Cloud Computing Security Framework for Banking Industry
|
|
|
- Toby Abner Richardson
- 10 years ago
- Views:
Transcription
1 Cloud Computing Security Framework for Banking Industry Meskerem Alemu Abrehet Mohammed Omer Addis Ababa Science and Technology University, Ethiopia Abstract Cloud computing is a prospering technology that most financial organizations are considering for adoption as a cost effective strategy for managing Information Technology (IT). However, financial organizations such as banks still consider the technology to be associated with many business risks that are not yet resolved. Such issues include security, privacy, legal, compliance and regulatory risks. As an initiative to address such risks, cloud security framework and bank enterprise framework have been proposed. However, the proposed framework focuses more on technical control and doesn t incorporate the overall administrative, legal and compliance control on cloud computing services. Further they are not also considered specific solutions for the bank industry compliance requirement and neglect some major bank information security issues. Due to lack of professionals and adequate frameworks in the area, the issue is getting scaled up to become a severe problem. The main objective of this paper is, therefore, to propose Cloud Computing Security Framework for the banking industry. The study has been conducted on Banking Industry through systematic literature review on cloud computing standards, policy and best practices coupled with interview as methods of data collection. The survey result helps for identifying professionals thought on the subject and major pillars to propose new framework. Besides, the Sherwood Applied Business Security Architecture (SABSA) framework was used as a guide for designing the newly proposed cloud computing security framework for the banking industry focusing on architects view from six perspectives. The proposed framework aggregates different temples: Risk Matrix Template, Control Domain Template, Compliance Matrix Template, and Security Strategy/Major, that help banks come up to solutions for measuring risk, compliance and setting suitable security major. Keywords: Cloud computing; Banking industry; Metrics; Security; Threats; Vulnerability 1. Introduction In order to satisfy customer need, banks use Information Technology (IT) services. However, traditional IT computing technology until now, has typically been a costly hurdle for financial institutions, particularly those in emerging markets where developing customized solutions or investing in advanced banking platforms has either been unfeasible or the result has seen too many failures, too many resources used and too much time wasted [1, 2]. Currently, cloud computing technology has brought the idea of storing and managing data on virtualized servers so that, applications, individuals and organizations around the world can have the ability to connect to data and computing resources anywhere and anytime. However, banks cannot afford the risk of a security breach since security of financial, personal data and mission-critical applications are paramount. Moreover, financial compliance regulations require that, data should not be intermixed with other data types, on shared servers or databases. Therefore, to move banks into cloud computing environment it is essential that security challenges in relation to regulatory policy, compliance and standards must be addressed primarily.
2 HiLCoE Journal of Computer Science and Technology, Vol. 2, No This research attempts to answer the research question: What are the suitable security components to propose new Security Framework for the banking industry to adopt cloud computing services? 2. Related Work Temenos Enterprise Framework Architecture (TEFA) (see Figure 1): The framework is focused in providing information to implement evolving product and service portfolios without disrupting banking operations [3]. In the framework, Security Management System (SMS) is incorporated as one component. The framework addresses one security domain issue, that is, identities and accesses management level. Since, cloud computing related to banking services is a broad concept other security related to administrative, technical and physical control should be addressed in broad manner. Figure 1: Temenos Enterprise Framework Architecture IBM Security Overview on Cloud computing: in viewing of security in cloud computing, IBM proposed Security Framework (see Figure 2) [4]. IBM security framework is composed of five main cloud computing architecture and banking business security requirements. It doesn t address the security majors that should be considered at each level of cloud services model (i.e., SaaS, PaaS, IaaS) and components: people and identity, data and deployment mode. In addition to this, regulation information, application and process, network, server, end point and physical infrastructure. IBM framework identifies main component in general. standards and compliances and the way to adopt cloud computing for banking services is not addressed in the framework [5]. However, the framework is not designed basing Figure 2: IBM Security Framework
