Designing an Enterprise GIS Security Strategy



Similar documents
Designing an Enterprise GIS Security Strategy Michael E. Young Matt Lorrain

ArcGIS and Enterprise Security

ArcGIS Cloud Security Roadmap & Best Practices for Federal Agencies. Michael E. Young

Securing ArcGIS Server Services: First Steps

Agenda. How to configure

ArcGIS Viewer for Silverlight An Introduction

Introduction to the Mobile Access Gateway

Introduction to the EIS Guide

How To Use Arcgis For Free On A Gdb (For A Gis Server) For A Small Business

Portal for ArcGIS. Satish Sankaran Robert Kircher

Security Best Practices for Microsoft Azure Applications

PCI COMPLIANCE ON AWS: HOW TREND MICRO CAN HELP

Cloud Security Through Threat Modeling. Robert M. Zigweid Director of Services for IOActive

Enterprise GIS Architecture Deployment Options. Andrew Sakowicz

WHITEPAPER. SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS

ArcGIS Server Security Threats & Best Practices David Cordes Michael Young

THE BLUENOSE SECURITY FRAMEWORK

The Panoptix Building Efficiency Solution: Ensuring a Secure Delivery of Building Efficiency

Introduction to Mobile Access Gateway Installation

Esri Managed Cloud Services and FedRAMP

PCI COMPLIANCE ON AWS: HOW TREND MICRO CAN HELP

Table of Contents. FME Cloud Architecture Overview. Secure Operations. Application Security. Shared Responsibility.

Securely Architecting the Internal Cloud. Rob Randell, CISSP Senior Security and Compliance Specialist VMware, Inc.

Security Overview Enterprise-Class Secure Mobile File Sharing

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

FileCloud Security FAQ

Solving the Desktop Dilemma

Online Data Services. Security Guidelines. Online Data Services by Esri UK. Security Best Practice

Best Practices for Security and Compliance with Amazon Web Services. A Trend Micro White Paper I April 2013

A POLYCOM WHITEPAPER Polycom. Recommended Best Security Practices for Unified Communications

Out of the Fire - Adding Layers of Protection When Deploying Oracle EBS to the Internet

Using ArcGIS for Server in the Amazon Cloud

Application Security Best Practices. Matt Tavis Principal Solutions Architect

From the Bottom to the Top: The Evolution of Application Monitoring

White Paper How Noah Mobile uses Microsoft Azure Core Services

Architecting and Building a Secure and Compliant Virtual Infrastructure and Private Cloud

Flexible Identity Federation

Where every interaction matters.

WEB APPLICATION FIREWALLS: DO WE NEED THEM?

Building Secure Applications. James Tedrick

Polycom Recommended Best Security Practices for Unified Communications

Using ArcGIS for Server in the Amazon Cloud

Chapter 1: Introduction to ArcGIS Server

Cloud Security:Threats & Mitgations

CS 356 Lecture 25 and 26 Operating System Security. Spring 2013

Building Your Complete Remote Access Infrastructure on Windows Server 2012

Achieving PCI Compliance Using F5 Products

Media Shuttle s Defense-in- Depth Security Strategy

Replacing Microsoft Forefront Threat Management Gateway with F5 BIG-IP. Dennis de Leest Sr. Systems Engineer Netherlands

Protecting Your Organisation from Targeted Cyber Intrusion

Security Considerations for DirectAccess Deployments. Whitepaper

Move over, TMG! Replacing TMG with Sophos UTM

ArcGIS 10.3 Server on Amazon Web Services

Building A Secure Microsoft Exchange Continuity Appliance

Deploy Remote Desktop Gateway on the AWS Cloud

DUBEX CUSTOMER MEETING

External authentication with Astaro AG Astaro Security Gateway UTM appliances Authenticating Users Using SecurAccess Server by SecurEnvoy

Cybercrime myths, challenges and how to protect our business. Vladimir Kantchev Managing Partner Service Centrix

PCI Requirements Coverage Summary Table

Visibility and Control for Sanctioned & Unsanctioned Cloud Apps

Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data

Apps. Devices. Users. Data. Deploying and managing applications across platforms is difficult.

CNS-207 Implementing Citrix NetScaler 10.5 for App and Desktop Solutions

Service Manager and the Heartbleed Vulnerability (CVE )

Introduction to Cyber Security / Information Security

Ensuring Enterprise Data Security with Secure Mobile File Sharing.

