SlideShare a Scribd company logo
SESSION ID:
#RSAC
Scott Carlson
Realities of Data Security
PDAC-T09
Director – Security Solutions
PayPal
@relaxed137
#RSAC
The Data Complexities
2
#RSAC
Why should we trust anyone with our Data?
3
#RSAC
People actually need data to do their job
Email Marketing
Customer Support
Business Analytics
Financial Analyst
Marketing
Software Developer
Network Operations
Security Operations
HR / Payroll
Fraud Control
4
#RSAC
Wide-spread problems
5
#RSAC
“Think of how stupid the average person is, and realize half of
them are stupider than that.”
-- George Carlin
The People Problem
6
#RSAC
http://xkcd.com used with permission under Creative commons License
7
#RSAC
So Now What ??
When you are thinking about solving this dilemma, you cannot
just worry only about the data itself
8
#RSAC
Data security should strive to
Data repositories with restricted/PII data
Business work flows & data flows
Identify owners, does data leave your network
Delete or move into a secure network zone Encrypt
data when it is found insecure
Create access rights controls & fix bad process
Secure It
Find It
Ongoing monitoring with $tool – users & systems
Data scanning tools for compliance
Inbound/outbound flow monitoring
kill data streams & wall of shame
Monitor It
9
#RSAC
Find It
Ask
Hey, where is our data?
Where did this come from? Where is it going?
Where Else could It be ?
Are you caching anything ?
How many copies are there?
Has anyone taken it home?
Did anyone stick it “in the cloud”
Validate
Buy Stuff or Build Stuff
Data tools haven’t caught up with data systems
You cannot find everything with Tagging, sometimes
you have to sniff it out
Don’t forget your logging systems, file shares, and
desktops
To sample or not to sample
10
#RSAC
Secure It
Zones
Build network zones in the right places to house the data where it needed
Separate employee zones from customer zones from analytics zones
If zones exist, uplift controls to match your new standard
Build a common Bill of materials & definition of “Run the business”
Encrypt
Deploy Hardware Security Modules (HSM) where required
Make sure your tools can decrypt where appropriate
Keys should be as unique as you need them to be
once you encrypt the data, make sure that the data entry point is encrypted too
11
#RSAC
Monitor It
Logging
Build use cases
“Log all activity from DBA’s and watch for select from application tables”
Log All the Things; keystroke log if required
positive & negative testing required for tools
tap, syslog, integrated, custom, modules, …
In-Line Detection
decrypt data if required
deploy at all ingress and egress points that matter
tap, DLP, proxies, email, …
12
#RSAC
Multi-Layer Trust Model
Data Center ZoneAccess Zone
ServerBastion Host
Citrix PortalDesktop
Data Repository
Data
User Zone
Application
Network
Applications
13
#RSAC
Controls required around Data
Centralized Logging N, H, A
Vulnerability Scanning N, H, A
Intrusion Detection N
Patching Updates N, H, A
Web Proxy N
Anti-Malware N, H
Time Synchronization N
Data Loss Prevention N
Firewalls N
Role-Based Access N, H, A
VDI / Citrix / Bastion N
Packet Capture N
File Integrity H
Configuration Control H
N=Network H=Host A=Application
14
#RSAC
Risks of Direct Data Controls
No one can use the data if its always encrypted
Tagging Data on Content? Good luck with that
Tagging Data with Users? Easier, but still
DLP is only as good as your Regex foo
Be ready to customize for NoSQL Solutions
Vendors design for “most common”... Know anyone like that ?
15
#RSAC
Monitor the human too
16
#RSAC
Threat Behavior Buckets
•No one should EVER do this
•No machine should EVER do this
Never Anyone
(Always Prohibit)
•This type of person should never do
•This type of machine should never do
•This type of data should never go
Never This
(Point Prohibit)
•(Source Location)+(Source Machine)+
(Source Person)+(Target)+(Action)
•One of these items is irregular
Never Seen
(Watch and React)
17
#RSAC
Don’t say NO
Say HOW
18
#RSAC
Data Security is not a permanent state
19
#RSAC
Data Security can not work effectively unless you have agility
(there’s nothing static about data)
20
#RSAC
Pulling it all off
Build technical and business standards related to use of data and control of data - “The Law”
Build technical standards related to the controls expected of secure, restricted zones &
related to the encryption / access to data – “The How”
Find restricted data throughout the company, and scan for locations that should have NO data
Identify method to protect the data once found – delete / relocate / protect / encrypt &
execute
Implement technical controls at the endpoint and network and repository
Apply continuous monitoring controls to data & people
Build solutions and processes that outlast the people building them
21
#RSAC
For more information, please contact:
Scott Carlson
sccarlson@paypal.com
@relaxed137

