Advances in Storage Security Standards Jason Cox Intel Corporation
|
|
|
- Jennifer George
- 9 years ago
- Views:
Transcription
1 Advances in Storage Security Standards Jason Cox Intel Corporation
2 Objectives Overview of Trusted Computing Group (TCG) Storage Work Group Review of TCG Document types and Goals Describe recent specifications and new work Discuss work in progress to align with NVMe Review the importance of Opal assurance Highlight other recent, storage-related security specifications, goals, and benefits 2
3 Trusted Computing Group Trusted Computing Group (TCG) Cross-industry organization formed to develop, define, and promote standards Work Groups focused on TPM, Storage, Networking, Mobile, and more TCG Storage Work Group Defines specifications related to Storage Device-based security features 3
4 TCG Storage Specifications Core Specification (Core Spec) Overall architecture a description of the underlying constructs to be used in the device specifications. Storage Interface Interactions Specification (SIIS) Describes the interactions of the TCG SWG specifications with the underlying storage interface protocols, such as ATA, SCSI, USB, etc. Security Subsystem Class (SSC) Feature Sets Device specifications, consist primarily of a subset of the functionality contained in the Core Spec. Opal, Opalite, Pyrite, Enterprise These are documents that define extensions to the basic functionality of SSCs. Created to allow for simple extensions to be added to the SSC at a faster pace. Additionally, it allows for features that only appeal to a subset of the market to be standardized. Generally Optional, may be Mandatory by spec (e.g., PSID) TCG Storage Specifications can be downloaded here: General Security Subsystem Class Feature Sets Opalite SSC Core Spec Opal SSC Feature Set 1 Feature Set 2 SIIS Pyrite SSC Feature Set 3 4
5 TCG Storage WG Goals Expand current use cases Opalite SSC, Pyrite SSC Enhance deployability and assurance NVMe/Namespace interactions TCG Storage Opal Test Cases, Collaborative Protection Profile Introduce new features based on IT, OEM, IHV, ISV pain points Secure Messaging, PSID Expand Opal Threat Model CRAM and TPE 5
6 Opal SSC Opal SSC: Defines the full-featured interface for managing security features in a storage device, including device encryption. Threat model: protect confidentiality of stored user data against unauthorized access once it leaves the owner s control Primary Features: Drive powered off and user has been de-authenticated from system Supports division of Storage Device user data space into multiple LBA Locking Ranges Each LBA Locking Range has its own media encryption key. Locking Ranges are locked after a storage device power cycle. Admin assigns access to unlock Ranges to 0 or more Users. Each Locking Range can be independently cryptographically erased. The Shadow MBR region stores ISV SW Pre Boot Environment to capture unlock password and unlock Ranges to allow OS boot. 6
7 Self-Encrypting Drive (SED) 7
8 Opalite SSC and Pyrite SSC TCG NVMe NVMe s strategy: align on Opal SSCbased solutions for security management Scale across the needs of NVMe in different Client and Enterprise (data center) solutions TCG has developed a family of specifications to scale across the needs of NVMe in different Client and Enterprise solutions SKL Reference BIOS slated to support simple password management via Opal over NVMe Opalite (Opal Subset) Pyrite (Non-Encrypting) Opal Family Opal Common Protocol / Architecture Consumers, Enterprise Client Users, and Data Centers are able to take advantage of Encryption via Opal Family on NVMe using the same, standardized interface 8
9 Opal, Opalite, Pyrite Comparison OPAL OPALITE PYRITE System Area (FW, TCG Tables, etc.) Shadow MBR (128 MB) System Area (FW, TCG Tables, etc.) Shadow MBR (128 MB) System Area (FW, TCG Tables, etc.) Shadow MBR (128 MB) - OPTIONAL DataStore (10 MB) DataStore table (128 KB) DataStore table (128 KB) Global Range Access control to unlock assigned by Admin User Data Space, always encrypted Range X* Access control to unlock assigned by Admin Range Y* Access control to unlock assigned by Admin User Data Space, always encrypted Global Range Access control to unlock assigned by Admin User Data Space* Global Range Access control to unlock assigned by Admin Global Range, Continued Same access control settings as above range *Opal 2.00 supports Global Range plus at least 8 configurable ranges *Pyrite SSC does not specify encryption of user data 9
