Security In the Real World Carnegie Mellon Qatar October 31, 2010

advertisement
Security In the Real World
Carnegie Mellon Qatar
October 31, 2010
Mary Ann Blair
Director of Information Security
Computing Services
Information Security Office (ISO)
www.cmu.edu/iso
Abstract
The Information Security Office (ISO) at Carnegie Mellon was created in
response to various internal and external drivers and subsequently
shaped by numerous requirements and opportunities, all within the
context of a world class research university. In this talk, Director of
Information Security Mary Ann Blair, discusses how the fundamental
concepts of information security are addressed by the ISO’s
programs and services, what the ISO prevents, detects, and
responds to on a regular basis, and how organizational culture
impacts information security programming.
Information Security Office
www.cmu.edu/iso
2
What information security addresses
C No unintentional
release of information
I No unauthorized
data modification or
inconsistency
A Reliable & timely
access to authorized
information and
resources
Information Security Office
www.cmu.edu/iso
3
What information security addresses
Vulnerabilities
& Threats Controls Cost
Confidentiality
?
?
?
e
c
n
a
r
e
l
o
T
k
s
i
Integrity
?
?
?
R
&
e
r
u
t
l
u
C
l
a
n
o
i
t
a
Availability ganiz
?
?
?
Or
Information Security Office
www.cmu.edu/iso
4
BoT
ory
lat ce
n
gu
Re mplia
Co
Re
pu
tat
ion
Whose problem is it?
CIO
ISO
Computing Services
Departmental Computing
se
pri
S,
te r ty
En curi rk, O pp
Se two B, A
Ne ce, D
r vi
Se
Se
cu
Us re
e
President &
Management Team
Everyone Else
Information Security Office
www.cmu.edu/iso
5
Establishing the Enterprise Security Function
“Carnegie Mellon is an internationally
recognized leader in computer security
.... Yet the university as an enterprise
lacks a coordinated and sustainable
information security program to address
the vulnerabilities and risks arising from
its own use of information technology. “
-- Developing a Coordinated and Sustainable Information Security
Program for Carnegie Mellon: A Joint Proposal by Computing
Services and Administrative Computing and Information Services
Information Security Office
www.cmu.edu/iso
6
Approved October 2003
“The Information Security and Policy
Office (ISAPO) will have responsibility
for the definition and implementation of
enterprise-wide information security
efforts at Carnegie Mellon. It will be led
by the Director of Information Security
and will report to the Chief Information
Officer (CIO).”
Information Security Office
www.cmu.edu/iso
7
Information Security Roadmap
Acceptable Risk
Current State
Security Gap
No Security
Undefined Risk Tolerance
Unassayed assets
Incident Response
Non-savvy Users
Default Open
Highly Distributed (esp. data)
Policy Light
Uncertain Defense
Best Effort
Information Security Office
www.cmu.edu/iso
Desired State
Defined Risk Tolerance
Managed Assets
Incident Prevention
Skilled User Partners
Default Deny
Optimum Centralization
Policy Rich
Defense-in-Depth
24x7x365 Global SLE
8
Other Cultural Markers & Competing Priorities
• Management
– Stay out of the headlines
– One year to “make progress on governance”
– Balance costs…prevention/response
• Internal
– Stay out of our way (e.g. no firewalls, academic freedom)
– Make security ‘easy’ and transparent
• External
–
–
–
–
Protect copyright above all else
Comply, comply, comply
2,249 new vulnerabilities 80% easily exploitable*
Home users – 86% of targeted attacks*
* Symantec Internet Threat Report Vol. X. September 2006
Information Security Office
www.cmu.edu/iso
9
Surveying the Culture: Preexisting Myths
• We can’t implement firewalls.
• We can’t achieve defense in-depth.
• We can’t centrally mandate and enforce
more security requirements.
Are we really that different?
