Booz Allen Hamilton Data-Centric Protection Services

advertisement
Booz Allen Hamilton
Data-Centric Protection Services
Service Offering Overview
July, 2014
This document contains Booz Allen Hamilton Inc. proprietary and confidential business information – Intended Only for the Recipient
1
Overview
Booz Allen – Data Protection Solutions Overview
Do you really understand your sensitive data and
know how to define it?
What type of data is most important to my
business (e.g. PII, PHI, IP, and Trade Secrets)?
Agenda
Data Protection Threats and
Challenges
Is there consensus across the enterprise on data
priority and valuation?
Are there clearly defined policies and rules for
the handling, processing, and storage of data?
Booz Allen Blueprints
Are authorized and restricted data stores
identified for sensitive data (structured,
unstructured, and “big” data)?
The Booz Allen Data-Centric
Protection Blueprint
Are there awareness and training programs to
encourage best data practices?
Do I have the necessary controls in place to protect
and enforce data protection policies?
Data-Centric Protection
Program Solutions
Have I considered tools and techniques to
protect sensitive information at the data level?
How can I protect my data efficiently, while still
extracting maximum business value?
Qualifications
Sample of the Blueprint
How do I effectively respond to a Data Incident?
Do I have the capability to respond to a data
incident in a coordinated fashion?
Contacts
Can I control data once it leaves my
organization's perimeter ?
Where do I begin?
This document contains Booz Allen Hamilton Inc. proprietary and confidential business information – Intended Only for the Recipient
2
Table of Contents
 Data-Centric Threats and Challenges
 Booz Allen Blueprints
 Data-Centric Protection Program Solutions
 Qualifications
 Sample Blueprint
 Contacts
This document contains Booz Allen Hamilton Inc. proprietary and confidential business information – Intended Only for the Recipient
3
Simply Waiting Until Something Happens is Not an Option
The Cost of a single successful cyber-security attack exploit is
Significant and the Cost of Prevention is 1/10 the cost of an exploit.
Advanced
persistent threats
have collected data
for years before
discovery**
Data theft
can go on
for years
unknown
The Cost of Post
Exploit Remediation
is 10X the Cost
of Prevention
The
Average
Cost of an
Exploit is
over
$5M USD
Prevention
is 10X More
CostEffective
than
Remediation
Banks worldwide
are victimized by
cyber crime
Trust &
Reputational
Damage can
Dwarf Actual
Direct Data
Loss Costs
Wide-spread Loss of
Customer Confidence
Can Destroy Significant
Market Value Overnight
* TJX data breech lasted for over five years resulting in an estimated $100M loss and fines
** Banks have seen as much as a 15% loss in market cap resulting from a widely publicized security breach
Source: The cost benefits of information security – Gartner; Booz Allen Hamilton Analysis
This document contains Booz Allen Hamilton Inc. proprietary and confidential business information – Intended Only for the Recipient
4
Data-Centric Protection Threats
to add header
(Up
to two
lines, 22
AsClick
the complexity
of cyber
attacks
continues
to pt)
increase exponentially, the need
for a robust data protection program has never been greater
Threats Actors
Vulnerabilities
Insider Threats
Lone Wolves
Hactivists
Organized Crime
Nation States
Motivations
Self-Promotion
For the Challenge
Competition Advantage
Financial Gain
Revenge
Politics
Infrastructure
Cloud
BYOD
Third Party Vendors
Supply Chain
Accidental Insiders
Data-Centric
Protection
Intentions
IP and Data Theft
Reputational Damage
Financial Damage
Supply Chain Attack
Operational Disruption
Data Destruction
Attack Vectors
Social Engineering
Remote Access
Inside Access
Phishing
Wireless
Mobile
Capabilities
Booz Allen is a market leader in
the emerging discipline of
data-centric protection
Malware
Trojans
Botnets
DDoS
Zero Day Exploits
Many Others
This document contains Booz Allen Hamilton Inc. proprietary and confidential business information – Intended Only for the Recipient
5
Data-Centric Protection Challenges
Numerous challenges exist in order for companies to identify, protect
and control their most sensitive information assets
Financial Impacts
• Average annual cost to US companies due to a single data leakage incident was $7.2M in
2009
• Data breaches lead to degradation of brand equity
Borderless Enterprises
