SlideShare ist ein Scribd-Unternehmen logo
1 von 31
Downloaden Sie, um offline zu lesen
Security Essentials for
Fermilab System
Administrators
Outline



Why Computer Security
Fermilab Strategy:
– Integrated Computer Security
– Defense in Depth




Your role and special responsibilities as a user and system
administrator
Other Computing Policy Issues
–
–
–
–
–

Data backup
Incidental use
Privacy
Offensive material
Licensing
Why Computer Security


The Internet is a dangerous place
– We are constantly being scanned for weak or
vulnerable systems; new unpatched systems will be
exploited within minutes.



Fermilab is an attractive target
– High network bandwidth is useful for attackers who
take over lab computers
– Publicity value of compromising a .gov site
– Attackers may not realize we have no information
useful to them
Why Computer Security - 2


We need to protect
– Our data
– Our ability to use our computers (denial of service
attacks)
– Our reputation with DOE, Congress and the general
public



Major sources of danger
– Running malicious code on your machine due to system
or application vulnerabilities or improper user actions
– Carrying infected machines (laptops) in from off site
FNAL Strategy



Integrated Security Management
Defense in Depth
–
–
–
–
–
–
–

Perimeter Controls and auto blocking
Mail gateway virus scanning
Central Authentication (Kerberos)
Major Applications with enhanced security concerns
Patching and configuration management
Critical vulnerabilities
Prompt response to computer security incidents
(FCIRT)
– Intelligent and informed user community
Integrated Security
Management







Computer Security is not an add-on or something external,
it is part and parcel of everything you do with computers
(analogy with ES&H)
Not “one-size-fits-all”, but appropriate for the needs and
vulnerabilities of each system
In most cases, it is simply common sense + a little
information and care
Each Division/Section or large experiment has a GCSC
(General Computer Security Coordinator) who acts as
liaison with the Computer Security Team in disseminating
information and dealing with incidents; see
http://security.fnal.gov/ for an up to date list
Perimeter Controls
 Certain

protocols are blocked at the site
border (email to anything other than lab
mail servers; web to any but registered web
servers; other frequently exploited services)
 Temporary (automatic) blocks are imposed
on incoming or outgoing traffic that appears
similar to hacking activity; these blocks are
released when the activity ceases (things
like MySpace and Skype will trigger
autoblocker unless properly configured)
Central Authentication








All use of lab computing services requires central
authentication
Avoid disclosure of passwords on the network
No network services (logon or read/write ftp)
visible on the general internet can be offered with
out requiring strongest authentication, currently
Kerberos (unless a formal exemption is applied for
and granted)
Kerberos provides a single sign in, minimizing use
of multiple passwords for different systems
Lab systems are constantly scanned for violations
of this policy
Major applications


Defined as “critical to the mission of the
Laboratory”, i.e. disruption may have major
impact on Laboratory operations; these require
moderate level security controls (as opposed to the
lab baseline low level controls)
– Most things do not fall in this category;





Special (more stringent) rules & procedures apply;
each MA has its own security plan with enhanced
and compensatory security controls beyond the
baseline security controls. (Some “Minor
Applications” will also have their own security
plans.)
You’ll know if you’re in this category;
Grid Security Training


If you are:
- a system administrator of systems that accepts grid jobs
(generally jobs that are authenticated by credentials other
than standard Fermilab Kerberos credentials); or
- a system administrator of one of the associated systems
that provides support for the Fermi Grid infrastructure
(such as GUMS and VOMS servers); or
- a developer of grid middleware software
then in addition to this course you require the training
course entitled
"Security Essentials for Grid System Administrators”
which is available both in face to face sessions and online.



If you are a user of grid computing resources you require
the training course about PKI Authentication
Patching and Configuration
Management



Baseline configurations exist for each major operating
system (Windows, linux, MAC)
All systems must meet the baseline requirements and be
regularly patched (in particular running an up-to-date
supported version of the operating system) UNLESS:
– A documented case is made as to why the older OS version cannot
be upgraded
– Documentation exists to demonstrate that the system is patched
and managed a securely as baseline systems
– All non essential services (such as web servers) are turned off




All systems with Windows file systems must run anti virus
You as a system administrator are responsible for
configuration and patching!
Critical Vulnerabilities and
Vulnerability Scanning






Certain security vulnerabilities are declared
critical when they are (or are about to) being
actively exploited and represent a clear and
present danger
Upon notification of a critical vulnerability,
systems must be patched by a given date or they
will be blocked from network access
This network block remains until remediation of
the vulnerability is reported to the TISSUE
security issue tracking system (as are blocks
imposed for other security policy violations)
Computer Security Incidents
 Mandatory

incident reporting;

– Report all suspicious activity:
• If urgent to FCC Service Desk, x2345, 24x7;
• Or to system manager (if immediately available);
• Non-urgent to computer_security@fnal.gov;

– Incidents investigated by Fermi Computer
Incident Response Team (FCIRT);
– Not to be discussed!
FCIRT (Fermi Computer
Security Incident Response
Team)









Security experts drawn from throughout the lab
Investigate (“triage”) initial reports;
Coordinate investigation overall;
Work with local system managers;
Call in technical experts;
May take control of affected systems;
Maintain confidentiality;
Prohibited Activities


“Blatant disregard” of computer security;
– First time perhaps only warning, repeat offense
disciplinary action;



Unauthorized or malicious actions;
– Damage of data, unauthorized use of accounts, denial
of service, etc., are forbidden;



Unethical behavior;
– Same standards as for non-computer activities;



Restricted central services;
– May only be provided by approved service owners;



Security & cracker tools;
– Possession (& use) must be authorized;



See http://security.fnal.gov/policies/cpolicy.html
Mandatory System Manager
Registration
 System

managers must be registered with

FCSC
 Go to http://security.fnal.gov and click on
“verify your node registration” to see who
is registered as sysadmin for your system
 See:
http://www.miscomp.fnal.gov/sysadmindb
to make changes in registration (you need a
KCA certificate)
Your role as a user and system
administrator



You have a special role as sysadmin of 3 or more systems, a major
application, or a central server.
Sysadmins are on the “front line” of computer security:
“Fermilab’s continuing policy has been to put its first line of defense at the
individual responsible for the data and the local system manager.”



