Enterprise Management Solutions Protection Profiles



Similar documents
How can Identity and Access Management help me to improve compliance and drive business performance?

Automated User Provisioning

How can Content Aware Identity and Access Management give me the control I need to confidently move my business forward?

Provide access control with innovative solutions from IBM.

SOLUTION BRIEF SEPTEMBER Healthcare Security Solutions: Protecting your Organization, Patients, and Information

CA point of view: Content-Aware Identity & Access Management

<Insert Picture Here> Oracle Identity And Access Management

BUSINESS-DRIVEN, COMPLIANT IDENTITY MANAGEMENT USING SAP NetWeaver IDENTITY MANAGEMENT

1 Introduction to Identity Management. 2 Identity and Access Needs are Ever-Changing

1 Building an Identity Management Business Case. 2 Agenda. 3 Business Challenges

Identity and Access Management

Identity and Access Management Point of View

CA Federation Manager

Quest One Identity Solution. Simplifying Identity and Access Management

QRadar SIEM 6.3 Datasheet

Strengthen security with intelligent identity and access management

Security management White paper. Develop effective user management to demonstrate compliance efforts and achieve business value.

Logica Sweden provides secure and compliant cloud services with CA IdentityMinder TM

Role Based Identity and Access Management Basic Infrastructure for New Citizen Services and Lean Internal Administration

CA Technologies Healthcare security solutions:

TECHNOLOGY BRIEF: INTEGRATED IDENTITY AND ACCESS MANAGEMENT (IAM) An Integrated Architecture for Identity and Access Management

How to Provide Secure Single Sign-On and Identity-Based Access Control for Cloud Applications

ROUTES TO VALUE. Business Service Management: How fast can you get there?

Identity and Access Management Integration with PowerBroker. Providing Complete Visibility and Auditing of Identities

Simplify Identity Management with the CA Identity Suite

Product overview. CA SiteMinder lets you manage and deploy secure web applications to: Increase new business opportunities

Enterprise Identity Management Reference Architecture

Oracle Enterprise Single Sign-on Technical Guide An Oracle White Paper June 2009

secure user IDs and business processes Identity and Access Management solutions Your business technologists. Powering progress

Regulatory Compliance Using Identity Management

Role Engineering: The Cornerstone of Role- Based Access Control DECEMBER 2009

CA Process Automation for System z 3.1

identity as the new perimeter: securely embracing cloud, mobile and social media agility made possible

solution brief February 2012 How Can I Obtain Identity And Access Management as a Cloud Service?

Security Services. Benefits. The CA Advantage. Overview

agility made possible

The Challenges of Administering Active Directory

SOLUTION BRIEF Improving SAP Security With CA Identity and Access Management. improving SAP security with CA Identity and Access Management

Service management White paper. Manage access control effectively across the enterprise with IBM solutions.

"Service Lifecycle Management strategies for CIOs"

The Oracle Mobile Security Suite: Secure Adoption of BYOD

CA Technologies Solutions for Criminal Justice Information Security Compliance

SaaS at Pfizer. Challenges, Solutions, Recommendations. Worldwide Business Technology

NetIQ FISMA Compliance & Risk Management Solutions

How To Buy Nitro Security

DirX Identity V8.4. Secure and flexible Password Management. Technical Data Sheet

Total Protection for Compliance: Unified IT Policy Auditing

Cloud Computing. Mike Bourgeois Platform as a Service Point of View September 17, 2015

Leveraging the Synergy between Identity Management and ITIL Processes

NSERC SSHRC AUDIT OF IT SECURITY Corporate Internal Audit Division

Enterprise Security and Risk Management

WHITE PAPER. Support for the HIPAA Security Rule RadWhere 3.0

Extending Identity and Access Management

CA CA, Inc. Identity Manager 12.5 Identity Manager r12.1 Security Target

The Age of Audit: The Crucial Role of the 4 th A of Identity and Access Management in Provisioning and Compliance

Business-Driven, Compliant Identity Management

CA Top Secret r15 for z/os

How to best protect Active Directory in your organization. Alistair Holmes. Senior Systems Consultant

SAP Solution in Detail SAP NetWeaver SAP NetWeaver Identity Management. Business-Driven, Compliant Identity Management

Business-Driven, Compliant Identity Management

White Paper. Support for the HIPAA Security Rule PowerScribe 360

Symantec Security Compliance Solution Symantec s automated approach to IT security compliance helps organizations minimize threats, improve security,

DirX Identity V8.5. Secure and flexible Password Management. Technical Data Sheet

Overcoming Active Directory Audit Log Limitations. Written by Randy Franklin Smith President Monterey Technology Group, Inc.

Meeting the Challenges of Virtualization Security

Data Governance and CA ERwin Active Model Templates

Foundation ACTIVE DIRECTORY AND MICROSOFT EXCHANGE PROVISIONING FOR HEALTHCARE PROVIDERS HEALTHCARE: A UNIQUELY COMPLEX ENVIRONMENT

FISMA / NIST REVISION 3 COMPLIANCE

Maintaining PCI-DSS compliance. Daniele Bertolotti Antonio Ricci

20 Critical Security Controls

Leveraging innovative security solutions for government. Helping to protect government IT infrastructure, meet compliance demands and reduce costs

IBM Software Group. Deliver effective governance for identity and access management.

