Download presentation
Presentation is loading. Please wait.
Published byCale Bunting Modified over 10 years ago
1
Information Technology at Emory Copyright Jay D. Flanagan, 2005. This work is the intellectual property of the author. Permission is granted for this material to be shared for non-commercial, educational purposes, provided that this copyright statement appears on the reproduced materials and notice is given that the copying is by permission of the author. To disseminate otherwise or to republish requires written permission from the author. Network Registration and Intrusion Prevention Services Implementation at Emory University Jay D. Flanagan Security Professionals Conference April 2005
2
Information Technology at Emory Information Technology Division Technical Services
3
Information Technology at Emory Information Technology Division Technical Services
4
Information Technology at Emory Information Technology Division Technical Services Security at Emory In 2000 it was determined that more and better security was needed to protect the Emory environment In 2001 a Security Initiatives Project was proposed and funded – Over 1 million dollars was set aside for the initiatives – Initial projects included: Firewalls Virus Scanning Vulnerability Scanning Web Content Security
5
Information Technology at Emory Information Technology Division Technical Services Security at Emory Firewalls –Firewall protection is the cornerstone of the security project –Firewall protection has been implemented at the Emory border gateway to the internet, for the School of Public Health (SPH), for Resnet and for our Administrative Trusted Core (The Administrative Trusted Core protects those services that are considered confidential and restricted)
6
Information Technology at Emory Information Technology Division Technical Services Security at Emory Border Gateway Firewall –Implemented in the Fall of 2001 –Specific rules set up to protect the Emory Academic network –Rules stop specific vulnerabilities that could adversely affect machines and their ability to work
7
Information Technology at Emory Information Technology Division Technical Services Security at Emory
8
Information Technology at Emory Information Technology Division Technical Services Security at Emory SPH Firewall –Implemented in Summer of 2001 –Protects all SPH services with a deny- all-but-necessary rule set –Supports large distance learning group
9
Information Technology at Emory Information Technology Division Technical Services Security at Emory
10
Information Technology at Emory Information Technology Division Technical Services Security at Emory Administrative Trusted Core Firewall –Implemented in Fall of 2003 –Very restricted rule set –Utilizes a DMZ (Demilitarized Zone) for publicly accessible services –Utilizes a VPN firewall for remote access services –Entities protected by the Trusted core include PeopleSoft, Human Resources, Purchasing, ITD Web Services, Evening at Emory, Ace/Donor and Finance –Other services preparing to move into the core include ITD AIS Services and ITD System services –The Security Team is working and planning with other schools and departments to determine if they should move into the Trusted Core
11
Information Technology at Emory Information Technology Division Technical Services Security at Emory
12
Information Technology at Emory Information Technology Division Technical Services Security at Emory
13
Information Technology at Emory Information Technology Division Technical Services
14
Information Technology at Emory Information Technology Division Technical Services Security at Emory Email Virus Scanning –Went production in January of 2003 –Service has been a huge success –All inbound and outbound, including internal outbound email is scanned –Hundreds of thousands of email born viruses blocked by email virus scanners
15
Information Technology at Emory Information Technology Division Technical Services Security at Emory Virus Scanning –Scanning of email has been extremely successful
16
Information Technology at Emory Information Technology Division Technical Services Security at Emory The firewall in this architecture diagram is the Admin Core / DMZ firewall. The virus scanners all sit in the DMZ.
17
Information Technology at Emory Information Technology Division Technical Services Security at Emory Desktop Virus Scanning –New desktop antivirus software from Symantec implemented in Summer of 2003 –Pushed out to all users on campus via Emory on Line (EOL) CD –Set up managed AV services for ITD in Fall of 2004 Working with other schools and departments on campus to set up the managed service Other schools and departments using the managed service include Emory College, Theology, Campus Life and BioChemistry
18
Information Technology at Emory Information Technology Division Technical Services
19
Information Technology at Emory Information Technology Division Technical Services Security at Emory Spam Scanning Service –A huge problem for Emory email users –Implemented centralized spam scanning in 2003 Scanned all incoming email to Emory’s central mail service, Eagle Mail –Other campus email servers added to this service in late 2003 and 2004 Including Learnlink, Listserv, Nursing, Cell Biology, Spinal, Housing, Physics, Physiology, Bimcore, MathCS, Facilities, SPH, Law School and Biology
20
Information Technology at Emory Information Technology Division Technical Services Security at Emory Spam Scanning Service –We are continuing to upgrade this service. The following graph shows the amount of spam being scanned and found by this service:
21
Information Technology at Emory Information Technology Division Technical Services Security at Emory Spam Scanning – Implemented scanning of all inbound email utilizing Trend Micro’s IMSS Product The firewall in this architecture diagram is the Admin Core / DMZ firewall. The spam scanners all sit in the DMZ.
