Top Banner
Security Strategy for a Biometrics Deployment Catherine Allan, M.A., CISSP, CD Allan Security and Privacy Consulting Inc.
18

Enhancing Information Systems Security Through Biometrics October 2004 Security Strategy for a Biometrics Deployment Catherine Allan, M.A., CISSP, CD Allan.

Dec 24, 2015

Download

Documents

Philip Mills
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Enhancing Information Systems Security Through Biometrics October 2004 Security Strategy for a Biometrics Deployment Catherine Allan, M.A., CISSP, CD Allan.

Security Strategy for a Biometrics Deployment

Catherine Allan, M.A., CISSP, CDAllan Security and Privacy Consulting Inc.

Page 2: Enhancing Information Systems Security Through Biometrics October 2004 Security Strategy for a Biometrics Deployment Catherine Allan, M.A., CISSP, CD Allan.

Agenda

• Context• Issues• Assets• Principal Threats• Security Requirements• Security Model• Security Risk

Management Strategy

Page 3: Enhancing Information Systems Security Through Biometrics October 2004 Security Strategy for a Biometrics Deployment Catherine Allan, M.A., CISSP, CD Allan.

Why a security strategy?

• Complexity and scope• Status of study• Performance of

technology• Decisions

Page 4: Enhancing Information Systems Security Through Biometrics October 2004 Security Strategy for a Biometrics Deployment Catherine Allan, M.A., CISSP, CD Allan.

Context: Multiple Applications

• User communities• User continuum• Documents

Page 5: Enhancing Information Systems Security Through Biometrics October 2004 Security Strategy for a Biometrics Deployment Catherine Allan, M.A., CISSP, CD Allan.

Context: Business Drivers

• Document integrity• Identity management

across programs

Page 6: Enhancing Information Systems Security Through Biometrics October 2004 Security Strategy for a Biometrics Deployment Catherine Allan, M.A., CISSP, CD Allan.

Context: The Challenge

• Technology study• Business

requirements• Real world

deployments• Scope• Complexity

Page 7: Enhancing Information Systems Security Through Biometrics October 2004 Security Strategy for a Biometrics Deployment Catherine Allan, M.A., CISSP, CD Allan.

Issues

• Facilitation versus Security

• Enrolment• Client diversity• Entitlements

Page 8: Enhancing Information Systems Security Through Biometrics October 2004 Security Strategy for a Biometrics Deployment Catherine Allan, M.A., CISSP, CD Allan.

Assets

• Reference biometrics• System(s) that use

biometrics• Programs

Page 9: Enhancing Information Systems Security Through Biometrics October 2004 Security Strategy for a Biometrics Deployment Catherine Allan, M.A., CISSP, CD Allan.

Principal Threats

• Counterfeit and altered documents

• Improperly obtained and issued

• Impostors

Page 10: Enhancing Information Systems Security Through Biometrics October 2004 Security Strategy for a Biometrics Deployment Catherine Allan, M.A., CISSP, CD Allan.

Security Requirements

• Reference biometrics– Authenticity– Availability– Confidentiality

• Technology and Processes– Enrolment– Identification– Verification

Page 11: Enhancing Information Systems Security Through Biometrics October 2004 Security Strategy for a Biometrics Deployment Catherine Allan, M.A., CISSP, CD Allan.

Security Requirements

• Program integrity– Technology

performance– Uses– Client continuum

Page 12: Enhancing Information Systems Security Through Biometrics October 2004 Security Strategy for a Biometrics Deployment Catherine Allan, M.A., CISSP, CD Allan.

Security Model

Program Integrity

Systems and processes

Reference biometrics

A S S

E T

S

Page 13: Enhancing Information Systems Security Through Biometrics October 2004 Security Strategy for a Biometrics Deployment Catherine Allan, M.A., CISSP, CD Allan.

Security Model

Impact of Safeguards

Business/ Technology

Match

Program Integrity

Systems and processes

Reference biometrics

A S S

E T

S

Page 14: Enhancing Information Systems Security Through Biometrics October 2004 Security Strategy for a Biometrics Deployment Catherine Allan, M.A., CISSP, CD Allan.

Security RM Strategy

Programs

Client Continuum

Systems and Processes

Reference Biometrics

Page 15: Enhancing Information Systems Security Through Biometrics October 2004 Security Strategy for a Biometrics Deployment Catherine Allan, M.A., CISSP, CD Allan.

Security RM Strategy

Programs

Client Continuum

Systems and Processes

Reference Biometrics

Test: Accuracy, Functionality, Performance …

Design, Functionality, Safeguards …

Cross Program Requirements:

Facilitation, Life Cycle ….

Page 16: Enhancing Information Systems Security Through Biometrics October 2004 Security Strategy for a Biometrics Deployment Catherine Allan, M.A., CISSP, CD Allan.

Security RM Strategy

Programs

Client Continuum

Systems and Processes

Reference Biometrics

Security Plan

System TRAs

TRAs

Test: Accuracy, Functionality, Performance …

Design, Functionality, Safeguards …

Cross Program Requirements:

Facilitation, Life Cycle ….

RM Continuum

Page 17: Enhancing Information Systems Security Through Biometrics October 2004 Security Strategy for a Biometrics Deployment Catherine Allan, M.A., CISSP, CD Allan.

Conclusions

• Aim and objectives• Technology• Strategy versus

tactics

Page 18: Enhancing Information Systems Security Through Biometrics October 2004 Security Strategy for a Biometrics Deployment Catherine Allan, M.A., CISSP, CD Allan.

Questions?