SlideShare ist ein Scribd-Unternehmen logo
1 von 34
Windows Server 2012
Dynamic Access Control


David Tesar
Technical Evangelist, Microsoft
http://about.me/davidtesar



Level: 300
Session objectives

     Understand the new Dynamic Access Control (DAC) capabilities
      built into Windows Server 2012

     Learn how to leverage DAC for data compliance and leakage
      prevention
Data management landscape




   Growth of                                       Budget
 users and data                                  Constraints
                  Distributed   Regulatory and
                  computing        Business
                                 Compliance
       ?
                                   ?
Dynamic Access Control Building
Blocks
                           • ACEs with conditions, including Boolean logic and relative
  Expression-Based ACEs      operators


  User and Device Claims   • User and computer attributes can be used in ACEs


                           • File classifications can be used in authorization decisions
       Classification      • Continuous automatic classification
      Enhancements         • Automatic RMS encryption based on classification

    Central Access and     • Central authorization/audit rules defined in AD and applied
      Audit Policies         across multiple file servers


      Access Denied        • Allow users to request access
        Assistance         • Provide detailed troubleshooting info to admins
Expression-Based ACEs

     Pre-2012: ’OR’ of groups only

     • Consider 100 countries * 10 divisions * 5 Projects
     • 5,000 total groups to represent every combination:
       • ProjectZ UK Engineering Users
       • ProjectZ Canada Engineering Users [etc…]

     Windows Server 2012: ‘AND’ in expressions

     • ACE conditions allow multiple groups with Boolean logic
       • Example: Allow modify IF MemberOf(ProjectZ) AND MemberOf(UK) AND
        MemberOf(Engineering)
     • ~60 groups instead of 5,000

     Windows Server 2012: with Central Access Policies & Classification

     • 3 User Claims
Conditional Expression Operators

  Logical
     – AND
     – OR
     – NOT
     – Exists (resource properties)




     – See MS-DTYP for processing rules
Expression-based access policy

                             AD DS                                 File Server



      User claims                         Device claims                   Resource properties
 User.Department = Finance           Device.Department = Finance       Resource.Department = Finance
   User.Clearance = High               Device.Managed = True              Resource.Impact = High




                                      ACCESS POLICY
                                Applies to: Resource.Impact = High
Allow | Read,Write | if (User.Department = Resource.Department) AND (Device.Managed = True)

                                                                                                       7
User and Device Claims
    Pre-2012: Security Principals Only

    •   Restricted to making policy decisions based on the user’s group memberships
    •   Shadow groups are often created to reflect existing attributes as groups
    •   Groups have rules around who can be members of which types of groups
    •   No way to transform groups across AD trust boundaries
    •   No way to control access based on characteristics of user’s device

    Windows Server 2012: Security Principals, User Claims, Device Claims

    •   Selected AD user/computer attributes are included in the security token
    •   Claims can be used directly in file server permissions
    •   Claims are consistently issued to all users in a forest
    •   Claims can be transformed across trust boundaries
    •   Enables newer types of policies that weren’t possible before:
        • Example: Allow Write if User.MemberOf(Finance) and User.EmployeeType=FullTime and
         Device.Managed=True
Claim type
                                            Display Name
                                               Source
                                          Suggested values
       Kerberos Ticket                       Value type
       ContosoAlice
User      Groups:….
          Claims: Title=SDE




                                 NT Access Token
                                     ContosoAlice
                              User     Groups:….
                                       Claims: Title=SDE
Let’s review
Data classification – identifying data
              Classify data based on location inheritance
              Classify data automatically
              Data Classification Toolkit
Business Needs →
   Storage Results
                             Need per-project
                             share

Business needs can start     Ensure that
simple                       business-secret
But adding policies can      files do not leak
                             out
fragment the storage
infrastructure

Complexity increases the     Retain contract
chances of ineffective       data for 10 years
policies and prevents
insight into business data
Lack of insight into your data means that you
cannot manage your costs and risks
Manage Data Based On
Business Value

              Classify
               Data


                         Apply policy
                         according to
                         classification
How can you classify information?