Three roles for a sys admin:
– System manager (configure system, remove unneeded services, apply
patches promptly);
– examples for users;
– vigilant observers of system (and sometimes user) behavior




Sysadmins are expected to communicate computer security guidelines
and policies to the users of systems they administer;
Most important: know how to tell what services are running on your
desktop, turn off those not needed, know where you are getting your
patches from (FERMI domain, Patchlink, yum, Microsoft, …)
Role of sysadmins
 Manage

your systems sensibly, remaining
aware of computer security while
conducting everyday business
 Advise and help users
 Keep your eyes open
 Report potential incidents to FCIRT
 Act on relevant bulletins
Protecting Your Systems




Most of the measures you’d take to protect system and data integrity
against random hardware failures or user error are also effective
against network attacks, viruses and other malicious code.
The other basic measures are fairly simple.
–

Shut off services you don’t need. They may be vulnerable to attack,
attacks may be discovered at a later date, or they may require careful
configuration to be secured.
– Understand the services you do need. Configure them properly and keep
up to date with patches.
– Keep yourself informed about security issues with the OS and applications
you use.
– Don’t trust your system logs, they are the first thing an attacker will
modify if your system is compromised
Your role as a computer user


Guard against malicious code in email
– Don’t open attachments unless you are sure they are safe
– Don’t trust who email is from
– Updated and enabled virus signatures





Guard against malicious code from web browsing
Watch out for social engineering (obtaining passwords or entry to your
computer through personal rather than technical interaction)
Obey Central Authentication Policy (Kerberos)
– Don’t run network services (login or read write ftp) unless they demand
Kerberos authentication
– Treat your kerberos password as a sacred object (never expose it over the
network)



Promptly report potential computer security incidents
– X2345 or computer_security@fnal.gov
– Follow FCIRT instructions during incidents (especially about keeping
infected machines off the network and preserving the status of an infected
machine for expert investigation)
Other Computing Policy Issues
 Data

backup
 Incidental use
 Privacy
 Offensive material
 Licensing
Data Backup Policy - Users
– Users (data owners) responsible for
determining:
• What data requires protection;
• How destroyed data would be recovered, if needed;
• Coordinating backup plan w/ sysadmins;
– or doing their own backups;

• If the backup is done for you it might be worth
occasionally checking that you can really retrieve
the data
Incidental Computer Usage
 Fermilab

permits some non business use of
lab computers
 Guidelines are at
http://security.fnal.gov/ProperUse.htm
Activities to Avoid


Large grey area, but certain activities are “over the
line”;
–
–
–
–
–



Illegal;
Prohibited by Lab or DOE policy;
Embarrassment to the Laboratory;
Interfere w/ performance of job;
Consume excessive resources;

Example: P2P (peer to peer) software like Skype
and BitTorrent: not explicitly forbidden but very
easy to misuse!
Privacy of Email and Files
 Fermilab

normally respects the privacy of
electronic files and email;
 Employees and users are required to do
likewise;
 Certain exemptions for system managers
and computer security response;
 All others must have Director(ate) approval;
Privacy of Email and Files
 May

not use information in another
person’s files seen incidental to any activity
(legitimate or not) for any purpose w/o
either explicit permission of the owner or a
“reasonable belief the file was meant to be
accessed by others.”
– Whether or not group/world accessible;
– “Group” files implicitly may be used by the
group for the mission of the group;
Offensive Material on
computers
 Many

“computer security” complaints are

not;
 Material in a computer is like material in a
desk;
– With respect to both privacy and
appropriateness;
 This

is a line management, not computer
security, concern (except in egregious
cases).
Software Licensing
 Fermilab

is strongly committed to
respecting intellectual property rights
 Any use of unlicensed commercial software
is a direct violation of lab policy
Summary: User
Responsibilities
 Appropriate

use of computing resources
 Prompt incident reporting
 Proper Information handling (see Protecting
Personal Information course)
 Know how your data is backed up
 Receive computer security training
 Respect privacy of electronic information
Summary: System Admin
Responsibilities
 System

registration
 Virus protection, patching and configuration
management
 Access control: telnet an ftp type services
require kerberos authentication
 Do not offer any of the restricted central
services
Questions?
 nightwatch@fnal.gov

for questions about

security policy
 Computer_security@fnal.gov for reporting
security incident
 http://security.fnal.gov/

Weitere ähnliche Inhalte

Was ist angesagt?

