Establishing Trust in the Cloud: Trusted Multi-Tenant Infrastructure
|
|
|
- Edgar Harmon
- 10 years ago
- Views:
Transcription
1 Establishing Trust in the Cloud: Trusted Multi-Tenant Infrastructure
2 Market Observations Multi-Tenant security is an end-to-end configuration requirement, while most of the products and standards address specific devices or functionality within the overall end-to-end scope Many standards and products contribute to the ability to solve parts of the problem No comprehensive framework exists to describe the business/mission needs and validate compliance of the entire solution set against open standards There is a need for solutions that address trust and security across solutions derived from combining dedicated and shared infrastructures 10/14/2014 Copyright 2014 Trusted Computing Group 2
3 Market Changes Cost reduction and IT agility Consolidation of IT resources and staffing Movement from CAPEX to OPEX funding of IT To support shared infrastructure for critical systems: Financial (PCI), Healthcare (HIPAA), Energy (NERC/CIP) Global Government and Industrial Base Defense including joint service or coalition operations Shared services within public, private, community and hybrid cloud solutions Applications supporting the mobile ecosystem 10/14/2014 Copyright 2014 Trusted Computing Group 3
4 Security Built In & Coordinated Trusted Multi-Tenant Infrastructure (TMI) Objectives Standards framework for implementing: Shared Infrastructures Multi-Provider Infrastructures Reference Models and Implementation Guidance Identify and address gaps in existing standards 10/14/2014 Copyright 2014 Trusted Computing Group 3
5 Establish a Trusted Context in which information can be exchanged between parties Establish a level of trust (including the degree and types of information to be accepted) between parties Exchange Information between parties within the trusted context Exchange information between parties within the bounds of the trust relationship Enforce Policy using the integrity measurements, assertions and attestations exchanged between parties Identify executable policy statements and stores, information sources and sinks, decision authorities, execution points, obligations on parties and policy hierarchies 10/14/2014 Copyright 2014 Trusted Computing Group 4
6 10/14/2014 Copyright 2014 Trusted Computing Group 6
7 Potential Impact Low Medium High Likelihood Likelihood Likelihood Low Med High Low Med High Low Med High Inconvience-1 T1 Financial Loss -2 Reputation/ Image -3 T1 T1 Unauthorized Release -4 T1 Personal Safety -5 Civil Criminal - 6 T1 = Low Trust = Medium Trust = High Trust = Very High Trust 10/14/2014 Copyright 2014 Trusted Computing Group 7
8 10/14/2014 Copyright 2014 Trusted Computing Group 8
9 Identify the assets and providers involved and establish identity, configuration, policy, enforcement authority and reputation compliance, store in the trusted entity store For each segment of the transaction, identify the level of risk inherent based on the transaction characteristics Identify mitigation patterns addressing the risks, factoring: The level of assurance that claims and attestations are valid The level of policy enforcement that can be applied The ability to control rights granted to the transaction principals Assess the overall transaction risk, aligning transaction profile to policy profiles for execution Audit transaction execution 10/14/2014 Copyright 2014 Trusted Computing Group 9
10 In an IT commons based on multi-tenant, shared infrastructure, the challenge is to: Establish trust in the provider of IT services Establish and monitor compliance to changing IT policy Assess and monitor compliance to cost, policy and performance objectives Do this in a multi-sourced, multi-supplier ecosystem To establish and maintain trustworthy ecosystems: Enable businesses to assess the trustworthiness of supplier systems Enable real-time assessment of compliance as part of the provisioning process Define and implement best practices and standard patterns for building and operating trustworthy infrastructures Define mapping of standards against a reference model to improve integration of trustworthy components Support real time assessment and enforcement of policy to ensure shared infrastructure remains in compliance The use of open trusted platform standards provides businesses a way to assess the suitability, compliance and performance of shared systems 10/14/2014 Copyright 2014 Trusted Computing Group 10
11 Questions? 10/14/2014 Copyright 2014 Trusted Computing Group 11
SECURITY RISK MANAGEMENT
SECURITY RISK MANAGEMENT ISACA Atlanta Chapter, Geek Week August 20, 2013 Scott Ritchie, Manager, HA&W Information Assurance Services Scott Ritchie CISSP, CISA, PCI QSA, ISO 27001 Auditor Manager, HA&W
Business Case for Data Center Network Consolidation
Business Case for Data Center Network Consolidation Executive Summary Innovations in cloud, big data, and mobility as well as users expectations for anywhere, anytime, and any device access are defining
Secure Data Transmission Solutions for the Management and Control of Big Data
Secure Data Transmission Solutions for the Management and Control of Big Data Get the security and governance capabilities you need to solve Big Data challenges with Axway and CA Technologies. EXECUTIVE
Accelerate Your Enterprise Private Cloud Initiative
Cisco Cloud Comprehensive, enterprise cloud enablement services help you realize a secure, agile, and highly automated infrastructure-as-a-service (IaaS) environment for cost-effective, rapid IT service
Broadcloud improves competitive advantage with efficient, flexible and scalable disaster recovery services
CUSTOMER SUCCESS STORY Broadcloud improves competitive advantage with efficient, flexible and scalable disaster recovery services CLIENT PROFILE Industry: IT services Company: Broadcloud Staff: 40-plus BUSINESS
ITIL Asset and Configuration Management in the Cloud. January 2016
ITIL Asset and Configuration Management in the Cloud January 2016 2016, Amazon Web Services, Inc. or its affiliates. All rights reserved. Notices This document is provided for informational purposes only.
Can You be HIPAA/HITECH Compliant in the Cloud?
Can You be HIPAA/HITECH Compliant in the Cloud? Background For the first 10 years of its existence, the Health Insurance Portability and Accountability Act of 1996 (HIPAA) was a toothless tiger. Although
Securing the Microsoft Cloud
Securing the Microsoft Cloud Page 1 Securing the Microsoft Cloud Microsoft recognizes that trust is necessary for organizations and customers to fully embrace and benefit from cloud services. We are committed
Firewall Administration and Management
Firewall Administration and Management Preventing unauthorised access and costly breaches G-Cloud 5 Service Definition CONTENTS Overview of Service... 2 Protects Systems and data... 2 Optimise firewall
Hans Bos Microsoft Nederland. [email protected]
Hans Bos Microsoft Nederland Email: Twitter: [email protected] @hansbos Microsoft s Cloud Environment Consumer and Small Business Services Software as a Service (SaaS) Enterprise Services Third-party
Microsoft s Compliance Framework for Online Services
Microsoft s Compliance Framework for Online Services Online Services Security and Compliance Executive summary Contents Executive summary 1 The changing landscape for online services compliance 4 How Microsoft
H Y T RUST: S OLUTION B RIEF. Solve the Nosy Neighbor Problem in Multi-Tenant Environments
H Y T RUST: S OLUTION B RIEF Solve the Nosy Neighbor Problem in Multi-Tenant Environments Summary A private cloud with multiple tenants such as business units of an enterprise or customers of a cloud service
Hybrid IT through Cloud Brokerage Your Path to Better Business Outcomes
Hybrid IT through Cloud Brokerage Your Path to Better Business Outcomes By Mohammed Farooq, CEO, Gravitant Table of Contents 3 Hybrid IT through Cloud Brokerage Your Path to Better Business Outcomes 4
IT Vendor Due Diligence. Jennifer McGill CIA, CISA, CGEIT IT Audit Director Carolinas HealthCare System December 9, 2014
IT Vendor Due Diligence Jennifer McGill CIA, CISA, CGEIT IT Audit Director Carolinas HealthCare System December 9, 2014 Carolinas HealthCare System (CHS) Second largest not-for-profit healthcare system
Strategies for assessing cloud security
IBM Global Technology Services Thought Leadership White Paper November 2010 Strategies for assessing cloud security 2 Securing the cloud: from strategy development to ongoing assessment Executive summary
Logging and Alerting for the Cloud
Logging and Alerting for the Cloud What you need to know about monitoring and tracking across your enterprise The need for tracking and monitoring is pervasive throughout many aspects of an organization:
Secure Multi Tenancy In the Cloud. Boris Strongin VP Engineering and Co-founder, Hytrust Inc. [email protected]
Secure Multi Tenancy In the Cloud Boris Strongin VP Engineering and Co-founder, Hytrust Inc. [email protected] At-a-Glance Trends Do MORE with LESS Increased Insider Threat Increasing IT spend on cloud
Business Associate Management Methodology
Methodology auxilioinc.com 844.874.0684 Table of Contents Methodology Overview 3 Use Case 1: Upstream of s I manage business associates 4 System 5 Use Case 2: Eco System of s I manage business associates
A COALFIRE PERSPECTIVE. Moving to the Cloud. NCHELP Spring Convention Panel May 2012
A COALFIRE PERSPECTIVE Moving to the Cloud A Summary of Considerations for Implementing Cloud Migration Plans into New Business Platforms NCHELP Spring Convention Panel May 2012 DALLAS DENVER LOS ANGELES
Data Center is the Foundation of Carrier ICT Transformation. The challenges of building a service driven data center
P a g e 1 Data Center is the Foundation of Carrier ICT Transformation As we transform into the digital economy, the role of the Data Center has evolved from just being a container holding its individual
The Impact of HIPAA and HITECH
The Health Insurance Portability & Accountability Act (HIPAA), enacted 8/21/96, was created to protect the use, storage and transmission of patients healthcare information. This protects all forms of patients
Key Considerations of Regulatory Compliance in the Public Cloud
Key Considerations of Regulatory Compliance in the Public Cloud W. Noel Haskins-Hafer CRMA, CISA, CISM, CFE, CGEIT, CRISC 10 April, 2013 [email protected] Disclaimer Unless otherwise specified,
Testing Network Virtualization For Data Center and Cloud VERYX TECHNOLOGIES
Testing Network Virtualization For Data Center and Cloud VERYX TECHNOLOGIES Table of Contents Introduction... 1 Network Virtualization Overview... 1 Network Virtualization Key Requirements to be validated...
CloudCheck Compliance Certification Program
CloudCheck Compliance Certification Program Ensure Your Cloud Computing Environment is Secure with CloudCheck Certification Organizations today are increasingly relying on a combination of private and/or
Cisco Unified Data Center: The Foundation for Private Cloud Infrastructure
White Paper Cisco Unified Data Center: The Foundation for Private Cloud Infrastructure Providing Agile and Efficient Service Delivery for Sustainable Business Advantage What You Will Learn Enterprises
Tufin Orchestration Suite
Tufin Orchestration Suite Security Policy Orchestration across Physical Networks & Hybrid Cloud Environments The Network Security Challenge In today s world, enterprises face considerably more network
Securing business data. CNS White Paper. Cloud for Enterprise. Effective Management of Data Security
Securing business data CNS White Paper Cloud for Enterprise Effective Management of Data Security Jeff Finch, Head of Business Development, CNS Mosaic 2nd July 2015 Contents 1 Non-Disclosure Statement...
The Need for Service Catalog Design in Cloud Services Development
The Need for Service Catalog Design in Cloud Services Development The purpose of this document: Provide an overview of the cloud service catalog and show how the service catalog design is an fundamental
NEC Managed Security Services
NEC Managed Security Services www.necam.com/managedsecurity How do you know your company is protected? Are you keeping up with emerging threats? Are security incident investigations holding you back? Is
Bridging the HIPAA/HITECH Compliance Gap
CyberSheath Healthcare Compliance Paper www.cybersheath.com -65 Bridging the HIPAA/HITECH Compliance Gap Security insights that help covered entities and business associates achieve compliance According
IBM PowerSC. Security and compliance solution designed to protect virtualized datacenters. Highlights. IBM Systems and Technology Data Sheet
IBM PowerSC Security and compliance solution designed to protect virtualized datacenters Highlights Simplify security management and compliance measurement Reduce administration costs of meeting compliance
Bank of Israel. 1. Background. In recent years, cloud. environmentally. from. aspects in. these. 2. Applicability. Directive ). 3.
Bank of Israel Supervisor of Banks Jerusalem, 12 Tammuz 5775 June 29, 2015 15LM2087 To: The Banking Corporations Attn: Chief Executive Officer Re: Risk management in a cloud computing environment 1. Background
Healthcare IT (HIT) Strategic Planning & Budgeting MARCH 26, 2014
Healthcare IT (HIT) Strategic Planning & Budgeting MARCH 26, 2014 Agenda Introduction / Session Overview HIT Budgeting 101 Security and Compliance EHR budgeting HIT Where Are We Going Q & A 2 Copyright
HIPAA in the Cloud. How to Effectively Collaborate with Cloud Providers
How to Effectively Collaborate with Cloud Providers Speaker Bio Chad Kissinger Chad Kissinger Founder OnRamp Chad Kissinger is the Founder of OnRamp, an industry leading high security and hybrid hosting
HIPAA and HITECH Compliance for Cloud Applications
What Is HIPAA? The healthcare industry is rapidly moving towards increasing use of electronic information systems - including public and private cloud services - to provide electronic protected health
Mobile Security & BYOD Policy
Mobile Security & BYOD Policy Sarkis Daglian Assistant Manager, Desktop Support Office of Information Technology Isaac Straley UCI Information Security Officer Office of Information Technology Speakers
Ed McMurray, CISA, CISSP, CTGA CoNetrix
Ed McMurray, CISA, CISSP, CTGA CoNetrix AGENDA Introduction Cybersecurity Recent News Regulatory Statements NIST Cybersecurity Framework FFIEC Cybersecurity Assessment Questions Information Security Stats
EMC HYBRID CLOUD SOLUTION FOR HEALTHCARE
EMC HYBRID CLOUD SOLUTION FOR HEALTHCARE Next-Generation Health IT at the Point-of-Care ESSENTIALS Delivering ITaaS via a trusted, well-run EMC Hybrid Cloud drives business alignment, efficiency, and end-user
Cloud models and compliance requirements which is right for you?
Cloud models and compliance requirements which is right for you? Bill Franklin, Director, Coalfire Stephanie Tayengco, VP of Technical Operations, Logicworks March 17, 2015 Speaker Introduction Bill Franklin,
CIO SUMMIT l LAS VEGAS
CIO SUMMIT l LAS VEGAS Copyright 2014 EMC Corporation. All rights reserved. 1 IT Transformation Facilitator: Tom Roloff, SVP Global Services, EMC Many Industries Face Structural Change 3 Today s Business
Cloud Services Catalog with Epsilon
Cloud Services Catalog with Epsilon Modern IT enterprises face several challenges while building a service catalog for their data center. Provisioning with a cloud management platform solves some of these
Cloud security architecture
ericsson White paper Uen 284 23-3244 January 2015 Cloud security architecture from process to deployment The Trust Engine concept and logical cloud security architecture presented in this paper provide
Managing risks in a Salesforce environment
Managing risks in a Salesforce environment Managing risks in a Salesforce environment In today s rapidly changing world of business, only companies that understand and anticipate customer needs and consistently
Information Security Management System for Microsoft s Cloud Infrastructure
Information Security Management System for Microsoft s Cloud Infrastructure Online Services Security and Compliance Executive summary Contents Executive summary 1 Information Security Management System
S24 - Governance, Risk, and Compliance (GRC) Automation Siamak Razmazma
S24 - Governance, Risk, and Compliance (GRC) Automation Siamak Razmazma Governance, Risk, Compliance (GRC) Automation Siamak Razmazma [email protected] September 2009 Agenda Introduction to
Business Case for a DDoS Consolidated Solution
Business Case for a DDoS Consolidated Solution Executive Summary Distributed denial-of-service (DDoS) attacks are becoming more serious and sophisticated. Attack motivations are increasingly financial
Keith Luck, CISSP, CCSK Security & Compliance Specialist, VMware, Inc. [email protected]
1 Keith Luck, CISSP, CCSK Security & Compliance Specialist, VMware, Inc. [email protected] Agenda Cloud Computing VMware and Security Network Security Use Case Securing View Deployments Questions 2 IT consumption
Copyright 2013 wolfssl Inc. All rights reserved. 2
- - Copyright 2013 wolfssl Inc. All rights reserved. 2 Copyright 2013 wolfssl Inc. All rights reserved. 2 Copyright 2013 wolfssl Inc. All rights reserved. 3 Copyright 2013 wolfssl Inc. All rights reserved.
Big Data, Big Risk, Big Rewards. Hussein Syed
Big Data, Big Risk, Big Rewards Hussein Syed Discussion Topics Information Security in healthcare Cyber Security Big Data Security Security and Privacy concerns Security and Privacy Governance Big Data
Securing the Cloud Infrastructure
EXECUTIVE STRATEGY BRIEF Microsoft recognizes that security and privacy protections are essential to building the necessary customer trust for cloud computing to reach its full potential. This strategy
How Safe are you in your Cloud?
Nov Nov 4-5, 4-5, 2014 2014 Monarch Monarch Beach, Beach, CA CA How Safe are you in your Cloud? Security Intelligence and Regulatory Compliance in the Cloud November 2014 Heather Hinton, Ph.D. IBM Distinguished
Cloud Security Trust Cisco to Protect Your Data
Trust Cisco to Protect Your Data As cloud adoption accelerates, organizations are increasingly placing their trust in third-party cloud service providers (CSPs). But can you fully trust your most sensitive
Evolving Technology Issues: Cloud Computing
Evolving Technology Issues: Cloud Computing Michael Bennett October 16, 2011 2011 Edwards Wildman Palmer LLP & Edwards Wildman Palmer UK LLP Cloud Computing Does compliance with applicable laws fall to
Compliance for the Road Ahead
THE DATA PROTECTION COMPANY CENTRAL CONTROL A NTROL RBAC UNIVERSAL DATA PROTECTION POLICY ENTERPRISE KEY DIAGRAM MANAGEMENT SECURE KEY STORAGE ENCRYPTION SERVICES LOGGING AUDITING Compliance for the Road
Public Clouds. Krishnan Subramanian Analyst & Researcher Krishworld.com. A whitepaper sponsored by Trend Micro Inc.
Public Clouds Krishnan Subramanian Analyst & Researcher Krishworld.com A whitepaper sponsored by Trend Micro Inc. Introduction Public clouds are the latest evolution of computing, offering tremendous value
Cloud Management Platform
Cloud Management Platform A NEW WAY TO MANAGE IT RESOURCES - IN THE The Paradigm Shift to Cloud Computing Engineered by and available through Solgenia, Powua is a brand offering that allows software and
Economic Benefits of Cisco CloudVerse
Economic Benefits of Cisco CloudVerse Executive Summary Cloud enables IT to be delivered as a service, when and wherever it is needed, from central, secure, public and private data centers. Enterprises
WHITEPAPER PROACTIVE SECURITY INTELLIGENCE RETURN ON INVESTMENT
WHITEPAPER PROACTIVE SECURITY INTELLIGENCE RETURN ON INVESTMENT Table of Contents Introduction...3 Business Case...3 Real-World ROI...4 Measured Annual ROI...4 ROI Analysis...5 ROI Calculations...6 ROI
Webtrends Inc. Service Organization Controls (SOC) 3 SM Report on the SaaS Solutions Services System Relevant to Security
Webtrends Inc. Service Organization Controls (SOC) 3 SM Report on the SaaS Solutions Services System Relevant to Security For the Period January 1, 2015 through June 30, 2015 SOC 3 SM SOC 3 is a service
Deploying the Enterprise Cloud
Deploying the Enterprise Cloud Tim Hancock Publication date: October 2012 Deploying the Enterprise Cloud Many enterprises now recognise that the benefits outweigh the risks in Cloud adoption. However,
Hybrid Clouds. Krishnan Subramanian Analyst & Researcher Krishworld.com. A whitepaper sponsored by Trend Micro Inc.
