18
TREASURY INFORMATION SECURITY BUSINESS - INFORMATION - TECHNOLOGY + SECURITY

EISA (Enterprise Information Security Architecture) - detailed description of security processes and procedures to develop compliance with strategic goals

Embed Size (px)

Citation preview

Page 1: EISA (Enterprise Information Security Architecture) - detailed description of security processes and procedures to develop compliance with strategic goals

TREASURY INFORMATION SECURITY

BUSINESS - INFORMATION - TECHNOLOGY +

SECURITY

Page 2: EISA (Enterprise Information Security Architecture) - detailed description of security processes and procedures to develop compliance with strategic goals

DEVELOPMENT OF A METHODOLOGY FOR SECURITY PROCEDURES AND PROCESSES

EISA (Enterprise Information Security Architecture) - detailed description of security processes and procedures to develop compliance with strategic goals of the enterprise.

EISA implies optimization of business-processes, answers the questions when architecting business security, establishment of a secure network infrastructure, development of security policies and procedures, etc.

Due to introduction of EISA, we lay the groundwork to create flexibility within our organization, to adjust our system to a coming change.

2

Page 3: EISA (Enterprise Information Security Architecture) - detailed description of security processes and procedures to develop compliance with strategic goals

Unification of the development tools

Dev –> QA –> Prd

RBAC + SoD

Transition to web-services

Unification of the development environment

Unification of DBMS being used

3

Page 4: EISA (Enterprise Information Security Architecture) - detailed description of security processes and procedures to develop compliance with strategic goals

BUILDING A SECURE INFRASTRUCTURE

Threat source: DDoS; Hacktivists Opponents using software like Stuxnet, Shamoon Special services

Vulnerable users: Executive directors Heads of Departments Head of IT Super users

4

Page 5: EISA (Enterprise Information Security Architecture) - detailed description of security processes and procedures to develop compliance with strategic goals

Documents/Records/Email

Database

Server/Operating System

Application

Network

Physical

External Users

Internal

Users

5

Page 6: EISA (Enterprise Information Security Architecture) - detailed description of security processes and procedures to develop compliance with strategic goals

Internal Users

6

Page 7: EISA (Enterprise Information Security Architecture) - detailed description of security processes and procedures to develop compliance with strategic goals

Build sustainable compliance programs

Reduce risk of insider threat and

attacks

Identity AccessData

Protection

7

Page 8: EISA (Enterprise Information Security Architecture) - detailed description of security processes and procedures to develop compliance with strategic goals

STATE TREASURY AGENCYSTATE TREASURY AGENCY

TREASURY BRANCHTREASURY BRANCH

TREASURY BRANCHTREASURY BRANCH

TREASURY BRANCHTREASURY BRANCH

INTERNETINTERNET

XDMXXDMX

8

Page 9: EISA (Enterprise Information Security Architecture) - detailed description of security processes and procedures to develop compliance with strategic goals

ASA 5515 X

ASA 5555 X ASA 5555 X

Cisco 2951 Cisco 2951

INTERNETINTERNET

DMZDMZ

Certeficat CenterCerteficat Center RADIUS ServerRADIUS Server

Mail ServerMail Server

XDMX

ServersServers

ASA 5515 X

9

Page 10: EISA (Enterprise Information Security Architecture) - detailed description of security processes and procedures to develop compliance with strategic goals

ASA 5515 X ASA 5515 X

ASA 5555 X ASA 5555 X

Cisco 2951 Cisco 2951

INTERNETINTERNET

DMZDMZ

Certeficat CenterCerteficat Center RADIUS ServerRADIUS Server

Mail ServerMail Server

Privat NetworkPrivat Network

Treasury Branch 2

Treasury Branch 1

Treasury Branch N

ServersServers

XDMX

10

Page 11: EISA (Enterprise Information Security Architecture) - detailed description of security processes and procedures to develop compliance with strategic goals

SwitchSwitch

DMZ

UsersUsers AdministratorsAdministrators

WEBWEB

FileServer

FileServer

Data BaseData Base

ProxyServerProxyServer

DNSServerDNS

Server

ADServer

ADServer

Policy

INTERNETINTERNET

Router

DNS (TCP/UDP 53)

HTTP (TCP 80)HTTPS (TCP443)

HTTPS (TCP 443)

GPO

Access List

Access List

ASA Out

ASA Internal

POP3 (TCP 110)SMTP (TCP 465)

Mail ServerMail ServerCerteficate ServerCerteficate Server

ServersServers

11

Page 12: EISA (Enterprise Information Security Architecture) - detailed description of security processes and procedures to develop compliance with strategic goals

RECEIPT, USE OF THE DIGITAL CERTIFICATE

12

Page 13: EISA (Enterprise Information Security Architecture) - detailed description of security processes and procedures to develop compliance with strategic goals

After conclusion of the contract with the State Treasury Agency, an organization’s email address receives an email with the link.

13

Page 14: EISA (Enterprise Information Security Architecture) - detailed description of security processes and procedures to develop compliance with strategic goals

Unique 7 digit number of the organization

14

Page 15: EISA (Enterprise Information Security Architecture) - detailed description of security processes and procedures to develop compliance with strategic goals

ID data is entered

15

Page 16: EISA (Enterprise Information Security Architecture) - detailed description of security processes and procedures to develop compliance with strategic goals

CERTIFICATE DOWNLOAD SECTIONAND SETUP MANUAL

User certificates setup

SC certificate setup

Setup manual

16

Page 17: EISA (Enterprise Information Security Architecture) - detailed description of security processes and procedures to develop compliance with strategic goals

After setting up the certificates, log on is done via a personal certificate.

17

Page 18: EISA (Enterprise Information Security Architecture) - detailed description of security processes and procedures to develop compliance with strategic goals

THANK YOU FOR ATTENTION!

18