Policy Management in a COA
|
|
|
- Ella Barton
- 10 years ago
- Views:
Transcription
1 Policy Management in a O John rnold hief Security rchitect, UK apgemini The ig Picture for usiness Technology apgemini 2009 ndy Mulholland 1
2 De-Perimeterised Organisations People Devices Movements between organisations are built-in Policies Organisation Information Risks ontracts & Processes The ig Picture for usiness Technology apgemini 2009 ndy Mulholland 2
3 Security Policy - Terminology Human Readable Security Policy is a security policy that is intended to be interpreted by humans in making security decisions. E.g. a security procedure Machine Readable Security Policy is a security policy that is intended to be interpreted by computer programs in making security decisions. E.g. an L Governance Policy is a policy that describes how a human or machine readable policy is determined or agreed. E.g. Most ISO27001 security policies. In collaboration with lient or Partner logo DOUMENT TITLE opyright apgemini 2008 ll Rights Reserved 3
4 urrent security policy approaches and the problems with them Machine readable policies tend to be lists rather than rules Machine readable policies are designed to be enforced by infrastructure rather than applications Machine readable policies not linked to business requirements pplication security policies are embedded into application code Organisations assume their policies are their own Use of Ls per resource Difficult to change as business needs change. One size fits all approach; cannot relate policies to business benefit Policies do not implement requirements properly and it is not clear how to change them May not meet business requirements. Difficult to change as business needs change Untrue where organisations handle information on behalf of someone else, the original information owner is a stakeholder in the policy Enormous number of Ls to manage In collaboration with lient or Partner logo DOUMENT TITLE opyright apgemini 2008 ll Rights Reserved 4
5 Handling policies better a new policy enforcement architecture User gent redentials/ Identity ccess Request/ ccess Response Policy Enforcement Point Decision Request/ Decision Response uthentication Service ttributes ttribute & uthentication uthority ttributes Policy Decision Point Policies Policy dministration Point Policies Policy uthority In collaboration with lient or Partner logo DOUMENT TITLE opyright apgemini 2008 ll Rights Reserved 5 22 nd 5
6 Handling policies better rich policy language Replace Ls by a machine readable policy expressed in a rich policy language rich policy language expresses access decisions in terms of the relevant contract states, e.g. this asset can be accessed by a direct employee of grade 4 and above, or any employee of a joint venture of a particular type There is a standard for expressing security policies: XML benefit of using standard security policies a policy for an asset can be specified once, then actioned by many different organisations as they pass the asset around The ig Picture for usiness Technology apgemini 2009 ndy Mulholland 6
7 Handling policies better more realistic governance patterns Security policy governance is the process whereby security policies are specified, tested and agreed. Some common patterns: reator control Subject ontrol N-man rule ontent based control ccountability orporate record Many information assets have more than one stakeholder and hence more than one policy stakeholder. The ig Picture for usiness Technology apgemini 2009 ndy Mulholland 7
8 Handling security policies better - security policy as a service Most organisations arent capable, or motivated, to develop their own security policies It would be better for suitably qualified organisations to specialise in creating standard security policy services to cover areas such as ompliance Hardening Product-specific policies This requires standardisation of the policy decision and query language (e.g. XML) but also of the enforcement hooks to be put into applications. The ig Picture for usiness Technology apgemini 2009 ndy Mulholland 8
IM and Presence. Skype for Business 2015 users. Legend. Skype for Business 2015 users. Active Directory Domain Services.
