Business Continuity and Breach Protection: Why SSL Certificate Management Is Critical to Today s Enterprise

Similar documents
White Paper. Business Continuity and Breach Protection: Why SSL Certificate Management is Critical to Today s Enterprise

White Paper. Simplify SSL Certificate Management Across the Enterprise

Managing SSL Certificates with Ease

Simplify SSL Certificate Management Across the Enterprise

Securing Microsoft Exchange 2010 With VeriSign Authentication Services

Reducing the Cost and Complexity of Web Vulnerability Management

How Extended Validation SSL Brings Confidence to Online Sales and Transactions

Securing Microsoft Exchange 2010 with Symantec SSL Certificates

White paper. How to choose a Certificate Authority for safer web security

Leveraging Symantec CIC and A10 Thunder ADC to Simplify Certificate Management

Complete Website Security

Beginner s Guide to SSL Certificates

Making Your Enterprise SSL Security Less of a Gamble

Securing Your Software for the Mobile Application Market

White Paper. Enhancing Website Security with Algorithm Agility

Trust or bust: How to make summertime shoppers feel safe online and boost your sales at the same time

Frequently Asked Questions. Frequently Asked Questions: Prioritizing Trust: Certificate Authority Security Best Practices

Internet threats: steps to security for your small business

Security and Trust: The Backbone of Doing Business Over the Internet

Web Presence Security

IT Security & Compliance. On Time. On Budget. On Demand.

Overview. Comodo Certificate Manager

Reducing the Cost and Complexity of Web Vulnerability Management

Licensing Symantec Certificates

2012 Endpoint Security Best Practices Survey

Frequently Asked Questions. Frequently Asked Questions: Securing the Future of Trust on the Internet

Payment Card Industry Data Security Standard

Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS

Website Security: It s Not all About the Hacker Anymore

Securing the Mobile App Market

WHITE PAPER CHOOSING THE RIGHT SECURITY SOLUTION: MOVING BEYOND SSL TO ESTABLISH TRUST

FEELING VULNERABLE? YOU SHOULD BE.

8 Key Requirements of an IT Governance, Risk and Compliance Solution

Reducing the Cost and Complexity of Web Vulnerability Management

Symantec Cyber Security Services: DeepSight Intelligence

Kaseya White Paper. Endpoint Security. Fighting Cyber Crime with Automated, Centralized Management.

Reducing Risk Through Effective Certificate Management

Discover the Latest Innovations with Website Security Solutions Lee-Lin Thye

Grow Your Business by Building Customer Trust

Website Security Partner Program. Path to Profitability

CA Vulnerability Manager r8.3

CERTIFICATE MANAGEMENT SURVEY

Symantec Messaging Gateway 10.6

Top 5 Reasons to Choose User-Friendly Strong Authentication

How To Monitor Your Entire It Environment

The Changing Face of SSL

Five reasons SecureData should manage your web application security

GUIDE. Stop Phishing: A Guide to Protecting Your Web Site Against Phishing Scams

SSL Certificates: A Simple Solution to Website Security

How To Test For Security On A Network Without Being Hacked

How Extended Validation SSL can help to increase online transactions and improve customer confidence

ENTRUST CLOUD. SSL Digital Certificates, Discovery & Management entrust@entrust.com entrust.com

Symantec Managed PKI for SSL Support Overview. How to get quick and convenient customer support

Symantec Messaging Gateway 10.5

DETECT MONITORING SERVICES MITIGATING THE EPSILON BREACH SUMMARY

Symantec Control Compliance Suite. Overview

SYMANTEC MANAGED SECURITY SERVICES. Superior information security delivered with exceptional value.

North American Electric Reliability Corporation (NERC) Cyber Security Standard

Symantec Complete Website Security

BIG SHIFT TO CLOUD-BASED SECURITY

Endpoint Security More secure. Less complex. Less costs... More control.

