Security in Business and Applications. Madison Hajeb Stefan Hurst Benjamin Von Slade



Similar documents
In addition to assisting with the disaster planning process, it is hoped this document will also::

Welcome to Remote Access Services (RAS)

FINRA Regulation Filing Application Batch Submissions

Improved Data Center Power Consumption and Streamlining Management in Windows Server 2008 R2 with SP1

1)What hardware is available for installing/configuring MOSS 2010?

HIPAA HITECH ACT Compliance, Review and Training Services

ACTIVITY MONITOR Real Time Monitor Employee Activity Monitor

Considerations for Success in Workflow Automation. Automating Workflows with KwikTag by ImageTag

Refer to any of the KFS UPK training courses on the KFS Website for a refresher on logging in to KFS.

Serv-U Distributed Architecture Guide

For students to participate in BYOD please follow these two steps

Information Services Hosting Arrangements

Junos Pulse Instructions for Windows and Mac OS X

Exercise 5 Server Configuration, Web and FTP Instructions and preparatory questions Administration of Computer Systems, Fall 2008

Service Desk Self Service Overview

STIOffice Integration Installation, FAQ and Troubleshooting

Custom Portlets. an unbiased review of the greatest Practice CS feature ever. Andrew V. Gamet

ViPNet VPN in Cisco Environment. Supplement to ViPNet Documentation

Data Protection Policy & Procedure

White Paper for Mobile Workforce Management and Monitoring Copyright 2014 by Patrol-IT Inc.

Exercise 5 Server Configuration, Web and FTP Instructions and preparatory questions Administration of Computer Systems, Fall 2008

Understand Business Continuity

Cloud Services Frequently Asked Questions FAQ

Mobile Device Manager Admin Guide. Reports and Alerts

Implementing ifolder Server in the DMZ with ifolder Data inside the Firewall

QBT - Making business travel simple

Cloud Services MDM. Windows 8 User Guide

Blue Link Solutions Terminal Server Configuration How to Install Blue Link Solutions in a Terminal Server Environment

SPECIFICATION. Hospital Report Manager Connectivity Requirements. Electronic Medical Records DRAFT. OntarioMD Inc. Date: September 30, 2010

Systems Support - Extended

990 e-postcard FAQ. Is there a charge to file form 990-N (e-postcard)? No, the e-postcard system is completely free.

Firewall/Proxy Server Settings to Access Hosted Environment. For Access Control Method (also known as access lists and usually used on routers)

Getting Started Guide

URM 11g Implementation Tips, Tricks & Gotchas ALAN MACKENTHUN FISHBOWL SOLUTIONS, INC.

Treasury Gateway Getting Started Guide

esupport Quick Start Guide

Personal Data Security Breach Management Policy

Army DCIPS Employee Self-Report of Accomplishments Overview Revised July 2012

ISAM TO SQL MIGRATION IN SYSPRO

ABELMed Platform Setup Conventions

Durango Merchant Services QuickBooks SyncPay

User Guide Version 3.9

WEB APPLICATION SECURITY TESTING

How To Migrate To A Networks Dmain Name Service On A Pc Or Macbook (For Pc) On A Linux Computer (For Macbook) On An Ipad Or Ipad (For Ipad) On Pc Or Ipa (For

The user authentication process varies from client to client depending on internal resource capabilities, and client processes and procedures.

Password Reset for Remote Users

First Global Data Corp.

Remote Desktop Tutorial. By: Virginia Ginny Morris

A Beginner s Guide to Building Virtual Web Servers

Shelby County Schools Online Employee Accident Reporting User Manual

SaaS Listing CA Cloud Service Management

SDES Service Desk Portal: Opening a Service Ticket

Tipsheet: Sending Out Mass s in ApplyYourself

Best Practice - Pentaho BA for High Availability

Serv-U Distributed Architecture Guide

Deployment Overview (Installation):

IN-HOUSE OR OUTSOURCED BILLING

Process Automation With VMware

Helpdesk Support Tickets & Knowledgebase

The Importance Advanced Data Collection System Maintenance. Berry Drijsen Global Service Business Manager. knowledge to shape your future

Magenta HR in partnership with breath ehr

Key Steps for Organizations in Responding to Privacy Breaches

System Business Continuity Classification

Point2 Property Manager Quick Setup Guide

AMWA Chapter Subgroups on LinkedIn Guidance for Subgroup Managers and Chapter Leaders, updated

Accident Investigation

Data Warehouse Scope Recommendations

Preparing to Deploy Reflection : A Guide for System Administrators. Version 14.1

Anatomy of Informz Templates. Understanding Standard and Advanced Templates

Online Learning Portal best practices guide

Privacy Policy. The Central Equity Group understands how highly people value the protection of their privacy.

MaaS360 Cloud Extender

OR 2) Implement and customize an off the shelf product that would suit the requirements

Lab 12A Configuring Single Sign On Service

INTEGRATION OVERVIEW. Introduction Authentication methods Learning management system (LMS) integration methods AICC standard...

BackupAssist SQL Add-on

Volume THURSTON COUNTY CLERK S OFFICE. e-file SECURE FTP Site (January 2011) User Guide

This report provides Members with an update on of the financial performance of the Corporation s managed IS service contract with Agilisys Ltd.

