Certification infrastructure for MUlti-Layer cloud Services

Size: px
Start display at page:

Download "Certification infrastructure for MUlti-Layer cloud Services"

Transcription

1 Certificatin infrastructure fr MUlti-Layer clud Services Bartlme Sapi CUMULUS Prject Crdinatr Fndazine Ug Brdni Rma (Italy) Trust and Security Clustering Open Cmmunicatins event Brussels, 7 February 2013

2 Outline Clud a critical infrastructure Clud Security & Dependability Still a prblem? The CUMULUS apprach Overview and aims Objectives Wrk Packages Milestnes Scenaris References

3 Clud a critical infrastructure

4 Clud a critical infrastructure Fast increasing number f services ffered thrugh cluds, e.g. Eurpe: frm 4.6bn public clud services in 2011 ( 3.5bn sftware 1.1bn hardware) t 11bn services in 2014 [10] Wrldwide: public clud service market t increase frm $17.98bn in 2011 t $66.27bn by 2016 [11] The Clud becmes a critical infrastructure any system which is essential fr the maintenance f vital scietal functins the disruptin r destructin f which wuld have a significant impact in a Member State Cuncil Directive 2008/114/EC f 8 December 2008 n the identificatin and designatin f Eurpean critical infrastructures and the assessment f the need t imprve their prtectin;

5 Clud Security & Dependability (S & D)

6 Clud S & D the arguments Still a prblem? The prvider s argument: Increased S&D due t Cncentratin and availability f expertise Use f cutting edge security slutins Increased cntrls Regular audits Cunter arguments: Breach f data integrity, cnfidentiality [1,2,3] and privacy [4] Spamming, crss-site scripting attacks [5] Denial-r-service (DS) attacks [6,7] Reduced applicatin and data availability [2] Authenticatin, authrizatin and accunting (AAA) vulnerabilities [2,1] VM vulnerabilities (e.g., heap verflw, abnrmal terminatin f VM prcesses) fllwing stress testing and inspectin [12]

7 Clud S & D the evidence Sme incidents Amazn 24/12/2012: utage f Elastic Lad Balancing Service (lad balancing f virtual servers) fr 10Hrs (affected Netflix) 04/2011: EC2 clud suffered multiday utages causing lss f availability and data (affected Reddit/36Hrs, Fursquares, Htsuite and Qura/48Hrs) Micrsft Azure 28/2/2012: unavailability (24Hrs) due t leap year affecting, plus up t 24 mre Hrs t restre (affected UK G-Clud CludStre) Megauplad 01/2012: clud strage service suspensin due t cpyright infringement (effect: 180m users / 25 petabyte); c-tenants permanent data lss & reputatin damage Other 06/2009: 0-day vulnerability in HyperVM (LxLabs) server virtualisatin; explited t delete100,000 websites using it fr hsting purpses

8 Clud S & D surce f the prblem (1) Reduced cntrl ver sftware and data Wrse in the case f federated cluds as yu d nt knw wh is actually the clud prvider in the federatin that has yur sftware and data Multi-tenancy can lead t breaches f data integrity, cnfidentiality and privacy Interference between cmplex security mechanisms that might exist at different layers in a clud (infrastructure, platfrm and sftware) vulnerabilities Interference between security and clud virtualisatin/ptimisatin mechanisms, e.g., failure f access cntrl due t resurce exhaustin service unavailability due t unbalanced r heavy resurce utilisatin [2] spreading f DS attacks t ther servers in clud federatins due t lad balancing [7]

9 Clud S & D surce f the prblem (2) Vulnerability f the clud infrastructure itself E.g., subverting administrative functins f the clud infrastructure and attacking virtual machine mnitrs [8] Fate-sharing effects, fllwing a successful attack a clud infrastructure may, fr example, becme the hst f subverts executing illegitimate peratins frm it (e.g., spamming attacks), r peratinally disrupted fr sme ther reasn [9] reputatin damage fr c-tenant service prviders unavailability f service attributin f blame Cmplex service supply chains

10 Hw des CUMULUS fit in all this?

11 CUMULUS - verview EU funded STREP (medium size targeted) research prject (Prj. n ) Ttal budget: 4.3m EU cntributin: ~ 3m funding CONSORTIUM Clud Security Alliance (UK) Infinen Technlgies AG (D) City University Lndn (UK) ATOS SPAIN SA (S) Wellness Telecm SL (S) University f Malaga (S) University f Milan (I) Fndazine Ug Brdni (I)

12 CUMULUS Overall aim Develpment f an integrated framewrk f mdels, prcesses, and tls supprting the certificatin f security prperties f infrastructure (IaaS), platfrm (PaaS) and sftware applicatin layer services (SaaS) in cluds. Use f multiple types f evidence fr security assessment including testing data mnitring data trusted cmputing prfs Use f different mdels fr security assessment: hybrid, incremental, and multi-layer security certificatin.

13 CUMULUS Objectives Objective 1: Develpment f advanced clud service certificatin mdels based n service testing data, service mnitring data, and trusted cmputing platfrms prfs and supprting hybrid, incremental and multi-layer certificatin. Objective 2: Develpment f an interperable certificatin infrastructure fr generating, maintaining and using certificates accrding t the different types f the certificatin mdels develped in CUMULUS. Objective 3: Develpment f a service engineering prcess supprting the develpment f clud services that can make use f the CUMULUS framewrk. Objective 4: Evaluatin f the technical sundness and industrial applicability f the CUMULUS certificatin framewrk. Objective 5: Delivery f an interperable certificatin slutin and cntributin t standards.

14 CUMULUS Objective 1 Objective 1: Develpment f advanced clud service certificatin mdels based n service testing data, service mnitring data, and trusted cmputing platfrms prfs and supprting hybrid, incremental and multi-layer certificatin. Objective 2: Develpment f an interperable certificatin infrastructure fr generating, maintaining and using certificates accrding t the different types f the certificatin mdels develped in CUMULUS. Objective 3: Develpment f a service engineering prcess supprting the develpment f clud services that can make use f the CUMULUS framewrk. Objective 4: Evaluatin f the technical sundness and industrial applicability f the CUMULUS certificatin framewrk. Objective 5: Delivery f an interperable certificatin slutin and cntributin t standards.

