Top Banner
1 Identifying and Encrypting Personal Information Using Cornell Spider and Pointsec for PC Benjamin Stein Doreen Meyer [email protected]
41

1 Identifying and Encrypting Personal Information Using Cornell Spider and Pointsec for PC Benjamin Stein Doreen Meyer [email protected].

Mar 29, 2015

Download

Documents

Sharon Kimpton
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: 1 Identifying and Encrypting Personal Information Using Cornell Spider and Pointsec for PC Benjamin Stein Doreen Meyer cybersecurity@ucdavis.edu.

1

Identifying and Encrypting Personal Information

Using Cornell Spider and

Pointsec for PC

Benjamin Stein

Doreen Meyer

[email protected]

Page 2: 1 Identifying and Encrypting Personal Information Using Cornell Spider and Pointsec for PC Benjamin Stein Doreen Meyer cybersecurity@ucdavis.edu.

2

Overview

• What is personal information?• Searching for personal information using Cornell

Spider• Mitigating risk of exposure of personal

information• Encryption Policy, Encryption Options• Whole disk encryption using Pointsec for PC• Questions

Page 3: 1 Identifying and Encrypting Personal Information Using Cornell Spider and Pointsec for PC Benjamin Stein Doreen Meyer cybersecurity@ucdavis.edu.

Personal Information and HIPAA

• HIPAA: Health Information Portability and Accountability Act

• Psychological Services• Medical Records• http://www.hhs.gov/ocr/hipaa/

3

Page 4: 1 Identifying and Encrypting Personal Information Using Cornell Spider and Pointsec for PC Benjamin Stein Doreen Meyer cybersecurity@ucdavis.edu.

Personal Information: CA SB1386 and Civil Code 1798

• Account access number and password• Bank/financial account number• California identification card number• Credit/debit card number• Driver’s license number• Social Security number• http://www.privacy.ca.gov/code/ipa.htm

4

Page 5: 1 Identifying and Encrypting Personal Information Using Cornell Spider and Pointsec for PC Benjamin Stein Doreen Meyer cybersecurity@ucdavis.edu.

Personal Information: FERPA

• Family Education Rights and Privacy Act of 1974 (FERPA)

• Class level, class schedule, academic status, grades, instructors, transcripts

• Student ID number, Social Security number• Fees paid, loan collection records, financial aid

records, etc.• http://www.ed.gov/policy/gen/guid/fpco/ferpa/ind

ex.html

5

Page 6: 1 Identifying and Encrypting Personal Information Using Cornell Spider and Pointsec for PC Benjamin Stein Doreen Meyer cybersecurity@ucdavis.edu.

Searching for personal information

• Data focus: credit card numbers and Social Security numbers

• UCD supported products: Cornell Spider and PowerGREP

6

Page 7: 1 Identifying and Encrypting Personal Information Using Cornell Spider and Pointsec for PC Benjamin Stein Doreen Meyer cybersecurity@ucdavis.edu.

Mitigating Risk of Exposure of Personal Information

• Higher cost (time, tools) for administering a system containing personal information.

• IET supports the Cyber-safety program and a number of tools that assist in protecting personal information, including Tripwire, Spider/PowerGREP, self-directed Nessus scans, and Pointsec.

7

Page 8: 1 Identifying and Encrypting Personal Information Using Cornell Spider and Pointsec for PC Benjamin Stein Doreen Meyer cybersecurity@ucdavis.edu.

Maintain a list of systems containing sensitive data

• Catalog the system name, IP, owner, type of service running on the system, type of sensitive data residing on the system

• Share this information with the technical support staff and the unit administrative managers

• Confirm and update this information on a regular basis

8

Page 9: 1 Identifying and Encrypting Personal Information Using Cornell Spider and Pointsec for PC Benjamin Stein Doreen Meyer cybersecurity@ucdavis.edu.

Monitor when the data is accessed or modified

• Use Tripwire to identify file and directory changes.

• Write logs to a central logging server (syslogng, snare, MOM).

• Turn on auditing of successful and unsuccessful logins.

• Read your logs on a regular basis.

9

Page 10: 1 Identifying and Encrypting Personal Information Using Cornell Spider and Pointsec for PC Benjamin Stein Doreen Meyer cybersecurity@ucdavis.edu.

Restrict access to the system and its sensitive data

• No group accounts (cannot audit access)• Access system and data using encrypted

protocols such as ssh (sftp, scp), ssl (https), rdp, ipsec

• Evaluate physical security• Use host-based and hardware firewalls

10

Page 11: 1 Identifying and Encrypting Personal Information Using Cornell Spider and Pointsec for PC Benjamin Stein Doreen Meyer cybersecurity@ucdavis.edu.

Use, share, or transfer restricted data in a safe manner

• Do not use email to send unencrypted restricted data.

