Security Architectures and Advanced Networks Ken Klingenstein Day Job: Middleware Night Job: Network Security.

Slides:



Advertisements
Similar presentations
Federated Digital Rights Management Mairéad Martin The University of Tennessee TERENA General Assembly Meeting Prague, CZ October 24, 2002.
Advertisements

Research and Educational Networking Information Analysis and Sharing Center (REN-ISAC) Mark S. Bruhn, Interim Director University Copyright.
Network Isolation Using Group Policy and IPSec Paula Kiernan Senior Consultant Ward Solutions.
Toolbox Mirror -Overview Effective Distributed Learning.
The Co-mingled Universe of R&E Networking: the reprise Ken Klingenstein Director, Internet2 Middleware and Security Ken Klingenstein Director, Internet2.
Computer Security: Principles and Practice
Higher Education Cybersecurity Strategy, Programs, and Initiatives Rodney Petersen Policy Analyst & Security Task Force Coordinator EDUCAUSE.
Security Architectures and Advanced Networks Ken Klingenstein Day Job: Middleware Night Job: Network Security.
CAMP Med Mapping HIPAA to the Middleware Layer Sandra Senti Biological Sciences Division University of Chicago C opyright Sandra Senti,
InCommon Policy Conference April Uses  In order to encourage and facilitate legal music programs, a number of universities have contracted with.
Enterprise Security. Mark Bruhn, Assoc. VP, Indiana University Jack Suess, VP of IT, UMBC.
What Data Do We Need and Why Do We Need It? Jim Pepin Chief Technology Officer University of Southern California.
Final Exam Part 1. Internet Regulation Internet regulation according to internet society states that it is about restricting or controlling certain pieces.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Addressing Diagnostic Complexity The EDDY Approach End-to-end Diagnostic DiscoveryY Chas DiFatta Mark Poepping
Delivering an Architecture for the Social Enterprise Alpesh Doshi, Fintricity Information Age Social&Mobile Business Conference Tuesday 31st January 2012.
Shib in the present and the future Ken Klingenstein Director, Internet2 Middleware and Security.
INTERNET2 COLLABORATIVE INNOVATION PROGRAM DEVELOPMENT Florence D. Hudson Senior Vice President and Chief Innovation.
9/17/20151 IPv6 Challenge or The Challenge of IPv6 Internet 2 IPv6 Working Group Dale Finkelson Michael Lambert.
Internet2 – InCommon and Box Marla Meehl Colorado CIO 11/1/11.
INFSO-RI Enabling Grids for E-sciencE SA1: Cookbook (DSA1.7) Ian Bird CERN 18 January 2006.
Intrusion Detection Prepared by: Mohammed Hussein Supervised by: Dr. Lo’ai Tawalbeh NYIT- winter 2007.
Salsa Bits: A few things that the analysts aren't talking about... December 2006.
The New Problem Space: Issues for the Future Ken Klingenstein Director, Internet2 Middleware and Security.
NSF Middleware Initiative Renee Woodten Frost Assistant Director, Middleware Initiatives Internet2 NSF Middleware Initiative.
ESnet Site Coordinators Committee (ESCC): IPv6 Activities & Directions Phil DeMar (ESCC Chair) HEPix IPv6 Workshop (CERN) June 22, 2011.
Internet2 Middleware Initiative. Discussion Outline  What is Middleware why is it important why is it hard  What are the major components of middleware.
Shibboleth: An Introduction
Internet2 Health Sciences Mary Kratz Internet2 Health Science Manager March Spring Member Meeting International Session.
EDUCAUSE LIVE EDUCAUSE/Internet2 Computer and Network Security Task Force Update Jack Suess January 21, 2004.
Knowing What You Missed Forensic Techniques for Investigating Network Traffic.
NMI End-to-End Diagnostic Advisory Group BoF Fall 2003 Internet2 Member Meeting.
Internet2 Security Efforts - A brief overview of activities Ken Klingenstein 2004 July 21 Joint Techs- Columbus, Ohio.
GRID Overview Internet2 Member Meeting Spring 2003 Sandra Redman Information Technology and Systems Center and Information Technology Research Center National.
