@SITA GlobalSecurity Managing Security Joseph Ferracin

advertisement
GlobalSecurity@SITA
Managing Security
Joseph Ferracin
Director IT Security Solutions
In Modern Networked IT Environments
Efficient security requires
A Security organization
A Security Framework – Guidelines and Policies
Company’s Management support
End-Users involvement
A security plan
A budget
Skilled Security people
2
The organization
Create a Security Office
That is Independent of IT. Reports to the top management
Defines the security framework and the high level policies
Drives security Audits & Assessments
Defines the security plan & Proposes security budget
Helps in Security implementations
Create a security council
That Includes Security Officer, Top management representative(s), IT representative(s)
Endorses Security policies
Validates Security Plan & Security budget
3
The Framework
We recommend BS7799
The BS 7799 Information Security Standard is published in two parts:
1.
2.
Part 2 Specification for ISO/IEC 17799 Part 1 Code of practice for Information Security
Management
BS 7799 Information Security Management
Purchase on line:
http://www.bsi-global.com/Information+Security/04_Standards_infosec/index.xhtml
BS 7799 shall be regarded as a guidance
BS 7799 certification is complex
4
Get management support
Propose a risk assessment
Company’s management is responsible for the security of Company assets
Vulnerabilities in IT security organization and in IT equipment configurations must be know.
Associated risks must be evaluated.
Suggest the necessity of a high level security policy
Suggest to develop a security plan
Costs: $100 000 <-> $600 000
5
Involve End Users
Education
Users must know and understand the security policy
They must be conscious of the value of their own data.
Avoid constraints – Try to suggest – Use flattery
Security has to be as transparent as possible
Use appropriate technology
6
Security issues: You want to guarantee
Availability of
Information Systems
Confidentiality & Privacy of
Access control on
Integrity of
Sensitive Information
Networks, Systems & Applications
Transactions
7
Security is a continuous process
Security policies
Security migration plans
Define secure architectures
Design security solutions
Assess risks
Audit implementations
Analyze vulnerabilities
Firewalls
Encryption
Public key infrastructures
Centralized management
Anti-virus
Intrusion detection
Strong authentication
Firewalls
Strong authentication
IPSec VPNs
Digital certificates
Intrusion detection
8
Security on the Intranet
Workstations
PKI
Smart Cards
Virus Detection
Active
Directory
Kerberos V5
Strong
Authentication
bbb
Authentication
Service
Authorization
Service
Anti-Virus
Single Sign On
Mainframes
Servers
Role Based
Authorization
9
Security on the Internet
Intrusion
Detection
Consumer
Demilitarized
Zone (DMZ)
Trusted
Consumer
Access
Control
No Security
SSL Encrypted Transaction
IPSec Encrypted VPN
Corporate
Intranet
IPSec Encrypted VPN
Firewall
VPN
Integrity
Confidentiality
Authentication
Availability
Business
Partner
Employee
10
Why Outsource Security?
“Under-staffed, underskilled, overwhelmed.
That’s the sinking feeling
conveyed to us repeatedly by
CIOs...”
Specialized IT Security
Resources are even harder to
find
“The Situation isn’t likely to
improve any time soon.”
“For Many CIOs, The staffing
crisis is an overriding
concern that adds risk to
every project .”
Security
Engineer
- CIO Magazine
$109,000
Network
Admin.
$65,000
I.T. resource shortage
11
Security Outsourcing Expenses
Why Companies are outsourcing ?
$14.8 Billion Industry in 2003 – 45% CAGR
$16,00

Dearth of skilled security talent
–
$14,00

$12,00
Sophisticated attacks beyond capability of
most IT departments
–

$10,00

$6,00

–

1998
1999
Source: IDC, 2000
2000
2001
2002
2003
Scale, budgets, staff usually subjugated to
business issues
Security intelligence missing
$2,00
$0,00
Follow the sun 24x7x365 model
Security not typically a core competency of
companies
–
$4,00
DDoS attack, Love Virus, etc.
Carrier grade security SLAs unachievable by
most IT departments
–
$8,00
Universe of CISSPs less 1,500
IT depts lack the ability to monitor hacker
underworld and global events to proactively
redress vulnerabilities and attacks
Total Cost of Ownership (“TCO”)
–
Organizations cannot match economies of scale
of a managed security service provider
12
A portfolio of
Professional
Services
Partners foremost
Solutions
Managed Security
Services
in Security
13
Security Professional Services
A Team of Security
Experts
Solutions tailored to your
needs …
Solutions
Implementation
Security Policies
definition
Security
Management
Risk Analysis
Security
Audit
… for the Winning Approach
14
Managed Security Services …
IP Secure Gateway
IPSec VPNs
Managed Firewall Services
Available on
Partnership with Internet Security
Systems (ISS) a Leader in Security
SITA Private Network
SITA Internet Network
High quality of service
Remote Access
Very competitive pricing for small, midsize and big Extranet & Internet sites
Features
Scalable Solutions
World class technology
Managed Intrusion Detection
Partnership with ISS
Real time protection of mid-size, big
Internet and E-Commerce sites
And …
Digital Certificates
Vulnerability Scanning
Content Filtering …
15
Thank You !
Q&A
16
Download