Skip to end of metadata
Go to start of metadata


Date

 

Time1:00PM
Duration60 mts
Location

Zoom

Zoom
Attendees
Project/ProgramSecurity Assessment remediation - SAR 
Project BoardITS PMO 
Log Time
OTL
Objective(s)

Review controls on spreadsheet and if time permits, follow-up/update discussions on iPaas Access, GoA vs Qumulo, and Spirion,

Notes: 


Speaker DescriptionNotes
LouisGoAnywhere

RA-20 GoAnywhere does not use AD groups to track permission. Great account lock auto when not logged into in 2 months.

Some is tied to AD - Some can be reinstalled because this doesn't propagate to systems.

Same with Nifi - There are users that don't go away unless they are removed.  Claudio is looking at this

When primary account is disabled access is disable, but app accounts still have to also be removed

We're building a list for each owner of the domains

Louis adding key for what colors on the tabs he's keeping track of mean

Ashraf the spreadsheet needs more information such as the number of accounts that were removed. 800171

This is for all accounts including the few vendor accounts and some contract accounts that were all removed.

How often will this review be done - At least every 6 months

The next time someone goes through this, it'll be easier with the work Louis has done.  The second round we will start to create the process.  Compliance is that it is done and within past 6 months.

Automation not necessary for first round, but definitely in 2nd round

Policy for all IT controls (IS3 outlines periodic review) include statement "User access periodic review of privileged accounts will be conducted every 6 months".

Need SOP for iPaas

From Loius - Suggestion We pick 2 months out of the year and have security review 2 months and have people go to the website to confirm what was done for security.

Ashish- every new system brought in should have SOP and auto fetch of privileged user for approval or turns them off

LouisiPaas Login Review

Where in Splunk logins are going

KSQL - AD TEAM LOGGING

Airflow -

Kafka -

From - Nathalie

https://collab.ucsd.edu/x/M538Cg 

Could deprecate Kafka Drop - We have Kafka CC


AshishBlockers

Bring Mike in to discuss next steps regarding blockers

RA92/SAR-21

iPaas access control - need to know and least access

Ashish/AchrafNotes from 10/13 Spreadsheet review meeting

We’ll open any controls that we haven’t looked at and try to resolve them.

Select 3 or 4 controls we haven’t discussed and see if we can close them quickly

We will have to bring Mike in for those we’re going back and forth

We need an SME for tasks not ours

Whoever disagrees should go back to Mike to resolve and determine if yes or no for the dead end/wall

Add a column for the blocker and outcome of their meetings with Mike

Get full definition of status column entries

When there is a discussion that the solution isn’t accepted, we should create a task and that gets comments entered that is not being done.

Hana – to be able to track action back to user not doable.

Create Epic for line item for all but tagged as low, and move tasks created to the appropriate new Epic or creating standard tasks for "Analysis" and tasks that come out of analysis where needed..  Add tags for blockers were needed.


Bill S.iPaaS Access using jumpbox – follow-up and decision 

Document requirements

Section 9 on IS3

9.1.2 what is a secure access control point?  This means we have to route everyone through a secure access control point.

Limit to only those that need it.

Declare what is a p3 p4 system and create a gate (jumpbox) with access control points, develop/create doorways for entry and exit. configured in a way that prevents leakage of data. 

How are we securing all of campus?  UCOP considers payroll P4

is VPN considered a secure access control point. Yes that is one

We can focus on making systems p3 and p4 compliant

Example - History dept logs into UCPath do we have to make sure they are on VPN?

People can log into various systems using https?  Should we enforce all users to VPN?

HOw do we interpret these rules?  Privileged or non privileged access?

Important factors are

  • volume of data and
  • elevated access vs non-elevated users 

Elevated users- people who can see the additional volume of data or can modify data 

Need to balance what end user can do without using the jupbox.

Bill – what is ucsd's policy for development environment

Nathalie - what controls based on the breaches we have seen.

e.g. Auditing of logins is sufficient

At next meeting - Using diagram to discuss controls to help mitigate highest priority risks

Usecase discussion:

  • Nifi is connected through VPN
  • Login
  • Prevent download of data and review before exporting the data

Risks:

  • Downloading the data
  • Availability
Bill S.GoA vs Qumulo – Follow-up and decision

Comments - OneDrive, Google Drive, Qumulo, GoAnywhere

  • What are the options - 
  • Need auditability of all access attemp 
  • Data encryption at rest
  • Download vs Doesn't require d/l - W/S  
  • GoA could use Qumulo storage as a backend
  • Data stewards should provide written approval to store data when it leaves iPaaS 

Action items::

  • How do users interact with Qumulo and can they download the data?
  • Ensure Qumulo supports auditability - Ashish
  • If it does need downloading of the data, check with the data steward. If they are not okay, look at other solutions
  • One Drive - Daniel
Claudio and RobInstalling Spirion on iPaaS servers
Achraf

Spirion - agent installed on each station.  Stores sensitive data. Scans for passwords, credit cards.


Achraf - Workstations, Data link policy to prevent sensitive information access

Risk isn't only impact, but security is priority

Ashish-It won't be for workstations, but just the server, workstations don't connect at all to nyfy or the servers themselves

Bill - clarification - reading document written for all of campus.  How are we securing all of campus from loging into our payroll, financial or student systems?  Are all campuses making people log into jumpboxes first.  Vendors never told us why.  Doesn't solve getting in.

Rob Nyland - DAniel responded tht Spriorn has redhat installed and default profiles installed

Claudio - performance inmapct? - Achraf scans all desktop files, some impact, we have to create a profiel an dtune it.

Claudio - so many agents being added the impact will add up

Achraf - Spririon wil most likely cause an impact

Daniel - we should get the impact numbers first.  If there is no data, the scan will process quickly

Claudio - are there excel files on the server - No Ahsish all on FXS

Ashish - we can do a quick check on the servers for data

Achraf - Are we good with the server install for Spirion ? Ashish to review.

Nathalie - It isn't just end users, we need to make sure there isn't any discs or saving that could cause the risk

Step 1 identify if there is any sensitive data is installed.  What about log files.  If they are p3 or p4 data.  Yes, even if users don't have access.

  • Ashish Pandit Performance test - sandbox first? will find out if users have anyway to store data on the local file store and can only store on FXS.  Timeline  
  • Robert Nyland reach out to patrick for performance test.

RA-16

In progress

Status = Solution in Progress


RA-26

Status = In Progress

Part of Louis's review


RA-28

Status = Solution in Progress

Business applications - Ranger, Ambari,  - Create a task for that


RA-3

  • Provide component level security classification Ashish Pandit  

SAR-89 - Getting issue details... STATUS

Status = Completed - Out Of Scope

Build an inventory of authorized software, This should be an ITS wide project.


RA-4

Status = Not Started

RA-5

Status = Not Started

RA-6

Status = Solution Ready for Review

Account removal
  • Add another tab for the account information review spreadsheet for auditing purposes - Louis Zelus  


  • Review the process for 3rd party access to HANA system Nathalie Gholmieh  
AnjelicaPast Due Tasks

Key Summary T Due Assignee Status
Loading...
Refresh

AnjelicaNext Steps

Keep next weeks meeting and then update series.

  • Anjelica Baker Schedule a meeting with Mike and Bill and all on meeting and Daniel  
  • Ashish Pandit Complete Summary iPaas for meeting with Mike  
AllTime away

Anjelica Oct 26, 27 and Nov 10 thru 15

Ashish Oct 24, 25

Write a comment...