1 Mark Bruhn Indiana University IT Policy Officer.

Slides:



Advertisements
Similar presentations
Overview of local security issues in Campus Grid environments Bruce Beckles University of Cambridge Computing Service.
Advertisements

Darton College Information Systems Use Policies. Introduction Dartons Information Systems are critical resources. The Information Systems Use Policies.
Guide to Massachusetts Data Privacy Laws & Steps you can take towards Compliance.
Smart Grid - Cyber Security Small Rural Electric George Gamble Black & Veatch
Research and Educational Networking Information Analysis and Sharing Center (REN-ISAC) Mark S. Bruhn, Interim Director University Copyright.
PETs and ID Management Privacy & Security Workshop JC Cannon Privacy Strategist Corporate Privacy Group Microsoft Corporation.
 Single sign-on o Centralized and federated passport o Federated Liberty Alliance and Shibboleth  Authorization o Who can access which resource o ACM.
August 9, 2005 UCCSC IT Security at the University of California A New Initiative Jacqueline Craig. Director of Policy Information Resources and.
Cybersecurity Summit 2004 Andrea Norris Deputy Chief Information Officer/ Director of Division of Information Systems.
University of Guelph IT Security Policy Doug Blain Manager, IT Security ISC, April 27th.
ITS Offsite Workshop 2002 PolyU IT Security Policy PolyU IT/Computer Systems Security Policy (SSP) By Ken Chung Senior Computing Officer Information Technology.
1 Chapter 7 IT Infrastructures Business-Driven Technology
SIRT Contact Orientation Security Incident Response Team Departmental Security Contacts April 16, 2004.
SESSION 9 THE INTERNET AND THE NEW INFORMATION NEW INFORMATIONTECHNOLOGYINFRASTRUCTURE.
Security Issues on Distributed Systems 7 August, 1999 S 1 Prepared by : Lorrien K. Y. Lau Student I.D. : August 1999 The Chinese University.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Stephen S. Yau CSE , Fall Security Strategies.
Developing a Security Policy Chapter 2. Learning Objectives Understand why a security policy is an important part of a firewall implementation Determine.
Customized solutions. Keep It Secure Contents  Protection objectives  Endpoint and server software  Protection.
Enterprise Security. Mark Bruhn, Assoc. VP, Indiana University Jack Suess, VP of IT, UMBC.
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
Ferst Center Incident Incident Identification – Border Intrusion Detection System Incident Response – Campus Executive Incident Response Team Incident.
Israel Securities Authority MAGNA – Electronic filing Natan Herscovitz, CIO December 2004.
Principles of Computer Security: CompTIA Security + ® and Beyond, Second Edition © 2010 Baselines Chapter 14.
Information Security Introduction to Information Security Michael Whitman and Herbert Mattord 14-1.
CS426Fall 2010/Lecture 361 Computer Security CS 426 Lecture 36 Perimeter Defense and Firewalls.
Digital Identity Management Strategy, Policies and Architecture Kent Percival A presentation to the Information Services Committee.
Security Imperatives in a New Workplace Partnering to Protect Digital Information in the 21st Century Presented by Michael Ferris, Alaska Enterprise Solutions.
Intranet, Extranet, Firewall. Intranet and Extranet.
Lesson 8-Information Security Process. Overview Introducing information security process. Conducting an assessment. Developing a policy. Implementing.
1 Deployment of Computer Security in an Organization CE-408 Sir Syed University of Engineering & Technology 99-CE-282, 257 & 260.
Joseph Ferracin Director IT Security Solutions Managing Security.
Responding to a Security Incident Maryland Security Day March 2, 2004 Joy Hughes, CIO
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
CERN’s Computer Security Challenge
IT Security and Policy Issues Mark Bruhn University IT Policy Officer Office of the Vice President for Information Technology Indiana University.
Safeguarding OECD Information Assets Frédéric CHALLAL Head, Systems Engineering Team OECD.
7-1 Chapter 7 IT Infrastructures Business-Driven Technology.
© 2001 by Carnegie Mellon University SS5 -1 OCTAVE SM Process 5 Background on Vulnerability Evaluations Software Engineering Institute Carnegie Mellon.
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
INCIDENT RESPONSE IMPLEMENTATION David Basham University of Advancing Technology Professor: Robert Chubbuck NTS435.
7-1 Management Information Systems for the Information Age Copyright 2004 The McGraw-Hill Companies, Inc. All rights reserved Chapter 7 IT Infrastructures.
Incident Response CSG September 2004 Harvard University.
1 CERN’s Computer Security Challenges Denise Heagerty CERN Computer Security Officer Openlab Security Workshop, 27 Apr 2004.
7-1 Management Information Systems for the Information Age Copyright 2004 The McGraw-Hill Companies, Inc. All rights reserved Chapter 7 IT Infrastructures.
Ali Pabrai, CISSP, CSCS ecfirst, chairman & ceo Preparing for a HIPAA Security Audit.
Module 14: Securing Windows Server Overview Introduction to Securing Servers Implementing Core Server Security Hardening Servers Microsoft Baseline.
COSC 513 Operating Systems Project Presentation: Internet Security Instructor: Dr. Anvari Student: Ying Zhou Spring 2003.
Converting Policy to Reality Designing an IT Security Program for Your Campus 2 nd Annual Conference on Technology and Standards May 3, 2005 Jacqueline.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
Computer Security Risks for Control Systems at CERN Denise Heagerty, CERN Computer Security Officer, 12 Feb 2003.
© ITT Educational Services, Inc. All rights reserved. IS3230 Access Security Unit 6 Implementing Infrastructure Controls.
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
Computer Security Status Update FOCUS Meeting, 28 March 2002 Denise Heagerty, CERN Computer Security Officer.
Security Discussion IST Retreat June IT Security Statement definition In the context of computer science, security is the prevention of, or protection.
Computer Security Status C5 Meeting, 2 Nov 2001 Denise Heagerty, CERN Computer Security Officer.
Information Security Framework Regulatory Compliance and Reporting Auditing and Validation Metrics Definition and Collection Reporting (management, regulatory,
Role Of Network IDS in Network Perimeter Defense.
Information Security tools for records managers Frank Rankin.
Syo-401 Question Answer. QUESTION 1 An achievement in providing worldwide Internet security was the signing of certificates associated with which of the.
SSH. 2 SSH – Secure Shell SSH is a cryptographic protocol – Implemented in software originally for remote login applications – One most popular software.
Computer Security Sample security policy Dr Alexei Vernitski.
 client  client/server network  communication hardware  extranet  firewall  hacker  Internet  intranet  local area network (LAN)  Network 
Windows Active Directory – What is it? Definition - Active Directory is a centralized and standardized system that automates network management of user.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 17 – IT Security.
Incident Response Strategy and Implementation Anthony J. Scaturro University IT Security Officer September 22, 2004.
Mark Bruhn Indiana University IT Policy Officer
Secure Software Confidentiality Integrity Data Security Authentication
IS4550 Security Policies and Implementation
IT Development Initiative: Status and Next Steps
Presentation transcript:

1 Mark Bruhn Indiana University IT Policy Officer

2 January Michael McRobbie arrives as the first CIO at Indiana University March 1997 – self-proclaimed “privacy advocate” finds 2760 records of personal info via an gopher-http gateway Posts them to his web site Notifies major media outlets Information Security Officer was in buried in Administrative Computing department No incident response capability existed

3 Subsequent actions: University Computer Security Task Force appointed University Computer Security Office created with an interim Director One of the best technicians available assigned to the UCSO immediately External reviews (company and peer) commissioned Interim IT Policy Officer appointed External reviews: No real surprises Peer review recommended permanent IT Policy and Security Offices Developed an action plan CIO presented the action plan to the President, who directed that it be implemented

4 Offices created in August 1998: Positioned in the Office of the Vice President and CIO, not in computing department Several new staff positions created, including two high-level “officers” IT Policy Officer reports to the CIO, and is a member of OVPIT executive management IT Security Officer reports to the IT Policy Officer, but with dotted-line to the CIO

5 IT Policy Office 14 full-time staff variously responsibly for Policy development Incident response Identification, authentication, authorization services Enterprise directory Disaster recovery IT Security Office 7 full-time staff responsible for Maintaining a wide-breadth and specific in- depth technical expertise Developing security resources for technicians Developing/maintaining tools for technicians Security consulting Security reviews on request

