Intel SaaS Security Playbook
Upcoming SlideShare
Loading in...5

Intel SaaS Security Playbook



Learn about Intel's approach to securing data and applications in the public cloud.

Learn about Intel's approach to securing data and applications in the public cloud.



Total Views
Views on SlideShare
Embed Views



2 Embeds 7 5 2


Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
Post Comment
Edit your comment
  • 2

Intel SaaS Security Playbook Intel SaaS Security Playbook Presentation Transcript

  • SaaS Security Playbook Securing data and applications in the public cloud
  • Legal Notices This presentation is for informational purposes only. INTEL MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS SUMMARY. Intel, and the Intel logo are trademarks of Intel Corporation in the U.S. and/or other countries. * Other names and brands may be claimed as the property of others. Copyright © 2014, Intel Corporation. All rights reserved. 1
  • Social Mobile Analytics Cloud The SMAC Stack SMAC is Changing the Way We Do Business 3
  • The SMAC Stack Requires Agile Security Capabilities • Enable movement of diverse information to more places • Variety and growth in devices, internet touch points, and access methods • More custom mobile applications and services within the enterprise • The need to adopt standard applications for SaaS in the public cloud MobileSocial CloudAnalytics The conversation is no longer about which applications and data will move to the cloud, but rather which applications and data will stay on premise. 4
  • Public Cloud Requires a Playbook Legal Security SMEs Architects Privacy Investigations E-Discovery External Pen Tester Risk Manager Playbook Architects Security Engineers Product Owners Legal Privacy Enterprise Provider Tenant Business Requirements Use Cases Information Classification Risk Review 5
  • Steps to Develop a SaaS Security Playbook Educate your team on SaaS Know your data and inventory Understand how to calculate & mitigate risk Define security controls responsibility Perform security reviews during SaaS lifecycle 1 2 3 54 6
  • Lessons Learned 7 • Just as enterprise applications and data are moving to SaaS, security controls are also moving to SaaS. • Decide which security controls will remain internally hosted and managed vs. externally hosted and externally managed. • Carefully evaluate SaaS providers as some controls are immature and the ecosystem is evolving. • Consider short-term contracts to allow flexibility to move to a new supplier if capabilities or roadmaps no longer align to risk tolerance.
  • 8