White paper. The Role of Security in Trustworthy Cloud Computing
|
|
|
- Cecil Rodgers
- 10 years ago
- Views:
Transcription
1 White paper The Role of Security in Trustworthy Cloud Computing
2 What are the security implications of cloud computing? Enthusiasm for cloud computing has as much to do with economics as technology. Growth in the number of applications and the volume of data that must be managed have made data centers a major item of corporate expense, with no end in sight. Public cloud computing looks like a way to get a handle on some of these costs. The concept of cloud computing is straightforward: you replace capital-intensive IT assets that must be internally managed with rented pay-as-you-go IT capacity and services at commoditized prices. These services are built with new technologies such as virtualization and service-oriented architectures and leverage the Internet to reduce the cost of IT hardware and software resources for computing, networking and storage. At the same time, enterprises are using the same concepts and technologies to build out private clouds to capitalize on centralized, commoditized IT services that meet their security needs. Today, both public and private cloud deployments must embody an appropriate set of core security principles and thereby assure users and customers of a trustworthy cloud computing environment. Contents I. Overview page 1 II. Public Cloud Computing: Scalability and Multi-tenancy page 2 III. The Challenges of the Cloud: Security is the Big Question Mark page 3 Changing relationships page 3 Standards page 3 Portability between public clouds page 4 Confidentiality and privacy page 4 Viable access controls page 4 Compliance page 4 Security service levels page 5 IV. Principles for Securing the Cloud: Secure Identity, Information, Infrastructure page 5 Identity security page 5 Information security page 6 Infrastructure security page 7 V. Conclusion page 8
3 I. Overview At this early stage in the development of public clouds, the offerings are a mix of commodity consumer and mainstream enterprise applications that deal with relatively nonsensitive data such as , instant-messaging services and Web-based shared spaces and those that handle more sensitive data like Salesforce.com and EMC s Mozy. But if cloud computing is going to meet enterprise needs for confidentiality of customer data and compliance with legal directives, it will have to provide increased levels of security to support more sensitive enterprise applications. Public cloud computing also introduces new stakeholders into the security equation third party service providers, infrastructure vendors and contractors and loosens the control that IT has on each of these three areas. Public cloud computing introduces new stakeholders into the security equation and loosens IT's control. If cloud computing is to succeed as an alternative to the corporate data center, IT departments will require relationships with cloud providers that allow them to trust cloud services and verify events in the cloud. It will have to effectively support a high level of security, similar to current control-centered models, and be implemented in a way that allows enterprises to develop confidence in extending portions of their own data centers into a public cloud. Expanding Digital Universe Digital Security Ecosystem Information Growth IT Challenges Security Responsibility Data Centers Data Private Clouds Individuals Cloud Security Enterprises Paradigm Shifts Public Clouds Trustable Supply Chain Employees Enterprise IT Vendors Service Providers Customers RSA White Paper 1
4 Essential Cloud Capabilities Security Levels Selected Least Most Flexible Services SAAS PAAS IAAS II. Public Cloud Computing: Scalability and Multi-tenancy Public cloud computing describes a computing architecture that extends the service-oriented approach (exemplified in such concepts as "utility computing," "service-oriented architectures" and "software as a service") into a marketplace model. Providers offer services that "run in the cloud" as they are accessible using Internet Protocol and are location independent, meaning that users have no need to know where the underlying IT resources exist. Cloud services have two hallmarks: They are scalable (the required resources of storage and computing power can be increased or decreased based on customers' needs), and they are multi-tenant (they provide simultaneous, secure hosting of services for various customers utilizing the same cloud infrastructure resources). Today s cloud computing comprises three types of services: Software as a service (SaaS). An application is hosted as a service provided to customers. Examples include Salesforce.com's Web-based CRM application and Gmail and Google Docs from Google. Infrastructure as a service (IaaS). Facilities Scalability commonly provided locally, by a desktop computer or a data center, are offered as remote resources so that a customer can Multi-tenancy define and manage computational or storage tasks. Examples include EMC's Atmos policy-based storage services and Amazon's Elastic Compute Cloud ("EC2") for computing services. But before cloud computing can live up to its promise for the enterprise, it needs further refinement, especially in the area of security. To date, most of the public cloud-oriented applications have been consumer-centered applications built on commoditized data storage and transaction processing. At this initial stage, the applications and data being processed in clouds are predominantly non-sensitive, and the cloud services offer minimal or only generally available security. The cloud offerings themselves are proprietary computing islands, with few standards and only limited possibilities for interoperability. Trends in information growth will only make the problem more pressing for enterprises. In the IDC study, "The Expanding Digital Universe, the "explosive growth in the volume of sensitive information being created is examined; the rate at which data is created and stored will grow by a factor of six by The study notes that while individuals will create most digital information, corporations will be responsible for the security, privacy, reliability, and compliance of at least 85 percent of the rapidly expanding digital universe. It is clear that public cloud computing must become more secure if it is to become more accepted by the enterprise. With this progression, trust and verification will again be the key security enablers. Enterprises will need to assure the confidentiality, integrity and availability of their data as it is transmitted, stored or processed by third parties in the cloud services chain. Platform as a service (PaaS). The combination of software and infrastructure services with application development tools so that Web applications and services can be built and hosted. Examples include Google AppEngine and Salesforce.com s AppExchange. 2 RSA White Paper
