• Save
Hp Fortify Cloud Application Security
Upcoming SlideShare
Loading in...5
×
 

Hp Fortify Cloud Application Security

on

  • 1,675 views

 

Statistics

Views

Total Views
1,675
Views on SlideShare
1,667
Embed Views
8

Actions

Likes
1
Downloads
0
Comments
0

2 Embeds 8

http://www.linkedin.com 7
https://www.linkedin.com 1

Accessibility

Categories

Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment
  • So much has been written, advertised and discussed about cloud computing, it is appropriate to define the term for common understanding. Cloud computing generally describes a method to supplement, consume and deliver IT services over the Internet. Web-based network resources, software and data services are shared under multi-tenancy and provided on-demand to customers. It is this central tenet of sharing - and the standardization it implies - that is the enabler of cloud computing’s core benefits. Cloud computing providers can amortize their costs across many clients and pass these savings on to them. This paradigm shift in computing infrastructure was a logical byproduct and consequence of the ease-of-access to remote and virtual computing sites provided by the Internet. The U.S. National Institute of Standards & Technology (NIST) defines four cloud deployment models: Community Cloud – Shares infrastructure between several organizations from a specific community with common concerns (e.g., security, compliance, jurisdiction), whether managed internally or by a third-party and hosted internally or externally. Public Cloud – The cloud infrastructure is provisioned by the cloud provider for open use by the general public. It may be owned, managed, and operated by a business, academic, or government organization, or some combination of them. Private Cloud – Infrastructure provisioned solely for a single organization, whether managed internally or by a third-party and hosted internally or externally. Hybrid Cloud – A composition of two or more clouds (private, community, or public) that remain unique entities but are bound together, offering the benefits of multiple deployment models. It can also be defined as multiple cloud systems that are connected in a way that allows programs and data to be moved easily from one deployment system to another.
  • The cloud helps you in two ways: by reducing the costs for operating your business and at the same time increase business agility and flexibility.You need to start testing all your applications immediately. However, this can be an overwhelming endeavor. You need large upfront capital and human investments: Hardware to procure, setup and maintain for the test/ staging environment Software to procure, install and maintain to automate the testing People with the right expertise and experience in security to hire, train and retain Process to define and refine so that everything is standardized and efficient
  • Some of the symptoms of that problem is that it takes an incredibly long time to get a server up and running and an application up and running.Multiple organizations, different areas of expertise whether it be server, storage, network and management, facilties. Whenever you plug in a server into this infrastructure, you have to cable it up to all those domains, but its not just the cable clutter if you will that is slowing things down, its also that every time you do one of these things, theres a process associated with it. And that process has a lot of manual overhead as well. So the end result is that the architecture that we have built in the last 10-15 years in the data center, kind of the rack, stack and wired world as its called in the past, this architecture forces some incredible organizational complexity on the customers when they go to a larger deployment. Complexity in terms of phy. As well as process complexity.We understand what the problem is and where it came from.[this slide is a simplification of the time-consuming process of standing up complex infrastructure. Make sure the customer sees their own process in all or part of the diagram]To provision new application infrastructure can takes weeks or months due to complexity. This process typically involves reviews and approvals, meetings and more meetings, plus the unpacking and implementation of the systems. The bottom left hand corner reflects the siloed nature of data center teams that must coordinate the build process across servers, network, storage and facilities, as in the previous slide. These meetings, handoffs and wait times between teams are just one aspect of the complexity in the overall provisioning process. [Note stop sign and heading back to the beginning in an endless loop] And sometimes the process can get derailed, requiring a return to the starting point and creating further delays.
  • Key pointsMany business leaders recognize this and are already moving towards adopting cloud services faster than many IT leaders are comfortable with.Business users have been quick to recognize the cloud’s advantages in speeding innovation, accelerating business processes, and reducing time to revenue. The increasing simplicity of rich cloud services, combined with an increasing level of IT sophistication of the consumers and employees of modern enterprises has resulted in pressure being applied to IT to speed the adoption of cloud services, and in some cases even bypassing IT and signing up for public cloud services like those from Salesforce and Google, often accessed over a smartphone, tablet or laptop owned and managed by the employee instead of the one traditionally provided to them by the enterprise.In theory this is great news, especially if you’re a service provider, but the reality is that cloud adoption will stall in the enterprise unelss we can address a number of critical challenges. Enterprise IT leaders that have been slower to adopt cloud solutions cite well-founded concerns about the challenges of maintainging security, service levels and a portfolio governance seamlessly across the entire IT value chain while ensuring that the decisions they make about cloud technology suppliers today don’t prevent them from innovating in the future.
  • To succeed, we need to rethink the role of the CIO and of IT. Moving from IT as a sole “supplier” or builder of services, to becoming the builder AND the broker of IT services. That means going beyond building world-class, reliable services inside the datacenter, but to create a core competency in aligning business needs with the optimal mix of internally and externally available services and then seamlessly blending them into a reliable, secure and compliant end-to-end experience.Starting with being able to source and consume the services you need from the market – building a network of suppliers you trust that can be relied upon to deliver at a predictable price and performance.CIO’s also need build a capability to act as an internal service provider, matching the transparency and flexibility of externally available services for those areas where either economies of scale, competitive advantage, risk or compliance mean that it makes more sense to provide their own services.No matter whether they seek to leverage public or private cloud services, both business and IT processes require transformation if they are to maximize the benefits of cloud technologies and ready the enterprise for accelerated innovation and improved agility.Finally, CIO’s need to manage and secure the entire IT value chain using the same consistent, seamless tools and processes or they risk creating silos that introduce cost, complexity and risk to hybrid environments.
