SlideShare a Scribd company logo
Tech Talk: Isn’t One Authentication
Mechanism for z Systems Enough?
Jeff Cherrington
Mainframe
CA Technologies
Product Manager, Mainframe Security
MFT29T
#CAWorld
2 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
For Informational Purposes Only
© 2015 CA. All rights reserved. All trademarks referenced herein belong to their respective companies. The presentation provided at CA
World 2015 is intended for information purposes only and does not form any type of warranty. Some of the specific slides with customer
references relate to customer's specific use and experience of CA products and solutions so actual results may vary.
Certain information in this presentation may outline CA’s general product direction. This presentation shall not serve to (i) affect the rights
and/or obligations of CA or its licensees under any existing or future license agreement or services agreement relating to any CA software
product; or (ii) amend any product documentation or specifications for any CA software product. This presentation is based on current
information and resource allocations as of November 18, 2015, and is subject to change or withdrawal by CA at any time without notice. The
development, release and timing of any features or functionality described in this presentation remain at CA’s sole discretion.
Notwithstanding anything in this presentation to the contrary, upon the general availability of any future CA product release referenced in
this presentation, CA may make such release available to new licensees in the form of a regularly scheduled major product release. Such
release may be made available to licensees of the product who are active subscribers to CA maintenance and support, on a when and if-
available basis. The information in this presentation is not deemed to be incorporated into any contract.
Terms of this Presentation
Identity and Access Management:
Keeping the Bad Guys Out
Letting the Good Guys In
4 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
What do these people
have in common?
5 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
MYTH
The mainframe is an impenetrable fortress.
REALITY
 Increased vulnerability to social engineering: Entry points to the mainframe have
changed
 Traditional mainframe access control is no longer sufficient – new vectors require
a different approach to infrastructure security
Cybercriminal teen hacked prison mainframe while taking IT course
- Techworld.com, March 2013
One of the UK’s most skilled and successful convicted cybercriminals was allegedly able to hack into his
prison’s mainframe after being allowed to take an IT course, an industrial tribunal hearing has heard.
6 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
MYTH
Data at rest and in use on the mainframe is safe from breaches
because it stays on the mainframe.
REALITY
 Big Data and Cloud: IT and the business want Mainframe data and analytics and
agility use cases cause data to leave the platform
 Proliferation of mainframe web services and APIs make data on the mainframe
more susceptible to a breach than ever before.
How good is your mainframe at data security? Not as good as you think.
- Techtarget.com, May 2010
Despite mainframes' reputation for data security, their increasing interaction with Web-based environments
makes them vulnerable.
7 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
MYTH
The mainframe has been well covered and well represented in the risk management
and control three lines of defense.
REALITY
Three lines of defense for effective risk management and control:
1. Operational Management
2. Risk Management and Compliance
3. Internal Audit
Mainframe as “black box” mentality breeds false sense of trust and assumptions
made across all three lines of defense  effectively increasing risks to the enterprise.
8 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
71% of the world’s mission critical
data is on the mainframe*
Mainframe is now an enterprise IT
server and with that role
it has more entry and exit vectors
Source: Rehabilitating the Perception of Mainframes, Enterprise systems Media, 22 July 2015
9 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Authentication Factors
 What: An authentication factor is a requirement that is designed to verify the identity of an
authorized user during the login process.
 Three categories of authentication factors
– The knowledge factor: Something that is known only by the user, such as a password or
PIN
– The inherence factor: Something that is physically unique to the user, such as a
fingerprint or iris scan
– The possession factor: Something that only the user possesses, such as a smartphone,
smartcard, USB token, or other hardware key
 Additional factors: Location factor and time factor are sometimes added
10 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
The Need for Advanced Authentication
 Reduce vulnerability
– Single authentication factors such as passwords and personal identification
numbers (PINs) have proven too easy for hackers to steal and exploit
– Advanced authentication methods and factors reduce vulnerability by
preventing a bad actor from easily logging in or authenticating as a specific
identity
Cost of Data Breach Study: Global Analysis - Ponemon Institute, May 2014
In 2014, recovery costs to companies from a single data breach ranged from an average of $3.5M to $31M
and the likelihood over the next two years of a sensitive data breach of at least 10,000 records per
company is 22%.
11 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
From Need to Mandate
https://www.whitehouse.gov/blog/2015/06/17/fact-sheet-enhancing-and-strengthening-federal-government-s-cybersecurity
FACT SHEET: Enhancing and Strengthening the
Federal Government’s Cybersecurity
Posted by Tony Scott on June 17, 2015 at 05:44 PM EDT
“Dramatically accelerate implementation of multi-
factor authentication, especially for privileged
users.
Intruders can easily steal or guess usernames/passwords
