Compliance by Design: Using Innovation To Beat The Compliance Rat-Race
Compliance by Design: Using Innovation To Beat The Compliance Rat-Race
Compliance by Design: Using Innovation To Beat The Compliance Rat-Race
Compliance by Design
Using Innovation to Beat the Compliance
Rat-Race
#RSAC
Leveraging Standards in Compliance by
Design (Hayden and Bob)
The Compliance Challenge #RSAC
#RSAC
“At the heart of the Internet culture is a force that wants to find out
everything about you. And once it has found out everything about
you and two hundred million others, that’s a valuable asset and
people will be tempted to trade and do commerce with that asset.”
Data ecosystem
Data Complexity
More data = more noise
Data Emergence
The calculus of privacy & data sovereignty
Data self-organisation
Datasets interact with one-another, modifying the data ecosystem, producing more
knowledge – for example...
#RSAC
7
#RSAC
Data sovereignty
Confidential information
Ownership
#RSAC
by Design
#RSAC
Operating in harmony
Technology
Process People
Design
#RSAC
A change in strategy
Compliance
Risk
by Design
Focus
Compliance
Focus
Controls
Focus
• Requirements:
• Reduce cost of compliance reporting
• Efficient, cost-effective management of security
• Reduced cost of service delivery
• Improved service as competitive advantage
• Solution:
• Automatically track and report on client risk and
compliance
• Enhance incident triage
• Improve event analysis
http://www.emc.com/collateral/customer-profiles/h11982-reply-cp.pdf
#RSAC
Risk discipline across the organization
LOB Executives Business Operations
CIO & Board
Managers
CISO
IT Business
Common Foundation
Silos Managed Advantaged
Maturity
#RSAC
Employees/Partners/Customers
Access Platform Governance Platform
Authentication Compliance
Identity Intelligence Identity Lifecycle
Federation/SSO
Provisioning
Applications/Data/Resources
#RSAC
Capture Time
Meta-Data Enrichment Incident Management
LOGS Compliance
LIVE
ENDPOINT
ENRICH Investigation
Session Reconstruction
NETFLOW
CSC
Federation
Negotiate & Sign SecSLA Offering
Compliance by Design
#RSAC
PKCS#11
OASIS Key Management Interoperability Protocol (KMIP)
#RSAC
PKCS#11
Jan-94
RSA launches Dec-12
PKCS#11 project RSA announce
PKCS #11 management
transition to OASIS Mar-13
OASIS PKCS#11 TC
st
1 Meeting
Nov-14
PKCS#11 V2.40
Apr-95 Dec-97 Dec-99 Jan-01 Jun-04 Sep-09 OASIS
PKCS#11 V1.0 PKCS#11 V2.01 PKCS#11 V2.10 PKCS#11 V2.11 PKCS#11 V2.20 PKCS#11 V2.30 Specification
Published (RSA) Published (RSA) Published (RSA) Published (RSA) Published (RSA) Draft (RSA) (anticipated)
Jan-95 Jan-96 Jan-97 Jan-98 Jan-99 Jan-00 Jan-01 Jan-02 Jan-03 Jan-04 Jan-05 Jan-06 Jan-07 Jan-08 Jan-09 Jan-10 Jan-11 Jan-12 Jan-13 Jan-14 Jan-15
Jan-94 May-15
Feb-14
OASIS PKCS#11 Interop Apr-15
Demonstration RSA 2014 OASIS PKCS#11 Interop
-Cryptsoft Demonstration RSA 2015
-Cryptosense -TBA
-Feitian
-Oracle
-Vormetric
#RSAC
OASIS KMIP
#RSAC
Source: Cryptsoft
#RSAC
Security architectures
#RSAC
Model 1
Enterprise Model 2
Key Management Hybrid
Key
Management
Model 3
CSP Key Management
Cloud security architectures – #RSAC
Model 2
Hybrid Model 3
Key CSP
Management Key
Management
#RSAC
Compliance by Design
Technology
Process People
Design
Resolving a problem via key management: #RSAC
CSP
Ireland
data centre
Key
Manager
Archive
key
Recover
key
#RSAC
Resolving marketing compliance: consent
database
Gives consent +
customer-defined Email
preferences
SMPP
Text
message
SMTP
Captures: Telemarketing
• Contact mediums
• Uses & disclosures
• Duration
• Jurisdictions (data sovereignty)
#RSAC