© sean clark director of information security practice brintech, inc. 124 canal street new smyrna...

71
© Sean Clark Director of Information Security Practice Brintech, Inc. 124 Canal Street New Smyrna Beach, FL 32168 800.929.2746 [email protected] www.Brintech.com © Managing Information Security, an Increasing Risk December 11th, 2006

Upload: leo-derick-gilbert

Post on 11-Jan-2016

219 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: © Sean Clark Director of Information Security Practice Brintech, Inc. 124 Canal Street New Smyrna Beach, FL 32168 800.929.2746 SClark@Brintech.com

©

Sean ClarkDirector of Information Security Practice

Brintech, Inc.124 Canal Street

New Smyrna Beach, FL 32168800.929.2746

[email protected]

©

Managing Information Security, an Increasing Risk

December 11th, 2006

Page 2: © Sean Clark Director of Information Security Practice Brintech, Inc. 124 Canal Street New Smyrna Beach, FL 32168 800.929.2746 SClark@Brintech.com

2

©

Session Overview

Understand “Today’s” Security Strategy The cost of security control Understand , Find, and mitigate the

risks!! New Threats for today’s Delivery

channels

Page 3: © Sean Clark Director of Information Security Practice Brintech, Inc. 124 Canal Street New Smyrna Beach, FL 32168 800.929.2746 SClark@Brintech.com

3

©

The Security Strategy

Page 4: © Sean Clark Director of Information Security Practice Brintech, Inc. 124 Canal Street New Smyrna Beach, FL 32168 800.929.2746 SClark@Brintech.com

4

©Image from: http://global.mci.com/us/enterprise/govt/igs/security/strategy_sm.gif

Page 5: © Sean Clark Director of Information Security Practice Brintech, Inc. 124 Canal Street New Smyrna Beach, FL 32168 800.929.2746 SClark@Brintech.com

5

©

The Security Strategy

First we need Corporate Governance! Then we must understand how much is

too much to spend! Then we must deploy technology with

the most ROI and maintain metrics Continue technology upgrades as

threats evolve; remove dead wood

Page 6: © Sean Clark Director of Information Security Practice Brintech, Inc. 124 Canal Street New Smyrna Beach, FL 32168 800.929.2746 SClark@Brintech.com

6

©

CEO’s Historic Focus

Increasing Shareholder Value Improving Earnings Customer Satisfaction Growth of organization

Page 7: © Sean Clark Director of Information Security Practice Brintech, Inc. 124 Canal Street New Smyrna Beach, FL 32168 800.929.2746 SClark@Brintech.com

7

©

Impacts to Focus

Brokerages, Insurance companies and other non-traditional banking institutions competing for business

Internet innovation and online competition

Security Threats impacting availability, confidentiality and integrity of information.

Page 8: © Sean Clark Director of Information Security Practice Brintech, Inc. 124 Canal Street New Smyrna Beach, FL 32168 800.929.2746 SClark@Brintech.com

8

©

Typical Perspective

Taking the ‘insurance stance’: Beware false sense of security

Perception that Security investments can not be measured in terms of ROI.

If there is an incident….we can manage the risk internally to protect the reputation without increased risk.

Page 9: © Sean Clark Director of Information Security Practice Brintech, Inc. 124 Canal Street New Smyrna Beach, FL 32168 800.929.2746 SClark@Brintech.com

9

©

Paradigm Shift in Perspective

Acquiring and retaining customers depends on how well you service them and maintain their confidence or trust.

There are metrics to identify the threshold of spending but ROI is still difficult to measure

Breach of customer confidence impacts earnings, and ultimately shareholder value.

Regulations require disclosure of data loss.

Page 10: © Sean Clark Director of Information Security Practice Brintech, Inc. 124 Canal Street New Smyrna Beach, FL 32168 800.929.2746 SClark@Brintech.com

10

©

Financial Impacts

2003 Study stated average drop in share price for 22 publicly held companies reporting a security breach was 5.6% in the first 3 days, eroding a total of $15-$20 million in shareholder value.

