Enterprise GIS Security Strategy Michael E Young Chief

  • Slides: 70
Download presentation
Enterprise GIS: Security Strategy Michael E. Young Chief Product Security Officer Matt Lorrain Security

Enterprise GIS: Security Strategy Michael E. Young Chief Product Security Officer Matt Lorrain Security Architect

Agenda • Introduction • Trends • Strategy • Mechanisms • Server • Mobile •

Agenda • Introduction • Trends • Strategy • Mechanisms • Server • Mobile • Cloud • Compliance

Introduction What is a secure GIS?

Introduction What is a secure GIS?

Introduction What is “The” Answer? Th ility Impact rab rea lne t Vu Risk

Introduction What is “The” Answer? Th ility Impact rab rea lne t Vu Risk

Introduction Where are the vulnerabilities? *SANS Relative Vulnerabilities Core network component vulnerabilities were exposed

Introduction Where are the vulnerabilities? *SANS Relative Vulnerabilities Core network component vulnerabilities were exposed last year, but application risks are still king

Current Real World Scenarios & Trends Michael Young

Current Real World Scenarios & Trends Michael Young

Trends Web Application Attacks *Verizon 2015 DBIR

Trends Web Application Attacks *Verizon 2015 DBIR

Trends Mobile attacks • Number of mobile devices infected still relatively small • 96%

Trends Mobile attacks • Number of mobile devices infected still relatively small • 96% targeted against Android platform • Mobile malware short lived - • Mobile SDK’s being attacked - • Piggybacks popular apps Ensure apps built with latest SDK’s What can help? - Enterprise Mobility Management enables control and visibility * Verizon 2015 DBIR

Trends by Industry • Frequency of incidents by pattern and industry • Identify hot

Trends by Industry • Frequency of incidents by pattern and industry • Identify hot spots for your specific industry - Prioritize security initiatives to mitigate against common threats * Verizon 2015 DBIR

Real-world security scenarios Disaster communications modified • • Scenario - Organization utilizes cloud based

Real-world security scenarios Disaster communications modified • • Scenario - Organization utilizes cloud based services for disseminating disaster communications - Required easy updates from home and at work - Drove allowing public access to modify service information Lesson learned - Enforce strong governance processes for web publication - Don’t allow anonymous users to modify web service content - Minimize or eliminate “temporary” modification rights of anonymous users - If web services are exposed to the internet, just providing security at the application level does not prevent direct service access Lack of strong governance leads to unexpected consequences

Real-world security scenarios Using same username and password between systems leads to compromise •

Real-world security scenarios Using same username and password between systems leads to compromise • • Scenario - Hackers used a third-party vendor’s user name and password to enter network - Hackers managed to elevate rights and deploy malware on systems - Result - 56 million credit and debit cards compromised - 53 million email addresses disclosed Lessons learned - Credential management and high-level of trust of “internal” users - Use an Identity Provider with SAML 2. 0 for accessing cloud-based applications - Enforce 2 -factor authentication – At a minimum administrators should do this

Real-World Security Scenarios QUIZ – When was the last Arc. GIS Security patch released?

Real-World Security Scenarios QUIZ – When was the last Arc. GIS Security patch released? • Hint – The Trust. Arc. GIS. com site will always have this answer handy… 99. 9% of vulnerabilities are exploited more than a year after being released

Trends Strategic Shifts in Security Priorities for 2015 and Beyond • Identity management priority

Trends Strategic Shifts in Security Priorities for 2015 and Beyond • Identity management priority increasing as security focus moves from network to data level • Advanced Persistent Threats driving shift from Protect to Detect • Encryption of Internet traffic via SSL v 3 broken – Ensuring TLS utilized is necessary • Password protection is broken – Stronger mechanisms required such as 2 -factor auth • Customers balancing security gateways for mobile solutions vs. VPN • Patching beyond Operating systems critical • End-of-life OS builds with XP and now Server 2003 present significant risk

