home *** CD-ROM | disk | FTP | other *** search
-
-
- CURRENT_MEETING_REPORT_
-
-
-
- Reported by Joyce K. Reynolds/ISI and J. Paul Holbrook/ CERT
-
- Agenda
-
-
- 1. SSPHWG Charter
- 2. Discussion on current security policy and relationship to the
- Security Policy Working Group (SPWG).
- 3. Goals and directions of the SSPHWG (strawman proposal by J. Paul
- Holbrook)**.
- **NOTE: The strawman proposal is included at the end of this
- report.
- 4. Needs and requirements.
- 5. Timeframe for writing and submission for publication of the
- handbook.
- 6. Review of plans/action items for next round of meetings.
-
- (a) Next meeting in Los Angeles, Tuesday, June 12th at
- USC/Information Sciences Institute.
- (b) Next IETF meeting in August at University of British Columbia.
-
-
- Needs:
-
- If there is a ``real threat'', who are the legitimate contact points:
-
-
- o technical
- o administrative
-
- Phone Calls to Site(s) Three scenarios presented. You are at your site
- and a someone calls, stating that:
-
- 1. They have a worm program, and would like permission to unleash it
- onto your site's network.
- 2. They are the F.B.I., and are calling with the notification of
- intrusion into your site - F.B.I. suggests to keep the net open to
- watch the intruder.
- 3. He is a hacker. The hacker states that he has capability to crack
- your site's passwords, etc.
-
- What procedures and policies should be in place so that you and your
- site can deal with the above situations?
-
-
- WHO YA GONNA CALL???
-
- WHAT ARE THE LEGAL IMPLICATIONS??
-
- 1
-
-
-
-
-
-
- Overview
-
- Who are the customers of our Handbook:
-
- o system administrators
- o site decision makers
- o site auditing the teams (?)
-
- This Handbook will NOT be a guide on how to do:
-
-
- o risk assessment
- o contingency planning
-
-
- This Handbook will promote and encourage people to hook into already
- existing mechanisms, even if the site doesn't have security procedures
- in place. They may have emergency procedures and policies that could be
- relevant.
-
- Focus on things related to the network:
-
- o prevention
- o response
- o cleanup/followup
-
- Assumptions:
-
- o network-connected
- o hosts
- o network devices
- - terminal servers
- - modems
-
- Point out ``natural'' conflicts that will occur.
-
- Physical security statement in this handbook (??) We could point out
- some of the risks.
-
- o What kinds of items should be in the handbook??
- o What issues should be addressed??
-
-
-
- 2
-
-
-
-
-
-
- List and discussion of issues
-
-
- 1. Physical Security
- 2. Site Security Boundary
-
- o Model : definition of terms
- o Clues on what to do when you must cross organizational
- boundaries:
- o defining contact points
- (a) technical
- (b) administrative
- (c) response teams
- (d) investigative
- o Invisible/Visible
- (a) legal
- (b) vendors (products or providers)
- (c) press (policy and procedures)
- (d) service providers
-
- 3. Updates
- o Procedures
- o Tools
- 4. Education of Users
- 5. Historical (collection of information) [collection and protection
- of evidence] [facts versus assumption or -----]
- 6. Policy issues (Privacy)
- 7. System Administrator's and Network Administrator's rights,
- responsibilities, AND liabilities
- 8. Rights and responsibilities of Users
- 9. Formal and Informal legal procedures
-
- o local security/police
- o FBI, Secret Service, etc.
- o Verification of contact
-
- 10. Concept of ``Inter-net'', ``Outer-net''
- o circles of trust
- o ``firewall'' type concepts
- 11. Procedures with working with response teams
- 12. Participation in ``drills'' (?)
- 13. ``Security'' of the communications lines (phones, etc.)
- 14. ``Insider'' threats to the site
- 15. Welcome banners (?)
- o is the access really authorized?
- o how do you know if you're authorized?
- 16. Guidelines for acceptable use?
- 17. Configuration management
-
- o passwords
- o bug fixes
-
- 18. Tools
-
-
- 3
-
-
-
-
-
-
- o preventive
- o response
- o inventory of tools?
- 19. Education
- o legal
- o administrators
- o users (How do they deal with different kinds of threats and
- risks?
- 20. Decision making authority
-
- o WHO is authorized to make what decisions?
- o WHAT authority do administrators have?
- o Layout for different cases for example: call in legal
- investigator, or remove a user
- o ``License to hack'' MUST be authorized in advance??
- o Tiger Teams
-
- 21. Emergency response
- 22. Resources
- o other security devices
- o other books/lists/informational sources
- o form a subgroup?
-
-
- SSPHWG volunteers will take on the task of developing a draft outline to
- be presented at the next SSPHWG meeting at USC/Information Sciences
- Institute in Marina del Rey on Tuesday, June 12th. The SSPHWG will be
- also be meeting at the next IETF plenary at University of British
- Columbia.
-
-
-
- 4
-
-
-
-
-
-
- The following document was sent out to the SSPHWG mailing list several
- days before the meeting. Discussion of this document lead into the
- other items noted in the minutes above. There was no specific action on
- this document, as it was intended mainly to make sure everyone agreed
- with the general direction of the group.
