White Paper. Securing and Integrating File Transfers Over the Internet



Similar documents
Automating the File Transfer Business Process

Cornerstones of Security

How Managed File Transfer Addresses HIPAA Requirements for ephi

E-Commerce Security. The Client-Side Vulnerabilities. Securing the Data Transaction LECTURE 7 (SECURITY)

FAQs for Oracle iplanet Proxy Server 4.0

MANAGED FILE TRANSFER: 10 STEPS TO HIPAA/HITECH COMPLIANCE

CTS2134 Introduction to Networking. Module Network Security

DMZ Gateways: Secret Weapons for Data Security

Introduction to the EIS Guide

Proxies. Chapter 4. Network & Security Gildas Avoine

Secure Frequently Asked Questions

Network Configuration Settings

How To Use Egnyte

MANAGED FILE TRANSFER: 10 STEPS TO SOX COMPLIANCE

Experian Secure Transport Service

The Panoptix Building Efficiency Solution: Ensuring a Secure Delivery of Building Efficiency

The following multiple-choice post-course assessment will evaluate your knowledge of the skills and concepts taught in Internet Business Associate.

NEFSIS DEDICATED SERVER

SAP WEB DISPATCHER Helps you to make decisions on Web Dispatcher implementation

Secure Data Transfer

MassTransit vs. FTP Comparison

Secure Transfers. Contents. SSL-Based Services: HTTPS and FTPS 2. Generating A Certificate 2. Creating A Self-Signed Certificate 3

Enterprise Security Critical Standards Summary

Table of Contents. Chapter 1: Installing Endpoint Application Control. Chapter 2: Getting Support. Index

WHITE PAPER. Managed File Transfer: When Data Loss Prevention Is Not Enough Moving Beyond Stopping Leaks and Protecting

MANAGED FILE TRANSFER: 10 STEPS TO PCI DSS COMPLIANCE

Digital certificates and SSL

Chapter 2 TOPOLOGY SELECTION. SYS-ED/ Computer Education Techniques, Inc.

Setting Up Scan to SMB on TaskALFA series MFP s.

Network-Enabled Devices, AOS v.5.x.x. Content and Purpose of This Guide...1 User Management...2 Types of user accounts2

Version 1.0 January Xerox Phaser 3635MFP Extensible Interface Platform

Security IIS Service Lesson 6

WhatsUpGold. v14.2. Getting Started with WhatsUp Gold MSP Edition

DSI File Server Client Documentation

S E C U R I T Y A S S E S S M E N T : B o m g a r B o x T M. Bomgar. Product Penetration Test. September 2010

Installation and configuration guide

Comparison of FTP and Signiant

PRESENTS... Reasons to Switch from SourceSafe: How to Make Your Life Easier with SourceAnywhere Standalone

IBM Unica emessage Version 8 Release 6 February 13, Startup and Administrator's Guide

WS_FTP: The smarter way to transfer files

Introduction to Computer Security Benoit Donnet Academic Year

athenahealth Interface Connectivity SSH Implementation Guide

Security. TestOut Modules

ShadowLink 2. Overview. May 4, ONLINE SUPPORT emdat.com/ticket/ PHONE SUPPORT (608) ext. 1

NETWRIX EVENT LOG MANAGER

UPSTREAMCONNECT SECURITY

Deployment Guide Microsoft IIS 7.0

fåíéêåéí=péêîéê=^çãáåáëíê~íçêûë=dìáçé

Getting a Secure Intranet

Secure Web Appliance. Reverse Proxy

How To Understand And Understand The Security Of A Key Infrastructure

PierianDx - Clinical Genomicist Workstation Software as a Service FAQ s

Unisys Internet Remote Support

Figure 41-1 IP Filter Rules


Web Security School Entrance Exam

Secure Traffic Inspection

HP Device Manager 4.6

QLIKVIEW MOBILE SECURITY

A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.

