SlideShare a Scribd company logo
1 of 4
Download to read offline
Cybercom

CESP
Cybercom Enhanced
Security Platform


Cybercom Enhanced Security Platform, CESP, is an integrated platform
that provides comprehensive security functions for high assurance
applications that require high level of security and protection.
CESP has been developed based on the latest technology to be able
to create a robust and flexible solution that conforms to the highest
standard of performance and security.
#3-03-2010
Cybercom
Enhanced Security Platform




Executive Summary                                            The Solution
There are a large number of systems where the confi-         Cybercom Enhanced Security Platform, CESP, is an
dentiality, integrity and availability of the applications   integrated platform that provides comprehensive
and all the data are of great importance. Typically,         security functions for high assurance applications that
this can be assured by implementing the system with-         require high level of security and protection.
in a closed network environment with very limited
access to applications and data for external users.          CESP has all the necessary components that together
                                                             form a unique security layer for services and informa-
However, the expanding demand for service oriented           tion. CESP contains the following seven components:
applications increases the need for opening up these         •	 Authentication - Assures that only trusted users
systems for bidirectional communication with exter-               can get access to the system
nal users and services. Opening up these systems for         •	   Access Control - Make sure that authorized users
external users and services is not a trivial task. Thus,          only can access data he/she has the right to see.
there is a need for a security layer which enables                Also controls the ability to update data
communication with internal applications and data
                                                             •	   Logging - Collects information about all user
while not compromising the integrity, confidentiality
                                                                  activity in the system
and availability of the system.
                                                             •	   Control and Audit - Functions that can be used
Cybercom Enhanced Security Platform, CESP, is an                  to control and monitor user activity in real time
integrated platform that provides comprehensive                   and to analyze logs and to perform audits.
security functions for high assurance applications that      •	   Secure Communication - Secure system for com-
require high level of security and protection.                    munications across network boundaries
                                                             •	   Server Management - Manages all services on all
                                                                  servers
                                                             •	   Notification - Notify senders and receivers in pre-
                                                                  defined situations in a secure and reliable way
                                                                                                                        Page 2
Cybercom
Enhanced Security Platform




Authentication using CESP-ID                                Logging using CESP-Log
Authentication is needed in order to assure that only       Logging is a central activity in a secure application
trusted users can get access to the system. In CESP,        in order to detect unwanted behavior in the system.
authentication of user is done using CESP-ID. CESP-         CESP-Log is the module that is responsible for the
ID is a flexible authentication solution that provides      logging service in CESP.
secure authentication of users and enables Single
Sign-On between applications and organizations.             Logs are collected from all different levels in the sys-
                                                            tem, from operating system, network components,
CESP-ID assures that an actor has been identified,          database systems and application components. All
authenticated, and assigned different attributes. This      log information is encrypted and signed and sent to
assertion is a signed proof and it can then be used to      a central log service where it is saved in a protected
gain access to an application instead of requesting         repository using signed log chains.
a new authentication from the actor. In CESP-ID this
assertion is based on the SAML standard.                    The local log agent can receive logs even if the cen-
                                                            tral log service is not active or if the communication
CESP-ID is based on the Security Assertion Markup           to the central service is down. The log agent handles
Language (SAML) 2.0, which is an XML-based stand-           this kind of situation by buffering the information lo-
ard for exchanging authentication data between              cally. The log agent transmits this buffered data when
security domains. CESP-ID supports several different        the communication with the central server has been
authentication mechanisms and can be integrated             resumed.
with Trusted Security Server for providing verification
of electronic ID (EID).                                     Analyze Logs using CESP-Audit
                                                            The benefit of having a central storage of log records
Access Control with CESP-Access                             from all systems within a domain is that it enables a
Access control ensures that an authorized user only         more complete log analysis. CESP-Audit analyses all
can access data or a service that he/she has the right      logs that have been collected by CESP-Log.
to see and use. Access control in CESP is performed
by CESP-Access. Once the user has been uniquely             Based on this analysis alert can be generated and
identified, his/her ability to access data or application   sent out according to pre-configured rules. It is also
is checked.                                                 possible to create graphical reports to visualize the
                                                            logs and to be able to study different activities in
In CESP, access is based on user attributes with a          detail. An administrator can create such reports using
technique called Attribute Based Access Control             an intuitive graphical interface. Report creation can
(ABAC). The application can, based on these at-             be scheduled so that standard reports can be sent
tributes, grant access to the information based on its      out on a regular basis to predefined recipients.
own access policies. This way of granting access give
much more flexibility than traditional access control       The analysis of logs is performed in two steps. In
based on groups or roles. This flexible access control      the first step, the log files that has been collected by
system also reduce the burden of an extensive admin-        CESP-Log are normalized and predefined information
istration of groups and roles when a lot of different       from the log files are extracted. The next step is the
applications can be accessed using the CESP-ID Single       analysis of the data using the report generator.
Sign-On functionality.




