managing pii with identity finder

Download Report

Transcript managing pii with identity finder

MANAGING PII WITH
IDENTITY FINDER
Paul Hanson
IET-Data Center and Client Services
University of California, Davis
Agenda







What is PII and where’s the
value?
What is Identity Finder?
Alternative Solutions
What can Identity Finder
Scan?
How does Identity Finder
handle the results?
Identity Finder Architecture
Architecture Overview



Client UI
INI Files
Custom MSI

Architecture Overview






Management Console
IET DCCS Implementation
IET DCCS Architecture
Lessons Learned
Breaking News
Questions
What is PII and where’s the value?







Cybersecurity (UC Davis)
Massachusetts 201 CMR 17.00
Protected Health Information (PHI)
Health Insurance Portability and Accountability Act
(HIPAA)
FACT Red Flag Rules
Incident Response
Sysadmins may not know the data is there.
What is Identity Finder

Identity Finder searches the deepest recesses of a computer to locate and
secure data that is vulnerable to identity theft - even when you don’t know
it exists. The information is then presented to you to permanently shred,
quarantine to a secure location, or encrypt with a password.
Source: http://www.identityfinder.com/Products/Identity_Finder.html



Primarily Supports Windows & Mac
Feature rich
Continuously improving
Alternative Solutions
Windows
Virginia Tech
Find_SSNs
Cornell Spider
PowerGREP
Mac
Linux/
Unix
X
X
X
X
?
X
?
X
?
Identity Finder Architecture

Enterprise Client


Management Console (Really just a reporting server)


Installed on the workstation/server & does the heavy lifting
Dedicated system running IIS w/MSSQL
OS Compatibility

Clients for Windows and Mac

Linux/Unix systems are scanned remotely
What can Identity Finder Scan?













Microsoft Office (Excel, PowerPoint, Word, and OneNote including 2007)
Adobe Acrobat PDF (including 9.x)
Cookies and instant messenger logs
HTML files (htm, asp, js, etc.)
Text files (ANSI, Unicode, Batch, Source code)
Rich text files (rtf format)
files within the My Documents folder of your personal computer
files anywhere on your personal computer
removeable hard drives connected to your PC
Create custom folder lists for seaching (ability to include and exclude subfolders)
compressed files (zip, gzip, bzip, tar, rar, and z)
Microsoft Access database files (including 2007)
Any other known or unknown file type
Source: http://www.identityfinder.com/Products/Identity_Finder_Feature_List.html
What else does Identity Finder scan?

Database connector


Website crawler





OLEDB (i.e., SQL, Oracle, Sybase, DB2, etc.)
HTTP or HTTPS
Remote file shares (SMB, NFS, Samba)
Email – Mailboxes, PST’s, MBOX, Tbird
IE & Firefox Cache
AnyFind vs. Specific Values (e-discovery requests)
What does Identity Finder do with the
results?







Save as secured Identity Finder file (*.idf) using FIPS 140-2 validated 256
bit AES
Save as HTML Summary Report
Choose specific information for custom reports to be saved
Save as Full Export into Comma Separated Value format
Save as Executive Summary Report
Upload to Management Console
What about the hits?






Secure – encrypts the file using FIPS 140-2 validated 256 bit AES
Shred – based on DOD 5220.22-M standard
Ignore
Quarantine – Secures a copy of the file and shreds the original
Recycle – same as the windows recycle bin. Not a secure method.
Will clean web browser cache & registry
Architecture Overview

Client
 Configuration
 User
Interface
 INI Files
 MSI Customization
 Boot from CD

Management Console
 IIS
& SQL
Architecture – Client UI






Main
What to Search for
Where to Search
Tools and Options
Settings
Scheduling
Architecture – INI Files

Creating an INI File



Created in UI
Copied over
Run on demand or scheduled task

/jobmode /inifile=“<filename>.ini”
Architecture – Custom MSI

Creating the environment









Download Windows SDK (~1.1GB for Vista)
Install Orca.msi
Add system variables
Extract MSI
Run lictomsi.cmd
Import Tables
Schtasks for all systems
Include Management Console phone home
No x64 bit support…. Yet.
Identity Finder Client
Lab
Architecture – Management Console


Single server, dual purpose
WS2003/2008 (x86 or x64)






IIS6 or IIS7 w/Metabase compatibility
.Net Framework 3.5 SP1
Microsoft Report Viewer
Redistributable 2008
Creates Client Registry
Settings (x86 & x64)
SQL 2005/2008
(Express, Std, Ent)
Certificates & Encryption
IET DCCS Implementation


Powershell installation script
Started with custom MSI

x86 was fairly smooth


x64 required some extra work


Users couldn’t modify settings to rescan
No support for x64 so had to use INI files anyway
Moved to INI files
No reason to support two methods
 Users can tweak settings and rescan systems


Scans launched using the system account
IET DCCS Architecture

Mangement Console



Separate virtual systems for IIS & SQL
Certificates
Clients

Leveraged Powershell to script installation








Verify connectivity to MC
Check system type
Include password check
Check for and uninstall previous versions
Import registry key for MC
Create INI
Delete old scheduled task
Schedule new scan
Lessons Learned






MC is a resource hog.
Nuances with schtasks.
Clients were configured to search for SSN & CC but
also pulled up Back Account information.
Be prepared for False-Positives.
Password check really slows down the scan.
When configured as background service, it will
allocate the remaining resources.
Breaking News

Features in the next version of Identity Finder.
Questions?
Identity Finder
Management Console
Lab