47
Seminar Simplified Security 18 juni 2015

Seminar Simplified Security

Embed Size (px)

Citation preview

Page 1: Seminar Simplified Security

Seminar Simplified Security 18 juni 2015

Page 2: Seminar Simplified Security

2

Page 3: Seminar Simplified Security

Agenda Simplified Security

17:00 Welkom en Introductie

17:10 Security Maturity Model 

18:00 Diner

19:00 Security en IAM Roadmap Oracle

20:00 Demo Simplified Security processen

20:45 Discussie en conclusie

21:00 Borrel

Page 4: Seminar Simplified Security

4

Page 5: Seminar Simplified Security

5

Page 6: Seminar Simplified Security

6

Page 7: Seminar Simplified Security

7

Identiteit

19-juni-1972BSN:186587485

23-12-1993KvK 30114159Vestigingsnr. 000017515769

Page 8: Seminar Simplified Security

8

Is onder de motorkap complex, maar….

leg dit niet neer bij de eindgebruiker, want…

dan wordt techniek misbruikt

Management van Security / Identity / Acces

Page 9: Seminar Simplified Security

9

Page 10: Seminar Simplified Security

10

Page 11: Seminar Simplified Security

Simplified Security Event 18-juni

Gertjan van het Hof

Security Maturity Evaluation

Page 12: Seminar Simplified Security

12

IT-security thema’s Nederlandse organisaties 2015

Bron: Nationale IT Security Monitor

Page 13: Seminar Simplified Security

13

Beveiligingsmaatregelen Cybercrime

Bron: Nationale IT Security Monitor

Page 14: Seminar Simplified Security

14

Klaar voor EU Data Protectie Verordering?

Bron: Nationale IT Security Monitor

Page 15: Seminar Simplified Security

15Hoe krijg ik de eisen helder?

Uitstellen kan eigenlijk niet

meer!

Hoe bepaal ik de

prioriteiten?

Welke wetten zijn van

toepassing?

Hoe hou ik de kosten in de

hand?

Waar haal ik de kennis vandaan?

Welke technology?

Hoe haak ik de business

aan?Welke best practices zijn

er?

Wat is de beste aanpak?

Page 16: Seminar Simplified Security

16

Welke security aanpak?

NIST ISO/IEC OCTAVECOBIT

• Complex

• Intensief en langdurig traject

• Kostbaar

• Resultaten laten lang op zich wachten

• Technology mapping ontbreekt

Page 17: Seminar Simplified Security

17

AMIS Simplified Security Aanpak

Security Maturity

EvaluationAdvies

SecurityArchitectuur

Implementatievan

maatregelen

Best Practices / Ref. Architecture

Doorlooptijd: 1 maand

Page 18: Seminar Simplified Security

18

Waarom deze aanpak?

• Methode is technologie onafhankelijk

• Overzichtelijke aanpak

• Korte doorlooptijd

• Geeft snel inzicht in huidige Security Maturity en de te nemen stappen

• Prioritering / Roadmaps

• Laagdrempelige manier presentatie van resultaten

• Goede basis voor Security Architectuur en Implementatie

• Goede voorbereiding op NIST/ISO/enz.

Page 19: Seminar Simplified Security

19

Wat gaan we doen?

4-5 INTERVIEWS

1 PRESENTATIE

Page 20: Seminar Simplified Security

20

Interview’s met 9 verschillende rollen

• Interview 1:– CISO– HR– Informatie Managers– Enterprise Architect

• Interview 2:– Lead Developer / Applicatie Architect– Beheer (Operations)– Database Administrator

• Interview 3:– Risk & Compliance– Audit

• 1 tot 2 verdiepingsinterview’s

Presentatie aan interviewteam en CIO

Page 21: Seminar Simplified Security

21

Security Maturity EvaluationOverview

Analyse

Business Area’s

TechnicalArea’s

Page 22: Seminar Simplified Security

22

Analyse

Security Maturity EvaluationOverview

Business Area’s

TechnicalArea’s

Presentatie van resultaten

Opportunities EnablersRecurring Benefits

Priorities

Page 23: Seminar Simplified Security

23

Analyse

Business Area’s

Business Area’s

Business Context

Technical Context

Digital Transfor-mation

Page 24: Seminar Simplified Security

24

Business Context

Vragen:• Gebruikers van de diensten• Type implementatie• Kritieke processen• Kritieke data• Bestaande gebreken• Beschikbaarheid• Vertrouwelijkheid• Integriteit• Sabotage• Operationele risico's• Reputatieschade• Compliance

