S B C

advertisement
SERVICE BUSINESS CASE
NETWORK SECURITY
TABLE OF CONTENTS
EXECUTIVE SUMMARY .............................................................................................................................3
1.
Problem Definition ......................................................................................................................4
2.
Addressing Problem with CWU existing tools and products (i.e. PeopleSoft) .................................4
3.
Organizational Impact .................................................................................................................4
4.
Benefits ......................................................................................................................................5
5.
Strategic Alignment .....................................................................................................................5
6.
Cost ............................................................................................................................................5
7.
Alternatives (add lines as necessary) ............................................................................................6
8.
Timing / Schedule (add lines as necessary) ...................................................................................6
9.
Technology Migration/Resource Identification .............................................................................6
10. Product Life/Application Sunsetting or Decommissioning ............................................................6
11. References .................................................................................................................................7
12. Recommendation .......................................................................................................................7
13. Approvals...................................................................................................................................7
Network Security
Page 2 of 7
EXECUTIVE SUMMARY
In our current environment, Central Washington University does not implement any intrusion detection
or intrusion prevention systems (IDS/IPS). These systems are network security devices that reside on the
network and listens to the traffic. The purpose of these devices is to detect intrusions as they happen
and then prevent them from intruding on our network. This includes protocol-based inspection,
protection against advanced malware, zero-day attacks, Distributed Denial of Service Attacks, and
botnets.
The need for an effective intrusion detection/prevention solution is driven primarily by:

Best practice: We currently do not have any way of detecting intrusions on our network other
than from a forensic perspective.

PCI / HIPAA Compliance: Both the PCI and HIPAA federal compliance standards require that an
IDS/IPS system is in place.

Cedar Crestone Security Recommendations: The Cedar Crestone security assessment indicates
that the implementation of an IDP/IPS system is a critical part of the deployment of the
PeopleSoft Portal environment.
Network Security
Page 3 of 7
Sponsoring Department(s): Security Services Department
Date of Business Case Preparation: 10/8/13
Contact Person Name/Phone: Andreas Bohman / 2499
New Product/Service
If there is a draft or sample contract, please provide a copy.
Renewal of Existing Product/Service – if checked, include background information.
If there is a site license agreement, existing contract or new contract draft, please provide a
copy.
1. Problem Definition
Central Washington University currently does not have any systems or devices in place to
detect intrusions on our network. While we have firewalls in place, these devices are not
designed to detect intrusions in what is otherwise considered to be valid traffic into our
network. In order to provide for network security based on best practice, federal
compliance requirements, and the Cedar Crestone security recommendations, we have to
implement an IDS/IPS system.
PCI Compliance Language:
11.4 Use intrusion-detection systems, and/or intrusion-prevention systems to monitor all
traffic at the perimeter of the data environment as well as at critical points inside of the
data environment, and alert personnel to suspected compromises. Keep all intrusiondetection and prevention engines, baselines, and signatures up-to-date.
2. Addressing Problem with CWU existing tools and products (i.e. PeopleSoft)
This is a network security equipment purchase and there are no other solutions that provide
this functionality in our environment.
3. Organizational Impact
Stakeholders: The primary stakeholders are the Security Services and Information Services
departments.
There is expected to be minimal impact on the rest of the CWU staff.
Training Requirements:
Depending on the solution that is decided upon, there will be training required for the
technical staff tasked with managing the IDS/IPS solution.
Network Security
Page 4 of 7
All Stakeholders:
Department
Name
Security Services
Andreas Bohman
Security Services
Jamie Schademan
Security Services
Barbara Bisson
ITS
Chris Timmons
ITS
David Hart
4. Benefits
As we are currently not able to inspect network traffic as it enters our environment, this is a
much needed functionality. We will also be in a much better position to ensure the
confidentiality, integrity, and availability of our customer’s confidential information.
In addition, we have to implement a solution that meets federal compliance requirements in
order to avoid non-compliance consequences. Lastly, as we deploy the PeopleSoft Portal,
we will be able to prevent intrusions into our business-critical data.
5. Strategic Alignment
Student success: CWU believes that student success is best achieved by providing
supportive learning and living environments that encourage intellectual inquiry, exploration,
and application.
Strategic Alignment: By providing for a secure yet highly available environment, we ensure
ready access to information will still providing our students with the confidence that we will
protect their confidential information.
Shared Governance: CWU believes that shared governance is most effective when
information systems and decision-making processes are both robust and transparent. CWU
believes that communication channels should be open and two-way and that faculty, staff,
and students should be empowered to participate in the governance systems.
Strategic Alignment: Securing our customer data is an important part of building and
implementing robust and transparent information systems and decision-making processes.
6. Cost
There is currently no funding for this business case.
The Security Services department is currently soliciting quotes from vendors for the
purchase of an IDS/IPS solution. The cost of the equipment is estimated to be $75,000.00 $100,000.00.
Network Security
Page 5 of 7
Item
Equipment Purchase
Annual Maintenance
Unit
1
1
Cost
$100,000.00
$10,000.00
5-Year Cost
$140,000.00
7. Alternatives (add lines as necessary)
Alternative
Reasons For Not Selecting Alternative
Do nothing
Exposure to intrusions into our businesscritical data.
8. Timing / Schedule (add lines as necessary)
Task
Target Date
Evaluate RFQ responses
12/15/2013
Select Vendor
12/16/2013
Purchase Equipment
01/01/2014
Initiate Implementation
01/15/2014
Complete Implementation
02/01/2014
9. Technology Migration/Resource Identification
Resource
Jan
Feb
Mar
Apr
May
June
July
Aug
Sept
Oct
Nov
Dec
Security Admin
15
10
ITS
15
5
Total Hours
30
15
10. Product Life/Application Sunsetting or Decommissioning
The expected product life for the IDS/IPS solution is 5-6 years.
Network Security
Page 6 of 7
11. References
Cedar Crestone Security Recommendations
PCI Compliance Documentation
HIPAA Compliance Documentation
12. Recommendation
It is recommended that CWU purchases an IDS/IPS solution in order to detect and prevent
intrusions into its network and data environments.
13. Approvals
The following actions have been taken by the appropriate Sub-Council (ATAC or NonAcademic Sub-Council) and University Enterprise Team:
Date
Action
By
10/10/2013
Presented to Non-Academic
Andreas Bohman
10/14/2013
Approved for Review by cabinet
Non-academic
10/14/2013
Presented to EISC
Andreas Bohman
10/14/2013
Approved for Review by cabinet
EISC
Upon approval by the Enterprise Team (ET) or one of the two Sub-Councils (Academic or NonAcademic), CWU procurement policies and procedures should be used to initiate a purchase.
Please contact the Purchasing office at x1001 with any questions regarding the procurement
process.
If you have any questions, please contact Sue Noce 963-2927 or Tina Short 963-2910.
Network Security
Page 7 of 7
Download