                                                                                                                       Page 3
Cybercom
Enhanced Security Platform




About Cybercom                                            Contact Details
The Cybercom Group is a high-tech consultancy that        For further information, please contact:
offers global sourcing for end-to-end solutions. The
                                                          Henrik Johansson, Business Unit Manager
Group established itself as a world-class supplier in
                                                          henrik.johansson@cybercomgroup.com
these segments: security, portal solutions, mobile
                                                          +46 70 825 00 80
services, and embedded systems.
                                                          or vistit our website www.cybercom.com
Thanks to its extensive industry and operations ex-
perience, Cybercom can offer strategic and techno-
logical expertise to these markets: telecom, industry,
media, public sector, retail, and banking and financial
services.

The Group employs 2,000 persons and runs projects
worldwide. Cybercom has 28 offices in 11 countries.
Since 1999, Cybercom’s share has been quoted on
the NASDAQ OMX Nordic Exchange. The company
was launched in 1995.




                                                                                                     Page 4


Cybercom Group Europe AB (publ.)
P.O. Box 7574 · SE-103 93 Stockholm · Sweden
Phone: +46 8 578 646 00 · www.cybercom.com

More Related Content

What's hot

Securing Java in the Server Room
Securing Java in the Server RoomSecuring Java in the Server Room
Securing Java in the Server RoomTim Ellison
 
Windows Server 2008 Security Enhancements
Windows Server 2008 Security EnhancementsWindows Server 2008 Security Enhancements
Windows Server 2008 Security EnhancementsPresentologics
 
System Center Endpoint Protection 2012 R2
System Center Endpoint Protection 2012 R2System Center Endpoint Protection 2012 R2
System Center Endpoint Protection 2012 R2Norman Mayes
 
HyTrust-FISMA Compliance in the Virtual Data Center
HyTrust-FISMA Compliance in the Virtual Data CenterHyTrust-FISMA Compliance in the Virtual Data Center
HyTrust-FISMA Compliance in the Virtual Data CenterHyTrust
 
Network Architecture Review Checklist
Network Architecture Review ChecklistNetwork Architecture Review Checklist
Network Architecture Review ChecklistEberly Wilson
 
Caretower's Managed ePO Brochure 180215
Caretower's Managed ePO Brochure 180215Caretower's Managed ePO Brochure 180215
Caretower's Managed ePO Brochure 180215Merlin Govender
 
Datasheet_Embedded_Security_Shield
Datasheet_Embedded_Security_ShieldDatasheet_Embedded_Security_Shield
Datasheet_Embedded_Security_ShieldDavid Cozens
 
Sql server 2008 r2 security datasheet
Sql server 2008 r2 security   datasheetSql server 2008 r2 security   datasheet
Sql server 2008 r2 security datasheetKlaudiia Jacome
 
Secure nets-and-data
Secure nets-and-dataSecure nets-and-data
Secure nets-and-dataKevin Mayo
 
Network Vulnerability Assessments: Lessons Learned
Network Vulnerability Assessments: Lessons LearnedNetwork Vulnerability Assessments: Lessons Learned
Network Vulnerability Assessments: Lessons Learnedamiable_indian
 
Ehealth systemedge-product-brief-us
Ehealth systemedge-product-brief-usEhealth systemedge-product-brief-us
Ehealth systemedge-product-brief-usgopi01
 
World-class Hosting Services
World-class Hosting ServicesWorld-class Hosting Services
World-class Hosting Serviceswebhostingguy
 
Effectively Utilizing LEMSS: Top 11 Security Capabilities You Can Implement T...
Effectively Utilizing LEMSS: Top 11 Security Capabilities You Can Implement T...Effectively Utilizing LEMSS: Top 11 Security Capabilities You Can Implement T...
Effectively Utilizing LEMSS: Top 11 Security Capabilities You Can Implement T...Lumension
 