Secure Cloud Computing

Information Security Policy

BAE Systems PCI Essentail. PCI Requirements Coverage Summary Table

Scalable Secure Remote Access Solutions

Cloud Security Framework (CSF): Gap Analysis & Roadmap

Secure Compute Research Environment Data Security Plan (DSP)

Detecting Web Application Vulnerabilities Using Open Source Means. OWASP 3rd Free / Libre / Open Source Software (FLOSS) Conference 27/5/2008

Live Guide System Architecture and Security TECHNICAL ARTICLE

Locking down a Hitachi ID Suite server

ArcGIS for Server Deployment Scenarios An ArcGIS Server s architecture tour

Secure Your Mobile Device Access with Cisco BYOD Solutions

Blending Embedded Hardware OTP, SSO, and Out of Band Auth for Secure Cloud Access

74% 96 Action Items. Compliance

MEGA Web Application Architecture Overview MEGA 2009 SP4

Adobe Systems Incorporated

Netzwerkvirtualisierung? Aber mit Sicherheit!

Codeproof Mobile Security & SaaS MDM Platform

ArcGIS for Server in the Amazon Cloud. Michele Lundeen Esri

Workday Mobile Security FAQ

SAFE-T RSACCESS REPLACEMENT FOR MICROSOFT FOREFRONT UNIFIED ACCESS GATEWAY (UAG)

MaaS360 Mobile Enterprise Gateway

A Practical Approach to Network Vulnerability Assessment AN AUDITOR S PERSPECTIVE BRYAN MILLER, IT DIRECTOR JOHN KEILLOR, CPA, AUDIT PARTNER

End User Devices Security Guidance: Apple OS X 10.10

ITAR Compliant Data Exchange

Web Security School Final Exam

Medical Device Security Health Imaging Digital Capture. Security Assessment Report for the Kodak CR V4.1

NEFSIS DEDICATED SERVER

Blue Jeans Network Security Features

CITY UNIVERSITY OF HONG KONG Network and Platform Security Standard

Cloud Security Framework (CSF): Gap Analysis & Roadmap

Thank you for joining us today! The presentation will begin shortly. Thank you for your patience.

A Monitored Student Testing Application Using Cloud Computing

AV-18 Introduction of the GIS Integration

Transcription:

Esri International User Conference San Diego, California Technical Workshops July 26, 2012 Designing an Enterprise GIS Security Strategy Michael E Young

Agenda Introduction Strategy Trends Mechanisms ArcGIS Server Mobile Cloud Compliance

Introduction - Michael E Young - Esri Principal Security Architect - Certified Information Systems Security Professional (CISSP)

Introduction What is a secure GIS?

Introduction Sign in Japan Narita Airport - May 2011 Context is key for identifying the appropriate secure GIS solution for your organization

Introduction What is The Answer? Risk Impact

Introduction Where Are the Vulnerabilities? * SANS Relative Vulnerabilities

Strategy

Strategy Identify your Security Needs - Assess your environment - Datasets, Systems - Sensitivity, Categorization Understand Security Options - Enterprise GIS Resource Center - Enterprise-wide Security Mechanisms - Application Specific Options - Utilize patterns Implement Security as a Business Enabler - Improve appropriate availability of information

Strategy Enterprise GIS Security Strategy Security Risk Management Process Diagram - Microsoft

Strategy Esri s Security Strategy Evolution Enterprise Solution Product Isolated Systems 3 rd Party Security Integrated Systems Embedded Security Cloud Managed Security

Strategy Esri Products and Solutions Secure Products - Trusted geospatial services - Individual to organizations - Extending validation Secure Enterprise Guidance - Enterprise Resource Center - Patterns - Online Help Secure Solution Management - SaaS Functions & Controls - ArcGIS Online Security Overview

Strategy Expanded Security Online Help and Papers

Strategy Security Implementation Patterns Risk based 3 categories / NIST alignment Selection process - Formal NIST 800-60 - Informal To prioritize information security and privacy initiatives, organizations must assess their business needs and risks

Strategy Security Principles CIA Security Triad Defense in Depth

Strategy Defense in Depth Authentication Authorization Data and Assets Physical Controls Policy Controls Technical Controls Filters Encryption Logging

Trends

Trends Perception End-User Perception - I don t ever hear about Virus issues in our company anymore Reality - Modern attacks are not as much about being visible - Layers of exploits deployed - Goal is to obtain your company s most value information

Trends Modern Attack Websense 2012 Threat Report Don t rely on Anti-Virus and Firewalls Alone to Protect Your Organization

Trends Reverse Proxy s Need to Be Maintained CVE-2011-3368 Apache Reverse Proxy Exploit Oct 2011 Allows unauthenticated access to information that should be confidential Commonly overlooked component for updates Update Your Reverse Proxy!

