ArcGIS Cloud Security Roadmap & Best Practices for Federal Agencies. Michael E. Young



Similar documents
Designing an Enterprise GIS Security Strategy Michael E. Young Matt Lorrain

Understanding ArcGIS Deployments in Public and Private Cloud. Marwa Mabrouk

ArcGIS and Enterprise Security

Designing an Enterprise GIS Security Strategy

Esri Managed Cloud Services and FedRAMP

ArcGIS Security Authorization Advancements

ArcGIS for Server: In the Cloud

Using ArcGIS for Server in the Amazon Cloud

Deploying ArcGIS for Server Using Esri Managed Services

AWS Security. Security is Job Zero! CJ Moses Deputy Chief Information Security Officer. AWS Gov Cloud Summit II

Deploying ArcGIS for Server Using Managed Services

PCI COMPLIANCE ON AWS: HOW TREND MICRO CAN HELP

Table of Contents. FME Cloud Architecture Overview. Secure Operations. Application Security. Shared Responsibility.

How To Use Arcgis For Free On A Gdb (For A Gis Server) For A Small Business

Architecting and Building a Secure and Compliant Virtual Infrastructure and Private Cloud

Enterprise GIS Architecture Deployment Options. Andrew Sakowicz

ArcGIS for Server in the Cloud

NCTA Cloud Architecture

Ensuring the Security of Your Company s Data & Identities. a best practices guide

Cloud Security Through Threat Modeling. Robert M. Zigweid Director of Services for IOActive

Appendix C Pricing Index DIR Contract Number DIR-TSO-2724

Tableau Online Security in the Cloud

Ensuring Enterprise Data Security with Secure Mobile File Sharing.

IBM Cloud Security Draft for Discussion September 12, IBM Corporation

The Weakest Link : Securing large, complex, global Oracle ebusiness Suite solutions

AV-18 Introduction of the GIS Integration

Cloud Security. Peter Jopling IBM UK Ltd Software Group Hursley Labs. peterjopling IBM Corporation

ArcGIS for Server in the Amazon Cloud. Michele Lundeen Esri

2013 AWS Worldwide Public Sector Summit Washington, D.C.

Portal for ArcGIS. Satish Sankaran Robert Kircher

WALKME WHITEPAPER. WalkMe Architecture

Agenda. How to configure

Seeing Though the Clouds

Deploy Remote Desktop Gateway on the AWS Cloud

Application Security Best Practices. Matt Tavis Principal Solutions Architect

Scott Moore, Esri April 4, Intermountain, Great Falls, MT

Petroleum Web Applications to Support your Business. David Jacob & Vanessa Ramirez Esri Natural Resources Team

Securing ArcGIS Server Services: First Steps

PCI COMPLIANCE ON AWS: HOW TREND MICRO CAN HELP

Secure Cloud Computing

Assignment # 1 (Cloud Computing Security)

Security Overview Enterprise-Class Secure Mobile File Sharing

GeoCloud Project Report USGS/EROS Spatial Data Warehouse Project

A Sumo Logic White Paper. Sumo Logic Security Model. Secure by Design

Active Directory Domain Services on the AWS Cloud: Quick Start Reference Deployment Mike Pfeiffer

How to Grow and Transform your Security Program into the Cloud

Building Energy Security Framework

Workday Mobile Security FAQ

How To Create A Walkme.Com Walkthrus.Com Website And Help With Your Website Or App On A Pc Or Mac Or Ipad (For Pc) Or Mac (For Mac) Or Ipa (For Ipa) Or Pc

Configuration Guide. BlackBerry Enterprise Service 12. Version 12.0

Blending Embedded Hardware OTP, SSO, and Out of Band Auth for Secure Cloud Access

Cloud Courses Description

With Eversync s cloud data tiering, the customer can tier data protection as follows:

Out-of-Band Multi-Factor Authentication Cloud Services Whitepaper

Blue Jeans Network Security Features

ProjectManager.com Security White Paper

Cloud Courses Description

Security Whitepaper. NetTec NSI Philosophy. Best Practices

Threat Modeling Cloud Applications

BMC s Security Strategy for ITSM in the SaaS Environment

Hybrid Cloud Identity and Access Management Challenges

NCSU SSO. Case Study

Simone Brunozzi, AWS Technology Evangelist, APAC. Fortress in the Cloud

SaaS at Pfizer. Challenges, Solutions, Recommendations. Worldwide Business Technology

