SlideShare a Scribd company logo
1 of 13
MLDSC Audit
Cyber Engineering Services Proprietary
Introductions
• The Security Audit is being performed as part of a Statewide initiative
to assess the security of various departments with the goal to create
a more secure network architecture and establish a new set of
security processes and procedures
• The Teams
• MLDSC Team
• DoIT Team
• Skyline Team
Cyber Engineering Services Proprietary
Cyber Engineering Services
• Joseph Drissel is the Chief Executive Officer of Cyber Engineering Services. Joseph
held previous leadership positions advising the United States government by
developing best practices on cyber security, monitoring, tracking and protecting
United States assets. Joseph was the Chief of the Intrusions Section at the
Defense Computer Forensics Laboratory (DCFL).
• Cyber Engineering Services was developed to provide incident response,
monitoring, intrusion/malware analysis, training, assessment and cyber related
intelligence/software/hardware to its clients. Cyber ESI has attracted the best
talent in the industry, with experience in Network Security, Computer Forensics,
Incident Response, Intrusions Analysis, and Reverse Engineering Malware.
• Our team of forensic and network security experts bring current, front-line
knowledge from our experience within the federal government’s most advanced
computer forensics lab, the Defense Computer Forensics Laboratory (DCFL) within
the U.S. Department of Defense Cyber Crime Center (DC3) – and our continued
investment with front-line customer engagements.
Cyber Engineering Services Proprietary
Threat Landscape
Cyber Engineering Services Proprietary
Threat Landscape
Cyber Engineering Services Proprietary
Threat Landscape
Cyber Engineering Services Proprietary
• Iron Dome Incident – We monitored as multiple Israeli defense firms were breached. The bad actors were targeting the Iron
Dome missile defense system
• http://krebsonsecurity.com/2014/07/hackers-plundered-israeli-defense-firms-that-built-iron-dome-missile-defense-system/
Why does all this matter?
• The same bad actors are targeting assets across multiple sectors,
including the education communities
• With some effort these challenges can be address but there needs to
be a paradigm shift
• The audit being completed by the MLDSC organization represents a
step in the right direction. The audit can be used to enable proper
defensive measures and properly assess risk
Cyber Engineering Services Proprietary
MLDSC Core Audit Request
• Vulnerability Scan
• Penetration Test of data center environment
• Review and audit of Technical Architecture Design
• Review of ETL workflow
• Review of our MS/AD roles for Least Access
• Review of MLDS Data Security and Safeguarding Plan (DSSP) and DSSP Implementation Plan
• Review of PII data security
• Review of physical security
• Review of IT inventory process
• Review of System Access procedures
• Review of VMWare environment
• Review of the Log Aggregation process
• Review backup/recovery process
• Verification that new versions of Windows, Oracle patches
• Review external system access
Cyber Engineering Services Proprietary
Audit Objectives
• Conduct a Cybersecurity Risk Assessment, targeted at specific assets
and networks associated with the Maryland Longitudinal Data System
Center.
• Identify recommendations for the remediation of risks found during
the assessment.
• Report any identified risks and associated recommendations to
stakeholders within the MLDSC and DoIT.
Cyber Engineering Services Proprietary
Audit Scope
• NIST Publications SP 800-30
• 2 Phases
• Phase I
• Preparation and Discovery
• Threat Assessment
• Vulnerability Assessment
• Initial Code Review
• Risk and Recommendations
• Report
• Phase II
• Preparation and Discovery
• Penetration Test
• Physical Security (Some completed in Phase I)
• Risk and Recommendations
• Report
Cyber Engineering Services Proprietary
PII Emphasis
• The assessment will have a focus on discovering the encryption
efforts related to PII.
• The penetration test will be completed at the end of the effort and
will be used to validate the assessment.
Cyber Engineering Services Proprietary
Current Findings to date
• Asset Discovery - Two categories of assets in place at MLDSC, Primary (Servers,
Networking backbone) and Secondary (Workstations, laptops, printers)
• Physical Security - Primary Assets are protected with above average physical
security. Multiple security controls are in place (badge scanners, multiple secure
doors, physical locks). Physical theft of devices is unlikely.
• Physical theft of storage drives containing the MDM Database PII is unlikely.
• MLDSC devices leverage the MSDE infrastructure.
• MLDSC assets interact with systems residing at several different levels of
security, they will require detailed reviews.
• Potential security vulnerabilities within MLDSC printer (Managed by MSDE) are
being evaluated.
• An evaluation is being performed on the MDM database’s backup in terms of
level of encryption to protect the data in cold storage.
Cyber Engineering Services Proprietary
Questions?
Cyber Engineering Services Proprietary

