ggf fall 2004 brussels, belgium september 20th, 2004 james marsteller pittsburgh supercomptuing...

18
GGF Fall 2004 Brussels, Belgium September 20th, 2004 James Marsteller Pittsburgh Supercomptuing Center [email protected]

Upload: spencer-hunt

Post on 31-Dec-2015

216 views

Category:

Documents


4 download

TRANSCRIPT

Page 1: GGF Fall 2004 Brussels, Belgium September 20th, 2004 James Marsteller Pittsburgh Supercomptuing Center Jam@psc.edu

GGF Fall 2004

Brussels, Belgium September 20th, 2004

James MarstellerPittsburgh Supercomptuing Center

[email protected]

Page 2: GGF Fall 2004 Brussels, Belgium September 20th, 2004 James Marsteller Pittsburgh Supercomptuing Center Jam@psc.edu

TeraGrid Security WorkGroup

• WG Charter Submitted To Executive Council Dec ‘03

• Weekly Meetings

• Initial SecWG Efforts:

– TG / E-Science SC03 Demo (Foreign Certificate Authority Acceptance Policy)

– SSH Implementation (Version & Password Recommendations)

– Site Security Points Of Contact• Security Officers & Incident Response Contacts

Page 3: GGF Fall 2004 Brussels, Belgium September 20th, 2004 James Marsteller Pittsburgh Supercomptuing Center Jam@psc.edu

TeraGrid Security WorkGroup

• Jan 9th 2004 - First TG Security Event– TG Node was compromised– Focus of the TG Security WG is Response– Security Point Of Contact List Was First

Step– NOT TG CENTRIC!

• So What Did We Do????

Page 4: GGF Fall 2004 Brussels, Belgium September 20th, 2004 James Marsteller Pittsburgh Supercomptuing Center Jam@psc.edu

Responding & Communicating

Events• Established Security “hotline”• Response “Playbook” Developed• Incident Mailing List• Encrypted Communications• Coordinated Evidence Gathering• Weekly “Response” Calls

Page 5: GGF Fall 2004 Brussels, Belgium September 20th, 2004 James Marsteller Pittsburgh Supercomptuing Center Jam@psc.edu

Identifying, Responding & Communicating

Events• Established Security “hotline”

– 24/7 Reservation less Conference #– Any Site Can Initiate– Only Known To Response Personnel– 800 Number & International Access

Page 6: GGF Fall 2004 Brussels, Belgium September 20th, 2004 James Marsteller Pittsburgh Supercomptuing Center Jam@psc.edu

Identifying, Responding & Communicating

Events• Response Playbook

– Who/How To Contact Methodology• Initial Responders• Secondary Responders• Help Desk Staff

– How to Respond to Event– PR Guidelines– 800 Number & International Access

Page 7: GGF Fall 2004 Brussels, Belgium September 20th, 2004 James Marsteller Pittsburgh Supercomptuing Center Jam@psc.edu

Identifying, Responding & Communicating

Events• Incident Reporting Guidelines Example:

• How much time (in person-hours) did staff at your site spend dealing with the incident?

• How were you notified?

• What steps did you take to investigate at your site to determine if there was a compromised account or system?

• What did you determine?

• If there was a compromise:

What damage was done?

What steps did you take to respond/recover?

Page 8: GGF Fall 2004 Brussels, Belgium September 20th, 2004 James Marsteller Pittsburgh Supercomptuing Center Jam@psc.edu

Identifying, Responding & Communicating

Events• Incident Mailing List

– Used To Alert TG Staff Of Incident

– Subscribed Response Staff

– Triggers Help Desk/Pagers/Cell Phones

Page 9: GGF Fall 2004 Brussels, Belgium September 20th, 2004 James Marsteller Pittsburgh Supercomptuing Center Jam@psc.edu

Encrypted Communications

• PGP Key Signing

• Shared Password for Email Communications (Changes Frequently)

• Encrypted Website To Archive Critical Information

• Encrypted Communications Are VERY IMPORTANT!

Page 10: GGF Fall 2004 Brussels, Belgium September 20th, 2004 James Marsteller Pittsburgh Supercomptuing Center Jam@psc.edu

Coordinated Evidence Gathering

• Playbook Outlines Requirements:– Protecting “Chain Of Custody”– Proper Logging– Reliable Copies Of Process

Accounting– Established Communication Channel

with FBI– Level Of Effort Responding

• Staff Hours & Capitol

Page 11: GGF Fall 2004 Brussels, Belgium September 20th, 2004 James Marsteller Pittsburgh Supercomptuing Center Jam@psc.edu

Weekly Response Calls

• ‘Closed’ Participant List• Share Latest Attack Vectors• Honeypots, Non-TG News• Update On Current Investigations

Page 12: GGF Fall 2004 Brussels, Belgium September 20th, 2004 James Marsteller Pittsburgh Supercomptuing Center Jam@psc.edu

Lessons Learned:

What Did We Learn?

Page 13: GGF Fall 2004 Brussels, Belgium September 20th, 2004 James Marsteller Pittsburgh Supercomptuing Center Jam@psc.edu

Lessons Learned

• A Quick, Secure, Coordinated Response is Critical!– Shared Users Accounts & Passwords– Shared Authentication = Quick

Propagation – Separation Of Users and Admin

Accounts

Page 14: GGF Fall 2004 Brussels, Belgium September 20th, 2004 James Marsteller Pittsburgh Supercomptuing Center Jam@psc.edu

Lessons Learned

• Need A TG Security Baseline– Different Organizations, Different

Goals• Government, Higher Ed, Research • Service Requirement, Public Relations,

Privacy Reqs, Acceptable Use• How To Handle Non-TG Customers?• Different OS’s, Software and Hardware

Page 15: GGF Fall 2004 Brussels, Belgium September 20th, 2004 James Marsteller Pittsburgh Supercomptuing Center Jam@psc.edu

Lessons Learned

• How To Achieve A Security Baseline– Security Memorandum Of

Understanding (M.O.U.)• What is expected of each site• Communication of Events/Incidents• Confidentiality of others• Response Expectations• Site & TG Risk Assessment (FRAP)

Page 16: GGF Fall 2004 Brussels, Belgium September 20th, 2004 James Marsteller Pittsburgh Supercomptuing Center Jam@psc.edu

Lessons Learned

• How To Achieve A Security Baseline– Security Baseline Requirements

• Host• Network• Testing• Patching• Change Mgmt - Certification Process• Response• Physical Security• Incident Detection• Auditing

Page 17: GGF Fall 2004 Brussels, Belgium September 20th, 2004 James Marsteller Pittsburgh Supercomptuing Center Jam@psc.edu

Future Actions/Challenges

• Ensuring A Security Baseline• Uniform Compliance Auditing &

Reporting• Security Resources

– Personnel– Software/Hardware

• Maintaining Security In A Dynamic Distributed Environment