Enterprise GIS: Security Strategy Michael E. Young Chief Product Security Officer Matt Lorrain Security Architect Agenda • Introduction • Trends • Strategy • Mechanisms • Server • Mobile • Cloud • Compliance Introduction What is a secure GIS? Introduction What is “The” Answer? Risk Impact Introduction Where are the vulnerabilities? *SANS Relative Vulnerabilities Core network component vulnerabilities were exposed last year, but application risks are still king Current Real World Scenarios & Trends Michael Young Trends Web Application Attacks *Verizon 2015 DBIR Trends Mobile attacks • Number of mobile devices infected still relatively small • 96% targeted against Android platform • Mobile malware short lived - • Mobile SDK’s being attacked - • Piggybacks popular apps Ensure apps built with latest SDK’s What can help? - Enterprise Mobility Management enables control and visibility * Verizon 2015 DBIR Trends Trends by Industry • Frequency of incidents by pattern and industry • Identify hot spots for your specific industry - Prioritize security initiatives to mitigate against common threats * Verizon 2015 DBIR Real-world security scenarios Disaster communications modified • • Scenario - Organization utilizes cloud based services for disseminating disaster communications - Required easy updates from home and at work - Drove allowing public access to modify service information Lesson learned - Enforce strong governance processes for web publication - Don’t allow anonymous users to modify web service content - Minimize or eliminate “temporary” modification rights of anonymous users - If web services are exposed to the internet, just providing security at the application level does not prevent direct service access Lack of strong governance leads to unexpected consequences Real-world security scenarios Using same username and password between systems leads to compromise • • Scenario - Hackers used a third-party vendor’s user name and password to enter network - Hackers managed to elevate rights and deploy malware on systems - Result - 56 million credit and debit cards compromised - 53 million email addresses disclosed Lessons learned - Credential management and high-level of trust of “internal” users - Use an Identity Provider with SAML 2.0 for accessing cloud-based applications - Enforce 2-factor authentication – At a minimum administrators should do this Real-World Security Scenarios QUIZ – When was the last ArcGIS Security patch released? • Hint – The Trust.ArcGIS.com site will always have this answer handy… 99.9% of vulnerabilities are exploited more than a year after being released Trends Strategic Shifts in Security Priorities for 2015 and Beyond • Identity management priority increasing as security focus moves from network to data level • Advanced Persistent Threats driving shift from Protect to Detect • Encryption of Internet traffic via SSL v3 broken – Ensuring TLS utilized is necessary • Password protection is broken – Stronger mechanisms required such as 2-factor auth • Customers balancing security gateways for mobile solutions vs. VPN • Patching beyond Operating systems critical • End-of-life OS builds with XP and now Server 2003 present significant risk Strategy Michael Young Strategy A better answer • Identify your security needs - • • Assess your environment - Datasets, systems, users - Data categorization and sensitivity - Understand your industry attacker motivation Understand security options - Trust.arcgis.com - Enterprise-wide security mechanisms - Application specific options Implement security as a business enabler - Improve appropriate availability of information - Safeguards to prevent attackers, not employees Strategy Enterprise GIS Security Strategy Security Risk Management Process Diagram - Microsoft Strategy Evolution of Esri Products & Services Solution Enterprise Product Isolated Systems Integrated Systems Software as a Service 3rd Party Security Embedded Security Managed Security Strategy Esri Products and Solutions • • Secure Products - Trusted geospatial services - Individual to organizations - 3rd party assessments Secure Platform