SAP Identity Management Overview

Certified Identity and Access Manager (CIAM) Overview & Curriculum

CSN38:Tracking Privileged User Access within an ArcSight Logger and SIEM Environment Philip Lieberman, President and CEO

RSA Via Lifecycle and Governance 101. Getting Started with a Solid Foundation

Validating Enterprise Systems: A Practical Guide

How To Monitor Your Entire It Environment

IBM Tivoli Identity Manager

C21 Introduction to User Access

Softerra Adaxes Enterprise Directory Solution

Building a Roadmap to Robust Identity and Access Management

IT SECURITY EDUCATION AWARENESS TRAINING POLICY OCIO TABLE OF CONTENTS

etoken TMS (Token Management System) Frequently Asked Questions

Best Practices for Building a Security Operations Center

Enterprise Security Solutions

Introduction to Identity and Access Management for the engineers. Radovan Semančík April 2014

Oracle Role Manager. An Oracle White Paper Updated June 2009

CA Tape Encryption Key Manager

How does IBM deliver cloud security? An IBM paper covering SmartCloud Services 1

The NIST Framework for Improving Critical Infrastructure Cybersecurity - An Executive Guide

Transcription:

Enterprise Management Solutions Protection Profiles Eric Winterton, Booz Allen Hamilton Joshua Brickman, CA Inc. September 2008 Copyright 2008 CA, Inc. and Booz Allen Hamilton. All rights reserved. All trademarks, trade names, services marks and logos referenced herein belong to their respective companies.

Agenda - Protection Profiles what do we have now - Defining Enterprise Security Management - Requirements being demanded by government agencies - The gap? How close are we? - A Solution - Q and A marks 2 and logos referenced herein belong to their respective companies.

Current State of Protection Profiles - PP s currently support the following technologies: - Access Control Devices/Systems - Boundary Protection Devices and Systems - Data Protection - Databases - Detection Devices/Systems - IC s and Smart Card Devices/Systems - Key Management - Network and Network related Devices/Systems - Operating Systems - Products for Digital Signatures - Other Devices/Systems marks 3 and logos referenced herein belong to their respective companies.

Current State of Protection Profiles - We are addressing the following technologies: - Access Control Devices/Systems - Boundary Protection Devices and Systems - Data Protection - Databases - Detection Devices/Systems - IC s and Smart Card Devices/Systems - Key Management - Network and Network related Devices/Systems - Operating Systems - Products for Digital Signatures - Other Devices/Systems marks 4 and logos referenced herein belong to their respective companies.

What is Enterprise Security Management? - Enterprise services critical security functions include: - Multilevel Access Control Solutions - Single sign on - Centralized Monitoring and Response - Standardized Auditing - Centralized Configuration and Compliance - Integration into existing architectures (data import & export) - Automated provisioning with workflow approval process - Various PP s help achieve these goals individually but they are not mutually inclusive. marks 5 and logos referenced herein belong to their respective companies.

Current CC Environment for ESM Products - Custom Security Targets - Longer and more costly evaluations - No Apples to Apples to compare for customer - Moratorium (NIAP) limits and restricts ability of Vendors to quickly provide software to demanding Federal customers with US Evaluation marks 6 and logos referenced herein belong to their respective companies.

Current State of IT Security - Security systems and processes are fragmented - Risk is higher than ever (internal and external) - Demands are higher than ever from: - Business - Customers - Partners - Government and Auditors marks 7 and logos referenced herein belong to their respective companies.

Enterprise Management Challenges USERS - Fast, 24/7 app access - Good user experience - Secure data - Reduce my logons RISK - Secure app access - Protect systems, resources - Right access to the right person - Manage, remediate vulnerabilities BUSINESS - Deploy more apps - Integrate more partners - Support more customers - Integrate acquisitions - Do it faster/cheaper - Avoid bad press REGULATORY - Continuous compliance - Strong internal IT controls - Privacy of customer information - Document processes and controls marks 8 and logos referenced herein belong to their respective companies.

The Identity Challenge MANY IDENTITIES - Mainframe - RDBMS - LDAP - NOS - ERP MANY USERS - Customers - Employees - Partners MANY APPLICATIONS - Logistics - Financial - Service - Production - CRM - ERP marks 9 and logos referenced herein belong to their respective companies.

