The Pennsylvania State University Information Security Program Plan I. Organization of the Information Security Program Penn State has maintained a centralized computer and network security program since approximately 1992, and an administrative computer security program for far longer. The first University Computer, Network and Information Security Officer (now the Senior Director of Security Operations and Services) was appointed in 1993 to coordinate security functions University-wide. Formal University-wide security policies were first instituted in 1992 and extensively re-written in 1997. They form the basis for the overall security program. Policies are reviewed regularly by Security Operations and Services and a major update is anticipated in 2014. In 1996, the overall security program was awarded the prestigious runner-up designation for Computer Security Program of the year by the Computer Security Institute (CSI). The program also received an award from Mirage technologies several years ago for early adoption of Intrusion Detection Systems (IDS) technology. Responsibility for the overall information security program rests with central Information Technology Services and is administered by the Senior Director of Security Operations and Services. Many other organizations and individuals, however, also play a role in providing a comprehensive, distributed security program suitable for a geographically disparate, multi-campus, multi-subnet environment of more than 150,000 users. These include the Administrative Information Services (AIS) Data Security Manager, Area Security Representatives (ASR), and the data backbone network contacts. Designation of “unit liaisons” who will be formally trained in security and who will be responsible for data categorization and risk assessment coordination in their areas is planned to begin in high risk areas in mid 2014. A. Senior Director, Security Operations and Services The Senior Director of Security Operations and Services (SOS) within the Information Technology Services (ITS) organization is the designated contact responsible for information 1 security within Penn State. The overall responsibilities of this position are defined in University Administrative Policy AD20, Computer and Network Security. The Senior Senior Director reports to the Vice Provost for Information Technology to ensure that security concerns receive high-level attention and can be elevated to the Provost or Presidential level immediately, should that become necessary. The Senior Director of SOS also serves as the Digital Millennium Copyright Act (DMCA) agent for the University for purposes of resolving complaints of unauthorized use of copyrighted materials. Note: For purposes of reporting possible security issues or violations, the current contact address for the Senior Director of SOS is: Kathleen R. Kimball Senior Director Security Operations and Services Information Technology Services The Pennsylvania State University 2013 Sandy Drive, Suite 201 State College, PA 16803 (814) 863-9533; FAX: (814) 865-2585 Incident email: security@psu.edu The office of Security Operations and Systems, which the Senior Director of SOS administers, is broken into the following functional areas: Policy Development The Senior Director of SOS is responsible for the initial development and subsequent interpretation of University policy in the information security area. Both development and interpretation are coordinated as appropriate with various offices of the University (e.g., Office of General Counsel, Internal Audit). Draft policies in the security area also receive extensive coordination with student and faculty committees. There are four primary policies related to information security. These are AD20, Computer and Network Security; AD23, Use of Institutional Data; ADG01, Glossary of Computerized Data and System Terminology; and ADG02, Computer Facility Security Guideline. The policies and guidelines apply to all campuses and all units of the University. Additionally, college and unit-level policies and procedures may exist 2 augmenting the overall AD20 policy provisions. The University has also implemented a Data Categorization policy (AD71, Data Categorization and its accompanying Guideline, ADG07, Data Categorization Examples) to establish a formal three-tiered information sensitivity level for the University. The three categories or classifications are Public, Internal/Controlled and Restricted. A data census or inventory to identify distributed systems at the various levels and to assess/mitigate risk has begun with two pilot efforts and will be implemented in high risk areas beginning in mid 2014. A Governance, Risk and Compliance (GRC) tool, Modulo, is being used to generate surveys, document findings and to identify compliance gaps. Training and Awareness Any unit of the University may request training in security topical areas from Security Operations and Services. Additionally, seminars are conducted in specific security areas on a regular basis. These include such topics as desktop security, incident reporting, and securing Windows platforms. Web-based security tutorials are available to the entire University community to enable learning in this area at times and places convenient to the user base. Additionally, week-long, hands-on training is provided at the level of two to three courses per year to improve the security administration skills of system administrators. Informational materials and brochures are also produced for distribution at meetings and other functions. An annual security conference is held for a nominal fee that is open to all members of the Penn State community. Advisories