Two security patterns: Least Privilege and Security Logger and Auditor
|
|
|
- Magdalene Murphy
- 10 years ago
- Views:
Transcription
1 Two security patterns: Least Privilege and Security Logger and Auditor Eduardo B. Fernandez 1, Sergio Mujica 2, and Francisca Valenzuela 2 1 Dept. of Comp. Science and Eng., Florida Atlantic University, Boca Raton, FL, USA [email protected] 2 Escuela de Informatica, Universidad Andres Bello, Santiago, Chile, [email protected] Abstract We present here two security patterns that describe fundamental aspects: Least Privilege-- How can we minimize misuses by the users or workers of an institution? Give the users or the executing processes of a system the rights they need to perform their functions and no more. Security Logger/Auditor-- How can we keep track of user s actions in order to determine who did what and when? Log all security-sensitive actions performed by users and provide controlled access to records for Audit purposes. Introduction We present here two patterns that describe fundamental security aspects: Least Privilege-- How can we minimize misuses by the users or workers of an institution? Give the users or the executing processes of a system the rights they need to perform their functions and no more. Security Logger/Auditor-- Log all security-sensitive actions performed by users and provide controlled access to records for Audit purposes. Least privilege is a fundamental security principle. We intend to write patterns for all the principles in [Sal75]. Logging is one of the three basic security mechanisms, that should be present in any secure system, the others being Authentication and Authorization/Access Control. Least privilege Intent How can we minimize misuses by the users or workers of an institution? Give the users or the executing processes of a system the rights they need to perform their functions and no more. AKA Need-to-know, Principle of Least Authority (POLA) Example A hospital uses Role-Based Access Control (RBAC) to define the rights of its employees. For example, doctors and nurses can read and write medical records and related patient information (lab tests, medicines, ). When a famous patient came to the hospital, one of
2 the doctors, who was not treating him, read his medical record and leaked this information to the press. In another incident, a malicious employee changed the amount of medication of a patient with the intent of harming her. Context Any system where users must be given rights to use resources (objects). Problem When users are given too many rights, the probability that they will abuse them will increase. How can we minimize misuses by the users or workers of an institution? The solution to this problem is driven by the following forces: Misuse avoidance. If users or processes are given too many rights, it is possible for them to perform misuses of the resources to which they have access. An executing process cannot attack other processes or access unauthorized data if its rights are limited. Default user rights. There should be no other rights except those explicitly given. Otherwise, we cannot know if we gave only the needed rights. Authorization. There must be a way to give rights to users so that resources (objects) should only be accessed by authorized users. These rights should have an appropriate granularity. Authentication. If we do not know who is in the system, we cannot enforce any rights given to users or processes. Error avoidance. Restricting rights decreases the effects of accidental errors that now can compromise a smaller number of items. Performance. Giving too fine rights may result in performance overhead. Administration. Giving too fine rights may result on extra work for administrators and may lead to their confusion. Productivity. A restrictive use of this policy may hinder the productivity of users or applications. Solution Give the users or the executing processes of a system the rights they need to perform their functions and no more. This implies a closed system, where no authorization means no access and having an access control system able to enforce a fine granularity access. It also implies a security administrator role, that can grant, revoke, or modify rights.
3 Implementation Since least privilege is a policy or a design principle, it can be applied in a variety of ways. We discuss some possibilities below. In fact, these can be patterns in their own right. To apply this principle to users, determine a minimum set of rights from the system use cases: For each user, see in which use cases she participates and give her only the rights needed to perform her duties. [Fer97] shows that for Role-Based Access Control (RBAC), we can determine the need-to-know rights by analyzing all the use cases of the system. Rights assignment Structure Figure 1 illustrates the application of the pattern. The Authorizer creates Rights and assigns them to Subjects in order to let them access Objects (resources). The Right includes an access type and may include a predicate for content-dependent access control. To do the assignment, the Authorizer checks the predefined Rights associated with the User functions and assigns them to the users (Object Rights). The rights are only the minimal rights they need to perform their functions. Some Users can act as Authorizers, i.e. they can give rights to other users if they have administrative functions. Users then become subjects for authorization rights. Right id Subject User id name assignright accesstype 1 actsas create 1 Authorizer assignright 1 hasfunction assignedrights Object User Function Object Right Figure 1. Class diagram of the Need-to-Know Authorizer pattern
4 Dynamics Figure 2 shows a sequence diagram for the use case Assign Rights to a User. A user requests rights from an Authorizer (security administrator role), who checks his Function Rights (Object rights derived from his Function), and creates the corresponding rights. The rights are then assigned to the User. Figure 2. Sequence diagram for use case Assign Rights to a User Enforcement Enforcement depends on which architectural level we are applying this principle. For example, in a DBMS we can enforce this principle using views. Figure 3 shows a possible enforcement structure. Users are given DataViews that are collections of Rights, including access types (maybe restricted by predicates) to access (read, modify) DataItems in a DBMS. For processes, enforcement can be done using Protection Rings [Fer08] or using a Controlled Virtual Address Space (Sandbox) [Sch06]. Other approaches to enforcement are: Privileges in Batch mode: Sometimes to reduce security risk, a system operates in various batch modes where a particular set of privileges will be granted as a unit before execution. The execution of the preapproved user requests are scheduled according to the batch execution sequence. Virtual update privileges: Some data updates (e.g. wikipedia updates) need to be double-checked before making the updates persistent. The updates for such data can be made as virtual updates where a temporary copy of the data is made. The data updates can be made on the temporary copy, the original copy of the data is modified upon approval from a higher authority.
