Tune IT Up Campaign Overview Mark Kaletka Computing Division 9/29/2009 Mark Kaletka Computing Division 9/29/2009.

Slides:



Advertisements
Similar presentations
USG INFORMATION SECURITY PROGRAM AUDIT: ACHIEVING SUCCESSFUL AUDIT OUTCOMES Cara King Senior IT Auditor, OIAC.
Advertisements

IT Security Law for Federal Agencies As of: 30 December 2002.
FIPS 201 Personal Identity Verification For Federal Employees and Contractors National Institute of Standards and Technology Information Technology Laboratory.
U.S. General Services Administration Presentation to: ACT-IAC Cybersecurity SIG Improving Cybersecurity through Acquisition Emile Monette Senior Advisor.
The Office of Information Technology Information Security Administrator Kenneth Pierce, Vice Provost for IT and Chief Information Officer.
Guide to Massachusetts Data Privacy Laws & Steps you can take towards Compliance.
© 2005, QEI Inc. all characteristics subject to change. For clarity purposes, some displays may be simulated. Any trademarks mentioned remain the exclusive.
Smart Grid - Cyber Security Small Rural Electric George Gamble Black & Veatch
Summer IAVA1 NATIONAL INFORMATION ASSURANCE TRAINING STANDARD FOR SYSTEM ADMINISTRATORS (SA) Minimum.
Policy Formulation, the Real Scoop Computer Security Awareness Day Mark Leininger September 11, 2007.
Information Security Policies Larry Conrad September 29, 2009.
Security Controls – What Works
NLRB: Information Security & FISMA Daniel Wood, Chief IT Security February 19, 2004.
Information Security Policies and Standards
Tune IT Up Campaign Overview Mark Kaletka Computing Division 9/29/2009 Mark Kaletka Computing Division 9/29/2009.
IT PLANNING Enterprise Architecture (EA) & Updates to the Plan.
August 9, 2005 UCCSC IT Security at the University of California A New Initiative Jacqueline Craig. Director of Policy Information Resources and.
Cybersecurity Summit 2004 Andrea Norris Deputy Chief Information Officer/ Director of Division of Information Systems.
Stephen S. Yau CSE , Fall Security Strategies.
Network security policy: best practices
Complying With The Federal Information Security Act (FISMA)
Information Security Compliance System Owner Training Richard Gadsden Information Security Office Office of the CIO – Information Services Sharon Knowles.
DEFENSE PRIVACY & CIVIL LIBERTIES OFFICE Privacy Foundations Samuel P. Jenkins Director for Privacy Defense Privacy and Civil Liberties Office Identity.
CUI Statistical: Collaborative Efforts of Federal Statistical Agencies Eve Powell-Griner National Center for Health Statistics.
SEC835 Database and Web application security Information Security Architecture.
1 Preparing a System Security Plan. 2 Overview Define a Security Plan Pitfalls to avoid Required Documents Contents of the SSP The profile Certification.
FY2010 PEMP Notable Outcomes October 15, FRA, LLC Board of Directors 10/15-16/2009 Office of Quality and Best Practices Performance Evaluation Management.
Security Baseline. Definition A preliminary assessment of a newly implemented system Serves as a starting point to measure changes in configurations and.
Asset & Security Management Chapter 9. IT Asset Management (ITAM) Is the process of tracking information about technology assets through the entire asset.
Federal Cyber Policy and Assurance Issues Dwayne Ramsey Computer Protection Program Manager Berkeley Lab Cyber Security Summit September 27, 2004.
