CAT 02/05 Copyright © 2002-2005, CiRBA, Inc. All Rights Reserved. Security and Compliance: Looking Beyond the File Presented By: Andrew.

Slides:



Advertisements
Similar presentations
Conducting your own Data Life Cycle Audit
Advertisements

© Copyright 2007 Exempler Telecom Test Automation System Exempler - We pride ourselves with providing lightweight robust engineering solutions.
VCS 5.0 for VMware ESX.
Slide 1 Configuration Management. Slide 2 Goal – Primary Objective To provide a logical model of the IT infrastructure by identifying,controlling, maintaining.
IT Service Continuity Management
Info to Enterprise Migration Implementation Case Study: SBC Corporation Presented to the Crystal Decisions Regional Users Group for the Bay Area on October.
1 Senn, Information Technology, 3 rd Edition © 2004 Pearson Prentice Hall James A. Senns Information Technology, 3 rd Edition Chapter 7 Enterprise Databases.
CRM Technology.
Chapter 14 Intranets & Extranets. Awad –Electronic Commerce 1/e © 2002 Prentice Hall 2 OBJECTIVES Introduction Technical Infrastructure Planning an Intranet.
TACTICAL/OPERATIONAL PLANNING
1 Capability Set - Detail. 2 Common Content Problems Content Mayhem –File management and storage confusion Content Multiplication –Editing déjà vu - same.
The 4 T’s of Test Automation:
1 Copyright © 2010, Elsevier Inc. All rights Reserved Fig 2.1 Chapter 2.
1 Copyright © 2013 Elsevier Inc. All rights reserved. Chapter 38.
1 Chapter 40 - Physiology and Pathophysiology of Diuretic Action Copyright © 2013 Elsevier Inc. All rights reserved.
September, 2005What IHE Delivers 1 Joe Auriemma Siemens Medical Solutions, Health Services Senior Director, Integration Engineering Siemens Medical Solutions.
Business Transaction Management Software for Application Coordination 1 Business Processes and Coordination.
Pennsylvania Banner Users Group 2008 Fall Conference Campus Identity Management in a Banner World.
18 Copyright © 2005, Oracle. All rights reserved. Distributing Modular Applications: Introduction to Web Services.
Data Architecture at CIA Dave Roberts Chief Technical Officer Application Services, CIO CIA
0 - 0.
MULT. INTEGERS 1. IF THE SIGNS ARE THE SAME THE ANSWER IS POSITIVE 2. IF THE SIGNS ARE DIFFERENT THE ANSWER IS NEGATIVE.
Addition Facts
1 9 Moving to Design Lecture Analysis Objectives to Design Objectives Figure 9-2.
Making the System Operational
1© Copyright 2011 EMC Corporation. All rights reserved. The Future of the Advance Soc 3rd Annual Privacy, Access and Security Congress, Ottawa, 2012 Mike.
INFORMATION TECHNOLOGY, THE INTERNET, AND YOU
IT Asset Management Status Update 02/15/ Agenda What is Asset Management and What It Is Not Scope of Asset Management Status of Key Efforts Associated.
©2010 Check Point Software Technologies Ltd. | [Restricted] ONLY for designated groups and individuals Visions for 2010 Anna Russell & Andy Clark.
IBM Corporate Environmental Affairs and Product Safety
1 Dr. Ashraf El-Farghly SECC. 2 Level 3 focus on the organization - Best practices are gathered across the organization. - Processes are tailored depending.
Copyright 2007 EcoSys Management LLC All Rights Reserved. Confidential and Proprietary Information. 1 Integrating Financial Management with Project Management.
Virtualization & Disaster Recovery
ACT User Meeting June Your entitlements window Entitlements, roles and v1 security overview Problems with v1 security Tasks, jobs and v2 security.
Chapter 1: Introduction to Scaling Networks
Copyright © 2012 AirWatch, LLC. All rights reserved. Proprietary & Confidential. Mobile Content Strategies and Deployment Best Practices.
Abstract To provide efficient and effective access to enterprise information that meets stakeholder needs and supports mission success, NASA is implementing.
Professional Services Overview
© Ipswitch, Inc. Introducing WhatsConnected v1.5 June 16 th, 2009.
Developing a Successful Integrated Audit Approach September 14, 2010.
Introduction to Databases
User Query Control An Enhancement For AS/400 Query On The IBM iSeries from  Copyright I/O International, 2005 Skip Intro.
2  Industry trends and challenges  Windows Server 2012: Modern workstyle, enabled  Access from virtually anywhere, any device  Full Windows experience.
Windows Server Deployment and Management With System Center.
CA's Management Database (MDB): The EITM Foundation -WO108SN.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialBCMSN BCMSN Module 1 Lesson 1 Network Requirements.
Addition 1’s to 20.
Copyright 2001 Advanced Strategies, Inc. 1 Data Bridging An Overview Prepared for DIGIT By Advanced Strategies, Inc.
Week 1.
CTS Strategic Roadmap Walkthrough, v1.2 Dan Mercer.
Chapter 14 The User View of Operating Systems
© Prentice Hall CHAPTER 11 Facilitating User Computing.
Oracle User Productivity Kit Professional Ensuring Success with Oracle Apps
© 2004 Visible Systems Corporation. All rights reserved. 1 (800) 6VISIBLE Holistic View of the Enterprise Business Development Operations.
Veritas Configuration Manager José María Fernández
Opalis Product Overview NameTitle Microsoft Corporation.
Event Mgmt Service Desk Asset/CMDB Configuration Virtual Security Storage Server Network Triage and diagnose Integrate service desks with data center.
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
Cloud Computing in Large Scale Projects George Bourmas Sales Consulting Manager Database & Options.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
HIPAA COMPLIANCE WITH DELL
ACME ACME Solutions Inc. You Focus on Your Business & We Focus on Your IT.
NovaTech You Focus on Your Business & We Focus on Your IT Managed Services.
Ali Pabrai, CISSP, CSCS ecfirst, chairman & ceo Preparing for a HIPAA Security Audit.
Information Security Framework Regulatory Compliance and Reporting Auditing and Validation Metrics Definition and Collection Reporting (management, regulatory,
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
System Center 2012 Configuration Manager Service Pack 1 Overview.
Federated IdM Across Heterogeneous Clouding Environment
Leverage What’s Out There
Presentation transcript:

CAT 02/05 Copyright © , CiRBA, Inc. All Rights Reserved. Security and Compliance: Looking Beyond the File Presented By: Andrew Hillier CTO, CiRBA Inc.

Slide 2 Copyright © , CiRBA Inc. All Rights Reserved. Abstract Many organizations employ strategies that focus on file-level tracking to address specific system security and regulatory compliance issues. At the same time, many organizations are undertaking initiatives to enhance IT service management through detailed tracking of system and application configurations. Because security and compliance are affected by many of these same areas of configuration, a convergence in the IT infrastructure to address these areas is beneficial, and perhaps even inevitable…

Slide 3 Copyright © , CiRBA Inc. All Rights Reserved. Front End Horizontal Scaling Back End Vertical Scaling Information Convergence The Problem: A gap exists between datacenter management disciplines and the ability to provide the information to fulfill on these mandates. IT Data Center Operations Mainframe Proprietary UNIX LINUX WINDOWS Asset & Inventory Management Configuration Management Change Management Release Management Capacity Management Problem Management Business Continuity Compliance Management Security

Slide 4 Copyright © , CiRBA Inc. All Rights Reserved. Front End Horizontal Scaling Back End Vertical Scaling Information Convergence The Reason: In the past, these disciplines were considered in isolation, and solutions were implemented that addressed individual areas. IT Data Center Operations Mainframe Proprietary UNIX LINUX WINDOWS Asset & Inventory Management Configuration Management Change Management Release Management Capacity Management Problem Management Business Continuity Compliance Management Security

Slide 5 Copyright © , CiRBA Inc. All Rights Reserved. Front End Horizontal Scaling Back End Vertical Scaling Information Convergence IT Data Center Operations Mainframe Proprietary UNIX LINUX WINDOWS Asset & Inventory Management Configuration Management Change Management Release Management Capacity Management Problem Management Business Continuity Compliance Management Security Asset Discovery File Scanning Resource Tracking Software Discovery Manual Inspection Homegrown Scripts The Result: A fragmented solution space and a proliferation of technologies that is not sustainable across all platforms and process areas.

