VSI Alliancetm White Paper Technical Measures and Best Practices
Total Page:16
File Type:pdf, Size:1020Kb
VSI AllianceTM White Paper Technical Measures and Best Practices for Securing Proprietary Information Version 1.0 (IPPWP3 1.0) Issued by the Intellectual Property Protection Development Working Group November 2002 VSI Alliance (IPPWP3 1.0) NOT LEGAL ADVICE The discussions of the law in this document are not intended to be legal advice. This document is not to be used as a legal reference. Readers should refer to their own legal counsel for answers to questions concerning the law. Copyright 2002 by VSI Alliance, Inc. 15495 Los Gatos Boulevard, Suite #3 Los Gatos, California 95032, USA Phone: (408) 356-8800, Fax: 408-356-9018 http://www.vsi.org, [email protected] VSI Alliance is a trademark of the VSI Alliance, Inc. All other trademarks are the property of their respective owners. Please send comments and questions to: IP Protection Development Working Group (DWG), VSIA Ian R. Mackintosh Chair 3054 Three Springs Road, San Jose, CA 95140 408-406-3152, [email protected] Raymond Burkley Vice-Chair Burkley Associates, P. O. Box 496, Cupertino, CA 95015 408-735-1540, [email protected] VSI Alliance 115495 Los Gatos Blvd, Suite 3, Los Gatos, CA 95032 408-356-8800, info Copyright 2002 by the VSI Alliance, Inc. i All Rights Reserved. VSIA CONFIDENTIAL DOCUMENT VSI Alliance (IPPWP3 1.0) Copyright 2002 by the VSI Alliance, Inc. ii All Rights Reserved. VSIA CONFIDENTIAL DOCUMENT VSI Alliance (IPPWP3 1.0) Notice The document is provided by VSIA subject to a license agreement, which restricts how this document may be used. THIS DOCUMENT MAY NOT BE COPIED, DUPLICATED, OR OTHERWISE REPRODUCED. THE DOCUMENT IS PROVIDED BY VSIA ON AN "AS-IS" BASIS, AND VSIA HAS NO OBLIGATION TO PROVIDE ANY LEGAL OR TECHNICAL ASSISTANCE IN RESPECT THERETO, TO IMPROVE, ENHANCE, MAINTAIN OR MODIFY THE DOCUMENT, OR TO CORRECT ANY ERRORS THEREIN. VSIA SHALL HAVE NO OBLIGATION FOR LOSS OF DATA OR FOR ANY OTHER DAMAGES, INCLUDING SPECIAL OR CONSEQUENTIAL DAMAGES, IN CONNECTION WITH THE USE OF THE DOCUMENT. VSIA MAKES NO REPRESENTATIONS OR WARRANTIES, EXPRESS OR IMPLIED, INCLUDING WITHOUT LIMITATION, ANY WARRANTY AS TO INFRINGEMENT, OR THE IMPLIED PURPOSE. THE READER SHOULD BE AWARE THAT IMPLEMENTATION OF THE DOCUMENT MAY REQUIRE USE OF SUBJECT MATTER COVERED BY PATENT OR OTHER INTELLECTUAL PROPERTY RIGHTS OF THIRD PARTIES. NO LICENSE, IMMUNITY, OR OTHER RIGHT IS GRANTED BY USE OF THIS DOCUMENT IN ANY SUCH THIRD-PARTY RIGHTS. NEITHER VSIA NOR ITS MEMBERS TAKE ANY POSITION WITH RESPECT TO THE EXISTENCE OR VALIDITY OF ANY SUCH RIGHTS. Copyright 2002 by the VSI Alliance, Inc. iii All Rights Reserved. VSIA CONFIDENTIAL DOCUMENT VSI Alliance (IPPWP3 1.0) Copyright 2002 by the VSI Alliance, Inc. iv All Rights Reserved. VSIA CONFIDENTIAL DOCUMENT VSI Alliance (IPPWP3 1.0) Intellectual Property Protection Development Working Group Company Members ARM Cadence Design Systems ECSI Ellipsis Digital Systems Fujitsu IBM Mentor Graphics Oki Telecom Philips Semiconductor VCX Individual Members Raymond Burkley (Vice-Chairman) Eduardo Charbon Suzanne P. Harrison Robert Helt Ken Hodor Gerald N. Keeler Ian R. Mackintosh (Chairman) Miodrag Potkonjak Brahmajai Potu Gang Qu Patrick H. Sullivan Joseph F. Villella, Jr. Current DWG Member Representatives Simon Watt . ARM Richard Terrill . Cadence Design Systems Mark Bales . Cadence Design Systems Adam Morawiec . ECSI Minesh Shah . Fujitsu Ltd. Takeshi Fuse . Fujitsu Ltd. Ken Goodnow . .IBM Ken Hodor . Individual Member Ian R. Mackintosh (Chair) . Sonics Al Kwok . NetLogic Microsystems Tadashi Hiruta. Oki Electric Industry Miodrag Potkonjak . Individual Member Patrick Beauvillard . Individual Member Raymond Burkley (Vice-Chair) . Individual Member Larry Rosenberg . VSIA-TC Chair Authors Himanshu Dwivedi Robert Helt Myles Conley Copyright 2002 by the VSI Alliance, Inc. v All Rights Reserved. VSIA CONFIDENTIAL DOCUMENT VSI Alliance (IPPWP3 1.0) Copyright 2002 by the VSI Alliance, Inc. vi All Rights Reserved. VSIA CONFIDENTIAL DOCUMENT VSI Alliance (IPPWP3 1.0) Revision History Version 1.0 Jun02 Draft edited and formatted for member review Version 1.0 Oct02 Copy edited for IPP DWG review Version 1.0 Oct02 Copy edited and formatted for Board review Version 1.0 Nov02 Formatted for final release Copyright 2002 by the VSI Alliance, Inc. vii All Rights Reserved. VSIA CONFIDENTIAL DOCUMENT VSI Alliance (IPPWP3 1.0) Copyright 2002 by the VSI Alliance, Inc. viii All Rights Reserved. VSIA CONFIDENTIAL DOCUMENT VSI Alliance (IPPWP3 1.0) Table of Contents Introduction . 1 Preface. 1 Scope . 1 Background . 1 Finding the Right Level of Security . 2 Establishing a Framework . .5 Access . 5 Storage. 13 Transport . 19 Summary. .23 A. About the Authors. .25 B. Bibliography . 