Evolution from FTP to Secure File Transfer

Similar documents
The governance IT needs Easy user adoption Trusted Managed File Transfer solutions

BANKING SECURITY and COMPLIANCE

How Reflection Software Facilitates PCI DSS Compliance

MOVEIT: SECURE, GUARANTEED FILE DELIVERY BY JONATHAN LAMPE, GCIA, GSNA

U.S. Federal Information Processing Standard (FIPS) and Secure File Transfer

What IT Auditors Need to Know About Secure Shell. SSH Communications Security

Supporting FISMA and NIST SP with Secure Managed File Transfer

Overview of Banking Application Security and PCI DSS Compliance for Banking Applications

Securing Ship-to-Shore Data Flow

Secure Data Transfer

Five Ways to Improve Electronic Patient Record Handling for HIPAA/HITECH with Managed File Transfer

The Panoptix Building Efficiency Solution: Ensuring a Secure Delivery of Building Efficiency

WS_FTP Professional 12. Security Guide

Complying with PCI Data Security

Solutions for Health Insurance Portability and Accountability Act (HIPAA) Compliance

Written by Edmond Ng on behalf of D-Link for a Thai magazine (before translation) Page 1 of 4

How Managed File Transfer Addresses HIPAA Requirements for ephi

DRAFT Standard Statement Encryption

Can you afford another day without Managed File Transfer (MFT)?

WICKSoft Mobile Documents for the BlackBerry Security white paper mobile document access for the Enterprise

WHITE PAPER. Managed File Transfer: When Data Loss Prevention Is Not Enough Moving Beyond Stopping Leaks and Protecting

Beyond FTP: Securing and Managing File Transfers

DMZ Gateways: Secret Weapons for Data Security

White Paper. BD Assurity Linc Software Security. Overview

How To Manage Web Content Management System (Wcm)

AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE

MOVEIT: SECURE BY DESIGN BY JONATHAN LAMPE, GCIA, GSNA

Building A Secure Microsoft Exchange Continuity Appliance

How To Protect A Wireless Lan From A Rogue Access Point

SECURITY AND PRIVACY ISSUES IN A KNOWLEDGE MANAGEMENT SYSTEM

A Websense Research Brief Prevent Data Loss and Comply with Payment Card Industry Data Security Standards

Three significant risks of FTP use and how to overcome them

Beyond FTP: Securing and Managing File Transfers

WS_FTP Professional 12. Security Guide

FileCloud Security FAQ

Securing and Managing Data Transmissions. 2010, Linoma Software. All rights reserved.

Understanding the Impact an FTP Data Breach Can Have on Your Business

Application Security in the Software Development Lifecycle

CONSIDERATIONS BEFORE MOVING TO THE CLOUD

WS_FTP Professional 12

AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE

White Paper Delivering Web Services Security: The Entrust Secure Transaction Platform

Secure Remote Monitoring of the Critical System Infrastructure. An Application Note from the Experts in Business-Critical Continuity

FINAL DoIT v.8 APPLICATION SECURITY PROCEDURE

White paper. Why Encrypt? Securing without compromising communications

Infor CloudSuite. Defense-in-depth. Table of Contents. Technical Paper Plain talk about Infor CloudSuite security

How To Understand And Understand The Security Of A Key Infrastructure

Visa U.S.A Cardholder Information Security Program (CISP) Payment Application Best Practices

EXECUTIVE BRIEF. IT and Business Professionals Say Website Attacks are Persistent and Varied. In this Paper

SECURE YOUR DATA EXCHANGE WITH SAFE-T BOX

Basics of Internet Security

WhatsUpGold. v14.2. Getting Started with WhatsUp Gold MSP Edition

Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data

PCI Security Compliance in KANA Solutions How KANA Applications Helps Companies Comply with PCI Security Standards

The Key to Secure Online Financial Transactions

Methods available to GHP for out of band PUBLIC key distribution and verification.

