2013 AWS Worldwide Public Sector Summit Washington, D.C.



Similar documents
Zero Trust. Privileged Access Management

2: Do not use vendor-supplied defaults for system passwords and other security parameters

Appendix C Pricing Index DIR Contract Number DIR-TSO-2724

Centrify Cloud Connector Deployment Guide

Creating a Strong Security Infrastructure for Exposing JBoss Services

PCI COMPLIANCE ON AWS: HOW TREND MICRO CAN HELP

Secure Cloud Computing

Top 12 Must-Have Features for Privileged Password Management

Alliance Key Manager Solution Brief

Ensuring the Security of Your Company s Data & Identities. a best practices guide

STATE OF NEW YORK IT Transformation. Request For Information (RFI) Enterprise Identity and Access Management Consolidated Questions and Responses

Oracle Privileged Account Manager 11gR2. Karsten Müller-Corbach

Blending Embedded Hardware OTP, SSO, and Out of Band Auth for Secure Cloud Access

Managing Privileged Identities in the Cloud. How Privileged Identity Management Evolved to a Service Platform

How To Manage A Privileged Account Management

CSN38:Tracking Privileged User Access within an ArcSight Logger and SIEM Environment Philip Lieberman, President and CEO

Single Sign-On. Security and comfort can be friend. Arnd Langguth. September, 2006

Application Security Best Practices. Matt Tavis Principal Solutions Architect

ProtectV. Securing Sensitive Data in Virtual and Cloud Environments. Executive Summary

Data Protection: From PKI to Virtualization & Cloud

PCI COMPLIANCE ON AWS: HOW TREND MICRO CAN HELP

Ensuring Enterprise Data Security with Secure Mobile File Sharing.

Vormetric Addendum to VMware Solution Guide for Payment Card Industry Data Security Standard

Identity and Access Management Integration with PowerBroker. Providing Complete Visibility and Auditing of Identities

Identity & Access Management The Cloud Perspective. Andrea Themistou 08 October 2015

Intelligent Security Design, Development and Acquisition

Alliance Key Manager A Solution Brief for Technical Implementers

EXTENDING SINGLE SIGN-ON TO AMAZON WEB SERVICES

Cloud Security Case Study Amazon Web Services. Ugo Piazzalunga Technical Manager, IT Security

Cloud Security Implications for Financial Institutions By Scott Galyk Director of Software Development FIMAC Solutions, LLC

Understanding Enterprise Cloud Governance

Trust but Verify: Best Practices for Monitoring Privileged Users

Copyright 2013, Oracle and/or its affiliates. All rights reserved.

C21 Introduction to User Access

EXECUTIVE VIEW. CA Privileged Identity Manager. KuppingerCole Report

Securing sensitive data at Rest ProtectFile, ProtectDb and ProtectV. Nadav Elkabets Presale Consultant

SECURING SENSITIVE DATA WITHIN AMAZON WEB SERVICES EC2 AND EBS

Securing Data in Oracle Database 12c

Privileged. Account Management. Accounts Discovery, Password Protection & Management. Overview. Privileged. Accounts Discovery

API-Security Gateway Dirk Krafzig

ENCRYPTION KEY MANAGEMENT SIMPLIFIED A BEGINNER S GUIDE TO ENCRYPTION KEY MANAGEMENT

Google Identity Services for work

Cloud Computing. Mike Bourgeois Platform as a Service Point of View September 17, 2015

Hybrid Cloud Identity and Access Management Challenges

Securing Sensitive Data within Amazon Web Services EC2 and EBS

Product overview. CA SiteMinder lets you manage and deploy secure web applications to: Increase new business opportunities

Simone Brunozzi, AWS Technology Evangelist, APAC. Fortress in the Cloud

How to Provide Secure Single Sign-On and Identity-Based Access Control for Cloud Applications

RSA SecurID Two-factor Authentication

Managing Your Microsoft Windows Server Fleet with AWS Directory Service. May 2015

Cloud models and compliance requirements which is right for you?

