19
Copyright © 2009 Trusted Computing Group Coordinated Security: A New Paradigm Steve Hanna October 8, 2009

Steve Hanna - Coordinated Security: A New Paradigm - Interop Mumbai 2009

Embed Size (px)

DESCRIPTION

Today's information security environment is composed of isolated systems, unable to share information in an effective way. Device security, network security, and application security systems proliferate but never communicate. Only through the use of new open standards can we address this problem, sharing information to increase the value of already-deployed systems and enable a nimble response with reduced waste. This keynote would cover the Trusted Network Connect (TNC) standards (especially IF-MAP) and touch on the other Trusted Computing Group (TCG) technologies, showing how TCG standards enable better coordination among security systems. The emphasis of the talk is on business perspectives and challenges and how TCG technologies address them.

Citation preview

Page 1: Steve Hanna - Coordinated Security: A New Paradigm - Interop Mumbai 2009

Copyright © 2009 Trusted Computing Group

Coordinated Security: A New Paradigm

Steve Hanna

October 8, 2009

Page 2: Steve Hanna - Coordinated Security: A New Paradigm - Interop Mumbai 2009

Copyright© 2009 Trusted Computing Group – Other names and brands are properties of their respective owners. Slide #Slide #Slide #Slide #2222

Computing Is Fundamental

… but it’s built on sand …

Page 3: Steve Hanna - Coordinated Security: A New Paradigm - Interop Mumbai 2009

Copyright© 2009 Trusted Computing Group – Other names and brands are properties of their respective owners. Slide #Slide #Slide #Slide #3333

Consumers Are Worried

Source: Unisys Security Index

53

1

4

4

1

1

4 3

0

2

4

6

8

10

Bankcard Fraud

Identity Theft

National Security

Epidemics Viruses/Spam

TOP RANKED CONCERNS ACROSS ALL COUNTRIES

10 2

17 5

12 5114114

17 9

13 713 8

10 1

17 0

12 6118

112

16 7

12 713 6

10 0

16 6

118

10 910 9

17 0

13 113 6

9 6

17 2

12 8118

113

17 8

12 6

13 6

0

50

100

150

200

COMPARISON OF FINDINGS FROM 4 SECURITY INDEX SURVEYS

National Security

Health Epidemic

Bankcard Fraud

Meeting Financial

Obligations

Online Transactions

Viruses and Spam

Identity Theft

Personal Safety

3rd Highest Concern

2nd Highest Concern

Highest Concern

Aug 2007

Mar 2008

Sep 2008

Mar 2009

Page 4: Steve Hanna - Coordinated Security: A New Paradigm - Interop Mumbai 2009

Copyright© 2009 Trusted Computing Group – Other names and brands are properties of their respective owners. Slide #Slide #Slide #Slide #4444

0

20,000

40,000

60,000

2007 2008

# Phishing Web Site Hosts

33,428

55,389

Worried for Good Reason

9.5 9.5

0

2

4

6

8

10

2007 2008

# BOT-Infected Computers (MM)

3956

0

10

20

30

40

50

60

2007 2008

# Identities Breached Due to Data Loss and Theft (MM)

# Conficker Infections (MM)

1

0

1

2007 2008

Source: Symanec Internet Security Threat Report

Page 5: Steve Hanna - Coordinated Security: A New Paradigm - Interop Mumbai 2009

Copyright© 2009 Trusted Computing Group – Other names and brands are properties of their respective owners. Slide #Slide #Slide #Slide #5555

Our Current Defense

Page 6: Steve Hanna - Coordinated Security: A New Paradigm - Interop Mumbai 2009

Coordinated Security

Page 7: Steve Hanna - Coordinated Security: A New Paradigm - Interop Mumbai 2009

Copyright© 2009 Trusted Computing Group – Other names and brands are properties of their respective owners. Slide #Slide #Slide #Slide #7777

Trusted Clients

Security Built In

� Trusted Platform Module (TPM)

� Mobile Trusted Module (MTM)

Features

� Authentication

� Encryption

� Attestation

Page 8: Steve Hanna - Coordinated Security: A New Paradigm - Interop Mumbai 2009

Copyright© 2009 Trusted Computing Group – Other names and brands are properties of their respective owners. Slide #Slide #Slide #Slide #8888