Symantec Protection Suite Enterprise Edition for Servers Complete and high performance protection where you need it

How To Support Bring Your Own Device (Byod)

Symantec Messaging Gateway powered by Brightmail

Application Security in the Software Development Lifecycle

DISCOVER, MONITOR AND PROTECT YOUR SENSITIVE INFORMATION Symantec Data Loss Prevention. symantec.com

How to reduce the cost and complexity of two factor authentication

SECURING MULTIPLE DOMAINS WITH SSL Subject Alternative Name (SAN) Certificates and Unified Communications Certificates (UCC) WHITE PAPER

Symantec Mobile Security

white paper Malware Security and the Bottom Line

A Prescription for Privacy: What You Need to Know About Security Requirements for Electronic Health Records

Information Security Services

Finding Security in the Cloud

BEGINNERS GUIDE BEGINNERS GUIDE TO SSL CERTIFICATES: MAKING THE BEST CHOICE WHEN CONSIDERING YOUR ONLINE SECURITY OPTIONS

Leveraging a Maturity Model to Achieve Proactive Compliance

Cyber Security Services: Data Loss Prevention Monitoring Overview

WHITE PAPER SECURITY AND TRUST: THE BACKBONE OF DOING BUSINESS OVER THE INTERNET

Wildcard and SAN: Understanding multi-use SSL Certificates

Choosing a Cloud Hosting Provider with Confidence

Seamless Mobile Security for Network Operators. Build a secure foundation for winning new wireless services revenue.

PATCH MANAGEMENT. February The Government of the Hong Kong Special Administrative Region

Is online backup right for your business? Eight reasons to consider protecting your data with a hybrid backup solution

Taking the Leap to Virtualization

Simplify SSL Certificate Management Across the Enterprise

BUSINESS GUIDE SECURING YOUR SOFTWARE FOR THE MOBILE APPLICATION MARKET THE LATEST CODE SIGNING TECHNOLOGY

Securing Microsoft Exchange 2010 WITH THAWTE SSL CERTIFICATES

Five keys to a more secure data environment

Understanding Enterprise Cloud Governance

Real-Time Security Intelligence for Greater Visibility and Information-Asset Protection

Solution Brief: Enterprise Security

Almost 400 million people 1 fall victim to cybercrime every year.

Phishing The latest tactics and potential business impacts

Comodo Certificate Manager. Comodo Enterprise

Licensing VeriSign Certificates

How PatchLink Meets the Top 10 Requirements for Enterprise Patch and Vulnerability Management. White Paper Sept. 2006

The Impact of Wireless LAN Technology on Compliance to the PCI Data Security Standard

Web application security Executive brief Managing a growing threat: an executive s guide to Web application security.

The Impact of HIPAA and HITECH

Endpoint Management and Mobility Solutions from Symantec. Adapting traditional IT operations for new end-user environments

Transcription:

Business Continuity and Breach Protection: Why SSL Certificate Management Is Critical to Today s Enterprise White Paper Business Continuity and Breach Protection: Why SSL Certificate Management Is Critical to Today s Enterprise Now from VeriSign Authentication Services

Business Continuity and Breach Protection: Why SSL Certificate Management Is Critical to Today s Enterprise Contents Introduction 3 Challenges in SSL Certificate Management 3 The Dangers of Expired and Rogue SSL Certificates 4 Theft of customer data................................. 4 Losing customers to competitors........................... 6 Increased calls to customer support......................... 6 Increased strain on IT departments......................... 6 Best Practices in SSL Certificate Management 7 Conclusion 8 Symantec Certificate Intelligence Center: Robust SSL Discovery and Management 8