  Location based    • Based on the Folder the file is created in
                    • Driven by “Business owner” that sets up the folder



                    • Specified by Information Worker
      Manual        • Templates of documents can be used for default settings
                    • Data entry applications that marks files created by users



    Automatic       • Automatic classification based on content and other characteristics

   classification   • Great solution for classifying large amounts of existing information




    Application     • Line of business applications that store information on file servers
                    • Data management applications
Summary – Classify and Apply policy
Area                                  Windows Server 2008 R2   Windows Server 2012/Windows
                                                               8
Property definition                   Local                    Global to the forest (including default
                                                               recommended definitions)
Who can classify files                Administrator only       Administrators, Business owners and
                                                               users
Manual classification                 No UI                    Classification UI added in explorer

What can be classified                Files                    Folders and Files

When is the classification and file   Schedule                 Schedule and Continuous
management tasks done
In box classification mechanisms      Content, location        Content (improved), location,
                                                               PowerShell
In box file management tasks          Expiration, custom       Expiration, custom, RMS
What happens when data
 leaves the file server?
Automatic Rights Management
encryption
             Automatically protect your sensitive information

             Adhere to compliance regulations that require
              data encryption
How do I deploy Expression
  based Access Control
   across my servers?
Central Access Policy
                                   Active Directory

                         1                                            2                                   3
      Define Central Access Rules (CARs)            Define Central Access Policies (CAPs)   Apply CAPs on File Servers
               High Impact Data rule
                                                                                               Corporate file servers
Applies To: Resource.Impact == High                       Standard organization
Access conditions:                                        policy
User.Clearance = High AND Device.IsManaged = True         High Impact rule
                                                          Personal Information rule

            Personal Information rule                     Finance department
Applies To: Resource.PII == True                          policy
Access conditions:                                        High Impact Data rule                         User folders
 Allow MemberOf( PIIAdministrators , Owner)               Personal Information rule
                                                          Information wall rule                         Finance folders

              “Information wall” rule
Applies To: Exists Resource.Department
Access conditions:
 User.Department any_of Resource.Department
File Access without Central Access
 Policy



Share Permissions                      Access
         NTFS Permissions              Control
                                      Decision
File Access with Central Access Policy




Share Permissions                            Access
         NTFS Permissions                    Control
                    Central Access Policy   Decision
How Access Check Works
                        Share
                  Security Descriptor
                   Share Permissions
                                                            Active Directory
                                                        (cached in local Registry)
                      File/Folder                      Cached Central Access Policy
                  Security Descriptor                          Definition

            Central Access Policy Reference            Cached Central Access Rule
                   NTFS Permissions                    Cached Central Access Rule
                                                       Cached Central Access Rule


    Access Control Decision:
    1)Access Check – Share permissions if applicable
    2)Access Check – File permissions
    3)Access Check – Every matching Central Access
      Rule in Central Access Policy
Example: Effective Access

                                    Classifications on File Being Accessed
                                    Department                    Engineering
                                    Sensitivity                   High


Permission Type          Target Files             Permissions                         Engineering     Engineering          Sales FTE
                                                                                          FTE           Vendor
Share                                             Everyone:Full                         Full              Full               Full
Central Access Rule 1:   Dept=Engineering         Engineering:Modify
                                                                                      Modify            Modify              Read
Engineering Docs                                  Everyone: Read
Rule 2: Sensitive Data   Sensitivity=High         FTE:Modify                          Modify             None              Modify
Rule 3: Sales Docs       Dept=Sales               Sales:Modify                            [rule ignored – not processed]
NTFS                                              FTE:Modify
                                                                                      Modify             Read              Modify
                                                  Vendors:Read
                                                                  Effective Rights:   Modify             None               Read
How does this help me if I
  have to do an audit?
The audit challenge

   Compliance and forensic analysis

   Difficult to control audit volume

   Inadequate support for managing audit
    policies centrally

   Difficult to sift through audit noise to get
    to relevant data
Expression based auditing
                Limit auditing to data that meets
                 specific classification criteria.

