Page |1 Wireless Security Project Initiation Charter Green Team : Lewis N, Rob F, Richard L, Stephen L, Dave C Tatiana Outkina. 10/23/2009 Page |2 Contents Introduction ................................................................................................................................................................................ 3 0.1 Purpose ..................................................................................................................................................................... 3 1.0 Definition ......................................................................................................................................................................... 4 1.1 Summary ........................................................................................................................................................................ 4 1.2 Project stakeholders .................................................................................................................................................. 4 1.3 In scope ..................................................................................................................................................................... 5 1.4 Out of scope .............................................................................................................................................................. 5 1.5 Pre-requisites ............................................................................................................................................................ 5 1.6 Assumptions .............................................................................................................................................................. 6 2.0 Project Deliverables ............................................................................................................................................................. 7 2.1 Management Deliverables ......................................................................................................................................... 7 Define Phase .................................................................................................................................................................. 7 Requirements Phase ...................................................................................................................................................... 7 Design Phase.................................................................................................................................................................. 7 Configure Phase ............................................................................................................................................................. 8 Verify Phase .................................................................................................................................................................... 8 2.2 Acceptance Criteria .................................................................................................................................................... 9 3.0 Project Team ...................................................................................................................................................................... 10 4.0 Milestones .......................................................................................................................................................................... 11 4.1 Design ..................................................................................................................................................................... 11 4.2 Implementation ....................................................................................................................................................... 11 4.3 Testing .................................................................................................................................................................... 11 4.4 Deployment ............................................................................................................................................................. 11 5.0 Project Cost........................................................................................................................................................................ 13 6.0 Quality Control ................................................................................................................................................................... 15 7. Risk Management Plan ................................................................................................................................................. 16 7.1 Approach ................................................................................................................................................................. 16 7.2 Risk Log .................................................................................................................................................................. 16 8 Project Controls ............................................................................................................................................................ 17 8.1 Monitoring Progress and Reporting ......................................................................................................................... 17 8.2 End Stage Reviews ................................................................................................................................................. 17 8.3 Exception Conditions............................................................................................................................................... 17 8.4 Actions .................................................................................................................................................................... 17 8.5 Time Recording ....................................................................................................................................................... 17 8.6 Issue Management .................................................................................................................................................. 17 8.7 Change Control ....................................................................................................................................................... 18 8.8 Project Closure ........................................................................................................................................................ 