5 Before enterprises can make more innovative use of clouds, security technologies, standards, and interoperability must be improved. III. The Challenges of the Cloud: Security is the Big Question Mark Taking advantage of cloud computing means major changes for enterprise IT organizations. The biggest will be reduced control even as they are being tasked to bear increased responsibility for the confidentiality and compliance of computing practices in the enterprise. This makes security a major issue as IT departments look at cloud services and providers. Changing relationships A key issue for cloud computing is that aspects of traditional infrastructure security move beyond an organization s control and into the cloud. This will lead to fundamental changes in the number and roles of security stakeholders as enterprises turn over control of security infrastructure and processes to outside contractors. Trust relationships between the various cloud stakeholders (users, corporations, networks, service providers, etc.) need careful consideration as public cloud computing evolves to manage sensitive enterprise data. Conventional data centers have based security on fortresslike structures that protect the data within secure physical, hardware, and software infrastructures: their security rests primarily on controlling access by users and maintainers of the data and infrastructure. In cloud computing, a data center still exists somewhere but who controls it? Cloud computing diffuses many of the traditional corporate security boundaries and substitutes transient chains of custody for the data, with major implications for security and trust for sensitive enterprise data and applications. The sharing of control raises many questions of responsibility. How will you know which employees of your cloud provider have access to what information and applications? That access needs to be fine-grained with only a selected and controllable few having broad access. Standards Before sensitive and regulated data move into the public cloud, issues of security standards and compatibility must be addressed including strong authentication, delegated authorization, key management for encrypted data, data loss protections, and regulatory reporting. How will these requirements be met across individual cloud infrastructures and across multiple clouds chosen by the consumer as best practices? Existing cloud service providers may become the de facto models around which security and federation of authorization controls might emerge. Or answers may come from work currently being conducted by various agencies to questions such as which existing standards could be applied to cloud computing, what gaps exist, and what new standards need to be developed. Cloud Security Challenges Cloud Security SLAs Performance Risk Management Design, Deployability Governance RSA White Paper 3
6 Portability between public clouds While cloud computing conveys a promise of open architecture and easy integration, the early cloud offerings have tended to create security "silos" users need an Amazon account to use Amazon's EC2 service and a Google account to access AppEngine applications. Enterprises will require information and identity portability between varying clouds so that they can mix and match their services in an open, standards-based environment that permits interoperability. Portability will become a major issue as more complex services get delivered by multiple cloud infrastructures. Imagine, for instance, that you want to rent a massive amount of CPU power from Amazon for a few days to do a deep analysis of your customer data using a custom-built analytical tool but the data resides in Salesforce.com. Clouds will have to talk to each other securely. Confidentiality and privacy Business units are already tasking IT departments to protect their data in the private and public clouds, with the expectation that sensitive information will either be desensitized or deployed with verifiable access authorization to protect its privacy and confidentiality. IT organizations have historically not developed the capability to effectively identify and classify users and sensitive data. Without this ability, they will face hurdles in extending security functionalities to cloud environments. How will your cloud provider ensure confidentiality and privacy? Recently, one cellular provider was embarrassed, for example, when its employees viewed Barack Obama's past phone records. How will such incidents be prevented? How will you protect against insider threats, like an employee of the cloud provider walking off with sensitive enterprise information? Cloud providers will have to address this fundamental responsibility. Viable access controls Information governance requirements will need to be balanced with the users' desire for efficient yet robust access control. Users and corporations will expect transparency and convenience of access. For many clouds such as those delivering popular services to the general public, a token-based approach may not be tolerated by the users. Another major pain point is the lack of delegated authorization. While some cloud services provide for delegated strong authentication (e.g., Salesforce.com) that enables access control based on user identity, few, if any, provide delegated authorization to enable access control based on the content of the information itself. This capability is turning out to be increasingly important given the advent of Web 2.0 where fine-grained entitlements for authorization management and control will be most essential. Compliance Many business units are being drawn into using cloud services by the attractive economics, bypassing IT departments to host their applications and data in the cloud directly. This creates several problems for the IT organizations with reduced internal and external control. The business units' activities multiply the IT department's compliance challenges even while legal and compliance departments are expecting the IT departments to be able to report on and demonstrate control over sensitive information. Additionally, a cloud provider s SAS-70 compliance must be carefully assessed by each enterprise customer to see if the certification meets the compliance policy established by their own enterprise. 4 RSA White Paper
