Codes of Connection for Devices Connected to Newcastle University ICT Network



Similar documents
Summary of Technical Information Security for Information Systems and Services Managed by NUIT (Newcastle University IT Service)

LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES

Did you know your security solution can help with PCI compliance too?

74% 96 Action Items. Compliance

Host Hardening. Presented by. Douglas Couch & Nathan Heck Security Analysts for ITaP 1

1 Purpose Scope Roles and Responsibilities Physical & Environmental Security Access Control to the Network...

Section 12 MUST BE COMPLETED BY: 4/22

Global Partner Management Notice

Policy Document. Communications and Operation Management Policy

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:

Achieving PCI-Compliance through Cyberoam

ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster

GFI White Paper PCI-DSS compliance and GFI Software products

2. From a control perspective, the PRIMARY objective of classifying information assets is to:

modules 1 & 2. Section: Information Security Effective: December 2005 Standard: Server Security Standard Revised: Policy Ref:

Ovation Security Center Data Sheet

Windows Operating Systems. Basic Security

Locking down a Hitachi ID Suite server

Medical Device Security Health Imaging Digital Capture. Security Assessment Report for the Kodak DryView 8150 Imager Release 1.0.

Course: Information Security Management in e-governance. Day 1. Session 5: Securing Data and Operating systems

Cloud Security:Threats & Mitgations

Protecting Your Organisation from Targeted Cyber Intrusion

Today s Topics. Protect - Detect - Respond A Security-First Strategy. HCCA Compliance Institute April 27, Concepts.

Cyber Essentials Scheme

March

Top Three POS System Vulnerabilities Identified to Promote Data Security Awareness

What Do You Mean My Cloud Data Isn t Secure?

STRATEGIC POLICY. Information Security Policy Documentation. Network Management Policy. 1. Introduction

Cyber Security In High-Performance Computing Environment Prakashan Korambath Institute for Digital Research and Education, UCLA July 17, 2014

Network and Security Controls

PCI DSS Requirements - Security Controls and Processes

Supplier Information Security Addendum for GE Restricted Data

Information Technology Security Procedures

Data Management Policies. Sage ERP Online

A Decision Maker s Guide to Securing an IT Infrastructure

System Security Policy Management: Advanced Audit Tasks

How NETGEAR ProSecure UTM Helps Small Businesses Meet PCI Requirements

REPORT ON AUDIT OF LOCAL AREA NETWORK OF C-STAR LAB

CompTIA Security+ (Exam SY0-410)

TEXAS AGRILIFE SERVER MANAGEMENT PROGRAM

RSA Authentication Manager 7.1 Security Best Practices Guide. Version 2

What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things.

Security Considerations White Paper for Cisco Smart Storage 1

New Systems and Services Security Guidance

IBX Business Network Platform Information Security Controls Document Classification [Public]

COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM

How to break in. Tecniche avanzate di pen testing in ambito Web Application, Internal Network and Social Engineering

Network Security Policy

IBM. Vulnerability scanning and best practices

PCI PA - DSS. Point ipos Implementation Guide. Version VeriFone Vx820 using the Point ipos Payment Core

Infocomm Sec rity is incomplete without U Be aware,

Information Security Policy September 2009 Newman University IT Services. Information Security Policy

EUCIP - IT Administrator. Module 5 IT Security. Version 2.0

JK0 015 CompTIA E2C Security+ (2008 Edition) Exam

Sophos Enterprise Console Help. Product version: 5.1 Document date: June 2012

Web Application Threats and Vulnerabilities Web Server Hacking and Web Application Vulnerability

HoneyBOT User Guide A Windows based honeypot solution

Newcastle University Information Security Procedures Version 3

Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data

TEMPLE UNIVERSITY POLICIES AND PROCEDURES MANUAL

LogRhythm and PCI Compliance

How To Protect Decd Information From Harm

Miami University. Payment Card Data Security Policy

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

Passing PCI Compliance How to Address the Application Security Mandates

Data Access Request Service

How To Secure An Rsa Authentication Agent

Course: Information Security Management in e-governance

FORBIDDEN - Ethical Hacking Workshop Duration

CITY UNIVERSITY OF HONG KONG Network and Platform Security Standard

IT Security Standard: Network Device Configuration and Management

PCI PA - DSS. Point XSA Implementation Guide. Atos Worldline Banksys XENTA SA. Version 1.00