Page 11: © Sean Clark Director of Information Security Practice Brintech, Inc. 124 Canal Street New Smyrna Beach, FL 32168 800.929.2746 SClark@Brintech.com

11

©

Page 12: © Sean Clark Director of Information Security Practice Brintech, Inc. 124 Canal Street New Smyrna Beach, FL 32168 800.929.2746 SClark@Brintech.com

12

©

Page 13: © Sean Clark Director of Information Security Practice Brintech, Inc. 124 Canal Street New Smyrna Beach, FL 32168 800.929.2746 SClark@Brintech.com

13

©

Old Paradigm of Security

5k per drawer * 200 tellers: $1,000,000 $6/hr rate 15 minute balance per day= 15 min 1/4hr * $6 /hr = $1.50 pr/day * 200

Tellers=$300 a day $300 * 280 (working days) = $84,000

$84k spent to count/protect $1,000,000

Page 14: © Sean Clark Director of Information Security Practice Brintech, Inc. 124 Canal Street New Smyrna Beach, FL 32168 800.929.2746 SClark@Brintech.com

14

©

New Paradigm

Customer data is more valuable Financial transactions are electronic Data resides on multiple systems and

on the wire. It’s not just in the drawer and vault! It’s

EVERYWHERE

Page 15: © Sean Clark Director of Information Security Practice Brintech, Inc. 124 Canal Street New Smyrna Beach, FL 32168 800.929.2746 SClark@Brintech.com

15

©

Page 16: © Sean Clark Director of Information Security Practice Brintech, Inc. 124 Canal Street New Smyrna Beach, FL 32168 800.929.2746 SClark@Brintech.com

16

©

Page 17: © Sean Clark Director of Information Security Practice Brintech, Inc. 124 Canal Street New Smyrna Beach, FL 32168 800.929.2746 SClark@Brintech.com

17

©

Page 18: © Sean Clark Director of Information Security Practice Brintech, Inc. 124 Canal Street New Smyrna Beach, FL 32168 800.929.2746 SClark@Brintech.com

18

©

Are we spending enough?

$129k for a Billion Dollar Bank yearly:

$354 per day

Page 19: © Sean Clark Director of Information Security Practice Brintech, Inc. 124 Canal Street New Smyrna Beach, FL 32168 800.929.2746 SClark@Brintech.com

19

©

What scenarios apply?

Virus Infection Spam prevention Phishing or Pharming Network Breach/Web Site defacement Information Theft MCIF theft Etc…

Page 20: © Sean Clark Director of Information Security Practice Brintech, Inc. 124 Canal Street New Smyrna Beach, FL 32168 800.929.2746 SClark@Brintech.com

20

©

The Danger of the Unknown Unknown

“There are known knowns. These are things we know that we know. There are known unknowns. That is to say, thereare things that we know we don't know. But there are alsounknown unknowns. There are things we don't know we don't know.” - Secretary of Defense Donald H. Rumsfeld

Page 21: © Sean Clark Director of Information Security Practice Brintech, Inc. 124 Canal Street New Smyrna Beach, FL 32168 800.929.2746 SClark@Brintech.com

21

©

Page 22: © Sean Clark Director of Information Security Practice Brintech, Inc. 124 Canal Street New Smyrna Beach, FL 32168 800.929.2746 SClark@Brintech.com

22

©

Application InSecurities

Gartner states: 80% of web applications put into production through 2007 will fail due to poor quality issues.

Most deployments of applications within the organization are not reviewed for their security prior to deployment.

Responsibility turns to the IT staff of the organization once the technology is deployed.

Page 23: © Sean Clark Director of Information Security Practice Brintech, Inc. 124 Canal Street New Smyrna Beach, FL 32168 800.929.2746 SClark@Brintech.com

23

©

Paradigm Shift in Perspective

A well-managed information security program can provide a competitive advantage by positively affecting customer acquisition and retention, the cornerstone to any business' ability to generate revenue

Institutions that conduct business online must view information security as a business enabler and not a cost of doing business.

More and more systems use web based applications; increasing risk to the institution.

Page 24: © Sean Clark Director of Information Security Practice Brintech, Inc. 124 Canal Street New Smyrna Beach, FL 32168 800.929.2746 SClark@Brintech.com

24

©

Paradigm Shift in Perspective

Evolving and emerging threats from increased delivery channel expansion requires attention in an ‘inside-out’ approach.

Protect core applications first, then use layered security outward to the host and network.

Page 25: © Sean Clark Director of Information Security Practice Brintech, Inc. 124 Canal Street New Smyrna Beach, FL 32168 800.929.2746 SClark@Brintech.com

25

©

If you don’t?

Insider threat, data theft… Exposure of most valuable assets?

