530 likes | 823 Views
BRINGING TECHNOLOGY TO THE STATES. ITSC. www.itsc.state.md.us. STATE OF MARYLAND LOCKHEED MARTIN. MITRETEK SYSTEMS UNIVERSITY OF MARYLAND. Sponsored by the US Department of Labor. Winner of Case Study Award - International Summit on Service to the Citizen
E N D
BRINGING TECHNOLOGY TO THE STATES ITSC www.itsc.state.md.us STATE OF MARYLAND LOCKHEED MARTIN MITRETEK SYSTEMS UNIVERSITY OF MARYLAND Sponsored by theUS Department of Labor Winner of Case Study Award - International Summit on Service to the Citizen Winner of Showcase Award - Joint Employment and Training Technology Conference Internet Security How Much is Enough? Orange Beach, Alabama May 23, 2000 Steve Miksell ITSC
Internet Security How much is enough? 2
Agenda • Introduction • Threats, Risks and Vulnerabilities • Risk Reduction I (Tools) • Risk Reduction II (End-to-End Solutions) • Risk Reduction III (An On-Going Process) • Conclusion
Internet Benefits and The Role of Security Internet Access (Benefits to Users and Staff) SESA Cost Savings (Client Savings/ Agency Savings) • Security Required to Assure Confidence Allowing Benefits to be Realized • Costs to Achieve this will affect bottom line • Household access • Personal Computer • Other devices • Third party access • Community-based organization • Libraries • Agencies • Schools • Ease-of-use • Ability to save agency costs • Accuracy of information and transactions • Cost of Internet hardware and software design and implementation • Cost of multiple modes of operation Security and Privacy
UI Internet Security Issues Availability Privacy and Confidentiality Financial and Data Integrity
Security -- Package or Process Universal Security Package (1 size fits all) Solution is an “ongoing” process tailored to the environment and application
Key Elements of a Security Program • People • Management • Staff Policies & Procedures Tools
Computer Misuse and Abuse (USA TODAY from FBI and CSI Institute Surveys)
Agenda • Introduction • Threats, Risks and Vulnerabilities • Risk Reduction I (Tools) • Risk Reduction II (End-to-End Solutions) • Risk Reduction III (An Ongoing Process) • Conclusion
Threats, Vulnerabilities, & Risks Vulnerability Threat Risk
Web Server Vandalism WWW.Site.State.XX.US Welcome from the Commissioner……. • Vandalized Web Sites (a small sample): • NASA • DOJ • KKK • Greenpeace • CIA
Secured SESA IT Environment Fire- Wall Web Server Viruses and other malicious codes represent another threat to service. One, or several malicious individuals can launch “attacks” which deny service to all other users. Denial of Service
SESA IT Environment Fire- Wall Web Server Release of Confidential Information Legitimate user, who provides confidential information to the SESA. Hacker pretends to be someone else, obtaining confidential information, such as wage records or UI claim status from the SESA.
SESA IT Environment Fire- Wall Web Server Fraud Over the Internet Dishonest individuals submit fraudulent claims, using anonymity of the Internet to hide their identity.
Agenda • Introduction • Threats, Risks and Vulnerabilities • Risk Reduction I (Tools) • Risk Reduction II (End-to-End Solutions) • Risk Reduction III (An On-Going Process) • Conclusion
Security Services (Tools and Techniques) Techniques • Server Lockdown • Log Analysis • Incident Handling Procedures • Security Policies • Risk Assessments • … • ... TOOLS • Firewalls • Intrusion Detection • Virus Detection • Authentication Mechanisms (e.g., PKI) • Virtual Private Networks • … • ...
