Javier Salido, CIPP Sr. Program Manager Trustworthy Computing Group Microsoft Corporation SESSION CODE: SIA337.

Slides:



Advertisements
Similar presentations
29e CONFÉRENCE INTERNATIONALE DES COMMISSAIRES À LA PROTECTION DES DONNÉES ET DE LA VIE PRIVÉE 29 th INTERNATIONAL CONFERENCE OF DATA PROTECTION AND PRIVACY.
Advertisements

Health Insurance Portability and Accountability Act (HIPAA)HIPAA.
HIPAA: FEDERAL REGULATIONS REGARDING PATIENT SECURITY.
Security Controls – What Works
Information Security Policies and Standards
6/4/2015National Digital Certification Agency1 Security Engineering and PKI Applications in Modern Enterprises Mohamed HAMDI National.
Developing a Records & Information Retention & Disposition Program:
August 9, 2005 UCCSC IT Security at the University of California A New Initiative Jacqueline Craig. Director of Policy Information Resources and.
Chapter 9 Information Systems Controls for System Reliability— Part 2: Confidentiality and Privacy Copyright © 2012 Pearson Education, Inc. publishing.
First Practice - Information Security Management System Implementation and ISO Certification.
Stephen S. Yau CSE , Fall Security Strategies.
Brian Bradley.  Data is any type of stored digital information.  Security is about the protection of assets.  Prevention: measures taken to protect.
Session 3 – Information Security Policies
Copyright © 2015 Pearson Education, Inc. Confidentiality and Privacy Controls Chapter
Securing and Auditing Cloud Computing Jason Alexander Chief Information Security Officer.
Ferst Center Incident Incident Identification – Border Intrusion Detection System Incident Response – Campus Executive Incident Response Team Incident.
Elements of Internal Controls Preventing Fraud, Waste, and Abuse in Urban and Rural Transit Systems.
Security Risk Management Marcus Murray, CISSP, MVP (Security) Senior Security Advisor, Truesec
Avanade: 10 tips for å sikring av dine SQL Server databaser Bernt Lervik Infrastructure Architect Avanade.
Information Security Compliance System Owner Training Richard Gadsden Information Security Office Office of the CIO – Information Services Sharon Knowles.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Lesson 8-Information Security Process. Overview Introducing information security process. Conducting an assessment. Developing a policy. Implementing.
General Awareness Training
Information Security Update CTC 18 March 2015 Julianne Tolson.
Evolving IT Framework Standards (Compliance and IT)
Basics of OHSAS Occupational Health & Safety Management System
HIPAA COMPLIANCE WITH DELL
What Keeps You Awake at Night Compliance Corporate Governance Critical Infrastructure Are there regulatory risks? Do employees respect and adhere to internal.
Security Baseline. Definition A preliminary assessment of a newly implemented system Serves as a starting point to measure changes in configurations and.
WHEN TITLE IS NOT A QUESTION N O ‘WE CAN’ WHEN TITLE IS NOT A QUESTION N O ‘WE CAN’ WHEN TITLE IS NOT A QUESTION N O ‘WE CAN’ Identity and Privacy: the.
Dell Connected Security Solutions Simplify & unify.
1 Secure Commonwealth Panel Health and Medical Subpanel Debbie Condrey - Chief Information Officer Virginia Department of Health December 16, 2013 Virginia.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
Environment for Information Security n Distributed computing n Decentralization of IS function n Outsourcing.
Certification and Accreditation CS Phase-1: Definition Atif Sultanuddin Raja Chawat Raja Chawat.
April 14, A Watershed Date in HIPAA Privacy Compliance: Where Should You Be in HIPAA Security Compliance and How to Get There… John Parmigiani National.
Mark Estberg, John Howie Senior Directors Microsoft Corporation SESSION CODE: SIA317.
Joe SchulmanAdrienne WuProgram ManagerMicrosoft Corporation SESSION CODE: SIA319.
LeToia Crozier, Esq., CHC Vice President, Compliance & Regulatory Affairs Corey Wilson Director of Technical Services & Security Officer Interactive Think.
Ali Pabrai, CISSP, CSCS ecfirst, chairman & ceo Preparing for a HIPAA Security Audit.
Office of Campus Information Security Driving a Security Architecture by Assessing Risk Stefan Wahe Sr. Information Security Analyst.
Cloud Computing Security Keep Your Head and Other Data Secure in the Cloud Lynne Pizzini, CISSP, CISM, CIPP Information Systems Security Officer Information.
1 Chapter Nine Conducting the IT Audit Lecture Outline Audit Standards IT Audit Life Cycle Four Main Types of IT Audits Using COBIT to Perform an Audit.
Jim Harrison Program Manager, Forefront TMG Microsoft Corporation SESSION CODE: SIA325.
12 Steps to Cloud Security A guide to securing your Cloud Deployment Vishnu Vettrivel Principal Engineering Lead,
SOA-39: Securing Your SOA Francois Martel Principal Solution Engineer Mitigating Security Risks of a De-coupled Infrastructure.
NON-COMPULSORY BRIEFING SESSION REQUEST FOR INFORMATION: ICT SECURITY SOLUTIONS RAF /2015/00019 Date: 29 September 2015 Time: 10:00.
Converting Policy to Reality Designing an IT Security Program for Your Campus 2 nd Annual Conference on Technology and Standards May 3, 2005 Jacqueline.
IT Security. What is Information Security? Information security describes efforts to protect computer and non computer equipment, facilities, data, and.
International Security Management Standards. BS ISO/IEC 17799:2005 BS ISO/IEC 27001:2005 First edition – ISO/IEC 17799:2000 Second edition ISO/IEC 17799:2005.
Implications of Privacy Risks in IT and Operations Virginie Hupé Strategist, Trustworthy Computing Microsoft Corporation.
Information Security Measures Confidentiality IntegrityAccessibility Information cannot be available or disclosed to unauthorized persons, entities or.
Information Security Framework Regulatory Compliance and Reporting Auditing and Validation Metrics Definition and Collection Reporting (management, regulatory,
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Keep Your Information Safe! Josh Heller Sr. Product Manager Microsoft Corporation SIA206.
Sicherheitsaspekte beim Betrieb von IT-Systemen Christian Leichtfried, BDE Smart Energy IBM Austria December 2011.
Information Security tools for records managers Frank Rankin.
The Health Insurance Portability and Accountability Act of 1996 “HIPAA” Public Law
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
INFORMATION ASSURANCE POLICY. Information Assurance Information operations that protect and defend information and information systems by ensuring their.
An Overview on Risk Management
Cloud Security– an overview Keke Chen
Security Standard: “reasonable security”
Paul Woods Chair, MITIGATION: Ensuring we procure cloud services taking into account of the risks involved Paul Woods Chair, ISNorthEast.
County HIPAA Review All Rights Reserved 2002.
IBM GTS Storage Security and Compliance overview.
Managing IT Risk in a digital Transformation AGE
General Data Protection Regulation “11 months in”
IT Management Services Infrastructure Services
Presentation transcript:

Javier Salido, CIPP Sr. Program Manager Trustworthy Computing Group Microsoft Corporation SESSION CODE: SIA337

*Source: Ponemon study, “Cost of a Data Breach,” January

*Source: Joshua Gómez, Travis Pinnick and Ashkan Soltani, “KnowPrivacy,” June

*Source: Joshua Gómez, Travis Pinnick and Ashkan Soltani, “KnowPrivacy,” June

People Executive management commitment Engaged management team Integrated governance organization Trained, aware, and accountable DGPC “Aware ” Culture Process Structured and repeatable processes Practical and enforceable policies Harmonized frameworks and standards Effective internal control environment DGPC Embedded in Processes Technology Secure infrastructure Identity and access control Information protection Auditing and reporting DGPC Enabled in Technology DGPC Framework

Manage DGPC Organization Manage DGPC Requirements Manage DGPC Strategy & Policies Manage DGPC Control Environment Integrated GRC Authority Documents Requirements Business Data Data Compliance Harmonized GRC Guidance (e.g. UCF) DGPC Controls Manual Controls Technical Controls DGPC Strategy Data Privacy & Confidentiality Principles DGPC Policies (Data Classification) GRC Authority Documents External regulations Control Frameworks Security & Privacy Standards Business Strategy

Transfer (New Lifecycle) Collect UpdateDelete Process Transfer

Safeguards against malware Safeguards against unauthorized access to sensitive info Protect systems from evolving threats Protect personal information from unauthorized access or use Provide management controls for identity, access and provisioning Protect sensitive personal information in structured databases Protect sensitive personal information in unstructured documents, messages and records, through encryption Protect data while on the net Monitor to verify integrity of systems and data Monitor to verify compliance with business processes Information Protection Auditing and reporting Secure Infrastructure Identity and Access Control

Information Protection Auditing and reporting Secure Infrastructure Identity and Access Control Manual Controls 1.Honor policies throughout the information lifecycle 2.Minimize risk of data misuse 3.Minimize impact of data loss 4.Demonstrate effectiveness of data protection policies and measures

Establish a context for analysis Identify (model) potential threats Analyze risks Determine risk treatment Evaluate effectiveness Clearly define the business purpose of the flow Identify privacy, security and compliance objectives for the flow Identify systems using the data

Log Storage Application Server Cloud Provider Customer

Establish a context for analysis Identify (model) potential threats Analyze risks Determine risk treatment Evaluate effectiveness Diagram of flow Threat Identification Data Flow Diagrams (DFD) Data stores & Data Flows Place Trust Boundaries!

