SlideShare ist ein Scribd-Unternehmen logo
1 von 16
Security, accessibility (508)Security, accessibility (508)
and change management -and change management -
What we've learned as managers and developersWhat we've learned as managers and developers
Linda Newman (newmanld@uc.edu),
Glen Horton (hortongn@uc.edu),
Thomas Scherz (scherztc@uc.edu)
2015-09-22
https://scholar.uc.edu
Change Management
at our institution is the
process of planning,
coordinating,
implementing and
monitoring changes
affecting any
production platform
within Information
Technology’s control.
Changes can be
anything from re-
routing cables to
deploying code.
Illustration from University of Cincinnati Information Technologies,
Change Management Process, Revised 10/1/14 BCT
Typical examples on the CAB agenda:
5144 – ESS – 11/28/14 – 4:00am – (Scheduled – Moderate Risk) PAPA - front door
router – Need to reboot PAPA to upgrade to newer code. It is equipped with
redundant supervisor cards, they will be rebooted separately to minimize any
interruption of service. Each card will take approximately 10 minutes to reboot.
Since they are redundant, user traffic should not be affected.
5132 – ESS – 11/29/14 – 8:00am – (Scheduled – Low Risk) bbservices database
and web service - We will be shutting down IIS and the MS SQL database so that
the SA group can get a good backup of the system. This will require downtime for
the sysop tool and course eval feed generator. I have verified with Lisa and Brenda
that this is ok with them. – 2 hours
5963 – ESS – 9/3/2015 – 8:00am – (Scheduled – Low Risk) Data Domain (DD990)
– Disable the 10.23.15.143 interface on DD990. This is currently configured as a 3
port LACP group and is no longer needed. All services have been converted to use
a 10Gb interface. This CM will also cover the removal of the physical cabling and
network configuration. No downtime required. – 1 hour
Before we submit a Change Request, we complete an assessment.
Security Level Assessment
SLA Attributes 1 2 3 4
Data Type Restricted Data Controlled Data Private Data Public Data
System/Service
Type
Restricted Web
Based System or
Application
Publicly Accessible
Web Based
System /
Application / Site
Services or Components
accessible via external
network
Services or Components
accessible only via internal
network
Change Type Major Modification
to core
components –
includes patches
and upgrades
Moderate to Minor
modifications to
core components
Modifications to UI
components that include
JavaScript or JQuery
modifications. Database
level modifications –
Restricted to
procedures/queries that
include
inserts/update/deletes
UI modifications restricted to
CSS and HTML changes.
Database level modifications
– Restricted to
procedures/queries focus
that export or produce data
views (no
inserts/update/deletes)
Users Affected Entire
Organization
One or More
Colleges
Select departments, units
and/or groups
Individual or Small Group
Security Risk Level Risk
4-8 High
9-12 Medium
13-16 Low
Any Medium or High risk will likely trigger a request to repeat our security scan.
This is challenging for
agile.
As one expert wrote
“formal change
management often
evolves into a change
prevention strategy on
the part of IT staff.”
(
http://www.drdobbs.com/architecture-and-design/discip
)
Photograph: Amelia’s Sad Face,
https://www.flickr.com/photos/donnieray/9436653177
licensed as
https://creativecommons.org/licenses/by/2.0/
All is NOT bleak.
•Our Quality Assurance team
developed enough confidence in
us to allow us to run the security
scan ourselves – probably the
only way we could get it done as
you will hear about shortly.
•We’re talking with the head of
Change Management and the
lead of the other agile project
about more pragmatic
approaches.
•We’re now moving on to
accessibility.
Photograph: Amelia’s Happy Day
https://www.flickr.com/photos/donnieray/9594141639/
licensed as https://creativecommons.org/licenses/by/2.0/
To better optimize our change management
process for agile, we are looking for help in
these areas:
•Inline security tools that can run when we
deploy code, much like Travis.
•Involvement of our QA and Information Security
staff in reviewing our actual code, not just
checking off the results of a software tool.
•Advice from you!
Security Scanning
Trustwave’s Hailstorm
Part of change management
zero harm score required for deploys
45,714 attacks over 14 hours
QA/Staging Environment
(matches production environment)
Hailstorm = extreme stress test
Fedora 3 memory leaks
more CPUs and RAM for Fedora/Solr
Hailstorm Requirements
Redirect all 500 errors to simple 404s
limit every passed parameter
no integer/buffer overflows
no XSS or blind SQL injections
Frustrations
one big queue
custom app traversals
attacks can vary with each run
deployments & scanning are too slow
frequent need to wipe data
What did Hailstorm find?
Types of Resolutions
Parameter Validation (Helpers):
def limit_param_length(parameter, length_limit)
render(:file => 'public/404.html', :status => 404, :layout => false) unless parameter.to_s.length < length_limit
end
Error Page Sanitizing
Request Handling (Middleware):
SANITIZE_ENV_KEYS = %w(
HTTP_REFERER
PATH_INFO
REQUEST_URI
REQUEST_PATH
QUERY_STRING
)
valid = URI.decode(string).force_encoding('UTF-8').valid_encoding?
Exception Trapping (Controllers):
unless Rails.application.config.consider_all_requests_local
rescue_from Exception, with: :render_404
rescue_from ActionController::RoutingError, with: :render_404
rescue_from ActionController::UnknownController, with: :render_404
rescue_from ActiveRecord::RecordNotFound, with: :render_404
end
Strategies Applied
?s?s
Summary of our code changes:
http://bit.ly/1Oi1sZd
Linda Newman (newmanld@uc.edu),
Glen Horton (hortongn@uc.edu),
Thomas Scherz (scherztc@uc.edu)
2015-09-22

