SlideShare a Scribd company logo
Enterprise Information Security... a Different viewNullcon (Dwitiya)Goa26 Feb 2011Deepak Rout
Agenda	 Data Leakage Prevention …a new paradigm
 IBA instead of RBA  …turning ‘The Standard’ around
 What’s in store for us!
 Q & AShortcomings of a Readymade DLP SolutionVery high false positives Long gestation period Data Leakage due to the DLP solutionSeveral data leakage avenues left outMass storage devicesUnmonitored Internet accessUncontrolled Exception ManagementToo many Admins/Super-UsersDiffering Legal/Regulatory provisions - GloballyResult:Unintentional data loss gets detected, while planned Data Theft or Corporate Espionage agent remains a step ahead of DLP policies.
Data Leakage Preventions - EssentialsBusiness/Management Concerns on Security of Data
Statutory and Regulatory Imperatives
Contracts and Agreements
Data Protection - a Security Manager’s KPI
Avoiding the Silver Bullet Syndrome
Holistic & Proactive Data Protection FrameworkHolistic Approach to Reduce Data LeakageClosing data leak channels not required for business Proactively monitoring channels required to be opened for business Focus on known/suspected leak channelsAdhering to ‘need to know’Controlling leakage by authorized users (e.g. End point solution) Controlling leakage to unauthorized users (e.g. Rights management)Using technology as well as process controlsPhased deployment approachStrong management intent and business involvement Educating users on DLP program and consequences of violationEffective Consequence Management and exemplary treatmentDoing PDCA, if a DLP solution is deployedKnowing limitations of DLP controls/tools, brief management to accept risk Accepting that even after all controls, data leak incidents may happen:Capability to audit user actions Tools to investigate data leak incidents
Suggested Data Leakage Prevention Framework
DLP - Do Not & DoDo NotAs a remedial measure in the aftermath of a particularly nasty incidentBusiness doing well &security gets to push through security investment Getting entangled with a silver bullet DLP solution Pure selling by DLP solution providers As a mail filtering mechanismDoDeploy a comprehensive set of DLP technologies and processes as a risk mitigation measure which emerges from a systematic Risk Assessment based on business and security objectives
Agenda	 Data Leakage Prevention …a new paradigm
 IBA instead of RBA  …turning ‘The Standard’ around

More Related Content

PPT
PDF
DLP 101: Help identify and plug information leaks
PPTX
The CISO’s Guide to Data Loss Prevention
PPTX
PCI DSS Reporting Requirements for People Who Hate PCI DSS Reporting
PPTX
ZoneFox, Machine Learning, the Insider Threat and how UEBA protects the user ...
PDF
Customer Spotlight: Deploying a Data Protection Program in less than 120 Days
PPTX
PDF
ISSA DLP Presentation - Oxford Consulting Group
DLP 101: Help identify and plug information leaks
The CISO’s Guide to Data Loss Prevention
PCI DSS Reporting Requirements for People Who Hate PCI DSS Reporting
ZoneFox, Machine Learning, the Insider Threat and how UEBA protects the user ...
Customer Spotlight: Deploying a Data Protection Program in less than 120 Days
ISSA DLP Presentation - Oxford Consulting Group

What's hot (20)

PDF
How to Prepare for a PCI DSS Audit
PPTX
User and entity behavior analytics: building an effective solution
PPTX
Ciso round table on effective implementation of dlp & data security
PPTX
Continual Compliance Monitoring
PPTX
PCI DSS Business as Usual (BAU)
PPTX
PCI DSSand PA DSS
PPTX
Data Loss Prevention
PPTX
Privileged Account Management - Keep your logins safe
PDF
Security and Audit for Big Data
PPTX
Vendor Management for PCI DSS; EI3PA; HIPAA and FFIEC
PPTX
DSS ITSEC 2013 Conference 07.11.2013 - For your eyes only - Symantec PGP Re-L...
PPTX
Gazzang pci v1[1]
PPTX
Securing Open Source Databases
PPTX
Essentials of PCI Assessment
PPTX
PCI DSS and PA DSS
PPTX
Enterprise Logging and Log Management: Hot Topics by Dr. Anton Chuvakin
PPTX
Identity intelligence: Threat-aware Identity and Access Management
PDF
Chapter 15 incident handling
PPTX
PCI DSS and PA DSS
PPTX
Making PCI V3.0 Business as Usual (BAU)
How to Prepare for a PCI DSS Audit
User and entity behavior analytics: building an effective solution
Ciso round table on effective implementation of dlp & data security
Continual Compliance Monitoring
PCI DSS Business as Usual (BAU)
PCI DSSand PA DSS
Data Loss Prevention
Privileged Account Management - Keep your logins safe
Security and Audit for Big Data
Vendor Management for PCI DSS; EI3PA; HIPAA and FFIEC
DSS ITSEC 2013 Conference 07.11.2013 - For your eyes only - Symantec PGP Re-L...
Gazzang pci v1[1]
Securing Open Source Databases
Essentials of PCI Assessment
PCI DSS and PA DSS
Enterprise Logging and Log Management: Hot Topics by Dr. Anton Chuvakin
Identity intelligence: Threat-aware Identity and Access Management
Chapter 15 incident handling
PCI DSS and PA DSS
Making PCI V3.0 Business as Usual (BAU)
Ad

