Presentation Title

advertisement
Faculty Council Briefing
Larry Conrad
VC for IT and CIO
Stan Waddell
Exec Dir and Info.
Security Officer
January 14, 2011
CENTRAL AND DISTRIBUTED
IT SERVICES
its.unc.edu
The Role of CIO
 The CIO role has two distinct aspects
• Division head for central IT (ITS)
• Overall responsibility for coordinating IT
services across campus units
 Provisioning a cohesive IT architecture
 Providing campus-wide IT infrastructure
 Campus-wide IT policies
 Overall responsibility for IT security
 Carolina Counts IT “champion”
its.unc.edu
3
Key Services ITS Provides
 Central IT infrastructure
• Learning Management System
• Centrally supported classrooms
• Centrally supported computer labs
• Research computing configurations
• Enterprise applications, e.g., ConnectCarolina
• Central Help Desk
• 24/7 computer rooms
• E-mail/calendaring
its.unc.edu
4
Key Services ITS Provides
 Central IT infrastructure
• Hundreds of servers in the 3 ITS computer rooms
• Networked attached storage
• Server housing/hosting
• Campus network
• Campus telephone system
• IT security office
• CCI program
• Software site licensing program
its.unc.edu
5
Key Services ITS Provides
 Central IT infrastructure
• Campus directory services
• Single sign-on environment
• www.unc.edu
its.unc.edu
6
Key Services Distributed
IT Provides
 Organizations such as OASIS in A&S
• A spectrum of IT services
• Some duplication of central services
• Best at providing
 Unit-/discipline-specific applications
 Discipline-specific support
 Faculty computer support
• Coordination with central IT services to ensure
seamless support to campus units
• Partnership with ITS on IT security
its.unc.edu
7
Key Services Distributed
IT Provides
 Central vs. distributed services
• Certain services are best provided locally and some
centrally
(see the following “economic framework” graphic)
• The focus of the Carolina Counts initiative is to
allow campus units to leverage central services
more effectively and where appropriate
its.unc.edu
8
Proposed Model for Rebalancing
Central vs. Distributed
DRAFT: Centralized vs. Distributed IT Services
1
2
3
4
5
Communications infrastructure (network and phone system, phone conferencing)
Email and Calendar (Exchange*)
ITS Data Centers*
Hardware acquisition and maintenance contracts negotiation (Leverage CCI, Hardware
Maintenance contract negotiation*)
Campus-wide business applications (UNC-ALL*)
Research Cluster Condos *
User account management (Active Directory*)
Software Acquisition*
Network Attached Storage*
DRAFT
IT Security (Encryption Software for Laptops, Patch Management)*
Virtualized Servers*
Collaboration applications ( SharePoint, wiki, web conferencing)
Research computing support
24/7 Help Desk Support*
Web site hosting
Video conferencing
its.unc.edu
9
9
Proposed Model for Rebalancing
Central vs. Distributed
DRAFT: Centralized vs. Distributed IT Services
1
2
3
4
5
IT Training
Instructional applications development (Course Redesign Services*)
Database administration and support
Instructional support
Instructional Facilities (Classroom Config. & Support, Student Virtual Comp. Lab)*
Research computing applications
System administration
Web site support
Web site development
On site support
Unit-specific business apps
DRAFT
Specialized discipline or unit-based support
* Indicates Carolina Counts Priority Project
Scale: 1-5
1=Hosted in school/dept. 5=Centralized in ITS
Centralized service (ITS hosted)
Distributed service (hosted in schools or departments)
its.unc.edu
10
Cohesive IT Environment
 ITS and distributed IT groups are working
together
• Coherent IT architecture for the campus
• Comprehensive approach to IT security
• IT policy development and compliance
• Upgrade the Carolina IT infrastructure, which
has lagged behind in recent years
• Achieve the Carolina Counts IT objectives
• Make the technology fade into the background…
its.unc.edu
11
Major IT Initiatives
 Modernizing the Carolina IT environment
• New communications funding model
• New research computing funding model
• New IT governance structure for the campus
• New enterprise systems base: ConnectCarolina
(Student, Finance, HR)
• Blackboard to Sakai transition
• MS Exchange for e-mail and calendaring
• Upgrade the campus network core and off
campus connectivity to 10 Gb
its.unc.edu
12
Major IT Initiatives
 Modernizing the Carolina IT environment
• Upgrade of the research computing cluster
• Outsource student e-mail to MS Live@edu
• Carolina Counts IT Partnership (Bain)
• New cell phone stipend program
• Improving information security
 State Auditor information security findings
 New information security policies
 “It takes a village…” approach
its.unc.edu
13
INFORMATION SECURITY
its.unc.edu
Information Security Level Set
 Information Security deals with the protection
of three characteristics of Data
• Confidentiality – Keeping data private
• Integrity – Keeping data accurate
• Availability – Keeping data accessible (even in
disasters)
its.unc.edu
15
Carolina Under Attack!
