safeguarding our email

50
1 Safeguarding Our Email Via TLS TLS Webinar nted by: ogers, Director of Distribution Technology, The Har oodcock, President, Courtesy Computers Yates, Executive Director, Agents Council for Techn

Upload: finnea

Post on 30-Jan-2016

41 views

Category:

Documents


0 download

DESCRIPTION

TLS Webinar. Safeguarding Our Email. Via TLS. Presented by: Jim Rogers, Director of Distribution Technology, The Hartford Tim Woodcock, President, Courtesy Computers Jeff Yates, Executive Director, Agents Council for Technology. Agenda. Submit questions via the Question & Answer Log - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: Safeguarding Our Email

1

Safeguarding Our Email Via TLS

TLS Webinar

Presented by:Jim Rogers, Director of Distribution Technology, The HartfordTim Woodcock, President, Courtesy ComputersJeff Yates, Executive Director, Agents Council for Technology

Page 2: Safeguarding Our Email

2

Agenda

Submit questions via the Question & Answer Log

First 30 Minutes:

eMail Usage

Security - Why you should care

Benefits

Resources

Q&A–

Second 30 Minutes:

TLS Configuration of MS Exchange 2003 & 2007

Q&A

Page 3: Safeguarding Our Email

3

Background

Email has become a major component in every day agency/carrier business interactions.

Mail sent over the Internet is typically unprotected

The need to protect email continues to grow

The use of, and reliance on, email within core business workflows will continue to increase

Page 4: Safeguarding Our Email

4

Why Protect e-Mail?

e-Mail often contains sensitive customer information

Required by business contract

Is easily accessible to prying eyes on the Internet

Mandated by regulation

Page 5: Safeguarding Our Email

5

Existing Regulations and Standards

Gramm-Leach-Bliley Act (GLBA) Standards for Safeguarding Customer Info. non-public personal information (NPPI) in paper, electronic, or other form NPII: personally identifiable information provided by a consumer or resulting

from a transaction for a consumer written information security program to address internal/external risks physical, technical and administrative safeguards oversee service providers

Security Breach Notification Laws (Various states) first/last name and SSN/drivers license/state ID/financial account + password when not encrypted must notify any resident of the state of a breach without unreasonable delay

Payment Card Industry Data Security Standards (PCI-DSS) cardholder data certification of compliance with PCI-DSS depending upon level of merchant firewall, encryption in storage/transmission, antivirus, etc. assign individual user IDs

Page 6: Safeguarding Our Email

6

Recent Regulatory Developments

Nevada 597.970

“Restrictions on transfer of personal information through electronic transmission”

Massachusetts 201 CMR 17.00

“Standards for The Protection of Personal Information of Residents of the Commonwealth”

California Department of Motor Vehicles

“On-Line DMV Special Permit Program”

Ohio Department of Insurance Proposed Rule 3901-1-66

“Breach of Security Reporting Requirements”

Page 7: Safeguarding Our Email

7

TLS: Transport Layer Security

Provides secure e-Mail communications across the Internet through a standardized, secure, and non-proprietary mechanism

Eliminates the “drawbacks” that plague the commonly used tools and services

Is built-in to most modern e-Mail systems and just needs to be “turned on” by your technology professional

Page 8: Safeguarding Our Email

8

How Does TLS Work ?

At transmission time, TLS creates an encrypted communication session between email servers

The e-Mail is then sent through a protected “tunnel”

The servers de-crypt the message and send it along to the client

CarrierAgency Partner

Client Client

Encrypted

Page 9: Safeguarding Our Email

9

Transport Layer Security: TLS

“My ssn is: 999 65 9999”“My ssn is: 999 65 9999”

“$erm840 kkfd8820& l1k6ss”

Encrypted Message

Safe/Secure Standard Protocol Available on most email systems Transparent to end-users Eliminates the need for hosted

services Negligible cost

Page 10: Safeguarding Our Email

10

Benefits of TLS

Provides the confidentiality of emails across the Internet

Requires no changes to the client

Is a standards-based protocol that is implemented on most e-Mail gateways and appliances

It’s free, no additional licensing is needed. Security certificate is required.

