SlideShare una empresa de Scribd logo
1 de 10
Evelyn de Souza
Cisco Security Product Marketing
November 1 2012




© 2012 Cisco and/or its affiliates. All rights reserved.   1
Overview of Industry Initiatives?


                              NIST Cloud Models


                              CSA compliance and service provider assessment tools


                              ODCA usage models


                              Questions


        2
© 2012 Cisco and/or its affiliates. All rights reserved.                             2
• Transparency & visibility from providers
       • Compatible laws across jurisdictions
       • Data sovereignty
       • Incomplete standards
       • True Consumer awareness & engagement




© 2012 Cisco and/or its affiliates. All rights reserved.   3
via consensus on security best practices

                                                           Reduce manual audit cycles via common framework for regulatory standards

                                                           Streamline security implementations via standards for controls and APIs
                                                           across cloud environments

                                                           Enable IT to easily compare cloud provider security levels



                                                                                              Example: Aligning hardware and software
                                                                                                  controls to ODCA requirements

                                                                  ODCA Security Provider Assurance Usage Model 1.0 – Solution should be able to support the
                                                                  following functional requirements by assurance levels, where applicable:

                                                                         Bronze (basic): Identity management, security incident & event monitoring

                                                                         Silver (enterprise): Network intrusion prevention, event logging, administrative changes tracking

                                                                         Gold (financial): Penetration testing, asset segmentation, encrypted communication, Geo limits,
                                                                         storage encryption

                                                                         Platinum (military): Strong encryption for data


                                                                  *Several of the requirements are supported by Intel / McAfee




        4
© 2012 Cisco and/or its affiliates. All rights reserved.                                                                                                                     4
Hybrid Clouds
Deployment
Models                                                     Private             Community
                                                                                                                               Public Cloud
                                                           Cloud                 Cloud

Service                                                    Software as a               Platform as a                            Infrastructure as a
Models                                                     Service (SaaS)             Service (PaaS)                              Service (IaaS)

                                                                               On Demand Self-Service
Essential
                                                               Broad Network Access                               Rapid Elasticity
Characteristics
                                                                 Resource Pooling                              Measured Service


                                                                     Massive Scale                           Resilient Computing

Common                                                               Homogeneity                         Geographic Distribution
Characteristics                                                      Virtualization                           Service Orientation
                                                                Low Cost Software                              Advanced Security
© 2012 Cisco and/or its affiliates. All rights reserved.
                                                                                          Based upon original chart created by Alex Dowbor - http://ornot.wordpress.com   5
                                                                                                                                                                          5
• Global, not-for-profit organization
• Over 33,000 individual members, 150 corporate members,
       60 chapters
•      Building best practices and a trusted cloud ecosystem
         Research
         Education
         Certification
         Advocacy of prudent public policy
•      Innovation, Transparency, GRC, Identity
      “To promote the use of best practices for providing security
       assurance within Cloud Computing, and provide education
        on the uses of Cloud Computing to help secure all other
                          forms of computing.”
© 2012 Cisco and/or its affiliates. All rights reserved.             6
Provider Assertions
        •        Family of 4 research projects
                  • Cloud Controls Matrix
                  • Consensus Assessments
                           Initiative
                  •        Cloud Audit
                  •        Cloud Trust Protocol
        •        Tools for governance, risk and
                 compliance mgt
        •        Enabling automation and                                  Private, Com
                 continuous monitoring of GRC                               munity &
                                                                          Public Clouds

                                                           Control Requirements

© 2012 Cisco and/or its affiliates. All rights reserved.                                         7
• CSA STAR (Security, Trust and Assurance Registry)
         • Public Registry of Cloud Provider self assessments
         • Based on Consensus Assessments Initiative Questionnaire
                      Provider may substitute documented Cloud Controls Matrix
                      compliance
         • Voluntary industry action promoting transparency
         • Security as a market differentiator
         • www.cloudsecurityalliance.org/star




© 2012 Cisco and/or its affiliates. All rights reserved.                         8
YOUR CALL TO ACTION

        Your Call to Action

        Integrate security into your cloud planning – don’t bolt it
        on

        Engage CSA and ODCA - ask the right questions of
        your cloud service providers

        Become a participating member of one of an industry
        based organization




        9
© 2012 Cisco and/or its affiliates. All rights reserved.              9
Thank you.




