Cloud & Mobile Security

Slides:



Advertisements
Similar presentations
Cloud Computing EDT Cloud Computing Overview Cloud Computing can be defined as a network of applications, services, and infrastructure that are.
Advertisements

© 2009 VMware Inc. All rights reserved VMware Horizon Mobile Intro - NetHope Deepak Puri Director Mobile Business Development +1 (415)
Avaya – Proprietary. Use pursuant to the terms of your signed agreement or Company policy. idEngines® Avaya Identity Engines And Mobile Device Management.
6218 Mobile Devices- Are They Secure Enough for our Patient's Data? Presented By Aaron Hendriks, CISSP Other: Employee of University Health Network, Toronto,
Sophos Mobile Control. Tablets on the rise 2 Trends 3 75% of 157 polled companies encourage employee owned smart phones and tablets to access corporate.
Script Kiddies; CybercrimeCyber-espionage; Cyber-warfare CybercriminalsState sponsored actions; Unlimited resources Attacks on fortune 500All sectors.
Data Devices People 6.5B Wireless connections today >42% of global population owns smartphone by end of 2015 >50% User will go to tablet or smartphone.
CJIS Security Policy.
© 2013 by the McGraw-Hill Companies, Inc. All rights reserved. Chapter 4B Mobile Gear.
Technology on Campus Wireless Amenities Your students have access to wireless across UCF’s main campus. Wireless access in dorm rooms is limited and not.
Cloud Computing Guide & Handbook SAI USA Madhav Panwar.
Managing BYOD Legal IT’s Next Great Challenge. Agenda  The BYOD Trend – benefits and risks  Best practices for managing mobile device usage  Overview.
Sample Diagram.
by Evolve IP Managed Services
Security and Confidentiality Practices - Houston Dept. of Health and Human Services Jerald Harms, MPH, CART and Jeff Meyer, MD, MPH HIV/AIDS Surveillance.
Unit 1- Recognizing Computers.  Understand the importance of computers  Define computers & computer systems  Classify different types of computers.
SELECTING TABLETS FOR ENTERPRISE USE TABLET COMPUTER SELECTION.
August 2012 Windows 8 Pro Copy Guidance. Audience Microsoft Internal OEMs SMB focused MPN partners Not for use until Windows 8 general availability. This.
Your storage on the ground; Your files in the cloud.
Cloud Computing Cloud Computing Class-1. Introduction to Cloud Computing In cloud computing, the word cloud (also phrased as "the cloud") is used as a.
Anil Karmel Deputy Chief Technology Officer National Nuclear Security Administration Streamlined Application Management The Intersection of Cloud and Mobility.
T RI - STATE REGIONAL EXTENSION CENTER A HEALTHBRIDGE REGIONAL COLLABORATION F RIDAY, JUNE 18, 2010 Calculating the Cost and Benefit of Meaningful Use:
ConfidentialPA Testing Mobile Applications A Model for Mobile Testing.
Tim Vander Kooi Systems
2-3 note. 2 Peripheral Devices “Peripheral devices” are hardware plugged into ports or connected to a computer wirelessly. These devices can be for input,
DISCOVER IT PEACE OF MIND Staying HIPAA-Compliant Revised: April 13, 2015.
Explain the purpose of an operating system
Security considerations for mobile devices in GoRTT
T h e U n i v e r s i t y o f S o u t h e r n Q u e e n s l a n d webPads Jeff McDonell Director Information Technology Services University.
