SlideShare a Scribd company logo
1 of 42
Download to read offline
Ayala Summit 2013, Philippines
123456789A8BCD65E9FD9CD9
38699FD35DCB5CD8
 48D35639B88B895DC9
Copyright 2013 FUJITSU LIMITED
William Ho
Regional Senior Consultant
BCCE, BCCLA, CBCP, CCSKV2.1, CCSKV3, CISA, CISM, CRISC, CITPM, MBCI, ITIL,VCP, TOGAF
Ayala Summit 2013, Philippines
Agenda
1Introduction
1Addressing the Concerns and Challenges
1Security Assessment
1Threat Modeling and Suggestions
1Network of Virtual Environments
1Data Security and Mitigations Suggestions
1People Related Implications
1PCI and Cloud Computing
1QA
4ED659 !#9$%A%9'()2
Ayala Summit 2013, Philippines
1 Introduction
1 Addressing the Concerns and Challenges
1 Security Assessment
1 Threats Modeling and Mitigations Suggestions
1 Network of Virtual Environments- Suggested considerations
1 Data Security, Concerns and Suggestions
1 People Related implications and Mitigations
Ayala Summit 2013, Philippines
123456789 AB4C3D3
Prepared for the Journey
Security is still a Major Concerns
Ayala Summit 2013, Philippines
Top 10 Strategic Technology Trends for
2013
Cloud is becoming a mainstream
computing style and delivery option with
hybrid cloud, cloud brokerage and new
delivery, management, and security
options accelerating adoption.
Copyright 2013 FUJITSU
Ayala Summit 2013, Philippines
Concerns
1 A56*958D893D89BB8D93+C598BCD65E*9B,463B89329
B8B56765E96C8969BC29-.C+6B*9.D67358*9/E+D62091659589
B82C8B89FD95897359,33D65E9F9BC296FD35DCB5CD89
284E,8549
Source: Top 10 Strategic Technology Trends for 2013, Gartner April 2, 2013
Copyright 2013 FUJITSU
Ayala Summit 2013, Philippines
1 Introduction
1 Addressing the Concerns and Challenges
1 Security Assessment
1 Threats Modeling and Mitigations Suggestions
1 Network of Virtual Environments- Suggested considerations
1 Data Security, Concerns and Suggestions
1 People Related implications and Mitigations
Ayala Summit 2013, Philippines
Threats
Modeling
Threats
Modeling
Addressing the Concerns and Challenges
• Threats and Mitigations
• Protection of Data, Security and MitigationsSecuritySecurity
Clear
Objectives
Clear
Objectives
• Security Assessment
• Division of Roles and Responsibilities
Roles 
Responsibilities
Roles 
Responsibilities
8 Copyright 2013 FUJITSU LIMITED
Ayala Summit 2013, Philippines
1 Introduction
1 Addressing the Concerns and Challenges
1 Security Assessment
1 Threats Modeling and Mitigations Suggestions
1 Network of Virtual Environments- Suggested considerations
1 Data Security, Concerns and Suggestions
1 People Related implications and Mitigations
Ayala Summit 2013, Philippines
Self Assessment of Security Requirements
10 Copyright 2013 FUJITSU LIMITED
Source : Cloud Security Alliance
Ayala Summit 2013, Philippines
1 Introduction
1 Addressing the Concerns and Challenges
1 Security Assessment
1 Threats Modeling and Mitigations Suggestions
1 Network of Virtual Environments- Suggested considerations
1 Data Security, Concerns and Suggestions
1 People Related implications and Mitigations
Ayala Summit 2013, Philippines
Threat Modeling Example
Threat Description Example
Spoofing Assume identity of client,
server or request/response
Phishing attack to fool user
into sending credentials to
fake site
Tampering Alter contents of request of
response
Message or data integrity
compromised to change
parameters or values
Repudiation Dispute legitimate transaction Illegitimately claiming a
transaction was not
completed
Information Disclosure Unauthorized release of data Unencrypted message
sniffed off the network
Denial of Service Service not available to
authorized users
System flooded by requests
until web server fails
Elevation of privilege Bypass authorization system Attacker changes group
membership
12 Copyright 2011 FUJITSU Asia Pte., Ltd.
Ayala Summit 2013, Philippines
Example Mapping Threat Model-Mitigations
Threat Security Service
Spoofing Authentication
Tampering Digital Signature, Hash
Repudiation Audit Logging
Information Disclosure Encryption
Denial of Service Availability
Elevation of privilege Authorization
13 Copyright 2011 FUJITSU Asia Pte., Ltd.
Ayala Summit 2013, Philippines
1 Introduction
1 Addressing the Concerns and Challenges
1 Security Assessment
1 Threats Modeling and Mitigations Suggestions
1 Network of Virtual Environments- Suggested considerations
1 Data Security, Concerns and Suggestions
1 People Related implications and Mitigations
Ayala Summit 2013, Philippines
Challenges for Networks of Virtual Environments
1 Consolidate physical servers
using virtualization software
- Reduce physical servers
- Realize central consolidation
services, organizational changes, etc.)
Flexible Operations
Is flexible response to requirement changes
such as addition and update of business
systems available? (Upon provision of new
services, organizational changes, etc.)
Challenge 1
However, when configuring business
systems in a virtual environment,
challenges exits!!
System Reliability
Are “security”, “safety”, and “stability of the
business systems ensured?
Challenge 2
network devices and the locations of errors?
Visualize Virtual Environments
When a trouble occurs in communications
between business systems, is it possible to
confirm the operational status of configured
network devices and the locations of errors?
Challenge 3
Virtualization Software
(VMware, Hyper-V, etc.)
Consolidate  Virtualize
Servers
Plant B
Plant A
Headquarters
Office A
Office B
Office C
Copyright 2013 FUJITSU15
Resource pool of physical servers leveraging Virtualisation
Ayala Summit 2013, Philippines
Establish Flexible Operations (Approach to Challenge 1)
1 Templates enable quick creation of business systems to respond to the urgent launch of a new business
1 Automatic network configuration enables quick configuration of networks without specialized knowledge
Copyright 2013 FUJITSU16
Simplified addition and modification to business systems,
including complicated network reconfiguration
When preparing a 3-tier system for example…
System design?
Device configuration?
DMZ (Web) AP DB
FirewallServer Load Balancer
Storage
Servers
Normally
Using Orchestration  Automation:
Possible to quickly prepare business
systems including networks, from the GUI!!
Administrator
Setup is
fast
Network
FirewallServer Load Balancer
Web tier AP tier DB tier So much work is involved!!
Supported devices?
Difficult to prepare it in a short time
Web
tier
AP
tier
DB
tier
Resources (devices) are automatically selected
according to the system configuration
By using a template, no need to
perform system design!!
Automatic configuration of devices during creation
of systems
Administrator
Ayala Summit 2013, Philippines
Ensure System Reliability (Approach to Challenge 2)
Copyright 2013 FUJITSU17
1 1234567892AB2A98C78DEA2F4498C7892AB2A745742A98C77
895A287E7297FEE779E29979692
7E77BEA47DEA2F447C72A27E97572275772E27
2BE29
172 ! 1#
$%34275D76927'5DEAE5
2AB2A7(57#42A
5A2
#9E29972AB2A9
!2997'5A54
!5AE)27
*92A9
*5AE)27
*92A9
'532
+295A27554,EA2F44
(57#4E
1234567DEA2F4497792AB2A745742A97977
Ayala Summit 2013, Philippines
Visualize Virtual Environments (Approach to Challenge 3)
Copyright 2013 FUJITSU18
1 Quickly identify error locations during problems such as service interruptions,
