24
Trustworthy Computing – How Microsoft does IT Heinz Wendelin Regional CIO Germany & Austria Microsoft IT

Trustworthy Computing – How Microsoft does ITdownload.microsoft.com/download/a/b/c/abc6dd0c-2f81-4678-8ca8-… · (best practise) Fokus auf Knowhow ... standard Public Key Infrastructure

  • Upload
    others

  • View
    1

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Trustworthy Computing – How Microsoft does ITdownload.microsoft.com/download/a/b/c/abc6dd0c-2f81-4678-8ca8-… · (best practise) Fokus auf Knowhow ... standard Public Key Infrastructure

Trustworthy Computing –How Microsoft does IT

Heinz WendelinRegional CIO Germany & AustriaMicrosoft IT

Page 2: Trustworthy Computing – How Microsoft does ITdownload.microsoft.com/download/a/b/c/abc6dd0c-2f81-4678-8ca8-… · (best practise) Fokus auf Knowhow ... standard Public Key Infrastructure

● Allgemeine Informationen zu Microsoft IT● Microsoft Security● Security Strategie, Mission, Vision● Risikoanalyse und Einschätzung● Risiken und Maßnahmen

Der Überblick

Page 3: Trustworthy Computing – How Microsoft does ITdownload.microsoft.com/download/a/b/c/abc6dd0c-2f81-4678-8ca8-… · (best practise) Fokus auf Knowhow ... standard Public Key Infrastructure

RegionaleRegionale IT IT AusrichtungAusrichtungEmpowerEmpowerProductivityProductivity

1a IT Service 1a IT Service anbietenanbietenKundenanbindungKundenanbindung optimierenoptimierenWeiterentwicklungWeiterentwicklung von Servicesvon Services

KlareKlare ServicestrukturenServicestrukturenKlaresKlares Service Service VerständnisVerständnisOptimierungOptimierung derder gesamtengesamten ITIT

SimplifySimplifyWorking with ITWorking with IT

BuildBuildWorld Class TalentWorld Class Talent

WeiterbildungWeiterbildungLaufendeLaufende VerbesserungenVerbesserungen

(best (best practisepractise))FokusFokus auf auf KnowhowKnowhow + + EntfaltungEntfaltung

IT GovernanceIT GovernanceGuidelines / PoliciesGuidelines / PoliciesBestensBestens VorbereitetVorbereitet / /

SchnelleSchnelle ReaktionReaktion

ProtectProtectDigital AssetsDigital Assets

Page 4: Trustworthy Computing – How Microsoft does ITdownload.microsoft.com/download/a/b/c/abc6dd0c-2f81-4678-8ca8-… · (best practise) Fokus auf Knowhow ... standard Public Key Infrastructure

TokyoTokyo

DublinDublinRedmondRedmond

3M+ e3M+ e--mail mail NachrichtenNachrichten pro Tag intern!pro Tag intern!99.99% 99.99% VerfügbarkeitVerfügbarkeit

89,000 89,000 AnwenderAnwender

83 83 LLäändernndern

300,000+ PCs300,000+ PCs

EinEin SAP System SAP System weltweitweltweit(1.5+Tb Db)(1.5+Tb Db)

Silicon ValleySilicon Valley

403 403 GebGebääudeude

9.5M+ Remote 9.5M+ Remote VerbindungenVerbindungen pro pro MonatMonat

101,000+ e101,000+ e--mail + server accountsmail + server accounts

Microsoft IT

Page 5: Trustworthy Computing – How Microsoft does ITdownload.microsoft.com/download/a/b/c/abc6dd0c-2f81-4678-8ca8-… · (best practise) Fokus auf Knowhow ... standard Public Key Infrastructure

● Umgebung● Über 300,000 devices auf dem Corp. Netzwerk ● 30,000 business partner mit Netzwerkzugang● Durchschnittliche Anzahl von Angriffen:

● 100’+ Attacken pro Monat● 125’+ Isolierte Emails pro Monat

● Herausforderungen● Hohe Anzahl von “mobilen clients” (Laptop, PPC, etc.)● Hohe Business Anforderungen an die Softwareentwicklung

und Absicherung● “First and best” customer Ansatz (dogfooding)

Microsoft Security

Page 6: Trustworthy Computing – How Microsoft does ITdownload.microsoft.com/download/a/b/c/abc6dd0c-2f81-4678-8ca8-… · (best practise) Fokus auf Knowhow ... standard Public Key Infrastructure

