Protecting Your Cloud

Similar documents
SoftLayer Security and Compliance:

IBM Cloud Internet Services: Optimizing security to protect your web applications

Watson Developer Cloud Security Overview

Best Practices in Securing a Multicloud World

IBM Secure Proxy. Advanced edge security for your multienterprise. Secure your network at the edge. Highlights

A High-Performing Cloud Begins with a Strong Foundation. A solution guide for IBM Cloud bare metal servers

Protecting your data. EY s approach to data privacy and information security

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

How-to Guide: Tenable Nessus for Microsoft Azure. Last Updated: April 03, 2018

IBM Cloud Lessons Learned: VMware Cloud Foundation on IBM Cloud VMworld 2017 We are a cognitive solutions and cloud platform company that leverages th

HALO IN ACTION COMPLIANCE DON T LET LEGACY SECURITY TOOLS HOLD UP PCI COMPLIANCE IN THE CLOUD. Automated PCI compliance anytime, anywhere.

MAKING THE CLOUD A SECURE EXTENSION OF YOUR DATACENTER

IBM Internet Security Systems October Market Intelligence Brief

SECURITY ON AWS 8/3/17. AWS Security Standards MORE. By Max Ellsberry

How-to Guide: Tenable.io for Microsoft Azure. Last Updated: November 16, 2018

Move, manage, and run SAP applications in the cloud. SAP-Certified Infrastructure from IBM Cloud

Cloud Managed Services for Government (CMSG) A secure strategy for the Department of Defense at an IBM-operated, Level 5, DoD Facility

Introduction. Deployment Models. IBM Watson on the IBM Cloud Security Overview

ENDNOTE SECURITY OVERVIEW INCLUDING ENDNOTE DESKTOP AND ONLINE

Comprehensive Database Security

Simple and Powerful Security for PCI DSS

Virtustream Cloud and Managed Services Solutions for US State & Local Governments and Education

Future-ready security for small and mid-size enterprises

Information Security Controls Policy

Managing SaaS risks for cloud customers

Online Services Security v2.1

Twilio cloud communications SECURITY

Securing Cloud Applications with a Distributed Web Application Firewall Riverbed Technology

Deliver Data Protection Services that Boost Revenues and Margins

Cloud for Government: A Transformative Digital Tool to Better Serve Communities

Google Cloud & the General Data Protection Regulation (GDPR)

Reinvent Your 2013 Security Management Strategy

Secure Access & SWIFT Customer Security Controls Framework

Securing Your Cloud Introduction Presentation

STRATEGIC WHITE PAPER. Securing cloud environments with Nuage Networks VSP: Policy-based security automation and microsegmentation overview

PCI DSS Compliance. White Paper Parallels Remote Application Server

Crises Control Cloud Security Principles. Transputec provides ICT Services and Solutions to leading organisations around the globe.

Enterprise & Cloud Security

Controlled Document Page 1 of 6. Effective Date: 6/19/13. Approved by: CAB/F. Approved on: 6/19/13. Version Supersedes:

Securing Your Most Sensitive Data

SOLUTION BRIEF RSA ARCHER IT & SECURITY RISK MANAGEMENT

IBM Cloud IBM Cloud for VMware Solutions Zeb Ahmed Senior Offering Manager and BCDR Leader VMware on IBM Cloud VMworld 2017 Content: Not for publicati

IBM PowerSC. Designed for Enterprise Security & Compliance in Cloud and Virtualised environments. Highlights

SECURE SYSTEMS, NETWORKS AND DEVICES SAFEGUARDING CRITICAL INFRASTRUCTURE OPERATIONS

SOLUTION BRIEF. Enabling and Securing Digital Business in API Economy. Protect APIs Serving Business Critical Applications

Service. Sentry Cyber Security Gain protection against sophisticated and persistent security threats through our layered cyber defense solution

SECURITY PRACTICES OVERVIEW

IBM Security Access Manager

Security Terminology Related to a SOC

Building a More Secure Cloud Architecture

Verasys Enterprise Security and IT Guide

Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data

Security for the Cloud Era

Layer Security White Paper

Data center interconnect for the enterprise hybrid cloud

DEFINING SECURITY FOR TODAY S CLOUD ENVIRONMENTS. Security Without Compromise

ClearPath OS 2200 System LAN Security Overview. White paper

Accelerating the HCLS Industry Through Cloud Computing

IBM Global Technology Services Provide around-the-clock expertise and protect against Internet threats.

