CTSC+SWAMP: cybersecurity resources for your campus

J
Jim Basney
jbasney@ncsa.illinois.edu
&
cybersecurity resources
for your campus
Why Cybersecurity Matters: Trusted & Reproducible Science
Center for Trustworthy Scientific Cyberinfrastructure:
The NSF Cybersecurity Center of Excellence
● Mission: Provide the NSF community a coherent understanding of cybersecurity’s
role in producing trustworthy science and the information and know-how
required to achieve and maintain effective cybersecurity programs.
● Building Community: annual NSF Cybersecurity Summit, monthly webinars,
blog, email lists, partnerships, benchmarking surveys
● Sharing Knowledge: alerts, guides, templates, best practices, training
● Collaborative Engagements: tackling cybersecurity challenges for science projects
DHS Software Assurance Marketplace (SWAMP)
● A no-cost resource to promote a more stable and secure software ecosystem
● 30 static analysis tools to check your code for weaknesses
● View results from multiple tools in one place, to identify and address the most
important problems in your code
● Continuous Assurance: assess your code throughout the development lifecycle
Miron Livny, MIR Jim Basney, NCSA Bart Miller, UW Von Welch, IU
SWAMP-in-a-Box
● An open source software distribution for
establishing a Continuous Assurance facility
on your campus
● Operate your own local SWAMP on your
hardware behind your firewall
● Includes plugins for Eclipse & Jenkins
● Connect with your local AD/LDAP accounts
or use CILogon/InCommon
● Try mir-swamp.org then install your own
https://github.com/mirswamp/deployment
Software Assurance in the Classroom
● Teaching secure coding practices to undergraduates and graduate students
● Students use mir-swamp.org to analyize and improve their code
● Partnership with Prof. Lethia Jackson at Bowie State University in Maryland
○ https://morgridge.org/story/can-cybersecurity-crack-the-undergraduate-curriculum/
Software Assurance for Scientific Cyberinfrastructure
● Software is critical to science and
"must be reliable, robust, and secure"
(https://www.nsf.gov/cif21)
● Software Assurance is an important CTSC
thrust (training, engagements, best practice
guides, situational awareness)
● SWAMP is an important resource for
CTSC (e.g., engagements with perfSONAR,
SciGaP, OSG/HTCondor)
https://trustedci.org/software-assurance/
Cybersecurity Training for Scientists & CI Professionals
● Secure Coding Practices and Automated Assessment Tools (e.g., SWAMP)
● Secure Software Engineering Practices
● Developing Cybersecurity Programs for Science Projects
● Incident Response and Log Analysis
● Federated Identity Management for Research Organizations
https://trustedci.org/onlinetraining/ https://trustedci.org/trainingmaterials/
Operating Secure Scientific Facilities
● CTSC engagements with NSF Large
Facilities: DKIST, Gemini, IceCube,
LIGO, LSST, LTER, NEON, OOI
● NSF Large Facilities Security Working
Group (established January 2017)
● Annual NSF Cybersecurity Summit
(August 15-17 2017 in Arlington, VA)
● Open Science Cyber Risk Profile
(https://trustedci.org/oscrp/)
● CTSC partnership with REN-ISAC for
situational awareness
Cybersecurity for Science Gateways
● CTSC partnership with Science Gateway
Community Institute (SGCI): cybersecurity
education for gateway developers and operators
● CTSC engagement with SciGaP
(https://trustedci.org/scigap/)
11
Cybersecurity Guides and Tools
● Addressing concerns unique to science
● Policy templates:
Acceptable Use, Access Control,
Asset Management, Disaster Recovery, Incident
Response, Inventory, Awareness, Physical
Security, ...
● Risk assessment table
● Securing commodity IT
● Self-assessment Tool
● Identity Management Best Practices
https://trustedci.org/guide
CTSC
engagements, guides,
email lists, blog,
annual summit,
monthly webinars,
and training on
cybersecurity for science
SWAMP
continuous assurance
via mir-swamp.org
and
open source
SWAMP-in-a-Box
software distribution
&
For more info...
https://trustedci.org https://continuousassurance.org
CTSC is funded by NSF award #1547272. SWAMP is funded by DHS award #FA8750-12-2-0289.
Any opinions, findings, and conclusions or recommendations expressed in this material are those of the authors and do not
necessarily reflect the views of the United States Government or any agency thereof.
1 of 13