Top. Reasons Federal Government Agencies Select kiteworks by Accellion

PCI Requirements Coverage Summary Table

Microsoft Power BI. Nov 21, 2015

identity as the new perimeter: securely embracing cloud, mobile and social media agility made possible

SAP Enterprise Architecture in the Era of SAP HANA, Infrastructure, Platforms, Software and Everything-as-a-Service

Configuration Guide BES12. Version 12.2

Microsoft Enterprise Mobility Suite

About Me. Software Architect with ShapeBlue Specialise in. 3 rd party integrations and features in CloudStack

Firewall VPN Router. Quick Installation Guide M73-APO09-380

Cloud models and compliance requirements which is right for you?

WHITEPAPER. SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS

ShareFile Security Overview

RemoteApp Publishing on AWS

White Paper How Noah Mobile uses Microsoft Azure Core Services

PCI Requirements Coverage Summary Table

NEFSIS DEDICATED SERVER

Sean Horne CTO EMC UKI. The leakage of Intellectual Property.. .and the risk of Privacy, Trustworthiness, Governance and Data Breaches

Flexible Identity Federation

Preparing for GO!Enterprise MDM On-Demand Service

Deploy XenApp 7.5 and 7.6 and XenDesktop 7.5 and 7.6 with Amazon VPC

Securing the Cloud with IBM Security Systems. IBM Security Systems IBM Corporation IBM IBM Corporation Corporation

A COALFIRE PERSPECTIVE. Moving to the Cloud. NCHELP Spring Convention Panel May 2012

Security Practices, Architecture and Technologies

PATCH MANAGER what does it do?

Configuration Guide BES12. Version 12.1

EXTENDING SINGLE SIGN-ON TO AMAZON WEB SERVICES

Configuration Guide. BES12 Cloud

Securing the Microsoft Platform on Amazon Web Services

Mapping and Geographic Information Systems Professional Services

Secure Identity in Cloud Computing

ArcGIS Viewer for Silverlight An Introduction

Transcription:

ArcGIS Cloud Security Roadmap & Best Practices for Federal Agencies Michael E. Young

Agenda Introduction ArcGIS Cloud Capabilities ArcGIS Online (SaaS) Security ArcGIS Cloud Providers ArcGIS IaaS Security ArcGIS Security Advancements Summary

Introduction - Michael E Young - Esri Principal Security Architect - AGOL FISMA Information System Security Officer (ISSO) - Certified Information Systems Security Professional (CISSP)

Introduction Cloud security affected by many moving parts Cloud Security Standards Evolving Cloud First Initiative Advancing ArcGIS Security Capabilities Evolution of Cloud Provider Capabilities Mobilization of workforce

Introduction Choosing an appropriate cloud deployment Not just technical issues/concerns Political push/pull issues - Cloud first vs. We don t trust cloud providers, yet No silver bullet for all cloud security concerns - This session provides a roadmap of options and best practices, not just a Safe button to push

Introduction Heightened Cybersecurity Concerns over the last month Executive Order on Improving Critical Infrastructure Cybersecurity Report APT1: Exposing One of China s Espionage Units DHS Recommendation to disable Java

Introduction Top Cloud Threats for 2012 - CSA

Introduction Cloud Security Standards Evolving FISMA - Per solution, per agency accreditation since 2002 - Pre-cloud FedRAMP - Do once, use many times cloud security framework - First IaaS ATO December 2012

Introduction Esri s Security Strategy Evolution Enterprise Solution Product Isolated Systems Integrated Systems Cloud 3 rd Party Security Embedded Security Managed Security

Introduction Pre-Cloud Deployment Editors Manual Response Analysis Manual Response Collection in the Field SDE Weekly Extract FGDB Desktop/Laptop read-only viewer Paper Maps Ineffective dissemination to field workers and external groups

ArcGIS Cloud Capabilities

ArcGIS Cloud Capabilities Cloud Service Models Cloud Deployment Models Cloud Management Models

ArcGIS Cloud Capabilities Service Models Each service layer fulfills different business needs ArcGIS Online Biz Process/ Operations App/Svc Usage Scenarios Software as a Service Platform as a Service Application Development Develop, Test, Deploy and Manage Usage Scenarios Cloud Provider IT Infrastructure/ Operation Create/Install, Manage, Monitor Usage Scenarios Infrastructure as a Service ArcGIS Server, Portal for ArcGIS * NIST SRA

