{"id":387,"date":"2015-11-08T20:40:56","date_gmt":"2015-11-08T20:40:56","guid":{"rendered":"http:\/\/nethemba.com\/sk\/?page_id=387"},"modified":"2019-08-05T12:19:42","modified_gmt":"2019-08-05T11:19:42","slug":"lokalny-systemovy-audit","status":"publish","type":"page","link":"https:\/\/nethemba.com\/sk\/sluzby\/sietova-a-systemova-bezpecnost\/lokalny-systemovy-audit\/","title":{"rendered":"Lok\u00e1lny syst\u00e9mov\u00fd audit"},"content":{"rendered":"<p>Cie\u013eom lok\u00e1lneho syst\u00e9mov\u00e9ho bezpe\u010dnostn\u00e9ho auditu je kontrola lok\u00e1lnej syst\u00e9movej bezpe\u010dnosti dan\u00e9ho OS v rozsahu:<\/p>\n<ul>\n<li><strong>Overenie existencie nepou\u017e\u00edvan\u00fdch slu\u017eieb a bal\u00ed\u010dkov <\/strong>&#8211; nepou\u017e\u00edvan\u00e9 slu\u017eby a bal\u00ed\u010dky zvy\u0161uje toti\u017e mno\u017estvo v\u0161etk\u00fdch ciest, ako je mo\u017en\u00e9 dan\u00fd syst\u00e9m kompromitova\u0165<\/li>\n<li><strong>Anal\u00fdza zvl\u00e1\u0161tneho chovania syst\u00e9mu<\/strong> &#8211; kontrola &#8222;zvl\u00e1\u0161tnych&#8220; procesov a sie\u0165ov\u00fdch spojen\u00ed (&#8222;promiscous flag&#8220;), &#8222;zadn\u00fdch vr\u00e1tok&#8220;, modifikovan\u00fdch bin\u00e1rnych s\u00faborov, podozriv\u00fdch z\u00e1znamov v logoch, detekcia kernel rootkitov<\/li>\n<li><strong>Kontrola syst\u00e9mov\u00fdch suid\/sgid aplik\u00e1ci\u00ed a ich pr\u00edpadn\u00e1 elimin\u00e1cia &#8211; <\/strong>suid\/sgid aplik\u00e1cie vlastnen\u00e9 &#8222;rootom&#8220; s\u00fa z h\u013eadiska bezpe\u010dnosti kritick\u00e9 &#8211; ich zneu\u017eitie m\u00f4\u017ee vies\u0165 ku kompromit\u00e1cii cel\u00e9ho syst\u00e9mu<\/li>\n<li><strong>Overenie aktu\u00e1lnosti pou\u017eit\u00fdch bezpe\u010dnostn\u00fdch z\u00e1plat v\u0161etk\u00fdch bal\u00edkov\u00a0 a jadra <\/strong><strong>&#8211;\u00a0<\/strong>neudr\u017eovan\u00fd syst\u00e9m bal\u00edkov a star\u00e9 jadro m\u00f4\u017ee obsahova\u0165 ve\u013ek\u00e9 mno\u017estvo zranite\u013enost\u00ed, ktor\u00e9 dok\u00e1\u017ee potenci\u00e1lny \u00fato\u010dn\u00edk zneu\u017ei\u0165<\/li>\n<li><strong>N\u00e1vrh vhodn\u00e9ho AC pr\u00edstupu riadenia <\/strong>&#8211; Unixov\u00fd DAC (<a href=\"http:\/\/en.wikipedia.org\/wiki\/Discretionary_Access_Control\">Discretionary Access Control<\/a>) je v mnoh\u00fdch pr\u00edpadoch nedosta\u010duj\u00faci. Na Linuxe, BSD ako aj Solarise existuj\u00fa robustnej\u0161ie pr\u00edstupy riadenia zalo\u017een\u00e9 na <a href=\"http:\/\/en.wikipedia.org\/wiki\/Type_enforcement\">DTE<\/a> a <a href=\"http:\/\/en.wikipedia.org\/wiki\/Role-Based_Access_Control\">RBAC<\/a> modeli (<a href=\"http:\/\/www.nsa.gov\/research\/selinux\/\">SELinux<\/a>, <a href=\"http:\/\/www.trustedbsd.org\/sebsd.html\">SEBSD<\/a>,<a href=\"http:\/\/www.sun.com\/software\/solaris\/trustedsolaris\/index.xml\">Trusted Solaris<\/a>). Over\u00edme doteraj\u0161\u00ed pr\u00edstup riadenia a navrhneme bezpe\u010dnej\u0161\u00ed.<\/li>\n<li><strong>Overenie pou\u017e\u00edvate\u013eov <\/strong>&#8211; overenie existuj\u00facich pou\u017e\u00edvate\u013eov, ich opr\u00e1vnen\u00ed, rol\u00ed, nastaven\u00ed (napr. platnos\u0165 \u00fa\u010dtu), separ\u00e1cie do \u0161peci\u00e1lnych skup\u00edn, anal\u00fdza pou\u017eit\u00fdch hashov hesiel a n\u00e1vrh bezpe\u010dnej\u0161\u00edch\u00a0(blowfish), overenie mo\u017enost\u00ed vzdialen\u00e9ho root prihl\u00e1senia, pou\u017e\u00edvate\u013esk\u00fdch cron taskov.