UGASecRoleAcctTraining - EITS

advertisement
UGA Role-based
Security/ Accountability
Model
BAAF Quarterly Meeting
2007
2007
1
“The University of Georgia cannot protect
the confidentiality, integrity, and
availability of sensitive information and
information systems in today’s highly
networked systems environment without
ensuring that each person (student, faculty
and staff) understands their roles and
responsibilities, and is adequately trained
to perform these roles”.
UGA Chief Information Security Officer
UGA Security Committee
2007
2
The vision for the University of Georgia is a campus
environment where the protection of sensitive and critical
data, and information technology resources, is a shared
responsibility among administrators, faculty, staff,
students, and IT professionals.
This responsibility will be addressed campus-wide by
implementing information security best practices based on
individual role and level of accountability, and will be
supported through building increased awareness and
participation in training and educational opportunities.
2007
3
2007 Senior VP Campus Memo
“Role/Accountability” Campus-wide Plan
…accountability for implementation of University security standards, policies,
processes and procedures based on individual position and level of responsibility
2006-2007 Securing Sensitive Data
“Defense-in-Depth”
Processes, People, Core Technology Tools
2006 President’s Retreat
“Securing UGA Sensitive Data: Current Status,
Challenges and Future Directions”
Atten: Issue #5 — Acceptance of shared responsibility for institutional
data and information security…campus-wide
2005 Campus Memo
“Securing Sensitive Data Initiative”
2007
Phase I: UGA Auditor/CISO high risk Assessment (19 campus units)
Phase II: Inventory of all assets (i.e., servers, databases, personnel) through
ASSETs Online software application, Version 1 (350 campus units)
4
Securing Sensitive Data
Defense in Depth
Processes
Technology
People
USG Chancellor
Board of Regents
UGA President
2007 Mandatory Standards/Policies
•UGA Policy on Use of Computers
•UGA Electronic Mail Policy
•UGA Minimum Security Standards-Networked Devices Policy
•UGA Password Policy and Standards
•UGA Telecommunications Policy
•Georgia Surplus Policy
•Certification of compliance
•Mandatory Completion of ASSETs Version 1.1
•Spot Audit – UGA Auditor Office
•Mandatory Hiring Practices/Background Check
Senior Vice Presidents
CISO
Vice Presidents, CIO
Deans, Vice Provost
Assoc VP’s, Assoc Provosts
Campus
IT
Personnel
Dept/Unit/Div Heads
•Virtual Private Network (VPN)
•Intrusion Prevention System (IPS)
•Centrally managed end-point
security (i.e., anti-virus; anti-spy ware)
•24x7 monitoring via Secure
Operations Center (SOC)
•Central Hosting facility/Boyd
•Campus-wide Licenses (e.g.,
F-Secure; Absolute Track)
•Vulnerability management
•Risk Management tools (e.g.,
ASSETs Self Assessment)
•Access Control (e.g., Blue Socket
Authentication)
Network Administrators
Systems Administrators
Required Risk Mgt Tools Implementation
•End-Point/desktop Security (e.g. F-Secure Enterprise)
•Computer Associates Vulnerability Manager
•Vulnerability Scanning (periodic and/or on-demand
•Absolute Track software for laptop tracking
•ASSETs tool for development of unit Business Continuity Plan
and Disaster Recovery Plan
•Intrusion Prevention System (IPS)
•Incident Response protocol
Education, Awareness & Training
SATE – Security Awareness, Training and
Education
•Required SANS online training
•Requested SANS On-site training
•Staff training and development courses (T&D)
•Staff Certification
•Video/Print materials
•ASSETs Mass/Hands-on Training
•HIPAA and Security training
•Risk Management
•Payment Card Industry – A Primer
•UGA InfoSec Handbook
Database Administrators
Campus Security Liaisons
Other Titles/Classifications
Brochures/PowerPoint (e.g.)
2007
•Absolute Track+/Asset Tracking Mgt
•Protecting Your Good Name: ID Theft and
ID Fraud
•DMCA: The History
•GLBA In a Nutshell
Other
Cyber Security Awareness Month
Websites/url (e.g., UGA InfoSec;
Federal Trade Commission
5
June 2007
Security is everyone’s responsibility…
…“under existing federal and state legislation, universities
are responsible for the confidentiality and integrity of data
originating from, and managed through, a campus
environment. For the University of Georgia, over 41,000
network devices (e.g., computers, printers, fax machines,
scanners) are used. Universities are also required to be a
responsible custodian of personal data stored on computers,
servers, and other communication devices. In 2006, more
than 2.2 million records were stolen from colleges and
universities, an increase of 17% over 2005”.
NOTE: Ponemon Institute Survey
$182.00 for every breached record
Computer Science Institute/FBI Computer Security Survey
$89,000 average cost for computer theft
2007
6
UGA Facts
•
•
•
•
•
•
•
•
•
•
4.9 million total incoming e-mail messages daily; 4.3 million = number of
SPAM and virus messages deleted and/or eliminated out of the 4.9 million
leaving est. 600,000 delivered
19.9 Mainframe transactions – monthly average;
