Data Breaches Gone Mad. Straight Away! Wednesday September 28 th, 2011



Similar documents
Securing Data Today. Ulf Mattsson CTO Protegrity ulf.mattsson [at] protegrity.com

Protegrity Tokenization

Myths and Realities of Data Security and Compliance: Ulf Mattsson, CTO, Protegrity

Protegrity Data Security Platform

Teradata and Protegrity High-Value Protection for High-Value Data

Data-Centric security and HP NonStop-centric ecosystems. Andrew Price, XYPRO Technology Corporation Mark Bower, Voltage Security

Database Security Solutions in Cloud and Outsourced Environments

Key Steps to Meeting PCI DSS 2.0 Requirements Using Sensitive Data Discovery and Masking

Payment Card Industry Data Security Standard Training. Chris Harper Vice President of Technical Services Secure Enterprise Computing, Inc.

2012 Data Breach Investigations Report

Passing PCI Compliance How to Address the Application Security Mandates

Where Data Security and Value of Data Meet in the Cloud

RSA SecurID Two-factor Authentication

Josiah Wilkinson Internal Security Assessor. Nationwide

Accelerating PCI Compliance

The SMB Cyber Security Survival Guide

I ve been breached! Now what?

Device Hardening, Vulnerability Remediation and Mitigation for Security Compliance

The Relationship Between PCI, Encryption and Tokenization: What you need to know

The 12 Essentials of PCI Compliance How it Differs from HIPPA Compliance Understand & Implement Effective PCI Data Security Standard Compliance

Data-Centric Security vs. Database-Level Security

Information Supplement: Requirement 6.6 Code Reviews and Application Firewalls Clarified

How To Protect A Web Application From Attack From A Trusted Environment

How To Secure Your Store Data With Fortinet

Projectplace: A Secure Project Collaboration Solution

Payment Card Industry Data Security Standard

Adobe Systems Software Ireland Ltd

How To Reduce Pci Dss Scope

Data Security as a Business Enabler Not a Ball & Chain. Big Data Everywhere May 12, 2015

Implementation Guide

End-to-end Encryption for E-Commerce Payments using Voltage SecureData Web

Becoming PCI Compliant

Cyber - Security and Investigations. Ingrid Beierly August 18, 2008

Why Add Data Masking to Your IBM DB2 Application Environment

Practical Advice for Cloud Data Protection

Frequently Asked Questions

PCI DSS 3.0 : THE CHANGES AND HOW THEY WILL EFFECT YOUR BUSINESS

Voltage Secure Commerce

defending against advanced persistent threats: strategies for a new era of attacks agility made possible

WHITE PAPER FORTIWEB WEB APPLICATION FIREWALL. Ensuring Compliance for PCI DSS 6.5 and 6.6

SafeNet DataSecure vs. Native Oracle Encryption

Top Five Data Security Trends Impacting Franchise Operators. Payment System Risk September 29, 2009

Analyzing Security for Retailers An analysis of what retailers can do to improve their network security

PCI Compliance. Top 10 Questions & Answers

Client Security Risk Assessment Questionnaire

Data Privacy: The High Cost of Unprotected Sensitive Data 6 Step Data Privacy Protection Plan

PCI Compliance Top 10 Questions and Answers

Thoughts on PCI DSS 3.0. September, 2014

Achieving PCI Compliance Using F5 Products

SECURE YOUR DATA EXCHANGE WITH SAFE-T BOX

Overcoming PCI Compliance Challenges

RSA Solution Brief RSA. Encryption and Key Management Suite. RSA Solution Brief

PCI Requirements Coverage Summary Table

MITIGATING LARGE MERCHANT DATA BREACHES

For more information on SQL injection, please refer to the Visa Data Security Alert, SQL Injection Attacks, available at

SANS Top 20 Critical Controls for Effective Cyber Defense

PCI DSS FAQ. The twelve requirements of the PCI DSS are defined as follows:

PCI Solution for Retail: Addressing Compliance and Security Best Practices

PCI DSS Overview and Solutions. Anwar McEntee

September 20, 2013 Senior IT Examiner Gene Lilienthal

Payment Transactions Security & Enforcement

Encryption and Tokenization: Protecting Customer Data. Your Payments Universally Amplified. Tia D. Ilori Sue Zloth September 18, 2013

Complying with PCI Data Security

Where every interaction matters.

