Convergence of IT and Physical Security Industry Initiatives SCA - 3/9/04
Organizational Challenge Ira Simon VP Channel/Direct Feild Marketing Martha (Angie) Barragan Assiatant Annamarie O'Connor Div. AVP Cynthia Mutell Manager Donna Anderson Manager/Director David Miller Manager/Director Diane Pereira Manager/Director Raoul Lake Sr. VP Josh Horstmann VP Anthony Swierkot VP Marketing Channel Field Marketing Channel Promotions Partner Program Channel Solution Mktg Team Channel Logistics Licensing/OEM Marketing Marketing Comm. Channel/FM Central Services NA Direct Field Marketing Sales Call Center See Seperate Sheet Canada Eufemia Fortunato Anne Carracino Manager Channel Key Accounts NA Kimberly Altenberg Enterprise Modeling Diane Murtha-Fitzpatrick Security Elissa Li Vecchi 1-tier (ESP) Products Ed Cegleski Jennifer Endelson Gavin Creado Joseph Bova Kathleen Lopez Patty Arcari Elizabeth Stackowitz Jennifer Keating Tracy Schultz Allison Reichel Loretta Scott Jean Brase IM Solution Team EM Solution Team Nada Valvasori Fiona Goy Leigh Lebow Dina Manor Deana-Ro Mickels Kristana Kane Carmen Munsch Distribution Marketing Stacie Avena Lesley Foehrenbach Mary Gavin Brenda Miller Promotions Betsy Leigner Denise Licari Michelle Traina Storage Rebecca Salie Melinda Smith IT Security Group Business Intelligence Robert Bolds Gloria Worland ebusiness Transformation & Integration Ed Blum John Dilley Bill Clarke ebusbiness Solutions/Training Marina Dierks Geographic Team 6 Plus Federal. West Enterprise Mgt. Keith Wilson Jim Anderson Joe Loveless Security Open Storage Main Frame Solution Team Mark Newberry Tina Linkens Tiffany Crane Physical Security Group South Central Ed Zacharkevics Dale Jaquette Mid West Jeff Ramm Hugo Malavet South East Bob Bresnahan Wendy Blake Mid Atlantic Dawn Smith-McBratney Shannon Schneiders North East Bernard Klopfer Micki Divitorrio Federal Karen Mocbeichel
Differences between IT and Physical Security Differences in Reporting lines Culture Procedures Security controls Leading to separation of Audit trail Risk management Provisioning Policies update/definition With consequences including Delays in response due to coordination Potential vulnerabilities Cost inefficiencies
Security Enterprise Goal Business Processes HR IT Infrastructure Business Security Customer Relationship Business Applications System Facilities Physical Security IT Security Storage Manag
Un-integrated Responsibilities Business Security Processes Policy Setting User Provisioning & Asset Security Monitoring and Auditing Incident Response Business Continuity Plan Physical Security IT Security Card Issuance & Revocation Access Device Monitoring Access Violation Handling Journal Manag ement Emergency Access Process Firewalls and VPNs Antivirus & Vulnerability Mgt Intrusion Detection & Prevention User Access Mgt Backup and Recovery
Integration Points System Monitoring Security Reporting Log Policy Physical Security Devices User Provisioning IT Access Control Building Access Control User provisioning - enables users to be set up with access devices with a consistent set of data associated with each user which integrates with enterprise identity management Policy - sets the controls used by the devices (when raise alerts, what level of logging, what access enforced) Security reporting - enables device settings to be reported on Log management - enables centralized management of journals and normalization into a consistent format System monitoring - enables IT security event management to monitor physical devices and correlate attributes such as location with network and other intrusion monitoring systems.
OSE Cross-industry forum Develop interoperability specifications in the area of security management Bring together the disparate technologies making up today s security infrastructures Allow for optimal security and operational efficiencies, Respect organization-specific operational requirements. Educate White papers and best practices Specifications are published and made available to standard organizations
IEEE-ISTO Formed in January 1999 as an independent 501(c)(6) Not-for-Profit Corporation Provides both legal and day-to-day support infrastructure for standards related high-tech consortia Affiliated with the IEEE and the IEEE Standards Association Offices located at IEEE Operations Center in Piscataway, NJ. Provides OSE support in following areas: Legal Umbrella HQ Office Program Financial Membership Administration IT Support www.ieee-isto.org
IEEE-ISTO Manages industry initiatives Focus on Interoperability and Conformance program management Other Projects VoiceXML Forum s certification activities Liberty Alliance SyncML Initiative, Ltd Wireless Village Board 1 Representative of Each Sponsor Member Chair, Vice Chair, Secretary, Treasurer Coordinates Finances, Marketing and Recruitment Technical Council 1 Technical Representative of Each Sponsor Coordinates all Technical Activities of OSE Meetings open to Sponsors and Contributors Technical Subcommittees Comprised of Sponsor and Contributor Members Contributor Members Full Participation and Voting in Subcommittees Listed as a member on the website Supporter Members Review Specs prior to publication Participate in All-Member Meetings
OSE Activities Standards profiling Best practices Physbits Model and interchange formats SIA Performance standard Joint Work/Liaisons OSIPS UL Liberty INCITS M1
Physbits Auditability and forensics capability across all systems Event format standardization and secure logs connectivity Anomalous behavior detection Strong Authentication Centralized credential management system May, but need not, leverage dual purpose access cards for enhanced authentication Provisioning Common user management procedures
Use cases Provision new employee Incident handling e.g. Access IT system in restricted area User leaves the organization Extended vacation Compromised credential Report (entitlements & violations) e.g. Compliance audit Incident investigation (current & historic) Change policy
OSE Workplan Initial Focus Security Event format Event taxonomy Interchange formats Transport mappings Relationships to other work Performance standard definition Future Focus Additional white papers and implementation guidance Physbits Provisioning Policy management Biometric profile Audit trail best practices and storage
OSE Goal Reduce exposure resulting from physical access to IT resources Accurately detect attacks from within corporate networks Enhance organizational collaboration Simplified auditing Simplified administration Further Information email: Info@opensecurityexchange.com web: http://opensecurityexchange.com