Reducing Application Vulnerabilities by Security Engineering

Bendigo and Adelaide Bank Ltd Security Incident Response Procedure

Five Steps to Improve Internal Network Security. Chattanooga ISSA

Hardware Inventory Management Greater Boston District

FIREWALL POLICY November 2006 TNS POL - 008

How to complete the Secure Internet Site Declaration (SISD) form

Network Security. 1 Pass the course => Pass Written exam week 11 Pass Labs

External Supplier Control Requirements

STANDARD ON LOGGING AND MONITORING

PCI Data Security Standards (DSS)

CRYPTUS DIPLOMA IN IT SECURITY

AN OVERVIEW OF VULNERABILITY SCANNERS

Student Tech Security Training. ITS Security Office

8 Steps for Network Security Protection

Basics of Internet Security

Security Management. Keeping the IT Security Administrator Busy

SECURITY BEST PRACTICES FOR CISCO PERSONAL ASSISTANT (1.4X)

8 Steps For Network Security Protection

Web Plus Security Features and Recommendations

SonicWALL PCI 1.1 Implementation Guide

Guide to Vulnerability Management for Small Companies

PCI PA - DSS. Point BKX Implementation Guide. Version Atos Xenta, Atos Xenteo and Atos Yomani using the Point BKX Payment Core

Transcription:

Code of Connection (CoCo) for Devices Connected to the University s Author Information Security Officer (Technical) Version V1.1 Date 23 April 2015

Introduction This Code of Connection (CoCo) establishes a minimum security baseline for devices connected to Newcastle University s ICT network. By following the guidance in this Code of Connection you are helping the University reduce its exposure to risks that may: Impact the University s ability to comply with its legal, regulatory and contractual obligations. Impact the confidentiality, integrity and availability of sensitive information assets and information systems. Scope This Code of Connection supports the Information Security Policy and Data Protection Policy by establishing a minimum security baseline for the following types of device: Server (e.g. routers, switches, wireless access points, etc.) End-point (e.g. personal computers, kiosks, etc.) Peripheral (e.g. printers, plotters, scanners, multi-function devices, etc.) Backup (e.g. tape libraries, network attached storage, etc.) Other non-traditional computing devices (e.g. scientific and medical equipment, smart devices, Internet of Things (IoT), Building Management Systems (BMS), Industrial Control Systems / Supervisory Control and Data Acquisition (ICS/SCADA, etc.) This Code of Connection does not cover BYOD (Bring Your Own Device) or encryption for mobile devices. Separate guidance on BYOD and mobile device encryption is available to download from the following location: Information Security Web Pages http://www.ncl.ac.uk/itservice/security/ Remember - confidential and sensitive information must be encrypted if stored on a portable computing device or portable storage device. Target Audience This Code of Connection is for everyone who installs, manages or maintains ICT equipment connected to Newcastle University s ICT network. This includes central and local ICT support, administrative and academic staff, and students who are involved in these activities. Reserved Powers We (Newcastle University s IT Service) will disconnect a device from the University s network if we believe it poses a risk to ICT security. We will always try to contact the device owner before disconnecting a device. Comments and questions If you have any comments or questions about how to comply with this Code of Connection, then please contact the Information Security Team through the IT Service Desk by telephone (0191 208) 5999 and by email at it.servicedesk@ncl.ac.uk Information Security Officer (Technical) Page 1 of 9

