• Share
  • Email
  • Embed
  • Like
  • Save
  • Private Content
Sanctuary Device Control
 

Sanctuary Device Control

on

  • 2,292 views

 

Statistics

Views

Total Views
2,292
Views on SlideShare
2,287
Embed Views
5

Actions

Likes
0
Downloads
0
Comments
0

1 Embed 5

http://www.slideshare.net 5

Accessibility

Categories

Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

Sanctuary Device Control Sanctuary Device Control Presentation Transcript

  • Lumension Security Sanctuary Device Control 4.2.2 Product Overview
  • Consequences of theft and data loss U.S. Military secrets for sale at Afgahn Bazaar BAGRAM, Afghanistan – April 10, 2006 No more than 200 yards from the main gate of the sprawling U.S. Base here, stolen computer drives containing military assessments of enemy targets, names of corrupt Afghan officials and descriptions of American defenses are on sale in the local bazaar. The thefts of computer drives have the potential to expose military secrets as well as Social Security numbers and other identifying information of military personnel...
  • Social Engineering the USB way
    • Security Audit at a credit union
    • (Source: http://www.darkreading.com )
    • Step 1
      • Prepare 20 USB drives with a trojan horse that gathers critical data (such as user account information) from the PC it is connected to and sends it by email
    • Step 2
      • Drop these USB drives within the accomodations of the company
    • Step 3
      • Wait 3 days ...
    • Result
      • 15 out of 20 drives have been used by employees, critical data from their PC‘s has been exposed
  • Did you know? For sale: memory stick plus cancer patient records Health bosses in Lancashire are facing awkward questions after confidential medical records of 13 cancer patients found their way onto a portable memory stick, which was repackaged and sold as new to a Crewe estate agent…
      • Useful portable storage?
      • ... or malware entrypoint?
      • Music Files?
      • ...or your customer database?
    • We can expect the use of new devices to accelerate
      • Price, shape, utility
      • New ways of working
    • We cannot stop their adoption
      • Nor should we try
    • We need to enforce device-use policies that enable them to be used securely
      • Granular controls that empower users to do their work while assuring appropriate behaviours
      • Restrictive but flexible
    The Challenge
  • Product Operation
    • Client boots, user logs on,
    • computer connects to the corporate network
    • Client driver sends Identification message (= machine ID, user ID, domain ID, group ID’s, driver version, OS version).
    • The Application Server queries the database for access rules and caches results.
    4. The Access Rules are created, cryptographic signatures are added and Access Rules are pushed to the client driver 5. The Access Rules are cached locally, policy enforcement is performed at kernel level SQL D ata b ase (Cluster) Kernel Driver Active Directory / eDirectory synchronizes users, groups and computer accounts periodically 6. Computer may leave corporate network and will stay secure due to local white list Policies Sanctuary Application Server(s) Digital signature Digital signature
    • Accounting
    • Sales People
    • Network Admins
    • Support Team
    1.1 PREDEFINED DEVICE CLASSES What are users / user groups’ needs in terms of device / media access rights to perform their allowed tasks? Users can now access their allowed devices / media according to their granted attributes 1.2 SPECIFIC DEVICE TYPE / BRAND 1.3 ADD SPECIFIC MEDIA MEDIA LIST Assign and go Individual User Groups of Users 3. ASSIGN ACCESS ATTRIBUTES 0. IDENTIFY DEVICES AND MEDIA Unique Media CD / DVD, Zip drives, Disk on key DEVICES CD / DVD ROMs MODEM REMOVABLE MEDIA USB PRINTER USB Disk Pro SND1 MP3 Player
  • Users Device Access Request Kernel Driver Known Device check List of classes & known devices Known device? Log Device Policies Users, Groups, Device Classes, Devices and Access Attributes Authorization Yes Yes Managed Device Access Control Device Access
  • Users Device Access Request Kernel Driver Known Device check List of classes & known devices Known device? Log Device Policies Users, Groups, Device Classes, Devices and Access Attributes Authorization Yes No Managed Device Access Control No Access
  • Users Device Access Request Kernel Driver Known Device check List of classes & known devices Known device? Log Device Policies Users, Groups, Device Classes, Devices and Access Attributes No Managed Device Access Control No Access
  • The Challenge Reduce Risk While Enabling New Technologies