(customer information) Data corruption Reputational Risks Bank Fines, closure….loss of

shareholder value

Page 26: © Sean Clark Director of Information Security Practice Brintech, Inc. 124 Canal Street New Smyrna Beach, FL 32168 800.929.2746 SClark@Brintech.com

26

©

Paradigm Shift : The Solution

Combine Governance and technology!– Top Down acceptance and enforcement– Exercise ‘worse case scenarios and

responses’

Most companies respond with appropriate

governance 70% of time after an incident.

Page 27: © Sean Clark Director of Information Security Practice Brintech, Inc. 124 Canal Street New Smyrna Beach, FL 32168 800.929.2746 SClark@Brintech.com

27

©

Regulatory Scrutiny Increases

Gramm-Leach-Bliley Act– (http://www.ftc.gov/privacy/glbact/)

Sarbanes-Oxley Act– (http://www.sarbanes-oxley.com/)

NASD Sec 17/A3-4– (http://www.sec.gov/)

USA Patriot Act– (http://www.epic.org/privacy/terrorism/hr3162.html)

BSA (Bank Secrecy Act)– (http://www.ffiec.gov)

Page 28: © Sean Clark Director of Information Security Practice Brintech, Inc. 124 Canal Street New Smyrna Beach, FL 32168 800.929.2746 SClark@Brintech.com

28

©

Verbiage from Proposed Bill …. we would require companies that have databases with sensitive

personal information on Americans to establish and implement data privacy and security programs. In the digital age, any company that wants to be trusted by the public must earn that trust by vigilantly protecting the databases they use and maintain which contain Americans' private data. They also have a responsibility in the next link in the security chain, to make sure that contractors hired to process data are adequately vetted to keep the personal information in these databases secure. This is increasingly important as Americans' personal information more and more is outsourced for processing overseas and beyond U.S. laws.

http://www.govtrack.us/congress/record.xpd?id=109-s20050929-56&bill=s109-1789#sMonoElementm1m0m0m

Page 29: © Sean Clark Director of Information Security Practice Brintech, Inc. 124 Canal Street New Smyrna Beach, FL 32168 800.929.2746 SClark@Brintech.com

29

©

Verbiage from Proposed Bill …. our bill requires notice when sensitive personal information has

been compromised. The American people have a right to know when they are at risk because of corporate failures to protect their data, or when a criminal has infiltrated data systems. The notice rules in our bill were carefully crafted to ensure that the trigger for notice is tied to "significant risk of harm" with appropriate checks-and-balances, in order to make sure that companies do not underreport. We also recognize important fraud prevention techniques that already exist. But our priority has been to make sure that victims have critical information as a roadmap that offers the assistance necessary to protect themselves, their families and their financial well-being.

http://www.govtrack.us/congress/record.xpd?id=109-s20050929-56&bill=s109-1789#sMonoElementm1m0m0m

Page 30: © Sean Clark Director of Information Security Practice Brintech, Inc. 124 Canal Street New Smyrna Beach, FL 32168 800.929.2746 SClark@Brintech.com

30

©

Focus is changing

Regulators will be forced to respond with more guidance (at least) if these bills are passed, requiring even more focus on security controls within your financial institutions!!

Page 31: © Sean Clark Director of Information Security Practice Brintech, Inc. 124 Canal Street New Smyrna Beach, FL 32168 800.929.2746 SClark@Brintech.com

31

©

What to do

Page 32: © Sean Clark Director of Information Security Practice Brintech, Inc. 124 Canal Street New Smyrna Beach, FL 32168 800.929.2746 SClark@Brintech.com

32

©

Delivery Channels

Methods to offer banking “anywhere, anytime” to customers that collectively provide the customer with a single, consistent view of the institution

Page 33: © Sean Clark Director of Information Security Practice Brintech, Inc. 124 Canal Street New Smyrna Beach, FL 32168 800.929.2746 SClark@Brintech.com

33

©

Traditional Delivery Channels

Page 34: © Sean Clark Director of Information Security Practice Brintech, Inc. 124 Canal Street New Smyrna Beach, FL 32168 800.929.2746 SClark@Brintech.com

34

©

Delivery Channels Today

Internet

Email

$

Financial Institution

PBX

FedLine

Check Clearingand

Courier Mail

Internet User

Core System

Check Images

Loan Database

Financial TrustDatabse

Human Resources

Modem

SD

Cisco 1720

BRIS/T

CONSOLE

AUXWIC 0 OK

OK

B2

B1

WIC 1 OK

DSUCPU

LNK100FDX

S3

LOOP

LP

PrivateWANto Fed

Modem

ACH

Online Banking prBill Pay

PayPal/FirePay

Internet ACH update

Check 21

Endpoint Exchange

$

Bank

Touch Tone Teller& Direct Call

ATM System

Walk-In/ Drive InHolding Company

FAX

InstantMessaging/Chat Rooms

Page 35: © Sean Clark Director of Information Security Practice Brintech, Inc. 124 Canal Street New Smyrna Beach, FL 32168 800.929.2746 SClark@Brintech.com

35

©

How is it different ????

