Fujitsu Enterprise Security Architecture
|
|
|
- Abigail Parks
- 10 years ago
- Views:
Transcription
1 Fujitsu Enterprise Security Architecture V Tetsuo Shiozaki V Masayuki Okuhara V Nobuo Yoshikawa (Manuscript received November 9, 2006) Recently, there has been a growing need for enterprises to respond to compliance requirements and an open framework in order to better serve society. To address this need, information security plays a vital role. Moreover, establishing predetermined Enterprise Security Architecture (ESA) in corporate systems is also becoming increasingly important. This paper describes Fujitsu s approach toward the concept of ESA. 1. Introduction In recent years, the ratio of information security investments to total corporate investments has been rising annually. These investments are indispensable for enterprises that intend to counter security risks. However, the effectiveness and efficiency of information security investments have yet to be discussed in great detail. It is thus necessary to maintain Enterprise Security Architecture (ESA) as a guideline to ensure the efficiency of information security investments. This paper first describes the need for ESA, and then the characteristics required of that architecture. Finally, it introduces ESA originally developed by Fujitsu. 2. Need for ESA ESA is a documented concept that systematizes the vision of security countermeasures to clarify a technical, basic policy of information security measures in an enterprise. When planning a system of information security measures and procuring the security equipment necessary, an enterprise should always check the adaptability to its own ESA. By making this check, the enterprise can avoid adopting a system and related equipment that do not comply with its ESA. In this way, the information security measures taken in the enterprise become adjustments that can be easily integrated, and thus ensure the effectiveness and efficiency of security investments. The Need for ESA in enterprises When computers were initially commercialized, people considered information security to be a means of preventing illegal data access. In the mid-1980s the U.S. Department of Defense settled on the Trusted Computer Security Criteria as a security requirement standard for computer systems. As a result, many engineers began to consider the various functions of information security, such as records of certification and logs. Moreover, as the world of computers entered the era of open systems in the 1990s, the world of information security measures changed significantly. Computer makers originally embraced, designed, and incorporated the concept of information security during the age of the mainframe. However, given the proliferation of open standards, systems composed of equipment FUJITSU Sci. Tech. J., 43,2,p (April 2007) 153
2 provided by multiple manufacturers became mainstream. In conjunction with this change, the information security function became subdivided into many functional components. This provided the user with many advantages, including enhanced cost reduction and a greater degree of freedom in selecting equipment. Conversely, it became the user s own responsibility to select each unit of component equipment. In fact, the user became responsible for all considerations regarding system operation, like the interconnectivity of equipment, compliance with data formats, and an applicable management method to ensure standardization. In particular, since safety could be adversely affected by combining different types of equipment and software in the field of information security, the user had to pay close attention to this matter. Consequently, many accidents and problems could occur due to improper combinations, and thus gave rise to the idea that, information security is difficult and costs too much. ESA was developed to resolve this situation. 3. What is ESA? In Japan at the beginning of 2000, security investments were considered necessary to control risks. This period was referred to as the age of security risk measures. The investments made for security countermeasures were considered somewhat of a sacred cow and organizations were prohibited from reducing such investments. Moreover, security countermeasures were also considered a cost that did not generate profit. The targets of security countermeasures were to achieve confidentiality, integrity, and availability. Today, however, security investments are believed to enhance the value of an enterprise. The current era is called the age of information security governance. Thus, security investments are no longer considered a sacred cow but part of normal company activities. Security countermeasures are not costs but investments to ensure profit in the future. Therefore, it is necessary to add effectiveness and efficiency to the targets of security countermeasures. In many enterprises, various types of security equipment and software were introduced to counter threats. However, many diverse issues were posed in enterprises where such security countermeasures were taken separately. For instance: 1) Two or more sets of software cannot coexist, thus causing problems. 2) Performance deteriorates as files are increasingly encrypted on telecommunication lines. 3) User information on individuals is separately managed by many systems. 4) Computer systems that handle important information rely on password authentication, even though the latest PCs are equipped with fingerprint recognition capability. 