• Data is less centralized than ever before due to dis-aggregated supply chains, outsourcing,
and a mobile workforce
Consumerization of IT
• Users are increasingly defining the IT environment by bringing their productivity tools (USB
sticks, flash drives, etc.) into work
Insider Threats
• ~50% of all data breach incidents are sparked by insiders
• 59% of insiders admitting they would steal sensitive data if they leave or are asked to leave
their current employer
Professional Infrastructure
Organized Crime
Regulators
• Over three quarters of organizations have had a laptop lost or stolen
• 56% report that it resulted in a data breach
• 58% of these laptop losses happened at work
• Sophisticated organized criminal networks are shifting their focus from credit card data to
corporate IP
• Concern over data loss/theft spawned a myriad of regulations ranging from global and
country, to industry-specific and local government
• Multiple regulations to be compliant: SOX, HIPAA, HITECH and PCI
This document contains Booz Allen Hamilton Inc. proprietary and confidential business information – Intended Only for the Recipient
6
Table of Contents
 Data-Centric Threats and Challenges
 Booz Allen Blueprints
 Data-Centric Protection Program Solutions
 Qualifications
 Sample Blueprint
 Contacts
This document contains Booz Allen Hamilton Inc. proprietary and confidential business information – Intended Only for the Recipient
7
Booz Allen Blueprints
Click
to add header
(Up toprovide
two lines,
22 pt)
Our
customized
blueprints
a core
data-centric protection
framework of proven practices that add fidelity to your capability
while reducing development time and expense
CyberM3 Maturity Model
Data-Centric Protection
Capability Blueprint
Customized Blueprint
Solutions
From our deep Federal
Government and Commercial
experience, we have developed
a proprietary maturity model that
has been adopted by 6 of the
top 10 banks
Detailed solution blueprints
enable us to conduct robust
diagnostics and jump-start the
design of your program
Our customized blueprints will
provide you with the appropriate
breadth and depth to fit your
operational needs, commercial
requirements and the realities of
your business environment
This document contains Booz Allen Hamilton Inc. proprietary and confidential business information – Intended Only for the Recipient
8
Data Centric Protection Solution Blueprint
Booz Allen can jump-start the design of your DCP program and DLP
capability via our Solution Blueprint
People, Process, & Technology Maps
1
Process Descriptions & RACI Charts
2
 Defines roles required to
support a successful program
 Summarizes descriptions of each
process step
 Outlines specific process
requirements and flows
 Provides data protection
organizational definitions
 Highlights data protection
technology to enable the
required capabilities (e.g.
encryption and tokenization)
 Aligns specific data protection
process steps to roles and
responsibilities
Capability / Vendor Solutions Matrix
Capability Requirements
3
 Breaks down the distinct
technology and people skill
requirements to have a
successful program
 Technical requirements align
against a holistic system view
 Skill requirements align against
a human capital framework
4
 Map of data protection capability
requirements against industry
leading services, products, and
techniques
 Specific guidance for addressing
key challenge areas to jump-start
implementation project
 Helps identify redundant
technology and gaps
Implementation Action Plan: Near, mid, and long-term implementation milestones
This document contains Booz Allen Hamilton Inc. proprietary and confidential business information – Intended Only for the Recipient
9
Booz Allen Blueprints
Building your program against a high quality blueprint offers
significant advantages over an ad-hoc approach
Blueprint Advantages
 Holistic view of the problem and solution allowing leadership and staff to
easily visualize and consider options
 Defined target / goal state to reduce investments and overall spend
 Smarter hiring against exactly the right skill requirements for your specific
program
 Intelligent and planned use of your existing technology sets, with a clear
understanding of gaps and the need for technology investments
 Clearly defined program processes to guide your policy portfolio, specific
playbooks, and other key program documentation
 You would not build a house or a bridge without a blueprint, so why an
important aspect of your security program?
