SlideShare a Scribd company logo
Assuring Access in the Cloud
2
What is the Cloud?
 The cloud is a network of
servers, and each server has a
different function. Some servers
use computing power to run
applications or "deliver a
service.“*
 Basically, it’s a network of
servers and computers hosting
your information away from your
physical device.
*From The Beginners Guide to the Cloud: Mashable
“Thunder and lightning
isn’t God being angry,
its just Microsoft and
Google fighting in the
clouds.”
- Anonomyus
3
What is Cloud Computing ?
 Noun: the practice of using a network of remote servers hosted on the
Internet to store, manage, and process data, rather than a local server or a
personal computer.
 Many different varieties:
• IT computing accessible online
• Available from anywhere
• Virtualization
• Interchangeable services
• On-demand for peak loads and needs
• IaaS, PaaS, SaaS
4
Drivers of Cloud Adoption
5
Impediments to Cloud Adoption
6
Enabling the Business
 If business drivers for cloud
computing are:
• Agility and flexibility
• Performance and scale
• Operational efficiency
• Universal access
 Security must be:
• Transparent
• Dynamic
• Flexible
• Operationally Efficient
7
The Business Needs for IAM
 Transparent compliance
 Sustained efficiencies
 Improved business agility
 Access Assurance visibility to
LOB
8
Access Assurance for the Cloud
 Ensuring the right people have the right access to the right resources
regardless of where those resources are physically located and managed
• Hosted applications
• SaaS applications
• Private clouds
• Public clouds
 Providing the basis for:
• Access policy definition
• Preventative controls and enforcement via provisioning
• Access verification of user access to cloud applications
9
Cloud Does Not Change Requirements
Same information
 PHI & privacy data
(HIPPA, etc)
 Key financial data
(SOX)
 Card holder information
(PCI)
 Other high risk
(shareholders)
Same IAM requirements
 All access must connect to
enterprise identities
 Access certification
 Separation of duties for
operators and users
 Privileged access management
 Access management
• Who has access?
• Who has accessed?
10
Seamless to Users
11
So Must Access Assurance Be
12
What Comes with the Cloud?
 No more closed and controlled surfaces
• You no longer have direct control or oversight
 You are still accountable to the law and shareholders
• You may be subject to new regulations
 Vendors will try to lock-in
 Level of auditability of their controls
 Key is transparency, embedded controls, and agility
13
Risks and Considerations
 Disabling network access does not prevent access to key applications and
data
 Ensure new users get access quickly and changes are reflected accurately
 Management of identity information in the cloud
• Delegation and assurance
 Where is sensitive data located and how managed?
 Privacy management
 Administrative access to sensitive data and users
 Compliance and regulatory requirements
 Security aspects as part of partner agreements
14
Access Assurance
15
To Achieve Access Assurance You Must
16
To Achieve Access Assurance You Must
17
To Achieve Access Assurance You Must
18
Access Assurance
19
Access Assurance Components
20
Critical Need Across IT Services
21
Courion Access Assurance Suite
22
Courion Access Assurance Suite
Secure the Enterprise, don’t slow it down…
Designed for Your Complex Environment
23
The Secret to Making it All Work
 A user interface that business users understand
 Ability to gather information from numerous sources
 Information that is actionable for remediation
 Fast, reliable, scalable implementation
 Breadth of capability to reach to variety of systems and resources
• Off-premise applications
• Virtualization
• Platform and infrastructure
• Federation
 Proven customer success in a cloud environment
24
IAM and the Cloud
 Risks and required controls may increase due to cloud:
• Removal of corporate network access no longer a compensating control
• Sensitive data is now in different locations and may be:
 More accessible
 Subject to different regulations
• Additional technologies for provisioning and access compliance
 Must span the traditional enterprise and the cloud
• Policy definition
• Accurate tracking and periodic review of access
• Balance of preventative and detective controls
25
Bottom Line
 The cloud and cloud computing are a reality
 Closed and controlled moves to dynamic, open, and accessible
 Identity plays a critical role in cloud environments
 Need to deal with…
• Lack of control of data
• Extended reach of administrative privileges
• Privacy and trust
• Complexity of handling identities
 An Access Assurance strategy is critical
26
What Now?
 If you’re looking for more information on how an Access Assurance Suite
can transform your company’s information, contact us today. We can
provide a quick scan of your system and let you know where your hidden
risks lie and how to take care of them.
info@Courion.com
www.Courion.com
Get My Quick Scan >>

