64

PowerPoint Presentationdownload.microsoft.com/documents/hk/technet... · Application creates a “Publishing License” and encrypts the file 3. Author distributes file 4. Recipient

  • Upload
    others

  • View
    2

  • Download
    0

Embed Size (px)

Citation preview

Page 1: PowerPoint Presentationdownload.microsoft.com/documents/hk/technet... · Application creates a “Publishing License” and encrypts the file 3. Author distributes file 4. Recipient
Page 2: PowerPoint Presentationdownload.microsoft.com/documents/hk/technet... · Application creates a “Publishing License” and encrypts the file 3. Author distributes file 4. Recipient
Page 3: PowerPoint Presentationdownload.microsoft.com/documents/hk/technet... · Application creates a “Publishing License” and encrypts the file 3. Author distributes file 4. Recipient
Page 4: PowerPoint Presentationdownload.microsoft.com/documents/hk/technet... · Application creates a “Publishing License” and encrypts the file 3. Author distributes file 4. Recipient
Page 5: PowerPoint Presentationdownload.microsoft.com/documents/hk/technet... · Application creates a “Publishing License” and encrypts the file 3. Author distributes file 4. Recipient
Page 6: PowerPoint Presentationdownload.microsoft.com/documents/hk/technet... · Application creates a “Publishing License” and encrypts the file 3. Author distributes file 4. Recipient
Page 7: PowerPoint Presentationdownload.microsoft.com/documents/hk/technet... · Application creates a “Publishing License” and encrypts the file 3. Author distributes file 4. Recipient
Page 8: PowerPoint Presentationdownload.microsoft.com/documents/hk/technet... · Application creates a “Publishing License” and encrypts the file 3. Author distributes file 4. Recipient

Percentage cause of data breach

Cost of Data Breach report

Ponemon Institute 2010

Estimated sources of data breach

Global State of Information Security Survey

PriceWaterhouseCoopers 2010

Page 9: PowerPoint Presentationdownload.microsoft.com/documents/hk/technet... · Application creates a “Publishing License” and encrypts the file 3. Author distributes file 4. Recipient
Page 10: PowerPoint Presentationdownload.microsoft.com/documents/hk/technet... · Application creates a “Publishing License” and encrypts the file 3. Author distributes file 4. Recipient

Independent

Consultant

Partner

Organization

Home

Mobile Devices

USB Drive

Page 11: PowerPoint Presentationdownload.microsoft.com/documents/hk/technet... · Application creates a “Publishing License” and encrypts the file 3. Author distributes file 4. Recipient
Page 12: PowerPoint Presentationdownload.microsoft.com/documents/hk/technet... · Application creates a “Publishing License” and encrypts the file 3. Author distributes file 4. Recipient

Information Author

Recipient

External Users

Mobile Devices

USB Drive

Page 13: PowerPoint Presentationdownload.microsoft.com/documents/hk/technet... · Application creates a “Publishing License” and encrypts the file 3. Author distributes file 4. Recipient

Information Author

Recipient

External Users

Mobile Devices

USB Drive

Page 14: PowerPoint Presentationdownload.microsoft.com/documents/hk/technet... · Application creates a “Publishing License” and encrypts the file 3. Author distributes file 4. Recipient

Information Author

Recipient

External Users

Mobile Devices

USB Drive

Page 15: PowerPoint Presentationdownload.microsoft.com/documents/hk/technet... · Application creates a “Publishing License” and encrypts the file 3. Author distributes file 4. Recipient

Information Author

Recipient

External Users

Mobile Devices

USB Drive

Page 16: PowerPoint Presentationdownload.microsoft.com/documents/hk/technet... · Application creates a “Publishing License” and encrypts the file 3. Author distributes file 4. Recipient

Page 17: PowerPoint Presentationdownload.microsoft.com/documents/hk/technet... · Application creates a “Publishing License” and encrypts the file 3. Author distributes file 4. Recipient
Page 18: PowerPoint Presentationdownload.microsoft.com/documents/hk/technet... · Application creates a “Publishing License” and encrypts the file 3. Author distributes file 4. Recipient

