SlideShare a Scribd company logo
変通 [hen-tsoo]
noun
1. Resourcefulness – the quality of being able to cope with a difficult situation
2. Adaptability – the ability to change (or be changed) to fit changed circumstances
3. Agility – the power of moving quickly and easily; nimbleness
CLOUD SECURITY FOR REGULATED FIRMS
Securing my cloud and proving it
WELCOME TO HENTSŪ
AGENDA
• Why cloud?
• Hedge Fund Cloud usage update
• How secure is secure enough?
• Cloud security - Your responsibilities
• Security Monitoring & enforcement Infrastructure as code
• Wrap up
• Drinks
WHAT IS PUBLIC CLOUD?
“A service provider makes resources, such as virtual machines, applications and
storage, available to the general public.”
• Utility model
• No contracts
• Shared hardware / multi tenant
• Self managed
WHAT IS PUBLIC CLOUD
• Software as a Service
• Office 365
• Platform as a Service
• AWS RDS, S3
• Azure SQL Database
• Infrastructure as a Service
• Virtual Machines
• Virtual Disks
• Virtual Networks
WHY CLOUD?
CLOUD CONCERNS
YOUR PUBLIC CLOUD USAGE?
Where are you today?
On Premises
Bare Metal
On Premises
Virtualised
Hybrid
All in
Public Cloud
CLOUD USAGE BY HEDGE FUNDS
HFM TECHNOLOGY SURVEY FEBRUARY 2016
83% of respondents plan to increase their cloud usage in 2016
- HFM Technology survey February 2016
“all firms will be leveraging cloud to some extent” in the future
-Thomson Reuters managing director of enterprise Mike Powell
https://hfm.global/hfmtechnology/research-and-data/cloud-usage-trends
CLOUD USAGE BY HEDGE FUNDS
43% of managers said they did not want to place potentially sensitive information in
the public cloud.
- HFM Technology survey February 2016
This attitude was one of the reasons four out of 10 participants used private cloud
only.
https://hfm.global/hfmtechnology/research-and-data/cloud-usage-trends
CLOUD USAGE BY HEDGE FUNDS
If using public cloud, what business functions do you run?
https://hfm.global/hfmtechnology/research-and-data/cloud-usage-trends
CLOUD USAGE BY HEDGE FUNDS
What concerns do you have about using the cloud generally?
https://hfm.global/hfmtechnology/research-and-data/cloud-usage-trends
CLOUD USAGE BY HEDGE FUNDS
For new firms especially, “cloud technology allows them the ability to avoid making
large capital outlays on servers that may not be fully utilised,” argues Iain Buchanan,
CTO of Piquant Technologies.
A sub-$500m quant fund launched in 2013, Piquant runs all its technology
requirements through the cloud.
It has no physical servers, using exclusively cloud services.
https://hfm.global/hfmtechnology/analysis/hybrid-solutions-tipped-as-more-managers-embrace-the-cloud/
WE’VE BEEN HERE BEFORE?
WE’VE BEEN HERE BEFORE?
How to cure
NEPHOPHOBIA
(fear of clouds)
HOW SECURE IS SECURE
ENOUGH?
REGULATORY REQUIREMENTS & INDUSTRY STANDARDS
WHAT ARE THE REQUIREMENTS
The following Cloud Computing guidance is available:
• United Kingdom
• Financial Conduct Authority (FCA)
• United States
• Securities and Exchange Commission (SEC) Office of Compliance Inspections and
Examinations (OCIE)
https://en.wikipedia.org/wiki/List_of_financial_regulatory_authorities_by_country
WHAT DOES THE FCA SAY?
https://www.fca.org.uk/static/fca/article-type/news/fg16-5.pdf
“We see no fundamental reason why cloud services
(including public cloud services) cannot be implemented,
with appropriate consideration, in a manner that
complies with our rules.”
“We have successfully supported both new and existing
firms to use cloud and other IT service solutions in a
compliant manner.”
WHAT DOES THE FCA SAY?
• Risk Management
• identify current industry good practice,
including data and information security
management system requirements
• International standards
• In conducting its due diligence on potential
third-party providers, and as part of
ongoing monitoring of service provision, a
firm may wish to take account of the
provider’s adherence to international
standards as relevant to the provision of IT
services.
• Data security
• Firms should carry out a security risk
assessment
• have a data residency policy that sets out
where data can be stored
“Regulated firms retain full
responsibility and accountability for
discharging all of their regulatory
responsibilities.”
“Firms cannot delegate any part of
this responsibility to a third party.”
https://www.fca.org.uk/static/fca/article-type/news/fg16-5.pdf
SHARED RESPONSIBILITY
CLOUD SERVICES PROVIDER
Responsible for
security ‘of’ the cloud
CUSTOMER
Responsible for
security ‘in’ the cloud
SHARED RESPONSIBILITY
CLOUD SERVICES PROVIDER
• Facility operations
• Physical Security
• Physical Infrastructure
• Network Infrastructure
• Virtualisation Infrastructure
