SlideShare a Scribd company logo
1 of 19
Download to read offline
Protect Your Infrastructure: 
The Basics of Cloud Security 
Please direct any questions to us 
via Twitter using hashtag 
#fpwebinar 
#fpwebinar
Protect Your Infrastructure: 
The Basics of Cloud Security 
#fpwebinar
We want to hear from you! 
Please direct any questions to us 
via Twitter using hashtag 
#fpwebinar 
#fpwebinar
What’s in this Fpwebinar? 
! 
Physical security - gated parking, cameras, sensors, lack of signage, biometrics, etc. 
Network security - Routing protocols, patching, firewalls, logging, etc. 
Application security - port access, HTTPS, segmentation, sync user accounts, etc. 
#fpwebinar
Chris Schwab 
President 
Matt Kinder 
Infrastructure Manager 
#fpwebinar
Types of Security: 
! 
! 
Physical, Network and Application 
#fpwebinar
Physical Security 
! 
! 
Gated parking 
Security cameras 
Lack of signage 
Staffed or unstaffed 
Door sensors 
Data Centers go to a great extent to cloak even the parking garage 
#fpwebinar
Physical Security 
! 
! 
Check-in for access using a badge or biometrics 
The more money you spend, the easier it is to audit and control your physical security 
Most breeches occur when someone is standing in front of the system 
#fpwebinar
#fpwebinar 
Physical Security 
! 
! 
Create a fly-trap area for deliveries, etc.
#fpwebinar 
Network Security 
! 
Edge of network, Routing protocol, Server Security
#fpwebinar 
Network Security 
! 
! 
Once in and servers are set up, 
it is paramount to use rigid blueprints for everything you stand up
#fpwebinar 
Network Security 
! 
Edge of network - where public access begins 
Routing protocol protects from the outside in 
Maintain patch levels 
Firewall layers can be as robust or narrow as you’d like 
Keep up with bugs
Network Logging 
! 
! 
Most enterprises have the ability to log every transaction 
Retain as much data as you need 
Flag any keywords or anomalies if possible 
If an event or breech occurs, you’ll know quickly if logging is tied into alerting 
Do your homework before deployment 
Make sure you have all information you need 
#fpwebinar
Application Security 
! 
! 
Port access - only keep needed ports open 
Audit open ports and close any not being used 
IDS/IPS behind firewalls only see traffic getting through 
#fpwebinar
Application Security 
! 
HTTPS - Get an SSL Certificate 
Make sure SQL is not accessible directly from the web 
Segmentation will reduce risk 
Sync user accounts 
Implement and audit virus/malware scanner 
#fpwebinar
#fpwebinar 
Summary 
! 
Described types of security: Physical, Network and Application 
Physical security - gated parking, cameras, sensors, lack of signage, biometrics, etc. 
Network security - Routing protocols, patching, firewalls, logging, etc. 
Application security - port access, HTTPS, segmentation, sync user accounts, etc. 
Follow processes, audit processes
Protect Your Infrastructure: 
The Basics of Cloud Security 
Q&A 
Please direct any questions to us 
via Twitter using hashtag 
#fpwebinar 
#fpwebinar
Thank you! 
! 
Twitter @fpweb • Marketing@fpweb.net • www.fpweb.net 
! 
Please fill out the survey as you exit the webinar and help us choose the next topic! 
#fpwebinar

More Related Content

What's hot

PhD-Guidance-in-Dependable-and-Secure-Computing
PhD-Guidance-in-Dependable-and-Secure-ComputingPhD-Guidance-in-Dependable-and-Secure-Computing
PhD-Guidance-in-Dependable-and-Secure-ComputingPhdtopiccom
 
Businessday okt 2016 - WatchGuard
Businessday okt 2016 - WatchGuardBusinessday okt 2016 - WatchGuard
Businessday okt 2016 - WatchGuardMarketing Team
 
