A Small Airport Perspective Royce Holden Director of Information Technology Asheville Regional Airport Asheville, NC

Similar documents
Department of Public Health O F S A N F R A N C I S C O

Cyber Security Guidelines for Public Wi-Fi Networks

Policy. London School of Economics & Political Science. Network Connection IMT. Jethro Perkins. Information Security Manager. Version 1.

Pioneer Communications Internet Services Disclosure

Computer Security Incident Response Plan. Date of Approval: 23-FEB-2014

Stockton Aviation Research & Technology Park

PISMO BEACH COUNCIL AGENDA REPORT

Information Technology Paul Kronberger, Chief Information Officer

DEFINITIONS AND REFERENCES

E-guide CISSP Prep: 4 Steps to Achieve Your Certification

I. PURPOSE III. PROCEDURE

Checklist: Credit Union Information Security and Privacy Policies

Data Processing Agreement

The City of Mississauga may install Closed Circuit Television (CCTV) Traffic Monitoring System cameras within the Municipal Road Allowance.

Incident Response Lessons From the Front Lines. Session 276, March 8, 2018 Nolan Garrett, CISO, Children s Hospital Los Angeles

NETWORKS AND THE EFFECTS OF USING THEM (Work Sheet)

Security Surveillance Camera and Video Policy

uanacia 1+1 MARINE SECURITY OPERATIONS BULLETIN No:

Master Information Security Policy & Procedures [Organization / Project Name]

You ve Been Hacked Now What? Incident Response Tabletop Exercise

Basic First Time ipad Setup

Advisory Circular. Subject: INTERNET COMMUNICATIONS OF Date: 11/1/02 AC No.: AVIATION WEATHER AND NOTAMS Initiated by: ARS-100

Information Technology Security Plan Policies, Controls, and Procedures Identify Governance ID.GV

A-LIST 2016 Event Sponsorship Form

Bring Your Own Device. BYOD - What does this mean to you?

Frequently Asked Questions About Getting On NCAtrak

Responsible Officer Approved by

Information Security Incident Response Plan

CAM: Certifying the Future of Business Aviation

AIRPORT WIRELESS UPDATE: BUILDING A NETWORK FORTIFIED FOR THE FUTURE

Port Facility Cyber Security

Chapter 18 SaskPower Managing the Risk of Cyber Incidents 1.0 MAIN POINTS

Number: USF System Emergency Management Responsible Office: Administrative Services

CYBER RISK MANAGEMENT

Information Security Incident Response Plan

Service Description: CNS Federal High Touch Technical Support

INFORMATION ASSURANCE DIRECTORATE

Cisco SP Wi-Fi Solution Support, Optimize, Assurance, and Operate Services

Constitution Towson University Sport Clubs Organization Campus Recreation Services. Article I Name. Article II Membership

Cellular Site Simulator Usage and Privacy

Determining Best Fit for ITIL Implementation

Metropolitan Washington Airports Authority PROCUREMENT AND CONTRACTS DEPT. AMENDMENT OF SOLICITATION

ISSP Network Security Plan

2 University International Medical University

Criminal Justice Information Security (CJIS) Guide for ShareBase in the Hyland Cloud

Subject: Wireless Networking Policy Effective Date: May 2005 Responsible Office: Department of Information Technology _ Responsible Officer:

Overview Bank IT examination perspective Background information Elements of a sound plan Customer notifications

Mobile Device policy Frequently Asked Questions April 2016

RMU-IT-SEC-01 Acceptable Use Policy

Juniper Vendor Security Requirements

Acceptable Use Policy

Use Of Mobile Communication Devices Within Healthcare Premises Policy

NASCIO Recognition Award Nomination. Title: Central Issuance of State Drivers Licenses. Category: Digital Government Government to Citizen

POLICY 8200 NETWORK SECURITY

Open Data Policy City of Irving

How to connect to a Wi-Fi or Wireless Network

ForeScout CounterACT. Continuous Monitoring and Mitigation. Real-time Visibility. Network Access Control. Endpoint Compliance.

Complying with RBI Guidelines for Wi-Fi Vulnerabilities

From Integrated Corridor Management To Integrated Regional Mobility

Internal Audit Report DATA CENTER LOGICAL SECURITY

2014 TRANSIT CEOs SEMINAR. Cybersecurity What Every CEO Should Know to Help Secure the System

ITSM20F_Umang. Number: ITSM20F Passing Score: 800 Time Limit: 120 min File Version: 4.0. Exin ITSM20F

( Utility Name ) Identity Theft Prevention Program

INCIDENTRESPONSE.COM. Automate Response. Did you know? Your playbook overview - Elevation of Privilege

Introduction. We are excited about the possibility of bringing Google Fiber to your city and look forward to working with you.

