abose report
play

AbOSE Report ( Ab ilene O perational S ecurity E xercise) T. Charles - PowerPoint PPT Presentation

AbOSE Report ( Ab ilene O perational S ecurity E xercise) T. Charles Yun, Internet2 Presentation Overview 2006 January A bit of scene setting and background Background, Goals Methodology TF-CSIRT, Amsterdam, the Netherlands


  1. AbOSE Report ( Ab ilene O perational S ecurity E xercise) T. Charles Yun, Internet2

  2. Presentation Overview 2006 January • A bit of scene setting and background • Background, Goals • Methodology TF-CSIRT, Amsterdam, the Netherlands • Findings • Lessons Learned • Follow up • Invitation to International Security Exercise • Contact Info Slide 2

  3. 2006 January TF-CSIRT, Amsterdam, the Netherlands Slide 3 Abilene Network Backbone Main office Logo Current location Background Information

  4. Background Information Salsa (1 of 2) 2006 January • Advisory and coordination group for security activities for Internet2 • Security at Line Speed workshop (S@LS), the “fruitcake” document, annual meetings TF-CSIRT, Amsterdam, the Netherlands • Working Groups and meetings • Network Authorization (NetAuth), Federated Wireless Network Authentication (FWNA), Computer Security Incident (CSI2) • Reconnections “Managing Academic Networks With New Requirements”, NetGurus Slide 4 xref Marco’s ENISA hierarchy from yesterday

  5. Background Information Salsa (2 of 2) 2006 January • Address security in various ways: • Time frames: short, medium, long • Process, procedure, policy (think ISO-9000, legal requirements, etc.) TF-CSIRT, Amsterdam, the Netherlands • Groups: community, Community, COMMUNITY • Operational, exploratory, R&D Slide 5

  6. AbOSE 2006 January • One day long event, held November 2005 in Indianapolis, Indiana, USA • Designed to initiate conversations on the Network Operation Center's (NOC) activities in their support of Abilene TF-CSIRT, Amsterdam, the Netherlands • This was not an audit • Information gathering, gap analysis , baseline, document • Report is currently in draft and has been released to participants, public version soon. Slide 6

  7. Methodology 2006 January • Two scenarios, invented, refined, executed • “Table top” exercise (talking, no flows initiated) • DDoS attack TF-CSIRT, Amsterdam, the Netherlands • Backbone link is inconsistently saturated between two core router nodes • Targeting an important demo • Router compromise with press/reporter investigation • Router provides indication of problem and reporter has been contacted by “bad guy” to advertise the compromise Slide 7

  8. Findings 2006 January • Report identifies ~40 observations with suggested responses • Patterns of activity emerged in the two scenarios, TF-CSIRT, Amsterdam, the Netherlands some expected and others not. • Some processes were in place and followed, others need to be developed, noting that the any new process is hinged on the NOC’s return on investment • Some observations revealed policy questions that should be answered by Internet2, or, the NOC’s response is based on other people’s decisions. Slide 8

  9. Lessons Learned (some of them) 2006 January • Well designed, detailed scenarios are important to respond to unexpected questions. • Engineers (plural) need to be involved in the design * and * execution of the scenario. (Obviously, these engineers will not participate in the exercise.) TF-CSIRT, Amsterdam, the Netherlands • Make sure that every external “event” or “character” is represented by a real person. If someone is supposedly upset and sending email, have a real person start sending email… and then call a person’s cell phone. • Test processes, not the cleverness of engineers. Slide 9

  10. Follow Up 2006 January • Initiate regularly occurring Abilene exercise • Planning to hold annually, during the summer holidays • Potentially run a table-top and * live * exercise TF-CSIRT, Amsterdam, the Netherlands • “Regular” exercises with international partners • What is the proper format of an international exercise? Process analysis or “real problems” • Start off with a similar baseline exercise and evolve into more complicated activities Slide 10

  11. Invitation to Intl Security Exercise 2006 January • Which entities should participate (regional, national, backbone, or collaborative organizations)? • Who should organize? • When: I suggest late summer 2006 TF-CSIRT, Amsterdam, the Netherlands • Format: Baseline assessment, similar to the AbOSE reported here. Probably a distributed event, via video+voice+IM (or in Hawaii/Sicily/Provence) • Goals: Some are obvious, additional thoughts? Slide 11

  12. 2006 January TF-CSIRT, Amsterdam, the Netherlands Slide 12 • http://security.internet2.edu/ Ann Arbor, Michigan, USA charles @ internet2 . edu 734.352.4960 (desk) Contact Info • T. Charles Yun Internet2

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend