The Information-Centric Security Lifecycle. Adrian Lane Securosis, L.L.C.



Similar documents
Larry Wilson Version 1.0 November, University Cyber-security Program Critical Asset Mapping

Understanding and Selecting a DLP Solution. Rich Mogull Securosis

Discovery Technology Group

Comprehensive Approach to Database Security

Information Governance Manage in Place Use Cases Workshop

IT Roles in Loss Prevention. Presented by: Ann Ostrander, Director of Loss Prevention Kirkland & Ellis LLP

Best Practices for Long-Term Retention & Preservation. Michael Peterson, Strategic Research Corp. Gary Zasman, Network Appliance

Records Management and SharePoint 2013

In ediscovery and Litigation Support Repositories MPeterson, June 2009

ILM, classification and the Information-Centric Enterprise. Per Sedihn, Vice Chair Nordics Comitte SNIA Europe CTO Proact IT Group

Management: A Guide For Harvard Administrators

DLP Content Discovery: Best Practices for Stored Data Discovery and Protection

Data Protection McAfee s Endpoint and Network Data Loss Prevention

EMC SourceOne Management and ediscovery Overview

ILM: Tiered Services & The Need For Classification

Better Together: Microsoft Office 365 & Symantec Office 365

THE EXECUTIVE GUIDE TO DATA LOSS PREVENTION. Technology Overview, Business Justification, and Resource Requirements

Critical Data Guide. A guide to handling critical information at Indiana University

with Managing RSA the Lifecycle of Key Manager RSA Streamlining Security Operations Data Loss Prevention Solutions RSA Solution Brief

Practical tips for managing e mail

Electronic Discovery How can I be prepared? September 2010

Protecting Data-at-Rest with SecureZIP for DLP

ISO Information Security Management Systems Professional

Management Trends, Troubles, and Solutions

Records Management 101

IBM Policy Assessment and Compliance

Record Retention and Digital Asset Management Tim Shinkle Perpetual Logic, LLC

State of Michigan Records Management Services. Frequently Asked Questions About E mail Retention

CA Technologies Data Protection

GUIDELINE RECORDS AND INFORMATION INVENTORY

NCHICA HITECH Act Breach Notification Risk Assessment Tool. Prepared by the NCHICA Privacy, Security & Legal Officials Workgroup

Data Classification Technical Assessment

Document Management and Records Management in SharePoint Scott Jamison

Records Retention & E-Discovery. Preserving Electronically Stored Information for Litigation

White Paper. Archiving Best Practices: 9 Steps to Successful Information Lifecycle Management. Contents

Records and Information Management. General Manager Corporate Services

Information Security Policy

Why can you trust Google?

Economic Realities in the Management of Public Records. George Bakolia Senior Deputy State Chief Information Officer November 4, 2011

DOCUMENT RETENTION STRATEGIES FOR HEALTHCARE ORGANIZATIONS

Solutions for admission control and data loss prevention in a modern corporate network

10 Building Blocks for Securing File Data

What security and compliance challenges exist with the move to Microsoft Office 365?

3 MUST-HAVES IN PUBLIC SECTOR INFORMATION GOVERNANCE

How To Protect Your Information From Being Hacked On A Network From A Mobile Device

Best Practices for Endpoint Data Loss Prevention

Supplier Information Security Addendum for GE Restricted Data

State of South Carolina Policy Guidance and Training

how can I comprehensively control sensitive content within Microsoft SharePoint?

Defensible Disposition Strategies for Disposing of Structured Data - etrash

FROM PAPER TO ELECTRONIC RECORDS MANAGEMENT MANAGING THE TRANSITION

Archiving and The Federal Rules of Civil Procedure: Understanding the Issues

Record Management in SharePoint

Information Technology

Using Enterprise Content Management Principles to Manage Research Assets. Kelly Mannix, Manager Deloitte Consulting Perth, WA.

CISA TIMETABLE (4 DAYS)

The evolution of data archiving

A Maturity Model for Enterprise Key Management. Lessons Learned

Information Security Policies. Version 6.1

TITUS Data Security for Cloud Identify and Control Sensitive Data Sent to the Cloud

The Future of Records Management. Senior Director, Loss Prevention Project Manager/Developer

A. USB Portable Storage Device (PSD) Encryption Procedure

Concepts of Database Management Seventh Edition. Chapter 7 DBMS Functions

Classifying Correspondence. General, Administrative, Project/Case, and Transitory

Basic Records Management Practices for Saskatchewan Government*

<Insert Picture Here> How to protect sensitive data, challenges & risks

Information Archiving

ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster

Microsoft SharePoint and Records Management Compliance

98% 22% RM-Speedy [03] Sven Hapke IBM Deutschland GmbH. From Records Management to Information Lifecycle Governance

Life Cycle of Records

Data Security What are you waiting for? Lior Arbel General Manager Europe Performanta

ILM et Archivage Les solutions IBM

5 FAM 440 ELECTRONIC RECORDS, FACSIMILE RECORDS, AND ELECTRONIC MAIL RECORDS

Identifying Broken Business Processes

Transcription:

The Information-Centric Security Lifecycle Adrian Lane Securosis, L.L.C.

Mainframe Internet I Internet II Jail Fortress Zone

But what about the information?