MySQL Security: Best Practices

CyberSource Payment Security. with PCI DSS Tokenization Guidelines

Payment Card Industry Security Standards PCI DSS, PCI-PTS and PA-DSS

Breach Findings for Large Merchants. 28 January 2015 Glen Jones Cyber Intelligence and Investigation Lester Chan Payment System Security

Voltage SecureData Web with Page-Integrated Encryption (PIE) Technology Security Review

How To Secure An Rsa Authentication Agent

Rational AppScan & Ounce Products

Security. Tiffany Trent-Abram VP, Global Product Management. November 6 th, One Connection - A World of Opportunities

Virginia Government Finance Officers Association Spring Conference May 28, Cloud Security 101

Las Vegas Datacenter Overview. Product Overview and Data Sheet. Created on 6/18/2014 3:49:00 PM

PCI DSS Policies Outline. PCI DSS Policies. All Rights Reserved. ecfirst Page 1 of 7

Protecting Cardholder Data Throughout Your Enterprise While Reducing the Costs of PCI Compliance

WEB APPLICATION FIREWALLS: DO WE NEED THEM?

Retour d'expérience PCI DSS

Providing Secure Representative Data Sets

PCI Data Security Standards

Data Security for the Hospitality

Network Test Labs (NTL) Software Testing Services for igaming

Global Partner Management Notice

Achieving PCI DSS 2.0 Compliance with Voltage Security

WHITE PAPER. FortiWeb Web Application Firewall Ensuring Compliance for PCI DSS 6.5 and 6.6

End-user Security Analytics Strengthens Protection with ArcSight

Transcription:

Data Breaches Gone Mad Learn how to Secure your Data Warehouse Straight Away! Wednesday September 28 th, 2011

Martin Willcox Director Product & Solutions Marketing Teradata Europe, Middle East & Africa

Ulf Mattsson CTO Protegrity The Tokenization Experts

Some of you have already met Yuri. 4 4 Source: http://www.youtube.com/user/protegrityusa protegrity

Last year he and his anonymous friends hacked AT&T. 5 5 Source: http://www.youtube.com/user/protegrityusa protegrity

Security vulnerability in a Website used by ipad customers 100,000 e-mail addresses and ipad identification numbers were exposed, including: New York Mayor FBI and NASA US Departments of Defense Executives from Google, Microsoft, Amazon and Goldman Sachs 6 Source 2010: http://news.cnet.com/8301-27080_3-20007417-245.html#ixzz1y9iw9a7o protegrity

This year they hacked Sony and bought BMW M5s. 7 Source: http://www.youtube.com/user/protegrityusa protegrity

Data including passwords and personal details were stored in clear text Attacks were not coordinated and not advanced 8 Majority of attacks were SQL Injection dumps and Distributed Denial of Service (DDoS) protegrity

Next month Yuri plans to hit a major telco with the keys provided by a disgruntled employee. 9 Source: http://www.youtube.com/user/protegrityusa protegrity

Then Yuri is going to buy a private jet. 10 Source: http://www.youtube.com/user/protegrityusa protegrity

Hospitality Retail Financial Services Government Tech Services Manufacturing Transportation Media Healthcare Business Services *: Number of breaches 0 10 20 30 40 50 % 11 Source: 2011 Data Breach Investigations Report, Verizon Business RISK team and USSS protegrity

12 Source: Trustwave Global Security Report 2011 protegrity

So how does Yuri do it? 13 Source: http://www.youtube.com/user/protegrityusa protegrity

Hacking Malware Physical Error Misuse Social *: Number of records 0 20 40 60 80 100 % 14 Source: 2011 Data Breach Investigations Report, Verizon Business RISK team and USSS protegrity

Usually, I just need one disgruntled employee. Just one. 15 Source: http://www.youtube.com/user/protegrityusa protegrity

Attackers stole information about SecurID two-factor authentication 60 different types of customized malware Advanced Persistent Threat (APT) malware tied to a network in Shanghai A tool written by a Chinese hacker 10 years ago protegrity 16

Third party fraud detection Notified by law enforcement Reported by customer/partner Unusual system behavior Reported by employee Internal security audit or scan Internal fraud detection Brag or blackmail by perpetrator Third party monitoring service *: Number of breaches 0 10 20 30 40 50 % 17 Source: 2011 Data Breach Investigations Report, Verizon Business RISK team and USSS protegrity

Some issues have stayed constant: Threat landscape continues to gain sophistication Attackers will always be a step ahead of the defenders Different motivation, methods and tools today: We are fighting highly organized, well-funded crime syndicates and nations Move from detective to preventative controls needed Source: Forrester and http://www.csoonline.com/article/602313/the-changing-threat-landscape?page=2 protegrity 18

