EMC Certified Data Erasure Service

Download Report

Transcript EMC Certified Data Erasure Service

Service Strategies Showcase - Boston
Impact of Regulatory Compliance on Remote Support
Tom Ellwood
Sr. Manager - Remote Support Technologies
EMC Corporation
© 2004 EMC Corporation. All rights reserved.
11/11/2004
1
Agenda
 Remote Support – Defined
 EMC Support At-A-Glance
 Remote Support Technology –
Historical Perspective
 Regulatory Requirements
Fundamentals
 Intersection of Remote Support
and Regulatory Compliance
 Impact of Compliance on Internal
Policies and Product
Development
 Future Trends
 Summary and Questions
© 2004 EMC Corporation. All rights reserved.
2
Remote Support- Defined
A combination of technology, processes and people which
enables the monitoring and management of devices from a
remote facility.
The benefits include the following:
– Increased Customer Satisfaction
– Proactive response to product generated alerts
– Ability to remotely diagnose and repair
– Increased product availability
– Lower mean time to repair
– Reduced service costs
– Enhanced Customer usage and product performance statistics
© 2004 EMC Corporation. All rights reserved.
3
EMC Overview
 $6.24B in revenue in 2003
 $1.97B in Q2 ’04 revenue
– Double-digit year-over-year growth in
each business
– Systems revenue up 16% from Q2 ’03
– Software revenue up 64% from Q2
’03
– Services revenue up 45% from Q2 ’03
 $3.1B in R&D last four years
 $6.7B in cash and investments
 2,000+ storage-related patents
 $2B+ interoperability investment
 7,200+ Services professionals
 21,400+ employees worldwide
“[Customers] are
looking for broader
‘best of breed’
solution sets and
better service and
support, and they are
uncompromising when it comes to
improving the total cost of
ownership and overall returns on
their IT investments. We think our
strategy and our portfolio are very
well suited for this challenge.”
— Joe Tucci,
President and CEO
July 20, 2004
 Strong strategic partnerships
© 2004 EMC Corporation. All rights reserved.
4
Recognized Leadership
 #1 provider of storage management software in 2003 for fifth
straight year
(Gartner Dataquest)
 #1 provider of external RAID storage in 2003 for seventh
straight year (IDC)
 #1 provider of networked storage (IDC)
 “Leader” in:
–
–
–
–
SAN integrated solutions
SAN management software
Midrange enterprise disk arrays
High-end enterprise disk arrays
 $3.5 billion in acquisitions in 2003
– Legato
– Documentum
– VMware
© 2004 EMC Corporation. All rights reserved.
EMC leads the
Industry in
best-of-breed
hardware, software,
services, and
solutions
5
EMC Support Services At-A-Glance
 4,000+ in Customer Services
 3,000+ consultants and
technology professionals
 275+ Cooperative Service
Agreements
 30+ Authorized Services
Partners
 70+ Customer Services partners
 Three practices focused on best
practices for storage
implementation, integration, and
management
 Powerlink eServices: access to
over 20,000 Knowledgebase
solutions and web support
 Most rapid escalation practices
in the industry with 4-levels of
customer defined priorities
 24-hour mission-critical “follow
the sun” support with 11
strategically located support
centers
 Joint Solution Centers with
leading software vendors Oracle
and Microsoft for rapid resolution
of joint customer events
“EMC’s service programs and reputation provide customers
with confidence that EMC will do whatever it takes to
prevent problems and to fix problems when they do occur.”
— Gartner Dataquest: IT Vendors Offer Technology-Enhanced Remote
Support Services, December 2002
Winner of Software Technical Assistance
Recognition (STAR) award for
outstanding mission-critical support
— Service and Support Professionals
Association (SSPA) 2001, 2002, 2003, 2004
“Best in class service. A model for all other IT providers in
project execution. A model for zero downtime…”
— General Motors, in naming EMC Supplier of the Year (Winner 1999–
2003)
EMC
Industry
Benchmark
94.3%
43.9%
95%
89.6%
Parts available under warranty
98.5%
95.4%
Calls with four hour or less onsite
response
100%
75.9%
Service Metric
Dial home response resolved
before the customer is aware of
issue
First-time resolution
Source: Gartner Benchmarking Hardware Service Operations, June 2002
© 2004 EMC Corporation. All rights reserved.
