SlideShare una empresa de Scribd logo
1 de 11
Descargar para leer sin conexión
www.skyviewpartners.com                                                                                       6/7/2012




                                                                             Carol Woodbury, President
                                                                                 SkyView Partners, Inc.
                                                                             www.skyviewpartners.com
                                                                                     @carolwoodbury




                                                          (c) SkyView Partners, Inc, 2012.
                                                                 All Rights Reserved.                     1




                                                        (c) SkyView Partners, Inc, 2012.
                                                               All Rights Reserved.                       2




(c) SkyView Partners, Inc, 2012. All Rights Reserved.                                                               1
www.skyviewpartners.com                                                                         6/7/2012




                            Benefits:                        However:
                             Hardware                        Must meet
                             Support of the                   requirements of
                              hardware                         security policy
                             Software licensing              Legal requirements

                             Software maintenance            Compliance
                                                               requirements




                                                         (c) SkyView Partners, Inc, 2012.
                                                                All Rights Reserved.        3




                               Depends on the type of data




                                                         (c) SkyView Partners, Inc, 2012.
                                                                All Rights Reserved.        4




(c) SkyView Partners, Inc, 2012. All Rights Reserved.                                                 2
www.skyviewpartners.com                                                                            6/7/2012




                               EU Data Protection Laws
                                ◦ Currently being revised




                                                            (c) SkyView Partners, Inc, 2012.
                                                                   All Rights Reserved.        5




                            Determines
                             Default access
                             Encryption requirements
                             Retention requirements
                             Storage requirements
                             Disposal method (both printed and online)


                            While considering
                             Compliance requirements
                             Legal considerations



                                                            (c) SkyView Partners, Inc, 2012.
                                                                   All Rights Reserved.        6




(c) SkyView Partners, Inc, 2012. All Rights Reserved.                                                    3
www.skyviewpartners.com                                                                            6/7/2012




                               Data classification requirements don’t change just
                                because the data is now in the cloud




                                                            (c) SkyView Partners, Inc, 2012.
                                                                   All Rights Reserved.        7




                               Carefully plan the security and privacy aspects of cloud
                                computing solutions before engaging them (a cloud
                                provider.)
                               Understand the public cloud computing environment
                                offered by the cloud provider.
                               Ensure that a cloud computing solution satisfies
                                organizational security and privacy requirements.
                               Ensure that the client-side computing environment meets
                                organizational security and privacy requirements for cloud
                                computing.
                               Maintain accountability over the privacy and security of
                                data and applications implemented and deployed in public
                                cloud computing environments.

                                                            (c) SkyView Partners, Inc, 2012.
                                                                   All Rights Reserved.        8




(c) SkyView Partners, Inc, 2012. All Rights Reserved.                                                    4
www.skyviewpartners.com                                                                               6/7/2012




                               Encryption
                               Auditing (logging)
                               No passwords in cleartext
                               Access controls
                               Reporting
                               Incident response handling

                               What will a QSA or auditor say …?



                                                              (c) SkyView Partners, Inc, 2012.
                                                                     All Rights Reserved.         9




                               Where is the data physically located
                               Incident response handling
                                ◦ Do you and provider have the same definition of a breach?
                               Can your SLAs be fulfilled?
                                ◦ (think disaster-recovery)


                               As well as compliance requirements




                                                              (c) SkyView Partners, Inc, 2012.
                                                                     All Rights Reserved.        10




(c) SkyView Partners, Inc, 2012. All Rights Reserved.                                                       5
www.skyviewpartners.com                                                                                  6/7/2012




                               Questions for providers’ security practices:
                                ◦   Is admin (root) power limited to only those users needing it?
                                ◦   Who/What is logged?
                                ◦   Do administrators access systems via encrypted sessions?
                                ◦   What is the patch management strategy?
                                ◦   What anti-virus / anti-malware software is used?
                                ◦   Are the servers in compliance with
                                     PCI
                                     SOX
                                     HIPAA
                                ◦ Who are you audited by and can we see the results?

                                                                 (c) SkyView Partners, Inc, 2012.
                                                                        All Rights Reserved.        11




                               User management:
                                ◦ Process to integrate with HR to remove access?
                                     What about immediate removal for terminated
                                      employees/contractors?
                                ◦ Password composition rules?
                                ◦ Password change rules?




