Creating a Security Architecture Kim Milford, J.D., CISSP Information Security Manager University of...
-
Upload
jessie-pitts -
Category
Documents
-
view
218 -
download
0
Transcript of Creating a Security Architecture Kim Milford, J.D., CISSP Information Security Manager University of...
Creating a Security Architecture
Kim Milford, J.D., CISSP
Information Security Manager
University of Wisconsin
[email protected] Kim Milford, 2003
Overview
• Background: Defining a Security Architecture
• Why we need A Security Architecture
• Models
• A Comprehensive Approach to Information Security
Background
• RFC 2401 (IPSec) Security Architecture:– Goal is to provide various security services for
traffic at the IP level
• ISC2:– The totality of security design for a system or
application
• IAA/PKI Standards– Federal Bridge PKI– Shibboleth
Background• CERT:
– Maintain a long-term view and invest in research toward systems and operational techniques that yield networks capable of surviving attacks while protecting sensitive data. In doing so, it is essential to seek fundamental technological solutions and to seek proactive, preventive approaches, not just reactive, curative approaches.
Why We Need A Security Architecture• Mandates
– FERPA – HIPAA– Gramm Leach Bliley Act– TEACH– National Strategy to Secure Cyberspace– DHHS proposed legislation to protect laboratories handling select
agent (42 CFR Part 73):• 73.11(a) “The security plan must be based on a systematic approach in which
threats are defined, vulnerabilities are examined, and risks associated with those vulnerabilities are mitigated with a security systems approach.”
• 73.11(b)”The plan must: (1) describe …cyber security
Why We Need A Security Architecture
To Protect:• Confidentiality• Integrity • Availability of IT Resources
From:• Environmental threats• Technical threats• Human threats
Why We Need A Security Architecture
Threats - Continued
Incidents reported to BadgIRT
0
200
400
600
800
1000
1200
1999-2000 2000-2001 2001-2002
Year
Num
ber o
f inc
iden
ts
1999-2000
2000-2001
2001-2002
Why We Need A Security Architecture
Threats – Continued (2002 CSI/FBI Survey):
•90% of respondents detected computer security incidents in the past 12 months
•80% acknowledged financial losses due to computer security incidents
Why We Need A Security Architecture
Threats – Continued (2002 CSI/FBI Survey):
Internet Cited as a Point of Attack in CSI/FBI Annual Survey
20022001
2000 1999 19981997
1996
0
10
20
30
40
50
60
70
80
Year
% o
f R
esp
on
den
ts
Security Architecture: Models
The building blocks of security…The building blocks of security…
POLICIES
VIRUS PROTECTION
PHYSICAL SECURITY
PROTECT YOUR
SERVERS
PROTECT YOUR PCs
DISASTER RECOVERY
EDUCATIONEDUCATION
INCIDENT HANDLING
FIREWALLS
Security Architecture: ModelsInterlocking Communities
Served by Interlocking Information Infrastructures
FII DII
Electronic Commerce Electronic Mail Electronic Data Interchange Electronic Funds Transfer File Transfer Information Search/Retrieval
NII
GII
Requiring
PROTECT DETECT RESPOND RECONSTITUTE
Private Citizen
Business Sector
State, Local Govt
Critical Public Safety
Federal Govt
Natl Security
Intel/DOD
Internatl
Basic Information Security Services * Data Integrity * Data Confidentiality * Transaction Non-Repudiation
* User Identification and Authentication * System Availability
Through trained system users, maintainers and developers
A Comprehensive Approach to Information Security
From theory to practice:
1. Perform risk assessment
2. Develop a comprehensive plan to information security
– Phased migration
3. Develop an architectural model– Get management's attention
– Get system developer’s attention
References
www.doit.wisc.edu/security
www.cert.org
Security Project Cookbook, The Burton Group
Nigel Willson, Dan Blum, 2002
www.gocsi.com (CSI/FBI survey)