-
- GOALS AND DIRECTIONS OF THE SSPHWG -- A STRAWMAN by J. Paul Holbrook
-
- THE NEED
-
- Why is there a need for a handbook like this? Looking at some of the
- needs may help us understand what kind of product we want to produce.
-
- As a member of the CERT, I've come in contact with many sites trying to
- deal with computer security problems. It's often a rude shock when they
- discover someone has compromised their systems. Even for sites that
- have a good technical understanding of how to keep their systems secure,
- there are often policy questions that they haven't addressed. These
- policy issues make dealing with the incident much more difficult. Once
- the incident is over, the push to 'make sure this doesn't happen again'
- can result in policy made in hast; these policies can be more
- restrictive and cumbersome than they need to be.
-
- A computer security compromise has much in common with any other
- computer 'disaster' such as an equipment breakdown or a fire. You need
- to have plans in place to prevent the problem, to deal with the problem
- while it's happening, and to deal with the consequences after the fact.
- Although it may seem over-dramatic to compare a security compromise to a
- fire, the effect a malicious intruder could have on a site's operations
- could be devastating.
-
- Another way to look at the question of 'need' is to turn it around: why
- should any site (especially an academic site) care about creating a
- computer security policy and procedures?
-
-
- o There is a real threat out there. Intruders are using common holes
- to break into systems. Sites need to understand what the threats
- and risks are.
- o Policies and procedures help you maintain the environment you want.
- Many organizations value open communication and sharing. One
- security incident, and "the powers that be" could force a site into
- a more closed environment. Policies show that you are aware of the
- problem and are taking steps to deal with it.
- o Policies help guide cost-effective decisions. An academic site may
- decide that the cost of dealing with an incident doesn't warrant
- spending lots of time or money on defenses. A business may make a
- different decision.
- o Policies And Procedures clarify responsibility and authority. Do
- you have the authority to look at a student's files? If so, do
- students know that?
-
-
- 5
-
-
-
-
-
-
- THE CUSTOMERS OF THIS WORK
-
- Customers of what we're trying to do:
-
-
- o Systems administrators
- o Site decision makers
- o this includes administrators (in the traditional sense), managers,
- policy makers. The people who have the 'official' word on what
- goes on at a site
-
-
- Some people who are explicitly not customers:
-
- o Programmers
- o End users
-
- We don't need to produce a recommended set of security policies and
- procedures. The IETF Security Policy Working Group (SPWG) is working on
- that goal. Instead, what we we will produce is a set of guidelines and
- issues that policy makers will need to consider when they make their own
- policies and guidelines. This should be a tool to help people
- understand the need for security procedures and policies and how to go
- about creating them. We can include suggestions where appropriate, but
- much of the specifics of what a site decides to do will depend on the
- local circumstances. A university might make different choices about
- security from a government research lab.
-
- THE OUTPUT OF THE GROUP
-
- We hope to produce a guide to the kinds of problems sites might face,
- the issues they should consider, and guidelines to the kinds of steps
- they can take to preventing and dealing with security problems. This
- handbook could be published as an RFC or an FYI.
-
- Over time, this handbook might expand to become a more general reference
- on site computer security. Some of the things that might be included:
-
-
- o suggested policies and procedures (perhaps whatever the Security
- policy WG produces)
- o bibliographies of other information to read
- o pointers to tools to help with site security
-
-
-
- 6
-
-
-
-
-
-
- ATTENDEES
-
- Stan Ames sra@mbunix.mitre.org
- Tom Bajzek twb@andrew.cmu.edu
- Pat Barron pat@transarc.com
- Glee Cady ghc@merit.edu
- Jeff Carpenter jjc@unix.cis.pitt.edu
- John Cavanaugh john.cavanaugh@stpaul.ncr.com
- Andrew Cherenson arc@sgi.com
- Richard Colella colella@osi3.ncsl.nist.gov
- Curtis Cox zk0001@wnyosi4.navy.mil
- Steve Crumb scrumb@mot.com
- Hunaid Engineer hunaid@opus.cray.com
- James Galvin galvin@tis.com
- Jonathan Goldick goldick!b.psc.edu
- Martyne Hallgren martyne@tcgould.tn.cornell.edu
- Greg Hollingsworth gregh@mailer.jhuapl.edu
- Tracy Laquey tracy@emx.utexas.edu
- Marilyn Martin martin@cdnnet.ca
- Donald Morris morris@ucar.edu
- Gerard Newman gkn@sds.sdsc.edu
- Marc-Andre Pepin pepin@crim.ca
- Marsha Perrott mlp@andrew.cmu.edu
- Richard Pethia rdp@sei.cmu.edu
- Tod Pike tgp@sei.cmu.elu
- Michael Reilly reilly@nsl.dec.com
- Robert Reschly reschly@brl.mil
- Tim Seaver tas@mcnc.org
- Pat Smith psmith@merit.edu
- Mary Stahl stahl@nisc.sri.com
- Allen Sturtevant sturtevant@ccc.nmfecc.gov
- C Wood cpw@lanl.gov
- Aileen Yuan aileen@gateway.mitre.org
-
-
-
- 7
-