• Hardware lifecycle management
CUSTOMER
• Identity management
• Security Groups (firewalls)
• Network Access Control Lists
• Choice of guest OS
• Application Configuration Options
• Account Management flexibility
INFORMATION SECURITY
MANAGEMENT
THE HANDLING AND SAFEGUARDING OF INFORMATION
INDUSTRY STANDARDS - ISO 27001
“an auditable, international, information security
management standard published by the
International Organization for Standardization
(ISO) and the International Electrotechnical
Commission (IEC) that formally defines
requirements for a complete ISMS to help protect
and secure an organization’s data”
Requirements
“User access is centrally managed using
appropriate solution”
Controls
“AWS Identity and Access Management
(IAM) reuses Active Directory identities
and groups via AD federation services.”
http://www.iso.org/iso/iso27001
INDUSTRY STANDARDS - ISO 27001
• Management direction for information
security
• Responsibility for assets
• Information classification
• Business requirements of access control
• User access management
• User responsibilities
• System and application access control
• Cryptographic controls
• Operational procedures and
responsibilities
• Protection from malware
• Backup
• Logging and monitoring
• Control of operational software
• Technical vulnerability management
• Information systems audit considerations
• Network security management
• Information transfer
• Security in development and support
processes
• Test data
• Information security in supplier relationships
• Management of information security
incidents and improvements
• Information security reviews
http://www.iso.org/iso/iso27001
DATA CLASSIFICATION AND CONTROLS
Restricted Confidential Public
Data
examples
Strategy source code
Restricted documents
Cleaned tickdata
Back office app source code
Logs and monitoring data
Vendor data
Company confidential data
3rd party software binaries
IT automation scripts
Public website content
Access  Access controlled to authorised
users & intended audience
 Protection from System Admin
access
 Access logged
 Access approved by Information
Owner
 Access controlled to authorised users
& intended audience
 Access logged
 Access approved by information
owner
 No specific requirements
Transmission  Encrypted in transit  Encrypted in transit  No specific requirements
Storage  Encrypted storage
 Data resident in UK
 Encrypted storage
 Data resident in UK
 No specific requirements
Disposal  Secure erase  Secure erase  No specific requirements
ACCESS CONTROL
Who needs access to what?
• Use the same procedures for on premises as cloud
• Joiners and leavers processes
• Single sign on
• Multifactor authentication (but what about scripts/scheduled tasks)
• Least rights privilege
• Separation of roles and responsibilities
• Time based access (Just In Time Access, temporary access, escalate, drop back)
DATA TRANSMISSION
• Encrypt data in transit (traversing 3rd party networks / public internet)
• Virtual Private Network (VPN)
• Use encrypted protocols HTTPS, SFTP, SMB3.0
DATA STORAGE
• AWS Elastic Block Storage - server side encryption for virtual disks
• Data volumes and also boot volumes (since Dec 2015)
• AWS Simple Storage Service (S3) server side encryption for objects
• Azure Client Side disk encryption Bitlocker (Windows), DM-crypt (Linux)
• Azure Server Side encryption in preview, GA due August/September 2016
CLOUD SECURITY
EDUCATION
http://jklossner.com
SECURITY MONITORING AND
ENFORCEMENT
CLOUD SECURITY TOOLS ARE REALLY VERY GOOD…
AWS TRUSTED ADVISOR
• Security Groups - Specific Ports Unrestricted
• Security Groups - Unrestricted Access
• IAM Use
• Amazon S3 Bucket Permissions
• MFA on Root Account
• IAM Password Policy
• Amazon RDS Security Group Access Risk
• AWS CloudTrail Logging
• Amazon Route 53 MX and SPF Resource Record Sets
• ELB Listener Security
• ELB Security Groups
• CloudFront Custom SSL Certificates in the IAM Certificate Store
• CloudFront SSL Certificate on the Origin Server
• IAM Access Key Rotation
• Exposed Access Keys
https://aws.amazon.com/premiumsupport/trustedadvisor/best-practices/
AWS CLOUDTRAIL
Audit Trail for every use of AWS API
• The identity of the API caller.
• The time of the API call.
• The source IP address of the API caller.
• The request parameters.
• The response elements returned by the
AWS service
Extendable for Event Notifications and
Analytics
(CloudWatch, Splunk, SumoLogic, LogEntries,
Datadog, LogicMonitor, Open Source)
INFRASTRUCTURE AS CODE
DEFINE AND ENFORCE CONFIGURATION
OCTOBER EVENT
Grid computing breakfast
briefing
Wednesday 26th October
Hentsu Ltd
1 Fore Street
London EC2Y 9DT
hello@hentsu.com
https://hentsu.com

