The Importance of Data Security in Oil and Gas Industry Whitepaper Beeline

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 10

The Importance

of Workforce Data
Security in the
Oil & Gas Industry

Intelligent workforce solutions


beeline.com
The Importance of Workforce Data
Security in the Oil & Gas Industry
Table of Contents

INTRODUCTION 1

EXAMPLES OF DATA SECURITY BREACHES 2

THE BUSINESS PROBLEM 3-4

A FRAMEWORK FOR SECURING


YOUR DATA 5-6

CONCLUSIONS 7
In the wake of numerous
data and privacy The number and sophistication of attacks
on U.S. oil and gas companies appears to
breaches, organizations be increasing. Likewise, their potential for
inflicting damage on critical infrastructure
are intensifying their is growing.3 According to a 2013 Council of
efforts to protect their Foreign Relations Energy Brief, cyber threats to
oil and gas production—both cyber espionage
data from cyber-attacks. campaigns and potentially destructive cyber-
attacks, pose an increasingly challenging
And not a moment too problem for the industry and for national
soon. According to security and economic competitiveness. At
the same time, companies are increasingly
Verizon’s 2014 Data Breach dependent on the extent and quality of their
data. “We’re starting to see that any company’s
Investigations Report, competitive advantage is increasingly
1,367 confirmed data determined by the quality of the data they have
and how they’re using that data to make real-
breaches were reported in time decisions.”4

2013.1 In the U.S., 40% of Of course, in order to benefit from data, a


company must know how to keep it safe.
cyber-attacks on critical Managers, network administrators, and network
infrastructure assets in engineers seeking to understand the issue will
appreciate learning how to plug security holes
2012 occurred against the and keep thieves and hackers from stealing
data. In today’s business environment, attacks
energy sector.2 against companies’ networks are a constant
threat. Every business, government, and
educational institution needs to protect itself
against this danger. In this whitepaper, you
will learn how you can develop a robust data
security strategy that will help you protect
your non-employee workforce data and other
business assets. Before we dive into the details,
it is worth exploring a few examples of why data
security has become such a serious concern for
so many organizations.

1
Verizon 2014 Data Breach Investigations Report. (2014).
Retrieved from http://www.verizonenterprise.com/DBIR/2014/reports/rp_dbir-2014-executive-summary_en_xg.pdf
2
Talbot, P. (2013). Rising cyber threat to oil and gas industry
Retrieved from http://www.offshore-publication.com/index.php/hse-risk-management/1438-cyber-threat-209381
3
Clayton, B. & Segal, A. (2013) Energy Brief: Cyber Threats to Oil and Gas Supplies, Council on Foreign Relations.
Retrieved from http://www.cfr.org/cybersecurity/addressing-cyber-threats-oil-gas-suppliers/p30977
4
Burrus, D. (2013). Competitive Advantage Is Increasingly Determined By Your Data.
Retrieved from http://www.huffingtonpost.com/daniel-burrus/competitive-advantage-is_b_3238658.html
02 The Importance of Workforce Data Security in the Oil & Gas Industry

EXAMPLES OF DATA SECURITY BREACHES


If you have read a newspaper or watched the evening news in recent years, you have probably noticed that
data security is a growing problem. In fact, if you even glanced at trade media or the evening news, you could
not help but notice several prominent breaches of data security, including Night Dragon, Edward Snowden,
and the Heartbleed Bug.

NIGHT DRAGON THE HEARTBLEED BUG


Arguably the most successful known campaign against More to the point, your data may be at risk despite your
oil and gas firms was dubbed “Night Dragon” by company’s best efforts. Consider the Heartbleed Bug.
McAfee, the cyber security firm that first disclosed it. Discovered in April 2014, the bug allows anyone on the
According to McAfee, Night Dragon was a “coordinated, Internet to read more data than should be allowed.
covert, and targeted” campaign by China-based So, how exactly does it work?
hackers.5 From 2008 to early 2011, the hackers stole
gigabytes of highly sensitive data from five Western The Heartbleed Bug allows an anonymous attacker
energy companies, including proprietary information to download a random chunk of memory from the
about oil and gas field operations, financial transactions, server. The attacker says it is sending some data (for
and bidding data. example, 56 bytes) and then asks the server to send
that data back. In reality, the attacker is only claiming
EDWARD SNOWDEN to send 56 bytes, but sends a much smaller packet. The
server trusts the attacker, sends back the small packet
Snowden, an IT specialist working for U.S. contractor
as the start of the reply, and then grabs the remaining
Booz Allen Hamilton, is involved in quite possibly the
data from memory to fill out the reply. This data could
most significant story on intelligence, security, and
contain sensitive information, such as usernames
privacy in quite some time. Daniel Ellsberg, the man
and passwords.8
who leaked the Pentagon Papers more than 40 years
ago, feels Snowden’s situation is the most important
security leak in American history.6 The implications
of Snowden’s actions reverberated around the world.
Recently, the United States Justice Department accused WITH THREATS SUCH AS TERRORISM
the contractor who vetted Snowden of faking 665,000 AND PIRACY LOOMING LARGE,
background checks, possibly including the background
check of Washington Navy Yard shooter Aaron Alexis.7
ENSURING BOTH PHYSICAL
It is not safe to assume that this is only a problem for AND CYBER SECURITY OF THE
governments. Data security is an industry-wide problem.
OPERATION, THE WORKFORCE
To some extent, all organizations keep and process
personal data regarding their staff, their customers, AND THE WIDER INDUSTRY SUPPLY
or their suppliers. Most firms typically do all three. CHAIN IS KEY.