Configuration Guide. BES12 Cloud

ICE Futures Europe. AFTS Technical Guide for Large Position Reporting V1.0

Xerox DocuShare Security Features. Security White Paper

Administering the Web Server (IIS) Role of Windows Server

PrintFleet Enterprise 2.2 Security Overview

MOVEIT: SECURE, GUARANTEED FILE DELIVERY BY JONATHAN LAMPE, GCIA, GSNA

Firewall Introduction Several Types of Firewall. Cisco PIX Firewall

APWG. (n.d.). Unifying the global response to cybecrime. Retrieved from

GlobalSCAPE DMZ Gateway, v1. User Guide

Administering the Web Server (IIS) Role of Windows Server 10972B; 5 Days

The Evolving Threat Landscape and New Best Practices for SSL

Secure Web Appliance. SSL Intercept

December P Xerox App Studio 3.0 Information Assurance Disclosure

SchoolBooking LDAP Integration Guide

Security FAQs (Frequently Asked Questions) for Xerox Remote Print Services

Pre-Installation Instructions

End-to-end Processing with TIBCO Managed File Transfer (MFT) Improving Performance and Security during Internet File Transfer

Introduction to Mobile Access Gateway Installation

ShareFile Security Overview

Product Summary RADIUS Servers

GS1 Trade Sync Connectivity guide

Securing an IP SAN. Application Brief

Overview of Banking Application Security and PCI DSS Compliance for Banking Applications

Proxy Services: Good Practice Guidelines

Remote Access Platform. Architecture and Security Overview

MAC Web Based VPN Connectivity Details and Instructions

RAS Associates, Inc. Systems Development Proposal. Scott Klarman. March 15, 2009

OutDisk 4.0 FTP FTP for Users using Microsoft Windows and/or Microsoft Outlook. 5/1/ Encryptomatic LLC

You re FREE Guide SSL. (Secure Sockets Layer) webvisions

DMH remote access. Table of Contents. Project : remote_access_dmh Date: 29/05/12 pg. 1

SSL VPN Technology White Paper

Configuration Guide. BlackBerry Enterprise Service 12. Version 12.0

How do I load balance FTP on NetScaler?

Transcription:

White Paper Securing and Integrating File Transfers Over the Internet While the integrity of data during transfer has always been a concern the desire to use the Internet has highlighted the need to secure the data transmission as well. Securing the transmission of files over the Internet is a top priority for organizations. The impetus may be government legislation such as HIPAA for healthcare information security or Sarbanes-Oxley for financial information security. For some organizations new business opportunities will require it. For others it will be the need to migrate older dial connections to the Internet. Whatever the reason there are many ways to accomplish this objective and each has specific implications for the parties involved. The DMZ Before considering how files can be transferred over the Internet a DMZ needs to be configured. A DMZ is basically a secure entry point for all Internet traffic that has been isolated from the organization s critical internal network. The DMZ is isolated by an external and internal firewall. Firewalls are basically hardware boxes or routers configured to filter specific types of communications and restrict what can pass through to the internal trusted network. An external firewall is the main entry point for the traffic from the Internet. The Internet servers that communicate with the outside world reside behind the external firewall. An internal firewall resides between the Internet servers and the trusted internal network isolating the trusted environment from the Internet. The trusted network is where the mainframe and other application processing servers reside. Internet Communication Options The basic communications layer that is used over the Internet is IP (Internet Protocol). There are two principle methods of using IP. Transmission can be over HTTP (HyperText Transmission Protocol) or FTP (File Transmission Protocol). Most are familiar with HTTP since it is the protocol in use when surfing the web with a browser such as Internet Explorer. HTTP offers a very familiar way to send and receive files. When an HTTP server is configured and used with an X509 Certificate of Authentication all exchanges employ Secure Sockets Layer (SSL) security and the protocol is known as HTTPs. A Certificate of Authentication is a digital certificate stored on the server that vouches for the identity of the organization. A third-party certificate authority usually issues the certificate. Once in place SSL can be used for Internet transfers. SSL ensures that the user name and password as well as the data are encrypted during the transmission session.

