21
Brett Miller, Medical School Chief IT Security Officer IRBMED Seminar Series April 28, 2015 Data Security

Brett Miller, Medical School Chief IT Security Officer IRBMED Seminar Series April 28, 2015 Data Security

Embed Size (px)

Citation preview

Page 1: Brett Miller, Medical School Chief IT Security Officer IRBMED Seminar Series April 28, 2015 Data Security

Brett Miller, Medical School Chief IT Security Officer

IRBMED Seminar Series

April 28, 2015

Data Security

Page 2: Brett Miller, Medical School Chief IT Security Officer IRBMED Seminar Series April 28, 2015 Data Security

Problems with Data

• We’re accountable for real/possible exposures

• Data integrity important to research• There are people who want to steal data• If systems are compromised data exposure

or corruption can be collateral damage• Data gets everywhere…

Page 3: Brett Miller, Medical School Chief IT Security Officer IRBMED Seminar Series April 28, 2015 Data Security

Data Gets Everywhere

Page 4: Brett Miller, Medical School Chief IT Security Officer IRBMED Seminar Series April 28, 2015 Data Security

Example Data Leaks

• Thumb drives get lost• Laptops are stolen• NAS devices are put on the Internet• Collaboration tool permissions too broad• Misdirected emails• Malware steals data• Servers/databases are compromised

Page 5: Brett Miller, Medical School Chief IT Security Officer IRBMED Seminar Series April 28, 2015 Data Security

Personal Devices

• Hard to remove all traces of data from systems and backups

• Destruction of devices sometimes necessary• Personal systems usually not secure or

compliant• Personal cloud backup, email, or

collaboration tools probably not compliant

Page 6: Brett Miller, Medical School Chief IT Security Officer IRBMED Seminar Series April 28, 2015 Data Security

Configuration Challenges

• Too many devices to keep track of• Settings can unexpectedly change• Knowing details of settings can be a full

time job• It’s too easy to have your data end up in the

cloud without realizing it

Page 7: Brett Miller, Medical School Chief IT Security Officer IRBMED Seminar Series April 28, 2015 Data Security

The Hacker Threat

• “Attacker” is more accurate• Authorized “White Hat” or “Ethical

Hackers” test and improve security• So what about the bad hackers?

Page 8: Brett Miller, Medical School Chief IT Security Officer IRBMED Seminar Series April 28, 2015 Data Security

Attacker Motivation

• Money - information can be sold or held for ransom

• Ideology - hacktivism & nation states• Borrowing your system (maybe for resale)

–Used to launch attacks–Bitcoin mining or other computation

• For fun or bragging rights

Page 9: Brett Miller, Medical School Chief IT Security Officer IRBMED Seminar Series April 28, 2015 Data Security

Attacker Techniques

Staggering number of ways:• Compromising web or other servers• Malware• Social engineering • Network attacks• Cryptographic attacks• Attacks on physical security

Page 10: Brett Miller, Medical School Chief IT Security Officer IRBMED Seminar Series April 28, 2015 Data Security

Tools

• Encryption• Antivirus• System patching• Data destruction• Managed systems

Page 11: Brett Miller, Medical School Chief IT Security Officer IRBMED Seminar Series April 28, 2015 Data Security

Encryption – Basic Idea

Page 12: Brett Miller, Medical School Chief IT Security Officer IRBMED Seminar Series April 28, 2015 Data Security

Encryption Types

• Data in Transit On a wire/through the air HTTPS, SSL

• Data at Rest In a file/on a disk Credant, FileVault, BitLocker

Page 13: Brett Miller, Medical School Chief IT Security Officer IRBMED Seminar Series April 28, 2015 Data Security

FIPS 140-2 Encryption

• FIPS 140-2 is a government standard• Third-party testing labs certify products as

being 140-2 validated• FISMA requires it• Some projects/grants require it• HHS refers to the same standards for PHI• Encryption key must be separate

Page 14: Brett Miller, Medical School Chief IT Security Officer IRBMED Seminar Series April 28, 2015 Data Security

Encryption Misconceptions

• MS Office encryption is fine–Depends on the version

• Zip file encryption is OK–Need to use WinZip 18.5 or later in FIPS

140-2 mode.• If my system is encrypted, I’m safe.

–An infected system can leak data

Page 15: Brett Miller, Medical School Chief IT Security Officer IRBMED Seminar Series April 28, 2015 Data Security

More Misconceptions

• It’s safe to click through certificate warnings–Someone could be intercepting your data

• If it says FIPS 140-2 compatible it’s OK–It needs to be FIPS 140-2

certified/validated. NIST has lists of vendor products

Page 16: Brett Miller, Medical School Chief IT Security Officer IRBMED Seminar Series April 28, 2015 Data Security

Yet More Misconceptions

• I can use the same password everywhere if it’s strong–Attackers get one password and try it

everywhere• If I have a password set on my laptop, it’s

encrypted–See demo later

Page 17: Brett Miller, Medical School Chief IT Security Officer IRBMED Seminar Series April 28, 2015 Data Security

Antivirus

• Not 100%, but can catch common malware• A dedicated attacker won’t be deterred• Average attackers won’t go to this trouble• Not all antivirus products are equal. Watch

for updated recommendations from Security & Compliance

Page 18: Brett Miller, Medical School Chief IT Security Officer IRBMED Seminar Series April 28, 2015 Data Security

System Patching

• Serious vulnerabilities found every week• May only have a few hours to patch• We’ve seen systems compromised in 4-5

hours of announcements• Automatic updates are best

Page 19: Brett Miller, Medical School Chief IT Security Officer IRBMED Seminar Series April 28, 2015 Data Security

Data Destruction

• It can be hard to erase data• Traditional (non-SSD) hard drives require

several passes of wiping• SSD or flash memory devices may or may

not be capable of being sanitized• Physical destruction is only sure way• Best if device is encrypted before use

Page 20: Brett Miller, Medical School Chief IT Security Officer IRBMED Seminar Series April 28, 2015 Data Security

Managed Systems

• On managed systems, you don’t have to worry about the system itself

• Example managed systems–AirWatch–MiHarbor/MCIT Core

• Thumb drives, external drives, NASs, and personal equipment still an concern

Page 21: Brett Miller, Medical School Chief IT Security Officer IRBMED Seminar Series April 28, 2015 Data Security

Demo & Questions