The Next Generation DLP Journey

advertisement
The Next
Generation DLP
Journey
Duane Clouse
Global Managing Principal, Verizon Data
Protection
October 2015
Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or
distribution of this material is not permitted to any unauthorized persons or third parties except by written agreement.
Agenda
The areas covered will be:
Current Data Protection Landscape
In this topic I will review the current security breach statistics, the existing
Data Protection Landscape and what’s needed to help drive a successful Data
Protection program
Why Classification
Classifying information is the keystone to determine who should have access to
the information and what they are allowed to do with it. In this topic I will discuss
the importance of data classification and the typical approaches in use
today.
Data Protection beyond the Endpoint
Traditional DLP tools ends at the perimeter. Other strategies are needed to
extend protection beyond the enterprise. In this topic I will address the use
cases and solutions that could address data outside of the perimeter.
Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or
distribution of this material is not permitted to any unauthorized persons or third parties except by written agreement.
2
70
CONTRIBUTING
Security incident:
Any event that compromises
the confidentiality, integrity,
or availability of an
information asset.
Data breach:
An incident that resulted in
confirmed disclosure (not just
exposure)to an unauthorized
party
ORGANIZATIONS
79,790
SECURITY
INCIDENTS
2,122
CONFIRMED
DATA BREACHES
61
COUNTRIES
REPRESENTED
Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or
distribution of this material is not permitted to any unauthorized persons or third parties except by written agreement.
Data Breaches are
affecting Organizations
in over 61 countries
Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or
distribution of this material is not permitted to any unauthorized persons or third parties except by written agreement.
4
Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or
distribution of this material is not permitted to any unauthorized persons or third parties except by written agreement.
5
INSIDER
MISUSE
As with prior years, the top action (55% of
incidents) was privilege abuse
Most affected
industries:
Public,
Healthcare,
and
Financial
Services
Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or
distribution of this material is not permitted to any unauthorized persons or third parties except by written agreement.
6
MISCELLANEOU
S ERRORS
Most affected
industries:
Public,
Information, and
Healthcare
Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or
distribution of this material is not permitted to any unauthorized persons or third parties except by written agreement.
7
Information
Protection
Driven by
Classification.
8
Existing Solutions
Like CISOs, information security solution providers are rising to the challenge of
the borderless enterprise, numerous solutions exist. The most popular of these
are based on security paradigms that can be roughly divided into three types:
• Data Loss Prevention (DLP)
• Cloud Encryption Gateways (CEG)
• Anti-Malware or Advanced Persistent Threat
** All three are still valid solutions and are excellent at what they do specific
to the requirements they are working to fulfil.
Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or
distribution of this material is not permitted to any unauthorized persons or third parties except by written agreement.
9
DLP-based Solutions
According to Wikipedia, Data Loss Prevention “…is designed to detect
potential data breach / data exfiltration transmissions and prevent them by
monitoring, detecting and blocking sensitive data while in-use (endpoint
actions), in-motion (network traffic), and at rest (data storage).”
DLP was conceived to protect infrastructure. It presupposes that data will always
be enclosed – within a trusted endpoint, in transit over a trusted network, or
within a trusted storage network. In other words, the DLP paradigm presumes
that the perimeter still exists. But since we’ve already determined that the
perimeter does not exist, how can DLP-based information security solutions still
deliver?
Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or
distribution of this material is not permitted to any unauthorized persons or third parties except by written agreement.
10
Cloud Encryption Gateway (CEG) - based
Solutions
CEG solutions create a secure conduit between your users and cloudbased applications and data. Trusted users can only access cloud-based
services via this single point, and their data is encrypted while in transit and
storage.
CEG appliances constitute a single point of failure at worst, a traffic bottleneck
at best, and raise TCO (Total Cost of Ownership) in any case. But beyond the
obvious, CEG is conceptually trying to create a perimeter in a perimeter-less
world. By limiting access to the cloud to a single point, CEG-based solutions by
definition cripple cloud elasticity and may impact productivity.
Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or
distribution of this material is not permitted to any unauthorized persons or third parties except by written agreement.
