SlideShare a Scribd company logo
High Security
Requirements
Working in the security market
High Security market
• Customers:
• Intelligence agencies (NSA, CIA, USAF, WH)
• Finances (Banks)
• Governments (Justice system, education system)
• Chief Security Officer / CIO has power to decide
• Product features come after security features
ionGrid
• Solve BYOD for
file access
• Secure container
• Integrates with
current
infrastructure
Data in movement
Data in movement (cont)
• Provisioning
• Enables end-to-end encryption
• Improves security against “man in the middle attack”
• Secure channel in AMQP protocol
• Pro : AMQP instead of HTTPS gives stronger encryption
• Cons : very hard to work with…
• Real use case
• Pretty much everything…
Data at rest (cont)
Data Key
Password
Data at rest
• Encrypt data
• Much harder to access the data against a dumping attack
• Server gives the key every time authentication is correct
• Multiple factor authentication (password, RSA SecureID,
etc…)
• Offline authentication
• Encrypt master key using password
• User can retrieve its key with password
Security policies
• Classic RWX (Read, Write, Execute)
• Pros: Access data, modify them, etc…
• Cons: Very hard to express the business needs
• “Can I … ?” policies (ie: can login)
• Pros: Much better for business needs
• Cons: Requires a lot of maintenance
• How can I handle a lot of business rules ?
• Access data only during the day / at a location
• Specify policies per file / folder / user
Security policies (cont)
• Empower your customer with its own security
policies!
• Define “Can I … ?” policies in client
• Policy engine is defined in JavaScript
• Let the company code and define its own
rules or use simple true/false checkboxes
• Code snippet can be defined per file / user
• Code is shipped to the device
• Works offline
• Works in the future
Device compromised
• Simple cases:
• Device stolen or lost
• Employee quits or is fired
• Device exits location
• Active attacks
• Faraday bag
• Forensic attack
TIME-BOMB EVERYTHING!
Real use cases
• JP Morgan
• Encryption and secure channel
• Coke
• Executive board members would loose their iPads…
• NBC universal
• TV Shows scripts should only be accessed with a specific set of
rules
• Schweppes
• Secure video streaming
Real use cases (cont)
• New York City Transit
• Offline use
• Application secure sandbox in HTML5
• “pg&e from the east coast”
• Got rid of “secure binders” during Sandy storm
• White House / CIA / USAF
• Overall security
• Supreme court of Australia
• Security ended up speeding trial time by 10%
And now…
• Which use case around secure
messaging have you heard about ?
• What security problem should we try to
solve ?

More Related Content

PPTX
Building a Hacker Resistant Network
PDF
Efficient data transfer in Android
PDF
Startup survival lessons
PDF
Model S Cover - LCT Oct 2013
PDF
How to video.
PDF
Proterra TearSheet
PDF
Architecting for the Cloud: Hoping for the best, prepared for the worst
Building a Hacker Resistant Network
Efficient data transfer in Android
Startup survival lessons
Model S Cover - LCT Oct 2013
How to video.
Proterra TearSheet
Architecting for the Cloud: Hoping for the best, prepared for the worst

Viewers also liked (10)

PPTX
Laporan hasil pratikum indikator asam basa alami
PDF
Natural language processing in iOS / OSX
PPTX
Indeks harga dan inflasi, permintaan dan penawaran uang
PPTX
Agama qada dan qadar
PPTX
Sejarah peradaban Yunani Kuno
PPTX
Notes on Debugging
PPTX
Sejarah Perang Aceh
PPTX
Laporan Hasil Praktikum Koloid
PPTX
Pancasila sebagai ideologi
Laporan hasil pratikum indikator asam basa alami
Natural language processing in iOS / OSX
Indeks harga dan inflasi, permintaan dan penawaran uang
Agama qada dan qadar
Sejarah peradaban Yunani Kuno
Notes on Debugging
Sejarah Perang Aceh
Laporan Hasil Praktikum Koloid
Pancasila sebagai ideologi
Ad

Similar to Security best practices. (20)

PPTX
3433 IBM messaging security why securing your environment is important-feb2...
PPTX
IBM Messaging Security - Why securing your environment is important : IBM Int...
PDF
Making Security Approachable for Developers and Operators
PDF
The 5 Layers of Security Testing by Alan Koch
PDF
The 5 Layers of Security Testing by Alan Koch
PDF
What Every Developer And Tester Should Know About Software Security
PPTX
How to write secure code
PDF
Module 6.Security in Evolving Technology
PPT
The bits bytes and business benefits of securing your mq environment and mess...
PDF
Middleware Audits And Remediation For Pci Compliance
KEY
ONE Conference: Vulnerabilities in Web Applications
PDF
What I learned from RSAC 2019
PDF
Computer & Data Security
PDF
The Future of Software Security Assurance
PPTX
02-overview.pptx
DOCX
Wireless Information Security System via Role based Access Control Pattern Us...
PPT
AMI Security 101 - Smart Grid Security East 2011
PDF
Securing your mobile business with ibm worklight
3433 IBM messaging security why securing your environment is important-feb2...
IBM Messaging Security - Why securing your environment is important : IBM Int...
Making Security Approachable for Developers and Operators
The 5 Layers of Security Testing by Alan Koch
The 5 Layers of Security Testing by Alan Koch
What Every Developer And Tester Should Know About Software Security
How to write secure code
Module 6.Security in Evolving Technology
The bits bytes and business benefits of securing your mq environment and mess...
Middleware Audits And Remediation For Pci Compliance
ONE Conference: Vulnerabilities in Web Applications
What I learned from RSAC 2019
Computer & Data Security
The Future of Software Security Assurance
02-overview.pptx
Wireless Information Security System via Role based Access Control Pattern Us...
AMI Security 101 - Smart Grid Security East 2011
Securing your mobile business with ibm worklight
Ad

