SlideShare a Scribd company logo
Extending Security in the Cloud
       Steven Wolford                      Chad Walter
Director, Information Security   Director, Channel Development
            6fusion                     Network Box USA
Today’s Agenda


•   Introduction
•   IT Infrastructure Models
•   Common Cloud Security Myths
•   Cloud Security Basics
•   Cloud Security Challenges
    •   Access
    •   Protection
    •   Segregation
    •   Recovery
• Cloud Security Best Practices
Who We Are

                  6fusion                                    Network Box USA
6fusion provides a utility-metered cloud             Network Box USA provides
platform that enables global workload                comprehensive, fully managed perimeter
distribution by turning public, private and          internet security solutions. The Network Box
hybrid clouds into pay-per-use billable utilities.   Unified Threat Management (UTM) solution
The unique metering algorithm, Workload              combines numerous applications such as
Allocation Cube (WAC), creates a commercial          firewall, intrusion prevention and
standard to quantify supply and demand for           detection, anti-virus, content filtering, anti-
compute resources.                                   span, anti-phishing, anti-spyware and VPN into
                                                     one single, sophisticated mix of hardware and
                                                     software. Network Box USA enables
                                                     businesses of all sizes to secure their networks
                                                     easily and cost effectively.




  This is the first in a series of webinars on cloud security. We will let you
     shape the content of the next webinar at the end of this webinar.
IT Infrastructure Models
Cloud Security Myths


• Cloud cannot be secure
    • All Cloud models are not created equal
         - Private, Hybrid, Public
         - IaaS, PaaS, SaaS
    • All Cloud providers are not created equal
         - Look for independent audit reports
• Cloud security is new
    • The security concepts remain unchanged
    • Unfortunately many used network defenses to compensate for
      weak application security
• Cloud requires more effort or tools to be as secure
    • NIST used the existing SP 800-53 and SP 800-37 to develop FedRAMP
    • Oh by the way, Department of Homeland Security recently announced it is moving services
      to a cloud provider that has been reviewed under FedRAMP
• The only reason enterprises move to the cloud is cost
  reduction, reallocation, etc.
    • Security can also be enhanced if you incorporate the following in your migration
        - Security by Design, Active Monitoring, Incident Response Plan
A Quick Cloud Analogy
Your data happily in the cloud



      Procurement
                     PII
 Financial
          Email
               Payroll
         HR                       An incident
                                  beyond yourYour data no longer just in the cloud
                                 control occurs




                                                                       Payroll    PII
                                                               Email
                                               Procurement                  Financial
                                                                       HR
Data Loss in Summary

                                          To an            Resulting in
     Data             Can Leak
                                         Outsider            Breach
• Trade Secrets     • Stored on the    • Thieves,         • Company
• Account             network or         mobsters,          defamation
  Numbers             shared drives      other            • Monetary
• Social Security   • Copied on          nefarious          expense per
  Numbers             removable          characters         record lost
• Intellectual        media            • Competitors      • Loss of assets
  Property          • Transferred      • Regulators       • Breach of
• Health              electronically   • Unauthorized       customer
  Records                                Internal Users     trust
• Other                                • Press/Media
  Personal
  Information
Top Reasons for Data Loss




Hardware
 Failure           Human
  35%               Error
                    28%      Software
       Theft/Mal              Failure
         icious                14%
       Employee
        Action       Virus
          17%         6%
Cloud Security Challenges
        There are a number of security issues associated with cloud
         computing, but data security is arguably the biggest issue.

Main areas of concern specific to data security include:


   Access           Protection          Segregation            Recovery
Access
 Data placed in the cloud are accessed and managed by persons other
       than privileged users within the customer’s organization.



                • What type and level of security checks are
Access            enforced on those individuals?
                • How are those checks enforced?
                • What policies are in place to ensure roles and
                  privileges are enforced?
Protection
     The nature of cloud computing means data can be stored at any
                geographical location at any given time.



