260 likes | 434 Views
Data Leak Prevention: Safeguarding Corporate Information in a world of vanishing perimeters. Kostas Papadatos MSc InfoSec, CISSP, ISO 27001 Lead Auditor, ISSMP, PMP Director , Security Consulting Services ENCODE SA. Greek ICT Forum, October 2007. Agenda. The Business Problem…
E N D
Data Leak Prevention:Safeguarding Corporate Informationin a world of vanishing perimeters Kostas Papadatos MSc InfoSec, CISSP,ISO 27001 Lead Auditor, ISSMP, PMP Director, Security Consulting Services ENCODE SA Greek ICT Forum, October 2007
Agenda • The Business Problem… • Why Traditional Controls Fail? • Are We Making the Right Investments? • What We Can Do!
Agenda • The Business Problem… • Why Traditional Controls Fail? • Are We Making the Right Investments? • What We Can Do!
Impact from Data Leakage … CONFIDENTIAL • Brand damage • Stock price • Regulatory fines • Loss of customers/business • Legal and contract liability • Notification and compensation • Increased security costs • Marketing and security response • Lawsuits
The Economics of Data Leakage The Financial Services Authority (FSA) has fined Nationwide Building Society (Nationwide)£980,000 for failing to have effective systems and controls to manage its information security risks. The failings came to light following the theft of a laptop from a Nationwide employee's home. ChoicePoint to pay $15 million over data breach Data broker sold information on 163,000 people to alleged crime ring In addition to a $10 million fine, ChoicePoint will also create a $5 million fund to help consumers who became victims of identity theft… DuPont Employee Walked Away With $400 Million In Trade Secrets Company scientist downloaded 22,000 sensitive documents and accessed 16,000 others as he got ready to take a job with a competitor… TJX says 45.7 million customer records were compromisedwith an estimated cost over $1 billion … .. for a Regulated industry the cost per data record leaked is from $90 to $305 … Forrester Research
Executive Directive … • Simple to say but complex to deliver • Find the data • Data discovery • Data classification • Monitor the data • Identify data use and users • Watch the data at rest and in use • Protect the data • Stop data misuse • Encrypt at rest based on risk • Encrypt in transit on the network or device “Protect My Sensitive Data! …and don’t interfere with the business!”
Agenda • The Business Problem… • Why Traditional Controls Fail? • Are We Making the Right Investments? • What We Can Do!
Defining a Critical System Databases Applications Systems Networks / Directories • Usually we define a system as: • Data • Business Application • Database Server(s) • Application/Web Servers and/or Mainframe • Supportive network infrastructure • …
Traditional Security Efforts Databases Applications Systems Networks / Directories • So we apply: • Network Perimeter Security • Simple/Common: “Border Firewall” • Advanced: Internal Segmentation, IPS • Access Control on Systems/Applications • Simple/Common: username/password, app/sys permissions • Advanced: Strong authentication, RBAC and IDM • System Auditing (for the very advanced) • Disaster Recovery But still we face critical security issues
What traditional security efforts cannot counter • Exposed output files from the systems • Information Leakage by authorised users • Changes by authorised users • Outsourcers • Collection Agencies • Call Centers • Printing Houses • IT Outsourcers (Service Providers, Development…) • Administrators • Mobile Users • Lost laptops, Removable media (USBs…) • …
Redefining Business System Users Databases Applications Systems Networks / Directories • In essence we had omitted • the Points of Use of the Information/Data processed by the system, i.e. the various workstations/laptops • the People • the Processes ?
Business Data Main Categories • Application data: data that is managed by various applications. • Files: documents,emails, presentations, etc. Application Data Transactions Financial info Files Subscriber Info PDFs Emails Spreadsheets Word Documents
“Why traditional controls fail” • Privileged Users • Privileged users should and have access to the systems and data, so Access Control at Apps/servers cannot help a lot • On the other hand we have no “Access Control” at the Point of Use, i.e. the user’s PC/Laptop, Terminal Services • Vanishing Perimeters • With so many parties accessing systems and data inside the border firewall we cannot talk about network perimeters anymore • Infrastructure-centric Controls are not enough • Our Data live beyond Infrastructure controls (e.g. laptops, outsourcers, business partners…) • With current Infrastructure-centric controls is very difficult to obtain a view of our data “whereabouts”, who accessed what and what they did with it!