© 2012 Cisco and/or its affiliates. All rights reserved.   10

Más contenido relacionado

Destacado

503 reading quiz
503 reading quiz503 reading quiz
503 reading quiz
amybass
 
04410100251 makalah
04410100251 makalah04410100251 makalah
04410100251 makalah
Arya Ningrat
 

Destacado (15)

Cisco Web and Email Security Overview
Cisco Web and Email Security OverviewCisco Web and Email Security Overview
Cisco Web and Email Security Overview
 
McAllen Intermediate School District
McAllen Intermediate School DistrictMcAllen Intermediate School District
McAllen Intermediate School District
 
Midsize Business Solutions: Cybersecurity
Midsize Business Solutions: CybersecurityMidsize Business Solutions: Cybersecurity
Midsize Business Solutions: Cybersecurity
 
Integrated Network Security Strategies
Integrated Network Security StrategiesIntegrated Network Security Strategies
Integrated Network Security Strategies
 
Balance Data Center Security and Performance
Balance Data Center Security and PerformanceBalance Data Center Security and Performance
Balance Data Center Security and Performance
 
Data Center Security Challenges
Data Center Security ChallengesData Center Security Challenges
Data Center Security Challenges
 
Data Center Security Now and into the Future
Data Center Security Now and into the FutureData Center Security Now and into the Future
Data Center Security Now and into the Future
 
A Reality Check on the State of Cybersecurity
A Reality Check on the State of CybersecurityA Reality Check on the State of Cybersecurity
A Reality Check on the State of Cybersecurity
 
Pervasive Security Across Your Extended Network
Pervasive Security Across Your Extended NetworkPervasive Security Across Your Extended Network
Pervasive Security Across Your Extended Network
 
Malware and the Cost of Inactivity
Malware and the Cost of InactivityMalware and the Cost of Inactivity
Malware and the Cost of Inactivity
 
William Paterson University
William Paterson UniversityWilliam Paterson University
William Paterson University
 
http://chiropractor.invalparaisolocalarea.com/
http://chiropractor.invalparaisolocalarea.com/http://chiropractor.invalparaisolocalarea.com/
http://chiropractor.invalparaisolocalarea.com/
 
503 reading quiz
503 reading quiz503 reading quiz
503 reading quiz
 
04410100251 makalah
04410100251 makalah04410100251 makalah
04410100251 makalah
 
Hasil percobaan
Hasil percobaanHasil percobaan
Hasil percobaan
 

Más de Cisco Security

The Evolution of and Need for Secure Network Access
The Evolution of and Need for Secure Network AccessThe Evolution of and Need for Secure Network Access
The Evolution of and Need for Secure Network Access
Cisco Security
 

Más de Cisco Security (15)

Incident Response Services Template - Cisco Security
Incident Response Services Template - Cisco SecurityIncident Response Services Template - Cisco Security
Incident Response Services Template - Cisco Security
 
3 Tips for Choosing a Next Generation Firewall
3 Tips for Choosing a Next Generation Firewall3 Tips for Choosing a Next Generation Firewall
3 Tips for Choosing a Next Generation Firewall
 
AMP Helps Cisco IT Catch 50% More Malware threats
AMP Helps Cisco IT Catch 50% More Malware threatsAMP Helps Cisco IT Catch 50% More Malware threats
AMP Helps Cisco IT Catch 50% More Malware threats
 
The Cost of Inactivity: Malware Infographic
The Cost of Inactivity: Malware InfographicThe Cost of Inactivity: Malware Infographic
The Cost of Inactivity: Malware Infographic
 
Cisco Addresses the Full Attack Continuum
Cisco Addresses the Full Attack ContinuumCisco Addresses the Full Attack Continuum
Cisco Addresses the Full Attack Continuum
 
Infonetics Network and Content Security Vendor Scorecard
Infonetics Network and Content Security Vendor ScorecardInfonetics Network and Content Security Vendor Scorecard
Infonetics Network and Content Security Vendor Scorecard
 
Gartner Newsletter: Cisco TrustSec Deployed Across Enterprise Campus, Branch ...
Gartner Newsletter: Cisco TrustSec Deployed Across Enterprise Campus, Branch ...Gartner Newsletter: Cisco TrustSec Deployed Across Enterprise Campus, Branch ...
Gartner Newsletter: Cisco TrustSec Deployed Across Enterprise Campus, Branch ...
 
