Securing the Cloud Today: How do we get there?

Similar documents
Cloud Computing An IT Paradigm Changer

Cloud Services. Infrastructure-as-a-Service

Cloud offerings from IBM

IBM smarter Business Resilience in the Cloud

BRINGING CLARITY TO THE CLOUD

Securing Your Cloud Introduction Presentation

ALERT LOGIC LOG MANAGER & LOG REVIEW

Intermedia s Private Cloud Exchange

WHY SECURE MULTI-TENANCY WITH DATA DOMAIN SYSTEMS?

Cloud Computing An IT Paradigm Changer

Virtustream Cloud and Managed Services Solutions for US State & Local Governments and Education

WHITE PAPER. Title. Managed Services for SAS Technology

Enterprise & Cloud Security

WHAT CIOs NEED TO KNOW TO CAPITALIZE ON HYBRID CLOUD

Government IT Modernization and the Adoption of Hybrid Cloud

IBM Cloud Security for the Cloud. Amr Ismail Security Solutions Sales Leader Middle East & Pakistan

Cloud Computing Introduction & Offerings from IBM

Building a Secure and Compliant Cloud Infrastructure. Ben Goodman Principal Strategist, Identity, Compliance and Security Novell, Inc.

Accelerate Your Enterprise Private Cloud Initiative

Cybersecurity Auditing in an Unsecure World

WELCOME ISO/IEC 27001:2017 Information Briefing

Building Trust in the Era of Cloud Computing

Powering Transformation With Cisco

Cloud Computing Briefing Presentation. DANU

Gain Control Over Your Cloud Use with Cisco Cloud Consumption Professional Services

Choosing the Right Cloud. ebook

Virtustream Managed Services Drive value from technology investments through IT management solutions. Tim Calahan, Manager Managed Services

IT your way - Hybrid IT FAQs

EMC Strategy Overview: Journey To The Private Cloud

Oktober 2018 Dell Tech. Forum München

The Road to a Secure, Compliant Cloud

Cloud Computing, SaaS and Outsourcing

CLOUD SECURITY: THE CHALLENGES FOR THE DATA CENTRE AND IT ENVIRONMENT NOVEMBER 2016

Future Shifts in Enterprise Architecture Evolution. IPMA Marlyn Zelkowitz, SAP Industry Business Solutions May 22 nd, 2013

CIO Forum Maximize the value of IT in today s economy

CIAM: Need for Identity Governance & Assurance. Yash Prakash VP of Products

Transform to Your Cloud

Cloud Computing: The Next Wave. Matt Jonson Connected Architectures Lead Cisco Systems US and Canada Partner Organization

What matters in Cyber Security

Cloud Strategies for Addressing IT Challenges

RSA Solution Brief. The RSA Solution for Cloud Security and Compliance

hcloud Deployment Models

Next Generation Authentication

Third Party Cloud Services Its Adoption in the New Age

Perfect Balance of Public and Private Cloud

SoftLayer Security and Compliance:

Copyright 2012 EMC Corporation. All rights reserved. Obrigado

Business today runs on technology. Modernize Your Datacenter. Challenges facing IT. Modernize Your Datacenter 10/17/ % Enterprise IT

What can the OnBase Cloud do for you? lbmctech.com

Challenges 3. HAWK Introduction 4. Key Benefits 6. About Gavin Technologies 7. Our Security Practice 8. Security Services Approach 9

Data safety for digital business. Veritas Backup Exec WHITE PAPER. One solution for hybrid, physical, and virtual environments.

WHITE PAPER HYBRID CLOUD: FLEXIBLE, SCALABLE, AND COST-EFFICIENT UK: US: HK:

A Pragmatic Path to Compliance. Jaffa Law

MEETING ISO STANDARDS

itsmf Annual Conference 2012

IT Redefined. Hans Timmerman CTO EMC Nederland. Copyright 2015 EMC Corporation. All rights reserved.

locuz.com SOC Services

TRANSFORMING TO IT-AS-A- SERVICE

Network Implications of Cloud Computing Presentation to Internet2 Meeting November 4, 2010

Cisco Enterprise Cloud Suite Overview Cisco and/or its affiliates. All rights reserved.