11
Anti-Malware and APT Protection
• Signature-based solutions need pre-existing knowledge of a given
attack type in order to defend against that attack. But since threats are
zero-day, pre-existing knowledge is an oxymoron. This paradigm protects
only against known threats, when the danger is by definition unknown.
• Current anomaly detection solutions, even those advanced solutions that
use predictive behavior modelling, still markedly contribute to security
overhead owing to frequent false positives. Moreover, these solutions can
actually impede security, since security thresholds are often raised to
eliminate false positives, allowing malware to “slip in under the radar.”
Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or
distribution of this material is not permitted to any unauthorized persons or third parties except by written agreement.
12
More Options
•
•
Encryption – Symmetric and Asymmetric
Rights management
 The concept of persistent protection that controls the use, circulation,
and compartmentalization of content
•
Secure file sharing and collaboration.
•
SIM and security analytics
•
Access controls
 Aim to provide end-to-end security, with a wide range of capabilities
that can include content management and workflow, encryption, file
retention management etc…
 Situational awareness — understanding what is happening in the
enterprise environment and how data flows
 Ensuring that the right users have access to the right data when they
need it
Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or
distribution of this material is not permitted to any unauthorized persons or third parties except by written agreement.
13
What is Important for Success with a Data
Protection Program
• Commitment - Senior and middle management need to be onboard, this is
not something that can be fixed by just technology.
• Identify the Business Drivers - Support from the information owners and
other appropriate sponsors to establish the correct success criteria.
• A Defined Process Discipline - (Operationalization) Specific to the area
of Data Protection.
• Policy Governance and Framework - (Operationalization) Specific to the
area of Data Protection.
Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or
distribution of this material is not permitted to any unauthorized persons or third parties except by written agreement.
14
Program Validation
Validation Tasks
Validation of DLP Program Success Criteria
• Policy Review for support of DLP program activities
• Identify and validate both short and long term DLP program objectives
• Validate executive support and sponsorship for DLP
• Document the suggested changes and recommendations to existing
process, policies and infrastructure.
Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or
distribution of this material is not permitted to any unauthorized persons or third parties except by written agreement.
15
The challenge - Global Workspace
Storage
Applications
Devices
Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or
distribution of this material is not permitted to any unauthorized persons or third parties except by written agreement.
A new approach is needed
Next Generation DLP
•
Reduce operations overhead
•
Real effective security
• Classify information persistently
• Avoid false positives and false negatives
• Reduce the need for multiple appliance implementations at the exit
points
•
•
•
Go beyond monitoring only mode
Protect information in the Cloud
Protect instead of block. Blocking is disruptive
Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or
distribution of this material is not permitted to any unauthorized persons or third parties except by written agreement.
Information / Data centric protection
IDENTITY and
GOVERNANCE
DISCOVER,
MONITOR and
CONTROL
PROTECTION
CLASSIFICATION
Why Classification
• Protection - persistent encryption and Information Rights Management (like MS AD
RMS). Protection and permissions move with data - in use, in motion, and at rest
- regardless of location, on/off premise, while still preserving functionality like ,
archiving, e-discovery, and more.
• Classification – classification of sensitive files and emails based on automated,
system-driven recommendations, as well as user driven classification models
that assist enterprises in optimizing classification methods.
• Usage Tracking – powerful analytics and reporting to identify trends, detect
anomalies, execute forensics, and assess risk.
• Policy – granular central policy management throughout the information lifecycle.
By changing from a perimeter-centric security paradigm to an Information /
data-centric paradigm, CISOs can nullify the issues that traditional information
security vendors wrestle with daily. No more costly and productivity-limiting
workarounds. No more high security single points of failure. Sensitive information of
any kind is immunized at its origin, and is then free to be securely accessed by
trusted users - anywhere, anytime,
Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or
distribution of this material is not permitted to any unauthorized persons or third parties except by written agreement.
19
Why Classification
Classifying information is the keystone to determine who should
have access to the information and what they are allowed to do
with it.
• Sensitive information might be anywhere
• Infrastructure location alone, such as a file share, is not a
reliable way to determine sensitivity..
• Raise user awareness
• Classification raises user awareness and accountability
• Provides Accuracy
• Many DLP implementations do not progress beyond
monitoring only.
• DLP tools can not reliably scan non text based
information or detect intellectual property.
