500 likes | 614 Views
Encryption Information Forum. Theresa A. Masse, State Chief Information Security Officer Department of Administrative Services Enterprise Security Office. Agenda. Encryption overview Agency Panel Oregon Department of Transportation Oregon Employment Department Oregon Lottery
E N D
Encryption Information Forum Theresa A. Masse, State Chief Information Security Officer Department of Administrative ServicesEnterprise Security Office
Agenda • Encryption overview • Agency Panel • Oregon Department of Transportation • Oregon Employment Department • Oregon Lottery • Statewide Contracts • Q&A
Encryption Overview Richard Woodford, Security Analyst Enterprise Security Office Department of Administrative Services
What is encryption? • “In cryptography, encryption is the process of transforming information (referred to as plaintext) using an algorithm (called a cipher) to make it unreadable to anyone except those possessing special knowledge, usually referred to as a key.” -Wikipedia (2008)
Need for Encryption … • Keep confidential information safe • Prevent exposure of information while in transit across an unsecure medium • Prevent exposure of information when a storage device is lost or stolen • Oregon Identity Theft Protection Act (Senate Bill 583) “safe harbor” • Due care
Oregon Consumer Identity TheftProtection Act • Senate Bill 583 (2007 Legislative session) • “ … one or more of the following data elements, when the data elements are not rendered unusable through encryption” • First name, last name • Social Security number, drivers license number, passport, financial account number, credit card number
“Safe Harbor” • What’s good enough? • VJKU KU GPETARVGF • Cipher – alphabetically shifted • Key – +2 • SB 583 does not specify strength • Reasonable care • “Strong encryption” – 128-bit • Common minimum standard is FIPS 140-2 (see http://csrc.nist.gov)
Other Drivers • All applicable regulations should be examined for requirements • HIPAA • Payment Card Industry (PCI) requirements • Sarbanes-Oxley • Statewide policies • Information Asset Classification • Transporting Information Assets • Controlling Portable and Removable Devices • Department policies
Other Drivers • Other considerations • Mitigation costs • Public trust
When to Use Encryption • In any case where data could be at risk from theft or eavesdropping • Wireless networks • Transmitting data over public network (e.g. the Internet) • Web pages (SSL) • E-mail • Data at Rest • Portable devices • Laptops • Thumb drives
When to Use Encryption • Any device at risk of theft or exposure • Extra-sensitive data
Data at Rest • Hardware based • Built in to the hardware device • Advantages • Automatically encrypts data • Fast • Disadvantages • Proprietary • Lack of central management
Data at Rest • Software based • Advantages • Lower cost • Does not require specific hardware • Disadvantages • Need to install, activate and manage it, make sure it’s being used
Software Solutions • File based (PGP, Winzip) • Done on a file-by-file basis (only protects file) • Not automatic • Dependent on end-user • Volume based (TrueCrypt) • An encrypted “virtual drive” is created • All files written are encrypted automatically • Does not necessarily encrypt all files – for example, Windows system files, security files, temp files …
Software Solutions • Disk based (whole-disk encryption) • Encrypts entire drive (most secure) • Automatic; transparent to the user • But … if you lock yourself out, you’re in trouble • Need administrative control
Key Management • Elephant in the room – the only other requirement set forth by the Department of Defense policy • “Mechanism to recover data if the primary encryption system fails” • Need for the organization to keep control of the keys rather than individuals • Lost passwords • Lost individuals • Access control (control of data, investigations)
Bad Practices • Data encrypted with a single-key system is a security risk to the organization • Added note… • “If I accidently leave my computer unlocked and someone gets it, I don’t have to worry because the hard disk is encrypted…” • Risk of sleeping • Full disk encryption vulnerability • Turn systems off • Bad practices trump good security
ESO Recommendations • Develop agency-wide strategy and approach to encryption • Centralize key management and recovery processes • Do some research and planning • When justifying cost, consider cost of data disclosures, lost data and reputation • Look for group purchase opportunities
Some Good Products • http://www.guardianedge.com/shared/sb_overview.pdf • http://www.pgp.com/products/wholediskencryption/index.html • http://www.checkpoint.com/products/datasecurity/protector/index.html • http://www.safeboot.com/
Agency Panel • Cindy Slye, Oregon Department of Transportation • Marty Liddell, Oregon Employment Department • John McKean, Oregon Lottery
Agency Panel Cindy Slye, Project Manager Oregon Department of Transportation
Business Drivers • New DAS EIS Policies: • Information Security • Employee Security • Controlling Portable and Removable Storage Devices • Transporting Confidential Information
Business Drivers • Compliance with: • Regulated mandates – Federal Motor Carrier Safety Administration (FMCSA) • Senate Bill 583 • ODOT policies and guidelines
Project Objective • Find the best data encryption product that can protect sensitive data by: • Securing information on mobile devices • Securing information on removable devices • Providing the best comprehensive solution to cover all areas • Simplifying deployment, maintenance and data backup