More Related Content

What's hot

Guide to CASB Use Cases
Guide to CASB Use CasesGuide to CASB Use Cases
Guide to CASB Use Cases
Sachin Yadav
 
Azure security architecture
Azure security architectureAzure security architecture
Azure security architecture
Karl Ots
 
cloud security ppt
cloud security ppt cloud security ppt
cloud security ppt
Devyani Vaidya
 
Cloud security comparisons between aws and azure
Cloud security comparisons between aws and azureCloud security comparisons between aws and azure
Cloud security comparisons between aws and azure
Abdul Khan
 
What the auditor need to know about cloud computing
What the auditor need to know about cloud computingWhat the auditor need to know about cloud computing
What the auditor need to know about cloud computing
Moshe Ferber
 
Azure 101: Shared responsibility in the Azure Cloud
Azure 101: Shared responsibility in the Azure CloudAzure 101: Shared responsibility in the Azure Cloud
Azure 101: Shared responsibility in the Azure Cloud
Paulo Renato
 
Guide to security patterns for cloud systems and data security in aws and azure
Guide to security patterns for cloud systems and data security in aws and azureGuide to security patterns for cloud systems and data security in aws and azure
Guide to security patterns for cloud systems and data security in aws and azure
Abdul Khan
 
Azure security architecture / FAUG JKL 15.2.2018
Azure security architecture / FAUG JKL 15.2.2018Azure security architecture / FAUG JKL 15.2.2018
Azure security architecture / FAUG JKL 15.2.2018
Karl Ots
 
7 Ways To Cyberattack And Hack Azure
7 Ways To Cyberattack And Hack Azure7 Ways To Cyberattack And Hack Azure
7 Ways To Cyberattack And Hack Azure
Abdul Khan
 
Best Practices in Cloud Security
Best Practices in Cloud SecurityBest Practices in Cloud Security
Best Practices in Cloud Security
Alert Logic
 
Security OF The Cloud
Security OF The CloudSecurity OF The Cloud
Security OF The Cloud
Mark Nunnikhoven
 
Data Security Essentials for Cloud Computing - JavaOne 2013
Data Security Essentials for Cloud Computing - JavaOne 2013Data Security Essentials for Cloud Computing - JavaOne 2013
Data Security Essentials for Cloud Computing - JavaOne 2013
javagroup2006
 
Latest Developments in Cloud Security Standards and Privacy
Latest Developments in Cloud Security Standards and PrivacyLatest Developments in Cloud Security Standards and Privacy
Latest Developments in Cloud Security Standards and Privacy
Cloud Standards Customer Council
 
Tour to Azure Security Center
Tour to Azure Security CenterTour to Azure Security Center
Tour to Azure Security Center
Lalit Rawat
 
Cloud Security Introduction
Cloud Security IntroductionCloud Security Introduction
Cloud Security Introduction
GLC Networks
 
Cloud computing Risk management
Cloud computing Risk management  Cloud computing Risk management
Cloud computing Risk management
Padma Jella
 
Azure security
Azure  securityAzure  security
Azure security
Lalit Rawat
 
Cyber Ranges: A New Approach to Security
Cyber Ranges: A New Approach to SecurityCyber Ranges: A New Approach to Security
Cyber Ranges: A New Approach to Security
Security Innovation
 
Azure Security Fundamentals
Azure Security FundamentalsAzure Security Fundamentals
Azure Security Fundamentals
Lorenzo Barbieri
 
Azure Security Overview
Azure Security OverviewAzure Security Overview
Azure Security Overview
Allen Brokken
 

What's hot (20)

Guide to CASB Use Cases
Guide to CASB Use CasesGuide to CASB Use Cases
Guide to CASB Use Cases
 
Azure security architecture
Azure security architectureAzure security architecture
Azure security architecture
 
cloud security ppt
cloud security ppt cloud security ppt
cloud security ppt
 
Cloud security comparisons between aws and azure
Cloud security comparisons between aws and azureCloud security comparisons between aws and azure
Cloud security comparisons between aws and azure
 
What the auditor need to know about cloud computing
What the auditor need to know about cloud computingWhat the auditor need to know about cloud computing
What the auditor need to know about cloud computing
 
Azure 101: Shared responsibility in the Azure Cloud
Azure 101: Shared responsibility in the Azure CloudAzure 101: Shared responsibility in the Azure Cloud
Azure 101: Shared responsibility in the Azure Cloud
 
Guide to security patterns for cloud systems and data security in aws and azure
Guide to security patterns for cloud systems and data security in aws and azureGuide to security patterns for cloud systems and data security in aws and azure
Guide to security patterns for cloud systems and data security in aws and azure
 
Azure security architecture / FAUG JKL 15.2.2018
Azure security architecture / FAUG JKL 15.2.2018Azure security architecture / FAUG JKL 15.2.2018
Azure security architecture / FAUG JKL 15.2.2018
 
7 Ways To Cyberattack And Hack Azure
7 Ways To Cyberattack And Hack Azure7 Ways To Cyberattack And Hack Azure
7 Ways To Cyberattack And Hack Azure
 
Best Practices in Cloud Security
Best Practices in Cloud SecurityBest Practices in Cloud Security
Best Practices in Cloud Security
 
Security OF The Cloud
Security OF The CloudSecurity OF The Cloud
Security OF The Cloud
 
Data Security Essentials for Cloud Computing - JavaOne 2013
Data Security Essentials for Cloud Computing - JavaOne 2013Data Security Essentials for Cloud Computing - JavaOne 2013
Data Security Essentials for Cloud Computing - JavaOne 2013
 
Latest Developments in Cloud Security Standards and Privacy
Latest Developments in Cloud Security Standards and PrivacyLatest Developments in Cloud Security Standards and Privacy
Latest Developments in Cloud Security Standards and Privacy
 
