Cloud security architecture
|
|
|
- Mercy Kennedy
- 10 years ago
- Views:
Transcription
1 ericsson White paper Uen January 2015 Cloud security architecture from process to deployment The Trust Engine concept and logical cloud security architecture presented in this paper provide cloud vendors, service providers and tenants with a framework to clearly and efficiently discuss security threats, risks, controls, compliance and other security requirements within the cloud context.
2 Introduction The Networked Society will be built on unprecedented connectivity and the ability to access cloud services from anywhere in the world. At the same time, security for cloud computing has become one of the top concerns for cloud actors such as cloud service providers, tenants and tenants customers, as well as for governments and regulators. Many of society s critical functions are already being moved into clouds, and this trend is likely to accelerate. For attackers such as spies, hacktivists and organized criminals, this provides attractive opportunities to compromise society s critical processes. The ability to withstand, detect, respond to and recover from attacks by malicious parties, or from unintentional security breaches, is seen as a cornerstone for trustworthiness by cloud actors. Trustworthiness is built on transparently ensuring security and privacy for tenants in an evolving environment. Security and privacy will therefore gradually become a business driver, more than a business enabler, on a global scale. For a cloud service provider, security cannot be a permanent state reached through a one-time effort. Instead, it is a continuous process supported by cloud architecture. Technical mechanisms and operational policy management (and enforcement) should all be treated in a unified manner. Each provider needs security governance to constantly follow risk landscape changes, make adjustments for security controls and enforce efficient security processes. The Trust Engine concept presented in this paper addresses these aspects. Executing security as a process using the Trust Engine concept enables transparency and proof of compliance with best practices, specifications, standards and regulations. In this way, cloud service providers can offer better security for many customers than the customers are able to provide in their own IT networks. To move the security discussion between the different cloud actors forward, we will illustrate a combination of the Trust Engine and logical cloud security architecture. Cloud security architecture introduction 2
3 Security challenges Mass adoption of cloud, increased network programmability and an estimated 50 billion connected devices will generate new threats and attack scenarios such as advanced persistent threats, distributed denial-of-service attacks and data breaches. These emerging threats are causing a shift in the security community mindset from prevention to resilience, as well as a gradual movement from perimeter protection to data protection. Several organizations, for example, the European Network and Information Security Agency [1] and the Cloud Security Alliance [2], have studied the security challenges of cloud computing and have found them to culminate in the following three basic challenges: > > Multi-tenancy resources are shared between tenants according to Service Level Agreements (SLAs). Each provider is responsible for a proper isolation of its tenants computing, networking and storage resources. > > Divided responsibility besides the provider, tenants also have the responsibility to protect their assets. Dividing responsibility between the provider and the tenant depends on the SLA, and needs to be agreed between the actors before the service is taken in use. > > Dynamic environment the cloud environment is constantly evolving, and resources may dynamically scale up and down or even change their locations. Security policies have to capture and govern these dynamic changes. To counteract these challenges, it is important for the tenant to be able to verify that services are available and that they are protected according to a desired or agreed-upon policy and SLAs. The challenges also imply the importance of data protection. Data needs to be available, its integrity protected and the confidentiality of sensitive data assured. For example, multi-tenancy must not disclose data to unauthorized tenants, nor cause deviation from the desired level of data availability. Confidentiality and integrity of data cannot be lost due to divided responsibility between actors. The integrity of security policies should not be broken because of dynamic changes in the service deployment. Cloud security architecture security challenges 3
4 Trust Engine for cloud security architecture The previously mentioned security challenges generate an obvious need for advanced risk and threat management. In the current business environment, each cloud service provider needs relevant and efficient measures for turning cybersecurity from an uncontrollable extra cost into an efficiently managed competitive advantage. To run a trusted cloud business, an organization utilizing cloud-based services requires trusted operations, trusted networks and trusted products enabling trusted services. The Trust Engine discussed in this chapter, together with logical cloud security architecture, provides a structured approach for this purpose. In the following sections, we dissect the Trust Engine (as illustrated in Figure 1) with respect to both the technical and operational aspects of running business in a safe telecommunications and IT cloud. Comply Predict and learn Trust Operate and control Figure 1: The Trust Engine. Risk insight Build and deploy > > Risk insight Setting up security governance and a security policy framework for an organization is the responsibility of top management. In particular, it is a business decision to assess risks, accept residual risks, manage unacceptable risks and set the ambition level for security. This requires the establishment of a risk management process. Risk insight and security risk evaluation from a business perspective are