Page 11: Safeguarding Our Email

11

How Do I Get TLS ?

TLS is a standards-based protocol enabled on most server-based email systems

Talk with your system support staff or e-Mail service provider

Most agencies that have an up-to-date in-house mail server are TLS capable. Agencies with a hosted Microsoft Exchange server are TLS capable. Those with hosted email using hotmail, gmail, and yahoo are not currently TLS capable

Page 12: Safeguarding Our Email

12

Detecting TLS

Talk to the email server administrator Some email contains a tag line if sent via TLS…. at

the bottom of the email More on this in our technical discussion

How do you determine if TLS isactive….

Page 13: Safeguarding Our Email

13

Carriers supporting TLS

Allied/Nationwide Chubb Cincinnati CNA EMC Harleysville The Hartford, Liberty Agency Markets MetLife – MetLife Auto & Home OneBeacon Progressive Summit Holdings Travelers Westfield W.R. Berkley Companies

Note: for updated list of carriers supporting TLS see “Agency Security” Section of www.independentagent.com/act or ask you carrier

Page 14: Safeguarding Our Email

14

Additional Considerations

Important to have your technical support implement TLS Your technical support can tell you which of your carriers

and clients are enabled for TLS If using an external spam/anti-virus filter, you need to

make sure it is enabled for TLS Many hosted email solutions are not enabled for TLS

(e.g., hotmail, gmail, yahoo) You also need to make sure that the connections between

your email server and your remote computers and mobile devices are encrypted

Use your real-time tools wherever possible to transmit client personal information because it is encrypted

If TLS or Real Time not available, send application information using a password protected pdf or zip file

Page 15: Safeguarding Our Email

15

Feedback - TLS Article

Page 16: Safeguarding Our Email

16

Feedback - FAQs

Page 17: Safeguarding Our Email

17

TLS Links

ACT Web site for TLS Article,FAQs, & TLS enabled carriers

http://www.iiaba.net/na/16_AgentsCouncilForTechnology/NA20070710103244?ContentPreference=NA&ActiveState=AZ&ContentLevel1=ACT&ContentLevel2=&ContentLevel3=&ActiveTab=NA&StartRow=0

Technical Links

http://msexchangeteam.com/archive/2006/10/04/429090.aspx

http://technet.microsoft.com/en-us/library/bb430753(EXCHG.80).aspx

Page 18: Safeguarding Our Email

18

Questions so far ???

Page 19: Safeguarding Our Email

19

How to Configure TLS

• Will cover how to procure SSL Certificates

• Representative purposes only and steps here may not be suitable for all environments

• Will cover Exchange 2003 and 2007

• If you are on a different platform, please consult your technical support

Page 20: Safeguarding Our Email

20

Several Sources for Security Certificates

certificate authority (CA) -an entity that issues digital certificates

Verisign http://www.verisign.com

Network Solutions http://www.networksolutions.com

GoDaddy http://www.godaddy.com

Comodo  http://www.comodo.com/

Digi-Sign http://www.digi-sign.com

HOW TO: Use Certificates with Virtual Servers in Exchange Server

http://support.microsoft.com/kb/319574/

Page 21: Safeguarding Our Email

WindowsITPro MS Exchange Server Poll

21

Page 22: Safeguarding Our Email

Difference between Exchange 2003 & 2007

Exchange 2003 • requires a valid X.509 server certificate (suitable for TLS usage)

• DOES NOT support ‘Opportunistic TLS’• Requires to manually configure TLS (minimum 6 steps)• Difficult to monitor TLS transmit-receive success/failures

Exchange 2007• requires a valid X.509 server certificate (suitable for TLS usage)

• ‘Opportunistic TLS is automatically enabled (by default)

• Easy to monitor TLS transmit-receive success/failures• Greater Message Control with Robust ‘Transport Rules’ Features