SicherheitsstrategieVerringerungVerringerung des des RisikosRisikos imim BereichBereich InfrastrukturInfrastruktur durchdurch

die die ImplementierungImplementierung von von viervier KeyKey--StrategienStrategien

1. 1. SicherheitSicherheitNetzwerkNetzwerk--zugangzugang

Secure Wireless Secure Wireless Smart Cards Smart Cards ffüürr RASRASSchutzSchutz ffüürr den den NetzwerkzugangNetzwerkzugang

2. 2. SicherheitSicherheitinnerhalbinnerhalb des des NetzwerksNetzwerksPatch ManagementPatch ManagementIPsecIPsecSegmentationSegmentationSmart Cards Smart Cards ffüürrAdmin AccessAdmin Access

3. 3. AbsicheAbsiche--rung von Key rung von Key AssetsAssets

IPSecIPSec

4. 4. ErweitertesErweitertesMonitoring Monitoring und Auditingund Auditing

StrengeStrengeUmsetzungUmsetzung

Page 7: Trustworthy Computing – How Microsoft does ITdownload.microsoft.com/download/a/b/c/abc6dd0c-2f81-4678-8ca8-… · (best practise) Fokus auf Knowhow ... standard Public Key Infrastructure

Security StrategySecurity Strategy

Mission and VisionMission and VisionSecurity Security

Operating Operating PrinciplesPrinciples

RiskRisk--Based Decision ModelBased Decision Model

PrioritizationPrioritization

Page 8: Trustworthy Computing – How Microsoft does ITdownload.microsoft.com/download/a/b/c/abc6dd0c-2f81-4678-8ca8-… · (best practise) Fokus auf Knowhow ... standard Public Key Infrastructure

Operating Principles

Risk Based Decision Risk Based Decision ModelModel

Tactical Prioritization

Mission & Vision

MissionVerhindere durch geeignete Maßnahmen (Kommunikation , Monitoring, Risiko-minimierung, etc.) den mutwilligen oder unbefugten Zugang zu sensiblen Informationen/ Daten, der zum Verlust von MS geistigen Eigentums oder Produktivität führt.

Policy, TCEmail,

Eskalation,Force-PatchingPort Shutdown

AuditIP range +/-,

Audit devices, identification

Risiko Bewertung

Monitoring &Reporting

TC – Trustworthy Computing

Page 9: Trustworthy Computing – How Microsoft does ITdownload.microsoft.com/download/a/b/c/abc6dd0c-2f81-4678-8ca8-… · (best practise) Fokus auf Knowhow ... standard Public Key Infrastructure

Operating Principles

Risk Based Decision Risk Based Decision ModelModel

Tactical Prioritization

Vision

Schaffe eine IT Umgebung bestehend aus- Services, - Anwendungen und - Infrastruktur,

die vorbehaltlos Verfügbarkeit, Geheimhaltungund Sicherheit für jeden Mitarbeiter zurVerfügung stellt.

Mission & Vision

Page 10: Trustworthy Computing – How Microsoft does ITdownload.microsoft.com/download/a/b/c/abc6dd0c-2f81-4678-8ca8-… · (best practise) Fokus auf Knowhow ... standard Public Key Infrastructure

Operating Principles

Risk Based Decision Risk Based Decision ModelModel

Tactical Prioritization

Mission & Vision

Operationale Grundsätze

● Management Verpflichtungen● Manage Risiken im Sinne der Businessziele● Lege Zuständigkeiten und Verantwortlichkeiten fest

● Anwender und Daten● Mache unter Anwendern keine Unterschiede● Verfolge strikt Policies und Regeln

● Entwicklung von Anwendungen und Systemen● Integration von Sicherheit innerhalb des life cycles● Verringere die “Angriffsfläche von Aussen”

● Operations & maintenance● Integration von Sicherheit im operational framework● Fokus auf Monitoring & Auditoring

Page 11: Trustworthy Computing – How Microsoft does ITdownload.microsoft.com/download/a/b/c/abc6dd0c-2f81-4678-8ca8-… · (best practise) Fokus auf Knowhow ... standard Public Key Infrastructure

Enterprise Risk Model

HochHoch

NiedrigNiedrig HochHoch

Aus

wirk

unge

n au

f das

A

usw

irkun

gen

auf d

as

Bus

ines

sB

usin

ess

Akzeptierbares Risiko

Nicht akzeptierbares Risiko

Wahrscheinlichkeit von Wahrscheinlichkeit von AngriffenAngriffen

Risikoeinschätzung verschiebt Risikolevel

Operating Principles

Risk Based Decision Risk Based Decision ModelModel

Tactical Prioritization

Mission & Vision

Page 12: Trustworthy Computing – How Microsoft does ITdownload.microsoft.com/download/a/b/c/abc6dd0c-2f81-4678-8ca8-… · (best practise) Fokus auf Knowhow ... standard Public Key Infrastructure

