it security for the lhcb experiment 3rd control system cyber-security workshop (cs)2/hep icalepcs...

18
IT Security for the LHCb experiment 3rd Control System Cyber-Security Workshop (CS)2/HEP ICALEPCS – Grenoble Enrico Bonaccorsi, (CERN) [email protected] Loic Brarda, (CERN) [email protected] Mohamed Chebbi, (CERN) [email protected] Niko Neufeld, (CERN) [email protected]

Upload: stephany-nash

Post on 31-Dec-2015

215 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: IT Security for the LHCb experiment 3rd Control System Cyber-Security Workshop (CS)2/HEP ICALEPCS – Grenoble Enrico Bonaccorsi, (CERN) enrico.bonaccorsi@cern.chenrico.bonaccorsi@cern.ch

IT Security for the LHCb experiment

3rd Control System Cyber-Security Workshop (CS)2/HEP

ICALEPCS – Grenoble

Enrico Bonaccorsi, (CERN) [email protected] Brarda, (CERN) [email protected]

Mohamed Chebbi, (CERN) [email protected] Neufeld, (CERN) [email protected]

Page 2: IT Security for the LHCb experiment 3rd Control System Cyber-Security Workshop (CS)2/HEP ICALEPCS – Grenoble Enrico Bonaccorsi, (CERN) enrico.bonaccorsi@cern.chenrico.bonaccorsi@cern.ch

2

Outline

• LHCb intro• IT Security – several point of view

o Security riskso Physical and host local security approach.o Protected perimetero Network security implementation

• Central Log System• Data Security• Log and data analysis

Enrico Bonaccorsi, Loic Brarda, Mohamed Chebbi, Niko Neufeld

Page 3: IT Security for the LHCb experiment 3rd Control System Cyber-Security Workshop (CS)2/HEP ICALEPCS – Grenoble Enrico Bonaccorsi, (CERN) enrico.bonaccorsi@cern.chenrico.bonaccorsi@cern.ch

3

LHCb• Completely isolated

networko Data acquisition systemo Experiment Control System

• Heterogeneus Enviromento Collaborationo 2000 Servers and embedded

systemso 200 Active userso Different vendorso Custom System “self-

developed“o Manageability VS strict

securityo Security and users impact

Enrico Bonaccorsi, Loic Brarda, Mohamed Chebbi, Niko Neufeld

Page 4: IT Security for the LHCb experiment 3rd Control System Cyber-Security Workshop (CS)2/HEP ICALEPCS – Grenoble Enrico Bonaccorsi, (CERN) enrico.bonaccorsi@cern.chenrico.bonaccorsi@cern.ch

4

IT Security several point of view

• Physical Security• Local Security• Network Local

Security• Network Security• Data Security

Enrico Bonaccorsi, Loic Brarda, Mohamed Chebbi, Niko Neufeld

• Local and Remote Access

• High Availability• Preemptive measures • External connectivity• Management of

Application and Operating Systems

• Industrial security

Page 5: IT Security for the LHCb experiment 3rd Control System Cyber-Security Workshop (CS)2/HEP ICALEPCS – Grenoble Enrico Bonaccorsi, (CERN) enrico.bonaccorsi@cern.chenrico.bonaccorsi@cern.ch

5

Security risks• Interruption in Data Acquisition• Unauthorized modification/destruction to data

and systems• Unauthorized disclosure of data• Denial of service

Enrico Bonaccorsi, Loic Brarda, Mohamed Chebbi, Niko Neufeld

Page 6: IT Security for the LHCb experiment 3rd Control System Cyber-Security Workshop (CS)2/HEP ICALEPCS – Grenoble Enrico Bonaccorsi, (CERN) enrico.bonaccorsi@cern.chenrico.bonaccorsi@cern.ch

6

Security risks (2)• Users Behavior

o Theft of authentication credentialso Lack of awareness, caralessness or negligenceo Unfair and fraudulent behavioro Human errors

• Attack and misconfigurationo Virus – Malware – Trojan – Backdoor – Rootkits - Worm – Hiding in encrypted

sessions - etco Sabotageo Unauthorized accesso Informationo Human errors

• Environmental o Theft of devices that contain datao Destructive events (earthquakes, fire, flood, etc)

• Intentional, accidental, due to negligenceo Human errors

Enrico Bonaccorsi, Loic Brarda, Mohamed Chebbi, Niko Neufeld

Page 7: IT Security for the LHCb experiment 3rd Control System Cyber-Security Workshop (CS)2/HEP ICALEPCS – Grenoble Enrico Bonaccorsi, (CERN) enrico.bonaccorsi@cern.chenrico.bonaccorsi@cern.ch

7

Security Policy• Security policies have been produced following

the CERN CNIC recommendations:o https://

edms.cern.ch/file/1062503/2/Security_Baseline_for_File_Hosting.pdfo https://edms.cern.ch/file/1062500/2/Security_Baseline_for_Servers.pdfo https://

edms.cern.ch/file/1062502/2/Security_Baseline_for_Web_Hosting.pdf

Page 8: IT Security for the LHCb experiment 3rd Control System Cyber-Security Workshop (CS)2/HEP ICALEPCS – Grenoble Enrico Bonaccorsi, (CERN) enrico.bonaccorsi@cern.chenrico.bonaccorsi@cern.ch

8

Physical and host local security approach

• Physical:o Authorization required to access Point 8o Biometric required to access the underground area

• Localo Private personal account for each LHCb user

• Few shared account are still in useo PAM/Domain Policies used to restrict access to critical servers between LHCb

groupso IPMI access protected by router ACLo Applications centrally managed by Quattor/System Center Deployment Serviceso No internet routing allowed except for few gateway servero Only WEB access granted through an HTTP proxy