3 80 Cloud Computing Security Framework for Banking Industry In a paper Security Issues of Banking Adopting the Application of Cloud Computing, the authors stated that, cloud technology makes possible to reuse IT resources for banks very efficiently. In order for banks to adopt this technology the paper states that two primary challenges, namely, security and regulatory compliance should be addressed, wherein financial institutions must select the right service, deployment, and operating models to address security and compliance concerns. The paper discusses security risk on cloud which includes, regulatory compliance, data location, data segregation, recovery investigation support and long term liability, leakage of data, database and server security for the system. The paper suggests that banks to use hybrid cloud since it would have private cloud for highly secured transaction [6]. In view of the advantages of cloud computing, the working group, Reserve Bank of India analyzes and recommends the support of non-financial services to ideally explore cloud computing as to gain more experience. The working group recommends that there is need of more research and development in the area of cloud governance and audit, cloud management and cloud securing technology for which the banking industry and the software industry could take the initiative so that regulatory authorities can make use of the same security framework standards [7, 8]. As different security standards and enterprise security architecture guidance provider indicates security framework shall provide much more to the business requirements than pure security and control [9, 10, 11, 12]. They propose enterprise security framework to address the entire three security control domain Technical, Administrative and Physical /environmental control. Based on these facts we can say that previous works on security framework do not cover the overall security issues on cloud architecture and banking business operation. Therefore, this paper addresses this gap by developing security framework considering banking business security requirements and cloud computing technical, physical and administrative control requirements. 3. The Proposed Framework In order to come up with integrated security framework solution, through adopting enterprise security architecture tool of Sherwood Applied Business Security Architecture (SABSA) of architects view, we designed a cloud computing security framework for the banking industry (see Figure 3). Cloud Model - (What and Who) In the proposed framework of Figure 3, the system that needs to be secured in cloud system is represented with cloud architecture with main security item components such as Physical, Network, Compute, Storage, Application and Data. Cloud Services Model (SaaS, PaaS and IaaS) and Cloud Deployment Model (public, hybrid, community and private) are also integrated into the Cloud model as they are main parts of cloud architecture. For answering who, cloud actor is specified within cloud model. Specific actors are identified which are, bank (cloud consumer) and cloud services provider (CSP). Security Model-(Why and Where) Security model layers of the framework are defined with two security solutions package, Risk Matrix for answering why and Control Domain for answering where. Risk assessment needs to occur before an enterprise enters into a cloud computing arrangement to help avoid surprises and minimize the costs of implementing and maintaining controls. More so, implementing too many controls may not be the best risk-mitigation approach, because the benefit from implementing controls should outweigh the cost. Therefore, other risk-mitigation measures such as transferring, avoiding or accepting the risk are worth considering as well. In order to address this issue through following ISO 3100 risk management guideline, we developed Risk Exposure Majoring Template (see Figure 4).
4 HiLCoE Journal of Computer Science and Technology, Vol. 2, No Figure 3: The Proposed Cloud computing Security Framework for Banking Industry It is a tool for identifying banking business risk likelihood of risk exposure in deploying bank asset in exposure through majoring risk impact and each cloud deployment model.
5 82 Cloud Computing Security Framework for Banking Industry Figure 4: Risk Matrix template- Bank Business Risk Exposure Compliance Model (How) In the framework, in order to address legal and (GLBA, BasleII/II, PCIDS, SOX), cloud computing control matrix and international regulatory best regulatory compliance issues, we designed practices compliance requirement (ISO, COBIT, Compliance Matrix Template (see Figure 5). It is etc.). On the matrix, compliance requirement of those developed basing banking industry standards regulators is mapped to each specific control domain.
6 HiLCoE Journal of Computer Science and Technology, Vol. 2, No Figure 5: Compliance Matrix Template Based on the compliance matrix template, we which includes specific tools, products, best practice designed cloud computing security strategy/major and guidelines for the banking industry (see Table 1). Policy Document Legal Personal Security Third Party Provider Business Continuity and Resource provision Table 1: Security Major Template Cloud Computing Security Framework For Banking Industry Security Major Template Governance, Risk and Compliance OECP, APEC Plan for managing resources, conduct impact analysis, check power & telecommunication infrastructure, back up-plan, disaster recovery-plan
