SlideShare a Scribd company logo
Security Considerations in the Cloud


 Jeff Crume
 Distinguished Engineer
 crume@us.ibm.com
 http://extranet.lotus.com/crume




                                   © 2011 IBM Corporation
Security and Cloud Computing



 Security Remains the Top Concern for Cloud Adoption


          80%
          Of enterprises consider security
                                                                           “How can we be assured that our data will
                                                                           not be leaked and that the vendors have the
          the #1 inhibitor to cloud adoptions                              technology and the governance to control its
                                                                                employees from stealing data?”




          48%
          Of enterprises are concerned
                                                                            “Security is the biggest concern. I don’t
                                                                           worry much about the other “-ities” – reliability,
          about the reliability of clouds                                                availability, etc.”




          33%                                                                “I prefer internal cloud to IaaS. When the
                                                                                 service is kept internally, I am more
          Of respondents are concerned with                                   comfortable with the security that it offers.”
          cloud interfering with their ability
          to comply with regulations


Source: Driving Profitable Growth Through Cloud Computing, IBM Study (conducted by Oliver Wyman)

  2                                                                                                                    © 2011 IBM Corporation
Security and Cloud Computing



One-size does not fit-all:
Different cloud workloads have different risk profiles

             High
                                                                   Mission-critical
                                                                 workloads, personal           Tomorrow’s high value /
                                                                     information               high risk workloads need:
                                                                                                ●  Quality of protection
                                                                                                   adapted to risk
                                                                                                ●  Direct visibility and
                                                                                                   control
Need for                                             Analysis &                                 ●  Significant level of
Security                                           simulation with                                 assurance
                                                     public data
Assurance

                                                                                               Today’s clouds are
                                                                                               primarily here:
                                                                                                ●  Lower risk workloads
                               Training, testing                                                ●  One-size-fits-all
                                  with non-
                                                                                                   approach to data
                                sensitive data
                                                                                                   protection
                                                                                                ●  No significant
               Low
                                                                                                   assurance
                                                                                                ●  Price is key
                       Low-risk                       Mid-risk                     High-risk
                                                   Business Risk
 3                                                                                                      © 2011 IBM Corporation
Security and Cloud Computing



 Simple Example

                    Today’s Data Center   Tomorrow’s Public Cloud


                                          ?         ?
                                               ?
                                          ?         ?
We Have Control                                ?        Who Has Control?
It’s located at X.                                      Where is it located?
It’s stored in server’s Y, Z.                           Where is it stored?
We have backups in place.                               Who backs it up?
Our admins control access.                              Who has access?
Our uptime is sufficient.                               How resilient is it?
The auditors are happy.                                 How do auditors observe?
Our security team is engaged.                           How does our security
                                                        team engage?




  4                                                              © 2011 IBM Corporation
Security and Cloud Computing



                               Categories of Cloud Computing Risks


                      Control                                                       Data
       Many companies and governments                                  Migrating workloads to a shared
       are uncomfortable with the idea of                             network and compute infrastructure
          their information located on                                    increases the potential for
          systems they do not control.                                     unauthorized exposure.
     Providers must offer a high degree                                  Authentication and access
      of security transparency to help                                   technologies become
           put customers at ease.                Reliability             increasingly important.
                                      High availability will be a key concern.
                                      IT departments will worry about a loss
                                         of service should outages occur.
                                       Mission critical applications
                                       may not run in the cloud
          Compliance                   without strong availability
     Complying with SOX, HIPAA         guarantees.
                                                                            Security Management
      and other regulations may                                              Even the simplest of tasks may be
     prohibit the use of clouds for                                           behind layers of abstraction or
          some applications.                                                   performed by someone else.
      Comprehensive auditing                                              Providers must supply easy controls to
      capabilities are essential.                                         manage security settings for
                                                                          application and runtime environments.


