STRATEGIC IT ACCOUNTABILITY BOARD AGENDA Friday, August 22, 2014

advertisement
STRATEGIC IT ACCOUNTABILITY BOARD
AGENDA
Friday, August 22, 2014
11:00 a.m. – 12:00 p.m.
STARK LIBRARY
I. Administrative System Modernization Program 2.0 and Change Coordination Board –
Discussion (Renee Wallace)
II. InfoSec Policy Changes – Endorse (Cam Beasley, Tod Maxwell)
I. Identity and Access Management – Update (C.W. Belcher)
*UT Login
*Toopher
IV. University Data Centers – Update (Michael Cunningham)
V. Longhorn Innovation Fund for Technology – Update (Brad Englert)
ASMP 2.0 and Change Coordination Board - Discussion
Overview
The Administrative Systems Modernization Program (ASMP 2.0) is a large-scale, multi-year initiative to
replace the core human resources, payroll, financial, and student systems, implement a new technical
architecture, and decommission the mainframe in 2020. The program is a significant investment in our
future operational effectiveness and success relies on a committed and cooperative effort from the
entire campus.
Resource Constraint Risk
Priorities and initiatives originating in other campus units will likely compete for the same resources
needed to meet ASMP 2.0 objectives and may be dependent on modifications or enhancements to
systems about to be replaced, creating a program risk that must be managed. Systems about to be
replaced should be minimally maintained (bug fixes, statutory changes) to free up resources.
Constraints within central business areas:
Individuals from central functional and technical teams are being redirected to the program
Others remaining in HR, Payroll and Finance will contribute to the program as subject matter
experts in addition to maintaining business continuity until the new systems are implemented
Staff from student administrative areas are developing business requirements for a replacement
system and coordinating procedural or policy changes that will facilitate transition
Constraints outside the central business areas:
Hundreds of other campus employees will be participating in advisory groups, design workshops,
readiness activities and training, in some cases with a substantial time commitment
Many of the systems owned and operated by colleges and other units interact directly with core
systems (HR/Payroll and Finance) and will need to be adapted
The mainframe hosts approximately 600 non-core applications that must be retired or replaced.
The project team is providing coordination and advisory support to assist in this effort, but the
work to move off the mainframe will primarily be performed by the owning units
How do we balance ASMP 2.0 success with other priorities?
A coordinated approach with an overall institutional perspective is needed to:
Sustain business continuity during the new system implementation
Avoid overloading staff (campus-wide) with competing demands
Ensure our ability to meet regulatory or statutory compliance requirements
Avoid proliferation and investment in mainframe systems that must eventually be replaced
Support strategic university priorities
Proposed Solution for discussion: Establish a Change Coordination Board
Leveraging the existing IT governance committees, a structured and predictable process will be
implemented for identifying potential conflicts in priorities and facilitating resolution. The Change
Coordination Board will provide a forum to ultimately decide priorities that cannot be resolved in the
committees. The process will provide transparency into planned IT projects across campus and an
opportunity to:
Determine at an early stage whether or not interfaces to central systems can be accommodated
and if so, coordinate with the ASMP 2.0 schedule to avoid rework by the requesting unit
Consider alternative solutions to meeting the business need
Identify similar needs in multiple areas for possible collaboration
The work of the Change Coordination Board will raise awareness with campus business leaders about
competing demands and provide the forum to work collaboratively to achieve institutional priorities.
InfoSec Policy Changes - Endorse
Background
The Internal Audit Committee has asked that the following recommendations related to purchasing and
managing University owned IT devices be addressed in IT security policies as they are related to
vulnerabilities identified in audits conducted in units across campus. An AIC working group has been
working since Jan-2014 to develop the framework for these changes. These changes have been
discussed with AIC, BSC, OIT, and the Executive Compliance Committee.
Primary Findings
1.
2.
The University is unable to consistently identify IT resources on campus (e.g., laptops, desktops,
servers). If devices cannot be identified, they cannot be secured and managed properly. The
inability to identify devices for security and management purposes is growing worse as more
devices become portable and as users bring multiple devices to campus. The inability to identify IT
resources allows for increased security vulnerabilities.
The University is unable to verify devices are being professionally managed, which leads to
unnecessary risks involving sensitive university data.
Implications of Findings
1.
2.
3.
4.
Many department man-hours are devoted to responding to security events.
Lost productivity for end users of systems who manage their own devices.
Inconsistent or non-existent system management processes in place in units.
Inventory management consumes a number of needless man-hours every year.
Recommendations
1.
Create a new policy statement requiring University owned IT devices to be purchased and
processed through the local IT support staff or via IT Shared Services. More specifically,
implement the recommendation that was previously endorsed by IT Governance as a best
practice as the campus policy. An exception process will be possible for unique situations.
