1.14k likes | 1.42k Views
Commonwealth Information Security Officers Advisory Group (ISOAG) Meeting. JULY 11, 2007. www.vita.virginia. 1. WELCOME. Peggy Ward, VITA. www.vita.virginia. 2. ISOAG July 2007 Agenda. I. Welcome Peggy Ward, VITA II. E-Discovery Julie Whitlock, OAG
E N D
Commonwealth Information Security Officers Advisory Group (ISOAG) Meeting JULY 11, 2007 www.vita.virginia 1
WELCOME Peggy Ward, VITA www.vita.virginia 2
ISOAG July 2007 Agenda I. Welcome Peggy Ward, VITA II. E-Discovery Julie Whitlock, OAG III. Identity Management Roadmap Tony Shoot, NG IV. CESC - Security Operations Linda Smith, NG V. Commonwealth Information Security Council Update! Encryption Committee Steve Werby Making Security an Executive Management Priority John Karabaic Small Agency Outreach Robert Jenkins Identity and Access Management Patricia Paquette VI. Keylogging Malware Tripp Sims, VITA VII. COV IT Security Policies, Standards and Guidelines Update Cathie Brown, VITA IX. MS-ISAC Peggy Ward, VITA X. Upcoming Events Peggy Ward, VITA XI. Other Business Peggy Ward, VITA
An Overview ofE-Discovery July 11, 2007 Julie Whitlock, Assistant Attorney General Technology and Procurement Law Section
What is discovery? • Discovery is the process by which parties to a lawsuit exchange information, or request it from third parties • Requests for production of documents • Subpoenas • Depositions • Etc.
What is e-discovery? • Process by which parties request “electronically stored information” = ESI • Includes: Emails Metadata Voice mails Spreadsheets Word files Text messages Calendars Videos Information on jump drives, PDAs, and Blackberries Information stored on home or personal computers and devices, and in personal e-mail accounts
What has changed? • Statewide document retention schedules have not changed • Duty to preserve evidence has not changed • Federal Rules of Civil Procedure • Amendments became effective December 2006 • Specifically address e-discovery • Specifically allow for sanctions • Require early conference to discuss availability, cost, and timing of producing data
What is individual agency’s responsibility? • Compliance with document retention schedules, including documentation of destruction • Preservation of all evidence in its original electronic form, so that all information contained within it, whether visible or not, is also available for inspection (e.g. metadata) • Notification to VITA early on, to enable efficient responses and coordinate any necessary litigation holds • Notification to your agency counsel at the AG’s Office when you anticipate litigation, in order to receive advice specific to the situation
Effective Records Management • Ensures compliance with document retention schedules • Provides the foundation for compliance with discovery rules • Enables efficient review of ESI • Reduces cost of storage, cost of searching, cost of retrieval • Library of Virginia retention schedules address both physical records and virtual records
Virginia Code § 42.1-86.1. Disposition of public records. — *** C. Each agency shall ensure that records created after July 1, 2006 and authorized to be destroyed or discarded in accordance with subsection A, are destroyed or discarded in a timely mannerin accordance with the provisions of this chapter; provided, however, such records that contain identifying information as defined in clauses (iii) through (ix), or clause (xii) of subsection C of § 18.2-186.3, shall be destroyed within six months of the expiration of the records retention period. *** (iii) social security number (iv) driver's license number (v) bank account numbers (vi) credit or debit card numbers (vii) PIN numbers (viii) electronic identification codes (ix) automated or electronic signatures (xii) passwords
What can my agency do now? • Review current document retention schedules and practices • Watch for formal advice from the OAG • Become familiar with what you have electronically, where it is stored, in what formats, and who is responsible for it (don’t forget personal devices) • Become familiar with your automatic backup and archiving functions • Begin to understand what would be necessary to perform a search or to retrieve archived documents
What can my agency do now? (con’t) • Begin to identify positions within your agency that are involved in data retention – this includes your document retention/records management officer • Encourage the segregation of personal or proprietary information before data is archived – to reduce the time spent segregating when responding to a request
