Security as Architecture A fine grained multi-tiered containment strategy



Similar documents
CLOUD SECURITY: THE GRAND CHALLENGE

Provide access control with innovative solutions from IBM.

Strengthen security with intelligent identity and access management

Mobile, Cloud, Advanced Threats: A Unified Approach to Security

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

Addressing Cyber Security in Oracle Utilities Applications

When millions need access: Identity management in an increasingly connected world

Securing the Cloud through Comprehensive Identity Management Solution

The Benefits of an Integrated Approach to Security in the Cloud

API Management: Powered by SOA Software Dedicated Cloud

IBM QRadar Security Intelligence April 2013

Intelligent Security Design, Development and Acquisition

IBM Tivoli Federated Identity Manager

OPENIAM ACCESS MANAGER. Web Access Management made Easy

Cloud Security: The Grand Challenge

Cloud security architecture

How To Write An Architecture For An Bm Security Framework

The Challenges of Web single sign-on

RE Think. IT & Business. Invent. IBM SmartCloud Security. Dr. Khaled Negm, SMIEEE, ACM Fellow IBM SW Global Competency Center Leader GCC

Netzwerkvirtualisierung? Aber mit Sicherheit!

Security Solution Architecture for VDI

Leveraging innovative security solutions for government. Helping to protect government IT infrastructure, meet compliance demands and reduce costs

Post-Access Cyber Defense

IBM Security IBM Corporation IBM Corporation

CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL

Ragy Magdy Regional Channel Manager MEA IBM Security Systems

Service management White paper. Manage access control effectively across the enterprise with IBM solutions.

APIs The Next Hacker Target Or a Business and Security Opportunity?

How To Protect Your Virtual Infrastructure From Attack From A Cyber Threat

Defending against modern threats Kruger National Park ICCWS 2015

The Next Generation of Security Leaders

External Supplier Control Requirements

Lecture 02b Cloud Computing II

Identity Federation Broker for Service Cloud

Safeguarding the cloud with IBM Dynamic Cloud Security

Security Solutions to Meet NERC-CIP Requirements. Kevin Staggs, Honeywell Process Solutions

Secure Cloud Computing

Enterprise Cybersecurity: Building an Effective Defense

How does IBM deliver cloud security? An IBM paper covering SmartCloud Services 1

Preemptive security solutions for healthcare

Cloud computing White paper November IBM Point of View: Security and Cloud Computing

Cloud Essentials for Architects using OpenStack

IBM Security Intrusion Prevention Solutions

Take the Red Pill: Becoming One with Your Computing Environment using Security Intelligence

IBM Security Systems Solutions

SOLUTIONS. Secure Infrastructure as a Service for Production Workloads

Beyond passwords: Protect the mobile enterprise with smarter security solutions

Session 9: Changing Paradigms and Challenges Tools for Space Systems Cyber Situational Awareness

Triangle InfoSeCon. Alternative Approaches for Secure Operations in Cyberspace

Consolidated security management for mainframe clouds

Technology Blueprint. Protect Your Servers. Guard the data and availability that enable business-critical communications

The Protection Mission a constant endeavor

IBM EXAM QUESTIONS & ANSWERS

Security Issues in Cloud Computing

IBM Cloud Security Draft for Discussion September 12, IBM Corporation

ObserveIT User Activity Monitoring

8 Steps to Holistic Database Security

2011 Cyber Security and the Advanced Persistent Threat A Holistic View

Mitigating Information Security Risks of Virtualization Technologies

Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist,

A Look at the New Converged Data Center

BeyondInsight Version 5.6 New and Updated Features

NETWORK ACCESS CONTROL AND CLOUD SECURITY. Tran Song Dat Phuc SeoulTech 2015

PALANTIR CYBER An End-to-End Cyber Intelligence Platform for Analysis & Knowledge Management

NIST CYBERSECURITY FRAMEWORK COMPLIANCE WITH OBSERVEIT

F5 Identity and Access Management (IAM) Overview. Laurent PETROQUE Manager Field Systems Engineering, France

