Looking for PII If you’re not, who is? Krizi Trivisani – CSO, The George Washington University Gary Golomb – Principal Security Engineer October 26, 2006 Agenda • • • • • • • Security Today In a Previous Episode… Data Classification SISP Version 2 Safety Analyzer Important Projects Questions Security today… “The cost of notifying and offering assistance to those individuals who have had their privacy information compromised can run into the hundreds of thousands of dollars for each incident. Increased regulatory requirements also make it imperative that the University be able to show a level of due diligence in the protection of its systems and confidential data.” In a Previous Episode... • GW conducted an audit project of 236+ departmentally controlled servers for security and PII (aka: Server Information Security Project, or SISP) – Project commissioned by EVP&T and CIO – Audited configuration of computers and detection of SSNs Where and When • A PII audit projects should/could be used: –Before or while developing a datahandling policy –Post-policy development compliance checking –Annual security audits Data Classification Policy Why is a Data Classification Policy Necessary? • Provides the framework necessary to identify and classify data in order to assess risk and implement an appropriate level of security protection based on categorization. • Provides the framework necessary to comply with legislation, regulations, and internal policies that govern the protection of data • Provides the framework necessary to facilitate and make the Incident Response process more efficient. The level in which the data is classified determines the level of response. Data Classification - CRITICAL Objectives of Data Classification Policy: • Communicates data categories to the University community and provides examples of how data should be classified • Communicates the high level requirements necessary to protect data based on category • Communicates the roles and responsibilities of various members of the University community and external associates as it relates to GW owned data Matrix of Security & Ops Standards Privacy Levels Operations Levels Public Official Confidential Highest Security Highest Operations Enterprise System 2 2 Department Server 3 2 1 3 2 Desktop Lowest Security Lowest Operations 4 1 Note, numbers in boxes suggest the priority levels for mitigating risks. Security Tool Kit To provide departments managing systems outside of the GW Data Center with standard guidelines and procedures Sections • Policies • Systems Checklist - Departmental Servers and Enterprise Systems • Best Practices for Department Server and Enterprise System Checklist • Server Management Best Practices • Security Controls Matrix for Data Classification • Information Security Training and Awareness • Resources Other Implications • Politics • Culture • Awareness Lessons Learned • PII on almost 50% of servers admins thought is was NOT on • About 75% of computers that were compromised had completely up-to-date antivirus and/or firewalls • Security efforts focused mostly on protecting servers as opposed to data Why SISP version 2 • Were changes made in response to last years efforts? • Far more end-user computers have PII, but who’s? • Rewards for last years efforts... Scope of SISPv2 • Address problems in first pass • Include all computers with *access* to sensitive data, not only known storage • Contrast locations of PII to current security architecture Implications of Scope • Desktops versus servers... • Integration with patch management systems? • Secure reporting • Log parsing by junior-level security staff Safety Analyzer • Sensitive Data Detection – SSNs with heuristics – Credit Card numbers with Luhn algorithm validation • Compromise Detection – Trojan file detection – Kernel-level rootkit detection – IR-related data harvesting SA Compromise Detection • Win 2003 servers example... win2k.exe