SlideShare a Scribd company logo
Securing Your ESI
Steven C. Markey, MSIS, PMP, CISSP, CIPP, CISM, CISA, STS-EV, CCSK, CompTIA Cloud
                                    Essentials
                            Principal, nControl, LLC
                               Adjunct Professor
   President, Cloud Security Alliance – Delaware Valley Chapter (CSA-DelVal)
Securing Your ESI
• Presentation Overview
  – WI3FM….?
  – ESI Overview
  – Security Overview
  – Security Tips & Tricks
Securing Your ESI
• WI3FM
  – What is in it for me?
     – Why should I care?
Securing Your ESI
• Data Breaches & Security Incidents
  – Average Cost: $7.2 million
     – http://www.networkworld.com/news/2011/030811-
       ponemon-data-breach.html
  – Leading Cause: Negligence, 41%; Hacks, 31%
     – http://www.networkworld.com/news/2011/030811-
       ponemon-data-breach.html
  – Responsible Party: Vendors, 39%
     – http://www.theiia.org/chapters/index.cfm/view.news_detail/
       cid/197/newsid/13809
  – Increased Frequency: 2010-2011, 58%
     – http://www.out-law.com/en/articles/2011/october/personal-
       data-breaches-on-the-increase-in-private-sector-reports-ico/
Source: Flickr
Source: Flickr
Source: Flickr
Securing Your ESI
• ESI Overview
  – Electronically Stored Information (ESI)
     • Defined for the federal rules of civil procedure (FRCP):
         – Information created, manipulated, communicated, stored,
           and best utilized in digital form, requiring the use of computer
           hardware and software.
             » http://www.law.northwestern.edu/journals/njtip/v4/n2/3/
     • Structured ESI
         – Stored in database or content management systems.
             » Examples: Claims, Brokerage / e-Commerce Transactions
     • Unstructured ESI
         – Free-form information stored in a manner that is difficult to
           search within.
             » Examples: Tweets, Web Site Content, Word Document Content
Securing Your ESI
• Security Overview
  – CIA Triad
     • Confidentiality
         –   Categorization / Classification
         –   Privacy
         –   Least Privilege
         –   AAA: Authentication, Authorization and Accounting
     • Integrity
         – Nonrepudiation
         – Segregation / Separation of Duties
     • Availability
         – Business Continuity (BC) / Disaster Recovery (DR)
         – Defense-in-Depth
Source: Flickr
Securing Your ESI
• Vendor Selection
  – Service-Level Agreements (SLAs)
     • Temporal Service Contract
          –   Term
          –   Metrics
          –   Definitions
          –   Cause for X (e.g. Termination / Exit Clause)
  – Certifications / Attestations
     •   SAS 70 Type II / SSAE 16 (SOC 1 / 2 / 3) / ISAE 3402
     •   ISO 27001 / 2, 27036, 15489
     •   BITS Shared Assessments
     •   PCI DSS
     •   HIPAA / HITECH
Securing Your ESI

• Vendor Selection
  – Incident Response
     • Computer Security Incident Response Team (CSIRT)
         – Digital Forensics
     • Legal Hold / Litigation Response / e-Discovery
         – Electronic Discovery Reference Model (EDRM)
         – FRCP 30(b)(6)
  – Right to Audit
     • Use your internal vendor assessment team or a mutually
       agreed upon third party.
Securing Your ESI
• Mobile Device Security Guidance
  – Devices
     • Not all devices are the same.
     • Balancing Act (Draconian versus Cow-folk)
         – People lose stuff all the time.
     • Who owns the device?
         – Bring Your Own Device (BYOD) = consumerization of IT
     • Is device content discoverable?
     • Vicarious Liability
         – Driving & Texting / Talking
         – Mobile Device User Acceptance Policy

  – Applications / Data
     • Not all applications are the same.
     • Segment Work & Play
         – Sandboxing / Data-boxing
         – Mobile Facebook App Pulls / Pushes Data to Address Book
Securing Your ESI
• Physical Media Security Guidance
  – Laptops / Tablets
     • They should be password-protected / encrypted.
     • Wipe / degauss hard disk drive (HDD) before shredding.
         • Receive a certificate / bill of laden for shredding.