                                                                 (c) SkyView Partners, Inc, 2012.
                                                                        All Rights Reserved.        12




(c) SkyView Partners, Inc, 2012. All Rights Reserved.                                                          6
www.skyviewpartners.com                                                                                      6/7/2012




                               Logging:
                                ◦ Invalid sign on attempts
                                     Lock-out for excess attempts
                                ◦   Reads and changes to HIPAA or PCI data
                                ◦   Access attempts to data
                                ◦   Retention of the logs
                                ◦   Review of the logs

                               Network logging:
                                ◦ Connections
                                ◦ Data movement – what about DLP?

                                                                     (c) SkyView Partners, Inc, 2012.
                                                                            All Rights Reserved.        13




                               Because the service provider holds so much data, they
                                may become a victim of a targeted attack

                               However … provider likely has
                                ◦ Network monitoring
                                ◦ Trained personnel to recognize and respond to the attack
                                ◦ Knowledge / Hardware to prevent or limit the attack




                                                                     (c) SkyView Partners, Inc, 2012.
                                                                            All Rights Reserved.        14




(c) SkyView Partners, Inc, 2012. All Rights Reserved.                                                              7
www.skyviewpartners.com                                                                                   6/7/2012




                               Business level objectives
                               Responsibilities of both parties
                               Business continuity/disaster recovery
                               Redundancy
                               Maintenance
                               Data location
                               Data seizure
                               Provider failure
                               Jurisdiction
                               Brokers and resellers

                            http://www.ibm.com/developerworks/cloud/library/cl-
                            rev2sla.html?ca=drs-


                                                               (c) SkyView Partners, Inc, 2012.
                                                                      All Rights Reserved.           15




                               Security                               Incident response
                               Data encryption                        Transparency
                               Privacy                                Certification
                               Data retention and                     Performance definitions
                                deletion                               Monitoring
                               Hardware erasure,                      Auditability
                                destruction                            Metrics
                               Regulatory compliance                  Human interaction


                                                              (c) SkyView Partners, Inc, 2012. All
                                                                        Rights Reserved.             16




(c) SkyView Partners, Inc, 2012. All Rights Reserved.                                                           8
www.skyviewpartners.com                                                                              6/7/2012




                               Determine your organization’s security and compliance
                                requirements for the type of data going to the cloud
                               Put the appropriate SLA in place
                                ◦ Terminology / Communication is key – make sure you agree to
                                  each others’ definitions
                               Monitor the results to determine if SLA is being met




                                                             (c) SkyView Partners, Inc, 2012.
                                                                    All Rights Reserved.        17




                               Find your private and confidential data

                               Do not assume it doesn’t exist just because it’s not
                                supposed to be a on specific server or in a specific
                                database!




                                                             (c) SkyView Partners, Inc, 2012.
                                                                    All Rights Reserved.        18




(c) SkyView Partners, Inc, 2012. All Rights Reserved.                                                      9
www.skyviewpartners.com                                                                                 6/7/2012




                               Many organizations are realizing the benefits of
                                “private” clouds
                                ◦ Reduced hardware / software costs
                                ◦ Quicker patching
                                ◦ Consolidated security expertise
                                   Monitoring (NOC)
                                   Recognition and response to incidents
                                ◦ Consolidated logging (correlated events)
                                ◦ More layers of security (depending on the data requirements)




                                                                (c) SkyView Partners, Inc, 2012.
                                                                       All Rights Reserved.        19




                               Clouds specializing in meeting compliance needs:
                                ◦ PCI
                                ◦ HIPAA

                               Significantly more expensive but consider that with
                                public clouds you ‘get what you pay for.’




                                                                (c) SkyView Partners, Inc, 2012.
                                                                       All Rights Reserved.        20




(c) SkyView Partners, Inc, 2012. All Rights Reserved.                                                        10
www.skyviewpartners.com                                                                                                 6/7/2012




                               Service providers have been providing “cloud” services
                                for many years
                                ◦ Private / Specialized cloud – typically without the dynamic
                                  allocation of new resources
                               Security/Compliance/Legal requirements you make of
                                them are the same as what we’ve been discussing.