Trends End of Browser Plug-ins? Migration away from Flash and Silverlight Plug-ins Security experts ready to unload plug-ins HTML5 limitation inconsistencies across browsers slowing migration

Trends Mobile Security iphone Twitter PII compromised Mobile device data not secure by default Enterprise Mobile Security Solutions can help

Trends Cloud Data breeches of 2011 - #1 Sony PlayStation Cloud - 100+ mill - #2 Epsilon Email Cloud - 60+ mill - #6 Nasdaq Dashboard Cloud - 10k+ Sr. Execs *http://informationweek.com/news/security/attacks/232301079 An Enterprise Security Strategy can help through cloud data mitigation controls and cloud security policies

Trends Events over the last month US loses $250 billion annually in IP theft $338 billion annually in financial theft Result of cyber espionage is the "greatest transfer of wealth in history."

Mechanisms

Mechanisms

Mechanisms Authentication Pre-10.1 Options - Web Traffic via HTTP 1. Web Services 2. Web Applications - Intranet Traffic via DCOM 3. Local Connections

Mechanisms Authentication Access Restricted Authentication Method Description Encryption None Default Internet Connections N/A Web Service or Web Application Basic Digest Windows Integrated Java EE Container Browser built-in pop-up logon Web container challenge Basic None, unless using SSL Container Managed PKI / Smartcards Public key certificate* PKI Managed Web Application Only.NET Form-based Java ArcGIS Managed Custom login and error pages. ArcGIS Server provides login None, unless using SSL None, unless using SSL Web Service Only Esri Token Cross Platform, Cross API AES-128bit Local DCOM (Gone in 10.1) Windows Integrated OS Groups AGSUser. AGSAdmin OS Managed *PKI / Smartcard Validation Environment Recently Stood up

Mechanisms Authorization Role Based Access Control Esri COTS - Assign access with ArcGIS Manager - Service Level Authorization across web interfaces - Services grouped in folders utilizing inheritance 3 rd Party - RDBMS Row Level or Feature Class Level - Versioning with Row Level degrades RDBM performance - Alternative - SDE Views Custom - Limit GUI - Rich Clients via ArcObjects - Web Applications - Sample code Links in ERC - Microsoft s AzMan tool

Mechanisms Filters 3 rd Party Options Firewalls Reverse Proxy Web Application Firewall - Open Source option ModSecurity Anti-Virus Software Intrusion Detection / Prevention Systems Limit applications able to access geodatabase

Mechanisms Filters Firewall Friendly Scenario Web Application Firewall in DMZ File Geodatabase (FGDB) in DMZ One-way replication via HTTP(s) Deployed to each web server for performance Internet users access to subset of Geodatabase Internet Same replication model could be used to push data to cloud DMZ Intranet WAF Web Web HTTP HTTP GIS GIS DCOM Use FGDB HTTP Database SQL Author & Publish

Mechanisms Filters Why no Reverse Proxy in DMZ? - One-off component / no management, minimal filtering Multi-Function Web Service Gateways - Store SSL Certificates / SSL Acceleration - URL Rewrite - Web Application Firewall External Internal DMZ

Mechanisms Encryption 3 rd Party Options Network - IPSec (VPN, Internal Systems) - SSL (Internal and External System) - Cloud Encryption Gateways - Only encrypted datasets sent to cloud File Based - Operating System BitLocker - GeoSpatially enabled PDF s combined with Certificates - Hardware (Disk) RDBMS - Transparent Data Encryption - Low Cost Portable Solution - SQL Express 2008 w/tde

Mechanisms Logging/Auditing Esri COTS - Geodatabase history - May be utilized for tracking changes - ArcGIS Workflow Manager - Track Feature based activities - ArcGIS Server 10+ Logging - User tag tracks user requests 3 rd Party - Web Server, RDBMS, OS, Firewall - Consolidate with a SIEM

ArcGIS Server

DCOM HTTP(s) SQL HTTP(s) HTTP(s) SQL HTTP(s) ArcGIS Server Public Facing Architecture Public WEB Reverse Proxy DMZ WAF Web Adaptor WEB Private SOM SOC DBclient 10 10.1 GIS Server DBclient SvrDir DBMS SvrDir DBMS

ArcGIS Server 10.1 Changes http://host/arcgis/rest Goodbye DCOM issues! Token Security enabled by default Added Publisher Role AGSAdmin / AGSUser OS Roles dropped All tier capabilities installed by default - Web, application, data - Ready to run developer platform Deploy Web Adapter to web server for production Editor feature service tracking - Owner based control Integrated Security Model still available Administrator API IIS or Apache Web Adaptor Primary Site Admin Acct Config Store Server Directories GIS Server OS Service Acct ArcGIS Server Site

ArcGIS Server 10.1 Deployment Want to know more about ArcGIS Server 10.1 Security? Checkout: 3:15-4:30pm - Building Secure Applications Room 32B

Mobile

Mobile Just Secure the Web Service Endpoints, Right?

