SlideShare une entreprise Scribd logo
1  sur  26
Télécharger pour lire hors ligne
Security Bootcamp 2012 - 28,29,30/12/2012
 Microsoft SharePoint Most Valuable
 Professional (2011,2012)
 Author, Writer, Trainer & Public Speaker
 Founder & Editor in Chief of SharePointVN
 Publisher
 Focus on Microsoft Security & Federation
 Identity, Infrastructure, Methodologies and
 Architecture.
 Data Compliance
 Understand the new Dynamic Access Control
  capabilities built into Windows Server 2012
 Demonstration
 Compliance is generally a response to governmental regulation, but
  it can also be a response to industry or internal requirements.
     The U.S. Health Insurance Portability and Accountability Act
      (HIPPA) for health providers
     Sarbanes-Oxley Act (SOX)
     The European Union Data Protection Directive
     U.S. state data breach laws




   I’m not talking about in-depth Data compliance
and privacy.
 Can you make sure that only authorized individuals can access confidential data?
 Do you have granular control over auditing access?
 How to reduce the number of security groups your organization has?
 Deal with regulatory standard?
…. There are many questions come up when it comes to data access control.




                                              Content Owner           Information
     CSO/CIO             Infrastructure
                                                                        Workder
    department              Support
                                             ““Is my important
                                                    data
  “I need to have
                                                appropriately       “I don’t know if I
     the right           “I don’t know
                                               protected and         am complying
    compliance         what data is in my
                                               compliant with            with my
  controls to keep      repositories and
                                             regulations – how        organization’s
   me out of jail”     how to control it”
                                               do I audit this”          polices”
Distributed                     Regulatory
Storage growth                Information                     compliance                     Data leakage

   45%: File based storage      Corporate information is       New and changing              246,091,423: Total
    CAGR.                         everywhere: Desktops,           regulations (SOX, HIPPA,       number of records
                                  Branch Offices, Data            GLBA…)                         containing sensitive
   MSIT cost $1.6
                                  Centers, Cloud…                                                personal information
    GB/Month for managed                                         International and local
                                                                                                 involved in security
    servers.                     MSIT 1500 file servers          regulations.
                                                                                                 breaches in the US since
                                  with 110 different groups
   >70%: of stored data is                                      More oversight and             January 2005
                                  managing them
    stale                                                         tighter enforcement.
                                                                                                $90 to $305 per record
                                 Very hard to consistently
   Cloud cost would be                                          $15M: Settlement for           (Forrester: in “Calculating
                                  manage the information.
    approximately 25 cents                                        investment bank with           the Cost of a Security
    GB/Month                                                      SEC over record                Breach”)
                                                                  retention.
Expression-based               Expression-based
Data Classification             auditing                       access conditions                 Encryption

   Classify your documents        Targeted access auditing      Flexible access control          Automatic RMS
    using resource properties       based on document              lists based on document           encryption based on
    stored in Active                classification and user        classification and                document classification.
    Directory.                      identity.                      multiple identities
                                                                   (security groups).
   Automatically classify         Centralized deployment
    documents based on              of audit policies using       Centralized access
    document content.               Global Audit Policies.         control lists using Central
                                                                   Access Policies.
Data Classification
                                 File Classification Infrastructure provides insight into your data by
                                  automating classification processes.
Data Classification              File Classification Infrastructure uses classification rules to
                                  automatically scan files and classify them according to the contents
   Classify your documents       of the file.
    using resource properties    Some examples of classification rules include:
    stored in Active
    Directory.
                                     Classify any file that contains the string “SBC12 Confidential” as
                                       having high business impact.
   Automatically classify
    documents based on               Classify any file that contains at least 10 social security
    document content.                  numbers as having personally identifiable information.
 A content classification rule that searches a set of files for the string
                                  “SBC12 Confidential”. If the string is found in a file, the Impact
Data Classification               resource property is set to High on the file.
                                 A content classification rule that searches a set of files for a regular
   Classify your documents       expression that matches a social security number at least 10 times
    using resource properties     in one file. If the pattern is found, the file is classified as having
    stored in Active
    Directory.
                                  personally identifiable information and the Personally Identifiable
                                  Information resource property is set to High.
   Automatically classify
    documents based on
    document content.
Expression-based access condition
                                   Manage fewer security groups by using conditional expressions
Expression-based
access conditions
                                                Country x 30
   Flexible access control
    lists based on document
    classification and
    multiple identities
    (security groups).                          Department x 20
   Centralized access
    control lists using Central
    Access Policies.
                                                Sensitive/Confidential documents
What is Central Access Policy?
 You can think of Central Access Policies as a safety net
  that your organization applies across its servers to
  enhance the local access policy
Expression-based access rules
                       Active Directory                                               File server
                       Domain Services


     User claims                          Device claims               Resource properties
 User.Department = Finance           Device.Department = Finance     Resource.Department = Finance
   User.Clearance = High               Device.Managed = True            Resource.Impact = High




                                          Access policy
                                   Applies to: @File.Impact = High
Allow | Read, Write | if (@User.Department == @File.Department) AND (@Device.Managed == True)
Central access policies
                     Active Directory
                     Domain Services             Corporate
High business                                    file servers
                     Organizational
impact policy        policies                                      Characteristics
                     • High business impact                        • Composed of central access rules
                     • Personally identifiable
Personally             information                                 • Applied to file servers through Group Policy
identifiable                                                         objects
information policy
                     Finance department                            • Supplement (not replace) native file and folder
                     policies                                        access control lists from New Technology File
                                                                     System (NTFS)
                     • High business impact
Finance policy       • Personally identifiable
                       information
                     • Finance
                                                 User folders




                                                 Finance folders
Central access policy workflow

Active Directory   Create claim definitions
                                                          Active Directory
                   Create file property definitions
Domain Services    Create central access policy           Domain Services
                   Send central access policies to file
Group Policy       servers
                                                          Claim definitions                  User

                   Apply access policy to the
                   shared folder                          File property definitions
File Server        Identify information                                                             Allow or
                                                                                                        deny
                                                          Audit policy
User’s computer    User tries to access information


                                                                                      File server
Central access policy examples



Organization-wide   Specific data
authorization       management




Departmental
authorization       Need-to-know
Expression-based Auditing
Expression-based
                                Limit auditing to data that meets specific
auditing                         classification criteria.
   Targeted access auditing
                                Limit auditing by action and by identity
    based on document
    classification and user
                                Add contextual information into the audit
    identity.                    events.
   Centralized deployment
    of audit policies using
    Global Audit Policies.
Security auditing

