DirectProject Reference Implementation 4.0 Greg Director, Distinguished Engineer, Cerner Corp.

Slides:



Advertisements
Similar presentations
Creating HIPAA-Compliant Medical Data Applications with Amazon Web Services Presented by, Tulika Srivastava Purdue University.
Advertisements

Notes: Update as of 1/13/2010. Vulnerabilities are included for SQL Server 2000, SQL Server 2005, SQL Server Oracle (8i, 9i, 9iR2, 10g, 10gR2,11g),
1 PK-Enabling Toolkits August 27, CSOS Interfaces STATUS CHECKING Network Interface: HTTP Port 80 PKI Interface: PKCS 10 Request PKCS 7 Response.
PKE PP Mike Henry Jean Petty Entrust CygnaCom Santosh Chokhani.
SafeNet Luna XML Hardware Security Module
Hardware Cryptographic Coprocessor Peter R. Wihl Security in Software.
Michelle J. Gosselin, Jennifer Schommer Guanzhong Wang.
Dell Compellent and SafeNet KeySecure
Microsoft Cloud Microsoft Confidential SaaS Office 365 Azure SQL PaaS Azure Storage Azure HDInsight IaaS SQL Server Apache One common problem: “How.
Configuring Windows Vista Security Chapter 3. IE7 Pop-up Blocker Pop-up Blocker prevents annoying and sometimes unsafe pop-ups from web sites Can block.
Information Networking Security and Assurance Lab National Chung Cheng University The Ten Most Critical Web Application Security Vulnerabilities Ryan J.W.
About PKI Key Stores Dartmouth College PKI Lab. Key Store Defined Protected “vault” to hold user’s private key with their copy of their x.509 certificate.
Securing Data Storage Protecting Data at Rest Advanced Systems Group Dell Computer Asia Ltd.
Linux Security.
Portal … from the trenches! Deployment Patterns
Module 4 Managing Client Access. Module Overview Configuring the Client Access Server Role Configuring Client Access Services for Outlook Clients Configuring.
APPX 4.3 Overview. APPX 4.3  System Administration Application Change Management (SCCS) Application Change Management (SCCS) Runtime Process Monitor.
May 30 th – 31 st, 2006 Sheraton Ottawa. Microsoft Certificate Lifecycle Manager Saleem Kanji Technology Solutions Professional - Windows Server Microsoft.
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter Four Configuring Outlook and Outlook Web Access.
Securing Microsoft® Exchange Server 2010
Securing Large Applications CSCI 5931 Web Security Rungang Mo, Yingying Sun.
Hands-On Microsoft Windows Server Security Enhancements in Windows Server 2008 Windows Server 2008 was created to emphasize security –Reduced attack.
SafeNet Protects Data at Rest
1 SCOoffice Server Birds of a Feather Andy Nagle and John Boland.
KMIP - Hardware Security Modules Meta-Data-Only (MDO) Keys Saikat Saha & Denis Pochuev Feb 2012.
Sagar Joshi Senior Security Consultant | ACE Team, Microsoft Information Security
Configuring Encryption and Advanced Auditing
Key Management with the Voltage Data Protection Server Luther Martin IEEE P May 7, 2007.
Shibboleth: Installation and Deployment Scott Cantor July 29, 2002 Scott Cantor July 29, 2002.
Unit 1: Protection and Security for Grid Computing Part 2
A Little More Mihail Stoynov mihail.stoynov.com mihail.stoynov.com.
TWSd - Security Workshop Part I of III T302 Tuesday, 4/20/2010 TWS Distributed & Mainframe User Education April 18-21, 2010  Carefree Resort  Carefree,
Securing Data in Transit and Storage Sanjay Beri Co-Founder & Senior Director of Product Management Ingrian Networks.
Action SecWG1012:9 “Investigate how role-based access, in compliance with FIPS 140-2, can be used by flight crypto systems.” Where this question comes.
Module 7: Advanced Application and Web Filtering.
Security-Enhanced Database Platform. Agenda  Business challenges and needs  SQL Server 2008 features  Trustworthy computing  Surface Area Reduction.
Module 2: Introducing Windows 2000 Security. Overview Introducing Security Features in Active Directory Authenticating User Accounts Securing Access to.
