SlideShare uma empresa Scribd logo
1 de 47
Baixar para ler offline


- +
2016.4.20
2
H1040039245
3
(Ligne Maginot)
5
WAF
6
IT
SSDLC
(VA)
(PT)
Web
WAF
7
IT
SSDLC
(VA)
(PT)
Web
WAF
9
IT
SSDLC
(VA)
(PT)
Web
WAF
11
IT
SSDLC
(VA)
(PT)
Web
(Ligne Maginot)
14
A
B
C
Dunkerque
Ardennen
Erich von Manstein
Fall Gelb
WAF
15
IT
SSDLC
(VA)
(PT)
Web
APT
!
!
!
!
!
WAF
16
IT
SSDLC
(VA)
(PT)
Web
APT
17
18source: http://www.nextmag.com.tw/magazine/news/20150415/17732133
( )
20
	


D
EFECT
政府
金融
1
24
稽
( ) (
)
稽


中 高普
25
INVENTORY
SYSTEM Local
Windows
Active Directory
Service
AD Domain
A
uditingLocal Admin
root
Adm
inistrator
LinuxUNIX
AIX
Red Hat
SUSE
Microsoft SQL Server
Oracle
sa
A
ccount
Type
remote login
su
password age
Account Expiration Date
lock
Computer Name
AD
Bridge
Account GroupCompliance
R6
mainframe
Account Category
Password Last Set
( )
( )
稽


2
28


-


- 

-
稽

-
( )
中 高普
中 高普
中 高普
稽
3
29
稽!!!


( MS SQL sa) 

稽
中 高普
30






中
中
中
高








中
高
中
中
&



















普
普
中
中
普
普
高
普
高
普
: 24
(AB Part)
3 4
31
Privileged Accounts
Routers, Firewalls, Hypervisors,
Databases, Applications
WiFi Routers, Smart TVs
Routers, Firewalls, Servers,
Databases, Applications
Laptops, Tablets,
Smartphones
Power Plants,
Factory Floors
Organizations typically have

3-4x more Privileged Accounts
than employees
3 4
32
WiFi Routers, Smart TVs
Compromised Privileged Accounts
Laptops, Tablets,
Smartphones
Power Plants,
Factory Floors
Routers, Firewalls, Hypervisors,
Databases, Applications
Routers, Firewalls, Servers,
Databases, Applications
– (Tokenization)
33
原始資料
資料庫
電商平台商
d次變造資料
TMIeL VaulQ
資料變造庫
>aFeNeQ TMIeLHVaQHML

:aLager
醫療院所
原始資料提供單位
金融銀行
二次變造資料
統計研究機構
( 段 式 變 造
確保保管單
位及研究單
位資料不具
機敏性
自動化管理
平台減少v
員接觸資料
風險
資料變造管理平台提供研究單位不涉個資n研究資料
■
■
■
– Tokenization & PCI-DSS Compliance
34
用戶端
SafeNet 雲端服務
加密資料儲存體
>aFeNeQ

8ey>eCure
SafeNet
跨區

內部用戶
約,員工
35
Protect Cardholder Data
Requirement 3 Protect stored cardholder data
3.5.1
3.5.2
3.6
3.4
3.5
Restrict access to cryptographic keys to the fewest number of custodians necessary.
Fully document and implement all key-management processes and procedures for cryptographic keys
used for encryption of cardholder data.
PCI-DSS 3.1 Compliance Combination(detail)
Document and implement procedures to protect keys used to secure stored cardholder data against
disclosure and misuse.


3.5.3 Store cryptographic keys in the fewest possible locations.
Always Render PAN unreadable anywhere it is stored (including on portable digital media, backup media, and in logs)
by using any of the following approaches: One-way hashes based on strong cryptography Truncation Index tokens
and pads Strong cryptography with associated key-management processes and procedures.
Store secret and private keys used to encrypt/decrypt cardholder data in one (or more) of the following forms at all
times: Encrypted with a key-encrypting key Within a secure cryptographic device As at least two full-length key
components or key shares, in accordance with an industry- accepted method.
Requirement 4 Encrypt transmission of cardholder data across open, public networks
4.1 Use strong cryptography and security protocols (for example, TLS, IPSEC, SSH, etc.) to safeguard sensitive cardholder
data during transmission over open, public networks.
要求 ).4
使用zg任d作法使所有位置 包括可攜 式數位媒體、備份媒體和
日誌k) 儲存的 P2N 均無法讀取0 

1  使用強式加密法的單向雜湊型函數 雜湊必須要有完整的 P2N)

1  截詞 不能用雜湊替y P2N 被截詞的部分)

1  索引記號和索引簿 索引簿必須安全地儲存)

1  使用相關金鑰管理流程和程序的強式加密法
>aFeNeQ TMIeLHVaQHML
符合 ).4, P2N
36
Protect Cardholder Data
Requirement 3 Protect stored cardholder data
3.5.1
3.5.2
3.6
3.4
3.5
Restrict access to cryptographic keys to the fewest number of custodians necessary.
Fully document and implement all key-management processes and procedures for cryptographic keys
used for encryption of cardholder data.
PCI-DSS 3.1 Compliance Combination(detail)
Document and implement procedures to protect keys used to secure stored cardholder data against
disclosure and misuse.


