Coder Social home page Coder Social logo

paw's Introduction

How do I use this repo?

I have listed each security control in a recommended order that should be followed when starting out. Each directory is labeled ## - Title. Each directory contains its own README file that details what's going on and how to apply the control. Follow the order of the numbers. When done, work on the xx - policy controls in any order you desire.

To alleviate troubleshooting, fully test your environment before continuing on to the next section. Literally spend several days living under the new policy to see how things work.

Where a script is concerned, specific instruction and requirements to run the script can be found within the script's comment header.

Privileged Access Workstation (PAW)

What is a PAW?

In short, a PAW is one solution to the problem of credential theft, replay and pivoting attacks, and privilege escalation. PAW is a method of administrating network devices in a more secure and more hardened environment than what most admins are used to. A successful PAW deployment will contain many security controls aimed to enable a more Defense in Depth security strategy.

Okay, but what is a PAW?

A PAW is the workstation the admin uses to access and administrate the network using privileged credentials. It provides the admin a secure method to perform day-to-day administrative tasks on network devices such as Domain Controllers, member servers, user workstations, networking equipment, and cloud admin portals (like Azure and AWS). Because the PAW adheres to the Clean Source Security Principal it prevents the logged on user from freely surfing the Internet, checking email, running applications outside of the AppLocker whitelist, or insecurely accessing network devices that could expose risk to credential theft. It provides the admin everything they need to do their job and nothing more Least Privilege Security.

How is a PAW physically different than a normal workstation where I administrate my servers with RDP and MMC?

The PAW is a physical workstation, preferably a laptop, that runs Windows 10 Enterprise Edition (1709+) as the primary host OS. This device is used to administrate the network and all the systems on it. It has the Hyper-V role installed that, in addition to security features like Credential Guard, hosts a VM that provides the admin day-to-day Internet access and email. PAWs have several hardware requirements to make for the most secure deployment:

  • Windows 10 compatible (no Chrome books or Mac)
  • TPM 2.0
  • Enough hard drive, CPU, and RAM resources to have a pleasant experience in your day-to-day VM

Consider buying from a vendor that has frequent firmware updates and a long support life-cycle. Specialized hardware like Sony Vaio and Alienware should also not be considered.

Additionally, you should be aware of DMA attacks and consider purchasing hardware that does not come with DMA ports (Thunderbolt, PCI-E, Firewire, ExpressCard). See Sami Laiho's Win-Fu Blog for more details about DMA attacks and mitigation.

If a single workstation that handles the load of two is not optimal for your environment, you can split the roles onto separate laptops. One workstation for secure administration, and one for Internet and email.

Is it difficult to configure PAWs?

The main purpose of this repo is provide baseline configuration templates and walkthroughs to make the configuration simpler. Initially, it is quite complex. As I look at my GPOs that are designed to address only PAWs, I count 36 and growing. The biggest complexity, however, is changing your IT team's behavior around remote administration. You will be doing things very different than you are used to. I like the saying, it is fundamentally impossible to improve something wilst keeping it the same.

paw's People

Contributors

utsecnet avatar

Stargazers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

Watchers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

paw's Issues

Firewall Ipsec, workstation wrong scope group assignment.

Hi rich,
Under Firewall Ipsec Point 6 you write the following.

On all workstations, configure Domain Isolation policies
On the scope tab:
Ensure All-Tier1-Servers is listed under Security Filtering

That should be "Ensure All Workstation".

Questions about baselines

Hi rich,
in the baseline Excel sheet you write e.g. following.

Ensure 'Generate security audits' is set to 'LOCAL SERVICE, NETWORK SERVICE' (Scored)

Your remark:

Note: A Member Server that holds the Web Server (IIS) Role with Web Server Role Service will require a special exception to this recommendation, to allow IIS application pool(s) to be granted this user right.

My question about this:
Where and how do i best make these special exceptions for this PAW AD GPO structure?
can you please show an example in such a case?

Thanks again for your help
regards
Stefan

shadowGroups.ps1 // problem with comma in username

hi rich,
thanks again for this very helpful PAW concept, i hope you are doing well in the difficult times at the moment.
There is a requirement to change the username (cn) from "first name surname" to "surname, first name".
Unfortunately the script has a problem with the comma in between. Can you help adapt the script so that it works correctly both with and without a comma?

Thanks for your help and time.

- in Remote issue

The '-' in "-Remote" OU name causes it's computer objects to be constantly added and then removed from the appropriate shadow groups when the script runs. It also causes the Users OUs that have '-Remote' to not be processed at all.

Problems with "Log on as a service"

Hi rich,
i have the following problem with the "Logon Restrictions for Tier 0/1/2 servers".
Especially with "Log on as a service"
-NT SERVICE\ALL Services
-LogOnAsService

I have tested the GPO "Logon Restrictions for Tier 1 Servers" assigned to a sharepoint server.
For this i added the necessary sharepoint services to the local group "LogOnAsService". However, many other applications have not started because they are not members of the local local group "LogOnAsService".

For example:
SQLServer2005SQLBrowserUser$COMPUTER
NT SERVICE\SQLTELEMETRY
NT SERVICE\SQLSERVERAGENT
NT SERVICE\MSSQLSERVER
IIS APPPOOL \ Classic .NET AppPool
IIS APPPOOL \ .NET v4.5
IIS APPPOOL \ .NET v2.0
IIS APPPOOL \ .NET v4.5 Classic
IIS APPPOOL \ .NET v2.0 Classic

What is the best way to deal with such special groups?
The local prinizable of "NT SERVICE + IIS APPPOOL were no problem, but what am i doing with SQLServer2005SQLBrowserUser$COMPUTER?

Issue with script

Hi Rich, i'd like to know how to run the shadowGroups.ps1 script properly.
thks.
Capture d’écran (4)

You cannot deny all users or administrator(s) from logging on locally.

Hi,
to first, thanks for the good How to.
However, i get the following error message when creating the "Security - Logon Restrictions - Domain Controllers" GPO

-Deny log on locally
--DOMAIN\Administrator
“You cannot deny all users or administrator(s) from logging on locally.”

Any idea why

Questions about Logon Restrictions for Domain Controllers

Hi rich,
At "03 - Logon Restrictions" you write:
Ensure the Domain Controllers group is a member of the All-Tier0 Servers group

This would affect two GPOs on the domain controllers.
-Security - Logon Restrictions - Domain Controllers
-Security - Logon Restrictions - Servers Tier 0

If that were correct, is there no problem with

Log on as batch job
BUILTIN\Administrators
LogOnAsBatch - This is a local group that we will create in a subsequent GPO.

Log on as a service
NT SERVICE\ALL Services
LogOnAsService - This is a local group that we will create in a subsequent GPO.

on the domain controller?

Question on Security - Firewall - IPSec - Domain Controllers - Assigned Users/Computers

Hello,

I was able to figure out most of the permissions here, but I'm curious on what two of these SIDs represent
2020-09-30 15_04_07-LAB-DC-01 - VMware Workstation

I may run into more questions on this as I continue, but I'm working on trying to keep all of this straight. It's a very different approach than what I'm used to, which is why I'm labbing this!

Thanks for any insight you can offer here!

-Nate

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.