SlideShare a Scribd company logo
1 of 11
Download to read offline
www.skyviewpartners.com                                                                                       6/7/2012




                                                                             Carol Woodbury, President
                                                                                 SkyView Partners, Inc.
                                                                             www.skyviewpartners.com
                                                                                     @carolwoodbury




                                                          (c) SkyView Partners, Inc, 2012.
                                                                 All Rights Reserved.                     1




                                                        (c) SkyView Partners, Inc, 2012.
                                                               All Rights Reserved.                       2




(c) SkyView Partners, Inc, 2012. All Rights Reserved.                                                               1
www.skyviewpartners.com                                                                         6/7/2012




                            Benefits:                        However:
                             Hardware                        Must meet
                             Support of the                   requirements of
                              hardware                         security policy
                             Software licensing              Legal requirements

                             Software maintenance            Compliance
                                                               requirements




                                                         (c) SkyView Partners, Inc, 2012.
                                                                All Rights Reserved.        3




                               Depends on the type of data




                                                         (c) SkyView Partners, Inc, 2012.
                                                                All Rights Reserved.        4




(c) SkyView Partners, Inc, 2012. All Rights Reserved.                                                 2
www.skyviewpartners.com                                                                            6/7/2012




                               EU Data Protection Laws
                                ◦ Currently being revised




                                                            (c) SkyView Partners, Inc, 2012.
                                                                   All Rights Reserved.        5




                            Determines
                             Default access
                             Encryption requirements
                             Retention requirements
                             Storage requirements
                             Disposal method (both printed and online)


                            While considering
                             Compliance requirements
                             Legal considerations



                                                            (c) SkyView Partners, Inc, 2012.
                                                                   All Rights Reserved.        6




(c) SkyView Partners, Inc, 2012. All Rights Reserved.                                                    3
www.skyviewpartners.com                                                                            6/7/2012




                               Data classification requirements don’t change just
                                because the data is now in the cloud




                                                            (c) SkyView Partners, Inc, 2012.
                                                                   All Rights Reserved.        7




                               Carefully plan the security and privacy aspects of cloud
                                computing solutions before engaging them (a cloud
                                provider.)
                               Understand the public cloud computing environment
                                offered by the cloud provider.
                               Ensure that a cloud computing solution satisfies
                                organizational security and privacy requirements.
                               Ensure that the client-side computing environment meets
                                organizational security and privacy requirements for cloud
                                computing.
                               Maintain accountability over the privacy and security of
                                data and applications implemented and deployed in public
                                cloud computing environments.

                                                            (c) SkyView Partners, Inc, 2012.
                                                                   All Rights Reserved.        8




(c) SkyView Partners, Inc, 2012. All Rights Reserved.                                                    4
www.skyviewpartners.com                                                                               6/7/2012




                               Encryption
                               Auditing (logging)
                               No passwords in cleartext
                               Access controls
                               Reporting
                               Incident response handling

                               What will a QSA or auditor say …?



                                                              (c) SkyView Partners, Inc, 2012.
                                                                     All Rights Reserved.         9




                               Where is the data physically located
                               Incident response handling
                                ◦ Do you and provider have the same definition of a breach?
                               Can your SLAs be fulfilled?
                                ◦ (think disaster-recovery)


                               As well as compliance requirements




                                                              (c) SkyView Partners, Inc, 2012.
                                                                     All Rights Reserved.        10




(c) SkyView Partners, Inc, 2012. All Rights Reserved.                                                       5
www.skyviewpartners.com                                                                                  6/7/2012




                               Questions for providers’ security practices:
                                ◦   Is admin (root) power limited to only those users needing it?
                                ◦   Who/What is logged?
                                ◦   Do administrators access systems via encrypted sessions?
                                ◦   What is the patch management strategy?
                                ◦   What anti-virus / anti-malware software is used?
                                ◦   Are the servers in compliance with
                                     PCI
                                     SOX
                                     HIPAA
                                ◦ Who are you audited by and can we see the results?

                                                                 (c) SkyView Partners, Inc, 2012.
                                                                        All Rights Reserved.        11




                               User management:
                                ◦ Process to integrate with HR to remove access?
                                     What about immediate removal for terminated
                                      employees/contractors?
                                ◦ Password composition rules?
                                ◦ Password change rules?




