moscow, 2007 okb sapr information security policy that accords protection okb sapr special design...

34
Moscow, 2007 OKB SAPR Information Security Policy that Accords Protection OKB SAPR Special Design Bureau for Computer-Aided Design www.accord.ru [email protected]

Upload: carmella-quinn

Post on 15-Jan-2016

226 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Moscow, 2007 OKB SAPR Information Security Policy that Accords Protection OKB SAPR Special Design Bureau for Computer-Aided Design  1@accord.ru

Moscow, 2007

OKB SAPR

Information Security Policythat Accords Protection

OKB SAPRSpecial Design Bureau for Computer-Aided Design

[email protected]

Page 2: Moscow, 2007 OKB SAPR Information Security Policy that Accords Protection OKB SAPR Special Design Bureau for Computer-Aided Design  1@accord.ru

A personal computer

is only an instrument.

Page 3: Moscow, 2007 OKB SAPR Information Security Policy that Accords Protection OKB SAPR Special Design Bureau for Computer-Aided Design  1@accord.ru

Are you sure that YOUR PC

is only YOUR instrument?

Page 4: Moscow, 2007 OKB SAPR Information Security Policy that Accords Protection OKB SAPR Special Design Bureau for Computer-Aided Design  1@accord.ru

Are you sure about it EACH TIME

that you turn it on?

Page 5: Moscow, 2007 OKB SAPR Information Security Policy that Accords Protection OKB SAPR Special Design Bureau for Computer-Aided Design  1@accord.ru

You need the assurance

no PC hardware has been changed;

no PC software has been changed; no data, stored on your PC, has been changed or became known to an intruder.

that while you were away

Page 6: Moscow, 2007 OKB SAPR Information Security Policy that Accords Protection OKB SAPR Special Design Bureau for Computer-Aided Design  1@accord.ru

The first task of information protection is

protecting your PC from an unauthorized access (UA).

Page 7: Moscow, 2007 OKB SAPR Information Security Policy that Accords Protection OKB SAPR Special Design Bureau for Computer-Aided Design  1@accord.ru

What should an UA protection tool be like?

Checking the integrity of the software environment with the help of some program — can we be sure in its own integrity?

First, we need to check that program.

And before that — check the program that is going to check it…

Page 8: Moscow, 2007 OKB SAPR Information Security Policy that Accords Protection OKB SAPR Special Design Bureau for Computer-Aided Design  1@accord.ru

Can you pull yourself out of a swamp?

You can.

If you have a support point, which is outside of the swamp.

What should an UA protection tool be like?

Page 9: Moscow, 2007 OKB SAPR Information Security Policy that Accords Protection OKB SAPR Special Design Bureau for Computer-Aided Design  1@accord.ru

What should an UA protection tool be like?

independent from the PC operating and file system

inaccessible for the introduction of modifications

hardware-based.

Page 10: Moscow, 2007 OKB SAPR Information Security Policy that Accords Protection OKB SAPR Special Design Bureau for Computer-Aided Design  1@accord.ru

At the end of last century, we have

developed a concept of hardware

protection and an data security system

(DSS),

which became and still remains a

standard for all of the developers.

Page 11: Moscow, 2007 OKB SAPR Information Security Policy that Accords Protection OKB SAPR Special Design Bureau for Computer-Aided Design  1@accord.ru

Provides a secure boot of the operating system, irrespective of its type, for an authenticated user.

Accord-TSHM:

Trusted Startup Hardware

Module

Page 12: Moscow, 2007 OKB SAPR Information Security Policy that Accords Protection OKB SAPR Special Design Bureau for Computer-Aided Design  1@accord.ru

What is secure boot?

the user identification/authentication.

integrity checking of the PC hardware and the software utilities, using a step-by-step integrity inspection algorithm; blocking the operating system boot from the external storage mediums;

The operating system boot is performed only after a successful completion of the following procedures:

Page 13: Moscow, 2007 OKB SAPR Information Security Policy that Accords Protection OKB SAPR Special Design Bureau for Computer-Aided Design  1@accord.ru

Accord-TSHM:

has been patented has 18 conformance certificates

and has about 200 000 implementations in the governmental authorities and commercial organizations.