More Related Content

PDF
RSA 2015 Realities of Private Cloud Security
PDF
Realities of Data Security
PDF
Security Program Development for the Hipster Company
PDF
Aspirin as a Service: Using the Cloud to Cure Security Headaches
PDF
Applying Auto-Data Classification Techniques for Large Data Sets
PDF
Take It to the Cloud: The Evolution of Security Architecture
PDF
Cloud Breach – Preparation and Response
PDF
CLOUD SECURITY ESSENTIALS 2.0 Full Stack Hacking & Recovery
RSA 2015 Realities of Private Cloud Security
Realities of Data Security
Security Program Development for the Hipster Company
Aspirin as a Service: Using the Cloud to Cure Security Headaches
Applying Auto-Data Classification Techniques for Large Data Sets
Take It to the Cloud: The Evolution of Security Architecture
Cloud Breach – Preparation and Response
CLOUD SECURITY ESSENTIALS 2.0 Full Stack Hacking & Recovery

What's hot (20)

PDF
Smart Megalopolises. How Safe and Reliable Is Your Data?
PPTX
How to Implement Snowflake Security Best Practices with Panther
PDF
Attacks on Critical Infrastructure: Insights from the “Big Board”
PDF
Ken Czekaj & Robert Wright - Leveraging APM NPM Solutions to Compliment Cyber...
PDF
Crypto 101: Encryption, Codebreaking, SSL and Bitcoin
PDF
How Google Protects Its Corporate Security Perimeter without Firewalls
PDF
Incident response-in-the-cloud
PDF
BeyondCorp - Google Security for Everyone Else
PDF
ITrust Security Operating Center (SOC) - Datasheet EN
PPTX
The Threat Is Real. Protect Yourself.
PPTX
Customer Story: Scaling Security With Detections-as-Code
PDF
BeyondCorp: Closing the Adherence Gap
PDF
Security Breakout Session
PDF
BeyondCorp and Zero Trust
PDF
SAP Cloud security overview 2.0
PPTX
Modern Security Operations & Common Roles/Competencies
PPTX
Log management principle and usage
PDF
Annual OktCyberfest 2019
PDF
protect4s-product-sheet
PPTX
PCI: Building Compliant Applications in the Public Cloud - RightScale Compute...
Smart Megalopolises. How Safe and Reliable Is Your Data?
How to Implement Snowflake Security Best Practices with Panther
Attacks on Critical Infrastructure: Insights from the “Big Board”
Ken Czekaj & Robert Wright - Leveraging APM NPM Solutions to Compliment Cyber...
Crypto 101: Encryption, Codebreaking, SSL and Bitcoin
How Google Protects Its Corporate Security Perimeter without Firewalls
Incident response-in-the-cloud
BeyondCorp - Google Security for Everyone Else
ITrust Security Operating Center (SOC) - Datasheet EN
The Threat Is Real. Protect Yourself.
Customer Story: Scaling Security With Detections-as-Code
BeyondCorp: Closing the Adherence Gap
Security Breakout Session
BeyondCorp and Zero Trust
SAP Cloud security overview 2.0
Modern Security Operations & Common Roles/Competencies
Log management principle and usage
Annual OktCyberfest 2019
protect4s-product-sheet
PCI: Building Compliant Applications in the Public Cloud - RightScale Compute...
Ad

