Vsia Ip Protection Measurements

download Vsia Ip Protection Measurements

of 42

Transcript of Vsia Ip Protection Measurements

  • 8/2/2019 Vsia Ip Protection Measurements

    1/42

    VSI AllianceTM

    White Paper

    Technical Measures and

    Best Practices forSecuring Proprietary Information

    Version 1.0(IPPWP3 1.0)

    Issued by the

    Intellectual Property Protection

    Development Working Group

    November 2002

  • 8/2/2019 Vsia Ip Protection Measurements

    2/42

  • 8/2/2019 Vsia Ip Protection Measurements

    3/42

    VSI Alliance (IPPWP3 1.0)

    Copyright 2002 by the VSI Alliance, Inc. iAll Rights Reserved. VSIA CONFIDENTIAL DOCUMENT

    NOT LEGAL ADVICE

    The discussions of the law in this document are not intended to be legal advice.

    This document is not to be used as a legal reference. Readers should refer totheir own legal counsel for answers to questions concerning the law.

    Copyright 2002 by

    VSI Alliance, Inc.

    15495 Los Gatos Boulevard, Suite #3

    Los Gatos, California 95032, USA

    Phone: (408) 356-8800, Fax: 408-356-9018

    http://www.vsi.org, [email protected]

    VSI Alliance is a trademark of the VSI Alliance, Inc.

    All other trademarks are the property of their respective owners.

    Please send comments and questions to:

    IP Protection Development Working Group (DWG), VSIA

    Ian R. Mackintosh

    Chair

    3054 Three Springs Road, San Jose, CA 95140

    408-406-3152, [email protected]

    Raymond Burkley

    Vice-Chair

    Burkley Associates, P. O. Box 496, Cupertino, CA 95015

    408-735-1540, [email protected]

    VSI Alliance

    115495 Los Gatos Blvd, Suite 3, Los Gatos, CA 95032

    408-356-8800, info

    http://www.vsi.org/http://www.vsi.org/
  • 8/2/2019 Vsia Ip Protection Measurements

    4/42

    VSI Alliance (IPPWP3 1.0)

    Copyright 2002 by the VSI Alliance, Inc. iiAll Rights Reserved. VSIA CONFIDENTIAL DOCUMENT

  • 8/2/2019 Vsia Ip Protection Measurements

    5/42

    VSI Alliance (IPPWP3 1.0)

    Copyright 2002 by the VSI Alliance, Inc. iiiAll Rights Reserved. VSIA CONFIDENTIAL DOCUMENT

    Notice

    The document is provided by VSIA subject to a license agreement, which restricts how thisdocument may be used.

    THIS DOCUMENT MAY NOT BE COPIED, DUPLICATED, OROTHERWISE REPRODUCED.

    THE DOCUMENT IS PROVIDED BY VSIA ON AN "AS-IS" BASIS, ANDVSIA HAS NO OBLIGATION TO PROVIDE ANY LEGAL OR TECHNICALASSISTANCE IN RESPECT THERETO, TO IMPROVE, ENHANCE,MAINTAIN OR MODIFY THE DOCUMENT, OR TO CORRECT ANYERRORS THEREIN. VSIA SHALL HAVE NO OBLIGATION FOR LOSS OFDATA OR FOR ANY OTHER DAMAGES, INCLUDING SPECIAL ORCONSEQUENTIAL DAMAGES, IN CONNECTION WITH THE USE OF

    THE DOCUMENT. VSIA MAKES NO REPRESENTATIONS ORWARRANTIES, EXPRESS OR IMPLIED, INCLUDING WITHOUTLIMITATION, ANY WARRANTY AS TO INFRINGEMENT, OR THEIMPLIED PURPOSE. THE READER SHOULD BE AWARE THATIMPLEMENTATION OF THE DOCUMENT MAY REQUIRE USE OFSUBJECT MATTER COVERED BY PATENT OR OTHER INTELLECTUALPROPERTY RIGHTS OF THIRD PARTIES. NO LICENSE, IMMUNITY, OROTHER RIGHT IS GRANTED BY USE OF THIS DOCUMENT IN ANYSUCH THIRD-PARTY RIGHTS. NEITHER VSIA NOR ITS MEMBERSTAKE ANY POSITION WITH RESPECT TO THE EXISTENCE OR

    VALIDITY OF ANY SUCH RIGHTS.

  • 8/2/2019 Vsia Ip Protection Measurements

    6/42

    VSI Alliance (IPPWP3 1.0)

    Copyright 2002 by the VSI Alliance, Inc. ivAll Rights Reserved. VSIA CONFIDENTIAL DOCUMENT

  • 8/2/2019 Vsia Ip Protection Measurements

    7/42

    VSI Alliance (IPPWP3 1.0)

    Copyright 2002 by the VSI Alliance, Inc. vAll Rights Reserved. VSIA CONFIDENTIAL DOCUMENT

    Intellectual Property Protection

    Development Working Group

    Company Members

    ARM Cadence Design SystemsECSI Ellipsis Digital Systems

    Fujitsu IBM

    Mentor Graphics Oki Telecom

    Philips Semiconductor VCX

    Individual MembersRaymond Burkley (Vice-Chairman) Eduardo Charbon

    Suzanne P. Harrison Robert Helt

    Ken Hodor Gerald N. Keeler

    Ian R. Mackintosh (Chairman) Miodrag Potkonjak

    Brahmajai Potu Gang Qu

    Patrick H. Sullivan Joseph F. Villella, Jr.

