5
Network Security Roadmap Update November 15, 2011 11/15/11 1

Network(Security(Roadmap(web.mit.edu/itgc/docs/Network Security Update 20111115.pdf · 2011. 12. 2. · Increase rollout Phase 2 (((((Initial tuning Phase 1 NETWORK SECURITY MILESTONE

  • Upload
    others

  • View
    5

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Network(Security(Roadmap(web.mit.edu/itgc/docs/Network Security Update 20111115.pdf · 2011. 12. 2. · Increase rollout Phase 2 (((((Initial tuning Phase 1 NETWORK SECURITY MILESTONE

Network  Security  Roadmap  Update  

November  15,  2011  

11/15/11   1  

Page 2: Network(Security(Roadmap(web.mit.edu/itgc/docs/Network Security Update 20111115.pdf · 2011. 12. 2. · Increase rollout Phase 2 (((((Initial tuning Phase 1 NETWORK SECURITY MILESTONE

             

Phase 2 Rollout

             

Phase 1 Tuning

NETWORK SECURITY MILESTONE TIMELINE

11/15/11   2  

Jan  -­‐  Mar   Apr  -­‐  Jun   Jul  -­‐  Sep   Oct  -­‐  Dec  

Purchase  &  install  border  protecGon  equipment  

Implement  detecGon  &  protecGon  for  select  network  segments  

Integrate  alert  detecGon  &  user  

noGficaGon  

Increase  breadth  of  protecGon,  targeGng  high-­‐risk  services  

Install  intelligent  log  management  

Integrate  alerts  &  log  management  

Cisco  ASA  5585  Cisco  SCE  8000  Splunk,  RT,  

Moira  

Border  ProtecGon

 Wire

less  

Plan  and  communicate  default  secure  wireless  configuraGon    

Deploy  secure  wireless    configuraGon  with    open  guest  wireless  

Secured  wireless  

Integrate  remediaGon  

Managed

 Domain

 

ConGnue  Windows  Domain  deployments  Pilot  virtual  desktop  with  

high-­‐risk  groups  

WIN  domain  Virtual  desktop  

Technology  Legend  

Jan-­‐  Mar   Apr-­‐  Jun   Jul-­‐  Sep  

CALENDAR YEAR 2011   CALENDAR YEAR 2012  

#1  

1  –  New  protecGon  devices  incompaGble  with  MITnet  backbone  network  topology.                  Required  re-­‐design,  purchase  of  new  h/w,  and  careful  installaGon  Gming.  2  –  AddiGonal  campus  outreach  and  update  to  user  experience  needed.  3  –  Key  resources  unavailable  due  to  other  prioriGes  (e.g.,  Exchange  2010)  

#2  

#3  

Page 3: Network(Security(Roadmap(web.mit.edu/itgc/docs/Network Security Update 20111115.pdf · 2011. 12. 2. · Increase rollout Phase 2 (((((Initial tuning Phase 1 NETWORK SECURITY MILESTONE

Selected  IniGaGves  

•  $450K  approved  for  IT  Security  Projects  and  Staff  Resources  

•  Two  temporary  posiGons  approved  •  Searches  underway  for  an  IT  Security  Incident  Response  Analyst  and  an  IT  Forensics  and  LiGgaGon  Specialist  or  an  IT  Security  Risk  Specialist  

•  Exploring  3rd  party  collaboraGons  for  forensics  referrals,  risk  management  assessment.  

11/15/11   3  

Page 4: Network(Security(Roadmap(web.mit.edu/itgc/docs/Network Security Update 20111115.pdf · 2011. 12. 2. · Increase rollout Phase 2 (((((Initial tuning Phase 1 NETWORK SECURITY MILESTONE

Appendix  

Network  Security  Milestone  Slide  from  February  PresentaGon  

11/15/11   4  

Page 5: Network(Security(Roadmap(web.mit.edu/itgc/docs/Network Security Update 20111115.pdf · 2011. 12. 2. · Increase rollout Phase 2 (((((Initial tuning Phase 1 NETWORK SECURITY MILESTONE

             

Increase rollout Phase 2

             

Initial tuning Phase 1

NETWORK SECURITY MILESTONE TIMELINE CALENDAR YEAR 2011

11/15/11   5  

Jan  -­‐  Mar   Apr  -­‐  Jun   Jul  -­‐  Sep   Oct  -­‐  Dec  

Purchase  &  install  border  protecGon  equipment  

Implement  detecGon  &  protecGon  for  select  network  segments  

Integrate  alert  detecGon  and  end-­‐user  noGficaGon  

Increase  breadth  of  protecGon,  targeGng  high-­‐risk  services  

Install  intelligent  log  management  

Integrate  alerts  and  log  management  

Cisco  ASA  5585  Cisco  SCE  8000  Splunk,  RT,  

Moira  

Border  ProtecGon

 Wire

less  

Plan  and  communicate  default  secure  wireless  configuraGon    

Deploy  default  secure  wireless  configuraGon  and  guest  wireless  

Secured  wireless  

Integrate  remediaGon  

Managed

 Domain

 

ConGnue  Windows  Domain  deployments   Pilot  virtual  desktop  with  high-­‐risk  groups  

WIN  domain  Virtual  desktop  

Technology  Legend