Weitere ähnliche Inhalte

Was ist angesagt?

Solution scope
Solution scopeSolution scope
Solution scopeLimen Spot
 
System Center Endpoint Protection
System Center Endpoint ProtectionSystem Center Endpoint Protection
System Center Endpoint ProtectionScientia Groups
 
Automated Operating System Deployment Using SCCM 2012
Automated Operating System Deployment Using SCCM 2012Automated Operating System Deployment Using SCCM 2012
Automated Operating System Deployment Using SCCM 2012Abdelslam Elsobky
 
Nerc Version 3 vs Version5 changes
Nerc Version 3 vs Version5  changesNerc Version 3 vs Version5  changes
Nerc Version 3 vs Version5 changesKen R Anderson CD
 
Monitoring Clusters and Load Balancers
Monitoring Clusters and Load BalancersMonitoring Clusters and Load Balancers
Monitoring Clusters and Load BalancersPrince JabaKumar
 
Projects and Achievements at GosNIIAS - Victor Berenshteyn
Projects and Achievements at GosNIIAS - Victor BerenshteynProjects and Achievements at GosNIIAS - Victor Berenshteyn
Projects and Achievements at GosNIIAS - Victor BerenshteynVictor Berenshteyn
 
Performance management strategy
Performance management strategyPerformance management strategy
Performance management strategykatharine300
 
Microsoft System Center Configuration Manager 2012 R2 Installation
Microsoft System Center Configuration Manager 2012 R2 InstallationMicrosoft System Center Configuration Manager 2012 R2 Installation
Microsoft System Center Configuration Manager 2012 R2 InstallationShahab Al Yamin Chawdhury
 
Network Management
Network ManagementNetwork Management
Network ManagementLeo Thiha
 
Configuration Mgt Quick Start
Configuration Mgt Quick StartConfiguration Mgt Quick Start
Configuration Mgt Quick Startnivekeh
 
How temenos manages open source use, the easy way combined
How temenos manages open source use, the easy way combinedHow temenos manages open source use, the easy way combined
How temenos manages open source use, the easy way combinedWhiteSource
 
System Center Configuration Manager-The Most Popular System Center Component
System Center Configuration Manager-The Most Popular System Center Component System Center Configuration Manager-The Most Popular System Center Component
System Center Configuration Manager-The Most Popular System Center Component C/D/H Technology Consultants
 
ITCamp 2011 - Adrian Stoian - System Center Configuration Manager 2012
ITCamp 2011 - Adrian Stoian - System Center Configuration Manager 2012ITCamp 2011 - Adrian Stoian - System Center Configuration Manager 2012
ITCamp 2011 - Adrian Stoian - System Center Configuration Manager 2012ITCamp
 