                                                                           (c) SkyView Partners, Inc, 2012.
                                                                                  All Rights Reserved.             21




                            Best practices and Certifications for Cloud Security
                             https://cloudsecurityalliance.org/


                            Guidelines on Security and Privacy in Public Cloud Computing – National Institute of
                            Standards and Technology (NIST) SP 800-144
                               http://csrc.nist.gov/publications/nistpubs/800-144/SP800-144.pdf

                            Cloud Computing Synopsis and Recommendations - – National Institute of Standards and
                            Technology (NIST) SP 800-146 – DRAFT
                             http://csrc.nist.gov/publications/drafts/800-146/Draft-NIST-SP800-146.pdf


                            Articles:
                             www.sans.org
                             www.isaca.org
                             Search ‘European cloud Computing Strategy’


                            Contact us at: info@skyviewpartners.com
                                             @carolwoodbury


                                                                           (c) SkyView Partners, Inc, 2012.
                                                                                  All Rights Reserved.             22




(c) SkyView Partners, Inc, 2012. All Rights Reserved.                                                                        11

Más contenido relacionado

Destacado

Business continuity with SAP on IBM i
Business continuity with SAP on IBM iBusiness continuity with SAP on IBM i
Business continuity with SAP on IBM iCOMMON Europe
 
Practical web services for RPG lab exercises
Practical web services for RPG lab exercisesPractical web services for RPG lab exercises
Practical web services for RPG lab exercisesCOMMON Europe
 
IBM Systems Director Navigator for i
IBM Systems Director Navigator for iIBM Systems Director Navigator for i
IBM Systems Director Navigator for iCOMMON Europe
 
What's new with Zend server
What's new with Zend serverWhat's new with Zend server
What's new with Zend serverCOMMON Europe
 
Using Ruby on IBM i (i5/OS)
Using Ruby on IBM i (i5/OS)Using Ruby on IBM i (i5/OS)
Using Ruby on IBM i (i5/OS)COMMON Europe
 
Practical PHP by example Jan Leth-Kjaer
Practical PHP by example   Jan Leth-KjaerPractical PHP by example   Jan Leth-Kjaer
Practical PHP by example Jan Leth-KjaerCOMMON Europe
 
Compiling the Compiler
Compiling the CompilerCompiling the Compiler
Compiling the CompilerCOMMON Europe
 

Destacado (7)

Business continuity with SAP on IBM i
Business continuity with SAP on IBM iBusiness continuity with SAP on IBM i
Business continuity with SAP on IBM i
 
Practical web services for RPG lab exercises
Practical web services for RPG lab exercisesPractical web services for RPG lab exercises
Practical web services for RPG lab exercises
 
IBM Systems Director Navigator for i
IBM Systems Director Navigator for iIBM Systems Director Navigator for i
IBM Systems Director Navigator for i
 
What's new with Zend server
What's new with Zend serverWhat's new with Zend server
What's new with Zend server
 
Using Ruby on IBM i (i5/OS)
Using Ruby on IBM i (i5/OS)Using Ruby on IBM i (i5/OS)
Using Ruby on IBM i (i5/OS)
 
Practical PHP by example Jan Leth-Kjaer
Practical PHP by example   Jan Leth-KjaerPractical PHP by example   Jan Leth-Kjaer
Practical PHP by example Jan Leth-Kjaer
 
Compiling the Compiler
Compiling the CompilerCompiling the Compiler
Compiling the Compiler
 

Similar a Security considerations for the cloud

Partner Webcast – Oracle Public Cloud for ISVs: Migrating Java EE and ADF app...
Partner Webcast – Oracle Public Cloud for ISVs: Migrating Java EE and ADF app...Partner Webcast – Oracle Public Cloud for ISVs: Migrating Java EE and ADF app...
Partner Webcast – Oracle Public Cloud for ISVs: Migrating Java EE and ADF app...Thanos TP
 
Securing Your Cloud Servers with Halo NetSec
Securing Your Cloud Servers with Halo NetSecSecuring Your Cloud Servers with Halo NetSec
Securing Your Cloud Servers with Halo NetSecCloudPassage
 
OAuth 101 & Secure APIs 2012 Cloud Identity Summit
OAuth 101 & Secure APIs 2012 Cloud Identity SummitOAuth 101 & Secure APIs 2012 Cloud Identity Summit
OAuth 101 & Secure APIs 2012 Cloud Identity SummitBrian Campbell
 
Software Defined Data Center: The Intersection of Networking and Storage
Software Defined Data Center: The Intersection of Networking and StorageSoftware Defined Data Center: The Intersection of Networking and Storage
Software Defined Data Center: The Intersection of Networking and StorageEMC
 
eFolder AppAssure Cloud Briefing_Public
eFolder AppAssure Cloud Briefing_PubliceFolder AppAssure Cloud Briefing_Public
eFolder AppAssure Cloud Briefing_PublicDropbox
 
