REDDnet Vanderbilt Security Overview
REDDNet's current security plan maintains a level of security that balances security requirements with the service and academic freedom our users expect. We are capable of enforcing stricter security measures than those outlined in this document should a specific need arise.
|Primary||Mathew Binkley||Phone: (615) 322-5857|
|Secondary||Alan Tackett||Phone: (615) 322-1028|
Core REDDNet hardware at Vanderbilt University is located in Vanderbilt's Network Operations Center (NOC). The NOC command center is staffed 24/7/365 by VU's Information Technology Services (ITS) staff. The facility is secured by card access and access is limited to ITS, VU Management Information Systems staff, and owners of the systems housed in the NOC. All visitors to the NOC must sign in and are under constant video surveillance while inside.
REDDNet core equipment is secured by a FreeBSD firewall operating as a transparent bridge. As a transparent bridge, the firewall does not have an IP address, and is not detectable from the outside world. All off-campus access is logged to aid in forensic analysis should that proves necessary.
All Vanderbilt core equipment also has IPTables firewalls. Rulesets on both local IPTables and the primary FreeBSD firewall are kept in sync to allow them to perform failover security if one layer should be down. Network traffic is limited by port and by source/destination to only those necessary for proper functioning and monitoring. A complete list of ports opened may be found at:
REDDNet monitors CERT, CryptoGram, and other security forums daily for new security errata. We use apt-get to keep all Vanderbilt core hardware up-to-date with security fixes at least once a week (and usually every 1-2 days). All machines are updated as soon as Ubuntu/Debian releases a security update.
When critical vulnerabilities are discovered, we may disable services or install our own custom update until such time as the vendor releases their own update.
All REDDNet core infrastructure and storage depots are scanned monthly using Nessus to search for potential exploits. Hardware and services are monitored via Nagios and SNMP.