Introduction SSL Certificates have been in use for almost 15 years, and they continue to serve a vital role in protecting data as it travels across the Internet and other networks. From online financial transactions to e-commerce to product development, SSL Certificates make it possible for users around the world to communicate sensitive information with the confidence that it is safe from malicious hackers. The Internet has evolved in innumerable ways over the past decade and a half; so why do SSL Certificates continue to instill trust? Simply put, SSL Certificates are very effective in protecting data in transit. In fact, according to some calculations, it would take about six thousand trillion years or about a million times longer than Earth has existed to crack a 128-bit encryption on SSL Certificates with a brute force attack. 1 Even so, the security industry is ever vigilant and many Certificate Authorities have started phasing in 2048-bit encryption on their SSL Certificates, further strengthening the protection for online data communications. Yet, customers transacting on websites and systems that are protected by SSL security still face serious threats. One key reason for this danger: poor SSL Certificate management. Enterprises with hundreds of SSL Certificates from several different providers could lose track of certificates in their environment. When this happens, certificates could expire and go unnoticed for months, leaving website visitors vulnerable to hackers. Sometimes, the first sign that there is a lost SSL Certificate is a call from a customer who has noticed an expired certificate and asks if it really is safe to make a purchase at the website. Other times it may be something more serious, like a phishing incident that allows cybercriminals to steal sensitive customer data. Or, a security breach that occurs at a Certificate Authority (CA) reverberates through an organisation due to its inability to act quickly for lack of visibility into its SSL Certificate inventory. Whatever the case may be, losing track of SSL Certificates can cause significant financial loss and reputation damage. Fortunately, discovering and managing SSL Certificates within the enterprise does not have to be complex or time-consuming. This white paper will present the pitfalls associated with poor SSL Certificate management, why they are potentially dangerous to the enterprise, and how enterprises can keep track of SSL Certificates effectively. Challenges in SSL Certificate Management Today s enterprise is a complex environment that often encompasses multiple internal networks and public-facing websites. For this reason, a company can have dozens if not hundreds of different SSL Certificates deployed at any given time. 1. http://www.inet2000.com/public/encryption.htm

In addition to a large number of SSL Certificates, many enterprises employ a mix of various certificates from different CAs. As an example, an enterprise may install SSL Certificates from a well-known, trusted provider on its customer-facing website and value brand or self-signed certificates on its intranet. Although some CAs offer online tools to manage their particular certificates, often these tools cannot provide visibility into all of the certificates from multiple CAs across an environment. Instead of making management easier, multiple management portals exacerbate the problem of tracking numerous SSL certificates in a multi-ca environment. Administrators need to constantly monitor their SSL Certificate inventory through multiple systems and put together their own reports to gain a comprehensive view of their SSL Certificate inventory. To complicate matters, enterprises with distributed networks may have security policies that differ from group to group. In practice, this means that Group A may require Extended Validation SSL Certificates to protect the data that it manages, but Group B uses a different type of SSL Certificates from another Certificate Authority. Or in a scenario that may be more common, Group A might require 2048- bit SSL Certificates while Group B uses 1024-bit certificates. With different policies and no single way to gain a comprehensive view of SSL Certificates across an enterprise, these inconsistencies could lead to security risks and non-compliance with corporate and regulatory policies. To add another dimension to the problem, consider what happens when the employees who are responsible for managing SSL security change roles or leave the company. If they do not rigorously document which certificates they manage and communicate that information to other team members those particular SSL Certificates may go unnoticed when a new team member takes over. Since enterprise IT teams are busy and frequently pressed for resources, manual tracking of SSL Certificates is not only a burden, but prone to human error as well. All of these factors contribute to an environment where SSL Certificates can be lost or overlooked. Such an environment could lead to business disruptions for an enterprise and create security risks for its customers. The Dangers of Expired and Rogue SSL Certificates An expired or rogue SSL Certificate in a network environment could have severe repercussions. It takes just one out-of-date or rogue certificate to expose the enterprise and perhaps more importantly, its customers to malicious cybercrime. The following are just a few potential consequences of expired and rogue SSL Certificates. Theft of customer data Thanks to years of news headlines about data breaches and education efforts led by consumer advocacy groups and businesses, the public is more concerned about identity theft than ever before. A recent study found that 64 percent of Americans