Chapter 2 Hardware. Learning Objectives Upon successful completion of this chapter, you will be able to: describe information systems hardware; identify.
Mobility In the Enterprise Friend or Foe? Bob West, CEO, Echelon One 2012 Workshop on Cyber Security and Global Affairs 20 Junio, 2012 Barcelona, España.
Chapter 3 Software. Learning Objectives Upon successful completion of this chapter, you will be able to: Define the term software Describe the two primary.
Enforcing Cyber security in Mobile Applications – Public Sector Use Case SAPHINA MCHOME, VIOLA RUKIZA TANZANIA REVENUE AUTHORITY INFORMATION AND COMMUNICATION.
5/18/2006 Department of Technology Services Security Architecture.
Basics of testing mobile apps
MOBILE DEVICE MANAGEMENT Intracol Technologies AD.
IT as a Service (ITaaS) by Evolve IP Managed Services Last Update: May 19, 2015.
TRUENORTH TECHNOLOGY POLICIES OVERVIEW. This includes but is not limited to : – Games – Non-work related software – Streaming media applications – Mobile.
Introduction TO Network Administration
Configuring, Managing and Maintaining Windows Server® 2008 Servers Course 6419A.
User and Device Management
ITACS L.L.P. Policy And Procedures Group 1. Objective: To establish companywide policy with regards to personal device usage both on and off of the company.
© 2015 IBM Corporation John Guidone Account Executive IBM Security IBM MaaS360.
Why EMS? What benefit does EMS provide O365 customers Manage Mobile Productivity Increase IT ProductivitySimplify app delivery and deployment LOB Apps.
Technical Sales Specialist Software - OS and Applications John R. Moegling Sr. Systems Engineer.
©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. Securing Your Data in Endpoint and Mobile Environments Frank Suijten Security.
Office 365 is cloud- based productivity, hosted by Microsoft. Business-class Gain large, 50GB mailboxes that can send messages up to 25MB in size,
69% of employees say they are accessing business apps on personal devices Organizations say 34% of their employees are accessing business apps on.
Mobile Device Security Management Leyna Belinsky.
Get2Modern A plan for Windows XP & Office 2003 EOS migration in SMB Microsoft Confidential. NDA required.
Managed IT Services JND Consulting Group LLC
Enterprise | education | public printing locations PrinterOn for Manufacturing.
THE OFFICE OF THE LEGAL SERVICES COMMISSIONER The Ethics of Cloud Computing Community Legal Centres 21 May 2013.
Short Customer Presentation September The Company  Storgrid delivers a secure software platform for creating secure file sync and sharing solutions.
WHAT IS CLOUD COMPUTING? Pierce County Library System.
Unified Endpoint Management and Security Mobile Device Management.
DISCOVERING COMPUTERS 2018 Digital Technology, Data, and Devices
Mobile Operating Systems
Census Mobile Data Capture
INTRODUCTION TO COMPUTING
CJIS Security Policy Version 5.4, 10/06/2015
MOBILE DEVICE OPERATING SYSTEM
Introduction to Mobile Devices
11/23/2018 3:03 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
Chapter 3 Software.
IT Management, Simplified
IT Management, Simplified
Cloud Computing for Wireless Networks
Presentation transcript:

Cloud & Mobile Security KCJIS Conference June 8 – 9, 2015 Jeff Campbell FBI CJIS Assistant ISO

What is Cloud Computing? Defined by the CJIS Security Policy as: A distributed computing model that permits on-demand network access to a shared pool of configurable computing resources (i.e., networks, servers, storage, applications, and services), software, and information. There are a few definitions of cloud computing. The CJIS Security Policy defines cloud computing as: A distributed computing model that permits on-demand network access to a shared pool of configurable computing resources (i.e., networks, servers, storage, applications, and services), software, and information. Whenever discussing the cloud and any cloud-offered solutions it should be understood that cloud services can take several forms: a simple application, a platform, or an infrastructure service. Why Cloud? With many state governments looking for ways to attain greater efficiency while grappling with reduced budgets, the idea of cloud computing to maintain data and applications is a very appealing option. Whether driven by economic efficiencies or technological improvements, increasing numbers of organizations are considering transitioning to a cloud environment. There is also a push among the Information Technology (IT) industries of both the private and public sectors to consider employing cloud strategies.

What is Cloud Computing? Cloud Service Models The NIST-defined cloud model also describes the following three service models as those that cloud computing can offer:   Software as a Service (SaaS) Platform as a Service (PaaS) Infrastructure as a Service (IaaS) SaaS comprises end-user applications delivered as a service rather than the traditional, on-premises software (e.g. software that requires being installed on the server or workstation for use). The applications are accessible from various client devices through a thin client interface such as a web browser (e.g., web-based email). The consumer does not manage or control the underlying cloud infrastructure including network, servers, operating systems, storage, or even individual application capabilities, with the possible exception of limited user-specific application configuration settings. PaaS provides an application platform, or middleware, as a service on which developers can build and deploy custom applications (e.g., APIs). The consumer does not manage or control the underlying cloud infrastructure including network, servers, operating systems, or storage, but has control over the deployed applications and possibly application hosting environment configurations. IaaS primarily encompasses the hardware and technology for processing, storage, networks and other fundamental computing resources, delivered as off-premise, on-demand services rather than as dedicated, on-site resources. The consumer does not manage or control the underlying cloud infrastructure but has control over operating systems, storage, deployed applications, and possibly limited control of select networking components (e.g., host firewalls). NOTE: You may hear about other service models, such DaaS or Naas. Tose are marketing ploys. According to NIST, these are the only three. Infrastructure Cabling HVAC Physical Security Platform/OS Windows Linux/Unix Apple Software CAD/RMS Email Productivity

CLOUD COMPUTING Cloud Service Models Cloud Service Models The NIST-defined cloud model also describes the following three service models as those that cloud computing can offer: Infrastructure as a Service (IaaS) Platform as a Service (PaaS) Software as a Service (SaaS) SaaS comprises end-user applications delivered as a service rather than the traditional, on-premises software (e.g. software that requires being installed on the server or workstation for use). The applications are accessible from various client devices through a thin client interface such as a web browser (e.g., web-based email). The consumer does not manage or control the underlying cloud infrastructure including network, servers, operating systems, storage, or even individual application capabilities, with the possible exception of limited user-specific application configuration settings. PaaS provides an application platform, or middleware, as a service on which developers can build and deploy custom applications (e.g., APIs). The consumer does not manage or control the underlying cloud infrastructure including network, servers, operating systems, or storage, but has control over the deployed applications and possibly application hosting environment configurations. IaaS primarily encompasses the hardware and technology for processing, storage, networks and other fundamental computing resources, delivered as off-premise, on-demand services rather than as dedicated, on-site resources. The consumer does not manage or control the underlying cloud infrastructure but has control over operating systems, storage, deployed applications, and possibly limited control of select networking components (e.g., host firewalls). NOTE: You may hear about other service models, such DaaS or Naas. Tose are marketing ploys. According to NIST, these are the only three.

CLOUD COMPUTING How do I choose a Cloud Service Provider? CJIS Security Policy website Cloud Computing Report and Control Catalog CJIS Security Policy, Appendix G.3 Cloud Computing

CLOUD COMPUTING cloud.cio.gov/fedramp GSA held the first of two FedRAMP information days with the first being June 4 for industry, and the next one happening June 10 at the agency's National Capital Region building on 7th and D Streets in Washington, D.C. If you missed the June 4 industry day, here's the slide deck from that event. FISMA Low and Moderate – high level of assurance for crim/noncrim justice community Cloud.cio.gov/fedramp FedRAMP Ready systems – readiness to meet requirements // readiness review // may or may not have done any assessments (3PAO required) // ready to begin a SAF (Security Assessment Framework) FedRAMP In Process – JAB (Joint Auth Board) Provisional Authorization OR Agency Authorization // actively working with government through the SAF (Security Assessment Framework) FedRAMP Compliant systems – JAB Provisional Authorizations and Agency FedRAMP Authorizations // meet FedRAMP requirements cloud.cio.gov/fedramp

