SlideShare a Scribd company logo
152 READY:
Personal Data
Allocation
Infrastructure
ABOUT CLOUD-152
Cloud-152 is a cloud infrastructure built in line with new
requirements for personal data protection:
 Community cloud for allocation of personal data with
protection level #2 and #3
 Private cloud for allocation of personal data with protection
level #1.
New Requirements for
Data Protection and IT-
infrastructure Providers
SETTING REQUIREMENTS FOR
DATA PROTECTION
Personal data are divided into 4 categories – protection
levels.
Each protection level has its own requirements for the
personal data protection administration.
These requirements vary depending on the type of threats
relevant for each separate information system, as well as on
the Internet connectivuty of the system.
FACTORS DESIGNATING DATA
PROTECTION LEVEL
Data
category
Subjects
Number of
subjects
Type of
immediate
threats
 Employees
 Counterparties
 Public
 Special
 Biometric
 Other
 < 100,000
 > 100,000
3 categories of
threats
TYPES OF IMMEDIATE THREATS
1. Threats caused by undeclared
(undocumented) capabilities in the system
software.
2. Threats caused by undeclared capabilities in
the application software.
3. Threats caused by other factors.
Data
category
Subjects
Number
of
subjects
TYPES
OF
THREATS
Threat type designation is not regulated.
PROTECTION LEVELS
Data Category
Operator’s
Employees
Number of
Subjects
Type of Vital Threats
1 2 3
(UDC* OS) (UDC* SW)
(Without
UDC*)
Special
No > 100,000 PL-1 PL-1 PL-2
No < 100,000
PL-1 PL-2 PL-3
Yes
Biometric PL-1 PL-2 PL-3
Other
No > 100,000 PL-1 PL-2 PL-3
No < 100,000
PL-2 PL-3 PL-4
Yes
Public
No > 100,000 PL-2 PL-2 PL-4
No < 100,000
PL-2 PL-3 PL-4
Yes
* UDC– undeclared capabilities
INFORMATION PROTECTION MEANS
PROTECTION LEVEL PL-1, PL- 2 PL-3 PL-4
TYPE OF THREATS 3 1, 2, 3 2 3 3
INTERNET CONNECTIVITY no yes - yes no -
Computer equipment
Class 5* Class 6
Intruder detection system
Class 4 Class 5
Class 5
Virus protection means
Firewall
Class 4 Class 3 Class 4
Other information protection
means Any safety specifications or tasks
*Each category of tools has its own FSTEC classification.
INFRASTRUCTURE MODELS &
REQUIREMENTS TO DATA PROTECTION
Virtualization
protection
Firewalling
Communication
channels protection
Physical security
COLOCATION
CLOUD
PROVIDER REQUIREMENTS
 FSTEC license for development and (or) production of
information confidentiality protection means
 FSTEC license for confidential information technical protection
 FSS license for cryptographic protection means usage
 FSTEC certificates for utilized information protection means
 Lease/purchase agreement for utilized protection means
OUR APPROACH
INFRASTRUCTURE-152:
WE OFFER
 Virtualization platform / hardware allocation in line with federal
laws
 Integration of your IS tools / equipment into our solution
architecture
 Attestation and maintenance of the IS*:
 threat model development
 documents preparation
 information system attestation
 information system maintenance
*The service is provided in cooperation with partners.
OUR CERTIFICATES AND LICENSES
 Premier VSSP VMware
 Microsoft GOLD Hosting Provider
 Oracle Gold Partner
 SAP for Business All-in-One in Application Management and Hosting Services
 HP GOLD Partner
 ISO/IEC 27001:2013
 ISO 9001:2011
 Uptime Institute Management and Operations
 Uptime Institute Tier III Certified (Design)
 PCI DSS v. 3.0
 ISAE 3402
 FSTEC license #0763: for development and (or) production of information
confidentiality protection means
 FSTEC license #1279: for confidential information technical protection
 FSS license #0011865 for provision of the services using cryptographic means
PHYSICAL SECURITY
 Multilevel access control
 Round-the-clock video monitoring; video records are
stored during 3 months
 Individual fences for racks
 Access control system of the fence/rack, biometrics
 Dedicated video monitoring solutions (APC Netbotz, etc.)
 Extra sensors on rack doors opening
 Safe rack
NETWORK SECURITY
 FSTEC certified equipment and software
 Network segmentation in the cloud via VLAN and firewall of
Check Point Security Gateway
 External networks interaction control via the intruder
detection system of Check Point Security Gateway
 Cryptographic protection of communication channels
 GOST coding via the virtual crypto gateway S-Terra
 Second level coding using the MacSec protocol
 VPN organization using AES, 3DES coding
NETWORK SECURITY
CLOUD-152
Cloud core switch’s
ESXi ESXi ESXi ESXi
S-Terra
virtual gateway
DataLine Admins
Remote user sites
Check Point
Security
Gateway’s
(FW/IDS)
DataCenter
core switch’s
Site-to-site VPN
INTERNET
CLOUD-152: IAAS VERSIONS
 Private cloud for allocation of personal data with protection
level #1
 Community cloud for allocation of personal data with
protection levels #2, #3 and #4
The standard solution offers a resilient architecture based
on NORD-4 data centre.
Disaster-proof cloud-152 can be also arranged based on
NORD and OST data centres locations.
PRIVATE CLOUD-152
FOR DATA WITH PL-1
For the information systems processing personal data
with protection level #1, an individual project is
developed on the allocated hardware.
This solution may be fail-safe or disaster-proof.
COMMUNITY CLOUD:
ARCHITECTURE
COMMUNTY CLOUD:
PROTECTION MEANS
All protection means used in Cloud-152 architecture are certified by
FSTEC*:
 vGate R2 (virtualization protection means)
 CheckPoint IDS (intruder detection system)
 CheckPoint FW (firewall)
 Wallix (proxy server with sessions recording)
 Kaspersky (virus protection)
 S-Terra (VPN gateway)
 SecretNet and Sobol software and hardware (protection against
unauthorized access)
* Register of FSTEC certified protection means
INFRASTRUCTURE-152:
ALGORITHM
Threat
model
Migration to
Cloud-152
Set of
documents
(OED***)
System
attestation****
Documents
submission to
Roskomnadzor
Technical
project**
System
audit*
* For current projects/operating systems. Launch of the IS from the scratch commences with development of a
threat model.
** Technical project includes a list of protection means corresponding to the level of protection of used
personal data and type of threats immediate for the particular system.
*** A set of documents includes: a threat model, technical project, organizational records, letter to
Roskomnadzor
**** The attestation includes compliance assessment of the threat model system to the technical project
Maximum allowable service
downtime per month*
≥
1,700
0.37h
Maximum allowable service
downtime per month*0.15h
MIPS / 1 vCPU
250 IOPS/
500 GB
HDD IOPS
Time of access to
the VM disc≤20ms
99.982%
availability of the data centre and
network infrastructure
10 minutes
response time
99.98% of the service availability for
data with PL-3
99.95% of the service availability
for data with PL-2
SLA: KEY PARAMETERS
* including technological downtime (infrastructure maintenance)
SLA for data with PL-2:
why 99.95%
Reduced guaranteed availability of the service is caused
by the prohibition of the remote access to the host under
protection administration of personal data with protection
level # 2.
Manual reboot of the servers is only permissible for the IS
with this data category.
$11
$3.23 $6.44
$0.12
$0.26$0.51
HDD SATA,
for 1 Gb
HDD SAS,
for 1 Gb
SSD,
for 1 Gb
RAM,
for 1 Gb
CPU,
for 1 GHz
Protection means,
For vCPU
HOW MUCH DOES IT COST?
INTERESTED, BUT STILL HAVE
QUESTIONS?
Contact us at +7 (495) 784 65 05 or
cloud-152@dtln.ru if you have any questions on personal
data protection options.