are very or extremely concerned about someone stealing their identity, with 31 percent describing their level of worry as extremely concerned. 2 In this context, the risk of phishing is a major concern. In a phishing attack, a hacker will assume the identity of a legitimate business taking advantage of the business s lack of authentication from non-existent or expired SSL Certificates and create a fake website that looks similar if not identical to the real site. Unsuspecting customers will then enter confidential information, such as credit card or social security numbers, on the site. The phished site feeds data directly to the hacker, who may in turn sell it to other criminals. Even if a phishing incident or data breach is relatively minor, it can exacerbate these fears and seriously threaten the enterprise. Beyond these immediate losses, phishing and data breaches can also affect the reputation of an enterprise and lead both current customers and prospects to question whether a particular business can be trusted. Industry experts say that it takes about six months to stabilise sales and confidence in a company s network after a breach 3 and even then a company s reputation may not be completely restored. The Increasing Cost of Data Breaches While damage to a company s reputation can be hard to measure, understanding the economic impact of a data breach is easier to pin down. According to a recent US study, the average cost of a data breach was $7.2 million per event, or roughly $214 per compromised record, 4 numbers that are predicted to continue rising. LOST PRODUCTIVITY MISSED SALES OPPORTUNITIES CALLS TO TECH SUPPORT INTERNAL APPLICATIONS EXTERNAL APPLICATIONS DEFECTION TO COMPETITORS DAMAGE TO BRAND AND CREDIBILITY USERS TRAINED TO IGNORE WARNINGS CALLS TO CUSTOMER SUPPORT Consequences of Unexpected SSL Expirations and Browser Warnings 2. Identity theft fears weigh on Americans, by Tim Greene, Network World, 4/12/2010 3. Sony Data Breach Exposes Users to Years of Identity-Theft Risk, by Cliff Edwards and Michael Riley, BusinessWeek.com, 5/3/11 4. Cost of a data breach climbs higher, Ponemon Institute, ponemon.org, 3/8/11

Losing customers to competitors Another factor that concerns business is expired SSL Certificates. An expired SSL Certificate can lead to lost business in other ways. Chief among them is simply losing traffic when customers see warnings of SSL Certificate expiration and leave your site to purchase products and services on sites that are secured with SSL Certificates. 4 Customers may not know exactly how public key encryption works, but visible signs of SSL security such as an SSL trust seal or the green Extended Validation bar will make them more likely to transact on a particular site. 5 If SSL Certificates on e-commerce or other types of public-facing sites expire, they will lose customers trust resulting in loss of business. Increased calls to customer support Today, many companies offer web tools, automated phone menus, and other self-service options to make it easier for customers who have questions to find the information they need. However, if customers visit a website and have any concerns about whether their private data is secure, they will either abandon their transaction (as discussed above) or they may call customer support. The average cost per support call varies widely across industries, but one fact is certain: the costs of numerous support calls add up over time. Not only do extra support calls drain a company s financial resources, they place an additional burden on the contact center and divert support staff from handling other highvalue customer calls. The extra cost and inconvenience associated with customer inquiries can be easily avoided by maintaining up-to-date security, including valid SSL Certificates. Increased strain on IT departments Just like customers who call customer support when they re uncertain about a website s security, employees who see warnings that stem from expired SSL Certificates on intranets or other internal sites will often contact IT staff to resolve the issue. This can add a significant burden to IT departments that are already overwhelmed. In other cases, employees may ignore these expiration warnings altogether, a situation that continues to leave the affected resources vulnerable to attack. It also sets a negative precedent for security compliance by creating the impression that staff may disregard internal security measures. Either scenario is preventable with up-to-date SSL Certificate security across the enterprise. 5. http://www.verisign.co.uk/ssl/ssl-information-center/ecommerce-trust-ssl/

