350 likes | 363 Views
This event focuses on the development and implementation of effective policies and controls in the criminal justice system. Experts will share best practices and technologies to ensure compliance with relevant regulations and frameworks. Join us on October 15th, 2007 in Green Park, Reading.
E N D
Criminal Justice Day Louis Brooks Criminal Justice Account Director 15 October 2007
Criminal Justice Day 15th October 2007, Green Park, Reading
People Process and Technology Compliance Paul Gamble Principal Business Consultant
CESG COBIT MOPI UPSA ISO PCI Create Map Publish Assess Fix • Business Policies • Info Security • Access Control • Non IT Policy Exception Scoped by Risk Level Summary of Approach Written Policy Technical Controls Procedural Controls • Configurations • Security best practices • Remediation • Vulnerabilities • Non-credentialed checks • Credentialed checks • Patch Mgmt • Control self assement • Questionnaire responses • Risk-based prioritisation • Transparent Auditing • Entitlements review • Group\file permission • classify & assign owners • Approval workflow
Basel II COBIT NIST SOX ISO PCI Create Map Publish Assess Fix • Corporate Policies • Info Security • Access Control • Termination Govern Control Define Scoped by Risk Level • Configurations • Security best practices • Remediation • Vulnerabilities • Non-credentialed checks • Credentialed checks • Patch Mgmt • Control self assmnt • Questionnaire responses • Risk-based prioritization • Entitlements review • Group\file permission • classify & assign owners • Approval workflow Summary of Approach Written Policy Technical Controls Procedural Controls
Response Assessment Module Procedural Controls
Building Questionnaires • RAM includes questionnaires for many standard regulations and frameworks including : ISO27001, ISO20000 PKI, ITIL • Other can quickly be developed for CJS specific obligations / best practise (UPSA/CSP, MOPI, underlying ACPO guidelines etc)
Assigning Risk Weights • Weights can be assigned to both questions and responses to reflect importance and risk
Question Import Tool • Questionnaires can be quickly created from existing documents using the Import tool • The Import tool allows text to be pasted in or typed to create multiple questions in one operation • Questionnaires can be “Operational awareness” or an ongoing training requirements analysis
Web Portal • Questionnaires delivered via Web client
Responding to a questionnaire • Users may save partial responses, exit, and resume the questionnaire at a later time
Uploading documents / URL’s • Administrators can add documents and URLs to questionnaires by clicking the “Add Document” link to the right of the questionnaire • Clicking the “Certification Required” box ensures the users open the document or URL before they are able to respond to the questionnaire
Response files • Each respondent's data is saved in response file • Multiple response files can be loaded at one time to aggregate the results from multiple respondents
Analysis Tools • User can select how granular the representation – top level, sub level, question level • Split screen option allows access to the response details including the responses and comments as well as the graphical representation
Procedural Operational Infrastructure Incident Management IT Controls PerimeterSecurityDevices Database Security MailSecurity Host Intrusion Protection Anti-virus Security Monitoring Process Are my policies & controls effective? Collect, Identify, Prioritize, Remediate, Report Identify Prioritize Respond Review GLOBAL INTELLIGENCE Query & Report Remediate Risks Applicability Severity • Data Theft of customer data • Policy Violation on SOX impacted sys • Malicious Outbreak in branch office • Policy Violation • Data Theft • Malicious Outbreak • Compliance reporting • Threat analysis • Trend reporting
Q&A Enterprise Vault Customer Presentation 16
The trend towards endpoint enforcement Paul Gamble Principal Business Consultant
Networks are Continually Exposed Guests WANs& Extranets Internet Kiosks& Shared Computers SSL VPN Consultants IPsec VPN EmployeesWorking at Home WirelessNetworks WebApplications • Security has moved on : • Connectivity drives productivity but increases vulnerability • People and data sources are now the network perimeter • Attacks are increasingly targeted • - often from the inside • The Cabinet Office is recommending a change in focus – from a perimeter fortified GSI a more open network with very strong endpoint controls 18
The changing threat In government threats are usually targeted Blended Threats are becoming the norm Attacks are typically stealthy Criminals wish to remain hidden to maximise gain / damage The solution needs to be smart and layered Symantec behavioural technology identifies 1000 threats/month that the top 5 antivirus products are missing. Signature based Antivirus is no longer enough 19
Threat Landscape is Evolving Taken from the Internet Security Threat Report, Jul-Dec 06, Jan-Jun 07: • 25% of exploit code was released less than one day after vulnerability disclosure. • 12 zero-day attacks occurred, up from 1 between Jan-Jun 06! • 66% of the top 50 malicious code were designed to steal sensitive or confidential data. • Over the first six months of 2007, the United Kingdom was the EMEA country most frequently targeted by DoS attacks, accounting for 46 percent of attacks in the region during this period. …AV technology is still very important, but no longer enough!