the fundamental cornerstones in order to efficiently define, implement, and manage security in both cloud and telecommunication networks independent of deployment models. Cloud providers and tenants need to acquire risk insight for their cloud business in order to take the necessary actions to mitigate threats and risks. This means that risks on all levels have to be considered for example, at operational, deployment-wide and individual node and server levels. Assessments must be executed using the same methods and procedures in order to produce comparable and reproducible results. The identification of new risks as well as changes in earlier findings should be fed back into the overall risk management process for further risk mitigation decisions. > > Build and deploy The applicable set of controls on the operational, network and node levels are selected through the risk management process. These controls need to be designed and implemented to ensure the specific security objectives of the organization are met. Risk insight and respective risk mitigation decisions guide the provider and tenants to select, build and deploy optimal security controls. The security management and orchestration layer in the cloud security architecture is responsible for deploying the required technical security controls. Optimal build and deployment of security controls can be reached by balancing costs, usability and effectiveness. > > Operate and control During operations, the effectiveness of implemented controls needs to be continuously monitored, maintained and improved. Constant monitoring of the risk landscape is required to ensure controls continuously evolve with business needs. Efficient management makes the system more resilient against the threat landscape. Regular recurrent security assessments and audits need to be executed to ensure security is implemented and operated in accordance with the security policy. Cloud security architecture Trust Engine for cloud security architecture 4
5 > > Predict and learn Predict and learn is based on security analytics that provide real-time preemptive information about new potential cloud security risks. It enables corrective actions in case of deviations from the desired security ambition level. In a cloud environment, a high degree of automation is necessary to ensure quick response to any identified threats and anomalies. Security analytics help efficiently update risk insight in the cloud context. It is foreseeable that current Security Information and Event Management and big data-based security analytics will converge into unified security analytics solutions. > > Comply Cloud service providers and tenants have their respective areas of control, ownership and responsibility for assets in the cloud. Tenant assets are usually virtualized, whereas providers often have responsibility for physical assets as well. The division of responsibility for security controls and assets depends on the SLA. Each party must be able to verify that the cloud deployment complies with their requirements. Proof of compliance regarding best practices, specifications, standards and regulations helps cloud providers to demonstrate regulatory and SLA fulfillment. An up-to-date, transparent compliance view is made available by an active process involving the Trust Engine components. Cloud service providers and tenants implement and enforce their respective security controls for protecting assets. > > Trust The Trust Engine provides a solid foundation and the steps for running efficient risk and security management for cloud. The Trust Engine can be seen as a process that is executed on the logical cloud security architecture that manages the dynamic nature of the cloud (see Figure 2). In practice, cloud security architecture addresses the build and deploy, operate and control, and predict and learn parts of the Trust Engine, while the other parts of the Trust Engine are more governance-oriented. Provider security controls Tenant security controls Tenant assets Tenant threats and risks Responsibility for controls depends on the SLA Application layer Platform layer Infrastructure layer Tenant level security management Provider assets Applicable layers depend on service model Provider threats and risks Application layer Platform layer Infrastructure layer Provider level security management Figure 2: Logical cloud security architecture. Cloud security architecture Trust Engine for cloud security architecture 5
6 Security management and orchestration The security management and orchestration layer dynamically deploys and adjusts security functions, policies and related configurations of tenants and providers, for example, in IT cloud and telecommunications cloud deployments. The layer is seamlessly integrated into common network management and analytics infrastructure with a security operations center (SOC) view providing situational awareness. Based on constantly updated risk insight, the SOC can ensure optimal security controls are implemented in the dynamic cloud environment at all times. The SOC is the execution point for security management and orchestration, and supports automated and manual management of security incidents and events. This, for example, shortens propagation delays in correcting zero-day vulnerabilities in the live environment. IdAM Key and certificate management Data protection Security monitoring analytics Network and infra protection HW assisted and virtual security Other security functions Figure 3: 6+1 security control groups in the logical cloud security architecture. The security controls and services are divided into 6+1 groups in the logical cloud security architecture (see Figure 3). They should be seamlessly coupled with security management and orchestration to achieve end-to-end security responses. Security management ensures consistent security across the system. It translates business and operational security policies of providers and customers into actionable security policies. Logically centralized security policies are enforced by highly distributed and programmable security functions through application programming interface