Policy Policy

Policy

Policy

Page 19: PowerPoint Presentationdownload.microsoft.com/documents/hk/technet... · Application creates a “Publishing License” and encrypts the file 3. Author distributes file 4. Recipient

Page 20: PowerPoint Presentationdownload.microsoft.com/documents/hk/technet... · Application creates a “Publishing License” and encrypts the file 3. Author distributes file 4. Recipient

Page 21: PowerPoint Presentationdownload.microsoft.com/documents/hk/technet... · Application creates a “Publishing License” and encrypts the file 3. Author distributes file 4. Recipient

Scenario RMS EFS BitLocker

Protect my information outside my direct control

Set fine-grained usage policy on my information

Collaborate with others on protected information

Protect my information to my smartcard

Untrusted admin of a file share

Protect information from other users on shared machine

Lost or stolen laptop

Physically insecure branch office server

Local single-user file & folder protection

Page 22: PowerPoint Presentationdownload.microsoft.com/documents/hk/technet... · Application creates a “Publishing License” and encrypts the file 3. Author distributes file 4. Recipient

Scenario RMS EFS BitLocker

Protect my information outside my direct control

Set fine-grained usage policy on my information

Collaborate with others on protected information

Protect my information to my smartcard

Untrusted admin of a file share

Protect information from other users on shared machine

Lost or stolen laptop

Physically insecure branch office server

Local single-user file & folder protection

Page 23: PowerPoint Presentationdownload.microsoft.com/documents/hk/technet... · Application creates a “Publishing License” and encrypts the file 3. Author distributes file 4. Recipient

Scenario RMS EFS BitLocker

Protect my information outside my direct control

Set fine-grained usage policy on my information

Collaborate with others on protected information

Protect my information to my smartcard

Untrusted admin of a file share

Protect information from other users on shared machine

Lost or stolen laptop

Physically insecure branch office server

Local single-user file & folder protection

Page 24: PowerPoint Presentationdownload.microsoft.com/documents/hk/technet... · Application creates a “Publishing License” and encrypts the file 3. Author distributes file 4. Recipient

Scenario RMS EFS BitLocker

Protect my information outside my direct control

Set fine-grained usage policy on my information

Collaborate with others on protected information

Protect my information to my smartcard

Untrusted admin of a file share

Protect information from other users on shared machine

Lost or stolen laptop

Physically insecure branch office server

Local single-user file & folder protection

Page 25: PowerPoint Presentationdownload.microsoft.com/documents/hk/technet... · Application creates a “Publishing License” and encrypts the file 3. Author distributes file 4. Recipient

Scenario RMS EFS BitLocker

Protect my information outside my direct control

Set fine-grained usage policy on my information

Collaborate with others on protected information

Protect my information to my smartcard

Untrusted admin of a file share

Protect information from other users on shared machine

Lost or stolen laptop

Physically insecure branch office server

Local single-user file & folder protection

Page 26: PowerPoint Presentationdownload.microsoft.com/documents/hk/technet... · Application creates a “Publishing License” and encrypts the file 3. Author distributes file 4. Recipient

Information Author The Recipient

AD RMS Server

Database Server Active Directory

Rights Management Service Workflow

Page 27: PowerPoint Presentationdownload.microsoft.com/documents/hk/technet... · Application creates a “Publishing License” and encrypts the file 3. Author distributes file 4. Recipient

Information Author The Recipient

AD RMS Server

Database Server Active Directory

1. Author receives a Client Licensor

Certificate the “first time” they

rights-protect information

1

Rights Management Service Workflow

Page 28: PowerPoint Presentationdownload.microsoft.com/documents/hk/technet... · Application creates a “Publishing License” and encrypts the file 3. Author distributes file 4. Recipient

Information Author The Recipient

AD RMS Server

Database Server Active Directory

2

2. Author defines a set of usage

rights and rules for their file;

