SlideShare ist ein Scribd-Unternehmen logo
1 von 12
Private Data – Keep Out!
National Extension Technology Conference
Greg Parmer
Jonathan Davis
August 12, 2015
The Day My Job Changed
History
Firewall hole added for workgroup NAS device, against
IT recommendation
4 years later…
Mail relay incident
A dozen “exposed” SSNs
Nearly 5 figure forensics bill
Faculty members’ change of heart
Policy necessity (and now politically acceptable!)
Gas On The Fire
College of Business incident
Admissions Office incident
NAS Device Replacement (incorrect configuration)
Exposures of Personally Identifiable Information
(PII)
ID Theft insurance for thousands of individuals
Policy avalanche… (and why hasn’t this already
been fixed?)
Finding Personally Identifiable Info
Deployed Identity Finder software
Scan all University computers for PII (SSNs and credit
card numbers)
Deployed on relatively short notice
Remediation by end-users
Where to store PII?
Information Security Awareness Training
Training required of all employees
23 video modules, each a few minutes long
Quiz after each module
Repeat annually
Planning for customized content
Border Firewall and NAT
Much Greater Acceptance of Campus NAT
Border Firewall is Default Closed
Server Certification Working Group
Purpose:
Develop security standards to evaluate and secure all University
servers. Create a secure server certification program, with certain
expectations:
1. Server certification will be based on a recognized standard.
2. Server security standard should preferably be in use at peer
institutions.
3. Server security standard will include criteria to determine what
systems will be subject to compliance.
4. Servers will be audited and re-certified regularly at an interval
consistent with industry standards.
5. Complete access to servers will be required by the audit team
during audits.
6. Server security additional criteria and requirements for successful
certification program.
Peer Institution Policies
Florida
IT Policies, Data classification, Network and Host Security Standard, NIST
standards referenced
(IT Security PPT presentation for faculty, staff, students, etc to “sell” the
policies)
Iowa State (was pending, but applied well to AU)
Data Governance Committee, Data classification, Security Standards &
Guidance
Univ of Tennessee Institute for Agriculture (policies and procedures were
pending)
Scanning with Qualys - working toward NIST standard
Texas A&M AgriLife/Extension (follow Aggie Standard Administrative Procedures)
Servers are registered in an online app, scanned monthly with Nessus and
reports provided to the registered server administrator. Administrators are also
required to do a yearly risk assessment per university rule. The risk
assessment is done via an online questionnaire. In addition any server that
handles registration/payment has a quarterly PCI scan and remediation
process.
(Thank you, colleagues! Great information from extech mailing list, online, and
personal e-mail.)
4 Aspects of Server Standards In A Nutshell
Server Registration
Audit via multiple methods
Data Classification
Audit via Identity Finder
NIST’s National Checklist Program
Audit via CIS-CAT
Patch at least CVSS levels 4 and 5
Audit via Qualys (and 3rd party tools like Nessus)
Data Governance Committee to Audit Process, Policy, and
Audits
Differences in Policy
Cloud service agreement with vendors?
OneDrive
GoogleDocs
Dropbox
Evernote
Guarantee for confidential data?
This seemingly minor difference results in major
implementation differences!
Other Tools
Scanners
Nessus
Qualys (authenticated scans)
Password Managers
LastPass
KeePass
Secret Server
Multifactor Authentication
RSA
Duo
“Off-Campus” Scans
Questions?
Thanks for attending!
PS: “Dark Alleys of the Internet”
Updated on Slideshare
www.slideshare.net/gparmer/dark-alleys2015
Greg Parmer parmega@auburn.edu or gregparmer@gmail.com
Jonathan Davis jdavis@auburn.edu

Weitere ähnliche Inhalte

Was ist angesagt?

McElvy Resume 2015
McElvy Resume 2015McElvy Resume 2015
McElvy Resume 2015
Debra McElvy
 

Was ist angesagt? (20)

Why Medical Devices Are So Vulnerable
Why Medical Devices Are So VulnerableWhy Medical Devices Are So Vulnerable
Why Medical Devices Are So Vulnerable
 
Best vulnerability assessment training
Best vulnerability assessment trainingBest vulnerability assessment training
Best vulnerability assessment training
 
What is penetration testing and why is it important for a business to invest ...
What is penetration testing and why is it important for a business to invest ...What is penetration testing and why is it important for a business to invest ...
What is penetration testing and why is it important for a business to invest ...
 
