Forensic Email Compliance Guide
Forensic Email Compliance Guide
Paper
Technical Overview
1.1 Purpose This document describes the architecture of Cryoserver and explains how the
Cryoserver modules work together
1.2 Introduction
3
2. ARCHITECTURE
2.1 Design Goals Cryoserver has been designed to aid organizations requiring a totally dependable
system for storing electronic messages for later retrieval. We believe that
Cryoserver satisfies the requirements for regulatory authorities and is able to
provide a trail of data with high evidential weight for use in a court of law.
2.2 Key User Features Cryoserver has been designed to be intuitive and easy to use.
4
Remote Remote access through any appropriate browser
Access system (subject to security constraints).
1
The actual amount of storage saving is dependent on the stubbing rules defined. The more lower the stubbing
rule latency (i.e. the shorter the time emails are retained) the greater the storage savings
5
4. CRYOSERVER
ADMINISTRATION
Within Cryoserver there are four types of users: basic, privileged, administrator
and superuser. Cryoserver administration is carried out by administrators and
superusers.
4.1 Administrators Administrators are responsible for creating and maintaining Cryoserver
specific accounts, which are normally restricted to a small number of privileged
and administrative accounts. All actions are logged for audit purposes;
administrators have no access to the email repository.
The image below shows the status of (in order), the Storage Director (SD),
the Search Engine (SE), the Spool Manager (SP), the Index Manager (IM) and
the Storage Manager (SM). Where mirrored pairs of managers are used for
resilience, the Partner column identifies the partner of each mirrored node. For
nodes that use disk space the Capacity column shows the percentage and
actual amounts of disk space currently used by the node.
6
Monitoring Page
All activity performed by the superuser is logged in Cryoserver and the audit log
is emailed to the Data Guardian(s), who watch over the system.
7
5. SEARCH AND
RETRIEVAL
The Cryoserver email repository can be searched by basic and privileged users
only.
5.1 Basic Users Basic users may use Cryoserver’s powerful email search facilities to access
their own repository of emails. They normally access Cryoserver using their
normal network login using LDAP / Active Directory authentication, although it
is possible for administrators to create basic user accounts within Cryoserver
if necessary.
Privileged users have the ability to search emails throughout the entire
5.2 Privileged Users
repository. This level of access is intended for a few trusted individuals (such
as a Compliance Officer, HR Manager or Data Protection Official) within an
organization and should be considered in co-ordination with privacy regulations,
both corporate and legislative. Privileged users are required to state their
reasons for searching. All searches they carry out are logged, and session
transcripts are automatically stored in encrypted format in Cryoserver as well
as being sent by email to nominated Data Guardians who have the responsibility
for checking that searches are in accordance with the stated reason, corporate
policy and regulatory requirements.
The standard search interface is shown below. Users can search for emails by
5.3 Search Interface
specifying any of the search criteria. Searches can be refined where necessary
by adding further search criteria and reissuing the search. Cryoserver’s speedy
search capability ensures that users are able to quickly find the messages they
are looking for.
8
The advanced search provides more sophisticated searching capabilities,
rather similar to what you might expect from a document management system.
For example, you can search for combinations of words, for “stems” (words
beginning with the same characters), and for words sounding similar.
Cryoserver supports the ability to export via a single click button into
multiple formats. These formats include the ability zip up the emails; and to
extract email to ..EMLs or into .pdf
9
6. SECURITY
6.2 Message Encryption Access to the Cryoserver queries and administration is monitored and restricted
by a User ID and password login. Security can be enhanced by using two-factor
authentication using the RSA ACE Server and SecurID token.
6.5 Secure Authentication Users connect to Cryoserver over HTTPS using a standard web browser.
Cryoserver is usually configured to authenticate basic users against an LDAP-
enabled directory, which avoids the need to create additional user lists within
Cryoserver. Administrative and privileged users are managed within Cryoserver’s
built-in authentication system
10
7. IMPLEMENTATION
CONSIDERATIONS
7.1 Platforms The standard Cryoserver modules are written in Java and have been certified
on Solaris and Linux operating systems. Modules depending on third-party
components such as collectors for proprietary email servers rely on platform-
dependent APIs.
7.4.1 Storage The Storage Managers and the Index Managers use permanent storage.
Cryoserver’s file-based Storage Manager saves messages in compressed
files; a compression ratio of approximately 50% can be expected
depending on message content distribution together with an overhead
of approximately 15-25% for index storage, which depends upon the mix
of messages and attachments. Experience has shown that the average
storage requirements of a typical user are approximately 1 GB per year.
