Mark Bruhn Indiana University IT Policy Officer

Slides:



Advertisements
Similar presentations
The Whole/Hole of Security Public (DoD) v. Corporate Carl Bourland US Army Judge Advocate Generals Corps.
Advertisements

Overview of local security issues in Campus Grid environments Bruce Beckles University of Cambridge Computing Service.
The Approach to Security in CLRC Gareth Smith With acknowledgements to all the members of the CLRC Computer Network and Security Group, especially Trevor.
Darton College Information Systems Use Policies. Introduction Dartons Information Systems are critical resources. The Information Systems Use Policies.
Guide to Massachusetts Data Privacy Laws & Steps you can take towards Compliance.
Packet Analyzers, a Threat to Network Security. Agenda Introduction The background of packet analyzers LAN technologies & network protocols Communication.
Smart Grid - Cyber Security Small Rural Electric George Gamble Black & Veatch
Research and Educational Networking Information Analysis and Sharing Center (REN-ISAC) Mark S. Bruhn, Interim Director University Copyright.
Cybersecurity Summit 2004 Andrea Norris Deputy Chief Information Officer/ Director of Division of Information Systems.
University of Guelph IT Security Policy Doug Blain Manager, IT Security ISC, April 27th.
ITS Offsite Workshop 2002 PolyU IT Security Policy PolyU IT/Computer Systems Security Policy (SSP) By Ken Chung Senior Computing Officer Information Technology.
SIRT Contact Orientation Security Incident Response Team Departmental Security Contacts April 16, 2004.
SESSION 9 THE INTERNET AND THE NEW INFORMATION NEW INFORMATIONTECHNOLOGYINFRASTRUCTURE.
Security Issues on Distributed Systems 7 August, 1999 S 1 Prepared by : Lorrien K. Y. Lau Student I.D. : August 1999 The Chinese University.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Enterprise Security. Mark Bruhn, Assoc. VP, Indiana University Jack Suess, VP of IT, UMBC.
Hands-On Microsoft Windows Server 2008 Chapter 8 Managing Windows Server 2008 Network Services.
Ferst Center Incident Incident Identification – Border Intrusion Detection System Incident Response – Campus Executive Incident Response Team Incident.
1 Mark Bruhn Indiana University IT Policy Officer.
Principles of Computer Security: CompTIA Security + ® and Beyond, Second Edition © 2010 Baselines Chapter 14.
Information Security Introduction to Information Security Michael Whitman and Herbert Mattord 14-1.
Security Imperatives in a New Workplace Partnering to Protect Digital Information in the 21st Century Presented by Michael Ferris, Alaska Enterprise Solutions.
Responding to a Security Incident Maryland Security Day March 2, 2004 Joy Hughes, CIO
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
CERN’s Computer Security Challenge
SECURITY ZONES. Security Zones  A security zone is a logical grouping of resources, such as systems, networks, or processes, that are similar in the.
IT Security and Policy Issues Mark Bruhn University IT Policy Officer Office of the Vice President for Information Technology Indiana University.
© 2001 by Carnegie Mellon University SS5 -1 OCTAVE SM Process 5 Background on Vulnerability Evaluations Software Engineering Institute Carnegie Mellon.
INCIDENT RESPONSE IMPLEMENTATION David Basham University of Advancing Technology Professor: Robert Chubbuck NTS435.
Incident Response CSG September 2004 Harvard University.
Ali Pabrai, CISSP, CSCS ecfirst, chairman & ceo Preparing for a HIPAA Security Audit.
Module 14: Securing Windows Server Overview Introduction to Securing Servers Implementing Core Server Security Hardening Servers Microsoft Baseline.
Converting Policy to Reality Designing an IT Security Program for Your Campus 2 nd Annual Conference on Technology and Standards May 3, 2005 Jacqueline.
Computer Security Risks for Control Systems at CERN Denise Heagerty, CERN Computer Security Officer, 12 Feb 2003.
© ITT Educational Services, Inc. All rights reserved. IS3230 Access Security Unit 6 Implementing Infrastructure Controls.
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
Syo-401 Question Answer. QUESTION 1 An achievement in providing worldwide Internet security was the signing of certificates associated with which of the.
SSH. 2 SSH – Secure Shell SSH is a cryptographic protocol – Implemented in software originally for remote login applications – One most popular software.
Computer Security Sample security policy Dr Alexei Vernitski.
 client  client/server network  communication hardware  extranet  firewall  hacker  Internet  intranet  local area network (LAN)  Network 
Incident Response Strategy and Implementation Anthony J. Scaturro University IT Security Officer September 22, 2004.
Performing Risk Analysis and Testing: Outsource or In-house
The Marshall University Experience with Implementing Project Server 2003 August 9, 2005 Presented by: Chuck Elliott, M.S. Associate Director, Customer.
TECHNOLOGY GUIDE THREE
Secure Software Confidentiality Integrity Data Security Authentication
Ian Bird GDB Meeting CERN 9 September 2003
Control system network security issues and recommendations
SUBMITTED BY: NAIMISHYA ATRI(7TH SEM) IT BRANCH
Firewalls.
Welcome To : Group 1 VC Presentation
Columbus State University
IS4550 Security Policies and Implementation
Unit 27: Network Operating Systems
IT Development Initiative: Status and Next Steps
Intro to Ethical Hacking
Red Flags Rule An Introduction County College of Morris
Chapter 27: System Security
Intro to Ethical Hacking
CLASP Project AAI Workshop, Nov 2000 Denise Heagerty, CERN
IT Development Initiative: Status & Next Steps
BACHELOR’S THESIS DEFENSE
BACHELOR’S THESIS DEFENSE
BACHELOR’S THESIS DEFENSE
Leaders’ Forum, March 16, 2006 The Invisible Risk: Leaders’ Role in Protecting Western’s Electronic Information.
UF Directory Coordinator Training
Designing IIS Security (IIS – Internet Information Service)
Fy ‘08 NETWORK PLANNING TASK FORCE
Information Technology Organization Overview RFP #220-05
Chapter 21 Successfully Implementing The Information System
Cloud Computing for Wireless Networks
Presentation transcript:

Security@IU Mark Bruhn Indiana University IT Policy Officer

No incident response capability existed January 1997 - Michael McRobbie arrives as the first CIO at Indiana University March 1997 – self-proclaimed “privacy advocate” finds 2760 records of personal info via an gopher-http gateway Posts them to his web site Notifies major media outlets Information Security Officer was in buried in Administrative Computing department No incident response capability existed

Developed an action plan Subsequent actions: University Computer Security Task Force appointed University Computer Security Office created with an interim Director One of the best technicians available assigned to the UCSO immediately External reviews (company and peer) commissioned Interim IT Policy Officer appointed External reviews: No real surprises Peer review recommended permanent IT Policy and Security Offices Developed an action plan CIO presented the action plan to the President, who directed that it be implemented

Offices created in August 1998: Positioned in the Office of the Vice President and CIO, not in computing department Several new staff positions created, including two high-level “officers” IT Policy Officer reports to the CIO, and is a member of OVPIT executive management IT Security Officer reports to the IT Policy Officer, but with dotted-line to the CIO

IT Policy Office IT Security Office 14 full-time staff variously responsibly for Policy development Incident response Identification, authentication, authorization services Enterprise directory Disaster recovery IT Security Office 7 full-time staff responsible for Maintaining a wide-breadth and specific in-depth technical expertise Developing security resources for technicians Developing/maintaining tools for technicians Security consulting Security reviews on request

University Information Technology Policy Office Office of the Vice President for Information Technology September 2001 Michael McRobbie VP/CIO Mark Bruhn IT Policy Officer/ Contracts & Agreements Officer Admin Asst Tom Davis IT Security Officer Disaster Recovery Program Manager Data Administrator Info Mgt Officer Merri Beth Lavagnino Deputy IT Policy Officer 2 Principal Security Engineers 3 Lead Security Engineers 1 Senior Security Analysts Cross-Unit Recovery Planning Team Information Technology Security Office Global Directory Services Team Computer Accounts Manager Incident Response Coordinator 1 Lead Data/ Applications Analyst 2 Senior Data/ Applications Analysts 6 Accounts Administrators Technical Investigators