Active Directory                                      Active Directory
                   Create claim types
Domain Services    Create resource properties         Domain Services

Group Policy       Create global audit policy
                                                      Claim definitions                  User

                   Select and apply resource
                   properties to the shared           File property definitions
File Server        folders                                                                      Allow or
                                                                                                    deny
                                                      Audit policy
User’s computer    User tries to access information

                                                                                  File server
Audit policy examples


Audit everyone who does not have a high security    Audit all vendors when they try to access
clearance and who tries to access a document that   documents related to projects that they are not
has a high impact on business                       working on
Audit | Everyone | All-Access |                     Audit | Everyone | All-Access |
Resource.BusinessImpact=HBI AND                     User.EmploymentStatus=Vendor AND User.Project
User.SecurityClearance!=High                        Not_AnyOf Resource.Project.
Data Encryption Challenges
 How do I protect sensitive information after it leaves my
  protected environment?
 I cannot get the users to encrypt their sensitive data.
Classification-based encryption process

                                                             Process to encrypt a file based on
                   1
                                                             classification
                           Active Directory                       Claim definitions, file property definitions, and access
                           Domain Services                        policies are established in Active Directory Domain
                                                                  Controller.
                                                                  A user creates a file with the word “confidential” in the
  User
                                                                  text and saves it. The classification engine classifies
                    4                                             the file as high-impact according to rules configured.
         2
                                                                  On the file server, a rule automatically applies RMS
                                                                  protection to any file classified as high-impact.
                                            3                     The RMS template and encryption are applied to the
                                                RMS server        file on the file server and the file is encrypted.
                           Classification
                              engine


             File server
23
Demonstration Lab
 There are two virtual machines that are involved in the
  demonstration lab.
    AD-Srv (Active Directory Domain Controller)
    File-Srv (File Server)
 There are two security groups
    Finance
    System Integration
 There are two domain users:
    thuan@sbc12.local (Finance)
    thang@sbc12.local (System Integration)
Steps
 Create a new claim
     Department
 Create resources properties and add it to resource property list
     Finance Department
 Create a new central access rule/central policies
     Resource Finance Department Exists
     Resource Finance Department Equals Value Finance
 Publish central access policy
     Configure Group Policy and enable KDC
 Install File Server Resource Manager on File server
     Update-FSRMClassificationPropertyDefinition
 Add Central Access Policy to shared folder
 Validate
Thanks for joining with us

Contenu connexe

Tendances

2° Ciclo Microsoft Fondazione CRUI 7° Seminario: Proteggersi dai Cyber Attack...
2° Ciclo Microsoft Fondazione CRUI 7° Seminario: Proteggersi dai Cyber Attack...2° Ciclo Microsoft Fondazione CRUI 7° Seminario: Proteggersi dai Cyber Attack...
2° Ciclo Microsoft Fondazione CRUI 7° Seminario: Proteggersi dai Cyber Attack...Jürgen Ambrosi
 
13 Tips for Cloud Security
13 Tips for Cloud Security13 Tips for Cloud Security
13 Tips for Cloud SecurityPeak 10
 
How to Recover from a Ransomware Disaster
How to Recover from a Ransomware DisasterHow to Recover from a Ransomware Disaster
How to Recover from a Ransomware DisasterSpanning Cloud Apps
 
Current trends in information security โดย ผศ.ดร.ปราโมทย์ กั่วเจริญ
Current trends in information security โดย ผศ.ดร.ปราโมทย์ กั่วเจริญCurrent trends in information security โดย ผศ.ดร.ปราโมทย์ กั่วเจริญ
Current trends in information security โดย ผศ.ดร.ปราโมทย์ กั่วเจริญBAINIDA
 
The Cost of Doing Nothing: A Ransomware Backup Story
The Cost of Doing Nothing: A Ransomware Backup StoryThe Cost of Doing Nothing: A Ransomware Backup Story
The Cost of Doing Nothing: A Ransomware Backup StoryQuest
 
Recover your files from Ransomware - Ransomware Incident Response by Tictac
Recover your files from Ransomware - Ransomware Incident Response by TictacRecover your files from Ransomware - Ransomware Incident Response by Tictac
Recover your files from Ransomware - Ransomware Incident Response by TictacTicTac Data Recovery
 
Webinar: Backup vs. Ransomware - 5 Requirements for Backup Success
Webinar: Backup vs. Ransomware - 5 Requirements for Backup SuccessWebinar: Backup vs. Ransomware - 5 Requirements for Backup Success
Webinar: Backup vs. Ransomware - 5 Requirements for Backup SuccessStorage Switzerland
 
Custom defense - Blake final
Custom defense  - Blake finalCustom defense  - Blake final
Custom defense - Blake finalMinh Le
 
Fluency - Next Generation Incident Response Utilizing Big Data Analytics Over...
Fluency - Next Generation Incident Response Utilizing Big Data Analytics Over...Fluency - Next Generation Incident Response Utilizing Big Data Analytics Over...
Fluency - Next Generation Incident Response Utilizing Big Data Analytics Over...Collin Miles
 
Big Data Security Analytics (BDSA) with Randy Franklin
Big Data Security Analytics (BDSA) with Randy FranklinBig Data Security Analytics (BDSA) with Randy Franklin
Big Data Security Analytics (BDSA) with Randy FranklinSridhar Karnam
 
Addressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to Success
Addressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to SuccessAddressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to Success
Addressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to SuccessSirius
 
Identity-Driven Security with Forsyte I.T. Solutions - Demos and Discovery
Identity-Driven Security with Forsyte I.T. Solutions - Demos and DiscoveryIdentity-Driven Security with Forsyte I.T. Solutions - Demos and Discovery
Identity-Driven Security with Forsyte I.T. Solutions - Demos and DiscoveryForsyte I.T. Solutions
 
Audit logs for Security and Compliance
Audit logs for Security and ComplianceAudit logs for Security and Compliance
Audit logs for Security and ComplianceAnton Chuvakin
 
TIC-TOC: Ransomware: Help your Customers be Prepared with Dominique Singer an...
TIC-TOC: Ransomware: Help your Customers be Prepared with Dominique Singer an...TIC-TOC: Ransomware: Help your Customers be Prepared with Dominique Singer an...
TIC-TOC: Ransomware: Help your Customers be Prepared with Dominique Singer an...SaraPia5
 
