SlideShare a Scribd company logo
1 of 33
Securing Your ESI
Steven C. Markey, MSIS, PMP, CISSP, CIPP, CISM, CISA, STS-EV, CCSK, CompTIA Cloud
                                    Essentials
                            Principal, nControl, LLC
                               Adjunct Professor
   President, Cloud Security Alliance – Delaware Valley Chapter (CSA-DelVal)
Securing Your ESI
• Presentation Overview
  – WI3FM….?
  – ESI Overview
  – Security Overview
  – Security Tips & Tricks
Securing Your ESI
• WI3FM
  – What is in it for me?
     – Why should I care?
Securing Your ESI
• Data Breaches & Security Incidents
  – Average Cost: $7.2 million
     – http://www.networkworld.com/news/2011/030811-
       ponemon-data-breach.html
  – Leading Cause: Negligence, 41%; Hacks, 31%
     – http://www.networkworld.com/news/2011/030811-
       ponemon-data-breach.html
  – Responsible Party: Vendors, 39%
     – http://www.theiia.org/chapters/index.cfm/view.news_detail/
       cid/197/newsid/13809
  – Increased Frequency: 2010-2011, 58%
     – http://www.out-law.com/en/articles/2011/october/personal-
       data-breaches-on-the-increase-in-private-sector-reports-ico/
Source: Flickr
Source: Flickr
Source: Flickr
Securing Your ESI
• ESI Overview
  – Electronically Stored Information (ESI)
     • Defined for the federal rules of civil procedure (FRCP):
         – Information created, manipulated, communicated, stored,
           and best utilized in digital form, requiring the use of computer
           hardware and software.
             » http://www.law.northwestern.edu/journals/njtip/v4/n2/3/
     • Structured ESI
         – Stored in database or content management systems.
             » Examples: Claims, Brokerage / e-Commerce Transactions
     • Unstructured ESI
         – Free-form information stored in a manner that is difficult to
           search within.
             » Examples: Tweets, Web Site Content, Word Document Content
Securing Your ESI
• Security Overview
  – CIA Triad
     • Confidentiality
         –   Categorization / Classification
         –   Privacy
         –   Least Privilege
         –   AAA: Authentication, Authorization and Accounting
     • Integrity
         – Nonrepudiation
         – Segregation / Separation of Duties
     • Availability
         – Business Continuity (BC) / Disaster Recovery (DR)
         – Defense-in-Depth
Source: Flickr
Securing Your ESI
• Vendor Selection
  – Service-Level Agreements (SLAs)
     • Temporal Service Contract
          –   Term
          –   Metrics
          –   Definitions
          –   Cause for X (e.g. Termination / Exit Clause)
  – Certifications / Attestations
     •   SAS 70 Type II / SSAE 16 (SOC 1 / 2 / 3) / ISAE 3402
     •   ISO 27001 / 2, 27036, 15489
     •   BITS Shared Assessments
     •   PCI DSS
     •   HIPAA / HITECH
Securing Your ESI

• Vendor Selection
  – Incident Response
     • Computer Security Incident Response Team (CSIRT)
         – Digital Forensics
     • Legal Hold / Litigation Response / e-Discovery
         – Electronic Discovery Reference Model (EDRM)
         – FRCP 30(b)(6)
  – Right to Audit
     • Use your internal vendor assessment team or a mutually
       agreed upon third party.
Securing Your ESI
• Mobile Device Security Guidance
  – Devices
     • Not all devices are the same.
     • Balancing Act (Draconian versus Cow-folk)
         – People lose stuff all the time.
     • Who owns the device?
         – Bring Your Own Device (BYOD) = consumerization of IT
     • Is device content discoverable?
     • Vicarious Liability
         – Driving & Texting / Talking
         – Mobile Device User Acceptance Policy

  – Applications / Data
     • Not all applications are the same.
     • Segment Work & Play
         – Sandboxing / Data-boxing
         – Mobile Facebook App Pulls / Pushes Data to Address Book
Securing Your ESI
• Physical Media Security Guidance
  – Laptops / Tablets
     • They should be password-protected / encrypted.
     • Wipe / degauss hard disk drive (HDD) before shredding.
         • Receive a certificate / bill of laden for shredding.

  – Thumb Drives / External Hard Drives
     • They should be password-protected / encrypted.
     • Wipe / degauss before shredding.
         • Receive a certificate / bill of laden for shredding.