on vulnerabilities from major incident response organizations (e.g., CERT/CC) are circulated to all of the University’s formal network contacts so that appropriate action to resolve vulnerabilities can commence at the local level as soon as vulnerability information is published. Vulnerability Assessment Penn State has maintained an active security scanning program since 1995. At that time, it was becoming apparent that large-scale “scans” of Internet address spaces 3 were being conducted by hostile sources and that such probes were becoming more sophisticated, employing both techniques to disguise the probes and converting probing methods to more automated forms requiring little human intervention. Such probes or scans seek to detect known vulnerabilities in operating systems or applications that can be subsequently exploited to gain control of a machine or machines. SOS routinely runs similar scans, not for purposes of exploitation of vulnerabilities, but to report such vulnerabilities to the cognizant system or network administrators so that the issue(s) can be fixed. The tool used is a commercial product, Tenable’s Nessus, which was procured by site license. The scans are normally voluntary, conducted at the request of the cognizant system or network administrator for a given network, though the University reserves the right to scan any address in its Internet Protocol (IP) space at any time in order to help ensure security. Such scans are frequently conducted in association with routine audits of a given network. They are mandatory for networks handling credit card data and subject to the PCI standards. SOS has also implemented the Security Center functionality of Nessus that allows authorized network contacts to run their own scans of their designated address space in addition to scans that SOS may conduct. SOS also runs web application scans using a commercial tool, AppScan. Similar to baseline OS vulnerability scans, any unit contact can request a web application scan. A self service web application scanning capability using a different tool, Cenzic, is also planned. In addition to vulnerability and web application scans, Penn State also has a very large scale effort to scan for Personally Identifiable Information (PII), for example Social Security Numbers, Credit Card Numbers and Drivers License Numbers, on systems where such data should not reside. At present there are more than 20,000 clients reporting results to a central console. Employing Identity Finder commercial software, users of the clients are presented with suspected PII instances and choices for how to remediate or remove the PII. The program helps to significantly reduce the possibility of data loss. 4 Risk Assessment Risk assessments are done both by internal staff and by external auditors or consultants for certain critical systems. A comprehensive early study resulted in implementation of a very robust Intrusion Detection architecture. The Intrusion Detection Architecture, monitored centrally, includes Snort Sensors at local area networks in 50 locations, border capture which analyzes header data for traffic patterns related to hostile activity, and Bro which allows deeper analytic capabilities to identify sophisticated attacks and to evaluate their scope. SOS also conducts on-site risk assessments with requesting units that include recommendations for mitigating identified risks. Primary threats to Penn State systems include: external Internet-based attacks leveraging comparatively open University academic systems to try to gain further advantage, internal threat from inquisitive or malicious students, internal employee threat, disruption or data loss by physical human action (theft, vandalism, terrorism), accidental disruption of service or data loss by human error, and accidental disruption of service or data loss by natural disaster (fire, flood, tornado). In the financial area, the most severe threats are generally insider threats (data modification by motivated students or employees), though external Internet-based probes/attacks are frequently encountered. Incident Response and Forensics Penn State has had a formal incident response team since 1993. Penn State is a member of the REN-ISAC and frequently receives early warning of Internet-based attacks via that mechanism. Members of the response team assist units in incident resolution, to include hands-on support and systems analysis as required. The team also handles minor abuse reports such as spam and chain letters. By policy, any user who suspects a computer or network security incident is required to report that to the central incident response team. The response function is staffed during working hours but maintains a telephone number where a team member can be reached 24/7, 365 days per year. The team frequently works with law enforcement agencies and 5 maintains two analysts trained in the preservation of evidence and forensic evaluation of computer systems. The particular forensic tool most frequently used for hard drive disk image copy and analysis is EnCase. B. Administrative Information Systems (AIS) Data Security Manager In coordination with the Senior Director of Security Operations and Services and other cognizant University offices (e.g., Internal Audit), the Administrative Information Systems (AIS) Data Security Manager (within the AIS unit of Information Technology Services) is responsible for the development and implementation of security policies, safeguards and methods related to the handling of institutional data (including financial information). In this regard, s/he is responsible both for overseeing security of the administrative mainframe and in helping