Data mining in Cyber security
Data mining in Cyber securityData mining in Cyber security
Data mining in Cyber securityPsychoCryGaming
 
User Behavior Analytics And The Benefits To Companies
User Behavior Analytics And The Benefits To CompaniesUser Behavior Analytics And The Benefits To Companies
User Behavior Analytics And The Benefits To CompaniesSpectorsoft
 
Five SIEM Futures (2012)
Five SIEM Futures (2012)Five SIEM Futures (2012)
Five SIEM Futures (2012)Anton Chuvakin
 
Edgescan 2021 Vulnerability Stats Report
Edgescan 2021 Vulnerability Stats ReportEdgescan 2021 Vulnerability Stats Report
Edgescan 2021 Vulnerability Stats ReportEoin Keary
 

Tendances (19)

2° Ciclo Microsoft Fondazione CRUI 7° Seminario: Proteggersi dai Cyber Attack...
2° Ciclo Microsoft Fondazione CRUI 7° Seminario: Proteggersi dai Cyber Attack...2° Ciclo Microsoft Fondazione CRUI 7° Seminario: Proteggersi dai Cyber Attack...
2° Ciclo Microsoft Fondazione CRUI 7° Seminario: Proteggersi dai Cyber Attack...
 
13 Tips for Cloud Security
13 Tips for Cloud Security13 Tips for Cloud Security
13 Tips for Cloud Security
 
How to Recover from a Ransomware Disaster
How to Recover from a Ransomware DisasterHow to Recover from a Ransomware Disaster
How to Recover from a Ransomware Disaster
 
Cobit 2
Cobit 2Cobit 2
Cobit 2
 
Current trends in information security โดย ผศ.ดร.ปราโมทย์ กั่วเจริญ
Current trends in information security โดย ผศ.ดร.ปราโมทย์ กั่วเจริญCurrent trends in information security โดย ผศ.ดร.ปราโมทย์ กั่วเจริญ
Current trends in information security โดย ผศ.ดร.ปราโมทย์ กั่วเจริญ
 
The Cost of Doing Nothing: A Ransomware Backup Story
The Cost of Doing Nothing: A Ransomware Backup StoryThe Cost of Doing Nothing: A Ransomware Backup Story
The Cost of Doing Nothing: A Ransomware Backup Story
 
Recover your files from Ransomware - Ransomware Incident Response by Tictac
Recover your files from Ransomware - Ransomware Incident Response by TictacRecover your files from Ransomware - Ransomware Incident Response by Tictac
Recover your files from Ransomware - Ransomware Incident Response by Tictac
 
Webinar: Backup vs. Ransomware - 5 Requirements for Backup Success
Webinar: Backup vs. Ransomware - 5 Requirements for Backup SuccessWebinar: Backup vs. Ransomware - 5 Requirements for Backup Success
Webinar: Backup vs. Ransomware - 5 Requirements for Backup Success
 
Custom defense - Blake final
Custom defense  - Blake finalCustom defense  - Blake final
Custom defense - Blake final
 
Fluency - Next Generation Incident Response Utilizing Big Data Analytics Over...
Fluency - Next Generation Incident Response Utilizing Big Data Analytics Over...Fluency - Next Generation Incident Response Utilizing Big Data Analytics Over...
Fluency - Next Generation Incident Response Utilizing Big Data Analytics Over...
 
Big Data Security Analytics (BDSA) with Randy Franklin
Big Data Security Analytics (BDSA) with Randy FranklinBig Data Security Analytics (BDSA) with Randy Franklin
Big Data Security Analytics (BDSA) with Randy Franklin
 
Addressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to Success
Addressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to SuccessAddressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to Success
Addressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to Success
 
Identity-Driven Security with Forsyte I.T. Solutions - Demos and Discovery
Identity-Driven Security with Forsyte I.T. Solutions - Demos and DiscoveryIdentity-Driven Security with Forsyte I.T. Solutions - Demos and Discovery
Identity-Driven Security with Forsyte I.T. Solutions - Demos and Discovery
 
Audit logs for Security and Compliance
Audit logs for Security and ComplianceAudit logs for Security and Compliance
Audit logs for Security and Compliance
 
TIC-TOC: Ransomware: Help your Customers be Prepared with Dominique Singer an...
TIC-TOC: Ransomware: Help your Customers be Prepared with Dominique Singer an...TIC-TOC: Ransomware: Help your Customers be Prepared with Dominique Singer an...
TIC-TOC: Ransomware: Help your Customers be Prepared with Dominique Singer an...
 
Data mining in Cyber security
Data mining in Cyber securityData mining in Cyber security
Data mining in Cyber security
 
User Behavior Analytics And The Benefits To Companies
User Behavior Analytics And The Benefits To CompaniesUser Behavior Analytics And The Benefits To Companies
User Behavior Analytics And The Benefits To Companies
 
Five SIEM Futures (2012)
Five SIEM Futures (2012)Five SIEM Futures (2012)
Five SIEM Futures (2012)
 
Edgescan 2021 Vulnerability Stats Report
Edgescan 2021 Vulnerability Stats ReportEdgescan 2021 Vulnerability Stats Report
Edgescan 2021 Vulnerability Stats Report
 

En vedette

SBC 2012 - Windows Security (Lương Trung Thành)
SBC 2012 - Windows Security (Lương Trung Thành)SBC 2012 - Windows Security (Lương Trung Thành)
SBC 2012 - Windows Security (Lương Trung Thành)Security Bootcamp
 
SBC 2012 - Information Gathering (Lương Trung Thành)
SBC 2012 - Information Gathering (Lương Trung Thành)SBC 2012 - Information Gathering (Lương Trung Thành)
SBC 2012 - Information Gathering (Lương Trung Thành)Security Bootcamp
 
SBC 2012 - Tổng quan về bảo mật trong Cloud (Lê Vĩnh Đạt)
SBC 2012 - Tổng quan về bảo mật trong Cloud (Lê Vĩnh Đạt)SBC 2012 - Tổng quan về bảo mật trong Cloud (Lê Vĩnh Đạt)
SBC 2012 - Tổng quan về bảo mật trong Cloud (Lê Vĩnh Đạt)Security Bootcamp
 