The Truth About Viruses on Power Systems - Powertech
The Truth About Viruses on Power Systems - PowertechThe Truth About Viruses on Power Systems - Powertech
The Truth About Viruses on Power Systems - PowertechHelpSystems
 
Network Field Day 11 - Skyport Systems Presentation
Network Field Day 11 - Skyport Systems PresentationNetwork Field Day 11 - Skyport Systems Presentation
Network Field Day 11 - Skyport Systems PresentationDouglas Gourlay
 
Prueba de Presentacion
Prueba de PresentacionPrueba de Presentacion
Prueba de Presentacionrubychavez
 
Symantec Endpoint Protection Enterprise Edition Best Practices Guidelines
Symantec Endpoint Protection Enterprise Edition Best Practices GuidelinesSymantec Endpoint Protection Enterprise Edition Best Practices Guidelines
Symantec Endpoint Protection Enterprise Edition Best Practices GuidelinesSree Harsha Boyapati
 
Firewall Penetration Testing
Firewall Penetration TestingFirewall Penetration Testing
Firewall Penetration TestingChirag Jain
 
SYMANTEC ENDPOINT PROTECTION Advanced Monitoring and Reporting
SYMANTEC ENDPOINT PROTECTION Advanced Monitoring and ReportingSYMANTEC ENDPOINT PROTECTION Advanced Monitoring and Reporting
SYMANTEC ENDPOINT PROTECTION Advanced Monitoring and ReportingDsunte Wilson
 
3. security architecture and models
3. security architecture and models3. security architecture and models
3. security architecture and models7wounders
 
How Endpoint Security works ?
How Endpoint Security works ?How Endpoint Security works ?
How Endpoint Security works ?William hendric
 
Symantec Endpoint Protection
Symantec Endpoint ProtectionSymantec Endpoint Protection
Symantec Endpoint ProtectionMindRiver Group
 
5 ways you can strengthen and secure your network infrastructure with Firewal...
5 ways you can strengthen and secure your network infrastructure with Firewal...5 ways you can strengthen and secure your network infrastructure with Firewal...
5 ways you can strengthen and secure your network infrastructure with Firewal...ManageEngine, Zoho Corporation
 
Symantec AntiSpam Complete Overview (PowerPoint)
Symantec AntiSpam Complete Overview (PowerPoint)Symantec AntiSpam Complete Overview (PowerPoint)
Symantec AntiSpam Complete Overview (PowerPoint)webhostingguy
 
It's Your Move: The Changing Game of Endpoint Security
It's Your Move: The Changing Game of Endpoint SecurityIt's Your Move: The Changing Game of Endpoint Security
It's Your Move: The Changing Game of Endpoint SecurityLumension
 
Operating system vulnerability and control
Operating system vulnerability and control Operating system vulnerability and control
Operating system vulnerability and control أحلام انصارى
 

Was ist angesagt? (20)

The Truth About Viruses on Power Systems - Powertech
The Truth About Viruses on Power Systems - PowertechThe Truth About Viruses on Power Systems - Powertech
The Truth About Viruses on Power Systems - Powertech
 
Network Field Day 11 - Skyport Systems Presentation
Network Field Day 11 - Skyport Systems PresentationNetwork Field Day 11 - Skyport Systems Presentation
Network Field Day 11 - Skyport Systems Presentation
 
Prueba de Presentacion
Prueba de PresentacionPrueba de Presentacion
Prueba de Presentacion
 
ManageEngine Firewall Analyzer training
ManageEngine Firewall Analyzer trainingManageEngine Firewall Analyzer training
ManageEngine Firewall Analyzer training
 
Symantec Endpoint Protection Enterprise Edition Best Practices Guidelines
Symantec Endpoint Protection Enterprise Edition Best Practices GuidelinesSymantec Endpoint Protection Enterprise Edition Best Practices Guidelines
Symantec Endpoint Protection Enterprise Edition Best Practices Guidelines
 
5 benefits of OpManager
5 benefits of OpManager5 benefits of OpManager
5 benefits of OpManager
 
Firewall Penetration Testing
Firewall Penetration TestingFirewall Penetration Testing
Firewall Penetration Testing
 
Wl security-solutions
Wl security-solutionsWl security-solutions
Wl security-solutions
 
SYMANTEC ENDPOINT PROTECTION Advanced Monitoring and Reporting
SYMANTEC ENDPOINT PROTECTION Advanced Monitoring and ReportingSYMANTEC ENDPOINT PROTECTION Advanced Monitoring and Reporting
SYMANTEC ENDPOINT PROTECTION Advanced Monitoring and Reporting
 
3. security architecture and models
3. security architecture and models3. security architecture and models
3. security architecture and models
 
How Endpoint Security works ?
How Endpoint Security works ?How Endpoint Security works ?
How Endpoint Security works ?
 
Daddy Thwane. CV
Daddy Thwane. CVDaddy Thwane. CV
Daddy Thwane. CV
 
Incident response
Incident responseIncident response
Incident response
 
Symantec Endpoint Protection
Symantec Endpoint ProtectionSymantec Endpoint Protection
Symantec Endpoint Protection
 
5 ways you can strengthen and secure your network infrastructure with Firewal...
5 ways you can strengthen and secure your network infrastructure with Firewal...5 ways you can strengthen and secure your network infrastructure with Firewal...
5 ways you can strengthen and secure your network infrastructure with Firewal...
 
OpManager - Technical overview
OpManager - Technical overviewOpManager - Technical overview
OpManager - Technical overview
 
Symantec AntiSpam Complete Overview (PowerPoint)
Symantec AntiSpam Complete Overview (PowerPoint)Symantec AntiSpam Complete Overview (PowerPoint)
Symantec AntiSpam Complete Overview (PowerPoint)
 
It's Your Move: The Changing Game of Endpoint Security
It's Your Move: The Changing Game of Endpoint SecurityIt's Your Move: The Changing Game of Endpoint Security
It's Your Move: The Changing Game of Endpoint Security
 
Operating system vulnerability and control
Operating system vulnerability and control Operating system vulnerability and control
Operating system vulnerability and control
 
PLN9 Surveillance
PLN9 SurveillancePLN9 Surveillance
PLN9 Surveillance
 

Andere mochten auch

Innovation,knowledge management & productivity laxammal college,chennai jan 14
Innovation,knowledge management & productivity   laxammal college,chennai jan 14Innovation,knowledge management & productivity   laxammal college,chennai jan 14
Innovation,knowledge management & productivity laxammal college,chennai jan 14subramanian K
 