Page 14: Moscow, 2007 OKB SAPR Information Security Policy that Accords Protection OKB SAPR Special Design Bureau for Computer-Aided Design  1@accord.ru

The main versions of Accord-TSHM include the controllers:

Accord-5MX,

Accord-5.5 with a powerful cryptographic subsystem.

for PCs with bussed interface PCI

Page 15: Moscow, 2007 OKB SAPR Information Security Policy that Accords Protection OKB SAPR Special Design Bureau for Computer-Aided Design  1@accord.ru

Accord-TSHM may also include the controllers:

Accord-5.5.e

for PCs with bussed interface PCI-Express;

Accord-5.5 mini-PCIfor notebooks and other computers with bussed interface mini-PCI;

Accord-5.5 mini-PCIefor PCs with mini-PCI-Express standard.

Page 16: Moscow, 2007 OKB SAPR Information Security Policy that Accords Protection OKB SAPR Special Design Bureau for Computer-Aided Design  1@accord.ru

Accord-TSHMAccord-6 controller-based

In addition to the Accord-5.5 characteristics, also has a hardware communication subsystem: Ethernet; USB-host and USB-slave.

Page 17: Moscow, 2007 OKB SAPR Information Security Policy that Accords Protection OKB SAPR Special Design Bureau for Computer-Aided Design  1@accord.ru

Individual packaging:

TM-identifiers (standard packaging),

smart-cards,

fingerprint reading devices,

PCDST (personal cryptographic data security tool) SHIPKA.

in accordance with the customer’s requirement, Accord-TSHM and Accord-TSHM-based systems may use various identifiers:

Page 18: Moscow, 2007 OKB SAPR Information Security Policy that Accords Protection OKB SAPR Special Design Bureau for Computer-Aided Design  1@accord.ru

introducing modification into the Accord-TSHM firmware is impossible;

the controller’s even log is accessible only to the information security administrator, that is why concealing an attempt of UA from him is impossible;

on the basis of Accord-TSHM, there have been developed the access delimitation and information protection control systems (when installing special software).

Reliability in an unreliable world:

Page 19: Moscow, 2007 OKB SAPR Information Security Policy that Accords Protection OKB SAPR Special Design Bureau for Computer-Aided Design  1@accord.ru

Information access isolation

Accord-1.95 – for the MS DOS, Windows 9x and Windows Millenium operating systems;

Accord-NT/2000 – for the Windows NT, Windows 2000, Windows XP, Windows 2003 and Vista operating systems;

is provided by the hardware/software complexes, based on Accord-TSHM and special software

Page 20: Moscow, 2007 OKB SAPR Information Security Policy that Accords Protection OKB SAPR Special Design Bureau for Computer-Aided Design  1@accord.ru

Data Security Management

is provided by the Accord-DAC (distributed audit and control) subsystem, which combines an information security administrator's workstation (ISA WKS) and workstations equipped with DSS (data security systems) belonging to the ACCORD family .

based on the protected network data exchange

Page 21: Moscow, 2007 OKB SAPR Information Security Policy that Accords Protection OKB SAPR Special Design Bureau for Computer-Aided Design  1@accord.ru

PERSONAL cryptographic data security tool (PCDST)

SHIPKA-1.5

OKB SAPRSpecial Design Bureau for Computer-Aided Design

[email protected]

Page 22: Moscow, 2007 OKB SAPR Information Security Policy that Accords Protection OKB SAPR Special Design Bureau for Computer-Aided Design  1@accord.ru

Ideal information interoperability:

Mobile User-friendly

and Protected

Page 23: Moscow, 2007 OKB SAPR Information Security Policy that Accords Protection OKB SAPR Special Design Bureau for Computer-Aided Design  1@accord.ru

Real life confronts you with an alternative:

Mobile User-friendly

OR Protected

Page 24: Moscow, 2007 OKB SAPR Information Security Policy that Accords Protection OKB SAPR Special Design Bureau for Computer-Aided Design  1@accord.ru

Of two evils choose the lesser!

