Exploring Converged Access of IT Security and Building Access Today, Tomorrow and the Future



Similar documents
Executive Summary P 1. ActivIdentity

The Convergence of IT Security and Physical Access Control

The Convergence of IT Security and Physical Access Control

Integrated Identity Management Whitepaper

Bridging the Great Divide. The Convergence of Physical and Logical Security

INTEGRATING THE TWO WORLDS OF PHYSICAL AND LOGICAL SECURITY

Utility of the Future Virtual Event Series Monthly Virtual Studio Event Series for Utilities

Certified Identity and Access Manager (CIAM) Overview & Curriculum

Security Center Unified Security Platform

Top Five Security Must-Haves for Office 365. Frank Cabri, Vice President, Marketing Shan Zhou, Senior Director, Security Engineering

The Challenge. The Solution. Achieve Greater Employee Productivity & Collaboration...while Protecting Critical Business Data

Information Technology Branch Access Control Technical Standard

ViSolve Open Source Solutions

2. Each server or domain controller requires its own server certificate, DoD Root Certificates and enterprise validator installed.

Centrify Cloud Connector Deployment Guide

IT Security. Muscat 15+ ABOUT US IN A GLANCE

Single Sign-On. Security and comfort can be friend. Arnd Langguth. September, 2006

Department of Management Services. Request for Information

MAESON MAHERRY. 3 Factor Authentication and what it means to business. Date: 21/10/2013

Privileged. Account Management. Accounts Discovery, Password Protection & Management. Overview. Privileged. Accounts Discovery

RSA Solution Brief. RSA SecurID Authentication in Action: Securing Privileged User Access. RSA Solution Brief

How To Use Usher For Business

Evolution Of Cyber Threats & Defense Approaches

Commercially Proven Trusted Computing Solutions RSA 2010

TONAQUINT DATA CENTER, INC. CLOUD SECURITY POLICY & PROCEDURES. Tonaquint Data Center, Inc Cloud Security Policy & Procedures 1

Identity & Privacy Protection

White paper December IBM Tivoli Access Manager for Enterprise Single Sign-On: An overview

Securely. Mobilize Any Business Application. Rapidly. The Challenge KEY BENEFITS

A brief on Two-Factor Authentication

Identity & Access Management

Guard All Security Symposium. Identity and Access Management

Cyber Security through Education & Awareness. KSU Police Converged Security: A holistic approach to cyber safety and security. Community Policing

A New Layer of Security to Protect Critical Infrastructure from Advanced Cyber Attacks. Alex Leemon, Sr. Manager

STRONGER AUTHENTICATION for CA SiteMinder

Defending Against Data Beaches: Internal Controls for Cybersecurity

Vendor Questionnaire

NERC CIP Whitepaper How Endian Solutions Can Help With Compliance

PortWise Access Management Suite

2013 AWS Worldwide Public Sector Summit Washington, D.C.

User Authentication in the Enterprise Network

TAC I/A Series Continuum Security Solutions Redefining Security for the Modern Facility

JD Edwards Security Best Practices

P2000 SECURITY management SYSTEM. More control means more freedom

WHITE PAPER Usher Mobile Identity Platform

Splunk Enterprise Log Management Role Supporting the ISO Framework EXECUTIVE BRIEF

How To Protect Data From Attack On A Network From A Hacker (Cybersecurity)

We are Passionate about Total Security Management Architecture & Infrastructure Optimisation Review

ISACA rudens konference

Achieving PCI-Compliance through Cyberoam

Professional Services Overview

How To Achieve Pca Compliance With Redhat Enterprise Linux

Manage and secure your workplace by controlling who, what, when, why, where and how people are allowed in your facility. Marquee

Solutions for Health Insurance Portability and Accountability Act (HIPAA) Compliance

Office of the Chief Information Officer Department of Energy Identity, Credential, and Access Management (ICAM)

Developing the Corporate Security Architecture. Alex Woda July 22, 2009

How To Manage A Privileged Account Management

Intrusion Detection and Cyber Security Monitoring of SCADA and DCS Networks

Card Management System Integration Made Easy: Tools for Enrollment and Management of Certificates. September 2006

Symantec Mobile Management 7.2

ADDING STRONGER AUTHENTICATION for VPN Access Control

EMC Physical Security Enabled by RSA SecurID Two-Factor Authentication with Verint Nextiva Review and Control Center Clients

FIVE PRACTICAL STEPS

GMI CLOUD SERVICES. GMI Business Services To Be Migrated: Deployment, Migration, Security, Management

The Centrify Vision: Unified Access Management

Standard: Event Monitoring

GE Measurement & Control. Cyber Security for NEI 08-09

Sygate Secure Enterprise and Alcatel

Enhancing Organizational Security Through the Use of Virtual Smart Cards

FREEDOM ACCESS CONTROL

CyberArk Privileged Threat Analytics. Solution Brief

Introduction to Cyber Security / Information Security

Seven Steps To A Superior Physical Identity and Access Management Solution. Enterprise-Class Physical Identity and Access Management Software

The Protection Mission a constant endeavor

PortWise Access Management Suite

HSPD-12 Implementation Architecture Working Group Concept Overview. Version 1.0 March 17, 2006

Trust but Verify: Best Practices for Monitoring Privileged Users

Provide access control with innovative solutions from IBM.

