1 Rethinking Cybersecurity for Distributed Science Deb Agarwal Lawrence Berkeley Laboratory.

Slides:



Advertisements
Similar presentations
Introducing WatchGuard Dimension. Oceans of Log Data The 3 Dimensions of Big Data Volume –“Log Everything - Storage is Cheap” –Becomes too much data –
Advertisements

Current Security Threats WMO CBS ET-CTS Toulouse, France May 2008 Allan Darling, NOAA’s National Weather Service WMO CBS ET-CTS Toulouse, France.
4.1.5 System Management Background What is in System Management Resource control and scheduling Booting, reconfiguration, defining limits for resource.
Chapter 4 McGraw-Hill/Irwin Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved. Ethics and Information Security.
1 Telstra in Confidence Managing Security for our Mobile Technology.
Fundamentals of Computer Security Geetika Sharma Fall 2008.
Software Security Threats Threats have been an issue since computers began to be used widely by the general public.
System and Network Security Practices COEN 351 E-Commerce Security.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Lecture 11 Reliability and Security in IT infrastructure.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Stephen S. Yau CSE , Fall Security Strategies.
Security Guidelines and Management
Lecture 11 Reliability and Security in IT infrastructure.
Security Risk Management Marcus Murray, CISSP, MVP (Security) Senior Security Advisor, Truesec
Website Hardening HUIT IT Security | Sep
The Difficult Road To Cybersecurity Steve Katz, CISSP Security Risk Solutions Steve Katz, CISSP Security.
1Cisco Security NOW © 2003, Cisco Systems, Inc. All rights reserved. THIS IS THE POWER OF CISCO SECURITY. now.
APA of Isfahan University of Technology In the name of God.
Storage Security and Management: Security Framework
Computer Crime and Information Technology Security
1 IS 8950 Managing Network Infrastructure and Operations.
“Assuring Reliable and Secure IT Services”. IT Redundancy: Its Value How much reliability to buy? Customer Service impacted as a result of 15 minutes.
Lecture 10 Intrusion Detection modified from slides of Lawrie Brown.
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
Bots Used to Facilitate Spam Matt Ziemniak. Discuss Snort lab improvements Spam as a vehicle behind cyber threats Bots and botnets What can be done.
Chapter 6 of the Executive Guide manual Technology.
VoIP Security in Service Provider Environment Bogdan Materna Chief Technology Officer Yariba Systems.
Intrusion Detection Prepared by: Mohammed Hussein Supervised by: Dr. Lo’ai Tawalbeh NYIT- winter 2007.
Securing Wired Local Area Networks(LANs)
Unit 6b System Security Procedures and Standards Component 8 Installation and Maintenance of Health IT Systems This material was developed by Duke University,
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
Federated Environments and Incident Response: The Worst of Both Worlds? A TeraGrid Perspective Jim Basney Senior Research Scientist National Center for.
IS Network and Telecommunications Risks Chapter Six.
Ali Pabrai, CISSP, CSCS ecfirst, chairman & ceo Preparing for a HIPAA Security Audit.
Week 10-11c Attacks and Malware III. Remote Control Facility distinguishes a bot from a worm distinguishes a bot from a worm worm propagates itself and.
NA-MIC National Alliance for Medical Image Computing UCSD: Engineering Core 2 Portal and Grid Infrastructure.
Lesson 19-E-Commerce Security Needs. Overview Understand e-commerce services. Understand the importance of availability. Implement client-side security.
1 Security. 2 Linux is not secure No computer system can ever be "completely secure". –make it increasingly difficult for someone to compromise your system.
6/23/2005 R. GARDNER OSG Baseline Services 1 OSG Baseline Services In my talk I’d like to discuss two questions:  What capabilities are we aiming for.
Rob Davidson, Partner Technology Specialist Microsoft Management Servers: Using management to stay secure.
Office of Science U.S. Department of Energy Grid Security at NERSC/LBL Presented by Steve Chan Network, Security and Servers
Lect 8 Tahani al jehain. Types of attack Remote code execution: occurs when an attacker exploits a software and runs a program that the user does not.
Sicherheitsaspekte beim Betrieb von IT-Systemen Christian Leichtfried, BDE Smart Energy IBM Austria December 2011.
Cyber Security Issues in HEP and NP Grids Bob Cowles — SLAC NC August 2004.
Get Full Protection on Microsoft Azure with Symantec™ Endpoint Protection 12.1 MICROSOFT AZURE ISV PROFILE: SYMANTEC Symantec™ Endpoint Protection is an.
 What threat assessments are  What vulnerability assessments are  What exploit assessments are.
Securing Information Systems
Securing Information Systems
Bob Jones EGEE Technical Director
Securing Network Servers
Finding and Supporting Collaboration Needs and Opportunities
ISSeG Integrated Site Security for Grids WP2 - Methodology
Critical Security Controls
Secure Software Confidentiality Integrity Data Security Authentication
Security for Open Science
Security Engineering.
Securing Information Systems
Infrastructure, Data Center & Managed Services
11/17/2018 9:32 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
How to Mitigate the Consequences What are the Countermeasures?
Security.
Federated Environments and Incident Response: The Worst of Both Worlds
Intrusion Detection system
Operating System Concepts
Designing IIS Security (IIS – Internet Information Service)
6. Application Software Security
Fy ‘08 NETWORK PLANNING TASK FORCE
Presentation transcript:

1 Rethinking Cybersecurity for Distributed Science Deb Agarwal Lawrence Berkeley Laboratory

2 OSG Meeting - July 20, 2005 Threats Viruses Worms Malicious software downloads Spyware Stolen credentials Insider Threat Denial of service Root kits Session hijacking Agent hijacking Man-in-the-middle Network spoofing Back doors Exploitation of buffer overflows and other software flaws Phishing Audits / Policy / Compliance ?????

3 OSG Meeting - July 20, 2005 Threats Viruses Worms Malicious software downloads Spyware Stolen credentials Insider Threat Denial of service Root kits Session hijacking Agent hijacking Man-in-the-middle Network spoofing Back doors Exploitation of buffer overflows and other software flaws Phishing Audits / Policy / Compliance ?????

4 OSG Meeting - July 20, 2005 Example - Credential Theft Widespread compromises  Over 20++ sites  Over computers  Unknown # of accounts  Very similar to unresolved compromises from 2003 Common Modus Operandi  Acquire legitimate username/password via keyboard sniffers and/or trojaned clients and servers  Log into system as legitimate user and do reconnaissance  Use “off the shelf” rootkits to acquire root  Install sniffers and compromise services, modify ssh-keys  Leverage data gathered to move to next system The largest compromises in recent memory (in terms of # hosts and sites)

5 OSG Meeting - July 20, 2005 Cybersecurity Trend - Reactive Firewall everything – only allow through vetted applications with strong business need Users never have administrator privileges All software installed by administrators All systems running automated central configuration management and central protection management Background checks for ALL government employees, contractors, and users with physical presence for issuance of HSPD-12 cards (PIV) No access from untrusted networks Conformance and compliance driven It is a war

6 OSG Meeting - July 20, 2005 Distributed Science Reality Collaborations include as many as 1000’s of scientists Collaborators located all over the world Many users never visit the site Virtual organization involved in managing the resources  Include multiple sites and countries  Distributed data storage  Distributed compute resources  Shared resources Do not control the computers users are accessing resources from High performance computing, networking, and data transfers are core capabilities needed Authentication, authorization, accounting, monitoring, logging, resource management, etc built into middleware These new science paradigms rely on robust secure high-performance distributed science infrastructure

7 OSG Meeting - July 20, 2005 Virtual Organization (VO) Includes multiple real organizations/sites and stakeholders Supporting users spread around the globe Needs to be able to coordinate resource utilization Issues  Contain impact of a compromised user and host credentials  Minimize impact of compromise of services  Response to and control of incidents tested in realistic distributed environments  Latency of response to and containment of incidents minimized.  Usable and timely forensic information  Stakeholders (site security, VO administration, etc) need to be able to monitor and control local security and coordinate with the VO

8 OSG Meeting - July 20, 2005 Current Operational Reality Cybersecurity group  Protect border  Protect network  Some host protections  Control access patterns System Administrators  Protect hosts  Authorize users  Define access capabilities Applications and software  Authenticate users  Authorize users  Open ports/connect to servers/transfer data Virtual Organizations  Fine-grained authorization  Policy enforcement