5
 odge, Nathan and Entous, Adam, Oil Firms Hit by Hackers From China, Report Says, Wall Street Journal, February 10, 2011.
H
6
Ellsberg, D. (2013). Edward Snowden: saving us from the United Stasi of America.
Retrieved from http://www.theguardian.com/commentisfree/2013/jun/10/edward-snowden-united-stasi-america
7
Isikoff, M. (2014). DOJ accuses firm that vetted Snowden of faking 665,000 background checks.
Retrieved from http://investigations.nbcnews.com/_news/2014/01/23/22401812-doj-accuses-firm-that-vetted-snowden-of-faking-665000-background-checks
8
The Heartbleed Bug. (2014). Retrieved from http://heartbleed.com/
03 The Importance of Workforce Data Security in the Oil & Gas Industry

THE BUSINESS PROBLEM Here are some of the challenges faced by most
organizations today:
Data is a two-sided coin. It creates business value, —T
 oday there is more data, in more places, than
but it also represents a significant potential liability, ever before.
making the proper handling of data absolutely critical.
— Instead of individual hackers driven by curiosity or
As organizations increasingly turn to non-employee
mischief, data breaches are increasing caused by
resources—consultants, contractors, and outsourced
criminal enterprises seeking financial gain, or by
service workers—to support their businesses, it is just
terrorist organizations seeking to create chaos and
as important to know who has access to your data as
panic.
who has access to your physical facilities. A Vendor
Management System (VMS) can provide that visibility. — It has become increasingly difficult to track data
And it can ensure that these same non-employees’ access within organizations, opening the door for
access to your data ends as soon as they complete their abuse by insiders.
assignments. At the same time, the right VMS will keep —M
 ore government regulations emerge every year
all the data required to manage your non-employee detailing how organizations should monitor and
workforce secure, including vital personal identity, manage sensitive data.
financial, and vendor records.
HOW HAVE ORGANIZATIONS TRIED TO SOLVE
Data security is all about minimizing risk and liability THIS PROBLEM IN THE PAST?
in a cost-effective way. Due to globalization and
technological progress, organizations collect, access, Historically, organizations that wanted to protect their
and use data in ways that constantly evolve and change. data have gone about it in four basic ways.
Failing to safeguard that data can lead to the leaking of 1. Ignore the problem and hope that it goes away/
sensitive information, which can place your organization resolves itself.
at risk of very costly legal action. That does not take
2. Rely on vendors, contractors, and other
into account the effect a leak would have on your
third parties.
brand’s reputation. As the regulatory burden of data
security increases, the resource commitment required to 3. Focus on the technical aspects of data security and
stay secure and compliant will escalate. All companies depend 100% on IT to take care of any problems.
need to take this issue seriously, regardless of their 4. Cede responsibility for security to cloud providers
size and geographic location. This is especially true of and employees.
companies in the strategically important and highly
Unfortunately, all of these methods have their respective
regulated energy sector.
shortcomings and still leave room for security breaches.
Maximizing the business value of data means keeping In fact, if you want to develop a first-class data
it secure throughout the organization. The increased security strategy, there are a few things you should
focus on risk management and transparency is driving do differently. The first step is implementing proven
the need for consistent, reliable, and secure data. best practices for data security to get results. Smart
organizations are working with partners that make data
security a top priority.
04 The Importance of Workforce Data Security in the Oil & Gas Industry

THINGS SMART COMPANIES ASK BEFORE CHOOSING A TECHNOLOGY PARTNER


Finding the right Vendor Management System (VMS) to support your business can be challenging.
How can they ensure that your data will be secure? Before you sign on the dotted line with your future
technology partner, ask yourself seven questions to determine whether it is a good match.