SBC 2012 - Software Exploitation (Nguyễn Chấn Việt)
SBC 2012 - Software Exploitation (Nguyễn Chấn Việt)SBC 2012 - Software Exploitation (Nguyễn Chấn Việt)
SBC 2012 - Software Exploitation (Nguyễn Chấn Việt)Security Bootcamp
 
SBC 2012 - Penetration Testting với Backtrack 5 (Nguyễn Phương Trường Anh + N...
SBC 2012 - Penetration Testting với Backtrack 5 (Nguyễn Phương Trường Anh + N...SBC 2012 - Penetration Testting với Backtrack 5 (Nguyễn Phương Trường Anh + N...
SBC 2012 - Penetration Testting với Backtrack 5 (Nguyễn Phương Trường Anh + N...Security Bootcamp
 
SBC 2012 - SSL/TLS Attacks & Defenses (Lê Quốc Nhật Đông)
SBC 2012 - SSL/TLS Attacks & Defenses (Lê Quốc Nhật Đông)SBC 2012 - SSL/TLS Attacks & Defenses (Lê Quốc Nhật Đông)
SBC 2012 - SSL/TLS Attacks & Defenses (Lê Quốc Nhật Đông)Security Bootcamp
 
SBC 2012 - Lỗ hổng trong cài đặt giao thức OAuth và nguy cơ với người dùng (N...
SBC 2012 - Lỗ hổng trong cài đặt giao thức OAuth và nguy cơ với người dùng (N...SBC 2012 - Lỗ hổng trong cài đặt giao thức OAuth và nguy cơ với người dùng (N...
SBC 2012 - Lỗ hổng trong cài đặt giao thức OAuth và nguy cơ với người dùng (N...Security Bootcamp
 
SBC 2012 - Xây dựng cộng đồng an ninh không gian mạng (Lê Trung Nghĩa)
SBC 2012 - Xây dựng cộng đồng an ninh không gian mạng (Lê Trung Nghĩa)SBC 2012 - Xây dựng cộng đồng an ninh không gian mạng (Lê Trung Nghĩa)
SBC 2012 - Xây dựng cộng đồng an ninh không gian mạng (Lê Trung Nghĩa)Security Bootcamp
 
SBC 2012 - Linux Hardening (Mẫn Thắng)
SBC 2012 - Linux Hardening (Mẫn Thắng)SBC 2012 - Linux Hardening (Mẫn Thắng)
SBC 2012 - Linux Hardening (Mẫn Thắng)Security Bootcamp
 
Security Bootcamp 2012 - Bảo vệ Web App với Mod Security (Sử Hoàng Sơn)
Security Bootcamp 2012 - Bảo vệ Web App với Mod Security (Sử Hoàng Sơn)Security Bootcamp 2012 - Bảo vệ Web App với Mod Security (Sử Hoàng Sơn)
Security Bootcamp 2012 - Bảo vệ Web App với Mod Security (Sử Hoàng Sơn)Security Bootcamp
 
SBC 2012 - Phát hiện tấn công DDoS sử dụng mạng Neural (Trần Nguyên Ngọc)
SBC 2012 - Phát hiện tấn công DDoS sử dụng mạng Neural (Trần Nguyên Ngọc)SBC 2012 - Phát hiện tấn công DDoS sử dụng mạng Neural (Trần Nguyên Ngọc)
SBC 2012 - Phát hiện tấn công DDoS sử dụng mạng Neural (Trần Nguyên Ngọc)Security Bootcamp
 
SBC 2012 - Database Security (Nguyễn Thanh Tùng)
SBC 2012 - Database Security (Nguyễn Thanh Tùng)SBC 2012 - Database Security (Nguyễn Thanh Tùng)
SBC 2012 - Database Security (Nguyễn Thanh Tùng)Security Bootcamp
 
SBC 2012 - Malware Memory Forensics (Nguyễn Chấn Việt)
SBC 2012 - Malware Memory Forensics (Nguyễn Chấn Việt)SBC 2012 - Malware Memory Forensics (Nguyễn Chấn Việt)
SBC 2012 - Malware Memory Forensics (Nguyễn Chấn Việt)Security Bootcamp
 

En vedette (13)

SBC 2012 - Windows Security (Lương Trung Thành)
SBC 2012 - Windows Security (Lương Trung Thành)SBC 2012 - Windows Security (Lương Trung Thành)
SBC 2012 - Windows Security (Lương Trung Thành)
 
SBC 2012 - Information Gathering (Lương Trung Thành)
SBC 2012 - Information Gathering (Lương Trung Thành)SBC 2012 - Information Gathering (Lương Trung Thành)
SBC 2012 - Information Gathering (Lương Trung Thành)
 
SBC 2012 - Tổng quan về bảo mật trong Cloud (Lê Vĩnh Đạt)
SBC 2012 - Tổng quan về bảo mật trong Cloud (Lê Vĩnh Đạt)SBC 2012 - Tổng quan về bảo mật trong Cloud (Lê Vĩnh Đạt)
SBC 2012 - Tổng quan về bảo mật trong Cloud (Lê Vĩnh Đạt)
 
SBC 2012 - Software Exploitation (Nguyễn Chấn Việt)
SBC 2012 - Software Exploitation (Nguyễn Chấn Việt)SBC 2012 - Software Exploitation (Nguyễn Chấn Việt)
SBC 2012 - Software Exploitation (Nguyễn Chấn Việt)
 
SBC 2012 - Penetration Testting với Backtrack 5 (Nguyễn Phương Trường Anh + N...
SBC 2012 - Penetration Testting với Backtrack 5 (Nguyễn Phương Trường Anh + N...SBC 2012 - Penetration Testting với Backtrack 5 (Nguyễn Phương Trường Anh + N...
SBC 2012 - Penetration Testting với Backtrack 5 (Nguyễn Phương Trường Anh + N...
 
SBC 2012 - SSL/TLS Attacks & Defenses (Lê Quốc Nhật Đông)
SBC 2012 - SSL/TLS Attacks & Defenses (Lê Quốc Nhật Đông)SBC 2012 - SSL/TLS Attacks & Defenses (Lê Quốc Nhật Đông)
SBC 2012 - SSL/TLS Attacks & Defenses (Lê Quốc Nhật Đông)
 
SBC 2012 - Lỗ hổng trong cài đặt giao thức OAuth và nguy cơ với người dùng (N...
SBC 2012 - Lỗ hổng trong cài đặt giao thức OAuth và nguy cơ với người dùng (N...SBC 2012 - Lỗ hổng trong cài đặt giao thức OAuth và nguy cơ với người dùng (N...
SBC 2012 - Lỗ hổng trong cài đặt giao thức OAuth và nguy cơ với người dùng (N...
 