    Current DWG Member RepresentativesSimon Watt . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ARM

    Richard Terrill . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Cadence Design Systems

    Mark Bales . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Cadence Design Systems

    Adam Morawiec . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ECSI

    Minesh Shah . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Fujitsu Ltd.

    Takeshi Fuse . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Fujitsu Ltd.

    Ken Goodnow . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . IBMKen Hodor . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Individual Member

    Ian R. Mackintosh (Chair) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Sonics

    Al Kwok . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . NetLogic MicrosystemsTadashi Hiruta. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Oki Electric Industry

    Miodrag Potkonjak . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Individual Member

    Patrick Beauvillard . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Individual Member

    Raymond Burkley (Vice-Chair) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Individual Member

    Larry Rosenberg . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . VSIA-TC Chair

    AuthorsHimanshu Dwivedi

    Robert Helt

    Myles Conley

  • 8/2/2019 Vsia Ip Protection Measurements

    8/42

    VSI Alliance (IPPWP3 1.0)

    Copyright 2002 by the VSI Alliance, Inc. viAll Rights Reserved. VSIA CONFIDENTIAL DOCUMENT

  • 8/2/2019 Vsia Ip Protection Measurements

    9/42

    VSI Alliance (IPPWP3 1.0)

    Copyright 2002 by the VSI Alliance, Inc. viiAll Rights Reserved. VSIA CONFIDENTIAL DOCUMENT

    Revision History

    Version 1.0 Jun02 Draft edited and formatted for member reviewVersion 1.0 Oct02 Copy edited for IPP DWG reviewVersion 1.0 Oct02 Copy edited and formatted for Board reviewVersion 1.0 Nov02 Formatted for final release

  • 8/2/2019 Vsia Ip Protection Measurements

    10/42

    VSI Alliance (IPPWP3 1.0)

    Copyright 2002 by the VSI Alliance, Inc. viiiAll Rights Reserved. VSIA CONFIDENTIAL DOCUMENT

  • 8/2/2019 Vsia Ip Protection Measurements

    11/42

    VSI Alliance (IPPWP3 1.0)

    Copyright 2002 by the VSI Alliance, Inc. ixAll Rights Reserved. VSIA CONFIDENTIAL DOCUMENT

    Table of Contents

    Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1

    Preface. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1

    Scope . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1

    Background . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1

    Finding the Right Level of Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2

    Establishing a Framework . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5

    Access . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5

    Storage. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13

    Transport . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19

    Summary. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23

    A. About the Authors . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .25

    B. Bibliography . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27

    C. Glossary. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .29

    List of TablesTable 1: Authorization and Authentication. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6

    Table 2: Levels of Console Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9

    Table 3: Remote Users Classification. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10

    Table 4: Levels of Security Authentication. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11

    Table 5: Levels of Security Encryption. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14

    Table 6: Layers of Transport Security. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21

    List of Figures

    Figure 1: IP Filters in Windows 2000 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7

    Figure 2: Graphical Representation of SSH (Secure Shell) . . . . . . . . . . . . . . . . . . . . . 8

    Figure 3: EM4 File System Encryption - Example 1 . . . . . . . . . . . . . . . . . . . . . . . . . 15

    Figure 4: EM4 File System Encryption - Example 2 . . . . . . . . . . . . . . . . . . . . . . . . . 15

    Figure 5: EM4 File System Encryption - Example 3 . . . . . . . . . . . . . . . . . . . . . . . . . 16

    Figure 6: PGP Encryption - Example 1. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16Figure 7: PGP Encryption - Example 2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17

    Figure 8: PGP Encryption - Example 3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17

    Figure 9: PGP Encryption - Example 4 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18

    Figure 10: Example of Best Practices for Protecting IP . . . . . . . . . . . . . . . . . . . . . . . 24

    http://ip_whitepaper_rauchtobaker_27jun02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_27jun02_body.pdf/http://ip_whitepaper_rauchtobaker_27jun02_body.pdf/http://ip_whitepaper_rauchtobaker_27jun02_body.pdf/http://ip_whitepaper_rauchtobaker_body15may02.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_body15may02.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_body15may02.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_body15may02.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_body15may02.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_body15may02.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_body15may02.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_body15may02.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_27jun02_body.pdf/http://ip_whitepaper_rauchtobaker_body15may02.pdf/http://ip_whitepaper_rauchtobaker_body15may02.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_27jun02_body.pdf/http://ip_whitepaper_rauchtobaker_body15may02.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_27jun02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_27jun02_body.pdf/http://ip_whitepaper_rauchtobaker_27jun02_body.pdf/http://ip_whitepaper_rauchtobaker_27jun02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_body15may02.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_body15may02.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_body15may02.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_27jun02_body.pdf/http://ip_whitepaper_rauchtobaker_body15may02.pdf/
  • 8/2/2019 Vsia Ip Protection Measurements

    12/42

    VSI Alliance (IPPWP3 1.0)

    Copyright 2002 by the VSI Alliance, Inc. xAll Rights Reserved. VSIA CONFIDENTIAL DOCUMENT

    http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/
  • 8/2/2019 Vsia Ip Protection Measurements

    13/42

    VSI Alliance (IPPWP3 1.0)

    Copyright 2002 by the VSI Alliance, Inc. 1All Rights Reserved. VSIA CONFIDENTIAL DOCUMENT

    Introduction

    Preface

    This white paper is a primer on digital security, and specifically, how it applies to the protectionof a companys proprietary information (or Intellectual PropertyIP). A survey of VSIAmembers in early 2001 showed us that many of you are directly involved in the everydaydevelopment, management, or use of proprietary information for your companies. This samesurvey told us that protecting this information from theft, misappropriation, compromise, andunauthorized access through your companys networks and systems is of tremendous currentinterest.

