dr. bhavani thuraisingham the university of texas at dallas (utd) june 2015 operations security

50
Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) June 2015 Operations Security

Upload: brian-hubbard

Post on 27-Dec-2015

219 views

Category:

Documents


1 download

TRANSCRIPT

Page 1: Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) June 2015 Operations Security

Dr. Bhavani ThuraisinghamThe University of Texas at Dallas (UTD)

June 2015

Operations Security

Page 2: Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) June 2015 Operations Security

Domain Objectives• Protection and Control of Data Processing Resources

– Media Management– Backups and Recovery– Change Control

• Privileged Entity Control

Page 3: Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) June 2015 Operations Security

Control Categories• Preventive• Detective• Corrective• Deterrent• Recovery• Directive• Compensating

Page 4: Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) June 2015 Operations Security

Application-related Controls• Transaction• Input• Processing• Output• Test• Supervision / balancing• Job-flow• Logging• Licensing

Page 5: Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) June 2015 Operations Security

Operations Security Focus Areas• Auditors• Support staff• Vendors• Security• Programmers• Operators• Engineers• Administrators

Page 6: Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) June 2015 Operations Security

Domain Agenda• Resource Protection• Continuity of Operations• Change Control Management• Privileged Entity Control

Page 7: Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) June 2015 Operations Security

Facility Support Systems• The support systems in centralized and decentralized operation

centers must be protected– Hardware– Software– Storage media– Cabling– Physical security

Page 8: Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) June 2015 Operations Security

Facility Support Systems (cont.)• Fire protection• HVAC• Electrical power goals

Page 9: Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) June 2015 Operations Security

Facility Support Systems (cont.)• Water• Communications• Alarm systems

Page 10: Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) June 2015 Operations Security

Media Management• Storage• Encryption• Retrieval• Disposal

Page 11: Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) June 2015 Operations Security

Object Reuse• Securely reassigned• Disclosure• Contamination• Recoverability

Page 12: Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) June 2015 Operations Security

Clearing of Magnetic Media• Overwriting• Degaussing• Physical destruction

Page 13: Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) June 2015 Operations Security

Media Management Practices• Sensitive Media Controls

– Destroying– Marking– Labeling– Handling– Storing– Declassifying

Page 14: Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) June 2015 Operations Security

Misuse Prevention

Threats Countermeasures

Personal use Acceptable use policy, workstation controls, web content filtering, email filtering

Theft of media Appropriate media controls

Fraud Balancing of input/output reports, separation of duties, verification of information

Sniffers Encryption

Page 15: Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) June 2015 Operations Security

Records Management• Consideration for records management program development• Guidelines for developing a records management program• Records retention

Page 16: Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) June 2015 Operations Security

Domain Agenda• Resource Protection• Continuity of Operations• Change Control Management• Privileged Entity Control

Page 17: Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) June 2015 Operations Security

Adequate Software & Data Backup• Operations controls ensure adequate backups of:

– Data– Operating systems– Applications– Transactions– Configurations– Reports

• Backups must be tested• Alternate site recovery plan

Page 18: Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) June 2015 Operations Security

Fault Tolerance• Hardware failure is planned for• System recognizes a failure• Automatic corrective action• Standby systems

– Cold – configured, not on, lost connections– Warm – On, some lost data or transactions (TRX)– Hot – ready – failover

Page 19: Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) June 2015 Operations Security

RAID – Redundant Array of Independent Discs

• Hardware-based• Software-based• Hot spare

Page 20: Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) June 2015 Operations Security

RAID Level 0• Two or more disks• No redundancy• Performance only

Page 21: Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) June 2015 Operations Security

RAID Level 1• Exact copy (or mirror)• Two or more disks• Fault tolerant• 200% cost

Page 22: Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) June 2015 Operations Security

RAID Level 2• Striping of data with error correcting codes (ECC)• Requires more disks than RAID 3/4/5• Not used, not commercially viable

Page 23: Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) June 2015 Operations Security

RAID Level 3• Byte level stripes• 1 drive for parity• All other drives are for data

Page 24: Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) June 2015 Operations Security