Viewers also liked (14)

KEY
Kyoto: The Wind Of May
PDF
El emprendimiento vanessa gonzález - nien en tsai
PDF
Articulo práctica #1
PDF
Burundi : 4 avocats menacés de radiation
PDF
101 cosas que aprendi en la escuela de arquitectura
PDF
Novedades en la arquitectura
PDF
El futuro de la arquitectura en 100 edificios - natalia sanchez 12-1941
PPSX
Dylan birthdayshow
PPTX
Nakarin Promtan PESTAL Analysis of Thailand
PPTX
RFID Event Marketing Solutions - Excelerated Apps
PPTX
Secret Techniques to Manage Apache Cloudstack with ActOnCloud
PDF
Stephane Malka - Posiciona unidades modulares sobre los tejados de París
PDF
Bbl Style - Edicción 39 / campaña 41-42
PPSX
Relaciones Humanas En El Trabajo
Kyoto: The Wind Of May
El emprendimiento vanessa gonzález - nien en tsai
Articulo práctica #1
Burundi : 4 avocats menacés de radiation
101 cosas que aprendi en la escuela de arquitectura
Novedades en la arquitectura
El futuro de la arquitectura en 100 edificios - natalia sanchez 12-1941
Dylan birthdayshow
Nakarin Promtan PESTAL Analysis of Thailand
RFID Event Marketing Solutions - Excelerated Apps
Secret Techniques to Manage Apache Cloudstack with ActOnCloud
Stephane Malka - Posiciona unidades modulares sobre los tejados de París
Bbl Style - Edicción 39 / campaña 41-42
Relaciones Humanas En El Trabajo
Ad

Similar to RSA 2016 Realities of Data Security (20)

PDF
Demystifying Security Analytics: Data, Methods, Use Cases
PPTX
Aligning Application Security to Compliance
PDF
Security precognition chaos engineering in incident response
PPTX
RSA 2016 Security Analytics Presentation
PDF
Whose Cloud is It Anyway - Data Security in the Cloud
PDF
A Vision for Shared, Central Intelligence to Ebb a Growing Flood of Alerts
PDF
IDY-T08 More than Vaulting: Adapting to New Privileged Access Threats
PDF
Rapid Threat Modeling Techniques
PDF
FIM and System Call Auditing at Scale in a Large Container Deployment
PDF
Vendor Security Practices: Turn the Rocks Over Early and Often
PDF
str-f02-vendor_security_practices-turn_the_rocks_over_early_and_often
PPTX
Be the Hunter
PPTX
RSA 2018: Recon For the Defender - You know nothing (about your assets)
PDF
Recon for the Defender: You Know Nothing (about Your Assets), Jon Snow
PDF
Securing the “Weakest Link”
PDF
Data Privacy with Apache Spark: Defensive and Offensive Approaches
PPTX
Get Your Head in the Cloud: A Practical Model for Enterprise Cloud Security
PDF
Introducing a Security Program to Large Scale Legacy Products
PPTX
Chap 6 cloud security
PDF
Corpsec: “What Happened to Corpses A and B?”
Demystifying Security Analytics: Data, Methods, Use Cases
Aligning Application Security to Compliance
Security precognition chaos engineering in incident response
RSA 2016 Security Analytics Presentation
Whose Cloud is It Anyway - Data Security in the Cloud
A Vision for Shared, Central Intelligence to Ebb a Growing Flood of Alerts
IDY-T08 More than Vaulting: Adapting to New Privileged Access Threats
Rapid Threat Modeling Techniques
FIM and System Call Auditing at Scale in a Large Container Deployment
Vendor Security Practices: Turn the Rocks Over Early and Often
str-f02-vendor_security_practices-turn_the_rocks_over_early_and_often
Be the Hunter
RSA 2018: Recon For the Defender - You know nothing (about your assets)
Recon for the Defender: You Know Nothing (about Your Assets), Jon Snow
Securing the “Weakest Link”
Data Privacy with Apache Spark: Defensive and Offensive Approaches
Get Your Head in the Cloud: A Practical Model for Enterprise Cloud Security
Introducing a Security Program to Large Scale Legacy Products
Chap 6 cloud security
Corpsec: “What Happened to Corpses A and B?”