exposure. Security orchestration executes the actions based on security policies. It provides deployment and configuration of all network and product security controls, including virtualized and physical network functions. An identity and access management (IdAM) security control group contains adaptation of multifactor authentication, identity federation, granular authorization frameworks and reputation management. IdAM ensures only authorized actors are allowed to access data in a usable manner (single sign-on). The group needs to be seamlessly coupled with certificate and key management that handles the life cycle management of cryptographic keys and digital certificates. Cloud providers and customers need cryptographic keys for multiple different purposes, including secure communication, to provide identity assurance of the originating entity and for encryption of data. Data protection requires support from the other security function groups in the different phases of data life cycle management. Data protection takes care of secure data life cycle management in the multi-tenant environment. It covers confidentiality, integrity and the availability of data at rest, data in transfer and data in use. Security monitoring and analytics functions play an important role in data protection. Securityrelated events are collected from networks and nodes and correlated against indicators of compromise together with the system data. These functions provide both live security status (reactive response) and information on past security events, making it possible to respond to threats even before a new incident occurs (predictive response). On the other hand, when incidents occur, data provided by the security analytics shortens the time consumed in investigations and forensics. Data in transit requires traffic separation, protection, filtering and integrity protection that belong to the network and infrastructure protection controls. Infrastructure integrity protection and secure isolation are built on hardware-rooted trust and secure bootstrapping procedures. While falling outside the scope of this paper, it is also important to be aware that there are other security functions needed. These fall into the +1 control group. Cloud security architecture Trust Engine for cloud security architecture 6
7 The importance of data integrity a use case Given the three main security challenges for cloud multi-tenancy, divided responsibility and dynamic environment one specific customer concern is data protection (access control, encryption, integrity and origin verification). In cloud environments, the amount of data at rest, in transfer and in use is considerably larger than in traditional networks. Let us consider the need of a user to ensure the integrity of this data at all times. Data integrity in a cloud context is extremely important in building enough trust for a user to put data in the hands of a cloud provider. Unfortunately, data integrity often does not receive as much attention as data encryption. Integrity can assure the consistency of important data, whether it is system data or application data. Most security-conscious users want assurance of any or all of the following: > > Time when the data was generated or protected. > > Integrity assurance that data has not been changed from its original form. > > Origin verification for example, the identity of the data producer, which can be especially relevant during forensics investigations, in facilitating forensics auditability, or for legal and contractual purposes. These properties can be achieved using, for example, symmetric cryptography, public key infrastructure (PKI) or Keyless Signing Infrastructure (KSI) [3]. These techniques can be used separately or can complement each other, and the selection of technology should be based on the use case and user requirements. PKI-based signing technology utilizes public-private key pairs, while KSI technology utilizes data hashes and hash trees for generating and publishing a root hash for the data to be integrity protected. Integrity verification is done using signature tokens that enable verification of data relative to the previously published root. Which technology to select for data integrity protection can be based, for instance, on the following aspects: > > The timescale of the need for integrity protection (short term versus long term). > > The type of time information needed. > > The number of data items that need to be protected. > > The level to which the origin needs to be verifiable. > > Other organizational policies that, for example, mandate the use of specific cryptography. Symmetric cryptography and KSI have benefits in cloud (big data) contexts in terms of efficiency. In KSI, integrity does not rely on a single key that could be breached: no key is needed to verify if data matches the root hash. Security management is also facilitated in KSI since there is no need for revocation. By combining data integrity and data encryption technologies with other security orchestration and management tools, unique use cases could be demonstrated including near real-time data integrity monitoring. Telecommunications cloud providers would be able to transparently demonstrate that cloud tenants own and control their data at all times. Cloud security architecture The importance of data integrity a use case 7