TP: 443 HTTP: 80 SIP/TLS: 5061 SIP/TLS: 5061 HTTPS: 443 IM and Presence SIP traffic: signaling and IM XMPP traffic HTTPS traffic MSMQ traffic LS traffic HTTPS: 4443 Director proxies Web traffic to destination
How To Improve Your Salary At The Finance Sector Union Of Ustralia
Secure PY @ FSU Summary Proposed lassification and Pay Model: Improved Proposal During 2013/14 enterprise bargaining negotiations FSU members raised concerns with the broken pay model at. In the 2014 greement,
Microsoft Dynamics NAV 2013 R2 Feature Comparison Tool
Microsoft Dynamics NAV 2013 R2 Feature Comparison Tool Microsoft Dynamics NAV Enhancements Times change. Technologies change. Business needs change. And organizations like yours need to change to keep
CA SiteMinder. SDK Overview. r6.0 SP6/6.x QMR 6. Second Edition
A SiteMinder SDK Overview r6.0 SP6/6.x QMR 6 Second Edition This documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation
South East of Process Main Building / 1F. North East of Process Main Building / 1F. At 14:05 April 16, 2011. Sample not collected
At 14:05 April 16, 2011 At 13:55 April 16, 2011 At 14:20 April 16, 2011 ND ND 3.6E-01 ND ND 3.6E-01 1.3E-01 9.1E-02 5.0E-01 ND 3.7E-02 4.5E-01 ND ND 2.2E-02 ND 3.3E-02 4.5E-01 At 11:37 April 17, 2011 At
AAdobe Systems Incorporated. Controlling Access to Adobe Creative Cloud Services INTRODUCTION SYNOPSIS
Controlling ccess to dobe Creative Cloud Services INTRODUCTION This document is written for dobe customers who for reasons of security or network access cost may wish to restrict access to Creative Cloud
STATEMENT OF WORK FOR HIPAA SECURITY RISK ANALYSIS
STTEMENT OF WOK FO HIP SECUITY ISK NLYSIS pril 14, 2004 Prepared by: Bob Matthews HIP Compliance Services Manager HIP cademy 4320 Winfield oad Warrenville, IL 60555 www.hipcademy.net Contact: 877.899.9974
Work Breakdown Structure
Work Breakdown tructure projectethod he ltimate ethodology urrent tep: ext tep: rev tep: Define cope Develop chedule ssign roject anager Work Breakdown tructure se this template to create a Work Breakdown
FM Administration Assistant Customer Services EHA1389-0715
It is important to note that this job description is a guide to the work you will initially be required to undertake. It may be changed from time to time to meet changing circumstances. It does not form
HIPAA Security: Complying with the HIPAA Security Rule Implementation Specifications Are You Correctly Addressing Them?
HIP Security: Complying with the HIP Security ule Implementation Specifications re You Correctly ddressing Them? The Seventh National HIP Summit Monday, September 15, 2003 Tom Walsh, CISSP 6108 West 121
Chartered Institute of Management Accountants. Chartered Institute of Management Accountants. Syllabus overview
The IM ertificate in Shared Services hartered Institute of Management ccountants hartered Institute of Management ccountants Syllabus overview Introduction Shared Services as an industry has grown enormously
Executive County Administrators
omp Plan - lassification List Executive ounty Administrators lassification Annual A Annual Agricultural ommissioner/sealer $143,158 $146,7 Assistant Executive Officer-Finance and Administration A $211,126
Qualification details
Qualification details Title New Zealand Diploma in Systems Administration (Level 6) Version 1 Qualification type Diploma Level 6 Credits 120 NZSCED 020305 Information Technology > Information Systems >
INFORMATION SYSTEMS EXAMINATIONS BOARD
Sample FITSM Paper 4v6a INFORMTION SYSTEMS EXMINTIONS OR Foundation ertificate in IT Service Management Sample Examination Paper 4v6 OPYING OF THIS PPER IS STRITLY FORIEN WITHOUT PRIOR WRITTEN ONSENT FROM
COMAH Competent Authority
OMH ompetent uthority Inspection of Electrical, ontrol and Instrumentation Systems at OMH Establishments (Operational elivery Guide) Page 1 of 23 Introduction 1 This elivery Guide (G) describes how the
Mitra Innovation Leverages WSO2's Open Source Middleware to Build BIM Exchange Platform
Mitra Innovation Leverages WSO2's Open Source Middleware to Build BIM Exchange Platform May 2015 Contents 1. Introduction... 3 2. What is BIM... 3 2.1. History of BIM... 3 2.2. Why Implement BIM... 4 2.3.