5) Authentication must be done four times before receiving service after PC startup. Why do such problems occur? There are many answers to the question posed by what security countermeasures to take. 1)-5) For instance, security standards such as ISO27000, security guidelines, and regulatory system offer some answers. However, there is no answer to the question of how to take security countermeasures. An enterprise should be responsible for designing its own security countermeasures. ESA is necessary for this design. ESA is a documented standard intended to protect property that answers such questions as, How many measures are necessary, what technology is used, and what technologies are combined? ESA can also be described as a second security policy. A typical security policy is a document that explains what should be done. On the other hand, ESA is a document that explains how things should be done. Figure 1 shows position of ESA. 4. Measurement of the establishment level of ESA In an enterprise, the degree to which ESA has been established can be measured by using 154 FUJITSU Sci. Tech. J., 43,2,(April 2007)
3 View of risk management View of investment efficiency Information security management system Security guidelines ESA Regulation systems Security requirements (What to do) Security architecture (How to do) Confidentiality Integrity Availability Effectiveness Efficiency Requirement definition phase Design phase System development process Figure 1 Position of ESA. the checklist shown in the Table Fujitsu ESA 6) ESA was originally a documented concept intended to be created at each organization. To support enterprises that intend to create ESA in the future, Fujitsu prepared a standard ESA document called the Fujitsu ESA. This document describes the security architecture necessary for an average organization. For instance, the guidelines for monitoring security cover the following fields: 1) Identification and authentication Type of authentication (what you know, what you have, and who you are) Authentication mechanism and certification devices Authentication model (local, network, or application) Authentication components (LDAP, Active Directory, Proxy Web SSO, and Radius) Next-generation authentication mechanism (SAML and XACML) 2) ID management ID management model ID management architecture 3) Access control Discretionary access control (e.g., ACL, RBAC) Mandatory access control Usage control (UCON) model Access control policy management Technical reference model 4) Audit trail management Audit log collection mechanism Archive framework Audit log analysis 5) Centralized management Incident management Change management Asset management Next-generation security management architecture 6) Cryptography Encryption algorithm and framework Key management 7) Physical security Fujitsu s ESA can be downloaded from Fujitsu s official Web site. Only a Japanese version is now being offered. FUJITSU Sci. Tech. J., 43,2,(April 2007) 155
4 Table 1 ESA establishment check list. Category Identification and authentication Audit trail management Access control Centralized management Cryptography Physical security Check items Is the method of authentication selected according to the degree of importance given to system standardization? Is the operation load imposed on the user greater than necessity, such as using many passwords together? Can the user s account be maintained in the latest state at any time with moderate operating cost? Are duties separated and privileges minimized? Does the organization stipulate what logs the equipment and system should record? Has a mechanism been considered to consolidate and preserve such logs for a long time? Are there classes of information that should be contained in the logs, as well as standardized forms and meanings in the entire organization? Are the names of equipment and users recorded in the logs standardized? Are there methods and tools provided for analyzing the logs? Is there a document in the organization that describes what access control to employ in necessary situations? Are the needs for rule-based access control and roll-based access control examined? Is the need for minimum privileges examined? Are not only the users but also identification and authorization of the equipment (such as PCs) examined? Are the objects (such as users, resources, and equipment) that should be managed clarified in the organization? Is there a basic policy on the data format of information to be managed (repository)? Is there a clear set of rules in the organization about the function requirements necessary for such centralized control as management interfaces? Are the assessment of vulnerabilities and a method of correction clearly defined? Is there a clear indicator of necessary situations in which to use cryptography? Is there a selection guideline for the extent and method of encryption? Is there a clear policy in the organization about the methods of managing and storing encryption keys? Is there a standard provided that covers the facility management technology and building entry point protection that should be used? Is the correspondence between user information used at room entry and user information on the system examined? Are appropriate measures taken against earthquakes, fire, and flooding? 6. Structure of Fujitsu ESA To construct a business system, two or more components that make up the system are extracted, the function requirements for the components are decided according to system requirements, and then the best solution and products to satisfy those specifications are combined. At this time, it is necessary to answer the following questions to ensure security: 1) Is a necessary component corresponding to the demand of the business system properly extracted? 2) Do the function requirements for each component follow security requirements for the organization? 3) Is there any discrepancy (excess or deficiency regarding functions and data) in the combination of components? 4) Do the selected solution and products satisfy the specifications of the component? The purpose of ESA is to provide appropriate indicators and the best practices regarding security in response to the four questions above. Figure 2 shows the structure of Fujitsu s ESA. 156 FUJITSU Sci. Tech. J., 43,2,(April 2007)