                 •   Apart from some cloud service providers such as
                     Amazon who offers their customers the option of
Protection           choosing between different zones in which to store
                     their data, it is uncommon to see a cloud computing
                     service contract where the customer is guaranteed that
                     their data would not be transferred outside a specified
                     region.

                 •   Customers need to be aware that local laws may apply
                     to data held on servers within the cloud, and that it is
                     their responsibility to comply with data protection laws
                     under various jurisdictions worldwide where their data
                     is held.
Segregation
   Data in the cloud is typically stored in a shared environment whereby
    one customer’s data is stored alongside another customer’s data.




                  • While it is difficult to assure data
                    segregation, customers should review the cloud
Segregation         vendor’s architecture to ensure proper data
                    segregation is available and that data leak
                    prevention (DLP) measures are in place.
Recovery
 As with traditional IT systems, unexpected problems can and will occur
                           with cloud computing.



                 • What plan is in place to recover customer’s data
                   in event of a disaster, how long will data
Recovery           restoration take and the impact on business
                   continuity?
Cloud Security Best Practices
•   Ask where data will be kept and enquire the details of data protection laws in
    the relevant jurisdictions.

•   Include clauses in the cloud service contract that your data always belong to
    you, that you can reclaim your data at any time and that your data shall not be
    disclosed to any third party.

•   Make it as hard as possible to gain access to your systems and then to your data
    by implementing two-factor user authentication.

•   Ensure that data is encrypted both ways across the Internet by using, for
    example, mutual SSL. Ensure that data is encrypted when at rest, as well as
    when in motion from one location to another. You, the customer, should have
    control of key materials used for encrypting and decrypting data.

•   Develop good password policies – how they’re created, changed and protected.

•   Seek an independent security audit of the cloud vendor.
Where do you go from here?
Risk-based Framework




                               Establish
Identify




                                           Govern
             Assess




           Loosely based on NIST RMF
Security by DESIGN

• Understand your
  security philosophy
• Know all of the
  components for
  each information
  system
• Implement the
  controls that bring
  risk down to the
  level acceptable to
  your organization
Implement Active MONITORING


• Customers would
  rather hear bad
  news from you than
  from the media
• Mitigation cannot
  happen if you do
  not know adverse
  events are
  occurring
• What, How, Who
Develop a RESPONSE Team and Plan

• Security is not a
  guarantee
• Most events can be
  categorized with
  operational, technic
  al, and legal
  responses planned
• Training and
  awareness are key
Questions?
Thank You!

               Resources                                 What’s next?

FedRAMP                                     2nd Webinar in the Series
   http://www.gsa.gov/portal/category/1
   02371                                    • Timing: Early March
                                            • Topic: How to advance your
Cloud Security Alliance
    https://cloudsecurityalliance.org/
                                                organizational security
                                            • Details: You tell us…
FFIEC (not really cloud but outsourced
    providers)
    http://ithandbook.ffiec.gov/it-           What do you want to hear about in
    booklets/outsourcing-technology-                        the next webinar?
    services/appendix-d-managed-security-
    service-providers.aspx

NIST (SP800-144)
                                             Email us at marketing@6fusion.com
   http://www.nist.gov/customcf/get_pdf.                         with your ideas!
   cfm?pub_id=909494

More Related Content

What's hot

Data Loss Prevention: Challenges, Impacts & Effective Strategies
Data Loss Prevention: Challenges, Impacts & Effective StrategiesData Loss Prevention: Challenges, Impacts & Effective Strategies
Data Loss Prevention: Challenges, Impacts & Effective Strategies
Seccuris Inc.
 
