18
IT Security for the LHCb experiment 3rd Control System Cyber-Security Workshop (CS)2/HEP ICALEPCS – Grenoble Enrico Bonaccorsi, (CERN) [email protected] Loic Brarda, (CERN) [email protected] Mohamed Chebbi, (CERN) [email protected] Niko Neufeld, (CERN) [email protected]

Enrico Bonaccorsi , (CERN) [email protected] Loic Brarda , (CERN) [email protected]

  • Upload
    wyanet

  • View
    112

  • Download
    0

Embed Size (px)

DESCRIPTION

IT Security for the LHCb experiment 3rd Control System Cyber-Security Workshop (CS)2/HEP ICALEPCS – Grenoble. Enrico Bonaccorsi , (CERN) [email protected] Loic Brarda , (CERN) [email protected] Mohamed Chebbi , (CERN) [email protected] - PowerPoint PPT Presentation

Citation preview

Page 1: Enrico Bonaccorsi , (CERN)  enrico.bonaccorsi@cern.ch Loic Brarda , (CERN)  loic.brarda@cern.ch

IT Security for the LHCb experiment

3rd Control System Cyber-Security Workshop (CS)2/HEP

ICALEPCS – Grenoble

Enrico Bonaccorsi, (CERN) [email protected] Brarda, (CERN) [email protected]

Mohamed Chebbi, (CERN) [email protected] Neufeld, (CERN) [email protected]

Page 2: Enrico Bonaccorsi , (CERN)  enrico.bonaccorsi@cern.ch Loic Brarda , (CERN)  loic.brarda@cern.ch

2

Outline• LHCb intro• IT Security – several point of view

o Security riskso Physical and host local security approach.o Protected perimetero Network security implementation

• Central Log System• Data Security• Log and data analysis

Enrico Bonaccorsi, Loic Brarda, Mohamed Chebbi, Niko Neufeld

Page 3: Enrico Bonaccorsi , (CERN)  enrico.bonaccorsi@cern.ch Loic Brarda , (CERN)  loic.brarda@cern.ch

3

LHCb• Completely isolated

networko Data acquisition systemo Experiment Control System

• Heterogeneus Enviromento Collaborationo 2000 Servers and embedded

systemso 200 Active userso Different vendorso Custom System “self-

developed“o Manageability VS strict securityo Security and users impact

Enrico Bonaccorsi, Loic Brarda, Mohamed Chebbi, Niko Neufeld

Page 4: Enrico Bonaccorsi , (CERN)  enrico.bonaccorsi@cern.ch Loic Brarda , (CERN)  loic.brarda@cern.ch

4

IT Security several point of view

• Physical Security• Local Security• Network Local

Security• Network Security• Data Security

Enrico Bonaccorsi, Loic Brarda, Mohamed Chebbi, Niko Neufeld

• Local and Remote Access

• High Availability• Preemptive measures • External connectivity• Management of

Application and Operating Systems

• Industrial security

Page 5: Enrico Bonaccorsi , (CERN)  enrico.bonaccorsi@cern.ch Loic Brarda , (CERN)  loic.brarda@cern.ch

5

Security risks• Interruption in Data Acquisition• Unauthorized modification/destruction to data

and systems• Unauthorized disclosure of data• Denial of service

Enrico Bonaccorsi, Loic Brarda, Mohamed Chebbi, Niko Neufeld

Page 6: Enrico Bonaccorsi , (CERN)  enrico.bonaccorsi@cern.ch Loic Brarda , (CERN)  loic.brarda@cern.ch

6

Security risks (2)• Users Behavior

o Theft of authentication credentialso Lack of awareness, caralessness or negligenceo Unfair and fraudulent behavioro Human errors

• Attack and misconfigurationo Virus – Malware – Trojan – Backdoor – Rootkits - Worm – Hiding in encrypted sessions

- etco Sabotageo Unauthorized accesso Informationo Human errors

• Environmental o Theft of devices that contain datao Destructive events (earthquakes, fire, flood, etc)

• Intentional, accidental, due to negligenceo Human errors

Enrico Bonaccorsi, Loic Brarda, Mohamed Chebbi, Niko Neufeld

Page 7: Enrico Bonaccorsi , (CERN)  enrico.bonaccorsi@cern.ch Loic Brarda , (CERN)  loic.brarda@cern.ch

7

Security Policy• Security policies have been produced following

the CERN CNIC recommendations:o https://

edms.cern.ch/file/1062503/2/Security_Baseline_for_File_Hosting.pdfo https://edms.cern.ch/file/1062500/2/Security_Baseline_for_Servers.pdfo https://

edms.cern.ch/file/1062502/2/Security_Baseline_for_Web_Hosting.pdf

Page 8: Enrico Bonaccorsi , (CERN)  enrico.bonaccorsi@cern.ch Loic Brarda , (CERN)  loic.brarda@cern.ch

8

Physical and host local security approach

• Physical:o Authorization required to access Point 8o Biometric required to access the underground area

