Information Security Microsoft Legal Spotlight Presented by LawNet and Microsoft Alan Hakimi US Lead Architect for Security Microsoft Services Scott D. Gilgallon Legal Vertical Manager, San Francisco Microsoft Corporation Legal Disclaimers I am not a lawyer, nor do I intend to be one I do not provide legal advice, I try to provide information security advice I recommend seeking legal counsel, so seek yourselves and your colleagues I also recommend consulting your auditors The information contained in this document represents the current view of Microsoft Corporation on the issues discussed as of the date of publication and is subject to change at any time without notice to you. This document and its contents are provided AS IS without warranty of any kind, and should not be interpreted as an offer or commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information presented. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED,IN THIS DOCUMENT. The descriptions of other companies’ products in this document, if any, are provided only as a convenience to you. Any such references should not be considered an endorsement or support by Microsoft. Microsoft cannot guarantee their accuracy, and the products may change over time. Also, the descriptions are intended as brief highlights to aid understanding, rather than as thorough coverage. For authoritative descriptions of these products, please consult their respective manufacturers. This deliverable is provided AS IS without warranty of any kind and MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, OR OTHERWISE. All trademarks are the property of their respective companies. ©2004 Microsoft Corporation. All rights reserved. Microsoft and Windows are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries. The names of actual companies and products mentioned herein may be the trademarks of their respective owners. Agenda Information Security and Trustworthy Computing Security Objectives and Security Risk Management Developing Secure Solutions Public Key Infrastructures Microsoft Product Suite Questions Poll Information Security The defined set of organizational policies, procedures, practices, and technology which protect information assets with a reasonable assurance of safety Note: It is imperative for organizations to document this defined set Information Security Compliance “The measurement of effectiveness of the defined set of organizational policies, procedures, practices, and technology which protect information assets with a reasonable assurance of safety based on regulatory statutes and accepted standard practices.” Safe from whom? Who and what requires safety? Which regulatory statutes apply? What are accepted standard practices? What is reasonable? How does one measure effectiveness? How do I create the defined set? Microsoft Initiative Resilient to attack Individual control of personal data Engineering Excellence Protects confidentiality, integrity, availability of data and systems Products, online services adhere to fair information principles Dependable, performs at expected levels Protects individual’s right to be left alone Available when needed Open, transparent interaction with customers Address issues with products and services Help customers find appropriate solutions Basic Security Objectives Confidentiality. The concealment of information or information assets Integrity. Protection of the content of information and the source of data Availability. Ability to use the information asset The Business Case Organizations are adopting a zerotolerance for security breaches Organizations reputation and fiscal health are at stake Organizations must meet the legal standard of reasonable care Organizations must protect privileged or personal information Security Enabled Business Impact to Business Probability of Attack Risk Level Reduce Security Risk Assess the environment Improve isolation and resiliency Develop and implement controls Increase Business Value Connect with customers Integrate with partners Empower employees ROI Connected Productive Security Risk Management Addresses the safety element of information security What is the threat to your organization? What information assets require protection in your organization? Which assets are vulnerable? Security Risk Management Protect information assets Confidentiality Integrity Availability Threat Assessment Human Non Human Vulnerability Analysis Technology People Process Threat: Attackers Attackers want to disrupt the information services from running Attacker wish to view, modify, steal data from the information service Attackers are motivated by religious beliefs, political views, ethnic backgrounds, nationality, reputation, and wealth Threat: Other Lawyers Lawyers take legal action against individuals or organizations May be on behalf of employees, customers, or other organization The risk stems from: Failure to protect data Illegal, irresponsible, fraudulent, ignorant or unethical behavior Legalese and Threat Mitigation Tort is “a wrong” that are civil in nature that violate someone’s right or duty. A right is a legal claim as to not have others interfere with a protected interest including property and privacy A duty is a legal obligation not to interfere with protected interest Negligence (negligent tort) it some conduct that creates and unreasonable risk of harm, or that fails to protect against harm Risk Management & Decision Support Low Impact of vulnerability to business Business defines impact High Unacceptable Risk Risk management drives risk to an acceptable level Acceptable Risk Probability of threat/exploit Information security defines probability High Security Solutions Scope Common security environments Manage risk where IT assets are similar Define roles & accountability for each environment Create processes to assess, control, and measure each environment Physical Network Host Application Data Managed Servers Managed Clients Unmanaged Devices Defense in depth Provides a way to group threats and controls Spans people, process, and technology Framework for a Security-Enabled Business Security Leadership & Culture Risk Management & Decision Support Security Solutions