Information Systems Accomplishments

HIPAA Security and Privacy Policies & Procedures

SMART CAMPUS, BUILDING AND VENUES

Railroad Infrastructure Security

Information Technology Branch Organization of Cyber Security Technical Standard

Use of Mobile Devices on Voice and Data Networks Policy

Making YOUR Organization More Efficient and Effective Through Business Continuity / Continuity of Operations Planning

Donor Credit Card Security Policy

Information Systems and Tech (IST)

Administrative Procedure

FOLLOW-UP REPORT Industrial Control Systems Audit

Policy. London School of Economics & Political Science. Remote Access Policy. IT Services. Jethro Perkins. Information Security Manager.

Information Technology Disaster Recovery Planning Audit Redacted Public Report

Payment Card Industry (PCI) Data Security Standard

Ohio Supercomputer Center

Acceptable Use Policy

Building YOUR Privacy Program: One Size Does Not Fit All. IBM Security Services

MANAGEMENT CONTROL AGREEMENT REGARDING TEXAS DEPARTMENT OF PUBLIC SAFETY AND FBI CRIMINAL JUSTICE INFORMATION SYSTEMS

Wireless Network Standard

Altius IT Policy Collection Compliance and Standards Matrix

TEL2813/IS2820 Security Management

Information technology security and system integrity policy.

Oracle Data Cloud ( ODC ) Inbound Security Policies

Brian S. Dennis Director Cyber Security Center for Small Business Kansas Small Business Development Center

Fair Use Policy. nbn Ethernet Product Module. Wholesale Broadband Agreement

This regulation outlines the policy and procedures for the implementation of wireless networking for the University Campus.

Sample BYOD Policy. Copyright 2015, PWW Media, Inc. All Rights Reserved. Duplication, Reproduction or Distribution by Any Means Prohibited.

XAVIER UNIVERSITY Building Access Control Policy

CA Automation Capabilities A Technical Look at Process and Runbook Automation. Tom Kouhsari and AJ Dennis

Airport Operations Center October 17, Ryan E. Rocha A.A.E., IAP Chief of Operations City of San Antonio Aviation Department

Personal Communication Devices and Voic Procedure

APPLICATION FOR TELEPHONE SERVICE

Government Resolution No of February 15, Resolution: Advancing National Regulation and Governmental Leadership in Cyber Security

Information Security Incident Response and Reporting

BCP At Bangkok Bank, Thailand

Transcription:

Airport IT Security A Small Airport Perspective Royce Holden Director of Information Technology Asheville Regional Airport Asheville, NC rholden@flyavl.com

Cyber Security (IT Security) What does having good policy in place have to do with IT & Cyber Security? EVERYTHING!

Cyber Security (IT Security) How to start Policy/Directive Response Plan/Strategy Priority System/Triage Communication Documentation Master Plan (IT) Example Incident Policy/Directive Response Plan/Strategy Priority System/Triage Communication Documentation

Cyber Security (IT Security) AVL IT Department

Cyber Security (IT Security) Swim lane Diagram:

Cyber Security (IT Security) How to start Policy/Directive why do we need this? It s important to get executive leadership buy in for creation and inclusion in current Airport Policy Manuals. Response Plan/Strategy How will you handle incidents? Priority System/Triage Take time to prioritize incidents based on organizational impact. Communication Who will you let know about an incident? Who to Call List Even an internal list for the IT Department could minimize down time. Documentation How will you remember an incident? Prevention Documenting an incident and solution could help reduce future down time scenarios. Master Plan/IT Putting it all together

IT Security Policy/Directive Policy A plan or course of action Typically approved by an Airport s Governing Body (Authority) Purpose: The Asheville Regional Airport Authority is a local government agency created by action of the City of Asheville and the County of Buncombe for the purpose of developing and operating the Asheville Regional Airport. Functions: To determine policy and administer the provisions of the laws of North Carolina. Public Record Non Exhaustive List of Items covered in Policy: User Eligibility User Accounts Staff, Tenant, Public Usage Hours of Operation Down time / Maintenance Email Usage/Public Record Installing Software Privacy/Monitoring Unauthorized Usage/Consequences Prohibited Activities/Consequences Misuse/Consequences

IT Security Policy/Directive Incident Handler s Handbook, ipad Security Settings, etc. Great Reference for Risk Management Where can I start? Very Good Examples: http://www.sans.org/reading_room/ National Institute of Standards and Technology (NIST, U.S. Department of Commerce): http://www.nist.gov/informationtechnology portal.cfm Consider joining InfraGard to keep up to date on Cyber Security Information: InfraGard is an information sharing and analysis effort serving the interests and combining the knowledge base of a wide range of members.