Risk Analysis by Asset Class

Exploit of misconfiguration, buffer overflows, Exploit of misconfiguration, buffer overflows, open shares, NetBIOS attacksopen shares, NetBIOS attacks HostHost

Unauthenticated access to Unauthenticated access to applications, applications, unchecked memory allocationsunchecked memory allocations

ApplicationApplication

Compromise of integrity or Compromise of integrity or privacy of accountsprivacy of accounts

AccountAccount

Unmanaged trusts enable movement Unmanaged trusts enable movement among environmentsamong environments

TrustTrust

Data sniffing on the wire, Data sniffing on the wire, network fingerprintingnetwork fingerprinting

NetworkNetwork AssetsAssets

Operating Principles

Risk Based Decision Risk Based Decision ModelModel

Tactical Prioritization

Mission & Vision

Page 13: Trustworthy Computing – How Microsoft does ITdownload.microsoft.com/download/a/b/c/abc6dd0c-2f81-4678-8ca8-… · (best practise) Fokus auf Knowhow ... standard Public Key Infrastructure

Komponenten derRisikoeinschätzung

Asset Bedrohung

Auswirkung

Verwundbarkeit

Minimierung

Wahrschein-lichkeit

++

==

Was möchtenSie

beurteilen?

Was kanngeschen?

Was sind die Auswirkungen

für das Business?

Wie kann die Bedrohungaussehen?

Wodurch kanndas Risikogesenktwerden?

Wie hoch?

Aktueller RisikolevelWie hoch ist die

Wahrscheinlichkeit, dass der Angriff erfolgreich ist?

Operating Principles

Risk Based Decision Risk Based Decision ModelModel

Tactical Prioritization

Mission & Vision

Page 14: Trustworthy Computing – How Microsoft does ITdownload.microsoft.com/download/a/b/c/abc6dd0c-2f81-4678-8ca8-… · (best practise) Fokus auf Knowhow ... standard Public Key Infrastructure

Risk Management Prozesse und Zuständigkeiten

CrossCross--IT IT TeamsTeams

Corporate SecurityCorporate Security

SecuritySecurityLösung &Lösung &Initiativen Initiativen

Sustained Sustained OperationsOperations

Priorität Security Policy

Durchführung

1 2 5

3 4

Operating Principles

Risk Based Decision Risk Based Decision ModelModel

Tactical Prioritization

Mission & Vision

Page 15: Trustworthy Computing – How Microsoft does ITdownload.microsoft.com/download/a/b/c/abc6dd0c-2f81-4678-8ca8-… · (best practise) Fokus auf Knowhow ... standard Public Key Infrastructure

Corporate Security Group Organization

Corporate Security Group

Threat, RiskAnalysis, and Policy

Assessment andCompliance

Monitoring, Intrusion Detection, and Incident Response

Shared ServicesOperations

Threat and RiskAnalysis

PolicyDevelopment

ProductEvaluation

DesignReview

StructureStandards

SecurityManagement

SecurityAssessment

Compliance andRemediation

Monitoring andIntrusion Detection

Rapid Responseand Resolution

Forensics

Physical andRemote Access

CertificateAdministration

SecurityTools

InitiativeManagement

ITInvestigations

Page 16: Trustworthy Computing – How Microsoft does ITdownload.microsoft.com/download/a/b/c/abc6dd0c-2f81-4678-8ca8-… · (best practise) Fokus auf Knowhow ... standard Public Key Infrastructure

Prioritisierung derBereiche/ Umgebung

Operating Principles

Risk Based Decision Risk Based Decision ModelModel

Tactical Prioritization

EingestuftesEingestuftesRisikoRisiko

RechenzentrumRechenzentrum

MitarbeiterMitarbeiter

Unmanaged Unmanaged ClientClient

Remote AccessRemote Access

MobileMobile

FestgelegteFestgelegte““RegelnRegeln”” ffüürr

jedenjeden einzelneneinzelnenBereichBereich/ /

UmgebungUmgebung

Mission & Vision

Page 17: Trustworthy Computing – How Microsoft does ITdownload.microsoft.com/download/a/b/c/abc6dd0c-2f81-4678-8ca8-… · (best practise) Fokus auf Knowhow ... standard Public Key Infrastructure

