
VMworld Europe 2014: Advanced Network Services with NSXVMworld
 
VMworld 2014: Virtualize your Network with VMware NSX
VMworld 2014: Virtualize your Network with VMware NSXVMworld 2014: Virtualize your Network with VMware NSX
VMworld 2014: Virtualize your Network with VMware NSXVMworld
 
Pivotal Cloud Foundry + NSX
Pivotal Cloud Foundry + NSXPivotal Cloud Foundry + NSX
Pivotal Cloud Foundry + NSXPooja Patel
 
VMworld 2014: VMware NSX and vCloud Automation Center Integration Technical D...
VMworld 2014: VMware NSX and vCloud Automation Center Integration Technical D...VMworld 2014: VMware NSX and vCloud Automation Center Integration Technical D...
VMworld 2014: VMware NSX and vCloud Automation Center Integration Technical D...VMworld
 
VMworld 2015: The Future of Network Virtualization with VMware NSX
VMworld 2015: The Future of Network Virtualization with VMware NSXVMworld 2015: The Future of Network Virtualization with VMware NSX
VMworld 2015: The Future of Network Virtualization with VMware NSXVMworld
 
Securing NFV and SDN Integrated OpenStack Cloud: Challenges and Solutions
Securing NFV and SDN Integrated OpenStack Cloud: Challenges and SolutionsSecuring NFV and SDN Integrated OpenStack Cloud: Challenges and Solutions
Securing NFV and SDN Integrated OpenStack Cloud: Challenges and SolutionsTrinath Somanchi
 
VMworld 2013: VMware NSX Extensibility: Network and Security Services from 3r...
VMworld 2013: VMware NSX Extensibility: Network and Security Services from 3r...VMworld 2013: VMware NSX Extensibility: Network and Security Services from 3r...
VMworld 2013: VMware NSX Extensibility: Network and Security Services from 3r...VMworld
 
Nsx security deep dive
Nsx security deep diveNsx security deep dive
Nsx security deep divesolarisyougood
 
VMware NSX for vSphere - Intro and use cases
VMware NSX for vSphere - Intro and use casesVMware NSX for vSphere - Intro and use cases
VMware NSX for vSphere - Intro and use casesAngel Villar Garea
 
VMworld 2013: Operational Best Practices for NSX in VMware Environments
VMworld 2013: Operational Best Practices for NSX in VMware Environments VMworld 2013: Operational Best Practices for NSX in VMware Environments
VMworld 2013: Operational Best Practices for NSX in VMware Environments VMworld
 
POE+ L2 switches HPE FlexNetwork 5130 vs Dell Networking N2048P
POE+ L2 switches HPE FlexNetwork 5130 vs Dell Networking N2048PPOE+ L2 switches HPE FlexNetwork 5130 vs Dell Networking N2048P
POE+ L2 switches HPE FlexNetwork 5130 vs Dell Networking N2048Pjuet-y
 
Demystifying OpenStack for NFV
Demystifying OpenStack for NFVDemystifying OpenStack for NFV
Demystifying OpenStack for NFVTrinath Somanchi
 
VMware NSX primer 2014
VMware NSX primer 2014VMware NSX primer 2014
VMware NSX primer 2014Sanjay Basu
 
API Management for Software Defined Network (SDN)
API Management for Software Defined Network (SDN)API Management for Software Defined Network (SDN)
API Management for Software Defined Network (SDN)Apigee | Google Cloud
 
VMworld 2013: Advanced VMware NSX Architecture
VMworld 2013: Advanced VMware NSX Architecture VMworld 2013: Advanced VMware NSX Architecture
VMworld 2013: Advanced VMware NSX Architecture VMworld
 
ISO 26262 Approval of Automotive Software Components
ISO 26262 Approval of Automotive Software ComponentsISO 26262 Approval of Automotive Software Components
ISO 26262 Approval of Automotive Software ComponentsReal-Time Innovations (RTI)
 
The dark side of SDN and OpenFlow
The dark side of SDN and OpenFlowThe dark side of SDN and OpenFlow
The dark side of SDN and OpenFlowDiego Kreutz
 

What's hot (20)

VMworld 2013: Technical Deep Dive: Build a Collapsed DMZ Architecture for Opt...
VMworld 2013: Technical Deep Dive: Build a Collapsed DMZ Architecture for Opt...VMworld 2013: Technical Deep Dive: Build a Collapsed DMZ Architecture for Opt...
VMworld 2013: Technical Deep Dive: Build a Collapsed DMZ Architecture for Opt...
 
VMworld Europe 2014: Advanced Network Services with NSX
VMworld Europe 2014: Advanced Network Services with NSXVMworld Europe 2014: Advanced Network Services with NSX
VMworld Europe 2014: Advanced Network Services with NSX
 
VMworld 2014: Virtualize your Network with VMware NSX
VMworld 2014: Virtualize your Network with VMware NSXVMworld 2014: Virtualize your Network with VMware NSX
VMworld 2014: Virtualize your Network with VMware NSX
 
Software defined network
Software defined networkSoftware defined network
Software defined network
 
Pivotal Cloud Foundry + NSX
Pivotal Cloud Foundry + NSXPivotal Cloud Foundry + NSX
Pivotal Cloud Foundry + NSX
 
VMworld 2014: VMware NSX and vCloud Automation Center Integration Technical D...
VMworld 2014: VMware NSX and vCloud Automation Center Integration Technical D...VMworld 2014: VMware NSX and vCloud Automation Center Integration Technical D...
VMworld 2014: VMware NSX and vCloud Automation Center Integration Technical D...
 
VMworld 2015: The Future of Network Virtualization with VMware NSX
VMworld 2015: The Future of Network Virtualization with VMware NSXVMworld 2015: The Future of Network Virtualization with VMware NSX
VMworld 2015: The Future of Network Virtualization with VMware NSX
 
Securing NFV and SDN Integrated OpenStack Cloud: Challenges and Solutions
Securing NFV and SDN Integrated OpenStack Cloud: Challenges and SolutionsSecuring NFV and SDN Integrated OpenStack Cloud: Challenges and Solutions
Securing NFV and SDN Integrated OpenStack Cloud: Challenges and Solutions
 
VMworld 2013: VMware NSX Extensibility: Network and Security Services from 3r...
VMworld 2013: VMware NSX Extensibility: Network and Security Services from 3r...VMworld 2013: VMware NSX Extensibility: Network and Security Services from 3r...
VMworld 2013: VMware NSX Extensibility: Network and Security Services from 3r...
 