FEDERAL ACQUISITION REGULATION (FAR) AND DEPARTMENT OF DEFENSE FAR (DFAR) SUPPLEMENT ARE INCORPORATED BY REFERENCE HEREIN:
FEDERL QUISITION REGULTION (FR) ND DEPRTMENT OF DEFENSE FR (DFR) SUPPLEMENT RE INORPORTED Y REFERENE HEREIN: Legend of Limited pplicability: pplies to all P.O.s pplies if P.O. is greater than $100,000
Government of India Ministry of Communications & Information Technology Department of Electronics & Information Technology (DeitY)
Government of India Ministry of Communications & Information Technology Department of Electronics & Information Technology (DeitY) Title of Policy: Policy on Open APIs for Government of India Preamble:
Standards in health informatics
Standards in health informatics EVELYN J.S. HOVENGA Standards are the key towards facilitating the sharing and exchange of information between departments, health agencies and health workers. They are
Job Description. Director of Operations, UK Payments Administration Ltd
Job Description Job Title: Head of HR ompany: UK Payments Administration Ltd Reporting To: Director of Operations, UK Payments Administration Ltd Salary and: Human Resources Unit The Human Resources (HR)
THE BRITISH LIBRARY. Unlocking The Value. The British Library s Collection Metadata Strategy 2015-2018. Page 1 of 8
THE BRITISH LIBRARY Unlocking The Value The British Library s Collection Metadata Strategy 2015-2018 Page 1 of 8 Summary Our vision is that by 2020 the Library s collection metadata assets will be comprehensive,
CS2Bh: Current Technologies. Introduction to XML and Relational Databases. The Relational Model. The relational model
CS2Bh: Current Technologies Introduction to XML and Relational Databases Spring 2005 The Relational Model CS2 Spring 2005 (LN6) 1 The relational model Proposed by Codd in 1970. It is the dominant data
Using Your Personal Information
Important Using Your Personal Information A guide to how your personal information may be used by the Virgin Money Group and other organisations such as Credit Reference and Fraud Prevention Agencies.
Data Management Software
User Guide IM/T EN Issue 1 ata Management Software utohart The ompany We are an established world force in the design and manufacture of instrumentation for industrial process control, flow measurement,
PRINCE2 Passport Sample Papers
PRINE2 Passport Sample Papers Introduction This document is comprised of 4 separate examination papers. There are two sample Practitioner Papers and two sample Practitioner Re-Registration Papers which
Series B Information on the Transposition of Directive 2006/24/EC
DTRET/EXPGRP (2009) 5 FINL 03 12.2009 EXPERTS GROUP "THE PLTFORM FOR ELECTRONIC DT RETENTION FOR THE INVESTIGTION, DETECTION ND PROSECUTION OF SERIOUS CRIME" ESTLISHED Y COMMISSION DECISION 2008/324/EC
HIPAA and HITECH Act. Compliance Guide
HIP and HITECH ct Compliance Guide ugust 2012 What is HIP and the HITECH ct? Like most other industries, healthcare is moving away from paper processes to rely more heavily on the use of electronic information
Enterprise Application Integration (EAI) Techniques
Enterprise Application Integration (EAI) Techniques The development of technology over the years has led to most systems within an organisation existing in heterogeneous environments. That is to say, different
Guidance on Risk Management, Internal Control and Related Financial and Business Reporting
Guidance Corporate Governance Financial Reporting Council September 2014 Guidance on Risk Management, Internal Control and Related Financial and Business Reporting The FRC is responsible for promoting
VERITAS File Server Edition Managing Consolidated File Servers for Performance and Availability
VERITS File Server Edition Managing onsolidated File Servers for Performance and vailability Table of ontents Introduction...1 The VERITS File Server Edition...2 onsolidating File Servers...3 File Server
Data ownership within governance: getting it right
Data ownership within governance: getting it right Control your data An Experian white paper Data Ownership within Governance : Getting it right - 1 Table of contents 1. Introduction 03 2. Why is data
Managing Complex Outsourced Projects
New Book Published by H Incorporated Managing omplex Outsourced Projects By: regory. arrett, PM, PMP Winner of PMI s Project Management xcellence ward Quick Results urvey Question #1 Which of the following
Data analytics the changing use of data within Internal Audit
Data analytics the changing use of data within Internal Kiran Sudhakar Associate Director, Grant Thornton UK Overview Areas of discussion Introduction Common questions asked Evolution of data analytics
NIR-Online Getting Started Guide
NIR-Online Getting Started Guide The purpose of this document is to provide new users with some basic information about NIR-Online and their clyx.net account. The following areas will be covered by this
Office for Nuclear Regulation
ONR GUIDE LC17 Management Systems Document Type: ONR Nuclear Safety Technical Inspection Guide Unique Document ID and Revision No: NS-INSP-GD-017 Revision 2 Date Issued: November 2012 Review Date: November
What happens when you sign up to the ZoneFox Service?