Blueprint ● ● ● ● Management commitment to proactive risk management Security defined in terms of value to the business Clearly defined vision, mission, and scope Well-defined roles and accountability ● Consistent and repeatable process to assess and prioritize risk ● Formal decision support process to identify the most effective solution based on a cost/benefit analysis ● View of security solutions across enterprise IT assets ● Common approach and understanding of current investments and future needs ● Measurement of results Security Leadership & Culture Security Business Security Security Drivers Strategy Principles Leadership Roles Business drivers Regulatory mandates Industry standards Customer confidence Security strategy Proactive Reactive Security Dashboard Defense in Depth Security Environments Managed Servers Managed Clients Unmanaged Devices Physical Network Host Apps Data Assessing Risk Defense in Depth Security Environments Physical Network Host Apps Data Evaluate risk for each intersection Managed Servers Managed Clients • Provides holistic view of information security • Each intersection contains risk rating and mitigation strategy Acceptable Unmanaged Devices Control in Progress Unacceptable Acceptable Risk Assessment Results Control in Progress Unacceptable Defense in Depth Security Environments Managed Servers Managed Clients Unmanaged Devices Physical Network Host Apps Data Commit to a Course of Action Evaluate available or new IT security control options Use cost/benefit analysis to identify which gaps represent the greatest relative risk Create a formal, repeatable decision support process to prioritize solutions Implementing Solutions Defense in Depth Managed Servers Unmanaged Devices Host Solution Solution Managed Clients Network Solution Apps Data Solution Solution Physical Solution Security Environments Acceptable Measuring Results Control in Progress Unacceptable Defense in Depth Security Environments Managed Servers Managed Clients Unmanaged Devices Physical Network Host Apps Data Taking the Next Steps Formalize your security strategy Execute risk management process Refer to standards you’ve already identified and use our framework where you think it’s appropriate Establish IT security objectives Inventory vulnerabilities and existing security controls Assess risk Commit to a course of action Implement security controls Measure results Risks While the potential for damage from an attacker is more evident, an attacker does not file lawsuits for: Harassment or discrimination Privacy invasion Disclosure of confidential information Copyright infringement Investment fraud That may be your or your organizations job Therefore you must also mitigate the risk of another attorney filing a lawsuit against your organization. Security Risk Management Microsoft advocates using a risk driven approach to help manage security risks within an organization This must have involvement of senior management, stakeholders IT staff must have business awareness to understand where security investments can have the best ROI Security depends on balancing cost and risk through the appropriate use of technology, policy, outsourcing, and insurance. Security Risk Management Results Helps organization determine what are reasonable mitigation strategies to counteract threats and minimize vulnerabilities called countermeasures and safeguards. Some risks cannot be reasonably be mitigated against, therefore contingency plans can be created for the risk the organization wishes to own. Other risks can be transferred to third parties, accepted, etc. These mitigation strategies and contingency plan address the reasonable element of information security. Security Risk Management Guidance Security Risk Management Discipline http://www.microsoft.com/technet/security/prodtech/win2000/secwin2k/defau lt.mspx Security Risk Management Guidance http://www.microsoft.com/technet/security/guidance/secrisk/default.mspx Regulatory Factors Addresses the regulatory element of information security USA PATRIOT Act Department of Homeland Security (DHS) Health Insurance Portability and Accountability Act (HIPAA) Sarbanes-Oxley (SOX) Computer Fraud and Abuse Act (CFAA) Digital Millennium Copyright Act (DMCA) Gramm-Leach-Bliley (GLB) IT Security Solutions Building Systems with Security Assurance In order to meet the goals of information security, all IT solutions must address these five areas to meet the business objectives for security This is an attempt to address the accepted practices for information security Identity Management Assess Management Secure Data Management Audit Management Resiliency and Integrity Management Identity Management The set of tools, policies, and practices that manage digital identities Credentials Passwords Provisioning / Deprovisioning Attribute Synchronization Coverage Areas Directory Services Authentication Access Management The set of tools, policies, and practices that controls access to information assets Entitlements Access Control Lists Roles Groups Coverage Areas Authorization Audit Management The set of tools, policies, and practices that monitor and track the access to information assets Events Tracking Logging Reporting Auditors Coverage Areas Event Management Event Aggregation Event Reporting Event Analysis - Forensics Secure Data Management The set of tools, policies, and practices that secure data within information assets Data Storage Secured Transmission and Reception of Data across Communication Networks Coverage Areas Cryptography Privacy Data Classification Schemes Resiliency and Integrity Management The set of tools, policies, and practices that keep information assets healthy and functional Health Checking Availability Intrusion Detection Coverage Areas Malware Detection and Eradication Systems Management Operations Management Information Security Compliance Recap Questions and Answers Safe from whom and who requires safety? Security Risk Management – Asset Identification, Threat Analysis, and Vulnerability Assessment Which regulatory statutes apply? Security Risk Management – Business Requirements for Definition of Reasonable Assurance What are standard practices? Defense in Depth for