In my 19-year career, as a high-tech consultant, I have had unprecedented access to the Operational Support Systems that manage and control the IT infrastructure of several government agencies, and Fortune 100 companies based in the United States. My role, on several occasions, was to architect, deploy, and integrate Operational Support Systems (OSS). On several occasions, my role was Configuration Management Architect, and/or Systems Analyst.
OSS is a set of management systems and tools used to manage operations capabilities of organizations. OSS is an integral part of the larger Telecommunications Management Network (TMN) framework, which encompasses both OSS and Business Support Systems (BSS).
The primary functions of the OSS is to monitor, control, analyze, and maintain network infrastructure, and other systems that provide services to an organization. These systems play a critical role in ensuring the smooth functioning of the network and delivering high-quality services.
Key components and functionalities of Operational Support Systems include:
By streamlining and automating various operational tasks, OSS helps reduce operational costs, enhance network performance, improve customer experience, and accelerate the deployment of new services. It plays a crucial role in managing the complex and dynamic nature of modern telecommunications networks.
Network Configuration Management Systems (NCMS) are software tools or platforms designed to help IT professionals and network administrators efficiently manage and control the configurations of networking devices within an organization’s network infrastructure. These systems play a crucial role in ensuring the stability, security, and proper functioning of the network.
Configuration Management is the process of provisioning the configurations of all of your network devices across an entire organization, such as Cellular Companies, Electric Utilities Companies, Department of Defense Agencies, the DISA SIPRNET, or any other critical infrastructure provider.
Here’s an overview of what network configuration management systems do:
Overall, network configuration management systems are essential tools for maintaining network stability, security, and efficiency, making them a vital component of any modern IT infrastructure.
The biggest threat to our critical infrastructure is one or two individuals that have administrative access to a core Configuration Management System. One person can literally deploy corrupt configurations to every network device of an agency, on a global scale. A simple set of command scripts could issue password changes, firmware deployments, and provision corrupt configurations to the “startup and run” configurations of every network device.
Let’s take a main cellular company, for instance. If one rogue administrator with the right access decided to perform this deployment corrupt configurations, it could bring down the entire company’s ability to operate for days, or even weeks.
Years ago, I wrote several reports on this topic and delivered my findings to military officials, and security experts in the industry. One of these people was a personal friend. The whole topic was quietly swept under the rug, because no one wants to address potential problems as serious and sensitive as this.
Most of us have read somewhere or watched a video talking about threats to our critical infrastructure and how we could be attacked by Russia, China, Iran or some other villain they want you to direct your interest toward. The fact is that the biggest potential threats are from inside, and not from some external boogeyman.
The susceptibility of the United States’ critical infrastructure to attacks from within poses a significant and alarming threat to the stability and security of our nation. Specifically, Configuration Management Systems are where the biggest risk resides, if a single rogue administrator decides to initiate a planned attack. Whether through insider threats, compromised employees, or unintentional errors, the consequences of such attacks can be devastating, disrupting vital services and compromising sensitive data. Today, the lax screening processes and second-rate hiring practices have become so bad, there is a strong possibility that there are currently rogue individuals already sitting in these very sensitive, high level technical positions. To safeguard our critical infrastructure, a multifaceted approach is required, encompassing robust security protocols, continuous monitoring, proper screening process for access, and a proactive stance against potential threats. Creating a strong and reliable screening process for security, is crucial for maintaining the safety and integrity of a system or organization. Only by acknowledging and addressing the vulnerabilities within our own ranks can we fortify our critical infrastructure against the ever-evolving landscape of internal risks and external adversaries.
By: Radicalgranny Just want to let people know that there is an alternative for Idaho…
SUMMARY The deliberate actions combined with gross incompetence of the Boundary County Library Director, and…
I have sat by somewhat Idly watching decent folks running for political office being attacked,…
Bob Vickaryous has been a staple in Boundary County for decades. He is a second-generation,…
Some people are going to agree with me and some are not. To the ones…
INTRODUCTION The upcoming election will decide who the next Sheriff of Boundary County will be.…