Brought to you by Rice University Office of Information ... · 10/19/2017  · Barry Ribbeck...

22
Brought to you by Rice University Office of Information Technology Barry Ribbeck, Dean Lane, Paul Engle, Dylan Jacob

Transcript of Brought to you by Rice University Office of Information ... · 10/19/2017  · Barry Ribbeck...

Page 1: Brought to you by Rice University Office of Information ... · 10/19/2017  · Barry Ribbeck {Security} - brr at Rice.edu Dylan Jacobs {Network} –dtj1 at Rice.edu Paul Engle {IAM}

Brought to you by Rice University Office of Information Technology

Barry Ribbeck, Dean Lane, Paul Engle, Dylan Jacob

Page 2: Brought to you by Rice University Office of Information ... · 10/19/2017  · Barry Ribbeck {Security} - brr at Rice.edu Dylan Jacobs {Network} –dtj1 at Rice.edu Paul Engle {IAM}

A long time ago, in a university far far in the south……

Page 3: Brought to you by Rice University Office of Information ... · 10/19/2017  · Barry Ribbeck {Security} - brr at Rice.edu Dylan Jacobs {Network} –dtj1 at Rice.edu Paul Engle {IAM}
Page 4: Brought to you by Rice University Office of Information ... · 10/19/2017  · Barry Ribbeck {Security} - brr at Rice.edu Dylan Jacobs {Network} –dtj1 at Rice.edu Paul Engle {IAM}
Page 5: Brought to you by Rice University Office of Information ... · 10/19/2017  · Barry Ribbeck {Security} - brr at Rice.edu Dylan Jacobs {Network} –dtj1 at Rice.edu Paul Engle {IAM}

Our Environment

Medium sized private school (~12K people total)

Research focused

Centralized IT but with a lot of free range options

• No centralized inventory control or IT purchase control

• No centralized authX requirements

• NetReg network moving to auth based network access

So opportunities for improvement are abundant

Page 6: Brought to you by Rice University Office of Information ... · 10/19/2017  · Barry Ribbeck {Security} - brr at Rice.edu Dylan Jacobs {Network} –dtj1 at Rice.edu Paul Engle {IAM}

Our Security Challenge

Improve or maintain network security and increase

clock speed (time to implement).

Make it more secure but don’t get in the way

So we started looking for ways to do that.

Page 7: Brought to you by Rice University Office of Information ... · 10/19/2017  · Barry Ribbeck {Security} - brr at Rice.edu Dylan Jacobs {Network} –dtj1 at Rice.edu Paul Engle {IAM}

Where do you start?

Our institutional mission statement lists a focus on research,

academia and community as our top priority in that order.

Improving IT security clock speed for anything research

related looks like a good place to start.

The solution would need to be measurable since speed was

a factor.

Page 8: Brought to you by Rice University Office of Information ... · 10/19/2017  · Barry Ribbeck {Security} - brr at Rice.edu Dylan Jacobs {Network} –dtj1 at Rice.edu Paul Engle {IAM}

Our Approach

Of all the tools in our toolbox, which technologies provide the

potential for the highest positive security impact?

Of all of those tools which ones can be used to improve our

clock speed in support of research?

Then how do we measure them?

Page 9: Brought to you by Rice University Office of Information ... · 10/19/2017  · Barry Ribbeck {Security} - brr at Rice.edu Dylan Jacobs {Network} –dtj1 at Rice.edu Paul Engle {IAM}

Potential Tools vs Controls

CIS CSC # Control Discription

802.1X Wired(ISE)

Grouper(I2)

SIEM(Splunk) VPN

TrustSec(Future)

1HW Inventory 1 1

2SW Inventory 1 1

4Vulnerability Assessment and Remediation 1 1

5Administrative Privileges 1 1 1 1

6Monitoring and Log Analysis 1 1 1

9Controlling Network Ports 1 1 1 1

13Data Protection 1 1 1 1 1

14Controlled Access 1 1 1 1 1

15Wireless Access 1 1

19Incident Response 1 1

IMPACT TALLEY 9 5 8 4 5

TOOLS

Page 10: Brought to you by Rice University Office of Information ... · 10/19/2017  · Barry Ribbeck {Security} - brr at Rice.edu Dylan Jacobs {Network} –dtj1 at Rice.edu Paul Engle {IAM}

IT Security Choke Points

Where are we slow or inefficient?

• Firewall rule changes for researchers accessing

restricted data

• Dis-contiguous research network subnets

• Compliance management & reporting

• Inventory management

Page 11: Brought to you by Rice University Office of Information ... · 10/19/2017  · Barry Ribbeck {Security} - brr at Rice.edu Dylan Jacobs {Network} –dtj1 at Rice.edu Paul Engle {IAM}

Est. Security Maturity Change

0 0.05 0.1 0.15 0.2 0.25 0.3 0.35 0.4

Polices Completed

Controls 1-5 Implemented

All Controls Implemented

All Controls Automated

All controls Reported

Predicted Maturity Increase

If implemented correctly, we estimated almost a full point improvement in

security maturity

Page 12: Brought to you by Rice University Office of Information ... · 10/19/2017  · Barry Ribbeck {Security} - brr at Rice.edu Dylan Jacobs {Network} –dtj1 at Rice.edu Paul Engle {IAM}