Anatomy of an Attack - Sophos Day Belux 2014
Anatomy of an Attack - Sophos Day Belux 2014Anatomy of an Attack - Sophos Day Belux 2014
Anatomy of an Attack - Sophos Day Belux 2014Sophos Benelux
 
4 Steps to Optimal Endpoint Settings
4 Steps to Optimal Endpoint Settings4 Steps to Optimal Endpoint Settings
4 Steps to Optimal Endpoint SettingsSophos
 
Top 6 Technology Threats to Your Long Term Care Organization
Top 6 Technology Threats to Your Long Term Care Organization Top 6 Technology Threats to Your Long Term Care Organization
Top 6 Technology Threats to Your Long Term Care Organization Gross, Mendelsohn & Associates
 
CIS Security Benchmark
CIS Security BenchmarkCIS Security Benchmark
CIS Security BenchmarkRahul Khengare
 
PhD-Guidance-in-Information-Security
PhD-Guidance-in-Information-SecurityPhD-Guidance-in-Information-Security
PhD-Guidance-in-Information-SecurityPhdtopiccom
 
85% of App Store Apps Fail OWASP Mobile Top 10: Are you exposed?
85% of App Store Apps Fail OWASP Mobile Top 10: Are you exposed?85% of App Store Apps Fail OWASP Mobile Top 10: Are you exposed?
85% of App Store Apps Fail OWASP Mobile Top 10: Are you exposed?NowSecure
 
Check Point Infinity powered by R80.10
Check Point Infinity powered by R80.10Check Point Infinity powered by R80.10
Check Point Infinity powered by R80.10MarketingArrowECS_CZ
 
Symantec: čas přítomný a budoucí
Symantec: čas přítomný a budoucíSymantec: čas přítomný a budoucí
Symantec: čas přítomný a budoucíMarketingArrowECS_CZ
 
Zabezpečení mobilních zařízení ve firemním prostředí
Zabezpečení mobilních zařízení ve firemním prostředíZabezpečení mobilních zařízení ve firemním prostředí
Zabezpečení mobilních zařízení ve firemním prostředíMarketingArrowECS_CZ
 
Cyberoam Firewall Presentation
Cyberoam Firewall PresentationCyberoam Firewall Presentation
Cyberoam Firewall PresentationManoj Kumar Mishra
 
Cyberwar poster english
Cyberwar poster englishCyberwar poster english
Cyberwar poster englishAbbas Badran
 
WatchGuard - Security event juni 2016
WatchGuard - Security event juni 2016WatchGuard - Security event juni 2016
WatchGuard - Security event juni 2016Marketing Team
 
It security and awareness training 5 10-2018
It security and awareness training 5 10-2018It security and awareness training 5 10-2018
It security and awareness training 5 10-2018jubke
 
Detect and Respond to Threats Better with IBM Security App Exchange Partners
Detect and Respond to Threats Better with IBM Security App Exchange PartnersDetect and Respond to Threats Better with IBM Security App Exchange Partners
Detect and Respond to Threats Better with IBM Security App Exchange PartnersIBM Security
 
160415 lan and-wan-secure-access-architecture
160415 lan and-wan-secure-access-architecture160415 lan and-wan-secure-access-architecture
160415 lan and-wan-secure-access-architectureLan & Wan Solutions
 

What's hot (20)

PhD-Guidance-in-Dependable-and-Secure-Computing
PhD-Guidance-in-Dependable-and-Secure-ComputingPhD-Guidance-in-Dependable-and-Secure-Computing
PhD-Guidance-in-Dependable-and-Secure-Computing
 
Businessday okt 2016 - WatchGuard
Businessday okt 2016 - WatchGuardBusinessday okt 2016 - WatchGuard
Businessday okt 2016 - WatchGuard
 
Anatomy of an Attack - Sophos Day Belux 2014
Anatomy of an Attack - Sophos Day Belux 2014Anatomy of an Attack - Sophos Day Belux 2014
Anatomy of an Attack - Sophos Day Belux 2014
 
