Building a Secure and Compliant Cloud Infrastructure. Ben Goodman Principal Strategist, Identity, Compliance and Security Novell, Inc.

Similar documents
SUSE Manager Roadmap OS Lifecycle Management from the Datacenter to the Cloud

SUSE OpenStack Cloud. Enabling your SoftwareDefined Data Center. SUSE Expert Days. Nyers Gábor Trainer &

Docker Networking In OpenStack What you need to know now. Fawad Khaliq

Managing Linux Servers Comparing SUSE Manager and ZENworks Configuration Management

How To Make Databases on SUSE Linux Enterprise Server Highly Available Mike Friesenegger

Provisioning with SUSE Enterprise Storage. Nyers Gábor Trainer &

Using Crowbar to Deploy Your OpenStack Cloud. Adam Spiers Vincent Untz John H Terpstra

Introduction to Software Defined Infrastructure SUSE Linux Enterprise 15

SUSE Manager in Large Scale 17220

Linux and z Systems in the Datacenter Berthold Gunreben

SUSE Linux Enterprise Kernel Back to the Future

Using Linux Containers as a Virtualization Option

Cloud in a box. Fully automated installation of SUSE Openstack Cloud 5 on Dell VRTX. Lars Everbrand. Software Developer

Expert Days SUSE Enterprise Storage

Best practices with SUSE Linux Enterprise Server Starter System and extentions Ihno Krumreich

Novell SLES 10/Xen. Roadmap Presentation. Clyde R. Griffin Manager, Xen Virtualization Novell, Inc. cgriffin at novell.com.

SUSE Manager and Salt

Welcome to SUSE Expert Days 2017 Service Delivery with DevOps

Cloud Computing, SaaS and Outsourcing

Essentials. Johannes Meixner. about Disaster Recovery (abbreviated DR) with Relax-and-Recover (abbreviated ReaR)

Define Your Future with SUSE

Open Enterprise & Open Community

SaltStack and SUSE Systems and Configuration Management that Scales and is Easy to Extend

IBM Cloud Security for the Cloud. Amr Ismail Security Solutions Sales Leader Middle East & Pakistan

Linux High Availability on IBM z Systems

SUSE Linux Enterprise High Availability Extension

Novell Infiniband and XEN

Build with SUSE Studio, Deploy with SUSE Linux Enterprise Point of Service and Manage with SUSE Manager Case Study

BOV89296 SUSE Best Practices Sharing Expertise, Experience and Knowledge. Christoph Wickert Technical Writer SUSE /

A guide for IT professionals. implementing the hybrid cloud

2-4 April 2019 Taets Art and Event Park, Amsterdam CLICK TO KNOW MORE

Accelerate Your Enterprise Private Cloud Initiative

Cloud Computing Concepts, Models, and Terminology

The Business of Security in the Cloud

The Challenge of Cloud Security

The Oracle Trust Fabric Securing the Cloud Journey

Virtustream Cloud and Managed Services Solutions for US State & Local Governments and Education

Too Many Metas A high level look at building a metadata desktop. Joe Shaw

Cloud Computing: Making the Right Choice for Your Organization

Cloud Computing An IT Paradigm Changer

Business Technology Briefing: Fear of Flying, And How You Can Overcome It

Cloud Computing Private Cloud

Software Defined. All The Way with OpenStack. T. R. Bosworth Senior Product Manager SUSE OpenStack Cloud

Exploring the High Availability Storage Infrastructure. Tutorial 323 Brainshare Jo De Baer Technology Specialist Novell -

Migrating Applications to the Cloud

INTO THE CLOUD WHAT YOU NEED TO KNOW ABOUT ADOPTION AND ENSURING COMPLIANCE

Managing SaaS risks for cloud customers

Protect your server with SELinux on SUSE Linux Enterprise Server 11 SP Sander van Vugt

CLOUD COMPUTING READINESS CHECKLIST

VSP16. Venafi Security Professional 16 Course 04 April 2016

Exploring History with Hawk

Copyright 2011, Oracle and/or its affiliates. All rights reserved.

Securing the Cloud Today: How do we get there?

MySQL CLOUD SERVICE. Propel Innovation and Time-to-Market

CLOUD SECURITY CRASH COURSE

Developing, Deploying and Managing Applications on the Cloud

The Emerging Role of a CDN in Facilitating Secure Cloud Deployments

hcloud Deployment Models

Journey to the Cloud. Jeff Hoehing, Principal Consultant

Multi Packed Security Addressing Challenges in Cloud Computing

Cloud First Policy General Directorate of Governance and Operations Version April 2017

Copyright 2011 EMC Corporation. All rights reserved.

