uw desktop encryption project uw's approach to data encryption

44
UW Desktop Encryption Project UW’s approach to data encryption

Upload: technical-dude

Post on 15-Jun-2015

536 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: UW Desktop Encryption Project UW's approach to data encryption

UW Desktop Encryption Project

UW’s approach to data encryption

Page 2: UW Desktop Encryption Project UW's approach to data encryption

Introductions

• Allen Monette - Security Coordinator

• Linda Pruss – Security Engineer

Page 3: UW Desktop Encryption Project UW's approach to data encryption

AGENDA

• Overview of technology

• Endpoint Encryption Project

• Challenges/Issues

• What’s next

Page 4: UW Desktop Encryption Project UW's approach to data encryption

Effective Practices for Restricted Data HandlingRisk Reduction Strategy

OR

ORTHEN

Risk Reduction Strategies Risk Assessment

Page 5: UW Desktop Encryption Project UW's approach to data encryption

Why Encryption?

Page 6: UW Desktop Encryption Project UW's approach to data encryption

It’s 3am…

Do you know where your laptops are?

Full Disk Encryption protects against lost devices

Page 7: UW Desktop Encryption Project UW's approach to data encryption

Would you trust…

this guy with your files?

File and Folder Encryption protects specific data

Page 8: UW Desktop Encryption Project UW's approach to data encryption

How does it work?

Page 9: UW Desktop Encryption Project UW's approach to data encryption

File encryption

Think of file encryption as a secret code

A simple code:A=0B=1C=2D=3Etc

A message:7 4 11 11 1422 14 17 11 3

Page 10: UW Desktop Encryption Project UW's approach to data encryption

Folder encryption

Think of folder encryption as a safe deposit box

Page 11: UW Desktop Encryption Project UW's approach to data encryption

Full Disk Encryption

Think of Full Disk Encryption like a bank vault

Page 12: UW Desktop Encryption Project UW's approach to data encryption

How does it really work?

Page 13: UW Desktop Encryption Project UW's approach to data encryption

File and folder Encryption

• Encrypts individual files or entire folders• Requires authentication to decrypt and access the

files

Page 14: UW Desktop Encryption Project UW's approach to data encryption

Full Disk Encryption

• Replaces the master boot record with a special pre-boot environment

• Encrypts the entire hard drive• Preboot Authentication plus OS authentication• Decrypts as files are used

Page 15: UW Desktop Encryption Project UW's approach to data encryption

How to choose between Full Disk and File/Folder?

Page 16: UW Desktop Encryption Project UW's approach to data encryption

When to use Full Disk Encryption

Full Disk Encryption protects against lost devices

Page 17: UW Desktop Encryption Project UW's approach to data encryption

When to use file/folder

• Need an additional layer of security• Need portability• Need to support removable media

Page 18: UW Desktop Encryption Project UW's approach to data encryption

Endpoint Encryption Project

Page 19: UW Desktop Encryption Project UW's approach to data encryption

Charter

• To research tools and methods for encrypting data on desktops and laptops so that risk is reduced if a computer storing restricted data is lost, stolen, compromised or disposed of improperly.

• Deliverables are :

1) recommend a product for pilot 2) pilot the product3) recommend final product to sponsors

Page 20: UW Desktop Encryption Project UW's approach to data encryption

Scope

• Common desktops operating systems– Macintosh and Windows

• Full disk and file/directory level encryption

• Removable media devices – USB drives, CDRW

• Managed (IT administered) and unmanaged (self-administered) systems

Page 21: UW Desktop Encryption Project UW's approach to data encryption

Out of scope

• Encryption of Linux OS, handhelds or smart phones

• Hardware encryption• Database encryption• Encryption of server-based solutions• Secure transmission • Secure printing

Page 22: UW Desktop Encryption Project UW's approach to data encryption

Out of scope

• End user education

• Best practices

• Support infrastructure

• Policy work

Page 23: UW Desktop Encryption Project UW's approach to data encryption

Approach

• Define the project

• Get Smart!– Product and Market Analysis– Requirements Gathering

Page 24: UW Desktop Encryption Project UW's approach to data encryption

Get Smart!

