Operated by Los Alamos National Security, LLC for NNSA U N C L A S S I F I E D LANS Company Sensitive — unauthorized release or dissemination prohibited.

Slides:



Advertisements
Similar presentations
The Union Makes Us Strong National Presidents Conference American Postal Workers Union, AFL-CIO.
Advertisements

!! Are we under attack !! Consumer devices continue to invade *Corporate enterprise – just wanting to plug in* Mobile Device Management.
Service Manager for MSPs
Information Technology (IT) activities and careers. Source:
Network Security Essentials Chapter 11
CTS IT Security Enhancement Projects December 10, 2014.
Firewalls By Tahaei Fall What is a firewall? a choke point of control and monitoring interconnects networks with differing trust imposes restrictions.
Attack Graphs for Proactive Digital Forensics Tara L. McQueen Delaware State University Louis P. Wilder Computational Sciences and Engineering Division.
I would like to thank Louis P. Wilder and Dr. Joseph Trien for the opportunity to work on this project and for their continued support. The Research Alliance.
Espionage Indicators Updated 08/21/13 U.S. Department of Commerce Office Of Security (OSY) Security is Everyone's Responsibility 1 Briefing.
SALSA-NetAuth SALSA-FWNA BoF Kevin Miller Duke University Internet2 Member Meeting May 2005.
2009 Architecture Plan Overview 2009 Architecture Plan Overview.
1 7/24/09 National Nuclear Security Administration Office of Defense Nuclear Security (DNS) DNS Security Lessons Learned Program Ted Wyka Director, Security.
Chapter 10: Data Centre and Network Security Proxies and Gateways * Firewalls * Virtual Private Network (VPN) * Security issues * * * * Objectives:
Chapter 11 Firewalls.
Novell iChain ® 2.x Configuration Using the Web Server Accelerator Wizard Cary Andrews Senior Software Engineer Novell, Inc.
LLNL and LANL Portal Update Cathy Aaron, Lawrence Livermore National Laboratory Katherine Norskog, Los Alamos National Laboratory Presented at InterLab.
Operated by Los Alamos National Security, LLC for NNSA U N C L A S S I F I E D Slide 1 Roles Based Network Access Controls James R. Clifford Los Alamos.
Chapter 10 Managing the Delivery of Information Services.
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. Security Policies and Implementation Issues.
Firewall 2 * Essential Network Security Book Slides. IT352 | Network Security |Najwa AlGhamdi 1.
Introduction to Systems Analysis and Design
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
IDENTITY MANAGEMENT: PROTECTING FROM THE INSIDE OUT MICHAEL FORNAL, SECURITY ANALYST PROVIDENCE HEALTH & SERVICES SOURCE SEATTLE CONFERENCE
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Unify and Simplify: Security Management
Responding to a Security Incident Maryland Security Day March 2, 2004 Joy Hughes, CIO
70-411: Administering Windows Server 2012
Chapter 12 by Lisa Reeves Bertin Securing Information in a Network.
Operated by Los Alamos National Security, LLC for the U.S. Department of Energy’s NNSA U N C L A S S I F I E D Slide 1 Nick Salazar Operations Support.
Lead Management Tool Partner User Guide March 15, 2013
Operated by Los Alamos National Security, LLC for the U.S. Department of Energy’s NNSA U N C L A S S I F I E D Lessons Learned: Certification and Accreditation.
1 Chapter 12: VPN Connectivity in Remote Access Designs Designs That Include VPN Remote Access Essential VPN Remote Access Design Concepts Data Protection.
Module 11: Remote Access Fundamentals
U.S. Department of Agriculture eGovernment Program July 15, 2003 eAuthentication Initiative Pre-Implementation Status eGovernment Program.
EMBA 8021 Nothing in the world can take the place of PERSISTENCE. Talent will not; nothing is more common than unsuccessful men with talent. Genius will.
CPT 123 Internet Skills Class Notes Internet Security Session A.
OCTAVE-S on TradeSolution Inc.. Introduction Phase 1: Critical Assets and threats Phase 2: Critical IT Components Phase 3: Changes Required in current.
Government Isn’t Broken: How to Work the System and Beat the Odds A Presentation from Stephanie Vance, the Advocacy Guru.
Data Base Systems Some Thoughts. Ethics Guide–Nobody Said I Shouldn’t Kelly make a backup copy of his company’s database on CD and took it home and installed.
Network Monitor By Zhenhong Zhao. What is the Network Monitor? The Network Monitor is a tool that gets information off of the host on the LAN. – Enumerating.
1 Copyright © 2012 Mahindra & Mahindra Ltd. All rights reserved. 1 Defect Management - Process and Roles.
Practical Distributed Authorization for GARA Andy Adamson and Olga Kornievskaia Center for Information Technology Integration University of Michigan, USA.
IT Security Policies and Campus Networks The dilemma of translating good security policies to practical campus networking Sara McAneney IT Security Officer.
Csci5233 Computer Security & Integrity 1 Overview of Security & Java (based on GS: Ch. 1)
PRESENTATION TITLE Presented by: Xxxx Xxxxx. Providence Health & Services Very large Catholic healthcare system 33 hospitals in AK, CA, MT, OR, WA 65,000.
Operated by the Southeastern Universities Research Association for the U.S. Depart. Of Energy Thomas Jefferson National Accelerator Facility Mike Memory.
University of Washington Collaboration: Identity and Access Management Lori Stevens University of Washington October 2007.
Module 6: Network Policies and Access Protection.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Operated by Los Alamos National Security, LLC for NNSA U N C L A S S I F I E D Slide 1 Managing Network Threat Information  Giri Raichur, Network Services.
Module 5: Network Policies and Access Protection
Access Control for Security Management BY: CONNOR TYGER.
Operated by Los Alamos National Security, LLC for NNSA U N C L A S S I F I E D Operated by Los Alamos National Security, LLC for NNSA U N C L A S S I F.
Regan Little. Definition Methods of Screening Types of Firewall Network-Level Firewalls Circuit-Level Firewalls Application-Level Firewalls Stateful Multi-Level.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
Operated by Los Alamos National Security, LLC for the U.S. Department of Energy’s NNSA U N C L A S S I F I E D LANL Unclassified Network Re-engineering.
Virtual Directory Services and Directory Synchronization May 13 th, 2008 Bill Claycomb Computer Systems Analyst Infrastructure Computing Systems Department.
Operated by Los Alamos National Security, LLC for DOE/NNSA LANS Company Sensitive — unauthorized release or dissemination prohibited U N C L A S S I F.
Developing a Network Security Policy By: Chris Catalano.
The Acceptable Use of Technology
Chapter 14 Network Management
Managing the Delivery of Information Services
IS4550 Security Policies and Implementation
السلوك التنظيمى المعاصر
Contact Center Security Strategies
How to Mitigate the Consequences What are the Countermeasures?
Lecture 3: Secure Network Architecture
CEBAF Control System Access
IS4680 Security Auditing for Compliance
Presentation transcript:

Operated by Los Alamos National Security, LLC for NNSA U N C L A S S I F I E D LANS Company Sensitive — unauthorized release or dissemination prohibited Slide 1 Randall (Randy) Cardon Los Alamos National Laboratory, an affirmative action/equal opportunity employer, is operated by the Los Alamos National Security, LLC for the National Nuclear Security Administration of the U.S. Department of Energy under contract DE-AC52-06NA By acceptance of this article, the publisher recognizes that the U.S. Government retains a nonexclusive, royalty-free license to publish or reproduce the published form of this contribution, or to allow others to do so, for U.S. Government purposes. Los Alamos National Laboratory requests that the publisher identify this article as work performed under the auspices of the U.S. Department of Energy. Los Alamos National Laboratory strongly supports academic freedom and a researcher’s right to publish; as an institution, however, the Laboratory does not endorse the viewpoint of a publication or guarantee its technical correctness. Privileged User Access for Non-US Citizens LA-UR

Operated by Los Alamos National Security, LLC for NNSA U N C L A S S I F I E D LANS Company Sensitive — unauthorized release or dissemination prohibited

Operated by Los Alamos National Security, LLC for NNSA U N C L A S S I F I E D LANS Company Sensitive — unauthorized release or dissemination prohibited Slide 3 Things I’m Glad I Didn’t Say “Everything that can be invented has been invented.” “I think there is a world market for maybe five computers.” “Get your feet off my desk, get out of here, you stink, and we're not going to buy your product.” “There is no reason for any individual to have a computer in his home” “640K ought to be enough for anybody.”

Operated by Los Alamos National Security, LLC for NNSA U N C L A S S I F I E D LANS Company Sensitive — unauthorized release or dissemination prohibited Things I Wish I’d Said "However beautiful the strategy, you should occasionally look at the results.“ “Great leaders tell people what to do not how to do their jobs. They allocate resources, and give them authority.”