8 Conclusion The Networked Society is built on interconnections between devices, people, information and services. Cloud environments are used both for casual resource optimization for example, to try out a new service concept at low cost and for critical services and information, such as banking or individual health records. Different use cases and service models will result in differences in security requirements: there is no one size that would fit all. Cloud vendors, service providers and tenants must establish a shared view on cloud security in order to establish and drive trusted business. This shared view will enable cloud service providers to understand and fulfill the security needs of their customers. In various sectors, such as health care, automotive, manufacturing, public utilities or banking, these needs are also subject to applicable regulations. Through the Trust Engine, this paper provides a conceptual basis to support different actors in their discussions about cloud security risks, threats, controls, management and compliance, as well as other security requirements in a cloud system. In addition, different design factors, best security design practices and the application of the right security technologies will need to be taken into account. A good cloud service provider is able to combine a solid conceptual foundation and a common understanding of customer needs with technical know-how in design and implementation. This will allow it to provide, in a cost-efficient way, more trustworthy operations, networks and components than many customers could achieve independently, and to fully realize the benefits of sharing resources through a cloud model. Cloud security architecture conclusion 8
9 GLOSSARY IdAM KSI SOC PKI SLA identity and access management Keyless Signing Infrastructure security operations center public key infrastructure Service Level Agreement Cloud security architecture glossary 9
10 References 1. European Network and Information Security Agency, December 2012, Cloud Computing, Benefits, risks and recommendations for information security, Rev. B, available at: cloud-computing-benefits-risks-and-recommendations-for-information-security 2. Cloud Security Alliance, February 2013, Cloud Security Alliance Warns Providers of The Notorious Nine Cloud Computing Top Threats in 2013, available at: 3. Ericsson, September 2014, Ericsson and Guardtime create secure cloud and big data, available at: Ericsson AB All rights reserved Cloud security architecture references 10
How To Protect Your Network From Attack From A Network Security Threat
Cisco Security Services Cisco Security Services help you defend your business from evolving security threats, enhance the efficiency of your internal staff and processes, and increase the return on your
Managing for the Long Term: Keys to Securing, Troubleshooting and Monitoring a Private Cloud
Deploying and Managing Private Clouds The Essentials Series Managing for the Long Term: Keys to Securing, Troubleshooting and Monitoring a Private Cloud sponsored by Managing for the Long Term: Keys to
Cloud Insecurity and True Accountability
Cloud Insecurity and True Accountability Primer for CIOs on Guardtime and Keyless Signature Infrastructure (KSI) for Attributed Networking Matthew C. Johnson, CTO of Guardtime At the end of 2013, the Cloud
Security Issues in Cloud Computing
Security Issues in Computing CSCI 454/554 Computing w Definition based on NIST: A model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources
White Paper How Noah Mobile uses Microsoft Azure Core Services
NoahMobile Documentation White Paper How Noah Mobile uses Microsoft Azure Core Services The Noah Mobile Cloud service is built for the Microsoft Azure platform. The solutions that are part of the Noah
Protect the data that drives our customers business. Data Security. Imperva s mission is simple:
The Imperva Story Who We Are Imperva is the global leader in data security. Thousands of the world s leading businesses, government organizations, and service providers rely on Imperva solutions to prevent
Cloud Computing Security Considerations
Cloud Computing Security Considerations Roger Halbheer, Chief Security Advisor, Public Sector, EMEA Doug Cavit, Principal Security Strategist Lead, Trustworthy Computing, USA January 2010 1 Introduction
Preemptive security solutions for healthcare
Helping to secure critical healthcare infrastructure from internal and external IT threats, ensuring business continuity and supporting compliance requirements. Preemptive security solutions for healthcare
Data Protection: From PKI to Virtualization & Cloud
Data Protection: From PKI to Virtualization & Cloud Raymond Yeung CISSP, CISA Senior Regional Director, HK/TW, ASEAN & A/NZ SafeNet Inc. Agenda What is PKI? And Value? Traditional PKI Usage Cloud Security
Leveraging innovative security solutions for government. Helping to protect government IT infrastructure, meet compliance demands and reduce costs
IBM Global Technology Services Leveraging innovative security solutions for government. Helping to protect government IT infrastructure, meet compliance demands and reduce costs Achieving a secure government
Central Agency for Information Technology
Central Agency for Information Technology Kuwait National IT Governance Framework Information Security Agenda 1 Manage security policy 2 Information security management system procedure Agenda 3 Manage
Securing the Cloud Infrastructure
EXECUTIVE STRATEGY BRIEF Microsoft recognizes that security and privacy protections are essential to building the necessary customer trust for cloud computing to reach its full potential. This strategy
Open Data Center Alliance Usage: Provider Assurance Rev. 1.1
sm Open Data Center Alliance Usage: Provider Assurance Rev. 1.1 Legal Notice This Open Data Center Alliance SM Usage:Provider Assurance is proprietary to the Open Data Center Alliance, Inc. NOTICE TO USERS
MANAGED FILE TRANSFER: 10 STEPS TO SOX COMPLIANCE
WHITE PAPER MANAGED FILE TRANSFER: 10 STEPS TO SOX COMPLIANCE 1. OVERVIEW Do you want to design a file transfer process that is secure? Or one that is compliant? Of course, the answer is both. But it s
Payment Card Industry Data Security Standard
Symantec Managed Security Services support for IT compliance Solution Overview: Symantec Managed Services Overviewview The (PCI DSS) was developed to facilitate the broad adoption of consistent data security
IMPLEMENTING A SECURITY ANALYTICS ARCHITECTURE
IMPLEMENTING A SECURITY ANALYTICS ARCHITECTURE Solution Brief SUMMARY New security threats demand a new approach to security management. Security teams need a security analytics architecture that can handle
HIPAA CRITICAL AREAS TECHNICAL SECURITY FOCUS FOR CLOUD DEPLOYMENT
HIPAA CRITICAL AREAS TECHNICAL SECURITY FOCUS FOR CLOUD DEPLOYMENT A Review List This paper was put together with Security in mind, ISO, and HIPAA, for guidance as you move into a cloud deployment Dr.
