SlideShare una empresa de Scribd logo
1 de 8
Remote Access
Server on Multi
Tenant Cloud for
Telcos & OSPs
BY
PRADEEP KUMAR YADAV. (CEO & CISO, HITEC INDIA)
Remote Access Server


Remote Access is the ability to get access to a computer or a network from
a remote distance. A Remote Access Server is the computer and
associated software that is set up to handle users seeking access to
network remotely.



A Remote Access Server usually includes or is associated with a firewall
server to ensure security and a router that can forward the remote access
request to another part of the corporate network.



A remote access server could be hosted on a multi-tenant cloud so that a
small group of different organizations Remote Access Users can share the
common pool of RAS and its routers.



A remote access server may also be used as part of a virtual private
network (VPN) or a Cloud connecting with Service Providers cloud.
Typical Multi Vendors RAS Setup
Remote Access Requirements as
per Regulatory Compliances


TSP must deploy Remote Access Server by 31/12/2013 .



All Remote Access to the TSP be done only via Remote Access Server with the entire
Remote sessions Server Activities video recording, Users credentials records, Access within
Country only, Device Log records, storage on the TSP data center.



The Remote monitoring of on-Line and Off Line session by term cell.



Data for 2 Years to be kept on 1-year Online and 1 Year off line mode for audit by
DoT.Vendors to TSP also adhere to the requirements and do the needful at their NOC
End.
Key Elements of Remote Access
1 ACL (Access Control List)


1.1 MAC (Media Access Control) filtering



1.2 IP (Internet Protocol) address filtering

2 Tunneling and encryption


2.1 SSL VPN (Secure Sockets Layer Virtual Private Network)



2.2 VPN (Virtual Private Network)



2.3 L2TP (Layer 2 Tunneling Protocol)



2.4 PPTP (Point-to-Point Tunneling Protocol)



2.5 IPsec (Internet Protocol Security)

3 Remote access


3.1 RAS (Remote Access Service)



3.2 RDP (Remote Desktop Protocol)



3.3 PPPoE (Point-to-Point Protocol over Ethernet)



3.4 PPP (Point-to-Point Protocol)



3.5 VNC (Virtual Network Computing)



3.6 ICA (Independent Computing Architecture)

4 Screen, Command, and Session Activity Log recording Software tool (and Monitoring)
5 Device LOG and Change Management Recording as Text File
6 Data Base with 1+1 Year Storage. 1 GB + 1 GB Ok for One Vendor Remote Session.
Multi Tenancy Architecture Basics


Multi-tenancy is an architecture in which a single instance of a software
application serves multiple customers. Each customer is called a tenant.
Tenants may be given the ability to customize some parts of the
application.



Multi-tenancy can be economical because software, hardware and
maintenance costs are shared. It can be contrasted with single-tenancy,
an architecture in which each customer has their own software instance
and may be given access to limited Network and applications.



A software-as-a-service (SaaS) provider, for example, can run one instance
of its application on one instance of a database and provide web access
to multiple customers. In such a scenario, each tenant's data is isolated
and remains invisible to other tenants.
Multi Tenant Cloud – Individual &
Collaboration
Thanks.


pradeep@hitecindia.org



www.hitecindia.org

Más contenido relacionado

Más de Priyanka Aash

Más de Priyanka Aash (20)

DPDP Act 2023.pdf
DPDP Act 2023.pdfDPDP Act 2023.pdf
DPDP Act 2023.pdf
 
Cyber Truths_Are you Prepared version 1.1.pptx.pdf
Cyber Truths_Are you Prepared version 1.1.pptx.pdfCyber Truths_Are you Prepared version 1.1.pptx.pdf
Cyber Truths_Are you Prepared version 1.1.pptx.pdf
 
Cyber Crisis Management.pdf
Cyber Crisis Management.pdfCyber Crisis Management.pdf
Cyber Crisis Management.pdf
 
CISOPlatform journey.pptx.pdf
CISOPlatform journey.pptx.pdfCISOPlatform journey.pptx.pdf
CISOPlatform journey.pptx.pdf
 
Chennai Chapter.pptx.pdf
Chennai Chapter.pptx.pdfChennai Chapter.pptx.pdf
Chennai Chapter.pptx.pdf
 
Cloud attack vectors_Moshe.pdf
Cloud attack vectors_Moshe.pdfCloud attack vectors_Moshe.pdf
Cloud attack vectors_Moshe.pdf
 
Stories From The Web 3 Battlefield
Stories From The Web 3 BattlefieldStories From The Web 3 Battlefield
Stories From The Web 3 Battlefield
 