and use them to gain access to Federal networks, systems,
and data. Requiring the utilization of a Personal Identity
Verification (PIV) card or alternative form of multi-factor
authentication can significantly reduce the risk of
adversaries penetrating Federal networks and systems.
Agencies must report to OMB and DHS on progress
and challenges within 30 days.”
As part of this mandate
Tony Scott formed a Cybersecurity Sprint Team, to lead a 30-
day review of the Federal Government’s cybersecurity
policies, procedures, and practices. At the end of the review,
the Federal CIO will create and operationalize a set of action
plans and strategies to further address critical cybersecurity
priorities and recommend a Federal Civilian Cybersecurity
Strategy.
The first item on the six item strategy?
Protecting data at rest and in transit
Call to Action
13 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Strategic Opportunities for Ongoing Engagement
 Active Working groups
– Data-centric Security
– Advanced Authentication
– Compliance
 Help us understand your enterprise security needs
– Mobile applications to mainframe
– Data-centric audit and protection
14 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
It’s About Your Input and Ensuring We Deliver
the Right Product When You Need It
 The Agile framework
– Your collaboration and input makes it possible
– Repeated customer inspection and product team adaption
– Incremental delivery/customer validation of testable working software
 End of sprint reviews occur every 2 - 4 weeks
– Demo Discuss  Feedback Adjust  improve for the next iteration
 Join us to deliver on your requirements
– please sign up at validate.ca.com
15 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Q & A
Supporting Materials
17 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Types of Authentication
SINGLE-FACTOR TWO-STEP TWO-FACTOR MULTI FACTOR
Single process based on one
category of factor
Additive process: Authenticate once
with a single factor and then again
with another single factor from the
same category
Multiplicative process: Combination
from the knowledge or inherence
factor and the possession factor
derives a stronger single credential
than each independent credential
Multiplicative process: Combination
of three or more, each from a
separate category of factors,
derives a stronger single credential
than each independent factor
Includes the following factors:
Knowledge factor: one thing you
“know”
or
Inherence factor: one thing you
“are”
Includes the following factors:
Knowledge factor or inherence factor:
one thing you “know” or “are”
plus
Knowledge factor or inherence factor:
one thing you “know” or “are”
Includes the following factors:
Knowledge and inherence factor:
one thing you “know” or one thing
you “are”
plus
Possession factor: one thing you
“have”
Includes the following factors:
Knowledge factor: one thing you
“know”
plus
Inherence factor: one thing you
“are”
plus
Possession factor: one thing you
“have”
Examples:
 PIN
 Password
 Finger print
 Iris scan
Examples:
 Two physical keys
 Two passwords (user + one time
only password via SMS, generator,
email)
 Two forms of biometric
identification
Examples:
 Password or biomarker with an
identity card
 PIN, secret key or biomarker
with a hardware token
Examples:
 Password and fingerprint and
identity card
 PIN and iris scan and hardware
token
18 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
WHO CARES ABOUT IT WHY DO THEY CARE
Payment Card Industry Data
Security Standard (PCI/DSS)
Any organization who accepts or stores credit or debit card
information.
Fines can be assessed up to $500,000 USD per
data breach incident where PCI/DSS non-
compliance is proven
Personally Identifiable
Information (PII)
Any organization who accepts, collects or stores information that can
potentially be used to uniquely identify a person. It can include
national identification numbers, Social Security numbers, street
addresses, driver’s license numbers, telephone numbers, IP
addresses, email addresses, vehicle registrations, and ages.
 Civil monetary fines of varying amounts up to
$1 million USD and more
 Identity Theft and Deterrence Act of 1998 –
Violations of the act are subject to a fine
and/or jail time in a federal prison from three
to 15 years.
Health Insurance Portability
and Accountability Act
(HIPAA) and Protected Health
Information (PHI)
Any organization who creates, stores, transmits or electronically
receives protected health information (PHI). PHI relates to past,
present, or future physical or mental health conditions of an
individual, the provision of health care to the individual, or past,
present, or future payment for health care to an individual, and that
identifies the individual; or with respect to which there is a
reasonable basis to believe the information can be used to identify
the individual.
 Fines/penalties ranging from $100 per incident
to $1.5 million USD for all violations of an
identical provision
 Criminal penalties of up to 10 years in jail for
misuse, unauthorized use
Federal Information Security
Management Act (FISMA)
U.S. Government organizations who wish to protect government
information, operations and assets against natural or man-made
threats. If a business works with data provided by the government
under contract, it is likely they are subject to FISMA compliance.
Civil penalties are difficult to quantify given FISMA
regulates government organizations
Sarbanes-Oxley
All U.S. public company boards, management and public accounting
firms. There are also a number of provisions of the Act that also apply
to privately held companies. Sarbanes-Oxley covers a public
corporation's board of directors and adds criminal penalties for
certain misconduct.
 Criminal fines and penalties range from
$20,000 to millions plus decades in prison
 Average SOX compliance costs over $3M
19 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
For More Information
To learn more, please visit:
http://cainc.to/Nv2VOe
CA World ’15