10 WIP: Namespace Interactions TCG NVMe TCG Storage Interface Interactions Updates to Namespace Interactions in progress (targets SIIS v1.05) Specifies required support for 2 scenarios: Multiple namespaces can be supported with all mapped to the Opal Global Range A single namespace can be supported with multiple Opal Locking ranges all mapped within the 1 namespace Range Global Range Global Range Global Range1 Range2 Range3 Range4 Range5 Range6 Range7 Range8 Multiple Namespaces Opalite Namespace NS2...NSN Pyrite Namespace NS2...NSN Opal Namespace NS2...NSN Blocked Blocked Blocked Blocked Blocked Blocked Blocked Blocked If multiple namespaces are created, then locking of all are controlled together. If multiple Locking ranges are configured, then they all are within a single namespace, and additional namespaces cannot be created. Multiple Locking Ranges Range Range Range Global Global Global Range1 Range2 Range3 Range4 Range5 Range6 Range7 Range8 Opalite Pyrite Opal Namespace Namespace Namespace WIP to align with NVMe to enable a strong collaboration between the organizations. 10
11 WIP: Namespace Interactions TCG NVMe Architecture of enhanced configurability also in progress When namespaces are created, the Global Range settings apply. Namespaces can be associated with one or more Locking objects, to enable separate locking of that namespace or LBA ranges within that namespace. TCG SWG is seeking input on use cases. Range Global Range1 Range2 Range3 Range4 Range5 Range6 Range7 Range8 Namespace NS3 NS7 NS2 NS4 NS4 NS5 NS6 NS6 NS8 NS9 One or more locking ranges associated with configured namespaces, allowing these namespaces to be unlocked separately, with differently configurable access controls. 11
12 Opal and Assurance Opal SSC Test Cases Specification Baseline for Opal Certification Covers Opal 1.00, 2.00, and 2.01 Currently in pre-publication review Common Criteria Encryption Engine and Authorization Acquisition cpps (Feb 2015) Specifies security evaluation for Self-Encrypting Drives (SED) and SED management software Opal compliance and assurance are high priority OEM/customer requests. 12
13 Secure Messaging When managing Opal configuration, the authentication credential is sent from a host (local or network) to the storage device The credential is sent in the clear across the storage interface Could result in capture of an admin credential or interference with operations Use Cases: Protects TCG Storage management traffic Allows for secure, remote updates of Opal configuration Traffic could be protected starting at a back-end management/key server all the way to the storage device Developing new features and expanding the Opal threat model to increase value. 13
14 Secure Messaging Specs New Specs: Core Spec Addendum: Secure Messaging Maps TLS v1.2 handshake protocol to TCG Storage session startup ISV Opal Management SW is the TLS Client, Opal SED is the server PSK (Pre-Shared Keys) Feature Sets Map TLS PSKs configuration and usage to the TCG Storage communications protocol 14
15 PSID PSID Feature Set PSID = Physical Security Identifier The specifies a means to implement a physical presence credential (e.g. a password printed on a label). This enables recovery/repurpose/end-of-life in the event of lost/unavailable password Use Cases/Benefits for IT departments, OEMs, IHVs, and ISVs PSID 15
16 Storage Interface Interactions Spec TCG Storage Interface Interactions Specification: SIIS v1.03: mappings for UFS, emmc SIIS v1.04: enhances interactions with T10/T13 Sanitize Feature Sets, minor updates to NVMe interactions 16
17 Storage Integration Guidelines TCG Storage Integration Guidelines Reference document intended to provide guidance to IHVs, ISVs, and OEMs related to integration of Opal SEDs into systems. Currently in pre-publication review 17
18 IEEE 1667 and NVMe IEEE 1667 TCG Transport Silo is a requirement for edrive support edrive in 30 seconds: Starting with Windows 8, MS BitLocker is able to manage SEDs that implement Opal 2.00, Single User Mode Feature Set, and the IEEE 1667 TCG Transport Silo IEEE 1667 has begun working on a IEEE 1667 transport technical proposal for NVMe Enables general access to IEEE 1667 silos over NVMe, including 1667 TCG Transport Silo TCG Transport Silo alternate transport for TCG Opal commands Enables management of Windows edrive for NVMe Opal SEDs which use Opal 2.00 See for more information on IEEE
19 Opal/SED Enhancements: Expanding the Opal Threat Model Recall the Opal Threat Model: Protect confidentiality of stored user data against unauthorized access once it leaves the owner s control Drive powered off and user has been de-authenticated from system Classic conflict between User Experience (UX) and Security exists with SEDs Platforms containing SEDs are vulnerable when the SED is unlocked and the user is not present I.e. Stolen laptop in S3 state This is due to End User Experience (UX) Expectations: Ease of data access (passwords - ugh!) Fast responsiveness (S3 Resume) Which led to Tradeoffs: Auto-Unlock SED during S3 resume (open lid) & Connected Standby/Always on Always Connected S4/S5 resume still requires user password User Experience Favored over Platform Security 19
