+ All Categories
Home > Documents > Digital Certificates & Signaturesl NREAC 2018 · 2/21/2018 3 PKI Tools Category Tools MMC...

Digital Certificates & Signaturesl NREAC 2018 · 2/21/2018 3 PKI Tools Category Tools MMC...

Date post: 30-Jul-2018
Category:
Upload: lamkiet
View: 220 times
Download: 0 times
Share this document with a friend
20
2/21/2018 1 Jay Ferron CEHi, CISSP, CHFIi, C)PTEi, CISM, CRISC, CVEi, MCITP, MCSE, MCT, MVP, NSA- IAM… [email protected] blog.mir.net Digital Certificates & Signatures Spear Phishing Spear Phishing
Transcript
Page 1: Digital Certificates & Signaturesl NREAC 2018 · 2/21/2018 3 PKI Tools Category Tools MMC Certificates console Certificate Templates console Certification Authority console Command

2/21/2018

1

Jay Ferron

CEHi, CISSP, CHFIi, C)PTEi, CISM, CRISC, CVEi, MCITP, MCSE, MCT, MVP, NSA-IAM…

[email protected]

blog.mir.net

Digital Certificates & Signatures

Spear Phishing

Spear Phishing

Page 2: Digital Certificates & Signaturesl NREAC 2018 · 2/21/2018 3 PKI Tools Category Tools MMC Certificates console Certificate Templates console Certification Authority console Command

2/21/2018

2

Spear Phishing

What Is a PKI?

Requirement PKI solutions

Confidentiality Data encryption

Integrity Digital signatures

AuthenticityHash algorithms, message digests, digital signatures

Nonrepudiation Digital signatures, audit logs

Availability Redundancy

The combination of software, encryption technologies, processes, and services that enables an organization to secure its communications and business transactions

Components of a PKI

Certificate and CAManagement Tools

Certification Authority

Certificate and CRLDistribution Points

Certificate Template

Digital

Certificate

Certificate

Revocation List

Public Key-Enabled

Applications and Services

Page 3: Digital Certificates & Signaturesl NREAC 2018 · 2/21/2018 3 PKI Tools Category Tools MMC Certificates console Certificate Templates console Certification Authority console Command

2/21/2018

3

PKI Tools

Category Tools

MMCCertificates console

Certificate Templates console

Certification Authority console

Command lineCertutil.exe

Certreq.exe

Resource kitKey Recovery Tool

PKI Health Tool

ProgrammaticCryptoAPI

CAPICOM

Introduction to Cryptography

• Encryption Keys

• How Does Symmetric Encryption Work?

• How Does Public Key Encryption Work?

• How Does Public Key Digital Signing Work?

Encryption Keys

Key type Description

Symmetric

Same key is used to encrypt and decrypt the data

It protects the data from interception

Asymmetric

It consists of a public and private key

The private key is protected, the public key is widely

distributed

If the private key is used to encrypt data, the public

key is used to decrypt data, and vice versa

Page 4: Digital Certificates & Signaturesl NREAC 2018 · 2/21/2018 3 PKI Tools Category Tools MMC Certificates console Certificate Templates console Certification Authority console Command

2/21/2018

4

How Does Symmetric Encryption Work?

Original Data Cipher Text Original Data

Symmetric encryption:

Uses the same key

Is often referred to as bulk encryption

Is vulnerable if the symmetric key is obtained

How Does Public Key Encryption Work?

Requirement Process

1. The recipient’s public key is retrieved

2. The data is encrypted with a symmetric key

3. The symmetric key is encrypted with the recipient’s public key

4. The encrypted symmetric key and encrypted data are sent to the recipient

5. The recipient decrypts the symmetric key with her private key

6. The data is decrypted with the symmetric key

How Does Public Key Digital Signing Work?