ArcGIS Cloud Capabilities Service Models Non-Cloud - Traditional systems infrastructure deployment - Portal for ArcGIS & ArcGIS Server IaaS - Portal for ArcGIS & ArcGIS Server - Some Citrix / Desktop SaaS - ArcGIS Online - Business Analyst Online - Community Analyst Agency Responsible End to End Decreasing Agency Responsibility Agency Responsible For Application Settings

ArcGIS Cloud Capabilities Deployment Models On-Premises - Information cannot go outside an organizations walls - Solution: Portal for ArcGIS Community - Data / Systems management constraints - Amazon GovCloud ITAR / US Persons - Esri Managed Services Prototype in place - CGI Federal ITAR / US Citizen - Esri Managed Services starting Hybrid - Customer can manage services and data in their walls (Segmentation) - Common implementation Public - Accessible and cost effective - ArcGIS Online - Uses public cloud infrastructure like SalesForce / Google Apps

ArcGIS Cloud Capabilities Management Model Self-Managed - Your responsibility for managing IaaS deployment security - Key security controls discussed later Esri Managed - Managed Services - Starting work on FISMA compliant environment capabilities - Government community cloud management now available

ArcGIS Cloud Capabilities Hybrid Implementation Public Agency B Gov t IaaS Agency Portal Internal AGS Filtered Content External AGS ArcGIS Online Agency C Agency Database File Geodatabase Public IaaS Field Worker Agency A

ArcGIS Cloud Capabilities Implementation options Service Non-Cloud IaaS SaaS Model AGS Your Location AGS in AWS ArcGIS Online Deployment On-Premises Community mun Hybrid Public Model Your location AWS GovCloud Your Loc+AWS AWS/Azure Management Self Managed aged Managed Model You Esri On-premise Cloud *AWS is a placeholder on this slide for any cloud provider such as Azure, CGI, or Terremark

ArcGIS Online Security

ArcGIS Online Security SaaS Cloud Components

ArcGIS Online Security How is it used? Web Map Work Planner Assigns work to field workers Field Workers Gets work via area polygon Polygon set to in progress Creates points Captures picture(s) Sets polygon status to complete Event Center Uses map to find completed field work Develop Material/ Equipment List Organization Views impact of event on the system Working off one map

ArcGIS Online Security Deployment Options Online Online Intranet Intranet Intranet Server Server Server Portal Server Server Server Online Server Server Server Read-only Basemaps Intranet Intranet Portal Server Server Server Cloud On-premise

ArcGIS Online Security Hybrid Cloud Deployment AGOL Web Map SDE Extracts FGDB Feature Services Mobile View (Esri App) Empty Schemas.mxd ArcGIS Server Desktop View Segment sensitive data internally and public data in cloud

ArcGIS Online Security Hybrid Cloud Deployment - Metadata Common reason for hybrid cloud deployment is to prevent storing sensitive data in the cloud Initial FISMA accreditation based on this deployment What is stored in AGOL? - Metadata 5 metadata items that could be deemed sensitive are: 1. Service username & password Default, not saved 2. Service initial extent Adjust to a less specific area 3. Service name & tags Address with organization naming convention 4. Service IP Address Utilize DNS names within URL s 5. Service thumbnail image Replace with any image as appropriate

ArcGIS Online Security Hybrid Cloud Deployment Data sources Where are internal and cloud datasets combined? - At the browser - The browser makes separate requests for information to multiple sources and does a mash-up - Token security with SSL or even a VPN connection could be used between the device browser and on-premises system On-Premises Operational Layer Service Cloud Basemap Service ArcGIS Online Browser Combines Layers https://yourserver.com/arcgis/rest... http://services.arcgisonline.com...