5 User DataView id authorizedfor name adduser removeuser use usedin DataItem name read modify access Right accesstype: {read,modify} predicate Figure 3. Enforcement using views Known uses Making address lists use authorization to control access to their contents can control virus propagation [Fer10]. Other virus actions can be controlled similarly [Kar03]. Operating systems such as Windows use this principle to control the execution of processes [MS06]. [wik10] mentions applications in the SELinux and Solaris operating systems. Example resolved After the incident, the hospital started applying a need-to-know policy for accessing patient records. Now doctors can read and modify only the records of their own patients. This approach can prevent most cases like the one above. Consequences This pattern has the following advantages: Closed system. Omitting a right does not produce a potential security violation. Authorization. Every access is mediated and we can apply any degree of fineness to rights.
6 Misuse avoidance. Users can now perform accesses only to resources for which they have rights. Forensics and auditing. If a misuse has happened, it is easier to determine who did it since users have more precise rights. Error avoidance. Since users don t have unnecessary rights they can perform less damage in case of error. Performance. It is possible to control the fineness of rights so that there is acceptable performance overhead. Administration. It is possible to define policies such that there are not too many rights and they can be handled conveniently. Productivity. Using the definition of task as a guideline we can give each user enough rights to perform her job. The solution also has some liabilities: Some misuses are still possible because users may misuse their legitimate rights. We can control those using policies such as Logging/Auditing and Separation of Duty We need to have an access control system with appropriate fineness or there will be no way to enforce the defined rights. We need to have a clear definition of functions so we know which rights are needed to perform each function. A method to define rights for roles is shown in [Fer97]. A too-restrictive use of this policy could hinder the work of users or applications. Related patterns Role Rights Definition [Sch06], based on [Fer97], applies this policy when defining the rights of users starting from use cases. The Controlled Virtual Address Space (Sandbox) pattern defines a structure to apply this principle to constrain the execution of processes [Sch06]. The Protection Rings pattern provides architectural support to apply least privilege to processes [Fer08]. The Reference Monitor [Sc06], is an abstract pattern that describes the way to perform enforcement.
7 Security Logger and Auditor Intent How can we keep track of user s actions in order to determine who did what and when? Log all security-sensitive actions performed by users and provide controlled access to records for Audit purposes. AKA Audit Trail Example A hospital uses RBAC to define the rights of its employees. For example, doctors and nurses can read and write medical records and related patient information (lab tests and medicines). When a famous patient came to the hospital, one of the doctors, who was not treating him, read his medical record and leaked this information to the press. When the leak was discovered there was no way to find out who was the doctor that had accessed the patient's records. Context Any system that handles sensitive data, in which it is necessary to keep a record of access to data. Problem How can we keep track of user s actions in order to determine who did what and when? The solution to this problem is driven by the following forces: Accuracy. We should faithfully record what a user or process has done with respect to the use of system resources. Security: Any information we use to keep track of what the users have done must be protected. Unauthorized reading may reveal sensitive information. Tampering may erase past actions. Forensics: When a misuse of data occurs it may be necessary to audit the access operations performed by users to determine possible unauthorized actions and maybe trace the attacker or understand how the attack occurred. System improvement. The same misuses may keep occurring; we need to learn from past attacks. Compliance. We need a way to verify and to prove to third parties that we have complied with institution policies and external regulations. Performance. We need to minimize the overhead of logging. Solution
8 Each time a user accesses some object, we record this access, indicating the user identifier, the type of access, the object accessed, and the time when the access happened. The database of entries must have authentication and authorization systems and maybe an encryption capability. Structure In Figure 4, User operations are logged by the LoggerAuditor. The Logger Auditor keeps the Log of user accesses, where each access is described by a LogEntry. The Security Administrator (SecAdmin) activates or deactivates the Log. The Auditor can read the log to detect possible unauthorized actions. User operation Logger Auditor Sec Admin activate/deactivate activate deactivate applyfilter encryptentry audit 1 Log addentry readentry Auditor read Log Entry time action Figure 4. Class diagram of the Secure Logger/Auditor pattern Dynamics Possible use cases include: Log User Access, Audit Log, Query LogDB A sequence diagram for the use case Log User Access is shown in Figure 5. The user performs an operation to apply an access type on some object: operation (accesstype t, object o). The Logger adds an entry with this information in the Log and the name of the user. The Log creates an entry adding also the time of the operation.