2.
Create a new policy statement requiring all university owned IT devices to be managed by
professionally trained personnel. Industry recognized certifications and continued professional
development will be required to demonstrate professional training. An exception process will be
possible for unique situations.
3.
Create a new policy statement requiring more tightly controlled management practices around
the use of administrator-level accounts on university owned IT devices. Eighty to ninety percent
of all university computer breaches are successful because the end-user is operating as the system
administrator. An exception process will be possible for unique situations, which would allow for
shared administrative access (e.g., when faculty must locally manage specialized software or tools
on their systems).
1
InfoSec Policy Changes - Endorse
InfoSec Policy Changes – DRAFT Memo
Subject: Operational: Policy Changes to Improve IT Resource Management and Security
Faculty and Staff:
As the use of information technology (IT) resources continue to evolve on campus, it is important that we also take
sensible precautions with regard to managing and securing these devices so that we can protect the data and
information assets of our faculty, staff, and the University.
As a result of Internal Audit findings and UT System policy changes, the University will enact new IT policies that
will help to afford new controls to ensure campus units are consistently managing the information resources of the
university. These policies have been reviewed and endorsed by IT Governance, the Internal Audit Committee, and
the Executive Compliance Committee.
These modifications will be published to the Information Resources Use and Security Policy
(http://security.utexas.edu/policies/irusp.html) and will be made effective August 01, 2015.
The changes specifically address the following necessary IT process improvements on campus:
1. The need for a defined training and certification program for IT support staff that will help ensure these staff
are professionally trained, confident in using the various IT toolsets on campus, and growing in their skill sets
throughout their tenure at the University.
2. The need to ensure IT inventory is being properly accounted for, securely configured, and consistently managed
by involving IT staff in the processing of IT procurements.
3. The need for more tightly controlled management practices around the use of administrative accounts for IT
resources.
Many campus units have had such controls in place for a number of years, and your vigilance and effort is greatly
appreciated, but it is important that the University ensure IT resources are being consistently managed and
secured across the campus.
Your local IT support staff are taking steps to work these changes into their procedures.
If you have any related questions or concerns, you may contact either your local IT support staff or contact the
Information Technology Services Help Desk by telephone at 512-475-9400 or by e-mail at
help@its.utexas.edu. Questions regarding the policy changes can be directed to the Information Security Office at
security@utexas.edu. And the following Web site can be consulted for more information:
Information Resources Use and Security Policy
http://security.utexas.edu/policies/irusp.html
Sections 5.4.7, 5.22.4, 5.23.5
Thank you very much for your help and cooperation with this effort.
Kevin P. Hegarty
Vice President and Chief Financial Officer
Gregory L. Fenves
Executive Vice President and Provost
2
InfoSec Policy Changes - Endorse
UTLogin Transition – Update
About UTLogin
UTLogin is the new centralized authentication service that replaces the legacy Central Web
Authentication (CWA) system, which uses Fat Cookie as an authentication mechanism, used by
many university web applications. The CWA system has reached its end of life and is being retired
due to significant security issues and because it cannot meet the current business needs of campus.
Timeline for Transition
In November 2012, the Architecture & Infrastructure Committee endorsed the schedule for
transitioning university applications to UTLogin and retiring the CWA service. CWA applications
were organized into four transition groups and began moving to UTLogin in July 2013. The first
three transition groups completed their moves to UTLogin on June 30, 2014. UT Direct (Transition
Group 4) is scheduled to move to UTLogin on September 16, 2014, concluding the transition
process and allowing the retirement of the CWA system.
Transition Status
As of August 15, 2014, of the 210 servers and applications in the CWA environment:
95.7% (201 servers) have completed the transition process or are being retired
3.8% (8 servers) are on schedule (UT Direct and related servers)
0.5% (1 server) is behind schedule (Admissions Batch Print system). Admissions technical
staff are actively working to transition this system to UTLogin.
1|U T L o g i n T r a n s i t i o n – U p d a t e
Two-Factor Authentication – Update
About Two-Factor Authentication
The prevalence of “phishing” attacks on university systems is increasing at an alarming rate across
the country, in Texas, and within the UT System. Phishing fraudsters steal passwords in order to
redirect paychecks, view W2 forms to access sensitive personal data, and commit identity theft.
With two-factor authentication, the regular password login process is enhanced with an additional
authentication step that leverages something the user possesses (such as a mobile phone). Adding
this second authentication factor provides a defense against common phishing scenarios.
Toopher
As of July 8, 2014, two-factor authentication has been required to update paycheck bank routing
information and to download W2 forms. A user-friendly and secure tool called Toopher enables
this two-factor authentication step. Since two-factor authentication was deployed approximately
4,000 university employees have used the service to view or update their payroll information.