End To End Service Management With Operations Manager 2007
End To End Service Management With Operations Manager 2007End To End Service Management With Operations Manager 2007
End To End Service Management With Operations Manager 2007Amit Gatenyo
 
Critical System Specification in Software Engineering SE17
Critical System Specification in Software Engineering SE17Critical System Specification in Software Engineering SE17
Critical System Specification in Software Engineering SE17koolkampus
 
Requirment anlaysis
Requirment anlaysisRequirment anlaysis
Requirment anlaysiscsk selva
 
System Center Configuration Manager 2012 Sneak Peek
System Center Configuration Manager 2012 Sneak PeekSystem Center Configuration Manager 2012 Sneak Peek
System Center Configuration Manager 2012 Sneak PeekC/D/H Technology Consultants
 
Consistent Regions in Specialized Toolkits for IBM InfoSphere Streams V4.0
Consistent Regions in Specialized Toolkits for IBM InfoSphere Streams V4.0Consistent Regions in Specialized Toolkits for IBM InfoSphere Streams V4.0
Consistent Regions in Specialized Toolkits for IBM InfoSphere Streams V4.0lisanl
 

Was ist angesagt? (20)

Solution scope
Solution scopeSolution scope
Solution scope
 
System Center Endpoint Protection
System Center Endpoint ProtectionSystem Center Endpoint Protection
System Center Endpoint Protection
 
Automated Operating System Deployment Using SCCM 2012
Automated Operating System Deployment Using SCCM 2012Automated Operating System Deployment Using SCCM 2012
Automated Operating System Deployment Using SCCM 2012
 
Nerc Version 3 vs Version5 changes
Nerc Version 3 vs Version5  changesNerc Version 3 vs Version5  changes
Nerc Version 3 vs Version5 changes
 
Monitoring Clusters and Load Balancers
Monitoring Clusters and Load BalancersMonitoring Clusters and Load Balancers
Monitoring Clusters and Load Balancers
 
Projects and Achievements at GosNIIAS - Victor Berenshteyn
Projects and Achievements at GosNIIAS - Victor BerenshteynProjects and Achievements at GosNIIAS - Victor Berenshteyn
Projects and Achievements at GosNIIAS - Victor Berenshteyn
 
Performance management strategy
Performance management strategyPerformance management strategy
Performance management strategy
 
Microsoft System Center Configuration Manager 2012 R2 Installation
Microsoft System Center Configuration Manager 2012 R2 InstallationMicrosoft System Center Configuration Manager 2012 R2 Installation
Microsoft System Center Configuration Manager 2012 R2 Installation
 
Network Management
Network ManagementNetwork Management
Network Management
 
Configuration Mgt Quick Start
Configuration Mgt Quick StartConfiguration Mgt Quick Start
Configuration Mgt Quick Start
 
How temenos manages open source use, the easy way combined
How temenos manages open source use, the easy way combinedHow temenos manages open source use, the easy way combined
How temenos manages open source use, the easy way combined
 
System Center Configuration Manager-The Most Popular System Center Component
System Center Configuration Manager-The Most Popular System Center Component System Center Configuration Manager-The Most Popular System Center Component
System Center Configuration Manager-The Most Popular System Center Component
 
ITCamp 2011 - Adrian Stoian - System Center Configuration Manager 2012
ITCamp 2011 - Adrian Stoian - System Center Configuration Manager 2012ITCamp 2011 - Adrian Stoian - System Center Configuration Manager 2012
ITCamp 2011 - Adrian Stoian - System Center Configuration Manager 2012
 
End To End Service Management With Operations Manager 2007
End To End Service Management With Operations Manager 2007End To End Service Management With Operations Manager 2007
End To End Service Management With Operations Manager 2007
 
Critical System Specification in Software Engineering SE17
Critical System Specification in Software Engineering SE17Critical System Specification in Software Engineering SE17
Critical System Specification in Software Engineering SE17
 
SCCM 2007 Presentation
SCCM 2007 PresentationSCCM 2007 Presentation
SCCM 2007 Presentation
 