Introducing Data Loss Prevention 14
Introducing Data Loss Prevention 14Introducing Data Loss Prevention 14
Introducing Data Loss Prevention 14
Symantec
 
DLP Executive Overview
DLP Executive OverviewDLP Executive Overview
DLP Executive Overview
Kim Jensen
 
Enterprise API Security & Data Loss Prevention - Intel
Enterprise API Security & Data Loss Prevention - IntelEnterprise API Security & Data Loss Prevention - Intel
Enterprise API Security & Data Loss Prevention - Intel
Intel - API Security & Tokenization
 
Symantec Data Loss Prevention 9
Symantec Data Loss Prevention 9Symantec Data Loss Prevention 9
Symantec Data Loss Prevention 9
Ariel Martin Beliera
 
Nfp Seminar Series Danny November 18 Emerging Technology Challenges And...
Nfp Seminar Series   Danny   November 18   Emerging Technology Challenges And...Nfp Seminar Series   Danny   November 18   Emerging Technology Challenges And...
Nfp Seminar Series Danny November 18 Emerging Technology Challenges And...
Danny Miller
 
Iia 2012 Spring Conference Philly V Final
Iia 2012 Spring Conference Philly V FinalIia 2012 Spring Conference Philly V Final
Iia 2012 Spring Conference Philly V Final
Danny Miller
 
Introduction - The Smart Protection Network
Introduction - The Smart Protection NetworkIntroduction - The Smart Protection Network
Introduction - The Smart Protection Network
Andrew Wong
 
Winkler Cloud, ORCON, and Mobility
Winkler Cloud, ORCON, and MobilityWinkler Cloud, ORCON, and Mobility
Winkler Cloud, ORCON, and Mobility
Vic Winkler
 
Egress Switch Datasheet
Egress Switch Datasheet Egress Switch Datasheet
Egress Switch Datasheet
yonifine
 
Event Presentation: Cyber Security for Industrial Control Systems
Event Presentation: Cyber Security for Industrial Control SystemsEvent Presentation: Cyber Security for Industrial Control Systems
Event Presentation: Cyber Security for Industrial Control Systems
Infonaligy
 
Identity theft in the Cloud and remedies
Identity theft in the Cloud and remediesIdentity theft in the Cloud and remedies
Identity theft in the Cloud and remedies
Giuseppe Paterno'
 
En msft-scrty-cntnt-e book-protectyourdata
En msft-scrty-cntnt-e book-protectyourdataEn msft-scrty-cntnt-e book-protectyourdata
En msft-scrty-cntnt-e book-protectyourdata
Online Business
 
Security Intelligence: Finding and Stopping Attackers with Big Data Analytics
Security Intelligence: Finding and Stopping Attackers with Big Data AnalyticsSecurity Intelligence: Finding and Stopping Attackers with Big Data Analytics
Security Intelligence: Finding and Stopping Attackers with Big Data Analytics
IBM Security
 
One of 2 protect your business
One of 2 protect your businessOne of 2 protect your business
One of 2 protect your business
Management Insights LLC
 
Beware the Firewall My Son: The Jaws That Bite, The Claws That Catch!
Beware the Firewall My Son: The Jaws That Bite, The Claws That Catch!Beware the Firewall My Son: The Jaws That Bite, The Claws That Catch!
Beware the Firewall My Son: The Jaws That Bite, The Claws That Catch!
Michele Chubirka
 
Mergers & Acquisitions security - (ISC)2 Secure Summit DACH
Mergers & Acquisitions security - (ISC)2 Secure Summit DACHMergers & Acquisitions security - (ISC)2 Secure Summit DACH
Mergers & Acquisitions security - (ISC)2 Secure Summit DACH
EQS Group
 
The CISO’s Guide to Data Loss Prevention
The CISO’s Guide to Data Loss PreventionThe CISO’s Guide to Data Loss Prevention
The CISO’s Guide to Data Loss Prevention
Digital Guardian
 
You Give Us The Fire We'll Give'em Hell!
You Give Us The Fire We'll Give'em Hell!You Give Us The Fire We'll Give'em Hell!
You Give Us The Fire We'll Give'em Hell!
wmetcalf
 
DSS ITSEC 2013 Conference 07.11.2013 - For your eyes only - Symantec PGP Re-L...
DSS ITSEC 2013 Conference 07.11.2013 - For your eyes only - Symantec PGP Re-L...DSS ITSEC 2013 Conference 07.11.2013 - For your eyes only - Symantec PGP Re-L...
DSS ITSEC 2013 Conference 07.11.2013 - For your eyes only - Symantec PGP Re-L...
Andris Soroka
 