Process Process

1. Data is passed through a hash algorithm, producing a hash value

2. The hash value is encrypted with the sender’s private key

3. The sender’s certificate, encrypted hash value, and original data are sent to the recipient

4. The recipient decrypts the hash value with the sender’s public key

5. Data is passed through the hash algorithm, and the hash values are compared

Page 5: Digital Certificates & Signaturesl NREAC 2018 · 2/21/2018 3 PKI Tools Category Tools MMC Certificates console Certificate Templates console Certification Authority console Command

2/21/2018

5

Lesson: Certificates and Certification Authorities

• What Is a Digital Certificate?

• What Are Certificate Extensions?

• What Is a Certification Authority?

• Certification Authority Hierarchies

• Roles in a Certification Authority Hierarchy

• What Are Trusted Root Certificates?

A digital certificate:

Verifies the identity of a user, computer, or program

Contains information about the issuer and the subject

Is signed by a CA

What Is a Digital Certificate?

What Are Certificate Extensions?

Certificate extensions:

Provide additional information about the subject

Contain both version 1 and version 3 fields

Page 6: Digital Certificates & Signaturesl NREAC 2018 · 2/21/2018 3 PKI Tools Category Tools MMC Certificates console Certificate Templates console Certification Authority console Command

2/21/2018

6

A certification authority:

Verifies the identity of a certificate requestor

The mode of identification depends on the type of CA

Issues certificates

The certificate template or requested certificate determines the information in the certificate

Manages certificate revocation

The CRL ensures that invalid certificates are not used

What Is a Certification Authority?

Certification Authority Hierarchies

Type of hierarchy Description

Root

Enhances security and scalability

Provides flexible administration

Supports commercial CAs

Supports most applications

Cross Certification

Provides interoperability between businesses

and between products

Joins disparate PKI domains

Assumes complete trust of a foreign CA

hierarchy

Roles in a Certification Authority Hierarchy

Root CA

Policy CA

Issuing CA

Page 7: Digital Certificates & Signaturesl NREAC 2018 · 2/21/2018 3 PKI Tools Category Tools MMC Certificates console Certificate Templates console Certification Authority console Command

2/21/2018

7

What Are Trusted Root Certificates?

Root certificates are self-signed certificates issued to CAs

Trusted root certificates are:

Root certificates designated as trustworthy

Designated by adding them to a trusted root store

Microsoft Root

Certificate Program

AIA container in theConfiguration NC

Certification Authoritiescontainer in the

Configuration NC

Computer’s Trusted

Root CA Store

User’s Trusted Root CA Store

User’s Trusted Root CA Store

Demo : Identifying Trusted Root CAs

In this demo, you will:

• Identify trusted root stores

• Remove trusted root CAs that are not required

Lesson: Configuring Secure E-mail Messages

• Steps to Configure Secure E-mail Messages

• How to Create the Required Certificate Templates

• Steps for Configuring an Enterprise CA

• How to Deploy E-mail Certificates

• Configure Outlook 2002 for Secure E-mail Messages

Page 8: Digital Certificates & Signaturesl NREAC 2018 · 2/21/2018 3 PKI Tools Category Tools MMC Certificates console Certificate Templates console Certification Authority console Command

2/21/2018

8

Steps to Configure Secure E-mail Messages

Create certificate templates11

Configure the enterprise CA to enable

key recovery22

Deploy the certificate using

autoenrollment settings3

Verify the Outlook configuration44

How to Create the Required Certificate Templates

Template type Steps

E-mail encryption

1. Create a certificate template based on Exchange User2. In the new certificate template:

Choose a CSP that allows private key export

Enable archival of private key

Enable strong private key protection

Publish the certificate in Active Directory3. Enable autoenrollment

E-mail signing

1. Create a certificate template based on Exchange Signature Only

2. Enable strong private key protection3. Publish the certificate in Active Directory4. Enable autoenrollment

Steps for Configuring an Enterprise CA

Enforce role separation11 Define key recovery agents22

Publish custom templates44Define certificate managers33

Page 9: Digital Certificates & Signaturesl NREAC 2018 · 2/21/2018 3 PKI Tools Category Tools MMC Certificates console Certificate Templates console Certification Authority console Command