PLATFORM AS A SERVICE (PAAS):

That Set the Foundation for the Private Cloud

On Demand Cryptographic Resources for Your Virtual Data Center and the Cloud: Introducing SafeNet s Crypto Hypervisor

Cisco Cloud Application Centric Infrastructure

CLOUD COMPUTING. Lecture 4: Introductory lecture for cloud computing. By: Latifa ALrashed. Networks and Communication Department

Cloud Computing: Is it safe for you and your customers? Alex Hernandez DefenseStorm

The Latest EMC s announcements

The IBM Platform Computing HPC Cloud Service. Solution Overview

LEAD YOUR CLOUD TRANSFORMATION. Copyright 2013 EMC Corporation. All rights reserved.

Introduction. Deployment Models. IBM Watson on the IBM Cloud Security Overview

Security & Compliance in the AWS Cloud. Amazon Web Services

Analytics in the Cloud Mandate or Option?

10 Cloud Myths Demystified

Enterprise Private Cloud. Fully managed private cloud as a service in your data centre or ours.

Security

TB+ 1.5 Billion+ The OnBase Cloud by Hyland 600,000,000+ content stored. pages stored

SafeNet HSM solutions for secure virtual amd physical environments. Marko Bobinac SafeNet PreSales Engineer

Best Practices for Managing Data Centres

Anything-as-a-Service. Mike Pilbeam Director of Presales UKI

AWS SECURITY AND COMPLIANCE QUICK REFERENCE GUIDE

SECURITY & PRIVACY DOCUMENTATION

BUSINESS CONTINUITY MANAGEMENT

Practical Guide to Cloud Computing Version 2. Read whitepaper at

BUILDING A PATH TO MODERN DATACENTER OPERATIONS. Virtualize faster with Red Hat Virtualization Suite

DIGITAL TRUST Making digital work by making digital secure

Cloud Computing Overview. The Business and Technology Impact. October 2013

Watson Developer Cloud Security Overview

Taking your next integration or BPM project to the cloud WebSphere Integration User Group, 12 July 2012 IBM Hursley

Transforming IT: From Silos To Services

Security & Compliance in the AWS Cloud. Vijay Rangarajan Senior Cloud Architect, ASEAN Amazon Web

IBM Global Technology Services Provide around-the-clock expertise and protect against Internet threats.

Next-Generation HCI: Fine- Tuned for New Ways of Working

Making hybrid IT simple with Capgemini and Microsoft Azure Stack

Run the business. Not the risks.

The threat landscape is constantly

Disclaimer This presentation may contain product features that are currently under development. This overview of new technology represents no commitme

Why the cloud matters?

AWS Security. Stephen E. Schmidt, Directeur de la Sécurité

TechValidate Survey Report: SaaS Application Trends and Challenges

The Need For A New IT Security Architecture: Global Study On The Risk Of Outdated Technologies

Transcription:

Samson Tai, Chief Technologist, IBM Innovation Network Securing the Cloud Today: How do we get there 9/15/2009

What is Cloud Computing Cloud is a new consumption and delivery model for many IT-based services, in which the user sees only the service, and has no need to know anything about the technology or implementation Attributes Standardized, consumable web-delivered services Service Catalog Ordering Flexible pricing Metering & Billing Elastic scaling Rapid provisioning Advanced virtualization VISIBILITY CONTROL AUTOMATION...service oriented and service managed 2 9/15/2009

Cloud Computing Delivery Models Flexible Delivery Models Public Service provider owned and managed Access by subscription Delivers select set of standardized business process, application and/or infrastructure services on a flexible price per use basis.. Standardization, capital preservation, flexibility and time to deploy Cloud Services Cloud Computing Model Hybrid Access to client, partner network, and third party resources Private Privately owned and managed. Access limited to client and its partner network. Drives efficiency, standardization and best practices while retaining greater customization and control. Customization, efficiency, availability, resiliency, security and privacy ORGANIZATION CULTURE GOVERNANCE...service sourcing and service value 3 9/15/2009

