Steve Hanna - Coordinated Security: A New Paradigm - Interop Mumbai 2009
-
Upload
interop-mumbai-2009 -
Category
Technology
-
view
609 -
download
3
description
Transcript of Steve Hanna - Coordinated Security: A New Paradigm - Interop Mumbai 2009
Copyright © 2009 Trusted Computing Group
Coordinated Security: A New Paradigm
Steve Hanna
October 8, 2009
Copyright© 2009 Trusted Computing Group – Other names and brands are properties of their respective owners. Slide #Slide #Slide #Slide #2222
Computing Is Fundamental
… but it’s built on sand …
Copyright© 2009 Trusted Computing Group – Other names and brands are properties of their respective owners. Slide #Slide #Slide #Slide #3333
Consumers Are Worried
Source: Unisys Security Index
53
1
4
4
1
1
4 3
0
2
4
6
8
10
Bankcard Fraud
Identity Theft
National Security
Epidemics Viruses/Spam
TOP RANKED CONCERNS ACROSS ALL COUNTRIES
10 2
17 5
12 5114114
17 9
13 713 8
10 1
17 0
12 6118
112
16 7
12 713 6
10 0
16 6
118
10 910 9
17 0
13 113 6
9 6
17 2
12 8118
113
17 8
12 6
13 6
0
50
100
150
200
COMPARISON OF FINDINGS FROM 4 SECURITY INDEX SURVEYS
National Security
Health Epidemic
Bankcard Fraud
Meeting Financial
Obligations
Online Transactions
Viruses and Spam
Identity Theft
Personal Safety
3rd Highest Concern
2nd Highest Concern
Highest Concern
Aug 2007
Mar 2008
Sep 2008
Mar 2009
Copyright© 2009 Trusted Computing Group – Other names and brands are properties of their respective owners. Slide #Slide #Slide #Slide #4444
0
20,000
40,000
60,000
2007 2008
# Phishing Web Site Hosts
33,428
55,389
Worried for Good Reason
9.5 9.5
0
2
4
6
8
10
2007 2008
# BOT-Infected Computers (MM)
3956
0
10
20
30
40
50
60
2007 2008
# Identities Breached Due to Data Loss and Theft (MM)
# Conficker Infections (MM)
1
0
1
2007 2008
Source: Symanec Internet Security Threat Report
Copyright© 2009 Trusted Computing Group – Other names and brands are properties of their respective owners. Slide #Slide #Slide #Slide #5555
Our Current Defense
Coordinated Security
Copyright© 2009 Trusted Computing Group – Other names and brands are properties of their respective owners. Slide #Slide #Slide #Slide #7777
Trusted Clients
Security Built In
� Trusted Platform Module (TPM)
� Mobile Trusted Module (MTM)
Features
� Authentication
� Encryption
� Attestation
Copyright© 2009 Trusted Computing Group – Other names and brands are properties of their respective owners. Slide #Slide #Slide #Slide #8888
Trusted Servers
Security Built In
� Trusted Platform Module (TPM)
� Secure Virtualization
� Secure Cloud
Features
� Authentication
� Encryption
� Attestation
Copyright© 2009 Trusted Computing Group – Other names and brands are properties of their respective owners. Slide #Slide #Slide #Slide #9999
Trusted Storage
Security Built In
� Self Encrypting Drive (SED)
Features
� Encryption
� Authentication
Copyright© 2009 Trusted Computing Group – Other names and brands are properties of their respective owners. Slide #Slide #Slide #Slide #10101010
Trusted Networks
Security Built In & Coordinated
� Trusted Network Connect (TNC)
Features
� Authenticate
� Health Check
� Behavior Monitor
� Enforce
Copyright© 2009 Trusted Computing Group – Other names and brands are properties of their respective owners. Slide #Slide #Slide #Slide #11111111
Coordinated Security
Share
� Who, What, When, Where, Privileges
� Threats
� Policies
� Cooperative Defense
Copyright© 2009 Trusted Computing Group – Other names and brands are properties of their respective owners. Slide #Slide #Slide #Slide #12121212Routing IDS Switching Wireless Firewalls
IPAM
RADIUS
AD
IF-MAP Protocol
SIM /SEM
Asset Management
System
NAC Decision Point
DHCP
MAP
Open Standards
Routing IDS Switching Wireless Firewalls
IPAM
RADIUS
ADSNMP, Syslog
SIM /SEM
Asset Management
System
NAC Decision Point
DHCP
Custom Integration
Copyright© 2009 Trusted Computing Group – Other names and brands are properties of their respective owners. Slide #Slide #Slide #Slide #13131313
Benefits
Stronger security
Copyright© 2009 Trusted Computing Group – Other names and brands are properties of their respective owners. Slide #Slide #Slide #Slide #14141414
Faster Response
Benefits
Copyright© 2009 Trusted Computing Group – Other names and brands are properties of their respective owners. Slide #Slide #Slide #Slide #15151515
More flexibility
Benefits
Copyright© 2009 Trusted Computing Group – Other names and brands are properties of their respective owners. Slide #Slide #Slide #Slide #16161616
Single security policy
Benefits
Copyright© 2009 Trusted Computing Group – Other names and brands are properties of their respective owners. Slide #Slide #Slide #Slide #17171717
Product choice
Benefits
Copyright© 2009 Trusted Computing Group – Other names and brands are properties of their respective owners. Slide #Slide #Slide #Slide #18181818
How to Deploy Coordinated Security
1. Get info from TCG web site
� Case studies, design guidelines, standards
2. Make case to management based on benefits
3. Require coordinated security support in RFPs
4. Deploy incrementally
5. Enjoy benefits
Copyright© 2009 Trusted Computing Group – Other names and brands are properties of their respective owners. Slide #Slide #Slide #Slide #19191919
For More Information
Trusted Computing Group (TCG)
http://www.trustedcomputinggroup.org