Requirment anlaysis
Requirment anlaysisRequirment anlaysis
Requirment anlaysis
 
Socio technical system
Socio technical systemSocio technical system
Socio technical system
 
System Center Configuration Manager 2012 Sneak Peek
System Center Configuration Manager 2012 Sneak PeekSystem Center Configuration Manager 2012 Sneak Peek
System Center Configuration Manager 2012 Sneak Peek
 
Consistent Regions in Specialized Toolkits for IBM InfoSphere Streams V4.0
Consistent Regions in Specialized Toolkits for IBM InfoSphere Streams V4.0Consistent Regions in Specialized Toolkits for IBM InfoSphere Streams V4.0
Consistent Regions in Specialized Toolkits for IBM InfoSphere Streams V4.0
 

Andere mochten auch

Dewey_HahnLAAirPollutionArticle
Dewey_HahnLAAirPollutionArticleDewey_HahnLAAirPollutionArticle
Dewey_HahnLAAirPollutionArticleScott Dewey
 
Linux bonding
Linux bondingLinux bonding
Linux bondinghubugui
 
KCMSD Coust Service DRAFTv3
KCMSD Coust Service DRAFTv3KCMSD Coust Service DRAFTv3
KCMSD Coust Service DRAFTv3Andr Riley
 
无线4G的视频传输方案
无线4G的视频传输方案无线4G的视频传输方案
无线4G的视频传输方案hubugui
 
Accounting as a career .....power point
Accounting as a career .....power pointAccounting as a career .....power point
Accounting as a career .....power pointRaj Roy
 
HowJudgesDontThink
HowJudgesDontThinkHowJudgesDontThink
HowJudgesDontThinkScott Dewey
 
The Quest for Digital Preservation: Will Part of Math History Be Gone Forever?
The Quest for Digital Preservation: Will Part of Math History Be Gone Forever?The Quest for Digital Preservation: Will Part of Math History Be Gone Forever?
The Quest for Digital Preservation: Will Part of Math History Be Gone Forever?newmanld
 
The Quest for Digital Preservation - MathFest 2015 - Bibliography
The Quest for Digital Preservation - MathFest 2015 - BibliographyThe Quest for Digital Preservation - MathFest 2015 - Bibliography
The Quest for Digital Preservation - MathFest 2015 - Bibliographynewmanld
 
Taiwan culture
Taiwan cultureTaiwan culture
Taiwan cultureHT Tsai
 
机顶盒软件的坑
机顶盒软件的坑机顶盒软件的坑
机顶盒软件的坑hubugui
 
MPTCP学习
MPTCP学习MPTCP学习
MPTCP学习hubugui
 
Magazine myth busters infographic
Magazine myth busters infographicMagazine myth busters infographic
Magazine myth busters infographicBarry Allaway
 
Hyper Converged Systems
Hyper Converged Systems Hyper Converged Systems
Hyper Converged Systems Megan Salley
 
Wawasan nusantara sebagai geopolitik indonesia
Wawasan nusantara sebagai geopolitik indonesiaWawasan nusantara sebagai geopolitik indonesia
Wawasan nusantara sebagai geopolitik indonesiaSoviRahayu
 
Docker初识
Docker初识Docker初识
Docker初识hubugui
 

Andere mochten auch (17)

faisal resume 1
faisal resume 1faisal resume 1
faisal resume 1
 
Dewey_HahnLAAirPollutionArticle
Dewey_HahnLAAirPollutionArticleDewey_HahnLAAirPollutionArticle
Dewey_HahnLAAirPollutionArticle
 
Linux bonding
Linux bondingLinux bonding
Linux bonding
 
KCMSD Coust Service DRAFTv3
KCMSD Coust Service DRAFTv3KCMSD Coust Service DRAFTv3
KCMSD Coust Service DRAFTv3
 
无线4G的视频传输方案
无线4G的视频传输方案无线4G的视频传输方案
无线4G的视频传输方案
 
Accounting as a career .....power point
Accounting as a career .....power pointAccounting as a career .....power point
Accounting as a career .....power point
 
HowJudgesDontThink
HowJudgesDontThinkHowJudgesDontThink
HowJudgesDontThink
 
The Quest for Digital Preservation: Will Part of Math History Be Gone Forever?
The Quest for Digital Preservation: Will Part of Math History Be Gone Forever?The Quest for Digital Preservation: Will Part of Math History Be Gone Forever?
The Quest for Digital Preservation: Will Part of Math History Be Gone Forever?
 