9 <<actor>> :User :LoggerAuditor :Log operation (t,o) addentry ( ) create(time) :LogEntry Figure 5. Use case Log User Access Implementation The class diagram of Figure 4 provides a clear guideline for implementation since its classes can be directly implemented in any object-oriented language. We need to define commands to activate or deactivate logging, apply filters, indicate devices to be used, allocate amount of storage, select security mechanisms. One can filter some logging by selecting users, events, importance of events, times, and objects in the filters. Administrative sec actions, e.g. account creation/deletion, assignment of rights, and others, must also be logged. Logging is performed by calling methods on the Logger class. Every non-filtered user operation should be logged. Logged messages can have levels of importance associated with them. Audit is performed reading the log by an auditor. This can be complemented with manual assessments that include interviewing staff, performing security vulnerability scans, reviewing application and operating system access controls, and analyzing physical access to the systems [sau]. The MVC pattern can be used to visualize the data using different views during some complex statistical analysis of the log data. Example resolved After the incident, the hospital installed a Security Logger so in the future such violations could be discovered. Variants Most systems have a System Logger, used to undo/rollback actions after a system crash. That type of Logger has different requirements but sometimes is merged with the Security Logger [SAP01]. System logs are of interest to system and database
10 administrators, while security logs are used by security administrators, auditors, and system designers. Another variant could include the automatic rising of alarms by periodic examination of the Log, searching records that match a number of rules that characterize known violations. For example, Intrusion Detection Systems use this variant. We can also add logging for reliability, to detect accidental errors. Known uses Most modern operating systems, including Microsoft Windows [smi04], AIX Solaris [aix], and others have security loggers. SAP uses both a security audit log and a system log [SAP01]. Consequences This pattern presents the following advantages: Security: It is possible to add appropriate security mechanisms to protect the recorded data, e.g. access control and/or encryption. Forensics: Enables forensic auditing of misused data objects. Records of access can be used to find if someone has maliciously gained access to data. This pattern can also be used to log access by system processes to data objects. For example, malicious code planted in the system can be tracked by finding processes that have misused objects. System improvement. By studying how past attacks happened, we can improve the system security. Compliance. Auditing a log can be used to verify and prove that institutional and regulatory policies have been followed. Performance. We can reduce overhead by parallel or background logging. We can also not log some events not considered significant. Finally, we can merge this log with the recovery log, needed for possible rollback. The pattern has the following liabilities: It can incur significant overhead since each object access has to be logged. See above. A decision must be made by software designers as to the grain size at which objects are logged. There is a tradeoff between security and performance.
11 It is not easy to perform forensic analysis and specialists are required. Protecting the log adds some overhead and cost. Related patterns The Secure Logger is a pattern for J2EE [Ste06]. It defines how to capture the application-specific events and exceptions to support security auditing. This pattern is mostly implementation oriented and does not consider the conceptual aspects discussed in our pattern. It should have been called a security logger because it does not include any mechanisms to protect the logged information. M. Fowler has an Audit Log analysis pattern [Fow] for tracking temporal information. The idea is that any time something significant happens you write some record indicating what happened and when it happened. Authentication [Sch06]. How can we make sure that a subject is who he says he is? Authorization [Sch06]. How can we control who can access which resources and how in a computer system? Conclusions These two patterns focus on fundamental aspects of security and as such they have a wide application. Least privilege is a basic principle for security that should be applied in all systems in every architectural level. Log and audit form a basic security mechanism, required in any system that handles sensitive information. Future work includes patterns for Database Security using Views, and other principles such as Separation of Duty. Acknowledgements We thank our shepherd Kiran Kumar for his valuable comments that significantly improved our paper. References [aix10] AIX system security auditing, [Fer97] E. B. Fernandez and J. C. Hawkins, Determining role rights from use cases, Procs. 2nd. ACM Workshop on Role-Based Access Control, November 1997, [Fer08] E.B.Fernandez and D. LaRed M., "Patterns for the secure and reliable execution of processes". Procs. of the 15th Int.Conference on Pattern Languages of Programs (PLoP 2008), colocated with OOPSLA, Nashville, TN, Oct
12 [Fer10] E.B.Fernandez, N. Yoshioka, and H. Washizaki, "A Worm misuse pattern", Procs. of the 1st Asian Conference on Pattern Languages of Programs(AsianPLoP 2010), Tokyo, Japan, March 16-17, 2010, (last accessed Jan. 20, 2011) [Fow] M. Fowler, Audit Log, [Kar10] A.H. Karp, Enforce POLA on processes to control viruses, Comm. ACM, vol. 46, No 12, December 2003, [MS06] Microsoft, Applying the Principle of Least Privilege to User Accounts on Windows XP, (last accessed Jan. 20, 2011). [Sal75] J. H. Saltzer and M.D.Schroeder, The protection of information in computer systems, Procs. of the IEEE, vol. 63, No 9, September 1975, (last accessed January 20, 2011) [SAP01] SAP AG, Comparing rge security audit log and the system log, l=&oq=&pbx=1&fp=c801187a8d9c3641 [sau] [Sch06] M. Schumacher, E.B.Fernandez, D. Hybertson, F. Buschmann, and P. Sommerlad, Security Patterns: Integrating security and systems engineering, Wiley [Smi04] Randall F. Smith Auditing users and groups with the Windows security logwindows 20041http:// Windows-Security-Log.html [Ste06] Chapter 9 in Securing the Web Tier: Design Strategies and Best Practices,. [wik] Principle of least privilege, (last accessed Jan. 20, 2011).