5 Enterprise Security Architecture Identification & authentication Access controls Audit trail management Centralized management Applications ESA class ESA class ESA class ESA class Services ESA class ESA class ESA class ESA class Hardware & network ESA class ESA class ESA class ESA class Real enterprise IT systems Application system A Login window Login procedure Authentication client Web SSO server Repository Policy manager IC card Authentication agent Log collector Application system B Application system C Application system D Figure 2 Structure of Fujitsu ESA. 1) ESA prepares the component group (ESA class) that can be selected according to the form of business system. 2) ESA specifies the relationship between the security requirements for the organization and those for the components, and criteria for the selection thereof. 3) ESA describes the combination of components (pattern) and the data exchanged between them. 4) ESA provides a solution and Fujitsu products that suit the components. As mentioned above, Fujitsu s ESA is not a catalog according to the functions regarding a mere independent solution and related products. It materializes a proven security system in the form of Fujitsu products, a solution where the interrelationship and selection criterion are specified, and the know-how applied according to usage and the requirements. 7. Conclusion This paper clarified the efficiency of information security investments demanded by enterprises today. To ensure the efficiency of information security investments, it was shown that ESA must be established. Finally, it introduced the content of Fujitsu s ESA. References 1) ISO/IEC 27001: Information technology Security techniques Information security management systems Requirements ) ISO/IEC : Information technology Security techniques Management of information and communications technology security Part 1: Concepts and models for information and communications technology security management FUJITSU Sci. Tech. J., 43,2,(April 2007) 157
6 3) ISO/IEC : Information technology Guidelines for the management of IT Security Part 3: Techniques for the management of IT Security ) ISO/IEC : Information technology Guidelines for the management of IT Security Part 4: Selection of safeguards J. A. Zachman: A framework for information systems architecture. IBM Systems Journal, 26, 3, p (1987). 6) Fujitsu: Fujitsu Enterprise Security Architecture. (in Japanese). esa/index.html Tetsuo Shiozaki, Fujitsu Ltd. Mr. Shiozaki received the B.S. degree in Metal processing industry from the Kyushu Institute of Technology, Fukuoka, Japan in He has more than 25 years of experience in distributed information systems, security, and risk management. He developed an open vendor system for protection against unauthorized access introduced at the Computer Security Symposium at the Computer Security Symposium held in 1998, and established the SOC (Security Operation Center) in He has supported Japan G-PKI and provided information security consulting services, ISMS, and information security audits. He is a member of the Japan Information Security Audit and (ISC)2 Common Body Knowledge Forum. Nobuo Yoshikawa, Fujitsu Ltd. Mr. Yoshikawa received the M.E. degree in Oceanic Architecture and Engineering from Nihon University, Tokyo, Japan in He joined Fujitsu Ltd., Kawasaki, Japan in 1992, where he has been engaged in development of application systems. [email protected] E- mail: [email protected] [email protected] Masayuki Okuhara, Fujitsu Ltd. Mr. Okuhara received the M.E. degree in Mechanical Sciences and Engineering from Tokyo Institute of Technology, Tokyo, Japan in He joined Fujitsu Ltd., Kawasaki, Japan in 1990, where he has been engaged in the development of security systems. He is a member of the Information Processing Society of Japan (IPSJ). 158 FUJITSU Sci. Tech. J., 43,2,(April 2007)
Fujitsu s Approach to Cloud-related Information Security
Fujitsu s Approach to Cloud-related Information Security Masayuki Okuhara Takuya Suzuki Tetsuo Shiozaki Makoto Hattori Cloud computing opens up a variety of possibilities but at the same time it raises
Fujitsu Enterprise Security Architecture
Fujitsu Enterprise Security Architecture May 2007 FUJITSU LIMITED Information Security Center Microsoft and Windows are registered trademarks of the Microsoft Corporation. Sun is a registered trademark
Security Architectures for Cloud Computing
Security Architectures for Cloud Computing Masayuki Okuhara Tetsuo Shiozaki Takuya Suzuki Moving computing into the Cloud makes computer processing much more convenient for users but also presents them
Total Security Solution System: @SECUREVISION Essential Security for Net Businesses
UDC 621.395.74:681.32.004.4 Total Security Solution System: @SECUREVISION Essential Security for Net Businesses VTakashi Ohgo (Manuscript received September 24, 2000) The numerous cases of cracking into
Access Control BUSINESS REQUIREMENTS FOR ACCESS CONTROL
AU7087_C013.fm Page 173 Friday, April 28, 2006 9:45 AM 13 Access Control The Access Control clause is the second largest clause, containing 25 controls and 7 control objectives. This clause contains critical
Security Solutions. Concerned about information security? You should be!