Cloud Infrastructure Services for Service Providers VERYX TECHNOLOGIES
Cloud Infrastructure Services for Service Providers VERYX TECHNOLOGIES Meeting the 7 Challenges in Testing and Performance Management Introduction With advent of the cloud paradigm, organizations are transitioning
Cisco Advanced Services for Network Security
Data Sheet Cisco Advanced Services for Network Security IP Communications networking the convergence of data, voice, and video onto a single network offers opportunities for reducing communication costs
Chapter 10. Cloud Security Mechanisms
Chapter 10. Cloud Security Mechanisms 10.1 Encryption 10.2 Hashing 10.3 Digital Signature 10.4 Public Key Infrastructure (PKI) 10.5 Identity and Access Management (IAM) 10.6 Single Sign-On (SSO) 10.7 Cloud-Based
W H I T E P A P E R I m p a c t o f C y b e r s e c u r i t y A t t a c k s a n d N e w - A g e S e c u r i t y S t r a t e g i e s
W H I T E P A P E R I m p a c t o f C y b e r s e c u r i t y A t t a c k s a n d N e w - A g e S e c u r i t y S t r a t e g i e s IDC Middle East, Africa, and Turkey, Al Thuraya Tower 1, Level 15, Dubai
CLOUD STORAGE SECURITY INTRODUCTION. Gordon Arnold, IBM
CLOUD STORAGE SECURITY INTRODUCTION Gordon Arnold, IBM SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and individual members may use this material
Securing the Microsoft Cloud
Securing the Microsoft Cloud Page 1 Securing the Microsoft Cloud Microsoft recognizes that trust is necessary for organizations and customers to fully embrace and benefit from cloud services. We are committed
Testing Network Virtualization For Data Center and Cloud VERYX TECHNOLOGIES
Testing Network Virtualization For Data Center and Cloud VERYX TECHNOLOGIES Table of Contents Introduction... 1 Network Virtualization Overview... 1 Network Virtualization Key Requirements to be validated...
The Education Fellowship Finance Centralisation IT Security Strategy
The Education Fellowship Finance Centralisation IT Security Strategy Introduction This strategy outlines the security systems in place to optimise, manage and protect The Education Fellowship data and
Bellevue University Cybersecurity Programs & Courses
Undergraduate Course List Core Courses: CYBR 250 Introduction to Cyber Threats, Technologies and Security CIS 311 Network Security CIS 312 Securing Access Control CIS 411 Assessments and Audits CYBR 320
John Essner, CISO Office of Information Technology State of New Jersey
John Essner, CISO Office of Information Technology State of New Jersey http://csrc.nist.gov/publications/nistpubs/800-144/sp800-144.pdf Governance Compliance Trust Architecture Identity and Access Management
How To Secure Your Store Data With Fortinet
Securing Wireless Networks for PCI Compliance Using Fortinet s Secure WLAN Solution to Meet Regulatory Requirements Introduction In the wake of many well-documented data breaches, standards such as the
Comparing Cost of Ownership: Symantec Managed PKI Service vs. On- Premise Software
WHITE PAPER: COMPARING TCO: SYMANTEC MANAGED PKI SERVICE........ VS..... ON-PREMISE........... SOFTWARE................. Comparing Cost of Ownership: Symantec Managed PKI Service vs. On- Premise Software
IBM QRadar as a Service
Government Efficiency through Innovative Reform IBM QRadar as a Service Service Definition Copyright IBM Corporation 2014 Table of Contents IBM Cloud Overview... 2 IBM/Sentinel PaaS... 2 QRadar... 2 Major
Addressing Cloud Computing Security Considerations
Addressing Cloud Computing Security Considerations with Microsoft Office 365 Protect more Contents 2 Introduction 3 Key Security Considerations 4 Office 365 Service Stack 5 ISO Certifications for the Microsoft
CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL
CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL WHAT IS CDM? The continuous stream of high profile cybersecurity breaches demonstrates the need to move beyond purely periodic, compliance-based approaches to
Security. Security consulting and Integration: Definition and Deliverables. Introduction
Security Security Introduction Businesses today need to defend themselves against an evolving set of threats, from malicious software to other vulnerabilities introduced by newly converged voice and data
APIs The Next Hacker Target Or a Business and Security Opportunity?
APIs The Next Hacker Target Or a Business and Security Opportunity? SESSION ID: SEC-T07 Tim Mather VP, CISO Cadence Design Systems @mather_tim Why Should You Care About APIs? Amazon Web Services EC2 alone
Solving the Security Puzzle
Solving the Security Puzzle How Government Agencies Can Mitigate Today s Threats Abstract The federal government is in the midst of a massive IT revolution. The rapid adoption of mobile, cloud and Big
VENDOR RISK MANAGEMENT UPDATE- ARE YOU AT RISK? Larry L. Llirán, CISA, CISM December 10, 2015 ISACA Puerto Rico Symposium
1 VENDOR RISK MANAGEMENT UPDATE- ARE YOU AT RISK? Larry L. Llirán, CISA, CISM December 10, 2015 ISACA Puerto Rico Symposium 2 Agenda Introduction Vendor Management what is? Available Guidance Vendor Management
How to bridge the gap between business, IT and networks
ericsson White paper Uen 284 23-3272 October 2015 How to bridge the gap between business, IT and networks APPLYING ENTERPRISE ARCHITECTURE PRINCIPLES TO ICT TRANSFORMATION A digital telco approach can
Brainloop Cloud Security
Whitepaper Brainloop Cloud Security Guide to secure collaboration in the cloud www.brainloop.com Sharing information over the internet The internet is the ideal platform for sharing data globally and communicating
Security management solutions White paper. Extend business reach with a robust security infrastructure.