More Related Content

What's hot

Firewall architectures
Firewall architecturesFirewall architectures
Firewall architectures
Arun Mahajan
 
Windows Server 2008 Security Enhancements
Windows Server 2008 Security EnhancementsWindows Server 2008 Security Enhancements
Windows Server 2008 Security Enhancements
Presentologics
 
Critical Infrastructure Assessment Techniques to Prevent Threats and Vulnerab...
Critical Infrastructure Assessment Techniques to Prevent Threats and Vulnerab...Critical Infrastructure Assessment Techniques to Prevent Threats and Vulnerab...
Critical Infrastructure Assessment Techniques to Prevent Threats and Vulnerab...
Shakeel Ali
 
Firewals in Network Security NS10
Firewals in Network Security NS10Firewals in Network Security NS10
Firewals in Network Security NS10
koolkampus
 
What is needed in the next generation cloud trusted platform ?
What is needed in the next generation cloud trusted platform ?What is needed in the next generation cloud trusted platform ?
What is needed in the next generation cloud trusted platform ?
Priyanka Aash
 
Firewalls
FirewallsFirewalls
Firewalls
vaishnavi
 
Intoduction to Network Security NS1
Intoduction to Network Security NS1Intoduction to Network Security NS1
Intoduction to Network Security NS1
koolkampus
 
VMI based malware detection in virtual environment
VMI based malware detection in virtual environmentVMI based malware detection in virtual environment
VMI based malware detection in virtual environment
Ayush Gargya
 
Web-style Wireless IDS attacks, Sergey Gordeychik
Web-style Wireless IDS attacks, Sergey GordeychikWeb-style Wireless IDS attacks, Sergey Gordeychik
Web-style Wireless IDS attacks, Sergey Gordeychik
qqlan
 
Watchguard Firewall overview and implemetation
Watchguard  Firewall overview and implemetationWatchguard  Firewall overview and implemetation
Watchguard Firewall overview and implemetation
Kaveh Khosravi
 
Firewall and its types and function
Firewall and its types and functionFirewall and its types and function
Firewall and its types and function
Nisarg Amin
 
Firewall in Network Security
Firewall in Network SecurityFirewall in Network Security
Firewall in Network Security
lalithambiga kamaraj
 
Next Generation Network: Security and Architecture
Next Generation Network: Security and ArchitectureNext Generation Network: Security and Architecture
Next Generation Network: Security and Architecture
ijsrd.com
 
hashdays 2011: Felix 'FX' Lindner - Targeted Industrial Control System Attack...
hashdays 2011: Felix 'FX' Lindner - Targeted Industrial Control System Attack...hashdays 2011: Felix 'FX' Lindner - Targeted Industrial Control System Attack...
hashdays 2011: Felix 'FX' Lindner - Targeted Industrial Control System Attack...
Area41
 