  – Thumb Drives / External Hard Drives
     • They should be password-protected / encrypted.
     • Wipe / degauss before shredding.
         • Receive a certificate / bill of laden for shredding.

  – Backup Tapes
     • They should be in your records retention schedule (RRS).
         • Information Lifecycle
     • They should be password-protected / encrypted.
     • Wipe / degauss before shredding.
         • Receive a certificate / bill of laden for shredding.
Securing Your ESI
• Cloud Security Guidance
  – Change / Configuration Management, Provisioning
  – Matrices
     •   CSA Consensus Assessments Initiative Questionnaire
     •   CSA Cloud Controls Matrix
     •   BITS Enterprise Cloud Self-Assessment
     •   BITS Shared Assessments
  – Guidance Specifically for the Cloud
     •   Cloud Security Alliance (CSA) Guide v3.0
     •   CSA Security, Trust & Assurance Registry (STAR)
     •   ENISA Cloud Computing Risk Assessment
     •   NIST SP 800-144 Guidelines Security / Privacy for a Public Cloud
Securing Your ESI
• Big Data Security Guidance
  – Information Management
     •   Generally Accepted Recordkeeping Principles (GARP®)
     •   Information Governance Reference Model (IGRM)
     •   Information Lifecycle Management (ILM)
     •   MIKE2.0
     •   ISO 23081 (Records Metadata)
  – Known Black Ice
     •   Log Files
     •   Web Metadata
     •   Non-Relational, Distributed Databases (NRDBMS, e.g. NoSQL)
     •   Data Backups (Tapes, Cloud Object Storage)
     •   Social Media
Securing Your ESI
• Social Media Security Guidance
  – Sites
     • Manage (Strategy, Policy, Access, Auditing, e-Discovery)
     • Strong Passwords
     • Change / Configuration Management
         – Provisioning / De-provisioning
     • Haters (Competitors, Former Employees / Customers)
     • Wash & Repeat
     • Mobile Apps for Approved Personnel?
  – Applications
     • Immature
     • Insecure
     • Discoverable?
Securing Your ESI
• Security Tips & Tricks
  – Governance, Risk & Compliance (GRC)
  – Encryption / Hashing
  – Authentication, Authorization & Accounting (AAA)
  – Change / Configuration Management
  – Incident Response / e-Discovery / DR Testing
  – Physical Access
  – End User Training
Securing Your ESI
• GRC
  – Documented controls and safeguards.
     • Potential audit findings and remediation actions.
  – Enterprise view of compliance.
     • Potential functional / system / application view as well.
  – Establish standards, best practices and guidance.
     • Make users, vendors and partners aware of these.
Securing Your ESI
• Encryption / Hashing
  – Data at Rest (DAR)
     • Object (File, Table, Record, Column), Volume or Block
  – Data in Motion (DIM)
     • ‘Across the Wire’, Data-com Link
  – Data in Use (DIU)
     • Object (File, Table, Record, Column), Volume or Block
Securing Your ESI
• Encryption / Hashing
  – Nuances
     • Encryption wraps a layer of protection around your
       information.
        – Public Key Infrastructure (PKI): VPN, TLS / SSL, S / MIME, WPA
     • Hashing re-arranges the bits per the program.
        – Database Hashing: HMAC SHA 1 / 2 / 3, MD5
  – Key Management
     • If you lose the encryption key then your data is lost.
        – Try telling Legal, a judge or an attorney that!
Securing Your ESI
• AAA
  – Authentication
     • Validating who the user is claiming to be.
  – Authorization
     • Allocating the lowest privilege for the user.
  – Accounting
     • Tracking the user’s actions.
Securing Your ESI
• Identity & Access Management (IAM)
  – Single Sign-on (SSO)
     • Allows User to Gain Access to Multiple Systems / Apps
        – Negates password fatigue.
     • Implementations
        – Externally
            » One-time Password (OTP) / Tokenization
            » Federated Identity / Tokenization
            » Smart Card / Two Factor Authentication (2FA)
            » Remote Access Dial-In User Service (RADIUS)
        – Internally
            » Kerberos
            » Lightweight Directory Access Protocol (LDAP)
Securing Your ESI
• IAM Technologies
  – Federated Identity
     •   OpenID
     •   OAuth
     •   Security Assertion Markup Language (SAML)
     •   Web Services – Trust Language (WS-Trust)
     •   Representational State Transfer (REST)
     •   Active Directory Federation Services (ADFS)
          – Microsoft Federation Gateway (MFG)
Securing Your ESI
Securing Your ESI
• Password Tips & Tricks
  – Use a password.
  – Create a strong password / PIN.
     • Alphanumeric with at least one uppercase letter, one
       lower-case letter, one number & one special character.
     • No dictionary words, SSNs, kids, pets, DOBs or address.
     • No usernames.
     • Use different passwords for different accounts.
  – Protect it.
     • Use a password book if necessary.
  – Change it.
     • Semi-annually
Securing Your ESI
• Change / Configuration Management
  – Process
     • Cost, GRC & Quality are huge drivers for:
        – Software Development Lifecycle (SDLC)
        – Project Management Office (PMO), Project Portfolio Mgmt (PPM)
        – Lean / Six Sigma, ISO 9000, CMMi
  – Provisioning / De-provisioning
     • On-loading / Off-loading
        –   Profit Centers / Business Units / Functions
        –   Data
        –   Applications
        –   Vendors / Partners
        –   Customers
     • Periodic Reviews of Processes & Accounts
Securing Your ESI
• Incident Response / e-Discovery / DR Testing
  – Practice makes perfect.
     • Wash & Repeat
  – Crawl  Walk  Run
     • Crawl: Internal Tabletop Testing
     • Walk: Internal Exercise, “cause you have nothing better
       to do on a Saturday”.
     • Run: Incorporate Vendors, Partners & Customers
Securing Your ESI
• Physical Security
  – Privacy Screen
  – Physical Location & Office Access
  – Dumpster Diving
  – Lost Hard-copy Reports                  Source: Amazon