    Our intent is to raise awareness about issues and challenges that need to be considered insecuring Access, Storage, and Transmission of your companys proprietary information anddescribe some best practices that companies implement. We assume only that you, orsomeone you work with, ultimately owns your organizations IP and that while you

    personally may not have direct responsibility for deciding specific security technologies andoptions that your company deploys, you will want to or need to discuss this security with ITprofessionals. This paper begins the discussion about the need for security standards, andpresents a set of common best practices that might ultimately be extended in recommendationform for VSIA member companies.

    Scope

    The purpose of this document is to begin to define standards and best practices for securingintellectual property (IP) from external (outside the corporate perimeter) attacks and internal(inside the corporate perimeter) compromise. It covers protection for IP that is stored and forIP that is transported over data networks. This paper is for anyone in the SoC design

    community who is involved in the development and management of designs, documents,specifications, and other information that is considered the lifeblood or IP of the business. Atone level, securing critical information from unauthorized access is the responsibility of allemployees. However, since IP is one of the pillars the company is built upon, it is particularlynecessary that everyone who develops, manages, or uses the companys IP must ensure that itis handled, distributed and stored with all due care.

    Background

    Attacks, probes, intrusions, and other types of exploits are constantly being attempted againstcorporate web sites and networks. Ask your security department how many times your firewallis probed each month. An IP Protection (IPP) Development Working Group (DWG) membernoted that the firewall on his home PC, using a dial-up connection, frequently records 10 ormore attempts in an hour. It is important to understand that these probes, threats, and attacksare aimed not just at high-profile, household-name companies, but also at smaller, lesserknown, and even unknown companies. Studies conducted by the FBI/CSI, SANS, and CERT,among others, all tend to report a rapid increase in the number of attacks that companies haveexperienced in the last five years. Threats can range from kids looking for the challenge andassociated bragging rights of breaking in to a site, to more disreputable individuals looking forcredit card numbers and other confidential information, to motivated, well paid professionalswho are hired for organized crime and corporate espionage.

    http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/
  • 8/2/2019 Vsia Ip Protection Measurements

    14/42

    VSI Alliance (IPPWP3 1.0)

    Copyright 2002 by the VSI Alliance, Inc. 2All Rights Reserved. VSIA CONFIDENTIAL DOCUMENT

    At the next level, there are foreign government-sponsored groups strategically looking forweaknesses in the US critical infrastructure or information that could be used for competitiveadvantage. This expands the scope of the problem from the traditional targets of infrastructuressupporting financial institutions, utilities, government, and the military to chip manufacturersand the sites of large manufacturing and commerce companies. In highly competitive industriesand environments, unscrupulous companies may try to obtain information that can help them

    compete more effectively. They look for data that will give them an edge in the market,including plans, designs, market data, cost, price, specifications, technology partnerships, bidinformation, and any other insight into what their competitors are doing. In short, theinformation that is useful for building your IP is also useful to them.

    Take the case of Microsoft. In October, 2000, according to BBC News1 published reports,Microsoft discovered that someone had gained unauthorized access to its internal systems andmay have viewed some of the source code of key programs under development. While it wasreported that no source code had been taken or compromised, Microsoft spokesman RickMiller characterized the break-in as a deplorable act of industrial espionage. Microsoft calledin the FBI to assist in the subsequent investigation.

    What is compelling about this story is that it happened to Microsoft, which knows that it is atarget for a wide range of attackers. Microsoft has taken the necessary precautions to protectitself with firewalls, intrusion detection devices, and other sophisticated technology, and has aworld-class security management team that knows how to plan for and respond to attacks.According to the BBC News report, even with its technology and expertise, Microsoft was notimmediately sure how long the attacker had been able to access its network. The originalstatements indicated up to five weeks, but were later proven to be twelve days. Other, lesssophisticated companies may not even know if they have been breeched. Possession of securitydevices and infrastructure cannot be enough. Unless you apply and profile the technologycorrectly, it may not be sufficient to help you when you need it the most. A company needs tohave the ability to detect, respond to, and re-create attacks, and hopefully, identify the attacker.

    Finding the Right Level of SecurityGiven that any security system is a compromise between theoretical perfection and practicalreality, this specification does not attempt to define a perfectly secure system. Instead, aspectrum of recommendations and best practices are defined, with five general levels fromwhich the desired level of security may be compared. The lowest level defines the minimumlevel of security that any organization or individual who owns or maintains data processing andstorage equipment should implement. The highest level defines the ultimate level of securityattainable with state-of-the-art techniques and technologies.

    1. BBC News, October 30, 2000: http://news.bbc.co.uk/hi/english/business/newsid_998000/998449.stm

    http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/
  • 8/2/2019 Vsia Ip Protection Measurements

    15/42

    VSI Alliance (IPPWP3 1.0)

    Copyright 2002 by the VSI Alliance, Inc. 3All Rights Reserved. VSIA CONFIDENTIAL DOCUMENT

    Think of your house and the levels of security you apply to it. At the base level, you put lockson the doors and windows that help keep intruders from simply walking in. However, aminimally skilled person would be able to break the windows. It would take someone withmore proficiency and motivation to pick your locks, and while this raises the skill level neededto break in, the end result is that someone is still able to breech your security. You can add analarm system and motion detectors to alert you and the local police department that someone

    has entered the perimeter and tripped the alarm. The intruder, while under a definite timeconstraint, still has some time to get something of value and run. You can add a dog, which willgive you additional advanced notice, but might be circumvented with a bone. In ascendingorder of strength, you can add neighborhood watch, gates, moat and alligators or guard towers,and soon, you are reasonably certain that only someone who is motivated and skilled enoughfor a Hollywood heist film would be able to get into your house.