Security Solutions Concerned about information security? You should be! Various security threats surrounding the office Ricoh s proposal for a security management system. Information technology is the
Office of the Auditor General Performance Audit Report. Statewide UNIX Security Controls Department of Technology, Management, and Budget
Office of the Auditor General Performance Audit Report Statewide UNIX Security Controls Department of Technology, Management, and Budget December 2015 State of Michigan Auditor General Doug A. Ringler,
Information Technology Engineers Examination. Information Security Specialist Examination. (Level 4) Syllabus
Information Technology Engineers Examination Information Security Specialist Examination (Level 4) Syllabus Details of Knowledge and Skills Required for the Information Technology Engineers Examination
Central Agency for Information Technology
Central Agency for Information Technology Kuwait National IT Governance Framework Information Security Agenda 1 Manage security policy 2 Information security management system procedure Agenda 3 Manage
6. AUDIT CHECKLIST FOR NETWORK ADMINISTRATION AND SECURITY AUDITING
6. AUDIT CHECKLIST FOR NETWORK ADMINISTRATION AND SECURITY AUDITING The following is a general checklist for the audit of Network Administration and Security. Sl.no Checklist Process 1. Is there an Information
Cloud Computing Based on Service- Oriented Platform
Cloud Computing Based on Service- Oriented Platform Chiseki Sagawa Hiroshi Yoshida Riichiro Take Junichi Shimada (Manuscript received March 31, 2009) A new concept for using information and communications
Secure System Solution and Security Technology
Secure System Solution and Security Technology Hitachi Review Vol. 47 (1998), No. 6 245 Chisato Konno, D.Sc. Mitsuhiro Tsunoda Yasushi Kuba Satoru Tezuka OVERVIEW: The and intranet systems are rapidly
Fujitsu s Activities for Universal Design
Fujitsu s Activities for Universal Design V Kimitaka Kato V Akihiro Iwazaki (Manuscript received October 7, 2004) The demand for universal design (UD) is growing worldwide. Particularly, in the information
Technical Standards for Information Security Measures for the Central Government Computer Systems
Technical Standards for Information Security Measures for the Central Government Computer Systems April 21, 2011 Established by the Information Security Policy Council Table of Contents Chapter 2.1 General...
Standardization of Development Process and Additional Efforts Focusing on Web Application Development
Standardization of Development Process and Additional Efforts Focusing on Web Application Development V Ryoko Saito V Satoru Okiyama V Fusami Hirai (Manuscript received March 14, 2006) In this time of
Security Controls What Works. Southside Virginia Community College: Security Awareness
Security Controls What Works Southside Virginia Community College: Security Awareness Session Overview Identification of Information Security Drivers Identification of Regulations and Acts Introduction
DATABASE SECURITY MECHANISMS AND IMPLEMENTATIONS
DATABASE SECURITY MECHANISMS AND IMPLEMENTATIONS Manying Qiu, Virginia State University, [email protected] Steve Davis, Clemson University, [email protected] ABSTRACT People considering improvements in database
OVERVIEW. In all, this report makes recommendations in 14 areas, such as. Page iii
The Office of the Auditor General has conducted a procedural review of the State Data Center (Data Center), a part of the Arizona Strategic Enterprise Technology (ASET) Division within the Arizona Department
PCI Compliance Can Make Your Organization Stronger and Fitter. Brent Harman Manager, Systems Consultant Team West NetPro Computing, Inc.