 5                                                                                                         © 2011 IBM Corporation
Security and Cloud Computing



Cloud Security = Traditional Security + SOA Security +
                    Virtualization Security

      • Hypervisor Security
           • Rogue VMs, VM Isolation, Data Leakage,
             Rootkits, etc.
      • Federated Identity Mgmt
           • Fed Prov/De-prov, Fed SSO
      • Privileged Identity Mgmt
      • Regulatory Compliance
           • Audit, Data Residency
      • Patch Mgmt
           • Across multiple VMs
      • Data Protection
           • Encryption, Data Segregation, DLP
 6                                                       © 2011 IBM Corporation
Security and Cloud Computing




                               Additional Information




 7                                                      © 2011 IBM Corporation
Security and Cloud Computing


Example for Securing the Virtualized Runtime:
IBM Security Virtual Server Protection for VMware vSphere 4
                                                                          VMsafe Integration
                                                                          Firewall and Intrusion
                                                                          Prevention
                                                                          Rootkit Detection /
                                                                          Prevention
                                                                          Inter-VM Traffic Analysis
                                                                          Automated Protection for
                                                                          Mobile VMs (VMotion)
                                                                          Virtual Network Segment
                                                                          Protection
                                                                          Virtual Network-Level
                                                                          Protection
                                                                          Virtual Infrastructure
                                                                          Auditing (Privileged User)
                                                                          Virtual Network Access
                                                                          Control
                               ••There have been 100 vulnerabilities disclosed across all of
                                  There have been 100 vulnerabilities disclosed across all of
                               VMware’s virtualization products since 1999.*
                                VMware’s virtualization products since 1999.*
                               ••57% of the vulnerabilities discovered in VMware products are
                                  57% of the vulnerabilities discovered in VMware products are
                               remotely accessible, while 46% are high risk vulnerabilities.*
                                remotely accessible, while 46% are high risk vulnerabilities.*
 8                                                                                         © 2011 IBM Corporation
Security and Cloud Computing



IBM Cloud Security Guidance document

     Based on cross-IBM research and customer interaction on cloud security
     Highlights a series of best practice controls that should be implemented
     Broken into 7 critical infrastructure components:


       – Building a Security Program
       – Confidential Data Protection
       – Implementing Strong Access and Identity
       – Application Provisioning and De-provisioning
       – Governance Audit Management
       – Vulnerability Management
       – Testing and Validation



 9                                                                              © 2011 IBM Corporation
Security and Cloud Computing



Cloud Security Whitepaper


          Trust needs to be achieved, especially when
          data is stored in new ways and in new
          locations, including for example different
          countries.

          This paper is provided to stimulate
          discussion by looking at three areas:

                • What is different about cloud?
                • What are the new security challenges cloud
                  introduces?
                • What can be done and what should be
                  considered further?




10                                                             © 2011 IBM Corporation
Security and Cloud Computing




11                             © 2011 IBM Corporation
Security and Cloud Computing




                                                              Thank you!


                               For more information, please visit:
                               ibm.com/cloud
                               Ibm.com/security

12                                                                    © 2011 IBM Corporation

More Related Content

What's hot

CBI Threat Landscape Webinar
CBI Threat Landscape WebinarCBI Threat Landscape Webinar
CBI Threat Landscape WebinarJoseph Schorr
 
Improving Your Information Security Program
Improving Your Information Security ProgramImproving Your Information Security Program
Improving Your Information Security Program
Seccuris Inc.
 
