Access control policy: Role-based access



Similar documents
8. Firewall Design & Implementation

Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

Architecture. The DMZ is a portion of a network that separates a purely internal network from an external network.

PROTECTING INFORMATION SYSTEMS WITH FIREWALLS: REVISED GUIDELINES ON FIREWALL TECHNOLOGIES AND POLICIES

NETASQ & PCI DSS. Is NETASQ compatible with PCI DSS? NG Firewall version 9

Chapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding

INTRUSION DETECTION SYSTEMS and Network Security

Computer Security CS 426 Lecture 36. CS426 Fall 2010/Lecture 36 1

Reverse Shells Enable Attackers To Operate From Your Network. Richard Hammer August 2006

Internet Firewall CSIS Internet Firewall. Spring 2012 CSIS net13 1. Firewalls. Stateless Packet Filtering

Firewalls and VPNs. Principles of Information Security, 5th Edition 1

Figure 41-1 IP Filter Rules

Security perimeter. Internet. - Access control, monitoring and management. Differentiate between insiders and outsiders - Different types of outsiders

Configuring IPSec VPN Tunnel between NetScreen Remote Client and RN300

Lab Developing ACLs to Implement Firewall Rule Sets

Firewall Firewall August, 2003

Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme. Firewall

Exam Questions SY0-401

CTS2134 Introduction to Networking. Module Network Security

A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.

Network Access Security. Lesson 10

Network Security: 30 Questions Every Manager Should Ask. Author: Dr. Eric Cole Chief Security Strategist Secure Anchor Consulting

How To Protect Your Network From Attack From Outside From Inside And Outside

Chapter 11 Cloud Application Development

INTERNET SECURITY: THE ROLE OF FIREWALL SYSTEM

Security Technology: Firewalls and VPNs

NETWORK SECURITY (W/LAB) Course Syllabus

Firewall Environments. Name

Computer Networks. Secure Systems

Networking Basics and Network Security

Security in IPv6. Basic Security Requirements and Techniques. Confidentiality. Integrity

Högskolan i Halmstad Sektionen för Informationsvetenskap, Data- Och Elektroteknik (IDÉ) Ola Lundh. Name (in block letters) :

Firewall Audit Techniques. K.S.Narayanan HCL Technologies Limited

Step-by-Step Configuration

Network Configuration Settings

ΕΠΛ 674: Εργαστήριο 5 Firewalls

Altus UC Security Overview

FIREWALL CHECKLIST. Pre Audit Checklist. 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review.

CMPT 471 Networking II

Virtual private network. Network security protocols VPN VPN. Instead of a dedicated data link Packets securely sent over a shared network Internet VPN

Firewall implementation and testing

Ti m b u k t up ro. Timbuktu Pro Enterprise Security White Paper. Contents. A secure approach to deployment of remote control technology

12. Firewalls Content

IT Security Standard: Network Device Configuration and Management

Network Security Guidelines. e-governance

State of New Mexico Statewide Architectural Configuration Requirements. Title: Network Security Standard S-STD Effective Date: April 7, 2005

Virtual Server and DDNS. Virtual Server and DDNS. For BIPAC 741/743GE

Firewalls. Ahmad Almulhem March 10, 2012

CS2107 Introduction to Information and System Security (Slid. (Slide set 8)

Firewall Security. Presented by: Daminda Perera

Network Security. Tampere Seminar 23rd October Overview Switch Security Firewalls Conclusion

74% 96 Action Items. Compliance

Using a Firewall General Configuration Guide

Network Defense Tools

Firewall and Router Policy

ΕΠΛ 475: Εργαστήριο 9 Firewalls Τοίχοι πυρασφάλειας. University of Cyprus Department of Computer Science

Firewall VPN Router. Quick Installation Guide M73-APO09-380

Information Technology Career Cluster Introduction to Cybersecurity Course Number:

CIS 433/533 - Computer and Network Security Firewalls

Introduction of Intrusion Detection Systems

MANAGED SECURITY SERVICES

ADMINISTRATIVE POLICY # (2014) Remote Access. Policy Number: ADMINISTRATIVE POLICY # (2014) Remote Access

What would you like to protect?

Network Security Topologies. Chapter 11

Firewalls, Tunnels, and Network Intrusion Detection. Firewalls

Company Co. Inc. LLC. LAN Domain Network Security Best Practices. An integrated approach to securing Company Co. Inc.

Internet Security Firewalls

Approved 12/14/11. FIREWALL POLICY INTERNAL USE ONLY Page 2

Firewalls, Tunnels, and Network Intrusion Detection

Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 6 Network Security

Securing Modern Substations With an Open Standard Network Security Solution. Kevin Leech Schweitzer Engineering Laboratories, Inc.

