{"id":7444,"date":"2017-04-25T11:00:36","date_gmt":"2017-04-25T19:00:36","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2017\/04\/25\/news-1235\/"},"modified":"2017-04-25T11:00:36","modified_gmt":"2017-04-25T19:00:36","slug":"news-1235","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2017\/04\/25\/news-1235\/","title":{"rendered":"Linux is secure\u2026right?"},"content":{"rendered":"<p><strong>Credit to Author: Lauren Newby| Date: Tue, 25 Apr 2017 18:45:13 +0000<\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"255\" src=\"http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/04\/Linux_blog_Trend_Micro-300x255.png\" class=\"webfeedsFeaturedVisual wp-post-image\" alt=\"\" style=\"float: left; margin-right: 5px;\" srcset=\"http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/04\/Linux_blog_Trend_Micro-300x255.png 300w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/04\/Linux_blog_Trend_Micro-640x545.png 640w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/04\/Linux_blog_Trend_Micro-440x374.png 440w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/04\/Linux_blog_Trend_Micro-380x323.png 380w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/04\/Linux_blog_Trend_Micro.png 724w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/p>\n<p style=\"text-align: center\"><strong><em>&#8220;There are no threats for Linux servers. Aren\u2019t they built to be secure?&#8221; <\/em><\/strong><\/p>\n<p style=\"text-align: center\"><strong><em>&#8220;<\/em><\/strong><strong><em>Linux servers are so secure and hardened, why do we need security controls on those?&#8221;<\/em><\/strong><\/p>\n<p style=\"text-align: center\"><strong><em>&#8220;I do understand there are threats out there but I am not aware of any major attacks on Linux servers&#8221;<\/em><\/strong><\/p>\n<p>If you find yourself nodding in agreement, you\u2019re not alone. There is a common belief that Linux servers are more secure and less vulnerable than Windows servers. Although you\u2019re not totally wrong, you wouldn\u2019t be completely right either, and by acting (or not) on this belief you would be putting your business at risk.<\/p>\n<p><strong>Secure, but still vulnerable.<\/strong><strong>\u00a0<\/strong><\/p>\n<p>With more and more servers moving beyond the enterprise boundary and into the cloud, network protection at the host-level becomes increasingly important, as workloads need to defend themselves vs. having a perimeter around them. And remember, workloads include the applications that sit on top of Linux\u2026it\u2019s more than just the OS.<\/p>\n<p>Having a host-based Intrusion Prevention System (IPS) will help protect against vulnerabilities in core operating system AND the application stack running on top. Great examples of network-accessible vulnerabilities with wide-spread impacts are the recent <a href=\"http:\/\/blog.trendmicro.com\/trendlabs-security-intelligence\/cve-2017-5638-apache-struts-vulnerability-remote-code-execution\/\">Apache Struts-2<\/a> issue, Heartbleed and Shellshock, but there are many more. And just because a vulnerability, like Heartbleed, is a couple years old doesn\u2019t mean that applications and servers are not still vulnerable. In a recent Shodan survey, it showed that Heartbleed was still an available vulnerability on more than 180,000 servers around the world, with the majority of them in the US!<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-539012\" src=\"http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/04\/blog-5-1024x656.jpg\" alt=\"\" width=\"599\" height=\"384\" srcset=\"http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/04\/blog-5-1024x656.jpg 1024w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/04\/blog-5-300x192.jpg 300w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/04\/blog-5-768x492.jpg 768w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/04\/blog-5-640x410.jpg 640w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/04\/blog-5-900x577.jpg 900w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/04\/blog-5-440x282.jpg 440w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/04\/blog-5-380x243.jpg 380w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/04\/blog-5.jpg 1558w\" sizes=\"auto, (max-width: 599px) 100vw, 599px\" \/><\/p>\n<p>If you run a web server on Linux (running at least 37 percent of the web servers out there according to <a href=\"https:\/\/w3techs.com\/technologies\/details\/os-linux\/all\/all\">W3Techs<\/a>), you need protection against vulnerabilities affecting them, including Apache, Nginx, etc.