  – Backup Tapes
     • They should be in your records retention schedule (RRS).
         • Information Lifecycle
     • They should be password-protected / encrypted.
     • Wipe / degauss before shredding.
         • Receive a certificate / bill of laden for shredding.
Securing Your ESI
• Cloud Security Guidance
  – Change / Configuration Management, Provisioning
  – Matrices
     •   CSA Consensus Assessments Initiative Questionnaire
     •   CSA Cloud Controls Matrix
     •   BITS Enterprise Cloud Self-Assessment
     •   BITS Shared Assessments
  – Guidance Specifically for the Cloud
     •   Cloud Security Alliance (CSA) Guide v3.0
     •   CSA Security, Trust & Assurance Registry (STAR)
     •   ENISA Cloud Computing Risk Assessment
     •   NIST SP 800-144 Guidelines Security / Privacy for a Public Cloud
Securing Your ESI
• Big Data Security Guidance
  – Information Management
     •   Generally Accepted Recordkeeping Principles (GARP®)
     •   Information Governance Reference Model (IGRM)
     •   Information Lifecycle Management (ILM)
     •   MIKE2.0
     •   ISO 23081 (Records Metadata)
  – Known Black Ice
     •   Log Files
     •   Web Metadata
     •   Non-Relational, Distributed Databases (NRDBMS, e.g. NoSQL)
     •   Data Backups (Tapes, Cloud Object Storage)
     •   Social Media
Securing Your ESI
• Social Media Security Guidance
  – Sites
     • Manage (Strategy, Policy, Access, Auditing, e-Discovery)
     • Strong Passwords
     • Change / Configuration Management
         – Provisioning / De-provisioning
     • Haters (Competitors, Former Employees / Customers)
     • Wash & Repeat
     • Mobile Apps for Approved Personnel?
  – Applications
     • Immature
     • Insecure
     • Discoverable?
Securing Your ESI
• Security Tips & Tricks
  – Governance, Risk & Compliance (GRC)
  – Encryption / Hashing
  – Authentication, Authorization & Accounting (AAA)
  – Change / Configuration Management
  – Incident Response / e-Discovery / DR Testing
  – Physical Access
  – End User Training
Securing Your ESI
• GRC
  – Documented controls and safeguards.
     • Potential audit findings and remediation actions.
  – Enterprise view of compliance.
     • Potential functional / system / application view as well.
  – Establish standards, best practices and guidance.
     • Make users, vendors and partners aware of these.
Securing Your ESI
• Encryption / Hashing
  – Data at Rest (DAR)
     • Object (File, Table, Record, Column), Volume or Block
  – Data in Motion (DIM)
     • ‘Across the Wire’, Data-com Link
  – Data in Use (DIU)
     • Object (File, Table, Record, Column), Volume or Block
Securing Your ESI
• Encryption / Hashing
  – Nuances
     • Encryption wraps a layer of protection around your
       information.
        – Public Key Infrastructure (PKI): VPN, TLS / SSL, S / MIME, WPA
     • Hashing re-arranges the bits per the program.
        – Database Hashing: HMAC SHA 1 / 2 / 3, MD5
  – Key Management
     • If you lose the encryption key then your data is lost.
        – Try telling Legal, a judge or an attorney that!
Securing Your ESI
• AAA
  – Authentication
     • Validating who the user is claiming to be.
  – Authorization
     • Allocating the lowest privilege for the user.
  – Accounting
     • Tracking the user’s actions.
Securing Your ESI
• Identity & Access Management (IAM)
  – Single Sign-on (SSO)
     • Allows User to Gain Access to Multiple Systems / Apps
        – Negates password fatigue.
     • Implementations
        – Externally
            » One-time Password (OTP) / Tokenization
            » Federated Identity / Tokenization
            » Smart Card / Two Factor Authentication (2FA)
            » Remote Access Dial-In User Service (RADIUS)
        – Internally
            » Kerberos
            » Lightweight Directory Access Protocol (LDAP)
Securing Your ESI
• IAM Technologies
  – Federated Identity
     •   OpenID
     •   OAuth
     •   Security Assertion Markup Language (SAML)
     •   Web Services – Trust Language (WS-Trust)
     •   Representational State Transfer (REST)
     •   Active Directory Federation Services (ADFS)
          – Microsoft Federation Gateway (MFG)
Securing Your ESI
Securing Your ESI
• Password Tips & Tricks
  – Use a password.
  – Create a strong password / PIN.
     • Alphanumeric with at least one uppercase letter, one
       lower-case letter, one number & one special character.
     • No dictionary words, SSNs, kids, pets, DOBs or address.
     • No usernames.
     • Use different passwords for different accounts.
  – Protect it.
     • Use a password book if necessary.
  – Change it.
     • Semi-annually
Securing Your ESI
• Change / Configuration Management
  – Process
     • Cost, GRC & Quality are huge drivers for:
        – Software Development Lifecycle (SDLC)
        – Project Management Office (PMO), Project Portfolio Mgmt (PPM)
        – Lean / Six Sigma, ISO 9000, CMMi
  – Provisioning / De-provisioning
     • On-loading / Off-loading
        –   Profit Centers / Business Units / Functions
        –   Data
        –   Applications
        –   Vendors / Partners
        –   Customers
     • Periodic Reviews of Processes & Accounts
Securing Your ESI
• Incident Response / e-Discovery / DR Testing
  – Practice makes perfect.
     • Wash & Repeat
  – Crawl  Walk  Run
     • Crawl: Internal Tabletop Testing
     • Walk: Internal Exercise, “cause you have nothing better
       to do on a Saturday”.
     • Run: Incorporate Vendors, Partners & Customers
Securing Your ESI
• Physical Security
  – Privacy Screen
  – Physical Location & Office Access
  – Dumpster Diving
  – Lost Hard-copy Reports                  Source: Amazon