This document contains Booz Allen Hamilton Inc. proprietary and confidential business information – Intended Only for the Recipient
10
Table of Contents
 Data-Centric Threats and Challenges
 Booz Allen Blueprints
 Data-Centric Protection Program Solutions
 Qualifications
 Sample Blueprint
 Contacts
This document contains Booz Allen Hamilton Inc. proprietary and confidential business information – Intended Only for the Recipient
11
Data-Centric Protection Program Solutions
Our team can provide a custom program blueprint, develop a specific
program service, or solve technical challenges
 Customized blueprint for your organization
Custom Program
Blueprint
 Identifies and articulates all process requirements, people
roles/skills, organization, structure and technical solutions
 Ideal starting point for emerging programs
 Policy development
Program Service
Development
 Data loss risk assessments
 Data classification and definition
 Staff augmentation
Technical
Implementation
 Data Loss Prevention (DLP) implementation and operation
 Tokenization and encryption implementation
 Data tagging implementation
 Focused tool analysis and design optimization
This document contains Booz Allen Hamilton Inc. proprietary and confidential business information – Intended Only for the Recipient
12
Custom Program Blueprint Solutions
Click
to add
header
(Up to
two
lines, 22 pt)
Booz
Allen
offers
custom
data
protection
blueprint levels to meet
your organization’s needs
Custom Data Protection Program Blueprint
Custom Blueprint
Capability Enhancement
Description
A framework of proven practices customized to the needs of your
organization
Development of additional components key to a strong DCP
capability
Outcome
Add fidelity to your capability development while reducing
development time and expense
Enhancement and implementation of core DCP capabilities and
overall data protection program improvement
Deliverables
Custom DCP Program Blueprint; Prioritized Roadmap
Level 1 + additional components as defined and prioritized by the
Implementation Strategy
People
• Job/Role descriptions
• RACI Charts (Responsible-Accountable, Consulted, Informed)
•
•
•
•
•
•
•
•
Job profiles (roles, tasks & expertise)
Hiring plans
Training plans (core curriculum)
Competency models
Career roadmaps
Training plans (advanced curriculum)
Performance criteria
Salary analysis
Process
• Process maps
• Process step descriptions
•
•
•
•
•
•
Organizational charts
Stakeholder requirements plan
Key metric descriptions
Governance review
Strategic communication plans
Performance metrics and management plans
Technology
• Technology requirements (high-level descriptions)
• Service comparison matrix
•
•
•
•
•
Hardware & software specifications
Sourcing analysis (with price estimates)
Detailed architecture review
DLP analysis
Technology Deployment planning and Implementation
$150K
Highly Variable
Cost Estimate
This document contains Booz Allen Hamilton Inc. proprietary and confidential business information – Intended Only for the Recipient
13
Custom Program Blueprint Solutions
Click
to add
header (Up
to two lines,
22 pt) to deliver Voltage's
Booz
Allen
maintains
a strategic
relationship
Secure Stateless Tokenization (SST) technology solution to clients
No software pre-requisites. Voltage SST works with virtually all languages and platforms
Key Features / Benefits*
Voltage SST technology is a secure,
high-performance solution*
No Pre-requisites -- works with all platforms and languages; easily
integrates with existing IT environments
Data Integrity -- Added servers never introduce data integrity issues or a
need for synchronization
(1) Meets carrier-grade and paymentprocessor grade high availability
requirements
Rapid Key Rollover -- single, efficient, high-speed process that takes just
minutes to execute, even during live operations
(2) Provides 100% data consistency
Rich Formatting Options -- format of tokens can be configured to preserve
functionality in applications that previously used actual card numbers
Data Mapping – 1:1 Mapping of token to protected number. Same number
always returns the same token
(3) Will scale linearly -- can generate
hundreds of millions of tokens to
represent card numbers for internal
use or to provide tokenization
service to merchants
Front-door PCI Scope Reduction -- Voltage SecureData Web takes ecommerce web servers up to 100% out of scope
