IT-Security at Karlsruhe Institute of Technology Introduction. Andreas Lorenz. www.kit.edu STEINBUCH CENTRE FOR COMPUTING - SCC

Similar documents
Energy research at KIT

Steinbuch Centre for Computing (SCC) The Information Technology Centre of KIT

IBM Security. Alle Risiken im Blick und bessere Compliance Kumulierte und intelligente Security Alerts mit QRadar Security Intelligence

The cloud storage service bwsync&share at KIT

Fraunhofer Institute for Secure Information Technology App Rasterfahndung: auf der Suche nach Sicherheitsqualität

SimLabs at KIT, a Strategy for the Future

Network and Security Controls

Commercial Practices in IA Testing Panel

KIT Site Report. Andreas Petzold. STEINBUCH CENTRE FOR COMPUTING - SCC

Solutions for energy efficient buildings and cities

Image Data, RDA and Practical Policies

INFORMATION SECURITY Humboldt State University

Cloud Performance Group 1. Event. 14. Januar 2016 / Matthias Gessenay (matthias.gessenay@corporatesoftware.ch)

ISO/IEC 27001:2013 Thema Änderungen der Kontrollen der ISO/IEC 27001:2013 im Vergleich zur Fassung aus 2005 Datum

Safe Harbor Statement

Lustre tools for ldiskfs investigation and lightweight I/O statistics

POSTAL REGULATORY COMMISSION

Additional Security Considerations and Controls for Virtual Private Networks

Cybersecurity Kill Chain. William F. Crowe, CISA, CISM, CRISC, CRMA September 2015 ISACA Jacksonville Chapter Meeting August 13, 2015

SOLARIS 10 SECURITY. Technical Overview. Andreas Neuhold Systems Practice Lead Austria Sun Microsystems, GesmbH

Utica College. Information Security Plan

The Helmholtz Alliance for Astroparticle Physics

Network Security Policy

Network Security Policy

OPP CITY SCHOOLS JOB DESCRIPTION. (1) Master s degree from an accredited educational institution.

Cloud Roadmap to Success. October, 2014

A MULTIFACETED CYBERSECURITY APPROACH TO SAFEGUARD YOUR OPERATIONS

INFORMATION SECURITY GOVERNANCE ASSESSMENT TOOL FOR HIGHER EDUCATION

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:

SECURITY REDEFINED. Managing risk and securing the business in the age of the third platform. Sabine Bendiek, Geschäftsführerin EMC Deutschland GmbH

Director Global IT Service Delivery Information Services

ISS X-Force. IBM Global Services. Angel NIKOLOV Country Manager BG, CZ, HU, RO and SK IBM Internet Security Systems

A HELPING HAND TO PROTECT YOUR REPUTATION

Client Security Risk Assessment Questionnaire

The KOALA Cloud Management Service

2009 NASCIO Recognition Awards Nomination. A. Title: Sensitive Data Protection with Endpoint Encryption. Category: Information Security and Privacy

Testen mit Produktionsdaten Fluch oder Segen?

SIMATIC Remote Services. Industry Services

IT SECURITY EDUCATION AWARENESS TRAINING POLICY OCIO TABLE OF CONTENTS

2015 Global Study on IT Security Spending & Investments

Introduction. Purpose. Reference. Applicability. HIPAA Policy 7.1. Safeguards to Protect the Privacy of PHI

INFORMATION SECURITY California Maritime Academy

The STAGEnet Security Model

UF IT Risk Assessment Standard

Security Controls What Works. Southside Virginia Community College: Security Awareness

Personal Security Practices of the CAO

Mobile device Management mit NAC

The Protection Mission a constant endeavor

Dokument Nr. 521.dw Ausgabe Februar 2013, Rev Seite 1 von d Seite 1 von 11

Netzwerkvirtualisierung? Aber mit Sicherheit!

Central Agency for Information Technology

Access control policy: Role-based access

Managing Information Resources and IT Security

Open Access Publishing to Support Geothermal Research

University of Wisconsin-Madison Policy and Procedure

Enterprise SM VOLUME 1, SECTION 5.1: MANAGED TIERED SECURITY SERVICES

CDW Advanced Image Deployment Service Customer Guide

Log Management How to Develop the Right Strategy for Business and Compliance. Log Management

Self defending networks?