Cloud Security Solution Overview
Cloud Security Solution OverviewCloud Security Solution Overview
Cloud Security Solution Overview
Cisco Service Provider
 
Eximbank security presentation
Eximbank security presentationEximbank security presentation
Eximbank security presentation
laonap166
 
Cortana Analytics Workshop: Cortana Analytics -- Security, Privacy & Compliance
Cortana Analytics Workshop: Cortana Analytics -- Security, Privacy & ComplianceCortana Analytics Workshop: Cortana Analytics -- Security, Privacy & Compliance
Cortana Analytics Workshop: Cortana Analytics -- Security, Privacy & Compliance
MSAdvAnalytics
 
Intrusion Detection Presentation
Intrusion Detection PresentationIntrusion Detection Presentation
Intrusion Detection Presentation
Mustafash79
 
IBM Share Conference 2010, Boston, Ulf Mattsson
IBM Share Conference 2010, Boston, Ulf MattssonIBM Share Conference 2010, Boston, Ulf Mattsson
IBM Share Conference 2010, Boston, Ulf Mattsson
Ulf Mattsson
 
Firewall and It's Types
Firewall and It's TypesFirewall and It's Types
Firewall and It's Types
Hem Pokhrel
 

What's hot (20)

Firewall architectures
Firewall architecturesFirewall architectures
Firewall architectures
 
Windows Server 2008 Security Enhancements
Windows Server 2008 Security EnhancementsWindows Server 2008 Security Enhancements
Windows Server 2008 Security Enhancements
 
Critical Infrastructure Assessment Techniques to Prevent Threats and Vulnerab...
Critical Infrastructure Assessment Techniques to Prevent Threats and Vulnerab...Critical Infrastructure Assessment Techniques to Prevent Threats and Vulnerab...
Critical Infrastructure Assessment Techniques to Prevent Threats and Vulnerab...
 
Firewals in Network Security NS10
Firewals in Network Security NS10Firewals in Network Security NS10
Firewals in Network Security NS10
 
What is needed in the next generation cloud trusted platform ?
What is needed in the next generation cloud trusted platform ?What is needed in the next generation cloud trusted platform ?
What is needed in the next generation cloud trusted platform ?
 
Firewalls
FirewallsFirewalls
Firewalls
 
Intoduction to Network Security NS1
Intoduction to Network Security NS1Intoduction to Network Security NS1
Intoduction to Network Security NS1
 
VMI based malware detection in virtual environment
VMI based malware detection in virtual environmentVMI based malware detection in virtual environment
VMI based malware detection in virtual environment
 
Web-style Wireless IDS attacks, Sergey Gordeychik
Web-style Wireless IDS attacks, Sergey GordeychikWeb-style Wireless IDS attacks, Sergey Gordeychik
Web-style Wireless IDS attacks, Sergey Gordeychik
 
Watchguard Firewall overview and implemetation
Watchguard  Firewall overview and implemetationWatchguard  Firewall overview and implemetation
Watchguard Firewall overview and implemetation
 
Firewall and its types and function
Firewall and its types and functionFirewall and its types and function
Firewall and its types and function
 
Firewall in Network Security
Firewall in Network SecurityFirewall in Network Security
Firewall in Network Security
 
Next Generation Network: Security and Architecture
Next Generation Network: Security and ArchitectureNext Generation Network: Security and Architecture
Next Generation Network: Security and Architecture
 
hashdays 2011: Felix 'FX' Lindner - Targeted Industrial Control System Attack...
hashdays 2011: Felix 'FX' Lindner - Targeted Industrial Control System Attack...hashdays 2011: Felix 'FX' Lindner - Targeted Industrial Control System Attack...
hashdays 2011: Felix 'FX' Lindner - Targeted Industrial Control System Attack...
 
Cloud Security Solution Overview
Cloud Security Solution OverviewCloud Security Solution Overview
Cloud Security Solution Overview
 
Eximbank security presentation
Eximbank security presentationEximbank security presentation
Eximbank security presentation
 
Cortana Analytics Workshop: Cortana Analytics -- Security, Privacy & Compliance
Cortana Analytics Workshop: Cortana Analytics -- Security, Privacy & ComplianceCortana Analytics Workshop: Cortana Analytics -- Security, Privacy & Compliance
Cortana Analytics Workshop: Cortana Analytics -- Security, Privacy & Compliance
 
Intrusion Detection Presentation
Intrusion Detection PresentationIntrusion Detection Presentation
Intrusion Detection Presentation
 
IBM Share Conference 2010, Boston, Ulf Mattsson
IBM Share Conference 2010, Boston, Ulf MattssonIBM Share Conference 2010, Boston, Ulf Mattsson
IBM Share Conference 2010, Boston, Ulf Mattsson
 
Firewall and It's Types
Firewall and It's TypesFirewall and It's Types
Firewall and It's Types
 

Viewers also liked

152 ready
152 ready152 ready
Data line cloud solutions
Data line cloud solutionsData line cloud solutions
Data line cloud solutions
Татьяна Янкина
 
Backup commvault data_line
Backup commvault data_lineBackup commvault data_line
Backup commvault data_line
Татьяна Янкина
 
Cloud o
Cloud oCloud o
Data line security_as_a_service
Data line security_as_a_serviceData line security_as_a_service
Data line security_as_a_service
Татьяна Янкина
 
Data line ix
Data line ixData line ix
Защита от DDoS и хакерских атак
Защита от DDoS и хакерских атакЗащита от DDoS и хакерских атак
Защита от DDoS и хакерских атак
Татьяна Янкина
 

