15
Information Technology (IT) and Cyber Security Overview Savannah River Operations Office (SROO) Office of Safeguards Security and Emergency Services (OSSES) Cyber and Information Technology Division (CITD)

Information Technology (IT) and Cyber Security Overview

  • Upload
    others

  • View
    1

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Information Technology (IT) and Cyber Security Overview

Information Technology (IT) and Cyber Security Overview

Savannah River Operations Office (SROO)Office of Safeguards Security and Emergency Services (OSSES)

Cyber and Information Technology Division (CITD)

Page 2: Information Technology (IT) and Cyber Security Overview

Topics

• Computing Environment Overview• SRS Tenants and Partners• IT Business Services• IT Infrastructure• End-User Computing Services• Telecommunications• Cyber Security

2

Page 3: Information Technology (IT) and Cyber Security Overview

Computing Environment Overview

• The SRS Computing environment is an enterprise level system that supports an estimated 11,000 computer users. Users conduct business utilizing a plethora of devices to include: desktops, laptops, thin clients, smartphones, tablets, and other specialty devices.

• SRS supports numerous system types to include: General Support Systems (GSS), Industrial Control Systems (ICS), and National Security Systems (NSS).– GSS is a generic term referring to a collection of standard IT systems that provide services

such as email, word processing, collaboration, and storage among other IT services.– ICS systems are a major part of the SRS mission. Our ICSs encompass other aspects of

industrial automation to include supervisory control and data acquisition (SCADA) systems, programmable logic controllers (PLCs), and distributed control systems (DCSs).

– NSS is a term used to refer to classified systems. They could be standalone or an isolated network of systems.

• The SRS Network Infrastructure spans much of the 310 square mile site, providing services to numerous buildings and facilities.

3

Page 4: Information Technology (IT) and Cyber Security Overview

4

• In addition to the Management and Operations (M&O) Contractor, SRS hosts several site tenants and partners. Tenants include:– Federal

• Department of Energy-Savannah River Operations Office (DOE-SROO)(landlord), National Nuclear Security Administration-Savannah River Field Office (NNSA-SRFO), and the United States Department of Agriculture (USDA) Forest Service

– Primary Contractors• Savannah River Remediations (SRR)-current Liquid Waste Processing Contractor• Parsons-current Salt Waste Processing Contractor• Battelle Savannah River Alliance (BSRA)-current Savannah River National Lab (SRNL) Contractor• Centerra-current Protective Force Contractor• S&K Logistics – DOE-SR Administrative Support• Cherokee Nation Security and Defense (CNSD) – DOE-SR Safety and Security Contractor• Creative IT Solutions (CITS) – DOE-SR IT and Cyber Security Support Contractor

– SRS also partner with the following organizations with concern for IT and cyber activities• Fort Gordon Cyber Protection Team-03 (CPT-03), Federal Bureau of Investigations (FBI), DOE-Inspector

General (IG), the University of Georgia (UGA) Savannah River Ecology Lab (SREL), as well as other DOE sites and developing partnerships with USC-Aiken and other educational institutions.

SRS Tenants and Partners

Page 5: Information Technology (IT) and Cyber Security Overview

5

IT Business Services

Page 6: Information Technology (IT) and Cyber Security Overview

6

• IT Strategic Planning– provides services such as an IT Governance Board, IT Architecture Support, IT Portfolio

Analysis, and Market Research• Capital Planning and Investment Control (CPIC)

– a decision-making process that ensures IT investments integrate strategic planning, budgeting, procurement, and management of IT in support of agency missions and business needs.

– Governed by DOE Order (DOE O) 200.1A, Information Technology Management• Business Management Systems (BMS)

– a collection of IT investments that provide core business functions such as enterprise resource planning, business intelligence (BI) or other related functions.

• Records Management– Classified Records Operations, Electronic Records, Media Destruction, Training,

Correspondence/Document Number Systems, Hardcopy storage/retrieval, Records Assessments, and Retention Reviews

IT Business Services

Page 7: Information Technology (IT) and Cyber Security Overview

7

• Document Control– Access requests– Image/Document Identification– Document Submittals

• Software Engineering and Development– Currently SRS has an application portfolio consisting of 224 applications (mobile and

desktop) directly supported at SRS and 12 vendor-supported applications– Common language types at SRS include; Oracle Forms, Lotus Notes, Java, C#, and .Net– Application and Database Services

• Commercial-off-the-Shelf (COTS) implementation and integration• Software consultations• Custom application development• Database services and consolidation• Website development

IT Business Services, continued…

Page 8: Information Technology (IT) and Cyber Security Overview

8

IT Infrastructure

Page 9: Information Technology (IT) and Cyber Security Overview

9

• SRS maintains two data centers– Primary and Backup– SRS also maintains a remote backup connection at another DOE field site– Currently developing a cloud management service utilizing Microsoft Azure– Data centers house over 900 servers consisting of physical and virtual machines

• Server OS includes Windows, Oracle, and Linux variations– Maintains over 1.2 petabytes within the Storage Area Network (SAN)

• The Network– Over 900 Routers and switches utilizing both fiber optic and copper wiring– Over 600 wireless access points– Remote Access Capabilities

• Cisco VPN and Citrix

IT Infrastructure

Page 10: Information Technology (IT) and Cyber Security Overview

10

End-User Computing Services

Page 11: Information Technology (IT) and Cyber Security Overview

11

• SRS supports several end-user devices to include; desktops, laptops, thin clients, iPhones, iPads, landlines, long/short range radios, and pagers

• SRS has a remote access capability that can support over 5000 concurrent users utilizing Citrix Remote Access or Cisco VPN

• The SRS service desk handles on average of 4,800 trouble calls per month• SRS utilizes the Microsoft O365 suite of products to support its estimated

11,000 computers user. The primary products include (but not limited to);– Outlook, MS Teams, SharePoint Online, OneDrive, the Power Platform, and standard

Microsoft Office desktop application (Word, Excel, PowerPoint, etc.)• In addition to desktop/laptop video capabilities, SRS also employs conference

room video teleconferencing (VTC) throughout the site

End-User Computing Services

Page 12: Information Technology (IT) and Cyber Security Overview

12

Telecommunications

Page 13: Information Technology (IT) and Cyber Security Overview

13

• SRS utilizes several standard communications mediums;– Roughly 14000 Landlines being serviced by the Avaya digital voice system– Roughly 5800 iDevices (iPhones/iPads) provided by our service through Verizon Wireless

• Due to the size and terrain of SRS, some non-standard communications types are required, to include;– Over 4000Text-based pagers– Long-range handheld radios

• *M&O contractor manages the radio infrastructure to support these radios. Handheld radios are owned and provided by tenant organizations such as Centerra*

– Outdoor/indoor emergency public announcement (PA) system• Common Communications Services

– Standard telephone features to include long distance and international calling– Voice mail– Video teleconferencing (VTC)– Audio Conferencing– Mobile devices and mobile applications

Telecommunications

Page 14: Information Technology (IT) and Cyber Security Overview

14

Page 15: Information Technology (IT) and Cyber Security Overview

15

Due to the nature of operations at SRS, coupled with a rapidly developing IT industry, SRS has developed a robust cyber security capability to respond to emerging threats.

Some of our capabilities include;• Automated threat detection• Threat remediation• Intrusion detection and prevention• Forensic analysis• Penetration testing, systems/application scanning• Disaster recovery and incident response teamsOther Cyber Security related services are; • Policy compliance, cyber security awareness training, and secure configuration

management• DOE-SR cyber security activities are governed by DOE Order 205.1C

Cyber Security