Setting Up Your Mobile Testing Factory for 2013
Setting Up Your Mobile Testing Factory for 2013Setting Up Your Mobile Testing Factory for 2013
Setting Up Your Mobile Testing Factory for 2013SOASTA
 
Software Defined Data Center: The Intersection of Networking and Storage
Software Defined Data Center: The Intersection of Networking and StorageSoftware Defined Data Center: The Intersection of Networking and Storage
Software Defined Data Center: The Intersection of Networking and StorageEMC
 
Geting cloud architecture right the first time linthicum interop fall 2013
Geting cloud architecture right the first time linthicum interop fall 2013Geting cloud architecture right the first time linthicum interop fall 2013
Geting cloud architecture right the first time linthicum interop fall 2013David Linthicum
 
Code objects overview sep 2012
Code objects overview   sep 2012Code objects overview   sep 2012
Code objects overview sep 2012steveramsthel
 
Code objects overview sep 2012
Code objects overview   sep 2012Code objects overview   sep 2012
Code objects overview sep 2012steveramsthel
 
STPCon fall 2012: The Testing Renaissance Has Arrived
STPCon fall 2012: The Testing Renaissance Has ArrivedSTPCon fall 2012: The Testing Renaissance Has Arrived
STPCon fall 2012: The Testing Renaissance Has ArrivedSOASTA
 
Cloud security ely kahn
Cloud security   ely kahnCloud security   ely kahn
Cloud security ely kahnEly Kahn
 
eFolder BDR Partner Presentation
eFolder BDR Partner PresentationeFolder BDR Partner Presentation
eFolder BDR Partner PresentationDropbox
 
eFolder Webinar, Seven Great Reasons to Upgrade Legacy BDRs Now
eFolder Webinar, Seven Great Reasons to Upgrade Legacy BDRs NoweFolder Webinar, Seven Great Reasons to Upgrade Legacy BDRs Now
eFolder Webinar, Seven Great Reasons to Upgrade Legacy BDRs NowDropbox
 
Exploiting Linked Data via Filemaker
Exploiting Linked Data via FilemakerExploiting Linked Data via Filemaker
Exploiting Linked Data via FilemakerKingsley Uyi Idehen
 
AWS Meetup: Career Day 2019 - Lightning Talk with Cloud Career Path: DevOps E...
AWS Meetup: Career Day 2019 - Lightning Talk with Cloud Career Path: DevOps E...AWS Meetup: Career Day 2019 - Lightning Talk with Cloud Career Path: DevOps E...
AWS Meetup: Career Day 2019 - Lightning Talk with Cloud Career Path: DevOps E...AWS User Group - Thailand
 
Identity Management for the Cloud
Identity Management for the CloudIdentity Management for the Cloud
Identity Management for the CloudHorst Walther
 
eFolder Webinar: How One Partner Leverages Dell AppAssure and StorageCraft
eFolder Webinar: How One Partner Leverages Dell AppAssure and StorageCrafteFolder Webinar: How One Partner Leverages Dell AppAssure and StorageCraft
eFolder Webinar: How One Partner Leverages Dell AppAssure and StorageCraftDropbox
 
CA Security - Deloitte IAM Summit - Vasu
CA Security - Deloitte IAM Summit  - VasuCA Security - Deloitte IAM Summit  - Vasu
CA Security - Deloitte IAM Summit - VasuVasu Surabhi
 

Similar a Security considerations for the cloud (20)

Partner Webcast – Oracle Public Cloud for ISVs: Migrating Java EE and ADF app...
Partner Webcast – Oracle Public Cloud for ISVs: Migrating Java EE and ADF app...Partner Webcast – Oracle Public Cloud for ISVs: Migrating Java EE and ADF app...
Partner Webcast – Oracle Public Cloud for ISVs: Migrating Java EE and ADF app...
 
Securing Your Cloud Servers with Halo NetSec
Securing Your Cloud Servers with Halo NetSecSecuring Your Cloud Servers with Halo NetSec
Securing Your Cloud Servers with Halo NetSec
 
OAuth 101 & Secure APIs 2012 Cloud Identity Summit
OAuth 101 & Secure APIs 2012 Cloud Identity SummitOAuth 101 & Secure APIs 2012 Cloud Identity Summit
OAuth 101 & Secure APIs 2012 Cloud Identity Summit
 