• Localo Private personal account for each LHCb user

• Few shared account are still in useo PAM/Domain Policies used to restrict access to critical servers between LHCb

groupso IPMI access protected by router ACLo Applications centrally managed by Quattor/System Center Deployment Serviceso No internet routing allowed except for few gateway servero Only WEB access granted through an HTTP proxy

Enrico Bonaccorsi, Loic Brarda, Mohamed Chebbi, Niko Neufeld

Page 9: Enrico Bonaccorsi , (CERN)  enrico.bonaccorsi@cern.ch Loic Brarda , (CERN)  loic.brarda@cern.ch

9

Inner networks

Enrico Bonaccorsi, Loic Brarda, Mohamed Chebbi, Niko Neufeld

• Traffic isolation using VLANs, 802.1q, Layer2 filtering and ACL

• LCG and TN accessible only from few hosts

• No internet connectivity

• Only LHCb laptop allowed

Page 10: Enrico Bonaccorsi , (CERN)  enrico.bonaccorsi@cern.ch Loic Brarda , (CERN)  loic.brarda@cern.ch

10

Network Security

implementation

• General public and log in services/ Terminal serviceso RDP windows

remote desktopso SSH gatewayso NX linux remote

desktopso Web services

• Network segmentation and trusted zoneso level of trust based

on three tiers the sensitivity of the data being processed

• Anomaly & Intrusion detectionEnrico Bonaccorsi, Loic Brarda, Mohamed Chebbi, Niko Neufeld

Page 11: Enrico Bonaccorsi , (CERN)  enrico.bonaccorsi@cern.ch Loic Brarda , (CERN)  loic.brarda@cern.ch

11

Central Log System• All the windows and Linux servers send their logs

to a clustered log server• High Availability granted by

o Active/Active two node cluster systemo Raid 1 on each cluster node for the local disko Filesystem replica over network between nodeso Backup on CASTOR

• Logs exported to the users by NFS

Enrico Bonaccorsi, Loic Brarda, Mohamed Chebbi, Niko Neufeld

Page 12: Enrico Bonaccorsi , (CERN)  enrico.bonaccorsi@cern.ch Loic Brarda , (CERN)  loic.brarda@cern.ch

12

Data Security• Shared filesystem

o served by a cluster of five nodes on redundant hardwareo High Availability granted by Cluster of NFS/SMB servers that export the

filesystem to the entire experimento Data protection:

• Short term based on different storage raid set using RSYNC for immediate user access (file deleted by mistake by the user, etc)

• Long Term based on tape using CASTOR for… ever? • Backup sent to CASTOR and stored on type

• Servers and Control PCso High availability granted by RAID 1

• SW RAID used when HW raid is not availableo Daily Backup based on Tivoli (Thanks to IT dep. )

Enrico Bonaccorsi, Loic Brarda, Mohamed Chebbi, Niko Neufeld

Page 13: Enrico Bonaccorsi , (CERN)  enrico.bonaccorsi@cern.ch Loic Brarda , (CERN)  loic.brarda@cern.ch

13

Network Intrusion/Anomaly Detection System

• Boundary networks traffic mirrored and analyzed

• ISO/IEC 18043:2006(E)Selection, deployment and operations of intrusion detection system

• Snort for NIDS• NTOP for Anomaly

Detection

Enrico Bonaccorsi, Loic Brarda, Mohamed Chebbi, Niko Neufeld

Page 14: Enrico Bonaccorsi , (CERN)  enrico.bonaccorsi@cern.ch Loic Brarda , (CERN)  loic.brarda@cern.ch

14

Performance

Enrico Bonaccorsi, Loic Brarda, Mohamed Chebbi, Niko Neufeld

Page 15: Enrico Bonaccorsi , (CERN)  enrico.bonaccorsi@cern.ch Loic Brarda , (CERN)  loic.brarda@cern.ch

15

Questions?

Enrico Bonaccorsi, Loic Brarda, Mohamed Chebbi, Niko Neufeld

Page 16: Enrico Bonaccorsi , (CERN)  enrico.bonaccorsi@cern.ch Loic Brarda , (CERN)  loic.brarda@cern.ch

16

Backup slide

Page 17: Enrico Bonaccorsi , (CERN)  enrico.bonaccorsi@cern.ch Loic Brarda , (CERN)  loic.brarda@cern.ch

Snort Log data AnalysisRaw logs generated:

Ntop – Suspiciuous (Syslog)Ntop – Others (pcap)Snort > Barnyard > Alerts (Syslog)Snort – Packets (pcap)

Barnyhard to offload output processingParsingVisual – Links GraphsCorrelation to crosscheck to exclude false positivesCentralized Analysis console is not strictly

necessary

Enrico Bonaccorsi, Loic Brarda, Mohamed Chebbi, Niko Neufeld

Page 18: Enrico Bonaccorsi , (CERN)  enrico.bonaccorsi@cern.ch Loic Brarda , (CERN)  loic.brarda@cern.ch

18