salsa bits: a few things that the analysts aren't talking about

15
Salsa Bits: A few things that the analysts aren't talking about... December 2006

Upload: acton

Post on 17-Mar-2016

47 views

Category:

Documents


0 download

DESCRIPTION

Salsa Bits: A few things that the analysts aren't talking about. December 2006. What analysts are saying is important (and we agree). Protecting sensitive data Not just the enterprise data, but the researcher data Identity management - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: Salsa Bits: A few things that the analysts aren't talking about

Salsa Bits: A few things that the analysts aren't talking about...

December 2006

Page 2: Salsa Bits: A few things that the analysts aren't talking about

2

What analysts are saying is important (and we agree)

• Protecting sensitive data• Not just the enterprise data, but the researcher data

• Identity management• In higher-ed, there's a lot of business process and

policy issues as well as technology• Malware (viruses, worms, spyware, etc.)• Distributed denial of service attacks

Page 3: Salsa Bits: A few things that the analysts aren't talking about

3

What analysts haven't started to talk about yet...

• The strategic importance of and expanding reliance on DNS

• The value of sector-based security operations and the REN-ISAC

• {Spam, DDOS, etc} and its impact on the infrastructure

• Evolving firewall management strategies to accommodate advanced applications

• Federated identity and leveraging it for access control

Page 4: Salsa Bits: A few things that the analysts aren't talking about

4

Domain Name System (DNS)

• DNS is the foundational service of the network; no service works without it.

• DNS itself needs better security• Vulnerable to several attacks and can be exploited

for other attacks• Remedial steps (e.g. DNSSec) face critical

bootstrap and mass adoption value• DNS as the basis for many security enhancements• Spam control mechanisms will leverage it• Federated security services depend on it• EDUCAUSE oversees .edu; chance for higher-ed to

lead

Page 5: Salsa Bits: A few things that the analysts aren't talking about

5

Takeaway: Domain Name System (DNS)

• Make sure the campus DNS operations are adequately supported; check out www.dnsreport.com

• Campus DNS operations should plan to work with applications

• Make sure that you’re not part of the problem – filter outgoing spoofed traffic, don't operate open recursive servers, etc...

Page 6: Salsa Bits: A few things that the analysts aren't talking about

6

Sector-based security services

• Of the initial sector oriented security analysis centers, the best remaining one is the REN-ISAC

• New technical and advisory groups• Today, offers early warning services gleaned

from Abilene traffic, identification of botnets, interactions with DHS and vendors, exchanges with other cooperative security efforts

• Tomorrow, it could build better analytic tools, inter-realm security exchanges, and other community-based security services

Page 7: Salsa Bits: A few things that the analysts aren't talking about

7

Takeaway: Sector-based security

• Make sure your campus is plugged in:• To the REN-ISAC trust community – it is a

vehicle for sharing real time security information

• To the various lists that discuss sector security issues, e.g. the higher-ed mail admin list, the EDUCAUSE security list

• Understand that our distinctive requirements will require common security approaches

Page 8: Salsa Bits: A few things that the analysts aren't talking about

8

Attacks and their impacts on infrastructure

• IETF concerns at the amount of unwanted traffic…

• Chronic threats – e.g. spam, botnets, etc are dramatically up and more resistant to remedies

• Better tuned MS machines have significantly increased the DDOS potentials

• Stress the campus infrastructure – mail servers, spam filters, firewalls, etc.

Page 9: Salsa Bits: A few things that the analysts aren't talking about

9

Takeaway: Attacks and their impacts

• Harden the infrastructure• High capacity networking links should include

high capacity security mechanisms• New retention laws, rise of spam, etc. may

change the way we choose to communicate

Page 10: Salsa Bits: A few things that the analysts aren't talking about

10

Evolving perimeter defense strategies

• From the network perimeter to defense in depth

• The starbucks effect• The internal threats• Push the protection perimeter as close to the

edge as feasible• Need to deal with optical bypass • Need to be flexible for different requirements• Credit card requirements can factor in

Page 11: Salsa Bits: A few things that the analysts aren't talking about

11

Evolving perimeter defense tradeoffs

• Understand that perimeter defense security tools often involve tradeoffs• VPN – security and opacity• NAT – isolation and loss of collaboration• Firewalls and performance

• Additional perimeters increase the complexity of problem diagnosis

Page 12: Salsa Bits: A few things that the analysts aren't talking about

12

Takeaway: Evolving perimeter defense

• Be prepared for changes to accommodate team science. Trust-mediated transparency will leverage identity management

• Be aware that fundamental network architecture discussions are examining clouds of gated communities vs. a network utility• Mean time to diagnose and support implications

• Monitor, audit, non-repudiation• moving beyond forensics to situational awareness

and active management

Page 13: Salsa Bits: A few things that the analysts aren't talking about

13

Federated identity

• As touted, Identity Management is urgent and important

• Federated identity leverages institutional Identity Management in inter-institutional settings

• By itself federated identity can provide significant security value.• Enables flexible LOA's, improves privacy, etc.

• As a new layer of infrastructure, it can be leveraged to provide new security services• Improved guest access usability and accountability• Privilege management for virtual organizations

Page 14: Salsa Bits: A few things that the analysts aren't talking about

14

Takeaway: Federated Identity

• Make sure your campus is coming to grips with IdM• Business owners, data stewards, external constituency

services (alumni, facilities management, etc), central IT• Understand the policies, the state transitions and their

triggers, the privileges per state, etc• Check out the www.nmi-edit.org/ web site and CAMPS.

• Prepare for federation• Internal federations with medical schools, engineering

colleges, etc.• Install federating software, e.g. Shibboleth• Identify policy issues and groups to work on them

• Understand the value of strategic use of two factor authentication

Page 15: Salsa Bits: A few things that the analysts aren't talking about

15