Security Inspection Inc. Solutions to secure your network

Similar documents
NCTA Cloud Architecture

Security Issues in Cloud Computing


Fundamental Concepts and Models

Cloud Database Storage Model by Using Key-as-a-Service (KaaS)

Cloud Services Overview

IBM Cloud Security Draft for Discussion September 12, IBM Corporation

Private vs. Public Cloud Solutions

Virginia Government Finance Officers Association Spring Conference May 28, Cloud Security 101

Cloud Computing. Chapter 1 Introducing Cloud Computing

Cloud Courses Description

Public Clouds. Krishnan Subramanian Analyst & Researcher Krishworld.com. A whitepaper sponsored by Trend Micro Inc.

Cloud Courses Description

S E C U R I T Y A S S E S S M E N T : B o m g a r B o x T M. Bomgar. Product Penetration Test. September 2010

Cloud Computing for SCADA

Clouds on the Horizon Cloud Security in Today s DoD Environment. Bill Musson Security Analyst

Addressing Data Security Challenges in the Cloud

Cloud Computing. Chapter 1 Introducing Cloud Computing

Cloud Computing--Efficiency and Security

Trust but Verify. Vincent Campitelli. VP IT Risk Management

NETWORK ACCESS CONTROL AND CLOUD SECURITY. Tran Song Dat Phuc SeoulTech 2015

PROTECTED CLOUDS: Symantec solutions for consuming, building, or extending into the cloud

How To Understand Cloud Computing

THOUGHT LEADERSHIP. Journey to Cloud 9. Navigating a path to secure cloud computing. Alastair Broom Solutions Director, Integralis

Spotlight on Mainframe Security: Data Authenticity and Endpoint Security

Session 5. Mixing and matching Public, Private and Hybrid Clouds for maximum benefits

Cloud Security Specialist Certification Self-Study Kit Bundle

Licensing Guide for Partners. Leveraging Data Center Providers and Software Services Resellers

A.Prof. Dr. Markus Hagenbuchner CSCI319 A Brief Introduction to Cloud Computing. CSCI319 Page: 1

Table of Contents. Abstract... Error! Bookmark not defined. Chapter 1... Error! Bookmark not defined. 1. Introduction... Error! Bookmark not defined.

Securing the Cloud infrastructure with IBM Dynamic Cloud Security

Addressing Security for Hybrid Cloud

Cloud Security Implications for Financial Institutions By Scott Galyk Director of Software Development FIMAC Solutions, LLC

OVERVIEW OF MICROSOFT AZURE

Protecting Applications on Microsoft Azure against an Evolving Threat Landscape

Public Cloud Security: Surviving in a Hostile Multitenant Environment

Cloud Security Through Threat Modeling. Robert M. Zigweid Director of Services for IOActive

I D C T E C H N O L O G Y S P O T L I G H T. S e r ve r S e c u rity: N o t W h a t It U s e d t o Be!

Addressing the SANS Top 20 Critical Security Controls for Effective Cyber Defense

Cloud Security: Evaluating Risks within IAAS/PAAS/SAAS

CloudCheck Compliance Certification Program

How To Protect Your Cloud From Attack

Cloud Security & Risk Management PRESENTATION AT THE OPEN GROUP CONFERENCE

East African Information Conference th August, 2013, Kampala, Uganda. Security and Privacy: Can we trust the cloud?

Cloud Computing and Security Risk Analysis Qing Liu Technology Architect STREAM Technology Lab

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

International Journal of Scientific & Engineering Research, Volume 6, Issue 5, May ISSN

Outline. What is cloud computing? History Cloud service models Cloud deployment forms Advantages/disadvantages

Cloud Computing Technology

Proactively Secure Your Cloud Computing Platform

CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL

AskAvanade: Answering the Burning Questions around Cloud Computing

Top 10 Cloud Risks That Will Keep You Awake at Night

Capturing the New Frontier:

THE BLUENOSE SECURITY FRAMEWORK

Securing the Cloud with IBM Security Systems. IBM Security Systems IBM Corporation IBM IBM Corporation Corporation

Managing Cloud Computing Risk

FACING SECURITY CHALLENGES

Safeguarding the cloud with IBM Dynamic Cloud Security

Intrusion Detection from Simple to Cloud

Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1

CYBER AND IT SECURITY: CLOUD SECURITY FINAL SESSION. Architecture Framework Advisory Committee November 4, 2014

REGULATIONS FOR THE SECURITY OF INTERNET BANKING

10/25/2012 BY VORAPOJ LOOKMAIPUN CISSP, CISA, CISM, CRISC, CEH Agenda. Security Cases What is Cloud? Road Map Security Concerns

CLOUD COMPUTING OVERVIEW

Cloud Essentials for Architects using OpenStack

How to Keep a Cloud Environment Current, Secure and Available October 16, 2014

Cloud Computing Flying High (or not) Ben Roper IT Director City of College Station

The Case For A Cloud Access Security Broker

Certified Cloud Computing Professional VS-1067

SECURING CLOUD DATA COMMUNICATION USING AUTHENTICATION TECHNIQUE

The Evolving Threat Landscape and New Best Practices for SSL

Total Cloud Protection

Strategic Compliance & Securing the Cloud. Annalea Sharack-Ilg, CISSP, AMBCI Technical Director of Information Security

Cloud Computing. Making legal aspects less cloudy. Erik Luysterborg Partner Cyber Security & Privacy Belgium EMEA Data Protection & Privacy Leader

What Is The Cloud And How Can Your Agency Use It. Tom Konop Mark Piontek Cathleen Christensen

Security Issues in Cloud Computing

Cloud Security Introduction and Overview

Securing Privileges in the Cloud. A Clear View of Challenges, Solutions and Business Benefits

Fidelis XPS Power Tools. Gaining Visibility Into Your Cloud: Cloud Services Security. February 2012 PAGE 1 PAGE 1

Cloud models and compliance requirements which is right for you?

