How RSA has helped EMC to secure its Virtual Infrastructure



Similar documents
The RSA Solution for. infrastructure security and compliance. A GRC foundation for VMware. Solution Brief

RSA Solution Brief. The RSA Solution for Cloud Security and Compliance

RSA Security Solutions for Virtualization

Trusted Geolocation in The Cloud Technical Demonstration

VBLOCK GRC SOLUTION WITH RSA (GOVERNANCE, RISK, AND COMPLIANCE)

Preempting Business Risk with RSA SIEM and CORE Security Predictive Security Intelligence Solutions

How To Protect Your Virtual Infrastructure From Attack From A Cyber Threat

Moving beyond Virtualization as you make your Cloud journey. David Angradi

Keith Luck, CISSP, CCSK Security & Compliance Specialist, VMware, Inc. kluck@vmware.com

IT Security & Compliance. On Time. On Budget. On Demand.

RSA, The Security Division of EMC. Zamanta Anguiano Sales Manager RSA

Information Risk Management. Alvin Ow Director, Technology Consulting Asia Pacific & Japan RSA, The Security Division of EMC

Lot 1 Service Specification MANAGED SECURITY SERVICES

Enterprise IT is complex. Today, IT infrastructure spans the physical, the virtual and applications, and crosses public, private and hybrid clouds.

Accenture Intelligent Security for the Digital Enterprise. Archer s important role in solving today's pressing security challenges

Vistara Lifecycle Management

RSA SIEM and DLP Infrastructure and Information Monitoring in One Solution

Ecom Infotech. Page 1 of 6

VMware Integrated Partner Solutions for Networking and Security

RSA ARCHER BUSINESS CONTINUITY MANAGEMENT AND OPERATIONS Solution Brief

RSA Archer Risk Intelligence

RSA Data Loss Prevention (DLP) Understand business risk and mitigate it effectively

Discover & Investigate Advanced Threats. OVERVIEW

PCI Compliance for Cloud Applications

Detect & Investigate Threats. OVERVIEW

Cautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work

Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist,

RSA ARCHER OPERATIONAL RISK MANAGEMENT

場 次 :C-3 公 司 名 稱 :RSA, The Security Division of EMC 主 題 : 如 何 應 用 網 路 封 包 分 析 對 付 資 安 威 脅 主 講 人 :Jerry.Huang@rsa.com Sr. Technology Consultant GCR

Maintaining PCI-DSS compliance. Daniele Bertolotti Antonio Ricci

with Managing RSA the Lifecycle of Key Manager RSA Streamlining Security Operations Data Loss Prevention Solutions RSA Solution Brief

ACI ON DEMAND DELIVERS PEACE OF MIND

Protect Root Abuse privilege on Hypervisor (Cloud Security)

PCI DSS Reporting WHITEPAPER

Enabling Security Operations with RSA envision. August, 2009

Digi Device Cloud: Security You Can Trust

Using Enterprise Governance, Risk, And Compliance (EGRC) Tools For Improved Management Of Security And Privacy. June 23, 2015

Netzwerkvirtualisierung? Aber mit Sicherheit!

SAP Secure Operations Map. SAP Active Global Support Security Services May 2015

Caretower s SIEM Managed Security Services

Trend Micro VMware Solution Guide Summary for Payment Card Industry Data Security Standard

TOP 10 WAYS TO ADDRESS PCI DSS COMPLIANCE. ebook Series

Payment Card Industry Data Security Standard

NERC Cyber Security. Compliance Consulting. Services. HCL Governance, Risk & Compliance Practice

Sichere Virtualisierung mit VMware

Company Overview. Enterprise Cloud Solutions

Extreme Networks Security Analytics G2 Vulnerability Manager

Sarbanes-Oxley Compliance for Cloud Applications

Data Center Connector for vsphere 3.0.0

Find the intruders using correlation and context Ofer Shezaf

Securing the Cloud with IBM Security Systems. IBM Security Systems IBM Corporation IBM IBM Corporation Corporation

PCI DSS Top 10 Reports March 2011

IBM Cloud Security Draft for Discussion September 12, IBM Corporation

PCI DSS. Payment Card Industry Data Security Standard.

RSA envision. Platform. Real-time Actionable Security Information, Streamlined Incident Handling, Effective Security Measures. RSA Solution Brief

An Introduction to SIEM & RSA envision (Security Information and Event Management) January, 2011

Security Services. 30 years of experience in IT business

Vulnerability Management

Welcome to Modulo Risk Manager Next Generation. Solutions for GRC

Goals. Understanding security testing

QRadar SIEM and FireEye MPS Integration

Find the needle in the security haystack

Eoin Thornton Senior Security Architect Zinopy Security Ltd.