2/21/2018

9

How to Deploy E-mail Certificates

To deploy e-mail certificates:

Enforce high security for strong password protection

Ensure that the certificate templates require user input during enrollment and when the private key is accessed

Define permissions for the certificate templates

Publish new certificate templates at an enterprise CA

Enable autoenrollment settings for users in Group Policy

11

22

33

44

55

Encryption

Certificate

CASigning

Certificate

Configure Outlook for Secure E-mail Messages

Option Configuration choices

Signing and Encryption certificates

Any Secure Email certificate in the user’s certificate store

Hash algorithmsSHA1: StrongestMD5: Weakest

Encryption algorithms

AES3DESRC2 (128-bit or 64-bit)DESRC2 (40-bit)

Outgoing e-mail default settings

Encrypt outgoing messagesSign outgoing messagesSend plaintext signed messagesRequest secure receipts for signed messages

After installing the custom e-mail certificates, define these options:

Strongest

Weakest

Or you can buy email Certs

Provider Cost

ComodoFree for personal useFrom $12 for business use

Symantec $19.95

GeoTrust $19.95

CACert Free

Page 10: Digital Certificates & Signaturesl NREAC 2018 · 2/21/2018 3 PKI Tools Category Tools MMC Certificates console Certificate Templates console Certification Authority console Command

2/21/2018

10

Example of process

Requesting Cert

Requesting Cert – continued

Page 11: Digital Certificates & Signaturesl NREAC 2018 · 2/21/2018 3 PKI Tools Category Tools MMC Certificates console Certificate Templates console Certification Authority console Command

2/21/2018

11

Requesting Cert – continued

Requesting Cert – continued

Requesting Cert – continued

Page 12: Digital Certificates & Signaturesl NREAC 2018 · 2/21/2018 3 PKI Tools Category Tools MMC Certificates console Certificate Templates console Certification Authority console Command

2/21/2018

12

Verifying cert

Verifying cert – continued

Verifying cert – continued

Page 13: Digital Certificates & Signaturesl NREAC 2018 · 2/21/2018 3 PKI Tools Category Tools MMC Certificates console Certificate Templates console Certification Authority console Command

2/21/2018

13

Adding Cert to Outlook

The cert is now in the cert store. In IE Go to Options ~ Advanced ~ Certificates ~ View certificates ~ Select the certificate and choose to back it up to a PKCS12 File, and save the backup file in a place where you will keep it long term. Retain the backup password. This backs up the certificate signing key as well as the certificate.

Adding Cert to Outlook – continued

Open Outlook and navigate to Options ~ Trust Centre ~ Trust Centre Settings ~ Email Security ~ and Choose to import a Digital ID. Choose to import from the file you just backed up, using the email you supplied on the application form as the digital id, and the backup password. As part of this process you will be asked for a security policy level - choose medium if you can guarantee no-one else could use your account on your computer, high (and supply a password to be used whenever your certificate is requested) otherwise. Take a note of the password.

Adding Cert to Outlook – continued

Open Outlook and navigate to Options ~ Trust Centre ~ Trust Centre Settings ~ Email Security ~ and Choose to import a Digital ID. Choose to import from the file you just backed up, using the email you supplied on the application form as the digital id, and the backup password. As part of this process you will be asked for a security policy level - choose medium if you can guarantee no-one else could use your account on your computer, high (and supply a password to be used whenever your certificate is requested) otherwise. Take a note of the password.

Page 14: Digital Certificates & Signaturesl NREAC 2018 · 2/21/2018 3 PKI Tools Category Tools MMC Certificates console Certificate Templates console Certification Authority console Command

2/21/2018

14

Adding Cert to Outlook – continued

In the same place in Outlook, look under the Heading 'Encrypted email' for 'Default setting' and choose 'Settings'. If there is no existing Default, you may need to create a new one by entering a settings name. Under 'Signing certificate' press the 'Choose' button and choose the certificate you just imported. (If unsure single click on a cert and choose to examine its properties - the email address will be under 'issued to'). In the next setting choose the Signing Hash as SHA256, Under ' Encryption certificate' press the 'Choose' button and choose the certificate you just imported, and select the 'Encryption algorithm' as AES (256 bit).