Tour to Azure Security Center
Tour to Azure Security CenterTour to Azure Security Center
Tour to Azure Security Center
 
Cloud Security Introduction
Cloud Security IntroductionCloud Security Introduction
Cloud Security Introduction
 
Cloud computing Risk management
Cloud computing Risk management  Cloud computing Risk management
Cloud computing Risk management
 
Azure security
Azure  securityAzure  security
Azure security
 
Cyber Ranges: A New Approach to Security
Cyber Ranges: A New Approach to SecurityCyber Ranges: A New Approach to Security
Cyber Ranges: A New Approach to Security
 
Azure Security Fundamentals
Azure Security FundamentalsAzure Security Fundamentals
Azure Security Fundamentals
 
Azure Security Overview
Azure Security OverviewAzure Security Overview
Azure Security Overview
 

Viewers also liked

Doing business in China – Recent anti-corruption and bribery
Doing business in China – Recent anti-corruption and briberyDoing business in China – Recent anti-corruption and bribery
Doing business in China – Recent anti-corruption and bribery
Grant Thornton LLP
 
Windows Azure IaaS and Hybrid
Windows Azure IaaS and HybridWindows Azure IaaS and Hybrid
Windows Azure IaaS and Hybrid
Mike Martin
 
R user group meeting 25th jan 2017
R user group meeting 25th jan 2017R user group meeting 25th jan 2017
R user group meeting 25th jan 2017
Garrett Teoh Hor Keong
 
Unidad III herramientas para la creacion
Unidad III herramientas para la creacionUnidad III herramientas para la creacion
Unidad III herramientas para la creacion
lenny furcal
 
Sobre condiciones basicas en los lugares de trabajo
Sobre condiciones  basicas en los lugares de trabajoSobre condiciones  basicas en los lugares de trabajo
Sobre condiciones basicas en los lugares de trabajo
Jorge Marcelo Peñaloza Tapia
 
IeFP 2017 - Fondazione Aldini Valeriani
IeFP 2017 - Fondazione Aldini ValerianiIeFP 2017 - Fondazione Aldini Valeriani
IeFP 2017 - Fondazione Aldini Valeriani
Fondazione Aldini Valeriani
 
Word press plugins slide share
Word press plugins slide shareWord press plugins slide share
Word press plugins slide share
Pravya Pravin
 
Brock Library POLI 2F20 Seminar slides January 2017
Brock Library POLI 2F20 Seminar slides January 2017Brock Library POLI 2F20 Seminar slides January 2017
Brock Library POLI 2F20 Seminar slides January 2017
Brock University
 
Introduction to Microsoft Azure IaaS
Introduction to Microsoft Azure IaaSIntroduction to Microsoft Azure IaaS
Introduction to Microsoft Azure IaaS
SpringPeople
 
Presentacion google drive
Presentacion google drivePresentacion google drive
Presentacion google drive
bryan toledo
 
Memes del libro la última lección
Memes del libro la última lecciónMemes del libro la última lección
Memes del libro la última lección
Fernando Alvarado
 
161021 Water & Telecoms dmcb
161021 Water & Telecoms dmcb161021 Water & Telecoms dmcb
161021 Water & Telecoms dmcbAirov8
 
Jisto_Whitepaper_Recapturing_Stranded_Resources
Jisto_Whitepaper_Recapturing_Stranded_ResourcesJisto_Whitepaper_Recapturing_Stranded_Resources
Jisto_Whitepaper_Recapturing_Stranded_ResourcesKevin Donovan
 
How to Grow Your Business with Microsoft Azure
How to Grow Your Business with Microsoft AzureHow to Grow Your Business with Microsoft Azure
How to Grow Your Business with Microsoft Azure
Barnaba Accardi
 
Infinitely Scalable Clusters - Grid Computing on Public Cloud - New York
Infinitely Scalable Clusters - Grid Computing on Public Cloud - New YorkInfinitely Scalable Clusters - Grid Computing on Public Cloud - New York
Infinitely Scalable Clusters - Grid Computing on Public Cloud - New York
Hentsū
 
Learning to Fly
Learning to FlyLearning to Fly
Learning to Fly
Dom Pates
 
Analysis Property Rights of Spouses
Analysis Property Rights of SpousesAnalysis Property Rights of Spouses
Analysis Property Rights of SpousesGenna A. S. Evelyn
 
Licencias creative commons
Licencias creative commons Licencias creative commons
Licencias creative commons
bryan toledo
 
Infinitely Scalable Clusters - Grid Computing on Public Cloud - London
Infinitely Scalable Clusters - Grid Computing on Public Cloud - LondonInfinitely Scalable Clusters - Grid Computing on Public Cloud - London
Infinitely Scalable Clusters - Grid Computing on Public Cloud - London
Hentsū
 

Viewers also liked (20)

Doing business in China – Recent anti-corruption and bribery
Doing business in China – Recent anti-corruption and briberyDoing business in China – Recent anti-corruption and bribery
Doing business in China – Recent anti-corruption and bribery
 