MANAGE SECURE ACCESS TO APPLICATIONS BASED ON USER IDENTITY. EMEA Webinar July 2013

Security Overview Enterprise-Class Secure Mobile File Sharing

Securing Privileges in the Cloud. A Clear View of Challenges, Solutions and Business Benefits

Single Sign On. SSO & ID Management for Web and Mobile Applications

CoSign by ARX for PIV Cards

identity as the new perimeter: securely embracing cloud, mobile and social media agility made possible

Securing Data in the Virtual Data Center and Cloud: Requirements for Effective Encryption

Best Practices in Identity and Access Management (I&AM) for Regulatory Compliance. RSA Security and Accenture February 26, :00 AM

QRadar SIEM 6.3 Datasheet

NetworkingPS Federated Identity Solution Solutions Overview

Enabling Single Sign-On for Oracle Applications Oracle Applications Users Group PAGE 1

Cloud Security and Managing Use Risks

Secure your cloud applications by building solid foundations with enterprise (security ) architecture

Cloud Security Through Threat Modeling. Robert M. Zigweid Director of Services for IOActive

PROTECT YOUR WORLD. Identity Management Solutions and Services

MySQL Security: Best Practices

How To Manage A Cloud System

Top. Reasons Federal Government Agencies Select kiteworks by Accellion

Secret Server Qualys Integration Guide

Securing Oracle E-Business Suite in the Cloud

Cloud Data Security. Sol Cates

How To Achieve Pca Compliance With Redhat Enterprise Linux

SOLUTION BRIEF CA TECHNOLOGIES IDENTITY-CENTRIC SECURITY. How Can I Both Enable and Protect My Organization in the New Application Economy?

Cloud IaaS: Security Considerations

Take Control of Identities & Data Loss. Vipul Kumra

THE BLUENOSE SECURITY FRAMEWORK

What s New in Centrify DirectAudit 2.0

Software and Cloud Security

Secure Identity in Cloud Computing

Mobile Admin Architecture

PROVIDING SINGLE SIGN-ON TO AMAZON EC2 APPLICATIONS FROM AN ON-PREMISES WINDOWS DOMAIN

Deploy XenApp 7.5 and 7.6 and XenDesktop 7.5 and 7.6 with Amazon VPC

Security & Cloud Services IAN KAYNE

Copyright 2012, Oracle and/or its affiliates. All rights reserved.

Evaluating IaaS security risks

Identity & Access Management

Card Management System Integration Made Easy: Tools for Enrollment and Management of Certificates. September 2006

Audio: This overview module contains an introduction, five lessons, and a conclusion.

Implementing Software- Defined Security with CloudPassage Halo

SWOT Assessment: BeyondTrust Privileged Identity Management Portfolio

CloudPassage Halo Technical Overview

Creating a DUO MFA Service in AWS

1 Building an Identity Management Business Case. 2 Agenda. 3 Business Challenges

Transcription:

Washington, D.C. Next Generation Privileged Identity Management Control and Audit Privileged Access Across Hybrid Cloud Environments Ken Ammon, Chief Strategy Officer

Who We Are Security software company providing Next Generation Privileged Identity Management solutions Global Fortune 1000 and Government customer base Headquartered in Herndon, VA Xsuite Platform Best Privileged Access Management Solution Best Overall IT Company RSA 2011 Hot New Security Product Cool Vendor Hot Company to Watch Top 100 Global Company FIPS 140-2, Level-2 Common Criteria EAL 4+ UC/Approved Prod. List

Our Customers Include Commercial Federal Top 5 Global Bank Top 3 Telecommunications Company Fortune 10 Financial Services Company Top 5 Global Retailer Multiple Global Stock Exchanges Fortune 200 Food Products Company Top 3 Online Broker Top 3 Smart Phone Provider Top 3 Food and Drug Retailer