Hybrid Clouds Krishnan Subramanian Analyst & Researcher Krishworld.com A whitepaper sponsored by Trend Micro Inc. Introduction The economic benefits offered by public clouds are attractive enough for many
White. Paper. When Cloud Makes Sense. November 2013
White Paper When Cloud Makes Sense By Wayne Pauley, Senior Analyst November 2013 This ESG White Paper was commissioned by Sungard Availability Services and is distributed under license from ESG. White
Our Commitment to Information Security
Our Commitment to Information Security What is HIPPA? Health Insurance Portability and Accountability Act 1996 The HIPAA Privacy regulations require health care providers and organizations, as well as
GRC Stack Research Sponsorship
GRC Stack Research Sponsorship Overview Achieving Governance, Risk Management and Compliance (GRC) goals requires appropriate assessment criteria, relevant control objectives and timely access to necessary
Analytics for Oil & Gas
Analytics for Oil & Gas Table of Contents Project Delivery. 3 Sales & Operations. 5 Resources. 8 Finance. 10 Contact Us. 14 2 Are you tracking and maximizing the profitability of every project? Don t let
October 2014. Application Control: The PowerBroker for Windows Difference
Application Control: The PowerBroker for Windows Difference October 2014 1 Table of Contents Introduction... 4 The Default-Deny Approach to Application Control... 4 Application Control s Dependence on
Payment Card Industry Data Security Standard
Symantec Managed Security Services support for IT compliance Solution Overview: Symantec Managed Services Overviewview The (PCI DSS) was developed to facilitate the broad adoption of consistent data security
Services. Cybersecurity. Capgemini & Sogeti. Guiding enterprises and government through digital transformation while keeping them secure
Home Secure digital transformation SMACT Advise, Protect & Monitor Why Capgemini & Sogeti? In safe hands Capgemini & Sogeti Cybersecurity Services Guiding enterprises and government through digital transformation
ion Manufacturing Solution
ion Manufacturing Solution Today with ion, while I am driving home I get to see all the information that I need, even when I am in a customer place I can take decisions looking at the information that
Economic Benefits of Cisco CloudVerse
Economic Benefits of Cisco CloudVerse Key Takeaways Executive Summary Cloud architecture enables IT to be delivered as a service and delivered only when it is needed over the network from central, secure
Implement security solutions that help protect your IT systems and facilitate your On Demand Business initiatives.
Security solutions To support your business objectives Implement security solutions that help protect your IT systems and facilitate your On Demand Business initiatives. For an On Demand Business, security
Business Values of Network and Security Virtualization
Business Values of Network and Security Virtualization VMware NSX in the context of the Software Defined Data Center Klaus Jansen Virtual Networks Sales Specialist VMware NSBU 2014 VMware Inc. All rights
HP CLOUD STRATEGY AND SOLUTIONS THE PATH TO HYBRID DELIVERY. Copyright 2011 Hewlett-Packard Development Company, L.P.
HP CLOUD STRATEGY AND SOLUTIONS THE PATH TO HYBRID DELIVERY 1 INSTANT-ON ENTERPRISE Everything and everyone s connected Everyone expects immediate gratification and instant results Business & IT one and
The Changing IT Risk Landscape Understanding and managing existing and emerging risks
The Changing IT Risk Landscape Understanding and managing existing and emerging risks IIA @ Noon Kareem Sadek Senior Manager, Deloitte Canada Chris Close Senior Manager, Deloitte Canada December 2, 2015