Cryoserver typically configures its systems with sufficient storage for at
least two years, which equates to 2 GB per user. Obviously this varies
from one organization and industry sector to another.
For those wanting a customized solution we can utilize and install the
Cryoserver software onto HP, IBM, Dell or Sun hardware with securely
configured SAN’s for data storage. Cryoserver is supported on major
SAN platforms including EMC, HDS and HP. In SAN implementations
11
it is possible to use storage replication software such as MirrorView
(CLARiiON) or SRDF (Symmetrix) from EMC to mirror data to remote
locations without the requirement for a second deployed Cryoserver.
7.5 Position of Cryoserver The following scenarios depict where the Cryoserver appliance might be
placed in an organization’s network architecture. Cryoserver is designed
in an Existing Network
to work in concert with existing firewall, virus scanning and content
Architecture
scanning technologies.
1 2 3
12
8. FEATURE AND BENEFIT
SUMMARY
Regulatory requirements and good business practice can dictate that records
be kept for considerable periods of time. There are also new liabilities, and now
that the greatest single reason for employee dismissal is email abuse, it makes
it even more important to be able to keep full records of emails and speedily
find any that need to be relied upon for evidential purposes.
In some highly regulated industries, email must be retained for long periods,
particularly in financial, legal and healthcare sectors. In such environments
there is now growing awareness that there needs to be a fully auditable
forensically compliant copy of individual emails in order to meet legal and
regulatory requirements – sometimes in order to show that an organization
was not in possession of or communicating certain information.
In the event of litigation, records may need to be retained indefinitely. Yet there
are costs, time and expense associated with the need for data retention and
retrieval. Such systems need to be beyond interference and yet remain easily
accessible.
Features Benefits
Captures a copy of every email Users can quickly retrieve any email that they
Stores a copy of every internal and external may have inadvertently deleted (personal disas-
email including attachments ter recovery)
IT department will not waste time trying to re-
store lost mail
Complete Record
Content of emails and email attachments is indexed Allows very fast retrieval at a later date
prior to storage
13
Features Benefits
Intercepts and stores blind carbon copy information Employees are discouraged from sending
confidential information out of the organization
Mail servers do not normally record this information, using hidden bcc addresses
but Cryoserver’s record is complete wherever possible
Records who was in the distribution list at the time an Administrator can check who was in a
email was sent / received distribution list at a particular time.
Privileged and administrator level access to the Ensures employee privacy is protected and
system is audited using a transcript of their session access is not abused
Comprehensive Audit Trail
All privileged and administrative access to the system Ensures that emails are only accessed for
is recorded and retained securely legitimate reasons
Removes the temptation to snoop on employees
Summaries of such searches are emailed to nominated Allows officials to monitor each other’s activities
trusted individuals. and enforce good corporate governance
14
Features Benefits
Emails are stored with a timestamp and “digital Attempts to tamper with stored data can be
fingerprint” detected.
Allows proof of an accurate and complete record
of messaging data
Access to the system is only possible through a secure Only authorised users are able to access other
web interface individuals’ email.
Enforces data access policy. Allows compliance
with data protection rules concerning access to
personal data
All traffic passing between the Cryoserver modules is Information is protected as far as possible from
SSL encrypted eavesdropping
The front-end is delivered over HTTPS and user
passwords are stored in encrypted format
Level 1- Basic users All end users can quickly access copies of the
Complete Record
Emails can be forwarded in real-time to a secondary Easy to implement long-term offsite storage at a
storage location disaster recovery centre
All data is secured from accidental or deliberate
sabotage by duplication into a trusted secondary
physical location
Reduce the load on existing mail servers by
removing emails
Email data is compressed before storage File storage reduced to save on storage space
and costs
15
Features Benefits
Compatible with current mail servers Cryoserver will work in an environment with
legacy mail systems, capturing copies of emails
Microsoft Exchange, Novell GroupWise, Lotus Notes, into a single repository.
Sun JES and Teamware are amongst the mail servers Investments are protected because Cryoserver
supported allows you the flexibility to change mail server in
the future
Flexible
16
Features Benefits
More storage and indexing capacity can be added as No longer a need for employees to keep insecure
requirements grow. and unreliable storage on their local hard-drives
(PST files) or to keep within mail quotas
No impact on the existing storage and indexing regime. The email load on the existing mail system
can be reduced, so improving reliability of mail
Capable of handling the many terabytes of data held by services.
larger organizations Cryoserver can be scaled to suit all sizes of end
user organization and service provider.
Scaleable
17
Version: xxxxx xxxxxx