18 9. Communication Plan ..................................................................................................................................................... 19 10 Configuration Management Plan................................................................................................................................... 20 10.1 Document Repository ........................................................................................................................................ 20 10.2 Document Control .............................................................................................................................................. 20 10.3 Document Standards ......................................................................................................................................... 20 Page |3 Introduction 0.1 Purpose This document is the Project Charter document for the Wireless Security Project implementation. The purpose of this document is to define the following aspects of the project: The scope of the project in terms of the businesses and users to be covered The objectives of the project The deliverables which will be produced by the project and the quality criteria which will support these deliverables The roles and responsibilities of project staff The reporting structure for the project, including the management structure which will be established The project governance processes which will be followed The outline time-scale and plan against which the project will be measured and managed Defined Scope Proper Resources Time Secure Infrastructure Project Management Page |4 1.0 Definition 1.1 Summary Problem outline The company has a wireless network in place for internal uses. We also have business guests and contractors who utilize our wireless network to check e-mails and log into the company’s network for various purposes. As we have never have a formal security model and policy for our wireless security, we do not know our level of exposure and we have little or no security measures in place. Expected Outcome We will assess all the risks our wireless networks are exposed to. We will design and implement adequate security measures on all 802.11 and 802.1x networks and devices in the company. Moreover, we will create new operating procedures, acceptable uses polices and provide trainings to project stakeholders to support this higher level of wireless security 1.2 Project stakeholders Financial sponsors o provide the necessary funding for the project Legal Department o provide legal guidelines on compliance of local laws and regulations regarding wireless networking. o Provide legal guidelines on local privacy laws Information Security Office – o Conduct the risk assessment o Devise a acceptable security model for the wireless network; o Evaluate and select the security products (hardware/software) necessary for the project; o New wireless network security testing and sign off Information Technology Department o Implementation and testing of the new wireless network system o Prepare training for users; devise the roll out plans All employees o Accommodate their business operations to new environment. o Must be compliant with the acceptable use policy. Contractors and business guest – o must be agreed and compliant with the new acceptable use policy Page |5 1.3 In scope The following high-level activities, user types, systems and processes are understood to be within the scope of this project. The following in scope elements will be delivered Project management Conduct risk assessment on the company’s current 802.11/ 802.1X networks and devices Design appropriate security model and policy to secure the wireless networks, without being in conflict with company’s business model Coordinate with legal department to ensure compliance to local laws and regulations Installation and configuration of the existing hardware and new hardware concerning wireless security Perform system testing Prepare operational and configuration documentations Prepare new IT and users acceptance policy Prepare tutorial for IT department and users on the new wireless security system Devise communication plans to provide advance notifications on the implementation of new wireless network design to all stakeholders 1.4 Out of scope The following activities are considered out of scope for this: Wireless devices that are not running 802.11 or 802.1X. For example, any Bluetooth devices, wireless input devices, RFID, black berries servers, wireless inter-comm etc General network security such as security for servers, traffic encryption on wired network etc Upgrading current wireless technology in use Improve the performance of current wireless network Provide long term technical support plan for new wireless security systems Maintenance and updating of the wireless security systems 1.5 Pre-requisites The following must be in place before the project can commence: Detailed and signed statement of work (SOW) Agreed upon the acceptable outcome of the project Agreed upon project milestones and deliverables Agreed upon the acceptable level of impact on business operations Assigned work area and workstations for the project team Assigned financial resources for the project Legal Guidelines are provided by the Legal department on the local laws and regulations concerning the project All stakeholders, from management to all employees, are notified about the project and the inconsistencies it might bring to business operations Page |6 1.6 Assumptions The following assumptions are made: Project initiation has been approved by the management Project funding has been approved by the finance department Teams has been assembled and resources are allocated for risk assessment Security standards have been agreed upon Legal Guidelines for the project has been provided Financial resources are already allocated Full upper management support The acceptance period of Critical path deliverables will be incorporated into the project plan Compliance Approval Resources Project Page |7 2.0 Project Deliverables This section is a high level view of the overall project. Each Deliverable is listed, together with a Work Breakdown Structure (WBS) reference and a statement as to whether formal acceptance is required for that Deliverable. If a payment milestone has been agreed, against acceptance of a Deliverable, then that is also shown. Detailed descriptions for each project phase Deliverable defined are described below: 2.1 Management Deliverables Define Phase The project team shall deliver the following items as a result of the activities for this Phase. Completion of these deliverables constitutes completion of this