Better Safe Than Sorry! Automated Identification of Functionality-Breaking Security-Configuration Rules

03/10/2023
by   Patrick Stöckle, et al.
0

Insecure default values in software settings can be exploited by attackers to compromise the system that runs the software. As a countermeasure, there exist security-configuration guides specifying in detail which values are secure. However, most administrators still refrain from hardening existing systems because the system functionality is feared to deteriorate if secure settings are applied. To foster the application of security-configuration guides, it is necessary to identify those rules that would restrict the functionality. This article presents our approach to use combinatorial testing to find problematic combinations of rules and machine learning techniques to identify the problematic rules within these combinations. The administrators can then apply only the unproblematic rules and, therefore, increase the system's security without the risk of disrupting its functionality. To demonstrate the usefulness of our approach, we applied it to real-world problems drawn from discussions with administrators at Siemens and found the problematic rules in these cases. We hope that this approach and its open-source implementation motivate more administrators to harden their systems and, thus, increase their systems' general security.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
05/29/2019

Configuration Testing: Testing Configuration Values as Code and with Code

This paper proposes configuration testing--evaluating configuration valu...
research
09/19/2022

Automated Implementation of Windows-related Security-Configuration Guides

Hardening is the process of configuring IT systems to ensure the securit...
research
11/02/2017

Talos: Neutralizing Vulnerabilities with Security Workarounds for Rapid Response

Considerable delays often exist between the discovery of a vulnerability...
research
12/16/2019

Misconfiguration Management of Network Security Components

Many companies and organizations use firewalls to control the access to ...
research
12/13/2017

Interpreted Formalisms for Configurations

Imprecise and incomplete specification of system configurations threaten...
research
09/19/2022

Automated Identification of Security-Relevant Configuration Settings Using NLP

To secure computer infrastructure, we need to configure all security-rel...

Please sign up or login with your details

Forgot password? Click here to reset