Viewers also liked (19)

PPT
iOS Application Pentesting
PPTX
Humla workshop on Android Security Testing - null Singapore
PDF
Null Singapore - Can We secure the IoT - Chadi Hantouche
PPS
Sawabona Shikoba
PPT
Ecoporanga
PDF
Teollisuustyöntekijöiden säännöllisen työajan keskituntiansiot sukupuolen mukaan
PPT
Facebook
PPS
Obrasildoabsurdo[1].Ppsmat
PDF
18 Green Living Tips
PDF
Gesund Abnehmen mit Fisch
PDF
Nuevo retirarse de un proceso de formacion presencial por sofiasofiaplus
PPTX
Using technologies for authentic learning
PPT
A Midia Que Mais Cresce
PPT
Andre Daniels: Using Digital Storytelling as an approach to introducing techn...
PDF
Xml interfaces to the popular nessus scanner
PDF
Zertifikate von Laura Baumann (Personaldienstleistungskauffrau)
PDF
Semarang workshop 2012
iOS Application Pentesting
Humla workshop on Android Security Testing - null Singapore
Null Singapore - Can We secure the IoT - Chadi Hantouche
Sawabona Shikoba
Ecoporanga
Teollisuustyöntekijöiden säännöllisen työajan keskituntiansiot sukupuolen mukaan
Facebook
Obrasildoabsurdo[1].Ppsmat
18 Green Living Tips
Gesund Abnehmen mit Fisch
Nuevo retirarse de un proceso de formacion presencial por sofiasofiaplus
Using technologies for authentic learning
A Midia Que Mais Cresce
Andre Daniels: Using Digital Storytelling as an approach to introducing techn...
Xml interfaces to the popular nessus scanner
Zertifikate von Laura Baumann (Personaldienstleistungskauffrau)
Semarang workshop 2012
Ad

Similar to nullcon 2011 - Enterprise Paradigm for Controlling Data Leakage (20)

PPTX
BREACHED: Data Centric Security for SAP
PPTX
Preparing for the Cybersecurity Renaissance
PPTX
DG_Architecture_Training.pptx
PDF
Protect the data - Cyber security - Breaches - Brand/Reputation
PDF
CIA-Triad-Presentation.pdf
PPTX
DSS.LV - Principles Of Data Protection - March2015 By Arturs Filatovs
PPTX
FINAL_SCFm50000_JonPapp_CAA_The_Practical_Benefits_of_a_Behavioral_Solution_f...
DOCX
Overall Security Process Review CISC 6621Agend.docx
PPTX
Splunk for Security Breakout Session
PDF
Corona| COVID IT Tactical Security Preparedness: Threat Management
PPT
What Every Organization Should Log And Monitor
PPTX
Guardium Suite_seguridad de los datos...
PDF
Digital Transformation in the Cloud: What They Don’t Always Tell You [2020]
PPTX
Cloud computing - Assessing the Security Risks - Jared Carstensen
PDF
Explore Top Data Loss Prevention Tools | Fortify with DLP Software
PPT
Data Security For Compliance 2
PPT
Information Leakage - A knowledge Based Approach
PPTX
Data Privacy By Design with AWS
PDF
IRJET- Data Leak Prevention System: A Survey
PDF
How the latest trends in data security can help your data protection strategy...
BREACHED: Data Centric Security for SAP
Preparing for the Cybersecurity Renaissance
DG_Architecture_Training.pptx
Protect the data - Cyber security - Breaches - Brand/Reputation
CIA-Triad-Presentation.pdf
DSS.LV - Principles Of Data Protection - March2015 By Arturs Filatovs
FINAL_SCFm50000_JonPapp_CAA_The_Practical_Benefits_of_a_Behavioral_Solution_f...
Overall Security Process Review CISC 6621Agend.docx
Splunk for Security Breakout Session
Corona| COVID IT Tactical Security Preparedness: Threat Management
What Every Organization Should Log And Monitor
Guardium Suite_seguridad de los datos...
Digital Transformation in the Cloud: What They Don’t Always Tell You [2020]
Cloud computing - Assessing the Security Risks - Jared Carstensen
Explore Top Data Loss Prevention Tools | Fortify with DLP Software
Data Security For Compliance 2
Information Leakage - A knowledge Based Approach
Data Privacy By Design with AWS
IRJET- Data Leak Prevention System: A Survey
How the latest trends in data security can help your data protection strategy...

