2007 documents
Current documents
The document listing is as follow:- Online Computers variance
Purpose: The purpose of this variance document is described in the background section of this document. To achieve a complete security package, at least one variance has to be provided. This process is indivisible of a an enclave document. An enclave may however relate to several variance document.
Submitted: 2007/02/15
Re-submitted: 2007/03/30
Contributors: Jerome Lauret
Feedback: Re-submission added feedback from CS team. Main additions to initial document: need for better explaination of keyboard lock, explain local account, explain physical access security, explain mode of updates
Status: Pending - Physical Access Problem statement & Proposal
Date: 2007/01/12
Contributors: Jerome Lauret (lead), Wayne Betts after a visit to the DAQ, CR, WAH, Gas rooms and review of access control. - Variance-Form-v0.4-STAR-GeneralDesktop
Submitted: 2006/11/07
Contributors: Jerome Lauret
Feedback: None
Status: Rejected 2006/12/19 by Samuel Aronson, Laboratory Director. "Explaination" below.The requested exemption from Remote Registry services defeats the ability to manage STAR Windows systems remotely. Exemptions require there to be an operational need. I see only a statement that more access = higher risk. While I agree that's so, in the interest of managing the cyber security of the whole laboratory, I will consider variances only for systems that will not operate properly if subjected to remote configuration management. Given that, I am not approving the request. Sam
Follow-ups: We offered to kindly demonstrate the Remote Registry service vulnerability to Peter Bond (2006/11/30), Tom Schlagel (2006/12/01), Andrew Ferguson (2007/01/02) and J.D. Fluckiger (2007/01/09) and have been consistently turned down as attempting a demo. Sam Aronson informed of the risk on 2006/12/19. - Proposed Windows Policy based (commented) modifications.
- STAR Operational Need Policy XP
STAR-OperationalNeed-Policy_XP-20070111.pdf
Date: 2007/01/11
Contributors: Jerome Lauret, Wayne Betts, Valeri Fine, Jeff Landgraf
STAR-OperationalNeed-Policy_XP
Date: 2006/10/24
Contributors: Jerome Lauret (lead), Wayne Betts, Valeri Fine - STAR-General-WorkstationsPolicy_XP
Date: 2006/10/24
Contributors: Jerome Lauret & Wayne Betts (leads), Valeri Fine
- red/orange: we have a concern with this item and will ask for alteration if allowed and consistent with BNL CS plan. We consider the BNL setting a reduction of our security posture (not an enhancement)
- yellow: general discussed item, refer to comment
- green: we recommend this item as additional setting in the policy
- STAR Operational Need Policy XP
- SDAS-v0.8
This document was created from tghe 2006/07/19 document (Contributors: Jerome Lauret (lead), Wayne Betts, Jeffery Landgraf, Michael DePhillips, Jon Engelage and Mike Cherney) submitted to DOE CyberSecurity. The document went through one more reshape (comments and additional questions) and accepted on 2006/10/13 . STAR management board inform of documen acceptance on 2006/10/17, author on 2006/10/27 (during You do not have access to view this node)
Note that physical access is described in the SDAS document and core part of "the plan". We suggested (at STAR's managerment meetings) that a PASS card control system, card sweeper locks or combination locks should be installed to ensure further physical access requirement and pro-actively prepare for the question of "how do we control access". This was requested on 2006/12/19, 2006/12/11, 2006/11/28, 2006/10/24, 2006/10/17, 2006/10/02, 2006/09/05, 2006/08/29. Further reminders were made on 2007/03/13, 2007/02/27, 2007/01/23, 2007/01/09. The scope of physical access is VERY broad (could come for ANY of the components we have, from network to nodes to hardware). It was mentionned consistently time that it is my VERY strong beleif that we WILLL be challenged on our model for physical access control (especially during shift). Only a question of time. I suggested a strict revision of shift-crew responsibilities (and challenge anyone who is not known). An online Physical Accessdocument and statement was sent 2007/02/27, 2007/01/13, 2007/01/10 (statement only) upon inaction on this items, spaning from as early as August 2006 to March 2007.
Document creator's note ...
... but at what price?
Background
Please consult 2006 documents for past document and information left for historical purposes. However, the documents herein ar ethe most up-to-date and should be referred to as startup.As before, the bottom of this page displays several Cyber-Security documents we provided to DOE and the BNL/ITD describing our sub-systems in the research enclave. An enclave is defined by its level of security, controls and accessibility. A sub-system is defined as a sub-division of an enclave and may be a "sub-enclave". Each eclave requires documentation and a clear description of how the components interact with each other, including the human component (physical access).
The role of an variance document is to describe how and why a set of computer within an enclave need to diverge (as per its baseline settup) from the BNL base policies. Some wording in a variance document may be a repeat of the information related to the enclave itself. The wording MUST remain consistent however. As an example, an exemption of the screen saver requirement may be described in the enclave document but would benefit from being described in each variance document.
An enclave document is a live document and should be revised as necessary in conjunction of one or more variance document. Changes may be justified by:
- the need to reshape our security model based on a change of architecture, software layout, component interaction
- a change in the BNL baseline policies requiring additional items in our variance document
- a reshape of the network
- ...
Othe readings
Before you read the documents below, you may consult the following pages and references for a bakcground philosphy of what we are trying to achieve.- Extracted topics
- The Run VII preparation page (and notes from referenced meetings wherever available and especially meetings #3, #5, #7, #8)
- You do not have access to view this node slide 14 to 17
- You do not have access to view this node slides 24 to 27
- Online and Offline Computing (STAR Critique) slides 10 to 13
- Printer-friendly version
- Login or register to post comments