• DLP tools can utilize classification information to
determine sensitivity of information.
Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or
distribution of this material is not permitted to any unauthorized persons or third parties except by written agreement.
CLASSIFICATION
Classification
• Flexible interception points
• Cloud solutions
• ECM (Enterprise Content
Management) software like MS
SharePoint,
• Enterprise applications
• Storage networks
• All types of user-generated content.
• Automated classification based on
source, target and content.
• User driven classification and reclassification built in to the everyday
workflow.
Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or
distribution of this material is not permitted to any unauthorized persons or third parties except by written agreement.
Protection
Traditional DLP tools ends at the perimeter. Encryption is
needed to extend protection beyond the enterprise.
Encryption of any file type and email regardless of storage
location. Protect the object instead of DLP block.
No manual key or certificate exchange.
The protection must be transparent to the user.
Password based encryption does not scale and creates a black
hole.
Protection based on classification policy, that is AD Group based
encryption instead of individual users.
Protection inside and outside of the enterprise on any device.
No separate client install. RMS is built in to Windows.
Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or
distribution of this material is not permitted to any unauthorized persons or third parties except by written agreement.
PROTECTION
Classification Mech.
Optimized classification cycle is triggered upon
intercepted events (open, close, save, download, upload, copy, etc)
Phrases
Patterns
Thresholds
Algorithms
Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or
distribution of this material is not permitted to any unauthorized persons or third parties except by written agreement.
Third Party
User Classification
Folders
User
File
Email
Applications
Properties
Domain
Web
ECM
AD Attributes Attributes
SaaS
Cloud
IP Ranges
Content
Metadata
Identity
Destination
Source
Microsoft Word
Document
Customer Info
Finance
Info
Classified
Top Secret
Public Info
Others
SAP Information protection
Companies spend considerable
resources controlling their SAP
environment, information exported
from SAP is generally uncontrolled
•
•
•
•
•
•
Protect and classify information at the
moment of creation
Persistent object encryption
Centrally controlled access policy
Persistent classification
Audit trail of document use
Automated classification based on
source, destination, content ,
thresholds
Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or
distribution of this material is not permitted to any unauthorized persons or third parties except by written agreement.
Example: Engineering Files
Organization wants to protect intellectual property in
the form of CAD drawings and other engineering files
in the changing IT landscape
•
•
CAD Application
Persistent Protection
Operating System
Classify and protect CAD files
Persistent protection, even when shared with
authorized external parties
•
Fine-grained access restrictions, e.g., allow viewing,
•
Un-intrusive solutions supporting established polices
•
prevent printing, etc.
for engineering information and Product Lifecycle
Management (PLM) solutions
Protect CAD constructions, consisting of many parts
and structure files, protecting only the relevant
parts
Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or
distribution of this material is not permitted to any unauthorized persons or third parties except by written agreement.
Watchful
Software
RightsWATCH
.
Classify email.
Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or
distribution of this material is not permitted to any unauthorized persons or third parties except by written agreement.
27
Classify Office documents.
Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or
distribution of this material is not permitted to any unauthorized persons or third parties except by written agreement.
28
Office classification visualization.
Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or
distribution of this material is not permitted to any unauthorized persons or third parties except by written agreement.
29
Classify from a folder.
Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or
distribution of this material is not permitted to any unauthorized persons or third parties except by written agreement.
30
Open protected picture file.
Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or
distribution of this material is not permitted to any unauthorized persons or third parties except by written agreement.
31
Secure
Islands
IQProtector.
32
Classify email.
Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or
distribution of this material is not permitted to any unauthorized persons or third parties except by written agreement.
33
Email classification visualization.
Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or
distribution of this material is not permitted to any unauthorized persons or third parties except by written agreement.
34
Classify Office.
Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or
distribution of this material is not permitted to any unauthorized persons or third parties except by written agreement.
35
Office classification visualization.
Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or
distribution of this material is not permitted to any unauthorized persons or third parties except by written agreement.
36
Access denied.
Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or
distribution of this material is not permitted to any unauthorized persons or third parties except by written agreement.
37
Thank you.
Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or
distribution of this material is not permitted to any unauthorized persons or third parties except by written agreement.
38
Download