UC4 AUTOMATED VIRTUALIZATION Intelligent Service Automation for Physical and Virtual Environments

Monthly All IFS files, all Libraries, security and configuration data

Introduction to Mindjet MindManager Server

A COMPLETE GUIDE TO ORACLE BI DISCOVERER END USER LAYER (EUL)

Licensing the Core Client Access License (CAL) Suite and Enterprise CAL Suite

CSAT Account Management

E-Biz Web Hosting Control Panel

Access EEC s Web Applications... 2 View Messages from EEC... 3 Sign In as a Returning User... 3

Integrating With incontact dbprovider & Screen Pops

Transcription:

Security in Business and Applicatins Madisn Hajeb Stefan Hurst Benjamin Vn Slade

Intrductin Prject Cncept - Implement security in a small business setting Original Plan - D sme security audits fr small cmpanies Actual Plan - One cmpany need a security review and the ther cmpany needed help with user tracking security

Tw Different Prjects 1. Krames Staywell Access Tracker 2. Wind River Security Review

Krames Staywell Access Tracker (KSAT)

TASK Help them achieve HIPAA cmpliance by implementing a new applicatins

Tw Initial Prjects Applicatin 1 Track the access emplyees have t applicatins that deal with Electrnic Health Patient Infrmatin (EPHI) Applicatin 2 Cllect all the lg files in a central lcatin and create an applicatin that can easily present thse lgs t an end-user fr later review Drpped because they already have a Splunk server ding what they need

Plan Initially wanted t implement with Request Tracker, r RT fr shrt. Even thugh we lked int this, it seemed as if this may be scpe creep. Step Back: What is the end gal f this applicatin? RT is meant t d just that, rganize requests. NOT fr tracking access t applicatins They culd change sme plicies and use RT t make applicatin requests, but, in the end, they still need t track wh has access t what

KSAT - Requirements Gathering CRUD applicatin Stre all pertinent emplyee infrmatin N applicatin specifics, just free frm applicatins Ability t edit all infrmatin Search fields fr things RT Integratin? Lg usernames, what they did, and timestamps Finish by interviewing all emplyees

Actin Setting up a testing envirnment Windws Server 2008 Standard VM XAMPP Server (Apache, PHP, and MySQL) Cisc VPN frm hme If we are n the schl's netwrk, VPN is nt required Special thanks t Jn Sldan and Dr. Randy Byle fr helping t get a testing envirnment up and running

Sitemap

ERD

Prcess Agile prcess

Settings File We created a central lcatin fr are specific url, database, and user settings. This made the transitin frm ur testing envirnment t their prductin envirnment much easier.

Lgin Page Cnnects t a Micrsft Active Directry Allws t have a nrmal user grup and an administratr grup We nly utilized ne grup, s bth settings pint the same grup. Allws them t add mre cntrl later if needed

Successful Lgin Landing Page After a successful lgin, the user is taken t the emplyee page

KSAT Dem

Interviews After applicatin cmpletin Given cmpany laptps Each individual emplyee Query emplyees abut all access they may have t applicatins dealing with EPHI

KSAT - Cmplicatins Unfreseen applicatin errrs Slight miscmmunicatin n hw the applicatin functins After KSAT was develped we fund ut that many f the applicatins g thrugh a Develpment, Staging, and Prductin envirnment. It wuld have helped t have an extra table in the DB where we culd define "envirnments" Interview Cmmunicatin Each emplyee has their wn naming cnventins fr applicatins, making ppulating KSAT difficult INTERNET EXPLORER! CSS always lked slightly different in IE

KSAT - Lessns Learned Planning Planning Planning... Understand the business prcess t the fullest Helps fr applicatin building prcess Helps fr interview prcess t fill database Cnstantly make sure yu are n the same page as the cmpany Sme peple are ging t be difficult t wrk with

Wind River Security Review Excavatin cmpany lcated in Salt Lake City with jb sites thrughut Utah Have dne many jbs here at the University f Utah, including wrk n the new business buildings

Task Security review f the technlgy and physical space f the ffice Fllwed a security checklist fr small businesses Prvide recmmendatins abut security and system upgrades Prvide recmmendatins fr security plicies in the ffice

Requirements Gathering Access files frm hme Mnitr emplyee activity Feel cnfident in cmputer security Change as few habits as pssible

Initial Review Lgged all hardware n the netwrk Renamed cmputers numerically Physical security interview

Actin Set up SSL n email VPN Nessus scan fr vulnerabilities Fixed all critical and imprtant errrs User accunts and flder access n server Active Directry Wrkarund Trained emplyees Keylggers Brwser Security Mnitring Systems Backup

Key Learning Pints Small cmpanies are less receptive t mnetary slutins Mney was a large stalling pint Security plicies are difficult t enfrce in a small casual ffice (withut AD) Peple are resistant t change and new habits/sftware/plicies

Cmparisn Wind River Cncern: General Security Medium Risk: They are nt dealing with health infrmatin, but they are dealing with many clients and financial bids Legally bund t prtect client financial data hused n the server Krames Staywell Cncern: HIPAA Cmpliance Higher Risk: Dealing with Patient infrmatin and emplyee lgin infrmatin Legally required t prvide a lg sheet f emplyee access accrding t HIPAA, s pressed fr time befre the next audit

Cnclusin Security practices can be applied in many different business applicatins and scenaris Tw cmpletely different businesses need security, but they need very different things The umbrella f "security" is large and disparate at times

Questins?