Oracle Cloud Days Tokyo 2016 (2016年10月開催)でのデータ・セキュリティに関する講演資料です。 ※ 一部資料を修正しました (2016/12/27)
この3年間の情報漏洩事件の傾向を振り返り、今考えるべき個人情報や機密情報を保護に求められる多層防御やデータ・セキュリティ対策のポイントを事例を交えて紹介します。また、各種ガイドラインに求められるデータ・セキュリティに求められる要件も併せて紹介します。
#5 Oracle had the foresight around the future of the cloud that made it possible for us to deliver the right cloud solution at the right time
While other vendors provide a single stepping-stone in the path to cloud, Oracle built the entire bridge, not for our own short-term gain, but for the long-term enablement of our customers’ transitions to cloud
So why did we take this approach?
#16 Oracle had the foresight around the future of the cloud that made it possible for us to deliver the right cloud solution at the right time
While other vendors provide a single stepping-stone in the path to cloud, Oracle built the entire bridge, not for our own short-term gain, but for the long-term enablement of our customers’ transitions to cloud
So why did we take this approach?
#22 We give you a very quick tour of the various types of the attack vectors, and we also talked about what you could do to mitigate the risks. You are perhaps however also thinking about how would you actually go about implementing these controls. What should be the order? How do you prioritize?
One of the most common questions, what should I do first?
Your security controls needs to map to the value of the data that you have. Let's say that you are somehow able to assign different sensitivity level to your data from bronze and silver to gold and platinum. Lets say
Bronze is Internal portals, employee directories, …
Silver is Business transactions, orders, …
Gold is Regulatory compliance data whether PII, PCI, PHI, SOX, …
-Platinum is Highly sensitive & restricted data including Quarterly Sales, Sales forecast, M&A, IP, Source code, …
Bronze and above databases: they should at minimum be securely configured, and be current on the security patches. It is very easy for hackers to break into an unpatched system, and make it as a base for further explorations (C2: Command and Control) or a repository for all the data discovered. We certainly want to monitor and audit all the activities done by the privileged users on this machine so that if any significant changes are being made, they can be tracked.
Silver and above databases: their data at minimum should be protected from Unauthorized users. This means that in ensuring that their data is not divisible to the network, the operating system, and to the test and development machines. We should make sure that people are authenticated with strong passwords, or ideally with a PKI or Kerberos based system. The basic approach used for Silver is encryption, masking, and strong authentication.
Gold and above databases: their data at minimum should be protected from privileged users, and from those users who do not really have a business need to have access to the data. We need to control the activities of the privilege users, and monitor the network activities to limit the damage. For meeting the basic compliance requirements, we need to protect all PII, PCI, PHI data.
Platinum databases: this should have the security controls used for bronze, silver, and gold. In addition, we need to lock it down as platinum number has the most sensitive critical assets. We need to control who can come on the database machine, controlled every single operation, ensure that SQL injection attacks cannot succeed, and that we track everything that happens on this machine so that in case of a breach, we would be able to figure out what actually was lost.
Depending upon the priorities and the security strategy of the company, companies can start from either edge of the spectrum. They can start securing the configuration of all of their databases and managing them centrally, or they can identify their most critical assets first, and then lock them down. Either way, they need to have a proper strategy in place considering the overall business objectives, people resources, and time.
#23 While the signage may have gotten better, the mission is still the same
Connecting people and business to information
And that, our journey, our ideas continue to have the power to impact change
#28 Oracle had the foresight around the future of the cloud that made it possible for us to deliver the right cloud solution at the right time
While other vendors provide a single stepping-stone in the path to cloud, Oracle built the entire bridge, not for our own short-term gain, but for the long-term enablement of our customers’ transitions to cloud
So why did we take this approach?
#41 Oracle had the foresight around the future of the cloud that made it possible for us to deliver the right cloud solution at the right time
While other vendors provide a single stepping-stone in the path to cloud, Oracle built the entire bridge, not for our own short-term gain, but for the long-term enablement of our customers’ transitions to cloud
So why did we take this approach?
#47 Oracle had the foresight around the future of the cloud that made it possible for us to deliver the right cloud solution at the right time
While other vendors provide a single stepping-stone in the path to cloud, Oracle built the entire bridge, not for our own short-term gain, but for the long-term enablement of our customers’ transitions to cloud
So why did we take this approach?
#50 Oracle had the foresight around the future of the cloud that made it possible for us to deliver the right cloud solution at the right time
While other vendors provide a single stepping-stone in the path to cloud, Oracle built the entire bridge, not for our own short-term gain, but for the long-term enablement of our customers’ transitions to cloud
So why did we take this approach?