SCADA Security Measures

CAS8489 Delivering Security as a Service (SIEMaaS) November 2014

Applying IBM Security solutions to the NIST Cybersecurity Framework

<Insert Picture Here> Oracle Identity And Access Management

Virtualization Essentials

Security and Cloud Compunting - Security impacts, best practices and solutions -

VICNET is G-Cloud7 GOV UK Supplier VISIT DIGITAL MARKET PLACE VICNETCLOUD VICNET CLOUD MIGRATION SERVICES

Journey to the Private Cloud. Key Enabling Technologies

IBM Security Strategy

EXECUTIVE VIEW. CA Privileged Identity Manager. KuppingerCole Report

Metrics that Matter Security Risk Analytics

CLOUD STORAGE SECURITY INTRODUCTION. Gordon Arnold, IBM

IoT & SCADA Cyber Security Services

Network Access Control in Virtual Environments. Technical Note

Enterprise Security Architecture Concepts and Practice

Architecting and Building a Secure and Compliant Virtual Infrastructure and Private Cloud

Transcription:

1 Security as Architecture A fine grained multi-tiered containment strategy Andras R. Szakal IBM Distinguished Engineer Chief Software Architect, U.S. Federal SWG aszakal@us.ibm.com

2 Objectives Cybersecurity - A fine grained multitiered containment strategy Defining the problem Multi-Tier Containment Model Security Patterns and Blueprints

3 With the smarter planet opportunities come new security and privacy risks Protection of sensitive and large volumes of data, shared globally Protection of sensors and actuators in the wild Protection of digital identities

4 In order to meet risk management objectives, Smarter Planet solutions need to be Engineered for Security and Dependability. Risks & Threats Attacking Safety Theft of money or services Reputational Loss Privacy Violations Gaming the system Denial of Service Subverting situational awareness Wasting resources on false alarms Hijacking control of equipment Damaging assets Physical and logical tampering

5 Information Technology components and systems can contribute to Infrastructure Failures & Engineering Disasters Federal investigators said yesterday that they found "anomalies" in a key component of the electronic control system along the Metro track north of Fort Totten, suggesting that computers might have sent one Red Line train crashing into another. A train control system that should have prevented Monday's deadly Metro crash failed in a test conducted by federal investigators, officials said yesterday, suggesting that a crucial breakdown of technology sent one train slamming into another. The test results are significant because they confirmed earlier findings of "anomalies" in an electrical track circuit in the crash area. The findings suggest that the oncoming train in Monday's crash might not have received information that a train was stopped ahead on the rails north of the Fort Totten Station. If a malfunctioning circuit failed to detect the stopped train, it would have assumed that the stretch of track was clear and set the speed of her train at 59 mph, sending it hurtling into the stopped one.

6 Industry Solution Requirements Protecting a Smarter Planet a.k.a. Critical Infrastructure Cybersecuirty From an IBM perspective, Cybersecurity is the practice of achieving the resilience of a Smarter Planet

7 Case Study: Sensors and Actuators in the Wild Sensors and Actuators Sensors and In The Wild Actuators In The Wild Driver: Smarter Driver: Planet Industries Smarter Planet make highvalue Industries decisions make based highvalue information decisions that based on originates on information from that sensors originates in the from wild. sensors in the wild. Challenge: Sensors Challenge: are not sufficiently Sensors are physically not secure sufficiently and sensor physically data secure is not and sufficiently sensor protected data is not from sufficiently attack relative protected to the from high attack value relative decisions to the high that are value made decisions based on that them. are made based on them. The link between the points The link of data between the acquisition points of data and the point acquisition of data and the processing point of data is often broken. processing is often broken. Attacks Electric Actuator on a valve in a power plant (Source: Wikipedia)

8 What Are We Concerned About? People Physical Objects Biometrics Physical Location Physical Identities Human Accountability Privacy Physical Data Compliance {Netcentric Technology} Autonomous Control Real-time Processes Society High-Impact Processes Nature Legacy of Vulnerable Process Control Technology Physical Sensors in the wild Physical Actuators

9 Multi-Tier Architecture & Deperimeterization Multi-Tier Architecture - Our architectures have become componentized, service-based and distributed across platforms and service providers. We no longer have control over all our high value assets we have become deperimeterized.

10 Fine-Grained Multi-Tier Containment Supplier Integiry Identity Collaboration - Gov to Gov; Gov to Industry; Gov the Critical infrastructure; Industry to Industry (ICT) Information Assurance Smart Information Environments Data Protection throughout the lifecycle Defending Networks and gateways Persistent threat issues Continuous Network Monitoring High Performance Computing Federated Security Compliance - Trusted Partners validation of (Secure the Supply Chain) policies (IT) Collaboration & Community (Secure the Groups and Processes) Collaboration & Community (Group) Business / Mission (Secure the Services) SOA, Information (Service) Applications / Middleware (Secure the Middleware and Applications) Middleware Data Center/Cloud (Middleware Server) (Secure the Tenant) Platform Data Center/Network/Cloud (Secure the Platform) (Tenant) Data (Secure the Information) Platform (Process) Network (Secure the Transport Layer) Situational Awareness of the Government ecosystems Central Operations Center - government sensitive, civilian agencies/dept, CIP and industry IoD / Analytics Analytics / Dashboarding