7 Reporting will be a key requirement for any cloud environment where personally identifiable information (PII) and other sensitive or regulated data live. Who will be accountable for ensuring compliance is met you or your cloud provider? Will you have access to log data from the cloud environment where your company's information lives so you can correlate it with events in other systems? What if someone steals data from your cloud-based system in an attempt to break into systems in your company's internally managed data center? Principal Elements for Securing the Cloud Identities Cloud Security Infrastructure Information How do those events get correlated? Who is accountable if there's a breach of PII? Will you even know where your information is physically located? These questions could potentially create an issue for compliance with international regulations. Security service levels As all types of data will end up in the clouds from highvalue data to bulk and non-sensitive data there will be an increasing need for varying security service levels that match the sensitivity of different types of data. The real challenge will be mapping security levels to information or business processes so that they can be transferred to the cloud at the lowest possible cost, but the highest necessary level of security. Varying security service levels will be required to match the sensitivity of different types of data. IV. Principles for Securing the Cloud: Secure Identity, Information, Infrastructure Public cloud computing requires a security model that reconciles scalability and multi-tenancy with the need for trust. As enterprises move their computing environments with their identities, information and infrastructure to the cloud, they must be willing to give up some level of control. To do that, they must be able to trust cloud systems and providers, and verify cloud processes and events. Important building blocks of trust and verification relationships include access control, data security, compliance and event management all security elements well understood by IT departments today, implemented with existing products and technologies, and extendable into the cloud. Identity security End-to-end identity management, third-party authentication services, and federated identity will become a key element of cloud security. Identity security preserves the integrity and confidentiality of data and applications while making access readily available to appropriate users. Support for these identity management capabilities for both users and infrastructure components will be a major requirement for cloud computing, and identity will have to be managed in ways that build trust. It will require: RSA White Paper 5
8 Strong authentication: Cloud computing must move beyond weak username-and-password authentication if it is going to support the enterprise. This will mean adopting techniques and technologies that are already standard in enterprise IT such as strong authentication (multi-factor authentication with one-time password technology), federation within and across enterprises, and risk-based authentication that measures behavior history, current context and other factors to assess the risk level of a user request. Additional tiering of authentication will be essential to meet security SLAs, and utilizing a risk-based authentication model that is largely transparent to the users will actually reduce the need for broader federation of access controls. More granular authorization: Authorization can be coarse-grained within an enterprise or even a private cloud, but in order to handle sensitive data and compliance requirements, public clouds will need granular authorization capabilities (such as role-based controls and IRM) that can be persistent throughout the cloud infrastructure and the data s lifecycle. Sensitive data in the cloud will require granular security, maintained consistently throughout the data lifecycle. Information security In the traditional data center, controls on physical access, access to hardware and software and identity controls all combine to protect the data. In the cloud, that protective barrier that secures infrastructure is diffused. To compensate, security will have to become informationcentric. The data needs its own security that travels with it and protects it. It will require: Data isolation: In multi-tenancy situations, data must be held securely in order to protect it when multiple customers use shared resources. Virtualization, encryption and access control will be workhorses for enabling varying degrees of separation between corporations, communities of interest and users. In the near future, data isolation will be more important and executable for IAAS, than perhaps for PAAS and SAAS. More granular data security: As the sensitivity of information increases, the granularity of data classification enforcement must increase. In current data center environments, granularity of role-based access control at the level of user groups or business units is acceptable in most cases because the information remains within the control of the enterprise itself. For information in the cloud, sensitive data will require security at the file, field, or even block level to meet the demands of assurance and compliance. Consistent data security: There will be an obvious need for policy-based content protection to meet the enterprise's own needs as well as regulatory policy mandates. For some categories of data, informationcentric security will necessitate encryption in transit and at rest, as well as management across the cloud and throughout the data lifecycle. 6 RSA White Paper
9 Effective data classification: Cloud computing imposes a resource trade-off between high performance and the requirements of increasingly robust security. Data classification is an essential tool for balancing that equation. Enterprises will need to know what data is important and where it is located as prerequisites to making performance cost/benefit decisions, as well as ensuring focus on the most critical areas for data loss prevention procedures. Information rights management: IRM is often treated as a component of identity, a way of setting broad-brush controls on which users have access to which data. But more granular data-centric security requires that policies and control mechanisms on the storage and use of information be associated directly with the information itself. Governance and compliance: A key requirement of corporate information governance and compliance is the creation of management and validation information monitoring and auditing the security state of the information with logging capabilities. Here, not only is it important to document access and denials to data, but to ensure that IT systems are configured to meet security specifications and have not been altered. Expanding retention policies for data policy compliance will also become an essential cloud capability. In essence, cloud computing infrastructures must be able to verify that data is being managed per the applicable local and international regulations (such as PCI and HIPAA) with appropriate controls, log collection and reporting. Sensitive data in the cloud will require granular security, maintained consistently throughout the data lifecycle. The foundational infrastructure for a cloud must be inherently secure whether it is a private or public cloud or whether the service is SAAS, PAAS