4 Steps to Optimal Endpoint Settings
4 Steps to Optimal Endpoint Settings4 Steps to Optimal Endpoint Settings
4 Steps to Optimal Endpoint Settings
 
Top 6 Technology Threats to Your Long Term Care Organization
Top 6 Technology Threats to Your Long Term Care Organization Top 6 Technology Threats to Your Long Term Care Organization
Top 6 Technology Threats to Your Long Term Care Organization
 
Hacker Tricks: How You Can Protect Yourself
Hacker Tricks: How You Can Protect YourselfHacker Tricks: How You Can Protect Yourself
Hacker Tricks: How You Can Protect Yourself
 
CIS Security Benchmark
CIS Security BenchmarkCIS Security Benchmark
CIS Security Benchmark
 
PhD-Guidance-in-Information-Security
PhD-Guidance-in-Information-SecurityPhD-Guidance-in-Information-Security
PhD-Guidance-in-Information-Security
 
85% of App Store Apps Fail OWASP Mobile Top 10: Are you exposed?
85% of App Store Apps Fail OWASP Mobile Top 10: Are you exposed?85% of App Store Apps Fail OWASP Mobile Top 10: Are you exposed?
85% of App Store Apps Fail OWASP Mobile Top 10: Are you exposed?
 
Check Point Infinity powered by R80.10
Check Point Infinity powered by R80.10Check Point Infinity powered by R80.10
Check Point Infinity powered by R80.10
 
Symantec: čas přítomný a budoucí
Symantec: čas přítomný a budoucíSymantec: čas přítomný a budoucí
Symantec: čas přítomný a budoucí
 
Zabezpečení mobilních zařízení ve firemním prostředí
Zabezpečení mobilních zařízení ve firemním prostředíZabezpečení mobilních zařízení ve firemním prostředí
Zabezpečení mobilních zařízení ve firemním prostředí
 
Cyberoam Firewall Presentation
Cyberoam Firewall PresentationCyberoam Firewall Presentation
Cyberoam Firewall Presentation
 
Cyberwar poster english
Cyberwar poster englishCyberwar poster english
Cyberwar poster english
 
Check Point NGFW
Check Point NGFWCheck Point NGFW
Check Point NGFW
 
INFINITY Presentation
INFINITY PresentationINFINITY Presentation
INFINITY Presentation
 
WatchGuard - Security event juni 2016
WatchGuard - Security event juni 2016WatchGuard - Security event juni 2016
WatchGuard - Security event juni 2016
 
It security and awareness training 5 10-2018
It security and awareness training 5 10-2018It security and awareness training 5 10-2018
It security and awareness training 5 10-2018
 
Detect and Respond to Threats Better with IBM Security App Exchange Partners
Detect and Respond to Threats Better with IBM Security App Exchange PartnersDetect and Respond to Threats Better with IBM Security App Exchange Partners
Detect and Respond to Threats Better with IBM Security App Exchange Partners
 
160415 lan and-wan-secure-access-architecture
160415 lan and-wan-secure-access-architecture160415 lan and-wan-secure-access-architecture
160415 lan and-wan-secure-access-architecture
 

Similar to Protect Your Infrastructure: Basics of Cloud Security | Fpwebinar

Cybercrime future perspectives
Cybercrime future perspectivesCybercrime future perspectives
Cybercrime future perspectivesSensePost
 
Estratégia de segurança da Cisco (um diferencial para seus negócios)
Estratégia de segurança da Cisco (um diferencial para seus negócios)Estratégia de segurança da Cisco (um diferencial para seus negócios)
Estratégia de segurança da Cisco (um diferencial para seus negócios)Cisco do Brasil
 
Making Log Data Useful: SIEM and Log Management Together by Dr. Anton Chuvakin
Making Log Data Useful: SIEM and Log Management Together by Dr. Anton ChuvakinMaking Log Data Useful: SIEM and Log Management Together by Dr. Anton Chuvakin
Making Log Data Useful: SIEM and Log Management Together by Dr. Anton ChuvakinAnton Chuvakin
 
Making Log Data Useful: SIEM and Log Management Together
Making Log Data Useful: SIEM and Log Management TogetherMaking Log Data Useful: SIEM and Log Management Together
Making Log Data Useful: SIEM and Log Management TogetherAnton Chuvakin
 
SELJE - VFP and IT Security.pptx
SELJE - VFP and IT Security.pptxSELJE - VFP and IT Security.pptx
SELJE - VFP and IT Security.pptxEric Selje
 
Employing automated security systems in critical facilities.pptx
Employing automated security systems in critical facilities.pptxEmploying automated security systems in critical facilities.pptx
Employing automated security systems in critical facilities.pptxJeffrey Lam
 
Secure Your Mobile Apps
Secure Your Mobile AppsSecure Your Mobile Apps
Secure Your Mobile Appsprimomh
 
Agile Chennai 2022 - Shyam Sundar | Everything there is to know about Cyber s...
Agile Chennai 2022 - Shyam Sundar | Everything there is to know about Cyber s...Agile Chennai 2022 - Shyam Sundar | Everything there is to know about Cyber s...
Agile Chennai 2022 - Shyam Sundar | Everything there is to know about Cyber s...AgileNetwork
 
Elementary-Information-Security-Practices
Elementary-Information-Security-PracticesElementary-Information-Security-Practices
Elementary-Information-Security-PracticesOctogence
 
Mobile security services 2012
Mobile security services 2012Mobile security services 2012
Mobile security services 2012Tjylen Veselyj
 
Developing Secure Applications and Defending Against Common Attacks
Developing Secure Applications and Defending Against Common AttacksDeveloping Secure Applications and Defending Against Common Attacks
Developing Secure Applications and Defending Against Common AttacksPayPalX Developer Network
 
Slideshare fintech-may26th-def
Slideshare fintech-may26th-defSlideshare fintech-may26th-def
Slideshare fintech-may26th-defQafis
 
Webinar: Beyond Two-Factor: Secure Access Control for Office 365
 Webinar: Beyond Two-Factor: Secure Access Control for Office 365 Webinar: Beyond Two-Factor: Secure Access Control for Office 365
Webinar: Beyond Two-Factor: Secure Access Control for Office 365SecureAuth
 
The 300 Leonidas Solution
The 300 Leonidas SolutionThe 300 Leonidas Solution
The 300 Leonidas Solutionmatthew.maisel
 
IoT Security and Privacy Considerations
IoT Security and Privacy ConsiderationsIoT Security and Privacy Considerations
IoT Security and Privacy ConsiderationsKenny Huang Ph.D.
 
Stopping Breaches at the Perimeter: Strategies for Secure Access Control
Stopping Breaches at the Perimeter: Strategies for Secure Access ControlStopping Breaches at the Perimeter: Strategies for Secure Access Control
Stopping Breaches at the Perimeter: Strategies for Secure Access ControlSecureAuth
 
When Worlds Collide: Ethics and Technology for Lawyers
When Worlds Collide: Ethics and Technology for LawyersWhen Worlds Collide: Ethics and Technology for Lawyers
When Worlds Collide: Ethics and Technology for Lawyersrtrautz
 
Emea Corporate Presentation 0709 Lin
Emea Corporate Presentation 0709 LinEmea Corporate Presentation 0709 Lin
Emea Corporate Presentation 0709 LinJoe Sarno
 

Similar to Protect Your Infrastructure: Basics of Cloud Security | Fpwebinar (20)

Overview of Information Security & Privacy
Overview of Information Security & PrivacyOverview of Information Security & Privacy
Overview of Information Security & Privacy
 
Cybercrime future perspectives
Cybercrime future perspectivesCybercrime future perspectives
Cybercrime future perspectives
 
