 |
|
OF RECORD
Critical PennNet Host Security Policy
Effective: January 1, 2001
Authority and Responsibility
Information Systems and Computing's Information Security organization
is responsible for establishing information security policies, guidelines
and standards and therefore has the authority and responsibility to specify
security requirements for critical hosts or any workstation that can potentially
affect other users connected to PennNet.
Executive Summary
This policy describes the requirements and constraints for attaching
and securing a critical computer to PennNet. It also provides "best
practice" recommendations to guide systems administrators in further
steps to protect PennNet-connected systems.
Purpose
The purpose of this policy is to ensure that all systems installed on
PennNet are maintained at appropriate levels of security while at the same
time not impeding the ability of users and support staff to perform their
work. The University does not maintain a firewall environment for all of
PennNet, so each and every computer connected to PennNet is directly connected
to the Internet and is accessible by anyone anywhere in the world for any
purpose. Therefore, individual computers, servers or desktops, connected
to PennNet must be secure.
Risk of Non-compliance
The use of automated scanners and break-in scripts makes it easy for
someone to quickly scan entire networks for vulnerable systems. Systems
which are not properly secured are likely to be discovered and broken into.
Break-ins in the past have resulted in Penn systems being:
- disconnected from PennNet and unavailable for days while they are re-secured,
- used to attack other sites,
- used for denial of service attacks which degrade valuable PennNet services
such as Internet connectivity and network availability in one or more buildings.
Break-ins can also result in the destruction, alteration or disclosure
of sensitive data.
Scope
This policy applies to all critical hosts on PennNet. Information Security
shall, after consultation with the Network Policy Committee, publish interpretations
defining what machines shall be considered critical.
Defining Critical PennNet Hosts
A critical host is one which, if compromised, could significantly harm
the University. Schools and centers may optionally designate any hosts as
critical if its compromise could significantly harm the local unit. Examples
of significant harm could include legal liability, reputational damage,
interruption of critical business functions, and disclosure of confidential
information.
Examples of critical hosts include those which:
- Contain sensitive or confidential data including, but not limited to,
personally identifiable medical records, payroll information, student grades
and transcripts, or social security numbers, or
- Are used in planning, managing, or operating major academic, research,
or administrative functions of the University, or
- Have 100 Mb/s PennNet connections.
Specifically, the following service is defined as critical:
- Any e-mail server supporting more than twenty-five users.
Statement of Policy
- One or more individuals supporting the system must be identified, and
accurate contact information for the support person must be maintained
in ISC's Assignments database.
- The support person is responsible for identifying critical systems
to Information Security and for ensuring that the requirements of this
policy are met.
- The support person must ensure that the security of the system is maintained
by installing needed security patches on a timely basis.
- The support person must have attended Penn security training (if offered)
for the relevant operating system within the past three years.
- Critical systems must be scanned for security vulnerabilities twice
annually. Any serious vulnerabilities--those which allow a remote or local
user to gain full privileges on the system--must be corrected.
- Remote access (i.e. any access other than from the console) to privileged
accounts (e.g. root, Administrator) must use strong authentication such
that cleartext, re-usable passwords are not sent over the network.
- All user access to critical hosts must be authenticated. All accounts
must have a password. Users must not be allowed access from 'trusted hosts'
without the use of a password.
- All user access to critical hosts must be authenticated with a form
of strong authentication such that cleartext, re-usable passwords are not
sent over the network by September 1, 2001 (assuming thorough supporting
infrastructure in place by January 1, 2001).
- For operating systems that Penn owns site-licensed anti-virus software,
there must be a regular program of maintaining current virus signatures
and scanning for viruses.
Recommendations and Best Practices
Most computer systems as shipped by the vendor are very insecure. Steps
must be taken by the system administrator at the time of installation and
connection to ensure that certain known vulnerabilities are eliminated.
The following related practices are strongly recommended by Information
Security.
- Remove un-needed services. Running un-needed services increases the
risk of break-in.
- Limit access to needed services and log all successful and unsuccessful
access.
- Locate critical hosts behind a firewall. A firewall can limit the risk
of break-ins by controlling how services are made available outside of
the firewall. A firewall is not a substitute for any of the requirements
outlined above; a firewall only supplements good host security by adding
a layer of security.
- Encrypt stored and transmitted sensitive data where possible. If security
is compromised, the damage due to data disclosed or altered can be limited
if sensitive data are encrypted.
- Use integrity checking tools. When run against a freshly-installed
operating system, integrity checkers will produce a snapshot of the system
for use later following a break-in to help identify tools left behind by
intruders. Integrity checking tools can greatly reduce the amount of time
needed to recover from a system break-in.
- Configure systems carefully to enhance security. Security standards
and configuration guidelines are available at www.upenn.edu/computing/home/menu/security.html.
- Some desktop operating systems such as MacOS, Windows 95 and 98 are
very difficult to adequately secure. On such operating systems, it is best
to either encrypt especially sensitive data, or to not store such data
permanently on the desktop, but rather on a more secure file server. Be
sure to follow recommended guidelines for disabling and/or limiting file
sharing: www.upenn.edu/computing/security-privacy/standards/FileSharing/.
- Avoid using the same password on critical hosts and less secure computers.
Otherwise, a security compromise on a less secure computer could lead to
a compromise on the critical host. For further details, see the Penn Information
Security Awareness Brochure at www.upenn.edu/computing/security/pubs/brochure_2003.pdf.
A. Verification: Information Security will actively use security
scanners annually to scan all critical systems.
B. Notification: Information Security will report violations
of this policy to the primary contact in ISC's Assignments database and
to the senior Information Systems manager in the department or unit owning
the machine.
C. Remedy: Remedy may be an immediate removal of the system from
the network, depending on the severity of the operational impact on PennNet.
In some cases, systems that are compromised and connected at 100mb or higher
speeds, may be backed down to 10mb service until the security problem is
rectified. Thus the problem should be resolved as quickly as possible.
Information Security will offer assistance to the LSP for the area in correcting
security problems, after which the device may be re-connected to the network,
and or normal service restored.
D. Financial Implications: The department or unit owning the
critical hosts shall bear the costs of ensuring compliance with this policy.
Adequate funding is needed to present ongoing operating system security
training. The Strategic Site License Fund may be available to subsidize
some of the software-related costs.
E. Responsibility: Responsibility for remedy lies with the system
administrator and system owner.
F. Time Frame: Non-compliant devices must either be remedied
within thirty days of notification of the support person, or must be removed
from PennNet.
G. Enforcement: Please see the Policy on Computer Disconnection
from PennNet at www.upenn.edu/computing/policy/disconnect.html.
H. Appeals: Please see the Appeals section of the Policy on Computer
Disconnection from PennNet at www.upenn.edu/computing/policy/disconnect.html.
Disputes about whether or not systems are considered critical shall be
decided by the University Information Security Officer. Appeals to such
decisions are decided by the Vice Provost for Information Systems.
References
For encryption recommendations, or scanners currently in use, contact
security@isc.upenn.edu.
Almanac, Vol. 47, No. 4, September 19, 2000
| FRONT
PAGE | CONTENTS
| JOB-OPS
| CRIMESTATS
| COUNCIL
BYLAWS, 2000 | POLICIES OF RECORD: PennNet
Host Security, Opereration
of DHCP & BOOTP Servers, Affirmative
Action, Sexual
Harassment and Privacy
in the Electronic Environment | TAT:
"Facing Reality" (L. Hunter) | TALK
ABOUT TEACHING ARCHIVE | BETWEEN
ISSUES | SEPTEMBER at PENN
|
|
|
|