19 Payment card data Personal information Usernames, passwords Intellectual property Bank account data Medical records Classified information System information Sensitive organizational data *: Number of records Source: 2011 Data Breach Investigations Report, Verizon Business RISK team and USSS 0 20 40 60 80 100 120 % protegrity

20 Firewalls Encryption/Tokenization for data at Anti-virus & anti-malware solution Encryption for data in motion Access governance systems Identity & access management systems Correlation or event management Web application firewalls (WAF) Endpoint encryption solution Data loss prevention systems (DLP) Intrusion detection or prevention Database scanning and monitoring ID & credentialing system IDS DAM DLP WAF Client encryption 0 10 20 30 40 50 60 70 80 90 % *: Cost effective solutions for PCI DSS. Source: PCI DSS Compliance Survey, Ponemon Institute 20 protegrity

21 protegrity

Jim Browning Senior Security Engineer Teradata Labs

Teradata Protegrity Partnership Strategic partnership since 2004 Advocated solution for data protection on Teradata Databases Design and development of Protegrity data security platform for Teradata Proven parallel and scalable data protection for Teradata MPP platforms Collaboration on forward-looking roadmaps New and advanced data protection options Integration with new Teradata Database features Seamless operation on large data warehouse systems World-class customers 23

Teradata Protegrity Customers by Industry Transportation Manufacturing Utilities Telecommunications Retail Government Healthcare Financial 24

Types of Data Requiring Protection Credit Card Information Credit Card Numbers (PAN) Service Codes Expiration Dates Personal Identifying Information Social Security Numbers Tax Identifiers Drivers License Numbers Date of Birth Consumer Financial Data Account Numbers PINs Protected Health Information Identifiable Patient Data Medical Record Numbers Corporate Financial Data Non-public Information Human Resources Data Payroll Information Performance Ratings Customer and Prospect Data Trade Secrets and Intellectual Property 25

Protegrity Data Protection for Teradata A comprehensive data protection solution for Teradata Databases Provides additional separation of duties through a separate Security Manager interface for creation and maintenance of security policies Includes a patented key management system for secure key generation and protection of keys when stored Supports multiple data protection options including strong encryption and tokenization Supports multiple cryptographic algorithms and key strengths Automates the process of converting clear text data to cipher text 26

Protegrity Data Protection for Teradata A comprehensive data protection solution for Teradata Databases Provides additional access controls to protect sensitive information (even DBC can not see unencrypted data unless specifically authorized by the Security Manager) Includes additional auditing separate from database audit logs (such as the Access Log) Designed to fully exploit Teradata Database parallelism and scalability Enterprise-wide solution that works with most major databases and operating systems (not just Teradata) 27

Protegrity Data Protection for Teradata Architecture Enterprise Security Administrator (ESA) Policy Management Audit Logs Policy Clique Node Log Proxy Server Deployment Server PEP Server Data Protection Operations AMP AMP AMP AMP Policy Enforcement Agent (UDF / UDT) Protected Data Key Management Node Audit Management PEP Server Data Protection Operations AMP AMP AMP AMP 28

Data Protection Methods Strong Encryption AES(128,256) / 3DES DTP2 Data Type Preserving Encryption 2 Hashing HMAC SHA-1 DAM Data Activity Monitoring Masking Tokenization Strong Encryption Symmetric encryption Encrypted value can be used in database for joins, etc. Data Type Preserving Encryption 2 Preserves the data type and length of a protected column Hashing One way can not be decrypted Hashed value can be used in database for joins Data Activity Monitoring (DAM) Monitors access to sensitive columns without encrypting or hashing Can be used as a compensating control Masking Replaces sensitive characters in a string of data to render the data secure Customizable mask patterns Tokenization Provides inert values that can replace sensitive data in databases Can be used as a compensating control 29

Data Protection Considerations Performance Storage Security Transparency 30

Data Protection Methods Data Protection Methods Performance Storage Security Transparency System without data protection Monitoring + Blocking + Masking Format Controlling Encryption Strong Encryption Tokenization Hashing Best Worst 31

Replace Sensitive Data With Fake Data = Random number Data Token 32

Replace Sensitive Data with Fake Data Tokenization De-tokenization Applications & Databases : Data Token Unprotected sensitive information: Protected sensitive information: 33

What is Tokenization and What is the Benefit? Tokenization Tokenization is process that replaces sensitive data in systems with inert data called tokens which have no value to the thief Tokens resemble the original data in data type and length Benefit Result Greatly improved transparency to systems and processes that need to be protected Reduced remediation Reduced need for key management Reduce the points of attacks Reduce the PCI DSS audit costs for retail scenarios 34

