Securing the Open Securing the Open University Network University Network Environment Environment IT Risk Assessment and Security Policy Compliance Measurement Kent Knudsen, Texas A & M University Security Professionals Security Professionals Workshop 2004 Workshop 2004 May 18 May 18 Copyright 2004 Kent Knudsen. This work is the intellectual property of the author. Permission is granted for this material to be shared for non-commercial, educational purposes, provided that this copyright statement appears on the reproduced materials and notice is given that the copying is by permission of the author. To disseminate otherwise or to republish requires written
29
Embed
Securing the Open University Network Environment IT Risk Assessment and Security Policy Compliance Measurement Kent Knudsen, Texas A & M University Security.
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Securing the Open University Securing the Open University Network Network EnvironmentEnvironmentIT Risk Assessment and Security Policy Compliance Measurement
Copyright 2004 Kent Knudsen. This work is the intellectual property of the author. Permission is granted for this material to be shared for non-commercial, educational purposes, provided that this copyright statement appears on the reproduced materials and notice is given that the copying is by permission of the author. To disseminate otherwise or to republish requires written permission from the author.
An Open Network is Like a An Open Network is Like a City . . .City . . . Network lines, like roadways, are open and designed to move trafficNetwork lines, like roadways, are open and designed to move traffic Security varies at the nodes or segmentsSecurity varies at the nodes or segments Secure nodes - Administrative computing requires stronger security, Secure nodes - Administrative computing requires stronger security,
like bankslike banks Minimal Security nodes - Student lab workstations have minimal securityMinimal Security nodes - Student lab workstations have minimal security
like retail storeslike retail stores Nodes with unknown security - Faculty and Student owned computers Nodes with unknown security - Faculty and Student owned computers
have unknown security, have unknown security,
like residential housinglike residential housing Not a perfect analogy, but it Not a perfect analogy, but it
illustrates that security tends illustrates that security tends
to be focused on the nodesto be focused on the nodes
Challenges of Decentralized Challenges of Decentralized SecuritySecurity
Some departments have full-time, trained IT staff – while other Some departments have full-time, trained IT staff – while other departments rely on student workers (or worse, have no IT staff)departments rely on student workers (or worse, have no IT staff)
Diversity of operating systems (Apple/Mac, Linux, MVS, Novell, Unix, Diversity of operating systems (Apple/Mac, Linux, MVS, Novell, Unix, Windows, etc.) – difficult to be an expert on more than one platformWindows, etc.) – difficult to be an expert on more than one platform
Residential network allowing students to connect their PCs with little or Residential network allowing students to connect their PCs with little or no security protectionno security protection
Libraries must provide access to information resources to both the Libraries must provide access to information resources to both the University populous and the community at largeUniversity populous and the community at large
Research computers funded by grants that have little or no provision for Research computers funded by grants that have little or no provision for security measuressecurity measures
Need a forum to allow IT staff to share best practices and tips on Need a forum to allow IT staff to share best practices and tips on securing the various platformssecuring the various platforms
Who is keeping up with patches and security updates?Who is keeping up with patches and security updates?
U.S. Standards:If your organization needs a benchmark based on industry best practices, there are some sources available:
State and Local Standards
Obviously, compliance with your state and local security standards should be measured. However, if your state and local standards are incomplete or lacking, there are other standards to consider.
NIST Computer Security Resource Center (csrc.nist.gov)
The NIST CSRC provides several publications (FIPS PUBS) and other documents to serve as standards.
The ISO17799 Standard (www.iso17799-web.com)The ISO17799 Standard is a set of security standards (based on the British Standards Institution - BS 7799) adopted and approved by the ISO, IEC and JTC1 (International Electrotechnical Commission, International Organization for Standardization and Joint Technical Committee) and is available for a fee.
The Common Criteria (www.commoncriteria.org)The Common Criteria project was started in 1993 in order to bring together various standards (TCSEC, ITSEC, etc.) into a single international standard for IT security evaluation.
Centralized Information Security Centralized Information Security ProgramProgram
IT Risk Assessment and Security Policy Compliance Measurement
The Risk Assessment data is used to produce a composite report for the entire university, including overall percentage of compliance for each policy item on a university-wide basis
What is ISAAC?What is ISAAC?
The Security Awareness Training data is used to generate “certificates” of completion, and can be analyzed to determine the effectiveness of the training program
The Business Continuity / Disaster Recovery Module contains a full-blown guideline for those departments maintaining server/client systems, and a simpler, basic plan for the desktop (peer-to-peer) environment
The State of Texas requires that once a month, a summary report be filed detailing the month’s security incidents
What is ISAAC?What is ISAAC?
Security Incident Reporting System:
A web-based form for reporting various kinds of security incidents, such as: malicious code attacks, unauthorized access and use, disruption or denial of service, hoaxes, etc.
The SIRS database can be analyzed for trends and to measure effectiveness of various countermeasures
ISAAC Because… Security Best ISAAC Because… Security Best PracticesPractices
The approach of beginning each risk assessment from scratch with a group of people was not practical for our diverse environment – so we reviewed a multitude of assessment methodologies to produce a “best of breed” product
Also, a large number of threats are already known, and security standards have been established, therefore we chose to design a tool that establishes a good security baseline
ISAAC Because . . . Assessment ISAAC Because . . . Assessment FlexibilityFlexibility
An annual process that yields an
institutional wide assessment as well as individual assessments that each department can use to evaluate their risks and make risk management decisions.
Three risk assessment types:– “Departmental” (for the servers and clients)– “Desktop” (for peer-to-peer setup)– “Good Net Neighbor” – (for public access or lab
ISAAC Because . . . Department ISAAC Because . . . Department FlexibilityFlexibility
Assessment report includes a “corrective action” plan that gives the departmental IT staff an opportunity to recommend solutions to management for their consideration
Management has the flexibility to make risk management decisions for implementing the recommendations based on cost-benefit analysis
ISAAC Benefits . . . Easy to ISAAC Benefits . . . Easy to ImplementImplement
The Departmental IT Staff (System Admins) already feel harried and were not sitting idle looking for something to do – so, in consideration of their time, an effective and efficient assessment was key to implementation
We also wanted this new initiative to be palatable, and to garner “buy in” from the departmental managers
We held informational forums, and offered an on-site assistance option via online calendar. (However, ISAAC was so well received, not much assistance was requested)
All this and more done to ease burden, facilitate departmental use, and to smooth implementation