Viewers also liked (8)

152 ready
152 ready152 ready
152 ready
 
Dataline
DatalineDataline
Dataline
 
Data line cloud solutions
Data line cloud solutionsData line cloud solutions
Data line cloud solutions
 
Backup commvault data_line
Backup commvault data_lineBackup commvault data_line
Backup commvault data_line
 
Cloud o
Cloud oCloud o
Cloud o
 
Data line security_as_a_service
Data line security_as_a_serviceData line security_as_a_service
Data line security_as_a_service
 
Data line ix
Data line ixData line ix
Data line ix
 
Защита от DDoS и хакерских атак
Защита от DDoS и хакерских атакЗащита от DDoS и хакерских атак
Защита от DDoS и хакерских атак
 

Similar to 152 ready eng

Removing Security Roadblocks to IoT Deployment Success
Removing Security Roadblocks to IoT Deployment SuccessRemoving Security Roadblocks to IoT Deployment Success
Removing Security Roadblocks to IoT Deployment Success
Microsoft Tech Community
 
Firewalls
FirewallsFirewalls
Firewalls
Deevena Dayaal
 
Cyber security and cyber law
Cyber security and cyber lawCyber security and cyber law
Cyber security and cyber law
Divyank Jindal
 
Security @ Windows 10 Partner Technical Bootcamp Microsoft Norway October 2015
Security @ Windows 10 Partner Technical Bootcamp Microsoft Norway October 2015Security @ Windows 10 Partner Technical Bootcamp Microsoft Norway October 2015
Security @ Windows 10 Partner Technical Bootcamp Microsoft Norway October 2015
Jan Ketil Skanke
 
IoT security-arrow-roadshow #iotconfua
IoT security-arrow-roadshow #iotconfuaIoT security-arrow-roadshow #iotconfua
IoT security-arrow-roadshow #iotconfua
Andy Shutka
 
What i learned at gartner summit 2019
What i learned at gartner summit 2019What i learned at gartner summit 2019
What i learned at gartner summit 2019
Ulf Mattsson
 
Networking Concepts Lesson 10 part 2 - Security Appendix - Eric Vanderburg
Networking Concepts Lesson 10 part 2 - Security Appendix - Eric VanderburgNetworking Concepts Lesson 10 part 2 - Security Appendix - Eric Vanderburg
Networking Concepts Lesson 10 part 2 - Security Appendix - Eric Vanderburg
Eric Vanderburg
 
Security framework for connected devices
Security framework for connected devicesSecurity framework for connected devices
Security framework for connected devices
HCL Technologies
 
[Toroman/Kranjac] Red Team vs. Blue Team in Microsoft Cloud
[Toroman/Kranjac] Red Team vs. Blue Team in Microsoft Cloud[Toroman/Kranjac] Red Team vs. Blue Team in Microsoft Cloud
[Toroman/Kranjac] Red Team vs. Blue Team in Microsoft Cloud
European Collaboration Summit
 
Safe and secure autonomous systems
Safe and secure autonomous systemsSafe and secure autonomous systems
Safe and secure autonomous systems
Alan Tatourian
 
Cloud technology to ensure the protection of fundamental methods and use of i...
Cloud technology to ensure the protection of fundamental methods and use of i...Cloud technology to ensure the protection of fundamental methods and use of i...
Cloud technology to ensure the protection of fundamental methods and use of i...
SubmissionResearchpa
 
Hardwar based Security of Systems
Hardwar based Security of SystemsHardwar based Security of Systems
Hardwar based Security of Systems
Jamal Jamali
 
Ecommerce final ppt
Ecommerce final pptEcommerce final ppt
Ecommerce final ppt
priyanka Garg
 
Io t security and azure sphere
Io t security and azure sphereIo t security and azure sphere
Io t security and azure sphere
Pushkar Saraf
 
Institutional IT Security
Institutional IT SecurityInstitutional IT Security
Institutional IT Security
CRISIL Limited
 
azure-security-overview-slideshare-180419183626.pdf
azure-security-overview-slideshare-180419183626.pdfazure-security-overview-slideshare-180419183626.pdf
azure-security-overview-slideshare-180419183626.pdf
BenAissaTaher1
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
AWS User Group Bengaluru
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
AWS User Group Bengaluru
 
Security technologies
Security technologiesSecurity technologies
Security technologies
Dhani Ahmad
 
Azure Security Overview
Azure Security OverviewAzure Security Overview
Azure Security Overview
Allen Brokken
 

Similar to 152 ready eng (20)

Removing Security Roadblocks to IoT Deployment Success
Removing Security Roadblocks to IoT Deployment SuccessRemoving Security Roadblocks to IoT Deployment Success
Removing Security Roadblocks to IoT Deployment Success
 
Firewalls
FirewallsFirewalls
Firewalls
 
Cyber security and cyber law
Cyber security and cyber lawCyber security and cyber law
Cyber security and cyber law
 
Security @ Windows 10 Partner Technical Bootcamp Microsoft Norway October 2015
Security @ Windows 10 Partner Technical Bootcamp Microsoft Norway October 2015Security @ Windows 10 Partner Technical Bootcamp Microsoft Norway October 2015
Security @ Windows 10 Partner Technical Bootcamp Microsoft Norway October 2015
 
