Locking Down the Data Center of Tomorrow By Kevin Beaver, CISSP Founder and principal consultant - Principle Logic, LLC 4430 Wade Green Rd., Suite 180.

Slides:



Advertisements
Similar presentations
INADEQUATE SECURITY POLICIES Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA standards.
Advertisements

HIPAA: FEDERAL REGULATIONS REGARDING PATIENT SECURITY.
CAMP Med Building a Health Information Infrastructure to Support HIPAA Rick Konopacki, MSBME HIPAA Security Coordinator University of Wisconsin-Madison.
 Cyber Ecosystem & Data Security Subhro Kar CSCE 824, Spring 2013 University of South Carolina, Columbia.
2 Issues of the information age Computer _______ and mistakes –Preventing computer related waste & mistakes Computer crime –Computer as tool to commit.
Security and Personnel
McGraw-Hill/Irwin ©2009 The McGraw-Hill Companies, All Rights Reserved CHAPTER 4 ETHICS AND INFORMATION SECURITY Business Driven Information Systems 2e.
Smart Grid - Cyber Security Small Rural Electric George Gamble Black & Veatch
Managing A Secure Infrastructure – Tales From the Trenches November 6, 2003.
The Islamic University of Gaza
Security Controls – What Works
Information Security Policies and Standards
Rethinking Security to Enable Business LJ Johnson Nike’s Global Information Security Officer August 16, 2005.
1 Enterprise Security Your Information Security and Privacy Responsibilities © 2008 Providence Health & Services This information may be replicated for.
World Class Security Experts © Copyright 2004 SkyView Partners LLC. All rights reserved. How IT is affected by Sarbanes-Oxley Act.
ISO 17799: Standard for Security Ellie Myler & George Broadbent, The Information Management Journal, Nov/Dec ‘06 Presented by Bhavana Reshaboina.
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. Security Policies and Implementation Issues.
IT Security Readings A summary of Management's Role in Information Security in a Cyber Economy and The Myth of Secure Computing.
CAMP Med Mapping HIPAA to the Middleware Layer Sandra Senti Biological Sciences Division University of Chicago C opyright Sandra Senti,
Enterprise Security. Mark Bruhn, Assoc. VP, Indiana University Jack Suess, VP of IT, UMBC.
Security Risk Management Marcus Murray, CISSP, MVP (Security) Senior Security Advisor, Truesec
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
NUAGA May 22,  IT Specialist, Utah Department of Technology Services (DTS)  Assigned to Department of Alcoholic Beverage Control  PCI Professional.
SEC835 Database and Web application security Information Security Architecture.
Information Security Training for Management Complying with the HIPAA Security Law.
Section Seven: Information Systems Security Note: All classified markings contained within this presentation are for training purposes only.
ISMMMO, Antalya April Internal Audit, Best Practices Özlem Aykaç, CIA,CCSA CAE Coca-Cola İçecek.
Lessons Learned in Smart Grid Cyber Security
Chapter 3 Internal Controls.
Copyright © 2006 CyberRAVE LLC. All rights reserved. 1 Virtual Private Network Service Grid A Fixed-to-Mobile Secure Communications Framework Managed Security.
Security Baseline. Definition A preliminary assessment of a newly implemented system Serves as a starting point to measure changes in configurations and.
WORKING EFFECTIVELY IN AN INFORMATION TECHNOLOGY ENVIRONMENT
Dell Connected Security Solutions Simplify & unify.
Keogh and Associates Copyright 2003 Sellers, Resellers, Integrators, Consultants What Are Their Roles?? Presenter Colin Keogh Keogh and Associates.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
Objectives Overview Identify the qualities of valuable information Describe various information systems used in an enterprise Identify the components of.
Chapter 12 by Lisa Reeves Bertin Securing Information in a Network.
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
Introduction to Security
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
Chapter 6 of the Executive Guide manual Technology.
ISO17799 Maturity. Confidentiality Confidentiality relates to the protection of sensitive data from unauthorized use and distribution. Examples include:
Unit 6b System Security Procedures and Standards Component 8 Installation and Maintenance of Health IT Systems This material was developed by Duke University,
7-1 Management Information Systems for the Information Age Copyright 2004 The McGraw-Hill Companies, Inc. All rights reserved Chapter 7 IT Infrastructures.
Top 10 Messaging Vulnerabilities and How You Can Protect Against Them Without Breaking the Bank Kevin Beaver, CISSP Founder and Principal Consultant Principle.
Hosted by Employee Monitoring Balancing Best Practices and Privacy by Kevin Beaver, CISSP founder and principal consultant Principle Logic, LLC
IT Strategy for Business © Oxford University Press 2008 All rights reserved Chapter 12 IT Security Strategies.
Ali Pabrai, CISSP, CSCS ecfirst, chairman & ceo Preparing for a HIPAA Security Audit.
Cyber Insecurity Under Attack Cyber Security Past, present and future Patricia Titus Chief Information Security Officer Unisys Corporation.
Last Minute Security Compliance - Tips for Those Just Starting 10 th National HIPAA Summit April 7, 2005 Chris Apgar, CISSP – President Apgar &
Features Governmental organization Critically important ICT objects Distributed infrastructure Three levels of confidentiality Dozens of subsidiary organizations.
The IT Vendor: HIPAA Security Savior for Smaller Health Plans?
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Control and Security Frameworks Chapter Three Prepared by: Raval, Fichadia Raval Fichadia John Wiley & Sons, Inc
The Art of Information Security: A Strategy Brief Uday Ali Pabrai, CISSP, CHSS.
The NIST Special Publications for Security Management By: Waylon Coulter.
IT Jobs Positions available in the field of Information Technology.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
BizSmart Lunch & Learn Webinar Information Security and Protecting your business With the increased risk of some sort of cyber- attack over the past few.
CompTIA Security+ Certification Exam SY COMPTIA SECURITY+SY0-401 Q&A is a straight forward,efficient,and effective method of preparing for the new.
Describe the use of technology in the financial-information management function.
Physical Security at Data Center: A survey. Objective of the Survey  1. To identify the current physical security in data centre.  2.To analyse the.
MANAGEMENT of INFORMATION SECURITY, Fifth Edition.
Law Firm Data Security: What In-house Counsel Need to Know
MANAGEMENT of INFORMATION SECURITY, Fifth Edition
CCNET Managed Services
National Cyber Security
Introduction to the PACS Security
ISACA IN 2019 Robin Lyons WHAT’S NEXT, NOW Technical Research Manager
Presentation transcript:

Locking Down the Data Center of Tomorrow By Kevin Beaver, CISSP Founder and principal consultant - Principle Logic, LLC 4430 Wade Green Rd., Suite 180 Kennesaw, GA Copyright © 2003, Principle Logic, LLC, All Rights Reserved.

Kevin Beaver Information security consultant, author and trainer 15+ years of IT/security experience Specialize in security incident response, security assessments, network security, and security policy and strategy development Author of the upcoming book Ethical Hacking for Dummies by John Wiley and Sons Co-author of the new book The Practical Guide to HIPAA Privacy and Security Compliance by Auerbach Publications Author of the new book The Definitive Guide to Management and Security by Realtimepublishers.com Regular columnist and information security/HIPAA advisor for SearchSecurity.com, SearchMobileComputing.com, ITSecurity.com, and HCPro’s Briefings on HIPAA newsletter Hold CISSP, MCSE, MCNE and IT Project+ certifications Bachelor’s in Computer Engineering Technology from Southern Polytechnic State University and Master’s in Management of Technology from Georgia Tech Copyright © 2003, Principle Logic, LLC, All Rights Reserved.

Current state of data center security The convergence of information and physical security Security technologies and practices required for the successful convergence of physical and information security Skills required of security professionals What to expect in the coming years Resources Copyright © 2003, Principle Logic, LLC, All Rights Reserved. What We’ll Cover

Where everything security related comes together –Network, applications, physical Enable consolidation of information systems management and security within a controlled environment Heightened sense of criticality since 9/11 There’s a lot of good security, but there’s also a lot of bad –Not necessarily as secure as they claim to be Copyright © 2003, Principle Logic, LLC, All Rights Reserved. Current State of Data Center Security

Protection of people and physical property Traditional physical security involved guards, locks, keys, etc. – this is changing Physical security in buildings, including data centers, is becoming increasingly dependent on technical systems for control and monitoring Copyright © 2003, Principle Logic, LLC, All Rights Reserved. What is Physical Security?

Increase of insider threats Someone walking off with a laptop, server, software installation disks, etc. Malicious outsider gaining access to the data center –To obtain passwords –To install a network analyzer Malicious insider gaining access to CDs, tapes, hard copies of network diagrams or password lists Copyright © 2003, Principle Logic, LLC, All Rights Reserved. Physical and Information Security Risks

Security to protect corporate assets is technology based –Firewalls –Intrusion detection Security systems typically found in discrete areas – Not across the organization Different security departments doing different things –Has resulted in various inconsistencies in meeting security policy requirements Copyright © 2003, Principle Logic, LLC, All Rights Reserved. Past Paradigm

Security has been seen as a roadblock to overall organization effectiveness in the past –Both physical and information security can be combined and now seen as a business enabler supporting the organization’s mission and goals Copyright © 2003, Principle Logic, LLC, All Rights Reserved. …Past Paradigm

Data center security is more than just protecting IT assets –We’re now moving towards protecting enterprise assets The most valuable corporate assets are virtual –Electronically and in the minds of employees Many corporate assets are housed in critical data centers Physical security is established and mature for the most part –Information security is still in its infancy Copyright © 2003, Principle Logic, LLC, All Rights Reserved. Physical Security, meet Information Security

There are emerging governmental requirements forcing the collaboration of physical and information security Security management of the data center continues to be fragmented After many years of separation and strife, the two practices are coming together – especially in the data center environment Copyright © 2003, Principle Logic, LLC, All Rights Reserved. …Physical Security, meet Information Security

The goal of both is to keep the bad guys out and the “good” guys honest Each one uniquely contributes to the organization’s bottom line Both require: –Identification of assets –Classification of assets –Assessment of risks –Implementation of countermeasures –Incident response expertise Copyright © 2003, Principle Logic, LLC, All Rights Reserved. Similarities

An ever increasing skill set required for security leaders, managers and doers –Keeping up with the latest technologies –Understanding how to effectively respond to incidents Money Technology and computers Effective policies and procedures Layered protection – defense-in-depth Copyright © 2003, Principle Logic, LLC, All Rights Reserved. Demands of Physical and Information Security

Authorization – need to know basis Authentication Accountability Audit Destruction policies and procedures Ongoing awareness A good balance of security vs. convenience Both (especially infosec) are requiring stronger ties with law enforcement than ever before Copyright © 2003, Principle Logic, LLC, All Rights Reserved. …Demands of Physical and Information Security

You Must Find a Balance If you have a network that’s secure but a data center building that’s not OR If you have a data center building that’s secure and a network that’s not –They will defeat the purpose of each other Copyright © 2003, Principle Logic, LLC, All Rights Reserved.

The Simple Truth Need more than just a guard and locked doors Need more than just firewalls and IDSs Security must be tightly integrated with every organizational function You can’t force the two different departments to work well together – must give business reasons and incentives Must balance the requirements of both physical and information security Copyright © 2003, Principle Logic, LLC, All Rights Reserved.

Where We’re Headed Decentralization of data centers and corporate assets Tighter integration between physical and information security equipment The design goals of newer technologies will help support convergence of physical and information security Systems will be easier to use, making data center technology implementation, collaboration and change management simpler Copyright © 2003, Principle Logic, LLC, All Rights Reserved.

…Where We’re Headed The convergence of the two types of security will help further the information security cause –Management has always bought into physical security –It’s now becoming more apparent that information security is a critical element as well Smaller computing devices such as PDAs, 1U servers, cell phones and laptops are just getting smaller leading to more physical security issues –Nanotechnology devices both inside and associated with data centers are increasing the demand for physical and information security convergence Copyright © 2003, Principle Logic, LLC, All Rights Reserved.

…Where We’re Headed Prevention vs. protection Increased responsibilities on everyone’s part Reduced costs, but possible increase in risks Copyright © 2003, Principle Logic, LLC, All Rights Reserved.

Emerging Trends Enhanced biometric systems Increase in the number of uses of biometrics to facilitate both physical and information security in the data center Increased usage of identity management solutions Perimeter control has been – and will be even more so – the job of both physical and information security professionals Copyright © 2003, Principle Logic, LLC, All Rights Reserved.

…Emerging Trends Need for greater physical and information security of wireless components within data centers Storage and management issues associated with RFID data Defense-in-depth will be even more important Copyright © 2003, Principle Logic, LLC, All Rights Reserved.

…Emerging Trends Enhanced monitoring –Power, air and server conditions –Access controls Will require more human involvement –In the form of awareness, policies and procedures Increased use in temp/contract workers –Need to include these people in security policies and procedures Copyright © 2003, Principle Logic, LLC, All Rights Reserved.

…Emerging Trends Open Security Exchange (OSE) OSE-compliant products from vendors More data center involvement from large vendors Development of data center education initiatives by the Association for Computer Operations Managers (AFCOM) and Marist College Overall the merger of the two will have a huge impact on organizations, employees, users and the industry as a whole Copyright © 2003, Principle Logic, LLC, All Rights Reserved.

CSOs of the Future CSOs manage data centers among other things Role is still being defined Need a strong leader in this role Business and technical expertise Must build relationships with business managers Has authority within the organization to create and enforce security policies Copyright © 2003, Principle Logic, LLC, All Rights Reserved.

…CSOs of the Future Ability to influence security-aware culture in and around the data center See CSO Magazine’s State of the CSO report for more insight – Copyright © 2003, Principle Logic, LLC, All Rights Reserved.

A Few More Tips A security-aware culture will buy your data center more protection than all other efforts combined Policies and procedures should be integrated between physical and information security systems for the data center whenever possible –With management support of course Copyright © 2003, Principle Logic, LLC, All Rights Reserved.

…A Few More Tips CISO and IT-only types may only be interested in information security –If so, s/he might not be the best fit for a CSO or director of data center security position A wise security officer (physical or information) will stay abreast of both If you’re not sure about the physical security, contact some experts on it Copyright © 2003, Principle Logic, LLC, All Rights Reserved.

Resources Open Security Exchange – –Physical Security Bridge to IT Security (PHYSBITS) Framework AFCOM – ISC 2 Certified Information Systems Security Professional (CISSP) and ISSAP concentration – ASIS Certified Protection Professional (CPP) – CSO job description – Copyright © 2003, Principle Logic, LLC, All Rights Reserved.

Resources CSO job description – Physical security tips – Copyright © 2003, Principle Logic, LLC, All Rights Reserved.

The physical security market is very strong now and it will take time for the two areas of security to successfully merge It will be impossible to ensure solid information security of the data center without the proper physical security controls – and vice versa It’s essential to ensure that data is available after a disaster –This can only be possible when information and physical security systems and personnel work together Copyright © 2003, Principle Logic, LLC, All Rights Reserved. Closing Thoughts

Security initiatives driven from the bottom up usually aren’t effective Haphazard combination of physical and information security can cause more problems than it solves A more secure data center can increase customer comfort level helping to maintain customers and even drive more business = Copyright © 2003, Principle Logic, LLC, All Rights Reserved. …Closing Thoughts

Questions? Copyright © 2003, Principle Logic, LLC, All Rights Reserved. You can submit your questions to Kevin by clicking on the Ask a Question link on the lower left corner of your screen.

Thank you Copyright © 2003, Principle Logic, LLC, All Rights Reserved. Thank you for participating in this SearchSecurity.com webcast. If you have comments or suggestions for future webcasts, please the moderator at