More Related Content

Similar to MLDSC_Board_Presentation_SecurityAudit_Skyline.pptx

Unit 1&2.pdf
Unit 1&2.pdfUnit 1&2.pdf
Unit 1&2.pdfNdheh
 
Soc analyst course content v3
Soc analyst course content v3Soc analyst course content v3
Soc analyst course content v3ShivamSharma909
 
Soc analyst course content
Soc analyst course contentSoc analyst course content
Soc analyst course contentShivamSharma909
 
Building a Cyber Security Operations Center for SCADA/ICS Environments
Building a Cyber Security Operations Center for SCADA/ICS EnvironmentsBuilding a Cyber Security Operations Center for SCADA/ICS Environments
Building a Cyber Security Operations Center for SCADA/ICS EnvironmentsShah Sheikh
 
Sdl deployment in ics
Sdl deployment in icsSdl deployment in ics
Sdl deployment in icsMayur Mehta
 
Starting your Career in Information Security
Starting your Career in Information SecurityStarting your Career in Information Security
Starting your Career in Information SecurityAhmed Sayed-
 
Webinar - Reducing the Risk of a Cyber Attack on Utilities
Webinar - Reducing the Risk of a Cyber Attack on UtilitiesWebinar - Reducing the Risk of a Cyber Attack on Utilities
Webinar - Reducing the Risk of a Cyber Attack on UtilitiesWPICPE
 
Cyber Security Professionals Viewed via Supply Chain
Cyber Security Professionals Viewed via Supply ChainCyber Security Professionals Viewed via Supply Chain
Cyber Security Professionals Viewed via Supply Chainaletarw
 
Cyber security for business
Cyber security for businessCyber security for business
Cyber security for businessDaniel Thomas
 
Application Security Done Right
Application Security Done RightApplication Security Done Right
Application Security Done Rightpvanwoud
 
Cloud Security Zen: Principles to Meditate On
Cloud Security Zen: Principles to Meditate OnCloud Security Zen: Principles to Meditate On
Cloud Security Zen: Principles to Meditate OnSamuel Reed
 
Sumeet Mandloi: Robust Security Testing Framework
Sumeet Mandloi: Robust Security Testing FrameworkSumeet Mandloi: Robust Security Testing Framework
Sumeet Mandloi: Robust Security Testing FrameworkAnna Royzman
 
chap-1 : Vulnerabilities in Information Systems
chap-1 : Vulnerabilities in Information Systemschap-1 : Vulnerabilities in Information Systems
chap-1 : Vulnerabilities in Information SystemsKashfUlHuda1
 
For Business's Sake, Let's focus on AppSec
For Business's Sake, Let's focus on AppSecFor Business's Sake, Let's focus on AppSec
For Business's Sake, Let's focus on AppSecLalit Kale
 
Azure 101: Shared responsibility in the Azure Cloud
Azure 101: Shared responsibility in the Azure CloudAzure 101: Shared responsibility in the Azure Cloud
Azure 101: Shared responsibility in the Azure CloudPaulo Renato
 
Application security meetup 27012021
Application security meetup 27012021Application security meetup 27012021
Application security meetup 27012021lior mazor
 

Similar to MLDSC_Board_Presentation_SecurityAudit_Skyline.pptx (20)

Unit 1&2.pdf
Unit 1&2.pdfUnit 1&2.pdf
Unit 1&2.pdf
 
Soc analyst course content v3
Soc analyst course content v3Soc analyst course content v3
Soc analyst course content v3
 