More from n|u - The Open Security Community (20)

PDF
Hardware security testing 101 (Null - Delhi Chapter)
PPTX
SSRF exploit the trust relationship
PDF
PDF
Api security-testing
PDF
Introduction to TLS 1.3
PDF
Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...
PDF
Talking About SSRF,CRLF
PPTX
Building active directory lab for red teaming
PPTX
Owning a company through their logs
PPTX
Introduction to shodan
PDF
Detecting persistence in windows
PPTX
Frida - Objection Tool Usage
PDF
OSQuery - Monitoring System Process
PDF
DevSecOps Jenkins Pipeline -Security
PDF
Extensible markup language attacks
PPTX
PDF
Hardware security testing 101 (Null - Delhi Chapter)
SSRF exploit the trust relationship
Api security-testing
Introduction to TLS 1.3
Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...
Talking About SSRF,CRLF
Building active directory lab for red teaming
Owning a company through their logs
Introduction to shodan
Detecting persistence in windows
Frida - Objection Tool Usage
OSQuery - Monitoring System Process
DevSecOps Jenkins Pipeline -Security
Extensible markup language attacks

Recently uploaded (20)

PDF
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
PPTX
SOPHOS-XG Firewall Administrator PPT.pptx
PDF
Enhancing emotion recognition model for a student engagement use case through...
PPTX
A Presentation on Artificial Intelligence
PDF
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
PDF
Approach and Philosophy of On baking technology
PDF
Encapsulation theory and applications.pdf
PDF
Hybrid model detection and classification of lung cancer
PPTX
1. Introduction to Computer Programming.pptx
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Univ-Connecticut-ChatGPT-Presentaion.pdf
PDF
A comparative analysis of optical character recognition models for extracting...
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PPTX
Group 1 Presentation -Planning and Decision Making .pptx
PDF
DP Operators-handbook-extract for the Mautical Institute
PDF
A comparative study of natural language inference in Swahili using monolingua...
PDF
project resource management chapter-09.pdf
PDF
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
PPTX
OMC Textile Division Presentation 2021.pptx
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
SOPHOS-XG Firewall Administrator PPT.pptx
Enhancing emotion recognition model for a student engagement use case through...
A Presentation on Artificial Intelligence
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
Approach and Philosophy of On baking technology
Encapsulation theory and applications.pdf
Hybrid model detection and classification of lung cancer
1. Introduction to Computer Programming.pptx
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Univ-Connecticut-ChatGPT-Presentaion.pdf
A comparative analysis of optical character recognition models for extracting...
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Group 1 Presentation -Planning and Decision Making .pptx
DP Operators-handbook-extract for the Mautical Institute
A comparative study of natural language inference in Swahili using monolingua...
project resource management chapter-09.pdf
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
OMC Textile Division Presentation 2021.pptx
Digital-Transformation-Roadmap-for-Companies.pptx