            Source: Flickr              Source: Flickr
Securing Your ESI
• End-user Training
  – New-hires
     • Especially for milennials (IT consumerization).
  – Quarterly Computer-based Training (CBT)
     • For heavily regulated industries.
  – Annual On-site Training
     • Be liberal with the swag.
        – Pilot new marketing campaigns (logo, tag, brand).
  – Educate Your Ecosystem
Securing Your ESI
• Take-aways
  – Educate Your Ecosystem
  – Healthy Dose of Skepticism
  – Embrace Change Pragmatically
  – Secured Technology is an Enabler
  – Privacy is Important Too
• Questions?
• Contact
  – Email: steve@ncontrol-llc.com
  – Twitter: @markes1, @casdelval2011
  – LI: http://www.linkedin.com/in/smarkey

More Related Content

What's hot

Cw13 cloud computing & big data by ahmed aamer
Cw13 cloud computing & big data by ahmed aamerCw13 cloud computing & big data by ahmed aamer
Cw13 cloud computing & big data by ahmed aamerinevitablecloud
 
Systems Advantage Forum : Autonomous DB e DBaaS
Systems Advantage Forum : Autonomous DB e DBaaS Systems Advantage Forum : Autonomous DB e DBaaS
Systems Advantage Forum : Autonomous DB e DBaaS Riccardo Romani
 
Cloud Security ("securing the cloud")
Cloud Security ("securing the cloud")Cloud Security ("securing the cloud")
Cloud Security ("securing the cloud")Vic Winkler
 
Security & privacy challenges in cloud computing
Security & privacy challenges in cloud computingSecurity & privacy challenges in cloud computing
Security & privacy challenges in cloud computingkdore
 
Capacity Management in a Cloud Computing World
Capacity Management in a Cloud Computing WorldCapacity Management in a Cloud Computing World
Capacity Management in a Cloud Computing WorldDavid Linthicum
 
Cloud computing-security-issues
Cloud computing-security-issuesCloud computing-security-issues
Cloud computing-security-issuesAleem Mohammed
 
Challenges in cloud computing to enable future internet of things v0.3
Challenges in cloud computing to enable future internet of things v0.3Challenges in cloud computing to enable future internet of things v0.3
Challenges in cloud computing to enable future internet of things v0.3Ignacio M. Llorente
 
Embracing Cloud in a Traditional Data Center
Embracing Cloud in a Traditional Data CenterEmbracing Cloud in a Traditional Data Center
Embracing Cloud in a Traditional Data CenterBrian Anderson
 
Lessons learnt building a Distributed Linked List on S3
Lessons learnt building a Distributed Linked List on S3Lessons learnt building a Distributed Linked List on S3
Lessons learnt building a Distributed Linked List on S3AWS User Group Bengaluru
 
Adopting the open group cloud eco system reference model
Adopting the open group cloud eco system reference modelAdopting the open group cloud eco system reference model
Adopting the open group cloud eco system reference modelKrishna-Kumar
 
Cloud Security Standards: What to Expect and What to Negotiate V2.0
Cloud Security Standards: What to Expect and What to Negotiate V2.0Cloud Security Standards: What to Expect and What to Negotiate V2.0
Cloud Security Standards: What to Expect and What to Negotiate V2.0Cloud Standards Customer Council
 
Advantages to Adoption the Microsoft Cloud - Microsoft Customer Executive Summit
Advantages to Adoption the Microsoft Cloud - Microsoft Customer Executive SummitAdvantages to Adoption the Microsoft Cloud - Microsoft Customer Executive Summit
Advantages to Adoption the Microsoft Cloud - Microsoft Customer Executive SummitRichard Harbridge
 