7 84 Cloud Computing Security Framework for Banking Industry Network, Host and VM security Application security Identity and access, management Incident Management Data secuity (Transit,storage,rest) Operational-Management Data center-physical Security Data center-environmental Security Data Center- Power And Network Data center- Human resource Wireless Network setting: Perimeter Firewall, strong encryption for authentication & transmission. Shared Network: Bank security requirements, compliance with legislative, regulatory and contractual requirements, separation of production and non-production environments, preserve protection and isolation of sensitive data. Network Control: Availability: Check network architecture, e,g., Load balancing, Cluster architecture, Checkpoint restartor or robustness. Integrity: secured hashing algorithm e.g., SHA-512, Digital Certificates. Confidentiality: Strong password policy and access control e.g., 256-bit AES, SSL, SHA and TLS-1.1 Virtual Machine Gust Hardening: e.g., using firewall, web application, antivirus, file integrity monitoring & log. Hypervisor Security: Physical, operational security for hosting server. Storage- Authentication, Digital signature/hash, SAML, Audit logging, Web-services security get-way, and AAA. RBAC, SSA token, OTP, SAML, XACML, SCLM SLA, IODEF, RID, CEE DSLC, IDA, Encryption- Clint application, Network (SSL, VPN, SSH), Proxy, DAM, FAM, DLP-Tools, URL Filtering Documented operating procedures:-capacity management, Change management, Exchange of information, System Acceptance. Physical Security Perimeter, Resiliency - Equipment Location Smoke Detector & Fire Suppression System AC, Battery, UPS, Fire link detection, Automatic Fire extinguished, Generator Background Verification & Screening Agent 4. Conclusion and Future Work The general objective of this research is to develop cloud computing security framework for the banking industry. Accordingly, in order to achieve this objective, detail assessment on cloud computing architecture, reference model, service, threat and attacks, policy, standards and guidelines were done. Similarly, assessment has also been made on bank industry regulatory security and compliance requirements. Based on these assessments to address the research problems we designed cloud computing security framework for the banking industry. Our framework provides Risk Matrix Template for assessing and determining risk exposure of bank asset applications while moving to cloud deployment option. Integrated control domain component is proposed as a base for setting security major. Finally, for each defined control domain, security major/strategy (tools, products, guidelines and practices) is proposed. For future work, we recommend automation of main security solutions, Risk Matrix template, Control Domain Template, Compliance matrix template for ease of use and updatability. For future research we also recommend setting maturity model for the proposed security framework. Finally, banks are recommended to major their business risk exposure before moving their
8 HiLCoE Journal of Computer Science and Technology, Vol. 2, No application/asset/data to cloud deployment models (Public, Hybrid, Community, Private). We also recommend banks to set control major in compliance with regulatory requirements. On the other hand, to move banks to cloud computing more work is required form regulatory standard organization perspectives. This organization should provide and conduct more research and should provide updated security guidelines. References [1] David Bradshaw, Giuliana Folco, Gabriella Cattaneo, Marianne Kolding, Quantitative Estimates of the Demand for Cloud Computing in Europe and The Likely Barriers to Up-take IDC Analyze the Future, D4 Final report, Ver. 2.0, Brussels, Belgium, SMART 2011/0045, July 13, [2] Ollivia La Barrer, Bank System and Technology, Information week cloud, 2011, retrieved form, com/cloud-computing/software/temenosmicrosoft-bring-azure-clouds-to/ , Last access on August 15, [3] H. Altalhi, Mohamed Sidek, Abdul Ghani, Othman, and Abdelkhaleq Al-Sheshtawil, Enhancing the Security Framework Secure Cloud with the SWIFT Identity Management Framework, International Journal on Cloud Computing: Services and Architecture (IJCCSA), Vol. 2, No. 1, February [4] IBM, Security Over View Cloud Computing, Cloud Computing White Paper, United States of America, IBM Corporation, [5] Federal Risk and Authorization Management Program, FedRAMP, CONSOP Briefing, February 9, [6] Sunita Rani and Ambrish Gangal, Security Issues of Banking Adopting the Application of Cloud Computing, International Journal of Information Technology and Knowledge Management, Vol. 5, No. 2, July-December [7] Working Group Report on Cloud Computing Option for Small Size Urban Cooperative Banks, Reserve Bank of India, retrieved from /Pdfs/ RWGFUF pdf, Last accessed on August 15, [8] Working Group, Information Security, Electronic Banking, Technology Risk Management and Cyber Fraud, Report and recommendation, Reserve bank of India, Mumbai, January [9] John Sherwood, Andrew Clark, and David Lynas, Enterprise Security Architecture SABSA, White paper, SABSA Limited. [10] TOGOF, The Open Group Architecture Framework, retrieved from, opengroup.org, Last accessed on August 14, [11] SABAS, The Sherwood Applied Business Security Architecture Framework Available at Last accessed on March 15, [12] ISO, ISO/IEC 27002:2005, retrieved from, , Last accessed on August 14, 2013.
http://www.cisjournal.org Cloud Computing Conceptual Security Framework for Banking Industry 1
Cloud Computing Conceptual Security Framework for Banking Industry 1 Meskerem Alemu, 2 Abrehet Omer 1 HiLCoE School of Computer Science and Technology, Computer Science Department, Addis Ababa, ETHIOPIA
Cloud Security. Peter Jopling [email protected] IBM UK Ltd Software Group Hursley Labs. peterjopling. 2011 IBM Corporation
Cloud Security Peter Jopling [email protected] IBM UK Ltd Software Group Hursley Labs peterjopling 2011 IBM Corporation Cloud computing impacts the implementation of security in fundamentally new ways
How To Protect Your Cloud Computing Resources From Attack
Security Considerations for Cloud Computing Steve Ouzman Security Engineer AGENDA Introduction Brief Cloud Overview Security Considerations ServiceNow Security Overview Summary Cloud Computing Overview
Cloud Security Who do you trust?