What's hot (20)

Data Loss Prevention: Challenges, Impacts & Effective Strategies
Data Loss Prevention: Challenges, Impacts & Effective StrategiesData Loss Prevention: Challenges, Impacts & Effective Strategies
Data Loss Prevention: Challenges, Impacts & Effective Strategies
 
Introducing Data Loss Prevention 14
Introducing Data Loss Prevention 14Introducing Data Loss Prevention 14
Introducing Data Loss Prevention 14
 
DLP Executive Overview
DLP Executive OverviewDLP Executive Overview
DLP Executive Overview
 
Enterprise API Security & Data Loss Prevention - Intel
Enterprise API Security & Data Loss Prevention - IntelEnterprise API Security & Data Loss Prevention - Intel
Enterprise API Security & Data Loss Prevention - Intel
 
Symantec Data Loss Prevention 9
Symantec Data Loss Prevention 9Symantec Data Loss Prevention 9
Symantec Data Loss Prevention 9
 
Nfp Seminar Series Danny November 18 Emerging Technology Challenges And...
Nfp Seminar Series   Danny   November 18   Emerging Technology Challenges And...Nfp Seminar Series   Danny   November 18   Emerging Technology Challenges And...
Nfp Seminar Series Danny November 18 Emerging Technology Challenges And...
 
Iia 2012 Spring Conference Philly V Final
Iia 2012 Spring Conference Philly V FinalIia 2012 Spring Conference Philly V Final
Iia 2012 Spring Conference Philly V Final
 
Introduction - The Smart Protection Network
Introduction - The Smart Protection NetworkIntroduction - The Smart Protection Network
Introduction - The Smart Protection Network
 
Winkler Cloud, ORCON, and Mobility
Winkler Cloud, ORCON, and MobilityWinkler Cloud, ORCON, and Mobility
Winkler Cloud, ORCON, and Mobility
 
Egress Switch Datasheet
Egress Switch Datasheet Egress Switch Datasheet
Egress Switch Datasheet
 
Event Presentation: Cyber Security for Industrial Control Systems
Event Presentation: Cyber Security for Industrial Control SystemsEvent Presentation: Cyber Security for Industrial Control Systems
Event Presentation: Cyber Security for Industrial Control Systems
 
Identity theft in the Cloud and remedies
Identity theft in the Cloud and remediesIdentity theft in the Cloud and remedies
Identity theft in the Cloud and remedies
 
En msft-scrty-cntnt-e book-protectyourdata
En msft-scrty-cntnt-e book-protectyourdataEn msft-scrty-cntnt-e book-protectyourdata
En msft-scrty-cntnt-e book-protectyourdata
 
Security Intelligence: Finding and Stopping Attackers with Big Data Analytics
Security Intelligence: Finding and Stopping Attackers with Big Data AnalyticsSecurity Intelligence: Finding and Stopping Attackers with Big Data Analytics
Security Intelligence: Finding and Stopping Attackers with Big Data Analytics
 
One of 2 protect your business
One of 2 protect your businessOne of 2 protect your business
One of 2 protect your business
 
Beware the Firewall My Son: The Jaws That Bite, The Claws That Catch!
Beware the Firewall My Son: The Jaws That Bite, The Claws That Catch!Beware the Firewall My Son: The Jaws That Bite, The Claws That Catch!
Beware the Firewall My Son: The Jaws That Bite, The Claws That Catch!
 
Mergers & Acquisitions security - (ISC)2 Secure Summit DACH
Mergers & Acquisitions security - (ISC)2 Secure Summit DACHMergers & Acquisitions security - (ISC)2 Secure Summit DACH
Mergers & Acquisitions security - (ISC)2 Secure Summit DACH
 
The CISO’s Guide to Data Loss Prevention
The CISO’s Guide to Data Loss PreventionThe CISO’s Guide to Data Loss Prevention
The CISO’s Guide to Data Loss Prevention
 
You Give Us The Fire We'll Give'em Hell!
You Give Us The Fire We'll Give'em Hell!You Give Us The Fire We'll Give'em Hell!
You Give Us The Fire We'll Give'em Hell!
 
