The Information- Centric Security Lifecycle - Securosis

Transcription

The InformationCentric SecurityLifecycleRich MogullSecurosis, L.L.C.

MainframeKRInternet IInternet IIOWTJailENFortressZoneecurosis.com

But what about theinformation?ecurosis.com

sis.com

NetworkInformationUserApplicationHostecurosis.com

The InformationCentric SecurityLifecycleecurosis.com

CreateClassifyAssign RightsShareCMP (DLP)EncryptionLogical ControlsApplication SecurityStoreUseAccess ControlsEncryptionRights ManagementContent DiscoveryActivity Monitoringand EnforcementRights ManagementLogical ControlsApplication SecurityArchiveDestroyEncryptionAsset ManagementCrypto-ShreddingSecure DeletionContent Discoveryecurosis.com

ILM and SecurityCreateCreationand UseUseDestroyDispositionecurosis.com

Create Content is classified as it’s created throughcontent analysis or based on labeling ofdata elements. Rights are assigned, based on centralpolicies. Mandatory and discretionary policies.ecurosis.com

Create ssifyNone*None*Assign RightsLabel SecurityEnterprise DRMNote- Classification is expected to emerge fromDLP/CMPecurosis.com

Label sitiveecurosis.com

Content AnalysisPartial Document MatchingDatabase FingerprintingStatisticalExact File MatchingCategoriesConceptual (?:(? Visa 4\d{3}) (? Mastercard 5[1-5]\d{2}) (? Discover 6011) (? DinersClub (?:3[68]\d{2}) (?:30[0-5]\d)) (? AmericanExpress 3[47]\d{2}))([ -]?)(?(DinersClub)(?:\d{6}\1\d{4}) (?(AmericanExpress)(?:\d{6}\1\d{5}) (?:\d{4}\1\d{4}\1\d{4}))) Rulesecurosis.com

Store We use access controls, encryption, andrights management to protect data instorage. Content Discovery helps find unprotectedsensitive data that slipped through the gaps.ecurosis.com

Store ss ControlsDBMS Access ControlsAdministrator Separation ofDutiesFile System Access ControlsDocument ManagementSystem Access ControlsEncryptionField Level EncryptionApplication Level EncryptionFile/Media Encryption*Media EncryptionFile EncryptionDistributed EncryptionRights ManagementLabel/Row Level SecurityEnterprise DRMContent DiscoveryDatabase-Specific DiscoveryToolsDLP/CMF Content DiscoveryStorage/Data ClassificationToolsecurosis.com

AccessControlsEncryptionDRMecurosis.com

Encryption plication/DatabaseMediaecurosis.com

Remote ScanningContent Discoveryecurosis.com

Use Monitor and protect information duringuse. Includes business applications andproductivity applications. Heavy use of content-aware technologies.ecurosis.com

Use ty Monitoring andEnforcementDatabase Activity MonitoringApplication ActivityMonitoringEndpoint Activity MonitoringFile Activity MonitoringPortable Device ControlEndpoint DLPRights ManagementLabel SecurityEnterprise DRMLogical ControlsObject (Row) Level SecurityStructural ControlsApplication LogicApplication SecurityImplemented At Application Layerecurosis.com

Two Sides Of InformationCentric SecurityData CenterProductivityecurosis.com

CMPAdvanced ContentAnalysisReal-Time DRMCMP to ADMPBridgesManaged andUnmanaged SystemsCMPecurosis.com

ADMPAdaptive AuthenticationApplication NACActivity MonitoringAnti-ExploitationTransaction AuthenticationSession SecurityApplication Virtualizationecurosis.com

Cross-DomainInformation 56Customer ReportCustomer ReportCustomer retention grew13% YoY. Customer138-56-8375 held returnvalue while.Customer retention grew13% YoY. Customer138-56-8375 held returnvalue tFirstSSNasdfasdasdadsadsadsasdasd2007 2008 2009 2010ecurosis.com

Share Securely exchange information, inside andoutside of the enterprise. A mixture of content-aware technologiesand encryption for secure exchange.ecurosis.com

Share DLPDatabase Activity Monitoring Network/Endpoint CMP/DLPEncryptionNetwork EncryptionApplication Level Encryption*Only When Data Elements Not OtherwiseEncryptedLogical ControlsApplication Security(With DLP Feature)Email EncryptionFile EncryptionNetwork EncryptionObject (Row) Level SecurityStructural ControlsImplemented At Application Layerecurosis.com

Inter-OrganizationEncryption vs. DRMecurosis.com

Archive Protect information in archival storage. Encryption and asset managementecurosis.com

Archive cryptionField-Level EncryptionTape EncryptionStorage Encryption(Multiple Options)Asset ManagementAsset ManagementAsset Managementecurosis.com

Tape Encryption OptionsIn-lineDriveSoftwareecurosis.com

Destroy Ensure data is not recoverable at end of life Content discovery to ensure dangerousdata isn’t hiding where it shouldn’t be.ecurosis.com

Destroy ypto-ShreddingEnterprise Key ManagementEnterprise Key ManagementSecure DeletionDisk/Free Space WipingDisk/Free Space WipingPhysical DestructionPhysical DestructionPhysical DestructionContent DiscoveryDLP/CMF Content DiscoveryStorage/Data ClassificationDatabase-Specific DiscoveryToolsToolsEnterprise SearchE-Discoveryecurosis.com

CreateClassifyAssign RightsShareCMP (DLP)EncryptionLogical ControlsApplication SecurityStoreUseAccess ControlsEncryptionRights ManagementContent DiscoveryActivity Monitoringand EnforcementRights ManagementLogical ControlsApplication SecurityArchiveDestroyEncryptionAsset ManagementCrypto-ShreddingSecure DeletionContent Discoveryecurosis.com

Rich MogullSecurosis, : securosisSkype: rmogull

Database Activity Monitoring Application Activity Monitoring Endpoint Activity Monitoring File Activity Monitoring Portable Device Control . Database-Specific Discovery Tools DLP/CMF Content Discovery Storage/Data Classification Tools Enterprise Search E-Discovery y. ecurosis.com Create Destroy Store Share Archive Use