Estratégia de segurança da Cisco (um diferencial para seus negócios)
Estratégia de segurança da Cisco (um diferencial para seus negócios)Estratégia de segurança da Cisco (um diferencial para seus negócios)
Estratégia de segurança da Cisco (um diferencial para seus negócios)
 
Making Log Data Useful: SIEM and Log Management Together by Dr. Anton Chuvakin
Making Log Data Useful: SIEM and Log Management Together by Dr. Anton ChuvakinMaking Log Data Useful: SIEM and Log Management Together by Dr. Anton Chuvakin
Making Log Data Useful: SIEM and Log Management Together by Dr. Anton Chuvakin
 
Making Log Data Useful: SIEM and Log Management Together
Making Log Data Useful: SIEM and Log Management TogetherMaking Log Data Useful: SIEM and Log Management Together
Making Log Data Useful: SIEM and Log Management Together
 
SELJE - VFP and IT Security.pptx
SELJE - VFP and IT Security.pptxSELJE - VFP and IT Security.pptx
SELJE - VFP and IT Security.pptx
 
Employing automated security systems in critical facilities.pptx
Employing automated security systems in critical facilities.pptxEmploying automated security systems in critical facilities.pptx
Employing automated security systems in critical facilities.pptx
 
Secure Your Mobile Apps
Secure Your Mobile AppsSecure Your Mobile Apps
Secure Your Mobile Apps
 
Agile Chennai 2022 - Shyam Sundar | Everything there is to know about Cyber s...
Agile Chennai 2022 - Shyam Sundar | Everything there is to know about Cyber s...Agile Chennai 2022 - Shyam Sundar | Everything there is to know about Cyber s...
Agile Chennai 2022 - Shyam Sundar | Everything there is to know about Cyber s...
 
Elementary-Information-Security-Practices
Elementary-Information-Security-PracticesElementary-Information-Security-Practices
Elementary-Information-Security-Practices
 
Mobile security services 2012
Mobile security services 2012Mobile security services 2012
Mobile security services 2012
 
Developing Secure Applications and Defending Against Common Attacks
Developing Secure Applications and Defending Against Common AttacksDeveloping Secure Applications and Defending Against Common Attacks
Developing Secure Applications and Defending Against Common Attacks
 
Securing Your Business
Securing Your BusinessSecuring Your Business
Securing Your Business
 
Slideshare fintech-may26th-def
Slideshare fintech-may26th-defSlideshare fintech-may26th-def
Slideshare fintech-may26th-def
 
Webinar: Beyond Two-Factor: Secure Access Control for Office 365
 Webinar: Beyond Two-Factor: Secure Access Control for Office 365 Webinar: Beyond Two-Factor: Secure Access Control for Office 365
Webinar: Beyond Two-Factor: Secure Access Control for Office 365
 
The 300 Leonidas Solution
The 300 Leonidas SolutionThe 300 Leonidas Solution
The 300 Leonidas Solution
 
IoT Security and Privacy Considerations
IoT Security and Privacy ConsiderationsIoT Security and Privacy Considerations
IoT Security and Privacy Considerations
 
Stopping Breaches at the Perimeter: Strategies for Secure Access Control
Stopping Breaches at the Perimeter: Strategies for Secure Access ControlStopping Breaches at the Perimeter: Strategies for Secure Access Control
Stopping Breaches at the Perimeter: Strategies for Secure Access Control
 
When Worlds Collide: Ethics and Technology for Lawyers
When Worlds Collide: Ethics and Technology for LawyersWhen Worlds Collide: Ethics and Technology for Lawyers
When Worlds Collide: Ethics and Technology for Lawyers
 
Emea Corporate Presentation 0709 Lin
Emea Corporate Presentation 0709 LinEmea Corporate Presentation 0709 Lin
Emea Corporate Presentation 0709 Lin
 