enabling a prompt recovery response and reduced service downtime
DMZ (Web) AP DB
Example
device
configuration
Storage
Firewall
[ASA5500 Series]
L2 Switch
Business
Servers
Admin Server
Periodical Checks (*2)
1. Trouble occurs!
3. Confirm the status change
Identify the device!!(*1)
Infrastructure
Administrator
2. Problem
Detected
5. Check the status on5. Check the status on
the Resource Details
window
4. Click the device name
Identify the locations of devices with errors configured in a
virtual environment and detect status changes
*1: The trouble can be confirmed also from messages notifying of status changes which are output in
the event log as well as the icon change.
*2: Devices registered as network devices are monitored.
Ayala Summit 2013, Philippines
1 Introduction
1 Addressing the Concerns and Challenges
1 Security Assessment
1 Threats Modeling and Mitigations Suggestions
1 Network of Virtual Environments- Suggested considerations
1 Data Security, Concerns and Suggestions
1 People Related implications and Mitigations
Ayala Summit 2013, Philippines
WHERE IS MY DATA
20
Your Data
Unstructured data
File Systems
Office documents,
PDF, Vision, Audio 
other
Fax/Print Servers
File Servers
Business Application
Systems
(SAP, PeopleSoft, Oracle
Financials, In-house,
CRM, eComm/eBiz, etc.)
Application Server
Structured data
Database Systems
(SQL, Oracle, DB2,
Informix, MySQL)
Database Server
Security 
Other Systems
(Event logs, Error logs
Cache, Encryption keys,
 other secrets)
Security Systems
Data Communications
Eg. VoIP Systems
FTP/Dropbox Server
Email Servers
Storage  Backup
Systems
Eg. SAN/NAS
Backup Systems
1
2343567894958A5B8CC6D6A45CEDF34953AB58A5F3A5D6E984ED
AE8A5345856A53AB5E54E596D6546523435
895D8483
Copyright 2013 FUJITSU LIMITED
Ayala Summit 2013, Philippines
Considerations
1 535923539169+895D82
1 59169+893BB869
1 58D89169659+895D82
1 5359B5D93D896943B8
1 5969D846+89FD98BCD65E
1 535969589)35363C8935948B6F6B94659F956,8
1 (88569B,463B8*978C356*985B
DataDataDataData
CreationCreationCreationCreation
DataDataDataData
SecuritySecuritySecuritySecurity
LifecycleLifecycleLifecycleLifecycle
ForForForFor
Cloud ComputingCloud ComputingCloud ComputingCloud Computing
Data
Storage
DataDataDataData
UsageUsageUsageUsage
DataDataDataData
SharingSharingSharingSharing
DataDataDataData
ArchiveArchiveArchiveArchive
DataDataDataData
DisposalDisposalDisposalDisposal
21 Copyright 2011 FUJITSU Asia Pte., Ltd.
Ayala Summit 2013, Philippines 22
DATA SECURITY LIFECYCLE
Source:
Security Guidance for Critical Areas of Focus
in Cloud Computing V3.0, Information Management  Data Security
Copyright 2013 FUJITSU LIMITED
Ayala Summit 2013, Philippines 23
This may also be known as Create/Update because it applies to
creating or changing a data/content element, not just a document
or database. Creation is the generation of new digital content, or
the alteration/updating of existing content.
Consideration (examples)
Ownership
Classification
Rights Management
1232456789A3B4CAD67B7C6
Copyright 2013 FUJITSU LIMITED
Ayala Summit 2013, Philippines 24
Storing is the act committing the digital data to some sort of
storage repository, and typically occurs nearly simultaneously with
creation.
Considerations (Examples)
Access Controls
Encryption
Rights Management
Isolation
1232456789A3B4CAD67B7C6
Copyright 2013 FUJITSU LIMITED
Ayala Summit 2013, Philippines
rmt/0- Utilization
0
5
10
15
20
25
30
35
40
45
2:00
2:03
2:10
2:25
2:40
2:55
3:10
3:25
3:40
3:55
4:10
4:25
4:40
4:55
5:10
5:25
5:40
5:55
6:10
6:25
6:40
6:55
7:10
7:25
7:40
7:55
8:10
8:25
8:40
8:55
9:10
9:25
9:40
9:55
27/03/01 - 28/03/01
Percentage(%)
%wait
%busy
25
Data is viewed, processed, or otherwise used in some
sort of activity
Considerations (Example)
Internal/External
Third Parties
Appropriateness
Compliance
1232456789A3B4CAD67B7C6
Copyright 2013 FUJITSU LIMITED
Ayala Summit 2013, Philippines 26
Data is exchanged between users, organisations, groups and
individual.
Considerations (Examples)
Internal/External
Third Parties
Purposes
Compliance
Locations
1232456789A3B4CAD67B7C6
Local
Mirroring
(RAID 1)
Remote
(Offsite)
Replication
1234563457348
Server Server
Primary Replica
Copyright 2013 FUJITSU LIMITED
Ayala Summit 2013, Philippines 27
Data leaves active use and enters long-term storage.
Considerations (Examples)
Legal/Law
Sites/Locations
Media type
Retention
Ownership
1232456789A3B4CAD67B7C6
Copyright 2013 FUJITSU LIMITED
Ayala Summit 2013, Philippines 28
Data is permanently destroyed using physical or digital means
(e.g., cryptoshredding).
1232456789A3B4CAD67B7C6
Considerations (Examples)
Secure
Complete
Assurance
Proof
Content Discovery
Copyright 2013 FUJITSU LIMITED
Ayala Summit 2013, Philippines 29
2EECA723AF
 6
2
EC65
Illustrations of application for Data Security Lifecycle:
Data-Impact (useful for Data Classification)
Data Security Lifecycle (useful for RACI)
Copyright 2013 FUJITSU LIMITED
Ayala Summit 2013, Philippines 30
36
EC236 46
2
EC6
Copyright 2013 FUJITSU LIMITED
Ayala Summit 2013, Philippines 31
36
EC236446
2
EC6
Copyright 2013 FUJITSU LIMITED
Ayala Summit 2013, Philippines
Sharing other approaches/scenarios
1 Introduction
1 Addressing the Concerns and Challenges
1 Security Assessment
1 Threats Modeling and Mitigations Suggestions
1 Network of Virtual Environments- Suggested considerations
1 Data Security, Concerns and Suggestions
1 People Related implications and Mitigations
Ayala Summit 2013, Philippines
Logical Platform A
Division A
Segregation  Isolation
1 The Access Control Feature controls the access between tenants and platforms
1 Address Translation Function can hide secure server information
1 The IPS feature protects each platform from flooding-attacks
Physical ServerPhysical Server
・・・
Server
Deploy
Server
Service user of division B
Logical Platform
Division B
Internet
Improved network security for customers, projects  divisions
Logical Platform B
NS Appliance(*)NS Appliance(*)
Server
Physical ServerPhysical Server
・・・
NS Appliance(*)NS Appliance(*)
Copyright 2013 FUJITSU33
Ayala Summit 2013, Philippines
Data Protection- Encryption
1 Encrypts drive data
Encrypt confidential information in drives
Encryption
Encryption is specified
on a LUN basis
Encryption
Unencrypted
data
Encryption
Encryption
Encryption Encryption
Encryption Encryption
Encryption
Encryption
Encryption
Encryption
Encryption
Encryption setting and
management
Prevents information
leakage
Server A Server B Server C
unique encryption scheme
- Less performance degradation than
128bit AES
- Closed unique technology ensures the
safety
Encryption
AES (Advanced Encryption Standard) is an encryption standard of the Federal Information Processing Standards
Data removal
protection
Storage
34 Copyright 2013 FUJITSU LIMITED
Ayala Summit 2013, Philippines
1234567
89697
14564A
De-Coupling
Client A
Office Users
Client A
Remote Users
Client A
Physical App Server
Client A
Physical DB Server
Client A
Physical Web Server
Client A
Virtual App Server
Client A
Virtual DB Server
Client A
Virtual Web Server
39B3A6C927D4E7F4A
4A
A B3A6C927D4E7F4A
4A
39B3A6C927
7F4A
4A
A9B3A6C927
7F4A
4A
A9B3A6C9278
7F4A
4A
39B3A6C9278
7F4A
4A
39B3A6C927D4E7F4A
4A
89697
14564A
39B3A6C927D4E7F4A
4A
A B3A6C927D4E7F4A
4A
39B3A6C927

