secure computing network

14
Secure Computing Network Team Excel Glenn Allison Michael Ehrenhofer Dan Hoadley Joe Mathew Bryan Tabiadon Raj Varma

Upload: sopoline-madden

Post on 30-Dec-2015

45 views

Category:

Documents


2 download

DESCRIPTION

Glenn Allison Michael Ehrenhofer Dan Hoadley Joe Mathew Bryan Tabiadon Raj Varma. Secure Computing Network. Team Excel. Key Objective. Goal Create a secure computing platform which enhances collaboration across the enterprise Strategy - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: Secure Computing Network

Secure Computing NetworkTeam Excel

Glenn AllisonMichael EhrenhoferDan HoadleyJoe MathewBryan TabiadonRaj Varma

Page 2: Secure Computing Network

Key Objective

• GoalCreate a secure computing platform which enhances

collaboration across the enterprise

• StrategyProvide wired and wireless network connectivity

which is secure and easy to use

• TacticsPeople – security awareness training

Process – on-boarding, troubleshooting, escalation

Technology – NAC, VPN, LDAP, WPA

Page 3: Secure Computing Network

Business RequirementsBusiness

• Add visitor, customer, and competitor access• Use non-company laptops on corporate network for

internet and internal application use• Visitor access to internet, VPN• Wireless access

Security• Protect corporate Intellectual Property• Principle of least privilege• Patch and anti-virus required• Wireless access to internal network prohibited

Page 4: Secure Computing Network

Technology ConsiderationsPro Con

Electronic badge •Limits access to buildings and certain rooms•Auditing is available

•Once in a building, access is open to most areas•Physical access to network available in empty offices, etc

LDAP login •Limits access to domain •Occurs after network access is granted•DHCP address granted to anyone

Active Directory groups

•Allows or restricts access to specific applications•Easy to maintain•Auditing available

•Can be easy to get added to a group

Separate networks •Limits access to subnet and specific IP’s and ports•May require additional authentication

•Requires additional infrastructure•Firewall rules can be complex

Network Access Control

•Prevents access to network without authentication•Policy-based access can limit access anywhere at a site

•Cost•Complex support•Blocking valid users

Encryption •Prevents reading data even if disclosed •Requires infrastructure•Support issues

Page 5: Secure Computing Network

Solution Overview

• Physical security• Limit access via Electronic badge to single building

• Active Directory Login (LDAP)• Required for Employee’s, Contractors, Customers• Not Required for Visitor access

• Network Access Control• Implement at site level to prevent wandering• Use RADIUS authentication to integrate with Active

Directory• Separate VLANs

Page 6: Secure Computing Network

Solution (cont.)

• Active Directory Groups• Create Site Contractor groups• Create Site Customer groups• Use with NAC to limit access to network• Use with Applications to limit access

• Separate Visitors network for internet access• Separate wireless physical infrastructure• Eliminate network cables in conference rooms• Employee’s VPN into Corporate network• No login required

Page 7: Secure Computing Network

Solution (cont.)

• E-Mail Encryption• PKI certificates to support S/MIME • Encrypted 3DES e-mail for secure internal

communications and external communications when required

• Policy• Documented and updated twice annually• Initial training required and annual refresher

• Procedures• Requires well documented troubleshooting steps• Help desk escalation• On and off-boarding must be accurate

Page 8: Secure Computing Network

High Level Architecture

AD/LDAP

Application

Radius NAC LAN

Printer

PC

WirelessLAN

Laptop(WiFi)

Page 9: Secure Computing Network

Cost Analysis

capital

Existing staff will be leveraged to support solution, so solution will have no additionalimpact to administrative budget. Annual maintenance is forecasted to be 15% of equipment capital, forecasted to be approximately $175K/yr.

NOTE: Solution is based on a single campus location with 1,692 employees. Based on $1.17M capital spend, and recurring cost of $175K per year, the average total cost per employee is $691/person (capital) and $103/person (expense).

Page 10: Secure Computing Network

Risks

• Risks• Additional cost for infrastructure required• Complex environment supported by different groups• Never completely eliminated

• Mitigation• Implementation will require additional training• Documentation, troubleshooting steps, escalation• Senior level awareness• Keep security top-of-mind awareness

Page 11: Secure Computing Network

Feasibility

• People• Awareness training requirement• Change management

• Process• Integration with existing process• Regular audits to validate compliance

• Technology• Industry standard• Minimal customization

Page 12: Secure Computing Network

Compliance

Key Driver is PCI Compliance, and ongoing SOX compliance

• Monitoring Compliance• Internal audits• External audits

• Change Control• All changes to infrastructure reviewed and

measured with formal change control

Page 13: Secure Computing Network

Considerations

• Solution can be adjusted for different level of risk industries

• Confidentiality

• Integrity

• Availability

• Authenticity

Page 14: Secure Computing Network

Questions?