Optimal Security Response to Attacks on Open Science Grids Mine Altunay, Sven...
Optimal Security Response to Attacks on Open Science Grids Mine Altunay, Sven...Optimal Security Response to Attacks on Open Science Grids Mine Altunay, Sven...
Optimal Security Response to Attacks on Open Science Grids Mine Altunay, Sven...Information Security Awareness Group
 
Innovations in ict for mitigating environmental challenges
Innovations in ict for mitigating environmental challengesInnovations in ict for mitigating environmental challenges
Innovations in ict for mitigating environmental challengessubramanian K
 
Iob gm's lecture 7th jan 2014 GRC and corporate governance in Financial serv...
Iob gm's lecture 7th jan 2014  GRC and corporate governance in Financial serv...Iob gm's lecture 7th jan 2014  GRC and corporate governance in Financial serv...
Iob gm's lecture 7th jan 2014 GRC and corporate governance in Financial serv...subramanian K
 
M86 security predictions 2011
M86 security predictions 2011M86 security predictions 2011
M86 security predictions 2011subramanian K
 

Andere mochten auch (6)

Innovation,knowledge management & productivity laxammal college,chennai jan 14
Innovation,knowledge management & productivity   laxammal college,chennai jan 14Innovation,knowledge management & productivity   laxammal college,chennai jan 14
Innovation,knowledge management & productivity laxammal college,chennai jan 14
 
Optimal Security Response to Attacks on Open Science Grids Mine Altunay, Sven...
Optimal Security Response to Attacks on Open Science Grids Mine Altunay, Sven...Optimal Security Response to Attacks on Open Science Grids Mine Altunay, Sven...
Optimal Security Response to Attacks on Open Science Grids Mine Altunay, Sven...
 
Innovations in ict for mitigating environmental challenges
Innovations in ict for mitigating environmental challengesInnovations in ict for mitigating environmental challenges
Innovations in ict for mitigating environmental challenges
 
Unreached
UnreachedUnreached
Unreached
 
Iob gm's lecture 7th jan 2014 GRC and corporate governance in Financial serv...
Iob gm's lecture 7th jan 2014  GRC and corporate governance in Financial serv...Iob gm's lecture 7th jan 2014  GRC and corporate governance in Financial serv...
Iob gm's lecture 7th jan 2014 GRC and corporate governance in Financial serv...
 
M86 security predictions 2011
M86 security predictions 2011M86 security predictions 2011
M86 security predictions 2011
 

Ähnlich wie Andrey Bogdanov, Dmitry Khovratovich, and Christian Rechberger

Basic computersecurity
Basic computersecurityBasic computersecurity
Basic computersecurityHarshadWadkar
 
Basic Security Computere
Basic Security ComputereBasic Security Computere
Basic Security Computererashmi1234
 
0828 Windows Server 2008 新安全功能探討
0828 Windows Server 2008 新安全功能探討0828 Windows Server 2008 新安全功能探討
0828 Windows Server 2008 新安全功能探討Timothy Chen
 
Securing control systems v0.4
Securing control systems v0.4Securing control systems v0.4
Securing control systems v0.4CrispnCrunch
 
"Backoff" Malware: How to Know If You're Infected
"Backoff" Malware: How to Know If You're Infected"Backoff" Malware: How to Know If You're Infected
"Backoff" Malware: How to Know If You're InfectedTripwire
 
Security Holes and Vulnerabilities in Corporate Network_Pre Null Meet Kolkata
Security Holes and Vulnerabilities in Corporate Network_Pre Null Meet KolkataSecurity Holes and Vulnerabilities in Corporate Network_Pre Null Meet Kolkata
Security Holes and Vulnerabilities in Corporate Network_Pre Null Meet Kolkataamiyadutta
 
Introduction to Network and System Administration
Introduction to Network and System AdministrationIntroduction to Network and System Administration
Introduction to Network and System AdministrationDuressa Teshome
 
Security assignment (copy)
Security assignment (copy)Security assignment (copy)
Security assignment (copy)Amare Kassa
 
What is penetration testing and why is it important for a business to invest ...
What is penetration testing and why is it important for a business to invest ...What is penetration testing and why is it important for a business to invest ...
What is penetration testing and why is it important for a business to invest ...Alisha Henderson
 
Secure Financial Intelligence System
Secure Financial Intelligence SystemSecure Financial Intelligence System
Secure Financial Intelligence SystemJoseph Yosi Margalit
 
3 windowssecurity
3 windowssecurity3 windowssecurity
3 windowssecurityricharddxd
 
The 5 Layers of Security Testing by Alan Koch
The 5 Layers of Security Testing by Alan KochThe 5 Layers of Security Testing by Alan Koch
The 5 Layers of Security Testing by Alan KochQA or the Highway
 
The 5 Layers of Security Testing by Alan Koch
The 5 Layers of Security Testing by Alan KochThe 5 Layers of Security Testing by Alan Koch
The 5 Layers of Security Testing by Alan KochQA or the Highway
 
5 Things to Know about Safety and Security of Embedded Systems
5 Things to Know about Safety and Security of Embedded Systems5 Things to Know about Safety and Security of Embedded Systems
5 Things to Know about Safety and Security of Embedded SystemsMEN Micro
 