Nsx security deep dive
Nsx security deep diveNsx security deep dive
Nsx security deep dive
 
Sdn primer pdf
Sdn primer pdfSdn primer pdf
Sdn primer pdf
 
VMware NSX for vSphere - Intro and use cases
VMware NSX for vSphere - Intro and use casesVMware NSX for vSphere - Intro and use cases
VMware NSX for vSphere - Intro and use cases
 
VMworld 2013: Operational Best Practices for NSX in VMware Environments
VMworld 2013: Operational Best Practices for NSX in VMware Environments VMworld 2013: Operational Best Practices for NSX in VMware Environments
VMworld 2013: Operational Best Practices for NSX in VMware Environments
 
POE+ L2 switches HPE FlexNetwork 5130 vs Dell Networking N2048P
POE+ L2 switches HPE FlexNetwork 5130 vs Dell Networking N2048PPOE+ L2 switches HPE FlexNetwork 5130 vs Dell Networking N2048P
POE+ L2 switches HPE FlexNetwork 5130 vs Dell Networking N2048P
 
Demystifying OpenStack for NFV
Demystifying OpenStack for NFVDemystifying OpenStack for NFV
Demystifying OpenStack for NFV
 
VMware NSX primer 2014
VMware NSX primer 2014VMware NSX primer 2014
VMware NSX primer 2014
 
API Management for Software Defined Network (SDN)
API Management for Software Defined Network (SDN)API Management for Software Defined Network (SDN)
API Management for Software Defined Network (SDN)
 
VMworld 2013: Advanced VMware NSX Architecture
VMworld 2013: Advanced VMware NSX Architecture VMworld 2013: Advanced VMware NSX Architecture
VMworld 2013: Advanced VMware NSX Architecture
 
ISO 26262 Approval of Automotive Software Components
ISO 26262 Approval of Automotive Software ComponentsISO 26262 Approval of Automotive Software Components
ISO 26262 Approval of Automotive Software Components
 
The dark side of SDN and OpenFlow
The dark side of SDN and OpenFlowThe dark side of SDN and OpenFlow
The dark side of SDN and OpenFlow
 

Viewers also liked

Cervical incompetence
Cervical incompetenceCervical incompetence
Cervical incompetenceAdil Muhammed
 
Management of Cervical Incompetence
Management of Cervical IncompetenceManagement of Cervical Incompetence
Management of Cervical IncompetenceKattey Kattey
 
Common gyne. op
Common gyne. opCommon gyne. op
Common gyne. optariggally
 
Cervical insufficiency
Cervical insufficiencyCervical insufficiency
Cervical insufficiencyAlpesh Goswami
 
cerclage for multiple pregnancy
cerclage for multiple pregnancycerclage for multiple pregnancy
cerclage for multiple pregnancyveerendrakumar cm
 
Delhi IVF Fertility & Research Centre in India
Delhi IVF Fertility & Research Centre in IndiaDelhi IVF Fertility & Research Centre in India
Delhi IVF Fertility & Research Centre in IndiaDelhi IVF
 
FIGO best practice recomendations
FIGO best practice recomendationsFIGO best practice recomendations
FIGO best practice recomendationsNARENDRA MALHOTRA
 
Menopause: how to balance your hormones and live vibrantly
Menopause: how to balance your hormones and live vibrantlyMenopause: how to balance your hormones and live vibrantly
Menopause: how to balance your hormones and live vibrantlyVandna Jerath, MD
 
Management of Male fertility and gonodotropin role
Management of Male fertility and gonodotropin roleManagement of Male fertility and gonodotropin role
Management of Male fertility and gonodotropin roleSandro Esteves
 
An ohss – free clinic salide share
An ohss – free clinic salide shareAn ohss – free clinic salide share
An ohss – free clinic salide shareLifecare Centre
 
Progesterone in preterm birth
Progesterone in preterm birthProgesterone in preterm birth
Progesterone in preterm birthfaheta
 
Preterm Birth Interventions_James Litch_10.16.13
Preterm Birth Interventions_James Litch_10.16.13Preterm Birth Interventions_James Litch_10.16.13
Preterm Birth Interventions_James Litch_10.16.13CORE Group
 

Viewers also liked (20)

Cerclage Counseling
Cerclage CounselingCerclage Counseling
Cerclage Counseling
 
Cervical incompetence
Cervical incompetenceCervical incompetence
Cervical incompetence
 
Cervical incompetence
Cervical incompetenceCervical incompetence
Cervical incompetence
 
Management of Cervical Incompetence
Management of Cervical IncompetenceManagement of Cervical Incompetence
Management of Cervical Incompetence
 
Cervical Incompetence
Cervical IncompetenceCervical Incompetence
Cervical Incompetence
 
Common gyne. op
Common gyne. opCommon gyne. op
Common gyne. op
 
Cervical insufficiency
Cervical insufficiencyCervical insufficiency
Cervical insufficiency
 
cerclage for multiple pregnancy
cerclage for multiple pregnancycerclage for multiple pregnancy
cerclage for multiple pregnancy
 
Women’s health: WHO perspectives and actions
Women’s health: WHO perspectives and actionsWomen’s health: WHO perspectives and actions
Women’s health: WHO perspectives and actions
 
Delhi IVF Fertility & Research Centre in India
Delhi IVF Fertility & Research Centre in IndiaDelhi IVF Fertility & Research Centre in India
Delhi IVF Fertility & Research Centre in India
 
Amenorrhoea
Amenorrhoea Amenorrhoea
Amenorrhoea
 
Cos fertilis clinic 2015
Cos fertilis clinic 2015Cos fertilis clinic 2015
Cos fertilis clinic 2015
 
Menopause
MenopauseMenopause
Menopause
 
FIGO best practice recomendations
FIGO best practice recomendationsFIGO best practice recomendations
FIGO best practice recomendations
 
Menopause: how to balance your hormones and live vibrantly
Menopause: how to balance your hormones and live vibrantlyMenopause: how to balance your hormones and live vibrantly
Menopause: how to balance your hormones and live vibrantly
 
Management of Male fertility and gonodotropin role
Management of Male fertility and gonodotropin roleManagement of Male fertility and gonodotropin role
Management of Male fertility and gonodotropin role
 
An ohss – free clinic salide share
An ohss – free clinic salide shareAn ohss – free clinic salide share
An ohss – free clinic salide share
 
Nuchal Translucency Screening
Nuchal Translucency ScreeningNuchal Translucency Screening
Nuchal Translucency Screening
 
Progesterone in preterm birth
Progesterone in preterm birthProgesterone in preterm birth
Progesterone in preterm birth
 
Preterm Birth Interventions_James Litch_10.16.13
Preterm Birth Interventions_James Litch_10.16.13Preterm Birth Interventions_James Litch_10.16.13
Preterm Birth Interventions_James Litch_10.16.13
 

Similar to 2008-03-06 Harris Corp Security Seminar

2008-01-22 Red Hat (Security) Roadmap Presentation
2008-01-22 Red Hat (Security) Roadmap Presentation2008-01-22 Red Hat (Security) Roadmap Presentation
2008-01-22 Red Hat (Security) Roadmap PresentationShawn Wells
 
2008-01-23 Red Hat Overview to CUNY Information Managers Forum
2008-01-23 Red Hat Overview to CUNY Information Managers Forum2008-01-23 Red Hat Overview to CUNY Information Managers Forum
2008-01-23 Red Hat Overview to CUNY Information Managers ForumShawn Wells
 
2008-09-09 IBM Interaction Conference, Red Hat Update for System z
2008-09-09 IBM Interaction Conference, Red Hat Update for System z2008-09-09 IBM Interaction Conference, Red Hat Update for System z
2008-09-09 IBM Interaction Conference, Red Hat Update for System zShawn Wells
 
Red hat's updates on the cloud & infrastructure strategy
Red hat's updates on the cloud & infrastructure strategyRed hat's updates on the cloud & infrastructure strategy
Red hat's updates on the cloud & infrastructure strategyOrgad Kimchi
 
2011-03-15 Lockheed Martin Open Source Day
2011-03-15 Lockheed Martin Open Source Day2011-03-15 Lockheed Martin Open Source Day
2011-03-15 Lockheed Martin Open Source DayShawn Wells
 
Kubernetes Connectivity to Cloud Native Kafka | Christina Lin and Evan Shorti...
Kubernetes Connectivity to Cloud Native Kafka | Christina Lin and Evan Shorti...Kubernetes Connectivity to Cloud Native Kafka | Christina Lin and Evan Shorti...
Kubernetes Connectivity to Cloud Native Kafka | Christina Lin and Evan Shorti...HostedbyConfluent
 