EMC Strategy Overview: Journey To The Private Cloud

The Virtualisation Security Journey: Beyond Endpoint Security with VMware and Symantec

Cloud Operations for Oracle Cloud Machine ORACLE WHITE PAPER MARCH 2017

TRANSFORMING TO IT-AS-A- SERVICE

Mitigating Risks with Cloud Computing Dan Reis

Fundamental Concepts and Models

Gaps and Overlaps in Identity Management Solutions OASIS Pre-conference Workshop, EIC 2009

Future Shifts in Enterprise Architecture Evolution. IPMA Marlyn Zelkowitz, SAP Industry Business Solutions May 22 nd, 2013

PUBLIC AND HYBRID CLOUD: BREAKING DOWN BARRIERS

With K5 you can. Do incredible things with Fujitsu Cloud Service K5

SOLUTION BRIEF RSA ARCHER IT & SECURITY RISK MANAGEMENT

Data Management and Security in the GDPR Era

CHEM-E Process Automation and Information Systems: Applications

Software Defined Storage for the Evolving Data Center

Building Trust in the Era of Cloud Computing

ECE Enterprise Storage Architecture. Fall ~* CLOUD *~. Tyler Bletsch Duke University

Auditing the Cloud. Paul Engle CISA, CIA

Enabling Hybrid Cloud Transformation

Saving Real Storage with xip2fs and DCSS. Ihno Krumreich Project Manager for SLES on System z

Network Implications of Cloud Computing Presentation to Internet2 Meeting November 4, 2010

IT Attestation in the Cloud Era

How to avoid storms in the cloud. The Australian experience and global trends

Secure Authentication

THE DATA CENTER AS A COMPUTER

Cloud Computing Introduction & Offerings from IBM

CLOUD COMPUTING ABSTRACT

Run the business. Not the risks.

CLOUD COMPUTING-ISSUES AND CHALLENGES

10 Cloud Myths Demystified

1 Copyright 2011, Oracle and/or its affiliates. All rights reserved. reserved. Insert Information Protection Policy Classification from Slide 8

INFS 214: Introduction to Computing

SDS Heterogeneous OS Access. Technical Strategist

Data safety for digital business. Veritas Backup Exec WHITE PAPER. One solution for hybrid, physical, and virtual environments.

Perfect Balance of Public and Private Cloud

Cisco Unified Data Center Strategy

BRINGING CLARITY TO THE CLOUD

Part III: Evaluating the Business Value of the Hybrid Cloud

10 Considerations for a Cloud Procurement. March 2017

Transcription:

Building a Secure and Compliant Cloud Infrastructure Ben Goodman Principal Strategist, Identity, Compliance and Security Novell, Inc.

Why Are We Here? Expanded Enterprise Data access anywhere, anytime Traditional IT perimeters have disappeared New technologies = New complexities = New opportunities Cloud Computing A new frontier New insecurities Stringent regulatory compliance 8-Step Journey to a Secure and Compliant Cloud Determine technology requirements Determine security requirements Determine policy requirements 3

Cloud Insecurity Uptime Seamlessly scalable Shared resources Logical separation Location agnostic Co-located rivals 4 The cloud is a magnet for hackers!

The Cloud Paradigm You see: Hosted applications You don t see: Virtualization Elastic workload Chargeback / billing Audit and log monitoring Continuous compliance Data(base) tenancy High availability 5

Security Tops Cloud Concerns Q: Rate the challenges/issues of the cloud /on-demand model (Scale: 1 = Not at all concerned; 5 = Very concerned) Security Availability Performance On-demand payment model may cost more Lack of interoperability standards Bringing back in-house may be difficult Hard to integrate with in-house IT 87.5% 83.3% 82.9% 81.0% 80.2% 79.8% 76.8% Not enough ability to customize 76.0% (% responding 3, 4, or 5) Source: IDC exchange, New IDC IT Cloud Services Survey: Top Benefits and Challenges, (http://blogs.idc.com/ie/?p=730) December 2009 6

What is the Biggest Barrier to Adoption of Cloud Services? 497 responses 7 Source: Tech Target: Cloud Computing Readership Survey, 2009

Cloud Architectures and Models ESSENTIAL CHARACTERISTICS Broad Network Access Rapid Elasticity Measured Service On-Demand Self-Service Resource Pooling ARCHITECTURES Softwareas-a-Service (SaaS) Platformas-a-Service (PaaS) Infrastructureas-a-Service (IaaS) DEPLOYMENT MODELS Public Private Hybrid Community 8

Bridging Security Requirements to the Cloud Traditional IT Dedicated compute, storage and network infrastructure Defined locations for data storage and backup Proprietary security controls and policies Compliance standards designed for traditional IT Cloud Computing Complex, shared deployment models Varying data location Security controls and policies defined by service provider Interpretation of compliance standards 9