                                                                 (c) SkyView Partners, Inc, 2012.
                                                                        All Rights Reserved.        12




(c) SkyView Partners, Inc, 2012. All Rights Reserved.                                                          6
www.skyviewpartners.com                                                                                      6/7/2012




                               Logging:
                                ◦ Invalid sign on attempts
                                     Lock-out for excess attempts
                                ◦   Reads and changes to HIPAA or PCI data
                                ◦   Access attempts to data
                                ◦   Retention of the logs
                                ◦   Review of the logs

                               Network logging:
                                ◦ Connections
                                ◦ Data movement – what about DLP?

                                                                     (c) SkyView Partners, Inc, 2012.
                                                                            All Rights Reserved.        13




                               Because the service provider holds so much data, they
                                may become a victim of a targeted attack

                               However … provider likely has
                                ◦ Network monitoring
                                ◦ Trained personnel to recognize and respond to the attack
                                ◦ Knowledge / Hardware to prevent or limit the attack




                                                                     (c) SkyView Partners, Inc, 2012.
                                                                            All Rights Reserved.        14




(c) SkyView Partners, Inc, 2012. All Rights Reserved.                                                              7
www.skyviewpartners.com                                                                                   6/7/2012




                               Business level objectives
                               Responsibilities of both parties
                               Business continuity/disaster recovery
                               Redundancy
                               Maintenance
                               Data location
                               Data seizure
                               Provider failure
                               Jurisdiction
                               Brokers and resellers

                            http://www.ibm.com/developerworks/cloud/library/cl-
                            rev2sla.html?ca=drs-


                                                               (c) SkyView Partners, Inc, 2012.
                                                                      All Rights Reserved.           15




                               Security                               Incident response
                               Data encryption                        Transparency
                               Privacy                                Certification
                               Data retention and                     Performance definitions
                                deletion                               Monitoring
                               Hardware erasure,                      Auditability
                                destruction                            Metrics
                               Regulatory compliance                  Human interaction


                                                              (c) SkyView Partners, Inc, 2012. All
                                                                        Rights Reserved.             16




(c) SkyView Partners, Inc, 2012. All Rights Reserved.                                                           8
www.skyviewpartners.com                                                                              6/7/2012




                               Determine your organization’s security and compliance
                                requirements for the type of data going to the cloud
                               Put the appropriate SLA in place
                                ◦ Terminology / Communication is key – make sure you agree to
                                  each others’ definitions
                               Monitor the results to determine if SLA is being met




                                                             (c) SkyView Partners, Inc, 2012.
                                                                    All Rights Reserved.        17




                               Find your private and confidential data

                               Do not assume it doesn’t exist just because it’s not
                                supposed to be a on specific server or in a specific
                                database!




                                                             (c) SkyView Partners, Inc, 2012.
                                                                    All Rights Reserved.        18




(c) SkyView Partners, Inc, 2012. All Rights Reserved.                                                      9
www.skyviewpartners.com                                                                                 6/7/2012




                               Many organizations are realizing the benefits of
                                “private” clouds
                                ◦ Reduced hardware / software costs
                                ◦ Quicker patching
                                ◦ Consolidated security expertise
                                   Monitoring (NOC)
                                   Recognition and response to incidents
                                ◦ Consolidated logging (correlated events)
                                ◦ More layers of security (depending on the data requirements)




                                                                (c) SkyView Partners, Inc, 2012.
                                                                       All Rights Reserved.        19




                               Clouds specializing in meeting compliance needs:
                                ◦ PCI
                                ◦ HIPAA

                               Significantly more expensive but consider that with
                                public clouds you ‘get what you pay for.’




                                                                (c) SkyView Partners, Inc, 2012.
                                                                       All Rights Reserved.        20




(c) SkyView Partners, Inc, 2012. All Rights Reserved.                                                        10
www.skyviewpartners.com                                                                                                 6/7/2012




                               Service providers have been providing “cloud” services
                                for many years
                                ◦ Private / Specialized cloud – typically without the dynamic
                                  allocation of new resources
                               Security/Compliance/Legal requirements you make of
                                them are the same as what we’ve been discussing.