3.5.3 Store cryptographic keys in the fewest possible locations.
Always Render PAN unreadable anywhere it is stored (including on portable digital media, backup media, and in logs)
by using any of the following approaches: One-way hashes based on strong cryptography Truncation Index tokens
and pads Strong cryptography with associated key-management processes and procedures.
Store secret and private keys used to encrypt/decrypt cardholder data in one (or more) of the following forms at all
times: Encrypted with a key-encrypting key Within a secure cryptographic device As at least two full-length key
components or key shares, in accordance with an industry- accepted method.
Requirement 4 Encrypt transmission of cardholder data across open, public networks
4.1 Use strong cryptography and security protocols (for example, TLS, IPSEC, SSH, etc.) to safeguard sensitive cardholder
data during transmission over open, public networks.
要求 ).5.(
始終zg面d種 或多種) 形式儲存用於加密/解密持卡v

資料的機密金鑰和私密金鑰0
1 使用至少和資料加密金鑰d樣等級的強式加密為金鑰加密,並將此

金鑰和資料加密金鑰分開儲存
1 在安全加密裝置 如l機安全模組 6>:) 或通過 PT> 核可的tr點裝置)
1 根據產業認可的方法,採用至少兩個全 長度金鑰元件或金鑰共u
>aFeNeQ 8ey>eCure使用多層式架構的
金鑰再次加密金鑰。i設備通過 57P> 14&-( 9eSel )
標準,支援)國政府確保金鑰管理不會受•竄改的要求。
>QMrage>eCure同時o是d台強大的加密
裝置,通過 57P> 14&-( 認證,可由單d

設備提供集k式的金鑰管理和加密金

鑰儲存。
37
Protect Cardholder Data
Requirement 3 Protect stored cardholder data
3.5.1
3.5.2
3.6
3.4
3.5
Restrict access to cryptographic keys to the fewest number of custodians necessary.
Fully document and implement all key-management processes and procedures for cryptographic keys
used for encryption of cardholder data.
PCI-DSS 3.1 Compliance Combination(detail)
Document and implement procedures to protect keys used to secure stored cardholder data against
disclosure and misuse.


3.5.3 Store cryptographic keys in the fewest possible locations.
Always Render PAN unreadable anywhere it is stored (including on portable digital media, backup media, and in logs)
by using any of the following approaches: One-way hashes based on strong cryptography Truncation Index tokens
and pads Strong cryptography with associated key-management processes and procedures.
Store secret and private keys used to encrypt/decrypt cardholder data in one (or more) of the following forms at all
times: Encrypted with a key-encrypting key Within a secure cryptographic device As at least two full-length key
components or key shares, in accordance with an industry- accepted method.
Requirement 4 Encrypt transmission of cardholder data across open, public networks
4.1 Use strong cryptography and security protocols (for example, TLS, IPSEC, SSH, etc.) to safeguard sensitive cardholder
data during transmission over open, public networks.
要求 ).,
充分記錄並實作用於持卡v資料加密的所有金鑰
管理流程和程序,包括0
1  ).,.4 根據相關應用程式供應商或金鑰所有v的規定,並根據產業最佳作法
和指南 例如《N7>T 特刊 .&&-5-a),在金鑰週期結束時 例 如指定期限過後
和/或給定金鑰產生d定量的密文後) 對金鑰進行 變更。
1  ).,.5 金鑰的完整性變弱 例如知道

負責明文元件的員工離職)或懷疑金

鑰遭受威脅時,認為有必要註銷或替

換 例如歸檔、銷毀和/或撤銷)金鑰 

1  ).,., 若使用手動明文金鑰管理操

作,則必須透 過 劃分知識和雙重控

制來管理這s操作。
1  ).,.- 防止未經授權替換加密金鑰
1  ).,.. 有關金鑰保管v正式確認理

解並接受加密金 鑰保管責v的要求
).,.4 ─ 8ey>eCure 可集k管理加密金鑰和政策─涵蓋所有金鑰管理周期,並遍及整
個企業和:擬資料k心及公共雲環境。8ey>eCure 提供金鑰輪轉機制, z讓客戶可
z高效率地根據安全政策輪轉金鑰。
).,.5 ─ 金鑰永遠z加密形式儲存在8ey>eCure裝置k。8ey>eCure 的集k 式管理
功能包─詳細的日誌和稽核追蹤,可…握所有金鑰狀態變更、系統管理員存取和政
策變更的情形。稽核紀錄會被安全地儲存和簽(z避免否認。
).,., ─ 透過 8ey>eCure 超過 (& 個的管理存取控制清單,可z支援不

同v員 建立和刪除/存取金鑰的情形。安全團隊可z要求兩個系統

管理員必須同時核准特定類型的操作方能進行─例如產生金鑰等。
44
CORPORATE
ENVIRONMENT
Cloud Storage
Intellectual
Property
Internal
Privileged
Users
External
Privileged
Users