IoT security-arrow-roadshow #iotconfua
IoT security-arrow-roadshow #iotconfuaIoT security-arrow-roadshow #iotconfua
IoT security-arrow-roadshow #iotconfua
 
What i learned at gartner summit 2019
What i learned at gartner summit 2019What i learned at gartner summit 2019
What i learned at gartner summit 2019
 
Networking Concepts Lesson 10 part 2 - Security Appendix - Eric Vanderburg
Networking Concepts Lesson 10 part 2 - Security Appendix - Eric VanderburgNetworking Concepts Lesson 10 part 2 - Security Appendix - Eric Vanderburg
Networking Concepts Lesson 10 part 2 - Security Appendix - Eric Vanderburg
 
Security framework for connected devices
Security framework for connected devicesSecurity framework for connected devices
Security framework for connected devices
 
[Toroman/Kranjac] Red Team vs. Blue Team in Microsoft Cloud
[Toroman/Kranjac] Red Team vs. Blue Team in Microsoft Cloud[Toroman/Kranjac] Red Team vs. Blue Team in Microsoft Cloud
[Toroman/Kranjac] Red Team vs. Blue Team in Microsoft Cloud
 
Safe and secure autonomous systems
Safe and secure autonomous systemsSafe and secure autonomous systems
Safe and secure autonomous systems
 
Cloud technology to ensure the protection of fundamental methods and use of i...
Cloud technology to ensure the protection of fundamental methods and use of i...Cloud technology to ensure the protection of fundamental methods and use of i...
Cloud technology to ensure the protection of fundamental methods and use of i...
 
Hardwar based Security of Systems
Hardwar based Security of SystemsHardwar based Security of Systems
Hardwar based Security of Systems
 
Ecommerce final ppt
Ecommerce final pptEcommerce final ppt
Ecommerce final ppt
 
Io t security and azure sphere
Io t security and azure sphereIo t security and azure sphere
Io t security and azure sphere
 
Institutional IT Security
Institutional IT SecurityInstitutional IT Security
Institutional IT Security
 
azure-security-overview-slideshare-180419183626.pdf
azure-security-overview-slideshare-180419183626.pdfazure-security-overview-slideshare-180419183626.pdf
azure-security-overview-slideshare-180419183626.pdf
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
 
Security technologies
Security technologiesSecurity technologies
Security technologies
 
Azure Security Overview
Azure Security OverviewAzure Security Overview
Azure Security Overview
 

Recently uploaded

How HR Search Helps in Company Success.pdf
How HR Search Helps in Company Success.pdfHow HR Search Helps in Company Success.pdf
How HR Search Helps in Company Success.pdf
HumanResourceDimensi1
 
TIMES BPO: Business Plan For Startup Industry
TIMES BPO: Business Plan For Startup IndustryTIMES BPO: Business Plan For Startup Industry
TIMES BPO: Business Plan For Startup Industry
timesbpobusiness
 
Digital Transformation Frameworks: Driving Digital Excellence
Digital Transformation Frameworks: Driving Digital ExcellenceDigital Transformation Frameworks: Driving Digital Excellence
Digital Transformation Frameworks: Driving Digital Excellence
Operational Excellence Consulting
 
Income Tax exemption for Start up : Section 80 IAC
Income Tax  exemption for Start up : Section 80 IACIncome Tax  exemption for Start up : Section 80 IAC
Income Tax exemption for Start up : Section 80 IAC
CA Dr. Prithvi Ranjan Parhi
 
Registered-Establishment-List-in-Uttarakhand-pdf.pdf
Registered-Establishment-List-in-Uttarakhand-pdf.pdfRegistered-Establishment-List-in-Uttarakhand-pdf.pdf
Registered-Establishment-List-in-Uttarakhand-pdf.pdf
dazzjoker
 
list of states and organizations .pdf
list of  states  and  organizations .pdflist of  states  and  organizations .pdf
list of states and organizations .pdf
Rbc Rbcua
 
The latest Heat Pump Manual from Newentide
The latest Heat Pump Manual from NewentideThe latest Heat Pump Manual from Newentide
The latest Heat Pump Manual from Newentide
JoeYangGreatMachiner
 
Industrial Tech SW: Category Renewal and Creation
Industrial Tech SW:  Category Renewal and CreationIndustrial Tech SW:  Category Renewal and Creation
Industrial Tech SW: Category Renewal and Creation
Christian Dahlen
 
Garments ERP Software in Bangladesh _ Pridesys IT Ltd.pdf
Garments ERP Software in Bangladesh _ Pridesys IT Ltd.pdfGarments ERP Software in Bangladesh _ Pridesys IT Ltd.pdf
Garments ERP Software in Bangladesh _ Pridesys IT Ltd.pdf
Pridesys IT Ltd.
 
