<section title="14.1. Standard Operating Environments"><subsection title="Objective"><paragraph
    title="14.1.1."

    tags="Information Security Documentation"


><![CDATA[<p>Standard Operating Environments (SOE) are hardened in order to minimise attacks and compromise through known vulnerabilities and attack vectors.</p>]]></paragraph>
 </subsection>
<subsection title="Context"> <block title="Scope"><paragraph
    title="14.1.2."


><![CDATA[<p>This section covers information on the hardening of software used on workstations and servers on systems within agency control.</p>]]></paragraph>
</block>
<block title="Characterisation"><paragraph
    title="14.1.3."


><![CDATA[<p>Characterisation is a technique used to analyse and record a system’s configuration. It is important as it can be used as a baseline to verify the system’s integrity at a later date. It is also important that the baseline has high levels of integrity and assurance to avoid reinfecting systems or reintroducing compromises when restoring from baselines.</p>]]></paragraph>
<paragraph
    title="14.1.4."


><![CDATA[<p>In virtual environments a baseline is usually a “snapshot” or image take at a point in time. If the image or snapshot is infected, then restoring from that image can result in further compromise. See also <a title="Virtualisation" href="http://nzism.gcsb.govt.nz/ism-document#Section-17306">Section 22.2 – Virtualisation</a> and <a title="VLANs" href="http://nzism.gcsb.govt.nz/ism-document#Section-17362">22.3 – Virtual Local Area Networks</a>.</p>]]></paragraph>
<paragraph
    title="14.1.5."


><![CDATA[<p>Methods of characterising files and directories include:</p><ul>
<li>performing a cryptographic checksum on the files/directories when they are known to be virus/contaminant free;</li>
<li>documenting the name, type, size and attributes of legitimate files and directories, along with any changes to this information expected under normal operating conditions; or</li>
<li>for a Windows system, taking a system difference snapshot.</li>
</ul>]]></paragraph>
</block>
</subsection>
<subsection title="References"><paragraph
    title="14.1.6."


><![CDATA[<p>Further references can be found at:</p><table class="table-main">
<tbody>
<tr>
<td><strong>Reference</strong></td>
<td><strong>Title</strong></td>
<td style="text-align: center;"><strong>Publisher</strong></td>
<td><strong>Source</strong></td>
</tr>
<tr>
<td>
<p><strong><strong>ISO/IEC 27001:2013&nbsp;</strong></strong></p>
</td>
<td>
<p><strong><strong><strong>A.12.4.1,&nbsp;</strong></strong>Control of Operational Software</strong></p>
</td>
<td style="text-align: center;">
<p>ISO</p>
</td>
<td>
<p><a title="Information technology — Security techniques — Information security management systems — Requirements" rel="noopener noreferrer" href="https://www.iso.org/standard/54534.html" target="_blank">https://www.iso.org/standard/54534.html</a></p>
</td>
</tr>
<tr>
<td>
<p><strong><strong>ISO/IEC 27001:2013&nbsp;</strong></strong></p>
</td>
<td>
<p><strong><strong>A.12.6.1,&nbsp;</strong>Control of Technical Vulnerabilities</strong></p>
</td>
<td style="text-align: center;">
<p>ISO</p>
</td>
<td>
<p><a title="Information technology — Security techniques — Information security management systems — Requirements" rel="noopener noreferrer" href="https://www.iso.org/standard/54534.html" target="_blank">https://www.iso.org/standard/54534.html</a><a rel="noopener noreferrer" href="http://www.standards.co.nz" target="_blank"><br></a></p>
</td>
</tr>
<tr>
<td>&nbsp;</td>
<td>
<p><strong>Independent testing of different antivirus software and their effectiveness</strong></p>
</td>
<td style="text-align: center;">
<p>AV Comparatives</p>
</td>
<td>
<p><a rel="noopener noreferrer" href="https://www.av-comparatives.org/" target="_blank">https://www.av-comparatives.org/</a></p>
</td>
</tr>
</tbody>
</table>]]></paragraph>
 </subsection>
<subsection title="PSR references"><paragraph
    title="14.1.7."