or IAAS. Infrastructure security The foundational infrastructure for a cloud must be inherently secure whether it is a private or public cloud or whether the service is SAAS, PAAS or IAAS. It will require: Inherent component-level security: The cloud needs to be architected to be secure, built with inherently secure components, deployed and provisioned securely with strong interfaces to other components, and, finally, supported securely, with vulnerability-assessment and change-management processes that produce management information and service-level assurances that build trust. For these flexibly deployed components, device fingerprinting to ensure secure configuration and state will also be an important security element, just as it is for the data and identities themselves. More granular interface security: The points in the system where hand-offs occur user-to-network, server-toapplication require granular security policies and controls that ensure consistency and accountability. Here, either the end-to-end system needs to be proprietary, a de facto standard, or a federation of vendors offering consistently deployed security policies. Resource lifecycle management: The economics of cloud computing are based on multi-tenancy and the sharing of resources. As a customer's needs and requirements change, a service provider must provision and decommission those resources bandwidth, servers, storage, and security accordingly. This lifecycle process must be managed for accountability in order to build trust. RSA White Paper 7
10 V. Conclusion Cloud computing promises to change the economics of the data center, but before sensitive and regulated data move into the public cloud, issues of security standards and compatibility must be addressed including strong authentication, delegated authorization, key management for encrypted data, data loss protections, and regulatory reporting. All are elements of a secure identity, information and infrastructure model, and are applicable to private and public clouds as well as to IAAS, PAAS and SAAS services. In the development of public and private clouds, enterprises and service providers will need to use these guiding principles to selectively adopt and extend security tools and secure products to build and offer end-to-end trustworthy cloud computing and services. Fortunately, many of these security solutions are largely available today and are being developed further to undertake increasingly seamless cloud functionalities. Employees Enterprise IT Vendors Service Providers Customers Identities Infrastructure Information IAAS PAAS SAAS Building a Trustworthy Cloud 8 RSA White Paper
11 EMC, RSA and Secure Cloud Computing Identity, Information and Infrastructure Security To manage identity in the cloud, RSA leverages its strong authentication capabilities, multi-factor authentication, one-time passwords, federated identity management and risk-based authentication solutions such as Authentication Manager, Federated Identity Manager, Access Manager and Adaptive Authentication. RSA s Transaction Monitoring system goes beyond assuring the identity of users logging in by authenticating the transactions they perform to boost online security, reduce fraud and mitigate the risks of advanced threats, based strongly on the RSA efraudnetwork service a cross-institution, collaborative online fraud network dedicated to sharing and disseminating information on fraudulent activity. To manage context aware authorization with fine grained entitlements and authorization administration based on intelligent central policy management, RSA Entitlements Policy Manager protects resources even beyond web applications. For information security in the cloud, EMC Information Rights Manager offers content-aware authorization for documents, while RSA Data Loss Prevention Suite offers content-aware discovery, classification and data loss prevention solutions. Together these products offer private and public clouds the ability to deploy consistent content-aware security policies for data governance, control and compliance. Additionally, RSA Key Manager enables encryption capabilities in the cloud for data protection and control. Finally, for infrastructure security, EMC s broad portfolio of products not only offer secure foundations for virtualization, data separation and data protection and availability capabilities, but in addition, EMC s products are also built, deployed and supported securely to give the cloud infrastructures further security assurance. EMC s infrastructure resources management products combined with the RSA envision log management and analysis product enables effective management and control of infrastructure components with health check, configuration management, event management and control functionalities all important for optimizing cloud operations and meeting compliance requirements. EMC and RSA are increasingly working to develop solutions for cloud security that are being designed from a Security SOA perspective to support the flexible security levels required by emerging cloud models. Secure SaaS, PaaS, IaaS EMC and RSA also deliver products and services to the cloud computing marketplace. A few examples include: RSA's Security-as-a-Service (SaaS) model to federate the security controls in SaaS and PaaS environments with access control and authentication services that have been available since 2002; RSA Key Manager can take over management of data security controls (encryption keys) from SaaS/ PaaS administrators and maintain control with the data owners or customer corporations; EMC s Atmos is a Storage-as-a-Service provider for the IaaS model with policies on information storage distribution performance and security. RSA White Paper 9
12 Author, Contributors Satchit Dokras, Bret Hartman, Tim Mathers, Brian Fitzgerald, Sam Curry, Magnus Nystrom, Eric Baize, Nirav Mehta About RSA RSA, The Security Division of EMC, is the expert in information-centric security, enabling the protection of information throughout its lifecycle. RSA enables customers to cost-effectively secure critical information assets and online identities wherever they live and at every step of the way, and manage security information and events to ease the burden of compliance. RSA offers industry-leading solutions in identity assurance & access control, encryption & key management, compliance & security information management and fraud protection. These solutions bring trust to millions of user identities, the transactions that they perform, and the data that is generated. For more information, please visit and RSA, envision, efraudnetwork and RSA Security are registered trademarks or trademarks of RSA Security Inc. in the United States and/or other countries. EMC, Mozy and Atmos are registered trademarks or trademarks of EMC Corporation. All other products or services mentioned are trademarks of their respective owners RSA Security Inc. All rights reserved. CLOUD WP RSA White Paper
