INF526: Secure Systems Administration Course Introduction Prof. Clifford Neuman Lecture 1 24 May 2016 OHE100C.

Slides:



Advertisements
Similar presentations
Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE USC CSci599 Trusted Computing Lecture notes.
Advertisements

Security Controls – What Works
Information Security Policies and Standards
Planning and Managing Information Security Randall Sutton, President Elytra Enterprises Inc. April 4, 2006.
Copyright © B. C. Neuman, - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE Fall Security Systems Lecture notes Drs.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Qualitative.
Managing the Information Technology Resource Jerry N. Luftman
ITS Offsite Workshop 2002 PolyU IT Security Policy PolyU IT/Computer Systems Security Policy (SSP) By Ken Chung Senior Computing Officer Information Technology.
Security Engineering II. Problem Sources 1.Requirements definitions, omissions, and mistakes 2.System design flaws 3.Hardware implementation flaws, such.
Contact Center Security Strategies Grant Sainsbury Practice Director, Dimension Data.
Computer Security: Principles and Practice
Stephen S. Yau CSE , Fall Security Strategies.
Chapter 8 Information Systems Controls for System Reliability— Part 1: Information Security Copyright © 2012 Pearson Education, Inc. publishing as Prentice.
Brian Bradley.  Data is any type of stored digital information.  Security is about the protection of assets.  Prevention: measures taken to protect.
Network Security. Trust Relationships (Trust Zones) High trust (internal) = f c (once you gain access); g p Low trust ( ) = more controls; fewer privileges.
Network security policy: best practices
Developing a Security Policy Chapter 2. Learning Objectives Understand why a security policy is an important part of a firewall implementation Determine.
Enterprise Architecture
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
Introduction to Network Defense
Security Risk Management Marcus Murray, CISSP, MVP (Security) Senior Security Advisor, Truesec
Security Guide for Interconnecting Information Technology Systems
SEC835 Database and Web application security Information Security Architecture.
Lesson 8-Information Security Process. Overview Introducing information security process. Conducting an assessment. Developing a policy. Implementing.
1 Deployment of Computer Security in an Organization CE-408 Sir Syed University of Engineering & Technology 99-CE-282, 257 & 260.
Network Security Policy Anna Nash MBA 737. Agenda Overview Goals Components Success Factors Common Barriers Importance Questions.
Information Systems Security Computer System Life Cycle Security.
Security Baseline. Definition A preliminary assessment of a newly implemented system Serves as a starting point to measure changes in configurations and.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
Module 14: Configuring Server Security Compliance
Sample Security Model. Security Model Secure: Identity management & Authentication Filtering and Stateful Inspection Encryption and VPN’s Monitor: Intrusion.
Web Security for Network and System Administrators1 Chapter 2 Security Processes.
Introduction to Computer Administration Course Supervisor: Muhammad Saeed.
KAPLAN SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY Unit 4 IT 484 Networking Security Course Name – IT Networking Security 1203C Term Instructor.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
Security Policies and Procedures. cs490ns-cotter2 Objectives Define the security policy cycle Explain risk identification Design a security policy –Define.
Project co-funded by the European Commission within the 7th Framework Program (Grant Agreement No ) Business Convergence WS#2 Smart Grid Technologies.
Ali Pabrai, CISSP, CSCS ecfirst, chairman & ceo Preparing for a HIPAA Security Audit.
CSE 4481 Computer Security Lab Mark Shtern. INTRODUCTION.
Chapter 2 Securing Network Server and User Workstations.
EECS 4482 Fall 2014 Session 8 Slides. IT Security Standards and Procedures An information security policy is at a corporate, high level and generally.
Introduction to Information Security J. H. Wang Sep. 18, 2012.
IT Security Policy: Case Study March 2008 Copyright , All Rights Reserved.
Rob Davidson, Partner Technology Specialist Microsoft Management Servers: Using management to stay secure.
Security fundamentals Topic 12 Maintaining organisational security.
Chapter 19: Building Systems with Assurance Dr. Wayne Summers Department of Computer Science Columbus State University
State of Georgia Release Management Training
Information Security Framework Regulatory Compliance and Reporting Auditing and Validation Metrics Definition and Collection Reporting (management, regulatory,
IS3220 Information Technology Infrastructure Security
Sicherheitsaspekte beim Betrieb von IT-Systemen Christian Leichtfried, BDE Smart Energy IBM Austria December 2011.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
© ITT Educational Services, Inc. All rights reserved. IS3220 Information Technology Infrastructure Security Unit 10 Network Security Management.
INF526: Secure Systems Administration Composition of Systems And Security Domains Prof. Clifford Neuman Lecture 3 3 June 2016 OHE100C.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 17 – IT Security.
CET4884 Dr. Nabeel Yousef.  Dr. Nabeel Yousef  Located at the ATC campus room 107Q  Phone number 
INF526: Secure Systems Administration Team Status Exercise 1 Prof. Clifford Neuman Lecture 5 17 June 2016 OHE100C.
INF526: Secure Systems Administration Policy Driven Administration Principles of Protection Generation of Security Requirements Prof. Clifford Neuman Lecture.
INF526: Secure Systems Administration Student Presentations And Review for Final Prof. Clifford Neuman Lecture July 2016 OHE100C.
Information Security, Theory and Practice.
Cybersecurity - What’s Next? June 2017
Critical Security Controls
Cyber Security Enterprise Risk Management: Key to an Organization’s Resilience Richard A. Spires CEO, Learning Tree International Former CIO, IRS and.
INF526: Secure Systems Administration
Chapter 19: Building Systems with Assurance
IS4680 Security Auditing for Compliance
Cybersecurity Special Public Meeting/Commission Workshop for Natural Gas Utilities September 27, 2018.
How to Mitigate the Consequences What are the Countermeasures?
Cybersecurity Threat Assessment
PLANNING A SECURE BASELINE INSTALLATION
Presentation transcript:

INF526: Secure Systems Administration Course Introduction Prof. Clifford Neuman Lecture 1 24 May 2016 OHE100C

Course Identification INF 526 –Secure Systems Administration –3.0 units (Next time offered it will be 4 units) Class meeting schedule –9AM to 12:10PM Friday’s –Room OHE 100C Class communication –Goes to instructor and TA and is archived. 1

General Course Information Professor office hours –Friday 1:30PM to 2:30 PM PHE 514 –Other times by appointment Primary office in MDR at Information Sciences Institute – and TA for the class –Yatin Wadhawan –Office hours TBD 2

Guidelines for Students Class will be primarily group projects Student deliverables –Homework assignments 20% –Group exercises 20% on group performance –Group exercises 20% on individual writeup –Midterm exam 20% –Final exam 20% Read the assigned readings before class! –Responsible for content of assigned reading 3

Guidelines for Students Academic integrity is taken very seriously –Libraries are a resource for USC academic standards – academic_integrity/index.phphttp:// academic_integrity/index.php 4

Grading Schema Final: 20% Mid-Term: 20% Performance of Group on Project: 10% Individual Submission Project Reports: 15% Hour presentation (PPT) on assigned topic: 15% Homework Assignments: 20% __________________ Total100% 5

Letter Grade Assignment 6 A letter grade will be assigned for each assignment, project, or exam. The individual assignment scores are based on overall class performance. Course grade is determined by weighted calculation from the component grades.

Group Projects Three Administration case studies drawn from: –Banks –Retailer –Government –Cloud –Critical Infrastructure –Criminal Enterprise Rotating Groups –VG0, RR1, MU2, SA3, JE4, AL5, JM6, SS7 –Low order bit is group (0 or 1) on first project –Mid order but is group (0 or 1) on second project –High order bit is group (0 or 1) on third project. 7

Individual Project On topic from course syllabus –1 HR PPT presentation –If remote and connection issues, I can present, but better if you can present remotely. –Will select topics from among: Adversarial Security Plan Response Plans Red teaming and penetration testing tools Linux security administration Network Security Components Network Security administration Configuration Management Network Attack Administration (SIEM) Network Monitoring and Attack Forensics Accreditation and acceptance testing 8

Questions on Course Structure 9

Initial Homework Assignment (due before 6/3 class) Submit as to System Structure for Banking Case Study Consider the description of the banking system to be used for the first exercise – as discussed in class on 5/24. –Enumerate the classes of data –Enumerate the classes of users –Identify the protection domains –Enumerate the systems (hardware) –Enumerate the systems (software components) This write-up is expected to be about 3 pages in length (could be more or less) –It will be shared later with your group members to begin discussion for the group architecture. 10

Initial Reading Assignment (due before 5/27 class) (ANON) Anonymous. (2002). Maximum Linux Security: A Hackers Guide to Protecting Your Linux Server and Workstation. SAMS Publishing. –Chapters 1, 2, 3, 4 11

Course Outline Introduction to Secure System Administration Generation of Security Requirements Composition of systems and protection domains Adversarial Security Plan Red teaming and penetration testing tools Response Plans Linux security administration Network Security Components Network Security administration Configuration Management Network Attack Administration (SIEM) Network Monitoring and Attack Forensics Accreditation and acceptance testing 12

