Cisco IT Case Study Intellectual Property Asset Protection How Cisco Automates Protection of Intellectual Property Alerts based on behavior and context analysis of user actions reduce risk of data loss. Challenge EXECUTIVE SUMMARY CHALLENGE ● Automate monitoring of intellectual property assets for improper access, storage, and distribution ● Obtain information to improve protection of data and intellectual property SOLUTION ● Internally developed iCAM software to analyze behavior and generate alerts when defined rules are violated ● Context information provided by Cisco Identity Services Engine to better target behavior analysis RESULTS ● 40+ billion files protected ● 60 percent of alerts generated without intervention by security experts ● Managers see details that help them educate users about risks ● Cisco gains information to improve protection of sensitive files, documents, and data Like any business, Cisco has a huge amount of intellectual property such as customer information, financial data, product source code, and development plans. If accessed by unauthorized people, that intellectual property could be used to damage the company’s operations and network security, revenues, competitive advantage, customer relationships, and reputation. We maintain a strong physical and network security infrastructure to protect those assets, which are stored on systems in Cisco facilities around the world. However, this infrastructure is largely focused on stopping threats from external sources. We needed capabilities to detect abnormal internal activity in order to identify risky user behavior, whether intentional or not. Behaviors of concern include: ● LESSONS LEARNED ● Educate managers about using alerts appropriately an employee’s personal computer or mobile device, especially just before the employee leaves the ● Define behavior rules carefully ● Plan for scalability ● Context is very important to help managers evaluate risks NEXT STEPS ● Extend iCAM to monitor data in cloud services Transfers of highly sensitive files, documents, and data to company. ● Data transfers that are authorized, but sent over unencrypted channels. ● ● Support up to 10+ billion events per day ● Develop predictive analytics for proactive risk reduction Distributing highly confidential documents to a large group of internal users or posting restricted data for open access. ● Storing confidential information on unsecured servers, file-sharing sites, or unauthorized cloud services. ● Allowing access to a virtual desktop session by an unauthorized person. Although the Cisco® Computer Security Incident Response Team (CSIRT) was responsible for monitoring user behavior risks, they needed an automated tool to keep up with the growing amount of data and activity. Additionally, the increased use of cloud services for certain business applications and communications present another avenue for inadvertent file sharing or information disclosure. Improved access monitoring had to align with Cisco’s policies for data protection and intellectual property access, © 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. March 2015 Page 1 of 5 as well as regulatory requirements and the Cisco Code of Business Conduct. “It’s not practical to have only CSIRT monitor what data is at risk,” says Melvin Tu, manager and architect, Cisco IT. “As our policies state, protecting Cisco’s intellectual property is the responsibility of every employee.” Solution Cisco IT developed the Intelligent Context and Content Aware Monitoring (iCAM) software to analyze abnormal user behavior, generate alerts, and apply machine learning technologies to improve the monitoring over time (see Figure 1). Figure 1. iCAM Process for Analyzing Behavior and Context and Generating Alerts To assess a user’s behavior, iCAM incorporates a Hadoop-based analytics tool. This tool combines event data from an application or system with context information about the PRODUCT LIST Servers - Unified Computing ● Cisco Unified Computing System Security ● Cisco Identity Services Engine associated user, data, device, and network. The context is drawn from a mix of external and internal sources. For example, the Cisco Identity Services Engine (Cisco ISE) provides critical information about the device involved in an event, such as when a different username is assigned to the device or when it does not have the operating system version necessary for secure data storage. The Cisco ISE and the iCAM software run on Cisco Unified Computing System™ (Cisco UCS®) servers, which support the scalability necessary to monitor more intellectual property assets in more of our locations. When a user violates a behavior rule, iCAM sends an alert to the user or the user’s manager, according to the action defined in the rule. For users, the alerts provide education about potentially risky behavior. For managers, the alerts present the information they need to appropriately manage employee activity. The manager can also elevate high-risk alerts to the Cisco Computer Security Incident Response team for investigation. © 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. March 2015 Page 2 of 5 “iCAM is designed on the principle of ‘trust but verify’ for detecting if someone abuses their access privileges,” says Cheng Pan, program manager, Cisco IT. “The behavior and contextual analysis provides in clear language the who, when, where, and how details that a manager can use to identify the corrective action that is needed.” The indepth alert information