Presentation is loading. Please wait.

Presentation is loading. Please wait.

Responding to a Security Incident Maryland Security Day March 2, 2004 Joy Hughes, CIO

Similar presentations


Presentation on theme: "Responding to a Security Incident Maryland Security Day March 2, 2004 Joy Hughes, CIO"— Presentation transcript:

1 Responding to a Security Incident Maryland Security Day March 2, 2004 Joy Hughes, CIO jhughes@gmu.edu http://www.gmu.edu/intrusion

2 Developing a Response Capacity in Fall 2004 Developing a Response Capacity in Fall 2004  CSIRT-tech IT Security Coordinator formed team with Windows engineer, Unix engineer & Net engineer; sent team to SANS incident response training.  CSIRT-exec Deputy CIO formed team with university counsel, VP of UR., FERPA officer, President’s Chief of Staff, and University Safety Officer.

3 Incident Description  January 3 rd, ITU Windows Server Manager noticed his servers being probed by server in ID Card Office.  Rushed to ID Card Office and removed server from network. Then called CSIRT-Tech  Contained damage, preserved evidence, enabled restoration of service, determined files contained SSNs.

4 Incident Handling  Grade: B network dir  CSIRT-Exec decided community had to be notified; president agreed.

5 Getting/Sharing the Facts  Took 3 days to ascertain: - no other servers on LAN were compromised (some had credit card numbers); - no files on original server had other private data; & - get advice from Feds as to how community could protect their identities (but this advice too strong)

6 Getting/Sharing the Facts  Another 2.5 days to get email delivered to every class of customer  Could not tell if the files had been downloaded or copied and law enforcement forensics teams are too overloaded to work quickly so contracted with forensics firm

7 Getting/Sharing the Facts  Struggled to determine if ID cards were the target. This caused us to contract with police to patrol residence halls and eventually to issue new ID cards to every resident student

8 Assigning Roles  Law Enforcement Coordination – Campus Police (FC, FBI)  Communication strategy – University Relations  Communication point - CIO  Coordination – CIO

9 More Roles  Technical Remediation – Executive Director: Technology Systems Division  Customer Web Site – Public Relations  Were the files copied? Who did what? Are any other servers in danger? – Forensics Firm  Assist Forensics Firm: IT Security Coordinator

10 Work Involved  Engaged and worked with Forensics Firm, every day  Worked with law enforcement  Interviews with Washington Post, local papers and national.coms  Student newspaper (twice)  Hundreds of phone calls, hundreds of emails

11 Work Involved  Implemented new ID card software  Reissued ID cards for resident students  Vendor reps, some well connected, persisted in efforts to sell security stuff and identity theft protection services

12 Work Involved  Did a line by line comparison of 36,000 records in ID Card database with corresponding records in student system  Surveyed every department to see if they stored private admin data on a server, then worked with company to assess security of every one of these servers

13 Work Involved  Responded to legislative interest, including a bill to turn over all security incident handling to VITA  Wrote and rewrote updates to web site  Campus police investigated every reported problem

14 Lessons Learned  SSNs are not, by themselves, of interest to criminals looking for a scalable return  A percentage of people panic on the issue; more effort needs to be expended to control panic  SAs do not know what is on their servers  Eliminating SSN as identifier is not sufficient to protect SSNs

15 Lessons Learned  You can not say to the public “it wasn’t my server.”  Keep hour by hour records of your response  Need to train all SAs in preserving evidence and containing damage

16 Future  Hardware, software & policy changes that will enable: log, log, log  Much more ITU involvement in protecting other people’s servers (e.g. MS 2-day)  Accelerate intrusion detection implementation

17 Future  Accelerate VPN  Accelerate authentication project  Develop curriculum, templates, etc. to aid SAs in preserving evidence & containing damage  Implement perimeter firewall

18 Future  Insist all data files be removed from web servers  Insist all shared drives with sensitive data be specially protected  Build security into employee performance plans

19 Future  Ensure CIO has same great relationship with new VP of U.R.


Download ppt "Responding to a Security Incident Maryland Security Day March 2, 2004 Joy Hughes, CIO"

Similar presentations


Ads by Google