<\/li>\n<li><strong>Zhodnotenie konfigur\u00e1cie pou\u017eit\u00fdch slu\u017eieb &#8211; <\/strong>chybn\u00e1 konfigur\u00e1cia slu\u017eby m\u00f4\u017ee vies\u0165 ku kompromitovaniu cel\u00e9ho syst\u00e9mu. Anal\u00fdza, \u010di v\u0161etky TCP\/UDP\u00a0slu\u017eby na prenos citliv\u00fdch \u00fadajov (loginy, hesl\u00e1, ..) pou\u017e\u00edvaj\u00fa bezpe\u010dn\u00e9 \u0161ifrovanie a autentiz\u00e1ciu (SSL), kontrola, \u010di v\u0161etky kritick\u00e9 slu\u017eby be\u017eia pod neprivilegovan\u00fdm pou\u017e\u00edvate\u013eom v &#8222;chroote&#8220;. V pr\u00edpade, \u017ee dan\u00e1 implement\u00e1cia slu\u017eby je z h\u013eadiska bezpe\u010dnosti nevhodn\u00e1 (napr\u00edklad obsahovala v minulosti ve\u013ea bezpe\u010dnostn\u00fdch zranite\u013enost\u00ed), navrhneme jej bezpe\u010dnej\u0161iu alternat\u00edvu<\/li>\n<li><strong>Kontrola bezpe\u010dn\u00e9ho \u00falo\u017eiska &#8211; <\/strong>overenie, \u010di aplik\u00e1cie pou\u017e\u00edvaj\u00fa bezpe\u010dn\u00e9 \u00falo\u017eisko (\u0161ifrovan\u00fd s\u00faborov\u00fd syst\u00e9m), len povolen\u00e9 aplik\u00e1cie pristupuj\u00fa k zvolen\u00fdm d\u00e1tam, &#8222;boot manager&#8220; je zabezpe\u010den\u00fd heslom a s\u00fa nastaven\u00e9 bezpe\u010dn\u00e9 opr\u00e1vnenie k s\u00faborom<\/li>\n<li><strong>Kontrola &#8222;host-based&#8220; firewallu<\/strong> &#8211; overenie, \u010di je zapnut\u00fd a spr\u00e1vne nakonfigurovan\u00fd &#8222;host-based&#8220; firewall, ktor\u00fd zvy\u0161uje lok\u00e1lnu bezpe\u010dnos\u0165 a komplikuje masov\u00e9 \u0161\u00edrenie &#8222;wormov&#8220;.<\/li>\n<\/ul>\n<p><strong>Vlastnosti:<\/strong><\/p>\n<ul>\n<li>podporovan\u00e9 s\u00fa v\u0161etky roz\u0161\u00edren\u00e9 opera\u010dn\u00e9 syst\u00e9my<\/li>\n<li>testovanie je v s\u00falade s OSSTMM metodol\u00f3giou, d\u00f4raz na f\u00e1zy &#8222;Vulnerability Research and Verification (OSSTMM Section C\/4)&#8220; a &#8222;Privacy Review (OSSTMM Section C\/5)&#8220;<\/li>\n<li>v\u00fdsledkom je technick\u00e1 spr\u00e1va s mana\u017e\u00e9rskym zhrnut\u00edm, v\u0161etk\u00fdmi odhalen\u00fdmi zranite\u013enos\u0165ami a vhodn\u00fdmi odporu\u010deniami<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Cie\u013eom lok\u00e1lneho syst\u00e9mov\u00e9ho bezpe\u010dnostn\u00e9ho auditu je kontrola lok\u00e1lnej syst\u00e9movej bezpe\u010dnosti dan\u00e9ho OS v rozsahu: Overenie existencie nepou\u017e\u00edvan\u00fdch slu\u017eieb a bal\u00ed\u010dkov &#8211; nepou\u017e\u00edvan\u00e9 slu\u017eby a bal\u00ed\u010dky zvy\u0161uje toti\u017e mno\u017estvo v\u0161etk\u00fdch ciest, ako je mo\u017en\u00e9 dan\u00fd syst\u00e9m kompromitova\u0165 Anal\u00fdza zvl\u00e1\u0161tneho chovania syst\u00e9mu &#8211; kontrola &#8222;zvl\u00e1\u0161tnych&#8220; procesov a sie\u0165ov\u00fdch spojen\u00ed (&#8222;promiscous flag&#8220;), &#8222;zadn\u00fdch vr\u00e1tok&#8220;, modifikovan\u00fdch bin\u00e1rnych s\u00faborov, podozriv\u00fdch [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"parent":381,"menu_order":1,"comment_status":"closed","ping_status":"closed","template":"services_detail.php","meta":{"inline_featured_image":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"class_list":["post-387","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Lok\u00e1lny syst\u00e9mov\u00fd audit - Nethemba<\/title>\n<meta name=\"description\" content=\"V\u00fdskedkom syst\u00e9mov\u00e9ho auditu je technick\u00e1 spr\u00e1va s mana\u017e\u00e9rskym zhrnut\u00edm, v\u0161etk\u00fdmi odhalen\u00fdmi zranite\u013enos\u0165ami a vhodn\u00fdmi odporu\u010deniami.