    It should be noted that in determining the right level of security for you, there is a return-on-investment (ROI) or break-even point on the costs required to reach the next level. As a generalrule, there is an exponential function of the security realized by the increased investment fromeach level to the next. This is because there is a diminishing return from implementing a newsecurity technology and the vulnerabilities it can address relative to your total security

    exposure. A firewall, like locks on doors and windows, protects against someone breaking intoyour site unnoticed. However, as with the house model, if you require complete information onnumber of attempts and successful attempts to enter or identification of the intruders, you willneed to invest in more elaborate measures, such as card readers or armed security. The same istrue for your IP. In order to elevate the bar for the skill required to breech your current level ofsecurity, an investment must be made that must be valued against the information you areprotecting. In a related observation, Richard Clarke of President Bushs Critical InfrastructureDepartment stated, Most Fortune 500 companies spent .0025% of revenue on IT securityless than coffee. [Now,] if you spent .0025%, you deserve to be hacked. And by the way, you

    will be.2 This implies that many companies have not been properly concerned aboutprotecting their IP, and that there is a lot of room for increasing efforts to protect IP.

    In many cases, the ROI will not be sufficient to warrant the cost of attaining the highest levelof security. It is often the case that the ROI of implementing security improves when securityis integrated as early as possible in the architecture or design phase. It is much easier to buildsecurity into the architecture than it is to retrofit it. Likewise, the cost of enabling theappropriate level of security for a given situation depends on many factors associated with thelevel of security desired; the size and type of company; the type and value of the IP to beprotected; and so on. The cost and ROI need to be analyzed on an individual company basis tomeet the needs and financial capabilities of the company.

    2. Speech by Richard A. Clarke, Special Advisor to the President for Cyber Security. February 14, 2002.

    Also, Wired Digital, Inc. Wired Magazine. The Sentinel by Declan McCullagh, Washington Bureau

    Chief for Wired News, October 2000. http://www.wired.com/wired/archive/10.03/clarke_pr.html

    http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/
  • 8/2/2019 Vsia Ip Protection Measurements

    16/42

    VSI Alliance (IPPWP3 1.0)

    Copyright 2002 by the VSI Alliance, Inc. 4All Rights Reserved. VSIA CONFIDENTIAL DOCUMENT

    http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/
  • 8/2/2019 Vsia Ip Protection Measurements

    17/42

    VSI Alliance (IPPWP3 1.0)

    Copyright 2002 by the VSI Alliance, Inc. 5All Rights Reserved. VSIA CONFIDENTIAL DOCUMENT

    Establishing a Framework

    Protecting IP can be a daunting task. The highly sensitive data to be secured may reside onmany different systems, be accessible by a wide spectrum of users, be managed by multipleowners, and require varying levels of access. In a company with 10,000 employees, securingcritical intellectual information is not an easy task, especially with different levels of access forvarious users. For example, what is the proper procedure for securing salary information for alarge software company? Encryption of the data on the physical disk is a given, but accesscontrols and lockout measures to the files also need to be considered. Securing the underlyingoperating system, including patches and updates, is critical. The network also needs to beconsidered, including firewall or router Access Control Lists (ACLs), access to differentsubnets or management networks. Additionally, business needs and functional requirementsneed to be supported, such as the need for 75 percent of the company to access criticalinformation on a daily basis, both from work and at home. This is combined with the fact thatout of the 75 percent that need access, only 74 percent care about security.

    Protecting data, whether it is salary information or IP, can be difficult. Unlike salaryinformation, IP needs to be accessed by employees on a daily basis from everywhere thecompany does business. This has come to include remote offices, hotels rooms, externalbusiness partners, and employees homes. When properly implemented, security measures andprocedures can help an organizations security needs andadd a level of functionality for manyusers.

    This document organizes IP security into three general areas:

    Access (internal and external), including authorization and authentication of users

    Storage (physical storage), including host systems

    Transport (network facilities), including Local Area Networks, Wide Area Networks,

    and Virtual Private Network technologies.The delineation between these components is often difficult to define due to the way IP isdistributed throughout a companys infrastructure (networks and host systems), the wide rangeof applications that use IP, and remote networking methodologies such as VPN and tunneling.

    Access

    Access to data that supports business and technical development needs to foster openness.Information flowing easily from a data center to an authorized user does not have to mean thatno security is involved. Most importantly, the process of securing the data must be efficient inorder to be practiced.

    http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/
  • 8/2/2019 Vsia Ip Protection Measurements

    18/42

    VSI Alliance (IPPWP3 1.0)

    Copyright 2002 by the VSI Alliance, Inc. 6All Rights Reserved. VSIA CONFIDENTIAL DOCUMENT

    Internal

    Authorization and Authentication

    Each department should establish data ownership. Additionally, different levels ofauthorization should be established to determine the type of access to information a databaseengineer needs (level 4) versus the access that a sales engineer needs (level 1). After data

    ownership is established between departments, the right to grant or deny individuals ordepartments needs to be determined. The determining factor of classes should be based on jobrequirement, job responsibility, and functional duties. Each department should have a qualifiedclass level. For example, if you are in department X with the Y job functions and Zresponsibilities, you might be granted an authorization rating of 4. The level will not onlydetermine what portions of the IP you may access, but also determine what type ofauthentication is required to access that information. Depending on the different levels of dataclassification and ownership, different levels of authentication would be required. Thefollowing is an example of possible classification types and authorization requirements for achip manufacturer:

