Sergey Grigorenko  CISSP CISA CISM  September 2009 PRRESENTATION
<ul><li>Purpose and scope </li></ul><ul><li>Overview </li></ul><ul><li>Threats Against Passwords </li></ul><ul><li>GO-ITS ...
<ul><li>The purpose  of this presentation is to assist OPS in understanding of GO-ITS 25.15 “Security Requirements for Pas...
Information Security OVERVIEW Sergey Grigorenko  CISSP CISA CISM  September 2009 <ul><li>Information security is the prote...
Security Architecture OVERVIEW Sergey Grigorenko  CISSP CISA CISM  September 2009 Business requirements Regulatory require...
OVERVIEW Sergey Grigorenko  CISSP CISA CISM  September 2009 The cost of data loss for 2008: $50.00 - $200.00 per a record ...
OVERVIEW Sergey Grigorenko  CISSP CISA CISM  September 2009 The objective of  GO-ITS 25.15  Standard  is to ensure  that t...
OVERVIEW <ul><li>What the password is? </li></ul><ul><li>A  password  is a secret word or string of characters that is use...
Threats Against Passwords Sergey Grigorenko  CISSP CISA CISM  September 2009 In order to protect users and organization fr...
Threats Against Passwords Sergey Grigorenko  CISSP CISA CISM  September 2009 <ul><li>Brute force attack-  the attacker att...
GO-ITS 25.15 Security Controls Sergey Grigorenko  CISSP CISA CISM  September 2009 <ul><li>Passwords  must  contain at leas...
Threats Against Passwords Sergey Grigorenko  CISSP CISA CISM  September 2009 Users may also reveal their passwords to atta...
How to meet this standard? Sergey Grigorenko  CISSP CISA CISM  September 2009 <ul><li>Create a password policy that specif...
September 2009 Sergey Grigorenko  INFO@SERGRI.NET  September 2009 QUESTIONS?  References: NIST Special Publication 800-118...
Upcoming SlideShare
Loading in …5
×

Go Its 25 15

702 views
603 views

Published on

Password management and use.

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
702
On SlideShare
0
From Embeds
0
Number of Embeds
3
Actions
Shares
0
Downloads
0
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Go Its 25 15

