Security Analysis and Recommendations. PB’s&J Presenters & Topics David Bihm User Account Management Nathan Julson Data Classification Firewall Architectures.

Slides:



Advertisements
Similar presentations
Surviving the PCI Self -Assessment James Placer, CISSP West Michigan Cisco Users Group Leadership Board.
Advertisements

Complying With Payment Card Industry Data Security Standards (PCI DSS)
1 Chapter 8 Fundamentals of System Security. 2 Objectives In this chapter, you will: Understand the trade-offs among security, performance, and ease of.
Guide to Massachusetts Data Privacy Laws & Steps you can take towards Compliance.
Information Systems Audit Program. Benefit Audit programs are necessary to perform an effective and efficient audit. Audit programs are essentially checklists.
ISecurity Compliance with Sarbanes-Oxley & COBIT.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Security Controls – What Works
Information Security Policies and Standards
Security+ Guide to Network Security Fundamentals
Payment Card Industry (PCI) Data Security Standard (DSS) Compliance Commonwealth of Massachusetts Office of the State Comptroller March 2007.
Developing a Records & Information Retention & Disposition Program:
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
ITS Offsite Workshop 2002 PolyU IT Security Policy PolyU IT/Computer Systems Security Policy (SSP) By Ken Chung Senior Computing Officer Information Technology.
Kevin R Perry August 12, Part 1: High Level Changes & Clarifications.
Computer Security: Principles and Practice
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. Security Policies and Implementation Issues.
Security Overview. 2 Objectives Understand network security Understand security threat trends and their ramifications Understand the goals of network.
Stephen S. Yau CSE , Fall Security Strategies.
Why Comply with PCI Security Standards?
Payment Card Industry (PCI) Data Security Standard
Brian Bradley.  Data is any type of stored digital information.  Security is about the protection of assets.  Prevention: measures taken to protect.
Philippe LE TERTRE IS Governance Consultant  Founder and managing partner of VADEGIS (company specialized in Information System Management.
Session 3 – Information Security Policies
Network security policy: best practices
Information Resources and Communications University of California, Office of the President System-Wide Strategies for Achieving IT Security at the University.
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
Presented by INTRUSION DETECTION SYSYTEM. CONTENT Basically this presentation contains, What is TripWire? How does TripWire work? Where is TripWire used?
NUAGA May 22,  IT Specialist, Utah Department of Technology Services (DTS)  Assigned to Department of Alcoholic Beverage Control  PCI Professional.
(2011) Security Breach Compromises 75,000 Staff/Student Social Security Numbers Image from this Site Presenters: Aron Eisold, Matt Mickelson, Bryce Nelson,
Lesson 8-Information Security Process. Overview Introducing information security process. Conducting an assessment. Developing a policy. Implementing.
Teresa Macklin Information Security Officer 27 May, 2009 Campus-wide Information Security Activities.
General Awareness Training
Section Seven: Information Systems Security Note: All classified markings contained within this presentation are for training purposes only.
Security Baseline. Definition A preliminary assessment of a newly implemented system Serves as a starting point to measure changes in configurations and.
ISO17799 Maturity. Confidentiality Confidentiality relates to the protection of sensitive data from unauthorized use and distribution. Examples include:
Auditing Information Systems (AIS)
Lesson 9-Information Security Best Practices. Overview Understanding administrative security. Security project plans. Understanding technical security.
Ali Pabrai, CISSP, CSCS ecfirst, chairman & ceo Preparing for a HIPAA Security Audit.
Engineering Essential Characteristics Security Engineering Process Overview.
Chapter 2 Securing Network Server and User Workstations.
INTRUSION DETECTION SYSYTEM. CONTENT Basically this presentation contains, What is TripWire? How does TripWire work? Where is TripWire used? Tripwire.
PCI Training for PointOS Resellers PointOS Updated September 28, 2010.
Security and Assurance in IT organization Name: Mai Hoang Nguyen Class: INFO 609 Professor: T. Rohm.
Information Security IBK3IBV01 College 2 Paul J. Cornelisse.
ISO/IEC 27001:2013 Annex A.8 Asset management
APolicy EASy Security Project Analysis and Recommendations for TJX Companies, Inc.
High Assurance Products in IT Security Rayford B. Vaughn, Mississippi State University Presented by: Nithin Premachandran.
Chapter 3 Pre-Incident Preparation Spring Incident Response & Computer Forensics.
(2011) Security Breach Compromises 75,000 Staff/Student Social Security Numbers Image from this Site Presenters: Aron Eisold, Matt Mickelson, Bryce Nelson,
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
Policies and Security for Internet Access
By: Matt Winkeler.  PCI – Payment Card Industry  DSS – Data Security Standard  PAN – Primary Account Number.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
The Payment Card Industry Data Security Standard (PCI DSS) is a proprietary information security standard for organizations that handle branded credit.
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
Risk Controls in IA Zachary Rensko COSC 481. Outline Definition Risk Control Strategies Risk Control Categories The Human Firewall Project OCTAVE.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 17 – IT Security.
SECURITY AND ELECTRONIC COMMUNICATIONS WHAT YOU NEED TO KNOW FOR YOUR AUDIT.
Payment Card Industry (PCI) Rules and Standards
Review of IT General Controls
PCI-DSS Security Awareness
Payment Card Industry (PCI) Data Security Standard (DSS) Compliance
Security Standard: “reasonable security”
Security in Networking
Payment Card Industry (PCI) Data Security Standard (DSS) Compliance
Red Flags Rule An Introduction County College of Morris
Payment Card Industry (PCI) Data Security Standard (DSS) Compliance
County HIPAA Review All Rights Reserved 2002.
Presentation transcript:

Security Analysis and Recommendations

PB’s&J Presenters & Topics David Bihm User Account Management Nathan Julson Data Classification Firewall Architectures and Connections with Public Networks Brandon Buckley Reaccreditation Ryan Passehl Trusted Path Protection of Security Functions

Key Incident Details Breach of wireless network Exploitation of existing user accounts Implantation of data mining applications Creation of unauthorized access accounts Capture of confidential customer data PCI non-compliancy

Recommendations 5.4 User Account Management CONTROL OBJECTIVE Management should establish procedures to ensure timely action relating to requesting, establishing, issuing, suspending and closing user accounts. A formal approval procedure outlining the data or system owner granting the access privileges should be included. The security of third- party access should be defined contractually and address administration and nondisclosure requirements. Outsourcing arrangements should address the risks, security controls and procedures for information systems and networks in the contract between the parties. Recommendations: It was obvious during our investigation that the processes in place, during the time of the breach, were not successful with identifying the unauthorized account creation and utilization by the perpetrators. While the possibility exists that an unauthorized account be created, it did concern us that the accounts may have been utilized for an unexcused length of time. For this reason we believe that TJX would benefit from the basic account management processes discussed on the next slide.

Continued: 5.4 User Account Management A.New user account requests must be requested by management personnel only. Proper forms must be completed and signed prior to account creation. B.Leave of Absence 1. When an employee requests a leave of absence, management is required to notify the Human Resources department. 2. HR will document the dates of absence and provide notice to the systems administrator. 3. The associated accounts are disabled beginning on the date specified by HR. A separate request is required upon the return of the employee from leave, at which time their accounts will be enabled and a new password set. C.Termination 1. Upon termination, management is required to notify Human Resources. 2. Human resources will process the request for termination and notify systems administrators, at which time all user accounts associated are disabled and moved to a designated archive location until authorized for deletion. D.Required as part of new user orientation 1. New users are provided training on required systems. 2. New users are provided a copy of the system usage and security policy. A signature is required by the employee verifying they understand the security requirements and that misuse will result in disciplinary action; possibly termination. E.Reoccurring Training 1. Users will be required to attend bi-annual continued education of systems operation and policies. 2. Users will provide a signature verifying attendance. The mere fact that evidence showed the perpetrators accessed TJX’s systems multiple times over the course of 2 years questions whether there was a process in place, at the time of the breach, to monitor and audit access rights to systems and resources. If such a process were in place, and adequately executed, the accounts created and utilized by the thieves should have been identified do to the sensitive nature of the information being accessed. Our recommendation is to implement at a minimum a quarterly internal audit of account access rights do to the high turnover and number of promotions that are common in retail businesses. Also recommended, at least until all damage claims have ceased, is an annual audit performed from an outside source.