ArcGIS Online Security Responsibility across components Application Customer Configured Web Admin App (Org-wide settings, Management) End-User Org Portal (Create maps, Share, Discover) Application Esri Managed ArcGIS Online Application (Portal, Map Services, Account Management) Data (Portal, Index, Hosted) OS & Middleware Esri & Cloud Provider Managed Middleware Operating System Infrastructure Cloud Provider Managed Server Infrastructure (Servers, Storage, Racks) Network Infrastructure (Switches, Routers, Cables, SAN) Data Center (Physical facility, UPS, Cooling)

ArcGIS Online Security Common Questions 1. Where is my data? - All ArcGIS Online data and processing resides within US Data centers on US soil 2. Is my information encrypted? - Organization administrator can force SSL encryption for all communications - ArcGIS Online does not encrypt data at rest; however sensitive items can be encrypted by 3 rd party solutions 3. Is it security accredited? - Actively in progress and expected this year 4. Is my data locked into ArcGIS Online? - Data publishers can extract and download data back to their organization via shapefiles, CSVs, or original publication package.

ArcGIS Cloud Providers

ArcGIS Cloud Providers ArcGIS Deployments Amazon Web Services CGI Terremark Microsoft Azure

ArcGIS Cloud Providers Amazon Web Services Utilized by Esri Cloud Builder solution AWS IaaS is FISMA moderate Actively working towards FedRAMP GovCloud meets US Persons requirements

ArcGIS Cloud Providers CGI & Terremark * CGI Architecture Diagram Offer IaaS type capabilities through VMWare CGI Recently Received FedRAMP Provisional ATO Additional layers of security can be added to expedite accreditation efforts Can meet US Citizenship requirements as necessary

ArcGIS Cloud Providers Microsoft Azure Cloud IaaS PaaS Actively working towards FedRAMP compliance this year Esri is actively testing ArcGIS Server in IaaS cloud

ArcGIS IaaS Security

ArcGIS IaaS Security Question - If my cloud IaaS is FISMA/FedRAMP accredited and I deploy my app into that cloud, is the overall implementation FISMA/FedRAMP equivalent? Answer - No IaaS FISMA Default ArcGIS Question Part 2 - Okay, so it s not FISMA/FedRAMP equivalent, but the IaaS by itself ensures the solution is secure enough, right? Answer - No

ArcGIS IaaS Security Why is IaaS accreditation by itself not enough? Where are most of the vulnerabilities & who is responsible for mitigating them? Customer Responsibility in IaaS

ArcGIS IaaS Security Common ArcGIS IaaS Deployments - Deploy ArcGIS Server Windows AMI to AWS - Deploy ArcGIS Server via Cloud Builder to AWS ArcGIS AWS Security Best Practices - Infrastructure Controls - Big Data Transfer - Application Controls - 5 minute minimum

ArcGIS IaaS Security Best Practices in AWS Segment cloud infrastructure - Utilize Amazon Virtual Private Cloud (VPC) - Utilize separate VPC s for DMZ, Web, App, DB, and Admin systems Utilize Amazon Identity & Access Management (IAM) - Implement two-factor authentication Establish a remote admin gateway - Reduce the number of internet facing admin connections

ArcGIS IaaS Security Best Practices in AWS Reduce attack surface of all interfaces - Security harden system & disable unused services - Reference GeoCloud instance for policies - Potential future ArcGIS Server STIG Establish change management & logging infrastructure - SIEM & HIDS integration - Patch management deployment (SCCM) Centralized systems authentication & authorization Establish Web Application Firewall capabilities

ArcGIS IaaS Security Transferring Big Data to the cloud FTP? Don t do it! Compression Tools - RainStor 1/40 th original size - No time/storage consuming re-inflation TCP / UDP Optimization Tools - Aspera - Utilize UDP for throughput and TCP for error-free Multifunction Optimization Tools - Cloud Opt & Attunity Cloudbeam - Compression, protocol optimization, data de-duplication, SSL acceleration

ArcGIS IaaS Security Minimize ArcGIS Server Attack Surface Don t expose Server Manager to public Disable Services Directory Disable Service Query Operation (as feasible) Enable Web Service Request Filtering - Windows 2008 R2+ Request Filtering - XML Security Gateway - Does not intercept POST requests - REST API only requires GET and HEAD verbs Limit utilization of commercial databases under website - File GeoDatabase can be a useful intermediary Require authentication to services File Geo Database New whitelisting capabilities coming

Too Much? Scenario: I just have a non-production system and all data is public.

ArcGIS IaaS Security Basic Steps for The Overwhelmed 1. Minimize RDP surface - Update OS patches - Many AMI s disable automatic updates - Enable NLA & FIPS for RDP - Set AWS Firewall to Limit RDP access to specific IP s 2. Minimize Application Surface - Disable ArcGIS Services Directory - Don t expose ArcGIS Manager web app to Internet These steps can be completed within 5 minutes Do them!

