Download presentation
Presentation is loading. Please wait.
Published byBenjamin York Modified over 8 years ago
1
Information Security KRISHNAKUMAR RAGHAVAN (KK) NASWA's Information Technology Support Center 1
2
■ Confidentiality o Ability to hide information from unauthorized access. ■ Integrity o Maintaining consistency, accuracy and trustworthiness of data over its entire lifecycle. ■ Availability o Information requested is readily available to authorized entity NASWA's Information Technology Support Center 2 CIA TRIAD CIA triad no longer adequately address security of changing technology environment
3
Identity & Access Management o An enterprise access management system with the capability of identity provisioning, identifying and authorizing users and systems Intrusion Prevention System Confidentiality NASWA's Information Technology Support Center 3 Security ControlIRS 1075 GuidanceNIST Reference IA-7: Cryptographic Module Authentication The information system uses mechanisms for authentication to a cryptographic module that meet the requirements of applicable federal laws, Executive Orders, directives, policies, regulations, standards, and guidance for such authentication. NIST 800-53 - Recommended Security Controls for Federal Information Systems. FIPS 140-2 – Security Requirements for Cryptographic Modules
4
Public Key Infrastructure o An enterprise PKI infrastructure to assure cryptography during data acquisition, transit and rest. o Non Repudiation – digital signature, encryption and checksum using hash o Transport Layer Security (TLS)/Secured Socket Layer (SSL) Nonce o Avoid replay attacks Auditing o Logging, Social Engineering NASWA's Information Technology Support Center 4 Integrity
5
Security ControlIRS 1075 GuidanceNIST Reference SC-8: Transmission IntegrityThe information system protects the integrity of transmitted information. NIST 800-52 – guidance on the use of Transport Layer Security (TLS) NIST 800-77 – guidance on the use of Ipsec SC-9: Transmission ConfidentialityThe information system protects the confidentiality of transmitted information. NIST 800-52 – guidance on the use of Transport Layer Security (TLS) NIST 800-77 – guidance on the use of IPsec NIST 800-77 – guidance on the use of Ipsec SC-12: Cryptographic Key Establishment and Management When cryptography is required and employed within the information system, the organization establishes and manages cryptographic keys using automated mechanisms with supporting procedures or manual procedures. NIST 800-56 – guidance on cryptographic key establishment NIST 800-57 – guidance on cryptographic key management NIST 800-77 – guidance on the use of Ipsec SC-13: Use of CryptographyValidation certificates issued by the NIST Cryptographic Module Validation Program (including FIPS 140-1, FIPS 140-2, and future amendments) remain in effect and the modules remain available for continued use and purchase until a validation certificate is specifically revoked. FIPS 140-2 – Security Requirements for Cryptographic Modules NIST 800-77 – guidance on the use of Ipsec SC-17: Public Key Infrastructure Certificates User certificates, each agency either establishes an agency certification authority cross-certified with the Federal Bridge Certification Authority at medium assurance or higher or uses certificates from an approved, shared service provider, as required by OMB Memorandum 05-24 NIST 800-32 – guidance on public key technology NASWA's Information Technology Support Center 5 Integrity Security Controls
6
Enterprise Monitoring systems o Intrusion Detection System – NIST 800-94 o Vulnerability assessment tools – NIST 800-39 o Malicious software detection systems – NIST 800-39 Risk Management – NIST 800-39 o Enterprise patch management NIST 800-40 o Enterprise Firewall management NIST 800-41 o Configuration management NIST 800-128 NASWA's Information Technology Support Center 6 Availability
7
Tools o CA Site minder o Oracle Access Manager o IBM o Dell o Sail Point o ForgeRock (Open Source) NASWA's Information Technology Support Center 7 Identity and Access Management
8
OpenSSL NetBeans NASWA's Information Technology Support Center 8 Public Key Infrastructure
9
NASWA's Information Technology Support Center 9 Non Repudiation
10
NASWA's Information Technology Support Center 10 Intrusion detection and prevention systems
11
NASWA's Information Technology Support Center 11 Capabilities of IDS
12
NASWA's Information Technology Support Center 12 Questions
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.