Enterprise GRC Framework p Unified Approach to Address Silo Cyber - - PowerPoint PPT Presentation

enterprise grc framework p unified approach to address
SMART_READER_LITE
LIVE PREVIEW

Enterprise GRC Framework p Unified Approach to Address Silo Cyber - - PowerPoint PPT Presentation

Ministry of Science, People First, Performance Now Technology and Innovation Enterprise GRC Framework p Unified Approach to Address Silo Cyber Security Landscape Ramaguru Ramasubbu and Rahul Moondra 7 th November 2012 h Ministry of


slide-1
SLIDE 1

People First, Performance Now Ministry of Science, Technology and Innovation

Enterprise GRC Framework – p Unified Approach to Address Silo Cyber Security Landscape

Ramaguru Ramasubbu and Rahul Moondra

h

7th November 2012

slide-2
SLIDE 2

People First, Performance Now Ministry of Science, Technology and Innovation

A d

  • Current Scenario

Agenda

  • Cyber security
  • EGRC Space
  • Future Vision
  • Unification
  • Automation
  • Case Study
  • Correlation
  • Value Proposition

p

slide-3
SLIDE 3

People First, Performance Now Ministry of Science, Technology and Innovation

Current Scenario

slide-4
SLIDE 4

People First, Performance Now Ministry of Science, Technology and Innovation

Vulnerability Business Actors Tools &

Cyber security challenges that orgs face today

CTURE Vulnerability Business Impacts Actors Tools & Techniques

Cyber Criminals Malware Insecure protocols Identity theft

FRASTRUC

Attacks

External Attackers Organized groups Social engineering Backdoors

Outdated patches/signatures

Weak passwords Data loss / leakage Unauthorized Access

RPRISE IN

A

g g p Business/ National rivals Freeware / open scripts p Lack of awareness Access Image / Reputation loss

ENTER

Ignorant insider Disgruntled employee / P t Botnets Espionage Weak perimeter defense Default configurations Service unavailability Customer dissatisfaction Partner g

slide-5
SLIDE 5

People First, Performance Now Ministry of Science, Technology and Innovation

A d d t th ith i t l ti

Vulnerability Management Patch Management

And orgs respond to them with point solutions

Breaches/Attacks

ON

Configuration Security NAP/NAC

Cyber security threats

Breaches/Attacks Espionage Malware/Botnets Identity theft

FORMATIO RUCTURE

Malware protection Security Gateways, Proxies, and Firewalls

s

Identity theft Phishing/Social Engineering

TICAL INF NFRASTR

Application Security Network Security Monitoring

CRIT IN

Wireless/Mobile Security g Email Security Insider Attacks / Backdoors

slide-6
SLIDE 6

People First, Performance Now Ministry of Science, Technology and Innovation

Globally the attacks are ever increasing…

“Cybercrime is more of a more of a reputational threat than threat than systems f il ” failure”

“2012 IBM Global Reputational Risk and IT Study” 2012 IBM Global Reputational Risk and IT Study conducted by the Economist Intelligence Unit

slide-7
SLIDE 7

People First, Performance Now Ministry of Science, Technology and Innovation

Statistics in Malaysia are not different either…

slide-8
SLIDE 8

People First, Performance Now Ministry of Science, Technology and Innovation

On the other hand….

Policy

Management

Business Continuity Audit

GRC

Planning

Management

GRC

Performance Management

Compliance

Management

Risk

Management

Controls

Management

slide-9
SLIDE 9

People First, Performance Now Ministry of Science, Technology and Innovation

Various org initiatives are related to each other

Control Management

Policy Management

Risk Management

Compliance Management Performance Management

Business

Audit

Continuity Planning

Audit Management

slide-10
SLIDE 10

People First, Performance Now Ministry of Science, Technology and Innovation

And cyber security is related

Policy Business Continuity Audit Continuity

GRC

Cyber Performance

Compliance

GRC

IT GRC

Cyber Security

Risk Control

slide-11
SLIDE 11

People First, Performance Now Ministry of Science, Technology and Innovation

.. and current state is…

Cyber Security Solutions

Anti Virus ware protection Firewalls Proxies twork Security Monitoring ch Management Vulnerability Management reless Security lication Security Secured Configuration curity Gateways NAP/NAC Email security

