SlideShare a Scribd company logo
Managing and Enforcing Information SecurityManaging and Enforcing Information Security
June 2008June 2008
Belsis Meletis
MPhil, MRes, BSc
CWNA, CWSP, Network+, C|EH, ISO27001LA
AgendaAgenda
• Information Security
• ISMS
• Authentication and Provisioning
• Monitoring and Compliance
• Data Protection
Information SecurityInformation Security
• Information Security is difficult to implement due to
the following:
• The cost of implementing a security system should not
exceed the value of the data to be secured.
• Industries pay huge amount of money for industrial
espionage.
• Users feel that security is going to take their freedom
away and so they often sabotage the security
measures.
• Computer prices have fallen dramatically and the
number of hackers have been multiplied.
• Security managers work under strict money and time
schedule.
• Hackers often cooperate with known criminals.
• Almost 80% of attacks come from Internal threats and
partners.
• The number of technologies, standards and
methodologies exist today are enough to confuse even
experts.
Information SecurityInformation Security
“In the real world, security involves processes. It involves preventive
technologies, but also detection and reaction processes, and an
entire forensics system to hunt down and prosecute the guilty.
Security is not a product; it itself is a process.…. ”
Bruce Schneier
(Secrets and Lies, Wiley and Sons Inc.)
Information SecurityInformation Security
• Security contains a number of
tools , processes and techniques.
• These in general cover three
main requirements:
– Confidentiality
– Integrity
– Availability
• Depending on the security
requirements a system has, one
can concentrate only on one of
the previous or all of them.
• A new requirement enforced
today is non-repudiation.
AgendaAgenda
• Information Security
• ISMS
• Authentication and Provisioning
• Monitoring and Compliance
• Data Protection
ISMSISMS
• Security should always start with the development of
an ISMS system.
• The Information Security Management System(ISMS) is
the part of the overall management system, based on
business risk approach, to establish, implement, operate ,
monitor, review, maintain and improve information security
(ISO 27001 Standard).
• The management system should include:
• Organisational structure and Responsibilities
• Policies, Procedures , Processes and Practises
• Planning Activities and Resources
Information Security Management Program ImplementationInformation Security Management Program Implementation
Policy
&
Standards
Physicalaccess
RemoteAccess
InternetPolicy
Appl.Security
Policy
System Policy
Technology
Standards
VPN
Tokens
Firewalls
Implementation
GuidelinesInstallation and configuration
Operational Management
Corporate Policy
Operations
Host-Sec.
ContentSec.
ProcessManagemen
t
ISO27001 AdvantagesISO27001 Advantages
• ISO 27001 is an International Standard giving requirements related to
Information Security Management System.
• The advantages of an ISO27001 Certification :
• Ensure confidentiality, integrity and availability of information to
maintain competitive edge, cash-flow, profitability and commercial
image.
• Comply with legal, statutory, regulatory and contractual
requirements.
• Improve corporate governance and assurance to stakeholders such
as shareholders, clients, consumers and suppliers.
• Identify threats to assets, vulnerabilities, likelihood of occurrence and
potential impact to appropriate allocate investment.
AgendaAgenda
• Information Security
• ISMS
• Authentication and Provisioning
• Monitoring and Compliance
• Data Protection
Authentication and ProvisioningAuthentication and Provisioning
• The management Headache
 Applications and Locations are added almost daily.
 Changes to headcounts have by
multiplied.
 The cost of IT Management has been increased (e.g. it is
estimated that the cost to reset a password in a medium
size organisation is $20)
 Maintain Security Standards compliance is necessary
(i.e. ISO27001,SoX,PCI).
 Many man-hours of management time spent approving
resource requests
Authentication and ProvisioningAuthentication and Provisioning
• The Security Headache
 User provisioning for all applications is time consuming
 13%-15% of help desk phone calls involve password reset.
 Users use yellow stickers to write and remember the
different passwords.
 Long lag time between user termination & disablement of
IDs.
 Users have to access different applications and platforms
(i.e. HPUX, Linux, Windows2003) .
 Security Auditors require many different information.
 Authentication method may be different for each application
(e.g. Password Policies, Tokens, Idle Timeout)
User needs to
manually sign
in to every
application!
User
Mainframe
Apps
Intranet
Web Apps
Identity ChaosIdentity Chaos
Enterprise Directory
HRHR
SystemSystem
InfraInfra
ApplicationApplication
LotusLotus
Notes AppsNotes Apps
In-HouseIn-House
ApplicationApplication
COTSCOTS
ApplicationApplication
NOSNOS
In-HouseIn-House
ApplicationApplication
•Authentication
•Authorization
•Identity Data
•Authentication
•Authorization
•Identity Data
•Authentication
•Authorization
•Identity Data
•Authentication
•Authorization
•Identity Data
•Authorization
•Identity Data
•Authentication
•Authentication
•Authorization
•Identity Data
•Authentication
•Authorization
•Identity Data
Authentication and ProvisioningAuthentication and Provisioning
• Identity Management Systems allows individuals to use a user name,
password or other personal identification to sign on to the enterprise
applications
• IDM Systems Offer
• Centralized management of all user identities and access rights.
• Automated (de-)provisioning of accounts
• Centralized access management for heterogeneous networks
(e.g. Web applications, Systems )
• Strong and flexible password management policies
• User Account Self Management
• Identification/removal of inactive accounts
• Full automated workflow approval path
• Reset passwords (revalidate users)
• Monitor all Identity related events
• IDM requires Roles and Processes to be clearly defined
• IDM reduces the Organization Cost and increases Productivity
Identity ManagementIdentity Management
•Authentication
•Authorization
•Identity
Data
•Authentication
•Authorization
•Identity
Data
•Authentication
•Authorization
•Identity
Data
•Authorization
•Identity
Data
•Authentication
•Authentication
•Authorization
•Identity
Data
•Authentication
•Authorization
•Identity
Data
IdentityIntegrationServerIdentityIntegrationServer
Enterprise Directory
HRHR
SystemSystem
InfraInfra
ApplicationApplication
LotusLotus
Notes AppsNotes Apps
In-HouseIn-House
ApplicationApplication
COTSCOTS
ApplicationApplication
NOSNOS
Authentication and ProvisioningAuthentication and Provisioning
• Single Sign On (SSO) allow users to log in to
virtually any system using a single log on procedure,
• Allows administrators to choose an authentication
method (e.g. Tokes, Passwords, Biometrics)
• Seamless authentication for heterogeneous
environments.
• Centrally provide Session Management
• End-to-end audits of user activity across disparate
systems
• Reduces frustrations from multiple passwords
• Reduces the threats from the yellow stickers
• Provide Workstation features like
• Station Lock
• Proximity Detectors and RF Badges
• Single Sing Off
