Skip to content

Commit fa84b31

Browse files
authored
232 best practices migration hss0047 iam0426 (#255)
1 parent 4a28779 commit fa84b31

18 files changed

+486
-0
lines changed

docs/best-practices/security-services/host-security-service/using-hss-and-cbr-to-defend-against-ransomware/defense-measures/enabling-ransomware-prevention-and-backup.md

Lines changed: 147 additions & 0 deletions
Large diffs are not rendered by default.
Lines changed: 107 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,107 @@
1+
---
2+
id: identifying-and-fixing-ransomware
3+
title: Identifying and Fixing Ransomware
4+
tags: [hss, cbr,ransomware]
5+
---
6+
7+
# Identifying and Fixing Ransomware
8+
9+
10+
According to the Open Telekom Cloud statistics on security intrusion events, 90% of ransomware attacks result from weak passwords, vulnerability exploits, and unsafe baseline settings. Identifying and fixing risks before real intrusions can significantly improve the system security. Open Telekom Cloud HSS helps you quickly identify risks and provides the one-click fix function to reduce O&M costs.
11+
12+
## Increasing Password Strength
13+
14+
HSS automatically scans servers every early morning for common weak passwords and [the passwords you banned](https://docs.otc.t-systems.com/host-security-service/umn/security_operations/policy_management/configuring_policies.html). You can then ask the weak password users to set stronger passwords. HSS can detect weak passwords in SSH, FTP, and MySQL.
15+
16+
1. [Log in to the management console](https://console.otc.t-systems.com/console/).
17+
2. In the upper left corner of the page, select a region, click ![](/img/en-us_image_0000001312049497.png), and choose **Security** > **HSS**.
18+
3. In the navigation pane on the left, choose **Prediction** > **Baseline Checks**.
19+
4. Click the **Common Weak Password Detection** tab to view the weak passwords of the server.
20+
21+
**Figure 1** Viewing common weak password detection
22+
![](/img/docs/best-practices/security-services/host-security-service/en-us_image_0000002177288488.png)
23+
24+
5. Log in to servers to harden weak passwords based on the server names, account names, and account types corresponding to the detected weak passwords.
25+
26+
After hardening weak passwords, you are advised to perform [manual scan](https://docs.otc.t-systems.com/host-security-service/umn/prediction/baseline_inspection/baseline_inspection_overview.html) immediately.
27+
28+
29+
## Hardening Baseline Configurations
30+
31+
HSS scans your software for unsafe settings every early morning and provides suggestions. You can modify your settings accordingly to enhance server security.
32+
33+
1. [Log in to the management console](https://console.otc.t-systems.com/console/).
34+
2. In the upper left corner of the page, select a region, click ![](/img/en-us_image_0000001312049497.png), and choose **Security** > **HSS**.
35+
3. In the navigation pane on the left, choose **Prediction** > **Baseline Checks**.
36+
4. Click the **Unsafe Configurations** tab to view the unsafe configurations of the server.
37+
5. Click the target baseline name. The baseline details page is displayed.
38+
6. Click the **Check Items** tab and click **Failed** to view baseline risk items.
39+
40+
**Figure 2** Viewing baseline check details
41+
![](/img/docs/best-practices/security-services/host-security-service/en-us_image_0000002080792692.png)
42+
43+
7. Click **View Details** in the **Operation** column of a check item to view the modification suggestions and affected servers.
44+
8. Log in to the affected server and harden the configuration based on the modification suggestions.
45+
9. After hardening a configuration, click **Verify** in the **Operation** column to verify the hardening result.
46+
47+
:::note
48+
You are advised to repeat the preceding steps to fix all high-risk configurations.
49+
:::
50+
51+
## Fixing Vulnerabilities
52+
53+
By default, HSS automatically performs a comprehensive vulnerability detection every week and provides fixing suggestions. You can fix the vulnerabilities based on the suggestions. You can also configure the automatic vulnerability detection period. For details, see [Automatic Vulnerability Scan](https://docs.otc.t-systems.com/host-security-service/umn/prediction/vulnerability_management/vulnerability_scan.html).
54+
55+
:::note
56+
There are four levels of vulnerability fix priorities: critical, high, medium, and low. You are advised to fix vulnerabilities of the critical and high levels promptly and fix vulnerabilities of the medium and low levels based on service requirements.
57+
:::
58+
59+
1. [Log in to the management console](https://console.otc.t-systems.com/console/).
60+
2. In the upper left corner of the page, select a region, click ![](/img/en-us_image_0000001312049497.png), and choose **Security** > **HSS**.
61+
3. In the navigation pane on the left, choose **Prediction** > **Vulnerabilities**. The vulnerability management page is displayed.
62+
4. Click the **Linux Vulnerabilities**, **Windows Vulnerabilities**, **Web-CMS Vulnerabilities**, **Application Vulnerabilities**, and **Emergency Vulnerabilities** tabs to view the vulnerabilities of the server.