What's hot (20)

Securing Java in the Server Room
Securing Java in the Server RoomSecuring Java in the Server Room
Securing Java in the Server Room
 
Windows Server 2008 Security Enhancements
Windows Server 2008 Security EnhancementsWindows Server 2008 Security Enhancements
Windows Server 2008 Security Enhancements
 
System Center Endpoint Protection 2012 R2
System Center Endpoint Protection 2012 R2System Center Endpoint Protection 2012 R2
System Center Endpoint Protection 2012 R2
 
ICEIC_2017_20161013
ICEIC_2017_20161013ICEIC_2017_20161013
ICEIC_2017_20161013
 
Apani EpiForce Security Software Brochure
Apani EpiForce Security Software BrochureApani EpiForce Security Software Brochure
Apani EpiForce Security Software Brochure
 
HyTrust-FISMA Compliance in the Virtual Data Center
HyTrust-FISMA Compliance in the Virtual Data CenterHyTrust-FISMA Compliance in the Virtual Data Center
HyTrust-FISMA Compliance in the Virtual Data Center
 
Network Architecture Review Checklist
Network Architecture Review ChecklistNetwork Architecture Review Checklist
Network Architecture Review Checklist
 
Caretower's Managed ePO Brochure 180215
Caretower's Managed ePO Brochure 180215Caretower's Managed ePO Brochure 180215
Caretower's Managed ePO Brochure 180215
 
Datasheet_Embedded_Security_Shield
Datasheet_Embedded_Security_ShieldDatasheet_Embedded_Security_Shield
Datasheet_Embedded_Security_Shield
 
Regulatory Compliance Financial Institution
Regulatory Compliance Financial InstitutionRegulatory Compliance Financial Institution
Regulatory Compliance Financial Institution
 
Sql server 2008 r2 security datasheet
Sql server 2008 r2 security   datasheetSql server 2008 r2 security   datasheet
Sql server 2008 r2 security datasheet
 
Secure nets-and-data
Secure nets-and-dataSecure nets-and-data
Secure nets-and-data
 
Network Vulnerability Assessments: Lessons Learned
Network Vulnerability Assessments: Lessons LearnedNetwork Vulnerability Assessments: Lessons Learned
Network Vulnerability Assessments: Lessons Learned
 
Ehealth systemedge-product-brief-us
Ehealth systemedge-product-brief-usEhealth systemedge-product-brief-us
Ehealth systemedge-product-brief-us
 
World-class Hosting Services
World-class Hosting ServicesWorld-class Hosting Services
World-class Hosting Services
 
Healthcare HIPAA Compliance
Healthcare HIPAA ComplianceHealthcare HIPAA Compliance
Healthcare HIPAA Compliance
 
RF_NEC
RF_NECRF_NEC
RF_NEC
 
SCEP 2012 inside SCCM 2012
SCEP 2012 inside SCCM 2012SCEP 2012 inside SCCM 2012
SCEP 2012 inside SCCM 2012
 
Effectively Utilizing LEMSS: Top 11 Security Capabilities You Can Implement T...
Effectively Utilizing LEMSS: Top 11 Security Capabilities You Can Implement T...Effectively Utilizing LEMSS: Top 11 Security Capabilities You Can Implement T...
Effectively Utilizing LEMSS: Top 11 Security Capabilities You Can Implement T...
 
Web Hosting
Web HostingWeb Hosting
Web Hosting
 

Viewers also liked

Presentatie 27 Mei Cluster Htv
Presentatie  27 Mei Cluster HtvPresentatie  27 Mei Cluster Htv
Presentatie 27 Mei Cluster HtvJohan Lapidaire
 
advance auto parts 2003_ar
advance auto parts 2003_aradvance auto parts 2003_ar
advance auto parts 2003_arfinance48
 
liz claiborne ar2002
liz claiborne  ar2002liz claiborne  ar2002
liz claiborne ar2002finance48
 
CLX0802BalSheet-159951
CLX0802BalSheet-159951CLX0802BalSheet-159951
CLX0802BalSheet-159951finance48
 
Nbs presentation dm_bg
Nbs presentation dm_bgNbs presentation dm_bg
Nbs presentation dm_bgBarry Gregory
 