Things to consider when preparing for e-discovery • Individual privacy of user • Prevention of data loss, whether inadvertent or intentional • Minimizing individual disruptions while searching and responding to discovery requests • Operational efficiencies to ensure timely preservation and processing of data • Consistency of process
Identity Management Support June 11, 2007
Identity Management • Definition: • Management of the identity life cycle of entities (subjects or objects) during which: • the identity is established • the identity is described • the identity is destroyed • Transformation Objectives: • User consolidation across multiple directories and e-mail system • Single domain Active Directory (COV.VIRGINIA.GOV) • Role-Based Access Control • Provisioning and de-provisioning • Self Service Password Management • Auditing and Reporting
Components Confidential
Active Directory • Primary Identity Repository • Authentication and Access Control • Single domain Active Directory – COV.VIRGINIA.GOV • User consolidation from Agency directories and e-mail system
ADAM (Active Directory Application Mode) Confidential
MIIS (Microsoft Identity Integration Server) Confidential
Quest Management Tools Confidential
P-Synch Confidential
Pegasus / Dogwood Confidential
Identity Management Transformation Roadmap Confidential
Enabling Identity Management • Central Identity Repository • Identity Synchronization • Self-Service • Authorization • Access • Passwords • Profile • Workflow • Centralized User Management • Delegated Administration • Automated Provisioning and De-Provisioning • Single Sign On • Consolidated Auditing
Enabling Identity Management • Central Identity Repository • Consolidation of user identities into one centralized repository • Integrate other systems authorization and authentication of users • External and internal web apps leverage primary identity store • Internal enterprise apps leverage primary identity store
Enabling Identity Management • Identity Synchronization • Automatic propagation of changes to other managed systems (Synchronization) • Collects identity data from other systems • Enables provisioning across wide range of systems and applications
Enabling Identity Management • Self Service • Password Resets • Profile Updates • Account and Access request
Enabling Identity Management • Centralized User Management • Role-Based Access Control • Rule-Based Access Control • Centralized provisioning and de-provisioning • Password Management • Uniform Password Policy • Password Initialization • Spans multiple systems
Enabling Identity Management • Delegated Administration • Non-technical users perform granular administration
Enabling Identity Management • Resource Provisioning • Automated provisioning and de-provisioning • Workflow automates approval process
Enabling Identity Management • Single Sign-On (SSO) • Reduced Sign On • Authenticate once to gain access to many systems • A single identity source is used for authentication • Reduced Credentials • User credentials gain access to multiple systems (each requiring sign on) • Password is synchronized between multiple systems
Enabling Identity Management • Identity Auditing and Reporting • Automatic ticket generation for follow-up and reporting • Automatic E-Mail for interaction with users, administrators, and authorizers • Real-time auditing of all AD changes
Security Operations Center tools Linda Smith Manager Transformation Security Services July 11, 2007
Table of Contents Confidential
Blue Coat Confidential
Blue Coat default deny policy Confidential Confidential
Blue Coat configuration Confidential
Blue Coat Reporter Confidential
Internet Security Systems Confidential
ID Management Confidential
Antivirus Management Confidential
Firewall / VPN Confidential
Firewall / VPN Confidential
Commonwealth Information Security Council Peggy Ward, VITA 47
Encryption Committee Jesse Crim (VCU) John Palese (DSS) Michael McDaniel (VRS) Tripp Simms (VITA/NG) Steve Werby (DOC) Craig Goeller (DMAS) NEW MEMBER!
Making Security an Executive Management Priority Committee Members Shirley Payne, Chair, University of Virginia Joe Hubbard, Virginia Lottery Beth Nelson, State Board of Elections Judy Napier, Office of the Governor John Karabaic, CISSP, Dept. Medical Assistance Services
Deliverables • Plan and develop Executive Security Awareness events, either stand-alone or as riders on other planned executive-level events. • Present effective Executive Security Awareness practices from agencies as models other agencies might follow.