Lessons Learned From Ransomware Attacks
Lessons Learned From Ransomware AttacksLessons Learned From Ransomware Attacks
Lessons Learned From Ransomware Attacks
 
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
 
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
 
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
 
Cloud Security: Limitations of Cloud Security Groups and Flow Logs
Cloud Security: Limitations of Cloud Security Groups and Flow LogsCloud Security: Limitations of Cloud Security Groups and Flow Logs
Cloud Security: Limitations of Cloud Security Groups and Flow Logs
 
Cyber Security Governance
Cyber Security GovernanceCyber Security Governance
Cyber Security Governance
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Web Application Penetration Testing
Web Application Penetration Testing Web Application Penetration Testing
Web Application Penetration Testing
 
Hardware Security on Vehicles
Hardware Security on VehiclesHardware Security on Vehicles
Hardware Security on Vehicles
 
Web hacking using Cyber range
Web hacking using Cyber rangeWeb hacking using Cyber range
Web hacking using Cyber range
 
Hacking IoT with EXPLIoT Framework
Hacking IoT with EXPLIoT FrameworkHacking IoT with EXPLIoT Framework
Hacking IoT with EXPLIoT Framework
 
Telecom Security
Telecom SecurityTelecom Security
Telecom Security
 
Creating New Models To Combat Business Email Compromise
Creating New Models To Combat Business Email CompromiseCreating New Models To Combat Business Email Compromise
Creating New Models To Combat Business Email Compromise
 

Último

Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
kauryashika82
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
Chris Hunter
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
PECB
 

Último (20)

INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 

ciso-platform-annual-summit-2013-Remote access server on multi tenant cloud for telc os & osps(pradeep k yadav)

  • 1. Remote Access Server on Multi Tenant Cloud for Telcos & OSPs BY PRADEEP KUMAR YADAV. (CEO & CISO, HITEC INDIA)
  • 2. Remote Access Server  Remote Access is the ability to get access to a computer or a network from a remote distance. A Remote Access Server is the computer and associated software that is set up to handle users seeking access to network remotely.  A Remote Access Server usually includes or is associated with a firewall server to ensure security and a router that can forward the remote access request to another part of the corporate network.  A remote access server could be hosted on a multi-tenant cloud so that a small group of different organizations Remote Access Users can share the common pool of RAS and its routers.  A remote access server may also be used as part of a virtual private network (VPN) or a Cloud connecting with Service Providers cloud.
  • 4. Remote Access Requirements as per Regulatory Compliances  TSP must deploy Remote Access Server by 31/12/2013 .  All Remote Access to the TSP be done only via Remote Access Server with the entire Remote sessions Server Activities video recording, Users credentials records, Access within Country only, Device Log records, storage on the TSP data center.  The Remote monitoring of on-Line and Off Line session by term cell.  Data for 2 Years to be kept on 1-year Online and 1 Year off line mode for audit by DoT.Vendors to TSP also adhere to the requirements and do the needful at their NOC End.
  • 5. Key Elements of Remote Access 1 ACL (Access Control List)  1.1 MAC (Media Access Control) filtering  1.2 IP (Internet Protocol) address filtering 2 Tunneling and encryption  2.1 SSL VPN (Secure Sockets Layer Virtual Private Network)  2.2 VPN (Virtual Private Network)  2.3 L2TP (Layer 2 Tunneling Protocol)  2.4 PPTP (Point-to-Point Tunneling Protocol)  2.5 IPsec (Internet Protocol Security) 3 Remote access  3.1 RAS (Remote Access Service)  3.2 RDP (Remote Desktop Protocol)  3.3 PPPoE (Point-to-Point Protocol over Ethernet)  3.4 PPP (Point-to-Point Protocol)  3.5 VNC (Virtual Network Computing)  3.6 ICA (Independent Computing Architecture) 4 Screen, Command, and Session Activity Log recording Software tool (and Monitoring) 5 Device LOG and Change Management Recording as Text File 6 Data Base with 1+1 Year Storage. 1 GB + 1 GB Ok for One Vendor Remote Session.
  • 6. Multi Tenancy Architecture Basics  Multi-tenancy is an architecture in which a single instance of a software application serves multiple customers. Each customer is called a tenant. Tenants may be given the ability to customize some parts of the application.  Multi-tenancy can be economical because software, hardware and maintenance costs are shared. It can be contrasted with single-tenancy, an architecture in which each customer has their own software instance and may be given access to limited Network and applications.  A software-as-a-service (SaaS) provider, for example, can run one instance of its application on one instance of a database and provide web access to multiple customers. In such a scenario, each tenant's data is isolated and remains invisible to other tenants.
  • 7. Multi Tenant Cloud – Individual & Collaboration