NE-10750A Monitoring and Operating a Private Cloud with System Center 2012

IMPROVING RISK VISIBILITY AND SECURITY POSTURE WITH IDENTITY INTELLIGENCE

SECURITY MODELS FOR CLOUD Kurtis E. Minder, CISSP

Addressing the SANS Top 20 Critical Security Controls for Effective Cyber Defense

Q1 Labs Corporate Overview

How To Protect Your Cloud From Attack

Strategic Compliance & Securing the Cloud. Annalea Sharack-Ilg, CISSP, AMBCI Technical Director of Information Security

What is Security Intelligence?

HyTrust Logging Solution Brief: Gain Virtualization Compliance by Filling Log Data Gaps

Continuous Network Monitoring

The Value of Vulnerability Management*

Automate PCI Compliance Monitoring, Investigation & Reporting

FINANCIAL INSTITUTIONS: MANAGING OPERATIONAL RISK WITH RSA ARCHER

Information & Asset Protection with SIEM and DLP

MS-10750: Monitoring and Operating a Private Cloud with System Center Required Exam(s) Course Objectives. Price. Duration. Methods of Delivery

Cloud Security considerations for business adoption. Ricci IEONG CSA-HK&M Chapter

RSA SECURITY MANAGEMENT. An Integrated approach to risk, operations and incident management. Solution Brief

Agio Remote Monitoring and Management

Security in the Software Defined Data Center

Staying Secure After Microsoft Windows Server 2003 Reaches End of Life. Trevor Richmond, Sales Engineer Trend Micro

STREAM Cyber Security

Information Technology Policy

70-246: Monitoring and Operating a Private Cloud with System Center 2012

Operationalize Policies. Take Action. Establish Policies. Opportunity to use same tools and practices from desktop management in server environment

Security, Compliance & Risk Management for Cloud Relationships. Adnan Dakhwe, MS, CISA, CRISC, CRMA Safeway Inc. In-Depth Seminars D32

McAfee Server Security

Total Protection for Compliance: Unified IT Policy Auditing

Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0

Transcription:

How RSA has helped EMC to secure its Virtual Infrastructure A new solution, the RSA solution for Cloud Security and Compliance, has been developed and is now available to all of our customers. Luciano Veronese, Senior Technology Consultant 1 EMC IT At A Glance 2004 2012 User Profiles 24,000 Internal Users 51,000 Internal Users IT Environment 70,000 Customers And Partners 5 Data Centers, 960 TB Storage 400,000+ Customers And Partners 5 Data Centers, 10 PB Storage Business Applications ~ 400 Applications And Tools ~500 Applications And Tools Virtualization 2,000 Physical Servers ~ 6,000 OS Images (Worldwide) 86% Of All Servers Virtualized Global Support 50+ Countries And 15 Languages 80+ Countries And 20 Languages 2 EMC IT s Journey To The Cloud IT PRODUCTION BUSINESS PRODUCTION IT-AS-A-SERVICE Infrastructure Focus Applications Focus Business Focus 100% % VIRTUALIZED 86% 70% 30% 40% 15% 2004-08 2009-10 2011-2012+ 3

4 The EMC s Security Requirements for its Virtual Infrastructure needs Ensure the business critical applications we are moving to the virtual infrastructure will run in a secure and compliant environment Security and compliance checks must run across mixed VMware and physical IT environments also to manage the transition period Quickly react to to security events coming from the virtual environment Be able to assess hybrid and public cloud service providers to move in the future to a hybrid model What does it mean secure and compliant? The Concept of Compliance Compliance is an ongoing cyclical activity Desired: e.g. Best Practice Corporate Objectives Policies Mandated: e.g. PCI, Basel II Control Standards Questionnaire s Control Procedures People Process Technology Effectiveness Control Self Assessments Independent Reviews Compliance Tool Integration Technical Control Checks Issue Findings Remediation Exceptions 5 EMC and RSA jointly developed the RSA Solution for Cloud Security and Compliance Enabling the Cycle of Compliance: RSA Securbook Discover VMware infrastructure using Archer EM Define security policy and controls using Archer PM Manage security incidents that affect compliance using Archer CM/IM and the RSA envision SIEM RSA Archer egrc Manual and automated configuration assessment leveraging Archer CM Remediation of non-compliant controls leveraging Archer Issue 6

