data leakage prevention a pragmatic...

28
1 1 Alexandre Diemer Council of Europe www.coe.int DATA LEAKAGE PREVENTION A Pragmatic Approach

Upload: others

Post on 20-May-2020

3 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: DATA LEAKAGE PREVENTION A Pragmatic Approachidg.bg/idgevents/idgevents/2015/0928160100-15.20-15.40_AlexandreDiemer.pdf · DATA LEAKAGE PREVENTION A Pragmatic Approach . 2 3 MAIN OBJECTIVES

1 1

Alexandre Diemer Council of Europe

www.coe.int

DATA LEAKAGE PREVENTION

A Pragmatic Approach

Page 2: DATA LEAKAGE PREVENTION A Pragmatic Approachidg.bg/idgevents/idgevents/2015/0928160100-15.20-15.40_AlexandreDiemer.pdf · DATA LEAKAGE PREVENTION A Pragmatic Approach . 2 3 MAIN OBJECTIVES

2

3 MAIN OBJECTIVES OF THIS PRESENTATION

1 WHAT TO PROTECT 2 WHY PROTECT 3 HOW TO PROTECT

Page 3: DATA LEAKAGE PREVENTION A Pragmatic Approachidg.bg/idgevents/idgevents/2015/0928160100-15.20-15.40_AlexandreDiemer.pdf · DATA LEAKAGE PREVENTION A Pragmatic Approach . 2 3 MAIN OBJECTIVES

3

WHAT TO PROTECT ?

1 DATA IN MOTION 2 DATA IN USE 3 DATA AT REST

Page 4: DATA LEAKAGE PREVENTION A Pragmatic Approachidg.bg/idgevents/idgevents/2015/0928160100-15.20-15.40_AlexandreDiemer.pdf · DATA LEAKAGE PREVENTION A Pragmatic Approach . 2 3 MAIN OBJECTIVES

4

DATA IN MOTION

DATA IN MOTION is data transmitted / moving in networks

Page 5: DATA LEAKAGE PREVENTION A Pragmatic Approachidg.bg/idgevents/idgevents/2015/0928160100-15.20-15.40_AlexandreDiemer.pdf · DATA LEAKAGE PREVENTION A Pragmatic Approach . 2 3 MAIN OBJECTIVES

5

DATA IN USE

DATA IN USE is data stored / handled on external devices

Page 6: DATA LEAKAGE PREVENTION A Pragmatic Approachidg.bg/idgevents/idgevents/2015/0928160100-15.20-15.40_AlexandreDiemer.pdf · DATA LEAKAGE PREVENTION A Pragmatic Approach . 2 3 MAIN OBJECTIVES

6

DATA AT REST

DATA IN REST is data stored in computer storages

Page 7: DATA LEAKAGE PREVENTION A Pragmatic Approachidg.bg/idgevents/idgevents/2015/0928160100-15.20-15.40_AlexandreDiemer.pdf · DATA LEAKAGE PREVENTION A Pragmatic Approach . 2 3 MAIN OBJECTIVES

7

WHY USING DATA LEAKAGE PREVENTION ?

Vast Data quantities Data Confidentiality Gaining visibility over

Data Repositories &

Rights

Trace & Chase Data Leakages

Facing Advanced Persistent Threats

Page 8: DATA LEAKAGE PREVENTION A Pragmatic Approachidg.bg/idgevents/idgevents/2015/0928160100-15.20-15.40_AlexandreDiemer.pdf · DATA LEAKAGE PREVENTION A Pragmatic Approach . 2 3 MAIN OBJECTIVES

8

PREREQUISITES

Data Classification Specialised Solutions

Demand it

Often Complex to

Deploy

Level of IT & Business Maturity

Large Budgets

Page 9: DATA LEAKAGE PREVENTION A Pragmatic Approachidg.bg/idgevents/idgevents/2015/0928160100-15.20-15.40_AlexandreDiemer.pdf · DATA LEAKAGE PREVENTION A Pragmatic Approach . 2 3 MAIN OBJECTIVES