DSS ITSEC 2013 Conference 07.11.2013 - For your eyes only - Symantec PGP Re-L...
DSS ITSEC 2013 Conference 07.11.2013 - For your eyes only - Symantec PGP Re-L...DSS ITSEC 2013 Conference 07.11.2013 - For your eyes only - Symantec PGP Re-L...
DSS ITSEC 2013 Conference 07.11.2013 - For your eyes only - Symantec PGP Re-L...
 

Viewers also liked

Cloud Computing Presentation
Cloud Computing PresentationCloud Computing Presentation
Cloud Computing Presentation
JReifman
 
The Zero Trust Model of Information Security
The Zero Trust Model of Information Security The Zero Trust Model of Information Security
The Zero Trust Model of Information Security
Tripwire
 
A Pragmatic Approach to Network Security Across Your Hybrid Cloud Environment
A Pragmatic Approach to Network Security Across Your Hybrid Cloud EnvironmentA Pragmatic Approach to Network Security Across Your Hybrid Cloud Environment
A Pragmatic Approach to Network Security Across Your Hybrid Cloud Environment
AlgoSec
 
AWS Security Fundamentals: Dos and Don’ts
AWS Security Fundamentals: Dos and Don’tsAWS Security Fundamentals: Dos and Don’ts
AWS Security Fundamentals: Dos and Don’ts
AlgoSec
 
Cloud Security Topics: Network Intrusion Detection for Amazon EC2
Cloud Security Topics: Network Intrusion Detection for Amazon EC2Cloud Security Topics: Network Intrusion Detection for Amazon EC2
Cloud Security Topics: Network Intrusion Detection for Amazon EC2
Alert Logic
 
5 Steps to a Zero Trust Network - From Theory to Practice
5 Steps to a Zero Trust Network - From Theory to Practice5 Steps to a Zero Trust Network - From Theory to Practice
5 Steps to a Zero Trust Network - From Theory to Practice
AlgoSec
 
Enterprise Security Architecture for Cyber Security
Enterprise Security Architecture for Cyber SecurityEnterprise Security Architecture for Cyber Security
Enterprise Security Architecture for Cyber Security
The Open Group SA
 

Viewers also liked (7)

Cloud Computing Presentation
Cloud Computing PresentationCloud Computing Presentation
Cloud Computing Presentation
 
The Zero Trust Model of Information Security
The Zero Trust Model of Information Security The Zero Trust Model of Information Security
The Zero Trust Model of Information Security
 
A Pragmatic Approach to Network Security Across Your Hybrid Cloud Environment
A Pragmatic Approach to Network Security Across Your Hybrid Cloud EnvironmentA Pragmatic Approach to Network Security Across Your Hybrid Cloud Environment
A Pragmatic Approach to Network Security Across Your Hybrid Cloud Environment
 
AWS Security Fundamentals: Dos and Don’ts
AWS Security Fundamentals: Dos and Don’tsAWS Security Fundamentals: Dos and Don’ts
AWS Security Fundamentals: Dos and Don’ts
 
Cloud Security Topics: Network Intrusion Detection for Amazon EC2
Cloud Security Topics: Network Intrusion Detection for Amazon EC2Cloud Security Topics: Network Intrusion Detection for Amazon EC2
Cloud Security Topics: Network Intrusion Detection for Amazon EC2
 
5 Steps to a Zero Trust Network - From Theory to Practice
5 Steps to a Zero Trust Network - From Theory to Practice5 Steps to a Zero Trust Network - From Theory to Practice
5 Steps to a Zero Trust Network - From Theory to Practice
 