Information Security Office
www.cmu.edu/iso
10
Founding the ISO
Information Security Office
www.cmu.edu/iso
11
ISO Organization
Vice Provost & CIO
Computing Services
Joel Smith
Executive Director
Computing Services
Carrie Regenstein
Office of
General Counsel
Mary Jo Dively
Director of Information Security
Mary Ann Blair
Incident Response
Coordinator
John Lerchey
Security Engineering
& Operations Manager
Bill O’Malley
Security Engineer
Ted Pham
Security Engineer
Jason Carr
Security Engineer
Allison MacFarlan
Security Engineer
Chris Ries
Policy & Compliance
Coordinator
Doug Markiewicz
Information Security Office
www.cmu.edu/iso
Training & Awareness
Coordinator
Wiam Younes
12
ISO Services
Incident Response
1.
2.
3.
4.
5.
6.
7.
8.
9.
Security Engineering
Incident Detection/Response
Policy Enforcement
DMCA Response (i.e. copyright infringement)
e-Discovery Support
Evidence Collection
Legal/Law Enforcement Interface
Immediate Access Revocation
Missing Student Search
Content Search/Production
1. Policy Development (including procedures, standards,
guidelines)
2. Compliance Coordination (e.g. HIPAA data security)
3. Security/Compliance Assessment
4. Regulation Tracking
5. Contract Review
Future
6. Self Assessment
Policy and Compliance
1. Intrusion Prevention/Detection/Response (e.g. phishing blocks)
2. Network & Host Forensics
3. Security Tools & Technologies
a.
b.
c.
d.
e.
Identity Finder
First Connect
NeXpose Scanner
Snort Intrusion Monitor
RSA Secure ID
4. Risk IQ (i.e. define our attack surface)
5. Attack and Penetration Testing
6. Security Consulting
7. Certificate Authority
8. Threat Mitigation
9. Research Data Support
Future
10. Proxy Services
11. Log Monitoring
1. Security Awareness & Training
2. Security Alerts
3. Compliance Training/Certification
4. ISO Website Maintenance
5. Communication & Documentation
Training and Awareness
Information Security Office
www.cmu.edu/iso
13
Training and Awareness
Information Security Office
www.cmu.edu/iso
14
Training and Awareness Programming
Content
•
•
•
•
Policies and procedures
General security concepts
and issues
Skills e.g. securing your laptop,
tools
Current threats and action items
Delivery
Method
Timing
Information Security Office
www.cmu.edu/iso
15
Training and Awareness Programming
Content
• Web Self-Service (Pull)
• Mass Mail (Push)
• Events/Seminars
• Videos & Games
• Promotional Products
Delivery
Method
Timing
Information Security Office
www.cmu.edu/iso
16
Training and Awareness Programming
ide
ard
Sc
he
Cla dule
ss d
Po
Vio licy
lati
on
Bo
Timing
e
m
o
lc
We ck
Ba
On
ion
NCSAM
ak
e
r
b
t
Ou
nt
nta
t
F ir s
Inc
Or
ie
tC
onn
ec
t
Content
Information Security Office
www.cmu.edu/iso
Delivery
Method
17
Training and Awareness Futures
• Online compliance & awareness training
(e.g. C@CM)
• Increased collaboration with security
research partners (e.g. PhishGuru)
• Increased info sharing via security points
of contact
Information Security Office
www.cmu.edu/iso
18
Information Security Policy
Published
Under Development
Policies
-Information Security Policy
-Information Security Roles &
Responsibilities
-Computing Policy
-GLBA Info. Sec. Program Policy
- HIPAA Security Policy
- Computing Policy (Overhaul)
Standards
None
-Site to Site VPN Standards
Procedures
-Responding to a Compromised Comp.