                Limit auditing by action and by
                 identity

                Add contextual information into the
                 audit events
Audit event with contextual information

An attempt was made to access an object.

Subject:
       Security ID:         CONTOSODOMalice
       Account Name:              alice
       Account Domain:             CONTOSODOM
       Logon ID:            0x3e7

Object:
   Object Server:     Security
   Object Type:       File
   Object Name:       C:Finance Document
   ShareFinancialStatementsMarchEmployeeStmt.xls
   Handle ID: 0x8e4
   Resource Attributes: S:AI(RA;;;;;WD;(
   “Personally Identifiable
   Information",TS,0x0,"High"))(RA;;;;;WD;(“Department_23AFE",TS,0x0,“Finance"))
Incrementally add capabilities

                                                               Windows 8
                                                               clients
                                        Windows                • Add device claims
                                        Server 2012              to access and
                                                                 audit policies
                 Windows                DCs
                                                               • Better access
                 Server 2012            • Centrally defined      denied experience
Current          File Servers             access and audit     • Additional
                                          policies               classification
infrastructure   • Access and Audit     • User claims can be     options
                   Policies based on      used by access
                   security groups        and audit policies
                   and file tagging
                                        • Additional
                 • Classify               classification
                   information &          options
                   apply RMS policies
In summary
Related Content and Resources

          http://channel9.msdn.com/Events/TechEd




  http://edge.technet.com

Weitere ähnliche Inhalte

Mehr von David Tesar

DevOps, Microservices, and Azure Container Service
DevOps, Microservices, and Azure Container ServiceDevOps, Microservices, and Azure Container Service
DevOps, Microservices, and Azure Container ServiceDavid Tesar
 
Mobile App Instrumentation Experimentation FTW
Mobile App Instrumentation Experimentation FTWMobile App Instrumentation Experimentation FTW
Mobile App Instrumentation Experimentation FTWDavid Tesar
 
3 Ways To UP Your OPs Game
3 Ways To UP Your OPs Game3 Ways To UP Your OPs Game
3 Ways To UP Your OPs GameDavid Tesar
 
NoOps != No Operations
NoOps != No OperationsNoOps != No Operations
NoOps != No OperationsDavid Tesar
 
Enable consumerization-of-it
Enable consumerization-of-itEnable consumerization-of-it
Enable consumerization-of-itDavid Tesar
 
Consumerization of IT MSL Jumpstart Keynote
Consumerization of IT MSL Jumpstart KeynoteConsumerization of IT MSL Jumpstart Keynote
Consumerization of IT MSL Jumpstart KeynoteDavid Tesar
 

Mehr von David Tesar (6)

DevOps, Microservices, and Azure Container Service
DevOps, Microservices, and Azure Container ServiceDevOps, Microservices, and Azure Container Service
DevOps, Microservices, and Azure Container Service
 
Mobile App Instrumentation Experimentation FTW
Mobile App Instrumentation Experimentation FTWMobile App Instrumentation Experimentation FTW
Mobile App Instrumentation Experimentation FTW
 
3 Ways To UP Your OPs Game
3 Ways To UP Your OPs Game3 Ways To UP Your OPs Game
3 Ways To UP Your OPs Game
 
NoOps != No Operations
NoOps != No OperationsNoOps != No Operations
NoOps != No Operations
 
Enable consumerization-of-it
Enable consumerization-of-itEnable consumerization-of-it
Enable consumerization-of-it
 
Consumerization of IT MSL Jumpstart Keynote
Consumerization of IT MSL Jumpstart KeynoteConsumerization of IT MSL Jumpstart Keynote
Consumerization of IT MSL Jumpstart Keynote
 

Kürzlich hochgeladen

Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfSeasiaInfotech2
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 

Kürzlich hochgeladen (20)

Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdf
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 

