Hitachi ID Group Manager is a security application. It can and should be installed on the most secure server platform possible.
Some of the most effective security measures are common sense:
The first step in configuring a secure Group Manager server is to harden its operating system.
Hitachi ID Systems suggests that Group Manager be installed on the Windows 2000/2003 server operating system. The following are suggestions on how to lock down this operating system.
Since the Group Manager server contains (encrypted) sensitive information, it makes sense to limit the number of users who can access its files.
One way to limit the number of users who can access the Group Manager server is to remove it from any Windows NT or Active Directory domains. Since the Group Manager server will not be a member of any domain, this reduces the risk of a security intrusion in the domain being leveraged to gain unauthorized access to the Group Manager server.
The Group Manager setup program creates one local user on the Group Manager server, called psadmin.
The account is, by default, a member of the Administrators group. It is the only account needed by Group Manager. We recommend removing unused accounts, leaving just:
If you must have other accounts on the Group Manager server, then:
An important way to secure a server on any platform is to reduce the amount of software that it runs. This eliminates potential sources of software bugs that could be exploited to violate the server's security.
Only the following services are required on Group Manager servers:
|DNS Client||Required to resolve host names|
|Event Log||Core O.S. component|
|IIS Admin Service||Only required if IIS is used|
|IPSEC Policy Agent||Core O.S. component|
|Logical Disk Manager||Core O.S. component|
|Network Connections||Required to manage network interfaces|
|Plug and Play||Hardware support|
|Protected Storage||Core O.S. component|
|Remote Procedure Call (RPC)||Core O.S. component|
|Removable Storage||Required to open CD-ROM drives|
|RunAs Service||Core O.S. security component|
|Security Accounts Manager||Core O.S. security component|
|TCP/IP NetBIOS Helper Service||Only required if directly managing WinNT, Win2000 or Win2003 passwords|
|Workstation||Only required if directly managing WinNT, Win2000 or Win2003 passwords|
|World Wide Web Publishing Service||Only required if IIS is used|
All other services should be disabled unless there is some specific reason (not related to Group Manager) to enable them.
The Group Manager server can also take advantage of simple packet filtering services in Windows 2000/2003, to block all inbound connections other than those to the web service, as shown in the figure below:
Open ports are an exploitable means of system entry. By limiting the number of open ports, you effectively reduce the number of potential entry points into the server. Typically only port 443 needs to be open before Group Manager is installed.
The process table on the same server looks like this on Windows 2000:
The process table on the same server looks like this on Windows 2003:
Note: VMWare entries reflect the fact that this sample was taken from a VMWare virtual PC.
This server was running with just the mandatory services described earlier.
Enable the following TCP/IP registry settings as shown below to make the Group Manager server resistant to denial of service (DOS) attacks:
HKLM\System\CurrentControlSet\Services \Tcpip\Parameters\SynAttackProtectType: REG_DWORD
HKLM\System\CurrentControlSet\Services \Tcpip\Parameters\TcpMaxHalfOpenType: REG_DWORD
HKLM\System\CurrentControlSet\Services \Tcpip\Parameters\TcpMaxHalfOpenRetriedType: REG_DWORD
HKLM\System\CurrentControlSet\Services \Tcpip\Parameters\TcpMaxPortsExhaustedType: REG_DWORD
The following keys, not present on a default Windows server installation, are also helpful to protect against a variety of attacks against the IP stack:
HKLM\System\CurrentControlSet\Services \AFD\Parameters\EnableDynamicBacklogType: REG_DWORD
HKLM\System\CurrentControlSet\Services \AFD\Parameters\MinimumDynamicBacklogType: REG_DWORD
HKLM\System\CurrentControlSet\Services \AFD\Parameters\MaximumDynamicBacklogType: REG_DWORD
HKLM\System\CurrentControlSet\Services \AFD\Parameters\DynamicBacklogGrowthDeltaType: REG_DWORD
HKLM\System\CurrentControlSet\Services \Tcpip\Parameters\EnableDeadGWDetectType: REG_DWORD
HKLM\System\CurrentControlSet\Services \Tcpip\Parameters\KeepAliveTimeType: REG_DWORD
HKLM\System\CurrentControlSet\Services \Tcpip\Parameters\PerformRouterDiscoveryType: REG_DWORD
HKLM\System\CurrentControlSet\Services \Tcpip\Parameters\EnableICMPRedirectsType: REG_DWORD
HKLM\System\CurrentControlSet\Services \Tcpip\Parameters\DisableIPSourceRoutingType: REG_DWORD
The web server is a required component since it provides all user interface modules. It should therefore be carefully protected.