More from Fpweb

Make it Personal: Applying Your Dynamic Content Personalization Strategy
Make it Personal: Applying Your Dynamic Content Personalization StrategyMake it Personal: Applying Your Dynamic Content Personalization Strategy
Make it Personal: Applying Your Dynamic Content Personalization StrategyFpweb
 
Optimize Your SharePoint Strategy for the New Year
Optimize Your SharePoint Strategy for the New YearOptimize Your SharePoint Strategy for the New Year
Optimize Your SharePoint Strategy for the New YearFpweb
 
Navigating SharePoint and the Cloud in the Financial Industry
Navigating SharePoint and the Cloud in the Financial IndustryNavigating SharePoint and the Cloud in the Financial Industry
Navigating SharePoint and the Cloud in the Financial IndustryFpweb
 
Power Your Business: Creating Successful SharePoint Users
Power Your Business: Creating Successful SharePoint Users Power Your Business: Creating Successful SharePoint Users
Power Your Business: Creating Successful SharePoint Users Fpweb
 
Outsourcing Management & Support for your On-Premises SharePoint
Outsourcing Management & Support for your On-Premises SharePointOutsourcing Management & Support for your On-Premises SharePoint
Outsourcing Management & Support for your On-Premises SharePointFpweb
 
Securing the Legal Industry with SharePoint Fpwebinar
Securing the Legal Industry with SharePoint Fpwebinar Securing the Legal Industry with SharePoint Fpwebinar
Securing the Legal Industry with SharePoint Fpwebinar Fpweb
 
The Hybrid Cloud: Making Office 365 and the Private Cloud work for you | Fpwe...
The Hybrid Cloud: Making Office 365 and the Private Cloud work for you | Fpwe...The Hybrid Cloud: Making Office 365 and the Private Cloud work for you | Fpwe...
The Hybrid Cloud: Making Office 365 and the Private Cloud work for you | Fpwe...Fpweb
 
The Great Migration: Moving Your SharePoint | Fpwebinar
The Great Migration: Moving Your SharePoint | Fpwebinar The Great Migration: Moving Your SharePoint | Fpwebinar
The Great Migration: Moving Your SharePoint | Fpwebinar Fpweb
 
Come Prepared: What to Bring to the Cloud Conversation | Fpwebinar
Come Prepared: What to Bring to the Cloud Conversation | Fpwebinar Come Prepared: What to Bring to the Cloud Conversation | Fpwebinar
Come Prepared: What to Bring to the Cloud Conversation | Fpwebinar Fpweb
 
Keeping Control of Your Data in the Cloud | Fpwebinar
Keeping Control of Your Data in the Cloud | Fpwebinar Keeping Control of Your Data in the Cloud | Fpwebinar
Keeping Control of Your Data in the Cloud | Fpwebinar Fpweb
 
Save the Farm: Disaster Recovery for SharePoint | Fpwebinar
Save the Farm: Disaster Recovery for SharePoint | Fpwebinar Save the Farm: Disaster Recovery for SharePoint | Fpwebinar
Save the Farm: Disaster Recovery for SharePoint | Fpwebinar Fpweb
 
Data Security: Best Practices in the Hybrid Cloud | Fpwebinar
Data Security: Best Practices in the Hybrid Cloud | FpwebinarData Security: Best Practices in the Hybrid Cloud | Fpwebinar
Data Security: Best Practices in the Hybrid Cloud | FpwebinarFpweb
 

More from Fpweb (12)

Make it Personal: Applying Your Dynamic Content Personalization Strategy
Make it Personal: Applying Your Dynamic Content Personalization StrategyMake it Personal: Applying Your Dynamic Content Personalization Strategy
Make it Personal: Applying Your Dynamic Content Personalization Strategy
 
Optimize Your SharePoint Strategy for the New Year
Optimize Your SharePoint Strategy for the New YearOptimize Your SharePoint Strategy for the New Year
Optimize Your SharePoint Strategy for the New Year
 
