Nts465-Final Report v7 Redacted
Nts465-Final Report v7 Redacted
Nts465-Final Report v7 Redacted
PREPARED BY:
Black Net Security
i
The following report was written by employees of Black Net Security company. The
company was engaged by the University of Advancing Technology to complete an assessment
on the Cyber Warfare Range, to proactively fight against any threats that may become present.
The Cyber Range is the main classroom that houses the infrastructure used to teach the students
how to defend a network.
Using two standard methodologies, the team assessed the Cyber Range both technically
and physically. This report addresses the findings and recommendations that came up during the
scope of the project.
Interviews, vulnerability scans, and a campus tour were conducted to fully understand the
layout and the operations of the Cyber Range. The team was broken down into groups to divide
the assignment and to stay on schedule. While the systems were being evaluated, concerns were
expressed and reoccurring security issues were mentioned. Both of which are noted in the
findings within the appendices. Each of the findings has a recommendation on how to mitigate
each risk.
Recommendations identified in this document are based upon the team's professional
knowledge and the information received from the results of the examination. Any mitigations
taken by the University is at their own discretion. The team at Black Net Security is not
responsible for any future negative outcomes that may occur.
2 POINT OF CONTACT
3 CONTENTS
ii
2 POINT OF CONTACT..........................................................................................................................
ii
4 INTRODUCTION .................................................................................................................................
1
5 DISCLOSURE .......................................................................................................................................
1
6 PROJECT SCOPE
................................................................................................................................. 2
7 METHODOLOGY OVERVIEW
.......................................................................................................... 2
8 INTERVIEWS
....................................................................................................................................... 3
9 UNIVERSITY OVERVIEW
................................................................................................................. 4
iii
16 CONCLUSION ..................................................................................................................................
9
iv
This report shall serve as an assessment using two methodologies that cover systems and
policies managed by the University of Advancing Technology (UAT) Cyber Warfare Range
(CWR). This report is generated by the Black Net Security team during in the year of 2017. The
team was distributed into three distinct groups to disseminate the work load and fulfill all the
assessment assignments and objectives.
Any findings in this report are merely recommendations, and should be made available to
the by governing authorities of UAT on a need-to-know basis. This document is proprietary
information of UAT and must be treated as confidential information within the sphere of
Network Security (NTS) degree and authorized university officials. Any reproductions of the
report must get approval from the faculty of CWR and/or the Dean of the School.
Any future actions made by UAT whether guided by this report or not is strictly
voluntary and does not implicate or incriminate any members of the Black Net Security team.
5 DISCLOSURE
Full implementation of any recommendations included in this report cannot guarantee that
the UAT campus or the surrounding areas will be fully crime or risk-free. This document is
meant as a guide to reduce potential incidents and provide a roadmap in assisting with the
aftermath. It is the belief of the company that security equipment is only a portion of the total
security system of any organization. Additional components of the overall security strategy
must include the application of existing policies, procedures, and processes. The selection,
recruitment and the retention of security staff, staff supervision, training, participation, and
communication with the administration and stakeholders will best be achieved with the
involvement of law enforcement. Black Net Security is not liable for any future negative
outcomes resulting from mitigations which are at the discretion of the University.
Black Net Security was founded with over 20 years of experience in the security industry.
We specialize in Network Hardening, Systems Analysis and Disaster Recovery. Our mission is
to secure and retain the integrity of computer networks and systems. The company is located in
the state of Arizona and is open seven (7) days a week for customer convenience.
7 METHODOLOGY OVERVIEW
The two methodologies used in this assessment are the National Security Agencys (NSA)
Information Security (INFOSEC) Assessment Methodology (IAM) and the INFOSEC
Evaluation Methodology (IEM). These systematic methodologies are fundamentally different.
When used together they can determine a wide range of security vulnerabilities from an
organizational as well as a technical point of view.
The three phases of IAM are the Pre-Assessment, On-Site Assessment, and PostAssessment.
The IAM procedures for this assessment will include interviews with key Cyber Range and
University personnel, a review of physical security, and organizational meetings every week.
These are followed by the three phases of IEM which include: The Pre-Evaluation Phase, On-
Site Evaluation phase, and the Post-Evaluation phase.
Some of the procedures that our team used to fulfill IEM objectives included a vulnerability
scan of the entire environment, determining critical information types, and an evaluation of any
false positives. The IEM focuses on the more technical environment of an organization and
usually follows the IAM which assesses the organizational aspects. IAM relates to the policies
and procedures and IEM evaluates the technical environment of the organization.
UAT was founded in 1983 to provide a school for the new field of computer-aided design.
Throughout the 1990's, the school expanded to include other degrees of computer technology
including: Virtual Reality, Computer Science, Game Design/Programming, and Network
Security.
Today, UAT is among one of the highest rated technological focused Universities in the
country and is accredited by several different organizations. The student teams at UAT that
participate in municipal, state, and regional cyber security competitions regularly win or place
high in the competition.
A state of the art cyber security lab was created at UAT in the year 2010. Previously known
as the "Cyber Cave" or "Cyber Security Range", this lab allows students the ability to create
projects on a virtualized environment. This environment has never had an IAM/IEM assessment,
and Black Net Security was tasked with performing this assessment.