Application creates a “Publishing

License” and encrypts the file

1. Author receives a Client Licensor

Certificate the “first time” they

rights-protect information

1

Rights Management Service Workflow

Page 29: PowerPoint Presentationdownload.microsoft.com/documents/hk/technet... · Application creates a “Publishing License” and encrypts the file 3. Author distributes file 4. Recipient

Information Author The Recipient

AD RMS Server

Database Server Active Directory

2 3

2. Author defines a set of usage

rights and rules for their file;

Application creates a “Publishing

License” and encrypts the file

3. Author distributes file

1. Author receives a Client Licensor

Certificate the “first time” they

rights-protect information

1

Rights Management Service Workflow

Page 30: PowerPoint Presentationdownload.microsoft.com/documents/hk/technet... · Application creates a “Publishing License” and encrypts the file 3. Author distributes file 4. Recipient

Information Author The Recipient

AD RMS Server

Database Server Active Directory

2 3

4

2. Author defines a set of usage

rights and rules for their file;

Application creates a “Publishing

License” and encrypts the file

3. Author distributes file

4. Recipient clicks file to open, the

application calls to the RMS

server which validates the user

and issues a “Use License.”

1. Author receives a Client Licensor

Certificate the “first time” they

rights-protect information

1

Rights Management Service Workflow

Page 31: PowerPoint Presentationdownload.microsoft.com/documents/hk/technet... · Application creates a “Publishing License” and encrypts the file 3. Author distributes file 4. Recipient

Information Author The Recipient

AD RMS Server

Database Server Active Directory

2 3

4

5

2. Author defines a set of usage

rights and rules for their file;

Application creates a “Publishing

License” and encrypts the file

3. Author distributes file

4. Recipient clicks file to open, the

application calls to the RMS

server which validates the user

and issues a “Use License.”

5. Application renders file and

enforces rights

1. Author receives a Client Licensor

Certificate the “first time” they

rights-protect information

1

Rights Management Service Workflow

Page 32: PowerPoint Presentationdownload.microsoft.com/documents/hk/technet... · Application creates a “Publishing License” and encrypts the file 3. Author distributes file 4. Recipient
Page 33: PowerPoint Presentationdownload.microsoft.com/documents/hk/technet... · Application creates a “Publishing License” and encrypts the file 3. Author distributes file 4. Recipient
Page 34: PowerPoint Presentationdownload.microsoft.com/documents/hk/technet... · Application creates a “Publishing License” and encrypts the file 3. Author distributes file 4. Recipient

34

Page 35: PowerPoint Presentationdownload.microsoft.com/documents/hk/technet... · Application creates a “Publishing License” and encrypts the file 3. Author distributes file 4. Recipient
Page 36: PowerPoint Presentationdownload.microsoft.com/documents/hk/technet... · Application creates a “Publishing License” and encrypts the file 3. Author distributes file 4. Recipient
Page 37: PowerPoint Presentationdownload.microsoft.com/documents/hk/technet... · Application creates a “Publishing License” and encrypts the file 3. Author distributes file 4. Recipient
Page 38: PowerPoint Presentationdownload.microsoft.com/documents/hk/technet... · Application creates a “Publishing License” and encrypts the file 3. Author distributes file 4. Recipient
Page 39: PowerPoint Presentationdownload.microsoft.com/documents/hk/technet... · Application creates a “Publishing License” and encrypts the file 3. Author distributes file 4. Recipient

http://support.microsoft.com/kb/2605692

Page 40: PowerPoint Presentationdownload.microsoft.com/documents/hk/technet... · Application creates a “Publishing License” and encrypts the file 3. Author distributes file 4. Recipient
Page 41: PowerPoint Presentationdownload.microsoft.com/documents/hk/technet... · Application creates a “Publishing License” and encrypts the file 3. Author distributes file 4. Recipient

41

Page 42: PowerPoint Presentationdownload.microsoft.com/documents/hk/technet... · Application creates a “Publishing License” and encrypts the file 3. Author distributes file 4. Recipient