Software Defined Data Center: The Intersection of Networking and Storage
Software Defined Data Center: The Intersection of Networking and StorageSoftware Defined Data Center: The Intersection of Networking and Storage
Software Defined Data Center: The Intersection of Networking and Storage
 
eFolder AppAssure Cloud Briefing_Public
eFolder AppAssure Cloud Briefing_PubliceFolder AppAssure Cloud Briefing_Public
eFolder AppAssure Cloud Briefing_Public
 
Setting Up Your Mobile Testing Factory for 2013
Setting Up Your Mobile Testing Factory for 2013Setting Up Your Mobile Testing Factory for 2013
Setting Up Your Mobile Testing Factory for 2013
 
Software Defined Data Center: The Intersection of Networking and Storage
Software Defined Data Center: The Intersection of Networking and StorageSoftware Defined Data Center: The Intersection of Networking and Storage
Software Defined Data Center: The Intersection of Networking and Storage
 
Geting cloud architecture right the first time linthicum interop fall 2013
Geting cloud architecture right the first time linthicum interop fall 2013Geting cloud architecture right the first time linthicum interop fall 2013
Geting cloud architecture right the first time linthicum interop fall 2013
 
Code objects overview sep 2012
Code objects overview   sep 2012Code objects overview   sep 2012
Code objects overview sep 2012
 
Code objects overview sep 2012
Code objects overview   sep 2012Code objects overview   sep 2012
Code objects overview sep 2012
 
STPCon fall 2012: The Testing Renaissance Has Arrived
STPCon fall 2012: The Testing Renaissance Has ArrivedSTPCon fall 2012: The Testing Renaissance Has Arrived
STPCon fall 2012: The Testing Renaissance Has Arrived
 
Cloud security ely kahn
Cloud security   ely kahnCloud security   ely kahn
Cloud security ely kahn
 
eFolder BDR Partner Presentation
eFolder BDR Partner PresentationeFolder BDR Partner Presentation
eFolder BDR Partner Presentation
 
WinWire_azure_session
WinWire_azure_sessionWinWire_azure_session
WinWire_azure_session
 
eFolder Webinar, Seven Great Reasons to Upgrade Legacy BDRs Now
eFolder Webinar, Seven Great Reasons to Upgrade Legacy BDRs NoweFolder Webinar, Seven Great Reasons to Upgrade Legacy BDRs Now
eFolder Webinar, Seven Great Reasons to Upgrade Legacy BDRs Now
 
Exploiting Linked Data via Filemaker
Exploiting Linked Data via FilemakerExploiting Linked Data via Filemaker
Exploiting Linked Data via Filemaker
 
AWS Meetup: Career Day 2019 - Lightning Talk with Cloud Career Path: DevOps E...
AWS Meetup: Career Day 2019 - Lightning Talk with Cloud Career Path: DevOps E...AWS Meetup: Career Day 2019 - Lightning Talk with Cloud Career Path: DevOps E...
AWS Meetup: Career Day 2019 - Lightning Talk with Cloud Career Path: DevOps E...
 
Identity Management for the Cloud
Identity Management for the CloudIdentity Management for the Cloud
Identity Management for the Cloud
 
eFolder Webinar: How One Partner Leverages Dell AppAssure and StorageCraft
eFolder Webinar: How One Partner Leverages Dell AppAssure and StorageCrafteFolder Webinar: How One Partner Leverages Dell AppAssure and StorageCraft
eFolder Webinar: How One Partner Leverages Dell AppAssure and StorageCraft
 
CA Security - Deloitte IAM Summit - Vasu
CA Security - Deloitte IAM Summit  - VasuCA Security - Deloitte IAM Summit  - Vasu
CA Security - Deloitte IAM Summit - Vasu
 

Más de COMMON Europe

What's New in WebSphere Application Server
What's New in WebSphere Application ServerWhat's New in WebSphere Application Server
What's New in WebSphere Application ServerCOMMON Europe
 
Workload Groups overview updates
Workload Groups overview updatesWorkload Groups overview updates
Workload Groups overview updatesCOMMON Europe
 
Why i - Common Europe 2012
Why i - Common Europe 2012Why i - Common Europe 2012
Why i - Common Europe 2012COMMON Europe
 
The Ruby OpenSSL extension
The Ruby OpenSSL extensionThe Ruby OpenSSL extension
The Ruby OpenSSL extensionCOMMON Europe
 
IBM i Trends & Directions Common Europe 2012
IBM i Trends & Directions Common Europe 2012IBM i Trends & Directions Common Europe 2012
IBM i Trends & Directions Common Europe 2012COMMON Europe
 