5 Things to Know about Safety and Security of Embedded Systems
5 Things to Know about Safety and Security of Embedded Systems5 Things to Know about Safety and Security of Embedded Systems
5 Things to Know about Safety and Security of Embedded SystemsMEN Mikro Elektronik GmbH
 
compTIA guide to get the CERTIFICATION EMERSON EDUARDO RODRIGUES
compTIA guide to get the CERTIFICATION EMERSON EDUARDO RODRIGUEScompTIA guide to get the CERTIFICATION EMERSON EDUARDO RODRIGUES
compTIA guide to get the CERTIFICATION EMERSON EDUARDO RODRIGUESEMERSON EDUARDO RODRIGUES
 
Network firewall function & benefits
Network firewall function & benefitsNetwork firewall function & benefits
Network firewall function & benefitsAnthony Daniel
 
Host Based Security Best Practices
Host Based Security Best PracticesHost Based Security Best Practices
Host Based Security Best Practiceswebhostingguy
 

Ähnlich wie Andrey Bogdanov, Dmitry Khovratovich, and Christian Rechberger (20)

Basic computersecurity
Basic computersecurityBasic computersecurity
Basic computersecurity
 
Basic Security Computere
Basic Security ComputereBasic Security Computere
Basic Security Computere
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
0828 Windows Server 2008 新安全功能探討
0828 Windows Server 2008 新安全功能探討0828 Windows Server 2008 新安全功能探討
0828 Windows Server 2008 新安全功能探討
 
Securing control systems v0.4
Securing control systems v0.4Securing control systems v0.4
Securing control systems v0.4
 
"Backoff" Malware: How to Know If You're Infected
"Backoff" Malware: How to Know If You're Infected"Backoff" Malware: How to Know If You're Infected
"Backoff" Malware: How to Know If You're Infected
 
Security Holes and Vulnerabilities in Corporate Network_Pre Null Meet Kolkata
Security Holes and Vulnerabilities in Corporate Network_Pre Null Meet KolkataSecurity Holes and Vulnerabilities in Corporate Network_Pre Null Meet Kolkata
Security Holes and Vulnerabilities in Corporate Network_Pre Null Meet Kolkata
 
Introduction to Network and System Administration
Introduction to Network and System AdministrationIntroduction to Network and System Administration
Introduction to Network and System Administration
 
Database security
Database securityDatabase security
Database security
 
Security assignment (copy)
Security assignment (copy)Security assignment (copy)
Security assignment (copy)
 
What is penetration testing and why is it important for a business to invest ...
What is penetration testing and why is it important for a business to invest ...What is penetration testing and why is it important for a business to invest ...
What is penetration testing and why is it important for a business to invest ...
 
Secure Financial Intelligence System
Secure Financial Intelligence SystemSecure Financial Intelligence System
Secure Financial Intelligence System
 
3 windowssecurity
3 windowssecurity3 windowssecurity
3 windowssecurity
 
The 5 Layers of Security Testing by Alan Koch
The 5 Layers of Security Testing by Alan KochThe 5 Layers of Security Testing by Alan Koch
The 5 Layers of Security Testing by Alan Koch
 
The 5 Layers of Security Testing by Alan Koch
The 5 Layers of Security Testing by Alan KochThe 5 Layers of Security Testing by Alan Koch
The 5 Layers of Security Testing by Alan Koch
 
5 Things to Know about Safety and Security of Embedded Systems
5 Things to Know about Safety and Security of Embedded Systems5 Things to Know about Safety and Security of Embedded Systems
5 Things to Know about Safety and Security of Embedded Systems
 
5 Things to Know about Safety and Security of Embedded Systems
5 Things to Know about Safety and Security of Embedded Systems5 Things to Know about Safety and Security of Embedded Systems
5 Things to Know about Safety and Security of Embedded Systems
 
compTIA guide to get the CERTIFICATION EMERSON EDUARDO RODRIGUES
compTIA guide to get the CERTIFICATION EMERSON EDUARDO RODRIGUEScompTIA guide to get the CERTIFICATION EMERSON EDUARDO RODRIGUES
compTIA guide to get the CERTIFICATION EMERSON EDUARDO RODRIGUES
 
Network firewall function & benefits
Network firewall function & benefitsNetwork firewall function & benefits
Network firewall function & benefits
 
Host Based Security Best Practices
Host Based Security Best PracticesHost Based Security Best Practices
Host Based Security Best Practices
 

Mehr von Information Security Awareness Group

Securing the Data in Big Data Security Analytics by Kevin Bowers, Nikos Trian...
Securing the Data in Big Data Security Analytics by Kevin Bowers, Nikos Trian...Securing the Data in Big Data Security Analytics by Kevin Bowers, Nikos Trian...
Securing the Data in Big Data Security Analytics by Kevin Bowers, Nikos Trian...Information Security Awareness Group
 
Mobile Device Security by Michael Gong, Jake Kreider, Chris Lugo, Kwame Osaf...
 Mobile Device Security by Michael Gong, Jake Kreider, Chris Lugo, Kwame Osaf... Mobile Device Security by Michael Gong, Jake Kreider, Chris Lugo, Kwame Osaf...
Mobile Device Security by Michael Gong, Jake Kreider, Chris Lugo, Kwame Osaf...Information Security Awareness Group
 
Mobile Devices – Using Without Losing Mark K. Mellis, Associate Information S...
Mobile Devices – Using Without Losing Mark K. Mellis, Associate Information S...Mobile Devices – Using Without Losing Mark K. Mellis, Associate Information S...
Mobile Devices – Using Without Losing Mark K. Mellis, Associate Information S...Information Security Awareness Group
 
Addressing Big Data Security Challenges: The Right Tools for Smart Protection...
Addressing Big Data Security Challenges: The Right Tools for Smart Protection...Addressing Big Data Security Challenges: The Right Tools for Smart Protection...
Addressing Big Data Security Challenges: The Right Tools for Smart Protection...Information Security Awareness Group
 