PCI Compliance Can Make Your Organization Stronger and Fitter Brent Harman Manager, Systems Consultant Team West NetPro Computing, Inc. Today s Agenda PCI DSS What Is It? The Regulation 6 Controls 12 Requirements
Office of the Auditor General Performance Audit Report. Statewide Oracle Database Controls Department of Technology, Management, and Budget
Office of the Auditor General Performance Audit Report Statewide Oracle Database Controls Department of Technology, Management, and Budget March 2015 071-0565-14 State of Michigan Auditor General Doug
The Information Security Management System According ISO 27.001 The Value for Services
I T S e r v i c e M a n a g e m e n t W h i t e P a p e r The Information Security Management System According ISO 27.001 The Value for Services Author: Julio José Ballesteros Garcia Introduction Evolution
Certification Practice Statement
FernUniversität in Hagen: Certification Authority (CA) Certification Practice Statement VERSION 1.1 Ralph Knoche 18.12.2009 Contents 1. Introduction... 4 1.1. Overview... 4 1.2. Scope of the Certification
Information Technology Cyber Security Policy
Information Technology Cyber Security Policy (Insert Name of Organization) SAMPLE TEMPLATE Organizations are encouraged to develop their own policy and procedures from the information enclosed. Please
Information Security Network Connectivity Process
Information Security Network Connectivity Process Handbook AS-805-D September 2009 Transmittal Letter A. Purpose It is more important than ever that each of us be aware of the latest policies, regulations,
Information Disclosure Guidelines for Safety and Reliability of ASP / SaaS
Information Disclosure Guidelines for Safety and Reliability of ASP / SaaS *1 For items of disclosure, if presence or absence is asked, answer is or absent. *2 If one of items is not disclosed, certification
Network & Information Security Policy
Policy Version: 2.1 Approved: 02/20/2015 Effective: 03/02/2015 Table of Contents I. Purpose................... 1 II. Scope.................... 1 III. Roles and Responsibilities............. 1 IV. Risk
Client Security Risk Assessment Questionnaire
Select the appropriate answer from the drop down in the column, and provide a brief description in the section. 1 Do you have a member of your organization with dedicated information security duties? 2
Head of Information & Communications Technology Responsible work team: ICT Security. Key point summary... 2
Policy Procedure Information security policy Policy number: 442 Old instruction number: MAN:F005:a1 Issue date: 24 August 2006 Reviewed as current: 11 July 2014 Owner: Head of Information & Communications
05.0 Application Development
Number 5.0 Policy Owner Information Security and Technology Policy Application Development Effective 01/01/2014 Last Revision 12/30/2013 Department of Innovation and Technology 5. Application Development
FINAL May 2005. Guideline on Security Systems for Safeguarding Customer Information
FINAL May 2005 Guideline on Security Systems for Safeguarding Customer Information Table of Contents 1 Introduction 1 1.1 Purpose of Guideline 1 2 Definitions 2 3 Internal Controls and Procedures 2 3.1
A Decision Maker s Guide to Securing an IT Infrastructure
A Decision Maker s Guide to Securing an IT Infrastructure A Rackspace White Paper Spring 2010 Summary With so many malicious attacks taking place now, securing an IT infrastructure is vital. The purpose
ISO/IEC 27002:2013 WHITEPAPER. When Recognition Matters
When Recognition Matters WHITEPAPER ISO/IEC 27002:2013 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES CODE OF PRACTICE FOR INFORMATION SECURITY CONTROLS www.pecb.com CONTENT 3 4 5 6 6 7 7 7 7 8 8 8 9 9 9
Home Gateway Enabling Evolution of Network Services
Home Gateway Enabling Evolution of Network Services V Tomohiro Ishihara V Kiyoshi Sukegawa V Hirokazu Shimada (Manuscript received July 3, 2006) Broadband access services have spread rapidly and are now
Database Security Guideline. Version 2.0 February 1, 2009 Database Security Consortium Security Guideline WG
Database Security Guideline Version 2.0 February 1, 2009 Database Security Consortium Security Guideline WG Table of Contents Chapter 1 Introduction... 4 1.1 Objective... 4 1.2 Prerequisites of this Guideline...
