As always, the primary ongoing assurance activity is the review of incidents conducted by the security program to determine if the program is efficiently and effectively protecting the scientific mission of the Laboratory. This ongoing review suggests that the program is functioning well and we continue to make adjustments to controls and policies as required by the environment.
Drive-by infections continue to generate the most damage at Berkeley Lab. However, the trend has decreased in the last trimester. Our existing mitigations (broad deployment of BigFix and isolating unpatched computers) continue to manage this risk to an acceptable level.
This is an ongoing top risk, although we have not witnessed any significant activity in the last trimester.
Supervisory control and data acquisition systems (SCADA) have been of interest to cyber security for some time, although the actual risk is unknown or in some cases theoretical. SCADA covers systems that control processes that exist in the real world (versus software processes). Historically, SCADA systems were largely separate from the standard security threats because they often used proprietary protocols and were not online. However, as SCADA systems move online and use known protocols, they can open up new vulnerabilities that could result in attacks on physical systems (heating/cooling, water, etc).
The Cyber Team is working closely with the Bro development team to develop tools that can help us mitigate risks that may emerge from SCADA systems. One of the limits to defending against SCADA attacks is a lack of knowledge on how to analyze the protocols on which SCADA systems operate: How do they operate? What are normal usage patterns? A stronger understanding of how the systems operate allows you to detect anomalous behavior. As part of the project, we’ll use data feeds from LBNL SCADA systems to characterize usage patterns and then help develop detection algorithms.
The Department of Energy’s Inspector General included Berkeley Lab in the following audits which are in process:
As always, we will consider any recommendations based on these audits in the context of our risk management approach and cost/benefit analysis.
We continue to make progress on our corrective action from our major FISMA audit last summer: Develop and implement a graded approach for web application input testing and ongoing review consistent with the Lab's risk management approach.
We’ve defined our graded approach (web servers open to the internet, business systems, other web servers) and rollout plan with the following project deliverables:
Task | Status |
---|---|
Acquire tools (Netsparker and Burp) to enable manual scanning of web applications | Completed Oct 2012 |
Setup and developing expertise in tools and results | Completed Nov 2012 |
Scan all registered web servers with Netsparker | Completed April 2013 |
Review and remediate appropriate results of registered web server scans | Summer 2013 |
Credentialed scanning of selected Business Systems web applications | Summer 2013 |
We’ll consider the corrective action complete with the completion of credentialed scanning of selected business systems.
PEMP Objective 8.2 Notable Outcome to “To enhance our existing internal detection and response, LBNL will expand our intrusion detection system, Bro, to monitor key internal networks. This will increase the types and amount of information available to us about internal network activity allowing us to refine our responses to potentially malicious behavior on our internal network.”
We completed our PEMP for FY13. This greatly increased our internal visibility on key subnets. Having a wide deployment of Bro internally will allow us to create new types of detection mechanisms that are optimized for the internal environment (e.g. to detect low and slow attacks) or that can be customized given the more narrow range of traffic types (e.g. restricted use of ports). It will also give us increased forensics to reconstruct an incident.
The Cyber Team detected a number of infections at other .edus and provided them with information to help them mitigate the incidents.