More Related Content

What's hot

Cloud computing in Australia - Separating hype from reality
Cloud computing in Australia - Separating hype from realityCloud computing in Australia - Separating hype from reality
Cloud computing in Australia - Separating hype from reality
Russell_Kennedy
 
Information classification
Information classificationInformation classification
Cloud Email Firewall
Cloud Email FirewallCloud Email Firewall
Cloud Email Firewall
Giuseppe Coppola
 
Never Clueless Hosted Exchange Email
Never Clueless Hosted Exchange EmailNever Clueless Hosted Exchange Email
Never Clueless Hosted Exchange Email
John Rood
 
Managed It Services
Managed It ServicesManaged It Services
Managed It Services
sanaq951
 
What Data Center Compliance Means for Your Business
What Data Center Compliance Means for Your BusinessWhat Data Center Compliance Means for Your Business
What Data Center Compliance Means for Your Business
Data Foundry
 
IT Series: Cloud Computing Done Right CISOA 2011
IT Series: Cloud Computing Done Right CISOA 2011IT Series: Cloud Computing Done Right CISOA 2011
IT Series: Cloud Computing Done Right CISOA 2011
Donald E. Hester
 
Softchoice - Microsoft Office 365 - Discussing legal concerns and informatio...
Softchoice  - Microsoft Office 365 - Discussing legal concerns and informatio...Softchoice  - Microsoft Office 365 - Discussing legal concerns and informatio...
Softchoice - Microsoft Office 365 - Discussing legal concerns and informatio...
Softchoice Corporation
 
Never Clueless Encrypted Email
Never Clueless Encrypted EmailNever Clueless Encrypted Email
Never Clueless Encrypted Email
John Rood
 
Cloud Services & the Development of ISO/IEC 27018
Cloud Services & the Development of ISO/IEC 27018Cloud Services & the Development of ISO/IEC 27018
Cloud Services & the Development of ISO/IEC 27018
Corporacion Colombia Digital
 
Visual Online - Cloud Computing - 4 Mars 2011
Visual Online - Cloud Computing - 4 Mars 2011Visual Online - Cloud Computing - 4 Mars 2011
Visual Online - Cloud Computing - 4 Mars 2011
Francisco Malpica
 
Keynote Theatre. Keynote Day 2. 16:30 Evelyn de Souza
Keynote Theatre. Keynote Day 2. 16:30   Evelyn de Souza Keynote Theatre. Keynote Day 2. 16:30   Evelyn de Souza
Keynote Theatre. Keynote Day 2. 16:30 Evelyn de Souza
CloudExpoAsia
 
California Consumer Privacy Act (CCPA)
California Consumer Privacy Act (CCPA)California Consumer Privacy Act (CCPA)
California Consumer Privacy Act (CCPA)
Happiest Minds Technologies
 
Cas 4
Cas 4Cas 4
How to Deliver Closed-Loop Compliance
How to Deliver Closed-Loop ComplianceHow to Deliver Closed-Loop Compliance
How to Deliver Closed-Loop Compliance
ForgeRock
 
Realizing the Value of Social: Evolving from Social Media to Customer Experience
Realizing the Value of Social: Evolving from Social Media to Customer ExperienceRealizing the Value of Social: Evolving from Social Media to Customer Experience
Realizing the Value of Social: Evolving from Social Media to Customer Experience
Tata Consultancy Services
 
Bitglass Webinar - 5 Cloud Security Best Practices for 2018
Bitglass Webinar - 5 Cloud Security Best Practices for 2018Bitglass Webinar - 5 Cloud Security Best Practices for 2018
Bitglass Webinar - 5 Cloud Security Best Practices for 2018
Bitglass
 
Data Privacy Readiness Test
Data Privacy Readiness TestData Privacy Readiness Test
Data Privacy Readiness Test
Druva
 
Bitglass Webinar - BlueCross BlueShield of Tennessee's CASB Journey to Secure...
Bitglass Webinar - BlueCross BlueShield of Tennessee's CASB Journey to Secure...Bitglass Webinar - BlueCross BlueShield of Tennessee's CASB Journey to Secure...
Bitglass Webinar - BlueCross BlueShield of Tennessee's CASB Journey to Secure...
Bitglass
 