An Eight-Step Journey to a Secure Cloud 1 Determine your application s suitability for the cloud Payment Processing Corporate Systems ERP CRM Company Web Site Test and Development e-commerce 10

An Eight-Step Journey to a Secure Cloud 2 Classify your data Financial Newsfeeds/Blogs Marketing Customer Records Government Healthcare/PHI EU Citizens 11

An Eight-Step Journey to a Secure Cloud 3 Classify your cloud type (Think about applications) Software-as-a-Service (SaaS) Infrastructure-as-a-Service (IaaS) Platform-as-a-Service (PaaS) 12

An Eight-Step Journey to a Secure Cloud 4 Select a delivery model (Think about data classification) Private: Public: Hybrid: Self-managed Outsourced Commodity Enterprise Private + Public Private + Exchange Private + Customer Cloud bursting Public Hybrid Private 13

Security An Eight-Step Journey to a Secure Cloud 5 Specify platform architecture Compute Storage and backup Network and routing System Device Drivers API/ System Call Cloud Automation Application Customer Application VPDC Cloud OS (ex. IaaS) Customer Application VPDC Virtualization vs. dedicated Compute Network Storage Data Center Ethernet Fabric 14

Infrastructure as a Service (IaaS) Platform as a Service (PaaS) Software as a Service (SaaS) Security at the Different Layers Applications Layer Presentation Modality Presentation Platform End Users APIs Applications Management Layer Business Owners Data Metadata Content Integration and Middleware APIs Infrastructure Layer Core Connectivity and Delivery Abstraction IT Administrators Hardware Facilities 15 Source: Cloud Security Alliance specification, 2009

An Eight-Step Journey to a Secure Cloud 6 Specify security controls Firewall Intrusion detection/prevention Log management Application protection Database protection Identity and access management Vulnerability scanning 16

An Eight-Step Journey to a Secure Cloud 7 Determine policy requirements Policy Creation and Enforcement What are my service provider s policies? Can I specify my own? How do they handle critical events? Policy Bursting If I choose a cloud-bursting model, will my policies burst along with my VMs? Policy Migration If I contract for cloud-based DR, will my polices migrate with my VMs? 17

Compliance is a Journey It s Reporting, But It s Also About Managing Risk Drive to Compliance Assurance Manual Processes Spreadsheet driven compliance Manually collected audit logs Achieve Continuous Compliance Compliance Assurance Robust methods for compliance reporting Automated certification and log collection Continuous Compliance Full visibility to IT risks No infrastructure holes or silos Identity and security integration Compatibility with IT GRC management for big picture view 18

An Eight-Step Journey to a Secure Cloud 8 Determine service provider requirements Delivery-model integration Automation Scalability Monitoring SLAs Services Security controls Stability Terms Compliance 19

Journey to The Cloud Key Considerations Determine service provider requirements Determine policy requirements Specify security controls Specify platform architecture Select delivery model Determine type of cloud Classify data Understand your application s applicability to the cloud 20

Infrastructure as a Service (IaaS) Platform as a Service (PaaS) Software as a Service (SaaS) Infrastructure as a Service (IaaS) Platform as a Service (PaaS) Software as a Service (SaaS) Mapping the Model to the Metal Cloud Model Presentation Modality APIs Presentation Platform Security Control Model Applications Data Metadata Content Application Information Compliance Model Integration and Middleware Management PCI APIs SOX Core Connectivity and Delivery Network GLBA Abstraction Trust HIPPA Hardware Storage Facilities Physical 21 Source: Cloud Security Alliance specification, 2009

Unpublished Work of Novell, Inc. All Rights Reserved. This work is an unpublished work and contains confidential, proprietary, and trade secret information of Novell, Inc. Access to this work is restricted to Novell employees who have a need to know to perform tasks within the scope of their assignments. No part of this work may be practiced, performed, copied, distributed, revised, modified, translated, abridged, condensed, expanded, collected, or adapted without the prior written consent of Novell, Inc. Any use or exploitation of this work without authorization could subject the perpetrator to criminal and civil liability. General Disclaimer This document is not to be construed as a promise by any participating company to develop, deliver, or market a product. It is not a commitment to deliver any material, code, or functionality, and should not be relied upon in making purchasing decisions. Novell, Inc. makes no representations or warranties with respect to the contents of this document, and specifically disclaims any express or implied warranties of merchantability or fitness for any particular purpose. The development, release, and timing of features or functionality described for Novell products remains at the sole discretion of Novell. Further, Novell, Inc. reserves the right to revise this document and to make changes to its content, at any time, without obligation to notify any person or entity of such revisions or changes. All Novell marks referenced in this presentation are trademarks or registered trademarks of Novell, Inc. in the United States and other countries. All third-party trademarks are the property of their respective owners. 2010 Savvis, Inc. All rights reserved. Savvis is the registered trademark of Savvis Communications Corporation.