15 Hybrid certificatin What? Certificatin based n cmbinatin f different types f evidence: testing data mnitring data trusted cmputing prfs fr the hardware elements f clud infrastructures Why? Sme prperties might be certifiable using a cmbinatin f evidence types

16 Hybrid certificatin examples The availability f a SaaS layer service S may be certified by a certificate based n: test data fr the service and a TC prf fr the cnfiguratin f the hsting clud infrastructure (t ensure that the infrastructure where the service is deplyed is the same as that fr which test data were btained) Hybrid certificate fr a SaaS service integrity based n test data and cntinuus mnitring in real perating cnditins Cert Test Data TC Prf Cert Test Data Mnitr Data

17 Multi-layer certificatin What? Certificatin based n a cmbinatin f certificates f interdependent services (as ppsed t simply evidence ) at different layers f the clud stack Nte: dependencies can be bttm-up, tp-dwn r side-level Why? Security prperties are affected by such dependencies Liability r reasning restrictins (e.g., inability t btain the direct evidence required fr prperty assessment) require making assessments n the basis f certificates rather than direct evidence

18 Multi-layer certificatin examples The integrity f data-at-rest f a sftware service S 1 using a clud strage service S 2 culd be certified n the basis f a certificate regarding the crrect implementatin f a prff-strage prtcl by S 2 SaaS PaaS The availability f a messaging service in a clud federatin may be certified n the basis f certificates regarding DSresilience f the hsting nde(s) in the federatin A data-in-prcess integrity certificate f a SaaS layer service requires TCP based certificate fr hypervisr t ensure crrect mnitring f security cnditins f infrastructure services that are necessary fr data-inprcess integrity, and avidance f data leaks f relevant mnitring data PaaS IaaS SaaS IaaS

19 Incremental certificatin What? Ability t cver changes that may affect certified prperties f clud services withut having t re-certify prperties frm scratch Why? Operatinal cnditins within a clud infrastructure may change Clud services and data may migrate t different clud infrastructures within a clud federatin Cnstituent services f cmpsite services may be substituted (whether c-tenant r nt)

20 Incremental certificatin examples Re-validatin f certificate due t changing peratinal cnditins, e.g.: the certificate C fr data integrity f a sftware service requires a certificate C fr the data islatin scheme perated by the clud strage service; the sftware service migrates t a different nde in a clud federatin C needs t be revalidated by cnsidering whether the new hsting clud has a certificate equivalent t (r apprpriate substitute fr) C Use cntinuus mnitring t create new certificates r strengthen existing certificates with increased peratinal evidence, e.g., The certificate f data-islatin fr sftware service in a given infrastructure requires islatin f c-tenant services in the infrastructure; the certificate is cntinually validated thrugh cntinuus mnitring f the infrastructure

21 CUMULUS Objective 2 Objective 1: Develpment f advanced clud service certificatin mdels based n service testing data, service mnitring data, and trusted cmputing platfrms prfs and supprting hybrid, incremental and multi-layer certificatin. Objective 2: Develpment f an interperable certificatin infrastructure fr generating, maintaining and using certificates accrding t the different types f the certificatin mdels develped in CUMULUS. Objective 3: Develpment f a service engineering prcess supprting the develpment f clud services that can make use f the CUMULUS framewrk. Objective 4: Evaluatin f the technical sundness and industrial applicability f the CUMULUS certificatin framewrk. Objective 5: Delivery f an interperable certificatin slutin and cntributin t standards.

22 CUMULUS Infrastructure Certificati n Mdels Test Based Certificatin CUMULUS Aware Service Engineering Tls CUMULUS Certificatin Infrastructure Multi-layer, hybrid & incremental Certificatin Mnitring Based Certificatin Security Mdels Trusted Cmputing Based Certificatin Clud Service Prvider Clud Service CertificatinCustmer Authrity Clud Trust Prtcl Clud 1 Clud Mnit r TestService TCP Clud 2 Clud Mnit r Mnitring Service Clud N TCP Mnitring Service Clud Clud Mnitr Mnitr External Certificate Registries (e.g., STAR)

23 CUMULUS Objective 3 Objective 1: Develpment f advanced clud service certificatin mdels based n service testing data, service mnitring data, and trusted cmputing platfrms prfs and supprting hybrid, incremental and multi-layer certificatin. Objective 2: Develpment f an interperable certificatin infrastructure fr generating, maintaining and using certificates accrding t the different types f the certificatin mdels develped in CUMULUS. Objective 3: Develpment f a service engineering prcess supprting the develpment f clud services that can make use f the CUMULUS framewrk. Objective 4: Evaluatin f the technical sundness and industrial applicability f the CUMULUS certificatin framewrk. Objective 5: Delivery f an interperable certificatin slutin and cntributin t standards.

24 CUMULUS-aware service engineering Prcesses and mechanisms fr develping CUMULUS-aware SaaS clud services re-engineering existing applicatins t make use f CUMULUS infrastructure Identificatin and representatin f security requirements in sftware cmpnents Retrieve, assess, exchange and negtiate certificates generated by the CUMULUS infrastructure.

25 CUMULUS Objective 4 Objective 1: Develpment f advanced clud service certificatin mdels based n service testing data, service mnitring data, and trusted cmputing platfrms prfs and supprting hybrid, incremental and multi-layer certificatin. Objective 2: Develpment f an interperable certificatin infrastructure fr generating, maintaining and using certificates accrding t the different types f the certificatin mdels develped in CUMULUS. Objective 3: Develpment f a service engineering prcess supprting the develpment f clud services that can make use f the CUMULUS framewrk. Objective 4: Evaluatin f the technical sundness and industrial applicability f the CUMULUS certificatin framewrk. Objective 5: Delivery f an interperable certificatin slutin and cntributin t standards.

26 CUMULUS Evaluatin & industrial applicability Clud applicatin scenaris in specific dmains SmartCities ehealth Evaluatin framewrk Technical (e.g., prperties f algrithms in certificatin mdels, efficiency f certificatin mdels, infrastructure etc.) Operatinal (e.g., effects f changing clud peratinal cnditins) Business: Legal: acceptability f certificate fit with audit practice cst effectiveness/business incentives/regulated markets des it address regulatins? can it cpe with change in regulatins?

27 CUMULUS Objective 5 Objective 1: Develpment f advanced clud service certificatin mdels based n service testing data, service mnitring data, and trusted cmputing platfrms prfs and supprting hybrid, incremental and multi-layer certificatin. Objective 2: Develpment f an interperable certificatin infrastructure fr generating, maintaining and using certificates accrding t the different types f the certificatin mdels develped in CUMULUS. Objective 3: Develpment f a service engineering prcess supprting the develpment f clud services that can make use f the CUMULUS framewrk. Objective 4: Evaluatin f the technical sundness and industrial applicability f the CUMULUS certificatin framewrk. Objective 5: Delivery f an interperable certificatin slutin and cntributin t standards.