                                                                           (c) SkyView Partners, Inc, 2012.
                                                                                  All Rights Reserved.             21




                            Best practices and Certifications for Cloud Security
                             https://cloudsecurityalliance.org/


                            Guidelines on Security and Privacy in Public Cloud Computing – National Institute of
                            Standards and Technology (NIST) SP 800-144
                               http://csrc.nist.gov/publications/nistpubs/800-144/SP800-144.pdf

                            Cloud Computing Synopsis and Recommendations - – National Institute of Standards and
                            Technology (NIST) SP 800-146 – DRAFT
                             http://csrc.nist.gov/publications/drafts/800-146/Draft-NIST-SP800-146.pdf


                            Articles:
                             www.sans.org
                             www.isaca.org
                             Search ‘European cloud Computing Strategy’


                            Contact us at: info@skyviewpartners.com
                                             @carolwoodbury


                                                                           (c) SkyView Partners, Inc, 2012.
                                                                                  All Rights Reserved.             22




(c) SkyView Partners, Inc, 2012. All Rights Reserved.                                                                        11

More Related Content

Viewers also liked

Business continuity with SAP on IBM i
Business continuity with SAP on IBM iBusiness continuity with SAP on IBM i
Business continuity with SAP on IBM iCOMMON Europe
 
Practical web services for RPG lab exercises
Practical web services for RPG lab exercisesPractical web services for RPG lab exercises
Practical web services for RPG lab exercisesCOMMON Europe
 
IBM Systems Director Navigator for i
IBM Systems Director Navigator for iIBM Systems Director Navigator for i
IBM Systems Director Navigator for iCOMMON Europe
 
What's new with Zend server
What's new with Zend serverWhat's new with Zend server
What's new with Zend serverCOMMON Europe
 
Using Ruby on IBM i (i5/OS)
Using Ruby on IBM i (i5/OS)Using Ruby on IBM i (i5/OS)
Using Ruby on IBM i (i5/OS)COMMON Europe
 
Practical PHP by example Jan Leth-Kjaer
Practical PHP by example   Jan Leth-KjaerPractical PHP by example   Jan Leth-Kjaer
Practical PHP by example Jan Leth-KjaerCOMMON Europe
 
Compiling the Compiler
Compiling the CompilerCompiling the Compiler
Compiling the CompilerCOMMON Europe
 

Viewers also liked (7)

Business continuity with SAP on IBM i
Business continuity with SAP on IBM iBusiness continuity with SAP on IBM i
Business continuity with SAP on IBM i
 
Practical web services for RPG lab exercises
Practical web services for RPG lab exercisesPractical web services for RPG lab exercises
Practical web services for RPG lab exercises
 
IBM Systems Director Navigator for i
IBM Systems Director Navigator for iIBM Systems Director Navigator for i
IBM Systems Director Navigator for i
 
What's new with Zend server
What's new with Zend serverWhat's new with Zend server
What's new with Zend server
 
Using Ruby on IBM i (i5/OS)
Using Ruby on IBM i (i5/OS)Using Ruby on IBM i (i5/OS)
Using Ruby on IBM i (i5/OS)
 
Practical PHP by example Jan Leth-Kjaer
Practical PHP by example   Jan Leth-KjaerPractical PHP by example   Jan Leth-Kjaer
Practical PHP by example Jan Leth-Kjaer
 
Compiling the Compiler
Compiling the CompilerCompiling the Compiler
Compiling the Compiler
 

Similar to Security considerations for the cloud

Partner Webcast – Oracle Public Cloud for ISVs: Migrating Java EE and ADF app...
Partner Webcast – Oracle Public Cloud for ISVs: Migrating Java EE and ADF app...Partner Webcast – Oracle Public Cloud for ISVs: Migrating Java EE and ADF app...
Partner Webcast – Oracle Public Cloud for ISVs: Migrating Java EE and ADF app...Thanos TP
 
Securing Your Cloud Servers with Halo NetSec
Securing Your Cloud Servers with Halo NetSecSecuring Your Cloud Servers with Halo NetSec
Securing Your Cloud Servers with Halo NetSecCloudPassage
 
OAuth 101 & Secure APIs 2012 Cloud Identity Summit
OAuth 101 & Secure APIs 2012 Cloud Identity SummitOAuth 101 & Secure APIs 2012 Cloud Identity Summit
OAuth 101 & Secure APIs 2012 Cloud Identity SummitBrian Campbell
 
Software Defined Data Center: The Intersection of Networking and Storage
Software Defined Data Center: The Intersection of Networking and StorageSoftware Defined Data Center: The Intersection of Networking and Storage
Software Defined Data Center: The Intersection of Networking and StorageEMC
 
eFolder AppAssure Cloud Briefing_Public
eFolder AppAssure Cloud Briefing_PubliceFolder AppAssure Cloud Briefing_Public
eFolder AppAssure Cloud Briefing_PublicDropbox
 