Information Security Management Systems
Information Security Management Systems Information Security Management Systems Conformity Assessment Scheme ISO/IEC 27001:2005 (JIS Q 27001:2006) ITMangement Center Japan Information Processing Development
Summary of Technical Information Security for Information Systems and Services Managed by NUIT (Newcastle University IT Service)
Introduction This document provides a summary of technical information security controls operated by Newcastle University s IT Service (NUIT). These information security controls apply to all NUIT managed
FIREWALL CHECKLIST. Pre Audit Checklist. 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review.
1. Obtain previous workpapers/audit reports. FIREWALL CHECKLIST Pre Audit Checklist 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review. 3. Obtain current network diagrams
Information Disclosure Guidelines for Safety and Reliability of IaaS / PaaS
Information Disclosure Guidelines for Safety and Reliability IaaS / PaaS Condition 1: Objective information disclosure Information disclosure would be made in a unit each IaaS/PaaS. Condition 2: Definition
Network Security Administrator
Network Security Administrator Course ID ECC600 Course Description This course looks at the network security in defensive view. The ENSA program is designed to provide fundamental skills needed to analyze
University of California, Riverside Computing and Communications. IS3 Local Campus Overview Departmental Planning Template
University of California, Riverside Computing and Communications IS3 Local Campus Overview Departmental Planning Template Last Updated April 21 st, 2011 Table of Contents: Introduction Security Plan Administrative
OpenHRE Security Architecture. (DRAFT v0.5)
OpenHRE Security Architecture (DRAFT v0.5) Table of Contents Introduction -----------------------------------------------------------------------------------------------------------------------2 Assumptions----------------------------------------------------------------------------------------------------------------------2
Regulations on Information Systems Security. I. General Provisions
Riga, 7 July 2015 Regulations No 112 (Meeting of the Board of the Financial and Capital Market Commission Min. No 25; paragraph 2) Regulations on Information Systems Security Issued in accordance with
HIPAA: MANAGING ACCESS TO SYSTEMS STORING ephi WITH SECRET SERVER
HIPAA: MANAGING ACCESS TO SYSTEMS STORING ephi WITH SECRET SERVER With technology everywhere we look, the technical safeguards required by HIPAA are extremely important in ensuring that our information
Developing the Corporate Security Architecture. www.avient.ca Alex Woda July 22, 2009
Developing the Corporate Security Architecture www.avient.ca Alex Woda July 22, 2009 Avient Solutions Group Avient Solutions Group is based in Markham and is a professional services firm specializing in
Bellevue University Cybersecurity Programs & Courses
Undergraduate Course List Core Courses: CYBR 250 Introduction to Cyber Threats, Technologies and Security CIS 311 Network Security CIS 312 Securing Access Control CIS 411 Assessments and Audits CYBR 320
micros MICROS Systems, Inc. Enterprise Information Security Policy (MEIP) August, 2013 Revision 8.0 MICROS Systems, Inc. Version 8.
micros MICROS Systems, Inc. Enterprise Information Security Policy (MEIP) Revision 8.0 August, 2013 1 Table of Contents Overview /Standards: I. Information Security Policy/Standards Preface...5 I.1 Purpose....5
Information Security Risk Assessment Checklist. A High-Level Tool to Assist USG Institutions with Risk Analysis
Information Security Risk Assessment Checklist A High-Level Tool to Assist USG Institutions with Risk Analysis Updated Oct 2008 Introduction Information security is an important issue for the University
Management Standards for Information Security Measures for the Central Government Computer Systems
Management Standards for Information Security Measures for the Central Government Computer Systems April 21, 2011 Established by the Information Security Policy Council Table of Contents Chapter 1.1 General...