2003, Rainbow Technologies, Inc.

W H I T E P A P E R. Security & Defense Solutions Intelligent Convergence with EdgeFrontier

MAXIMUM DATA SECURITY with ideals TM Virtual Data Room

The Challenge. The Solution. Achieve Greater Employee Productivity & Collaboration...while Protecting Critical Business Data

Why Integrate Physical and Logical Security? White Paper. Author John Carney, Senior Technical Manager, Cisco Government and Security Solutions

Achieve Greater Employee Productivity & Collaboration...while Protecting Critical Business Data

Compliance & Data Protection in the Big Data Age - MongoDB Security Architecture

Symantec Mobile Management for Configuration Manager 7.2

Transcription:

Exploring Converged Access of IT Security and Building Access Today, Tomorrow and the Future Julian Lovelock ActivIdentity, part of HID Global Session ID: SPO2-106 Session Classification: Intermediate

Synopsis Domains of Physical & IT security have hitherto been separate worlds This is changing, albeit differently across different verticals Technology & economics are driving factors. These changes bring opportunities for better security at reduced cost

The stereotypes 3

Stereotypes - Physical Security In the blue corner, Ex-Cop or Military Likes dogs, guns and fences Doesn t trust computers

Stereotypes IT Security In the red corner.. Doesn t understand the practical issues Thinks corporate security is mainly about firewalls Gets all the budget Not good with people

The reality 6

Corporate Security is concerned with a broad range of critical Security Issues Agriculture / farming / food manufacturing Food Defense/Supply Chain, Workforce protection Arenas/stadiums/leagues/entertainment Crowd control, Game integrity, Terrorism Business services International travel, Counter intelligence / espionage Source: Securitymagazine.com Nov 2011 edition 7

Critical Security Issues (cont) Construction/Real Estate/Property Management Organized crime, Workplace violence, Theft Education Talent Management, Bullying Energy (Oil & Petroleum) In country civil unrest, Facility Threats Source: Securitymagazine.com Nov 2011 edition 8

Critical Security Issues (cont) The list goes on across a range of 19 sectors Including: Finance/Banking/Insurance, Government, Healthcare, Hospital/Medical Centers, Hospitality/Casinos, Industrial/Manufacturing, IT/ Communications / Media, Ports/Terminals, Retail, Transportation & Logistics, Utilities 63% cited Cyber Crime as a Critical Issue. Source: Securitymagazine.com Nov 2011 edition 9

CSO Responsibilities Source: Securitymagazine.com Nov 2011 edition Less than 50% of CSOs listed IT/Cyber security as a responsibility 10

Departmental Integration 44% stated that physical security group is integrated with information security group } 6% plan to integrate this year 11

Addressing Cyber Threats Across those responsible for Corporate Security Majority identified IT security as a critical issue Minority control the IT security budget Addressing Cyber threats requires a mix of traditional security skills and IT expertise. Threat analysis Risk assessment Policy definition Policy execution / enforcement 12

Organizations are faced with three options 1. Re-organize 2. Collaborate 3. Fail to address the issue 13

To get started Physical Security needs to become IT savy Substantial systems inter-dependencies Physical security is impacted by IT security 20% of physical security teams highlighted lack of knowledge of IP based systems as an issue Information week survey 2012 IT security dependent on corporate security policies Almost all cyber attacks rely on human failing IT should not publish a separate security policy 14

Market Trends 15

Technology & Market Trends Integrators, value added resellers and distributors addressing both Convergent User Management Convergent Credential Common Access Card Convergent Logging Network interdependencies Context based access rules Evolution of physical access control solutions

Relative Market Maturity Physical Access IT Security Card Entry Systems Strong Authentication Solutions Already Implemented 78% 39% Currently evaluating / considering implementing No intention of implementing 9% 23% 13% 29% Source: CSO Market Pulse: Two-Factor Authentication Adoption 17

Technology & Market Trends Integrators, value added resellers and distributors addressing both Convergent User Management Convergent Credential Common Access Card Convergent Logging Network interdependencies Context based access rules Evolution of physical access control solutions