Big data analysis concepts and references by Cloud Security Alliance
Big data analysis concepts and references by Cloud Security AllianceBig data analysis concepts and references by Cloud Security Alliance
Big data analysis concepts and references by Cloud Security AllianceInformation Security Awareness Group
 
Authorization Policy in a PKI Environment Mary Thompson Srilekha Mudumbai A...
 Authorization Policy in a PKI Environment  Mary Thompson Srilekha Mudumbai A... Authorization Policy in a PKI Environment  Mary Thompson Srilekha Mudumbai A...
Authorization Policy in a PKI Environment Mary Thompson Srilekha Mudumbai A...Information Security Awareness Group
 
Introduction to distributed security concepts and public key infrastructure m...
Introduction to distributed security concepts and public key infrastructure m...Introduction to distributed security concepts and public key infrastructure m...
Introduction to distributed security concepts and public key infrastructure m...Information Security Awareness Group
 
OThe Open Science Grid: Concepts and Patterns Ruth Pordes, Mine Altunay, Bria...
OThe Open Science Grid: Concepts and Patterns Ruth Pordes, Mine Altunay, Bria...OThe Open Science Grid: Concepts and Patterns Ruth Pordes, Mine Altunay, Bria...
OThe Open Science Grid: Concepts and Patterns Ruth Pordes, Mine Altunay, Bria...Information Security Awareness Group
 

Mehr von Information Security Awareness Group (20)

Securing the Data in Big Data Security Analytics by Kevin Bowers, Nikos Trian...
Securing the Data in Big Data Security Analytics by Kevin Bowers, Nikos Trian...Securing the Data in Big Data Security Analytics by Kevin Bowers, Nikos Trian...
Securing the Data in Big Data Security Analytics by Kevin Bowers, Nikos Trian...
 
Mobile Device Security by Michael Gong, Jake Kreider, Chris Lugo, Kwame Osaf...
 Mobile Device Security by Michael Gong, Jake Kreider, Chris Lugo, Kwame Osaf... Mobile Device Security by Michael Gong, Jake Kreider, Chris Lugo, Kwame Osaf...
Mobile Device Security by Michael Gong, Jake Kreider, Chris Lugo, Kwame Osaf...
 
Mobile Devices – Using Without Losing Mark K. Mellis, Associate Information S...
Mobile Devices – Using Without Losing Mark K. Mellis, Associate Information S...Mobile Devices – Using Without Losing Mark K. Mellis, Associate Information S...
Mobile Devices – Using Without Losing Mark K. Mellis, Associate Information S...
 
IBM Security Strategy Intelligence,
IBM Security Strategy Intelligence,IBM Security Strategy Intelligence,
IBM Security Strategy Intelligence,
 
Addressing Big Data Security Challenges: The Right Tools for Smart Protection...
Addressing Big Data Security Challenges: The Right Tools for Smart Protection...Addressing Big Data Security Challenges: The Right Tools for Smart Protection...
Addressing Big Data Security Challenges: The Right Tools for Smart Protection...
 
Big data analysis concepts and references by Cloud Security Alliance
Big data analysis concepts and references by Cloud Security AllianceBig data analysis concepts and references by Cloud Security Alliance
Big data analysis concepts and references by Cloud Security Alliance
 
Big data analysis concepts and references
Big data analysis concepts and referencesBig data analysis concepts and references
Big data analysis concepts and references
 
PKI by Tim Polk
PKI by Tim PolkPKI by Tim Polk
PKI by Tim Polk
 
Authorization Policy in a PKI Environment Mary Thompson Srilekha Mudumbai A...
 Authorization Policy in a PKI Environment  Mary Thompson Srilekha Mudumbai A... Authorization Policy in a PKI Environment  Mary Thompson Srilekha Mudumbai A...
Authorization Policy in a PKI Environment Mary Thompson Srilekha Mudumbai A...
 
Pki by Steve Lamb
Pki by Steve LambPki by Steve Lamb
Pki by Steve Lamb
 
PKI by Gene Itkis
PKI by Gene ItkisPKI by Gene Itkis
PKI by Gene Itkis
 
Introduction to distributed security concepts and public key infrastructure m...
Introduction to distributed security concepts and public key infrastructure m...Introduction to distributed security concepts and public key infrastructure m...
Introduction to distributed security concepts and public key infrastructure m...
 
OThe Open Science Grid: Concepts and Patterns Ruth Pordes, Mine Altunay, Bria...
OThe Open Science Grid: Concepts and Patterns Ruth Pordes, Mine Altunay, Bria...OThe Open Science Grid: Concepts and Patterns Ruth Pordes, Mine Altunay, Bria...
OThe Open Science Grid: Concepts and Patterns Ruth Pordes, Mine Altunay, Bria...
 
THE OPEN SCIENCE GRID Ruth Pordes
THE OPEN SCIENCE GRID Ruth PordesTHE OPEN SCIENCE GRID Ruth Pordes
THE OPEN SCIENCE GRID Ruth Pordes
 
Open Science Grid security-atlas-t2 Bob Cowles
Open Science Grid security-atlas-t2 Bob CowlesOpen Science Grid security-atlas-t2 Bob Cowles
Open Science Grid security-atlas-t2 Bob Cowles
 
Security Open Science Grid Doug Olson
Security Open Science Grid Doug OlsonSecurity Open Science Grid Doug Olson
Security Open Science Grid Doug Olson
 
Open Science Group Security Kevin Hill
Open Science Group Security Kevin HillOpen Science Group Security Kevin Hill
Open Science Group Security Kevin Hill
 
