SlideShare une entreprise Scribd logo
1  sur  22
Securing Citizen Facing Applications Moderated by  Timothy Davis Oracle Enterprise Architect Board Member
Agenda ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Today’s Panel Edwin Lorenzana, Enterprise Security Architect, City of Boston Hayri Tarhan, Oracle Enterprise Security Specialist Architect Timothy Davis, Oracle Enterprise Architect Board Member Jeremy Forman, Oracle Enterprise Architect CISSP Certified Professional Marc Chanliau, Director, Identity Management Development
What are Secure Citizen Facing Applications?
Citizens More Sophisticated …  Higher Costs Than Ever… It Adds Up Government 2.0 ,[object Object],[object Object],[object Object],Source: IT Policy Compliance Group, 2007. ,[object Object],[object Object],[object Object],[object Object],$
More breaches than ever… Data Breach Once exposed, the data is out there – the bell can’t be un-rung PUBLICLY REPORTED DATA BREACHES Total Personally Identifying Information Records Exposed (Millions) Source: DataLossDB, Ponemon Institute, 2009 Average cost of a data breach $202 per record Average total cost exceeds $6.6 million per breach 630%  Increase
More threats than ever… 70% attacks originate inside the firewall 90% attacks perpetrated by employees with privileged access
Issue #1: Are the business and application owners involved in the security decision making process?  Or is it the technology organization? This slide is not  to be displayed Panelist Question Jeremy Forman ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Edwin Lorenzana ,[object Object]
Issue #1: Are the business and application owners involved in the security decision making process?  Or is it the technology organization? Why? Today’s “New Normal” Users, Systems, Globalization and Compliance Forced Complexity IT  Governance EMR/HIE Service Level Compliance Financial Reporting Compliance Compliance & Ethics Programs Audit  Management Data Privacy Records Retention Legal Discovery CJIS Apps  Server Data  Warehouse Database Mainframes Mobile Devices Enterprise Applications Systems Globalization Users Legal Taxation HR Public  Safety Partners Citizens Healthcare EPA Mandates MFIPPA FOIPPA FDA FISMA NIST HIPAA FDA PCI… Patriot Act SB1386
Copyright © 2008, Oracle and/or its affiliates. All rights reserved.  Monitoring and Configuration Enterprise Visibility Automated Controls Security for Applications, Middleware, Data & Infrastructure Comprehensive ‘Defense in Depth’ Approach  Policy Enforcement Database & Infrastructure Middleware Applications Access to Business Services Lower Cost of User Lifecycle Data Protection and Privacy Virtualization
Oracle Architect Development Process for Security Architecture Phase Input Output Architecture Vision ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Current State Architecture ,[object Object],[object Object],[object Object],[object Object],Future State Architecture ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Strategic Roadmap ,[object Object],[object Object],[object Object],[object Object],[object Object],EA Governance ,[object Object],Business Case ,[object Object],[object Object]
Issue #2: Major issues around proofing and identifying citizens access to systems? This slide is not  to be displayed Panelist Question Hayri Tarhan ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Marc or Edwin
Issue #2: Major issues around proofing and identifying citizens access to systems? Virtual Attribute Authority  Internal Apps Virtual Attribute Authority Rules Virtual Identities Hierarchies, Mappings Directories Databases Proprietary Identity Attributes Applications
Issue #3: How can you meet FISMA’s different levels of authentication and identification? This slide is not  to be displayed Panelists:  These are the questions I will be asking, and the primary respondent.  The primary respondent should take from 1 to 5 minutes answering in as much detail as he wishes.  When the primary respondent has finished, other panelist may make additional comments of 1 minute or less. Panelist Question Hayri Tarhan ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Jeremy Forman ,[object Object]
Risk-based Access Control Device Geography Time Activity Secure Mutual Authentication Risk-Based Authorization Risk Scoring Issue #3: How can you meet FISMA’s different levels of authentication and identification? Virtual Attribute Authority Rules Virtual Identities Hierarchies, Mappings ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Issue #4: Is a centralized or decentralized approach to authentication and authorization the more feasible approach? Panelists:  These are the questions I will be asking, and the primary respondent.  The primary respondent should take from 1 to 5 minutes answering in as much detail as he wishes.  When the primary respondent has finished, other panelist may make additional comments of 1 minute or less. This slide is not  to be displayed Panelist Question Edwin Lorenzana Is a centralized or decentralized approach to authentication and authorization the more feasible approach?   Follow-up :  How would a quasi-public/private sector model work for a composite ID? Discussion Points: Composite Ids Who owns the Composite ID, who controls it and who contributes to it? Explain Core, Context and Balance of Identities in the Public Sector Hayri Tarhan ,[object Object]
Issue #4: Is a centralized or decentralized approach to authentication and authorization the more feasible approach? Identity Mgmt Future State Architecture
To Learn More Enterprise Architecture with Oracle ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Oracle  Enterprise Architecture Framework Business Architecture Application Architecture Information Architecture Technology Architecture EA Repository
Wrap up:  Guidance to Security Architects Panelists:  These are the questions I will be asking, and the primary respondent.  The primary respondent should take from 1 to 5 minutes answering in as much detail as he wishes.  When the primary respondent has finished, other panelist may make additional comments of 1 minute or less. This slide is not  to be displayed Panelist Question Edwin Lorenzana ,[object Object],Hayri Tarhan ,[object Object],Marc Chanliau ,[object Object],Jeremy Forman ,[object Object]
A final question  to our panel: Guidance to Security Architects ? Edwin Lorenzana Hayri Tarhan Jeremy Forman Timothy Davis Marc  Chanliau
Questions & Answers
Thank You

