Securing the Science DMZ and Research

Slides:



Advertisements
Similar presentations
Duke University SDN Approaches and Uses GENI CIO Workshop – July 12, 2012.
Advertisements

FIREWALL TECHNOLOGIES Tahani al jehani. Firewall benefits  A firewall functions as a choke point – all traffic in and out must pass through this single.
Knowing What You Missed Forensic Techniques for Investigating Network Traffic.
Cloud Computing Project By:Jessica, Fadiah, and Bill.
MidVision Enables Clients to Rent IBM WebSphere for Development, Test, and Peak Production Workloads in the Cloud on Microsoft Azure MICROSOFT AZURE ISV.
UNM SCIENCE DMZ Sean Taylor Senior Network Engineer.
Azure-Powered Solution to Monitor, Manage and Backup Servers and Websites Lets Users Keep Control of IT Infrastructure and Prevent Downtime MICROSOFT AZURE.
CompTIA Security+ Study Guide (SY0-401)
Campus Cloud Security Shared Assessments
Univa Grid Engine Makes Work Management Automatic and Efficient, Accelerates Deployment of Cloud Services with Power of Microsoft Azure MICROSOFT AZURE.
Chapter 6: Securing the Cloud
TOPdesk Service Management Software on Azure
Transform yourself and build your IT cloud career path
Server Upgrade HA/DR Integration
Configuring ALSMS Remote Navigation
DocFusion 365 Intelligent Template Designer and Document Generation Engine on Azure Enables Your Team to Increase Productivity MICROSOFT AZURE APP BUILDER.
Barracuda Networks Creates Next-Generation Security Solutions That Enable Customers to Accelerate Their Adoption of Microsoft Azure MICROSOFT AZURE APP.
Hybrid Management and Security
Ralleo Enterprise-Grade Solution for Managing Change and Business Transformation Provides Opportunities to Better Analyze Real-Time Data MICROSOFT AZURE.
New Heights by Guiding Them into the Cloud
Free Cloud Management Portal for Microsoft Azure Empowers Enterprise Users to Govern Their Cloud Spending and Optimize Cloud Usage and Planning MICROSOFT.
Gather Valuable Customer Data
Trial.iO Makes it Easy to Provision Software Trials, Demos and Training Environments in the Azure Cloud in One Click, Without Any IT Involvement MICROSOFT.
Firefish Software for Professional Recruiters Stays Available Around the Clock from Any Device and Anywhere by Using the Microsoft Azure Platform Partner.
Cherwell Service Management is an IT Service Management Solution that Makes it Easier for Users to Capitalize on Power of Microsoft Azure MICROSOFT AZURE.
Insurance Fraud Analytics in the Cloud with Saama and Microsoft Azure
A Science DMZ in Every Pot?
THE STEPS TO MANAGE THE GRID
Nimble Streamer Helps Media Content Providers Create Streaming Networks Cost-Effectively and Easily by Utilizing Azure’s Worldwide Scalability MICROSOFT.
Veeam Backup Repository
Language Understanding Intelligent Service and Microsoft Azure Enable Rover, PLEX.AI’s Artificial Intelligence-Powered Virtual Insurance Advisor MICROSOFT.
OpenNebula Offers an Enterprise-Ready, Fully Open Management Solution for Private and Public Clouds – Try It Easily with an Azure Marketplace Sandbox MICROSOFT.
H3 Solutions and the Azure Government Cloud Team Up to Power Contextual Intelligence Platform – Where Big Data Meets Business Productivity MICROSOFT AZURE.
CompTIA Security+ Study Guide (SY0-401)
Search Engine of the World's Laws Utilizes Azure Cloud Platform and Uses Azure Project Manager, Virtual Machines, and Microsoft Translation Service MICROSOFT.
IS4550 Security Policies and Implementation
COMPREHENSIVE APPROACH TO INFORMATION SECURITY IN ADVANCED COMPANIES
Built on the Powerful Microsoft Azure Platform, iSwarm Helps Businesses Analyze Social Media Conversations, then Connect with Individuals MICROSOFT AZURE.
Interlake Hybrid Cloud Management Suite
Intelledox Infiniti Helps Organizations Digitally Transform Paper and Manual Business Processes into Intuitive, Guided User Experiences on Azure MICROSOFT.
Logsign All-In-One Security Information and Event Management (SIEM) Solution Built on Azure Improves Security & Business Continuity MICROSOFT AZURE APP.
Partner Logo Reblaze Utilizes Microsoft Azure Cloud Technology to Provide Web Assets with a Comprehensive, Robust, Protective Shield Against Internet Threats.
Auth0 Is Identity Made Simple for Developers, Built by Developers and Supported by the High Availability and Performance of Microsoft Azure MICROSOFT AZURE.
The Only Digital Asset Management System on Microsoft Azure, MediaValet Is Uniquely Equipped to Meet Any Company’s Needs MICROSOFT AZURE ISV PROFILE: MEDIAVALET.
Data Security for Microsoft Azure
CloudLabs, Powered by Azure, Enables the Quick, Easy, Cost-Effective Management, Distribution of Online Training Labs for Education and Business MICROSOFT.
CloneManager® Helps Users Harness the Power of Microsoft Azure to Clone and Migrate Systems into the Cloud Cost-Effectively and Securely MICROSOFT AZURE.
Introducing Qwory, a Business-to-Business Search Engine That’s Powered by Microsoft Azure and Detects Vital Contact Information for Businesses MICROSOFT.
Partner Logo Azure Provides a Secure, Scalable Platform for ScheduleMe, an App That Enables Easy Meeting Scheduling with People Outside of Your Company.
Cloud Security for Endpoints
Crypteron is a Developer-Friendly Data Breach Solution that Allows Organizations to Secure Applications on Microsoft Azure in Just Minutes MICROSOFT AZURE.
MARMIND’s New Service Delivers a Single Centralized Marketing Plan That Connects Teams, Campaigns and Outcomes by Using the Power of the Azure Platform.
Dell Data Protection | Rapid Recovery: Simple, Quick, Configurable, and Affordable Cloud-Based Backup, Retention, and Archiving Powered by Microsoft Azure.
Instantaneous Messaging System Uses Microsoft Azure Platform to Help Physicians Give Optimal Quality Patient Care with Real-Time Information MICROSOFT.
Glynk on Microsoft Azure: A Social Networking Platform Connecting Like-Minded People Nearby for Recommendations, Activities, and Meetups MICROSOFT AZURE.
Adra ACCOUNTS: Transaction Matching Software Powered by the Microsoft Azure Cloud That Helps Optimize the Accounting and Finance Processes MICROSOFT AZURE.
MICROSOFT AZURE ISV PROFILE: ONEBE
Big-Data around the world
AdQ is Azure-Powered Pre-Roll Ad Management Software That Improves Pre-Roll Ad Performance, Increases Profits, and Optimizes User Experience MICROSOFT.
Keep Your Digital Media Assets Safe and Save Time by Choosing ImageVault to be Your Digital Asset Management Solution, Hosted in Microsoft Azure Partner.
One-Stop Shop Manages All Technical Vendor Data and Documentation and is Globally Deployed Using Microsoft Azure to Support Asset Owners/Operators MICROSOFT.
ADAM on Microsoft Azure Streamlines Access and Control of Full Function Digital Asset and Product Content Management for All Workers MICROSOFT AZURE ISV.
Microsoft Azure, RightsWATCH Help Users Keep Sensitive Information Safe from Security Breaches Resulting from Accidental or Malicious Disclosure MICROSOFT.
Quasardb Is a Fast, Reliable, and Highly Scalable Application Database, Built on Microsoft Azure and Designed Not to Buckle Under Demand MICROSOFT AZURE.
TEMPLATE NOTES Our datasheet and mini-case study templates are formatted specifically for consistency of branding at Microsoft. Please do not alter font.
Guarantee Hyper-V, System Center Performance and Autoscale to Microsoft Azure with Application Performance Control System from VMTurbo MICROSOFT AZURE.
Nuvolex and Microsoft Azure Combine to Deliver a Multitenant Office 365 Management Platform that Ranks Among Most Advanced in the Industry MICROSOFT AZURE.
Microsoft Virtual Academy
National data opt-out - Preparing for implementation
Cloud Computing for Wireless Networks
Presentation transcript:

Securing the Science DMZ and Research Damian Doyle, Director of Enterprise Infrastructure, UMBC  Nick Lewis, NET+ Program Manager for Security and Identity, Internet2 April 2016

Agenda Current State Securing the Science DMZ How this could integrate into your campus information security program Questions

What is Research Security? Protect the research, researchers, human subject, and the institution! Researchers have broad compliance responsibilities Pre and post award Common Rule, NIST, FISMA, HIPAA, FDA, ITAR, EAR, NERC, Select Agents, oh my!

Why Is Research Security Important? Requirements from funding agencies around protecting research Requirements differ between agencies and other funders Oversight and guidance differs as well FBI National Security report from 2011 https://www.fbi.gov/about-us/investigate/counterintelligence/higher-education-and-national-security High profile attacks on research at universities

The Science DMZ in 1 Slide Consists of three key components, all required: “Friction free” network path Security policy and enforcement specific to science workflows Dedicated, high-performance Data Transfer Nodes (DTNs) Performance measurement/test node Engagement with end users https://fasterdata.es.net/science-dmz/

Campus Information Security Program Most campuses have a program for managing IT security risk across campus Working with IT, auditors, compliance, legal, risk, privacy, security officers, and boards Research is one component of the group Which includes Science DMZs Addressing highest risks, but risk from research may not be well understood