Cloud Infrastructure Security
Cloud Infrastructure Security Dimiter Velev 1 and Plamena Zlateva 2 1 University of National and World Economy, UNSS - Studentski grad, 1700 Sofia, Bulgaria [email protected] 2 Institute of Control and
White paper. Four Best Practices for Secure Web Access
White paper Four Best Practices for Secure Web Access What can be done to protect web access? The Web has created a wealth of new opportunities enabling organizations to reduce costs, increase efficiency
FIVE KEY CONSIDERATIONS FOR ENABLING PRIVACY IN HEALTH INFORMATION EXCHANGES
FIVE KEY CONSIDERATIONS FOR ENABLING PRIVACY IN HEALTH INFORMATION EXCHANGES The implications for privacy and security in the emergence of HIEs The emergence of health information exchanges (HIE) is widely
Architectural Implications of Cloud Computing
Architectural Implications of Cloud Computing Grace Lewis Research, Technology and Systems Solutions (RTSS) Program Lewis is a senior member of the technical staff at the SEI in the Research, Technology,
How to Provide Secure Single Sign-On and Identity-Based Access Control for Cloud Applications
SOLUTION BRIEF: PROTECTING ACCESS TO THE CLOUD........................................ How to Provide Secure Single Sign-On and Identity-Based Access Control for Cloud Applications Who should read this
Securing The Cloud With Confidence. Opinion Piece
Securing The Cloud With Confidence Opinion Piece 1 Securing the cloud with confidence Contents Introduction 03 Don t outsource what you don t understand 03 Steps towards control 04 Due diligence 04 F-discovery
Security Considerations for Public Mobile Cloud Computing
Security Considerations for Public Mobile Cloud Computing Ronnie D. Caytiles 1 and Sunguk Lee 2* 1 Society of Science and Engineering Research Support, Korea [email protected] 2 Research Institute of
TECHNOLOGY PARTNER CERTIFICATION BENEFITS AND PROCESS
TECHNOLOGY PARTNER CERTIFICATION BENEFITS AND PROCESS BUSINESS BENEFITS Use of the Certified Partner seal and the Secured by RSA brand on product packaging and advertising Exposure in the Secured by RSA
OWASP Chapter Meeting June 2010. Presented by: Brayton Rider, SecureState Chief Architect
OWASP Chapter Meeting June 2010 Presented by: Brayton Rider, SecureState Chief Architect Agenda What is Cloud Computing? Cloud Service Models Cloud Deployment Models Cloud Computing Security Security Cloud
THE BLUENOSE SECURITY FRAMEWORK
THE BLUENOSE SECURITY FRAMEWORK Bluenose Analytics, Inc. All rights reserved TABLE OF CONTENTS Bluenose Analytics, Inc. Security Whitepaper ISO 27001/27002 / 1 The Four Pillars of Our Security Program
Virginia Government Finance Officers Association Spring Conference May 28, 2014. Cloud Security 101
Virginia Government Finance Officers Association Spring Conference May 28, 2014 Cloud Security 101 Presenters: John Montoro, RealTime Accounting Solutions Ted Brown, Network Alliance Presenters John Montoro
Enterprise Data Protection
PGP White Paper June 2007 Enterprise Data Protection Version 1.0 PGP White Paper Enterprise Data Protection 2 Table of Contents EXECUTIVE SUMMARY...3 PROTECTING DATA EVERYWHERE IT GOES...4 THE EVOLUTION
White Paper on CLOUD COMPUTING
White Paper on CLOUD COMPUTING INDEX 1. Introduction 2. Features of Cloud Computing 3. Benefits of Cloud computing 4. Service models of Cloud Computing 5. Deployment models of Cloud Computing 6. Examples
Cloud-Security: Show-Stopper or Enabling Technology?
Cloud-Security: Show-Stopper or Enabling Technology? Fraunhofer Institute for Secure Information Technology (SIT) Technische Universität München Open Grid Forum, 16.3,. 2010, Munich Overview 1. Cloud Characteristics
RSA Solution Brief. RSA envision. Platform. Compliance and Security Information Management. RSA Solution Brief
RSA Solution Brief RSA envision Compliance and Security Information Management Platform RSA Solution Brief Actionable Compliance and Security Intelligence RSA envision technology is an information management
Bringing the Cloud into Focus. A Whitepaper by CMIT Solutions and Cadence Management Advisors
Bringing the Cloud into Focus A Whitepaper by CMIT Solutions and Cadence Management Advisors Table Of Contents Introduction: What is The Cloud?.............................. 1 The Cloud Benefits.......................................
with Managing RSA the Lifecycle of Key Manager RSA Streamlining Security Operations Data Loss Prevention Solutions RSA Solution Brief
RSA Solution Brief Streamlining Security Operations with Managing RSA the Lifecycle of Data Loss Prevention and Encryption RSA envision Keys with Solutions RSA Key Manager RSA Solution Brief 1 Who is asking
VALUE PROPOSITION FOR SERVICE PROVIDERS. Helping Service Providers accelerate adoption of the cloud
VALUE PROPOSITION FOR SERVICE PROVIDERS Helping Service Providers accelerate adoption of the cloud Partnership with Service Providers Enabling Your Cloud Services in Complex Environments Today s challenge
ITL BULLETIN FOR JUNE 2012 CLOUD COMPUTING: A REVIEW OF FEATURES, BENEFITS, AND RISKS, AND RECOMMENDATIONS FOR SECURE, EFFICIENT IMPLEMENTATIONS
ITL BULLETIN FOR JUNE 2012 CLOUD COMPUTING: A REVIEW OF FEATURES, BENEFITS, AND RISKS, AND RECOMMENDATIONS FOR SECURE, EFFICIENT IMPLEMENTATIONS Shirley Radack, Editor Computer Security Division Information
RSA Solution Brief RSA. Encryption and Key Management Suite. RSA Solution Brief
RSA Encryption and Key Management Suite The threat of experiencing a data breach has never been greater. According to the Identity Theft Resource Center, since the beginning of 2008, the personal information
Security Issues in Cloud Computing
Security Issues in Computing CSCI 454/554 Computing w Definition based on NIST: A model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources
Beyond passwords: Protect the mobile enterprise with smarter security solutions
IBM Software Thought Leadership White Paper September 2013 Beyond passwords: Protect the mobile enterprise with smarter security solutions Prevent fraud and improve the user experience with an adaptive
VMware vcloud Powered Services
SOLUTION OVERVIEW VMware vcloud Powered Services VMware-Compatible Clouds for a Broad Array of Business Needs Caught between shrinking resources and growing business needs, organizations are looking to
RSA SecurID Two-factor Authentication
RSA SecurID Two-factor Authentication Today, we live in an era where data is the lifeblood of a company. Now, security risks are more pressing as attackers have broadened their targets beyond financial
Accelerate Your Enterprise Private Cloud Initiative
Cisco Cloud Comprehensive, enterprise cloud enablement services help you realize a secure, agile, and highly automated infrastructure-as-a-service (IaaS) environment for cost-effective, rapid IT service
Realizing business flexibility through integrated SOA policy management.
