A Secure Federated Company



Similar documents
Pro/INTRALINK Curriculum Guide

Pro/INTRALINK 9.0/9.1 Curriculum Guide

Pro/INTRALINK Curriculum Guide

CloudDesk - Security in the Cloud INFORMATION

Scalable Secure Remote Access Solutions

Windchill ProjectLink Curriculum Guide

System Administration of Windchill 10.2

CONTENTS. PCI DSS Compliance Guide

FIREWALL POLICY DOCUMENT

Estate Agents Authority

Arbortext Content Manager 9.0/9.1 Curriculum Guide

Windchill Service Information Manager Curriculum Guide

Overcoming Security Challenges to Virtualize Internet-facing Applications

RSS Cloud Solution COMMON QUESTIONS

Owner of the content within this article is Written by Marc Grote

WW HMI SCADA-08 Remote Desktop Services Best Practices

How To Get Atos Paas For Free

Introduction to Cyber Security / Information Security

PortWise Access Management Suite

CHOOSING A RACKSPACE HOSTING PLATFORM

The Bomgar Appliance in the Network

PAVING THE PATH TO THE ELIMINATION OF THE TRADITIONAL DMZ

74% 96 Action Items. Compliance

Secure Remote Access Solutions Balancing security and remote access Bob Hicks, Rockwell Automation

Diploma in Computer Science

THE CHALLENGES OF DATA SECURITY IN THE MODERN OFFICE

Developing the Corporate Security Architecture. Alex Woda July 22, 2009

MANAGE SECURE ACCESS TO APPLICATIONS BASED ON USER IDENTITY. EMEA Webinar July 2013

STERLING SECURE PROXY. Raj Kumar Integration Management, Inc.

Table of Contents Introduction and System Requirements 9 Installing VMware Server 35

Pro/INTRALINK Curriculum Guide

Table of Contents. Introduction. Audience. At Course Completion

STREAM FRBC

1. PREREQUISITES 2. NETWORK ADMINISTRATORS INFO

User Identification and Authentication

Network Security Guidelines. e-governance

Next Gen Data Center. KwaiSeng Consulting Systems Engineer

BAE Systems PCI Essentail. PCI Requirements Coverage Summary Table

Altus UC Security Overview

a) Encryption is enabled on the access point. b) The conference room network is on a separate virtual local area network (VLAN)

Integrated processes aligned to your business The examples of the new NetEye and EriZone releases

ShadowLink 2. Overview. May 4, ONLINE SUPPORT emdat.com/ticket/ PHONE SUPPORT (608) ext. 1

SANGFOR SSL VPN. Quick Start Guide

The BiGuard SSL VPN Appliances

Fact Sheet FOR PHARMA & LIFE SCIENCES

Next Generation Network Firewall

Cloud and VM Based Security

VMWARE Introduction ESX Server Architecture and the design of Virtual Machines

CITY UNIVERSITY OF HONG KONG Network and Platform Security Standard

Alliance Key Manager A Solution Brief for Technical Implementers

Private Compute-as-a-Service

REDCENTRIC MANAGED FIREWALL SERVICE DEFINITION

Virtual Server and Storage Provisioning Service. Service Description

HEC Security & Compliance

Managing internet security

CA Mobile Device Management 2014 Q1 Getting Started

NETASQ & PCI DSS. Is NETASQ compatible with PCI DSS? NG Firewall version 9

Customer Service Description Next Generation Network Firewall

Securing the Service Desk in the Cloud

Document control for sensitive company information and large complex projects.

Windchill Service Information Manager Curriculum Guide

System Compatibility. Enhancements. Security. SonicWALL Security Appliance Release Notes

How to complete the Secure Internet Site Declaration (SISD) form

Why a Reverse Proxy with My Instant Communicator for mobiles??

CompTIA Cloud+ 9318; 5 Days, Instructor-led

The Weakest Link : Securing large, complex, global Oracle ebusiness Suite solutions

Secondary DMZ: DMZ (2)

CompTIA Cloud+ Course Content. Length: 5 Days. Who Should Attend:

Windchill Policy Administration within TEWI Administrative Domain

Microsoft. Pro: Upgrading to Windows 7 MCITP Enterprise Desktop Support Technician.