RAID Level 4• Block level stripes• 1 drive for parity• All other drives are for data

Page 25: Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) June 2015 Operations Security

RAID Level 5• Block level stripes• Data and parity interleaved amongst all drives• The most popular RAID implementation

Page 26: Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) June 2015 Operations Security

RAID Level 6• Block level stripes• All drives used for data AND parity• 2 parity types• Higher cost• More fault tolerant than RAID implementations 2 - 5

Page 27: Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) June 2015 Operations Security

RAID Level 0+1• Mirroring and striping• Higher cost• Higher speed

Page 28: Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) June 2015 Operations Security

RAID Level 10• Mirroring and striping• Higher cost• Higher speed

Page 29: Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) June 2015 Operations Security

Redundant Array of Independent Taps (RAIT)

• Using tapes not disk• Rea-time mirroring

Page 30: Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) June 2015 Operations Security

Hot Spares• Waiting for disaster• Global• Dedicated

Page 31: Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) June 2015 Operations Security

Backup Types• File image• System image• Data mirroring• Electronic vaulting• Remote journaling• Database shadowing• Redundant servers• Standby services

Page 32: Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) June 2015 Operations Security

System Recovery – Trusted Recovery• Correct implementation• Failures don’t compromise a system’s secure operation

Page 33: Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) June 2015 Operations Security

Types of Trusted Recovery• System reboot• Emergency system restart• System cold start

Page 34: Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) June 2015 Operations Security

Fail Secure• Cause little or no harm to personnel• System remains secure

Page 35: Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) June 2015 Operations Security

Operational Incident Handling• First line of defense• Logging, tracking and analysis of incidents• Escalation and notification

Page 36: Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) June 2015 Operations Security

Incident Response TeamBenefits

• Protection of assets• Profitability• Regulations• Avoiding downstream

damage• Limit exposure

Priorities• Life safety• Labeled data• Communication• Reduce disruption

Page 37: Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) June 2015 Operations Security

Contingency Plans• Business continuity plans and procedures

– Power failure– System failure– Denial of service– Intrusions– Tampering– Communication– Production delay– I/O errors

Page 38: Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) June 2015 Operations Security

Domain Agenda• Resource Protection• Continuity of Operations• Change Control Management• Privileged Entity Control

Page 39: Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) June 2015 Operations Security

Change Control Management• Business and technology balance• Defines

– Process of changes– Ownership of changes

• Changes are reviewed for impact on security

Page 40: Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) June 2015 Operations Security

Change Control Committee Responsibilities

Management• Business impact• Regulations• Risk management• Approval• Accreditation

Technical• Request process• Functional impact• Access control• Testing• Rollback• Certification

Page 41: Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) June 2015 Operations Security

Change Control Procedures• Request• Impact assessment• Approval• Build/test• Implement• Monitor

Page 42: Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) June 2015 Operations Security

Configuration Management Elements• Hardware inventory• Hardware configuration chart• Software• Firmware• Documentation requirements• Testing

Page 43: Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) June 2015 Operations Security

Patch Management• Knowledge of patches• Testing• Deployment• Zero-day challenges

Page 44: Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) June 2015 Operations Security

Protection of Operational Files• Library Maintenance

– Backups– Source code– Object code– Configuration files

• Librarian

Page 45: Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) June 2015 Operations Security

Domain Agenda• Resource Protection• Continuity of Operations• Change Control Management• Privileged Entity Control

Page 46: Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) June 2015 Operations Security

Operator Privileges• Data input and output• Data maintenance• Labeling• Inventory

Page 47: Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) June 2015 Operations Security

Administrator Privileges• Systems administrators• Network administrators• Audit highly-privileged accounts

Page 48: Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) June 2015 Operations Security

Security Administrator Privileges• Security administration include:

– Policy• Development• Implementation• Maintenance and compliance

– Vulnerability assessments– Incident response

Page 49: Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) June 2015 Operations Security

Control Over Privileged Entities• Review of access rights• Supervision• Monitoring/audit

Page 50: Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) June 2015 Operations Security

Domain Summary• Resource Protection• Continuity of Operations• Change Control Management• Privileged Entity Control