28 Interperability & standards Interperability with emerging standards (e.g., GRC stack, STAR Registry) fr clud audit reference clud architectures (e.g., Nebula, CSA s reference architecture) Cntributin t standards, e.g.: OCF (CSA; nging) cntributes underpin underpin ISO (Clud cntrls; nging) ISO (Privacy in public cluds; nging) Key challenge/pprtunity Mst f these standards are under develpment (e.g., OCF, ISO27017)

29 Wrk Packages

30 Milestnes Milestne name WP(s) invlved Expected date ML1 Certificatin scenaris & requirements WP6 M6 ML2 Architecture f CUMULUS framewrk WP5 M9 ML3 Clud Security and Certificatin Mdels WP2 M12 ML4 Integrated CUMULUS framewrk WP3, WP4, WP5 M24 ML5 Initial Evaluatin f Certificatin Framewrk WP6 M28 ML6 Final CUMULUS framewrk WP2, WP3, WP4, WP5 M34 ML7 Final Evaluatin f Certificatin Framewrk & Explitatin Plan WP6, WP7 M36

31 Smart City scenari Internet VPN Mbile Operatr APN Public IP 3G Mdem GPRS VPN Public IP Electrical Panel FW FW LCU Public Lighting 50x FE Servers Strage

32 E-health scenari Dctrs, Specialist Hspital DB caregivers, patient 32

33 Thank yu!

34 References (1) [1] J. Heiser and M. Niclett, Assessing the Security Risks f Clud Cmputing, Gartner Reprt G , June 2008 [2] D. Catteddu and G. Hgben, Clud Cmputing: Benefits, Risks and Recmmendatins fr Infrmatin Security., Eurpean Netwrk and Infrmatin Security Agency (ENISA), 2009 [3] L. Kaufman. Data Security in the Wrld f Clud Cmputing. IEEE Security and Privacy 7, 4: 61-64, July [4] R. Austin, et al., Dmain 5: Infrmatin Lifecycle Management., In Security Guidance fr Critical Areas f Fcus in Clud Cmputing V2.1, CSA Clud Security Alliance, December [5] T. Frsheit, et al., Dmain 3: Legal and Electrnic Discvery., In Security Guidance fr Critical Areas f Fcus in Clud Cmputing V2.1, CSA Clud Security Alliance, December [6] A. Haeberlen. A case fr the accuntable clud., SIGOPS Oper. Syst. Rev. 44(2): 52-57, April [7] M. Jensen, et al., On Technical Security Issues in Clud Cmputing. In Prceedings f the 2009 IEEE Internatinal Cnference n Clud Cmputing (CLOUD '09). IEEE Cmputer Sciety, Washingtn, DC, USA, , 2009 [8] T. Ristenpart, et al., Hey, yu, get ff f my clud: explring infrmatin leakage in third-party cmpute cluds. In Prceedings f the 16th ACM cnference n Cmputer and cmmunicatins security. ACM, USA, [9] Y. Chen, V. Paxsn, R. Katz, What s new abut clud security?, Technical Reprt N. UCB/EECS , University f Califrnia at Berkeley, 2010 [10] IDC. Quantitative Estimates f the Demand fr Clud Cmputing in Eurpe and the Likely Barriers t Take-up - SMART 2011/0045 D2 Interim Reprt, 24 February, [11] (accessed n 4/1/2012) [12] Ormandy T. "An empirical study int the security expsure t hsts f hstile virtualized envirnments." In Prceedings f CanSecWest Applied Security Cnference

Towards Novel Certification Models in Cloud Infrastructures (the CUMULUS approach)

Towards Novel Certification Models in Cloud Infrastructures (the CUMULUS approach) Twards Nvel Certificatin Mdels in Clud Infrastructures (the CUMULUS apprach) Prfessr G. Spanudakis Schl f Infrmatics CSP Frum, 18-19 April 2013, Brussels Outline Clud Security Still a prblem? Prvider perspective

More information

Better Practice Guide Financial Considerations for Government use of Cloud Computing

Better Practice Guide Financial Considerations for Government use of Cloud Computing Better Practice Guide Financial Cnsideratins fr Gvernment use f Clud Cmputing Nvember 2011 Intrductin Many Australian Gvernment agencies are in the prcess f cnsidering the adptin f clud-based slutins.

More information

Securely Managing Cryptographic Keys used within a Cloud Environment

Securely Managing Cryptographic Keys used within a Cloud Environment Securely Managing Cryptgraphic Keys used within a Clud Envirnment Dr. Sarbari Gupta sarbari@electrsft-inc.cm 703-437-9451 ext 12 2012 NIST Cryptgraphic Key Management Wrkshp September 10-11, 2012 Intrductin

More information

Configuring, Monitoring and Deploying a Private Cloud with System Center 2012 Boot Camp

Configuring, Monitoring and Deploying a Private Cloud with System Center 2012 Boot Camp Cnfiguring, Mnitring and Deplying a Private Clud with System Center 2012 Bt Camp Length: 5 Days Technlgy: Micrsft System Center 2012 Delivery Methd: Instructr-led Hands-n Audience Prfile This curse is

More information

Session 9 : Information Security and Risk

Session 9 : Information Security and Risk INFORMATION STRATEGY Sessin 9 : Infrmatin Security and Risk Tharaka Tennekn B.Sc (Hns) Cmputing, MBA (PIM - USJ) POST GRADUATE DIPLOMA IN BUSINESS AND FINANCE 2014 Infrmatin Management Framewrk 2 Infrmatin

More information

Agenda. o Purpose of IT Assessment o Scope of IT Assessment o Deloitte Recommendations o IBM Discussions o Research Data Center o Open Season

Agenda. o Purpose of IT Assessment o Scope of IT Assessment o Deloitte Recommendations o IBM Discussions o Research Data Center o Open Season Agenda Purpse f IT Assessment Scpe f IT Assessment Delitte Recmmendatins IBM Discussins Research Data Center Open Seasn Purpse f IT Assessment Determine if IT resurces are being utilized efficiently and

More information

Cloud Services Frequently Asked Questions FAQ

Cloud Services Frequently Asked Questions FAQ Clud Services Frequently Asked Questins FAQ Revisin 1.0 6/05/2015 List f Questins Intrductin What is the Caradigm Intelligence Platfrm (CIP) clud? What experience des Caradigm have hsting prducts like

More information

GUIDANCE FOR BUSINESS ASSOCIATES

GUIDANCE FOR BUSINESS ASSOCIATES GUIDANCE FOR BUSINESS ASSOCIATES This Guidance fr Business Assciates dcument is intended t verview UPMCs expectatins, as well as t prvide additinal resurces and infrmatin, t UPMC s HIPAA business assciates.

More information

HIPAA HITECH ACT Compliance, Review and Training Services

HIPAA HITECH ACT Compliance, Review and Training Services Cmpliance, Review and Training Services Risk Assessment and Risk Mitigatin: The first and mst imprtant step is t undertake a hlistic risk assessment that examines the risks and cntrls related t fur critical

More information

What is Software Risk Management? (And why should I care?)