Phase. Deliverables shall be accepted according to mutually agreed acceptance criteria. Document: Project Initiation Document that defines the scope and objectives of the project. It includes an outline of the timescale and plan and is used as a baseline for change control. Document: Deliverable Acceptance Form that lists completed activities within the Define Phase. Requirements Phase The project team shall deliver the following items as a result of the activities for this Phase. Completion of these deliverables constitutes completion of this Phase. Deliverables shall be accepted according to mutually agreed acceptance criteria. Event: Risk assessment. Risk assessment is conducted on the company’s wireless networks Document: Requirements Definition. This document includes all requirements for the projects, such as result of the risk assessment, acceptable level of wireless security, set limitation of the impact on business operation. Document: Network Architecture Specification. This document identifies the best-fit architectural solution concept including descriptions of hardware, software, and network components. Document: Project Plan. This document, which provides detailed tasks, milestones and schedule for this SOW is made the baseline for the project. Changes to this Project Plan after it is accepted shall follow the Change Control process described hereinafter. Document: Deliverable Acceptance Form that lists completed activities. Design Phase The project team shall deliver the following items as a result of the activities for this Phase. Page |8 Completion of these deliverables constitutes completion of this Phase. Deliverables shall be accepted according to mutually agreed acceptance criteria. Document: Design & Implementation Specifications that fully describes the design of the security model and the specification for the implementation of the new hardware/software security measures . This technical document contains sufficient detail to rebuild the current wireless network security. Document: Revised Project Plan. This document, which was created during the Requirements activity, is updated to reflect any changes to the scope found in Design. Changes to this Project Plan after it is accepted shall follow the Change Control process described hereinafter. Document: Deliverable Acceptance Form that lists completed activities. Configure Phase The project team shall deliver the following items as a result of the activities for this Phase. Completion of these deliverables constitutes completion of this Phase. Deliverables shall be accepted according to mutually agreed acceptance criteria. All deliverables in this activity shall be completed in the development and test environments only. Installation: Installed new hardware and software for the new wireless security measures on the development and test environments Configuration: Configure all hardware and software on the wireless network to compliant with the new wireless security specifications. Guidance: Prepared necessary documentation for the IT department. Document: Deliverable Acceptance Form that lists completed activities. Verify Phase The project team shall deliver the following items as a result of the activities for this Phase. Completion of these deliverables constitutes completion of this Phase. Deliverables shall be accepted according to mutually agreed acceptance criteria. Event: The wireless networks are tested to ensure they meet all specifications as described in the Requirements Definition and Design & Implementation Specifications. Guidance: Documentations for IT department, including but not limited to the new wireless IT security policy, new specifications and configurations of hardware and software in the wireless network. Configuration: Resolution for Acceptance Test problems in the implementation and configuration. Guidance: Advice on Deployment Plan. Document: Deliverable Acceptance Form that lists completed activities. Page |9 2.2 Acceptance Criteria All project deliverables must be approved by project manager User Acceptance Tests are successfully completed Penetration test results have a rating of approximately secure to 80% of commonly known attacks. (100% being military grade security) Project is at or under allotted project budget Project has not exceeded the allotted time period for its implementation Stakeholders and sponsors are pleased with the final deliverable of the project Wireless security protocol has been implemented and tested Two-factor authentication method has been implemented and tested Appropriate Resources Well Managed Team Project Success P a g e | 10 3.0 Project Team The following outlines the implementation team roles and responsibilities. 3.1 Project Manager Responsible for change control processes Setup milestones Oversee the successfulness of project 3.2 Information Security Officer / Technical Leader Conduct risk assessment Security police model Lead test team 3.3 System Administrator Review and update policies Work with Information security officer Purchase software Purchase hardware 3.4 Testers / Trainers Conduct test on network for security issues Aid in the risk assessment Train users and IT departments on new policies and the new network model Project Manager CISO/TI System Admin. P a g e | 11 4.0 Milestones Each milestone will be Bolded and will dictate a time at which the development team and the project team must undergo a quick-meeting to verify the contents and contributions of each member of the team and for the project manager to gauge the overall progress being made. 4.1 Design Preliminary analysis of Risk on company’s 802.11/802.11x networks and nodes. Co-ordinate with legal departments to draft acceptable company standards for new product Determine boundaries of company systems Establish Workshops and company training programs for remediation of security principles Compare requirements to vendor software. Design on Vendor application suite to use for company wide use. Decision to define and adjust timeline, scope and funds required to deploy web encryption over existing applications Team must plan maintenance window during a non-work period, to avoid interference with day to day operations. 