The Shortcut Guide To. Eliminating Insecure and Unreliable File Transfer Methods. Dan Sullivan

WHITE PAPER NEXSAN TRANSPORTER PRODUCT SECURITY AN IN-DEPTH REVIEW

Security Solutions

RSA Solution Brief. RSA SecurID Authentication in Action: Securing Privileged User Access. RSA Solution Brief

Inspection of Encrypted HTTPS Traffic

Security Solutions for HIPAA Compliance Issues 1

Server Security. Contents. Is Rumpus Secure? 2. Use Care When Creating User Accounts 2. Managing Passwords 3. Watch Out For Aliases 4

HIPAA: MANAGING ACCESS TO SYSTEMS STORING ephi WITH SECRET SERVER

The Twelve Most Common Threats to HIPAA Compliance When Providing Remote Access to Systems and Data March 2010

WS_FTP. Addressing the Need for Secure File Transfer

Using Entrust certificates with VPN

FERPA: Data & Transport Security Best Practices

WS_FTP: The smarter way to transfer files

Xerox DocuShare Security Features. Security White Paper

05.0 Application Development

Potential Targets - Field Devices

Log Management How to Develop the Right Strategy for Business and Compliance. Log Management

Managed File Transfer and the PCI Data Security Standard

INSTANT MESSAGING SECURITY

IT Compliance Volume II

SecureAge SecureDs Data Breach Prevention Solution

LAB FORWARD. WITH PROService RMS TECHNOLOGY, ARCHITECTURE AND SECURITY INFORMATION FOR IT PROFESSIONALS

Memeo C1 Secure File Transfer and Compliance

Barracuda Web Site Firewall Ensures PCI DSS Compliance

The Benefits of SSL Content Inspection ABSTRACT

WHITE PAPER. Internet File Transfers: Security Holes and How to Fix Them. Contents. Introduction The Problem with FTP... 1

Making Database Security an IT Security Priority

Achieving PCI Compliance Using F5 Products

Strong Authentication for Secure VPN Access

The Definitive Guide to Managed File Transfer:

Strengthen security with intelligent identity and access management

BlackShield ID Agent for Terminal Services Web and Remote Desktop Web

Remote Access Platform. Architecture and Security Overview

Managed File Transfer and the PCI Data Security Standards

PaperClip Incorporated 3/7/06; Rev 9/18/09. PaperClip Compliant Service Whitepaper

Did you know your security solution can help with PCI compliance too?

SSL VPN Technical Primer

MANAGED FILE TRANSFER: 10 STEPS TO HIPAA/HITECH COMPLIANCE

Gain a competitive edge through optimized B2B file transfer

FINAL DoIT v.4 PAYMENT CARD INDUSTRY DATA SECURITY STANDARDS APPLICATION DEVELOPMENT AND MAINTENANCE PROCEDURES

Secure Shell User Keys and Access Control in PCI-DSS Compliance Environments

Brainloop Cloud Security

THE KEY TO DATA SECURITY

Passing PCI Compliance How to Address the Application Security Mandates

Transcription:

IPSWITCH FILE TRANSFER WHITE PAPER Evolution from FTP to Secure File Transfer www.ipswitchft.com

Do you know where your organization s confidential and sensitive files were transferred today? Are you sure they even made it to the right people and not into the wrong hands? Are you concerned with the information and data sharing practices in your company? If so, you are not alone. WHAT IS AT STAKE Trust of your business partners Loyalty of your customers Lessons learned from recent high visibility data breaches illustrate how the Efficiency of your business combination of not following sensible file transfer best practices coupled with improper controls over the file transfer environment can and has been a part of company-ending events. As a result, more and more organizations are moving away from basic FTP solutions and quickly moving towards information exchange solutions that incorporate secure file transfer. This paper will discuss how secure, reliable, and Web-based file transfers can help your organization achieve its key business goals while reducing the amount of organizational distraction caused by not having a well understood and managed file transfer process that is aligned and integrated with your core business processes. The Importance of Your File Transfer Solution Customers, remote employees, and business partners have to exchange critical data over the Internet. It s no longer just a convenience effective file transfer is often key to the way organizations run their business and their overall competitive advantage. However, many companies today are challenged with finding more secure, efficient and reliable ways to manage file transfers. Electronically exchanging company information such as financial data, client data, health records, employee data and other intellectual property carries with it the risk of sensitive data falling into the wrong hands or not even making it into the right hands. It s a significant risk. Failure to adequately protect your data can lead to productivity loss, fines for non-compliance, a tarnished public image, and the long-term trust and loyalty of your partners and customers. All of this is dependent on the strategic and tactical implementation of your file transfer processes. Are you concerned with file transfer practices in your company? If so, you re certainly not alone. According to a research report from Ziff Davis, the overwhelming majority of survey respondents who are familiar with the file transfer solutions used within their organizations feel the same way. What Are Your Four Greatest File Transfer Concerns Compromise of Security 83% Loss of Personal Data Compromise of Proprietary Data Failure to Meet Security Audit Requirements 62% 73% 73% Evolution from FTP to Secure File Transfer 1

