University of Alaska System and UAF Information Technology Security Review 2007.

Slides:



Advertisements
Similar presentations
IT Security Policy Framework
Advertisements

Information Privacy and Data Protection Lexpert Seminar David YoungDecember 9, 2013 Breach Prevention – Due Diligence and Risk Reduction.
Secure Systems Research Group - FAU Process Standards (and Process Improvement)
Information Risk Management Key Component for HIPAA Security Compliance Ann Geyer Tunitas Group
© 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential 14854_10_2008_c1 1 Holistic Approach to Information Security Greg Carter, Cisco Security.
JEFF WILLIAMS INFORMATION SECURITY OFFICER CALIFORNIA STATE UNIVERSITY, SACRAMENTO Payment Card Industry Data Security Standard (PCI DSS) Compliance.
JARED BIRD Nagios: Providing Value Throughout the Organization.
CPIS 357 Software Quality & Testing I.Rehab Bahaaddin Ashary Faculty of Computing and Information Technology Information Systems Department Fall 2010.
Colorado Cyber Security Program (CCSP) Risk Based Gap Analysis (RBGA) and Statewide Security Planning Update Rick Dakin, Security Strategist September.
Smart Grid - Cyber Security Small Rural Electric George Gamble Black & Veatch
Security Controls – What Works
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. Security Policies and Implementation Issues.
Payment Card Industry (PCI) Data Security Standard
Brian Bradley.  Data is any type of stored digital information.  Security is about the protection of assets.  Prevention: measures taken to protect.
Patch Management Strategy
Ferst Center Incident Incident Identification – Border Intrusion Detection System Incident Response – Campus Executive Incident Response Team Incident.
A Comprehensive Solution Team Mag 5 Valerie B., Derek C., Jimmy C., Julia M., Mark Z.
Information Security Framework & Standards
No one questions that Microsoft can write great software. Customers want to know if we can be innovative, scalable, reliable in the cloud. (1996) 450M+
SEC835 Database and Web application security Information Security Architecture.
Lesson 8-Information Security Process. Overview Introducing information security process. Conducting an assessment. Developing a policy. Implementing.
INFORMATION SECURITY REGULATION COMPLIANCE By Insert name dd/mm/yyyy senior leadership training on the primary regulatory requirements,
General Awareness Training
A NASSCOM ® Initiative DSCI-KPMG Survey 2010 State Of Data Security and Privacy in the Indian Banking Industry Vinayak Godse Director- Data Protection,
HIPAA COMPLIANCE WITH DELL
What Keeps You Awake at Night Compliance Corporate Governance Critical Infrastructure Are there regulatory risks? Do employees respect and adhere to internal.
Security Baseline. Definition A preliminary assessment of a newly implemented system Serves as a starting point to measure changes in configurations and.
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
Chapter 6 of the Executive Guide manual Technology.
Sample Security Model. Security Model Secure: Identity management & Authentication Filtering and Stateful Inspection Encryption and VPN’s Monitor: Intrusion.
April 14, A Watershed Date in HIPAA Privacy Compliance: Where Should You Be in HIPAA Security Compliance and How to Get There… John Parmigiani National.
Unit 6b System Security Procedures and Standards Component 8 Installation and Maintenance of Health IT Systems This material was developed by Duke University,
Ali Pabrai, CISSP, CSCS ecfirst, chairman & ceo Preparing for a HIPAA Security Audit.
Working with HIT Systems
Data Governance 101. Agenda  Purpose  Presentation (Elijah J. Bell) Data Governance Data Policy Security Privacy Contracts  FERPA—The Law  Q & A.
Converting Policy to Reality Designing an IT Security Program for Your Campus 2 nd Annual Conference on Technology and Standards May 3, 2005 Jacqueline.
Lesson 19-E-Commerce Security Needs. Overview Understand e-commerce services. Understand the importance of availability. Implement client-side security.
Security fundamentals Topic 2 Establishing and maintaining baseline security.
STANFORD UNIVERSITY RESEARCH COMPUTING Are we outliers? Institutional minimum security requirements RUTH MARINSHAW OCTOBER 14, 2015.
Security Discussion IST Retreat June IT Security Statement definition In the context of computer science, security is the prevention of, or protection.
Introduction and Overview of Information Security and Policy By: Hashem Alaidaros 4/10/2015 Lecture 1 IS 332.
Information Security Framework Regulatory Compliance and Reporting Auditing and Validation Metrics Definition and Collection Reporting (management, regulatory,
(2011) Security Breach Compromises 75,000 Staff/Student Social Security Numbers Image from this Site Presenters: Aron Eisold, Matt Mickelson, Bryce Nelson,
E-Commerce E-Commerce Security?? Instructor: Safaa S.Y. Dalloul E-Business Level Try to be the Best.
CYBERSECURITY: RISK AND LIABILITY March 2, 2016 Joshua A. Mooney Co-chair-Cyber Law and Data Protection White and Williams LLP (215)
By: Matt Winkeler.  PCI – Payment Card Industry  DSS – Data Security Standard  PAN – Primary Account Number.
HHS Security and Improvement Recommendations Insert Name CSIA 412 Final Project Final Project.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
INFORMATION ASSURANCE POLICY. Information Assurance Information operations that protect and defend information and information systems by ensuring their.
Computer Science / Risk Management and Risk Assessment Nathan Singleton.
InfoSecurity Compliance Are you ready to be regulated? Presented by: Umesh Verma CEO, BLUE LANCE
Blackboard Security System
Enhancing Network Security
Chapter 7. Identifying Assets and Activities to Be Protected
Securing Network Servers
Critical Security Controls
Patch Management Patch Management Best Practices
Security Standard: “reasonable security”
Secure Software Confidentiality Integrity Data Security Authentication
Introduction to the Federal Defense Acquisition Regulation
BUILDING A PRIVACY AND SECURITY PROGRAM FOR YOUR NON-PROFIT
IS4680 Security Auditing for Compliance
Chapter # 3 COMPUTER AND INTERNET CRIME
Designing IIS Security (IIS – Internet Information Service)
CMGT/431 INFORMATION SYSTEMS SECURITY The Latest Version // uopcourse.com
CMGT 431 CMGT431 cmgt 431 cmgt431 Entire Course // uopstudy.com
Presentation transcript:

University of Alaska System and UAF Information Technology Security Review 2007

The CH2M HILL - Coalfire Systems Team l The CH2M HILL Team delivers industry-leading Information Technology (IT) security services. l The Team has delivered more than 300 IT security assessments and remediation planning engagements to clients, including recent projects for:  University environments, including the University of Colorado and California systems  States of Colorado, Florida, Iowa, Oregon, and Oklahoma  County and City governments in multiple states  U.S. Department of Energy, Centers for Disease Control and Prevention  Hundreds of banks and financial institutions  Hospitals and health insurance companies l Apply methodologies that enable transfer of knowledge and enhance client capability for ongoing IT security programs ATTWP_101_1

Compliance Trends Present A Brief History of Regulatory Time Computer Security Act of 1987 EU Data Protection HIPAA FDA 21CFR Part 11 C6-Canada GLBA COPPA USA Patriot Act 2001 EC Data Privacy Directive CLERP 9 CAN-SPAM Act FISMA Sarbanes Oxley (SOX) CIPA 2002 Basel II NERC 1200 (2003) CISP Payment Card Industry (PCI) California Individual Privacy SB1386 State Privacy Laws Privacy Act of 1974 Foreign Corrupt Practice Act of 1977

Project Overview l Evaluate the University’s business practices and procedures. Make recommendations for improving business processes. l Ensure adequate controls are in place to protect Confidentiality, Integrity, and Availability. l Identify vulnerabilities, determine their risks, and make recommendations to resolve or mitigate those risks. Project activities for the Information Security Review included: Project methodology l Internal and External Vulnerability Scans. l System Baseline analysis. l Interviews with Critical Business owners. l Compare findings against a set of Common Control Objectives. l Areas reviewed included Data Management Policies and Practices, the IT Security Program, Networks, Identity Management Directory, Authentication and Authorization Services, Database, Application Development/Support, Windows and Unix Servers, Desktop Support, Data Center Operations, Help Desk, and Telephony.

COBIT Maturity Model Level 1 Control objective documented in a security policy Level 2 Security controls documented as procedures Level 3 Procedures have been implemented Level 4 Procedures and security controls are tested and reviewed Level 5 Procedures and security controls are fully integrated into a comprehensive program Control Design AdequacyControl Effectiveness COBIT Maturity Model Level 1 Control objective documented in a security policy Level 2 Security controls documented as procedures  Current Level of the University Level 3 Procedures have been implemented Level 4 Procedures and security controls are tested and reviewed Level 5 Procedures and security controls are fully integrated into a comprehensive program Control Design AdequacyControl Effectiveness