    Table 1: Authorization and Authentication

    Authentication Types

    There are several authentication mechanisms that can be used individually or in combination.Username and passwords are the first level. However, any username and password used forauthentication should always use secure encrypted protocols such as Kerberos, SSH, IPSEC,

    NTLMv2, and so on. Protocols used for authentication that have known security problemsshould be restricted, such as NTLM, Telnet, FTP, Citrix, PPTP, and so on. The insecureprotocols add weaknesses to the overall authentication system, and therefore, should not beused.

    Levels of Security Authentication

    LEVEL DESCRIPTION AUTHORIZATION TYPES ADDITIONAL ACCESS CONTROLS

    1 Contractors, guests, andother temporary positions

    Username and password Operating system security

    2 Sales, HR, f inance Username and password,public/private key authentication

    Operating system security

    3 IT department,management network,sensitive subnets

    Username and password,public/private key authentication

    Operating system security, firewallrulesets and router ACLs

    4 IP departments,engineers anddepartments that supportthe chip design

    Username and password,public/private key authentication,hardware tokens

    Operating system security, firewallrulesets and router ACLs, operatingsystem ACLs

    5 IP departments/engineers working onchip design

    Username and password, public/pri-vate key authentication, hardwaretokens, One time password usagesystem

    Operating system security, firewallrulesets and router ACLs, operatingsystem ACLs

    http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/
  • 8/2/2019 Vsia Ip Protection Measurements

    19/42

    VSI Alliance (IPPWP3 1.0)

    Copyright 2002 by the VSI Alliance, Inc. 7All Rights Reserved. VSIA CONFIDENTIAL DOCUMENT

    A second level of authentication can be added through operating system ACLs. Specificpermissions or restrictions should be placed on both the file and network level. Restrictions toindividual files and folders should be implemented in addition to the ability to have access(authentication rights) to log on to the machine. For example, a user in department Z, securitylevel 4, should be given specific rights to access appropriate folders and denied for the rest. OnUNIX systems, the TCP wrapper program should be implemented to grant access only to

    appropriate users from specific IP addresses or subnets. The Windows 2000 IP Filters offersimilar functionality. Therefore, even if an unauthorized user possesses a valid username andpassword for the user in department Z, authentication does not succeed unless the user connectsfrom the appropriate subnet. The following figure shows a screen shot of IP Filters in Windows2000.

    Figure 1: IP Filters in Windows 2000

    http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/
  • 8/2/2019 Vsia Ip Protection Measurements

    20/42

    VSI Alliance (IPPWP3 1.0)

    Copyright 2002 by the VSI Alliance, Inc. 8All Rights Reserved. VSIA CONFIDENTIAL DOCUMENT

    The third level of authentication is a public and private key combination. There are severalways to use a public and private key system, including SSH (Secure Shell). Using SSH, the useris required to hold a public key and private key to authenticate to a particular server. Both theserver and client are required to hold the users public key. The client needs both a private keyand a correct password to authenticate to the public key. After authentication to the public key,the public key is used to authenticate to the server, which also has a copy of the users public

    key to match credentials. Using this scenario, a lost username and password does not grant anyaccess unless the unauthorized user has managed to capture the public and private key of theauthorized user, which should be stored in two separate and secure places on the operatingsystem. The following figure shows a graphical representation of SSH.

    Figure 2: Graphical Representation of SSH (Secure Shell)

    The fourth level of authentication could be a hardware token, such as SecureID from RSA(please refer to www.rsa.com for more information). SecureID requires a user to physicallypossess a hardware token, the SecureID object, to be used for authentication. Without goinginto detail about SecureID, the token displays a changing password authentication scheme

    which the user needs to authenticate to the appropriate server. Therefore, attackers whosuccessfully steal a username, password, and both SSH public and private keys are blocked ifthey do not physically possess the appropriate SecureID token.

    Secured ServerNOC Workstation

    Holds SSHPublic andPrivate keys Holds SSH

    Public keys

    2. SSH public key sent

    3. SSH public successfully matched

    1. SSH password

    matched against

    private key

    4. SSH session begins

    http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/
  • 8/2/2019 Vsia Ip Protection Measurements

    21/42

    VSI Alliance (IPPWP3 1.0)

    Copyright 2002 by the VSI Alliance, Inc. 9All Rights Reserved. VSIA CONFIDENTIAL DOCUMENT

    Authentication Tracking

    After authentication has been completed, the use of privileged user or department credentialsshould be tracked. It is difficult to impossible to verify if any unauthorized use is occurringwithout the proper audit trails and timestamps. In additional to providing evidence on when thedata was accessed and by whom, log files provide a method of tracking who is viewinginformation, if or what something has been copied, and if someone has copied sensitiveinformation. As a policy, users should be required to work on appropriate and secured servers.For example, if any authorized user copies IP to inappropriate servers, unauthorized accessshould be suspected even though the user is granted the highest security clearance. Copyingany IP information off of authorized servers should be strictly prohibited. Furthermore, if anyremoval of the information occurs, even by an authorized user, the event needs to be recorded.For example, authorized users may copy a piece of data to their local machine. However, inmost environments, the users local machine may be insecure or shared between various userswho do not possess the same level of clearance. This situation is a direct violation of securitybecause the data is now in greater jeopardy. When dealing with IP, appropriate loggingmeasures provide an organization with the necessary information and controls to improve theprotection of their data.

