Building a Cyber Security Emergency Response Team for the NREN Community The case of KENET CERT



Similar documents
KENET Network Status Update and Outlook 2012

Building a Cyber Security Emergency Response Team (CERT) for the NREN Community The case of KENET CERT

By Prof. Meoli Kashorda, PhD, MIET, MIEEE Executive Director, Kenya Education Network (KENET)

CERTIFICATION PROGRAMMES. Developing Professionals for Enhanced Institutional Effectiveness and Performance

Ubuntu Connect Technical Capacity Building at KENET

KENET NETWORK INFRASTUCTURE. KENNEDY ASEDA

KENET & REGIONAL COLLABORATION NETWORKS:

AfyaImara Seniors. Kenya. Uganda. Southern Sudan INPATIENT HEALTH INSURANCE

Country Case Study on Incident Management Capabilities CERT-TCC, Tunisia

A BRAINSTORMING ON SECURITY FIRE DRILLS

Supporting CSIRTs in the EU Marco Thorbruegge Head of Unit Operational Security European Union Agency for Network and Information Security

DANCERT RFC2350 Description Date: Dissemination Level:

UNDERGRADUATE ACADEMIC PROGRAMMES: JANUARY 2016 INTAKE

AfyaImara. Kenya. Uganda. Southern Sudan INPATIENT/OUTPATIENT HEALTH INSURANCE

ENISA s Study on the Evolving Threat Landscape. European Network and Information Security Agency

About Botnet, and the influence that Botnet gives to broadband ISP

Cyber Security & Role of CERT-In. Dr. Gulshan Rai Director General, CERT-IN Govt. of India grai@mit.gov.in

Patching & Malicious Software Prevention CIP-007 R3 & R4

Indian Computer Emergency Response Team (CERT-In) Annual Report (2010)

A Strategy for Developing High-end ICT talent for Emerging African NRENs The case of KENET

Michuki Mwangi! Regional Development Manager - Africa! ISOC! European Peering Forum (EPF) 7! Malta! Sept 2012!

JAMII TELECOMMUNICATIONS LTD COMPANYPROFILE

At the national forum, all counties in country were clustered as follows: 1 Baringo, Elgeyo/Marakwet,Taita/Taveta,West Pokot,Tana River

The Faculty of Science in Kenya constitutes of eight academic

Hong Kong Information Security Outlook 2015 香 港 資 訊 保 安 展 望

How To Audit The Mint'S Information Technology

Zscaler Internet Security Frequently Asked Questions

COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM

Course Content: Session 1. Ethics & Hacking

Cyber security Indian perspective & Collaboration With EU

UNIVERSITY OF NAIROBI

Cyber Security and Critical Information Infrastructure

Romanian National Computer Security Incident Response Team CERT-RO.

G I T H I N J I W. P A U L I N E BIO DATA

Security Officer: An NREN Secondee Perspective

Anatomy of a Breach: A case study in how to protect your organization. Presented By Greg Sparrow

IMPACT OF rhris ON REGULATION OF MEDICAL AND DENTAL PRACTICE

Department of Homeland Security Federal Government Offerings, Products, and Services

CRYPTUS DIPLOMA IN IT SECURITY

Host Hardening. Presented by. Douglas Couch & Nathan Heck Security Analysts for ITaP 1

IMPACT OF UNDERSEA CAPACITY IN EAST AFRICA

Automated Protection on UCS with Trend Micro Deep Security

Deep Security Vulnerability Protection Summary

Internet Safety and Security: Strategies for Building an Internet Safety Wall

Cyber Security Metrics Dashboards & Analytics

Business Banking Products

Does Information Lead to More Active Citizenship? Evidence from an Education Information Intervention in Rural Kenya

Modular Network Security. Tyler Carter, McAfee Network Security

Cybersecurity and Incident Response Initiatives: Brazil and Americas

A Case for Managed Security

Security workshop Protection against botnets. Belnet Aris Adamantiadis Brussels 18 th April 2013

ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster

Lith Networking and Network Marketing Safety


Best Practices for Building a Security Operations Center

Current counter-measures and responses by CERTs

Monitoring and Logging Policy. Document Status. Security Classification. Level 1 - PUBLIC. Version 1.0. Approval. Review By June 2012

Whitepaper: Cloud Computing for Credit Unions

High Level Cyber Security Assessment 2/1/2012. Assessor: J. Doe

PART D NETWORK SERVICES

Managed Intrusion, Detection, & Prevention Services (MIDPS) Why Sorting Solutions? Why ProtectPoint?

Cyber security Country Experience: Establishment of Information Security Projects.

