Bezpečnosť dát v HP Cloude



Similar documents
From the Bottom to the Top: The Evolution of Application Monitoring

Changing the Enterprise Security Landscape

應 用 SIEM 偵 測 與 預 防 APT 緩 攻 擊

The Evolution of Application Monitoring

HP Cyber Security Control Cyber Insight & Defence

Connected Intelligence and the 21 st Century Digital Enterprise

Business white paper. Missioncritical. defense. Creating a coordinated response to application security attacks

CaaS Think as a bad guy Petr Hněvkovský, CISA, CISSP HP Enterprise Security

HP ENTERPRISE SECURITY. Protecting the Instant-On Enterprise

End-user Security Analytics Strengthens Protection with ArcSight

Be Fast, but be Secure a New Approach to Application Security July 23, 2015

HP Fortify Software Security Center

Secure Cloud Computing

Security Operation Centre 5th generation

HP NonStop Server Security and HP ArcSight SIEM

Security of Cloud Computing for the Power Grid

WAN security threat landscape and best mitigation practices. Rex Stover Vice President, Americas, Enterprise & ICP Sales

Addressing Security for Hybrid Cloud

Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst

Emerging Approaches in a Cloud-Connected Enterprise: Containers and Microservices

RETHINKING CYBER SECURITY Changing the Business Conversation

Find the intruders using correlation and context Ofer Shezaf

HP Atalla. Data-Centric Security & Encryption Solutions. Jean-Charles Barbou Strategic Sales Manager HP Atalla EMEA MAY 2015

Решения HP по информационной безопасности

Unified Security, ATP and more

Leading The World Into Connected Security. Dipl.-Inform., CISSP, S+ Rolf Haas Enterprise Technology Specialist Content Lead EMEA

State of Security Monitoring of Public Cloud

Enabling and Protecting the Open Enterprise

How To Create An Insight Analysis For Cyber Security

Redefining SIEM to Real Time Security Intelligence

I D C A N A L Y S T C O N N E C T I O N

Security Information & Event Management (SIEM)

Sikkerhet Network Protector SDN app Geir Åge Leirvik HP Networking

The Benefits of an Integrated Approach to Security in the Cloud

Accelerating Software Security With HP. Rob Roy Federal CTO HP Software

CyberArk Privileged Threat Analytics. Solution Brief

Security and Privacy

Assuring Application Security: Deploying Code that Keeps Data Safe

Kevin Hayes, CISSP, CISM MULTIPLY SECURITY EFFECTIVENESS WITH SIEM

Security Landscape of Cloud Computing

Threat Intelligence: What is it, and How Can it Protect You from Today s Advanced Cyber-Attacks A Webroot publication featuring analyst research

Software that provides secure access to technology, everywhere.

Can We Become Resilient to Cyber Attacks?

Top 8 Identity and Access Management Challenges with Your SaaS Applications. Okta White paper

CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL

Dynamic Security for the Hybrid Cloud

Becoming a Cloud Services Broker. Neelam Chakrabarty Sr. Product Marketing Manager, HP SW Cloud Products, HP April 17, 2013

Continuous Network Monitoring

Analyzing HTTP/HTTPS Traffic Logs

Enterprise Security and Risk Management

(S2.3) Security Spotlight: How cyber criminals can steal millions in seconds and how to fight back. Johannesburg

Identity & Access Management The Cloud Perspective. Andrea Themistou 08 October 2015

Speed Up Incident Response with Actionable Forensic Analytics

Copyright 2013, Oracle and/or its affiliates. All rights reserved.

Cyber intelligence in an online world

IBM QRadar Security Intelligence April 2013

Achieving Actionable Situational Awareness... McAfee ESM. Ad Quist, Sales Engineer NEEUR

APIs The Next Hacker Target Or a Business and Security Opportunity?

identity as the new perimeter: securely embracing cloud, mobile and social media agility made possible

WHITE PAPER SPLUNK SOFTWARE AS A SIEM

HP Business Service Management 9.2 and

A HELPING HAND TO PROTECT YOUR REPUTATION

Future Threat Landscape - How will technology evolve and what does it mean for cyber security?