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/nethemba.com\/sk\/sluzby\/sietova-a-systemova-bezpecnost\/lokalny-systemovy-audit\/\" \/>\n<meta property=\"og:locale\" content=\"sk_SK\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Lok\u00e1lny syst\u00e9mov\u00fd audit - Nethemba\" \/>\n<meta property=\"og:description\" content=\"V\u00fdskedkom syst\u00e9mov\u00e9ho auditu je technick\u00e1 spr\u00e1va s mana\u017e\u00e9rskym zhrnut\u00edm, v\u0161etk\u00fdmi odhalen\u00fdmi zranite\u013enos\u0165ami a vhodn\u00fdmi odporu\u010deniami.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/nethemba.com\/sk\/sluzby\/sietova-a-systemova-bezpecnost\/lokalny-systemovy-audit\/\" \/>\n<meta property=\"og:site_name\" content=\"Nethemba\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/nethemba\" \/>\n<meta property=\"article:modified_time\" content=\"2019-08-05T11:19:42+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@nethemba\" \/>\n<meta name=\"twitter:label1\" content=\"Predpokladan\u00fd \u010das \u010d\u00edtania\" \/>\n\t<meta name=\"twitter:data1\" content=\"3 min\u00faty\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/nethemba.com\/sk\/sluzby\/sietova-a-systemova-bezpecnost\/lokalny-systemovy-audit\/\",\"url\":\"https:\/\/nethemba.com\/sk\/sluzby\/sietova-a-systemova-bezpecnost\/lokalny-systemovy-audit\/\",\"name\":\"Lok\u00e1lny syst\u00e9mov\u00fd audit - Nethemba\",\"isPartOf\":{\"@id\":\"https:\/\/nethemba.com\/de\/#website\"},\"datePublished\":\"2015-11-08T20:40:56+00:00\",\"dateModified\":\"2019-08-05T11:19:42+00:00\",\"description\":\"V\u00fdskedkom syst\u00e9mov\u00e9ho auditu je technick\u00e1 spr\u00e1va s mana\u017e\u00e9rskym zhrnut\u00edm, v\u0161etk\u00fdmi odhalen\u00fdmi zranite\u013enos\u0165ami a vhodn\u00fdmi odporu\u010deniami.\",\"breadcrumb\":{\"@id\":\"https:\/\/nethemba.com\/sk\/sluzby\/sietova-a-systemova-bezpecnost\/lokalny-systemovy-audit\/#breadcrumb\"},\"inLanguage\":\"sk-SK\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/nethemba.com\/sk\/sluzby\/sietova-a-systemova-bezpecnost\/lokalny-systemovy-audit\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/nethemba.com\/sk\/sluzby\/sietova-a-systemova-bezpecnost\/lokalny-systemovy-audit\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/nethemba.com\/sk\/domov\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Slu\u017eby\",\"item\":\"https:\/\/nethemba.com\/sk\/sluzby\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Sie\u0165ov\u00e1 a syst\u00e9mov\u00e1 bezpe\u010dnos\u0165\",\"item\":\"https:\/\/nethemba.com\/sk\/sluzby\/sietova-a-systemova-bezpecnost\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Lok\u00e1lny syst\u00e9mov\u00fd audit\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/nethemba.com\/de\/#website\",\"url\":\"https:\/\/nethemba.com\/de\/\",\"name\":\"Nethemba\",\"description\":\"We care about your security\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/nethemba.com\/de\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"sk-SK\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Lok\u00e1lny syst\u00e9mov\u00fd audit - Nethemba","description":"V\u00fdskedkom syst\u00e9mov\u00e9ho auditu je technick\u00e1 spr\u00e1va s mana\u017e\u00e9rskym zhrnut\u00edm, v\u0161etk\u00fdmi odhalen\u00fdmi zranite\u013enos\u0165ami a vhodn\u00fdmi odporu\u010deniami.