FERPA: Data & Transport Security Best Practices



Similar documents
How to start a software security initiative within your organization: a maturity based and metrics driven approach OWASP

Passing PCI Compliance How to Address the Application Security Mandates

How-To Guide: Cyber Security. Content Provided by

The Protection Mission a constant endeavor

Information Security Incident Management Guidelines

Presentation for : The New England Board of Higher Education. Hot Topics in IT Security and Data Privacy

Cybersecurity Policies and Best Practices: Protecting small firms, large firms, and professional services from malware and other cyber-threats

Goals. Understanding security testing

Enterprise Computing Solutions

Cyber Security Presentation Cyber Security Month Curtis McNay, Director of IT Security

Reducing Application Vulnerabilities by Security Engineering

What IT Auditors Need to Know About Secure Shell. SSH Communications Security

BANKING SECURITY and COMPLIANCE

What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things.

The Top Web Application Attacks: Are you vulnerable?

Nuclear Security Requires Cyber Security

DEFENSE THROUGHOUT THE VULNERABILITY LIFE CYCLE WITH ALERT LOGIC THREAT AND LOG MANAGER

Contemporary Web Application Attacks. Ivan Pang Senior Consultant Edvance Limited

Perspectives on Cybersecurity in Healthcare June 2015

Security Management. Keeping the IT Security Administrator Busy

I ve been breached! Now what?

ITAR Compliance Best Practices Guide

Appalachian Regional Commission Evaluation Report. Table of Contents. Results of Evaluation Areas for Improvement... 2

AB 1149 Compliance: Data Security Best Practices

Analyzing Security for Retailers An analysis of what retailers can do to improve their network security

Security and Privacy

Rational AppScan & Ounce Products

Where every interaction matters.

Presented by Evan Sylvester, CISSP

ALERT LOGIC FOR HIPAA COMPLIANCE

WHITE PAPER. FortiWeb and the OWASP Top 10 Mitigating the most dangerous application security threats

External Supplier Control Requirements

Securing Your Web Application against security vulnerabilities. Ong Khai Wei, IT Specialist, Development Tools (Rational) IBM Software Group

SecurityMetrics Vision whitepaper

Information Security Services

Cybersecurity: What CFO s Need to Know

Malicious cyber activity is on the increase at risk. This may involve the loss of critical data and consumer confidence, as well as profits

WEB APPLICATION FIREWALLS: DO WE NEED THEM?

10 Potential Risk Facing Your IT Department: Multi-layered Security & Network Protection. September 2011

SECURITY CONSIDERATIONS FOR LAW FIRMS

How To Secure A Voice Over Internet Protocol (Voip) From A Cyber Attack

National Cyber Security Month 2015: Daily Security Awareness Tips

Penetration Testing //Vulnerability Assessment //Remedy

IT Security Risks & Trends

Fighting Off an Advanced Persistent Threat & Defending Infrastructure and Data. Dave Shackleford February, 2012

Guide to Vulnerability Management for Small Companies

Board Portal Security: How to keep one step ahead in an ever-evolving game

Cyber Security. An Executive Imperative for Business Owners. 77 Westport Plaza, St. Louis, MO p f

Building The Human Firewall. Andy Sawyer, CISM, C CISO Director of Security Locke Lord

10 Smart Ideas for. Keeping Data Safe. From Hackers

Teradata and Protegrity High-Value Protection for High-Value Data

Student Data Breaches: Is Your District Prepared?

資 通 安 全 產 品 研 發 與 驗 證 (I) ICT Security Overview. Prof.. Albert B. Jeng ( 鄭 博 仁 教 授 ) 景 文 科 技 大 學 資 訊 工 程 系

Defending Against Data Beaches: Internal Controls for Cybersecurity

WHITE PAPER FORTIWEB WEB APPLICATION FIREWALL. Ensuring Compliance for PCI DSS 6.5 and 6.6

Cybercrime myths, challenges and how to protect our business. Vladimir Kantchev Managing Partner Service Centrix

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

Security Practices for Online Collaboration and Social Media

ETHICAL HACKING APPLICATIO WIRELESS110 00NETWORK APPLICATION MOBILE MOBILE0001

The Business Case for Security Information Management

Infor CloudSuite. Defense-in-depth. Table of Contents. Technical Paper Plain talk about Infor CloudSuite security

Enterprise Cybersecurity: Building an Effective Defense

Cisco on Cisco Best Practice Security Practices for Online Collaboration and Social Media

Practical Steps To Securing Process Control Networks

Everything You Wanted to Know about DISA STIGs but were Afraid to Ask

KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES.