Addressing Clock Speed

• Say no (doesn’t support our mission very well)

• Delegate / Distribute control

• Eliminate Steps and automate

• Remove / Reduce barriers

• Measure and evaluate consistently

Page 13: Brought to you by Rice University Office of Information ... · 10/19/2017  · Barry Ribbeck {Security} - brr at Rice.edu Dylan Jacobs {Network} –dtj1 at Rice.edu Paul Engle {IAM}

Sanity Check

1. Identified the problem

2. Developed a plan and approach

3. Identified the tools

4. Predicted goals to measure against for success

5. Verified implementation should not decrease security

6. Applied acceleration methods

All that’s left is to implement and measure

Page 14: Brought to you by Rice University Office of Information ... · 10/19/2017  · Barry Ribbeck {Security} - brr at Rice.edu Dylan Jacobs {Network} –dtj1 at Rice.edu Paul Engle {IAM}

Measuring Clock Speed

• We used our ticketing system to look at time to completion

before and after implementation in specific areas.

• We also looked at before and after ticket count where tickets

no longer exist because they are self service.

• Some functions such as group changes went from days to

no recorded effort.

• The longest times recorded now are for creating something

unique. Once a new profile is create it takes much less time

to copy and leverage the existing template.

Clock speed for security has been measurably improved in the

areas we where we wanted to have a positive impact.

Page 15: Brought to you by Rice University Office of Information ... · 10/19/2017  · Barry Ribbeck {Security} - brr at Rice.edu Dylan Jacobs {Network} –dtj1 at Rice.edu Paul Engle {IAM}

Review of Successes

• Access through firewall & ad hoc segregated network

– VPN with 802.1X profile and distributed

administration via Grouper

• Inventory management – 802.1X ISE reporting

through SIEM for compliance management and

reporting

• Correlate users to incidents, vulnerabilities and access

request before and after changes show signs of

improvement

Page 16: Brought to you by Rice University Office of Information ... · 10/19/2017  · Barry Ribbeck {Security} - brr at Rice.edu Dylan Jacobs {Network} –dtj1 at Rice.edu Paul Engle {IAM}

Where we failed or are failing

• Could be deploying more quickly.

• Did not comprehend and communicate the importance

of the inventory benefits of 802.1X

• Could have been more timely and purposeful in

explaining the benefits properly to administration.

• We did not set out from the start to use 802.1X wired

for inventory purposes.

Page 17: Brought to you by Rice University Office of Information ... · 10/19/2017  · Barry Ribbeck {Security} - brr at Rice.edu Dylan Jacobs {Network} –dtj1 at Rice.edu Paul Engle {IAM}

Deployment Examples

1. Wired systems – about 30% of campus

2. The 802.1X and Security (Identify, detect, protect,..)

3. Research (Provost Project)

4. Research (ad hoc Network)

Page 18: Brought to you by Rice University Office of Information ... · 10/19/2017  · Barry Ribbeck {Security} - brr at Rice.edu Dylan Jacobs {Network} –dtj1 at Rice.edu Paul Engle {IAM}

Grouper Benefits

• Leveraging group across services

• Moving the control point for groups from IT to the

group owner/steward

• Automation of reporting to the group owner/steward

Page 19: Brought to you by Rice University Office of Information ... · 10/19/2017  · Barry Ribbeck {Security} - brr at Rice.edu Dylan Jacobs {Network} –dtj1 at Rice.edu Paul Engle {IAM}

THE END

Barry Ribbeck {Security} - brr at Rice.edu

Dylan Jacobs {Network} – dtj1 at Rice.edu

Paul Engle {IAM} – pengle at Rice.edu

Dean Lane {IAM} – dlane at Rice.edu

Page 20: Brought to you by Rice University Office of Information ... · 10/19/2017  · Barry Ribbeck {Security} - brr at Rice.edu Dylan Jacobs {Network} –dtj1 at Rice.edu Paul Engle {IAM}

Breeder Questions

• What do you do with devices that can’t do 802.1X?

(MAB + Profiling)

• How do you segregate your research Network?

• What problems do you incur with 802.1X supplicants?

• How difficult is it supporting 802.1X clients not bound

to AD? (BYOD)

Page 21: Brought to you by Rice University Office of Information ... · 10/19/2017  · Barry Ribbeck {Security} - brr at Rice.edu Dylan Jacobs {Network} –dtj1 at Rice.edu Paul Engle {IAM}

Network Port Access Control

• Our Network Registration needs to be replaced

• The current solution

• Is end of life

• Has a number of security holes

• Does not really provide accurate data (our fault)

• 802.1X solution provides both better security, accurate real time

data and appears to work well in our environment

Page 22: Brought to you by Rice University Office of Information ... · 10/19/2017  · Barry Ribbeck {Security} - brr at Rice.edu Dylan Jacobs {Network} –dtj1 at Rice.edu Paul Engle {IAM}

What About Inventory Management?

Inventory is only as good if you can keep it up to date.

Tracking changes manually does not scale and eats up

too much staff time.

Using authenticated network access, we can

dynamically identify anything and anyone on our wired

network which is really the thing we care about.

From person to IP to MAC to machine to services it is all

there.