Paradigm Shift! - Customer Information Centric IT Risk Assessments
Paradigm Shift! - Customer Information Centric IT Risk AssessmentsParadigm Shift! - Customer Information Centric IT Risk Assessments
Paradigm Shift! - Customer Information Centric IT Risk Assessments
Fernando Reiser
 
Trend Micro Dec 6 Toronto VMUG
Trend Micro Dec 6 Toronto VMUGTrend Micro Dec 6 Toronto VMUG
Trend Micro Dec 6 Toronto VMUGtovmug
 
Security awarenesspreso draft-v-11
Security awarenesspreso draft-v-11Security awarenesspreso draft-v-11
Security awarenesspreso draft-v-11Joseph Schorr
 
Solutions for PCI DSS Compliance
Solutions for PCI DSS ComplianceSolutions for PCI DSS Compliance
Solutions for PCI DSS ComplianceTrend Micro
 
Cloud securityperspectives cmg
Cloud securityperspectives cmgCloud securityperspectives cmg
Cloud securityperspectives cmg
Neha Dhawan
 
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...Amazon Web Services
 
VSD Infotech
VSD InfotechVSD Infotech
VSD Infotech
VSD infotech
 
Trend Micro - 13martie2012
Trend Micro - 13martie2012Trend Micro - 13martie2012
Trend Micro - 13martie2012Agora Group
 
Rogers eBook Security
Rogers eBook SecurityRogers eBook Security
Rogers eBook Security
Rogers Communications
 
7 Things Every Ceo Should Know About Information Security
7 Things Every Ceo Should Know About Information Security7 Things Every Ceo Should Know About Information Security
7 Things Every Ceo Should Know About Information Security
Cindy Kim
 
Trend Micro - Virtualization and Security Compliance
Trend Micro - Virtualization and Security Compliance Trend Micro - Virtualization and Security Compliance
Trend Micro - Virtualization and Security Compliance
1CloudRoad.com
 
WP82 Physical Security in Mission Critical Facilities
WP82   Physical Security in Mission Critical FacilitiesWP82   Physical Security in Mission Critical Facilities
WP82 Physical Security in Mission Critical FacilitiesSE_NAM_Training
 
Symantec_2004_AnnualReport
Symantec_2004_AnnualReportSymantec_2004_AnnualReport
Symantec_2004_AnnualReportfinance40
 
Information Security Shake-Up
Information Security Shake-Up  Information Security Shake-Up
Information Security Shake-Up
EMC
 
IBM per la sicurezza del Datacenter
IBM per la sicurezza del DatacenterIBM per la sicurezza del Datacenter
IBM per la sicurezza del Datacenter
Anna Landolfi
 

What's hot (20)

CBI Threat Landscape Webinar
CBI Threat Landscape WebinarCBI Threat Landscape Webinar
CBI Threat Landscape Webinar
 
Improving Your Information Security Program
Improving Your Information Security ProgramImproving Your Information Security Program
Improving Your Information Security Program
 
Paradigm Shift! - Customer Information Centric IT Risk Assessments
Paradigm Shift! - Customer Information Centric IT Risk AssessmentsParadigm Shift! - Customer Information Centric IT Risk Assessments
Paradigm Shift! - Customer Information Centric IT Risk Assessments
 
Trend Micro Dec 6 Toronto VMUG
Trend Micro Dec 6 Toronto VMUGTrend Micro Dec 6 Toronto VMUG
Trend Micro Dec 6 Toronto VMUG
 
Security Feature Cover Story
Security Feature Cover StorySecurity Feature Cover Story
Security Feature Cover Story
 
Security awarenesspreso draft-v-11
Security awarenesspreso draft-v-11Security awarenesspreso draft-v-11
Security awarenesspreso draft-v-11
 
Solutions for PCI DSS Compliance
Solutions for PCI DSS ComplianceSolutions for PCI DSS Compliance
Solutions for PCI DSS Compliance
 
Cloud securityperspectives cmg
Cloud securityperspectives cmgCloud securityperspectives cmg
Cloud securityperspectives cmg
 
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
 
VSD Infotech
VSD InfotechVSD Infotech
VSD Infotech
 
SYMCAnnual
SYMCAnnualSYMCAnnual
SYMCAnnual
 
Security of,for & by cloud
Security of,for & by cloudSecurity of,for & by cloud
Security of,for & by cloud
 
Trend Micro - 13martie2012
Trend Micro - 13martie2012Trend Micro - 13martie2012
Trend Micro - 13martie2012
 