6 Mark Bruhn IT Policy Officer/ Contracts & Agreements Officer 6 Accounts Administrators Incident Response Coordinator Technical Investigators University Information Technology Policy Office Office of the Vice President for Information Technology September 2001 Admin Asst Data Administrator Info Mgt Officer Tom Davis IT Security Officer Michael McRobbie VP/CIO Information Technology Security Office 1 Lead Data/ Applications Analyst 2 Senior Data/ Applications Analysts 2 Principal Security Engineers 3 Lead Security Engineers 1 Senior Security Analysts Disaster Recovery Program Manager Cross-Unit Recovery Planning Team Global Directory Services Team Computer Accounts Manager Merri Beth Lavagnino Deputy IT Policy Officer

7 February 2001 – Bursar’s Office Technician inadvertently allowed anon FTP Gigabytes of bootleg movies and music stashed by unknown individuals A file of personal data amongst these media files, and was downloaded In May 2001, Trustees pass a resolution directing VP/CIO to take steps to improve security Proactive Reactive

8 June 2001 – School of Music Web server exploited via known vulnerability School was collecting personal information from prospective students Data was stored in directory accessible to the intruder June 2001, CIO directed University units to eliminate unnecessary files of sensitive information and to secure the rest By December 2001, 55 major units indicated projects underway or projects completed Creating an enterprise directory Permits applications to access central secure store of person information instead of maintaining distributed stores “Translate service” permits departments to store username instead of SSN and convert as required

9 Developed issues list Developed strategy Developed talking points CIO and ITPO/ITSO use all opportunities to discuss security issues with various constituencies Key is to translate vulnerabilities and issues into INSTITUTIONAL RISKS Role for CIO and IT Policy Officer Security Officer many times mostly technical (which is a good thing) and not schmoozy But, key person is the CIO (if organizationally positioned correctly): Especially if also an academic Understands technology Understands business/mission Has the attention of executive administration

10 Published general best practices documents: Best Practices for Security IT Resources Best Practices for Handling Sensitive Electronic Information (long and short) Deliver formal technician seminars which include general information and technical security (partner with computing department and Human Resources Management) Deliver non-credit technician Security Education/Certification courses, which are already proving very popular (partner with computing department; plans to make these mandatory) Deliver an enhanced suite of technician support tools (for vulnerabilities assessment, anti-virus, advisory service, etc.) Made available many technician/user how-to guides

11 Locally developed: Handle a system compromise Install and Use SSH Install and Use TCP Wrappers Obtain a certificate for an IU- based web server Prevent mail relay abuse Protect against viruses Protect your home PC Protect your IIS web server Protect your laptop computer Recover from a System Compromise Secure your personal computer accounts Secure your Windows FTP server Secure your Windows NT system Secure your Windows 95/98 system Secure your UNIX system Purchased: Intrusion Detection: Shadow Style Securing Linux: Step-by- Step Solaris Security: Step- by-Step Windows NT Security: Step-by-Step Windows 2000 Security: Step by Step Windows 2000 Vulnerabilities and Solutions

12 Eliminated several insecure communications protocols; working to eliminate all Developed “virtual private network”, which provides for authentication and encryption for: Connections from off-campus On-campus wireless networks Commissioned a group to develop a comprehensive enterprise firewalling proposal, with specific self- defense goals: A large portion of the ~65,000 networked IU systems support campus functions and do not need to be visible to the Internet On the remaining systems, only certain services (e.g., web pages) need to be visible to the Internet IUB Halls of Residence student computers need special protection from external influences; services that students provide to the Internet must be limited Security consulting engagements to projects and systems within UITS and departments increasing dramatically

13 Placement of a firewall at the edge of the IU network to protect workstations and local servers from many types of attacks. Departmental servers providing services beyond the IU network would exist on a separate Class B network than workstations. Servers on this network would be registered and hardened and would be protected via router ACLs. Servers residing in the UITS machine rooms on each campus would use a separate firewall with unique rule sets for each server.

14 Created new IT policies: Use of Indiana University Information Technology Resources Sanctions for Misuse or Abuse of Indiana University Technology Resources Eligibility to Use Indiana University Technology Resources Privacy of University Information Technology Resources Information Technology Facilitative/Fair Usage Policy Security of University IT Resources Network and Computer Accounts Administration Extending the Network Wireless Networking Use of Electronic Mail Policy on Use of for Mass Communications Created Deputy IT Policy Officer based at IUPUI; affords more presence there and at regional campuses

15 Web-based scanner management interface ISS and Nessus as scan engines Several scan engines Scans are required and automatically executed for OVPIT systems Scans are requested by administrators, security staff, or auditors Web-based incident tracking system Incidents are triaged by full-time IRC, and other handled by that person or assigned