Deploying Tools for Cleaning Personal Information University of Pennsylvania School of Arts and Sciences Justin C. Klein Keane Sr. Information Security.

Slides:



Advertisements
Similar presentations
Presented by Nikita Shah 5th IT ( )
Advertisements

Administrative Data and Curricular Support: The Sum is Greater Than the Parts NERCOMP 2004 Copyright Bret Ingerman, Daniel Green, and Beth DuPont, 2004.
Tools for Help Desk Management: Assessment & Guidance Karen Pothering Elinor Pennsylvania State University "Copyright.
Making Sense out of the Information Security and Privacy Alphabet Soup in terms of Data Access A pragmatic, collaborative approach to promulgating campus-wide.
Student, Faculty, and Staff Data Availability and Protection What’s the Back-Up Plan? (for academic computing) Sponsored by.
Cut Costs and Increase Productivity in your IT Organization with Effective Computer and Network Monitoring. Copyright © T3 Software Builders, Inc 2004.
Web Application Management Moving Beyond CMS Douglas Clark Director, Web Applications Copyright Douglas Clark 2003 This work is the intellectual property.
Lynn Ray ISO Towson University Strategic Planning for IT Security Copyright Lynn Ray, This work is the intellectual property rights of the author.
Copyright Tom Parker, Ron DiNapoli, Andrea Beesing, Joy Veronneau This work is the intellectual property of the authors. Permission is granted for.
Design & Development Scott Battaglia Application Developer Enterprise Systems and Services Rutgers, the State University of New Jersey
Copyright Sylvia Maxwell and Michael White, This work is the intellectual property of the author. Permission is granted for this material to be shared.
Copyright Brian T. Huntley and Tim Antonowicz 2007 This work is the intellectual property of the authors. Permission is granted for this material to be.
1 Penn State/Napster 2.0 Trial Russell S Vaught Associate Vice Provost, Information Technology Copyright Russell S. Vaught This work.
Delivering Windows OS Updates at Yale with SUS EDUCAUSE Security Professionals Workshop May 17, 2004 Washington DC Ken Hoover, Systems Programmer
Office of the Vice President Copyright Notice Copyright Greg Hedrick, Matthew Wirges This work is the intellectual property of the author. Permission.
Educause Security 2007ISC Information Security Copyright Joshua Beeman, This work is the intellectual property of the author. Permission is granted.
System Security Scanning and Discovery Chapter 14.
DESIGNING A PUBLIC KEY INFRASTRUCTURE
Webdisk Storage Anywhere, Anytime for Everyone Presented at Educause, 2003 Copyright 2003, Jeremy Mortis and Harold Esche. This work is the intellectual.
Hands-On Microsoft Windows Server 2003 Administration Chapter 5 Administering File Resources.
UWM CIO Office A Collaborative Process for IT Training and Development Copyright UW-Milwaukee, This work is the intellectual property of the author.
Pam Downs Ajay Gupta The Pennsylvania Prince George’s State University Community College "Copyright Penn State University This work is the intellectual.
Copyright Statement © Jason Rhode and Carol Scheidenhelm This work is the intellectual property of the authors. Permission is granted for this material.
Copyright C. Grier Yartz This work is the intellectual property of the author. Permission is granted for this material to be shared.
Maintaining and Updating Windows Server 2008
Copyright Copyright Alayna Wadleigh and Blaine Hensley This work is the intellectual property of the author. Permission is granted for this material.
Copyright Anthony K. Holden, This work is the intellectual property of the author. Permission is granted for this material to be shared for non-commercial,
Turning Information Into Action: Enterprise Reporting at Columbia University Maria E. Mosca, Director Student Information Systems Columbia University in.
Moving Out of The Shadows: Shining a Light on Data David Rotman Director of Computer Services Mark Mazelin Web Development Coordinator Copyright David.
Risk Assessment 101 Kelley Bradder VP and CIO Simpson College.
Barracuda Networks Confidential1 Barracuda Backup Service Integrated Local & Offsite Data Backup.
Moving Your Paperwork Online Western Washington University E-Sign Web Forms Copyright Western Washington University, This work is the intellectual.
Copyright Tim Antonowicz, This work is the intellectual property of the author. Permission is granted for this material to be shared for non- commercial,
Information Security Office 1 Copyright Statement Copyright Mary Ann Blair This work is the intellectual property of the author.
CAMP Med Mapping HIPAA to the Middleware Layer Sandra Senti Biological Sciences Division University of Chicago C opyright Sandra Senti,
Information Resources and Communications University of California, Office of the President System-Wide Strategies for Achieving IT Security at the University.
Unified Messaging at Williams College A Cost Model Analysis By Mark Berman Copyright Mark Berman, This work is the intellectual property of the author.
Classroom Technologies Re-organization Copyright Kathy Bohnstedt, This work is the intellectual property of the author. Permission is granted for.
EDUCAUSE April 25, 2006Enforcing Compliance with Security Policies … Enforcing Compliance of Campus Security Policies Through a Secure Identity Management.
Baylor University and Xythos EduCause Southwest 2007 Dr. Sandra Bennett Program Manager Online Teaching and Learning System Copyright Sandra Bennett 2007.
Presented by INTRUSION DETECTION SYSYTEM. CONTENT Basically this presentation contains, What is TripWire? How does TripWire work? Where is TripWire used?
Sharing MU's SharePoint Experience 2005 Midwest Regional Conference Innovative Use of Technology: Getting IT Done Wednesday, March 23, 2005.
Stanford’s Patch Management Project   Ced Bennett May 17, 2004 Copyright Cedric Bennett This work is the intellectual property of the author. Permission.
Page 1 Copyright Jill M. Forrester This work is the intellectual property of the author. Permission is granted for this material to be shared for.
Security SIG August 19, 2010 Justin C. Klein Keane
Information Technology Services 1 Copyright Copyright Marc Wallman and Theresa Semmens, This work is the intellectual property of the authors. Permission.
Antivirus Technology in State Government Kym Patterson State Chief Cyber Security Officer Department of Information Systems.
Office of Information Technology Balancing Technology and Privacy – the Directory Conundrum January 2007 Copyright Barbara Hope and Lori Kasamatsu 2007.
Conditions and Terms of Use
Center for Planning and Information Technology T HE C ATHOLIC U NIVERSITY of A MERICA ERP Systems: Ongoing Support Challenges and Opportunities Copyright.
Discussion Panelists: Justin C. Klein Keane Sr. Information Security Specialist University of Pennsylvania Jonathan Hanny Application Security Specialist.
Module 14: Configuring Server Security Compliance
Safeguarding Research Data Policy and Implementation Challenges Miguel Soldi February 24, 2006 THE UNIVERSITY OF TEXAS SYSTEM.
Ali Pabrai, CISSP, CSCS ecfirst, chairman & ceo Preparing for a HIPAA Security Audit.
George Mason University Assessing Technology Support: Using Portfolios to Set Goals and Measure Progress Anne Agee, Star Muir, Walt Sevon Information Technology.
Copyright © 2003, The University of Texas at Austin. This work is the intellectual property of the author. Permission is granted for this material to be.
The Impact of Evolving IT Security Concerns On Cornell Information Technology Policy.
A Strategy for Moving from Commercial to an Open Source Environment Jeshua Pacifici, GEDI Assistant Director and Learning Systems Consultant.
1 Effective Incident Response Presented by Greg Hedrick, Manager of Security Services Copyright Purdue University This work is the intellectual property.
The world leader in serving science Overview of Thermo 21 CFR Part 11 tools Overview of software used by multiple business units within the Spectroscopy.
IT Security Challenges In Higher Education Steve Schuster Cornell University Copyright Steve Schuster This work is the intellectual property of.
Security SIG August 19, 2010 Justin C. Klein Keane
Quickly Establishing A Workable IT Security Program EDUCAUSE Mid-Atlantic Regional Conference January 10-12, 2006 Copyright Robert E. Neale This.
Mining User Data: Getting the Most out of your CMS John Fritz, UMBC.
Copyright Michael Dieckmann, Geissler Golding, Melanie Haveard This work is the intellectual property of the author. Permission is granted for this material.
© 2009 Pittsburgh Supercomputing Center Server Virtualization and Security Kevin Sullivan Copyright Kevin Sullivan, Pittsburgh Supercomputing.
Security Issues and Ethics in Education Chapter 8 Brooke Blanscet, Morgan Chatman, Lynsey Turner, Bryan Howerton.
Julian Hooker Assistant Managing Director Educause Southwest
The University of Arizona Personal Information Sweep
Presentation transcript:

Deploying Tools for Cleaning Personal Information University of Pennsylvania School of Arts and Sciences Justin C. Klein Keane Sr. Information Security Spec. Copyright 2009 Justin C. Klein Keane, University of Pennsylvania, School of Arts and Sciences. This work is the intellectual property of the author. Permission is granted for this material to be shared for non-commercial, educational purposes, provided that this copyright statement appears on the reproduced materials and notice is given that the copying is by permission of the author. To disseminate otherwise or to republish requires written permission from the author.

About SAS University of Pennsylvania's School of Arts and Sciences is one of the largest schools Spread over nearly 40 departments and centers, each with their own IT structure Thousands of faculty and staff end points We have our own IT infrastructure, but each school and center may have complementary structures Copyright 2009 Justin C. Klein Keane, University of Pennsylvania, School of Arts and Sciences

About SAS InfoSec Consists of:  One director of Information Security and Unix Systems (ISUS)  One full time information security specialist  One full time co-op  One part time project manager Copyright 2009 Justin C. Klein Keane, University of Pennsylvania, School of Arts and Sciences

Need for Identity Finder December 18, 2007 Penn implements new Social Security Number policy  Identify SSN's  Remediate sensitive data Drive to protect University data and to prevent costly, legally mandated, disclosures Tied with the University Security and Privacy Impact Assessment (SPIA) initiative Copyright 2009 Justin C. Klein Keane, University of Pennsylvania, School of Arts and Sciences