63+
5. Fix vulnerabilities based on vulnerability types.
64+
* Linux and Windows vulnerabilities
65+
66+
In the row of the vulnerability you want to fix, click **Fix** in the **Operation** column. You can also select multiple vulnerabilities and click **Fix** in the upper left corner of the vulnerability list to fix them in batches.
67+
68+
Fixing kernel vulnerabilities may cause servers to be unavailable. Therefore, HSS does not automatically fix the server kernel vulnerabilities of CCE, MRS, or BMS. When batch fixing vulnerabilities, HSS filters out these types of vulnerabilities.
69+
70+
* Web-CMS, application, and emergency vulnerabilities
71+
1. Click a vulnerability name to view vulnerability fixing suggestions.
72+
2. Log in to the server affected by the vulnerability and manually fix the vulnerability.
73+
74+
Vulnerability fixing may affect service stability. You are advised to use either of the following methods to avoid such impacts:
75+
76+
* Method 1: Create a VM to fix the vulnerability.
77+
1. Create an image for the ECS to be fixed.
78+
79+
For details, see [Creating a Full-ECS Image from an ECS](https://docs.otc.t-systems.com/image-management-service/umn/creating_a_private_image/creating_a_full-ecs_image_from_an_ecs.html).
80+
81+
2. Use the image to create an ECS.
82+
83+
For details, see [Creating an ECS from an Image](https://docs.otc.t-systems.com/image-management-service/umn/managing_private_images/creating_an_ecs_from_an_image.html).
84+
85+
3. Fix the vulnerability on the new ECS and verify the result.
86+
4. Switch services over to the new ECS and verify they are stably running.
87+
5. Release the original ECS.
88+
89+
If a fault occurs after the service switchover and cannot be rectified, you can switch services back to the original ECS.
90+
91+
* Method 2: Fix the vulnerability on the target server.
92+
93+
1. Create a backup for the ECS to be fixed.
94+
95+
For details, see [Creating a CSBS Backup](https://docs.otc.t-systems.com/cloud-server-backup-service/umn/getting_started/creating_a_csbs_backup.html).
96+
97+
2. Fix vulnerabilities on the current server.
98+
3. If services become unavailable after the vulnerability is fixed and cannot be recovered in a timely manner, use the backup to restore the server.
99+
100+
101+
:::note
102+
* Use method 1 if you are fixing a vulnerability for the first time and cannot estimate impact on services. You are advised to choose the pay-per-use billing mode for the newly created ECS. After the service switchover, you can change the billing mode to yearly/monthly. In this way, you can release the ECS at any time to save costs if the vulnerability fails to be fixed.
103+
* Use method 2 if you have fixed the vulnerability on similar servers before.
104+
:::
105+
106+
3. After a vulnerability is fixed, click the vulnerability name to go to the vulnerability details page.
107+
4. Click the **Affected** tab and choose in the **Operation** column of an affected asset or IP address to verify the vulnerability fixing result.
Lines changed: 39 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,39 @@
1+
---
2+
id: restoring-backup-data
3+
title: Restoring Backup Data
4+
tags: [hss, cbr,ransomware]
5+
---
6+
7+
8+
9+
# Restoring Backup Data
10+
11+
Ransomware attacks are developing rapidly these days. There are no tools can kill them absolutely. So once a system was attacked by ransomware, restoring the victim system from backups in a timely manner is the best remedies to minimize losses. After enabling ransomware backup, you can use Open Telekom Cloud CBR to quickly restore services, keeping your services stable.
12+
13+
## Restoring Backup Data
14+
15+
Before using the backup data to restore the service data of a server, check whether the backup is available. If the backup is available, restore the key service system first.
16+
17+
1. [Log in to the management console](https://console.otc.t-systems.com/console/).
18+
2. In the upper left corner of the page, select a region, click ![](/img/en-us_image_0000001312049497.png), and choose **Security** > **HSS**.
19+
3. In the navigation tree on the left, choose .
20+
4. Click the **Protected Servers** tab.
21+
5. In the **Operation** column of the target server, click **More** > **Restore Data**.
22+
6. In the displayed **Backups** page, select the backup data you want to restore.
23+
7. In the **Operation** column of the target backup data, click **Restore Data**.
24+
8. In the displayed dialog page, confirm the server information and configure parameters such as the disk for storing data.
25+
26+
* **Restart Server**: If this option is selected, you agree to restart the server after data restoration.
27+
* **Advanced Options**: Click ![](/img/en-us_image_0000001911782770.png) to expand it. Select the location where the backup data is restored.
28+
29+
**Figure 1** Restoring a server
30+
![](/img/docs/best-practices/security-services/host-security-service/en-us_image_0000002107284956.png)
31+
32+
9. Click **OK**.
33+
34+
