Bridging Security and Identity...

28
Office of Information Technologies Christopher Misra April 2008 Bridging Security and Identity Management

Transcript of Bridging Security and Identity...

Page 1: Bridging Security and Identity Managementblogs.umass.edu/cmisra/files/2010/12/bridge-mware-sec.ppt.pdfBridging Security and Identity Management ! CAMP event • February 13–15, 2008

Office of Information Technologies

Christopher Misra

April 2008

Bridging Security and Identity Management

Page 2: Bridging Security and Identity Managementblogs.umass.edu/cmisra/files/2010/12/bridge-mware-sec.ppt.pdfBridging Security and Identity Management ! CAMP event • February 13–15, 2008

2

Bridging Security and Identity Management

§  CAMP event •  February 13–15, 2008 •  Tempe Mission Palms, Tempe, Arizona

§  This workshop offered interactive education and guidance to higher education CIOs and IT managers, IAM architects, security professionals, and application developers.

§  Institutions sent cross-functional teams, particularly from the IAM and security areas, to work through the planning process together.

§  http://www.educause.edu/camp081

Page 3: Bridging Security and Identity Managementblogs.umass.edu/cmisra/files/2010/12/bridge-mware-sec.ppt.pdfBridging Security and Identity Management ! CAMP event • February 13–15, 2008

3

Bridging Security and Identity Management

§  How do we enhance privacy and security through identity management?

§  How do we enhance compliance activities through identity management?

§  How do we secure and protect our identity management infrastructure from rogue applications?

§  What does it mean to move application security over to our identity management systems?

§  What does federated identity management mean in terms of privacy, security, and compliance?

Page 4: Bridging Security and Identity Managementblogs.umass.edu/cmisra/files/2010/12/bridge-mware-sec.ppt.pdfBridging Security and Identity Management ! CAMP event • February 13–15, 2008

4

Common Goals

§  Security services traditionally focus on preventing badness •  protective, defensive and reactive tools and techniques.

§  Middleware provide infrastructure services that enhance security •  identification, authentication, and authorization.

§  A comprehensive security architecture is necessary to align these services to meet an organization's security needs.

§  We are trying to solve many of the same problems

Page 5: Bridging Security and Identity Managementblogs.umass.edu/cmisra/files/2010/12/bridge-mware-sec.ppt.pdfBridging Security and Identity Management ! CAMP event • February 13–15, 2008

5

Traditional Middleware Drivers

§  Services that enable secure access to networks, services, and applications •  Identification •  Authorization •  Authentication •  Directories •  Audit

§  Leveraging enterprise identity and access data to enable business processes

Page 6: Bridging Security and Identity Managementblogs.umass.edu/cmisra/files/2010/12/bridge-mware-sec.ppt.pdfBridging Security and Identity Management ! CAMP event • February 13–15, 2008

6

Current threat environment

§  We have traditionally focused our security efforts on systems •  Managed or unmanaged

§  The current and emerging threat environment changes some of our focus to data and privilege •  Web-based application assessment

•  Cross-site scripting, SQL injection •  Data leakage and extrusion prevention

•  The risk is in the data, not just the systems •  Privilege escalation

•  Who manages the assignment of privilege?

Page 7: Bridging Security and Identity Managementblogs.umass.edu/cmisra/files/2010/12/bridge-mware-sec.ppt.pdfBridging Security and Identity Management ! CAMP event • February 13–15, 2008

7

Security or Middleware?

§  How do campuses securely provide access to these applications? •  Identity and Access Management systems

§  How do we detect abuse of these applications? •  Audit •  Log correlation and data orchestration

§  Why is this our problem? •  Aren’t you the Information security officer? •  Who gets the phone call when data leaks?

