Secure Content Delivery Network



Similar documents
Secure Content Delivery Network

THE INTERNET GETS BETTER WHEN WE WORK TOGETHER

The server will respond to the client with a list of instances. One such attack was analyzed by an information security researcher in January 2015.

Making the Internet Business-Ready

Web Application Vulnerability Scanner: Skipfish

AKAMAI WHITE PAPER. The Challenges of Connecting Globally in the Pharmaceutical Industry

Account Checkers and Fraud

Securing Cloud-Based Workflows for Premium Content:

THE AKAMAI SERVICE CONSULTING PACKAGE 10FOR10 IMPROVES YOUR WEB PERFORMANCE METRIC(S) BY AT LEAST 10%! AKAMAI 10For10 AKAMAI INDUSTRY BROCHURE

JOOMLA REFLECTION DDOS-FOR-HIRE

HIMSS Survey Uncovers Critical Weaknesses In Hospital Web Security

DNS FLOODER V1.1. akamai s [state of the internet] / Threat Advisory

AKAMAI SOLUTION BROCHURE CLOUD SECURITY SOLUTIONS FAST RELIABLE SECURE.

SSDP REFLECTION DDOS ATTACKS

How to Evaluate DDoS Mitigation Providers:

CASPR Commonly Accepted Security Practices and Recommendations

Payment Card Industry (PCI) Data Security Standard

Dynamic Site Accelerator

Improving Web Application Security: The Akamai Approach to WAF

[state of the internet] / SEO Attacks. Threat Advisory: Continuous Uptick in SEO Attacks

Akamai for Software as a Service (SaaS)

EMC VPLEX FAMILY. Continuous Availability and data Mobility Within and Across Data Centers

kamai Technologies Inc. Commonly Accepted Security Practices and Recommendations (CASPR)

DISASTER RECOVERY. Omniture Disaster Plan. June 2, 2008 Version 2.0

Akamai for SAP Acceleration:

Improving Online Video Quality and Accelerating Downloads

EMC VPLEX FAMILY. Continuous Availability and Data Mobility Within and Across Data Centers

Virtual Servers VIRTUAL DATA CENTER OVERVIEW VIRTUAL DATA CENTER BENEFITS

SP Monitor. nfx One gives MSPs the agility and power they need to confidently grow their security services business. NFX FOR MSP SOLUTION BRIEF

WHITEPAPER Map, Monitor, and Manage Distributed Applications in System Center 2012

AKAMAI AND RIVERBED JOINTLY DEVELOP INNOVATIVE SAAS ACCELERATION SOLUTION

Network Virtualization Platform (NVP) Incident Reports

WHITE PAPER. Automated IT Asset Management Maximize Organizational Value Using Numara Track-It! p: f:

IBM PowerSC. Security and compliance solution designed to protect virtualized datacenters. Highlights. IBM Systems and Technology Data Sheet

DVTEL Server Based Analytics (Build 4.5.2)

High Availability with Elixir

Private Clouds & Hosted IT Solutions

CA Process Automation for System z 3.1

Automated IT Asset Management Maximize organizational value using BMC Track-It! WHITE PAPER

Always On Infrastructure for Software as a Ser vice

Solution Brief Availability and Recovery Options: Microsoft Exchange Solutions on VMware

The evolution of data connectivity

CA ARCserve Backup r16.x Professional Exam (CAT-360) Study Guide Version 1.1

F5 and Secure Windows Azure Access

Perceptive Software Platform Services

Troux Hosting Options

NTP-AMP: AMPLIFICATION TACTICS AND ANALYSIS

OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE

Taking the Service Desk to the Next Level BEST PRACTICES WHITE PAPER

Effective Solutions for Increased Security in NH Public Schools. State of New Hampshire Division of Homeland Security and Emergency Management

WhitePaper. Private Cloud Computing Essentials

Juniper Care Plus Services

MSP Center Plus Features Checklist

Splunk for VMware Virtualization. Marco Bizzantino Vmug - 05/10/2011

Network Virtualization Solutions - A Practical Solution

Document Details. 247Time Backup & Disaster Recovery Plan. Author: Document Tracking. Page 1 of 12