*Adapted from Voltage Security - Data Sheet: Voltage Secure Stateless Tokenization (SST) Technology
Voltage Security®, Inc. is a leading data protection provider, delivering secure, scalable, and proven data-centric
encryption and key management solutions, enabling clients to effectively combat new and emerging security threats
This document contains Booz Allen Hamilton Inc. proprietary and confidential business information – Intended Only for the Recipient
14
Custom Program Blueprint Solutions
Click to
add header
(Up to two
lines, 22
pt) security, enhanced
Secure
stateless
tokenization
provides
greater
performance, and a decrease in systems subject to compliance
Booz Allen’s recommended approach provides significant benefits
Enhanced encryption
Stateless key management
Compliance benefits
• Format preserving encryption
• Secure stateless tokenization
• Data masking; lookup tables cannot be related back to sensitive data
• Eliminates token database
• Eliminates cost of external database hardware and software acquisition
• No database growth over time  often cause of performance degradation
• Primary account number (PAN) input  token has no relationship
• Removes storage of cardholder or other sensitive data
• Reduced number of applications / systems in-scope for compliance
(1) Dramatically reduced compliance scope, cost, and complexity
(2) Increased protection of sensitive data and reduced risks of breach
(3) Support the business with high performance, carrier-grade and payment-processor grade high
availability, data consistency, and linear scalability
This document contains Booz Allen Hamilton Inc. proprietary and confidential business information – Intended Only for the Recipient
15
Custom Program Blueprint Solutions
Click toconcerns
add header
to costs
two lines,
pt)generation encryption and
Security
and(Up
high
with 22
first
tokenization can be negated with a secure stateless solution
Traditional approach to data
protection
New approach to data
protection
Conventional, first-generation
encryption, tokenization, and
masking
Secure stateless tokenization
-- combines data encryption
and masking technology
Limited traditional technology / approach
Highly beneficial new technology
• Token database central to tokenization solutions
• Costly to maintain
• Mapped to the underlying card data
• Protects sensitive data upon acquisition used, transferred, stored in protected form
• Storage of cardholder and sensitive data
• Highly complex development; cumbersome IT
administration
• Use of high-risk production data in test /
outsourced environments often occurs
• Improved speed, scalability, security, and
manageability of the tokenization process
• Reduced compliance scope, cut costs and
complexity, and maintains business
processes with advanced security
• Dramatically reduced PCI DSS compliance
scope and audit costs
This document contains Booz Allen Hamilton Inc. proprietary and confidential business information – Intended Only for the Recipient
16
Custom Program Blueprint Solutions
Click to add header
two lines,
22 pt)
Implementing
Voltage(Up
SSTtorequires
more
than a typical system install
for maximum effectiveness and value across the enterprise
Typical implementation approach
1. Identify the high-priority data elements to protect
2. Inventory applications that rely upon this data
3. Install Voltage and link to the enterprise identity management system, (e.g., Active Directory)
4. Verify that applications can function unchanged, using encrypted data
5. Integrate Voltage with identified applications that need access to either fully or partially decrypted masked data
Booz Allen‘s added value proposition
Enterprise-wide view
• Holistic enterprise-wide approach to data protection
Industry best practices • Best practices gained from multiple data protection projects
Integrated approach
• Seamless implementation and coordination across databases
End-to-end support
• Support from design through deployment and ongoing support
This document contains Booz Allen Hamilton Inc. proprietary and confidential business information – Intended Only for the Recipient
17
Click to
add header
(Up
to two lines,solutions
22 pt) exist and have been
Several
proven,
scalable
Tokenization
widely adopted in the market today.
Most solutions offer flexibility for environment customization.