InfoSec 2011: Crash Course Open Source Cloud Computing
InfoSec 2011: Crash Course Open Source Cloud ComputingInfoSec 2011: Crash Course Open Source Cloud Computing
InfoSec 2011: Crash Course Open Source Cloud ComputingMark Hinkle
 
Linuxcon 2011 Crash Course in Open Source Cloud Computing
Linuxcon 2011   Crash Course in Open Source Cloud ComputingLinuxcon 2011   Crash Course in Open Source Cloud Computing
Linuxcon 2011 Crash Course in Open Source Cloud ComputingMark Hinkle
 
Gervais Peter Resume Oct :2015
Gervais Peter Resume Oct :2015Gervais Peter Resume Oct :2015
Gervais Peter Resume Oct :2015Peter Gervais
 
Best Practices for Building Hybrid-Cloud Architectures | Hans Jespersen
Best Practices for Building Hybrid-Cloud Architectures | Hans JespersenBest Practices for Building Hybrid-Cloud Architectures | Hans Jespersen
Best Practices for Building Hybrid-Cloud Architectures | Hans Jespersenconfluent
 
IBM Multicloud Management on the OpenShift Container Platform
IBM Multicloud Management on theOpenShift Container PlatformIBM Multicloud Management on theOpenShift Container Platform
IBM Multicloud Management on the OpenShift Container PlatformMichael Elder
 
Au delà des brokers, un tour de l’environnement Kafka | Florent Ramière
Au delà des brokers, un tour de l’environnement Kafka | Florent RamièreAu delà des brokers, un tour de l’environnement Kafka | Florent Ramière
Au delà des brokers, un tour de l’environnement Kafka | Florent Ramièreconfluent
 
Ohio LinuxFest: Crash Course in Open Source Cloud Computing
Ohio LinuxFest:  Crash Course in Open Source Cloud ComputingOhio LinuxFest:  Crash Course in Open Source Cloud Computing
Ohio LinuxFest: Crash Course in Open Source Cloud ComputingMark Hinkle
 
Locationless data science on a modern secure edge
Locationless data science on a modern secure edgeLocationless data science on a modern secure edge
Locationless data science on a modern secure edgeJohn Archer
 
Netflix Cloud Architecture and Open Source
Netflix Cloud Architecture and Open SourceNetflix Cloud Architecture and Open Source
Netflix Cloud Architecture and Open Sourceaspyker
 
Microsoft.Virtualization.Technologies Son Vu
Microsoft.Virtualization.Technologies Son VuMicrosoft.Virtualization.Technologies Son Vu
Microsoft.Virtualization.Technologies Son Vuvncson
 
5 Steps to a Secure Hybrid Architecture - Session Sponsored by Palo Alto Netw...
5 Steps to a Secure Hybrid Architecture - Session Sponsored by Palo Alto Netw...5 Steps to a Secure Hybrid Architecture - Session Sponsored by Palo Alto Netw...
5 Steps to a Secure Hybrid Architecture - Session Sponsored by Palo Alto Netw...Amazon Web Services
 
PLNOG 17 - Andrzej Jeruzal - Dell Networking OS10: sieciowy system operacyjny...
PLNOG 17 - Andrzej Jeruzal - Dell Networking OS10: sieciowy system operacyjny...PLNOG 17 - Andrzej Jeruzal - Dell Networking OS10: sieciowy system operacyjny...
PLNOG 17 - Andrzej Jeruzal - Dell Networking OS10: sieciowy system operacyjny...PROIDEA
 
Enabling the Deployment of Edge Services with the Open Network Edge Services ...
Enabling the Deployment of Edge Services with the Open Network Edge Services ...Enabling the Deployment of Edge Services with the Open Network Edge Services ...
Enabling the Deployment of Edge Services with the Open Network Edge Services ...Liz Warner
 

Similar to 2008-03-06 Harris Corp Security Seminar (20)

2008-01-22 Red Hat (Security) Roadmap Presentation
2008-01-22 Red Hat (Security) Roadmap Presentation2008-01-22 Red Hat (Security) Roadmap Presentation
2008-01-22 Red Hat (Security) Roadmap Presentation
 
2008-01-23 Red Hat Overview to CUNY Information Managers Forum
2008-01-23 Red Hat Overview to CUNY Information Managers Forum2008-01-23 Red Hat Overview to CUNY Information Managers Forum
2008-01-23 Red Hat Overview to CUNY Information Managers Forum
 
2008-09-09 IBM Interaction Conference, Red Hat Update for System z
2008-09-09 IBM Interaction Conference, Red Hat Update for System z2008-09-09 IBM Interaction Conference, Red Hat Update for System z
2008-09-09 IBM Interaction Conference, Red Hat Update for System z
 
Red hat's updates on the cloud & infrastructure strategy
Red hat's updates on the cloud & infrastructure strategyRed hat's updates on the cloud & infrastructure strategy
Red hat's updates on the cloud & infrastructure strategy
 
2011-03-15 Lockheed Martin Open Source Day
2011-03-15 Lockheed Martin Open Source Day2011-03-15 Lockheed Martin Open Source Day
2011-03-15 Lockheed Martin Open Source Day
 
Kubernetes Connectivity to Cloud Native Kafka | Christina Lin and Evan Shorti...
Kubernetes Connectivity to Cloud Native Kafka | Christina Lin and Evan Shorti...Kubernetes Connectivity to Cloud Native Kafka | Christina Lin and Evan Shorti...
Kubernetes Connectivity to Cloud Native Kafka | Christina Lin and Evan Shorti...
 
InfoSec 2011: Crash Course Open Source Cloud Computing
InfoSec 2011: Crash Course Open Source Cloud ComputingInfoSec 2011: Crash Course Open Source Cloud Computing
InfoSec 2011: Crash Course Open Source Cloud Computing
 
Linuxcon 2011 Crash Course in Open Source Cloud Computing
Linuxcon 2011   Crash Course in Open Source Cloud ComputingLinuxcon 2011   Crash Course in Open Source Cloud Computing
Linuxcon 2011 Crash Course in Open Source Cloud Computing
 
Gervais Peter Resume Oct :2015
Gervais Peter Resume Oct :2015Gervais Peter Resume Oct :2015
Gervais Peter Resume Oct :2015
 
Best Practices for Building Hybrid-Cloud Architectures | Hans Jespersen
Best Practices for Building Hybrid-Cloud Architectures | Hans JespersenBest Practices for Building Hybrid-Cloud Architectures | Hans Jespersen
Best Practices for Building Hybrid-Cloud Architectures | Hans Jespersen
 
IBM Multicloud Management on the OpenShift Container Platform
IBM Multicloud Management on theOpenShift Container PlatformIBM Multicloud Management on theOpenShift Container Platform
IBM Multicloud Management on the OpenShift Container Platform
 
Au delà des brokers, un tour de l’environnement Kafka | Florent Ramière
Au delà des brokers, un tour de l’environnement Kafka | Florent RamièreAu delà des brokers, un tour de l’environnement Kafka | Florent Ramière
Au delà des brokers, un tour de l’environnement Kafka | Florent Ramière
 
Ohio LinuxFest: Crash Course in Open Source Cloud Computing
Ohio LinuxFest:  Crash Course in Open Source Cloud ComputingOhio LinuxFest:  Crash Course in Open Source Cloud Computing
Ohio LinuxFest: Crash Course in Open Source Cloud Computing
 
Locationless data science on a modern secure edge
Locationless data science on a modern secure edgeLocationless data science on a modern secure edge
Locationless data science on a modern secure edge
 
Netflix Cloud Architecture and Open Source
Netflix Cloud Architecture and Open SourceNetflix Cloud Architecture and Open Source
Netflix Cloud Architecture and Open Source
 
Microsoft.Virtualization.Technologies Son Vu
Microsoft.Virtualization.Technologies Son VuMicrosoft.Virtualization.Technologies Son Vu
Microsoft.Virtualization.Technologies Son Vu
 
5 Steps to a Secure Hybrid Architecture - Session Sponsored by Palo Alto Netw...
5 Steps to a Secure Hybrid Architecture - Session Sponsored by Palo Alto Netw...5 Steps to a Secure Hybrid Architecture - Session Sponsored by Palo Alto Netw...
5 Steps to a Secure Hybrid Architecture - Session Sponsored by Palo Alto Netw...
 