20 Exposures in Responsiveness Note: Password is Handled in clear txt 2 Malware Sniff & Ransom Ware Attack on Password (Password used for Auto-Unlock by Host ) 1 Cold & Warm Boot Attacks on Password (Password stored in DRAM) 3 4 Replay Attack (Password sent to SSD) Drive Hot Swap / MITM & Protocol Injector Attack Auto-Unlock Provides UX Benefits, but Opens Data Access Security Gaps! 20
21 Challenge Response Authentication Method (CRAM) CRAM introduces a random element into the authentication process Prevents sniff/replay of the authentication credential to the drive Removes the need to store the password in DRAM Signing key can be held securely in a TEE (such as Intel ME/TPM) CPU/Memor y Plain Txt Pwd Malware can steal Password from memory CPU/Memor y Intel ME/TPM Signed Random Pkt!%$#^*&@ No CRAM Resume from S3 Auto-Unlock Attacker can sniff Password from storage I/F CRAM on ProSSDs Resume from S3 Auto-Unlock Trusted Hand Shake between Platform & SSD allows random element to unlock SSD Opal SED!%$#^*&@ Opal SED 21
22 Transport Encryption (TPE) TPE encrypts all data over the interface in platform vulnerable states Enable/Disable of TPE requires cryptographic authentication Encryption disabled while user is logged in to the OS (maintains performance) Encryption enabled at OS lock screen Stolen PC Drive C:\ Opal SED Stolen PC Drive C:\ No TPE OS Login Screen or S3/Standby Resume Attackers PC Drive D:\ $10 cable/interposer TPE on SSDs OS Login Screen or S3/Standby Resume Attackers PC No Keys Drive is unlocked during system idle or resume from S3/Standby Drive D:\ $10 cable/interposer Opal SED Shared Public/Private keys between Platform & SSD to enable/disable 22
23 Responsiveness with Enhancements 2 Malware Sniff & Ransom Ware Attack CRAM on PWD (PWD used for Auto-Unlock by Host ) 1 Cold & Warm Boot CRAM Attacks on PWD (PWD stored in DRAM) 3 4 CRAM Replay Attack (PWD sent to SSD) Drive Hot Swap / MITM TPE & Protocol Injector Attack Proposed Features Address Exposures while Introducing Minimal Platform Performance Degradation 23
24 Bonus: Other Recent Storage Security Standards Releases NIST SP rev. 1 (Dec 2014) Provides guidelines for media sanitization, including provisions for NAND-based devices, NVMe interface, and cryptographic erase ISO (2015) Provides security guidance for storage systems and ecosystems as well as for protection of data in these systems. TCG Enterprise SSC: Locking LBA Ranges Control Feature Set (May 2014) Defines mechanisms for additional locking criteria for Locking ranges 24
25 Summary A variety of new storage security standards enable broader applicability of TCG Opal and other specs; introduce enhancements to features; and enable increased assurance of implementation. 25
26 References TCG Storage Specifications Opal Test Cases Specification (Public Review) D0DB1CF3A /Opal_SSC_Certification_Test_Cases_v2_00_r1_85_Public%20Review.pdf Common Criteria Collaborative Protection Profiles NIST SP rev. 1 (Dec 2014) Provides guidelines for media sanitization, including provisions for NAND-based devices, NVMe interface, and cryptographic erase ISO (2015) Provides security guidance for storage systems and ecosystems as well as for protection of data in these systems. TCG Enterprise SSC: Locking LBA Ranges Control Feature Set (May 2014) Defines mechanisms for additional locking criteria for Locking ranges lba_ranges_control_specification 26
27 Questions? Thank you! 27
Trusted Computing Basics: Self-Encrypting Drives
09/21/2011 Trusted Computing Basics: Self-Encrypting Drives Ryan C. Getek, Ph.D. CISSP-ISSEP Secure Storage Lead, Trusted Computing Division, NCSC Jason Cox Client Security Products Lead, Seagate Technology
Technical Note. Installing Micron SEDs in Windows 8 and 10. Introduction. TN-FD-28: Installing Micron SEDs in Windows 8 and 10.
Technical Note Installing Micron SEDs in Windows 8 and 10 TN-FD-28: Installing Micron SEDs in Windows 8 and 10 Introduction Introduction Self-encrypting drives (SEDs) can provide an effective way of protecting
Making Data at Rest Encryption Easy
Making Data at Rest Encryption Easy MM/DD/YYYY Jason Cox Client Security Products Lead Seagate Technology What is SED? Self Encrypting Drive Basics The storage device LOCKS when it powers OFF. The storage
Kingston KC300 Security Toolbox
Intended for: SKC300S37A/60G SKC300S37A/120G SKC300S37A/180G SKC300S37A/240G SKC300S37A/480G Firmware Rev. 600ABBF0 The PSID Revert and the Enable/Disable IEEE1667 (or Microsoft edrive) operations described
Bypassing Self- Encrypting Drives (SED) in Enterprise Environments. Daniel Boteanu Kevvie Fowler November 12 th, 2015
Bypassing Self- Encrypting Drives (SED) in Enterprise Environments Daniel Boteanu Kevvie Fowler November 12 th, 2015 Who are we? Daniel Boteanu Forensic Technology and ediscovery, KPMG Canada M.Eng., M.Sc.
