Citrix Blogs

Citrix TIPs: Top 10 recommendations to improve your security posture

The Citrix Consulting Security Practice team conducts assessments to help our customers improve the security of their existing Citrix solutions and to identify other technologies or configurations that could further strengthen their security posture. In the course of performing these assessments, we’ve encountered a number of recurring themes that affect many organizations, regardless of their industry sector, geography, and organizational structure.

In part 1 of this blog series, we listed the top 10 findings from these security assessments and explained why addressing them is so important. Now, in part 2, we offer you practical recommendations for each of the 10 areas based on our extensive field experience and leading Citrix practices. Our goal is to help you get started on the work of improving your security.

Disclaimer: This article is intended to provide general guidance on common themes observed during the course of these engagements. It is not intended to be an exhaustive or comprehensive hardening guide and all recommendations should be carefully reviewed with your internal security, risk and compliance teams to review alignment with your organization’s Policy. Some of these configurations may also have an impact on user experience, administrative complexity, etc. All proposed remediations should first be carefully tested and validated in a non-production capacity before being implemented into a production environment.

Following are checklists of actions you can take to address each security area.

  1. Reduce the Attack Surface

Here are common practices to help reduce the attack surface in a Citrix environment:

  1. Embrace Segmentation

Automation has made segmentation easier, and the advantages that can be achieved through segregation of applications and data of different trust levels has become a great capability and limits exposure.

  1. Apply the Principle of Least Privilege

Does your organization follow the procedures below to help reduce the risk of excessive permissions and privilege?

If you are due for a cleanup, there are a few places to start that can deliver the highest value. Ask these questions:

  1. Tune Citrix Policies

Be sure to review your Citrix policy settings, particularly those under ICA/File Redirection, to validate that they are configured in alignment with your intended security posture. The additional settings below should also be reviewed and restricted where appropriate:

  1. Protect User Credentials

Mitigation of pass-the-hash attacks is often best approached at several levels. Some of the primary considerations to review include:

  1. Ensure Availability

When reviewing environment availability/business continuity, confirm the following:

  1. Encrypt All Sensitive Traffic Flows

All traffic flows should be adequately encrypted to protect secrets and to prevent eavesdropping or modification of traffic flows.

  1. Prevent Session Breakouts

Preventing the array of possible session breakouts can be difficult to achieve, but some common controls can be implemented to reduce exposure:

  1. Revisit External Access

External access connects your company to a less-trusted network, the Internet. As such, we must be consistently diligent and think carefully about these questions,

  1. Mature Operations and Maintenance

Common operational gaps we’ve observed include the following. These are a good starting point when determining if your operational procedures can further facilitate an improved security posture:

While the above lists of configurations and procedures to fully harden a Citrix environment aren’t exhaustive, we hope they at least provide a starting place. They cover some of the high-value adjustments you can make quickly to improve the security posture of your environment.

These efforts shouldn’t be viewed as a one-time exercise, as many of these tasks are ongoing or need to be audited over time to be successful. We also advise that you review the Security Considerations and Best Practices documentation for some additional detail and considerations, as well as the Common Criteria guides, System Hardening for XenApp and XenDesktop whitepaper, and Securing the Published Browser whitepaper.

— Eric Beiers, Lead Security Architect, and Ryan McClure, Sr. Enterprise Architect

Exit mobile version