IBM i Technology Refreshes Overview 2012 06-04
IBM i Technology Refreshes Overview 2012 06-04IBM i Technology Refreshes Overview 2012 06-04
IBM i Technology Refreshes Overview 2012 06-04COMMON Europe
 
IBM i 7.1 & TRs CEC 2012
IBM i 7.1 & TRs CEC 2012IBM i 7.1 & TRs CEC 2012
IBM i 7.1 & TRs CEC 2012COMMON Europe
 
DB2 Web Query whats new
DB2 Web Query whats newDB2 Web Query whats new
DB2 Web Query whats newCOMMON Europe
 
Access client solutions overview
Access client solutions overviewAccess client solutions overview
Access client solutions overviewCOMMON Europe
 
Php arrays for RPG programmers
Php arrays for RPG programmersPhp arrays for RPG programmers
Php arrays for RPG programmersCOMMON Europe
 
Open source report writing tools for IBM i Vienna 2012
Open source report writing tools for IBM i  Vienna 2012Open source report writing tools for IBM i  Vienna 2012
Open source report writing tools for IBM i Vienna 2012COMMON Europe
 
Introduction to My SQL
Introduction to My SQLIntroduction to My SQL
Introduction to My SQLCOMMON Europe
 
IBM CEC 2012 Storage june 11, 2012
IBM CEC 2012 Storage june 11, 2012IBM CEC 2012 Storage june 11, 2012
IBM CEC 2012 Storage june 11, 2012COMMON Europe
 
Getting started with PHP on IBM i
Getting started with PHP on IBM iGetting started with PHP on IBM i
Getting started with PHP on IBM iCOMMON Europe
 
Developing mobile applications for i using open source tools Venna 2012
Developing mobile applications for i using open source tools  Venna 2012Developing mobile applications for i using open source tools  Venna 2012
Developing mobile applications for i using open source tools Venna 2012COMMON Europe
 
DB2 for i 7.1 - Whats New?
DB2 for i 7.1 - Whats New?DB2 for i 7.1 - Whats New?
DB2 for i 7.1 - Whats New?COMMON Europe
 
Common Europe SAP on i for beginners
Common Europe SAP on i for beginnersCommon Europe SAP on i for beginners
Common Europe SAP on i for beginnersCOMMON Europe
 
Business value of PHP
Business value of PHPBusiness value of PHP
Business value of PHPCOMMON Europe
 
AD for i in modern world
AD for i in modern worldAD for i in modern world
AD for i in modern worldCOMMON Europe
 

Más de COMMON Europe (20)

What's New in WebSphere Application Server
What's New in WebSphere Application ServerWhat's New in WebSphere Application Server
What's New in WebSphere Application Server
 
Workload Groups overview updates
Workload Groups overview updatesWorkload Groups overview updates
Workload Groups overview updates
 
Why i - Common Europe 2012
Why i - Common Europe 2012Why i - Common Europe 2012
Why i - Common Europe 2012
 
The Ruby OpenSSL extension
The Ruby OpenSSL extensionThe Ruby OpenSSL extension
The Ruby OpenSSL extension
 
IBM i Trends & Directions Common Europe 2012
IBM i Trends & Directions Common Europe 2012IBM i Trends & Directions Common Europe 2012
IBM i Trends & Directions Common Europe 2012
 
IBM i Technology Refreshes Overview 2012 06-04
IBM i Technology Refreshes Overview 2012 06-04IBM i Technology Refreshes Overview 2012 06-04
IBM i Technology Refreshes Overview 2012 06-04
 
IBM i 7.1 & TRs CEC 2012
IBM i 7.1 & TRs CEC 2012IBM i 7.1 & TRs CEC 2012
IBM i 7.1 & TRs CEC 2012
 
DB2 Web Query whats new
DB2 Web Query whats newDB2 Web Query whats new
DB2 Web Query whats new
 
Access client solutions overview
Access client solutions overviewAccess client solutions overview
Access client solutions overview
 
RPG investment
RPG investmentRPG investment
RPG investment
 
Php arrays for RPG programmers
Php arrays for RPG programmersPhp arrays for RPG programmers
Php arrays for RPG programmers
 
Open source report writing tools for IBM i Vienna 2012
Open source report writing tools for IBM i  Vienna 2012Open source report writing tools for IBM i  Vienna 2012
Open source report writing tools for IBM i Vienna 2012
 
Introduction to My SQL
Introduction to My SQLIntroduction to My SQL
Introduction to My SQL
 
