1 the experience of a large database security breach jim davis associate vice chancellor & cio...

28
1 The Experience of a Large Database Security Breach Jim Davis Associate Vice Chancellor & CIO Securing California

Upload: lewis-gallagher

Post on 23-Dec-2015

216 views

Category:

Documents


1 download

TRANSCRIPT

Page 1: 1 The Experience of a Large Database Security Breach Jim Davis Associate Vice Chancellor & CIO Securing California

1

The Experience of a Large Database Security Breach

Jim Davis Associate Vice Chancellor & CIO

Securing California

Page 2: 1 The Experience of a Large Database Security Breach Jim Davis Associate Vice Chancellor & CIO Securing California

2

What Does it Feel Like

Denial --> Acceptance

Technical --> Personal

Local --> Institutional [lost laptop different]

Comfortable --> Vulnerable

No longer the same

Page 3: 1 The Experience of a Large Database Security Breach Jim Davis Associate Vice Chancellor & CIO Securing California

3

Agenda

Decision to notify Notification Email, Letters, Call Center, Website, Media, Calls People, People, People Aftermath Lessons Learned

Page 4: 1 The Experience of a Large Database Security Breach Jim Davis Associate Vice Chancellor & CIO Securing California

4

UCLA Security Incident

Attack detected November 21, 2006

Incident Response Plan put into action• Took server offline• Appropriate notifications and engaged FBI• Began forensic analysis of logs

Sophisticated attack, activity concealed

Page 5: 1 The Experience of a Large Database Security Breach Jim Davis Associate Vice Chancellor & CIO Securing California

5

UCLA Security Incident

Compromised database contained records for 803,000 persons

• Current & Former Students (UCLA)• Current & Former Employees (UCLA, UCOP, UCM)• Applicants (UCLA)• Parents of Financial Aid Applicants (UCLA)

Contained Names & SSNs • No Drivers License, Credit Card or Bank Account

numbers

Page 6: 1 The Experience of a Large Database Security Breach Jim Davis Associate Vice Chancellor & CIO Securing California

6

Decision to Notify

Notification authority rests with CIOWell-established incident response protocolThe decision panel

ISO IPO Dir responsible for breached database operation Campus network architect Legal counsel UC IPO

Page 7: 1 The Experience of a Large Database Security Breach Jim Davis Associate Vice Chancellor & CIO Securing California

7

Primary notification criteria

Determining the Threshold for Security Breach Notification

Factors

A-1. Indications that the information is in the physical possession and control of an unauthorized person, such as a lost or stolen computer or other device containing unencrypted notice-triggering information.

A-2. Indications that the information has been downloaded or copied, for example: an ftp log that contains the name of a file containing notice triggering information.

A-3. Indications that the information was used by an unauthorized person, such as fraudulent accounts opened or instances of identity theft reported.

Page 8: 1 The Experience of a Large Database Security Breach Jim Davis Associate Vice Chancellor & CIO Securing California

8

The Important Additional Criteria

The University of California recommends consideration of these additional factors:

Factors

B – 1. Duration of exposure.

B – 2. Indications that any download or copy activity has occurred, even if there is no specific evidence that there was a download or copy of data subject to the law.

B – 3. The extent to which the compromise indicates a directed attack, such as a pattern showing the machine itself was specifically targeted.

B – 4. Indication that the attack intended to seek and collect personal information.

Page 9: 1 The Experience of a Large Database Security Breach Jim Davis Associate Vice Chancellor & CIO Securing California

9

Decision Tensions

Big difference in impact on institution between 10’s 000 vs. 100’s 000 of notifications

Big difference in logistics to notify between 10’s 000 and 100’s 000

Wait too long to notify, not responsive Wait too long to notify, lose capacity to manage

relationships Notify too quickly, not prepared to manage relationships Notify too many, too quickly unnecessary alarm Informed people protect themselves better UCLA’s philosophical position on individual privacy is to

keep people informed

Page 10: 1 The Experience of a Large Database Security Breach Jim Davis Associate Vice Chancellor & CIO Securing California

10

Notification Logistics

Notification process project managed by executive lead of unit

Federated environment Policy puts primary resource burden on unit

Notification logistics and execution team Unit Executive Head Dir responsible for breached database operation CIO ISO IPO Campus network architect Legal counsel Media and communications

Functioned like an emergency response team

Page 11: 1 The Experience of a Large Database Security Breach Jim Davis Associate Vice Chancellor & CIO Securing California

11

The Decision Chart

Week 1 Week 2 Week 3 Week 4

800 K

Notification Decision

Notification Process

Large NotificationLogistics Decision

800K NotificationDecision

NotificationEffort

Notification#

Page 12: 1 The Experience of a Large Database Security Breach Jim Davis Associate Vice Chancellor & CIO Securing California

12

Notification

Decided to notify 803,000 • Email, US Mail

• Addresses for 70%

• Press releases and media reports• News outlets California, nation and world• LA Times, NY Times, AP, CNN, all local TV stations

• www.identityalert.ucla.edu

• 26 Call Centers, 1600 Operators 1000 calls/hour initially 35,000 calls received to date 400 follow-up calls

• Reached 75-80% of affected population Institutional relationship maintained

Page 13: 1 The Experience of a Large Database Security Breach Jim Davis Associate Vice Chancellor & CIO Securing California

13

Scripting for A Call Center

Script must be precise, thorough and ‘bullet – proof’

Script and operators must be amenable to immediate corrections and enhancements

Script must allow for quick and simple coding into a database

Page 14: 1 The Experience of a Large Database Security Breach Jim Davis Associate Vice Chancellor & CIO Securing California

14

Adjusting the Script:

Original Script Greeting:“Thank you for calling the UCLA Identity Alert Hotline. I

would like to assist you. UCLA knows that this incident has caused concern, and I want to provide you with the information and suggest steps you can take to protect yourself from the possibility of identity theft. So that I can better assist, can you please tell me whether you received notification from the university or whether you heard about the call center from news media reports?”