金管會普遍稽核項目
1. 「帳號共用c問題
(. 「目錄共用c問題
). 對外t換的「4:A區檔案不落地c
4. 自動化傳輸程式碼k「密碼需保護c
5. 傳輸t換須有完整「稽核軌跡c
,. 檔案「傳輸加密c
-. 檔案「安全防護c 如0檔案權限控管、檔案加密)
.. 企業內部防火牆通訊埠「減少開放c
/. 檔案t換業務往「全面自動化c發展
45
1. 建立集k式檔案傳輸管理平台,能有多種傳輸方式
(. 加強檔案傳輸安全性
). 既有管理設定可簡化,加強5TP 服務管理功能
4. 保有完整的傳輸稽核記錄
5. 提升檔案權限控管的嚴謹度
6. 定期自動清除m未使用的檔案
-. 使用者帳密的存取與942P整合
.. 5TP >CrHNQ內的帳密非明碼
/. 內部5TP帳號的密碼由管理者控管
46
1. 建立對外集k式檔案傳輸管理平台,能有多種傳輸方式
■ 支援多協定服務功能 5TP/>、6TTP/>、>5TP)
(. 加強檔案傳輸安全性
■ 支援兩層式安全傳輸架構、4:A檔案不落地、傳輸加密/檔案加密
). 希望既有的管理設定可簡化,並加強5TP 服務管理功能
■ 提供統d的管理介面、檔案傳輸自動化處理、傳輸異常l動通知…等
4. 保有完整的傳輸稽核記錄
■ 提供傳輸紀錄/系統紀錄/管理員操作紀錄
5. 提升檔案權限控管的嚴謹度
■ 支援檔案繞送、檔案的權限控管機制
,. 定期自動清除m未使用的檔案
■ 原廠提供檔案清除>CrHNQ
-. 使用者帳密的存取與942P整合
■ 支援多組942P功能
.. 5TP >CrHNQ內的帳密非明碼
■ >eCure3lHeLQ可協助做•
/. 內部5TP帳號的密碼由管理者控管
■ >eCure3lHeLQ可協助做•
47
48
Axway
Endpoints
49
Axway
Endpoints
DMZ /
50
Axway
Endpoints
DMZ /
51
Axway
Endpoints
DMZ /
52
Axway
Endpoints
DMZ /
53
Axway
Endpoints
DMZ /
FTP Script
54
Requirement 2 Do not use vendor-supplied defaults for system passwords and other security parameters
2.3
2.1
2.2
Protect Cardholder Data
Requirement 3 Protect stored cardholder data
3.6
3.4
3.5
Requirement 4 Encrypt transmission of cardholder data across open, public networks
4.1
Maintain a Vulnerability Management Program
Requirement 6 Develop and maintain secure systems and applications
6.3
6.1
6.2
6.6
6.4
6.5
6.7
Implement Strong Access Control Measures
Requirement 7 Restrict access to cardholder data by business need to know
7.3
7.1
7.2

 
PCI-DSS 3.1 

Compliance 

Combination


Build and Maintain a Secure Network and System
Requirement 1 Install and maintain a firewall configuration to protect cardholder data
1.3
54
55
Implement Strong Access Control Measures
Requirement 8 Identify and authenticate access to system components
8.3
8.1
8.2
10.1
10.3
10.8
10.6
10.7
Additional PCI DSS Requirements for Shared Hosting Providers
Requirement A.1 Shared hosting providers must protect the cardholder data environment
A.1
8.5
8.7
Regularly Monitor andTest Networks
Requirement 10 Track and monitor all access to network resources and cardholder data
10.2
10.4
10.5
Regularly Monitor andTest Networks
Requirement 11 Regularly test security systems and processes
11.1

 

PCI-DSS 3.1 

Compliance 

Combination
WAF
58
IT
SSDLC
(VA)
(PT)
Web
59
André Maginot
Thanks
60
Q&A
61

Mais conteúdo relacionado

Mais procurados

IS Unit 8_IP Security and Email Security
IS Unit 8_IP Security and Email SecurityIS Unit 8_IP Security and Email Security
IS Unit 8_IP Security and Email Security
Sarthak Patel
 
HES2011 - Gabriel Gonzalez - Man In Remote PKCS11 for fun and non profit
HES2011 - Gabriel Gonzalez - Man In Remote PKCS11 for fun and non profitHES2011 - Gabriel Gonzalez - Man In Remote PKCS11 for fun and non profit
HES2011 - Gabriel Gonzalez - Man In Remote PKCS11 for fun and non profit
Hackito Ergo Sum
 
Ip sec and ssl
Ip sec and  sslIp sec and  ssl
Ip sec and ssl
Mohd Arif
 

Mais procurados (10)

Proofpoint Emerging Threats Suricata 5.0 Webinar
Proofpoint Emerging Threats Suricata 5.0 WebinarProofpoint Emerging Threats Suricata 5.0 Webinar
Proofpoint Emerging Threats Suricata 5.0 Webinar
 
Cohesive Networks Support Docs: VNS3:turret NIDS Guide
Cohesive Networks Support Docs: VNS3:turret NIDS GuideCohesive Networks Support Docs: VNS3:turret NIDS Guide
Cohesive Networks Support Docs: VNS3:turret NIDS Guide
 
IS Unit 8_IP Security and Email Security
IS Unit 8_IP Security and Email SecurityIS Unit 8_IP Security and Email Security
IS Unit 8_IP Security and Email Security
 
FIPS 140-2 Validations in a Secure Enclave
FIPS 140-2 Validations in a Secure EnclaveFIPS 140-2 Validations in a Secure Enclave
FIPS 140-2 Validations in a Secure Enclave
 