The Steadfast and Reliable Bull: Taurus Zodiac Sign
The Steadfast and Reliable Bull: Taurus Zodiac SignThe Steadfast and Reliable Bull: Taurus Zodiac Sign
The Steadfast and Reliable Bull: Taurus Zodiac Sign
my Pandit
 
How are Lilac French Bulldogs Beauty Charming the World and Capturing Hearts....
How are Lilac French Bulldogs Beauty Charming the World and Capturing Hearts....How are Lilac French Bulldogs Beauty Charming the World and Capturing Hearts....
How are Lilac French Bulldogs Beauty Charming the World and Capturing Hearts....
Lacey Max
 
4 Benefits of Partnering with an OnlyFans Agency for Content Creators.pdf
4 Benefits of Partnering with an OnlyFans Agency for Content Creators.pdf4 Benefits of Partnering with an OnlyFans Agency for Content Creators.pdf
4 Benefits of Partnering with an OnlyFans Agency for Content Creators.pdf
onlyfansmanagedau
 
Presentation by Herman Kienhuis (Curiosity VC) on Investing in AI for ABS Alu...
Presentation by Herman Kienhuis (Curiosity VC) on Investing in AI for ABS Alu...Presentation by Herman Kienhuis (Curiosity VC) on Investing in AI for ABS Alu...
Presentation by Herman Kienhuis (Curiosity VC) on Investing in AI for ABS Alu...
Herman Kienhuis
 
Business storytelling: key ingredients to a story
Business storytelling: key ingredients to a storyBusiness storytelling: key ingredients to a story
Business storytelling: key ingredients to a story
Alexandra Fulford
 
Lundin Gold Corporate Presentation - June 2024
Lundin Gold Corporate Presentation - June 2024Lundin Gold Corporate Presentation - June 2024
Lundin Gold Corporate Presentation - June 2024
Adnet Communications
 
Satta Matka Dpboss Matka Guessing Kalyan Chart Indian Matka Kalyan panel Chart
Satta Matka Dpboss Matka Guessing Kalyan Chart Indian Matka Kalyan panel ChartSatta Matka Dpboss Matka Guessing Kalyan Chart Indian Matka Kalyan panel Chart
Satta Matka Dpboss Matka Guessing Kalyan Chart Indian Matka Kalyan panel Chart
➒➌➎➏➑➐➋➑➐➐Dpboss Matka Guessing Satta Matka Kalyan Chart Indian Matka
 
一比一原版(QMUE毕业证书)英国爱丁堡玛格丽特女王大学毕业证文凭如何办理
一比一原版(QMUE毕业证书)英国爱丁堡玛格丽特女王大学毕业证文凭如何办理一比一原版(QMUE毕业证书)英国爱丁堡玛格丽特女王大学毕业证文凭如何办理
一比一原版(QMUE毕业证书)英国爱丁堡玛格丽特女王大学毕业证文凭如何办理
taqyea
 
Pitch Deck Teardown: Kinnect's $250k Angel deck
Pitch Deck Teardown: Kinnect's $250k Angel deckPitch Deck Teardown: Kinnect's $250k Angel deck
Pitch Deck Teardown: Kinnect's $250k Angel deck
HajeJanKamps
 
Part 2 Deep Dive: Navigating the 2024 Slowdown
Part 2 Deep Dive: Navigating the 2024 SlowdownPart 2 Deep Dive: Navigating the 2024 Slowdown
Part 2 Deep Dive: Navigating the 2024 Slowdown
jeffkluth1
 
The Most Inspiring Entrepreneurs to Follow in 2024.pdf
The Most Inspiring Entrepreneurs to Follow in 2024.pdfThe Most Inspiring Entrepreneurs to Follow in 2024.pdf
The Most Inspiring Entrepreneurs to Follow in 2024.pdf
thesiliconleaders
 

Recently uploaded (20)

How HR Search Helps in Company Success.pdf
How HR Search Helps in Company Success.pdfHow HR Search Helps in Company Success.pdf
How HR Search Helps in Company Success.pdf
 
TIMES BPO: Business Plan For Startup Industry
TIMES BPO: Business Plan For Startup IndustryTIMES BPO: Business Plan For Startup Industry
TIMES BPO: Business Plan For Startup Industry
 
Digital Transformation Frameworks: Driving Digital Excellence
Digital Transformation Frameworks: Driving Digital ExcellenceDigital Transformation Frameworks: Driving Digital Excellence
Digital Transformation Frameworks: Driving Digital Excellence
 
Income Tax exemption for Start up : Section 80 IAC
Income Tax  exemption for Start up : Section 80 IACIncome Tax  exemption for Start up : Section 80 IAC
Income Tax exemption for Start up : Section 80 IAC
 
Registered-Establishment-List-in-Uttarakhand-pdf.pdf
Registered-Establishment-List-in-Uttarakhand-pdf.pdfRegistered-Establishment-List-in-Uttarakhand-pdf.pdf
Registered-Establishment-List-in-Uttarakhand-pdf.pdf
 
list of states and organizations .pdf
list of  states  and  organizations .pdflist of  states  and  organizations .pdf
list of states and organizations .pdf
 
The latest Heat Pump Manual from Newentide
The latest Heat Pump Manual from NewentideThe latest Heat Pump Manual from Newentide
The latest Heat Pump Manual from Newentide
 
Industrial Tech SW: Category Renewal and Creation
Industrial Tech SW:  Category Renewal and CreationIndustrial Tech SW:  Category Renewal and Creation
Industrial Tech SW: Category Renewal and Creation
 
Garments ERP Software in Bangladesh _ Pridesys IT Ltd.pdf
Garments ERP Software in Bangladesh _ Pridesys IT Ltd.pdfGarments ERP Software in Bangladesh _ Pridesys IT Ltd.pdf
Garments ERP Software in Bangladesh _ Pridesys IT Ltd.pdf
 
The Steadfast and Reliable Bull: Taurus Zodiac Sign
The Steadfast and Reliable Bull: Taurus Zodiac SignThe Steadfast and Reliable Bull: Taurus Zodiac Sign
The Steadfast and Reliable Bull: Taurus Zodiac Sign
 
How are Lilac French Bulldogs Beauty Charming the World and Capturing Hearts....
How are Lilac French Bulldogs Beauty Charming the World and Capturing Hearts....How are Lilac French Bulldogs Beauty Charming the World and Capturing Hearts....
How are Lilac French Bulldogs Beauty Charming the World and Capturing Hearts....
 