Management - • Backed by Certifications / Compliance Secure Enterprise Guidance - Trust.ArcGIS.com site - Online Help ArcGIS Strategy Security Principles CIA Security Triad Availability Strategy Defense in Depth • More layers does NOT guarantee more security • Understand how layers/technologies integrate • • Simplify Balance People, Technology, and Operations Data and Assets Physical Controls Policy Controls • Holistic approach to security Technical Controls Mechanisms Esri UC 2014 | Technical Workshop | Mechanisms Mechanisms Users & Authentication • • User Store Options - Built-in user store - - • LDAP / Active Directory Built-in Token Service - - - Windows Integrated Auth, PKI, Digest… Identity Provider (IdP) / Enterprise Logins - - Server-tier Auth w/ Enterprise Users - Web-tier Auth w/ Enterprise Users Portal for ArcGIS patterns - Portal-tier Auth w/ Built-in users - Portal-tier Auth w/ Enterprise users - Web-tier Auth w/ Enterprise users - SAML 2.0 Auth w/ Enterprise Users Server, Portal, ArcGIS online Web-tier (IIS/Apache) w/ Web Adaptor - Server-tier Auth w/ Built-in users • Authentication Options - - Server, Portal, ArcGIS Online Enterprise user store - ArcGIS Server patterns SAML 2.0 for ArcGIS Online & Portal • ArcGIS Online patterns - ArcGIS Online Auth w/ Built-in users - SAML 2.0 Auth w/ Enterprise users Mechanisms Authorization – Role-Based Access Control • • • Out-of-box roles (level of permission) - Administrators - Publishers - Users - Custom – Only for Portal for ArcGIS & ArcGIS Online ArcGIS for Server – Web service authorization set by pub/admin - Assign access with ArcGIS Manager - Service Level Authorization across web interfaces - Services grouped in folders utilizing inheritance Portal for ArcGIS – Item authorization set by item owner - Web Map – Layers secured independently - Packages & Data – Allow downloading - Application – Allows opening app Mechanisms Authorization – Extending with 3rd Party components • Web services - Conterra’s Security Manager (more granular) - • RDBMS - Row Level or Feature Class Level - Versioning with Row Level degrades performance - • Layer and attribute level security Alternative – SDE Views URL Based - Web Server filtering - Security application gateways and intercepts Mechanisms Filters – 3rd Party Options • Firewalls - Host-based - Network-based • Reverse Proxy • Web Application Firewall - Open Source option ModSecurity • Anti-Virus Software • Intrusion Detection / Prevention Systems • Limit applications able to access geodatabase Internet Mechanisms Filters - Web Application Firewall (WAF) 443 • Implemented in DMZ Security Gateway WAF, SSL Accel, LB • Protection from web-based attacks DMZ • Monitors all incoming traffic at the application layer • Protection for public facing applications • Can be part of a security gateway - SSL Certificates - Load Balancer Web servers ArcGIS servers Internal Infrastructure Mechanisms Encryption – 3rd Party Options • Network - IPSec (VPN, Internal Systems) - SSL/TLS (Internal and External System) - Cloud Encryption Gateways - • • Only encrypted datasets sent to cloud File Based - Operating System – BitLocker - GeoSpatially enabled PDF’s combined with Certificates - Hardware (Disk) RDBMS - Transparent Data Encryption - Low Cost Portable Solution - SQL Express w/TDE Mechanisms Logging/Auditing • Esri COTS - Geodatabase history - - ArcGIS Workflow Manager - - “User” tag tracks user requests 3rd Party - • Track Feature based activities ArcGIS Server 10+ Logging - • May be utilized for tracking changes Web Server, RDBMS, OS, Firewall Consolidate with a SIEM Geospatial service monitors - Esri – System Monitor Vestra – GeoSystems Monitor Geocortex Optimizer Network Mechanisms GIS monitoring with System Monitor Hardware Web Server • Proactive • Integrated - • End-to-End - • All tier monitoring Continuous - • Dashboards across all tiers %Coverage provided Extendable - Custom queries ArcGIS Server Geodatabase RDBMS ArcGIS Server Matt Lorrain Esri UC 2014 | Technical Workshop | ArcGIS Server 10.3 Enhancements • ArcGIS Server Manager - • New dashboard for administrators Portal for ArcGIS