  • bile Security

GRC cy ement

Malw

iance ement mance ement

Ne Patc

rol ement

V M Wi

ess uity ing

App C

it ement

Sec

k ement

E M

GRC Element Poli Manage Compl Manage Perform Manage Contr Manage Busin Contin Plann Aud Manage Risk Manage

GRC

slide-12
SLIDE 12

People First, Performance Now Ministry of Science, Technology and Innovation

.. running in silos…

Anti Virus ware protection Firewalls Proxies twork Security Monitoring ch Management Vulnerability Management reless Security lication Security Secured Configuration curity Gateways NAP/NAC Email security

  • bile Security

Cyber Security Solutions

Malw Ne Patc V M Wi App C Sec E M

Policy Management Compliance Management erformance anagement Control anagement Business Continuity Planning Audit anagement Risk anagement GRC Element

GRC

M C M Pe Ma Ma C Ma Ma

GRC

slide-13
SLIDE 13

People First, Performance Now Ministry of Science, Technology and Innovation

..and overlapping with each other…

Anti Virus ware protection Firewalls Proxies twork Security Monitoring ch Management Vulnerability Management reless Security lication Security Secured Configuration curity Gateways NAP/NAC Email security

  • bile Security

Cyber Security Solutions

Malw Ne Patc V M Wi App C Sec E M

ment nce ment nce ent l ent s ty g ent ent GRC Policy Managem Complian Managem Performan Manageme Control Manageme Business Continuit Planning Audit Manageme Risk Manageme GRC Element

GRC

slide-14
SLIDE 14

People First, Performance Now Ministry of Science, Technology and Innovation

.. and the result is …

slide-15
SLIDE 15

People First, Performance Now Ministry of Science, Technology and Innovation

Case Study

slide-16
SLIDE 16

People First, Performance Now Ministry of Science, Technology and Innovation

Things look normal, in silo…

Things look normal in silo

Anti-spyware installed Users Digitally signed and encrypted communication with RC4 d RSA l ith MS08-067 Vulnerabili Connectio n to port 445/TCP

Things look normal, in silo…

installed Users locked out for wrong passwords and RSA algorithms Files downloaded from internet sites ty patched 445/TCP

Asset manager Operating NIDS Internet Vulnerability scanner Operating system system security suite

File and Printer sharing services accessed Files updated in system folder New Dlls tt h d Firewall rules updated HTTP web sites browsed attached to services

File integrity Firewall NIDS HIDS File integrity monitor Antivirus

slide-17
SLIDE 17

People First, Performance Now Ministry of Science, Technology and Innovation

.. And suddenly few abnormal symptoms ..

.. And suddenly few abnormal symptoms…

Systems b Services are not available to customers Network traffic increases Systems shutdown become slow increases shutdown ISP bl k Services are not available to customers blocks your IP :- DDOS detected FROM Freeware and PPP found on your servers Disk usage increasing FROM your IP your servers

slide-18
SLIDE 18

People First, Performance Now Ministry of Science, Technology and Innovation

.. Analysis finds it ..

.. Analysis finds it ..

How Wh Wh

Conficker

Why Who

worm

What When

slide-19
SLIDE 19

People First, Performance Now Ministry of Science, Technology and Innovation

Employee used infected USB MS08-067 vulnerability patched with custom fix

Which was an outcome of ..

Week policy on removable media

patched with custom fix

Automating patch management

Custom protocols allowed MS08-067 Check for random DNS , connect to HTTP service and DLL based Autorun Trojan installed Open backdoor in firewall

Week policy on removable media

download updates custom fix

Automating patch management

installed

Week authorization to install software

and Wi-Fi devices

Week configuration management

Scan other machines on Port 445/TCP for open Exploit MS08-067 Vulnerability Use Default p windows shares

Week authorization to install software

Vulnerability, Use Default passwords

Default configurations

NetBIOS push to upload it Search for other vulnerable self to exploited machines

Use of Unnecessary protocols

machines , Infect any new Removable Media

No vulnerability assessment

slide-20
SLIDE 20

People First, Performance Now Ministry of Science, Technology and Innovation

.. And consequences could be ..