    Console Privacy

    Console privacy can be as simple as it sounds: simply controlling physical access to onesmachine. However, a screensaver on a Windows 9x machine should not be the only measure.There are many ways to get the password from a Window 9x screensaver, which, if theunauthorized user is lucky, will be the same password that the user uses on the network.Protecting intellectual property requires steps beyond screensaver passwords, such as usingdisk-encryption software to control access to sensitive information on the local drive.Additionally, BIOS passwords should be implemented to prevent the ability to boot off of othermedia, such as a CD-ROM or floppy disk, and thus gain access to an operating systems foldersand password files. The following table describes recommended levels of console securitymethods.

    Table 2: Levels of Console Security

    Levels of Console Security

    LEVEL DESCRIPTION CONSOLE SECURITY METHODS

    1 Contractors, guests, and other temporary posi-tions

    Screen saver passwords

    2 Sales, HR, Finance Screen saver passwords, Encrypted PGPdisk/E4Mdisk, BIOS passwords

    3 IT department, management network, sensitivesubnets

    Screen saver passwords, encrypted PGPdisk/E4M disk,BIOS passwords

    4 IP departments/engineers and departmentssupport the chip design

    Screen saver passwords, encrypted PGPdisk/E4M disk,BIOS passwords

    5 IP departments/engineers working on chipdesign

    Screen saver passwords, encrypted PGPdisk/E4M disk,BIOS passwords

    http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/
  • 8/2/2019 Vsia Ip Protection Measurements

    22/42

    VSI Alliance (IPPWP3 1.0)

    Copyright 2002 by the VSI Alliance, Inc. 10All Rights Reserved. VSIA CONFIDENTIAL DOCUMENT

    External

    Authorization

    The IT security policy needs to clearly define the corporate policy for offsite remote access.External users should be categorized into security profiles, based on desired type of remoteaccess, to ensure that critical information is not going offsite to unauthorized users. For

    example, users who simply need to use email from remote sites will probably pose a smallerrisk than users doing remote development work on source code or databases. The usercategorization allows employers to clearly define what type of access rights require a basiclevel of security precaution (for example, username and password) as opposed to multiplelevels of security. The following table gives an example of five different levels of access forremote user.

    Table 3: Remote Users Classification

    Remote Users Classification

    LEVEL TYPE OF ACCESS DESCRIPTION

    1 Email access A level 1 type of user will only require access to email from off-sitelocations.

    2 Email accessOn-line administrativeapplications (calendaring,timesheet apps, and so on.)

    A level 2 type of user will require access to email and other administrativeapplications; however, none of this information is sensitive or critical to theemployers core business.

    3 Email accessOn-line administrativeapplications (calendaring,timesheet apps, and so on.)File server access

    A level 3 type of user will require both level 1 and 2 types of informationand will require access to actual files and file servers in the internalnetwork. However, the files and/or servers are not considered to hold IP.

    4 Email accessOn-line administrative

    applications (calendaring,timesheet apps, and so on.)File server accessSensitive file servers

    A level 4 type of user will require all of the above and access to informationand/or servers that are sensitive and critical to the employers core busi-

    ness practices and strategies. A level 4 type of user will have access to thecompanys business goals and financial statement.

    5 Email accessOn-line administrativeapplications (calendaring,timesheet apps, and so on.)File server accessSensitive file serversCritical data stores

    A level 5 type of user will require all of the above and access to informationand/or servers that hold sensitive data stores that are critical to theemployers core product or service line. A level 5 type of user will haveaccess to source code files and other types of IP.

    http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/
  • 8/2/2019 Vsia Ip Protection Measurements

    23/42

    VSI Alliance (IPPWP3 1.0)

    Copyright 2002 by the VSI Alliance, Inc. 11All Rights Reserved. VSIA CONFIDENTIAL DOCUMENT

    Authentication

    External authentication needs to be multi-factored and controlled, with proper auditing inplace. Different levels of external authorization should be established and correlated to theclassification of the user. For example, a network administrator might need level 4, and aproject manager might only need level 2. After user classification is established, the ability togrant or deny individuals or departments can be determined. The classification factor of classesshould be based on desired access, job responsibility, and functional duties. For example, if auser needs to access source code information for a business partner network, the user will beclassified as level 4 and required to use the appropriate types of authentication. Depending onthe different levels of user classification, different levels of authentication would be required.The following table gives an example of possible classification types and authorizationrequirements.

    Table 4: Levels of Security Authentication

    Levels of Security Authentication

    LEVEL TYPE OF ACCESS AUTHORIZATION TYPES TYPES OF TYPICAL USERS

    1 Email access Username and password Contractors, guests, andother temporary positions

    2 Email accessOn-line administrative applications(calendaring, timesheet apps, and so on.)

    Username and password Sales, HR, finance

    3 Email accessOn-line administrative applications(calendaring, timesheet apps, and so on.)File server access

    Username and password,public/private keyauthentication, VPN (IPSEC)tunnels

    IT department,management network,sensitive subnets

    4 Email accessOn-line administrative applications(calendaring, timesheet apps, and so on.)File server accessSensitive file servers

    Username and password,public/private keyauthentication, VPN (IPSEC)tunnels, Secure ID token

    Executive positions andfinancial departments

    5 Email accessOn-line administrative applications(calendaring, timesheet apps, and so on.)File server accessSensitive file serversCritical data stores

