19
Creating a Security Architecture Kim Milford, J.D., CISSP Information Security Manager University of Wisconsin [email protected] Copyright Kim Milford, 2003

Creating a Security Architecture Kim Milford, J.D., CISSP Information Security Manager University of Wisconsin [email protected] Copyright Kim

Embed Size (px)

Citation preview

Creating a Security Architecture

Kim Milford, J.D., CISSP

Information Security Manager

University of Wisconsin

[email protected] Kim Milford, 2003

Overview

• Background: Defining a Security Architecture

• Why we need A Security Architecture

• Models

• A Comprehensive Approach to Information Security

Background

• RFC 2401 (IPSec) Security Architecture:– Goal is to provide various security services for

traffic at the IP level

• ISC2:– The totality of security design for a system or

application

• IAA/PKI Standards– Federal Bridge PKI– Shibboleth

Background• CERT:

– Maintain a long-term view and invest in research toward systems and operational techniques that yield networks capable of surviving attacks while protecting sensitive data. In doing so, it is essential to seek fundamental technological solutions and to seek proactive, preventive approaches, not just reactive, curative approaches.

Why We Need A Security Architecture• Mandates

– FERPA – HIPAA– Gramm Leach Bliley Act– TEACH– National Strategy to Secure Cyberspace– DHHS proposed legislation to protect laboratories handling select

agent (42 CFR Part 73):• 73.11(a) “The security plan must be based on a systematic approach in which

threats are defined, vulnerabilities are examined, and risks associated with those vulnerabilities are mitigated with a security systems approach.”

• 73.11(b)”The plan must: (1) describe …cyber security

Why We Need A Security Architecture

To Protect:• Confidentiality• Integrity • Availability of IT Resources

From:• Environmental threats• Technical threats• Human threats

Why We Need A Security Architecture

Threats

Why We Need A Security ArchitectureThreats – Continued

Why We Need A Security Architecture

Threats - Continued

Incidents reported to BadgIRT

0

200

400

600

800

1000

1200

1999-2000 2000-2001 2001-2002

Year

Num

ber o

f inc

iden

ts

1999-2000

2000-2001

2001-2002

Why We Need A Security Architecture

Threats – Continued (2002 CSI/FBI Survey):

•90% of respondents detected computer security incidents in the past 12 months

•80% acknowledged financial losses due to computer security incidents

Why We Need A Security Architecture

Threats – Continued (2002 CSI/FBI Survey):

Internet Cited as a Point of Attack in CSI/FBI Annual Survey

20022001

2000 1999 19981997

1996

0

10

20

30

40

50

60

70

80

Year

% o

f R

esp

on

den

ts

Security Architecture: Models

Historical:

Security Architecture: Models

Security Architecture: Models

Security Architecture: Models

The building blocks of security…The building blocks of security…

POLICIES

VIRUS PROTECTION

PHYSICAL SECURITY

PROTECT YOUR

SERVERS

PROTECT YOUR PCs

DISASTER RECOVERY

EDUCATIONEDUCATION

INCIDENT HANDLING

FIREWALLS

Security Architecture: ModelsInterlocking Communities

Served by Interlocking Information Infrastructures

FII DII

Electronic Commerce Electronic Mail Electronic Data Interchange Electronic Funds Transfer File Transfer Information Search/Retrieval

NII

GII

Requiring

PROTECT DETECT RESPOND RECONSTITUTE

Private Citizen

Business Sector

State, Local Govt

Critical Public Safety

Federal Govt

Natl Security

Intel/DOD

Internatl

Basic Information Security Services * Data Integrity * Data Confidentiality * Transaction Non-Repudiation

* User Identification and Authentication * System Availability

Through trained system users, maintainers and developers

Security Architecture: Models

A Comprehensive Approach to Information Security

From theory to practice:

1. Perform risk assessment

2. Develop a comprehensive plan to information security

– Phased migration

3. Develop an architectural model– Get management's attention

– Get system developer’s attention

References

www.doit.wisc.edu/security

www.cert.org

Security Project Cookbook, The Burton Group

Nigel Willson, Dan Blum, 2002

www.gocsi.com (CSI/FBI survey)

[email protected]