Academic centers are unique places with communities composed of directed individuals
challenged with study, learning, teaching and research. Therefore, it is important to recognize
and consider such distinctiveness in developing meaningful comments and recommendations
relative to safety and security therein.
The pursuit of higher education by students, faculty to teach and research, and staff that
works in support of academic endeavors should not be impeded by unreasonable concerns about
safety or security of self or property. It is the intention of the University to insure this is reality.
This study is undertaken not in response to a given crisis or event that has altered the college
community, but rather proactively to ensure and promote the advantages of the benefits of higher
education to all members of the community.
System Documentation
Group Policy Information
Deployment Procedures
Security Protocols
CWR Use Statement and Policies
Medium:
Unavailability of critical information systems for students between 5-59 minutes
A negative connotation in any local publications
Low:
Unavailability of critical information systems for students for less than 5 minutes
Systems Documentation H H L
Group Policies H H L
Deployment Procedures M H H
AD01 M H M
AD02 M M M
V-Center L H H
NAS L M H
Paraben M H H
FREDS L H H
Rifters L M H
13 SYSTEM DESCRIPTION
The CWR has 27 primary workstations (one dedicated for teachers) [commonly known as
RIFTERS], 16 Forensic Recovery and Evidence Devices (FRED) [15 of which are functioning],
and a capacity of 200-250 virtualized workstations used for multiple courses. Each physical
workstation has 16 gigabytes of RAM, 500 gigabytes of storage, runs on Windows and has
various software applications. There are 8 physical and several virtual servers dedicated to the
operations of the CWR. The primary virtualization cluster consists of three physical servers each
having 512 gigabytes of RAM, a small internal drive of about 300 gigabytes, and 16 processors
per host. All have a high-speed link to the Network Attached Storage (NAS) device which is a
40-gigabit pipe. The NAS has 6 gigabytes of RAM and 26 terabytes of physical storage, however
only 18 are used due to a RAID configuration. The CWR has two primary active domain
controllers running with Windows Server 2012. Two of FREDs run server 2008 for proprietary
reasons.
See Appendix B
14 INFOSEC VULNERABILITY ANALYSIS
7
15.1 INTRODUCTION
In March of 2017, the Black Net Security team was commissioned to assess the UAT
CWR. The objective of the assessment was to identify deficiencies in the Cyber Security
operations of the University that could impact the overall security or safety of the faculty,
students, staff and/or facilities. The findings in Appendix H details the observations, findings,
and recommendations of the Black Net Physical Security Team in support of these assessment
efforts. The team conducted interviews and a walk around campus to determine any
vulnerabilities or security risks within the CWR.
15.2 METHODOLOGY
This assessment process included a physical survey of key areas across the campus of the
college and a review of campus security operations and current security technologies. We had
discussions with administrators and security staff.
16 CONCLUSION
Overall, the IAM and IEM steps that were performed at the UAT CWR were successful.
These assessments were performed by the Black Net Security team to better assess the security
posture of the CWR. This report clarified the diverse types of critical information that exist in the
environment including system documentation, deployment procedures, and default password
lists. This assessment also covered vulnerability scans of the CWR environment that were
included in APPENDIX E & F. The results of the scans were sorted by severity of the
vulnerabilities. The three categories were High, Medium, and Low. Only two vulnerabilities
were rated as high, ten vulnerabilities were rated as medium and twelve vulnerabilities were
rated as low or negligible. The physical security of the CWR was inspected and found a few
physical security vulnerabilities that exist. It is our recommendation that these vulnerabilities can
be fixed with simple policy changes, adjusted security, and better communication with the
campus security and IT staff.
A TEP/VULNERABILITY SCANS
10
B SYSTEM DIAGRAMS
CWRVisiov2.vsdx
Savlowitz-David-Cr-Range-Cluster-N
11
C ORGANIZATIONAL VULNERABILITY
CRITICALITY MATRIX
12
Intern Framework
13
14
F - MEDIUM FINDINGS
15
16
17
18
19
LOW Findings were negligible. They are available in a separate document provided with
Appendix G.
21
Aerial photo of the UAT campus. Also, floorplans of the first and second floors of the main
school building. Security camera placement is indicated by the green markers.
22
Issue #1 - The sliding door allowing access to UATs The Known Universe server room
normally unlocked.
Issue #2 The angle the security camera right above the door to The Known Universe is
installed to monitor does not capture the door allowing access to this room.
Recommendation Reposition the existing camera to monitor the door to this room, or
install a camera specifically for this purpose.
23
Issue The camera seems to monitor only the janitors closet, not the hallway leading to the
staircase. Someone who has gain un-authorized access to the building might be able to walk
through this area undetected by this camera.
Recommendation - Reposition the existing camera to monitor the hallway, or install a
camera specifically for this purpose.
24
Documentation Team:
Adam C Brenden (Lead) John Downs
Mark Larocque Osvaldo Carrera
Wilson Antone Mark Cravens
Marlanena Saunders Raymond Harding
Technology Team:
Alden McGarvey
Interview Team:
25