Opal SSDs Integrated with TPMs
Opal SSDs Integrated with TPMs August 21, 2012 Robert Thibadeau, Ph.D. U.S. Army SSDs Must be Opal s We also Studied using the TPM (Trusted Platform Module) with an Opal SSD (Self-Encrypting Drive) 2 Security
Strategies for Firmware Support of Self-Encrypting Drives
presented by Strategies for Firmware Support of Self-Encrypting Drives UEFI Winter Plugfest February 21-23, 2011 Presented by Jeff Bobzin (Insyde Software, Inc.) Updated 2011-06-01 UEFI Plugfest February
Data Security Using TCG Self-Encrypting Drive Technology
Data Security Using TCG Self-Encrypting Drive Technology June 11, 2013 2:00PM EDT Copyright 2013 Trusted Computing Group 1 Copyright 2013 Trusted Computing Group 2 Tom Coughlin, Founder, Coughlin Associates.
Solid-State Drives with Self-Encryption: Solidly Secure
Solid-State Drives with Self-Encryption: Solidly Secure 09/22/2011 Michael Willett Storage Security Strategist SAMSUNG SOLID STATE DRIVES Solid-State Drives SSD ADVANTAGES SOLID STATE DRIVES Save $$ on
BitLocker Drive Encryption Hardware Enhanced Data Protection. Shon Eizenhoefer, Program Manager Microsoft Corporation
BitLocker Drive Encryption Hardware Enhanced Data Protection Shon Eizenhoefer, Program Manager Microsoft Corporation Agenda Security Background BitLocker Drive Encryption TPM Overview Building a BitLocker
Solid State Drives (SSD) with Self Encryption: Solidly Secure Michael Willett Storage Security Strategist Independent Consultant
Solid State Drives (SSD) with Self Encryption: Solidly Secure Michael Willett Storage Security Strategist Independent Consultant Flash Memory Summit 2014 Santa Clara, CA 1 The Problem 2005-2013: over 864,108,052
Samsung SED Security in Collaboration with Wave Systems
Samsung SED Security in Collaboration with Wave Systems Safeguarding sensitive data with enhanced performance, robust security, and manageability Samsung Super-speed Drive Secure sensitive data economically
Bypassing Local Windows Authentication to Defeat Full Disk Encryption. Ian Haken
Bypassing Local Windows Authentication to Defeat Full Disk Encryption Ian Haken Who Am I? Currently a security researcher at Synopsys, working on application security tools and Coverity s static analysis
Self-Encrypting Drives
Jon Tanguy Senior SSD Technical Marketing Engineer Micron Technology, Inc. February 14, 2014 What is Encryption? In its simplest form, encryption is a mechanism used to obscure data from any unintended
ACER ProShield. Table of Contents
ACER ProShield Table of Contents Revision History... 3 Legal Notices... 4 Executive Summary... 5 Introduction... 5 Protection against unauthorized access... 6 Why ACER ProShield... 7 ACER ProShield...
Keep Your Data Secure: Fighting Back With Flash
Keep Your Data Secure: Fighting Back With Flash CONTENTS: Executive Summary...1 Data Encryption: Ensuring Peace of Mind...2 Enhanced Encryption and Device Decommission in the Enterprise...3 Freeing Up
Encrypted SSDs: Self-Encryption Versus Software Solutions
Encrypted SSDs: Self-Encryption Versus Software Solutions Michael Willett Storage Security Strategist and VP Marketing Bright Plaza Flash Memory Summit 2015 Santa Clara, CA 1 The Problem 2005-2013: over
Disk Encryption. Aaron Howard IT Security Office
Disk Encryption Aaron Howard IT Security Office Types of Disk Encryption? Folder Encryption Volume or Full Disk Encryption OS / Boot Volume Data Volume Managed or Unmanaged Key Backup and Data Assurance
Seagate Secure Technology
Seagate Secure Technology Marketing Bulletin Frequently Asked Questions What is the value of a self-encrypting drive (SED)? SEDs ensure user data can be quickly deleted (erased) using standard drive commands,
Security Overview for Windows Vista. Bob McCoy, MCSE, CISSP/ISSAP Technical Account Manager Microsoft Corporation
Security Overview for Windows Vista Bob McCoy, MCSE, CISSP/ISSAP Technical Account Manager Microsoft Corporation Agenda User and group changes Encryption changes Audit changes User rights New and modified
Full Drive Encryption Security Problem Definition - Encryption Engine
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 Full Drive Encryption Security Problem Definition - Encryption Engine Introduction for the FDE Collaborative Protection Profiles
XTREMIO DATA AT REST ENCRYPTION
White Paper XTREMIO DATA AT REST ENCRYPTION Abstract Data at Rest Encryption is a mandatory requirement in various industries that host private or sensitive data. This white paper introduces and explains
Factory-Installed, Standards-Based Hardware Security. Steven K. Sprague President & CEO, Wave Systems Corp.
