Cloud Service Providers Overcoming security and compliance barriers



Similar documents
Mobility Challenges & Trends The Financial Services Point Of View

Microsoft Azure Cloud on your terms. Start your cloud journey.

Cloud Security. DLT Solutions LLC June #DLTCloud

AHLA. JJ. Keeping Your Cloud Services Provider from Raining on Your Parade. Jean Hess Manager HORNE LLP Ridgeland, MS

Cloud Computing Governance & Security. Security Risks in the Cloud

Cloud Risk Management: How to Consolidate your CSP and Corporate Risk Profile

SMS. Cloud Computing. Systems Management Specialists. Grupo SMS option 3 for sales

Mitigating Information Security Risks of Virtualization Technologies

How To Protect Your Cloud Computing Resources From Attack

Securing and Auditing Cloud Computing. Jason Alexander Chief Information Security Officer

Security Information & Policies

Moving beyond Virtualization as you make your Cloud journey. David Angradi

Sean Horne CTO EMC UKI. The leakage of Intellectual Property.. .and the risk of Privacy, Trustworthiness, Governance and Data Breaches

Strategic Compliance & Securing the Cloud. Annalea Sharack-Ilg, CISSP, AMBCI Technical Director of Information Security

How To Secure Cloud Computing

With Eversync s cloud data tiering, the customer can tier data protection as follows:

PCI Compliance and the Cloud: What You Can and What You Can t Outsource Presented By:

STREAM FRBC

Client Security Risk Assessment Questionnaire

IBM Cloud Security Draft for Discussion September 12, IBM Corporation

White Paper How Noah Mobile uses Microsoft Azure Core Services

How to ensure control and security when moving to SaaS/cloud applications

Solutions as a Service N.Konstantinidis Technical Director - MNG

Securing the private cloud

Microsoft Azure. White Paper Security, Privacy, and Compliance in

Ensuring security the last barrier to Cloud adoption

Remote Voting Conference

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:

Cloud Computing: The Next Big Thing?

Securing The Cloud. Foundational Best Practices For Securing Cloud Computing. Scott Clark. Insert presenter logo here on slide master

CONTROL. FLEXIBILITY. PERFORMANCE.

Healthcare: La sicurezza nel Cloud October 18, IBM Corporation

Cloud Computing: The atmospheric jeopardy. Unique Approach Unique Solutions. Salmon Ltd 2014 Commercial in Confidence Page 1 of 5

A white paper from Fordway on CLOUD COMPUTING. Why private cloud should be your first step on the cloud computing journey - and how to get there

Cloud Services Overview

COMMUNICATIONS ALLIANCE LTD

Dell Cloud Services. Services

Tips For Buying Cloud Infrastructure

How To Get A Cloud Security System To Work For You

We are Passionate about Total Security Management Architecture & Infrastructure Optimisation Review

Key Enablers for the Cloud Service Broker: Identity, Privacy, and Security

Cloud Security. Peter Jopling IBM UK Ltd Software Group Hursley Labs. peterjopling IBM Corporation

GoodData Corporation Security White Paper

Cloud Computing Thunder and Lightning on Your Horizon?

WHY we left. Amazon Web Services for. Regulatory Compliance Improved Efficiency NO SURPRISES. Why We Left Amazon Web Services 1

Cloud Based Disaster Recovery and Technologies Driving it Janson B. Hoambrecker

THOUGHT LEADERSHIP. Journey to Cloud 9. Navigating a path to secure cloud computing. Alastair Broom Solutions Director, Integralis

security in the cloud White Paper Series

Bridging the gap between local IT and Cloud services, keeping you in control

Bridging the gap between local IT and Cloud services, keeping you in control

Enterprise level security, the Huddle way.

How To Choose A Cloud Computing Solution

Caretower s SIEM Managed Security Services

Bridging the gap between local IT and Cloud services, keeping you in control

Security, Compliance & Risk Management for Cloud Relationships. Adnan Dakhwe, MS, CISA, CRISC, CRMA Safeway Inc. In-Depth Seminars D32

Cloud and VM Based Security

Cloud Security Introduction and Overview

Copyright 2015 EMC Corporation. All rights reserved. 1

Key Considerations of Regulatory Compliance in the Public Cloud

Clinical Trials in the Cloud: A New Paradigm?

