mitigating it risks with data classification and access ...€¦ · mitigating it risks with data...

34
@TechTrainerTim techtrainertim.com AUTHOR EVANGELIST, PLURALSIGHT Tim Warner Mitigating IT Risks with Data Classification and Access Control [email protected] MANAGER OF SYSTEMS ENGINEERING, NETWRIX Jeff Melnick

Upload: others

Post on 17-Aug-2020

4 views

Category:

Documents


1 download

TRANSCRIPT

Page 1: Mitigating IT Risks with Data Classification and Access ...€¦ · Mitigating IT Risks with Data Classification and Access Control Jeff.Melnick@netwrix.com MANAGER OF ... Least privilege

@TechTrainerTim techtrainertim.com

AUTHOR EVANGELIST, PLURALSIGHT

Tim Warner

Mitigating IT Risks with Data Classification and Access Control

[email protected]

MANAGER OF SYSTEMS ENGINEERING,

NETWRIX

Jeff Melnick

Page 2: Mitigating IT Risks with Data Classification and Access ...€¦ · Mitigating IT Risks with Data Classification and Access Control Jeff.Melnick@netwrix.com MANAGER OF ... Least privilege

This slide is

with

animations

"Fireside chat" format

- Tim introduces a subject

- Jeff answers a related question

Jeff then presents on Netwrix

Attendee Q/A

Overview

Page 3: Mitigating IT Risks with Data Classification and Access ...€¦ · Mitigating IT Risks with Data Classification and Access Control Jeff.Melnick@netwrix.com MANAGER OF ... Least privilege

This slide is

with

animations

General Data Protection Regulation (25

May 2018)

European Union (EU)

Aims to give citizens greater control over

their personal data

GDPR

Page 4: Mitigating IT Risks with Data Classification and Access ...€¦ · Mitigating IT Risks with Data Classification and Access Control Jeff.Melnick@netwrix.com MANAGER OF ... Least privilege

"Businesses here in the US might have heard of GDPR but not believe it affects them. Please explain how GDPR may indeed affect US organizations."

Question for Jeff

Page 5: Mitigating IT Risks with Data Classification and Access ...€¦ · Mitigating IT Risks with Data Classification and Access Control Jeff.Melnick@netwrix.com MANAGER OF ... Least privilege

The process of organizing data into categories for its most

effective and efficient use. This can be of particular

importance for risk management, legal discovery, and

compliance.

Data Classification

Page 6: Mitigating IT Risks with Data Classification and Access ...€¦ · Mitigating IT Risks with Data Classification and Access Control Jeff.Melnick@netwrix.com MANAGER OF ... Least privilege

Dynamic Access

Control (DAC)

Admins can perform manually

classification

Take actions: encryption, move,

etc.

Classify by location, content,

PII

Rules for automatically

classifying files

Windows Server

feature

Microsoft File Classification Infrastructure (FCI)

Page 7: Mitigating IT Risks with Data Classification and Access ...€¦ · Mitigating IT Risks with Data Classification and Access Control Jeff.Melnick@netwrix.com MANAGER OF ... Least privilege

A UK-based software company incorporated in February

1985, and specializing in data classification and secure

messaging solutions aimed primarily at the commercial,

defense, intelligence and government marketplaces.

Boldon James

Page 8: Mitigating IT Risks with Data Classification and Access ...€¦ · Mitigating IT Risks with Data Classification and Access Control Jeff.Melnick@netwrix.com MANAGER OF ... Least privilege

"Some discovery/auditing software uses Boldon James keyword classification. What does Netwrix use, and why?"

Question for Jeff

Page 9: Mitigating IT Risks with Data Classification and Access ...€¦ · Mitigating IT Risks with Data Classification and Access Control Jeff.Melnick@netwrix.com MANAGER OF ... Least privilege

"What are the risks for data classification implementation? How can a business avoid pitfalls in data classification initiatives?"

Question for Jeff

Page 10: Mitigating IT Risks with Data Classification and Access ...€¦ · Mitigating IT Risks with Data Classification and Access Control Jeff.Melnick@netwrix.com MANAGER OF ... Least privilege

Also called authorization. A security technique that can

be used to regulate who or what can view or use

resources in a computing environment. Compare with

authentication.

Access Control

Page 11: Mitigating IT Risks with Data Classification and Access ...€¦ · Mitigating IT Risks with Data Classification and Access Control Jeff.Melnick@netwrix.com MANAGER OF ... Least privilege

Shared Folder and NTFS Permissions

timw.info/fsv

Effective permissions

Least privilege

Inheritance

Page 12: Mitigating IT Risks with Data Classification and Access ...€¦ · Mitigating IT Risks with Data Classification and Access Control Jeff.Melnick@netwrix.com MANAGER OF ... Least privilege

This slide is

with

animations

Character sequence

that defines a string

search pattern

Originated in

cognitive science

Enormously useful in

IT

Regular Expressions (Regex)

timw.info/rex

Page 13: Mitigating IT Risks with Data Classification and Access ...€¦ · Mitigating IT Risks with Data Classification and Access Control Jeff.Melnick@netwrix.com MANAGER OF ... Least privilege

"How can businesses use regexes to discover sensitive data?"

Question for Jeff

Page 14: Mitigating IT Risks with Data Classification and Access ...€¦ · Mitigating IT Risks with Data Classification and Access Control Jeff.Melnick@netwrix.com MANAGER OF ... Least privilege

Hybrid Cloud/SaaS Infrastructure

timw.info/hyc

SaaS

SSO

Cloud storage

Page 15: Mitigating IT Risks with Data Classification and Access ...€¦ · Mitigating IT Risks with Data Classification and Access Control Jeff.Melnick@netwrix.com MANAGER OF ... Least privilege

"How can data classification work in a hybrid cloud situation; say with Dropbox, OneDrive, Amazon S3, or Azure storage?"

