FHDA Network/Security Architecture. Management Overview. Ken Agress Senior Consultant, NTS. Fred Cohen Senior Consultant, SRMS



Similar documents
Cisco Network Optimization Service

THE TOP 4 CONTROLS.

Digital Advisory Services Professional Service Description Network Assessment

Keith Luck, CISSP, CCSK Security & Compliance Specialist, VMware, Inc. kluck@vmware.com

Level: 3 Credit value: 9 GLH: 80. QCF unit reference R/507/8351. This unit has 6 learning outcomes.

Software defined networking. Your path to an agile hybrid cloud network

Network Assessment Services

Whitepaper. Controlling the Network Edge to Accommodate Increasing Demand

Session Border Controllers in Enterprise

Secure Networks for Process Control

MCSE SYLLABUS. Exam : Managing and Maintaining a Microsoft Windows Server 2003:

Securely Architecting the Internal Cloud. Rob Randell, CISSP Senior Security and Compliance Specialist VMware, Inc.

Cisco Services for IPTV

Cisco Advanced Services for Network Security

Data Center Networking Designing Today s Data Center

Approved 12/14/11. FIREWALL POLICY INTERNAL USE ONLY Page 2

Domain 1 The Process of Auditing Information Systems

Larry Wilson Version 1.0 November, University Cyber-security Program Critical Asset Mapping

Recommended IP Telephony Architecture

SDN and NFV in the WAN

Planning and Maintaining a Microsoft Windows Server Network Infrastructure

ACADEMIA LOCAL CISCO UCV-MARACAY CONTENIDO DE CURSO CURRICULUM CCNA. SEGURIDAD SEGURIDAD EN REDES. NIVEL I. VERSION 2.0

Analysis of IP Network for different Quality of Service

Agile enterprise content management and the IBM Information Agenda.

Leveraging SDN and NFV in the WAN

Asset management guidelines

SWOT Assessment: FireMon Security Manager Suite v7.0

Best Practices for PCI DSS V3.0 Network Security Compliance

Best Practices for deploying unified communications together with SIP trunking connectivity

INFORMATION TECHNOLOGY ENGINEER V

Network Access Control in Virtual Environments. Technical Note

TELECONFERENCING CUTS COSTS

Things I can do to protect my network from getting Hacked!!!!!! Jazib Frahim, Technical Leader

Cisco Unified Communications and Collaboration technology is changing the way we go about the business of the University.

Technical Note. ForeScout CounterACT: Virtual Firewall

ForeScout CounterACT CONTINUOUS DIAGNOSTICS & MITIGATION (CDM)

Why Choose Integrated VPN/Firewall Solutions over Stand-alone VPNs

Vulnerability management lifecycle: defining vulnerability management

Migrating to the Cloud. Developing the right Cloud strategy and minimising migration risk with Logicalis Cloud Services

ARCHITECT S GUIDE: Comply to Connect Using TNC Technology

Secure Remote Access Solutions Balancing security and remote access Bob Hicks, Rockwell Automation

Release: 1. ICANWK607A Design and implement wireless network security

Accenture Cyber Security Transformation. October 2015

How to Keep Video From Blowing Up Your Network

ARCHITECT S GUIDE: Mobile Security Using TNC Technology

MICROSOFT CERTIFIED SYSTEMS ENGINEER Windows 2003 Track

Session Border Controllers in the Cloud

JK0 015 CompTIA E2C Security+ (2008 Edition) Exam

What Cloud computing means in real life

State of New Mexico Statewide Architectural Configuration Requirements. Title: Network Security Standard S-STD Effective Date: April 7, 2005

S-Series SBC Interconnect Solutions. A GENBAND Application Note May 2009

Virtual Office Solutions

White Paper. The Assurance Checklist for Branch Networks A pragmatic guide for building high performance branch office networks.