Rogers eBook Security
Rogers eBook SecurityRogers eBook Security
Rogers eBook Security
 
7 Things Every Ceo Should Know About Information Security
7 Things Every Ceo Should Know About Information Security7 Things Every Ceo Should Know About Information Security
7 Things Every Ceo Should Know About Information Security
 
Trend Micro - Virtualization and Security Compliance
Trend Micro - Virtualization and Security Compliance Trend Micro - Virtualization and Security Compliance
Trend Micro - Virtualization and Security Compliance
 
WP82 Physical Security in Mission Critical Facilities
WP82   Physical Security in Mission Critical FacilitiesWP82   Physical Security in Mission Critical Facilities
WP82 Physical Security in Mission Critical Facilities
 
Symantec_2004_AnnualReport
Symantec_2004_AnnualReportSymantec_2004_AnnualReport
Symantec_2004_AnnualReport
 
Information Security Shake-Up
Information Security Shake-Up  Information Security Shake-Up
Information Security Shake-Up
 
IBM per la sicurezza del Datacenter
IBM per la sicurezza del DatacenterIBM per la sicurezza del Datacenter
IBM per la sicurezza del Datacenter
 

Similar to CRTC Cloud Security- Jeff Crume

DSS ITSEC CONFERENCE - Q1 Labs - Intelligent network security - next genera...
DSS   ITSEC CONFERENCE - Q1 Labs - Intelligent network security - next genera...DSS   ITSEC CONFERENCE - Q1 Labs - Intelligent network security - next genera...
DSS ITSEC CONFERENCE - Q1 Labs - Intelligent network security - next genera...
Andris Soroka
 
Deepsecurity & VDI beveiliging, maximale beveiliging en optimale performance
Deepsecurity & VDI beveiliging, maximale beveiliging en optimale performanceDeepsecurity & VDI beveiliging, maximale beveiliging en optimale performance
Deepsecurity & VDI beveiliging, maximale beveiliging en optimale performance
UNIT4 IT Solutions
 
Best Practices for Cloud Security
Best Practices for Cloud SecurityBest Practices for Cloud Security
Best Practices for Cloud Security
IT@Intel
 
Presentation crafting your active security management strategy 3 keys and 4...
Presentation   crafting your active security management strategy 3 keys and 4...Presentation   crafting your active security management strategy 3 keys and 4...
Presentation crafting your active security management strategy 3 keys and 4...xKinAnx
 
Becoming the safe choice for the cloud by addressing cloud fraud & security t...
Becoming the safe choice for the cloud by addressing cloud fraud & security t...Becoming the safe choice for the cloud by addressing cloud fraud & security t...
Becoming the safe choice for the cloud by addressing cloud fraud & security t...
cVidya Networks
 
What customers want the cloud to be - Jason Waxman GM at Intel, Cloud Slam 20...
What customers want the cloud to be - Jason Waxman GM at Intel, Cloud Slam 20...What customers want the cloud to be - Jason Waxman GM at Intel, Cloud Slam 20...
What customers want the cloud to be - Jason Waxman GM at Intel, Cloud Slam 20...
Khazret Sapenov
 
Trend micro - Your journey to the cloud, where are you
Trend micro - Your journey to the cloud, where are youTrend micro - Your journey to the cloud, where are you
Trend micro - Your journey to the cloud, where are you
Global Business Events
 
Secure Your Virtualized Environment. Protection from Advanced Persistent Thre...
Secure Your Virtualized Environment. Protection from Advanced Persistent Thre...Secure Your Virtualized Environment. Protection from Advanced Persistent Thre...
Secure Your Virtualized Environment. Protection from Advanced Persistent Thre...
Acrodex
 
Protecting Data in the Cloud
Protecting Data in the CloudProtecting Data in the Cloud
Protecting Data in the Cloud
Neil Readshaw
 
