Information Security in Real Business
Download
Report
Transcript Information Security in Real Business
Information Security in Real
Business
Yuri & The Cheeseheads
Review of the problem statement and
existing work
Assessing and managing third party vendor
security requirements and practices for
outsourced services
Existing solution
Established Vendor Review Process
Technical Infrastructure Evaluation
Scheduled Reviews & Onsite Visits
Contractual Obligations
Review of the problem statement and
existing work
Source: Forrester Research, and Infosys Analysis
Real World Problem – VCNA
E-Commerce Portal
Technical Literature
Integration with Production Lines – VINs
Help System
Payment Processing
VIDA Software Downloads and Configurations
Real World Problem – VCNA Cont…
Security Concerns
Personally Identifiable Information
Complete VIN List
Credit Card Processing
Trade Secrets – Software Configurations
Governing Bodies
EPA/CARB
PCI
Ford Motor Company
Technical Solution
Personally Identifiable Information
Entire site is encrypted using SSL
Passwords are encrypted in database
Customer is segregated on individual VLAN
Backups are encrypted and shipped off-site
Complete VIN List
Encrypted
Secure Transmission to Locksmiths
Credit Card Processing
Industry Standard Encryption
Technical Solution Cont…
Trade Secrets – Software Configurations
Software Subscriptions
Secure Login from Public Internet
All information is passed via https
Passwords are encrypted in database
Configured in Sweden per Order
Software is placed in shopping cart
Order is passed to Volvo (Sweden) over a VPN
connection
Configured Software Request is Sent Back via VPN
Technical Solution Cont…
Trade Secrets – Software Configurations
Sold Via E-Commerce Application
Software is Purchased using Credit Card
Transmitted to Ford Network
Software Request is sent to Ford
SSL Encryption
Verisign Integration
Uses VPN connection with Limited IP and Port Number
Request is Dropped into Message Queue
Configured Software is Downloaded from Ford
Installed on Cars for Diagnostic Testing
Network Diagram
Business, Risk, and Cost Considerations
Benefits of outsourcing services/data
Cost savings
Consistency of quality
Expansion of business line
Economies of scale
E-Commerce site
Risks
Data security
Costs of a data breach – Survey conducted by Ponemon Inst.
$197 per company record
Average total $6.3 million per breach
Ranged from $225K to $35M
Feasibility
The outsourcing vendor has the same incentive to
secure the data
Breach of their customers’ data will be just as damaging to
them as to the customer
Loss of revenue
Loss of reputation
Costs of securing data is low compared to the cost
of breach
1 year of SSL Validity – VeriSign.com
$400 - $1600 per server
Varies based on trust level, security level, encryption strength
Increase in competition will require vendors to
provide adequate security levels
Legal Considerations
Legal Compliance
SOX
EPA/CARB
PCI
Conclusion
As long as we need to outsource data, we
need to continue to balance security with
usability and ensure that our vendors have
the proper level of security in place for the
data they have
Q&A