<\/p>\n<p>&nbsp;<\/p>\n<div class=\"lightTable\">\n<table>\n<tbody>\n<tr>\n<td width=\"363\"><strong>\u00a0<\/strong><\/td>\n<td width=\"210\"><strong>Vulnerabilities Covered in and after 2014 (approx.)<\/strong><\/td>\n<td width=\"142\"><strong>Before 2014 (approx.)<\/strong><\/td>\n<td width=\"213\"><strong>Total<\/strong><\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left\" width=\"363\"><strong>Non-Windows OS and Core Services<\/strong><\/td>\n<td width=\"210\"><strong>80<\/strong><\/td>\n<td width=\"142\"><strong>230<\/strong><\/td>\n<td width=\"213\"><strong>310<\/strong><\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left\" width=\"363\"><strong>Web Servers<\/strong><\/td>\n<td width=\"210\"><strong>114<\/strong><\/td>\n<td width=\"142\"><strong>472<\/strong><\/td>\n<td width=\"213\"><strong>586<\/strong><\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left\" width=\"363\"><strong>Application Servers<\/strong><\/td>\n<td width=\"210\"><strong>255<\/strong><\/td>\n<td width=\"142\"><strong>319<\/strong><\/td>\n<td width=\"213\"><strong>574<\/strong><\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left\" width=\"363\"><strong>Web Console\/Management Interfaces<\/strong><\/td>\n<td width=\"210\"><strong>113<\/strong><\/td>\n<td width=\"142\"><strong>453<\/strong><\/td>\n<td width=\"213\"><strong>566<\/strong><\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left\" width=\"363\"><strong>Database Servers<\/strong><\/td>\n<td width=\"210\"><strong>10<\/strong><\/td>\n<td width=\"142\"><strong>218<\/strong><\/td>\n<td width=\"213\"><strong>228<\/strong><\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left\" width=\"363\"><strong>DHCP, FTP, DNS servers<\/strong><\/td>\n<td width=\"210\"><strong>9<\/strong><\/td>\n<td width=\"142\"><strong>82<\/strong><\/td>\n<td width=\"213\"><strong>91<\/strong><\/td>\n<\/tr>\n<\/tbody>\n<\/table><\/div>\n<p style=\"text-align: center\"><em>Table 1: Vulnerabilities Protected by Deep Security<\/em><\/p>\n<p>&nbsp;<\/p>\n<p>It is very important to not confuse vulnerabilities with threats. While there may be fewer known threats for Linux, if you look at the National Vulnerability Database, there are a similar number of vulnerabilities reported for both <a href=\"https:\/\/nvd.nist.gov\/vuln\/search\/results?adv_search=false&amp;form_type=basic&amp;results_type=overview&amp;search_type=all&amp;query=linux\">Linux<\/a>, and <a href=\"https:\/\/nvd.nist.gov\/vuln\/search\/results?adv_search=false&amp;form_type=basic&amp;results_type=overview&amp;search_type=all&amp;query=windows\">Windows<\/a> operating systems.<strong>\u00a0<\/strong><\/p>\n<p><strong>Malware, designed for Linux<\/strong><\/p>\n<p>Contrary to popular belief, there is a lot of malware for the Linux platform. While the numbers in comparison to Microsoft Windows are not quite as high, there are still tens of thousands of pieces of malware designed for Linux.<\/p>\n<p>Deploying ONLY anti-malware is inadequate for protecting servers. However, most attacks on datacenters that lead to breach involve the installation of malware as part of the attack chain.\u00a0 This is why compliance and security frameworks such as <a href=\"http:\/\/go.trendmicro.com\/sem\/sem\/www.trendmicro.com\/us\/business\/cloud-data\/pci-compliance\/\">PCI-DSS<\/a> (Section #3), <a href=\"http:\/\/blog.trendmicro.com\/california-auditor-general-calls-out-sans-top-20-as-a-good-path-to-more-secure-data\/\">SANS CIS Critical Security Controls<\/a> (Section #8), and <a href=\"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/en\/business\/capabilities\/solutions-for\/compliance\/NIST-FCI%20Compliancy-v1.2.pdf\">NIST Cybersecurity Framework<\/a> (Section DE.CM-4) all continue to recommend anti-malware as a best practice.