Market Engagement – security update

Slides:



Advertisements
Similar presentations
World Class Standards Smart Grids ETSI Strategic Topic Philippe Lucas © ETSI All rights reserved ETSI Smart Grid workshop, June 14th 2010.
Advertisements

RiT PatchView Solution
Data Security in Local Networks using Distributed Firewalls
© 2014 Level 3 Communications, LLC. All Rights Reserved. Proprietary and Confidential. Polycom event Security Briefing 12/03/14 Level 3 Managed Security.
IT-security in the Ubiquitous Computing World Chris Kuo, CISSP, CISA Acer eDC (e-Enabling Data Center) Acer Inc. 2007/3/27.
Security Services Agenda Overview of HEAnet security services HEAnet CERT (Computer Emergency Response) Anti-Spam RBL (Real time blacklist service) HEAnet.
The Charlbury Group. About Us Based in Kidlington, Oxfordshire Independent, specialising in providing IT solutions in the housing and financial sector.
Web Application Firewall (WAF) RSA ® Conference 2013.
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
Alert Logic Provides a Fully Managed Security and Compliance Solution Based in the Cloud, Powered by the Robust Microsoft Azure Platform MICROSOFT AZURE.
Chapter 4: Implementing Firewall Technologies
Operated by Los Alamos National Security, LLC for NNSA U N C L A S S I F I E D Slide 1 Managing Network Threat Information  Giri Raichur, Network Services.
Blue Coat Cloud Continuum
Great Sales Presentation
Copyright © 2006, Oracle. All rights reserved Oracle Web Services Manager.
Barracuda NG Firewall ™
IoT Security Part 2, The Malware
Managing Windows Security
CompTIA Security+ Study Guide (SY0-401)
Mitä sovelluksia verkossasi liikkuu? Ja miten sovellukset toimivat?
Barracuda Link Balancer
Barracuda Web Security Flex
Critical Security Controls
Distribution workstream 29th January 2009
The 3rd package for the internal energy market
Transmission Workstream February 2009
Firewalls.
Computer Data Security & Privacy
Securing the Network Perimeter with ISA 2004
ERCOT Technical Advisory Committee June 2, 2005
Living in a Network Centric World
Living in a Network Centric World
Threat Management Gateway
OmniRAN Introduction and Way Forward
Joe, Larry, Josh, Susan, Mary, & Ken
Introduction to Networking
RIM Blackberry at SAP Key Benefits / Survey Results April 2004 SAP IT Enterprise Telecommunication Services.
The Charlbury Group (TCG).
CompTIA Security+ Study Guide (SY0-401)
IS4550 Security Policies and Implementation
By: Tekeste Berhan Habtu Chief Executive Officer Venue: African Union
Firewalls at UNM 11/8/2018 Chad VanPelt Sean Taylor.
HSCN Supplier Workshop – 16 June 2016
By: Dr. Visavnath, Lecturer Comp. Engg. Deptt.
Server-to-Client Remote Access and DirectAccess
11/17/2018 9:32 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
DDoS Attack Detection under SDN Context
AKAMAI INTELLIGENT PLATFORM™
Living in a Network Centric World
Intrusion Prevention Systems
Living in a Network Centric World
Data Security in Local Networks using Distributed Firewalls
Defending high value targets in the cloud using IP Reputation
Living in a Network Centric World
The Charlbury Group (TCG).
Exit Capacity Substitution and Revision
Securing Windows 7 Lesson 10.
AMI Security Roadmap April 13, 2007.
CIPSEC Framework components: XL-SIEM
Living in a Network Centric World
OmniRAN Introduction and Way Forward
ESB Networks AIP Programme Update to IGG, June 22nd 2006
By: Dr. Visavnath, Lecturer Comp. Engg. Deptt.
Living in a Network Centric World
Living in a Network Centric World
Living in a Network Centric World
Protection Mechanisms in Security Management
Hosted Security.
Living in a Network Centric World
Presentation transcript:

Market Engagement – security update 16-June 2016 Tony Beadle

Security Workstream Update Progress to date Obligation updates Outstanding actions Next dates

Progress to date - Topics discussed Web proxy malware scanning Industry standard offerings not suitable for NHS anti-malware# Netflow generation and transmission Need visibility of all HSCN WAN traffic Need detailed info on impact of netflow generation and transmission DLN-based netflow collection point requirement removed Internet firewall automated rule distribution Standard request Industry to supply preferred technical update mechanism

Progress to date - Topics discussed (cont) DNS design Central DNS to perform recursive lookups no problem [NSI] TCP/53 blocked at Internet gateways (except recursive resolvers) Supplier security compliance model Key CAS-T elements to be used Suppliers to self-assert compliance Authority to reserve right of audit (with sanctions) Connection Agreement Aggregators Keen to participate as providers, invited to sessions

Security obligations updates Updated text as per meeting: SO1, SO2, SO4, SO5, SO12 updated SO3 removed Available for review and circulation

Outstanding actions Paper on netflow impact of infrastructure Industry preferred mechanism for updating firewalls automatically [due Fri 10th Jun] Additional obligation required for FW update mechanism and SLA [to create at workshop on 30th]

Next dates June 21st – technical & security workshop Security compliance standards to be discussed June 30th – security workshop (full day) Expected to be last significant security session Obligations to be updated following this session

SO1 Old The Supplier shall generate IPFIX data from devices at the edge of the HSCN WAN (CPE) in support of the SOC Requirements for managing security across the HSCN. New The supplier shall generate IPFIX/Netflow data to describe all network traffic passing across the HSCN WAN (e.g. full netflow of the WAN interface of the CPE)

SO2 Old The supplier shall forward the IPFIX data in real-time to a DLN-based collection facility New The supplier shall forward the IPFIX/Netflow data in real-time to the HSCIC network SOC collector

SO4 Old The supplier shall perform active network monitoring to assist with the identification of traffic (such as Denial of Service attacks) that could cause availability issues over the network. Alerts of this identification shall be passed to the HSCIC SOC. New The supplier shall perform active network monitoring to assist with the identification of traffic from the Internet (such as Denial of Service attacks) that could cause availability issues over the network. Alerts of this identification shall be passed to the HSCIC SOC.

SO5 Old The supplier shall establish a two-way data flow and information sharing between their SOC and the HSCIC SOC, to provide visibility of network alerts and incidents, anomalous traffic patterns, intelligence and other incidents in progress across the HSCN estate New At a process level, the supplier shall establish a two-way data flow and information sharing between their SOC and the HSCIC SOC, to provide visibility of network alerts and incidents, anomalous traffic patterns, intelligence and other incidents in progress across the HSCN estate. Toolset integration is not expected

SO12 Old The supplier shall identify any attack on their HSCN infrastructure, and take suitable action to mitigate the attack, and inform the HSCIC SOC New The supplier shall deploy suitable controls to detect attacks on their infrastructure used to supply service to HSCN, and take suitable action to mitigate the attacks. HSCIC SOC shall be informed of successful attacks and significant unsuccessful attacks.