Information Security News mailing list archives

ITL Bulletin for March 2003


From: InfoSec News <isn () c4i org>
Date: Mon, 31 Mar 2003 04:29:24 -0600 (CST)

Forwarded from: Elizabeth Lennon <elizabeth.lennon () nist gov>

SECURITY FOR WIRELESS NETWORKS AND DEVICES
Shirley Radack, Editor
Computer Security Division
Information Technology Laboratory
National Institute of Standards and Technology

Many organizations and users have found that wireless communications
and devices are convenient, flexible, and easy to use. Users of
wireless local area network (WLAN)  devices have flexibility to move
their laptop computers from one place to another within their offices
while maintaining connectivity with the network. Wireless personal
networks allow users to share data and applications with network
systems and other users with compatible devices, without being tied to
printer cables and other peripheral device connections. Users of
handheld devices such as personal digital assistants (PDAs) and cell
phones can synchronize data between PDAs and personal computers and
can use network services such as wireless email, web browsing, and
Internet access. Further, wireless communications can help
organizations cut their wiring costs.

While wireless networks are exposed to many of the same risks as wired
networks, they are vulnerable to additional risks as well. Wireless
networks transmit data through radio frequencies, and are open to
intruders unless protected. Intruders have exploited this openness to
access systems, destroy or steal data, and launch attacks that tie up
network bandwidth and deny service to authorized users.  Another risk
is the theft of the small and portable devices themselves.

NIST Guidance on Security of Wireless Networks and Devices

The National Institute of Standards and Technology, 
Information Technology Laboratory, has published 
recommendations to improve the security of wireless 
networks in NIST Special Publication (SP) 800-48, Wireless 
Network Security, 802.11, Bluetooth, and Handheld Devices. 
Written by Tom Karygiannis and Les Owens, NIST SP 800-48 
discusses three aspects of wireless security:

* security issues associated with wireless local area 
  networks (WLANs) that are based on Institute of Electrical 
  and Electronics Engineers (IEEE) standards 802.11;

* security issues related to wireless personal area 
  networks based on the Bluetooth specifications, which were 
  developed by an industry consortium; and

* security of wireless handheld devices.

This ITL bulletin summarizes the publication, which is available at
http://csrc.nist.gov/publications/nistpubs/index.html.

The publication includes checklists that organizations will find
useful in assessing the security of their wireless networks and
devices. The appendices contain information about wireless frequencies
and applications, a glossary of terms used, and an explanation of
acronyms and abbreviations. Also included are summaries of eight IEEE
802.11 standards, references to print and electronic sources of
information, and information about wireless networking tools.

The Risk Environment

Wireless networks and handheld devices are vulnerable to many of the
same threats as conventional wired networks.  Intruders who gain
access to information systems via wireless communications can bypass
firewall protection.  Once they have accessed systems, intruders can
launch denial of service attacks, steal identities, violate the
privacy of legitimate users, insert viruses or malicious code, and
disable operations. Sensitive information that is transmitted between
two wireless devices can be intercepted and disclosed if not protected
by strong encryption.  Handheld devices, which are easily stolen, can
reveal sensitive information.

Before establishing wireless networks and using handheld devices,
organizations should use risk management processes to assess the risks
involved, to take steps to reduce the risks to an acceptable level,
and to maintain that acceptable level of risk. Using risk management
processes, managers can protect systems and information in a
cost-effective manner by balancing the operational and economic costs
of needed protective measures with the gains in mission capability to
be achieved through the application of new technology.

Wireless Technology and Standards

Wireless devices communicate through radio transmissions, without
physical connections and without network or peripheral cabling.
Wireless systems include local area networks, personal networks, cell
phones, and devices such as wireless headphones, microphones, and
other devices that do not process or store information. Other wireless
devices being widely used include infrared (IR) devices such as remote
controls, cordless computer keyboards, mouse devices, and wireless
hi-fi stereo headsets, all of which require a direct line of sight
between the transmitter and the receiver.

Two standards for wireless technologies are discussed in NIST SP
800-48. One is the IEEE 802.11 group of standards for WLANs, which
were developed by a voluntary industry standards committee. The IEEE
802.11 standards provide specifications for high-speed networks that
support most of today's applications. The Bluetooth standard, which
was developed by a computer and communications industry consortium,
specifies how mobile phones, computers, and PDAs interconnect with
each other, with home and business phones, and with computers using
short-range wireless connections.

As wireless technology evolves, new devices are being developed to
provide more features, functions, portability and ease of use. Mobile
phones can provide multiple services including voice, email, text
messaging, paging, web access, and voice recognition services. Newer
mobile phones incorporate PDA, wireless Internet, email, and global
positioning system (GPS) capabilities.