Thought Leadership White Paper Cloud Computing Cloud Security Who do you trust? Nick Coleman, IBM Cloud Security Leader Martin Borrett, IBM Lead Security Architect 2 Cloud Security Who do you trust? Cloud
IBM Cloud Security Draft for Discussion September 12, 2011. 2011 IBM Corporation
IBM Cloud Security Draft for Discussion September 12, 2011 IBM Point of View: Cloud can be made secure for business As with most new technology paradigms, security concerns surrounding cloud computing
Strategic Compliance & Securing the Cloud. Annalea Sharack-Ilg, CISSP, AMBCI Technical Director of Information Security
Strategic Compliance & Securing the Cloud Annalea Sharack-Ilg, CISSP, AMBCI Technical Director of Information Security Complexity and Challenges 2 Complexity and Challenges Compliance Regulatory entities
Securing The Cloud. Foundational Best Practices For Securing Cloud Computing. Scott Clark. Insert presenter logo here on slide master
Securing The Cloud Foundational Best Practices For Securing Cloud Computing Scott Clark Agenda Introduction to Cloud Computing What is Different in the Cloud? CSA Guidance Additional Resources 2 What is
THE BLUENOSE SECURITY FRAMEWORK
THE BLUENOSE SECURITY FRAMEWORK Bluenose Analytics, Inc. All rights reserved TABLE OF CONTENTS Bluenose Analytics, Inc. Security Whitepaper ISO 27001/27002 / 1 The Four Pillars of Our Security Program
{Moving to the cloud}
{Moving to the cloud} plantemoran.com doesn t mean outsourcing your security controls. Cloud computing is a strategic move. Its impact will have a ripple effect throughout an organization. You don t have
Certified Information Systems Auditor (CISA)
Certified Information Systems Auditor (CISA) Course Introduction Course Introduction Module 01 - The Process of Auditing Information Systems Lesson 1: Management of the Audit Function Organization of the
White Paper How Noah Mobile uses Microsoft Azure Core Services
NoahMobile Documentation White Paper How Noah Mobile uses Microsoft Azure Core Services The Noah Mobile Cloud service is built for the Microsoft Azure platform. The solutions that are part of the Noah
Security Controls What Works. Southside Virginia Community College: Security Awareness
Security Controls What Works Southside Virginia Community College: Security Awareness Session Overview Identification of Information Security Drivers Identification of Regulations and Acts Introduction
Security Controls for the Autodesk 360 Managed Services
Autodesk Trust Center Security Controls for the Autodesk 360 Managed Services Autodesk strives to apply the operational best practices of leading cloud-computing providers around the world. Sound practices
Security Overview. BlackBerry Corporate Infrastructure
Security Overview BlackBerry Corporate Infrastructure Published: 2015-04-23 SWD-20150423095908892 Contents Introduction... 5 History... 6 BlackBerry policies...7 Security organizations...8 Corporate Security
Media Shuttle s Defense-in- Depth Security Strategy
Media Shuttle s Defense-in- Depth Security Strategy Introduction When you are in the midst of the creative flow and tedious editorial process of a big project, the security of your files as they pass among
Cloud Security and Managing Use Risks
Carl F. Allen, CISM, CRISC, MBA Director, Information Systems Security Intermountain Healthcare Regulatory Compliance External Audit Legal and ediscovery Information Security Architecture Models Access
Securing the Service Desk in the Cloud
TECHNICAL WHITE PAPER Securing the Service Desk in the Cloud BMC s Security Strategy for ITSM in the SaaS Environment Introduction Faced with a growing number of regulatory, corporate, and industry requirements,
BMC s Security Strategy for ITSM in the SaaS Environment
BMC s Security Strategy for ITSM in the SaaS Environment TABLE OF CONTENTS Introduction... 3 Data Security... 4 Secure Backup... 6 Administrative Access... 6 Patching Processes... 6 Security Certifications...