    • Four Key Steps:
    • Discovery Know what applications and devices are in use on endpoints
    • Policy Establishment Develop company-wide, group and/or user-specific policies that reduce, or eliminate endpoint security issues
    • Policy Enforcement Enforce and administer endpoint security policies and the flexibility to seamlessly make policy changes as appropriate, reducing end users’ need for involvement
    • Policy Monitoring and Compliance Reporting Understand the effectiveness of endpoint policies and to know when they have been violated
    • 1) Requirement Gathering
    Implementing Device Control
    • POLICY
    • 2) Security Implications
    • 2) Operational Implications
    For 15 MB / day With shadowing Use Memory Keys Wireless Connection
    • Standard permission for Sales dep. to use only Lexar Keys with decentralized encryption
    • Offline permission for Sales dep. to use wireless connectivity
    • Sales Department
    Only if encrypted Only when offline Only Type Lexar
    • 1) Requirement Gathering
    Implementing Device Control Print invoices Only on local printer
    • 2) Security Implications
    Only Type HP 1250
    • 2) Operational Implications
    Use customer‘s keys Read access only
    • Production Control Servers
    Maximum Stability Complete Lockdown
    • Reception Desk
    • Support Department
    • 1) Requirement Gathering
    Implementing Device Control
    • 2) Security Implications
    • 2) Operational Implications
    Use Digital Cameras Only with File Filter Only Type Sony DC210 Only during business hours Use CD‘s & DVD‘s Only specific Media
    • Result: Restrictive but flexible device access control
    • Marketing Dpt
    • High Security with maximum user acceptance
    • Works over Slow Network Links
    • Works through Firewalls
    • Ensures High Availability
    • Ensures Manageability in large Networks
    • Proxy Support
    Architectural Considerations Proxy Server
  • Architecture Example Backbone Sales Office (5000 seats) Reg. Office (1000 seats) Reg. Office (1000 seats) Main Site (1000 seats) 1 MBit 1 MBit 10 MBit 64 KBit Bandwidth considerations Serves Main Site & Regional Office 1 Serves Sales office & Backup for Regional Office Caching Server (due to limited bandwidth) Serves Main Site & Backup for Sales Office SQL + 2 SXS 1 SXS 1 SXS
    • Read and / or Write
    • Scheduled Access
      • From 08:00h to 18:00h Monday to Friday
    • Temporary Access
      • For the next 15 minutes
      • Starting next Monday, for 2 days
    • Out of band permission
      • Assign permissions when no network connection is present, all device classes supported
    • Online / Offline
    • Quota Management
      • Limit copied data to 100 MB / day
    • Encryption enforcement
      • Access is granted only if medium has been encrypted (decentralized encryption) with password recovery option
    • File Type Filtering
      • Limit the access to specific file types
    Access Attributes
    • A complete device class
      • All USB Printers
    • A device sub class
      • USB printer HP 7575, CD/DVD Nec 3520A
    • A unique device based on
      • Encryption
      • serial number
    • Specific CD‘s / DVD‘s
    • Specific Bus (USB, IrDa, Firewire...)
    • Groups of devices
    Attributes can be allocated to…
    • A local user or group
    • An Active Directory user or group
    • An Active Directory domain
    • A Machine
    • A Machine Group
      • created within SDC
    • A Novell eDirectory user group or organizational unit
    Access can be granted to…
    • Kernel Driver
      • Invisible (no task manager process)
      • Fast (no performance loss)
      • Compatible (no conflict with other software)
    • Encryption of unique devices with AES
      • AES 256 = market standard
      • Fast and transparent within the network
      • Strong password enforcement for usage outside the corporate network
    • Client / Server Traffic
      • Private/Public key mechanism
      • Impossible to tamper with
      • Easily generated and deployed
    Security Features
    • Client Hardening
      • Even a local administrator cannot uninstall the client
    • Prevention from Keyloggers
    • Removable Media Encryption
      • Assign any removable media to any user and then encrypt the media. Encrypted device is accessible only by the user who owns the access rights on the removable media
    • Offline Protection
      • Local copy of the latest devices access permission list stored on the disconnected workstation or laptop
    Security Features
    • User Actions Logging
      • Read Denied / Write denied