Key Tokenization Solution Statistics
Sample Companies utilizing Tokenization Technology*
• Tokenization software in its current state was unveiled in
2005; many vendors are on their third or fourth solution
generations today
• The PCI SSC fully endorses Tokenization as a way to
protect card data if done properly
• Deployment models are flexible to accommodate
preference for on- and off-premise implementations
• An estimated 20% of all merchants are deploying
Tokenization, with a higher percentage among
eCommerce merchants
Flexible Token Format Examples
Payment Card Number
Token
Usage Comments
6011 0009 9013 9424
6011 9837 6653 9424
3782 8224631 0005
2akerCenwWSKmnebde
Alphanumeric tokenization of Amex card with different string
length
4012 8888 8888 1881
8723 88237408323432
Numeric tokenization of VISA card with different string length
Numeric tokenization of Discover card with same string length,
retaining the first and last 4 digits of the payment card number
* Based on publicly available information
This document contains Booz Allen Hamilton Inc. proprietary and confidential business information – Intended Only for the Recipient
18
DCP – Program Service Development
As a supplement to our custom blueprint solutions, we also assist
clients in program services they wish to develop or enhance
• Policy Development – Our policy experts can craft policies, standards
and guidelines specific to your organization and its challenges
• Data Loss Risk Assessments – A detailed, technical assessment of the
risks surrounding your most sensitive data that includes scanning and
network monitoring to understand how your data is being used and if
policy violations are occurring
• Incident Response – Rapid deployment of a team to eradicate
malicious presence, restore business operations and capture lessons
learned
• Staff Augmentation – Add resource capabilities to your existing
services
This document contains Booz Allen Hamilton Inc. proprietary and confidential business information – Intended Only for the Recipient
19
DCP – Technical Implementation
In addition, well-qualified Booz Allen resources can help implement
technical solutions in your DCP environment
• Booz Allen Automated Tagging Technology (BAATT) – Our internallydeveloped, automated solution for Intelligence Community clients
ensures that data is tagged with appropriate classification levels and
applies defined security protections (e.g. encryption) where required
• Data Loss Prevention (DLP) Implementation – Many companies
struggle to make DLP solutions a useful and practical part of their
business. We have experts that can implement DLP correctly the first
time, or fine-tune existing implementations
• Focused tool analysis and design optimization – Whatever
technology you use, it is likely we have experts that know how to
optimize it. Our technology design resources specialize in performing
analysis of existing technical implementations and making improvements
This document contains Booz Allen Hamilton Inc. proprietary and confidential business information – Intended Only for the Recipient
20
Table of Contents
 Data-Centric Threats and Challenges
 Booz Allen Blueprints
 Data-Centric Protection Program Solutions
 Qualifications
 Sample Blueprint
 Contacts
This document contains Booz Allen Hamilton Inc. proprietary and confidential business information – Intended Only for the Recipient
21
Data-Centric Protection Qualifications
Booz Allen has unrivaled experience helping sophisticated clients
ensure protection of their most important data
• Coordinated with Intelligence Community (IC)
CIO to develop and standardize machine
readable rule-sets to enforce data labeling
policy
• Developed tools with a major US Intelligence
Agency to enable automatic application of valid,
policy-compliant data labels and ensure the
discoverability of data across disparate
networks
• Enabled data in a US IC cloud deployment to
be protected and support a secure method of
exchange between widely differing system
infrastructures
• Facilitated attribute-based access control in an
IC Cloud according to the dynamic nature of
information management policy
This document contains Booz Allen Hamilton Inc. proprietary and confidential business information – Intended Only for the Recipient
22
Table of Contents
 Data-Centric Threats and Challenges
 Booz Allen Blueprints
 Data-Centric Protection Program Solutions
 Qualifications
 Sample Blueprint
 Contacts
This document contains Booz Allen Hamilton Inc. proprietary and confidential business information – Intended Only for the Recipient
23
Capability Toolkit
CyberM3 Data-Centric Protection Blueprint
This document includes Privileged and Confidential information that shall not be disclosed outside of Booz Allen Hamilton and
shall not be duplicated, used, or disclosed—in whole or in part—for any purpose other than to evaluate these discussions.
Data-Centric
Protection
thelines,
Information
Click to add
header aligns
(Up toto
two
22 pt) Protection and IdAM
control families of Booz Allen’s CyberM3 Security Model
CyberM3 Control Decomposition
Data-Centric Protection
25
This document includes Privileged and Confidential information that shall not be disclosed outside of Booz Allen Hamilton Booz
and
shall not be duplicated, used, or disclosed—in whole or in part—for any purpose other than to evaluate these discussions.