However HTTPs has not typically been employed for large volume transfers or in situations where the human intervention required by a browser is prohibitive. In those situations FTP is preferred. Organizations have been using FTP for many years to transfer large files or large volumes of files between dissimilar platforms. These types of transfers have been over dedicated networks or dial connections. So while there is familiarity with the use of FTP using FTP over the Internet poses security concerns. With FTP the username and password are transmitted in the clear allowing hackers a means of gaining access to an organizations network servers. Even if those severs are secured within a DMZ the potential for damage is still there. While Microsoft Internet Servers and most browsers support SSL with HTTPs standard FTP servers do not. However many independent vendors offer SSL enabled FTP clientserver solutions with a varying degree of capability and features. SSL Limitations and Issues SSL encrypts the username, password and data during the transmission so that none of this critical information is transmitted in the clear. However prior to transmission the data is stored in the clear and after receiving the data is stored in the clear unless additional encryption software is applied. Optional encryption products such as PGP can be used to encrypt the data before it is stored on the server. Once the data is downloaded to the client location the same encryption software is used to decrypt it. For uploads the process is reversed. Some third-party vendor solutions offer SSL enabled FTP servers that store files encrypted until requested by the client. The files are then automatically decrypted from the stored area and instantaneously re-encrypted into the SSL envelope. This approach ensures that sensitive data does not sit in the clear on the FTP server while waiting for a client to download it. If the client wants the downloaded data to be stored encrypted on the receiving computer they can select whatever encryption software they prefer and encrypt the files a soon as they are received. Supporting SSL over HTTPs is fairly easy since most customers will be very familiar with using web browsers such as Internet Explorer. Also there will be no need to distribute any software to the client for the secure connection to work. As long as an X509 Certificate of Authentication is provided at the server along with the appropriate password keys the exchanges between the Internet Web Server and the clients will be secured.

With FTP it is not as straightforward. To use SSL enabled FTP a third-party vendor will need to be selected. Operating system vendors do not provide this type of capability either as a standard component or as an option. A third-party vendor solution will include an SSL FTP server and a companion SSL FTP client. Typically this requires purchasing a license for the server and a license for each client to be distributed. Distributing clients is sometimes considered a disadvantage because the distributing party must take responsibility for its successful installation and use. Unfortunately this is the only way to deploy an SSL FTP solution with the full capability the vendor has designed into the product. The FTP Client-Server Role Reversal FTP is a client-server implementation. Files are stored at the FTP server to be downloaded by a remote FTP client. Remote FTP clients upload files to the FTP server for eventual processing by a specific application. When deploying SSL FTP an organization installs and configures an SSL FTP server and distributes the companion SSL FTP client. In this scenario all SSL FTP client software sites will send files to and retrieve files from the SSL FTP server. If there is also a requirement for the organization to send files to and retrieve files from a customer using SSL FTP then the roles are reversed and the organization becomes the SSL FTP client and the customer is the SSL FTP server in those exchanges. To accomplish this role-reversal the organization could distribute to the customer a licensed copy of the SSL Server it uses allowing them to play the server role, or the customer could purchase their own SSL Server license. Alternatively, and more likely, is that the customer will already have purchased a third-party SSL FTP client-server product on its own and will want to distribute its companion SSL FTP client to the organization. When the organization exchanges files with this specific customer they will need to use the SSL FTP client software provided to them by that customer. Unless the organization is an industry hub they will not be able to mandate these exchanges. More likely the organization will find itself in the position of supporting and using multiple SSL FTP clients to communicate with various customers SSL FTP Servers as well as supporting their own SSL FTP client-server solution. Supporting multiple client software products can be difficult to manage. A complete solution for securing file transfers should allow an organization to easily implement and automate a variety of SSL FTP client packages into the file transfer workflow.