Toopher is compatible with Apple iOS and Android mobile devices, eliminating the need for a
separate one-time password key fob or other device. It also provides the ability to make two-factor
authentication “invisible” to the user by automating the second factor authentication step when
the user is in a trusted location, such as his/her office or home.
Next Steps – Fall 2014
ITS and the ISO are working with Toopher to provide additional authentication options that do not
require a mobile device, including pre-generated one-time passwords and a “call me” function. An
enhancement to support one-time password key fobs is also being pursued for those cases where
the user cannot use any other authentication mechanism.
ITS is also working with Financial Information Systems to plan the deployment of two-factor
authentication for updating non payroll-related bank routing information and viewing tax forms
(direct deposit for student scholarship payments, employee travel reimbursements, etc.).
As part of the Identity and Access Management (IAM) strategic roadmap, an Identity Assurance
Framework will be introduced this fall (late October) that will assist campus departments in
objectively assessing the risks involved in their online applications and determining whether twofactor authentication is needed to mitigate those risks.
1
Two-Factor Authentication – Update
University Data Centers – Update
High Availability and Security
The University Data Center (UDC) at the Computational Resource Building went into production
in October 2010. Since 2010, the UDC has provided high availability services in a very secure
environment. With significant focus behind the scenes, the UDC Operations and Engineering
Team maintains a 24x7 security and monitoring environment. The Operations and Engineering
Team has exceeded its Service Level Agreement of 99.98% availability and delivered 100%
uptime year over year.
1
University Data Centers – Update
University Data Centers – Update
Supporting the Migration of Commodity Servers
With the inception of the commodity server policy initiative, the UDC has supported numerous
migrations from across campus. Today, the UDC hosts all of ITS core systems in addition to
hosting a cross section of systems from 42 business and academic units from across campus.
This systems inventory continues to grow and currently exceeds 1,100 plus physical systems
and 1,200 plus virtual systems.
In some instances, systems migration consists of moving a physical machine out from under a
desk or from a closet into the secure environment of the data center. In other instances, this
migration effort consists of moving the owner’s applications and data to a virtual server already
hosted in the data center and then retiring the physical machine. A total of 66 physical servers
and 301 virtual servers were migrated calendar year 2014.
2
University Data Centers – Update
2014-2015 LIFT Award Recipients
The following proposals were selected to receive funding from the Longhorn Innovation
Fund for Technology (LIFT) for the 2014-2015 academic year.
Thrive @ UT: Using Technology to Promote UT Students’ Emotional
Intelligence and Academic Success
Thrive@UT will be a mobile app geared towards the personal development of emotional
wellness and life success of college aged students.
Participants: Dr. Chris Brownson, Counseling and Mental Health Center; Dr. Ricardo Ainslie
Department of Educational Psychology; Elana Bizer, Counseling and Mental Health Center; Katy
Redd, Counseling and Mental Health Center
CARL: The Cloud-based Advanced Robotics Laboratory
The Cloud-based Advanced Robotics Laboratory (CARL) will enable UT students, faculty, and
staff to use, program, and experiment with human-centered robots for educational and
research purposes.
Participants: Luis Sentis, Mechanical Engineering; Aloysius Mok, Computer Science; Matt
Mangum, Faculty Innovation Center
Dynamic Virtual Earth Science Collections
The Virtual Earth Science Collection will make more than four million specimens held in the Nonvertebrate Paleontology Laboratory collections virtually accessible thru an online database.
Participants: Ann Molineux, Jackson School of Geosciences & Non-vertebrate Paleontology Lab;
Tomislav Urban, Texas Advanced Computing Center & Data Management and Collections; Faye
Geigerman, Jackson School of Geosciences & Non-vertebrate Paleontology Lab
Bringing the Tools of Research Direct to the UT Classroom: Systemic, a
Virtual Lab for Students
The Virtual Lab will build on the existing app, Systemic, and allow students to independently
explore astronomical data, through visualizations, games, and a specialized curriculum.
Participants: Dr. Stefano Meschiari, Department of Astronomy; Dr. Joel Gree, Department of
Astronomy; Dr. Randi Ludwig, UTeach Primary
Environ
Environ is an educational game that puts students in a position to appreciate the complexity and
difficulty of the decisions that world leaders must make.
Participants: Peter Elam, Center for Teaching and Learning – Digital Media Institute; Matt O’Hair,
Center for Teaching and Learning – Digital Media Institute, Digital Median Institute Student
Staff; Faculty and Graduate Student Subject Matter Experts
1
2014-2015 LIFT Award Recipients
Download