Question for Jeff

Page 16: Mitigating IT Risks with Data Classification and Access ...€¦ · Mitigating IT Risks with Data Classification and Access Control Jeff.Melnick@netwrix.com MANAGER OF ... Least privilege

This slide is

with

animations

Disgruntled ex-employee

He/she was able to gain access to their

personal and company-related data

remotely

Results:

- Corporate public embarrassment

- PII exposure

- IP exposure

- Lost public trust

- Lost revenues

Real-life breach

example: Sony

Pictures Hack

(2014)

Page 17: Mitigating IT Risks with Data Classification and Access ...€¦ · Mitigating IT Risks with Data Classification and Access Control Jeff.Melnick@netwrix.com MANAGER OF ... Least privilege

"How can Netwrix help businesses identify whether sensitive data has been breached?"

Question for Jeff

Page 18: Mitigating IT Risks with Data Classification and Access ...€¦ · Mitigating IT Risks with Data Classification and Access Control Jeff.Melnick@netwrix.com MANAGER OF ... Least privilege

"Regarding compliance: Assuming there has been a breach, how can Netwrix help determine the breach's severity?"

Question for Jeff

Page 19: Mitigating IT Risks with Data Classification and Access ...€¦ · Mitigating IT Risks with Data Classification and Access Control Jeff.Melnick@netwrix.com MANAGER OF ... Least privilege

Demo

This bullet list is

with

animations

Netwrix Auditor

Page 20: Mitigating IT Risks with Data Classification and Access ...€¦ · Mitigating IT Risks with Data Classification and Access Control Jeff.Melnick@netwrix.com MANAGER OF ... Least privilege

IT Risk Assessment

Page 21: Mitigating IT Risks with Data Classification and Access ...€¦ · Mitigating IT Risks with Data Classification and Access Control Jeff.Melnick@netwrix.com MANAGER OF ... Least privilege

Alerts on Threat Patterns

Page 22: Mitigating IT Risks with Data Classification and Access ...€¦ · Mitigating IT Risks with Data Classification and Access Control Jeff.Melnick@netwrix.com MANAGER OF ... Least privilege

Behavior Anomaly Discovery

Page 23: Mitigating IT Risks with Data Classification and Access ...€¦ · Mitigating IT Risks with Data Classification and Access Control Jeff.Melnick@netwrix.com MANAGER OF ... Least privilege

User Behavior and Blind Spots Analysis

Page 24: Mitigating IT Risks with Data Classification and Access ...€¦ · Mitigating IT Risks with Data Classification and Access Control Jeff.Melnick@netwrix.com MANAGER OF ... Least privilege

User Behavior and Blind Spots Analysis

Page 25: Mitigating IT Risks with Data Classification and Access ...€¦ · Mitigating IT Risks with Data Classification and Access Control Jeff.Melnick@netwrix.com MANAGER OF ... Least privilege

Data Discovery and Classification

Page 26: Mitigating IT Risks with Data Classification and Access ...€¦ · Mitigating IT Risks with Data Classification and Access Control Jeff.Melnick@netwrix.com MANAGER OF ... Least privilege

Data Discovery and Classification

Page 27: Mitigating IT Risks with Data Classification and Access ...€¦ · Mitigating IT Risks with Data Classification and Access Control Jeff.Melnick@netwrix.com MANAGER OF ... Least privilege

Interactive Search

Page 28: Mitigating IT Risks with Data Classification and Access ...€¦ · Mitigating IT Risks with Data Classification and Access Control Jeff.Melnick@netwrix.com MANAGER OF ... Least privilege

Enterprise Overview Dashboards

Page 29: Mitigating IT Risks with Data Classification and Access ...€¦ · Mitigating IT Risks with Data Classification and Access Control Jeff.Melnick@netwrix.com MANAGER OF ... Least privilege

Health Status Dashboard

Page 30: Mitigating IT Risks with Data Classification and Access ...€¦ · Mitigating IT Risks with Data Classification and Access Control Jeff.Melnick@netwrix.com MANAGER OF ... Least privilege

File Analysis

Page 31: Mitigating IT Risks with Data Classification and Access ...€¦ · Mitigating IT Risks with Data Classification and Access Control Jeff.Melnick@netwrix.com MANAGER OF ... Least privilege

Out-of-the-box Compliance Reports

Page 32: Mitigating IT Risks with Data Classification and Access ...€¦ · Mitigating IT Risks with Data Classification and Access Control Jeff.Melnick@netwrix.com MANAGER OF ... Least privilege

User Activity Video Recording

Page 33: Mitigating IT Risks with Data Classification and Access ...€¦ · Mitigating IT Risks with Data Classification and Access Control Jeff.Melnick@netwrix.com MANAGER OF ... Least privilege

Useful links

Free 20-Day Trial: setup in your own test environment: netwrix.com/freetrial

Live One-to-One Demo: product tour with Netwrix expert: netwrix.com/livedemo

Contact Sales to obtain more information: netwrix.com/contactsales

Referral program for customers: netwrix.com/become_netwrix_referrer.html

Webinars: join our upcoming webinars and watch the recorded sessions

• netwrix.com/webinars

• netwrix.com/webinars#featured

Page 34: Mitigating IT Risks with Data Classification and Access ...€¦ · Mitigating IT Risks with Data Classification and Access Control Jeff.Melnick@netwrix.com MANAGER OF ... Least privilege

This bullet list is

with

animations

Tim Warner

- @TechTrainerTim

- Pluralsight.comSummary

Jeff Melnick

[email protected]