SlideShare a Scribd company logo
NOT PROTECTIVELY MARKED




A Day in the Life of a User
                 20/03/12

     NOT PROTECTIVELY MARKED
NOT PROTECTIVELY MARKED



                                  Our User...
                                   (let's call him / her Hilary...)


•   Deals with multiple protective markings
•       could be sensitivities, could be caveats / codewords
•   Lives in a Government or List X facility approved for
    all the markings involved
•   Occasionally needs to distribute data from a marked
    input source to one or more differently marked output
    destinations
•   Occasionally needs to attend meetings in a room
    approved for a subset of markings
•   Has at least one Security Controller looking after a
    codeword who's “a bit of a Jobsworth”...

                   NOT PROTECTIVELY MARKED
NOT PROTECTIVELY MARKED




    Welcome to the Office...




NOT PROTECTIVELY MARKED
NOT PROTECTIVELY MARKED




                     First thing in the morning...
   Traditional                             Sun Ray
      Get Flagstone drives                  Power on
      from safe (1 or 2 drives               Insert smartcard
      per marking)                           Enter Sun Ray password
      Load into desktops                    Double-click remote
      Power on                               desktop at each marking
      Wait
      Unlock drives with
      iButtons, passwds
      Boot desktops
      Wait
      Log in to each desktop
      Log in to each remote
      infrastructure

                   NOT PROTECTIVELY MARKED
NOT PROTECTIVELY MARKED




                                     Moving data...
   Traditional                            Sun Ray
     Go to appropriate app                 Go to appropriate app in
      on appropriate desktop                 window at appropriate
     Highlight                              marking
     Save to file                          Highlight
     Cryptographically sign                Copy
     Copy to media (CD                     Go to appropriate app in
      ROM, <wince> USB stick                 window at appropriate
      </wince>)                              marking
     Mount media on                        Paste
      destination desktop                   No media to mishandle!
     Copy file to destination
     Extract data and paste
      accordingly
     Wipe / destroy media
                  NOT PROTECTIVELY MARKED
NOT PROTECTIVELY MARKED




                              Going to a meeting...
   Traditional                            Sun Ray
    Log out of appropriate                  Remove smartcard
     desktop(s)                              Go to meeting room
    Go to meeting room                      Insert smartcard
    Log into desktops                       Log into Sun Ray
    Re-launch apps etc                      Resume available
                                              desktop sessions




                  NOT PROTECTIVELY MARKED
NOT PROTECTIVELY MARKED




                                Before going home...
   Traditional                            Sun Ray
     Log out of remote                      Remove smartcard
      sessions on desktops
     Shut desktops down
     Wait
     Remove drives
     Put drives back in safe




                  NOT PROTECTIVELY MARKED
NOT PROTECTIVELY MARKED




                                      Interesting?
   These scenarios add up to a saving of maybe 20
    minutes per day, per user.
   Add up all those users.
   Add up all those desktops that won't be needed,
    too.
   Also, consider that any cross-domain data transfer
    stays firmly in the system; there's no media, at any
    point, to mishandle.
   Talk to us.
             contact@labelledsecurity.co.uk
                  NOT PROTECTIVELY MARKED
NOT PROTECTIVELY MARKED




Making Britain More Secure.
     NOT PROTECTIVELY MARKED

More Related Content

Viewers also liked

Ambato uta
Ambato utaAmbato uta
Ambato uta
joseedu902000
 
Zakon o osnovima bezbjednosti
Zakon o osnovima bezbjednostiZakon o osnovima bezbjednosti
Zakon o osnovima bezbjednostivucicj
 
Definition and explanation of the principle of archimedes
Definition and explanation of the principle of archimedesDefinition and explanation of the principle of archimedes
Definition and explanation of the principle of archimedes
freddymarcillo
 
Agile Business Analysis - The Key to Effective Requirements on Agile Projects
Agile Business Analysis - The Key to Effective Requirements on Agile ProjectsAgile Business Analysis - The Key to Effective Requirements on Agile Projects
Agile Business Analysis - The Key to Effective Requirements on Agile Projects
Lilian De Munno
 