Polycom. RealPresence Ready Firewall Traversal Tips

Cisco Video Surveillance Services

Video over IP WHITE PAPER. Executive Summary

Firewall Architecture

Network Visibility Guide

Genexis FTTH Network Architecture

MCSE Core exams (Networking) One Client OS Exam. Core Exams (6 Exams Required)

A Model-based Methodology for Developing Secure VoIP Systems

White Paper. An Overview of the Kalido Data Governance Director Operationalizing Data Governance Programs Through Data Policy Management

CISCO IOS IP SERVICE LEVEL AGREEMENTS: ASSURE THE DELIVERY OF IP SERVICES AND APPLICATIONS

FAN An Architecture for Scalable, Service-Oriented Data Management

Intelligent Policy Enforcement for LTE Networks

Designing a Windows Server 2008 Network Infrastructure

BT One. Analyst and consultant update, September BT One. Communications that unify 1

Best Practices for Outdoor Wireless Security

Business Values of Network and Security Virtualization

Module 1: Overview of Network Infrastructure Design This module describes the key components of network infrastructure design.

Efficient evolution to all-ip

Overview of NetFlow NetFlow and ITSG-33 Existing Monitoring Tools Network Monitoring and Visibility Challenges Technology of the future Q&A

Disaster Recovery Design Ehab Ashary University of Colorado at Colorado Springs

Enabling Continuous Delivery by Leveraging the Deployment Pipeline

Securing SIP Trunks APPLICATION NOTE.

Cisco Security Optimization Service

Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1

IP Telephony Management

Honeywell Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Honeywell Process Solutions (HPS) June 4, 2014

Simplify IT. With Cisco Application Centric Infrastructure. Barry Huang Nov 13, 2014

Secure Cloud-Ready Data Centers Juniper Networks

The changing face of global data network traffic

Network Services in the SDN Data Center

VoIP Lifecycle Management. Best Practices and Business Value

Ranch Networks for Hosted Data Centers

NightOwlDiscovery. EnCase Enterprise/ ediscovery Strategic Consulting Services

Voice over IP Communications

Hosted PBX Platform-asa-Service. Offering

EMC ADVERTISING ANALYTICS SERVICE FOR MEDIA & ENTERTAINMENT

Secure VoIP for optimal business communication

Remote Management Services Portfolio Overview

Understanding Virtualization and Cloud in the Enterprise

UC & C Success Requires a Services Lead Approach

VIA CONNECT PRO Deployment Guide

FIREMON SECURITY MANAGER

Appendix A-2 Generic Job Titles for respective categories

Transcription:

FHDA Network/Security Architecture Ken Agress Senior Consultant, NTS Fred Cohen Senior Consultant, SRMS Management Overview All Contents 2008 Burton Group. All rights reserved.

Agenda Introduction & Background What is a Network/security Architecture? Why Have an Architecture? The Burton Group Architecture Process The FHDA Architecture Key FHDA Issues Security Network Conclusion Q&A and Discussion

Agenda Introduction & Background What is a Network/security Architecture? Why Have an Architecture? The Burton Group Architecture Process The FHDA Architecture Key FHDA Issues Security Network Conclusion Q&A and Discussion

Introduction & Background Introductions Project Background Why did we do this project? Who was involved? What were the deliverables? How will this be used? Why Burton Group?

Agenda Introduction & Background What is a Network/security Architecture? Why Have an Architecture? The Burton Group Architecture Process The FHDA Architecture Key FHDA Issues Security Network Conclusion Q&A and Discussion

What is a Network/Security Architecture? An architecture is a forward-looking document that: Defines how an organization will approach technology decisions Describes specific requirements and goals that technology must address to meet the organization s needs Establishes standards that can be leveraged in a useful fashion over a long period of time Allows IT to evaluate solutions in a neutral and unbiased fashion An architecture is not: A design that describes the environment with specificity A detailed description of configurations or devices A list of products, vendors, solutions, or systems that will be implemented

Agenda Introduction & Background What is a Network/security Architecture? Why Have an Architecture? The Burton Group Architecture Process The FHDA Architecture Key FHDA Issues Security Network Conclusion Q&A and Discussion

Why Have an Architecture? An architecture allows an organization to: Reduces the complexity of managing and operating the environment. Reduction in cost, operational issues Improved consistency and greater effectiveness Define a set of technology standards that: Can be applied to a wide range of technical solutions Provide for interoperability of hardware/software Ensure required needs are addressed Support bid specifications that are targeted and meet the needs Describe approaches to technology that the district can review and revisit as requirements or technologies change Develop processes and procedures based on a common understanding of technical and business requirements. An architecture is intended to be a living document that is revisited regularly and modified over time.