MSIPC: A New RMS SDK

Page 43: PowerPoint Presentationdownload.microsoft.com/documents/hk/technet... · Application creates a “Publishing License” and encrypts the file 3. Author distributes file 4. Recipient

MSIPC: Motivation

Page 44: PowerPoint Presentationdownload.microsoft.com/documents/hk/technet... · Application creates a “Publishing License” and encrypts the file 3. Author distributes file 4. Recipient
Page 45: PowerPoint Presentationdownload.microsoft.com/documents/hk/technet... · Application creates a “Publishing License” and encrypts the file 3. Author distributes file 4. Recipient
Page 46: PowerPoint Presentationdownload.microsoft.com/documents/hk/technet... · Application creates a “Publishing License” and encrypts the file 3. Author distributes file 4. Recipient

/* Do nothing */

Page 47: PowerPoint Presentationdownload.microsoft.com/documents/hk/technet... · Application creates a “Publishing License” and encrypts the file 3. Author distributes file 4. Recipient

MSDRM (old) MSIPC (new)

Developer Cost

Programming

API surface 84 functions 20 functions

Programming task:

RMS bootstrapping (acquire RAC, CLC) 1000 lines of code

Automatic

Programming task:

Decrypting protected content 900 lines of code 3 function calls (IpcGetKey, IpcQueryLicense,

IpcDecrypt)

Programming task:

Identity selection Must build custom certificate picker

Automatic

Threading model Asynchronous only -- developers must understand

multi-threading concepts to use our API Synchronous only

Building

Generating RMS application binaries Must enter into RMLA legal agreement

with Microsoft

Generate .MCF files

Securely store production key

No tools to help debug errors in the

app certification process (which are

common!)

• (Planned) Standard codesigning

Testing

Test environment Must install and test in all supported

topologies/environments

Platform abstracts topology and

environment

Page 48: PowerPoint Presentationdownload.microsoft.com/documents/hk/technet... · Application creates a “Publishing License” and encrypts the file 3. Author distributes file 4. Recipient

••

••

Page 49: PowerPoint Presentationdownload.microsoft.com/documents/hk/technet... · Application creates a “Publishing License” and encrypts the file 3. Author distributes file 4. Recipient
Page 50: PowerPoint Presentationdownload.microsoft.com/documents/hk/technet... · Application creates a “Publishing License” and encrypts the file 3. Author distributes file 4. Recipient

50

Page 51: PowerPoint Presentationdownload.microsoft.com/documents/hk/technet... · Application creates a “Publishing License” and encrypts the file 3. Author distributes file 4. Recipient

Container-based generic file protection

Fall-back solution for protecting data at rest through RMS crypto and access policies

Apply RMS protection to a folder containing any file type (*.jpg, *.pdf, *.anything) Strong identity-based protection on container, at rest or in motion

No enforcement of usage restrictions while files are in use

Explorer application for RPF No application integration required

Create RPF container files

Edit folders and files

Extract files from the container

Prerequisites: Windows 7, Windows Vista, Windows Server 2008, or Windows Server 2008 R2

operating system

Microsoft .NET Framework 4.0

It is based on MSIPC!

Page 52: PowerPoint Presentationdownload.microsoft.com/documents/hk/technet... · Application creates a “Publishing License” and encrypts the file 3. Author distributes file 4. Recipient

Protection Process: Create a new protected file (in essence a ZIP file with

another extension)

Drag and drop unprotected files into it

Assign a policy

Share it

Consumption process Double click on the protected package

Double click on the files inside it

If the user has rights, files open in their native applications (without usage restrictions!)