• Session Migration
• SSO Integrates with user provisioning solutions to
further Increase productivity time.
User ID &User ID &
PasswordPassword
TokenToken
SmartSmart
CardCard
MS CAPIMS CAPI
CertificateCertificate
BiometricsBiometrics
LDAPLDAP
RF BadgeRF Badge
ju9$7%%a&uju9$7%%a&u
r2d2q3
&%$@((^g%$@#&&%$@((^g%$@#&
dk4&4j7%w#psikep84m$sodk4&4j7%w#psikep84m$so
PKIPKI
CertificateCertificate
encryptedencrypted
passtickepassticke
tt
Sign-OnSign-On
ServerServer
Application HostsApplication Hosts
NT/UNIXNT/UNIX
OS/390OS/390
NovellNovell
AS400AS400
Web ServersWeb Servers
INNOVA S.A.INNOVA S.A.
AgendaAgenda
• Information Security
• ISMS
• Authentication and Provisioning
• Monitoring and Compliance
• Data Protection
• Innova S.A
Monitoring and ComplianceMonitoring and Compliance
• What Do I Need To Do?
– Businesses everywhere are attempting to cost effectively comply
with multiple external & internal mandates (e.g.
ISO27001,SoX,PCI).
– Administrators have to defend their systems against new
vulnerabilities.
– Security experts need to identify incidents.
– Auditors need to see proof of due care that IT security policies are
sufficient, in place, and effective
• How Do I Do It?
– Automatically test platforms for security compliance on a
scheduled basis
– Regularly test systems for new vulnerabilities.
– Enforce the regular analysis of log files to detect unauthorized
actions.
Vulnerability Assessment ToolsVulnerability Assessment Tools
• Regular tests ensure that systems are protected from new
vulnerabilities.
• Vulnerability Assessment tools have databases with
thousands of vulnerabilities.
• Frequent update of these tools are necessary.
• Two types of VA tools
• Internet Based Services
• Network Internal
• Some of these tools offer compliance scans with
different standards i.e. PCI
• VA tools allows managers to schedule automated
assessment jobs.
• Reports from these tools are used to patch vulnerable
systems and/or develop strategic security plans.
• Reports can also be submitted to Security Auditors.
Policy CompliancePolicy Compliance
• Enterprises are finding that implementing new regulatory policies and
procedures in an automated and efficient manner is very challenging.
• The effort of translating the policy into actual technical controls and triggers is
complicated and cumbersome
• Policy Compliant platforms connect to corporate systems and test system
configuration against pre specified security policies (i.e. size and type of
passwords, Administrator access type)
• Policy Compliance platforms:
• Assist Enterprises to maintain configuration baseline over time.
• Maps industry-accepted frameworks, standards (i.e. ISO27001, PCI, SoX) and
corporate policies to a set of technical controls and policies
• Provide assessment of heterogeneous systems (i.e. Unix, Windows).
• Provide risk-based reports and proposed remediation techniques.
• Improve Operational Cost and ensure policy compliance.
• Prove Compliance to internal and external Auditors
Monitoring and AnalysisMonitoring and Analysis
• Enterprise IT Infrastructure elements provide a number
of Audit/log records
• Logs grow large to be viewed using manual techniques
• Log and audit data are usually written in the local platforms
• Cross platform analysis of log data are almost impossible
• Monitoring tools collect records from different
platforms.
• Collected logs can be correlated, analyzed and viewed
in real time.
• Provide advance visualization techniques of the status
of the Infrastructure
• Forensics analysis help respond to security incidents
and identify malicious acts.
• Help Engineers in detecting and solving network
problems.
• Assist in the Audit process by being able to produce
proofs.
• Provides an "information warehouse" for corporate
data that can be mined as a knowledge resource using
built-in index and search technologies
AgendaAgenda
• Information Security
• ISMS
• Authentication and Provisioning
• Monitoring and Compliance
• Data Protection
Endpoint SecurityEndpoint Security
• Today Enterprise Infrastructures are not isolated
• Sales employees use laptop computers and PDAs to connect to the
corporate networks.
• Teleworking is a new trend to reduce corporate OpEx
• Standby engineers use laptop to connect to the corporate networks almost
daily.
• Threats to the endpoints can be easily provide a door for adversaries to access
the corporate network (e.g. Virus, Trojan Horses, Unpatched Systems).
• Endpoint security software ensures that endpoints are compliant with the
corporate security Policy:
• Endpoint security provides central control over the endpoint devices used by
employees and partners.
• Spec aliased endpoint clients can be installed on the enterprise Critical
Infrastructure Servers.
• Host Intrusion Protection
• Antivirus
• Buffer Overflow Protection
• File/Disk Encryption
• Personal Firewall
• Application Control
• Host Integrity Checking
• Patch Management
Endpoint SecurityEndpoint Security
2 4
Mobile
User
SSL VPN
On-Demand NAC
Wireless
On-Demand
and 802.1x
NAC Mobile User or Guest
Home
User
Partner
or Supplier
Web Application
On-Demand NAC
WAN
Router
In Line
NAC
Ethernet
802.1x NAC
Ethernet
DHCP NAC
Remote Office
Embedded
Windows Device
Wired User
Wired User
IPSec VPN
API NAC
Access ControlAccess Control
• Enterprises today based their business almost solely on the data stored in their
IT Systems.
• Controlling access on these data is vital for the protection of the Enterprise.
• Access Control platforms allow Administrators to centrally control and enforce
access on the Corporate data:
• Enforce access accountability and segregation of duties
• Centrally apply access control policies and rules to reduce administrative
cost and complexity
• Enforce fine level of control on
• Files and Folders
• Processes
• Privileged Programs
• Network Connections
• Terminals
• Reduce cross-platform management overhead and meet internal and
external audit requirement
• Access control tools required that a defined access control policy exist
Data LeakageData Leakage
• Data leakage tools provide finer level of control on the
access restrictions allowed on the corporate data.
• Data leakage enforces the corporate access control
policy by providing deep content inspection:
• Automated discovery of corporate confidential
information stored on endpoints and servers.
• Network Scan to detect and stop confidential
information transmitted using different types of
applications and protocols e.g. IM, Emails,
HTTP,FTP.
• Controls the distribution of information using
USB Drives, CDROMS, Emails, and printouts at
the point of use where information is accessed
and stored.
• Display alerts for data access violation and
develop Incident Response Workflows.
• Control data input /output from heterogeneous
applications and databases.
• Provide a cost effective way to receive Standards
Compliance for Legacy and Web Applications.
EMAIL & WEB UPLOADS
IM / FTP / P2P
FILE TRANSFER
REMOVABLE
MEDIA
(CD, USB…)
HARDCOPY
(Printers, PDF)
NETWORK
RESOURCES
LEGACY APPS
ENTERPRISE
APPLICATIONS
(Clipboard, Exports)
UNSTRUCTURED DATA
& FILE SHARING
(Copy, Move…)
INNOVA S.A.INNOVA S.A.
AgendaAgenda
• Information Security
• ISMS
• Authentication and Provisioning
• Monitoring and Compliance
• Data Protection
Questions ?
Meletis BelsisManaging and enforcing information security