Snake Oil UI Issues and IT Security Services Availability Confidentiality Integrity Good Product/ NO Fit System Configuration Firewalls Accountability Architecture Monetary and Privacy Issues Non-Repudiation Threats posed by those who might commit fraud. Authentication Incident Mgmt. Identification Access Control Administration
Agenda • Introduction • Threats, Risks and Vulnerabilities • Risk Reduction I (Tools) • Risk Reduction II (End-to-End Solutions) • Risk Reduction III (An Ongoing Process) • Conclusion
INTERNET Threats & Points of Vulnerability Internet Access Exposes Personal and Monetary Information Threat: Vandals Threat: Malicious Users Threat: Snoops, Data Modifiers Threat: Snoops, Data Modifiers Threat: Imposters Client Side Communications Path Server Side
Server Side SecurityLegacy & Operational Data Mainframes • Security Services: • System Configuration • Access Control • Identification & Authentication • Accountability • Facility Security • Software Import Control Servers
Server Side Security • Firewalls • Incident Handling • Training • Security Services: • Administrative Procedures • Physical & Personnel Security • Architecture Your LAN External LAN/ Internet Service A ? Unauthorized Authorized Service X ? Email Service A ? Audit Logs Service X ?
Server Side SecurityThe Web Server • Security Services: • System Configuration • Access Control • Identification & Authentication • Accountability • Non-Repudiation • Facility Security • Software Import Control • Incident Management The World UI Data
Secure Communication Security Service: Encrypted pipe SSL (between remote client and server Client Side Client Side Remote Site Communications Path (Internet) Server Side (Intranet) Security Service: Encrypted pipe (VPN) between firewalls
Client Side Security • Security Services (Applied to Browsers, Platforms and Individuals): • System Configuration • Identification & Authentication • Encryption • Software Import Control • Access Control via Passwords • Non-Repudiation • USER TRAINING
Agenda • Introduction • Threats, Risks and Vulnerabilities • Risk Reduction I (Tools) • Risk Reduction II (End-to-End Solutions) • Risk Reduction III (An Ongoing Process) • Conclusion
Security in the Life Cycle of(SESA & UI) Internet Applications Plan What will be done for Security? Design How will It Be Done? Implement Building the Application to incorporate Security Operate Running the Application Securely
Key Issues Claimant Signatures Required? Use of PKI, SSN or Other Authentication techniques? Hours of Operation Contingency Plans Information Handling Policies Security Policy Privacy Policy Discipline Policies Legal Procedures Incident Handling Security Planning Risk Understanding Staff Involvement UI Director Business Managers IT Managers Operations Managers Quality Control Legal Counsel Planning Elements
Policy & Conflict Resolution Cost Ease of Use Security Compatibility Laws & Guidelines
Internet AuthenticationA Major Policy Challenge User convenience must be balanced with privacy and fraud prevention If it’s too hard to prove I’m ME, I won’t bother to use the Internet INTERNET Solutions exist, but their selection and implementation involve cost/certainty/convenience tradeoffs and will require clear policy guidelines.
Spectrum of Authentication Options Assume that knowledge of Name and SSN authenticate user and allow immediate access to Wage Data Require Certificates or other Stringent Authentication Procedures PKI or Biometrics ESTABLISH “Blind Authentication” Procedures that: 1) Protect Privacy 2) Fully exploit Internet capabilities to eliminate the need for direct staff support NEVER release Sensitive over the Internet “Safe but Restrictive” “Higher Risk but User Friendly”
Key Issues Secure Architecture Security Requirements Privacy Requirements Allocation of functions to Hardware/Software/Procedures Firewall policy Encryption Virus Protection Forms Design System Impact Audit Requirements Security Design Reviews Risk Reduction Staff Involvement Business Managers IT Managers/Staff Operations Managers Quality Control Design Elements
Key Issues Secure Server Configuration Firewall Configuration Security Testing Virus Software Security Training Risk Assessment Staff Involvement IT Managers/Staff Operations Managers/Staff Quality Control Implementation Elements
Key Issues Update virus software Monitor security alerts Apply patches for security bugs Update access control lists Monitor audit data Report incidents to management Continually verify server integrity Continually verify web page integrity Periodic Risk Assessment -- particularly as the environment changes Staff Involvement Operations Staff IT Staff Management Operational Elements
Agenda • Introduction • Threats, Risks and Vulnerabilities • Risk Reduction I (Tools) • Risk Reduction II (End-to-End Solutions) • Risk Reduction III (An Ongoing Process) • Conclusion
To Answer the Original Question ... • How Much Security is Enough? • Other Questions Must be Answered... • What is the application? • What level of risks can be tolerated? • What are costs vs. risks?