Ames Laboratory Privacy and Personally Identifiable Information (PII) Training Welcome to the Ames Laboratory’s training on Personally Identifiable Information.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 1 Integrated Enterprise-wide Risk Management Protecting Critical Information Assets and Records FIRM Forum.
Auditing Information Systems (AIS)
Disaster Recover Planning & Federal Information Systems Management Act Requirements December 2007 Central Maryland ISACA Chapter.
1 © Material United States Department of the Interior Federal Information Security Management Act (FISMA) April 2008 Larry Ruffin & Joe Seger.
September 12, 2004 Simplifying the Administration of HIPAA Security Angel Hoffman, RN, MSN Director, Corporate Compliance University of Pittsburgh Medical.
Ali Pabrai, CISSP, CSCS ecfirst, chairman & ceo Preparing for a HIPAA Security Audit.
Federal Information Security Management Act (FISMA) By K. Brenner OCIO Internship Summer 2013.
Data Governance 101. Agenda  Purpose  Presentation (Elijah J. Bell) Data Governance Data Policy Security Privacy Contracts  FERPA—The Law  Q & A.
IT Security Policy: Case Study March 2008 Copyright , All Rights Reserved.
Effectively Integrating Information Technology (IT) Security into the Acquisition Process A course for the Department of Commerce contracting and contracting.
Information Security Standards 2015 Update IIPS Security Standards Committee Roderick Brower - Chair.
Information Security In the Corporate World. About Me Graduated from Utica College with a degree in Economic Crime Investigation (ECI) in Spring 2005.
FISMA 101.
Information Security Measures Confidentiality IntegrityAccessibility Information cannot be available or disclosed to unauthorized persons, entities or.
The NIST Special Publications for Security Management By: Waylon Coulter.
HHS Security and Improvement Recommendations Insert Name CSIA 412 Final Project Final Project.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
INFORMATION ASSURANCE POLICY. Information Assurance Information operations that protect and defend information and information systems by ensuring their.
IT Governance Purpose: Information technology is a catalyst for productivity, creativity and community that enhances learning opportunities in an environment.
Security Methods and Practice Principles of Information Security, Fourth Edition CET4884 Planning for Security Ch5 Part I.
NIST SP800 53R4 WMISACA Conferance April 2016 By Dean E Brown CISSP, ISSMP, CSSLP, MCSD Owner – ITSecurityAxioms.com 262 Barrington Cir Lansing, MI
DOE S&S Audit and Tune IT Up Campaign Mark Leininger August 26, 2009.
Information Security Standards 2016 Update IIPS Security Standards Committee Roderick Brower - Chair.
 December 2010 US Chief Information Officer Vivek Kundra released the Federal Cloud Computing Strategy. This became to be what is known as “Cloud First”
SUNY Maritime Internal Control Program. New York State Internal Control Act of 1987 Establish and maintain guidelines for a system of internal controls.
Safeguarding CDI - compliance with DFARS
BruinTech Vendor Meet & Greet December 3, 2015
Cybersecurity - What’s Next? June 2017
Information Security for Executives v1.0
Introduction to the Federal Defense Acquisition Regulation
Matthew Christian Dave Maddox Tim Toennies
IT Development Initiative: Status and Next Steps
NERC Critical Infrastructure Protection Advisory Group (CIP AG)
EDUCAUSE Security Professionals Conference 2018 Jason Pufahl, CISO
IT Development Initiative: Status & Next Steps
CMGT/431 INFORMATION SYSTEMS SECURITY The Latest Version // uopcourse.com
CMGT 431 CMGT431 cmgt 431 cmgt431 Entire Course // uopstudy.com
Presentation transcript:

Tune IT Up Campaign Overview Mark Kaletka Computing Division 9/29/2009 Mark Kaletka Computing Division 9/29/2009

A “Few” of the Lab’s IT Directives & Regulations One of the items specified in that contract is the list of regulations that Fermilab must comply with, and a process for updating that list managed through our DOE site office; One of the items specified in that contract is the list of regulations that Fermilab must comply with, and a process for updating that list managed through our DOE site office; – Applicable Standards and Guidance – Legislation – Office of Management and Budget (OMB) Memorandum Guidance for Implementing the Privacy Provisions of the E-Government Act of 2002 September 26, – Office of Management and Budget (OMB) Memorandum Instructions For Complying With The President's Memorandum Of May 14, 1998, "Privacy and Personal Information in Federal Records, January 7, – Public Law (44 U.S.C. Ch 36) E-Government Act of 2002, Title III— Information Security, also known as the Federal Information Security Management Act (FISMA) of – Office of Management and Budget (OMB) Circular No. A-130, Management of Federal Information Resources, Appendix III, Security of Federal Automated Information Resources, February 8, – Public Law, Information Technology Management Reform Act of 1996 (Clinger-Cohen Act) – NIST Guidance – Federal Information Processing Standards (FIPS) – FIPS 200, Minimum Security Requirements for Federal Information and Information Systems, July – FIPS 199, Standards for Security Categorization of Federal Information and Information Systems, February – Special Publications – SP , The NIST Security Configuration Checklists Program,May – SP , Integrating Security into the Capital Planning and Investment Control Process, January – SP , Security Considerations in the Information System Development Life Cycle, October 2003 (publication original release date) (revision 1 released June 2004). – SP , Guide for Mapping Types of Information and Information Systems to Security Categories, June – SP , Recommended Security Controls for Federal Information Systems, February – SP , Wireless Network Security: , Bluetooth, and Handheld Devices, November – SP , Guide for the Security Certification and Accreditation of Federal Information Systems, May – SP , Contingency Planning Guide for Information Technology Systems, June – SP , Risk Management Guide for Information Technology Systems, July – SP , Rev. 1 NIST DRAFT Special Publication , Revision 1: Guide for Information Security Program Assessments and System Reporting Form. – SP , Rev. 1 Guide for Developing Security Plans for Federal Information Systems February – DOE Policy and Guidance – Revitalization of the Department of Energy Cyber Security Program (1/2006) – Department of Energy Cyber Security Management Program Order 205.1, (Draft) – Department of Energy Cyber Security Management Program, (3/21/2003) – Notice Incident Prevention Warning and Response Manual – Notice Foreign National Access to DOE Cyber Systems (extended to 9/30/06) – Notice Password Generation, Protection and Use, (extended to 9/30/06) – Notice Handling Cyber Alerts and Advisories, and Reporting Cyber Security Incidents (extended to 07/06/05) – Notice Cyber Security Requirements for Wireless Devices and Information Systems, (3/18/06) – Notice Certification and Accreditation Process for Information Systems, including National Security Systems, (3/18/06) – Notice Cyber Security Requirements for Risk Management, (3/18/06) – Notice Security Requirements for Remote Access to DOE and Applicable Contractor Information Technology Systems (3/1/8/06) – Notice Clearing, Sanitizing, and Destroying Information System Storage Media, Memory Devices, and Other Related Hardware (2/19/2004) – Notice Extension of DOE Directive on Cyber Security, (7/6/2004)

Audit not Quite “Fail” Safeguards and Security Audit of Computer Security Program in May 2009 resulted in 6 findings; Safeguards and Security Audit of Computer Security Program in May 2009 resulted in 6 findings; – For us this is like going from A+ to C-.

Audit Findings = Consequences… Findings have serious consequences for the Lab; Findings have serious consequences for the Lab; There is a contract between FRA and DOE to manage Fermilab; There is a contract between FRA and DOE to manage Fermilab; Consequences of failing to meet terms of contract can be both tangible (financial, resources, rebid our contract) and intangible (credibility of lab to conduct scientific program); Consequences of failing to meet terms of contract can be both tangible (financial, resources, rebid our contract) and intangible (credibility of lab to conduct scientific program); – Just like safety, quality assurance; Auditors will keep coming back, we need to work together Lab-wide to improve; Auditors will keep coming back, we need to work together Lab-wide to improve; We want to fix the underlying causes that led to audit findings; We want to fix the underlying causes that led to audit findings; – Not just address isolated consequences;

Launch!Launch! Lab Director (Pier) instructed CIO (Vicky White) to lead a lab wide response; Lab Director (Pier) instructed CIO (Vicky White) to lead a lab wide response; CIO placed me (Mark Kaletka) in charge of leading the lab wide response; CIO placed me (Mark Kaletka) in charge of leading the lab wide response; Progress is being monitored by DOE Site office; Progress is being monitored by DOE Site office; The response is the Tune IT Up Campaign; The response is the Tune IT Up Campaign;Tune IT Up CampaignTune IT Up Campaign

Message from the Director I have directed Vicky White, Fermilab’s chief information officer, to take whatever steps are necessary to address the findings in this audit and to bring Fermilab cybersecurity up to the same standard of excellence we require for every other area of laboratory operations. With my full support, she will lead a campaign, “Tune IT Up,” that will involve every Fermilab employee and user in making changes to the way we manage computers. We will need to move quickly. Just like safety, cybersecurity is the responsibility of every person at the laboratory. Line managers are responsible for understanding and enforcing policies on computer security. System administrators must follow the requirements for configuration of the machines under their control. Each user is responsible for understanding and following the Fermilab Policy on Computing. Employees with higher levels of responsibility, for example those handling privacy information, must exercise a higher level of care handling the information under their control. I have directed Vicky White, Fermilab’s chief information officer, to take whatever steps are necessary to address the findings in this audit and to bring Fermilab cybersecurity up to the same standard of excellence we require for every other area of laboratory operations. With my full support, she will lead a campaign, “Tune IT Up,” that will involve every Fermilab employee and user in making changes to the way we manage computers. We will need to move quickly. Just like safety, cybersecurity is the responsibility of every person at the laboratory. Line managers are responsible for understanding and enforcing policies on computer security. System administrators must follow the requirements for configuration of the machines under their control. Each user is responsible for understanding and following the Fermilab Policy on Computing. Employees with higher levels of responsibility, for example those handling privacy information, must exercise a higher level of care handling the information under their control.Fermilab Policy on ComputingFermilab Policy on Computing

