Evolution Of The Need For IAM. Securing connections between people, applications, and networks

Similar documents
Firewalls Network Security: Firewalls and Virtual Private Networks CS 239 Computer Software March 3, 2003

n Learn about the Security+ exam n Learn basic terminology and the basic approaches n Implement security configuration parameters on network

90% 191 Security Best Practices. Blades. 52 Regulatory Requirements. Compliance Report PCI DSS 2.0. related to this regulation

Integrated Access Management Solutions. Access Televentures

Crash course in Azure Active Directory

Advanced Security Measures for Clients and Servers

Introduction. The Safe-T Solution

Defense-in-Depth Against Malicious Software. Speaker name Title Group Microsoft Corporation

Securing Remote Access to IT Resources

Securing the Empowered Branch with Cisco Network Admission Control. September 2007

intelop Stealth IPS false Positive

CISNTWK-440. Chapter 5 Network Defenses

Simple and Powerful Security for PCI DSS

Oracle Payment Interface Token Proxy Service Security Guide Release 6.1 E November 2017

IBM Secure Proxy. Advanced edge security for your multienterprise. Secure your network at the edge. Highlights

Protect Your Application with Secure Coding Practices. Barrie Dempster & Jason Foy JAM306 February 6, 2013

CompTIA Security+ Certification

Protecting Information Assets - Week 10 - Identity Management and Access Control. MIS 5206 Protecting Information Assets

Securing CS-MARS C H A P T E R

Security+ SY0-501 Study Guide Table of Contents

Network Security: Firewall, VPN, IDS/IPS, SIEM

CyberP3i Course Module Series

Introduction to Information Security Prof. V. Kamakoti Department of Computer Science and Engineering Indian Institute of Technology, Madras

SailPoint IdentityIQ Integration with the BeyondInsight Platform. Providing Complete Visibility and Auditing of Identities

Secure VPNs for Enterprise Networks

Securing Access to Network Devices

EBOOK 4 TIPS FOR STRENGTHENING THE SECURITY OF YOUR VPN ACCESS

Why the cloud matters?

Chapter Three test. CompTIA Security+ SYO-401: Read each question carefully and select the best answer by circling it.

Implementing Cisco Network Security (IINS) 3.0

Application security : going quicker

PASS4TEST. IT Certification Guaranteed, The Easy Way! We offer free update service for one year

Top-Down Network Design

Agenda. Introduction. Key Concepts. The Role of Internal Auditors. Business Drivers Identity and Access Management Background

Inspection of Router-Generated Traffic

CommandCenter Secure Gateway

Network-Based Application Recognition

Computer Network Vulnerabilities

VMware vcloud Air SOC 1 Control Matrix

McAFEE PROFESSIONAL SERVICES. Unisys ClearPath OS 2200 Security Assessment White Paper

PASS4TEST. IT Certification Guaranteed, The Easy Way! We offer free update service for one year

Device Discovery for Vulnerability Assessment: Automating the Handoff

Industrial Defender ASM. for Automation Systems Management

Global Information Assurance Certification Paper

Recommendations for Device Provisioning Security

Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data

Integrating Hitachi ID Suite with WebSSO Systems

Identity, Authentication and Authorization. John Slankas

Certified Vulnerability Assessor

SEL-3620 ETHERNET SECURITY GATEWAY

Security in the Privileged Remote Access Appliance

Application Defense: An emerging Security Concept

Barracuda Networks Portfolio. Bartłomiej Moczulski Sales Engineer CEE

Welcome to the SafeNet Executive Day! Новые ГоризонтыИнформа ционной Безопасности

Beyond the F.U.D. How to start securing your DCS network today.

10 FOCUS AREAS FOR BREACH PREVENTION

MU2a Authentication, Authorization & Accounting Questions and Answers with Explainations

LogRhythm Addendum to VMware Solution Guide for Payment Card Industry Data Security Standard

Activating Intrusion Prevention Service

Education Network Security

Lecture 3 - Passwords and Authentication

Advanced Security and Mobile Networks

Checkpoint Exam Check Point NG with Application Intelligence - Management I Version: 3.2 [ Total Questions: 241 ]

INCREASE APPLICATION SECURITY FOR PCI DSS VERSION 3.1 SUCCESS AKAMAI SOLUTIONS BRIEF INCREASE APPLICATION SECURITY FOR PCI DSS VERSION 3.