Windows Azure IaaS and Hybrid
Windows Azure IaaS and HybridWindows Azure IaaS and Hybrid
Windows Azure IaaS and Hybrid
 
R user group meeting 25th jan 2017
R user group meeting 25th jan 2017R user group meeting 25th jan 2017
R user group meeting 25th jan 2017
 
Unidad III herramientas para la creacion
Unidad III herramientas para la creacionUnidad III herramientas para la creacion
Unidad III herramientas para la creacion
 
Sobre condiciones basicas en los lugares de trabajo
Sobre condiciones  basicas en los lugares de trabajoSobre condiciones  basicas en los lugares de trabajo
Sobre condiciones basicas en los lugares de trabajo
 
IeFP 2017 - Fondazione Aldini Valeriani
IeFP 2017 - Fondazione Aldini ValerianiIeFP 2017 - Fondazione Aldini Valeriani
IeFP 2017 - Fondazione Aldini Valeriani
 
Word press plugins slide share
Word press plugins slide shareWord press plugins slide share
Word press plugins slide share
 
Brock Library POLI 2F20 Seminar slides January 2017
Brock Library POLI 2F20 Seminar slides January 2017Brock Library POLI 2F20 Seminar slides January 2017
Brock Library POLI 2F20 Seminar slides January 2017
 
Introduction to Microsoft Azure IaaS
Introduction to Microsoft Azure IaaSIntroduction to Microsoft Azure IaaS
Introduction to Microsoft Azure IaaS
 
Presentacion google drive
Presentacion google drivePresentacion google drive
Presentacion google drive
 
Memes del libro la última lección
Memes del libro la última lecciónMemes del libro la última lección
Memes del libro la última lección
 
161021 Water & Telecoms dmcb
161021 Water & Telecoms dmcb161021 Water & Telecoms dmcb
161021 Water & Telecoms dmcb
 
Jisto_Whitepaper_Recapturing_Stranded_Resources
Jisto_Whitepaper_Recapturing_Stranded_ResourcesJisto_Whitepaper_Recapturing_Stranded_Resources
Jisto_Whitepaper_Recapturing_Stranded_Resources
 
How to Grow Your Business with Microsoft Azure
How to Grow Your Business with Microsoft AzureHow to Grow Your Business with Microsoft Azure
How to Grow Your Business with Microsoft Azure
 
Infinitely Scalable Clusters - Grid Computing on Public Cloud - New York
Infinitely Scalable Clusters - Grid Computing on Public Cloud - New YorkInfinitely Scalable Clusters - Grid Computing on Public Cloud - New York
Infinitely Scalable Clusters - Grid Computing on Public Cloud - New York
 
Learning to Fly
Learning to FlyLearning to Fly
Learning to Fly
 
acsomega%2E6b00175
acsomega%2E6b00175acsomega%2E6b00175
acsomega%2E6b00175
 
Analysis Property Rights of Spouses
Analysis Property Rights of SpousesAnalysis Property Rights of Spouses
Analysis Property Rights of Spouses
 
Licencias creative commons
Licencias creative commons Licencias creative commons
Licencias creative commons
 
Infinitely Scalable Clusters - Grid Computing on Public Cloud - London
Infinitely Scalable Clusters - Grid Computing on Public Cloud - LondonInfinitely Scalable Clusters - Grid Computing on Public Cloud - London
Infinitely Scalable Clusters - Grid Computing on Public Cloud - London
 

Similar to Cloud Security for Regulated Firms - Securing my cloud and proving it

Windows Azure Security & Compliance
Windows Azure Security & ComplianceWindows Azure Security & Compliance
Windows Azure Security & Compliance
Nuno Godinho
 
Cloud Customer Architecture for Securing Workloads on Cloud Services
Cloud Customer Architecture for Securing Workloads on Cloud ServicesCloud Customer Architecture for Securing Workloads on Cloud Services
Cloud Customer Architecture for Securing Workloads on Cloud Services
Cloud Standards Customer Council
 
(ENT202) Four Critical Things to Consider When Moving Your Core Business Appl...
(ENT202) Four Critical Things to Consider When Moving Your Core Business Appl...(ENT202) Four Critical Things to Consider When Moving Your Core Business Appl...
(ENT202) Four Critical Things to Consider When Moving Your Core Business Appl...
Amazon Web Services
 
Cloud Security: A matter of trust?
Cloud Security: A matter of trust?Cloud Security: A matter of trust?
Cloud Security: A matter of trust?
Mark Williams
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
AWS User Group Bengaluru
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
AWS User Group Bengaluru
 
Cloud computing and Cloud security fundamentals
Cloud computing and Cloud security fundamentalsCloud computing and Cloud security fundamentals
Cloud computing and Cloud security fundamentals
Viresh Suri
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
Pyingkodi Maran
 
Shared responsibility - a model for good cloud security
Shared responsibility - a model for good cloud securityShared responsibility - a model for good cloud security
Shared responsibility - a model for good cloud security
Jisc
 
Security in the cloud Workshop HSTC 2014
Security in the cloud Workshop HSTC 2014Security in the cloud Workshop HSTC 2014
Security in the cloud Workshop HSTC 2014
Akash Mahajan
 
