280 likes | 294 Views
Explore the importance of secure messaging, risks of insecure communication, policy development, and architectural principles for secure messaging implementation. Learn about innovative technologies, 10 practical steps for secure messaging, and the top reasons to prioritize messaging security. Discover the role of Reavis Consulting Group in providing security advice, the threats faced in messaging, risk management strategies, incident response protocols, and antivirus strategies. Gain insights on encryption services, email security, and spam prevention techniques.
E N D
10 Steps to Secure Messaging Jim Reavis, President Reavis Consulting Group
Agenda • Risks of insecure messaging • Policy • Architecture • Innovative technologies & trends • 10 Steps Companion site: csoinformer.com/10steps
Top Ten Reasons to Secure Messaging 10. Protect intellectual property sensitive to your corporate mission 9. Avoid “angry” emoticons from your boss 8. Reduce risk of worms running rampant on your network 7. Poor dating prospects at the unemployment line 6. Increase user productivity
Top Ten Reasons to Secure Messaging 5. “Sobig fatigue” not covered by workmen’s comp. 4. Securing communications with partners and customers creates new business opportunities. 3. Saying “ILOVEYOU” to the CEO is usually inappropriate outside of the annual Christmas party. 2. Reduce risk of legal liability. 1. Executive washrooms rock!
About Reavis Consulting Group • Provide research and advisory services regarding best practices and emerging security trends • Clients include Fortune 500 members, gov’t and information security companies • Publish monthly CSOinformer newsletter
Threats • Viruses • Worms • Spam • Insiders/Covert Channels • Idiot users who got their job just because they have the same last name as the CEO E-mail IM Internal Hosts E-mail Server Firewall IM AV Gateway Internet E-mail
Risks • Data loss, theft & leakage • Compromised systems • Downtime/loss of productivity • Out of compliance with regulations • Civil litigation
Risk Management • Topic of the year at CISO/CSO gatherings • Definition: the systematic process of managing an organization's risk exposures to achieve its objectives in a manner consistent with public interest, human safety, environmental factors and the law. • Reduce risk & create opportunities.
Risk Mgt Strategies Avoid Accept Transfer Mitigate Risk Mgt Process Establish Risk Profile Establish Protection Profile Modify PP as RP changes Threat level “Orange” New business venture ROSI Risk Management Risk = Value of the AssetXSeverity of the VulnerabilityXLikelihood of an Attack
Policies • Legal due diligence (e.g. retention laws). • Communicate clearly. • Acceptable & appropriate usages • Clear definitions (e.g. what is proprietary) • Provide examples (e.g. .EXE files prohibited, anything sent to payroll processor must be encrypted) • Documented acceptance. • How do you attain ROSI with your policy?
Architectural Principles • Proxy all connections • Hidden messaging methods may be P2P. • Measurement capabilities • Layered Defense Systems • Best of Breed vs Integrated Suite? • Integrated team approach • How is IT working against your goals?
Architectural Principles • Granular rules control • Ad hoc blocking of new threats • Prevent auto-forwarding risks • Compartmentalize • Improve incident response • Provide limited service during crises • Redundancy • Education & Awareness
Incident Response • Formalized CERT • Specialized messaging response team • Incident reporting • Response • Containment (unplug, router ACL filters, etc) • Disinfect, Remediate, Rebuild • Notify external partners • Forensics, analysis, lessons learned
Baseline & Measurement • Network traffic analysis • E-mail & IM logging • Identify dependencies • Trend analysis • Support policy revisions • Creating TCO metrics for budgeting • Don’t horde this information
Hosted by Who wrote the antivirus software used by Microsoft in DOS 6.22? Dr. Solomon Central Point X-tree Microsoft Cross-Tab Label 0 / 500
Antivirus Strategy • Multiple AV tools • Desktop, Server, Email Gateway. • Antivirus network appliances, Managed AV service. • How many levels of AV provides ROSI? • Content Filtering (Day Zero defense) • Subject line. • File attachment types. • Tactics outside of messaging control • Lockdown e-mail client. • Keep patching virus targets.
Antivirus scanning points E-mail Client AV Gateway E-mail Server Network Layer AV Appliance MSSP Internet E-mail
Hosted by What is the Internet Engineering Task Force RFC for OpenPGP? 1542 802.1x 2440 I was told there would be no tests Cross-Tab Label 0 / 500
E-mail encryption services • Virtually unbreakable, often unusable • Key to protecting information and reducing malicious threats • Issue: total cost of ownership (TCO) traditionally a burden • Hot trend: encryption proxy servers/e-mail firewalls
E-mail encryption by proxy • Proxy manages keys • Encrypts messages • Gives recipient option of secured SMTP message or Webmail E-mail E-mail Server Encryption Proxy Webmail Server Internet E-mail
Instant Messaging • Embrace and extend • Proxy connections • Encrypt communications • Logging & Usage profiling • Block dangerous behaviors (file transfers, etc) • Gateway ROSI benefit: IM compatibility
Instant Messaging IM Proxy Central configuration & administration
Spam • Why is this a security issue? • Anti-spam approaches: • Keyword filtering • Bayesian algorithm • Blacklists/Whitelists • Community voting • Tagging vs. blocking • Multiple approaches often necessary. • ROSI Models.
Awareness • Courseware • Reinforce policy • Educate about threats • Recognizing viruses • Safe practices • What to do, where to go for help • Regular internal AV newsletter
To protect and to serve Your boss E-mail IM Proxy IM Internal Hosts Departmental E-mail Servers IM MSSP Internet Encryption Proxy AV Gateway Firewall E-mail Network Layer AV Appliance Content/Spam Filtering
Summary – the 10 Steps • Enforceable policies • Architecture • CERT & Incident Response Plan • Awareness program • Baseline & continuous measurement system • Encryption • Proxy everything • Multiple layers of virus/spam protection • “Best of Breed” • Take an integrated approach
Hosted by According to IBM Research, in what year did the first PC virus appear? 1984 1986 1988 The year Bill Gates was born Cross-Tab Label 0 / 500