Building a Strong Foundation for Your Cloud with Identity Management
Building a Strong Foundation for Your Cloud with Identity ManagementBuilding a Strong Foundation for Your Cloud with Identity Management
Building a Strong Foundation for Your Cloud with Identity Management
Nishant Kaushik
 
Introduction - Trend Micro Deep Security
Introduction - Trend Micro Deep SecurityIntroduction - Trend Micro Deep Security
Introduction - Trend Micro Deep Security
Andrew Wong
 
Od webcast-cloud-fraud final
Od webcast-cloud-fraud finalOd webcast-cloud-fraud final
Od webcast-cloud-fraud finalOracleIDM
 
Who owns security in the cloud
Who owns security in the cloudWho owns security in the cloud
Who owns security in the cloudTrend Micro
 
Out With the Old, In With the New – Reinvent and Justify Your 2013 Security S...
Out With the Old, In With the New – Reinvent and Justify Your 2013 Security S...Out With the Old, In With the New – Reinvent and Justify Your 2013 Security S...
Out With the Old, In With the New – Reinvent and Justify Your 2013 Security S...
Skybox Security
 
Sw keynote
Sw keynoteSw keynote
Sw keynote
gueste69f645
 
Peering Through the Cloud Forrester EMEA 2010
Peering Through the Cloud Forrester EMEA 2010Peering Through the Cloud Forrester EMEA 2010
Peering Through the Cloud Forrester EMEA 2010
graywilliams
 
Cloud Security: Perception Vs. Reality
Cloud Security: Perception Vs. RealityCloud Security: Perception Vs. Reality
Cloud Security: Perception Vs. Reality
Internap
 
Security Patterns How To Make Security Arch Easy To Consume
Security Patterns   How To Make Security Arch Easy To ConsumeSecurity Patterns   How To Make Security Arch Easy To Consume
Security Patterns How To Make Security Arch Easy To Consume
Jeff Johnson
 
Oracle security-formula
Oracle security-formulaOracle security-formula
Oracle security-formulaOracleIDM
 

Similar to CRTC Cloud Security- Jeff Crume (20)

DSS ITSEC CONFERENCE - Q1 Labs - Intelligent network security - next genera...
DSS   ITSEC CONFERENCE - Q1 Labs - Intelligent network security - next genera...DSS   ITSEC CONFERENCE - Q1 Labs - Intelligent network security - next genera...
DSS ITSEC CONFERENCE - Q1 Labs - Intelligent network security - next genera...
 
Deepsecurity & VDI beveiliging, maximale beveiliging en optimale performance
Deepsecurity & VDI beveiliging, maximale beveiliging en optimale performanceDeepsecurity & VDI beveiliging, maximale beveiliging en optimale performance
Deepsecurity & VDI beveiliging, maximale beveiliging en optimale performance
 
Best Practices for Cloud Security
Best Practices for Cloud SecurityBest Practices for Cloud Security
Best Practices for Cloud Security
 
Presentation crafting your active security management strategy 3 keys and 4...
Presentation   crafting your active security management strategy 3 keys and 4...Presentation   crafting your active security management strategy 3 keys and 4...
Presentation crafting your active security management strategy 3 keys and 4...
 
Stream 3 - Cloud Computing
Stream 3 - Cloud ComputingStream 3 - Cloud Computing
Stream 3 - Cloud Computing
 
Becoming the safe choice for the cloud by addressing cloud fraud & security t...
Becoming the safe choice for the cloud by addressing cloud fraud & security t...Becoming the safe choice for the cloud by addressing cloud fraud & security t...
Becoming the safe choice for the cloud by addressing cloud fraud & security t...
 
What customers want the cloud to be - Jason Waxman GM at Intel, Cloud Slam 20...
What customers want the cloud to be - Jason Waxman GM at Intel, Cloud Slam 20...What customers want the cloud to be - Jason Waxman GM at Intel, Cloud Slam 20...
What customers want the cloud to be - Jason Waxman GM at Intel, Cloud Slam 20...
 