More Related Content

PDF
Agile in Operations, DevOps and Architecture
PDF
How to Get Your Life Back: Succeeding at Software Asset Management (SAM) at F...
PDF
Tech Talk: Service Virtualization on Demand—Have Everything, Whenever and Whe...
PDF
Locating Unmanaged but Regulated Data on System z: CA Data Content Discovery
PDF
American Family Insurance Shifts to a Mobile-First Development Strategy with ...
PDF
See Inside the Middleware Black Box
PDF
Tech Talk: Knowledge Management of the Future for ITSM
PDF
Is Complacency Around Mainframe Security a Disaster Waiting to Happen?
Agile in Operations, DevOps and Architecture
How to Get Your Life Back: Succeeding at Software Asset Management (SAM) at F...
Tech Talk: Service Virtualization on Demand—Have Everything, Whenever and Whe...
Locating Unmanaged but Regulated Data on System z: CA Data Content Discovery
American Family Insurance Shifts to a Mobile-First Development Strategy with ...
See Inside the Middleware Black Box
Tech Talk: Knowledge Management of the Future for ITSM
Is Complacency Around Mainframe Security a Disaster Waiting to Happen?

What's hot (20)

PDF
Technology Primer: Building Applications the New-Fashioned Way
PDF
Case Study: Amping up customer experience with a business centric approach a...
PDF
Hewlett Packard Enterprise View on Going Big with API Management - Applicatio...
PDF
Implementing Adaptable Microservices; A Methodology for Loosely-Coupled Compo...
PDF
CA Project and Portfolio Management Budgeting & Forecasting
PDF
Go Deep and Wide: No It’s Not a Football, It’s End-to-End Performance Management
PDF
Knock, Knock…The Internet of Things wants to come in?
PDF
Case Study: Manheim Implements Test Data Management to Reduce Testing Time an...
PDF
Tech Talk: Harness the Power of Innovations Like Microservice Architecture an...
PDF
Tech Talk: CA Project and Portfolio Management Team Member Experience
PDF
How CA Technologies Enables Its Own Employees and Secures Access to Applicati...
PDF
Exploit New Levels of Insight, Orchestration and Governance for Complex Appli...
PDF
Case Study: Molina Medicaid Solutions Transforms Healthcare Through Automation
PDF
Secure the Open Enterprise with CA API Management
PDF
Moving to New Processes to Collaborate With You to Deliver Product Enhancemen...
PDF
Using Artificial Intelligence to power Service Virtualization
PDF
The Automation Maturity Curve: Taking IT to New Levels
PDF
The Known Unknown—Finding Lost, Abandoned and Hidden Regulated or Sensitive D...
PDF
Case Study: Oppenheimer Funds Brings IT to the People with ITSM Self-Service...
PDF
Discovery Model— An Approach for Agile at Scale
Technology Primer: Building Applications the New-Fashioned Way
Case Study: Amping up customer experience with a business centric approach a...
Hewlett Packard Enterprise View on Going Big with API Management - Applicatio...
Implementing Adaptable Microservices; A Methodology for Loosely-Coupled Compo...