• Team knowledge and research• NIST document (800-111) – Nov, 2007

– Guide to Storage Encryption Technologies for end user devices

– http://csrc.nist.gov/publications/nistpubs/800-111/SP800-111.pdf

• Campus forum• Leverage others work

Page 25: UW Desktop Encryption Project UW's approach to data encryption

Market AnalysisSource: Gartner GroupFull report at: http://mediaproducts.gartner.com/reprints/credant/151075.html

Page 26: UW Desktop Encryption Project UW's approach to data encryption

Requirements

• Device support– Windows … all flavors– Macintosh – Linux– Smart Phone/Handheld

• Industry Standard Encryption– AES 256– FIPS certified

Page 27: UW Desktop Encryption Project UW's approach to data encryption

Requirements

• Key Management– Key backup/escrow mechanisms– Key recovery mechanisms– Key generation mechanisms

• Removable Media support– USB disks, etc– CD R/W

Page 28: UW Desktop Encryption Project UW's approach to data encryption

Requirements

• Management Capabilities– Centrally managed

• Provide service to campus departments

– Cooperatively managed • Delegated management

– Delegated management• IT managed • UW campus or IT department

– Unmanaged• Self-managed

Page 29: UW Desktop Encryption Project UW's approach to data encryption

Requirements

• Directory Integration– Diversity on our campuses– The more varieties the better

• File and Folder encryption– Don’t want to support multiple product

• Leverage our Public Key Infrastructure– Strong AuthN

Page 30: UW Desktop Encryption Project UW's approach to data encryption

Approach

• Define the project

• Get Smart!– Product and Market Analysis– Requirements Gathering

• Mapped Solutions to Requirements– Reduce possible solutions to 9

Page 31: UW Desktop Encryption Project UW's approach to data encryption

Approach

• Define the project• Get Smart!

– Product and Market Analysis– Requirements Gathering

• Mapped Solutions to Requirements– Reduce possible solutions to 9

• Team Test of top 2 products

Page 32: UW Desktop Encryption Project UW's approach to data encryption

Product Selected

SafeBoot– http://www.safeboot.com/– Acquired by McAfee in Q4 2007

Page 33: UW Desktop Encryption Project UW's approach to data encryption

Product Selected

• Key Differentiators

– Macintosh on Roadmap– File/Folder; smartphone encryption too– Allows for centralized, collaborative and

delegated models– Management not tied to specific product– Lots of connectors (or not)– Small desktop footprint– Ease of use; understandable

Page 34: UW Desktop Encryption Project UW's approach to data encryption

Challenges/Issues

Page 35: UW Desktop Encryption Project UW's approach to data encryption

Technical Challenges

• Market Turbulence/Definition– Acquisitions/partnerships– Many new features being introduced

• Assumes client/server model– Periodic check in to server– Delegated/collaborative management

Page 36: UW Desktop Encryption Project UW's approach to data encryption

Technical Challenges

• Laptop states– Power off protection– Screen saver– Logoff– Hibernate, Suspend

• Not a panacea– Still need host hardening– Power on protection

Page 37: UW Desktop Encryption Project UW's approach to data encryption

Technical Challenges

• Authentication– Strong passwords– 2 factor authentication– Integrated Windows AuthN

• Synchronization issues

• Recovery – User or machine password recovery

• Identity proofing

– Hardware Failure– Forensics

Page 38: UW Desktop Encryption Project UW's approach to data encryption

Non-Technical Challenges

Page 39: UW Desktop Encryption Project UW's approach to data encryption

Non-Technical Challenges

Policy• Where and when to use Full Disk

Encryption?• Where and when to use File/Folder?• What encryption solutions are

acceptable?• Log in once or twice?

Page 40: UW Desktop Encryption Project UW's approach to data encryption

Non-Technical Challenges

Centralized service; decentralized campus• Who pays?• Maintenance

• Running the server• Administering the application• Managing the service

• Support• Help Desk calls• 2nd level technical expertise

• Licenses

Page 41: UW Desktop Encryption Project UW's approach to data encryption

Non-Technical Challenges

User Acceptance• Department IT Staff• Willingness to collaborate

• End Users• Strong passwords necessary• Double authentication with Pre-Boot• Initial setup cost - takes time to encrypt

Page 42: UW Desktop Encryption Project UW's approach to data encryption

What Next?

Page 43: UW Desktop Encryption Project UW's approach to data encryption

What next?

• Two new project teams• Policy• Support & Best Practices

• Pilot runs through the end of June• Evaluating our ability to collaborate as well as the

software• Initial rollouts of 10-20 laptops• Report to sponsors with recommendations

• Gradually open up pilot starting in July

Page 44: UW Desktop Encryption Project UW's approach to data encryption

UW Desktop Encryption Project

Allen Monette, [email protected] Pruss, [email protected]