            Source: Flickr              Source: Flickr
Securing Your ESI
• End-user Training
  – New-hires
     • Especially for milennials (IT consumerization).
  – Quarterly Computer-based Training (CBT)
     • For heavily regulated industries.
  – Annual On-site Training
     • Be liberal with the swag.
        – Pilot new marketing campaigns (logo, tag, brand).
  – Educate Your Ecosystem
Securing Your ESI
• Take-aways
  – Educate Your Ecosystem
  – Healthy Dose of Skepticism
  – Embrace Change Pragmatically
  – Secured Technology is an Enabler
  – Privacy is Important Too
• Questions?
• Contact
  – Email: steve@ncontrol-llc.com
  – Twitter: @markes1, @casdelval2011
  – LI: http://www.linkedin.com/in/smarkey

More Related Content

What's hot

Cw13 cloud computing & big data by ahmed aamer
Cw13 cloud computing & big data by ahmed aamerCw13 cloud computing & big data by ahmed aamer
Cw13 cloud computing & big data by ahmed aamer
inevitablecloud
 
Capacity Management in a Cloud Computing World
Capacity Management in a Cloud Computing WorldCapacity Management in a Cloud Computing World
Capacity Management in a Cloud Computing World
David Linthicum
 
Challenges in cloud computing to enable future internet of things v0.3
Challenges in cloud computing to enable future internet of things v0.3Challenges in cloud computing to enable future internet of things v0.3
Challenges in cloud computing to enable future internet of things v0.3
Ignacio M. Llorente
 