Interactive? Transaction based? Encrypted? Network based vs. traditional methods? Decentralization of Customer

Information.

Page 36: © Sean Clark Director of Information Security Practice Brintech, Inc. 124 Canal Street New Smyrna Beach, FL 32168 800.929.2746 SClark@Brintech.com

36

©

The Great Ideas!

Page 37: © Sean Clark Director of Information Security Practice Brintech, Inc. 124 Canal Street New Smyrna Beach, FL 32168 800.929.2746 SClark@Brintech.com

37

©

Leveraging Technology

Loan Officers in the field (laptops) Remote Deposits (IRD??) Remote LockBox access Remote Check Recon. Check 21 (Image Exchange) Two Factor Authentication

Page 38: © Sean Clark Director of Information Security Practice Brintech, Inc. 124 Canal Street New Smyrna Beach, FL 32168 800.929.2746 SClark@Brintech.com

38

©

Managing Information Security Risk

InfoSec Governance Understand the risks Assess current security levels Implement risk mitigating changes Include mobile devices!!! Enforce through policies written/elec. Train employees and staff

Page 39: © Sean Clark Director of Information Security Practice Brintech, Inc. 124 Canal Street New Smyrna Beach, FL 32168 800.929.2746 SClark@Brintech.com

39

©

Understand the Risks

Customer information privacy! Access to bank network (passwords) Bank liability (reputation, etc) Network virus infection (crash network) Hacker intrusion (full/partial breach)

Page 40: © Sean Clark Director of Information Security Practice Brintech, Inc. 124 Canal Street New Smyrna Beach, FL 32168 800.929.2746 SClark@Brintech.com

40

©

Assess Current Security Levels

Have security assessment performed Understand the types of testing

– Vulnerability vs. penetration testing– Internal vs. external– Intrusion Testing– Application review

Ensure assessment covers all network points of risk relating to financial institutions.

Include Mobile Devices

Page 41: © Sean Clark Director of Information Security Practice Brintech, Inc. 124 Canal Street New Smyrna Beach, FL 32168 800.929.2746 SClark@Brintech.com

41

©

Page 42: © Sean Clark Director of Information Security Practice Brintech, Inc. 124 Canal Street New Smyrna Beach, FL 32168 800.929.2746 SClark@Brintech.com

42

©

Include Mobile Devices

Mobile Devices are an extension of the internal bank network that creates potential risks to bank systems and the customer data protected by them.

Page 43: © Sean Clark Director of Information Security Practice Brintech, Inc. 124 Canal Street New Smyrna Beach, FL 32168 800.929.2746 SClark@Brintech.com

43

©

FDIC Defines Testing/Prevention

“Prevention measures include sound security policies, well-designed system architecture, properly configured firewalls, and strong authentication programs. This paper discusses two additional prevention measures: vulnerability assessment tools and penetration analyses. Vulnerability assessment tools generally involve running scans on a system to proactively detect known vulnerabilities such as security flaws and bugs in software and hardware. These tools can also detect holes allowing unauthorized access to a network, or insiders to misuse the system. Penetration analysis involves an independent party (internal or external) testing an institution’s information system security to identify (and possibly exploit) vulnerabilities in the system and surrounding processes. Using vulnerability assessment tools and performing regular penetration analyses will assist an institution in determining what security weaknesses exist in its information systems.”

- FDIC FIL-68-99

Page 44: © Sean Clark Director of Information Security Practice Brintech, Inc. 124 Canal Street New Smyrna Beach, FL 32168 800.929.2746 SClark@Brintech.com

44

©

Page 45: © Sean Clark Director of Information Security Practice Brintech, Inc. 124 Canal Street New Smyrna Beach, FL 32168 800.929.2746 SClark@Brintech.com

45

©

Hype Cycle

Page 46: © Sean Clark Director of Information Security Practice Brintech, Inc. 124 Canal Street New Smyrna Beach, FL 32168 800.929.2746 SClark@Brintech.com

