EISA (Enterprise Information Security Architecture) - detailed description of security processes and...

18
TREASURY INFORMATION SECURITY BUSINESS - INFORMATION - TECHNOLOGY + SECURITY

Transcript of EISA (Enterprise Information Security Architecture) - detailed description of security processes and...

Page 1: EISA (Enterprise Information Security Architecture) - detailed description of security processes and procedures to develop compliance with strategic goals.

TREASURY INFORMATION SECURITY

BUSINESS - INFORMATION - TECHNOLOGY +

SECURITY

Page 2: EISA (Enterprise Information Security Architecture) - detailed description of security processes and procedures to develop compliance with strategic goals.

DEVELOPMENT OF A METHODOLOGY FOR SECURITY PROCEDURES AND PROCESSES

EISA (Enterprise Information Security Architecture) - detailed description of security processes and procedures to develop compliance with strategic goals of the enterprise.

EISA implies optimization of business-processes, answers the questions when architecting business security, establishment of a secure network infrastructure, development of security policies and procedures, etc.

Due to introduction of EISA, we lay the groundwork to create flexibility within our organization, to adjust our system to a coming change.

2

Page 3: EISA (Enterprise Information Security Architecture) - detailed description of security processes and procedures to develop compliance with strategic goals.

Unification of the development tools

Dev –> QA –> Prd

RBAC + SoD

Transition to web-services

Unification of the development environment

Unification of DBMS being used

3

Page 4: EISA (Enterprise Information Security Architecture) - detailed description of security processes and procedures to develop compliance with strategic goals.

BUILDING A SECURE INFRASTRUCTURE

Threat source: DDoS; Hacktivists Opponents using software like Stuxnet, Shamoon Special services

Vulnerable users: Executive directors Heads of Departments Head of IT Super users

4

Page 5: EISA (Enterprise Information Security Architecture) - detailed description of security processes and procedures to develop compliance with strategic goals.

Documents/Records/Email

Database

Server/Operating System

Application

Network

Physical

External Users

Internal

Users

5

Page 6: EISA (Enterprise Information Security Architecture) - detailed description of security processes and procedures to develop compliance with strategic goals.

Internal Users

6

Page 7: EISA (Enterprise Information Security Architecture) - detailed description of security processes and procedures to develop compliance with strategic goals.

Build sustainable compliance programs

Reduce risk of insider threat and

attacks

Identity AccessData

Protection

7

Page 8: EISA (Enterprise Information Security Architecture) - detailed description of security processes and procedures to develop compliance with strategic goals.

STATE TREASURY AGENCYSTATE TREASURY AGENCY

TREASURY BRANCHTREASURY BRANCH

TREASURY BRANCHTREASURY BRANCH

TREASURY BRANCHTREASURY BRANCH

INTERNETINTERNET

XDMXXDMX

8

Page 9: EISA (Enterprise Information Security Architecture) - detailed description of security processes and procedures to develop compliance with strategic goals.

ASA 5515 X

ASA 5555 X ASA 5555 X

Cisco 2951 Cisco 2951

INTERNETINTERNET

DMZDMZ

Certeficat CenterCerteficat Center RADIUS ServerRADIUS Server

Mail ServerMail Server

XDMX

ServersServers

ASA 5515 X

9

Page 10: EISA (Enterprise Information Security Architecture) - detailed description of security processes and procedures to develop compliance with strategic goals.

ASA 5515 X ASA 5515 X

ASA 5555 X ASA 5555 X

Cisco 2951 Cisco 2951

INTERNETINTERNET

DMZDMZ

Certeficat CenterCerteficat Center RADIUS ServerRADIUS Server

Mail ServerMail Server

Privat NetworkPrivat Network

Treasury Branch 2

Treasury Branch 1

Treasury Branch N

ServersServers

XDMX

10

Page 11: EISA (Enterprise Information Security Architecture) - detailed description of security processes and procedures to develop compliance with strategic goals.

SwitchSwitch

DMZ

UsersUsers AdministratorsAdministrators

WEBWEB

FileServer

FileServer

Data BaseData Base

ProxyServerProxyServer

DNSServerDNS

Server

ADServer

ADServer

Policy

INTERNETINTERNET

Router

DNS (TCP/UDP 53)

HTTP (TCP 80)HTTPS (TCP443)

HTTPS (TCP 443)

GPO

Access List

Access List

ASA Out

ASA Internal

POP3 (TCP 110)SMTP (TCP 465)

Mail ServerMail ServerCerteficate ServerCerteficate Server

ServersServers

11

Page 12: EISA (Enterprise Information Security Architecture) - detailed description of security processes and procedures to develop compliance with strategic goals.

RECEIPT, USE OF THE DIGITAL CERTIFICATE

12

Page 13: EISA (Enterprise Information Security Architecture) - detailed description of security processes and procedures to develop compliance with strategic goals.

After conclusion of the contract with the State Treasury Agency, an organization’s email address receives an email with the link.

13

Page 14: EISA (Enterprise Information Security Architecture) - detailed description of security processes and procedures to develop compliance with strategic goals.

Unique 7 digit number of the organization

14

Page 15: EISA (Enterprise Information Security Architecture) - detailed description of security processes and procedures to develop compliance with strategic goals.

ID data is entered

15

Page 16: EISA (Enterprise Information Security Architecture) - detailed description of security processes and procedures to develop compliance with strategic goals.

CERTIFICATE DOWNLOAD SECTIONAND SETUP MANUAL

User certificates setup

SC certificate setup

Setup manual

16

Page 17: EISA (Enterprise Information Security Architecture) - detailed description of security processes and procedures to develop compliance with strategic goals.

After setting up the certificates, log on is done via a personal certificate.

17

Page 18: EISA (Enterprise Information Security Architecture) - detailed description of security processes and procedures to develop compliance with strategic goals.

THANK YOU FOR ATTENTION!

18