More Related Content

What's hot

Protecting Utilities through Business Continuity - Scott Roe, Corporate Risk ...
Protecting Utilities through Business Continuity - Scott Roe, Corporate Risk ...Protecting Utilities through Business Continuity - Scott Roe, Corporate Risk ...
Protecting Utilities through Business Continuity - Scott Roe, Corporate Risk ...Energy Network marcus evans
 
Securex Selects Nimsoft to Streamline IT Monitoring
Securex Selects Nimsoft to Streamline IT MonitoringSecurex Selects Nimsoft to Streamline IT Monitoring
Securex Selects Nimsoft to Streamline IT MonitoringCA Nimsoft
 
Secure and Scale Your Virtual Infrastructure While Meeting Compliance Mandates
Secure and Scale Your Virtual Infrastructure While Meeting Compliance MandatesSecure and Scale Your Virtual Infrastructure While Meeting Compliance Mandates
Secure and Scale Your Virtual Infrastructure While Meeting Compliance MandatesHyTrust
 
From reactive to automated reducing costs through mature security processes i...
From reactive to automated reducing costs through mature security processes i...From reactive to automated reducing costs through mature security processes i...
From reactive to automated reducing costs through mature security processes i...NetIQ
 
WiMAXHealthcare 4G World - Chicago Sep 15-18
WiMAXHealthcare 4G World - Chicago Sep 15-18WiMAXHealthcare 4G World - Chicago Sep 15-18
WiMAXHealthcare 4G World - Chicago Sep 15-18Cisco Service Provider
 
Unified Email Management
Unified Email ManagementUnified Email Management
Unified Email ManagementTim Pickard
 
How to Eliminate the #1 Cause of Network Down-time
How to Eliminate the #1 Cause of Network Down-timeHow to Eliminate the #1 Cause of Network Down-time
How to Eliminate the #1 Cause of Network Down-timeSolarWinds
 
Cisco VMDC Cloud Security 1.0 Design Guide
Cisco VMDC Cloud Security 1.0 Design GuideCisco VMDC Cloud Security 1.0 Design Guide
Cisco VMDC Cloud Security 1.0 Design GuideCisco Service Provider
 
Cryptika cybersecurity - company profile
Cryptika cybersecurity - company profileCryptika cybersecurity - company profile
Cryptika cybersecurity - company profileSafwan Talab
 
About graycon
About grayconAbout graycon
About grayconmartyrj
 
How to Kickstart Security and Compliance for Your AWS, Azure, and GCP Clouds
How to Kickstart Security and Compliance for Your AWS, Azure, and GCP CloudsHow to Kickstart Security and Compliance for Your AWS, Azure, and GCP Clouds
How to Kickstart Security and Compliance for Your AWS, Azure, and GCP CloudsSBWebinars
 
Data Protection Fde Solution Presentation
Data Protection Fde Solution PresentationData Protection Fde Solution Presentation
Data Protection Fde Solution Presentationjuniortstanley
 
Cloud Security: Perception VS Reality
Cloud Security: Perception VS RealityCloud Security: Perception VS Reality
Cloud Security: Perception VS RealityKVH Co. Ltd.
 
KASPERSKY SECURITY CENTER IMPLEMENTATION
KASPERSKY SECURITY CENTER IMPLEMENTATIONKASPERSKY SECURITY CENTER IMPLEMENTATION
KASPERSKY SECURITY CENTER IMPLEMENTATIONGS CHO
 
Cisco Connect 2018 Malaysia - introducing cisco dna assurance-the future of n...
Cisco Connect 2018 Malaysia - introducing cisco dna assurance-the future of n...Cisco Connect 2018 Malaysia - introducing cisco dna assurance-the future of n...
Cisco Connect 2018 Malaysia - introducing cisco dna assurance-the future of n...NetworkCollaborators
 
Introducing Kaspersky Security for Virtualization
Introducing Kaspersky Security for VirtualizationIntroducing Kaspersky Security for Virtualization
Introducing Kaspersky Security for VirtualizationAriel Martin Beliera
 
Symantec Introduces New Security Solutions to Counter Advanced Persistent Thr...
Symantec Introduces New Security Solutions to Counter Advanced Persistent Thr...Symantec Introduces New Security Solutions to Counter Advanced Persistent Thr...
Symantec Introduces New Security Solutions to Counter Advanced Persistent Thr...Symantec
 

What's hot (20)

Protecting Utilities through Business Continuity - Scott Roe, Corporate Risk ...
Protecting Utilities through Business Continuity - Scott Roe, Corporate Risk ...Protecting Utilities through Business Continuity - Scott Roe, Corporate Risk ...
Protecting Utilities through Business Continuity - Scott Roe, Corporate Risk ...
 
Securex Selects Nimsoft to Streamline IT Monitoring
Securex Selects Nimsoft to Streamline IT MonitoringSecurex Selects Nimsoft to Streamline IT Monitoring
Securex Selects Nimsoft to Streamline IT Monitoring
 
Secure and Scale Your Virtual Infrastructure While Meeting Compliance Mandates
Secure and Scale Your Virtual Infrastructure While Meeting Compliance MandatesSecure and Scale Your Virtual Infrastructure While Meeting Compliance Mandates
Secure and Scale Your Virtual Infrastructure While Meeting Compliance Mandates
 
Beachbody, LLC
Beachbody, LLCBeachbody, LLC
Beachbody, LLC
 
From reactive to automated reducing costs through mature security processes i...
From reactive to automated reducing costs through mature security processes i...From reactive to automated reducing costs through mature security processes i...
From reactive to automated reducing costs through mature security processes i...
 
WiMAXHealthcare 4G World - Chicago Sep 15-18
WiMAXHealthcare 4G World - Chicago Sep 15-18WiMAXHealthcare 4G World - Chicago Sep 15-18
WiMAXHealthcare 4G World - Chicago Sep 15-18
 
Unified Email Management
Unified Email ManagementUnified Email Management
Unified Email Management
 
How to Eliminate the #1 Cause of Network Down-time
How to Eliminate the #1 Cause of Network Down-timeHow to Eliminate the #1 Cause of Network Down-time
How to Eliminate the #1 Cause of Network Down-time
 
Cisco VMDC Cloud Security 1.0 Design Guide
Cisco VMDC Cloud Security 1.0 Design GuideCisco VMDC Cloud Security 1.0 Design Guide
Cisco VMDC Cloud Security 1.0 Design Guide
 
Cryptika cybersecurity - company profile
Cryptika cybersecurity - company profileCryptika cybersecurity - company profile
Cryptika cybersecurity - company profile
 
Cloud security with Sage Construction Anywhere
Cloud security with Sage Construction AnywhereCloud security with Sage Construction Anywhere
Cloud security with Sage Construction Anywhere
 
About graycon
About grayconAbout graycon
About graycon
 
How to Kickstart Security and Compliance for Your AWS, Azure, and GCP Clouds
How to Kickstart Security and Compliance for Your AWS, Azure, and GCP CloudsHow to Kickstart Security and Compliance for Your AWS, Azure, and GCP Clouds
How to Kickstart Security and Compliance for Your AWS, Azure, and GCP Clouds
 
Data Protection Fde Solution Presentation
Data Protection Fde Solution PresentationData Protection Fde Solution Presentation
Data Protection Fde Solution Presentation
 
Cloud Security: Perception VS Reality
Cloud Security: Perception VS RealityCloud Security: Perception VS Reality
Cloud Security: Perception VS Reality
 
KASPERSKY SECURITY CENTER IMPLEMENTATION
KASPERSKY SECURITY CENTER IMPLEMENTATIONKASPERSKY SECURITY CENTER IMPLEMENTATION
KASPERSKY SECURITY CENTER IMPLEMENTATION
 
Cisco Connect 2018 Malaysia - introducing cisco dna assurance-the future of n...
Cisco Connect 2018 Malaysia - introducing cisco dna assurance-the future of n...Cisco Connect 2018 Malaysia - introducing cisco dna assurance-the future of n...
Cisco Connect 2018 Malaysia - introducing cisco dna assurance-the future of n...
 