Hyperledger fabric
Hyperledger fabricHyperledger fabric
Hyperledger fabric
 
HES2011 - Gabriel Gonzalez - Man In Remote PKCS11 for fun and non profit
HES2011 - Gabriel Gonzalez - Man In Remote PKCS11 for fun and non profitHES2011 - Gabriel Gonzalez - Man In Remote PKCS11 for fun and non profit
HES2011 - Gabriel Gonzalez - Man In Remote PKCS11 for fun and non profit
 
Ip sec and ssl
Ip sec and  sslIp sec and  ssl
Ip sec and ssl
 
Suricata: A Decade Under the Influence (of packet sniffing)
Suricata: A Decade Under the Influence (of packet sniffing)Suricata: A Decade Under the Influence (of packet sniffing)
Suricata: A Decade Under the Influence (of packet sniffing)
 
05 06 ike
05   06 ike05   06 ike
05 06 ike
 
Cryptography 101 for Java developers
Cryptography 101 for Java developersCryptography 101 for Java developers
Cryptography 101 for Java developers
 

Destaque (6)

系統05_從持續整合結合安全開發與變更管理 郭俐佳
系統05_從持續整合結合安全開發與變更管理 郭俐佳系統05_從持續整合結合安全開發與變更管理 郭俐佳
系統05_從持續整合結合安全開發與變更管理 郭俐佳
 
資安健檢因應配套
資安健檢因應配套資安健檢因應配套
資安健檢因應配套
 
應用03_未來辦公室的創新工作圈 李政權
應用03_未來辦公室的創新工作圈 李政權應用03_未來辦公室的創新工作圈 李政權
應用03_未來辦公室的創新工作圈 李政權
 
雲端06_兩岸三地的雲服務就選mail cloud-闕伊材
雲端06_兩岸三地的雲服務就選mail cloud-闕伊材雲端06_兩岸三地的雲服務就選mail cloud-闕伊材
雲端06_兩岸三地的雲服務就選mail cloud-闕伊材
 
雲端05_如何在雲端管理研發知識以廣義智控為例 曾廣輝
雲端05_如何在雲端管理研發知識以廣義智控為例 曾廣輝雲端05_如何在雲端管理研發知識以廣義智控為例 曾廣輝
雲端05_如何在雲端管理研發知識以廣義智控為例 曾廣輝
 
雲端01_雲端服務家族的價值與經濟生態 林秋丹
雲端01_雲端服務家族的價值與經濟生態 林秋丹雲端01_雲端服務家族的價值與經濟生態 林秋丹
雲端01_雲端服務家族的價值與經濟生態 林秋丹
 

Semelhante a 系統02_關鍵的「特權+資料安全」最後一哩防線 解忠翰

EPV_PCI DSS White Paper (3) Cyber Ark
EPV_PCI DSS White Paper (3) Cyber ArkEPV_PCI DSS White Paper (3) Cyber Ark
EPV_PCI DSS White Paper (3) Cyber Ark
Erni Susanti
 
Bloombase Spitfire Link Encryptor Server Brochure
Bloombase Spitfire Link Encryptor Server BrochureBloombase Spitfire Link Encryptor Server Brochure
Bloombase Spitfire Link Encryptor Server Brochure
Bloombase
 

Semelhante a 系統02_關鍵的「特權+資料安全」最後一哩防線 解忠翰 (20)

Understanding senetas layer 2 encryption
Understanding senetas layer 2 encryptionUnderstanding senetas layer 2 encryption
Understanding senetas layer 2 encryption
 
IBM Spectrum Scale Secure- Secure Data in Motion and Rest
IBM Spectrum Scale Secure- Secure Data in Motion and RestIBM Spectrum Scale Secure- Secure Data in Motion and Rest
IBM Spectrum Scale Secure- Secure Data in Motion and Rest
 
CipherWire Networks - SafeNet KeySecure
CipherWire Networks - SafeNet KeySecureCipherWire Networks - SafeNet KeySecure
CipherWire Networks - SafeNet KeySecure
 
The Mainframe's Role in Enterprise Security Management - Jean-Marc Darees
The Mainframe's Role in Enterprise Security Management - Jean-Marc DareesThe Mainframe's Role in Enterprise Security Management - Jean-Marc Darees
The Mainframe's Role in Enterprise Security Management - Jean-Marc Darees
 
Cryptography&Security
Cryptography&SecurityCryptography&Security
Cryptography&Security
 
Cryptographysecurity 1222867498937700-9
Cryptographysecurity 1222867498937700-9Cryptographysecurity 1222867498937700-9
Cryptographysecurity 1222867498937700-9
 
Tokenization vs encryption vs masking
Tokenization vs encryption vs maskingTokenization vs encryption vs masking
Tokenization vs encryption vs masking
 
Cisco Connect Ottawa 2018 secure on prem
Cisco Connect Ottawa 2018 secure on premCisco Connect Ottawa 2018 secure on prem
Cisco Connect Ottawa 2018 secure on prem
 
Review of NIST Security Controls SC-28 SC-10
Review of NIST Security Controls SC-28 SC-10Review of NIST Security Controls SC-28 SC-10
Review of NIST Security Controls SC-28 SC-10
 
IRJET- Public Key Infrastructure (PKI) Understanding for Vxworks RTOS using A...
IRJET- Public Key Infrastructure (PKI) Understanding for Vxworks RTOS using A...IRJET- Public Key Infrastructure (PKI) Understanding for Vxworks RTOS using A...
IRJET- Public Key Infrastructure (PKI) Understanding for Vxworks RTOS using A...
 