Contenu connexe

Tendances

Why Passwords are not strong enough
Why Passwords are not strong enoughWhy Passwords are not strong enough
Why Passwords are not strong enoughEMC
 
Information security management v2010
Information security management v2010Information security management v2010
Information security management v2010joevest
 
04-1 E-commerce Security slides
04-1 E-commerce Security slides04-1 E-commerce Security slides
04-1 E-commerce Security slidesmonchai sopitka
 
Enterprise Digital Rights Management (Persistent Security)
Enterprise Digital Rights Management (Persistent Security)Enterprise Digital Rights Management (Persistent Security)
Enterprise Digital Rights Management (Persistent Security)pabatan
 
Digital Rights Management One For Sharepoint
Digital Rights Management One For SharepointDigital Rights Management One For Sharepoint
Digital Rights Management One For Sharepointpabatan
 
Shaping-Up SharePoint Security in 5 Steps
Shaping-Up SharePoint Security in 5 StepsShaping-Up SharePoint Security in 5 Steps
Shaping-Up SharePoint Security in 5 StepsImperva
 
Data Loss Prevention: Challenges, Impacts & Effective Strategies
Data Loss Prevention: Challenges, Impacts & Effective StrategiesData Loss Prevention: Challenges, Impacts & Effective Strategies
Data Loss Prevention: Challenges, Impacts & Effective StrategiesSeccuris Inc.
 
Enterprise Information Systems Security: A Case Study in the Banking Sector
Enterprise Information Systems Security: A Case Study in the Banking SectorEnterprise Information Systems Security: A Case Study in the Banking Sector
Enterprise Information Systems Security: A Case Study in the Banking SectorCONFENIS 2012
 
Multi Factor Authentication
Multi Factor AuthenticationMulti Factor Authentication
Multi Factor AuthenticationPing Identity
 
Phishcops multifactor-authentication-website-authentication1096
Phishcops multifactor-authentication-website-authentication1096Phishcops multifactor-authentication-website-authentication1096
Phishcops multifactor-authentication-website-authentication1096Hai Nguyen
 
Peoplesoft Erp
Peoplesoft ErpPeoplesoft Erp
Peoplesoft ErpAppsian
 
Security_360_Marketing_Package
Security_360_Marketing_PackageSecurity_360_Marketing_Package
Security_360_Marketing_PackageRandy B.
 
Analyst Report: The Digital Universe in 2020 - China
Analyst Report: The Digital Universe in 2020 - ChinaAnalyst Report: The Digital Universe in 2020 - China
Analyst Report: The Digital Universe in 2020 - ChinaEMC
 
Protecting Intellectual Property and Data Loss Prevention (DLP)
Protecting Intellectual Property and Data Loss Prevention (DLP)Protecting Intellectual Property and Data Loss Prevention (DLP)
Protecting Intellectual Property and Data Loss Prevention (DLP)Arpin Consulting
 

Tendances (19)

Why Passwords are not strong enough
Why Passwords are not strong enoughWhy Passwords are not strong enough
Why Passwords are not strong enough
 
Information security management v2010
Information security management v2010Information security management v2010
Information security management v2010
 
04-1 E-commerce Security slides
04-1 E-commerce Security slides04-1 E-commerce Security slides
04-1 E-commerce Security slides
 
Enterprise Digital Rights Management (Persistent Security)
Enterprise Digital Rights Management (Persistent Security)Enterprise Digital Rights Management (Persistent Security)
Enterprise Digital Rights Management (Persistent Security)
 
Digital Rights Management One For Sharepoint
Digital Rights Management One For SharepointDigital Rights Management One For Sharepoint
Digital Rights Management One For Sharepoint
 
Compliance Awareness
Compliance AwarenessCompliance Awareness
Compliance Awareness
 
Shaping-Up SharePoint Security in 5 Steps
Shaping-Up SharePoint Security in 5 StepsShaping-Up SharePoint Security in 5 Steps
Shaping-Up SharePoint Security in 5 Steps
 
Data Loss Prevention: Challenges, Impacts & Effective Strategies
Data Loss Prevention: Challenges, Impacts & Effective StrategiesData Loss Prevention: Challenges, Impacts & Effective Strategies
Data Loss Prevention: Challenges, Impacts & Effective Strategies
 
Business Impact of Identity Management In Information Technology
Business Impact of Identity Management In Information TechnologyBusiness Impact of Identity Management In Information Technology
Business Impact of Identity Management In Information Technology
 
