Campus ScienceDMZ and Campus Cybersecurity Slide 1 Slide 1 Introductions • Moderator: XXX, Institution • Brian Stengel – University of Pittsburgh • XXX, Institution • XXX, Institution Slide 2 University of Pittsburgh • • • • • • • • Pittsburgh Campus – Oakland area Four regional campuses Undergrads – 18,757 on main campus, 6,317 at regionals Graduate students – 7,739 Doctorates – 2,121 Medical Center – UPMC University Data Center (NOC) – off campus (10 miles) Affiliated with the Pittsburgh Supercomputing Center Slide 3 Information Technology @Pitt – CIO Jinx Walton • • • • • • • Enterprise Services – ID, Data, Voice, Server/Web Hosting, etc.. Academic Computing Student Computing Business Intelligence Enterprise Systems Consulting Services Information Security – CISO, Security Analysts, Incident Response • Operations – Data Center Operations, 24x7 NOC, Help Desk • Research Support – Hosting of University HPC systems at data center, HPC engineers – FISMA environment – Campus Cyberinfrastructure Slide 4 Metro Commodity Internet Providers Slide 5 Slide 6 University Data Center Campus Enterprise Services 10G 10G 10G HPC resources 10G 2G 10G 3G Commodity Internet Providers 3Rox Regional Members Metro, Regional National, International 10G 100G Other R&Es Slide 7 CC*IIE Award • • • Our project - Accelerating Science, Translational Research, and Collaboration at the University of Pittsburgh Through the Implementation of Network Upgrades Engineering activities – Science DMZ, 100G to GigaPoP, 100G to data center, Enterprise DTN, extension of SDMZ to one campus cluster, perfSONAR Research projects supported: PGRR The Pittsburgh Genome Resource Repository provides data management and computing infrastructure to support use of national genome data resources for personalized medicine research. LCTP Laboratory of Computational Transport Phenomena. Swanson School of Engineering. Conducts research in fluid mechanics, combustion, heat and mass transfer, applied mathematics and numerical methods. ATLAS Department of Physics and Astronomy, Tier3 cluster on campus using the WLCG. SaM Center for Simulation and Modeling. Pitt’s group that runs the large shared cluster at the data center. PSC Pittsburgh Supercomputing Center. Storage (Supercell, Slash2) compute (Blacklight) Slide 8 Organizing – acquiring, building, assembling, funding etc.. – requires planning Coordinating – acquiring, integrating, delivering, provisioning, communicating, governing … – requires skills Cyberinfrastructure - is the organized aggregate of information technologies coordinated to address problems in science and society. (Source: Fran Berman, Data and Society, CSCI 4967/6963) Slide 9 Others Research Labs Centers IT Lots of owners…. Who does security? Organizing – acquiring, building, assembling, funding etc.. – requires planning Coordinating – acquiring, integrating, delivering, provisioning, communicating, governing … – requires skills Cyberinfrastructure - is the organized aggregate of information technologies coordinated to address problems in science and society. Slide 10 Team Composition - Others supporting… SaM, PSC PGRR Little control, Some influence Developers Users Dept IT Software and code Datasets Co-PI from PGRR Some control, More influence HPC (tech, people) PSC (tech, people) Leadership LCTP ATLAS Researchers Faculty WLCG SC Grad Students ATLAS Resources Support Co-PI from SaM, LCTP Important Artifact: Most control (our department), but least knowledge of scientific workflows. • • • Enterprise Architects Security Analysts Network Engineers • • • • Academic Consultant • “landscape documents” HPC Engineers • Helped us see Project Mgmt relationships and Communications drivers… Slide 11 Six Principles of Resilience to Manage Digital Security (Gartner) 1. Move from check box compliance to risk-based thinking 2. Move from protecting the infrastructure to supporting organizational outcomes 3. Move from being the righteous defenders of the organization to acting as the facilitators of balance 4. Move from controlling the flow of information to understanding how information flows 5. Move from a technology focus to a people focus 6. Move from protection only, to detect and respond Slide 12 PGRR Department of BioMedical Informatics Login, compute nodes Local storage 10G 100G Engineering Changes • • • • • 100G to 3Rox