More Related Content

What's hot(20)

Security Consulting MethodologySecurity Consulting Methodology
Security Consulting Methodology
ciso_insights1.9K views
Ict conf td-evs_pcidss-finalIct conf td-evs_pcidss-final
Ict conf td-evs_pcidss-final
Dejan Jeremic659 views
NTXISSACSC2 - Why Lead with Risk? by Doug LandollNTXISSACSC2 - Why Lead with Risk? by Doug Landoll
NTXISSACSC2 - Why Lead with Risk? by Doug Landoll
North Texas Chapter of the ISSA1.4K views
Security Consulting ServicesSecurity Consulting Services
Security Consulting Services
sahrens1728 views
CHIME Lead Forum - Seattle 2015CHIME Lead Forum - Seattle 2015
CHIME Lead Forum - Seattle 2015
Health IT Conference – iHT2290 views
Crowdsourcing Cyber SecurityCrowdsourcing Cyber Security
Crowdsourcing Cyber Security
Toe Khaing35 views
CV-SMB-infographic-smallCV-SMB-infographic-small
CV-SMB-infographic-small
Jeff Geissler115 views

Viewers also liked(18)

MS-24 Jan June 2017MS-24 Jan June 2017
MS-24 Jan June 2017
Dharmendra Kumar Singh482 views
Resume Writing MistakesResume Writing Mistakes
Resume Writing Mistakes
Nick Crandell513 views
Protokol 20 03 2017Protokol 20 03 2017
Protokol 20 03 2017
Andriy Gerus1.5K views
JAX-RS 2.1 Reloaded @ DevoxxJAX-RS 2.1 Reloaded @ Devoxx
JAX-RS 2.1 Reloaded @ Devoxx
Santiago Pericas-Geertsen14.5K views
Workshop SEO + ECOMMERCE #ECOMTEAMWorkshop SEO + ECOMMERCE #ECOMTEAM
Workshop SEO + ECOMMERCE #ECOMTEAM
Señor Muñoz1K views
ELSA France "Teaching is us!" ELSA France "Teaching is us!"
ELSA France "Teaching is us!"
Adrian Scarlett48.6K views
Diapo corte #2Diapo corte #2
Diapo corte #2
Angélica Casiani168 views
El cordero asadoEl cordero asado
El cordero asado
Frankling Aguilar290 views
Mec   construindo a escola cidadãMec   construindo a escola cidadã
Mec construindo a escola cidadã
Mario Lucio Silva1.9K views

Similar to CTSC+SWAMP: cybersecurity resources for your campus(20)

CACR OverviewCACR Overview
CACR Overview
Von Welch598 views
Rachel ResumeRachel Resume
Rachel Resume
Rachel Adamick253 views
A Strategy for Addressing Cyber Security Challenges A Strategy for Addressing Cyber Security Challenges
A Strategy for Addressing Cyber Security Challenges
Cybersecurity Education and Research Centre1.4K views
Sgci all-hands-9-16-16Sgci all-hands-9-16-16
Sgci all-hands-9-16-16
Nancy Wilkins-Diehr2.1K views
Jenkins_ Carlasha 2016 v1Jenkins_ Carlasha 2016 v1
Jenkins_ Carlasha 2016 v1
Carlasha Jenkins216 views
Funding Software in AcademiaFunding Software in Academia
Funding Software in Academia
Daniel S. Katz1.7K views
DangThomas_1PageResume_ArchitectDangThomas_1PageResume_Architect
DangThomas_1PageResume_Architect
Thomas Dang113 views