46

©

Security 101: The Basics

C.I.A.: – Confidentiality– Integrity– Availability

Awareness is key:– Can’t respond without knowledge– Can’t prevent without foresight– Can’t research/investigate without evidence– Can’t prosecute without proof

Page 47: © Sean Clark Director of Information Security Practice Brintech, Inc. 124 Canal Street New Smyrna Beach, FL 32168 800.929.2746 SClark@Brintech.com

47

©

Delivery Channel

ATM / Credit / Debit Cards: Cards used for purchase, account query, or other transactions from multiple endpoints– IP-enabled ATMs (Diebold, NCR, etc)– Cash dispensers– Point-of-purchase devices– Online purchases

Page 48: © Sean Clark Director of Information Security Practice Brintech, Inc. 124 Canal Street New Smyrna Beach, FL 32168 800.929.2746 SClark@Brintech.com

48

©

Card Risks (Medium to High)

Stolen card number or Pilfered PIN (phishing)

Network breach of ATM system (IP-enabled)

Physical breach of ATM Card reader / writer (USB-enabled)

Page 49: © Sean Clark Director of Information Security Practice Brintech, Inc. 124 Canal Street New Smyrna Beach, FL 32168 800.929.2746 SClark@Brintech.com

49

©

ATM/Debit/Credit Card

Page 50: © Sean Clark Director of Information Security Practice Brintech, Inc. 124 Canal Street New Smyrna Beach, FL 32168 800.929.2746 SClark@Brintech.com

50

©

Card Reader/Printer/Encoder

Page 51: © Sean Clark Director of Information Security Practice Brintech, Inc. 124 Canal Street New Smyrna Beach, FL 32168 800.929.2746 SClark@Brintech.com

51

©

Fixes to Card Risks

Phishing: Educate consumers!! Inspect ATM machine on a regular

basis Isolate ATM to separate network from

institutions network Educate Customers Consider new RFID technology Risks Understand future trends

Page 52: © Sean Clark Director of Information Security Practice Brintech, Inc. 124 Canal Street New Smyrna Beach, FL 32168 800.929.2746 SClark@Brintech.com

52

©

ATM Theft

If they steal the box, they get all the internal configuration information.

Page 53: © Sean Clark Director of Information Security Practice Brintech, Inc. 124 Canal Street New Smyrna Beach, FL 32168 800.929.2746 SClark@Brintech.com

53

©

Weak ATM systems

Page 54: © Sean Clark Director of Information Security Practice Brintech, Inc. 124 Canal Street New Smyrna Beach, FL 32168 800.929.2746 SClark@Brintech.com

54

©

RF-ID ATM Cards

Page 55: © Sean Clark Director of Information Security Practice Brintech, Inc. 124 Canal Street New Smyrna Beach, FL 32168 800.929.2746 SClark@Brintech.com

55

©

eWallet and JavaCards

Page 56: © Sean Clark Director of Information Security Practice Brintech, Inc. 124 Canal Street New Smyrna Beach, FL 32168 800.929.2746 SClark@Brintech.com

56

©

Delivery Channel

Internet Direct: Direct communications which occur with direct contact to the bank’s network– External attacks– Website (hosted internal)– Website (hosted external)– Internet banking (hosted internal)– Back-end imaging– Lockbox– Cash management offerings– Internet banking (hosted external)– Back-end imaging

Page 57: © Sean Clark Director of Information Security Practice Brintech, Inc. 124 Canal Street New Smyrna Beach, FL 32168 800.929.2746 SClark@Brintech.com

57

©

Direct Internet Risks(Extremely High) Internet breach Spoofing of data or e-mail Interception of log-on credentials Information theft The list goes on and on!

Page 58: © Sean Clark Director of Information Security Practice Brintech, Inc. 124 Canal Street New Smyrna Beach, FL 32168 800.929.2746 SClark@Brintech.com

58

©

Do you have one of these?

Web Email System? In-house Ibanking? In-house LockBox In-house Check Recon system? In-house Net-Deposit system?

Page 59: © Sean Clark Director of Information Security Practice Brintech, Inc. 124 Canal Street New Smyrna Beach, FL 32168 800.929.2746 SClark@Brintech.com

59

©

If so, what you should do

Ensure it is in a properly filtered DMZ Ensure the communications are

encrypted, especially logon credentials. Ensure HIDs agents are installed and

monitored for intrusion Ensure the systems are tested Ensure 2 Factor authentication where

possible.

Page 60: © Sean Clark Director of Information Security Practice Brintech, Inc. 124 Canal Street New Smyrna Beach, FL 32168 800.929.2746 SClark@Brintech.com

60

©

Do you have these?