RADIUS Grows Up. Identity Management for Networks Secure IT Sean Convery Identity Engines

Security Assessment Checklist

Reviewer s guide. PureMessage for Windows/Exchange Product tour

Understanding Perimeter Security

Network Security and Cryptography. December Sample Exam Marking Scheme

Secure wired and wireless networks with smart access control

the SWIFT Customer Security

NEXT GENERATION SOLUTION FOR NETWORK ACCESS MANAGEMNT & CONTROL

Joe Stocker, CISSP, MCITP, VTSP Patriot Consulting

Executive Summary Spear 150 Spear Street, Street, Suite 1400, San Francisco, CA CA

AN IPSWITCH WHITEPAPER. The Definitive Guide to Secure FTP

Stripe Terminal Implementation Guide

Hackproof Your Cloud Responding to 2016 Threats

CLEARPASS EXCHANGE. Open third party integration for endpoint controls, policy and threat prevention SOLUTION OVERVIEW MAKE BETTER-INFORMED DECISIONS

Introduction. Deployment Models. IBM Watson on the IBM Cloud Security Overview

Hardening the Education. with NGFW. Narongveth Yutithammanurak Business Development Manager 23 Feb 2012

RSA Solution Brief. Providing Secure Access to Corporate Resources from BlackBerry. Devices. Leveraging Two-factor Authentication. RSA Solution Brief

AuthAnvil for Retail IT. Exploring how AuthAnvil helps to reach compliance objectives

Comptia.Certkey.SY0-401.v by.SANFORD.362q. Exam Code: SY Exam Name: CompTIA Security+ Certification Exam

Sample excerpt. HP ProCurve Threat Management Services zl Module NPI Technical Training. NPI Technical Training Version: 1.

Simplify PCI Compliance

Network Security. Kitisak Jirawannakool Electronics Government Agency (public organisation)

Technical Overview. Access control lists define the users, groups, and roles that can access content as well as the operations that can be performed.

McAfee Embedded Control

Introduction With the move to the digital enterprise, all organizations regulated or not, are required to provide customers and anonymous users alike

CISCO SHIELDED OPTICAL NETWORKING

This document is intended to give guidance on how to read log entries from a Cisco PIX / ASA. The specific model in this case was a PIX 501.

Solution. Imagine... a New World of Authentication.

NETWORK AND CERTIFICATE SYSTEM SECURITY REQUIREMENTS

Watson Developer Cloud Security Overview

Xceedium Xio Framework: Securing Remote Out-of-band Access

Lecture 3 - Passwords and Authentication

Security & Management for your wireless LANs. Bluesocket Wireless Gateways

Google Cloud Platform: Customer Responsibility Matrix. December 2018

Define information security Define security as process, not point product.

PASS4TEST. IT Certification Guaranteed, The Easy Way! We offer free update service for one year

Transcription:

Evolution Of The Need For IAM December 2006

Evolution Of The Need For IAM Identity issues are nothing new Who steals my purse steals trash / But he that filches from me my good name / Robs me of that which not enriches him / And makes me poor indeed. -William Shakespeare

Evolution Of The Need For IAM The Internet has made forging identity trivial

Evolution Of The Need For IAM

Evolution Of The Need For IAM Current single factor access controls for our computers and networks have left us critically vulnerable There is no doubt that over time, people are going to rely less on passwords. People use the same password on different systems, they write them down and they just don t meet the challenge for anything you really want to secure Bill Gates

Evolution Of The Need For IAM

Evolution Of The Need For IAM Rainbow Tables Pre computed hashes for every possible combination of letters, numbers and symbols Perfect in a Windows environment Has also been implemented for MD5 Hashes

Evolution Of The Need For IAM Biometrics are great because they are really hard to forge: it's hard to put a false fingerprint on your finger, or make your retina look like someone else's. Some people can mimic others' voices, and Hollywood can make people's faces look like someone else, but these are specialized or expensive skills. When you see someone sign his name, you generally know it is him and not someone else. http://www.schneier.com/crypto-gram-9808.html

Evolution Of The Need For IAM Biometrics are lousy because they are so easy to forge: it's easy to steal a biometric after the measurement is taken. In all of the applications discussed above, the verifier needs to verify not only that the biometric is accurate but that it has been input correctly. Imagine a remote system that uses face recognition as a biometric. "In order to gain authorization, take a Polaroid picture of yourself and mail it in. We'll compare the picture with the one we have in file." What are the attacks here? http://www.schneier.com/crypto-gram-9808.html

Evolution Of The Need For IAM Compliance is not just a legal matter it is now a critical business function Authentication management Who are you? Centralized policy-based authorization management What can you do? Auditing and reporting What did you do?