• Block, Bounce, Copy, append, Send to Archive, Quarantine

22

Page 23: Safeguarding Our Email

TLS Enabling Process with Exchange 2003

Initial 7 Step Process for ‘Server to Server’ TLS

1. Configure an additional IP Address

2. Configure the Default SMTP Virtual Server (VS)

3. Create & Configure the Secure SMTP VS

4. Configure Secure SMTP VS to use certificate

5. Set TLS encryption levels for the Secure SMTP VS

6. Create & Configure the Secure SMTP Connector

7. Notify sending party (carrier) of second SMTP VS IP address

Note: Repeat steps 6 & 7 for each remote domain server you wish to communicate with, utilizing TLS

23

Page 24: Safeguarding Our Email

Configuring an Additional IP Address

24

Page 25: Safeguarding Our Email

Configuring the Default SMTP VS

25

Page 26: Safeguarding Our Email

Creating and Configuring the Secure SMTP VS

26

Page 27: Safeguarding Our Email

Creating and Configuring the Secure SMTP VS

27

Page 28: Safeguarding Our Email

Creating and Configuring the Secure SMTP VS

28

Page 29: Safeguarding Our Email

Configure Secure SMTP VS to use a certificate

29

Page 30: Safeguarding Our Email

Configure Secure SMTP VS to use a certificate

30

Page 31: Safeguarding Our Email

Configure Secure SMTP VS to use a certificate

31

Page 32: Safeguarding Our Email

Set TLS encryption levels for the Secure SMTP Virtual Server

32

Page 33: Safeguarding Our Email

Set TLS encryption levels for the Secure SMTP Virtual Server

33

Page 34: Safeguarding Our Email

34

Set TLS encryption levels for the Secure SMTP Virtual Server

Page 35: Safeguarding Our Email

Creating and Configuring the Secure SMTP Connector

35

Page 36: Safeguarding Our Email

Creating and Configuring the Secure SMTP Connector

36

Page 37: Safeguarding Our Email

Creating and Configuring the Secure SMTP Connector

37

Page 38: Safeguarding Our Email

Creating and Configuring the Secure SMTP Connector

38

Page 39: Safeguarding Our Email

Verifying TLS is ‘Active’ with MS Office 2007

39

Page 40: Safeguarding Our Email

40

Questions

Page 41: Safeguarding Our Email

Follow Up

• Follow up email with our email addresses• PowerPoint & Recording of presentation posted

on “Agency Security/Customer Privacy” link at www.independentagent.com/act

• See more detailed info about security & privacy laws and regulations in the Appendix section of the posted PowerPoint

• Next scheduled TLS Webinar—June 23, 2009, 1:30-2:30 PM eastern time

Page 42: Safeguarding Our Email

Appendices

Details on State Security Regulations

Page 43: Safeguarding Our Email

Nevada 597.970

Who it applies to: “a business in this state”

What information it applies to:

first/last name and SSN/drivers license/state ID/financial account + passwordwhen not encrypted

Examples: tax ID of small businesses, commercial fleet drivers’ license numbers

What is required: Encryption of electronic transmission, except facsimiles

What this means: Organizations doing business in or with other organizations in Nevada must support encryption if sharing data through e-mail, web sites, batch file transfers (FTP), Real Time, file uploads, wireless, web conferencing, etc.

Effective Date: October 1, 2008

Security controls to consider: email……..TLS*, proprietary solutions file-uploads….PGP, SFTP, FTPS, otherweb site, Real Time…SSL wireless….802.11i, LEAP, WPA2 enterprisebatch file transfers.…PGP, SFTP, VPN web conferencing….SSL

For more information see http://na.iiaa.org/ACT/downloads/ACT_TLS_FAQ.doc

Page 44: Safeguarding Our Email

Massachusetts 201 CMR 17.00

Who it applies to: all “entities” that own, license, store or maintain personal information about a resident of Massachusetts

What information it applies to: first/last name + SSN/drivers license/state ID/financial account - passwordwhen not encrypted of any resident of the state

Examples:

Insureds, claimants, employees Applications for insurance, claims, premium payments, claim payments, personnel records, etc.