Transport Layer Security
Transport Layer SecurityTransport Layer Security
Transport Layer Security
 
EPV_PCI DSS White Paper (3) Cyber Ark
EPV_PCI DSS White Paper (3) Cyber ArkEPV_PCI DSS White Paper (3) Cyber Ark
EPV_PCI DSS White Paper (3) Cyber Ark
 
Bloombase Spitfire Link Encryptor Server Brochure
Bloombase Spitfire Link Encryptor Server BrochureBloombase Spitfire Link Encryptor Server Brochure
Bloombase Spitfire Link Encryptor Server Brochure
 
Cisco cybersecurity essentials chapter 4
Cisco cybersecurity essentials chapter 4Cisco cybersecurity essentials chapter 4
Cisco cybersecurity essentials chapter 4
 
CCNP ROUTE V7 CH8
CCNP ROUTE V7 CH8CCNP ROUTE V7 CH8
CCNP ROUTE V7 CH8
 
Smart k
Smart kSmart k
Smart k
 
secureTF: A Secure TensorFlow Framework
secureTF: A Secure TensorFlow FrameworksecureTF: A Secure TensorFlow Framework
secureTF: A Secure TensorFlow Framework
 
IRJET- Schemes for Securing Cloud Data when the Cryptographic Material is Exp...
IRJET- Schemes for Securing Cloud Data when the Cryptographic Material is Exp...IRJET- Schemes for Securing Cloud Data when the Cryptographic Material is Exp...
IRJET- Schemes for Securing Cloud Data when the Cryptographic Material is Exp...
 
Issuing temporary credentials for my sql using hashicorp vault
Issuing temporary credentials for my sql using hashicorp vaultIssuing temporary credentials for my sql using hashicorp vault
Issuing temporary credentials for my sql using hashicorp vault
 
KTLS White-paper - Cyber - Keystroke Encryption technology
KTLS White-paper - Cyber - Keystroke Encryption technologyKTLS White-paper - Cyber - Keystroke Encryption technology
KTLS White-paper - Cyber - Keystroke Encryption technology
 

Mais de Galaxy Software Services

Mais de Galaxy Software Services (20)

2_人見人愛的control-m作業請求流程
2_人見人愛的control-m作業請求流程2_人見人愛的control-m作業請求流程
2_人見人愛的control-m作業請求流程
 
1_overall
1_overall1_overall
1_overall
 
GSSDLC - Bruce (20170817)
GSSDLC - Bruce (20170817)GSSDLC - Bruce (20170817)
GSSDLC - Bruce (20170817)
 
行動應用App管理 (MAM)
行動應用App管理 (MAM) 行動應用App管理 (MAM)
行動應用App管理 (MAM)
 
全面控管檔案傳輸 揭開成功秘辛
全面控管檔案傳輸 揭開成功秘辛全面控管檔案傳輸 揭開成功秘辛
全面控管檔案傳輸 揭開成功秘辛
 
MFT sharing
MFT sharingMFT sharing
MFT sharing
 
洞悉檔案傳輸困境 掌握解決方案
洞悉檔案傳輸困境 掌握解決方案洞悉檔案傳輸困境 掌握解決方案
洞悉檔案傳輸困境 掌握解決方案
 
Line with the UI DESIGN TREND 符合時代的介面設計潮流-李宗青
Line with the UI DESIGN TREND 符合時代的介面設計潮流-李宗青Line with the UI DESIGN TREND 符合時代的介面設計潮流-李宗青
Line with the UI DESIGN TREND 符合時代的介面設計潮流-李宗青
 
雲端04_會計服務未來式整合雲端新趨勢 張宏尉
雲端04_會計服務未來式整合雲端新趨勢 張宏尉雲端04_會計服務未來式整合雲端新趨勢 張宏尉
雲端04_會計服務未來式整合雲端新趨勢 張宏尉
 
雲端02_「阿米計畫」一起揪團做公益吧 杜明翰
雲端02_「阿米計畫」一起揪團做公益吧 杜明翰雲端02_「阿米計畫」一起揪團做公益吧 杜明翰
雲端02_「阿米計畫」一起揪團做公益吧 杜明翰
 
安心上雲端 商務創新無極限 劉念臻
安心上雲端 商務創新無極限 劉念臻安心上雲端 商務創新無極限 劉念臻
安心上雲端 商務創新無極限 劉念臻
 
由根紮起的深研發成果報告 張培鏞
由根紮起的深研發成果報告 張培鏞由根紮起的深研發成果報告 張培鏞
由根紮起的深研發成果報告 張培鏞
 
The power of digital minds 張瑞雄
The power of digital minds 張瑞雄The power of digital minds 張瑞雄
The power of digital minds 張瑞雄
 
軟體安全防護大作戰
軟體安全防護大作戰軟體安全防護大作戰
軟體安全防護大作戰
 
永遠別忘了老客戶和好口碑的重要性
永遠別忘了老客戶和好口碑的重要性永遠別忘了老客戶和好口碑的重要性
永遠別忘了老客戶和好口碑的重要性
 
全方位 Vital 雲端服務家族
全方位 Vital 雲端服務家族全方位 Vital 雲端服務家族
全方位 Vital 雲端服務家族
 
叡揚雲端服務願景與成果
叡揚雲端服務願景與成果叡揚雲端服務願景與成果
叡揚雲端服務願景與成果
 
10個步驟保護敏捷開發:應用程式安全的作業方法
10個步驟保護敏捷開發:應用程式安全的作業方法10個步驟保護敏捷開發:應用程式安全的作業方法
10個步驟保護敏捷開發:應用程式安全的作業方法
 