SOA policy management White paper April 2009 Realizing business flexibility through integrated How integrated management supports business flexibility, consistency and accountability John Falkl, distinguished
Cloud Computing in Higher Education: A Guide to Evaluation and Adoption
Cloud Computing in Higher Education: A Guide to Evaluation and Adoption Executive Summary Public cloud computing delivering infrastructure, services, and software on demand through the network offers attractive
RE Think. IT & Business. Invent. IBM SmartCloud Security. Dr. Khaled Negm, SMIEEE, ACM Fellow IBM SW Global Competency Center Leader GCC
RE Think Invent IT & Business IBM SmartCloud Security Dr. Khaled Negm, SMIEEE, ACM Fellow IBM SW Global Competency Center Leader GCC 2014 IBM Corporation Some Business Questions Is Your Company is Secure
Strategies for assessing cloud security
IBM Global Technology Services Thought Leadership White Paper November 2010 Strategies for assessing cloud security 2 Securing the cloud: from strategy development to ongoing assessment Executive summary
CLOUD COMPUTING SECURITY ISSUES
CLOUD COMPUTING SECURITY ISSUES Florin OGIGAU-NEAMTIU IT Specialist The Regional Department of Defense Resources Management Studies, Brasov, Romania The term cloud computing has been in the spotlights
Cloud Computing Security Considerations
Cloud Computing Security Considerations Roger Halbheer, Chief Security Advisor, Public Sector, EMEA Doug Cavit, Principal Security Strategist Lead, Trustworthy Computing, USA January 2010 1 Introduction
ADAPTIVE AUTHENTICATION ADAPTER FOR JUNIPER SSL VPNS. Adaptive Authentication in Juniper SSL VPN Environments. Solution Brief
ADAPTIVE AUTHENTICATION ADAPTER FOR JUNIPER SSL VPNS Adaptive Authentication in Juniper SSL VPN Environments Solution Brief RSA Adaptive Authentication is a comprehensive authentication platform providing
The Cisco Powered Network Cloud: An Exciting Managed Services Opportunity
. White Paper The Cisco Powered Network Cloud: An Exciting Managed Services Opportunity The cloud computing phenomenon is generating a lot of interest worldwide because of its potential to offer services
Cloud Security considerations for business adoption. Ricci IEONG CSA-HK&M Chapter
Cloud Security considerations for business adoption Ricci IEONG CSA-HK&M Chapter What is Cloud Computing? Slide 2 What is Cloud Computing? My Cloud @ Internet Pogoplug What is Cloud Computing? Compute
SafeNet Data Encryption and Control. Securing data over its lifecycle, wherever it resides from the data center to endpoints and into the cloud
SafeNet Data Encryption and Control Securing data over its lifecycle, wherever it resides from the data center to endpoints and into the cloud Ensure Data Protection with Data Encryption and Control Across
SafeNet Data Encryption and Control. Securing data over its lifecycle, wherever it resides from the data center to endpoints and into the cloud
SafeNet Data Encryption and Control Securing data over its lifecycle, wherever it resides from the data center to endpoints and into the cloud Ensure Data Protection with Data Encryption and Control Across
Tufts University. Department of Computer Science. COMP 116 Introduction to Computer Security Fall 2014 Final Project. Guocui Gao Guocui.gao@tufts.
Tufts University Department of Computer Science COMP 116 Introduction to Computer Security Fall 2014 Final Project Investigating Security Issues in Cloud Computing Guocui Gao [email protected] Mentor:
CHAPTER 8 CLOUD COMPUTING
CHAPTER 8 CLOUD COMPUTING SE 458 SERVICE ORIENTED ARCHITECTURE Assist. Prof. Dr. Volkan TUNALI Faculty of Engineering and Natural Sciences / Maltepe University Topics 2 Cloud Computing Essential Characteristics
OPENIAM ACCESS MANAGER. Web Access Management made Easy
OPENIAM ACCESS MANAGER Web Access Management made Easy TABLE OF CONTENTS Introduction... 3 OpenIAM Access Manager Overview... 4 Access Gateway... 4 Authentication... 5 Authorization... 5 Role Based Access
Trust but Verify. Vincent Campitelli. VP IT Risk Management
Trust but Verify Vincent Campitelli VP IT Risk Management McKesson Corporation Trust but Verify Cloud Security 3 Agenda Cloud Defined Cloud Opportunities Cloud Challenges What s Different? How to Verify
Outline. What is cloud computing? History Cloud service models Cloud deployment forms Advantages/disadvantages
Ivan Zapevalov 2 Outline What is cloud computing? History Cloud service models Cloud deployment forms Advantages/disadvantages 3 What is cloud computing? 4 What is cloud computing? Cloud computing is the
ProtectV. Securing Sensitive Data in Virtual and Cloud Environments. Executive Summary