Page 8: Bridging Security and Identity Managementblogs.umass.edu/cmisra/files/2010/12/bridge-mware-sec.ppt.pdfBridging Security and Identity Management ! CAMP event • February 13–15, 2008

8

The changing security landscape

§  In security we have a continually changing landscape •  Network worms aren’t very interesting any more •  We can detect and shut off a port scanner in minutes

§  Vendor patches have solved many of our Operating System problems •  Sometimes very slowly

§  Application vulnerabilities abound •  Cataloging which applications we own and/or operate is

a daunting task •  Securing these applications is more daunting

Page 9: Bridging Security and Identity Managementblogs.umass.edu/cmisra/files/2010/12/bridge-mware-sec.ppt.pdfBridging Security and Identity Management ! CAMP event • February 13–15, 2008

9

Current threat environment

§  I won’t claim that we have solved all of our systems security problem •  Otherwise known as job preservation

§  However, the environment has changed. The focus should be on the behavior that we don’t understand or manage as well •  Everyone wants their own application •  Those who operate these applications frequently do not

have a strong security background •  Assignment of privilege is decentralized and often

poorly managed

Page 10: Bridging Security and Identity Managementblogs.umass.edu/cmisra/files/2010/12/bridge-mware-sec.ppt.pdfBridging Security and Identity Management ! CAMP event • February 13–15, 2008

10

How do security and middleware intersect?

§  We’ve built strong defenses against those outside our organization •  And those we don’t trust inside our organization

(ResNet, certain Departments) §  Data leakage occurs from inside as often as

outside •  Faculty posting FERPA protected data on public websites •  Staff posting financial data publicly

§  Understanding how privilege is granted and managed is key to defending these data and information services

Page 11: Bridging Security and Identity Managementblogs.umass.edu/cmisra/files/2010/12/bridge-mware-sec.ppt.pdfBridging Security and Identity Management ! CAMP event • February 13–15, 2008

11

Where do security staff see concerns?

§  SQL injection attacks aside, who provisions access to your critical applications? •  How secure are those provisioning applications? •  Can you locate and parse the logs and audit trails?

§  All these applications and authentication services generate a lot of logs •  Can you correlate across these disparate applications

and authentication logs? •  Can you further correlate these applications against

network-centric data sources?

Page 12: Bridging Security and Identity Managementblogs.umass.edu/cmisra/files/2010/12/bridge-mware-sec.ppt.pdfBridging Security and Identity Management ! CAMP event • February 13–15, 2008

12

Middleware we all know

§  Authentication systems •  Password files, Kerberos, Directory services (LDAP) •  Logs that we use daily to identify those who chose the

dark side •  Or just can’t manage their own workstation

§  Authorization systems •  Southwestern Netreg, CMU Netreg, etc •  Perhaps not strictly authorization, but they associate a

privilege with an entity (or identity) •  User bob registered (authorized) this device on the

campus network •  Again used daily

Page 13: Bridging Security and Identity Managementblogs.umass.edu/cmisra/files/2010/12/bridge-mware-sec.ppt.pdfBridging Security and Identity Management ! CAMP event • February 13–15, 2008

13

Middleware we might already

§  Data orchestration •  GULP •  Correlating the behavior of a user across disparate

systems and networks •  Understanding how a user should behave

§  Audit systems •  SIM/SEM

•  If you have the budget or programmers •  NetFlow

•  Not middleware, but a correlation point we use to map bad behavior to other sources.

Page 14: Bridging Security and Identity Managementblogs.umass.edu/cmisra/files/2010/12/bridge-mware-sec.ppt.pdfBridging Security and Identity Management ! CAMP event • February 13–15, 2008

14

Middleware we may come to love (or hate)

§  Weblogin •  Pubcookie, Cosign, JASIG CAS, etc •  Web-based authentication services •  Limited disclosure of user credentials to less trusted

applications •  Often cookie-based tokens encrypted with symmetric

keys shared between the application and the weblogin service

•  Some provide authorization functionality

Page 15: Bridging Security and Identity Managementblogs.umass.edu/cmisra/files/2010/12/bridge-mware-sec.ppt.pdfBridging Security and Identity Management ! CAMP event • February 13–15, 2008

15

Middleware we may come to love (or hate)