Building APIs with FRAPI
Building APIs with FRAPIBuilding APIs with FRAPI
Building APIs with FRAPIDavid Coallier
 
SVH In Vogelvlucht Roc Aventus 2 3 2011
SVH In Vogelvlucht Roc Aventus 2 3 2011SVH In Vogelvlucht Roc Aventus 2 3 2011
SVH In Vogelvlucht Roc Aventus 2 3 2011Johan Lapidaire
 
MAKE-UP interattiviamoci_gruppo2
MAKE-UP interattiviamoci_gruppo2MAKE-UP interattiviamoci_gruppo2
MAKE-UP interattiviamoci_gruppo2silvia_ruggeri
 
autozone articles
autozone  articlesautozone  articles
autozone articlesfinance46
 
Managing service management skills
Managing service management skillsManaging service management skills
Managing service management skillsLex Hendriks
 

Viewers also liked (20)

Presentatie 27 Mei Cluster Htv
Presentatie  27 Mei Cluster HtvPresentatie  27 Mei Cluster Htv
Presentatie 27 Mei Cluster Htv
 
Affective Interaction
Affective InteractionAffective Interaction
Affective Interaction
 
advance auto parts 2003_ar
advance auto parts 2003_aradvance auto parts 2003_ar
advance auto parts 2003_ar
 
liz claiborne ar2002
liz claiborne  ar2002liz claiborne  ar2002
liz claiborne ar2002
 
Landing Page (Rus)
Landing Page (Rus)Landing Page (Rus)
Landing Page (Rus)
 
Slideshow Ronaldus
Slideshow RonaldusSlideshow Ronaldus
Slideshow Ronaldus
 
CLX0802BalSheet-159951
CLX0802BalSheet-159951CLX0802BalSheet-159951
CLX0802BalSheet-159951
 
This is right - Sosto!
This is right - Sosto!This is right - Sosto!
This is right - Sosto!
 
Nbs presentation dm_bg
Nbs presentation dm_bgNbs presentation dm_bg
Nbs presentation dm_bg
 
Intro to Google Analytics
Intro to Google AnalyticsIntro to Google Analytics
Intro to Google Analytics
 
Fifteen 12112010
Fifteen 12112010Fifteen 12112010
Fifteen 12112010
 
Building APIs with FRAPI
Building APIs with FRAPIBuilding APIs with FRAPI
Building APIs with FRAPI
 
SVH In Vogelvlucht Roc Aventus 2 3 2011
SVH In Vogelvlucht Roc Aventus 2 3 2011SVH In Vogelvlucht Roc Aventus 2 3 2011
SVH In Vogelvlucht Roc Aventus 2 3 2011
 
Warandecollege 05102010
Warandecollege 05102010Warandecollege 05102010
Warandecollege 05102010
 
jose juan
jose juanjose juan
jose juan
 
ShareJS launch talk
ShareJS launch talkShareJS launch talk
ShareJS launch talk
 
MAKE-UP interattiviamoci_gruppo2
MAKE-UP interattiviamoci_gruppo2MAKE-UP interattiviamoci_gruppo2
MAKE-UP interattiviamoci_gruppo2
 
autozone articles
autozone  articlesautozone  articles
autozone articles
 
Managing service management skills
Managing service management skillsManaging service management skills
Managing service management skills
 
100mph, Stage 3: Flipping the Switch
100mph, Stage 3: Flipping the Switch100mph, Stage 3: Flipping the Switch
100mph, Stage 3: Flipping the Switch
 

Similar to Cybercom Enhanced Security Platform

Cybercom Enhanced Security Platform, CESP-Access
Cybercom Enhanced Security Platform, CESP-AccessCybercom Enhanced Security Platform, CESP-Access
Cybercom Enhanced Security Platform, CESP-Accessabelsonp
 
documentation for identity based secure distrbuted data storage schemes
documentation for identity based secure distrbuted data storage schemesdocumentation for identity based secure distrbuted data storage schemes
documentation for identity based secure distrbuted data storage schemesSahithi Naraparaju
 
Security concerns in web erp
Security concerns in web erpSecurity concerns in web erp
Security concerns in web erpManoj Jhawar
 