Windows server 2012 dynamic access control tech mentor

  • 1. Windows Server 2012 Dynamic Access Control David Tesar Technical Evangelist, Microsoft http://about.me/davidtesar Level: 300
  • 2. Session objectives  Understand the new Dynamic Access Control (DAC) capabilities built into Windows Server 2012  Learn how to leverage DAC for data compliance and leakage prevention
  • 3. Data management landscape Growth of Budget users and data Constraints Distributed Regulatory and computing Business Compliance ? ?
  • 4. Dynamic Access Control Building Blocks • ACEs with conditions, including Boolean logic and relative Expression-Based ACEs operators User and Device Claims • User and computer attributes can be used in ACEs • File classifications can be used in authorization decisions Classification • Continuous automatic classification Enhancements • Automatic RMS encryption based on classification Central Access and • Central authorization/audit rules defined in AD and applied Audit Policies across multiple file servers Access Denied • Allow users to request access Assistance • Provide detailed troubleshooting info to admins
  • 5. Expression-Based ACEs Pre-2012: ’OR’ of groups only • Consider 100 countries * 10 divisions * 5 Projects • 5,000 total groups to represent every combination: • ProjectZ UK Engineering Users • ProjectZ Canada Engineering Users [etc…] Windows Server 2012: ‘AND’ in expressions • ACE conditions allow multiple groups with Boolean logic • Example: Allow modify IF MemberOf(ProjectZ) AND MemberOf(UK) AND MemberOf(Engineering) • ~60 groups instead of 5,000 Windows Server 2012: with Central Access Policies & Classification • 3 User Claims
  • 6. Conditional Expression Operators Logical – AND – OR – NOT – Exists (resource properties) – See MS-DTYP for processing rules
  • 7. Expression-based access policy AD DS File Server User claims Device claims Resource properties User.Department = Finance Device.Department = Finance Resource.Department = Finance User.Clearance = High Device.Managed = True Resource.Impact = High ACCESS POLICY Applies to: Resource.Impact = High Allow | Read,Write | if (User.Department = Resource.Department) AND (Device.Managed = True) 7
  • 8. User and Device Claims Pre-2012: Security Principals Only • Restricted to making policy decisions based on the user’s group memberships • Shadow groups are often created to reflect existing attributes as groups • Groups have rules around who can be members of which types of groups • No way to transform groups across AD trust boundaries • No way to control access based on characteristics of user’s device Windows Server 2012: Security Principals, User Claims, Device Claims • Selected AD user/computer attributes are included in the security token • Claims can be used directly in file server permissions • Claims are consistently issued to all users in a forest • Claims can be transformed across trust boundaries • Enables newer types of policies that weren’t possible before: • Example: Allow Write if User.MemberOf(Finance) and User.EmployeeType=FullTime and Device.Managed=True
  • 9. Claim type Display Name Source Suggested values Kerberos Ticket Value type ContosoAlice User Groups:…. Claims: Title=SDE NT Access Token ContosoAlice User Groups:…. Claims: Title=SDE
  • 10.
  • 12. Data classification – identifying data  Classify data based on location inheritance  Classify data automatically  Data Classification Toolkit
  • 13. Business Needs → Storage Results Need per-project share Business needs can start Ensure that simple business-secret But adding policies can files do not leak out fragment the storage infrastructure Complexity increases the Retain contract chances of ineffective data for 10 years policies and prevents insight into business data
  • 14. Lack of insight into your data means that you cannot manage your costs and risks
  • 15. Manage Data Based On Business Value Classify Data Apply policy according to classification
  • 16. How can you classify information? Location based • Based on the Folder the file is created in • Driven by “Business owner” that sets up the folder • Specified by Information Worker Manual • Templates of documents can be used for default settings • Data entry applications that marks files created by users Automatic • Automatic classification based on content and other characteristics classification • Great solution for classifying large amounts of existing information Application • Line of business applications that store information on file servers • Data management applications