  • We think that cloud is the third generation of computing, after mainframes and client server. It actually represents the maturation of the Internet. It is important to have a common definition of the cloud.
  • The slide above offers Gartner’s definition of cloud services, as well as fundamental characteristics which have progressively attracted consensus in the market. Almost everyone agrees today that cloud is an “evolved” way of delivering and consuming services, that leverages new technologies such as virtualization and automation, but also changes in the mindset of consumers (e.g: it is now totally accepted to wire money from your account to another one by using the internet portal of your bank). Some people would argue that is it essentially about leveraging new business models, or “consuming by the glass”, which is a drastic change in how IT use to deliver service (see the dedicated whitepaper on this).Also, when we talk about “what” we deliver as a service, we should be more specific: if we look at the typical technology layers within the enterprise, the majority of our customers talk about infrastructure, platform and applications. Cloud is enabling the delivery and consumption of those layers “as a service”.
  • We use NIST’s cloud definition as the standard. It is important to understand that there are many different types of clouds: SaaS, a full business application, PaaS, a rapid application development environment, IaaS, basic compute and storage. They can be deployed in different ways, but they are all characterized as resource pooling with elasticity, multi-tenancy and metered serviceCloud Computing – a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction. Cloud Deployment Models Community Cloud – Shares infrastructure between several organizations from a specific community with common concerns (e.g., security, compliance, jurisdiction), whether managed internally or by a third-party and hosted internally or externally. Public Cloud – The cloud infrastructure is provisioned by the cloud provider for open use by the general public. It may be owned, managed, and operated by a business, academic, or government organization, or some combination of them. Private Cloud – Infrastructure provisioned solely for a single organization, whether managed internally or by a third-party and hosted internally or externally. Hybrid Cloud – A composition of two or more clouds (private, community, or public) that remain unique entities but are bound together, offering the benefits of multiple deployment models. It can also be defined as multiple cloud systems that are connected in a way that allows programs and data to be moved easily from one deployment system to another. Cloud Service Models Software as a Service (SaaS) – Employs the provider’s applications running on a cloud infrastructure. The applications are accessible from various client devices through either a thin client interface, such as a web browser (e.g., web-based email), or a program interface. The provider manages or controls the underlying cloud infrastructure with the possible exception of limited user-specific application configuration settings. Platform as a Service (PaaS) – Consumer-created or acquired applications supported by the provider are deployed onto the cloud infrastructure which the provider manages or controls. The consumer has control over the deployed applications and possible configuration settings for the application-hosting environment. Infrastructure as a Service (IaaS) – The consumer provisions processing, storage, networks, and other fundamental computing resources where the consumer is able to deploy and run arbitrary software, which can include operating systems and applications. The provider manages or controls the underlying cloud infrastructure while the consumer has control over operating systems, storage, and deployed applications; and possible limited control of select networking components (e.g., host firewalls). With IT transformation to the cloud, many of the traditional layers have been abstracted from customers perspective. Customers care more about who is accessing which application/data, and less about which platform the application is running on. Cloud Service Providers have increasing security responsibilities as they move from IaaS to PaaS, to SaaS.IaaS: For example, a LAMP stack (Linux, Apache web-server, MySQL DB, and Perl/PHP/Python) deployed on Amazons EC2 would be classified as a public off-premise, 3rd party managed IaaS solution, even if the instances and applications/data contained within them are owned by the Cloud consumer. Here Amazon is responsible for Infrastructure Security for the Physical and Network level. The consumer is responsible for securing the O/S, Apache Web-server and the MySQL DB.PaaS: Google App Engine includes – dynamic web-server, peristent storage, automatic scaling and load balancing, a Java/Python runtime and development environment, task queues, etc. Here Google provides the tools to secure the platform (e.g. JVM) and application by providing tools to integrate with Google accounts.SaaS: SalesForce.com – provides a purposeful set of applications that are hosted in the cloud. SalesForce.com takes care of protection of all layers – physical, network, system, database, application and users.
  • The security of the cloud depends not only the physical location of the assets (internal or external), but also the sensitivity of the information, who is consuming the information (multi-tenant Vs single tenant), and who is responsible for the governance, security, and compliance.Security risks depend on:Data classification of the assets, resources, and information being managed?Who manages them and how?Which controls are selected and how they are integrated?Compliance requirements?
  • Fortify gives you advanced technologies to ensure your applications are secure. Fortify inspects applications at the source code level (static testing) and while they are running (dynamic testing). Fortify supports more languages than any other application security vendor with significant strengths in the area of mobile application security. But it’s not just built for custom applications, Fortify and determine if vulnerabilities exist in commercial, custom and open source activities. And even more differentiated, Fortify can be delivered as a software you purchase or as a service. With unmatched flexibilityand depth of coverage, Fortify ensures you have a world class application security program in place.
  • Fortify gives you advanced technologies to ensure your applications are secure. Fortify inspects applications at the source code level (static testing) and while they are running (dynamic testing). Fortify supports more languages than any other application security vendor with significant strengths in the area of mobile application security. But it’s not just built for custom applications, Fortify and determine if vulnerabilities exist in commercial, custom and open source activities. And even more differentiated, Fortify can be delivered as a software you purchase or as a service. With unmatched flexibility and depth of coverage, Fortify ensures you have a world class application security program in place.You simply upload an application’s binaries and/or provide a URL for testing, using a highly secure cloud environment designed to safeguard sensitive uploads and intellectual property. HP Fortify on Demand then conducts a static and/or dynamic test and security experts verify the results. It presents correlated findings in an unbiased, tamper-proof report with results in just days, regardless of application size.