Message from the CIO It’s time for a tune-up! Today we launch a campaign to tune up our Information Technology (IT) to fully comply with our published security baselines and policies. We do this not only to comply with the audit requirements but to strengthen computing at Fermilab to support our physics mission. In the coming months every desktop and laptop owned by Fermilab will receive either a physical or virtual visit from a trained system administrator who will check it for full compliance with required baseline configurations. Those who do not need administrative privileges to carry out their job functions will no longer have such privileges. Those who do will maintain administrative privileges and will be retrained in how to ensure that their systems meet requirements. We will incorporate every machine into the automated inventory and patching systems provided for Windows, Linux and Mac systems. We will remove from the network desktops and laptops that are not running an approved OS with a published security baseline. We will take out of service desktops and laptops that are too old to be updated or are running systems that cannot be brought up to standards; or we will fully document the need to run them and put in place compensatory controls (such as isolating them in their own network segment). It’s time for a tune-up! Today we launch a campaign to tune up our Information Technology (IT) to fully comply with our published security baselines and policies. We do this not only to comply with the audit requirements but to strengthen computing at Fermilab to support our physics mission. In the coming months every desktop and laptop owned by Fermilab will receive either a physical or virtual visit from a trained system administrator who will check it for full compliance with required baseline configurations. Those who do not need administrative privileges to carry out their job functions will no longer have such privileges. Those who do will maintain administrative privileges and will be retrained in how to ensure that their systems meet requirements. We will incorporate every machine into the automated inventory and patching systems provided for Windows, Linux and Mac systems. We will remove from the network desktops and laptops that are not running an approved OS with a published security baseline. We will take out of service desktops and laptops that are too old to be updated or are running systems that cannot be brought up to standards; or we will fully document the need to run them and put in place compensatory controls (such as isolating them in their own network segment).

Campaign Goals Review and update all security baselines and policies (including password and authentication policies). Review and update all security baselines and policies (including password and authentication policies). Ensure that all computers at Fermilab conform to security baselines and security plans and that all applications are patched. Ensure that all computers at Fermilab conform to security baselines and security plans and that all applications are patched. Improve efficiency and consistency of management of desktop and laptops and move towards standards and central management of all systems with least user privilege granted. Improve efficiency and consistency of management of desktop and laptops and move towards standards and central management of all systems with least user privilege granted. Ensure all systems deviating from baselines are assessed and approved (or have corrective action plans) – or are detected and responded to. Ensure all systems deviating from baselines are assessed and approved (or have corrective action plans) – or are detected and responded to.

Campaign Goals Ensure that all sensitive data and PII are in systems protected with moderate level controls detailed in “major application” security plans, that those people who have access to such data are approved, and that all lab contracts related to such data are reviewed. Ensure that all sensitive data and PII are in systems protected with moderate level controls detailed in “major application” security plans, that those people who have access to such data are approved, and that all lab contracts related to such data are reviewed. Tune up and increase training and education on cyber secure behaviors and how to recognize and protect sensitive data and PII. Tune up and increase training and education on cyber secure behaviors and how to recognize and protect sensitive data and PII. Tune up and make more rigorous our internal assessments and ST&E of our cyber security program. Tune up and make more rigorous our internal assessments and ST&E of our cyber security program.