應用系統安全常見的5種資安防護措施
應用系統安全常見的5種資安防護措施 應用系統安全常見的5種資安防護措施
應用系統安全常見的5種資安防護措施
 
未來的人才 人才的未來
未來的人才 人才的未來未來的人才 人才的未來
未來的人才 人才的未來
 

Último

%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
masabamasaba
 
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
masabamasaba
 

Último (20)

Define the academic and professional writing..pdf
Define the academic and professional writing..pdfDefine the academic and professional writing..pdf
Define the academic and professional writing..pdf
 
Announcing Codolex 2.0 from GDK Software
Announcing Codolex 2.0 from GDK SoftwareAnnouncing Codolex 2.0 from GDK Software
Announcing Codolex 2.0 from GDK Software
 
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
 
%in Harare+277-882-255-28 abortion pills for sale in Harare
%in Harare+277-882-255-28 abortion pills for sale in Harare%in Harare+277-882-255-28 abortion pills for sale in Harare
%in Harare+277-882-255-28 abortion pills for sale in Harare
 
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
Direct Style Effect Systems -The Print[A] Example- A Comprehension AidDirect Style Effect Systems -The Print[A] Example- A Comprehension Aid
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
 
Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsRight Money Management App For Your Financial Goals
Right Money Management App For Your Financial Goals
 
WSO2Con2024 - Enabling Transactional System's Exponential Growth With Simplicity
WSO2Con2024 - Enabling Transactional System's Exponential Growth With SimplicityWSO2Con2024 - Enabling Transactional System's Exponential Growth With Simplicity
WSO2Con2024 - Enabling Transactional System's Exponential Growth With Simplicity
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview Questions
 
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...
 
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital TransformationWSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
 
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
 
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
 
Harnessing ChatGPT - Elevating Productivity in Today's Agile Environment
Harnessing ChatGPT  - Elevating Productivity in Today's Agile EnvironmentHarnessing ChatGPT  - Elevating Productivity in Today's Agile Environment
Harnessing ChatGPT - Elevating Productivity in Today's Agile Environment
 
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
 
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
 
VTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learnVTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learn
 
%in ivory park+277-882-255-28 abortion pills for sale in ivory park
%in ivory park+277-882-255-28 abortion pills for sale in ivory park %in ivory park+277-882-255-28 abortion pills for sale in ivory park
%in ivory park+277-882-255-28 abortion pills for sale in ivory park
 
%in kempton park+277-882-255-28 abortion pills for sale in kempton park
%in kempton park+277-882-255-28 abortion pills for sale in kempton park %in kempton park+277-882-255-28 abortion pills for sale in kempton park
%in kempton park+277-882-255-28 abortion pills for sale in kempton park
 
%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein
%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein
%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein
 
%in Soweto+277-882-255-28 abortion pills for sale in soweto
%in Soweto+277-882-255-28 abortion pills for sale in soweto%in Soweto+277-882-255-28 abortion pills for sale in soweto
%in Soweto+277-882-255-28 abortion pills for sale in soweto
 

系統02_關鍵的「特權+資料安全」最後一哩防線 解忠翰

  • 2. 3
  • 11. 17
  • 14.
  • 16. 25 INVENTORY SYSTEM Local Windows Active Directory Service AD Domain A uditingLocal Admin root Adm inistrator LinuxUNIX AIX Red Hat SUSE Microsoft SQL Server Oracle sa A ccount Type remote login su password age Account Expiration Date lock Computer Name AD Bridge Account GroupCompliance R6 mainframe Account Category Password Last Set ( ) ( ) 稽 