Advantages to Adoption the Microsoft Cloud - Microsoft Customer Executive Summit
Advantages to Adoption the Microsoft Cloud - Microsoft Customer Executive SummitAdvantages to Adoption the Microsoft Cloud - Microsoft Customer Executive Summit
Advantages to Adoption the Microsoft Cloud - Microsoft Customer Executive Summit
Richard Harbridge
 
Leaders in the Cloud: Identifying Cloud Business Value for Customers
Leaders in the Cloud: Identifying Cloud Business Value for CustomersLeaders in the Cloud: Identifying Cloud Business Value for Customers
Leaders in the Cloud: Identifying Cloud Business Value for Customers
OpSource
 
Security in Cloud Computing
Security in Cloud ComputingSecurity in Cloud Computing
Security in Cloud Computing
Rohit Buddabathina
 
The Future of Identity in the Cloud: Requirements, Risks and Opportunities - ...
The Future of Identity in the Cloud: Requirements, Risks and Opportunities - ...The Future of Identity in the Cloud: Requirements, Risks and Opportunities - ...
The Future of Identity in the Cloud: Requirements, Risks and Opportunities - ...
gueste4e93e3
 
Cloud Computing in Business and facts
Cloud Computing in Business and factsCloud Computing in Business and facts
Cloud Computing in Business and facts
Arun Ganesh
 

What's hot (20)

Cw13 cloud computing & big data by ahmed aamer
Cw13 cloud computing & big data by ahmed aamerCw13 cloud computing & big data by ahmed aamer
Cw13 cloud computing & big data by ahmed aamer
 
Cloud computing security
Cloud computing securityCloud computing security
Cloud computing security
 
Systems Advantage Forum : Autonomous DB e DBaaS
Systems Advantage Forum : Autonomous DB e DBaaS Systems Advantage Forum : Autonomous DB e DBaaS
Systems Advantage Forum : Autonomous DB e DBaaS
 
Cloud Security ("securing the cloud")
Cloud Security ("securing the cloud")Cloud Security ("securing the cloud")
Cloud Security ("securing the cloud")
 
Security & privacy challenges in cloud computing
Security & privacy challenges in cloud computingSecurity & privacy challenges in cloud computing
Security & privacy challenges in cloud computing
 
Capacity Management in a Cloud Computing World
Capacity Management in a Cloud Computing WorldCapacity Management in a Cloud Computing World
Capacity Management in a Cloud Computing World
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
 
Cloud computing-security-issues
Cloud computing-security-issuesCloud computing-security-issues
Cloud computing-security-issues
 
Challenges in cloud computing to enable future internet of things v0.3
Challenges in cloud computing to enable future internet of things v0.3Challenges in cloud computing to enable future internet of things v0.3
Challenges in cloud computing to enable future internet of things v0.3
 
Embracing Cloud in a Traditional Data Center
Embracing Cloud in a Traditional Data CenterEmbracing Cloud in a Traditional Data Center
Embracing Cloud in a Traditional Data Center
 
Lessons learnt building a Distributed Linked List on S3
Lessons learnt building a Distributed Linked List on S3Lessons learnt building a Distributed Linked List on S3
Lessons learnt building a Distributed Linked List on S3
 
Adopting the open group cloud eco system reference model
Adopting the open group cloud eco system reference modelAdopting the open group cloud eco system reference model
Adopting the open group cloud eco system reference model
 
Cloud Security Standards: What to Expect and What to Negotiate V2.0
Cloud Security Standards: What to Expect and What to Negotiate V2.0Cloud Security Standards: What to Expect and What to Negotiate V2.0
Cloud Security Standards: What to Expect and What to Negotiate V2.0
 
Advantages to Adoption the Microsoft Cloud - Microsoft Customer Executive Summit
Advantages to Adoption the Microsoft Cloud - Microsoft Customer Executive SummitAdvantages to Adoption the Microsoft Cloud - Microsoft Customer Executive Summit
Advantages to Adoption the Microsoft Cloud - Microsoft Customer Executive Summit
 
Leaders in the Cloud: Identifying Cloud Business Value for Customers
Leaders in the Cloud: Identifying Cloud Business Value for CustomersLeaders in the Cloud: Identifying Cloud Business Value for Customers
Leaders in the Cloud: Identifying Cloud Business Value for Customers
 
CIW Lab with CoheisveFT: Get started in public cloud - Part 1 Cloud & Virtual...
CIW Lab with CoheisveFT: Get started in public cloud - Part 1 Cloud & Virtual...CIW Lab with CoheisveFT: Get started in public cloud - Part 1 Cloud & Virtual...
CIW Lab with CoheisveFT: Get started in public cloud - Part 1 Cloud & Virtual...
 