More from Scott Carlson (14)

PDF
What are Blockchain & Tokens and are they useful ?
PPTX
RSA APJ - BLOCKCHAIN SECURITY – IS IT REALLY DIFFERENT THAN ANYTHING ELSE ?
PPTX
Just Trust Everyone and We Will Be Fine, Right?
PPTX
DCD Converged Brazil 2016
PPTX
Trust But Control: Managing Privileges without killing productivity
PPTX
Will Your Cloud Be Compliant? OpenStack Security
PPTX
Interop Las Vegas Cloud Connect Summit 2014 - Software Defined Data Center
PPTX
Can Security & Agility Co-Exist
PPTX
You Can't Correlate what you don't have - ArcSight Protect 2011
PDF
HP Enterprise Security Customer Case Study - Apollo Group
PDF
Marriage of ESX and OpenStack - PayPal - VMWorld US 2013
PDF
McAfee Focus 2011 - Security in the Age of a Mobile Workforce and Mobile Devices
PPTX
Marriage of Openstack with KVM and ESX at PayPal OpenStack Summit Hong Kong F...
PPTX
High Availability OpenStack at PayPal - OpenStack Summit Fall Hong Kong 2013
What are Blockchain & Tokens and are they useful ?
RSA APJ - BLOCKCHAIN SECURITY – IS IT REALLY DIFFERENT THAN ANYTHING ELSE ?
Just Trust Everyone and We Will Be Fine, Right?
DCD Converged Brazil 2016
Trust But Control: Managing Privileges without killing productivity
Will Your Cloud Be Compliant? OpenStack Security
Interop Las Vegas Cloud Connect Summit 2014 - Software Defined Data Center
Can Security & Agility Co-Exist
You Can't Correlate what you don't have - ArcSight Protect 2011
HP Enterprise Security Customer Case Study - Apollo Group
Marriage of ESX and OpenStack - PayPal - VMWorld US 2013
McAfee Focus 2011 - Security in the Age of a Mobile Workforce and Mobile Devices
Marriage of Openstack with KVM and ESX at PayPal OpenStack Summit Hong Kong F...
High Availability OpenStack at PayPal - OpenStack Summit Fall Hong Kong 2013

Recently uploaded (20)

PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
PPTX
A Presentation on Artificial Intelligence
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PPTX
Cloud computing and distributed systems.
PDF
Encapsulation theory and applications.pdf
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
Machine learning based COVID-19 study performance prediction
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
cuic standard and advanced reporting.pdf
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Electronic commerce courselecture one. Pdf
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
A Presentation on Artificial Intelligence
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
Per capita expenditure prediction using model stacking based on satellite ima...
20250228 LYD VKU AI Blended-Learning.pptx
Reach Out and Touch Someone: Haptics and Empathic Computing
Cloud computing and distributed systems.
Encapsulation theory and applications.pdf
Dropbox Q2 2025 Financial Results & Investor Presentation
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Machine learning based COVID-19 study performance prediction
The AUB Centre for AI in Media Proposal.docx
cuic standard and advanced reporting.pdf
“AI and Expert System Decision Support & Business Intelligence Systems”
Electronic commerce courselecture one. Pdf
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Agricultural_Statistics_at_a_Glance_2022_0.pdf
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows

RSA 2016 Realities of Data Security

  • 1. SESSION ID: #RSAC Scott Carlson Realities of Data Security PDAC-T09 Director – Security Solutions PayPal @relaxed137
  • 3. #RSAC Why should we trust anyone with our Data? 3
  • 4. #RSAC People actually need data to do their job Email Marketing Customer Support Business Analytics Financial Analyst Marketing Software Developer Network Operations Security Operations HR / Payroll Fraud Control 4
  • 6. #RSAC “Think of how stupid the average person is, and realize half of them are stupider than that.” -- George Carlin The People Problem 6
  • 7. #RSAC http://xkcd.com used with permission under Creative commons License 7
  • 8. #RSAC So Now What ?? When you are thinking about solving this dilemma, you cannot just worry only about the data itself 8
  • 9. #RSAC Data security should strive to Data repositories with restricted/PII data Business work flows & data flows Identify owners, does data leave your network Delete or move into a secure network zone Encrypt data when it is found insecure Create access rights controls & fix bad process Secure It Find It Ongoing monitoring with $tool – users & systems Data scanning tools for compliance Inbound/outbound flow monitoring kill data streams & wall of shame Monitor It 9
  • 10. #RSAC Find It Ask Hey, where is our data? Where did this come from? Where is it going? Where Else could It be ? Are you caching anything ? How many copies are there? Has anyone taken it home? Did anyone stick it “in the cloud” Validate Buy Stuff or Build Stuff Data tools haven’t caught up with data systems You cannot find everything with Tagging, sometimes you have to sniff it out Don’t forget your logging systems, file shares, and desktops To sample or not to sample 10
  • 11. #RSAC Secure It Zones Build network zones in the right places to house the data where it needed Separate employee zones from customer zones from analytics zones If zones exist, uplift controls to match your new standard Build a common Bill of materials & definition of “Run the business” Encrypt Deploy Hardware Security Modules (HSM) where required Make sure your tools can decrypt where appropriate Keys should be as unique as you need them to be once you encrypt the data, make sure that the data entry point is encrypted too 11
  • 12. #RSAC Monitor It Logging Build use cases “Log all activity from DBA’s and watch for select from application tables” Log All the Things; keystroke log if required positive & negative testing required for tools tap, syslog, integrated, custom, modules, … In-Line Detection decrypt data if required deploy at all ingress and egress points that matter tap, DLP, proxies, email, … 12
  • 13. #RSAC Multi-Layer Trust Model Data Center ZoneAccess Zone ServerBastion Host Citrix PortalDesktop Data Repository Data User Zone Application Network Applications 13
  • 14. #RSAC Controls required around Data Centralized Logging N, H, A Vulnerability Scanning N, H, A Intrusion Detection N Patching Updates N, H, A Web Proxy N Anti-Malware N, H Time Synchronization N Data Loss Prevention N Firewalls N Role-Based Access N, H, A VDI / Citrix / Bastion N Packet Capture N File Integrity H Configuration Control H N=Network H=Host A=Application 14
  • 15. #RSAC Risks of Direct Data Controls No one can use the data if its always encrypted Tagging Data on Content? Good luck with that Tagging Data with Users? Easier, but still DLP is only as good as your Regex foo Be ready to customize for NoSQL Solutions Vendors design for “most common”... Know anyone like that ? 15
  • 17. #RSAC Threat Behavior Buckets •No one should EVER do this •No machine should EVER do this Never Anyone (Always Prohibit) •This type of person should never do •This type of machine should never do •This type of data should never go Never This (Point Prohibit) •(Source Location)+(Source Machine)+ (Source Person)+(Target)+(Action) •One of these items is irregular Never Seen (Watch and React) 17
  • 19. #RSAC Data Security is not a permanent state 19
  • 20. #RSAC Data Security can not work effectively unless you have agility (there’s nothing static about data) 20
  • 21. #RSAC Pulling it all off Build technical and business standards related to use of data and control of data - “The Law” Build technical standards related to the controls expected of secure, restricted zones & related to the encryption / access to data – “The How” Find restricted data throughout the company, and scan for locations that should have NO data Identify method to protect the data once found – delete / relocate / protect / encrypt & execute Implement technical controls at the endpoint and network and repository Apply continuous monitoring controls to data & people Build solutions and processes that outlast the people building them 21
  • 22. #RSAC For more information, please contact: Scott Carlson sccarlson@paypal.com @relaxed137