More Related Content

What's hot

Chapter 1 introduction(web security)
Chapter 1 introduction(web security)Chapter 1 introduction(web security)
Chapter 1 introduction(web security)
Kirti Ahirrao
 
Information security management best practice
Information security management best practiceInformation security management best practice
Information security management best practice
parves kamal
 
Information security
Information security Information security
Information security
razendar79
 
Information security
Information securityInformation security
Information security
avinashbalakrishnan2
 
Security & control in mis
Security  & control in misSecurity  & control in mis
Security & control in mis
Vishal Patyal
 
information security management
information security managementinformation security management
information security management
Gurpreetkaur838
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information security
KATHEESKUMAR S
 
IBM i Security: Identifying the Events That Matter Most
IBM i Security: Identifying the Events That Matter MostIBM i Security: Identifying the Events That Matter Most
IBM i Security: Identifying the Events That Matter Most
Precisely
 
CISSP Certification- Security Engineering-part1
CISSP Certification- Security Engineering-part1CISSP Certification- Security Engineering-part1
CISSP Certification- Security Engineering-part1
Hamed Moghaddam
 
Security technologies
Security technologiesSecurity technologies
Security technologies
Dhani Ahmad
 
Introduction to Information Security
Introduction to Information SecurityIntroduction to Information Security
Introduction to Information Security
Dr. Loganathan R
 
information security (Audit mechanism, intrusion detection, password manageme...
information security (Audit mechanism, intrusion detection, password manageme...information security (Audit mechanism, intrusion detection, password manageme...
information security (Audit mechanism, intrusion detection, password manageme...
Zara Nawaz
 
CompTIA Security+ Module1: Security fundamentals
CompTIA Security+ Module1: Security fundamentalsCompTIA Security+ Module1: Security fundamentals
CompTIA Security+ Module1: Security fundamentals
Ganbayar Sukhbaatar
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information security
Dhani Ahmad
 
Security Awareness and Training
Security Awareness and TrainingSecurity Awareness and Training
Security Awareness and Training
Priyank Hada
 
Soc
SocSoc
Cybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for ExecutivesCybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for Executives
Krist Davood - Principal - CIO
 
1. security management practices
1. security management practices1. security management practices
1. security management practices
7wounders
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information security
Kumawat Dharmpal
 
Information Security Background
Information Security BackgroundInformation Security Background
Information Security Background
Nicholas Davis
 

What's hot (20)

Chapter 1 introduction(web security)
Chapter 1 introduction(web security)Chapter 1 introduction(web security)
Chapter 1 introduction(web security)
 
Information security management best practice
Information security management best practiceInformation security management best practice
Information security management best practice
 
Information security
Information security Information security
Information security
 
Information security
Information securityInformation security
Information security
 
Security & control in mis
Security  & control in misSecurity  & control in mis
Security & control in mis
 
information security management
information security managementinformation security management
information security management
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information security
 
IBM i Security: Identifying the Events That Matter Most
IBM i Security: Identifying the Events That Matter MostIBM i Security: Identifying the Events That Matter Most
IBM i Security: Identifying the Events That Matter Most
 
CISSP Certification- Security Engineering-part1
CISSP Certification- Security Engineering-part1CISSP Certification- Security Engineering-part1
CISSP Certification- Security Engineering-part1
 
Security technologies
Security technologiesSecurity technologies
Security technologies
 
Introduction to Information Security
Introduction to Information SecurityIntroduction to Information Security
Introduction to Information Security
 
information security (Audit mechanism, intrusion detection, password manageme...
information security (Audit mechanism, intrusion detection, password manageme...information security (Audit mechanism, intrusion detection, password manageme...
information security (Audit mechanism, intrusion detection, password manageme...
 
CompTIA Security+ Module1: Security fundamentals
CompTIA Security+ Module1: Security fundamentalsCompTIA Security+ Module1: Security fundamentals
CompTIA Security+ Module1: Security fundamentals
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information security
 
Security Awareness and Training
Security Awareness and TrainingSecurity Awareness and Training
Security Awareness and Training
 
Soc
SocSoc
Soc
 
Cybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for ExecutivesCybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for Executives
 
1. security management practices
1. security management practices1. security management practices
1. security management practices
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information security
 
Information Security Background
Information Security BackgroundInformation Security Background
Information Security Background
 

Similar to Meletis BelsisManaging and enforcing information security

Security and Control.ppt
Security and Control.pptSecurity and Control.ppt
Security and Control.ppt
AfricaRealInformatic
 
Cyber security series administrative control breaches
Cyber security series   administrative control breaches Cyber security series   administrative control breaches
Cyber security series administrative control breaches
Jim Kaplan CIA CFE
 
IM Unit 4 Security and its a control.ppt
IM Unit 4 Security and its a control.pptIM Unit 4 Security and its a control.ppt
IM Unit 4 Security and its a control.ppt
RAJESH S
 
It security cognic_systems
It security cognic_systemsIt security cognic_systems
It security cognic_systems
Cognic Systems Pvt Ltd
 
How To Secure MIS
How To Secure MISHow To Secure MIS
How To Secure MIS
AaDi Malik
 
Week 09_Cyber security u.pdf
Week 09_Cyber security u.pdfWeek 09_Cyber security u.pdf
Week 09_Cyber security u.pdf
dhanywahyudi17
 
Tyler Technology Expo
Tyler Technology ExpoTyler Technology Expo
Tyler Technology Expo
Tony DeGonia (LION)
 
Orientation in IT Audit
Orientation in IT AuditOrientation in IT Audit
Orientation in IT Audit
Suman Thapaliya
 
