Project Charter

advertisement
DECEMBER 03 2010
Security TEK
SAIT Polytechnic
1301 – 16 Avenue NW
Calgary, Alberta, Canada,
T2M 0L4
Project Charter
Security TEK
David Sutherland
Jason Mah
Chau Pham
SECURITY TEK
Table of Contents
Executive Summary .................................................................................................................... 2
Project Vison................................................................................................................................ 3
Project Purpose ........................................................................................................................... 4
Problem / Opportunity ................................................................................................................. 4
Project Description ...................................................................................................................... 4
Key Stakeholders ........................................................................................................................ 4
Project Scope .............................................................................................................................. 5
Scope ........................................................................................................................................... 5
Out of Scope ................................................................................................................................ 5
Project Objectives........................................................................................................................ 6
Terminology ................................................................................................................................. 7
Project Team ............................................................................................................................... 8
Project Stakeholders ................................................................................................................... 9
Risk Assessment ....................................................................................................................... 10
Project Schedule ....................................................................................................................... 11
Project Facilities and Resources............................................................................................... 13
Project Budget ........................................................................................................................... 14
Equipment and Facilities ........................................................................................................... 14
Operating Costs......................................................................................................................... 14
Promotion and Communication ................................................................................................ 15
Intellectual Property ................................................................................................................... 16
Offer and Approvals .................................................................................................................. 17
Offer ........................................................................................................................................... 17
Approvals ................................................................................................................................... 17
Project Charter Signoff .............................................................................................................. 17
References ................................................................................................................................ 18
[NAME OF PROJECT CHARTER]
PAGE
1
Section
1
Executive Summary
Security Tek’s main goal is to create a hardened server with a hardened room to match. We will be using
security techniques and procedures learned in IT security and Server Service Administration to enable a functional
server, with programs for network intrusion detection and protection. As well, we will be using techniques to harden the
server room to prevent unauthorized access or detect unauthorized access.
Our purpose is to devise and implement a plan for a client to execute that will protect their server. We will be
using techniques such as using a snort box to make sure network intrusion is documented and logged. As a network
prevention system, we will be implementing a honeypot to attract the intruder to the fake network instead of our own.
Physical access will control things such as a mantrap and user access codes to enable access. Shock sensors and
cameras to monitor and secure the server.
We are aiming at small to medium sized companies as these moderately sized companies may not have an IT
department with the technical expertise to implement a more secured server for their needs. We will implement it in a
way that it will be affordable and will not break a client’s budget to implement our system. It will provide much needed
security for an up-and-coming business or a business looking to expand their IT server, whether it is for sending internal
or hosting a new website for sales, this is needed to protect their backbone so they can continue their business.
We will create a documentation guide and setup procedures to direct a client on how the system is to be setup.
A step-by-step manual will be created and a troubleshoot section will be included in case the client encounters a
situation similar to anything that happened will we were devising the manual.
Our target time frame to creating our manual and having a documented manual will be end of March 2010. We
will be having a demonstration of our plan at the end of April 2010, and will be using the time from the end of actual
documentation to fine-tune our systems to work as one. Partial demonstrations will be documented half way to our
stakeholders for approval and critique to ensure that we have the right direction in what a client would want in a
hardened server room.
PROJECT CHARTER – SECURITY TEK
PAGE
2
Section
2
Project Vision
In today’s growing technological society, it’s becoming increasingly more important that products are unique,
easy to use and provide a great deal of functionality to the consumer willing to buy the product. Thus, it is important to
have an innovating product that will catch the consumer’s eye at an ideal cost for both sides. The project vision is to
create a security system that will securely keep the valued object(s) safe from intruders.
Our team will create a unique product that will be easy to use by the consumer, but very secure to ensure the
safety of the object(s) the consumer wants to keep safe. First of all, our group will be designing a hardened server that
incorporates snort as well as other security programs. We will be using this server for two main objectives 1) as the
“prized” object that thieves may want and 2) it will contain all the programs and scripts to control our intrusion prevention
and detection system.
To do this, our group will research the price of the materials and the overall design and build of the final
product. We will locate a suitable room, measure to determine how much material it will need to secure it properly and
then begin to design our system. From there we will design our security system that implements snort, and other
security rules, sensors, cables and computer hardware to produce a reliable security system.