High-Level Information Security Requirements 1.0 Device Registration 1.1 You must register all devices you are responsible for in the Inventory before connecting them to the University s network. 1.2 You must keep registration details up to date. 1.3 DHCP should be used for address assignment, where possible. By correctly registering a device, and by keeping those registration details up to date, you are helping us provide a faster response to ICT security incidents by allowing us to easily identify the device owner. You can register devices through the IT Service Desk by email at it.servicedesk@ncl.ac.uk. You can also register devices through your local ICT support. If you don t register a network device, or keep the registration details up to date, then we may disconnect that device from the University s network. 2.0 Public IP Addresses 2.1 You should give us a valid business reason before connecting a device to the public (128.240.) network. By giving us a valid business reason you are helping us to stop the connection of unsecure devices to the public network (e.g. printers). If you don t give us a valid business reason, then we may not allow you to connect the device to the public network. 3.0 Redundant Devices 3.1 You should disconnect devices from the campus network when they are no longer needed. Redundant devices are often forgotten about and are at risk of losing their security settings and not having the latest security updates installed. By disconnecting redundant devices you are helping us to reduce the number of devices that could be used by a hacker to disrupt and compromise the University s ICT services. We will disconnect redundant devices from the University s network if they pose a risk to ICT security. 4.0 Vulnerability Scanning 4.1 We (Newcastle University s IT Service) will scan devices connected to the campus network for vulnerabilities. 4.2 You should fix non-secure devices within 5 working days of receiving a notification from the IT Service. By fixing vulnerabilities you are helping us to reduce the risk of hackers using those vulnerabilities to gain control of devices and using those devices to disrupt and compromise the University s ICT services. If you don t fix a vulnerable device that poses a risk to ICT security, then we will disconnect that device from the University s network. Information Security Officer (Technical) Page 2 of 9

5.0 Malware Prevention 5.1 You should install and maintain anti-malware software on all devices that are vulnerable to malicious software (e.g. viruses, worms, bots, Trojans, adware, spyware, ransomware and scareware). Malicious software can cause significant damage and disruption to ICT services. By using good antimalware software, and by keeping that software up to date, you are helping us to reduce this risk. We will disconnect devices from the University s network if they become infected with malicious software. 6.0 Security Updates 6.1 You should install the latest vendor security updates on all firmware, operating systems and applications. 6.2 If a legacy application dictates the use of a non-secure platform that cannot be upgraded, then you should contact the Information Security Team through the IT Service Desk for further advice: telephone: (0191 208) 5999 email: it.servicedesk@ncl.ac.uk By installing the latest security updates you are fixing vulnerabilities that could be used by a hacker or malicious software to attack the device. Devices that are no longer in receipt of vendor security updates may have vulnerabilities that cannot be fixed. If a legacy application dictates the use of a non-secure platform that cannot be upgraded, then we may be able to recommend alternative ways to secure that platform. If it is not possible to secure the platform, then the platform should be retired or replaced. You should consider replacement costs as part of your on-going operational costs. We will disconnect devices from the University s network if they are vulnerable to attack. 7.0 Management of Services 7.1 You should turn off unsecure and unnecessary network services. 7.2 services should not be running with administration or root privileges, where possible. Unsecure and unnecessary network services could be used by a hacker or malicious software to attack a device. If those services are running with administration privileges then a hacker could use them to compromise other services running on the device. Services such as rlogin, rsh, rpc, telnet and ftp are not designed for secure use and need to be replaced with more secure alternatives such as ssh, scp and sftp. Other services (e.g. nfs, cifs, samba, MySQL, MS-SQL, Apache, IIS, etc.) may be vulnerable to attack if they are not securely configured. We will disconnect devices from the University s network if they are running vulnerable network services. Please refer to Appendix A for more information on managing network services. Information Security Officer (Technical) Page 3 of 9