Enterprise Information Systems Security: A Case Study in the Banking Sector
Enterprise Information Systems Security: A Case Study in the Banking SectorEnterprise Information Systems Security: A Case Study in the Banking Sector
Enterprise Information Systems Security: A Case Study in the Banking Sector
 
ZS Infotech v1.0
ZS Infotech v1.0ZS Infotech v1.0
ZS Infotech v1.0
 
Multi Factor Authentication
Multi Factor AuthenticationMulti Factor Authentication
Multi Factor Authentication
 
Co p
Co pCo p
Co p
 
Phishcops multifactor-authentication-website-authentication1096
Phishcops multifactor-authentication-website-authentication1096Phishcops multifactor-authentication-website-authentication1096
Phishcops multifactor-authentication-website-authentication1096
 
Peoplesoft Erp
Peoplesoft ErpPeoplesoft Erp
Peoplesoft Erp
 
Powerpoint v7
Powerpoint v7Powerpoint v7
Powerpoint v7
 
Security_360_Marketing_Package
Security_360_Marketing_PackageSecurity_360_Marketing_Package
Security_360_Marketing_Package
 
Analyst Report: The Digital Universe in 2020 - China
Analyst Report: The Digital Universe in 2020 - ChinaAnalyst Report: The Digital Universe in 2020 - China
Analyst Report: The Digital Universe in 2020 - China
 
Protecting Intellectual Property and Data Loss Prevention (DLP)
Protecting Intellectual Property and Data Loss Prevention (DLP)Protecting Intellectual Property and Data Loss Prevention (DLP)
Protecting Intellectual Property and Data Loss Prevention (DLP)
 

En vedette

Workwear
WorkwearWorkwear
Workwearkausarh
 
DiMatteo Insurance Service Summary Jd 7 18 06
DiMatteo Insurance Service Summary Jd 7 18 06DiMatteo Insurance Service Summary Jd 7 18 06
DiMatteo Insurance Service Summary Jd 7 18 06rlesko
 
Foto Expositie Portretten uit Cuba
Foto Expositie Portretten uit CubaFoto Expositie Portretten uit Cuba
Foto Expositie Portretten uit Cubableijenberg
 
Il Cenacolo di Leonardo da Vinci
Il Cenacolo di Leonardo da VinciIl Cenacolo di Leonardo da Vinci
Il Cenacolo di Leonardo da Vincidsavoia
 
Definitive Consulting E Brochure
Definitive Consulting E BrochureDefinitive Consulting E Brochure
Definitive Consulting E Brochurerichardschaefer
 
What’S The Plan.Web
What’S The Plan.WebWhat’S The Plan.Web
What’S The Plan.Webnancybostock
 
Constitution herd
Constitution  herdConstitution  herd
Constitution herdacolyte26
 
Corporate Wellness - Presented by Beneplan & the House of Verona
Corporate Wellness - Presented by Beneplan & the House of VeronaCorporate Wellness - Presented by Beneplan & the House of Verona
Corporate Wellness - Presented by Beneplan & the House of VeronaYafa Sakkejha
 
Copia De Loba
Copia De LobaCopia De Loba
Copia De Lobaamezola
 
24015127 Consell Social De La Llengua Catalana Llengua I Joves
24015127 Consell Social De La Llengua Catalana Llengua I Joves24015127 Consell Social De La Llengua Catalana Llengua I Joves
24015127 Consell Social De La Llengua Catalana Llengua I JovesArnau Cerdà
 
David Parfect - #smib10 Presentation
David Parfect - #smib10 Presentation David Parfect - #smib10 Presentation
David Parfect - #smib10 Presentation smibevents
 
myStratex Workshop Pack
myStratex Workshop PackmyStratex Workshop Pack
myStratex Workshop PackFabStart
 
Com Ensenyar Llengua A Xinesos Lh
Com Ensenyar Llengua A Xinesos LhCom Ensenyar Llengua A Xinesos Lh
Com Ensenyar Llengua A Xinesos LhArnau Cerdà
 
campaña recogida de alimentos
campaña recogida de alimentoscampaña recogida de alimentos
campaña recogida de alimentospive
 

En vedette (20)

Workwear
WorkwearWorkwear
Workwear
 
DiMatteo Insurance Service Summary Jd 7 18 06
DiMatteo Insurance Service Summary Jd 7 18 06DiMatteo Insurance Service Summary Jd 7 18 06
DiMatteo Insurance Service Summary Jd 7 18 06
 
Het Iss
Het IssHet Iss
Het Iss
 
Foto Expositie Portretten uit Cuba
Foto Expositie Portretten uit CubaFoto Expositie Portretten uit Cuba
Foto Expositie Portretten uit Cuba
 
Il Cenacolo di Leonardo da Vinci
Il Cenacolo di Leonardo da VinciIl Cenacolo di Leonardo da Vinci
Il Cenacolo di Leonardo da Vinci
 
Definitive Consulting E Brochure
Definitive Consulting E BrochureDefinitive Consulting E Brochure
Definitive Consulting E Brochure
 