Navigating SharePoint and the Cloud in the Financial Industry
Navigating SharePoint and the Cloud in the Financial IndustryNavigating SharePoint and the Cloud in the Financial Industry
Navigating SharePoint and the Cloud in the Financial Industry
 
Power Your Business: Creating Successful SharePoint Users
Power Your Business: Creating Successful SharePoint Users Power Your Business: Creating Successful SharePoint Users
Power Your Business: Creating Successful SharePoint Users
 
Outsourcing Management & Support for your On-Premises SharePoint
Outsourcing Management & Support for your On-Premises SharePointOutsourcing Management & Support for your On-Premises SharePoint
Outsourcing Management & Support for your On-Premises SharePoint
 
Securing the Legal Industry with SharePoint Fpwebinar
Securing the Legal Industry with SharePoint Fpwebinar Securing the Legal Industry with SharePoint Fpwebinar
Securing the Legal Industry with SharePoint Fpwebinar
 
The Hybrid Cloud: Making Office 365 and the Private Cloud work for you | Fpwe...
The Hybrid Cloud: Making Office 365 and the Private Cloud work for you | Fpwe...The Hybrid Cloud: Making Office 365 and the Private Cloud work for you | Fpwe...
The Hybrid Cloud: Making Office 365 and the Private Cloud work for you | Fpwe...
 
The Great Migration: Moving Your SharePoint | Fpwebinar
The Great Migration: Moving Your SharePoint | Fpwebinar The Great Migration: Moving Your SharePoint | Fpwebinar
The Great Migration: Moving Your SharePoint | Fpwebinar
 
Come Prepared: What to Bring to the Cloud Conversation | Fpwebinar
Come Prepared: What to Bring to the Cloud Conversation | Fpwebinar Come Prepared: What to Bring to the Cloud Conversation | Fpwebinar
Come Prepared: What to Bring to the Cloud Conversation | Fpwebinar
 
Keeping Control of Your Data in the Cloud | Fpwebinar
Keeping Control of Your Data in the Cloud | Fpwebinar Keeping Control of Your Data in the Cloud | Fpwebinar
Keeping Control of Your Data in the Cloud | Fpwebinar
 
Save the Farm: Disaster Recovery for SharePoint | Fpwebinar
Save the Farm: Disaster Recovery for SharePoint | Fpwebinar Save the Farm: Disaster Recovery for SharePoint | Fpwebinar
Save the Farm: Disaster Recovery for SharePoint | Fpwebinar
 
Data Security: Best Practices in the Hybrid Cloud | Fpwebinar
Data Security: Best Practices in the Hybrid Cloud | FpwebinarData Security: Best Practices in the Hybrid Cloud | Fpwebinar
Data Security: Best Practices in the Hybrid Cloud | Fpwebinar
 

Recently uploaded

Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityWSO2
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdfSandro Moreira
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontologyjohnbeverley2021
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
Navigating Identity and Access Management in the Modern Enterprise
Navigating Identity and Access Management in the Modern EnterpriseNavigating Identity and Access Management in the Modern Enterprise
Navigating Identity and Access Management in the Modern EnterpriseWSO2
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxRemote DBA Services
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
JavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuideJavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuidePixlogix Infotech
 
Decarbonising Commercial Real Estate: The Role of Operational Performance
Decarbonising Commercial Real Estate: The Role of Operational PerformanceDecarbonising Commercial Real Estate: The Role of Operational Performance
Decarbonising Commercial Real Estate: The Role of Operational PerformanceIES VE
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard37
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Orbitshub
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfOrbitshub
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
API Governance and Monetization - The evolution of API governance
API Governance and Monetization -  The evolution of API governanceAPI Governance and Monetization -  The evolution of API governance
API Governance and Monetization - The evolution of API governanceWSO2
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightSafe Software
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Zilliz
 

Recently uploaded (20)

Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Navigating Identity and Access Management in the Modern Enterprise
Navigating Identity and Access Management in the Modern EnterpriseNavigating Identity and Access Management in the Modern Enterprise
Navigating Identity and Access Management in the Modern Enterprise
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
JavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuideJavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate Guide
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
Decarbonising Commercial Real Estate: The Role of Operational Performance
Decarbonising Commercial Real Estate: The Role of Operational PerformanceDecarbonising Commercial Real Estate: The Role of Operational Performance
Decarbonising Commercial Real Estate: The Role of Operational Performance
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptx
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
API Governance and Monetization - The evolution of API governance
API Governance and Monetization -  The evolution of API governanceAPI Governance and Monetization -  The evolution of API governance
API Governance and Monetization - The evolution of API governance
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and Insight
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 

Protect Your Infrastructure: Basics of Cloud Security | Fpwebinar

  • 1. Protect Your Infrastructure: The Basics of Cloud Security Please direct any questions to us via Twitter using hashtag #fpwebinar #fpwebinar
  • 2.
  • 3. Protect Your Infrastructure: The Basics of Cloud Security #fpwebinar
  • 4. We want to hear from you! Please direct any questions to us via Twitter using hashtag #fpwebinar #fpwebinar
  • 5. What’s in this Fpwebinar? ! Physical security - gated parking, cameras, sensors, lack of signage, biometrics, etc. Network security - Routing protocols, patching, firewalls, logging, etc. Application security - port access, HTTPS, segmentation, sync user accounts, etc. #fpwebinar
  • 6. Chris Schwab President Matt Kinder Infrastructure Manager #fpwebinar
  • 7. Types of Security: ! ! Physical, Network and Application #fpwebinar
  • 8. Physical Security ! ! Gated parking Security cameras Lack of signage Staffed or unstaffed Door sensors Data Centers go to a great extent to cloak even the parking garage #fpwebinar
  • 9. Physical Security ! ! Check-in for access using a badge or biometrics The more money you spend, the easier it is to audit and control your physical security Most breeches occur when someone is standing in front of the system #fpwebinar
  • 10. #fpwebinar Physical Security ! ! Create a fly-trap area for deliveries, etc.
  • 11. #fpwebinar Network Security ! Edge of network, Routing protocol, Server Security
  • 12. #fpwebinar Network Security ! ! Once in and servers are set up, it is paramount to use rigid blueprints for everything you stand up
  • 13. #fpwebinar Network Security ! Edge of network - where public access begins Routing protocol protects from the outside in Maintain patch levels Firewall layers can be as robust or narrow as you’d like Keep up with bugs
  • 14. Network Logging ! ! Most enterprises have the ability to log every transaction Retain as much data as you need Flag any keywords or anomalies if possible If an event or breech occurs, you’ll know quickly if logging is tied into alerting Do your homework before deployment Make sure you have all information you need #fpwebinar
  • 15. Application Security ! ! Port access - only keep needed ports open Audit open ports and close any not being used IDS/IPS behind firewalls only see traffic getting through #fpwebinar
  • 16. Application Security ! HTTPS - Get an SSL Certificate Make sure SQL is not accessible directly from the web Segmentation will reduce risk Sync user accounts Implement and audit virus/malware scanner #fpwebinar
  • 17. #fpwebinar Summary ! Described types of security: Physical, Network and Application Physical security - gated parking, cameras, sensors, lack of signage, biometrics, etc. Network security - Routing protocols, patching, firewalls, logging, etc. Application security - port access, HTTPS, segmentation, sync user accounts, etc. Follow processes, audit processes
  • 18. Protect Your Infrastructure: The Basics of Cloud Security Q&A Please direct any questions to us via Twitter using hashtag #fpwebinar #fpwebinar
  • 19. Thank you! ! Twitter @fpweb • Marketing@fpweb.net • www.fpweb.net ! Please fill out the survey as you exit the webinar and help us choose the next topic! #fpwebinar