Vulnerability Scans l Internal scans were used to evaluate the effectiveness of controls from threats internal to the University (employee or contractor). l External scans were conducted to assess the University’s vulnerabilities from an untrusted network, such as the Internet. l UAF provided CH2M HILL with a list of 137 systems to assess. Hosts were grouped into Windows and Unix systems, and reports were generated separately. Project activities for the Information Security Review included: LevelVulnerability/Possible Vulnerability Urgent Intruders can easily gain control of the host, which can lead to the compromise of your entire network security. For example, vulnerabilities at this level may include full read and write access to files, remote execution of commands, and the presence of backdoors. Critical Intruders can possibly gain control of the host, or there may be potential leakage of highly sensitive information. For example, vulnerabilities at this level may include full read access to files, potential backdoors, or a listing of all the users on the host. High Intruders may be able to gain access to specific information stored on the host, including security settings. This could result in potential misuse of the host by intruders. For example, vulnerabilities at this level may include partial disclosure of file contents, access to certain files on the host, directory browsing, disclosure of filtering rules and security mechanisms, denial of service attacks, and unauthorized use of services, such as mail- relaying. Medium Intruders may be able to collect sensitive information from the host, such as the precise version of software installed. With this information, intruders can easily exploit known vulnerabilities specific to software versions. Low Intruders can collect information about the host (open ports, services, etc.) and may be able to use this information to find other vulnerabilities.

Vulnerability Scans (Internal) Risk Levels UrgentCriticalHighMediumLow Vulnerability Possible Vulnerability Informational FindingsN/A 0522 Risk Levels UrgentCriticalHighMediumLow Vulnerability Possible Vulnerability24765 Informational FindingsN/A Unix Group 1 Windows

Vulnerability Scans (External) Unix Group 1 Windows Risk Levels UrgentCriticalHighMediumLow Vulnerability Possible Vulnerability Informational FindingsN/A 013 Risk Levels UrgentCriticalHighMediumLow Vulnerability Possible Vulnerability Informational FindingsN/A 013

Vulnerability Scans l Document any known suspicious ports for future scans. l Focus on High, Critical, and Urgent vulnerabilities first. l Only support strong encryption protocols (SSLv3, SSHv2, 3DES, AES, etc.) l Never use default SNMP strings (Public, Private) l Ensure all applications are part of a vulnerability management program, not just OS’s. l If patches cannot be deployed on schedule, document the business justification. l Conduct periodical (typically quarterly) network scans, both Internal and External (Nessus, Qualys, NeXpose, Retina, ISS, GFI, etc.) l Establish a secure baseline configuration (CIS Benchmarks, NSA, DISA, Vendors) Recommendations

Common Controls l Each area was assessed against a set of 42 common control objectives. l Each control objective was mapped to regulatory requirements, best practices, and guidelines: ISO (International Organization for Standards) COBIT 4.0 (Control Objectives for IT and Related Technology HIPAA (Health Insurance Portability and Accountability Act) NIST 800 (National Institute of Standards and Technology) GLBA (Gramm-Leach-Bliley Act ) PCI DSS (Payment Card Industry Data Security Standard) Definition

Common Controls l 42 Control Objectives Reviewed l Low Risk – 10 areas meeting control objectives  Network admins have implemented appropriate security practices  Avoid access creep, maintain appropriate service levels, and conduct regular system maintenance. l Medium Risk – 31 areas partially meeting control objectives  Missing one or more elements vs full compliance  Correct by conducting a comprehensive risk assessment, establishing additional security policies, and creating a business continuity plan based on a business impact analysis.  No “quick fixes” and requires long term commitments l High Risk – 1 area did not meet control objectives ( Media Disposition and Sanitization )  Lacking an information classification program, sensitive data inventories, and destruction standards for all media  University may not be able to detect if sensitive data is compromised or lost, or to minimize the potential impact of a data breach. Recommendations

Action To Date l Done or in process  7 of 32 Identified Risks to be resolved by January, 2008  Action plan for remaining 25 in process l Media disposition and sanitization options under review l To be done  External security reviews for UAA and UAS  Place vulnerability scans and other security reviews on a regular schedule  Identify where regulation or policy may be needed

Migration Intensive effort applied to conduct risk assessment, develop policies, deploy controls, and establish accountability. Sustaining Period Security dependent on processes and controls Heroic Period Security dependent on Individuals. Limited documentation, training and testing. Budget $ Time Security Premium Documentation Training Policies and Procedures Audit and Reporting Testing Function Growth Growth in users Expansion of applications Extended services Security Program Resource Impact