CSCE 465 Computer & Network Security

GregSowell.com. Mikrotik Security

Developing Network Security Strategies

CSE543 - Computer and Network Security Module: Firewalls

Chapter 4 Firewall Protection and Content Filtering

Chapter 12. Security Policy Life Cycle. Network Security 8/19/2010. Network Security

Cisco Secure PIX Firewall with Two Routers Configuration Example

Lesson 5: Network perimeter security

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: Security Note

Firewalls. Chapter 3

Network Security Policy

Firewalls 1 / 43. Firewalls

CS Computer and Network Security: Firewalls

Chapter 15. Firewalls, IDS and IPS

SonicWALL PCI 1.1 Implementation Guide

allow all such packets? While outgoing communications request information from a

Module: Firewalls. Professor Patrick McDaniel Spring CMPSC443 - Introduction to Computer and Network Security

CISCO IOS NETWORK SECURITY (IINS)

Network Security. Outlines: Introduction to Network Security Dfii Defining Security Zones DMZ. July Network Security 08

A Model Design of Network Security for Private and Public Data Transmission

The Bomgar Appliance in the Network

Common Remote Service Platform (crsp) Security Concept

Asheville-Buncombe Technical Community College Department of Networking Technology. Course Outline

APNIC elearning: Network Security Fundamentals. 20 March :30 pm Brisbane Time (GMT+10)

Linux MDS Firewall Supplement

Overview. Securing TCP/IP. Introduction to TCP/IP (cont d) Introduction to TCP/IP

Transcription:

Access control policy: Role-based access As subjects (a person or automated agent) often change roles within an organization, it is best to define an access control policy based on the roles they play. Therefore, many subjects may be assigned to one or more roles. Some roles may over-lap between security classes. For example, a social worker or a counselor must be able to access student s information (sensitive level) such as age, gender, financial status, etc. I will not attempt to cover on Discretionary Access Control in detail. To administer access control policies efficiently and centrally, roles are then grouped and each group has their own security level. Roles and groups in UNSW: (Non-exhaustive list but are typical roles in a University) Group 1: Executive, Administrative, and Managerial University and department administrators: Deans, provosts, department heads, directors, supervisors and managers.

The official organization chart represents Group 1: Executive, Administrative, and Managerial. I will assign them as security class Class 1 as they make strategic decisions and are at the top levels of executive, administrative and managerial arms of the University. Security level: Strategic. Group 2: Faculty and Instructional Professors: Tenured, tenure-track, contract, adjunct and visiting faculty. Instructional staff: Teaching specialists and lecturers. Academic staff: Academic advisors, administrative support. Group 2 will be labeled as security class Class 2. Roles under this class can access all academic-related objects such as student information, student grades, exam papers, academic progression, financial payments, etc. Security level: Sensitive. Group 3: Staff - Professional Non-Faculty Accountants, Graphic Designers/Media Artists, Social workers, Scientists or Editors Group 4: Staff - Technical/Para-Professional Community Program Assistant, Laboratory Technicians, Electronics Technician, Library Assistants. Group 5: Staff - Information Technology Applications Programmer, Analyst/Programmer, Website administrators, Database administrators, Network administrators. Group 3 to 5 will be labeled as security class Class 3. Roles under this class can access non-academic objects such as routers, financial records (for accounting purposes), Web servers, etc. Security level: Confidential Other groups Any subject or roles outside of Group 1 to 5 are considered Guests. Security level: Public.

Confidentiality in a multilevel security Group 2 to 5 are naturally under Class 1 in terms of security level. In designing a multilevel security, confidentiality is enforced by: No read up: A subject at a given security level may not read an object at a higher security level. Also known as the Simple Security Property. In this case, users can view content only at or below their own security level. For example, a lecturer can view public, confidential and sensitive files, but may not view strategic files. No write down: A subject at a given security level must not write to any object at a lower security level. Also known as *-property ( Star property ). In this case, subjects can create content only at or above their own security level. For example, a lecturer can create sensitive or strategic files but may not create confidential or public files. Servers and security mechanisms A typical University would host an array of Information systems and servers such as Communication/Network-support servers External web server To serve corporate web pages outside of University. External DNS server To provide name resolution and point external hosts to University s web server. Internal DNS server To provide name resolution within the local network of the University. Internal web server To provide intranet web pages accessible only within University s network. FTP/File servers To move and store files within and outside of University. Files may include students work on their network drives. Telnet server To allow staff to log onto a host computer in the University and perform tasks physically outside of University. Email servers To store, route and even filter emails coming in and out of University.