VISIBILITY DATA GOVERNANCE SYSTEM OS PARTITION UNIFIED MANAGEMENT CENTRAL AUDIT POINT ACCESS MONITORING ENCRYPTION STORAGE VOLUME POLICY ENFORCEMENT ProtectV SECURITY SNAPSHOT (backup) DATA PROTECTION
Orchestrating the New Paradigm Cloud Assurance
Orchestrating the New Paradigm Cloud Assurance Amsterdam 17 January 2012 John Hermans - Partner Current business challenges versus traditional IT Organizations are challenged with: Traditional IT seems
Concurrent Technologies Corporation (CTC) is an independent, nonprofit, applied scientific research and development professional services
Concurrent Technologies Corporation (CTC) is an independent, nonprofit, applied scientific research and development professional services organization providing innovative management and technology-based
Compliance for the Road Ahead
THE DATA PROTECTION COMPANY CENTRAL CONTROL A NTROL RBAC UNIVERSAL DATA PROTECTION POLICY ENTERPRISE KEY DIAGRAM MANAGEMENT SECURE KEY STORAGE ENCRYPTION SERVICES LOGGING AUDITING Compliance for the Road
How To Manage Cloud Data Safely
Information Governance In The Cloud Galina Datskovsky, Ph. D., CRM President of ARMA International SVP Information Governance Solutions Topics Cloud Characteristics And Risks Information Management In
Clouds on the Horizon Cloud Security in Today s DoD Environment. Bill Musson Security Analyst
Clouds on the Horizon Cloud Security in Today s DoD Environment Bill Musson Security Analyst Agenda O Overview of Cloud architectures O Essential characteristics O Cloud service models O Cloud deployment
CLOUD COMPUTING. A Primer
CLOUD COMPUTING A Primer A Mix of Voices The incredible shrinking CIO CIO Magazine, 2004 IT Doesn t Matter, The cloud will ship service outside the institution and ship power from central IT groups to
Security Issues In Cloud Computing And Their Solutions
Security Issues In Cloud Computing And Their Solutions Mr. Vinod K. Lalbeg Lecturer (Management), NWIMSR, Pune-1 & Ms. Anjali S. Mulik Lecturer (Management), NWIMSR, Pune-1 ABSTRACT Cloud Computing offers
ADAPTIVE IAM: DEFENDING THE BORDERLESS ENTERPRISE
ADAPTIVE IAM: DEFENDING THE BORDERLESS ENTERPRISE Digital identities move to the front lines in the battle for cyber security. May 2013 SUMMARY OF KEY POINTS Identity and Access Management (IAM), an established
SECURE CLOUD COMPUTING
Outline SECURE CLOUD COMPUTING Introduction (of many buzz words) References What is Cloud Computing Cloud Computing Infrastructure Security Cloud Storage and Data Security Identity Management in the Cloud
IT Risk and Security Cloud Computing Mike Thomas Erie Insurance May 2011
IT Risk and Security Cloud Computing Mike Thomas Erie Insurance May 2011 Cloud Basics Cloud Basics The interesting thing about cloud computing is that we've redefined cloud computing to include everything
EMC PERSPECTIVE. The Private Cloud for Healthcare Enables Coordinated Patient Care
EMC PERSPECTIVE The Private Cloud for Healthcare Enables Coordinated Patient Care Table of Contents A paradigm shift for Healthcare IT...................................................... 3 Cloud computing
Information Technology: This Year s Hot Issue - Cloud Computing
Information Technology: This Year s Hot Issue - Cloud Computing Presented by: Alan Sutin Global IP & Technology Practice Group GREENBERG TRAURIG, LLP ATTORNEYS AT LAW WWW.GTLAW.COM 2011. All rights reserved.
Enterprise effectiveness of digital certificates: Are they ready for prime-time?
Enterprise effectiveness of digital certificates: Are they ready for prime-time? by Jim Peterson As published in (IN)SECURE Magazine issue 22 (September 2009). www.insecuremag.com www.insecuremag.com 1
Uniting IAM and data protection for greater security
E-Guide Uniting IAM and data protection for greater security There's been a new development in the information security world: content-aware identity and access management, an integration of two established,
IBM Data Security Services for endpoint data protection endpoint data loss prevention solution
Automating policy enforcement to prevent endpoint data loss IBM Data Security Services for endpoint data protection endpoint data loss prevention solution Highlights Protecting your business value from
PCI COMPLIANCE ON AWS: HOW TREND MICRO CAN HELP
solution brief PCI COMPLIANCE ON AWS: HOW TREND MICRO CAN HELP AWS AND PCI DSS COMPLIANCE To ensure an end-to-end secure computing environment, Amazon Web Services (AWS) employs a shared security responsibility
The cloud - ULTIMATE GAME CHANGER ===========================================
The cloud - ULTIMATE GAME CHANGER =========================================== When it comes to emerging technologies, there is one word that has drawn more controversy than others: The Cloud. With cloud
Cloud Computing. What is Cloud Computing?