4 Benefits of Partnering with an OnlyFans Agency for Content Creators.pdf
4 Benefits of Partnering with an OnlyFans Agency for Content Creators.pdf4 Benefits of Partnering with an OnlyFans Agency for Content Creators.pdf
4 Benefits of Partnering with an OnlyFans Agency for Content Creators.pdf
 
Presentation by Herman Kienhuis (Curiosity VC) on Investing in AI for ABS Alu...
Presentation by Herman Kienhuis (Curiosity VC) on Investing in AI for ABS Alu...Presentation by Herman Kienhuis (Curiosity VC) on Investing in AI for ABS Alu...
Presentation by Herman Kienhuis (Curiosity VC) on Investing in AI for ABS Alu...
 
Business storytelling: key ingredients to a story
Business storytelling: key ingredients to a storyBusiness storytelling: key ingredients to a story
Business storytelling: key ingredients to a story
 
Lundin Gold Corporate Presentation - June 2024
Lundin Gold Corporate Presentation - June 2024Lundin Gold Corporate Presentation - June 2024
Lundin Gold Corporate Presentation - June 2024
 
Satta Matka Dpboss Matka Guessing Kalyan Chart Indian Matka Kalyan panel Chart
Satta Matka Dpboss Matka Guessing Kalyan Chart Indian Matka Kalyan panel ChartSatta Matka Dpboss Matka Guessing Kalyan Chart Indian Matka Kalyan panel Chart
Satta Matka Dpboss Matka Guessing Kalyan Chart Indian Matka Kalyan panel Chart
 
一比一原版(QMUE毕业证书)英国爱丁堡玛格丽特女王大学毕业证文凭如何办理
一比一原版(QMUE毕业证书)英国爱丁堡玛格丽特女王大学毕业证文凭如何办理一比一原版(QMUE毕业证书)英国爱丁堡玛格丽特女王大学毕业证文凭如何办理
一比一原版(QMUE毕业证书)英国爱丁堡玛格丽特女王大学毕业证文凭如何办理
 
Pitch Deck Teardown: Kinnect's $250k Angel deck
Pitch Deck Teardown: Kinnect's $250k Angel deckPitch Deck Teardown: Kinnect's $250k Angel deck
Pitch Deck Teardown: Kinnect's $250k Angel deck
 
Part 2 Deep Dive: Navigating the 2024 Slowdown
Part 2 Deep Dive: Navigating the 2024 SlowdownPart 2 Deep Dive: Navigating the 2024 Slowdown
Part 2 Deep Dive: Navigating the 2024 Slowdown
 
The Most Inspiring Entrepreneurs to Follow in 2024.pdf
The Most Inspiring Entrepreneurs to Follow in 2024.pdfThe Most Inspiring Entrepreneurs to Follow in 2024.pdf
The Most Inspiring Entrepreneurs to Follow in 2024.pdf
 