What’S The Plan.Web
What’S The Plan.WebWhat’S The Plan.Web
What’S The Plan.Web
 
Constitution herd
Constitution  herdConstitution  herd
Constitution herd
 
Corporate Wellness - Presented by Beneplan & the House of Verona
Corporate Wellness - Presented by Beneplan & the House of VeronaCorporate Wellness - Presented by Beneplan & the House of Verona
Corporate Wellness - Presented by Beneplan & the House of Verona
 
Copia De Loba
Copia De LobaCopia De Loba
Copia De Loba
 
24015127 Consell Social De La Llengua Catalana Llengua I Joves
24015127 Consell Social De La Llengua Catalana Llengua I Joves24015127 Consell Social De La Llengua Catalana Llengua I Joves
24015127 Consell Social De La Llengua Catalana Llengua I Joves
 
David Parfect - #smib10 Presentation
David Parfect - #smib10 Presentation David Parfect - #smib10 Presentation
David Parfect - #smib10 Presentation
 
ZŠ a MŠ Nečtiny
ZŠ a MŠ NečtinyZŠ a MŠ Nečtiny
ZŠ a MŠ Nečtiny
 
myStratex Workshop Pack
myStratex Workshop PackmyStratex Workshop Pack
myStratex Workshop Pack
 
lee
leelee
lee
 
Com Ensenyar Llengua A Xinesos Lh
Com Ensenyar Llengua A Xinesos LhCom Ensenyar Llengua A Xinesos Lh
Com Ensenyar Llengua A Xinesos Lh
 
King arthur
King arthurKing arthur
King arthur
 
World AIDS Day
World AIDS DayWorld AIDS Day
World AIDS Day
 
campaña recogida de alimentos
campaña recogida de alimentoscampaña recogida de alimentos
campaña recogida de alimentos
 
Marketing Innovation In India
Marketing Innovation In IndiaMarketing Innovation In India
Marketing Innovation In India
 

Similaire à Securing Citizen Facing Applications

PTX12_Presentation_George Delikouras AIA
PTX12_Presentation_George Delikouras AIAPTX12_Presentation_George Delikouras AIA
PTX12_Presentation_George Delikouras AIAGeorge Delikouras
 
Communication Compliance in Microsoft 365
Communication Compliance in Microsoft 365Communication Compliance in Microsoft 365
Communication Compliance in Microsoft 365Joanne Klein
 
Information Security Assessment Offering
Information Security Assessment OfferingInformation Security Assessment Offering
Information Security Assessment Offeringeeaches
 
Information security[277]
Information security[277]Information security[277]
Information security[277]Timothy Warren
 
How to Secure your Fintech Solution - A Whitepaper by RapidValue
How to Secure your Fintech Solution - A Whitepaper by RapidValueHow to Secure your Fintech Solution - A Whitepaper by RapidValue
How to Secure your Fintech Solution - A Whitepaper by RapidValueRapidValue
 
Top_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptx
Top_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptxTop_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptx
Top_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptxinfosec train
 
Introduction to Information Governance and eDiscovery in the Cloud
Introduction to Information Governance and eDiscovery in the CloudIntroduction to Information Governance and eDiscovery in the Cloud
Introduction to Information Governance and eDiscovery in the CloudeDiscoveryConsultant
 
Cyber Security: User Access Pitfalls, A Case Study Approach
Cyber Security: User Access Pitfalls, A Case Study Approach Cyber Security: User Access Pitfalls, A Case Study Approach
Cyber Security: User Access Pitfalls, A Case Study Approach Aviva Spectrum™
 
19Question 1 4 4 pointsLO5 What is a packetQu.docx
19Question 1 4  4 pointsLO5 What is a packetQu.docx19Question 1 4  4 pointsLO5 What is a packetQu.docx
19Question 1 4 4 pointsLO5 What is a packetQu.docxaulasnilda
 
An apporach to AIM - A strategy proposal and recommendation - ver 0.1
An apporach to AIM - A strategy proposal and recommendation - ver 0.1An apporach to AIM - A strategy proposal and recommendation - ver 0.1
An apporach to AIM - A strategy proposal and recommendation - ver 0.1Michael Clarkson
 
Identity & Access Management - Securing Your Data in the 21st Century Enterprise
Identity & Access Management - Securing Your Data in the 21st Century EnterpriseIdentity & Access Management - Securing Your Data in the 21st Century Enterprise
Identity & Access Management - Securing Your Data in the 21st Century EnterpriseLance Peterman
 
Proactive information security michael
Proactive information security michael Proactive information security michael
Proactive information security michael Priyanka Aash
 
NH Bankers 10 08 07 Kamens
NH Bankers 10 08 07 KamensNH Bankers 10 08 07 Kamens
NH Bankers 10 08 07 Kamenskamensm02
 
Top Network Security Interview Questions That You Should Know.pptx
Top Network Security Interview Questions That You Should Know.pptxTop Network Security Interview Questions That You Should Know.pptx
Top Network Security Interview Questions That You Should Know.pptxInfosectrain3
 