Hp Fortify Cloud Application Security Hp Fortify Cloud Application Security Presentation Transcript

  • HP FortifyCloud SecurityNameTitleEnterprise Security© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • The motivation© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • Suddenly, the cloud is everywhereYou hear buzzwords like… Private Hybrid clouds clouds Public clouds Community clouds … but, what does this all mean?3 © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • Why all the interest in the cloudTwo primary reasons Reduce costs: • Hardware to procure, setup and maintain $ • Software to procure, install and patch • Employees to hire, train and retain Increase agility: • Instant provisioning and self service • Scale resources to meet business demands • Mobility and always on access for employees4 © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • Anatomy of a business pain point: an example Business selects Architecture and Evaluation/ POC Purchase Order placed application product review approved IT is too slow: • Many people • Many steps/ tasks More meetings Unpack and install in staging Hardware purchased and Planning meetings • Many weeks/ delivered months • Prone to errors Coordinate build Change control Re-cable, move User acceptance process approvals into production testing environment The whole process can take months! Weeks Months5 © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • No wonder, the business is sidestepping IT ―..developers are bypassing IT and putting applications onto public clouds at a rate 5x greater than IT thinks‖ …leading to shadow IT departments with increased risk for the business Source: You’re Not Ready For Internal Cloud, by James Staten, Forrester Research, Inc., July 26, 20106 © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • The cloud opportunity Business Business is adopting cloud 5x faster than IT Cloud can benefit the organization IT • Increase time to value • Speed innovation • Accelerate business processes IT departments recognize the benefits, but concerns are slowing them down: • 70% CIOs have security top of mind1 • 75% CIOs demand high SLA guarantees for performance and availability2 • 63% Require integration of internal & external services2 • 79% concerned about lock-in2 1. Source: Goldman Sachs Equity Research, January 2011; 2. Source: IDC, Enterprise Panel Survey, November 20107 © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • With the cloud, IT’s role becomes morestrategicAs the builder and broker of servicesBuild on-premises, Transform legacy Manage across legacy Consumeprivate and hybrid cloud infrastructure and applications and cloud off-premises, publicservices applications and assets services processes Traditional Public Private …. while doing this all securely8 © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • Key to broad cloud adoption and deployment:Trust Security Service level Compliance Control agreement Before the benefits and economics of cloud computing can be realized, organizations require a trusted cloud service9 © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • The solution© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • What is cloud?Third era of computing 1960s 1980s 2000s Mainframe Client server Cloud11 © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • Cloud computing defined―Cloud computing is a style of computing where scalable and elastic IT-enabledcapabilities are delivered as a service to customers using internet or intranettechnologies.‖ Key characteristics: Elastic: scale on demand to add IT as a or remove resources as needed service Shared: share a pool of resources Enabling to build economies of scale Metered: tracked with usage Compute as a utility metrics to enable multiple payment models Source: Gartner, Inc., Oct 200912 © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • Cloud computing in pictures User management Broad Essential network Rapid Measured On-demandcharacteristics access elasticity service self-service Application Application Application Resourcing pooling Application Application platform Platform SaaS Service Software as a Platform as a Infrastructure as O/S O/S Image models Service (SaaS) Service (PaaS) a Service (IaaS) PaaS Network Deployment IaaS models Physical Public Private Hybrid Community Consumer responsible Provider responsible 13 © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. Source: NIST