Security management solutions White paper Extend business reach with a robust security infrastructure. July 2007 2 Contents 2 Overview 3 Adapt to today s security landscape 4 Drive value from end-to-end
Information Security Basic Concepts
Information Security Basic Concepts 1 What is security in general Security is about protecting assets from damage or harm Focuses on all types of assets Example: your body, possessions, the environment,
Paxata Security Overview
Paxata Security Overview Ensuring your most trusted data remains secure Nenshad Bardoliwalla Co-Founder and Vice President of Products [email protected] Table of Contents: Introduction...3 Secure Data
Protecting Data and Privacy in the Cloud
Protecting Data and Privacy in the Cloud Contents 1 3 6 9 12 13 Protecting Data and Privacy in the Cloud an Introduction Building Services to Protect Data Protecting Data in Service Operations Empowering
Strengthen security with intelligent identity and access management
Strengthen security with intelligent identity and access management IBM Security solutions help safeguard user access, boost compliance and mitigate insider threats Highlights Enable business managers
Accelerate Your Enterprise Private Cloud Initiative
Cisco Cloud Comprehensive, enterprise cloud enablement services help you realize a secure, agile, and highly automated infrastructure-as-a-service (IaaS) environment for cost-effective, rapid IT service
Cyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved.
Cyber Security Automation of energy systems provides attack surfaces that previously did not exist Cyber attacks have matured from teenage hackers to organized crime to nation states Centralized control
Rethinking IT and IT Security Strategies in an Era of Advanced Attacks, Cloud and Consumerization
Rethinking IT and IT Security Strategies in an Era of Advanced Attacks, Cloud and Consumerization Neil MacDonald VP and Gartner Fellow Gartner Information Security, Privacy and Risk Research Twitter @nmacdona
Solutions for Health Insurance Portability and Accountability Act (HIPAA) Compliance
White Paper Solutions for Health Insurance Portability and Accountability Act (HIPAA) Compliance Troy Herrera Sr. Field Solutions Manager Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, CA
Enterprise Data Protection
PGP White Paper June 2007 Enterprise Data Protection Version 1.0 PGP White Paper Enterprise Data Protection 2 Table of Contents EXECUTIVE SUMMARY...3 PROTECTING DATA EVERYWHERE IT GOES...4 THE EVOLUTION
CyberArk Privileged Threat Analytics. Solution Brief
CyberArk Privileged Threat Analytics Solution Brief Table of Contents The New Security Battleground: Inside Your Network...3 Privileged Account Security...3 CyberArk Privileged Threat Analytics : Detect
CPSC 467: Cryptography and Computer Security
CPSC 467: Cryptography and Computer Security Michael J. Fischer Lecture 1 September 2, 2015 CPSC 467, Lecture 1 1/13 Protecting Information Information security Security principles Crypto as a security
National Cyber Security Policy -2013
National Cyber Security Policy -2013 Preamble 1. Cyberspace 1 is a complex environment consisting of interactions between people, software and services, supported by worldwide distribution of information
Securing the Microsoft Cloud
Securing the Microsoft Cloud Securing the Microsoft Cloud Page 1 Securing the Microsoft Cloud Microsoft recognizes that trust is necessary for organizations and consumers to fully embrace and benefit from
SOLUTION BRIEF CA TECHNOLOGIES IDENTITY-CENTRIC SECURITY. How Can I Both Enable and Protect My Organization in the New Application Economy?
SOLUTION BRIEF CA TECHNOLOGIES IDENTITY-CENTRIC SECURITY How Can I Both Enable and Protect My Organization in the New Application Economy? CA Security solutions can help you enable and protect your business
Extending Threat Protection and Control to Mobile Workers with Cloud-Based Security Services > White Paper
with Cloud-Based Security Services > White Paper It s a phenomenon and a fact: employees are always on today. They connect to the network whenever they want, from wherever they happen to be, with laptops,
How To Audit Cloud Computing
Assessing the Audit Impact of Cloud Computing kpmg.com 1 Assessing the Audit Impact of Cloud Computing Cloud Computing Cloud computing is becoming an important IT strategy for entities that need varying
PCI DSS Top 10 Reports March 2011
PCI DSS Top 10 Reports March 2011 The Payment Card Industry Data Security Standard (PCI DSS) Requirements 6, 10 and 11 can be the most costly and resource intensive to meet as they require log management,
Cloud Security Introduction and Overview
Introduction and Overview Klaus Gribi Senior Security Consultant [email protected] May 6, 2015 Agenda 2 1. Cloud Security Cloud Evolution, Service and Deployment models Overview and the Notorious
MANAGED FILE TRANSFER: 10 STEPS TO PCI DSS COMPLIANCE
WHITE PAPER MANAGED FILE TRANSFER: 10 STEPS TO PCI DSS COMPLIANCE 1. OVERVIEW Do you want to design a file transfer process that is secure? Or one that is compliant? Of course, the answer is both. But
The Convergence of IT Security and Physical Access Control
The Convergence of IT Security and Physical Access Control Using a Single Credential to Secure Access to IT and Physical Resources Executive Summary Organizations are increasingly adopting a model in which
i-pcgrid Workshop 2015 Cyber Security for Substation Automation The Jagged Line between Utility and Vendors
March 25-27, 2014 Steven A. Kunsman i-pcgrid Workshop 2015 Cyber Security for Substation Automation The Jagged Line between Utility and Vendors ABB Inc. March 26, 2015 Slide 1 Cyber Security for Substation
Protecting the Extended Enterprise Network Security Strategies and Solutions from ProCurve Networking
ProCurve Networking by HP Protecting the Extended Enterprise Network Security Strategies and Solutions from ProCurve Networking Introduction... 2 Today s Network Security Landscape... 2 Accessibility...