><![CDATA[<p class="NormS10C7">Relevant PSR requirements can be found at:</p>
<table class="table-grey" style="width: 100%; height: 255.07px;">
<tbody>
<tr style="height: 51.5556px;">
<td style="width: 19.2976%; height: 51.5556px;">
<p><strong>Reference</strong></p>
</td>
<td style="width: 17.733%; height: 51.5556px;">
<p><strong>Title</strong></p>
</td>
<td style="width: 62.9346%; height: 51.5556px;">
<p><strong>Source</strong></p>
</td>
</tr>
<tr style="height: 203.514px;">
<td style="width: 19.2976%; height: 203.514px;">
<p><strong>PSR Mandatory Requirements</strong></p>
</td>
<td style="width: 17.733%; height: 203.514px;">
<p>GOV3, INFOSEC1, INFOSEC2, INFOSEC3, INFOSEC4, PHYSEC1 and PHYSEC2</p>
</td>
<td style="width: 62.9346%; height: 203.514px;">
<p><a title="PSR Home" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/" target="_blank">Home | Protective Security Requirements</a><br><a href="https://www.protectivesecurity.govt.nz/policy/security-governance"></a></p>
<p><a title="Security Governance" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/policy/security-governance" target="_blank">Security governance (GOV) | Protective Security Requirements</a></p>
<p><a title="Information Security" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/policy/information-security" target="_blank">Information security (INFOSEC) | Protective Security Requirements</a> &nbsp;</p>
<a title="Physical Security" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/policy/physical-security" target="_blank">Physical security (PHYSEC) | Protective Security Requirements</a></td>
</tr>
</tbody>
</table>]]></paragraph>
 </subsection>
<subsection title="Rationale &amp; Controls"> <block title="Developing hardened SOEs"><paragraph
    title="14.1.8.R.01."

    tags="Technical,Software Security,Standard Operating Environments"


><![CDATA[<p>Antivirus and anti-malware software, while an important defensive measure, can be defeated by malicious code that has yet to be identified by antivirus vendors. This can include targeted attacks, where a new virus is engineered or an existing one modified to defeat the signature-based detection schemes.</p>]]></paragraph>
<paragraph
    title="14.1.8.R.02."

    tags="Technical,Software Security,Standard Operating Environments"


><![CDATA[<p>The use of antivirus and anti-malware software, while adding value to the defence of workstations, cannot be relied solely upon to protect the workstation. As such agencies still need to deploy appropriately hardened SOEs to assist with the protection of workstations against a broader range of security risks.</p>]]></paragraph>
<paragraph
    title="14.1.8.C.01."

    tags="Technical,Software Security,Standard Operating Environments"


    classification="All Classifications"
    compliance="Should"
    cid="1149"
><![CDATA[<p>Agencies SHOULD develop a hardened SOE for workstations and servers, covering:</p><ul>
<li>removal of unneeded software and operating system components;</li>
<li>removal or disabling of unneeded services, ports and BIOS settings;</li>
<li>disabling of unused or undesired functionality in software and operating systems;</li>
<li>implementation of access controls on relevant objects to limit system users and programs to the minimum access required;</li>
<li>installation of antivirus and anti-malware software;</li>
<li>installation of software-based firewalls limiting inbound and outbound network connections; </li>
<li>configuration of either remote logging or the transfer of local event logs to a central server; and</li>
<li>protection of audit and other logs through the use of a one way pipe to reduce likelihood of compromise key transaction records.</li>
</ul>]]></paragraph>
</block>
<block title="Maintaining hardened SOEs"><paragraph
    title="14.1.9.R.01."

    tags="Technical,Software Security,Standard Operating Environments"


><![CDATA[<p>Whilst a SOE can be sufficiently hardened when it is deployed, its security will progressively degrade over time. Agencies can address the degradation of the security of a SOE by ensuring that patches are continually applied, system users are not able to disable or bypass security functionality and antivirus and other security software is appropriately maintained with the latest signatures and updates.</p>]]></paragraph>
<paragraph
    title="14.1.9.R.02."

    tags="Technical,Software Security,Standard Operating Environments"


><![CDATA[<p>End Point Agents monitor traffic and apply security policies on applications, storage interfaces and data in real-time. Administrators actively block or monitor and log policy breaches. The End Point Agent can also create forensic monitoring to facilitate incident investigation.</p>]]></paragraph>
<paragraph
    title="14.1.9.R.03."

    tags="Technical,SOPs,Standard Operating Environments"


><![CDATA[<p>End Point Agents can monitor user activity, such as the cut, copy, paste, print, print screen operations and copying data to external drives and other devices.  The Agent can then apply policies to limit such activity.</p>]]></paragraph>
<paragraph
    title="14.1.9.C.01."