Network Data Application Information Data Host User Network Host

Network Application Information User Host

The Information-Centric Security Lifecycle

Create Classify Assign Rights Store Access Controls Encryption Rights Management Content Discovery Use Activity Monitoring and Enforcement Rights Management Logical Controls Application Security Share CMP (DLP) Encryption Logical Controls Application Security Archive Encryption Asset Management Destroy Crypto-Shredding Secure Deletion Content Discovery

ILM and Security Create Creation and Receipt Store Maintenan ce Use Use Use Share Distribution Archive Disposition Destroy

Create Content is classified as it s created through content analysis or based on labeling of data elements. Rights are assigned, based on central policies. Mandatory and discretionary policies.

Create Create Create Technologies Control Structured Unstructured Classify None* None* Assign Rights Label Security Enterprise DRM Note- Classification is expected to emerge from DLP/CMP

Label Security Column ID Last First SSN 1111 Mogull Richard 555-12-5555 1112 Smith John 324-86-3456 Row ID Last First Region Label 1111 Mogull Richard US Public 1112 Smith John EMEA Sensitive

Content Analysis Partial Document Matching Database Fingerprinting Statistical Exact File Matching Categories Conceptual ^(?:(?<Visa>4\d{3}) (?<Mastercard>5[1-5]\d{2}) (?<Discover>6011) (?<DinersClub>(?:3[68]\d{2}) (?:30[0-5]\d)) (?<AmericanExpress>3[47]\d{2}))([ - ]?)(?(DinersClub)(?:\d{6}\1\d{4}) (?(AmericanExpress)(?:\d{6}\1\d{5}) (?:\d{4}\1\d{4}\1\d{4})))$ Rules

Store We use access controls, encryption, and rights management to protect data in storage. Content Discovery helps find unprotected sensitive data that slipped through the gaps.

Store Technologies Control Structured Unstructured Access Controls DBMS Access Controls Administrator Separation of Duties File System Access Controls Document Management System Access Controls Store Encryption Field Level Encryption Application Level Encryption File/Media Encryption* Media Encryption File Encryption Distributed Encryption Rights Management Label/Row Level Security Enterprise DRM Content Discovery Database-Specific Discovery Tools DLP/CMF Content Discovery Storage/Data Classification Tools

Access Controls Encryption DRM

Encryption Options rmogull Phoenix asdfasdf asdfasdf File/Folder Application/ Database Media

Content Discovery

Use Monitor and protect information during use. Includes business applications and productivity applications. Heavy use of content-aware technologies.

Use Use Use Use Technologies Control Structured Unstructured Activity Monitoring and Enforcement Database Activity Monitoring Application Activity Monitoring Endpoint Activity Monitoring File Activity Monitoring Portable Device Control Endpoint DLP Rights Management Label Security Enterprise DRM Logical Controls Application Security Object (Row) Level Security Structural Controls Application Logic Implemented At Application Layer

Two Sides Of Information-Centric Security Data Center Productivity

CMP CMP

ADMP Adaptive Authentication Application NAC Activity Monitoring Anti-Exploitation Transaction Authentication Session Security Application Virtualization

asdf asd asd ads ads ads asd asd asdf asd asd ads ads ads asd asd Cross-Domain Information Protection ID Last First SSN 1111 Mogull Richard 555-12-5555 1112 Smith John 324-86-3456 ID Last First SSN 1111 Mogull Richard 555-12- 5555 1112 Smith John 324-86- 3456 Customer Report Customer retention grew 13% YoY. Customer 138-56-8375 held return value while... Customer Report Customer retention grew 13% YoY. Customer 138-56-8375 held return value while... 11 Last First SSN 11 Last First SSN

Share Securely exchange information, inside and outside of the enterprise. A mixture of content-aware technologies and encryption for secure exchange.

Share Share Share Share Technologies Control Structured Unstructured CMP/DLP Database Activity Monitoring (With DLP Feature) Network/Endpoint CMP/DLP Encryption *Only When Data Elements Not Otherwise Encrypted Network Encryption Application Level Encryption Email Encryption File Encryption Network Encryption Logical Controls Object (Row) Level Security Structural Controls Application Security Implemented At Application Layer

Inter-Organization Encryption vs. DRM

Archive Protect information in archival storage. Encryption and asset management

Archive Archive Archive Archive Technologies Control Structured Unstructured Encryption Field-Level Encryption Tape Encryption Storage Encryption (Multiple Options) Asset Management Asset Management Asset Management

Tape Encryption Options In-line Drive Software

Destroy Ensure data is not recoverable at end of life Content discovery to ensure dangerous data isn t hiding where it shouldn t be.

Destroy Destroy Destroy Destroy Technologies Control Structured Unstructured Crypto-Shredding Enterprise Key Management Enterprise Key Management Secure Deletion Disk/Free Space Wiping Disk/Free Space Wiping Physical Destruction Physical Destruction Physical Destruction Content Discovery Database-Specific Discovery Tools DLP/CMF Content Discovery Storage/Data Classification Tools Enterprise Search E-Discovery

Create Classify Assign Rights Store Access Controls Encryption Rights Management Content Discovery Use Activity Monitoring and Enforcement Rights Management Logical Controls Application Security Share CMP (DLP) Encryption Logical Controls Application Security Archive Encryption Asset Management Destroy Crypto-Shredding Secure Deletion Content Discovery

Adrian Lane Securosis, L.L.C. alane@securosis.com http://securosis.com AIM: whoisadrianlane Skype: whoisadrianlane