Implementation of least user privileges lup
This presentation is the property of its rightful owner.
Sponsored Links
1 / 24

Implementation of Least User Privileges (LUP) PowerPoint PPT Presentation


  • 57 Views
  • Uploaded on
  • Presentation posted in: General

Implementation of Least User Privileges (LUP). Doug Smelcer. Implementation of Least User Privileges (LUP). Definition of LUP, user impact, & user benefits History of LUP at ORNL Drivers for change to a non-admin model for all of ORNL Plan for conversion to non-admin Path Forward

Download Presentation

Implementation of Least User Privileges (LUP)

An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -

Presentation Transcript


Implementation of least user privileges lup

Implementation of Least User Privileges (LUP)

Doug Smelcer


Implementation of least user privileges lup1

Implementation of Least User Privileges (LUP)

  • Definition of LUP, user impact, & user benefits

  • History of LUP at ORNL

  • Drivers for change to a non-admin model for all of ORNL

  • Plan for conversion to non-admin

  • Path Forward

  • Lessons Learned

  • Q&A


It definition of lup user impact

IT Definition of LUP & user impact

  • What is it?

    • The term sounds negative. The principle of least user privilege (LUP) is widely-recognized as an important principle in enhancing the protection of data and functionality from faults and malicious behavior. In computer security, LUP refers to the concept that all users should run their computers with as few privileges as possible, which means they will also launch applications with as few privileges as possible. Removing Administrator (or Power User) rights from end-users means that the average user can not install applications, but it also means that unwanted malware cannot be installed by malicious code. The application of LUP limits the damage that can result from accidents, errors, or unauthorized use on your computer. However, instituting such a policy throughout the Lab is not the easiest thing in the world because many applications still require administrative rights to run correctly and some exceptions are needed for power users to do more things to their computers than the average user.


Define benefits of lup for our staff

Define benefits of LUP for our staff

  • Less to do. Systems that are LUP’ed will be maintained by the IT department. Over time you will see the pop-ups to install software such as Adobe, Microsoft and other products go away because IT now has the sole responsibility to push the patches to your computer.

  • Better system security. With limited access rights, malicious code will not have access to perform operations that could crash a machine, or adversely affect other systems.

  • Better system stability. Running LUP gives users increased protection against inadvertent system-level damage. Based on results from the LUP pilot with our Human Resources department, a decrease in overall call volume to the ORNL IT helpline was noted.

  • Ease of application deployment. The fewer privileges an application requires the easier it is to deploy.


History of lup at ornl

History of LUP at ORNL

  • One organization implemented a non-admin (LUP) model for ~90% of their staff as the org was established

    • As staff were added and as the org grew, systems were configured or converted to operate without admin privileges

    • Organization grew to 400+ systems

    • Very desirable model from a support standpoint

    • Support staff to computer ratio was higher than the rest of ORNL


History of lup at ornl cont

History of LUP at ORNL (cont.)

  • In FY 2008, ORNL’s HR organization volunteered to adopt a LUP model

    • Planned conversion for 100+ systems

    • Implementation occurred over several months

    • 100% assessment of hardware and unique software prior to any change

    • Validated software would function properly w/o user admin privileges

    • Standardized on the Operating System and Office configurations and hardware

    • Implemented without any major issues by converting small groups rather than the entire org at once

    • Applied lessons learned from each conversion before proceeding with another group

    • Users embraced the change with almost no complaints


Drivers for change to a non admin model for all of ornl

Drivers for Change to a non-admin model for all of ORNL

  • DOE Office of Cyber Security Evaluations (HS-62) conducted “unannounced cyber penetration attack” against  DOE-SC national laboratories.  

  • Infection from “Green Week” CD’ led to a compromise of an ORNL desktop computer.


Drivers for change to a non admin model for all of ornl cont

Drivers for Change to a non-admin model for all of ORNL (cont.)

  • User’s account on infected computer held local administrative privileges which allowed for a foothold to be established inside the ORNL network

  • From this one computer, other ORNL desktop computers and email servers were compromised  

  • Very sophisticated techniques were used to slowly export data from some of our desktops


Plan for converting to lup

Plan for Converting to LUP

  • Based on analysis of the attack, it was decided that removing computer administrative privileges from ORNL systems was necessary

  • IT was tasked to development a plan to remove admin privileges 8000+ Windows Systems

    • Based on past experiences IT recommended a 6 month implementation

      • Drivers for this approach includes a diverse configuration for the 8000+ systems (3 Oss and ~28K different version/packages of software)

  • With 100% support from ORNL’s Leadership Team – request to IT was to remove admin from all 1 day

  • IT/Management compromise allowed ~ 6 weeks for the task


Plan for converting to lup1

Plan for Converting to LUP

  • Plan specifics - Phase 1

    • Remove admin privileges from all user accounts on systems

    • Allow user to retain password for local admin account (temporary)

      • Due to the pace of the deployment, this was to allow users to self help

    • Remove Domain Admins group from all systems

    • Overall - manage to remove admin access unless user obtains an exception


Plan for converting to lup2

Plan for Converting to LUP

  • Plan specifics - Phase 1 (cont.)