Basics of Internet Security
Basics of Internet Security Premraj Jeyaprakash About Technowave, Inc. Technowave is a strategic and technical consulting group focused on bringing processes and technology into line with organizational
HIPAA Security COMPLIANCE Checklist For Employers
Compliance HIPAA Security COMPLIANCE Checklist For Employers All of the following steps must be completed by April 20, 2006 (April 14, 2005 for Large Health Plans) Broadly speaking, there are three major
Information Technology Policy
Information Technology Policy Security Information and Event Management Policy ITP Number Effective Date ITP-SEC021 October 10, 2006 Category Supersedes Recommended Policy Contact Scheduled Review [email protected]
MICHIGAN AUDIT REPORT OFFICE OF THE AUDITOR GENERAL THOMAS H. MCTAVISH, C.P.A. AUDITOR GENERAL
MICHIGAN OFFICE OF THE AUDITOR GENERAL AUDIT REPORT THOMAS H. MCTAVISH, C.P.A. AUDITOR GENERAL The auditor general shall conduct post audits of financial transactions and accounts of the state and of all
Information Security Awareness Training
Information Security Awareness Training Presenter: William F. Slater, III M.S., MBA, PMP, CISSP, CISA, ISO 27002 1 Agenda Why are we doing this? Objectives What is Information Security? What is Information
Understanding changes to the Trust Services Principles for SOC 2 reporting
Baker Tilly refers to Baker Tilly Virchow Krause, LLP, an independently owned and managed member of Baker Tilly International. Understanding changes to the Trust Services Principles for SOC 2 reporting
Security Standards. 17.1 BS7799 and ISO17799
17 Security Standards Over the past 10 years security standards have come a long way from the original Rainbow Book series that was created by the US Department of Defense and used to define an information
Information Security Program Management Standard
State of California California Information Security Office Information Security Program Management Standard SIMM 5305-A September 2013 REVISION HISTORY REVISION DATE OF RELEASE OWNER SUMMARY OF CHANGES
BMC s Security Strategy for ITSM in the SaaS Environment
BMC s Security Strategy for ITSM in the SaaS Environment TABLE OF CONTENTS Introduction... 3 Data Security... 4 Secure Backup... 6 Administrative Access... 6 Patching Processes... 6 Security Certifications...
Delphi Information 3 rd Party Security Requirements Summary. Classified: Public 5/17/2012. Page 1 of 11
Delphi Information 3 rd Party Security Requirements Summary Classified: Public 5/17/2012 Page 1 of 11 Contents Introduction... 3 Summary for All Users... 4 Vendor Assessment Considerations... 7 Page 2
Introducing Systemwalker Operation Manager V13.3. July 2008 FUJITSU LIMITED
Introducing Systemwalker Operation Manager V13.3 July 2008 FUJITSU LIMITED Contents I. Market Requirements II. Product Overview a. Planning Execution/Operation b. Operation Visualization c. Operational
managing SSO with shared credentials
managing SSO with shared credentials Introduction to Single Sign On (SSO) All organizations, small and big alike, today have a bunch of applications that must be accessed by different employees throughout
Pointsec Enterprise Encryption and Access Control for Laptops and Workstations
Pointsec Enterprise Encryption and Access Control for Laptops and Workstations Overview of PC Security Since computer security has become increasingly important, almost all of the focus has been on securing
Life Cycle of Records
Discard Create Inactive Life Cycle of Records Current Retain Use Semi-current Records Management Policy April 2014 Document title Records Management Policy April 2014 Document author and department Responsible
Power Supply and Demand Control Technologies for Smart Cities
Power Supply and Demand Control Technologies for Smart Cities Tomoyoshi Takebayashi Toshihiro Sonoda Wei-Peng Chen One of the missions of smart cities is to contribute to the environment and reduce social
SECURITY RISK MANAGEMENT
SECURITY RISK MANAGEMENT ISACA Atlanta Chapter, Geek Week August 20, 2013 Scott Ritchie, Manager, HA&W Information Assurance Services Scott Ritchie CISSP, CISA, PCI QSA, ISO 27001 Auditor Manager, HA&W
HIPAA Security Alert