and data center VRFs for segmentation Infiniband and 10G for Slash2 service in SDMZ Dedicated, purpose-built DTN in SDMZ with 10G and IB New cluster to use SDMZ for compute against datasets in both locations Research VRF ScienceDMZ Research VRF 100G Research VRF Slash2 New Enterprise DTN 100G Data Supercell Slash2 Blacklight CGHub – UC Santa Cruz A resource of the National Cancer Institute Slide 13 PGRR Department of BioMedical Informatics Login, compute nodes Engineering Changes Local storage 10G 100G Research VRF Security Changes • • • ACLs for research VRFs. No firewalls DTN built with security controls and data movement tools only Presented VRF to Infiniband VLANs protected by ACLs ScienceDMZ Research VRF 100G Research VRF Slash2 New Enterprise DTN 100G Data Supercell Slash2 Blacklight CGHub – UC Santa Cruz A resource of the National Cancer Institute Slide 14 PGRR Department of BioMedical Informatics Engineering Changes Login, compute nodes Security Changes Security Integration/ Tradeoffs • • • • • • • Desired-state configuration mgmt for DTN using SALT Netflow for behavioral analysis monitoring. Nessus security scans Slash2 is PSC technology… PSC people are part of the PGRR team… SDMZ is not a “service” for us… We had to navigate farther up the stack… Early established regulatory framework provided solid foundation, but implementation forced a critical review… Attention and effort can result in good balance between security and ease of access Local storage 10G 100G Research VRF ScienceDMZ Research VRF 100G Research VRF Slash2 New Enterprise DTN 100G Data Supercell Slash2 Blacklight Two artifacts: • SDMZ Application Security Plan CGHub – UC Santa Cruz • Enterprise DTN A resource of the National Cancer Institute Security Plan Slide 15 LCTP Globus Connect Personal Engineering Changes • • • Globus Connect Server running on new Enterprise DTN New storage subsystems for Globus endpoints Integration of federated ID 10G 100G Research VRF 100G Research VRF Security Changes • • ACLs for Globus Online Security controls for DTN ScienceDMZ Research VRF 100G Enterprise DTN Globus Connect Server Security Integration/Tradeoffs • • • Identity mapping for current Globus users to CILogon/Incommon Significant changes to directories, home/etc.. Globus (MyProxy) to accounts via LDAP Globus Connect Personal Slide 16 ATLAS Tier 3g node DTN Engineering Changes • • • • 10G extension of SDMZ to campus building Re-purposed DTN for participation in WLCG grid Latest grid software (Rucio) New storage subsystem Research VRF 10G 100G Research VRF Security Changes • • • ACLs for DDN network to Tier2,3 sites Security controls for DTN (user shell restrictions) Integration to campus AD ScienceDMZ 100G Research VRF 100G Security Integration/Tradeoffs • • • DTN is single-function only… No longer used for cluster operations – data transfer only. Change in DDN client functions (Rucio) Slide 17 Must do’s • Map out the workflows to identify the key intersections (not just the technology intersections) • Identify vulnerabilities (not just the technology vulnerabilities) and take a risk-based approach to addressing them • Attend an OIN Workshop • Participate in a CTSC Peer Review • Promote, discuss, develop “CI competency” • Use “cybersecurity” as a way to promote these discussions… Slide 18 Cyberinfrastructure Organizations Scientific instruments Expertise Discovery Collaboration Knowledge Computational Resources Data Advanced networking and cybersecurity Software Slide 19 Performance, ROI “CI Competency” Maturity Model • • • • • • • • Scientific outcomes are linked to CI • capacity/competency Critical to data-intensive research Reference architectures to non-traditional domains (humanities, social sciences) • • Inertia building – not single purpose Opportunities become emergent “Free capacity” is no longer only driver Innovations are being driven to/in the cloud CI is composable – per service capabilities and choices Workload/compute federations in neutral, multivendor environments CI is “social” CI security is an enabler Capabilities, Benefits, Opportunities Slide 20 …need for cybersecurity innovation, education, practice, tools Who are your people that work in the gaps? Do they have the skills, tools, and support to be effective? Do you have their backs? Great programs: • • • • CICI SaTC CTSC ACI-REF Slide 21