Cloud Architecture and Management. M.I. Deen General Manager (Enterprise Solutions) Sri Lanka Telecom

Fujitsu Dynamic Cloud Bridging today and tomorrow

Cloud Computing. ( * info@etac.ae

Security Tool Kit System Checklist Departmental Servers and Enterprise Systems

Information Security: Cloud Computing

Security in the Cloud: Visibility & Control of your Cloud Service Providers

Architecting and Building a Secure and Compliant Virtual Infrastructure and Private Cloud

CloudDesk - Security in the Cloud INFORMATION

Bridging the gap between local IT and Cloud services, keeping you in control

Compliance and the Cloud: What You Can and What You Can t Outsource

Security Overview Enterprise-Class Secure Mobile File Sharing

Cautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work

Cloud Computing Risks & Reality. Sandra Liepkalns, CRISC sandra.liepkalns@netrus.com

Information Technology: This Year s Hot Issue - Cloud Computing

PCI Compliance for Cloud Applications

Cloud Security Trust Cisco to Protect Your Data

Ensuring Enterprise Data Security with Secure Mobile File Sharing.

Anypoint Platform Cloud Security and Compliance. Whitepaper

Alternatives to Legacy IT Systems: An Unbiased Look at the Current State of the Cloud Market

Recommendations and Considerations for Companies Migrating to the Cloud

MAXIMUM DATA SECURITY with ideals TM Virtual Data Room

New Risks in the New World of Emerging Technologies

Infrastructure as a Service (IaaS) Dancik International and Peak 10

Securing the Service Desk in the Cloud

Navigating The World of Cloud Computing

custom hosting for how you do business

Why Cloud CompuTing ThreaTens midsized enterprises and WhaT To do about it

The Magazine for IT Security. May issue 3. sör alex / photocase.com

Cloud Security: An Independent Assessent

Cloud Computing An Auditor s Perspective

CloudCheck Compliance Certification Program

PROTECTING YOUR VOICE SYSTEM IN THE CLOUD

Datacenters of the Past. Datacenter of the (New) Present Datacenter without boundaries. Devices

Securing the Cloud with IBM Security Systems. IBM Security Systems IBM Corporation IBM IBM Corporation Corporation

Life in the Cloud A Service Provider s View. Michael Smith mismith@akamai.com Security Evangelist

A Secure Cloud Platform For egaming

Security and Cloud Computing

PRIVACY, SECURITY AND THE VOLLY SERVICE

Cloud Security and Managing Use Risks

Transcription:

Cloud Service Providers Overcoming security and compliance barriers Dr Theodoros Stergiou, CEng, CPMM Security Solutions Product Manager & Cloud Security Officer

Agenda A brief introduction Security barriers Compliance barriers Overcoming issues through a real case study 2

Introduction By 2015 50% of CIOs expect to operate via The Cloud The cloud computing market is expected to grow from $74B in 2012 to $177B over the next two years 3 Source : Gartner

Cloud: The final Vision Just as electricity another essential utility did, a century ago, all computing is predicted to eventually move to the cloud. Cloud computing is being Computing power, Storage, Networking and internationally positioned as the next generation of Service Delivery, offering Application as a Service to the enterprise market. The Global yearly revenue of Cloud Services market is 25,5 B$ (2011) and is expected to reach 160 B$ by 2020. (source: Forrester, 2011) 4

Cloud Adoption Inhibitors 5 (*) 2013 Global IT leadership report, Savvis (*) 2013 3 rd Annual Survey, North Bridge

Cloud Benefits 6

The Big Issue FACT: Cloud Security (or Security in the Cloud) is regarded as a problem the primary inhibitor for cloud adoption Reality: However, Cloud Security should not be regarded a problem; rather, the means to build trust between the service provider and potential customers To properly address this issue, one must embrace: Service Provider perspective Customer perspective Overcoming security and compliance barriers is a multi-fold issue 7