Ctia course outline
Ctia course outlineCtia course outline
Ctia course outline
 
Building HIPAA Compliance in service delivery teams
Building HIPAA Compliance in service delivery teamsBuilding HIPAA Compliance in service delivery teams
Building HIPAA Compliance in service delivery teams
 
Medical Devices Under Attack
Medical Devices Under Attack Medical Devices Under Attack
Medical Devices Under Attack
 
SeaCat: and SDN End-to-end Application Containment ArchitecTure
SeaCat: and SDN End-to-end Application Containment ArchitecTureSeaCat: and SDN End-to-end Application Containment ArchitecTure
SeaCat: and SDN End-to-end Application Containment ArchitecTure
 
What You Need to Know About Intelligent Network Segmentation
What You Need to Know About Intelligent Network SegmentationWhat You Need to Know About Intelligent Network Segmentation
What You Need to Know About Intelligent Network Segmentation
 
Mitigating Risk in Aging Federal IT Systems
Mitigating Risk in Aging Federal IT SystemsMitigating Risk in Aging Federal IT Systems
Mitigating Risk in Aging Federal IT Systems
 
McElvy Resume 2015
McElvy Resume 2015McElvy Resume 2015
McElvy Resume 2015
 
Encryption Solutions for Healthcare
Encryption Solutions for HealthcareEncryption Solutions for Healthcare
Encryption Solutions for Healthcare
 
BSidesQuebec2013_fred
BSidesQuebec2013_fredBSidesQuebec2013_fred
BSidesQuebec2013_fred
 
Secure Data Workflow
Secure Data WorkflowSecure Data Workflow
Secure Data Workflow
 
Security for Architects and Developers
Security for Architects and DevelopersSecurity for Architects and Developers
Security for Architects and Developers
 
NTXISSACSC2 - Threat Modeling Part 1 - Overview by Brad Andrews
NTXISSACSC2 - Threat Modeling Part 1 - Overview by Brad AndrewsNTXISSACSC2 - Threat Modeling Part 1 - Overview by Brad Andrews
NTXISSACSC2 - Threat Modeling Part 1 - Overview by Brad Andrews
 
Tips to Remediate your Vulnerability Management Program
Tips to Remediate your Vulnerability Management ProgramTips to Remediate your Vulnerability Management Program
Tips to Remediate your Vulnerability Management Program
 
Alienvault threat alerts in spiceworks
Alienvault threat alerts in spiceworksAlienvault threat alerts in spiceworks
Alienvault threat alerts in spiceworks
 
Information Security and the SDLC
Information Security and the SDLCInformation Security and the SDLC
Information Security and the SDLC
 
Cyber Security # Lec 3
Cyber Security # Lec 3 Cyber Security # Lec 3
Cyber Security # Lec 3
 
New USM v5.0 - Get Complete Security Visibility Faster & Easier Than Ever
New USM v5.0 - Get Complete Security Visibility Faster & Easier Than EverNew USM v5.0 - Get Complete Security Visibility Faster & Easier Than Ever
New USM v5.0 - Get Complete Security Visibility Faster & Easier Than Ever
 

Andere mochten auch

Cartel dia biblioteca_2015
Cartel dia biblioteca_2015Cartel dia biblioteca_2015
Cartel dia biblioteca_2015
sanjosehhcc
 
Flyer Treatment of High-Risk Sexual Offenders
Flyer Treatment of High-Risk Sexual OffendersFlyer Treatment of High-Risk Sexual Offenders
Flyer Treatment of High-Risk Sexual Offenders
Jeff Abracen
 
A.P.I. 1104 - 6G Pipe
A.P.I. 1104 - 6G PipeA.P.I. 1104 - 6G Pipe
A.P.I. 1104 - 6G Pipe
Edward Miller
 
revista, hoja 3 Facebook
revista, hoja 3 Facebookrevista, hoja 3 Facebook
revista, hoja 3 Facebook
elgil2698
 
Tríptico presentación curso 16 17
Tríptico presentación curso 16 17Tríptico presentación curso 16 17
Tríptico presentación curso 16 17
sanjosehhcc
 
Soncev Mrk Shanghai 2009
Soncev Mrk Shanghai 2009Soncev Mrk Shanghai 2009
Soncev Mrk Shanghai 2009
Vesna Babnik
 
Reserva dvd fiesta blog 6-6-16
Reserva dvd fiesta blog 6-6-16Reserva dvd fiesta blog 6-6-16
Reserva dvd fiesta blog 6-6-16
sanjosehhcc
 

Andere mochten auch (17)

Cartel dia biblioteca_2015
Cartel dia biblioteca_2015Cartel dia biblioteca_2015
Cartel dia biblioteca_2015
 
CV_MICHELA SAPORITI
CV_MICHELA SAPORITICV_MICHELA SAPORITI
CV_MICHELA SAPORITI
 
Renowned Computer coaching institute in pune..!!
Renowned Computer coaching institute in pune..!!Renowned Computer coaching institute in pune..!!
Renowned Computer coaching institute in pune..!!
 