Soc analyst course content
Soc analyst course contentSoc analyst course content
Soc analyst course content
 
Building a Cyber Security Operations Center for SCADA/ICS Environments
Building a Cyber Security Operations Center for SCADA/ICS EnvironmentsBuilding a Cyber Security Operations Center for SCADA/ICS Environments
Building a Cyber Security Operations Center for SCADA/ICS Environments
 
Sdl deployment in ics
Sdl deployment in icsSdl deployment in ics
Sdl deployment in ics
 
Starting your Career in Information Security
Starting your Career in Information SecurityStarting your Career in Information Security
Starting your Career in Information Security
 
Webinar - Reducing the Risk of a Cyber Attack on Utilities
Webinar - Reducing the Risk of a Cyber Attack on UtilitiesWebinar - Reducing the Risk of a Cyber Attack on Utilities
Webinar - Reducing the Risk of a Cyber Attack on Utilities
 
Cyber Security Professionals Viewed via Supply Chain
Cyber Security Professionals Viewed via Supply ChainCyber Security Professionals Viewed via Supply Chain
Cyber Security Professionals Viewed via Supply Chain
 
Cyber security for business
Cyber security for businessCyber security for business
Cyber security for business
 
Application Security Done Right
Application Security Done RightApplication Security Done Right
Application Security Done Right
 
Cloud Security Zen: Principles to Meditate On
Cloud Security Zen: Principles to Meditate OnCloud Security Zen: Principles to Meditate On
Cloud Security Zen: Principles to Meditate On
 
Building Cybersecurity into a Greenfield ICS Project
Building Cybersecurity into a Greenfield ICS ProjectBuilding Cybersecurity into a Greenfield ICS Project
Building Cybersecurity into a Greenfield ICS Project
 
New Horizons SCYBER Presentation
New Horizons SCYBER PresentationNew Horizons SCYBER Presentation
New Horizons SCYBER Presentation
 
Sumeet Mandloi: Robust Security Testing Framework
Sumeet Mandloi: Robust Security Testing FrameworkSumeet Mandloi: Robust Security Testing Framework
Sumeet Mandloi: Robust Security Testing Framework
 
It security cognic_systems
It security cognic_systemsIt security cognic_systems
It security cognic_systems
 
chap-1 : Vulnerabilities in Information Systems
chap-1 : Vulnerabilities in Information Systemschap-1 : Vulnerabilities in Information Systems
chap-1 : Vulnerabilities in Information Systems
 
For Business's Sake, Let's focus on AppSec
For Business's Sake, Let's focus on AppSecFor Business's Sake, Let's focus on AppSec
For Business's Sake, Let's focus on AppSec
 
Web Application Security: Beyond PEN Testing
Web Application Security: Beyond PEN TestingWeb Application Security: Beyond PEN Testing
Web Application Security: Beyond PEN Testing
 
Azure 101: Shared responsibility in the Azure Cloud
Azure 101: Shared responsibility in the Azure CloudAzure 101: Shared responsibility in the Azure Cloud
Azure 101: Shared responsibility in the Azure Cloud
 
Application security meetup 27012021
Application security meetup 27012021Application security meetup 27012021
Application security meetup 27012021
 

Recently uploaded

MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLMONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLSeo
 
Vip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewas
Vip Dewas Call Girls #9907093804 Contact Number Escorts Service DewasVip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewas
Vip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewasmakika9823
 
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyThe Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyEthan lee
 
Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Roland Driesen
 
Pharma Works Profile of Karan Communications
Pharma Works Profile of Karan CommunicationsPharma Works Profile of Karan Communications
Pharma Works Profile of Karan Communicationskarancommunications
 
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Dipal Arora
 
Cash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call GirlsCash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call GirlsApsara Of India
 
A DAY IN THE LIFE OF A SALESMAN / WOMAN
A DAY IN THE LIFE OF A  SALESMAN / WOMANA DAY IN THE LIFE OF A  SALESMAN / WOMAN
A DAY IN THE LIFE OF A SALESMAN / WOMANIlamathiKannappan
 