Access control 2/18/2009. TOMCAT Security Model Declarative Security:  the expression of application security external to the application, and it allows.
1 Objectives Discuss File Services in Windows Server 2008 Install the Distributed File System in Windows Server 2008 Discuss and create shared file resources.
Securing the Fortress with Barbican at Symantec Jason Fritcher Principal Infrastructure Engineer Cloud Platform Engineering.
SQL Server 2005 Implementation and Maintenance Chapter 6: Security and SQL Server 2005.
Direct Project Virtual Connect-A-Thon January 2016.
Module 11: Managing Data Storage. Overview Managing File Compression Configuring File Encryption Configuring EFS Recovery Agents Implementing Disk Quotas.
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter One Introduction to Exchange Server 2003.
L Identify the “out-of-the-box” audit settings l Identify recommended minimum audit settings l Configure security event log settings to meet recommendations.
KMIP - Hardware Security Modules Meta-Data-Only (MDO) Keys Saikat Saha & Denis Pochuev Feb 2012.
EMI is partially funded by the European Commission under Grant Agreement RI Common Authentication Library Daniel Kouril, for the CaNL PT EGI TF.
Hands-On Microsoft Windows Server Implementing User Profiles A local user profile is automatically created at the local computer when you log on.
DirectProject Reference Implementation 5.0 Greg Director, Distinguished Engineer, Cerner Corp.
C Copyright © 2007, Oracle. All rights reserved. Security New Features.
EMI is partially funded by the European Commission under Grant Agreement RI Common Authentication Library Daniel Kouril, for the CaNL PT EGI CF.
Ahsay 101.  Software company, based in Hong Kong  Founded in 1999  Sells direct to customers and through partners.
1 © SafeNet Confidential and Proprietary SafeNet KeySecure with Luna HSM Management.
ArcGIS for Server Security: Advanced
Dell Compellent and SafeNet KeySecure
IMAP - Mailbox Access Note – OS & Outlook (2007/2010) should be fully patched with latest service pack and patches.
Implementing Network Access Protection
Common Security Mistakes
KMIP Client Registration Ideas for Discussion
1Z0-477 VCE Questions
CS691 M2009 Semester Project PHILIP HUYNH
IBM Certified WAS 8.5 Administrator
While the audience is gathering. During breaks etc
Step-By-Step: How to Add or Update Affiliation
Platform Architecture
Chapter 10: Advanced Cisco Adaptive Security Appliance
Boston Code Camp – April 2019 Jason Haley
What’s New in Dimension
Presentation transcript:

DirectProject Reference Implementation 4.0 Greg Director, Distinguished Engineer, Cerner Corp

0 To NOW

4.0 Major Features

What’s New Updated Config Service Complete reimplementation of Config service API to RESTful resources. Pluggable authentication model to service API Default RI profile uses a custom BasicAuth configuration. Certificate private keys are now encrypted by default. Supports pluggable secret key access to decypt private keys. New RDBMS Audit Store Replaces log file based auditing and writes audit events to a configurable RDBMS. Supports pluggable auditor implementation via James configuration file.

What’s New PKCS11 Support Supports secret storage in PCKS11 modules. Tested with SafeNet eTokenPro for USB modules and SafeNet Luna 1700 & 7000 for network appliances. Adds FIPS key protection support (tested up to level 3). Future iteration will support cryptographic functions on HSMs, but most likely not make 4.0 release Last Mile Encrytpion Default James 3 config will force SSL for client apps over SMTP, IMAP, and POP3. Not support in James 2.x due to limited SSL support. Numerous Bug Fixes Including: Issues found in MU2 NIST testing XDR/XDM concurrency issues.

Goal To Release in Q1 of 2015 Release