CTSC+SWAMP: cybersecurity resources for your campus

  • 2. Why Cybersecurity Matters: Trusted & Reproducible Science
  • 3. Center for Trustworthy Scientific Cyberinfrastructure: The NSF Cybersecurity Center of Excellence ● Mission: Provide the NSF community a coherent understanding of cybersecurity’s role in producing trustworthy science and the information and know-how required to achieve and maintain effective cybersecurity programs. ● Building Community: annual NSF Cybersecurity Summit, monthly webinars, blog, email lists, partnerships, benchmarking surveys ● Sharing Knowledge: alerts, guides, templates, best practices, training ● Collaborative Engagements: tackling cybersecurity challenges for science projects
  • 4. DHS Software Assurance Marketplace (SWAMP) ● A no-cost resource to promote a more stable and secure software ecosystem ● 30 static analysis tools to check your code for weaknesses ● View results from multiple tools in one place, to identify and address the most important problems in your code ● Continuous Assurance: assess your code throughout the development lifecycle Miron Livny, MIR Jim Basney, NCSA Bart Miller, UW Von Welch, IU
  • 5. SWAMP-in-a-Box ● An open source software distribution for establishing a Continuous Assurance facility on your campus ● Operate your own local SWAMP on your hardware behind your firewall ● Includes plugins for Eclipse & Jenkins ● Connect with your local AD/LDAP accounts or use CILogon/InCommon ● Try mir-swamp.org then install your own https://github.com/mirswamp/deployment
  • 6. Software Assurance in the Classroom ● Teaching secure coding practices to undergraduates and graduate students ● Students use mir-swamp.org to analyize and improve their code ● Partnership with Prof. Lethia Jackson at Bowie State University in Maryland ○ https://morgridge.org/story/can-cybersecurity-crack-the-undergraduate-curriculum/
  • 7. Software Assurance for Scientific Cyberinfrastructure ● Software is critical to science and "must be reliable, robust, and secure" (https://www.nsf.gov/cif21) ● Software Assurance is an important CTSC thrust (training, engagements, best practice guides, situational awareness) ● SWAMP is an important resource for CTSC (e.g., engagements with perfSONAR, SciGaP, OSG/HTCondor) https://trustedci.org/software-assurance/
  • 8. Cybersecurity Training for Scientists & CI Professionals ● Secure Coding Practices and Automated Assessment Tools (e.g., SWAMP) ● Secure Software Engineering Practices ● Developing Cybersecurity Programs for Science Projects ● Incident Response and Log Analysis ● Federated Identity Management for Research Organizations https://trustedci.org/onlinetraining/ https://trustedci.org/trainingmaterials/
  • 9. Operating Secure Scientific Facilities ● CTSC engagements with NSF Large Facilities: DKIST, Gemini, IceCube, LIGO, LSST, LTER, NEON, OOI ● NSF Large Facilities Security Working Group (established January 2017) ● Annual NSF Cybersecurity Summit (August 15-17 2017 in Arlington, VA) ● Open Science Cyber Risk Profile (https://trustedci.org/oscrp/) ● CTSC partnership with REN-ISAC for situational awareness
  • 10. Cybersecurity for Science Gateways ● CTSC partnership with Science Gateway Community Institute (SGCI): cybersecurity education for gateway developers and operators ● CTSC engagement with SciGaP (https://trustedci.org/scigap/)
  • 11. 11 Cybersecurity Guides and Tools ● Addressing concerns unique to science ● Policy templates: Acceptable Use, Access Control, Asset Management, Disaster Recovery, Incident Response, Inventory, Awareness, Physical Security, ... ● Risk assessment table ● Securing commodity IT ● Self-assessment Tool ● Identity Management Best Practices https://trustedci.org/guide
  • 12. CTSC engagements, guides, email lists, blog, annual summit, monthly webinars, and training on cybersecurity for science SWAMP continuous assurance via mir-swamp.org and open source SWAMP-in-a-Box software distribution &
  • 13. For more info... https://trustedci.org https://continuousassurance.org CTSC is funded by NSF award #1547272. SWAMP is funded by DHS award #FA8750-12-2-0289. Any opinions, findings, and conclusions or recommendations expressed in this material are those of the authors and do not necessarily reflect the views of the United States Government or any agency thereof.