§  Shibboleth •  “standards-based, open source middleware software

which provides Web Single SignOn (SSO) across or within organizational boundaries.”

http://shibboleth.internet2.edu/ •  Web-based authentication and policy-based attribute

exchange framework for authorization •  Can also leverage existing weblogin services

•  Provides both campus-based and inter-campus federated authentication and authorization

•  Highly privacy preserving •  Which can make incident response more challenging

Page 16: Bridging Security and Identity Managementblogs.umass.edu/cmisra/files/2010/12/bridge-mware-sec.ppt.pdfBridging Security and Identity Management ! CAMP event • February 13–15, 2008

16

Middleware we may come to love (or hate)

§  Signet •  A privilege management service •  Provides centralized management of user privileges

across a range of applications. •  a standard user interface for privilege administrators •  integration with core campus organizational data •  improved visibility, understandability, and auditability of

privilege information

Page 17: Bridging Security and Identity Managementblogs.umass.edu/cmisra/files/2010/12/bridge-mware-sec.ppt.pdfBridging Security and Identity Management ! CAMP event • February 13–15, 2008

17

Middleware Definitions

§  Federations •  “A federation is an association of organizations that use

a common set of attributes, practices and policies to exchange information about their users and resources in order to enable collaborations and transactions”

http://www.incommonfederation.org/docs/guides/faq.cfm

•  Fundamentally a policy construct

•  Combined with a technical toolset •  Often implemented with the Shibboleth toolset in R&E

networks •  Provides access to local campus resources to users from

remote institutions

Page 18: Bridging Security and Identity Managementblogs.umass.edu/cmisra/files/2010/12/bridge-mware-sec.ppt.pdfBridging Security and Identity Management ! CAMP event • February 13–15, 2008

18

What concerns me about middleware?

§  Federations •  Seem to be fairly unstoppable

•  And I argue to strongly support them on my campus •  But it means my user base no longer includes only

individuals that are directly affiliated with my campus •  For web applications •  For network access

•  How do I identify a user from a remote institution •  Especially in the environment of a privacy-preserving

technology like shibboleth •  How do I handle an incident when the offending user

belongs to another campus •  And I may not even know their username

Page 19: Bridging Security and Identity Managementblogs.umass.edu/cmisra/files/2010/12/bridge-mware-sec.ppt.pdfBridging Security and Identity Management ! CAMP event • February 13–15, 2008

19

What I like about middleware

§  Integrating incident response workflow with institutional IdM infrastructure •  Leveraging campus directory services to provide more

timely and accurate incident notification •  Integrating incident response in the campus workflow

applications (Remedy, RT) §  Federations

•  Policy-based management of privilege for intra and inter-institutional applications and resources •  Privileges may no longer be provisioned by the grad

student in the chemistry department who hasn’t worked here in 5 years.

•  But there remains a lot of work to get here

Page 20: Bridging Security and Identity Managementblogs.umass.edu/cmisra/files/2010/12/bridge-mware-sec.ppt.pdfBridging Security and Identity Management ! CAMP event • February 13–15, 2008

20

What I like about middleware

§  Log correlation and data orchestration •  There are two presentations here today specifically

focusing on the value and use cases for managing these data well

•  And deriving actionable knowledge from them

§  Audit trails •  IdM systems provide a better mechanism of

enumerating goodness •  For credential provisioning and privilege management

§  Additive to traditional security mechanisms •  These tools and technologies improve operational

security awareness

Page 21: Bridging Security and Identity Managementblogs.umass.edu/cmisra/files/2010/12/bridge-mware-sec.ppt.pdfBridging Security and Identity Management ! CAMP event • February 13–15, 2008

21

What else can we do with middleware

§  Asset identification •  Knowing what assets you are trying to protect is a

precondition to properly securing them •  Determining ownership and responsible parties facilitate

incident response and remediation •  Integrating asset identification with campus identity

management lifecycles ensure continuity of responsibility

Page 22: Bridging Security and Identity Managementblogs.umass.edu/cmisra/files/2010/12/bridge-mware-sec.ppt.pdfBridging Security and Identity Management ! CAMP event • February 13–15, 2008