End-user Survey: Perceived Concerns 5.00 4.50 4.00 3.50 3.00 2.50 2.00 1.50 Please rate each in terms of how significant they would be to your organization. Across the region and globally, security of cloud services is consistently rated as the top concern that CIOs have about cloud services. HK is little different to the rest of the surveyed countries and rates the issues of Security, Performance and Ability to integrate as the top three concerns Other concerns were consistent in rating 1.00 On-demand payment model will cost more Hard to integrate with in-house IT systems Ability to customize to our org's needs Security, worried about keeping our systems & information protected Regulatory requirements Availability Performance Not enough major suppliers yet Bringing back in-house may be difficult Source: IDC Market Evolution and Trends for Cloud Computing: Asia/Pacific End-User Study, 2009, N =114

What is Cloud Security Confidentiality, integrity, availability of business-critical IT assets, stored or processed on a cloud computing platform Cloud Computing Software as a Service Utility Computing Grid Computing There is nothing new under the sun but there are lots of old things we don't know. Ambrose Bierce, The Devil's Dictionary 5 9/15/2009

Cloud Security: Simple Example Today s Data Center Tomorrow s Public Cloud We Have Control It s located at X. It s stored in server s Y, Z. We have backups in place. Our admins control access. Our uptime is sufficient. The auditors are happy. Our security team is engaged. Who Has Control Where is it located Where is it stored Who backs it up Who has access How resilient is it How do auditors observe How does our security team engage 6 9/15/2009 6

Security Requirement for Different Cloud Computing Models Cloud Delivered Services Application as a service Platform as a service Infrastructure as a service Multi-tenancy at all levels Cloud Platform Business Support Services Offering Mgmt, Customer Mgmt, Ordering Mgmt, Billing Operational Support Services Infrastructure Provisioning Instance, Image, Resource / Asset Mgmt Common Operational Services Virtualized Resources Virtual Network, Server, Storage System Resources Network, Server, Storage Physical System and Environment Multi-tenant security infrastructure Image Security Virtualization Security Logical Data Center Security and Resilience Physical Data Center Security and Resilience

Gartner summarizes cloud security threats 1. Privileged user access (Federated Identity management/authentication /authorization) 2. Regulatory compliance 3. Data location 4. Data segregation 5. Recovery (backup) 6. Investigative support (auditing/logging) 7. Long-term viability (acquisitions)

Security and Cloud Computing IBM Security Framework Business-oriented framework used across all IBM brands that allows to structure and discuss a client s security concerns Governance, Risk Management, Compliance 3rd-party audit (SAS 70(2), ISO27001, PCI) Client access to tenant-specific log and audit data Effective incident reporting for tenants. Application and Process Application security requirements for cloud are phrased in terms of image Compliance with secure development best practice Physical Monitoring and control of physical access People and Identity Privileged user monitoring, including logging activities, physical monitoring and background checking Federated identity / onboarding: Coordinating authentication and authorization with enterprise or third party systems Data and Information Data Segregation Client control over geographical location of data Network, Server, Endpoint Isolation between tenant domains Trusted virtual domains: Built-in intrusion detection and prevention 9 9/15/2009

There is No One-size-fits-all Security for Cloud Computing Different Workloads have Different Risk Profiles High Need for Security Assurance Low Training, testing with nonsensitive data Public Analysis & simulation with public data Mission-critical workloads, personal information Hybrid Low-risk Mid-risk High-risk Business Risk Private High value / high risk workloads need Quality of protection adapted to risk Direct visibility and control Significant level of assurance Today s clouds are primarily here: Lower risk workloads One-size-fits-all approach to data protection No significant assurance Price is key 10 9/15/2009

Thank You