Xrootd proxies Andrew Hanushevsky
Xrootd proxies Andrew HanushevskyXrootd proxies Andrew Hanushevsky
Xrootd proxies Andrew Hanushevsky
 
Privilege Project Vikram Andem
Privilege Project Vikram AndemPrivilege Project Vikram Andem
Privilege Project Vikram Andem
 
DES Block Cipher Hao Qi
DES Block Cipher Hao QiDES Block Cipher Hao Qi
DES Block Cipher Hao Qi
 

Kürzlich hochgeladen

How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17Celine George
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptxMaritesTamaniVerdade
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...Poonam Aher Patil
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...pradhanghanshyam7136
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxOn_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxPooja Bhuva
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentationcamerronhm
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfDr Vijay Vishwakarma
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxDr. Ravikiran H M Gowda
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfNirmal Dwivedi
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsMebane Rash
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...ZurliaSoop
 
Plant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptxPlant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptxUmeshTimilsina1
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibitjbellavia9
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxCeline George
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.pptRamjanShidvankar
 
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxannathomasp01
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxheathfieldcps1
 

Kürzlich hochgeladen (20)

How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxOn_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptx
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
Plant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptxPlant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptx
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 

Andrey Bogdanov, Dmitry Khovratovich, and Christian Rechberger

  • 1. Security Essentials for Fermilab System Administrators
  • 2. Outline   Why Computer Security Fermilab Strategy: – Integrated Computer Security – Defense in Depth   Your role and special responsibilities as a user and system administrator Other Computing Policy Issues – – – – – Data backup Incidental use Privacy Offensive material Licensing
  • 3. Why Computer Security  The Internet is a dangerous place – We are constantly being scanned for weak or vulnerable systems; new unpatched systems will be exploited within minutes.  Fermilab is an attractive target – High network bandwidth is useful for attackers who take over lab computers – Publicity value of compromising a .gov site – Attackers may not realize we have no information useful to them
  • 4. Why Computer Security - 2  We need to protect – Our data – Our ability to use our computers (denial of service attacks) – Our reputation with DOE, Congress and the general public  Major sources of danger – Running malicious code on your machine due to system or application vulnerabilities or improper user actions – Carrying infected machines (laptops) in from off site
  • 5. FNAL Strategy   Integrated Security Management Defense in Depth – – – – – – – Perimeter Controls and auto blocking Mail gateway virus scanning Central Authentication (Kerberos) Major Applications with enhanced security concerns Patching and configuration management Critical vulnerabilities Prompt response to computer security incidents (FCIRT) – Intelligent and informed user community
  • 6. Integrated Security Management     Computer Security is not an add-on or something external, it is part and parcel of everything you do with computers (analogy with ES&H) Not “one-size-fits-all”, but appropriate for the needs and vulnerabilities of each system In most cases, it is simply common sense + a little information and care Each Division/Section or large experiment has a GCSC (General Computer Security Coordinator) who acts as liaison with the Computer Security Team in disseminating information and dealing with incidents; see http://security.fnal.gov/ for an up to date list
  • 7. Perimeter Controls  Certain protocols are blocked at the site border (email to anything other than lab mail servers; web to any but registered web servers; other frequently exploited services)  Temporary (automatic) blocks are imposed on incoming or outgoing traffic that appears similar to hacking activity; these blocks are released when the activity ceases (things like MySpace and Skype will trigger autoblocker unless properly configured)
  • 8. Central Authentication      All use of lab computing services requires central authentication Avoid disclosure of passwords on the network No network services (logon or read/write ftp) visible on the general internet can be offered with out requiring strongest authentication, currently Kerberos (unless a formal exemption is applied for and granted) Kerberos provides a single sign in, minimizing use of multiple passwords for different systems Lab systems are constantly scanned for violations of this policy
  • 9. Major applications  Defined as “critical to the mission of the Laboratory”, i.e. disruption may have major impact on Laboratory operations; these require moderate level security controls (as opposed to the lab baseline low level controls) – Most things do not fall in this category;   Special (more stringent) rules & procedures apply; each MA has its own security plan with enhanced and compensatory security controls beyond the baseline security controls. (Some “Minor Applications” will also have their own security plans.) You’ll know if you’re in this category;
  • 10. Grid Security Training  If you are: - a system administrator of systems that accepts grid jobs (generally jobs that are authenticated by credentials other than standard Fermilab Kerberos credentials); or - a system administrator of one of the associated systems that provides support for the Fermi Grid infrastructure (such as GUMS and VOMS servers); or - a developer of grid middleware software then in addition to this course you require the training course entitled "Security Essentials for Grid System Administrators” which is available both in face to face sessions and online.  If you are a user of grid computing resources you require the training course about PKI Authentication
  • 11. Patching and Configuration Management   Baseline configurations exist for each major operating system (Windows, linux, MAC) All systems must meet the baseline requirements and be regularly patched (in particular running an up-to-date supported version of the operating system) UNLESS: – A documented case is made as to why the older OS version cannot be upgraded – Documentation exists to demonstrate that the system is patched and managed a securely as baseline systems – All non essential services (such as web servers) are turned off   All systems with Windows file systems must run anti virus You as a system administrator are responsible for configuration and patching!
