Security Best Practices

advertisement
User Group 2015
Security Best
Practices
Presenters
Steve Kelley, COO
31 years experience building and managing operations and service delivery
organizations in industrial robotics, medical devices, software development and IT
services consulting businesses. Steve has extensive experience in networking, quality
assurance, software development, disaster recovery services, and project
management. He has worked with FDA GMP/GCP, FDA 21 CFR 820, SOX/SSAE16,
FISMA, and HIPAA regulatory environments. Steve and Rob have worked together for
over 20 years in several successful entrepreneurial ventures.
Glen Balestrieri, Director of Managed Services
With 26 years of management experience in Information Technology and Direct Sales
allows, Glen is directly responsible for regulatory compliance, information systems
security, systems engineering, systems maintenance and customer service. Glen holds
a degree from American International College, with concentrations in networking,
Linux, and Microsoft systems.
Security Best Practices
• Session Directives
• To discuss the security, speed and usability of the PopMedNet Private Cloud
hosted at Lincoln Peak Partners.
• Session length is 35-45 minutes including introductions, overview,
presentation and Q&A.
• Q&A session will start 15 minutes before session ending
Presentation Overview
• In this presentation we will discuss:
•
•
•
•
•
•
Securing the cloud.
The Infrastructure behind the curtain
Encryption systems in play, both at rest and in transit
Compliance and what that means to PopMedNet
Redundancy
Application Data Flow and its Security
PMN Infrastructure and Security
Code Security Assessment
July 2, 2015
In June of 2015, Pivot Point Security conducted a static code review of Lincoln Peak Partner’s PopMedNet applications as part of their software
assurance process to provide assurance that the source code follows secure coding practices.
Our code review methodology follows the testing approach recommended by the OWASP Application Security Verification Standard (ASVS). Findings
are mapped to both the OWASP Top 10 and the Common Weakness Enumeration (CWE) project.
We determined that the applications are secured in a manner consistent with secure coding practices and on par with similar applications that we have
tested. While we did not identify any critical vulnerabilities during our testing, we did identify two areas of concern. After reviewing the issues with
Lincoln Peak Partners, they indicated that these issues are actually mitigated by outside controls.
Pivot Point Security has been architected to provide maximum levels of independent and objective information security expertise to our varied client
base. The team responsible for conducting security assessments of this nature is led by a Certified Information Security Auditor/IRCA ISO 27001 Auditor
and includes personnel appropriately qualified to render this opinion (e.g., Certified Information System Security Professionals, Microsoft Certified
System Engineers, Certified Ethical Hackers, etc.)
John Verry, 27001-CLA/CISA/CRISC
Principal Enterprise Security Consultant
Security Overview Examples
• Redundant Firewalls
• Intrusion Detection Systems
• 24/7 Live Monitoring and Response
• Endpoint Security Antivirus and Malware
• Encryption in Use, at Rest and in Transit
• Vulnerability Scans Manual and Automatic
• Weekly Log File Auditing
• Third Party Pen Testing
Application Redundancy
Lincoln Peak Partners FISMA Compliant Private Cloud
Block Diagram
MDPHnet /
PopMedNet Users
INTERNET
SSL Remote VPN Acce
(B
SSL Remote VP
N Access
ss
mit
t)
Com gmen
ps
e
b
S
10M le GB
tab
urs
SSL/TLS
SSL/TLS
(Bur
1Mb
p
stab s Com
m
le G
B Se it
gme
nt)
Phoenix DC
Disaster Recovery Site
Cold or Warm available
Dulles Vault DC
Lincoln Peak Primary
SSL VPN Site to Site Tunnel
Asynchronous Replication on Carpathia Backbone with RPO=15 minutes
Lincoln Peak Partners partners with Carpathia Hosting to provide high reliability, secure managed services solution. Lincoln Peak is certified FISMA compliant and in process on
SAS-70/SSAE-16. Carpathia Hosting is FISMA, SAS-70/SSAE-16, and SysTrust certified.
Lincoln Peak
Admins
Backup with
Redundancy
Backup Policies
Lincoln Peak Standard Operation Policy Backup
and retention outlines the follow in the flow
chart.
Redundant backups assure your data remains
intact during crisis situations.
Lincoln Peak recognizes the need to customize
policies for each individual customer. We can
provide the flexibility you need to feel secure.
All database backup are encrypted at rest and
all data is encrypted in transit.
This is an automated and monitored process.
End User
Overview of
Data Flow
Investigators
Web Browser
https/TLS 1.0-1.2
Internet
Ask a question
Response
Firewall
Ask a question
https/TLS 1.0-1.2
Firewall
Firewall
https/TLS 1.2
Response
Internet
PMN
Web Service
Firewall
https/TLS 1.2
VLAN 2
PMN
Database
Carpathia Hosting
Firewall
https/TLS 1.0-1.2
https/TLS 1.0- 1.2
Response
Administrators
PopMedNet
Portal
Single Sign
On Option
Data Provider
Data Mart
Administrators
Internet
Web
Browser
Ask a question
PMN
VLAN 1
DataMart
Desktop
Client
Model Adaptors
User Group 2015
Security Best
Practices
Download