Infrastructure Management Services
Infrastructure Management ServicesInfrastructure Management Services
Infrastructure Management Services
 
Introducing Kaspersky Security for Virtualization
Introducing Kaspersky Security for VirtualizationIntroducing Kaspersky Security for Virtualization
Introducing Kaspersky Security for Virtualization
 
Symantec Introduces New Security Solutions to Counter Advanced Persistent Thr...
Symantec Introduces New Security Solutions to Counter Advanced Persistent Thr...Symantec Introduces New Security Solutions to Counter Advanced Persistent Thr...
Symantec Introduces New Security Solutions to Counter Advanced Persistent Thr...
 

Viewers also liked

C S R 2006 Ppt A T E A S O F 06302006
C S R 2006 Ppt  A T E  A S  O F 06302006C S R 2006 Ppt  A T E  A S  O F 06302006
C S R 2006 Ppt A T E A S O F 06302006Psdmn Phil
 
Ayala Westgrove Heights June 2012
Ayala Westgrove Heights June 2012Ayala Westgrove Heights June 2012
Ayala Westgrove Heights June 2012towerbookph
 
Angela ayala p12 ppt
Angela ayala p12 pptAngela ayala p12 ppt
Angela ayala p12 pptangela209515
 
Ayala Greenfield Estates June 2012
Ayala Greenfield Estates June 2012Ayala Greenfield Estates June 2012
Ayala Greenfield Estates June 2012towerbookph
 
Social responsibility of business
Social responsibility of businessSocial responsibility of business
Social responsibility of businessFlex
 

Viewers also liked (7)

C S R 2006 Ppt A T E A S O F 06302006
C S R 2006 Ppt  A T E  A S  O F 06302006C S R 2006 Ppt  A T E  A S  O F 06302006
C S R 2006 Ppt A T E A S O F 06302006
 
Arturo Ayala Arcipreste MD FAANS
Arturo Ayala Arcipreste MD FAANSArturo Ayala Arcipreste MD FAANS
Arturo Ayala Arcipreste MD FAANS
 
Ayala Westgrove Heights June 2012
Ayala Westgrove Heights June 2012Ayala Westgrove Heights June 2012
Ayala Westgrove Heights June 2012
 
Angela ayala p12 ppt
Angela ayala p12 pptAngela ayala p12 ppt
Angela ayala p12 ppt
 
Ayala Greenfield Estates June 2012
Ayala Greenfield Estates June 2012Ayala Greenfield Estates June 2012
Ayala Greenfield Estates June 2012
 
Deicy Ayala Penaloza 63459541
Deicy Ayala Penaloza 63459541Deicy Ayala Penaloza 63459541
Deicy Ayala Penaloza 63459541
 
Social responsibility of business
Social responsibility of businessSocial responsibility of business
Social responsibility of business
 

Similar to Ayala Summit 2013 Cloud Security

APAC Partner Update: SolarWinds Security
APAC Partner Update: SolarWinds SecurityAPAC Partner Update: SolarWinds Security
APAC Partner Update: SolarWinds SecuritySolarWinds
 
MySQL Enterprise Monitor
MySQL Enterprise MonitorMySQL Enterprise Monitor
MySQL Enterprise MonitorTed Wennmark
 
SolarWinds Online Federal User Group
SolarWinds Online Federal User GroupSolarWinds Online Federal User Group
SolarWinds Online Federal User GroupSolarWinds
 
Presentation topic for Philippines SAP user group forum
Presentation topic for Philippines SAP user group forumPresentation topic for Philippines SAP user group forum
Presentation topic for Philippines SAP user group forumWilliam Ho (何添福)
 
Cisco Connect 2018 Indonesia - Introducing cisco dna assurance
Cisco Connect 2018 Indonesia - Introducing cisco dna assurance Cisco Connect 2018 Indonesia - Introducing cisco dna assurance
Cisco Connect 2018 Indonesia - Introducing cisco dna assurance NetworkCollaborators
 
Cisco cloupia bdm presentation
Cisco cloupia bdm presentationCisco cloupia bdm presentation
Cisco cloupia bdm presentationxKinAnx
 
Awan heitech launching fujitsu [compatibility mode] (small)
Awan heitech launching fujitsu [compatibility mode] (small)Awan heitech launching fujitsu [compatibility mode] (small)
Awan heitech launching fujitsu [compatibility mode] (small)William Ho (何添福)
 
How to Monitor Digital Dependencies Across Your Modern IT Stack
How to Monitor Digital Dependencies Across Your Modern IT StackHow to Monitor Digital Dependencies Across Your Modern IT Stack
How to Monitor Digital Dependencies Across Your Modern IT StackThousandEyes
 
How to Monitor Digital Dependencies Across Your Modern IT Stack
How to Monitor Digital Dependencies Across Your Modern IT StackHow to Monitor Digital Dependencies Across Your Modern IT Stack
How to Monitor Digital Dependencies Across Your Modern IT StackThousandEyes
 
MySQL Enterprise Monitor
MySQL Enterprise MonitorMySQL Enterprise Monitor
MySQL Enterprise MonitorMark Swarbrick
 
IT Demonstration PowerPoint Presentation Slides
IT Demonstration PowerPoint Presentation SlidesIT Demonstration PowerPoint Presentation Slides
IT Demonstration PowerPoint Presentation SlidesSlideTeam
 
ISO/IEC 27001, ISO/IEC 27002 and ISO/IEC 27032: How do they map?
ISO/IEC 27001, ISO/IEC 27002 and ISO/IEC 27032: How do they map?ISO/IEC 27001, ISO/IEC 27002 and ISO/IEC 27032: How do they map?
ISO/IEC 27001, ISO/IEC 27002 and ISO/IEC 27032: How do they map?PECB
 
Using NetFlow to Improve Network Visibility and Application Performance
Using NetFlow to Improve Network Visibility and Application PerformanceUsing NetFlow to Improve Network Visibility and Application Performance
Using NetFlow to Improve Network Visibility and Application PerformanceEmulex Corporation
 
MGT3342BUS - Architecting Data Protection with Rubrik - VMworld 2017
MGT3342BUS - Architecting Data Protection with Rubrik - VMworld 2017MGT3342BUS - Architecting Data Protection with Rubrik - VMworld 2017
MGT3342BUS - Architecting Data Protection with Rubrik - VMworld 2017Andrew Miller
 
IT Simplification And Modernization PowerPoint Presentation Slides
IT Simplification And Modernization PowerPoint Presentation SlidesIT Simplification And Modernization PowerPoint Presentation Slides
IT Simplification And Modernization PowerPoint Presentation SlidesSlideTeam
 
Selling Cloud Services To Earn More Revenue PowerPoint Presentation Slides
Selling Cloud Services To Earn More Revenue PowerPoint Presentation SlidesSelling Cloud Services To Earn More Revenue PowerPoint Presentation Slides
Selling Cloud Services To Earn More Revenue PowerPoint Presentation SlidesSlideTeam
 
IT Simplification Framework PowerPoint Presentation Slides
IT Simplification Framework PowerPoint Presentation Slides IT Simplification Framework PowerPoint Presentation Slides
IT Simplification Framework PowerPoint Presentation Slides SlideTeam
 
Integrating of security activates in agile process
Integrating of security activates in agile processIntegrating of security activates in agile process
Integrating of security activates in agile processZubair Rahim
 
IRJET- A Survey on SaaS-Attacks and Digital Forensic
IRJET-  	  A Survey on SaaS-Attacks and Digital ForensicIRJET-  	  A Survey on SaaS-Attacks and Digital Forensic
IRJET- A Survey on SaaS-Attacks and Digital ForensicIRJET Journal
 

Similar to Ayala Summit 2013 Cloud Security (20)

APAC Partner Update: SolarWinds Security
APAC Partner Update: SolarWinds SecurityAPAC Partner Update: SolarWinds Security
APAC Partner Update: SolarWinds Security
 
MySQL Enterprise Monitor
MySQL Enterprise MonitorMySQL Enterprise Monitor
MySQL Enterprise Monitor
 
SolarWinds Online Federal User Group
SolarWinds Online Federal User GroupSolarWinds Online Federal User Group
SolarWinds Online Federal User Group
 
Presentation topic for Philippines SAP user group forum
Presentation topic for Philippines SAP user group forumPresentation topic for Philippines SAP user group forum
Presentation topic for Philippines SAP user group forum
 