Leaders in the Cloud: Identifying Cloud Business Value for Customers
Leaders in the Cloud: Identifying Cloud Business Value for CustomersLeaders in the Cloud: Identifying Cloud Business Value for Customers
Leaders in the Cloud: Identifying Cloud Business Value for CustomersOpSource
 
CIW Lab with CoheisveFT: Get started in public cloud - Part 1 Cloud & Virtual...
CIW Lab with CoheisveFT: Get started in public cloud - Part 1 Cloud & Virtual...CIW Lab with CoheisveFT: Get started in public cloud - Part 1 Cloud & Virtual...
CIW Lab with CoheisveFT: Get started in public cloud - Part 1 Cloud & Virtual...Ryan Koop
 
The Future of Identity in the Cloud: Requirements, Risks and Opportunities - ...
The Future of Identity in the Cloud: Requirements, Risks and Opportunities - ...The Future of Identity in the Cloud: Requirements, Risks and Opportunities - ...
The Future of Identity in the Cloud: Requirements, Risks and Opportunities - ...gueste4e93e3
 
AAF - Enterprise Architecture and Cloud Computing
AAF - Enterprise Architecture and Cloud ComputingAAF - Enterprise Architecture and Cloud Computing
AAF - Enterprise Architecture and Cloud ComputingMarc Caltabiano
 
Cloud Computing in Business and facts
Cloud Computing in Business and factsCloud Computing in Business and facts
Cloud Computing in Business and factsArun Ganesh
 

What's hot (20)

Cw13 cloud computing & big data by ahmed aamer
Cw13 cloud computing & big data by ahmed aamerCw13 cloud computing & big data by ahmed aamer
Cw13 cloud computing & big data by ahmed aamer
 
Cloud computing security
Cloud computing securityCloud computing security
Cloud computing security
 
Systems Advantage Forum : Autonomous DB e DBaaS
Systems Advantage Forum : Autonomous DB e DBaaS Systems Advantage Forum : Autonomous DB e DBaaS
Systems Advantage Forum : Autonomous DB e DBaaS
 
Cloud Security ("securing the cloud")
Cloud Security ("securing the cloud")Cloud Security ("securing the cloud")
Cloud Security ("securing the cloud")
 
Security & privacy challenges in cloud computing
Security & privacy challenges in cloud computingSecurity & privacy challenges in cloud computing
Security & privacy challenges in cloud computing
 
Capacity Management in a Cloud Computing World
Capacity Management in a Cloud Computing WorldCapacity Management in a Cloud Computing World
Capacity Management in a Cloud Computing World
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
 
Cloud computing-security-issues
Cloud computing-security-issuesCloud computing-security-issues
Cloud computing-security-issues
 
Challenges in cloud computing to enable future internet of things v0.3
Challenges in cloud computing to enable future internet of things v0.3Challenges in cloud computing to enable future internet of things v0.3
Challenges in cloud computing to enable future internet of things v0.3
 
Embracing Cloud in a Traditional Data Center
Embracing Cloud in a Traditional Data CenterEmbracing Cloud in a Traditional Data Center
Embracing Cloud in a Traditional Data Center
 
Lessons learnt building a Distributed Linked List on S3
Lessons learnt building a Distributed Linked List on S3Lessons learnt building a Distributed Linked List on S3
Lessons learnt building a Distributed Linked List on S3
 
Adopting the open group cloud eco system reference model
Adopting the open group cloud eco system reference modelAdopting the open group cloud eco system reference model
Adopting the open group cloud eco system reference model
 
Cloud Security Standards: What to Expect and What to Negotiate V2.0
Cloud Security Standards: What to Expect and What to Negotiate V2.0Cloud Security Standards: What to Expect and What to Negotiate V2.0
Cloud Security Standards: What to Expect and What to Negotiate V2.0
 
Advantages to Adoption the Microsoft Cloud - Microsoft Customer Executive Summit
Advantages to Adoption the Microsoft Cloud - Microsoft Customer Executive SummitAdvantages to Adoption the Microsoft Cloud - Microsoft Customer Executive Summit
Advantages to Adoption the Microsoft Cloud - Microsoft Customer Executive Summit
 
Leaders in the Cloud: Identifying Cloud Business Value for Customers
Leaders in the Cloud: Identifying Cloud Business Value for CustomersLeaders in the Cloud: Identifying Cloud Business Value for Customers
Leaders in the Cloud: Identifying Cloud Business Value for Customers
 
CIW Lab with CoheisveFT: Get started in public cloud - Part 1 Cloud & Virtual...
CIW Lab with CoheisveFT: Get started in public cloud - Part 1 Cloud & Virtual...CIW Lab with CoheisveFT: Get started in public cloud - Part 1 Cloud & Virtual...
CIW Lab with CoheisveFT: Get started in public cloud - Part 1 Cloud & Virtual...
 
