microsoft en la empresa y el gobierno - csirt · pdf filewhitepaper “deploying sql...

35
Microsoft en la empresa y el Gobierno

Upload: phamnhu

Post on 16-Mar-2018

221 views

Category:

Documents


2 download

TRANSCRIPT

Page 1: Microsoft en la empresa y el Gobierno - CSIRT · PDF fileWhitepaper “Deploying SQL Server Based on Payment Card Industry Data Security Standards (PCI DSS 2.0) ... (now ParenteBeard)

Microsoft en la empresa y el Gobierno

Page 2: Microsoft en la empresa y el Gobierno - CSIRT · PDF fileWhitepaper “Deploying SQL Server Based on Payment Card Industry Data Security Standards (PCI DSS 2.0) ... (now ParenteBeard)
Page 3: Microsoft en la empresa y el Gobierno - CSIRT · PDF fileWhitepaper “Deploying SQL Server Based on Payment Card Industry Data Security Standards (PCI DSS 2.0) ... (now ParenteBeard)

El cambio de rol de TI

Microsoft es el único habilitado para ayudarlo a balancear las expectativas de los usuarios con los requerimientos institucionales.

Seguridad y Administración

herramientas que ayudan a IT a proteger las

organizaciones

Dispositivos Windows-based

que las personas gustan de utilizar

Windows Next

Cuatro Pilares de nuestra estrategia:

Desarrollo de Aplicaciones

herramientas que simplifican y enriquecen

experiencia desarrolladores

Productividad

herramientas que trabajan “como” y “con” servicios

para consumidores

Page 4: Microsoft en la empresa y el Gobierno - CSIRT · PDF fileWhitepaper “Deploying SQL Server Based on Payment Card Industry Data Security Standards (PCI DSS 2.0) ... (now ParenteBeard)
Page 5: Microsoft en la empresa y el Gobierno - CSIRT · PDF fileWhitepaper “Deploying SQL Server Based on Payment Card Industry Data Security Standards (PCI DSS 2.0) ... (now ParenteBeard)

7.5

Windows 7

¡Impleméntelo hoy!

Windows 8 es

Windows reinventado

Page 6: Microsoft en la empresa y el Gobierno - CSIRT · PDF fileWhitepaper “Deploying SQL Server Based on Payment Card Industry Data Security Standards (PCI DSS 2.0) ... (now ParenteBeard)
Page 7: Microsoft en la empresa y el Gobierno - CSIRT · PDF fileWhitepaper “Deploying SQL Server Based on Payment Card Industry Data Security Standards (PCI DSS 2.0) ... (now ParenteBeard)

• Interfaz optimizada para pantalla táctil y lápiz

digital

• Soporte sin paralelos para seguridad

empresaria

• Entorno de desarrollo unificado

• Más resistente/a prueba de agua/saneada

• Lectora de código de barras y tarjetas de

crédito

• Integración de aplicaciones comerciales

• Sincronización on- y offline

Page 8: Microsoft en la empresa y el Gobierno - CSIRT · PDF fileWhitepaper “Deploying SQL Server Based on Payment Card Industry Data Security Standards (PCI DSS 2.0) ... (now ParenteBeard)

••

Page 9: Microsoft en la empresa y el Gobierno - CSIRT · PDF fileWhitepaper “Deploying SQL Server Based on Payment Card Industry Data Security Standards (PCI DSS 2.0) ... (now ParenteBeard)
Page 10: Microsoft en la empresa y el Gobierno - CSIRT · PDF fileWhitepaper “Deploying SQL Server Based on Payment Card Industry Data Security Standards (PCI DSS 2.0) ... (now ParenteBeard)

Administre los permisos de acceso a las aplicaciones para cada usuario, no para cada

dispositivo individual

Tradicional App-V Citrix XenApp

Administrado No administrado, basado en

Windows

No administrado, sin base en

Windows

Page 12: Microsoft en la empresa y el Gobierno - CSIRT · PDF fileWhitepaper “Deploying SQL Server Based on Payment Card Industry Data Security Standards (PCI DSS 2.0) ... (now ParenteBeard)

Page 14: Microsoft en la empresa y el Gobierno - CSIRT · PDF fileWhitepaper “Deploying SQL Server Based on Payment Card Industry Data Security Standards (PCI DSS 2.0) ... (now ParenteBeard)
Page 15: Microsoft en la empresa y el Gobierno - CSIRT · PDF fileWhitepaper “Deploying SQL Server Based on Payment Card Industry Data Security Standards (PCI DSS 2.0) ... (now ParenteBeard)

Nota del presentador:

personalice la diapositiva para

su cliente y luego descúbrala.

Vea las notas de la misma para

obtener mayor información

sobre los próximos pasos del

marcador de posición.

Windows Server 2008 R2 Active Directory

Page 16: Microsoft en la empresa y el Gobierno - CSIRT · PDF fileWhitepaper “Deploying SQL Server Based on Payment Card Industry Data Security Standards (PCI DSS 2.0) ... (now ParenteBeard)
Page 17: Microsoft en la empresa y el Gobierno - CSIRT · PDF fileWhitepaper “Deploying SQL Server Based on Payment Card Industry Data Security Standards (PCI DSS 2.0) ... (now ParenteBeard)

Microsoft Confidential

Security Strategy Briefing Marco A. Zúñiga Public Sector Manager Julio 2012

Page 18: Microsoft en la empresa y el Gobierno - CSIRT · PDF fileWhitepaper “Deploying SQL Server Based on Payment Card Industry Data Security Standards (PCI DSS 2.0) ... (now ParenteBeard)

Microsoft Confidential

Page 19: Microsoft en la empresa y el Gobierno - CSIRT · PDF fileWhitepaper “Deploying SQL Server Based on Payment Card Industry Data Security Standards (PCI DSS 2.0) ... (now ParenteBeard)

Microsoft Confidential

• Secures against attacks • Protects confidentiality,

integrity, and availability of data and systems

• Helps manage risk

• Protects from unwanted communication

• User choice and control • Products, online services

adhere to fair information principles

• Dependable, available • Predictable, consistent,

responsive service • Maintainable • Resilient, easily restored • Proven, ready

• Commitment to customer-centric interoperability

• Recognized industry leader, world-class partner

• Open, Transparent

Page 20: Microsoft en la empresa y el Gobierno - CSIRT · PDF fileWhitepaper “Deploying SQL Server Based on Payment Card Industry Data Security Standards (PCI DSS 2.0) ... (now ParenteBeard)

Microsoft Confidential

Page 21: Microsoft en la empresa y el Gobierno - CSIRT · PDF fileWhitepaper “Deploying SQL Server Based on Payment Card Industry Data Security Standards (PCI DSS 2.0) ... (now ParenteBeard)

Microsoft Confidential

Sony Finds More Cases of Hacking of Its Servers By NICK BILTON , May 2, 2011

Sony said Monday that it had discovered that more credit card information and customer profiles had been compromised during an attack on its servers last week.

Microsoft Exposes Scope of Botnet Threat By Tony Bradley, October 15, 2010

Microsoft's latest Security Intelligence Report focuses on the expanding threat posed by bots and botnets. Microsoft this week unveiled the ninth volume of its Security Intelligence Report (SIR). The semi-annual assessment of the state of computer and Internet security and overview of the threat landscape generally yields some valuable information. This particular edition of the Security Intelligence Report focuses its attention on the threat posed by botnets.

Page 22: Microsoft en la empresa y el Gobierno - CSIRT · PDF fileWhitepaper “Deploying SQL Server Based on Payment Card Industry Data Security Standards (PCI DSS 2.0) ... (now ParenteBeard)

Microsoft Confidential

Global Foundation

Services (GFS)

Malware Protection

Center

Microsoft Security Response Center

(MSRC)

Page 23: Microsoft en la empresa y el Gobierno - CSIRT · PDF fileWhitepaper “Deploying SQL Server Based on Payment Card Industry Data Security Standards (PCI DSS 2.0) ... (now ParenteBeard)