urx_old.exe serv454.exe c:\winnt\ system32\ l33t.exe Routing HKU\S-1-5-21-6021623581993962763-725345543500\SOFTWARE\ Microsoft\Windows\ CurrentVersion\Run Sygate Personal Firewall HKU\S-1-5-21602162358-1993962763725345543-500\ SOFTWARE\Microsoft\Windows\ CurrentVersion\Run Rout111 HKU\DEFAULT\SOFTWARE\ Microsoft\Windows\ CurrentVersion\Run Microsoft Windows HKU\DEFAULT\SOFTWARE\ Microsoft\Windows\ CurrentVersion\Run Comp Detection Cont... Hidden Hidden Hidden Hidden Hidden *.exe: *.exe: *.exe: *.exe: *.exe: C:\winnt\system32\psniffc.exe C:\winnt\system32\psniffcc.exe C:\winnt\system32\rvahlhhe.exe C:\winnt\system32\tzrepwgo.exe C:\winnt\system32\secthuty.exe PII Detection • An algorithmic approach... C:\documents and settings\stnic\Application Data\Adobe\Designer\en\objects\custom\U.S. Social Security Number.xfo xxx yy zzzz C:\documents and settings\stnic\Local Settings\Temporary Internet Files\Content.IE5\0H2VOH6F\default[3].htm xxx yy zzzz C:\documents and settings\stnic\Local Settings\Temporary Internet Files\Content.IE5\0H2VOH6F\default[3].htm xxx yy zzzz C:\documents and settings\stnic\My Documents\GWDOCS\Cardscanbackup\Business Cards.CDB xxx yy zzzz C:\documents and settings\stnic\My Documents\GWDOCS\HR\selfeval2001.doc xxx yy zzzz C:\documents and settings\stnic\My Documents\GWDOCS\HR\Staff evaluation start dates2.xls xxx yy zzzz C:\documents and settings\stnic\My Documents\GWDOCS\HR\budget\Salary Review Notices 01 ORG.xls xxx yy zzzz C:\documents and settings\stnic\My Documents\GWDOCS\HR\budget\Salary_Review_Notices_01_NEW.xls xxx yy zzzz C:\documents and settings\stnic\My Documents\GWDOCS\HR\budget\SRNTEST.xls xxx yy zzzz C:\documents and settings\stnic\My Documents\GWDOCS\HR\budget\SRN_FY02_TEMPLATE.xls xxx yy zzzz C:\documents and settings\stnic\My Documents\GWDOCS\HR\budget\T06322NEW.xls xxx yy zzzz C:\documents and settings\stnic\My Documents\GWDOCS\HR\budget\SRN_FY02\SRN_FY02.xls xxx yy zzzz C:\documents and settings\stnic\My Documents\GWDOCS\HR\evals00\Andrew Mngr pref-eval's.doc xxx yy zzzz C:\documents and settings\stnic\My Documents\GWDOCS\HR\evals00\Jonathan Mngr pref-eval's.doc xxx yy zzzz C:\documents and settings\stnic\My Documents\GWDOCS\HR\evals00\Mark Mngr pref-eval's.doc xxx yy zzzz C:\documents and settings\stnic\My Documents\GWDOCS\HR\evals00\Ron Mngr pref-eval's.doc xxx yy zzzz C:\documents and settings\stnic\My Documents\GWDOCS\HR\evals01\Andrew Mngr pref-eval's.doc xxx yy zzzz C:\documents and settings\stnic\My Documents\GWDOCS\HR\evals01\Andrew Mngr pref-eval's_FY01.doc xxx yy zzzz C:\documents and settings\stnic\My Documents\GWDOCS\HR\evals01\Angela exempt eval.doc xxx yy zzzz Future of SA? TRUE Risk Calculation and Protection – PII detection and protection – GUI-based metrics and trending across hundreds to thousands of computers – Advanced data detection with high-performance algorithms – Configuration auditing – Innovative compromise detection and IR capabilities http://www.proventsure.com Other Important Projects – Cisco Clean Access – Novell Patchlink – Covers about 4000 employee (faculty and staff) – GWid project – Moved off of SSN as the primary ID – Migration of confidential servers – – NIST Level III –Reached NIST Level III (Security Assessment Framework) Other Important Projects – Application/Program Security Reviews –In depth assessment for new application development efforts within ISS – WebInspect –Web application security scanning. Bringing this capability in house saves approximately $7000 per assessment – Technical/System Security Reviews – Conducted over 300 technical security reviews in the past year; Safety Analyzer is critical to completing these reviews – Security Internship Program – Successfully partnered with academic departments to recruit and train interns Happy Halloween! Questions? • Contact: – Krizi Trivisani krizi@gwu.edu – Gary Golomb coach@gwu.edu • Download: http://home.gwu.edu/~coach/SA.zip