Agenda • The Business Problem… • Why Traditional Controls Fail? • Are We Making the Right Investments? • What We Can Do!
Priorities for data protection Which type of breaches are a top or high priority to your company? 86% Network or system vulnerabilities 77% Trojans on employee computers 75% Web site vulnerabilities Attacks on customer desktops 75% 73% Insider abuse: unauthorized access 70% Spyware on employee computers 57% Insider abuse: authorized users 51% Hardware theft 49% Social engineering 48% Theft of backup tapes 39% Paper theft Percentages reflect those who answered “top priority” or “high priority.” Source: Forrester user survey of 83 data protection decision-makers, December 2005
Where data breaches are really occurring What are the primary means by which data breaches occurred in 2005? 39% Insider abuse: authorized users 29% Hardware theft 29% Trojans on employee computers 21% Spyware on employee computers 18% Attack on customer desktops 14% Social engineering 14% Insider abuse: unauthorized access 11% Paper theft 11% Web site vulnerabilities 7% Network or system vulnerabilities 4% Don't know 0% Theft of backup tapes Base: 28 of the 83 (34%) data protection decision-makers, who experienced at least one breach Source: Forrester user survey of 83 data protection decision-makers, December 2005
Protection priorities don't align with reality PriorityGap Degree of likelihood Degree of concern 6 6 3 3 2 -1 -1 -1 -2 -6 -9 Insider abuse: authorized users Hardware theft Social engineering Paper theft Spyware on employee computers Trojans on employee computers Attack on customer desktops Theft of backup tapes Insider abuse: unauthorized access Web site vulnerabilities Network or system vulnerabilities Lowest Highest Source: Forrester user survey of 83 data protection decision-makers, December 2005
Agenda • The Business Problem… • Why Traditional Controls Fail? • Are We Making the Right Investments? • What We Can Do!
What we have to do • Even the best Access Control at the Application/Server level cannot help much with Data Protection when it comes to authorised users (internal or otherwise) • What we have to do: • Accountability & Control at the Point of Use or the Endpoint • Distribute controls throughout our “redefined” system • Ensure that these controls cannot be bypassed even by privileged users (e.g. Admin) and can be centrally managed • Data-centric controls instead of only infrastructure-centric ones • Context-based controls instead of “black & white” ones
What DLP products do …they Secure The “Virtual Perimeter” for Data
How DLP technology works [1] • Monitor & Control every data access/transfer activity • File access • Network uploads/transfers • Print Operations • Removable media • Clipboard operations • Application field-level logging • Enforce Risk/Classification-based policies • Allow business operations – stop/alert for unauthorised/suspicious ones!
How DLP technology works [2] 1 4 2 3 What is the Policy regarding Actions to be taken? Where Did the Data Come From? (What Classification?) What is the User Doing With It? Read, Write, Print, Move, Burn, Copy/Paste, Upload, etc. Where Is the Data Going? Devices Applications Networks
How DLP technology works [3] • “All files coming from the xyzFile Share should be “vaulted” in a specific directory” • “All files coming from the xyz Client Application should be “vaulted” in a specific directory” • No Copy/Pasteoutside from the Biz App Client xyz • “Files in Directory xyz can be Printed only on Printer ABC” • “Files in Directory xyz cannot be copied to Removable Media (e.g. USB sticks, CD/DVD)” • “All files coming from the xyzFile Share should be “transparently encrypted” • …
Putting all together… Databases Applications Systems Networks / Directories Business Data Employees Data flows to the user Partners Outsourcers Traditional Controls DLP Controls (protecting virtual perimeter)
But most important… • Understand your risk profile. • Set proper priorities. • Allocate budgets accordingly.