Setting Up Your Mobile Testing Factory for 2013
Setting Up Your Mobile Testing Factory for 2013Setting Up Your Mobile Testing Factory for 2013
Setting Up Your Mobile Testing Factory for 2013SOASTA
 
Software Defined Data Center: The Intersection of Networking and Storage
Software Defined Data Center: The Intersection of Networking and StorageSoftware Defined Data Center: The Intersection of Networking and Storage
Software Defined Data Center: The Intersection of Networking and StorageEMC
 
Geting cloud architecture right the first time linthicum interop fall 2013
Geting cloud architecture right the first time linthicum interop fall 2013Geting cloud architecture right the first time linthicum interop fall 2013
Geting cloud architecture right the first time linthicum interop fall 2013David Linthicum
 
Code objects overview sep 2012
Code objects overview   sep 2012Code objects overview   sep 2012
Code objects overview sep 2012steveramsthel
 
Code objects overview sep 2012
Code objects overview   sep 2012Code objects overview   sep 2012
Code objects overview sep 2012steveramsthel
 
STPCon fall 2012: The Testing Renaissance Has Arrived
STPCon fall 2012: The Testing Renaissance Has ArrivedSTPCon fall 2012: The Testing Renaissance Has Arrived
STPCon fall 2012: The Testing Renaissance Has ArrivedSOASTA
 
Cloud security ely kahn
Cloud security   ely kahnCloud security   ely kahn
Cloud security ely kahnEly Kahn
 
eFolder BDR Partner Presentation
eFolder BDR Partner PresentationeFolder BDR Partner Presentation
eFolder BDR Partner PresentationDropbox
 
eFolder Webinar, Seven Great Reasons to Upgrade Legacy BDRs Now
eFolder Webinar, Seven Great Reasons to Upgrade Legacy BDRs NoweFolder Webinar, Seven Great Reasons to Upgrade Legacy BDRs Now
eFolder Webinar, Seven Great Reasons to Upgrade Legacy BDRs NowDropbox
 
Exploiting Linked Data via Filemaker
Exploiting Linked Data via FilemakerExploiting Linked Data via Filemaker
Exploiting Linked Data via FilemakerKingsley Uyi Idehen
 
AWS Meetup: Career Day 2019 - Lightning Talk with Cloud Career Path: DevOps E...
AWS Meetup: Career Day 2019 - Lightning Talk with Cloud Career Path: DevOps E...AWS Meetup: Career Day 2019 - Lightning Talk with Cloud Career Path: DevOps E...
AWS Meetup: Career Day 2019 - Lightning Talk with Cloud Career Path: DevOps E...AWS User Group - Thailand
 
Identity Management for the Cloud
Identity Management for the CloudIdentity Management for the Cloud
Identity Management for the CloudHorst Walther
 
eFolder Webinar: How One Partner Leverages Dell AppAssure and StorageCraft
eFolder Webinar: How One Partner Leverages Dell AppAssure and StorageCrafteFolder Webinar: How One Partner Leverages Dell AppAssure and StorageCraft
eFolder Webinar: How One Partner Leverages Dell AppAssure and StorageCraftDropbox
 
CA Security - Deloitte IAM Summit - Vasu
CA Security - Deloitte IAM Summit  - VasuCA Security - Deloitte IAM Summit  - Vasu
CA Security - Deloitte IAM Summit - VasuVasu Surabhi
 

Similar to Security considerations for the cloud (20)

Partner Webcast – Oracle Public Cloud for ISVs: Migrating Java EE and ADF app...
Partner Webcast – Oracle Public Cloud for ISVs: Migrating Java EE and ADF app...Partner Webcast – Oracle Public Cloud for ISVs: Migrating Java EE and ADF app...
Partner Webcast – Oracle Public Cloud for ISVs: Migrating Java EE and ADF app...
 
Securing Your Cloud Servers with Halo NetSec
Securing Your Cloud Servers with Halo NetSecSecuring Your Cloud Servers with Halo NetSec
Securing Your Cloud Servers with Halo NetSec
 
OAuth 101 & Secure APIs 2012 Cloud Identity Summit
OAuth 101 & Secure APIs 2012 Cloud Identity SummitOAuth 101 & Secure APIs 2012 Cloud Identity Summit
OAuth 101 & Secure APIs 2012 Cloud Identity Summit
 