February 1, 2002 Internet2 Middleware Initiative and MACE RL "Bob" Morgan, University of Washington.
3 December 2015 Examples of partnerships and collaborations from the Internet2 experience Interworking2004 Ottawa, Canada Heather Boyles, Internet2
Exchange Deployment Planning Services Exchange 2010 Complementary Products.
13-Oct-2003 Internet2 End-to-End Performance Initiative: piPEs Eric Boyd, Matt Zekauskas, Internet2 International.
Enterprise and Federated Security: Some Frontiers.
Security at Line Speed: Integrating Academic Research and Enterprise Security.
Shibboleth & Federated Identity A Change of Mindset University of Texas Health Science Center at Houston Barry Ribbeck
6 February 2004 Internet2 Priorities 2004 Internet2 Industry Strategy Council Douglas Van Houweling.
NMI-EDIT AND Small College Security & ID Management Issues Discussion John Bruggeman, Director of Information Systems, Hebrew Union College-Jewish Institute.
Welcome to Base CAMP: Enterprise Directory Deployment Ken Klingenstein, Director, Internet2 Middleware Initiative Copyright Ken Klingenstein This.
GRID ANATOMY Advanced Computing Concepts – Dr. Emmanuel Pilli.
Collaboration & Transformation Special Interest Group Information Sharing Committee Observations August 2011.
NSF Middleware Initiative Purpose To design, develop, deploy and support a set of reusable, expandable set of middleware functions and services that benefit.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Advanced research and education networking in the United States: the Internet2 experience Heather Boyles Director, Member and Partner Relations Internet2.
Ellis Paul Technical Solution Specialist – System Center Microsoft UK Operations Manager Overview.
NSF Middleware Initiative and Enterprise Middleware: What Can It Do for My Campus? Renee Woodten Frost Internet2/University of Michigan.
Internet2 Strategic Directions October Fundamental Questions  What does higher education (and the rest of the world) require from the Internet.
Welcome to CAMP Directory Workshop Ken Klingenstein, Internet2 and University of Colorado-Boulder.
Possible Governance-Policy Framework for Open LightPath Exchanges (GOLEs) and Connecting Networks June 13, 2011.
Networks ∙ Services ∙ People Marina Adomeit FIM4R meeting Virtual Organisation Platform as a Service VOPaaS Nov 30, 2015, Austria Task Leader,
European collaboration on research networking development update on TERENA activities Karel Vietsch TERENA CEO Spring 2002 Internet2 Member Meeting Arlington.
Federated Security Services Ken Klingenstein Day Job: Middleware Night Job: Network Security.
Network Architecture and Security Ten Years Out Internet2 Member Meeting; Fall 2005 Deke Kassabian – University of Pennsylvania Mark Poepping – Carnegie.
01 October 2001 “...By Any Other Name…”. Consequences and Truths (Ken) The Pieces and the Processes (Bob) Directories (Keith) Shibboleth and SAML (Scott)
INTRODUCTION TO IDENTITY FEDERATIONS Heather Flanagan, NSRC.
NSF Middleware Initiative and Enterprise Middleware: What Can It Do for My Campus? Mark Luker, EDUCAUSE Copyright Mark Luker, This work is the intellectual.
© ITT Educational Services, Inc. All rights reserved. IS3220 Information Technology Infrastructure Security Unit 10 Network Security Management.
KNOWLEDGE MANAGEMENT (KM) Session # 32
Challenges facing Enterprise Mobility
Ian Bird GDB Meeting CERN 9 September 2003
Mark Poepping, SALSA Chair
Example Use Case for Attribute Authorities and Token Translation Services - the case for eduGAIN Andrea Biancini.
4th Annual Conference on Technology and Standards Washington
Draft Charter Community of Practice for Direct Access Entities
Presentation transcript:

Security Architectures and Advanced Networks Ken Klingenstein Day Job: Middleware Night Job: Network Security

