Five cloud security tips

709 views
603 views

Published on

Survey after survey continues to find that security is chief among the challenges with cloud computing. In fact, fewer than half of security and compliance officers feel that they have the technology they need to secure their cloud deployments!
Cloud management platforms can play a pivotal role in cloud security by centralizing the orchestration, governance and deployment of cloud applications, platforms and infrastructure across hybrid clouds. However, the Agility Platform stands alone in its ability to offer a policy-based governance and security model that directly and specifically helps Global 2000 enterprises effectively manage cloud workload security.

Published in: Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
709
On SlideShare
0
From Embeds
0
Number of Embeds
7
Actions
Shares
0
Downloads
12
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Five cloud security tips

  1. 1. Five Critical Ways to Improve Security Posture Across Clouds
  2. 2. Copyright © 2012 ServiceMesh, Inc. Proprietary and Confidential 2 The Cloud Security Challenge Fewer than half of security and compliance officers feel that they have the technology they need to secure their cloud deployments! Cloud management platforms can play a pivotal role in cloud security by centralizing the orchestration, governance and deployment of cloud applications, platforms and infrastructure across hybrid clouds.
  3. 3. Copyright © 2012 ServiceMesh, Inc. Proprietary and Confidential 3 Cloud Security Tip Number 1: Policy-based application and data governance is achieved through policies that can dictate which application workload may be placed in which cloud. These governance policies can extend to include user access controls and provisioning constraints. Policy Policy Policy Policy Governance/Security Roles Rights & Permissions Projects Orgs Network Infrastructure Compute Storage Applications & Platforms OS Agents/Utilities Middleware App Config. Data Code DevPoliciesOpsPolicies
  4. 4. Copyright © 2012 ServiceMesh, Inc. Proprietary and Confidential 4 Cloud Security Tip Number 2: Automate installation and configuration of security technologies including industry standards such as host intrusion-detection systems (HIDS), anti- virus, firewalls, vulnerability assessment and patch management. For IT, concerns regarding security (66%), integration stability and reliability (47%) and ability of cloud computing solutions to meet enterprise/industry standards (35%) challenge adoption. - IDG Enterprise Cloud Computing: Key Trends and Future Effects Report 2013
  5. 5. Copyright © 2012 ServiceMesh, Inc. Proprietary and Confidential 5 Cloud Security Tip Number 3: 5 OS & Platforms Agents/Utilities Governance Code Plan Develop Test Release Operate Code Code OS & Platforms Agents/Utilities Governance OS & Platforms Agents/Utilities Governance git Be sure your cloud management platform integrates with configuration management solutions such as Puppet and Chef to ensure configuration compliance to policy.
  6. 6. Copyright © 2012 ServiceMesh, Inc. Proprietary and Confidential 6 Cloud Security Tip Number 4: Cloud-based VMs running firewall policies can easily be configured and enforced with a cloud management platform– both in private and public cloud environments.
  7. 7. Copyright © 2012 ServiceMesh, Inc. Proprietary and Confidential 7 Cloud Security Tip Number 5: Cloud management platform policies can trigger security and vulnerability scans of VMs to ensure continuous security across cloud workloads.
  8. 8. servicemesh.com @servicemesh servicemesh.com/blog For more information, find us at: Thank You 8 LinkedIn Google+

×