• No results found

NUS InfoComm Security Landscape

N/A
N/A
Protected

Academic year: 2021

Share "NUS InfoComm Security Landscape"

Copied!
17
0
0

Loading.... (view fulltext now)

Full text

(1)

NUS InfoComm Security

Landscape

Yong Fong Lian,

Manager (IT Security), NUSCERT, NUS, Computer Centre

(2)

Technology

NUS Security Strategy

Process

(3)

NUS Security Framework

NUS InfoComm Security Framework P E O P L E P R O C E S S Technology

Policy, Procedures, Best Practices

Awareness, Training

Vulnerability and Threat Management

Incident Management

Security Audit and Penetration Testing

(4)

People : Policies, Procedures, Best Practices

Policies, Standards, Control Procedures

NUS IT Security Policy

Acceptable Use Policy

ISO 27000 compliant policy

ISO 9001:2000 certified procedures

Portals facilitate secure access to policies

Best practices

US-CERT

SingCERT

(5)

People: Awareness, Training

Awareness

NUS IT Security Week

Freshman Security Orientation Week

IT Security e-Newsletter, Blog

Email, MOTD alerts, SMS alerts

Training

Online Security Module (staff and students)

End User Security Training (admin staff)

Technical Security training on Firewall, IDS, Windows, Linux, Apache, Application Security

Controls

Certification Program (systems and network administrators)

(6)

Process: Vulnerability Management

Vulnerability management

Network Address Tracking and Security (NATS)

Scans from Internet and within NUSNET

Quarterly scans for mission critical servers

Campus wide scans (full scans and incremental scans)

Vulnerability self-assessment (ad-hoc scans)

Multiple scanners for cross-checks

In-house web-based portals and systems with workflow

Vulnerabilities evaluated at system, network, application and database levels

Automated patch management for Windows

(7)

Results automatically posted online and administrators email alerted.

Rescan initiated automatically to verified results

Security administrator scans systems

System administrators fix and feedback on

results Periodic scans

(greatly-automated)

Campus wide scans

Vulnerability and Threat Management (Process)

(8)

Helpdesk adds tested patches/hotfixes

onto disk image

Helpdesk deploys certified disk images

into new systems Helpdesk alerted

of new patches/hotfixes

InfoComm Security team certifies disk images Cerfication of disk

images (controlled process)

Certification of disk images

Vulnerability and Threat Management (Process)

(9)

Testing group tests and evaluate patch for robustness and effectiveness

Servers and clients are patched according

to run cycle Security administrator downloads patch/hotfix

Into test system

Security administrator loads tested patch onto dissemination server Patch management

(greatly automated)

Automated patch management

Vulnerability and Threat Management (Process)

(10)

Process: Threat Management

Threat management

SANS Top 20 vulnerabilities Editing Comm

In-house Vulnerability Alert System

Alerts include SANS, SECUNIA, Microsoft, BugTraq, SecurityTracker.

Allows user subscription to relevant ones

Mechanism of alerts

Email and SMS

Threats are assessed and mitigated

patch management

updates to firewall rules

blocking attachments at email gateways

blocking outbound access to malicious sites at proxy

(11)

Process : Security Audit, Penetration Test

Security audit (internal and external periodically)

Audit on policy compliance

Audit on technical control compliance

ISO 9001 audit on security processes

Audit of disk images before deployment

Penetration test

Social engineering penetration test

Password audits

Technical penetration test

System, network (e.g. firewall), database, application

(12)

Process : Incident Management

Incident management and Forensics

Existing threats

Signature-based IDS

Behavioral-based IDS

Honeynet

Detection at network and host levels

SANS advisory

FIRST advisory

Compromised or infected systems are

quarantined and redirected to a self-help page for remedy

Detection of new virus via scanning of

attachments at the email gateway with multiple virus scanners

(13)

Process : Incident Management

Incidents include systems compromises, email misuses, copyright infringement, virus etc.

Follows standard incident management guidelines

CERT/CC and SANS recommended incident

handling tools are used in manual investigations.

Owners of compromised/infected systems are

automatically alerted or quarantined for remedial actions in a self-help workflow.

(14)

Administrator/owner directed to self-help portal

to resolve compromise or seek further assistance

Administrator alerted when system released, guided on follow-up actions

IDS detects

compromised/infected Systems and sends alerts or initiate quarantine System cleansed is released from quarantine automatically Self-help workflow (greatly-automated)

Self-help workflow

(15)

Technology : Defence in Depth Infrastructure

Segmentation of network into different levels of security

VPN used to encrypt sensitive data transmitted across network

Firewalls, IDS, anti-virus, anti-spyware, anti-spam installed at server and client

Gateway Server Client Firewalls √ √ √

IDSes √ √ √

Anti-virus √ √ √

Anti-spyware √ √ √

(16)

Internet NUSNET Admin Network Student PCs) Staff PC Cisco FWSM Cisco FWSM RAS / VPN GW ITU (Internet) ITU (Intranet) Internet Servers (Corporate Servers) Intranet Servers (Personal Servers) SOC Network Internet Servers (Personal Servers) Intranet Servers (Corporate Servers)

SOC NetworkSOC

Network Cisco FWSM ITU (Admin-subnet related servers) Low Medium High Server Farm Cisco FWSM Gateways with anti-virus, anti-spyware

Client with MSUS, virus, MSUS, anti-spam, anti-spyware

RIRC

Servers with MSUS, anti-virus and

Technology : Defence in Depth Infrastructure

MSUS deployment server

Clients with anti-virus, MSUS and anti-spam

(17)

InfoComm Security Scorecard

Finalist for MIS Asia 2006 Best IT Security Strategy Award

Result of IDA government-wide scan on 60+ critical web servers is 0 vulnerabilities

0 security incidents on critical servers

Certified for inclusion in FIRST (Forum of Incident Response Security Teams), an established and

renowned International consortium.

Member of APCERT, which comprises mainly of national level CERTs.

Security quality processes are ISO 9001 certified

More than 15 new worms/variants have been

reported to antivirus vendor over last 12 months.

References

Related documents

An atom is made up of three particles: negatively charged electrons and a nucleus consisting of positively charged protons (uud quarks), and neutrons (udd quarks), called..

ACM_AUT.1.1E The evaluator shall confirm that the information provided meets all requirements for content and presentation of evidence.. ACM_CAP.4 Generation support and

This finding offers important insights into open source development projects: transient project teams from outside an open source network are likely to try reusing code and modules

( Phe ( نزههههيارک ،) CHR ید و ) وزههههنب ( a,h نههههسارتنآ ) ( DBahA یورههبور( هد هرامههش هاگتههسيا رد ) يههجورخ یاهزاف ۴ و ۴ ) نرياپ آ وزنب ( BaP ) و نهسارتنآ ( ANT

Our range of 8 BlueSolar MPPT charge controllers can improve energy harvest by up to 30% on cloudy days as well as monitoring the state of charge and load output.. Our PWM

Users were not satisfied with NutchWAX search • Unpolished interface • Slow results – 40M URLs, >20s • Low relevance. for

Even though there were reasonable strides made in delivering expository sermons for five years from 2010 – 2015, the question remains: “Between topical and expository preaching