What is Software Risk Management? (And why should I care?) What is Sftware Risk Management? (And why shuld I care?) Peter Kulik, KLCI, Inc. 1 st Editin, Octber 1996 Risks are schedule delays and cst verruns waiting t happen. As industry practices have imprved,

More information

Plus500CY Ltd. Statement on Privacy and Cookie Policy

Plus500CY Ltd. Statement on Privacy and Cookie Policy Plus500CY Ltd. Statement n Privacy and Ckie Plicy Statement n Privacy and Ckie Plicy This website is perated by Plus500CY Ltd. ("we, us r ur"). It is ur plicy t respect the cnfidentiality f infrmatin and

More information

Licensing the Core Client Access License (CAL) Suite and Enterprise CAL Suite

Licensing the Core Client Access License (CAL) Suite and Enterprise CAL Suite Vlume Licensing brief Licensing the Cre Client Access License (CAL) Suite and Enterprise CAL Suite Table f Cntents This brief applies t all Micrsft Vlume Licensing prgrams. Summary... 1 What s New in This

More information

G-CLOUD FRAMEWORK SERVICE DEFINITION. Solution Architecture for Cloud Service. Copyright: 2014 6point6 Ltd

G-CLOUD FRAMEWORK SERVICE DEFINITION. Solution Architecture for Cloud Service. Copyright: 2014 6point6 Ltd G-CLOUD FRAMEWORK SERVICE DEFINITION Slutin Architecture fr Clud Service Cpyright: 2014 6pint6 Ltd G-Clud Service Definitin Slutin Architecture fr Clud Service 1. SERVICE OVERVIEW 6pint6 is an innvative

More information

SUNRISE. Building and Experimenting with the Internet of Underwater Things

SUNRISE. Building and Experimenting with the Internet of Underwater Things SUNRISE Building and Experimenting with the Internet f Underwater Things Chiara Petrili FP7 SUNRISE Prject Crdinatr University f Rme La Sapienza Rbert Petrccia University f Rme La Sapienza This prject

More information

Build the cloud OpenStack Installation & Configuration Integration with existing tools and processes Cloud Migration

Build the cloud OpenStack Installation & Configuration Integration with existing tools and processes Cloud Migration Slutin Brief OpenStack Services OVERVIEW OnX understands clud adptin challenges f glbal enterprise cmpanies and helps Enterprises adpt OpenStack slutins thrugh targeted services. We ffer vertical industry

More information

The ADVANTAGE of Cloud Based Computing:

The ADVANTAGE of Cloud Based Computing: The ADVANTAGE f Clud Based Cmputing: A Web Based Slutin fr: Business wners and managers that perate equipment rental, sales and/r service based rganizatins. R M I Crpratin Business Reprt RMI Crpratin has

More information

Support Services. v1.19 / 2015-07-02

Support Services. v1.19 / 2015-07-02 Supprt Services v1.19 / 2015-07-02 Intrductin - Table f Cntents 1 Intrductin... 3 2 Definitins... 4 3 Supprt Prgram Feature Overview... 5 4 SLA fr the Supprt Services... 6 4.1 Standard Supprt... 6 4.2

More information

Personal Data Security Breach Management Policy

Personal Data Security Breach Management Policy Persnal Data Security Breach Management Plicy 1.0 Purpse The Data Prtectin Acts 1988 and 2003 impse bligatins n data cntrllers in Western Care Assciatin t prcess persnal data entrusted t them in a manner

More information

AHLA. C. Big Data, Cloud Computing and the New World Order for Health Care Privacy

AHLA. C. Big Data, Cloud Computing and the New World Order for Health Care Privacy AHLA C. Big Data, Clud Cmputing and the New Wrld Order fr Health Care Privacy Marti Arvin Chief Cmpliance Officer UCLA David Geffen Schl f Medicine Ls Angeles, CA Kirk J. Nahra Wiley Rein LLP Washingtn,

More information

A96 CALA Policy on the use of Computers in Accredited Laboratories Revision 1.5 August 4, 2015

A96 CALA Policy on the use of Computers in Accredited Laboratories Revision 1.5 August 4, 2015 A96 CALA Plicy n the use f Cmputers in Accredited Labratries Revisin 1.5 August 4, 2015 A96 CALA Plicy n the use f Cmputers in Accredited Labratries TABLE OF CONTENTS TABLE OF CONTENTS... 1 CALA POLICY

More information

Have some knowledge of how queries execute. Must be able to read a query execution plan and understand what is happening.

Have some knowledge of how queries execute. Must be able to read a query execution plan and understand what is happening. Curse 2786B: Designing a Micrsft SQL Server 2005 Infrastructure Abut this Curse This tw-day instructr-led curse prvides database administratrs wrking in enterprise envirnments with the knwledge and skills

More information

POSITION DESCRIPTION. Classification Higher Education Worker, Level 7. Responsible to. I.T Manager. The Position

POSITION DESCRIPTION. Classification Higher Education Worker, Level 7. Responsible to. I.T Manager. The Position Psitin Title I.T Prject Officer Classificatin Higher Educatin Wrker, Level 7 Respnsible t The Psitin I.T Manager The psitin assists with the cmpletin f varius IT prjects intended t enable the nging administratin

More information

CASSOWARY COAST REGIONAL COUNCIL POLICY ENTERPRISE RISK MANAGEMENT

CASSOWARY COAST REGIONAL COUNCIL POLICY ENTERPRISE RISK MANAGEMENT CASSOWARY COAST REGIONAL COUNCIL POLICY ENTERPRISE RISK MANAGEMENT Plicy Number: 2.20 1. Authrity Lcal Gvernment Act 2009 Lcal Gvernment Regulatin 2012 AS/NZS ISO 31000-2009 Risk Management Principles

More information

Case Study. Sonata develops. comprehensive BI Application for a leading provider of Animal Nutrition Solutions. Ananthakrishnan

Case Study. Sonata develops. comprehensive BI Application for a leading provider of Animal Nutrition Solutions. Ananthakrishnan Case Study Ananthakrishnan Snata develps J Architect, Snata Sftware cmprehensive BI Applicatin fr a leading prvider f Animal Nutritin Slutins Snata Sftware Limited www.snata-sftware.cm www.snata-sftware.cm

More information

Chapter 7 Business Continuity and Risk Management

Chapter 7 Business Continuity and Risk Management Chapter 7 Business Cntinuity and Risk Management Sectin 01 Business Cntinuity Management 070101 Initiating the Business Cntinuity Plan (BCP) Purpse: T establish the apprpriate level f business cntinuity

More information

UC4 AUTOMATED VIRTUALIZATION Intelligent Service Automation for Physical and Virtual Environments

UC4 AUTOMATED VIRTUALIZATION Intelligent Service Automation for Physical and Virtual Environments Fr mre infrmatin abut UC4 prducts please visit www.uc4.cm. UC4 AUTOMATED VIRTUALIZATION Intelligent Service Autmatin fr Physical and Virtual Envirnments Intrductin This whitepaper describes hw the UC4

More information

How Does Cloud Computing Work?

How Does Cloud Computing Work? Hw Des Clud Cmputing Wrk? Carl Mazzanti, CEO, emazzanti Technlgies IT Supprt and Clud Cmputing Services fr Small Business Hbken, NJ and NYC, 201-360- 4400 Owner [Pick the date] Hw des Clud Cmputing Wrk?

More information

How To Write An Itu-T Security Standards Manual

How To Write An Itu-T Security Standards Manual ITU-T Netwrk Security Initiatives Michael Harrp The Cttingham Grup Internatinal Telecmmunicatin Unin Overview f Presentatin ITU-T Shw the cntext f ITU-T security standards activities Highlight sme f key

More information

This report provides Members with an update on of the financial performance of the Corporation s managed IS service contract with Agilisys Ltd.