OK out of all dialogs and restart Outlook

Lesson: Recovering E-mail Private Keys

• How to Recover E-mail Private Keys

• Guidelines for Recovering E-mail Private Keys

How to Recover E-mail Private Keys

A. The certificate manager:

Determines the KRA or KRAs11

Extracts the PKCS #7 blob22

B. The KRA:

Chooses the Key Recovery Tool11

Recovers the private key22

Securely transports the private key to the user33

C. The user:

Imports the recovered private key11

Reconfigures Outlook to use the private key22

Page 15: Digital Certificates & Signaturesl NREAC 2018 · 2/21/2018 3 PKI Tools Category Tools MMC Certificates console Certificate Templates console Certification Authority console Command

2/21/2018

15

Guidelines for Recovering E-mail Private Keys

When recovering e-mail private keys:

Separate the certificate manager and KRA roles

Revoke the certificate associated with a compromised private key before performing key recovery

Prohibit the recovery of digital signature private keys

Minimize the number of CAs that perform key archival

The Advanced, Persistent Threat

Information Privacy is the most important security concern in the enterprise, outranking malware for the first time

So how does this happen?

Percentage cause of data breachPercentage cause of data breach

Cost of Data Breach report

Ponemon Institute 2010

Estimated sources of data breachEstimated sources of data breach

Global State of Information Security Survey

PriceWaterhouseCoopers 2010

Likely Source 2008 2009 2010

Current Employee

34% 33% 32%

Former Employee 16% 29% 23%

Hacker 28% 26% 31%

Customer 8% 10% 12%

Partner/Supplier 7% 8% 11%

Unknown 42% 39% 34%

0%

20%

40%

60%

80%

100%

US DE FR DE AU

System Glitch

Negligence

MaliciousAttack

Page 16: Digital Certificates & Signaturesl NREAC 2018 · 2/21/2018 3 PKI Tools Category Tools MMC Certificates console Certificate Templates console Certification Authority console Command

2/21/2018

16

So lets talk solution – info protection – what is it?

• Not sure what to put here, but I need to stage the idea is that its protection centric to the data itself –vs perimeter and system protection

• Importance on IT vs. User, making it automatic, low-impact, etc.

• What we’re going to talk about today are two enabling technologies – RMS and DAC, and we’ll talk about each now.

Information Protection

Discover, protect and manage confidential data throughout your business with a comprehensive solution integrated into the platform and applications

• Protect critical data wherever it goes

• Protect data whereverit resides

• Secure endpoints to reduce risk

Protect everywhere,access anywhere

• Simplify deployment and ongoing management

• Enable compliance with information security policy

Simplify security, manage compliance

• Extend confidential communication to partners

• Built into the Windows platform and Microsoft applications

Integrate and extend security

PersistentProtection

+EncryptionPolicy: Access Permissions

Use Right Permissions

AD Rights Management Services

• Provides identity-based protection for sensitive data

• Controls access to information across the information lifecycle

• Allows only authorized access based on trusted identity

• Secures transmission and storage of sensitive information wherever it goes – policies embedded into the content; documents encrypted

• Embeds digital usage policies (print, view, edit, expiration etc. ) into the content to help prevent misuse after delivery

Page 17: Digital Certificates & Signaturesl NREAC 2018 · 2/21/2018 3 PKI Tools Category Tools MMC Certificates console Certificate Templates console Certification Authority console Command

2/21/2018

17

The AD RMS Process: Document Protection & Consumption

Information Author

AD RMS

Recipient

Data in Motion: Exchange and AD RMS Integration

• Exchange Server provides a single point in the organization to control the protection of e-mail messages

Automatic Content-Based Privacy:• Transport Rule action to apply AD RMS template to e-mail message