CLOUD COMPUTING How will the Cloud Service Provider meet the CJIS Security Policy requirements? Consider things like: Physical Security Encryption Organization Personnel Security

CLOUD COMPUTING How committed will the Cloud Service Provider be to ongoing Policy compliance? Physical security Encryption Personnel Security

CLOUD COMPUTING What does it all mean? Determine what services you can technically virtualize. Email RMS CAD Other CJI applications Legacy systems Consider the Policy impact at each level of cloud services. Infrastructure Platform/OS Software/Applications Determine how you want to use the cloud Consider the Policy impact at each level of cloud services

Delineation of Responsibility/Governance in Cloud Computing What does it all mean? Delineation of Responsibility/Governance in Cloud Computing Delineation of Responsibility/Governance in Cloud Computing Outside of continuing to maintain your own on-premise environment, some level of responsibility and control must be transferred to the cloud service provider. You may maintain some management control within the cloud, but that level of management varies between the differing cloud service models as seen on this slide. On-premise Environment As you can see, you maintain management of everything from the networking to the applications. This is typically what most organizations are still doing today. IaaS (Infrastructure as a Service) Infrastructure as a Service (IaaS) delivers basic storage and compute capabilities as standardized services over the network. Servers, storage systems, switches, routers, and other systems are pooled and made available to handle workloads that range from application components to high-performance computing applications. Example of IaaS market players: Amazon Web Services, Rackspace, Vmware vCloud PaaS (Platform as a Service) Platform as a Service (PaaS) encapsulates a layer of software and provides it as a service that can be used to build higher-level services. Example of PaaS market player: Google AppEngine, Windows Azure Platform, MS SharePoint SaaS (Software as a Service) Software as a Service (SaaS) features a complete application offered as a service on demand. A single instance of the software runs on the cloud and services multiple end users or client organizations. Example of SaaS market player: Gmail, Facebook, Google Docs, Netflix, SalesForce, Office 365 Office 365 Office 365 tends to be considered a SaaS solution, but also integrates with SharePoint which is a PaaS solution. So, it is kind of a hybrid in its capabilities. When reviewing Office 365, evaluate each capability separately.

CLOUD COMPUTING Section 5.10.1.5 Cloud Computing Only two specific “shall” requirements: “The metadata derived from CJI shall not be used by any cloud service provider for any purposes. The cloud service provider shall be prohibited from scanning any email or data files for the purpose of building analytics, data mining, advertising, or improving the services provided.”

CLOUD COMPUTING Questions?

CSP Section 5.13 Mobile Devices MOBILE SECURITY CSP Section 5.13 Mobile Devices AKA: Smartphone / Tablet / Laptop Device Security

Mobile Device Categorization MOBILE SECURITY Mobile Device Categorization FORM FACTOR Large Form Factor – vehicle mount or a carrying case and include a monitor with attached keyboard (MDTs/Laptops) Medium Form Factor – vehicle mount or portfolio sized carry case that typically consist of a touch screen without attached keyboard (Tablets) Small Form Factor –intended for carry in a pocket or ‘holster’ attached to the body (Smartphones)

Mobile Device Categorization MOBILE SECURITY Mobile Device Categorization Operating System (OS) Full-feature OS – Windows, Linux/Unix, Apple OS Limited-feature OS – iOS, Android, BlackBerry Full-feature OS – Windows, Linux/Unix, Apple OSX Limited-feature OS – iOS, Android, BlackBerry

Mobile Device Categorization MOBILE SECURITY Mobile Device Categorization Three categories based on two characteristics Laptop Devices Large form factor Full featured OS Tablet Devices Medium form factor Limited feature OS Tablets will/may have exceptions as newer devices are released that support and run a full-feature OS (windows 10 for example) Pocket/Handheld Mobile Device Small form factor Limited feature OS