-Requesting Access to Data for
Research
-Employee Termination Procedure
- Self Assessment Tools for complying
with Guidelines for Data Protection
Guidelines
-Appropriate Use of Admin. Access
-Bulk Email Distribution
-Copyright Violations
-Data Sanitization and Disposal
-Instant Messaging Security and Usage
-Mobile Device Security and Usage
-Password Management
-Web Server Security
-Windows Administrator Accounts
• Guidelines for Data Classification
(RFC)
• Guidelines for Data Protection (RFC)
-Guidelines for Data Handling
-Guidelines for Data Sanitization &
Disposal
-Procedures for Responding to a Security
Breach
-Procedures for Policy Exception
Handling
-Guidelines for Data Retention
Information Security Office
www.cmu.edu/iso
19
Compliance
•
Maintain understanding of IT regulatory requirements
– State: 46 state data breach laws, other security/privacy laws, e.g. SSN
handling laws
– Federal: FERPA (Student), GLBA (Financial), HIPAA (Health)
– International: Privacy laws of Australia, Greece, Japan, Portugal, Qatar
– Industry Standards: COBIT, ISO 27000 Series, PCI DSS
•
Coordinate compliance review activities
– Currently focused on compliance with federal regulations (e.g. HIPAA)
– Shared responsibility among all ISO members
•
Partner with research administration
– Institutional Review Board (IRB): Review requests for access to Comp
Srvcs’ electronic data for research
– Office of Sponsored Programs: Restricted research technology control
plans
•
Ad-hoc review of 3rd party contracts for security/privacy provisions
Information Security Office
www.cmu.edu/iso
20
Incident Response & Policy Enforcement
Network Suspensions
Information Security Office
www.cmu.edu/iso
21
Incident Response Process
Information Security Office
www.cmu.edu/iso
22
Forensic Examination
• Chain of Custody
• Write-Blocked Disk Imaging (Disk-to-Disk,
Encase)
• Analysis (Encase, Sleuthkit, Identity
Finder)
• Network Traffic Analysis (Argus)
• Log Correlation & Analysis
• Malware Analysis
Information Security Office
www.cmu.edu/iso
23
Other IR Responsibilities
• ISO frequently conducts “emergency
suspension” of accounts
• ISO performs missing student searches using
digital bread crumbs
• ISO works with law enforcement to execute
subpoena requests
Information Security Office
www.cmu.edu/iso
24
Incident Detection/Prevention
Attacks
Detection
Prevention
• IDS (Border)
• Argus
• Firewalls (SII)
•
•
Ingress
Egress
• Border blocks
• Service blocks (e.g. mail reply to)
Vulnerabilities
• NeXpose
• WebInspect
•
<- ISO Patch
•
<Threat
• Environmental Inventory
• NetScan
• Nessus
• Argus
• IDS
• Password strength testing
• A&P Tests
• Firewalls (mitigate, not prevent)
• NeXpose
Check Tool ->
Monitoring ->
• FirstConnect
• Security Architecture(s)
• Consulting
Compromises
• IDS
• Argus
• System/service log monitoring
•
<- Strong
• By preventing attacks and
vulnerabilities
• Reduce the effect by earlier detection
Authentication ->
• Sound forensics
Information Security Office
www.cmu.edu/iso
25
Challenges: Attackers and Attack Surface
Networks
Applications
•578 subnets
•Wireless and Wired
•Cisco, Aruba, Xirrus
•ASP, JSP, PHP, Perl, C, Java
•Oracle, MySQL, SQLServer, Ingres, Interbase
•Tomcat, JRUN, JBOSS
•Custom and Commercial
•Open and Closed Source
•30,188 PHP attacks
•240 SQL Injection attempts
Systems
Accounts
•15,314 active IP addresses on campus
•
Windows, Linux, HP-UX, Solaris, etc.
•4,187 Web servers
•
Apache, IIS, Tomcat, Netscape, etc.
•4,473 SSH servers
•465 FTP servers
•331 Database servers
•
Oracle, MySQL, MS-SQL, Ingres, etc.
•1,707 FTP attacks
•1,220 Web include file attacks
•28,579 Andrew accounts
•Double that for AD
•Add in application accounts
•1,509,553 SSH attacks
•130,996 SQLServer SA attacks
Information Security Office
www.cmu.edu/iso
26
A Typical (Partial) Weekday
Information Security Office
www.cmu.edu/iso
27
IDS Console
Color
Sev
Alert
What to do about it
Red
Critical
Yes
Possibly an incident, requires through investigation
Yellow
Caution Yes
Possibly an incident, requires some investigation,
high probability of a false positive
White
Normal
No
Does not require a through investigation however
could be an incident. High probability of false positive
Turquo RENise
ISAC
No
Comes from REN-ISAC's rulesets. Some
false positives, requires investigation
Light
Blue
No
Ignore these rules, they are the lowest priority
No
These rules are inserted for testing. They
generally have a high false positive rate
but are sometimes accurate
Purple
Ignore
Testing
Information Security Office
www.cmu.edu/iso
28
Executable downloads, by URL
Information Security Office
www.cmu.edu/iso
29
Incidents are sent to NetNotify
This is part of a NetNotify page. The incident generates an e‐mail to the owner.