PLNOG 17 - Andrzej Jeruzal - Dell Networking OS10: sieciowy system operacyjny...
PLNOG 17 - Andrzej Jeruzal - Dell Networking OS10: sieciowy system operacyjny...PLNOG 17 - Andrzej Jeruzal - Dell Networking OS10: sieciowy system operacyjny...
PLNOG 17 - Andrzej Jeruzal - Dell Networking OS10: sieciowy system operacyjny...
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Enabling the Deployment of Edge Services with the Open Network Edge Services ...
Enabling the Deployment of Edge Services with the Open Network Edge Services ...Enabling the Deployment of Edge Services with the Open Network Edge Services ...
Enabling the Deployment of Edge Services with the Open Network Edge Services ...
 

More from Shawn Wells

2017-10-10 AUSA 2017: Repeatable DCO Platforms
2017-10-10 AUSA 2017: Repeatable DCO Platforms2017-10-10 AUSA 2017: Repeatable DCO Platforms
2017-10-10 AUSA 2017: Repeatable DCO PlatformsShawn Wells
 
2017-07-12 GovLoop: New Era of Digital Security
2017-07-12 GovLoop: New Era of Digital Security2017-07-12 GovLoop: New Era of Digital Security
2017-07-12 GovLoop: New Era of Digital SecurityShawn Wells
 
2017-07-11 GovLoop: Changing the Open Hybrid Cloud Game (Deploying OpenShift ...
2017-07-11 GovLoop: Changing the Open Hybrid Cloud Game (Deploying OpenShift ...2017-07-11 GovLoop: Changing the Open Hybrid Cloud Game (Deploying OpenShift ...
2017-07-11 GovLoop: Changing the Open Hybrid Cloud Game (Deploying OpenShift ...Shawn Wells
 
2017 02-17 rsac 2017 tech-f02
2017 02-17 rsac 2017 tech-f022017 02-17 rsac 2017 tech-f02
2017 02-17 rsac 2017 tech-f02Shawn Wells
 
2017-02-21 AFCEA West Building Continuous Integration & Deployment (CI/CD) Pi...
2017-02-21 AFCEA West Building Continuous Integration & Deployment (CI/CD) Pi...2017-02-21 AFCEA West Building Continuous Integration & Deployment (CI/CD) Pi...
2017-02-21 AFCEA West Building Continuous Integration & Deployment (CI/CD) Pi...Shawn Wells
 
2016 -11-18 OpenSCAP Workshop Coursebook
2016 -11-18 OpenSCAP Workshop Coursebook2016 -11-18 OpenSCAP Workshop Coursebook
2016 -11-18 OpenSCAP Workshop CoursebookShawn Wells
 
2016-08-29 AFITC Security Automation
2016-08-29 AFITC Security Automation2016-08-29 AFITC Security Automation
2016-08-29 AFITC Security AutomationShawn Wells
 
2016-08-24 FedInsider Webinar with Jennifer Kron - Securing Intelligence in a...
2016-08-24 FedInsider Webinar with Jennifer Kron - Securing Intelligence in a...2016-08-24 FedInsider Webinar with Jennifer Kron - Securing Intelligence in a...
2016-08-24 FedInsider Webinar with Jennifer Kron - Securing Intelligence in a...Shawn Wells
 
2016-08-18 Red Hat Partner Security Update
2016-08-18 Red Hat Partner Security Update2016-08-18 Red Hat Partner Security Update
2016-08-18 Red Hat Partner Security UpdateShawn Wells
 
2015-11-15 - Supercomputing 2015 - Applied Cross Domain
2015-11-15 - Supercomputing 2015 - Applied Cross Domain2015-11-15 - Supercomputing 2015 - Applied Cross Domain
2015-11-15 - Supercomputing 2015 - Applied Cross DomainShawn Wells
 
2015-10-05 Fermilabs DevOps Alone in the Dark
2015-10-05 Fermilabs DevOps Alone in the Dark2015-10-05 Fermilabs DevOps Alone in the Dark
2015-10-05 Fermilabs DevOps Alone in the DarkShawn Wells
 
2015-06-25 Red Hat Summit 2015 - Security Compliance Made Easy
2015-06-25 Red Hat Summit 2015 - Security Compliance Made Easy2015-06-25 Red Hat Summit 2015 - Security Compliance Made Easy
2015-06-25 Red Hat Summit 2015 - Security Compliance Made EasyShawn Wells
 
2015 06-12 DevOpsDC 2015 - Consumer to Collaborator
2015 06-12 DevOpsDC 2015 - Consumer to Collaborator2015 06-12 DevOpsDC 2015 - Consumer to Collaborator
2015 06-12 DevOpsDC 2015 - Consumer to CollaboratorShawn Wells
 
2015-01-27 ssa opening remarks
2015-01-27 ssa opening remarks2015-01-27 ssa opening remarks
2015-01-27 ssa opening remarksShawn Wells
 
2014-12-16 defense news - shutdown the hackers
2014-12-16  defense news - shutdown the hackers2014-12-16  defense news - shutdown the hackers
2014-12-16 defense news - shutdown the hackersShawn Wells
 
2014-07-31 customer convergence applied scap
2014-07-31 customer convergence applied scap2014-07-31 customer convergence applied scap
2014-07-31 customer convergence applied scapShawn Wells
 
2014-07-30 defense in depth scap workbook
2014-07-30 defense in depth scap workbook2014-07-30 defense in depth scap workbook
2014-07-30 defense in depth scap workbookShawn Wells
 
2014-05-08 IT Craftsmanship to IT Manufacturing
2014-05-08 IT Craftsmanship to IT Manufacturing2014-05-08 IT Craftsmanship to IT Manufacturing
2014-05-08 IT Craftsmanship to IT ManufacturingShawn Wells
 
2014-04-28 cloud security frameworks and enforcement
2014-04-28 cloud security frameworks and enforcement2014-04-28 cloud security frameworks and enforcement
2014-04-28 cloud security frameworks and enforcementShawn Wells
 
2014 04-17 Applied SCAP, Red Hat Summit 2014
2014 04-17 Applied SCAP, Red Hat Summit 20142014 04-17 Applied SCAP, Red Hat Summit 2014
2014 04-17 Applied SCAP, Red Hat Summit 2014Shawn Wells
 

More from Shawn Wells (20)

2017-10-10 AUSA 2017: Repeatable DCO Platforms
2017-10-10 AUSA 2017: Repeatable DCO Platforms2017-10-10 AUSA 2017: Repeatable DCO Platforms
2017-10-10 AUSA 2017: Repeatable DCO Platforms
 
2017-07-12 GovLoop: New Era of Digital Security
2017-07-12 GovLoop: New Era of Digital Security2017-07-12 GovLoop: New Era of Digital Security
2017-07-12 GovLoop: New Era of Digital Security
 
2017-07-11 GovLoop: Changing the Open Hybrid Cloud Game (Deploying OpenShift ...
2017-07-11 GovLoop: Changing the Open Hybrid Cloud Game (Deploying OpenShift ...2017-07-11 GovLoop: Changing the Open Hybrid Cloud Game (Deploying OpenShift ...
2017-07-11 GovLoop: Changing the Open Hybrid Cloud Game (Deploying OpenShift ...
 