After the backup restoration is complete, check whether the data generated before the backup exists. If yes, the restoration is successful.
35+
36+
37+
## Related Operations
38+
39+
You are advised to identify system vulnerabilities based on the ransomware attack path and fix system vulnerabilities.
Lines changed: 67 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,67 @@
1+
---
2+
id: overview
3+
title: Overview
4+
tags: [hss, cbr,ransomware]
5+
---
6+
7+
8+
# Overview
9+
10+
## Scenario
11+
12+
Ransomware attacks have become one of the biggest security challenges facing companies today. Ransomware is a type of malware attack in which the attacker locks the victim's data or asset devices and then demands a payment to unlock the data. Sometimes, attackers may not unlock the data even after receiving the ransom. Ransomware attacks can cause interruption to your services and the leakage or loss of critical information and data. As a result, the operation, economy, and reputation of your company may be greatly affected and security problems may hinder your company development.
13+
14+
15+
When attacking cloud infrastructure, attackers usually attack multiple resources in an attempt to obtain access to customer data or company secrets. The process of a ransomware attack can be divided into three stages: investigation and detection, intrusion and lateral movement, and extortion.
16+
17+
- **Intrusion**: Attackers collect basic information, look for attack vectors, enter the environment, and establish an internal foothold.
18+
- **Lateral movement**: Attackers deploy attack resources, detect network assets, elevate access permissions, steal credentials, implant ransomware, damage the detection and defense mechanism, and expand the attack scope.
19+
- **Encryption extortion**: Attackers steal confidential data, encrypt key data, load ransomware information, and ask for ransom.
20+
21+
**Figure 1** Extortion process
22+
![image](/img/docs/best-practices/security-services/host-security-service/en-us_image_0000001897127453.png)
23+
24+
25+
26+
This solution describes how to use HSS and CBR to implement three-phase protection for servers, including pre-event prevention, in-event detection and timely blocking, and post-event backup and restoration.
27+
28+
## Architecture
29+
30+
Enterprises or individuals can use HSS to detect ransomware and identify system risks. CBR can be used to back up service data and plan and control account permissions and organizational structures.
31+
32+
The following figure [HSS+CBR ransomware protection](#figure2) shows the protection principle.
33+
34+
<a id="figure2"></a>
35+
**Figure 2** HSS+CBR ransomware protection
36+
37+
![](/img/docs/best-practices/security-services/host-security-service/en-us_image_0000001875291117.png)
38+
39+
For details about the defense measures in the figure, see:
40+
41+
- Pre-event: Identify weak passwords and vulnerabilities and assist users in fixing them.
42+
43+
For details, see [Identifying and Fixing Ransomware](./defense-measures/identifying-and-fixing-ransomware.md).
44+
45+
- In-event: Detect ransomware, deploy bait files, and block encryption.
46+
47+
For details, see [Enabling Ransomware Prevention and Backup](./defense-measures/enabling-ransomware-prevention-and-backup.md).
48+
49+
- Post-event: Restore the backup data.
50+
51+
For details, see [Restoring Backup Data](./defense-measures/restoring-backup-data.md).
52+
53+
54+
## Advantages
55+
56+
- Reduce system risks.
57+
58+
Users can use HSS to periodically detect vulnerabilities and risks in the system and rectify them in a timely manner.
59+
60+
- Detect and block ransomware attacks in real time.
61+
62+
After ransomware protection is enabled, HSS detects ransomware attacks in real time, generates alarms, and isolates ransomware programs.
63+
64+
- Back up service data to enhance anti-risk capabilities.
65+
66+
If a server is attacked by ransomware, CBR can be used to restore backup data and services in a timely manner and reduce losses.
67+
Lines changed: 20 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,20 @@
1+
---
2+
id: resources-and-costs
3+
title: Resources and Costs
4+
tags: [hss, cbr,ransomware]
5+
---
6+
7+
8+
# Resources and Costs
9+
Resources and Costs
10+
-------------------
11+
12+
The following table describes the resource planning in the best practice.
13+
14+
15+
| Resource | Description | Cost |
16+
|---------------------------------|-------------------------------------------------------------------------------------------------|-----------------------------------------------------------------------------------------------------------------------|
17+
| HSS (Host Security Service) | One HSS premium edition quota. One HSS premium edition quota is required to protect one server. | For details about billing rules, see [Billing Description](https://open-telekom-cloud.com/en/prices/price-calculator) |
18+
| Cloud Backup and Recovery (CBR) | One ECS backup vault. | For details about billing rules, see [Billing Description](https://open-telekom-cloud.com/en/prices/price-calculator) |
19+
20+
**Table 1** Resource description

0 commit comments

Comments
 (0)