  • 17. 2 28 - - - 稽 - ( ) 中 高普 中 高普 中 高普 稽
  • 18. 3 29 稽!!! ( MS SQL sa) 稽 中 高普
  • 20. 3 4 31 Privileged Accounts Routers, Firewalls, Hypervisors, Databases, Applications WiFi Routers, Smart TVs Routers, Firewalls, Servers, Databases, Applications Laptops, Tablets, Smartphones Power Plants, Factory Floors Organizations typically have
 3-4x more Privileged Accounts than employees
  • 21. 3 4 32 WiFi Routers, Smart TVs Compromised Privileged Accounts Laptops, Tablets, Smartphones Power Plants, Factory Floors Routers, Firewalls, Hypervisors, Databases, Applications Routers, Firewalls, Servers, Databases, Applications
  • 22. – (Tokenization) 33 原始資料 資料庫 電商平台商 d次變造資料 TMIeL VaulQ 資料變造庫 >aFeNeQ TMIeLHVaQHML
 :aLager 醫療院所 原始資料提供單位 金融銀行 二次變造資料 統計研究機構 ( 段 式 變 造 確保保管單 位及研究單 位資料不具 機敏性 自動化管理 平台減少v 員接觸資料 風險 資料變造管理平台提供研究單位不涉個資n研究資料
  • 23. ■ ■ ■ – Tokenization & PCI-DSS Compliance 34 用戶端 SafeNet 雲端服務 加密資料儲存體 >aFeNeQ
 8ey>eCure SafeNet 跨區
 內部用戶 約,員工
  • 24. 35 Protect Cardholder Data Requirement 3 Protect stored cardholder data 3.5.1 3.5.2 3.6 3.4 3.5 Restrict access to cryptographic keys to the fewest number of custodians necessary. Fully document and implement all key-management processes and procedures for cryptographic keys used for encryption of cardholder data. PCI-DSS 3.1 Compliance Combination(detail) Document and implement procedures to protect keys used to secure stored cardholder data against disclosure and misuse. 
 3.5.3 Store cryptographic keys in the fewest possible locations. Always Render PAN unreadable anywhere it is stored (including on portable digital media, backup media, and in logs) by using any of the following approaches: One-way hashes based on strong cryptography Truncation Index tokens and pads Strong cryptography with associated key-management processes and procedures. Store secret and private keys used to encrypt/decrypt cardholder data in one (or more) of the following forms at all times: Encrypted with a key-encrypting key Within a secure cryptographic device As at least two full-length key components or key shares, in accordance with an industry- accepted method. Requirement 4 Encrypt transmission of cardholder data across open, public networks 4.1 Use strong cryptography and security protocols (for example, TLS, IPSEC, SSH, etc.) to safeguard sensitive cardholder data during transmission over open, public networks. 要求 ).4 使用zg任d作法使所有位置 包括可攜 式數位媒體、備份媒體和 日誌k) 儲存的 P2N 均無法讀取0 
 1  使用強式加密法的單向雜湊型函數 雜湊必須要有完整的 P2N)
 1  截詞 不能用雜湊替y P2N 被截詞的部分)
 1  索引記號和索引簿 索引簿必須安全地儲存)
 1  使用相關金鑰管理流程和程序的強式加密法 >aFeNeQ TMIeLHVaQHML 符合 ).4, P2N
  • 25. 36 Protect Cardholder Data Requirement 3 Protect stored cardholder data 3.5.1 3.5.2 3.6 3.4 3.5 Restrict access to cryptographic keys to the fewest number of custodians necessary. Fully document and implement all key-management processes and procedures for cryptographic keys used for encryption of cardholder data. PCI-DSS 3.1 Compliance Combination(detail) Document and implement procedures to protect keys used to secure stored cardholder data against disclosure and misuse. 
 3.5.3 Store cryptographic keys in the fewest possible locations. Always Render PAN unreadable anywhere it is stored (including on portable digital media, backup media, and in logs) by using any of the following approaches: One-way hashes based on strong cryptography Truncation Index tokens and pads Strong cryptography with associated key-management processes and procedures. Store secret and private keys used to encrypt/decrypt cardholder data in one (or more) of the following forms at all times: Encrypted with a key-encrypting key Within a secure cryptographic device As at least two full-length key components or key shares, in accordance with an industry- accepted method. Requirement 4 Encrypt transmission of cardholder data across open, public networks 4.1 Use strong cryptography and security protocols (for example, TLS, IPSEC, SSH, etc.) to safeguard sensitive cardholder data during transmission over open, public networks. 要求 ).5.( 始終zg面d種 或多種) 形式儲存用於加密/解密持卡v
 資料的機密金鑰和私密金鑰0 1 使用至少和資料加密金鑰d樣等級的強式加密為金鑰加密,並將此
 金鑰和資料加密金鑰分開儲存 1 在安全加密裝置 如l機安全模組 6>:) 或通過 PT> 核可的tr點裝置) 1 根據產業認可的方法,採用至少兩個全 長度金鑰元件或金鑰共u >aFeNeQ 8ey>eCure使用多層式架構的 金鑰再次加密金鑰。i設備通過 57P> 14&-( 9eSel ) 標準,支援)國政府確保金鑰管理不會受•竄改的要求。 >QMrage>eCure同時o是d台強大的加密 裝置,通過 57P> 14&-( 認證,可由單d