  • 17. Summary – Classify and Apply policy Area Windows Server 2008 R2 Windows Server 2012/Windows 8 Property definition Local Global to the forest (including default recommended definitions) Who can classify files Administrator only Administrators, Business owners and users Manual classification No UI Classification UI added in explorer What can be classified Files Folders and Files When is the classification and file Schedule Schedule and Continuous management tasks done In box classification mechanisms Content, location Content (improved), location, PowerShell In box file management tasks Expiration, custom Expiration, custom, RMS
  • 18. What happens when data leaves the file server?
  • 19. Automatic Rights Management encryption  Automatically protect your sensitive information  Adhere to compliance regulations that require data encryption
  • 20.
  • 21. How do I deploy Expression based Access Control across my servers?
  • 22. Central Access Policy Active Directory 1 2 3 Define Central Access Rules (CARs) Define Central Access Policies (CAPs) Apply CAPs on File Servers High Impact Data rule Corporate file servers Applies To: Resource.Impact == High Standard organization Access conditions: policy User.Clearance = High AND Device.IsManaged = True High Impact rule Personal Information rule Personal Information rule Finance department Applies To: Resource.PII == True policy Access conditions: High Impact Data rule User folders Allow MemberOf( PIIAdministrators , Owner) Personal Information rule Information wall rule Finance folders “Information wall” rule Applies To: Exists Resource.Department Access conditions: User.Department any_of Resource.Department
  • 23. File Access without Central Access Policy Share Permissions Access NTFS Permissions Control Decision
  • 24. File Access with Central Access Policy Share Permissions Access NTFS Permissions Control Central Access Policy Decision
  • 25. How Access Check Works Share Security Descriptor Share Permissions Active Directory (cached in local Registry) File/Folder Cached Central Access Policy Security Descriptor Definition Central Access Policy Reference Cached Central Access Rule NTFS Permissions Cached Central Access Rule Cached Central Access Rule Access Control Decision: 1)Access Check – Share permissions if applicable 2)Access Check – File permissions 3)Access Check – Every matching Central Access Rule in Central Access Policy
  • 26. Example: Effective Access Classifications on File Being Accessed Department Engineering Sensitivity High Permission Type Target Files Permissions Engineering Engineering Sales FTE FTE Vendor Share Everyone:Full Full Full Full Central Access Rule 1: Dept=Engineering Engineering:Modify Modify Modify Read Engineering Docs Everyone: Read Rule 2: Sensitive Data Sensitivity=High FTE:Modify Modify None Modify Rule 3: Sales Docs Dept=Sales Sales:Modify [rule ignored – not processed] NTFS FTE:Modify Modify Read Modify Vendors:Read Effective Rights: Modify None Read
  • 27.
  • 28. How does this help me if I have to do an audit?
  • 29. The audit challenge  Compliance and forensic analysis  Difficult to control audit volume  Inadequate support for managing audit policies centrally  Difficult to sift through audit noise to get to relevant data
  • 30. Expression based auditing  Limit auditing to data that meets specific classification criteria.  Limit auditing by action and by identity  Add contextual information into the audit events
  • 31. Audit event with contextual information An attempt was made to access an object. Subject: Security ID: CONTOSODOMalice Account Name: alice Account Domain: CONTOSODOM Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:Finance Document ShareFinancialStatementsMarchEmployeeStmt.xls Handle ID: 0x8e4 Resource Attributes: S:AI(RA;;;;;WD;( “Personally Identifiable Information",TS,0x0,"High"))(RA;;;;;WD;(“Department_23AFE",TS,0x0,“Finance"))
  • 32. Incrementally add capabilities Windows 8 clients Windows • Add device claims Server 2012 to access and audit policies Windows DCs • Better access Server 2012 • Centrally defined denied experience Current File Servers access and audit • Additional policies classification infrastructure • Access and Audit • User claims can be options Policies based on used by access security groups and audit policies and file tagging • Additional • Classify classification information & options apply RMS policies
  • 34. Related Content and Resources http://channel9.msdn.com/Events/TechEd http://edge.technet.com