Deploying Countermeasures Use Five Security Areas for Building Secure Solutions What is reasonable? Security Risk Management – Risk Analysis How does one measure effectiveness? Security Risk Management – Risk Tracking and Reporting Use ISO 17799 and Common Criteria to measure trustworthiness effectiveness Use external audit procedures to measure effectiveness of regulatory controls as required by business How does one create the defined set? Security Risk Management – Countermeasure and Safeguard Development for Remediation Strategy Definition of Security Architecture What does the law profession need? Confidential Communications Client – Attorney Privilege Secure Storage of Documents Legal Documents Privacy of Client Information Client Data Security Evidence of an Action Legal Binding Signatures Crime or Other Inappropriate Activity Public Key Infrastructure Public Key Infrastructures are quickly becoming a security enabler for most organizations and eventually will be a must have Why? Encryption Digital Signatures Multi-Factor Authenication Business drivers To provide authentication and trust Authentication Confirmed in-house or by trusted organization Digital Certificate Digital signature Integrity Guarantee information has not been tampered with Confidentiality Encrypted messages to ensure secure trusted transactions; must be securely stored Proof of transaction Encryption Digital signature Assures originator cannot disavow transaction; enables use of trusted, binding transaction receipts based on identity and/or role PKI value proposition It’s all about the applications PKI is... Not a solution… Not an application… Not a solution to thwart hackers… A technology useful in some applications that provide a security solution PKI value proposition PKI applications—customer demand Encrypting File System Protecting data on mobile stations Secure E-mail Protecting data collaboration between partners Smartcard logon Requiring stronger logon security SSL Protecting web server transactions Remote Access L2TP/IPSEC VPN solutions PKI value proposition PKI applications Fastest emerging demand Wireless and 802.1x What is slow, but growing Digital signatures, signed transactions PKI enabled application logon Client side SSL logon to web sites Smartcards for consumers Where is the “killer application?” What PKI is and isn’t PKI is an enabling technology PKI is not a solution, in and of itself Some business uses for PKI Secure communications Data needs to be safe in transit Secure data Data needs to be safe in storage Establishing digital identity For people, systems, processes Secure transactions Same or better safeguards than the paper world Recommended Reading American Bar Association Information Security committee has published PKI Assessment Guidelines (PAG) http://www.abanet.org/scitech/ec/isc/home.html Windows Platform Security Solutions Scenario Risks Solutions Mobile Users • Lost/Stolen Laptop • Dial-up Attacks • Encrypted File System (EFS) • IPSEC, L2TP E-commerce • False Identity/Impostor • Theft data/money • Transaction modification • Public Key Infrastructure (PKI) • Integrated Certificate Authority • SSL/TLS Home Office • On-wire Internet Attacks • Dial-up Attacks • False Identity/Impostor • IPSEC, L2TP •Kerberos and PKI • SSL/TLS, S/MIME LAN / WAN • False Identity/Impostor • Password Sharing/Guessing • Adds/Moves/Changes • Kerberos and PKI • Smart Cards, Biometrics • Group Policy, Delegated Admin Applications • False Identity/Impostor • Password passing • Path of least resistance coding • Malicious Code (Trojan horse) • Kerberos, NTLMv2, Smart Cards • Impersonation, Auditing • SSPI, CryptoAPI • Code Signing and Policy Extranets • False Identity/Impostor • Data Theft • On-wire Internet Attacks • Public Key Infrastructure (PKI) • Integrated CA • IPSEC, L2TP, SSL/TSL, S/MIME Management • Too many places to secure • Unfamiliar with employee roles • Don’t Know who did what • Configuration and Drift • Active Directory Integration • Delegated Administration • Auditing Improvements • Security Templates Microsoft Product Portfolio Identity Management Windows Server 2003 – Active Directory Windows Server 2003 – Certificate Services Windows – Active Directory Application Mode Microsoft Identity Integration Server 2003 Access Management Windows Server 2003 Windows – Authorization Manager Windows Rights Management Server Secure Data Management Windows Server 2003 – Certificate Services Internet Acceleration Server 2004 – Firewall and Proxy Services Windows – Encryption File Service Audit Management Microsoft Audit Collection System Microsoft Windows Microsoft Operations Manager Resiliency and Integrity Management Windows XP – SP2 Firewall Windows Server 2003 – Network Load balancing, Clustering Systems Management Server 2003 – Patch and Update Management Microsoft Operations Manager – Systems Health Management Microsoft Product Portfolio Coming Attractions Active Directory Federation Services Active Protection Technology Network Access Protection How we can help…. Microsoft Services US Center of Excellence for Security Security Risk Management Engagement Security Remediation Engagement Security Architectural Engagement Security Solution Deployment Engagement Security Operations Engagement PKI Architecture and Implementation is one of our most common engagements in the security space Questions Microsoft Services Alan Hakimi alanhak@microsoft.com Microsoft Legal Vertical Manager Scott D. Gilgallon scottgil@microsoft.com Resources Microsoft Services http://www.microsoft.com/services/microsoftservices/default.mspx Microsoft Security http://www.microsoft.com/security Security Guidance Center http://www.microsoft.com/security/guidance How Microsoft IT Secures Microsoft http://www.microsoft.com/technet/itsolutions/msit E-Learning Clinics https://www.microsoftelearning.com/security Events and Webcasts http://www.microsoft.com/seminar/events/security.mspx American Bar Association – Information Security Committee http://www.abanet.org/scitech/ec/isc/home.html © 2004 Microsoft Corporation. All rights reserved. This presentation is for informational purposes only. Microsoft makes no warranties, express or implied, in this summary.