GERMAN UNIVERSITIES LIAISON OFFICES NEW YORK

Firewalls, Tunnels, and Network Intrusion Detection

Sample Employee Network and Internet Usage and Monitoring Policy

Security + Certification (ITSY 1076) Syllabus

Policy. London School of Economics & Political Science. Application Control. Jethro Perkins Information Security Manager IMT

VENDOR RISK MANAGEMENT UPDATE- ARE YOU AT RISK? Larry L. Llirán, CISA, CISM December 10, 2015 ISACA Puerto Rico Symposium

Junos Pulse. Uwe Nelkel Business Development Manager Junos Pulse. IBM Golf Cup, Golfclub Holledau, September 14 th 2011

How To Understand And Understand Rwth Aachen University

Patch Management. Is it recommended to patch an Industrial Automation Control System and, if so, why? Siemens AG All Rights Reserved.

Smart Data Innovation Lab (SDIL)

Citrix Enterprise Mobility more than just device management (MDM)

Industrie 4.0. Towards a Holistic Approach for Cyber Safety and Security

JEFFERSON LAB Unclassified Foreign Visits & Assignments Program GENERIC SECURITY PLAN For Assignments

Security Control Standard

The Oracle Mobile Security Suite: Secure Adoption of BYOD

Supplier Security Assessment Questionnaire

Transcription:

IT-Security at Karlsruhe Institute of Technology Introduction Andreas Lorenz STEINBUCH CENTRE FOR COMPUTING - SCC KIT University of the State of Baden-Württemberg and National Laboratory of the Helmholtz Association www.kit.edu

Agenda KIT Mission Organization Scientific Topics IT-Security in the Organization IT-Security Policy Cooperation IT-Security, Data Protection and IT- Compliance KIT-CERT 2 10.09.2010 Andreas Lorenz IT-Security at Karlsruhe Institute of Technology

KIT: One Institution, Two Missions Mission of a state university with research and teaching Mission of a research institution of the Helmholtz Association with program oriented provident research Employees 8.500 19.700 Students 364 Professors Annual Budget in Million Euros 482 Trainees 3 10.09.2010 Andreas Lorenz IT-Security at Karlsruhe Institute of Technology

KIT: Common Objective Positioning as an institution of excellent research and teaching in natural and engineering sciences on an international scale, with scientific excellence and worldwide top level in Research Teaching Innovation IT-Security and Service Management Prerequisite: Excellent infrastructure and service units. 4 10.09.2010 Andreas Lorenz IT-Security at Karlsruhe Institute of Technology

KIT: Fields, Centers and Focusses 30 Fields of Competence Bundled in 6 Areas of Competence Matter and Materials Earth and Environment Applied Life Siences Systems ans Processes Information, Communication und Organization Technology, Culture and Society KIT Centers: Energy Nano & Micro Science and Technology Elementary Particle and Astroparticle Physics Climate and Environment KIT Focuses: COMMputation Mobility Systems Optics and Photonics Humans and Technology Secure IT-based Solutions! 5 10.09.2010 Andreas Lorenz IT-Security at Karlsruhe Institute of Technology

SCC: IT-Security in the Organization 6 10.09.2010 Andreas Lorenz IT-Security at Karlsruhe Institute of Technology

SCC: IT-Security Tasks of ISM Operation and Development IT-Security Management IT-Security Officer Organizational Aspects ASDUR Organizational Aspects Definition of Policies Organizational Aspects Patchmanagement Awareness Operation and Development IT-Security Services KIT-CERT Organizational Aspects KIT-CA Encryption Concept / Operation&Development Platform Intrusion Detection Systems /Intrusion Prevention Systems Security Assesments Desktop Security 7 10.09.2010 Andreas Lorenz IT-Security at Karlsruhe Institute of Technology Organisationseinheit, Autor 23.09.2010 7