Software Defined Data Center: The Intersection of Networking and Storage
Software Defined Data Center: The Intersection of Networking and StorageSoftware Defined Data Center: The Intersection of Networking and Storage
Software Defined Data Center: The Intersection of Networking and Storage
 
eFolder AppAssure Cloud Briefing_Public
eFolder AppAssure Cloud Briefing_PubliceFolder AppAssure Cloud Briefing_Public
eFolder AppAssure Cloud Briefing_Public
 
Setting Up Your Mobile Testing Factory for 2013
Setting Up Your Mobile Testing Factory for 2013Setting Up Your Mobile Testing Factory for 2013
Setting Up Your Mobile Testing Factory for 2013
 
Software Defined Data Center: The Intersection of Networking and Storage
Software Defined Data Center: The Intersection of Networking and StorageSoftware Defined Data Center: The Intersection of Networking and Storage
Software Defined Data Center: The Intersection of Networking and Storage
 
Geting cloud architecture right the first time linthicum interop fall 2013
Geting cloud architecture right the first time linthicum interop fall 2013Geting cloud architecture right the first time linthicum interop fall 2013
Geting cloud architecture right the first time linthicum interop fall 2013
 
Code objects overview sep 2012
Code objects overview   sep 2012Code objects overview   sep 2012
Code objects overview sep 2012
 
Code objects overview sep 2012
Code objects overview   sep 2012Code objects overview   sep 2012
Code objects overview sep 2012
 
STPCon fall 2012: The Testing Renaissance Has Arrived
STPCon fall 2012: The Testing Renaissance Has ArrivedSTPCon fall 2012: The Testing Renaissance Has Arrived
STPCon fall 2012: The Testing Renaissance Has Arrived
 
Cloud security ely kahn
Cloud security   ely kahnCloud security   ely kahn
Cloud security ely kahn
 
eFolder BDR Partner Presentation
eFolder BDR Partner PresentationeFolder BDR Partner Presentation
eFolder BDR Partner Presentation
 
WinWire_azure_session
WinWire_azure_sessionWinWire_azure_session
WinWire_azure_session
 
eFolder Webinar, Seven Great Reasons to Upgrade Legacy BDRs Now
eFolder Webinar, Seven Great Reasons to Upgrade Legacy BDRs NoweFolder Webinar, Seven Great Reasons to Upgrade Legacy BDRs Now
eFolder Webinar, Seven Great Reasons to Upgrade Legacy BDRs Now
 
Exploiting Linked Data via Filemaker
Exploiting Linked Data via FilemakerExploiting Linked Data via Filemaker
Exploiting Linked Data via Filemaker
 
AWS Meetup: Career Day 2019 - Lightning Talk with Cloud Career Path: DevOps E...
AWS Meetup: Career Day 2019 - Lightning Talk with Cloud Career Path: DevOps E...AWS Meetup: Career Day 2019 - Lightning Talk with Cloud Career Path: DevOps E...
AWS Meetup: Career Day 2019 - Lightning Talk with Cloud Career Path: DevOps E...
 
Identity Management for the Cloud
Identity Management for the CloudIdentity Management for the Cloud
Identity Management for the Cloud
 
eFolder Webinar: How One Partner Leverages Dell AppAssure and StorageCraft
eFolder Webinar: How One Partner Leverages Dell AppAssure and StorageCrafteFolder Webinar: How One Partner Leverages Dell AppAssure and StorageCraft
eFolder Webinar: How One Partner Leverages Dell AppAssure and StorageCraft
 
CA Security - Deloitte IAM Summit - Vasu
CA Security - Deloitte IAM Summit  - VasuCA Security - Deloitte IAM Summit  - Vasu
CA Security - Deloitte IAM Summit - Vasu
 

More from COMMON Europe

What's New in WebSphere Application Server
What's New in WebSphere Application ServerWhat's New in WebSphere Application Server
What's New in WebSphere Application ServerCOMMON Europe
 
Workload Groups overview updates
Workload Groups overview updatesWorkload Groups overview updates
Workload Groups overview updatesCOMMON Europe
 
Why i - Common Europe 2012
Why i - Common Europe 2012Why i - Common Europe 2012
Why i - Common Europe 2012COMMON Europe
 
The Ruby OpenSSL extension
The Ruby OpenSSL extensionThe Ruby OpenSSL extension
The Ruby OpenSSL extensionCOMMON Europe
 
IBM i Trends & Directions Common Europe 2012
IBM i Trends & Directions Common Europe 2012IBM i Trends & Directions Common Europe 2012
IBM i Trends & Directions Common Europe 2012COMMON Europe
 
