Pacific Northwest National Lab Does CybersecurityPacific Northwest National Lab Does Cybersecurity

Jerry Johnson, CIO of one of the country's top national laboratories, is "amazed" at the level of insecurity that persists at many organizations. More CIOs should consider protecting their data like this world-class research institution does.

Rob Preston, VP & Editor in Chief, information

October 3, 2007

3 Min Read
information logo in a gray background | information

Jerry Johnson, CIO of one of the country's top national laboratories, is "amazed" at the level of insecurity that persists at many organizations. More CIOs should consider protecting their data like this world-class research institution does. Pacific Northwest National Laboratory, a U.S.Department of Energy Office of Science lab, provides foundational science and applied research in energy, the environment, and national security for DOE, other government agencies, universities, and industry. So its intellectual property is its lifeblood.

That IP also is extremely valuable, one reason PNNL is under constant cyberattack. On a "quiet day," Johnson estimates, the lab's firewalls block 50,000 to 100,000 malicious connections per HOUR -- everything from script kiddies banging on its network to denial of service attacks to attempts by foreign entities to steal information pertinent to national security. In addition, PNNL's firewall turns away another 800,000 spam messages per day, he says.

PNNL deploys a classic "defense in depth" to protect its information assets. First, it divides its network into security "enclaves" based on the sensitivity of information and the assessed threat levels. Its extranet enclave hosts publicly accessible servers, and several internal enclaves are segmented by wired network, wireless network, enterprise services (databases, servers), and others housing the most sensitive information.

On the Internet perimeter and between intranet enclaves, PNNL uses conventional network-layer firewalls to manage access. Two-factor authentication is required for all intranet access from locations not under the lab's physical control. At the next layer are application-layer firewalls for extranet Web services and for Internet mail that scan and eliminate known malware attacks before they reach a server or user's workstation. All servers and workstations have host-based antivirus protection, and all workstations have host-based firewalls and intrusion detection software. Rounding out PNNL's defenses are patch management, vulnerability scanning, and log analysis systems.

But the most important layer of PNNL's defense strategy, Johnson maintains, is the organization's end users. All employees must go through an internally developed cybersecurity program, updated and renewed every year. The program includes interactive online training, as well as exercises that apply the course material to real-world situations. Awareness campaigns -- focused on phishing, downloading peer-to-peer software, and other common pitfalls -- feature postcards mailed to each employee and matching posters placed in common areas. (Read what one imprisoned cyberpunk says about how he regularly cracked commercial systems.)

PNNL's user awareness program has had a measurable impact. For example, less than 1% of employees responded to a targeted phishing message recently generated by a security review team, Johnson says, compared with the 15% response rate typical in other organizations.

PNNL has no chief information security officer per se, but Johnson works closely with his peer at the lab's Safeguards & Security organization, who's responsible for both physical and logical security. PNNL has about six full-time infosec professionals.

For its fiscal year ended last Sunday, about 6% of PNNL's $45 million IT budget was spent on cybersecurity. Excluding research computing -- that is, looking at cybersecurity costs relative only to business computing, office automation, and core infrastructure -- that percentage rises to nearly 8%.

Given the nature of PNNL's business, it's money well spent. But you don't have to be a world-class research lab to take security so seriously.

Find out more about Johnson's security strategies and other priorities in our video interview.

Read more about:

20072007

About the Author

Rob Preston

VP & Editor in Chief, information

Rob Preston currently serves as VP and editor in chief of information, where he oversees the editorial content and direction of its various website, digital magazine, Webcast, live and virtual event, and other products. Rob has 25 years of experience in high-tech publishing and media, during which time he has been a senior-level editor at CommunicationsWeek, CommunicationsWeek International, InternetWeek, and Network Computing. Rob has a B.A. in journalism from St. Bonaventure University and an M.A. in economics from Binghamton University.

Never Miss a Beat: Get a snapshot of the issues affecting the IT industry straight to your inbox.

You May Also Like


More Insights