Recently uploaded (20)

PDF
Exploratory_Data_Analysis_Fundamentals.pdf
PPTX
Artificial Intelligence
PPT
INTRODUCTION -Data Warehousing and Mining-M.Tech- VTU.ppt
PDF
EXPLORING LEARNING ENGAGEMENT FACTORS INFLUENCING BEHAVIORAL, COGNITIVE, AND ...
PDF
R24 SURVEYING LAB MANUAL for civil enggi
PPTX
Sorting and Hashing in Data Structures with Algorithms, Techniques, Implement...
PDF
Design Guidelines and solutions for Plastics parts
PDF
Human-AI Collaboration: Balancing Agentic AI and Autonomy in Hybrid Systems
PDF
Automation-in-Manufacturing-Chapter-Introduction.pdf
PDF
Soil Improvement Techniques Note - Rabbi
PDF
COURSE DESCRIPTOR OF SURVEYING R24 SYLLABUS
PPTX
AUTOMOTIVE ENGINE MANAGEMENT (MECHATRONICS).pptx
PPTX
Safety Seminar civil to be ensured for safe working.
PDF
null (2) bgfbg bfgb bfgb fbfg bfbgf b.pdf
PDF
BIO-INSPIRED HORMONAL MODULATION AND ADAPTIVE ORCHESTRATION IN S-AI-GPT
PDF
22EC502-MICROCONTROLLER AND INTERFACING-8051 MICROCONTROLLER.pdf
PDF
Categorization of Factors Affecting Classification Algorithms Selection
PDF
Abrasive, erosive and cavitation wear.pdf
PDF
Influence of Green Infrastructure on Residents’ Endorsement of the New Ecolog...
PDF
PREDICTION OF DIABETES FROM ELECTRONIC HEALTH RECORDS
Exploratory_Data_Analysis_Fundamentals.pdf
Artificial Intelligence
INTRODUCTION -Data Warehousing and Mining-M.Tech- VTU.ppt
EXPLORING LEARNING ENGAGEMENT FACTORS INFLUENCING BEHAVIORAL, COGNITIVE, AND ...
R24 SURVEYING LAB MANUAL for civil enggi
Sorting and Hashing in Data Structures with Algorithms, Techniques, Implement...
Design Guidelines and solutions for Plastics parts
Human-AI Collaboration: Balancing Agentic AI and Autonomy in Hybrid Systems
Automation-in-Manufacturing-Chapter-Introduction.pdf
Soil Improvement Techniques Note - Rabbi
COURSE DESCRIPTOR OF SURVEYING R24 SYLLABUS
AUTOMOTIVE ENGINE MANAGEMENT (MECHATRONICS).pptx
Safety Seminar civil to be ensured for safe working.
null (2) bgfbg bfgb bfgb fbfg bfbgf b.pdf
BIO-INSPIRED HORMONAL MODULATION AND ADAPTIVE ORCHESTRATION IN S-AI-GPT
22EC502-MICROCONTROLLER AND INTERFACING-8051 MICROCONTROLLER.pdf
Categorization of Factors Affecting Classification Algorithms Selection
Abrasive, erosive and cavitation wear.pdf
Influence of Green Infrastructure on Residents’ Endorsement of the New Ecolog...
PREDICTION OF DIABETES FROM ELECTRONIC HEALTH RECORDS

Security best practices.

  • 2. High Security market • Customers: • Intelligence agencies (NSA, CIA, USAF, WH) • Finances (Banks) • Governments (Justice system, education system) • Chief Security Officer / CIO has power to decide • Product features come after security features
  • 3. ionGrid • Solve BYOD for file access • Secure container • Integrates with current infrastructure
  • 5. Data in movement (cont) • Provisioning • Enables end-to-end encryption • Improves security against “man in the middle attack” • Secure channel in AMQP protocol • Pro : AMQP instead of HTTPS gives stronger encryption • Cons : very hard to work with… • Real use case • Pretty much everything…
  • 6. Data at rest (cont) Data Key Password
  • 7. Data at rest • Encrypt data • Much harder to access the data against a dumping attack • Server gives the key every time authentication is correct • Multiple factor authentication (password, RSA SecureID, etc…) • Offline authentication • Encrypt master key using password • User can retrieve its key with password
  • 8. Security policies • Classic RWX (Read, Write, Execute) • Pros: Access data, modify them, etc… • Cons: Very hard to express the business needs • “Can I … ?” policies (ie: can login) • Pros: Much better for business needs • Cons: Requires a lot of maintenance • How can I handle a lot of business rules ? • Access data only during the day / at a location • Specify policies per file / folder / user
  • 9. Security policies (cont) • Empower your customer with its own security policies! • Define “Can I … ?” policies in client • Policy engine is defined in JavaScript • Let the company code and define its own rules or use simple true/false checkboxes • Code snippet can be defined per file / user • Code is shipped to the device • Works offline • Works in the future
  • 10. Device compromised • Simple cases: • Device stolen or lost • Employee quits or is fired • Device exits location • Active attacks • Faraday bag • Forensic attack TIME-BOMB EVERYTHING!
  • 11. Real use cases • JP Morgan • Encryption and secure channel • Coke • Executive board members would loose their iPads… • NBC universal • TV Shows scripts should only be accessed with a specific set of rules • Schweppes • Secure video streaming
  • 12. Real use cases (cont) • New York City Transit • Offline use • Application secure sandbox in HTML5 • “pg&e from the east coast” • Got rid of “secure binders” during Sandy storm • White House / CIA / USAF • Overall security • Supreme court of Australia • Security ended up speeding trial time by 10%
  • 13. And now… • Which use case around secure messaging have you heard about ? • What security problem should we try to solve ?