Convergence of User management Integration with Active Directory Identity and PACS roles are defined and managed in AD 19

Physical Identity and Access Management (PIAM) Enterprises often manage several brands of physical access control and manually synchronize information among the systems making regulatory compliance (NERC, FERC,etc) a challenge PIAM vendors automate the process enabling a single trusted source for identity information and access rules

One card for physical and logical convergence A single smartcard gets you into the building, logs you onto your workstation authenticates you to the applications you need 21

Integrated Solution for Enterprise Operator Badged Card Physical Access Employee PACS Console PACS Head-end Issuance Request Card lifecycle Updates Logical Access LDAP CCM API VPN access Application access LAN access encryption digital signature Card Management System

Analytics Convergence PSIM tools Proliferation of connected physical access devices cameras, locks, sensors Generates wealth of data Requires analytics software to convert data to information Data analytics require IT and BI skills to deploy, administer and generate value 23

Convergent audit logging Enables a consolidated forensic view Entered building on Saturday at 5.30am through side entrance Opened office at 5.35am Logged onto network at 5.48am Logged onto CRM application at 6.01am Logged off system at 6.25am Left building at 7.02am PSIM + SIEM 24

Technology & Market Trends Integrators, value added resellers and distributors addressing both Convergent User Management Convergent Credential Common Access Card Convergent Logging Network interdependencies Context based access rules Evolution of physical access control solutions

Network Interdependencies IP based readers, e.g. HID Edge device range Heavy network dependency generated by growth in video IT department is now heavily involved in the deployment of a Physical Access Control system, video surveillance, sensors 26

Trend in Physical Access to IP based 27

I need to use your network What are your bandwidth requirements? 28

Technology & Market Trends Integrators, value added resellers and distributors addressing both Convergent User Management Convergent Credential Common Access Card Convergent Logging Network interdependencies Context based access rules Evolution of physical access control solutions

Context based access rules Consider Physical Access context for Logical Access Control decision Is the user known to be the building / room? Check PACS credential status Prevent tailgating Another tool for increasing security in depth 30

Context based access rules Consider Logical Access context for Physical Access Control decisions Did the employee log in to the VPN from a foreign country 3 hours prior to badging into the building Is the employee currently logged in from a different location 31

Technology & Market Trends Integrators, value added resellers and distributors addressing both Convergent User Management Convergent Credential Common Access Card Convergent Logging Network interdependencies Context based access rules Evolution of physical access control solutions

Arizona State University Pilot Mobile phone replaced card For access to buildings on campus Almost 90% said they would like to use their smartphone to open all doors on campus 33

Mobile Credentials Embedding credentials on NFC enabled smartphones Requires physical access administration (assigning access levels, ordering and provisioning credentials) be aligned with IT and communications administration (ordering and provisioning mobile phones) Decouples the credential management from the device management 34

PKI at the door The federal government has now issued PIV credentials to ~ 90% of their employees Federal government will begin updating their PACS in FY12 to support PKI based credentials Federal contractors will follow the government s lead An ASSA ABLOY Group brand PROPRI ETARY INFOR MATION. 2011 HID Global Corporat ion. All rights reserved.

Benefits and opportunities of convergence 36

1. One security policy 2. One credential 3. One audit log 37

Top Challenges/Barriers Associated with Implementation of Two-Factor Authentication Solution Q6: What are the top challenges or barriers your company associates with the implementation of a two-factor authentication solution? (Please check all that apply.) Base: 112 qualified respondents

Benefits of a convergence USABILITY One card gets you into the building Logs you onto the computer Gives you access to the applications you need to do a days work Authenticate for remote access Happy Users No more passwords No more multiple devices One card does it all Investment Leverage investment in physical access card for system security (or vice versa) Replace two sets of admin processes with one Cost of converged smartcard Is considerably less than Cost of PACS card + token Happy CFO Assurance Buildings access and system access privileges are collectively withdrawn Credentials are not easily shared Compliance Accountability Happy CSO

Likelihood of Company to Consider a Two-Factor Authentication Solution that Makes Use of Existing Card Access System Q10: How likely would your company be to consider a two-factor authentication solution that could make use of an existing physical access card system? Base: 112 respondents 40

Separate networks PACS User database Different credentials Separate audit logs Users managed on Active Directory 41

One network Single credential Connects to Active Directory Users managed on Active Directory Consolidated audit logs 42

Apply 43

Apply Slide Introduce physical access team to the IT security team Identify common goals & shared concerns Establish a unified security policy Not one for physical access & another for IT access Review potential cost savings and security benefits opportunity through converged credentialing 44