6
EMC’s Support Environment
Platforms
Access
Application
Management
Servers
Users
ControlCenter
Server
ControlCenter
Web
Servers
LAN
Mainframe
UNIX
Linux
Centera
Legato and
Documentum
Windows
Celerra
Connectrix
EDM
Celerra
NS600
Symmetrix
DMX2000
Symmetrix
z8530
© 2004 EMC Corporation. All rights reserved.
CLARiiON
CX Series
SRDF
Symmetrix
8000
Symmetrix
DMX1000
7
EMC’s Proactive Support Model
4
Problem escalation
Solutions Support
Center
PSE Lab
(Hardware support)
2
3
EMC Customer
Support
Center
Technicians
Dial-in
Engineering
4
Local expertise
1
e-mail home
or call home
(modem or INet)
© 2004 EMC Corporation. All rights reserved.
5
Site visit
EMC Product
Customer Engineer
and Registered Technical
Specialist
8
© 2004 EMC Corporation. All rights reserved.
9
Examples of Remote Support at Consumer Level
HELP !!
“I’ve fallen and I can’t get
up”
© 2004 EMC Corporation. All rights reserved.
10
Remote Support Technology – Past and Present
Past
 Focused on Hardware Platforms
 Primarily Emphasis on Product
Monitoring
 Telephony and Modem Based
Connectivity
 Phone and Modem Costs Limited
Use to Large Vendors
 Proprietary Infrastructure
 Limited Use of Remote Access or
Analytical Tools
 Limited Security Concerns
© 2004 EMC Corporation. All rights reserved.
Present
 Hardware and Software Platforms
 Leveraging Technology for ValueAdded Services
 IP or Network Connectivity
Options Increasing
 Internet Enabled Widespread Use
of Inexpensive Bandwidth
 Open Framework
 Autonomic Computing Initiatives
Driving On-Board Diagnostic
Tools and Self Healing
 Significant Security Concerns
Resulting From Use of Public
Internet and Compliance
Mandates
11
Support and Service Evolution
We are here
Source: Aberdeen Group, August 2002
© 2004 EMC Corporation. All rights reserved.
12
Today’s Support Challenges
Reduce Support Costs
Utilization
Consolidation
Support Automation
Increase Support
Revenues
Expanded Partner
Relationships
More Value-Added Services
Sales and Support Channels
external from organization
Increased
Complexity
Compliance
Minutes=Millions
Supporting Customer’s
Business – Not just
your Product
© 2004 EMC Corporation. All rights reserved.
>16,000 regulations
worldwide
13
The Compliance Challenge Keeps Growing
The Privacy Act of 1974
The Computer Security Act of 1987
The Computer Matching and
Privacy Protection Act of 1988
Promotion of Access to Information Act
DOD 5220.22-M
Basel II
UK Data Protection Act
Data Protection Amendment 2002
Law of August 29, 1997 on
protection of personal data
The Electronic Communications Privacy Act
The Gramm-Leach-Bliley Act
EU Data Protection Directive (95/46/EU)
The Health Insurance Portability
& Accountability Act (HIPAA)
Electronic Communications Privacy
Directive (2002/58/EU)
US DoD 5015.2-STD – Design Criteria Standard for
Electronic Records Management
US Army Regulation 25-1, Army Information Management,
May 2002; Reg 25-2, Information Assurance, Sarbanes-Oxley
© 2004 EMC Corporation. All rights reserved.
14
Compliance Means Following the Rules…
and Being Able to Prove It
Data Protection Act of 1998
MoReq CRFB - France
SEC 17a-4 NASD 3010
FERC Part 125
Basel II
BaFin – Germany
Dicom
UK Metadata Framework
GLBA Rev. Proc 97-22
US Patriot Act
HIPPA
Sarbanes-Oxley
eSign Act
Environmenta
l
Manufacturing
Employment
Finance
DoD 5015.2
ISO 15489-2
Healthcare
Freedom of Information Act of 2000
21 CFR Part 11
© 2004 EMC
© 2004
Corporation.
EMC Corporation.
All rightsAll
reserved.
rights reserved.
15
“Following the Rules” Requires Common Goals
 20,000 regulations – 3 common themes
– Retention
– Assured authenticity
– Security / disaster recovery
 Common IS Goals
– Integrity
– Confidentiality
– Accessibility
How are regulations & IS goals applied
– In the Information Infrastructure ???