Enterprise Security Architecture for Cyber Security
Enterprise Security Architecture for Cyber SecurityEnterprise Security Architecture for Cyber Security
Enterprise Security Architecture for Cyber Security
 

Similar to Extending security in the cloud network box - v4

Cloud Security: A matter of trust?
Cloud Security: A matter of trust?Cloud Security: A matter of trust?
Cloud Security: A matter of trust?
Mark Williams
 
Bil Harmer - Myths of Cloud Security Debunked!
Bil Harmer - Myths of Cloud Security Debunked!Bil Harmer - Myths of Cloud Security Debunked!
Bil Harmer - Myths of Cloud Security Debunked!
centralohioissa
 
110307 cloud security requirements gourley
110307 cloud security requirements gourley110307 cloud security requirements gourley
110307 cloud security requirements gourley
GovCloud Network
 
Practical Security for the Cloud
Practical Security for the CloudPractical Security for the Cloud
Practical Security for the Cloud
Chirag Joshi, CISA, CISM, CRISC
 
Security Issues of Cloud Computing
Security Issues of Cloud ComputingSecurity Issues of Cloud Computing
Security Issues of Cloud Computing
Falgun Rathod
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
sahil lalwani
 
MYTHBUSTERS: Can You Secure Payments in the Cloud?
MYTHBUSTERS: Can You Secure Payments in the Cloud?MYTHBUSTERS: Can You Secure Payments in the Cloud?
MYTHBUSTERS: Can You Secure Payments in the Cloud?
Kurt Hagerman
 
IBM Messaging Security - Why securing your environment is important : IBM Int...
IBM Messaging Security - Why securing your environment is important : IBM Int...IBM Messaging Security - Why securing your environment is important : IBM Int...
IBM Messaging Security - Why securing your environment is important : IBM Int...
Leif Davidsen
 
3433 IBM messaging security why securing your environment is important-feb2...
3433   IBM messaging security why securing your environment is important-feb2...3433   IBM messaging security why securing your environment is important-feb2...
3433 IBM messaging security why securing your environment is important-feb2...
Robert Parker
 
Security Considerations When Using Cloud Infrastructure Services.pdf
Security Considerations When Using Cloud Infrastructure Services.pdfSecurity Considerations When Using Cloud Infrastructure Services.pdf
Security Considerations When Using Cloud Infrastructure Services.pdf
Ciente
 
Whitepaper: Security of the Cloud
Whitepaper: Security of the CloudWhitepaper: Security of the Cloud
Whitepaper: Security of the Cloud
CloudSmartz
 
Security of the Cloud
Security of the CloudSecurity of the Cloud
Security of the Cloud
Epoch Universal, Inc.
 
Security in the cloud planning guide
Security in the cloud planning guideSecurity in the cloud planning guide
Security in the cloud planning guide
Yury Chemerkin
 
security and compliance in the cloud
security and compliance in the cloudsecurity and compliance in the cloud
security and compliance in the cloud
Ajay Rathi
 
2012-01 How to Secure a Cloud Identity Roadmap
2012-01 How to Secure a Cloud Identity Roadmap2012-01 How to Secure a Cloud Identity Roadmap
2012-01 How to Secure a Cloud Identity Roadmap
Raleigh ISSA
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
Pyingkodi Maran
 
Risks and Benefits of Cloud Computing
Risks and Benefits of Cloud ComputingRisks and Benefits of Cloud Computing
Risks and Benefits of Cloud Computing
DLA Piper (Canada) LLP
 
Security - A Digital Transformation Enabler
Security - A Digital Transformation EnablerSecurity - A Digital Transformation Enabler
Security - A Digital Transformation Enabler
Alexander Akinjayeju. MSc, CISM, Prince2
 
Cloudy with a chance of downtime
Cloudy with a chance of downtimeCloudy with a chance of downtime
Cloudy with a chance of downtime
AFCOM
 
Can You Trust Cloud Security In Public Cloud?
Can You Trust Cloud Security In Public Cloud?Can You Trust Cloud Security In Public Cloud?
Can You Trust Cloud Security In Public Cloud?
Intelligentia IT Systems Pvt. Ltd.
 