Utility Protects Servers and Simplies Compliance with Access Management
Utility Protects Servers and Simplies Compliance with Access ManagementUtility Protects Servers and Simplies Compliance with Access Management
Utility Protects Servers and Simplies Compliance with Access ManagementRyan Gallavin
 
Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based...
Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based...Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based...
Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based...Yashwanth Reddy
 
IRJET- Secure Data Protection in Cloud Computing
IRJET-  	  Secure Data Protection in Cloud ComputingIRJET-  	  Secure Data Protection in Cloud Computing
IRJET- Secure Data Protection in Cloud ComputingIRJET Journal
 
Comparison Review Forticlient x Kaspersky.pdf
Comparison Review Forticlient x Kaspersky.pdfComparison Review Forticlient x Kaspersky.pdf
Comparison Review Forticlient x Kaspersky.pdfImamBahrudin5
 
Seceon Innovations in 2023 - A Look Back on a Big Year - Seceon.pptx
Seceon Innovations in 2023 - A Look Back on a Big Year - Seceon.pptxSeceon Innovations in 2023 - A Look Back on a Big Year - Seceon.pptx
Seceon Innovations in 2023 - A Look Back on a Big Year - Seceon.pptxCompanySeceon
 
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET-  	  Privacy Preserving and Proficient Identity Search Techniques for C...IRJET-  	  Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...IRJET Journal
 
JPJ1407 Expressive, Efficient, and Revocable Data Access Control for Multi-...
JPJ1407   Expressive, Efficient, and Revocable Data Access Control for Multi-...JPJ1407   Expressive, Efficient, and Revocable Data Access Control for Multi-...
JPJ1407 Expressive, Efficient, and Revocable Data Access Control for Multi-...chennaijp
 
IRJET- Secure Scheme For Cloud-Based Multimedia Content Storage
IRJET-  	  Secure Scheme For Cloud-Based Multimedia Content StorageIRJET-  	  Secure Scheme For Cloud-Based Multimedia Content Storage
IRJET- Secure Scheme For Cloud-Based Multimedia Content StorageIRJET Journal
 
Client Server Network Security
Client Server Network SecurityClient Server Network Security
Client Server Network SecurityMithilDoshi1
 
Schneider-Electric & NextNine – Comparing Remote Connectivity Solutions
Schneider-Electric & NextNine – Comparing Remote Connectivity SolutionsSchneider-Electric & NextNine – Comparing Remote Connectivity Solutions
Schneider-Electric & NextNine – Comparing Remote Connectivity SolutionsHoneywell
 
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Balancing performance--accuracy--an...
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Balancing performance--accuracy--an...IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Balancing performance--accuracy--an...
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Balancing performance--accuracy--an...IEEEMEMTECHSTUDENTPROJECTS
 
Two Aspect Validation Control Frameworks for Online Distributed Services
Two Aspect Validation Control Frameworks for Online Distributed ServicesTwo Aspect Validation Control Frameworks for Online Distributed Services
Two Aspect Validation Control Frameworks for Online Distributed ServicesIRJET Journal
 
Ensuring distributed accountability for data sharing in the cloud
Ensuring distributed accountability for data sharing in the cloudEnsuring distributed accountability for data sharing in the cloud
Ensuring distributed accountability for data sharing in the cloudSathya Moorthy
 
Cloud Computing Environment using Secured Access Control Technique
Cloud Computing Environment using Secured Access Control TechniqueCloud Computing Environment using Secured Access Control Technique
Cloud Computing Environment using Secured Access Control TechniqueIRJET Journal
 

Similar to Cybercom Enhanced Security Platform (20)

Cybercom Enhanced Security Platform, CESP-Access
Cybercom Enhanced Security Platform, CESP-AccessCybercom Enhanced Security Platform, CESP-Access
Cybercom Enhanced Security Platform, CESP-Access
 
documentation for identity based secure distrbuted data storage schemes
documentation for identity based secure distrbuted data storage schemesdocumentation for identity based secure distrbuted data storage schemes
documentation for identity based secure distrbuted data storage schemes
 
Security concerns in web erp
Security concerns in web erpSecurity concerns in web erp
Security concerns in web erp
 
Utility Protects Servers and Simplies Compliance with Access Management
Utility Protects Servers and Simplies Compliance with Access ManagementUtility Protects Servers and Simplies Compliance with Access Management
Utility Protects Servers and Simplies Compliance with Access Management
 
Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based...
Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based...Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based...
Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based...
 