How Does It Align With Our Goals? ODOT IT StrategicPlan ODOTSecurityFabricInitiative DAS Policy Controlling Portable and Removable Storage Devices Federal Motor Carrier Safety Administration Senate Bill 583 Protect, Manage Protect, Manage Protect, Manage
Consequences • What are the consequences of compromising sensitive information? • Negative publicity • Loss of customer confidence • Damaged reputation • Financial loss
Safe Harbor Provision • Data encryption is the most effective solution for safeguarding sensitive electronic data • Data encryption is identified as an acceptable “Safe Harbor” approach in providing privacy assurances • If the information is properly encrypted: • No further duty • It may be assumed that no privacy breach has occurred • Risk mitigation approach that limits agency liability • Enhances trust in the event of a security breach
Why Guardian Edge? • Guardian Edge clearly met ODOT business requirements: • Strong Active Directory Integration • Ease of Use • Robust Management Console (MMC) • Facilitates Compliance with DAS and ODOT Security Policies
Lessons Learned • Things to consider: • What value (strategic and operational) should this project create? • Organize the work and follow a process • Understand the priority given other work • Plan for risk – how to avoid and prepare for it • What will motivate people to adopt this change? • Set expectations • Communication • Training
Agency Panel Marty Liddell, Infrastructure Architect Oregon Employment Department
What made OED encrypt • Response to Senate Bill 583 • Significant amount of personally identifiable information including ssn, name, address, dob • Information collected is required to provide services • Many staff use mobile computing devices including laptops to collect information • ITS is committed to protecting the information assets of the agency
Requirements • Ability to encrypt full hard drive • Ease of internal support • Key management • Recoverable Keys when agents are in field • Ability to easily integrate into existing architecture • Ease of use by end user
Process of choosing product • Researched products • Guardian Edge • Pointsec • Demo products • Pilot product
Decision points • Integration into Active Directory • Single sign-on Capability • Familiarity with administration toolset • Key management • Security questions • One-time password reset • Recoverable hard drive in case of investigation
Deployment • Created security groups in Active Directory • Automatically installed software client on PC when customer logged in • Monitor progress • Don’t forget helpdesk and end user training!
Lessons learned • Do NOT double encrypt a computer • Very bad (total loss of data) • Angry user • Provide good documentation to the end user • Define a process for shared computer resources
Moving forward • GE Removable Storage Encryption • GE Device Control • Remote file server encryption • Desktop encryption • Email encryption
Agency Panel John McKean, Sr. Systems Security Admin. Oregon Lottery
PGP Universal Server • Key Management • Centralized Policy Enforcement • Whole Disk Encryption (deployed) • Desktop Email Encryption (future) • Gateway Email (Future) • Transparent to user • Encrypts automatically at the gateway • Requires recipient to have similar technology
The “USB Problem” • Easily lost or stolen • Lottery USB’s have onboard encryption • Non-Lottery USB’s not allowed! • TriGeo SIM (Security Information Manager) • Logs all USB access • Enforces Lottery USB Policy
Electronic Rights Management Defined • Secures content with strong encryption • Protection cannot be removed • Controls and audits data access: • Users work normally using their existing applications • Defines authorized uses through workflows, directory groups, and user
Where ERM Fits In Usage Enterprise Rights Management Liquid Machines, Microsoft RMS, Others Content Filtering and Monitoring Vericept, Vontu, Orchestria, Verdasys Granularity ofControls PKI Products Entrust, PGP, Voltage Enterprise Content Management DCTM, LiveLink, SharePoint Full Disk Encryption EFS, Pointsec Secure Transport/DeliverySSL, Postx, PGP Access Network Security Tools Firewalls, VPNs, ACLs Data at Rest Data in Motion Data in Use
Considerations when selecting an ERM User Experience • User adoption is the most important factor • Expect resistance if difficult to use • Protection goals must be enforced automatically • Users must be aware protection is in effect • Users want to work normally
How ERM Works ECM System LOB App Fileserver ERM Server Connection required for offline renewal 1 Content encrypted and usage rights applied Read, Edit, Print, & Offline enabled with expiration Read Only Read & Print 3 2 Content protected at rest or in transit Content protected in use
Statewide Contracts • Price Agreement #2257 – ASAP Software Express • Mandatory for state agency purchase of shrink-wrapped (out of the box) desktop software • SPO Contact: Chris Mahoney, (503) 378-2998, chris.mahoney@state.or.us • ASAP Contact: Brad Hickey, (888) 883-1025, bhickey@asap.com
For further information … • Theresa Masse, DAS Enterprise Security Office(503) 378-4896, theresa.a.masse@state.or.us • Richard Woodford, DAS Enterprise Security Office(503) 378-4518, richard.woodford@state.or.us • Cindy Slye, Department of Transportation(503) 986-3234, cindy.slye@state.or.us • Marty Liddell, Employment Department(503) 947-1627, marty.m.liddell@state.or.us • John McKean, Oregon Lottery(503) , john.mckean@state.or.us
Next Forum … Information Security Plans Tools and Techniques Panel Presentation June 23, 2008