Strategy Michael Young

Strategy Michael Young

Strategy A better answer • Identify your security needs - • • Assess your

Strategy A better answer • Identify your security needs - • • Assess your environment - Datasets, systems, users - Data categorization and sensitivity - Understand your industry attacker motivation Understand security options - Trust. arcgis. com - Enterprise-wide security mechanisms - Application specific options Implement security as a business enabler - Improve appropriate availability of information - Safeguards to prevent attackers, not employees

Strategy Enterprise GIS Security Strategy Security Risk Management Process Diagram - Microsoft

Strategy Enterprise GIS Security Strategy Security Risk Management Process Diagram - Microsoft

Strategy Evolution of Esri Products & Services Enterprise Solution Product Isolated Systems Integrated Systems

Strategy Evolution of Esri Products & Services Enterprise Solution Product Isolated Systems Integrated Systems Software as a Service 3 rd Party Security Embedded Security Managed Security

Strategy Esri Products and Solutions • • Secure Products - Trusted geospatial services -

Strategy Esri Products and Solutions • • Secure Products - Trusted geospatial services - Individual to organizations - 3 rd party assessments Secure Platform Management - • Backed by Certifications / Compliance Secure Enterprise Guidance - Trust. Arc. GIS. com site - Online Help Arc. GIS

Strategy Co nfi de nti Availability rity CIA Security Triad eg Int ali ty

Strategy Co nfi de nti Availability rity CIA Security Triad eg Int ali ty Security Principles

Strategy Defense in Depth Authentication • More layers does NOT guarantee more security Authorization

Strategy Defense in Depth Authentication • More layers does NOT guarantee more security Authorization • Understand how layers/technologies integrate • Simplify • Balance People, Technology, and Operations Filters Encryption Logging/Auditing • Holistic approach to security

Mechanisms Esri UC 2014 | Technical Workshop |

Mechanisms Esri UC 2014 | Technical Workshop |

Mechanisms Authorization Authentication Filters Encryption Logging/Auditing

Mechanisms Authorization Authentication Filters Encryption Logging/Auditing

Mechanisms Users & Authentication • User Store Options - Built-in user store - -

Mechanisms Users & Authentication • User Store Options - Built-in user store - - LDAP / Active Directory • Authentication Options - Built-in Token Service - - Server, Portal, Arc. GIS online Web-tier (IIS/Apache) w/ Web Adaptor - Windows Integrated Auth, PKI, Digest… Identity Provider (Id. P) / Enterprise Logins - Arc. GIS Server patterns - Server-tier Auth w/ Built-in users - Server-tier Auth w/ Enterprise Users - Web-tier Auth w/ Enterprise Users Server, Portal, Arc. GIS Online Enterprise user store - • • SAML 2. 0 for Arc. GIS Online & Portal • Portal for Arc. GIS patterns - Portal-tier Auth w/ Built-in users - Portal-tier Auth w/ Enterprise users - Web-tier Auth w/ Enterprise users - SAML 2. 0 Auth w/ Enterprise Users Arc. GIS Online patterns - Arc. GIS Online Auth w/ Built-in users - SAML 2. 0 Auth w/ Enterprise users

Mechanisms Authorization – Role-Based Access Control • • • Out-of-box roles (level of permission)

Mechanisms Authorization – Role-Based Access Control • • • Out-of-box roles (level of permission) - Administrators - Publishers - Users - Custom – Only for Portal for Arc. GIS & Arc. GIS Online Arc. GIS for Server – Web service authorization set by pub/admin - Assign access with Arc. GIS Manager - Service Level Authorization across web interfaces - Services grouped in folders utilizing inheritance Portal for Arc. GIS – Item authorization set by item owner - Web Map – Layers secured independently - Packages & Data – Allow downloading - Application – Allows opening app

Mechanisms Authorization – Extending with 3 rd Party components • Web services - Conterra’s