• Transport Rules support regex scanning of attachments in Exchange 2010

• Do Not Forward policy available out of box

@

@

Data at Rest: Integrating SharePoint with AD RMS

AD RMS

Page 18: Digital Certificates & Signaturesl NREAC 2018 · 2/21/2018 3 PKI Tools Category Tools MMC Certificates console Certificate Templates console Certification Authority console Command

2/21/2018

18

Data at Rest: Generic File Protection Explorer

Dynamic Access Control 101

Access Control AuditingClassification RMS Protection

Classify Information

Modify / Create file

Determine classification

Save classification

In-box content

classifier

3rd party classificatio

n plugin

Page 19: Digital Certificates & Signaturesl NREAC 2018 · 2/21/2018 3 PKI Tools Category Tools MMC Certificates console Certificate Templates console Certification Authority console Command

2/21/2018

19

Centralized Access to Files

USER CLAIMSUser.Department = Finance

User.Clearance = High

ACCESS POLICY

with the finance department.

ACCESS POLICYFor access to finance information that has high business impact, a user must be a finance

department employee with a high security clearance, and be using a managed device registered with the finance department.

DEVICE CLAIMSDevice.Department = Finance

Device.Managed = True

FILE PROPERTIESFile.Department = Finance

File.Impact = High

Components

Access Denied Remediation

Workflow

Access denied remediation provides a user access to a file when it has been initially denied:

1. The user attempts to read a file.

2. The server returns an “access denied” error message because the user has not been assigned the appropriate claims.

3. On a computer running Windows® 8, Windows retrieves the access information from the File Server Resource Manager on the file server and presents a message with the access remediation options, which may include a link for requesting access.

4. When the user has satisfied the access requirements (e.g. signs an NDA or provides other authentication) the user’s claims are updated and the user can access the file.

Auditing For Compliance And Analysis

Today• Audit is all or nothing

• Not contextual information

Windows Server 2012• Expression based auditing

• Audit resource attribute changes

• Enhanced audit entries to include context

required for compliance and operational reporting

USER CLAIMSUser.Department = Finance

User.Clearance = High

AUDIT POLICYAudit Success/Fail if (File.Department==Finance) OR (File.Impact=High)

DEVICE CLAIMSDevice.Department = Finance

Device.Managed = True

FILE PROPERTIESFile.Department = Finance

File.Impact = High

Page 20: Digital Certificates & Signaturesl NREAC 2018 · 2/21/2018 3 PKI Tools Category Tools MMC Certificates console Certificate Templates console Certification Authority console Command

2/21/2018

20

Protecting Sensitive Information

Dynamic Access Control allows sensitive information to be automatically protected using AD Rights Management Services

1. A rule is created to automatically apply RMS protection to any file that contains the word “confidential”.

2. A user creates a file with the word “confidential” in the text and saves it.

3. The RMS Dynamic Access Control classification engine, following rules set in the Central Access Policy, discovers the doc with the word “confidential” and initiates RMS protection accordingly.

4. The RMS template and encryption are applied to the document on the file server and it is classified and encrypted.

Dynamic Access Control on File Servers

File inherits classification tags from parent folder

Manual tagging by owner

Automatic tagging

Tagging by applications

Central access policies based on classification

Expression-based access conditions for user claims, device claims, and file tags

Access denied remediation

Central access policies based on classification

Expression-based access conditions for user claims, device claims, and file tags

Access denied remediation

Central audit policies can be applied across multiple file servers

Expression-based audits for user claims, device claims, and file tags

Staging audits to simulate policy changes in a real environment

Automatic Rights Management Services (RMS) protection for Microsoft Office documents

Near real-time protection when a file is tagged

Extensibility for non-Office RMS protectors

Automatic Rights Management Services (RMS) protection for Microsoft Office documents

Near real-time protection when a file is tagged

Extensibility for non-Office RMS protectors

Classification Access Control Auditing RMS Protection

Questions

Thank You

Jay Ferron

CEHi, CISSP, CHFIi, C)PTEi, CISM, CRISC, CVEi, MCITP, MCSE,

MCT, MVP, NSA-IAM…

[email protected]

blog.mir.net


Recommended