What happens when you sign up to the ZoneFox Service? Overview According to the highly respected Verizon 2014 Data Breach Investigations Report 1, 2013 set a new record for the number of data breaches
Specialisation International Law
Specialisation International Law HAN-027 School of Law Specialisation International Law Introduction The structure of the program In a world of globalisation international legal dimensions get more important
Data Integration and Exchange. L. Libkin 1 Data Integration and Exchange
Data Integration and Exchange L. Libkin 1 Data Integration and Exchange Traditional approach to databases A single large repository of data. Database administrator in charge of access to data. Users interact
An Introduction to the ECSS Software Standards
An Introduction to the ECSS Software Standards Abstract This introduces the background, context, and rationale for the creation of the ECSS standards system presented in this course. Addresses the concept
VMware AlwaysOn Desktop Design Guide
VMware lwayson Desktop Design Guide Version 2.1 WHITE PPER Table of Contents bout Design Guides........................................................ 3 Introduction.... 3 udience... 3 usiness Case...
NC DIGITAL MEDIA COMPUTING
SCHOOL OF COMPUTING NC DIGITAL MEDIA COMPUTING NC COMPUTING: TECHNICAL SUPPORT (LEVEL 5&6) NC COMPUTER ARTS & ANIMATION NQ COMPUTING SOFTWARE DEVELOPMENT HND 3D COMPUTER ANIMATION HNC COMPUTING HND INFORMATION
This policy applies to all policies and procedures and supporting documentation such as work instructions and templates at the Whyalla City Council.
Page 1 of 6 1. POLICY OBJECTIVE It is critical that the Corporation of the City of Whyalla develops and continues to review and amend in a consistent manner, a broad range of both Council approved (public)
HIPAA compliance. Guide. and HIPAA compliance. gotomeeting.com
and HIP compliance 2 The Health Insurance Portability and ccountability ct (HIP) calls for privacy and security standards that protect the confidentiality and integrity of patient health information. Specifically,
Digital Rights Management - The Difference Between DPM and CM
WHITEPAPER SERIES 2003 IPR SYSTEMS Level 12, 77 Castlereagh Street Sydney, NSW 2000, AUSTRALIA [email protected] http://www.iprsystems.com Driving Content Management With Digital Rights Management Dr
Management of Physical Assets
Management of Physical Assets - Concepts to Reality Presenter: Ernst Krauss, Director, Asset Management Council Slide 1 Managing Assets is about Managing technical complexity Building and maintaining relationships
Understanding unit-linked funds
Understanding unit-linked funds Contents 02 What types of unit linked funds are there? 03 How does Standard Life calculate the value of its funds? 05 How are the prices of the units calculated? 06 How
STAR Deutschland GmbH
STAR Deutschland GmbH Your partner for customised technical solutions in translation and information management STAR Group Your single-source partner for corporate product communication STAR Deutschland
Business Continuity Management Policy and Framework
Management Policy and Framework Version: Produced by: Date Produced: Approved by: Updated: 7 University Manager with the assistance of the Operational Group 11 th March 2010 Steering Group (14 December
IMS 11: Moving Your Business Forward
11: Moving Your Business Forward Betty atterson IBM Distinguished Engineer IMS Development IBM Silicon Valley Laboratory November 18, 2008 Introducing IMS Version 11 IMS Version 11 Announced September
Principal Lecturer in Mental Health Nursing. School of Health and Social Care, College of Social Science
JOB SCRPTON JOB TTL: SCHOOL: POST NUMBR: LOCTON: RPORTS TO: Principal Lecturer in Mental Health Nursing School of Health and Social Care, College of Social Science HLSS2374 Brayford Campus eputy Head of
Describing Electronic Health Records Using XML Schema
Describing Electronic Health Records Using XML Schema Bird LJ, Goodchild A and Sue H R for Enterprise Distributed Systems (DST Pty Ltd) Level 7, GP South, The University of Queensland, Qld, 4072, Australia.
