Information Resources and Communications University of California, Office of the President System-Wide Strategies for Achieving IT Security at the University.

Slides:



Advertisements
Similar presentations
Network Systems Sales LLC
Advertisements

Distributed Data Processing
COMPREHENSIVE APPROACH TO INFORMATION SECURITY IN ADVANCED COMPANIES.
Student, Faculty, and Staff Data Availability and Protection What’s the Back-Up Plan? (for academic computing) Sponsored by.
Information Risk Management Key Component for HIPAA Security Compliance Ann Geyer Tunitas Group
HIPAA: FEDERAL REGULATIONS REGARDING PATIENT SECURITY.
Database Administration and Security Transparencies 1.
Certification Authority. Overview  Identifying CA Hierarchy Design Requirements  Common CA Hierarchy Designs  Documenting Legal Requirements  Analyzing.
Smart Grid - Cyber Security Small Rural Electric George Gamble Black & Veatch
Network Isolation Using Group Policy and IPSec Paula Kiernan Senior Consultant Ward Solutions.
Security Controls – What Works
Information Security Policies and Standards
Developing a Records & Information Retention & Disposition Program:
August 9, 2005 UCCSC IT Security at the University of California A New Initiative Jacqueline Craig. Director of Policy Information Resources and.
ITS Offsite Workshop 2002 PolyU IT Security Policy PolyU IT/Computer Systems Security Policy (SSP) By Ken Chung Senior Computing Officer Information Technology.
Contact Center Security Strategies Grant Sainsbury Practice Director, Dimension Data.
Payment Card Industry (PCI) Data Security Standard
Network security policy: best practices
Developing a Security Policy Chapter 2. Learning Objectives Understand why a security policy is an important part of a firewall implementation Determine.
Copyright 2013 FUJITSU LIMITED. AGENDA Mitigation Considerations 4. Data Security – Examples and Application 2. Data Security Life-Cycle 1 1. Data Management.
© 2010 Plexent – All rights reserved. 1 Change –The addition, modification or removal of approved, supported or baselined CIs Request for Change –Record.
Lesson 8-Information Security Process. Overview Introducing information security process. Conducting an assessment. Developing a policy. Implementing.
K E M A, I N C. NERC Cyber Security Standards and August 14 th Blackout Implications OSI PI User Group April 20, 2004 Joe Weiss
What Keeps You Awake at Night Compliance Corporate Governance Critical Infrastructure Are there regulatory risks? Do employees respect and adhere to internal.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
Data management in the field Ari Haukijärvi 2nd EHES training seminar.
Confidentiality and Security Issues in ART & MTCT Clinical Monitoring Systems Meade Morgan and Xen Santas Informatics Team Surveillance and Infrastructure.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
1 Secure Telework Connectivity Peggy Ward Chief Information Security Officer July 22,
Federated or Not: Secure Identity Management Janemarie Duh Identity Management Systems Architect Chair, Security Working Group ITS, Lafayette College.
April 14, A Watershed Date in HIPAA Privacy Compliance: Where Should You Be in HIPAA Security Compliance and How to Get There… John Parmigiani National.
Patient Data Security and Privacy Lecture # 7 PHCL 498 Amar Hijazi, Majed Alameel, Mona AlMehaid.
Unit 6b System Security Procedures and Standards Component 8 Installation and Maintenance of Health IT Systems This material was developed by Duke University,
LeToia Crozier, Esq., CHC Vice President, Compliance & Regulatory Affairs Corey Wilson Director of Technical Services & Security Officer Interactive Think.
OCTAVE-S on TradeSolution Inc.. Introduction Phase 1: Critical Assets and threats Phase 2: Critical IT Components Phase 3: Changes Required in current.
Safeguarding Research Data Policy and Implementation Challenges Miguel Soldi February 24, 2006 THE UNIVERSITY OF TEXAS SYSTEM.
Ali Pabrai, CISSP, CSCS ecfirst, chairman & ceo Preparing for a HIPAA Security Audit.
Overview Managing a DHCP Database Monitoring DHCP
Data Security and Payment Card Acceptance Presented by: Brian Ridder Senior Vice President First National September 10, 2009.
The Impact of Evolving IT Security Concerns On Cornell Information Technology Policy.
Converting Policy to Reality Designing an IT Security Program for Your Campus 2 nd Annual Conference on Technology and Standards May 3, 2005 Jacqueline.
Last Minute Security Compliance - Tips for Those Just Starting 10 th National HIPAA Summit April 7, 2005 Chris Apgar, CISSP – President Apgar &
1 Privacy Plan of Action © HIPAA Pros 2002 All rights reserved.
NETWORKING FUNDAMENTALS. Network+ Guide to Networks, 4e2.
Module 12: Responding to Security Incidents. Overview Introduction to Auditing and Incident Response Designing an Audit Policy Designing an Incident Response.
Staying ahead of the storm: know your role in information security before a crisis hits Jason Testart, IST Karen Jack, Secretariat.
IT Security Challenges In Higher Education Steve Schuster Cornell University Copyright Steve Schuster This work is the intellectual property of.
APolicy EASy Security Project Analysis and Recommendations for TJX Companies, Inc.
1 Information Security Compliance System Owner Training Module 3 Supplement: Analysis of Policy Compliance Checklist Issues Richard Gadsden Information.
Chapter 3 Pre-Incident Preparation Spring Incident Response & Computer Forensics.
IS3220 Information Technology Infrastructure Security
Information Security tools for records managers Frank Rankin.
Information Security Office: Function, Alignment in the Organization, Goals, and Objectives Presentation to Sacramento PMO March 2011 Kevin Dickey.
Montgomery College Acceptable Use Policy (AUP). 2 This Acceptable Use Policy (AUP) PowerPoint presentation was developed by the Office of the Information.
By: Matt Winkeler.  PCI – Payment Card Industry  DSS – Data Security Standard  PAN – Primary Account Number.
IT Audit for non-IT auditors Cornell Dover Assistant Auditor General 31 March 2013.
UNIT 7 SEMINAR Unit 7 Chapter 9, plus Lab 13 Course Name – IT482 Network Design Instructor – David Roberts – Office Hours: Tuesday.
Information Security and Privacy in HRIS
Blackboard Security System
Security Standard: “reasonable security”
Providing Access to Your Data: Handling sensitive data
Paul Woods Chair, MITIGATION: Ensuring we procure cloud services taking into account of the risks involved Paul Woods Chair, ISNorthEast.
COMPREHENSIVE APPROACH TO INFORMATION SECURITY IN ADVANCED COMPANIES
Move this to online module slides 11-56
An Introduction to Computer Networking
How to Mitigate the Consequences What are the Countermeasures?
Microsoft Data Insights Summit
Anatomy of a Common Cyber Attack
Presentation transcript:

Information Resources and Communications University of California, Office of the President System-Wide Strategies for Achieving IT Security at the University of California David Walker Jacqueline Craig Office of the President University of California © Copyright Regents of the University of California Permission is granted for this material to be shared for non- commercial, educational purposes, provided that this copyright statement appears on the reproduced materials and notice is given that the copying is by permission of the authors.

Information Resources and Communications University of California, Office of the President University of California System Distributed Autonomy 10 campuses 5 medical centers 3 national laboratories

Information Resources and Communications University of California, Office of the President University of California System Abundant Opportunity for Security Breaches 200,00 students 53,000 academic employees 117,000 staff Number of Network nodes? 500,000?

Information Resources and Communications University of California, Office of the President University of California in the News Security breaches involving highly sensitive information  Stolen laptop 98,000 records  Exploit of known vulnerability 800,000+ records  System compromise 387,000 records

Information Resources and Communications University of California, Office of the President UC President demands solutions University-wide Security Workgroup Formed  Professors  Vice Chancellors and Deans  General Counsel  Security Officers  Chief Information Officers and Directors

Information Resources and Communications University of California, Office of the President Security Workgroup Recommendations Leadership actions to achieve accountability University-wide communication, security education and training Stronger IT security policies  Minimum connectivity standards and guidelines Risk assessment guidelines and mitigation  Focus on both academic and administrative strategies Campus-based encryption strategies Improved security incident guidelines

Information Resources and Communications University of California, Office of the President Recommendations for Campus Strategies Encryption Forensics  Incident Response  Audit Logs

Information Resources and Communications University of California, Office of the President Encryption

Information Resources and Communications University of California, Office of the President Encryption “...encryption is the process of obscuring information to make it unreadable without special knowledge.” - Wikipedia  In general, the “special knowledge” is an encryption key. Encryption is a powerful tool, but not a panacea. Encryption at the University of California: Overview and Recommendations

Information Resources and Communications University of California, Office of the President Things You Can Do with Data There are three things you can do with data  Store  Transmit  Process

Information Resources and Communications University of California, Office of the President Things You Can Protect with Encryption

Information Resources and Communications University of California, Office of the President Encryption for Data Storage Restricted data should be encrypted when stored in a location that does not have appropriate physical security and access controls.  Whole disk encryption (mobile devices)  File encryption  Database encryption Potential need for encrypted backups  Key management

