How To Protect Your Data From Being Compromised On A Cell Phone Or Computer



Similar documents
HIPAA Security Alert

HIPAA Security. assistance with implementation of the. security standards. This series aims to

SecureAge SecureDs Data Breach Prevention Solution

HIPAA Security Training Manual

DriveLock and Windows 7

How to use the Alertsec Service to Achieve HIPAA Compliance for Your Organization

SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA)

MOBILE DEVICE SECURITY POLICY

The HIPAA Security Rule Primer Compliance Date: April 20, 2005

Achieving HIPAA Security Rule Compliance with Lumension Solutions

HIPAA Security. 2 Security Standards: Administrative Safeguards. Security Topics

Ensuring HIPAA Compliance with AcclaimVault Online Backup and Archiving Services

RSA Solution Brief. RSA SecurID Authentication in Action: Securing Privileged User Access. RSA Solution Brief

The HIPAA Security Rule Primer A Guide For Mental Health Practitioners

Navigating Endpoint Encryption Technologies

Innovative Secure Boot System (SBS) with a smartcard.

Information Technology Security Policies

MCTS Guide to Microsoft Windows 7. Chapter 7 Windows 7 Security Features

COVER SHEET OF POLICY DOCUMENT Code Number Policy Document Name

Two-factor authentication Free portable encryption for USB drive Hardware disk encryption Face recognition logon

Estate Agents Authority

Ensuring HIPAA Compliance with Pros 4 Technology Online Backup and Archiving Services

Implementing HIPAA Compliance with ScriptLogic

How To Protect Your Information From Being Hacked By A Hacker

FileCloud Security FAQ

Information Security Policy. Policy and Procedures

Network and Workstation Acceptable Use Policy

Newcastle University Information Security Procedures Version 3

HIPAA Compliance (DSHS and HCA) Preamble: This section of the Contract is the Business Associate Agreement as

DriveLock and Windows 8

Nationwide Review of CMS s HIPAA Oversight. Brian C. Johnson, CPA, CISA. Wednesday, January 19, 2011

CSG & Cyberoam Endpoint Data Protection. Ubiquitous USBs - Leaving Millions on the Table

Secure and Safe Computing Primer Examples of Desktop and Laptop standards and guidelines

HIPAA Security COMPLIANCE Checklist For Employers

Protecting Personal Information: The Massachusetts Data Security Regulation (201 CMR 17.00)

Did you know your security solution can help with PCI compliance too?

HIPAA Compliance Evaluation Report

Guide to Vulnerability Management for Small Companies

INFORMATION UPDATE: Removable media - Storage and Retention of Data - Research Studies

Pointsec Enterprise Encryption and Access Control for Laptops and Workstations

State of South Carolina Policy Guidance and Training

ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster

GFI Product Manual. Administrator Guide

Ensuring HIPAA Compliance with Computer BYTES Online Backup and Archiving Services

MANAGED FILE TRANSFER: 10 STEPS TO HIPAA/HITECH COMPLIANCE

Aegis Padlock for business

NetWrix USB Blocker. Version 3.6 Administrator Guide

University of Pittsburgh Security Assessment Questionnaire (v1.5)

WICKSoft Mobile Documents for the BlackBerry Security white paper mobile document access for the Enterprise

GoldKey Software. User s Manual. Revision WideBand Corporation Copyright WideBand Corporation. All Rights Reserved.

HIPAA Security. 4 Security Standards: Technical Safeguards. Security Topics

Hot Topics in IT Security PREP#28 May 1, David Woska, Ph.D. OCIO Security

HIPAA: MANAGING ACCESS TO SYSTEMS STORING ephi WITH SECRET SERVER

Course: Information Security Management in e-governance

Driving Company Security is Challenging. Centralized Management Makes it Simple.

Are your multi-function printers a security risk? Here are five key strategies for safeguarding your data

Ohio Supercomputer Center

MANAGED FILE TRANSFER: 10 STEPS TO SOX COMPLIANCE

System Security Policy Management: Advanced Audit Tasks

Vendor Questionnaire

HIPAA Security. 6 Basics of Risk Analysis and Risk Management. Security Topics

Cyber Self Assessment

White Paper Instant Messaging (IM) HIPAA Compliance

HIPAA Compliance Review Analysis and Summary of Results

HIPAA Security Series

Information Technology Services Guidelines

Symantec Endpoint Encryption Device Control Release Notes

Virginia Commonwealth University School of Medicine Information Security Standard

INFORMATION SECURITY SPECIFIC VENDOR COMPLIANCE PROGRAM (VCP) ACME Consulting Services, Inc.