IBM i Technology Refreshes Overview 2012 06-04
IBM i Technology Refreshes Overview 2012 06-04IBM i Technology Refreshes Overview 2012 06-04
IBM i Technology Refreshes Overview 2012 06-04COMMON Europe
 
IBM i 7.1 & TRs CEC 2012
IBM i 7.1 & TRs CEC 2012IBM i 7.1 & TRs CEC 2012
IBM i 7.1 & TRs CEC 2012COMMON Europe
 
DB2 Web Query whats new
DB2 Web Query whats newDB2 Web Query whats new
DB2 Web Query whats newCOMMON Europe
 
Access client solutions overview
Access client solutions overviewAccess client solutions overview
Access client solutions overviewCOMMON Europe
 
Php arrays for RPG programmers
Php arrays for RPG programmersPhp arrays for RPG programmers
Php arrays for RPG programmersCOMMON Europe
 
Open source report writing tools for IBM i Vienna 2012
Open source report writing tools for IBM i  Vienna 2012Open source report writing tools for IBM i  Vienna 2012
Open source report writing tools for IBM i Vienna 2012COMMON Europe
 
Introduction to My SQL
Introduction to My SQLIntroduction to My SQL
Introduction to My SQLCOMMON Europe
 
IBM CEC 2012 Storage june 11, 2012
IBM CEC 2012 Storage june 11, 2012IBM CEC 2012 Storage june 11, 2012
IBM CEC 2012 Storage june 11, 2012COMMON Europe
 
Getting started with PHP on IBM i
Getting started with PHP on IBM iGetting started with PHP on IBM i
Getting started with PHP on IBM iCOMMON Europe
 
Developing mobile applications for i using open source tools Venna 2012
Developing mobile applications for i using open source tools  Venna 2012Developing mobile applications for i using open source tools  Venna 2012
Developing mobile applications for i using open source tools Venna 2012COMMON Europe
 
DB2 for i 7.1 - Whats New?
DB2 for i 7.1 - Whats New?DB2 for i 7.1 - Whats New?
DB2 for i 7.1 - Whats New?COMMON Europe
 
Common Europe SAP on i for beginners
Common Europe SAP on i for beginnersCommon Europe SAP on i for beginners
Common Europe SAP on i for beginnersCOMMON Europe
 
Business value of PHP
Business value of PHPBusiness value of PHP
Business value of PHPCOMMON Europe
 
AD for i in modern world
AD for i in modern worldAD for i in modern world
AD for i in modern worldCOMMON Europe
 

More from COMMON Europe (20)

What's New in WebSphere Application Server
What's New in WebSphere Application ServerWhat's New in WebSphere Application Server
What's New in WebSphere Application Server
 
Workload Groups overview updates
Workload Groups overview updatesWorkload Groups overview updates
Workload Groups overview updates
 
Why i - Common Europe 2012
Why i - Common Europe 2012Why i - Common Europe 2012
Why i - Common Europe 2012
 
The Ruby OpenSSL extension
The Ruby OpenSSL extensionThe Ruby OpenSSL extension
The Ruby OpenSSL extension
 
IBM i Trends & Directions Common Europe 2012
IBM i Trends & Directions Common Europe 2012IBM i Trends & Directions Common Europe 2012
IBM i Trends & Directions Common Europe 2012
 
IBM i Technology Refreshes Overview 2012 06-04
IBM i Technology Refreshes Overview 2012 06-04IBM i Technology Refreshes Overview 2012 06-04
IBM i Technology Refreshes Overview 2012 06-04
 
IBM i 7.1 & TRs CEC 2012
IBM i 7.1 & TRs CEC 2012IBM i 7.1 & TRs CEC 2012
IBM i 7.1 & TRs CEC 2012
 
DB2 Web Query whats new
DB2 Web Query whats newDB2 Web Query whats new
DB2 Web Query whats new
 
Access client solutions overview
Access client solutions overviewAccess client solutions overview
Access client solutions overview
 
RPG investment
RPG investmentRPG investment
RPG investment
 
Php arrays for RPG programmers
Php arrays for RPG programmersPhp arrays for RPG programmers
Php arrays for RPG programmers
 
Open source report writing tools for IBM i Vienna 2012
Open source report writing tools for IBM i  Vienna 2012Open source report writing tools for IBM i  Vienna 2012
Open source report writing tools for IBM i Vienna 2012
 
Introduction to My SQL
Introduction to My SQLIntroduction to My SQL
Introduction to My SQL
 