4.2 Implementation Acquire Wireless Security apparatus. Acquire third-party wireless security products Program and design basic wireless controls. Deploy new wireless security software to a test network Team must configure and update servers to operate in accordance with new software Rule out dependencies and compatibility issues. Deploy and configure to gateways and test servers, synchronize gateway whitelists with input from employee interfaces to ensure autonomous departments have full access to needed resources 4.3 Testing Team must use multiple platforms and approaches to determine the possibility to breach the web filter Team must review company policies and ensure that new software is in compliance Team must review state/regulatory/federal laws and ensure that new software is in compliance Team must ensure new software is not resource-intensive Team must ensure that new software is compatible with all Operating systems employed in current network as well as server hardware as it is currently being run. Operational analysis testing for all current 802.11/802.11x systems System benchmark comparisons before and after to determine the impact on network bandwidth and performance System benchmark comparison before and after to determine increase or decrease in rate of collisions or mishandling of packets Form debugging and issues log for error tracking databases. 4.4 Deployment Draft new policies regarding secure communications over intra-corporate systems Send mass-workmail to inform al l users of the system of a future work maintenance window. Create backups of the old image; verify the operation of the old images P a g e | 12 Roll-out updated mages to users and servers Check for complete compatibility and troubleshoot where necessary Signoff project over to DAA and inform Chief Information Officer as well as applicable stakeholders of new changes Lift maintenance window, return to full usability. 4.5 Work Break Down Structure Task Time Alotted Slack Alotted Persons Respoonsible Preliminary analysis of Risk 7 Days 3 Days Entire Team Determine Scope and Boundaries Vendor Comparison 1 Day 0 Days Lewis N. 1 Day 0 Days Entire Team Redefine Scope As needed 1 Day 0 days Rob F. Acquire Resource Design Controls Dependancies Control 2 Days 2 Days 1 Days 1 Days 1 Days 0 Days Richard L. Lewis Ng. Dave Deploy To Test Testing Phases Form Debugging and Tracking New Policies Draft Inform Stakeholders, Create backups 3 Days 12 Days 1 Days 2 Days 4 Days 2 Days Stephen Lepage Entire Team Richard L. 1 Day 2 Days 0 Days 0 Days Rob F. Rob F. Rollout Images To Users 1 Days 0 Days Lewis Ng. Backup and Verify Signoff 2 Days 1 Day 1 Day 0 Day Lift Maintenance Window Richard L. Entire Team Design Analysis of Risk Determine Project Scope Implementation Acquire Resources Allocate Resources Deploy to Test Network Testing Functionality Compliance Deployment New Policies and Procedures Signoff to Maintenance, DAA Full Realization Return to Normal Operation P a g e | 13 5.0 Project Cost The following outlines the costs and a cost benefit analysis for the entire project. 5.1 Risk Assessment Cost Item Units Cost Laptop WinSniffer L0phtCrack 6 Consulting AirMagnet WiFi Analyzer Pro AirMagnet 802.11 a/b/g/n Wireless PC card LanGuard Labour (team of 2 @ $40/hr) NetStumbler Kismet Ettercap LANBrowser Etheral 5.2 Item Cost Breakdown 1 40 1 1 1 1 1 Internal Cost For Security Implementation Units Training Compliance / Legal consultation Imeplementation and Design 5.3 1 $900.00 1 $45.00 1 $1,195.00 1 $3,000.00 1 $300.00 Total Purchasing Costs: 7,760.00 Total Labour Costs: $16,000.00 Total Cost: $23,760.00 $320.00 $80.00 $0.00 $0.00 $0.00 $0.00 $0.00 TOTAL Cost Extended Cost $900.00 $45.00 $1,195.00 $3,000.00 $300.00 $320.00 $3,200.00 $0.00 $0.00 $0.00 $0.00 $0.00 $8,960.00 Extended Cost 160 $40.00 $6,400.00 1 $2,000.00 $2,000.00 160 $40.00 $6,400.00 TOTAL $14,800.00 P a g e | 14 5.4 Cost-Benefit Analysis The greatest cost is the labour, however these intangible costs are already incurred in our payroll. The greatest benefit is the sense of reliability of our wireless network. A secure wireless network will improve our standings in the industry through industry standard compliance. Benefits: Improved relations with partners, contractors and clients Safeguarding sensitive data and intellectual property Resources to recover from an attack will consume more labour and costs Most software to conduct a risk assessment is free Network performance increase with less attacks Cost Benefit P a g e | 15 6.0 Quality Control 6.1 Quality Criteria Increase the level of security so only employees can access the wireless network Increase confidentiality of data so packets cannot be read if intercepted. Testing When the prerequisite decisions on architecture have been made, testing will begin. Any hardware needed will be purchased on evaluation terms from the manufacturer The goal of testing is to reduce the load of troubleshooting that occurs upon implementation Testing period must not exceed the time allotted. 6.2 6.3 6.4 Test Environment Project Manager will give permission to deploy the test environment Test environment will resemble final deliverable except in scale/scope Test environment should be inaccessible to normal employees or outside users (no SSID broadcast.) Test environment should be as physically isolated as possible to eliminate variables IT security team will configure test environment according to the previous deliverable plans Penetration Testing Penetration testing team will be contracted to audit the security of the wireless network Reports should be created by the audit team regarding the physical security, wireless security protocol (WEP, WPA), and best security practices (Non default naming) Changes according to the audit should be implemented and tested for bugs Authentication Test different authentication methods, (swipe cards, tokens, one-time passwords) Decide which best meets company’s needs Must remain under the same budget as the rest of the project 6.5 P a g e | 16 7. Risk Management Plan 7.1 Approach Approach to managing risk is defined by the following steps 1. Identify the Risk. The Project Manager will provide the most appropriate method for risk analysis. 2. Analyze the Risk. Each risk identified shall be analyzed for its potential impact on the project A Risk Assessment shall be completed for each risk entered directly into the Project Risk Log 3. Decide on the most appropriate mitigation strategies: There are several courses of action that can be taken to mitigate Risks: Prevent the Risk by assuming it will happen, and providing for the full impact in the project plan Reduce the Risk by implementing up-front some preventative actions aimed at reducing either the likelihood of occurrence, or the impact if it does Transfer the Risk to another party; for example, take out an insurance policy against the Risk occurring, or agree that another party provides for the Risk should it occur Accept the Risk; i.e. manage it if and when it happens. 