Zombie systems Zombie systems Financial losses Legal Financial losses consequences ?

slide-21
SLIDE 21

People First, Performance Now Ministry of Science, Technology and Innovation

L h h l

Security

.. Let us see how they relate to ..

Security

Risk

Cyber security Impact IT Risk IT security incident Impact

Control

bj ti IT Vulnerability

  • bjective
slide-22
SLIDE 22

People First, Performance Now Ministry of Science, Technology and Innovation

Future Vision

slide-23
SLIDE 23

People First, Performance Now Ministry of Science, Technology and Innovation

Key objectives are…

Unification

GRC GRC

Automation

slide-24
SLIDE 24

People First, Performance Now Ministry of Science, Technology and Innovation

us tection ls s curity ng gement ility ment curity ecurity d tion eways AC urity urity

Cyber

Unification at two levels…

Anti Viru Malware prot Firewall Proxies Network Sec Monitori Patch Manag Vulnerabi Managem Wireless Sec Application S Secured Configurat Security Gate NAP/NA Email secu Mobile Sec

Cyber Security Solutions y ment ance ment ance ment

  • l

ment ss uity ng t ment ment GRC Polic Managem Complia Managem Performa Managem Contro Managem Busine Continu Plannin Audit Managem Risk Managem GRC Element

GRC GRC

slide-25
SLIDE 25

People First, Performance Now Ministry of Science, Technology and Innovation

It could be streamlined..

Anti-Virus Policies Anti-Virus Policies Malware Protection Malware Protection Malware Protection Policies Malware Protection Policies Fi ll P li i Fi ll P li i Policy Management Policy Management Firewall Policies Firewall Policies Proxy Policies Proxy Policies Proxy Policies Proxy Policies Patch Management Policies Patch Management Policies Policies Policies

slide-26
SLIDE 26

People First, Performance Now Ministry of Science, Technology and Innovation

Another Key objectives is…

Unification

GRC GRC

Automation

slide-27
SLIDE 27

People First, Performance Now Ministry of Science, Technology and Innovation

Major security controls are

Management Operational Technical Management

Certification, Accreditation, and Security Assessments

Operational

Awareness and Training

Technical

Access Control Planning Risk Assessment System and Services Configuration Management Contingency Planning Incident Response Audit and Accountability Identification and Authentication System and y Acquisition Incident Response Maintenance Media Protection y Communications Protection Personnel Security Physical and Environmental Protection System and Information y Integrity

slide-28
SLIDE 28

People First, Performance Now Ministry of Science, Technology and Innovation

.. They can be automated as well ..

EGRC IT GRC

IAM can aid in automating around 20-30% f IT l SIEM can aid in automating around 30-40%

  • f IT controls

IT Risk

  • f IT controls
  • f IT controls

IT Controls

Compliance to Regulations and Adherence to Standards

Identity Management

Standards

Identity Management

Authentication/SSO, Access Management, Directories, Provisioning

Log. Security

Security Information Event Management

Phsc. Security

slide-29
SLIDE 29

People First, Performance Now Ministry of Science, Technology and Innovation

SIEM can help unify and automate…

Cyber Security Controls

Vulnerability Management Patch Management

Event

Event Parser Event Mapper Correlation & Analysis Configuration Security NAP/NAC

Event Receivers Queues

Log storage

Security Security Gateways, Proxies, and Firewalls

Network monitoring Attack monitoring Risk Analysis / treatment Compliance Audit

Malware protection Application Security

monitoring g Application monitoring Data monitoring treatment Policy monitoring Incident management

Wireless/Mobile Security Email Security

User monitoring Performance Monitoring

slide-30
SLIDE 30

People First, Performance Now Ministry of Science, Technology and Innovation

A d IAM f

Identity Management

ID Stores

Access Management

.. And IAM can enforce…

Employees

User / Credential management User provisioning and de-provisioning Role life cycle management Privileged Account Management

y g

Human Resources Customers

Host Access Control Network Access Control Enterprise Access Control Web Access Control

Contractors

management Management Streamlined Access Grant & Certification

Services

Partners Custom stores

Policy management

Services

P t / Identity services Policy services Integration Reporting i

IAM User DB Policy DB

Authentication gateways Authorization services Single Sign-on Policy Di t ib ti Partners / Consultants Integration services