Allen Proprietary
25
Data-Centric Protection is about understanding data, defining and
enforcing data security policies
P1.1
P1.3
Information
Security
P1.5
Network
Operations
P1.7
Privacy
P1.9
End User
Business
Leads
PEOPLE
P1.2
P1.4
Incident
Response
P1.6
Systems
Operations
P1.8
Legal
Compliance
Office
MX
MX.4
MX.2
Data-Centric
Protection
Data Handing Policy
and Rules
Implementation
MX.6
Implementation,
Monitoring, &
Baselining
MX.8
Data Loss
Containment &
Response
Prevention &
Protection
PROCESS
Data Definition &
Characterization
DT1
TECHNOLOGY
26
Data Loss
Notification
Planning and
Architecture
DT2
DLP Protection
Suite
MX.7
MX.5
MX.3
MX.1
Remediation
DT4
DT3
GRC
IDAM
This document includes Privileged and Confidential information that shall not be disclosed outside of Booz Allen Hamilton Booz
and
shall not be duplicated, used, or disclosed—in whole or in part—for any purpose other than to evaluate these discussions.
Data-Level
Security
Allen Proprietary
26
Data-Centric Protection: RACI CHART
High-Level Process
Key Roles
Key Processes
IS
IR
Net Ops
Sys Ops
Privacy
Legal
MX.1 – Data Definition & Characterization – Defining policy
and requirements for data categorization, discovery and analysis
of data
R
C
R
R
C
C
I
A
C
MX.2 – Data Handling Guidelines & Policy Development –
Development of data handling policy based off data
categorization. Develop Incident (leakage) response policies and
procedures
R
R
C
C
C
C
C
A
C
MX.3 – Planning & Architecture- Gather and analyze data
storage, transmission and processing requirements. Design
DLP deployment leveraging information categories and
metadata tags. Define success metrics and targets.
A
C
C
C
C
C
-
C
C
R Responsible
A Accountable
The individual or group responsible
The individual with yes/no authority
for completing/ implementing the
and veto power that is ultimately
task at hand. Responsibility may be
accountable. Only one “A” per
shared.
activity.
27
C Consulted
The individual(s) and/or group(s) to
be consulted prior to a final decision
or support one or more actions.
I
End-User Compliance Business
Informed
The individual(s) and/or group(s) that
should be informed after decisions
are made and actions are taken.
This document includes Privileged and Confidential information that shall not be disclosed outside of Booz Allen Hamilton Booz
and
shall not be duplicated, used, or disclosed—in whole or in part—for any purpose other than to evaluate these discussions.
Allen Proprietary
27
Data-Centric Protection: People Descriptions
Roles for a DCP Program
People
28
Description
P1.1
Information Security
Responsible for overseeing the entire Data-Centric Protection Program. Typically, there will be a team lead who is a
member of the Information Security group
P1.2
Incident Response
A senior incident response team member will treat any data leakage similarly to any other security incident using incident
response business processes. They will help gather forensics to help determine the objectives on the attack, help with
messaging to consumers of system’s services and assist law enforcement with the preservation of evidence (if need be)
P1.3
Network Operations
Responsible for establishing a baseline of standard network activity. Monitoring of the network to identify anomalies that
might indicate a potential data leak on the system
P1.4
Systems Operations
Responsible for establishing a baseline of standard system utilization. Monitoring system logs and resource levels to
identify anomalies that might indicate data exfiltration
P1.5
Privacy Group
Responsible for developing and ensuring compliance with policies which ensure that PII and other personally sensitive
data objects are appropriate labeled and protected
P1.6
Legal
The Legal department will be involved to help coordinate the efforts of law enforcement, to ensue the preservation of
evidence, and watching out for the legal interests of the organization
P1.7
End User
The end-user will be corporate staff, who will need a combination of training, technologies and processes to ensure their
ability to appropriately mark and protect data at the time of data creation, or while in that individuals’ stewardship
P1.8
Compliance
The group charged with overall responsibility of ensuring the organization is compliant with any regulatory and compliance
mandates (e.g. healthcare organization with HIPAA, FS with SEC and CFPB regulations)
P1.9
Business Leaders
The business leads are charged with ensuring the success of their business units and must have input into data protection
decisions to ensure business operations
This document includes Privileged and Confidential information that shall not be disclosed outside of Booz Allen Hamilton Booz
and
shall not be duplicated, used, or disclosed—in whole or in part—for any purpose other than to evaluate these discussions.