The Quest for Digital Preservation - MathFest 2015 - Bibliography
The Quest for Digital Preservation - MathFest 2015 - BibliographyThe Quest for Digital Preservation - MathFest 2015 - Bibliography
The Quest for Digital Preservation - MathFest 2015 - Bibliography
 
Taiwan culture
Taiwan cultureTaiwan culture
Taiwan culture
 
机顶盒软件的坑
机顶盒软件的坑机顶盒软件的坑
机顶盒软件的坑
 
MPTCP学习
MPTCP学习MPTCP学习
MPTCP学习
 
Conclusiones gastritis
Conclusiones gastritisConclusiones gastritis
Conclusiones gastritis
 
Magazine myth busters infographic
Magazine myth busters infographicMagazine myth busters infographic
Magazine myth busters infographic
 
Hyper Converged Systems
Hyper Converged Systems Hyper Converged Systems
Hyper Converged Systems
 
Wawasan nusantara sebagai geopolitik indonesia
Wawasan nusantara sebagai geopolitik indonesiaWawasan nusantara sebagai geopolitik indonesia
Wawasan nusantara sebagai geopolitik indonesia
 
Docker初识
Docker初识Docker初识
Docker初识
 

Ähnlich wie Hydra connect2015 security-accessibility-changemanagement-final

Agile and continuous delivery – How IBM Watson Workspace is built
Agile and continuous delivery – How IBM Watson Workspace is builtAgile and continuous delivery – How IBM Watson Workspace is built
Agile and continuous delivery – How IBM Watson Workspace is builtVincent Burckhardt
 
Building Efficient Edge Nodes for Content Delivery Networks
Building Efficient Edge Nodes for Content Delivery NetworksBuilding Efficient Edge Nodes for Content Delivery Networks
Building Efficient Edge Nodes for Content Delivery NetworksRebekah Rodriguez
 
Acceleration_and_Security_draft_v2
Acceleration_and_Security_draft_v2Acceleration_and_Security_draft_v2
Acceleration_and_Security_draft_v2Srinivasa Addepalli
 
Platform Observability and Infrastructure Closed Loops
Platform Observability and Infrastructure Closed LoopsPlatform Observability and Infrastructure Closed Loops
Platform Observability and Infrastructure Closed LoopsLiz Warner
 
Toni McTygue's Resume 4p
Toni McTygue's Resume 4pToni McTygue's Resume 4p
Toni McTygue's Resume 4pToni Mctygue
 
IBM InterConnect 2013 Expert Integrated Systems Keynote: Sotiropoulos & Wieck
IBM InterConnect 2013 Expert Integrated Systems Keynote: Sotiropoulos & WieckIBM InterConnect 2013 Expert Integrated Systems Keynote: Sotiropoulos & Wieck
IBM InterConnect 2013 Expert Integrated Systems Keynote: Sotiropoulos & WieckIBM Events
 
MasterCapstoneV9
MasterCapstoneV9MasterCapstoneV9
MasterCapstoneV9Tracy Payne
 
Algo sec suite overview 2013 05
Algo sec suite overview 2013 05Algo sec suite overview 2013 05
Algo sec suite overview 2013 05hoanv
 
Cloud monitoring - An essential Platform Service
Cloud monitoring  - An essential Platform ServiceCloud monitoring  - An essential Platform Service
Cloud monitoring - An essential Platform ServiceSoumitra Bhattacharyya
 
The Network Fabric for Your Digital Transformation
The Network Fabric for Your Digital TransformationThe Network Fabric for Your Digital Transformation
The Network Fabric for Your Digital TransformationAmazon Web Services
 
Design and Deploy Secure Clouds for Financial Services Use Cases
Design and Deploy Secure Clouds for Financial Services Use CasesDesign and Deploy Secure Clouds for Financial Services Use Cases
Design and Deploy Secure Clouds for Financial Services Use CasesPLUMgrid
 