Recommendations for Secure Wireless Networks

The trends in use of information technology point to increased
implementation of wireless communications networks and use of wireless
devices. Each new development will present new security risks, which
must be addressed to ensure that critical assets remain protected.
Actions that organizations should take to protect the confidentiality,
integrity, and availability of all systems and information include:

Assess risks, test and evaluate system security controls for wireless
networks more frequently than for other networks and systems.
Maintaining secure wireless networks is an ongoing process that
requires greater effort than that required for other networks and
systems.

Steps that can be taken to improve the management of wireless networks
include:

* Maintain a full understanding of the topology of the
  wireless network.

* Label and keep inventories of the fielded wireless and
  handheld devices.

* Create backups of data frequently.

* Perform periodic security testing and assessment of the
  wireless network.

* Perform ongoing, randomly timed security audits to
  monitor and track wireless and handheld devices.

* Apply patches and security enhancements.

* Monitor the wireless industry for changes to standards
  that enhance security features and for the release of new
  products.

* Monitor wireless technology for new threats and
  vulnerabilities.

Perform a risk assessment, develop a security policy, and determine
security requirements before purchasing wireless technologies.

The risks associated with the use of wireless technologies are
considerable, and many products provide inadequate protection.
Organizations should plan to protect their essential operations before
they adopt wireless technologies. Common administration problems
include installing equipment with "factory default" settings, failing
to control or inventory access points, not implementing the security
capabilities provided, and not developing or installing security
architectures that are suitable to the wireless environment. The use
of firewalls between wired and wireless systems should be considered.  
Other good practices are to block unneeded services and ports, and to
use strong cryptography. Often the risks can be addressed, but the
tradeoffs between technical solutions and costs must be considered as
well. Organizations may want to postpone the installation of wireless
networks until more robust, open, and secure products are available.

Organizations should perform security assessments prior to
implementation of wireless technologies to determine the specific
threats and vulnerabilities that wireless networks will introduce in
their environments. In performing the assessment, they should consider
existing security policies, known threats and vulnerabilities,
legislation and regulations, safety, reliability, system performance,
the life-cycle costs of security measures, and technical requirements.
Once the risk assessment is complete, the organization can begin
planning and implementing the measures that it will put in place to
safeguard its systems and lower its security risks to a manageable
level. The organization should periodically reassess the policies and
measures that it puts in place because computer technologies and
malicious threats are continually changing.

Effective risk management should be integrated into the System
Development Life Cycle (SDLC) of an IT system. The SDLC includes five
phases: initiation, development or acquisition, implementation,
operation or maintenance, and disposal. NIST has issued
recommendations for conducting the risk management process in NIST SP
800-30, Risk Management Guide for Information Technology Systems. This
document is available online at
http://csrc.nist.gov/publications/nistpubs/index.html.

Maintain an awareness of the technical and security implications of
wireless and handheld device technologies.

Wireless technologies present unique security challenges due in part
to the relative immaturity of the technology, incomplete security
standards, flawed implementations, limited user awareness, and lax
security and administrative practices. In a wireless environment, data
is broadcast using radio frequencies. As a result, data may be
captured when it is broadcast. The distances needed to prevent
eavesdropping vary considerably because of differences in building
construction, wireless frequencies and attenuation, and the
capabilities of high-gain antennas.  The safe distance can vary up to
kilometers, even when the nominal or claimed operating range of the
wireless device is less than a hundred meters.

Carefully plan for the installation of wireless technologies.

The security of wireless networks and devices should be considered
from the initial planning stage because it is much more difficult to
address security once deployment and implementation have occurred. A
detailed, well-designed plan can point the way to better security
decisions about configuring wireless devices and network
infrastructure.  The plan will support decisions concerning the
tradeoffs between usability, performance, and risk.

Apply security management practices and controls to maintain and
operate secure wireless networks.

Organizations should identify their information system assets, and
develop, document and implement policies, standards, procedures, and
guidelines to ensure confidentiality, integrity, and availability of
information system resources. NIST recommends the following steps:

* The information system security policy should directly 
  address the use of 802.11, Bluetooth, and other wireless 
  technologies.

* Configuration/change control and management practices 
  should ensure that all equipment has the latest software 
  release, including security feature enhancements and 
  patches for discovered vulnerabilities.

* Standardized configurations should be employed to reflect 
  the security policy, and to ensure change of default values 
  and consistency of operations.

* Security training is essential to raise awareness about 
  the threats and vulnerabilities inherent in the use of 
  wireless technologies.

* Robust cryptography is essential to protect data 
  transmitted over the radio channel, and theft of equipment 
  is a major concern.