What is required: • Designating someone to maintain a comprehensive written security program

• Assessing internal and external risks to electronic and paper records

• Imposing disciplinary measures for violations of the security program

• Other common elements of a security program: monitoring, updating safeguards, annual review of program, etc.

Page 45: Safeguarding Our Email

Massachusetts 201 CMR 17.00

New items of note:

• Security of paper and electronic records taken off site

• Assigning unique user IDs and securing passwords

• Terminating logon accounts and passwords of terminated employees

• Contractually requiring vendors to comply with these requirements

• Limiting time this information is retained (records management)

• Documenting breaches and conducting post-incident reviews of incidents

• Encryption of portable devices required (laptops, PDA’s, phones, Blackberries, CD,

DVD, USB drives)

• Encryption of transmitted information where feasible

• Reasonably update firewalls and patching of systems connected to the Internet

Effective Date: January 1, 2010

Page 46: Safeguarding Our Email

Massachusetts 201 CMR 17.00

What this means for our industry / security controls:

• Agents, carriers and vendors must have a formal security program including specific physical, technical and administrative security measures, including third party oversight and management of portable devices

• Increased need for carriers and vendors to modify their systems, web sites, and Real Time interfaces to support industry standards for user administration and password management in agencies

• Implementation of TLS where technically feasible

• Organizations must have security staff or consultants available for administration of firewalls and patching of servers and workstations

For more information see: http://www.mass.gov/Eoca/docs/idtheft/201CMR17amended.pdf

Page 47: Safeguarding Our Email

California DMV

Who it applies to: • Entities that provide access to entities that are authorized DMV “requestors”

• Entities that access DMV information on behalf of authorized “requestors”

What information it applies to: • Personnel information provided by the DMV

• Examples: MVR (CLUE, scoring, resident addresses)

What is required: • Various requirements depending upon the circumstances. For example….

Those organizations with direct access to DMV systems and information must:• lockdown servers

• user accounts must lock out after 5 unsuccessful logon attempts

• users must select their own passwords and expire within 90 days

• potential security incidents must be reported within 1 business day to the DMV

Those permitting direct electronic access to information must identify the account ID’s being used for that access so that it can be programmed into the system

Page 48: Safeguarding Our Email

California DMV

Individuals with access to DMV information must sign a security agreement form (1128), even if that individual is in another organization. Agreement requires

• No password sharing

• Storing passwords in a secure place

• Any administrator or other with incidental access must sign agreement as well

What this means for our industry / security controls: • Carriers/vendors using DMV information to provide interactive rating information to agencies,

must store agency account IDs so that these IDs can be passed through their systems.

• Carriers/vendors which access this information for agencies or pass this information to agencies, must retain specific logs of all such access for 2 - 5 years

• Carriers/vendors which access this information for agencies or pass this information to agencies must provide a copy of the agency contract upon request.

Effective Date: Various (all currently in effect)

For more information see http://www.dmv.ca.gov/forms/forms_cra.htm

Page 49: Safeguarding Our Email

Ohio Dept of Insurance Proposed Rule 3901-1-66

Who it would apply to:

Regulated insurance entities including insurance agents, a property and casualty insurance company… or any other entity that requires a license… from the Superintendant of Insurance to conduct business within Ohio

What information it applies to: first/last name and SSN/drivers license/state ID/financial account

when not encrypted or redacted in the file of a resident of Ohio

Examples: Application for insurance, claims

What is required: Entity must report a security breach within 15 calendar days of discovery. Additional details may be required after initial report received.

Page 50: Safeguarding Our Email

Ohio Dept of Insurance Proposed Rule 3901-1-66

What this means for our industry /security controls:

• Modify current incident response procedures to include

reporting requirements beyond those already in effect in

the state

• Unclear as to who is responsible to report a breach of a

carrier site at an agency or how such duplicate reports

would be coordinated/reconciled

Effective Date: Rule pending