What's hot (20)

Cloud computing in Australia - Separating hype from reality
Cloud computing in Australia - Separating hype from realityCloud computing in Australia - Separating hype from reality
Cloud computing in Australia - Separating hype from reality
 
Information classification
Information classificationInformation classification
Information classification
 
Cloud Email Firewall
Cloud Email FirewallCloud Email Firewall
Cloud Email Firewall
 
Never Clueless Hosted Exchange Email
Never Clueless Hosted Exchange EmailNever Clueless Hosted Exchange Email
Never Clueless Hosted Exchange Email
 
Managed It Services
Managed It ServicesManaged It Services
Managed It Services
 
What Data Center Compliance Means for Your Business
What Data Center Compliance Means for Your BusinessWhat Data Center Compliance Means for Your Business
What Data Center Compliance Means for Your Business
 
IT Series: Cloud Computing Done Right CISOA 2011
IT Series: Cloud Computing Done Right CISOA 2011IT Series: Cloud Computing Done Right CISOA 2011
IT Series: Cloud Computing Done Right CISOA 2011
 
Softchoice - Microsoft Office 365 - Discussing legal concerns and informatio...
Softchoice  - Microsoft Office 365 - Discussing legal concerns and informatio...Softchoice  - Microsoft Office 365 - Discussing legal concerns and informatio...
Softchoice - Microsoft Office 365 - Discussing legal concerns and informatio...
 
Never Clueless Encrypted Email
Never Clueless Encrypted EmailNever Clueless Encrypted Email
Never Clueless Encrypted Email
 
Cloud Services & the Development of ISO/IEC 27018
Cloud Services & the Development of ISO/IEC 27018Cloud Services & the Development of ISO/IEC 27018
Cloud Services & the Development of ISO/IEC 27018
 
Visual Online - Cloud Computing - 4 Mars 2011
Visual Online - Cloud Computing - 4 Mars 2011Visual Online - Cloud Computing - 4 Mars 2011
Visual Online - Cloud Computing - 4 Mars 2011
 
Keynote Theatre. Keynote Day 2. 16:30 Evelyn de Souza
Keynote Theatre. Keynote Day 2. 16:30   Evelyn de Souza Keynote Theatre. Keynote Day 2. 16:30   Evelyn de Souza
Keynote Theatre. Keynote Day 2. 16:30 Evelyn de Souza
 
California Consumer Privacy Act (CCPA)
California Consumer Privacy Act (CCPA)California Consumer Privacy Act (CCPA)
California Consumer Privacy Act (CCPA)
 
Cas 4
Cas 4Cas 4
Cas 4
 
How to Deliver Closed-Loop Compliance
How to Deliver Closed-Loop ComplianceHow to Deliver Closed-Loop Compliance
How to Deliver Closed-Loop Compliance
 
Realizing the Value of Social: Evolving from Social Media to Customer Experience
Realizing the Value of Social: Evolving from Social Media to Customer ExperienceRealizing the Value of Social: Evolving from Social Media to Customer Experience
Realizing the Value of Social: Evolving from Social Media to Customer Experience
 
BOSSDesk_overview
BOSSDesk_overviewBOSSDesk_overview
BOSSDesk_overview
 
Bitglass Webinar - 5 Cloud Security Best Practices for 2018
Bitglass Webinar - 5 Cloud Security Best Practices for 2018Bitglass Webinar - 5 Cloud Security Best Practices for 2018
Bitglass Webinar - 5 Cloud Security Best Practices for 2018
 
Data Privacy Readiness Test
Data Privacy Readiness TestData Privacy Readiness Test
Data Privacy Readiness Test
 
Bitglass Webinar - BlueCross BlueShield of Tennessee's CASB Journey to Secure...
Bitglass Webinar - BlueCross BlueShield of Tennessee's CASB Journey to Secure...Bitglass Webinar - BlueCross BlueShield of Tennessee's CASB Journey to Secure...
Bitglass Webinar - BlueCross BlueShield of Tennessee's CASB Journey to Secure...
 