IBM CEC 2012 Storage june 11, 2012
IBM CEC 2012 Storage june 11, 2012IBM CEC 2012 Storage june 11, 2012
IBM CEC 2012 Storage june 11, 2012
 
Getting started with PHP on IBM i
Getting started with PHP on IBM iGetting started with PHP on IBM i
Getting started with PHP on IBM i
 
Developing mobile applications for i using open source tools Venna 2012
Developing mobile applications for i using open source tools  Venna 2012Developing mobile applications for i using open source tools  Venna 2012
Developing mobile applications for i using open source tools Venna 2012
 
DB2 for i 7.1 - Whats New?
DB2 for i 7.1 - Whats New?DB2 for i 7.1 - Whats New?
DB2 for i 7.1 - Whats New?
 
Common Europe SAP on i for beginners
Common Europe SAP on i for beginnersCommon Europe SAP on i for beginners
Common Europe SAP on i for beginners
 
Business value of PHP
Business value of PHPBusiness value of PHP
Business value of PHP
 
AD for i in modern world
AD for i in modern worldAD for i in modern world
AD for i in modern world
 

Recently uploaded

Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfOverkill Security
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelDeepika Singh
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Zilliz
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024The Digital Insurer
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 

Recently uploaded (20)

Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 

Security considerations for the cloud

  • 1. www.skyviewpartners.com 6/7/2012 Carol Woodbury, President SkyView Partners, Inc. www.skyviewpartners.com @carolwoodbury (c) SkyView Partners, Inc, 2012. All Rights Reserved. 1 (c) SkyView Partners, Inc, 2012. All Rights Reserved. 2 (c) SkyView Partners, Inc, 2012. All Rights Reserved. 1
  • 2. www.skyviewpartners.com 6/7/2012 Benefits: However:  Hardware  Must meet  Support of the requirements of hardware security policy  Software licensing  Legal requirements  Software maintenance  Compliance requirements (c) SkyView Partners, Inc, 2012. All Rights Reserved. 3  Depends on the type of data (c) SkyView Partners, Inc, 2012. All Rights Reserved. 4 (c) SkyView Partners, Inc, 2012. All Rights Reserved. 2
  • 3. www.skyviewpartners.com 6/7/2012  EU Data Protection Laws ◦ Currently being revised (c) SkyView Partners, Inc, 2012. All Rights Reserved. 5 Determines  Default access  Encryption requirements  Retention requirements  Storage requirements  Disposal method (both printed and online) While considering  Compliance requirements  Legal considerations (c) SkyView Partners, Inc, 2012. All Rights Reserved. 6 (c) SkyView Partners, Inc, 2012. All Rights Reserved. 3
  • 4. www.skyviewpartners.com 6/7/2012  Data classification requirements don’t change just because the data is now in the cloud (c) SkyView Partners, Inc, 2012. All Rights Reserved. 7  Carefully plan the security and privacy aspects of cloud computing solutions before engaging them (a cloud provider.)  Understand the public cloud computing environment offered by the cloud provider.  Ensure that a cloud computing solution satisfies organizational security and privacy requirements.  Ensure that the client-side computing environment meets organizational security and privacy requirements for cloud computing.  Maintain accountability over the privacy and security of data and applications implemented and deployed in public cloud computing environments. (c) SkyView Partners, Inc, 2012. All Rights Reserved. 8 (c) SkyView Partners, Inc, 2012. All Rights Reserved. 4
  • 5. www.skyviewpartners.com 6/7/2012  Encryption  Auditing (logging)  No passwords in cleartext  Access controls  Reporting  Incident response handling  What will a QSA or auditor say …? (c) SkyView Partners, Inc, 2012. All Rights Reserved. 9  Where is the data physically located  Incident response handling ◦ Do you and provider have the same definition of a breach?  Can your SLAs be fulfilled? ◦ (think disaster-recovery)  As well as compliance requirements (c) SkyView Partners, Inc, 2012. All Rights Reserved. 10 (c) SkyView Partners, Inc, 2012. All Rights Reserved. 5