Mobile Device Connectivity MOBILE SECURITY Mobile Device Connectivity Three (3) different types based on two (2) technologies Cell primary (always on) plus WiFi “on demand” (i.e. smartphone) WiFi only – always on (i.e. tablet, laptop) WiFi primary plus Cell “on demand” (i.e. tablet/laptop with extra capability)

Who’s Winning the Battle? MOBILE SECURITY Who’s Winning the Battle? Device Manufacturer Operating System Many choices for both OS and platform

Taken from comScore MobiLens June 2014 MOBILE SECURITY Taken from comScore MobiLens June 2014

Taken from comScore MobiLens June 2014 MOBILE SECURITY Taken from comScore MobiLens June 2014

Mobile Device Management MOBILE SECURITY Mobile Device Management 5.13.2 Mobile Device Management (MDM) No devices with unauthorized changes (rooted or jailbroken) Centralized oversight of configuration control, application usage, and device protection and recovery [if so desired by the agency] Minimum MDM controls when allowing CJI access from cell/smart phones and tablet devices MDM – centralized management and oversight EMM – Enterprise Mobility Management // industry shift // broader scope // content management // financial management Requirement is MDM but if your EMM solution provides the capabilities to meet the requirements you’re OK.

Mobile Device Management MOBILE SECURITY Mobile Device Management SMB – Small and mid-sized businesses

Mobile Device Management MOBILE SECURITY Mobile Device Management

Mobile Device Management MOBILE SECURITY Mobile Device Management

MDM and Lifecycle Management MOBILE SECURITY MDM and Lifecycle Management Will talk about MDM lifecycle and how the CSP supports many aspects.

Section 5.9.1 Physically Secure Location MOBILE SECURITY Section 5.9.1 Physically Secure Location “A physically secure location is a facility, a police vehicle,  or an area, a room, or a group of rooms within a facility with both the physical and personnel security controls sufficient to protect CJI and associated information systems.” Police vehicle = enclosed criminal justice conveyance 5.9.1 Physically secure location Add police vehicle Impacts AA situations as well Discuss whole inside/outside the vehicle issue Reminder that the technical controls in 5.5 and 5.10 must be met for AA not to be required Next slides have pics of good and bad

MOBILE SECURITY Potential physically secure location police vehicles

MOBILE SECURITY Non-potential physically secure location police vehicles

COMPENSATING CONTROLS for AA MOBILE SECURITY COMPENSATING CONTROLS for AA Applies only to smartphones and tablets Possession of agency issued device is a required part of control Additional requirements mostly met by MDM Compensating Controls are temporary CSO approval and support required Compensating Controls for AA Applies to smartphones and tablets Possession of agency issued device part of compensation Additional requirements mostly met by MDM

COMPENSATING CONTROLS for AA MOBILE SECURITY COMPENSATING CONTROLS for AA Meet the intent of the CJIS Security Policy AA requirement Provide a similar level of protection or security as the original AA requirement Not rely upon existing requirements for AA as compensating controls Compensating Controls for AA Meet the intent of the CJIS Security Policy AA requirement Provide a similar level of protection or security as the original AA requirement Not rely upon existing requirements for AA as compensating controls

SANS SEC575: Mobile Device Security & Ethical Hacking Takeaways MOBILE SECURITY SANS SEC575: Mobile Device Security & Ethical Hacking Takeaways MDM – must have, even rudimentary Application Management – malware/virus protection WiFi Considerations – just say no, unless absolutely required, cell service more secure MDM – must have, even rudimentary Application Management – malware/virus protection WiFi considerations – just say no, unless absolutely required, cell service more secure Backend is bigger target, not the device No rooting/jailbreaking – breaks inherent security features Backend is Bigger Target – device not so much No Rooting/Jailbreaking – breaks inherent security features

iso@ic.fbi.gov QUESTIONS? Jeff Campbell FBI CJIS Assistant Information Security Officer CJIS Information Assurance Unit (304) 625 - 4961 jeffrey.campbell@ic.fbi.gov iso@ic.fbi.gov