002 srikanth system &amp; network administrator 8+yrs
002 srikanth system &amp; network administrator 8+yrs002 srikanth system &amp; network administrator 8+yrs
002 srikanth system &amp; network administrator 8+yrsSREEKANTH Kama
 
DO5T17S_T5 Thur 430 GilesE_BR_20151114_012422
DO5T17S_T5 Thur 430 GilesE_BR_20151114_012422DO5T17S_T5 Thur 430 GilesE_BR_20151114_012422
DO5T17S_T5 Thur 430 GilesE_BR_20151114_012422Erik Giles
 
Migration & upgrades best practice upgrade pathways to emc documentum 7
Migration & upgrades   best practice upgrade pathways to emc documentum 7Migration & upgrades   best practice upgrade pathways to emc documentum 7
Migration & upgrades best practice upgrade pathways to emc documentum 7Haytham Ghandour
 
PLM World Conference 2007
PLM World Conference 2007PLM World Conference 2007
PLM World Conference 2007Matt Tremmel
 
Applying a Comprehensive, Automated Assurance Framework to Validate Cloud Rea...
Applying a Comprehensive, Automated Assurance Framework to Validate Cloud Rea...Applying a Comprehensive, Automated Assurance Framework to Validate Cloud Rea...
Applying a Comprehensive, Automated Assurance Framework to Validate Cloud Rea...Cognizant
 

Ähnlich wie Hydra connect2015 security-accessibility-changemanagement-final (20)

Agile and continuous delivery – How IBM Watson Workspace is built
Agile and continuous delivery – How IBM Watson Workspace is builtAgile and continuous delivery – How IBM Watson Workspace is built
Agile and continuous delivery – How IBM Watson Workspace is built
 
Building Efficient Edge Nodes for Content Delivery Networks
Building Efficient Edge Nodes for Content Delivery NetworksBuilding Efficient Edge Nodes for Content Delivery Networks
Building Efficient Edge Nodes for Content Delivery Networks
 
Acceleration_and_Security_draft_v2
Acceleration_and_Security_draft_v2Acceleration_and_Security_draft_v2
Acceleration_and_Security_draft_v2
 
Platform Observability and Infrastructure Closed Loops
Platform Observability and Infrastructure Closed LoopsPlatform Observability and Infrastructure Closed Loops
Platform Observability and Infrastructure Closed Loops
 
Yongsan presentation 3
Yongsan presentation 3Yongsan presentation 3
Yongsan presentation 3
 
Toni McTygue's Resume 4p
Toni McTygue's Resume 4pToni McTygue's Resume 4p
Toni McTygue's Resume 4p
 
IBM InterConnect 2013 Expert Integrated Systems Keynote: Sotiropoulos & Wieck
IBM InterConnect 2013 Expert Integrated Systems Keynote: Sotiropoulos & WieckIBM InterConnect 2013 Expert Integrated Systems Keynote: Sotiropoulos & Wieck
IBM InterConnect 2013 Expert Integrated Systems Keynote: Sotiropoulos & Wieck
 
MasterCapstoneV9
MasterCapstoneV9MasterCapstoneV9
MasterCapstoneV9
 
Jon shende fbcs citp q&a
Jon shende fbcs citp q&aJon shende fbcs citp q&a
Jon shende fbcs citp q&a
 
Algo sec suite overview 2013 05
Algo sec suite overview 2013 05Algo sec suite overview 2013 05
Algo sec suite overview 2013 05
 
Cloud monitoring - An essential Platform Service
Cloud monitoring  - An essential Platform ServiceCloud monitoring  - An essential Platform Service
Cloud monitoring - An essential Platform Service
 
The Network Fabric for Your Digital Transformation
The Network Fabric for Your Digital TransformationThe Network Fabric for Your Digital Transformation
The Network Fabric for Your Digital Transformation
 
Design and Deploy Secure Clouds for Financial Services Use Cases
Design and Deploy Secure Clouds for Financial Services Use CasesDesign and Deploy Secure Clouds for Financial Services Use Cases
Design and Deploy Secure Clouds for Financial Services Use Cases
 