M Kamens Iia Financial Services Presentation At Disney
M Kamens Iia Financial Services Presentation At DisneyM Kamens Iia Financial Services Presentation At Disney
M Kamens Iia Financial Services Presentation At Disneykamensm02
 
Security architecture rajagiri talk march 2011
Security architecture  rajagiri talk march 2011Security architecture  rajagiri talk march 2011
Security architecture rajagiri talk march 2011subramanian K
 
Why IAM is the Need of the Hour
Why IAM is the Need of the HourWhy IAM is the Need of the Hour
Why IAM is the Need of the HourTechdemocracy
 
Directions Answer each question individual and respond with full .docx
Directions Answer each question individual and respond with full .docxDirections Answer each question individual and respond with full .docx
Directions Answer each question individual and respond with full .docxmariona83
 
2010 06 gartner avoiding audit fatigue in nine steps 1d
2010 06 gartner   avoiding audit fatigue in nine steps 1d2010 06 gartner   avoiding audit fatigue in nine steps 1d
2010 06 gartner avoiding audit fatigue in nine steps 1dGene Kim
 

Similaire à Securing Citizen Facing Applications (20)

PTX12_Presentation_George Delikouras AIA
PTX12_Presentation_George Delikouras AIAPTX12_Presentation_George Delikouras AIA
PTX12_Presentation_George Delikouras AIA
 
Communication Compliance in Microsoft 365
Communication Compliance in Microsoft 365Communication Compliance in Microsoft 365
Communication Compliance in Microsoft 365
 
Information Security Assessment Offering
Information Security Assessment OfferingInformation Security Assessment Offering
Information Security Assessment Offering
 
Information security[277]
Information security[277]Information security[277]
Information security[277]
 
How to Secure your Fintech Solution - A Whitepaper by RapidValue
How to Secure your Fintech Solution - A Whitepaper by RapidValueHow to Secure your Fintech Solution - A Whitepaper by RapidValue
How to Secure your Fintech Solution - A Whitepaper by RapidValue
 
Top_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptx
Top_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptxTop_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptx
Top_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptx
 
Introduction to Information Governance and eDiscovery in the Cloud
Introduction to Information Governance and eDiscovery in the CloudIntroduction to Information Governance and eDiscovery in the Cloud
Introduction to Information Governance and eDiscovery in the Cloud
 
Cyber Security: User Access Pitfalls, A Case Study Approach
Cyber Security: User Access Pitfalls, A Case Study Approach Cyber Security: User Access Pitfalls, A Case Study Approach
Cyber Security: User Access Pitfalls, A Case Study Approach
 
19Question 1 4 4 pointsLO5 What is a packetQu.docx
19Question 1 4  4 pointsLO5 What is a packetQu.docx19Question 1 4  4 pointsLO5 What is a packetQu.docx
19Question 1 4 4 pointsLO5 What is a packetQu.docx
 
An apporach to AIM - A strategy proposal and recommendation - ver 0.1
An apporach to AIM - A strategy proposal and recommendation - ver 0.1An apporach to AIM - A strategy proposal and recommendation - ver 0.1
An apporach to AIM - A strategy proposal and recommendation - ver 0.1
 
Identity & Access Management - Securing Your Data in the 21st Century Enterprise
Identity & Access Management - Securing Your Data in the 21st Century EnterpriseIdentity & Access Management - Securing Your Data in the 21st Century Enterprise
Identity & Access Management - Securing Your Data in the 21st Century Enterprise
 
Proactive information security michael
Proactive information security michael Proactive information security michael
Proactive information security michael
 
NH Bankers 10 08 07 Kamens
NH Bankers 10 08 07 KamensNH Bankers 10 08 07 Kamens
NH Bankers 10 08 07 Kamens
 
Top Network Security Interview Questions That You Should Know.pptx
Top Network Security Interview Questions That You Should Know.pptxTop Network Security Interview Questions That You Should Know.pptx
Top Network Security Interview Questions That You Should Know.pptx
 
M Kamens Iia Financial Services Presentation At Disney
M Kamens Iia Financial Services Presentation At DisneyM Kamens Iia Financial Services Presentation At Disney
M Kamens Iia Financial Services Presentation At Disney
 
Security architecture rajagiri talk march 2011
Security architecture  rajagiri talk march 2011Security architecture  rajagiri talk march 2011
Security architecture rajagiri talk march 2011
 
Why IAM is the Need of the Hour
Why IAM is the Need of the HourWhy IAM is the Need of the Hour
Why IAM is the Need of the Hour
 
Directions Answer each question individual and respond with full .docx
Directions Answer each question individual and respond with full .docxDirections Answer each question individual and respond with full .docx
Directions Answer each question individual and respond with full .docx
 
InsiderAttack_p3.ppt
InsiderAttack_p3.pptInsiderAttack_p3.ppt
InsiderAttack_p3.ppt
 
2010 06 gartner avoiding audit fatigue in nine steps 1d
2010 06 gartner   avoiding audit fatigue in nine steps 1d2010 06 gartner   avoiding audit fatigue in nine steps 1d
2010 06 gartner avoiding audit fatigue in nine steps 1d
 