Allen Proprietary
28
Data-Centric Protection: Process and Technology Descriptions
Process
Description
MX.1 – Data Definition & Characterization
Defining policy and requirements for data categorization, analysis of data repositories
MX.2 – Data Handling Guidelines & Policy
Development
Development of data handling policy based on data categorization. Develop Incident response policies
and procedures
MX.3 – Planning & Architecture
Gather, analyze and architect data storage, transmission and processing controls
MX.4 – Implementation, Monitoring, and
Baselining
Implement technologies; define and ensure compliance with performance metrics
MX.5 – Data Loss Notification
Notify appropriate individuals when incidents occur
MX.6 – Data Leakage Containment and
Response
Execute response plan based on documentation
MX.7 – Remediation
Analyze vulnerabilities; apply patches to prevent similar incidents
MX.8 – Prevention and Protection
Gather lessons learned and revise program as necessary
Technology
Description
DT.1 – DLP Technology Suite
Technologies that perform network crawling, information analysis and attempt to label data and discover
inappropriate data flows
DT.2 – GRC
A suite of automated and semi-automated tools that help business leads track risk and manage
exposure based on a set of established controls
DT.3 – IDAM
IDAM technologies ensure efficient and secure identification, authentication, authorization, credentialing
and provisioning of users with appropriate access rights
DT.4 – Data-Centric Security
Ensure that data is protected, controlled and accessible in a system-agnostic way. These technologies
ensure that a properly deployed IDAM system can enable Attribute Based Access Control (ABAC) to
individual data assets
29
This document includes Privileged and Confidential information that shall not be disclosed outside of Booz Allen Hamilton Booz
and
shall not be duplicated, used, or disclosed—in whole or in part—for any purpose other than to evaluate these discussions.
Allen Proprietary
29
Data Handling Policy and Rules Implementation is the process of
implementing data categorizations across enterprise systems
P1.1
P1.3
Information
Security
P1.5
Network
Operations
P1.7
Privacy
Office
End User
PEOPLE
P1.2
P1.4
Incident
Response
MX.2
MX.2.1
PROCESS
Draft Data Handling
Policies
Categorize Data
Ensure Storage
Repositories are
Categorization-Aware
MX.2.3.1
Formalize Data
Categorization &
Handling Policies
MX.2.2.2
Define Required
Controls
DT1
30
MX.2.4
MX.2.3
Storage and
Transmission Category
Interpretation
MX.2.2.1
Determine Data
Categorization
Schema
MX.2.1.1
TECHNOLOGY
Compliance
Office
Legal
MX.2.2
Data Handing Policy
and Rules
Implementation
Business
Leads
P1.8
P1.6
Systems
Operations
P1.9
Ensure Transmission
and Storage Schemes
are Consistent
DT2
DLP Protection
Suite
DT4
DT3
GRC
IDAM
This document includes Privileged and Confidential information that shall not be disclosed outside of Booz Allen Hamilton Booz
and
shall not be duplicated, used, or disclosed—in whole or in part—for any purpose other than to evaluate these discussions.
Data-Level
Security
Allen Proprietary
30
Data
Handling
and
Rules
Implementation:
Click
to addPolicy
header
(Up
to two
lines, 22 pt) RACI CHART
High-Level Process
Key Roles
Key Processes
IS
IR
Net Ops
Sys Ops
Privacy
Legal
MX.2.1 – Determine Data Classification Schema – Identify a
consistent schema for labeling data in accordance with the previously
defined data categories. Schema may vary based on data types, but
must have consistent, translatable concepts
A
C
R
R
C
C
-
C
I
MX.2.1.1 – Define Required Controls – Define information security
controls for implementing the classification schema (will certain
categories need to be encrypted based on national standards, e.g.