CA Project and Portfolio Management Budgeting & Forecasting
Go Deep and Wide: No It’s Not a Football, It’s End-to-End Performance Management
Knock, Knock…The Internet of Things wants to come in?
Case Study: Manheim Implements Test Data Management to Reduce Testing Time an...
Tech Talk: Harness the Power of Innovations Like Microservice Architecture an...
Tech Talk: CA Project and Portfolio Management Team Member Experience
How CA Technologies Enables Its Own Employees and Secures Access to Applicati...
Exploit New Levels of Insight, Orchestration and Governance for Complex Appli...
Case Study: Molina Medicaid Solutions Transforms Healthcare Through Automation
Secure the Open Enterprise with CA API Management
Moving to New Processes to Collaborate With You to Deliver Product Enhancemen...
Using Artificial Intelligence to power Service Virtualization
The Automation Maturity Curve: Taking IT to New Levels
The Known Unknown—Finding Lost, Abandoned and Hidden Regulated or Sensitive D...
Case Study: Oppenheimer Funds Brings IT to the People with ITSM Self-Service...
Discovery Model— An Approach for Agile at Scale
Ad

Similar to Tech Talk: Isn’t One Authentication Mechanism z Systems Enough? (20)

PDF
Solvit identity is the new perimeter
PPTX
crisc_wk_5.pptx
PDF
Castle Walls Under Digital Siege: Risk-based Security for z/OS
PPT
InfoSecConcepts.ppt
PPT
2.4.1 - Intro to Cyber Security for students.ppt
PDF
For Public_ Cybersecurity_ Frameworks, Fundamentals, and Foundations 2023.pdf
DOCX
Access Control, Authentication, and Public Key Infrastructure.docx
PPTX
Community IT Webinar - IT Security for Nonprofits
PDF
CYB 102 – Fundamentals of Cyber Security .pdf
PPT
Marcos de Pedro Neoris authenware_cybersecurity step1
DOCX
Comprehensive Analysis of Contemporary Information Security Challenges
PDF
Sept 2012 data security & cyber liability
PDF
Cyber security and cyber law
PDF
INFORMATION SECURITY: THREATS AND SOLUTIONS.
 
PDF
Perimeter Security is Failing
PDF
Strong authentication implementation guide
 
PDF
IS Risk Assessment example
PDF
The hacker playbook: How to think and act like a cybercriminal to reduce risk...
PDF
Data breaches at home and abroad
PDF
cybersecurity-careers.pdf
Solvit identity is the new perimeter
crisc_wk_5.pptx
Castle Walls Under Digital Siege: Risk-based Security for z/OS
InfoSecConcepts.ppt
2.4.1 - Intro to Cyber Security for students.ppt
For Public_ Cybersecurity_ Frameworks, Fundamentals, and Foundations 2023.pdf
Access Control, Authentication, and Public Key Infrastructure.docx
Community IT Webinar - IT Security for Nonprofits
CYB 102 – Fundamentals of Cyber Security .pdf
Marcos de Pedro Neoris authenware_cybersecurity step1
Comprehensive Analysis of Contemporary Information Security Challenges
Sept 2012 data security & cyber liability
Cyber security and cyber law
INFORMATION SECURITY: THREATS AND SOLUTIONS.
 