Viewers also liked

10 IT Security Trends to Watch for in 2016
10 IT Security Trends to Watch for in 201610 IT Security Trends to Watch for in 2016
10 IT Security Trends to Watch for in 2016
Core Security
 
Phishing: How to get off the hook using Intelligent IAM
Phishing: How to get off the hook using Intelligent IAMPhishing: How to get off the hook using Intelligent IAM
Phishing: How to get off the hook using Intelligent IAMCourion Corporation
 
PDFCertification
PDFCertificationPDFCertification
PDFCertificationGene Berger
 
10 Things to Watch for in 2016
10 Things to Watch for in 201610 Things to Watch for in 2016
10 Things to Watch for in 2016
Courion Corporation
 
Courion Survey Findings: Access Risk Attitudes
Courion Survey Findings: Access Risk AttitudesCourion Survey Findings: Access Risk Attitudes
Courion Survey Findings: Access Risk Attitudes
Courion Corporation
 
4 ways to defend against internal attacks
4 ways to defend against internal attacks4 ways to defend against internal attacks
4 ways to defend against internal attacks
Courion Corporation
 
Check Point Certified Security Admin
Check Point Certified Security AdminCheck Point Certified Security Admin
Check Point Certified Security AdminGene Berger
 
Firewall audit
Firewall auditFirewall audit
Firewall audit
Velliyangiri K.S
 
Checkpoint - A Practical Demonstration of Endpoint Security
Checkpoint - A Practical Demonstration of Endpoint SecurityCheckpoint - A Practical Demonstration of Endpoint Security
Checkpoint - A Practical Demonstration of Endpoint Security
Vincent Kwon
 
Cisco ASA Firewall Interview Question "aka Stump-the-Chump" Question # 01
Cisco ASA Firewall Interview Question "aka Stump-the-Chump" Question # 01Cisco ASA Firewall Interview Question "aka Stump-the-Chump" Question # 01
Cisco ASA Firewall Interview Question "aka Stump-the-Chump" Question # 01Duane Bodle
 
Firewalking
FirewalkingFirewalking
How to Audit Firewall, what are the standard Practices for Firewall Audit
How to Audit Firewall, what are the standard Practices for Firewall AuditHow to Audit Firewall, what are the standard Practices for Firewall Audit
How to Audit Firewall, what are the standard Practices for Firewall Audit
keyuradmin
 
Building a culture of security
Building a culture of securityBuilding a culture of security
Building a culture of security
Courion Corporation
 
Spam Detection with a Content-based Random-walk Algorithm (SMUC'2010)
Spam Detection with a Content-based Random-walk Algorithm (SMUC'2010)Spam Detection with a Content-based Random-walk Algorithm (SMUC'2010)
Spam Detection with a Content-based Random-walk Algorithm (SMUC'2010)
Javier Ortega
 
Assessing the Risk of Identity and Access
Assessing the Risk of Identity and AccessAssessing the Risk of Identity and Access
Assessing the Risk of Identity and Access
Courion Corporation
 
Buyers Guide for Governance
Buyers Guide for GovernanceBuyers Guide for Governance
Buyers Guide for Governance
Courion Corporation
 
8 Tips on Creating a Security Culture in the Workplace
8 Tips on Creating a Security Culture in the Workplace8 Tips on Creating a Security Culture in the Workplace
8 Tips on Creating a Security Culture in the Workplace
Tripwire
 

Viewers also liked (18)

10 IT Security Trends to Watch for in 2016
10 IT Security Trends to Watch for in 201610 IT Security Trends to Watch for in 2016
10 IT Security Trends to Watch for in 2016
 
Phishing: How to get off the hook using Intelligent IAM
Phishing: How to get off the hook using Intelligent IAMPhishing: How to get off the hook using Intelligent IAM
Phishing: How to get off the hook using Intelligent IAM
 
PDFCertification
PDFCertificationPDFCertification
PDFCertification
 
10 Things to Watch for in 2016
10 Things to Watch for in 201610 Things to Watch for in 2016
10 Things to Watch for in 2016
 
Courion Survey Findings: Access Risk Attitudes
Courion Survey Findings: Access Risk AttitudesCourion Survey Findings: Access Risk Attitudes
Courion Survey Findings: Access Risk Attitudes
 
4 ways to defend against internal attacks
4 ways to defend against internal attacks4 ways to defend against internal attacks
4 ways to defend against internal attacks
 
Check Point Certified Security Admin
Check Point Certified Security AdminCheck Point Certified Security Admin
Check Point Certified Security Admin
 