Introduction to Secure Systems Administration Secure –Ability to correctly implement relevant policy System –A computer? –A network? –The combination of all system components implanting a particular function Administration –Selection of components (purchases of products) –Architecture – how the pieces fit together –Installation and configuration –Security Testing –Operation –Monitoring –Repair and Maintenance –Threat response 13

Application Architecture What are the functional requirements of the system. –This guides equipment needs Processing, Storage, and Network. –What are the functional goals of the system. This defines the meaning of availability –What constitutes a breach of availability – the system no longer meets its functional goals. –Critical Infrastructure –Critical for you Consequences of failure 16

Information Flow and Containment Understand your applications Information Flow: –What is to be protected –Against which threats –Who needs to access which apps –From where must they access it Do all this before you invest in the latest products that salespeople will say will solve your problems. 16

What is to be protected Is it the service or the data? –Data is protected by making it less available –Services are protected by making them more available (redundancy) –The hardest cases are when one needs both. 16

Classes of Data Decide on multiple data classes –Public data –Customer data –Corporate data –Highly sensitive data (not total ordering) These will appear in different parts of the network 16

Classes of Users Decide on classes of users –Based on the access needed to the different classes of data. You will architect your system and network to enforce policies at the boundaries of these classes. –You will place data to make the mapping as clean as possible. You will manage the flow of data 16

Component Selection What systems do you need –System or VM for different classes of protection domains. Network Components –To interconnect –To Segregate You will manage the flow of data 16

Conduct an Inventory – of physical assets –What Kinds of systems do you have E.g. POS terminals, SCADA, servers, network hardware –Understand the access to each system Employees, customers, etc –How are the different classes of systems protected from one another Network zones, etc –How do you contain breaches to particular zones. –What happens to your business if any of these are compromised or shut down. An NSA Center for Academic Excellence - Research 20 Inventory

Identity Management Interrelation of identity with policy –Selection of authentication technology –Enrollment issues –Balancing cost with security What is needed for strong audit capability –Not just intrusion detection –Regulatory and recovery/remediation 16

Configuration Management Catalog of systems –What is approved for connection Catalog of software –What is approved for use –Patch management Configuration checkers Change detectors –E.g. tripwire, AFIK 16

Adversarial Security Plan Enumerate goals of attacker –Consider likelihood of targets Enumerate consequences of various attacks –Consider cost to organization of effective attack Prioritize deployed resources to defend systems Develop attack defense trees Consider mitigations Design red teams System red teams Penetration testing 23

Response depends on many factors, but most importantly: – Your containment architecture - How the system has been set up according to the information discussed earlier But also on your preparation –Emergency Response Plan –Emergency Response Team –How the system has been set up - Backups, Data Collection for Forensics, Baselines Response Handling the Inevitable Breach

Collect Baseline On all Assets Software and system checksums –Used to detect changes to the system –To identify which assets are affected –To enable recovery – reinstall those affected systems Baseline data communication from all assets –In your network infrastructure, use this to identify anomalous flows –As they happen to block exfiltration –From Logs to identify where data went and how much, and over what time periods An NSA Center for Academic Excellence - Research 25

After a breach: Containment –You will need to shut down or take offline those systems affected by the breach (those you can no longer trust) to prevent further loss of data. –Collect forensic data to assist in assessing impact, to identify attackers, and for prosection. –Stronger containment (from preparation phase) means fewer critical services that you need to take offline. An NSA Center for Academic Excellence - Research 26

After a breach: analysis –Check for changes to your systems and data. –Use forensic data collected using technologies in place from your planning phase to identify sources of the attack, and the techniques used. –Use this information to determine which customers data and which systems were affected. –Use this information to fix the vulnerabilities in your existing systems. –Subject to legal requirements, share this information as appropriate with the authorities and the security community. An NSA Center for Academic Excellence - Research 27

After a breach: recovery –Systems/data must be restored to a trusted state. Using backups Legitimate updates to data may need to be reapplied –Vulnerably used in the attack must be patched before systems are brought back online. –You need a plan for operating your business for some period without the impacted systems. Part of your planning phase An NSA Center for Academic Excellence - Research 28

System Administration What must be administered: –User accounts – Least Privilege –Software –Servers –Storage –Network (next slide) –Keys –Monitoring Core principles –Minimization 29

Network Administration Creation of network protection domains –Firewalls –VLANs –VPNs for access –Ipsec –Wireless Management Network Monitoring Network Admission Control 30

SIEM Monitoring Forsenscs Network Attack Administration (SIEM) Network Monitoring and Attack Forensics Accreditation and acceptance testing 31

Accreditation and acceptance Determining when it is OK to bring your system live Certification for government agencies Periodic audits Certification for customers or upstream parties –E.g. PCI Compliance 32