Jericho une approche alternative de la sécurité Bjorn Gronquist (CSO Capgemini) Lyon – 26 novembre 2009 XIVe Symposium de l’Architecture du 16 au 26 novembre.

Slides:



Advertisements
Similar presentations
Creating HIPAA-Compliant Medical Data Applications with Amazon Web Services Presented by, Tulika Srivastava Purdue University.
Advertisements

Network Security Introduction Security technologies protect mission-critical networks from corruption and intrusion. Network security enables new business.
Some general principles in computer security Tomasz Bilski Chair of Control, Robotics and Computer Science Poznań University.
Collaboration Oriented Architecture COA Position Paper An Overview Adrian Seccombe Board of Management, Jericho Forum ® CISO & Snr Enterprise Information.
Technical Review Group (TRG)Agenda 27/04/06 TRG Remit Membership Operation ICT Strategy ICT Roadmap.
HIPAA Security Standards What’s happening in your office?
IT Audit & Identity Management Challenges in a De-perimeterisation Scenario Henry S. Teng, CISSP, CISM Enterprise Security Compliance Officer Philips International.
Security Controls – What Works
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
All Organizations Need to Share and Communicate Information...
Supply Chain Management
CSE 4482, 2009 Session 21 Personal Information Protection and Electronic Documents Act Payment Card Industry standard Web Trust Sys Trust.
Integration of Applications MIS3502: Application Integration and Evaluation Paul Weinberg Adapted from material by Arnold Kurtz, David.
Creating a Secured and Trusted Information Sphere in Different Markets Giuseppe Contino.
Symantec Vision and Strategy for the Information-Centric Enterprise Muhamed Bavçiç Senior Technology Consultant SEE.
Stephen S. Yau CSE , Fall Security Strategies.
ZHRC/HTI Financial Management Training
Cloud Computing Stuart Dillon-Roberts. “In the simplest terms, cloud computing means storing & accessing data & programs over the Internet instead of.
INTRANETS DEFINITION (from Cambridge International Dictionary of English) intra- Combining form used to form adjectives meaning 'within' (the stated place.
© 2012 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks contained herein are trademarks of AT&T Intellectual.
A Robust Health Data Infrastructure P. Jon White, MD Director, Health IT Agency for Healthcare Research and Quality
1 Networks, advantages & types of What is a network? Two or more computers that are interconnected so they can exchange data, information & resources.
Auditing Logical Access in a Network Environment Presented By, Eric Booker and Mark Ren New York State Comptroller’s Office Network Security Unit.
Digital Identity Management Strategy, Policies and Architecture Kent Percival A presentation to the Information Services Committee.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
INFORMATION SECURITY THE NEXT GENERATION 13 th World Electronics Forum Israel Christopher Joscelyne Board Member & Membership Chairman AEEMA November 2007.
SEC835 Database and Web application security Information Security Architecture.
The disappearing perimeter and The need for secure collaboration Bob West Founder and CEO, Echelon One, & Jericho Forum ® Board Member Jericho Forum at.
Cardea Requirements, Authorization Model, Standards and Approach Globus World Security Workshop January 23, 2004 Rebekah Lepro Metz
Copyright © 2006 CyberRAVE LLC. All rights reserved. 1 Virtual Private Network Service Grid A Fixed-to-Mobile Secure Communications Framework Managed Security.
Electronic Commerce & Marketing. What is E-Commerce? Business communications and transactions over networks and through computers, specifically –The buying.
Identity, Management & Federation  Can you ever trust someone you don't manage?  John Arnold Chief Security Architect, Capgemini  Geoff Sweeney CTO,
Roles and Responsibilities
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
Certification and Accreditation CS Phase-1: Definition Atif Sultanuddin Raja Chawat Raja Chawat.
Federated or Not: Secure Identity Management Janemarie Duh Identity Management Systems Architect Chair, Security Working Group ITS, Lafayette College.
The Jericho Forum’s Architecture for De-Perimeterised Security Presentation at CACS 2007 Auckland Prof. Clark Thomborson 10 th September 2007.
Jericho’s Architecture for De-Perimeterised Security Presentation at ISACA/IIA Wellington Prof. Clark Thomborson 27 th July 2007.
HIT Policy Committee NHIN Workgroup Recommendations Phase 2 David Lansky, Chair Pacific Business Group on Health Danny Weitzner, Co-Chair Department of.
ACM 511 Introduction to Computer Networks. Computer Networks.
1 MIIS IAM Nationwide Journey - MIIS & IAM. 2 Agenda 1.Introduction Original objectives Definition of terms 2.MIIS 3.IAM Introduction Definition Approach.
Setting the Foundations  The Jericho Forum “Commandments”  Nick Bleech Rolls Royce & Jericho Forum Board.
12 Steps to Cloud Security A guide to securing your Cloud Deployment Vishnu Vettrivel Principal Engineering Lead,
SOA-39: Securing Your SOA Francois Martel Principal Solution Engineer Mitigating Security Risks of a De-coupled Infrastructure.
9 Systems Analysis and Design in a Changing World, Fourth Edition.
Lecture 24 Wireless Network Security
Lesson 19-E-Commerce Security Needs. Overview Understand e-commerce services. Understand the importance of availability. Implement client-side security.
Jericho Commandments, Future Trends, & Positioning.
HIT Policy Committee NHIN Workgroup HIE Trust Framework: HIE Trust Framework: Essential Components for Trust April 21, 2010 David Lansky, Chair Farzad.
GRID ANATOMY Advanced Computing Concepts – Dr. Emmanuel Pilli.
3/12/2013Computer Engg, IIT(BHU)1 CLOUD COMPUTING-1.
UNCLASSIFIED Service Oriented Architecture, Information Sharing and the FEA DRM 23 January 2006 Bryan Aucoin DNI CIO Chief Architect
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Sicherheitsaspekte beim Betrieb von IT-Systemen Christian Leichtfried, BDE Smart Energy IBM Austria December 2011.
Access Control for Security Management BY: CONNOR TYGER.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
Business Challenges in the evolution of HOME AUTOMATION (IoT)
COMMUNITY-WIDE HEALTH INFORMATION EXCHANGE: HIPAA PRIVACY AND SECURITY ISSUES Ninth National HIPAA Summit September 14, 2004 Prepared by: Robert Belfort,
BizSmart Lunch & Learn Webinar Information Security and Protecting your business With the increased risk of some sort of cyber- attack over the past few.
Stop Those Prying Eyes Getting to Your Data
Data and database administration
Quality Management chapter 27.
© 2013 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. Page 1 Fundamentals of Information Systems.
Current ‘Hot Topics’ in Information Security Governance Auditing
SUPPLIER PARTNERSHIP 2.
IS4680 Security Auditing for Compliance
How to Mitigate the Consequences What are the Countermeasures?
Collaboration Oriented Architecture COA Position Paper An Overview
PLANNING A SECURE BASELINE INSTALLATION
OU BATTLECARD: Oracle Identity Management Training
Presentation transcript:

Jericho une approche alternative de la sécurité Bjorn Gronquist (CSO Capgemini) Lyon – 26 novembre 2009 XIVe Symposium de l’Architecture du 16 au 26 novembre 2009

XIVe Symposium de l’Architecture Du 16 au 26 novembre Page - 1 Introduction  Why does traditional security guys say NO ? Because conventional security is wedded to an outdated industrial model of security.  Jericho Forum: User group that publicises de-perimeterisation and its consequences NOT a standards body Affiliated to the Open Group as a hosted forum Capgemini has board level representation

XIVe Symposium de l’Architecture Du 16 au 26 novembre Page - 2 PART I: Jericho versus Conventional Security The Jericho Forum is a user forum created as a reaction to conventional security approaches To understand Jericho style security we must first understand what the Jericho Forum is reacting to That is the topic of this first presentation: Conventional Security and What’s Wrong with it

XIVe Symposium de l’Architecture Du 16 au 26 novembre Page - 3 The Industrial Security Model  Assets are held within a Perimeter.  Users must enter the perimeter to access the assets.  The perimeter is guarded by a gatehouse  The gate house has a list of the people with access  Employees are the good guys; everyone else must be kept out  Changes to the perimeter, the gate house or the employees are rare  The workers go into the factory once per day

XIVe Symposium de l’Architecture Du 16 au 26 novembre Page - 4 Examples MechanismPerimeterAssetPolicy LockBoxWhat’s in the box Who has the key Guard houseFenceThe site within the fence Who is on the security guard’s list FirewallPerimeterised computer network Information and applications attached to the network The packet filtering configurations on the firewall

XIVe Symposium de l’Architecture Du 16 au 26 novembre Page - 5 Modern Business Trends  User Mobility Users aren’t in a perimeter  Business Agility Physical and organisational perimeters aren’t stable Business processes change constantly  SaaS and Cloud Computing Assets aren’t in a perimeter De-perimeterisation

XIVe Symposium de l’Architecture Du 16 au 26 novembre Page - 6 Perimeterised Security hypothesis versus real world Assets inside the perimeter is guarded by a gatehouse Assets outside the perimeter aren’t protected by a gatehouse on the perimeter Users must enter the perimeter to access the assets. Users need to access assets from anywhere The gate house has a simple list of the people with access Access policies are rich and complex Employees are the good guys; everyone else must be kept out Suppliers and customers need access; employees constitute a potential threat Rare Changes to the perimeter, the gate house or the employees Mergers, de-mergers, joint ventures, shared services are the norm; legislation changes constantly The workers go into the factory once per dayWorkers access an asset once a minute Single business owner sets the access policy for its assets Many different parties have a stake in an information asset Processes are simple and repeatableProcesses are complex and unique

XIVe Symposium de l’Architecture Du 16 au 26 novembre Page - 7 Perimeter based security is outdated  What you forget when you think in terms of perimeter: Laptops outside of the office, new devices (Iphone, USB keys etc…) Guests in you office Social networking activities Cooperation (IM, ) Software as a service Cloud computing  The work condition evolves The Intranet becomes the Internet The work station becomes the Web browser Business process becomes Collaboration

XIVe Symposium de l’Architecture Du 16 au 26 novembre Page - 8 Consequences of the Mismatch  Security is costly Security maintenance is work intensive Business and technical change are complex Difficult to take advantage of new opportunities like cloud computing Difficult to provide access to customers, suppliers and contractors  Assets aren’t properly protected Security does not meet anymore social and legal requirements Lack of partner confidence Frequent security breaches (bypasses of security)

XIVe Symposium de l’Architecture Du 16 au 26 novembre Page - 9 PART 2: Collaboration Oriented Architecture The Jericho Forum has proposed the Collaboration Oriented Architecture (COA) as its response to de-perimeterisation COA unites business, IT and risk management. It defines many new concepts. COA is the topic of this second presentation: Collaboration Oriented Architecture

XIVe Symposium de l’Architecture Du 16 au 26 novembre Page - 10 The Collaboration Oriented Architecture (COA)  Collaborations between different people & services based on Trust Reputation Identity  Examples Surfing, Chatting, Shopping, etc.. Social networking, ing, Reporting, Purchasing, etc..  Privacy

XIVe Symposium de l’Architecture Du 16 au 26 novembre Page - 11 The Collaboration Oriented Architecture (COA)  Principles: Collaboration is the basic unit of security Security based on “risk management” and shall be “transparent to users” Parties, Risks, Identities, Devices and Collaborations all have lifecycles that must be able to pass organisational boundaries transparently and securely

XIVe Symposium de l’Architecture Du 16 au 26 novembre Page - 12 Trusted network Network Access Insiders theft Application vulnerabilities Compliance Residual risks Security Review Model.ppt Page 12 Firewall Content filtering VPN Internet & Partners Perimeter style security IPS

XIVe Symposium de l’Architecture Du 16 au 26 novembre Page - 13 End Point Protection Trust monitor Risk assessment Identity federation Encrypted data transmission Deperimeterized network Page 13 Service Protection Cloud Security Jericho Style Security

XIVe Symposium de l’Architecture Du 16 au 26 novembre Page - 14 Collaborations  The Collaboration generalises concepts of contract and organisation  It comprises Parties that co-operate for a common goal (these can be people, devices or collaborations) Rules governing their interaction (one or more contracts) A redress mechanism to handle non-performance by any party  A collaboration membership has a lifecycle Need Identified Start Potential Collaboration Identified Search Collaboration Agreed Negotiate Terminate FulfilmentTerminated

XIVe Symposium de l’Architecture Du 16 au 26 novembre Page - 15 Trust  Collaborations often have a ‘relying party’ I pay now for my CD and I rely upon Amazon to deliver the CD later  Why are relying parties willing to rely? Because they trust the counterparty Because a redress mechanism is available  Trust means The trusted party has the necessary competence, skills and resources to collaborate The trusted party is well disposed towards the relying party It is in the trusted party’s best interests to collaborate

XIVe Symposium de l’Architecture Du 16 au 26 novembre Page - 16 Reputation  Collaboration Parties want to reduce the risk of their collaborations by choosing good counterparties They need information about other parties before agreeing to collaborate with them  This information is called Reputation and comprises Certifications and Qualifications Criminal Record and Credit History Collaboration History References and Testimonials  Reputation A party’s reputation affects the collaborations it can enter into

XIVe Symposium de l’Architecture Du 16 au 26 novembre Page - 17 The Trust Lifecycle Security Activities

XIVe Symposium de l’Architecture Du 16 au 26 novembre Page - 18 Identity  A party’s identity comprises Reputation (used when agreeing collaborations) Agreed collaborations (used when fulfilling collaborations) These have different uses and different security requirements  Important security decisions Agreeing to collaborate in the basis of reputation Handling resource access requests, or provisioning, on the basis of identity (collaborations + reputation) Updating reputations on the basis of performance in collaborations

XIVe Symposium de l’Architecture Du 16 au 26 novembre Page - 19 Examples  Buy a CD from Amazon.com A short term low risk collaboration  Search phase – Google or Amazon search  Negotiate phase – shopping card  Fulfilment – payment and delivery Reputation – amazon.com site certificate Contract – recorded internally by Amazon  Employment A long term medium risk collaboration  Search phase – monster.com, head-hunter  Negotiate phase – interviews  Fulfilment – A sequence of tasks directed by management, each of which is like a sub- collaboration Reputation – references, qualifications, word of mouth, appraisals, (linkedin.com) Contract – recorded in HR system, user directory

XIVe Symposium de l’Architecture Du 16 au 26 novembre Page - 20 Conclusion: Challenges for COA  Collaboration contracts are recorded in different places: Procurement documentation User directories Financial accounts HR systems  Reputation is little understood at this time: Little automation Not widely recognised as a business process Often one very poorly

XIVe Symposium de l’Architecture Du 16 au 26 novembre Page - 21 Thank You

XIVe Symposium de l’Architecture Du 16 au 26 novembre Page You experience - Thriving on Data - Sector as a Service - Process on the Fly - Invisible Infostructure - From Transaction to Interaction Technovision 2012 Clusters

XIVe Symposium de l’Architecture Du 16 au 26 novembre Page - 23 About the Jericho Forum  A user group that publicises de-perimeterisation and its consequences NOT a standards body Affiliated to the Open Group as a hosted forum Capgemini has board level representation on the Forum and has contributed significantly to it.  The Jericho Forum advocates COA The Jericho Forum acknowledges de-perimeterisation

XIVe Symposium de l’Architecture Du 16 au 26 novembre Page - 24 Jericho is based on 11 commandments The scope and level of protection should be specific & appropriate to the asset at risk Business demands that security enables business agility and is cost effective whereas boundary firewalls may continue to provide basic network protection, individual systems and data will need to be capable of protecting themselves. In general, it’s easier to protect an asset the closer protection is provided Security mechanisms must be pervasive, simple, scalable & easy to manage Unnecessary complexity is a threat to good security Coherent security principles are required which span all tiers of the architecture Security mechanisms must scale; from small objects to large objects To be both simple and scalable, interoperable security “building blocks” need to be capable of being combined to provide the required security mechanisms Unnecessary complexity is a threat to good security Coherent security principles are required which span all tiers of the architecture Security mechanisms must scale; from small objects to large objects To be both simple and scalable, interoperable security “building blocks” need to be capable of being combined to provide the required security mechanisms Assume context at your peril Security solutions designed for one environment may not be transferable to work in another. Thus it is important to understand the limitations of any security solution. Problems, limitations and issues can come from a variety of sources, including geographic, legal, technical, acceptability of risk, etc. Page 24

XIVe Symposium de l’Architecture Du 16 au 26 novembre Page - 25 Jericho is based on 11 commandments Devices and applications must communicate using open, secure protocols Security through obscurity is a flawed assumption - secure protocols demand open peer review to provide robust assessment and thus wide acceptance and use. The security requirements of confidentiality, integrity and availability (reliability) should be assessed and built in to protocols as appropriate, not added-on. Encrypted encapsulation should only be used when appropriate and does not solve everything. Security through obscurity is a flawed assumption - secure protocols demand open peer review to provide robust assessment and thus wide acceptance and use. The security requirements of confidentiality, integrity and availability (reliability) should be assessed and built in to protocols as appropriate, not added-on. Encrypted encapsulation should only be used when appropriate and does not solve everything. All devices must be capable of maintaining their security policy on an untrusted network A “security policy” defines the rules with regard to the protection of the asset Rules must be complete with respect to an arbitrary context Any implementation must be capable of surviving on the raw Internet, e.g., will not break on any input A “security policy” defines the rules with regard to the protection of the asset Rules must be complete with respect to an arbitrary context Any implementation must be capable of surviving on the raw Internet, e.g., will not break on any input All people, processes, technology must have declared and transparent levels of trust for any transaction to take place Trust in this context is establishing understanding between contracting parties to conduct a transaction and the obligations this assigns on each party involved Trust models must encompass people/organizations and devices/infrastructure Trust level may vary by location, transaction type, user role and transactional risk Trust in this context is establishing understanding between contracting parties to conduct a transaction and the obligations this assigns on each party involved Trust models must encompass people/organizations and devices/infrastructure Trust level may vary by location, transaction type, user role and transactional risk Page 25

XIVe Symposium de l’Architecture Du 16 au 26 novembre Page - 26 Jericho is based on 11 commandments Mutual trust assurance levels must be determinable Devices and users must be capable of appropriate levels of (mutual) authentication for accessing systems and data Authentication and authorisation frameworks must support the trust model Devices and users must be capable of appropriate levels of (mutual) authentication for accessing systems and data Authentication and authorisation frameworks must support the trust model Authentication, authorization and accountability must interoperate / exchange outside of your locus / area of control People/systems must be able to manage permissions of resources and rights of users they don't control There must be capability of trusting an organisation, which can authenticate individuals or groups, thus eliminating the need to create separate identities In principle, only one instance of person / system / identity may exist, but privacy necessitates the support for multiple instances, or once instance with multiple facets Systems must be able to pass on security credentials /assertions Multiple loci (areas) of control must be supported People/systems must be able to manage permissions of resources and rights of users they don't control There must be capability of trusting an organisation, which can authenticate individuals or groups, thus eliminating the need to create separate identities In principle, only one instance of person / system / identity may exist, but privacy necessitates the support for multiple instances, or once instance with multiple facets Systems must be able to pass on security credentials /assertions Multiple loci (areas) of control must be supported Access to data should be controlled by security attributes of the data itself Attributes can be held within the data (DRM/Metadata) or could be a separate system Access / security could be implemented by encryption Some data may have “public, non-confidential” attributes Access and access rights have a temporal component Attributes can be held within the data (DRM/Metadata) or could be a separate system Access / security could be implemented by encryption Some data may have “public, non-confidential” attributes Access and access rights have a temporal component Page 26

XIVe Symposium de l’Architecture Du 16 au 26 novembre Page - 27 Jericho is based on 11 commandments Data privacy (and security of any asset of sufficiently high value) requires a segregation of duties/privileges Permissions, keys, privileges etc. must ultimately fall under independent control, or there will always be a weakest link at the top of the chain of trust Administrator access must also be subject to these controls Permissions, keys, privileges etc. must ultimately fall under independent control, or there will always be a weakest link at the top of the chain of trust Administrator access must also be subject to these controls By default, data must be appropriately secured when stored, in transit and in use Removing the default must be a conscious act High security should not be enforced for everything; “appropriate” implies varying levels with potentially some data not secured at all Removing the default must be a conscious act High security should not be enforced for everything; “appropriate” implies varying levels with potentially some data not secured at all Page 27

XIVe Symposium de l’Architecture Du 16 au 26 novembre Page - 28 “The Forum is dedicated to the idea that success in today’s business environment is dependant upon the ability to collaborate and do business by enabling the secure flow of data over the Internet. But today’s business requirement for the flow of data between mobile workforces, customers, suppliers and business partners, has eroded the ability of traditional perimeter security solutions to protect our systems. To enable business to embrace the Internet while protecting valuable company information, new security models are needed to address this challenge.” “De-perimeterization has happened, is happening and is inevitable; central protection is decreasing in effectiveness”

XIVe Symposium de l’Architecture Du 16 au 26 novembre Page - 29 Arial 24