Final Deliverables:
1. Project Demo
2. Presentation
3. Website
4. Project Documentation
PROJECT CHARTER – SECURITY TEK
PAGE
3
Section
3
Project Purpose
Security is always a big area of IT and will continue to grow as technology advances. To keep intruders out
and allow server administration access the server room. This problem is always occurring to companies that do not
implement a plan of safety or have a poorly made plan. If an intruder is able to get into the server room, they can have
control over the servers just by walking through the server room door. This has created a great project idea for our
group, create a security system that is cheap, easy to implement and secure. This system will stop or slow down an
intruder to allow security personnel time to get to the server room. Another deliverable that will be included is a
presentation of our prototype and administrator manual for easy implementation by the administrator and security. The
project does not just include our team but many others out side the team.
Problem / Opportunity
Think of having small business and because you have a small budget, you have to cut down the costs in some
areas to help provide for areas, servers in an unprotected room are a likely situation. Many businesses may look at
security as an expensive component that has no value for the company.
Project Description
If a company is worried about the cost then our project will dissolve that problem by setting up a low cost
security system but with the benefits of a high cost system. This project also will deal with the initial problem for some
companies, a security system that will protect their servers which was not implemented previously.
Key Stakeholders
The key stakeholders are the people that are involved with the overall project. The project managers are our
team, each of us will have a chance at being the project manager. When it is our time as the project manager, we
become a major stakeholder because we want the rest of our team to achieve what is needed. Our client is also the
sponsor at the moment giving us ideas while we will give results back. This project is being performed at SAIT so we
have to represent SAIT the best we can when looking for results and building our project. Each stakeholder is affected
by the outcome of this project so it is our responsibility to make our project work. If problems arise, we are accountable
for letting the key stakeholders know of complications. These are just the key stakeholders there are main more that
are listed further bellow.
Stakeholders
Project Manager
Client
Performing Organization
Sponsor
PROJECT CHARTER – SECURITY TEK
Comment
David Sutherland, Jason Mah, Chau Pham
Colin Chamberlin
SAIT
Colin Chamberlin
PAGE
4
Section
4
Project Scope
As with any project, how small or large it may be, security is always an issue. With our project our hope is to be able to
create a hardened server and room to protect our assets. We will only have one server and server room to showcase
for product, but we will include steps to expand security measures for a larger scale. So within the confines of this
project we will not be demonstrating a large-scale security measures but rather only on one server.
At least halfway through we would like to be able to demonstrate our hardened server. We will show how an intruder
will be detected and kept at bay by the honeypot to throw them off our actual server.
Our second partial demonstration would be our server room where it can monitor or trap unauthorized access. It will
also be to monitor traffic in the server room to identify if a user was able to access the server by bypassing the security
measures.
As this is only a simple demonstration of our project, we cannot do things like setting up multiple servers each with their
own protection, nor can we produce a real attack on our system, like a virus trying to infect our system. We will only be
showing user intrusion detection. Also, as space will be limited, some things like pressure mats will only be situated in
critical places in front of the door and server to monitor access. Our camera set up will only be able to monitor limited
areas due to space limitations.
Scope
Our scope will mainly consist of one room, with security to trap unauthorized users from accessing the server. Due to
cost budgets we’re limited to using only a fraction of all security features we can get such as high definition camera to
be used as a motion sensor and video capture device.
Out of Scope
Since our budget is limited, we cannot implement things such as pressure mats, or a biometric scanner that scans
finger prints. It will be limited to a one room design instead of an actually server farm. Other things that can be
implemented and will not be included are things such as shock sensors to ensure that the server are immobile and
cannot be moved without alerting someone with access. Other technologies, for example, keycards or magnetic access
cards will not be implemented due to budget constraints
PROJECT CHARTER – SECURITY TEK
PAGE
5
Section
5
Project Objectives
To achieve our desired goals; they must be first be defined. Hardening a server along with the physical security
will be a large task. We will implement multiple physical security devices like cameras, pressure mats, motion detectors
and more. As well as physical security, a server must be able to detect and trap malicious users or organizations from
bringing down our protected servers. We will be using Snort and a honeypot to detect and confuse those that want
harm our business.