SBC 2012 - Xây dựng cộng đồng an ninh không gian mạng (Lê Trung Nghĩa)
SBC 2012 - Xây dựng cộng đồng an ninh không gian mạng (Lê Trung Nghĩa)SBC 2012 - Xây dựng cộng đồng an ninh không gian mạng (Lê Trung Nghĩa)
SBC 2012 - Xây dựng cộng đồng an ninh không gian mạng (Lê Trung Nghĩa)
 
SBC 2012 - Linux Hardening (Mẫn Thắng)
SBC 2012 - Linux Hardening (Mẫn Thắng)SBC 2012 - Linux Hardening (Mẫn Thắng)
SBC 2012 - Linux Hardening (Mẫn Thắng)
 
Security Bootcamp 2012 - Bảo vệ Web App với Mod Security (Sử Hoàng Sơn)
Security Bootcamp 2012 - Bảo vệ Web App với Mod Security (Sử Hoàng Sơn)Security Bootcamp 2012 - Bảo vệ Web App với Mod Security (Sử Hoàng Sơn)
Security Bootcamp 2012 - Bảo vệ Web App với Mod Security (Sử Hoàng Sơn)
 
SBC 2012 - Phát hiện tấn công DDoS sử dụng mạng Neural (Trần Nguyên Ngọc)
SBC 2012 - Phát hiện tấn công DDoS sử dụng mạng Neural (Trần Nguyên Ngọc)SBC 2012 - Phát hiện tấn công DDoS sử dụng mạng Neural (Trần Nguyên Ngọc)
SBC 2012 - Phát hiện tấn công DDoS sử dụng mạng Neural (Trần Nguyên Ngọc)
 
SBC 2012 - Database Security (Nguyễn Thanh Tùng)
SBC 2012 - Database Security (Nguyễn Thanh Tùng)SBC 2012 - Database Security (Nguyễn Thanh Tùng)
SBC 2012 - Database Security (Nguyễn Thanh Tùng)
 
SBC 2012 - Malware Memory Forensics (Nguyễn Chấn Việt)
SBC 2012 - Malware Memory Forensics (Nguyễn Chấn Việt)SBC 2012 - Malware Memory Forensics (Nguyễn Chấn Việt)
SBC 2012 - Malware Memory Forensics (Nguyễn Chấn Việt)
 

Similaire à SBC 2012 - Dynamic Access Control in Windows Server 2012 (Nguyễn Ngọc Thuận)

Dynamic access control sbc12 - thuan nguyen
Dynamic access control sbc12 - thuan nguyenDynamic access control sbc12 - thuan nguyen
Dynamic access control sbc12 - thuan nguyenThuan Ng
 
Self-Protecting Information for De-Perimiterised Electronic Relationships
Self-Protecting Information for De-Perimiterised Electronic RelationshipsSelf-Protecting Information for De-Perimiterised Electronic Relationships
Self-Protecting Information for De-Perimiterised Electronic RelationshipsJeremy Hilton
 
Taxonomy Management, Automatic Metadata Tagging & Auto Classification in Shar...
Taxonomy Management, Automatic Metadata Tagging & Auto Classification in Shar...Taxonomy Management, Automatic Metadata Tagging & Auto Classification in Shar...
Taxonomy Management, Automatic Metadata Tagging & Auto Classification in Shar...William LaPorte
 
Integrating Information Protection Into Data Architecture & SDLC
Integrating Information Protection Into Data Architecture & SDLCIntegrating Information Protection Into Data Architecture & SDLC
Integrating Information Protection Into Data Architecture & SDLCDATAVERSITY
 
Info Security: Microsoft Dynamic Access Control
Info Security: Microsoft Dynamic Access Control Info Security: Microsoft Dynamic Access Control
Info Security: Microsoft Dynamic Access Control McOWLMarketing
 
dlp-sales-play-sales-customer-deck-2022.pptx
dlp-sales-play-sales-customer-deck-2022.pptxdlp-sales-play-sales-customer-deck-2022.pptx
dlp-sales-play-sales-customer-deck-2022.pptxalex hincapie
 
History Of Database Technology
History Of Database TechnologyHistory Of Database Technology
History Of Database TechnologyJacqueline Thomas
 
ConceptClassifier for SharePoint Turbo Charging the Public Sector
ConceptClassifier for SharePoint Turbo Charging the Public SectorConceptClassifier for SharePoint Turbo Charging the Public Sector
ConceptClassifier for SharePoint Turbo Charging the Public Sectormartingarland
 
Life & Work Online Protecting Your Identity
Life & Work Online Protecting Your IdentityLife & Work Online Protecting Your Identity
Life & Work Online Protecting Your IdentityInnoTech
 
Keynote Theatre. Keynote Day 2. 16:30 Evelyn de Souza
Keynote Theatre. Keynote Day 2. 16:30   Evelyn de Souza Keynote Theatre. Keynote Day 2. 16:30   Evelyn de Souza
Keynote Theatre. Keynote Day 2. 16:30 Evelyn de Souza CloudExpoAsia
 
data resource management
 data resource management data resource management
data resource managementsoodsurbhi123
 
Introduction-to-Databases.pptx
Introduction-to-Databases.pptxIntroduction-to-Databases.pptx
Introduction-to-Databases.pptxIvanDarrylLopez
 
M365 Records Management Community Webinar
M365 Records Management Community WebinarM365 Records Management Community Webinar
M365 Records Management Community WebinarDrew Madelung
 
Using Microsoft Dynamic Access Control to create Information Barriers for SEC...
Using Microsoft Dynamic Access Control to create Information Barriers for SEC...Using Microsoft Dynamic Access Control to create Information Barriers for SEC...
Using Microsoft Dynamic Access Control to create Information Barriers for SEC...NextLabs, Inc.
 

