Joint SSR-RT/DSSA meeting DSSA Progress Update Dakar – October 2011.

Slides:



Advertisements
Similar presentations
ICANN Plan for Enhancing Internet Security, Stability and Resiliency.
Advertisements

DNS Security and Stability Analysis Working Group (DSSA) DSSA Update Prague – June, 2012.
DNS Security and Stability Analysis Working Group (DSSA)
DNS Security and Stability Analysis Working Group (DSSA) DSSA Update Prague – June, 2012.
DSSA Update Costa Rica – March, Goals for today Update you on our progress Raise awareness Solicit your input 2.
<<Date>><<SDLC Phase>>
Predisposing Conditions Security Controls Vulnerabilities A Non- Adversarial Threat Source (with a range of effects) In the context of… (with varying pervasiveness)
Introduction to the State-Level Mitigation 20/20 TM Software for Management of State-Level Hazard Mitigation Planning and Programming A software program.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Computer Security: Principles and Practice
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. Security Policies and Implementation Issues.
Predisposing Conditions Security Controls Vulnerabilities A Non- Adversarial Threat Source (with a range of effects) In the context of… (with varying pervasiveness)
Session 3 – Information Security Policies
Network Infrastructure Security. LAN Security Local area networks facilitate the storage and retrieval of programs and data used by a group of people.
Network security policy: best practices
Ferst Center Incident Incident Identification – Border Intrusion Detection System Incident Response – Campus Executive Incident Response Team Incident.
Security Risk Management Marcus Murray, CISSP, MVP (Security) Senior Security Advisor, Truesec
Website Hardening HUIT IT Security | Sep
2011 – 2014 ICANN Strategic Plan Development Stakeholder Review 4 November 2010.
Revised Draft Strategic Plan 4 December 2010.
2012 – 2015 ICANN Strategic Plan Development 6 October 2011.
Financial Advisory & Litigation Consulting Services Risk Management 2006 September 14-15, 2006 The Metropolitan Club, New York, NY Workshop B: Information.
SEC835 Database and Web application security Information Security Architecture.
Lesson 8-Information Security Process. Overview Introducing information security process. Conducting an assessment. Developing a policy. Implementing.
Network Security Policy Anna Nash MBA 737. Agenda Overview Goals Components Success Factors Common Barriers Importance Questions.
DSSA-WG Progress Update Dakar – October Charter: Background At their meetings during the ICANN Brussels meeting the At-Large Advisory Committee.
“Mitigating Offshoring Risks in a Global Business Environment“
Security Baseline. Definition A preliminary assessment of a newly implemented system Serves as a starting point to measure changes in configurations and.
DSSA Update Costa Rica – March, Goals for today Update you on our progress Raise awareness Solicit your input.
CcTLD/ICANN Contract for Services (Draft Agreements) A Comparison.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
Environment for Information Security n Distributed computing n Decentralization of IS function n Outsourcing.
Certification and Accreditation CS Phase-1: Definition Atif Sultanuddin Raja Chawat Raja Chawat.
Sample Security Model. Security Model Secure: Identity management & Authentication Filtering and Stateful Inspection Encryption and VPN’s Monitor: Intrusion.
ICANN COMMUNITY STRATEGIC PLANNING DISCUSSION Brussels, June
ISO17799 Maturity. Confidentiality Confidentiality relates to the protection of sensitive data from unauthorized use and distribution. Examples include:
Update from ICANN staff on SSR Activities Greg Rattray Tuesday 21 st 2010.
JIG (Joint ccNSO-GNSO IDN Group) Update APTLD | New Delhi Feb 23, 2012.
Web Security for Network and System Administrators1 Chapter 2 Security Processes.
Text. #ICANN49 Data & Metrics for Policy Making Working Group Thursday 27 March 2014 – 08:00.
Multistakeholder Policy- & Decision-making
Ali Pabrai, CISSP, CSCS ecfirst, chairman & ceo Preparing for a HIPAA Security Audit.
DSSA Update Costa Rica – March, Goals for today Update you on our progress Raise awareness Solicit your input 2.
DSSA Update Costa Rica – March, Goals for today Update you on our progress Raise awareness Solicit your input 2.
1 ICANN... update Pablo Hinojosa Manager, Regional Relations Global and Strategic Partnerships 2007 Caribbean Internet Forum St. Lucia, 5 November 2007.
1 1 The GNSO Role in Internet Governance Presented by: Chuck Gomes Date: 13 May 2010.
Conficker Update John Crain. What is Conficker? An Internet worm  Malicious code that is self-replicating and distributed over a network A blended threat.
DSSA-WG Progress Update Singapore – June Charter: Background At their meetings during the ICANN Brussels meeting the At-Large Advisory Committee.
Security, Stability & Resiliency of the DNS Review Team Wednesday, 8 December 2010.
HO © 2012 Fluor. All rights reserved. Quick Wins in Vulnerability Management Classification: Confidential Owner: Michael Holcomb Approver: Phil.
ISMS Implementation Workshop Adaptive Processes Consulting Pvt. Ltd.
DSSA Update Costa Rica – March, Goals for today Update you on our progress Raise awareness Solicit your input.
IPv6 security for WLCG sites (preparing for ISGC2016 talk) David Kelsey (STFC-RAL) HEPiX IPv6 WG, CERN 22 Jan 2016.
Update on Consumer Choice, Competition and Innovation (CCI) WG Rosemary Sinclair.
ASHRAY PATEL Securing Public Web Servers. Roadmap Web server security problems Steps to secure public web servers Securing web servers and contents Implementing.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
Introduction to the Regional Internet Registries (RIRs)
1 27Apr08 Some thoughts on Internet Governance and expansion of the Domain Name space Paul Twomey President and CEO 9 August 2008 Panel on Internet Governance.
Lecturer: Eng. Mohamed Adam Isak PH.D Researcher in CS M.Sc. and B.Sc. of Information Technology Engineering, Lecturer in University of Somalia and Mogadishu.
Business Continuity Planning 101
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 17 – IT Security.
Donald JG Chiarella, PhD, CISM, CDMP, PEM, CHS-CIA, MBA.
ISSeG Integrated Site Security for Grids WP2 - Methodology
Cybersecurity - What’s Next? June 2017
ICANN’s Policy Development Activities
I have many checklists: how do I get started with cyber security?
IS4680 Security Auditing for Compliance
Enhanced alerting and collaborative incident management
In the attack index…what number is your Company?
DSC Contract Management Committee Meeting
Presentation transcript:

Joint SSR-RT/DSSA meeting DSSA Progress Update Dakar – October 2011

Goals for today Update you on our progress Raise awareness Solicit your input Look for opportunities Identify overlaps/conflicts

Charter: Background At their meetings during the ICANN Brussels meeting the At-Large Advisory Committee (ALAC), the Country Code Names Supporting Organization (ccNSO), the Generic Names Supporting Organization (GNSO), the Governmental Advisory Committee (GAC), and the Number Resource Organization (NROs) acknowledged the need for a better understanding of the security and stability of the global domain name system (DNS). This is considered to be of common interest to the participating Supporting Organisations (SOs), Advisory Committees (ACs) and others, and should be preferably undertaken in a collaborative effort.

SSR Scope Incident response – Provide initial response to an incident – Communicate incidents – Conduct impact assessments – Detect security events (through monitoring, advisories, reports of suspicious activity, etc.) – Provide incident resolution and countermeasures – Conduct investigations Technical Practices –Electronic mail security –Network security –Operating system security –Data security –Application security –Security for public servers –Wireless network security –Personal computers and electronic devices Technology management –Routers –Vulnerability assessment systems –Configuration management systems –Patch management systems –Firewall systems –Backup & recovery –Intrusion detection and log-analysis systems –Wireless access points Security Management –Overall management and direction –Security strategy and alignment within overall IT strategy –Program management –Security metrics –Policy –Guidelines and standards Risk Management –Developing and maintaining an inventory of systems (determining contents, owner, maintainer, location, etc.) –Mapping information and systems into security categories –Conducting assessments of systems –Analyzing risks and identifying mitigation/repair actions Compliance Monitoring –Measure progress and compliance in the following areas; incident response practices technology management risk-management Operational Practices –Training and awareness –Certification and accreditation –Legal and regulatory compliance –Securing external contractors –Rewards and sanctions –Acceptable use –Business continuity I’m not sure if all of this is in-scope for the SSR team, but I imagine much of it is… Note: this is purely a Mikey invention that hasn’t been reviewed by anybody

DSSA Scope Incident response – Provide initial response to an incident – Communicate incidents – Conduct impact assessments – Detect security events (through monitoring, advisories, reports of suspicious activity, etc.) – Provide incident resolution and countermeasures – Conduct investigations Technical Practices –Electronic mail security –Network security –Operating system security –Data security –Application security –Security for public servers –Wireless network security –Personal computers and electronic devices Technology management –Routers –Vulnerability assessment systems –Configuration management systems –Patch management systems –Firewall systems –Backup & recovery –Intrusion detection and log-analysis systems –Wireless access points Security Management –Overall management and direction –Security strategy and alignment within overall IT strategy –Program management –Security metrics –Policy –Guidelines and standards Risk Management –Developing and maintaining an inventory of systems (determining contents, owner, maintainer, location, etc.) –Mapping information and systems into security categories –Conducting assessments of systems –Analyzing risks and identifying mitigation/repair actions Compliance Monitoring –Measure progress and compliance in the following areas; incident response practices technology management risk-management Operational Practices –Training and awareness –Certification and accreditation –Legal and regulatory compliance –Securing external contractors –Rewards and sanctions –Acceptable use –Business continuity Our scope is much narrower – more of a deep dive into this one area, only for DNS and TLDs Note: this is purely a Mikey invention that hasn’t been reviewed by anybody