Data Protection: From PKI to Virtualization & Cloud

THE HUMAN COMPONENT OF CYBER SECURITY

How Your Current IT Security System Might Be Leaving You Exposed TAKEAWAYS CHALLENGES WHITE PAPER

WHY DOES MY SPEED MONITORING GRAPH SHOW -1 IN THE TOOLTIP? 2 HOW CAN I CHANGE MY PREFERENCES FOR UPTIME AND SPEED MONITORING 2

Cybersecurity: An Innovative Approach to Advanced Persistent Threats

ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster

Making Database Security an IT Security Priority

Building A Secure Microsoft Exchange Continuity Appliance

Internet threats: steps to security for your small business

The FBI Cyber Program. Bauer Advising Symposium //UNCLASSIFIED

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE

Securing Internet Facing. Applications. Technical White Paper. configuration drift, in which IT members open up ports or make small, supposedly

Worldwide Security and Vulnerability Management Forecast and 2008 Vendor Shares

A practical guide to IT security

This session was presented by Jim Stickley of TraceSecurity on Wednesday, October 23 rd at the Cyber Security Summit.

Transcription:

FERPA: Data & Transport Security Best Practices April 2013 Mike Tassey Privacy Technical Assistance Center

FERPA and Data Security Unlike HIPAA and other similar federal regulations, FERPA does not require specific security controls This provides room for innovation, but also heaps more responsibility on the community to protect the privacy and security of student data As educators we have student data in many places, including our own machines / mobile devices It s up to us to ensure that we take the necessary security measures to protect student data 2

FERPA and Data Security When we talk about data security we are really talking about these three things: Confidentiality Preserving authorized restrictions on access and disclosure, including means for protecting personal privacy and proprietary information [44 U.S.C,. Sec 3542] Integrity Guarding against improper information modification or destruction, and includes information non-repudiation and authenticity [44 U.S.C., Sec. 3542] Availability Ensuring timely access to and use of information [44 U.S.C., Sec 3542] Federal Information Processing Standards publication 199 (FIPS-199) 3

FERPA and Data Security Data security is about risk management For there to be risk there must be vulnerability and someone to exploit it You can never eliminate risk, you can only reduce it To understand the risks, you must understand the threats 4

Let s Talk About Threats Criminal hackers and scammers Organized Crime Internet crime brings in big money, prompting leniency from local authorities in some countries Traditional organized crime has taken an interest Hundreds of billions a year Responsible for most external data breaches Botnets, malware, data breaches 5

Let s Talk About Threats Groups of hackers motivated by ideology or political agenda Hacktivism * Hacktivism (a portmanteau of hack and activism) is the use of computers and computer networks as a means of protest to promote political ends. * http://en.wikipedia.org/wiki/hacktivism Largely decentralized, ad hoc organizational structure Historically focus on industrial, financial and political targets Increasingly targeting educational agencies 6

Let s Talk About Threats Cyber-espionage, cyber-warfare by foreign governments Nation-State Sponsored Spying, stealing intellectual property Intelligence gathering Prepositioning cyber-warfare assets Highly advanced, very sophisticated Virtually unlimited budget Stealth and longevity are priorities 7

Let s Talk About Threats Lost laptops, smartphones, thumb drives The enemy is US! Design insecure or flawed web applications Open attachments from strange people / fall for phishing emails Send information we shouldn t Misconfigure our devices Use untrusted Wi-Fi for sensitive activities 8

What do the bad guys want with my data? Identity information like SSNs, banking info, names and other PII Prove a point, make a statement Account info (usernames & passwords) Recruit your system as a part of a Botnet 9

More dangerous than ever Open source and free tools make it easy Hacker training sites Cyber-theft commoditized Black market trading in identity data Sophistication Of Attacks Do-It-Yourself malware kits Underground economy where tools are built and sold to order Attacker Skill Required Still developing flawed code Structured Query Language Injection (SQLi) discovered in 1998.. Still a major problem 15 years later Poor authentication / session mgmt. 10