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...lizamodels9
 
7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...Paul Menig
 
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableDipal Arora
 
Regression analysis: Simple Linear Regression Multiple Linear Regression
Regression analysis:  Simple Linear Regression Multiple Linear RegressionRegression analysis:  Simple Linear Regression Multiple Linear Regression
Regression analysis: Simple Linear Regression Multiple Linear RegressionRavindra Nath Shukla
 
Eni 2024 1Q Results - 24.04.24 business.
Eni 2024 1Q Results - 24.04.24 business.Eni 2024 1Q Results - 24.04.24 business.
Eni 2024 1Q Results - 24.04.24 business.Eni
 
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesMysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesDipal Arora
 
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130  Available With RoomVIP Kolkata Call Girl Howrah 👉 8250192130  Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Roomdivyansh0kumar0
 
Catalogue ONG NƯỚC uPVC - HDPE DE NHAT.pdf
Catalogue ONG NƯỚC uPVC - HDPE DE NHAT.pdfCatalogue ONG NƯỚC uPVC - HDPE DE NHAT.pdf
Catalogue ONG NƯỚC uPVC - HDPE DE NHAT.pdfOrient Homes
 
The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024christinemoorman
 
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...anilsa9823
 

Recently uploaded (20)

MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLMONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
 
Vip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewas
Vip Dewas Call Girls #9907093804 Contact Number Escorts Service DewasVip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewas
Vip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewas
 
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyThe Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
 
Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...
 
Forklift Operations: Safety through Cartoons
Forklift Operations: Safety through CartoonsForklift Operations: Safety through Cartoons
Forklift Operations: Safety through Cartoons
 
Pharma Works Profile of Karan Communications
Pharma Works Profile of Karan CommunicationsPharma Works Profile of Karan Communications
Pharma Works Profile of Karan Communications
 
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
 
Cash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call GirlsCash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call Girls
 
A DAY IN THE LIFE OF A SALESMAN / WOMAN
A DAY IN THE LIFE OF A  SALESMAN / WOMANA DAY IN THE LIFE OF A  SALESMAN / WOMAN
A DAY IN THE LIFE OF A SALESMAN / WOMAN
 
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
 
7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...
 
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
 
Regression analysis: Simple Linear Regression Multiple Linear Regression
Regression analysis:  Simple Linear Regression Multiple Linear RegressionRegression analysis:  Simple Linear Regression Multiple Linear Regression
Regression analysis: Simple Linear Regression Multiple Linear Regression
 
Eni 2024 1Q Results - 24.04.24 business.
Eni 2024 1Q Results - 24.04.24 business.Eni 2024 1Q Results - 24.04.24 business.
Eni 2024 1Q Results - 24.04.24 business.
 
Nepali Escort Girl Kakori \ 9548273370 Indian Call Girls Service Lucknow ₹,9517
Nepali Escort Girl Kakori \ 9548273370 Indian Call Girls Service Lucknow ₹,9517Nepali Escort Girl Kakori \ 9548273370 Indian Call Girls Service Lucknow ₹,9517
Nepali Escort Girl Kakori \ 9548273370 Indian Call Girls Service Lucknow ₹,9517
 
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesMysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
 
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130  Available With RoomVIP Kolkata Call Girl Howrah 👉 8250192130  Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Room
 
Catalogue ONG NƯỚC uPVC - HDPE DE NHAT.pdf
Catalogue ONG NƯỚC uPVC - HDPE DE NHAT.pdfCatalogue ONG NƯỚC uPVC - HDPE DE NHAT.pdf
Catalogue ONG NƯỚC uPVC - HDPE DE NHAT.pdf
 