Compu
CompuCompu
Compu
 
Teclado
TecladoTeclado
Teclado
 
Maria tenelema 008
Maria tenelema 008Maria tenelema 008
Maria tenelema 008
 
Flyer Treatment of High-Risk Sexual Offenders
Flyer Treatment of High-Risk Sexual OffendersFlyer Treatment of High-Risk Sexual Offenders
Flyer Treatment of High-Risk Sexual Offenders
 
Slide CasaNoi - Sharitaly - Milano, 9 e 10 novembre 2015
Slide CasaNoi - Sharitaly - Milano, 9 e 10 novembre 2015 Slide CasaNoi - Sharitaly - Milano, 9 e 10 novembre 2015
Slide CasaNoi - Sharitaly - Milano, 9 e 10 novembre 2015
 
A.P.I. 1104 - 6G Pipe
A.P.I. 1104 - 6G PipeA.P.I. 1104 - 6G Pipe
A.P.I. 1104 - 6G Pipe
 
revista, hoja 3 Facebook
revista, hoja 3 Facebookrevista, hoja 3 Facebook
revista, hoja 3 Facebook
 
sponsor packages 2016
sponsor packages 2016sponsor packages 2016
sponsor packages 2016
 
San jose 2016 2016 matricula
San jose 2016 2016 matriculaSan jose 2016 2016 matricula
San jose 2016 2016 matricula
 
Hazirend
HazirendHazirend
Hazirend
 
Tríptico presentación curso 16 17
Tríptico presentación curso 16 17Tríptico presentación curso 16 17
Tríptico presentación curso 16 17
 
Soncev Mrk Shanghai 2009
Soncev Mrk Shanghai 2009Soncev Mrk Shanghai 2009
Soncev Mrk Shanghai 2009
 
Reserva dvd fiesta blog 6-6-16
Reserva dvd fiesta blog 6-6-16Reserva dvd fiesta blog 6-6-16
Reserva dvd fiesta blog 6-6-16
 
Presentacion proyecto
Presentacion proyectoPresentacion proyecto
Presentacion proyecto
 

Ähnlich wie Private Data - Keep Out!

SFISSA - PCI DSS 3.0 - A QSA Perspective
SFISSA - PCI DSS 3.0 - A QSA PerspectiveSFISSA - PCI DSS 3.0 - A QSA Perspective
SFISSA - PCI DSS 3.0 - A QSA Perspective
Mark Akins
 
Tizor_Data-Best-Practices.ppt
Tizor_Data-Best-Practices.pptTizor_Data-Best-Practices.ppt
Tizor_Data-Best-Practices.ppt
webhostingguy
 
Tizor_Data-Best-Practices.ppt
Tizor_Data-Best-Practices.pptTizor_Data-Best-Practices.ppt
Tizor_Data-Best-Practices.ppt
webhostingguy
 
Lancy-Curriculum Vitae
Lancy-Curriculum VitaeLancy-Curriculum Vitae
Lancy-Curriculum Vitae
Lancy Menezes
 
Cyber crime with privention
Cyber crime with privention Cyber crime with privention
Cyber crime with privention
Manish Dixit Ceh
 
Cybersecurity Training for Nonprofits
Cybersecurity Training for NonprofitsCybersecurity Training for Nonprofits
Cybersecurity Training for Nonprofits
Community IT Innovators
 

Ähnlich wie Private Data - Keep Out! (20)

PCI DSS Compliance and Security: Harmony or Discord?
PCI DSS Compliance and Security: Harmony or Discord?PCI DSS Compliance and Security: Harmony or Discord?
PCI DSS Compliance and Security: Harmony or Discord?
 