Securing Privileges in the Cloud. A Clear View of Challenges, Solutions and Business Benefits

Cloud Access Security Broker. Ted Hendriks HP Atalla Pre-Sales Consultant, APJ Region HP Enterprise Security Products

PALANTIR CYBER An End-to-End Cyber Intelligence Platform for Analysis & Knowledge Management

The Cloud App Visibility Blindspot

Securing the Cloud infrastructure with IBM Dynamic Cloud Security

Rethinking IT and IT Security Strategies in an Era of Advanced Attacks, Cloud and Consumerization

Mucho Big Data y La Seguridad para cuándo?

WHITE PAPER Cloud-Based, Automated Breach Detection. The Seculert Platform

CLOUD COMPUTING An Overview

10/25/2012 BY VORAPOJ LOOKMAIPUN CISSP, CISA, CISM, CRISC, CEH Agenda. Security Cases What is Cloud? Road Map Security Concerns

NETWORK ACCESS CONTROL AND CLOUD SECURITY. Tran Song Dat Phuc SeoulTech 2015

How to survive in a world of Virtualization and Cloud Computing, where you even can t trust your own environment anymore. Raimund Genes, CTO

Stop advanced targeted attacks, identify high risk users and control Insider Threats

Mobile Protection. Driving Productivity Without Compromising Protection. Brian Duckering. Mobile Trend Marketing

Cisco & Big Data Security

The webinar will begin shortly

Discover 2014 Update Big Data changes everything. Roy Ritthaler Vice President, IT Operations Management

The transformation of client device and the rise of cloud computing

The Crisis You Didn t See

Unified Security Management and Open Threat Exchange

Mobility. Exploiting and Maintaining the New Face of Engagement. Huseyin Ozel CT, HP EMEA Enterprise Mobility September 2015

Performanta Pty Ltd. Company Profile. May Trust. Practical. Performanta.

Security Issues in Cloud Computing

Requirements When Considering a Next- Generation Firewall

Worldwide Security and Vulnerability Management Forecast and 2013 Vendor Shares

Top Eight Identity & Access Management Challenges with SaaS Applications. Okta White Paper

Applying the 80/20 approach for Operational Excellence. How to combat new age threats, optimize investments and increase security.

How To Manage Cloud Management

Secure & Unified Identity

Continuous Network Monitoring for the New IT Landscape. March 16, 2015 (Revision 4)

RE Think. IT & Business. Invent. IBM SmartCloud Security. Dr. Khaled Negm, SMIEEE, ACM Fellow IBM SW Global Competency Center Leader GCC

Cyber Security. Moderator: Marla J. Kreindler, Partner, Morgan, Lewis & Bockius LLP

Next Generation Security Strategies. Marc Sarrias Regional Sales Manager

Protect the data that drives our customers business. Data Security. Imperva s mission is simple:

Transcription:

Bezpečnosť dát v HP Cloude Ochrana dát a súkromia v cloudových službách Február 2013

Agenda TRENDY RIEŠENIA HP PRÍKLADY 2

Security awareness at board level Security leadership is under immense pressure Cyber threat Extended supply chain Financial loss Reputation damage Cost of protection 56% of organisations have been the target of a nation state cyber attack 44% of all data breach involved third-party mistakes $675m average cost associated with data breach 30% market cap reduction due to recent events 11% of total it budget spent on security TRUST sits at heart of the enterprise security response 3 Source: Copyright HP 2012 internal Hewlett-Packard data, Forrester Development Research, Company, Ponemon L.P. Institute The information contained herein is subject to change without notice.

Technology & security timeline Data freedom, cyber threat, tech complexity & IP value iphone 2007 Google 1998 Social media 2008 Video recording 1951 Internet 1992 Amazon YouTube 2005 HTML MP3 1998 ipod 2004 Kindle 2007 Tablet 2010 Television 1927 1990 1995 2000 2005 2010 2020 4

A New Threat Landscape Old world Traditional IT Attacks for fame Regulation New world Mobile, cloud, social, information Attacks for shame, Attacks for gain, cyber warfare Increasing cost and complexity 5

China Goverment hacking UNIT 61398 Goverment sponsored Advanced Persistent Threat group Cybersecurity firm Mandiant - believed to be the 2nd Bureau of the People s Liberation Army (PLA) General Staff Department s (GSD) 3rd Department, which is most commonly known by its Military Unit Cover Designator (MUCD) as Unit 61398. - APT1 has systematically stolen hundreds of terabytes of data from at least 141 organizations. - APT1 focuses on compromising organizations across a broad range of industries in English-speaking countries. - APT1 maintains an extensive infrastructure of computer systems around the world. - poor operational security choices, facilitating our research and allowing us to track their activities 6