Security in Cloud Computing
Security in Cloud ComputingSecurity in Cloud Computing
Security in Cloud Computing
 
The Future of Identity in the Cloud: Requirements, Risks and Opportunities - ...
The Future of Identity in the Cloud: Requirements, Risks and Opportunities - ...The Future of Identity in the Cloud: Requirements, Risks and Opportunities - ...
The Future of Identity in the Cloud: Requirements, Risks and Opportunities - ...
 
AAF - Enterprise Architecture and Cloud Computing
AAF - Enterprise Architecture and Cloud ComputingAAF - Enterprise Architecture and Cloud Computing
AAF - Enterprise Architecture and Cloud Computing
 
Cloud Computing in Business and facts
Cloud Computing in Business and factsCloud Computing in Business and facts
Cloud Computing in Business and facts
 

Similar to Securing your esi_piedmont

Securing_Native_Big_Data_v1
Securing_Native_Big_Data_v1Securing_Native_Big_Data_v1
Securing_Native_Big_Data_v1
Steve Markey
 
E discovery 2-cloud_v5
E discovery 2-cloud_v5E discovery 2-cloud_v5
E discovery 2-cloud_v5
scm24
 
e-Discovery_2_Cloud_v5
e-Discovery_2_Cloud_v5e-Discovery_2_Cloud_v5
e-Discovery_2_Cloud_v5
Steve Markey
 
educational content,educational content,educational content,
educational content,educational content,educational content,educational content,educational content,educational content,
educational content,educational content,educational content,
Olajide Kuku
 

Similar to Securing your esi_piedmont (20)

Securing_Native_Big_Data_v1
Securing_Native_Big_Data_v1Securing_Native_Big_Data_v1
Securing_Native_Big_Data_v1
 
Guardium Data Activiy Monitor For C- Level Executives
Guardium Data Activiy Monitor For C- Level ExecutivesGuardium Data Activiy Monitor For C- Level Executives
Guardium Data Activiy Monitor For C- Level Executives
 
The Path to IAM Maturity
The Path to IAM MaturityThe Path to IAM Maturity
The Path to IAM Maturity
 
E discovery 2-cloud_v5
E discovery 2-cloud_v5E discovery 2-cloud_v5
E discovery 2-cloud_v5
 
CIA-Triad-Presentation.pdf
CIA-Triad-Presentation.pdfCIA-Triad-Presentation.pdf
CIA-Triad-Presentation.pdf
 
Technology Overview - Symantec Data Loss Prevention (DLP)
Technology Overview - Symantec Data Loss Prevention (DLP)Technology Overview - Symantec Data Loss Prevention (DLP)
Technology Overview - Symantec Data Loss Prevention (DLP)
 
e-Discovery_2_Cloud_v5
e-Discovery_2_Cloud_v5e-Discovery_2_Cloud_v5
e-Discovery_2_Cloud_v5
 
Information protection and compliance
Information protection and complianceInformation protection and compliance
Information protection and compliance
 
Hackers, Cyber Crime and Espionage
Hackers, Cyber Crime and EspionageHackers, Cyber Crime and Espionage
Hackers, Cyber Crime and Espionage
 
Big Data For Threat Detection & Response
Big Data For Threat Detection & ResponseBig Data For Threat Detection & Response
Big Data For Threat Detection & Response
 
Data Leakage Prevention
Data Leakage PreventionData Leakage Prevention
Data Leakage Prevention
 