extension is included with ArcGIS for Server Standard and Advanced licenses - Support for SAML 2.0 authentication - Management of group membership based on an enterprise identity store - Custom roles to better control privileges of users - Activity Dashboard to understand metrics for your portal - More streamlined approach to configuring a high-availability portal configuration - As of 10.3.1 - Query and view portal logs using Portal Directory for identifying errors, issues or troubleshooting. ArcGIS Server Desktop, Web, and Mobile Clients Single ArcGIS Server machine Desktop, Web, and Mobile Clients 80/443 6080/6443 Site Administrators Connect to Manager GIS server, Data, Server directories, Configuration Store Reverse Proxy Server 6080/6443 Site Administrators Connect to Manager GIS server, Data, Server directories, Configuration Store Front-ending GIS Server with Reverse Proxy or Web Adapter ArcGIS Server ArcGIS Server HA - Sites independent of each other • Active-active configuration is shown - • • Active-passive is also an option Network Load Balancer (NLB) Separate configuration stores and management - • Desktop, Web, and Mobile Clients Scripts can be used to synchronize 80 80 6080 6080 Cached map service for better performance Load balancer to distribute load Site Administrators Connect to Manager Web Adaptors (optional) ArcGIS Server site ArcGIS Server site Site Administrators Connect to Manager Server directories, Configuration Store (duplicated between sites) Desktop, Web, and Mobile Clients ArcGIS Server ArcGIS Server HA – Shared configuration store • Shared configuration store • Web Adaptor will correct if server fails • Network Load Balancer (NLB) 80 Config change could affect whole site - 6080 Example: publishing a service 80 6080 Web Adaptors GIS servers Site Administrators Connect to Manager • Test configuration changes Data server, Data (enterprise geodatabase), Server directories, Configuration Store Desktop, Web, and Mobile Clients ArcGIS Server ArcGIS Server HA – Clusters of Dedicated Services • Shared configuration store • Server clusters - Network Load Balancer (NLB) 80 80 Web Adaptors (optional) Perform same set of functions GIS servers Cluster A • Example - - Cluster A handles geoprocessing services Cluster B handles less intensive services 6080 Cluster B 6080 Site Administrators Connect to Manager Data server, Data (enterprise geodatabase), Server directories, Configuration Store 6080 Enterprise deployment Real Permutations Public Business Partner 1 Private IaaS Internal Portal Internal AGS Filtered Content External AGS Business Partner 2 ArcGIS Online File Geodatabase Database Public IaaS Enterprise Business Field Worker WAF, SSL Accel Load Balancer ArcGIS Server Enterprise Deployment Port: 443 Port: 80 IIS/Java Web Server IIS/Java Web Server Web Adaptor ADFS Proxy DMZ Auth Web Server Supporting Infrastructure 443 Internet Port: 6080 ArcGIS for Server GIS Services Web Apps GIS Server B Public Web Server ArcGIS Site Network Load Balancing ADFS / SAML 2.0 Port: 80 Port: 80 IIS/Java Web Server IIS/Java Web Server Web Apps AD/ LDAP Web Adaptor Web Adaptor Web Apps Web Server B Web Server A HA NAS Config Store Clustered Port: 6080 SQL HA DB1 HA DB2 ArcGIS for Server GIS Services GIS Server A Web Adaptor Round-Robin Server Request Load Balancing Directories Port: 6080 GIS Services ArcGIS for Server GIS Server B FGDB ArcGIS Server Implementation Guidance Don’t expose Server Manager or Admin interfaces to public • Disable Services Directory • Disable Service Query Operation (as feasible) • Limit utilization of commercial databases under website - File GeoDatabase can be a useful intermediary • Require authentication to services • Deploy ArcGIS Server(s) to DMZ if external users require access - • One-way replication from enterprise database Restrict cross-domain requests - Attack surface over time Attack surface • Implement a whitelist of trusted domains for communications Time Mobile Matt Lorrain Esri UC 2014 | Technical Workshop | Mobile What are the mobile concerns? *OWASP Top Ten Mobile: https://www.owasp.org/index.php/Projects/OWASP_Mobile_Security_Project_-_Top_Ten_Mobile_Risks