Cisco Connect 2018 Indonesia - Introducing cisco dna assurance
Cisco Connect 2018 Indonesia - Introducing cisco dna assurance Cisco Connect 2018 Indonesia - Introducing cisco dna assurance
Cisco Connect 2018 Indonesia - Introducing cisco dna assurance
 
Cisco cloupia bdm presentation
Cisco cloupia bdm presentationCisco cloupia bdm presentation
Cisco cloupia bdm presentation
 
Awan heitech launching fujitsu [compatibility mode] (small)
Awan heitech launching fujitsu [compatibility mode] (small)Awan heitech launching fujitsu [compatibility mode] (small)
Awan heitech launching fujitsu [compatibility mode] (small)
 
How to Monitor Digital Dependencies Across Your Modern IT Stack
How to Monitor Digital Dependencies Across Your Modern IT StackHow to Monitor Digital Dependencies Across Your Modern IT Stack
How to Monitor Digital Dependencies Across Your Modern IT Stack
 
How to Monitor Digital Dependencies Across Your Modern IT Stack
How to Monitor Digital Dependencies Across Your Modern IT StackHow to Monitor Digital Dependencies Across Your Modern IT Stack
How to Monitor Digital Dependencies Across Your Modern IT Stack
 
MySQL Enterprise Monitor
MySQL Enterprise MonitorMySQL Enterprise Monitor
MySQL Enterprise Monitor
 
IT Demonstration PowerPoint Presentation Slides
IT Demonstration PowerPoint Presentation SlidesIT Demonstration PowerPoint Presentation Slides
IT Demonstration PowerPoint Presentation Slides
 
ISO/IEC 27001, ISO/IEC 27002 and ISO/IEC 27032: How do they map?
ISO/IEC 27001, ISO/IEC 27002 and ISO/IEC 27032: How do they map?ISO/IEC 27001, ISO/IEC 27002 and ISO/IEC 27032: How do they map?
ISO/IEC 27001, ISO/IEC 27002 and ISO/IEC 27032: How do they map?
 
Using NetFlow to Improve Network Visibility and Application Performance
Using NetFlow to Improve Network Visibility and Application PerformanceUsing NetFlow to Improve Network Visibility and Application Performance
Using NetFlow to Improve Network Visibility and Application Performance
 
MGT3342BUS - Architecting Data Protection with Rubrik - VMworld 2017
MGT3342BUS - Architecting Data Protection with Rubrik - VMworld 2017MGT3342BUS - Architecting Data Protection with Rubrik - VMworld 2017
MGT3342BUS - Architecting Data Protection with Rubrik - VMworld 2017
 
IT Simplification And Modernization PowerPoint Presentation Slides
IT Simplification And Modernization PowerPoint Presentation SlidesIT Simplification And Modernization PowerPoint Presentation Slides
IT Simplification And Modernization PowerPoint Presentation Slides
 
Selling Cloud Services To Earn More Revenue PowerPoint Presentation Slides
Selling Cloud Services To Earn More Revenue PowerPoint Presentation SlidesSelling Cloud Services To Earn More Revenue PowerPoint Presentation Slides
Selling Cloud Services To Earn More Revenue PowerPoint Presentation Slides
 
IT Simplification Framework PowerPoint Presentation Slides
IT Simplification Framework PowerPoint Presentation Slides IT Simplification Framework PowerPoint Presentation Slides
IT Simplification Framework PowerPoint Presentation Slides
 
Integrating of security activates in agile process
Integrating of security activates in agile processIntegrating of security activates in agile process
Integrating of security activates in agile process
 
Neville Fuller
Neville FullerNeville Fuller
Neville Fuller
 
IRJET- A Survey on SaaS-Attacks and Digital Forensic
IRJET-  	  A Survey on SaaS-Attacks and Digital ForensicIRJET-  	  A Survey on SaaS-Attacks and Digital Forensic
IRJET- A Survey on SaaS-Attacks and Digital Forensic
 

Recently uploaded

Beyond Resumes_ How Volunteering Shapes Career Trajectories by Kent Kubie
Beyond Resumes_ How Volunteering Shapes Career Trajectories by Kent KubieBeyond Resumes_ How Volunteering Shapes Career Trajectories by Kent Kubie
Beyond Resumes_ How Volunteering Shapes Career Trajectories by Kent KubieKent Kubie
 
Situation Analysis | Management Company.
Situation Analysis | Management Company.Situation Analysis | Management Company.
Situation Analysis | Management Company.DanielaQuiroz63
 
The Skin Games 2024 25 - Sponsorship Deck
The Skin Games 2024 25 - Sponsorship DeckThe Skin Games 2024 25 - Sponsorship Deck
The Skin Games 2024 25 - Sponsorship DeckToluwanimi Balogun
 
Uncover Insightful User Journey Secrets Using GA4 Reports
Uncover Insightful User Journey Secrets Using GA4 ReportsUncover Insightful User Journey Secrets Using GA4 Reports
Uncover Insightful User Journey Secrets Using GA4 ReportsVWO
 
Branding strategies of new company .pptx
Branding strategies of new company .pptxBranding strategies of new company .pptx
Branding strategies of new company .pptxVikasTiwari846641
 
Russian Call Girls Nagpur Swara 8617697112 Independent Escort Service Nagpur
Russian Call Girls Nagpur Swara 8617697112 Independent Escort Service NagpurRussian Call Girls Nagpur Swara 8617697112 Independent Escort Service Nagpur
Russian Call Girls Nagpur Swara 8617697112 Independent Escort Service NagpurCall girls in Ahmedabad High profile
 
VIP 7001035870 Find & Meet Hyderabad Call Girls Film Nagar high-profile Call ...
VIP 7001035870 Find & Meet Hyderabad Call Girls Film Nagar high-profile Call ...VIP 7001035870 Find & Meet Hyderabad Call Girls Film Nagar high-profile Call ...
VIP 7001035870 Find & Meet Hyderabad Call Girls Film Nagar high-profile Call ...aditipandeya
 
Brighton SEO April 2024 - The Good, the Bad & the Ugly of SEO Success
Brighton SEO April 2024 - The Good, the Bad & the Ugly of SEO SuccessBrighton SEO April 2024 - The Good, the Bad & the Ugly of SEO Success
Brighton SEO April 2024 - The Good, the Bad & the Ugly of SEO SuccessVarn
 
Avoid the 2025 web accessibility rush: do not fear WCAG compliance
Avoid the 2025 web accessibility rush: do not fear WCAG complianceAvoid the 2025 web accessibility rush: do not fear WCAG compliance
Avoid the 2025 web accessibility rush: do not fear WCAG complianceDamien ROBERT
 
Moving beyond multi-touch attribution - DigiMarCon CanWest 2024
Moving beyond multi-touch attribution - DigiMarCon CanWest 2024Moving beyond multi-touch attribution - DigiMarCon CanWest 2024
Moving beyond multi-touch attribution - DigiMarCon CanWest 2024Richard Ingilby
 
Brand experience Peoria City Soccer Presentation.pdf
Brand experience Peoria City Soccer Presentation.pdfBrand experience Peoria City Soccer Presentation.pdf
Brand experience Peoria City Soccer Presentation.pdftbatkhuu1
 
How to Leverage Behavioral Science Insights for Direct Mail Success
How to Leverage Behavioral Science Insights for Direct Mail SuccessHow to Leverage Behavioral Science Insights for Direct Mail Success
How to Leverage Behavioral Science Insights for Direct Mail SuccessAggregage
 
BLOOM_April2024. Balmer Lawrie Online Monthly Bulletin
BLOOM_April2024. Balmer Lawrie Online Monthly BulletinBLOOM_April2024. Balmer Lawrie Online Monthly Bulletin
BLOOM_April2024. Balmer Lawrie Online Monthly BulletinBalmerLawrie
 