Initial Compliance Plan Plan  use open source Cornell Spider tool (v 2.9.5) Challenges  Scalability  Manageability  Remediation  Ease of use  No central management Copyright 2009 Justin C. Klein Keane, University of Pennsylvania, School of Arts and Sciences

Exploring Options Penn SAS Information Security began a year long product evaluation Tested products including Identity Finder, Proventsure, Vontu and Vericept  Talked with McAffee but at the time no solution was available Copyright 2009 Justin C. Klein Keane, University of Pennsylvania, School of Arts and Sciences

Evaluation Criteria Number of false positives Number of false negatives Number of files actually containing PII found Time to scan client Ease of marking false positives across systems with checksums Number of file formats successfully read Copyright 2009 Justin C. Klein Keane, University of Pennsylvania, School of Arts and Sciences

Evaluation Criteria (cont.) Business objects analysis Ability to allow individual admin users to view results from only a specific subset of machines Verify that agent does not require opening incoming ports on the client machine Platforms supported for agent If software has both agent and install-less versions, test capabilities of both Copyright 2009 Justin C. Klein Keane, University of Pennsylvania, School of Arts and Sciences

Evaluation Criteria (cont.) Test if software detects agent MIA Verify that we can turn off copying excerpts / grabbing data / copying actual file Determine how infrastructure would mix with existing infrastructure (can we auth using Active Directory?) Copyright 2009 Justin C. Klein Keane, University of Pennsylvania, School of Arts and Sciences

Identifying Needs Talking to vendors we quickly realized what we didn't want was a Data Loss Prevention (DLP) tool for several reasons:  Overly invasive  Usually required infrastructure  Needed vast customization  Bad for InfoSec's image  Contained features we weren't going to use  Allowed InfoSec to act on end point data Copyright 2009 Justin C. Klein Keane, University of Pennsylvania, School of Arts and Sciences

Identifying Needs (cont.) We found that each product we looked at found SSN's with about the same degree of accuracy This then made secondary factors weigh heavily in our decision:  Ease of management  Total cost of ownership  End user friendliness Copyright 2009 Justin C. Klein Keane, University of Pennsylvania, School of Arts and Sciences

Why We Chose Identity Finder Identity Finder allows end users to sort, search, and control their own scan results Identity Finder presented the end user with remediation options within the tool itself In tests, Identity Finder's ease of use meant users actually acted on data discovered The product continued to mature significantly since we began evaluation Imminent Mac client Copyright 2009 Justin C. Klein Keane, University of Pennsylvania, School of Arts and Sciences

Identity Finder Console Allows central staff to track installations  Allows queries for reports to upper management We have two installers  Quiet only reports installation  Full only reports hits and remediation status, but doesn't reproduce excerpts Console will allow us to build and push custom installation parameters Copyright 2009 Justin C. Klein Keane, University of Pennsylvania, School of Arts and Sciences

Deployment Typically our SSN data is found in older data stores rather than being created  In part thanks to our SPIA efforts Identified 300 target faculty that have been at Penn long enough to have produced SSN based student records Also targeted key administrative staff offices Copyright 2009 Justin C. Klein Keane, University of Pennsylvania, School of Arts and Sciences

Deployment (cont.) Utilize Local Support Providers (LSP's) to install, train users, and help with remediation Tracking deployments via our Console Using Console to identify and follow up with end points that find large stores of sensitive data Console also allows us to collect a central list of known false positives Copyright 2009 Justin C. Klein Keane, University of Pennsylvania, School of Arts and Sciences

Remediation Strategies If sensitive data is found:  It is shredded using Identity Finder's shredding functionality if possible  If data must be retained it is quarantined to a central file server using Identity Finder's quarantine functionality (other possible remediation as well)  We are discouraging encryption due to key escrow concerns  We don't allow sensitive data to be deleted via the Recycle Bin Copyright 2009 Justin C. Klein Keane, University of Pennsylvania, School of Arts and Sciences

Future Deployments Deploy to server administrators for scanning central stores Target central “quarantine” locations for file/folder level encryption Copyright 2009 Justin C. Klein Keane, University of Pennsylvania, School of Arts and Sciences

Alternative Uses of Identity Finder Incident response  Allows us to quickly and accurately determine if backup images contain sensitive data  Not forensically sound, but on backups this is OK Copyright 2009 Justin C. Klein Keane, University of Pennsylvania, School of Arts and Sciences

Other Advantages of Identity Finder Ease of results encryption Identity Finder uses encrypted connections to the central server over port 80 – no firewall issues Identity Finder doesn't require ports to be open on end points Scheduled scans Automatic updates Copyright 2009 Justin C. Klein Keane, University of Pennsylvania, School of Arts and Sciences

Other Advantages of Identity Finder (cont.) Integration with our existing infrastructure Wizard for end users Checking for sensitive data stored from browsers Integration with other client programs to open secured files Copyright 2009 Justin C. Klein Keane, University of Pennsylvania, School of Arts and Sciences

Thank you Copyright 2009 Justin C. Klein Keane, University of Pennsylvania, School of Arts and Sciences