Cloud Access Security Broker (CASB): A pattern for secure access to cloud services
Cloud Access Security Broker (CASB): A pattern for secure access to cloud services EDUARDO B. FERNANDEZ, Florida Atlantic University NOBUKAZU YOSHIOKA, National Institute of Informatics HIRONORI WASHIZAKI,
A methodology for secure software design
A methodology for secure software design Eduardo B. Fernandez Dept. of Computer Science and Eng. Florida Atlantic University Boca Raton, FL 33431 [email protected] 1. Introduction A good percentage of the
On Building Secure SCADA Systems using Security Patterns. Outline
On Building Secure SCADA Systems using Security Patterns E.B.Fernandez, J.Wu, M.M. Larrondo-Petrie, and Y. Shao Dept. of Computer Science and Engineering Florida Atlantic University Boca Raton, FL, USA
Two patterns for cloud computing: Secure Virtual Machine Image Repository and Cloud Policy Management Point
Two patterns for cloud computing: Secure Virtual Machine Image Repository and Cloud Policy Management Point EDUARDO B. FERNANDEZ, Universidad Tecnica Federico Santa Maria, Chile RAUL MONGE, Universidad
Analysis Patterns for Patient Treatment Records
Analysis Patterns for Patient Treatment Records Tami Sorgente, Eduardo B. Fernandez, and Maria M. Larrondo Petrie Dept. of Computer Science and Engineering, Florida Atlantic University, Boca Raton, FL
Patterns for cloud firewalls. Eduardo B. Fernandez 1, Nobukazu Yoshioka 2, and Hironori Washizaki 3
Patterns for cloud firewalls Eduardo B. Fernandez 1, Nobukazu Yoshioka 2, and Hironori Washizaki 3 1 Dept. of Computer Science and Engineering, Florida Atlantic University, USA, [email protected] 2 GRACE
The Software Container pattern
The Software Container pattern Madiha H. Syed and Eduardo B. Fernandez Dept. of Computer and Elect. Eng. and Computer Science Florida Atlantic University, Boca Raton, FL 33431, USA [email protected], [email protected]
Incorporating database systems into a secure software development methodology
Incorporating database systems into a secure software development methodology Eduardo B. Fernandez 1, Jan Jurjens 2, Nobukazu Yoshioka 3, and Hironori Washizaki 4 1 Dept. of Computer Science, Florida Atlantic
An Analysis Pattern for Invoice Processing Eduardo B. Fernandez 1 and Xiaohong Yuan 2
An Analysis Pattern for Invoice Processing Eduardo B. Fernandez and Xiaohong Yuan 2 Department of Computer Science and Engineering Florida Atlantic University, Boca Raton, FL 2 Department of Computer Science
More patterns for operating systems access control
More patterns for operating systems access control Eduardo B. Fernandez and John C. Sinibaldi Dept. of Computer Science and Eng. Florida Atlantic University Boca Raton, FL, USA [email protected], [email protected]
Two patterns for cloud computing: Secure Virtual Machine Image Repository and Cloud Policy Management Point
Two patterns for cloud computing: Secure Virtual Machine Image Repository and Cloud Policy Management Point EDUARDO B. FERNANDEZ, Universidad Tecnica Federico Santa Maria, Chile RAUL MONGE, Universidad
Cipher Suite Rollback: A Misuse Pattern for the SSL/TLS Client/Server Authentication Handshake Protocol
Cipher Suite Rollback: A Misuse Pattern for the SSL/TLS Client/Server Authentication Handshake Protocol ALI ALKAZIMI, Florida Atlantic University EDUARDO B. FERNANDEZ, Florida Atlantic University Transport
Leveraging Microsoft Privileged Identity Management Features for Compliance with ISO 27001, PCI, and FedRAMP
P a g e 1 Leveraging Microsoft Privileged Identity Management Features for Compliance with ISO 27001, PCI, and FedRAMP December 24, 2015 Coalfire Systems, Inc. www.coalfire.com 206-352- 6028 w w w. c o