Event-Driven Client Software Using a browser with HTTPs or a point-and-click companion client with SSL FTP may be acceptable in most situations where operator-driven processes are typical. High volume or time critical environments will demand an event-driven process and eventdriven client software. Event-driven software can be executed based upon a schedule or at the command of another application rather than by an operator. It allows files to be uploaded immediately after creation or uploaded based upon a schedule. Alternatively it allows files to be downloaded on a scheduled basis or downloaded as soon as possible after creation. To meet the needs of high volume or time critical customers it is important to determine if a solution offers optional event-driven client packages for both HTTPs and SSL FTP. It is also important to consider the effort required to implement the automation of these event-driven client packages The File Exchange Life Cycle We have spent some time describing the connection options between the server and the clients and which IP protocol is most appropriate. However that is only part of the story. The HTTPs or SSL FTP servers will most likely be installed in a DMZ isolated from the trusted internal network. On the trusted network will reside the hosts, servers and applications where files to be downloaded are created and the files that are uploaded are processed. A bridge is needed to allow files to move back and forth between the applications and the Internet servers in the DMZ. Without that bridge the effort in securing file transfers over the Internet is incomplete. Ideally this bridge should manage the traffic at the file level monitoring the status of each file s exchange life cycle as it moves from the application to the DMZ Internet server and ultimately to the remote client. It should also manage and monitor the reverse flow from receipt at the DMZ Internet server back through the internal firewall to the application. What good is a secure transmission system if you cannot verify that the file was delivered or received, or monitor its status along the way? This backend application bridge or integration capability is not typically included with HTTPs or SSL FTP products. While in some cases development kits or scripting languages may be provided it requires the organization to design and develop their own bridge. It is important when evaluating these products to estimate the total cost of implementation and on-going support costs to maintain custom software.

Ideally a full-featured solution should provide the means to automate, manage and monitor the file exchange life cycle without requiring custom programming. Solutions that offer this capability will allow faster implementation, a lower cost of operation and a quicker return on investment. Considering the Alternatives We have examined several alternatives to consider when planning for secure file transfer over the Internet. Answering the following questions will help an organization decide the direction to proceed. Does the customer base require both HTTPs and SSL FTP? In most cases the answer will be yes. Some customers will be comfortable with using a browser while others will have experience with FTP and be more likely to prefer that approach. Is SSL required? There is always the option of just encrypting the data. This however leaves the username and password in the clear. Of course this is a risk assessment that every organization needs to make. To properly secure the exchange SSL should be a requirement. Is an event-driven client needed? For HTTPs the majority of customers will be satisfied with an operator-driven client. For SSL FTP, where higher volumes and more time critical data may be present, an eventdriven client will be preferred. Be prepared to offer both an operator and event-driven client for both HTTPs and SSL FTP. Will it be necessary to support multiple vendor SSL Clients? Certainly this is a possibility and more so if the use of a specific client cannot be mandated. It would also be important to be sure that any client software received from a customer is event-driven so it can be automated. Managing several operator-driven clients could be a nightmare. Is automating the file exchange life cycle required? The HTTPs and SSL FTP servers are only repositories for files that are waiting to be downloaded and for those that have been uploaded. These servers are basically secure islands in the middle of the DMZ isolated from the internal network. Essentially automating the file exchange life cycle requires a fairly sophisticated workflow management engine that can oversee the big picture and accomplish its tasks efficiently and with a minimum of operator intervention.

Here are six questions that will help an organization determine their needs for managing the file exchange life cycle process. Is it important to automate the movement of files from their point of creation on the application servers to their download folders on the Internet servers? Is it important to automate the movement of files from their receipt on the Internet servers to their delivery to the application servers where they will be processed? Is it important to have automated notifications of delivery? Is it important to have automated problem notification if the file exchange fails at any point? Is it important to monitor the status of file exchanges from creation to delivery? Is it important to automate the archiving and ageing of the folders on the Internet servers? If any of these items are important then there is a need to automate the management of the file exchange life cycle.. Conclusion For most organizations moving external file exchanges to the Internet is unchartered territory. This is a project that goes beyond any specific technology selection and requires a business integration strategy for success. Buying new technology is one thing but implementing and integrating it is another. Selecting a vendor that not only provides product but also the experience, training, consulting and support is critical. A variety of products exist to meet the requirements of organizations whose goal is securing and integrating file transfers over the Internet. The initial challenge is to determine the needs of the organization and its customer base, set realistic objectives and plan a phased approach. Once that has been accomplished selecting the right vendor will be an easier task and the overall project will have a greater chance for success. 41 Twosome Drive, Suite 9- Moorestown, NJ 08057 856-727-0777 www.momsys.com