We must first have a server to protect. We will have to acquire a server capable of doing basic tasks such as
webhosting, email and internet. As with our limited time scope we will only have one server doing multiple tasks, but we
will create a plan in case it will need to be implanted on a larger scale.
Once our server is acquired, we will begin to set up our honeypot. We will make it seem like there are multiple
servers and end users talking to each other. We will simulate network traffic to make it more realistic and we will have
snort to detect the ip of the attackers trying to get at our server. We will also be removing commands not used and have
administrator rights only to protect from unauthorized modifications.
To start with physical security we are putting in a man-trap style access to our server room. A user must have
authorization to enter through the second door of the man-trap to reduce unwanted access from those without
authorization.
As for authorization, we will be implementing a finger print scanner as well as a keypad to ensure those with
access codes cannot just give it to anyone and must verify it is them with the finger print scanner for the code to allow
them access in to the server room.
We will also be implementing a pressure mat system, to monitor foot traffic in and out of the server room. We
are putting this in because an intruder may not be using the front door, and may likely try to bypass the main security
defenses we will be putting up like our man trap doors. It also monitors how many people have entered and we will try
to set it up so that only users that pass the man-trap and are authorized can enter, if they try to bring in a second person
it will lock out the server.
As pressure mats can only detect footsteps, or pressure, will also be including video cameras with IR, for dim
light situations and monitor who has been inside the server room, day or night, to make sure only authorized users have
been inside.
If we have set all these defenses up properly, the server will only be accessible through the man-trap by a user
with a finger print ID set up and key code for door access, and will only allow one person through the man trap at a
time, and if more than one person has entered through the man-trap on only one authorization, the server will be locked
down and not accessible until an administrator can verify and unlock the servers.
PROJECT CHARTER – SECURITY TEK
PAGE
6
Section
6
Terminology
There are a few terms that will need some more explanation as to what they mean, such as honeypot, man-trap, IR,
Snort and intrusion detection.
Honeypot- is a trap set to lure in intruders to access fake information so that the real info is safe. This is done by
creating scripts that appear to show real info when an intruder is able to get into that system. We want people to try and
access this since we will be able to log where their IP, when they tried to hack into our network and how many times.
IDS – Intrusion Detection system - Intrusion system setup to detect intruders, documenting or alert the administrator
of the system. This can be used in the physical and network areas of security.
IPS- Intrusion Prevention system - Intrusion system setup to prevent intruders from entering or stopping them in
there tracks. As a physical system something like a mantrap will work. In a network environment a honeypot will help
IR- Infrared This type of camera is able to detect heat signatures given off by warm blooded animals. This is especially
important because we will be able to detect a person night or day in our restricted area.
Mantrap- a physical security device(s) used to protect intruders from getting into a restricted area. For our purpose, we
will be using floor detectors to sense footsteps when someone is near our restricted area.
Snort-is a network intrusion detection system that detects and logs intruders trying to access our system.
PROJECT CHARTER – SECURITY TEK
PAGE
7
Section
7
Project Team
The most important part of a project is creating a team that suits the style and goal of the project. A team needs to co-operate,
communicate and create. Co-operation between members will lead to a better ending result. Over the past year and a half we have done
a few projects together, so there are no uncomfortable situations that make it hard for the team to work together. We understand each
other’s strengths and weaknesses. As well, communication between team members is well formed because of experience from
previous projects, but in every project there is still miss communication that off balances the team but is quickly fixed. Creating means
coming up with a solution to a standstill in the project; our team will use this in means organization and problem solving. Within the team
each of us has a role that best fits our strengths. The order that the roles are placed in is our priority role. The project manager role is split
evenly through the project when different tasks are implemented.
Member
David Sutherland
Jason Mah
Role
Project manager, Hardware, Server Admin
Hardware, Project manager
Chau Pham
Programmer, Project manager
PROJECT CHARTER – SECURITY TEK
PAGE
8
Section
8
Project Stakeholders
Our key project stakeholders will be primarily ourselves. Other stake holders will include Colin Chamberlin and our
sponsor. Colin will influence our group by giving us advice and ensuring the project is on schedule. Our sponsor will be
monitoring, requesting and advising us with information so that all plans go forward and continue as planned.