  • 6. www.skyviewpartners.com 6/7/2012  Questions for providers’ security practices: ◦ Is admin (root) power limited to only those users needing it? ◦ Who/What is logged? ◦ Do administrators access systems via encrypted sessions? ◦ What is the patch management strategy? ◦ What anti-virus / anti-malware software is used? ◦ Are the servers in compliance with  PCI  SOX  HIPAA ◦ Who are you audited by and can we see the results? (c) SkyView Partners, Inc, 2012. All Rights Reserved. 11  User management: ◦ Process to integrate with HR to remove access?  What about immediate removal for terminated employees/contractors? ◦ Password composition rules? ◦ Password change rules? (c) SkyView Partners, Inc, 2012. All Rights Reserved. 12 (c) SkyView Partners, Inc, 2012. All Rights Reserved. 6
  • 7. www.skyviewpartners.com 6/7/2012  Logging: ◦ Invalid sign on attempts  Lock-out for excess attempts ◦ Reads and changes to HIPAA or PCI data ◦ Access attempts to data ◦ Retention of the logs ◦ Review of the logs  Network logging: ◦ Connections ◦ Data movement – what about DLP? (c) SkyView Partners, Inc, 2012. All Rights Reserved. 13  Because the service provider holds so much data, they may become a victim of a targeted attack  However … provider likely has ◦ Network monitoring ◦ Trained personnel to recognize and respond to the attack ◦ Knowledge / Hardware to prevent or limit the attack (c) SkyView Partners, Inc, 2012. All Rights Reserved. 14 (c) SkyView Partners, Inc, 2012. All Rights Reserved. 7
  • 8. www.skyviewpartners.com 6/7/2012  Business level objectives  Responsibilities of both parties  Business continuity/disaster recovery  Redundancy  Maintenance  Data location  Data seizure  Provider failure  Jurisdiction  Brokers and resellers http://www.ibm.com/developerworks/cloud/library/cl- rev2sla.html?ca=drs- (c) SkyView Partners, Inc, 2012. All Rights Reserved. 15  Security  Incident response  Data encryption  Transparency  Privacy  Certification  Data retention and  Performance definitions deletion  Monitoring  Hardware erasure,  Auditability destruction  Metrics  Regulatory compliance  Human interaction (c) SkyView Partners, Inc, 2012. All Rights Reserved. 16 (c) SkyView Partners, Inc, 2012. All Rights Reserved. 8
  • 9. www.skyviewpartners.com 6/7/2012  Determine your organization’s security and compliance requirements for the type of data going to the cloud  Put the appropriate SLA in place ◦ Terminology / Communication is key – make sure you agree to each others’ definitions  Monitor the results to determine if SLA is being met (c) SkyView Partners, Inc, 2012. All Rights Reserved. 17  Find your private and confidential data  Do not assume it doesn’t exist just because it’s not supposed to be a on specific server or in a specific database! (c) SkyView Partners, Inc, 2012. All Rights Reserved. 18 (c) SkyView Partners, Inc, 2012. All Rights Reserved. 9
  • 10. www.skyviewpartners.com 6/7/2012  Many organizations are realizing the benefits of “private” clouds ◦ Reduced hardware / software costs ◦ Quicker patching ◦ Consolidated security expertise  Monitoring (NOC)  Recognition and response to incidents ◦ Consolidated logging (correlated events) ◦ More layers of security (depending on the data requirements) (c) SkyView Partners, Inc, 2012. All Rights Reserved. 19  Clouds specializing in meeting compliance needs: ◦ PCI ◦ HIPAA  Significantly more expensive but consider that with public clouds you ‘get what you pay for.’ (c) SkyView Partners, Inc, 2012. All Rights Reserved. 20 (c) SkyView Partners, Inc, 2012. All Rights Reserved. 10
  • 11. www.skyviewpartners.com 6/7/2012  Service providers have been providing “cloud” services for many years ◦ Private / Specialized cloud – typically without the dynamic allocation of new resources  Security/Compliance/Legal requirements you make of them are the same as what we’ve been discussing. (c) SkyView Partners, Inc, 2012. All Rights Reserved. 21 Best practices and Certifications for Cloud Security  https://cloudsecurityalliance.org/ Guidelines on Security and Privacy in Public Cloud Computing – National Institute of Standards and Technology (NIST) SP 800-144  http://csrc.nist.gov/publications/nistpubs/800-144/SP800-144.pdf Cloud Computing Synopsis and Recommendations - – National Institute of Standards and Technology (NIST) SP 800-146 – DRAFT  http://csrc.nist.gov/publications/drafts/800-146/Draft-NIST-SP800-146.pdf Articles:  www.sans.org  www.isaca.org  Search ‘European cloud Computing Strategy’ Contact us at: info@skyviewpartners.com @carolwoodbury (c) SkyView Partners, Inc, 2012. All Rights Reserved. 22 (c) SkyView Partners, Inc, 2012. All Rights Reserved. 11