Building Secure Networks for the Industrial World

White Paper Secure Reverse Proxy Server and Web Application Firewall

DIGIPASS Authentication for SonicWALL SSL-VPN

UMHLABUYALINGANA MUNICIPALITY IT PERFORMANCE AND CAPACITY MANAGEMENT POLICY

Industrial Security for Process Automation

Question Name C 1.1 Do all users and administrators have a unique ID and password? Yes

Sophos Endpoint Security and Control on-premise installation best practice guide. Endpoint Security and Control 10 Enterprise Console 5

C a r l G o e t h a l s T e r r e m a r k E u r o p e. C a r l. g o e t h a l t e r r e m a r k. c o m

Cisco Virtualization Experience Infrastructure: Secure the Virtual Desktop

MEGA Web Application Architecture Overview MEGA 2009 SP4

How To Set Up A Firewall Enterprise, Multi Firewall Edition And Virtual Firewall

Achieving PCI Compliance Using F5 Products

PCI Requirements Coverage Summary Table

Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0

Chapter 12. Security Policy Life Cycle. Network Security 8/19/2010. Network Security

Upgrade to Webtrends Analytics 8.7: Best Practices

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:

How the Software-Defined Data Center Is Transforming End User Computing

RSA Authentication Manager 8.1 Setup and Configuration Guide. Revision 2

Security and the Mitel Teleworker Solution

RSA Authentication Manager 7.1 Security Best Practices Guide. Version 2

Security Threat Risk Assessment: the final key piece of the PIA puzzle

DMZ Virtualization Using VMware vsphere 4 and the Cisco Nexus 1000V Virtual Switch

How To Set Up A Shared Insight Cache Server On A Pc Or Macbook With A Virtual Environment On A Virtual Computer (For A Virtual) (For Pc Or Ipa) ( For Macbook) (Or Macbook). (For Macbook

When it Comes to Monitoring and Validation it Takes More Than Just Collecting Logs

Transcription:

A Secure Federated Company 10 nov 2010 Using Windchill Technology 1 THALES NEDERLAND B.V. THALES NEDERLAND B.V. AND/OR ITS SUPPLIERS. THIS INFORMATION CARRIER CONTAINS PROPRIETARY INFORMATION WHICH SHALL NOT BE USED, REPRODUCED OR DISCLOSED TO THIRD PARTIES WITHOUT PRIOR WRITTEN AUTHORIZATION BY THALES NEDERLAND B.V. AND/OR ITS SUPPLIERS, AS APPLICABLE.

Agenda: Mandate History Requirements General approach Implementation of business & security requirements Questions 2 THALES NEDERLAND B.V.

Mandate: Background wrt external interfacing: Changing needs: Collaboration (SR-FR, Nevesbu, customer, etc); engineering/design Outsourcing; manufacturing/design Shortened design cycles Opportunities: Efficiency/effectivity improvements in the communication with external partners; fast, configured and role based Ability to pay a key role in co-designer relations Threats: Insecure interfacing; usb-stick, e-mail, CD/DVD, hard-disk, quickplaces, etc Poorly managed; status, configuration, completeness, validity, etc Practically unworkable situation for Thales-Norma after moving date. 3 THALES NEDERLAND B.V.

Mandate: Goal: To realize proper configuration facilities for the mechanical engineering domain between both Thales and suppliers/codesigners and Thales-to-Thales internationally. Constraint: All collaborations exist within the setting of defence related products and are therefore subject to security constraints. 4 THALES NEDERLAND B.V.

Project B Product Radar X Thales, Fr Partner 3, NL Thales anywhere Thales Hengelo Project A Partner 1, NL Partner 2, D 5 THALES NEDERLAND B.V.

History: Feb. 2007 Intralink->PDMlink 8 Architecture not sufficient (then 8 now 9.1) Requirements definition; security en business How do others work? Architectures Other approaches; UEE Windchill; external flexibility maintained No OEM approach; a federated company approach, Quickplaces; security becomes blocking PTC provides functionality in PDMlink/Projectlink 9.1 6 THALES NEDERLAND B.V.

Dynamic links exist due to PDMLink & ProjectLink embedded solution PDMLink = Referential area for CAD documents (Permanent area) Collab. work within entity Collab. work between entities ProjectLink = Temporary area for collaborative work (Project area is removed when work is completed) 7 THALES NEDERLAND B.V.

Requirements: Business: Supplied solution must support collaboration for mechanical engineers in their day-to-day operational use of the system. It should conform to the general service level agreement KPI s that are in place for other engineering related services Specifically, it must be both easy and secure, to give visibility to engineering artefacts and communities that can be easily established and maintained within the solution. Security: 15 requirements defined including: Authorised locations-users-data-(time period) Data manager Logging who-what-when Encryption Also export control 8 THALES NEDERLAND B.V.