Perimeter Security is Failing
Strong authentication implementation guide
 
IS Risk Assessment example
The hacker playbook: How to think and act like a cybercriminal to reduce risk...
Data breaches at home and abroad
cybersecurity-careers.pdf
Ad

More from CA Technologies (20)

PPTX
CA Mainframe Resource Intelligence
PDF
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
PDF
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
PDF
Case Study: How The Home Depot Built Quality Into Software Development
PDF
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
PDF
Case Study: Privileged Access in a World on Time
PDF
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
PDF
Case Study: Putting Citizens at The Center of Digital Government
PDF
Making Security Work—Implementing a Transformational Security Program
PDF
Keynote: Making Security a Competitive Advantage
PDF
Emerging Managed Services Opportunities in Identity and Access Management
PDF
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
PDF
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
PDF
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
PDF
Application Experience Analytics Services: The Strategic Digital Transformati...
PDF
Application Experience Analytics Services: The Strategic Digital Transformati...
PDF
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
PDF
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
PDF
Blockchain: Strategies for Moving From Hype to Realities of Deployment
PDF
Establish Digital Trust as the Currency of Digital Enterprise
CA Mainframe Resource Intelligence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How The Home Depot Built Quality Into Software Development
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Case Study: Privileged Access in a World on Time
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: Putting Citizens at The Center of Digital Government
Making Security Work—Implementing a Transformational Security Program
Keynote: Making Security a Competitive Advantage
Emerging Managed Services Opportunities in Identity and Access Management
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Blockchain: Strategies for Moving From Hype to Realities of Deployment
Establish Digital Trust as the Currency of Digital Enterprise

Recently uploaded (20)

PDF
MIND Revenue Release Quarter 2 2025 Press Release
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
Approach and Philosophy of On baking technology
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PPTX
Programs and apps: productivity, graphics, security and other tools
PPTX
sap open course for s4hana steps from ECC to s4
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
cuic standard and advanced reporting.pdf
MIND Revenue Release Quarter 2 2025 Press Release
Mobile App Security Testing_ A Comprehensive Guide.pdf
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Understanding_Digital_Forensics_Presentation.pptx
Approach and Philosophy of On baking technology
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Spectral efficient network and resource selection model in 5G networks
Building Integrated photovoltaic BIPV_UPV.pdf
Programs and apps: productivity, graphics, security and other tools
sap open course for s4hana steps from ECC to s4
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
Per capita expenditure prediction using model stacking based on satellite ima...
The Rise and Fall of 3GPP – Time for a Sabbatical?
20250228 LYD VKU AI Blended-Learning.pptx
Dropbox Q2 2025 Financial Results & Investor Presentation
Review of recent advances in non-invasive hemoglobin estimation
cuic standard and advanced reporting.pdf

Tech Talk: Isn’t One Authentication Mechanism z Systems Enough?