to set applicable security requirements for distributed administrative sytems (those that process sensitive institutional data and for which stricter security requirements are imposed). In conjunction with the Security Operations and Services Senior Director, the Administrative Information Services Security Officer helps to establish compliance requirements and security levels for authorized connection to AIS systems. Either the AIS Data Security Manager or the SOS Senior Director may request the immediate removal of account privileges on administrative networks for system users or information associates who have violated University computer and network security policies. C. Access and Security Representative(s) (ASR) An ASR enforces all University policies and guidelines pertinent to the use of University computerized data assets. S/He acts as an interface between a specific work unit and the AIS Security Office and AIS Data Security Manager. Whenever problems, questions, or issues must be brought to the attention of the AIS Security Office, the unit’s ASR becomes involved. ASR’s also request access to administrative systems and applications and verify the need for unit personnel to have access to specific administrative information (including financial information). 6 D. Data Backbone Contacts A prerequisite for a subnet to join the Penn State integrated data backbone is the designation of an Administrative, Technical and Security contact for network addresses within the subnet range. This greatly facilitates security response in that the individual or individuals responsible for a given IP can be quickly located. The responsibilities of data backbone contacts include: Administrative Contact - responsible for administrative and policy concerns for machines using the assigned subnet, and is also the secondary contact with the Telecommunications and Networking Services (TNS) unit of Information Technology Services for changes in the domain name system. Technical Contact - responsible for technical matters for the assigned subnet such as assigning the host part of the Internet address, and is also the primary contact with TNS for changes in the domain name system. Security Contact - responsible for security matters for the assigned subnet such as representing the organization at computer and network security meetings and ensuring that University computer and network security policies are followed within the subnet. All three contacts are notified if a security occurs involving an IP address in their subnet range and are responsible for working with SOS with regard to incident resolution. 7 II. Risk Assessment Risks that are considered in evaluating central or distributed sytems include the following: A. Data and Systems (Risks) 1. External – i.e. originating from a machine, device, or user outside the University. a. Destruction, modification, or disclosure (intentional) – includes unauthorized insertion of data (e.g., creation of an illegal warez site for the trading of copyrighted materials) b. Destruction, modification, or disclosure (unintentional) – e.g., caused by a system configuration error on a machine or device external to the University but which may interface with internal systems c. Denial of service (intentional) d. Denial of service (unintentional) – e.g., an error in system configuration external to the University produces a network flood 2. Internal – i.e., originating from a machine, device, or user inside the University. a. Destruction, modification, or disclosure (intentional) b. Destruction, modification, or disclosure (unintentional) – e.g., caused by a system configuration error on a Penn State system c. Denial of service (intentional) d. Denial of service (unintentional) – e.g., an error in system configuration external to the University produces a network flood B. Network (Risks) 1. External or Internal a. Destruction or modification of critical network infrastructure (intentional) 8 b. Destruction or modification of critical network infrastructure (unintentional) c. Denial of service (intentional) d. Denial of service (unintentional) C. Physical (Risks) 1. Unauthorized access resulting in physical destruction or modification of data 2. Unauthorized access resulting in theft of material assets 3. Unauthorized access resulting in theft of data 4. Intentional or accidental damage or destruction to computing or network resources (e.g., manmade or natural disaster) D. Policy and Procedural (Risks) 1. Destruction, modification, or disclosure of system or data assets due to lack of policy, inadequate policy, or lack of understanding of the applicable policy by the affected constituency 2. Destruction, modification or disclosure of system or data assets due to lack of procedures, inadequate procedures, or lack of understanding of the applicable procedures by the affected constituency As noted, the University uses a Governance, Risk and Compliance (GRC) tool, Modulo, with templates for the major compliance requirements that can be applied to the various central and distributed systems. The templates also address networks with specialized requirements (e.g., HIPAA, PCI). A major data inventory and risk assessment activity is being undertaken in 2014 using the tool and associated surveys. Two pilots were completed in late 2013, early 2014. III. Risk Mitigation In addition to the scanning programs and the Data Categorization efforts to assess overall information security risk, a number of specific risk mitigation steps have been in place for some 9 time. These follow below. Additionally, the GRC tool noted above provides the ability to assign a system or area for “treatment” to track the status