Brand plan
Brand plan Brand plan
Brand plan
Kim Hartman
 
Magento, uso, desarrollo y diseño
Magento, uso, desarrollo y diseñoMagento, uso, desarrollo y diseño
Magento, uso, desarrollo y diseño
Ignacio Pascual
 
Energy Management for Retail
Energy Management for RetailEnergy Management for Retail
Energy Management for Retail
Energent
 
A business plan for opening a school
A business plan for opening a schoolA business plan for opening a school
A business plan for opening a school
Samit Shahi
 
Byadgi chillies, know more about chilliiii.....
Byadgi chillies, know more about chilliiii.....Byadgi chillies, know more about chilliiii.....
Byadgi chillies, know more about chilliiii.....
Samit Shahi
 
Marvelous designer2 manual
Marvelous designer2 manualMarvelous designer2 manual
Marvelous designer2 manual
Dorel Lupu
 
عرض رسالة ماجستير للباحث عصام الفلاح
عرض رسالة ماجستير للباحث عصام الفلاحعرض رسالة ماجستير للباحث عصام الفلاح
عرض رسالة ماجستير للباحث عصام الفلاح
Hanan Bezan
 
MARKETING MIX
MARKETING MIXMARKETING MIX
MARKETING MIX
Samit Shahi
 

Viewers also liked (12)

Ambato uta
Ambato utaAmbato uta
Ambato uta
 
Zakon o osnovima bezbjednosti
Zakon o osnovima bezbjednostiZakon o osnovima bezbjednosti
Zakon o osnovima bezbjednosti
 
Definition and explanation of the principle of archimedes
Definition and explanation of the principle of archimedesDefinition and explanation of the principle of archimedes
Definition and explanation of the principle of archimedes
 
Agile Business Analysis - The Key to Effective Requirements on Agile Projects
Agile Business Analysis - The Key to Effective Requirements on Agile ProjectsAgile Business Analysis - The Key to Effective Requirements on Agile Projects
Agile Business Analysis - The Key to Effective Requirements on Agile Projects
 
Brand plan
Brand plan Brand plan
Brand plan
 
Magento, uso, desarrollo y diseño
Magento, uso, desarrollo y diseñoMagento, uso, desarrollo y diseño
Magento, uso, desarrollo y diseño
 
Energy Management for Retail
Energy Management for RetailEnergy Management for Retail
Energy Management for Retail
 
A business plan for opening a school
A business plan for opening a schoolA business plan for opening a school
A business plan for opening a school
 
Byadgi chillies, know more about chilliiii.....
Byadgi chillies, know more about chilliiii.....Byadgi chillies, know more about chilliiii.....
Byadgi chillies, know more about chilliiii.....
 
Marvelous designer2 manual
Marvelous designer2 manualMarvelous designer2 manual
Marvelous designer2 manual
 
عرض رسالة ماجستير للباحث عصام الفلاح
عرض رسالة ماجستير للباحث عصام الفلاحعرض رسالة ماجستير للباحث عصام الفلاح
عرض رسالة ماجستير للباحث عصام الفلاح
 
MARKETING MIX
MARKETING MIXMARKETING MIX
MARKETING MIX
 

Similar to Lsl dayinlifeuser

computer hardware
computer hardwarecomputer hardware
computer hardware
Manuel Vic Seniel
 
Digitizing Financial Records: From Paper to the Cloud
Digitizing Financial Records: From Paper to the CloudDigitizing Financial Records: From Paper to the Cloud
Digitizing Financial Records: From Paper to the Cloud
dlhaase
 
The Final Show For It.Htm..
The Final Show For It.Htm..The Final Show For It.Htm..
The Final Show For It.Htm..
shafeeqsookharry
 
DefCon 2012 - Hardware Backdooring (Slides)
DefCon 2012 - Hardware Backdooring (Slides)DefCon 2012 - Hardware Backdooring (Slides)
DefCon 2012 - Hardware Backdooring (Slides)
Michael Smith
 
Rootkit Hunting & Compromise Detection
Rootkit Hunting & Compromise DetectionRootkit Hunting & Compromise Detection
Rootkit Hunting & Compromise Detection
amiable_indian
 