23.5 million monthly average during drop/add period
183,278 research jobs submitted to the Research Computing Center (RCC)
requiring high performance computing CPUs
24,000 user-capacity of PAWS, campus-wide wireless network
Average of 41,000 logins daily to MyUGA
10.4 million page hits monthly on www.uga.edu
>1,000 Web sites hosted on www.uga.edu
8,677 online courses = 60,577 individual students enrolled in WebCT
classes
University Cablevision provides 12,600 hours of programming per week
>99.9 = percentage of uptime for critical production systems (e.g.,
Network, UGA Mail, WebCT, Mainframe)
2007
7
Senior Vice Presidents… May 6, 2007 campus
memo indicating specific actions by campus
entities shall include:
a)
Accountability for implementation of University security
standards, policies, processes and procedures based on individual
position and level of responsibility
d)
Identification of individual(s) serving as department, unit or
division security liaison(s) held responsible for system or network
management, information, incident response…
e)
Inclusion at all levels of participation in formal and/or informal
awareness, training and educational opportunities as part of the
annual performance appraisal process.
See: Handout: May 6 Campus Memo re: Securing Sensitive Data Initiative
2007
8
UGA Role-Based Security/
Accountability Model
•President: Ultimate responsibility for approval and
submission of UGA Security Plan, policies, standards, and best
practices that meet requirements of the University System of
Georgia, state, and federal mandates.
•Senior Vice Presidents
Implement policies, standards, guidelines
Verify role responsibilities of executive management
Require annual report of security progress and issues
Validate completion of required awareness, training, and
education and/or participation by direct reports
Support development and implementation of crisis/risk
management practices
2007
9
UGA Role-Based Security/
Accountability Model
•Executives (Vice Presidents, Deans, Vice Provosts,
Assoc. Provosts, Dept./Unit/Division Heads)
Accountable for college, unit, and/or division adherence to UGA
policies (e.g., Federal, State, USG policy, law, regulations)
Establish line of responsibility and authority for security-related
functions within unit, division, dept (e.g. IT Director, Security
Liaison, technical leadership for grant/project/etc.)
Report organization’s security status to Senior Executive(s)
based on articulated timeline
Participate in required awareness, training and education
opportunities based on role and University requirements
Provide resources for unit, division, dept protection of
sensitive/critical data (i.e., budget, personnel, and/or technology)
2007
10
UGA Role-Based Security/
Accountability Model
•IT Leadership, Management and Unit Security
Liaisons
Annual update of ASSETs online self-reporting tool
Serve as Primary/Secondary contact for IT security
incident, Business Continuity and Disaster Recovery
planning
Ensure that resources are applied for protecting sensitive
and critical data (people, process, training, technology)
Participate in annual awareness, training and education
opportunities
Require appropriate skills, education, and ongoing training
for key IT professionals (network administrators, systems
administrators, application developers, and programmers)
Require or provide appropriate skills and training for new
hires responsible for protecting sensitive and critical data
2007
11
UGA Role-Based Security/
Accountability Model
•IT Administrators (Network, Systems, Database,
Web Administrators and Programmers)
Understand and adhere to all relevant UGA IT/IS security
policies, standards, and procedures
Understand and appropriately participate in UGA local and
incident response policy and procedures
Maintain awareness, training, and education requirements
Implement best practices in systems administration and design
(e.g., configuration of systems)
2007
12
UGA Role-Based Security/
Accountability Model
•UGA Community – Students, Faculty, and Staff
Maintain a level of awareness and education of security policy
and procedure including, but not limited to:
oPrivacy Policy
oAcceptable Use Policy
oSecurity Policy for Networked Devices
oEmail Policy
oPassword Policy
oIncident Response Policy
Recognition and appropriate response/accountability when
role changes such as faculty role in supervising IT Professionals
through a grant
2007
Follow regulations regarding protection of data: GLBA, FERPA,
13
HIPAA, etc. when using desktop and mobile devices
re: Awareness, Training and Education
Multiple opportunities for awareness, training
and education on campus including, but not
limited to:
InfoSec
UGA Training and Development Center
Element-K
SANS On-Demand and OnSite
A role-based training matrix is available on the
UGA Securing Sensitive Data Website at:
www.ssdi.uga.edu
2007
14
2007
15
UGA Role-Based Security/
Accountability Model
•IT Professionals: The UGA Security Model will be
integrated into the University of Georgia Human
Resources IT Jobs Classification Model developed in
2004.