Factory-Installed, Standards-Based Hardware Security Steven K. Sprague President & CEO, Wave Systems Corp. The challenge We are having a little problem with identity and data theft. It is time to reduce
Whitepaper Enhancing BitLocker Deployment and Management with SimplySecure. Addressing the Concerns of the IT Professional Rob Weber February 2015
Whitepaper Enhancing BitLocker Deployment and Management with SimplySecure Addressing the Concerns of the IT Professional Rob Weber February 2015 Page 2 Table of Contents What is BitLocker?... 3 What is
Samsung Magician v.4.5 Introduction and Installation Guide
Samsung Magician v.4.5 Introduction and Installation Guide 1 Legal Disclaimer SAMSUNG ELECTRONICS RESERVES THE RIGHT TO CHANGE PRODUCTS, INFORMATION AND SPECIFICATIONS WITHOUT NOTICE. Products and specifications
EMBASSY Remote Administration Server (ERAS) BitLocker Deployment Guide
EMBASSY Remote Administration Server (ERAS) BitLocker Deployment Guide BitLocker Deployment Guide Document Version 0.0.0.5 http://www.wave.com ERAS v 2.8 Wave Systems Corp. 2010 Contents Contents... 2
Assessing the Security of Hardware-Based vs. Software-Based Encryption on USB Flash Drives
Assessing the Security of Hardware-Based vs. Software-Based Encryption on USB Flash Drives Main Line / Date / Etc. June May 2008 2nd Line 80-11-01583 xx-xx-xxxx Revision 1.0 Tagline Here Table of Contents
Navigating Endpoint Encryption Technologies
Navigating Endpoint Encryption Technologies Whitepaper November 2010 THIS WHITE PAPER IS FOR INFORMATIONAL PURPOSES ONLY, AND MAY CONTAIN TYPOGRAPHICAL ERRORS AND TECHNICAL INACCURACIES. THE CONTENT IS
Session ID: Session Classification:
Session ID: Session Classification: Protecting Data with Encryption Access Control Protect Sensitive Data Protect and Manage Threats Groundbreaking Malware Resistance Protects the client, data, and corporate
Penetration Testing Windows Vista TM BitLocker TM
Penetration Testing BitLocker TM Drive Encryption Douglas MacIver Penetration Engineer System Integrity Group, Corporation Hack In The Box 2006/09/21 2006 Corporation. All rights reserved. Trustworthy
1. System Requirements
BounceBack Data Transfer 14.2 User Guide This guide presents you with information on how to use BounceBack Data Transfer 14.2. Contents 1. System Requirements 2. Attaching Your New Hard Drive To The Data
http://docs.trendmicro.com/en-us/enterprise/endpoint-encryption.aspx
Trend Micro Incorporated reserves the right to make changes to this document and to the product described herein without notice. Before installing and using the product, please review the readme files,
COMMONWEALTH OF PENNSYLVANIA DEPARTMENT S OF PUBLIC WELFARE, INSURANCE AND AGING
COMMONWEALTH OF PENNSYLVANIA DEPARTMENT S OF PUBLIC WELFARE, INSURANCE AND AGING INFORMATION TECHNOLOGY STANDARD Name Of Standard: Mobile Device Standard Domain: Security Date Issued: 09/07/2012 Date Revised:
That Point of Sale is a PoS
SESSION ID: HTA-W02 That Point of Sale is a PoS Charles Henderson Vice President Managed Security Testing Trustwave @angus_tx David Byrne Senior Security Associate Bishop Fox Agenda POS Architecture Breach
Recipe for Mobile Data Security: TPM, Bitlocker, Windows Vista and Active Directory
Recipe for Mobile Data Security: TPM, Bitlocker, Windows Vista and Active Directory Tom Olzak October 2007 If your business is like mine, laptops regularly disappear. Until recently, centrally managed
FDE Performance Comparison. Hardware Versus Software Full Drive Encryption
FDE Performance Comparison Hardware Versus Full Drive Encryption A look at performance and other differences between hardware based self-encrypting drives and software approaches to full disk encryption
Commercially Proven Trusted Computing Solutions RSA 2010
Commercially Proven Trusted Computing Solutions RSA 2010 Hardware Self-Encrypting Drives (SEDs) Unique Security Features Encryption below the file system Hardware root-of-trust for encryption Tamper resistant
Using BitLocker As Part Of A Customer Data Protection Program: Part 1
Using BitLocker As Part Of A Customer Data Protection Program: Part 1 Tech Tip by Philip Cox Source: searchsecuritychannel.com As an information security consultant, one of my jobs is to help my clients
BitLocker Network Unlock & BitLocker support for Encrypted Drives
presented by BitLocker Network Unlock & BitLocker support for Encrypted Drives UEFI Winter Plugfest February 21-23, 2011 Presented by Narendra Acharya (Microsoft) Updated 2011-06-01 www.uefi.org 1 Agenda
RSA SecurID Ready Implementation Guide
RSA SecurID Ready Implementation Guide Partner Information Last Modified: December 18, 2006 Product Information Partner Name Microsoft Web Site http://www.microsoft.com/isaserver Product Name Internet
CS 356 Lecture 25 and 26 Operating System Security. Spring 2013
CS 356 Lecture 25 and 26 Operating System Security Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control
HP FutureSmart Firmware Device Hard Disk Security
HP FutureSmart Firmware Device Hard Disk Security Summary: This document discusses hard disk security for HP FutureSmart Firmware printing devices. Contents: Overview... 2 Secure Erase Commands... 2 1.