How To Achieve Pca Compliance With Redhat Enterprise Linux
Achieving PCI Compliance with Red Hat Enterprise Linux June 2009 CONTENTS EXECUTIVE SUMMARY...2 OVERVIEW OF PCI...3 1.1. What is PCI DSS?... 3 1.2. Who is impacted by PCI?... 3 1.3. Requirements for achieving
(Instructor-led; 3 Days)
Information Security Manager: Architecture, Planning, and Governance (Instructor-led; 3 Days) Module I. Information Security Governance A. Introduction to Information Security Governance B. Overview of
Infor CloudSuite. Defense-in-depth. Table of Contents. Technical Paper Plain talk about Infor CloudSuite security
Technical Paper Plain talk about security When it comes to Cloud deployment, security is top of mind for all concerned. The Infor CloudSuite team uses best-practice protocols and a thorough, continuous
University of Pittsburgh Security Assessment Questionnaire (v1.5)
Technology Help Desk 412 624-HELP [4357] technology.pitt.edu University of Pittsburgh Security Assessment Questionnaire (v1.5) Directions and Instructions for completing this assessment The answers provided
Virginia Government Finance Officers Association Spring Conference May 28, 2014. Cloud Security 101
Virginia Government Finance Officers Association Spring Conference May 28, 2014 Cloud Security 101 Presenters: John Montoro, RealTime Accounting Solutions Ted Brown, Network Alliance Presenters John Montoro
Data Security and Privacy Principles for IBM SaaS How IBM Software as a Service is protected by IBM s security-driven culture
Data Security and Privacy Principles for IBM SaaS How IBM Software as a Service is protected by IBM s security-driven culture 2 Data Security and Privacy Principles for IBM SaaS Contents 2 Introduction
TOP SECRETS OF CLOUD SECURITY
TOP SECRETS OF CLOUD SECURITY Protect Your Organization s Valuable Content Table of Contents Does the Cloud Pose Special Security Challenges?...2 Client Authentication...3 User Security Management...3
HIPAA CRITICAL AREAS TECHNICAL SECURITY FOCUS FOR CLOUD DEPLOYMENT
HIPAA CRITICAL AREAS TECHNICAL SECURITY FOCUS FOR CLOUD DEPLOYMENT A Review List This paper was put together with Security in mind, ISO, and HIPAA, for guidance as you move into a cloud deployment Dr.
GoodData Corporation Security White Paper
GoodData Corporation Security White Paper May 2016 Executive Overview The GoodData Analytics Distribution Platform is designed to help Enterprises and Independent Software Vendors (ISVs) securely share
STORAGE SECURITY TUTORIAL With a focus on Cloud Storage. Gordon Arnold, IBM
STORAGE SECURITY TUTORIAL With a focus on Cloud Storage Gordon Arnold, IBM SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and individual members
Introduction to Cyber Security / Information Security
Introduction to Cyber Security / Information Security Syllabus for Introduction to Cyber Security / Information Security program * for students of University of Pune is given below. The program will be
IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:
IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including: 1. IT Cost Containment 84 topics 2. Cloud Computing Readiness 225
Cloud Computing Governance & Security. Security Risks in the Cloud
Cloud Computing Governance & Security The top ten questions you have to ask Mike Small CEng, FBCS, CITP Fellow Analyst, KuppingerCole This Webinar is supported by Agenda What is the Problem? Ten Cloud
Cloud Security Who do you trust?
Thought Leadership White Paper Cloud Computing Cloud Security Who do you trust? Nick Coleman, IBM Cloud Security Leader Martin Borrett, IBM Lead Security Architect 2 Cloud Security Who do you trust? Cloud
White Paper Achieving PCI Data Security Standard Compliance through Security Information Management. White Paper / PCI
White Paper Achieving PCI Data Security Standard Compliance through Security Information Management White Paper / PCI Contents Executive Summary... 1 Introduction: Brief Overview of PCI...1 The PCI Challenge:
Security, Compliance & Risk Management for Cloud Relationships. Adnan Dakhwe, MS, CISA, CRISC, CRMA Safeway Inc. In-Depth Seminars D32
Security, Compliance & Risk Management for Cloud Relationships Adnan Dakhwe, MS, CISA, CRISC, CRMA Safeway Inc. In-Depth Seminars D32 Introductions & Poll Organization is leveraging the Cloud? Organization
APPENDIX G ASP/SaaS SECURITY ASSESSMENT CHECKLIST
APPENDIX G ASP/SaaS SECURITY ASSESSMENT CHECKLIST Application Name: Vendor Name: Briefly describe the purpose of the application. Include an overview of the application architecture, and identify the data
Security Officer s Checklist in a Sourcing Deal
Security Officer s Checklist in a Sourcing Deal Guide Share Europe Ostend, May 9th 2014 Johan Van Mengsel IBM Distinguished IT Specialist IBM Client Abstract Sourcing deals creates opportunities and challenges.