IT Security Policy/Directive Example Policy Information Technology Example: Internet and Email Usage Policy Objective: To describe the normal procedures for Internet Usage. The procedure outlines the processes and designates the responsible parties for controlling how the Internet and the Local/Wide Area Networks shall be used. Directive Information Technology Example: Wireless Internet Access Directive Objective: To describe connectivity to the Internet via wireless methods and provide staff direction on use by Authority, Tenant, and Public Usage.

IT Security Response Plan/Strategy Response Plan/Strategy Airport Authority Production Servers 24 hour Telephone line Critical Area CCTV Critical Area Access Control Tenants Passenger Processing @ Ticket Counter Passenger Processing @ Gate Shared Use Printing Public Major MUFIDS Outage (16 or more LCDs in Prime Locations)

IT Security Response Plan/Strategy Response Plan/Strategy Airport Authority Non Production Servers Phone not working Non Critical Area CCTV Non Critical Area Access Control Tenants Passenger Processing @ Ticket Counter (Non Peak Hours) Passenger Processing @ Gate Shared Use Printing (Non Peak Hours) Public MUFIDS Outage (Less than 16 LCDs out) Wireless not working for more than 5 users

IT Security Communication Communication Detail your systems and service agreements. Have a who to call list for each. Know when it is necessary to call Law Enforcement

IT Security Documentation Documentation Who? What? When? Where? Why? How? What: Rogue wireless router found Who Was it? Tenant, Employee? When was it found (Important for Law Enforcement) Where was it found (Physically) Why/How Document how you found it

IT Security Documentation Documentation Spiceworks Free (or Paid). Helpdesk Solution

IT Security Documentation Documentation For Lessons Learned Faster Incident Response Forms should include notes, dates/times, etc.

IT Security Example

IT Security Example Identified Rogue Router Using Xirrus Wi Fi Monitoring Tool, Log Files, inssider software, and a laptop. The AP in the terminal office was not broadcasting a SSID and was set up for PSK authentication. Request for Public Safety Assistance Formal Police Report taken & work with Tenant s Corporate Office NC State Law, Article 19A. Obtaining Property or Services by False or Fraudulent Use of Credit Device or Other Means. Follow Up and Closure Tenant s Management determine their internal policy was broken by employee who was immediately let go. Airport IT documented incident and Lessons Learned.

IT Security Example Policy/Directive Tenants sign a Wireless Usage Policy and agree to enforce it with their employees. Tenant Lease Agreements also contain language Re: Improper Use. Airport IT has a directive Monitoring and Logging Networks and System Devices. Response Plan/Strategy Using Xirrus Wi Fi Monitoring Tool, Log Files, inssider software, and a laptop. The rogue AP in the terminal office was not broadcasting a SSID and was set up for PSK authentication. Priority System/Triage Although not disruptive to Wireless Operations, determined a high priority due to violation of Policy.

IT Security Example Communication Tenant s Management determine their internal policy was broken by employee who was immediately let go. IT Contacted Public Safety, Formal Police Report taken & work with Tenant s Corporate Office. NC State Law, Article 19A. Obtaining Property or Services by False or Fraudulent Use of Credit Device or Other Means. Documentation Airport IT documented incident and Lessons Learned.

IT Security Master Plan Master Plan FAA Advisory Circular 150/5070 6B http://www.faa.gov/airports/resources/advisory_cir culars/index.cfm/go/document.list Use the document above when thinking about putting IT related components into your Airport s Master Plan Ideas follow

IT Security Master Plan Master Plan 104.a. modernization or expansion of existing airports or the creation of a new airport 104.b. cost effectively satisfy aviation demand If you have or are considering Shared Tenant Services or Shared/Common Use, 202.b.4,6,7. Assess the ability of the existing airport, both airside and landside, to support the forecast demand. Identify the demand levels that will trigger the need for facility additions or improvements and estimate the extent of new facilities that may be required to meet that demand Identify options to meet projected facility requirements and alternative configurations for each major component.

IT Security Master Plan Master Plan 202.b.9. Facilities Implementation Plan Provides a summary description of the recommended improvements and associated costs. The schedule of improvements depends, in large part, on the levels of demand that trigger the need for expansion of existing facilities. This is an opportunity to discuss items that are related to IT such as Parking Management Systems, terminal/airfield lighting controls, life safety, etc. Don t forget your MDF/Comm. Rooms!

IT Security Thank You