Agenda Introduction & Background What is a Network/security Architecture? Why Have an Architecture? The Burton Group Architecture Process The FHDA Architecture Key FHDA Issues Security Network Conclusion Q&A and Discussion

The Burton Group Architecture Process Burton Group leverages a structured methodology to assist clients. Business needs determine the specific goals, this process defines the standards.

What we did: The Burton Group Architecture Process Gathered background data through interviews and document review Discussed technical and business needs with FHDA personnel Conducted a one week workshop to create the architecture with FHDA management and staff Described FHDA Principles Defined FHDA Technical Positions Created FHDA Templates Prepared and presented the resulting architecture What FHDA needs to do: Socialize the architecture within the district Perform annual reviews of the architecture Understand the gaps, prioritize them, and act on them Develop standard processes that leverage the architecture

Agenda Introduction & Background What is a Network/security Architecture? Why Have an Architecture? The Burton Group Architecture Process The FHDA Architecture Key FHDA Issues Security Network Conclusion Q&A and Discussion

FHDA Key Business Drivers Support the district s education objectives Distance learning Anywhere/anytime access Improve support for key applications: EIS System Multicast for audio/video services Prepare for PBX replacement Support a range of users effectively providing: Improved bandwidth, reliability, protection Support for many different types of traffic Build network in a cost effective, sustainable, adaptable fashion

The FHDA Architecture What does FHDA get out of this Architecture? Properly secured, reliable communications for students, faculty, and staff that adapts as requirements change.

The FHDA Architecture: Wireless Enhanced wireless access is called for: Wireless standards with greater range, bandwidth Ability to provide support for different user groups on a single infrastructure Security appropriate to the type of user and group Guest access where allowed

The FHDA Architecture :Multimedia The standards adopted provide support for: Streaming video and audio Multicast applications such as video conferencing, video distribution, and broadcasting Increased bandwidth to support new and interesting types of media Proper classification and handling of different types of traffic Support for IP Telephony as a potential PBX replacement

The FHDA Architecture: Proactive Management The architecture will help ETS achieve: Enhanced management capabilities and visibility into network performance and conditions Greater understanding of applications and services the network should support Improved historical tracking for trend analysis and capacity planning Process and procedure improvements to standardize responses, reduce heroic efforts Uniform approaches to technical issues, problem identification, prioritization, and resolution

The FHDA Architecture: Improved Access The architecture adds: Support for properly secured, authorized anytime/anywhere access Student access to resources and materials Faculty access to systems and services Staff access for administrative purposes 3 rd parties supporting FHDA Green initiatives for facilities management Higher performance core network Faster, more capable connections between buildings & locations

Agenda Introduction & Background What is a Network/security Architecture? Why Have an Architecture? The Burton Group Architecture Process The FHDA Architecture Key FHDA Issues Security Network Conclusion Q&A and Discussion

Security Architecture Key Issues The situation today: No IT risk management function Content, applications, and systems are not adequately inventoried Processes are not well defined or automated Lack of structure for controls Detection of security related events is inadequate to the need

Security: No Risk Management Function What is the problem? For information and information technology no risk management function is in place for FHDA Why does it matter? Without this function, rational decision-making cannot be done regarding what to protect and how well. How can it be solved? Someone has to be put in charge of performing this function for the district. They need the skills, knowledge, and tools to do it. Until this is done, design decisions may be seen as without a rational basis and justification