Page 25: Seminar Simplified Security

25

Technical Context

Vragen:• Data Centers• Data Center Organisatie• Data Center AS IS and TO BE Technology• Evolution plans and priorities• High Availability, Business Continuity, Disaster recovery • CMDB Configuratie Item’s• Technology architectuur

Page 26: Seminar Simplified Security

26

Digital Transformation

Page 27: Seminar Simplified Security

27

Analyse

Security Maturity EvaluationOverview

BusinessArea’s

TechnicalArea’s

Presentatie van resultaten

Opportunities EnablersRecurring Benefits

Priorities

Page 28: Seminar Simplified Security

28

Technical Area’s

Dat

a S

ecu

rity

Lo

gic

al

Sec

uri

ty

Page 29: Seminar Simplified Security

29

Analyse

Security Maturity EvaluationOverview

Business Area’s

TechnicalArea’s

Presentatie van resultaten

Opportunities EnablersRecurring Benefits

Priorities

Page 30: Seminar Simplified Security

30

van Analyse naar Business Resultaten

Opportunities Enablers

Recurring Benefits

Analyse

CIA

Business Technical

Page 31: Seminar Simplified Security

31

Opportunities

Op basis van de Analyse worden Opportunities gevonden.

Voorbeeld van Analyse resultaten:• There is no process for approval process delegation• The user provision is performed manually for all applications• There is no central department with responsibility to “enroll” and “un-

enroll”• Very few cases are notified for accounts de-provisioning (leave and move) • Privileges are accumulated when users change division / job

Voorbeeld van Opportunities:• Define and adopt a policy about the user creation management, role and

responsibilities including de-provisioning• Start a regular process to check rogue accounts in applications and

databases• Make provisioning and deprovisioning automatic

Page 32: Seminar Simplified Security

32

Enablers

Voorbeelden:

• Policy and organization• Extractors and reconciliation tools and/or Identity Analytics capabilities• Identity Management technology • Single Sign On tools

Page 33: Seminar Simplified Security

33

Recurring Benefits

Voorbeelden:

• Risk of data leakage and frauds reduced• Better compliance through full accountability• Better user experience and improved productivity• Reduced number of call to help desk to reset passwords• Reduced costs for Identity and Access Management

Page 34: Seminar Simplified Security

34

Van Enablers naar Capabilities

Enablers Capabilities

Voorbeelden van Capabilities:• Data Encryption• RBAC• Automate Provisioning en De-provisioning• Data Masking• Auditing• Single Sign On

Page 35: Seminar Simplified Security

35

Prioritering

Page 36: Seminar Simplified Security

36

Security Maturity (voorbeeld)

Page 37: Seminar Simplified Security

37

Oracle Product Mapping Advice(voorbeeld)

Page 38: Seminar Simplified Security

38

AMIS Simplified Security Aanpak

Security Maturity

EvaluationAdvies

SecurityArchitectuur

Implementatievan

maatregelen

Best Practices / Ref. Architecture

Doorlooptijd: 1 maand

Page 39: Seminar Simplified Security

39

SABSA

ASSETS (what)

MOTIVATION (why)

PROCESS (how)

PEOPLE (who)

LOCATION (where)

TIME (when)

Page 40: Seminar Simplified Security

40

Conceptual Security Architecture

Page 41: Seminar Simplified Security

41

Conceptual Security Architecture

Page 42: Seminar Simplified Security

42

Component Security Architecture

Page 43: Seminar Simplified Security

43

AMIS Simplified Security Aanpak

Security Maturity

EvaluationAdvies

SecurityArchitectuur

Implementatievan

maatregelen

Best Practices / Ref. Architecture

Doorlooptijd: 1 maand

Page 44: Seminar Simplified Security

44

Security Implementation Partner

Middleware

• Oracle Identity & Access Manager (OAM, OIM)

• Oracle Identity Federation (OIF)• Oracle Web Service Security

(OWSM)• Oracle Unified Directory (OUD)• Oracle Privileged Account Manager

(OPAM)• Oracle Key Vault (OKV)• Oracle API Gateway

Database

• Oracle Database Firewall (DBFW)• Oracle Database Vault (ODV)• Oracle Data Masking• Oracle Database Advanced Security

options (OAS)– Transparent Data Encryption– Oracle Data Redation

• Oracle Virtual Private Database (VPD)

• Oracle Real Application Security (RAS)

• Oracle Audit Vault (AV)

Page 45: Seminar Simplified Security

45

Wij staan er klaar voor!U ook?

AMIS Security Practice

Page 46: Seminar Simplified Security

46

Dank voor uw aanwezigheid!

Gertjan van het Hof Security Architect

AMIS

M +31 6 29 54 06 19 E [email protected]

I amis.nl

B technology.amis.nl

Page 47: Seminar Simplified Security

47