• Share
  • Email
  • Embed
  • Like
  • Save
  • Private Content
TWSE - Intel Big Data & Cloud Summit 2013
 

TWSE - Intel Big Data & Cloud Summit 2013

on

  • 539 views

 

Statistics

Views

Total Views
539
Views on SlideShare
374
Embed Views
165

Actions

Likes
0
Downloads
4
Comments
0

1 Embed 165

http://storify.com 165

Accessibility

Categories

Upload Details

Uploaded via as Adobe PDF

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

    TWSE - Intel Big Data & Cloud Summit 2013 TWSE - Intel Big Data & Cloud Summit 2013 Presentation Transcript

    • INTEL CONFIDENTIAL1 Building Trust and Security for Taiwan Stock Exchange's Cloud Infrastructure with Intel® Trusted Execution Technology (TXT) KH Li APAC Solution Architect Enterprise Solution Sales, Intel Corp Email: kuo-hui.li@intel.com
    • INTEL CONFIDENTIAL2 Taiwan Stock Exchange (TWSE) Introduction • Established on October 23rd, 1961 • Matching system : FAST (Fully Automated Securities Trading) since May 3rd,1993 • Listed Securities : Stock, TDR, Warrant, Bond, ETF,… • Trading information: • Max Order Transaction : 5,433,362. • Max Match Transaction : 2,087,695. • Max Value : NT$ 326,462,532,039 (~US$10.88B) • Official website: http://www.twse.com.tw
    • INTEL CONFIDENTIAL3 TWSE Business and Technical Requirements  Cloud infrastructure needs to provide secured systems and trusted compute environments, including  Greater visibility into the security states of the hardware platforms (root of trust and platform attestations)  Production of automated and standardized reports on the configuration of the physical and virtual infrastructure  Controls based on the physical location of the server and location of the virtual machines (VMs) for the migration of these VMs onto acceptable servers, per specified policy  Collection of measured evidence that services infrastructure complies with security policies and regulated data standards
    • INTEL CONFIDENTIAL4 Internet Trusted Launch – Verified platform integrity Trusted Pools Compliance Support – enhancing audit-ability of cloud environment Trust and Security Use Models: Protection, Visibility and Control 1 2 3 Control VMs based on platform trust (and more) to better protect data Hardware enforced detection of launch components —reduces malware threat Hardware support for compliance reporting 1 2 3 Intel TXT- Addressing Trust & Compliance
    • INTEL CONFIDENTIAL5 TWSE TXT POC System Configuration
    • INTEL CONFIDENTIAL6 Use Cases: Addressing Trust & Compliance Measured Boot & Attestation TrustLevel: Measured Hypervisor VMVM Non-TXT Platform Hypervisor VMVM TXT Platform TrustLevel: Unknown Trustable Pools & Secure Migration Hypervisor VMVM Non-TXT Platform Hypervisor VMVM TXT Platform Hypervisor VMVM TXT Platform Config Mgmt Policy Enforce Engine Audit & Report SW ServicesMgm t SW Audit /Compliance Reporting Hypervisor VMVM TXT Platform 1 2 3
    • INTEL CONFIDENTIAL7 POC Results http://www.intel.com/content/dam/www/public/us/en/documents/white-papers/cloud-computing-txt-xeon-twse-whitepaper.pdf