Mobile OWASP Top 10 Mobile Issues Issue Solution Question Physical Loss Device Security Options? Malicious App What app stores allowed? Rooted Device Encryption/Strength? Patches How enforced? Insecurely Written App How is code tested? Compromised Password How secured/encrypted? Unprotected Transport TLS/SSL Utilized? Weak Session Management Tokens always passed? Unprotected Services Hardening Guidance? Internal Resource Access VPN Options?

Mobile Phone Security ArcGIS Mobile Security Touch Points SDE permissions Server authentication Communication Device access Storage Service authorization Project access Data access

Mobile Enterprise Mobile Security Built-in device capabilities - Can store features ios5 encrypted with Flex 3.0 API Enterprise device solutions (InTune, AirWatch, Good, MaaS360) - Benefits: Secure email, browser, remote wipe, app distribution Application specific solutions - Benefits: Secure connections and offline device data - Esri ios SDK + Security SDK

Cloud

Cloud Is cloud right for you? Common deployment delays - Analysis paralysis - Complex Proof-of-Concepts (POC) - Technical details primary focus - Security & performance - Cost predictability concerns What type of cloud - Deployment model (where it s located) - Service model (How much it does)

Cloud Responsibility across cloud service models IaaS - ArcGIS Server for Amazon - CSP -> Infrastructure - Cust -> CSP Config, OS, Apps SaaS - ArcGIS Online - CSP -> Infrastructure - Esri -> CSP Config, OS, Apps - Cust -> App Config

Cloud Deployment models

Cloud SaaS Deployment options Three ArcGIS Online patterns 1. Store data and publish service to cloud 2. Only publish service metadata to cloud 3. Deploy solution on-premises

Cloud Amazon

Cloud Going Beyond 1 Tier in Amazon

Cloud IaaS - ArcGIS Server in Amazon Deployment Options Ease deployment - New Cloud Builder 10.1 Tool - Default not hardened Offload management (Cloud Broker Role) - Esri Managed Services Hardened instances - GeoCloud GSA / FGDC Initiative - Security hardened AMI - Shared security certification focus this year

Cloud IaaS Common security issues 1. Access to ports not limited - If you utilize the default image and open RDP to all IP addresses, expect to be compromised in as little as a day 2. System patches not applied - There have been a number of significant RDP vulnerabilities 3. Authentication weak - Multi-factor authentication recommended - Check out AWS Virtual MFA for a free option 4. System not hardened - Turn off/uninstall components you don t use - Utilize built-in capabilities such as NLA for RDP

Cloud SaaS - ArcGIS online for Organizations Organization administrator options - Require SSL encryption - Allow anonymous access to org site Consume Token secured ArcGIS Server services - 10 SP1 and later - User name and password prompts upon adding the service to a map, and viewing Transparency - Status.ArcGIS.com Upcoming - Federated Identities (SAML/ADFS)

Compliance and Standards

Compliance FDCC - Desktop products 9.3-10 USGCB - Desktop products 10.1 Almost completed SSAE 16 Type 1 Previously SAS 70 - Esri data center operations - Expanding to Managed Services for 2012 FISMA - ArcGIS Online In progress

Summary & Next Steps

Summary Security is NOT about just a technology - Understand your organizations GIS risk level - Utilize Defense-In-Depth Secure best practice guidance is available - Check out the Enterprise GIS Resource Center! - Drill into details by mechanism or application type

Summary & Next Steps Your feedback and insight today is essential - Current security issues - Upcoming security requirements - Areas of concern not addressed today Contact Us At: Enterprise Security esinfo@esri.com

Steps to evaluate UC sessions My UC Homepage > Evaluate Sessions Choose session from planner OR Search for session www.esri.com/ucsurveysessions

Thank you for attending Have fun at UC2012 Open for questions Please fill out the evaluation: www.esri.com/ucsessionsurveys Offering ID: 986 Contact Us At: Enterprise Security esinfo@esri.com