11 Fine-Grained Multi-Tier Containment Identity Collaboration - Gov to Gov; Gov to Industry; Gov the Critical infrastructure; Industry to Industry (ICT) Information Assurance Smart Information Environments Data Protection throughout the lifecycle Defending Networks and gateways Persistent threat issues Supply Chain High Performance Computing Federated Trusted Security Partners (Secure the Supply Chain) Collaboration & Community (Secure the Groups and Processes) Collaboration & Community (Group) Business / Mission (Secure the Services) SOA, Information (Service) Applications / Middleware (Secure the Middleware and Applications) Middleware Data Center/Cloud (Middleware Server) (Secure the Tenant) Platform Data Center/Network/Cloud (Secure the Platform) (Tenant) Data (Secure the Information) Platform (Process) Network (Secure the Transport Layer) Compliance - validation of policies (IT) Situational Awareness of the Government ecosystems Central Operations Center - government sensitive, civilian agencies/dept, CIP and industry IoD / Analytics Analytics / Dashboarding

12 Multi-Tier Containment Strategy Federated Trusted Security Partners (Secure the Supply Chain) Collaboration & Community (Secure the Groups and Processes) Collaboration & Community (Group) Business / Mission (Secure the Services) SOA, Information (Service) Applications / Middleware (Secure the Middleware and Applications) Secure Each Teir / Layer Independenly Middleware Data Center/Cloud (Middleware Server) (Secure the Tenant) Platform Data Center/Network/Cloud (Secure the Platform) (Tenant) Data (Secure the Information) Platform (Process) Network (Secure the Transport Layer) Secure the Boundary Between Each Tier / Layer Cross-Cutting Security Services

13 Cybersecurity Model Based on the IBM Security Framework Fine-Grained Multi-Tier Containment

14 Cybersecurity Model Foundational Security Components Software, System & Service Assurance Identity, Access & Entitlement Mgmt Foundational Security Data & Information Protection Mgmt Threat & Vulnerability IT Service Command and Control Mgmt Security Policy Risk & Compliance Assessment Physical Asset

15 Secure the Platform (Operating Environment) Focus: Command and Control provides the command center for security management as well as the operational security capabilities for non-it assets and services to ensure protection, response, continuity and recovery. Includes: Providing the approving authority for security; ensuring that physical and operational security is maintained for locations, assets, humans, environment and utilities; providing surveillance and monitoring of locations, perimeters and areas; enforce entry controls; providing for positioning, tracking and identification of humans and assets; continuity and recovery operations. Foundational Security Mgmt Service Command and Control Mgmt Supervisory Control & Delegation of Authority Command Center Intelligence Service Continuity & Recovery Physical Asset Mgmt Security Services and Infrastructure Physical Security Identity, Access & Entitlement Infrastructure Policies Knowledge Security Service Level Objectives Surveillance & Monitoring Services Positioning and Tracking Services Environment & Utility Assurance Security Policy Infrastructure Detection Services Location, perimeter & area protection Service Mgmt and Process Automation IT Security Services and Mechanisms Entry Control Response Services Human Identification

16 Secure the Platform Architectural Pattern Security System Identity, Access & Entitlement Mgmt Business Service platform Delegation of authority Policies Data & Information Protection Mgmt Locations actors assets Command and Control Mgmt Security Policy Software, System & Service Assurance Processes Service directives and objectives IT Service Applications Compliance metrics Threat & Vulnerability Hosts and End-points Storage Compliance Reports Risk Posture Risk & Compliance Assessment Physical Asset Events & artifacts Networks Data Security Events & Logs Knowledge Infrastructure Service platform

17 Security Blueprint Patterns IBM Security Framework: Business Security Reference Model Governance, Risk, Compliance (GRC) Application & Process People & Identity IT Infrastructure: Network, Server, End Point Data & Information Physical Infrastructure Architectural Principles Software, System & Service Assurance Command and Control Mgmt Security Info and Event Infrastructure Network Security Identity, Access & Entitlement Mgmt Foundational Security Security Policy Security Services and Infrastructure Identity, Access & Entitlement Infrastructure Storage Security Data & Information Protection Mgmt Risk & Compliance Assessment Security Policy Infrastructure Host and End-point Security Threat & Vulnerability Physical Asset Cryptography, Key & Certificate Infrastructure Application Security IT Service Service and Process Automation Physical Security IT Security Services and Mechanisms Security Service Level Objectives Code & Images Designs Policies Configuration Info and Registry Identities & Attributes Resources Contexts Data Security Events & Logs Knowledge