The Problem With Basic FTP Solutions File Transfer Protocol (FTP) is often deployed as a simple solution to enable the electronic exchange of business information and data. The adoption of transferring files across the open Internet has been so universally widespread that businesses now consider this ability to be critical to everyday business operations. In fact, it s now estimated that 83% of businesses are using FTP to move and share files and data. 1 Basic FTP can be a practical and viable method to transfer files if the data being transported is not critical, has no requirement for security and is not considered high risk. However, basic FTP itself is a weak link in the process of transferring confidential data due to its inherent lack of security and data management. The business process of file transfer has a history of not being treated as a core part of IT infrastructure or critical to business operations. The management and security of data transfers has often been left to individual contributors and lower-level IT staff. As a result, decisions have often been made from a limited viewpoint to solve individual tasks rather than from a more holistic view of the larger and strategic company need. File transfer solutions have often been relegated to the darkest corner of the lowest wattage server room, and it s very common to find long-ago deployed home grown FTP solutions that are not well understood, documented or easily maintained by today s IT staff being used to manage company data. The combination of businesses having undervalued high risk data and basic FTP itself being a weak link in the file transfer process presents a huge business liability. Today s evolving regulatory compliance and corporate governance requirements not to mention the recent onslaught of highly visible data theft incidents have highlighted the need for something better and more secure than basic FTP. Basic FTP Not Secure, Not Compliant The original specification of the FTP protocol included minimal, if any, security. As FTP protocol use has increased and the Internet has evolved and become more and more open, the security limitations of FTP have been exposed. For example, the standard FTP specification does not include the use of strong authentication, such as encrypted passwords or authentication tokens. Sending the login credentials in clear text allows cyber-thieves to sniff login information, which can then be used to gain unauthorized access to data. Even worse, the standard FTP does not encrypt the connection that files and date are being transferred over or even encrypt the files being transferred. Unencrypted file transfer, which can potentially allow a man-in-the-middle attack 2 and unauthorized viewing of data either during transmission or in storage on the server, has become a huge privacy concern today. continues Regulatory compliance is another challenge that many companies are now faced with. In order to meet the legal requirements of compliance mandates, corporate governance requirements, and other regulations, data must be managed throughout the file transfer business process. Businesses must sufficiently protect information from harm, whether health or financial records, customer accounts, or intellectual property. Audit trails which prove the safe management and secure movement of information are now a requirement to provide auditors. In such environments, standard FTP is not enough, due to its lack of strong security, data management, monitoring, and process control. 1 The Why, What, and How of Managed File Transfer in Business, Ziff Davis Publishing, 2007. 2 IT Security Dictionary, IT Security, Available online, http://www.itsecurity.com/security.htm?s=515. Evolution from FTP to Secure File Transfer 2