Risk management process Inventory and Characterize Systems Identify Threats Identify Vulnerabilities Analyze Controls Determine Likelihood Assess Mitigate Assume the risk Avoid the risk Limit the risk Risk Planning Transfer the risk Compliance and activity monitoring Monitor Risk Assessment Analyze Impact Determine Risk DSSA Note: this is purely a Mikey invention that hasn’t been reviewed by anybody

Goals and Objectives Report to respective participating SO’s and AC’s on: – Actual level, frequency and severity of threats to the DNS – Current efforts and activities to mitigate these threats to the DNS – Gaps (if any) in the current response to DNS issues – Possible additional risk mitigation activities that would assist in closing those gaps (if considered feasible and appropriate by the WG) Note: this is from the DSSA Kick-Off deck – reviewed and approved

Approach and status Launch Analyze Threats & Vulnerabilities Analyze Threats & Vulnerabilities Report Identify Threats & Vulnerabilities We are here – about 70% complete with this phase of the work

Activity since Singapore Identify Threats The working group has: – Developed lists of vulnerabilities and threats (with definitions) – Made preliminary choices about which threats are in/out of scope for analysis – Developed preliminary criteria and mechanisms for segregating sensitive information Remaining work in this phase – Solicit additional lists/definitions from other experts and interested parties – Arrive at a final (prioritized) list of threats and vulnerabilities

Brainstorming and refining “I'm sorry this letter is so long, I didn't have time to make it shorter.” ― George Bernard Shaw, Pascal, Goethe, Wilde, Cicero, DSSA

Scope From our charter, “the working group should focus on "The actual level, frequency and severity of threats to the DNS.... The DSSA‐WG should limit its activities to considering issues at the root and top level domains within the framework of ICANN’s coordinating role in managing Internet naming and numbering resources as stated in its Mission and in its Bylaws.” The WG refined this to add “we are not to look at every threat having to do with, or taking place via, the DNS, or that impacts some party using the DNS. We are concerned with “the” DNS, i.e. threats to the system itself, and relevant to ICANN’s role.”

Threats to underlying infrastructure (Draft – for discussion only) In scope – System failure (e.g. hardware/software failures, etc.) – Governmental interventions (e.g. seizure, blocking, etc.) – Physical events (e.g. natural disasters, etc.) – Fragmentation of the root (e.g. alternate roots, root scaling, etc.) Under discussion (your thoughts?) – Business failure Out of scope – Depletion of IPv4 address pool – Rationale: The concerns (routing table growth and route fragmentation) will happen anyway The DNS is not a heavy consumer of IP addresses, thus depletion is unlikely to have a significant impact

Threats – direct attacks (Draft – for discussion only) In scope – DDOS – distributed denial of service – Packet interception – Recursive vs authoritative nameserver attacks (e.g. using vulnerable recursive DNS servers as reflectors to attack TLD DNS servers) – Data poisoning attacks Under discussion (your thoughts?) – IDN attacks (lookalike characters for standard exploitation techniques – awaiting results of the Variants project) – Malicious or unintentional alteration of DNS configuration information Out of scope – Footprinting – Authenticated denial of domain name – Malicious or unintentional alteration of contact information – Rationale: These are behaviors or, in some cases, threat vectors These are focused/limited threats, not likely to cause widespread instability

Threats – indirect attacks (Draft – for discussion only) In scope – server-hopping under IPv6 (causing collateral damage due to load) Out of scope – Registration abuse – front-running – Registration abuse – cybersquatting – Registration directory service abuse – harvesting registration data for spam – Registration directory service abuse – harvesting personal contact information from domain name registration records – Rationale: These are problems at the 2 nd level, not a threat to the DNS In some instances these are policy issues that do not threaten the DNS In some cases the IETF is discussing the issue and we will monitor that discussion (harvesting registration data for spam)

Vulnerabilities (Draft – for discussion only) Operational issues – Infrastructure vulnerabilities (e.g. single point of failure, DNS software vulnerabilities, insufficient SLA’s etc.) – Business and technical process vulnerabilities (e.g. orphaned glue records, lock-outs, TLD redelegation, etc.) Registry failure and continuity Managerial choices/issues – Not following best practices (e.g. measures to detect/prevent unauthorized changes, etc.) – Gaps in continuity planning (e.g. responsibilities, actions, documentation, etc.) – Inadequate funding/resources (for infrastructure, training, staff, etc.) – Lack of visibility/understanding by decision-makers

Criteria (Note: this is very-early draft)

Questions? This “scoping” work is well along, but not complete. We are interested in your thoughts