IBM CEC 2012 Storage june 11, 2012
IBM CEC 2012 Storage june 11, 2012IBM CEC 2012 Storage june 11, 2012
IBM CEC 2012 Storage june 11, 2012
 
Getting started with PHP on IBM i
Getting started with PHP on IBM iGetting started with PHP on IBM i
Getting started with PHP on IBM i
 
Developing mobile applications for i using open source tools Venna 2012
Developing mobile applications for i using open source tools  Venna 2012Developing mobile applications for i using open source tools  Venna 2012
Developing mobile applications for i using open source tools Venna 2012
 
DB2 for i 7.1 - Whats New?
DB2 for i 7.1 - Whats New?DB2 for i 7.1 - Whats New?
DB2 for i 7.1 - Whats New?
 
Common Europe SAP on i for beginners
Common Europe SAP on i for beginnersCommon Europe SAP on i for beginners
Common Europe SAP on i for beginners
 
Business value of PHP
Business value of PHPBusiness value of PHP
Business value of PHP
 
AD for i in modern world
AD for i in modern worldAD for i in modern world
AD for i in modern world
 

Último

🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Principled Technologies
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 

Último (20)

🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 

Security considerations for the cloud

  • 1. www.skyviewpartners.com 6/7/2012 Carol Woodbury, President SkyView Partners, Inc. www.skyviewpartners.com @carolwoodbury (c) SkyView Partners, Inc, 2012. All Rights Reserved. 1 (c) SkyView Partners, Inc, 2012. All Rights Reserved. 2 (c) SkyView Partners, Inc, 2012. All Rights Reserved. 1
  • 2. www.skyviewpartners.com 6/7/2012 Benefits: However:  Hardware  Must meet  Support of the requirements of hardware security policy  Software licensing  Legal requirements  Software maintenance  Compliance requirements (c) SkyView Partners, Inc, 2012. All Rights Reserved. 3  Depends on the type of data (c) SkyView Partners, Inc, 2012. All Rights Reserved. 4 (c) SkyView Partners, Inc, 2012. All Rights Reserved. 2
  • 3. www.skyviewpartners.com 6/7/2012  EU Data Protection Laws ◦ Currently being revised (c) SkyView Partners, Inc, 2012. All Rights Reserved. 5 Determines  Default access  Encryption requirements  Retention requirements  Storage requirements  Disposal method (both printed and online) While considering  Compliance requirements  Legal considerations (c) SkyView Partners, Inc, 2012. All Rights Reserved. 6 (c) SkyView Partners, Inc, 2012. All Rights Reserved. 3
  • 4. www.skyviewpartners.com 6/7/2012  Data classification requirements don’t change just because the data is now in the cloud (c) SkyView Partners, Inc, 2012. All Rights Reserved. 7  Carefully plan the security and privacy aspects of cloud computing solutions before engaging them (a cloud provider.)  Understand the public cloud computing environment offered by the cloud provider.  Ensure that a cloud computing solution satisfies organizational security and privacy requirements.  Ensure that the client-side computing environment meets organizational security and privacy requirements for cloud computing.  Maintain accountability over the privacy and security of data and applications implemented and deployed in public cloud computing environments. (c) SkyView Partners, Inc, 2012. All Rights Reserved. 8 (c) SkyView Partners, Inc, 2012. All Rights Reserved. 4
  • 5. www.skyviewpartners.com 6/7/2012  Encryption  Auditing (logging)  No passwords in cleartext  Access controls  Reporting  Incident response handling  What will a QSA or auditor say …? (c) SkyView Partners, Inc, 2012. All Rights Reserved. 9  Where is the data physically located  Incident response handling ◦ Do you and provider have the same definition of a breach?  Can your SLAs be fulfilled? ◦ (think disaster-recovery)  As well as compliance requirements (c) SkyView Partners, Inc, 2012. All Rights Reserved. 10 (c) SkyView Partners, Inc, 2012. All Rights Reserved. 5
