Dynamic access control sbc12 - thuan nguyen

956 views

Published on

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
956
On SlideShare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
20
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Dynamic access control sbc12 - thuan nguyen

  1. 1. Security Bootcamp 2012 -
  2. 2.  Microsoft SharePoint Most Valuable Professional (2011,2012) Author, Writer, Trainer & Public Speaker Founder & Editor in Chief of SharePointVN Publisher Focus on Microsoft Security & Federation Identity, Infrastructure, Methodologies and Architecture.
  3. 3.  Data Compliance Understand the new Dynamic Access Control capabilities built into Windows Server 2012 Demonstration
  4. 4.  Compliance is generally a response to governmental regulation, but it can also be a response to industry or internal requirements.  The U.S. Health Insurance Portability and Accountability Act (HIPPA) for health providers  Sarbanes-Oxley Act (SOX)  The European Union Data Protection Directive  U.S. state data breach laws I’m not talking about in-depth Datacompliance and privacy.
  5. 5.  Can you make sure that only authorized individuals can access confidential data? Do you have granular control over auditing access? How to reduce the number of security groups your organization has? Deal with regulatory standard?…. There are many questions come up when it comes to data access control. Content Owner Infrastructure Information CSO/CIO Support Worker department ““Is my important data “I need to have appropriately “I don’t know “I don’t know if I the right protected and what data is in am complying compliance compliant with my repositories with my controls to keep regulations – and how to organization’s me out of jail” how do I audit control it” polices” this”
  6. 6. Distributed RegulatoryStorage growth Information compliance Data leakage 45%: File based storage  Corporate information is  New and changing  246,091,423: Total CAGR. everywhere: Desktops, regulations (SOX, HIPPA, number of records Branch Offices, Data GLBA…) containing sensitive MSIT cost $1.6 Centers, Cloud… personal information GB/Month for managed  International and local involved in security servers.  MSIT 1500 file servers regulations. breaches in the US since with 110 different groups >70%: of stored data is  More oversight and January 2005 managing them stale tighter enforcement.  $90 to $305 per record  Very hard to consistently Cloud cost would be  $15M: Settlement for (Forrester: in “Calculating manage the information. approximately 25 cents investment bank with the Cost of a Security GB/Month SEC over record Breach”) retention.
  7. 7. Data Expression-based Expression-basedClassification auditing access conditions Encryption Classify your documents  Targeted access auditing  Flexible access control  Automatic RMS using resource properties based on document lists based on document encryption based on stored in Active classification and user classification and document classification. Directory. identity. multiple identities (security groups). Automatically classify  Centralized deployment documents based on of audit policies using  Centralized access document content. Global Audit Policies. control lists using Central Access Policies.
  8. 8. Data Classification  File Classification Infrastructure provides insight into your dataData by automating classification processes.Classification  File Classification Infrastructure uses classification rules to automatically scan files and classify them according to the Classify your documents contents of the file. using resource properties  Some examples of classification rules include: stored in Active Directory.  Classify any file that contains the string “SBC12 Confidential” as having high business impact. Automatically classify documents based on  Classify any file that contains at least 10 social security document content. numbers as having personally identifiable information.  Data Classification Toolkit
  9. 9.  A content classification rule that searches a set of files for theData string “SBC12 Confidential”. If the string is found in a file, theClassification Impact resource property is set to High on the file.  A content classification rule that searches a set of files for a Classify your documents regular expression that matches a social security number at using resource properties least 10 times in one file. If the pattern is found, the file is stored in Active Directory. classified as having personally identifiable information and the Personally Identifiable Information resource property is set to Automatically classify documents based on High. document content.
  10. 10. Expression-based access condition  Manage fewer security groups by using conditional expressionsExpression-basedaccess conditions Country x 30 Flexible access control lists based on document classification and multiple identities (security groups). Department x 20 Centralized access control lists using Central Access Policies. Sensitive/Confidential documents
  11. 11. What is Central Access Policy? You can think of Central Access Policies as a safety net that your organization applies across its servers to enhance the local access policy
  12. 12. Expression-based access rules Active Directory File Domain Services server User claims Device claims Resource properties User.Department = Finance Device.Department = Finance Resource.Department = Finance User.Clearance = High Device.Managed = True Resource.Impact = High Access policy Applies to: @File.Impact = HighAllow | Read, Write | if (@User.Department == @File.Department) AND (@Device.Managed == True)
  13. 13. Central access policies Active Directory Domain Services CorporateHigh business file servers Organizationalimpact policy policies Characteristics • High business impact • Composed of central access rules • Personally identifiablePersonally information • Applied to file servers through Group Policyidentifiable objectsinformation policy Finance • Supplement (not replace) native file and department policies folder access control lists from New Technology File System (NTFS) • High business impactFinance policy • Personally identifiable information • Finance User folders Finance folders
  14. 14. Central access policy workflowActive Directory Active DirectoryDomain Create claim definitions Domain Services Create file property definitionsServices Create central access policy Claim definitions User Send central access policies to fileGroup Policy servers File property definitions Apply access policy to the Allow or shared folder denyFile Server Identify information Audit policyUser’scomputer User tries to access information File server
  15. 15. Central access policy examplesOrganization-wide Specific dataauthorization managementDepartmentalauthorization Need-to-know
  16. 16. Expression-based AuditingExpression-based  Limit auditing to data that meets specificauditing classification criteria. Targeted access auditing  Limit auditing by action and by identity based on document classification and user  Add contextual information into the audit identity. events. Centralized deployment of audit policies using Global Audit Policies.
  17. 17. Security auditingActive Directory Active DirectoryDomain Domain Services Create claim typesServices Create resource properties Claim definitions UserGroup Policy Create global audit policy File property definitions Select and apply resource Allow or properties to the shared denyFile Server folders Audit policyUser’s User tries to accesscomputer information File server
  18. 18. Audit policy examplesAudit everyone who does not have a high Audit all vendors when they try to accesssecurity clearance and who tries to access a documents related to projects that they are notdocument that has a high impact on business working onAudit | Everyone | All-Access | Audit | Everyone | All-Access |Resource.BusinessImpact=HBI AND User.EmploymentStatus=Vendor AND User.ProjectUser.SecurityClearance!=High Not_AnyOf Resource.Project.
  19. 19. Data Encryption Challenges How do I protect sensitive information after it leaves my protected environment? I cannot get the users to encrypt their sensitive data.
  20. 20. Classification-based encryptionprocess Process to encrypt a file based on 1 classification Active Directory Claim definitions, file property definitions, and Domain Services access policies are established in Active Directory Domain Controller. A user creates a file with the word “confidential” in User the text and saves it. The classification engine 4 classifies the file as high-impact according to rules 2 configured. On the file server, a rule automatically applies RMS protection to any file classified as high- 3 impact. Classification RMS server engine The RMS template and encryption are applied to the file on the file server and the file is encrypted. File server
  21. 21. 23
  22. 22. Demonstration Lab There are two virtual machines that are involved in the demonstration lab.  AD-Srv (Active Directory Domain Controller)  File-Srv (File Server) There are two security groups  Finance  System Integration There are two domain users:  thuan@sbc12.local (Finance)  thang@sbc12.local (System Integration)
  23. 23. Steps Create a new claim  Department Create resources properties and add it to resource property list  Finance Department Create a new central access rule/central policies  Resource Finance Department Exists  Resource Finance Department Equals Value Finance Publish central access policy  Configure Group Policy and enable KDC Install File Server Resource Manager on File server  Update-FSRMClassificationPropertyDefinition Add Central Access Policy to shared folder Validate
  24. 24. Thanks for joining with us

×