Network / Security Application (Web / Non-Web)

Database

Hosts

Txn DB

Single Sign on Distribution Public

slide-31
SLIDE 31

People First, Performance Now Ministry of Science, Technology and Innovation

Cyber security controls

Control

Policy Information IAM

Management

y Management security IAM

Risk Management

Compliance Management Performance Management SIEM Business Continuity Audit Management

slide-32
SLIDE 32

People First, Performance Now Ministry of Science, Technology and Innovation

C ll b i A t ti

Changes that we will experience…

Collaboration Automation Elimination of overlapping Oversight

slide-33
SLIDE 33

People First, Performance Now Ministry of Science, Technology and Innovation

slide-34
SLIDE 34

People First, Performance Now Ministry of Science, Technology and Innovation

Questions and Answers

India

M t S l ti Ltd

Questions and Answers

Magnaquest Solutions Ltd. 1523 & 1524, Durga Enclave , Road No:12, Banjara Hills Hyderabad - 500 034 Andhra Pradesh India Tel : +91 - 40 - 2332 0220/975, Fax : +91 - 40 - 2337 0037 Email : mqindia@magnaquest.com / www.magnaquest.com

Malaysia

Email : mqmalaysia@magnaquest com / www magnaquest com

Malaysia

Magnaquest Solutions Sdn Bhd (566396-A) , Units A-2-07 & A-2-09, SME Technopreneur Centre Cyberjaya 2270, jalan Usahawan 2 63000, Cyberjaya, Selangor DE Malayasia Tel: +603 83192864, 83182544 Fax: +603 83192534 Email : mqmalaysia@magnaquest com / www magnaquest com Email : mqmalaysia@magnaquest.com / www.magnaquest.com Email : mqmalaysia@magnaquest.com / www.magnaquest.com

US

Magnaquest Inc. 16219 S, 31st way, Phoenix , Arizona, 85048 USA Tel : + 1 480 706 3444 / 602 228 9248 Fax : + 1 413 403 0081 Email : mqusa@magnaquest.com / www.magnaquest.com

slide-35
SLIDE 35

People First, Performance Now Ministry of Science, Technology and Innovation

Magnaquest Corporate Profile

slide-36
SLIDE 36

People First, Performance Now Ministry of Science, Technology and Innovation

Key Facts

Established in 1997 Offering IAM, Billing, CRM and Service Fulfillment solutions Around 250 employees Software R&D facility in Hyderabad India Software R&D facility in Hyderabad, India Subsidiaries in Malaysia, US, and the UAE Over 150 satisfied customers across the globe Serving customers in over 25 countries Serving customers in over 25 countries Installations in multiple business models & networks Strong player in the medium to large customer segment worldwide

Domains & customer segments

Government, BFSI, Education, healthcare, Oil & Gas, Defence, etc… for IAM & EBT Solutions PayTV, Broadband, Internet Telephony, IPTV, OTT & On Demand Services – for BSS & OSS solutions

Solutions Offered

Identity and Access Management (IAM) products and solutions, integrated citizen ID cards Electronic Benefit Transfer (EBT) solutions, leveraging on the government driven ID initiatives Service Fulfillment Platform for Broadband Operators – Operational Support System (OSS) p p pp y ( ) Subscriber Management & Billing – Business Support System (BSS)

slide-37
SLIDE 37

People First, Performance Now Ministry of Science, Technology and Innovation

Customers Installations

  • Canada
  • Ghana

INDIA | MALAYSIA | USA | UAE

  • Ghana
  • Greece
  • Guyana
  • Hongkong
  • Indonesia
  • Ivory coast
  • Jamaica
  • • •
  • USA
  • Kenya
  • Khazakstan
  • Malaysia
  • Maldives
  • Mexico
  • Netherlands

Phili i

  • India
  • Malaysia
  • Philippines
  • Saudi Arabia
  • Singapore
  • Switzerland
  • Taiwan
  • Tanzania
  • Trinidad & Tobago
  • Trinidad & Tobago
  • UAE
  • Uganda
  • USA
  • Vietnam