Mechanisms Authorization – Extending with 3 rd Party components • Web services - Conterra’s Security Manager (more granular) - • RDBMS - Row Level or Feature Class Level - Versioning with Row Level degrades performance - • Layer and attribute level security Alternative – SDE Views URL Based - Web Server filtering - Security application gateways and intercepts

Mechanisms Filters – 3 rd Party Options • Firewalls - Host-based - Network-based •

Mechanisms Filters – 3 rd Party Options • Firewalls - Host-based - Network-based • Reverse Proxy • Web Application Firewall - Open Source option Mod. Security • Anti-Virus Software • Intrusion Detection / Prevention Systems • Limit applications able to access geodatabase

Internet Mechanisms Filters - Web Application Firewall (WAF) 443 • Implemented in DMZ •

Internet Mechanisms Filters - Web Application Firewall (WAF) 443 • Implemented in DMZ • Protection from web-based attacks • Monitors all incoming traffic at the application layer • Protection for public facing applications • Can be part of a security gateway - SSL Certificates - Load Balancer Security Gateway WAF, SSL Accel, LB DMZ Web servers Arc. GIS servers Internal Infrastructure

Mechanisms Encryption – 3 rd Party Options • Network - IPSec (VPN, Internal Systems)

Mechanisms Encryption – 3 rd Party Options • Network - IPSec (VPN, Internal Systems) - SSL/TLS (Internal and External System) - Cloud Encryption Gateways - • • Only encrypted datasets sent to cloud File Based - Operating System – Bit. Locker - Geo. Spatially enabled PDF’s combined with Certificates - Hardware (Disk) RDBMS - Transparent Data Encryption - Low Cost Portable Solution - SQL Express w/TDE

Mechanisms Logging/Auditing • Esri COTS - Geodatabase history - - Arc. GIS Workflow Manager

Mechanisms Logging/Auditing • Esri COTS - Geodatabase history - - Arc. GIS Workflow Manager - - Track Feature based activities Arc. GIS Server 10+ Logging - • May be utilized for tracking changes “User” tag tracks user requests 3 rd Party Web Server, RDBMS, OS, Firewall - Consolidate with a SIEM - • Geospatial service monitors Esri – System Monitor - Vestra – Geo. Systems Monitor - Geocortex Optimizer -

Mechanisms GIS monitoring with System Monitor Network Hardware Web Server • Proactive • Integrated

Mechanisms GIS monitoring with System Monitor Network Hardware Web Server • Proactive • Integrated - • End-to-End - • All tier monitoring Continuous - • Dashboards across all tiers %Coverage provided Extendable - Custom queries Arc. GIS Server Geodatabase RDBMS

Arc. GIS Server Matt Lorrain Esri UC 2014 | Technical Workshop |

Arc. GIS Server Matt Lorrain Esri UC 2014 | Technical Workshop |

Arc. GIS Server 10. 3 Enhancements • Arc. GIS Server Manager - • New

Arc. GIS Server 10. 3 Enhancements • Arc. GIS Server Manager - • New dashboard for administrators Portal for Arc. GIS extension is included with Arc. GIS for Server Standard and Advanced licenses - Support for SAML 2. 0 authentication - Management of group membership based on an enterprise identity store - Custom roles to better control privileges of users - Activity Dashboard to understand metrics for your portal - More streamlined approach to configuring a high-availability portal configuration - As of 10. 3. 1 - Query and view portal logs using Portal Directory for identifying errors, issues or troubleshooting.