The Problem We Solve Protect Enterprises from Privileged User Risks Reduced Complexity of Audit and Compliance Controls PCI/DSS, HIPAA/HITECH, NERC CIP, FISMA, GLBA, SOX Privilege Usage Gateway to Manage Access Across Traditional, Virtualized, Cloud, and Hybrid Environments Enable Secure Migration of Enterprise Applications to the Cloud Federate Privileged Identity Across Hybrid Cloud Environments Separate Authentication from Authorization

Deploy Privileged Account Management for IaaS and Private Cloud Administrators of private cloud and IaaS environments gain more concentrated power and the risk that goes with it..additional controls should be put in place around the privileged accounts within these environments and employ privileged account management products to aid in placing finer-grained controls around the additional operations that these environments provide. -Nick Nikols, Analyst for Gartner The State of Identity and Access Management With Regard to Public and Private Clouds

Compliance and Audit Controls, Directives, Policy, Frameworks. HSPD-12, CAP Goals (PIV, Cont. Monitoring, TIC) NIST SP-800-53(r4) (Insider Threat, Cloud) Audit Findings (POAM) Shared accounts ( who was root ) Shared credentials (email / sticky note) Weak / default passwords Poor privilege management and role-based access Violating least privilege

DoD 8520.03- Identity Authentication for Information Systems Credential Strength E all administrative access Hardware token PKI technology Identity proofing Identity vetting Credential registration Credential Management i.e. DoD Common Access Card

Who Are Privileged Users? On Premise VMware Administrator Microsoft Office 365 Administrator Employees/Partners Systems Admins Network Admins DB Admins Apps Application Admins AWS Administrator Public Cloud Employees Systems/NW/DB/A pplication Admins Internet Partners Systems/NW/DB/Application Admins Unauthorized User Hacker (Malware/APT) Apps

Migration to the New Enterprise STAGE 1: Server Virtualization Figure 2. The Virtualization Road Map Through Private Cloud Computing STAGE 2: Distributed Virtualization STAGE 3: Private Cloud MANAGEMENT PLANE STAGE 4: Hybrid Cloud STAGE 5: Public Cloud Business Drivers: Cost Reduction Speed Agility New Applications Software Defined IT Infrastructure New IT Operations Model Consolidation Capital expense Source: Gartner (February 2012) Flexibility and speed Operational expense automation Less downtime Self-serve agility Standardization IT as a business Usage metering Costs for peak loads Flexibility for peak loads Capital expense elimination Increased flexibility (up and down) New Risk/Compliance Issues

NIST 800-125 Guide to Security for Full Virtualization Technology Restrict and protect administrator access to the virtualization solution The security of the entire virtual infrastructure relies on the security of the virtualization management system start guest OSs, create new guest OS images, and perform other administrative actions. Because of the security implications of these actions, access to the virtualization management system should be restricted to authorized administrators only. Secure each management interface, whether locally or remotely accessible. For remote administration, the confidentiality of communications should be protected, such as through use of FIPS-approved cryptographic algorithms and modules.

NIST 500-299 Cloud Security Architecture

NIST Cloud Security Architecture Privilege Management Infrastructure Identity Management Domain Unique Identifier Identity Provisioning Authorization Services Policy Enforcement Policy Management Resource or Data Management Role Management Out of the Box (OTB) Federated IDM Attribute Provisioning Policy Definition Privileged Data Management XACML Obligation Authentication Services SAML Token OTP Biometrics Risk Based Authenticati on Smart Card Single Sign On WS Security Identity Verification Privilege Usage Management Keystroke/Sessio n Logging Privilege Usage Gateway Multifactor Password Management Network Authentication Middleware Authentication OTB Password Vaulting Resource Protection NIST 800-53 (r4) Security Controls