Eloi Sanfélix y Javier Moreno - Hardware hacking on your couch [RootedCON 2012]
Eloi Sanfélix y Javier Moreno - Hardware hacking on your couch [RootedCON 2012]Eloi Sanfélix y Javier Moreno - Hardware hacking on your couch [RootedCON 2012]
Eloi Sanfélix y Javier Moreno - Hardware hacking on your couch [RootedCON 2012]
RootedCON
 
Embedded government espionage
Embedded government espionageEmbedded government espionage
Embedded government espionage
Muts Byte
 
The VDI InfoSec Conundrum
The VDI InfoSec ConundrumThe VDI InfoSec Conundrum
The VDI InfoSec Conundrum
VirtualTal
 
Windows Hacking
Windows HackingWindows Hacking
Windows Hacking
Mayur Sutariya
 
[Hackito2012] Hardware backdooring is practical
[Hackito2012] Hardware backdooring is practical[Hackito2012] Hardware backdooring is practical
[Hackito2012] Hardware backdooring is practical
Moabi.com
 
ZENDAL BACKUP
ZENDAL BACKUPZENDAL BACKUP
amrapali builders @@hacking printers.pdf
amrapali builders @@hacking printers.pdfamrapali builders @@hacking printers.pdf
amrapali builders @@hacking printers.pdf
amrapalibuildersreviews
 
Accessing Forensic Images
Accessing Forensic ImagesAccessing Forensic Images
Accessing Forensic Images
CTIN
 
Offline attacks-and-hard-disk-encription
Offline attacks-and-hard-disk-encriptionOffline attacks-and-hard-disk-encription
Offline attacks-and-hard-disk-encription
malvvv
 
Backing Up Android
Backing Up AndroidBacking Up Android
Backing Up Android
POSSCON
 
Hacking and cracking
Hacking and crackingHacking and cracking
Hacking and cracking
Deepak kumar
 
Computer devices
Computer devicesComputer devices
Computer devices
akashsaw
 
Business Continuity 2009
Business Continuity 2009Business Continuity 2009
Business Continuity 2009
OS-Cubed, Inc.
 
Analysis of digital evidence
Analysis of digital evidenceAnalysis of digital evidence
Analysis of digital evidence
rakesh mishra
 
Threats to data and information security
Threats to data and information securityThreats to data and information security
Threats to data and information security
John LEE
 

Similar to Lsl dayinlifeuser (20)

computer hardware
computer hardwarecomputer hardware
computer hardware
 
Digitizing Financial Records: From Paper to the Cloud
Digitizing Financial Records: From Paper to the CloudDigitizing Financial Records: From Paper to the Cloud
Digitizing Financial Records: From Paper to the Cloud
 
The Final Show For It.Htm..
The Final Show For It.Htm..The Final Show For It.Htm..
The Final Show For It.Htm..
 
DefCon 2012 - Hardware Backdooring (Slides)
DefCon 2012 - Hardware Backdooring (Slides)DefCon 2012 - Hardware Backdooring (Slides)
DefCon 2012 - Hardware Backdooring (Slides)
 
Rootkit Hunting & Compromise Detection
Rootkit Hunting & Compromise DetectionRootkit Hunting & Compromise Detection
Rootkit Hunting & Compromise Detection
 
Eloi Sanfélix y Javier Moreno - Hardware hacking on your couch [RootedCON 2012]
Eloi Sanfélix y Javier Moreno - Hardware hacking on your couch [RootedCON 2012]Eloi Sanfélix y Javier Moreno - Hardware hacking on your couch [RootedCON 2012]
Eloi Sanfélix y Javier Moreno - Hardware hacking on your couch [RootedCON 2012]
 
Embedded government espionage
Embedded government espionageEmbedded government espionage
Embedded government espionage
 
The VDI InfoSec Conundrum
The VDI InfoSec ConundrumThe VDI InfoSec Conundrum
The VDI InfoSec Conundrum
 
Windows Hacking
Windows HackingWindows Hacking
Windows Hacking
 
[Hackito2012] Hardware backdooring is practical
[Hackito2012] Hardware backdooring is practical[Hackito2012] Hardware backdooring is practical
[Hackito2012] Hardware backdooring is practical
 