Operated by Los Alamos National Security, LLC for NNSA U N C L A S S I F I E D LANS Company Sensitive — unauthorized release or dissemination prohibited Contact Information Randy Cardon (505)

Operated by Los Alamos National Security, LLC for NNSA U N C L A S S I F I E D LANS Company Sensitive — unauthorized release or dissemination prohibited Multiple Tools Database for International Visits and Assignments (DIVA) Open Collaborator Enclave (OCE) Privileged User Access Request (PUAR)

Operated by Los Alamos National Security, LLC for NNSA U N C L A S S I F I E D LANS Company Sensitive — unauthorized release or dissemination prohibited DIVA The requirements were provided by Foreign Visits and Assignments. The implementation was done by LDRD

Operated by Los Alamos National Security, LLC for NNSA U N C L A S S I F I E D LANS Company Sensitive — unauthorized release or dissemination prohibited How Does DIVA Work DIVA does the following: Captures visitor and visit or assignment information as a request Routes the request for reviews and approvals Authorizes Badging Visit Requests Reviews and Approvals Badge

Operated by Los Alamos National Security, LLC for NNSA U N C L A S S I F I E D LANS Company Sensitive — unauthorized release or dissemination prohibited User Roles and Actions

Operated by Los Alamos National Security, LLC for NNSA U N C L A S S I F I E D LANS Company Sensitive — unauthorized release or dissemination prohibited Review and Approval Yes Return Yes Retur n Yes No Yes Return No Yes

Operated by Los Alamos National Security, LLC for NNSA U N C L A S S I F I E D LANS Company Sensitive — unauthorized release or dissemination prohibited OCE The initial concept and design were done by ACS-PO The implementation was done by NIE

Operated by Los Alamos National Security, LLC for NNSA U N C L A S S I F I E D LANS Company Sensitive — unauthorized release or dissemination prohibited OCE Enclave Access

Operated by Los Alamos National Security, LLC for NNSA U N C L A S S I F I E D LANS Company Sensitive — unauthorized release or dissemination prohibited Goals Create a network that is segmented from the Yellow for FN systems to meet HQ expectations. Meet the NAP requirements through engineered controls. Demonstrate a new model architecture for the LANL unclassified environment that provides greater data protection, access flexibility and control, and monitoring for various use profiles of LANL unclassified computing. Provide near real-time access management updates for Inter-enclave access with enforced business rules. Develop enhance surveillance to detect unauthorized access.

Operated by Los Alamos National Security, LLC for NNSA U N C L A S S I F I E D LANS Company Sensitive — unauthorized release or dissemination prohibited OCE Design OCE Control OCE Gateway Enclave Membership and Access Management Diva Net Devices Business Rules Cyber Monitoring Authentication Logs Remote Access OCE Host Yellow Network Resource SSL VPN

Operated by Los Alamos National Security, LLC for NNSA U N C L A S S I F I E D LANS Company Sensitive — unauthorized release or dissemination prohibited Access Control Features User Based Authenticated Access to specific Yellow assets. OCE Control manages access control. User Role based access. — Role = Yellow Assets & Who can access them. Yellow Monitoring Key indicators are monitored for unauthorized OCE access. OCE Members can only access the OCE resources and those yellow resources that a member is authorized through roles. Jumping from authorized Yellow resources to non-authorized resources will be detected. Bypassing OCE Gateway will also be detected using this system. Remote Access Remote OCE Users see same access control polices as local.

Operated by Los Alamos National Security, LLC for NNSA U N C L A S S I F I E D LANS Company Sensitive — unauthorized release or dissemination prohibited Use Cases OCE Member On-Site from OCE to Yellow/Internet Off-Site To OCE or Yellow On-Site outside OCE User Authentication Non-Auth Non OCE Member outside OCE User Authentication Any Access“Source” Central Authentication “on” Access List Non-Auth User based “roles” define access. Yellow Web Proxy Unauthenticated Access: Yellow Controls OCE “Out” IP-based Access Rules User based “roles” define access. None. “Source” Central Authentication “off” Access List Unauthorized Access User based Access Controls to Data OCE Resource Any Access OCE Firewall Access List

Operated by Los Alamos National Security, LLC for NNSA U N C L A S S I F I E D LANS Company Sensitive — unauthorized release or dissemination prohibited PUAR Requirements were developed by OCIO Implementation was done by SAE

Operated by Los Alamos National Security, LLC for NNSA U N C L A S S I F I E D LANS Company Sensitive — unauthorized release or dissemination prohibited PUAR Workflow

Operated by Los Alamos National Security, LLC for NNSA U N C L A S S I F I E D LANS Company Sensitive — unauthorized release or dissemination prohibited Questions? “Nothing in the world can take the place of persistence. Talent will not; nothing is more common than unsuccessful men with talent. Genius will not; unrewarded genius is almost a proverb. Education will not; the world is full of educated derelicts. Persistence and determination alone are omnipotent.” Calvin Coolidge