Increasing security & privacy threats Requires new approach = everything secure, everything private Affiliated & organized crime groups are gaining increasing access and capabilities with which to breach security & privacy. Proliferation of mobile devices increases the number of access points for breaches to occur. Consumerization of IT, the mixed usage of IT equipment for professional and personal use, increases the potential for breaches and the use of same password. Relative lack of sophistication of IT users: in part due to increased complexity of IT increases their vulnerability and the opportunity for user s equipment to be co-opt for mass attacks. Ubiquitous use of Social Networking gives rise to increased opportunity for social engineering exploitation. 7

Security Industry Challenges USER ORIENTATION SECURITY BUILT-IN ANALYTICS & DYNAMIC MONITORING CYBER & HACKTIVISM SECURITY RISK & COMPLIANCE MOBILITY / CLOUD Identity & Authentication, User Awareness, Traditional Apps/Infrastructure ID/Profiles/Roles (IAM) Virtual, Device & HW level (Trusted Computing) Event Monitoring, Pattern & Correlation, Volume Collaboration Industry, Nation, Cybercrime, Hacktivist Policy, Single View, Integration of Services Devices, Web Software & Services, Public/Private Services 8

Collaboration Cloud is just one of many disruptive tech trends Open & extended Security of info capital Security 2.0 Proactive risk management Devices/data complexity Consumerization Mobility, device & social media Cloud Public, private, adoption Fortress Reactive perimeter security Big data Content, context, unstructured 9

Cloud services: adoption is tempered by uncertainty Security Control Data security & protection Scalability Auditing Governance LOB/IT CIO Performanc e Cost Service levels Compliance Reliability Availability 10 Security or related component is #1 concern/issue for most enterprises

Security is a major CIO challenge Security concerns prevent movement to the cloud 26% more pressing than closest challenge or barrier to implementation 11

What do we mean by cloud security? 1 Security for the cloud? Securely use cloud 2 (consumers) Security from the cloud? Security-as-a-Service 3 Security in the cloud? Embedded security (providers) 4 Security across clouds? Hybrid models, interoperability 12

Cloud models require different security solutions Hybrid cloud composition of two or more clouds Public cloud Sold to the public, mega-scale infrastructure Community cloud Shared infrastructure for specific community Attack surface increases Private cloud Enterprise-owned or leased 13

... and different roles & responsibilities regarding security Cloud Saa S Paa S SaaS: Software as a Service, generally provides application, data and infrastructure security, with varying degrees of compliance PaaS: Platform as a Service, may provide some additional security functions for IDM and secure application development security falls to app developer and customer IT operations IaaS IaaS: Infrastructure as a Service providers generally offer basic network & infrastructure security, firewalls, some tools but customer is generally responsible for implementation, operations, monitoring 14

But what is really new about cloud security? Many traditional security concerns are recast as a cloud problem... Many cloud security incidents are issues with web apps and data-hosting, but at greater scale - e.g. Phishing, downtime, data loss, weak passwords, compromised hosts running botnets, etc Unexpected side channels and covert channels arising from shared-resource environments in public services - Activity patterns need to be protected in addition to apps and data Reputation fate sharing: possible blacklisting or service disruption due to bad neighbors - Need mutual auditability (providers need to audit/monitor users) Longer trust chains: {SaaS to PaaS to IaaS} 15 Copyright Y.Chen, 2012 et.al, Hewlett-Packard What s New Development About Cloud Company, Computing L.P. Security? The information UC Berkeley, contained herein Jan.20, is subject 2010 to change without notice.