 設備提供集k式的金鑰管理和加密金
 鑰儲存。
  • 26. 37 Protect Cardholder Data Requirement 3 Protect stored cardholder data 3.5.1 3.5.2 3.6 3.4 3.5 Restrict access to cryptographic keys to the fewest number of custodians necessary. Fully document and implement all key-management processes and procedures for cryptographic keys used for encryption of cardholder data. PCI-DSS 3.1 Compliance Combination(detail) Document and implement procedures to protect keys used to secure stored cardholder data against disclosure and misuse. 
 3.5.3 Store cryptographic keys in the fewest possible locations. Always Render PAN unreadable anywhere it is stored (including on portable digital media, backup media, and in logs) by using any of the following approaches: One-way hashes based on strong cryptography Truncation Index tokens and pads Strong cryptography with associated key-management processes and procedures. Store secret and private keys used to encrypt/decrypt cardholder data in one (or more) of the following forms at all times: Encrypted with a key-encrypting key Within a secure cryptographic device As at least two full-length key components or key shares, in accordance with an industry- accepted method. Requirement 4 Encrypt transmission of cardholder data across open, public networks 4.1 Use strong cryptography and security protocols (for example, TLS, IPSEC, SSH, etc.) to safeguard sensitive cardholder data during transmission over open, public networks. 要求 )., 充分記錄並實作用於持卡v資料加密的所有金鑰 管理流程和程序,包括0 1  ).,.4 根據相關應用程式供應商或金鑰所有v的規定,並根據產業最佳作法 和指南 例如《N7>T 特刊 .&&-5-a),在金鑰週期結束時 例 如指定期限過後 和/或給定金鑰產生d定量的密文後) 對金鑰進行 變更。 1  ).,.5 金鑰的完整性變弱 例如知道
 負責明文元件的員工離職)或懷疑金
 鑰遭受威脅時,認為有必要註銷或替
 換 例如歸檔、銷毀和/或撤銷)金鑰 
 1  ).,., 若使用手動明文金鑰管理操
 作,則必須透 過 劃分知識和雙重控
 制來管理這s操作。 1  ).,.- 防止未經授權替換加密金鑰 1  ).,.. 有關金鑰保管v正式確認理
 解並接受加密金 鑰保管責v的要求 ).,.4 ─ 8ey>eCure 可集k管理加密金鑰和政策─涵蓋所有金鑰管理周期,並遍及整 個企業和:擬資料k心及公共雲環境。8ey>eCure 提供金鑰輪轉機制, z讓客戶可 z高效率地根據安全政策輪轉金鑰。 ).,.5 ─ 金鑰永遠z加密形式儲存在8ey>eCure裝置k。8ey>eCure 的集k 式管理 功能包─詳細的日誌和稽核追蹤,可…握所有金鑰狀態變更、系統管理員存取和政 策變更的情形。稽核紀錄會被安全地儲存和簽(z避免否認。 ).,., ─ 透過 8ey>eCure 超過 (& 個的管理存取控制清單,可z支援不
 同v員 建立和刪除/存取金鑰的情形。安全團隊可z要求兩個系統
 管理員必須同時核准特定類型的操作方能進行─例如產生金鑰等。
  • 27.
  • 28.
  • 29.
  • 31. 金管會普遍稽核項目 1. 「帳號共用c問題 (. 「目錄共用c問題 ). 對外t換的「4:A區檔案不落地c 4. 自動化傳輸程式碼k「密碼需保護c 5. 傳輸t換須有完整「稽核軌跡c ,. 檔案「傳輸加密c -. 檔案「安全防護c 如0檔案權限控管、檔案加密) .. 企業內部防火牆通訊埠「減少開放c /. 檔案t換業務往「全面自動化c發展 45
  • 32. 1. 建立集k式檔案傳輸管理平台,能有多種傳輸方式 (. 加強檔案傳輸安全性 ). 既有管理設定可簡化,加強5TP 服務管理功能 4. 保有完整的傳輸稽核記錄 5. 提升檔案權限控管的嚴謹度 6. 定期自動清除m未使用的檔案 -. 使用者帳密的存取與942P整合 .. 5TP >CrHNQ內的帳密非明碼 /. 內部5TP帳號的密碼由管理者控管 46
  • 33. 1. 建立對外集k式檔案傳輸管理平台,能有多種傳輸方式 ■ 支援多協定服務功能 5TP/>、6TTP/>、>5TP) (. 加強檔案傳輸安全性 ■ 支援兩層式安全傳輸架構、4:A檔案不落地、傳輸加密/檔案加密 ). 希望既有的管理設定可簡化,並加強5TP 服務管理功能 ■ 提供統d的管理介面、檔案傳輸自動化處理、傳輸異常l動通知…等 4. 保有完整的傳輸稽核記錄 ■ 提供傳輸紀錄/系統紀錄/管理員操作紀錄 5. 提升檔案權限控管的嚴謹度 ■ 支援檔案繞送、檔案的權限控管機制 ,. 定期自動清除m未使用的檔案 ■ 原廠提供檔案清除>CrHNQ -. 使用者帳密的存取與942P整合 ■ 支援多組942P功能 .. 5TP >CrHNQ內的帳密非明碼 ■ >eCure3lHeLQ可協助做• /. 內部5TP帳號的密碼由管理者控管 ■ >eCure3lHeLQ可協助做• 47
  • 40. 54 Requirement 2 Do not use vendor-supplied defaults for system passwords and other security parameters 2.3 2.1 2.2 Protect Cardholder Data Requirement 3 Protect stored cardholder data 3.6 3.4 3.5 Requirement 4 Encrypt transmission of cardholder data across open, public networks 4.1 Maintain a Vulnerability Management Program Requirement 6 Develop and maintain secure systems and applications 6.3 6.1 6.2 6.6 6.4 6.5 6.7 Implement Strong Access Control Measures Requirement 7 Restrict access to cardholder data by business need to know 7.3 7.1 7.2 
 
PCI-DSS 3.1 
 Compliance 
 Combination 
 Build and Maintain a Secure Network and System Requirement 1 Install and maintain a firewall configuration to protect cardholder data 1.3 54
  • 41. 55 Implement Strong Access Control Measures Requirement 8 Identify and authenticate access to system components 8.3 8.1 8.2 10.1 10.3 10.8 10.6 10.7 Additional PCI DSS Requirements for Shared Hosting Providers Requirement A.1 Shared hosting providers must protect the cardholder data environment A.1 8.5 8.7 Regularly Monitor andTest Networks Requirement 10 Track and monitor all access to network resources and cardholder data 10.2 10.4 10.5 Regularly Monitor andTest Networks Requirement 11 Regularly test security systems and processes 11.1 
 

PCI-DSS 3.1 
 Compliance 
 Combination
  • 42.
  • 43.