<strong>\u00a0<\/strong><\/p>\n<p><strong>Layered security for Linux workloads<\/strong><\/p>\n<p>It\u2019s becoming more and more clear that there is no silver bullet when it comes to server security, and that businesses should be using a layered security approach to protect vulnerable Linux machines. Beyond anti-malware and IPS, there are a number of controls that will help to build a robust Linux strategy:<strong>\u00a0<\/strong><\/p>\n<table>\n<tbody>\n<tr>\n<td width=\"20px\"><\/td>\n<td>\n<ul>\n<li><strong>Application Control:<\/strong> helps &#8216;lock down&#8217; the host to prevent any unknown process or script from running. This prevents the malware from running in the first place or attackers from taking advantage of backdoors that it might have placed on the server.<\/li>\n<li><strong>Integrity Monitoring: <\/strong>A new threat is likely to make changes to the system, so it\u2019s important to watch for these. Integrity monitoring helps with monitoring the system for any changes outside of the change window, which tend to be few for your typical production servers.<\/li>\n<li><strong>Log Inspection: <\/strong>Scans log files and provides a continuous monitoring process to help identify threats early in the cycle. Attacks like SQL Injection, command injection, attacks against APIs can be seen in the logs and then action taken.<strong>\u00a0<\/strong><\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr>\n<td height=\"10px\"><\/td>\n<td><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>The lesson we learn here is that although Linux is a more secure and reliable operating system option, it\u2019s not your cure-all solution when it comes to security. Like any other platform, some assembly and maintenance is required, and it\u2019s your responsibility to adopt a multi-layered security strategy and manage regular updates to ensure your systems are protected, including the applications that live on those systems. To learn more about Linux vulnerabilities and how to protect against them using Trend Micro Deep Security, <a href=\"https:\/\/www.trendmicro.com\/aws\/wp-content\/uploads\/2017\/03\/Why-Linux-Servers-Need-More-Security.pdf\">read our short research paper here.<\/a><\/p>\n<p><a href=\"http:\/\/blog.trendmicro.com\/linux-is-secureright\/\" target=\"bwo\" >http:\/\/feeds.trendmicro.com\/TrendMicroSimplySecurity<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Lauren Newby| Date: Tue, 25 Apr 2017 18:45:13 +0000<\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"255\" src=\"http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/04\/Linux_blog_Trend_Micro-300x255.png\" class=\"webfeedsFeaturedVisual wp-post-image\" alt=\"\" style=\"float: left; margin-right: 5px;\" srcset=\"http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/04\/Linux_blog_Trend_Micro-300x255.png 300w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/04\/Linux_blog_Trend_Micro-640x545.png 640w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/04\/Linux_blog_Trend_Micro-440x374.png 440w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/04\/Linux_blog_Trend_Micro-380x323.png 380w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/04\/Linux_blog_Trend_Micro.png 724w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/>&#8220;There are no threats for Linux servers. Aren\u2019t they built to be secure?&#8221; &#8220;Linux servers are so secure and hardened, why do we need security controls on those?&#8221; &#8220;I do understand there are threats out there but I am not aware of any major attacks on Linux servers&#8221; If you find yourself nodding in agreement,&#8230;<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10378,10413],"tags":[1001,714],"class_list":["post-7444","post","type-post","status-publish","format-standard","hentry","category-security","category-trendmicro","tag-business","tag-security"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/7444","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=7444"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/7444\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=7444"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=7444"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=7444"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}