eisa (enterprise information security architecture) - detailed description of security processes and...
TRANSCRIPT
![Page 1: EISA (Enterprise Information Security Architecture) - detailed description of security processes and procedures to develop compliance with strategic goals](https://reader035.vdocument.in/reader035/viewer/2022081504/5697bfd21a28abf838caba05/html5/thumbnails/1.jpg)
TREASURY INFORMATION SECURITY
BUSINESS - INFORMATION - TECHNOLOGY +
SECURITY
![Page 2: EISA (Enterprise Information Security Architecture) - detailed description of security processes and procedures to develop compliance with strategic goals](https://reader035.vdocument.in/reader035/viewer/2022081504/5697bfd21a28abf838caba05/html5/thumbnails/2.jpg)
DEVELOPMENT OF A METHODOLOGY FOR SECURITY PROCEDURES AND PROCESSES
EISA (Enterprise Information Security Architecture) - detailed description of security processes and procedures to develop compliance with strategic goals of the enterprise.
EISA implies optimization of business-processes, answers the questions when architecting business security, establishment of a secure network infrastructure, development of security policies and procedures, etc.
Due to introduction of EISA, we lay the groundwork to create flexibility within our organization, to adjust our system to a coming change.
2
![Page 3: EISA (Enterprise Information Security Architecture) - detailed description of security processes and procedures to develop compliance with strategic goals](https://reader035.vdocument.in/reader035/viewer/2022081504/5697bfd21a28abf838caba05/html5/thumbnails/3.jpg)
Unification of the development tools
Dev –> QA –> Prd
RBAC + SoD
Transition to web-services
Unification of the development environment
Unification of DBMS being used
3
![Page 4: EISA (Enterprise Information Security Architecture) - detailed description of security processes and procedures to develop compliance with strategic goals](https://reader035.vdocument.in/reader035/viewer/2022081504/5697bfd21a28abf838caba05/html5/thumbnails/4.jpg)
BUILDING A SECURE INFRASTRUCTURE
Threat source: DDoS; Hacktivists Opponents using software like Stuxnet, Shamoon Special services
Vulnerable users: Executive directors Heads of Departments Head of IT Super users
4
![Page 5: EISA (Enterprise Information Security Architecture) - detailed description of security processes and procedures to develop compliance with strategic goals](https://reader035.vdocument.in/reader035/viewer/2022081504/5697bfd21a28abf838caba05/html5/thumbnails/5.jpg)
Documents/Records/Email
Database
Server/Operating System
Application
Network
Physical
External Users
Internal
Users
5
![Page 6: EISA (Enterprise Information Security Architecture) - detailed description of security processes and procedures to develop compliance with strategic goals](https://reader035.vdocument.in/reader035/viewer/2022081504/5697bfd21a28abf838caba05/html5/thumbnails/6.jpg)
Internal Users
6
![Page 7: EISA (Enterprise Information Security Architecture) - detailed description of security processes and procedures to develop compliance with strategic goals](https://reader035.vdocument.in/reader035/viewer/2022081504/5697bfd21a28abf838caba05/html5/thumbnails/7.jpg)
Build sustainable compliance programs
Reduce risk of insider threat and
attacks
Identity AccessData
Protection
7
![Page 8: EISA (Enterprise Information Security Architecture) - detailed description of security processes and procedures to develop compliance with strategic goals](https://reader035.vdocument.in/reader035/viewer/2022081504/5697bfd21a28abf838caba05/html5/thumbnails/8.jpg)
STATE TREASURY AGENCYSTATE TREASURY AGENCY
TREASURY BRANCHTREASURY BRANCH
TREASURY BRANCHTREASURY BRANCH
TREASURY BRANCHTREASURY BRANCH
INTERNETINTERNET
XDMXXDMX
8
![Page 9: EISA (Enterprise Information Security Architecture) - detailed description of security processes and procedures to develop compliance with strategic goals](https://reader035.vdocument.in/reader035/viewer/2022081504/5697bfd21a28abf838caba05/html5/thumbnails/9.jpg)
ASA 5515 X
ASA 5555 X ASA 5555 X
Cisco 2951 Cisco 2951
INTERNETINTERNET
DMZDMZ
Certeficat CenterCerteficat Center RADIUS ServerRADIUS Server
Mail ServerMail Server
XDMX
ServersServers
ASA 5515 X
9
![Page 10: EISA (Enterprise Information Security Architecture) - detailed description of security processes and procedures to develop compliance with strategic goals](https://reader035.vdocument.in/reader035/viewer/2022081504/5697bfd21a28abf838caba05/html5/thumbnails/10.jpg)
ASA 5515 X ASA 5515 X
ASA 5555 X ASA 5555 X
Cisco 2951 Cisco 2951
INTERNETINTERNET
DMZDMZ
Certeficat CenterCerteficat Center RADIUS ServerRADIUS Server
Mail ServerMail Server
Privat NetworkPrivat Network
Treasury Branch 2
Treasury Branch 1
Treasury Branch N
ServersServers
XDMX
10
![Page 11: EISA (Enterprise Information Security Architecture) - detailed description of security processes and procedures to develop compliance with strategic goals](https://reader035.vdocument.in/reader035/viewer/2022081504/5697bfd21a28abf838caba05/html5/thumbnails/11.jpg)
SwitchSwitch
DMZ
UsersUsers AdministratorsAdministrators
WEBWEB
FileServer
FileServer
Data BaseData Base
ProxyServerProxyServer
DNSServerDNS
Server
ADServer
ADServer
Policy
INTERNETINTERNET
Router
DNS (TCP/UDP 53)
HTTP (TCP 80)HTTPS (TCP443)
HTTPS (TCP 443)
GPO
Access List
Access List
ASA Out
ASA Internal
POP3 (TCP 110)SMTP (TCP 465)
Mail ServerMail ServerCerteficate ServerCerteficate Server
ServersServers
11
![Page 12: EISA (Enterprise Information Security Architecture) - detailed description of security processes and procedures to develop compliance with strategic goals](https://reader035.vdocument.in/reader035/viewer/2022081504/5697bfd21a28abf838caba05/html5/thumbnails/12.jpg)
RECEIPT, USE OF THE DIGITAL CERTIFICATE
12
![Page 13: EISA (Enterprise Information Security Architecture) - detailed description of security processes and procedures to develop compliance with strategic goals](https://reader035.vdocument.in/reader035/viewer/2022081504/5697bfd21a28abf838caba05/html5/thumbnails/13.jpg)
After conclusion of the contract with the State Treasury Agency, an organization’s email address receives an email with the link.
13
![Page 14: EISA (Enterprise Information Security Architecture) - detailed description of security processes and procedures to develop compliance with strategic goals](https://reader035.vdocument.in/reader035/viewer/2022081504/5697bfd21a28abf838caba05/html5/thumbnails/14.jpg)
Unique 7 digit number of the organization
14
![Page 15: EISA (Enterprise Information Security Architecture) - detailed description of security processes and procedures to develop compliance with strategic goals](https://reader035.vdocument.in/reader035/viewer/2022081504/5697bfd21a28abf838caba05/html5/thumbnails/15.jpg)
ID data is entered
15
![Page 16: EISA (Enterprise Information Security Architecture) - detailed description of security processes and procedures to develop compliance with strategic goals](https://reader035.vdocument.in/reader035/viewer/2022081504/5697bfd21a28abf838caba05/html5/thumbnails/16.jpg)
CERTIFICATE DOWNLOAD SECTIONAND SETUP MANUAL
User certificates setup
SC certificate setup
Setup manual
16
![Page 17: EISA (Enterprise Information Security Architecture) - detailed description of security processes and procedures to develop compliance with strategic goals](https://reader035.vdocument.in/reader035/viewer/2022081504/5697bfd21a28abf838caba05/html5/thumbnails/17.jpg)
After setting up the certificates, log on is done via a personal certificate.
17
![Page 18: EISA (Enterprise Information Security Architecture) - detailed description of security processes and procedures to develop compliance with strategic goals](https://reader035.vdocument.in/reader035/viewer/2022081504/5697bfd21a28abf838caba05/html5/thumbnails/18.jpg)
THANK YOU FOR ATTENTION!
18