Addressing Security for Hybrid Cloud
Addressing Security for Hybrid Cloud Sreekanth Iyer Executive IT Architect IBM Cloud (CTO Office) Email : [email protected] Twitter: @sreek Blog: http://ibm.co/sreek July 18, 2015 Cloud is rapidly
Rajan R. Pant Controller Office of Controller of Certification Ministry of Science & Technology [email protected]
Rajan R. Pant Controller Office of Controller of Certification Ministry of Science & Technology [email protected] Meaning Why is Security Audit Important Framework Audit Process Auditing Application Security
Cloud Security: The Grand Challenge
Dr. Paul Ashley IBM Software Group [email protected] Cloud Security: The Grand Challenge Outline Cloud computing: the pros, the cons, the blind spots Security in the cloud - what are the risks now and
Cloud Security Keeping Data Safe in the Boundaryless World of Cloud Computing
Cloud Security Keeping Data Safe in the Boundaryless World of Cloud Computing Executive Summary As cloud service providers mature, and expand and refine their offerings, it is increasingly difficult for
Private vs. Public Cloud Solutions
Private vs. Public Cloud Solutions Selecting the right cloud technology to fit your organization Introduction As cloud storage evolves, different cloud solutions have emerged. Our first cloud whitepaper
INTRODUCTION TO CLOUD COMPUTING CEN483 PARALLEL AND DISTRIBUTED SYSTEMS
INTRODUCTION TO CLOUD COMPUTING CEN483 PARALLEL AND DISTRIBUTED SYSTEMS CLOUD COMPUTING Cloud computing is a model for enabling convenient, ondemand network access to a shared pool of configurable computing
ISO27001 Controls and Objectives
Introduction This reference document for the University of Birmingham lists the control objectives, specific controls and background information, as given in Annex A to ISO/IEC 27001:2005. As such, the
Assessing Risks in the Cloud
Assessing Risks in the Cloud Jim Reavis Executive Director Cloud Security Alliance Agenda Definitions of Cloud & Cloud Usage Key Cloud Risks About CSA CSA Guidance approach to Addressing Risks Research
Network Security Administrator
Network Security Administrator Course ID ECC600 Course Description This course looks at the network security in defensive view. The ENSA program is designed to provide fundamental skills needed to analyze
SURVEY PAPER ON SECURITY IN CLOUD COMPUTING
SURVEY PAPER ON SECURITY IN CLOUD COMPUTING Jasleen Kaur Research Scholar, RIMT, Mandi Gobindgarh Dr. Sushil Garg Principal, RIMT, Mandi Gobindgarh ABSTRACT: Cloud Computing provides resources to the users
PCI Compliance for Cloud Applications
What Is It? The Payment Card Industry Data Security Standard (PCIDSS), in particular v3.0, aims to reduce credit card fraud by minimizing the risks associated with the transmission, processing, and storage
Developing the Corporate Security Architecture. www.avient.ca Alex Woda July 22, 2009
Developing the Corporate Security Architecture www.avient.ca Alex Woda July 22, 2009 Avient Solutions Group Avient Solutions Group is based in Markham and is a professional services firm specializing in
Security Threat Risk Assessment: the final key piece of the PIA puzzle
Security Threat Risk Assessment: the final key piece of the PIA puzzle Curtis Kore, Information Security Analyst Angela Swan, Director, Information Security Agenda Introduction Current issues The value
Securing and Auditing Cloud Computing. Jason Alexander Chief Information Security Officer
Securing and Auditing Cloud Computing Jason Alexander Chief Information Security Officer What is Cloud Computing A model for enabling convenient, on-demand network access to a shared pool of configurable
What Cloud computing means in real life
ITU TRCSL Symposium on Cloud Computing Session 2: Cloud Computing Foundation and Requirements What Cloud computing means in real life Saman Perera Senior General Manager Information Systems Mobitel (Pvt)
Cloud security architecture
ericsson White paper Uen 284 23-3244 January 2015 Cloud security architecture from process to deployment The Trust Engine concept and logical cloud security architecture presented in this paper provide
¼ããÀ ããè¾ã ¹ãÆãä ã¼ãîãä ã ããõà ãäìããä ã½ã¾ã ºããñ à Securities and Exchange Board of India
CIRCULAR CIR/MRD/DP/13/2015 July 06, 2015 To, All Stock Exchanges, Clearing Corporation and Depositories. Dear Sir / Madam, Subject: Cyber Security and Cyber Resilience framework of Stock Exchanges, Clearing
A Survey on Security Issues and Security Schemes for Cloud and Multi-Cloud Computing
International Journal of Emerging Engineering Research and Technology Volume 3, Issue 5, May 2015, PP 1-7 ISSN 2349-4395 (Print) & ISSN 2349-4409 (Online) A Survey on Security Issues and Security Schemes
Fortinet Solutions for Compliance Requirements
s for Compliance Requirements Sarbanes Oxley (SOX / SARBOX) Section / Reference Technical Control Requirement SOX references ISO 17799 for Firewall FortiGate implementation specifics IDS / IPS Centralized
FBLA Cyber Security aligned with Common Core 6.14. FBLA: Cyber Security RST.9-10.4 RST.11-12.4 RST.9-10.4 RST.11-12.4 WHST.9-10.4 WHST.11-12.
