Feeds

A sysadmin always comes prepared: Grasp those essential tools

Help us scope the perfect IT admin's toolkit

Next gen security for virtualised datacentres

+Competition We have prizes up for grabs. The first 30 people to sign up for a GFI Cloud free trial and add two or more devices to the console get a limited edition T-shirt from The Register. All signs ups that add two or more devices before this competition ends will be entered into a draw to win a 10-user licence of GFI Cloud’s AntiMalware Pack. Find the full competition T&Cs here.

There are certain tools that all sysadmins need. Some, such as the venerable ping, are so fundamental that their lack would be considered an oddity.

Others, such as backups, should by rights be deployed absolutely everywhere, yet incomprehensibly are not. Debating which tools are best is the blood sport of our industry.

I remember the carefree days before broadband. I built open-air lasers to carry unencrypted traffic at a blistering 9600 bps.

Obscurity really was security. Only a handful of people in my area at the time could recognise what those rigs were designed to do, let alone intercept the communications. The chances were vanishingly small that of any of them would do so for malicious purposes.

Broadband arrived. With it came new threat vectors along with a technology industry exploding in innovation. Some of the biggest names in the industry were caught unawares – Windows XP famously had a firewall that wasn't on by default.

Windows XP's Service Pack 2 changed all this and finally made Microsoft's pivot towards "security first" tangible to the customer. It has done yeoman's work since then, but the industry as a whole cannot say the same.

The companies behind major culprits such as Java, Flash, PDF readers and consumer broadband routers haven't cleaned up their act despite years of continued assault.

In very human fashion, the companies behind the "Internet of Things" machine-to-machine revolution are proving no better. They are repeating the mistakes of their predecessors, offering poor support and units that are vulnerable by default.

The world has changed since my little 9600 bps lasers and threat models have changed with it. Have our sysadmin's toolkits kept up?

Let's take a peek at the major categories and have you, the reader, submit your thoughts on which tools are the best for the job.

Perimeter threat detection

This is about more than just standing up a firewall and hoping nobody crawls through. It is about assuming that someone eventually will and deploying tools to detect this when it happens.

Intrusion detection and prevention systems (IDPS) exist in any number of forms to attempt to detect the untoward activity.

Basic IDPS systems are designed to be deployed to monitor individual services or servers. Fail2Ban is a popular example.

Other IDPS systems are designed to scan active network streams and typically come in the form of application layer gateways (ALGs). Today, these are commodities, easily found as physical or virtual appliances.

Perhaps the most pervasive IDPS technologies deployed today are web filtering and email filtering. These can include everything from ad-blocking and anti-malware to spam filtering or blocking undesirable content.

They can be installed as part of a firewall/ALG appliance but are increasingly deployed on a per-system basis as part of a cloud service that offers rapid-release threat signatures.

Working to block threats at the perimeter is the first, and easiest, step towards a functional modern IT deployment. A large number of things that can go wrong simply don't if the bad guys can't get past the edge defences.

Extant threat detection

No battle plan survives contact with the enemy. No matter how sophisticated and well implemented your perimeter defences, something will inevitably get through.

In addition, you will have to cope with privileged users abusing their privilege, Pointy Haired Boss syndrome and inadequate funding.

Extant threat detection has to include various types of hardware, software and network monitoring. It needs to detect failed equipment, but also unbalanced configurations and runaway resource usage. It needs to be able to find configuration issues ranging from open ports to improper Group Policy Objects.

Event log monitoring is the easiest path forward. Operating systems and applications are usually pretty good about logging when something goes pear-shaped.

ACL auditing needs to be considered. This ranges from file permissions and network ACLs through to application-specific rights allocation. The trick is to have software that can keep an eye on all the logs across all systems and filter signal from noise.

Anti-malware software needs to be centrally managed, with regular updates and proper installation verified.

If something goes wrong admins need to be notified; the first sign of trouble many admins get that a system has been compromised is not detection by the anti-malware application, but rather the unceremonious murder of said application by malware that got in under the radar.

Somewhere in here we need to add USB scanning and efforts to uncover clandestine IT.

In some cases, these items are different tools but they are converging. Even where the individual components of extant threat detection aren't collapsing into a single tool, unified management of the various tools in this category is increasingly pervasive.

Entropy assurance

This is a relatively new category in mass public consciousness, but it is increasingly important.

Entropy assurance tools have one job: to generate high entropy to secure system and service access and manage all of it in a human-compatible fashion.

Here we find tools such as password managers and certificate and key management systems. In today's world of custom silicon, GPGPU computing and massive Amazon cracking setups, entropy assurance apps are no longer optional.

5 things you didn’t know about cloud backup

More from The Register

next story
The Return of BSOD: Does ANYONE trust Microsoft patches?
Sysadmins, you're either fighting fires or seen as incompetents now
Oracle reveals 32-core, 10 BEEELLION-transistor SPARC M7
New chip scales to 1024 cores, 8192 threads 64 TB RAM, at speeds over 3.6GHz
Docker kicks KVM's butt in IBM tests
Big Blue finds containers are speedy, but may not have much room to improve
US regulators OK sale of IBM's x86 server biz to Lenovo
Now all that remains is for gov't offices to ban the boxes
Gartner's Special Report: Should you believe the hype?
Enough hot air to carry a balloon to the Moon
Flash could be CHEAPER than SAS DISK? Come off it, NetApp
Stats analysis reckons we'll hit that point in just three years
Dell The Man shrieks: 'We've got a Bitcoin order, we've got a Bitcoin order'
$50k of PowerEdge servers? That'll be 85 coins in digi-dosh
prev story

Whitepapers

Endpoint data privacy in the cloud is easier than you think
Innovations in encryption and storage resolve issues of data privacy and key requirements for companies to look for in a solution.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Solving today's distributed Big Data backup challenges
Enable IT efficiency and allow a firm to access and reuse corporate information for competitive advantage, ultimately changing business outcomes.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.