Securing Data in the Cloud - GISEC2017
Securing Data in the Cloud - GISEC2017Securing Data in the Cloud - GISEC2017
Securing Data in the Cloud - GISEC2017
Sohaib Mahmood
 
Shared responsibility - a model for good cloud security
Shared responsibility - a model for good cloud securityShared responsibility - a model for good cloud security
Shared responsibility - a model for good cloud security
Andy Powell
 
Migrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Migrating Critical Applications To The Cloud - ISACA Seattle - SanitizedMigrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Migrating Critical Applications To The Cloud - ISACA Seattle - SanitizedNorm Barber
 
Migrating Critical Applications to the Cloud - isaca seattle - sanitized
Migrating Critical Applications to the Cloud - isaca seattle - sanitizedMigrating Critical Applications to the Cloud - isaca seattle - sanitized
Migrating Critical Applications to the Cloud - isaca seattle - sanitized
UnifyCloud
 
Managing Trustworthy Big-data Applications in the Cloud with the ATMOSPHERE P...
Managing Trustworthy Big-data Applications in the Cloud with the ATMOSPHERE P...Managing Trustworthy Big-data Applications in the Cloud with the ATMOSPHERE P...
Managing Trustworthy Big-data Applications in the Cloud with the ATMOSPHERE P...
ATMOSPHERE .
 
Cloud Computing (Lecture 1 & 2).pptx
Cloud Computing (Lecture 1 & 2).pptxCloud Computing (Lecture 1 & 2).pptx
Cloud Computing (Lecture 1 & 2).pptx
MuhammadArslan799356
 
Software Defined Networking in the ATMOSPHERE project
Software Defined Networking in the ATMOSPHERE projectSoftware Defined Networking in the ATMOSPHERE project
Software Defined Networking in the ATMOSPHERE project
ATMOSPHERE .
 
Presentacion de solucion cloud de navegacion segura
Presentacion de solucion cloud de navegacion seguraPresentacion de solucion cloud de navegacion segura
Presentacion de solucion cloud de navegacion segura
RogerChaucaZea
 
366864108 azure-security
366864108 azure-security366864108 azure-security
366864108 azure-security
ober64
 
AWS Cloud Security
AWS Cloud SecurityAWS Cloud Security
AWS Cloud Security
Amazon Web Services LATAM
 

Similar to Cloud Security for Regulated Firms - Securing my cloud and proving it (20)

Windows Azure Security & Compliance
Windows Azure Security & ComplianceWindows Azure Security & Compliance
Windows Azure Security & Compliance
 
Cloud Customer Architecture for Securing Workloads on Cloud Services
Cloud Customer Architecture for Securing Workloads on Cloud ServicesCloud Customer Architecture for Securing Workloads on Cloud Services
Cloud Customer Architecture for Securing Workloads on Cloud Services
 
(ENT202) Four Critical Things to Consider When Moving Your Core Business Appl...
(ENT202) Four Critical Things to Consider When Moving Your Core Business Appl...(ENT202) Four Critical Things to Consider When Moving Your Core Business Appl...
(ENT202) Four Critical Things to Consider When Moving Your Core Business Appl...
 
Cloud Security: A matter of trust?
Cloud Security: A matter of trust?Cloud Security: A matter of trust?
Cloud Security: A matter of trust?
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
 
Cloud computing and Cloud security fundamentals
Cloud computing and Cloud security fundamentalsCloud computing and Cloud security fundamentals
Cloud computing and Cloud security fundamentals
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
 
Shared responsibility - a model for good cloud security
Shared responsibility - a model for good cloud securityShared responsibility - a model for good cloud security
Shared responsibility - a model for good cloud security
 
Security in the cloud Workshop HSTC 2014
Security in the cloud Workshop HSTC 2014Security in the cloud Workshop HSTC 2014
Security in the cloud Workshop HSTC 2014
 
Securing Data in the Cloud - GISEC2017
Securing Data in the Cloud - GISEC2017Securing Data in the Cloud - GISEC2017
Securing Data in the Cloud - GISEC2017
 
Shared responsibility - a model for good cloud security
Shared responsibility - a model for good cloud securityShared responsibility - a model for good cloud security
Shared responsibility - a model for good cloud security
 
Migrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Migrating Critical Applications To The Cloud - ISACA Seattle - SanitizedMigrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Migrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
 
Migrating Critical Applications to the Cloud - isaca seattle - sanitized
Migrating Critical Applications to the Cloud - isaca seattle - sanitizedMigrating Critical Applications to the Cloud - isaca seattle - sanitized
Migrating Critical Applications to the Cloud - isaca seattle - sanitized
 
Managing Trustworthy Big-data Applications in the Cloud with the ATMOSPHERE P...
Managing Trustworthy Big-data Applications in the Cloud with the ATMOSPHERE P...Managing Trustworthy Big-data Applications in the Cloud with the ATMOSPHERE P...
Managing Trustworthy Big-data Applications in the Cloud with the ATMOSPHERE P...
 
