building trust and security -...

Post on 20-Apr-2018

223 Views

Category:

Documents

4 Downloads

Preview:

Click to see full reader

TRANSCRIPT

Building Trust and Security Adventures in Access Management on Campus and in the Cloud

October 30, 2014

[ 2 ]

• Adventure #1: Ann West, Internet2 InCommon • Adventure #2: Mary Dunker, Virginia Tech • Adventure #3: Renee Shuey, Penn State

Moderated by Steve Devoti, University of Wisconsin-Madison

Building Trust and Security: Adventures in Access Management on Campus and in the Cloud

© 2014 Internet2

[ 3 ]

Adventure #2 Achieving Security Through InCommon Silver

MARY DUNKER, VIRGINIA TECH

dunker@vt.edu

[ 4 ]

THE SETTING

[ 5 ]

SETTING

4.2.8 TECHNICAL ENVIRONMENT

4.2.8.2 (S) Network Security

2. All personnel with login access to IdMS Operations infrastructure elements must use access Credentials as least as strong as the

strongest Credential issued by the IDPO.

[ 6 ]

SETTING

[ 7 ]

CHARACTERS

4.2.3 CREDENTIAL TECHNOLOGY

ALTERNATIVE MEANS for meeting criteria

x.509 personal digital certificate on SafeNet eToken

[ 8 ]

• Token Administration System • EJBCA (PKI) • Directory Administration Tool • Person Registry database

server • Shibboleth server • CAS server • LDAP server

THE PLOT

All personnel with login access to the following Virginia Tech applications and servers use a credential at least as strong as the personal digital certificate on an eToken.

[ 9 ]

Fall, 2013, Admin Password Compromise in Windows Active Directory Child Domain

THE PLOT (WITH VILLAIN)

[ 10 ]

Windows Active Directory IdMS

Operations Infrastructure

Elements

THE SAFE HOUSE

[ 11 ]

IdMS Operations

Infrastructure Elements

THE SAFE HOUSE

[ 12 ]

SECURITY IS BEING ABLE TO SLEEP AT NIGHT.

[ 13 ]

Virginia Tech Multi Factor Authentication Working Group will recommend plans to implement multi-factor one-time password technology for critical applications and servers. The Adventure continues…

EPILOGUE

top related