002 srikanth system &amp; network administrator 8+yrs
002 srikanth system &amp; network administrator 8+yrs002 srikanth system &amp; network administrator 8+yrs
002 srikanth system &amp; network administrator 8+yrs
 
DO5T17S_T5 Thur 430 GilesE_BR_20151114_012422
DO5T17S_T5 Thur 430 GilesE_BR_20151114_012422DO5T17S_T5 Thur 430 GilesE_BR_20151114_012422
DO5T17S_T5 Thur 430 GilesE_BR_20151114_012422
 
Migration & upgrades best practice upgrade pathways to emc documentum 7
Migration & upgrades   best practice upgrade pathways to emc documentum 7Migration & upgrades   best practice upgrade pathways to emc documentum 7
Migration & upgrades best practice upgrade pathways to emc documentum 7
 
PLM World Conference 2007
PLM World Conference 2007PLM World Conference 2007
PLM World Conference 2007
 
Matthew Carlson Resume
Matthew Carlson ResumeMatthew Carlson Resume
Matthew Carlson Resume
 
Resume_Serma_Professional (2)
Resume_Serma_Professional (2)Resume_Serma_Professional (2)
Resume_Serma_Professional (2)
 
Applying a Comprehensive, Automated Assurance Framework to Validate Cloud Rea...
Applying a Comprehensive, Automated Assurance Framework to Validate Cloud Rea...Applying a Comprehensive, Automated Assurance Framework to Validate Cloud Rea...
Applying a Comprehensive, Automated Assurance Framework to Validate Cloud Rea...
 

Kürzlich hochgeladen

The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991RKavithamani
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docxPoojaSen20
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 

Kürzlich hochgeladen (20)

The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docx
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 