General approach: Use cases to be executed/demonstrated in three consecutive installation runs to assure: Correct migration; after the final migration there is no easy roll-back Meeting the security requirements; otherwise there will be no external collaboration allowed Operational availability and performance; to convince the key-users and the business Operational functionality of PDMlink 9.1; some new functions and working methods Final migration will be done in a weekend and after agreement of all parties. Hire specific Windchill knowledge No customisation, standard functionality and configuration Linux, virtualisation, migration, anti-virus, test-environment French corporate vision Controlled start-up; get experience and confidence 9 THALES NEDERLAND B.V.

Implementation: Implementation of Business Requirements Implementation of Security Requirements 10 THALES NEDERLAND B.V.

Implementation of Business Requirements Migrate Windchill 8.0 to new secure Windchill 9.1 environment Windchill 8.0 Windchill 9.1 Physic Servers (2 servers) Vmware Servers (6 servers) Windows 2003 Redhat Enterprise Linux 4 http://xxxx.yyy.zz.thales https://xxx.yyy.thales No virus scanning on server Virus scanning for external slaves Windchill 8.0 M040 Windchill PDMLink & ProjectLink Contains mcad/ecad content Default user interface Windchill 9.1 M020 Windchill PDMLink & ProjectLink Contains same mcad/ecad content Simple role-based user interface Same or equal performance and minimal impact on daily work. 11 THALES NEDERLAND B.V.

Implementation of Business Requirements Role-based User Interface (Profiles) 12 THALES NEDERLAND B.V.

Implementation of Security Requirements Migrate Windchill 8.0 to new secure Windchill 9.1 environment Windchill 8.0 Windchill 9.1 Windchill Monolithic Secure Windchill Architecture http://xxxx.yyy.zz.thales https://xxx.yyy.thales Local area network (LAN) Demilitarized zone (DMZ) Windchill PDMLink & ProjectLink Windchill PDMLink & ProjectLink No Security Labeling and Agreements Security Labeling and Agreements No Windchill Auditing & Logging Windchill Auditing & Logging Use cases to define collaboration working scenario s and procedures. 13 THALES NEDERLAND B.V.

Implementation of Security Requirements Windchill Architecture HTTPS Windchill Cluster on virtual Linux Redhat in the DMZ VLAN PDM (inside VLAN DMZ) Thales NL Slave 1 View Master Oracle ThalesNet Slave 2 Thales Env. Internet Slave 3 Partner NL SAN Internet Slave 4 Partner NAVO 14 THALES NEDERLAND B.V.

Implementation of Security Requirements Windchill Thales NL Environment VLAN PDM (inside VLAN DMZ) Thales NL Slave 1 View Master Oracle Slave 2 Slave 3 Slave 1 Minimal required auditing & logging. Only Thales NL users can log in. Memory and caching parameters optimized for internal LAN use. SAN Slave 4 15 THALES NEDERLAND B.V.

Implementation of Security Requirements Windchill Thales NAVO Partner Environment Slave 4 All required auditing & logging. Memory and caching parameters optimized for internet use. Virus scanning on server. NAVO Partner needs: VPN Box from Thales NL. Thales SSL certificate from Thales NL. Valid username/password from Thales NL. Partner NAVO Internet Slave 1 Slave 2 Slave 3 Slave 4 VLAN PDM (inside VLAN DMZ) Master View Oracle SAN 16 THALES NEDERLAND B.V.

Implementation of Security Requirements Security Labeling and Agreements Export control: License required Authorised Participants (NL persons) A Authorised Participants (Internal people) Corporate Proprietary: Internal 17 THALES NEDERLAND B.V.

Implementation of Security Requirements Security Labeling and Agreements Security Labels Security Level Security Marking Export Control Intellectual Property Agreements Security Authorization Agreement Government Export License Commercial License Disclosure Agreement Non-Disclosure Agreement Example for: Security Marking 18 THALES NEDERLAND B.V.

Implementation of Security Requirements Report on who accessed what objects and when 60 discrete traceable events, including Viewing of pages and Downloading of content Critical information captured, including user ID and IP address as well as object details Additional Apache & Windchill logging 19 THALES NEDERLAND B.V.

Thank you for your attention! Questions? 20 THALES NEDERLAND B.V.