Trend micro - Your journey to the cloud, where are you
Trend micro - Your journey to the cloud, where are youTrend micro - Your journey to the cloud, where are you
Trend micro - Your journey to the cloud, where are you
 
Secure Your Virtualized Environment. Protection from Advanced Persistent Thre...
Secure Your Virtualized Environment. Protection from Advanced Persistent Thre...Secure Your Virtualized Environment. Protection from Advanced Persistent Thre...
Secure Your Virtualized Environment. Protection from Advanced Persistent Thre...
 
Protecting Data in the Cloud
Protecting Data in the CloudProtecting Data in the Cloud
Protecting Data in the Cloud
 
Building a Strong Foundation for Your Cloud with Identity Management
Building a Strong Foundation for Your Cloud with Identity ManagementBuilding a Strong Foundation for Your Cloud with Identity Management
Building a Strong Foundation for Your Cloud with Identity Management
 
Introduction - Trend Micro Deep Security
Introduction - Trend Micro Deep SecurityIntroduction - Trend Micro Deep Security
Introduction - Trend Micro Deep Security
 
Od webcast-cloud-fraud final
Od webcast-cloud-fraud finalOd webcast-cloud-fraud final
Od webcast-cloud-fraud final
 
Who owns security in the cloud
Who owns security in the cloudWho owns security in the cloud
Who owns security in the cloud
 
Out With the Old, In With the New – Reinvent and Justify Your 2013 Security S...
Out With the Old, In With the New – Reinvent and Justify Your 2013 Security S...Out With the Old, In With the New – Reinvent and Justify Your 2013 Security S...
Out With the Old, In With the New – Reinvent and Justify Your 2013 Security S...
 
Sw keynote
Sw keynoteSw keynote
Sw keynote
 
Peering Through the Cloud Forrester EMEA 2010
Peering Through the Cloud Forrester EMEA 2010Peering Through the Cloud Forrester EMEA 2010
Peering Through the Cloud Forrester EMEA 2010
 
Cloud Security: Perception Vs. Reality
Cloud Security: Perception Vs. RealityCloud Security: Perception Vs. Reality
Cloud Security: Perception Vs. Reality
 
Security Patterns How To Make Security Arch Easy To Consume
Security Patterns   How To Make Security Arch Easy To ConsumeSecurity Patterns   How To Make Security Arch Easy To Consume
Security Patterns How To Make Security Arch Easy To Consume
 
Oracle security-formula
Oracle security-formulaOracle security-formula
Oracle security-formula
 

