Data Protection Practices 2008 NSAA IT Conference Nathan Abbott, TN Joe Moore, AZ Doug Peterson, NV.

Slides:



Advertisements
Similar presentations
Computer and Mobile Device Equipment Security Brief May 29, 2008 Presented by: Kevin G. Sutton, Chief, Information Technology Unit.
Advertisements

INADEQUATE SECURITY POLICIES Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA standards.
Meganet Corporation VME Office Meganet Corporation Meganet Corporation is a leading worldwide provider of data security to Governments, Military,
Encryption – First line of defense Plamen Martinov Director of Systems and Security.
BUS VIDEO RECORDINGS COLLECTION – PROCESSING - REDACTION - SHARING WHAT IS RIGHT FOR YOUR DISTRICT?
Personal Data Protection and Security Measures Justin Law IT Services - Information Security Team 25 & 27 November 2013.
Data Storage and Security Best Practices for storing and securing your data The goal of data storage is to ensure that your research data are in a safe.
Securing. Agenda  Hard Drive Encryption  User Account Permissions  Root Level Access  Firewall Protection  Malware Protection.
Data Security for Healthcare Facilities Debbie Abbott Health Information Consultant Resolutions (Int) Pty Ltd.
Information Systems Audit Program. Benefit Audit programs are necessary to perform an effective and efficient audit. Audit programs are essentially checklists.
Security Controls – What Works
Information Security Policies and Standards
5-9/12/2005 CPE How to format your computer and re-install Windows XP.
Personal Data Protection and Security Measures Justin Law IT Services - Information Security Team 18, 20 & 25 March 2015.
Data Encryption Overview South Seas Corporation Jared Owensby.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Hands-On Microsoft Windows Server 2003 Administration Chapter 6 Managing Printers, Publishing, Auditing, and Desk Resources.
Secure Your Future Now ….. Logical Access Control and Data Security Brought to you by Support & Maintenance by DCS Global Info.
COMPUTER BACKUP A disaster will happen to you one day…an accidentally deleted file, a new program that caused problems or a virus that wreaked havoc, wiping.
STANFORD UNIVERSITY INFORMATION TECHNOLOGY SERVICES Windows Encryption File System (EFS) Tech Briefing July 18 th 2008
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 12: Managing and Implementing Backups and Disaster Recovery.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 14: Problem Recovery.
SECURITY: Personal Health Information Protection Act, 2004 this 5 min. course covers: changing landscape of electronic health records security threats.
New Data Regulation Law 201 CMR TJX Video.
Obtaining, Storing and Using Confidential Data October 2, 2014 Georgia Department of Audits and Accounts.
CYBER FORENSICS PRESENTER: JACO VENTER. CYBER FORENSICS - AGENDA Dealing with electronic evidence – Non or Cyber Experts Forensic Imaging / Forensic Application.
Security Awareness Norfolk State University Policies.
1 Objectives Windows Firewalls with Advanced Security Bit-Lock Update and maintain your clients using Windows Server Update Service Microsoft Baseline.
Information Security Technological Security Implementation and Privacy Protection.
A+ Guide to Managing and Maintaining Your PC Fifth Edition Chapter 15 Installing and Using Windows XP Professional.
Chapter 7 Microsoft Windows XP. Windows XP Versions XP Home XP Home XP Professional XP Professional XP Professional 64-Bit XP Professional 64-Bit XP Media.
Microsoft ® Official Course Module 8 Securing Windows 8 Desktops.
Networks and Hackers Copyright © Texas Education Agency, All rights reserved. 1.
Hands-On Microsoft Windows Server 2008
15 Maintaining a Web Site Section 15.1 Identify Webmastering tasks Identify Web server maintenance techniques Describe the importance of backups Section.
Week #7 Objectives: Secure Windows 7 Desktop
Gorman, Stubbs, & CEP Inc. 1 Introduction to Operating Systems Lesson 12 Windows 2000 Server.
Microsoft Active Directory(AD) A presentation by Robert, Jasmine, Val and Scott IMT546 December 11, 2004.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 12: Managing and Implementing Backups and Disaster Recovery.
Best Practices for Protecting Data. Section Overview Mobile Computing Devices Technical Procedures Data Access and Permissions Verbal Communication Paper.
Health Insurance Portability and Accountability Act of 1996 (HIPAA) Proposed Rule: Security and Electronic Signature Standards.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
 INADEQUATE SECURITY POLICIES ›Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA.
Chapter 13 Users, Groups Profiles and Policies. Learning Objectives Understand Windows XP Professional user accounts Understand the different types of.
“TK8 Safe” – Easy-to-use, secure password manager Download a free trial copy: Product Info Highlights TK8 Safe is a perfect password manager.
SPH Information Security Update September 10, 2010.
1 Objectives Windows Firewalls with Advanced Security Bit-Lock Update and maintain your clients using Windows Server Update Service Microsoft Baseline.
Lesson 12: Using the Recycle Bin deleting files or folders what the Recycle Bin is restoring files from the Recycle Bin emptying the Recycle Bin identifying.
Incident Security & Confidentiality Integrity Availability.
MCDST : Supporting Users and Troubleshooting a Microsoft Windows XP Operating System Chapter 11: Managing Access to File System Resources.
Cyber Security Awareness Month Protecting Your Laptop’s Data Off-Campus Safe Computing Part 1.
Managing Applications, Services, Folders, and Libraries Lesson 4.
IT1001 – Personal Computer Hardware & system Operations Week7- Introduction to backup & restore tools Introduction to user account with access rights.
Understand Encryption LESSON 2.5_A Security Fundamentals.
Chapter 3 Pre-Incident Preparation Spring Incident Response & Computer Forensics.
Information Management and the Departing Employee.
Computer Security Sample security policy Dr Alexei Vernitski.
By: Matt Winkeler.  PCI – Payment Card Industry  DSS – Data Security Standard  PAN – Primary Account Number.
SY0-401 COMPTIA Security+ Certification Exam Vcepracticetest.com.
Windows Vista Configuration MCTS : NTFS Security Features and File Sharing.
CompTIA Security+ Certification Exam SY
Cloud Storage Service with Proven Military Grade Security
Introduction to Operating Systems
THE STEPS TO MANAGE THE GRID
Red Flags Rule An Introduction County College of Morris
Introduction to the PACS Security
Presentation transcript:

Data Protection Practices 2008 NSAA IT Conference Nathan Abbott, TN Joe Moore, AZ Doug Peterson, NV

Agenda Introduction Why? Our recent experiences What? Technology solutions How else? Questions

Introduction Format for presentation Individual introductions

Why has data protection become more important now?

Nevada

Why… Contractor with DMV: –Lost USB Flash drive –Contained names of 109 individuals University of Nevada, Reno professor lost a flash drive that contained the names and Social Security numbers of 16,000 incoming freshmen from 2001 to 2007current and former students

Why… DMV Audit –Prior to audit--Truck drives through front of DMV building and steals computer. Contained personal information on 8,700 Nevada residents. –Prior to audit--Planned to encrypt files and not store on computers –Audit found information on desktops, laptops, zip drives, USB drives. –Audit found process of removing personal information from computers didn’t always work as planned. Over 300 files, each with a person’s name, address, and SS#.

Arizona

Why… Arizona #1 in Identity Theft Newspaper publishes “public” information Audit responsibilities require sensitive data Agency requests for agreements –Encroachment on statutory authority Public relations nightmare

Tennessee

Why… Portable Media –Auditor was in car accident and lost their thumbdrive Nashville Davidson County Election Commission Office –The office was broken into

Why…

Nashville Davidson County Election Office Office was broken into on December 24, 2007 Break-in was not noticed until December 27, 2007 Two Laptops were some of the items that were missing

Why… It was standard practice for the office to tape to the machine user name and passwords. The laptops were using an access database that contained all register voters personal information including their SSN.

Why… The office was preparing for the primary election and was in the process of removing the SSN’s from the Access database. The street value of the stolen laptops was probably $600 total, but the incident is costing the city millions in Identity Theft Protection.

What solutions are we using?

Tennessee

Where Did We Start? 1.Researched available options 2.Evaluated software 3.Determined best option

TRUECRYPT VS ENTRUST TRUECRYPT –Partial disk encryption –Passwords do not sync –No vendor support –USB encryption –Encryption time minutes –Cost FREE ENTRUST –Full disk encryption –Passwords sync with operating system –Vendor Support – number –Removable media encryption –Encryption time 4-8 hours –Cost $130 per licence

Truecrypt Concerns File Restoration Key Management Administrative Support Removable Media Support Partial Disk Encryption

Why Did We Choose Truecrypt Strategic Plan –Our purpose is to serve the people of Tennessee by Enhancing effective public policy decisions at all levels of government TCA Release of personal consumer information –…Unauthorized acquisition of unencrypted computerized data…