IRJET- Secure Data Protection in Cloud Computing
IRJET-  	  Secure Data Protection in Cloud ComputingIRJET-  	  Secure Data Protection in Cloud Computing
IRJET- Secure Data Protection in Cloud Computing
 
Comparison Review Forticlient x Kaspersky.pdf
Comparison Review Forticlient x Kaspersky.pdfComparison Review Forticlient x Kaspersky.pdf
Comparison Review Forticlient x Kaspersky.pdf
 
Seceon Innovations in 2023 - A Look Back on a Big Year - Seceon.pptx
Seceon Innovations in 2023 - A Look Back on a Big Year - Seceon.pptxSeceon Innovations in 2023 - A Look Back on a Big Year - Seceon.pptx
Seceon Innovations in 2023 - A Look Back on a Big Year - Seceon.pptx
 
Sesame in a nutshell
Sesame in a nutshellSesame in a nutshell
Sesame in a nutshell
 
Taw opening session
Taw opening sessionTaw opening session
Taw opening session
 
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET-  	  Privacy Preserving and Proficient Identity Search Techniques for C...IRJET-  	  Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
 
publishable paper
publishable paperpublishable paper
publishable paper
 
JPJ1407 Expressive, Efficient, and Revocable Data Access Control for Multi-...
JPJ1407   Expressive, Efficient, and Revocable Data Access Control for Multi-...JPJ1407   Expressive, Efficient, and Revocable Data Access Control for Multi-...
JPJ1407 Expressive, Efficient, and Revocable Data Access Control for Multi-...
 
IRJET- Secure Scheme For Cloud-Based Multimedia Content Storage
IRJET-  	  Secure Scheme For Cloud-Based Multimedia Content StorageIRJET-  	  Secure Scheme For Cloud-Based Multimedia Content Storage
IRJET- Secure Scheme For Cloud-Based Multimedia Content Storage
 
Client Server Network Security
Client Server Network SecurityClient Server Network Security
Client Server Network Security
 
Schneider-Electric & NextNine – Comparing Remote Connectivity Solutions
Schneider-Electric & NextNine – Comparing Remote Connectivity SolutionsSchneider-Electric & NextNine – Comparing Remote Connectivity Solutions
Schneider-Electric & NextNine – Comparing Remote Connectivity Solutions
 
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Balancing performance--accuracy--an...
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Balancing performance--accuracy--an...IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Balancing performance--accuracy--an...
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Balancing performance--accuracy--an...
 
Two Aspect Validation Control Frameworks for Online Distributed Services
Two Aspect Validation Control Frameworks for Online Distributed ServicesTwo Aspect Validation Control Frameworks for Online Distributed Services
Two Aspect Validation Control Frameworks for Online Distributed Services
 
Ensuring distributed accountability for data sharing in the cloud
Ensuring distributed accountability for data sharing in the cloudEnsuring distributed accountability for data sharing in the cloud
Ensuring distributed accountability for data sharing in the cloud
 
Cloud Computing Environment using Secured Access Control Technique
Cloud Computing Environment using Secured Access Control TechniqueCloud Computing Environment using Secured Access Control Technique
Cloud Computing Environment using Secured Access Control Technique
 