Emerging Network Security Threats and what they mean for internal auditors. December 11, 2013 John Gagne, CISSP, CISA

What legal aspects are needed to address specific ICT related issues?

WAN security threat landscape and best mitigation practices. Rex Stover Vice President, Americas, Enterprise & ICP Sales

INFORMATION SECURITY TRAINING CATALOG (2015)

Opportunities Availed by Increased Bandwidth Capacity in Africa. James Wekesa Chief Commercial Officer

Principles of Information Assurance Syllabus

On and off premises technologies Which is best for you?

Firewall and UTM Solutions Guide

T141 Computer Systems Technician MTCU Code Program Learning Outcomes

SMS. Cloud Computing. Systems Management Specialists. Grupo SMS option 3 for sales

A Cyber Security Integrator s perspective and approach

Open Source Incident Management Tool for CSIRTs

Tunisia s experience in building an ISAC. Haythem EL MIR Technical Manager NACS Head of the Incident Response Team cert-tcc

Top tips for improved network security

Information Security Threat Trends

KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES.

UCS Level 2 Report Issued to

Report on Cyber Security Alerts Processed by CERT-RO in 2014

Keyfort Cloud Services (KCS)

FORBIDDEN - Ethical Hacking Workshop Duration

Thales Service Definition for NOC Services for Cloud

Service Level Agreement

HOW TO PROTECT YOUR VIRTUAL DESKTOPS AND SERVERS? Security for Virtual and Cloud Environments

Transcription:

Building a Cyber Security Emergency Response Team for the NREN Community The case of KENET CERT Presentation at UbuntuNet-Connect 2015 19-20 November 2015, Maputo, Mozambique By Peter Muia, Senior Systems Administrator - KENET Transforming research &

Co-authors 1. Martin Njau 2. Prof. Meoli Kashorda 3. Kennedy Aseda 4. Peter Muia 5. Ronald Osure

Agenda KENET as an NREN The KENET CERT Motivation Services Methodology Impact QA

KENET is the National Research and Education Network ( NREN) of Kenya Aggregates Demand for Connectivity, Internet bandwidth and Cloud Services of member institutions Aggregates Internet traffic from Higher Education and research institutions Develops High-end ICT talent technical + project management Capacity building for KENET and member institutions Builds and operates advanced research infrastructures for the R &E community of Kenya in different areas Africa Science Gateway and federated services (KENET CA, idp, EDUROAM) Special Interest Groups (SIGs) in Educational technology and Engineering Education constituted in FY 2014-2015 SIGs in Medicine, Agriculture and ICT shall be constituted in FY 2015-2016 KENET focus is support for STEM education and research! Cyber Security

KENET Operates a Broadband Network for Members Primary fiber links Backup fiber links. Lokichoggio Ethiopia Mander a KENET POP Furthest connected campus JKUAT Kitale Kitale Lodwar Marsabit Girls 91 2 Marsabit Moyale Wajiir POP Nairobi POP 72 Connected Campuses Uganda 12 9 Kisumu POP Eldoret POP Weybuye 70 Kakameg a 350KM Kisumu 400KM Eldoret Nyahururu Nakuru POP Nakuru 150KM Kericho Kisii Bomet Rong Rongo o UC 400KM Isebania Narok UoN POP Nanyuki Nyeri Nairobi Kaljiado Meru POP Isielo 31 8 Emb u Muranga 350KM Thika USIU DC Tala Meru Mwingi Kitui Garissa UC Garissa Somalia Kisumu POP 21 Mombasa POP 10 Eldoret POP 15 Nakuru POP 11 Meru POP 17 Tanzania 15 9 500KM Namanga 500KM Mombasa POP Kilifi Mombasa Garse n Italian Space Agency -Luigi Broglio Space Centre- Malindi Malindi INDIAN OCEAN Total Campuses connected 170+ Google Confidential and Proprietary

What is a CERT Computer/Cyber Security Emergency Response Teams (CERT) Expert groups that handle computer security incidents. Alternative names include computer emergency readiness team and computer security incident response team (CSIRT).

The KENET CERT The KENET CERT is a team within KENET formed to study Internet security, discover vulnerabilities, and to provide assistance on security matters to the KENET community. It strives for a safer, stronger Internet for the education and research community in Kenya by:- Responding to major incidents Analyzing threats Exchanging critical cyber security information within the community and also with other CERTs.