Cyber Security # Lec 5
Cyber Security # Lec 5Cyber Security # Lec 5
Cyber Security # Lec 5
Kabul Education University
 
Dealing with Web Application Security, Regulation Style
Dealing with Web Application Security, Regulation StyleDealing with Web Application Security, Regulation Style
Dealing with Web Application Security, Regulation Style
Rochester Security Summit
 
Vulenerability Management.pptx
Vulenerability Management.pptxVulenerability Management.pptx
Vulenerability Management.pptx
ThavaselviMunusamy1
 
Cyber security and demonstration of security tools
Cyber security and demonstration of security toolsCyber security and demonstration of security tools
Cyber security and demonstration of security tools
Vicky Fernandes
 
Lock it Down: Access Control for IBM i
Lock it Down: Access Control for IBM iLock it Down: Access Control for IBM i
Lock it Down: Access Control for IBM i
Precisely
 
Effective Security Monitoring for IBM i: What You Need to Know
Effective Security Monitoring for IBM i: What You Need to KnowEffective Security Monitoring for IBM i: What You Need to Know
Effective Security Monitoring for IBM i: What You Need to Know
Precisely
 
Management Information System Presentation
Management Information System PresentationManagement Information System Presentation
Management Information System Presentation
AaDi Malik
 
Definitive Security Testing Checklist Shielding Your Applications against Cyb...
Definitive Security Testing Checklist Shielding Your Applications against Cyb...Definitive Security Testing Checklist Shielding Your Applications against Cyb...
Definitive Security Testing Checklist Shielding Your Applications against Cyb...
Knoldus Inc.
 
Security metrics 2
Security metrics 2Security metrics 2
Security metrics 2
Manish Kumar
 
MCGlobalTech Consulting Service Presentation
MCGlobalTech Consulting Service PresentationMCGlobalTech Consulting Service Presentation
MCGlobalTech Consulting Service Presentation
William McBorrough
 
What is the UK Cyber Essentials scheme?
What is the  UK Cyber Essentials scheme?What is the  UK Cyber Essentials scheme?
What is the UK Cyber Essentials scheme?
IT Governance Ltd
 
Information security: importance of having defined policy & process
Information security: importance of having defined policy & processInformation security: importance of having defined policy & process
Information security: importance of having defined policy & process
Information Technology Society Nepal
 

Similar to Meletis BelsisManaging and enforcing information security (20)

Security and Control.ppt
Security and Control.pptSecurity and Control.ppt
Security and Control.ppt
 
Cyber security series administrative control breaches
Cyber security series   administrative control breaches Cyber security series   administrative control breaches
Cyber security series administrative control breaches
 
IM Unit 4 Security and its a control.ppt
IM Unit 4 Security and its a control.pptIM Unit 4 Security and its a control.ppt
IM Unit 4 Security and its a control.ppt
 
It security cognic_systems
It security cognic_systemsIt security cognic_systems
It security cognic_systems
 
How To Secure MIS
How To Secure MISHow To Secure MIS
How To Secure MIS
 
Week 09_Cyber security u.pdf
Week 09_Cyber security u.pdfWeek 09_Cyber security u.pdf
Week 09_Cyber security u.pdf
 
Tyler Technology Expo
Tyler Technology ExpoTyler Technology Expo
Tyler Technology Expo
 
Orientation in IT Audit
Orientation in IT AuditOrientation in IT Audit
Orientation in IT Audit
 
Cyber Security # Lec 5
Cyber Security # Lec 5Cyber Security # Lec 5
Cyber Security # Lec 5
 
Dealing with Web Application Security, Regulation Style
Dealing with Web Application Security, Regulation StyleDealing with Web Application Security, Regulation Style
Dealing with Web Application Security, Regulation Style
 
Vulenerability Management.pptx
Vulenerability Management.pptxVulenerability Management.pptx
Vulenerability Management.pptx
 
Cyber security and demonstration of security tools
Cyber security and demonstration of security toolsCyber security and demonstration of security tools
Cyber security and demonstration of security tools
 
Lock it Down: Access Control for IBM i
Lock it Down: Access Control for IBM iLock it Down: Access Control for IBM i
Lock it Down: Access Control for IBM i
 
Effective Security Monitoring for IBM i: What You Need to Know
Effective Security Monitoring for IBM i: What You Need to KnowEffective Security Monitoring for IBM i: What You Need to Know
Effective Security Monitoring for IBM i: What You Need to Know
 
Management Information System Presentation
Management Information System PresentationManagement Information System Presentation
Management Information System Presentation
 
Definitive Security Testing Checklist Shielding Your Applications against Cyb...
Definitive Security Testing Checklist Shielding Your Applications against Cyb...Definitive Security Testing Checklist Shielding Your Applications against Cyb...
Definitive Security Testing Checklist Shielding Your Applications against Cyb...
 
Security metrics 2
Security metrics 2Security metrics 2
Security metrics 2
 
MCGlobalTech Consulting Service Presentation
MCGlobalTech Consulting Service PresentationMCGlobalTech Consulting Service Presentation
MCGlobalTech Consulting Service Presentation
 
What is the UK Cyber Essentials scheme?
What is the  UK Cyber Essentials scheme?What is the  UK Cyber Essentials scheme?
What is the UK Cyber Essentials scheme?
 
Information security: importance of having defined policy & process
Information security: importance of having defined policy & processInformation security: importance of having defined policy & process
Information security: importance of having defined policy & process
 

More from Meletis Belsis MPhil/MRes/BSc

Meletis Belsis - Wireless Security: Common Protocols and Vulnerabilities
Meletis Belsis - Wireless Security: Common Protocols and VulnerabilitiesMeletis Belsis - Wireless Security: Common Protocols and Vulnerabilities
Meletis Belsis - Wireless Security: Common Protocols and Vulnerabilities
Meletis Belsis MPhil/MRes/BSc
 
Meletis Belsis - Workflow based Incident Management Model
Meletis Belsis - Workflow based Incident Management ModelMeletis Belsis - Workflow based Incident Management Model
Meletis Belsis - Workflow based Incident Management Model
Meletis Belsis MPhil/MRes/BSc
 
Meletis Belsis - THE MULTIMEDIA APPROACH: AN EXTRA LAYER OF DEFENCE IN THE EN...
Meletis Belsis - THE MULTIMEDIA APPROACH: AN EXTRA LAYER OF DEFENCE IN THE EN...Meletis Belsis - THE MULTIMEDIA APPROACH: AN EXTRA LAYER OF DEFENCE IN THE EN...
Meletis Belsis - THE MULTIMEDIA APPROACH: AN EXTRA LAYER OF DEFENCE IN THE EN...
Meletis Belsis MPhil/MRes/BSc
 