This report provides Members with an update on of the financial performance of the Corporation s managed IS service contract with Agilisys Ltd. Cmmittee: Date(s): Infrmatin Systems Sub Cmmittee 11 th March 2015 Subject: Agilisys Managed Service Financial Reprt Reprt f: Chamberlain Summary Public Fr Infrmatin This reprt prvides Members with an

More information

Privacy Policy. The Central Equity Group understands how highly people value the protection of their privacy.

Privacy Policy. The Central Equity Group understands how highly people value the protection of their privacy. Privacy Plicy The Central Equity Grup understands hw highly peple value the prtectin f their privacy. Fr that reasn, the Central Equity Grup takes particular care in dealing with any persnal and sensitive

More information

Protection of Critical Infrastructure

Protection of Critical Infrastructure Prtectin f Critical Infrastructure Speaker: Mindaugas Razbadauskas Cmmunicatins Regulatry Authrity f the Republic f Lithuania 4-5 th Octber Belgrad Slide 1 f 22 Critical Infrastructure Prtectin Critical

More information

Position Paper on In-Network Object Cloud Architecture and Design Goals. Interconnecting Smart Objects with Internet Workshop 25 th March 2011

Position Paper on In-Network Object Cloud Architecture and Design Goals. Interconnecting Smart Objects with Internet Workshop 25 th March 2011 Architecture and Design Gals Intercnnecting Smart Objects with Internet Wrkshp 25 th March 2011 Alex Galis Stuart Clayman University Cllege Lndn Department

More information

HIPAA Compliance 101. Important Terms. Pittsburgh Computer Solutions 724-942-1337

HIPAA Compliance 101. Important Terms. Pittsburgh Computer Solutions 724-942-1337 HIPAA Cmpliance 101 Imprtant Terms Cvered Entities (CAs) The HIPAA Privacy Rule refers t three specific grups as cvered entities, including health plans, healthcare clearinghuses, and health care prviders

More information

Licensing Windows Server 2012 for use with virtualization technologies

Licensing Windows Server 2012 for use with virtualization technologies Vlume Licensing brief Licensing Windws Server 2012 fr use with virtualizatin technlgies (VMware ESX/ESXi, Micrsft System Center 2012 Virtual Machine Manager, and Parallels Virtuzz) Table f Cntents This

More information

How To Write A Secure Cloud Computing For Critical Infrastructure

How To Write A Secure Cloud Computing For Critical Infrastructure SEcure Clud cmputing fr CRitical Infrastructure IT Methds and Technlgies fr Secure Clud Cmputing fr Critical InfrastructureIT Dr Markus Tauber SECCRIT Crdinatr AIT Austrian Institute f Technlgy AIT Austrian

More information

ALM in the Cloud an Overview of Oracle Developer Cloud Service. Introduction. By Dana Singleterry

ALM in the Cloud an Overview of Oracle Developer Cloud Service. Introduction. By Dana Singleterry ALM in the Clud an Overview f Oracle Develper Clud Service Intrductin By Dana Singleterry In recent years the wrld f applicatin develpment has adpted new methdlgies that aim t imprve the quality and speed

More information

BYOD and Cloud Computing

BYOD and Cloud Computing BYOD and Clud Cmputing AIIM First Canadian Chapter May 22, 2014 Susan Nickle, Lndn Health Sciences Centre Chuck Rthman, Wrtzmans Sheila Taylr, Erg Infrmatin Management Cnsulting Clud cmputing Agenda What

More information

Corporate Profile, 2014

Corporate Profile, 2014 Cpyright 2014 IT-Serve.cm All rights reserved. IT-Serve.cm Crprate Prfile, 2014 Internatinal experience, Reginal reach, Lcal understanding Dubai Abu Dhabi Sharjah Oman Qatar Saudi Arabia IT-Serve.cm PO

More information

NC3A SOA Techwatch Day Call for Presentations

NC3A SOA Techwatch Day Call for Presentations NC3A SOA Techwatch Day Call fr Presentatins 1 February 2012 Hsted at NATO C3 Agency, The Hague, The Netherlands By NC3A Chief Technlgy Office (CTO) David Burtn Chief Technlgy fficer Versin 1, 1 December

More information

Zimbra Professional Services Portfolio, Purchasing Guide & Price List

Zimbra Professional Services Portfolio, Purchasing Guide & Price List In- Tuitin Netwrks Ltd Zimbra Prfessinal Services Prtfli, Purchasing Guide & Price List This dcument prvides an verview f In- Tuitin Netwrks Limited s range f Zimbra Prfessinal Services available n the

More information

State of Wisconsin DET Dedicated Virtual Host Services Offering Definition

State of Wisconsin DET Dedicated Virtual Host Services Offering Definition State f Wiscnsin DET Dedicated Virtual Hst Services Offering Definitin Dcument Revisin Histry Date Versin Creatr Ntes 10/29/2010 1.0 Phil Staley Initial draft 11/3/2010 1.1 Phil Staley Ryan McKee Secnd

More information

ITIL Release Control & Validation (RCV) Certification Program - 5 Days

ITIL Release Control & Validation (RCV) Certification Program - 5 Days ITIL Release Cntrl & Validatin (RCV) Certificatin Prgram - 5 Days Prgram Overview ITIL is a set f best practices guidance that has becme a wrldwide-adpted framewrk fr Infrmatin Technlgy Services Management

More information

PENETRATION TEST OF THE INDIAN HEALTH SERVICE S COMPUTER NETWORK

PENETRATION TEST OF THE INDIAN HEALTH SERVICE S COMPUTER NETWORK Department f Health and Human Services OFFICE OF INSPECTOR GENERAL PENETRATION TEST OF THE INDIAN HEALTH SERVICE S COMPUTER NETWORK Inquiries abut this reprt may be addressed t the Office f Public Affairs

More information

Change Management Process

Change Management Process Change Management Prcess B1.10 Change Management Prcess 1. Intrductin This plicy utlines [Yur Cmpany] s apprach t managing change within the rganisatin. All changes in strategy, activities and prcesses

More information

ERAC. Efficient and Robust Architecture for the big data Cloud. Tor Skeie

ERAC. Efficient and Robust Architecture for the big data Cloud. Tor Skeie ERAC Efficient and Rbust Architecture fr the big data Clud Tr Skeie Clud cmputing challenges Results f a survey amng enterprises, cnducted by IDC Surce: IDC Enterprise Panel 2009 Perfrmance requires pwer

More information

The Importance Advanced Data Collection System Maintenance. Berry Drijsen Global Service Business Manager. knowledge to shape your future

The Importance Advanced Data Collection System Maintenance. Berry Drijsen Global Service Business Manager. knowledge to shape your future The Imprtance Advanced Data Cllectin System Maintenance Berry Drijsen Glbal Service Business Manager WHITE PAPER knwledge t shape yur future The Imprtance Advanced Data Cllectin System Maintenance Cntents

More information

Research Report. Abstract: Advanced Malware Detection and Protection Trends. September 2013

Research Report. Abstract: Advanced Malware Detection and Protection Trends. September 2013 Research Reprt Abstract: Advanced Malware Detectin and Prtectin Trends By Jn Oltsik, Senir Principal Analyst With Jennifer Gahm, Senir Prject Manager September 2013 2013 by The Enterprise Strategy Grup,