CALL ON ➥8923113531 🔝Call Girls Hazratganj Lucknow best sexual service Online
CALL ON ➥8923113531 🔝Call Girls Hazratganj Lucknow best sexual service OnlineCALL ON ➥8923113531 🔝Call Girls Hazratganj Lucknow best sexual service Online
CALL ON ➥8923113531 🔝Call Girls Hazratganj Lucknow best sexual service Onlineanilsa9823
 
Kraft Mac and Cheese campaign presentation
Kraft Mac and Cheese campaign presentationKraft Mac and Cheese campaign presentation
Kraft Mac and Cheese campaign presentationtbatkhuu1
 
How videos can elevate your Google rankings and improve your EEAT - Benjamin ...
How videos can elevate your Google rankings and improve your EEAT - Benjamin ...How videos can elevate your Google rankings and improve your EEAT - Benjamin ...
How videos can elevate your Google rankings and improve your EEAT - Benjamin ...Benjamin Szturmaj
 

Recently uploaded (20)

Beyond Resumes_ How Volunteering Shapes Career Trajectories by Kent Kubie
Beyond Resumes_ How Volunteering Shapes Career Trajectories by Kent KubieBeyond Resumes_ How Volunteering Shapes Career Trajectories by Kent Kubie
Beyond Resumes_ How Volunteering Shapes Career Trajectories by Kent Kubie
 
Situation Analysis | Management Company.
Situation Analysis | Management Company.Situation Analysis | Management Company.
Situation Analysis | Management Company.
 
The Skin Games 2024 25 - Sponsorship Deck
The Skin Games 2024 25 - Sponsorship DeckThe Skin Games 2024 25 - Sponsorship Deck
The Skin Games 2024 25 - Sponsorship Deck
 
No Cookies No Problem - Steve Krull, Be Found Online
No Cookies No Problem - Steve Krull, Be Found OnlineNo Cookies No Problem - Steve Krull, Be Found Online
No Cookies No Problem - Steve Krull, Be Found Online
 
Uncover Insightful User Journey Secrets Using GA4 Reports
Uncover Insightful User Journey Secrets Using GA4 ReportsUncover Insightful User Journey Secrets Using GA4 Reports
Uncover Insightful User Journey Secrets Using GA4 Reports
 
Branding strategies of new company .pptx
Branding strategies of new company .pptxBranding strategies of new company .pptx
Branding strategies of new company .pptx
 
Russian Call Girls Nagpur Swara 8617697112 Independent Escort Service Nagpur
Russian Call Girls Nagpur Swara 8617697112 Independent Escort Service NagpurRussian Call Girls Nagpur Swara 8617697112 Independent Escort Service Nagpur
Russian Call Girls Nagpur Swara 8617697112 Independent Escort Service Nagpur
 
VIP 7001035870 Find & Meet Hyderabad Call Girls Film Nagar high-profile Call ...
VIP 7001035870 Find & Meet Hyderabad Call Girls Film Nagar high-profile Call ...VIP 7001035870 Find & Meet Hyderabad Call Girls Film Nagar high-profile Call ...
VIP 7001035870 Find & Meet Hyderabad Call Girls Film Nagar high-profile Call ...
 
Brighton SEO April 2024 - The Good, the Bad & the Ugly of SEO Success
Brighton SEO April 2024 - The Good, the Bad & the Ugly of SEO SuccessBrighton SEO April 2024 - The Good, the Bad & the Ugly of SEO Success
Brighton SEO April 2024 - The Good, the Bad & the Ugly of SEO Success
 
The Future of Brands on LinkedIn - Alison Kaltman
The Future of Brands on LinkedIn - Alison KaltmanThe Future of Brands on LinkedIn - Alison Kaltman
The Future of Brands on LinkedIn - Alison Kaltman
 
Avoid the 2025 web accessibility rush: do not fear WCAG compliance
Avoid the 2025 web accessibility rush: do not fear WCAG complianceAvoid the 2025 web accessibility rush: do not fear WCAG compliance
Avoid the 2025 web accessibility rush: do not fear WCAG compliance
 
Moving beyond multi-touch attribution - DigiMarCon CanWest 2024
Moving beyond multi-touch attribution - DigiMarCon CanWest 2024Moving beyond multi-touch attribution - DigiMarCon CanWest 2024
Moving beyond multi-touch attribution - DigiMarCon CanWest 2024
 
Brand experience Peoria City Soccer Presentation.pdf
Brand experience Peoria City Soccer Presentation.pdfBrand experience Peoria City Soccer Presentation.pdf
Brand experience Peoria City Soccer Presentation.pdf
 
How to Leverage Behavioral Science Insights for Direct Mail Success
How to Leverage Behavioral Science Insights for Direct Mail SuccessHow to Leverage Behavioral Science Insights for Direct Mail Success
How to Leverage Behavioral Science Insights for Direct Mail Success
 
Generative AI Master Class - Generative AI, Unleash Creative Opportunity - Pe...
Generative AI Master Class - Generative AI, Unleash Creative Opportunity - Pe...Generative AI Master Class - Generative AI, Unleash Creative Opportunity - Pe...
Generative AI Master Class - Generative AI, Unleash Creative Opportunity - Pe...
 
BLOOM_April2024. Balmer Lawrie Online Monthly Bulletin
BLOOM_April2024. Balmer Lawrie Online Monthly BulletinBLOOM_April2024. Balmer Lawrie Online Monthly Bulletin
BLOOM_April2024. Balmer Lawrie Online Monthly Bulletin
 
CALL ON ➥8923113531 🔝Call Girls Hazratganj Lucknow best sexual service Online
CALL ON ➥8923113531 🔝Call Girls Hazratganj Lucknow best sexual service OnlineCALL ON ➥8923113531 🔝Call Girls Hazratganj Lucknow best sexual service Online
CALL ON ➥8923113531 🔝Call Girls Hazratganj Lucknow best sexual service Online
 
Kraft Mac and Cheese campaign presentation
Kraft Mac and Cheese campaign presentationKraft Mac and Cheese campaign presentation
Kraft Mac and Cheese campaign presentation
 
How videos can elevate your Google rankings and improve your EEAT - Benjamin ...
How videos can elevate your Google rankings and improve your EEAT - Benjamin ...How videos can elevate your Google rankings and improve your EEAT - Benjamin ...
How videos can elevate your Google rankings and improve your EEAT - Benjamin ...
 
Creator Influencer Strategy Master Class - Corinne Rose Guirgis
Creator Influencer Strategy Master Class - Corinne Rose GuirgisCreator Influencer Strategy Master Class - Corinne Rose Guirgis
Creator Influencer Strategy Master Class - Corinne Rose Guirgis
 