nullcon 2011 - Enterprise Paradigm for Controlling Data Leakage

  • 1. Enterprise Information Security... a Different viewNullcon (Dwitiya)Goa26 Feb 2011Deepak Rout
  • 2. Agenda Data Leakage Prevention …a new paradigm
  • 3. IBA instead of RBA …turning ‘The Standard’ around
  • 4. What’s in store for us!
  • 5. Q & AShortcomings of a Readymade DLP SolutionVery high false positives Long gestation period Data Leakage due to the DLP solutionSeveral data leakage avenues left outMass storage devicesUnmonitored Internet accessUncontrolled Exception ManagementToo many Admins/Super-UsersDiffering Legal/Regulatory provisions - GloballyResult:Unintentional data loss gets detected, while planned Data Theft or Corporate Espionage agent remains a step ahead of DLP policies.
  • 6. Data Leakage Preventions - EssentialsBusiness/Management Concerns on Security of Data
  • 9. Data Protection - a Security Manager’s KPI
  • 10. Avoiding the Silver Bullet Syndrome
  • 11. Holistic & Proactive Data Protection FrameworkHolistic Approach to Reduce Data LeakageClosing data leak channels not required for business Proactively monitoring channels required to be opened for business Focus on known/suspected leak channelsAdhering to ‘need to know’Controlling leakage by authorized users (e.g. End point solution) Controlling leakage to unauthorized users (e.g. Rights management)Using technology as well as process controlsPhased deployment approachStrong management intent and business involvement Educating users on DLP program and consequences of violationEffective Consequence Management and exemplary treatmentDoing PDCA, if a DLP solution is deployedKnowing limitations of DLP controls/tools, brief management to accept risk Accepting that even after all controls, data leak incidents may happen:Capability to audit user actions Tools to investigate data leak incidents
  • 12. Suggested Data Leakage Prevention Framework
  • 13. DLP - Do Not & DoDo NotAs a remedial measure in the aftermath of a particularly nasty incidentBusiness doing well &security gets to push through security investment Getting entangled with a silver bullet DLP solution Pure selling by DLP solution providers As a mail filtering mechanismDoDeploy a comprehensive set of DLP technologies and processes as a risk mitigation measure which emerges from a systematic Risk Assessment based on business and security objectives
  • 14. Agenda Data Leakage Prevention …a new paradigm
  • 15. IBA instead of RBA …turning ‘The Standard’ around
  • 16. What’s in store for us!
  • 17. Q & AIBA instead of RBA for EIS 'Risk Based Approach' (RBA) - PDCA approach of identifying & mitigating risks
  • 18. 'Incident based approach' (IBA) is an alternate to RBA - PDCA cycle based on incident prevention
  • 19. On occurrence follow steps - Triage, Investigate, CAPA, RCA, Implement
  • 20. Digital Forensics play a anchoring role in all stages:
  • 21. Triage - Preserve incident parameters
  • 22. Investigation, CAPA & RCA - Diagnostics & Analysis
  • 23. Prevention - Designing Enterprise Controls
  • 24. Typical Chronology of Digital Investigation....1Prepare a clean destination hard drive: Difficult to distinguish between old data and new
  • 25. Suspect can claim that incriminating evidence was planted
  • 26. Specialised tools to wipe off past data (e.g. DriveWiperVoom)
  • 27. Also generates reports to demonstrate that hard disk is clean2. Digitally image data from suspect system to target drive: Bit-by-bit clone of original hard drive using specialized tools
  • 28. Includes all files (OS, deleted, encrypted, password protected & hidden)
  • 29. Data hidden surreptitiously within other files is also retrieved
  • 30. OS independent tools, do not require a dedicated drive
  • 32. Original hard drive is then sealedACQUIRE
  • 33. Typical Chronology of a Digital Investigation....23. Fingerprint: To ensure that data copied from source drive to cloned drive is the same
  • 34. Unique fingerprint created for each hard drive (hashing)
  • 35. Suspect hard drive is seized along with hash value, known to suspect
  • 36. Same hash value demonstrated on seized drive4. Write-protect data: Using write-protect bridges
  • 37. Then onwards, the drive can only be read but not written to
  • 38. Guarantees purity of evidence5.Analyse/Investigate: Specialised tools to scan hard drive and classify files as per category (encrypted files, password protected files, misnamed files, image files, compressed files etc).
  • 39. Password-cracking tools are used on password-protected files
  • 40. Steganography (camouflaging files within another file) can be countered with tools conforming to judicial and evidential requirements (analysed for hidden messages) AUTHENTICATEANALYSE
  • 41. Enterprise Capability Model for Digital Forensics Highly developed internal capability not desirable
  • 42. Minimum & potent internal capability (imaging, packet capture, logging etc)
  • 43. Advanced capabilities on-demand (image analysis, link analysis, heuristics etc):
  • 44. As appropriate for specific industry
  • 45. Pre-configured per management/regulatory requirement
  • 47. RoI & industry considerations for configuring model
  • 48. Optimum model - limited internal & bulk outsourced capability
  • 49. After Forensics, What???A View of the Future!!!New criminal business models & malware sophistication:Criminal organizations worldwide are increasingly migrating business models online. Complexity of threats will increase & digital crimes will be more.
  • 50. The problem will not disappear:Criminals online activities will continue to be hosted in distributed servers worldwide.New targets:Newer attack methodologies including targeting of SCADA systems that control key infrastructure and economy sectors (petrol, gas, electricity, water, nuclear etc). Economic impact.World economy’s relationship with online services is so strong that any failure could lead to complete chaos. Criminals know this and will take full advantage of it.Ubiquitous Malware.Citizens will continue to depend on technology and ubiquitous online services (mobiles, PDA, laptops, 3G etc). We will see more attacks targeting these technologies.It’s a very profitable business; returns exceed stock markets (3 digit growth)…Security will be in Business!

Editor's Notes

  • #12: Analyzing under the radar transactions to re-set thresholds
  • #13: Analyzing under the radar transactions to re-set thresholds
  • #14: Analyzing under the radar transactions to re-set thresholds