    tags="Technical,Software Security,Standard Operating Environments"


    classification="All Classifications"
    compliance="Must"
    cid="1158"
><![CDATA[<p>Agencies MUST ensure that for all servers and workstations:</p><ul>
<li>a technical specification is agreed for each platform with specified controls;</li>
<li>a standard configuration created and updated for each operating system type and version;</li>
<li>system users do not have the ability to install or disable software without approval; and</li>
<li>installed software and operating system patching is up to date.</li>
</ul>]]></paragraph>
<paragraph
    title="14.1.9.C.02."

    tags="Technical,Software Security,Standard Operating Environments"


    classification="All Classifications"
    compliance="Should"
    cid="1159"
><![CDATA[<p>Agencies SHOULD ensure that for all servers and workstations:</p><ul>
<li>malware detection heuristics are set to a high level;</li>
<li>malware pattern signatures are checked for updates on at least a daily basis;</li>
<li>malware pattern signatures are updated as soon as possible after vendors make them available; </li>
<li>all disks and systems are regularly scanned for malicious code; and</li>
<li>the use of End Point Agents is considered.</li>
</ul>]]></paragraph>
</block>
<block title="Default passwords and accounts"><paragraph
    title="14.1.10.R.01."

    tags="Technical,Passwords,Software Security,Standard Operating Environments"


><![CDATA[<p>Default passwords and accounts for operating systems are often exploited by attackers as they are well documented in product manuals and can be easily checked in an automated manner with little effort required.</p>]]></paragraph>
<paragraph
    title="14.1.10.C.01."

    tags="Technical,Passwords,Software Security,Standard Operating Environments"


    classification="Secret, Top Secret, Confidential"
    compliance="Must"
    cid="1162"
><![CDATA[<p>Agencies MUST reduce potential vulnerabilities in their SOEs by:</p><ul>
<li>removing unused accounts;</li>
<li>renaming or deleting default accounts; and</li>
<li>replacing default passwords before or during the installation process.</li>
</ul>]]></paragraph>
<paragraph
    title="14.1.10.C.02."

    tags="Technical,Passwords,Software Security,Standard Operating Environments"


    classification="All Classifications"
    compliance="Should"
    cid="1163"
><![CDATA[<p>Agencies SHOULD reduce potential vulnerabilities in their SOEs by:</p><ul>
<li>removing unused accounts;</li>
<li>renaming or deleting default accounts; and</li>
<li>replacing default passwords, before or during the installation process.</li>
</ul>]]></paragraph>
</block>
<block title="Server separation"><paragraph
    title="14.1.11.R.01."

    tags="Technical,Software Security,Standard Operating Environments"


><![CDATA[<p>Servers with a high security risk can include Web, email, file, Internet Protocol Telephony (IPT) servers, Mobile Device Manager (MDM) servers and gateway components. It is important to clearly identify all services and connections to design a complete and secure server separation architecture. Refer also to <a title="Gateway security" href="http://nzism.gcsb.govt.nz/ism-document#Chapter-16567">Chapter 19 – Gateway Security</a>.</p>]]></paragraph>
<paragraph
    title="14.1.11.C.01."

    tags="Technical,Software Security,Standard Operating Environments"


    classification="All Classifications"
    compliance="Should"
    cid="1169"
><![CDATA[<p>Where servers with a high security risk have connectivity to unsecure public networks, agencies SHOULD:</p><ul>
<li>use appropriately designed and configured gateways;</li>
<li>consider the use of cross-domain solutions;</li>
<li>segment networks;</li>
<li>maintain effective functional segregation between servers allowing them to operate independently;</li>
<li>minimise communications between servers at both the network and file system level as appropriate; and</li>
<li>limit system users and programs to the minimum access needed to perform their duties.</li>
</ul>]]></paragraph>
</block>
<block title="Characterisation"><paragraph
    title="14.1.12.R.01."

    tags="Technical,Characterisation,Software Security,Standard Operating Environments"


><![CDATA[<p>There are known techniques for defeating basic characterisations, therefore other methods of intrusion detection are also needed, particularly in situations where it is impractical to use a trusted environment for the generation of the characterisation data. Characterisation is very useful in post-intrusion forensic investigations where an infected disk can be compared to stored characterisation data in order to determine what files have been changed or introduced.</p>]]></paragraph>
<paragraph
    title="14.1.12.R.02."

    tags="Governance,Business Continuity,Characterisation,Risk Assessment,Software Security,Standard Operating Environments"