    • Deploy and test LUP with IT and the CIO organization first

      • Allowed staff one week to identify need for admin

      • Remove local admin for all not reporting

    • Communicate, Communicate, Communicate

      • Web, newsletters, Division Computer Security Officers (DCSOs), special meetings, and IT Project Managers

        • IT PMs performed a vital role with communication of schedule and information to management and organizations they supported

      • Developed a FAQ site to provide users with info


Plan for converting to lup3

Plan for Converting to LUP

  • Plan specifics - Phase 1 (cont.)

    • Convert approximately an equal number of systems each week during a 6 week period

    • Allow staff to retain the local admin account and password so configuration changes could be made if necessary (temporary solution)

    • Add additional subcontract staff to assist with any increased workload

    • Establish a LUP exception process

    • Schedule mobile users as the last group

    • Report on conversion progress and issues daily


Plan for converting to lup4

Plan for Converting to LUP

  • Plan specifics - Phase 1 (cont.)

    • Deploy through Run Advertised Programs two IT support groups

      • Users can run these programs to add IT support as admins

      • Available until a reboot or for a specific period of time

    • Require support staff to use a secondary UID for privileged accounts


Plan for converting to lup5

Plan for Converting to LUP

  • Plan specifics - Phase 1 (cont.)

    • Made changes to the computing standards offered through the Managed Hardware Program (MHP)

      • Vista as the only Operating System (OS) offered to the end user

      • Allows IT to focus mainly on the development of the Vista software images

      • XP is allowed and staff needing this OS can contact IT for assistance to install

    • Provide staff with the option to volunteer for LUP 


Plan for converting to lup6

Plan for Converting to LUP

  • Plan specifics - Phase 2 – Remove local admin and deploy admin elevation tool for the user

    • Local Admin removed from all systems except those with LUP exceptions

    • Deploy a locally developed tool that allows users to contact IT to request admin privileges

      • Requires RSA token and allowed privs to be elevated when on/off ORNL network

    • Laptop user’s were the last group scheduled

      • Admin elevation tool was deployed to all these systems in conjunction with LUP move

    • Troubleshoot reported issues for specific systems

      • Allow admin to be retained if necessary until issues were resolved

      • Assign specific staff very capable of Tier 3 troubleshooting


Path forward

Path Forward

  • After deployment of LUP for ORNL

    • Test a new admin tool that provides user with ability to self elevate

      • Tool usage is tracked and reports made available to ORNL Cyber for review

      • Requires system to be on ORNL network

      • Utilizes RSA token

      • Limits time that admin is available

      • Being considered for deployment to staff with LUP exceptions and will allow removal of the local admin account from these systems


Path forward tool examples

Path Forward – Tool Examples


Path forward1

Path Forward

Path Forward

  • Phase 3 – After completion of LUP for ORNL

    • Expand the IT admin support groups advertized through Run Advertized Programs with the groups being more specific and a smaller number of staff assigned to each group


Lessons learned

Lessons Learned

  • IT assumed additional responsibilities when user’s admin privileges was removed

    • Additional IT staff needed to accomplish tasks

      • Vulnerability resolution

      • Patching 3rd party software (e.g. Adobe, Firefox, Java, etc.)

        • And many more of the 28K products

  • Exception processes are needed at program implementation

    • Staff may not fully understand but may request anyway


Lessons learned cont

Lessons Learned (cont.)

Lessons Learned (cont.)

  • Databases permissions were common problems

    • Certain staff were assigned to troubleshoot and resolve these issues

  • Several products like to automatically update or inform user an update is available

    • Users were unable to install these without admin

  • Address systems operating as instrument controllers or data collection devices separately


Lessons learned cont1

Lessons Learned (cont.)

Lessons Learned (cont.)

  • Vista was much preferred over XP

    • User Access Controls (UAC)

    • Vista virtual store (allows modification of files typically stored in locations unprivileged users can’t modify globally)

  • Some troubleshooting tasks could no longer be performed as before

    • IPCONFIG /Release-Renew

    • Had to define a solution


Lessons learned cont2

Lessons Learned (cont.)

  • Remote Desktop issues under LUP

    • Only admins were in the group to allow RD

    • Solution based on analysis of use and determining the primary user. Then adding this user back to the group

  • LUP exceptions are needed for a small percentage of users

    • >90% of systems are operating without admin

  • Validate users with LUP exceptions operate correctly

    • Cyber conducts internal email phishing as a test for users w/ exceptions


Least user privileges lup

Least User Privileges (LUP)


Other ornl presentations of interest

Other ORNL Presentations of Interest

SharePoint

  • Monday, 11:45-Using SharePoint UI to Deliver General Use Applications, Connie Begovich

  • Tuesday, 11:45-SharePoint at ORNL, Brett Ellis

    Cyber Security

  • Monday, 1:30-Development of a Process for Phishing Awareness Activities, Philip Arwood & John Gerber

  • Monday, 2:15-How I Learned to Embrace the Chaos, Mark Lorenc

  • Monday, 4:15-TOTEM:The ORNL Threat Evaluation Method, John Gerber & Mark Floyd

    Desktop Management

  • Monday 4:15-On the Fly Management of UNIX Hosts using CFEngine, Ryan Adamson

  • Tuesday, 11:00-Implementation of Least User Privileges, Doug Smelcer

  • Wednesday, 11:45, Microsoft Deployment Using MDT and SCCM, Chad Deguira

    Incident Management

  • Wednesday, 11:00-Helpdesk Operations for Clients Without Admin Privileges, Bob Beane & Tim Guilliams

    IT Modernization

  • Monday, 2:15-12 Months of Technology, Lara James


  • Login