Securing Citizen Facing Applications

  • 1. Securing Citizen Facing Applications Moderated by Timothy Davis Oracle Enterprise Architect Board Member
  • 2.
  • 3. Today’s Panel Edwin Lorenzana, Enterprise Security Architect, City of Boston Hayri Tarhan, Oracle Enterprise Security Specialist Architect Timothy Davis, Oracle Enterprise Architect Board Member Jeremy Forman, Oracle Enterprise Architect CISSP Certified Professional Marc Chanliau, Director, Identity Management Development
  • 4. What are Secure Citizen Facing Applications?
  • 5.
  • 6. More breaches than ever… Data Breach Once exposed, the data is out there – the bell can’t be un-rung PUBLICLY REPORTED DATA BREACHES Total Personally Identifying Information Records Exposed (Millions) Source: DataLossDB, Ponemon Institute, 2009 Average cost of a data breach $202 per record Average total cost exceeds $6.6 million per breach 630% Increase
  • 7. More threats than ever… 70% attacks originate inside the firewall 90% attacks perpetrated by employees with privileged access
  • 8.
  • 9. Issue #1: Are the business and application owners involved in the security decision making process? Or is it the technology organization? Why? Today’s “New Normal” Users, Systems, Globalization and Compliance Forced Complexity IT Governance EMR/HIE Service Level Compliance Financial Reporting Compliance Compliance & Ethics Programs Audit Management Data Privacy Records Retention Legal Discovery CJIS Apps Server Data Warehouse Database Mainframes Mobile Devices Enterprise Applications Systems Globalization Users Legal Taxation HR Public Safety Partners Citizens Healthcare EPA Mandates MFIPPA FOIPPA FDA FISMA NIST HIPAA FDA PCI… Patriot Act SB1386
  • 10. Copyright © 2008, Oracle and/or its affiliates. All rights reserved. Monitoring and Configuration Enterprise Visibility Automated Controls Security for Applications, Middleware, Data & Infrastructure Comprehensive ‘Defense in Depth’ Approach Policy Enforcement Database & Infrastructure Middleware Applications Access to Business Services Lower Cost of User Lifecycle Data Protection and Privacy Virtualization
  • 11.
  • 12.
  • 13. Issue #2: Major issues around proofing and identifying citizens access to systems? Virtual Attribute Authority Internal Apps Virtual Attribute Authority Rules Virtual Identities Hierarchies, Mappings Directories Databases Proprietary Identity Attributes Applications
  • 14.
  • 15.
  • 16.
  • 17. Issue #4: Is a centralized or decentralized approach to authentication and authorization the more feasible approach? Identity Mgmt Future State Architecture
  • 18.
  • 19.
  • 20. A final question to our panel: Guidance to Security Architects ? Edwin Lorenzana Hayri Tarhan Jeremy Forman Timothy Davis Marc Chanliau

