getting to zero: achieving zero loss of crown jewel ip

25

Upload: torin

Post on 03-Feb-2016

47 views

Category:

Documents


0 download

DESCRIPTION

Getting to Zero: Achieving Zero Loss of Crown Jewel IP. CTO Design Challenge Team. A National Crisis. Ongoing, state-sponsored theft of Government and Commercial IP - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: Getting to Zero: Achieving Zero Loss of Crown Jewel IP
Page 2: Getting to Zero: Achieving Zero Loss of Crown Jewel IP

Getting to Zero: Achieving Zero Loss of Crown Jewel IPGetting to Zero: Achieving

Zero Loss of Crown Jewel IPCTO Design Challenge Team

Page 3: Getting to Zero: Achieving Zero Loss of Crown Jewel IP

A National CrisisA National Crisis

• Ongoing, state-sponsored theft of Government and Commercial IP

• “This may be the greatest transfer of wealth through theft and piracy in the history of the world and we are on the losing end of it.”

- Sen. Sheldon Whitehouse of Rhode Island

• $300 Billion cost to US each year- Source: Commission on the Theft of American

Intellectual Property

Page 4: Getting to Zero: Achieving Zero Loss of Crown Jewel IP

A Policy and Technology Response

A Policy and Technology Response

• “If we do not hang together, we shall surely hang separately” – Thomas Paine

• “Everyone has been penetrated and will continue to be penetrated” – US Gov’t

Page 5: Getting to Zero: Achieving Zero Loss of Crown Jewel IP

Crown JewelsCrown Jewels• Fake Jewels with Payload (think of “parting gift”)

• Code looks real, compiles, boots, gathers data and phones home

• Traceable “Honeypots”, “Honeytokens”, signatures• Prevent Single Points of Failure with requirement of

Multiple trusted employees using “two keys for a missile launch”

• Frequent, inconsistent movement of IP “shell game”• Protect by physical isolation• Obfuscate the Jewels

• Distribute components, withhold “keystone” offsite

Page 6: Getting to Zero: Achieving Zero Loss of Crown Jewel IP

Trade Policy – Trans Pacific PartnersTrade Policy – Trans Pacific Partners• Import tariffs on stolen IP-based products

– Alt: Delay imports, deny entry, seize ships/goods• Prevent companies trading technology for access

– Enforce Wassenaar Arrangement• Export controls on arms and dual-use tech

• Penalize companies selling stolen-IP– Arrest, charge execs of offending companies– Deny/revoke visas to other company representatives– Deny access to stock exchanges– Deny ownership in US companies

Page 7: Getting to Zero: Achieving Zero Loss of Crown Jewel IP

Industry PolicyIndustry Policy• Create industry-specific consortia

– Establish consortia-specific private networks– Think “SABREnet” (US airlines)

• Create/Leverage Industry CSO organization– Discuss/share threat information, observations– Establish threat levels, vectors

• Physical isolation, secure networks, & restrictive access policies

Page 8: Getting to Zero: Achieving Zero Loss of Crown Jewel IP

Governmental PolicyGovernmental Policy• CSO: SEC compliance statement

– Separate from financial audit– Security compliance, reporting– Data classification and marking

• Equivalent of MSDS sheet• How valuable to other people• (Nat’l, Industrial, Corp) Security or Trade Secret

– Watermarking, digital leakage prevention

Page 9: Getting to Zero: Achieving Zero Loss of Crown Jewel IP

Academic PoliciesAcademic Policies• Universities must have IP protection as part of their

major studies required coursework in order to apply for/receive US agency funding– Renewed/audited yearly for first 5 years– Benefits both US students, and instills IP mindset in

foreign students– Publishing hold-backs: key processes held back from

generally-published papers• Universities need to understand their own profitability• Detail requires specific disclosure process• Particular audits for non Trans-

Pacific Partnership disclosures

Page 10: Getting to Zero: Achieving Zero Loss of Crown Jewel IP

Organization PoliciesOrganization Policies• Implement dual networks (red/green)• Machines run dual VMs (red/green)• Red VM and network interface

– Internal applications, Email (restricted)– Intranet access only– Changing IP and MAC addresses randomly– Aggressive network monitoring

• Green VM and network interface– Internet access– no access to internal network

• Document classification mapped topotential dollar loss. Required training.