Job descriptions are located on the Human Resources web
site: https://jobapp.humanres.uga.edu/classification/

IT Matrix and IT Leadership Matrix are located at the
website
 Information about IT Jobs can be found at
http://www.coe.uga.edu/itjobs
2007
16
UGA Role-Based Security/
Accountability Model
(cont.) IT Professionals: The UGA Security Model
will be integrated into the IT Jobs classification model.
The Technical job descriptions have four levels:
Assistant
Associate
Specialist, and
Principal
Security skills requirements are identified at all levels above
assistant
The entry level or assistant level may work under the
supervision of senior IT Professionals but should not be solely
accountable for the design or administration systems
protection sensitive or critical data.
2007
17
UGA Role-Based Security/
Accountability Model
(cont.) IT Professionals: The UGA Security Model will
be integrated into the IT Jobs classification model.
 The IT Leadership job descriptions will have security
education and skills requirements.
 Leadership positions maintain a role of
accountability for management of resources and
adherence to policy, standards, and procedure.
Additionally, IT Leadership is responsible for completing
or assigning the completion of the ASSETs tool.
2007
 IT Leadership must maintain annual awareness and
training for incident response and disaster recovery.
18
Role-based Security/Accountability
•The role-based accountability model is based on the
relationship between two people: the supervisor and the
supervisee. Resources, planning, and monitoring the success
of training and skills acquisition are built into the
performance evaluation process.
•The IT Jobs Classification description including the IT Matrix
and the security requirements will be used to determine what
training is needed by current staff and what skills are needed
in recruiting/hiring process for key staff.
2007
19
UGA Role-Based Security/
Accountability Model
Implementation Timeline
2007
The first phase of communication and training will
begin in October/November 2007.
A project team will be created with representatives
from ITMF, Training and Development, and UGANet.
This team will deliver training to IT professionals,
departments and units through beginning in January.
Multiple training opportunities will be created using
web-based applications, video, and podcasting.
The UGA Securing Sensitive Data Website will be
maintained to provide ongoing communication about
resources, requirements, and calendar of events—
www.ssdi.ua.edu
20
“Things to Remember”





Everyone on campus has a role in security accountability
The Role-based Security/Accountability Model is built on
industry best practice: Process, People, and Technology.
The Role-based/Accountability Model is based on the
relationship between two people: the supervisor and the
supervisee. Resources, planning, and monitoring the
success of training and skills acquisition are built into the
performance evaluation process.
Awareness, training, and education materials already exist
on campus and many are free-of-charge.
A communication and training schedule to implement this
model is being created based on the successful approach
used at UGA for the IT JOBS Initiative.
2007
21
References

Information Systems Audit and Control Association
(ISACA) – COBIT
http://www.isaca.org/template.cfm?section=home

Information Technology - Security Techniques Code of practice for information security
management - ISO 1779922

NIST Special Publication 800-16, "Information
Technology Security Training Requirements: A
Role- and Performance-Based Model."
2007
22
Download