D
d
Information Security Office
www.cmu.edu/iso
30
Vulnerability Scanning Console
• Nexpose
• Distributed view to departmental
administrators
• Centralized view to ISO
Information Security Office
www.cmu.edu/iso
31
Environmental Inventory
• Passive network monitoring
• Intelligence console
• Query-able asset information
Information Security Office
www.cmu.edu/iso
32
SecEng Challenges
•
•
•
•
•
•
•
•
•
IDS covers only a portion of the network
IDS is prone to false-positives
Vulnerability data is prone to false-positives
Vulnerability data isn’t in the “right” hands
Limited data about high risk assets
Correlation is key
A&P tests and consults are ad-hoc and hit-and-miss
Incident investigation is time consuming
Detection is far more difficult than prevention
Information Security Office
www.cmu.edu/iso
33
Security Engineering Roadmap
2004
2005
2006
2007
Detection
{Bandwidth
{NN
{NetScan
{Argus
2008
2009
2010
Prevention
{IDS (limited)
{Custom Argus
{Border IDS
{Custom IDS
Console
{A&P Testing
{FirstConnect
{Identity Finder
{Architecture
{SII
{Proxies
{Firewalls
{2-Factor
{NeXpose
{WebInspect
{DB Scanning
{Code Auditing
{EnvInv
{Forensics
{Vulnerability
Announcements
{Expanded IDS
{Network
Architecture
Information Security Office
www.cmu.edu/iso
{SEIM Tool
{Central
Logging
{Host IDS
{PKI
{CIS Toolkit
{Border
Blocking
{Clean Access
{Systems
Architecture
{Security
Portal
{Distributed
Firewalls
{IPS
{SSDLC
{Anomaly
detection
{Application
Architecture
{ Campus
Proxies
{Expand OTP
34
Information Security Office
www.cmu.edu/iso
35
SII: Principles in Action
•
•
•
•
•
•
•
•
•
•
•
•
•
Network isolation for production systems
Limited ingress and egress traffic
Configuration management & change control
Role based access control e.g. only system administrators in production network
Standardization of operating systems, DBMS, Coding
–
Implement key principles (only necessary services, deny access by default,
implement firewalls, input cleansing, etc.
Automated build processes for ‘secure by default’
Automated server and service provisionion (Future)
–
It should ask the person to describe the systems, and it would be smart
enough to provision OS, software, firewall rules, network placement, etc.
Standardized security control profiles
Robust and centralized logging (On Going)
Automated monitoring, i.e. alerting, response (On Going)
Hurdles for custom approaches
Multi-factor authentication
Encryption used whenever required or appropriate.
Information Security Office
www.cmu.edu/iso
36
How Others Can Help
•
Help reduce the attack surface
– Apply “Default Protect”, “Defense in Depth” and “Least Privilege”
– Standardize
– Implement life-cycles that include decommissioning
•
•
•
•
•
•
Start implementing security at the design stage
Make actions auditable and measurable
Understand roles and responsibilities
Track and control changes
Use encryption where feasible and necessary
Know their own computing environment.
– What’s ‘normal’?
– PII?
•
Think like an attacker
– Assume that external systems and networks are insecure
•
If concerned, stop! Report it. Don’t try to diagnosis or fix it. Preserve
forensic evidence.
Information Security Office
www.cmu.edu/iso
37
Changing the Culture by Debunking Myths
We are not so very different
• We can’t implement firewalls. We can,
– just not at the traditional border.
• We can’t achieve defense in-depth. We can,
– just not in the traditional places.
• We can’t centrally mandate and enforce more
security requirements…We can,
– with far more collaboration and creativity
– more distributed authority and communication
– well articulated use cases and tools.
Information Security Office
www.cmu.edu/iso
38
Thank you
Questions/Comments Welcomed
mc4t@andrew.cmu.edu
Information Security Office
www.cmu.edu/iso
39
Download