More information

MITEL OPEN INTEGRATION GATEWAY (OIG): END- CUSTOMER DEVELOPMENT & LICENSING

MITEL OPEN INTEGRATION GATEWAY (OIG): END- CUSTOMER DEVELOPMENT & LICENSING MITEL OPEN INTEGRATION GATEWAY (OIG): END- CUSTOMER DEVELOPMENT & LICENSING JULY, 2014 The infrmatin cnveyed in this dcument is cnfidential and prprietary t Mitel and is intended slely fr Mitel emplyees

More information

In-House Counsel Day Priorities for 2012. Cloud Computing the benefits, potential risks and security for the future

In-House Counsel Day Priorities for 2012. Cloud Computing the benefits, potential risks and security for the future In-Huse Cunsel Day Pririties fr 2012 Clud Cmputing the benefits, ptential risks and security fr the future Presented by David Richardsn Thursday 1 March 2012 WIN: What in-huse lawyers need Knwledge, supprt

More information

Installation Guide Marshal Reporting Console

Installation Guide Marshal Reporting Console Installatin Guide Installatin Guide Marshal Reprting Cnsle Cntents Intrductin 2 Supprted Installatin Types 2 Hardware Prerequisites 2 Sftware Prerequisites 3 Installatin Prcedures 3 Appendix: Enabling

More information

Research Report. Abstract: The Emerging Intersection Between Big Data and Security Analytics. November 2012

Research Report. Abstract: The Emerging Intersection Between Big Data and Security Analytics. November 2012 Research Reprt Abstract: The Emerging Intersectin Between Big Data and Security Analytics By Jn Oltsik, Senir Principal Analyst With Jennifer Gahm Nvember 2012 2012 by The Enterprise Strategy Grup, Inc.

More information

CLOUD COMPUTING: SECURITY THREATS AND MECHANISM

CLOUD COMPUTING: SECURITY THREATS AND MECHANISM CLOUD COMPUTING: SECURITY THREATS AND MECHANISM Vaishali Jshi 1, Lakshmi 2, Vivek Gupta 3 1,2,3 Department f Cmputer Science Engineering, Acrplis Technical Campus, Indre ABSTRACT Clud cmputing is a mdel

More information

Licensing Windows Server 2012 R2 for use with virtualization technologies

Licensing Windows Server 2012 R2 for use with virtualization technologies Vlume Licensing brief Licensing Windws Server 2012 R2 fr use with virtualizatin technlgies (VMware ESX/ESXi, Micrsft System Center 2012 R2 Virtual Machine Manager, and Parallels Virtuzz) Table f Cntents

More information

THOMSON REUTERS C-TRACK CASE MANAGEMENT SYSTEM SOFTWARE AS A SERVICE SERVICE DEFINITION FOR G-CLOUD 6

THOMSON REUTERS C-TRACK CASE MANAGEMENT SYSTEM SOFTWARE AS A SERVICE SERVICE DEFINITION FOR G-CLOUD 6 THOMSON REUTERS C-TRACK CASE MANAGEMENT SYSTEM SOFTWARE AS A SERVICE SERVICE DEFINITION FOR G-CLOUD 6 C-Track Case Management System (CMS) is a cnfigurable, brwser based case management system fr all levels

More information

G-CLOUD FRAMEWORK SERVICE DEFINITION. Oracle Technology Service for Agile Cloud Projects. Copyright: 2014 6point6 Ltd

G-CLOUD FRAMEWORK SERVICE DEFINITION. Oracle Technology Service for Agile Cloud Projects. Copyright: 2014 6point6 Ltd G-CLOUD FRAMEWORK SERVICE DEFINITION Oracle Technlgy Service fr Agile Clud Prjects Cpyright: 2014 6pint6 Ltd G-Clud Service Definitin Oracle Technlgy 1. SERVICE OVERVIEW The 6pint6 Oracle Technlgy Service

More information

STANDARDISATION IN E-ARCHIVING

STANDARDISATION IN E-ARCHIVING STANDARDISATION IN E-ARCHIVING R E Q U I R E M E N T S A N D C O N T R O L S F O R D I G I T I S AT I O N A N D E - A R C H I V I N G S E R V I C E P R O V I D E R S Alain Wahl 1 Requirements and cntrls

More information

CMS Eligibility Requirements Checklist for MSSP ACO Participation

CMS Eligibility Requirements Checklist for MSSP ACO Participation ATTACHMENT 1 CMS Eligibility Requirements Checklist fr MSSP ACO Participatin 1. General Eligibility Requirements ACO participants wrk tgether t manage and crdinate care fr Medicare fee-fr-service beneficiaries.

More information

Security Services. Service Description Version 1.00. Effective Date: 07/01/2012. Purpose. Overview

Security Services. Service Description Version 1.00. Effective Date: 07/01/2012. Purpose. Overview Security Services Service Descriptin Versin 1.00 Effective Date: 07/01/2012 Purpse This Enterprise Service Descriptin is applicable t Security Services ffered by the MN.IT Services and described in the

More information

Design for securability Applying engineering principles to the design of security architectures

Design for securability Applying engineering principles to the design of security architectures Design fr securability Applying engineering principles t the design f security architectures Amund Hunstad Phne number: + 46 13 37 81 18 Fax: + 46 13 37 85 50 Email: amund@fi.se Jnas Hallberg Phne number:

More information

Course Outline (70-413)

Course Outline (70-413) Curse Outline (70-413) Mdule 1: Planning Server Upgrade and Migratin This mdule explains hw t plan a server upgrade and migratin strategy. Upgrade and Migratin Cnsideratins Creating a Server Upgrade and

More information

Vendor Management. Federal Deposit Insurance Corporation Division of Risk Management Supervision Atlanta Regional Office.

Vendor Management. Federal Deposit Insurance Corporation Division of Risk Management Supervision Atlanta Regional Office. Vendr Management Federal Depsit Insurance Crpratin Divisin f Risk Management Supervisin Atlanta Reginal Office June 18, 2014 1 Agenda Intrductin Vendr Management Overview Regulatry Expectatins Bard and

More information

Information Services Hosting Arrangements

Information Services Hosting Arrangements Infrmatin Services Hsting Arrangements Purpse The purpse f this service is t prvide secure, supprted, and reasnably accessible cmputing envirnments fr departments at DePaul that are in need f server-based

More information

Version: Modified By: Date: Approved By: Date: 1.0 Michael Hawkins October 29, 2013 Dan Bowden November 2013

Version: Modified By: Date: Approved By: Date: 1.0 Michael Hawkins October 29, 2013 Dan Bowden November 2013 Versin: Mdified By: Date: Apprved By: Date: 1.0 Michael Hawkins Octber 29, 2013 Dan Bwden Nvember 2013 Rule 4-004J Payment Card Industry (PCI) Patch Management (prpsed) 01.1 Purpse The purpse f the Patch