Script 1 hour Later:“Thank you for calling the UCLA Identity Alert Hotline.

How may I help you?”

Page 15: 1 The Experience of a Large Database Security Breach Jim Davis Associate Vice Chancellor & CIO Securing California

15

Call Center Statistics:December 2006 – August 2007

Page 16: 1 The Experience of a Large Database Security Breach Jim Davis Associate Vice Chancellor & CIO Securing California

16

http://www.identityalert.ucla.edu/

Gwen’s website slides here

Page 17: 1 The Experience of a Large Database Security Breach Jim Davis Associate Vice Chancellor & CIO Securing California

17

http://www.identityalert.ucla.edu/what_you_can_do.htm

Gwen’s website slides here

Page 18: 1 The Experience of a Large Database Security Breach Jim Davis Associate Vice Chancellor & CIO Securing California

18

Identity Alert Web Statistics:December 2006 – September 2007 (and 1/07-9/07)

Page 19: 1 The Experience of a Large Database Security Breach Jim Davis Associate Vice Chancellor & CIO Securing California

19

Need for Escalation Path

Call center serves specific role:

Validation, resource referral and data collection

BUT…Callers are frightened, frustrated, angry, panicked, indignant, hurt and

• Need to know more details• Need to speak with a UCLA representative who can

respond knowledgeably, accurately and honestly• Need empathy• Need reassurance and assistance regarding next steps

Page 20: 1 The Experience of a Large Database Security Breach Jim Davis Associate Vice Chancellor & CIO Securing California

20

Individual Relations

The largest group Felt violated, anxious Wanted a live person

Answers Reassurance Clarification Empathy

Smaller group Information & answers

2% angered and distraught Demanded to speak UCLA official 600 individual calls

Page 21: 1 The Experience of a Large Database Security Breach Jim Davis Associate Vice Chancellor & CIO Securing California

21

“Angry, Irate, Distraught”:Examples of Escalation Call Questions

“How did UCLA let this happen?”

“The last letter I received from UCLA was a rejection letter, and now I get this. Why was I in your database?”

“I just got a letter! Does that mean my identity has been stolen?”

“Who was fired? I want to know who’s responsible for this!”

“This is tremendously upsetting and it’s time-consuming to fix. How is UCLA going to make this right for me?”

“My child got this letter, and he was killed last year. What should I do?”

Page 22: 1 The Experience of a Large Database Security Breach Jim Davis Associate Vice Chancellor & CIO Securing California

22

Post Notification Chart

Week 4 Week 5 Week 6 Week 7

800 K

Notification Decision

Notification Process

NotificationEffort

Notification#

Decision toContact 28,600

Compliance

Reviews

Page 23: 1 The Experience of a Large Database Security Breach Jim Davis Associate Vice Chancellor & CIO Securing California

23

Follow-up Letter

Personalized

Page 24: 1 The Experience of a Large Database Security Breach Jim Davis Associate Vice Chancellor & CIO Securing California

24

Breach Aftermath

Policy and compliance reviews - no compliance issues UC Office of General Counsel State Attorney General UC Board of Regents

SSN policies - no compliance issues Sparked broader initiatives at state and federal levels on use of SNNs State representative and judiciary FTC

Notification laws - Senator Feinstein

Constituency relations Relations with university generally retained No identity theft directly attributable

Page 25: 1 The Experience of a Large Database Security Breach Jim Davis Associate Vice Chancellor & CIO Securing California

25

Reducing Retention of Personal Data

Every SSN had a requirement• Financial Aid reporting• Federal Tax Relief Act tuition tax credit• Test scores• National Student Clearinghouse• IRS & EDD• Identity Matching

Page 26: 1 The Experience of a Large Database Security Breach Jim Davis Associate Vice Chancellor & CIO Securing California

26

UC-wide Information Security

Policy development and communication: - UC Electronic Information Security Policy

- Stewardship of Electronic Information Resources Compliance strategies:

(e.g. HIPAA, California Security Breach legislation, Payment Card Industry data security, security rider for vendor contracts)

Shared resources: (E.g. UC Security web site; security software & professional services agreements; UC security experts work group)

Information collection and dissemination:

- Tracking security breaches and sharing information - Raising awareness of the importance of information security

Page 27: 1 The Experience of a Large Database Security Breach Jim Davis Associate Vice Chancellor & CIO Securing California

27

Lessons Learned

Independent and objective panel for deliberations about whom to notify

Provisions for confidentialityEnsure the call center and web site are

ready when notification beginsSpend time setting up the call centerNotify through different channelsOnly solid information will cut

Page 28: 1 The Experience of a Large Database Security Breach Jim Davis Associate Vice Chancellor & CIO Securing California

28

In the end it’s personal

Notify if YOU would want to be notified

Notify as YOU would want to be notified

Sincerity Drives the Day