General Issues faced by Federal Agencies 10marks and logos referenced herein belong to their respective companies. 10

General Issues faced by Federal Entities >Many governing directives and laws; FISMA, NIST, DoD 8500.x, FIPS, IPV6, Section 508 (VPATS), FDCC, HSPD-x, HIPAA, CCTM, TEMPEST, CTCPEC, ACSI 33, etc >High expectations from citizens and users for IT availability, credibility, security and industry leading technology >Support changes in staff, leadership, fiscal directions and organizational priorities >Highest threat environment for IT at any point in history 11marks and logos referenced herein belong to their respective companies. 11

Specific Issues and Threats >Managing User Accounts From the Beginning to End of Their Life Cycle >Securing Vital Information by Enforcing Access Policies and Protecting the Data > Meet Regulatory Requirements for Auditing and Reporting >Keep the Bad Guys Out and Still Provide Superior Customer Service > Stay Future Proof Technology That Stays Current 12marks and logos referenced herein belong to their respective companies. 12

The Destination The Interactive e-government Applications & Transactions Content & Information Citizens Customers Partners Employees Community & Collaboration To provide secure, interactive access to all required resources for every e-government relationship 13marks and logos referenced herein belong to their respective companies. 13

Identity and Access Management EDUCATION BUSINESS PROCESS CONSULTING OPTIMIZE IMPLEMENT IAM SOFTWARE DESIGN ASSESS SOFTWARE SERVICES EDUCATION AND SUPPORT A COMPLETE SOLUTION TO MEET FEDERAL GOVERNMENT REQUIREMENTS SUPPORT 14marks and logos referenced herein belong to their respective companies. 14

Identity & Access Management Delivers > Reduced IT Security Risk Protect your critical data and resources Centrally manage all identities, lifecycles and access policies > Reduced Operational Expenses Lower your IT Admin and Help Desk expenses Automate existing manual IT processes > Enhanced Compliance Controls automation provides provable compliance Help achieve your governance, risk & compliance goals > Enhanced Business Enablement Deploy new online services quickly and securely Strengthen your existing customer relationships 15marks and logos referenced herein belong to their respective companies. 15

Reduced IT Security Risk > Key Technology Requirements: Centralized policy and role-based access management for: Web applications Systems and platform resources Critical system services (e.g., auditing process) Web Services Mainframes Granular superuser access entitlements Auditing of all user access events Filtering & correlation of event info to help identify security issues 16marks and logos referenced herein belong to their respective companies. 16

Reduction of Operational Expenses Through Automation > Key Technology Requirements: Reduced administration expenses Centralized management of all user identities and access policies Automated (de-)provisioning of accounts and access rights Automated filtering and correlation of all security event info Delegated management of users Reduced help desk costs Single sign-on across all applications User self-service Improved productivity of users & managers Automated provisioning with workflow approval process 17marks and logos referenced herein belong to their respective companies. 17

What CIOs, CSOs and CFOs Are Telling Us Continuous Compliance Help Desk Overload Negative Security- Related Publicity Leverage-able It Infrastructure Internal As It s employees too expensive and Enterprise There and and partners manual change architects just external no budget auditors to make 25% sure responsibilities hate need hire to more see IT if administrators, you I we re I have of don t to still see my addressing sufficient have help want the they IT but desk keep wheel our control calls user accounts the to acquiring are population over see continually necessary my related my new is to regulations. systems reinvented. your IT systems for growing, resetting organization privileges particularly forgotten And users IAM and access in then with that should to private we us as have are long passwords! while the be we data. news. bring to none deployed do Auditors gone! more are and all don t removed. managed customers/partners over care again How generally for the do part I of how next much fix enterprise that? architecture. online. time. costs. Escalating Administration Costs Ghost User Accounts Auditors Requirements Accumulating & Inappropriate Privileges marks 18 and logos referenced herein belong to their respective companies.

Protection Profiles That Come Close - Protection Profile Authorization Server for Basic Robustness Environments [U.S.] - Discretionary Information Flow Control (MU) [Germany] - Controlled Access Protection Profile [U.S.] - Protection Profile for a Identity Manager [Germany] - Protection Profile Intrusion Detection System - System for Basic Robustness Environments [U.S.] We need aspects of these protection profiles but each of them has some difficulty meeting the entire set of requirements for ESM. So just how close are we? marks 19 and logos referenced herein belong to their respective companies.

A Solution - Start with a base PP using minimal requirements and build upon those functions for more complex ESM functionality. - Using some existing PP s as templates we create a new family of PP s for ESM. - Multiple EAL s for various needs of customers and vendors. - Work with the various schemes, vendors and customer communities to build the PP s. marks 20 and logos referenced herein belong to their respective companies.

The Outcome - True Apples to Apples comparison: making COTS acquisitions easier and faster for agencies - Side effect of encouraging COTS vendors to add features to meet PP s, thus meeting the requirements of the customers - Faster and cheaper evaluations of PP compliant applications marks 21 and logos referenced herein belong to their respective companies.

So how can you help? - CA and Booz are committed to participating in this effort but we cannot do it alone. - Vendors/customers: Participate in requirements gathering - Schemes: Accept and validate this approach - Other interested parties: we welcome your help! - Your comments and feedback are encouraged! Eric Winterton, CISSP CCTL Technical Director Booz Allen Hamilton Linthicum, MD USA +1-410-684-6691 winterton_eric@bah.com Joshua Brickman Program Manager, Federal Certifications CA, Inc. Framingham, MA USA +1-508-628-8917 Joshua.Brickman@ca.com marks 22 and logos referenced herein belong to their respective companies.