Mobile Security Touch Points Server authentication Communication SDE permissions Device access Storage Service authorization Project access Data access Mobile Challenges • Users are beyond corporate firewall - To VPN or not to VPN? • Authentication/Authorization challenges • Disconnected editing • Management of mobile devices - Enterprise Mobility Management is the answer! - Mobile Device Management - Mobile Application Management - Security Gateways - Examples: MobileIron, MaaS360, Airwatch, and many more… Mobile Potential Access Patterns DMZ Web Adaptor IIS Portal VPN ArcGIS ArcGIS Server Security Gateway NAS Shared config store SQL Server AD FS 2.0 External facing GIS Enterprise AD ArcGIS Desktop Mobile Implementation Guidance • Encrypt data-in-transit (HTTPS) via TLS • Encrypt data-at-rest • Segmentation - Use ArcGIS Online, Cloud, or DMZ systems to disseminate public-level data • Perform Authentication/Authorization • Use an Enterprise Mobility Management (EMM) solution - Secure e-mail - Enforce encryption - App distribution - Remote wipe - Control 3rd party apps & jailbreak detection Cloud Matt Lorrain Esri UC 2014 | Technical Workshop | Cloud • Non-Cloud - • IaaS - • Traditional systems infrastructure deployment Portal for ArcGIS & ArcGIS Server Portal for ArcGIS & ArcGIS Server Some Citrix / Desktop SaaS - ArcGIS Online Business Analyst Online Customer Responsible End to End Decreasing Customer Responsibility Service Models Customer Responsible For Application Settings Cloud Deployment Models Online Online Intranet Intranet Intranet Portal Server Public On- Premises Hybrid 1 Online Read-only Server Server Server Intranet Basemaps Intranet Portal Hybrid 2 Cloud Server Server On-Premises + On-premise Cloud Management Models • Self-Managed - • Your responsibility for managing IaaS deployment security Security measures discussed later Provider Managed - Esri Managed Services (Standard Offering) New Esri Managed Cloud Services (EMCS) Advanced Plus - FedRAMP Moderate environment Cloud IaaS – Amazon Web Services • 8 Security Areas to Address - Virtual Private Cloud (VPC) - Identity & Access Management (IAM) - Administrator gateway instance(s) (Bastion) - Reduce attack surface (Hardening) - Security Information Event Management (SIEM) - Patch management (SCCM) - Centralized authentication/authorization - Web application firewall (WAF) Cloud EMCS Advanced Plus Offering Customer Instances ArcGIS Portal for Server for ArcGIS Customer Databases ArcGIS Online Security Infrastructure Centralized Key Authentication (2-factor) Management Network Address End Users Virtual Translation Private Cloud (Segmentation) Redundancy Esri Cloud GIS Administrator (multiple data centers) IDS/SIEM/WAF Logging ArcGIS Online front-end (Low) Managed Services back-end (Mod) Cloud Hybrid deployment combinations Users Anonymous Access Apps ArcGIS Online On-Premises • • • Ready in months/years Behind your firewall You manage & certify • Esri Managed Cloud Services • Ready in days • All ArcGIS capabilities at your disposal in the cloud • Dedicated services • FedRAMP Moderate • • • Ready in minutes Centralized geo discovery Segment anonymous access from your systems FISMA Low . . . All models can be combined or separate Cloud Hybrid ArcGIS Online Users 1. Register Services Group “TeamGreen” On-Premises ArcGIS Server AGOL Org Hosted Services, Content Public Dataset Storage 4. Access Service 2. Enterprise Login (SAML 2.0) User Repository AD / LDAP ArcGIS Org Accounts External Accounts Segment sensitive data internally and public data in cloud Cloud Hybrid – Data sources • Where are internal and cloud datasets combined? - At the browser The browser makes separate requests for information to multiple sources and does a “mash-up” Token security with SSL or even a VPN connection could be used between the device browser and on-premises system On-Premises Operational Layer Service https://YourServer.com/arcgis/rest... Cloud Basemap Service ArcGIS Online http://services.arcgisonline.com... Browser Combines Layers Cloud ArcGIS Online – Implementation Guidance • Require HTTPS • Do not allow anonymous access • Allow only standard SQL queries • Restrict members for sharing outside of organization (as feasible) • Use enterprise logins with SAML 2.0 with existing Identity Provider (IdP) If unable, use a strong password policy (configurable) in ArcGIS Online - Enable multi-factor authentication for users - • Use multifactor for admin accounts • Use a least-privilege model for roles and permissions - Custom roles Compliance Esri UC 2014 | Technical Workshop | Compliance ArcGIS Platform Security • Esri Corporate • Cloud Infrastructure Providers • Products and Services • Solution Guidance Compliance Extensive security compliance history FISMA Law Established 2002… 2005… Esri GOS2 FISMA Authorization First FedRAMP Authorization FedRAMP Announced 2010 2011 Esri Participates in First Cloud Computing Forum 2012 Esri Hosts Federal Cloud Computing Security Workshop 2013 OMB FedRAMP Mandate 2014 ArcGIS Online FISMA Authorization Planned ArcGIS Online FedRAMP Authorization 2015 2016 EMCS FedRAMP Compliant Esri has actively participated in hosting and advancing secure compliant solutions for over a decade Compliance Esri Corporate • ISO 27001 - • Esri’s Corporate Security Charter Privacy Assurance - US EU/Swiss SafeHarbor self-certified - TRUSTed cloud certified Compliance Cloud Infrastructure Providers • ArcGIS Online Utilizes World-Class Cloud Infrastructure Providers - Microsoft Azure - Amazon Web Services Cloud Infrastructure Security Compliance Compliance Products and Services • • ArcGIS Online - FISMA Low Authority to Operate by USDA (Jun 2014) - FedRAMP - Upcoming Esri Managed Cloud Services (EMCS) - • ArcGIS Server - • FedRAMP Moderate (Jan 2015) DISA STIG – (Expected 2015) ArcGIS Desktop - FDCC (versions 9.3-10) - USGCB (versions 10.1+) - ArcGIS Pro (Expected 2015) Compliance Solution Level • • • Geospatial Deployment Patterns to meet stringent security standards - Hybrid deployments - On-premise deployments Supplemented with 3rd party security components - Enterprise Identity management integration - CA SiteMinder (Complete) - Geospatial security constraints – ConTerra (Started) - Mobile security gateway integration – (Upcoming) Upcoming best practice security compliance alignment guidance - CJIS – Law Enforcement (Started) - STIGs – Defense (Started) - HIPAA – Healthcare (Future) Compliance ArcGIS Online Assurance Layers Customer Web App Consumption ArcGIS Management Esri AGOL SaaS FISMA Low (USDA) SafeHarbor (TRUSTe) Web Server & DB software Operating system Instance Security Management Cloud Provider ISO 27001 SSAE16 FedRAMP Mod Cloud Providers Hypervisor Physical Compliance Deployment Model Responsibility Compliance Cloud Roadmap 2015 2014 ArcGIS Online FISMA Low Managed Services (EMCS) FedRAMP Mod Upcoming ArcGIS Online FedRAMP Summary Esri UC 2014 | Technical Workshop | Summary • Security demands are rapidly evolving - • Prioritize efforts accord to your industry and needs Don’t just add components, simplified Defense In Depth approach Secure Best Practice Guidance is Available - - Check out the ArcGIS Trust Site! Security Architecture Workshop - SecureSoftwareServices@esri.com Thank you… • Please fill out the session survey in your mobile app • In the agenda, click on the title of this session - Enterprise GIS: Security Strategy • Click “Technical Workshop Survey” • Answer a few short questions and enter any comments Want to Learn More? • ArcGIS Online: A Security, Privacy, and Compliance Overview - • ArcGIS Server & Portal for ArcGIS: An Introduction to Security - • Tues 4:30pm Implementation Center Oauth 2 and Authentication in ArcGIS Online Demystified - • Tues 5:30pm Demo Theater 14 Building Security into your System - • Wed 3:!5pm Room 3, Thurs Room 4 Best Practices in Setting up Secured Services in ArcGIS for Server - • Tues 3:15pm Room 4, Thurs 1:30pm Room 4 ArcGIS Server: Advanced Security - • Wed 10:15am Room 17B Tues 2:30pm Demo Theater 11 Using Enterprise Logins for Portal in ArcGIS via SAML - Tues 5:30pm, Wed 2:30pm Demo Theater 7 Esri Security Standards & Architecture Team SecureSoftwareServices@Esri.com