Full Disk Encryption Drives & Management Software. The Ultimate Security Solution For Data At Rest
Full Disk Encryption Drives & Management Software The Ultimate Security Solution For Data At Rest Agenda Introduction Information Security Challenges Dell Simplifies Security Trusted Drive Technology Seagate
State of South Carolina Policy Guidance and Training
State of South Carolina Policy Guidance and Training Policy Workshop All Agency Mobile Security July 2014 Agenda Questions & Follow-Up Policy Workshop Overview & Timeline Policy Overview: Mobile Security
BlackBerry 10.3 Work and Personal Corporate
GOV.UK Guidance BlackBerry 10.3 Work and Personal Corporate Published Contents 1. Usage scenario 2. Summary of platform security 3. How the platform can best satisfy the security recommendations 4. Network
VMWare Workstation 11 Installation MICROSOFT WINDOWS SERVER 2008 R2 STANDARD ENTERPRISE ED.
VMWare Workstation 11 Installation MICROSOFT WINDOWS SERVER 2008 R2 STANDARD ENTERPRISE ED. Starting Vmware Workstation Go to the start menu and start the VMware Workstation program. *If you are using
TCG. TCG Storage Application Note: Encrypting Storage Devices Compliant with Enterprise SSC. Specification Version 1.00 Final Revision 1.
TCG Storage Application Note: Encrypting Storage Devices Compliant with Enterprise SSC Specification Version 1.00 Final Revision 1.00 December 21, 2009. Contacts: [email protected] TCG Copyright
Functional diagram: Secure encrypted data. totally encrypted. XOR encryption. RFID token. fingerprint reader. 128 bit AES in ECB mode Security HDD
Secure encrypted data Encryption Access Control XOR encryption RFID token 128 bit AES in ECB mode Security HDD fingerprint reader enter password by keyboard 256 bit AES in CBC mode 1-2-3-4-5-6-7-8 PIN
An Overview of Information Security Frameworks. Presented to TIF September 25, 2013
An Overview of Information Security Frameworks Presented to TIF September 25, 2013 What is a framework? A framework helps define an approach to implementing, maintaining, monitoring, and improving information
Firmware security features in HP Compaq business notebooks
HP ProtectTools Firmware security features in HP Compaq business notebooks Embedded security overview... 2 Basics of protection... 2 Protecting against unauthorized access user authentication... 3 Pre-boot
Resco Mobile CRM Security
Resco Mobile CRM Security Out-of-the-box Security 1. Overview The Resco Mobile CRM application (client) communicates directly with the Dynamics CRM server. The communication uses standard Dynamic CRM Web
Cedric Rajendran VMware, Inc. Security Hardening vsphere 5.5
Cedric Rajendran VMware, Inc. Security Hardening vsphere 5.5 Agenda Security Hardening vsphere 5.5 ESXi Architectural Review ESXi Software Packaging The ESXi Firewall ESXi Local User Security Host Logs
Seagate Instant Secure Erase Deployment Options
Technology Paper Seagate Instant Secure Erase Introduction When hard drives are retired and moved outside the data centre into the hands of others, the data on those drives is put at significant risk.