of specific remediation efforts. A. Administrative/Financial 1. The mainframe is protected using well-known security access and authorization control software (ACF2) 2. Updates and most read access to mainframe administrative/financial data requires two factor authentication (Vasco tokens) 3. Access by users to personal information maintained by the institution requires strong authentication (Kerberos) 4. Administrative networks are generally segregated from academic networks and/or untrusted user data interception 5. A well-established procedure exists for granting and removing administrative access 6. Distributed applications require strong authentication and, where possible, two factor authentication and encryption 7. Financial transactions have a designated approval path involving more than one user 8. Regular external and internal audits are conducted 9. Scans are conducted at the request of the cognizant administrator to determine residual vulnerabilities. 10. Off-site backup is maintained for administrative/financial data essential to continuity of business operations 11. Any system authorized to store Social Security Numbers must comply with a minimum set of security standards suitable for highly restricted data 12. A cyber-insurance program exists with deductible rates adjusted to the level of security the unit can demonstrate 13. A very active program exists to help merchant areas ensure compliance with PCIDSS. The QSA is 403 Labs. 10 In addition to the mitigating steps at the enterprise level, a number of distributed inititatives have been pursued as a result of various strategic plans and consultant engagements. These include: A program to provide enhanced system administrator training A program to provide enhanced user training and awareness A University-wide site license for anti-viral software Implementation of distributed firewalls and Intrusion Detection Systems Additionally, when system and network administrators request security scans and/or undergo mandatory audits for their respective systems, specific mitigating recommendations are made at that time. B. Contractor Relations In the event that that processing of Restricted data must be outsourced, adequate and appropriate contractual checks and balances exist to help ensure overall security and integrity of the data. A Security Design Review (SDR) document exists to help ensure that external vendors have adequately considered security in products Penn State seeks to procure. Security Operations and Services maintains active relationships with Purchasing, Risk and the Office of General Counsel to help ensure that cloud or other third party vendor software has included viable safeguards. IV. Incident Response As noted previously, the University has a long-standing incident response capability under the direction of Security Operations and Services. Employees within SOS are crosstrained to handle incidents and a contact list is maintained such that incidents can be handled twenty-four hours a day. Instructions on reporting incidents have been formulated and disseminated within the community. There are two primary reporting email addresses: security@psu.edu 11 abuse@psu.edu The SOS security team monitors and responds to both addresses. By policy, all computer and network security incidents, regardless of where they occur within the University, are to be reported to the central response organization. The range of response services is broad, ranging from minor spam and chain mail reports to major investigations involving multiple systems internal and external to the University. The response function maintains active relations with law enforcement and external incident response organizations such as CERT/CC. The incident categories handled by the response team include: Denial of Service Unauthorized Access Attempts System, Account, or Data Compromise Copyright Infringement Electronic Harassment Commercial Use Phish, Relays, and Chain Letters Forgeries/Misrepresentation Other Incidents are tallied annually. The incident handler on duty the day reports are received prioritizes the incident reports. An incident involving a financial asset would generally receive immediate attention; the only category of incident higher in priority would be a threat to human life. As noted before, the response team also has a full forensic analysis capability available and can preserve/analyze computer evidence in a manner suitable for use in court should the need arise. V. Summary 12 The Information Security Program is organized in a mix of central and distributed roles, suited to its geographic and unit differences. Central responsibility for security functions has been established and vested in the position of the Senior Director for Security Operations and Services within Information Technology Services. The program maintains the controls needed for sensitive financial and administrative applications and has a firm policy and procedural underpinning. A permanent funding stream has been identified which will allow continuation of and growth for the Program. 13 Policy References AD20, Computer and Network Security (http://guru.psu.edu/policies/AD20.html) AD23, Use of Institutional Data and System Terminology (http://guru.psu.edu/policies/AD23.html) AD35, University Archives and Records Management (http://guru.psu.edu/policies/AD35.html) AD71, Data Categorization (http://guru.psu.edu/policies/AD71.html) ADG01, Glossary of Computerized Data and System Terminology (http://guru.psu.edu/policies/ADG01.html) ADG02, Computer Facility Security Guideline (http://guru.psu.edu/policies/ADG02.html) ADG07, Data Categorization Examples (http://guru.psu.edu/policies/ADG07.html) 14