    Username and password,public/private keyauthentication, VPN (IPSEC)tunnels, Secure ID token,one-time password usagesystem

    IP departments/engineersworking on chip design

    http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/
  • 8/2/2019 Vsia Ip Protection Measurements

    24/42

    VSI Alliance (IPPWP3 1.0)

    Copyright 2002 by the VSI Alliance, Inc. 12All Rights Reserved. VSIA CONFIDENTIAL DOCUMENT

    Remote Access

    Remote access for external untrusted sites, such as the Internet and business partner locations,needs to be easy and streamlined, without adding complex levels of security. Level 1 users (foremail) and level 2 users (for email and access to administrative applications such ascalendaring) can dial into networked devices that accept incoming connections on a regularphone line or Ethernet connection. This process can be accomplished with a variety of devices,such as the Cisco RADIUS server, Microsoft VPN (PPTP) server, and Sun MicrosystemsSunscreen server. The user is required to enter a username and password in order to accessemail. Levels 3 to 5 (which require access from regular file servers to sensitive data stores)should have a multi-factor authentication. The external user is required to have a regularusername and password to access email and calendaring applications, along with additionalpasswords, authentication keys, or SecureID or one-time passwords to access other devices indifferent parts of the internal network. Devices that are involved in these levels are SSHservers, VPN servers, RSA servers, and so on. These devices support all types of platforms(Microsoft Windows, Sun Solaris, and all types of Linux operating systems) that the end usermay be using. Additionally, all three of these further layers of authentication can be virtuallyinvisible or highly streamlined to the end user, thus hiding any complexity.

    In additional to SSH, VPN, and SecureID remote access methods, all level 3 to level 5 usersshould have a secured operating system from which the remote user can access the companyscritical resources. An insecure workstation combined with a very secure remote access solutioncreates a weak link in the network. An attacker could compromise a users workstation and usethe existing VPN or SSH connections to the corporate network to access information and stealor modify data. Since remote access methods usually subvert most firewalls, attackers targetthese attack methods. (More information on DSL and Cable home users is provided in theTransfer section.)

    Monitoring

    In most networks, information is passed from a variety of locations and in a variety of ways,

    both in the internal network and external network. With the increase of business partnernetworks and extranets, it is important to understand what is happening on a companysnetwork, especially in areas where external users may be allowed access. Monitoring, whetherby Intrusion Detection Systems (IDS), operating systems logs, or firewall logs, needs to be inplace and at appropriate levels. Appropriate logging and IDS devices allow an administrator tosee that a certain network is being attacked or that an external user just logged into the sourcecode database. Not only does this information provide real-time alerts to appropriateadministrators, but it also provides post-mortem understanding of a possible security event orsituation. The lack of IDS monitor or log collection may allow attackers to virtually gounnoticed for several weeks, or even months, if nothing traces unauthorized access orsuspicious use.

    A best practice for monitoring is to deploy a central log server in a given network, such as aSyslog server. A central log server can hold critical information from all types of devices in thenetwork, including firewalls, routers, Solaris systems, and Microsoft systems, allowing anadministrator to view and analyze log data from a central and convenient location.

    http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/
  • 8/2/2019 Vsia Ip Protection Measurements

    25/42

    VSI Alliance (IPPWP3 1.0)

    Copyright 2002 by the VSI Alliance, Inc. 13All Rights Reserved. VSIA CONFIDENTIAL DOCUMENT

    In addition to providing a central repository for analysis, a central log server also increasessecurity by moving critical log information off of regular systems and into a secured log server.If attackers compromises a machine, they will probably delete all log information immediately,in order to remove all traces of their activities. However, if all logs are exported to a securedcentral log server, the attacker would not be able to remove any traces, thus increasing thelikelihood of catching the incident and recovering a possible loss.

    Storage

    Thus far, we have discussed data as it is transferred through internal and external networks andhow to protect data over the wire. However, after the data reaches the disk, how secure is it?Lets say that all the protocols are secure, from SSH and SSL to IPSec, and now the data issitting on a physical disk drive; is it still susceptible to attacks? Data in storage is one of themost common perceptions of trust, meaning that security usually focuses on protocols andarchitecture, not the actual data on the disk. The data on the disk is often considered to be safe,since multiple firewalls and encryption are used on the network. However, the truth is that datain storage is exposed if an unauthorized person is able to worm their way onto the drive.

    The obvious solution is encryption of the data on the disk, but how does that affect thefunctionality of the network and the ability of employees to do their job without overbearingsecurity controls? The answer to that question is never easy. In fact, this issue is not usuallyaddressed because there is not a good solution that addresses all vulnerabilities. However, thesolution does not have to encompass everything, as long there is a solution that protects the datain storage more than in the file system permissions. Furthermore, the solution does not have tobe overly complicated, and products such as PGP (www.pgp.com), E4M (www.e4m.net), andProtegrity (www.protegrity.com), can help address many of these issues.

    The first step is similar to those discussed in prior sections. However, instead of simplyconsidering the ownership of the data, we need to consider the sensitivity of the data. Forexample, the core source code for Windows 2000 is important to protect; however, freelyavailable libraries and data files that the source code includes are not necessary to protect. It is

    very important to classify the proprietary data on the disk into categories that are appropriatefor the environment, and classification can be as simple as not sensitive, sensitive, and highlysensitive.