How to evaluate data protection technologies - Mastercard conference
How to evaluate data protection technologies -  Mastercard conferenceHow to evaluate data protection technologies -  Mastercard conference
How to evaluate data protection technologies - Mastercard conference
 
Office 365 Security, Privacy and Compliance - SMB Nation 2015
Office 365 Security, Privacy and Compliance - SMB Nation 2015Office 365 Security, Privacy and Compliance - SMB Nation 2015
Office 365 Security, Privacy and Compliance - SMB Nation 2015
 
educational content,educational content,educational content,
educational content,educational content,educational content,educational content,educational content,educational content,
educational content,educational content,educational content,
 
Security and privacy of cloud data: what you need to know (Interop)
Security and privacy of cloud data: what you need to know (Interop)Security and privacy of cloud data: what you need to know (Interop)
Security and privacy of cloud data: what you need to know (Interop)
 
Aligning Application Security to Compliance
Aligning Application Security to ComplianceAligning Application Security to Compliance
Aligning Application Security to Compliance
 
Top five configuration security errors and how to avoid them - DEM09-S - Chic...
Top five configuration security errors and how to avoid them - DEM09-S - Chic...Top five configuration security errors and how to avoid them - DEM09-S - Chic...
Top five configuration security errors and how to avoid them - DEM09-S - Chic...
 
Privacies are Coming
Privacies are ComingPrivacies are Coming
Privacies are Coming
 
Security data deluge
Security data delugeSecurity data deluge
Security data deluge
 
DSS.LV - Principles Of Data Protection - March2015 By Arturs Filatovs
DSS.LV - Principles Of Data Protection - March2015 By Arturs FilatovsDSS.LV - Principles Of Data Protection - March2015 By Arturs Filatovs
DSS.LV - Principles Of Data Protection - March2015 By Arturs Filatovs
 

Recently uploaded

Recently uploaded (20)

Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀Exploring UiPath Orchestrator API: updates and limits in 2024 🚀
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
 
UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
 
Demystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John StaveleyDemystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John Staveley
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 