ZENDAL BACKUP
ZENDAL BACKUPZENDAL BACKUP
ZENDAL BACKUP
 
amrapali builders @@hacking printers.pdf
amrapali builders @@hacking printers.pdfamrapali builders @@hacking printers.pdf
amrapali builders @@hacking printers.pdf
 
Accessing Forensic Images
Accessing Forensic ImagesAccessing Forensic Images
Accessing Forensic Images
 
Offline attacks-and-hard-disk-encription
Offline attacks-and-hard-disk-encriptionOffline attacks-and-hard-disk-encription
Offline attacks-and-hard-disk-encription
 
Backing Up Android
Backing Up AndroidBacking Up Android
Backing Up Android
 
Hacking and cracking
Hacking and crackingHacking and cracking
Hacking and cracking
 
Computer devices
Computer devicesComputer devices
Computer devices
 
Business Continuity 2009
Business Continuity 2009Business Continuity 2009
Business Continuity 2009
 
Analysis of digital evidence
Analysis of digital evidenceAnalysis of digital evidence
Analysis of digital evidence
 
Threats to data and information security
Threats to data and information securityThreats to data and information security
Threats to data and information security
 

Recently uploaded

GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 
20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website
Pixlogix Infotech
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
Claudio Di Ciccio
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 

Recently uploaded (20)

GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 
20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 

Lsl dayinlifeuser

  • 1. NOT PROTECTIVELY MARKED A Day in the Life of a User 20/03/12 NOT PROTECTIVELY MARKED
  • 2. NOT PROTECTIVELY MARKED Our User... (let's call him / her Hilary...) • Deals with multiple protective markings • could be sensitivities, could be caveats / codewords • Lives in a Government or List X facility approved for all the markings involved • Occasionally needs to distribute data from a marked input source to one or more differently marked output destinations • Occasionally needs to attend meetings in a room approved for a subset of markings • Has at least one Security Controller looking after a codeword who's “a bit of a Jobsworth”... NOT PROTECTIVELY MARKED
  • 3. NOT PROTECTIVELY MARKED Welcome to the Office... NOT PROTECTIVELY MARKED
  • 4. NOT PROTECTIVELY MARKED First thing in the morning...  Traditional  Sun Ray  Get Flagstone drives  Power on from safe (1 or 2 drives  Insert smartcard per marking)  Enter Sun Ray password  Load into desktops  Double-click remote  Power on desktop at each marking  Wait  Unlock drives with iButtons, passwds  Boot desktops  Wait  Log in to each desktop  Log in to each remote infrastructure NOT PROTECTIVELY MARKED
  • 5. NOT PROTECTIVELY MARKED Moving data...  Traditional  Sun Ray  Go to appropriate app  Go to appropriate app in on appropriate desktop window at appropriate  Highlight marking  Save to file  Highlight  Cryptographically sign  Copy  Copy to media (CD  Go to appropriate app in ROM, <wince> USB stick window at appropriate </wince>) marking  Mount media on  Paste destination desktop  No media to mishandle!  Copy file to destination  Extract data and paste accordingly  Wipe / destroy media NOT PROTECTIVELY MARKED
  • 6. NOT PROTECTIVELY MARKED Going to a meeting...  Traditional  Sun Ray  Log out of appropriate  Remove smartcard desktop(s)  Go to meeting room  Go to meeting room  Insert smartcard  Log into desktops  Log into Sun Ray  Re-launch apps etc  Resume available desktop sessions NOT PROTECTIVELY MARKED
  • 7. NOT PROTECTIVELY MARKED Before going home...  Traditional  Sun Ray  Log out of remote  Remove smartcard sessions on desktops  Shut desktops down  Wait  Remove drives  Put drives back in safe NOT PROTECTIVELY MARKED
  • 8. NOT PROTECTIVELY MARKED Interesting?  These scenarios add up to a saving of maybe 20 minutes per day, per user.  Add up all those users.  Add up all those desktops that won't be needed, too.  Also, consider that any cross-domain data transfer stays firmly in the system; there's no media, at any point, to mishandle.  Talk to us. contact@labelledsecurity.co.uk NOT PROTECTIVELY MARKED
  • 9. NOT PROTECTIVELY MARKED Making Britain More Secure. NOT PROTECTIVELY MARKED