Improve Security and File Transfer Success Two common security protocols that help secure and increase the reliability of data transfer, Secure Sockets Layer (SSL) and Secure Shell (SSH), are specifically designed to encrypt file transfers and associated administration network traffic. Both SSL and SSH enhance the security and reliability of file transfer by using encryption to protect against unauthorized viewing and modification of high risk data during transmission across open networks such as the Internet. SSL A Secure Enhancement to Standard FTP If you use a web browser, chances are you have already been using a flavor of SSL encryption, as it was originally developed and has since been widely deployed to protect connections to web servers. SSL, also known as FTPS or Secure FTP over SSL is also used in conjunction with FTP to provide secure encryption over standard FTP connections. It uses the same two ports as a standard FTP connection, with the enhancement of the data channel being encrypted. SSL connections encrypt and decrypt FTP sessions across networks to provide authentication of credentials and to secure private communications. There are different strengths of SSL available, the most recent being SSL v3 and TLS 1.0, which are stronger than previous versions. IMPROPER CONTROL OF FILE TRANSFER ENVIRONMENT PLAYED PART IN COMPANY-ENDING EVENT In September 2004, an unauthorized party placed a script on the CardSystems platform This script ran on our system and caused records to be extracted, zipped into a file, and exported to an FTP site 3 In September 2004, hackers dropped a malicious script on the CardSystems application platform, injecting it via the Web application that customers use to access account information. The script, programmed to run every four days, extracted records, zipped them and exported them to an FTP site.lesson learned too late for old CardSystems 4 -Statement of John M. Perry (Former) President and CEO Cardsystems Solutions, Inc. (now defunct) before the United States House of Representatives Subcommittee on Oversight and Investigations of the Committee on Financial Services Hearing on Credit Card Data Processing: How Secure Is It? Washington, D.C. July 21, 2005 Not only does SSL encryption ensure that the wrong eyes do not gain access to your data, but it also protects against attempts to modify data while in transit. If an attacker could modify your data during transmission, you could not rely on the accuracy of the data when used in your application. SSL connections provide substantially increased reliability and decreased risk when transporting files and data, due to the built-in protection from unauthorized viewing and modification of data during transmission. When using SSL to protect data on your file transfer server, you must also ensure that all connecting file transfer clients support the same SSL capability, as the security must be deployed at both ends of the data transport for it to be utilized. 3 Mimoso, Michael, Cleaning up after a data attack: CardSystems Joe Christensen, Information Security News, April 2006, Available online: http://searchsecurity.techtarget. com/originalcontent/0,289142,sid14_gci1180411,00.html. 4 Hearing on Credit Card Data Processing: How secure is it?, US Committee on Financial Services, Congressman Barney Frank, chairman, July 2005, Available online: http:// financialservices.house.gov/media/pdf/072105jmp.pdf. Evolution from FTP to Secure File Transfer 3

SSH The Premium Choice for Secure File Transfer SSH, also known as SFTP or Secure Shell File Transfer Protocol is a premium security protocol that delivers secure communications and is often considered the best option for secure file transfer. SSH is widely deployed on various operating systems. It uses Secure Shell 2 (SSH2), a secure tunneling protocol, to emulate an FTP connection and provides a firewall friendly and encrypted channel for file transfers using the well-known TCP port 22. SSH offers enhanced security by having the entire file transfer session, including all session control commands, entirely encrypted at all times while only requiring a single port be opened on your firewall versus the two ports that need to be opened for FTP and SSL connections. Another widely used feature of SSH is Secure Copy (SCP2). It provides interoperability across multiple operating systems, platforms and includes desktops, servers and mainframes. According to the previously mentioned Ziff Davis report, more and more organizations are moving away from basic FTP solutions and quickly moving towards Secure File Transfer using SFTP. File Transfer Protocols Used Today Planned Implementation in Next 12 Months FTP SSH/SFTP/ SCP2 82% FTP 8% SSH/SFTP/ 67% SCP2 48% The authentication of both SSL and SSH connections can be based on passwords or certificates. If using passwords, they should be of sufficient strength so that they are hard to guess by attackers. Policy-based enforcement of strong cryptography algorithms (and passwords) and being able to control length of encryption keys will protect against unauthorized viewing of data. Such control should be enforced in compliance with your security policy. SSH is particularly popular in IT environments because most operating systems (including UNIX/Linux) support SSH, therefore using SSH for file transfer (SFTP) allows for cross-platform IT standardization. Standardization using SFTP ensures consistent, strong security policy enforcement and simpler administration. SFTP is very firewall-friendly because it uses a single connection for uploading and downloading, and it improves on the security of standard FTP by encrypting all data transfer traffic, connection control data and passwords to eliminate eavesdropping, connection hijacking, and other attacks. As an added feature, it also compresses all data during the transmission, which can result in faster file transfers. Evolution from FTP to Secure File Transfer 4