Shipman & Goodwin LLP HIPAA Security Alert July 2008 EXECUTIVE GUIDANCE HIPAA SECURITY COMPLIANCE How would your organization s senior management respond to CMS or OIG inquiries about health information
Data Protection: From PKI to Virtualization & Cloud
Data Protection: From PKI to Virtualization & Cloud Raymond Yeung CISSP, CISA Senior Regional Director, HK/TW, ASEAN & A/NZ SafeNet Inc. Agenda What is PKI? And Value? Traditional PKI Usage Cloud Security
CBIO Security White Paper
One Canon Plaza Lake Success, NY 11042 www.ciis.canon.com CBIO Security White Paper Introduction to Canon Business Imaging Online Canon Business Imaging Online ( CBIO ) is a cloud platform for Canon s
Achieving Integrated IT Service Management
Achieving Integrated IT Service Management V Akihiko Sakurai (Manuscript received January 22, 2007) Increasingly, IT Infrastructure Library (ITIL) practices are being adopted to improve the quality of
EA-ISP-012-Network Management Policy
Technology & Information Services EA-ISP-012-Network Management Policy Owner: Adrian Hollister Author: Paul Ferrier Date: 01/04/2015 Document Security Level: PUBLIC Document Version: 1.00 Document Ref:
Estate Agents Authority
INFORMATION SECURITY AND PRIVACY PROTECTION POLICY AND GUIDELINES FOR ESTATE AGENTS Estate Agents Authority The contents of this document remain the property of, and may not be reproduced in whole or in
HIPAA Security. 4 Security Standards: Technical Safeguards. Security Topics
HIPAA Security S E R I E S Security Topics 1. Security 101 for Covered Entities 2. Security Standards - Administrative Safeguards 3. Security Standards - Physical Safeguards 4. Security Standards - Technical
Payment Card Industry Data Security Standard
Symantec Managed Security Services support for IT compliance Solution Overview: Symantec Managed Services Overviewview The (PCI DSS) was developed to facilitate the broad adoption of consistent data security
(Instructor-led; 3 Days)
Information Security Manager: Architecture, Planning, and Governance (Instructor-led; 3 Days) Module I. Information Security Governance A. Introduction to Information Security Governance B. Overview of
Technical Safeguards is the third area of safeguard defined by the HIPAA Security Rule. The technical safeguards are intended to create policies and
Technical Safeguards is the third area of safeguard defined by the HIPAA Security Rule. The technical safeguards are intended to create policies and procedures to govern who has access to electronic protected
Information security controls. Briefing for clients on Experian information security controls
Information security controls Briefing for clients on Experian information security controls Introduction Security sits at the core of Experian s operations. The vast majority of modern organisations face
Strengthen security with intelligent identity and access management
Strengthen security with intelligent identity and access management IBM Security solutions help safeguard user access, boost compliance and mitigate insider threats Highlights Enable business managers
Evaluation of different Open Source Identity management Systems
Evaluation of different Open Source Identity management Systems Ghasan Bhatti, Syed Yasir Imtiaz Linkoping s universitetet, Sweden [ghabh683, syeim642]@student.liu.se 1. Abstract Identity management systems
How To Pass A Credit Course At Florida State College At Jacksonville
Form 2A, Page 1 FLORIDA STATE COLLEGE AT JACKSONVILLE COLLEGE CREDIT COURSE OUTLINE COURSE NUMBER: CTS 2658 COURSE TITLE: PREREQUISITE(S): COREQUISITE(S): Managing Network Security CNT 2210 with grade
Securing the Service Desk in the Cloud
TECHNICAL WHITE PAPER Securing the Service Desk in the Cloud BMC s Security Strategy for ITSM in the SaaS Environment Introduction Faced with a growing number of regulatory, corporate, and industry requirements,
Directory and File Transfer Services. Chapter 7
Directory and File Transfer Services Chapter 7 Learning Objectives Explain benefits offered by centralized enterprise directory services such as LDAP over traditional authentication systems Identify major
Information Resources Security Guidelines
Information Resources Security Guidelines 1. General These guidelines, under the authority of South Texas College Policy #4712- Information Resources Security, set forth the framework for a comprehensive