Similaire à SBC 2012 - Dynamic Access Control in Windows Server 2012 (Nguyễn Ngọc Thuận) (20)

Dynamic access control sbc12 - thuan nguyen
Dynamic access control sbc12 - thuan nguyenDynamic access control sbc12 - thuan nguyen
Dynamic access control sbc12 - thuan nguyen
 
Self-Protecting Information for De-Perimiterised Electronic Relationships
Self-Protecting Information for De-Perimiterised Electronic RelationshipsSelf-Protecting Information for De-Perimiterised Electronic Relationships
Self-Protecting Information for De-Perimiterised Electronic Relationships
 
Taxonomy Management, Automatic Metadata Tagging & Auto Classification in Shar...
Taxonomy Management, Automatic Metadata Tagging & Auto Classification in Shar...Taxonomy Management, Automatic Metadata Tagging & Auto Classification in Shar...
Taxonomy Management, Automatic Metadata Tagging & Auto Classification in Shar...
 
Integrating Information Protection Into Data Architecture & SDLC
Integrating Information Protection Into Data Architecture & SDLCIntegrating Information Protection Into Data Architecture & SDLC
Integrating Information Protection Into Data Architecture & SDLC
 
Info Security: Microsoft Dynamic Access Control
Info Security: Microsoft Dynamic Access Control Info Security: Microsoft Dynamic Access Control
Info Security: Microsoft Dynamic Access Control
 
test
testtest
test
 
A1802030104
A1802030104A1802030104
A1802030104
 
dlp-sales-play-sales-customer-deck-2022.pptx
dlp-sales-play-sales-customer-deck-2022.pptxdlp-sales-play-sales-customer-deck-2022.pptx
dlp-sales-play-sales-customer-deck-2022.pptx
 
SunGard Data Profiling
SunGard Data ProfilingSunGard Data Profiling
SunGard Data Profiling
 
History Of Database Technology
History Of Database TechnologyHistory Of Database Technology
History Of Database Technology
 
ConceptClassifier for SharePoint Turbo Charging the Public Sector
ConceptClassifier for SharePoint Turbo Charging the Public SectorConceptClassifier for SharePoint Turbo Charging the Public Sector
ConceptClassifier for SharePoint Turbo Charging the Public Sector
 
Data mining
Data miningData mining
Data mining
 
Life & Work Online Protecting Your Identity
Life & Work Online Protecting Your IdentityLife & Work Online Protecting Your Identity
Life & Work Online Protecting Your Identity
 
Keynote Theatre. Keynote Day 2. 16:30 Evelyn de Souza
Keynote Theatre. Keynote Day 2. 16:30   Evelyn de Souza Keynote Theatre. Keynote Day 2. 16:30   Evelyn de Souza
Keynote Theatre. Keynote Day 2. 16:30 Evelyn de Souza
 
data resource management
 data resource management data resource management
data resource management
 
2ndlec.database
2ndlec.database2ndlec.database
2ndlec.database
 
Biznet Gio Presentation - Database Security
Biznet Gio Presentation - Database SecurityBiznet Gio Presentation - Database Security
Biznet Gio Presentation - Database Security
 
Introduction-to-Databases.pptx
Introduction-to-Databases.pptxIntroduction-to-Databases.pptx
Introduction-to-Databases.pptx
 
M365 Records Management Community Webinar
M365 Records Management Community WebinarM365 Records Management Community Webinar
M365 Records Management Community Webinar
 
Using Microsoft Dynamic Access Control to create Information Barriers for SEC...
Using Microsoft Dynamic Access Control to create Information Barriers for SEC...Using Microsoft Dynamic Access Control to create Information Barriers for SEC...
Using Microsoft Dynamic Access Control to create Information Barriers for SEC...
 

Plus de Security Bootcamp

Ransomware is Knocking your Door_Final.pdf
Ransomware is Knocking your Door_Final.pdfRansomware is Knocking your Door_Final.pdf
Ransomware is Knocking your Door_Final.pdfSecurity Bootcamp
 
Hieupc-The role of psychology in enhancing cybersecurity
Hieupc-The role of psychology in enhancing cybersecurityHieupc-The role of psychology in enhancing cybersecurity
Hieupc-The role of psychology in enhancing cybersecuritySecurity Bootcamp
 
Nguyen Huu Trung - Building a web vulnerability scanner - From a hacker’s view
Nguyen Huu Trung - Building a web vulnerability scanner - From a hacker’s viewNguyen Huu Trung - Building a web vulnerability scanner - From a hacker’s view
Nguyen Huu Trung - Building a web vulnerability scanner - From a hacker’s viewSecurity Bootcamp
 
Sbc 2020 bao gio vn co anm dua vao cong nghe mo
Sbc 2020 bao gio vn co anm dua vao cong nghe moSbc 2020 bao gio vn co anm dua vao cong nghe mo
Sbc 2020 bao gio vn co anm dua vao cong nghe moSecurity Bootcamp
 
Giam sat thu dong thong tin an toan hang hai su dung sdr
Giam sat thu dong thong tin an toan hang hai su dung sdrGiam sat thu dong thong tin an toan hang hai su dung sdr
Giam sat thu dong thong tin an toan hang hai su dung sdrSecurity Bootcamp
 
Insider threat-what-us-do d-want
Insider threat-what-us-do d-wantInsider threat-what-us-do d-want
Insider threat-what-us-do d-wantSecurity Bootcamp
 
Macro malware common techniques - public
Macro malware   common techniques - publicMacro malware   common techniques - public
Macro malware common techniques - publicSecurity Bootcamp
 
Malware detection-using-machine-learning
Malware detection-using-machine-learningMalware detection-using-machine-learning
Malware detection-using-machine-learningSecurity Bootcamp
 
Tim dieu moi trong nhung dieu cu
Tim dieu moi trong nhung dieu cuTim dieu moi trong nhung dieu cu
Tim dieu moi trong nhung dieu cuSecurity Bootcamp
 
Threat detection with 0 cost
Threat detection with 0 costThreat detection with 0 cost
Threat detection with 0 costSecurity Bootcamp
 
GOLDEN TICKET - Hiểm hoa tiềm ẩn trong hệ thống Active Directory
GOLDEN TICKET -  Hiểm hoa tiềm ẩn trong hệ thống Active DirectoryGOLDEN TICKET -  Hiểm hoa tiềm ẩn trong hệ thống Active Directory
GOLDEN TICKET - Hiểm hoa tiềm ẩn trong hệ thống Active DirectorySecurity Bootcamp
 