Meletis Belsis -CSIRTs
Meletis Belsis -CSIRTsMeletis Belsis -CSIRTs
Meletis Belsis -CSIRTs
Meletis Belsis MPhil/MRes/BSc
 
Meletis Belsis - Introduction to information security
Meletis Belsis - Introduction to information securityMeletis Belsis - Introduction to information security
Meletis Belsis - Introduction to information security
Meletis Belsis MPhil/MRes/BSc
 
Meletis Belsis - Voip security
Meletis Belsis - Voip securityMeletis Belsis - Voip security
Meletis Belsis - Voip security
Meletis Belsis MPhil/MRes/BSc
 
Meletis Belsis - IMS Security
Meletis Belsis - IMS SecurityMeletis Belsis - IMS Security
Meletis Belsis - IMS Security
Meletis Belsis MPhil/MRes/BSc
 

More from Meletis Belsis MPhil/MRes/BSc (7)

Meletis Belsis - Wireless Security: Common Protocols and Vulnerabilities
Meletis Belsis - Wireless Security: Common Protocols and VulnerabilitiesMeletis Belsis - Wireless Security: Common Protocols and Vulnerabilities
Meletis Belsis - Wireless Security: Common Protocols and Vulnerabilities
 
Meletis Belsis - Workflow based Incident Management Model
Meletis Belsis - Workflow based Incident Management ModelMeletis Belsis - Workflow based Incident Management Model
Meletis Belsis - Workflow based Incident Management Model
 
Meletis Belsis - THE MULTIMEDIA APPROACH: AN EXTRA LAYER OF DEFENCE IN THE EN...
Meletis Belsis - THE MULTIMEDIA APPROACH: AN EXTRA LAYER OF DEFENCE IN THE EN...Meletis Belsis - THE MULTIMEDIA APPROACH: AN EXTRA LAYER OF DEFENCE IN THE EN...
Meletis Belsis - THE MULTIMEDIA APPROACH: AN EXTRA LAYER OF DEFENCE IN THE EN...
 
Meletis Belsis -CSIRTs
Meletis Belsis -CSIRTsMeletis Belsis -CSIRTs
Meletis Belsis -CSIRTs
 
Meletis Belsis - Introduction to information security
Meletis Belsis - Introduction to information securityMeletis Belsis - Introduction to information security
Meletis Belsis - Introduction to information security
 
Meletis Belsis - Voip security
Meletis Belsis - Voip securityMeletis Belsis - Voip security
Meletis Belsis - Voip security
 
Meletis Belsis - IMS Security
Meletis Belsis - IMS SecurityMeletis Belsis - IMS Security
Meletis Belsis - IMS Security
 

Recently uploaded

seo proposal | Kiyado Innovations LLP pdf
seo proposal | Kiyado Innovations LLP  pdfseo proposal | Kiyado Innovations LLP  pdf
seo proposal | Kiyado Innovations LLP pdf
diyakiyado
 
一比一原版(hull毕业证书)英国赫尔大学毕业证如何办理
一比一原版(hull毕业证书)英国赫尔大学毕业证如何办理一比一原版(hull毕业证书)英国赫尔大学毕业证如何办理
一比一原版(hull毕业证书)英国赫尔大学毕业证如何办理
taqyea
 
Lincoln University degree offer diploma Transcript
Lincoln University degree offer diploma TranscriptLincoln University degree offer diploma Transcript
Lincoln University degree offer diploma Transcript
ubufe
 
一比一原版(uom毕业证)曼彻斯特大学毕业证如何办理
一比一原版(uom毕业证)曼彻斯特大学毕业证如何办理一比一原版(uom毕业证)曼彻斯特大学毕业证如何办理
一比一原版(uom毕业证)曼彻斯特大学毕业证如何办理
taqyea
 
一比一原版(ukc毕业证书)英国肯特大学毕业证如何办理
一比一原版(ukc毕业证书)英国肯特大学毕业证如何办理一比一原版(ukc毕业证书)英国肯特大学毕业证如何办理
一比一原版(ukc毕业证书)英国肯特大学毕业证如何办理
taqyea
 
一比一原版(soas毕业证书)英国伦敦大学亚非学院毕业证如何办理
一比一原版(soas毕业证书)英国伦敦大学亚非学院毕业证如何办理一比一原版(soas毕业证书)英国伦敦大学亚非学院毕业证如何办理
一比一原版(soas毕业证书)英国伦敦大学亚非学院毕业证如何办理
taqyea
 
Steps involved in the implementation of EDI in a company
Steps involved in the implementation of EDI in a companySteps involved in the implementation of EDI in a company
Steps involved in the implementation of EDI in a company
sivaraman163206
 
cyber-security-training-presentation-q320.ppt
cyber-security-training-presentation-q320.pptcyber-security-training-presentation-q320.ppt
cyber-security-training-presentation-q320.ppt
LiamOConnor52
 
2023. Archive - Gigabajtos selfpublisher homepage
2023. Archive - Gigabajtos selfpublisher homepage2023. Archive - Gigabajtos selfpublisher homepage
2023. Archive - Gigabajtos selfpublisher homepage
Zsolt Nemeth
 
About Alibaba company and brief general information regarding how to trade on...
About Alibaba company and brief general information regarding how to trade on...About Alibaba company and brief general information regarding how to trade on...
About Alibaba company and brief general information regarding how to trade on...
Erkinjon Erkinov
 
Founders Of Digital World Social Media..
Founders Of Digital World Social Media..Founders Of Digital World Social Media..
Founders Of Digital World Social Media..
jom pom
 
Carrington degree offer diploma Transcript
Carrington degree offer diploma TranscriptCarrington degree offer diploma Transcript
Carrington degree offer diploma Transcript
ubufe
 
University of Otago degree offer diploma Transcript
University of Otago degree offer diploma TranscriptUniversity of Otago degree offer diploma Transcript
University of Otago degree offer diploma Transcript
ubufe
 
PSD to Wordpress Service Providers in 2024
PSD to Wordpress Service Providers in 2024PSD to Wordpress Service Providers in 2024
PSD to Wordpress Service Providers in 2024
Bestdesign2hub
 