Risiken und Maßnahmen

Enterprise RisksEnterprise Risks

Unpatched DevicesUnpatched Devices

Unmanaged DevicesUnmanaged Devices

Remote and Mobile Remote and Mobile UsersUsers

SingleSingle--Factor Factor AuthenticationAuthentication

Focus Controls Across Focus Controls Across Key AssetsKey Assets

MaMaßßnahmennahmen

Secure Environmental Secure Environmental RemediationRemediation

Network Segmentation Network Segmentation Through IPSecThrough IPSec

Secure Remote UserSecure Remote User

TwoTwo--Factor for Remote Factor for Remote Access and AdministratorsAccess and Administrators

Managed Source InitiativesManaged Source Initiatives

EmbodyTrustworthyComputing

Page 18: Trustworthy Computing – How Microsoft does ITdownload.microsoft.com/download/a/b/c/abc6dd0c-2f81-4678-8ca8-… · (best practise) Fokus auf Knowhow ... standard Public Key Infrastructure

Zusammenfassung

● „Sicherheit ist eine Reise und kein Ziel“● Risikomanagement ist entscheidend● Leute, Prozesse und Technologien

treiben Sicherheit

Page 19: Trustworthy Computing – How Microsoft does ITdownload.microsoft.com/download/a/b/c/abc6dd0c-2f81-4678-8ca8-… · (best practise) Fokus auf Knowhow ... standard Public Key Infrastructure

Vielen Dankfür Ihre

Aufmerksamkeit!

Page 20: Trustworthy Computing – How Microsoft does ITdownload.microsoft.com/download/a/b/c/abc6dd0c-2f81-4678-8ca8-… · (best practise) Fokus auf Knowhow ... standard Public Key Infrastructure

Anhang

Page 21: Trustworthy Computing – How Microsoft does ITdownload.microsoft.com/download/a/b/c/abc6dd0c-2f81-4678-8ca8-… · (best practise) Fokus auf Knowhow ... standard Public Key Infrastructure

Wireless - 802.1X Solution

● Client network access (link layer) is controlled by the AP based on domain user and/or machine account authentication

● Authentication process is secured via standard Public Key Infrastructure (PKI) protocols available in Windows XP

● Client user and computers negotiate authentication against Internet Authentication Server (IAS).

● WEP keys are dynamic

Page 22: Trustworthy Computing – How Microsoft does ITdownload.microsoft.com/download/a/b/c/abc6dd0c-2f81-4678-8ca8-… · (best practise) Fokus auf Knowhow ... standard Public Key Infrastructure

Wireless

● Access Control● 802.1X authentication ● Digital certificates for user and machine identity

● Rogue Management● Only Microsoft IT-owned Infrastructure “MSFTWLAN”

Access Points permitted on CorpNet● Locate necessary non-infrastructure Access Points on

isolated, air-gapped network● Manual RF scanning● Automated detection products (under evaluation)

● Guest “Liability”● Unauthorized users● Client-to-client attacks

Page 23: Trustworthy Computing – How Microsoft does ITdownload.microsoft.com/download/a/b/c/abc6dd0c-2f81-4678-8ca8-… · (best practise) Fokus auf Knowhow ... standard Public Key Infrastructure

802.1X SecurityThe 802.1X solution

802.11/.1X802.11/.1XAccess PointAccess Point

Domain UserDomain UserCertificateCertificate

LaptopLaptop

Cont

rolle

d po

rt

Cont

rolle

d po

rt

Unco

ntro

lled

port

Unco

ntro

lled

port

RADIUSRADIUS(IAS)(IAS)

DomainDomainControllerController

CertificateCertificateAuthorityAuthority

DHCPDHCPExchangeExchange

FileFilePeersPeers

Domain ControllerDomain Controllerused to log onto used to log onto domain after obtaining domain after obtaining an IP address from an IP address from DHCPDHCP

EAP/TLS EAP/TLS connectionconnection

Page 24: Trustworthy Computing – How Microsoft does ITdownload.microsoft.com/download/a/b/c/abc6dd0c-2f81-4678-8ca8-… · (best practise) Fokus auf Knowhow ... standard Public Key Infrastructure

This document is provided for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT.

© 2003 Microsoft Corporation. All rights reserved. This presentation is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS SUMMARY. Microsoft, Active Directory, Office, Windows, and Windows Server are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries. The names of actual companies and products mentioned herein may be the trademarks of their respective owners.