18 Thank you! For more information, please visit: ibm.com/cloud Ibm.com/security

Identity, Access & Entitlement Focus: This sublayer provides all services related to roles and identities, access rights and entitlements. The goal of these services is to assure that access to resources has been given to the right identities, at the right time, for the right purpose. It also supports that access to resources is monitored and audited for unauthorized or unacceptable use. Foundational Security Mgmt Service Trust Mgmt Identity Lifecycle Credential Mgmt Role & Entitlement Enrollment Services Identity Issuing Credential Mgmt Role / Entitlement Modeling Compliance Compliance Reporting 19 Identity, Access and Entitlement Mgmt Proofing Services Identity Resolution Identity Provisioning Identity Re/certification Identity and Attribute Services Credential and Token Exchange Services Role / Entitlement Discovery Org and App Role Reputation Services Identity Revocation Single Sign-on Services Entitlement Security Services and Infrastructure Identity, Access & Entitlement Infrastructure Host & Endpoint Network Storage Application Identities & Attributes Security Service Level Objectives Authentication Nonrepudiation Authorization Directory and Attribute Services Access Control Entitlement Policy Policies Contexts Security Policy Infrastructure Cryptography, Key & Certificate Infrastructure IT Security Services and Mechanisms

20 Trusted Advisor Solution Provider Security Company The Company Security for the Cloud Security from the Cloud Security & Privacy Leadership

21 Cloud Security = SOA Security + Secure Virtualized Runtime Two examples: IBM Tivoli Federated Identity Manager IBM Security Virtual Server Protection

Example 1: IBM Tivoli Federated Identity Manager 22 Centralized user access management to on- and off-premise apps and services Wide variety of Federated SSO protocols SAML 1.0 / 1.1 / 2.0 WS-Federation Liberty ID-FF 1.1/ 1.2 Information Card Profile 1.0 OpenID Integration with IBM LotusLive, Google Apps, salesforce.com, etc. SMB A TFIM BG Enterprise B TFIM Enterprise C TFIM & TSPM Google Apps Salesforce Microsoft Tools for user enrollment, WS-Trust based security token services, web access management Simplify integration across Java,.NET and mainframe environments TFIM = Tivoli Federated Identity Manager TFIM BG = TFIM Business Gateway for SMB deployment TSPM = Tivoli Security Policy Manager for data entitlement management IBM Lotus Live

23 Example 2: IBM Security Virtual Server Protection for VMware Integrated threat protection for VMware vsphere 4 Offers broadest, most integrated, defense-in-depth virtualization security with one product Provides dynamic protection for every layer of the virtual infrastructure Helps meet regulatory compliance by providing security and reporting functionality customized for the virtual infrastructure Increases ROI of the virtual infrastructure with easy to maintain, easy to deploy security Firewall Auto Discovery VMsafe Integration Virtual Infrastructure Auditing (Privileged User Access) Rootkit Detection Virtual Network Segment Protection Intrusion Detection & Prevention Virtual Network-Level Protection Inter-VM Traffic Analysis Virtual Network Access Control VM Sprawl Central Network Policy Enforcement Web Application Protection Automated Protection for Mobile VMs (VMotion) Virtual Patch

24 Deperimeterization & IBM Security Framework

25 Cybersecurity Model Based on the IBM Security Framework Cyber security Solution Requirements

26 Cybersecurity - Situational Awareness Full spectrum analysis of security relevant events: Network Application Platform Data Behavioral Integrated Command and Control

27 Cyber Security Architectural Overview

28 IBM Secure Engineering Framework Published the IBM Secure Engineering Framework Represents a compilation of internal security practices Provides consistent message on IBM s approach to addressing vulnerabilities Differentiates IBM capabilities and offerings among vendors and alliances Can provide a unified go-to-market strategy for security features in products & development tools Provide structure, execution and accountability for software and solution development projects Build and Maintain trusted relationships with suppliers, distribution channels, import/ export and customer support Best practices for secure software in design, development and deployment Continual improvement for the security characteristics of software offerings through Key Performance Indicators

29 IBM s Holistic Cyber Security Approach IBM security framework podcasts @ the IBM Institute for Advanced Security http://www-304.ibm.com/industries/publicsector/us/en/rep/!!/xmlid=192485