SSH/SSL Comparison Chart PRODUCTS WS_FTP Professional File Transfer Client WS_FTP Server with SSH File Transfer Server FTP FTPS/SSL SFTP/SSH SECURITY CHARACTERISTICS Credential Encryption Transport Encryption (i.e.: Data-in-Transit ) FIPS 140-2 Validated Cryptography Method for Security Certificate Keys Certificate Keys Supports PGP File Encryption (ie: Data-at-Rest ) Supports File Integrity Checking Built-in Compression Secure Copy (SCP2) Number of Ports for Connection Optional 2 Optional 2 Optional 2 Recommendations for Secure File Transfer Millions of files are electronically exchanged every day. Unmanaged, insecure file transfers present a significant risk to your organization. The best electronic file transfer solution should enable secure, reliable file transfer by providing integrated, strong security of SSL and SSH encryption, along with the tools to effectively manage the end-to-end file transfer process. Worrying about security of breaches during file transfers can be a distraction from your core business. Yet such concern is well founded: if your data is not protected adequately, your relationships with customers, your competitive edge, and even the business itself are all threatened. A reliable and secure file transfer process can ensure that your organization can concentrate on its core business. To improve the security of your file transfer process, consider the following steps: Treat file transfer as a core business process Do a full inventory of your file transfer requirements and have a CxO sponsor. Then move to document, standardize, optimize and fully manage the file transfer activities of your organization. While technology can help in meeting these criteria, businesses must ensure that their file transfer architecture maps to a well thought out and well managed business process. Evolution from FTP to Secure File Transfer 5

Require secure communications Limit all file transfers of sensitive data to SSL or SSH protocol. Do not allow confidential or critical information to be transported by the insecure FTP protocol. Best practices include requiring the use of strong authentication (mutual authentication preferred), granular access control, secure audit logging of all activity, and that file transfer clients connect over the strongest encryption strengths, such as 256-AES encryption over SSH and TLS 1.0 connections, all of which are included in the WS_FTP solution. Select and standardize on your secure file transfer solution An end-to-end solution must incorporate all end users who transfer files with company servers. Both the servers and all connecting clients must support the required security features remember, your solution is only as strong as the weakest point. Provide a license of your chosen file transfer client to all employees, vendors, contractors and customers who exchange information with your file transfer server. This best practice will ensure that everyone who accesses your file transfer server is equipped with the same level of security, and enable you to leverage economies of scale benefits for user licensing, training and support. With a clear understanding of how data moves both within your organization and among your business partners, you can begin to craft a compliance strategy that will govern and safeguard this information and provide protection for you and your customers. Ipswitch File Transfer provides solutions that move, govern and secure business information between employees, business partners and customers. The company s proven solutions lead the industry in terms of ease of use, allowing companies of all sizes to take control of their sensitive and vital information and improve the speed of information flow. Ipswitch lets business and IT managers govern data transfers and file sharing with confidence and enable compliance by balancing the need for end user simplicity with the visibility and control required by IT. Ipswitch File Transfer solutions are trusted by thousands of organizations worldwide, including more than 90% of the Fortune 1000, government agencies, and millions of prosumers. For more information on Ipswitch File Transfer and its products, go to www.ipswitchft.com. Evolution from FTP to Secure File Transfer 6 Copyright 2013, Ipswitch, Inc. All rights reserved. MOVEit is a registered trademark of Ipswitch, Inc. Other products or company names are or may be trademarks or registered trademarks and are the propery of their respective holders. WP_Evolution_201309_v20