The SOAP Pattern for Medical Charts
The SOAP Pattern for Medical Charts Tami Sorgente, Eduardo B. Fernandez, and Maria M. Larrondo Petrie Dept. of Computer Science and Engineering, Florida Atlantic University, Boca Raton, FL 3343 [email protected],
A pattern language for security models
A pattern language for security models Eduardo B. Fernandez and Rouyi Pan Dept. of Computer Science and Eng. Flora Atlantic University Boca Raton, FL 33431 [email protected] Abstract Security is a serious
Data Security Incident Response Plan. [Insert Organization Name]
Data Security Incident Response Plan Dated: [Month] & [Year] [Insert Organization Name] 1 Introduction Purpose This data security incident response plan provides the framework to respond to a security
A Pattern Language for Firewalls
A Pattern Language for Firewalls Eduardo B. Fernandez, Maria M. Larrondo-Petrie, Naeem Seliya, Nelly Delessy, and Angela Herzberg Dept. of Computer Science and Eng. Florida Atlantic University Boca Raton,
Patterns for Secure Boot and Secure Storage in Computer Systems
Patterns for Secure Boot and Secure Storage in Computer Systems Hans Löhr, Ahmad-Reza Sadeghi, Marcel Winandy Horst Görtz Institute for IT Security, Ruhr-University Bochum, Germany {hans.loehr,ahmad.sadeghi,marcel.winandy}@trust.rub.de
BM482E Introduction to Computer Security
BM482E Introduction to Computer Security Lecture 7 Database and Operating System Security Mehmet Demirci 1 Summary of Lecture 6 User Authentication Passwords Password storage Password selection Token-based
Secure Database Development
Secure Database Development Jan Jurjens () and Eduardo B. Fernandez (2) () Computing Department, The Open University, Milton Keynes, MK7 8LA GB http://www.jurjens.de/jan (2) Dept. of Computer Science,
Analysis patterns for Customer Relationship Management (CRM)
Analysis patterns for Customer Relationship Management (CRM) Mei Fullerton and Eduardo B. Fernandez Dept. of Computer Science and Engineering Florida Atlantic University Boca Raton, FL 33431 [email protected],
Two patterns for distributed systems: Enterprise Service Bus (ESB) and Distributed Publish/Subscribe
Two patterns for distributed systems: Enterprise Service Bus (ESB) and Distributed Publish/Subscribe Eduardo B. Fernandez 1, Nobukazu Yoshioka 2, and Hironori Washizaki 3 1 Dept. of Comp. Science and Eng.,
ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster
Security Standards Symantec shall maintain administrative, technical, and physical safeguards for the Symantec Network designed to (i) protect the security and integrity of the Symantec Network, and (ii)
Using Automated, Detailed Configuration and Change Reporting to Achieve and Maintain PCI Compliance Part 4
WHITEPAPER Using Automated, Detailed Configuration and Change Reporting to Achieve and Maintain PCI Compliance Part 4 An in-depth look at Payment Card Industry Data Security Standard Requirements 10, 11,
Security Testing. How security testing is different Types of security attacks Threat modelling
Security Testing How security testing is different Types of security attacks Threat modelling Note: focus is on security of applications (not networks, operating systems) Security testing is about making
Data Management Policies. Sage ERP Online
Sage ERP Online Sage ERP Online Table of Contents 1.0 Server Backup and Restore Policy... 3 1.1 Objectives... 3 1.2 Scope... 3 1.3 Responsibilities... 3 1.4 Policy... 4 1.5 Policy Violation... 5 1.6 Communication...
FIREWALL CHECKLIST. Pre Audit Checklist. 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review.