PHÂN TÍCH MỘT SỐ CUỘC TẤN CÔNG APT ĐIỂN HÌNH NHẮM VÀO VIỆT NAM 2017-2018
PHÂN TÍCH MỘT SỐ CUỘC TẤN CÔNG APT ĐIỂN HÌNH NHẮM VÀO VIỆT NAM 2017-2018PHÂN TÍCH MỘT SỐ CUỘC TẤN CÔNG APT ĐIỂN HÌNH NHẮM VÀO VIỆT NAM 2017-2018
PHÂN TÍCH MỘT SỐ CUỘC TẤN CÔNG APT ĐIỂN HÌNH NHẮM VÀO VIỆT NAM 2017-2018Security Bootcamp
 
Lannguyen-Detecting Cyber Attacks
Lannguyen-Detecting Cyber AttacksLannguyen-Detecting Cyber Attacks
Lannguyen-Detecting Cyber AttacksSecurity Bootcamp
 
Letrungnghia-gopyluananm2018
Letrungnghia-gopyluananm2018Letrungnghia-gopyluananm2018
Letrungnghia-gopyluananm2018Security Bootcamp
 

Plus de Security Bootcamp (20)

Ransomware is Knocking your Door_Final.pdf
Ransomware is Knocking your Door_Final.pdfRansomware is Knocking your Door_Final.pdf
Ransomware is Knocking your Door_Final.pdf
 
Hieupc-The role of psychology in enhancing cybersecurity
Hieupc-The role of psychology in enhancing cybersecurityHieupc-The role of psychology in enhancing cybersecurity
Hieupc-The role of psychology in enhancing cybersecurity
 
Nguyen Huu Trung - Building a web vulnerability scanner - From a hacker’s view
Nguyen Huu Trung - Building a web vulnerability scanner - From a hacker’s viewNguyen Huu Trung - Building a web vulnerability scanner - From a hacker’s view
Nguyen Huu Trung - Building a web vulnerability scanner - From a hacker’s view
 
Sbc 2020 bao gio vn co anm dua vao cong nghe mo
Sbc 2020 bao gio vn co anm dua vao cong nghe moSbc 2020 bao gio vn co anm dua vao cong nghe mo
Sbc 2020 bao gio vn co anm dua vao cong nghe mo
 
Deception change-the-game
Deception change-the-gameDeception change-the-game
Deception change-the-game
 
Giam sat thu dong thong tin an toan hang hai su dung sdr
Giam sat thu dong thong tin an toan hang hai su dung sdrGiam sat thu dong thong tin an toan hang hai su dung sdr
Giam sat thu dong thong tin an toan hang hai su dung sdr
 
Sbc2019 luong-cyber startup
Sbc2019 luong-cyber startupSbc2019 luong-cyber startup
Sbc2019 luong-cyber startup
 
Insider threat-what-us-do d-want
Insider threat-what-us-do d-wantInsider threat-what-us-do d-want
Insider threat-what-us-do d-want
 
Macro malware common techniques - public
Macro malware   common techniques - publicMacro malware   common techniques - public
Macro malware common techniques - public
 
Malware detection-using-machine-learning
Malware detection-using-machine-learningMalware detection-using-machine-learning
Malware detection-using-machine-learning
 
Tim dieu moi trong nhung dieu cu
Tim dieu moi trong nhung dieu cuTim dieu moi trong nhung dieu cu
Tim dieu moi trong nhung dieu cu
 
Threat detection with 0 cost
Threat detection with 0 costThreat detection with 0 cost
Threat detection with 0 cost
 
Build SOC
Build SOC Build SOC
Build SOC
 
AD red vs blue
AD red vs blueAD red vs blue
AD red vs blue
 
Securitybox
SecurityboxSecuritybox
Securitybox
 
GOLDEN TICKET - Hiểm hoa tiềm ẩn trong hệ thống Active Directory
GOLDEN TICKET -  Hiểm hoa tiềm ẩn trong hệ thống Active DirectoryGOLDEN TICKET -  Hiểm hoa tiềm ẩn trong hệ thống Active Directory
GOLDEN TICKET - Hiểm hoa tiềm ẩn trong hệ thống Active Directory
 
PHÂN TÍCH MỘT SỐ CUỘC TẤN CÔNG APT ĐIỂN HÌNH NHẮM VÀO VIỆT NAM 2017-2018
PHÂN TÍCH MỘT SỐ CUỘC TẤN CÔNG APT ĐIỂN HÌNH NHẮM VÀO VIỆT NAM 2017-2018PHÂN TÍCH MỘT SỐ CUỘC TẤN CÔNG APT ĐIỂN HÌNH NHẮM VÀO VIỆT NAM 2017-2018
PHÂN TÍCH MỘT SỐ CUỘC TẤN CÔNG APT ĐIỂN HÌNH NHẮM VÀO VIỆT NAM 2017-2018
 
Api security-present
Api security-presentApi security-present
Api security-present
 
Lannguyen-Detecting Cyber Attacks
Lannguyen-Detecting Cyber AttacksLannguyen-Detecting Cyber Attacks
Lannguyen-Detecting Cyber Attacks
 
Letrungnghia-gopyluananm2018
Letrungnghia-gopyluananm2018Letrungnghia-gopyluananm2018
Letrungnghia-gopyluananm2018
 

Dernier

Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 

Dernier (20)

Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 

SBC 2012 - Dynamic Access Control in Windows Server 2012 (Nguyễn Ngọc Thuận)