Common
Compliance
Information
Goals
Integrity
Confidentiality
Accessibility
© 2004 EMC
© 2004
Corporation.
EMC Corporation.
All rightsAll
reserved.
rights reserved.
16
HIPAA 45 CFR 164 – Health Care
Industries
Health Care Providers
Medical Insurance
Pharmaceuticals
Biotechnology
Integrity
Confidentiality
Accessibility
HIPAA: 45 CFR Part 164
Security and Privacy Rule
• 164.306 “… entity must comply with standards
as provided in this section and in 164.308,
164.310, 164-312, 164.314 and 164.316 with
respect to all electronic protected health
information
• 164.308(a) “Risk Analysis to assess risks to
the confidentiality, integrity and availability of
electronic protected health information.”
• 164.312(a) “…allow access to only those
persons or software programs that have been
granted access rights….”
• 164.312(b) “Audit Controls -..record and
examine activity in information systems that
contain or use protected health information”
• 164.312(d) “Implement procedures to ensure
that person or entity seeking access……is the
one claimed”
• 164.312(e)(2) Transmission Security
…”encrypt electronic protected health
information whenever deemed appropriate.”
© 2004 EMC
© 2004
Corporation.
EMC Corporation.
All rightsAll
reserved.
rights reserved.
Specified
Capabilities
System Validation
Access Control
& Logs
Audit Trails
Authentication
Encryption
17
FDA 21 CFR 11 – For Pharmaceuticals
Industries
Pharmaceuticals
Biotechnology
Medical Devices
Food
Integrity
Confidentiality
Accessibility
FDA: 21 CFR Part 11
Specified
Capabilities
Electronic Records and Signatures
• 11.10 “… procedures and controls designed to
ensure the authenticity, integrity, and, when
appropriate, the confidentiality of electronic
records”
• 11.10(a) “Validation of systems to ensure
accuracy, reliability, consistent intended
performance, and the ability to discern invalid
or altered reports”
• 11.10(c) “Protection of records to enable their
accurate and ready retrieval throughout the
records retention period”
• 11.10(d) “Limiting system access to
authorized individuals”
• 11.10(e) Use of secure, computer-generated,
time stamped, audit trails that “shall be
retained for a period at least as long as that
required for the subject electronic records …“
• 11.30 Controls for open systems…“additional
measures such as document encryption …”
© 2004 EMC
© 2004
Corporation.
EMC Corporation.
All rightsAll
reserved.
rights reserved.
System Validation
Retention Mgmt
Access Control
& Logs
Authentication
Audit Trails
Encryption
18
The Sarbanes-Oxley
The Sarbanes-Oxley Act of 2002 has rewritten the rules for corporate
governance disclosure and reporting. Good corporate governance and
ethical business practices are no longer niceties – they are the law.
“Disclosure”
“Internal Controls”
“Certification”
Section 302
 CEO and CFO
must certify their
financial
statements – no
IT implications
 Deadline: In
effect now
© 2004 EMC Corporation. All rights reserved.
Section 404
 Auditors must
certify internal
controls and
processes in
addition to
financial numbers
 Deadline:
Extended to
November 2004
Section 409
 Companies must
provide realtime
disclosure of material
events that might
effect performance,
realtime reporting
(Promote full
disclosure and
constant awareness)
 Deadline: Coming
soon
19
Regulatory environment and security awareness lead to
new customer behavior
Hostile environment
Privacy & governance regulations
 210 million complaints reported
to the FTC identity theft
clearinghouse by year-end 2003
(source FTC)
 California law SB 1386
 56% of US corporations had
unauthorized use of computer
systems in 2002 (source FBI)
 Sarbanes-Oxley
 3,784 software vulnerabilities
reported in 2003 (source CERT)
 SQL Slammer worm caused an
estimated $1billion loss to
businesses in January 2003
 HIPAA
 Gramm-Leach-Bliley Act
New customer security behavior
 Increased awareness of financial
liabilities
 Business loss – Reputation and $$$
 Prosecution
 ENRON
© 2004 EMC Corporation. All rights reserved.