Security in Cloud Computing
Security in Cloud ComputingSecurity in Cloud Computing
Security in Cloud Computing
 
The Future of Identity in the Cloud: Requirements, Risks and Opportunities - ...
The Future of Identity in the Cloud: Requirements, Risks and Opportunities - ...The Future of Identity in the Cloud: Requirements, Risks and Opportunities - ...
The Future of Identity in the Cloud: Requirements, Risks and Opportunities - ...
 
AAF - Enterprise Architecture and Cloud Computing
AAF - Enterprise Architecture and Cloud ComputingAAF - Enterprise Architecture and Cloud Computing
AAF - Enterprise Architecture and Cloud Computing
 
Cloud Computing in Business and facts
Cloud Computing in Business and factsCloud Computing in Business and facts
Cloud Computing in Business and facts
 

Similar to Securing your esi_piedmont

Securing_Native_Big_Data_v1
Securing_Native_Big_Data_v1Securing_Native_Big_Data_v1
Securing_Native_Big_Data_v1Steve Markey
 
Guardium Data Activiy Monitor For C- Level Executives
Guardium Data Activiy Monitor For C- Level ExecutivesGuardium Data Activiy Monitor For C- Level Executives
Guardium Data Activiy Monitor For C- Level ExecutivesCamilo Fandiño Gómez
 
The Path to IAM Maturity
The Path to IAM MaturityThe Path to IAM Maturity
The Path to IAM MaturityJerod Brennen
 
E discovery 2-cloud_v5
E discovery 2-cloud_v5E discovery 2-cloud_v5
E discovery 2-cloud_v5scm24
 
CIA-Triad-Presentation.pdf
CIA-Triad-Presentation.pdfCIA-Triad-Presentation.pdf
CIA-Triad-Presentation.pdfBabyBoy55
 
Technology Overview - Symantec Data Loss Prevention (DLP)
Technology Overview - Symantec Data Loss Prevention (DLP)Technology Overview - Symantec Data Loss Prevention (DLP)
Technology Overview - Symantec Data Loss Prevention (DLP)Iftikhar Ali Iqbal
 
e-Discovery_2_Cloud_v5
e-Discovery_2_Cloud_v5e-Discovery_2_Cloud_v5
e-Discovery_2_Cloud_v5Steve Markey
 
Information protection and compliance
Information protection and complianceInformation protection and compliance
Information protection and complianceDean Iacovelli
 
Hackers, Cyber Crime and Espionage
Hackers, Cyber Crime and EspionageHackers, Cyber Crime and Espionage
Hackers, Cyber Crime and EspionageImperva
 
Big Data For Threat Detection & Response
Big Data For Threat Detection & ResponseBig Data For Threat Detection & Response
Big Data For Threat Detection & ResponseHarry McLaren
 
How to evaluate data protection technologies - Mastercard conference
How to evaluate data protection technologies -  Mastercard conferenceHow to evaluate data protection technologies -  Mastercard conference
How to evaluate data protection technologies - Mastercard conferenceUlf Mattsson
 
Office 365 Security, Privacy and Compliance - SMB Nation 2015
Office 365 Security, Privacy and Compliance - SMB Nation 2015Office 365 Security, Privacy and Compliance - SMB Nation 2015
Office 365 Security, Privacy and Compliance - SMB Nation 2015Robert Crane
 
educational content,educational content,educational content,
educational content,educational content,educational content,educational content,educational content,educational content,
educational content,educational content,educational content,Olajide Kuku
 
Security and privacy of cloud data: what you need to know (Interop)
Security and privacy of cloud data: what you need to know (Interop)Security and privacy of cloud data: what you need to know (Interop)
Security and privacy of cloud data: what you need to know (Interop)Druva
 
Aligning Application Security to Compliance
Aligning Application Security to ComplianceAligning Application Security to Compliance
Aligning Application Security to ComplianceSecurity Innovation
 
Top five configuration security errors and how to avoid them - DEM09-S - Chic...
Top five configuration security errors and how to avoid them - DEM09-S - Chic...Top five configuration security errors and how to avoid them - DEM09-S - Chic...
Top five configuration security errors and how to avoid them - DEM09-S - Chic...Amazon Web Services
 
Privacies are Coming
Privacies are ComingPrivacies are Coming
Privacies are ComingErnest Staats
 
