You are on page 1of 10

Security and Data Protection

Kamlesh Bajaj
Data Security Council of India

21st August, 2008


OWASP Seminar on Application Security
New Delhi
Top Issues: Data Protection Leads, Compliance and Threats Trail
“How important to your IT Security organization will each
of the following issues be in the next 12 months?”

Base: 2212 Security decision-makers at North American and European companies


*1007 Security decision-makers at North American and European enterprises
Source: Security Survey, North America And Europe, Q3 2007

1
Data Protection is the Leading Business Objective as well
“How important to your IT Security group will each of the
following business objectives be in the next 12 months?”

Base: 2212 Security decision-makers at North American and European companies


Source: Security Survey, North America And Europe, Q3 2007

2
Security Threat Scenario
External Threats Internal Threats

• Viruses, worms, Trojans – • A DBA wiped out critical data


malware after supervisor undermined
• Spyware her authority
• Bots • Disgruntlement due to unmet
• Exploit vulnerabilities in expectations
platforms, applications • Behavioral precursors present,
• Launch attacks using but ignored by organizations
unsuspecting users’ desktops • Insiders create, or use access
• Mail attachments paths unknown to mgmt to set
up their attack and conceal
• Spam their identity or actions
• IRC attacks • Organizations fail to detect
• Phishing precursors
• DNS spoofing/poisoning • Lack of physical and electronic
• DDoS access controls facilitate
sabotage

5
Data Scenario & Security Requirements
Data Scenario Security Requirements

Data on laptops Perimeter security


Data in files and databases Platform security
Data in Word files Endpoint security
Data in spreadsheets Application Security
Data sent in emails Email Security
75 % of all IPRs in emails Authentication & Authorization
75 % of all litigation involves for access to data
some kind of email discovery Identity protection
1 in 50 files contains confidential Customer data protection
information IPR Protection
1 in 400 emails contains
confidential information

6
Securing the Enterprise
Information Security – Strategic View Information Security – Operational View

• Threat Management
• Infrastructure Protection: keep the Perimeter, internal network,
unauthorized users out – FW, IDS, applications security; VoIP, Web
IPS, AV, SCM, MSS services, and storage networks,
• Secure Business Enablement: let Wireless and mobile security ;
Moving from detection to
the genuine users in – IAM, strong
prevention ; Application layer
authentication, access controls, digital
protection
rights management • Secure Content Management
• Security Administration: keep the Spam, Spyware, Adware, Web
wheels going – security operations, content
security awareness, information • Security and Vulnerability
security organization, BCP/DR Management
Risk management , Application and
software security vulnerability
mgmt
• Identity and Access Management
Access control, Identity
confirmation, User provisioning
• Information Security Service
Threat focus, Application security, MSS

IS
IS strategic
strategic view
view same
same as
as before,
before, but
but more
more and
and more
more security
security concerns
concerns

7
Securing the Enterprise
Top
Top Security
Security Concerns
Concerns Security Organization

Security-conscious people, an Enterprises need structured approach to


Governance, Risk, and Compliance (GRC)
important layer in defense-in-
Risk Management Program -> Enterprise
depth security strategy –
Security Strategy -> Enterprise Security
awareness programs Program
Secure perimeter, weak web apps As part of RMP, align security with
embed security in app dev business – security business enabler
Use governance framework to facilitate
Mobile technology significant risk
compliance and security
Identity management and access Focus on security process to achieve
control need to work in concert maturity, in addition to controls and
security architecture
BCP/DR dev and implementation
Define security metrics based on
Information Leak Prevention business objectives and security priorities
Protect Data – secure data rather Security program maturity takes 5 years
than infrastructure: data-centric of effort: roles & responsibilities,
controls, architecture, process maturity,
model - define strategy : info
architecture migration
classification and data encryption Outsourcing strategies

Need
Need to
to protect
protect enterprise
enterprise information
information assets
assets throughout
throughout lifecycle
lifecycle
Not
Not merely
merely aa technology
technology problem
problem -- Security
Security culture,
culture, awareness,
awareness, controls,
controls, processes
processes

9
DSCI – Mission
To create awareness among industry professionals and
other stakeholders about security and privacy issues
To build capacity & provide training among members to
develop, & continually improve appropriate data protection &
security programs
To adopt, monitor & enforce an appropriate security & data
protection standard for the Indian IT/ITES industry that
would be adequate, cost effective, adaptable & comparable
with the global standards
To create a common platform for promoting sharing of
knowledge about information security & to foster a
community of security professionals & firms
To provide appropriate oversight and certification services
for member organizations

10
DSCI – Objectives
Adoption of Best Global Practices

Independent Oversight

Self – Regulation

Focused Mission

Enforcement Mechanism

11
Thank You

Kamlesh Bajaj
CEO, DSCI
kamlesh.bajaj@dsci.in

You might also like