Institutional Repositories: Staff and Skills requirements
SHERPA Document Institutional Repositories: Staff and Skills requirements 8th August 2007 Circulation PUBLIC Mary Robinson Introduction This document began in response to requests received by the core
Programming Languages
Programming Languages Qing Yi Course web site: www.cs.utsa.edu/~qingyi/cs3723 cs3723 1 A little about myself Qing Yi Ph.D. Rice University, USA. Assistant Professor, Department of Computer Science Office:
BARNET AND SOUTHGATE COLLEGE JOB DESCRIPTION
BRNET ND SOUTHGTE COLLEGE JOB DESCRIPTION JOB TITLE: Marketing and Communications Team Leader SLRY GRDE: PO 2 HOURS: 36 hours per week PRIMRY LOCTION: PURPOSE OF POST: RESPONSIBLE TO: Grahame Park site,
INFORMATION GOVERNANCE STRATEGY NO.CG02
INFORMATION GOVERNANCE STRATEGY NO.CG02 Applies to: All NHS LA employees, Non-Executive Directors, secondees and consultants, and/or any other parties who will carry out duties on behalf of the NHS LA.
IP HEALTHCHECK SERIES. NoN-DISCLoSuRE AgREEmENTS. Intellectual Property Office is an operating name of the Patent Office
IP HEALTHCHECK SERIES NoN-DISCLoSuRE AgREEmENTS Intellectual Property Office is an operating name of the Patent Office This booklet forms part of our IP Healthcheck series, a suite of booklets and online
Energy Efficient Systems
Energy Efficient Systems Workshop Report (September 2014) Usman Wajid University of Manchester United Kingdom Produced as a result of Workshop on Energy Efficient Systems @ ICT4S conference, Stockholm
An Introduction to the PRINCE2 project methodology by Ruth Court from FTC Kaplan
An Introduction to the PRINCE2 project methodology by Ruth Court from FTC Kaplan Of interest to students of Paper P5 Integrated Management. Increasingly, there seems to be a greater recognition of the
User Equipment and Enterprise Mobility Infrastructure
Mobility apability Package 30 July 2012 The Mobility apability Package describes the Enterprise Mobility rchitecture, a layered security approach for using commercial devices and networks to securely connect
Social Care, Health and Housing Substance Misuse Team. How can we help? www.carmarthenshire.gov.uk/socialcare
Social Care, Health and Housing Substance Misuse Team How can we help? www.carmarthenshire.gov.uk/socialcare If you require this information in large print, Braille or on Audio please telephone 01267 228703
I. Personal data and its use in the business to business environment.
RESPONSE FROM THE DIRECT MARKETING ASSOCIATION (UK) LTD. TO THE EUROPEAN COMMISSION'S CONSULTATION ON THE IMPLEMENTATION OF DIRECTIVE 95/46 EC ON THE PROTECTION OF INDIVIDUALS WITH REGARD TO THE PROCESSING
Certa Qualification Unit Report
Certa Qualification Unit Report Certa, OCN House, Lower Warrengate, Wakefield, WF1 1S Telephone 01924 434 600 Qualification Title: QCF ID: Certa Entry Level ward in Work Preparation for usiness and dministration
Kanban vs Scrum. Henrik Kniberg - Crisp AB Agile coach & Java guy. A practical guide. Deep Lean, Stockholm May 19, 2009
Henrik Kniberg - risp gile coach & Java guy Kanban vs Scrum practical guide eep Lean, Stockholm May 19, 009 ofounder / TO of Goyada (mobile services) 30 developers Lead architect at ce Interactive (gaming)
ANSYS EKM Overview. What is EKM?
ANSYS EKM Overview What is EKM? ANSYS EKM is a simulation process and data management (SPDM) software system that allows engineers at all levels of an organization to effectively manage the data and processes
Mapping and Geographic Information Systems Professional Services
Mapping and Geographic Information Systems Professional Services G-Cloud Services RM 1557 Service Definition Esri UK GCloud 5 Lot 4 Specialist Services Government Procurement Service Acknowledgement Esri
Certification of Electronic Health Record systems (EHR s)
Certification of Electronic Health Record systems (EHR s) The European Inventory of Quality Criteria Georges J.E. DE MOOR, M.D., Ph.D. EUROREC EuroRec The «European Institute for Health Records» A not-for-profit