Evolution Of The Need For IAM Management Issues Decentralized Authentication & Authorization Difficult to manage across multiple servers Adding a new user across multiple systems Prone to error To many administrators Prone to privilege escalation attacks Exploit the weak link Slow to revoke privilege Each separate system needs to be touched Can the person requesting access also be the person granting access?

Evolution Of The Need For IAM Reporting Issues Most systems are proprietary Increases value for the vendor Does not play well with others No system wide view across disparate systems Lack of shared standards across vendors Industry wide problem Creating reports manually is prone to error

IAM Expectations Improved Security Improved Regulatory Compliance Better IT Department Efficiency Cost Reduction

Improved Security Two factor authentication Tokens Smartcards Biometrics Other out of band solutions Use of device can be determined by where the user is authenticating from and what the user wants to do

Improved Security Centralized policy Who can go where Who can do what Single point for policy management Reduces errors

Remote User Firewall with Security Policy Perimeter Network Defense Security ConfigurePolicy Agent IPSec VPN Configure AgentSecurity Policy SSL VPN Security Policy Remote Network Access Protected OSs, Applications and Data Requires complex setup of many access points Different types of access require separate servers Authentication requires agent configuration Changes to security policy require multiple points of change Business Partner Citrix applications Configure Agent Security Policy Configure Agent Security Policy Web Mail and Web Applications Security Policy Active Directory with authorization lists

Perimeter Network Defense Remote Network Access Host many different types of access on a single IAM solution Remote User SSL VPN IPSEC VPN Protected OSs, Applications and Data Change policy once and you re done! Authentication works out of the box; no agents to configure Firewall Security Policy Business Partner IAM Citrix applications Configure Agent Web Mail and Web Applications Active Directory

Improved Security Enforcement with Security Zones Segments the network into Security Zones Access is limited to certain resources based on authority Only properly identified, authorized users can access Example: Mission-critical resources only accessible when connected from corporate LAN Example: Remote usage may be limited, except for users with two-factor authentication Security Zones require no additional reconfiguration of the network infrastructure

Improved Security End point security and configuration compliance Antivirus Firewall Patches APPROVED Company Security Policy DENIED Company Security Policy Company Security Policy APPROVED

Improved Security Resources protected Web: HTTP, JavaScript, WebDAV, ActiveX File: CIFS, NFS,DFS Mail: IMAP, POP, SMTP, MAPI (MS exchange) Terminal Services: Citrix, Windows, VNC Host Access: Telnet, SSH, Mainframe (3270 5280) Client/Server: All client server applications, TCP/UDP, static port, dynamic port

Improved Security Deployment SSL VPN IPSec VPN Remote extranet Department firewall Intranet Guest network

Improved Security Meets the four As of Information Security Authentication Authorization Administration Audit

Improved Regulatory Compliance Rather then attempting to drill down in to each regulation we will examine a short list of common denominators across numerous regulations: Creation of new policies Implementation of new processes Audit trail Granular reporting

Improved Regulatory Compliance Creation of new policies Single policy management point simplifies policy creation and deployment Change control is another serious consideration It is an achievable reality in IAM but can be a nightmare without it, when working across several policy enforcement points

Improved Regulatory Compliance Implementation of new processes Simplifies deployment of new processes New audit processes are dramatically simplified due to centralized auditing capability of IAM New business processes are dramatically simplified due to centralized authentication, authorization and access control capabilities within IAM

Improved Regulatory Compliance Audit trail Audit: source IP, userid, Group, Timestamp, resource accessed (URL, destination IP,file accessed), status, bytes, referrer, authentication method, logins/logouts

Improved Regulatory Compliance Logging and reporting Events: Intrusion, denied resource attempts, security alerts with SNMP traps, Syslog, FTP or SCP transfer log, custom reporting

Better IT Department Efficiency Single point of policy management across all access points Greatly increases administrative efficiency Depending on authentication mechanism chosen can reduce if not eliminate password resets Typically 30% of helpdesk calls are password related Automated reporting Reduced administrative burden for report consolidation

Cost Reduction Single point of policy management and reporting can dramatically reduce costs Consolidation of disparate access control mechanisms across multiple access points to a single device for: Provisioning Authentication Authorization Audit Single Sign On / Reduced Sign On

Questions? December 2006

Thank You I trust you found today's presentation both interesting and informative paul_henry@securecomputing.com December 2006