  • 6. www.skyviewpartners.com 6/7/2012  Questions for providers’ security practices: ◦ Is admin (root) power limited to only those users needing it? ◦ Who/What is logged? ◦ Do administrators access systems via encrypted sessions? ◦ What is the patch management strategy? ◦ What anti-virus / anti-malware software is used? ◦ Are the servers in compliance with  PCI  SOX  HIPAA ◦ Who are you audited by and can we see the results? (c) SkyView Partners, Inc, 2012. All Rights Reserved. 11  User management: ◦ Process to integrate with HR to remove access?  What about immediate removal for terminated employees/contractors? ◦ Password composition rules? ◦ Password change rules? (c) SkyView Partners, Inc, 2012. All Rights Reserved. 12 (c) SkyView Partners, Inc, 2012. All Rights Reserved. 6
  • 7. www.skyviewpartners.com 6/7/2012  Logging: ◦ Invalid sign on attempts  Lock-out for excess attempts ◦ Reads and changes to HIPAA or PCI data ◦ Access attempts to data ◦ Retention of the logs ◦ Review of the logs  Network logging: ◦ Connections ◦ Data movement – what about DLP? (c) SkyView Partners, Inc, 2012. All Rights Reserved. 13  Because the service provider holds so much data, they may become a victim of a targeted attack  However … provider likely has ◦ Network monitoring ◦ Trained personnel to recognize and respond to the attack ◦ Knowledge / Hardware to prevent or limit the attack (c) SkyView Partners, Inc, 2012. All Rights Reserved. 14 (c) SkyView Partners, Inc, 2012. All Rights Reserved. 7
  • 8. www.skyviewpartners.com 6/7/2012  Business level objectives  Responsibilities of both parties  Business continuity/disaster recovery  Redundancy  Maintenance  Data location  Data seizure  Provider failure  Jurisdiction  Brokers and resellers http://www.ibm.com/developerworks/cloud/library/cl- rev2sla.html?ca=drs- (c) SkyView Partners, Inc, 2012. All Rights Reserved. 15  Security  Incident response  Data encryption  Transparency  Privacy  Certification  Data retention and  Performance definitions deletion  Monitoring  Hardware erasure,  Auditability destruction  Metrics  Regulatory compliance  Human interaction (c) SkyView Partners, Inc, 2012. All Rights Reserved. 16 (c) SkyView Partners, Inc, 2012. All Rights Reserved. 8
  • 9. www.skyviewpartners.com 6/7/2012  Determine your organization’s security and compliance requirements for the type of data going to the cloud  Put the appropriate SLA in place ◦ Terminology / Communication is key – make sure you agree to each others’ definitions  Monitor the results to determine if SLA is being met (c) SkyView Partners, Inc, 2012. All Rights Reserved. 17  Find your private and confidential data  Do not assume it doesn’t exist just because it’s not supposed to be a on specific server or in a specific database! (c) SkyView Partners, Inc, 2012. All Rights Reserved. 18 (c) SkyView Partners, Inc, 2012. All Rights Reserved. 9
  • 10. www.skyviewpartners.com 6/7/2012  Many organizations are realizing the benefits of “private” clouds ◦ Reduced hardware / software costs ◦ Quicker patching ◦ Consolidated security expertise  Monitoring (NOC)  Recognition and response to incidents ◦ Consolidated logging (correlated events) ◦ More layers of security (depending on the data requirements) (c) SkyView Partners, Inc, 2012. All Rights Reserved. 19  Clouds specializing in meeting compliance needs: ◦ PCI ◦ HIPAA  Significantly more expensive but consider that with public clouds you ‘get what you pay for.’ (c) SkyView Partners, Inc, 2012. All Rights Reserved. 20 (c) SkyView Partners, Inc, 2012. All Rights Reserved. 10
  • 11. www.skyviewpartners.com 6/7/2012  Service providers have been providing “cloud” services for many years ◦ Private / Specialized cloud – typically without the dynamic allocation of new resources  Security/Compliance/Legal requirements you make of them are the same as what we’ve been discussing. (c) SkyView Partners, Inc, 2012. All Rights Reserved. 21 Best practices and Certifications for Cloud Security  https://cloudsecurityalliance.org/ Guidelines on Security and Privacy in Public Cloud Computing – National Institute of Standards and Technology (NIST) SP 800-144  http://csrc.nist.gov/publications/nistpubs/800-144/SP800-144.pdf Cloud Computing Synopsis and Recommendations - – National Institute of Standards and Technology (NIST) SP 800-146 – DRAFT  http://csrc.nist.gov/publications/drafts/800-146/Draft-NIST-SP800-146.pdf Articles:  www.sans.org  www.isaca.org  Search ‘European cloud Computing Strategy’ Contact us at: info@skyviewpartners.com @carolwoodbury (c) SkyView Partners, Inc, 2012. All Rights Reserved. 22 (c) SkyView Partners, Inc, 2012. All Rights Reserved. 11