Arc. GIS Server Desktop, Web, and Mobile Clients Single Arc. GIS Server machine Desktop,

Arc. GIS Server Desktop, Web, and Mobile Clients Single Arc. GIS Server machine Desktop, Web, and Mobile Clients 80/443 6080/6443 Site Administrators Connect to Manager GIS server, Data, Server directories, Configuration Store Reverse Proxy Server 6080/6443 Site Administrators Connect to Manager GIS server, Data, Server directories, Configuration Store Front-ending GIS Server with Reverse Proxy or Web Adapter

Arc. GIS Server HA - Sites independent of each other • Active-active configuration is

Arc. GIS Server HA - Sites independent of each other • Active-active configuration is shown - • • Active-passive is also an option Separate configuration stores and management - • Desktop, Web, and Mobile Clients Network Load Balancer (NLB) Scripts can be used to synchronize 80 80 6080 Cached map service for better performance Load balancer to distribute load Site Administrators Connect to Manager Web Adaptors (optional) Arc. GIS Server site Site Administrators Connect to Manager Server directories, Configuration Store (duplicated between sites)

Desktop, Web, and Mobile Clients Arc. GIS Server HA – Shared configuration store •

Desktop, Web, and Mobile Clients Arc. GIS Server HA – Shared configuration store • Web Adaptor will correct if server fails • Network Load Balancer (NLB) 80 Config change could affect whole site - 6080 Example: publishing a service 80 6080 Web Adaptors GIS servers Site Administrators Connect to Manager • Test configuration changes Data server, Data (enterprise geodatabase), Server directories, Configuration Store

Desktop, Web, and Mobile Clients Arc. GIS Server HA – Clusters of Dedicated Services

Desktop, Web, and Mobile Clients Arc. GIS Server HA – Clusters of Dedicated Services • Shared configuration store • Server clusters - Network Load Balancer (NLB) 80 80 Web Adaptors (optional) Perform same set of functions GIS servers • Cluster A Example - Cluster A handles geoprocessing services Cluster B handles less intensive services 6080 Cluster B 6080 Site Administrators Connect to Manager Data server, Data (enterprise geodatabase), Server directories, Configuration Store 6080

Enterprise deployment Real Permutations Public Business Partner 1 Private Iaa. S Internal Portal Internal

Enterprise deployment Real Permutations Public Business Partner 1 Private Iaa. S Internal Portal Internal AGS Filtered Content External AGS Business Partner 2 Arc. GIS Online File Geodatabase Database Public Iaa. S Enterprise Business Field Worker

WAF, SSL Accel Load Balancer Arc. GIS Server Enterprise Deployment Port: 443 Port: 80

WAF, SSL Accel Load Balancer Arc. GIS Server Enterprise Deployment Port: 443 Port: 80 IIS/Java Web Server Web Adaptor ADFS Proxy DMZ Auth Web Server Supporting Infrastructure 443 Internet Port: 6080 Arc. GIS for Server GIS Services Web Apps GIS Server B Public Web Server Arc. GIS Site Network Load Balancing ADFS / SAML 2. 0 Port: 80 IIS/Java Web Server Web Apps AD/ LDAP Web Adaptor Web Apps Web Server B Web Server A HA NAS Config Store Clustered Port: 6080 HA DB 1 HA DB 2 SQL Arc. GIS for Server GIS Services GIS Server A Web Adaptor Round-Robin Server Request Load Balancing Directories Port: 6080 GIS Services Arc. GIS for Server GIS Server B FGDB

Arc. GIS Server Implementation Guidance Don’t expose Server Manager or Admin interfaces to public

Arc. GIS Server Implementation Guidance Don’t expose Server Manager or Admin interfaces to public • Disable Services Directory • Disable Service Query Operation (as feasible) • Limit utilization of commercial databases under website - File Geo. Database can be a useful intermediary • Require authentication to services • Deploy Arc. GIS Server(s) to DMZ if external users require access - • One-way replication from enterprise database Restrict cross-domain requests - Attack surface over time Attack surface • Implement a whitelist of trusted domains for communications Time

Mobile Matt Lorrain Esri UC 2014 | Technical Workshop |

Mobile Matt Lorrain Esri UC 2014 | Technical Workshop |

Mobile What are the mobile concerns? *OWASP Top Ten Mobile: https: //www. owasp. org/index.