5.8 Data Classification CONTROL OBJECTIVE Management should implement procedures to ensure that all data are classified in terms of sensitivity by a formal and explicit decision by the data owner according to the data classification scheme. Even data needing “no protection” should require a formal decision to be so designated. Owners should determine disposition and sharing of data, as well as whether and when programs and files are to be maintained, archived or deleted. Evidence of owner approval and data disposition should be maintained. Policies should be defined to support reclassification of information, based on changing sensitivities. The classification scheme should include criteria for managing exchanges of information between organizations, addressing both security and compliance with relevant legislation. Recommendations: TJX did not follow many of the PCI DSS requirements that a business of their size should be. When working with so much customer data, it is imperative that the data is safely secured. TJX needs to change the data storage and retention policies to align with the PCI DSS requirements. Highly sensitive information needs to be classified as such and stored accordingly. Customer data should not be kept any longer than needed and a standard process for this data handling needs to be implemented.

5.2 Firewall Architectures and Connections with Public Networks CONTROL OBJECTIVE If connection to the Internet or other public networks exists, adequate firewalls should be operative to protect against denial of services, unauthorized access to the internal resources and control any application and infrastructure management flows in both directions. Recommendations: It appears that sensitive customer data was not protected as it should be from outside intruders. Although this was not addressed sufficiently by the company previously, going forward this may be the most important step in preventing another intrusion. TJX needs to install the firewall software which had been previously purchased and work with that vendor to ensure its setup and operating correctly. Proper monitoring and auditing of the firewall must occur on a regular basis to ensure suspicious activity is detected early. TJX was also lacking security in their wireless setup. To prevent further intrusions, it is recommended that TJX purchase new wireless access points for all their retail stores. In addition, they need to ensure they are setup to utilize a higher level of wireless encryption than the WEP they were currently using. These access points should also be setup to allow secure, remote monitoring from a central location to ensure the configuration is correct upon inspection.

5.12 Reaccreditation CONTROL OBJECTIVE Management should ensure that reaccreditation of security (e.g., through “tiger teams”) is periodically performed to update the formally approved security level and the acceptance of residual risk. Recommendations: TJX should comply with the PCI DSS standards that are set in place for major companies that handle customer credit card data. TJX should be PCI compliant in all 12 areas in order to gain reaccreditation which can cost $150 a year to be certified. TJX also has to take a proactive approach by implementing a secure wireless network complete with WPA security and firewalls to protect against intruders. Proactive processes should also be implemented by reviewing access logs to catch any unfamiliar behavior on intrusion attempts and act on them immediately. (Vijayan, 2007)

5.16 Trusted Path CONTROL OBJECTIVE Organizational policy should ensure that sensitive transaction data are exchanged only over a trusted path. Sensitive information includes security management information, sensitive transaction data, passwords and cryptographic keys. To achieve this, trusted channels may need to be established using encryption between users, between users and systems, and between systems. Recommendations: TJX needs to first upgrade their wireless security to WPA2 security at all stores. This is especially vital given the original break-in occurred via a wireless connection. All internal data exchange needs to be done over secure LAN and WAN links with security at a strong level and managed by their network infrastructure team. All work done from remote machines needs to be done via secured VPN connection requiring login authentication. All web pages containing customer data must use SSL to protect customer data.

5.17 Protection of Security Functions CONTROL OBJECTIVE Security-related hardware and software should at all times be protected against tampering and against disclosure of secret keys to maintain their integrity. In addition, organizations should keep a low profile about their security design, but should not base their security on the design being secret. Recommendations: All software, hardware and firmware need to be updated on a regular basis across all devices (preferably once a month). Software managing their wireless access points needs immediate attention to be made more secure (stronger passwords) with the goal of moving to WPA2 security in the near future. Once WPA2 is implemented the software needs to be fully secured with password information given out to very limited staff with the passwords for this (and all passwords across all systems) being forced to change on a regular basis. All workstations must be password protected and forced to use a login ID that can be traced to an individual. All workstations must be locked and not easily accessible for non-approved people.