Ayala Summit 2013 Cloud Security

  • 1. Ayala Summit 2013, Philippines 123456789A8BCD65E9FD9CD9 38699FD35DCB5CD8 48D35639B88B895DC9 Copyright 2013 FUJITSU LIMITED William Ho Regional Senior Consultant BCCE, BCCLA, CBCP, CCSKV2.1, CCSKV3, CISA, CISM, CRISC, CITPM, MBCI, ITIL,VCP, TOGAF
  • 2. Ayala Summit 2013, Philippines Agenda 1Introduction 1Addressing the Concerns and Challenges 1Security Assessment 1Threat Modeling and Suggestions 1Network of Virtual Environments 1Data Security and Mitigations Suggestions 1People Related Implications 1PCI and Cloud Computing 1QA 4ED659 !#9$%A%9'()2
  • 3. Ayala Summit 2013, Philippines 1 Introduction 1 Addressing the Concerns and Challenges 1 Security Assessment 1 Threats Modeling and Mitigations Suggestions 1 Network of Virtual Environments- Suggested considerations 1 Data Security, Concerns and Suggestions 1 People Related implications and Mitigations
  • 4. Ayala Summit 2013, Philippines 123456789 AB4C3D3 Prepared for the Journey Security is still a Major Concerns
  • 5. Ayala Summit 2013, Philippines Top 10 Strategic Technology Trends for 2013 Cloud is becoming a mainstream computing style and delivery option with hybrid cloud, cloud brokerage and new delivery, management, and security options accelerating adoption. Copyright 2013 FUJITSU
  • 6. Ayala Summit 2013, Philippines Concerns 1 A56*958D893D89BB8D93+C598BCD65E*9B,463B89329 B8B56765E96C8969BC29-.C+6B*9.D67358*9/E+D62091659589 B82C8B89FD95897359,33D65E9F9BC296FD35DCB5CD89 284E,8549 Source: Top 10 Strategic Technology Trends for 2013, Gartner April 2, 2013 Copyright 2013 FUJITSU
  • 7. Ayala Summit 2013, Philippines 1 Introduction 1 Addressing the Concerns and Challenges 1 Security Assessment 1 Threats Modeling and Mitigations Suggestions 1 Network of Virtual Environments- Suggested considerations 1 Data Security, Concerns and Suggestions 1 People Related implications and Mitigations
  • 8. Ayala Summit 2013, Philippines Threats Modeling Threats Modeling Addressing the Concerns and Challenges • Threats and Mitigations • Protection of Data, Security and MitigationsSecuritySecurity Clear Objectives Clear Objectives • Security Assessment • Division of Roles and Responsibilities Roles Responsibilities Roles Responsibilities 8 Copyright 2013 FUJITSU LIMITED
  • 9. Ayala Summit 2013, Philippines 1 Introduction 1 Addressing the Concerns and Challenges 1 Security Assessment 1 Threats Modeling and Mitigations Suggestions 1 Network of Virtual Environments- Suggested considerations 1 Data Security, Concerns and Suggestions 1 People Related implications and Mitigations
  • 10. Ayala Summit 2013, Philippines Self Assessment of Security Requirements 10 Copyright 2013 FUJITSU LIMITED Source : Cloud Security Alliance
  • 11. Ayala Summit 2013, Philippines 1 Introduction 1 Addressing the Concerns and Challenges 1 Security Assessment 1 Threats Modeling and Mitigations Suggestions 1 Network of Virtual Environments- Suggested considerations 1 Data Security, Concerns and Suggestions 1 People Related implications and Mitigations
  • 12. Ayala Summit 2013, Philippines Threat Modeling Example Threat Description Example Spoofing Assume identity of client, server or request/response Phishing attack to fool user into sending credentials to fake site Tampering Alter contents of request of response Message or data integrity compromised to change parameters or values Repudiation Dispute legitimate transaction Illegitimately claiming a transaction was not completed Information Disclosure Unauthorized release of data Unencrypted message sniffed off the network Denial of Service Service not available to authorized users System flooded by requests until web server fails Elevation of privilege Bypass authorization system Attacker changes group membership 12 Copyright 2011 FUJITSU Asia Pte., Ltd.
  • 13. Ayala Summit 2013, Philippines Example Mapping Threat Model-Mitigations Threat Security Service Spoofing Authentication Tampering Digital Signature, Hash Repudiation Audit Logging Information Disclosure Encryption Denial of Service Availability Elevation of privilege Authorization 13 Copyright 2011 FUJITSU Asia Pte., Ltd.
  • 14. Ayala Summit 2013, Philippines 1 Introduction 1 Addressing the Concerns and Challenges 1 Security Assessment 1 Threats Modeling and Mitigations Suggestions 1 Network of Virtual Environments- Suggested considerations 1 Data Security, Concerns and Suggestions 1 People Related implications and Mitigations
  • 15. Ayala Summit 2013, Philippines Challenges for Networks of Virtual Environments 1 Consolidate physical servers using virtualization software - Reduce physical servers - Realize central consolidation services, organizational changes, etc.) Flexible Operations Is flexible response to requirement changes such as addition and update of business systems available? (Upon provision of new services, organizational changes, etc.) Challenge 1 However, when configuring business systems in a virtual environment, challenges exits!! System Reliability Are “security”, “safety”, and “stability of the business systems ensured? Challenge 2 network devices and the locations of errors? Visualize Virtual Environments When a trouble occurs in communications between business systems, is it possible to confirm the operational status of configured network devices and the locations of errors? Challenge 3 Virtualization Software (VMware, Hyper-V, etc.) Consolidate Virtualize Servers Plant B Plant A Headquarters Office A Office B Office C Copyright 2013 FUJITSU15 Resource pool of physical servers leveraging Virtualisation
  • 16. Ayala Summit 2013, Philippines Establish Flexible Operations (Approach to Challenge 1) 1 Templates enable quick creation of business systems to respond to the urgent launch of a new business 1 Automatic network configuration enables quick configuration of networks without specialized knowledge Copyright 2013 FUJITSU16 Simplified addition and modification to business systems, including complicated network reconfiguration When preparing a 3-tier system for example… System design? Device configuration? DMZ (Web) AP DB FirewallServer Load Balancer Storage Servers Normally Using Orchestration Automation: Possible to quickly prepare business systems including networks, from the GUI!! Administrator Setup is fast Network FirewallServer Load Balancer Web tier AP tier DB tier So much work is involved!! Supported devices? Difficult to prepare it in a short time Web tier AP tier DB tier Resources (devices) are automatically selected according to the system configuration By using a template, no need to perform system design!! Automatic configuration of devices during creation of systems Administrator
  • 17. Ayala Summit 2013, Philippines Ensure System Reliability (Approach to Challenge 2) Copyright 2013 FUJITSU17 1 1234567892AB2A98C78DEA2F4498C7892AB2A745742A98C77 895A287E7297FEE779E29979692 7E77BEA47DEA2F447C72A27E97572275772E27 2BE29 172 ! 1# $%34275D76927'5DEAE5 2AB2A7(57#42A 5A2 #9E29972AB2A9 !2997'5A54 !5AE)27 *92A9 *5AE)27 *92A9 '532 +295A27554,EA2F44 (57#4E 1234567DEA2F4497792AB2A745742A97977
  • 18. Ayala Summit 2013, Philippines Visualize Virtual Environments (Approach to Challenge 3) Copyright 2013 FUJITSU18 1 Quickly identify error locations during problems such as service interruptions, enabling a prompt recovery response and reduced service downtime DMZ (Web) AP DB Example device configuration Storage Firewall [ASA5500 Series] L2 Switch Business Servers Admin Server Periodical Checks (*2) 1. Trouble occurs! 3. Confirm the status change Identify the device!!(*1) Infrastructure Administrator 2. Problem Detected 5. Check the status on5. Check the status on the Resource Details window 4. Click the device name Identify the locations of devices with errors configured in a virtual environment and detect status changes *1: The trouble can be confirmed also from messages notifying of status changes which are output in the event log as well as the icon change. *2: Devices registered as network devices are monitored.
  • 19. Ayala Summit 2013, Philippines 1 Introduction 1 Addressing the Concerns and Challenges 1 Security Assessment 1 Threats Modeling and Mitigations Suggestions 1 Network of Virtual Environments- Suggested considerations 1 Data Security, Concerns and Suggestions 1 People Related implications and Mitigations