Hydra connect2015 security-accessibility-changemanagement-final

  • 1. Security, accessibility (508)Security, accessibility (508) and change management -and change management - What we've learned as managers and developersWhat we've learned as managers and developers Linda Newman (newmanld@uc.edu), Glen Horton (hortongn@uc.edu), Thomas Scherz (scherztc@uc.edu) 2015-09-22 https://scholar.uc.edu
  • 2. Change Management at our institution is the process of planning, coordinating, implementing and monitoring changes affecting any production platform within Information Technology’s control. Changes can be anything from re- routing cables to deploying code. Illustration from University of Cincinnati Information Technologies, Change Management Process, Revised 10/1/14 BCT
  • 3. Typical examples on the CAB agenda: 5144 – ESS – 11/28/14 – 4:00am – (Scheduled – Moderate Risk) PAPA - front door router – Need to reboot PAPA to upgrade to newer code. It is equipped with redundant supervisor cards, they will be rebooted separately to minimize any interruption of service. Each card will take approximately 10 minutes to reboot. Since they are redundant, user traffic should not be affected. 5132 – ESS – 11/29/14 – 8:00am – (Scheduled – Low Risk) bbservices database and web service - We will be shutting down IIS and the MS SQL database so that the SA group can get a good backup of the system. This will require downtime for the sysop tool and course eval feed generator. I have verified with Lisa and Brenda that this is ok with them. – 2 hours 5963 – ESS – 9/3/2015 – 8:00am – (Scheduled – Low Risk) Data Domain (DD990) – Disable the 10.23.15.143 interface on DD990. This is currently configured as a 3 port LACP group and is no longer needed. All services have been converted to use a 10Gb interface. This CM will also cover the removal of the physical cabling and network configuration. No downtime required. – 1 hour
  • 4. Before we submit a Change Request, we complete an assessment. Security Level Assessment SLA Attributes 1 2 3 4 Data Type Restricted Data Controlled Data Private Data Public Data System/Service Type Restricted Web Based System or Application Publicly Accessible Web Based System / Application / Site Services or Components accessible via external network Services or Components accessible only via internal network Change Type Major Modification to core components – includes patches and upgrades Moderate to Minor modifications to core components Modifications to UI components that include JavaScript or JQuery modifications. Database level modifications – Restricted to procedures/queries that include inserts/update/deletes UI modifications restricted to CSS and HTML changes. Database level modifications – Restricted to procedures/queries focus that export or produce data views (no inserts/update/deletes) Users Affected Entire Organization One or More Colleges Select departments, units and/or groups Individual or Small Group Security Risk Level Risk 4-8 High 9-12 Medium 13-16 Low Any Medium or High risk will likely trigger a request to repeat our security scan.
  • 5. This is challenging for agile. As one expert wrote “formal change management often evolves into a change prevention strategy on the part of IT staff.” ( http://www.drdobbs.com/architecture-and-design/discip ) Photograph: Amelia’s Sad Face, https://www.flickr.com/photos/donnieray/9436653177 licensed as https://creativecommons.org/licenses/by/2.0/
  • 6. All is NOT bleak. •Our Quality Assurance team developed enough confidence in us to allow us to run the security scan ourselves – probably the only way we could get it done as you will hear about shortly. •We’re talking with the head of Change Management and the lead of the other agile project about more pragmatic approaches. •We’re now moving on to accessibility. Photograph: Amelia’s Happy Day https://www.flickr.com/photos/donnieray/9594141639/ licensed as https://creativecommons.org/licenses/by/2.0/
  • 7. To better optimize our change management process for agile, we are looking for help in these areas: •Inline security tools that can run when we deploy code, much like Travis. •Involvement of our QA and Information Security staff in reviewing our actual code, not just checking off the results of a software tool. •Advice from you!
  • 8. Security Scanning Trustwave’s Hailstorm Part of change management zero harm score required for deploys 45,714 attacks over 14 hours
  • 9. QA/Staging Environment (matches production environment) Hailstorm = extreme stress test Fedora 3 memory leaks more CPUs and RAM for Fedora/Solr
  • 10. Hailstorm Requirements Redirect all 500 errors to simple 404s limit every passed parameter no integer/buffer overflows no XSS or blind SQL injections
  • 11. Frustrations one big queue custom app traversals attacks can vary with each run deployments & scanning are too slow frequent need to wipe data
  • 13.
  • 14. Types of Resolutions Parameter Validation (Helpers): def limit_param_length(parameter, length_limit) render(:file => 'public/404.html', :status => 404, :layout => false) unless parameter.to_s.length < length_limit end Error Page Sanitizing Request Handling (Middleware): SANITIZE_ENV_KEYS = %w( HTTP_REFERER PATH_INFO REQUEST_URI REQUEST_PATH QUERY_STRING ) valid = URI.decode(string).force_encoding('UTF-8').valid_encoding? Exception Trapping (Controllers): unless Rails.application.config.consider_all_requests_local rescue_from Exception, with: :render_404 rescue_from ActionController::RoutingError, with: :render_404 rescue_from ActionController::UnknownController, with: :render_404 rescue_from ActiveRecord::RecordNotFound, with: :render_404 end
  • 16. ?s?s Summary of our code changes: http://bit.ly/1Oi1sZd Linda Newman (newmanld@uc.edu), Glen Horton (hortongn@uc.edu), Thomas Scherz (scherztc@uc.edu) 2015-09-22

Hinweis der Redaktion

  1. We have two-week sprints. A change request procedure is followed every time we deploy. A Change Advisory Board (CAB) of 10-30 IT Managers approves every request. We were the first agile development project on our campus and are now one of two.
  2. Thankfully we are typically first on the agenda.
  3. With Beta or Early Adopters we usually assessed at a Low-Medium risk. In production we will usually assess at Medium-High risk with each (bi-weekly) deploy, triggering a repeat security scan, with a 4 to 7 day required lead-in time (14-21 days recommended). But our sprints are usually two weeks! We will talk next about the rigors of this security scan and the changes we’ve made to our Hydra application as a result. We may be able to optimize that to run in 5-7 days. We will need (without a change in these procedures) a 4th server environment dedicated to continuous scanning of all applications we deploy – an expensive proposition.
  4. Talk about IT vs Libraries
  5. Hailstorm created 1,500 objects (most embargoed) during scan Added CPU/RAM until Hailstorm could run all tests – 4 core, 8 gig ram Need a fourth environment just for QA scans Dev team member to help with environment tweaking
  6. Refactoring is needed
  7. Need to find a product to scan code Need to develop default data to scan
  8. Plug the poster!