• Do not use restricted data as a key in a database.

• Do not use restricted data on a test or development system.

• When sharing restricted data, ensure that users are aware that the data should be handled carefully and in compliance with policies.

11

Page 12: 1 Identifying and Encrypting Personal Information Using Cornell Spider and Pointsec for PC Benjamin Stein Doreen Meyer cybersecurity@ucdavis.edu.

Cornell Spider Demo

12

Page 13: 1 Identifying and Encrypting Personal Information Using Cornell Spider and Pointsec for PC Benjamin Stein Doreen Meyer cybersecurity@ucdavis.edu.

Encryption Policy

• UC Davis whole disk encryption policy draft: http://security.ucdavis.edu/encryption_policydraft.pdf

• UCOP protection of personal information policies: http://www.ucop.edu/irc/itsec/infoprotect.html

13

Page 14: 1 Identifying and Encrypting Personal Information Using Cornell Spider and Pointsec for PC Benjamin Stein Doreen Meyer cybersecurity@ucdavis.edu.

Encryption Options

• Windows OS

14

TASK Product Central Key

Whole disk encryption

Pointsec for PC Yes

Files and directories

Pointsec ME, standalone EFS

No

Files and directories

Active directory EFS

Yes

Files and directories

truecrypt No

Whole disk encryption for Vista

bitlocker No ?

Page 15: 1 Identifying and Encrypting Personal Information Using Cornell Spider and Pointsec for PC Benjamin Stein Doreen Meyer cybersecurity@ucdavis.edu.

Encryption Options

• Mac OSX

15

Task Product Central Key

Encrypt home directory as a single encrypted disk image

FileVault No

Whole disk encryption or file encryption

Commercial PGP Yes

Whole disk encryption or file encryption

gnupg No

Page 16: 1 Identifying and Encrypting Personal Information Using Cornell Spider and Pointsec for PC Benjamin Stein Doreen Meyer cybersecurity@ucdavis.edu.

Encryption Options

• Linux

16

Task Product Central Key

Whole disk encryption

Pointsec for Linux Yes

Whole disk encryption, files and directories

Commercial PGP Yes

Whole disk encryption, files and directories

gnupg No

Page 17: 1 Identifying and Encrypting Personal Information Using Cornell Spider and Pointsec for PC Benjamin Stein Doreen Meyer cybersecurity@ucdavis.edu.

Pointsec for PC at UCD

• http://security.ucdavis.edu/encryption.cfm

17

Page 18: 1 Identifying and Encrypting Personal Information Using Cornell Spider and Pointsec for PC Benjamin Stein Doreen Meyer cybersecurity@ucdavis.edu.

18

Pointsec for PC

• If a drive is lost or stolen, the encrypted partitions and everything on them are reasonably secure.

• Meets certain legal requirements

Page 19: 1 Identifying and Encrypting Personal Information Using Cornell Spider and Pointsec for PC Benjamin Stein Doreen Meyer cybersecurity@ucdavis.edu.

19

What it isn’t

• Pointsec for PC is not a complete encryption solution– Currently limited to 2000 and XP– Only encrypts partitions– Does not encrypt network drives

Page 20: 1 Identifying and Encrypting Personal Information Using Cornell Spider and Pointsec for PC Benjamin Stein Doreen Meyer cybersecurity@ucdavis.edu.

20

Features

• Whole disk encryption• Multiple user access• Configuration options• Recovery tools• Enterprise management

– Logging– Enforceable policies– Permissions

Page 21: 1 Identifying and Encrypting Personal Information Using Cornell Spider and Pointsec for PC Benjamin Stein Doreen Meyer cybersecurity@ucdavis.edu.

21

Experience

• Login screen at boot• System tray icon• Transparent to OS• Minimal performance impact

Page 22: 1 Identifying and Encrypting Personal Information Using Cornell Spider and Pointsec for PC Benjamin Stein Doreen Meyer cybersecurity@ucdavis.edu.

22

Example:

Page 23: 1 Identifying and Encrypting Personal Information Using Cornell Spider and Pointsec for PC Benjamin Stein Doreen Meyer cybersecurity@ucdavis.edu.

23

Page 24: 1 Identifying and Encrypting Personal Information Using Cornell Spider and Pointsec for PC Benjamin Stein Doreen Meyer cybersecurity@ucdavis.edu.

System Tray Icon:

• While encrypting:

• Fully encrypted:

24

Page 25: 1 Identifying and Encrypting Personal Information Using Cornell Spider and Pointsec for PC Benjamin Stein Doreen Meyer cybersecurity@ucdavis.edu.