152 ready eng

  • 2.
  • 3. ABOUT CLOUD-152 Cloud-152 is a cloud infrastructure built in line with new requirements for personal data protection:  Community cloud for allocation of personal data with protection level #2 and #3  Private cloud for allocation of personal data with protection level #1.
  • 4. New Requirements for Data Protection and IT- infrastructure Providers
  • 5. SETTING REQUIREMENTS FOR DATA PROTECTION Personal data are divided into 4 categories – protection levels. Each protection level has its own requirements for the personal data protection administration. These requirements vary depending on the type of threats relevant for each separate information system, as well as on the Internet connectivuty of the system.
  • 6. FACTORS DESIGNATING DATA PROTECTION LEVEL Data category Subjects Number of subjects Type of immediate threats  Employees  Counterparties  Public  Special  Biometric  Other  < 100,000  > 100,000 3 categories of threats
  • 7. TYPES OF IMMEDIATE THREATS 1. Threats caused by undeclared (undocumented) capabilities in the system software. 2. Threats caused by undeclared capabilities in the application software. 3. Threats caused by other factors. Data category Subjects Number of subjects TYPES OF THREATS Threat type designation is not regulated.
  • 8. PROTECTION LEVELS Data Category Operator’s Employees Number of Subjects Type of Vital Threats 1 2 3 (UDC* OS) (UDC* SW) (Without UDC*) Special No > 100,000 PL-1 PL-1 PL-2 No < 100,000 PL-1 PL-2 PL-3 Yes Biometric PL-1 PL-2 PL-3 Other No > 100,000 PL-1 PL-2 PL-3 No < 100,000 PL-2 PL-3 PL-4 Yes Public No > 100,000 PL-2 PL-2 PL-4 No < 100,000 PL-2 PL-3 PL-4 Yes * UDC– undeclared capabilities
  • 9. INFORMATION PROTECTION MEANS PROTECTION LEVEL PL-1, PL- 2 PL-3 PL-4 TYPE OF THREATS 3 1, 2, 3 2 3 3 INTERNET CONNECTIVITY no yes - yes no - Computer equipment Class 5* Class 6 Intruder detection system Class 4 Class 5 Class 5 Virus protection means Firewall Class 4 Class 3 Class 4 Other information protection means Any safety specifications or tasks *Each category of tools has its own FSTEC classification.
  • 10. INFRASTRUCTURE MODELS & REQUIREMENTS TO DATA PROTECTION Virtualization protection Firewalling Communication channels protection Physical security COLOCATION CLOUD
  • 11. PROVIDER REQUIREMENTS  FSTEC license for development and (or) production of information confidentiality protection means  FSTEC license for confidential information technical protection  FSS license for cryptographic protection means usage  FSTEC certificates for utilized information protection means  Lease/purchase agreement for utilized protection means
  • 13. INFRASTRUCTURE-152: WE OFFER  Virtualization platform / hardware allocation in line with federal laws  Integration of your IS tools / equipment into our solution architecture  Attestation and maintenance of the IS*:  threat model development  documents preparation  information system attestation  information system maintenance *The service is provided in cooperation with partners.
  • 14. OUR CERTIFICATES AND LICENSES  Premier VSSP VMware  Microsoft GOLD Hosting Provider  Oracle Gold Partner  SAP for Business All-in-One in Application Management and Hosting Services  HP GOLD Partner  ISO/IEC 27001:2013  ISO 9001:2011  Uptime Institute Management and Operations  Uptime Institute Tier III Certified (Design)  PCI DSS v. 3.0  ISAE 3402  FSTEC license #0763: for development and (or) production of information confidentiality protection means  FSTEC license #1279: for confidential information technical protection  FSS license #0011865 for provision of the services using cryptographic means
  • 15. PHYSICAL SECURITY  Multilevel access control  Round-the-clock video monitoring; video records are stored during 3 months  Individual fences for racks  Access control system of the fence/rack, biometrics  Dedicated video monitoring solutions (APC Netbotz, etc.)  Extra sensors on rack doors opening  Safe rack
  • 16. NETWORK SECURITY  FSTEC certified equipment and software  Network segmentation in the cloud via VLAN and firewall of Check Point Security Gateway  External networks interaction control via the intruder detection system of Check Point Security Gateway  Cryptographic protection of communication channels  GOST coding via the virtual crypto gateway S-Terra  Second level coding using the MacSec protocol  VPN organization using AES, 3DES coding
  • 17. NETWORK SECURITY CLOUD-152 Cloud core switch’s ESXi ESXi ESXi ESXi S-Terra virtual gateway DataLine Admins Remote user sites Check Point Security Gateway’s (FW/IDS) DataCenter core switch’s Site-to-site VPN INTERNET
  • 18. CLOUD-152: IAAS VERSIONS  Private cloud for allocation of personal data with protection level #1  Community cloud for allocation of personal data with protection levels #2, #3 and #4 The standard solution offers a resilient architecture based on NORD-4 data centre. Disaster-proof cloud-152 can be also arranged based on NORD and OST data centres locations.
  • 19. PRIVATE CLOUD-152 FOR DATA WITH PL-1 For the information systems processing personal data with protection level #1, an individual project is developed on the allocated hardware. This solution may be fail-safe or disaster-proof.
  • 21. COMMUNTY CLOUD: PROTECTION MEANS All protection means used in Cloud-152 architecture are certified by FSTEC*:  vGate R2 (virtualization protection means)  CheckPoint IDS (intruder detection system)  CheckPoint FW (firewall)  Wallix (proxy server with sessions recording)  Kaspersky (virus protection)  S-Terra (VPN gateway)  SecretNet and Sobol software and hardware (protection against unauthorized access) * Register of FSTEC certified protection means
  • 22. INFRASTRUCTURE-152: ALGORITHM Threat model Migration to Cloud-152 Set of documents (OED***) System attestation**** Documents submission to Roskomnadzor Technical project** System audit* * For current projects/operating systems. Launch of the IS from the scratch commences with development of a threat model. ** Technical project includes a list of protection means corresponding to the level of protection of used personal data and type of threats immediate for the particular system. *** A set of documents includes: a threat model, technical project, organizational records, letter to Roskomnadzor **** The attestation includes compliance assessment of the threat model system to the technical project
  • 23. Maximum allowable service downtime per month* ≥ 1,700 0.37h Maximum allowable service downtime per month*0.15h MIPS / 1 vCPU 250 IOPS/ 500 GB HDD IOPS Time of access to the VM disc≤20ms 99.982% availability of the data centre and network infrastructure 10 minutes response time 99.98% of the service availability for data with PL-3 99.95% of the service availability for data with PL-2 SLA: KEY PARAMETERS * including technological downtime (infrastructure maintenance)
  • 24. SLA for data with PL-2: why 99.95% Reduced guaranteed availability of the service is caused by the prohibition of the remote access to the host under protection administration of personal data with protection level # 2. Manual reboot of the servers is only permissible for the IS with this data category.
  • 25. $11 $3.23 $6.44 $0.12 $0.26$0.51 HDD SATA, for 1 Gb HDD SAS, for 1 Gb SSD, for 1 Gb RAM, for 1 Gb CPU, for 1 GHz Protection means, For vCPU HOW MUCH DOES IT COST?
  • 26. INTERESTED, BUT STILL HAVE QUESTIONS? Contact us at +7 (495) 784 65 05 or cloud-152@dtln.ru if you have any questions on personal data protection options.