CRTC Cloud Security- Jeff Crume

  • 1. Security Considerations in the Cloud Jeff Crume Distinguished Engineer crume@us.ibm.com http://extranet.lotus.com/crume © 2011 IBM Corporation
  • 2. Security and Cloud Computing Security Remains the Top Concern for Cloud Adoption 80% Of enterprises consider security “How can we be assured that our data will not be leaked and that the vendors have the the #1 inhibitor to cloud adoptions technology and the governance to control its employees from stealing data?” 48% Of enterprises are concerned “Security is the biggest concern. I don’t worry much about the other “-ities” – reliability, about the reliability of clouds availability, etc.” 33% “I prefer internal cloud to IaaS. When the service is kept internally, I am more Of respondents are concerned with comfortable with the security that it offers.” cloud interfering with their ability to comply with regulations Source: Driving Profitable Growth Through Cloud Computing, IBM Study (conducted by Oliver Wyman) 2 © 2011 IBM Corporation
  • 3. Security and Cloud Computing One-size does not fit-all: Different cloud workloads have different risk profiles High Mission-critical workloads, personal Tomorrow’s high value / information high risk workloads need: ● Quality of protection adapted to risk ● Direct visibility and control Need for Analysis & ● Significant level of Security simulation with assurance public data Assurance Today’s clouds are primarily here: ● Lower risk workloads Training, testing ● One-size-fits-all with non- approach to data sensitive data protection ● No significant Low assurance ● Price is key Low-risk Mid-risk High-risk Business Risk 3 © 2011 IBM Corporation
  • 4. Security and Cloud Computing Simple Example Today’s Data Center Tomorrow’s Public Cloud ? ? ? ? ? We Have Control ? Who Has Control? It’s located at X. Where is it located? It’s stored in server’s Y, Z. Where is it stored? We have backups in place. Who backs it up? Our admins control access. Who has access? Our uptime is sufficient. How resilient is it? The auditors are happy. How do auditors observe? Our security team is engaged. How does our security team engage? 4 © 2011 IBM Corporation
  • 5. Security and Cloud Computing Categories of Cloud Computing Risks Control Data Many companies and governments Migrating workloads to a shared are uncomfortable with the idea of network and compute infrastructure their information located on increases the potential for systems they do not control. unauthorized exposure. Providers must offer a high degree Authentication and access of security transparency to help technologies become put customers at ease. Reliability increasingly important. High availability will be a key concern. IT departments will worry about a loss of service should outages occur. Mission critical applications may not run in the cloud Compliance without strong availability Complying with SOX, HIPAA guarantees. Security Management and other regulations may Even the simplest of tasks may be prohibit the use of clouds for behind layers of abstraction or some applications. performed by someone else. Comprehensive auditing Providers must supply easy controls to capabilities are essential. manage security settings for application and runtime environments. 5 © 2011 IBM Corporation
  • 6. Security and Cloud Computing Cloud Security = Traditional Security + SOA Security + Virtualization Security • Hypervisor Security • Rogue VMs, VM Isolation, Data Leakage, Rootkits, etc. • Federated Identity Mgmt • Fed Prov/De-prov, Fed SSO • Privileged Identity Mgmt • Regulatory Compliance • Audit, Data Residency • Patch Mgmt • Across multiple VMs • Data Protection • Encryption, Data Segregation, DLP 6 © 2011 IBM Corporation
  • 7. Security and Cloud Computing Additional Information 7 © 2011 IBM Corporation
  • 8. Security and Cloud Computing Example for Securing the Virtualized Runtime: IBM Security Virtual Server Protection for VMware vSphere 4 VMsafe Integration Firewall and Intrusion Prevention Rootkit Detection / Prevention Inter-VM Traffic Analysis Automated Protection for Mobile VMs (VMotion) Virtual Network Segment Protection Virtual Network-Level Protection Virtual Infrastructure Auditing (Privileged User) Virtual Network Access Control ••There have been 100 vulnerabilities disclosed across all of There have been 100 vulnerabilities disclosed across all of VMware’s virtualization products since 1999.* VMware’s virtualization products since 1999.* ••57% of the vulnerabilities discovered in VMware products are 57% of the vulnerabilities discovered in VMware products are remotely accessible, while 46% are high risk vulnerabilities.* remotely accessible, while 46% are high risk vulnerabilities.* 8 © 2011 IBM Corporation
  • 9. Security and Cloud Computing IBM Cloud Security Guidance document Based on cross-IBM research and customer interaction on cloud security Highlights a series of best practice controls that should be implemented Broken into 7 critical infrastructure components: – Building a Security Program – Confidential Data Protection – Implementing Strong Access and Identity – Application Provisioning and De-provisioning – Governance Audit Management – Vulnerability Management – Testing and Validation 9 © 2011 IBM Corporation
  • 10. Security and Cloud Computing Cloud Security Whitepaper Trust needs to be achieved, especially when data is stored in new ways and in new locations, including for example different countries. This paper is provided to stimulate discussion by looking at three areas: • What is different about cloud? • What are the new security challenges cloud introduces? • What can be done and what should be considered further? 10 © 2011 IBM Corporation
  • 11. Security and Cloud Computing 11 © 2011 IBM Corporation
  • 12. Security and Cloud Computing Thank you! For more information, please visit: ibm.com/cloud Ibm.com/security 12 © 2011 IBM Corporation