Why setup a CERT at KENET Increase in cyber threats ISPs in Kenya: spamming, phishing and poor reputation scores Malware Threat: viruses, trojans, botnets and worms Insider threats Global Vulnerabilities and Threats http://www.symantec.com/security_re sponse/publications/threatreport.jsp

Why setup a CERT at KENET Cont... High uptake of Internet and online applications Need to secure these applications KENET is distributing 9 Gb/s bandwidth to its members. 4.5 Gb/s International traffic 4 Gb/s Google Cache 0.5 Gb/s Akamai traffic KENET Shared services need to be secured web hosting backup services data recovery sites DNS services cloud services and virtual servers. Computer security incidents response

KENET CERT Services Facilitate the centralized reporting of incidents Perform training and raise the security awareness of users Resolving security related tickets as part of the KENET help desk Promote computer security policies within the KENET community by creating policies such as the web hosting policy, business continuity plan etc Alerts and Announcements Collaboration Incident Tracing Securing the KENET infrastructure by ensuring that network devices and systems are hardened before they go live.

CERT Development Methodology 1. Requirement Analysis and Specifications understanding KENET as an NREN and the community it serves Identify threats 2. Planning services to be provided by the CERT to mitigate threats identified Benchmark with other CERTs e.g. DFN-CERT, US-CERT, FIRST 3. Implementation Assembly of a team within KENET with both personal and technical skills of running a CERT tools for vulnerability scanning were identified Setup of a honeypot Development of the CERT portal http://cert.kenet.or.ke Hardening of existing systems Modsecurity, Mod_evasive, Host Firewalls, Maldetect

CERT Development Methodology Cont 4. Operational phase Services implemented were launched to the community and a mailing list created (email and SMS) Cyber security training curriculum for systems administrators and a computer security awareness training for users were developed Policies and procedures for operationalization of the CERT were developed and communicated to the community CERT portal was put on line (https://cert.kenet.or.ke) 5. Peer collaboration

KENET CERT Organization Model Internal Distributed CERT model proposed by the European Union Agency for Network and Information Security (ENISA) An organization utilizes existing staff to provide a virtual distributed CERT The distributed team members perform CERT duties in addition to their regular responsibilities Low cost incurred Processes Incident Reporting Incident Handling Communication

CERT Implementation Challenges People who are trained and experienced in incident response techniques and practices are difficult to find. There is no established education path for professional incident handling staff in existence as of today. There was a lack of publicly available sample templates for policies and procedures for use in the day-to-day operations of a CERT. There were few tools such as tailored help desk or trouble ticket solutions addressing the specific needs of the KENET CERT.

Impact & Conclusion Four Training have been conducted. Better awareness, better setup of systems and a better knowledge of security threats and ways of mitigating these threats. A session on security has been included in all other KENET trainings. Information is disseminated in a timely manner. Quick resolution of security related tickets because best practices have been identified, procedures developed and documented for the CERT team to follow during resolution. Reduction in the number of cyber security tickets Awareness and Discussion within the KENET community on cyber security is stronger now KENET has established Cyber security champions in each of its member institutions.

References 1.Communications Authority of Kenya. 2015. CA - Communications Authority of Kenya. [ONLINE] Available at: http://www.ca.go.ke/. [Accessed 07 November 2015]. 2.DFN-CERT. 2015. DFN-CERT. [ONLINE] Available at: https://www.dfn-cert.de/en.html. [Accessed 07 November 2015]. 3.FIRST - Improving security together. 2015. FIRST.org / FIRST - Improving security together. [ONLINE] Available at: https://www.first.org/. [Accessed 07 November 2015]. 4.Kali Linux. 2015. Kali Linux. [ONLINE] Available at: https://www.kali.org/. [Accessed 08 November 15]. 5.Kenya Education Network. 2015. Kenya Education Network. [ONLINE] Available at: http://www.kenet.or.ke. [Accessed 07 November 2015]. 6.Kenya Education Network- CERT. 2015. Kenya Education Network- CERT. [ONLINE] Available at: http://cert.kenet.or.ke. [Accessed 07 November 2015]. 7.Killcrece, G, 2003. Organizational Models for Computer Security Incident Response Teams (CSIRTs). 1st ed. USA: Carnegie Mellon University. 8.Tf-Csirt. 2015. Tf-Csirt. [ONLINE] Available at: https://www.terena.org/activities/tf-csirt/. [Accessed 07 November 2015]. 9.US-CERT. 2015. US-CERT. [ONLINE] Available at: https://www.us-cert.gov/. [Accessed 07 November 15].

Thank You www.kenet.or.ke Jomo Kenyatta Memorial Library, University of Nairobi P. O Box 30244-00100, Nairobi. 0732 150 500 / 0703 044 500