9 OSG Meeting - July 20, 2005 Cybersecurity and Infrastructure to Support Distributed Science Preserve  Access to national user facilities  Participation in international collaborations  Ability to host scientific databases and repositories  Innovation and prototyping capabilities Protect  High performance computers  Experiment systems  Desktop and laptop systems  Ability to do science Need to figure out how to preserve and support open science while protecting the resources from cyber incidents

10 OSG Meeting - July 20, 2005 Robust Science Support Framework Resource Discovery Authentication and Authorization Scheduling Secure Communication Data Transfer Event Services And Monitoring Web Services, Portals, Collaboration Tools, Problem Solving Environments Data CurationCompute Services Application Servers Asynchrony Support Cybersecurity Protections Virtual Organization

11 OSG Meeting - July 20, 2005 Science is on the Front Lines The techniques needed to protect the open science environment today are needed by other environments tomorrow – Past examples  Network intrusion detection  Insider threat  Defense in depth  High performance capabilities A next set of concerns  Reducing credential theft opportunities  Detection of insider attacks  Communication and coordination between components to recognize and react to attacks in real time  Tools which address day zero-1 vulnerabilities  Improved analysis techniques – data mining and semantic level searches  Prevention and detection of session hi-jacking

12 OSG Meeting - July 20, 2005 HEP Cybersecurity Workshop – March 2005 Identified a number of critical areas to be addressed Vulnerabilities to a potential incident  Loss of unique data  Insertion of fraudulent data  Inability to reestablish control of the computing infrastructure after an incident.  Subversion of system software (loss of integrity)  Inability to ingest detector output  Massive coherent failure of the ensemble of resources  Compromise of key infrastructure  Pervasive slow down due to compromise that couldn’t be removed

13 OSG Meeting - July 20, 2005 Enabling Virtual Organizations (HEP Workshop) Real-time Security Logging and Auditing Service Auditing of all necessary components integrated with information service Resource vulnerability scanning coordinated with sites Intrusion Detection Systems / Intrusion Prevention Systems deployment Border Control (site and VO) Cybersecurity mechanisms configuration verification

14 OSG Meeting - July 20, 2005 HEP Proposed Program of Work Risk analysis and best practices Security logging and auditing service Incident response and recovery (coordinated across the VO and sites) Middleware vulnerability testing and analysis Other work  Wide-Area Network Monitoring  Data Integrity  Authentication / Authorization Issues  Authorized Audit Log Write/Read Access  Disposable Execution Environments  Rootkit detection

15 OSG Meeting - July 20, 2005 Proposed Cybersecurity R&D Program Coordination of distributed science software infrastructure with cybersecurity mechanisms  Authentication, authorization, and encryption in the middleware can coordinate with the cybersecurity systems to open temporary ports etc Coordination between cybersecurity components  Significantly improve detection of attacks; particularly insider attacks  Notify broadly of attacks as they are identified  Improve handling of encrypted sessions Improved risk- and mission-based cybersecurity decisions New authentication, credential translation, and proxy mechanisms Data integrity protection/recovery Tools for the high-performance computing environment  Analysis tools which can efficiently ingest and analyze large quantities of data  Semantic level investigation of data  Security tools for high bandwidth reserved paths Improved data collection, forensics, recovery Focus on practical solutions, integrating middleware security, and working with operations personnel during the design, development, and testing

16 OSG Meeting - July 20, 2005 Using OPKeyX in Grid environments OTP authentication server user-workstation secure mutual OTP-authentication and key-exchange short-livedcertificate pw Credential Repository Server

17 OSG Meeting - July 20, 2005 Conclusions Distributed science has become core to the conduct of science Robust, secure, and supported distributed science infrastructure is needed Attackers are getting more malicious and quicker to exploit vulnerabilities Distributed science requires a fresh approach to cybersecurity Need to set the example for protecting distributed infrastructure COTS is a key component of the solution but will not solve many aspects of the problem Need to partner cybersecurity operations, cybersecurity researchers, system administrators, and middleware developers