The Evolution of and Need for Secure Network Access
The Evolution of and Need for Secure Network AccessThe Evolution of and Need for Secure Network Access
The Evolution of and Need for Secure Network Access
 
Cisco 2014 Midyear Security Report
Cisco 2014 Midyear Security ReportCisco 2014 Midyear Security Report
Cisco 2014 Midyear Security Report
 
String of Paerls Infographic
String of Paerls InfographicString of Paerls Infographic
String of Paerls Infographic
 
Midyear Security Report Infographic
Midyear Security Report InfographicMidyear Security Report Infographic
Midyear Security Report Infographic
 
Cisco Annual Security Report Infographic
Cisco Annual Security Report InfographicCisco Annual Security Report Infographic
Cisco Annual Security Report Infographic
 
City of Tomorrow Builds in Next-Generation Security
City of Tomorrow Builds in Next-Generation SecurityCity of Tomorrow Builds in Next-Generation Security
City of Tomorrow Builds in Next-Generation Security
 
Laser Pioneer Secures Network End-to-End to Protect Assets
Laser Pioneer Secures Network End-to-End to Protect AssetsLaser Pioneer Secures Network End-to-End to Protect Assets
Laser Pioneer Secures Network End-to-End to Protect Assets
 
Leveraging Context-Aware Security to Safeguard Patient Data
Leveraging Context-Aware Security to Safeguard Patient DataLeveraging Context-Aware Security to Safeguard Patient Data
Leveraging Context-Aware Security to Safeguard Patient Data
 

Último

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Último (20)

A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 

Leveraging Industry Initiatives for Data Center and Cloud

  • 1. Evelyn de Souza Cisco Security Product Marketing November 1 2012 © 2012 Cisco and/or its affiliates. All rights reserved. 1
  • 2. Overview of Industry Initiatives? NIST Cloud Models CSA compliance and service provider assessment tools ODCA usage models Questions 2 © 2012 Cisco and/or its affiliates. All rights reserved. 2
  • 3. • Transparency & visibility from providers • Compatible laws across jurisdictions • Data sovereignty • Incomplete standards • True Consumer awareness & engagement © 2012 Cisco and/or its affiliates. All rights reserved. 3
  • 4. via consensus on security best practices Reduce manual audit cycles via common framework for regulatory standards Streamline security implementations via standards for controls and APIs across cloud environments Enable IT to easily compare cloud provider security levels Example: Aligning hardware and software controls to ODCA requirements ODCA Security Provider Assurance Usage Model 1.0 – Solution should be able to support the following functional requirements by assurance levels, where applicable: Bronze (basic): Identity management, security incident & event monitoring Silver (enterprise): Network intrusion prevention, event logging, administrative changes tracking Gold (financial): Penetration testing, asset segmentation, encrypted communication, Geo limits, storage encryption Platinum (military): Strong encryption for data *Several of the requirements are supported by Intel / McAfee 4 © 2012 Cisco and/or its affiliates. All rights reserved. 4
  • 5. Hybrid Clouds Deployment Models Private Community Public Cloud Cloud Cloud Service Software as a Platform as a Infrastructure as a Models Service (SaaS) Service (PaaS) Service (IaaS) On Demand Self-Service Essential Broad Network Access Rapid Elasticity Characteristics Resource Pooling Measured Service Massive Scale Resilient Computing Common Homogeneity Geographic Distribution Characteristics Virtualization Service Orientation Low Cost Software Advanced Security © 2012 Cisco and/or its affiliates. All rights reserved. Based upon original chart created by Alex Dowbor - http://ornot.wordpress.com 5 5
  • 6. • Global, not-for-profit organization • Over 33,000 individual members, 150 corporate members, 60 chapters • Building best practices and a trusted cloud ecosystem Research Education Certification Advocacy of prudent public policy • Innovation, Transparency, GRC, Identity “To promote the use of best practices for providing security assurance within Cloud Computing, and provide education on the uses of Cloud Computing to help secure all other forms of computing.” © 2012 Cisco and/or its affiliates. All rights reserved. 6
  • 7. Provider Assertions • Family of 4 research projects • Cloud Controls Matrix • Consensus Assessments Initiative • Cloud Audit • Cloud Trust Protocol • Tools for governance, risk and compliance mgt • Enabling automation and Private, Com continuous monitoring of GRC munity & Public Clouds Control Requirements © 2012 Cisco and/or its affiliates. All rights reserved. 7
  • 8. • CSA STAR (Security, Trust and Assurance Registry) • Public Registry of Cloud Provider self assessments • Based on Consensus Assessments Initiative Questionnaire Provider may substitute documented Cloud Controls Matrix compliance • Voluntary industry action promoting transparency • Security as a market differentiator • www.cloudsecurityalliance.org/star © 2012 Cisco and/or its affiliates. All rights reserved. 8
  • 9. YOUR CALL TO ACTION Your Call to Action Integrate security into your cloud planning – don’t bolt it on Engage CSA and ODCA - ask the right questions of your cloud service providers Become a participating member of one of an industry based organization 9 © 2012 Cisco and/or its affiliates. All rights reserved. 9
  • 10. Thank you. © 2012 Cisco and/or its affiliates. All rights reserved. 10