Page 11: Getting to Zero: Achieving Zero Loss of Crown Jewel IP

Organization ITOrganization IT• Machines/devices locked-down

– TPM ecosystem, NIST 7904 (Geofencing/Geolocation)– No BYOD, devices encrypted, secured

• Ports are locked-out, UETF-lockout– Only boot from encrypted HD

• Drives encrypted – require TPM• Only the application that has access to the information has the

encryption access– Must go through the agent

• Encryption and Key management is reasonable expense: $20K for a company, $2K for a server

• Ability for Emergency Push of changes

Page 12: Getting to Zero: Achieving Zero Loss of Crown Jewel IP

A National Priority?A National Priority?

• So let me now be blunt for you and for the American people – Sequestration forces the intelligence community to reduce all intelligence activities and functions without regard to impact on our mission. In my considered judgment as the nation's senior intelligence officer, sequestration jeopardizes our nation's safety and security, and this jeopardy will increase over time.

• – James R. Clapper, Director of National Intelligence

Page 13: Getting to Zero: Achieving Zero Loss of Crown Jewel IP

Thank you…Thank you…

Page 14: Getting to Zero: Achieving Zero Loss of Crown Jewel IP

Organization: Executive LevelOrganization: Executive Level• Board of Directors Accountability & Awareness• Chief Security Officer – SEC compliance

– Responsibility of rank-ordering the Crown Jewels periodically. Refresh entire list.

• Full review/update of organizational security made 20 years ago. Aggressive steps– Drive internal security culture change– Required continual training of employees

• Planted employees

Page 15: Getting to Zero: Achieving Zero Loss of Crown Jewel IP

Organization PoliciesOrganization Policies• Tiered defense• IP classification on all

documents/devices/materials– Red/Orange/Yellow books– No removal from room/bldg/campus

• Compartmentalize information, limited disclosure• Traceability: both individuals and devices• Clean, secured desks/cabinets

– Strong Enforcement: One warning and/or dismissal

Page 16: Getting to Zero: Achieving Zero Loss of Crown Jewel IP

Organizations: FacilitiesOrganizations: Facilities

• Secured, limited entrances; no piggybacking– Positive, two-factor identity in critical areas

• Visible, changing badges

• Cameras, monitoring

• Changes in unexpected ways– Avoid predictability

Page 17: Getting to Zero: Achieving Zero Loss of Crown Jewel IP

EmployeeEmployee

• Badge changes, limited access

• Periodic access and security reviews, renewals

• Building, server, group policies

• Enforce Least Privilege

Page 18: Getting to Zero: Achieving Zero Loss of Crown Jewel IP

• Org Processes and Methodologies– IP clarification: know your crown jewels– Tiered defense– Protect by physical isolation– Frequent movement– Compartmentalization– Traceability: both individuals and devices– Multiple stakeholders: “two set of eyes”– Move IP and IT to a more secure Cloud Based

solution

• Organization and Governance– Org culture change related to security awareness– Training of internal stakeholders– Board of Directors role

Private Sector IP Protection Tactics – Multidisciplinary Approach

Private Sector IP Protection Tactics – Multidisciplinary Approach

• Technology Solutions– Encryption done the right way: do it all– Key protection– Privileged credential protection– Information sharing management– Device tracking outside network– Use Strong Compliance Frameworks:

FedRAMP, ISO 27000, PCI

• Private sector coalition– Framework to defend and retaliate

Page 19: Getting to Zero: Achieving Zero Loss of Crown Jewel IP

• Increase the role of government– Enforcing Law, Diplomatic Pressure, Share DoD level Security Protection Methods

• Raise the economic cost of IP theft– Ban products based on IP theft from US market

– Restrict US financial system for companies whose products are based on IP theft

• Build offensive capabilities

Public Sector Role in IP Protection – Balance between strong offensive and defensive strategies

Public Sector Role in IP Protection – Balance between strong offensive and defensive strategies

Page 20: Getting to Zero: Achieving Zero Loss of Crown Jewel IP

Broad Scope of Impact and InvolvementBroad Scope of Impact and Involvement

Stakeholder Ecosystem

• Corporate Executives

• Employees

• Partners (e.g., supply chain, distribution, etc.)

• Policy makers

Vehicles for IP Theft Ecosystem

• All devices (PCs, laptops, mobile devices, sensors, etc.)

• Networks

• Other??

Page 21: Getting to Zero: Achieving Zero Loss of Crown Jewel IP

A M

ult

ilay

ered

S

olu

tio

nA

Mu

ltil

ayer

ed

So

luti

on

Page 22: Getting to Zero: Achieving Zero Loss of Crown Jewel IP
Page 23: Getting to Zero: Achieving Zero Loss of Crown Jewel IP
Page 24: Getting to Zero: Achieving Zero Loss of Crown Jewel IP
Page 25: Getting to Zero: Achieving Zero Loss of Crown Jewel IP