Slide 6 Copyright © , CiRBA Inc. All Rights Reserved. Front End Horizontal Scaling Back End Vertical Scaling Asset & Inventory Management Configuration Management Change Management Release Management Capacity Management Problem Management Business Continuity Compliance Management Security Information Convergence The Solution - One common approach for the entire enterprise Tracking what systems and applications you have, how they are configured, how they are being used, and how they are being changed IT Data Center Operations Mainframe Proprietary UNIX LINUX WINDOWS

Slide 7 Copyright © , CiRBA Inc. All Rights Reserved. Information Requirements by Discipline Configuration Mgmt Asset Mgmt Security Mgmt Compliance Mgmt Hardware Config VM Partitioning OS Configuration Patch Levels File Attributes SW Inventory Application Config Middleware Config Database Config Environment Config

Slide 8 Copyright © , CiRBA Inc. All Rights Reserved. Implications for Security Management File and network-level security solutions are relatively common but only focus on specific aspects of security With a consolidated approach that encompasses all areas of configuration this can be taken much further: Database account and access control changes Status of security patches Changes in network shares Hardware removal USB Drive use Etc. The result is a bear hug on all vital security aspects of IT infrastructure

Slide 9 Copyright © , CiRBA Inc. All Rights Reserved. Implications for Regulatory Compliance For Sarbanes-Oxley, a consolidated approach provides a comprehensive mechanism for assuring and demonstrating a commitment to integrity at all levels: Tracking of physical assets and shared resources Credential changes that may compromise systems Activity affecting information integrity or privacy

Slide 10 Copyright © , CiRBA Inc. All Rights Reserved. Configuration-Centric View of System Changes A configuration-centric view of change activity is typically geared toward change reconciliation and fault isolation

Slide 11 Copyright © , CiRBA Inc. All Rights Reserved. Security-Centric View of System Changes A security-based view of configuration change activity can leverage the same underlying information to identify potential vulnerabilities and assure compliance

Slide 12 Copyright © , CiRBA Inc. All Rights Reserved. Security-Centric View of System Changes By isolating the subset of configuration information that is truly security-related, one infrastructure can effectively service multiple IT management disciplines

Slide 13 Copyright © , CiRBA Inc. All Rights Reserved. Information Security - Database Configuration Detailed tracking of the configurations of databases reveals changes that have direct impact in security. Many SOX strategies focus mainly on file- level security and ignore this critical aspect of compliance

Slide 14 Copyright © , CiRBA Inc. All Rights Reserved. Information Security - Schema Changes Tracking and comparing schemas not only assures compliance between internal environments (such as UAT and Prod) but also uncovers changes that may affect application security

Slide 15 Copyright © , CiRBA Inc. All Rights Reserved. System Security - Credential Changes Tracking permissions granted to users is the first step is assuring compliance and information security, as proper maintenance of credentials is the primary defense against unauthorized access and tampering

Slide 16 Copyright © , CiRBA Inc. All Rights Reserved. User Security - Directory Service Changes Detailed scrutiny of directory services uncovers suspicious activity and provides and audit trail of noteworthy events. In this example an account is being locked out due to too many bad password attempts.

Slide 17 Copyright © , CiRBA Inc. All Rights Reserved. Physical Security - Hardware Changes Even at the hardware asset level specific changes have a direct security impact. In this example a USB drive has been removed from a server, potentially taking sensitive data with it.

Slide 18 Copyright © , CiRBA Inc. All Rights Reserved. Information Security - Tracking Key Assets Protecting the integrity of data is somewhat futile if you dont even know all the places where data is stored. Effective software asset tracking is critical to information security.

Slide 19 Copyright © , CiRBA Inc. All Rights Reserved. Looking Beyond the File: The Business Value of Convergence Compelling business-level considerations Convergence = Cost Savings Benefits of business case that leverages multiple disciplines Consolidated approach addresses SOX while at the same time benefiting Operations, ITIL projects and other initiatives Allows service-oriented view of security By leveraging service models being developed in configuration management initiatives (e.g. CMDBs), security information can also be aligned with business services Provides a common language Common technology provides a common language for communication between Security, Compliance, Change Management, Problem Management and other key groups

Slide 20 Copyright © , CiRBA Inc. All Rights Reserved. You can observe a lot just by watching. Yogi Berra 322 King Street West. Suite 200 Toronto. ON. CANADA. M5V 1J2 t w. f e. Presented By: Andrew Hillier CTO, CIRBA Inc