Securing and Auditing Cloud Computing. Jason Alexander Chief Information Security Officer

Windows Server 2003 End of Support. What does it mean? What are my options?

Technology & Business Overview of Cloud Computing

Credit Unions and The Cloud. By: Chris Sachse

CLOUD COMPUTING DEMYSTIFIED

Transcription:

Security Inspection Inc. TM Solutions to secure your network

Secure Cloud Utilization Strategies! responsibilities Out of 127 cloud providers surveyed, a recently released study showed that only 25% of cloud providers surveyed consider cloud computing security as one of their most important 1.

Secure Cloud Utilization Strategies Company and Individual Introduction What is the Cloud? Cloud computing architectures IaaS, PaaS, SaaS, etc. Benefits, and potential issues Mitigating security issues in the Cloud Security challenges and our solutions SI Fortinet based Cloud security solution Other SI Cloud security services

Company Introduction Security Inspection, Inc. is a full service team of IT security experts providing: Information Security Virtualization Services Private Cloud Services, Implementation Assessments, and Managed Cloud Security Social Engineering Vulnerability Assessments Governance-Risk-Compliance

What is the Cloud? Hosted applications E-mail, collaboration, and storage Many consumer and enterprise offerings Consumer: icloud, Amazon S3, etc Enterprise: Microsoft Azure, Red Hat CloudForms For our purposes, we'll focus on enterprise Managed hardware and operating systems Increase market leverage by reducing time to market, maintenance costs, and labor focus

Cloud Computing Architectures Public cloud Multi tenant environment leads to security concerns with non-public data Less expensive, less secure Private cloud Completely separate environment with respect to storage, hardware, and networking More expensive, more secure Hybrid cloud Combination of the above with sensitive data on private and public data in multi tenant environment Varied pricing and security based on solution mix

Benefits and potential issues Benefits of cloud architectures Ease of access by users Pay by usage models Reduced maintenance costs, downtime, and labor Potential issues from reduced security focus Ease of access also means increased exploitation vectors resulting from insecure networks Easing maintenance also potentially means giving up control Another Ponemon study estimates the average organizational cost of a data breach increased to $7.2 million, an average of $214 per compromised record 3

Risks of not securing data According to the CA/Ponemon survey, [t]he majority of cloud providers believe it is their customer s responsibility to secure the cloud and not their responsibility. They also say their systems and applications are not always evaluated for security threats prior to deployment to customers. 2 Whose responsibility is cloud security? Survey: 69% of cloud providers say it is the cloud users responsibility Only 35% of the actual users believe it is their own responsibility Trend Micro survey: of 1,200 executives surveyed, 43% who are using cloud services have experienced a data security lapse or issue with cloud service 4

Mitigating Security Issues in the Cloud Architecture and applications must provide four basic security features Authentication - Is a user who they claim to be? Authorization - Is a user authorized to perform attempted function? Encryption Removing the ability for man-in-the-middle situations (network) If data is compromised or disseminated, ensure it is unusable without keys or algorithmic operations Segmentation In the event unauthorized access does occur, limiting access to the rest of your data/network

Mitigating Security Issues in the Cloud For organizations bound to data handling standards, a fifth requirement is necessary Auditing of information system usage and data management Solutions include software and hardware solutions such as GFI LANGuard and FortiAnalyzer To maintain compliance and competitive advantage, all of the above requirements should be met

Mitigating Security Issues in the Cloud Alternative network connectivity models Currently, many cloud based applications face directly toward the internet with limited security infrastructure Alternative model:

Cloud Security Solution #1: Security as a Service

Cloud Security Solution #2: Virtualized Firewall

Other SI cloud security services Vulnerability assessments Using industry standard applications, SI can provide systematic, documented vulnerability assessments Compliance auditing Scheduled, comprehensive audits Reporting for technical and management Executives

Conclusion Maintaining a good security posture not only ensures the integrity of your data, but can also help avoid expensive litigation and loss of competitive advantage For more information, visit our web site at www.securityinspection.com or give us a call at 1 (855) SII-TECH.

References 1: Security of Cloud Computing Providers Study by CA Technologies / Ponemon Institute Full document available online at: http://www.ca.com/~/media/files/industryresearch/security-of-cloud-computing-providers-final-april-2011.pdf 2: Security of Cloud Computing Providers Study by CA Technologies / Ponemon Institute Full document available online at: http://www.ca.com/~/media/files/industryresearch/security-of-cloud-computing-providers-final-april-2011.pdf 3: Ponemon Cost of a Data Breach by Symantec / Ponemon Institute Full document available online at: http://www.symantec.com/about/news/resources/press_kits/detail.jsp?pkid=ponemon 4: Cloud Security Survey Global Executive Summary by Trend Micro Document available online at: http://es.trendmicro.com/imperia/md/content/uk/about/global_cloud_survey_exec_summary_final.pdf