National Center for Supercomputing Applications University of Illinois at Urbana-Champaign Developing a Comprehensive GENI Cyber Security Program Adam.

Slides:



Advertisements
Similar presentations
CIRAS PROJECT OVERVIEW
Advertisements

University of Florida Incident Tracking and Reporting Kathy Bergsma
Project Cyber Security Order 706 January 10, 2012 Most of the material presented has been compiled from NERC webinars and drafting team meetings.
Smart Grid - Cyber Security Small Rural Electric George Gamble Black & Veatch
Fiscal Year 2008 Urban Areas Security Initiative Nonprofit Security Grant Program Investment Justification Questions, Criteria, and Prioritization Methodology.
Information Security Policies and Standards
August 9, 2005 UCCSC IT Security at the University of California A New Initiative Jacqueline Craig. Director of Policy Information Resources and.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Qualitative.
ISO 17799: Standard for Security Ellie Myler & George Broadbent, The Information Management Journal, Nov/Dec ‘06 Presented by Bhavana Reshaboina.
Evaluating SPP/APR Improvement Activities Presented by Jeanna Mullins, Mid-South Regional Resource Center, RRCP Document developed by members of the Systems.
Computer Security: Principles and Practice
10.5 Report Performance The process of collecting and distributing performance information, including status reports, progress measurements and forecasts.
SQA Architecture Software Quality.
Application Threat Modeling Workshop
Introduction to Network Defense
Resiliency Rules: 7 Steps for Critical Infrastructure Protection.
EGI-Engage Recent Experiences in Operational Security: Incident prevention and incident handling in the EGI and WLCG infrastructure.
Financial Advisory & Litigation Consulting Services Risk Management 2006 September 14-15, 2006 The Metropolitan Club, New York, NY Workshop B: Information.
SEC835 Database and Web application security Information Security Architecture.
CEOS-CGMS Working Group on Climate John Bates, NOAA SIT-30 Agenda Item #11 Climate Monitoring, Research, and Services 30 th CEOS SIT Meeting CNES Headquarters,
Project Risk Management. The Importance of Project Risk Management Project risk management is the art and science of identifying, analyzing, and responding.
Network Security Policy Anna Nash MBA 737. Agenda Overview Goals Components Success Factors Common Barriers Importance Questions.
Sponsored by the National Science Foundation Comprehensive GENI Security Program Spiral 2 Year-end Project Review National Center for Supercomputing Applications.
© 2001 Carnegie Mellon University S8A-1 OCTAVE SM Process 8 Develop Protection Strategy Workshop A: Protection Strategy Development Software Engineering.
© 2013 Cengage Learning. All Rights Reserved. 1 Part Four: Implementing Business Ethics in a Global Economy Chapter 9: Managing and Controlling Ethics.
K E M A, I N C. Ten Steps To Secure Control Systems APPA 2005 Conference Session: Securing SCADA Networks from Cyber Attacks Memphis, TN April 18, 2005.
Appendix C: Designing an Operations Framework to Manage Security.
Office of Campus Information Security Driving a Security Architecture by Assessing Risk Stefan Wahe Sr. Information Security Analyst.
Knowing What You Missed Forensic Techniques for Investigating Network Traffic.
Federal Information Security Management Act (FISMA) By K. Brenner OCIO Internship Summer 2013.
Project Scope Management Information Technology Project Management, Fifth Edition Note: some slides have been removed from the author’s original presentation.
Develop Project Charter
Meeting Minutes and TODOs TG has no distributed monitoring. During incident response, use a manual twiki page to distribute information TG monitors the.
EGI-Engage Recent Experiences in Operational Security: Incident prevention and incident handling in the EGI and WLCG infrastructure.
Consultant Advance Research Team. Outline UNDERSTANDING M&E DATA NEEDS PEOPLE, PARTNERSHIP AND PLANNING 1.Organizational structures with HIV M&E functions.
Networked Systems Survivability CERT ® Coordination Center Software Engineering Institute Carnegie Mellon University Pittsburgh, PA © 2002 Carnegie.
Introduction and Overview of Information Security and Policy By: Hashem Alaidaros 4/10/2015 Lecture 1 IS 332.
Developing a Project Management Standard for Your Organization Francine DiMicele, PMP June 08, 2015 NC Piedmont Triad Chapter.
Evaluate Phase Pertemuan Matakuliah: A0774/Information Technology Capital Budgeting Tahun: 2009.
Chapter 19: Building Systems with Assurance Dr. Wayne Summers Department of Computer Science Columbus State University
State of Georgia Release Management Training
Quickly Establishing A Workable IT Security Program EDUCAUSE Mid-Atlantic Regional Conference January 10-12, 2006 Copyright Robert E. Neale This.
1 I ntegrated S ite S ecurity for G rids WP2 – Site Assessment Methodology, 20 June 2007 WP2 - Methodology ISS e G Integrated Site Security.
Implementation recommendations 1st COPRAS review Presentation at 2nd COPRAS annual review, 15 March 2006, CEN/CENELEC meeting centre, Brussels Bart Brusse.
Project Management Methodology Project Closing. Project closing stage Must be performed for all projects, successfully completed or shut off by management.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
By: Mark Reed.  Protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction.
Who doesn’t need to be WISE? Bringing into reality global information security collaboration Alessandra Scicchitano GÉANT - Project Development Officer.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 17 – IT Security.
David Kelsey STFC-RAL 4th WISE workshop, Nikhef 27 March 2017
Office 365 Security Assessment Workshop
Risk management.
ISSeG Integrated Site Security for Grids WP2 - Methodology
Directory/Inventory – info sharing for security people
Evaluating SPP/APR Improvement Activities
CMGT 431 STUDY Lessons in Excellence--cmgt431study.com.
I have many checklists: how do I get started with cyber security?
Chapter 19: Building Systems with Assurance
CIS12-3 IT Project Management
1 Stadium Company Network. The Stadium Company Project Is a sports facility management company that manages a stadium. Stadium Company needs to upgrade.
IS4680 Security Auditing for Compliance
Evaluating SPP/APR Improvement Activities
Cyber Security in a Risk Management Framework
Albeado - Enabling Smart Energy
In the attack index…what number is your Company?
Awareness and Auditor training kit
Unit # 1: Overview of the Course Dr. Bhavani Thuraisingham
CMGT/431 INFORMATION SYSTEMS SECURITY The Latest Version // uopcourse.com
CMGT 431 CMGT431 cmgt 431 cmgt431 Entire Course // uopstudy.com
Presentation transcript:

National Center for Supercomputing Applications University of Illinois at Urbana-Champaign Developing a Comprehensive GENI Cyber Security Program Adam Slagell GEC 7, Duke & RENCI March 17, 2010

What is a “comprehensive security program”? About operational security & incident response Not GENI software stack, authN/Z mechanisms, etc Not writing code, but developing processes & policies Describes mechanisms for prevention & detection of security incidents Including roles for different parties Focuses on collaborative, cross-organizational efforts Has plans to react to incidents What do all the stakeholders do? Many roles, with different responsibilities. Materials and processes to disseminate plans

How do we develop our security program? Understand assets, threats & risks Perform risk analysis Develop security policy architecture Includes high-level policies, standards, guidelines, procedures and agreements More about social processes than technology specific Develop security architectures Monitoring tools for incident response Configuration guidelines and standards Especially for centrally located or shared assets Education, Training, & Compliance Not clear this early what that means for GENI Need to understand roles and responsibilities first

Performing a risk assessment Identify assets and their value Very qualitative Identify threats & vulnerabilities Determine probability and impact of threats Select countermeasures Limited options here: policies, hardening guidelines, collaborative monitoring tools

Developing security policies Many types of policies Agreements: with researchers, aggregates, universities, partners, etc Policies about monitoring, processes for IR, organizational roles and responsibilities Best practices for researchers, aggregate security, updates We can’t wait for risk assessment first! Spiral 3 coming! Need a interim policies, Vic discussed some of the content Base off of lessons learned in OSG, PlanetLab, etc

Developing security architectures Most assets not owned centrally by GENI System is going to evolve organically, less amenable to top- down approach What can we define? IDS, tools for collaboration, logging & monitoring infrastructure Maybe are aggregates connected, and how do we provide isolation How are centralized resources hardened (e.g., CA’s, clearing houses) Not clear what may be centrally controlled by GMOC We can provide guidelines in any case

Where are we now? NCSA started work after GEC 6 Caveat: 1/3 FTE total We created incident response use cases Long list of potential things a GENI IR team may encounter E.g., Request from LE, experiment used for attack, etc Welcome feedback, go to our wiki page Stakeholder and asset identification Qualitative values of assets Tangible and intangible First, first draft; needs feedback!

We need you! We cannot evaluate criticality of assets in isolation Need input on the methodology Need input from all stakeholders on actual assed values Are we complete? Some assets may be obsolete as they will no longer exist May be new things since we read docs May just not be creative enough Feedback is vital before we start evaluating impact of threats.

Timeline for feedback Asset Valuation and Risk Assessment report v. 0.1 When: Now Where: on our project wiki space Asset Valuation and Risk Assessment report v. 0.2 Added some threats, incorporated feedback When: May 1, 2010 Asset Valuation and Risk Assessment report v. 0.3 Risk analysis of partial list of threats, incorporated feedback When: June, 2010 Interim Operational Security Plan 0.1 When: during the month after & during GEC 8

A modest proposal Observations There are a LOT of GENI documents There are lots of versions of each They are spread out everywhere Some people don’t even upload them to the GENI wiki Security and operations need to think holistically I spend an inordinate amount of time searching for new docs People in OMIS likely interested in similar docs Proposal Utilize the list more. Send a note with link and summary when you create a new doc (or make major revisions)