Information Resources and Communications University of California, Office of the President Encryption for Data Transmission Restricted data should be encrypted when it is transmitted across an untrusted network, and very few networks can be trusted. For example,  File transfers  Electronic mail  Network printer communication  Remote file services  Virtual private network (VPN)

Information Resources and Communications University of California, Office of the President Key Management Improper loss or disclosure of encryption keys can result in improper loss or disclosure of data. Must consider:  Access to data in the event of lost keys  Improper disclosure of keys  Unique responsibilities of people charged with custody of keys

Information Resources and Communications University of California, Office of the President International Considerations for Encryption Some governments (e.g., China, Korea, and Israel) regulate the import and use of encryption technology. The United States regulates the export of encryption software source code.

Information Resources and Communications University of California, Office of the President Selected Recommendations for Encryption - 1 All copies of restricted data must be assessed.  Shadow copies  Spreadsheets  Backups Implement “whole disk” encryption for mobile devices.

Information Resources and Communications University of California, Office of the President Selected Recommendations for Encryption - 2 Network printer communication should be encrypted, and the printer should be in a secure location. Network file service communication should be encrypted. (e.g., WebDAV) Campuses should implement central key management infrastructures.

Information Resources and Communications University of California, Office of the President Incident Response

Information Resources and Communications University of California, Office of the President Incident Response problem management or security incident?  workflow plan  communication plan security breach or unauthorized disclosure?  system compromise  software design/configuration errors  stolen equipment  user (operator) error

Information Resources and Communications University of California, Office of the President

Information Resources and Communications University of California, Office of the President Incident Response Initial Steps  communicate to appropriate staff, team, others as required  maintain a log of actions  secure the area/facility  determine need for forensics analysis collect forensic information  regain control and analyze See

Information Resources and Communications University of California, Office of the President Investigations and Notification Determination Forensics  Use of vendor service to ensure chain-of- evidence? Establish a standing agreement to facilitate instant services  Audit log analysis Logs are a more likely source of information. Challenge: find congruence to track the path.

Information Resources and Communications University of California, Office of the President Log Management

Information Resources and Communications University of California, Office of the President Log Management Most components of an IT infrastructure are capable of producing logs chronicling their activity over time.  Application logs  System logs  Network device logs  Change management logs  Other logs (surveillance, physical access, etc.) Log Management for the University of California: Issues and Recommendations

Information Resources and Communications University of California, Office of the President Log Management Overview

Information Resources and Communications University of California, Office of the President Uses for Logs Useful both for long-term baseline analysis and incident investigation  Access  Change Monitoring  Cost Allocation  Malfunction  Resource Utilization  Security Events  User Activity

Information Resources and Communications University of California, Office of the President Application Log Content  The business operation that was requested  Whether the request was accepted or denied  The time and date the operation was performed  Who initiated the operation  System and network resources used  Any information needed for business process controls  Client hardware and software characteristics

Information Resources and Communications University of California, Office of the President System Log Content  The server operation that was requested  Whether the request was accepted or denied  The time and date the operation was performed (Start and end times, or duration, may be appropriate for long operations.)  Who and/or what system initiated the operation  System and network resources used

Information Resources and Communications University of California, Office of the President Network Device Log Content  Network (IP) addresses of the end points  Service identifiers (port numbers) for each of the end points  Whether the flow was accepted or denied  Date, time, and duration of the flow  Number of packets and bytes used by the flow

Information Resources and Communications University of California, Office of the President Log Record Life-Cycle Management Logs are University records, subject to the requirements of the University Records Management Program to ensure that they are “...appropriately managed and preserved, and can be retrieved as needed.” Retention periods must balance the following  confidentiality of specific individuals' activities  the need to support investigations  the cost of retaining the records

Information Resources and Communications University of California, Office of the President Functions of a Log Management Infrastructure  move log records into the infrastructure  provide secure storage for the records  implement record retention policies  facilitate access to log records  provide analysis tools that enable correlations among records from multiple sources  protect the chain of evidence for the possibility that log records are used in legal proceedings

Information Resources and Communications University of California, Office of the President Selected Recommendations for Log Management - 1 A network time protocol should be used to enable relation of log records from multiple sources. Procedures should be in place to ensure that baseline analyses reviewed on a regular and timely basis.

Information Resources and Communications University of California, Office of the President Selected Recommendations for Log Management - 2 For investigations, preparations should be made to perform ad hoc queries against multiple sources of information, based on criteria such as the following:  Source(s) of the log records  Time  Network address  Application or service  User