|
|
When a systems administrator leaves a company's employ (voluntary or
not) there are quite a number of concerns they should have, things to
check up on and changes to make.
Corporate concerns at such a point have to deal with a variety of issues,
such as:
- Admin access to systems
- Destruction of data
- Publicized confidential data
- Web defacement
- Email disruption
- Physical access by terminated employee
- Emailing malicious content to susceptible users
Below is a remediation checklist that may not be nearly exhaustive, but it's
a start!
- DO NOT GIVE THE ADMIN ACCESS TO ANY SYSTEMS after he has been notified
about termination of employment.
- Ask your ISP to queue inbound mail if possible.
- Inform all employees of this termination and require new passwords
beginning immediately.
- Pull the Internet connection on the outside interface of the router.
- Turn off and document any modem connections.
- Turn off and document any wireless access points.
- Change the company domain account password with Network Solutions.
Change admin contact information if necessary.
At this point you have isolated the corporate systems from the individual
physically.
Now the hard work starts.
- Make a forensic backup of the admin's personal PC (ghost, DD) and seal
it.
Even if you don't think you need it, you may find out otherwise later, when
it is too late.
- Change web site access password.
- Rename Domain Admin account and change the password.
- Rename Schema Admin account of Active Directory and change the password.
- Change the AD Restore password if applicable.
- Rename remote domain admin accounts and change their passwords.
- Change firewall passwords.
- Review all firewall configuration attributes and filters against
business requirements and clean up as necessary.
- Upgrade the firewall to current firmware level.
- Change passwords on all routers.
- Check for services or applications using the previous admin's personal
account.
- Disable the previous admin's personal account in the domain.
- Disable previous admin's personal remote access accounts on firewall or
other VPN, RAS server, etc.
- Change phone system, voicemail admin account passwords.
- Change Unix server root password if applicable.
- Change all server program access passwords.
- Change all service account passwords and verify service operation
functioning again.
- Validate all domain accounts (look for hidden backdoor accounts).
- Validate all local accounts on remote access devices.
- Change member server and NT/2000 client machine admin passwords on all
systems.
- Change remote field office machine's admin password.
- Check scheduled tasks on all servers and the admin workstation for "timebomb"
sabotage.
- Scan servers with a Trojan detector.
- Implement current antivirus software with current definitions and scan
all systems.
- Isolate systems where Trojans or viruses are found. Remove the Trojans
with antivirus software.
Check source folder of quarantined file for other related files.
Preserve directory with WinZip for future forensics before deleting it.
Trojaned systems should be formatted and rebuild.
A compromise solution is to install ZoneAlarm on the infected/cleaned system
and run it for 24 hours looking for programs "phoning home". If it is found
to be clear, Zonealarm can be disabled or tuned to allow normal access and
left in place.
- Assign all users a new password. Plan and implement distribution
strategy for new passwords.
- Change network device passwords (wireless, print servers, switches).
-
Patch exposed servers for known exploits (if not already done!).
-
Reconnect Internet, remote access systems, and "secured" wireless access
points.
- Ask ISP to release email or ETRN.
- Change antivirus admin
account/password.
- Collect and catalog backup media.
- Search for any
equipment not reported/accounted for.
- Cancel corporate credit/phone cards
known to termed employee.
- Change volume licensing account passwords.
-
Contact all vendors and inform of employee's termination.
Ask for new account name and password where applicable. - Analyze admin's
hardware and servers for anomalies. Ghost image?
- Analyze switches for
monitoring ports.
- Analyze backup records for evidence of data theft.
-
Scan network for promiscuous cards.
- Patch internal servers for known
exploits.
- Patch client machines for known exploits.
- Monitor and
support user password problems on return to business.
- ...
|
|