Microsoft Confidential

SECURITY FUNDAMENTALS

TECHNOLOGY INNOVATIONS

INDUSTRY LEADERSHIP

Page 24: Microsoft en la empresa y el Gobierno - CSIRT · PDF fileWhitepaper “Deploying SQL Server Based on Payment Card Industry Data Security Standards (PCI DSS 2.0) ... (now ParenteBeard)

Microsoft Confidential

Ongoing Process Improvements – 12 month cycle

Education Accountability Process

Page 25: Microsoft en la empresa y el Gobierno - CSIRT · PDF fileWhitepaper “Deploying SQL Server Based on Payment Card Industry Data Security Standards (PCI DSS 2.0) ... (now ParenteBeard)

Microsoft Confidential

DEVICES

APPS

INFORMATION PROTECTION

ACCESS CONTROL

ANTI- MALWARE

POLICY MANAGEMENT

RESEARCH & RESPONSE

SECURE DEVELOPMENT

Private Cloud

Public Cloud

On-Premises Online

Page 26: Microsoft en la empresa y el Gobierno - CSIRT · PDF fileWhitepaper “Deploying SQL Server Based on Payment Card Industry Data Security Standards (PCI DSS 2.0) ... (now ParenteBeard)

Microsoft Confidential

Devices

DEVICES

Private Cloud

Public Cloud

INFORMATION PROTECTION

ACCESS CONTROL

ANTI- MALWARE

POLICY MANAGEMENT

RESEARCH & RESPONSE

SECURE DEVELOPMENT

On-Premises Online

Page 27: Microsoft en la empresa y el Gobierno - CSIRT · PDF fileWhitepaper “Deploying SQL Server Based on Payment Card Industry Data Security Standards (PCI DSS 2.0) ... (now ParenteBeard)

Microsoft Confidential

Universal Extensible Firmware Interface (UEFI) Trusted Platform Model (TPM)

Windows Standard User Accounts User Account Control, and AppLocker Modern Applications Security Development Lifecycle (SDL)

• Maintain software with a patch management solution • Deliver software that is secure by design • Operate a malware resistant platform and applications

Protect Against and Manage Threats

Windows 7 BitLocker MDOP -BitLocker Administration and Monitoring Office Information Rights Management (IRM) Office Encrypted File System Active Directory Rights Management Services z

• Secure data that is at rest with encryption • Protect data that is in motion with encryption • Protect data that is in use with access controls

Active Directory Direct Access Network Access Protection Dynamic Access Control

• Manage the full identity lifecycle • Validate user identity with strong

authentication • Secured and always connected remote access • Protect resources as environment changes

Protect Sensitive Data Secure Access to Resources

Secured Boot Measured Boot Protected View IE Smart Screen

Page 28: Microsoft en la empresa y el Gobierno - CSIRT · PDF fileWhitepaper “Deploying SQL Server Based on Payment Card Industry Data Security Standards (PCI DSS 2.0) ... (now ParenteBeard)

Microsoft Confidential

Page 29: Microsoft en la empresa y el Gobierno - CSIRT · PDF fileWhitepaper “Deploying SQL Server Based on Payment Card Industry Data Security Standards (PCI DSS 2.0) ... (now ParenteBeard)

Microsoft Confidential

Cloud Platform Services

Cloud Infrastructure

Cloud Services

Global Foundation Services

Security Global Delivery Sustainability Infrastructure

Page 30: Microsoft en la empresa y el Gobierno - CSIRT · PDF fileWhitepaper “Deploying SQL Server Based on Payment Card Industry Data Security Standards (PCI DSS 2.0) ... (now ParenteBeard)

Microsoft Confidential

Cloud Services

Cloud Infrastructure

Cloud Platform Services

Cloud Services

Users

Data

Application

Host

Network

Physical

Cloud Provider

Cloud Consumer Cloud Platform

Services

Cloud Infrastructure

Page 31: Microsoft en la empresa y el Gobierno - CSIRT · PDF fileWhitepaper “Deploying SQL Server Based on Payment Card Industry Data Security Standards (PCI DSS 2.0) ... (now ParenteBeard)