RMS(one) Solutions PROGRESSIVE SECURITY FOR MISSION CRITICAL SOLUTIONS

Data Sheet: Endpoint Security Symantec Network Access Control Starter Edition Simplified endpoint enforcement

Data Security and Privacy : Compliance to Stewardship. Jignesh Patel Solution Consultant,Oracle

Sichere Applikations- dienste

Perimeter Defenses T R U E N E T W O R K S E C U R I T Y DEPENDS ON MORE THAN

Escaping PCI purgatory.

Best Practices in Securing Your Customer Data in Salesforce, Force.com & Chatter

Locking Down the Cloud Security is Not a Myth

Cloud Managed Services: A comparison guide. What to look for when choosing your cloud provider

Automate sharing. Empower users. Retain control. Utilizes our purposebuilt cloud, not public shared clouds

Cloud Services. Infrastructure-as-a-Service

Understanding Cloud Migration. Ruth Wilson, Data Center Services Executive

NORTH AMERICAN SECURITIES ADMINISTRATORS ASSOCIATION Cybersecurity Checklist for Investment Advisers

Cloud Computing. Faculty of Information Systems. Duc.NHM. nhmduc.wordpress.com

CISCO NETWORKS BORDERLESS Cisco Systems, Inc. All rights reserved. 1

Securing Data in the Cloud: Point of View

Network Security Protection Alternatives for the Cloud

Continuous Diagnostics and Mitigation demands, CyberScope and beyond

Security Architecture

Verizon Software Defined Perimeter (SDP).

21ST CENTURY CYBER SECURITY FOR MEDIA AND BROADCASTING

AT&T Endpoint Security

How Secure is Blockchain? June 6 th, 2017

Your Roadmap to POWER9: Migration Scenarios

On Demand Cryptographic Resources for Your Virtual Data Center and the Cloud: Introducing SafeNet s Crypto Hypervisor

NERC CIP VERSION 6 BACKGROUND COMPLIANCE HIGHLIGHTS

Cloud Native Security. OpenShift Commons Briefing

Automating the Top 20 CIS Critical Security Controls

WHITE PAPER. Title. Managed Services for SAS Technology

RSA Solution Brief. Managing Risk Within Advanced Security Operations. RSA Solution Brief

RSA RISK FRAMEWORKS MAKING DIGITAL RISK MANAGEABLE

University of Pittsburgh Security Assessment Questionnaire (v1.7)

Securing Your Amazon Web Services Virtual Networks

NS2 Cloud Overview The Cloud Built for Federal Security and Export Controlled Environments. Hunter Downey, Cloud Solution Director

New! Checklist for HIPAA & HITECH Compliance Pabrai

GDPR Update and ENISA guidelines

Symantec Network Access Control Starter Edition

Networking for a dynamic infrastructure: getting it right.

CCISO Blueprint v1. EC-Council

McAfee Embedded Control for Healthcare

Total Threat Protection. Whitepaper

Transcription:

WHITE PAPER Protecting Your Cloud Maximize security in cloud-based solutions EXECUTIVE SUMMARY With new cloud technologies introduced daily, security remains a key focus. Hackers and phishers capable of malicious activity seek out vulnerable targets, sometimes causing severe damage that reaches well beyond a single event. Even small, seemingly innocuous gaps in security coverage can put everything at risk, including data, customer information, uptime, and potentially your organization s reputation. In this whitepaper, we will discuss these constant threats to cloud security and how to address them effectively.

Protecting Your Cloud 02 Trust and Accountability In a managed cloud infrastructure, you outsource the management of IT resources to cloud providers but you probably still wonder whether the benefits of cloud also come with security risks. You might worry about accountability, too. You may even question whether you can trust your cloud provider. If any of those concerns sound familiar, rest assured that most cloud providers are wellreputed known for protecting trust and for investing in their security infrastructures, including multiple levels of built-in, multi-layer security architecture options you can superimpose on your cloud environment. These security measures meet many of the standards set by governments and the industry, such as the U.S. Department of Defense (DoD) 5220.22-M standards, the NIST 800-53 framework, and compliance with HIPAA, FISMA, and SOC 2 Type II. By themselves, these security measures exceed even the best protection that any individual organization could implement on its own. But when it comes to securing critical information, accountability is everything. With so many cloud providers in the market, IBM Cloud encourages organizations to perform due diligence before signing a contract. Businesses and organizations should always have the option to move to another provider if they are dissatisfied with their current provider.

