Download presentation
Presentation is loading. Please wait.
Published byClaire Boyd Modified over 9 years ago
1
1 Protecting Wintel Infrastructures: The University of Memphis Case Robert Jackson, University of Memphis Dr. Mark Frolick, Xavier University Copyright Mark Frolick and Robert Jackson 2003. This work is the intellectual property of the Mark Frolick and Robert Jackson. Permission is granted for this material to be shared for non-commercial, educational purposes, provided that this copyright statement appears on the reproduced materials and notice is given that the copying is by permission of the authors. To disseminate otherwise or to republish requires written permission from the authors.
2
2 I.Existing infrastructure II.Challenges so far III.Lessons Learned IV.What does the future hold? V.Miscellaneous last-minute points VI.Questions and Comments Presentation Content
3
3 I.Existing Infrastructure
4
4 Network Open network -Most computers directly accessible via internet -Limited firewall protection -Common port vulnerabilities blocked at University of Memphis border (eg, ingress filters for NETBIOS and MS-SQL access)
5
5 Hardware Approximately 60 Wintel servers –Dell servers –Virtual servers (www.vmware.com) Typical configuration –NT4 / W2K / W2K3 / Novell –RAID 5 –Redundancy Power Fans Network connections
6
6 Hardware, continued Console for local access to Wintel servers –Limited access to console Physical access User privileges –Accessible via internet (requires additional privileges)
7
7 Personnel Central IT staff –3 Wintel System Administrators –1 Network Security Specialist Local Support Providers (LSP’s) –Approximately 50 personnel –Various levels of technical expertise
8
8 Software NetBackup –www.veritas.com –Enterprise solution –Currently hosted on Unix servers –Data backed up to tape library Incrementals Full
9
9 Software, continued PowerDeploy Suite 2.0 –www.powerquest.comwww.powerquest.com –Supports Dell RAID controllers –Procedure Operating system installed Server configured / secured Sysprep PowerDeploy used to create image of OS partition Image burned to CD for shorter recovery times Image restoration tested Server made available
10
10 Software, continued Norton Anti-virus Corporate Edition 7.6 –www.norton.comwww.norton.com –Virus definitions updated daily –Scans performed nightly –Automatic notification via email of virus activity
11
11 Software, continued Nessus vulnerability scanning –www.nessus.orgwww.nessus.org –Nessus server (Linux) –NessusWx client (Wintel) –MySQL database (Wintel) –New vulnerability definitions (“plugins“) downloaded each Friday –Automatic scans performed each Monday morning –Manual scans performed as requested
12
12 Software, continued Update Expert by St. Bernard Software –www.stbernard.comwww.stbernard.com –Automatic application of selected patches to various servers –Patches applied in test environment Tuesday –Notification of intent to patch production occurs on Wednesday –Patches applied to production servers on Sunday mornings
13
13 Software, continued System monitoring and reporting –Big Brother Email only Webpage for overview of all servers –BindView Phone paging Email
14
14 II. Challenges so far
15
15 Challenges Server compromises Improve backup/restore process Upgrade infrastructure software (eg, NAV 7.6) Guaranteed weekly downtime for Wintel patches Communication with internal ITD staff
16
16 Challenges, continued Improve PowerQuest imaging procedure Vulnerability scanning –False positives –Is there a need for historical analysis? for notification of newly detected vulnerabilities? Proactive scanning of campus network? –Are “safe checks” really safe?
17
17 III.Lessons learned
18
18 Lessons Learned Network –Diverse requirements of research environment –Difficult to proactively lock-down campus network without “breaking things” (eg, MS- SQL)
19
19 Lessons Learned, continued Hardware –Try to provide as much redundancy as possible –Service administrators want full access to hardware –Involve service administrators when developing access policies for hardware
20
20 Lessons Learned, continued Software –Encourage participation in the deployment of security technologies Update Expert Norton Anti-Virus Corporate Edition Nessus (Beware of unlimited network scanning!)
21
21 Lessons Learned, continued Policy and procedure changes –Written security policy –Procedure for handling compromised servers –Procedure for implementing new services (eg, 3-tier model) Educating users, including internal IT staff, about security concerns is an on-going process
22
22 IV. What Does the Future Hold?
23
23 …The Future… Network infrastructure –Monitoring capabilities (HP Openview?) –Convert parts of campus to routed network Wintel environment –Backup software (CA backup?) –Event log analysis capabilities (Aelita’s InTrust) –Strive to improve existing processes Communication and Teamwork –Continue educating co-workers about advantages of working together to provide server security
24
24 V. Miscellaneous Last-minute Points
25
25 Password strength validation –L0phtcrack Password “auditing” program Various methods to obtain and decipher Windows platform passwords To avoid privacy issues, always get permission before “auditing” passwords 3-tier model (test, pre-production, production) Helpful websites –www.vmware.comwww.vmware.com –www.nessus.orgwww.nessus.org –www.sans.orgwww.sans.org –www.symantec.comwww.symantec.com
26
26 Questions and Comments? Robert Jackson rjax@memphis.edu Dr. Mark Frolick mark@frolick.net rjax@memphis.edu mark@frolick.net
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.