      • Device entered / Medium inserted
      • Open API for 3rd party reporting tools
    • Shadowing of all copied data
      • Level 1: shows File Name and attributes of copied data
      • Level 2: Captures and retains full copy of data written to extenal device or read from such a device
    • Administrator Auditing
      • Keeps track of all policy changes made by SDC admins
    Auditing and Logging
    • Scheduled Delivery
    • Highly configurable, templates available
    • Advanced query builder
    • HTML, CSV or XML outputs
    • Sent by email or stored to the filesystem on a predefined schedule
    Custom Reports
    • Easy integration with popular reporting & statistic tools
    • (Example: Crystal Reports)
    Shadowing by File Type Shadowing by User 3rd Party Reporting
  • Administrative Roles for...
    • Time based access settings (e.g. Helpdesk)
    • Permanent access settings
    • Add / Create specific devices
    • Add specific CD / DVD media
    • View administrative audit logs (auditor)
    • View user access logs
    • View shadow files
    • Client Hardening (e.g. Upgrades)
    • Easy Exchange Encryption
      • Authorized users can access encrypted removable devices outside the company without the need to install any kind of software whatsoever and without administrative privileges
    • Offline Updates
      • Send updates to computers not connected to the network using a file
    • Enhanced Policy Management
      • Device grouping options, Media grouping options, increased audit roles, customized comments per Device
    • Multilingual Client Interface
      • Client language interface changes based on regional settings
    • Real-Time push of Access Policies
    • Learning Mode
      • Permissions can be attached to the root of the Device Explorer tree and apply to all devices that a user(s)/group(s) use.
    • Event Notification
      • Customized User message when access is denied
    Easy Management
    • The Sanctuary Device Scanner
    • System Service, scanning the network on predefined intervals for unknown devices
    • Works clientless
    • Intuitive User Interface
    • Creates template-based HTML Reports
    • XML Export Interface
    Device Discovery
    • Silent & Unattended Install of MSI Package via:
      • SDC´s own deployment tool
        • Fast & Easy
        • extra information as client status, present OS and Service Pack
      • Any MSI compatible deployement tool
        • MS SMS
        • NetInstall
        • ZenWorks
        • Group policies
        • Batch file / script
    • Deployment of the Sanctuary clients
      • The Sanctuary ® Clients can be deployed without a server available optionally setting initial permissions
    „ The timeframe of a few days for the implementation is actually too high. In reality only a few hours were needed. Easy Management was not an empty marketing statement but we can confirm it. “ Detlef Ebert IT Operations Center der ING DiBa . Easy Deployment
  • Sanctuary Modular Offering Overview Sanctuary Device Control - Base (SDCSTD) Audit Only Module (SDASTD) Encryption Add-on (SDESTD) Uplift (SDAUPL) Sanctuary Device Control – Enterprise (SDCENT) Sanctuary Suite (SACSDC) Sanctuary Application Control (SACSTD) Sanctuary Application Control Offering
  • Sanctuary Modular Offering Features Overview
    • Sanctuary Device Control – Audit Only
      • Includes full installation components (server side & agent)
      • All I/O devices usage is allowed – no enforcement is possible
      • Audit features include:
        • Logging of user actions
        • Shadowing of copied data (Patented Shadowing Technology)
        • Reporting to third party systems
        • Use of Sanctuary Device Scanner
    • Sanctuary Device Control – Base
      • Includes all SDC enforcement features, except the media encryption ones
      • An Uplift option is available from “Audit Only”
    • Sanctuary Device Control – Encryption Add-on
      • Sanctuary Device Control – Base is a pre-requisite
      • Management of unique and encrypted devices with AES-256
      • An SDC bundle SKU for SDC – Enterprise to sell SDC-Base with Encryption Add-on.
  • Sanctuary Device Control Audit-Only Requirements
    • Non blocking mode for Devices is required before agent is deployed to hosts.
  • Sanctuary Device Control Audit-Only Requirements
    • Device Log Option needs to be set to “Enabled”.
  • Thank You For more information, please call United States: +1 480 970-1025 (option 1) United Kingdom: + 44 (0) 1908 357 897 Luxembourg: + 352 265 354 11 Singapore: + 65 6725 6415 or visit us on the web at www.lumension.com