8.0 Software Firewalls 8.1 Software firewalls should be running and securely configured on all devices connected to the public (128.240.) and internal (10.) network, where possible. Software firewalls that are configured to use a default deny policy for all in-bound traffic can help prevent hackers from exploiting vulnerabilities in network services that you may have missed when securing the device. By using a default deny policy, you can limit all in-bound network traffic to trusted network protocols and ports. Commercial software firewalls may also provide basic IDS (Intrusion Detection System) and DLP (Data Leakage Prevention) capabilities. We will disconnect devices from the University s network if they are running vulnerable network services. 9.0 Access Control 9.1 You should password protect administration consoles. 9.2 You should change vendor default passwords. 9.3 You should disable vendor installed guest accounts and other unnecessary accounts. 9.4 Restrict remote root and administrator access to trusted hosts (e.g. PCs belonging to system administrators, etc ), where possible. 9.5 Authenticate remote root and administrator access with two-factor authentication (e.g. if you are using SSH, then consider using a private key with a passphrase), where possible. 9.6 You should only use disk file systems that support Access Control Lists (e.g. NTFS). 9.7 You should not export network file systems (such as NFS and CIFS) with anonymous write permissions. 9.8 You should not allow anonymous uploading to FTP servers. Protecting Console Access Password protected consoles provide a first-line of defence against attacks. Hackers and automated hacking tools will often use vendor default passwords, guest accounts and other unnecessary accounts to gain access to a device. Restricting root and administrator logons to trusted hosts and using two-factor authentication can help reduce the risk posed by brute-force password attacks. Access Control Lists File system ACLs can help prevent further compromise of a device if a low privilege account is compromised by stopping the attacker from accessing sensitive system files and files belonging to other users. File Systems & FTP Servers Criminals have been known to store illegal materials on devices that are running non-secure network file systems and non-secure FTP servers. We will disconnect devices from the University s network if they do not have secure access controls. Information Security Officer (Technical) Page 4 of 9

10.0 Hardening 10.1 You should secure all devices, operating systems and applications in accordance with vendor recommendations. By securing your devices in accordance with vendor recommendations you are helping to reduce other risks that might not have been explicitly addressed through this Code of Connection (e.g. risks that are unique to a particular hardware or software product). Vendors will normally publish security guidance on their web sites. We will disconnect devices from the University s network if they have not been secured in accordance with vendor recommendations. 11.0 Obfuscation (reducing public technical information) 11.1 Change default network service banners and SNMP (Simple Management Protocol) community strings, where possible. By changing default service banners and SNMP community strings you are helping to reduce the threat posed by hackers. Service banners and SNMP community strings are used to advertise the types of services running on a device and will often include distribution and version information. Hackers will often use this information to identify devices that are vulnerable to attack. We will disconnect devices from the University s network if they are advertising services that are vulnerable to attack. 12.0 Software Sources 12.1 You should only install software from trusted sources. Hackers will try to trick you into downloading software that has been tampered with. The compromised software may include keystroke loggers, back doors, spam bots and other types of malicious software. To reduce this risk, all software needs to be obtained from trusted sources. Trusted sources include software vendors, authorised resellers and recognised open source community web sites. We can help you verify the authenticity of a source. If possible, verify downloaded software with an appropriate hash algorithm such as MD5 (Message- Digest Algorithm). We will disconnect devices from the University s network if they are running software that has been modified by a hacker. 13.0 Quality Assurance 13.1 You should check security settings for misconfigurations after system changes and at least annually if no changes have been made. Devices that have been previously configured for security may have had their security settings wiped or modified because of software upgrades, system restores or other technical changes. Security settings may have also been corrupted over time. By checking security configurations after a system change and annually you are helping to identify and remove vulnerabilities that could be exploited by a hacker. We will disconnect devices from the University s network if they are vulnerable to attack. Information Security Officer (Technical) Page 5 of 9

14.0 Web Applications 14.1 You should use HTTPS to protect web sessions that send and receive authentication data and other people s personal information. 14.2 You should sign HTTPS connections with digital certificates obtained from a trusted Certificate Authority such as the Janet. 14.3 You should protect web forms and URLs against injection and XSS (Cross Site Scripting) attacks. 14.4 You should encrypt or hash passwords and other people s personal information if it is stored in a database. 14.5 Authentication to web applications should use the shibboleth SSO (Single Sign On) system, where possible. HTTPS and Digital Certificates HTTPS is used to encrypt sensitive and confidential information when sent across open networks. A digital certificate obtained from a trusted source (such as the Janet or other recognised Certificate Authority) can provide confirmation to the customer that the web site is owned and operated by the University. HTTPS and digital certificates can help reduce the risk of sensitive and confidential information being intercepted by eavesdroppers or accidentally sent to web sites that are operated by fraudsters. Injection Vulnerabilities Injection vulnerabilities can be used by hackers to access and modify web applications and databases. XSS (Cross Site Scripting) attacks can be used to deface web sites, hijack user sessions, and redirect users to malicious web sites. Information on how to avoid injection and XSS (Cross Site Scripting) attacks can be obtained from organisations such as OWASP (The Open Web Application Security Project). Database Encryption By encrypting or hashing sensitive and confidential information that s stored in a database-driven web site, you are helping to reduce the risk of that data being accessed by hackers if they successfully attack your database server. It is important to remember that encrypted data can still be accessed in an unencrypted form if the web application is vulnerable to injection attacks. Information Security Officer (Technical) Page 6 of 9