Since Group Manager does not require any web server functionality beyond the ability to serve static documents (HTML, images) and to execute self-contained CGI executable programs, all non-essential web server content should be removed.
Several web servers are commonly available for Windows servers, including Apache, IIS, Sun ONE and more. Most Hitachi ID Systems customers use Apache or IIS.
The Apache server is recommended, as it is well supported and has had a very good security track record.
If you select Apache, you can harden it by:
IIS is more than a web server - it is also an FTP server, indexing server, proxy for database applications and a server for active content / applications.
If you run Group Manager on IIS, you should disable most of these features, as a bug in any of them would represent a security risk.
Lock down IIS as follows:
Create two separate NTFS partitions - one for the operating system and one for IIS. This will separate most of the operating system files from the application files, allowing a more controlled distribution of permission sets.
As stated previously, Group Manager only requires the web server to serve static documents (HTML, images) and to execute self-contained CGI executable programs, which means all non-essential web server content should be removed. This means removing IISAdmin, Printers, Scripts and similar folders, as shown in the figure below:
The web server's scripting, indexing and data access subsystems should likewise be removed as shown in the figure below:
As an extra precaution, remote data services (RDS) should be disabled by removing the following registry keys:
All ODBC drivers that are not required should also be disabled because they can introduce possible security concerns for IIS. To disable the ODBC drivers, remove the data sources manually and add this entry to the registry:
HKLM\Software\Microsoft\Jet\4.0\engines\SandBoxMode = 3
The above registry entry will ensure that no cmd.exe commands can be chained with ODBC queries.
Consult the Microsoft Knowledge Base for more information:
The IUSR account is created during the IIS installation and provides the mechanism that allows web clients to access the web server anonymously. The IWAM account is used to start out-of-process web applications in IIS. Do not add these accounts to a privileged security group such as Administrators. Delete these accounts if possible as Group Manager does not use them.
Install the latest service packs, as these frequently include security patches and updates.
We recommend that to be notified of the latest Microsoft security upgrades, you subscribe to the Microsoft's security bulletin at:
Equally important to installing the latest service pack is testing the service pack installation before deployment on a production platform. This will ensure there are no adverse affects on Group Manager.
Group Manager sends and receives sensitive data over the network. Its communications include user passwords, administrator credentials and personal user information. These are all valuable assets that must be defended.
A basic defense against packet sniffers and similar attacks is to ensure that Group Manager can only be accessed over HTTPS.
Group Manager servers should be physically protected, since any logical security measures can be bypassed by an intruder with physical access to the server, time and skill.
Suggestions for physically securing the Group Manager server include:
Put the Group Manager server(s) in a locked and secured room. Restrict access to authorized personnel only. Access should be logged.
Protect the Group Manager server with uninterruptable power sources (UPS). UPS equipment will protect the server from temporary power loss that could cause a server crash or corruption of critical user files.
Restrict the boot process so it is more difficult for intruders to circumvent Windows 2000/2003 security by booting from floppy disks or a CD-ROM. Specifically, use a BIOS-level password, disable boot from a floppy drive or CD-ROM drive and lock the system BIOS to prevent unauthorized changes to the BIOS configuration.