More information

Business Intelligence and DataWarehouse workshop

Business Intelligence and DataWarehouse workshop Business Intelligence and DataWarehuse wrkshp Benefits: Enables the Final year BE student/ Junir IT prfessinals t get a perfect blend f thery and practice n Business Intelligence and Data warehuse s as

More information

In addition to assisting with the disaster planning process, it is hoped this document will also::

In addition to assisting with the disaster planning process, it is hoped this document will also:: First Step f a Disaster Recver Analysis: Knwing What Yu Have and Hw t Get t it Ntes abut using this dcument: This free tl is ffered as a guide and starting pint. It is des nt cver all pssible business

More information

POLICY 1390 Information Technology Continuity of Business Planning Issued: June 4, 2009 Revised: June 12, 2014

POLICY 1390 Information Technology Continuity of Business Planning Issued: June 4, 2009 Revised: June 12, 2014 State f Michigan POLICY 1390 Infrmatin Technlgy Cntinuity f Business Planning Issued: June 4, 2009 Revised: June 12, 2014 SUBJECT: APPLICATION: PURPOSE: CONTACT AGENCY: Plicy fr Infrmatin Technlgy (IT)

More information

Copernicus & Big Data: A Perspective from the European EO Services Industry. Geoff Sawyer: EARSC Secretary General

Copernicus & Big Data: A Perspective from the European EO Services Industry. Geoff Sawyer: EARSC Secretary General Cpernicus & Big Data: A Perspective frm the Eurpean EO Services Industry. Geff Sawyer: EARSC Secretary General What is EARSC? EARSC is a trade assciatin (NPO), funded in 1989, which represents cmpanies:

More information

CNS-205: Citrix NetScaler 11 Essentials and Networking

CNS-205: Citrix NetScaler 11 Essentials and Networking CNS-205: Citrix NetScaler 11 Essentials and Netwrking Overview The bjective f the Citrix NetScaler 11 Essentials and Netwrking curse is t prvide the fundatinal cncepts and skills necessary t implement,

More information

Systems Support - Extended

Systems Support - Extended 1 General Overview This is a Service Level Agreement ( SLA ) between and the Enterprise Windws Services t dcument: The technlgy services the Enterprise Windws Services prvides t the custmer. The targets

More information

Professional Leaders/Specialists

Professional Leaders/Specialists Psitin Prfile Psitin Lcatin Reprting t Jb family Band BI/Infrmatin Manager Wellingtn Prfessinal Leaders/Specialists Band I Date February 2013 1. POSITION PURPOSE The purpse f this psitin is t: Lead and

More information

How To Install An Orin Failver Engine On A Network With A Network Card (Orin) On A 2Gigbook (Orion) On An Ipad (Orina) Orin (Ornet) Ornet (Orn

How To Install An Orin Failver Engine On A Network With A Network Card (Orin) On A 2Gigbook (Orion) On An Ipad (Orina) Orin (Ornet) Ornet (Orn SlarWinds Technical Reference Preparing an Orin Failver Engine Installatin Intrductin t the Orin Failver Engine... 1 General... 1 Netwrk Architecture Optins and... 3 Server Architecture Optins and... 4

More information

Systems Load Testing Appendix

Systems Load Testing Appendix Systems Lad Testing Appendix 1 Overview As usage f the Blackbard Academic Suite grws and its availability requirements increase, many custmers lk t understand the capability f its infrastructure. As part

More information

Network Security Trends in the Era of Cloud and Mobile Computing

Network Security Trends in the Era of Cloud and Mobile Computing Research Reprt Abstract: Netwrk Security Trends in the Era f Clud and Mbile Cmputing By Jn Oltsik, Senir Principal Analyst and Bill Lundell, Senir Research Analyst With Jennifer Gahm, Senir Prject Manager

More information

Implementing an electronic document and records management system using SharePoint 7

Implementing an electronic document and records management system using SharePoint 7 Reprt title Agenda item Implementing an electrnic dcument and recrds management system using SharePint 7 Meeting Finance, Prcurement & Prperty Cmmittee 16 June 2008 Date Reprt by Dcument Number Head f

More information

Web Development the Next Steps

Web Development the Next Steps Web Develpment the Next Steps Significant prgress has been made n the redesign f the Western Washingtn University hme page. The ATUS Web Services team has wrked hard in cllabratin with the University Cmmunicatins

More information

HEALTH INFORMATION EXCHANGE GRANTS CRITERIA

HEALTH INFORMATION EXCHANGE GRANTS CRITERIA 1 HEALTH INFORMATION EXCHANGE GRANTS CRITERIA INTRODUCTION On August, 20 th, the federal Office f the Natinal Crdinatr fr Health Infrmatin Technlgy (ONC) released an pprtunity fr states t apply fr between

More information

Managing Access and Help Protect Corporate Email Data on Mobile Devices with Enterprise Mobile Suite

Managing Access and Help Protect Corporate Email Data on Mobile Devices with Enterprise Mobile Suite Managing Access and Help Prtect Crprate Email Data n Mbile Devices with Enterprise Mbile Suite Last updated: 7/15/15 Balancing prductivity and security Emplyees want t be able t use their wn devices t

More information

POLISH STANDARDS ON HEALTH AND SAFETY AS A TOOL FOR IMPLEMENTING REQUIREMENTS OF THE EUROPEAN DIRECTIVES INTO THE PRACTICE OF ENTERPRISES

POLISH STANDARDS ON HEALTH AND SAFETY AS A TOOL FOR IMPLEMENTING REQUIREMENTS OF THE EUROPEAN DIRECTIVES INTO THE PRACTICE OF ENTERPRISES POLISH STANDARDS ON HEALTH AND SAFETY AS A TOOL FOR IMPLEMENTING REQUIREMENTS OF THE EUROPEAN DIRECTIVES INTO THE PRACTICE OF ENTERPRISES M. PĘCIŁŁO Central Institute fr Labur Prtectin ul. Czerniakwska

More information

Legacy EMR Data Conversions

Legacy EMR Data Conversions Legacy EMR Data Cnversins Agenda Abut us Drivers fr EMR Replacement Things t Cnsider Tp 5 Reasns EMR Cnversins Fail Optins fr Legacy EMR Cnversin Case Study Abut Us Health efrmatics is a healthcare IT

More information

WEB APPLICATION SECURITY TESTING

WEB APPLICATION SECURITY TESTING WEB APPLICATION SECURITY TESTING Cpyright 2012 ps_testware 1/7 Intrductin Nwadays every rganizatin faces the threat f attacks n web applicatins. Research shws that mre than half f all data breaches are

More information

PCI DSS Cloud Computing Guidelines

PCI DSS Cloud Computing Guidelines Standard: PCI Data Security Standard (PCI DSS) Versin: 2.0 Date: February 2013 Authr: Clud Special Interest Grup PCI Security Standards Cuncil Infrmatin Supplement: PCI DSS Clud Cmputing Guidelines Table

More information

COPIES-F.Y.I., INC. Policies and Procedures Data Security Policy

COPIES-F.Y.I., INC. Policies and Procedures Data Security Policy COPIES-F.Y.I., INC. Plicies and Prcedures Data Security Plicy Page 2 f 7 Preamble Mst f Cpies FYI, Incrprated financial, administrative, research, and clinical systems are accessible thrugh the campus