  • 1. Security Bootcamp 2012 - 28,29,30/12/2012
  • 2.  Microsoft SharePoint Most Valuable Professional (2011,2012)  Author, Writer, Trainer & Public Speaker  Founder & Editor in Chief of SharePointVN Publisher  Focus on Microsoft Security & Federation Identity, Infrastructure, Methodologies and Architecture.
  • 3.  Data Compliance  Understand the new Dynamic Access Control capabilities built into Windows Server 2012  Demonstration
  • 4.  Compliance is generally a response to governmental regulation, but it can also be a response to industry or internal requirements.  The U.S. Health Insurance Portability and Accountability Act (HIPPA) for health providers  Sarbanes-Oxley Act (SOX)  The European Union Data Protection Directive  U.S. state data breach laws I’m not talking about in-depth Data compliance and privacy.
  • 5.  Can you make sure that only authorized individuals can access confidential data?  Do you have granular control over auditing access?  How to reduce the number of security groups your organization has?  Deal with regulatory standard? …. There are many questions come up when it comes to data access control. Content Owner Information CSO/CIO Infrastructure Workder department Support ““Is my important data “I need to have appropriately “I don’t know if I the right “I don’t know protected and am complying compliance what data is in my compliant with with my controls to keep repositories and regulations – how organization’s me out of jail” how to control it” do I audit this” polices”
  • 6. Distributed Regulatory Storage growth Information compliance Data leakage  45%: File based storage  Corporate information is  New and changing  246,091,423: Total CAGR. everywhere: Desktops, regulations (SOX, HIPPA, number of records Branch Offices, Data GLBA…) containing sensitive  MSIT cost $1.6 Centers, Cloud… personal information GB/Month for managed  International and local involved in security servers.  MSIT 1500 file servers regulations. breaches in the US since with 110 different groups  >70%: of stored data is  More oversight and January 2005 managing them stale tighter enforcement.  $90 to $305 per record  Very hard to consistently  Cloud cost would be  $15M: Settlement for (Forrester: in “Calculating manage the information. approximately 25 cents investment bank with the Cost of a Security GB/Month SEC over record Breach”) retention.
  • 7. Expression-based Expression-based Data Classification auditing access conditions Encryption  Classify your documents  Targeted access auditing  Flexible access control  Automatic RMS using resource properties based on document lists based on document encryption based on stored in Active classification and user classification and document classification. Directory. identity. multiple identities (security groups).  Automatically classify  Centralized deployment documents based on of audit policies using  Centralized access document content. Global Audit Policies. control lists using Central Access Policies.
  • 8.
  • 9. Data Classification  File Classification Infrastructure provides insight into your data by automating classification processes. Data Classification  File Classification Infrastructure uses classification rules to automatically scan files and classify them according to the contents  Classify your documents of the file. using resource properties  Some examples of classification rules include: stored in Active Directory.  Classify any file that contains the string “SBC12 Confidential” as having high business impact.  Automatically classify documents based on  Classify any file that contains at least 10 social security document content. numbers as having personally identifiable information.
  • 10.  A content classification rule that searches a set of files for the string “SBC12 Confidential”. If the string is found in a file, the Impact Data Classification resource property is set to High on the file.  A content classification rule that searches a set of files for a regular  Classify your documents expression that matches a social security number at least 10 times using resource properties in one file. If the pattern is found, the file is classified as having stored in Active Directory. personally identifiable information and the Personally Identifiable Information resource property is set to High.  Automatically classify documents based on document content.
  • 11.
  • 12. Expression-based access condition  Manage fewer security groups by using conditional expressions Expression-based access conditions Country x 30  Flexible access control lists based on document classification and multiple identities (security groups). Department x 20  Centralized access control lists using Central Access Policies. Sensitive/Confidential documents
  • 13. What is Central Access Policy?  You can think of Central Access Policies as a safety net that your organization applies across its servers to enhance the local access policy
  • 14. Expression-based access rules Active Directory File server Domain Services User claims Device claims Resource properties User.Department = Finance Device.Department = Finance Resource.Department = Finance User.Clearance = High Device.Managed = True Resource.Impact = High Access policy Applies to: @File.Impact = High Allow | Read, Write | if (@User.Department == @File.Department) AND (@Device.Managed == True)
  • 15. Central access policies Active Directory Domain Services Corporate High business file servers Organizational impact policy policies Characteristics • High business impact • Composed of central access rules • Personally identifiable Personally information • Applied to file servers through Group Policy identifiable objects information policy Finance department • Supplement (not replace) native file and folder policies access control lists from New Technology File System (NTFS) • High business impact Finance policy • Personally identifiable information • Finance User folders Finance folders
  • 16. Central access policy workflow Active Directory Create claim definitions Active Directory Create file property definitions Domain Services Create central access policy Domain Services Send central access policies to file Group Policy servers Claim definitions User Apply access policy to the shared folder File property definitions File Server Identify information Allow or deny Audit policy User’s computer User tries to access information File server
  • 17. Central access policy examples Organization-wide Specific data authorization management Departmental authorization Need-to-know
  • 18. Expression-based Auditing Expression-based  Limit auditing to data that meets specific auditing classification criteria.  Targeted access auditing  Limit auditing by action and by identity based on document classification and user  Add contextual information into the audit identity. events.  Centralized deployment of audit policies using Global Audit Policies.
  • 19. Security auditing Active Directory Active Directory Create claim types Domain Services Create resource properties Domain Services Group Policy Create global audit policy Claim definitions User Select and apply resource properties to the shared File property definitions File Server folders Allow or deny Audit policy User’s computer User tries to access information File server
  • 20. Audit policy examples Audit everyone who does not have a high security Audit all vendors when they try to access clearance and who tries to access a document that documents related to projects that they are not has a high impact on business working on Audit | Everyone | All-Access | Audit | Everyone | All-Access | Resource.BusinessImpact=HBI AND User.EmploymentStatus=Vendor AND User.Project User.SecurityClearance!=High Not_AnyOf Resource.Project.
  • 21. Data Encryption Challenges  How do I protect sensitive information after it leaves my protected environment?  I cannot get the users to encrypt their sensitive data.
  • 22. Classification-based encryption process Process to encrypt a file based on 1 classification Active Directory Claim definitions, file property definitions, and access Domain Services policies are established in Active Directory Domain Controller. A user creates a file with the word “confidential” in the User text and saves it. The classification engine classifies 4 the file as high-impact according to rules configured. 2 On the file server, a rule automatically applies RMS protection to any file classified as high-impact. 3 The RMS template and encryption are applied to the RMS server file on the file server and the file is encrypted. Classification engine File server
  • 23. 23
  • 24. Demonstration Lab  There are two virtual machines that are involved in the demonstration lab.  AD-Srv (Active Directory Domain Controller)  File-Srv (File Server)  There are two security groups  Finance  System Integration  There are two domain users:  thuan@sbc12.local (Finance)  thang@sbc12.local (System Integration)
  • 25. Steps  Create a new claim  Department  Create resources properties and add it to resource property list  Finance Department  Create a new central access rule/central policies  Resource Finance Department Exists  Resource Finance Department Equals Value Finance  Publish central access policy  Configure Group Policy and enable KDC  Install File Server Resource Manager on File server  Update-FSRMClassificationPropertyDefinition  Add Central Access Policy to shared folder  Validate