Protecting Your Cloud 03 Data Privacy and Protection If your business or organization traditionally stored its data in-house, moving data to cloud and ostensibly under a cloud provider s control can cause anxiety. You might question the cloud provider s ability to maintain the integrity of certain genres of information, such as personal, medical, or financial records of customers, while also meeting regulatory and legal requirements. While we understand the concern in theory, there s little to worry about in practice. IBM Cloud is well aware of data privacy and sovereignty issues. It is our business to help you protect your customers data against hackers and malicious attacks. We do our part to secure our infrastructure, too. This includes implementing automated Distributed Denial-of-Service (DDoS) migration, should a DDoS attack occur, and offering intrusion protection systems, firewalls, and SSL certificates so you meet your compliance requirements. Q: A: Can cloud providers access, use, or share my organization s data? No. Multi-tenant cloud environments may reside on shared physical servers, but data is only accessible by you not by any other tenants or the cloud provider.

Protecting Your Cloud 04 Securely Leveraging the Cloud How can a business or organization provision a secure cloud-based solution on demand? Proper tools, including a set of security products and services with expert advice when needed, help any cloud novice build, deploy, and manage a cloud solution. Here s a checklist for getting started: Provide secure connectivity, authentication, access control, and audit capabilities for IT administrators and users. Include VPNs, multifactor authentication, audit control logs, API keys, and other acute access control, allowing staff to securely access work data and connect to the application via HTTPS using SSL certificates. Enforce stringent data security measures. Leave data where customers put it. Never transfer customer data. Data cannot be shifted across borders, and data-at-rest and data-in-transit must be encrypted. Use encryption solutions such as CloudLink, Secure VM, IBM Cloud Data Encryption Services (ICDES), and ProtectV and Virtual KeySecure from SafeNet to ensure sensitive data-at-rest is not stored in clear text and that the customer maintains complete control of encryption keys. Ensure multi-layered security for network zone segmentation. Users and administrators must have confidence that their network is securely partitioned. IBM Cloud native and vendor solutions such as IBM Cloud VLANs, Vyatta Gateway, Fortigate firewall, and Citrix NetScaler allow administrators to securely partition a network, creating segmentation according to organizational needs and providing the routing and filtering needed to isolate users, workloads, and domains.

Protecting Your Cloud 05 Securely Leveraging the Cloud (continued) Enforce host security using anti-virus software, host intrusion prevention systems, and other solutions. Apply best-of-breed third-party solutions like Nessus Vulnerability Scanner, McAfee Antivirus, and McAfee Host Intrusion Protection to ensure administrators can protect their infrastructure from malware and other host attacks enhancing both system availability and performance. Define and enforce security policies for hybrid cloud environments. Audit any policy changes. Manage overall policies for the combined public-private environment using IBM solutions like QRadar, Hosted Security Event and Log Management Service, and xforce Threat Analysis Service. Use solutions from vendors like CloudPassage, Sumo Logic, and ObserveIT to automatically define policies around firewall rules, file integrity, security configuration, and access control, and to audit adherence to such policies.

Protecting Your Cloud 06 Secure Your Cloud Now Cloud security is more important than ever. In fact, cloud-based solutions are not only more flexible, scalable, and dynamic in providing both shortterm and long-term IT resources, but they are inherently more secure, more practical, and make better economic sense. Whether you are building your cloud solution for the first time or expanding your existing cloud environment, IBM Cloud has the resources to help you secure it. Contact us today to learn more about the security solutions discussed here or to learn more about other IBM Cloud products and services. What can you do next? Learn more about firewalls, security software, SSL certificates, and other security features: https://ibm.biz/protect-your-cloud Read the IBM Cloud data security and privacy principles: https://ibm.co/datasecurity Read the IBM Business Conduct Guidelines: https://ibm.co/bcg Ask us questions at clouddigitalsales@us.ibm.com or call us at 866-398-7638 Copyright IBM Corporation 2018 IBM Corporation New Orchard Road Armonk, NY 10504 Produced in the United States of America 2018 IBM, the IBM logo, ibm.com, and Bluemix are trademarks of International Business Machines Corp., registered in many jurisdictions worldwide. Other product and service names might be trademarks of IBM or other companies. A current list of IBM trademarks is available on the Web at Copyright and trademark information at www.ibm.com/legal/copytrade.shtml