Information Systems & Computing Leadership Needed: Creating and Implementing an Information Security Vision M. Jost, D.Kassabian, D.Millar University of.

Slides:



Advertisements
Similar presentations
Copyright Kathy J. Lang and Ed Mahon, This work is the intellectual property of the authors. Permission is granted for this material to be shared.
Advertisements

Evaluating IT Professionals Through Values - Based Performance Appraisal Systems February 17, 2005 Presented by: Jenifer Jarriel and Mary Sloan.
Making Sense out of the Information Security and Privacy Alphabet Soup in terms of Data Access A pragmatic, collaborative approach to promulgating campus-wide.
Lynn Ray ISO Towson University Strategic Planning for IT Security Copyright Lynn Ray, This work is the intellectual property rights of the author.
Copyright Princeton University This work is the intellectual property of Princeton University. Permission is granted for this material to be shared.
Andrea Eastman-Mullins Information & Technology Coordinator University of North Carolina, Office of the President Teaching and Learning with Technology.
Making the Case for Security: An Application of the NIST Security Assessment Framework to GW January 17, 2003 David Swartz Chief Information Officer Guy.
Southwest Educause 2003 © Baylor University 2003 Adapting Enterprise Security to a University Environment Bob Hartland Director of IT Servers and Network.
Yale University Information Technology Services Administrative Systems Art Hunt 3/22/04 Software Service Level Agreement with Finance, Procurement and.
Copyright Jill M. Forrester This work is the intellectual property of the author. Permission is granted for this material to be shared for non- commercial,
Educause Security 2007ISC Information Security Copyright Joshua Beeman, This work is the intellectual property of the author. Permission is granted.
Advancing Security Programs through Partnerships Cathy HubbsShirley Payne IT Security Coordinator Director for Security Coordination & Policy George Mason.
Information Security Policies and Standards
August 9, 2005 UCCSC IT Security at the University of California A New Initiative Jacqueline Craig. Director of Policy Information Resources and.
Cybersecurity Summit 2004 Andrea Norris Deputy Chief Information Officer/ Director of Division of Information Systems.
UCCSC 8/3/04 Pursuit of IT Security Lessons Learned Huapei Chen -- Director of IT, EECS Alex Brown – Project Lead, EECS Department of Electrical Engineering.
SIRT Contact Orientation Security Incident Response Team Departmental Security Contacts April 16, 2004.
The Journey Toward 24/7 IT Monitoring University of North Carolina at Greensboro Design and Build of Network Operations Center Copyright Thomas M. Sheriff,
UWM CIO Office A Collaborative Process for IT Training and Development Copyright UW-Milwaukee, This work is the intellectual property of the author.
Pam Downs Ajay Gupta The Pennsylvania Prince George’s State University Community College "Copyright Penn State University This work is the intellectual.
IT Strategic Planning From Technical Dreams to Institutional Reality
Copyright Statement © Jason Rhode and Carol Scheidenhelm This work is the intellectual property of the authors. Permission is granted for this material.
Chatham College Community and Computers Pervasive Computing at a Liberal Arts College Charlotte E. Lott, Ph. D. Lynda Barner West, Ed. D. Copyright Charlotte.
Copyright Anthony K. Holden, This work is the intellectual property of the author. Permission is granted for this material to be shared for non-commercial,
Wireless LANs A Case Study of Baylor University’s Wireless Network Copyright Bob Hartland 2002 This work is the intellectual property of the author. Permission.
Copyright Shanna Smith & Tom Bohman (2003). This work is the intellectual property of the authors. Permission is granted for this material to be shared.
IS&T Project Management: How to Engage the Customer September 27, 2005.
Technologically Disinclined A presentation to EDUCAUSE Fall, 2002 Copyright Kathy Luker and Scott Manley, This work is the intellectual property.
Risk Assessment 101 Kelley Bradder VP and CIO Simpson College.
Security Issues on Campus: Government Initiatives Rodney J. Petersen University of Maryland Educause/Internet2 Security Task Force Copyright Rodney J.
Security Awareness: Taking the Medicine and Liking It Shirley C. Payne Director for Security Coordination University of Virginia EDUCAUSE Conference October.