Page 25: Moscow, 2007 OKB SAPR Information Security Policy that Accords Protection OKB SAPR Special Design Bureau for Computer-Aided Design  1@accord.ru

Of two evils choose the lesser!

Page 26: Moscow, 2007 OKB SAPR Information Security Policy that Accords Protection OKB SAPR Special Design Bureau for Computer-Aided Design  1@accord.ru

PCDST SHIPKA-1.5

Mobility: doesn’t require software installation from additional carriers; may be used at any PC, which has an USB-plug.

User-friendliness: doesn’t require cryptographic libraries installation on PC; provides safe storage and application of the personal confidential data; doesn’t require any special skills when operating on PC or in the Internet.

Protectability: hardware implementation of the cryptographic algorithms, protected random number generator, protected permanent memory, applying the keys without transferring them to PC.

Page 27: Moscow, 2007 OKB SAPR Information Security Policy that Accords Protection OKB SAPR Special Design Bureau for Computer-Aided Design  1@accord.ru

The advantages of using SHIPKA-1.5 as a smart-card

Being an USB-device (Vendor ID USB-association — 17e4), SHIPKA doesn’t require using the card-readers.

The characteristics of the SHIPKA-1.5 device are just as good as the characteristics of the smart-cards.

Using the device as a smart-card doesn’t exhaust the possibilities of PCDST SHIPKA-1.5.

Page 28: Moscow, 2007 OKB SAPR Information Security Policy that Accords Protection OKB SAPR Special Design Bureau for Computer-Aided Design  1@accord.ru

OKB SAPR solutions, using SHIPKA-1.5

for the encryption and/or signing of the files;

OKB SAPR offers using PCDST SHIPKA-1.5:

Page 29: Moscow, 2007 OKB SAPR Information Security Policy that Accords Protection OKB SAPR Special Design Bureau for Computer-Aided Design  1@accord.ru

OKB SAPR solutions, using SHIPKA-1.5

for the automatic filling of the WEB-forms of various WEB-services and for storing passwords and other data, required for that;

OKB SAPR offers using PCDST SHIPKA-1.5:

Page 30: Moscow, 2007 OKB SAPR Information Security Policy that Accords Protection OKB SAPR Special Design Bureau for Computer-Aided Design  1@accord.ru

OKB SAPR solutions, using SHIPKA-1.5

for the hardware identification and authentication on PCs and notebooks when booting OS Windows, as well as in the terminal solutions;

OKB SAPR offers using PCDST SHIPKA-1.5:

Page 31: Moscow, 2007 OKB SAPR Information Security Policy that Accords Protection OKB SAPR Special Design Bureau for Computer-Aided Design  1@accord.ru

OKB SAPR solutions, using SHIPKA-1.5

as a keys storage and a hardware-based random number monitor for the cryptographic applications;

OKB SAPR offers using PCDST SHIPKA-1.5:

Page 32: Moscow, 2007 OKB SAPR Information Security Policy that Accords Protection OKB SAPR Special Design Bureau for Computer-Aided Design  1@accord.ru

OKB SAPR solutions, using SHIPKA-1.5

as a “smart-card” in the template solutions, for example, the authorization when entering the Windows domain, encryption and/or signing of the messages in the mail programs (Outlook Express and so on), for obtaining the Verification Center certificates;

OKB SAPR offers using PCDST SHIPKA-1.5:

Page 33: Moscow, 2007 OKB SAPR Information Security Policy that Accords Protection OKB SAPR Special Design Bureau for Computer-Aided Design  1@accord.ru

PCCARDExpressCardCompact Flash

Today PCDST SHIPKA is not only USB-device

But also

Page 34: Moscow, 2007 OKB SAPR Information Security Policy that Accords Protection OKB SAPR Special Design Bureau for Computer-Aided Design  1@accord.ru

Moscow, 2007

OKB SAPR

Information Security Policythat Accords Protection

OKB SAPRSpecial Design Bureau for Computer-Aided Design

[email protected]