Cloud Computing What is Cloud Computing? Cloud computing is where the organization outsources data processing to computers owned by the vendor. Primarily the vendor hosts the equipment while the audited
IBM Data Security Services for endpoint data protection endpoint data loss prevention solution
Automating policy enforcement to prevent endpoint data loss IBM Data Security Services for endpoint data protection endpoint data loss prevention solution Highlights Facilitate policy-based expertise and
Cloud Computing/ Semantic Web Initiatives & Tutorial
Cloud Computing/ Semantic Web Initiatives & Tutorial Chuck Vollmer March 2011 The Cloud & Semantic Web 1990s 2010s Mainframe Computing Personal Computing Cloud Computing Cloud computing is as big a paradigm
Testing as a Service on Cloud: A Review
Testing as a Service on Cloud: A Review Shruti N. Pardeshi 1, Vaishali Choure 1 Research Scholar, 2 Associate Professor, Medicaps Group of Institutions,Indore Abstract Software testing is an important
The governance IT needs Easy user adoption Trusted Managed File Transfer solutions
Product Datasheet The governance IT needs Easy user adoption Trusted Managed File Transfer solutions Full-featured Enterprise-class IT Solution for Managed File Transfer Organizations today must effectively
Open Data Center Alliance Usage: Provider Assurance Rev. 1.1
sm Open Data Center Alliance Usage: Provider Assurance Rev. 1.1 Legal Notice This Open Data Center Alliance SM Usage:Provider Assurance is proprietary to the Open Data Center Alliance, Inc. NOTICE TO USERS
The Benefits of an Integrated Approach to Security in the Cloud
The Benefits of an Integrated Approach to Security in the Cloud Judith Hurwitz President and CEO Marcia Kaufman COO and Principal Analyst Daniel Kirsch Senior Analyst Sponsored by IBM Introduction The
WRITTEN TESTIMONY OF NICKLOUS COMBS CHIEF TECHNOLOGY OFFICER, EMC FEDERAL ON CLOUD COMPUTING: BENEFITS AND RISKS MOVING FEDERAL IT INTO THE CLOUD
WRITTEN TESTIMONY OF NICKLOUS COMBS CHIEF TECHNOLOGY OFFICER, EMC FEDERAL ON CLOUD COMPUTING: BENEFITS AND RISKS MOVING FEDERAL IT INTO THE CLOUD BEFORE THE COMMITTEE ON OVERSIGHT AND GOVERNMENT REFORM
Cloud Computing. Mike Bourgeois Platform as a Service Point of View September 17, 2015
Cloud Computing Mike Bourgeois Platform as a Service Point of View September 17, 2015 Agenda Cloud Computing Definition Platform as a Service Business Drivers and Benefits Technology Drivers and Benefits
Evaluating IaaS security risks
E-Guide This expert tip examines the risks organizations need to be aware of when evaluating IaaS solutions, and highlights the key architectural and process components of access management services that
Capturing the New Frontier:
Capturing the New Frontier: How Software Security Unlocks the Power of Cloud Computing Executive Summary Cloud computing is garnering a vast share of IT interest. Its promise of revolutionary cost savings
Platform Leadership in Software as a Service: How Platforms Facilitate Innovation
Platform Leadership in Software as a Service: How Platforms Facilitate Innovation Bartłomiej Kołakowski Judge Business School University of Cambridge Based on an MPhil dissertation for Technology Policy
APIs The Next Hacker Target Or a Business and Security Opportunity?
APIs The Next Hacker Target Or a Business and Security Opportunity? SESSION ID: SEC-T07 Tim Mather VP, CISO Cadence Design Systems @mather_tim Why Should You Care About APIs? Amazon Web Services EC2 alone
Protecting Data and Privacy in the Cloud
Protecting Data and Privacy in the Cloud Contents 1 3 6 9 12 13 Protecting Data and Privacy in the Cloud an Introduction Building Services to Protect Data Protecting Data in Service Operations Empowering
Cloud Computing demystified! ISACA-IIA Joint Meeting Dec 9, 2014 By: Juman Doleh-Alomary Office of Internal Audit [email protected]
Cloud Computing demystified! ISACA-IIA Joint Meeting Dec 9, 2014 By: Juman Doleh-Alomary Office of Internal Audit [email protected] 2 If cloud computing is so simple, then what s the big deal? What is the
Dell s Unified Clinical Archive Solution
Securely store and share data with multiple caregivers. Dell s Unified Clinical Archive Solution Dell s Unified Clinical Archive (UCA) offers a single-source, end-to-end solution for your medical imaging
AskAvanade: Answering the Burning Questions around Cloud Computing
AskAvanade: Answering the Burning Questions around Cloud Computing There is a great deal of interest in better leveraging the benefits of cloud computing. While there is a lot of excitement about the cloud,
[email protected] [email protected]
1 The following is merely a collection of notes taken during works, study and just-for-fun activities No copyright infringements intended: all sources are duly listed at the end of the document This work
Cloud Infrastructure Services for Service Providers VERYX TECHNOLOGIES
Cloud Infrastructure Services for Service Providers VERYX TECHNOLOGIES Meeting the 7 Challenges in Testing and Performance Management Introduction With advent of the cloud paradigm, organizations are transitioning
RSA Solution Brief. RSA SecurID Authentication in Action: Securing Privileged User Access. RSA Solution Brief
RSA SecurID Authentication in Action: Securing Privileged User Access RSA SecurID solutions not only protect enterprises against access by outsiders, but also secure resources from internal threats The
CLOUD STORAGE SECURITY INTRODUCTION. Gordon Arnold, IBM
CLOUD STORAGE SECURITY INTRODUCTION Gordon Arnold, IBM SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and individual members may use this material
Cloud Computing: Making the right choices
Cloud Computing: Making the right choices Kalpak Shah Clogeny Technologies Pvt Ltd 1 About Me Kalpak Shah Founder & CEO, Clogeny Technologies Passionate about economics and technology evolving through
Lecture 02a Cloud Computing I
Mobile Cloud Computing Lecture 02a Cloud Computing I 吳 秀 陽 Shiow-yang Wu What is Cloud Computing? Computing with cloud? Mobile Cloud Computing Cloud Computing I 2 Note 1 What is Cloud Computing? Walking