Securing your esi_piedmont

  • 1. Securing Your ESI Steven C. Markey, MSIS, PMP, CISSP, CIPP, CISM, CISA, STS-EV, CCSK, CompTIA Cloud Essentials Principal, nControl, LLC Adjunct Professor President, Cloud Security Alliance – Delaware Valley Chapter (CSA-DelVal)
  • 2. Securing Your ESI • Presentation Overview – WI3FM….? – ESI Overview – Security Overview – Security Tips & Tricks
  • 3. Securing Your ESI • WI3FM – What is in it for me? – Why should I care?
  • 4. Securing Your ESI • Data Breaches & Security Incidents – Average Cost: $7.2 million – http://www.networkworld.com/news/2011/030811- ponemon-data-breach.html – Leading Cause: Negligence, 41%; Hacks, 31% – http://www.networkworld.com/news/2011/030811- ponemon-data-breach.html – Responsible Party: Vendors, 39% – http://www.theiia.org/chapters/index.cfm/view.news_detail/ cid/197/newsid/13809 – Increased Frequency: 2010-2011, 58% – http://www.out-law.com/en/articles/2011/october/personal- data-breaches-on-the-increase-in-private-sector-reports-ico/
  • 8.
  • 9. Securing Your ESI • ESI Overview – Electronically Stored Information (ESI) • Defined for the federal rules of civil procedure (FRCP): – Information created, manipulated, communicated, stored, and best utilized in digital form, requiring the use of computer hardware and software. » http://www.law.northwestern.edu/journals/njtip/v4/n2/3/ • Structured ESI – Stored in database or content management systems. » Examples: Claims, Brokerage / e-Commerce Transactions • Unstructured ESI – Free-form information stored in a manner that is difficult to search within. » Examples: Tweets, Web Site Content, Word Document Content
  • 10. Securing Your ESI • Security Overview – CIA Triad • Confidentiality – Categorization / Classification – Privacy – Least Privilege – AAA: Authentication, Authorization and Accounting • Integrity – Nonrepudiation – Segregation / Separation of Duties • Availability – Business Continuity (BC) / Disaster Recovery (DR) – Defense-in-Depth
  • 12. Securing Your ESI • Vendor Selection – Service-Level Agreements (SLAs) • Temporal Service Contract – Term – Metrics – Definitions – Cause for X (e.g. Termination / Exit Clause) – Certifications / Attestations • SAS 70 Type II / SSAE 16 (SOC 1 / 2 / 3) / ISAE 3402 • ISO 27001 / 2, 27036, 15489 • BITS Shared Assessments • PCI DSS • HIPAA / HITECH
  • 13. Securing Your ESI • Vendor Selection – Incident Response • Computer Security Incident Response Team (CSIRT) – Digital Forensics • Legal Hold / Litigation Response / e-Discovery – Electronic Discovery Reference Model (EDRM) – FRCP 30(b)(6) – Right to Audit • Use your internal vendor assessment team or a mutually agreed upon third party.
  • 14. Securing Your ESI • Mobile Device Security Guidance – Devices • Not all devices are the same. • Balancing Act (Draconian versus Cow-folk) – People lose stuff all the time. • Who owns the device? – Bring Your Own Device (BYOD) = consumerization of IT • Is device content discoverable? • Vicarious Liability – Driving & Texting / Talking – Mobile Device User Acceptance Policy – Applications / Data • Not all applications are the same. • Segment Work & Play – Sandboxing / Data-boxing – Mobile Facebook App Pulls / Pushes Data to Address Book
  • 15. Securing Your ESI • Physical Media Security Guidance – Laptops / Tablets • They should be password-protected / encrypted. • Wipe / degauss hard disk drive (HDD) before shredding. • Receive a certificate / bill of laden for shredding. – Thumb Drives / External Hard Drives • They should be password-protected / encrypted. • Wipe / degauss before shredding. • Receive a certificate / bill of laden for shredding. – Backup Tapes • They should be in your records retention schedule (RRS). • Information Lifecycle • They should be password-protected / encrypted. • Wipe / degauss before shredding. • Receive a certificate / bill of laden for shredding.
  • 16. Securing Your ESI • Cloud Security Guidance – Change / Configuration Management, Provisioning – Matrices • CSA Consensus Assessments Initiative Questionnaire • CSA Cloud Controls Matrix • BITS Enterprise Cloud Self-Assessment • BITS Shared Assessments – Guidance Specifically for the Cloud • Cloud Security Alliance (CSA) Guide v3.0 • CSA Security, Trust & Assurance Registry (STAR) • ENISA Cloud Computing Risk Assessment • NIST SP 800-144 Guidelines Security / Privacy for a Public Cloud
  • 17. Securing Your ESI • Big Data Security Guidance – Information Management • Generally Accepted Recordkeeping Principles (GARP®) • Information Governance Reference Model (IGRM) • Information Lifecycle Management (ILM) • MIKE2.0 • ISO 23081 (Records Metadata) – Known Black Ice • Log Files • Web Metadata • Non-Relational, Distributed Databases (NRDBMS, e.g. NoSQL) • Data Backups (Tapes, Cloud Object Storage) • Social Media
