Trusted Internet Connections. Background Pervasive and sustained cyber attacks against the United States continue to pose a potentially devastating impact.

Slides:



Advertisements
Similar presentations
The Whole/Hole of Security Public (DoD) v. Corporate Carl Bourland US Army Judge Advocate Generals Corps.
Advertisements

Not to be distributed or reproduced by anyone other than Qwest entities. Copyright © 2010 Qwest. All Rights Reserved. Government Services TIC from an Industry.
Firewalls By Tahaei Fall What is a firewall? a choke point of control and monitoring interconnects networks with differing trust imposes restrictions.
Copyright © 2014 American Water Works Association Water Sector Approach to Process Control System Security.
Firewalls Dr.P.V.Lakshmi Information Technology GIT,GITAM University
CUBIC DEFENSE APPLICATIONS Security Summit Discussions Jeff Snyder Vice President, Cyber Programs Cubic Defense Applications.
SAFE Blueprint and the Security Ecosystem. 2 Chapter Topics  SAFE Blueprint Overview  Achieving the Balance  Defining Customer Expectations  Design.
5-Network Defenses Dr. John P. Abraham Professor UTPA.
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
Firewall Configuration Strategies
Firewall Security Chapter 8. Perimeter Security Devices Network devices that form the core of perimeter security include –Routers –Proxy servers –Firewalls.
Cybersecurity Summit 2004 Andrea Norris Deputy Chief Information Officer/ Director of Division of Information Systems.
Know the Client Own the Problem Share the Solution The 2005 Case for Information Technology Security October 14, 2004.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
Firewalls Presented by: Sarah Castro Karen Correa Kelley Gates.
Data Security in Local Networks using Distributed Firewalls
Firewalls Presented By Hareesh Pattipati. Outline Introduction Firewall Environments Type of Firewalls Future of Firewalls Conclusion.
Firewall 2 * Essential Network Security Book Slides. IT352 | Network Security |Najwa AlGhamdi 1.
Department Of Computer Engineering
CISCO CONFIDENTIAL – DO NOT DUPLICATE OR COPY Protecting the Business Network and Resources with CiscoWorks VMS Security Management Software Girish Patel,
Norman SecureSurf Protect your users when surfing the Internet.
Information Security Introduction to Information Security Michael Whitman and Herbert Mattord 14-1.
Securing Legacy Software SoBeNet User group meeting 25/06/2004.
BY- NIKHIL TRIPATHI 12MCMB10.  What is a FIREWALL?  Can & Can’t in Firewall perspective  Development of Firewalls  Firewall Architectures  Some Generalization.
NW Security and Firewalls Network Security
How STERIS is using Cloud Technology to Protect Web Access Presented By: Ed Pollock, CISSP-ISSMP, CISM CISO STERIS Corporation “Enabling Business”
OFFICE OF THE UNDER SECRETARY OF DEFENSE FOR INTELLIGENCE CI & SECURITY DIRECTORATE, DDI(I&S) Valerie Heil March 20, 2015 UNCLASSIFIED Industrial Security.
Firewall and Internet Access Mechanism that control (1)Internet access, (2)Handle the problem of screening a particular network or an organization from.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
1 CISCO SAFE: VALIDATED SECURITY REFERENCE ARCHITECTURE What It Is Business Transformation Top Questions To Ask To Initiate The Sale Where It Fits KEY.
FIREWALLS Vivek Srinivasan. Contents Introduction Need for firewalls Different types of firewalls Conclusion.
11 SECURING YOUR NETWORK PERIMETER Chapter 10. Chapter 10: SECURING YOUR NETWORK PERIMETER2 CHAPTER OBJECTIVES  Establish secure topologies.  Secure.
OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
Sample Security Model. Security Model Secure: Identity management & Authentication Filtering and Stateful Inspection Encryption and VPN’s Monitor: Intrusion.
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
April 09, 2008 The Demilitarized Zone as an Information Protection Network, By Parvathy Subramanian 1 The Demilitarized Zone as an Information Protection.
Federal Information Security Management Act (FISMA) By K. Brenner OCIO Internship Summer 2013.
Firewall Security.
Securing the Network Infrastructure. Firewalls Typically used to filter packets Designed to prevent malicious packets from entering the network or its.
1.1 1 Purpose of firewall : –Control access to or from a protected network; –Implements network access policy connections pass through firewall and are.
IT Security. What is Information Security? Information security describes efforts to protect computer and non computer equipment, facilities, data, and.
1 OFF SYMB - 12/7/2015 Firewalls Basics. 2 OFF SYMB - 12/7/2015 Overview Why we have firewalls What a firewall does Why is the firewall configured the.
Security fundamentals Topic 10 Securing the network perimeter.
Security Patterns for Web Services 02/03/05 Nelly A. Delessy.
1 Firewall Rules. 2 Firewall Configuration l Firewalls can generally be configured in one of two fundamental ways. –Permit all that is not expressly denied.
Security and Assurance in IT organization Name: Mai Hoang Nguyen Class: INFO 609 Professor: T. Rohm.
Lesson 2a © 2005 Cisco Systems, Inc. All rights reserved. SNPA v4.0—2-1 Firewall Technologies and the Cisco Security Appliance.
Network Security Terms. Perimeter is the fortified boundary of the network that might include the following aspects: 1.Border routers 2.Firewalls 3.IDSs.
IS3220 Information Technology Infrastructure Security
Unit 2 Personal Cyber Security and Social Engineering Part 2.
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Creating the Network Design Designing and Supporting Computer Networks – Chapter.
Presented By Hareesh Pattipati.  Introduction  Firewall Environments  Type of Firewalls  Future of Firewalls  Conclusion.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
Information Security KRISHNAKUMAR RAGHAVAN (KK) NASWA's Information Technology Support Center 1.
Security fundamentals
Barracuda NG Firewall ™
OIT Security Operations
CompTIA Security+ Study Guide (SY0-401)
CONNECTING TO THE INTERNET
Computer Data Security & Privacy
Firewalls.
CompTIA Security+ Study Guide (SY0-401)
Internet2 Tech Exchange
* Essential Network Security Book Slides.
Home Internet Vulnerabilities
Data Security in Local Networks using Distributed Firewalls
Firewalls.
Presentation slide for courses, classes, lectures et al.
Presentation transcript:

Trusted Internet Connections

Background Pervasive and sustained cyber attacks against the United States continue to pose a potentially devastating impact on federal systems and operations. Reports of widespread and coordinated attacks over the course of several days have targeted Web sites operated by major government agencies, including the Departments of Homeland Security and Defense, the Federal Aviation Administration, and the Federal Trade Commission. The Director of National Intelligence testified in February 2009 that foreign nations and criminals had targeted government and private-sector networks to gain a competitive advantage or potentially disrupt or destroy them, and that terrorist groups had expressed a desire to use cyber attacks as a means to target the United States.

Background Estimations of more than 8000 Internet connections –Every Internet Access Point is a potential open door for malicious activity –Levels of protection vary, e.g., Firewalls, Rule sets, Intrusion Detection –The entire set of Government Internet Access Points is not well defined and controlled In July 2009, GAO reported that almost all 24 major federal agencies had weaknesses in information security controls. No event correlation or monitoring across Internet connections. Distributed Attacks could go unnoticed for long periods of time. The current cyber threat is much more prevalent, persistent, and covert than previously considered and requires immediate action

The Solution – Trusted Internet Connections In November 2007, the Office of Management and Budget announced the Trusted Internet Connection (TIC) Initiative in Memorandum M Intended to improve the federal government’s security posture and incident response capability by: –reducing and consolidating external network connections to 100 total –centrally monitoring the traffic passing through Internet connections for potentially malicious activity. All federal agencies in the executive branch, except for the Department of Defense, are required to implement the initiative.

Trusted Internet Connections Similar to a Shared Service Provider 2 types of TICAPS –Single Service Provider –Multi Agency Service Provider

Example TIC Configuration

TIC Security and Configuration Impact All External Connections must be terminated in the TIC Internet and External facing hosts must be moved to a TIC VLANs can no longer be used as a security mechanism Mail and User Internet access must transverse a TIC Multiple levels of inspection required Continuous monitoring by Einstein and GSOC

What is an “External Connection?” A physical or logical connection between information systems, networks, or components of information systems & networks that are, respectively, inside and outside of specific Department or Agency’s (D/A) certification and accreditation (C&A) boundaries established by the D/A, for which: the D/A has no direct control over the application of required security controls or the assessment of security control effectiveness on the outside information system, network, or components of information systems & networks; or the D/A, notwithstanding any direct or indirect control over the application of required security controls or the assessment of security control effectiveness, has specific reason to believe that the external system1 has a substantially reduced set of security controls or an increased threat posture relative to the internal system. NIST SP

What is an “External Connection?” The following types of connections will be considered “external connections”: – Connections between a D/A information system, network, or components of information systems and networks and the globally- addressable internet. – Connections between a D/A information system, network, or components of information systems and networks and a remote information system, network, or components of information systems and networks located on foreign soil or where a foreign entity may have any level of physical or logical access to your internal systems.

TIC – A VLAN is not a Security Mechanism

What is Public Debt Doing? Completed request to become two of the four Treasury Trusted Internet Connection Access Providers. ( two of 17 government wide ) TIC equipment has been deployed at both Primary and Secondary datacenters. DHS has recently completed the Treasury TIC TVC with a 100% score Public Debt is currently migrating all external connectivity and hosts to the Public Debt TIC

Public Debt TIC Features Content Filtering Proxy Services IDS/IPS (multiple vendors) Firewalls (multiple vendors) Remote Access Layer 2 – 7 Inspection devices Virus Scanning Appliances Load Balancing Full Packet Capture

TNet Network and Security Devices TIC Bureau TIC Business Partner Treasury Application TIC Internet Bureau Network and Security Devices High Level TIC

Questions?

References: OMB Memo M-08-05, Implementing the Trusted Internet Connections (TIC) HSPD 23, Cybersecurity Policy NIST Special Publication , Managing Risk from Information Systems – An Organizational Perspective NIST Special Publication , Recommended Security Controls for Federal Information Systems FIPS Publication, Security Requirements for Cryptographic Modules OMB Memorandum M-08-05, November 2007 (Reduce total number of Government external internet connections to 50) TD P Appendix F, May 2008 ( Requirements for Creating Secure Internet Access Points ) TIC Connection Policy per OMB & OCIO