KIT: IT-Security Policy Details low Changes rare IT-Security Guideline (CIO) Common Security Conception (IT-Security Officer) IT-Security Concept IT-Security Policies high Technical Advisories (IT-Security Team) often 8 10.09.2010 Andreas Lorenz IT-Security at Karlsruhe Institute of Technology

KIT: IT-Security Guideline November 2009 Assets to Protect Organization Presidium / CIO IT-Committees IT-Security Officer Cooperation IT- Security, Data Protection and IT- Compliance SCC and IT-Security Team (KIT-CERT) Users IT-Security Process 9 10.09.2010 Andreas Lorenz IT-Security at Karlsruhe Institute of Technology

KIT: IT-Security Officer Coordination Definition of IT-Security Concept and Backout Concepts Security-Relevant Projects; Informationflow between persons in charge Initiating and Controlling Actionplan to implement IT-Security Measures IT-Security Awarenesscappaigns- and Trainings Initiating and Coordination Definition of IT-Security Policies Coordination and Controlling IT-Security Process Inspecting Security Incidents Supporting CIO by Definition of IT-Security Guideline Reporting CIO and IT-Security Team 10 10.09.2010 Andreas Lorenz IT-Security at Karlsruhe Institute of Technology

KIT: ASDUR Arbeitsstab IT-Sicherheit, Datenschutz und IT-Rechtskonformität Cooperation between IT-Security, Data Protection and IT-Compliance at an early stage of a project Lead by CIO Interdisciplinary Key Issues IT-Security Data Protection IT-Compliance Development of Advices Strategic Policies Strategic Regulations Members CIO IT-Security Officer Data Protection Officer Jurisconsult Users Administration Scientists Staff Council 11 10.09.2010 Andreas Lorenz IT-Security at Karlsruhe Institute of Technology

KIT: IT-Security Process Preparation Strategic Decissions User Interests KIT-Presidium Data Protection ASDUR IV-A (IT-Comitee) IT-Security SCC IT- Compliance Preparation Technical Decission 12 10.09.2010 Andreas Lorenz IT-Security at Karlsruhe Institute of Technology, Adrian Wiedemann 23.09.2010 12

ASDUR: Task Usergroups Netzzugriff auf das Internet (ab Campus KIT) Netzzugriff auf das Intranet (Netzwerk, kein Inhalt) Inhalte (Web, File,...) VPN / Remote Access Email KIT Email (nicht kit.edu) Portalbereich (geschützt) Nutzung Software Lizenzen Rechenleistung Datenhaltung Nutzung von Terminaldiensten (ssh etc.) / Zugriff auf lokale Rechner Business Class Mitarbeiter A1 A6 Mitarbeiter - entbunden A4 A4 A1 A4 A4 A4 A4 A4, A6 A4 A4 A4 Studierende r A1 A6 Gasthörer/S chüler A3 A3 A1 A3 A3 A3 A3, A6 A3 A3 A3 Lehrender A1 A6 Förderer A6 Gast - mitarbeitend A2 A2 A2 A2 A2 A2, A6 A2 A2 A2 Gast A6 Extrener - mitarbeitend A1 A6 Externer A5 Markierung: verboten (rechtlich) mit Auflagen erlaubt erlaubt verboten (KIT- Regelwerk) Rechtliche Unsicherheit 13 10.09.2010 Andreas Lorenz IT-Security at Karlsruhe Institute of Technology

KIT-CERT Computer Emergency Response Team central authority for issues concerning IT security and coordination in the field of computer abuse in KIT Reactive Services Coordination of security or abuse-related investigations Incident response on imminent security breaches Computer-forensic investigations Proactive Servcies Operating network security systems on various layers Monitoring network traffic for malicious activity Consulting Services Counseling on topics concerning information-security Publishing reports on specific topics for KIT Collaboration regarding the creation and publication of security policies 14 10.09.2010 Andreas Lorenz IT-Security at Karlsruhe Institute of Technology

KIT-CERT 15 10.09.2010 Andreas Lorenz IT-Security at Karlsruhe Institute of Technology

Thank you for your attention andreas.lorenz@kit.edu STEINBUCH CENTRE FOR COMPUTING - SCC KIT University of the State of Baden-Württemberg and National Laboratory of the Helmholtz Association www.kit.edu