  • 1. Tech Talk: Isn’t One Authentication Mechanism for z Systems Enough? Jeff Cherrington Mainframe CA Technologies Product Manager, Mainframe Security MFT29T #CAWorld
  • 2. 2 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD For Informational Purposes Only © 2015 CA. All rights reserved. All trademarks referenced herein belong to their respective companies. The presentation provided at CA World 2015 is intended for information purposes only and does not form any type of warranty. Some of the specific slides with customer references relate to customer's specific use and experience of CA products and solutions so actual results may vary. Certain information in this presentation may outline CA’s general product direction. This presentation shall not serve to (i) affect the rights and/or obligations of CA or its licensees under any existing or future license agreement or services agreement relating to any CA software product; or (ii) amend any product documentation or specifications for any CA software product. This presentation is based on current information and resource allocations as of November 18, 2015, and is subject to change or withdrawal by CA at any time without notice. The development, release and timing of any features or functionality described in this presentation remain at CA’s sole discretion. Notwithstanding anything in this presentation to the contrary, upon the general availability of any future CA product release referenced in this presentation, CA may make such release available to new licensees in the form of a regularly scheduled major product release. Such release may be made available to licensees of the product who are active subscribers to CA maintenance and support, on a when and if- available basis. The information in this presentation is not deemed to be incorporated into any contract. Terms of this Presentation
  • 3. Identity and Access Management: Keeping the Bad Guys Out Letting the Good Guys In
  • 4. 4 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD What do these people have in common?
  • 5. 5 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD MYTH The mainframe is an impenetrable fortress. REALITY  Increased vulnerability to social engineering: Entry points to the mainframe have changed  Traditional mainframe access control is no longer sufficient – new vectors require a different approach to infrastructure security Cybercriminal teen hacked prison mainframe while taking IT course - Techworld.com, March 2013 One of the UK’s most skilled and successful convicted cybercriminals was allegedly able to hack into his prison’s mainframe after being allowed to take an IT course, an industrial tribunal hearing has heard.
  • 6. 6 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD MYTH Data at rest and in use on the mainframe is safe from breaches because it stays on the mainframe. REALITY  Big Data and Cloud: IT and the business want Mainframe data and analytics and agility use cases cause data to leave the platform  Proliferation of mainframe web services and APIs make data on the mainframe more susceptible to a breach than ever before. How good is your mainframe at data security? Not as good as you think. - Techtarget.com, May 2010 Despite mainframes' reputation for data security, their increasing interaction with Web-based environments makes them vulnerable.
  • 7. 7 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD MYTH The mainframe has been well covered and well represented in the risk management and control three lines of defense. REALITY Three lines of defense for effective risk management and control: 1. Operational Management 2. Risk Management and Compliance 3. Internal Audit Mainframe as “black box” mentality breeds false sense of trust and assumptions made across all three lines of defense  effectively increasing risks to the enterprise.
  • 8. 8 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD 71% of the world’s mission critical data is on the mainframe* Mainframe is now an enterprise IT server and with that role it has more entry and exit vectors Source: Rehabilitating the Perception of Mainframes, Enterprise systems Media, 22 July 2015
  • 9. 9 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Authentication Factors  What: An authentication factor is a requirement that is designed to verify the identity of an authorized user during the login process.  Three categories of authentication factors – The knowledge factor: Something that is known only by the user, such as a password or PIN – The inherence factor: Something that is physically unique to the user, such as a fingerprint or iris scan – The possession factor: Something that only the user possesses, such as a smartphone, smartcard, USB token, or other hardware key  Additional factors: Location factor and time factor are sometimes added
  • 10. 10 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD The Need for Advanced Authentication  Reduce vulnerability – Single authentication factors such as passwords and personal identification numbers (PINs) have proven too easy for hackers to steal and exploit – Advanced authentication methods and factors reduce vulnerability by preventing a bad actor from easily logging in or authenticating as a specific identity Cost of Data Breach Study: Global Analysis - Ponemon Institute, May 2014 In 2014, recovery costs to companies from a single data breach ranged from an average of $3.5M to $31M and the likelihood over the next two years of a sensitive data breach of at least 10,000 records per company is 22%.
