You are on page 1of 4

SANS Technology Institute

Implementing and Automating


Critical Control 19: Secure Network Engineering
for
Next Generation Data Center Networks

SANS Joint Written Project


Project Charter
1/7/2012
Aron Warren
George Khalil
Michael Hoehl

Implementing and Automating Critical Control 19: Secure Network Engineering for Next Generation Data Center Networks

Project Charter
1.0 Background
Community Projects are required for students of the SANS Technology Institute (STI) Master of Science degree
program. This Community Project is a Joint Written Project (JWP) and the assigned topic is Implementing and
Automating Critical Control 19: Secure Network Engineering.
An assignment scenario has been created by Stephen Northcutt and is provided below:
GIAC Enterprises is a small to medium sized growing business (1,000 employees, two data centers, 200 people in
central business and IT) and is the largest supplier of Fortune Cookie sayings in the world. The CIO calls you in
for a special tiger team project. GIAC has recently decided to implement a 40G network to implement the capacity
to support mobile apps that deliver fortunes. A separate team is already working on acquiring the technology to
establish monitoring so that is outside the scope of this assignment. Your assignment is to design build the network
for the next generation network. The CIO wants this to be in alignment with the 20 Critical Controls, especially
control 19. GIAC does not want to add many people to the workforce, so solutions that can be automated are top
priority.

2.0 Objective
Present technical approaches to implement and automate safeguards which are consistent with control 19: Secure
Network Engineering of the SANS Twenty Critical Security Controls for Effective Cyber Defense.

3.0 Requirements
The following are requirements for this project:
Create and present project plan for approval. (Project plan must describe who is going to do what part of
the work, how long tasks are expected to take and schedule. JWP team has 5 calendar days after they
receive the assignment to complete plan).
Conduct research and identify technical approaches that automate as many of the safeguards as possible
for 40G Ethernet networks and be consistent with control 19 of the 20 critical controls.
Obtain feedback from early adopters of 40G Ethernet networks to learn about practical pitfalls and
promising solutions.
Author presentation (generally it is 10 PowerPoint content slides with Notes).
Author white paper containing research and recommendations for areas assigned. The white paper must
detail the technical approaches and any additional techniques developed. The paper must be
comprehensive enough that organizations can use it as a reference to strongly lower their risk by
incorporating control 19.
JWP team has 30 days to complete assignment after project plan has been approved.

4.0 Approach and Milestones


The traditional waterfall model will be used to advance through the project phases provided below.s
Project milestones and target completion dates are provided below.

Project Charter

Page 2 of 4

Implementing and Automating Critical Control 19: Secure Network Engineering for Next Generation Data Center Networks

Milestone

Target Date

Initiation
Present Project Plan for Approval
Research and Analysis
Investigate technologies
Identify and interview Early Customer Adopters\VARs\Manufacturers of 40G
Investigate authoritative sources for secure networking (e.g., SANS, CIS, Vendors,
etc.)
Research infrastructure update/maintenance/HA impact and options
Develop Design/Build Technical Approaches
Finalize technical approaches in scope for whitepaper
Build (Author Documents)
First draft of white paper completed
QA
White paper feedback from Sponsor received
Production Implementation
Final version of white paper completed
Final version of presentation completed
Project Close
JWP administrative tasks completed and grading begins

1/9/2012
1/20/2012
1/20/2012
1/20/2012
1/20/2012
1/21/2012
1/23/2012
1/26/2012
1/29/2012
2/5/2012
2/10/2012

Recurring one hour checkpoint meetings are scheduled (10:30PM EDT Wednesday) in addition to weekend
collaborations.

5.0 Project Management Protocol


The project information system is Excel. Project artifacts will be stored in Drop Box. Project performance and
product deployment progress will be reported weekly via email to sponsor and stakeholders. Recurring weekly
checkpoint meetings will also be held with project team. Project sponsor and stakeholders will meet when there is
an issue requiring management attention. Issues having a material impact on project scope or progress will be
escalated to the project sponsor verbally and via email. No formal project risk management system will be used.
Project change control requests will be authorized by the project sponsor via email. No formal project change
management system will be used. Planned resources and level of effort to complete tasks will be identified during
initiation phase. Actual use of resources and associated level of effort will be tracked informally within the project
plan. No formal time reporting will be used.

6.0 Key Resources


A collaborative effort between multiple IT teams will be required to advance this project. Key resources to advance
the project are listed below.
Role
Sponsor STI President
Stakeholder Dean of Admissions & Student Services
Key Resource Student
Key Resource Student
Key Resource Student
Key Resource Early Adopter of 40G Network
Key Resource Vendor of 40G Network Technology
Project Manager

Project Charter

Name
Stephen Northcutt
Debbie Svoboda
Aron Warren
George Khalil
Michael Hoehl
TBD
Grace Ng
Aron Warren

Page 3 of 4

Implementing and Automating Critical Control 19: Secure Network Engineering for Next Generation Data Center Networks

7.0 Risks and Assumptions

40G network refers to 40 Gigabit per second speed Ethernet networks intended for modern data centers.
Remaining critical security controls can be referenced in white paper, but no elaboration is required.
Actual commercial vendor products are to be part of research and included in technical discussion.
RFQ for system integrator consultant or consulting firm is not in scope.
Secure Network Engineering includes integration of security controls necessary to sustain infrastructure.
Common business processes (e.g., HR, Finance, Procurement, etc.) are not in scope. The primary focus is
to provide technical guidance associated with an infrastructure that services mobile applications over the
Internet.
Technical approaches are to include integration with: Managed Security Services Providers, B2B
connections, ands traditional infrastructure services (e.g., tape back-up, DNS, patching, configuration
management, etc.)
The statement: GIAC does not want to add many people to the workforce, so solutions that can be
automated are top priority., is to be interpreted as including technology, outsourcing of recurring
operations duties (e.g., MSSP) and centralized management of infrastructure (e.g., patching, configuration
management, IDS signature updates, etc.).
External partnerships include customers of 40G technology or service providers that have recently
incorporated 40G technology.
E-commerce is in scope as GIAC Enterprises will need to accept payment from a variety of customers (e.g.,
food manufacturers, wholesalers, etc.).
E-fortune cookie service is available to retail customers to have a fortune sent to their smartphone daily.
Inter-site Data Center communication is out of scope.
Disaster Recovery is out of scope.
Delay in response to student questions/concerns
Unplanned absence due to employer or family obligations

8.0 Document Revision History


Document Name

Version

Date

Author

DRAFT - 40G Project Charter v.01.doc


DRAFT - 40G Project Charter v.02.doc
DRAFT - 40G Project Charter v.03.doc
DRAFT - 40G Project Charter v.04.doc
Renamed to FINAL - 40G Project Charter v 1.0.doc

Formatting
Draft 0.02
Draft 0.03
Draft 0.04
Final 1.0

1/6/2012
1/7/2012
1/7/2012
1/7/2012
1/7/2012

Michael Hoehl
Michael Hoehl
Michael Hoehl
Aron Warren
Aron Warren

Project Charter

Page 4 of 4