Similar to Extending security in the cloud network box - v4 (20)

Cloud Security: A matter of trust?
Cloud Security: A matter of trust?Cloud Security: A matter of trust?
Cloud Security: A matter of trust?
 
Bil Harmer - Myths of Cloud Security Debunked!
Bil Harmer - Myths of Cloud Security Debunked!Bil Harmer - Myths of Cloud Security Debunked!
Bil Harmer - Myths of Cloud Security Debunked!
 
110307 cloud security requirements gourley
110307 cloud security requirements gourley110307 cloud security requirements gourley
110307 cloud security requirements gourley
 
Practical Security for the Cloud
Practical Security for the CloudPractical Security for the Cloud
Practical Security for the Cloud
 
Security Issues of Cloud Computing
Security Issues of Cloud ComputingSecurity Issues of Cloud Computing
Security Issues of Cloud Computing
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
MYTHBUSTERS: Can You Secure Payments in the Cloud?
MYTHBUSTERS: Can You Secure Payments in the Cloud?MYTHBUSTERS: Can You Secure Payments in the Cloud?
MYTHBUSTERS: Can You Secure Payments in the Cloud?
 
IBM Messaging Security - Why securing your environment is important : IBM Int...
IBM Messaging Security - Why securing your environment is important : IBM Int...IBM Messaging Security - Why securing your environment is important : IBM Int...
IBM Messaging Security - Why securing your environment is important : IBM Int...
 
3433 IBM messaging security why securing your environment is important-feb2...
3433   IBM messaging security why securing your environment is important-feb2...3433   IBM messaging security why securing your environment is important-feb2...
3433 IBM messaging security why securing your environment is important-feb2...
 
Security Considerations When Using Cloud Infrastructure Services.pdf
Security Considerations When Using Cloud Infrastructure Services.pdfSecurity Considerations When Using Cloud Infrastructure Services.pdf
Security Considerations When Using Cloud Infrastructure Services.pdf
 
Whitepaper: Security of the Cloud
Whitepaper: Security of the CloudWhitepaper: Security of the Cloud
Whitepaper: Security of the Cloud
 
Security of the Cloud
Security of the CloudSecurity of the Cloud
Security of the Cloud
 
Security in the cloud planning guide
Security in the cloud planning guideSecurity in the cloud planning guide
Security in the cloud planning guide
 
security and compliance in the cloud
security and compliance in the cloudsecurity and compliance in the cloud
security and compliance in the cloud
 
2012-01 How to Secure a Cloud Identity Roadmap
2012-01 How to Secure a Cloud Identity Roadmap2012-01 How to Secure a Cloud Identity Roadmap
2012-01 How to Secure a Cloud Identity Roadmap
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
 
Risks and Benefits of Cloud Computing
Risks and Benefits of Cloud ComputingRisks and Benefits of Cloud Computing
Risks and Benefits of Cloud Computing
 
Security - A Digital Transformation Enabler
Security - A Digital Transformation EnablerSecurity - A Digital Transformation Enabler
Security - A Digital Transformation Enabler
 
Cloudy with a chance of downtime
Cloudy with a chance of downtimeCloudy with a chance of downtime
Cloudy with a chance of downtime
 
Can You Trust Cloud Security In Public Cloud?
Can You Trust Cloud Security In Public Cloud?Can You Trust Cloud Security In Public Cloud?
Can You Trust Cloud Security In Public Cloud?
 

More from Valencell, Inc.

Changing the Economics of IT
Changing the Economics of ITChanging the Economics of IT
Changing the Economics of IT
Valencell, Inc.
 
Giga om 6fusion webinar iaas marketplaces - final for slideshare
Giga om 6fusion webinar iaas marketplaces - final for slideshareGiga om 6fusion webinar iaas marketplaces - final for slideshare
Giga om 6fusion webinar iaas marketplaces - final for slideshare
Valencell, Inc.
 