DSS.LV - Principles Of Data Protection - March2015 By Arturs Filatovs
DSS.LV - Principles Of Data Protection - March2015 By Arturs FilatovsDSS.LV - Principles Of Data Protection - March2015 By Arturs Filatovs
DSS.LV - Principles Of Data Protection - March2015 By Arturs FilatovsAndris Soroka
 

Similar to Securing your esi_piedmont (20)

Securing_Native_Big_Data_v1
Securing_Native_Big_Data_v1Securing_Native_Big_Data_v1
Securing_Native_Big_Data_v1
 
Guardium Data Activiy Monitor For C- Level Executives
Guardium Data Activiy Monitor For C- Level ExecutivesGuardium Data Activiy Monitor For C- Level Executives
Guardium Data Activiy Monitor For C- Level Executives
 
The Path to IAM Maturity
The Path to IAM MaturityThe Path to IAM Maturity
The Path to IAM Maturity
 
E discovery 2-cloud_v5
E discovery 2-cloud_v5E discovery 2-cloud_v5
E discovery 2-cloud_v5
 
CIA-Triad-Presentation.pdf
CIA-Triad-Presentation.pdfCIA-Triad-Presentation.pdf
CIA-Triad-Presentation.pdf
 
Technology Overview - Symantec Data Loss Prevention (DLP)
Technology Overview - Symantec Data Loss Prevention (DLP)Technology Overview - Symantec Data Loss Prevention (DLP)
Technology Overview - Symantec Data Loss Prevention (DLP)
 
e-Discovery_2_Cloud_v5
e-Discovery_2_Cloud_v5e-Discovery_2_Cloud_v5
e-Discovery_2_Cloud_v5
 
Information protection and compliance
Information protection and complianceInformation protection and compliance
Information protection and compliance
 
Hackers, Cyber Crime and Espionage
Hackers, Cyber Crime and EspionageHackers, Cyber Crime and Espionage
Hackers, Cyber Crime and Espionage
 
Big Data For Threat Detection & Response
Big Data For Threat Detection & ResponseBig Data For Threat Detection & Response
Big Data For Threat Detection & Response
 
Data Leakage Prevention
Data Leakage PreventionData Leakage Prevention
Data Leakage Prevention
 
How to evaluate data protection technologies - Mastercard conference
How to evaluate data protection technologies -  Mastercard conferenceHow to evaluate data protection technologies -  Mastercard conference
How to evaluate data protection technologies - Mastercard conference
 
Office 365 Security, Privacy and Compliance - SMB Nation 2015
Office 365 Security, Privacy and Compliance - SMB Nation 2015Office 365 Security, Privacy and Compliance - SMB Nation 2015
Office 365 Security, Privacy and Compliance - SMB Nation 2015
 
educational content,educational content,educational content,
educational content,educational content,educational content,educational content,educational content,educational content,
educational content,educational content,educational content,
 
Security and privacy of cloud data: what you need to know (Interop)
Security and privacy of cloud data: what you need to know (Interop)Security and privacy of cloud data: what you need to know (Interop)
Security and privacy of cloud data: what you need to know (Interop)
 
Aligning Application Security to Compliance
Aligning Application Security to ComplianceAligning Application Security to Compliance
Aligning Application Security to Compliance
 
Top five configuration security errors and how to avoid them - DEM09-S - Chic...
Top five configuration security errors and how to avoid them - DEM09-S - Chic...Top five configuration security errors and how to avoid them - DEM09-S - Chic...
Top five configuration security errors and how to avoid them - DEM09-S - Chic...
 
Privacies are Coming
Privacies are ComingPrivacies are Coming
Privacies are Coming
 
Security data deluge
Security data delugeSecurity data deluge
Security data deluge
 
DSS.LV - Principles Of Data Protection - March2015 By Arturs Filatovs
DSS.LV - Principles Of Data Protection - March2015 By Arturs FilatovsDSS.LV - Principles Of Data Protection - March2015 By Arturs Filatovs
DSS.LV - Principles Of Data Protection - March2015 By Arturs Filatovs
 

Recently uploaded

Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 

Recently uploaded (20)

Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 

Securing your esi_piedmont

  • 1. Securing Your ESI Steven C. Markey, MSIS, PMP, CISSP, CIPP, CISM, CISA, STS-EV, CCSK, CompTIA Cloud Essentials Principal, nControl, LLC Adjunct Professor President, Cloud Security Alliance – Delaware Valley Chapter (CSA-DelVal)
  • 2. Securing Your ESI • Presentation Overview – WI3FM….? – ESI Overview – Security Overview – Security Tips & Tricks
  • 3. Securing Your ESI • WI3FM – What is in it for me? – Why should I care?
  • 4. Securing Your ESI • Data Breaches & Security Incidents – Average Cost: $7.2 million – http://www.networkworld.com/news/2011/030811- ponemon-data-breach.html – Leading Cause: Negligence, 41%; Hacks, 31% – http://www.networkworld.com/news/2011/030811- ponemon-data-breach.html – Responsible Party: Vendors, 39% – http://www.theiia.org/chapters/index.cfm/view.news_detail/ cid/197/newsid/13809 – Increased Frequency: 2010-2011, 58% – http://www.out-law.com/en/articles/2011/october/personal- data-breaches-on-the-increase-in-private-sector-reports-ico/
  • 8.
  • 9. Securing Your ESI • ESI Overview – Electronically Stored Information (ESI) • Defined for the federal rules of civil procedure (FRCP): – Information created, manipulated, communicated, stored, and best utilized in digital form, requiring the use of computer hardware and software. » http://www.law.northwestern.edu/journals/njtip/v4/n2/3/ • Structured ESI – Stored in database or content management systems. » Examples: Claims, Brokerage / e-Commerce Transactions • Unstructured ESI – Free-form information stored in a manner that is difficult to search within. » Examples: Tweets, Web Site Content, Word Document Content
  • 10. Securing Your ESI • Security Overview – CIA Triad • Confidentiality – Categorization / Classification – Privacy – Least Privilege – AAA: Authentication, Authorization and Accounting • Integrity – Nonrepudiation – Segregation / Separation of Duties • Availability – Business Continuity (BC) / Disaster Recovery (DR) – Defense-in-Depth
  • 12. Securing Your ESI • Vendor Selection – Service-Level Agreements (SLAs) • Temporal Service Contract – Term – Metrics – Definitions – Cause for X (e.g. Termination / Exit Clause) – Certifications / Attestations • SAS 70 Type II / SSAE 16 (SOC 1 / 2 / 3) / ISAE 3402 • ISO 27001 / 2, 27036, 15489 • BITS Shared Assessments • PCI DSS • HIPAA / HITECH
  • 13. Securing Your ESI • Vendor Selection – Incident Response • Computer Security Incident Response Team (CSIRT) – Digital Forensics • Legal Hold / Litigation Response / e-Discovery – Electronic Discovery Reference Model (EDRM) – FRCP 30(b)(6) – Right to Audit • Use your internal vendor assessment team or a mutually agreed upon third party.
  • 14. Securing Your ESI • Mobile Device Security Guidance – Devices • Not all devices are the same. • Balancing Act (Draconian versus Cow-folk) – People lose stuff all the time. • Who owns the device? – Bring Your Own Device (BYOD) = consumerization of IT • Is device content discoverable? • Vicarious Liability – Driving & Texting / Talking – Mobile Device User Acceptance Policy – Applications / Data • Not all applications are the same. • Segment Work & Play – Sandboxing / Data-boxing – Mobile Facebook App Pulls / Pushes Data to Address Book
  • 15. Securing Your ESI • Physical Media Security Guidance – Laptops / Tablets • They should be password-protected / encrypted. • Wipe / degauss hard disk drive (HDD) before shredding. • Receive a certificate / bill of laden for shredding. – Thumb Drives / External Hard Drives • They should be password-protected / encrypted. • Wipe / degauss before shredding. • Receive a certificate / bill of laden for shredding. – Backup Tapes • They should be in your records retention schedule (RRS). • Information Lifecycle • They should be password-protected / encrypted. • Wipe / degauss before shredding. • Receive a certificate / bill of laden for shredding.
  • 16. Securing Your ESI • Cloud Security Guidance – Change / Configuration Management, Provisioning – Matrices • CSA Consensus Assessments Initiative Questionnaire • CSA Cloud Controls Matrix • BITS Enterprise Cloud Self-Assessment • BITS Shared Assessments – Guidance Specifically for the Cloud • Cloud Security Alliance (CSA) Guide v3.0 • CSA Security, Trust & Assurance Registry (STAR) • ENISA Cloud Computing Risk Assessment • NIST SP 800-144 Guidelines Security / Privacy for a Public Cloud
  • 17. Securing Your ESI • Big Data Security Guidance – Information Management • Generally Accepted Recordkeeping Principles (GARP®) • Information Governance Reference Model (IGRM) • Information Lifecycle Management (ILM) • MIKE2.0 • ISO 23081 (Records Metadata) – Known Black Ice • Log Files • Web Metadata • Non-Relational, Distributed Databases (NRDBMS, e.g. NoSQL) • Data Backups (Tapes, Cloud Object Storage) • Social Media