7 The architecture Automated Measurement Agent Component Discovery and Population Configuration Measurement VMware-specific Controls RSA Archer egrc alerts RSA envision The RSA Archer egrc Ecosystem 8 RSA Archer egrc Solutions Business Continuity Automate your approach to business continuity and disaster recovery planning, and enable rapid, effective crisis management in one solution. Threat Track threats through a centralized early warning system to help prevent attacks before they affect your enterprise. Audit Centrally manage the planning, prioritization, staffing, procedures and reporting of audits to increase collaboration and efficiency. Policy Centrally manage policies, map them to objectives and guidelines, and promote awareness to support a culture of corporate governance. Risk Identify risks to your business, evaluate them through online assessments and metrics, and respond with remediation or acceptance. Compliance Document your control framework, assess design and operational effectiveness, and respond to policy and regulatory compliance issues. Vendor Centralize vendor data, manage relationships, assess vendor risk, and ensure compliance with your policies and controls. Incident Report incidents and ethics violations, manage their escalation, track investigations and analyze resolutions. Enterprise Manage relationships and dependencies within your enterprise hierarchy and infrastructure to support GRC initiatives. 9

10 Enabling the Cycle of Security Compliance Manage security incidents that affect compliance using Archer CM/IM and the RSA envision SIEM Manual and automated configuration assessment leveraging Archer CM RSA Archer egrc Remediation of non-compliant controls leveraging Archer Issue Discover VMware infrastructure and define policy/controls to manage 11 Vmware-specific control procedures Over 130 VMware control procedures (guidelines/checklist to configure or verify configurations) have been added to the Archer Content Library to provide specific instructions for configuring and hardening VMware infrastructure in the following areas Access control Platform security Information security Operational security Vmware control procedures derive directly from the VMware vsphere 4.1 Security Hardening Guide 12

13 Control Procedure List, Status and Measurement Method Mapping VMware security controls to regulations and standards ISO 27002 10. Communications & operations management Customer Policy For example, EMC 5.9 Malicious Software ISO 27002 10. Communications & operations management VMP01 General Protection Secure VM as you would physical machine 10.4 Protection against malicious code 10.4.1 Installation and regular update of detection and repair software 5.9.1 All Corporate owned systems must be protected against the possible infection of viruses 10.4 Protection against malicious code 10.4.1 Installation and regular update of detection and repair software Ensure antivirus, antispyware, intrusion detection, etc. are enabled 14 Enabling the Cycle of Security Compliance Manage security incidents that affect compliance using Archer CM/IM and the RSA envision SIEM RSA Archer egrc Remediation of non-compliant controls leveraging Archer Issue 15

16 Distribution and Tracking Control Procedures Security Admin Server Admin Project Manager Network Admin VI Admin Initial Deployment Questionnaire 17 V.I Admin logs in and respond to questionnaires 18

19 Enabling the Cycle of Security Compliance Manage security incidents that affect compliance using Archer CM/IM and the RSA envision SIEM Manual and automated configuration assessment leveraging Archer CM RSA Archer egrc Deployment and Remediation Work Queues 20 Overall Virtual Infrastructure Compliance Dashboard 21

22 Enabling the Cycle of Security Compliance Manual and automated configuration assessment leveraging Archer CM RSA envision collects, analyzes and feeds security incidents from RSA, VMware and ecosystem products to inform Archer dashboards RSA Archer egrc Remediation of non-compliant controls leveraging Archer Issue Manage Events and Incidents in real time VMware vshield Network Security Events Fed to Archer 23 Help select providers for Hybrid Clouds Assessing Service Provider Compliance RSA Solution for Cloud Security and Compliance aligns with CSA Consensus Assessment Questions by automating 195 questions that customers can issue to assess cloud service providers. Cloud Security Alliance s 13 domains of focus for cloud computing 24

25 Example: Assessing Cloud Service Providers Results: Benchmarking vendors based on CSA standards Summary Verify V.I compliance and security automatically (mostly) saving time and overall costs Addresses both physical and virtual environments Maps technical security controls for VMware environments to regulations, standards and VMware Hardening Guide Includes automated device discovery Integrates the Virtual Infrastructure security and compliance into the bigger enterprise view (thanks to the GRC) Fight the silos approach logic promoted by acquiring specialized products Integrates VMWare controls into the enterprise control framework Add you own policies and map the VMWare controls Understand how the V.I can impact the IT and Enterprise RISK level 26 26 THANK YOU 27