How Judson ISD Implemented and Tracks IT Metrics & Key Performance Indicators
How Judson ISD Implemented and Tracks IT Metrics & Key Performance IndicatorsHow Judson ISD Implemented and Tracks IT Metrics & Key Performance Indicators
How Judson ISD Implemented and Tracks IT Metrics & Key Performance Indicators
 
PCI DSS Implementation: A Five Step Guide
PCI DSS Implementation: A Five Step GuidePCI DSS Implementation: A Five Step Guide
PCI DSS Implementation: A Five Step Guide
 
Making Compliance Business as Usual
Making Compliance Business as UsualMaking Compliance Business as Usual
Making Compliance Business as Usual
 
SFISSA - PCI DSS 3.0 - A QSA Perspective
SFISSA - PCI DSS 3.0 - A QSA PerspectiveSFISSA - PCI DSS 3.0 - A QSA Perspective
SFISSA - PCI DSS 3.0 - A QSA Perspective
 
Tizor_Data-Best-Practices.ppt
Tizor_Data-Best-Practices.pptTizor_Data-Best-Practices.ppt
Tizor_Data-Best-Practices.ppt
 
Tizor_Data-Best-Practices.ppt
Tizor_Data-Best-Practices.pptTizor_Data-Best-Practices.ppt
Tizor_Data-Best-Practices.ppt
 
Cybersecurity Risk Management Framework Strategy Workshop
Cybersecurity Risk Management Framework Strategy WorkshopCybersecurity Risk Management Framework Strategy Workshop
Cybersecurity Risk Management Framework Strategy Workshop
 
Information security
Information securityInformation security
Information security
 
Applying Auto-Data Classification Techniques for Large Data Sets
Applying Auto-Data Classification Techniques for Large Data SetsApplying Auto-Data Classification Techniques for Large Data Sets
Applying Auto-Data Classification Techniques for Large Data Sets
 
Security metrics 2
Security metrics 2Security metrics 2
Security metrics 2
 
Microsoft Office 365 Security and Compliance Updates
Microsoft Office 365 Security and Compliance UpdatesMicrosoft Office 365 Security and Compliance Updates
Microsoft Office 365 Security and Compliance Updates
 
Presentation: To an efficient tool for securing the card data on the Cloud: C...
Presentation: To an efficient tool for securing the card data on the Cloud: C...Presentation: To an efficient tool for securing the card data on the Cloud: C...
Presentation: To an efficient tool for securing the card data on the Cloud: C...
 
Lancy-Curriculum Vitae
Lancy-Curriculum VitaeLancy-Curriculum Vitae
Lancy-Curriculum Vitae
 
PCI presentation
PCI presentationPCI presentation
PCI presentation
 
Simplify PCI DSS Compliance with AlienVault USM
Simplify PCI DSS Compliance with AlienVault USMSimplify PCI DSS Compliance with AlienVault USM
Simplify PCI DSS Compliance with AlienVault USM
 
Endpoint Security & Why It Matters!
Endpoint Security & Why It Matters!Endpoint Security & Why It Matters!
Endpoint Security & Why It Matters!
 
Cyber crime with privention
Cyber crime with privention Cyber crime with privention
Cyber crime with privention
 
Cybersecurity Training for Nonprofits
Cybersecurity Training for NonprofitsCybersecurity Training for Nonprofits
Cybersecurity Training for Nonprofits
 
Mobile & Cloud Technology - Doing more with less
Mobile & Cloud Technology - Doing more with lessMobile & Cloud Technology - Doing more with less
Mobile & Cloud Technology - Doing more with less
 

Kürzlich hochgeladen

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Kürzlich hochgeladen (20)

Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 

Private Data - Keep Out!