Procedure Title: TennDent HIPAA Security Awareness and Training

13. Acceptable Use Policy

Protecting personally identifiable information: What data is at risk and what you can do about it

GFI EndPointSecurity 4.3. Getting Started Guide

HIPAA Happenings in Hospital Systems. Donna J Brock, RHIT System HIM Audit & Privacy Coordinator

HIPAA COMPLIANCE AND DATA PROTECTION Page 1

NetWrix USB Blocker Version 3.6 Quick Start Guide

Full Disk Encryption Drives & Management Software. The Ultimate Security Solution For Data At Rest

Encryption Buyers Guide

Security Compliance, Vendor Questions, a Word on Encryption

nwstor Storage Security Solution 1. Executive Summary 2. Need for Data Security 3. Solution: nwstor isav Storage Security Appliances 4.

Transcription:

Encryption Options for Secure Portable Media By Faith M. Heikkila Pivot Group Information Security Consultant And Ph.D. Candidate at Nova Southeastern University 1

Introduction What is portable or removable media? Human threats Regulatory compliance Encryption software for removable media Security policy for removable media encryption Conclusion 2

Portable/Removable Media Workforce has become more dependent upon being mobile the risk of inadvertent disclosure increases Pervasive computing has generated a number of devices to assist with mobility Predicted by IDC 2005 Worldwide Handheld QView Report: Small highly portable (read pocket-sized or smaller) storage devices will grow from 18 million in 2004 to over 100 million in 2008 (CSI Alert, Herold, March 2006, p. 5). 3

USB pen drives (thumb drives, flash drives, etc.) CDs and DVDs Floppy Disks Laptops Portable/Removable Media 4

Storage Device Facts (Herold, 2006, p. 5) USB pen drives and flash drives Easy to conceal look like pens Easy to lose or steal 16 GB or more of storage USB pocket-sized storage devices 100 GB storage Cell phones 100 GB storage soon MP3 and mobile video players 100 GB storage CSI Alert March 2006 5

PointSec survey Portable/Removable Media 99% of mobile device users use no encryption to protect data (Herold, 2006, p. 6). The financial losses associated with the inadvertent disclosure of sensitive information can be staggering (Yu & Chiueh, 2004). 6

Human Threats With the proliferation of removable media devices The battle of protecting sensitive information from employees within the organization has begun in earnest. According to Millman (2004), as long as people are fallible, they will be tempted to look at things they shouldn t or steal things from the companies they work for (p. 52). 7

Human Threats Insider Threats Information must be protected Personally identifiable information Trade secrets Intellectual property Sensitive and confidential information Removable and portable media devices Deliberately or unintentionally introduce a virus or malicious code into network or individual computer By-pass IDS and anti-virus protection safeguards Easily remove massive amounts of data Employee theft of sensitive data 8

Regulatory Compliance Requires that sensitive data: Be adequately safeguarded from inadvertent disclosure An audit trail is available (Milas, 2004). Laws requiring administrative, physical, and technical safeguards for compliance California Senate Bill 1386 of 2002 (SB 1386) Gramm-Leach-Bliley Act of 1999 (GLB) Health Insurance and Portability Act (HIPAA) Sarbanes-Oxley Act of 2002 (SOX) 9

HIPAA Compliance HIPAA Security Final Ruling dated February 20, 2003 Technical Safeguards (CMS, 2003): Protection of electronic patient health information (ephi) 164.312 (a)(1) Access Control & (a)(2)(iv) Encryption and Decryption (addressable) ISO 17799 10.3 Cryptographic Controls ISO 17799 10.3.2 Encryption Authentication measures must be applied to ensure that data is protected from corruption Encryption is a feasible method to achieve this requirement 10

HIPAA Compliance 164.312 (e)(1) Transmission Security & (e)(2)(ii) Encryption (addressable) ISO 17799 10.3 Cryptographic Controls ISO 17799 10.3.2 Encryption Transmissions Utilizing Removable Electronic Media If the transport of data is on removable electronic media such as a CD-ROM, floppy, memory card, magnetic tape drives, etc, the sender must verify the following: The data is encrypted The party that is receiving the data is authenticated Only the minimal amount of electronic patient health information (ephi) necessary to accomplish the task is included 11

HIPAA Compliance HIPAA penalties for such disclosure Civil penalties $100 per person for violating transaction standards Up to $25,000 per person per violation Criminal penalties From $50,000 up to in excess of $250,000 per incident Plus, prison time from one to ten years for the sale of ephi (The HIPAA Academy, 2003). Thus, the stakes are high in the event that sensitive data is compromised. 12