Microsoft Confidential

Windows Server Core

File Classification

Infrastructure

Direct Access

Bitlocker

Server and Domain Isolation

Network Access Protection

Kernel Mode Code Signing

Micro-Kernel Based

Architecture

Restricted-Access Hypervisor

Full Guest Isolation

Monitoring and Policy

Enforced via Parent Partition

System Center Manageability

Active Directory

Read-Only Domain Controller

Federation Services

Rights Management Services

Certificate Authority Services

Cloud Service Integration

Forefront Identity Manager

Secure at

the Foundation

Server Virtualization

and Private Cloud

Identity and Policy

Management

Page 32: Microsoft en la empresa y el Gobierno - CSIRT · PDF fileWhitepaper “Deploying SQL Server Based on Payment Card Industry Data Security Standards (PCI DSS 2.0) ... (now ParenteBeard)

Microsoft Confidential

Helping to making it easy for organizations to meet compliance policies

Transparent Data Encryption

Backup Encryption

Extensible Key Management

Crypto enhancements

Protect Data Control Access Ensure Compliance

Help protect your data with a

database solution that is historically

known for the lowest vulnerabilities

across the major DBMS vendors

Control access to your data by managing

authentication and authorization

effectively and by providing access to

only users who need it

Ensure compliance with company

policies and/or government

regulations like HIPAA, PCI, and

Common Criteria

Kerberos authentication

User-Defined Server Roles

Default Schema for Groups

Contained Database Authentication

Policy-Based Management

User-Defined Audit, Filtering, and Resilience

SQL Server Audit in all SKUs

Change Data Capture

Whitepaper “SQL Server Delivers Industry-Leading Security” by ITIC, a leading analyst firm Whitepaper “Supporting HIPAA Compliance with SQL Server,” by Information Security Center of Expertise

at Jefferson Wells International, Inc, a leading Risk Advisory and Security Compliance services organization. Whitepaper “Deploying SQL Server Based on Payment Card Industry Data Security Standards (PCI DSS 2.0),”

by certified audit firm, Parente Randolph (now ParenteBeard). KB Support Article How to use SQL Server in FIPS 140-2 compliant mode

Page 33: Microsoft en la empresa y el Gobierno - CSIRT · PDF fileWhitepaper “Deploying SQL Server Based on Payment Card Industry Data Security Standards (PCI DSS 2.0) ... (now ParenteBeard)

Microsoft Confidential

Communicate and collaborate more securely using Exchange, SharePoint, Lync, and Office

Multi-layered protection

against spam and malware

Effectiveness guaranteed by

5 financially-backed SLAs

In-product controls that help

protect users from threats

Comprehensive Protection

Policy rules that inspect

emails in transit

Integration with AD RMS

to safeguard sensitive data

End-to-end encryption

of communications

Information Security

Integrated administration,

reporting, and auditing

Granular control over user

access and permissions

Mobile security policies and

remote device wipe

Visibility and Control

Page 34: Microsoft en la empresa y el Gobierno - CSIRT · PDF fileWhitepaper “Deploying SQL Server Based on Payment Card Industry Data Security Standards (PCI DSS 2.0) ... (now ParenteBeard)

Microsoft Confidential

Security Response Center

Security Development Lifecycle

Security TechCenter

Security Intelligence Report

Microsoft Security Update Guide

Security Development Center

End to End Trust

Malware Protection Center

Trustworthy Computing

Security Blog

www.microsoft.com /security/msrc

www.microsoft.com /security/sir

www.microsoft.com /sdl

technet.microsoft.com /security

www.microsoft.com /securityupdateguide

msdn.microsoft.com /security

www.microsoft.com /twc

www.microsoft.com /endtoendtrust

www.microsoft.com /security/portal

www.microsoft.com /about/twc/en/us/blogs.aspx

Page 35: Microsoft en la empresa y el Gobierno - CSIRT · PDF fileWhitepaper “Deploying SQL Server Based on Payment Card Industry Data Security Standards (PCI DSS 2.0) ... (now ParenteBeard)

Microsoft Confidential

© 2011 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.