also helps us improve governance and methods for protecting Cisco’s proprietary, confidential, and sensitive data. However, there are times when a user’s behavior may be unusual, but in fact it is authorized. In this case, the manager can provide feedback to adjust the behavior rules in iCAM to allow that activity, which means repeated “false positive” alerts will not be issued in the future. “The iCAM team works with development groups and data owners to define the behavior rules according to their work practices and business needs,” says Tu. “This helps iCAM raise alerts only when we have a real problem.” The business rules also reflect the requirements of Cisco’s corporate policies for classifying data and protecting intellectual property. Results iCAM started as a security monitoring engine to protect source code for our research and development centers. Today, iCAM also monitors Cisco’s global data centers to control access to and prevent leakage of many types of confidential and proprietary information. Table 1 shows the current scope of iCAM monitoring activity. Table 1. iCAM Activity Scope Monitoring Activity Data Sources Examples of Monitored Activities 40+ billion files protected 130,000+ user profiles File sharing and transfers 3+ billion events collected from 14,000+ servers daily 200,000+ device profiles Searches on sensitive topics and keywords 200+ Cisco product profiles Accessing source code repositories and restricted databases 700+ policy rules File system scanning For the alerts generated by iCAM, 60 percent are “zero touch,” meaning a risky behavior is detected without any manual action by anyone in Cisco IT or CSIRT. This capability allows faster notification and resolution of improper information access or file sharing. By using the data, device, and network profiles, iCAM also detects abnormal events that are generated by a device or application that is not associated with an individual Cisco user. This capability provides an added measure of protection for our intellectual property assets. The evolution of iCAM will bring additional benefits to Cisco. “As the machine learning capabilities in iCAM improve the ability to detect risky behavior, we will be able to create predictive analytics for proactively monitoring and detecting when an unauthorized action might occur,” says David Corsano, director, Cisco IT. “The ultimate goal with iCAM is to predict and prevent a disclosure before it happens.” Lessons Learned We have learned several lessons from our experience in developing iCAM and expanding its deployment. Educate managers. To be effective, managers need to respond to iCAM alerts promptly and appropriately. For example, a user may unintentionally do something that violates policy and causes iCAM to issue an alert. Managers can use the alert to help employees understand risky behavior or to identify needed changes in data classifications or access authorization. The manager should also know how to forward alerts to the corporate © 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. March 2015 Page 3 of 5 security department when a clear security threat is present. Define behavior rules carefully. Understanding the risks and regulatory requirements of your business, as well as the sensitivity of your information and potential user actions, will help create effective rules for monitoring user behavior. Also identify behaviors that might be considered risky but in fact are routine and acceptable, such as sharing certain types of order information with an authorized partner. This type of context information is important in helping managers understand the actual risk present in an alert. Plan for scalability. As we move toward the Internet of Everything, an asset protection solution will need to monitor more information types, devices, and applications. “The ultimate goal with iCAM is to predict and prevent a disclosure before it happens.” — David Corsano, Director, Cisco IT Next Steps Because iCAM was designed to deliver protection monitoring as a service, it is very easy and cost effective for us to use it with new applications or environments. Cisco IT plans to extend iCAM to monitor additional data and document systems, with a particular focus on unstructured data in cloud services. We will also scale the iCAM deployment to support analysis of as many as 10 billion events per day. For More Information Read about the Cisco Identity Services Engine and the Cisco Enterprise Policy Manager. The Cisco Code of Business Conduct presents an overview of the practices that Cisco employees must follow for protecting intellectual property. To read additional Cisco IT case studies about a variety of business solutions, visit Cisco on Cisco: Inside Cisco IT. To view Cisco IT webinars and events about related topics, visit Cisco on Cisco Webinars & Events. Note This publication describes how Cisco has benefited from the deployment of its own products. Many factors may have contributed to the results and benefits described. Cisco does not guarantee comparable results elsewhere. CISCO PROVIDES THIS PUBLICATION AS IS WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESS OR IMPLIED, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Some jurisdictions do not allow disclaimer of express or implied warranties; therefore, this disclaimer may not apply to you. © 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. March 2015 Page 4 of 5 © 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. March 2015 Page 5 of 5