Automated Implementation of Windows-related Security-Configuration Guides

09/19/2022
by   Patrick Stöckle, et al.
0

Hardening is the process of configuring IT systems to ensure the security of the systems' components and data they process or store. The complexity of contemporary IT infrastructures, however, renders manual security hardening and maintenance a daunting task. In many organizations, security-configuration guides expressed in the SCAP (Security Content Automation Protocol) are used as a basis for hardening, but these guides by themselves provide no means for automatically implementing the required configurations. In this paper, we propose an approach to automatically extract the relevant information from publicly available security-configuration guides for Windows operating systems using natural language processing. In a second step, the extracted information is verified using the information of available settings stored in the Windows Administrative Template files, in which the majority of Windows configuration settings is defined. We show that our implementation of this approach can extract and implement 83 Furthermore, we conduct a study with 12 state-of-the-art guides consisting of 2014 rules with automatic checks and show that our tooling can implement at least 97 securing systems based on existing security-configuration guides.

READ FULL TEXT
research
09/19/2022

Automated Identification of Security-Relevant Configuration Settings Using NLP

To secure computer infrastructure, we need to configure all security-rel...
research
11/02/2017

Ocasta: Clustering Configuration Settings For Error Recovery

Effective machine-aided diagnosis and repair of configuration errors con...
research
02/15/2019

ForestFirewalls: Getting Firewall Configuration Right in Critical Networks (Technical Report)

Firewall configuration is critical, yet often conducted manually with in...
research
06/13/2023

An Inverse Approach to Windows' Resource-Based Permission Mechanism for Access Permission Vulnerability Detection

In organizations, employees work with information stored in files accord...
research
11/06/2021

An Adaptive Honeypot Configuration, Deployment and Maintenance Strategy

Since honeypots first appeared as an advanced network security concept t...
research
03/10/2023

Better Safe Than Sorry! Automated Identification of Functionality-Breaking Security-Configuration Rules

Insecure default values in software settings can be exploited by attacke...

Please sign up or login with your details

Forgot password? Click here to reset