  • 20. Ayala Summit 2013, Philippines WHERE IS MY DATA 20 Your Data Unstructured data File Systems Office documents, PDF, Vision, Audio other Fax/Print Servers File Servers Business Application Systems (SAP, PeopleSoft, Oracle Financials, In-house, CRM, eComm/eBiz, etc.) Application Server Structured data Database Systems (SQL, Oracle, DB2, Informix, MySQL) Database Server Security Other Systems (Event logs, Error logs Cache, Encryption keys, other secrets) Security Systems Data Communications Eg. VoIP Systems FTP/Dropbox Server Email Servers Storage Backup Systems Eg. SAN/NAS Backup Systems 1 2343567894958A5B8CC6D6A45CEDF34953AB58A5F3A5D6E984ED AE8A5345856A53AB5E54E596D6546523435 895D8483 Copyright 2013 FUJITSU LIMITED
  • 21. Ayala Summit 2013, Philippines Considerations 1 535923539169+895D82 1 59169+893BB869 1 58D89169659+895D82 1 5359B5D93D896943B8 1 5969D846+89FD98BCD65E 1 535969589)35363C8935948B6F6B94659F956,8 1 (88569B,463B8*978C356*985B DataDataDataData CreationCreationCreationCreation DataDataDataData SecuritySecuritySecuritySecurity LifecycleLifecycleLifecycleLifecycle ForForForFor Cloud ComputingCloud ComputingCloud ComputingCloud Computing Data Storage DataDataDataData UsageUsageUsageUsage DataDataDataData SharingSharingSharingSharing DataDataDataData ArchiveArchiveArchiveArchive DataDataDataData DisposalDisposalDisposalDisposal 21 Copyright 2011 FUJITSU Asia Pte., Ltd.
  • 22. Ayala Summit 2013, Philippines 22 DATA SECURITY LIFECYCLE Source: Security Guidance for Critical Areas of Focus in Cloud Computing V3.0, Information Management Data Security Copyright 2013 FUJITSU LIMITED
  • 23. Ayala Summit 2013, Philippines 23 This may also be known as Create/Update because it applies to creating or changing a data/content element, not just a document or database. Creation is the generation of new digital content, or the alteration/updating of existing content. Consideration (examples) Ownership Classification Rights Management 1232456789A3B4CAD67B7C6 Copyright 2013 FUJITSU LIMITED
  • 24. Ayala Summit 2013, Philippines 24 Storing is the act committing the digital data to some sort of storage repository, and typically occurs nearly simultaneously with creation. Considerations (Examples) Access Controls Encryption Rights Management Isolation 1232456789A3B4CAD67B7C6 Copyright 2013 FUJITSU LIMITED
  • 25. Ayala Summit 2013, Philippines rmt/0- Utilization 0 5 10 15 20 25 30 35 40 45 2:00 2:03 2:10 2:25 2:40 2:55 3:10 3:25 3:40 3:55 4:10 4:25 4:40 4:55 5:10 5:25 5:40 5:55 6:10 6:25 6:40 6:55 7:10 7:25 7:40 7:55 8:10 8:25 8:40 8:55 9:10 9:25 9:40 9:55 27/03/01 - 28/03/01 Percentage(%) %wait %busy 25 Data is viewed, processed, or otherwise used in some sort of activity Considerations (Example) Internal/External Third Parties Appropriateness Compliance 1232456789A3B4CAD67B7C6 Copyright 2013 FUJITSU LIMITED
  • 26. Ayala Summit 2013, Philippines 26 Data is exchanged between users, organisations, groups and individual. Considerations (Examples) Internal/External Third Parties Purposes Compliance Locations 1232456789A3B4CAD67B7C6 Local Mirroring (RAID 1) Remote (Offsite) Replication 1234563457348 Server Server Primary Replica Copyright 2013 FUJITSU LIMITED
  • 27. Ayala Summit 2013, Philippines 27 Data leaves active use and enters long-term storage. Considerations (Examples) Legal/Law Sites/Locations Media type Retention Ownership 1232456789A3B4CAD67B7C6 Copyright 2013 FUJITSU LIMITED
  • 28. Ayala Summit 2013, Philippines 28 Data is permanently destroyed using physical or digital means (e.g., cryptoshredding). 1232456789A3B4CAD67B7C6 Considerations (Examples) Secure Complete Assurance Proof Content Discovery Copyright 2013 FUJITSU LIMITED
  • 29. Ayala Summit 2013, Philippines 29 2EECA723AF 6
  • 30. 2 EC65 Illustrations of application for Data Security Lifecycle: Data-Impact (useful for Data Classification) Data Security Lifecycle (useful for RACI) Copyright 2013 FUJITSU LIMITED
  • 31. Ayala Summit 2013, Philippines 30 36 EC236 46
  • 33. Ayala Summit 2013, Philippines 31 36 EC236446
  • 35. Ayala Summit 2013, Philippines Sharing other approaches/scenarios 1 Introduction 1 Addressing the Concerns and Challenges 1 Security Assessment 1 Threats Modeling and Mitigations Suggestions 1 Network of Virtual Environments- Suggested considerations 1 Data Security, Concerns and Suggestions 1 People Related implications and Mitigations
  • 36. Ayala Summit 2013, Philippines Logical Platform A Division A Segregation Isolation 1 The Access Control Feature controls the access between tenants and platforms 1 Address Translation Function can hide secure server information 1 The IPS feature protects each platform from flooding-attacks Physical ServerPhysical Server ・・・ Server Deploy Server Service user of division B Logical Platform Division B Internet Improved network security for customers, projects divisions Logical Platform B NS Appliance(*)NS Appliance(*) Server Physical ServerPhysical Server ・・・ NS Appliance(*)NS Appliance(*) Copyright 2013 FUJITSU33
  • 37. Ayala Summit 2013, Philippines Data Protection- Encryption 1 Encrypts drive data Encrypt confidential information in drives Encryption Encryption is specified on a LUN basis Encryption Unencrypted data Encryption Encryption Encryption Encryption Encryption Encryption Encryption Encryption Encryption Encryption Encryption Encryption setting and management Prevents information leakage Server A Server B Server C unique encryption scheme - Less performance degradation than 128bit AES - Closed unique technology ensures the safety Encryption AES (Advanced Encryption Standard) is an encryption standard of the Federal Information Processing Standards Data removal protection Storage 34 Copyright 2013 FUJITSU LIMITED
  • 38. Ayala Summit 2013, Philippines 1234567 89697 14564A De-Coupling Client A Office Users Client A Remote Users Client A Physical App Server Client A Physical DB Server Client A Physical Web Server Client A Virtual App Server Client A Virtual DB Server Client A Virtual Web Server 39B3A6C927D4E7F4A 4A A B3A6C927D4E7F4A 4A 39B3A6C927
  • 39.
  • 41.
  • 43.
  • 45.
  • 47. Ayala Summit 2013, Philippines Client and Application zone Servers File Server zone Security Appliance Enables File Security Data-Key Separation Additional layer of ACL AES 256bit Encryption SCB2 128bit Encryption Data Encryption on write Data Decryption on Read 36 Copyright 2013 FUJITSU LIMITED 3 Data in Server is encrypted Hacking into Server will only get encrypted Data 3 No keys are exposed outside of the environment boundary
  • 48. Ayala Summit 2013, Philippines Leveraging Application Concepts 1 9851D:914463B8 9A914463B89693976D5C398BCD65E934463B8916B98CD89851D:98BCD65E9 F976D5C36;829,C56568D9E58, 37 Copyright 2013 FUJITSU LIMITED
  • 49. Ayala Summit 2013, Philippines Firewall Server Load Balancer Web Server Application Server Application Server Database Server VLAN1001 VLAN1002 VLAN1003 Distribute requests to two web servers in round-robin fashion Only HTTPS communication to SLB is permitted to access from outside the network. Leverage Load Balancer Functionality 1 Example of a 3-tier system configuration Web Server Communication is permitted between internal segments. Communication is permitted between internal segments. 38 Copyright 2013 FUJITSU LIMITED
  • 50. Ayala Summit 2013, Philippines 1 Introduction 1 Addressing the Concerns and Challenges 1 Security Assessment 1 Threats Modeling and Mitigations Suggestions 1 Network of Virtual Environments- Suggested considerations 1 Data Security, Concerns and Suggestions 1 People Related implications and Mitigations
  • 51. Ayala Summit 2013, Philippines Roles and Responsibilities 40 Copyright 2011 FUJITSU LIMITED Capacity Management • Workload placement planning • Service continuity mgmt Service Developers: • APIs, connectors, Java • Integration Sourcing Management • Multi-supplier mgmt • Service governance • Financial controls • Comparative analysis Security professionals • Information Security Mgmt • Sourcing security Service Managers • Service portfolio mgmt • Service governance • Financial Costing / cost recovery model • Service brokerage Business Relationship Mgmt • Business Analyst • Demand management • Benefit realization • Cloud Alliance Manager Cloud Federation Aggregation • Technologist cloud federation architect Enterprise Architecture Team • Cloud Computing Architect • Virtualization SME Governance Compliance • Risk Management • COBIT, Controls, policies, processes, procedures • Internal Audit • Cloud Risk and Compliance
  • 52. Ayala Summit 2013, Philippines People Related Security • Division of Roles and Responsibilities Roles Responsibilities Roles Responsibilities 41 Copyright 2013 FUJITSU LIMITED
  • 53. Ayala Summit 2013, Philippines