Trusted Servers

Security Built In

� Trusted Platform Module (TPM)

� Secure Virtualization

� Secure Cloud

Features

� Authentication

� Encryption

� Attestation

Page 9: Steve Hanna - Coordinated Security: A New Paradigm - Interop Mumbai 2009

Copyright© 2009 Trusted Computing Group – Other names and brands are properties of their respective owners. Slide #Slide #Slide #Slide #9999

Trusted Storage

Security Built In

� Self Encrypting Drive (SED)

Features

� Encryption

� Authentication

Page 10: Steve Hanna - Coordinated Security: A New Paradigm - Interop Mumbai 2009

Copyright© 2009 Trusted Computing Group – Other names and brands are properties of their respective owners. Slide #Slide #Slide #Slide #10101010

Trusted Networks

Security Built In & Coordinated

� Trusted Network Connect (TNC)

Features

� Authenticate

� Health Check

� Behavior Monitor

� Enforce

Page 11: Steve Hanna - Coordinated Security: A New Paradigm - Interop Mumbai 2009

Copyright© 2009 Trusted Computing Group – Other names and brands are properties of their respective owners. Slide #Slide #Slide #Slide #11111111

Coordinated Security

Share

� Who, What, When, Where, Privileges

� Threats

� Policies

� Cooperative Defense

Page 12: Steve Hanna - Coordinated Security: A New Paradigm - Interop Mumbai 2009

Copyright© 2009 Trusted Computing Group – Other names and brands are properties of their respective owners. Slide #Slide #Slide #Slide #12121212Routing IDS Switching Wireless Firewalls

IPAM

RADIUS

AD

IF-MAP Protocol

SIM /SEM

Asset Management

System

NAC Decision Point

DHCP

MAP

Open Standards

Routing IDS Switching Wireless Firewalls

IPAM

RADIUS

ADSNMP, Syslog

SIM /SEM

Asset Management

System

NAC Decision Point

DHCP

Custom Integration

Page 13: Steve Hanna - Coordinated Security: A New Paradigm - Interop Mumbai 2009

Copyright© 2009 Trusted Computing Group – Other names and brands are properties of their respective owners. Slide #Slide #Slide #Slide #13131313

Benefits

Stronger security

Page 14: Steve Hanna - Coordinated Security: A New Paradigm - Interop Mumbai 2009

Copyright© 2009 Trusted Computing Group – Other names and brands are properties of their respective owners. Slide #Slide #Slide #Slide #14141414

Faster Response

Benefits

Page 15: Steve Hanna - Coordinated Security: A New Paradigm - Interop Mumbai 2009

Copyright© 2009 Trusted Computing Group – Other names and brands are properties of their respective owners. Slide #Slide #Slide #Slide #15151515

More flexibility

Benefits

Page 16: Steve Hanna - Coordinated Security: A New Paradigm - Interop Mumbai 2009

Copyright© 2009 Trusted Computing Group – Other names and brands are properties of their respective owners. Slide #Slide #Slide #Slide #16161616

Single security policy

Benefits

Page 17: Steve Hanna - Coordinated Security: A New Paradigm - Interop Mumbai 2009

Copyright© 2009 Trusted Computing Group – Other names and brands are properties of their respective owners. Slide #Slide #Slide #Slide #17171717

Product choice

Benefits

Page 18: Steve Hanna - Coordinated Security: A New Paradigm - Interop Mumbai 2009

Copyright© 2009 Trusted Computing Group – Other names and brands are properties of their respective owners. Slide #Slide #Slide #Slide #18181818

How to Deploy Coordinated Security

1. Get info from TCG web site

� Case studies, design guidelines, standards

2. Make case to management based on benefits

3. Require coordinated security support in RFPs

4. Deploy incrementally

5. Enjoy benefits

Page 19: Steve Hanna - Coordinated Security: A New Paradigm - Interop Mumbai 2009

Copyright© 2009 Trusted Computing Group – Other names and brands are properties of their respective owners. Slide #Slide #Slide #Slide #19191919

For More Information

Trusted Computing Group (TCG)

http://www.trustedcomputinggroup.org