The Benefits of an Integrated Approach to Security in the Cloud
The Benefits of an Integrated Approach to Security in the Cloud Judith Hurwitz President and CEO Marcia Kaufman COO and Principal Analyst Daniel Kirsch Senior Analyst Sponsored by IBM Introduction The
Protecting Your Organisation from Targeted Cyber Intrusion
Protecting Your Organisation from Targeted Cyber Intrusion How the 35 mitigations against targeted cyber intrusion published by Defence Signals Directorate can be implemented on the Microsoft technology
Product Factsheet MANAGED SECURITY SERVICES - FIREWALLS - FACT SHEET
Product Factsheet MANAGED SECURITY SERVICES - FIREWALLS - FACT SHEET ELITE S NEXT GENERATION MANAGED SECURITY SERVICES Security risks to business information systems are expanding at a rapid rate; often,
ProtectV. Securing Sensitive Data in Virtual and Cloud Environments. Executive Summary
VISIBILITY DATA GOVERNANCE SYSTEM OS PARTITION UNIFIED MANAGEMENT CENTRAL AUDIT POINT ACCESS MONITORING ENCRYPTION STORAGE VOLUME POLICY ENFORCEMENT ProtectV SECURITY SNAPSHOT (backup) DATA PROTECTION
External Supplier Control Requirements
External Supplier Control s Cyber Security For Suppliers Categorised as Low Cyber Risk 1. Asset Protection and System Configuration Barclays Data and the assets or systems storing or processing it must
SECURITY INFRASTRUCTURE Standards and implementation practices for protecting the privacy and security of shared genomic and clinical data
Global Alliance for Genomics and Health SECURITY INFRASTRUCTURE Standards and implementation practices for protecting the privacy and security of shared genomic and clinical data VERSION 1.1 March 12,
Services. Cybersecurity. Capgemini & Sogeti. Guiding enterprises and government through digital transformation while keeping them secure
Home Secure digital transformation SMACT Advise, Protect & Monitor Why Capgemini & Sogeti? In safe hands Capgemini & Sogeti Cybersecurity Services Guiding enterprises and government through digital transformation
FIVE KEY CONSIDERATIONS FOR ENABLING PRIVACY IN HEALTH INFORMATION EXCHANGES
FIVE KEY CONSIDERATIONS FOR ENABLING PRIVACY IN HEALTH INFORMATION EXCHANGES The implications for privacy and security in the emergence of HIEs The emergence of health information exchanges (HIE) is widely
Associate Prof. Dr. Victor Onomza Waziri
BIG DATA ANALYTICS AND DATA SECURITY IN THE CLOUD VIA FULLY HOMOMORPHIC ENCRYPTION Associate Prof. Dr. Victor Onomza Waziri Department of Cyber Security Science, School of ICT, Federal University of Technology,
I D C A N A L Y S T C O N N E C T I O N
I D C A N A L Y S T C O N N E C T I O N Robert Westervelt Research Manager, Security Products T h e R o l e a nd Value of Continuous Security M o nitoring August 2015 Continuous security monitoring (CSM)
How To Manage Security On A Networked Computer System
Unified Security Reduce the Cost of Compliance Introduction In an effort to achieve a consistent and reliable security program, many organizations have adopted the standard as a key compliance strategy
Five keys to a more secure data environment
Five keys to a more secure data environment A holistic approach to data infrastructure security Compliance professionals know better than anyone how compromised data can lead to financial and reputational
RFI Template for Enterprise MDM Solutions
RFI Template for Enterprise MDM Solutions 2012 Zenprise, Inc. 1 About This RFI Template A secure mobile device management solution is an integral part of any effective enterprise mobility program. Mobile
Media Shuttle s Defense-in- Depth Security Strategy
Media Shuttle s Defense-in- Depth Security Strategy Introduction When you are in the midst of the creative flow and tedious editorial process of a big project, the security of your files as they pass among
IT ASSET MANAGEMENT Securing Assets for the Financial Services Sector
IT ASSET MANAGEMENT Securing Assets for the Financial Services Sector V.2 Final Draft May 1, 2014 [email protected] This revision incorporates comments from the public. Page Use case 1 Comments
05.0 Application Development
Number 5.0 Policy Owner Information Security and Technology Policy Application Development Effective 01/01/2014 Last Revision 12/30/2013 Department of Innovation and Technology 5. Application Development
IBM Data Security Services for endpoint data protection endpoint encryption solution