2017 02-17 rsac 2017 tech-f02
2017 02-17 rsac 2017 tech-f022017 02-17 rsac 2017 tech-f02
2017 02-17 rsac 2017 tech-f02
 
2017-02-21 AFCEA West Building Continuous Integration & Deployment (CI/CD) Pi...
2017-02-21 AFCEA West Building Continuous Integration & Deployment (CI/CD) Pi...2017-02-21 AFCEA West Building Continuous Integration & Deployment (CI/CD) Pi...
2017-02-21 AFCEA West Building Continuous Integration & Deployment (CI/CD) Pi...
 
2016 -11-18 OpenSCAP Workshop Coursebook
2016 -11-18 OpenSCAP Workshop Coursebook2016 -11-18 OpenSCAP Workshop Coursebook
2016 -11-18 OpenSCAP Workshop Coursebook
 
2016-08-29 AFITC Security Automation
2016-08-29 AFITC Security Automation2016-08-29 AFITC Security Automation
2016-08-29 AFITC Security Automation
 
2016-08-24 FedInsider Webinar with Jennifer Kron - Securing Intelligence in a...
2016-08-24 FedInsider Webinar with Jennifer Kron - Securing Intelligence in a...2016-08-24 FedInsider Webinar with Jennifer Kron - Securing Intelligence in a...
2016-08-24 FedInsider Webinar with Jennifer Kron - Securing Intelligence in a...
 
2016-08-18 Red Hat Partner Security Update
2016-08-18 Red Hat Partner Security Update2016-08-18 Red Hat Partner Security Update
2016-08-18 Red Hat Partner Security Update
 
2015-11-15 - Supercomputing 2015 - Applied Cross Domain
2015-11-15 - Supercomputing 2015 - Applied Cross Domain2015-11-15 - Supercomputing 2015 - Applied Cross Domain
2015-11-15 - Supercomputing 2015 - Applied Cross Domain
 
2015-10-05 Fermilabs DevOps Alone in the Dark
2015-10-05 Fermilabs DevOps Alone in the Dark2015-10-05 Fermilabs DevOps Alone in the Dark
2015-10-05 Fermilabs DevOps Alone in the Dark
 
2015-06-25 Red Hat Summit 2015 - Security Compliance Made Easy
2015-06-25 Red Hat Summit 2015 - Security Compliance Made Easy2015-06-25 Red Hat Summit 2015 - Security Compliance Made Easy
2015-06-25 Red Hat Summit 2015 - Security Compliance Made Easy
 
2015 06-12 DevOpsDC 2015 - Consumer to Collaborator
2015 06-12 DevOpsDC 2015 - Consumer to Collaborator2015 06-12 DevOpsDC 2015 - Consumer to Collaborator
2015 06-12 DevOpsDC 2015 - Consumer to Collaborator
 
2015-01-27 ssa opening remarks
2015-01-27 ssa opening remarks2015-01-27 ssa opening remarks
2015-01-27 ssa opening remarks
 
2014-12-16 defense news - shutdown the hackers
2014-12-16  defense news - shutdown the hackers2014-12-16  defense news - shutdown the hackers
2014-12-16 defense news - shutdown the hackers
 
2014-07-31 customer convergence applied scap
2014-07-31 customer convergence applied scap2014-07-31 customer convergence applied scap
2014-07-31 customer convergence applied scap
 
2014-07-30 defense in depth scap workbook
2014-07-30 defense in depth scap workbook2014-07-30 defense in depth scap workbook
2014-07-30 defense in depth scap workbook
 
2014-05-08 IT Craftsmanship to IT Manufacturing
2014-05-08 IT Craftsmanship to IT Manufacturing2014-05-08 IT Craftsmanship to IT Manufacturing
2014-05-08 IT Craftsmanship to IT Manufacturing
 
2014-04-28 cloud security frameworks and enforcement
2014-04-28 cloud security frameworks and enforcement2014-04-28 cloud security frameworks and enforcement
2014-04-28 cloud security frameworks and enforcement
 
2014 04-17 Applied SCAP, Red Hat Summit 2014
2014 04-17 Applied SCAP, Red Hat Summit 20142014 04-17 Applied SCAP, Red Hat Summit 2014
2014 04-17 Applied SCAP, Red Hat Summit 2014
 

Recently uploaded

Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...
Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...
Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...confluent
 
SensoDat: Simulation-based Sensor Dataset of Self-driving Cars
SensoDat: Simulation-based Sensor Dataset of Self-driving CarsSensoDat: Simulation-based Sensor Dataset of Self-driving Cars
SensoDat: Simulation-based Sensor Dataset of Self-driving CarsChristian Birchler
 
Tech Tuesday Slides - Introduction to Project Management with OnePlan's Work ...
Tech Tuesday Slides - Introduction to Project Management with OnePlan's Work ...Tech Tuesday Slides - Introduction to Project Management with OnePlan's Work ...
Tech Tuesday Slides - Introduction to Project Management with OnePlan's Work ...OnePlan Solutions
 
Osi security architecture in network.pptx
Osi security architecture in network.pptxOsi security architecture in network.pptx
Osi security architecture in network.pptxVinzoCenzo
 
SpotFlow: Tracking Method Calls and States at Runtime
SpotFlow: Tracking Method Calls and States at RuntimeSpotFlow: Tracking Method Calls and States at Runtime
SpotFlow: Tracking Method Calls and States at Runtimeandrehoraa
 
eSoftTools IMAP Backup Software and migration tools
eSoftTools IMAP Backup Software and migration toolseSoftTools IMAP Backup Software and migration tools
eSoftTools IMAP Backup Software and migration toolsosttopstonverter
 
SoftTeco - Software Development Company Profile
SoftTeco - Software Development Company ProfileSoftTeco - Software Development Company Profile
SoftTeco - Software Development Company Profileakrivarotava
 
Introduction to Firebase Workshop Slides
Introduction to Firebase Workshop SlidesIntroduction to Firebase Workshop Slides
Introduction to Firebase Workshop Slidesvaideheekore1
 
Best Angular 17 Classroom & Online training - Naresh IT
Best Angular 17 Classroom & Online training - Naresh ITBest Angular 17 Classroom & Online training - Naresh IT
Best Angular 17 Classroom & Online training - Naresh ITmanoharjgpsolutions
 
VictoriaMetrics Q1 Meet Up '24 - Community & News Update
VictoriaMetrics Q1 Meet Up '24 - Community & News UpdateVictoriaMetrics Q1 Meet Up '24 - Community & News Update
VictoriaMetrics Q1 Meet Up '24 - Community & News UpdateVictoriaMetrics
 
Powering Real-Time Decisions with Continuous Data Streams
Powering Real-Time Decisions with Continuous Data StreamsPowering Real-Time Decisions with Continuous Data Streams
Powering Real-Time Decisions with Continuous Data StreamsSafe Software
 
