1 / 5

Secure Data Sharing

Secure Data Sharing. What is it Where is it What is the Risk Strategic What Policy should be enforced How can the process be Audited Ongoing Process of Sharing Data Tactical Manage Removable Media Encrypt mobile data Provide users with relevant Policy excerpts and Audit acceptance.

madelene
Download Presentation

Secure Data Sharing

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Secure Data Sharing • What is it • Where is it • What is the Risk • Strategic • What Policy should be enforced • How can the process be Audited • Ongoing Process of Sharing Data • Tactical • Manage Removable Media • Encrypt mobile data • Provide users with relevant Policy excerpts and Audit acceptance

  2. Compliance Policy Monitoring Incident Response Event Management Access Control Identity Management Threat Management

  3. Identify Security Drivers Strategy Define Policy & Classify Discover Data Assess Risk Identify Control Gaps Data Strategy

  4. 2 13 10 12 1 9 11 4 5 6 7 8 3 Data stored on disks Database instances Collaboration on Portals Transformed data on file shares Transformed data emailed & on exchange srv Tape Backups Removable and Printed media Application Data Data in transit across WANs Transformed Data on End Points Data sent/stored on public infrastructure Replicated DB for DR, bulk analysis Disk Backups End Point Network Application DB/FS Storage Replicated Database Bulk Analysis Disk Storage WAN LAN Other Campuses & Data Centers Database Enterprise App Disk Storage Backup Tape Database Custom App Disk Storage Backup Exchange Server Disk Storage Internet Backup Disk Disk Storage File Server Portals Disk Storage Restricted Data Internal Data Public Data Discover Data Identify Security Drivers Define Policy & Classify Discover Data Assess Risk Identify Control Gaps

  5. End Point Network Application DB/FS Storage X 3 3 4 4 1 1 Threat Packets sniffed in transit Packets sniffed intransit 7 7 Privileged User Breach DBA/FSA Privileged User Breach DBA/FSA Media lost or stolen Media lost or stolen Privileged User Breach Privileged User Breach Replicated Database Bulk Analysis Disk Storage 5 5 WAN LAN Database/File Server Hack Database/File Server Hack 13 13 2 2 Other Campuses & Data Centers Physical theft of media or lost media exploited Physical theft of media or lost media exploited Discarded media exploited Discarded media exploited Database Enterprise App Disk Storage 15 15 Backup Tape Trojans / Key Loggers Trojans / Key Loggers 8 8 Application Hack Application Hack Database Custom App Disk Storage Backup 9 9 (Semi) Trusted User Misuse (Semi) Trusted User Misuse Exchange Server Disk Storage Internet Backup Disk 10 10 3 3 11 Unintentional Distribution Unintentional Distribution Packets sniffed in transit Packets sniffed in transit Network Leak Email-IM-HTTP-FTP-etc. Disk Storage File Server 6 6 14 11 Unintentional Distribution Unintentional Distribution End Point Leak print-copy-xform Network Leak Email-IM-HTTP-FTP-etc. 14 End Point Leak print-copy-xform High Risk Medium Risk 12 12 Low Risk Public Infrastructure Access Hack Public Infrastructure Access Hack Portals Disk Storage Assess Risk Identify Security Drivers Define Policy & Classify Discover Data Assess Risk Identify Control Gaps

More Related