Strategies to Achieve the Goals Consolidate the management of IT under a CIO in order to procure, operate, dispose of and protect IT assets in a more standard, cost effective and secure manner. Consolidate the management of IT under a CIO in order to procure, operate, dispose of and protect IT assets in a more standard, cost effective and secure manner. Enhance the computer security program (which provides the guidelines for operating IT in a secure manner, based on program requirements and assessment/acceptance of a certain level of risk) to increase audit, oversight and training capabilities. Enhance the computer security program (which provides the guidelines for operating IT in a secure manner, based on program requirements and assessment/acceptance of a certain level of risk) to increase audit, oversight and training capabilities. Create additional IT policies and begin to lay out an enterprise architecture – in order to set requirements and guidance for selecting, procuring and operating IT assets (including software assets) Create additional IT policies and begin to lay out an enterprise architecture – in order to set requirements and guidance for selecting, procuring and operating IT assets (including software assets)

TimelineTimeline The campaign is expected to last approximately six months with an intense period of activity in the period mid July to mid October, 2009 followed by an ongoing program of work for the remainder of 2009 to ensure that the goals of the campaign are met and that the IT management practices put into place are sustainable. The campaign is expected to last approximately six months with an intense period of activity in the period mid July to mid October, 2009 followed by an ongoing program of work for the remainder of 2009 to ensure that the goals of the campaign are met and that the IT management practices put into place are sustainable. At that time attention will turn to beginning execution of Information Systems projects that are not part of this campaign but are part of the corrective action plan for the audit findings. At that time attention will turn to beginning execution of Information Systems projects that are not part of this campaign but are part of the corrective action plan for the audit findings.

DeliverablesDeliverables Services Management Services Management Password Policy Password Policy Baseline Security Baseline Security Information Security Information Security Antivirus Alerts Antivirus Alerts

Color Key Completed Completed In Progress In Progress Yet to Start Yet to Start

Services Management Form a policy committee to write and maintain configuration requirements for Mac and Linux desktops. Form a policy committee to write and maintain configuration requirements for Mac and Linux desktops. Enforce configuration requirements for all desktop machines. Enforce configuration requirements for all desktop machines. Require supervisors to approve employee requests to run non-standard services, such as Web services. Require supervisors to approve employee requests to run non-standard services, such as Web services.

Password Policy Enforce DOE password complexity requirements in the Windows domain. Enforce DOE password complexity requirements in the Windows domain. Stop adding new IMAP accounts and begin setting up all new accounts on the Exchange server. Stop adding new IMAP accounts and begin setting up all new accounts on the Exchange server. Enforce a 10-character minimum for passwords on the IMAP server. Enforce a 10-character minimum for passwords on the IMAP server. Enforce password complexity guidelines for local Windows accounts. Enforce password complexity guidelines for local Windows accounts. Migrate laboratory employees’ accounts from IMAP to Exchange server. Migrate laboratory employees’ accounts from IMAP to Exchange server.

Baseline Security Disable remote access to local accounts with administrative privileges. Disable remote access to local accounts with administrative privileges. Require supervisors to approve employee requests for local administrative privileges. Require supervisors to approve employee requests for local administrative privileges.

Information Security Review roles and responsibilities associated with system identified in review as needing improvement. Review roles and responsibilities associated with system identified in review as needing improvement. Review architecture and configuration of system identified in review as needing improvement. Review architecture and configuration of system identified in review as needing improvement. Implement architectural review recommendations. Implement architectural review recommendations. Reduce usage of personally identifiable information. Reduce usage of personally identifiable information. Hold basic and advanced trainings for handling personally identifiable information. Hold basic and advanced trainings for handling personally identifiable information.

Antivirus Alerts Automate response procedure for antivirus alerts. Automate response procedure for antivirus alerts. Create new policy for response procedure for antivirus alerts. Create new policy for response procedure for antivirus alerts. Centralize management of system administrators. Centralize management of system administrators.

Baseline Assessment As part of the lab-wide Tune IT Up campaign, every employee and visitor at the lab who uses a laptop, desktop or smart phone to connect to the Fermilab network for daily work must fill out an assessment form. As part of the lab-wide Tune IT Up campaign, every employee and visitor at the lab who uses a laptop, desktop or smart phone to connect to the Fermilab network for daily work must fill out an assessment form. The laboratory is taking this inventory to gather up-to-date information about the laptops, desktops and smart phones used to connect to the Fermilab network. Using this information will allow the laboratory to better support and protect computers and to ensure that systems are appropriately configured. The vulnerability of even one computer can cause a disruption across the entire laboratory. The laboratory is taking this inventory to gather up-to-date information about the laptops, desktops and smart phones used to connect to the Fermilab network. Using this information will allow the laboratory to better support and protect computers and to ensure that systems are appropriately configured. The vulnerability of even one computer can cause a disruption across the entire laboratory. To date, 1276 users (58% of the Lab’s employees) have completed surveys for 2043 computers; To date, 1276 users (58% of the Lab’s employees) have completed surveys for 2043 computers;