  • 18. Securing Your ESI • Social Media Security Guidance – Sites • Manage (Strategy, Policy, Access, Auditing, e-Discovery) • Strong Passwords • Change / Configuration Management – Provisioning / De-provisioning • Haters (Competitors, Former Employees / Customers) • Wash & Repeat • Mobile Apps for Approved Personnel? – Applications • Immature • Insecure • Discoverable?
  • 19. Securing Your ESI • Security Tips & Tricks – Governance, Risk & Compliance (GRC) – Encryption / Hashing – Authentication, Authorization & Accounting (AAA) – Change / Configuration Management – Incident Response / e-Discovery / DR Testing – Physical Access – End User Training
  • 20. Securing Your ESI • GRC – Documented controls and safeguards. • Potential audit findings and remediation actions. – Enterprise view of compliance. • Potential functional / system / application view as well. – Establish standards, best practices and guidance. • Make users, vendors and partners aware of these.
  • 21. Securing Your ESI • Encryption / Hashing – Data at Rest (DAR) • Object (File, Table, Record, Column), Volume or Block – Data in Motion (DIM) • ‘Across the Wire’, Data-com Link – Data in Use (DIU) • Object (File, Table, Record, Column), Volume or Block
  • 22. Securing Your ESI • Encryption / Hashing – Nuances • Encryption wraps a layer of protection around your information. – Public Key Infrastructure (PKI): VPN, TLS / SSL, S / MIME, WPA • Hashing re-arranges the bits per the program. – Database Hashing: HMAC SHA 1 / 2 / 3, MD5 – Key Management • If you lose the encryption key then your data is lost. – Try telling Legal, a judge or an attorney that!
  • 23. Securing Your ESI • AAA – Authentication • Validating who the user is claiming to be. – Authorization • Allocating the lowest privilege for the user. – Accounting • Tracking the user’s actions.
  • 24. Securing Your ESI • Identity & Access Management (IAM) – Single Sign-on (SSO) • Allows User to Gain Access to Multiple Systems / Apps – Negates password fatigue. • Implementations – Externally » One-time Password (OTP) / Tokenization » Federated Identity / Tokenization » Smart Card / Two Factor Authentication (2FA) » Remote Access Dial-In User Service (RADIUS) – Internally » Kerberos » Lightweight Directory Access Protocol (LDAP)
  • 25. Securing Your ESI • IAM Technologies – Federated Identity • OpenID • OAuth • Security Assertion Markup Language (SAML) • Web Services – Trust Language (WS-Trust) • Representational State Transfer (REST) • Active Directory Federation Services (ADFS) – Microsoft Federation Gateway (MFG)
  • 27. Securing Your ESI • Password Tips & Tricks – Use a password. – Create a strong password / PIN. • Alphanumeric with at least one uppercase letter, one lower-case letter, one number & one special character. • No dictionary words, SSNs, kids, pets, DOBs or address. • No usernames. • Use different passwords for different accounts. – Protect it. • Use a password book if necessary. – Change it. • Semi-annually
  • 28. Securing Your ESI • Change / Configuration Management – Process • Cost, GRC & Quality are huge drivers for: – Software Development Lifecycle (SDLC) – Project Management Office (PMO), Project Portfolio Mgmt (PPM) – Lean / Six Sigma, ISO 9000, CMMi – Provisioning / De-provisioning • On-loading / Off-loading – Profit Centers / Business Units / Functions – Data – Applications – Vendors / Partners – Customers • Periodic Reviews of Processes & Accounts
  • 29. Securing Your ESI • Incident Response / e-Discovery / DR Testing – Practice makes perfect. • Wash & Repeat – Crawl  Walk  Run • Crawl: Internal Tabletop Testing • Walk: Internal Exercise, “cause you have nothing better to do on a Saturday”. • Run: Incorporate Vendors, Partners & Customers
  • 30. Securing Your ESI • Physical Security – Privacy Screen – Physical Location & Office Access – Dumpster Diving – Lost Hard-copy Reports Source: Amazon Source: Flickr Source: Flickr
  • 31. Securing Your ESI • End-user Training – New-hires • Especially for milennials (IT consumerization). – Quarterly Computer-based Training (CBT) • For heavily regulated industries. – Annual On-site Training • Be liberal with the swag. – Pilot new marketing campaigns (logo, tag, brand). – Educate Your Ecosystem
  • 32. Securing Your ESI • Take-aways – Educate Your Ecosystem – Healthy Dose of Skepticism – Embrace Change Pragmatically – Secured Technology is an Enabler – Privacy is Important Too
  • 33. • Questions? • Contact – Email: steve@ncontrol-llc.com – Twitter: @markes1, @casdelval2011 – LI: http://www.linkedin.com/in/smarkey