Includes a NAC agent to ensure each endpoint is “NAC-ready” (Sygate) • Adds endpoint compliance to endpoint protection • Device control to prevent data leakage at the endpoint (Sygate) • Protection against mp3 players, USB sticks, etc • Behavior-based Intrusion prevention (Whole Security) • Vulnerability-based protection (Generic Exploit Blocking) • OS Protection (protect users from themselves!) • Gartner leader! - Industry’s best managed desktop firewall (Sygate) • Includes best location awareness in the market • Best anti-spyware, proven leading track record in both detection and removal • Includes VERITAS technology for rootkit handling • The World’s leading anti-virus solution (SAV CE) • More consecutive Virus Bulletin certifications (32) than any vendor Ingredients for Symantec Endpoint Protection Network AccessControl Device Control IntrusionPrevention Firewall Anti-Spyware AntiVirus
Group/Policies Log Content Cluster Cluster Database Database Database Database Fault Tolerance / Fail Over Failover between Management Servers & Data Stores Replication SEPM SEPM SEPM SEPM SEPM SEPM
Nothing new • We are not releasing any new technologies in Symantec Endpoint Protection, no 1.0 releases here. • Intrusion prevention has been around for years but has reached less than 15% of endpoints – Partly because of the false alarm rate and partly because of system resources …but our integrated solution and low memory usage are new!
Endpoint agents need memory Paul’s Laptop – 512MB memory Windows ~140MB SCS ~129MB IPS Device control Application control NAC • Oh and some spare to actually do my day job IPS Device Control 24
A summary of Endpoint Protection Scanning can be auto-throttled to give priority to user applications Location awareness allows separate policies for VPN, Wireless, Ethernet… Fingerprint system and block any new application from being added or run Allow the connection of USB flashdrives but make them read-only Sorry, Word documents must be saved to this area of the network Management dashboard with instant ‘customisable’ overview Tiered Administration Manage to delegate tasks 25
Protecting Access to your Information Access Controls : • Who – Officer, Network Admin, … • How – Workstation, Laptop, Mobile Device • When – Time of access • Where – Office Network, Wireless, VPN, … • What – The target data or application
Authorizing Endpoints, Not Just Users • Network Access Control = Control who can access your network by creating a closed system • Ensure that required patches, configuration, and protection signatures are in place before the endpoint connects to the operational network • Automatic endpoint remediation • Enforce policy before access is granted Authorized User Authorized Endpoint + Protected Network
Step 1 Endpoint Attaches To Network Configuration Is Determined ✗ Monitor Endpoint ToEnsure Ongoing Compliance Step 4 Monitor Enforce ü ü Step 2 Compliance Of ConfigurationAgainst Policy Is Checked Remediate PatchQuarantineVirtual Desktop Step 3 Take Action Based OnOutcome Of Policy Check What is Network Access Control? Discover
Microsoft SQL Server Database 802.1x Enabled Switch DHCPServer Symantec LAN Enforcer Symantec DHCP Enforcer Symantec Gateway Enforcer Symantec Enforcement Agent + Symantec Endpoint Protection Agent (Self-Enforcement approach) Symantec Network Access Control:Solution Elements Symantec Policy Manager Management Enforcement Endpoint
Antispam & Antivirus Data Loss Prevention • Detect, block, and remove • Spam • Spim • Virus • Other malware • Monitor structured and unstructured content • Compliance templates • Incident mgmt workflow Multi-protocol Control Predictive Threat Protection • Enforce policies for email, IM and web (beta) • Integrated administration • Unified incident management • Protect against 0-day threats • Real time threat protection for synchronous communications Information In-Motion:Symantec Messaging Security • Messaging is business critical • No longer just email • 80% of company IP is in email • 52% of data security breaches are from insiders* • 96% data leaks are inadvertent rather than malicious* * Data from EPIC.org, perkinscole.com and Vontu
Mobile Devices • Consequences of a lost laptop could be more damaging than those of a ‘conventional’ disaster …. • but we know that… ? • Next Generation Mobile Devices • Just as powerful as a laptop • 22 times more likely to be lost • Increased data value… Increased reason for attack • Often given the same security & compliance policy as for ‘normal’ mobile phones? • New compliance policies are needed for new technologies BEFORE they are deployed
Windows Mobile and Smartphone Symantec Mobile Security Suite 5.0 • Symantec Mobile Security Suite 5.0 for Windows Mobile • Symantec Mobile Security Suite Components • AV • Anti-SMS Spam • LiveUpdate • Firewall • Personal Data Protection / Data Encryption • Device Password Protection • Software Integrity Assurance • Phone Feature Control • Network Access Control (with Symantec Mobile VPN) • Enterprise Management • Symantec Mobile VPN 2.6 (separate product)
Loss Mitigation Symantec Mobile Security Suite 5.0 – Loss Mitigation • Secure folder encryption • Includes memory cards • Automatically encrypt My Documents folder on logout • Device password protection • Data wipe after maximum number of failed logins • The user is warned when the maximum is almost reached • Encryption of selected files on memory cards • Ability to share encrypted files between users
Symantec Mobile VPN 2.6 Symantec Mobile VPN 2.6 • Compatible with Cisco and Nortel VPN gateways • Allows devices to connect to networks through secure IPSec VPN tunnels • Compliant with Symantec Network Access Control architecture • No VPN gateway configuration changes required; uses same configuration as the Cisco and Nortel VPN client
Q&A Enterprise Vault Customer Presentation 35