  • 12. Critical Vulnerabilities and Vulnerability Scanning    Certain security vulnerabilities are declared critical when they are (or are about to) being actively exploited and represent a clear and present danger Upon notification of a critical vulnerability, systems must be patched by a given date or they will be blocked from network access This network block remains until remediation of the vulnerability is reported to the TISSUE security issue tracking system (as are blocks imposed for other security policy violations)
  • 13. Computer Security Incidents  Mandatory incident reporting; – Report all suspicious activity: • If urgent to FCC Service Desk, x2345, 24x7; • Or to system manager (if immediately available); • Non-urgent to computer_security@fnal.gov; – Incidents investigated by Fermi Computer Incident Response Team (FCIRT); – Not to be discussed!
  • 14. FCIRT (Fermi Computer Security Incident Response Team)        Security experts drawn from throughout the lab Investigate (“triage”) initial reports; Coordinate investigation overall; Work with local system managers; Call in technical experts; May take control of affected systems; Maintain confidentiality;
  • 15. Prohibited Activities  “Blatant disregard” of computer security; – First time perhaps only warning, repeat offense disciplinary action;  Unauthorized or malicious actions; – Damage of data, unauthorized use of accounts, denial of service, etc., are forbidden;  Unethical behavior; – Same standards as for non-computer activities;  Restricted central services; – May only be provided by approved service owners;  Security & cracker tools; – Possession (& use) must be authorized;  See http://security.fnal.gov/policies/cpolicy.html
  • 16. Mandatory System Manager Registration  System managers must be registered with FCSC  Go to http://security.fnal.gov and click on “verify your node registration” to see who is registered as sysadmin for your system  See: http://www.miscomp.fnal.gov/sysadmindb to make changes in registration (you need a KCA certificate)
  • 17. Your role as a user and system administrator   You have a special role as sysadmin of 3 or more systems, a major application, or a central server. Sysadmins are on the “front line” of computer security: “Fermilab’s continuing policy has been to put its first line of defense at the individual responsible for the data and the local system manager.”  Three roles for a sys admin: – System manager (configure system, remove unneeded services, apply patches promptly); – examples for users; – vigilant observers of system (and sometimes user) behavior   Sysadmins are expected to communicate computer security guidelines and policies to the users of systems they administer; Most important: know how to tell what services are running on your desktop, turn off those not needed, know where you are getting your patches from (FERMI domain, Patchlink, yum, Microsoft, …)
  • 18. Role of sysadmins  Manage your systems sensibly, remaining aware of computer security while conducting everyday business  Advise and help users  Keep your eyes open  Report potential incidents to FCIRT  Act on relevant bulletins
  • 19. Protecting Your Systems   Most of the measures you’d take to protect system and data integrity against random hardware failures or user error are also effective against network attacks, viruses and other malicious code. The other basic measures are fairly simple. – Shut off services you don’t need. They may be vulnerable to attack, attacks may be discovered at a later date, or they may require careful configuration to be secured. – Understand the services you do need. Configure them properly and keep up to date with patches. – Keep yourself informed about security issues with the OS and applications you use. – Don’t trust your system logs, they are the first thing an attacker will modify if your system is compromised
  • 20. Your role as a computer user  Guard against malicious code in email – Don’t open attachments unless you are sure they are safe – Don’t trust who email is from – Updated and enabled virus signatures    Guard against malicious code from web browsing Watch out for social engineering (obtaining passwords or entry to your computer through personal rather than technical interaction) Obey Central Authentication Policy (Kerberos) – Don’t run network services (login or read write ftp) unless they demand Kerberos authentication – Treat your kerberos password as a sacred object (never expose it over the network)  Promptly report potential computer security incidents – X2345 or computer_security@fnal.gov – Follow FCIRT instructions during incidents (especially about keeping infected machines off the network and preserving the status of an infected machine for expert investigation)
  • 21. Other Computing Policy Issues  Data backup  Incidental use  Privacy  Offensive material  Licensing
  • 22. Data Backup Policy - Users – Users (data owners) responsible for determining: • What data requires protection; • How destroyed data would be recovered, if needed; • Coordinating backup plan w/ sysadmins; – or doing their own backups; • If the backup is done for you it might be worth occasionally checking that you can really retrieve the data
  • 23. Incidental Computer Usage  Fermilab permits some non business use of lab computers  Guidelines are at http://security.fnal.gov/ProperUse.htm
  • 24. Activities to Avoid  Large grey area, but certain activities are “over the line”; – – – – –  Illegal; Prohibited by Lab or DOE policy; Embarrassment to the Laboratory; Interfere w/ performance of job; Consume excessive resources; Example: P2P (peer to peer) software like Skype and BitTorrent: not explicitly forbidden but very easy to misuse!
  • 25. Privacy of Email and Files  Fermilab normally respects the privacy of electronic files and email;  Employees and users are required to do likewise;  Certain exemptions for system managers and computer security response;  All others must have Director(ate) approval;
  • 26. Privacy of Email and Files  May not use information in another person’s files seen incidental to any activity (legitimate or not) for any purpose w/o either explicit permission of the owner or a “reasonable belief the file was meant to be accessed by others.” – Whether or not group/world accessible; – “Group” files implicitly may be used by the group for the mission of the group;
  • 27. Offensive Material on computers  Many “computer security” complaints are not;  Material in a computer is like material in a desk; – With respect to both privacy and appropriateness;  This is a line management, not computer security, concern (except in egregious cases).
  • 28. Software Licensing  Fermilab is strongly committed to respecting intellectual property rights  Any use of unlicensed commercial software is a direct violation of lab policy
  • 29. Summary: User Responsibilities  Appropriate use of computing resources  Prompt incident reporting  Proper Information handling (see Protecting Personal Information course)  Know how your data is backed up  Receive computer security training  Respect privacy of electronic information
  • 30. Summary: System Admin Responsibilities  System registration  Virus protection, patching and configuration management  Access control: telnet an ftp type services require kerberos authentication  Do not offer any of the restricted central services
  • 31. Questions?  nightwatch@fnal.gov for questions about security policy  Computer_security@fnal.gov for reporting security incident  http://security.fnal.gov/