一比一原版(oregon毕业证书)俄勒冈大学毕业证如何办理
一比一原版(oregon毕业证书)俄勒冈大学毕业证如何办理一比一原版(oregon毕业证书)俄勒冈大学毕业证如何办理
一比一原版(oregon毕业证书)俄勒冈大学毕业证如何办理
taqyea
 
Cyber Security Course & Guide. X.GI. pdf
Cyber Security Course & Guide. X.GI. pdfCyber Security Course & Guide. X.GI. pdf
Cyber Security Course & Guide. X.GI. pdf
RohitRoshanBengROHIT
 
一比一原版(mqu毕业证)麦考瑞大学毕业证如何办理
一比一原版(mqu毕业证)麦考瑞大学毕业证如何办理一比一原版(mqu毕业证)麦考瑞大学毕业证如何办理
一比一原版(mqu毕业证)麦考瑞大学毕业证如何办理
taqyea
 
一比一原版(bu毕业证书)英国伯恩茅斯大学毕业证如何办理
一比一原版(bu毕业证书)英国伯恩茅斯大学毕业证如何办理一比一原版(bu毕业证书)英国伯恩茅斯大学毕业证如何办理
一比一原版(bu毕业证书)英国伯恩茅斯大学毕业证如何办理
taqyea
 
Jarren Duran Fuck EM T shirts Jarren Duran Fuck EM T shirts
Jarren Duran Fuck EM T shirts Jarren Duran Fuck EM T shirtsJarren Duran Fuck EM T shirts Jarren Duran Fuck EM T shirts
Jarren Duran Fuck EM T shirts Jarren Duran Fuck EM T shirts
exgf28
 
一比一原版(bristol毕业证书)英国布里斯托大学毕业证如何办理
一比一原版(bristol毕业证书)英国布里斯托大学毕业证如何办理一比一原版(bristol毕业证书)英国布里斯托大学毕业证如何办理
一比一原版(bristol毕业证书)英国布里斯托大学毕业证如何办理
taqyea
 

Recently uploaded (20)

seo proposal | Kiyado Innovations LLP pdf
seo proposal | Kiyado Innovations LLP  pdfseo proposal | Kiyado Innovations LLP  pdf
seo proposal | Kiyado Innovations LLP pdf
 
一比一原版(hull毕业证书)英国赫尔大学毕业证如何办理
一比一原版(hull毕业证书)英国赫尔大学毕业证如何办理一比一原版(hull毕业证书)英国赫尔大学毕业证如何办理
一比一原版(hull毕业证书)英国赫尔大学毕业证如何办理
 
Lincoln University degree offer diploma Transcript
Lincoln University degree offer diploma TranscriptLincoln University degree offer diploma Transcript
Lincoln University degree offer diploma Transcript
 
一比一原版(uom毕业证)曼彻斯特大学毕业证如何办理
一比一原版(uom毕业证)曼彻斯特大学毕业证如何办理一比一原版(uom毕业证)曼彻斯特大学毕业证如何办理
一比一原版(uom毕业证)曼彻斯特大学毕业证如何办理
 
一比一原版(ukc毕业证书)英国肯特大学毕业证如何办理
一比一原版(ukc毕业证书)英国肯特大学毕业证如何办理一比一原版(ukc毕业证书)英国肯特大学毕业证如何办理
一比一原版(ukc毕业证书)英国肯特大学毕业证如何办理
 
一比一原版(soas毕业证书)英国伦敦大学亚非学院毕业证如何办理
一比一原版(soas毕业证书)英国伦敦大学亚非学院毕业证如何办理一比一原版(soas毕业证书)英国伦敦大学亚非学院毕业证如何办理
一比一原版(soas毕业证书)英国伦敦大学亚非学院毕业证如何办理
 
Steps involved in the implementation of EDI in a company
Steps involved in the implementation of EDI in a companySteps involved in the implementation of EDI in a company
Steps involved in the implementation of EDI in a company
 
cyber-security-training-presentation-q320.ppt
cyber-security-training-presentation-q320.pptcyber-security-training-presentation-q320.ppt
cyber-security-training-presentation-q320.ppt
 
2023. Archive - Gigabajtos selfpublisher homepage
2023. Archive - Gigabajtos selfpublisher homepage2023. Archive - Gigabajtos selfpublisher homepage
2023. Archive - Gigabajtos selfpublisher homepage
 
About Alibaba company and brief general information regarding how to trade on...
About Alibaba company and brief general information regarding how to trade on...About Alibaba company and brief general information regarding how to trade on...
About Alibaba company and brief general information regarding how to trade on...
 
Founders Of Digital World Social Media..
Founders Of Digital World Social Media..Founders Of Digital World Social Media..
Founders Of Digital World Social Media..
 
Carrington degree offer diploma Transcript
Carrington degree offer diploma TranscriptCarrington degree offer diploma Transcript
Carrington degree offer diploma Transcript
 
University of Otago degree offer diploma Transcript
University of Otago degree offer diploma TranscriptUniversity of Otago degree offer diploma Transcript
University of Otago degree offer diploma Transcript
 
PSD to Wordpress Service Providers in 2024
PSD to Wordpress Service Providers in 2024PSD to Wordpress Service Providers in 2024
PSD to Wordpress Service Providers in 2024
 
一比一原版(oregon毕业证书)俄勒冈大学毕业证如何办理
一比一原版(oregon毕业证书)俄勒冈大学毕业证如何办理一比一原版(oregon毕业证书)俄勒冈大学毕业证如何办理
一比一原版(oregon毕业证书)俄勒冈大学毕业证如何办理
 
Cyber Security Course & Guide. X.GI. pdf
Cyber Security Course & Guide. X.GI. pdfCyber Security Course & Guide. X.GI. pdf
Cyber Security Course & Guide. X.GI. pdf
 
一比一原版(mqu毕业证)麦考瑞大学毕业证如何办理
一比一原版(mqu毕业证)麦考瑞大学毕业证如何办理一比一原版(mqu毕业证)麦考瑞大学毕业证如何办理
一比一原版(mqu毕业证)麦考瑞大学毕业证如何办理
 
一比一原版(bu毕业证书)英国伯恩茅斯大学毕业证如何办理
一比一原版(bu毕业证书)英国伯恩茅斯大学毕业证如何办理一比一原版(bu毕业证书)英国伯恩茅斯大学毕业证如何办理
一比一原版(bu毕业证书)英国伯恩茅斯大学毕业证如何办理
 
Jarren Duran Fuck EM T shirts Jarren Duran Fuck EM T shirts
Jarren Duran Fuck EM T shirts Jarren Duran Fuck EM T shirtsJarren Duran Fuck EM T shirts Jarren Duran Fuck EM T shirts
Jarren Duran Fuck EM T shirts Jarren Duran Fuck EM T shirts
 
