User's Manual

Solaris 9 Security CX-310-301 21
220 ultra10.example.com ESMTP Sendmail 8.12.10+Sun/8.12.9; Thu, 1 Apr
:49 +0100 (BST) 2004 18:38
expn john
250 2.1.5 John Philcox <john@ultra10.example.com>
expn testuser
550 5.1.1 testuser... User unknown
expn admin
250 2
quit
.1.5 System Administrator <admin@ultra10.example.com>
221 2.0.0 ultra10.example.com closing connection
Connection to 0 closed by foreign host.
Steps to Prevent Information Disclosure
There are a number of steps that can be taken to avoid information disclosure:
¾ User education – The most important step that can be taken. Make people aware of the security
issues and methods by which attackers might try and obtain information from them that would
compromise the computer system
¾ Turn off any unnecessary network services
¾ Enforce a good password mechanism and educate users again to realize the importance of
choosing a secure password
¾ Use encryption mechanisms for data in transit between systems, especially on the Internet
¾ Implement a firewall to protect the organization and add logging to the rules so that a record exists
of persistent attempts to access an asset
¾ Enable auditing and system logging so that unauthorized attempts are recorded and the
accountability and non-repudiation is maintained
¾ Monitor the systems continuously, which might mean installing a third-party product so that the
administrator is automatically informed when events occur – products such as Sun Management
Center, HP Openview, BMC Patrol, eTrust from Computer Associates are good examples
Evaluation Standards
The National Computer Security Center published a book called “The U.S. Department of Defense Trusted
Computer System Evaluation Criteria”, better known as “The Orange Book” which defined seven levels of
trust. The levels from lowest to highest are:
¾ D – Minimal protection
¾ C1 – Some access control and permissions. Passwords required for logon
¾ C2 – Authentication is audited and audit logs are held securely
¾ B1 – Mandatory access control with labels. Security access is based on labels