  • 11. 11 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD From Need to Mandate https://www.whitehouse.gov/blog/2015/06/17/fact-sheet-enhancing-and-strengthening-federal-government-s-cybersecurity FACT SHEET: Enhancing and Strengthening the Federal Government’s Cybersecurity Posted by Tony Scott on June 17, 2015 at 05:44 PM EDT “Dramatically accelerate implementation of multi- factor authentication, especially for privileged users. Intruders can easily steal or guess usernames/passwords and use them to gain access to Federal networks, systems, and data. Requiring the utilization of a Personal Identity Verification (PIV) card or alternative form of multi-factor authentication can significantly reduce the risk of adversaries penetrating Federal networks and systems. Agencies must report to OMB and DHS on progress and challenges within 30 days.” As part of this mandate Tony Scott formed a Cybersecurity Sprint Team, to lead a 30- day review of the Federal Government’s cybersecurity policies, procedures, and practices. At the end of the review, the Federal CIO will create and operationalize a set of action plans and strategies to further address critical cybersecurity priorities and recommend a Federal Civilian Cybersecurity Strategy. The first item on the six item strategy? Protecting data at rest and in transit
  • 13. 13 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Strategic Opportunities for Ongoing Engagement  Active Working groups – Data-centric Security – Advanced Authentication – Compliance  Help us understand your enterprise security needs – Mobile applications to mainframe – Data-centric audit and protection
  • 14. 14 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD It’s About Your Input and Ensuring We Deliver the Right Product When You Need It  The Agile framework – Your collaboration and input makes it possible – Repeated customer inspection and product team adaption – Incremental delivery/customer validation of testable working software  End of sprint reviews occur every 2 - 4 weeks – Demo Discuss  Feedback Adjust  improve for the next iteration  Join us to deliver on your requirements – please sign up at validate.ca.com
  • 15. 15 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Q & A
  • 17. 17 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Types of Authentication SINGLE-FACTOR TWO-STEP TWO-FACTOR MULTI FACTOR Single process based on one category of factor Additive process: Authenticate once with a single factor and then again with another single factor from the same category Multiplicative process: Combination from the knowledge or inherence factor and the possession factor derives a stronger single credential than each independent credential Multiplicative process: Combination of three or more, each from a separate category of factors, derives a stronger single credential than each independent factor Includes the following factors: Knowledge factor: one thing you “know” or Inherence factor: one thing you “are” Includes the following factors: Knowledge factor or inherence factor: one thing you “know” or “are” plus Knowledge factor or inherence factor: one thing you “know” or “are” Includes the following factors: Knowledge and inherence factor: one thing you “know” or one thing you “are” plus Possession factor: one thing you “have” Includes the following factors: Knowledge factor: one thing you “know” plus Inherence factor: one thing you “are” plus Possession factor: one thing you “have” Examples:  PIN  Password  Finger print  Iris scan Examples:  Two physical keys  Two passwords (user + one time only password via SMS, generator, email)  Two forms of biometric identification Examples:  Password or biomarker with an identity card  PIN, secret key or biomarker with a hardware token Examples:  Password and fingerprint and identity card  PIN and iris scan and hardware token
  • 18. 18 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD WHO CARES ABOUT IT WHY DO THEY CARE Payment Card Industry Data Security Standard (PCI/DSS) Any organization who accepts or stores credit or debit card information. Fines can be assessed up to $500,000 USD per data breach incident where PCI/DSS non- compliance is proven Personally Identifiable Information (PII) Any organization who accepts, collects or stores information that can potentially be used to uniquely identify a person. It can include national identification numbers, Social Security numbers, street addresses, driver’s license numbers, telephone numbers, IP addresses, email addresses, vehicle registrations, and ages.  Civil monetary fines of varying amounts up to $1 million USD and more  Identity Theft and Deterrence Act of 1998 – Violations of the act are subject to a fine and/or jail time in a federal prison from three to 15 years. Health Insurance Portability and Accountability Act (HIPAA) and Protected Health Information (PHI) Any organization who creates, stores, transmits or electronically receives protected health information (PHI). PHI relates to past, present, or future physical or mental health conditions of an individual, the provision of health care to the individual, or past, present, or future payment for health care to an individual, and that identifies the individual; or with respect to which there is a reasonable basis to believe the information can be used to identify the individual.  Fines/penalties ranging from $100 per incident to $1.5 million USD for all violations of an identical provision  Criminal penalties of up to 10 years in jail for misuse, unauthorized use Federal Information Security Management Act (FISMA) U.S. Government organizations who wish to protect government information, operations and assets against natural or man-made threats. If a business works with data provided by the government under contract, it is likely they are subject to FISMA compliance. Civil penalties are difficult to quantify given FISMA regulates government organizations Sarbanes-Oxley All U.S. public company boards, management and public accounting firms. There are also a number of provisions of the Act that also apply to privately held companies. Sarbanes-Oxley covers a public corporation's board of directors and adds criminal penalties for certain misconduct.  Criminal fines and penalties range from $20,000 to millions plus decades in prison  Average SOX compliance costs over $3M
  • 19. 19 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD For More Information To learn more, please visit: http://cainc.to/Nv2VOe CA World ’15