Other key stakeholders will include the user and suppliers. Users are a major stakeholder since they will be buying the
product. The user influences us in a way that we will provide the best product for them and in return will receive a
reputable reputation. Supplier’s reputation will also be on the line; should they fail at providing us a reliable product, they
will lose reputable status. This can affect the suppliers company by causing them to go bankrupt. Other companies will
not buy from them if their products are inadequate and unreliable.
Stakeholder
Project team
Colin Chamberlin
Sponsor
Users
Suppliers
PROJECT CHARTER – SECURITY TEK
Role or Influence
The team that will be putting in the work
Will make sure that project is on time
Will sponsor us
Will buy and evaluate the product
Reputation of product line
PAGE
9
Section
9
Risk Assessment
While the project is to help implement security to a small business, complications can occur that affect the
outcome of this project. This list of risk is to help ready our group for what could be expected as a problem that may
occur. The mitigation strategy is how our team will stop the risk from happening or lower the chance of it happening.
Project Risk Assessment
Probability
e.g. High, Medium, Low
Impact
e.g. High, Medium, Low
Severity
e.g. High, Medium, Low
Insufficient training
Medium
High
Medium
Team members may not all be on the same page in training so some will have to less expirence
Mitigation Strategy – Research area that is unfamiliar, Use textbooks and other resources to learn from
Inadequate communication
High
Medium
Low
A new team means working with new people and can cause communication if we are not on the same page
Mitigation Strategy – Set up meetings and create schedules, email when a problem has occurred, get to
know one another, strengths and weaknesses
…
Conflicting priorities
Medium
Medium
High
The project might be going one direction but a team member wants to have it go in a different direction
Mitigation Strategy – Keep everyone on track with the project try to fit priorities into project.
Money/Funds
Medium
High
Money can be a risk that puts the project on hold or stops it all together
Mitigation Strategy – Find sources or funding before starting project
High
Not able to acquire resources
Low
High
High
Some resources may not be acquirable or out of stock
Mitigation Strategy – Make sure to have back up resource site to acquire the same resources
Loss of enthusiasm
Low
Medium
Team members may hit a rough spot if something goes wrong and may want to stop
Mitigation Strategy – push the team to move through the problem find a solution
Medium
Loss of team support
Low
High
Medium
Members of team may start objecting to ideas of Project manager if they falter
Mitigation Strategy – Put into position a team member that is likely to do well as the Project manager
Team change
Medium
High
Something that can and cannot be controlled, team members move
Mitigation Strategy- Understand the team and what there timing
Low
Change of project scope
low
High
medium
This can be caused by a project hitting a road block or the client made decision to change
Mitigation StrategyTime
High
medium
Time is always a factor in being a risk; most projects never meet the initial dead line.
Mitigation Strategy- Planning is the best way to stay on track as well as a great team.
PROJECT CHARTER – SECURITY TEK
medium
PAGE
10
Section
10
Project Schedule
For this project to succeed, our team will create a plan that will follow guide lines so that we follow the
milestones and deadlines. The important aspects of our plan are as followed, estimate the cost of all our materials,
acquire the resources, setup the server; program the sensor board to use devices, and continual group meetings. We
have also planned for extra time for example, extra research if it is needed for the more difficult parts of the project. See
below for the overall plan layout.
PROJECT CHARTER – SECURITY TEK
PAGE
11
Embed your MS Project file below. (MS Word 2003: Insert > Object > Create from File > Browse; MS Word 2007: Insert > Object > Object > Create from File >
Browse)
PROJECT CHARTER – SECURITY TEK
PAGE
12
Section
11
Project Facilities and Resources
Resource
Server
Ethernet cables
Cameras
Controller boards
Wire
Motion sensors
Unix OS (Linux or Ubuntu)
Storage Room
[NAME OF PROJECT CHARTER]
Availability
Available
Need to acquire
Need to acquire
Need to acquire
Need to acquire
Need to acquire
Available
Need to acquire
PAGE
13
Section
12
Project Budget
The project will consist of expenses due to realistic payment to the team members and cost of material to build the
physical security system. The prices of the project will vary as our team constantly finds better or cheaper options that
provide a good security system. The budget was developed based on what materials were needed to design a
physically secure room.