CHANGE DATE 2 SALSA Overview  Technical steering committee composed of senior campus security architects Create understanding in the community regarding the multiple aspects of security as it applies to advanced networking Advise on deliverables that address need of members and produce tangible benefits  Prioritizing opportunities and identifying resources Focused activities Interested in R&D security topics that can be smoothly transitioned to deployment Intended to complement other activities in the Internet2/EDUCAUSE Security Task Force

CHANGE DATE 3 Membership  Chair: Mark Poepping, CMU  Founding members drawn from the Security at Line Speed Workshop – e.g. Jeff Schiller (MIT), Terry Grey (UW), Jim Pepin (USC), Doug Pearson (Indiana), Chris Misra (UMass), Steve Wallace (Indiana), Rodney Petersen (EDUCAUSE), James Sankar (Ukerna), etc…  Working on a charter  Minutes, etc at

CHANGE DATE 4 Possible SALSA Priorities  Developing core security architecture Common campus network reference model Common R&E internet network reference model Nomenclature and architecture  Additional case studies for and revisit the basics  Increase data collection, sharing and integration between security researchers and backbone activities  Net Authentication/Authorization  Federated Security Services and Capabilities

CHANGE DATE 5 Data Sharing  Assemble knowledge, experience and tools to identify useful security data to be directed towards a comprehensive, operational security solution  Identify associated privacy issues.  Working with REN-ISAC on plan, process and structure to share data: Data guidelines Information exchange frameworks Sharing agreements Escalation process  Increase integration and sharing between security researchers and network backbone activities (e.g., diagnostics, Abilene Observatory)

CHANGE DATE 6 Network AuthN/AuthZ  Identify areas where middleware technologies can support intra and inter-realm security  Network access controls may depend on The identity of the user The identity of the device The state of the device (scanned, patched, etc) The role of the user Other  Initiating organized activities to develop network authentication and authorization architectures and sample implementations, including responding to the TERENA mobility TF  ngn13/ _JR_GN2_JRA5.pdf

CHANGE DATE 7 Federated Security Services  Federated networks Share a common network substrate Share a common trust fabric Together they could permit…  Collaborative incident analysis and response Network-wide views Leveraged diagnostic help Ability for automated tools to use distributed monitors Protect privacy at several layers  Security-aware capabilities Trust-moderated transparency Integrated security/performance diagnostics  Moving it into the broader Internet

CHANGE DATE 8 Collaborative Incident Analysis  Moving beyond the “border” to see network-wide views I’m seeing activity X? Are others seeing it? What variants are they seeing? Real-time attack recognition From the central observatory, let me see the full address of the attacking node at site Y in the federation I’m seeing an attack ostensibly from source address z at enterprise Y. Let me look at logging within site Y to verify Correlate signatures and traffic among sites A-Z to provide an early warning system of DDOS Let external experts from site Z examine our forensic information to assist our diagnostics  Requires federated backbone (meters, log files, etc) and federated trust fabric (for scaling, role-based access control, contact info, etc.)

CHANGE DATE 9 Collaborative incident analysis  Scaling requires managing large data sets Centralized – the Abilene Observatory, perhaps others Distributed – on a per enterprise level  Which in turn requires a clear data model Common event records, likely distilled and reformatted from native logs Is enterprise-level security sufficient  And also pluggable modules for harvesting records by tools  Tools  And also a trust fabric that permits multiple levels of authentication and fine-grain authorization

CHANGE DATE 10 Federated Security-aware Capabilities  Federated user network authentication for on-the-road science  Control spam through federated verification of sending enterprises  Tell me which firewall is dropping which service request  Permit end-end videoconferencing through firewalls and NATs  Allow enterprise-specific patching paradigms to coexist  Create end-end transparency for use of Grids  Personal firewall configuration based on authorization

CHANGE DATE 11 Moving it into the broader Internet  Picking approaches that are deployable and build on embedded bases  Federated substrata among those on common backbones  Interfederation issues – how hard will they be  International discrepancies in privacy  International IdSP’s - legalisms

CHANGE DATE 12 Advancing Network Security  An architecture instead of piece parts Too many parts with too much interactions Diagnostic hell and innovation ice age Current approaches are doomed anyway…  Federated services and possible market making Inter-institutional authn/z activities Perhaps, with funding and trust, other federated security tools and services