MikeFleckOWASP_Presentation
Download
Report
Transcript MikeFleckOWASP_Presentation
Protecting Data
From The Web Tier
Mike Fleck
CEO
CipherPoint Software, Inc.
[email protected]
@CipherPointSW
888-657-5355
OWASP
3-22-2012
Copyright © The OWASP Foundation
Permission is granted to copy, distribute and/or modify this document
under the terms of the OWASP License.
The OWASP Foundation
http://www.owasp.org
Agenda
Why does this matter?
Drivers for data protection
Shifting application architectures
Common data encryption challenges
Why Infosec struggles to keep up
Why protect data from the web tier
A web tier data protection architecture
Questions
OWASP
2
Why Does This Matter?
Shift in thinking about security control
effectiveness from network > application > data
Auditors recognize value of encrypting data
“higher in the stack”
Applications moving to 3-tier web architecture
Cloud data protection = encrypting @ web tier
Web tier affords a unique place from which to
apply data encryption and access controls to
application data and unstructured content
OWASP
3
Data Protection Drivers
Compliance: PCI DSS,
HIPAA/HITECH, GLBA, state breach
laws
Native platform controls are
generally inadequate to secure
against insider threats, including IT
admins
Given current threat climate w/
APTs and determined attackers,
need that last line of defense for
stored data
“69% said that
complying with data
protection and privacy
regulations was the
main driver behind use
of encryption”
Ponemon 2010
Enterprise Encryption
Study
OWASP
4
Enforcing “Need to Know”, “Least Privileges”
PCI DSS
7.1.1 Restriction of access rights to privileged user IDs to least
privileges necessary to perform job responsibilities, Audit procedure
= Confirm that access rights for privileged user IDs are
restricted to least privileges necessary to perform job
responsibilities.
HIPAA/HITECH
HIPAA requires access control to limit access to those with valid need to
know, encryption is an addressable requirement
GLBA
Access control required to limit access to authorized individuals,
encryption for NPI required
OWASP
5
PCI Assessment Failings
OWASP
6
Most Challenging Compliance Requirements
OWASP
7
Sources of Compliance & Security Pain
OWASP
8
Sea Change in Security Control Placement
http://movetheworld.files.wordpress.com/2008/01/evolution-of-security-controls-graph-only.png
OWASP
9
App Architecture, Delivery Models Changing
Clientserver
3 Tier, web
based apps
On
premise IT
Cloud
OWASP
10
Today’s Data Encryption Challenges
Effective threat protection = higher level insertion
point
Low level insertion (FDE, Bitlocker) only protect media loss/theft
Application insertion = best threat protection, not common from
app vendors, hard to DIY & get right
Key management
“it’s 2am, on a Saturday, we have to restore an encrypted file from
2008, where the @#!&% is the encryption key”
Silo’ed or centralized
Making it easy: operationalizing compliance requirements for key
rotation, key lifecycle, information lifecycle
OWASP
11
More Key Management
OWASP
12
Data Encryption & Access Control Challenges
for Web Apps, & SaaS Delivery
Where can/should we insert?
How do we afford protection for data stored in
cloud/SaaS?
How can enterprises retain control of keys for
data stored in cloud/SaaS services?
How to keep IT admins at cloud service
providers from viewing sensitive data?
OWASP
13
Policy Enforcement @ Web Front End
Need to know
Need to manage
WFE Policy
Enforcement Point
Shared Services
Admin
P
E
P
Application
Servers
End users
Front-end Servers
Database Admin
Database Server
Web Server Admin
OWASP
14
Visibility @ WFE for Security Decisions
What:
Who:
Cipherpoint\csmith
Where:
https://www.covert.com/HR/payroll
OWASP
15
Security Control Possibilities
Selectively encrypt information for specific users,
or URI destinations
Unstructured files
Fields in web forms
Apply access controls for user groups
Enforce need to know for IT admins
Apply sophisticated access controls for
authorized users
Time of day, excessive file downloads, strange
download locations, etc.
OWASP
16
WFE Encryption & Access Control
Previously had to either convince your app
vendor to add this capability, or DIY
In either case, odds are poor for:
getting key management right, and
making the encryption easy to use, easy to manage
Ubiquitous web application architectures opens
up encryption & access control platform
possibilities at the WFE
OWASP
17
Use Cases
Web-based collaboration portals, on premise,
e.g. SharePoint, ECM systems
Sensitive information protection such as HR data, IP, business
plans
Compliance regulated data, e.g. PII, NPI, ePHI
Where outsiders are the new insider threat:
Cloud collaboration platforms, Google Docs, Box.net,
et al
Any SaaS application…
OWASP
18
About CipherPoint
Incorporated 2010
1st provider of transparent content
encryption for Microsoft SharePoint
Insider threat protection
Separation of duties
Mass market pricing
Building a cloud collaboration security
platform
OWASP
19
Questions?
OWASP
20