Data Sheet - STEALTHbits Technologies
Transcription
Data Sheet - STEALTHbits Technologies
NERC CIP Compliance with STEALTHbits Technologies North American Electric Reliability Corporation Critical Infrastructure Protection (NERC CIP) The North American Electric Reliability Corporation Critical Infrastructure Protection (NERC CIP) plan is fundamentally focused on the processes and management of IT infrastructure (NERC CIP specifically calls these “cyber assets”) that supports the business operation around the bulk electric system. The majority of the infrastructure needed to support the bulk electric system ecosystem is Internet Protocol “connected”; the standards provided by NERC CIP essentially gives the guidance to properly identify, manage, and secure (physical security and cyber security) these critical IT infrastructure assets. STEALTHbits’ Solutions for NERC CIP Compliance STEALTHbits Technologies offers multiple products that help fulfill NERC CIP requirements and augment required regulatory processes. The STEALTHbits product portfolio also verifies, on a constant basis, that many of the requirements are in place, configured properly, and operating as expected. Areas of concentration include Directory Service, Sensitive Data Discovery (Crypto and Information Protection), Active Directory Migration/Auditing, Auth Z Reporting, and Operational Health and Diagnostic Dashboards: • Directory Services: Monitoring, detailed activity, and locking of critical business assets utilizing Active Directory for Domain, Authentication, and Authorization services. • Sensitive Data Discovery (Crypto and Information Protection): Scan, discover, and identify where sensitive data resides to ensure proper security policies are deployed and enforced to protect critical and sensitive data/hosts. • Active Directory Migration/Auditing: Scan, discover, remediate, validate, attest, re-certify (complete governance lifecycle) critical IT infrastructure post an Active Directory migration effort (upgrade or consolidation of an Energy company). • Auth Z Reporting: Scan, discover, and determine what an authenticated user (or program) is allowed to do securely within the environment. • Operational Health & Diagnostic Dashboards: Deep insight providing operational metrics to determine core IT infrastructure health around your mission critical IT business services: e.g. authentication, authorization, communication, and security. Integration with Microsoft Forefront Identity Manager (FIM) Working in concert, Oxford Computer Group and STEALTHbits deliver an integrated solution for Identity and Access Management using Microsoft’s FIM that brings all of an organization’s unstructured data into scope. The vast majority of an organization’s data exists in the files people create every day doing their day to day tasks. By plugging STEALTHbits’ Data Access Governance capabilities into FIM, OCG allows an organization to control the access to this huge well of data that’s typically invisible to IAM programs. That makes FIM capable of mastering access to all your organization’s data. NERC CIP Compliance with STEALTHbits Technologies Product Architecture StealthINTERCEPT Agent(s) Active Directory Domain Controllers StealthAUDIT DB StealthINTERCEPT SA Job & Reporting Functions StealthINTERCEP T Policies NERC-CIP Data / Information Farms Access Information Center StealthAUDIT Management Platform (SMP) Domain Streaming Media Active Directory Secure Domain StealthSEEK Sensitive Data Discovery Platform NERC-CIP Content Applications NERC-CIP Operational Health and Diagnostic Dashboards Substation Apps Collaboration Applications NERC-CIP Critical File Servers Mobile Applications About STEALTHbits Technologies, Inc. STEALTHbits Technologies specializes in the management and security of unstructured data. STEALTHbits’ solutions bridge the gap between Active Directory and unstructured data repositories, providing a previously unavailable view of how access is being granted and who has access to critical unstructured data resources like File Systems and SharePoint. For more information, please visit us at: www.STEALTHbits.com ©2014 STEALTHBITS TECHNOLOGIES, INC. – ALL RIGHTS RESERVED| STEALTHbits is a registered trademark of STEALTHbits Technologies, Inc. All other product and company names are property of their respective owners. All rights reserved. DS-SA-0414