Competency: Defend and Attack (virus, spam, spyware, Trojans, hijackers, worms) 1. Identify basic security risks and issues to computer hardware, software, and data. 2. Define the various virus types and
Ragy Magdy Regional Channel Manager MEA IBM Security Systems
Ragy Magdy Regional Channel Manager MEA IBM Security Systems 1 Started my career in Security in 2003 by Joining ISS 2005 was named the ISS Regional Manager for the Middle East 2006 ISS was acquired by
Securing Smart City Platforms IoT, M2M, Cloud and Big Data
SESSION ID: SSC-W10 Securing Smart City Platforms IoT, M2M, Cloud and Big Data Ibrahim Al Mallouhi Vice President - Operations Emirates Integrated Telecommunication Company (du) Roshan Daluwakgoda Senior
Enterprise Security Architecture for Cyber Security. M.M.Veeraragaloo 5 th September 2013
Enterprise Security Architecture for Cyber Security M.M.Veeraragaloo 5 th September 2013 Outline Cyber Security Overview TOGAF and Sherwood Applied Business Security Architecture (SABSA) o o Overview of
Release 1. ICAICT814A Develop cloud computing strategies for a business
Release 1 ICAICT814A Develop cloud computing strategies for a business ICAICT814A Develop cloud computing strategies for a business Modification History Release Release 1 Comments This version first released
Security Issues in Cloud Computing
Security Issues in Cloud Computing Dr. A. Askarunisa Professor and Head Vickram College of Engineering, Madurai, Tamilnadu, India N.Ganesh Sr.Lecturer Vickram College of Engineering, Madurai, Tamilnadu,
RE Think. IT & Business. Invent. IBM SmartCloud Security. Dr. Khaled Negm, SMIEEE, ACM Fellow IBM SW Global Competency Center Leader GCC
RE Think Invent IT & Business IBM SmartCloud Security Dr. Khaled Negm, SMIEEE, ACM Fellow IBM SW Global Competency Center Leader GCC 2014 IBM Corporation Some Business Questions Is Your Company is Secure
Keywords Cloud Storage, Error Identification, Partitioning, Cloud Storage Integrity Checking, Digital Signature Extraction, Encryption, Decryption
Partitioning Data and Domain Integrity Checking for Storage - Improving Cloud Storage Security Using Data Partitioning Technique Santosh Jogade *, Ravi Sharma, Prof. Rajani Kadam Department Of Computer
Managing Cloud Computing Risk
Managing Cloud Computing Risk Presented By: Dan Desko; Manager, Internal IT Audit & Risk Advisory Services Schneider Downs & Co. Inc. [email protected] Learning Objectives Understand how to identify
Enterprise Architecture Review Checklist
Enterprise Architecture Review Checklist Software as a Service (SaaS) Solutions Overview This document serves as Informatica s Enterprise Architecture (EA) Review checklist for Cloud vendors that wish
Approach to Information Security Architecture. Kaapro Kanto Chief Architect, Security and Privacy TeliaSonera
Approach to Information Security Architecture Kaapro Kanto Chief Architect, Security and Privacy TeliaSonera About TeliaSonera TeliaSonera provides network access and telecommunication services that help
IT Audit in the Cloud
IT Audit in the Cloud Pavlina Ivanova, CISM ISACA-Sofia Chapter Content: o 1. Introduction o 2. Cloud Computing o 3. IT Audit in the Cloud o 4. Residual Risks o Used Resources o Questions 1. ISACA Trust
Aadhaar. Security Policy & Framework for UIDAI Authentication. Version 1.0. Unique Identification Authority of India (UIDAI)
Aadhaar Security Policy & Framework for UIDAI Authentication Version 1.0 Unique Identification Authority of India (UIDAI) Table of Contents ACRONYMS AND TERMS... 3 1. INTRODUCTION... 4 2. SECURITY CONSIDERATION...
Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data
Kenna Platform Security A technical overview of the comprehensive security measures Kenna uses to protect your data V2.0, JULY 2015 Multiple Layers of Protection Overview Password Salted-Hash Thank you
CLOUD STORAGE SECURITY INTRODUCTION. Gordon Arnold, IBM
CLOUD STORAGE SECURITY INTRODUCTION Gordon Arnold, IBM SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and individual members may use this material
INFORMATION SECURITY GOVERNANCE ASSESSMENT TOOL FOR HIGHER EDUCATION
INFORMATION SECURITY GOVERNANCE ASSESSMENT TOOL FOR HIGHER EDUCATION Information security is a critical issue for institutions of higher education (IHE). IHE face issues of risk, liability, business continuity,
Data Protection: From PKI to Virtualization & Cloud
Data Protection: From PKI to Virtualization & Cloud Raymond Yeung CISSP, CISA Senior Regional Director, HK/TW, ASEAN & A/NZ SafeNet Inc. Agenda What is PKI? And Value? Traditional PKI Usage Cloud Security
Cloud Computing An Auditor s Perspective
Cloud Computing An Auditor s Perspective Sailesh Gadia, CPA, CISA, CIPP [email protected] December 9, 2010 Discussion Agenda Introduction to cloud computing Types of cloud services Benefits, challenges,
DRAFT Standard Statement Encryption
DRAFT Standard Statement Encryption Title: Encryption Standard Document Number: SS-70-006 Effective Date: x/x/2010 Published by: Department of Information Systems 1. Purpose Sensitive information held
Cisco Advanced Services for Network Security
Data Sheet Cisco Advanced Services for Network Security IP Communications networking the convergence of data, voice, and video onto a single network offers opportunities for reducing communication costs
ClickTale Security Standards and Practices: Delivering Peace of Mind in Digital Optimization
Delivering Peace of Mind in Digital Optimization TABLE OF CONTENTS INTRODUCTION 2 PRIVACY AND ANONYMITY 3 ISO 27001 COMPLIANCE 5 APPLICATION-LEVEL SECURITY 6 PENETRATION TESTING AND SECURITY AUDITS 7 GENERAL
John Essner, CISO Office of Information Technology State of New Jersey
John Essner, CISO Office of Information Technology State of New Jersey http://csrc.nist.gov/publications/nistpubs/800-144/sp800-144.pdf Governance Compliance Trust Architecture Identity and Access Management
Securing the Cloud with IBM Security Systems. IBM Security Systems. 2012 IBM Corporation. 2012 2012 IBM IBM Corporation Corporation
Securing the Cloud with IBM Security Systems 1 2012 2012 IBM IBM Corporation Corporation IBM Point of View: Cloud can be made secure for business As with most new technology paradigms, security concerns
IBM Cognos TM1 on Cloud Solution scalability with rapid time to value
IBM Solution scalability with rapid time to value Cloud-based deployment for full performance management functionality Highlights Reduced IT overhead and increased utilization rates with less hardware.
ISO 27001 Controls and Objectives
ISO 27001 s and Objectives A.5 Security policy A.5.1 Information security policy Objective: To provide management direction and support for information security in accordance with business requirements
Federal Aviation Administration. efast. Cloud Computing Services. 25 October 2012. Federal Aviation Administration
efast Cloud Computing Services 25 October 2012 1 Bottom Line Up Front The FAA Cloud Computing Vision released in 2012 identified the agency's road map to meet the Cloud First Policy efast must provide
COPYRIGHTED MATERIAL. Contents. Acknowledgments Introduction
Contents Acknowledgments Introduction 1. Governance Overview How Do We Do It? What Do We 1 Get Out of It? 1.1 What Is It? 1 1.2 Back to Basics 2 1.3 Origins of Governance 3 1.4 Governance Definition 5
Security and Privacy in Cloud Computing
Security and Privacy in Cloud Computing - Study Report Sai Lakshmi General Manager Enterprise Security Solutions 2 Agenda Background & Objective Current Scenario & Future of Cloud Computing Challenges
Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist, CISSP @TheGrantBrown
Cyber Resilience Implementing the Right Strategy Grant Brown specialist, CISSP @TheGrantBrown 1 2 Network + Technology + Customers = $$ 3 Perfect Storm? 1) Increase in Bandwidth (extended reach) 2) Available
Secure your cloud applications by building solid foundations with enterprise (security ) architecture
Supporting Business Agility Secure your cloud applications by building solid foundations with enterprise (security ) architecture Vladimir Jirasek, Managing director Jirasek Consulting Services & Research
EXIN Cloud Computing Foundation
Sample Questions EXIN Cloud Computing Foundation Edition April 2013 Copyright 2013 EXIN All rights reserved. No part of this publication may be published, reproduced, copied or stored in a data processing
SaaS Security for Confirmit Horizons
SaaS Security for Confirmit Horizons January 2015 Confirmit Horizons v18.5 Arnt Feruglio Chief Operating Officer The Confirmit Horizons Software From its inception in 1997, the architecture and code of
IBM Connections Cloud Security
IBM Connections White Paper September 2014 IBM Connections Cloud Security 2 IBM Connections Cloud Security Contents 3 Introduction 4 Security-rich Infrastructure 6 Policy Enforcement Points Provide Application
Healthcare Compliance Solutions
Privacy Compliance Healthcare Compliance Solutions Trust and privacy are essential for building meaningful human relationships. Let Protected Trust be your Safe Harbor The U.S. Department of Health and
7 Homeland. ty Grant Program HOMELAND SECURITY GRANT PROGRAM. Fiscal Year 2008
U.S. D EPARTMENT OF H OMELAND S ECURITY 7 Homeland Fiscal Year 2008 HOMELAND SECURITY GRANT PROGRAM ty Grant Program SUPPLEMENTAL RESOURCE: CYBER SECURITY GUIDANCE uidelines and Application Kit (October