Security Barriers Data privacy & leakage Communication secrecy Users lack of education Service Level Agreements Psychological reasons 8

Compliance Barriers Lack of an international standard regarding cloud computing security Diverse regulatory requirements per market region Lack of an official certification for cloud providers (starting to change though ) Cross-border and cross-market regulations (market verticals, etc) 9

A Real Case Study

Intracom Telecom Datacenter Solutions Facilities Converged Consolidation & Security & Management Networking Optimization Compliance Cloud Builder Innovative Solutions Cloud Security Cloud Planning & Design Cloud Implementation Operations organization consulting Backup aas Storage aas Desktop aas Security aas Disaster Recovery aas Strategy Engineering Services Solution Integration Audit & Validation Intracom Telecom 11

Our case study 12

Design Principles 13

Solutions for the Cloud Services Ladder Software as a Service (PACS) Application Services Platform as a Service Security as a Service Storage as a Service Backup as a Service Hybrid Cloud Disaster Recovery as a Service Infrastructure Services Desktop as a Service Virtual Machines Managed Hosting Colocation Data Centre Connectivity

Our target: a secured & compliant infrastructure 15 SECURITY & COMPLIANCE

Our Decision was to go with ISO 27001 Information Security is still the primary inhibitor of cloud adoption We needed a structured and process based approach to satisfy our business requirements We needed an internationally adopted standard to drive our efforts & ensure compliance We decided to certify our cloud, hosting & collocation services against ISO 27001 16

Governance controls Cloud Information Security Framework Cloud Information Security Committee ISMS based on ISO 27001 Continuous improvement risk treatment plan Consideration (by design & implementation) of: Cloud Security Alliance (CSA) ENISA ADAE 165/2011 DPA PCI DSS "Cloud Security Benchmark: Top 10 CSPs by CloudeAssurance, for 2013Q2, 2013Q3 Security, Trust and Assurance Registry (STAR), Cloud Security Alliance 17

Addressing Compliance ADAE (Hellenic authority for communication security & privacy) Security & privacy of subscriber information Contractual requirement with HOL DPA (Data Protection Authority) Data security & privacy of subscriber information Applicability particularly for PACS Laws 2472/97, 3674/08 adaptations of EU Data Protection Directive 95/46/EC PCI DSS (Payment Card Industry Data Security Standard) We also considered Cloud Security Alliance (CSA) ENISA (European Network and Information Security Agency) ISO 27001 is the basis for complying to legal & regulatory requirements 18

Technical Controls Network & Perimeter security FW, IDS/IPS, VPN, VLANs, Network segmentation Physical and Environmental controls Strong authentication controls Encrypted communication channels System security Server Protection Security Information and Event Management User & privilege access management Patch & Configuration management Virtualisation Security Application security Web application firewall Source code reviews Data security Data leakage prevention Data encryption (wherever applicable; e.g. BaaS AES-256) 19

Operational Controls Dedicated operations organization and delivery mechanism Cloud Services Operations Centre (CSOC) Network & Security Operations Centre 24x7x365 active 20

Our Added Value The unique expertise gained from being engaged in the full life cycle of the project coupled with our technological proficiency, make Intracom Telecom the ideal partner to rely on for creating your public or private cloud! 21

References First Public Cloud from GreekTelco provider Virtual Private Cloud First PACS deployment on Public Cloud Private Cloud for Greek Academic Society Focus on SMB Market Cloud provides VMs Backup Storage Security Design, Deployment, Operations by ICOM Dedicated Hardware Reuse of Public Cloud Networking Security Virtualisation platform Orchestration platform Backup platform Design, Deployment & Operations by ICOM Offered as SaaS Hosted in the Public Cloud Infrastructure Design, Deployment & Operations by ICOM Open Source based cloud Private Cloud provides VMs Storage Virtual private clouds Infrastructure deployed by ICOM 22

There is a lot of choice out there And many Paths can be followed 23

Let us help you One size does not fit all 24

How we can help you Planning Phase: Design and Implementation Phase: Cloud Data Center Security Operations Automation 25