110 likes | 257 Views
Pedigree : Network-wide Protection Against Enterprise Data Leaks. Team: Nick Feamster, Assistant Professor, School of CS Anirudh Ramachandran, PhD candidate, School of CS Yogesh Mundada, PhD student, School of CS Mukarram Tariq , PhD Georgia Tech pedigree@gtnoise.net
E N D
Pedigree: Network-wide Protection Against Enterprise Data Leaks Team: Nick Feamster, Assistant Professor, School of CS Anirudh Ramachandran, PhD candidate, School of CS Yogesh Mundada, PhD student, School of CS MukarramTariq, PhD Georgia Tech pedigree@gtnoise.net http://gtnoise.net/pedigree
Motivation: Data Leakage Prevention • Security breaches skyrocketing; each incident costs $6.75 million on average[1] • Privacy Rights Clearinghouse reports 93.8 million personal records as lost or stolen since 2005 • Many companies dealing in sensitive information (e.g., financial information, source code, health records) have little to no DLP infrastructure [1] 2010 Global Cost of a Data Breach, April 2010; http://www.ponemon.org/data-security
Problems with Existing Technology • Not cohesive: needs separate solutions for data leaks through email, USB, network, etc. • Not Comprehensive: rely on heuristics to identify and filter confidential data—susceptible to circumvention (e.g., format conversion, encryption) • Complicated Maintenance and Management: policies have to be maintained both at endpoints and in the network—needs constant updating
Pedigree’s Vision • Pedigree aims to stop many data leaks in enterprises—accidental or intentional—using a content-agnostic, formal approach called Information Flow Control [1] • Advantages • Highly expressive, fine-grained policy controls for both operators and users • Impossible to circumvent by encrypting or copy-pasting sensitive data • Low deployment overhead D. E. Denning, “A Lattice Model of Secure Information Flow”, CACM 1976
How does Pedigree work? • Pedigree requires a small module on the OS at endpoints called a labeler (eqvt to installing antivirus software) • Pedigree associates metadata—called labels—to sensitive information. Labels are tracked across the enterprise by labelers • Enforcers located at end-hosts (i.e., as an OS module) and in the network (i.e., a firewall) enforce policies each time information flows from one resource to another
Example Enterprise Network Fileserver Alice F Bob Policy DB Bob can read F • Alice sets policies on F • Allow only Bob read access to F • Disallow sending outside enterprise Although Bob can read F, he cannot copy F to a removable drive or send F outside the enterprise Alice first creates sensitive file F on fileserver But other users cannot
Use-case 1 • Protecting company-wide information not ready for public release (e.g., quarterly reports) • Pedigree solution • Report creator adds a sensitive “taint” to the label of the report • Any user who accesses the data can only read it; they cannot electronically leak the data without compromising their operating system (very hard)
Use-case 2 • A user wants to get feedback on a document from a diverse group of users in the enterprise, but does not wish them to take the document outside the enterprise servers • Pedigree solution • The user uses a simple GUI to create a new group (distinct from OS groups) giving other users only “read” but not “export” access • Users in the group can read the data, but cannot copy it to removable drives or send it over email • Users not in the group cannot even read the data (done separately from OS permission checks)
Technical Details • Pedigree software on endpoints performs checks each time two resources with incompatible labels interact • e.g., a process reads a file labeled “sensitive” • If a process reads a sensitive file, its own label acquires the sensitive status • All future communication by this process will be labeled “sensitive”, and can be checked by enforcers • Stops accidental data leakage • Not thwarted by encrypting the sensitive information
Target Market • Large number of potential customers • Financial / banking institutions • Organizations that maintain health records, or seek regulatory compliance • Corporations that wish to safeguard their internal reports, source code, etc. • Ideally, any institution that deals with sensitive information can benefit from Pedigree deployment
Competition • Many security companies offer DLP products • RSA Data Loss Prevention, McAfee Data Loss Prevention, CA Technologies Security DLP, etc. • Key advantages of Pedigree • Content-agnostic: cannot be thwarted by encryption • Comprehensive solution: no need to purchase many different products (e.g., Host DLP, Network DLP, Email DLP, etc.) • Key limitation: Does not identify sensitive data