9

DESPITE PREREQUISITES

Page 10: DATA LEAKAGE PREVENTION A Pragmatic Approachidg.bg/idgevents/idgevents/2015/0928160100-15.20-15.40_AlexandreDiemer.pdf · DATA LEAKAGE PREVENTION A Pragmatic Approach . 2 3 MAIN OBJECTIVES

10

DESPITE PREREQUISITES

DATA Classification is

a)Not in Place

b)Only Partially Deployed

Page 11: DATA LEAKAGE PREVENTION A Pragmatic Approachidg.bg/idgevents/idgevents/2015/0928160100-15.20-15.40_AlexandreDiemer.pdf · DATA LEAKAGE PREVENTION A Pragmatic Approach . 2 3 MAIN OBJECTIVES

11

SO WHAT ABOUT COMMERCIAL OFFERINGS?

Page 12: DATA LEAKAGE PREVENTION A Pragmatic Approachidg.bg/idgevents/idgevents/2015/0928160100-15.20-15.40_AlexandreDiemer.pdf · DATA LEAKAGE PREVENTION A Pragmatic Approach . 2 3 MAIN OBJECTIVES

12

Everybody has a plan until they get punched in the face !

Mike Tyson

Page 13: DATA LEAKAGE PREVENTION A Pragmatic Approachidg.bg/idgevents/idgevents/2015/0928160100-15.20-15.40_AlexandreDiemer.pdf · DATA LEAKAGE PREVENTION A Pragmatic Approach . 2 3 MAIN OBJECTIVES

13

PRAGMATIC PPROACH

No Data Classification = No Commercial Solution

Back to Basics or Finding a Balance between

user annoyance vs cost vs daily exploitation vs effectiveness

Switching from Silver Bullet to Multilayer Approach

• Technical

• Legal

• Organisational

Page 14: DATA LEAKAGE PREVENTION A Pragmatic Approachidg.bg/idgevents/idgevents/2015/0928160100-15.20-15.40_AlexandreDiemer.pdf · DATA LEAKAGE PREVENTION A Pragmatic Approach . 2 3 MAIN OBJECTIVES

14

TECHNICAL TIPS - DATA IN MOTION

Block services that can’t be secured. Rely on logs Content Tagging

Jump to Forensics

Page 15: DATA LEAKAGE PREVENTION A Pragmatic Approachidg.bg/idgevents/idgevents/2015/0928160100-15.20-15.40_AlexandreDiemer.pdf · DATA LEAKAGE PREVENTION A Pragmatic Approach . 2 3 MAIN OBJECTIVES

15

TECHNICAL TIPS - DATA IN USE

Use of endpoint logging for

Forensic investigation

EXTERNAL DEVICES

Page 16: DATA LEAKAGE PREVENTION A Pragmatic Approachidg.bg/idgevents/idgevents/2015/0928160100-15.20-15.40_AlexandreDiemer.pdf · DATA LEAKAGE PREVENTION A Pragmatic Approach . 2 3 MAIN OBJECTIVES

16

TECHNICAL TIPS - DATA IN USE

MDM

Forcing Mass storage Connection

Mode

SMART DEVICES

Page 17: DATA LEAKAGE PREVENTION A Pragmatic Approachidg.bg/idgevents/idgevents/2015/0928160100-15.20-15.40_AlexandreDiemer.pdf · DATA LEAKAGE PREVENTION A Pragmatic Approach . 2 3 MAIN OBJECTIVES

17

Page 18: DATA LEAKAGE PREVENTION A Pragmatic Approachidg.bg/idgevents/idgevents/2015/0928160100-15.20-15.40_AlexandreDiemer.pdf · DATA LEAKAGE PREVENTION A Pragmatic Approach . 2 3 MAIN OBJECTIVES

18

TECHNICAL TIPS - DATA IN USE

Extended use of Tracking

PRINT

Page 19: DATA LEAKAGE PREVENTION A Pragmatic Approachidg.bg/idgevents/idgevents/2015/0928160100-15.20-15.40_AlexandreDiemer.pdf · DATA LEAKAGE PREVENTION A Pragmatic Approach . 2 3 MAIN OBJECTIVES