Introducing Xsuite Next Generation Privileged Identity Management New Enterprise Traditional Data Center Virtualized Data Center Public Cloud - IaaS SaaS Applications Mainframe, Windows, Linux, Unix, Networking VMware Console AWS Console & APIs Office 365 Console Control and Audit All Privileged Access Vault Credentials Centralized Authentication Federated Identity Privileged Single Sign-on Role-Based Access Control Prevent Leapfrogging Monitor & Record Sessions Full Attribution Unified Policy Management Identity Integration Enterprise-Class Core Hardware Appliance OVF Virtual Appliance AWS AMI

Xsuite Security Admin High Level Xsuite Architecture - Security, Compliance, and Audit simplified Web Interface Privileged User Authentication Service Federated Privileged Identity Service Security Policy Engine (Authorization Services) Password and Key Vaulting and FIPS 140-2 Encryption Session Applets API Proxy Keystroke and Session Recording Alerting, Logging, and Resource Protection Privileged Identity and Authentication Management HSM Crypto Support Target Cloud, Application or Host Platform Third Party Log and SIEM Platform Third Party Encryption, Identity Providers, and X.509 Services Directory Services (LDAP, AD FS, AD)

Xsuite In Action Attribute Identity for Shared Accounts (e.g., Root/Admin) Prevent Leapfrogging Record Sessions Monitor Sessions & Prevent Unauthorized Commands Control Access to Target Systems Positively Authenticate Users Vault & Manage Credentials Session Logs Credential Safe Policies Before: After: ID: abc123 PW: password ID: abc123 PW:x8km&eie10$z*!B

Xsuite for AWS Security Across AWS Regions, Management Console, and APIs Xceedium Announces Privileged User Protection for AWS Cloud Management APIs New Xsuite API Proxy Controls, Monitors, and Audits All Programmatic Access to AWS Cloud Management Infrastructure

AWS Management API Security Shared credentials are typical Key Pair, Secret URL Difficult to attribute privileged API activities to unique users No log files of what happened Key Pair Secret URL CLI AWS IAM Service SDKs Python, PHP, Pearl, etc. AWS APIs (Compute/Networking, Storage/Content Delivery, App Services, Database)

Xsuite for AWS API Proxy Public Cloud/ Gov. Cloud/ VPC AWS API Console Single point of access control, monitoring, and audit - all activity with AWS Management Console and REST APIs Role-based API access control for programmatic and manual AWS API Access Separation of duties Full, real-time bi-directional audit trail of all API calls Attribute AWS API activity to a specific user no need to add users to AWS Identity and Access Management (IAM) Uses alternative credentials valid only with the Xsuite AWS API Proxy no direct access to AWS APIs Vault and manage the credentials used by scripts to access AWS APIs and eliminate the practice of sharing these important keys

Core Xsuite Capabilities Comprehensive Protection for Management Consoles, APIs and Guest Systems: Role Based Privileged Access Control Password and Access Key Vaulting & Management Application-to-Application Password Vaulting Privileged User Single Sign-On Full Audit Trail and Session Recording Full Identity Attribution for Shared Accounts Auto-discovery and Provisioning Smartcard-based Multi-Factor Authentication High Assurance and Public Sector Ready

What Sets Xceedium Apart? Next Generation Privileged Identity Management Xsuite is the Only Platform With: A comprehensive set of well integrated controls enforced across hybrid cloud environments Single policy enforcement point across hybrid-cloud environments Unified policy management Protection for both management consoles and guest systems Integration with VMware, Amazon Web Services and Microsoft Office 365 Control and Auditing of AWS management API calls Specifically architected for dynamic, elastic cloud environments Choice of appliance form factor: hardware, OVF or AMI Proven Performance, Reliability, Scalability Most Highly Certified Solution Available

Contact Us 2214 Rock Hill Road, Suite 100 Herndon, VA 20170 Phone: 866-636-5803 info@xceedium.com @Xceedium facebook.com/xceedium

Thank You