4. Risk planning Modify plans to include agreed actions to mitigate the impact of Risks Identify and assign the resources to be used for the work to carry out the Risk mitigation requirements 5. Control the Risk. Ensure that the planned Risk actions are happening Check that execution of the planned actions is having the desired effect on the Risks identified 6. Monitor and report against the risks The Project Manager will monitor the risks on a regular and ad-hoc basis in order to identify potential changes to likelihood or impact. The risks will also be reviewed in regular Progress Meetings. 7.2 Risk Log The Risk Log states all known risks to the Project. The Risk Log will be a separate working document and maintained through the life of the project by the Project Manager. P a g e | 17 8 Project Controls This section details monitoring and control mechanisms that will be used on the project. 8.1 Monitoring Progress and Reporting The Project Manager will hold Checkpoint Meetings, gather progress information and progress and issues and Risks from the project team. Formal Progress Meetings will take place weekly. 8.2 End Stage Reviews The Project Manager will submit an End Stage Report to the Project Board at the end of each Project Stage. End stage review will be performed even if project is not complete Issues and solutions should be documented and submitted to Project Manager for use in future projects 8.3 Exception Conditions Exceptions to the project plan must be brought to the attention of the project manager Project Manager will decide whether to allow use of more time or cost or other resources Once approval is granted exception plan will be carried out 8.4 Actions The Project Manager will maintain an Actions Log 8.5 Time Recording The individual project tasks will be assigned to team members by the Project Manager 8.6 Issue Management Project manager will be responsible for maintaining the Issue Log Issue Log contains a summary of the current state of all project issues Issues that have been solved or updated should be brought to the attention of the Project manager to update the Issue log P a g e | 18 8.7 Change Control Changes to the project plan will follow the request for change method. A Request For Change is a request to change the specification of requirements An internal change process is favoured because it will result in faster change management. 8.8 Project Closure The Project Manager will: Review Project Issues, Actions and Risks Verify that all Acceptance Criteria have been met Verify that the team is ready to close the project Hold a formal hand-over meeting with the IT department P a g e | 19 9. Communication Plan Communication should be done by a member of the team who enjoys communicating, has good interpersonal skills and enough technical knowledge to be able to explain technical details to non-technical people. All communications to the stakeholders will be signed off by the project manager. 9.1 Management Team Financial Sponsor(CFO) Communication to the CFO will be once every two weeks. It should be brief and to the point with a focus on project finances and completion of goals/milestones. Communication will be done either by email or hard copies depending on the CFO's preference. Information Security Officer Since this project is heavily related to the companies security, the Information Security Officer(ISO) will be given a semi-weekly update via email of the project on the details regarding to the security implementation of the project. Communication should increase if necessary to inform ISO of any changes or plans created for the project that can affect security. 9.2 Core Project Team Information Technology Office This department is directly affected by the project so a brief overview of the I.T. related parts of the project will be sent on a daily basis. Project members may need to communicate more frequently on an individual basis to this department to ensure the project integrates as flawlessly as possible with the current I.T. infrastructure. Communication should be done by email. It may also be advisable to set-up a wiki or a bug tracker for easy communication of technical details between the project team and the I.T. department. 9.3 Legal Department The legal department should be communicated with any time the project managers feels that the something planned by the project might have a legal affect on the company. Every two weeks a project update of what the project has done and what it plans on doing. This will make sure that if the project manager may not have saw a legal problem created by the project the legal department can have a chance to spot it. Communication should be done by email or hard copies depending on their preference. 9.4 End users Employees and Contractors/Business Partners They should get notified of the project and a brief summary of what it means to them at the beginning of the project. They should also get notified as soon as possible of what days they will be trained on how to use the new secured wireless network. A week before the secured wireless network goes live they should be informed to ensure work flow is not hindered. Communication should be via email and a memo posted on company bulletin boards. We should set-up a help desk or utilize a current help desk to communicate with users who may have issues during a roll out. P a g e | 20 10 Configuration Management Plan 10.1 Document Repository All versions of documents should be saved electronically somewhere all necessary project stakeholders can view. The repository enables the Project Manager to Publish and share documents and other work in a central location Introduce a further element of control for projects where the team members are geographically dispersed Track the documentation and other work via audit trails and version control 10.2 Document Control The project has a unique name "XXXXX" and unique number – PRJ505 - which appears on all documentation. Document details, project name and date of issue will be included in a document header or footer on every page Electronic copies of appropriate documents will be placed in the documentation repository for audit-able safe keeping. Document version numbers will consist of major and minor versions, plus a draft character. An example of a document life-cycle would be: 10.3 1.0a – first draft 1.0b – second draft 1.0 – first issue 1.1a – minor change, first draft 1.1 – second issue 2.0a – major change, first draft 2.0 – second issue Document Standards Standard authoring tool for textual documents. Standard authoring tool for project Gantt charts is Microsoft Project 2007 Final form electronic documents in Adobe PDF format, which is viewable and printable on multiple platforms using the free Adobe Acrobat Reader software at http://www.adobe.com. A requirement to deliver documents in other formats will be raised as a project issue.
© Copyright 2026 Paperzz