Notes de l'éditeur

  1. Oracle Enterprise Architecture Leader Circle Panel Facilitator Guide and Presentation Forecast for the Data Center: Clouds, but No Rain! June 2009 Copyright 2009 Oracle Corporation Slide OOW2009 Leaders Circle: Cloud Panel 03/28/10 14:15 Copyright 2009 Oracle Corporation Bring business and IT together along alignement based on business value Why is it hard? Goals of business evolved via siloes but now we want end to end business integration – not automate paying invoices but more procure to pay … much more enterprise wholistic apporaches to rationalization and productivitiy. Not just reporting but more collaborative and getting all the data EVERYWHERE and managing preformance around the Citizen and Quality of Service but some things never change like cost savings and innovation. The need of an EA is critical NOW – you can’t go forward without meeting enterprise business goals. This includes business strategies and ojbectives, how you are organizated depending if you are centeralized, hybrid approach or federated – you need a blueprint now. You have to leverage the power of standards when you set your corporate archtiectures. It is about how to guide our customers towards this journey of an EA !!!
  2. Oracle Enterprise Architecture Leader Circle Panel Facilitator Guide and Presentation Forecast for the Data Center: Clouds, but No Rain! June 2009 Copyright 2009 Oracle Corporation Slide
  3. Oracle Enterprise Architecture Leader Circle Panel Facilitator Guide and Presentation Forecast for the Data Center: Clouds, but No Rain! June 2009 Copyright 2009 Oracle Corporation Slide OOW2009 Leaders Circle: Cloud Panel 03/28/10 14:15 Copyright 2009 Oracle Corporation Bring business and IT together along alignement based on business value Why is it hard? Goals of business evolved via siloes but now we want end to end business integration – not automate paying invoices but more procure to pay … much more enterprise wholistic apporaches to rationalization and productivitiy. Not just reporting but more collaborative and getting all the data EVERYWHERE and managing preformance around the Citizen and Quality of Service but some things never change like cost savings and innovation. The need of an EA is critical NOW – you can’t go forward without meeting enterprise business goals. This includes business strategies and ojbectives, how you are organizated depending if you are centeralized, hybrid approach or federated – you need a blueprint now. You have to leverage the power of standards when you set your corporate archtiectures. It is about how to guide our customers towards this journey of an EA !!!
  4. Oracle Enterprise Architecture Leader Circle Panel Facilitator Guide and Presentation Forecast for the Data Center: Clouds, but No Rain! June 2009 Copyright 2009 Oracle Corporation Slide New industry/federal regulations every few months Enforcing compliance requires central view & management of entire infrastructure and without this, it is difficult to maintain control on an ongoing basis Policy enforcement to avoid toxic roles/approver combination Report and audit on who has access to what and compare with who should have access to what is difficult and costly across various applications & systems Reports attestation should be manageable and efficient – if no structured attestation, then it is mere rubber stamping And compliance costs can go up with processes
  5. Oracle Enterprise Architecture Leader Circle Panel Facilitator Guide and Presentation Forecast for the Data Center: Clouds, but No Rain! June 2009 Copyright 2009 Oracle Corporation Slide 03/28/10 Oracle Confidential Source: DataLossDB http://datalossdb.org Note total represents cumulative number since once exposed the data is out there – the bell can’t be unrung. http://online.wsj.com/article/SB123249174099899837.html
  6. Oracle Enterprise Architecture Leader Circle Panel Facilitator Guide and Presentation Forecast for the Data Center: Clouds, but No Rain! June 2009 Copyright 2009 Oracle Corporation Slide 03/28/10 Oracle Confidential
  7. Oracle Enterprise Architecture Leader Circle Panel Facilitator Guide and Presentation Forecast for the Data Center: Clouds, but No Rain! June 2009 Copyright 2009 Oracle Corporation Slide Key Message: Requirements for GRC increase in number and complexity Now that we have a context and definition of the big GRC picture, let’s highlight some of the main drivers in this area. In speaking with our customers, we’ve heard several main drivers or challenges that recur over and over. These drivers are consistent across profit, non-profit, or public sector organizations. The first driver is the notion that GRC is the “new normal”. It is here to stay and the bar has definitely gone up – the expectations for proper governance and oversight, the need for better risk management, and of course the demands of multiple compliance requirements. Forrester research reports that since 1981, the US federal government alone has introduced 114,00 new rules and regulations that affect business. The complexity of GRC is due to the interaction of four dimensions – mandates (or boundaries, whether externally levied or voluntarily undertaken); regions (the need to respond locally to global demands); technology (the fact that technology underpins much of modern business process and is in itself characterized by heterogeneity); and people (the different functions in an organization and the specialization that often results in silos.) <Click> When these four dimensions interact in order to meet GRC requirements, it results in a myriad of initiatives with complex accountabilities. For example, initiatives in the area of financial reporting compliance are typically handled by finance and internal audit. However, business processes rely on IT environments and business software applications, so the audit and testing to ensure the integrity of financial reporting is very much dependent on IT governance procedures around proper change management and separation of duties. While much attention has been placed on the US requirements for financial reporting compliance because of Sarbanes-Oxley, other countries such as Japan and Canada have also adopted similar regulations so global organizations will need to rationalize their efforts across regions as well. In addition, closely related requirements around Compliance and Ethics programs for example, typically falls in the jurisdiction of the legal counsel and HR managers who need to prove that policies have been effectively communicated to the workforce and to provide evidence of employee understanding. <Click> In another example, recent changes in the Federal Rules of Civil Procedure are escalating requirements to improve electronic discovery capabilities. Many firms are therefore paying closer attention to effective records management which can reduce the costs associated with electronic legal discovery by properly applying retention policies to documents. These requirements need to be balanced however with close attention to the rights of employees and customers with regards to data privacy, so again, a single mandate can result in multiple GRC initiatives that need to be addressed in a holistic fashion. GRC is here to stay, and what makes it distinct and unique is the fact that while the operational objective tied to any action is often narrowly focused (for example, “send this email to acknowledge receipt of shipment from subsidiary), the associated GRC objectives invariably address a broader range of accountabilities (provide the basis for quarterly reconciliation, ensure traceability of raw materials, apply proper retention policies for email communications). To paraphrase John Muir, one of the early modern environmentalists of the 20 th century and founder of the Sierra Club, “When we try to pick out anything by itself, we find it hitched to everything else in the Universe.” GRC processes can therefore burden managers with repeated assessments that ask the same questions for multiple GRC initiatives. Organizations that fail to take a platform approach to GRC end up with duplicate technologies and inconsistent approaches, measurement and reporting, resulting in scattered information and poor visibility.