So You Want to Switch Course Management Systems? We Have! Come Find Out What We’ve Learned. Copyright University of Okahoma This work is the intellectual.
Information Security Governance in Higher Education Policy2004 The EDUCAUSE Policy Conference Gordon Wishon EDUCAUSE/Internet 2 Security Task Force This.
1 Outsourcing Student & Other Collaboration Services Wendy Woodward Director, Technology Support Services Copyright Wendy Woodward This work.
Putting the We in… We are Penn State! Copyright [Carol Findley, Lisa Dibert] [2003]. This work is the intellectual property of the authors. Permission.
Next Generation Strategic Planning for Educational Technology and IT: A Study of Process and Engagement Deborah Keyek-Franssen and Marin Stanek IT Initiatives.
Incident Response From the Ground Up Ellen Young and Adam Goldstein Dartmouth College NERCOMP March 11, 2008.
Lynette Olson, Assessment & Effectiveness Director & Gary Langer, Associate Vice Chancellor, Office of the Chancellor, Minnesota State Colleges and Universities.
Stanford’s Patch Management Project   Ced Bennett May 17, 2004 Copyright Cedric Bennett This work is the intellectual property of the author. Permission.
Security Risk Management Marcus Murray, CISSP, MVP (Security) Senior Security Advisor, Truesec
Serving MERLOT on Your Campus Gerry Hanley California State University and MERLOT Seminars on Academic Computing August 7, 2002 Snowmass CO Copyright Gerard.
1/17/07 1SCC-SSM Supporting Academic Needs: A Strategic Customer Care Sustainable Support Model Educause Mid-Atlantic Regional Conference 2007 Paul Halpine.
Intrusion Detection MIS ALTER 0A234 Lecture 11.
Chapter 3 Internal Controls.
Office of Information Technology Balancing Technology and Privacy – the Directory Conundrum January 2007 Copyright Barbara Hope and Lori Kasamatsu 2007.
Value & Excitement University Technology Services Oakland University Information Technology Strategic Planning Theresa Rowe October 2004 Copyright Theresa.
Discussion Panelists: Justin C. Klein Keane Sr. Information Security Specialist University of Pennsylvania Jonathan Hanny Application Security Specialist.
Chapter 6 of the Executive Guide manual Technology.
March 21, 2006 NERCOMP 2006 Worcester, Massachusetts 1 Copyright Sunny Donenfeld, This work is the intellectual property of the author. Permission.
Safeguarding Research Data Policy and Implementation Challenges Miguel Soldi February 24, 2006 THE UNIVERSITY OF TEXAS SYSTEM.
ISC Networking & Telecommunications Migrating from Centrex to IP Telephony at Penn EDUCAUSE MARC 2006 Melissa Muth & Dawn Augustino University of Pennsylvania.
STRATEGY SESSION SEPTEMBER 15, YEAR SECURITY DISCUSSION 1 NETWORK PLANNING TASK FORCE.
Copyright © 2003, The University of Texas at Austin. This work is the intellectual property of the author. Permission is granted for this material to be.
The Impact of Evolving IT Security Concerns On Cornell Information Technology Policy.
Cdigix at Yale Chuck Powell Director, Academic Media & Technology, ITS Yale University September 15, 2004 Copyright Charles Powell.
Improving the Social Nature of OnLine Learning Tap into what students are already doing Tap into what students are already doing Educause SWRC07 Copyright.
Rob Davidson, Partner Technology Specialist Microsoft Management Servers: Using management to stay secure.
12/15/20031 Network Planning Task Force “Consensus Building: Final Rate Setting for FY ‘05”
Quickly Establishing A Workable IT Security Program EDUCAUSE Mid-Atlantic Regional Conference January 10-12, 2006 Copyright Robert E. Neale This.
NMI-EDIT and Rice University Federated Identity Management: Managing Access to Resources in Texas Barry Ribbeck Director System Architecture and Infrastructure.
Information Security Office: Function, Alignment in the Organization, Goals, and Objectives Presentation to Sacramento PMO March 2011 Kevin Dickey.
Practical IT Research that Drives Measurable Results Establish an Effective IT Steering Committee.
University of Southern California Identity and Access Management (IAM)
SupportU 24x7: Implementing and Maintaining a Co-Managed Help Desk
Adapting Enterprise Security to a University Environment
Defining an IT Workflow, from Request to Support
IT Development Initiative: Status and Next Steps
University of Southern California Identity and Access Management (IAM)
IS4680 Security Auditing for Compliance
Fy ‘08 NETWORK PLANNING TASK FORCE
Presentation transcript:

Information Systems & Computing Leadership Needed: Creating and Implementing an Information Security Vision M. Jost, D.Kassabian, D.Millar University of Pennsylvania EDUCAUSE 2004 Annual Meeting Copyright Trustees of the University of Pennsylvania This work is the intellectual property of the author. Permission is granted for this material to be shared for non-commercial, educational purposes, provided that this copyright statement appears on the reproduced materials and notice is given that the copying is by permission of the author. To disseminate otherwise or to republish requires written permission from the author.

Information Systems & Computing About Penn The University of Pennsylvania was founded by Ben Franklin in 1740 Penn is part of the Ivy League Located in western Philadelphia Community of more than 35,000 people

Information Systems & Computing IT at Penn (1 of 2) Centrally provided administrative applications –Student, Financial and HR systems Distributed academic computing Centrally provided data network, PennNet: –35,000 ports of 10/100 Ethernet –200 campus buildings –1.3 Gbps Internet access

Information Systems & Computing IT at Penn (2 of 2) IT funding, management, user support and decision making are very distributed at Penn IT governance and coordination is well established –University CIO –IT Roundtable - Computing Directors –SUG - IT support professionals and developers –NPTF - Financial planners, networking charges –NPC - cross section, developing network policies

Information Systems & Computing Situation in Summer’03 Security administration, including patching of operating systems, uneven across campus Anti-virus software on most computers in campus departments, but fewer in residences Student systems becoming compromised at an alarming rate Staff time costs in responding to security compromises was skyrocketing

Information Systems & Computing Estimated cost of Blaster/Welchia For August 2003 ITEMEST. COST 1200 compromised machines -Manage detection and notification -Format and rebuild machines -Remove Blaster from machines 15-25% 9,000 Vulnerable machines (patched twice) -20 campus-wide scans, 14 mass notifications of vulnerability -4,500 Patch automatically (twice) -4,500 Patch manually (twice) 2-3% 1-2% 30-40% Total $287,000 Lost productivity of faculty/staff machines disconnected ?

Information Systems & Computing Why not rely on perimeter firewalls? Campus firewall not a panacea UniversityDate Netbios ports blocked # Windows machines # infected % infected Penn9/11/200311,0001,20011% Large state university7/28/200312,0001,50013% Ivy League peer1/2/200218,0003,14617%

Information Systems & Computing Freedom and Responsibility in personal computing Can we mandate desktop security practices? Do we reduce user freedom in in the name of security? Many in academia are accustomed to great freedom in managing their computers and software Freedom and autonomy are not necessarily at odds with security and legal risks –(with freedom comes responsibility) We needed security vision, complete with user education, balanced policy, technical support, and adequate funding to improve security

Information Systems & Computing Security Vision and Plan Vision Get the user community on board Make security the default wherever possible Promote achievable, affordable plans Treat security vision as an ongoing process with a two-year horizon Plan Develop defense-in-depth layered technical approach, including: –Prevention: Anti-virus, patching, secure configs, limited filtering / firewalling –Detection: Vulnerability scanning, IDS, server log reviews –Response: removal of compromised hosts from networks, limited network filtering, strong communications Develop policy, best practices, and end-user communication Communicate benefits to users and their IT support professionals Secure sustainable funding for the key initiatives

Information Systems & Computing Building Campus Consensus Risk Assessment to establish priorities –Security discussed informally among security, networking, other central and distributed IT organizations –General consensus on the layered approach Prevention: Patch management, anti-virus, education Detection: intrusion detection, vulnerability scanning Response: locating machines and incident management

Information Systems & Computing Building Campus Consensus Network Planning Taskforce –Security discussions over several meetings –Risk discussed in terms of prioritization and specific components of the layered approach –Specific components discussed Patching –Managed vs Unmanaged –Options: Windows, Software Update Server (SUS), Systems management server (SMS), commercial products e.g. HFNetChk Pro, PatchLink, BigFix –Special challenges patching students »Machines we don’t own but need participation from owners »Privacy issues

Information Systems & Computing Building Campus Consensus Network Planning Taskforce –Specific components discussed Virus filtering on mail servers –Campus-wide vs individual servers Firewalls/routing, VPNS, personal firewalls –Explained the concepts, terminology and how each work –Discussed pros and cons of different types of implementations Secure out of the box –Default images with strong authentication on truckload sale and Penn machines

Information Systems & Computing Building Campus Consensus Network Planning Taskforce –Specific components discussed Vulnerability scanning –Past results –Options to implement at a local level »Develop tools for local support providers –Options to implement on the network at a central level »IDS boxes, router flow logs Better ways to locate compromised and vulnerable machines –General agreement on security direction for Penn reached

Information Systems & Computing Building Campus Consensus Network Policy Committee –Worked to establish the policy needed to support the agreed to direction –Earlier had implemented standards for the most critical machines on campus –Recently approved: PennNet Computer Security Policy (Patch Management Policy) Critical updates to all campus connected systems must be applied within three business days or computer may be disconnected from the network Approved in June 2004; Implemented in September 2004

Information Systems & Computing Building Campus Consensus Patch Management Policy –Draft out to IT community for review before final approval –Comments and changes strengthened the policy –Discussed with University management to gain appropriate support as policy has broad impact –Communicated to the campus community through several types of communications University publications, newpaper, newsletter Presentations to several IT groups throughout campus