  • Security needs for cloud computingSame as the security controls in traditional, on-premise IT infrastructure App Applications SDLC, Binary Analysis, Scanners, WAFs, Transactional Security Information DLP, CMF, Database Activity Monitoring, Encryption Management SIEM, GRC, IAM, VA/VM, Patch Mgmt, Configuration Mgmt Network NIDS/NIPS, Firewalls, DPI, Anti-DDOS, QoS, DNSSEC Trusted computing Hardware, Software, RoT & API’s Compute & storage Host-based Firewalls, HIDS/HIPS, Encryption, FAM Physical Physical Access, CCTV, Guards Source Cloud Security Alliance 201114 © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • Cloud application security concerns App Will we be Is it compliant? Are we secure? compromised? • Does the application meet all • Is the application securely • Has the provider’s cloud regulatory, legal and industry designed and developed for infrastructure been vigorously requirements? the cloud? tested? • Will the cloud provider • Has the legacy application • In this shared guarantee 24x7 SLA access been evaluated for cloud environment, are other to the application? readiness before migrating customer’s applications there? secure?15 © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • Big questions for cloud usersAre you a consumer or a provider of the cloud? Cloud Consumers: Are your applications ready for the cloud? • Analysts estimate that as much as 75% of attacks are at the application layer • In the cloud, applications are the primary target of attacks • Cloud applications face the same set of security concerns as those on the ground, plus more Cloud Providers: Is your cloud infrastructure secure? • Providers need to ensure consumers that their data is secure • Need to manage the risk of liability for security incidents and breaches • Must test the security of their infrastructure16 © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • HP Fortify Software Security CenterIdentify and eliminate risk in existing applications and prevent the introductionof risk during application development— in-house or from vendors. • Protect business critical applications from advanced cyber attacks by removing security vulnerabilities from software In-house Outsourced • Accelerate time-to-value for achieving secure applications • Increase development productivity by enabling security to be built into software, rather than added on Commercial Open Source after it is deployed • Deliver risk intelligence from application development to improve operational security17 © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • HP Fortify on DemandTest all in-house or third-party applications quickly, accurately and affordably inthe cloud– without the need for hardware, software or expertise. • Automate application security testing without hardware or software, and with minimal HP Fortify resources and expertise on Demand • Receive verified, correlated application security results in days • Achieve any government and industry regulatory compliance • Scale to test all applications– desktop, cloud and mobile—even those outside your control18 © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • Cloud specific features in HP Fortify products Cloud vulnerability analysis to test the readiness of software for cloud environments by finding issues specific to the cloud environment Cloud Readiness Scorecard™ to rate an application from weak to strong depending on the number of minor or major fixes required in deploying an application to the cloud Project Template for remediation that enables teams to zero in on the root cause of important security vulnerabilities HP Fortify Secure Coding Rulepacks that provides continual up-to-date guidelines on emerging threats identified by our advanced Security Research team19 © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • Cloud application security recommendations Find and fix vulnerabilities in existing applications before they are migrated to a cloud environment Audit new code / applications for resiliency in the target cloud environment Establish a remediation / feedback loop with software developers and outside vendors to deal with ongoing issues20 © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • Summary: cloud application securityComprehensive cloud application security solutions 1 That proactively identifies and eliminates risk in any cloud application or infrastructure To ensure that all cloud applications and infrastructures are trustworthy, 2 developed and deployed securely, and safe for all users and enterprises Achieving compliance with any government, industry and regulatory 3 standards and guidelines Available on-premise or on-demand, and with professional services 421 © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • Thank You© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.