Canon Security Solutions For imageRUNNER Series imageCHIP Devices.

Slides:



Advertisements
Similar presentations
Castelle FaxPress Plus™ FaxPress Premier and FaxPress Enterprise
Advertisements

© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 8: Monitoring the Network Connecting Networks.
Data Security The Best Data Security In The Industry.
1 Configuring Internet- related services (April 22, 2015) © Abdou Illia, Spring 2015.
Information Security 1 Information Security: Security Tools Jeffy Mwakalinga.
16.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft® Windows® Server 2003 Active Directory Infrastructure.
Client/Server Computing Model of computing in which very powerful personal computers (clients) are connected in a network with one or more server computers.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 9: Planning and Managing Certificate Services.
1 Configuring Web services (Week 15, Monday 4/17/2006) © Abdou Illia, Spring 2006.
CSI 400/500 Operating Systems Spring 2009 Lecture #20 – Security Measures Wednesday, April 29 th.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
Security Management IACT 918 July 2004 Gene Awyzio SITACS University of Wollongong.
Network Security. Network security starts from authenticating any user. Once authenticated, firewall enforces access policies such as what services are.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 8: Implementing and Managing Printers.
1 CA201 Word Application Collaborating with Others Week # 8 By Tariq Ibn Aziz Dammam Community college.
Security Management IACT 418/918 Autumn 2005 Gene Awyzio SITACS University of Wollongong.
Module 6 Windows 2000 Professional 6.1 Installation 6.2 Administration/User Interface 6.3 User Accounts 6.4 Managing the File System 6.5 Services.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Check Disk. Disk Defragmenter Using Disk Defragmenter Effectively Run Disk Defragmenter when the computer will receive the least usage. Educate users.
Computer Literacy BASICS: A Comprehensive Guide to IC 3, 5 th Edition Lesson 14 Sharing Documents 1 Morrison / Wells / Ruffolo.
» Explain the way that electronic mail ( ) works » Configure an client » Identify message components » Create and send messages.
Automatically , fax, print and archive documents from Baan such as purchase orders, sales invoices, reminders, acknowledgments and much more! Baan.
The New Sharp Standard Security vs. the Data Security Kit.
What is in Presentation What is IPsec Why is IPsec Important IPsec Protocols IPsec Architecture How to Implement IPsec in linux.
Module 4 Managing Client Access. Module Overview Configuring the Client Access Server Role Configuring Client Access Services for Outlook Clients Configuring.
Chapter-4 Windows 2000 Professional Win2K Professional provides a very usable interface and was designed for use in the desktop PC. Microsoft server system.
1 Infrastructure Hardening. 2 Objectives Why hardening infrastructure is important? Hardening Operating Systems, Network and Applications.
Hands-On Microsoft Windows Server 2008
SYSTEM ADMINISTRATION Chapter 13 Security Protocols.
L2000 Technical Training 7. I-Functions. Objective  After completion of this module you will be able to demonstrate an understanding of the I-Functions.
Cosmos Security Feature Overview Product Planning Group Samsung IT Solutions Business 12 July 2010.
Csci5233 Computer Security1 Bishop: Chapter 27 System Security.
MEAP Applications.
XP New Perspectives on Browser and Basics Tutorial 1 1 Browser and Basics Tutorial 1.
JavaScript, Fourth Edition
Home Media Network Hard Drive Training for Update to 2.0 By Erik Collett Revised for Firmware Update.
Troubleshooting Windows Vista Security Chapter 4.
Network Management Tool Amy Auburger. 2 Product Overview Made by Ipswitch Affordable alternative to expensive & complicated Network Management Systems.
Secure Your Documents. Protect Your Data. Lexmark Security for Solutions-Capable Printers and MFPs.
Computer and Information Science Ch1.3 Computer Networking Ch1.3 Computer Networking Chapter 1.
Types of Electronic Infection
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
Module 9 Configuring Messaging Policy and Compliance.
12 Developing a Web Site Section 12.1 Discuss the functions of a Web site Compare and contrast style sheets Apply cascading style sheets (CSS) to a Web.
Network Security. 2 SECURITY REQUIREMENTS Privacy (Confidentiality) Data only be accessible by authorized parties Authenticity A host or service be able.
Module 3 Configuring File Access and Printers on Windows 7 Clients.
Guide to MCSE , Second Edition, Enhanced1 The Windows XP Security Model User must logon with: Valid user ID Password User receives access token Access.
Switch Features Most enterprise-capable switches have a number of features that make the switch attractive for large organizations. The following is a.
BEST Guard – Information Logging. bEST Guard Records all actions executed on an MFP Produkt type: Server based application (software only) Development.
Security fundamentals Topic 5 Using a Public Key Infrastructure.
The world leader in serving science Overview of Thermo 21 CFR Part 11 tools Overview of software used by multiple business units within the Spectroscopy.
Securing and Sharing Workbooks Lesson 11. The Review Tab Microsoft Excel provides several layers of security and protection that enable you to control.
1 of 4 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2006 Microsoft Corporation.
© Copyright 2009 SSLPost 01. © Copyright 2009 SSLPost 02 a recipient is sent an encrypted that contains data specific to that recipient the data.
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter One Introduction to Exchange Server 2003.
Hands-On Microsoft Windows Server 2008 Chapter 5 Configuring Windows Server 2008 Printing.
1 Lesson 14 Sharing Documents Computer Literacy BASICS: A Comprehensive Guide to IC 3, 4 th Edition Morrison / Wells.
4.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 12: Implementing Security.
Directory Services CS5493/7493. Directory Services Directory services represent a technological breakthrough by integrating into a single management tool:
Business Objects XIr2 Windows NT Authentication Single Sign-on 18 August 2006.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
Education Solution.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
ICE Integrated Cloud Environment Cloud Scanning and Mobile Printing
Internet Business Associate v2.0
IIS.
Configuring Internet-related services
AbbottLink™ - IP Address Overview
ONLINE SECURE DATA SERVICE
{ How can your Business benefit from uniFLOW? }.
Presentation transcript:

Canon Security Solutions For imageRUNNER Series imageCHIP Devices

Canon Security Solutions Overview Introduction to Canon Security Technology and Goals Typical Customer Security Concerns System Architecture Security -imageRUNNER Controller Security -MEAP Architecture Security -imageRUNNER FAX Security Hardware Architecture Security Device Security Features -HDD Security -Device Access Security (Authentication) -Document Security -Device Management

Canon Goals of Information Security Confidentiality Prevent the disclosure of data to unauthorized users Integrity Insure data is not altered either maliciously or accidentally Availability Maintaining data availability to legitimate users

Typical Customer Security Concerns Can someone access the information I copy, print, scan or fax on a MFP? What happens at the end of the lease for the MFP. Can someone access my documents after the device is returned? Can we limit access to my MFP device to prevent non authorized usage? Is the hard drive of the MFP vulnerable to hackers? Which Canon Security features might address these customer concerns?

Device Access Security Department ID (up to 1000 IDs) User Authentication (SDL/SSO) Function Authentication (AMS) Control Card / Card Reader system (optional) Smart Card Authentication HDD Security HDD Data Erase HDD Data Encryption HDD Format Mail Box Password Protection Job Log Conceal Document Security Encrypted Secured Print Watermark/Secure Watermark Copy Set Numbering Encrypted PDF Digital Signature PDF FAX Forwarding FAX Destination Confirmation Network Security MAC Address Filtering IP Address Filtering SSL Encryption Network Application On/Off USB Block Destination Restriction Device Management DIDF (Device Information Delivery Function) Key Switch Unit Internet Mail Server Security POP Authentication before SMTP SMTP Authentication Canon has introduced a security related workflow to help improve Device Security, Data Protection & Information Integrity Security Overview

Hard Disk Drive Security Features Standard HDD Security architecture Data and directory are written in random non contiguous locations on hard drive Data is compressed in a proprietary file format; -Not functional/readable outside of iR At Power shut-down, information on RAM is cleared HDD Format Option (System Admin option) -Deletes Customer info/ data, resets device to default -Overwrites all user data with random data Security Features Optional Available Security Features Hard Disk Drive Data Encryption Data is encrypted using 256-bit, AES encryption -This will protect both temporary and permanent data Hard Disk Drive Data Erase Overwrite each copy, print, scan and fax job Up to three different levels of erasing documents:  Once with null  Once with random  Random data three times

imageCHIP controller is the heart of every imageRUNNER device imageRUNNER Controller imageRUNNER Architecture Security

imageRUNNER Controller Security imageCHIP Controller Unix-based, Real Time Operating System Closed and proprietary system not widely distributed Not standard UNIX code Not a common target for viruses or hackers Source Code expressly designed to run Canon embedded applications In Comparison, Linux Based MFP: Open architecture widely distributed Higher potential of hacking and manipulation of embedded device and network imageRUNNER Architecture Security

MEAP Architecture Security SDK distribution restricted & controlled Virtually impossible to alter a MEAP app or write a rogue application Application integrity secured by Canon Inc. MEAP Applications “digitally” signed with special “signature” and license If application is modified, signature code will not match and application will not run Application and license file are encrypted imageRUNNER Architecture Security

imageRUNNER FAX Security Firewall physically and logically separates the fax board from network functions Residing on the main controller board G3 fax board implementation connects to PSTN & responds only to CCITT.T30 commands and does not support network communication protocols iR Fax Board does not have binary transfer function Not possible to receive data files other than fax image files iR Fax Boards have “Firewall” Protection imageRUNNER Architecture Security

Hard Disk Drive Temporary/permanent data and directory are written in random non contiguous locations on hard drive Data is compressed in a proprietary file format; Not functional/readable outside of iR Mail Box Password Protection Job Log Conceal Hides the list of completed jobs Aids in regulatory compliance RAM Volatility At Power shut-down, information on RAM is cleared Standard imageRUNNER Hard Disk Drive & RAM Security Security Features

Hard Disk Drive Security Features cont. HDD format is standard on all imageRUNNER Devices This feature, once activated, will overwrite entire user partition: Contacts, documents in mailbox, all other user image data Overwrite using random data up to three times (Security kit not required (once with null is standard setting)) Reduce concern for Customer to need to destroy/remove hard drive to protect company information Securely Remove Information at End of Device lifecycle Key Uses for HDD Format: End of Lease End of product lifecycle Device relocated to new department Supported Devices: iR105+/9070/8070/6570/5570/5070/ 4570/3570/2870/2270/ iR7105/7095/7086 iRC6870U/C5870U/C3170U/C3170i/ CiRC5185/5180/4580/4080/ 3380/2880

Optional Available Security Features Hard Disk Drive Data Encryption (up to 256-bit), AES Hard Disk Drive Data Erase Hard Disk Drive Security

Hard Disk Drive Data Erase Deletion of Job Data Using the imageRUNNER Data Erase Function Overwrite each copy, print, scan and fax job Up to three different levels of erasing documents: Once with null Once with random Random data three times for maximum Overwriting prevents data retrieved by disk/file recovery Overwriting is resistant to keystroke recovery (Hacker Tools) Hard Disk Drive Security Features

Hard Disk Drive Data Encryption (256-bit), AES Mathematical algorithms are used to scramble bits of data or any image stored on the hard drive The data is encrypted using 256-bit, AES encryption A secret Key that is created to encrypt all images before written to the HDD This will protect both temporary and stored jobs/data Canon MFP Security Chip 1.00 is key Canon proprietary component inside every HDD Encryption Kit Has acquired EAL3 status under the Common Criteria Program (also known as ISO ) Hard Disk Drive Security Features

Device Access Security (Authentication) Implement mandatory proper identification and authentication to utilize: Print, Copy, Fax, Department ID Management Simple Device Log-in (SDL) Single Sign On (SSO)

Department ID Management Allows Administrators to configure the imageRUNNER device with valid IDs and passwords Helps Limit Print output volumes by users/ departments Restricts system access Supports up to 1,000 accounts Up to 7 digit ID and password for each account Ability to track Job histories Volumes Restrict individual job functions Device Access Security (Authentication) Screenshot from Color Device

Simple Device Log-in (SDL) Authentication An enhanced version of Department ID Management Grants access only after verifying an additional “Personal” ID and Password Any message sent from an imageRUNNER Device using SDL, the users will have automatically displayed Device Access Security (Authentication)

Single Sign On (SSO) Authentication For environments utilizing Active Directory. Allows employees to access an imageRUNNER device on the network using the same ID and password as their PC. Utilizing SSO, administrators can track each user for each specific imageRUNNER device Device Access Security (Authentication)

IT COPYAVAILABLE SENDAVAILABLE MAIL BOXAVAILABLE COPYAVAILABLE SENDAVAILABLE MAIL BOXAVAILABLE COPYAVAILABLE SENDBLOCKED MAIL BOXBLOCKED COPYAVAILABLE SENDAVAILABLE MAIL BOXAVAILABLE COPYAVAILABLE SENDBLOCKED MAIL BOXBLOCKED Guest ManagerStaff Contractor Double Sided B/W & Double Sided No Restrictions B/W & Double Sided Access Management System A device management feature that allows access restrictions to be assigned to users and groups to restrict entire functions or restrict specific features within a function Device Management

What can be restricted with AMS? Copy (Allowed / Not Allowed) Color copying 2 Sided Copies Page Layout Send (Allowed / Not Allowed) Destination Type Specific Address Domains Address Book Access Device Signature PDF Mail Box (Allowed / Not Allowed) Print / Color Print 2 Sided printing Page Layout Web Access (Not Set, Allowed / Not Allowed) Leave unspecified or allows or prohibits use of Web Access Function Hold (Not Set, Allowed / Not Allowed) Leave unspecified or allows or prohibits use of the Job Hold Function Print job (Not Set, Allowed / Not Allowed) Leave unspecified or allows or prohibits use of the Print Job Function MEAP Applications (Not Set, Allowed / Not Allowed) Leave unspecified or allows or prohibits use of any MEAP Applications. Features for applications can be restricted separately * Printing from the PC cannot be restricted *Scan Tab (Twain Scanning) cannot be restricted * Does not currently support SSO authentication Device Management

Controlled Access to Ports and Services System Administrator can disable services and ports to lessen system vulnerabilities, ex: IPP, FTP, SNTP, SNMP, RAW, LPD, etc… imageRUNNER device is set up to support only necessary protocols used for transferring data imageRUNNER Network-based Access Controls Network Security

imageRUNNER Network-based Access Controls IP Address Filtering Authorized IT personnel can reject or permit incoming packets from other IP Addresses Restrict access to the imageRUNNER device for: Specific Users Group Users MAC Address Filtering Used for smaller networks Allows or denies access to specific addresses Up to 100 Mac addresses can be registered from the UI Mac Addresses have higher priority than an IP Address (they never change) Network Security

imageRUNNER Data Protection Secure Socket Layer (SSL) Encryption Ensure scanned and Universal Send documents on the network are safely transmitted to the recipient SSL also supports RUI, I-FAX, Web Access, & DIDF Encrypts information transferred from the device over a network Network Security

 Secured Print  Encrypted Secured Print  Password-protected Mail Boxes Document and Information Security

Encrypted Secured Print NOTE: The user can not select the Secure Print when Encrypted Secure Print is in effect. *Encryption *Password *Entering Password, then decode and print out Encrypted Secure Print Job Secure Print Job Two layers of security: 1. Encryption of Document Data itself 2. Password Protection The encrypted data will not be decoded until the user enters the correct password After printed out, the data will be deleted User name and file name will not be shown on the Status Monitor Document and Information Security

imageRUNNER HardCopy Security Secure Watermark This embeds hidden text within the backgrounds of documents Original (Secure Watermark w/ Color Background) “ COPY ” appears when document is Copied/Printed Document and Information Security

PDF Encryption Option for Universal Send (PDF Security Feature Set) Enables PDF’s sent over a network to have Adobe Standards of encryption. Performed directly at the imageRUNNER device without the need for additional software A password will be required for the end user to use the PDF sent through USend. The password can be encrypted for further security Optional 40 or 128-bit Encryption Document and Information Security

Digital Device Signature PDF (Universal Send PDF Security Feature Set) Device Signature mode enables user to add a digital signature to PDF data, which enables the recipient to verify which device scanned it and tracks if the file has been altered. Name and S/N of device is attached Tracks document alteration. If PDF is altered, revisions change to 1 of 1 to 1 of3. Benefit: Helps to send documents securely by preventing security problems such as impersonation and unauthorized alteration of documents NOTE: Device Signature and User Signature can be combined. Device Signature mode uses the certificate and key pair inside the device. Users can register only one key pair. The name of the generated/updated key pair is set to ‘Device Signature Key’. The expiration date for the device signature is set to 5 years after its key pair was generated/updated. When using SSO and SDL* with device signature, user’s address will appear in Document Properties as Author *(SDL note) address will only appear based on set-up Document and Information Security

Digital User Signature PDF Digital User Signature mode enables user to add a digital signature to PDF data, which enables the recipient to verify which user scanned it and whether the document has been altered. NOTE: The User Signature mode is available only if the optional Digital User Signature PDF Kit is activated. SDL or SSO must be set and a user certificate must be installed in the machine using the RUI. The Device Signature and the User Signature can be combined, however the Device Signature will be added before the User Signature which result in the document to be handled as if it has been altered without authorization when the recipient verifies the Device Signature. Document and Information Security

Address Book Password A password is set, restrictions can be placed on the registering, editing, and erasing of destinations Restrict New Address Enables you to restrict the entering of new addresses Only the following to be specified as destinations: Stored in the Address Book LDAP servers User Inboxes One-touch buttons Favorites buttons Your address (Send to Myself, if using SDL/SSO login) When the restriction feature is on, these buttons are grayed out. Destination Restriction In combination with the features below, administrator can put restriction for destinations of Universal Send feature to help prevent sending to wrong destination and information leaks. Document and Information Security

 Comprehensive Audit trail for usage of copy, print, & scan  Most complete Cost Recovery tool to analyze usage on both imageRUNNER MFP and LBP line together  Provides the Administrator the ability to view/download device workload statistic and generates reports by:  Individual  Group  Device  Department imageWARE Accounting Manager imageWARE Accounting Manager for meap

Typical Customer Security Concerns Can someone access the information I copy, print, scan or fax on a MFP? Universal Send Destination Restrictions Encrypted secure print Watermark/Secure Watermark Copy Set Numbering Digital Signature PDF Encrypted PDF What happens at the end of the lease for the MFP. Can someone access my documents after the device is returned? HDD Data Encryption HDD Data Erase HDD Format ( end of life procedure) Can we limit access to my MFP device to prevent non authorized usage? Dept ID Management SDL SSO eCopy Authorized Send Is the hard drive of the MFP vulnerable to hackers? Canon Standard security hardened Architecture Unique Operating system reduces vulnerability to hackers Unnecessary protocols disabled by default Mac & IP address filtering Secure Socket Layer

Canon Securing your imageRUNNER Technology Thank You