Enrico Bonaccorsi, Loic Brarda, Mohamed Chebbi, Niko Neufeld

Page 9: IT Security for the LHCb experiment 3rd Control System Cyber-Security Workshop (CS)2/HEP ICALEPCS – Grenoble Enrico Bonaccorsi, (CERN) enrico.bonaccorsi@cern.chenrico.bonaccorsi@cern.ch

9

Inner networks

Enrico Bonaccorsi, Loic Brarda, Mohamed Chebbi, Niko Neufeld

• Traffic isolation using VLANs, 802.1q, Layer2 filtering and ACL

• LCG and TN accessible only from few hosts

• No internet connectivity

• Only LHCb laptop allowed

Page 10: IT Security for the LHCb experiment 3rd Control System Cyber-Security Workshop (CS)2/HEP ICALEPCS – Grenoble Enrico Bonaccorsi, (CERN) enrico.bonaccorsi@cern.chenrico.bonaccorsi@cern.ch

10

Network Security

implementation

• General public and log in services/ Terminal serviceso RDP windows

remote desktopso SSH gatewayso NX linux remote

desktopso Web services

• Network segmentation and trusted zoneso level of trust based

on three tiers the sensitivity of the data being processed

• Anomaly & Intrusion detectionEnrico Bonaccorsi, Loic Brarda, Mohamed Chebbi, Niko Neufeld

Page 11: IT Security for the LHCb experiment 3rd Control System Cyber-Security Workshop (CS)2/HEP ICALEPCS – Grenoble Enrico Bonaccorsi, (CERN) enrico.bonaccorsi@cern.chenrico.bonaccorsi@cern.ch

11

Central Log System• All the windows and Linux servers send their logs

to a clustered log server• High Availability granted by

o Active/Active two node cluster systemo Raid 1 on each cluster node for the local disko Filesystem replica over network between nodeso Backup on CASTOR

• Logs exported to the users by NFS

Enrico Bonaccorsi, Loic Brarda, Mohamed Chebbi, Niko Neufeld

Page 12: IT Security for the LHCb experiment 3rd Control System Cyber-Security Workshop (CS)2/HEP ICALEPCS – Grenoble Enrico Bonaccorsi, (CERN) enrico.bonaccorsi@cern.chenrico.bonaccorsi@cern.ch

12

Data Security• Shared filesystem

o served by a cluster of five nodes on redundant hardwareo High Availability granted by Cluster of NFS/SMB servers that export the

filesystem to the entire experimento Data protection:

• Short term based on different storage raid set using RSYNC for immediate user access (file deleted by mistake by the user, etc)

• Long Term based on tape using CASTOR for… ever? • Backup sent to CASTOR and stored on type

• Servers and Control PCso High availability granted by RAID 1

• SW RAID used when HW raid is not availableo Daily Backup based on Tivoli (Thanks to IT dep. )

Enrico Bonaccorsi, Loic Brarda, Mohamed Chebbi, Niko Neufeld

Page 13: IT Security for the LHCb experiment 3rd Control System Cyber-Security Workshop (CS)2/HEP ICALEPCS – Grenoble Enrico Bonaccorsi, (CERN) enrico.bonaccorsi@cern.chenrico.bonaccorsi@cern.ch

13

Network Intrusion/Anomaly Detection System

• Boundary networks traffic mirrored and analyzed

• ISO/IEC 18043:2006(E)Selection, deployment and operations of intrusion detection system

• Snort for NIDS• NTOP for Anomaly

Detection

Enrico Bonaccorsi, Loic Brarda, Mohamed Chebbi, Niko Neufeld

Page 14: IT Security for the LHCb experiment 3rd Control System Cyber-Security Workshop (CS)2/HEP ICALEPCS – Grenoble Enrico Bonaccorsi, (CERN) enrico.bonaccorsi@cern.chenrico.bonaccorsi@cern.ch

14

Performance

Enrico Bonaccorsi, Loic Brarda, Mohamed Chebbi, Niko Neufeld

Page 15: IT Security for the LHCb experiment 3rd Control System Cyber-Security Workshop (CS)2/HEP ICALEPCS – Grenoble Enrico Bonaccorsi, (CERN) enrico.bonaccorsi@cern.chenrico.bonaccorsi@cern.ch

15

Questions?

Enrico Bonaccorsi, Loic Brarda, Mohamed Chebbi, Niko Neufeld

Page 16: IT Security for the LHCb experiment 3rd Control System Cyber-Security Workshop (CS)2/HEP ICALEPCS – Grenoble Enrico Bonaccorsi, (CERN) enrico.bonaccorsi@cern.chenrico.bonaccorsi@cern.ch

16

Backup slide

Page 17: IT Security for the LHCb experiment 3rd Control System Cyber-Security Workshop (CS)2/HEP ICALEPCS – Grenoble Enrico Bonaccorsi, (CERN) enrico.bonaccorsi@cern.chenrico.bonaccorsi@cern.ch

Snort Log data AnalysisRaw logs generated:

Ntop – Suspiciuous (Syslog)Ntop – Others (pcap)Snort > Barnyard > Alerts (Syslog)Snort – Packets (pcap)

Barnyhard to offload output processingParsingVisual – Links GraphsCorrelation to crosscheck to exclude false positivesCentralized Analysis console is not strictly

necessary

Enrico Bonaccorsi, Loic Brarda, Mohamed Chebbi, Niko Neufeld

Page 18: IT Security for the LHCb experiment 3rd Control System Cyber-Security Workshop (CS)2/HEP ICALEPCS – Grenoble Enrico Bonaccorsi, (CERN) enrico.bonaccorsi@cern.chenrico.bonaccorsi@cern.ch

18