><![CDATA[<p>Characterisation is also directly related to business continuity and disaster recovery and is influenced by Business Impact Analyses and Risk Assessments.  Grouping elements by business applications and setting priority and criticality of the elements to the business may assist in determining the most appropriate and useful characterisations.</p>]]></paragraph>
<paragraph
    title="14.1.12.C.01."

    tags="Technical,Characterisation,Software Security,Standard Operating Environments"


    classification="All Classifications"
    compliance="Should"
    cid="1185"
><![CDATA[<p>Agencies SHOULD:</p><ul>
<li>characterise all servers whose functions are critical to the agency, and those identified as being at a high security risk of compromise;</li>
<li>store the characterisation information securely off the server in a manner that maintains integrity;</li>
<li>update the characterisation information after every legitimate change to a system as part of the change control process;</li>
<li>as part of the agency’s ongoing audit schedule, compare the stored characterisation information against current characterisation information to determine whether a compromise, or a legitimate but incorrectly completed system modification, has occurred;</li>
<li>perform the characterisation from a trusted environment rather than the standard operating system wherever possible; and</li>
<li>resolve any detected changes in accordance with the agency’s information security incident management procedures.</li>
</ul>]]></paragraph>
<paragraph
    title="14.1.12.C.02."

    tags="Approved Cryptographic Algorithms,Technical,Characterisation,Software Security,Standard Operating Environments"


    classification="All Classifications"
    compliance="Should"
    cid="1189"
><![CDATA[<p>Agencies SHOULD use an Approved Cryptographic Algorithm to perform cryptographic checksums for characterisation purposes.</p>]]></paragraph>
<paragraph
    title="14.1.12.C.03."

    tags="Governance,Business Continuity,Characterisation,Risk Assessment,Software Security,Standard Operating Environments"


    classification="All Classifications"
    compliance="Should"
    cid="1190"
><![CDATA[<p>Agencies SHOULD consider characterisations in the context of a BCP or DRP and any related Business Impact Analyses and Risk Assessments. </p>]]></paragraph>
</block>
<block title="Automated outbound connections by software"><paragraph
    title="14.1.13.R.01."

    tags="Technical,Software Security,Standard Operating Environments"


><![CDATA[<p>Applications that include beaconing functionality include those that initiate a connection to the vendor site over the Internet and inbound remote management.</p>]]></paragraph>
<paragraph
    title="14.1.13.C.01."

    tags="Technical,Software Security,Standard Operating Environments"


    classification="All Classifications"
    compliance="Should"
    cid="1193"
><![CDATA[<p>Agencies SHOULD review all software applications to determine whether they attempt to establish any unauthorised or unplanned external connections.</p>]]></paragraph>
<paragraph
    title="14.1.13.C.02."

    tags="Technical,Software Security,Standard Operating Environments"


    classification="All Classifications"
    compliance="Should"
    cid="1194"
><![CDATA[<p>If automated outbound connection functionality is included, agencies SHOULD make a business decision to determine whether to permit or deny these connections, including an assessment of the security risks involved in doing so.</p>]]></paragraph>
<paragraph
    title="14.1.13.C.03."

    tags="Technical,Software Security,Standard Operating Environments"


    classification="All Classifications"
    compliance="Should"
    cid="1195"
><![CDATA[<p>If automated outbound connection functionality is included, agencies SHOULD consider the implementation of Data Loss Prevention (DLP) technologies.</p>]]></paragraph>
</block>
<block title="Knowledge of software used on systems"><paragraph
    title="14.1.14.R.01."

    tags="Technical,Software Security,Standard Operating Environments"


><![CDATA[<p>Information about installed software, that could be disclosed outside the agency, can include:</p><ul>
<li>user agent on Web requests disclosing the Web browser type;</li>
<li>network and email client information in email headers; and</li>
<li>email server software headers.</li>
</ul><p>This information could provide a malicious entity with knowledge of how to tailor attacks to exploit vulnerabilities in the agency’s systems.</p>]]></paragraph>
<paragraph
    title="14.1.14.C.01."

    tags="Technical,Software Security,Standard Operating Environments"


    classification="All Classifications"
    compliance="Should"
    cid="1198"
><![CDATA[<p>Agencies SHOULD limit information that could be disclosed outside the agency about what software, and software versions are installed on their systems.</p>]]></paragraph>
</block>
</subsection>
</section>