一比一原版(bristol毕业证书)英国布里斯托大学毕业证如何办理
一比一原版(bristol毕业证书)英国布里斯托大学毕业证如何办理一比一原版(bristol毕业证书)英国布里斯托大学毕业证如何办理
一比一原版(bristol毕业证书)英国布里斯托大学毕业证如何办理
 

Meletis BelsisManaging and enforcing information security

  • 1. Managing and Enforcing Information SecurityManaging and Enforcing Information Security June 2008June 2008 Belsis Meletis MPhil, MRes, BSc CWNA, CWSP, Network+, C|EH, ISO27001LA
  • 2. AgendaAgenda • Information Security • ISMS • Authentication and Provisioning • Monitoring and Compliance • Data Protection
  • 3. Information SecurityInformation Security • Information Security is difficult to implement due to the following: • The cost of implementing a security system should not exceed the value of the data to be secured. • Industries pay huge amount of money for industrial espionage. • Users feel that security is going to take their freedom away and so they often sabotage the security measures. • Computer prices have fallen dramatically and the number of hackers have been multiplied. • Security managers work under strict money and time schedule. • Hackers often cooperate with known criminals. • Almost 80% of attacks come from Internal threats and partners. • The number of technologies, standards and methodologies exist today are enough to confuse even experts.
  • 4. Information SecurityInformation Security “In the real world, security involves processes. It involves preventive technologies, but also detection and reaction processes, and an entire forensics system to hunt down and prosecute the guilty. Security is not a product; it itself is a process.…. ” Bruce Schneier (Secrets and Lies, Wiley and Sons Inc.)
  • 5. Information SecurityInformation Security • Security contains a number of tools , processes and techniques. • These in general cover three main requirements: – Confidentiality – Integrity – Availability • Depending on the security requirements a system has, one can concentrate only on one of the previous or all of them. • A new requirement enforced today is non-repudiation.
  • 6. AgendaAgenda • Information Security • ISMS • Authentication and Provisioning • Monitoring and Compliance • Data Protection
  • 7. ISMSISMS • Security should always start with the development of an ISMS system. • The Information Security Management System(ISMS) is the part of the overall management system, based on business risk approach, to establish, implement, operate , monitor, review, maintain and improve information security (ISO 27001 Standard). • The management system should include: • Organisational structure and Responsibilities • Policies, Procedures , Processes and Practises • Planning Activities and Resources
  • 8. Information Security Management Program ImplementationInformation Security Management Program Implementation Policy & Standards Physicalaccess RemoteAccess InternetPolicy Appl.Security Policy System Policy Technology Standards VPN Tokens Firewalls Implementation GuidelinesInstallation and configuration Operational Management Corporate Policy Operations Host-Sec. ContentSec. ProcessManagemen t
  • 9. ISO27001 AdvantagesISO27001 Advantages • ISO 27001 is an International Standard giving requirements related to Information Security Management System. • The advantages of an ISO27001 Certification : • Ensure confidentiality, integrity and availability of information to maintain competitive edge, cash-flow, profitability and commercial image. • Comply with legal, statutory, regulatory and contractual requirements. • Improve corporate governance and assurance to stakeholders such as shareholders, clients, consumers and suppliers. • Identify threats to assets, vulnerabilities, likelihood of occurrence and potential impact to appropriate allocate investment.
  • 10. AgendaAgenda • Information Security • ISMS • Authentication and Provisioning • Monitoring and Compliance • Data Protection
  • 11. Authentication and ProvisioningAuthentication and Provisioning • The management Headache  Applications and Locations are added almost daily.  Changes to headcounts have by multiplied.  The cost of IT Management has been increased (e.g. it is estimated that the cost to reset a password in a medium size organisation is $20)  Maintain Security Standards compliance is necessary (i.e. ISO27001,SoX,PCI).  Many man-hours of management time spent approving resource requests
  • 12. Authentication and ProvisioningAuthentication and Provisioning • The Security Headache  User provisioning for all applications is time consuming  13%-15% of help desk phone calls involve password reset.  Users use yellow stickers to write and remember the different passwords.  Long lag time between user termination & disablement of IDs.  Users have to access different applications and platforms (i.e. HPUX, Linux, Windows2003) .  Security Auditors require many different information.  Authentication method may be different for each application (e.g. Password Policies, Tokens, Idle Timeout) User needs to manually sign in to every application! User Mainframe Apps Intranet Web Apps
  • 13. Identity ChaosIdentity Chaos Enterprise Directory HRHR SystemSystem InfraInfra ApplicationApplication LotusLotus Notes AppsNotes Apps In-HouseIn-House ApplicationApplication COTSCOTS ApplicationApplication NOSNOS In-HouseIn-House ApplicationApplication •Authentication •Authorization •Identity Data •Authentication •Authorization •Identity Data •Authentication •Authorization •Identity Data •Authentication •Authorization •Identity Data •Authorization •Identity Data •Authentication •Authentication •Authorization •Identity Data •Authentication •Authorization •Identity Data
  • 14. Authentication and ProvisioningAuthentication and Provisioning • Identity Management Systems allows individuals to use a user name, password or other personal identification to sign on to the enterprise applications • IDM Systems Offer • Centralized management of all user identities and access rights. • Automated (de-)provisioning of accounts • Centralized access management for heterogeneous networks (e.g. Web applications, Systems ) • Strong and flexible password management policies • User Account Self Management • Identification/removal of inactive accounts • Full automated workflow approval path • Reset passwords (revalidate users) • Monitor all Identity related events • IDM requires Roles and Processes to be clearly defined • IDM reduces the Organization Cost and increases Productivity
  • 16. Authentication and ProvisioningAuthentication and Provisioning • Single Sign On (SSO) allow users to log in to virtually any system using a single log on procedure, • Allows administrators to choose an authentication method (e.g. Tokes, Passwords, Biometrics) • Seamless authentication for heterogeneous environments. • Centrally provide Session Management • End-to-end audits of user activity across disparate systems • Reduces frustrations from multiple passwords • Reduces the threats from the yellow stickers • Provide Workstation features like • Station Lock • Proximity Detectors and RF Badges • Single Sing Off • Session Migration • SSO Integrates with user provisioning solutions to further Increase productivity time. User ID &User ID & PasswordPassword TokenToken SmartSmart CardCard MS CAPIMS CAPI CertificateCertificate BiometricsBiometrics LDAPLDAP RF BadgeRF Badge ju9$7%%a&uju9$7%%a&u r2d2q3 &%$@((^g%$@#&&%$@((^g%$@#& dk4&4j7%w#psikep84m$sodk4&4j7%w#psikep84m$so PKIPKI CertificateCertificate encryptedencrypted passtickepassticke tt Sign-OnSign-On ServerServer Application HostsApplication Hosts NT/UNIXNT/UNIX OS/390OS/390 NovellNovell AS400AS400 Web ServersWeb Servers
