Saturday, 28 January 2006

Published just this month, an important whitepaper is now available that provides authoritative information about applying  the "don't run as admin" concept in the real world.

Should you care? Yes. Absolutely. Why? Because running as an administrator or high-privileged user opens the door to malicious software ruling your world by potentially damaging your computer and data, compromising confidential information, and harming your company's reputation and business relationships. Put simply, you should do it because it's now possible, because with Windows Vista it will be enabled in terrific ways that reduce the pain, and just because it makes obvious good sense.

Users will download and install software they're not supposed to. Policies don't solve technology problems. Rather they guide solutions to people problems. Users will take CDs they bought with a major record label on the sleeve and stick them in their CD-ROM drives, whether or not they are supposed to, and we've all learned recently that you cannot trust major record labels to product safe, appropriate software. Users will surf to web sites and (regardless of how much education and prevention you do, and how many times you tell them to never click on that stupid thing that says their computer might be infected) they'll click and download and even install software that wreaks havoc, logs keystrokes or any one of a thousand other bad things.

People and process changes and preventions are important - don't get me wrong. We need to educate and provide standards, and we still need to hold people accountable for behavior. But that does not remove from us the responsibility to make proper and correct technology decisions when it comes to operation and implementation security. Period.

People, process and technology - it's a combination of all three of these, in careful balance, that makes a true security ecosystem work.

But making changes like this is, honestly, something that most business and technology people avoid, because they're afraid they won't be able to operate that way. Or they're afraid someone will complain. Sorry guys, not a good enough reason, not anymore.

So... What's the problem we're trying to solve? From the paper:

"A significant factor that increases the risks from malicious software is the tendency to give users administrative rights on their client computers. When a user or administrator logs on with administrative rights, any programs that they run, such as browsers, e-mail clients, and instant messaging programs, also have administrative rights. If these programs activate malicious software, that malicious software can install itself, manipulate services such as antivirus programs, and even hide from the operating system. Users can run malicious software unintentionally and unknowingly, for example, by visiting a compromised Web site or by clicking a link in an e-mail message."

The approach into which the least-user model falls is a layered security, defense-in-depth style. We cannot rely solely upon one layer of security to solve all our malware problems, and the fact is this: If all computer users already ran with least-privileged accounts, the incidents of malware (spyware, adware, etc) would be significantly less. In the real world, we are stuck in a position of needing to make a change, but for the future we will do well to remember how taking the easier route early in a technology phase can come back to bite us later.

"A defense-in-depth strategy, with overlapping layers of security, is the best way to counter these threats, and the least-privileged user account (LUA) approach is an important part of that defensive strategy. The LUA approach ensures that users follow the principle of least privilege and always log on with limited user accounts. This strategy also aims to limit the use of administrative credentials to administrators, and then only for administrative tasks.

"The LUA approach can significantly mitigate the risks from malicious software and accidental incorrect configuration. However, because the LUA approach requires organizations to plan, test, and support limited access configurations, this approach can generate significant costs and challenges. These costs can include redevelopment of custom programs, changes to operational procedures, and deployment of additional tools."

Small and large organizations (of all types) are faced with this problem. While it's not the end of the world, it's often not a trivial task to change to a least-privileged computing model if you're already deployed in a mode where all users are administrators. This is common in software companies and other place where people have liberal privileges in order to provide ultimate flexibility in their development and design world.

I should also note that in Windows Vista, the next version of Windows, there are significant improvements in the operating system that will make it completely feasible to apply a least-privilege user model to every single computer, while affording users the ability to install software and make appropriate configuration changes in a controlled and safer environment. In my opinion, any shop that deploys Vista when it's available and does not take advantage of this security capability is negligent (and there will be many companies where that will happen, just watch). Find out more about Windows Vista User Account Control (UAC) at the Microsoft Technet site pages that cover the subject, and be sure to read and subscribe to the UAC Team Blog.

I highly recommend this whitepaper. It cuts to the chase and explains things in a clear and concise way, while addressing real world concerns and providing links and references to third-party tools and information. If you run a network or a dev shop, or if you're in any way responsible for secure computing, this is a paper you need to get familiar with.

Description and summary of the whitepaper from the Microsoft download page:

This 100-level technical white paper provides information on the principle of least privilege and describes how to apply it to user accounts on Windows XP. The paper covers the following topics:

  • Risks associated with administrative privileges
  • Definition of the principle of least privilege
  • Definition of the least-privileged user account (LUA) approach
  • Benefits of the LUA approach
  • Risk, security, usability, and cost tradeoffs
  • Implementing the LUA approach
  • Future developments

This paper also describes at a high-level the issues that affect implementation of the LUA approach and provides useful links to other online resources that explain these concepts in more detail.



Add/Read: Comments [0]
IT Security | Safe Computing | Tech
Saturday, 28 January 2006 09:51:48 (Pacific Standard Time, UTC-08:00)
#  Trackback

Referred by:
http://search.daum.net/ [Referral]
http://www.greghughes.net/ [Referral]
http://bijuteriiautenti.obolog.com/ [Referral]
http://sodmg.com/member/bijuteriiorigina/blog/48567/Bijuteri... [Referral]
http://www.youtube.com/watch?v=2iQbHnnAudo [Referral]
http://www.youtube.com/watch?v=1Ch4Dy6n-8I [Referral]
http://bijuteriihandmad019.webs.com/apps/blog/show/13954301-... [Referral]
http://www.youtube.com/watch?v=RuetlfGDwgY [Referral]
http://bijuteriihandmadeonline.wordpress.com/ [Referral]
http://watkhaokhunphanom.com/index.php/2011/11/04/discover-t... [Referral]
http://twitter.com/#!/VanInsurance1 [Referral]
http://bijuteriihandmadeonline.blogspot.com/ [Referral]
http://bijuteriiorigina019.tumblr.com/ [Referral]
http://bijuteriihandmadeonline.wordpress.com/2012/04/07/biju... [Referral]
http://bijuteriionline.insanejournal.com/ [Referral]
http://www.coachonlineoutleters.com/ [Referral]
http://www.iamsport.org/pg/blog/vjacobthic8/read/4235663/lea... [Referral]
http://events.ehcaloqlangracikiela.podomatic.com/entry/2012-... [Referral]
http://www.jukeboxalive.com/blog.php?blog_id=8303153 [Referral]
http://wallinside.com/post-1039996.html [Referral]
http://bijuteriihandmadeonline.blogspot.com/2012/04/bijuteri... [Referral]

More...
Comments are closed.