22

Confidential Data Handling Blueprint 1.  Create a security risk-aware culture that includes an information

security risk management program 2.  Define institutional data types 3.  Clarify responsibilities and accountability for safeguarding

confidential/sensitive data 4.  Reduce access to confidential/sensitive data not absolutely

essential to institutional processes 5.  Establish and implement stricter controls for safeguarding

confidential/sensitive data 6.  Provide awareness and training 7.  Verify compliance routinely with your policies and procedures From: https://wiki.internet2.edu/confluence/display/secguide Middleware can not be extracted from this process,

compliance may be the bridging function

Page 23: Bridging Security and Identity Managementblogs.umass.edu/cmisra/files/2010/12/bridge-mware-sec.ppt.pdfBridging Security and Identity Management ! CAMP event • February 13–15, 2008

23

Themes and conclusions

§  Security and Middleware staff need to be engaged with IdM design and implementations •  Working with them now may both prevent bad things

and even facilitate good things •  We are probably trying to solve some of the same

problems §  Educating your user community about realigned

middleware drivers is in our collective interest •  Preventing data leakage from poorly managed

applications and authorizations

Page 24: Bridging Security and Identity Managementblogs.umass.edu/cmisra/files/2010/12/bridge-mware-sec.ppt.pdfBridging Security and Identity Management ! CAMP event • February 13–15, 2008

24

Themes and conclusions

§  Federations need to be understood in the context of operational security needs •  How aware are security staff of current federation

activities on your campus? •  Embracing these technologies may improve our overall

security posture §  Identity Management is a complementary

technology to our security toolkits •  Integrating business processes with security

requirements •  Authentication and authorization are a necessary, but

not sufficient, condition for secure applications

Page 25: Bridging Security and Identity Managementblogs.umass.edu/cmisra/files/2010/12/bridge-mware-sec.ppt.pdfBridging Security and Identity Management ! CAMP event • February 13–15, 2008

25

Themes and conclusions

§  Audit and log correlation will allow us to maintain situational awareness •  In our increasingly complex environments •  Additional abstraction layers is rendering many

traditional detective techniques less effective •  Orchestrating logs across systems provides visibility

that many of us don’t currently have §  Privilege management

•  Assignment of authorizations places more of our data at risk of disclosure

•  A next step in incident handling

Page 26: Bridging Security and Identity Managementblogs.umass.edu/cmisra/files/2010/12/bridge-mware-sec.ppt.pdfBridging Security and Identity Management ! CAMP event • February 13–15, 2008

26

Themes and conclusions

§  Some institutions have organized information security and identity management under a single management structure •  Though this is limited in scope currently, this may be an

emerging theme §  Business continuity is going to be dependent

upon robust IdM infrastructures §  Data Security and IdM are intrinsically

intertwined •  When the data breach occurs, whether the vector was

an IdM failure of Infosec failure is irrelevant.

Page 27: Bridging Security and Identity Managementblogs.umass.edu/cmisra/files/2010/12/bridge-mware-sec.ppt.pdfBridging Security and Identity Management ! CAMP event • February 13–15, 2008

27

Themes and conclusions

§  Privacy and compliance •  Identity and Access Management (IAM) is used to reduce

exposure of PII and other important resources and services §  Threat analysis and risk mitigation

•  IAM and related functions of logging, tracking, and provisioning access are critical

§  Scalability •  To scale all of this requires an eye toward reducing

complexity, which IAM does by correlating identity and access across campus applications and systems and enabling the consistent application of institutional policy.

§  Each of these requires a bridge between security and identity management.

Page 28: Bridging Security and Identity Managementblogs.umass.edu/cmisra/files/2010/12/bridge-mware-sec.ppt.pdfBridging Security and Identity Management ! CAMP event • February 13–15, 2008

28

Questions?