More information

ITU-T T Focus Group on Identity Management (FG IdM):

ITU-T T Focus Group on Identity Management (FG IdM): Internatinal Telecmmunicatin Unin ITU-T ITU-T T Fcus Grup n Identity Management (FG IdM): IdM Tutrial Part II Ray P. Singh Telcrdia Technlgies 732-699-6105 rsingh@telcrdia.cm ITU-T FG IdM Overview IdM

More information

International Services Catalog Navigating the Security Landscape from Takeoff to Landing

International Services Catalog Navigating the Security Landscape from Takeoff to Landing Internatinal Services Catalg Navigating the Security Landscape frm Takeff t Landing Cpyright 2013 infrmatin security cnsulting All rights reserved Intrductin Infrmatin security cnsulting (i.s.c.) funded

More information

ITU-T IdMFG Framework Work Group

ITU-T IdMFG Framework Work Group ITU-T IdMFG Framewrk Wrk Grup Internatinal Telecmmunicatin Unin 1 Evlutin f Identity Management Presence (Inference frm vide cameras, RFID sensrs, etc.) Implicit Bimetrics (Key strkes, vice, face) Transparent

More information

SaaS Listing CA Cloud Service Management

SaaS Listing CA Cloud Service Management SaaS Listing CA Clud Service Management 1. Intrductin This dcument prvides standards and features that apply t the CA Clud Service Management (CSM) SaaS ffering prvided t the Custmer and defines the parameters

More information

JADU UNIVERSE SPECIALIST CLOUD SERVICES: DEVELOPMENT

JADU UNIVERSE SPECIALIST CLOUD SERVICES: DEVELOPMENT JADU UNIVERSE SPECIALIST CLOUD SERVICES: DEVELOPMENT Sftware develpment fr gvernment digital services, web applicatins and payment transactins, by Jadu Jadu Limited Universe Huse 1 Merus Curt Leicester

More information

Ten Steps for an Easy Install of the eg Enterprise Suite

Ten Steps for an Easy Install of the eg Enterprise Suite Ten Steps fr an Easy Install f the eg Enterprise Suite (Acquire, Evaluate, and be mre Efficient!) Step 1: Dwnlad the eg Sftware; verify hardware and perating system pre-requisites Step 2: Obtain a valid

More information

// Solution Brief. Pro-Active Support Services KARMA. Khipu Automated Remote Monitoring Application. Networks, Systems and Security Infrastructure

// Solution Brief. Pro-Active Support Services KARMA. Khipu Automated Remote Monitoring Application. Networks, Systems and Security Infrastructure // Slutin Brief Pr-Active Supprt Services KARMA Khipu Autmated Remte Mnitring Applicatin Netwrks, Systems and Security Infrastructure What is KARMA? KARMA Khipu Autmated Remte Mnitring Applicatin is a

More information

OCR LEVEL 2 CAMBRIDGE TECHNICAL

OCR LEVEL 2 CAMBRIDGE TECHNICAL Cambridge TECHNICALS OCR LEVEL 2 CAMBRIDGE TECHNICAL CERTIFICATE/DIPLOMA IN IT SETTING UP AN IT NETWORK M/601/3274 LEVEL 2 UNIT 6 GUIDED LEARNING HOURS: 60 UNIT CREDIT VALUE: 10 SETTING UP AN IT NETWORK

More information

Trusted Docker Containers and Trusted VMs in OpenStack. Raghu Yeluri Abhishek Gupta

Trusted Docker Containers and Trusted VMs in OpenStack. Raghu Yeluri Abhishek Gupta Trusted Dcker Cntainers and Trusted VMs in OpenStack Raghu Yeluri Abhishek Gupta Outline Cntext: Dcker Security Tp Custmer Asks Intel s Fcus: Trusted Dcker Cntainers Wh Verifies Trust? Reference Architecture

More information

Gateway Agent - First Amendment to the High Level Design Document

Gateway Agent - First Amendment to the High Level Design Document Gateway Agent - First Amendment t the High Level Design Dcument Scpe The Gateway Agent HLD thrugh update 1 assumes that nly the Cntrl App, while cnnected t the prximal netwrk, can initiate new clud services.

More information

TrustED Briefing Series:

TrustED Briefing Series: TrustED Briefing Series: Since 2001, TrustCC has prvided IT audits and security assessments t hundreds f financial institutins thrugh ut the United States. Our TrustED Briefing Series are white papers

More information

expertise hp services valupack consulting description security review service for Linux

expertise hp services valupack consulting description security review service for Linux expertise hp services valupack cnsulting descriptin security review service fr Linux Cpyright services prvided, infrmatin is prtected under cpyright by Hewlett-Packard Cmpany Unpublished Wrk -- ALL RIGHTS

More information

Information Day Green Vehicles session State of play of the implementation of the Multi-annual Roadmap

Information Day Green Vehicles session State of play of the implementation of the Multi-annual Roadmap Infrmatin Day Green Vehicles sessin State f play f the implementatin f the Multi-annual Radmap Jean-Luc di PAOLA-GALLONI 16 th Octber 2015 - Brussels Multiannual Radmap 2014-2020 The EGVI PPP Multiannual

More information

FINANCIAL SERVICES FLASH REPORT

FINANCIAL SERVICES FLASH REPORT FINANCIAL SERVICES FLASH REPORT Draft Regulatry Cmpliance Management Guideline Released by the Office f the Superintendent f Financial Institutins May 5, 2014 On April 30, 2014, the Office f the Superintendent

More information

Research Report. Abstract: Security Management and Operations: Changes on the Horizon. July 2012

Research Report. Abstract: Security Management and Operations: Changes on the Horizon. July 2012 Research Reprt Abstract: Security Management and Operatins: Changes n the Hrizn By Jn Oltsik, Senir Principal Analyst With Kristine Ka and Jennifer Gahm July 2012 2012, The Enterprise Strategy Grup, Inc.

More information

Mobile Telecom Expense Management

Mobile Telecom Expense Management Mbile Telecm Expense Management Quick Start Mbile Telecm Expense Management Intrductin The BT Mbile Telecm Expense Management Quick Start Service is part BT Managed Mbility Expenses* BT s suite f telecm

More information

PROPOSAL OF EVALUATION CRITERIA FOR FREE AND OPEN SOURCE TOOLS FOR MODELLING AND SUPPORT OF IT SERVICE MANAGEMENT ACCORDING TO ITIL

PROPOSAL OF EVALUATION CRITERIA FOR FREE AND OPEN SOURCE TOOLS FOR MODELLING AND SUPPORT OF IT SERVICE MANAGEMENT ACCORDING TO ITIL PROPOSAL OF EVALUATION CRITERIA FOR FREE AND OPEN SOURCE TOOLS FOR MODELLING AND SUPPORT OF IT SERVICE MANAGEMENT ACCORDING TO ITIL Lukas Kralik, Rman Senkerik and Rman Jasek Tmas Bata University in Zlin,

More information