Security and Cloud Computing
|
|
|
- Austin Strickland
- 10 years ago
- Views:
Transcription
1 Dr. Michael Waidner, IBM Distinguished Engineer CTO Security for IBM
2 Disclaimer This document represents the author's views and opinions. It does not necessarily represent IBM's position or strategies. 2
3 1. Information 2. Providing a Secure Cloud 3. Using a Cloud Securely 4. Cloud-delivered Security Services 5. Areas for Research 3
4 Chapter 1 Information Security and Cloud Computing 4
5 Information Security Risk Management Threat (and Attack) Malicious / Accidental Insider / Outsider Resources Vulnerability Identities Information Applications IT Infrastructure Physical infrast. Potential insecurity Potential loss for a party Yields risk Risk management Acceptance Avoidance Transfer Mitigation Objectives Confidentiality Integrity Availability Accountability (Manageability) Parties Concerned Provider, subscriber, end-user,..., government Risk is estimated based on statistical assumptions, and those are changing over time. Each party needs to manage their risk towards an acceptable level (multi-party security) The residual risk is never zero, there is no absolute security. 5
6 Threat Trends 6 [IBM 10, OWASP 10] Attacks are increasingly economically or politically motivated Motivates focus on cybersecurity / protecting cyberspace & critical infrastructures The weakest link determines overall risk Malware (virus, worms, trojans) and phishing Insecure out-of-the-box configurations, cryptic interfaces, standard passwords Attack sophistication is increasing Focus is constantly moving up, from network/os to application threats Distributed denial-of-service attacks (DDoS) Bot-nets (for DDoS, Spam, etc.) Slow Attacks (prepared over years, combining many elements) Advanced Persistent Threat (ATP; focused, ongoing, resourceful intelligence) Insiders are major source of insecurity Mostly accidental ( I need to work around security, trivial password, lost laptop, ) Privileged insiders, e.g., administrators, assistants, management Employees who change role but keep privileges Ex-employees whose access does not get revoked
7 OWASP Ten Most Critical Web Application Security Risks Source: [OWASP 10] 7
8 Cloud Threats Web app vuln's SOA External Threats Network vuln's Malware Force majeur Empowered end-users Co-tenants... Multi-tenancy / Virt Cloud insiders, privileged users Cloud Management Cloud Data Center New sources of threats Co-tenants Empowered end-users Cloud insiders (½ new) Network, server, middleware, app vuln's, physical & organizational threats New technologies Physical-to-virtual: Multi-tenancy, virtualization Cloud mgmt: co-management of security, self-service Web 2.0-ish cross-domain SOA [Gass 88, Goldberg 74] 8 At the core this is all well known Many system aspects do not change at all But: many new details and constraints
9 Security Remains the Top Concern for Cloud Adoption 80% Of enterprises consider security the #1 inhibitor to cloud adoptions 48% Of enterprises are concerned about the reliability of clouds 33% Of respondents are concerned with cloud interfering with their ability to comply with regulations How can we be assured that our data will not be leaked and that the vendors have the technology and the governance to control its employees from stealing data? Security is the biggest concern. I don t worry much about the other -ities reliability, availability, etc. I prefer internal cloud to IaaS. When the service is kept internally, I am more comfortable with the security that it offers. Source: Driving Profitable Growth Through Cloud Computing, IBM Study (conducted by Oliver Wyman) 9
10 Specific Customer Concerns Related to Security Protection of intellectual property and data Ability to enforce regulatory or contractual obligations Unauthorized use of data Confidentiality of data Availability of data Integrity of data Ability to test or audit a provider s environment Other 30% 21% 15% 12% 9% 8% 6% 3% Source: Deloitte Enterprise@Risk: Privacy and Data Protection Survey 10
11 Top Security Threats and Risks Gartner: Top Risks (2008) Privileged user access Regulatory compliance Data location Data segregation Recovery Investigative support Long-term viability [Heiser 09] ENISA: Top Security Risks (2009) Loss of governance Lock-in Isolation failure Compliance risks Management interface compromise Data protection Insecure or incomplete data deletion Malicious insider [ENISA 09/a] CSA: Top Threats (2010) Abuse and nefarious use of cloud Insecure interfaces and APIs Malicious insiders Shared technology issues Data loss or leakage Account or service hijacking Unknown risk profile [CSA 10] 11
12 Why is Cloud Security Perceived as Such a Big Problem? Public Cloud??? We Have Control Data It s located at X. It s stored in server s Y, Z. We have backups in place. Our admins control access. Our uptime is sufficient. The auditors are happy. Our security team is engaged. 12 Center Loss of control, perceived or real Lack of experience No established standards Uncertainty on how to interpret regulations and practices??? Who Has Control? Where is it located? Where is it stored? Who backs it up? Who has access? How resilient is it? How do auditors observe? How does our security team engage? Effects Public clouds rarely used for mission critical workloads Preference for application-as-a-service Preference for private and hybrid cloud
13 Cloud computing also provides the opportunity to simplify security controls and defenses Cloud Enabled Control(s) Benefit People and Identity Defined set of cloud interfaces Centralized repository of Identity and Access Control policies Reduced risk of user access to unrelated resources. Information and Data Computing services running in isolated domains as defined in service catalogs Default encryption of data in motion & at rest Virtualized storage providing better inventory, control, tracking of master data Improved accountability, Reduced risk of data leakage / loss Reduced attack surface and threat window Less likelihood that an attack would propagate Process & Application Autonomous security policies and procedures Personnel and tools with specialized knowledge of the cloud ecosystem SLA-backed availability and confidentiality Improved protection of assets and increased accountability of business and IT users Network Server and Endpoint Automated provisioning and reclamation of hardened runtime images Dynamic allocation of pooled resources to missionoriented ensembles Reduced attack surface Improved forensics with ensemble snapshots Closer coupling of systems to manage physical and logical identity / access. Improved ability to enforce access policy and manage compliance Physical infrastructure 13
14 Building a Secure Computer System There is nothing new under the sun but there are lots of old things we don't know. Ambrose Bierce, The Devil's Dictionary Plus many other good text books. (But you can download and read these 3 for free; Anderson's in a back-edition.) 14
15 Security Mechanisms (Controls) Security Policy Enterprise, identity, access, retention, Ideally derived and propagated top down Allow/deny + mandates/ obligations Often composite, mandatory and discr. Abstract, role based, class based Security Development Practices Security testing Eg, OWASP Prevention Detection Compensation (Avoidance, Enforcement) (Monitoring, Audit) (Recovery, Fail-over) Cryptography Encryption Key management Channel security, VPN Access Control MAC, Hash Digital Signatures Message security Redundancy Fault tolerance Backup & recovery Fail-over, graceful degradation Intrusion / Extrusion Prevention Intrusion & Fraud Detection Firewall Anti-virus, anti-malware Intrusion prevention Data leak prevention Virtual patching Signature-based Behavior-based Server, network based Identity Trusted Computing Logging & Auditing Authentication Identity Management Enforcement through (mutually) trusted hardware Immutable logs Time stamping Reference monitor Authorization Data / proc tagging Hypervisor Memory protection Filesystem protection Virtual LAN [Allan 10] 15 Asset Management Change and Configuration Management Physical and Organizational Security
16 IBM Security Blueprint Overview Architectural Principles IBM Security Framework: Business Security Reference Model Governance, Risk, Compliance (GRC) People & Identity Data & Information Application & Process IT Infrastructure: Network, Server, End Point Physical Infrastructure Foundational Security Management Software, System & Service Assurance Identity, Access & Entitlement Mgmt Command and Control Mgmt Security Policy Management Threat & Vulnerability Management Risk & Compliance Assessment IT Service Management Physical Asset Management Security Services and Infrastructure Security Info and Event Infrastructure Identity, Access & Entitlement Infrastructure Security Policy Infrastructure Cryptography, Key & Certificate Infrastructure Network Security Storage Security Host and End-point Security Application Security Service Management and Process Automation Security Service Level Objectives 16 Data & Information Protection Mgmt Physical Security IT Security Services and Mechanisms Code & Images Policies Identities & Attributes Contexts Security Events & Logs Designs Configuration Info and Registry Resources Data Knowledge [Buecker 09]
17 Information Security Process and Management System Security is a dynamic and evolving property. Risks are managed through controls (safeguards), which need to be continuously managed. Initiation of security process Creation of security concept Strategy, objectives (internal, regulatory) Organization, resources, education Scope Documented security policy Threat analysis and risk decisions Safeguards and controls Security Policy Organization of Information security Asset Management Human Resource Security Physical and Environmental Security Communications and Operations Management Access control Information Systems Acquisition Development and Maintenance Information Security Incident Management Business Continuity Management Compliance Mostly about risks and threats, the organization, policy, service management (in particular: asset, change management). Implementation of security concept Maintenance and improvement Core technical security capabilities are a relatively small, although important, part of the story. Supported by studies on foundational controls. [BSI 100-2, ISO 27002] 17
18 Information Security Certification and Audit Trust is good, control is better. Attributed to: Vladimir Ilyich Lenin My job is not security, my job is making sure we pass the audit. Anonymous CISO Internal and external, always organizationally independent Three major frameworks for security audit Payment Card Industry Data Security Standard (PCI DSS) ISO/IEC (BSI-Standard 100) 18 Technology neutral, but ISO 2700x provides strong security context. Statement on Auditing Standard (SAS) No. 70, Type II Fairly prescriptive. Meant specifically for protecting card holder data. Very open, meant for service providers operating transaction systems, and de-facto standard framework for IT outsourcing. Typically significant leeway for auditors Related but not yet relevant for cloud computing outside government context Common Criteria Certification
19 Information Security Process and Management System Information Security Risk Management requires Policy and Process Service Management and IT Governance People and Organization Education and Incentives Measurement and Reporting Our focus: And Security Technology 19
20 IBM Common Cloud Platform Each of these boxes requires a security architecture and design. Application Services Information Services Collaboration Services Common Cloud Service Platform (Cloud Application Infrastructure Services) Common Cloud Management Platform (System Infrastructure Services) 20 Cloud Connectivity Services Cloud Service Life Cycle Tools Business Process Services 90% standard security engineering, like what one would do for a shared data center. We will focus only on a few and fairly cloud-specific aspects.
21 Structure for Following Chapters... Multi-tenancy / Virt Cloud Management Cloud Data Center Chapter 2 Provider perspective: Who to provide a secure cloud service? Chapter 4 Security as a Service 21 Chapter 3 Subscriber perspective: How to select a cloud? Who to use a cloud securely? Chapter 5 Research topics
22 References & Reading List: General Information Security [Allan 10] Allan, D., Hahn, T., Szakal, A., Whitmore, J. and Buecker, A. Security in Development: The IBM Secure Engineering Framework. IBM RedGuide, New York, [Anderson 08] Anderson, R. Security Engineering: A Guide to Building Dependable Distributed Systems (2 nd ed). Wiley, Indianapolis, [Bishop 02] Bishop, M. Computer Security, Art and Science. Addison-Wesley, Boston, [BSI 100] BSI-Standard IT Grundschutz. Bundesamt für Sicherheit in der Informationstechnik, Bonn, [Buecker 09] Buecker, A. et. al. Introducing the IBM Security Framework and IBM Security Blueprint to Realize BusinessDriven Security. IBM RedGuide, New York, [Cheswick 03] Cheswick, W., Bellovin, S. and Rubin, A. Firewalls and Internet Security: Repelling the Wily Hacker (2 nd ed). Addison-Wesley, [Crawford 10] Crawford, S. High Performers and Foundational Controls: Building a Strategy for Security and Risk Management. EMA White Paper, [Gasser 88] M Gasser: Building a Secure Computer System. Van Nostrand Reinhold, New York, [Goldberg 74] Goldberg, R. P. Survey of Virtual Machine Research. IEEE Computer June. 1974, pp [IBM 10] IBM X-Force 2009 Trend and Risk Report. IBM, Armonk, February [ISO 27001] ISO/IEC Information Security Management System. ISO [McGraw 06] McGraw, G. Software Security: Building Security In. Addison-Wesley, [Menezes 96] Menezes, A., van Oorschot, P. and Vanstone, S. Handbook of Applied Cryptography. CRC Press, [OWASP 10] OWASP Top The Ten Most Critical Web Application Security Risks. OWASP Foundation, [Stallings 10] Stallings, W. Network Security Essentials: Applications and Standard (4 th ed). Prentice Hall, Upper Saddle River, 2010.
23 References & Reading List: General Cloud Security [CSA 10] Top Threats to Cloud Computing. Cloud Security Alliance (CSA), [ENISA 09] Cloud Computing: Benefits, Risks and Recommendations for Information Security. European Network and Information Security Agency (ENISA), [ENISA 09a] Cloud Computing Information Assurance Framework. European Network and Information Security Agency (ENISA), [Heiser 09] Heiser J. and Nicolett M. Assessing the Security Risks of Cloud Computing. Gartner Research, 2008 [IBM 09] IBM Point of View:. IBM, New York, [Jericho 09] Cloud Cube Model: Selecting Cloud Formations for Secure Collaboration. The Jericho Forum, [Mather 09] T. Mather, S. Kumaraswamy, S. Latif. Cloud Security and Privacy: An Enterprise Perspective on Risks and Compliance. O'Reilly, Gravenstein, [Mell 09] Mell, P. and Grance, T. Effectively and Securely Using the Cloud Computing Paradigm. In ACM Cloud Computing Security Workshop, Chicago, 2009.
24 Chapter 2 Providing a Secure Cloud (The cloud provider's perspective) 24
25 Outline 25 Responsibilities of Provider and Subscriber Isolation and Integrity Management Multi-tenancy Hypervisor-level security services Fully homomorphic encryption (outlook) Identity Management Managing privileged users On-/off-boarding of users, federated identity
26 Outline 26 Responsibilities of Provider and Subscriber Isolation and Integrity Management Multi-tenancy Hypervisor-level security services Fully homomorphic encryption (outlook) Identity Management Managing privileged users On-/off-boarding of users, federated identity
27 Responsibilities of Provider and Subscriber Who is responsible for security at the level? Datacenter Infrastructure Middleware Application Process Employee Benefits Mgmt. Industry-specific Processes Procurement Business Travel Business Process-as-a-Service Collaboration Subscriber Provider Subscriber Provider Subscriber Provider Subscriber CRM/ERP/HR Industry Applications Financials Provider Application-as-a-Service Web 2.0 Application Runtime Middleware Database Java Runtime Development Tooling Platform-as-a-Service Servers Networking Data Center Fabric Storage Shared virtualized, dynamic provisioning Infrastructure-as-a-Service 27
28 Outline 28 Responsibilities of Provider and Subscriber Isolation and Integrity Management Multi-tenancy Hypervisor-level security services Fully homomorphic encryption (outlook) Identity Management Managing privileged users On-/off-boarding of users, federated identity
29 Isolation and Integrity Management: Multi-tenancy Users from different trust domains are drawing on a shared pool of resources Network, storage and server virtualization Shared file system, database, middleware, application, desktop, business service,... Stack architectures offer choices for implementing multi-tenancy (lower or higher in the stack) Isolation is the key security requirement Basic mechanism is coloring (aka tagging, labeling) and enforcement of isolation between domains (aka zones) of different colors 29 Enforcement through Reference Monitor: provisioning, runtime, de-provisioning / cleanup Cryptography (encryption, key management)
30 Multiple Tenants (MT) at Different Levels of the Stack Example: Database Multi-tenancy 30
31 Models are Mixed in Real Life. Example: IBM System z 31
32 Examples of Multi-tenancy Technologies All stack layers, all applications Explicit coloring of all resources (roles/identities, data, application, processes,...) Runtime separation of domains of different colors LBAC = Label-based Access Control Enterprise zoning policies (external, DMZ, production, test, development, etc.) Provisioning, migration and de-provisioning of resources with security constraints 32 Geographic location (mostly for privacy reasons) Restrictions on co-tenancy (eg, never put X and Y on same Z at the same time) Secure resource management (eg, provenance and health of virtual machine images) All security and system information and events must be colored Includes all events relevant for compliance reports and audits Client-specific compliance reporting is a key requirement Major systems challenge Isolation is one mandatory access control policy M(I)LS = Multiple (Independent) Levels of Security (Top Secret, Secret, Unclassified, ) (Finance, HR, Marketing, ) Natural generic coloring for clouds: by cloud subscriber contract Consistency and visibility of colors across layers and across domains TCG-style Trusted Computing (trusted boot, remote attestation, etc) [Challener 08, Jansen 08, Santos 09]
33 Examples of Multi-tenancy Technologies Server-focused Hypervisor (z/vm, LPAR, phype, Xen, VMware ESX,...) Hypervisor-level security services Network-focused 33 Security Zones, Trusted Virtual Domains (provisioning, ) [Berger 08, Berger 09] VLAN (IEEE 802.1Q) Trusted / Secure Virtual Private Networks (VPN) Encryption of data in transit (SSL/TLS, SSH, IPSec) Storage-focused Label-based Access Control (LBAC) Storage zoning (Virtual Storage Area Network (VSAN), Logical Unit (LUN) Masking,...) Encryption of data at rest (including backups, maintenance) and Key Management Cleanup (caches, files, disks, backups, ) Fully homomorphic encryption
34 Examples of Multi-tenancy Technologies Server-focused Hypervisor (z/vm, LPAR, phype, Xen, VMware ESX,...) Hypervisor-level security services Network-focused 34 Security Zones, Trusted Virtual Domains (provisioning, ) [Berger 08, Berger 09] VLAN (IEEE 802.1Q) Trusted / Secure Virtual Private Networks (VPN) Encryption of data in transit (SSL/TLS, SSH, IPSec) Storage-focused Label-based Access Control (LBAC) Storage zoning (Virtual Storage Area Network (VSAN), Logical Unit (LUN) Masking,...) Encryption of data at rest (including backups, maintenance) and Key Management Cleanup (caches, files, disks, backups, ) Fully homomorphic encryption
35 Hypervisor-level Security Services Physical What would change in a naïve transition from physical (this picture) to virtual? Security services are unnecessarily replicated Security becomes harder: VM sprawl, hypervisor as a new component Security becomes easier: move security services out of the OS into the Hypervisor, security system can introspect the virtual hardware [Chen 01, Christodorescu 09, Garfinkel 05] App 1 App 2 App 3 AV/FW OS HW Switch / NAC / Firewall / IPS... 35
36 Hypervisor-level Security Services Virtual A1 A2 A3 A1 A2 AV/FW AV/FW OS OS Switch / NAC / FW / IPS A3 Security VM Policy Hardened OS Security Mgmt Discovery, license mgmt, update, congestion control + Rootkit Detection Hypervisor HW 36 Example: IBM Tivoli Virtual Server Security for VMware
37 Examples of Multi-tenancy Technologies Server-focused Hypervisor (z/vm, LPAR, phype, Xen, VMware ESX,...) Hypervisor-level security services Network-focused 37 Security Zones, Trusted Virtual Domains (provisioning, ) [Berger 08, Berger 09] VLAN (IEEE 802.1Q) Trusted / Secure Virtual Private Networks (VPN) Encryption of data in transit (SSL/TLS, SSH, IPSec) Storage-focused Label-based Access Control (LBAC) Storage zoning (Virtual Storage Area Network (VSAN), Logical Unit (LUN) Masking,...) Encryption of data at rest (including backups, maintenance) and Key Management Cleanup (caches, files, disks, backups, ) Fully homomorphic encryption
38 Fully Homomorphic Encryption Value of data-at-rest encryption in cloud computing Data on disks, data on backups Storage-centric: subscriber can en/decrypt, provider never sees data Does not work if & while cloud provider operates on encrypted data Fully homomorphic encryption (idea: Rivest, Adleman, Dertouzos, 1978) Express an algorithm as a circuit (network): f(x, x, ) = x +x *(1-x ) What if we had a public-key encryption function that (roughly) does this: State of the art Efficient solutions for certain related subproblems (homomorphic in one operation, server-aided computations, voting protocols, ) First provably secure fully homomorphic solution: [Gentry 09] 38 Enc(x1)+Enc(x2)*(1-Enc(x3)) = Enc(x1+x2*(1-x3) Shows what can be done in priniciple Polynomial, but needs substantial work before it can be used in practice Major area of research in cryptography
39 Outline 39 Responsibilities of Provider and Subscriber Isolation and Integrity Management Multi-tenancy Hypervisor-level security services Fully homomorphic encryption (outlook) Identity Management Managing privileged users On-/off-boarding of users, federated identity
40 Identity Management Identity = set of attributes Tightly linked to Main types of identities to consider in a cloud 40 Users (but devices have identities too) Roles and entitlements Authentication (username/password, strong authentication, two-factor, claims) Authorization and delegation Privacy Fraud and abuse detection Cloud subscriber's administrators Initial enrollment and proofing of cloud subscriber Trust in identities depends largely on proofing (valid address upfront payment out-of-band signed service contract) Cloud subscriber's end user identities (subscriber's employees, customers) Efficient on-boarding / off-boarding Directory synchronization (not a good solution ) Federated identity Cloud provider administrators Main issue: Control over privileged identities
41 Identity Management Identity = set of attributes Tightly linked to Main types of identities to consider in a cloud 41 Users (but devices have identities too) Roles and entitlements Authentication (username/password, strong authentication, two-factor, claims) Authorization and delegation Privacy Fraud and abuse detection Cloud subscriber's administrators Initial enrollment and proofing of cloud subscriber Trust in identities depends largely on proofing (valid address upfront payment out-of-band signed service contract) Cloud subscriber's end user identities (subscriber's employees, customers) Efficient on-boarding / off-boarding Directory synchronization (not a good solution ) Federated identity Cloud provider administrators Main issue: Control over privileged identities
42 Federated Identity (Single-Sign On & Attribute Exchange) Cloud Subscriber User Directory Directory Cloud Provider Trust Relationship 42 Provider needs to authenticate user, without copying the whole subscriber directory.
43 Federated Identity (Single-Sign On & Attribute Exchange) Proving & Enrollment (3) Authenticate User & Get Permission Identity Provider (IdP) (4 ) A u t h R eques R es pon se t s ve ] rie n et oke )R T [(5 ML SA (1) Se (6) rvi ce Se rvi Re ce qu es Re t sp on se (2 ) A u t h Directory Directory Relying Party / Service Provider (RP / SP) Trust Relationship 43 Identity User Major protocols: SAML SSO (enterprise app) OpenID (Web 2.0 app) OAuth (adds authorization) Example: IBM Tivoli Federated Identity Manager
44 Identity Management Identity = set of attributes Tightly linked to Main types of identities to consider in a cloud 44 Users (but devices have identities too) Roles and entitlements Authentication (username/password, strong authentication, two-factor, claims) Authorization and delegation Privacy Fraud and abuse detection Cloud subscriber's administrators Initial enrollment and proofing of cloud subscriber Trust in identities depends largely on proofing (valid address upfront payment out-of-band signed service contract) Cloud subscriber's end user identities (subscriber's employees, customers) Efficient on-boarding / off-boarding Directory synchronization (not a good solution ) Federated identity Cloud provider administrators Main issue: Control over privileged identities
45 Privileged Identity Management (PIM) One of the top security concerns for cloud computing Fear of losing control Context Cloud admins need privileged (think: root) access to cloud & client resources Any reasonable policy demands strong accountability for admin actions Cloud admins typically share privileged accounts 45 Because of limitations of many managed systems Because the number of identities to manage would explode otherwise Approach Reverse Single-sign on PIM system manages all privileged accounts Admins need to check out privileged accounts PIM does log on / log out (admin never sees passwords, gets credentials) PIM logs everything, and SIEM system correlates system logs with PIM logs
46 IBM Tivoli's Privileged Identity Management Solution 3 E-SSO Authorization LDAP 1 TIM with custom module provisions privileged IDs and manages pools of shared IDs Shared IDs are stored in a secured data store 2 Periodically recertify account authorizations through a consistent work flow. 3 Admin logs into TAM E-SSO TAM E-SSO automatically checks out/in shared ID as required to ensure accountability while simplifying usage 4 TSIEM monitors all logs for end to end tracking 1 ITIM AD Recertification of privileged users Event Logs 2 4 TSIEM Enterprise Reports 46
47 References & Reading List (1/2) 47 [Berger 08] Berger, S., Cáceres, R., Pendarakis, P., Sailer, R., Valdez, E, Perez, R., Schildhauer, W. and Srinivasan, D. TVDc: Managing Security in the Trusted Virtual Datacenter. SIGOPS Oper. Syst. Rev. 42/1 (2008). [Berger 09] Berger, S., Cáceres, R., Goldman, K., Pendarakis, D., Perez, R., Rao, J. R., Rom, E., Sailer, R., Schildhauer, W., Srinivasan, D., Tal, S. and Valdez, E. Security for the Cloud Infrastructure: Trusted Virtual Data Center Implementation. IBM Journal of Research and Development 53/4 (2009). [Challener 08] Challener, D., Yoder, K., Catherman, R., Safford, D. and Van Doorn, L. A Practical Guide to Trusted Computing. IBM Press [Chen 01] Chen P. M., Noble, B. D. When Virtual is Better Than Real, In USENIX Hot Topics in Operating Systems, Elmau, [Christodorescu 09] Christodorescu, M., Sailer, R., Schales, D., Sgandurra, D., Zamboni, D. Cloud Security Is Not (Just) Virtualization Security. In ACM Cloud Computing Security Workshop, Chicago, [Garfinkel 05] Garfinkel, T., Rosenblum, M. When Virtual is Harder than Real: Security Challenges in Virtual Machine Based Computing Environments. In USENIX Hot Topics in Operating Systems, Santa Fe, [Gentry 09] Gentry, C. Fully Homomorphic Encryption Using Ideal Lattices. ACM Symposium on Theory of Computing, Bethesda [Jansen 08] Jansen, B., Ramasamy, H. and Schunter, M. Policy Enforcement and Compliance Proofs for Xen Virtual Machines. In ACM SIGPLAN/SIGOPS International Conference on Virtual Execution Environments. Seattle, [King 06] King, S. T., Chen, P. M., Wang, Y.-M., Verbowski, C., Wang, H. J. and Lorch, J. R. SubVirt: Implementing Malware with Virtual Machines. In IEEE Symposium on Security and Privacy, Oakland, [Krautheim 09] Krautheim, F. J.. Private Virtual Infrastructure for Cloud Computing. In USENIX Workshop on Hot Topics in Cloud Computing (HotCloud). San Diego [Matthews 09] Matthews, J., Garfinkel, T., Hoff, C. and Wheeler, J. Virtual Machine Contracts for Datacenter and Cloud Computing Environments. In ACM Workshop on Automated Control for Datacenters and Clouds (ACDC '09). Barcelona, 2009.
48 References & Reading List (2/2) 48 [OAuth] [Ormandy 07] Ormandy, T. An Empirical Study into the Security Exposure to Hosts of Hostile Virtualized Environments. Google [OpenID] [Ristenpart 09] Ristenpart, T., Tromer, E., Shacham, H., and Savage, S. Hey, you, get off of my Cloud: Exploring Information Leakage in Third-party Compute Clouds. In ACM Conference on Computer and Communications Security, Chicago, ACM, New York, [Rutkowska 08] Rutkowska, J. Security Challenges in Virtualized Enviroments. In RSA Conference, San Francisco, [SAML] OASIS Security Assertion Markup Language. wg_abbrev=security [Santos 09] Santos, N., Gummadi, K. and Rodrigues, R. Towards Trusted Cloud Computing. In USENIX Workshop on Hot Topics in Cloud Computing (HotCloud). San Diego [Sherr 09] Sherr, M. and Blaze, M. Application Containers Without Virtual Machines. In ACM Workshop on Virtual Machine Security, Chicago, [SPML] OASIS Service Provisioning Markup Language. wg_abbrev=provision [XACML] OASIS extensible Access Control Markup Language. wg_abbrev=xacml [Wei 09] Wei, J., Zhang, X., Ammons, G., Bala, V., and Ning, P. Managing Security of Virtual Machine Images in a Cloud Environment. In ACM Workshop on Cloud Computing Security, Chicago, [Wimmer 08] Wimmer, M Virtual Security, About the Security Pros and Cons of Server Virtualization; In FIRST Annual Conference on Computer Security Incident Handling; Vancouver, 2008.
49 Chapter 3 Selecting a Secure Cloud & Using it Securely (The cloud subscriber's perspective) Oliver Widder 49
50 One-size does not fit-all: Different cloud workloads have different risk profiles High Mission-critical workloads, personal information Need for Security Assurance Analysis & simulation with public data Training, testing with non-sensitive data Low Low-risk Mid-risk High-risk Tomorrow s high value / high risk workloads need: Quality of protection adapted to risk Direct visibility and control Significant level of assurance Today s clouds are primarily here: Lower risk workloads One-size-fits-all approach to data protection No significant assurance Price is key Business Risk 50
51 Subjective Risk Enterprise Perspective Industry-specific Processes Risk grows in this direction Employee Benefits Mgmt. Procurement Business Travel Business Process-as-a-Service Collaboration CRM/ERP/HR Industry Applications Financials Application-as-a-Service Web 2.0 Application Runtime Middleware Java Runtime Development Tooling Database Risk grows in this direction Security conscious enterprises focus mostly here More sharing and lowerlevel service abstraction are perceived as risk increasing factors. Platform-as-a-Service Servers Networking Data Center Fabric Storage Shared virtualized, dynamic provisioning Infrastructure-as-a-Service 1 2 Enterprise Data Center Private Cloud 51 Enterprise Data Center Managed Private Cloud CSP IBM operated operated 3 Enterprise 4 Enterprise A Enterprise B Enterprise C Hosted Private Cloud CSP IBM owned and IBMowned ownedand anda operated operated Shared Cloud Services 5 User User User A B C User User D E Public Cloud Services
52 Typical Security Requirements Derived from Privacy and Accountability Regulations Legislation Area Corporate Financial Accounting and Reporting Covers Implications on Cloud Architecture Providing evidence of appropriate Business Controls, correct handling of financial data, correct reporting of financial information Extensive logging incl. provenance, demonstrable security controls between customers and between layers of the Cloud Security measures necessary in order to service financial transactions and customers Identification and segregation of the cloud elements supporting financial transactions Data encryption Security measures necessary in handling personal data Inability to move data around the cloud, data may have to reside and be processed within a specific country Requirement on the cllient to manage data protection Discovery, search and seizure powers retained as a matter of law by external agencies Data, audit logs, hardware may need to be discovered and surrendered to authorized agencies Restrictions on data transmittal and usage Limitations or requirements to be fulfilled before data can be moved or used in different legislative domains Inability to move data around the cloud, data may have to reside and be processed within a specific country Industry-specific Regulatory issues Requirements on specific industry sectors which will impact usage of Cloud Industry-specific cloud implementations Financial transaction handling Data Privacy Reserved Powers Not a complete listing, not intended as legal advice. 52
53 Integrating Cloud and Enterprise Security Management 2. Secure Service Integration Federated SSO All the usual SOA security capabilities must work Evolving preference for REST style Existing infrastructure Cloud Service integration Management integration Both arrows: VPN/VLAN (several options for endpoints) Popular: SSH admin login Threat management at the network and web-app level (firewall, IPS, DLP,...) Secure Virtualized Runtime Cloud-hosted services Cloud platform 3. Security Management Integration Efficient on-boarding/off-boarding of identities, roles and entitlements Provisioning/de-provisioning of resources with security constraints Interfaces for backup and recovery Identity (directory) and access management integration, through identity federation Monitoring and compliance reporting at the cloud level
54 Trust in Cloud Provider Subscriber perspective Secure Virtualized Runtime is the provider's responsibility (s ee Ch. 2) No direct control, hence provider must be trustworthy Very few technologies enable extension of control into the cloud Cryptography (encryption, integrity checks), to a certain extent TCG-style Trusted Computing (exists but rarely used) Research: homomorphic encryption Best practices, guidance/checklists and audits (see Ch. 1) play major role 54 Reputation Stated provider security policies Service-level agreements with regular audits and defined compensations Audits may be general (low-end, standardized) or client-specific (high-end, specialized) Cloud Security Alliance [CSA 09] IBM Cloud Security Guidance [Buecker 09]
55 References & Reading List 55 [BSI 09] SOA-Security-Kompendium: Sicherheit in Service-orientierten Architekturen (Version 2.0). Bundesamt für Sicherheit in der Informationstechnik, Bonn, [Buecker 07] Buecker, A., Ashley, P., Borrett, M., Lu, M., Muppidi, S. and Readshaw N. Understanding SOA Security Design and Implementation. IBM RedBook, New York, [Buecker 09] Buecker, A., Lodewijkx, K., Moss, H., Skapinetz, K., Waidner, M. Cloud Security Guidance. IBM Recommendations for the Implementation of Cloud Security. IBM RedPaper, New York, [Cloud 10] Cloud Computing Use Cases Discussion Group, Cloud Computing Use Cases White Paper Version Available from [CSA 09] Security Guidance for Critical Areas of Focus in Cloud Computing V2.1. Cloud Security Alliance, [ENISA 09] Cloud Computing: Benefits, Risks and Recommendations for Information Security. European Network and Information Security Agency (ENISA), [Wang 09] Wang, C. Cloud Computing Checklist: How Secure Is Your Cloud? Forrester Research, 2009.
56 Chapter 4 Cloud-delivered Security Services (Also known as Security-as-a-Service ) 56
57 Security as a Service Security Application as a Service Function Messaging / Security Now % 60% 70% Secure Web Gateway 10% 35% 65% Remote Vulnerability Scanning Security Information and Log Management Identity & Access Management Security Intelligence 10% 30% 45% 1% 10% 25% 2% 20% 28% 60% 80% 85% Source: Kelly Kavanagh, Gartner Research 57 Good candidates for security-asa-service are functions which Can be delivered without onpremises technology Latency-tolerant Require minimal customization Involves one-to-many data management or analysis functions Can be implemented though standard interfaces Unlike managed security services, not labor-intensive
58 58
59 Chapter 5 Areas for Research 59
60 Areas for Research 60 Coloring-based multi-tenancy is a simple concept, building it in reality is always painful Basic cloud and virtualization security Security criteria, SLAs, maturity model (easy in principle, but consensus building is difficult) Meaningful security metrics for cloud computing (this is hard) Standard approach for compliance monitoring for cloud computing (easy in principle) Security analysis, hardening and proof/evaluation of real-world hypervisor Hypervisor-based security services (additional platforms, more services) Security in emerging cloud computing programming languages Privacy and cloud computing (think: info sharing, user-created content, Web 2.0) Security for virtual machine images Embedding security policies and information into images Provenance of virtual images Reconsider proof-carrying code and other mobile agent security constructs
61 Areas for Research 61 Cryptography and cryptographic protocols Provably secure and practical fully homomorphic encryption Provably secure and practical, privacy preserving... Key management for public clouds Reconsider fault-tolerance and synchronization protocols under cloud computing assumptions Reconsider recovery oriented computing under cloud computing assumptions Reconsider TCG-style trusted computing under cloud assumptions Cloud-next Build a global-scale cloud capable of surviving massive failures and attacks
62 That's it. J. D. Illiad Frazer 62
Cloud Security 2011. Prof. Dr. Michael Waidner Fraunhofer SIT CASED. Fraunhofer SIT. Fraunhofer-Gesellschaft 2011
Fraunhofer-Gesellschaft 2011 Cloud Security 2011 Prof. Dr. Michael Waidner Fraunhofer SIT CASED 1 Fraunhofer SIT Security and Privacy»made in Darmstadt«Center for Advanced Security Research Darmstadt 170
Secure Cloud Computing
Fraunhofer-Gesellschaft 2011 Secure Cloud Computing Prof. Dr. Michael Waidner Center for Advanced Security Research Darmstadt (CASED): TU Darmstadt & Fraunhofer SIT CASED 1 Fraunhofer SIT Outline 1. Security
Cloud Security: The Grand Challenge
Dr. Paul Ashley IBM Software Group [email protected] Cloud Security: The Grand Challenge Outline Cloud computing: the pros, the cons, the blind spots Security in the cloud - what are the risks now and
Security and Cloud Computing
Security and Cloud Computing Martin Borrett, Lead Security Architect NE Europe, WW Service Management Tiger Team IBM Software Optimising the World s Infrastructure 27th May - London Agenda Brief Introduction
Cloud computing White paper November 2009. IBM Point of View: Security and Cloud Computing
White paper November 2009 IBM Point of View: Security and Cloud Computing Page 2 Table of Contents Introduction... 3 Address cloud security the grand challenge... 4 Evaluate different models of cloud computing...
Securing the Cloud through Comprehensive Identity Management Solution
Securing the Cloud through Comprehensive Identity Management Solution Millie Mak Senior IT Specialist What is Cloud Computing? A user experience and a business model Cloud computing is an emerging style
A Survey on Cloud Security Issues and Techniques
A Survey on Cloud Security Issues and Techniques Garima Gupta 1, P.R.Laxmi 2 and Shubhanjali Sharma 3 1 Department of Computer Engineering, Government Engineering College, Ajmer [email protected]
IBM Cloud Security Draft for Discussion September 12, 2011. 2011 IBM Corporation
IBM Cloud Security Draft for Discussion September 12, 2011 IBM Point of View: Cloud can be made secure for business As with most new technology paradigms, security concerns surrounding cloud computing
CIT 668: System Architecture
CIT 668: System Architecture Cloud Security Topics 1. The Same Old Security Problems 2. Virtualization Security 3. New Security Issues and Threat Model 4. Data Security 5. Amazon Cloud Security Data Loss
CLOUD SECURITY: THE GRAND CHALLENGE
Government Ware: GovWare Singapore September 29, 2010 CLOUD SECURITY: THE GRAND CHALLENGE Glen Gooding Asia Pacific Security Leader IBM Corporation [email protected] Rest safe: Google saves the day
IBM Security in the Cloud
Cesare Radaelli Security Tiger Team Leader, Italy IBM Security Solutions IBM Security in the Cloud What is cloud computing? Cloud is an emerging consumption and delivery model for many IT-based services,
How To Protect Your Cloud Computing Resources From Attack
Security Considerations for Cloud Computing Steve Ouzman Security Engineer AGENDA Introduction Brief Cloud Overview Security Considerations ServiceNow Security Overview Summary Cloud Computing Overview
Cloud Computing Governance & Security. Security Risks in the Cloud
Cloud Computing Governance & Security The top ten questions you have to ask Mike Small CEng, FBCS, CITP Fellow Analyst, KuppingerCole This Webinar is supported by Agenda What is the Problem? Ten Cloud
Security Officer s Checklist in a Sourcing Deal
Security Officer s Checklist in a Sourcing Deal Guide Share Europe Ostend, May 9th 2014 Johan Van Mengsel IBM Distinguished IT Specialist IBM Client Abstract Sourcing deals creates opportunities and challenges.
Security & Trust in the Cloud
Security & Trust in the Cloud Ray Trygstad Director of Information Technology, IIT School of Applied Technology Associate Director, Information Technology & Management Degree Programs Cloud Computing Primer
NETWORK ACCESS CONTROL AND CLOUD SECURITY. Tran Song Dat Phuc SeoulTech 2015
NETWORK ACCESS CONTROL AND CLOUD SECURITY Tran Song Dat Phuc SeoulTech 2015 Table of Contents Network Access Control (NAC) Network Access Enforcement Methods Extensible Authentication Protocol IEEE 802.1X
Cloud Security. DLT Solutions LLC June 2011. #DLTCloud
Cloud Security DLT Solutions LLC June 2011 Contact Information DLT Cloud Advisory Group 1-855-CLOUD01 (256-8301) [email protected] www.dlt.com/cloud Your Hosts Van Ristau Chief Technology Officer, DLT Solutions
HIPAA CRITICAL AREAS TECHNICAL SECURITY FOCUS FOR CLOUD DEPLOYMENT
HIPAA CRITICAL AREAS TECHNICAL SECURITY FOCUS FOR CLOUD DEPLOYMENT A Review List This paper was put together with Security in mind, ISO, and HIPAA, for guidance as you move into a cloud deployment Dr.
Security Issues in Cloud Computing
Security Issues in Computing CSCI 454/554 Computing w Definition based on NIST: A model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources
Secure Cloud Computing
Secure Cloud Computing Prof. Dr. Michael Waidner Technische Universität Darmstadt and Fraunhofer Institute for Secure Information Technology SIT, Darmstadt Darmstadt, 14 March 2015 Agenda Cybersecurity
How To Protect Your Cloud From Attack
A Trend Micro White Paper August 2015 Trend Micro Cloud Protection Security for Your Unique Cloud Infrastructure Contents Introduction...3 Private Cloud...4 VM-Level Security...4 Agentless Security to
Open Data Center Alliance Usage: Provider Assurance Rev. 1.1
sm Open Data Center Alliance Usage: Provider Assurance Rev. 1.1 Legal Notice This Open Data Center Alliance SM Usage:Provider Assurance is proprietary to the Open Data Center Alliance, Inc. NOTICE TO USERS
Security Overview Enterprise-Class Secure Mobile File Sharing
Security Overview Enterprise-Class Secure Mobile File Sharing Accellion, Inc. 1 Overview 3 End to End Security 4 File Sharing Security Features 5 Storage 7 Encryption 8 Audit Trail 9 Accellion Public Cloud
RE Think. IT & Business. Invent. IBM SmartCloud Security. Dr. Khaled Negm, SMIEEE, ACM Fellow IBM SW Global Competency Center Leader GCC
RE Think Invent IT & Business IBM SmartCloud Security Dr. Khaled Negm, SMIEEE, ACM Fellow IBM SW Global Competency Center Leader GCC 2014 IBM Corporation Some Business Questions Is Your Company is Secure
Security & Cloud Services IAN KAYNE
Security & Cloud Services IAN KAYNE CloudComponents CLOUD SERVICES Dynamically scalable infrastructure, services and software based on broad network accessibility NETWORK ACCESS INTERNAL ESTATE CloudComponents
CLOUD STORAGE SECURITY INTRODUCTION. Gordon Arnold, IBM
CLOUD STORAGE SECURITY INTRODUCTION Gordon Arnold, IBM SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and individual members may use this material
Data Protection: From PKI to Virtualization & Cloud
Data Protection: From PKI to Virtualization & Cloud Raymond Yeung CISSP, CISA Senior Regional Director, HK/TW, ASEAN & A/NZ SafeNet Inc. Agenda What is PKI? And Value? Traditional PKI Usage Cloud Security
Cloud Security:Threats & Mitgations
Cloud Security:Threats & Mitgations Vineet Mago Naresh Khalasi Vayana 1 What are we gonna talk about? What we need to know to get started Its your responsibility Threats and Remediations: Hacker v/s Developer
Cloud Security Who do you trust?
Thought Leadership White Paper Cloud Computing Cloud Security Who do you trust? Nick Coleman, IBM Cloud Security Leader Martin Borrett, IBM Lead Security Architect 2 Cloud Security Who do you trust? Cloud
Projectplace: A Secure Project Collaboration Solution
Solution brief Projectplace: A Secure Project Collaboration Solution The security of your information is as critical as your business is dynamic. That s why we built Projectplace on a foundation of the
Guideline on Implementing Cloud Identity and Access Management
CMSGu2013-05 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Guideline on Implementing Cloud Identity and Access Management National
White Paper How Noah Mobile uses Microsoft Azure Core Services
NoahMobile Documentation White Paper How Noah Mobile uses Microsoft Azure Core Services The Noah Mobile Cloud service is built for the Microsoft Azure platform. The solutions that are part of the Noah
Supplier Information Security Addendum for GE Restricted Data
Supplier Information Security Addendum for GE Restricted Data This Supplier Information Security Addendum lists the security controls that GE Suppliers are required to adopt when accessing, processing,
Cloud IaaS: Security Considerations
G00210095 Cloud IaaS: Security Considerations Published: 7 March 2011 Analyst(s): Lydia Leong, Neil MacDonald Ensuring adherence to your organization's security and compliance requirements is one of the
IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:
IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including: 1. IT Cost Containment 84 topics 2. Cloud Computing Readiness 225
Larry Wilson Version 1.0 November, 2013. University Cyber-security Program Critical Asset Mapping
Larry Wilson Version 1.0 November, 2013 University Cyber-security Program Critical Asset Mapping Part 3 - Cyber-Security Controls Mapping Cyber-security Controls mapped to Critical Asset Groups CSC Control
Mobile, Cloud, Advanced Threats: A Unified Approach to Security
Mobile, Cloud, Advanced Threats: A Unified Approach to Security David Druker, Ph.D. Senior Security Solution Architect IBM 1 Business Security for Business 2 Common Business Functions Manufacturing or
Architecting and Building a Secure and Compliant Virtual Infrastructure and Private Cloud
Architecting and Building a Secure and Compliant Virtual Infrastructure and Private Cloud Rob Randell, CISSP Principal Systems Engineer Security Specialist Agenda What is the Cloud? Virtualization Basics
Assessing Risks in the Cloud
Assessing Risks in the Cloud Jim Reavis Executive Director Cloud Security Alliance Agenda Definitions of Cloud & Cloud Usage Key Cloud Risks About CSA CSA Guidance approach to Addressing Risks Research
CS 356 Lecture 25 and 26 Operating System Security. Spring 2013
CS 356 Lecture 25 and 26 Operating System Security Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control
The Benefits of an Integrated Approach to Security in the Cloud
The Benefits of an Integrated Approach to Security in the Cloud Judith Hurwitz President and CEO Marcia Kaufman COO and Principal Analyst Daniel Kirsch Senior Analyst Sponsored by IBM Introduction The
Securing The Cloud. Foundational Best Practices For Securing Cloud Computing. Scott Clark. Insert presenter logo here on slide master
Securing The Cloud Foundational Best Practices For Securing Cloud Computing Scott Clark Agenda Introduction to Cloud Computing What is Different in the Cloud? CSA Guidance Additional Resources 2 What is
Tufts University. Department of Computer Science. COMP 116 Introduction to Computer Security Fall 2014 Final Project. Guocui Gao Guocui.gao@tufts.
Tufts University Department of Computer Science COMP 116 Introduction to Computer Security Fall 2014 Final Project Investigating Security Issues in Cloud Computing Guocui Gao [email protected] Mentor:
SECURE CLOUD COMPUTING
Outline SECURE CLOUD COMPUTING Introduction (of many buzz words) References What is Cloud Computing Cloud Computing Infrastructure Security Cloud Storage and Data Security Identity Management in the Cloud
Security as Architecture A fine grained multi-tiered containment strategy
1 Security as Architecture A fine grained multi-tiered containment strategy Andras R. Szakal IBM Distinguished Engineer Chief Software Architect, U.S. Federal SWG [email protected] 2 Objectives Cybersecurity
Security Considerations for Virtual Platform Provisioning
Security Considerations for Virtual Platform Provisioning Mudassar Aslam, Christian Gehrmann Swedish Institute of Computer Science (SICS) Isafjordsgatan 22, SE-164 29 Kista, Sweden {mudassar.aslam, chrisg}@sics.se
Integrating Single Sign-on Across the Cloud By David Strom
Integrating Single Sign-on Across the Cloud By David Strom TABLE OF CONTENTS Introduction 1 Access Control: Web and SSO Gateways 2 Web Gateway Key Features 2 SSO Key Features 3 Conclusion 5 Author Bio
Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006
Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 April 2013 Hologic and the Hologic Logo are trademarks or registered trademarks of Hologic, Inc. Microsoft, Active Directory,
Splunk Enterprise Log Management Role Supporting the ISO 27002 Framework EXECUTIVE BRIEF
Splunk Enterprise Log Management Role Supporting the ISO 27002 Framework EXECUTIVE BRIEF Businesses around the world have adopted the information security standard ISO 27002 as part of their overall risk
PCI COMPLIANCE ON AWS: HOW TREND MICRO CAN HELP
solution brief PCI COMPLIANCE ON AWS: HOW TREND MICRO CAN HELP AWS AND PCI DSS COMPLIANCE To ensure an end-to-end secure computing environment, Amazon Web Services (AWS) employs a shared security responsibility
How does IBM deliver cloud security? An IBM paper covering SmartCloud Services 1
How does IBM deliver cloud security? An IBM paper covering SmartCloud Services 1 2 How does IBM deliver cloud security? Contents 2 Introduction 3 Cloud governance 3 Security governance, risk management
Security and Cloud Compunting - Security impacts, best practices and solutions -
Security and Cloud Compunting - Security impacts, best practices and solutions - Andrea Carmignani Senior IT Architect What is Cloud Security It s about business and data behind it The ability to maintain
How to ensure control and security when moving to SaaS/cloud applications
How to ensure control and security when moving to SaaS/cloud applications Stéphane Hurtaud Partner Information & Technology Risk Deloitte Laurent de la Vaissière Directeur Information & Technology Risk
3rd Party Assurance & Information Governance 2014-2016 outlook IIA Ireland Annual Conference 2014. Straightforward Security and Compliance
3rd Party Assurance & Information Governance 2014-2016 outlook IIA Ireland Annual Conference 2014 Continuous Education Services (elearning/workshops) Compliance Management Portals Information Security
D. L. Corbet & Assoc., LLC
Demystifying the Cloud OR Cloudy with a Chance of Data D. L. Corbet & Assoc., LLC [email protected] Why 'The Cloud' Common Clouds Considerations and Risk Why 'The Cloud' Distributed Very Large / Very
Securing the Cloud with IBM Security Systems. IBM Security Systems. 2012 IBM Corporation. 2012 2012 IBM IBM Corporation Corporation
Securing the Cloud with IBM Security Systems 1 2012 2012 IBM IBM Corporation Corporation IBM Point of View: Cloud can be made secure for business As with most new technology paradigms, security concerns
Data Storage Security, Cloud Computing and Virtualization
Data Storage Security, Cloud Computing and Virtualization What You Think You Know Can Hurt You 1 The 8 Fallacies of Distributed Computing 1. The network is reliable 2. Latency is zero 3. Bandwidth is infinite
The Production Cloud
The Production Cloud The cloud is not just for backup storage, development projects and other low-risk applications. In this document, we look at the characteristics of a public cloud environment that
Cloud Security considerations for business adoption. Ricci IEONG CSA-HK&M Chapter
Cloud Security considerations for business adoption Ricci IEONG CSA-HK&M Chapter What is Cloud Computing? Slide 2 What is Cloud Computing? My Cloud @ Internet Pogoplug What is Cloud Computing? Compute
PICO Compliance Audit - A Quick Guide to Virtualization
WHITE PAPER August 2011 Passing Compliance Audit: Virtualize PCI-compliant Workloads with the Help of HyTrust and Trend Micro Deep Security HYTRUST AND TREND MICRO DEEP SECURITY TOC Contents Virtualization
Security Virtual Infrastructure - Cloud
Security Virtual Infrastructure - Cloud Your Name Ramkumar Mohan Head IT & CISO Orbis Financial Corporation Ltd Agenda Cloud Brief Introduction State of Cloud Cloud Challenges Private Cloud Journey to
Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data
Kenna Platform Security A technical overview of the comprehensive security measures Kenna uses to protect your data V2.0, JULY 2015 Multiple Layers of Protection Overview Password Salted-Hash Thank you
Secure Clouds - Secure Services Trend Micro best-in-class solutions enable data center to deliver trusted and secure infrastructures and services
Secure Clouds - Secure Services Trend Micro best-in-class solutions enable data center to deliver trusted and secure infrastructures and services Udo Schneider Trend Micro [email protected] 26.03.2013
Mitigating Information Security Risks of Virtualization Technologies
Mitigating Information Security Risks of Virtualization Technologies Toon-Chwee, Wee VMWare (Hong Kong) 2009 VMware Inc. All rights reserved Agenda Virtualization Overview Key Components of Secure Virtualization
PCI Requirements Coverage Summary Table
StillSecure PCI Complete Managed PCI Compliance Solution PCI Requirements Coverage Summary Table January 2013 Table of Contents Introduction... 2 Coverage assumptions for PCI Complete deployments... 2
CloudDesk - Security in the Cloud INFORMATION
CloudDesk - Security in the Cloud INFORMATION INFORMATION CloudDesk SECURITY IN THE CLOUD 3 GOVERNANCE AND INFORMATION SECURITY 3 DATA CENTRES 3 DATA RESILIENCE 3 DATA BACKUP 4 ELECTRONIC ACCESS TO SERVICES
STORAGE SECURITY TUTORIAL With a focus on Cloud Storage. Gordon Arnold, IBM
STORAGE SECURITY TUTORIAL With a focus on Cloud Storage Gordon Arnold, IBM SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and individual members
Cloud Security. Let s Open the Box. Abu Shohel Ahmed [email protected] NomadicLab, Ericsson Research
t Cloud Security Let s Open the Box t Abu Shohel Ahmed [email protected] NomadicLab, Ericsson Research Facts about Ericsson Ericsson is a world-leading provider of telecommunication equipment and
A Decision Maker s Guide to Securing an IT Infrastructure
A Decision Maker s Guide to Securing an IT Infrastructure A Rackspace White Paper Spring 2010 Summary With so many malicious attacks taking place now, securing an IT infrastructure is vital. The purpose
Brainloop Cloud Security
Whitepaper Brainloop Cloud Security Guide to secure collaboration in the cloud www.brainloop.com Sharing information over the internet The internet is the ideal platform for sharing data globally and communicating
ProtectV. Securing Sensitive Data in Virtual and Cloud Environments. Executive Summary
VISIBILITY DATA GOVERNANCE SYSTEM OS PARTITION UNIFIED MANAGEMENT CENTRAL AUDIT POINT ACCESS MONITORING ENCRYPTION STORAGE VOLUME POLICY ENFORCEMENT ProtectV SECURITY SNAPSHOT (backup) DATA PROTECTION
CAST CENTER FOR ADVANCED SECURITY TRAINING. CAST618 Designing and Implementing Cloud Security CAST
CENTER FOR ADVANCED SECURITY TRAINING 618 Designing and Implementing Cloud Security About EC-Council Center of Advanced Security Training () The rapidly evolving information security landscape now requires
Cloud Security. Peter Jopling [email protected] IBM UK Ltd Software Group Hursley Labs. peterjopling. 2011 IBM Corporation
Cloud Security Peter Jopling [email protected] IBM UK Ltd Software Group Hursley Labs peterjopling 2011 IBM Corporation Cloud computing impacts the implementation of security in fundamentally new ways
Network Access Control and Cloud Security
Network Access Control and Cloud Security Overview Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 [email protected] Audio/Video recordings of this lecture are available at: http://www.cse.wustl.edu/~jain/cse571-14/
Top 10 Cloud Risks That Will Keep You Awake at Night
Top 10 Cloud Risks That Will Keep You Awake at Night Shankar Babu Chebrolu Ph.D., Vinay Bansal, Pankaj Telang Photo Source flickr.com .. Amazon EC2 (Cloud) to host Eng. Lab testing. We want to use SalesForce.com
Sygate Secure Enterprise and Alcatel
Sygate Secure Enterprise and Alcatel Sygate Secure Enterprise eliminates the damage or loss of information, cost of recovery, and regulatory violation due to rogue corporate computers, applications, and
Netzwerkvirtualisierung? Aber mit Sicherheit!
Netzwerkvirtualisierung? Aber mit Sicherheit! Markus Schönberger Advisory Technology Consultant Trend Micro Stephan Bohnengel Sr. Network Virtualization SE VMware Agenda Background and Basic Introduction
INCIDENT RESPONSE CHECKLIST
INCIDENT RESPONSE CHECKLIST The purpose of this checklist is to provide clients of Kivu Consulting, Inc. with guidance in the initial stages of an actual or possible data breach. Clients are encouraged
Security Issues in Cloud Computing
Security Issues in Cloud Computing Dr. A. Askarunisa Professor and Head Vickram College of Engineering, Madurai, Tamilnadu, India N.Ganesh Sr.Lecturer Vickram College of Engineering, Madurai, Tamilnadu,
Did you know your security solution can help with PCI compliance too?
Did you know your security solution can help with PCI compliance too? High-profile data losses have led to increasingly complex and evolving regulations. Any organization or retailer that accepts payment
How to Achieve Operational Assurance in Your Private Cloud
How to Achieve Operational Assurance in Your Private Cloud As enterprises implement private cloud and next-generation data centers to achieve cost efficiencies and support business agility, operational
Journey to the Private Cloud. Key Enabling Technologies
Journey to the Private Cloud Key Enabling Technologies Jeffrey Nick Chief Technology Officer Senior Vice President EMC Corporation June 2010 1 The current I/T state: Infrastructure sprawl Information explosion
SMS. Cloud Computing. Systems Management Specialists. Grupo SMS www.grupo-sms.com 949.223.9240 option 3 for sales
SMS Systems Management Specialists Cloud Computing Grupo SMS www.grupo-sms.com 949.223.9240 option 3 for sales Cloud Computing The SMS Model: Cloud computing is a model for enabling ubiquitous, convenient,
Residual risk. 3 Compliance challenges (i.e. right to examine, exit clause, privacy acy etc.)
Organizational risks 1 Lock-in Risk of not being able to migrate easily from one provider to another 2 Loss of Governance Control and influence on the cloud providers, and conflicts between customer hardening
Security and Cloud Computing
Security and Cloud Computing Michael Waidner TU Darmstadt/FB Informatik, Chair Professor Security in IT Fraunhofer Institute for Secure IT, Director CASED 1 Fraunhofer SIT Objectives of this Lecture Get
Addressing Cloud Computing Security Considerations
Addressing Cloud Computing Security Considerations with Microsoft Office 365 Protect more Contents 2 Introduction 3 Key Security Considerations 4 Office 365 Service Stack 5 ISO Certifications for the Microsoft
SANS Top 20 Critical Controls for Effective Cyber Defense
WHITEPAPER SANS Top 20 Critical Controls for Cyber Defense SANS Top 20 Critical Controls for Effective Cyber Defense JANUARY 2014 SANS Top 20 Critical Controls for Effective Cyber Defense Summary In a
Securing Data in the Virtual Data Center and Cloud: Requirements for Effective Encryption
THE DATA PROTECTIO TIO N COMPANY Securing Data in the Virtual Data Center and Cloud: Requirements for Effective Encryption whitepaper Executive Summary Long an important security measure, encryption has