Meeting the Challenges of Virtualization Security

AKAMAI WHITE PAPER. Delivering Dynamic Web Content in Cloud Computing Applications: HTTP resource download performance modelling

CenterMind G+ Smart and Proactive Environment Monitoring

Emerson Smart Firewall

SWAP EXECUTION FACILITY OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE

CA Service Desk Manager

CITY UNIVERSITY OF HONG KONG Physical Access Security Standard

I N T E R S Y S T E M S W H I T E P A P E R F O R F I N A N C I A L SERVICES EXECUTIVES. Deploying an elastic Data Fabric with caché

CLOUD COMPUTING FACT SHEET. Considering Cloud Computing For Your Business?

MAG DATACENTERS, LLC ( FORTRUST ) Service Organization Controls 3

ITIL A guide to Event Management

DESIGNATED CONTRACT MARKET OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE

Brivo OnAir TOTAL COST OF OWNERSHIP (TCO) How Software-as-a-Service (SaaS) lowers the Total Cost of Ownership (TCO) for physical security systems.

Business Case for Smart Care Software Product Portfolio

IT-CNP, Inc. Capability Statement

Designing & Managing Reliable IT Services

Smart-UPS RT External Battery Pack Stack/Rack-Mount 6U

YubiCloud OTP Validation Service. Version 1.2

Amcrest 960H DVR Quick Start Guide

Life in the Cloud A Service Provider s View. Michael Smith mismith@akamai.com Security Evangelist

Application Deployment Experts

White Paper. How To Deliver Fast, Engaging Responsive Web Design Sites

PULSE SECURE CARE PLUS SERVICES

VIRTUAL DESKTOP INFRASTRUCTURE: PLENTY OF POTENTIAL, BUT DO THE HOMEWORK BEFORE DIVING IN. by Todd Cota, Jerin May and Joesph Springer

Retention & Destruction

Use Case Brief BORDERLESS DATACENTERS

Managed Support Policy

Designing a Data Solution with Microsoft SQL Server 2014

Applying Data Center Infrastructure Management in Collocation Data Centers

AKAMAI WHITE PAPER. Network Function Virtualization

REVIEWED ICT DATA CENTRE PHYSICAL ACCESS AND ENVIROMENTAL CONTROL POLICY

Capitalize on Mobile Commerce by Optimizing the Mobile Shopping Experience

Security Controls for the Autodesk 360 Managed Services

TrueAlarm Fire Alarm Systems

Mobile Enabling Security Products for a Leading Security Firm. Case study

What are your firm s plans to adopt x86 server virtualization? Not interested

Akamai Whitepaper. Akamai Mobile Network Solutions: A Content Centric Approach to Delivering High Quality Mobile Experiences

Colocation Service Definition. SD008 v1.3 Issue Date 19 Feb 09

Building Private & Hybrid Cloud Solutions

Virtualization Essentials

TrueAlarm Fire Alarm Systems

Making the leap to the cloud: IS my data private and secure?

An Oracle White Paper January Oracle Database Firewall

Transcription:

Akamai Technologies Inc. Akamai Security and Compliance Secure Content Delivery Network Physical Access Information May 13, 2014

Table of Contents Risk Analysis... 1-2 Physical Access... 2-3 Records... 4 This document is designed to address common questions customers ask about Akamai's secure content delivery procedures. By publishing it, our goal is to show how seriously Akamai takes its security and how those doing business with us benefit. It's also designed to offer a window into our compliance procedures. Risk Analysis Akamai considers the compliance boundary for its secure content delivery network to be the locked rack Akamai provides rather than the physical boundary of the data center in which the rack is located. This provides a number of advantages to Akamai: Direct control over the security boundary Security monitoring and reporting customized to Akamai's needs Defense in depth- - the security of the data center is in addition to Akamai's own protections Ability to use a variety of data centers in countries across the world Selection of security equipment based on Akamai's needs Akamai does accept certain risks that could result from problems at a given data center, such as the loss of power. Since Akamai's Secure Content Delivery Network has tens of thousands of redundant servers, Akamai can easily accept the temporary loss of multiple data centers. The 1