Phase 1: Acquire Materials 48 hours of labor
Phase 2: Program Sensor 64 hours of labor
Phase 3: Setup Server 56 hours of labor
Equipment and Facilities
The equipment we will need to build and design our physical and computer security system. Parts and prices will vary
as our team continues to implement the best technology available to us.
Item
Cameras with motion sensors
Sever
Snort
Honeypot
Ethernet cables
Controller board
Amount
4
1
1
1
3
1
Cost
$30
$provided
$free
$free
$provided
$-
Operating Costs
This will include an ideal charge of what our team, per person, would charge an hour to build, design and setup a
secure server and room. The total cost of our labor will vary depending on how smoothly the install goes. Our team will
pay each person hourly at a rate of $30 an hour.
Item
Acquire Materials
Program Sensor Board
Setup Server
PROJECT CHARTER – SECURITY TEK
Hours
48
64
56
Rate
30
30
30
Cost
900
1920
1680
PAGE
14
Section
13
Promotion and Communication
To promote our project, our team will have a booth to showcase and demo our finished project specs. It will
consist of a live demonstration of how the server is monitored and our security system works in combination to prevent
an unauthorized user from accessing the server.
As for communication, we will be documenting all our meetings, internal and external and provide meeting
agendas and plans for every meeting. All necessary steps leading to a meeting with all stakeholders and sponsors will
be made accordingly, such as booking a room for conference and bringing refreshments for example.
Our group will keep a log journal of our objectives, methods, successes and failures for the week and will be
updated by every member to ensure that the project and its objectives and obstacles are understood by all and all can
provide an idea to a solution to a problem if an obstacle arises.
PROJECT CHARTER – SECURITY TEK
PAGE
15
Section
14
Intellectual Property
The intellectual property will be property of the group. Each group member will have the right to the intellectual property
that they purpose and design. Other group members, who did not research and/or design that part of the project must
ask the member who did do the research and/ or design for permission of use. Depending on our sponsor, they may
have some right of the property as well.
PROJECT CHARTER – SECURITY TEK
PAGE
16
Section
15
Offer and Approvals
Reading this charter, we have made some offers that will be the outcome of our project. Signing this will confirms that
you approve of our project and will allow our team to help you become a more secure company with our
implementation.
Offer
Security TEK would like to offer our services to small business companies that do not have security implemented and
give them better security than what they started with. To help protect the servers, there are a few things we are offering
out of this project:
1. Cost effective physical security system for a small server room in your small business.
2. Manual for administrator on how to use the system.
3. Demonstration and presentation of the implemented security
4. Final report that includes what was done and meeting minutes throughout the project
Approvals
In order to help implement a security system that will optimize security in your server room and approve our low budget
cost, your approval for this project is needed.
Approval needed for:
1. Adding security server to your network
2. Implementation of physical security devices in server room.
3. Gant Chart
4. Budget
Project Charter Signoff
Offering
Signature
Date
David Sutherland
Jason Mah
Chau Pham
Type name
Approval
Colin Chamberlain
Type name
PROJECT CHARTER – SECURITY TEK
PAGE
17
Section
16
References
[1] Ebay, Home CCTV Surveillance Color Dome Camera, [Online Document], 2010, http://cgi.ebay.ca/Home-CCTVSurveillanc-Security-Color-Dome-Camera-/280398062866?pt=LH_DefaultDomain_0&hash=item414906e512
[2] SourceFire, Snort, [Online Document], 2010, http://www.snort.org/
[3]Wikipedia, HoneyPot, [Online Document], 2010, http://en.wikipedia.org/wiki/Honeypot_%28computing%29
[4] Wikipedia, ManTrap, [Online Document], 2010, http://en.wikipedia.org/wiki/Mantrap
[5] Webopedia, What is a Server? [Online Document], 2010, http://www.webopedia.com/TERM/S/server.html
PROJECT CHARTER – SECURITY TEK
PAGE
18
Download