Encryption Solutions Insider Threat and Mobile Workforce Security Solutions Encryption of sensitive data at rest on computers Encrypts/decrypts hard drive Difficult for the curious or malicious unauthorized user to access information Laptops lost or stolen would not reveal highly confidential information Removable media encryption Removable media encryption/authentication software Log created in a database to monitor documents downloaded CDs, floppy disks, USB flash drives must be authorized and authenticated prior to downloading information 13

Key Features of Removable Media Encryption Encryption of data Strong passwords enforced How many/what type of characters will be required for the strong password Conformity to company policies Authentication of device Authorization of removable media on network Alerts Auditing logs available with the software 14

Authentication Profile approach to creating user permissions Roles are created with corresponding access rights Match those on the domain controller Incorporated by a number of encryption software products Guest account creation that grants standardized rights for all guests 15

Authentication Administrator override of the user s password for unlocking the encrypted device In the event that a password is compromised If an employee is terminated This flexibility allows for the immediate denial of access to a terminated employee or the resetting of a forgotten password. This is also an appropriate and necessary regulatory compliance requirement 16

Authorization for Removable Media Authorize and Review Contents Prior to allowing access to the organization s computer and/or network If there are any unwanted or unsafe file types on the removable media: Fail authorization Not provide access to any of the removable media files on the removable media device 17

Authorization for Removable Media In the event that there are legitimate files on the removable media files and a rogue executable is also downloaded on it: Must be an option available to browse the media Ability to delete this executable so that authorization will be granted Enforcement of a virus scan of the device using the anti-virus scanning software available on the computer This provides another defense against the inadvertent perpetuation of viruses on the network. 18

Removable Media Software 1. DeviceLock http://www.protect-me.com/dl/ 2. PointSec Media Encryption http://www.pointsec.com/products/removablemedia/ 3. SecureWave Sanctuary Device Control http://www.securewave.com/sanctuary_dc.jsp 4. Reflex Magnetics Disknet Pro http://www.reflex Magnetics.com/products/disknetpro/ 5. True Crypt Open source on the fly encryption http://www.truecrypt.org/ 19

Russian company Device auditing Records download/upload activity Customizable reports in Excel DeviceLock Group policy and Active Directory integration Generate a report showing permissions Lock out plug-n-play devices White list authorization available 20

Pointsec Media Encryption North American headquarters are located in Lisle, Illinois (outside Chicago). European headquarters are in Stockholm, Sweden. Transparent encryption Administrator controls What information must be encrypted Password length and strength Maximum number of failed authentication attempts 21

Pointsec Media Encryption http://www.pointsec.com/products/removablemedia/ 22

SecureWave Sanctuary Device Control Lock out all plug-n-play devices by default White list authorization available Uses Access Control Lists (ACLs) for authorization Provides an audit log Allowed or attempted access with removable media Assists with proof of compliance Maps to Active Directory and edirectory objects 23

SecureWave Sanctuary Device Control Sanctuary controls the use of a huge range of devices that are key sources of security breaches Managed according to their type not on how they are connected http://www.securewave.com/sanctuary_dc.jsp 24

Reflex Magnetics Disknet Pro London-based company On the market since 1991 Commercially available in the United States in 1994 James Shaeffer & Associates vendor in Ann Arbor Enforces encryption of data on removable media Helpful if an employee wants to take sensitive data home to work on If they lose the removable media, the data is safe because of the AES encryption 25

Reflex Magnetics Disknet Pro Software Allows the system administrator to: set permissions for each individual or user group using its profile driven approach These profile templates integrate seamlessly with existing domain users and group structure management overhead is kept to a minimum. Whenever an employee plugs in a USB flash drive into a company computer before access is granted: the device must first be authorized content checked and digitally tagged 26

Reflex Magnetics Disknet Pro Once authorized, any files copied to the device are fully audited and stored centrally in a MYSQL database This filtered approach to auditing Cuts down on unwanted traffic Ensures that administrators can query the logs that have been obtained Alerts are sent to IT administrators These audit logs include What document was copied Date Time Username 27

Program Security Guard (PSG) Disknet Pro feature Allows the administrator to block the importing, deletion, or creation of certain file types Capacity to create a customized exemption list so that company specified trusted applications are allowed access 28

Reflex Magnetics Disknet Pro Writes an authorization tag for removable media devices to only work in organization s environment Digital tag will stay authorized until taken outside of the Disknet Pro environment Checks for offline revisions Will have to reauthorize the file when it comes back into network from home Have a way to revoke authorization of the whole corporation to get a number of memory sticks reauthorized Important when terminating an employee 29