22
Information Technology at Emory Information Technology Division Technical Services Security at Emory Vulnerability Scanning Service –Scan servers or desktops upon request from user (local support) Utilizing Internet Scanner from Internet Security Systems (ISS) and Nessus –Over 100 machines are scanned regularly –Including PeopleSoft, ITD, Emory College, Neurology, University Communications and Campus Life –Scan all student desktops as part of the Network Registration project Utilizing Nessus Over 4000 machines scanned
23
Information Technology at Emory Information Technology Division Technical Services Security at Emory Vulnerability Scanning Service –Offering a self-service vulnerability scanning service for system administrators and local support Implemented in January 2005 Utilizing Nessus Administrators from Emory College, Bio- Chemistry and ITD have requested the use of this service
24
Information Technology at Emory Information Technology Division Technical Services Security at Emory Web Content Security –Secure authentication and authorization to Web Applications –Utilizes Netegrity Siteminder –Production in April of 2002 –Utilizes LDAP for Authentication Allows use of Healthcare Ldap, so Healthcare users can utilize Healthcare id –Over 40 applications currently protected by Netegrity Including Emory Budget Office, Registrar, Trustee site, Student Voting and Med School
25
Information Technology at Emory Information Technology Division Technical Services Not Enough? In the Fall of 2003, Emory was hit by the Blaster and Welchia viruses/worms like many other Universities –Thousands of machines were infected –Many were never completely cleaned In the Spring of 2004, Emory was hit by a rash of DDoS attacks which took down the academic network –Almost 60% of the attacks were initiated by machines on our Resnet network
26
Information Technology at Emory Information Technology Division Technical Services
27
Information Technology at Emory Information Technology Division Technical Services More needed to be done Even with the many new security initiatives in place, infections, compromises and outages were occurring –Caused major disruptions to Emory operations During registration at beginning of school year During finals at end of the school year New options needed to be found and implemented –Network Redesign –Network Registration –Intrusion Prevention
28
Information Technology at Emory Information Technology Division Technical Services New Security Initiatives Network Redesign –Resnet Network Over 60% of the DDoS attacks in the spring of 2004 were from our Resnet network Copyright violations were increasing, with over 70% from our Resnet network How to prevent these attacks and violations from occurring while at the same time protecting the Resnet network? –Move the Resnet network outside the Academic Core firewall –Implement IPS / IDS –Implement Firewall
29
Information Technology at Emory Information Technology Division Technical Services New Security Initiatives
30
Information Technology at Emory Information Technology Division Technical Services New Security Initiatives Network Redesign –SPH Network Supports large distance learning group Moved from Academic Core to Border network to facilitate the distance learning service
31
Information Technology at Emory Information Technology Division Technical Services New Security Initiatives
32
Information Technology at Emory Information Technology Division Technical Services New Security Initiatives
33
Information Technology at Emory Information Technology Division Technical Services New Security Initiatives Network Registration –User computer hardware (MAC) address is registered before gaining access to the Emory network –Initial implementation was on the Resnet network –Over 4000 student machines were registered –Those same machines were scanned by the Nessus vulnerability scanner as part of the registration –Security incidents on Resnet have declined since implementation
34
Information Technology at Emory Information Technology Division Technical Services New Security Initiatives Network Registration –The following graph shows how security incidents have declined:
35
Information Technology at Emory Information Technology Division Technical Services New Security Initiatives Resnet w/ NetReg Architecture
36
Information Technology at Emory Information Technology Division Technical Services New Security Initiatives Network Registration Architecture / Flow
37
Information Technology at Emory Information Technology Division Technical Services New Security Initiatives Network Registration – Phase 2 –The 2 nd phase of Network Registration implements this service to other portions of the Emory campus Initially: –Library –Oxford Other schools and departments indicating interest include: –Law School –School of Public Health
38
Information Technology at Emory Information Technology Division Technical Services New Security Initiatives Network Registration – Phase 2 –Implementing at these other entities has different requirements –Specifically guest access requirements –With these new requirements, an evaluation was done of vendor products, including Perfigo’s Clean Machine and Bradford’s Campus Manager
39
Information Technology at Emory Information Technology Division Technical Services New Security Initiatives Network Registration – Phase 2 –Implementing network registration in places like Oxford and the Library will give us an excellent indication of how it will roll out to the entire campus. –Phase 2 part 1 of the project would implement network registration at Oxford and the Library –Phase 2 part 2 would move the rest of the campus
40
Information Technology at Emory Information Technology Division Technical Services New Security Initiatives Intrusion Detection / Prevention –Original proposal implemented Intrusion Detection Manual intervention necessary for all alerts Resource intensive Large number of false positives –Decided to evaluate Intrusion Prevention Alerts like intrusion detection Automatically blocks hacks and attacks without manual intervention Less resources necessary to mange multiple boxes Non-existent false positives
41
Information Technology at Emory Information Technology Division Technical Services New Security Initiatives Intrusion Prevention –Implemented two IPS boxes in July of 2004 Interfaces for Resnet, Administrative Trusted Core and border network firewalls
42
Information Technology at Emory Information Technology Division Technical Services New Security Initiatives
43
Information Technology at Emory Information Technology Division Technical Services New Security Initiatives Intrusion Prevention –Implemented four more IPS boxes in October of 2004 Interfaces for entire Academic Core and SPH
44
Information Technology at Emory Information Technology Division Technical Services New Security Initiatives
45
Information Technology at Emory Information Technology Division Technical Services New Security Initiatives
46
Information Technology at Emory Information Technology Division Technical Services New Security Initiatives Intrusion Prevention –The IPS implementation has been extremely successful Literally millions of hacks, attacks and compromises have been blocked by this service The graphs on the following two slides shows our success
47
Information Technology at Emory Information Technology Division Technical Services New Security Initiatives
48
Information Technology at Emory Information Technology Division Technical Services New Security Initiatives
49
Information Technology at Emory Information Technology Division Technical Services Summary We have come a long way in securing the Emory network Work still remains The steps outlined here will help in making Emory more secure by being aggressive and proactive in our vigilance against hacks, attacks, compromises and viruses
50
Information Technology at Emory Information Technology Division Technical Services
51
Information Technology at Emory Information Technology Division Technical Services Contact Information Jay D. Flanagan – Security Team Lead –jflanag@emory.edujflanag@emory.edu SecurityTeam-L@listserv.emory.edu http://security.it.emory.edu
52
Information Technology at Emory Information Technology Division Technical Services Questions?
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.