Presentation is loading. Please wait.

Presentation is loading. Please wait.

1 Network Quarantine At Cornell University Steve Schuster Director, Information Security Office.

Similar presentations


Presentation on theme: "1 Network Quarantine At Cornell University Steve Schuster Director, Information Security Office."— Presentation transcript:

1 1 Network Quarantine At Cornell University Steve Schuster Director, Information Security Office

2 2 Overview ► Cornell’s incident response strategy ► Introduction to Network Quarantine ► Review of Scan at Registrations System (SARS) ► Post Mortem (What we did intelligently) ► Future considerations

3 3 Organizational Structure ► Contact Center  Part of Customer Services and Marketing  Address end user support ► Patch support ► Virus remediation ► Network Operations Center (NOC)  Part of Systems and Operations  Initial security triage  Incident response ► Blocks ► Notifications ► IT Security Office  Development of operational procedures  Technical solutions  Backline support

4 4 Some Security Challenges at Cornell ► A general openness and decentralization leads to a larger number of incidents ► Responding to incidents can be staff intensive ► Unmanaged (students) systems arrive on our network several times each year ► Incident notification is a challenge ► Wide range of end user support needs

5 5 Responding to Incidents ► Security Office will react and contain campus systems that are compromised or highly vulnerable ► NOC had a mix of tools and manual processes for opening case, notifying impacted parties and implementing containment ► Security Office often sends NOC containment requests that were tedious to service with current tools ► Response to wide range security issues put much strain on Contact Center ► Current mechanism for containment was not fully effective and didn’t work in some environments

6 6 Network Quarantine ► Objectives  Provide better end user communication based upon observed incident  Articulate self-remediation information and requirements when appropriate  Improve cost effectiveness of security support ► Noc ► Contact Center  More effective system isolation  Better incident tracking and remediation for local support providers  Quicker/escalated response for critical systems

7 7 Network Quarantine (Basic Features) ► The right action is taken depending upon type of system  “Registration” 10 space  DMZ blocked  “Critical system” notification ► Response for systems identified as critical is escalated to Security Office and appropriate local support provider ► Incidents can be created, modified and closed via web and socket interfaces  Latter allows batch and automation ► NQ interacts with Vantive, creating new case when incident opened ► Modifications to an incident trigger e-mail to user, net admin and updates to Vantive ► Specific incident remediation information provided for end users ► With appropriate credentials, CIT personnel, including Contact Center, and campus system administrators can search for and review incidents

8 8 Network Quarantine (Incident Types)

9 9

10 10 Network Quarantine (Incident Messages)

11 11 Network Quarantine (Incident Containment)

12 12 Network Quarantine (Incident Remediation)

13 13 Network Quarantine (User’s View)

14 14 Network Quarantine (User’s View)

15 15 Network Quarantine (User’s View) 128.XXX.XXX.XXX

16 16 Network Quarantine (Specific Features) ► For each new incident  New incident type for tracking  Establishment of resolution requirements  Incident specific message to users ► Users receive much better communication ► Self-release feature  Users are able correct the issue  Save staff time at the Contact Center ► Process automation, better user communication and self-release has saved money

17 17 Incident Response Costs ► Virus remediation costs/incident  Contact Center – Average 10 minutes  NOC – Average 3 minutes ► System compromise costs/incident  Contact Center ► Simple support -- 20 minutes ► Full rebuild – 1-4 hours  NOC – Average ► Average 5 minutes

18 18 Network Quarantine (Cost Savings) ► Virus remediation costs/incident  Contact Center – Same but many self-release  NOC –under 1 minute ► System compromise costs/incident  Contact Center ► Simple support -- 20 minutes ► Full rebuild – 1-4 hours  NOC – Average ► Under 1 minute

19 19 Scan at Registration System (SARS) ► All on-campus student computers were automatically scanned upon registration ► Objects  Drastically reduce the number of infected or compromised student systems coming to campus  Promote better security practices

20 20 Enabling Features of NQ that Supported SARS ► Automation of containment and remediation ► Redirection to Network Quarantine infrastructure ► Articulated steps to support self-remediation ► Incident tracking

21 21 Scan at Registration System (SARS) ► Requirements for ResNet registration  Each computer system must be registered with a valid NetID  Each computer must be configured to a minimum set of security standards ► No open writable fileshares ► All administrative accounts must have a password ► Must be patched

22 22 Student Registration Process ► Every on-campus student went through the follow process  Plug into network and get redirected to ResNet Registration page  Authentication with NetID and fill in necessary information for registration  Wait 90 seconds for registration to complete and system check to occur  If the system passed all three tests ► Registration compete  Else ► Redirected to NQ ► Informed of the problem and provided directions for remediation ► Rescan upon completion of remediation ► Repeat

23 23 Scan at Registration Statistics ► Approximately 6500 systems scanned over move in weekend ► Of all systems scanned  65% were probably firewalled  35% were not firewalled ► 25% were clean ► 10% had at least one of the three problems ► Close to 12% of the systems had at least one problem (780) ► Around 85% of all quarantined students were able to perform self remediation

24 24 Network Quarantine On-Boarding Metrics

25 25 Post Mortem ► Gaining early support from Contact Center and NOC was an absolute requirement ► Can’t under estimate the stress of move in weekend (the parent affect) ► Trust is important but “bail out” features go further  If the scanning or quarantine infrastructure failed registration would continue as before  If the Contact Center could not support the demands of quarantined students all could be released immediately

26 26 Future Considerations ► Should scanning be expanded to other constituents and infrastructures? ► Should we be more aggressive with our scanning?  Scan more frequently  Deeper analysis ► Should we limit ourselves to network scanning or install end point components? ► Should we establish minimun expectations for all computers connecting to our network?


Download ppt "1 Network Quarantine At Cornell University Steve Schuster Director, Information Security Office."

Similar presentations


Ads by Google