Mobile What are the mobile concerns? *OWASP Top Ten Mobile: https: //www. owasp. org/index. php/Projects/OWASP_Mobile_Security_Project_-_Top_Ten_Mobile_Risks

Mobile Security Touch Points Server authentication Communication SDE permissions Device access Storage Service authorization

Mobile Security Touch Points Server authentication Communication SDE permissions Device access Storage Service authorization Project access Data access

Mobile Challenges • Users are beyond corporate firewall - To VPN or not to

Mobile Challenges • Users are beyond corporate firewall - To VPN or not to VPN? • Authentication/Authorization challenges • Disconnected editing • Management of mobile devices - Enterprise Mobility Management is the answer! - Mobile Device Management - Mobile Application Management - Security Gateways - Examples: Mobile. Iron, Maa. S 360, Airwatch, and many more…

Mobile Potential Access Patterns DMZ Web Adaptor IIS Arc. GIS Portal VPN Arc. GIS

Mobile Potential Access Patterns DMZ Web Adaptor IIS Arc. GIS Portal VPN Arc. GIS Server Security Gateway NAS Shared config store SQL Server AD FS 2. 0 External facing GIS Enterprise AD Arc. GIS Desktop

Mobile Implementation Guidance • Encrypt data-in-transit (HTTPS) via TLS • Encrypt data-at-rest • Segmentation

Mobile Implementation Guidance • Encrypt data-in-transit (HTTPS) via TLS • Encrypt data-at-rest • Segmentation - Use Arc. GIS Online, Cloud, or DMZ systems to disseminate public-level data • Perform Authentication/Authorization • Use an Enterprise Mobility Management (EMM) solution - Secure e-mail - Enforce encryption - App distribution - Remote wipe - Control 3 rd party apps & jailbreak detection

Cloud Matt Lorrain Esri UC 2014 | Technical Workshop |

Cloud Matt Lorrain Esri UC 2014 | Technical Workshop |

Cloud • Non-Cloud Traditional systems infrastructure deployment - Portal for Arc. GIS & Arc.

Cloud • Non-Cloud Traditional systems infrastructure deployment - Portal for Arc. GIS & Arc. GIS Server - • Iaa. S Portal for Arc. GIS & Arc. GIS Server - Some Citrix / Desktop - • Saa. S Arc. GIS Online - Business Analyst Online Customer Responsible End to End Decreasing Customer Responsibility Service Models - Customer Responsible For Application Settings

Cloud Deployment Models Online Intranet Portal Server Public On- Premises Hybrid 1 Online Read-only

Cloud Deployment Models Online Intranet Portal Server Public On- Premises Hybrid 1 Online Read-only Server Basemaps Intranet Portal Hybrid 2 Cloud Server On-Premises + On-premise

Cloud Management Models • Self-Managed Your responsibility for managing Iaa. S deployment security -

Cloud Management Models • Self-Managed Your responsibility for managing Iaa. S deployment security - Security measures discussed later - • Provider Managed Esri Managed Services (Standard Offering) - New Esri Managed Cloud Services (EMCS) Advanced Plus - - Fed. RAMP Moderate environment

Cloud Iaa. S – Amazon Web Services • 8 Security Areas to Address -

Cloud Iaa. S – Amazon Web Services • 8 Security Areas to Address - Virtual Private Cloud (VPC) - Identity & Access Management (IAM) - Administrator gateway instance(s) (Bastion) - Reduce attack surface (Hardening) - Security Information Event Management (SIEM) - Patch management (SCCM) - Centralized authentication/authorization - Web application firewall (WAF)

Cloud EMCS Advanced Plus Offering Customer Instances ü Arc. GIS ü Portal for Server

Cloud EMCS Advanced Plus Offering Customer Instances ü Arc. GIS ü Portal for Server for Arc. GIS Customer Databases Arc. GIS Online Security Infrastructure ü Centralized ü Key Management ü Network End Users Authentication (2 -factor) ü Virtual Address Translation Private Cloud (Segmentation) ü Redundancy (multiple data centers) ü IDS/SIEM/WAF ü Logging Esri Cloud GIS Administrator Arc. GIS Online front-end (Low) Managed Services back-end (Mod)