Information Systems & Computing Building Campus Consensus Summary –Many people were involved –Discussion at different levels within the organization –Education of community Prioritization using a layered approach What technology was available and how it worked Options and costs to consider –Input welcomed and incorporated into the solution –Participation from community resulted in best solution –Implementation plan developed

Information Systems & Computing Funding Funding the Implementation Plan –Costs of implementation were estimated Included costs across all of the central IT organizations, not just networking and security –Funding Source options considered –Start with the most likely Central University Funds NPTF – group that helps set annual user fees for network

Information Systems & Computing Funding Funding Options –University funding for central organizations severely constrained –NPTF liked the plan, hated the cost Funding for the schools constrained Looking for network costs to remain flat or go down Wanted a more secure network without additional costs Believed central university funding should pay for security or students should pay for their share of the burden

Information Systems & Computing Funding Students –Student behavior and computing support structure was a large cost driver –Bring unpatched, sometimes infected machines back to campus and plug into network –Support for undergraduates in residences provided by student residents not University employees –Limited or no support for Fraternities and Graduate students on campus, off-campus students bringing laptops on campus

Information Systems & Computing Funding Funding Proposal –Identified the portion of costs attributable to faculty and staff and separated it from costs attributable to students –Identified key executives financially responsible for student support –Developed presentation to educate execs about the need for security and the cost of delivering it Target audience was Business Administrators, not IT personnel Framed in terms of productivity loss of both end users and IT support personnel due to Blaster

Information Systems & Computing Funding Meetings to Look for Funding – Met individually with several key executives that dealt with students Agreed that money was needed and issues were valid No initial agreement on where it should come from Agreed to support a plan for funding to come from student fees via the organizations who collected the fees –Final meeting with all the key players Agreed on student funding for ongoing costs

Information Systems & Computing Funding Final Funding Sources Identified –Network Charge would include funding for faculty and staff –Student resident fee (not rent) would increase to cover undergraduates on campus –Fraternities would pay a surcharge for their network connections –Graduates and off campus funds would come from the Provost and/or central University funding –One time costs to implement would be paid for by central IT organization

Information Systems & Computing Funding Summary –Funding constraints made it impossible to receive all required funding from existing funding sources –Tension between responsibility for funding students and funding faculty/staff played an important role in final solution –Case for additional funding requests needed to show the benefit/added value the plan would deliver to those paying for it –Educating customers on those benefits is a critical success factor

Information Systems & Computing Implementation Challenges: 500+ LSPs, 30,000+ end users Leverage points: –PennConnect CD (Internet Connection Firewall) –Back-to-School Truckload Sale –Prizes and drawings to build awareness –Mass , banner ads in Daily Pennsylvanian –Vulnerability scanning –Supporting patch management service

Information Systems & Computing Implementation Tasks –Evaluate firewalls –Communications plan –Secure Out of the Box – (Dell & IBM images) –PennConnect CD –Security awareness quiz (iPod giveaway) –Implement patch management service & supporting documentation –Contingency plans for router filtering Phased implementation: 8/04 – 9/04 - Communications and awareness 9/04 – 12/04 – Vulnerability scanning and “warning letters” 1/1/05 – Disconnect machines not in compliance

Information Systems & Computing Implementation Communications Plan –Identify target audiences (students vs. faculty/staff vs. LSPs) –Identify key messages (“enroll in patch management” vs. establish a patch management service for your users”) –Develop a “media plan” – target vehicles, dates, deadlines, etc.

Information Systems & Computing Media Plan

Information Systems & Computing Implementation

Information Systems & Computing Implementation

Information Systems & Computing Implementation

Information Systems & Computing Results We now have a program to keep systems secure, rather than dealing with everything as a “one-off” 5300 students/1000 faculty staff took the security quiz 72% fewer machines compromised Fall, 2004 vs. Fall, 2003 Overall sense of campus IT leadership that Fall, 2004 went a lot more smoothly than 2003, though we were also lucky

Information Systems & Computing Lessons Learned Present security initiatives as a business case. Measure the cost of poor security whenever you can. ROI’s sell projects. Gain support with appropriate discussions from operational management to executive level. Make strategic planning and budgeting processes transparent to your clients. It was truly amazing to be able to establish a campus consensus for mandatory security standards for all campus machines. Structured and consultative policy development, with a thorough vetting process, yields workable, enforceable policies with a high probability of changing behavior.

Information Systems & Computing Lessons Learned Don’t try to go too fast. Allow time to assimilate change. Funding models should drive costs back to their source; administrative units don’t like footing the bill for residential student security problems. Always coordinate end user communications with LSPs. Support large policy changes with a robust, targeted communications plan, supporting services and documentation.

Information Systems & Computing Lessons Learned Look for leverage points in developing strategies (patch management) and implementation plans (communications, incentives, mass communications).