19

TECHNICAL TIPS - DATA IN USE

Security Information & Event

Management

Page 20: DATA LEAKAGE PREVENTION A Pragmatic Approachidg.bg/idgevents/idgevents/2015/0928160100-15.20-15.40_AlexandreDiemer.pdf · DATA LEAKAGE PREVENTION A Pragmatic Approach . 2 3 MAIN OBJECTIVES

20

TECHNICAL TIPS - DATA AT REST

Desktops/Databases: use Audit

Trails

Fileservers: Extended Tracking

Solution

(commercial)

Page 21: DATA LEAKAGE PREVENTION A Pragmatic Approachidg.bg/idgevents/idgevents/2015/0928160100-15.20-15.40_AlexandreDiemer.pdf · DATA LEAKAGE PREVENTION A Pragmatic Approach . 2 3 MAIN OBJECTIVES

21

NEVERTHELESS

We need to be lucky once …You need to be lucky every time

IRA to Margaret Thatcher after failed assassination attempt

Page 22: DATA LEAKAGE PREVENTION A Pragmatic Approachidg.bg/idgevents/idgevents/2015/0928160100-15.20-15.40_AlexandreDiemer.pdf · DATA LEAKAGE PREVENTION A Pragmatic Approach . 2 3 MAIN OBJECTIVES

22

OUTLOOK

Living with fact that breaches will

occur

Page 23: DATA LEAKAGE PREVENTION A Pragmatic Approachidg.bg/idgevents/idgevents/2015/0928160100-15.20-15.40_AlexandreDiemer.pdf · DATA LEAKAGE PREVENTION A Pragmatic Approach . 2 3 MAIN OBJECTIVES

23

OUTLOOK…

Living with fact that there will be

data leakage to some extent

Page 24: DATA LEAKAGE PREVENTION A Pragmatic Approachidg.bg/idgevents/idgevents/2015/0928160100-15.20-15.40_AlexandreDiemer.pdf · DATA LEAKAGE PREVENTION A Pragmatic Approach . 2 3 MAIN OBJECTIVES

24

OUTLOOK…

Targeting the right perimeter • Start small • Focus on specific data container

• Secure Sensitive Items

• Track user activity rather then unstructured data

Page 25: DATA LEAKAGE PREVENTION A Pragmatic Approachidg.bg/idgevents/idgevents/2015/0928160100-15.20-15.40_AlexandreDiemer.pdf · DATA LEAKAGE PREVENTION A Pragmatic Approach . 2 3 MAIN OBJECTIVES

25

OUTLOOK…

Focus on VIPs / Nomadic staff • Risk of device theft > data breach

• Disk/Device Encryption on nomadic devices

Page 26: DATA LEAKAGE PREVENTION A Pragmatic Approachidg.bg/idgevents/idgevents/2015/0928160100-15.20-15.40_AlexandreDiemer.pdf · DATA LEAKAGE PREVENTION A Pragmatic Approach . 2 3 MAIN OBJECTIVES

26

OUTLOOK…

Tracking Approach

Rather than

Blocking Approach

Page 27: DATA LEAKAGE PREVENTION A Pragmatic Approachidg.bg/idgevents/idgevents/2015/0928160100-15.20-15.40_AlexandreDiemer.pdf · DATA LEAKAGE PREVENTION A Pragmatic Approach . 2 3 MAIN OBJECTIVES

27

OUTLOOK…

Rely on Good Crisis & Incident Mgt • Technically with Advanced Forensics

• Communication Measures (Be prepared)

• Legal framework

Page 28: DATA LEAKAGE PREVENTION A Pragmatic Approachidg.bg/idgevents/idgevents/2015/0928160100-15.20-15.40_AlexandreDiemer.pdf · DATA LEAKAGE PREVENTION A Pragmatic Approach . 2 3 MAIN OBJECTIVES

28