  • 17. INNOVA S.A.INNOVA S.A. AgendaAgenda • Information Security • ISMS • Authentication and Provisioning • Monitoring and Compliance • Data Protection • Innova S.A
  • 18. Monitoring and ComplianceMonitoring and Compliance • What Do I Need To Do? – Businesses everywhere are attempting to cost effectively comply with multiple external & internal mandates (e.g. ISO27001,SoX,PCI). – Administrators have to defend their systems against new vulnerabilities. – Security experts need to identify incidents. – Auditors need to see proof of due care that IT security policies are sufficient, in place, and effective • How Do I Do It? – Automatically test platforms for security compliance on a scheduled basis – Regularly test systems for new vulnerabilities. – Enforce the regular analysis of log files to detect unauthorized actions.
  • 19. Vulnerability Assessment ToolsVulnerability Assessment Tools • Regular tests ensure that systems are protected from new vulnerabilities. • Vulnerability Assessment tools have databases with thousands of vulnerabilities. • Frequent update of these tools are necessary. • Two types of VA tools • Internet Based Services • Network Internal • Some of these tools offer compliance scans with different standards i.e. PCI • VA tools allows managers to schedule automated assessment jobs. • Reports from these tools are used to patch vulnerable systems and/or develop strategic security plans. • Reports can also be submitted to Security Auditors.
  • 20. Policy CompliancePolicy Compliance • Enterprises are finding that implementing new regulatory policies and procedures in an automated and efficient manner is very challenging. • The effort of translating the policy into actual technical controls and triggers is complicated and cumbersome • Policy Compliant platforms connect to corporate systems and test system configuration against pre specified security policies (i.e. size and type of passwords, Administrator access type) • Policy Compliance platforms: • Assist Enterprises to maintain configuration baseline over time. • Maps industry-accepted frameworks, standards (i.e. ISO27001, PCI, SoX) and corporate policies to a set of technical controls and policies • Provide assessment of heterogeneous systems (i.e. Unix, Windows). • Provide risk-based reports and proposed remediation techniques. • Improve Operational Cost and ensure policy compliance. • Prove Compliance to internal and external Auditors
  • 21. Monitoring and AnalysisMonitoring and Analysis • Enterprise IT Infrastructure elements provide a number of Audit/log records • Logs grow large to be viewed using manual techniques • Log and audit data are usually written in the local platforms • Cross platform analysis of log data are almost impossible • Monitoring tools collect records from different platforms. • Collected logs can be correlated, analyzed and viewed in real time. • Provide advance visualization techniques of the status of the Infrastructure • Forensics analysis help respond to security incidents and identify malicious acts. • Help Engineers in detecting and solving network problems. • Assist in the Audit process by being able to produce proofs. • Provides an "information warehouse" for corporate data that can be mined as a knowledge resource using built-in index and search technologies
  • 22. AgendaAgenda • Information Security • ISMS • Authentication and Provisioning • Monitoring and Compliance • Data Protection
  • 23. Endpoint SecurityEndpoint Security • Today Enterprise Infrastructures are not isolated • Sales employees use laptop computers and PDAs to connect to the corporate networks. • Teleworking is a new trend to reduce corporate OpEx • Standby engineers use laptop to connect to the corporate networks almost daily. • Threats to the endpoints can be easily provide a door for adversaries to access the corporate network (e.g. Virus, Trojan Horses, Unpatched Systems). • Endpoint security software ensures that endpoints are compliant with the corporate security Policy: • Endpoint security provides central control over the endpoint devices used by employees and partners. • Spec aliased endpoint clients can be installed on the enterprise Critical Infrastructure Servers. • Host Intrusion Protection • Antivirus • Buffer Overflow Protection • File/Disk Encryption • Personal Firewall • Application Control • Host Integrity Checking • Patch Management
  • 24. Endpoint SecurityEndpoint Security 2 4 Mobile User SSL VPN On-Demand NAC Wireless On-Demand and 802.1x NAC Mobile User or Guest Home User Partner or Supplier Web Application On-Demand NAC WAN Router In Line NAC Ethernet 802.1x NAC Ethernet DHCP NAC Remote Office Embedded Windows Device Wired User Wired User IPSec VPN API NAC
  • 25. Access ControlAccess Control • Enterprises today based their business almost solely on the data stored in their IT Systems. • Controlling access on these data is vital for the protection of the Enterprise. • Access Control platforms allow Administrators to centrally control and enforce access on the Corporate data: • Enforce access accountability and segregation of duties • Centrally apply access control policies and rules to reduce administrative cost and complexity • Enforce fine level of control on • Files and Folders • Processes • Privileged Programs • Network Connections • Terminals • Reduce cross-platform management overhead and meet internal and external audit requirement • Access control tools required that a defined access control policy exist
  • 26. Data LeakageData Leakage • Data leakage tools provide finer level of control on the access restrictions allowed on the corporate data. • Data leakage enforces the corporate access control policy by providing deep content inspection: • Automated discovery of corporate confidential information stored on endpoints and servers. • Network Scan to detect and stop confidential information transmitted using different types of applications and protocols e.g. IM, Emails, HTTP,FTP. • Controls the distribution of information using USB Drives, CDROMS, Emails, and printouts at the point of use where information is accessed and stored. • Display alerts for data access violation and develop Incident Response Workflows. • Control data input /output from heterogeneous applications and databases. • Provide a cost effective way to receive Standards Compliance for Legacy and Web Applications. EMAIL & WEB UPLOADS IM / FTP / P2P FILE TRANSFER REMOVABLE MEDIA (CD, USB…) HARDCOPY (Printers, PDF) NETWORK RESOURCES LEGACY APPS ENTERPRISE APPLICATIONS (Clipboard, Exports) UNSTRUCTURED DATA & FILE SHARING (Copy, Move…)
  • 27. INNOVA S.A.INNOVA S.A. AgendaAgenda • Information Security • ISMS • Authentication and Provisioning • Monitoring and Compliance • Data Protection