  • 1. Private Data – Keep Out! National Extension Technology Conference Greg Parmer Jonathan Davis August 12, 2015
  • 2. The Day My Job Changed History Firewall hole added for workgroup NAS device, against IT recommendation 4 years later… Mail relay incident A dozen “exposed” SSNs Nearly 5 figure forensics bill Faculty members’ change of heart Policy necessity (and now politically acceptable!)
  • 3. Gas On The Fire College of Business incident Admissions Office incident NAS Device Replacement (incorrect configuration) Exposures of Personally Identifiable Information (PII) ID Theft insurance for thousands of individuals Policy avalanche… (and why hasn’t this already been fixed?)
  • 4. Finding Personally Identifiable Info Deployed Identity Finder software Scan all University computers for PII (SSNs and credit card numbers) Deployed on relatively short notice Remediation by end-users Where to store PII?
  • 5. Information Security Awareness Training Training required of all employees 23 video modules, each a few minutes long Quiz after each module Repeat annually Planning for customized content
  • 6. Border Firewall and NAT Much Greater Acceptance of Campus NAT Border Firewall is Default Closed
  • 7. Server Certification Working Group Purpose: Develop security standards to evaluate and secure all University servers. Create a secure server certification program, with certain expectations: 1. Server certification will be based on a recognized standard. 2. Server security standard should preferably be in use at peer institutions. 3. Server security standard will include criteria to determine what systems will be subject to compliance. 4. Servers will be audited and re-certified regularly at an interval consistent with industry standards. 5. Complete access to servers will be required by the audit team during audits. 6. Server security additional criteria and requirements for successful certification program.
  • 8. Peer Institution Policies Florida IT Policies, Data classification, Network and Host Security Standard, NIST standards referenced (IT Security PPT presentation for faculty, staff, students, etc to “sell” the policies) Iowa State (was pending, but applied well to AU) Data Governance Committee, Data classification, Security Standards & Guidance Univ of Tennessee Institute for Agriculture (policies and procedures were pending) Scanning with Qualys - working toward NIST standard Texas A&M AgriLife/Extension (follow Aggie Standard Administrative Procedures) Servers are registered in an online app, scanned monthly with Nessus and reports provided to the registered server administrator. Administrators are also required to do a yearly risk assessment per university rule. The risk assessment is done via an online questionnaire. In addition any server that handles registration/payment has a quarterly PCI scan and remediation process. (Thank you, colleagues! Great information from extech mailing list, online, and personal e-mail.)
  • 9. 4 Aspects of Server Standards In A Nutshell Server Registration Audit via multiple methods Data Classification Audit via Identity Finder NIST’s National Checklist Program Audit via CIS-CAT Patch at least CVSS levels 4 and 5 Audit via Qualys (and 3rd party tools like Nessus) Data Governance Committee to Audit Process, Policy, and Audits
  • 10. Differences in Policy Cloud service agreement with vendors? OneDrive GoogleDocs Dropbox Evernote Guarantee for confidential data? This seemingly minor difference results in major implementation differences!
  • 11. Other Tools Scanners Nessus Qualys (authenticated scans) Password Managers LastPass KeePass Secret Server Multifactor Authentication RSA Duo “Off-Campus” Scans
  • 12. Questions? Thanks for attending! PS: “Dark Alleys of the Internet” Updated on Slideshare www.slideshare.net/gparmer/dark-alleys2015 Greg Parmer parmega@auburn.edu or gregparmer@gmail.com Jonathan Davis jdavis@auburn.edu

Hinweis der Redaktion

  1. Auburn University has implemented measures to strengthen the institution’s overall data security posture with a focus on protecting Personally Identifiable Information (PII). Join us to learn about some of the technical and human factors to consider for enhancing information security from the campus level to the desktop. http://www.aces.edu http://www.auburn.edu
  2. I was a system and network administrator whose job was to keep the people happy and provide IT solutions. When the bills for forensics and insurance start rolling in, the job becomes one of protecting data.
  3. First high-profile event: November 2013 Got the attention of university administration Luckily Auburn had cyber-insurance
  4. Challenges: Deploy quickly with little training and server config testing for so many computers Remediation by end-users – very time-intensive for them and for us to confirm Where to store PII that must be kept (grant forms, veteran’s outreach forms, etc.)
  5. First year was contracted out to SANS. Subsequent years will likely feature a homegrown solution tailored to our environment.
  6. Campus firewall and NAT are now being begged for. Attitude changed from “why do that?” to “why haven’t you already done that?” Aside: do you request firewall openings by port or by application?
  7. Morphed. There was no payoff for being certified so we managed to drop “certification” and create a standards program with a goal of meeting industry standards and a steadily improved security posture.
  8. With Extech and web searches we found a common theme of data security policies (primarily online, some via email) MIT - "Compliance with this Program will be reviewed as part of regularly scheduled operational and IT audits conducted by MIT's Audit Division." Texas A&M - An interesting side effect of these procedures has been a migration away from running local servers in departments to using VM platforms that we (AgriLife IT) offer as service to Extension, Research and our College departments. In that scenario we manage most of the security for them.
  9. NIST – National Institute of Standards and Technology CVE – Common Vulnerabilities and Exposures CIS – Center for Internet Security (-CAT Configuration Assessment Tool)
  10. Our agreement apparently does not guarantee private data. At least one other institution has an agreement that the cloud vendor will take responsibility for data exposure, so they are moving all confidential data to the cloud (at least within county extension offices).