2024 DevNexus Patterns for Resiliency: Shuffle shards
2024 DevNexus Patterns for Resiliency: Shuffle shards2024 DevNexus Patterns for Resiliency: Shuffle shards
2024 DevNexus Patterns for Resiliency: Shuffle shardsChristopher Curtin
 
Odoo 14 - eLearning Module In Odoo 14 Enterprise
Odoo 14 - eLearning Module In Odoo 14 EnterpriseOdoo 14 - eLearning Module In Odoo 14 Enterprise
Odoo 14 - eLearning Module In Odoo 14 Enterprisepreethippts
 
OpenChain Education Work Group Monthly Meeting - 2024-04-10 - Full Recording
OpenChain Education Work Group Monthly Meeting - 2024-04-10 - Full RecordingOpenChain Education Work Group Monthly Meeting - 2024-04-10 - Full Recording
OpenChain Education Work Group Monthly Meeting - 2024-04-10 - Full RecordingShane Coughlan
 
Effectively Troubleshoot 9 Types of OutOfMemoryError
Effectively Troubleshoot 9 Types of OutOfMemoryErrorEffectively Troubleshoot 9 Types of OutOfMemoryError
Effectively Troubleshoot 9 Types of OutOfMemoryErrorTier1 app
 
Exploring Selenium_Appium Frameworks for Seamless Integration with HeadSpin.pdf
Exploring Selenium_Appium Frameworks for Seamless Integration with HeadSpin.pdfExploring Selenium_Appium Frameworks for Seamless Integration with HeadSpin.pdf
Exploring Selenium_Appium Frameworks for Seamless Integration with HeadSpin.pdfkalichargn70th171
 
SAM Training Session - How to use EXCEL ?
SAM Training Session - How to use EXCEL ?SAM Training Session - How to use EXCEL ?
SAM Training Session - How to use EXCEL ?Alexandre Beguel
 
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...Cizo Technology Services
 
What’s New in VictoriaMetrics: Q1 2024 Updates
What’s New in VictoriaMetrics: Q1 2024 UpdatesWhat’s New in VictoriaMetrics: Q1 2024 Updates
What’s New in VictoriaMetrics: Q1 2024 UpdatesVictoriaMetrics
 
Post Quantum Cryptography – The Impact on Identity
Post Quantum Cryptography – The Impact on IdentityPost Quantum Cryptography – The Impact on Identity
Post Quantum Cryptography – The Impact on Identityteam-WIBU
 

Recently uploaded (20)

Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...
Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...
Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...
 
SensoDat: Simulation-based Sensor Dataset of Self-driving Cars
SensoDat: Simulation-based Sensor Dataset of Self-driving CarsSensoDat: Simulation-based Sensor Dataset of Self-driving Cars
SensoDat: Simulation-based Sensor Dataset of Self-driving Cars
 
Tech Tuesday Slides - Introduction to Project Management with OnePlan's Work ...
Tech Tuesday Slides - Introduction to Project Management with OnePlan's Work ...Tech Tuesday Slides - Introduction to Project Management with OnePlan's Work ...
Tech Tuesday Slides - Introduction to Project Management with OnePlan's Work ...
 
Osi security architecture in network.pptx
Osi security architecture in network.pptxOsi security architecture in network.pptx
Osi security architecture in network.pptx
 
SpotFlow: Tracking Method Calls and States at Runtime
SpotFlow: Tracking Method Calls and States at RuntimeSpotFlow: Tracking Method Calls and States at Runtime
SpotFlow: Tracking Method Calls and States at Runtime
 
eSoftTools IMAP Backup Software and migration tools
eSoftTools IMAP Backup Software and migration toolseSoftTools IMAP Backup Software and migration tools
eSoftTools IMAP Backup Software and migration tools
 
SoftTeco - Software Development Company Profile
SoftTeco - Software Development Company ProfileSoftTeco - Software Development Company Profile
SoftTeco - Software Development Company Profile
 
Introduction to Firebase Workshop Slides
Introduction to Firebase Workshop SlidesIntroduction to Firebase Workshop Slides
Introduction to Firebase Workshop Slides
 
Best Angular 17 Classroom & Online training - Naresh IT
Best Angular 17 Classroom & Online training - Naresh ITBest Angular 17 Classroom & Online training - Naresh IT
Best Angular 17 Classroom & Online training - Naresh IT
 
VictoriaMetrics Q1 Meet Up '24 - Community & News Update
VictoriaMetrics Q1 Meet Up '24 - Community & News UpdateVictoriaMetrics Q1 Meet Up '24 - Community & News Update
VictoriaMetrics Q1 Meet Up '24 - Community & News Update
 
Powering Real-Time Decisions with Continuous Data Streams
Powering Real-Time Decisions with Continuous Data StreamsPowering Real-Time Decisions with Continuous Data Streams
Powering Real-Time Decisions with Continuous Data Streams
 
2024 DevNexus Patterns for Resiliency: Shuffle shards
2024 DevNexus Patterns for Resiliency: Shuffle shards2024 DevNexus Patterns for Resiliency: Shuffle shards
2024 DevNexus Patterns for Resiliency: Shuffle shards
 
Odoo 14 - eLearning Module In Odoo 14 Enterprise
Odoo 14 - eLearning Module In Odoo 14 EnterpriseOdoo 14 - eLearning Module In Odoo 14 Enterprise
Odoo 14 - eLearning Module In Odoo 14 Enterprise
 
OpenChain Education Work Group Monthly Meeting - 2024-04-10 - Full Recording
OpenChain Education Work Group Monthly Meeting - 2024-04-10 - Full RecordingOpenChain Education Work Group Monthly Meeting - 2024-04-10 - Full Recording
OpenChain Education Work Group Monthly Meeting - 2024-04-10 - Full Recording
 
Effectively Troubleshoot 9 Types of OutOfMemoryError
Effectively Troubleshoot 9 Types of OutOfMemoryErrorEffectively Troubleshoot 9 Types of OutOfMemoryError
Effectively Troubleshoot 9 Types of OutOfMemoryError
 
Exploring Selenium_Appium Frameworks for Seamless Integration with HeadSpin.pdf
Exploring Selenium_Appium Frameworks for Seamless Integration with HeadSpin.pdfExploring Selenium_Appium Frameworks for Seamless Integration with HeadSpin.pdf
Exploring Selenium_Appium Frameworks for Seamless Integration with HeadSpin.pdf
 
SAM Training Session - How to use EXCEL ?
SAM Training Session - How to use EXCEL ?SAM Training Session - How to use EXCEL ?
SAM Training Session - How to use EXCEL ?
 