Cloud Computing (Lecture 1 & 2).pptx
Cloud Computing (Lecture 1 & 2).pptxCloud Computing (Lecture 1 & 2).pptx
Cloud Computing (Lecture 1 & 2).pptx
 
Software Defined Networking in the ATMOSPHERE project
Software Defined Networking in the ATMOSPHERE projectSoftware Defined Networking in the ATMOSPHERE project
Software Defined Networking in the ATMOSPHERE project
 
Presentacion de solucion cloud de navegacion segura
Presentacion de solucion cloud de navegacion seguraPresentacion de solucion cloud de navegacion segura
Presentacion de solucion cloud de navegacion segura
 
366864108 azure-security
366864108 azure-security366864108 azure-security
366864108 azure-security
 
AWS Cloud Security
AWS Cloud SecurityAWS Cloud Security
AWS Cloud Security
 

Recently uploaded

Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
ThomasParaiso2
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 

Recently uploaded (20)

Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 

Cloud Security for Regulated Firms - Securing my cloud and proving it

  • 1. 変通 [hen-tsoo] noun 1. Resourcefulness – the quality of being able to cope with a difficult situation 2. Adaptability – the ability to change (or be changed) to fit changed circumstances 3. Agility – the power of moving quickly and easily; nimbleness CLOUD SECURITY FOR REGULATED FIRMS Securing my cloud and proving it
  • 3. AGENDA • Why cloud? • Hedge Fund Cloud usage update • How secure is secure enough? • Cloud security - Your responsibilities • Security Monitoring & enforcement Infrastructure as code • Wrap up • Drinks
  • 4. WHAT IS PUBLIC CLOUD? “A service provider makes resources, such as virtual machines, applications and storage, available to the general public.” • Utility model • No contracts • Shared hardware / multi tenant • Self managed
  • 5. WHAT IS PUBLIC CLOUD • Software as a Service • Office 365 • Platform as a Service • AWS RDS, S3 • Azure SQL Database • Infrastructure as a Service • Virtual Machines • Virtual Disks • Virtual Networks
  • 8. YOUR PUBLIC CLOUD USAGE? Where are you today? On Premises Bare Metal On Premises Virtualised Hybrid All in Public Cloud
  • 9. CLOUD USAGE BY HEDGE FUNDS HFM TECHNOLOGY SURVEY FEBRUARY 2016 83% of respondents plan to increase their cloud usage in 2016 - HFM Technology survey February 2016 “all firms will be leveraging cloud to some extent” in the future -Thomson Reuters managing director of enterprise Mike Powell https://hfm.global/hfmtechnology/research-and-data/cloud-usage-trends
  • 10. CLOUD USAGE BY HEDGE FUNDS 43% of managers said they did not want to place potentially sensitive information in the public cloud. - HFM Technology survey February 2016 This attitude was one of the reasons four out of 10 participants used private cloud only. https://hfm.global/hfmtechnology/research-and-data/cloud-usage-trends
  • 11. CLOUD USAGE BY HEDGE FUNDS If using public cloud, what business functions do you run? https://hfm.global/hfmtechnology/research-and-data/cloud-usage-trends
  • 12. CLOUD USAGE BY HEDGE FUNDS What concerns do you have about using the cloud generally? https://hfm.global/hfmtechnology/research-and-data/cloud-usage-trends
  • 13. CLOUD USAGE BY HEDGE FUNDS For new firms especially, “cloud technology allows them the ability to avoid making large capital outlays on servers that may not be fully utilised,” argues Iain Buchanan, CTO of Piquant Technologies. A sub-$500m quant fund launched in 2013, Piquant runs all its technology requirements through the cloud. It has no physical servers, using exclusively cloud services. https://hfm.global/hfmtechnology/analysis/hybrid-solutions-tipped-as-more-managers-embrace-the-cloud/
  • 14. WE’VE BEEN HERE BEFORE?
  • 15. WE’VE BEEN HERE BEFORE? How to cure NEPHOPHOBIA (fear of clouds)
  • 16. HOW SECURE IS SECURE ENOUGH? REGULATORY REQUIREMENTS & INDUSTRY STANDARDS
  • 17. WHAT ARE THE REQUIREMENTS The following Cloud Computing guidance is available: • United Kingdom • Financial Conduct Authority (FCA) • United States • Securities and Exchange Commission (SEC) Office of Compliance Inspections and Examinations (OCIE) https://en.wikipedia.org/wiki/List_of_financial_regulatory_authorities_by_country
  • 18. WHAT DOES THE FCA SAY? https://www.fca.org.uk/static/fca/article-type/news/fg16-5.pdf “We see no fundamental reason why cloud services (including public cloud services) cannot be implemented, with appropriate consideration, in a manner that complies with our rules.” “We have successfully supported both new and existing firms to use cloud and other IT service solutions in a compliant manner.”
  • 19. WHAT DOES THE FCA SAY? • Risk Management • identify current industry good practice, including data and information security management system requirements • International standards • In conducting its due diligence on potential third-party providers, and as part of ongoing monitoring of service provision, a firm may wish to take account of the provider’s adherence to international standards as relevant to the provision of IT services. • Data security • Firms should carry out a security risk assessment • have a data residency policy that sets out where data can be stored “Regulated firms retain full responsibility and accountability for discharging all of their regulatory responsibilities.” “Firms cannot delegate any part of this responsibility to a third party.” https://www.fca.org.uk/static/fca/article-type/news/fg16-5.pdf