February 2001 – Bursar’s Office Technician inadvertently allowed anon FTP Gigabytes of bootleg movies and music stashed by unknown individuals A file of personal data amongst these media files, and was downloaded In May 2001, Trustees pass a resolution directing VP/CIO to take steps to improve security Proactive Reactive

Creating an enterprise directory June 2001 – School of Music Web server exploited via known vulnerability School was collecting personal information from prospective students Data was stored in directory accessible to the intruder June 2001, CIO directed University units to eliminate unnecessary files of sensitive information and to secure the rest By December 2001, 55 major units indicated projects underway or projects completed Creating an enterprise directory Permits applications to access central secure store of person information instead of maintaining distributed stores “Translate service” permits departments to store username instead of SSN and convert as required

Developed talking points Developed issues list Developed strategy Developed talking points CIO and ITPO/ITSO use all opportunities to discuss security issues with various constituencies Key is to translate vulnerabilities and issues into INSTITUTIONAL RISKS Role for CIO and IT Policy Officer Security Officer many times mostly technical (which is a good thing) and not schmoozy But, key person is the CIO (if organizationally positioned correctly): Especially if also an academic Understands technology Understands business/mission Has the attention of executive administration

Published general best practices documents: Best Practices for Security IT Resources Best Practices for Handling Sensitive Electronic Information (long and short) Deliver formal technician seminars which include general information and technical security (partner with computing department and Human Resources Management) Deliver non-credit technician Security Education/Certification courses, which are already proving very popular (partner with computing department; plans to make these mandatory) Deliver an enhanced suite of technician support tools (for vulnerabilities assessment, anti-virus, advisory service, etc.) Made available many technician/user how-to guides

Purchased: Locally developed: Intrusion Detection: Shadow Style Securing Linux: Step-by-Step Solaris Security: Step-by-Step Windows NT Security: Step-by-Step Windows 2000 Security: Step by Step Windows 2000 Vulnerabilities and Solutions Locally developed: Handle a system compromise Install and Use SSH Install and Use TCP Wrappers Obtain a certificate for an IU-based web server Prevent mail relay abuse Protect against viruses Protect your home PC Protect your IIS web server Protect your laptop computer Recover from a System Compromise Secure your personal computer accounts Secure your Windows FTP server Secure your Windows NT system Secure your Windows 95/98 system Secure your UNIX system

Eliminated several insecure email communications protocols; working to eliminate all Developed “virtual private network”, which provides for authentication and encryption for: Connections from off-campus On-campus wireless networks Commissioned a group to develop a comprehensive enterprise firewalling proposal, with specific self-defense goals: A large portion of the ~65,000 networked IU systems support campus functions and do not need to be visible to the Internet On the remaining systems, only certain services (e.g., web pages) need to be visible to the Internet IUB Halls of Residence student computers need special protection from external influences; services that students provide to the Internet must be limited Security consulting engagements to projects and systems within UITS and departments increasing dramatically

Placement of a firewall at the edge of the IU network to protect workstations and local servers from many types of attacks. Departmental servers providing services beyond the IU network would exist on a separate Class B network than workstations. Servers on this network would be registered and hardened and would be protected via router ACLs. Servers residing in the UITS machine rooms on each campus would use a separate firewall with unique rule sets for each server.

Created new IT policies: Use of Indiana University Information Technology Resources Sanctions for Misuse or Abuse of Indiana University Technology Resources Eligibility to Use Indiana University Technology Resources Privacy of University Information Technology Resources Information Technology Facilitative/Fair Usage Policy Security of University IT Resources Network and Computer Accounts Administration Extending the Network Wireless Networking Use of Electronic Mail Policy on Use of Email for Mass Communications Created Deputy IT Policy Officer based at IUPUI; affords more presence there and at regional campuses

Web-based scanner management interface ISS and Nessus as scan engines Several scan engines Scans are required and automatically executed for OVPIT systems Scans are requested by administrators, security staff, or auditors Web-based incident tracking system Incidents are triaged by full-time IRC, and other handled by that person or assigned