Data Sheet - STEALTHbits Technologies

Transcription

Data Sheet - STEALTHbits Technologies
NERC CIP Compliance with STEALTHbits Technologies
North American Electric Reliability Corporation Critical Infrastructure Protection (NERC CIP)
The North American Electric Reliability Corporation Critical Infrastructure Protection (NERC CIP) plan is fundamentally
focused on the processes and management of IT infrastructure (NERC CIP specifically calls these “cyber assets”) that
supports the business operation around the bulk electric system. The majority of the infrastructure needed to support
the bulk electric system ecosystem is Internet Protocol “connected”; the standards provided by NERC CIP essentially
gives the guidance to properly identify, manage, and secure (physical security and cyber security) these critical IT
infrastructure assets.
STEALTHbits’ Solutions for NERC CIP Compliance
STEALTHbits Technologies offers multiple products that help fulfill NERC CIP requirements and augment required
regulatory processes. The STEALTHbits product portfolio also verifies, on a constant basis, that many of the
requirements are in place, configured properly, and operating as expected. Areas of concentration include Directory
Service, Sensitive Data Discovery (Crypto and Information Protection), Active Directory Migration/Auditing, Auth Z
Reporting, and Operational Health and Diagnostic Dashboards:
•
Directory Services: Monitoring, detailed activity, and locking of critical business assets utilizing Active
Directory for Domain, Authentication, and Authorization services.
•
Sensitive Data Discovery (Crypto and Information Protection): Scan, discover, and identify
where sensitive data resides to ensure proper security policies are deployed and enforced to protect critical
and sensitive data/hosts.
•
Active Directory Migration/Auditing: Scan, discover, remediate, validate, attest, re-certify (complete
governance lifecycle) critical IT infrastructure post an Active Directory migration effort (upgrade or
consolidation of an Energy company).
•
Auth Z Reporting: Scan, discover, and determine what an authenticated user (or program) is allowed to do
securely within the environment.
•
Operational Health & Diagnostic Dashboards: Deep insight providing operational metrics to
determine core IT infrastructure health around your mission critical IT business services: e.g. authentication,
authorization, communication, and security.
Integration with Microsoft Forefront Identity Manager (FIM)
Working in concert, Oxford Computer Group and STEALTHbits deliver an integrated solution for Identity and Access
Management using Microsoft’s FIM that brings all of an organization’s unstructured data into scope. The vast majority
of an organization’s data exists in the files people create every day doing their day to day tasks. By plugging
STEALTHbits’ Data Access Governance capabilities into FIM, OCG allows an organization to control the access to this
huge well of data that’s typically invisible to IAM programs. That makes FIM capable of mastering access to all your
organization’s data.
NERC CIP Compliance with STEALTHbits Technologies
Product Architecture
StealthINTERCEPT
Agent(s)
Active Directory
Domain Controllers
StealthAUDIT DB
StealthINTERCEPT
SA Job & Reporting Functions
StealthINTERCEP T
Policies
NERC-CIP Data / Information Farms
Access Information Center
StealthAUDIT Management Platform (SMP)
Domain
Streaming Media
Active Directory
Secure Domain
StealthSEEK
Sensitive Data Discovery Platform
NERC-CIP
Content Applications
NERC-CIP Operational Health and Diagnostic Dashboards
Substation Apps
Collaboration Applications
NERC-CIP Critical
File Servers
Mobile Applications
About STEALTHbits Technologies, Inc.
STEALTHbits Technologies specializes in the management and security of unstructured data. STEALTHbits’ solutions
bridge the gap between Active Directory and unstructured data repositories, providing a previously unavailable view of
how access is being granted and who has access to critical unstructured data resources like File Systems and
SharePoint.
For more information, please visit us at:
www.STEALTHbits.com
©2014 STEALTHBITS TECHNOLOGIES, INC. – ALL RIGHTS RESERVED| STEALTHbits is a registered trademark of STEALTHbits Technologies,
Inc. All other product and company names are property of their respective owners. All rights reserved. DS-SA-0414