protecting your ip with perforce helix and interset

25
Protecting Your IP with Perforce Helix and Interset Charles McLouth Mark Bennett Kima Hayuk

Upload: perforce

Post on 18-Feb-2017

205 views

Category:

Software


0 download

TRANSCRIPT

Page 1: Protecting Your IP with Perforce Helix and Interset

Protecting Your IP with Perforce Helix and IntersetCharles McLouthMark BennettKima Hayuk

Page 2: Protecting Your IP with Perforce Helix and Interset

2

Introductions

Charles McLouth• Director of Technical Sales, Perforce

Mark Bennet• Vice President, Interset

Kima Hayuk• IP Protection Program Manager, Electronic Arts

Page 3: Protecting Your IP with Perforce Helix and Interset

3

Agenda

Review Helix features for Security

Review capabilities of Interset Threat Detection

Review real world case studies

A Customer’s perspective

Page 4: Protecting Your IP with Perforce Helix and Interset

4

Helix Features for Security

Server Security Levels• Level 3 – Ticket-based authentication (p4 login)• Level 4 – Level 3 plus Service Users required for service users

Strong passwords – At least two of the following:• The password contains uppercase letters. • The password contains lowercase letters. • The password contains nonalphabetic characters.

Page 5: Protecting Your IP with Perforce Helix and Interset

5

Protections

Rules for Access

Page 6: Protecting Your IP with Perforce Helix and Interset

6

Protections

Apply to User or Group

Page 7: Protecting Your IP with Perforce Helix and Interset

7

Protections

Grant/Restrict to a pattern or specific file

Page 8: Protecting Your IP with Perforce Helix and Interset

8

Protections

Grant/Restrict to a specific IP Address or Range

Page 9: Protecting Your IP with Perforce Helix and Interset

9

LDAP

Delegate Authentication to LDAP

LDAP / Active

Directory

Page 10: Protecting Your IP with Perforce Helix and Interset

10

LDAP

Delegate Authentication to LDAP

LDAP / Active

Directory

P4-Developers P4-Developers

Page 11: Protecting Your IP with Perforce Helix and Interset

Interset Threat Detection

Page 12: Protecting Your IP with Perforce Helix and Interset

Behavioral Analytics: Remove Noise, Focus On The Real Threat

Cover More Use Cases• Compromised Accounts• Insider Threat• Negligent User• Data At Risk, Data Theft

Focus on Highest Risks• Highest risk data assets• Highest risk machines &

devices• Highest risk users/accounts• Riskiest applications running

React Quickly• Immediate incident context• Rapid incident exploration• Flexible, multi-purpose workflow• Integrate into existing IR

process

Visi

bilit

yA

ccur

acy

Res

pons

e

Page 13: Protecting Your IP with Perforce Helix and Interset

Visibility: Visualizing the Attach Path

• Authentication Data• Account

Compromise

Stage: Establish Foothold, Escalate Privileges

• Repository Access & Usage Data• Account

Compromise

• Insider Threat

Stage: Internal Recon

• Data Movement• Insider Threat

• Account Compromise

• Data Movement/Theft

Stage: Stage & Exfiltrate Data

Page 14: Protecting Your IP with Perforce Helix and Interset

46

80

99

Accuracy: Visualize Attack Path, Analytics Assigning Risk

Security Operations Centre

Escalate Investigate Remediate

Page 15: Protecting Your IP with Perforce Helix and Interset

UBA is fast, accurate, and actionable

SIEM

Endpoints

AD/LDAP Connectors

ActionableInformation

SIEM

Scalable Big-Data PlatformCloud, Hybrid, or On-Premise Delivery

Security Operations• Incident context• Accounts at risk• Data at riskIT Operations• System impact• Operational riskInvestigators• Incident context• Event level record• Data compromiseHuman Resources• Employee involved• Leaver theft• Watch listLegal• Incident alert• Incident context

Data Acquisition Incident ResponseAnalysis

File 1871.3XAT

User 277

Machine HK4M

CORRELATE BASELINE ANALYZE EXPLORE

UBA PLATFORM

Structured Data

Extensible Analytics Engine

IP Repository Connectors

Page 16: Protecting Your IP with Perforce Helix and Interset

Real World Examples

Page 17: Protecting Your IP with Perforce Helix and Interset

17

A Customer Case Study

Page 18: Protecting Your IP with Perforce Helix and Interset

18

Page 19: Protecting Your IP with Perforce Helix and Interset

19

Page 20: Protecting Your IP with Perforce Helix and Interset

20

Page 21: Protecting Your IP with Perforce Helix and Interset

21

Managing Risk in the Enterprise

A Customer Perspective: Electronic ArtsKima Hayuk, IP Protection Program Manager

• EA Security & Risk Management • 18 Year EA Veteran of QA, CE & Studio Operations

• Governance: Policies & Standards• Employee Training & Awareness• Internal Security Consultant: Tools & Process• Compliance Assessment Officer• IP Related Incident Response

Page 22: Protecting Your IP with Perforce Helix and Interset

22

Managing Risk in the Enterprise

Electronic Arts: An IP-centric Organization• Growth by Merger & Acquisition• Heterogeneous Cultural Norms & Technology Adoption

The Challenge: How to manage IP risk while supporting• Culture of Creativity & Innovation• Globally Distributed Development• Inter-Studio Collaboration and Knowledge Transfer• Highly Dynamic & Mobile Workforce

Page 23: Protecting Your IP with Perforce Helix and Interset

23

Managing Risk in the Enterprise

Standardization & Centralization – Consider Perforce as Single System• Operating Systems, Virtual Machines, Security Controls• Authentication, Scanning, Vulnerability Patching• System & Application Monitoring• Access Request, Approval & Management

Holistic Perspective – Protect everything with access to Perforce• Secure Development Environment – Upstream & Downstream Systems• Network Segmentation - between & within game teams• Endpoint Protection – secure client workspace

Enable Best Practices & Automation – Dev Teams as Partners• Facilitate user access reviews by information owners• Automate access provisioning & deprovisioning• Identify & Investigate Anomalous User Behavior

Page 24: Protecting Your IP with Perforce Helix and Interset

24

Managing Risk in the Enterprise

User Behavior Analytics for Insider Threat Detection Mandated by Policy but Difficult to Accomplish

Helix Threat Detection Deployed at EA after successful Proof of Concept Relatively Easy & Quick to Deploy Challenge in Complying with Privacy Regulations Operationalized within BSOC w/ Escalations Integration with other Security Tools