Log Storage Application Server Cloud Provider Customer Trust Boundary

Establish a context for analysis Identify (model) potential threats Analyze risks Determine risk treatment Evaluate effectiveness Diagram of flow Threat Identification How to do this without being an expert? Use a method to step through Get specific about threats

Choice and Consent Options have to be displayed clearly in order to obtain appropriate consent Access and Correction Customer not able to view/modify personal information Accountability Customer PII is not properly classified Compliance Compliance reports not defined, escalation path to business owners is not specified Information Protection Customer information is sent in the clear, over unauthenticated channel Data Quality Quality depends on customer, no threat See Microsoft’s Application Privacy Assessment:

See Microsoft’s IT Infrastructure Threat Modeling Guide:

Establish a context for analysis Identify (model) potential threats Analyze risks Determine risk treatment Evaluate effectiveness Build the Risk/Gap analysis matrix Apply existing mitigations Identify residual risk

Servers are on regular OS and App. Patch cycle, and up- to-date in malware signatures (2) Incoming data is correctly classified and tagged as per customer choice and consent (1,2) Choices are displayed and consent obtained as per MPSD guide (1) Transaction log data is encrypted in transit and at rest (3,4) All material transactions are to be logged as per logging framework (3,4) Communications channel to, and log servers are monitored. Failover process to local log servers in processor facilities is up and running (4) Information Protection Auditing and reporting Secure Infrastructure Identity and Access Control Manual Controls

Establish a context for analysis Identify (model) potential threats Analyze risks Determine risk treatment Evaluate effectiveness Identify additional mitigations Determine risk treatment Mitigate Transfer Assume

Servers are on regular OS and App. Patch cycle, and up- to-date in malware signatures Incoming data is correctly classified and tagged as per customer choice and consent All transactions to take place on authenticated communications channel (2) Choices are displayed and consent obtained as per MPSD guide Transaction log data is encrypted in transit and at rest All material customer transactions arrive over encrypted comms channel (2) All material transactions are to be logged as per logging framework Communications channel to, and log servers are monitored. Failover process to local log servers in processor facilities is up and running Alerts and alert recipients defined and operational (3,4) Set of access and use reports, along with recipients and deliver schedules are defined (3,4) Define escalation path for issues (3,4) Information Protection Auditing and reporting Secure Infrastructure Identity and Access Control Manual Controls

Establish a context for analysis Identify (model) potential threats Analyze risks Determine risk treatment Evaluate effectiveness Ensure you are covering the entire data lifecycle Examine each trust boundary Have you made a clear decision of how each risk will be treated? Are mitigations done right?

Trustworthy Computing

Network Storage Server Application Virtual Machine Application Server Storage Network Application Virtual Machine Server Storage Network Server Storage Network Virtual Machine Application Mather, Kumaraswamy and Latif, “Cloud Security and Privacy,” O’Reilly 2009

Ask to see independent third party audits and attestations Understand what exactly what the certification/attestation is verifying ISO SAS 70 Type I and Type II Understand what is covered and what is not covered Coverage of the platform does not imply coverage of applications

Safeguards against malware (filtering: spam, antivirus, firewalls) Protect systems from evolving threats (patching and testing) Virtualization how is it used (depends on service type) PaaS development process from security/privacy perspective Roles and responsibilities between you and provider Provisioning and administration of accounts Model: Role/group based, least privilege Monitoring and auditing of accounts Provider access to your data Roles and responsibilities between you and provider Information Protection Auditing and reporting Secure Infrastructure Identity and Access Control Encryption of data while in storage and in transit Key management Data integrity and backups, data disposal methods Data collection and retention by provider Data loss/leakage prevention Roles and responsibilities between you and provider What can be monitored and reported by provider? How does that meet your compliance needs? Roles and responsibilities between you and provider

Sign up for Tech·Ed 2011 and save $500 starting June 8 – June 31 st You can also register at the North America 2011 kiosk located at registration Join us in Atlanta next year