Cybercom Enhanced Security Platform

  • 1. Cybercom CESP Cybercom Enhanced Security Platform Cybercom Enhanced Security Platform, CESP, is an integrated platform that provides comprehensive security functions for high assurance applications that require high level of security and protection. CESP has been developed based on the latest technology to be able to create a robust and flexible solution that conforms to the highest standard of performance and security.
  • 2. #3-03-2010 Cybercom Enhanced Security Platform Executive Summary The Solution There are a large number of systems where the confi- Cybercom Enhanced Security Platform, CESP, is an dentiality, integrity and availability of the applications integrated platform that provides comprehensive and all the data are of great importance. Typically, security functions for high assurance applications that this can be assured by implementing the system with- require high level of security and protection. in a closed network environment with very limited access to applications and data for external users. CESP has all the necessary components that together form a unique security layer for services and informa- However, the expanding demand for service oriented tion. CESP contains the following seven components: applications increases the need for opening up these • Authentication - Assures that only trusted users systems for bidirectional communication with exter- can get access to the system nal users and services. Opening up these systems for • Access Control - Make sure that authorized users external users and services is not a trivial task. Thus, only can access data he/she has the right to see. there is a need for a security layer which enables Also controls the ability to update data communication with internal applications and data • Logging - Collects information about all user while not compromising the integrity, confidentiality activity in the system and availability of the system. • Control and Audit - Functions that can be used Cybercom Enhanced Security Platform, CESP, is an to control and monitor user activity in real time integrated platform that provides comprehensive and to analyze logs and to perform audits. security functions for high assurance applications that • Secure Communication - Secure system for com- require high level of security and protection. munications across network boundaries • Server Management - Manages all services on all servers • Notification - Notify senders and receivers in pre- defined situations in a secure and reliable way Page 2
  • 3. Cybercom Enhanced Security Platform Authentication using CESP-ID Logging using CESP-Log Authentication is needed in order to assure that only Logging is a central activity in a secure application trusted users can get access to the system. In CESP, in order to detect unwanted behavior in the system. authentication of user is done using CESP-ID. CESP- CESP-Log is the module that is responsible for the ID is a flexible authentication solution that provides logging service in CESP. secure authentication of users and enables Single Sign-On between applications and organizations. Logs are collected from all different levels in the sys- tem, from operating system, network components, CESP-ID assures that an actor has been identified, database systems and application components. All authenticated, and assigned different attributes. This log information is encrypted and signed and sent to assertion is a signed proof and it can then be used to a central log service where it is saved in a protected gain access to an application instead of requesting repository using signed log chains. a new authentication from the actor. In CESP-ID this assertion is based on the SAML standard. The local log agent can receive logs even if the cen- tral log service is not active or if the communication CESP-ID is based on the Security Assertion Markup to the central service is down. The log agent handles Language (SAML) 2.0, which is an XML-based stand- this kind of situation by buffering the information lo- ard for exchanging authentication data between cally. The log agent transmits this buffered data when security domains. CESP-ID supports several different the communication with the central server has been authentication mechanisms and can be integrated resumed. with Trusted Security Server for providing verification of electronic ID (EID). Analyze Logs using CESP-Audit The benefit of having a central storage of log records Access Control with CESP-Access from all systems within a domain is that it enables a Access control ensures that an authorized user only more complete log analysis. CESP-Audit analyses all can access data or a service that he/she has the right logs that have been collected by CESP-Log. to see and use. Access control in CESP is performed by CESP-Access. Once the user has been uniquely Based on this analysis alert can be generated and identified, his/her ability to access data or application sent out according to pre-configured rules. It is also is checked. possible to create graphical reports to visualize the logs and to be able to study different activities in In CESP, access is based on user attributes with a detail. An administrator can create such reports using technique called Attribute Based Access Control an intuitive graphical interface. Report creation can (ABAC). The application can, based on these at- be scheduled so that standard reports can be sent tributes, grant access to the information based on its out on a regular basis to predefined recipients. own access policies. This way of granting access give much more flexibility than traditional access control The analysis of logs is performed in two steps. In based on groups or roles. This flexible access control the first step, the log files that has been collected by system also reduce the burden of an extensive admin- CESP-Log are normalized and predefined information istration of groups and roles when a lot of different from the log files are extracted. The next step is the applications can be accessed using the CESP-ID Single analysis of the data using the report generator. Sign-On functionality. Page 3
  • 4. Cybercom Enhanced Security Platform About Cybercom Contact Details The Cybercom Group is a high-tech consultancy that For further information, please contact: offers global sourcing for end-to-end solutions. The Henrik Johansson, Business Unit Manager Group established itself as a world-class supplier in henrik.johansson@cybercomgroup.com these segments: security, portal solutions, mobile +46 70 825 00 80 services, and embedded systems. or vistit our website www.cybercom.com Thanks to its extensive industry and operations ex- perience, Cybercom can offer strategic and techno- logical expertise to these markets: telecom, industry, media, public sector, retail, and banking and financial services. The Group employs 2,000 persons and runs projects worldwide. Cybercom has 28 offices in 11 countries. Since 1999, Cybercom’s share has been quoted on the NASDAQ OMX Nordic Exchange. The company was launched in 1995. Page 4 Cybercom Group Europe AB (publ.) P.O. Box 7574 · SE-103 93 Stockholm · Sweden Phone: +46 8 578 646 00 · www.cybercom.com