Complexity when Using Basic Tokenization Clique Node AMP Large footprint becomes larger Replication becomes more complex Solution may be unmanageable and expensive Token Server Protegrity Agent AMP AMP AMP Node AMP Protegrity Agent AMP AMP AMP Credit Card Number Social Security Number Passport Number 35

Protegrity Tokenization for Teradata Architecture Clique Node Small footprint Small static token tables Protegrity Agent Tokenization Operations AMP AMP AMP AMP High availability High scalability High performance No replication required No chance of collisions Node Protegrity Agent Tokenization Operations AMP AMP AMP AMP 36

Performance Comparison Basic Tokenization 5 tokens per second (outsourced) 5000 tokens per second (in-house) Protegrity Tokenization 200,000 tokens per second (Protegrity) Single commodity server with 10 connections. Will grow linearly with additional servers and/or connections 9,000,000+ tokenizations per second (Protegrity /Teradata) 37

Protegrity Tokenization Differentiators Basic Tokenization Footprint Large, Expanding Small, Static Protegrity Tokenization High Availability, Disaster Recovery Distribution Complex, expensive replication required Practically impossible to distribute geographically No replication required Easy to deploy at different geographically distributed locations Reliability Prone to collisions No collisions Performance, Latency, and Scalability Will adversely impact performance & scalability Little or no latency. Fastest industry tokenization Extendibility Practically impossible Unlimited Tokenization Capability 38

Why Tokenization? No masking needed No encryption/decryption when using No key management across enterprise Why Protegrity Tokenization? Better small footprint Faster high performance Lower total cost of ownership 39

Flexibility for Different Forms of Data Type of Data Input Token Comment Token Properties Credit Card 3872 3789 1620 3675 8278 2789 2990 2789 Numeric Medical ID 29M2009ID 497HF390D Alpha-Numeric Date 10/30/1955 12/25/2034 Date E-mail Address ulf.mattsson@protegrity.com empo.snaugs@svtiensnni.snk Alpha Numeric, delimiters in input preserved SSN Delimiters 075-67-2278 287-38-2567 Numeric, delimiters in input Credit Card 3872 3789 1620 3675 8278 2789 2990 3675 Numeric, Last 4 digits exposed 40

Tokenization Case Studies Customer 1: Extensive enterprise End-to-End credit card data protection switching to Protegrity Tokenization Performance Challenge: Initial tokenization Vendor Lock-In: What if we want to switch payment processor? Performance Challenge: Operational tokenization (SLAs) Customer 2: Desired single vendor to provide data protection including tokenization Combined use of tokenization and encryption Looking to expand tokens beyond CCN to PII Customer 3: Reduce compliance cost. 50 million Credit Cards, 700 million daily transactions Performance Challenge: Initial tokenization End-to-End Tokens: Started with the EDW and expanding to stores 41

Case Study Large Chain Store By segmenting cardholder data with tokenization, a regional chain of 1,500 local convenience stores is reducing its PCI audit from seven to three months We planned on 30 days to tokenize our 30 million card numbers. With Protegrity Tokenization the whole process took about 90 minutes Qualified Security Assessors had no issues with the effective segmentation provided by Tokenization With encryption, implementations can spawn dozens of questions There were no such challenges with tokenization 42

Case Study Large Chain Store Faster PCI audit Half that time Lower maintenance cost Do not have to apply all 12 requirements of PCI DSS to every system Better security Ability to eliminate several business processes such as generating daily reports for data requests and access Strong performance Rapid processing rate for initial tokenization Sub-second transaction SLA 43

Protegrity in the ETL Process Sources Transformation Targets SQL Server DB2 AS/400 Mainframe ETL Platform Informatica Data Stage Cleansing Integration Transformation Teradata Load Processes Teradata EDW Protegrity Policy Role Based Access Control Original Value No Access Token Mask Hash Test Data Oracle 44

Protegrity Data Security Platform in Action Secure Collection POS e-commerce Branch Secure Distribution Policy Audit Log Tokenization Database Protector Security Administrator Application Protector File System Protector 45

Why Protegrity? Protegrity s Tokenization allows compliance across: PCI PII PHI Innovative: Pushing data protection with industry leading innovation such as out patented database protection system and the Protegrity Tokenization Proven: Proven platform currently protects the worlds largest companies Experienced: Experienced staff will be there with support along the way to complete data protection 46

Q&A Contacts: Protegrity: Teradata: elaine.evans@protegrity.com simona.firmo@teradata.com

Thank you! Data Breaches Gone Mad Learn how to Secure your Data Warehouse Straight Away!