Cloud Hybrid deployment combinations Users Anonymous Access Apps Arc. GIS Online On-Premises • •

Cloud Hybrid deployment combinations Users Anonymous Access Apps Arc. GIS Online On-Premises • • • Ready in months/years Behind your firewall You manage & certify • Esri Managed Cloud Services • Ready in days • All Arc. GIS capabilities at your disposal in the cloud • Dedicated services • Fed. RAMP Moderate • • • Ready in minutes Centralized geo discovery Segment anonymous access from your systems FISMA Low . . . All models can be combined or separate

Cloud Hybrid Arc. GIS Online w 3. R est u q e ie to

Cloud Hybrid Arc. GIS Online w 3. R est u q e ie to V Group “Team. Green” Users 1. Register Services On-Premises Arc. GIS Server AGOL Org Hosted Services, Content Public Dataset Storage 4. Access Service 2. Enterprise Login (SAML 2. 0) User Repository AD / LDAP Arc. GIS Org Accounts External Accounts Segment sensitive data internally and public data in cloud

Cloud Hybrid – Data sources • Where are internal and cloud datasets combined? At

Cloud Hybrid – Data sources • Where are internal and cloud datasets combined? At the browser - The browser makes separate requests for information to multiple sources and does a “mash-up” - Token security with SSL or even a VPN connection could be used between the device browser and on-premises system - On-Premises Operational Layer Service https: //Your. Server. com/arcgis/rest. . . Cloud Basemap Service Arc. GIS Online http: //services. arcgisonline. com. . . Browser Combines Layers

Cloud Arc. GIS Online – Implementation Guidance • Require HTTPS • Do not allow

Cloud Arc. GIS Online – Implementation Guidance • Require HTTPS • Do not allow anonymous access • Allow only standard SQL queries • Restrict members for sharing outside of organization (as feasible) • Use enterprise logins with SAML 2. 0 with existing Identity Provider (Id. P) If unable, use a strong password policy (configurable) in Arc. GIS Online - Enable multi-factor authentication for users - • Use multifactor for admin accounts • Use a least-privilege model for roles and permissions - Custom roles

Compliance Esri UC 2014 | Technical Workshop |

Compliance Esri UC 2014 | Technical Workshop |

Compliance Arc. GIS Platform Security • Esri Corporate • Cloud Infrastructure Providers • Products

Compliance Arc. GIS Platform Security • Esri Corporate • Cloud Infrastructure Providers • Products and Services • Solution Guidance

Compliance Extensive security compliance history FISMA Law Established 2002… 2005… Esri GOS 2 FISMA

Compliance Extensive security compliance history FISMA Law Established 2002… 2005… Esri GOS 2 FISMA Authorization First Fed. RAMP Authorization Fed. RAMP Announced 2010 2011 Esri Participates in First Cloud Computing Forum 2012 Esri Hosts Federal Cloud Computing Security Workshop 2013 OMB Fed. RAMP Mandate 2014 Arc. GIS Online FISMA Authorization Planned Arc. GIS Online Fed. RAMP Authorization 2015 2016 EMCS Fed. RAMP Compliant Esri has actively participated in hosting and advancing secure compliant solutions for over a decade

Compliance Esri Corporate • ISO 27001 - • Esri’s Corporate Security Charter Privacy Assurance

Compliance Esri Corporate • ISO 27001 - • Esri’s Corporate Security Charter Privacy Assurance - US EU/Swiss Safe. Harbor self-certified - TRUSTed cloud certified

Compliance Cloud Infrastructure Providers • Arc. GIS Online Utilizes World-Class Cloud Infrastructure Providers -