distributed nature of the network reduces the likelihood of multiple simultaneous failures. Physical Access Akamai's servers in the Secure Content Delivery Network (SCDN) are housed in specially configured, locked racks. Datacenters that contain Akamai Secure Content regions have two methods of physical facility protection. All Secure Content servers are mounted in fully enclosed metal cabinets. These cabinets have no external fasteners all side panels are bolted from within and the doors are mounted on internal hinges. The front and rear doors of the Secure Content cabinets are secured with locks. Within each cabinet, cameras watch the doors. Access information is logged and reported to Akamai s NOCC, enabling Akamai personnel to monitor access and remove sensitive information within seconds if the door is opened without authorization. Remote Power Distribution Units (RPDUs) are inside each cabinet enabling low- level power cycle maintenance. When faults have been diagnosed, Akamai s NOCC can reboot the machines remotely, eliminating the need for a local technician to access and power cycle a failed system. Relevant information about the monitoring software and the cameras is reported into Akamai s query system. Scenarios such as errors on the cameras or motion detected will result in an alert being fired and addressed. The alerts are defined in Akamai s Alert Management System (AMS). In addition, many hosting datacenters provide fire protection, lighting, and electricity, which may include uninterruptible power supplies (UPS). Akamai's highly distributed infrastructure reduces the impact of utility outages, as servers in functional datacenters can take over the workload of servers in unusable ones. Additionally, the following issues are addressed: Issue/Response 2

Motion detection Cameras that detect motion trigger alerts that are sent to Akamai s global NOCCs, which is staffed at all times. Authorized access All access requests to a Secure Content delivery system are logged in a NOCC ticket. The ticket indicates the time and place when someone will be inspecting the systems. If a camera detects motion at a time other than that specified in the NOCC ticket, it is considered as unauthorized access and triggers an alert. Unauthorized access The camera images are stored so that Akamai personnel can review them and address issues involving unauthorized access. Unauthorized access reporting Akamai s NOCCs receives an alert if there is any unauthorized access. In such event, the NOCCs would declare a severity 4 incident and notify Akamai s InfoSec team immediately to begin investigating the incident. InfoSec would investigate and address the incident until a determination is reached as to why an alert was triggered. Camera errors Controls are designed such that problems with the cameras will result in an alert being sent to the Akamai NOCC. Utilities failure Many hosting data centers provide fire protection, lighting, and electricity, which may include uninterruptible power supplies (UPS). Network failover Akamai's highly distributed infrastructure provides redundancy, as servers in one location can take over the workload of unusable servers in another one. Records Akamai tracks and maintains records of hardware in an internal database. 3

This includes logistical details as well as service tickets. 4

Akamai is the leading provider of cloud services for delivering, optimizing and securing online content and business applications. At the core of the company s solutions is the Akamai Intelligent Platform providing extensive reach, coupled with unmatched reliability, security, visibility and expertise. Akamai removes the complexities of connecting the increasingly mobile world, supporting 24/7 consumer demand, and enabling enterprises to securely leverage the cloud. To learn more about how Akamai is accelerating the pace of innovation in a hyperconnected world, please visit www.akamai.com and follow @Akamai on Twitter. Akamai is headquartered in Cambridge, Massachusetts in the United States with operations in more than 40 offices around the world. Our services and renowned customer care are designed to enable businesses to provide an unparalleled Internet experience for their customers worldwide. Addresses, phone numbers and contact information for all locations are listed on www.akamai.com/locations. 2014 Akamai Technologies, Inc. All Rights Reserved. Reproduction in whole or in part in any form or medium without express written permission is prohibited. Akamai and the Akamai wave logo are registered trademarks. Other trademarks contained herein are the property of their respective owners. Akamai believes that the information in this publication is accurate as of its publication date; such information is subject to change without notice