  8. Oracle Enterprise Architecture Leader Circle Panel Facilitator Guide and Presentation Forecast for the Data Center: Clouds, but No Rain! June 2009 Copyright 2009 Oracle Corporation Slide Inside the business apps!!! Of course, the solutions we cover in this presentation are deployed as part of a wider infrastructure. This diagram shows the scope of the Oracle offerings including applications (Enterprise Resource Planning, Customer Relationship Management, Governance / Risk / Compliance, and vertical industry specific), Fusion Middleware, and database / infrastructure. As illustrated on this slide, Enterprise Security, Management, Development, and Intelligence offerings are applicable and provide important capabilities in all 3 layers of the Oracle software stack.
  9. Oracle Enterprise Architecture Leader Circle Panel Facilitator Guide and Presentation Forecast for the Data Center: Clouds, but No Rain! June 2009 Copyright 2009 Oracle Corporation Slide NIST 80018: Guide for Developing Security Plans for Information Technology Systems NIST 80027: Engineering Principles for Information Technology Security (A Baseline for Achieving Security) NIST 80030: Guide for Risk Management for Information Technology Systems 248 Oracle Enterprise Architecture Leader Circle Panel Facilitator Guide and Presentation Forecast for the Data Center: Clouds, but No Rain! June 2009 Copyright 2009 Oracle Corporation Slide
  10. Oracle Enterprise Architecture Leader Circle Panel Facilitator Guide and Presentation Forecast for the Data Center: Clouds, but No Rain! June 2009 Copyright 2009 Oracle Corporation Slide Behind the scenes, MGR was using Oracle Access Management Suite. This solution offered them two key layers of defense, over and above what a typical web access management system could provide. First, their users were trained to look for a personalized image at the login page. More than 99% of the users were able to detect that they were not logging into the real MGR site, and many sent e-mails to MGR informing them of this phishing attack. This “Secure Mutual Authentication” piece delivers a crippling blow to these and any other potential hackers. It is also worth noting that MGR could also use virtual keypads at their login page to thwart against other external attacks such as key-logging trojans, etc. The second layer of defense that Access Management Suite offers is highly advanced risk-based authorization. The system can intelligently calculate a risk score based on several factors such as the fingerprint of the device a user is logging in from, their location, time of day, and type of activity. By comparing it to “normal” behavior, the system generates a risk score, and if the score is too high, the system can prompt the user for further validation. This could range from knowledge-based validation to mobile text messaging, and even voiceprint recognition. The system can also alert system administrators immediately of highly suspect activity. What is really exciting and unique about this solution is its ability to “auto-learn” normal behavior for a user so that it can detect anomalies in real-time, thus stopping fraudulent activity in its tracks.
  11. Oracle Enterprise Architecture Leader Circle Panel Facilitator Guide and Presentation Forecast for the Data Center: Clouds, but No Rain! June 2009 Copyright 2009 Oracle Corporation Slide EA People – professional, best-in-class people who are solving the most complex EA problems in the world. They have the respect from business and IT EA Processes – standards-based methodology for EA processes including Oracle best practices EA Portfolio – of assets to help the EA.
  12. Oracle Enterprise Architecture Leader Circle Panel Facilitator Guide and Presentation Forecast for the Data Center: Clouds, but No Rain! June 2009 Copyright 2009 Oracle Corporation Slide OOW2009 Leaders Circle: Cloud Panel 03/28/10 14:15 Copyright 2009 Oracle Corporation
  13. Oracle Enterprise Architecture Leader Circle Panel Facilitator Guide and Presentation Forecast for the Data Center: Clouds, but No Rain! June 2009 Copyright 2009 Oracle Corporation Slide OOW2009 Leaders Circle: Cloud Panel 03/28/10 14:15 Copyright 2009 Oracle Corporation Bring business and IT together along alignement based on business value Why is it hard? Goals of business evolved via siloes but now we want end to end business integration – not automate paying invoices but more procure to pay … much more enterprise wholistic apporaches to rationalization and productivitiy. Not just reporting but more collaborative and getting all the data EVERYWHERE and managing preformance around the Citizen and Quality of Service but some things never change like cost savings and innovation. The need of an EA is critical NOW – you can’t go forward without meeting enterprise business goals. This includes business strategies and ojbectives, how you are organizated depending if you are centeralized, hybrid approach or federated – you need a blueprint now. You have to leverage the power of standards when you set your corporate archtiectures. It is about how to guide our customers towards this journey of an EA !!!
  14. Oracle Enterprise Architecture Leader Circle Panel Facilitator Guide and Presentation Forecast for the Data Center: Clouds, but No Rain! June 2009 Copyright 2009 Oracle Corporation Slide OOW2009 Leaders Circle: Cloud Panel 03/28/10 14:15 Copyright 2009 Oracle Corporation Bring business and IT together along alignement based on business value Why is it hard? Goals of business evolved via siloes but now we want end to end business integration – not automate paying invoices but more procure to pay … much more enterprise wholistic apporaches to rationalization and productivitiy. Not just reporting but more collaborative and getting all the data EVERYWHERE and managing preformance around the Citizen and Quality of Service but some things never change like cost savings and innovation. The need of an EA is critical NOW – you can’t go forward without meeting enterprise business goals. This includes business strategies and ojbectives, how you are organizated depending if you are centeralized, hybrid approach or federated – you need a blueprint now. You have to leverage the power of standards when you set your corporate archtiectures. It is about how to guide our customers towards this journey of an EA !!!