90 likes | 293 Views
Learn about secure data sharing, risks, strategic policies, auditing, and tactical measures to safeguard data during sharing processes. Understand how to manage removable media, encrypt data, and enforce relevant policies effectively.
E N D
Secure Data Sharing • What is it • Where is it • What is the Risk • Strategic • What Policy should be enforced • How can the process be Audited • Ongoing Process of Sharing Data • Tactical • Manage Removable Media • Encrypt mobile data • Provide users with relevant Policy excerpts and Audit acceptance
Compliance Policy Monitoring Incident Response Event Management Access Control Identity Management Threat Management
Identify Security Drivers Strategy Define Policy & Classify Discover Data Assess Risk Identify Control Gaps Data Strategy
2 13 10 12 1 9 11 4 5 6 7 8 3 Data stored on disks Database instances Collaboration on Portals Transformed data on file shares Transformed data emailed & on exchange srv Tape Backups Removable and Printed media Application Data Data in transit across WANs Transformed Data on End Points Data sent/stored on public infrastructure Replicated DB for DR, bulk analysis Disk Backups End Point Network Application DB/FS Storage Replicated Database Bulk Analysis Disk Storage WAN LAN Other Campuses & Data Centers Database Enterprise App Disk Storage Backup Tape Database Custom App Disk Storage Backup Exchange Server Disk Storage Internet Backup Disk Disk Storage File Server Portals Disk Storage Restricted Data Internal Data Public Data Discover Data Identify Security Drivers Define Policy & Classify Discover Data Assess Risk Identify Control Gaps
End Point Network Application DB/FS Storage X 3 3 4 4 1 1 Threat Packets sniffed in transit Packets sniffed intransit 7 7 Privileged User Breach DBA/FSA Privileged User Breach DBA/FSA Media lost or stolen Media lost or stolen Privileged User Breach Privileged User Breach Replicated Database Bulk Analysis Disk Storage 5 5 WAN LAN Database/File Server Hack Database/File Server Hack 13 13 2 2 Other Campuses & Data Centers Physical theft of media or lost media exploited Physical theft of media or lost media exploited Discarded media exploited Discarded media exploited Database Enterprise App Disk Storage 15 15 Backup Tape Trojans / Key Loggers Trojans / Key Loggers 8 8 Application Hack Application Hack Database Custom App Disk Storage Backup 9 9 (Semi) Trusted User Misuse (Semi) Trusted User Misuse Exchange Server Disk Storage Internet Backup Disk 10 10 3 3 11 Unintentional Distribution Unintentional Distribution Packets sniffed in transit Packets sniffed in transit Network Leak Email-IM-HTTP-FTP-etc. Disk Storage File Server 6 6 14 11 Unintentional Distribution Unintentional Distribution End Point Leak print-copy-xform Network Leak Email-IM-HTTP-FTP-etc. 14 End Point Leak print-copy-xform High Risk Medium Risk 12 12 Low Risk Public Infrastructure Access Hack Public Infrastructure Access Hack Portals Disk Storage Assess Risk Identify Security Drivers Define Policy & Classify Discover Data Assess Risk Identify Control Gaps