    The first step is for each organization to establish categories for data sensitivity. Differentlevels of sensitivity will determine the type of encryption to use or not to use on the disk. Core(kernel) source code data needs a higher level (level 1) than data for shared libraries (level 4).Furthermore, core source code data requires a high level of encryption on the disk, and shouldonly be accessible to core individuals that have a business requirement to access theinformation. Using the above scenario, data that is involved in the final design was actuallytaken from industry standards, so it requires low to no levels of encryption, and therefore, thedata can sit in the clear.

    http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/
  • 8/2/2019 Vsia Ip Protection Measurements

    26/42

    VSI Alliance (IPPWP3 1.0)

    Copyright 2002 by the VSI Alliance, Inc. 14All Rights Reserved. VSIA CONFIDENTIAL DOCUMENT

    Depending on the different levels of data sensitivity, different levels and types of encryptionare required. The following table gives an example of possible classification types andencryption requirements for a chip manufacturer.

    Table 5: Levels of Security Encryption

    Levels of Security Encryption

    LEVEL DESCRIPTION ENCRYPTION TYPES EXAMPLE TOOLS

    1 Free available data sets None N/A

    2 Propriety code for productsthat do not highly influencethe financial statements ofthe company

    Encryption of data in shared fi le systems

    Encrypted databases

    PGP, E4M

    Protegrity, Oracle 9i

    3 Propriety code for productswith highly bloodthirsty com-petitors

    Encryption of data in shared fi le systems

    Encryption of individual data sets

    Encrypted databases

    Encrypted email

    PGP, E4M

    PGP

    Protegrity, Oracle 9i

    PGP

    4 Core source code for allproducts

    Encrypted file system on all workstations

    Encryption of data in shared fi le systems

    Encryption of individual data sets

    Encrypted databases

    Encrypted email

    PGP, E4M

    PGP, E4M

    PGP

    Protegrity, Oracle 9i

    PGP

    http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/
  • 8/2/2019 Vsia Ip Protection Measurements

    27/42

    VSI Alliance (IPPWP3 1.0)

    Copyright 2002 by the VSI Alliance, Inc. 15All Rights Reserved. VSIA CONFIDENTIAL DOCUMENT

    File System Encryption

    File system encryption means having a data drive encrypted. This drive can hold multiple datasets, files, folders, binaries, C and C++ files, and so on. Whether this encrypted file system ison a local workstation or on shared resources, a proper username and password and/or a privatekey would be required to decrypt the drive to access the data. The following two examples

    show a publicly available tool for file system encryption and the Windows 2000 method of filelevel encryption (Encrypted File System [EFS]).

    Figure 3: EM4 File System Encryption - Example 1

    E4M mounts an entire encrypted file system with a valid password that cannot be viewed tounauthorized users.

    Figure 4: EM4 File System Encryption - Example 2

    http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/
  • 8/2/2019 Vsia Ip Protection Measurements

    28/42

    VSI Alliance (IPPWP3 1.0)

    Copyright 2002 by the VSI Alliance, Inc. 16All Rights Reserved. VSIA CONFIDENTIAL DOCUMENT

    The encrypted file system appears after successful authentication.

    Figure 5: EM4 File System Encryption - Example 3

    File or folder encryption can be used on Windows 2000 for both local and remote resources.

    Data Set Encryption

    Data set encryption involves encrypting individual files or datasets themselves. These files canrange from a C++ file to a JAVA library file that is propriety to the organization. Data setencryption is encrypted on an individual level, with each file requiring a username andpasswords for valid authentication. Below is PGP encryption for an individual file.

    Figure 6: PGP Encryption - Example 1

    The user selects which individuals are authorized to view the file.

    http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/
  • 8/2/2019 Vsia Ip Protection Measurements

    29/42

    VSI Alliance (IPPWP3 1.0)

    Copyright 2002 by the VSI Alliance, Inc. 17All Rights Reserved. VSIA CONFIDENTIAL DOCUMENT

    Figure 7: PGP Encryption - Example 2

    PGP encrypts the individual file.

    Figure 8: PGP Encryption - Example 3

    The encrypted file is created.

    http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/http://ip_whitepaper_rauchtobaker_28oct02_body.pdf/
  • 8/2/2019 Vsia Ip Protection Measurements

    30/42

    VSI Alliance (IPPWP3 1.0)

    Copyright 2002 by the VSI Alliance, Inc. 18All Rights Reserved. VSIA CONFIDENTIAL DOCUMENT

    Figure 9: PGP Encryption - Example 4

    A valid passphrase is required to decrypt the file for usage. Notice that only the authorized userwho was initially selected is able to attempt to decrypt and view the file.

    Database Encryption

    There is a lot of concern about the amount of encryption used in databases. Since most coredata to products and designs are in databases, such as Oracle, MS-SQL, or mySQL, databaseencryption is of primary concern. Database encryption provides a method for valid users toview only the materials they need to perform their business functions. With databaseencryption, if an unauthorized user is able to subvert the file system permission, a validpassphrase or private key is needed to view the data, or else the unauthorized user would justview encrypted garbage. This method protects against weak or non-exiting file permissions andallows all database information to be sitting on the disk in an encrypted format. Protegrity isone example of software that can be used for encryption on databases. Additionally, Oracle 9i(www.oracle.com) inherently provides database encryption with its software package.

    Email Encryption

    An email containing any amount of IP must be appropriately secured. Email protocols are inclear-text, and email systems are often popular targets. With todays ever-growing electroniccommerce, email is the prime source for communication. However, email has also become theprime source for the exchange of files, datasets, and code between co-workers or officelocations. With this trend, propriety information is being sent out of the company into remotemail