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/nethemba.com\/sk\/sluzby\/sietova-a-systemova-bezpecnost\/lokalny-systemovy-audit\/","og_locale":"sk_SK","og_type":"article","og_title":"Lok\u00e1lny syst\u00e9mov\u00fd audit - Nethemba","og_description":"V\u00fdskedkom syst\u00e9mov\u00e9ho auditu je technick\u00e1 spr\u00e1va s mana\u017e\u00e9rskym zhrnut\u00edm, v\u0161etk\u00fdmi odhalen\u00fdmi zranite\u013enos\u0165ami a vhodn\u00fdmi odporu\u010deniami.","og_url":"https:\/\/nethemba.com\/sk\/sluzby\/sietova-a-systemova-bezpecnost\/lokalny-systemovy-audit\/","og_site_name":"Nethemba","article_publisher":"https:\/\/www.facebook.com\/nethemba","article_modified_time":"2019-08-05T11:19:42+00:00","twitter_card":"summary_large_image","twitter_site":"@nethemba","twitter_misc":{"Predpokladan\u00fd \u010das \u010d\u00edtania":"3 min\u00faty"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/nethemba.com\/sk\/sluzby\/sietova-a-systemova-bezpecnost\/lokalny-systemovy-audit\/","url":"https:\/\/nethemba.com\/sk\/sluzby\/sietova-a-systemova-bezpecnost\/lokalny-systemovy-audit\/","name":"Lok\u00e1lny syst\u00e9mov\u00fd audit - Nethemba","isPartOf":{"@id":"https:\/\/nethemba.com\/de\/#website"},"datePublished":"2015-11-08T20:40:56+00:00","dateModified":"2019-08-05T11:19:42+00:00","description":"V\u00fdskedkom syst\u00e9mov\u00e9ho auditu je technick\u00e1 spr\u00e1va s mana\u017e\u00e9rskym zhrnut\u00edm, v\u0161etk\u00fdmi odhalen\u00fdmi zranite\u013enos\u0165ami a vhodn\u00fdmi odporu\u010deniami.","breadcrumb":{"@id":"https:\/\/nethemba.com\/sk\/sluzby\/sietova-a-systemova-bezpecnost\/lokalny-systemovy-audit\/#breadcrumb"},"inLanguage":"sk-SK","potentialAction":[{"@type":"ReadAction","target":["https:\/\/nethemba.com\/sk\/sluzby\/sietova-a-systemova-bezpecnost\/lokalny-systemovy-audit\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/nethemba.com\/sk\/sluzby\/sietova-a-systemova-bezpecnost\/lokalny-systemovy-audit\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/nethemba.com\/sk\/domov\/"},{"@type":"ListItem","position":2,"name":"Slu\u017eby","item":"https:\/\/nethemba.com\/sk\/sluzby\/"},{"@type":"ListItem","position":3,"name":"Sie\u0165ov\u00e1 a syst\u00e9mov\u00e1 bezpe\u010dnos\u0165","item":"https:\/\/nethemba.com\/sk\/sluzby\/sietova-a-systemova-bezpecnost\/"},{"@type":"ListItem","position":4,"name":"Lok\u00e1lny syst\u00e9mov\u00fd audit"}]},{"@type":"WebSite","@id":"https:\/\/nethemba.com\/de\/#website","url":"https:\/\/nethemba.com\/de\/","name":"Nethemba","description":"We care about your security","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/nethemba.com\/de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"sk-SK"}]}},"_links":{"self":[{"href":"https:\/\/nethemba.com\/sk\/wp-json\/wp\/v2\/pages\/387","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nethemba.com\/sk\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/nethemba.com\/sk\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/nethemba.com\/sk\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/nethemba.com\/sk\/wp-json\/wp\/v2\/comments?post=387"}],"version-history":[{"count":0,"href":"https:\/\/nethemba.com\/sk\/wp-json\/wp\/v2\/pages\/387\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/nethemba.com\/sk\/wp-json\/wp\/v2\/pages\/381"}],"wp:attachment":[{"href":"https:\/\/nethemba.com\/sk\/wp-json\/wp\/v2\/media?parent=387"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}