27 C. Glossary. .29 List of Tables Table 1: Authorization and Authentication. 6 Table 2: Levels of Console Security . 9 Table 3: Remote Users Classification . 10 Table 4: Levels of Security Authentication. 11 Table 5: Levels of Security Encryption. 14 Table 6: Layers of Transport Security. 21 List of Figures Figure 1: IP Filters in Windows 2000 . 7 Figure 2: Graphical Representation of SSH (Secure Shell) . 8 Figure 3: EM4 File System Encryption - Example 1 . 15 Figure 4: EM4 File System Encryption - Example 2 . 15 Figure 5: EM4 File System Encryption - Example 3 . 16 Figure 6: PGP Encryption - Example 1. 16 Figure 7: PGP Encryption - Example 2 . 17 Figure 8: PGP Encryption - Example 3 . 17 Figure 9: PGP Encryption - Example 4 . 18 Figure 10: Example of Best Practices for Protecting IP . 24 Copyright 2002 by the VSI Alliance, Inc. ix All Rights Reserved. VSIA CONFIDENTIAL DOCUMENT VSI Alliance (IPPWP3 1.0) Copyright 2002 by the VSI Alliance, Inc. x All Rights Reserved. VSIA CONFIDENTIAL DOCUMENT VSI Alliance (IPPWP3 1.0) Introduction Preface This white paper is a primer on digital security, and specifically, how it applies to the protection of a company’s proprietary information (or Intellectual Property—IP). A survey of VSIA members in early 2001 showed us that many of you are directly involved in the everyday development, management, or use of proprietary information for your companies. This same survey told us that protecting this information from theft, misappropriation, compromise, and unauthorized access through your company’s networks and systems is of tremendous current interest. Our intent is to raise awareness about issues and challenges that need to be considered in securing Access, Storage, and Transmission of your company’s proprietary information and describe some “best practices” that companies implement. We assume only that you, or someone you work with, ultimately “owns” your organization’s IP and that while you personally may not have direct responsibility for deciding specific security technologies and options that your company deploys, you will want to or need to discuss this security with IT professionals. This paper begins the discussion about the need for security standards, and presents a set of common best practices that might ultimately be extended in recommendation form for VSIA member companies. Scope The purpose of this document is to begin to define standards and best practices for securing intellectual property (IP) from external (outside the corporate perimeter) attacks and internal (inside the corporate perimeter) compromise. It covers protection for IP that is stored and for IP that is transported over data networks. This paper is for anyone in the SoC design community who is involved in the development and management of designs, documents, specifications, and other information that is considered the lifeblood or IP of the business. At one level, securing critical information from unauthorized access is the responsibility of all employees. However, since IP is one of the pillars the company is built upon, it is particularly necessary that everyone who develops, manages, or uses the company’s IP must ensure that it is handled, distributed and stored with all due care. Background Attacks, probes, intrusions, and other types of exploits are constantly being attempted against corporate web sites and networks. Ask your security department how many times your firewall is probed each month. An IP Protection (IPP) Development Working Group (DWG) member noted that the firewall on his home PC, using a dial-up connection, frequently records 10 or more attempts in an hour. It is important to understand that these probes, threats, and attacks are aimed not just at high-profile, household-name companies, but also at smaller, lesser known, and even unknown companies. Studies conducted by the FBI/CSI, SANS, and CERT, among others, all tend to report a rapid increase in the number of attacks that companies have experienced in the last five years. Threats can range from kids looking for the challenge and associated bragging rights of breaking in to a site, to more disreputable individuals looking for credit card numbers and other confidential information, to motivated, well paid professionals who are hired for organized crime and corporate espionage. Copyright 2002 by the VSI Alliance, Inc. 1 All Rights Reserved. VSIA CONFIDENTIAL DOCUMENT VSI Alliance (IPPWP3 1.0) At the next level, there are foreign government-sponsored groups strategically looking for weaknesses in the US “critical infrastructure” or information that could be used for competitive advantage. This expands the scope of the problem from the traditional targets of infrastructures supporting financial institutions, utilities, government, and the military to chip manufacturers and the sites of large manufacturing