Protecting data on endpoint devices and removable media IBM Data Security Services for endpoint data protection endpoint encryption solution Highlights Secure data on endpoint devices Reap benefits such
EXTENDING THREAT PROTECTION AND CONTROL TO MOBILE WORKERS
EXTENDING THREAT PROTECTION AND WHITEPAPER CLOUD-BASED SECURITY SERVICES PROTECT USERS IN ANY LOCATION ACROSS ANY NETWORK It s a phenomenon and a fact: employees are always on today. They connect to the
Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist, CISSP @TheGrantBrown
Cyber Resilience Implementing the Right Strategy Grant Brown specialist, CISSP @TheGrantBrown 1 2 Network + Technology + Customers = $$ 3 Perfect Storm? 1) Increase in Bandwidth (extended reach) 2) Available
Achieving SOX Compliance with Masergy Security Professional Services
Achieving SOX Compliance with Masergy Security Professional Services The Sarbanes-Oxley (SOX) Act, also known as the Public Company Accounting Reform and Investor Protection Act of 2002 (and commonly called
Cloud Assurance: Ensuring Security and Compliance for your IT Environment
Cloud Assurance: Ensuring Security and Compliance for your IT Environment A large global enterprise has to deal with all sorts of potential threats: advanced persistent threats (APTs), phishing, malware
2012 North American Managed Security Service Providers Growth Leadership Award
2011 South African Data Centre Green Excellence Award in Technology Innovation Cybernest 2012 2012 North American Managed Security Service Providers Growth Leadership Award 2011 Frost & Sullivan 1 We Accelerate
IoT Security Platform
IoT Security Platform 2 Introduction Wars begin when the costs of attack are low, the benefits for a victor are high, and there is an inability to enforce law. The same is true in cyberwars. Today there
Beyond passwords: Protect the mobile enterprise with smarter security solutions
IBM Software Thought Leadership White Paper September 2013 Beyond passwords: Protect the mobile enterprise with smarter security solutions Prevent fraud and improve the user experience with an adaptive
Seven Things To Consider When Evaluating Privileged Account Security Solutions
Seven Things To Consider When Evaluating Privileged Account Security Solutions Contents Introduction 1 Seven questions to ask every privileged account security provider 4 1. Is the solution really secure?
Cyber Security solutions
Cyber Security solutions The scenario IT security has become a highly critical issue for all businesses as a result of the growing pervasiveness and diffusion of ICT technology. Risks can arise both inside
ATTPS Publication: Trustworthy ICT Taxonomy
Publication: worthy ICT Taxonomy Roger Berkley worthy ICT Taxonomy Research Cybersecurity technology is a considerably large subdomain of ICT. Technology experts like Gartner have identified at least 94
Risk Management Guide for Information Technology Systems. NIST SP800-30 Overview
Risk Management Guide for Information Technology Systems NIST SP800-30 Overview 1 Risk Management Process that allows IT managers to balance operational and economic costs of protective measures and achieve
How To Protect Your Network From Attack
Department of Computer Science Institute for System Architecture, Chair for Computer Networks Internet Services & Protocols Internet (In)Security Dr.-Ing. Stephan Groß Room: INF 3099 E-Mail: [email protected]
Cloud Security Implications for Financial Institutions By Scott Galyk Director of Software Development FIMAC Solutions, LLC
Cloud Security Implications for Financial Institutions By Scott Galyk Director of Software Development FIMAC Solutions, LLC www.fmsinc.org 1 2015 Financial Managers Society, Inc. Cloud Security Implications
How does IBM deliver cloud security? An IBM paper covering SmartCloud Services 1
How does IBM deliver cloud security? An IBM paper covering SmartCloud Services 1 2 How does IBM deliver cloud security? Contents 2 Introduction 3 Cloud governance 3 Security governance, risk management
Minder. simplifying IT. All-in-one solution to monitor Network, Server, Application & Log Data
Minder simplifying IT All-in-one solution to monitor Network, Server, Application & Log Data Simplify the Complexity of Managing Your IT Environment... To help you ensure the availability and performance
The Comprehensive Guide to PCI Security Standards Compliance
The Comprehensive Guide to PCI Security Standards Compliance Achieving PCI DSS compliance is a process. There are many systems and countless moving parts that all need to come together to keep user payment