Are your applications & data The path of least resistance? Design apps to run in cloud 16

HP Enterprise Security Security Intelligence Platform

HP Enterprise Security Market leading products and services Security Information and Event Management Log Management Application Security Network Security Data Protection Threat Research Security Services One Team, One Vision ATALLA DATA SECURITY 18

HP Security Intelligence Platform The only security intelligence platform that gives clients the insight to proactively manage their specific enterprise security threats and risks Contextual Information Complete Visibility Research-Backed Automated, Proactive & Adaptive Hybrid (Physical/Virtual/Cloud) IT PERFORMANCE SUITE Security Intelligence Platform Information Information Operations Application ENTERPRISE SECURITY SERVICES Establish complete visibility across all applications and systems Analyze vulnerabilities in applications and operations to understand risk Respond adaptively to build defenses against the exploitation of vulnerabilities Measure security effectiveness and risk across people, process, and technology to improve over time 19

HP Business Risk Management Strategy Using Security Intelligence Platform Business Risk management & compliance Unify the security layers Security Users Applications Data Systems Networks Rollup to security intelligence Integrate Security & IT management IT Users Applications Data Systems Networks Cloud Virtual Mobile 20

Unify the security layers Provides Situational Awareness Traditional Security Monitoring Hybrid Security Monitoring 21

User and Application Risk Monitoring Top Blocked Departments Top Blocked Identities Top URLs Accessed Top Users Accessing Applications Top Bandwidth by Identity Top Blocked Sites Top Apps Attacked Top Application Attack Types 22

Integrate Security and IT Management IT-Operations Center Operations Bridge Event Consolidation SLM Service Health Reporting Dashboards Application Performance Management System Management Network Management BSM Foundation Run-Time Service Model 3rd Party Adapters Shared Services Security events/alerts Operational events/alerts Security - Operations Center Security Views Compliance Packs Threats Fraud Identity Dashboards Reports Threat Response Manager Log Aggregation Log/Event Collectors Event Correlation Cloud Applications Servers Database Network 23

Pro-Active Business Risk Management Are We Secure? at Risk? Business Risk Management IT-Ops Security-Ops Assets Policy Risks VM Business Risk centric: Heat maps - real-time analysis Long-term trending 24

HP Enterprise Security Solutions for Cloud Security

Use-Cases: ESP Cloud Security Solutions HP ESP solutions can support use-cases #1 & #2 now, and #3 in the future 1. Monitor user access to SaaS applications (e.g. SalesForce.com) Employee access from within enterprise network via corporate gateway Remote worker access directly to SaaS service provider 2. Monitor infrastructure hosted in Hybrid cloud environment (e.g. company data center) Employee access from within enterprise network to applications hosted in private cloud 3. Monitor infrastructure hosted in Public cloud (e.g. Amazon EC2) Employee access to application stack (LAMP: Linux, Apache, MySQL, Php) 26

HP Security Solutions for Cloud Deployments #1: Secure enterprise use of SaaS #3: Modular security controls for cloud instances anywhere SaaS Provider Cloud IAM ArcSight 27 IPS #2: Hybrid security controls for private clouds Virtual IPS Virtual Connectors Connectors

#1 Monitoring SaaS applications HP Cloud Connections Partners HP ArcSight monitors SaaS applications: Employee access via gateways (e.g. PingIdentity, Layer7, etc.) Remote worker access via API s provided by SaaS vendors (e.g. SalesForce) remote workers and many more Gateway HP ArcSight Enterprise employees 28

#2 Hybrid security controls SIE M LEGACY IT Connectors Application Scanning Appliance IPS HP TippingPoint Virtual IPS Virtual Connectors PRIVATE CLOUD Application Scanning Service 29

#3 Modular Security Controls The future Follows standard dev/ops process Select instance size/image to provision Add security modules Connectors for log syndication and SIEM Virtual IPS for network protection Fortify RTA for run-time app protection Add compliance controls/reporting Reports driven by connectors Controls link to security modules Cloud controls integrate with legacy environment security controls 30

HP Enterprise Security Cloud Connections Partner Program HP is launching the Cloud Connections Partner Program enabling users of HP ArcSight ESM to view user activity in cloud based applications CLOUD APPLICATIONS Hybrid analytics provide centralized views, security and compliance reporting across on-premise and cloud-based environments as customers deploy hybrid environments Initial partners: Salesforce.com, Box and Okta ON-PREMISE IT ENVIRONMENT 31

Summary

Summary: A CISO s path to the cloud Approach cloud security strategically, starting with quick wins Start with by securing enterprise use of SaaS Cloud identity and access management SaaS event monitoring Next, establish hybrid controls: Log syndication Application scanning Long term, add modular security controls to all clouds Connectors for security monitoring and compliance reporting Virtual IPS modules for virtual and physical network security Run-time protection against application vulnerabilities 33

Thank you Peter Mikeska (CiSA, CiSM, RHCE) Technology Services peter.mikeska@hp.com