20
Intersection of Compliance and Product Support
Privacy Regulations




California law SB 1386
HIPAA
Gramm-Leach-Bliley Act
Sarbanes-Oxley
Products and Customer
Service employees are now
part of a regulated environment
Customers
Customer Service
 Financial institutions
 Public companies
 Healthcare …
 SLA & Support agreement
 On-site support
 Remote support
Internal controls
Controls & regulations impact:








Accuracy of audit records
Security breach reporting
Privacy policies
Security forensics
© 2004 EMC Corporation. All rights reserved.
Remote support infrastructure
Product architecture
Privacy Policy
Customer Service processes
21
Impact of Compliance on Remote Support
• Host Vulnerabilities
- AV & O/S Updates
- Active Services
• Authentication
• Audit Logs
• Access Control
• Change Control
• Media Protection
• Remote Access Logs
• Change Control Logs
• Support Logs
CRM
Data
Base
Bottom Line:
Vendor
Network
Internet
Firewall
Monitored
Device
Customer Network
Firewall
My Network; My Rules!
Web Servers
Support
Engineer
•
•
•
•
•
Privacy Policies
Authentication
Role Based Access
Security Training
Process Audit
Vendor
© 2004 EMC Corporation. All rights reserved.
•Encryption
•Firewall Rules
Application Servers
Monitored devices
Customer
22
Understanding the Rules for Remote Support - Guidelines
 Engage your customers early and often
– It’s more than market research – Understand Their business
•
•
•
•
•
•
Security Policies for Remote Access
Compliance Requirements
Availability Needs
Service Level Agreements
Additional Services
“WIIFM”
– Include representative customers in design and feature requirements
– Both End Users and Network Security
– Enlist Customers in messaging and deployment strategy
 One size doesn’t fit all
 Security is a blend of process and technology
 Prepare to have your Remote Support processes audited
 Design ‘Security Friendly’ products
© 2004 EMC Corporation. All rights reserved.
23
Defining policies to address security throughout the
product lifecycle
Design &
Architecture
Product feature
policy:
Policy
Authentication &
Authorization
Product
developm
ent
Development
policy
Product
QA &
testing
Security policy
validation
Audit
Prevent
vulnerabilities:
Buffer overflow …
Product QA in
secure
environment
Secure
communication
3rd party product
policies:
Security
scanning
Password
management
• security
patches,
Encryption
• default
configurations
Standardization
Accreditation &
certification
Customer
Service
Vulnerability
response policy
Security patch &
antivirus
Customer role &
responsibility
Remote support
policy
Privacy policy
Customer
controls
Product Security Policy
© 2004 EMC Corporation. All rights reserved.
24
Future Trends in Remote Support Technology
 Customers Demanding Increased
Availability
– Cost of Down Time Increasing
 Devices Becoming More Intelligent
– RFID
– Self-Healing Architectures
– Autonomic Computing
 Millions of Devices Networked
– 500 Million by 2010 (Harbor Research)
 Wireless Invasion will Increase
Remote Access capabilities
 Regulatory Compliance and Network
Expansion will Drive Security
Awareness
– Perimeter Defense
– End Point Defense
© 2004 EMC Corporation. All rights reserved.
25
Key Takeaways
 Remote support model can create a competitive advantage
 Remote monitoring and management capabilities will drive
new product features and services opportunities
 Regulatory compliance will impact your remote support
model
– You will become an extension of a regulated community
– Trust but verify – Are your support processes auditable?
 Security must be designed into products; It can’t be “boltedon”
– Integrate security into product lifecycle
 Security policies are as important as the technology
© 2004 EMC Corporation. All rights reserved.
26
Reference Material
• ISO-17799 ISO 17799:2000 – Code of Practice for Information Security
Management
• NIST-800-70 DRAFT NIST Special Publication 800-70, The NIST Security
Configuration Checklists Program
(http://csrc.nist.gov/publications/nistpubs/)
• COBIT
Control Objectives for Information and related Technology
(COBIT) Security Baseline - IT Governance Institute (http://www.isaca.org)
• RFC2828
IETF RFC 2828 Internet Security Glossary (May 2000)
• SANS ( SysAdmin, Audit, Network, Security) Institute (http://www.sans.org)
• Common Criteria for IT Security Evaluation
(http://csrc.nist.gov/cc/index.html)
• OWASP
Open Web Application Security Project (OWASP) Top Ten
Security Vulnerabilities (http://www.owasp.org/documentation)
© 2004 EMC Corporation. All rights reserved.
27