1. Obtain previous workpapers/audit reports. FIREWALL CHECKLIST Pre Audit Checklist 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review. 3. Obtain current network diagrams
I S O I E C 2 7 0 0 2 2 0 1 3 I N F O R M A T I O N S E C U R I T Y A U D I T T O O L
15.1 ESTABLISH SECURITY AGREEMENTS WITH SUPPLIERS 15.1.1 EXPECT SUPPLIERS TO COMPLY WITH RISK MITIGATION AGREEMENTS Do you clarify the information security risks that exist whenever your suppliers have
How To Secure A Database From A Leaky, Unsecured, And Unpatched Server
InfoSphere Guardium Ingmārs Briedis ([email protected]) IBM SW solutions Agenda Any questions unresolved? The Guardium Architecture Integration with Existing Infrastructure Summary Any questions
IDENTITY & ACCESS. Privileged Identity Management. controlling access without compromising convenience
IDENTITY & ACCESS Privileged Identity Management controlling access without compromising convenience Introduction According to a recent Ponemon Institute study, mistakes made by people Privilege abuse
Observations from the Trenches
Observations from the Trenches CSO Breakfast Club Retail and PCI Security Forum May 2010 Olivia Rose Jenkins, CISSP, QSA Sr. Security Consultant Agenda Conversations with CXO s PCI and Your Security Program
REGULATIONS FOR THE SECURITY OF INTERNET BANKING
REGULATIONS FOR THE SECURITY OF INTERNET BANKING PAYMENT SYSTEMS DEPARTMENT STATE BANK OF PAKISTAN Table of Contents PREFACE... 3 DEFINITIONS... 4 1. SCOPE OF THE REGULATIONS... 6 2. INTERNET BANKING SECURITY
Chapter 23. Database Security. Security Issues. Database Security
Chapter 23 Database Security Security Issues Legal and ethical issues Policy issues System-related issues The need to identify multiple security levels 2 Database Security A DBMS typically includes a database
2. From a control perspective, the PRIMARY objective of classifying information assets is to:
MIS5206 Week 13 Your Name Date 1. When conducting a penetration test of an organization's internal network, which of the following approaches would BEST enable the conductor of the test to remain undetected
GFI White Paper PCI-DSS compliance and GFI Software products
White Paper PCI-DSS compliance and Software products The Payment Card Industry Data Standard () compliance is a set of specific security standards developed by the payment brands* to help promote the adoption
A Websense Research Brief Prevent Data Loss and Comply with Payment Card Industry Data Security Standards
A Websense Research Brief Prevent Loss and Comply with Payment Card Industry Security Standards Prevent Loss and Comply with Payment Card Industry Security Standards Standards for Credit Card Security
Cloud Infrastructure Pattern
1 st LACCEI International Symposium on Software Architecture and Patterns (LACCEI-ISAP-MiniPLoP 2012), July 23-27, 2012, Panama City, Panama. Cloud Infrastructure Pattern Keiko Hashizume Florida Atlantic
CSP & PCI DSS Compliance on HP NonStop systems
CSP & PCI DSS Compliance on HP NonStop systems July 23, 2014 For more information about Computer Security Products Inc., contact us at: 200 Matheson Blvd. West Suite 200 Mississauga, Ontario, Canada L5R
California State University, Chico. Information Security Incident Management Plan
Information Security Incident Management Plan Version 0.8 January 5, 2009 Table of Contents Introduction... 3 Scope... 3 Objectives... 3 Incident Management Procedures... 4 Roles and Responsibilities...
ACCESS RIGHTS MANAGEMENT Securing Assets for the Financial Services Sector
ACCESS RIGHTS MANAGEMENT Securing Assets for the Financial Services Sector V.2 Final Draft May 1, 2014 [email protected] This revision incorporates comments from the public. Page Use case 1 Comments
Guardium Change Auditing System (CAS)
Guardium Change Auditing System (CAS) Highlights. Tracks all changes that can affect the security of database environments outside the scope of the database engine Complements Guardium's Database Activity
ICTN 4040. Enterprise Database Security Issues and Solutions
Huff 1 ICTN 4040 Section 001 Enterprise Information Security Enterprise Database Security Issues and Solutions Roger Brenton Huff East Carolina University Huff 2 Abstract This paper will review some of
White Paper. Sarbanes Oxley and iseries Security, Audit and Compliance
White Paper Sarbanes Oxley and iseries Security, Audit and Compliance This White Paper was written by AH Technology Distributors of isecurity a suite of iseries security products developed by Raz-Lee Security
The introduction covers the recent changes is security threats and the effect those changes have on how we protect systems.
1 Cyber-attacks frequently take advantage of software weaknesses unintentionally created during development. This presentation discusses some ways that improved acquisition practices can reduce the likelihood
AlienVault for Regulatory Compliance
AlienVault for Regulatory Compliance Overview of Regulatory Compliance in Information Security As computers and networks have become more important in society they and the information they contain have
TASK -040. TDSP Web Portal Project Cyber Security Standards Best Practices
Page 1 of 10 TSK- 040 Determine what PCI, NERC CIP cyber security standards are, which are applicable, and what requirements are around them. Find out what TRE thinks about the NERC CIP cyber security
Information Technology Engineers Examination. Information Security Specialist Examination. (Level 4) Syllabus
Information Technology Engineers Examination Information Security Specialist Examination (Level 4) Syllabus Details of Knowledge and Skills Required for the Information Technology Engineers Examination
High Level Cyber Security Assessment 2/1/2012. Assessor: J. Doe
2/1/2012 Assessor: J. Doe Disclaimer This report is provided as is for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information
Agenda. Agenda. Security Testing: The Easiest Part of PCI Certification. Core Security Technologies September 6, 2007
Security Testing: The Easiest Part of PCI Certification Core Security Technologies September 6, 2007 Agenda Agenda The PCI Standard: Security Basics and Compliance Challenges Compliance + Validation =
Organizations Must Employ Effective Data Security Strategies
Research Publication Date: 30 August 2005 ID Number: G00123639 Organizations Must Employ Effective Data Security Strategies Rich Mogull Organizations can best protect data through a hierarchical data security
March 2012 www.tufin.com
SecureTrack Supporting Compliance with PCI DSS 2.0 March 2012 www.tufin.com Table of Contents Introduction... 3 The Importance of Network Security Operations... 3 Supporting PCI DSS with Automated Solutions...
