venafi top five best practices and failures

1
Conducted by FAIL! FAIL! 10011010 10110100 01010101 ]  FAIL! 2011 IT Security Best Practices Key Best Practices and Finding: 12 Best Pracces and baselines established 420 organizaons polled 60 percent employ 5,000 or more Mulple industries represented, Banking and Financial Services highest with 27% Echelon One is an informaon security research company that specializes in helping execuves develop comprehensiv e and lasng informaon security programs. Venais the inventor of and market leader in Enterprise Key and Cercate Management (EKCM) soluons. Perform quarterly security and compliance training Have management processes in place to ensure business continuity in the event of a Certicate Authority (CA) compromise Rotate SSH keys once every 12 months to mitigate risk incurred by the average employee life cycle of 2 years of service. Encrypt all cloud data Recommendation: Deploy technologies that compensate for the lack of training resources by removing opportunities for human error through automation. Recommendation: Salesforce.com, Google Apps and other cloud applications do not encrypt by default. Deploy third-party technologies that encrypt cloud data—in motion and at rest—to enhance security and privacy. Recommendation: SSH keys provide servers and their administra- tors with access to critical systems and data. A key rotation period that far exceeds the average employee’s lifecycle signicantly increases the risk that a former employee or other unauthorized person can gain inappropriate access. Some enterprises that do not rotate keys might fail to understand their signicance. Others might not have the IT hours available for the task. Be sure to deploy technologies that simplify and automate key rotation. Recommendation: Digital certicates rank among the most ubiquitous security technologies. However, as recent CA breaches demonstrate, prominent CAs can, have, and will continue to be compromised. Using a CA is half the battle to further reduce risk, have a plan for immediately replacing all certicates signed by a compromised CA private key. 64% fail to meet cloud data encrypon best pracces 10% do not use encrypon for data security and systems authencaon best pracces FAIL! 77% fail to meet security and compliance training best pracces Recommendation: Although the low failure rate seems encour- aging, failure to implement management technologies can turn encryption into a liability by exposing keys that give free access to seemingly secure data. Be sure to deploy technolo- gies that can manage encryption assets across the enterprise. Use encryption throughout the organization 55% fail to meet cercate authority (CA) compromise recovery plan best pracces 82% do not meet SSH key rotaon best pracces For full results or to take the assessment, visit: www.Vena.com/2011Assessment FAIL!

Upload: carlos-jumbo-g

Post on 07-Apr-2018

221 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Venafi Top Five Best Practices and Failures

8/6/2019 Venafi Top Five Best Practices and Failures

http://slidepdf.com/reader/full/venafi-top-five-best-practices-and-failures 1/1

Conducted by

FAIL!

FAIL!

1001101010110100

01010101] ]

FAIL!

2011 IT SecurityBest Practices

Key Best Practices and Finding:

12 Best Pracces and baselines established

420 organizaons polled

60 percent employ 5,000 or more

Mulple industries represented, Banking and Financial Services highest with 27%

17%Others

8%Healthcare

5%Retail

8%Manufacturing

11%Government

5% Telecomunications

14%High Tech

27%Banking / Financial

Services

4%Energy, Oil/Gas

1%Airline

Echelon One is an informaon security

research company that specializes in

helping execuves develop

comprehensive and lasng informaon

security programs.

Venafi is the inventor of 

and market leader in

Enterprise Key and

Cerficate Management

(EKCM) soluons.

Respondent Position/Title

Industries Represented

Size of Organization of Respondents Polled

60%Over 5000

8%1-100

7%101-500

5%501-1000

8%1001-2500

12%2501-5000

2% CEO

28% Other

1% CTO

3% CIO

8% CISO

13% Administrator

43% Manager

Perform quarterly securityand compliance training

Have management processesin place to ensure businesscontinuity in the event of aCerticate Authority (CA)compromise

Rotate SSH keys once every12 months to mitigate risk incurred by the averageemployee life cycle of 2 yearsof service.

Encrypt all cloud data

Recommendation: Deploy technologies

that compensate for the lack of training

resources by removing opportunities for

human error through automation.

Recommendation: Salesforce.com, Google Apps and other

cloud applications do not encrypt by default. Deploy

third-party technologies that encrypt cloud data—in

motion and at rest—to enhance security and privacy.

Recommendation: SSH keys provide servers and their administra-

tors with access to critical systems and data. A key rotation period

that far exceeds the average employee’s lifecycle signicantly

increases the risk that a former employee or other unauthorized

person can gain inappropriate access. Some enterprises that do

not rotate keys might fail to understand their signicance. Others

might not have the IT hours available for the task. Be sure to

deploy technologies that simplify and automate key rotation.

Recommendation: Digital certicates rank among the most

ubiquitous security technologies. However, as recent CA

breaches demonstrate, prominent CAs can, have, and will

continue to be compromised. Using a CA is half the battle —

to further reduce risk, have a plan for immediately replacing

all certicates signed by a compromised CA private key.64% fail to meet cloud data

encrypon best pracces

10% do not use encrypon for datasecurity and systems authencaonbest pracces

FAIL!

77% fail to meet security andcompliance training best pracces

Recommendation: Although the low failure rate seems encour-

aging, failure to implement management technologies can

turn encryption into a liability by exposing keys that give free

access to seemingly secure data. Be sure to deploy technolo-

gies that can manage encryption assets across the enterprise.

Use encryption throughoutthe organization

55% fail to meet cerficateauthority (CA) compromiserecovery plan best pracces

82% do not meet SSH key rotaon best pracces

For full results or to take the assessment, visit: www.Venafi.com/2011Assessment

FAIL!