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
 
What’s New in VictoriaMetrics: Q1 2024 Updates
What’s New in VictoriaMetrics: Q1 2024 UpdatesWhat’s New in VictoriaMetrics: Q1 2024 Updates
What’s New in VictoriaMetrics: Q1 2024 Updates
 
Post Quantum Cryptography – The Impact on Identity
Post Quantum Cryptography – The Impact on IdentityPost Quantum Cryptography – The Impact on Identity
Post Quantum Cryptography – The Impact on Identity
 

2008-03-06 Harris Corp Security Seminar

  • 1. Red Hat Security Seminar Shawn D. Wells (swells@redhat.com) Solutions Architect, Federal Team
  • 2. 2 Agenda  Start: 10:30 am  End: 1:00 pm, ish  Red Hat Emerging Technologies  Red Hat Security  Summary & Close
  • 5. 5 Open Source – A Better Way  Returns control  Security reinforced through transparency  Multiplies the development capacity Bugs per 1000 Lines of Code Linux 2.6 Kernel 0.17 Stanford University/Coverity Proprietary Software 10 to 20 Carnegie Mellon Cylab Wired Magazine, Dec 2004
  • 6. 6 Open Source as a Security Innovation  Time from a critical issue being known to the public until the day that fix available  Red Hat Enterprise Linux 4  FEB 2005 – FEB 2006
  • 7. 7 SELinux: Building Security Openly NSA Develops SELinux Integrated into Linux Kernel Integrated into Open Source Project Enabled By DEFAULT In RHEL Customers, NSA, Community, and Red Hat continue evolution
  • 8. 8 Red Hat Security Certifications NIAP/Common Criteria: The most evaluated operating system platform ● Red Hat Enterprise Linux 2.1 – EAL 2 (Completed: February 2004) ● Red Hat Enterprise Linux 3 EAL 3+/CAPP (Completed: August 2004) ● Red Hat Enterprise Linux 4 EAL 4+/CAPP (Completed: February 2006) ● Red Hat Enterprise Linux 5 EAL4+/CAPP/LSPP/RBAC (Completed: June 2007) DII-COE ● Red Hat Enterprise Linux 3 (Self-Certification Completed: October 2004) ● Red Hat Enterprise Linux: First Linux platform certified by DISA DCID 6/3 ● Currently PL3/PL4: ask about kickstarts. ● Often a component in PL5 systems DISA SRRs / STIGs ● Ask about kickstarts. FIPS 140-2 ● Red Hat / NSS Cryptography Libraries certified Level 2
  • 9. 9 Security Standards Work Extensible Configuration Checklist Description Format (XCCDF)  Enumeration for configuration requirements  DISA FSO committed to deploying STIG as XCCDF  Others working with NIST  Security policy becomes one file Open Vulnerability & Assessment Language (OVAL)  Machine-readable versions of security advisories Common Vulnerability and Exposures (CVE) Compatibility  Trace a vulnerability through multiple vendors
  • 11. Red Hat Emerging Technologies
  • 12. 12
  • 13. 13 The Xen Hypervisor ● Flexible IT Services ● Disaster Tolerance ● Life Cycle Management ● Live Migration
  • 14. 14 Introduction to libvirt API  Hypervisor agnostic  Stable API for tool/app development  CIM providers; Python, C bindings, scriptable  Allows authenticated/encrypted sessions to remote hypervisors  Current support for  Xen Hypervisor  KVM Hypervisor  QEMU Hypervisor
  • 15. 15 Introduction to virt-manager  Graphical virtual guest management  Add/Remove resources dynamically  Live performance graphs  Graphical & Serial Console Emulation  Connect to remote hosts
  • 16. 16 Introduction to oVirt  Currently in development  Utilizes libvirt  Web-Based GUI  Automate clustering, load balancing, and SLA maintenance  Designed for enterprise management  Built on Ruby on Rails  Performance tools built-in ADMIN NODE oVirt Web GUI FreeIPA DNS/DHCP/TFTP ISCSI Storage NODE 1 NODE 2 Guest 1 Guest 2 Guest 3 Guest 4
  • 17. 17
  • 18. 18
  • 19. 19
  • 20. 20 MRG: Messaging  Provides messaging that is up to 100-fold faster than before  Spans fast messaging, reliable messaging, large-file messaging  Implements AMQP, the industry's first open messaging standard, for unprecedented interoperability that is cross-language, cross-platform, multi- vendor, spans hardware and software, and extends down to the wire level  Uses Linux-specific optimizations to achieve optimal performance on Red Hat Enterprise Linux and MRG Realtime ● Takes advantage of RHEL clustering, IO, kernel, and more ● Includes new high-performance AIO Journal for durable messaging ● Provides native infiniband support for transient messaging
  • 21. 21 About AMQP  AMQP is an open specification for messaging ● It is a complete specification ● Anyone may use the AMQP specification to create useful implementations without being charged for the IP rights to do so  AMQP aims to be technology and language-neutral ● Available in C, C++, Java, JMS, .NET, C#, Ruby, Python, etc. ● Requires IP, and can be used with TCP, UDP, SCTP, Infiniband, etc.  Products complying with AMQP are inter-operable ● AMQP is a Wire-Level protocol based on the ubiquitous IP ● Wire-level compatibility means it can be embedded in the network ● Applications written to Product X will plug into servers running Product Y  Red Hat is a founding member of the AMQP Working Group
  • 22. 22 MRG Realtime  Determinism Ability to schedule high priority tasks predictably and consistently  Priority Ensure that highest priority applications are not blocked by low priority  Quality Of Service (QoS) Trustworthy, consistent response times  Proven results  Average of 38% improvement over stock RHEL5  Timer event precision enhanced to μ s level, rather than ms
  • 23. 23
  • 24. 24 MRG: Grid  Brings advantages of scale-out and flexible deployment to any application  Delivers better asset utilization, allowing applications to to take advantage of all available computing resources  Dynamically provisions additional peak capacity for “Christmas Rush”-like situations  Executes across multiple platforms and in virtual machines  Provides seamless and flexible High Throughput Computing (HTC) and High Performance Computing (HPC) across  Local grids  Remote grids  Remote clouds (Amazon EC2)  Cycle-stealing from desktop PCs
  • 25. 25  Project  Open Source  www.freeipa.org  Started and contributed to by Red Hat  Open to all  IPA = Identity, Policy, Audit  Big vision  Start with centralized user identity management for UNIX/Linux  Add robust, shared sense of machine, service and data identity  Provide centrally managed admin access control for UNIX/Linux  Give ability to externalize policy and add to it easily  Add centralized audit  With this you can enable flexible cross-enterprise policy and rational audit
  • 26. 26 IPAv1 (February target) will provide Single Sign on for users  Tie together Directory and Kerberos  User Kerberos ticket for SS) to UNIX/Linux, JBoss, other apps Centralized authentication point for IT  Unite Directory, Kerberos, RADIUS servers, SAMBA  From Apps, UNIX/Linux, VPNs, WLANs Easy for IT to set up, migrate to, and manage  Simple IPA install  Intuitive web interface, Command line  Tools migrate from NIS Key Data replicated via Directory Process identity via a Kerberos principal
  • 27. 27 IPAv2 (July target) will provide Identify and group machines, Vms, services Simplified service authentication and establishment of secure communication  Machine identity via Kerberos, certificate  Process identity via Kerberos principal Management of machine certificate Centrally managed access control  Extensible policy framework  Set policy of which users can access which apps on which machines  Centrally managed scoped admin control Central audit database  Centrally audit security event, logs, keystrokes (?), compliance with lockdown
  • 28. 28 RHEL5 Security: Smart Card Support
  • 30. SELinux A Wonderland of Obscure Subsystems
  • 31. 31 Access Control Mechanisms (ACMs)  Control which users and processes can access different files, devices, interfaces,  etc., in a computer system.  This is a primary consideration when securing a computer system or network of any  size.  Discretionary Access Control (DAC)  Access Control Lists (ACLs)  SELinux  Mandatory Access Control (MAC)  Role­Based Access Control (RBAC)  Multi­Level Security (MLS)