Experience similar to sharing files through a .ZIP file

Page 53: PowerPoint Presentationdownload.microsoft.com/documents/hk/technet... · Application creates a “Publishing License” and encrypts the file 3. Author distributes file 4. Recipient

GFP Explorer

Beta available from Microsoft Connect: http://connect.microsoft.com/directory/security/

Page 54: PowerPoint Presentationdownload.microsoft.com/documents/hk/technet... · Application creates a “Publishing License” and encrypts the file 3. Author distributes file 4. Recipient

GFP Explorer

Beta available from Microsoft Connect: http://connect.microsoft.com/directory/security/

Page 55: PowerPoint Presentationdownload.microsoft.com/documents/hk/technet... · Application creates a “Publishing License” and encrypts the file 3. Author distributes file 4. Recipient

GFP Explorer

Beta available from Microsoft Connect: http://connect.microsoft.com/directory/security/

Page 56: PowerPoint Presentationdownload.microsoft.com/documents/hk/technet... · Application creates a “Publishing License” and encrypts the file 3. Author distributes file 4. Recipient

GFP Explorer

Beta available from Microsoft Connect: http://connect.microsoft.com/directory/security/

Page 57: PowerPoint Presentationdownload.microsoft.com/documents/hk/technet... · Application creates a “Publishing License” and encrypts the file 3. Author distributes file 4. Recipient

GFP Explorer

Beta available from Microsoft Connect: http://connect.microsoft.com/directory/security/

Page 58: PowerPoint Presentationdownload.microsoft.com/documents/hk/technet... · Application creates a “Publishing License” and encrypts the file 3. Author distributes file 4. Recipient

GFP Explorer

Beta available from Microsoft Connect: http://connect.microsoft.com/directory/security/

Page 59: PowerPoint Presentationdownload.microsoft.com/documents/hk/technet... · Application creates a “Publishing License” and encrypts the file 3. Author distributes file 4. Recipient

GFP Explorer

Beta available from Microsoft Connect: http://connect.microsoft.com/directory/security/

Page 60: PowerPoint Presentationdownload.microsoft.com/documents/hk/technet... · Application creates a “Publishing License” and encrypts the file 3. Author distributes file 4. Recipient

GFP Explorer

Beta available from Microsoft Connect: http://connect.microsoft.com/directory/security/

Page 61: PowerPoint Presentationdownload.microsoft.com/documents/hk/technet... · Application creates a “Publishing License” and encrypts the file 3. Author distributes file 4. Recipient

GFP Explorer

Beta available from Microsoft Connect: http://connect.microsoft.com/directory/security/

Page 62: PowerPoint Presentationdownload.microsoft.com/documents/hk/technet... · Application creates a “Publishing License” and encrypts the file 3. Author distributes file 4. Recipient

No application-level policy enforcement

Once the application gets the data, no restrictions are applied

No single-click opening of documents

User has to open the file, then open the documents

No ability to apply policy from within an application

No integration with Exchange Transport Protection, Prelicensing, OWA, or protection inheritance from email

No FCI integration

No support in Mobile Devices

Only available for Windows 7 and Windows Vista

Native protection support is always preferable!

Page 63: PowerPoint Presentationdownload.microsoft.com/documents/hk/technet... · Application creates a “Publishing License” and encrypts the file 3. Author distributes file 4. Recipient

Cloud hosted RMS integration with:

• RMS enabled Client applications

• Office 365 Messaging and other workloads

• Support for B2B and B2C DLP scenarios

RMS Platform

• Enhanced external collaboration scenarios

Support for Cloud

• Cross premise support for RMS on-premises and Exchange Online

RMS Platform

• Crypto: 2048-bit key support

• New RMS Client SDK (MSIPC)

• Container level generic file protection

• Deployment and Manageability enhancements in Windows 8

Applications

• Office 2003-2010

• Mac Office 2011

• FCI (WS08 R2)

• Windows Mobile 6.5

• Windows Phone 7

Secure email / messaging

• Exchange 2007+

Secure collaboration

• SharePoint 2007+

• UAG 2010 SP1

RMS Platform

• Windows Client

• Windows Server

Page 64: PowerPoint Presentationdownload.microsoft.com/documents/hk/technet... · Application creates a “Publishing License” and encrypts the file 3. Author distributes file 4. Recipient