USB Portable Storage Device: Security Problem Definition Summary
USB Portable Storage Device: Security Problem Definition Summary Introduction The USB Portable Storage Device (hereafter referred to as the device or the TOE ) is a portable storage device that provides
CIP- 005 R2: Understanding the Security Requirements for Secure Remote Access to the Bulk Energy System
CIP- 005 R2: Understanding the Security Requirements for Secure Remote Access to the Bulk Energy System Purpose CIP-005-5 R2 is focused on ensuring that the security of the Bulk Energy System is not compromised
IDENTITY & ACCESS. Privileged Identity Management. controlling access without compromising convenience
IDENTITY & ACCESS Privileged Identity Management controlling access without compromising convenience Introduction According to a recent Ponemon Institute study, mistakes made by people Privilege abuse
Overview of Data Security Methods: Passwords, Encryption, and Erase
Overview of Data Security Methods: Passwords, Encryption, and Erase Chris Budd SMART High Reliability Solutions Santa Clara, CA 1 Overview of Data Security Methods Introduction Data Protection Passwords
SafeGuard Enterprise Tools guide
SafeGuard Enterprise Tools guide Product version: 5.60 Document date: April 2011 Contents 1 About this guide...3 2 Displaying the system status with SGNState...3 3 Reverting an unsuccessful installation
How to use the Alertsec Service to Achieve HIPAA Compliance for Your Organization
How to use the Alertsec Service to Achieve HIPAA Compliance for Your Organization Alertsec offers Cloud Managed - Policy Controlled - Security Modules for Ensuring Compliance at the Endpoints Contents
Intel vpro. Technology-based PCs SETUP & CONFIGURATION GUIDE FOR
SETUP & CONFIGURATION GUIDE FOR Intel vpro Technology-based PCs This Setup Guide details what makes a true Intel vpro technology-based PC, and how to set up and configure Intel AMT (Active Management Technology)
Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006
Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 April 2013 Hologic and the Hologic Logo are trademarks or registered trademarks of Hologic, Inc. Microsoft, Active Directory,
UEFI Implications for Windows Server
presented by UEFI Implications for Windows Server Taipei UEFI Plugfest March 18-22, 2013 Presented by Arie van der Hoeven (Microsoft Corporation) Updated 2011-06-01 Taipei UEFI Plugfest March 2013 www.uefi.org
Windows 7. Qing Liu [email protected] Michael Stevens [email protected]
Windows 7 Qing Liu [email protected] Michael Stevens [email protected] 1 Overview 1. Financial Institution s Preliminary Steps 2. User Interface 3. Data Protection 4. User and Group Changes
Overview of Windows 10 Requirements for TPM, HVCI and SecureBoot
presented by Overview of Windows 10 Requirements for TPM, HVCI and SecureBoot UEFI Spring Plugfest May 18-22, 2015 Gabe Stocco, Scott Anderson, Suhas Manangi Updated 2011-06-01 UEFI Plugfest May 2015 www.uefi.org
MICROSOFT BITLOCKER ADMINISTRATION AND MONITORING (MBAM)
MICROSOFT BITLOCKER ADMINISTRATION AND MONITORING (MBAM) MICROSOFT BITLOCKER ADMINISTRATION AND MONITORING (MBAM) Microsoft BitLocker Administration and Monitoring (MBAM) provides a simplified administrative
Introduction to BitLocker FVE
Introduction to BitLocker FVE (Understanding the Steps Required to enable BitLocker) Exploration of Windows 7 Advanced Forensic Topics Day 3 What is BitLocker? BitLocker Drive Encryption is a full disk
Gain Complete Data Protection with SanDisk Self-Encrypting SSDs and Wave Systems
Gain Complete Data Protection with SanDisk Self-Encrypting SSDs and Wave Systems Built-in Security to Protect Sensitive Data without Sacrificing Performance What is an SED? A self-encrypting drive performs
Mitigating Server Breaches with Secure Computation. Yehuda Lindell Bar-Ilan University and Dyadic Security
Mitigating Server Breaches with Secure Computation Yehuda Lindell Bar-Ilan University and Dyadic Security The Problem Network and server breaches have become ubiquitous Financially-motivated and state-sponsored
Using Remote Desktop Clients
CYBER SECURITY OPERATIONS CENTRE December 2011 Using Remote Desktop Clients INTRODUCTION 1. Remote access solutions are increasingly being used to access sensitive or classified systems from homes and
NCSU SSO. Case Study
NCSU SSO Case Study 2 2 NCSU Project Requirements and Goals NCSU Operating Environment Provide support for a number Apps and Programs Different vendors have their authentication databases End users must
A Guide to Managing Microsoft BitLocker in the Enterprise
20140410 A Guide to Managing Microsoft BitLocker in the Enterprise TABLE OF CONTENTS Introduction 2 Why You Can t Ignore Effective FDE 3 BitLocker by Default 4 BitLocker s Total Cost of Ownership 5 SecureDoc
CHOOSING THE RIGHT PORTABLE SECURITY DEVICE. A guideline to help your organization chose the Best Secure USB device
CHOOSING THE RIGHT PORTABLE SECURITY DEVICE A guideline to help your organization chose the Best Secure USB device Introduction USB devices are widely used and convenient because of their small size, huge
Managing BitLocker Encryption
Managing BitLocker Encryption WWW.CREDANT.COM Introduction Organizations are facing a data security crisis. Despite decades of investment in security, breaches of sensitive information continue to dominate
VMware ESXi 3.5 update 2