Print servers To queue and route print jobs over a network and accept print jobs from the network s host computers and send the jobs to the appropriate network printers. Information Student database servers To store every student s data needed for the University s business. Human Resource database server To store data on anyone under the University s payroll. Financial records server To store sensitive financial records of the University such as payouts, research grants, income, etc. Security facilitation Intrusion Detection System (IDS) To monitor network and/or system activities for malicious activities or policy violations and produces reports to network administrators. IDS is in stealth mode. No network or computer systems are totally secure. That is the purpose of having IDS to sound alarms when it detects unauthorized access or unfortunately, someone managed to find a way through the firewalls. Authentication server To provide authentication services to users or other systems before determining if a certain privilege be granted to a particular user or system process. External firewalls To act as a boundary guard between the edge of the University s network and the outside world (Internet, Government networks, etc). To prevent any external attacks. Internal firewalls To protect the remainder of the network from attacks either from within the organization or from both internal and external DMZs (De Militarized Zone) of the network. DMZ is a good example of Defense-in-Depth by adding an extra layer of security/perimeter of the University s network. To provide enhanced security to UNSW s own network and as well as its links to different government departments, it is essential to have the best firewall configuration. In this case, I chose to use distributed firewall configuration. (See network diagram at end of this report)

UNSW s data sharing with government departments Data concerning student enrolment, fee payment and course progression are to be shared with three governmental departments with each department requiring different sets of information. As required, information is to be exchanged over an unsecure Internet channel (public network) rather than a dedicated network. Therefore, I will recommend using Virtual Private Network (VPN) to extend UNSW s intranet resources (Student information and financial records) to Departments of Education, Immigration and the Australian Tax Office. VPN offers encryption and authentication at the lower protocol layers to provide a secure connection. VPNs typically require remote users of the network to be authenticated, and often secure data with encryption technologies to prevent disclosure of private information to unauthorized parties. Although encryption may be performed by firewall software, I will employ the IPSec protocol for encryption. To support the large number of host computers and servers in the University s network, the IPSec will be implemented in front of the firewalls. This means traffic going out will be encrypted. If we were to implement IPSec behind the firewall, any VPN traffic will be encrypted passing in and out of the firewall and firewall will be unable to perform its filtering function, access control function, logging function or even scanning for viruses, etc. Placement of servers needed to be accessed by government departments In designing the network architecture, I was deciding if I should place the information servers/databases that are needed to be shared with the government departments inside an external DMZ together with the web server ( front door of the network). Since they are considered classified information, why are they inside an external DMZ? The more valuable a piece of information or resource is, the deeper it should reside within the network. What I forgot was that a server inside an external DMZ doesn t necessarily need to have public access or be publicly accessed. The external firewall can restrict public access to it while allowing the remaining UNSW network (LAN) to access them in order to update records so that the government departments are able to access.

Some significant firewall policies rules External firewall Allow incoming and outgoing Domain Name Service (DNS) traffic only to and from external DNS server. Allow any source HTTP connections to connect to the external Web Server. Allow incoming and outgoing mail (SMTP) traffic only to and from internal mail server. SMTP protocol uses TCP port 25. Therefore block all connections but allowed traffic use port 25 to pass. Since we are using VPNs, firewall should block ESP and AH except to and from specific addresses on the external DMZ and/or internal network. Both firewalls Firewalls shall not respond to any traffic, including ICMP PING, except SSH (TCP Port 22) protocol from internal firewall console machine managed by approved administrator. This is to deny an attacker s reconnaissance or his intentions to manipulate flow of network traffic. No host discovery allowed: This is to deter an attacker s port scanning activity to find any live hosts for target. In addition, close all unneeded ports and keep ports that are needed opened. Such as ports for SSH, Telnet, Email, HTTP, SSL, FTP, DNS and other application-based ports such as authentication, print traffic, etc. Implications of this security design Although DMZ allows servers that must be accessible to the Internet and at the same time protects resources and hosts on the secure internal network or Intranet, it will be more costly to implement a DMZ because of the hardware and software of the extra machines needed to implement a DMZ. One significant implication is that applications running in the external DMZ might need to access other servers/resource residing in the internal network and in this aspect, there will be a slight decrease in network performance. In terms of internal network, there will also be a slight decrease in network performance. However, regularly accessed servers such as students network drives are not affected as they are residing together with the host users in a protected internal network.

References ServerFault. (Mar 24, 2010). Should a webserver in the DMZ be allowed to access MSSQL in the LAN?. In ServerFault Q&A. Retrieved September 27, 2011, from http://serverfault.com/questions/125881/should-a-webserver-in-the-dmz-be-allowedto-access-mssql-in-the-lan. UNSW. (May 3, 2011). Jobs@UNSW. In UNSW Human Resources. Retrieved September 26, 2011, from http://www.hr.unsw.edu.au/services/recruitment/employment.html U of M Job Center. (Sep 8, 2010). Types of Positions at the University. In Universtiy of Minnesota office of Human Resources. Retrieved September 26, 2011, from http://www1.umn.edu/ohr/employment/types/index.html. Grade: 8/10 (Satisfactory with several outstanding elements) Comments: A good security design, however the report could be better presented and more reference could be made to security principles. Your report goes into a bit more detail than was required, which would be OK if you gave an abstract summary as well. But with no introduction or conclusion it was not very well presented. Multilevel security is often appropriate for documents, but seems quite inappropriate for something like student data. Not sure why you mentioned Telnet it is a highly insecure protocol. I don't really care what VPNs "typically" or "often" do I want to know how YOU propose to set up this VPN and why.