Firewall audit
Firewall auditFirewall audit
Firewall audit
 
Checkpoint - A Practical Demonstration of Endpoint Security
Checkpoint - A Practical Demonstration of Endpoint SecurityCheckpoint - A Practical Demonstration of Endpoint Security
Checkpoint - A Practical Demonstration of Endpoint Security
 
Forti web
Forti webForti web
Forti web
 
Cisco ASA Firewall Interview Question "aka Stump-the-Chump" Question # 01
Cisco ASA Firewall Interview Question "aka Stump-the-Chump" Question # 01Cisco ASA Firewall Interview Question "aka Stump-the-Chump" Question # 01
Cisco ASA Firewall Interview Question "aka Stump-the-Chump" Question # 01
 
Firewalking
FirewalkingFirewalking
Firewalking
 
How to Audit Firewall, what are the standard Practices for Firewall Audit
How to Audit Firewall, what are the standard Practices for Firewall AuditHow to Audit Firewall, what are the standard Practices for Firewall Audit
How to Audit Firewall, what are the standard Practices for Firewall Audit
 
Building a culture of security
Building a culture of securityBuilding a culture of security
Building a culture of security
 
Spam Detection with a Content-based Random-walk Algorithm (SMUC'2010)
Spam Detection with a Content-based Random-walk Algorithm (SMUC'2010)Spam Detection with a Content-based Random-walk Algorithm (SMUC'2010)
Spam Detection with a Content-based Random-walk Algorithm (SMUC'2010)
 
Assessing the Risk of Identity and Access
Assessing the Risk of Identity and AccessAssessing the Risk of Identity and Access
Assessing the Risk of Identity and Access
 
Buyers Guide for Governance
Buyers Guide for GovernanceBuyers Guide for Governance
Buyers Guide for Governance
 
8 Tips on Creating a Security Culture in the Workplace
8 Tips on Creating a Security Culture in the Workplace8 Tips on Creating a Security Culture in the Workplace
8 Tips on Creating a Security Culture in the Workplace
 

Similar to Access Assurance in the Cloud

Intel boubker el mouttahid
Intel boubker el mouttahidIntel boubker el mouttahid
Intel boubker el mouttahid
BigDataExpo
 
IT4651w-CC-1b-Introduction.pptx
IT4651w-CC-1b-Introduction.pptxIT4651w-CC-1b-Introduction.pptx
IT4651w-CC-1b-Introduction.pptx
nada542773
 
Transforming cloud security into an advantage
Transforming cloud security into an advantageTransforming cloud security into an advantage
Transforming cloud security into an advantage
Moshe Ferber
 
Myths of validation
Myths of validationMyths of validation
Myths of validation
Jeff Thomas
 
Cloud computing overview
Cloud computing overviewCloud computing overview
Cloud computing overview
Dimitar Georgiev
 
Cloud Computing Security
Cloud Computing SecurityCloud Computing Security
Cloud Computing Security
Nithin Raj
 
dtechnClouologyassociatepart2
dtechnClouologyassociatepart2dtechnClouologyassociatepart2
dtechnClouologyassociatepart2
Anne Starr
 
Guide to security patterns for cloud systems and data security in aws and azure
Guide to security patterns for cloud systems and data security in aws and azureGuide to security patterns for cloud systems and data security in aws and azure
Guide to security patterns for cloud systems and data security in aws and azure
Abdul Khan
 
Cloud computing 10 cloud security advantages and challenges
Cloud computing 10 cloud security advantages and challengesCloud computing 10 cloud security advantages and challenges
Cloud computing 10 cloud security advantages and challenges
Vaibhav Khanna
 
Module 5-cloud computing-SECURITY IN THE CLOUD
Module 5-cloud computing-SECURITY IN THE CLOUDModule 5-cloud computing-SECURITY IN THE CLOUD
Module 5-cloud computing-SECURITY IN THE CLOUD
Sweta Kumari Barnwal
 
Cloud is not an option, but is security?
Cloud is not an option, but is security?Cloud is not an option, but is security?
Cloud is not an option, but is security?
Jody Keyser
 
Cloud security
Cloud securityCloud security
Cloud security
Adeel Javaid
 
Cloud computing-security-issues
Cloud computing-security-issuesCloud computing-security-issues
Cloud computing-security-issues
Aleem Mohammed
 