Security begins with strategy Starts with leadership buy-in Create a strong information security policy & governance architecture that is reflective of reality Dedicate resources to security, put someone in charge Implement tools, technology and automation Develop meaningful metrics to measure the effectiveness of your program 11

Data security best practices Defense in Depth Use a layered approach to security which forces attackers to traverse multiple layers of security controls like firewalls, Web Application Firewalls (WAFs), Intrusion Detection / Prevention Systems (IDPS), antivirus, access controls, etc. Increases attacker effort Multiplies the opportunity for detection and response Allows you to focus the highest levels of resources where they count the most protecting the really important data! 12

Data Security best practices Patch & Vulnerability Management Employ tools to manage system updates and patches and remediate unpatched systems Especially important for third party applications Scan regularly for vulnerabilities and stratify validated results into a remediation plan that is ordered by severity Develop a procedure for deployment of updates and patches that is in line with your security policy, measure the results Tie results into security testing activities 13

Data Security best practices Account / Password Management Require strong, complex passwords which are changed regularly Balance requirements against user acceptance. Users find ways to get around unreasonable security measures Consider multi-factor authentication for sensitive accounts Carefully monitor and manage user and service accounts to remove old or unused accounts and properly on-board new users 14

Data Security best practices Encryption Encryption is not a replacement for good access control mechanisms Can be used to prevent accidental disclosure though loss of hardware like a laptop, mobile device or USB thumb drive Choose commonly accepted strong algorithms like those found in the Federal Information Processing Standard (FIPS) 140-2 Key management can be challenging and the impact of lost keys can be high 15

What is Data Transport The movement of data from one system to another, often referring to the movement of large datasets to a data warehouse or the sharing of data between data systems Transport mechanisms can include a variety of protocols and technology Diversity of solutions can reduce efficiency of data transfer and increase attack surface Some methods can introduce security vulnerabilities and lead to potential disclosure of data 16

Data Transport security best practices It s all in the protocol When using removable storage or email, consider encryption to protect the data from loss or theft in transit Some transport mechanisms like File Transfer Protocol (FTP) provide little to no protection for authentication credentials or the data in transit Combining technologies has closed some of the security gaps: FTPS or FTP Secure combines FTP with Transport Layer Security (TLS) / Secure Sockets Layer (SSL) to encrypt data in transit SFTP combines the functionality FTP with the encryption capabilities of the Secure Shell (SSH) to provide a layer of encryption for transport 17

Data Transport security best practices Web services based transport mechanisms allow for a wide variety of functionality, allowing a single web service to serve as a hub for multiple applications Several standards exist today for the creation of web services driven data transport mechanisms for education systems Test the security of all data transport systems periodically and as needed to evaluate the security posture of the organization 18

The price is high 19

Protecting ourselves Understand the threat Know yourself and your vulnerabilities Identify the Crown Jewels and protect them first Assess your own systems, view them like an attacker Standardize (technology, data, procedures) Adopt common methodologies and data standards Band together with partners & share threat data Don t rely on technology alone to keep you safe Train users to be aware and exercise safe browsing habits Be ready to respond to incidents quickly and efficiently 20

Protecting ourselves Mitigate the threat where you can Make what you already have work better People are the key, awareness is a powerful weapon Monitor & Manage your data Collect logs that make sense Retain information to help reconstruct events which may have occurred in the past Be ready to respond Have a response plan Identify response team in advance and set aside the resources needed Periodically test response capability with simulated events 21

ED/PTAC Resources available Case Studies H.S. Feedback Report Head Start Program FPCO Enforcement of FERPA PTAC Technical Assistance Data Sharing Data Sharing Agreement Checklist Guidance for Reasonable Methods Data Security Data Security Checklist Data Governance Checklist Cloud Computing Identity Authentication Best Practices Data Breach Response Checklist 22

Additional ED/PTAC Resources: Disclosure Avoidance FAQs Identification of Data Types & Uses De-identified Data Case Study FERPA 101 professional training video FERPA 201 (Data Sharing) professional training video FERPA 301 (Postsecondary) professional training video 23

Contact Information Family Policy Compliance Office Telephone: (202) 260-3887 Privacy Technical Assistance Center Telephone: (855) 249-3072 Email: FERPA@ed.gov Email: privacyta@ed.gov FAX: (202) 260-9001 FAX: (855) 249-3073 Website: www.ed.gov/fpco Website: www.ptac.ed.gov 24