The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024
 
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
 

MLDSC_Board_Presentation_SecurityAudit_Skyline.pptx

  • 1. MLDSC Audit Cyber Engineering Services Proprietary
  • 2. Introductions • The Security Audit is being performed as part of a Statewide initiative to assess the security of various departments with the goal to create a more secure network architecture and establish a new set of security processes and procedures • The Teams • MLDSC Team • DoIT Team • Skyline Team Cyber Engineering Services Proprietary
  • 3. Cyber Engineering Services • Joseph Drissel is the Chief Executive Officer of Cyber Engineering Services. Joseph held previous leadership positions advising the United States government by developing best practices on cyber security, monitoring, tracking and protecting United States assets. Joseph was the Chief of the Intrusions Section at the Defense Computer Forensics Laboratory (DCFL). • Cyber Engineering Services was developed to provide incident response, monitoring, intrusion/malware analysis, training, assessment and cyber related intelligence/software/hardware to its clients. Cyber ESI has attracted the best talent in the industry, with experience in Network Security, Computer Forensics, Incident Response, Intrusions Analysis, and Reverse Engineering Malware. • Our team of forensic and network security experts bring current, front-line knowledge from our experience within the federal government’s most advanced computer forensics lab, the Defense Computer Forensics Laboratory (DCFL) within the U.S. Department of Defense Cyber Crime Center (DC3) – and our continued investment with front-line customer engagements. Cyber Engineering Services Proprietary
  • 4. Threat Landscape Cyber Engineering Services Proprietary
  • 5. Threat Landscape Cyber Engineering Services Proprietary
  • 6. Threat Landscape Cyber Engineering Services Proprietary • Iron Dome Incident – We monitored as multiple Israeli defense firms were breached. The bad actors were targeting the Iron Dome missile defense system • http://krebsonsecurity.com/2014/07/hackers-plundered-israeli-defense-firms-that-built-iron-dome-missile-defense-system/
  • 7. Why does all this matter? • The same bad actors are targeting assets across multiple sectors, including the education communities • With some effort these challenges can be address but there needs to be a paradigm shift • The audit being completed by the MLDSC organization represents a step in the right direction. The audit can be used to enable proper defensive measures and properly assess risk Cyber Engineering Services Proprietary
  • 8. MLDSC Core Audit Request • Vulnerability Scan • Penetration Test of data center environment • Review and audit of Technical Architecture Design • Review of ETL workflow • Review of our MS/AD roles for Least Access • Review of MLDS Data Security and Safeguarding Plan (DSSP) and DSSP Implementation Plan • Review of PII data security • Review of physical security • Review of IT inventory process • Review of System Access procedures • Review of VMWare environment • Review of the Log Aggregation process • Review backup/recovery process • Verification that new versions of Windows, Oracle patches • Review external system access Cyber Engineering Services Proprietary
  • 9. Audit Objectives • Conduct a Cybersecurity Risk Assessment, targeted at specific assets and networks associated with the Maryland Longitudinal Data System Center. • Identify recommendations for the remediation of risks found during the assessment. • Report any identified risks and associated recommendations to stakeholders within the MLDSC and DoIT. Cyber Engineering Services Proprietary
  • 10. Audit Scope • NIST Publications SP 800-30 • 2 Phases • Phase I • Preparation and Discovery • Threat Assessment • Vulnerability Assessment • Initial Code Review • Risk and Recommendations • Report • Phase II • Preparation and Discovery • Penetration Test • Physical Security (Some completed in Phase I) • Risk and Recommendations • Report Cyber Engineering Services Proprietary
  • 11. PII Emphasis • The assessment will have a focus on discovering the encryption efforts related to PII. • The penetration test will be completed at the end of the effort and will be used to validate the assessment. Cyber Engineering Services Proprietary
  • 12. Current Findings to date • Asset Discovery - Two categories of assets in place at MLDSC, Primary (Servers, Networking backbone) and Secondary (Workstations, laptops, printers) • Physical Security - Primary Assets are protected with above average physical security. Multiple security controls are in place (badge scanners, multiple secure doors, physical locks). Physical theft of devices is unlikely. • Physical theft of storage drives containing the MDM Database PII is unlikely. • MLDSC devices leverage the MSDE infrastructure. • MLDSC assets interact with systems residing at several different levels of security, they will require detailed reviews. • Potential security vulnerabilities within MLDSC printer (Managed by MSDE) are being evaluated. • An evaluation is being performed on the MDM database’s backup in terms of level of encryption to protect the data in cold storage. Cyber Engineering Services Proprietary