15.0 Data Protection 15.1 If your device is used to collect, store and/or process other people s personal information, then you must protect that information in compliance with the Data Protection Act. 15.2 If disposing of ICT equipment, then you must use only methods of data destruction that are proven to be secure and render data recovery impossible. Data Protection Act The Data Protection Act states that other peoples personal information must: 1. Be processed fairly and lawfully 2. Be collected only for a specific purpose 3. Not be excessive 4. Be accurate 5. Not be kept longer than needed 6. Be processed in line with the rights of the data subject 7. Be protected 8. Be protected to European Economic Area standards if sent overseas The Information Security Team delivers Data Protection Training through the Staff Development Unit. Secure Data Disposal It may be possible for criminals to recover data that has been previously deleted. You can reduce this risk by contracting a secure data disposal company to dispose of your redundant ICT equipment and to provide documented evidence of data destruction (e.g. a data destruction certificate). Secure deletion software can also be used on individual devices. If you require further advice on the Data Protection Act or secure data disposal then please contact the Information Security Team through the IT Service Desk: telephone: (0191 208) 5999 email: it.servicedesk@ncl.ac.uk 16.0 Wireless Access Points 16.1 You should not connect wireless APs (Access Points) to the campus network. Unauthorised wireless APs (Access Points) can be used by hackers to access and compromise internal ICT services. If your work area does not have good wireless coverage then please notify the IT Service Desk: telephone: (0191 208) 5999 email: it.servicedesk@ncl.ac.uk We will disconnect wireless APs from the University s network if they are vulnerable to attack or interfere with the University s wireless service. For any end-user wireless access point connected to the campus network (including student owned wireless access points), all traffic entering the campus network from that device will be considered the responsibility of the owner of that device (registered owner in the network inventory, or the tenant of a student room where the device is located). 17.0 Forensic Readiness 17.1 You should enable system, security and application logs and retain them for at least three months or as required. By enabling and retaining system, security and application logs, you are helping us to improve our ability to detect and investigate ICT security incidents. Information Security Officer (Technical) Page 7 of 9

18.0 Incident Reporting 18.1 You should report all suspected information security incidents to the IT Service Desk. The IT Service Desk will forward your report to the Information Security Team. IT Service Desk : telephone: (0191 208) 5999 email: it.servicedesk@ncl.ac.uk Information Security Officer (Technical) Page 8 of 9

Appendix A Non-secure network services A non-secure service is a network service that is: Not required for the functioning of a network connected device; Or, has been replaced with a more secure alternative For example: A web server should only run services needed for the purpose of the device (e.g. a LAMP stack) SSH and SFTP should be used instead of telnet and FTP We recommend that you run a port scan using Nmap against the devices that you manage and check if any services are not needed or have been replaced with more secure alternatives. Nmap needs to be run from a remote computer and can be downloaded from your Linux repository or nmap.org if you use a Windows PC. The following Nmap command will perform a TCP and UDP scan against your remote host and will generate a list of network services that may need to be shut down or hardened: nmap ss su T4 O <scan-target> <scan-target> is the IP address or DNS name of your remote host. Do not run Nmap against any hosts that you do not manage. As a rule of thumb, if you don t know what a particular network service does, turn it off and document the change. The network service can be re-enabled if turning it off impacts the device. Information Security Officer (Technical) Page 9 of 9