Truecrypt Harddrive Setup

Truecrypt USB Setup

Arizona

What? Statutes Drive Crypt Plus Pack (DCCP) Ironkey VPN and Tokens Winzip

Statutes Provide broad access to information –Authorized to review confidential records without limitation –Agencies required to provide records Working papers and audit files are not public information Audit exclusions for other Acts, such as HIPPA, FERPA

DCPP Whole disk encryption (partition based) Boot protection Pre-Boot authentication Sector level protection Administrator / user specific rights Transparent to users Minimal administration and user training

DCPP

Ironkey Always-on military grade data encryption No software or drivers to install Easy to deploy and use Ability to create and manage enforceable policies Unique serial numbers

Ironkey

Remote Access via VPN and Tokens

WinZip

Nevada

What Technology We Use Truecrypt EFS (windows built in encryption) Lexar USB drives with encryption software Whole disk encryption on Dell laptops using Wave Embassy Security Center software and hard drive-based encryption

EFS Advantages: –Free –Easy to implement –256-bit AES –Easy to backup to network drive (registry tweak needed to decrypt data as it is copied to network drive) –Set and forget...sort of

EFS Disadvantages: –No additional password –Folder based. Auditors can save in unencrypted folders –256-bit AES not used in Pre-XP SP1 –Certificate expired and some auditors could not get access to data for a day

Windows Encryption File System (EFS)

Lexar Secure II Advantages: Free Known encryption (AES 256) Disadvantages: Not easy for auditors to remember setup Uses Vaults—auditors use unencrypted area

Secure II for USB Drives

Wave Embassy Whole Disk Encryption (hardware based on Dell Latitude, HP, Lenovo) Wave Embassy suite is the software front end to where the real work is done—hardware-based encryption Used in conjunction with TPM chip

Wave Embassy Advantages: 128-bit AES (not as strong as 256-bit key, but still strong) Multiple passwords (pre-boot authentication) Works with biometrics

Wave Embassy Disadvantages Complex to set up (including BIOS settings) Multiple passwords Need to have a Seagate Momentus FDE.2 HDD which runs at 5400 rpm

Wave Embassy Security Center

Wave Embassy

How else are we addressing it?

Nevada

Statutes and Policies Statutes –NRS (“All working papers from an audit are confidential…”) Policies –Reinforce and support statutes –Detailed Extreme care to ensure confidentialy of information “gained” during audits (more than what is in workpapers) Careful with discussions

How…Guidance to Staff Training One on one with each person –Lexar –Wave Embassy Periodic staff training –Reinforce statutes –What is confidential, what is not –Examples shown Management meetings allow supervisors to reinforce policies and importance

Tennessee

How…Our Policies Backup Volume Header –Allows users to restore encryption to original installation. Create an Admin Password –This is to be used in the event someone forgets their password.

How…Our Policies (Cont.) Created standard passwords for users –This is used to ensure password complexity Created standard login procedures –This is used to help the auditors to be consistent when they login

How…Our Policies (Cont.) Removable Media –This policy is to make it clear that personal thumbdrives are not be used to store confidential data Storage of Files –This policy is to make it clear where you needed to store confidential data

How…Our Policies (Cont.) Enforcement –Once a year have security awareness training –Periodic s to staff reminding them of the encryption policies –Unannounced Random Sample

How…Problems Auditors were confused about which password to use to log-on to their workstation Thumbdrives Auditors do not like using passwords for thumbdrives

Arizona

How… Policy Communicate to auditee/entity common information Statutory authority Security of confidential records Auditor General policies –Internet Use and acceptable use agreements –IT policy with address data security –Acknowledgement of state policy

How… Determine whether information is confidential or public (may be more restrictive than public records law) Confidential –Personal information Info which can identify a person –Sensitive information Info which may be harmful to the state and its citizens Public information

How… Then, ensure that appropriate security measures are applied based on classification of data Confidential –Encryption and/or restrictive physical and/or logical access rights Store on Office network or encrypted flash drives Return original data or store securely –Never copy confidential data to home computer

How… –If remote, use VPN and use remote sessions –Limit access rights on network drives –Use restricted views and coding techniques for data stored in databases –Determine whether or how much confidential information must be included in audit documentation

How… Use encryption when storing on external storage media (HDs, CDs) –Use secure passwords/phrases »Minimum of 8 characters »Upper/lower case »Special characters Store passwords/phrases securely Public Information No special security precautions Adhere to professional standards and Office policy Can be stored in shared directories

How? Document classification assessment and subsequent actions taken Archiving and Disposition –Keep only as long as necessary or required –Ensure confidential data is protected when archived –Let others involved know about the confidential nature of the data stored

Questions Nathan Abbott; Joe Moore; Doug Peterson;