  • 18. Securing Your ESI • Social Media Security Guidance – Sites • Manage (Strategy, Policy, Access, Auditing, e-Discovery) • Strong Passwords • Change / Configuration Management – Provisioning / De-provisioning • Haters (Competitors, Former Employees / Customers) • Wash & Repeat • Mobile Apps for Approved Personnel? – Applications • Immature • Insecure • Discoverable?
  • 19. Securing Your ESI • Security Tips & Tricks – Governance, Risk & Compliance (GRC) – Encryption / Hashing – Authentication, Authorization & Accounting (AAA) – Change / Configuration Management – Incident Response / e-Discovery / DR Testing – Physical Access – End User Training
  • 20. Securing Your ESI • GRC – Documented controls and safeguards. • Potential audit findings and remediation actions. – Enterprise view of compliance. • Potential functional / system / application view as well. – Establish standards, best practices and guidance. • Make users, vendors and partners aware of these.
  • 21. Securing Your ESI • Encryption / Hashing – Data at Rest (DAR) • Object (File, Table, Record, Column), Volume or Block – Data in Motion (DIM) • ‘Across the Wire’, Data-com Link – Data in Use (DIU) • Object (File, Table, Record, Column), Volume or Block
  • 22. Securing Your ESI • Encryption / Hashing – Nuances • Encryption wraps a layer of protection around your information. – Public Key Infrastructure (PKI): VPN, TLS / SSL, S / MIME, WPA • Hashing re-arranges the bits per the program. – Database Hashing: HMAC SHA 1 / 2 / 3, MD5 – Key Management • If you lose the encryption key then your data is lost. – Try telling Legal, a judge or an attorney that!
  • 23. Securing Your ESI • AAA – Authentication • Validating who the user is claiming to be. – Authorization • Allocating the lowest privilege for the user. – Accounting • Tracking the user’s actions.
  • 24. Securing Your ESI • Identity & Access Management (IAM) – Single Sign-on (SSO) • Allows User to Gain Access to Multiple Systems / Apps – Negates password fatigue. • Implementations – Externally » One-time Password (OTP) / Tokenization » Federated Identity / Tokenization » Smart Card / Two Factor Authentication (2FA) » Remote Access Dial-In User Service (RADIUS) – Internally » Kerberos » Lightweight Directory Access Protocol (LDAP)
  • 25. Securing Your ESI • IAM Technologies – Federated Identity • OpenID • OAuth • Security Assertion Markup Language (SAML) • Web Services – Trust Language (WS-Trust) • Representational State Transfer (REST) • Active Directory Federation Services (ADFS) – Microsoft Federation Gateway (MFG)
  • 27. Securing Your ESI • Password Tips & Tricks – Use a password. – Create a strong password / PIN. • Alphanumeric with at least one uppercase letter, one lower-case letter, one number & one special character. • No dictionary words, SSNs, kids, pets, DOBs or address. • No usernames. • Use different passwords for different accounts. – Protect it. • Use a password book if necessary. – Change it. • Semi-annually
  • 28. Securing Your ESI • Change / Configuration Management – Process • Cost, GRC & Quality are huge drivers for: – Software Development Lifecycle (SDLC) – Project Management Office (PMO), Project Portfolio Mgmt (PPM) – Lean / Six Sigma, ISO 9000, CMMi – Provisioning / De-provisioning • On-loading / Off-loading – Profit Centers / Business Units / Functions – Data – Applications – Vendors / Partners – Customers • Periodic Reviews of Processes & Accounts
  • 29. Securing Your ESI • Incident Response / e-Discovery / DR Testing – Practice makes perfect. • Wash & Repeat – Crawl  Walk  Run • Crawl: Internal Tabletop Testing • Walk: Internal Exercise, “cause you have nothing better to do on a Saturday”. • Run: Incorporate Vendors, Partners & Customers
  • 30. Securing Your ESI • Physical Security – Privacy Screen – Physical Location & Office Access – Dumpster Diving – Lost Hard-copy Reports Source: Amazon Source: Flickr Source: Flickr
  • 31. Securing Your ESI • End-user Training – New-hires • Especially for milennials (IT consumerization). – Quarterly Computer-based Training (CBT) • For heavily regulated industries. – Annual On-site Training • Be liberal with the swag. – Pilot new marketing campaigns (logo, tag, brand). – Educate Your Ecosystem
  • 32. Securing Your ESI • Take-aways – Educate Your Ecosystem – Healthy Dose of Skepticism – Embrace Change Pragmatically – Secured Technology is an Enabler – Privacy is Important Too
  • 33. • Questions? • Contact – Email: steve@ncontrol-llc.com – Twitter: @markes1, @casdelval2011 – LI: http://www.linkedin.com/in/smarkey