1. Does the provider have contingency plans in place? 4. How is their technology architected?
How protected is your data? When it comes to Does their Software-as-a-Service (SaaS) solution
protecting your data, what measures does your use single-tenant or multi-tenant architecture? Ask
potential VMS partner take? Inadequate contingency your potential technology partner if they follow the
planning in the case of a disaster—fire, flood, industry-recommended best practice guidelines
theft—results in loss of time, loss of resources, and for high-volume, high-availability systems by using
downtime in the service that the data systems single-tenant architecture, which gives each client a
provide. In fact, according to Price Waterhouse dedicated database and dedicated application server.
Coopers, 90 percent of all companies that experience Single-tenant architecture is inherently more secure
a computer “disaster” with no pre-existing survival than a multi-tenant architecture. For example, with
plan go out of business within 18 months.9 single-tenant architecture, it is not possible to have
one customer’s data shared with another’s due to a
2. Does the organization employ systems that rely on
code or labeling issue.
cloud providers?
You need a VMS partner who knows how to 5. Have they undergone compliance certification?
safeguard your organization from both security Consider choosing a firm certified by an independent
bugs and cloud outages. According to infrastructure service auditor to ensure they have undergone the
generalist Jason Creson, “One of the problems most rigorous assessments and compliance testing.
associated with running many systems in the cloud is 6. Do they have a disaster recovery site located a safe
that when one system goes down, multiple systems distance away from the primary site?
may go down, which requires providers to have a The alternative site for your data center should be
back-up plan in place.”10 far enough away from the primary site to serve its
3. Where is your data center located? purpose. You will want to make sure your data is
Your data center’s physical security should not be an secure in the case of natural disaster, human disaster,
afterthought. An ideal data center location should loss of electricity, pandemic disease, or some other
offer protection from all conceivable hazards. Beeline unforeseen catastrophe. Beeline provides and staffs
has four data centers on two continents. Consider the our own dedicated disaster recovery site, which is
physical security of just two of our data centers: One always ready to assume production activities and is
is located in a renovated WWI underground bunker monitored 24/7.
while another is securely protected on top of a hill. 7. Do they have reference clients you can
speak to about their experience with the
company’s reliability?
You rely on both security and uptime—all the
time—and so do your customers. Ask your potential
technology provider about their success rate for
uptime SLA, and if possible, verify any claims your
potential VMS partner may make by speaking directly
to an actual client about their experience.

9
Krupa, A. (2001). The Oversight of Physical Security and Contingency Planning.
Retrieved from http://www.lib.iup.edu/comscisec/SANSpapers/krupa.htm
10
Creson, J. (2014). Choose a VMS partner who knows how to safeguard your organization from both security bugs and cloud outages.
Retrieved from http://blog.beeline.com/data-security/vms-partners-protect-against-data-security-bugs/
05 The Importance of Workforce Data Security in the Oil & Gas Industry

“IN TODAY’S WORLD, MORE AND


MORE OF YOUR SUPPLIERS HAVE
ACCESS TO YOUR INFORMATION,
AND A BREACH FOR THEM BECOMES
A BREACH FOR YOU.”11

~B
 RUCE JONES, CISO OF EASTMAN
KODAK COMPANY

A FRAMEWORK FOR 4. Your data security strategy should be flexible and


scalable. Over time, new attack vectors will emerge,
SECURING YOUR DATA workers will enter and leave your organization,
and data may become more sensitive. You must
Managing vendor security is critical. If you want to
be prepared.
keep your data safe, you must have systems in place to
minimize risk and protect your organization. Obviously, 5. You should not only comply with all the relevant
every company is different. Here are some steps you government regulations, but also be able to show
can take to develop a strategy for safeguarding compliance quickly in the event of an audit. These
your information. steps provide a good starting point, but still do
not take into account the fact that security experts
1. T
 he first priority is to understand where your data
suggest using layered security. In short, the more
exists. Pay particular attention to sensitive data.
layers, the more secure your organization will be.
Do not underestimate the complexity of this step—
One of the benefits of choosing the right technology
virtualized infrastructures, Bring Your Own Device
partner—Beeline, for example—is that you will benefit
(BYOD) policies, and public clouds make data
from your vendor’s focus on security, as well as your
flows unpredictable.
organization’s internal efforts.
2. Next, safeguard sensitive data, both structured
and unstructured. Structured data refers to data in
databases. Unstructured data comprises everything
else. It is essential to use policy-based solutions that
apply access rights based on job roles/groups or
specific identities.
3. Remember that sensitive data may exist outside
the production environment. Many companies drop
the ball here. A complete data security strategy will
account for this type of data.