Research Security from Community Few resources on how to handle security requirements from research Ok, there are some. See presentations at here, prior years, and elsewhere. Many institutions have some guidance HEISC InfoSec Guide: https://spaces.internet2.edu/display/2014infosecurityguide/Top+Information+Security+Concerns+for+Researchers Center for Trustworthy Scientific Cyberinfrastructure NET+ program does have some services Example from NET+ program around AWS and Azure

Current State from Researcher Most researchers know they need to protect their research especially if it includes human subjects or high security topics Researchers must be experts in science, tech, grants, finance, and administration IT security one of many requirements Everything other than the research takes time from the research Researchers know they need to protect human subjects

Examples with Risk In Research Vaccine trials in neonatal ICU Secondary data analysis on health insurance data Nuclear materials Compromised HPC to mine bitcoin Genome Databases

What is Securing the Science DMZ and Research? How to include the Science DMZ into your research security program Make researchers and administration aware of the capabilities so they can include them in research proposal planning and design Template language to include in proposals Enable researchers to do research!

Potential Best Practices Develop and share with the community! How to identify research that needs Science DMZ Flow charts? How to explain to researchers, auditors, legal, compliance, IT, and others Example: If the IRB or research administration reviews a proposal that requires servers setup for researcher, data transfer with outside parties, or complicated IT requirements, they could refer the researcher to the Science DMZ

Origins of the Science DMZ Research data streams often use different applications from the enterprise network and can have very different latency and performance characteristics Latency and jitter cause havoc on long distance connections Traditional enterprise security platforms must do deep inspection because of the wide breadth of applications and usage they have to protect A lot of research data can bottleneck and may only be available for short periods of time due to constant updates/refreshes Enterprise security perceived as a barrier to research Needed a way to allow research without requiring massive investment in enterprise security platform to support needs of a few research groups

Early Misconceptions (How I learned to stop worrying and love the Science DMZ) The Science DMZ bypasses security by avoiding campus firewalls The intent was never to bypass security Researchers don’t want to deal with security because it gets in the way of their research Researchers to want to protect their data, but they approach this from a very different mindset than enterprise security tend to Science DMZs are only for major research centers Anyone who pulls in research data can benefit from a Science DMZ, and they can be very easy to put in place We need to change the discussion and refocus it

Technical Approaches There is no one size fits all solution It depends on the amount of research being done and the requirements of those researchers DTNs and why we should love them DTNs, Data Transfer Nodes, are really a server sitting in a Science DMZ that is designed to pump data in and out very quickly They are not meant to be a long term repository, they are a staging area for data so that it can be pulled/pushed quickly regardless of the backend systems and infrastructure in place throughout the campus Two basic types: Open DTN, where it is reachable from the Internet and is isolated in the Science DMZ so that a compromise doesn’t lead to cascading infections. Closed DTN, only reachable to defined resources on the Internet that have been whitelisted Different Science DMZ approaches we will discuss Basic deployment, low impact, small resources needed Advanced deployment, longer term, more flexible but requires more resources

Basic Science DMZ Approach Establish a data transfer node (DTN) in SDMZ Open DTN option Size local storage to hold enough data so it can stream in quickly, then trickle into the campus through the existing enterprise security Closed DTN option Only whitelisted IP addresses can access it from outside the campus Utilize router access control lists or local machine firewalls to establish default deny policies Does not need much local storage, can be directly linked to the internal resources because of extremely restrictive access

Basic Science DMZ configuration options Internet Campus Network Open DTN Host Closed DTN Host DTN Local Storage Research Environments

Advanced Science DMZ Approach Intermediate: Scaling beyond IPTABLES/ACLs Implement BRO for Open DTN and other resources within the Science DMZ Continue to use IPTABLES when possible Longer-term: Deploy SDN for regular campus flows Add SDN to the DTN node to lower latency and improve end-to-end performance. SDN will allow for real time adjustments on a flow by flow basis, enabling access only as required Focus on largest transfers or low-latency.

Intermediate - Add Intrusion Detection Science DMZ I1 & I2 Open DTN Host HPC DTN Host DTN Local Storage Infiniband HPCC Intrusion Detection

UMBC Science DMZ DTN Infiniband HPCF Open HPC DTN Host DTN Host CHMPR Campus 10 Gb Internet Links from MDREN in Baltimore and College Park 100 Gb SDN Enabled Internet 2 link from College Park Open DTN Host HPC DTN Host Campus Border Routers DTN Intrusion Detection CHMPR (IBM Cluster) Infiniband HPCF Local Storage Cluster Storage

Questions for the audience Do you have a Science DMZ? How do you move big research data around? What kind of engagement do you have with your research community? How do your researchers include information security in their work? Is this something you think more IT security and researchers need more guidance on?

Questions for us? If you have any questions, please contact: Damian Doyle, Director of Enterprise Infrastructure, UMBC  damian@umbc.edu Nick Lewis, Internet2 NET+ Program Manager, Security and Identity nlewis@internet2.edu

Securing the Science DMZ and Research Please remember to fill out your session evaluation!