Security: No Inventory of Content and Systems What is the problem? There is no comprehensive inventory of content, applications, and systems What do they do? How do they do it? What are they for? Why does it matter? If you don't know what you have: How do you know how to protect it? How do you know when you are done? How do you know how well you have done it? How can it be solved? Generate an inventory over time Start with what's obvious and critical keep going Over time, inventory all new things, systematically deprecate what's not inventoried till done

Security: Processes Not Well Defined What is the problem? The processes for getting things done with content and technology are not systematically defined and consistently applied Why does it matter? Processes are hard to repeat, depend on heroic effort of individuals, and are not well documented even after they have taken place. As complexity rises, so do costs, unless you systematize and automate functions How can it be solved? Move toward a higher level of maturity in processes Add automation to support the effort

Security: Lack of Structure for Controls What is the problem? Controls, where they exist, are ad-hoc and unstructured. Why does it matter? It takes a lot of individualized effort to examine each item one at a time, therefore: Many things are not examined Many things are poorly controlled or not controlled at all. The cost of controls is far higher Economies of scale are not readily attainable. How can it be solved? Structures should be put in place to allow content, applications, systems, and users to be controlled by common mechanisms based on defined characteristics. To wit:

Security: The Big Picture - Zones Without drilling into the details... Network Control The outside world Outer firewall DMZ Network Audit DMZ-Trusted Firewall Trusted zone Trusted Restricted Firewall Restricted zone

Security: Detection Inadequate to the Need What is the problem? You can't tell if you are being attacked or if you are misconfigured Why does it matter? No passive defense can hold out forever. To defend you must detect and react in time to prevent potentially serious negative consequences (PSNCs) in excess of management specified thresholds (MSTs). If you can't detect, you can't react in a timely fashion. How can it be solved? You need a systematic approach to detection of event sequences that can produce PSNCs and MSTs.

Network: VLANs and IP What s the problem? Existing IP addressing and VLAN schemes aren t capable of meeting business requirements Why does it matter? Can t create a scalable network Can t support zones adequately Can t provide improved access How can it be solved? Develop initial plans for new IP addressing Determine how and where VLANs will be leveraged Work with implementation team(s) to finalize and deploy

Network: Dynamic Computer Placement What s the problem? FHDA needs to place users in the proper area of the network Why does it matter? Users may receive too much/too little access Implementation could be overly complex and difficult to support How can it be solved? Carefully plan implementation to minimize support burden Protocols and systems used (802.1x and Identity Management) will require careful, strategic consideration Strategy must be developed to some extent for use in bid documents

Network: Routing Priorities What s the problem? Security standards require that traffic is inspected at appropriate points, which requires proper routing Why does it matter? FHDA can t comply with the standards adopted without proper inspection, detection, and action How can it be solved? Develop initial plans for routing through the network Work with implementation teams to finalize Test implementation prior to acceptance Regularly test routing to verify compliance

Network: Quality of Service What s the problem? Different services demand different performance from the network Telephony Video conferencing Video streaming E-mail, browsing, other standard applications. Why does it matter? Negative impact on quality for high-demand services Can I make a connection? Is the connection good enough? Can I maintain the connection? How can it be solved? Leverage application/content inventory to classify services Determine service requirements Define classification and enforcement mechanisms Create procedures that include characterization of new applications

Agenda Introduction & Background What is a Network/security Architecture? Why Have an Architecture? The Burton Group Architecture Process The FHDA Architecture Key FHDA Issues Security Network Conclusion Q&A and Discussion

So What s Next? Communicating the architecture throughout the district Translating the architecture into an effective design Regularly reviewing the architecture and updating as required Applying the architecture systematically and effectively

Conclusion FHDA s Network/Security architecture is an important first step towards achieving: Properly secured, reliable communications for students, faculty, and staff that adapts as requirements change. FHDA can leverage the architecture because: It defines standards in a useful, modular fashion It provides the basis for decisions and allows discussion of priorities It describes a future state with identified gaps and action items

What questions do you have? All Contents 2008 Burton Group. All rights reserved.