Best Practices in SSL Certificate Management Fortunately, there are services that make it easy to discover and manage SSL Certificates across the enterprise. Some solutions may claim to reduce the burden of SSL management even if they do not allow you to discover certificates from multiple Certificate Authorities. Other solutions might offer multi-ca scanning ability, but lack an intuitive, easy-to-navigate user interface. To help ensure that you find the best solution to fit your needs, here are some key features to look for in any solution you consider: Ability to scan your environment automatically: While it is possible to audit networks manually, this approach would simply take too long and require too many staff resources to be feasible in a large, complex enterprise environment. Be sure to select a service that enables your team to conduct automatic scans that will detect SSL Certificates from any provider. An easy-to-use interface: Information that is hard to access or read will not be useful, so look for a tool that offers a dashboard that is easy to navigate and presents data in a way that is easy to understand at a glance. Delegation capabilities: In the typical enterprise environment, multiple employees are tasked with security management. For this reason, finding a certificate discovery solution that allows administrators to grant different levels of access and delegate tasks to various employees across the network is critical. Alerts and reporting: An expired SSL Certificate puts data at risk, so finding a service that will send alerts before a certificate needs renewal is critical. In addition, the ability to generate reports that are easy to read and comprehend is critical. Advanced reporting capabilities will not only provide a deep, comprehensive view of certificates in the network, but will also allow your team to communicate critical information to other staff such as executives more effectively. Flexibility and scalability: Enterprise networks are dynamic, everchanging environments, which means a certificate discovery service should have configurable parameters, such as the duration of the scan, which IP addresses to scan, etc. In addition, the service must be scalable to allow for future growth. Timeliness: In order to be effective, network scans must be completed quickly. If a network-wide scan takes too long, the status of some SSL Certificates may change before the full scan is complete. This will result in an inaccurate view of the SSL Certificate inventory.

Conclusion SSL Certificates are essential to protecting data in transit. Despite its strength and reliability, however, SSL security can still be vulnerable to attack for one simple reason: poor SSL Certificate management. In a multi-certificate, multi-ca enterprise environment, getting a comprehensive view of SSL security is essential. Knowing the status of every certificate across sites and networks can not only help control customer service costs, but also lower the burden of SSL administration, giving busy IT teams more time to concentrate on other business-critical projects. Rigorous SSL management can also prevent much more serious consequences, including a major phishing incident or other type of data breach that will not only be expensive to remediate, but may also cause long-term damage to your reputation with customers. Symantec Certificate Intelligence Center: Robust SSL Discovery and Management Symantec Certificate Intelligence Center helps administrators discover and manage SSL Certificates more effectively. With deep visibility and management capabilities, Symantec Certificate Intelligence Center makes keeping track of SSL Certificates easy. Symantec Certificate Intelligence Center features an intuitive interface that allows administrators to set up automatic scans that quickly discover certificates from any CA. Users can also set up alerts to proactively warn SSL managers when certificates are about to expire. The easy-to-navigate dashboard offered by Symantec Certificate Intelligence Center An easily scalable solution, Symantec Certificate Intelligence Center accommodates rapid network changes as business needs shift and grow. Advanced reporting capabilities also give managers a comprehensive view of SSL security that is easy to understand and communicate across the company. To learn more about how Symantec Certificate Intelligence Center can help you simplify SSL Certificate discovery and management, please visit: http://www.verisign.co.uk/ssl/symantec-certificate-intelligence-center/index.html

More information Visit our website http://www.verisign.co.uk Learn More For more information about Symantec SSL Certificates, please call our toll free number on 0800-032-2101 or +44 (0) 208-6000-740 or email: sslsales-uk@symantec.com To speak with a Product Specialist Call 0800-032-2101 or +44 (0) 208-6000-740 About Symantec Symantec is a global leader in providing security, storage, and systems management solutions to help consumers and organisations secure and manage their information-driven world. Our software and services protect against more risks at more points, more completely and efficiently, enabling confidence wherever information is used or stored. Headquartered in Mountain View, Calif., Symantec has operations in 40 countries. More information is available at www.symantec.com. Symantec (UK) Limited 350 Brook Drive, GreenPark, Reading Berkshire RG2 6UH, UK Now from VeriSign Authentication Services Copyright 2011 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, and the Checkmark Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. VeriSign, VeriSign Trust and other related marks are the trademarks or registered trademarks of VeriSign, Inc. or its affiliates or subsidiaries in the U.S. and other countries and licensed to Symantec Corporation. Other names may be trademarks of their respective owners.