25

How to install

• Available to individuals and departments• Check requirements• Request license from IET Security• Decide on default or custom configuration• Get install media• Return recovery file• After encryption completes return log file

Page 26: 1 Identifying and Encrypting Personal Information Using Cornell Spider and Pointsec for PC Benjamin Stein Doreen Meyer cybersecurity@ucdavis.edu.

26

Requirements

• Windows 2000, XP and Vista soon• No dual boot• No servers• No fancy disk configurations

Page 27: 1 Identifying and Encrypting Personal Information Using Cornell Spider and Pointsec for PC Benjamin Stein Doreen Meyer cybersecurity@ucdavis.edu.

27

Preparing the System

• Backup!• Defrag• Scan for viruses, etc• Uninstall and disable the unnecessary

services• Check the disk(s)

Page 28: 1 Identifying and Encrypting Personal Information Using Cornell Spider and Pointsec for PC Benjamin Stein Doreen Meyer cybersecurity@ucdavis.edu.

28

Installing the Software

• Use administrative account• Launch installer• Reboot • Login to Pointsec• Login to OS • Grab recovery file• Encryption begins

Page 29: 1 Identifying and Encrypting Personal Information Using Cornell Spider and Pointsec for PC Benjamin Stein Doreen Meyer cybersecurity@ucdavis.edu.

Demo

29

Page 30: 1 Identifying and Encrypting Personal Information Using Cornell Spider and Pointsec for PC Benjamin Stein Doreen Meyer cybersecurity@ucdavis.edu.

30

Encryption Process

• Encryption proceeds at 10-20GB/hr• Depends on disk size not amount of data• System can be used, shut down or

rebooted• After encryption completed grab log file

Page 31: 1 Identifying and Encrypting Personal Information Using Cornell Spider and Pointsec for PC Benjamin Stein Doreen Meyer cybersecurity@ucdavis.edu.

31

Support

• Remote password reset• Managing users• Uninstall• Updates and upgrades• Recovery disk• Bart’s disk

Page 32: 1 Identifying and Encrypting Personal Information Using Cornell Spider and Pointsec for PC Benjamin Stein Doreen Meyer cybersecurity@ucdavis.edu.

34

Managing Users

• Types of users– Normal, Service, Temp

• Types of permissions– Privileged and plain permissions

• Creating additional users

Page 33: 1 Identifying and Encrypting Personal Information Using Cornell Spider and Pointsec for PC Benjamin Stein Doreen Meyer cybersecurity@ucdavis.edu.

35

Uninstall

• Requires two accounts with rights

• Can be faster to clone or recover than decrypt

Page 34: 1 Identifying and Encrypting Personal Information Using Cornell Spider and Pointsec for PC Benjamin Stein Doreen Meyer cybersecurity@ucdavis.edu.

36

Updates, Upgrades and Reinstalls

• Updates– Change users, passwords, certs or settings

• Upgrades– Major product upgrade?

• Reinstalls– Add additional partitions or disks

Page 35: 1 Identifying and Encrypting Personal Information Using Cornell Spider and Pointsec for PC Benjamin Stein Doreen Meyer cybersecurity@ucdavis.edu.

37

Recovery Disk

• Create from recovery file or target computer

• Requires two admin accounts

• Decrypts

Page 36: 1 Identifying and Encrypting Personal Information Using Cornell Spider and Pointsec for PC Benjamin Stein Doreen Meyer cybersecurity@ucdavis.edu.

38

Bart’s PE with Plug-in

• Requires version specific plug-in

• Must boot and login

• Ctrl + F10 for alternative boot menu

• Bart’s then has full access to disk

Page 37: 1 Identifying and Encrypting Personal Information Using Cornell Spider and Pointsec for PC Benjamin Stein Doreen Meyer cybersecurity@ucdavis.edu.

39

Customizing

• Default configuration will meet most needs, however, there are lots of options…

• Configuration worksheet

• Alternative profiles

Page 38: 1 Identifying and Encrypting Personal Information Using Cornell Spider and Pointsec for PC Benjamin Stein Doreen Meyer cybersecurity@ucdavis.edu.

42

Review

• Whole Disk Encryption• Low overhead• Quick default install• Support options• Highly customizable

Page 39: 1 Identifying and Encrypting Personal Information Using Cornell Spider and Pointsec for PC Benjamin Stein Doreen Meyer cybersecurity@ucdavis.edu.

43

Additional Resources

• Product documentation

• Pointsec 24 x 7 tech support

• IET: [email protected]

Page 40: 1 Identifying and Encrypting Personal Information Using Cornell Spider and Pointsec for PC Benjamin Stein Doreen Meyer cybersecurity@ucdavis.edu.

Questions & Answers

44

Page 41: 1 Identifying and Encrypting Personal Information Using Cornell Spider and Pointsec for PC Benjamin Stein Doreen Meyer cybersecurity@ucdavis.edu.

45