11
Brenner, B. (2012). CSO Security Standard: The art of vendor management.
Retrieved from http://www.csoonline.com/article/2135304/security-leadership/cso-security-standard--the-art-of-vendor-management.html
06 The Importance of Workforce Data Security in the Oil & Gas Industry

VMS AS A CONTROL POINT Beeline is proud of our commitment to security, which


is why we invest more than any other VMS provider in
Did you know it is possible to use the right Vendor
our state-of-the-art data centers, premium application
Management System (VMS) as a data security control
architecture, and technologies recognized as leaders
point? When Beeline says, “Your data is our highest
in Gartner’s Magic Quadrant for business intelligence,
priority,” we mean it.
application security testing, endpoint protection, and
Consider this: intrusion prevention. We put many measures in place
to make sure our clients’ data is secure. Beeline adds
—B
 eeline has never had a security breach.
controls to verify that suppliers are doing background
—G
 artner recognized Beeline’s Application Security checks of non-employees, that only authorized workers
Testing as a Magic Quadrant Leader for improving the are given access to systems and buildings, and that if
security posture of enterprise software. an incident does arise, Beeline can match workers to
—B
 eeline adheres to a rigorous year-round SSAE 16/ suppliers and locations.
ISAE 3402 (SOC1, SOC2, and SOC3) audit process.
Beeline gives customers the most important data
—B
 eeline follows Microsoft’s recommended best around the five Ws:
practice guidelines for high-volume, high-availability
—W
 ho – Who are the workers and who is
systems–deploying individual databases for each
supplying them?
client, in which each database contains the identical
schema, but is logically and physically separated. —W
 hat – What systems, networks, and applications
should they have access to?
—B
 eeline VMS platform runs each client site in a
dedicated application pool with separate credentials —W
 hen – When will access begin and end for
to ensure optimal performance and security. these individuals?
—W
 here – Where will they be located (physical
address) during the length of the engagement?
—W
 hy – Why are they here?
07 The Importance of Workforce Data Security in the Oil & Gas Industry

CONCLUSIONS
As you may have noticed, the more technology enables DOWNLOAD BEELINE’S SECURITY
businesses to do more with less, the more important CHECKLIST TO MAKE SURE YOUR
data security becomes. A data breach can cripple your
business and destroy the trust you have worked so
TECHNOLOGY PROVIDER CAN ANSWER
hard to build with your staff, customers, and suppliers. THE MOST IMPORTANT SECURITY
Let’s face it—the challenges for organizations are
QUESTIONS FACING SOURCING,
considerable. Between the many things that can go
wrong, the countless components for securing data, and PROCUREMENT, AND HUMAN
the increase in data breaches, you owe it to yourself to RESOURCE PROFESSIONALS TODAY.
do everything you can to protect your information. It
is clear you need to develop a first-class data security DOWNLOAD NOW
strategy that will help you protect your data and other
http://bit.ly/1hKeedV
business assets. Can you really afford not to ask the
tough questions when it comes to data security?
If you are looking for the right Vendor Management
System (VMS) partner to support your business, safely
and securely, take a closer look at Beeline. We invest
more than any other VMS provider in our state-of-the-
art data centers and premium application architecture.
We host our servers, network, and storage solutions in a
physically hardened data center offering top-of-the-line
redundancy and security across all capabilities.
Learn how Beeline can help you manage the security
components of vendors and non-employee data.
Ensure that a trusted technology partner protects your
company’s confidential information.
08 The Importance of Workforce Data Security in the Oil & Gas Industry

About Beeline

Beeline is a market leader in software solutions for


sourcing and managing the extended workforce.
Offering intelligent workforce solutions—including
a Vendor Management System (VMS)—to help
procurement, sourcing, and human resources
professionals optimize costs, reduce risks, and
add value into their local and international
contingent labor programs.

Award-winning business intelligence, superior


technology, a global network of local knowledge,
and service-driven people based close to its clients
operations make Beeline the best VMS for today’s
leading enterprises. To learn more, visit beeline.com.

Beeline is a strategic and independently operated


business unit of Adecco Group, the world’s leading
provider of HR solutions. With more than 31,000
employees and 5,100 branches in over 60 countries
and territories around the world, Adecco Group
offers a wide variety of services, connecting more
than 650,000 associates with over 100,000 clients
every day. The services offered fall into the broad
categories of temporary staffing, permanent placement,
career transition and talent development, as well as
outsourcing and consulting. The Adecco Group is a
Fortune Global 500 company.

Intelligent workforce solutions


beeline.com
© 2014 Beeline

111214

You might also like