VMware ESXi 3.5 update 2 VMware ESXi 3.5 Exec Summary What is it? What does it do? What is unique? Who can use it? How do you use it? Next generation, thin hypervisor for FREE Partitions servers to create
Discovering passwords in the memory
Discovering passwords in the memory Abhishek Kumar ([email protected]) November 2003 Escalation of privileges is a common method of attack where a low privileged user exploits a vulnerability
Guidance End User Devices Security Guidance: Apple OS X 10.9
GOV.UK Guidance End User Devices Security Guidance: Apple OS X 10.9 Published 23 January 2014 Contents 1. Changes since previous guidance 2. Usage Scenario 3. Summary of Platform Security 4. How the Platform
Index. BIOS rootkit, 119 Broad network access, 107
Index A Administrative components, 81, 83 Anti-malware, 125 ANY policy, 47 Asset tag, 114 Asymmetric encryption, 24 Attestation commercial market, 85 facts, 79 Intel TXT conceptual architecture, 85 models,
USB Portable Storage Device: Security Problem Definition Summary
USB Portable Storage Device: Security Problem Definition Summary Introduction The USB Portable Storage Device (hereafter referred to as the device or the TOE ) is a portable storage device that provides
Uni-directional Trusted Path: Transaction Confirmation on Just One Device
Uni-directional Trusted Path: Transaction Confirmation on Just One Device Atanas Filyanov 1, Jonathan M. McCune 2, Ahmad-Reza Sadeghi 3, Marcel Winandy 1 1 Ruhr-University Bochum, Germany 2 Carnegie Mellon
Human Factors in Information Security
University of Oslo INF3510 Information Security Spring 2014 Workshop Questions Lecture 2: Security Management, Human Factors in Information Security QUESTION 1 Look at the list of standards in the ISO27000
White Paper. BD Assurity Linc Software Security. Overview
Contents 1 Overview 2 System Architecture 3 Network Settings 4 Security Configurations 5 Data Privacy and Security Measures 6 Security Recommendations Overview This white paper provides information about
End User Devices Security Guidance: Apple OS X 10.10
GOV.UK Guidance End User Devices Security Guidance: Apple OS X 10.10 Published Contents 1. Changes since previous guidance 2. Usage scenario 3. Summary of platform security 4. How the platform can best
Aegis Padlock for business
Aegis Padlock for business Problem: Securing private information is critical for individuals and mandatory for business. Mobile users need to protect their personal information from identity theft. Businesses
HP Commercial Notebook BIOS Password Setup
HP Commercial Notebook BIOS Password Setup Table of Contents: Introduction... 1 Preboot Passwords... 2 Multiple User Architecture in BIOS... 2 Preboot Password Setup... 3 Password Change... 4 Forgotten
Working Together Managing and Securing Enterprise Mobility WHITE PAPER. Larry Klimczyk Digital Defence P: 222.333.4444
Working Together Managing and Securing Enterprise Mobility WHITE PAPER Larry Klimczyk Digital Defence P: 222.333.4444 Contents Executive Summary... 3 Introduction... 4 Security Requirements... 5 Authentication...
Securing Corporate Data and Making Life Easier for the IT Admin Benefits of Pre Boot Network Authentication Technology
20140115 Securing Corporate Data and Making Life Easier for the IT Admin Benefits of Pre Boot Network Authentication Technology TABLE OF CONTENTS What s at risk for your organization? 2 Is your business
Host Memory Buffer (HMB) based SSD System. Forum J-31: PCIe/NVMe Storage Jeroen Dorgelo Mike Chaowei Chen
Host Memory Buffer (HMB) based SSD System Forum J-31: PCIe/NVMe Storage Jeroen Dorgelo Mike Chaowei Chen Agenda Market Trends in Client SSD Introducing DRAMless architecture for SATA & PCIe Host Memory
REGULATIONS FOR THE SECURITY OF INTERNET BANKING
REGULATIONS FOR THE SECURITY OF INTERNET BANKING PAYMENT SYSTEMS DEPARTMENT STATE BANK OF PAKISTAN Table of Contents PREFACE... 3 DEFINITIONS... 4 1. SCOPE OF THE REGULATIONS... 6 2. INTERNET BANKING SECURITY
Thick Client Application Security
Thick Client Application Security Arindam Mandal ([email protected]) (http://www.paladion.net) January 2005 This paper discusses the critical vulnerabilities and corresponding risks in a two
SECURITY FOR ENTERPRISE TELEWORK AND REMOTE ACCESS SOLUTIONS
SECURITY FOR ENTERPRISE TELEWORK AND REMOTE ACCESS SOLUTIONS Karen Scarfone, Editor Computer Security Division Information Technology Laboratory National Institute of Standards and Technology Many people
Chapter 4 Application, Data and Host Security
Chapter 4 Application, Data and Host Security 4.1 Application Security Chapter 4 Application Security Concepts Concepts include fuzzing, secure coding, cross-site scripting prevention, crosssite request
Securing the Microsoft Cloud
Securing the Microsoft Cloud Securing the Microsoft Cloud Page 1 Securing the Microsoft Cloud Microsoft recognizes that trust is necessary for organizations and consumers to fully embrace and benefit from
Introduction. PCI DSS Overview
Introduction Manage Engine Desktop Central is part of ManageEngine family that represents entire IT infrastructure with products such as Network monitoring, Helpdesk management, Application management,
Getting Started with HC Exchange Module
Getting Started with HC Exchange Module HOSTING CONTROLLER WWW.HOSTINGCONROLLER.COM HOSTING CONTROLLER Contents Introduction...1 Minimum System Requirements for Exchange 2013...1 Hardware Requirements...1