Compliance Cloud Infrastructure Providers • Arc. GIS Online Utilizes World-Class Cloud Infrastructure Providers - Microsoft Azure - Amazon Web Services Cloud Infrastructure Security Compliance

Compliance Products and Services • • Arc. GIS Online - FISMA Low Authority to

Compliance Products and Services • • Arc. GIS Online - FISMA Low Authority to Operate by USDA (Jun 2014) - Fed. RAMP - Upcoming Esri Managed Cloud Services (EMCS) - • Arc. GIS Server - • Fed. RAMP Moderate (Jan 2015) DISA STIG – (Expected 2015) Arc. GIS Desktop - FDCC (versions 9. 3 -10) - USGCB (versions 10. 1+) - Arc. GIS Pro (Expected 2015)

Compliance Solution Level • • • Geospatial Deployment Patterns to meet stringent security standards

Compliance Solution Level • • • Geospatial Deployment Patterns to meet stringent security standards - Hybrid deployments - On-premise deployments Supplemented with 3 rd party security components - Enterprise Identity management integration - CA Site. Minder (Complete) - Geospatial security constraints – Con. Terra (Started) - Mobile security gateway integration – (Upcoming) Upcoming best practice security compliance alignment guidance - CJIS – Law Enforcement (Started) - STIGs – Defense (Started) - HIPAA – Healthcare (Future)

Compliance Arc. GIS Online Assurance Layers Customer Web App Consumption Arc. GIS Management Esri

Compliance Arc. GIS Online Assurance Layers Customer Web App Consumption Arc. GIS Management Esri AGOL Saa. S FISMA Low (USDA) Safe. Harbor (TRUSTe) Web Server & DB software Operating system Instance Security Management Cloud Provider ISO 27001 SSAE 16 Fed. RAMP Mod Cloud Providers Hypervisor Physical

Compliance Deployment Model Responsibility

Compliance Deployment Model Responsibility

Compliance Cloud Roadmap 2015 2014 Arc. GIS Online FISMA Low Managed Services (EMCS) Fed.

Compliance Cloud Roadmap 2015 2014 Arc. GIS Online FISMA Low Managed Services (EMCS) Fed. RAMP Mod Upcoming Arc. GIS Online Fed. RAMP

Summary Esri UC 2014 | Technical Workshop |

Summary Esri UC 2014 | Technical Workshop |

Summary • Security demands are rapidly evolving Prioritize efforts accord to your industry and

Summary • Security demands are rapidly evolving Prioritize efforts accord to your industry and needs - Don’t just add components, simplified Defense In Depth approach - • Secure Best Practice Guidance is Available Check out the Arc. GIS Trust Site! - Security Architecture Workshop - - Secure. Software. Services@esri. com

Thank you… • Please fill out the session survey in your mobile app •

Thank you… • Please fill out the session survey in your mobile app • In the agenda, click on the title of this session - Enterprise GIS: Security Strategy • Click “Technical Workshop Survey” • Answer a few short questions and enter any comments

Want to Learn More? • Arc. GIS Online: A Security, Privacy, and Compliance Overview

Want to Learn More? • Arc. GIS Online: A Security, Privacy, and Compliance Overview - Wed 10: 15 am Room 17 B • Arc. GIS Server & Portal for Arc. GIS: An Introduction to Security - Tues 3: 15 pm Room 4, Thurs 1: 30 pm Room 4 • Arc. GIS Server: Advanced Security - Wed 3: !5 pm Room 3, Thurs Room 4 • Best Practices in Setting up Secured Services in Arc. GIS for Server - • Building Security into your System - • Tues 5: 30 pm Demo Theater 14 Tues 4: 30 pm Implementation Center Oauth 2 and Authentication in Arc. GIS Online Demystified - Tues 2: 30 pm Demo Theater 11 • Using Enterprise Logins for Portal in Arc. GIS via SAML - Tues 5: 30 pm, Wed 2: 30 pm Demo Theater 7 Esri Security Standards & Architecture Team Secure. Software. Services@Esri. com