Free ware Open-Source disk encryption Allows a duress partition with false information encrypted Windows and Linux On-the-fly encryption of USB flash drives Personal-class encryption tool Does not have enterprise class features Auditing Alerts True Crypt 30

AUDIT LOGS ALERTS AUTHORIZATION/ AUTHENTICATION OF DEVICE ENCRYPTION OF DATA ENFORCE STRONG PASSWORDS DeviceLock Unknown Set permissions at device type level, port level and individual device level Unknown PointSec Media Encryption Unknown Unknown Unknown Reflex Magnetics Disknet Pro SecureWave Sanctuary Device Control Fully configurable filters and audit analysis reports; stored in an MS SQL database; Shadowing option to copy files or just filenames Configurable email alerts Unknown Set permissions by type, brand, or model - Supports both blacklists and whitelists By default access denied. Must be authorized using ACLs Enforceable device encryption utilizing AES 128/256 bit algorithm EPM Explorer enables secure offline access of encrypted devices without the need to install software True Crypt None None Unknown 31

SYSTEM REQUIREMENTS GROUP POLICY SUPPORTS LOCKING DeviceLock Windows NT/ 2000/XP or Windows Server 2003 Microsoft Active Directory Microsoft Management Console (MMC) Floppies, CD-ROMs/DVDs, Any removable storage, Hard drives, Tape drives, WiFi Adapters, and Bluetooth adapters PointSec Media Encryption Windows 2000/XP Unknown USB/USB2/PCCARD, Firewire memory cards, Storage media, and Floppies Reflex Magnetics Disknet Pro - Microsoft SQL Server or MSDE - Microsoft Windows 2000/XP Professional/ Server 2003 - Novell - Linux Microsoft Active Directory Microsoft Management Console (MMC) Novell e-directory Linux Apple Ipods, Floppies, CD-ROMs/DVDs, Any removable storage Hard drives, Tape drives, WiFi Adapters, and Bluetooth adapters SecureWave Sanctuary Device Control - Microsoft SQL Server or MSDE - Microsoft Windows 2000/XP Professional/ Server 2003 - Novell Microsoft Active Directory Novell e-directory USB Memory Sticks, Tape/Hard/Zip Drives, Floppies, PDAs, CD/DVDs, and Smart Card Readers True Crypt - Windows XP/ 2000/2003/Vista - Linux Unknown USB hard disks, floppy disks, USB memory sticks, and other types of storage devices. 32

Security Policies/Training How many people have: Security policies for portable and/or removable computing devices? Is encryption required? Training on how to use and safeguard removable and/or portable media? 33

ephi Security Policy Example To ensure access to ephi data is limited to only authorized users, the following policies shall be adopted: All mobile computer devices shall have the capability to encrypt sensitive hospital related files. No ephi files may be loaded onto mobile computers or removable media devices without the data being encrypted. All laptop computers shall have encryption software that will authenticate and authorize users to allow access to the computer s hard drive. No ephi data may be removed from the hospital without formal application to do so. A mobile data information form must be filed with the IS security office before the data is taken out of the hospital. Data on mobile systems may not be copied onto other media for any purpose. 34

Conclusion As more employees embrace removable media devices: it is critical that employers guard against the removal of company trade secrets intellectual property personally identifiable information sensitive data from walking out the door. There are also legitimate business purposes for taking files home or on the road. Therefore, there must be a balance between allowing employees to do their job successfully preventing the theft or unintentional loss of data. 35

Next Steps look, plan, act, repeat 36

Questions? Thank You! 37

Faith M. Heikkila Information Security Consultant Contact Information Pivot Group - look, plan, act, repeat O: 269-353-7537 C: 616-430-8056 E: fheikkila@pivotgroup.net W: www.pivotgroup.net 38

References Centers for Medicare & Medicaid Services CMS. (2003, February 20). HIPAA administrative simplification security: Final rule. Federal Register, 68(34), 8334-8381. Herold, R. (2006, March). Lexus laptop lockers. Computer Security Institute Alert, 5-6. Milas, B. (2004, October). ID mapping: The compliance key. SC Magazine, 74. Millman, R. (2004, October). Product reviews: DiskNet Pro 4. SC Magazine, 52. The HIPAA Academy. (2003). HIPAA penalties. HIPAAAcademy.net. Retrieved November 25, 2004, from http://www.hipaaacademy.net/hipaapenalties.html. Yu, Y. & Chiueh, T-C. (2004, October 25). Display-only file server: A solution against information theft due to insider attack. Proceedings of the 4 th ACM Workshop on Digital Rights Management, Washington, D.C., 31-39. 39