Firewalls? Network Based IDS/IPS? Host Based IDS/IPS? Security Event Log Management? Monitored Security?

Page 61: © Sean Clark Director of Information Security Practice Brintech, Inc. 124 Canal Street New Smyrna Beach, FL 32168 800.929.2746 SClark@Brintech.com

61

©

How do they operate?

Firewall: Brick Building Intrusion Detection Systems: car alarm Intrusion Prevention System: trap door Security Event Logging: alarm printer Monitoring: Security Alarm Company

Page 62: © Sean Clark Director of Information Security Practice Brintech, Inc. 124 Canal Street New Smyrna Beach, FL 32168 800.929.2746 SClark@Brintech.com

62

©

Fixes to Direct Internet Risks

Have a proper Information Security Program in place to cover– Network Security Assessment– Identification of risks– Implementation of mitigating actions to

prevent risk exploitation– Enforcement of policies– Re-evaluation on at least an annual basis

Page 63: © Sean Clark Director of Information Security Practice Brintech, Inc. 124 Canal Street New Smyrna Beach, FL 32168 800.929.2746 SClark@Brintech.com

63

©

Delivery Channel

Internet InDirect: Indirect Internet activities which could usurp security and allow a transaction to occur illegally– Remote user access– Phishing– Social engineering– Mobile device risks

Page 64: © Sean Clark Director of Information Security Practice Brintech, Inc. 124 Canal Street New Smyrna Beach, FL 32168 800.929.2746 SClark@Brintech.com

64

©

Indirect Internet Risks (High)

Remote bank employee accessing bank resources from unsecured networks are hijacked– Keystroke loggers– Trojan horses, worms

Educate customers about phishing Employees socially engineered to allow access

(phone or in-person) Mobile device risks (laptops, PDAs, thumb drives)

containing non-public customer data Rogue wireless network access to bank network Instant messaging poses risk

Page 65: © Sean Clark Director of Information Security Practice Brintech, Inc. 124 Canal Street New Smyrna Beach, FL 32168 800.929.2746 SClark@Brintech.com

65

©

Fixes to Indirect Internet Risks

Restrict use of VPNs and enforce security measures to only allow bank managed devices to attach

Filter traffic allowed into the internal network from VPN and remote entities.

Implement two-factor authentication to protect remote log-on credentials

Implement firewalls, virus protection, and patch management

Page 66: © Sean Clark Director of Information Security Practice Brintech, Inc. 124 Canal Street New Smyrna Beach, FL 32168 800.929.2746 SClark@Brintech.com

66

©

Train employees on social engineering tactics regularly

Limit and control use of mobile devices Check for rogue wireless networks

– Wireless Scanner, etc. Control and monitor Internet traffic

content– WebSense, SurfControl, etc.

Fixes to Indirect Internet Risks

Page 67: © Sean Clark Director of Information Security Practice Brintech, Inc. 124 Canal Street New Smyrna Beach, FL 32168 800.929.2746 SClark@Brintech.com

67

©

WiFi Rogue AP

Page 68: © Sean Clark Director of Information Security Practice Brintech, Inc. 124 Canal Street New Smyrna Beach, FL 32168 800.929.2746 SClark@Brintech.com

68

©

Disable USB Thumb Drives

Windows:– Change permissions of or delete the

USBSTOR.sys file on each system through GPO or manually.

– This will not allow the plug and play system to install the thumbdrive.

– This does not prevent the driver from being used if already installed.

Page 69: © Sean Clark Director of Information Security Practice Brintech, Inc. 124 Canal Street New Smyrna Beach, FL 32168 800.929.2746 SClark@Brintech.com

69

©

Disable Blue-Tooth/ IR –More!

Disable in system BIOS Do not order systems (laptops) with the

capabilities Remove and control the driver

installation same way as USBstor.sys http://support.microsoft.com/

default.aspx?scid=kb;en-us;555324

Page 70: © Sean Clark Director of Information Security Practice Brintech, Inc. 124 Canal Street New Smyrna Beach, FL 32168 800.929.2746 SClark@Brintech.com

70

©

More controls CDR/W-DVR/W

Disable or don’t install Write-Once media

– CDR/W– DVR/W

Page 71: © Sean Clark Director of Information Security Practice Brintech, Inc. 124 Canal Street New Smyrna Beach, FL 32168 800.929.2746 SClark@Brintech.com

71

©

Open Discussion