How To Buy Nitro Security
McAfee Acquires NitroSecurity McAfee announced that it has closed the acquisition of privately owned NitroSecurity. 1. Who is NitroSecurity? What do they do? NitroSecurity develops high-performance security
H Y T RUST: S OLUTION B RIEF. Solve the Nosy Neighbor Problem in Multi-Tenant Environments
H Y T RUST: S OLUTION B RIEF Solve the Nosy Neighbor Problem in Multi-Tenant Environments Summary A private cloud with multiple tenants such as business units of an enterprise or customers of a cloud service
Applying the Principle of Least Privilege to Windows 7
1 Applying the Principle of Least Privilege to Windows 7 2 Copyright Notice The information contained in this document ( the Material ) is believed to be accurate at the time of printing, but no representation
Database Security Guideline. Version 2.0 February 1, 2009 Database Security Consortium Security Guideline WG
Database Security Guideline Version 2.0 February 1, 2009 Database Security Consortium Security Guideline WG Table of Contents Chapter 1 Introduction... 4 1.1 Objective... 4 1.2 Prerequisites of this Guideline...
Teleran PCI Customer Case Study
Teleran PCI Customer Case Study Written by Director of Credit Card Systems for Large Credit Card Issuer Customer Case Study Summary A large credit card issuer was engaged in a Payment Card Industry Data
Network Security Policy
Network Security Policy I. PURPOSE Attacks and security incidents constitute a risk to the University's academic mission. The loss or corruption of data or unauthorized disclosure of information on campus
The IDG 9074 Remote Access Controller
secure Agent Secure Enterprise Solutions Product Overview The IDG 9074 Remote Access Controller 2448 E. 81 st St, Ste 2000 Tulsa OK 74137-4271 USA Tel: 918.971.1600 Fax: 918.971.1623 www.secureagent.com
Securing SharePoint 101. Rob Rachwald Imperva
Securing SharePoint 101 Rob Rachwald Imperva Major SharePoint Deployment Types Internal Portal Uses include SharePoint as a file repository Only accessible by internal users Company Intranet External Portal
Plain English Guide To Common Criteria Requirements In The. Field Device Protection Profile Version 0.75
Plain English Guide To Common Criteria Requirements In The Field Device Protection Profile Version 0.75 Prepared For: Process Control Security Requirements Forum (PCSRF) Prepared By: Digital Bond, Inc.
Stay ahead of insiderthreats with predictive,intelligent security
Stay ahead of insiderthreats with predictive,intelligent security Sarah Cucuz [email protected] IBM Security White Paper Executive Summary Stay ahead of insider threats with predictive, intelligent
AN ENHANCED ATTRIBUTE BASED ENCRYPTION WITH MULTI PARTIES ACCESS IN CLOUD AREA
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 1, January 2014,
Monitoring and Logging Policy. Document Status. Security Classification. Level 1 - PUBLIC. Version 1.0. Approval. Review By June 2012
Monitoring and Logging Policy Document Status Security Classification Version 1.0 Level 1 - PUBLIC Status DRAFT Approval Life 3 Years Review By June 2012 Owner Secure Research Database Analyst Change History
SECURITY MODELS FOR OBJECT-ORIENTED DATA BASES
82-10-44 DATA SECURITY MANAGEMENT SECURITY MODELS FOR OBJECT-ORIENTED DATA BASES James Cannady INSIDE: BASICS OF DATA BASE SECURITY; Discretionary vs. Mandatory Access Control Policies; Securing a RDBMS
THE IMPORTANCE OF CODE SIGNING TECHNICAL NOTE 02/2005
THE IMPORTANCE OF CODE SIGNING TECHNICAL NOTE 02/2005 13 DECEMBER 2005 This paper was previously published by the National Infrastructure Security Co-ordination Centre (NISCC) a predecessor organisation
SITA Security Requirements for Third-Party Service Providers that Access, Process, Store or Transmit Data on Behalf of SITA
SITA Information Security SITA Security Requirements for Third-Party Service Providers that Access, Process, Store or Transmit Data on Behalf of SITA September, 2012 Contents 1. Introduction... 3 1.1 Overview...