 Campus Wide
• 30,000 attempted hacks per day
• Thousands of systems have malware on them in any one
year
• ~1000 systems isolated a year
• >30-60 systems forensically analyzed by ITS, Information
Security per year
• Hacker motivations and the perpetrators have changed
its.unc.edu
16
Info Security Challenges
 The decentralized nature of campus data
 The open network at Carolina
 The University is a valuable target in the
eyes of the bad guys: “a destination resort”
 These challenges force us to concentrate on
securing sensitive information
its.unc.edu
17
Definition of Sensitive
Information
 “Sensitive Information” includes all data, in its
original and duplicate form, which contains: “Personal
Information”
•
Examples of Sensitive Information may include, but
are not limited to:
 Identifiable research data
 Protected Health Information
 Students records
 Public safety information
 Financial donor information
 Information concerning select agents (controlled substances)
http://help.unc.edu/6475 Definition of Sensitive Data
http://help.unc.edu/6604 Legal References for Sensitive Data
its.unc.edu
18
Information Security at UNC
 Leadership from the CIO Office:
the Chancellor’s vesting of responsibility
for campus IT security with the CIO
 ITS Information Security Office
 Information Security Liaisons
 Campus IT Professionals
 Staff, Students, and Faculty
• It takes a commitment from all of us
its.unc.edu
19
Security Liaisons
 They work with the ITS Info Security team
 Each Department has at least one
 They can help:
• With reporting security incidents
• Getting clarification on policy
• Communicating information from the security
office
• Implementing policy
• Help with general information security concerns
its.unc.edu
20
Incident Management
What to do?
 First, do no harm
•Any time you suspect a critical
system or one which hosts or
processes sensitive data is
compromised, STOP and do a
critical Remedy ticket to ITSSecurity.
its.unc.edu
21
Vulnerability Management:
Scanning and Patching
 Systems storing sensitive information must be
scanned for vulnerabilities at least monthly
• Scans can identify missing patches and improperly
configured services
• Give guidance on how to remediate vulnerabilities
 Identified vulnerabilities must be remediated
• Critical: within 1 week
• Medium: within a month of identification
its.unc.edu
22
Mobile Devices
 Mobile Devices that store sensitive
information must be encrypted
 Includes media (tape, thumb drives,
external hard drives…)
 Pretty Good Privacy (PGP) laptop
encryption is available
• Administratively funded
• Can be installed by departmental support
• Reduce risk of lost data due to forgotten
passwords
its.unc.edu
23
Mobile Devices Continued
 Should be scanned for vulnerabilities
 Should use the Sensitive version of
Symantec End Point Protection (antivirus)
 Should be authorized by the dean or
department head
 Must be patched and/or updated
regularly (i.e. MS update for laptops or
cellular provider system updates for
smart phones)
its.unc.edu
24
Info Security Policies
• A long overdue policy base to operate
from in protecting the campus
its.unc.edu
 Information Security policy
 Information Security Standards policy
 General User Password policy
 Sys. and Appl. Administrator Password policy
 Transmission of Sensitive Information policy
 Security Liaison policy
 Vulnerability Management policy
 Incident Management policy
 Data Governance policy
25
Highlight:
Data Governance Policy
 The policy defines the governance
structure for management of institutional
data and establishes procedures for data
classification.
 No one person or unit owns UNC Data
 Groups should have processes in place for
granting and revoking access to data
 Eliminate data when it has reached the
end of its retention period
its.unc.edu
26
Highlight:
Password Policy
 Requires password complexity
 Requires password expirations
 Prohibits password sharing
 Prohibits generic accounts
 Requires changes in situations where the
password may have been compromised
 This applies to all passwords not just the
ONYEN
its.unc.edu
27
What this means to faculty…
 We all have a responsibility to protect the
University and its data—particularly sensitive data







Policies apply campus wide
When in doubt ask (report issues)
Use strong passwords
Don’t surf web on machines with sensitive data
Patch and configure correctly (scan to verify)
Encrypt sensitive data and only use when needed
Ensure servers are supported/maintained by
competent systems administrators
its.unc.edu
28
Key Upcoming Projects
 Systems Administrator Assessments
• Ensure appropriate skills for Sys Admins
• Identify servers storing sensitive information
• Identify Service clusters which can provide
systems administration support (fee based)
 Campus Perimeter Firewall
• Construct a workable strategy for enhancing
security at the campus network border
its.unc.edu
29
Contact Information
 For issues involving system security, call
919-962-HELP or send e-mail to:
security@unc.edu.
its.unc.edu
30
QUESTIONS?
its.unc.edu
Download