  • 32. 32 Discretionary Access Controls (DAC)  Basic access controls for objects in a filesystem  Typical access control provided by file permissions, sharing, etc  Access is generally at the discretion of the owner of the object (file, directory, device, etc.). # ls -L /demos/Harris/
  • 33. 33 Access Control Lists (ACLs)  Evolution of DAC  Delegate access decisions to specific user/groups/subsets  -rw-rw-r--+ # sudo -u hr_worker cat HR_PayrollData # setfacl -m u:hr_worker:r HR_PayrollData # sudo -u hr_worker cat HR_PayrollData
  • 34. 34 SELinux Basics: Goals  Systems Must Be Tamperproof There must be no way for attackers or others on the system to intentionally or accidentally disable it or otherwise interfere with its operation  Systems Must Be Nonbypassable There must be no way to gain access to system resources except through mechanisms that use the reference monitor to make access control decisions  Access Must Be Verifiable There must be a way to convince third-party evaluators (i.e. Auditors) that the system will always enforce MLS correctly  No Covert Channels Eliminate footprints of other processes on the system (process threads, resource utilization, disk activities, etc)
  • 35. 35 SELinux Basics: MAC vs DAC ● DAC does not clearly separate the privileges of users and applications action on the users behalf, increasing the damage that can be caused by application exploits.
  • 39. 39 Using SELinux...  Apache should not be allowed to overwrite content  Therefore, Apache – and any program started by Apache – is not given write access to the data  SELinux constrains the program, regardless of the user running executable  The content is protected, even if the Apache PHP/CGI user owns the files  When attacker uses the same exploit, with SELinux turned on: Mar 3 23:02:04 rhel4-u4-as kernel: audit(1170820924.171:108): avc: denied { write } for pid=26760 comm="sh" name="phpbb" dev=dm-0 ino=1114119 scontext=root:system_r:httpd_sys_script_t tcontext=root:object_r:httpd_sys_content_t tclass=dir
  • 40. 40 Key Points  The attack would have been prevented simply by turning SELinux on, without any further configuration!  SELinux implements comprehensive control over all resources, including files, directories, devices, sockets, networking, IPC, etc.  SELinux and Linux DAC are orthogonal (both security checks must pass)
  • 41. 41 SELinux Basics: RHEL5 Improvements Expanded SELinux targeted policy coverage ● Provides coverage for all core system services, versus 11 in Red Hat Enterprise Linux 4 ● Includes support for Multi Level Security (MLS) enforcement model ● In addition to existing RBAC and TE models An additional level of protection against security exploits ● Fine-grained policies via kernel-enforced mandatory access controls ● Limits the scope of security vulnerabilities ● Beyond what any other general-purpose OS can deliver
  • 42. 42 SELinux Basics: RHEL5 Improvements, Cont Loadable Policy Modules ● In the past, all policy changes had to be made to the policy source ● Required the entire policy re-compiled ● Requiring a full set of policy development tools on production systems. ● Modules allow for the creation of self-contained policy modules ● Safely linked together to create system policies ● Add policy on the fly ● Remove policy on the fly ● Framework to allow ISV/OEM partners to ship their own modular SELinux policy Further Information ● http://sepolicy-server.sourceforge.net/index.php?page=module- overview
  • 43. 43 SELinux Basics: RHEL5 Improvements, Cont ExecShield  Prevent any memory that was writable from becoming executable.  Prevents an attacker fromwriting his code into memory and then executing it Stack Smashing protection (Canary values)  Places a canary value at a randomized point above the stack.  This canary value is verified during normal operation.  If the stack has been smashed, the canary value will have been overwritten, indicating that the stack has been smashed.  This is a method to detect buffer overflows early.
  • 44. 44 SELinux Basics: RHEL5 Improvements, Cont FORTIFY_SOURCE GCC option  Compiler knows the size of a buffer  Functions operate on the buffer to make sure it will not overflow at runtime.  This works to help catch format string flaws as well as buffer overflows. Unconfined Memory  Unconfined is a domain that was added to SELinux specifically to allow applications in this domain to run as if they were not running on an SELinux system.  With RHEL5, memory protections have been added to the unconfined domain.
  • 45. 45 SELinux Compatible Applications ● SELinux can control all Linux applications. ● Since policy dictates how processes will access domains, all one needs to do is construct a policy for their application. ● Once the policy is constructed, it can be loaded, tested, and distributed with the application.
  • 46. 46 SELinux Basics: Policy Types  Targeted Policy (Default) Applications run unconfined unless explicitly defined policy exists  Strict Policy All application actions explicitly allowed through SELinux, else actions denied  MLS Polyinstantiated file systems Allows for different “views” based on clearance level
  • 47. 47 SELinux: Exploring Contexts ● All objects have a security context ● user:role:type[:sensitivity:category] ● Stored as extended attribute on the inode User ● Strict: audit_u, admin_u, etc. ● Targeted: root, system_u, user_u Role ● Targeted: files are object_r, processes are system_r Type ● Type v. domain: httpd_exec_t v. httpd_t ● Sensitivity: s0-s15, aka “SystemLow-SystemHigh” ● Category: c0-c1023 ● Set math!
  • 48. 48 SELinux: Exploring Contexts # ps -axZ Notice context of ntpd, versus bash # ls -Z /home Notice context of ntpd, versus bash Apache Example
  • 49. 49 SELinux: End-User View  sealert Notification
  • 50. 50 SELinux: End-User View  sealert Browser
  • 51. 51 SELinux: System Administrator View  sealert Browser
  • 53. 53 SELinux: System Administrator View  Using audit2allow & semanage You are experiencing SELinux errors You know that these errors are blocking legitimate usage Be aware that changes to your SELinux policy could compromise the security of your system.
  • 54. 54 SELinux: System Administrator View  Red Hat gives employees a “Corporate Standard Build” Customized RHEL Desktop Includes VPN Configuration  VPN Broke in last update! time->Wed Mar 5 07:22:55 2008 type=SYSCALL msg=audit(1204719775.306:738): arch=40000003 syscall=54 success=no exit=-19 a0=4 a1=8933 a2=bfcec1bc a3=bfcec1bc items=0 ppid=3900 pid=5003 auid=501 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="ip" exe="/sbin/ip" subj=user_u:system_r:ifconfig_t:s0 key=(null) type=AVC msg=audit(1204719775.306:738): avc: denied { sys_module } for pid=5003 comm="ip" capability=16 scontext=user_u:system_r:ifconfig_t:s0 tcontext=user_u:system_r:ifconfig_t:s0 tclass=capability
  • 55. 55 SELinux: System Administrator View <snip> ............. comm="ip" exe="/sbin/ip" subj=user_u:system_r:ifconfig_t:s0 key=(null) type=AVC msg=audit(1204719775.306:738): avc: denied { sys_module } for pid=5003 comm="ip" capability=16 scontext=user_u:system_r:ifconfig_t:s0 tcontext=user_u:system_r:ifconfig_t:s0 tclass=capability ............. </snip> # ausearch -x "/sbin/ip" | audit2allow -M myVPNfix # semodule -i myVPNfix
  • 56. 56 SELinux: Auditor View  Centralized Logging is a must! aureport  # aureport –summary ausearch  # ausearch -ul swells
  • 57. 57 aide  Intrusion Detection program  Ships with RHEL5 # yum install aide # aide –init # chmod 777 /etc/hosts # aide - -check AIDE found differences between database and filesystem!! Changed files: changed:/etc/hosts Detailed information about changes: File: /etc/hosts Permissions: -rw-r--r-- , -rwxrwxrwx
  • 58. 58 aide v auditd  auditd built into RHEL  Used in Common Criteria, DCID, STIG compliance -a exit,possible -S chmod -F arch=${ARCH} -F success=0 -F success!=0 -a exit,always -S open -S pipe -S mkdir -S creat -F arch=${ARCH} -F success=0 -a exit,always -S rename -F arch=${ARCH} -F success!=0