IS TEST 3 - TIPS FOUR (4) levels of detective controls offered by intrusion detection system (IDS) methodologies. First layer is typically responsible for monitoring the network and network devices. NIDS
Protecting Data at Rest with Vormetric Data Security Expert
V O R M E T R I C W H I T E P A P E R Protecting Data at Rest with Vormetric Data Security Expert Deploying Encryption and Access Control to Protect Stored Data Across the Enterprise Enterprise Information
Information Technology Policy
Information Technology Policy Security Information and Event Management Policy ITP Number Effective Date ITP-SEC021 October 10, 2006 Category Supersedes Recommended Policy Contact Scheduled Review [email protected]
PCI Data Security Standards (DSS)
ENTERPRISE APPLICATION WHITELISTING SOLUTION Achieving PCI Compliance at the Point of Sale Using Bit9 Parity TM to Protect Cardholder Data PCI: Protecting Cardholder Data As the technology used by merchants
ASDI Full Audit Guideline Federal Aviation Administration
ASDI Full Audit Guideline Federal Aviation Administration Purpose of this Document This document is intended to provide guidance on the contents of the Aircraft Situation Display to Industry (ASDI) full
Oracle Database Security
breaking through barriers to progress By Raman Jathar an award winning '2004 Future 50 Company' 18650 W. Corporate Drive Suite 120 Brookfield, WI 53045 262.792.0200 Database Security Lately, database security
IBX Business Network Platform Information Security Controls. 2015-02- 20 Document Classification [Public]
IBX Business Network Platform Information Security Controls 2015-02- 20 Document Classification [Public] Table of Contents 1. General 2 2. Physical Security 2 3. Network Access Control 2 4. Operating System
Risk Management Guide for Information Technology Systems. NIST SP800-30 Overview
Risk Management Guide for Information Technology Systems NIST SP800-30 Overview 1 Risk Management Process that allows IT managers to balance operational and economic costs of protective measures and achieve
Enterprise Security Solutions
Enterprise Security Solutions World-class technical solutions, professional services and training from experts you can trust ISOCORP is a Value-Added Reseller (VAR) and services provider for best in class
Real-Time Database Protection and. Overview. 2010 IBM Corporation
Real-Time Database Protection and Monitoring: IBM InfoSphere Guardium Overview Agenda Business drivers for database security InfoSphere Guardium architecture Common applications The InfoSphere portfolio
Frequently Asked Questions. Secure Log Manager. Last Update: 6/25/01. 6303 Barfield Road Atlanta, GA 30328 Tel: 404.236.2600 Fax: 404.236.
Frequently Asked Questions Secure Log Manager Last Update: 6/25/01 6303 Barfield Road Atlanta, GA 30328 Tel: 404.236.2600 Fax: 404.236.2626 1. What is Secure Log Manager? Secure Log Manager (SLM) is designed
A pattern for the WS-Trust standard for web services
A pattern for the WS-Trust standard for web services Ola Ajaj and Eduardo B. Fernandez Department of Computer and Electrical Engineering and Computer Science Florida Atlantic University 777 Glades Road,
Executive Summary Program Highlights for FY2009/2010 Mission Statement Authority State Law: University Policy:
Executive Summary Texas state law requires that each state agency, including Institutions of Higher Education, have in place an Program (ISP) that is approved by the head of the institution. 1 Governance
AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE
AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE THE CHALLENGE: SECURE THE OPEN AIR Wirelesss communication lets you take your business wherever your customers,
Introduction to IT Security
Marek Rychly [email protected] Strathmore University, @ilabafrica & Brno University of Technology, Faculty of Information Technology Enterprise Security 30 November 2015 Marek Rychly ES, 30 November
Audit/Logging Repudiation. Security Testing: Testing for What It s NOT supposed to do
Audit/Logging Repudiation Laurie Williams [email protected] Security Testing: Testing for What It s NOT supposed to do Thompson, Herbert, *, IEEE Security and Privacy, July/Aug 2003, pp. 83-86. 1 Audit
B.Sc (Computer Science) Database Management Systems UNIT-V
1 B.Sc (Computer Science) Database Management Systems UNIT-V Business Intelligence? Business intelligence is a term used to describe a comprehensive cohesive and integrated set of tools and process used
Security and Data Protection for Online Document Management Software
Security and Data Protection for Online Document Management Software Overview As organizations transition documents and company information to Software as a Service (SaaS) applications that are no longer
Seven Things To Consider When Evaluating Privileged Account Security Solutions
Seven Things To Consider When Evaluating Privileged Account Security Solutions Contents Introduction 1 Seven questions to ask every privileged account security provider 4 1. Is the solution really secure?
Feature. Multiagent Model for System User Access Rights Audit
Feature Christopher A. Moturi is the head of School of Computing and Informatics at the University of Nairobi (Kenya) and has more than 20 years of experience teaching and researching on databases and