ArcGIS IaaS Security Want more details? Suggest utilizing SANS 20 Critical Security Controls - http://www.sans.org/critical-security-controls/ More specific guidance for Amazon IaaS deployments - http://www.slideshare.net/amazonwebservices/security-in-the-awscloud-sec301

ArcGIS Security Advancements

ArcGIS Security Advancements Esri Product Federal A&A Roadmap Product Cloud Provider Planned Federal A&A Q1-2013 Q2-2013 Q3-2013 Q4-2013 2014 ArcGIS Online Amazon Web Services Amazon Web Service & MS Azure FISMA Low FedRAMP Mod Implement ATO FISMA USDA Alignment FedRAMP SaaS Reviews Started Implement ATO ArcGIS Server CSP or AWS GovCloud FISMA Mod Facilitate ATO FISMA Incorporate Lessons Learned Esri Managed AWS,CSP FedRAMP Mod Alignment Establish AGS Fed Image Implement ATO

ArcGIS Security Advancements ArcGIS Online Security Certification Efforts In Place - Esri Data Center Operations - SSAE 16 Type 1 - Expanded to Managed Services in 2012 Currently Pursuing - FISMA Low Accreditation - Includes 3 rd party assessment - Expected completion over next several months - Safe Harbor Self-Certification Future - Addresses Privacy - FedRAMP Moderate - Incorporates more advanced security controls

ArcGIS Security Advancements Upcoming ArcGIS Online Security Capabilities Federated Identity Management - SAML 2.0 Web SSO Profile - Beta - March 2013 - Production - Summer 2013 - ADFS & CA SiteMinder ArcGIS Online Browser Agency More granular role permissions - Allow customization of roles and rights Sign into and use ArcGIS Online using your Enterprise login / identity.

ArcGIS Security Advancements ArcGIS Desktop Self-Certifications FDCC - Desktop products 9.3-10 USGCB - Desktop products 10.1

ArcGIS Security Advancements Upcoming ArcGIS Server / Portal Security Capabilities Agency Identity Provider ArcGIS Server Shared Users & Roles (Federated) ArcGIS Portal Agency Certificate Authority Extending on-premises authentication & authorization capabilities

ArcGIS Security Advancements Additional ArcGIS Security Resources Available Now - ArcGIS Online Security Flyer - http://www.esri.com/software/arcgis/arcgisonline/~/media/files/pdfs/ / software/arcgis/arcgis-online/agol-security-overview-flyer.pdf - Enterprise Security Resource Center - http://resources.arcgis.com/en/communities/enterprisegis/01n200000004000000.htm Future - ArcGIS Server STIG - DISA / FISMA Alignment - ArcGIS Online Cloud Security Alliance (STAR) - Standardized cloud security control documentation

Summary

Summary Cloud security is NOT just about technology - Understand your organizations Cloud GIS risk level - Utilize Defense-In-Depth ArcGIS Cloud Capabilities are expanding rapidly - Deployments across numerous cloud providers - Deployments in government community clouds Expect standardized cloud security from Esri - Product Security Capabilities SAML Web SSO - Alignment with Federal Regulations FedRAMP, FISMA - Security Control Documentation CSA - Security Hardened Images Checklist Don t forget to take 5 minutes to check your IaaS!

What is still needed? Your Input is Crucial Your Feedback and Insight Today is Essential - Current Security Issues - Upcoming Security Requirements - Areas of concern Not addressed Today Contact Us At: Enterprise Security esinfo@esri.com

Wednesday Closing Session Closing and Hosted Lunch 11:30 AM 1:30 PM Ballrooms A C, Third Level Join conference attendees for lunch and closing session Closing Speaker Todd Park, U.S. CTO Wrap-up and request for feedback with Jack Dangermond.

Upcoming Events esri.com/events Date Event Location March 21, 2013 Esri DC Meet Up Big Data & Location Analytics Washington, DC April 18, 2013 Esri DC Meet Up Washington, DC March 23 26, 2013 Esri Partner Conference Palm Springs, CA March 25 28, 2013 Esri Developer Summit Palm Springs, CA July 6 9, 2013 Esri National Security Summit San Diego, CA July 8 12, 2013 Esri International User Conference San Diego, CA

Thank You Please complete a session evaluation form. #FedGIS