HIPAA).
A
C
R
R
C
C
-
R
I
MX.2.2 – Storage and Transmission Category Interpretations –
Ensure that processes exist to efficiently and securely translate
between data in transit and data at rest/in processing.
A
R
C
C
R
I
-
C
I
R Responsible
A Accountable
The individual or group responsible
The individual with yes/no authority
for completing/ implementing the
and veto power that is ultimately
task at hand. Responsibility may be
accountable. Only one “A” per
shared.
activity.
31
C Consulted
The individual(s) and/or group(s) to
be consulted prior to a final decision
or support one or more actions.
I
End-User Compliance Business
Informed
The individual(s) and/or group(s) that
should be informed after decisions
are made and actions are taken.
This document includes Privileged and Confidential information that shall not be disclosed outside of Booz Allen Hamilton Booz
and
shall not be duplicated, used, or disclosed—in whole or in part—for any purpose other than to evaluate these discussions.
Allen Proprietary
31
Derived
Generalized
DCP
Requirements
and
Vendors/Service
Click to
add header
(Up
to two lines,
22Leading
pt)
Providers
Legend
X
X
X
2)
Centralized Dashboard with Metrics
x
X
X
X
3)
Automated Data Tagging / Categorization
X
X
X
X
4)
Custom System Monitoring
5)
Network Services Monitoring
6)
Service Health Monitoring (Processes,
Threads)
7)
Information Rights Management
X
8)
Policy Management for Compliance (HIPAA,
PCI, etc.)
S
X
9)
Robust Alerting Mechanism
X
X
X
X
X
X
X
11) Mobile / BYOD Monitoring
X
12) Enterprise File Level Access Control
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
S
X
X
X
X
X
13) Automated Business Rule Validation
32
X
X
10) Automated Blocking and Quarantine
14) Digital Policy Generation
X
X
X
S = Service
X
X
X
BAH
McAfee
X
X = Solution
Microsoft
Cisco IronPort
X
Symantec
Trustwave
X
kCura
CA Tech
Automated Data Discovery
WatchDox
Verdasys
1)
Derived Requirements
RSA
Websense
Leading Vendors/Service Providers
X
X
S
S
X
S
This document includes Privileged and Confidential information that shall not be disclosed outside of Booz Allen Hamilton Booz
and
shall not be duplicated, used, or disclosed—in whole or in part—for any purpose other than to evaluate these discussions.
Allen Proprietary
32
Table of Contents
 Data-Centric Threats and Challenges
 Booz Allen Blueprints
 Data-Centric Protection Program Solutions
 Qualifications
 Sample Blueprint
 Contacts
This document contains Booz Allen Hamilton Inc. proprietary and confidential business information – Intended Only for the Recipient
33
Booz Allen Contacts
Bill Stewart
Jeff Lunglhofer
Senior Vice President
Principal
Booz | Allen | Hamilton
Booz | Allen | Hamilton
Booz Allen Hamilton, Inc.
Booz Allen Hamilton, Inc.
13200 Woodland Park Rd
Herndon, VA 20171
900 Elkridge Landing Rd
Linthicum, MD 21090
Tel (410) 684-6473
Stewart_Bill@bah.com
Tel (619) 721-3114
Lunglhofer_Jeff@bah.com
Ernie Anderson
Stephen Coraggio
Senior Associate
Senior Associate
Booz | Allen | Hamilton
Booz | Allen | Hamilton
Booz Allen Hamilton, Inc.
Booz Allen Hamilton, Inc.
1615 Murray Canyon Rd.
Suite 140
San Diego, CA 92120
1095 Ave of the Americas
New York, NY 10035
Tel (619) 663-7757
Anderson_Ernie@bah.com
Tel (201) 407-9224
Coraggio_Stephen@bah.com
This document contains Booz Allen Hamilton Inc. proprietary and confidential business information – Intended Only for the Recipient
34
Download