Cloud Computing - The new buzz word
Cloud Computing - The new buzz wordCloud Computing - The new buzz word
Cloud Computing - The new buzz word
Quadrisk
 
Does cloud technology belong at your law firm?
Does cloud technology belong at your law firm?Does cloud technology belong at your law firm?
Does cloud technology belong at your law firm?
Clio - Cloud-Based Legal Technology
 
Bringing the Cloud Back to Earth
Bringing the Cloud Back to EarthBringing the Cloud Back to Earth
Bringing the Cloud Back to Earth
Sri Chalasani
 
Trust, security and privacy issues with cloud erp
Trust, security and privacy issues with cloud erpTrust, security and privacy issues with cloud erp
Trust, security and privacy issues with cloud erp
Harshit Garg
 
Cloud Security: A matter of trust?
Cloud Security: A matter of trust?Cloud Security: A matter of trust?
Cloud Security: A matter of trust?
Mark Williams
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
Pyingkodi Maran
 
May 2013 Federal Cloud Computing Summit Keynote by David Cearly
May 2013 Federal Cloud Computing Summit Keynote by David CearlyMay 2013 Federal Cloud Computing Summit Keynote by David Cearly
May 2013 Federal Cloud Computing Summit Keynote by David Cearly
Tim Harvey
 

Similar to Access Assurance in the Cloud (20)

Intel boubker el mouttahid
Intel boubker el mouttahidIntel boubker el mouttahid
Intel boubker el mouttahid
 
IT4651w-CC-1b-Introduction.pptx
IT4651w-CC-1b-Introduction.pptxIT4651w-CC-1b-Introduction.pptx
IT4651w-CC-1b-Introduction.pptx
 
Transforming cloud security into an advantage
Transforming cloud security into an advantageTransforming cloud security into an advantage
Transforming cloud security into an advantage
 
Myths of validation
Myths of validationMyths of validation
Myths of validation
 
Cloud computing overview
Cloud computing overviewCloud computing overview
Cloud computing overview
 
Cloud Computing Security
Cloud Computing SecurityCloud Computing Security
Cloud Computing Security
 
dtechnClouologyassociatepart2
dtechnClouologyassociatepart2dtechnClouologyassociatepart2
dtechnClouologyassociatepart2
 
Guide to security patterns for cloud systems and data security in aws and azure
Guide to security patterns for cloud systems and data security in aws and azureGuide to security patterns for cloud systems and data security in aws and azure
Guide to security patterns for cloud systems and data security in aws and azure
 
Cloud computing 10 cloud security advantages and challenges
Cloud computing 10 cloud security advantages and challengesCloud computing 10 cloud security advantages and challenges
Cloud computing 10 cloud security advantages and challenges
 
Module 5-cloud computing-SECURITY IN THE CLOUD
Module 5-cloud computing-SECURITY IN THE CLOUDModule 5-cloud computing-SECURITY IN THE CLOUD
Module 5-cloud computing-SECURITY IN THE CLOUD
 
Cloud is not an option, but is security?
Cloud is not an option, but is security?Cloud is not an option, but is security?
Cloud is not an option, but is security?
 
Cloud security
Cloud securityCloud security
Cloud security
 
Cloud computing-security-issues
Cloud computing-security-issuesCloud computing-security-issues
Cloud computing-security-issues
 
Cloud Computing - The new buzz word
Cloud Computing - The new buzz wordCloud Computing - The new buzz word
Cloud Computing - The new buzz word
 
Does cloud technology belong at your law firm?
Does cloud technology belong at your law firm?Does cloud technology belong at your law firm?
Does cloud technology belong at your law firm?
 
Bringing the Cloud Back to Earth
Bringing the Cloud Back to EarthBringing the Cloud Back to Earth
Bringing the Cloud Back to Earth
 
Trust, security and privacy issues with cloud erp
Trust, security and privacy issues with cloud erpTrust, security and privacy issues with cloud erp
Trust, security and privacy issues with cloud erp
 
Cloud Security: A matter of trust?
Cloud Security: A matter of trust?Cloud Security: A matter of trust?
Cloud Security: A matter of trust?
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
 
May 2013 Federal Cloud Computing Summit Keynote by David Cearly
May 2013 Federal Cloud Computing Summit Keynote by David CearlyMay 2013 Federal Cloud Computing Summit Keynote by David Cearly
May 2013 Federal Cloud Computing Summit Keynote by David Cearly
 