  • 20. SHARED RESPONSIBILITY CLOUD SERVICES PROVIDER Responsible for security ‘of’ the cloud CUSTOMER Responsible for security ‘in’ the cloud
  • 21. SHARED RESPONSIBILITY CLOUD SERVICES PROVIDER • Facility operations • Physical Security • Physical Infrastructure • Network Infrastructure • Virtualisation Infrastructure • Hardware lifecycle management CUSTOMER • Identity management • Security Groups (firewalls) • Network Access Control Lists • Choice of guest OS • Application Configuration Options • Account Management flexibility
  • 22. INFORMATION SECURITY MANAGEMENT THE HANDLING AND SAFEGUARDING OF INFORMATION
  • 23. INDUSTRY STANDARDS - ISO 27001 “an auditable, international, information security management standard published by the International Organization for Standardization (ISO) and the International Electrotechnical Commission (IEC) that formally defines requirements for a complete ISMS to help protect and secure an organization’s data” Requirements “User access is centrally managed using appropriate solution” Controls “AWS Identity and Access Management (IAM) reuses Active Directory identities and groups via AD federation services.” http://www.iso.org/iso/iso27001
  • 24. INDUSTRY STANDARDS - ISO 27001 • Management direction for information security • Responsibility for assets • Information classification • Business requirements of access control • User access management • User responsibilities • System and application access control • Cryptographic controls • Operational procedures and responsibilities • Protection from malware • Backup • Logging and monitoring • Control of operational software • Technical vulnerability management • Information systems audit considerations • Network security management • Information transfer • Security in development and support processes • Test data • Information security in supplier relationships • Management of information security incidents and improvements • Information security reviews http://www.iso.org/iso/iso27001
  • 25. DATA CLASSIFICATION AND CONTROLS Restricted Confidential Public Data examples Strategy source code Restricted documents Cleaned tickdata Back office app source code Logs and monitoring data Vendor data Company confidential data 3rd party software binaries IT automation scripts Public website content Access  Access controlled to authorised users & intended audience  Protection from System Admin access  Access logged  Access approved by Information Owner  Access controlled to authorised users & intended audience  Access logged  Access approved by information owner  No specific requirements Transmission  Encrypted in transit  Encrypted in transit  No specific requirements Storage  Encrypted storage  Data resident in UK  Encrypted storage  Data resident in UK  No specific requirements Disposal  Secure erase  Secure erase  No specific requirements
  • 26. ACCESS CONTROL Who needs access to what? • Use the same procedures for on premises as cloud • Joiners and leavers processes • Single sign on • Multifactor authentication (but what about scripts/scheduled tasks) • Least rights privilege • Separation of roles and responsibilities • Time based access (Just In Time Access, temporary access, escalate, drop back)
  • 27. DATA TRANSMISSION • Encrypt data in transit (traversing 3rd party networks / public internet) • Virtual Private Network (VPN) • Use encrypted protocols HTTPS, SFTP, SMB3.0
  • 28. DATA STORAGE • AWS Elastic Block Storage - server side encryption for virtual disks • Data volumes and also boot volumes (since Dec 2015) • AWS Simple Storage Service (S3) server side encryption for objects • Azure Client Side disk encryption Bitlocker (Windows), DM-crypt (Linux) • Azure Server Side encryption in preview, GA due August/September 2016
  • 30. SECURITY MONITORING AND ENFORCEMENT CLOUD SECURITY TOOLS ARE REALLY VERY GOOD…
  • 31. AWS TRUSTED ADVISOR • Security Groups - Specific Ports Unrestricted • Security Groups - Unrestricted Access • IAM Use • Amazon S3 Bucket Permissions • MFA on Root Account • IAM Password Policy • Amazon RDS Security Group Access Risk • AWS CloudTrail Logging • Amazon Route 53 MX and SPF Resource Record Sets • ELB Listener Security • ELB Security Groups • CloudFront Custom SSL Certificates in the IAM Certificate Store • CloudFront SSL Certificate on the Origin Server • IAM Access Key Rotation • Exposed Access Keys https://aws.amazon.com/premiumsupport/trustedadvisor/best-practices/
  • 32. AWS CLOUDTRAIL Audit Trail for every use of AWS API • The identity of the API caller. • The time of the API call. • The source IP address of the API caller. • The request parameters. • The response elements returned by the AWS service Extendable for Event Notifications and Analytics (CloudWatch, Splunk, SumoLogic, LogEntries, Datadog, LogicMonitor, Open Source)
  • 33. INFRASTRUCTURE AS CODE DEFINE AND ENFORCE CONFIGURATION
  • 34. OCTOBER EVENT Grid computing breakfast briefing Wednesday 26th October
  • 35. Hentsu Ltd 1 Fore Street London EC2Y 9DT hello@hentsu.com https://hentsu.com

Editor's Notes

  1. All resolvable