INTERNET Web Server Application Monitoring Administration Server Lockdown • Website -- Set up as Standalone Server with No Links to Other SESA Assets • Services -- Providing PUBLIC SESA and UI Information to the General Population, Including Links to External Resources • Threats Include: • Vandalism (Graffiti and False Information or Links) • Denial of Service
Threshold Security Server Lockdown Monitoring Backups Contingency Plan Enhanced Security Server Certificate Intrusion Detection Firewall Automated Alerts Automatic Shutdown Web Server Security
INTERNET UI Initial Claims Application Administration Administration Access & Accountability Data Collection Combined with Distribution of Private Information Firewall • Threats • Imposters Submitting False Information • Increased chance of Privacy Violations: • On the Internet • On the Server • On Other SESA computers • Increased Impact of Vandalism/Graffiti Encryption Identification & Authentication Identification & Authentication
Threshold Security Life Cycle Process Comprehensive Policies Access Controls and Reasonable Authentication Point Solutions with End-to-end Security Integration Periodic Assessment Enhanced Security All of the threshold security services at significantly enhanced levels UI Claims
The Original Question -- How Much Security is “Enough”? Enough security to reduce risk to a level you are comfortable with. Steps to achieving that comfort level: • Understanding the Application • Understanding the Risks • Mitigating Risks through a continuous process of security awareness
Extra Credit Topics • Interesting URLs • Personnel Security • DDOS • PKI • Securing Applications • ITSC Contacts
Further “Reading”(Some Interesting Security URL’s) • Government Sites • NIST (csrc.nist.gov) • Private Organizations • SANS (www.sans.org) • SlashDot (www.slashdot.com) • ISS (www.iss.net) • (www.counterpane.com) • (www.needguide.com)
An Approach to Personnel Security • Strong Authentication • Intrusion Detection • Encryption of Key Databases • Audit and Close Security Holes • NOT -- Single Administrator with Universal Access • Background Checks • Strong Written Policies • Training -- Policies, Expectations, Consequences • Control and Monitoring of Sensitive Data • from “Network World”, May 8, 2000
Observations on Personnel Security • Security tools and procedures are not a substitute for trusted employees • Employee “background checks” need to be appropriate to the nature of the job • Onerous Unneeded Security is Self Defeating • Expensive • Morale Busters • Workarounds will be found • Effective Security is a Team Effort -- Don’t alienate the Team
Distributed Denial of Service(From WebCast Presented by ISS on February 16, 2000)
Securing a UI E-Commerce Transaction through PKI Is signature valid? Signature OK Certification Authority Internet 6. Verify signer’s credentials 7. Digitally sign response 8. Send Response Encrypted claim Signature OK Is signature valid? Encrypted claim 1. Complete claim form 2. Digitally sign claim 3. Encrypt Transaction 4. Decrypt claim 5. Check Validity 9. Process claim Claimant UI Office/SESA * PKI - Public Key Infrastructure
Public Key Infrastructure PKI Certification Authority (CA) • Management • Certificate Authorities to validate integrity of public keys by : • Issuing Certificates • Validating Certificates • Revoking Certificates • Cooperating with other CAs • Assigning Responsibility and Liability • Technical • Browser, Server and E-mail software to support: • Key Generation • Symmetric Encryption • Public/private Key Encryption • Secure Key Storage • Digital Signature Creation/Verification PKI Initiatives Utah Digital Signature Program Access Certificates for Electronic Services (ACES) Corporate PKIs - example, Texas Instrument, US West PKI Support Commercial CAs - Verisign, Digital Signature Trust PKI Tool Development - Verisign, Entrust, RSA