Physical controls should be implemented to protect wireless systems
and information.

Adequate physical security measures include barriers, access control
systems, and guards.  Physical countermeasures can lessen risks such
as theft of equipment and insertion of rogue access points or wireless
network monitoring devices. The small size, relatively low cost, and
constant mobility of handheld devices make them more likely to be
stolen, misplaced, or lost, and the physical security controls that
protect desktop computers do not offer the same protection for
handheld devices.

Enable, use, and routinely test the inherent security features, such
as authentication and encryption methods that are available in
wireless technologies. Firewalls and other appropriate protection
mechanisms should also be employed.

Wireless technologies generally come with some embedded security
features, although frequently many of the features are disabled by
default. The security features available in wireless networks and
devices may not be as comprehensive or robust as necessary. The
security features provided in some wireless products may be weak;
therefore, robust, well-developed, and properly implemented
cryptography should be used to attain the highest levels of integrity,
authentication, and confidentiality.

The built-in security features of Bluetooth and 802.11 networks can
include data link level encryption and authentication protocols, and
these features should be used as part of an overall defense-in-depth
strategy. Although these protection mechanisms may have weaknesses,
they can provide a degree of protection against unauthorized
disclosure, unauthorized network access, and other active probing
attacks.

The data link level wireless protocol protects only the wireless
sub-network. Where traffic traverses other network segments, including
wired segments or the organization's backbone network, other
end-to-end cryptographic protection may be required. Since there is
still a residual risk when cryptography and other security
countermeasures are used, it may also be necessary to provide
strategically located access points, firewall filtering, and antivirus
software.

Federal agencies must use Federal Information Processing Standard
(FIPS) 140-2, Security Requirements for Cryptographic Modules, when
they have determined that information must be protected by
cryptography. Since the security protections in 802.11 and Bluetooth
networks do not meet the requirements of FIPS 140-2, higher-level
cryptographic protocols and applications should be used.  These
include secure shell (SSH), Transport-Level Security (TLS), or
Internet Protocol Security (IPsec) with FIPS 140-2 validated
cryptographic modules and associated algorithms to protect
information, regardless of whether the non-validated data link
security protocols are used.  Future wireless products are expected to
offer data linked cryptographic services for FIPS 197, Advanced
Encryption Standard. Such products, when validated for conformance
with FIPS 140-2, should be considered for use when they become
available.

NIST supports federal agencies and their use of cryptographic products
through its Cryptographic Module Validation Program (CMVP), which
validates cryptographic modules to FIPS 140-2, Security Requirements
for Cryptographic Modules, and other FIPS cryptography-based
standards. The CMVP is a joint effort between NIST and the
Communications Security Establishment (CSE) of the Government of
Canada. Products validated as conforming to FIPS 140-2 are accepted by
the federal agencies of both countries for the protection of sensitive
information.  Information about the CMVP is available at
http://csrc.nist.gov/cryptval.

  Summary

Organizations and individuals benefit when wireless networks and
devices are protected.  After assessing the risks associated with
wireless technologies, organizations can reduce the risks by applying
countermeasures to address specific threats and vulnerabilities.  
These countermeasures include management, operational, and technical
controls. While these countermeasures will not prevent all
penetrations and adverse events, they can be effective in reducing
many of the common risks associated with wireless technology.

Additional Useful References

In addition to the references cited in this bulletin, organizations
may find the following publications useful in planning, implementing,
and maintaining wireless networks:

NIST SP 800-12, An Introduction to Computer Security: The NIST
Handbook, provides guidance on general security procedures.

NIST SP 800-18, Guide for Developing Security Plans for Information
Technology Systems, provides details on access control issues, and
developing and updating security plans.

NIST SP 800-31, Intrusion Detection Systems (IDS), and NIST Special
Publication 800-41, Guidelines on Firewalls and Firewall Policy,
provide information on selection of security controls.

NIST SP 800-34, Contingency Planning Guide for Information Technology
Systems, gives information on coordinating contingency planning
activities.

Guidance on physical security techniques is included in NIST SP
800-12, An Introduction to Computer Security: The NIST Handbook; NIST
SP 800-27, Engineering Principles for Information Technology Security
(A Baseline for Achieving Security); and NIST SP 800-30, Risk
Management Guide for Information Technology Systems.

Disclaimer
Any mention of commercial products or reference to commercial
organizations is for information only; it does not imply
recommendation or endorsement by NIST nor does it imply that the
products mentioned are necessarily the best available for the purpose.



-
ISN is currently hosted by Attrition.org

To unsubscribe email majordomo () attrition org with 'unsubscribe isn'
in the BODY of the mail.


Current thread: