Download presentation
Presentation is loading. Please wait.
1
Fourth ICT Security Conference 2017
IT Security Controls Endpoint Security Luka Milinković, IT Auditor Komercijalna banka AD Beograd
2
If we want to protect access to corporate resources and information, we need to properly manage security endpoints. We need to define and implement the necessary IT security controls. IT security controls
3
problems Malicious software Data leakage
What can happen if IT security controls are not well-defined or non-existent? problems
4
Rules and Exceptions We have rules and exceptions
Sometimes rules are not a problem But exceptions can be Rules and Exceptions
5
Examples BYOD, BYOPC, BYOP, BYOT
Corporate computers and mobile devices Personal computer and mobile device Work in cloud Examples
6
Computer protection basic rules
Lock the computer (automatic) Antivirus protection (send boxing) Computer protection basic rules
7
Computer protection AdvanceD rules
Protection of interfaces – USB and memory slots are locked Hard disk encryption – laptop, notebook Computer protection AdvanceD rules
8
Computer protection AdvanceD rules
Restriction of internet traffic – Security Web Gateway (proxy server), LAN, IP addresses WiFi in the company – Out of the corporate network Internet (LAN, WiFi) out of the company through the VPN Computer protection AdvanceD rules
9
Computer protection Exceptions
It is necessary to know who is delegated (owner) to approve requirements that different from the rules and when is it justified Internet traffic – Bypassing of SWG Computer protection Exceptions
10
Computer protection Exceptions
USB flash memory is allowed, but disabled functions are read, write or delete Company’s USB flash memory Restriction of USB flash memory by serial number Hardware encryption of USB flash memory Computer protection Exceptions
11
Corporate e-mail E-mail protection (spam, phishing…)
Internal or external server OWA (Outlook Web Access) service on the phone PIN for mobile – Exchange can force the screen lock on the devices Mobile Device Management (MDM) Corporate
12
Mobile Devices phones and tablets
Lock the devices (automatic) Data protection – encryption Disable installation of applications Remotely delete phone data Internet traffic through APN (automatic VNP) – service by mobile provider Mobile Devices phones and tablets
13
Mobile Devices phones and tablets
Protection of conversation and attachments on the phone PIN for mobile – Exchange can force the screen lock on the devices Mobile Device Management (MDM) Mobile Devices phones and tablets
14
SOLUTIONS Malicious software protection
Protection of interfaces – USB and memory slots are locked Read, write, delete functions USB flash memory with hardware encryption SOLUTIONS Malicious software protection
15
SOLUTION Data leakage protection
Unintentional data leakage Hard disk encryption USB flash memory encryption and/or restriction of USB flash memory by serial number SOLUTION Data leakage protection
16
Education of employees
Our company is secure as much as secure our weakest employee Education of employees
17
IT Security Controls – Endpoint Security
Fourth ICT Security Conference 2017 Thank you! IT Security Controls – Endpoint Security Luka Milinković, IT Auditor Komercijalna banka AD Beograd
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.