  1. 1. Sergey Grigorenko CISSP CISA CISM September 2009 PRRESENTATION
  2. 2. <ul><li>Purpose and scope </li></ul><ul><li>Overview </li></ul><ul><li>Threats Against Passwords </li></ul><ul><li>GO-ITS 25.15 Security Controls </li></ul><ul><li>How to meet this standard? </li></ul><ul><li>Questions? </li></ul>AGENDA Sergey Grigorenko CISSP CISA CISM September 2009
  3. 3. <ul><li>The purpose of this presentation is to assist OPS in understanding of GO-ITS 25.15 “Security Requirements for Password Management and Use” Standard requirements and common threats against their character-based passwords and how to mitigate those threats within the cluster or enterprise. </li></ul>PURPOSE AND SCOPE Sergey Grigorenko CISSP CISA CISM September 2009 Non-character-based passwords, such as graphic-based passwords, Biometrics, Digital Certificates and Authentication Protocols, are outside the scope of this presentation. Audience: This presentation is for non technical stuff and program managers who can use the information presented to facilitate the decision-making processes associated with password management, such as password policy creation. Duration: 5-7 minutes
  4. 4. Information Security OVERVIEW Sergey Grigorenko CISSP CISA CISM September 2009 <ul><li>Information security is the protection of information and information systems from: </li></ul><ul><li>unauthorized access </li></ul><ul><li>use </li></ul><ul><li>disclosure </li></ul><ul><li>disruption </li></ul><ul><li>modification or destruction . </li></ul><ul><li>Information security is achieved by ensuring the: </li></ul><ul><li>confidentiality </li></ul><ul><li>Integrity </li></ul><ul><li>availability of information (CIA) </li></ul>
  5. 5. Security Architecture OVERVIEW Sergey Grigorenko CISSP CISA CISM September 2009 Business requirements Regulatory requirements A N A L Y S I S * POLICIES * ** STANDARDS ** *** PROCEDURES AND GUIDELINES *** Administrative Controls MONITOR, REPORT AND IMPROVE GO-ITS 25.15 Technical Controls Firewalls Intrusion detection prevention Access control System Hardening Physical Controls Guards CCTV Lockers Alarm systems
  6. 6. OVERVIEW Sergey Grigorenko CISSP CISA CISM September 2009 The cost of data loss for 2008: $50.00 - $200.00 per a record – 215 million records lost since January 2008 = $11 to $430 Billion – $6.3 million per company incident. /Gartner/
  7. 7. OVERVIEW Sergey Grigorenko CISSP CISA CISM September 2009 The objective of GO-ITS 25.15 Standard is to ensure that the management and use of passwords to access Government of Ontario information and information technology is effective, and assists in the mitigation of unacceptable risks to those resources. “ Security Requirements for Password Management and Use” Standard number 25.15 has been created by Information Technology Standards Council ( ITSC ) to sets out security requirements for password management and use.
  8. 8. OVERVIEW <ul><li>What the password is? </li></ul><ul><li>A password is a secret word or string of characters that is used for authentication, to prove identity or gain access to a resource. </li></ul><ul><li>Identification is a claimant presenting an identifier (username) that indicates a user identity for the system. </li></ul><ul><li>Authentication is the process of establishing confidence in the validity of a claimant’s presented identifier. </li></ul><ul><li>Passwords are used in many ways to protect data, systems, and networks. </li></ul><ul><li>For example, passwords are used to authenticate users of operating systems, applications (e.g., email, labor recording), hardware, and remote access solutions. </li></ul>Sergey Grigorenko CISSP CISA CISM September 2009
  9. 9. Threats Against Passwords Sergey Grigorenko CISSP CISA CISM September 2009 In order to protect users and organization from a password attack, we have to understand of the various threats and tactics
  10. 10. Threats Against Passwords Sergey Grigorenko CISSP CISA CISM September 2009 <ul><li>Brute force attack- the attacker attempts to guess the password using all possible </li></ul><ul><li>combinations of characters </li></ul><ul><li>Dictionary attack -the attacker attempts to guess the password using a list of possible </li></ul><ul><li>passwords </li></ul>Password Calculator . http:// lastbit.com/pswcalc.asp
  11. 11. GO-ITS 25.15 Security Controls Sergey Grigorenko CISSP CISA CISM September 2009 <ul><li>Passwords must contain at least 8 characters </li></ul><ul><li>Passwords must contain at least one digit and at </li></ul><ul><li>least one upper case and one lower case letter </li></ul><ul><li>User passwords must be tested for strength </li></ul><ul><li>on a periodic basis </li></ul><ul><li>Passwords themselves are highly sensitive and </li></ul><ul><li>must be protected accordingly </li></ul>
  12. 12. Threats Against Passwords Sergey Grigorenko CISSP CISA CISM September 2009 Users may also reveal their passwords to attackers because of social engineering . <ul><li>Users must not disclose their passwords to anyone else </li></ul><ul><li>Users must immediately change any disclosed or compromised passwords </li></ul>For example, an attacker could pretend to be a help desk agent, call a user, and ask the user to provide a password to assist the agent in troubleshooting a problem. Sniffing may occur as passive eavesdropping or active interception, such as a man-in-the-middle attack with an attacker serving as an intermediary through which messages between two other systems pass. Capturing is an attacker acquiring a password from storage, transmission, or user knowledge and behavior. <ul><li>Initial passwords must be communicated to the user directly in person, by telephone or by encrypted email </li></ul><ul><li>Passwords must be encrypted in storage and in transmission </li></ul><ul><li>Unencrypted passwords or credential information must not be cached </li></ul>
  13. 13. How to meet this standard? Sergey Grigorenko CISSP CISA CISM September 2009 <ul><li>Create a password policy that specifies all of the organization’s password management-related requirements </li></ul><ul><li>Establish clear process for password management and use (procedures an guidelines) </li></ul><ul><li>Communicate and enforce these requirements to the end user through awareness program and monitoring </li></ul>
  14. 14. September 2009 Sergey Grigorenko INFO@SERGRI.NET September 2009 QUESTIONS? References: NIST Special Publication 800-118 Guide to Enterprise Password Management Government of Ontario IT Standard (GO-ITS) 25.15 (V.1.3)

×