Recently uploaded

Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 

Recently uploaded (20)

Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 

Access Assurance in the Cloud

  • 1. Assuring Access in the Cloud
  • 2. 2 What is the Cloud?  The cloud is a network of servers, and each server has a different function. Some servers use computing power to run applications or "deliver a service.“*  Basically, it’s a network of servers and computers hosting your information away from your physical device. *From The Beginners Guide to the Cloud: Mashable “Thunder and lightning isn’t God being angry, its just Microsoft and Google fighting in the clouds.” - Anonomyus
  • 3. 3 What is Cloud Computing ?  Noun: the practice of using a network of remote servers hosted on the Internet to store, manage, and process data, rather than a local server or a personal computer.  Many different varieties: • IT computing accessible online • Available from anywhere • Virtualization • Interchangeable services • On-demand for peak loads and needs • IaaS, PaaS, SaaS
  • 6. 6 Enabling the Business  If business drivers for cloud computing are: • Agility and flexibility • Performance and scale • Operational efficiency • Universal access  Security must be: • Transparent • Dynamic • Flexible • Operationally Efficient
  • 7. 7 The Business Needs for IAM  Transparent compliance  Sustained efficiencies  Improved business agility  Access Assurance visibility to LOB
  • 8. 8 Access Assurance for the Cloud  Ensuring the right people have the right access to the right resources regardless of where those resources are physically located and managed • Hosted applications • SaaS applications • Private clouds • Public clouds  Providing the basis for: • Access policy definition • Preventative controls and enforcement via provisioning • Access verification of user access to cloud applications
  • 9. 9 Cloud Does Not Change Requirements Same information  PHI & privacy data (HIPPA, etc)  Key financial data (SOX)  Card holder information (PCI)  Other high risk (shareholders) Same IAM requirements  All access must connect to enterprise identities  Access certification  Separation of duties for operators and users  Privileged access management  Access management • Who has access? • Who has accessed?
  • 11. 11 So Must Access Assurance Be
  • 12. 12 What Comes with the Cloud?  No more closed and controlled surfaces • You no longer have direct control or oversight  You are still accountable to the law and shareholders • You may be subject to new regulations  Vendors will try to lock-in  Level of auditability of their controls  Key is transparency, embedded controls, and agility
  • 13. 13 Risks and Considerations  Disabling network access does not prevent access to key applications and data  Ensure new users get access quickly and changes are reflected accurately  Management of identity information in the cloud • Delegation and assurance  Where is sensitive data located and how managed?  Privacy management  Administrative access to sensitive data and users  Compliance and regulatory requirements  Security aspects as part of partner agreements
  • 15. 15 To Achieve Access Assurance You Must
  • 16. 16 To Achieve Access Assurance You Must
  • 17. 17 To Achieve Access Assurance You Must
  • 20. 20 Critical Need Across IT Services
  • 22. 22 Courion Access Assurance Suite Secure the Enterprise, don’t slow it down… Designed for Your Complex Environment
  • 23. 23 The Secret to Making it All Work  A user interface that business users understand  Ability to gather information from numerous sources  Information that is actionable for remediation  Fast, reliable, scalable implementation  Breadth of capability to reach to variety of systems and resources • Off-premise applications • Virtualization • Platform and infrastructure • Federation  Proven customer success in a cloud environment
  • 24. 24 IAM and the Cloud  Risks and required controls may increase due to cloud: • Removal of corporate network access no longer a compensating control • Sensitive data is now in different locations and may be:  More accessible  Subject to different regulations • Additional technologies for provisioning and access compliance  Must span the traditional enterprise and the cloud • Policy definition • Accurate tracking and periodic review of access • Balance of preventative and detective controls
  • 25. 25 Bottom Line  The cloud and cloud computing are a reality  Closed and controlled moves to dynamic, open, and accessible  Identity plays a critical role in cloud environments  Need to deal with… • Lack of control of data • Extended reach of administrative privileges • Privacy and trust • Complexity of handling identities  An Access Assurance strategy is critical
  • 26. 26 What Now?  If you’re looking for more information on how an Access Assurance Suite can transform your company’s information, contact us today. We can provide a quick scan of your system and let you know where your hidden risks lie and how to take care of them. info@Courion.com www.Courion.com Get My Quick Scan >>