2013 cloud it metering survey results
2013 cloud it metering survey results 2013 cloud it metering survey results
2013 cloud it metering survey results
Valencell, Inc.
 
Metered IT - The Path to Utility Computing
Metered IT - The Path to Utility ComputingMetered IT - The Path to Utility Computing
Metered IT - The Path to Utility Computing
Valencell, Inc.
 
Cloud controls final2
Cloud controls final2Cloud controls final2
Cloud controls final2
Valencell, Inc.
 
Considering Backup in the Cloud? Here's What you need to know
Considering Backup in the Cloud? Here's What you need to knowConsidering Backup in the Cloud? Here's What you need to know
Considering Backup in the Cloud? Here's What you need to know
Valencell, Inc.
 
Top 5 Ways the Cloud is Impacting Your IT
Top 5 Ways the Cloud is Impacting Your ITTop 5 Ways the Cloud is Impacting Your IT
Top 5 Ways the Cloud is Impacting Your IT
Valencell, Inc.
 
Utility metered cloud slideshare
Utility metered cloud   slideshareUtility metered cloud   slideshare
Utility metered cloud slideshare
Valencell, Inc.
 

More from Valencell, Inc. (8)

Changing the Economics of IT
Changing the Economics of ITChanging the Economics of IT
Changing the Economics of IT
 
Giga om 6fusion webinar iaas marketplaces - final for slideshare
Giga om 6fusion webinar iaas marketplaces - final for slideshareGiga om 6fusion webinar iaas marketplaces - final for slideshare
Giga om 6fusion webinar iaas marketplaces - final for slideshare
 
2013 cloud it metering survey results
2013 cloud it metering survey results 2013 cloud it metering survey results
2013 cloud it metering survey results
 
Metered IT - The Path to Utility Computing
Metered IT - The Path to Utility ComputingMetered IT - The Path to Utility Computing
Metered IT - The Path to Utility Computing
 
Cloud controls final2
Cloud controls final2Cloud controls final2
Cloud controls final2
 
Considering Backup in the Cloud? Here's What you need to know
Considering Backup in the Cloud? Here's What you need to knowConsidering Backup in the Cloud? Here's What you need to know
Considering Backup in the Cloud? Here's What you need to know
 
Top 5 Ways the Cloud is Impacting Your IT
Top 5 Ways the Cloud is Impacting Your ITTop 5 Ways the Cloud is Impacting Your IT
Top 5 Ways the Cloud is Impacting Your IT
 
Utility metered cloud slideshare
Utility metered cloud   slideshareUtility metered cloud   slideshare
Utility metered cloud slideshare
 

Extending security in the cloud network box - v4

  • 1. Extending Security in the Cloud Steven Wolford Chad Walter Director, Information Security Director, Channel Development 6fusion Network Box USA
  • 2. Today’s Agenda • Introduction • IT Infrastructure Models • Common Cloud Security Myths • Cloud Security Basics • Cloud Security Challenges • Access • Protection • Segregation • Recovery • Cloud Security Best Practices
  • 3. Who We Are 6fusion Network Box USA 6fusion provides a utility-metered cloud Network Box USA provides platform that enables global workload comprehensive, fully managed perimeter distribution by turning public, private and internet security solutions. The Network Box hybrid clouds into pay-per-use billable utilities. Unified Threat Management (UTM) solution The unique metering algorithm, Workload combines numerous applications such as Allocation Cube (WAC), creates a commercial firewall, intrusion prevention and standard to quantify supply and demand for detection, anti-virus, content filtering, anti- compute resources. span, anti-phishing, anti-spyware and VPN into one single, sophisticated mix of hardware and software. Network Box USA enables businesses of all sizes to secure their networks easily and cost effectively. This is the first in a series of webinars on cloud security. We will let you shape the content of the next webinar at the end of this webinar.
  • 5. Cloud Security Myths • Cloud cannot be secure • All Cloud models are not created equal - Private, Hybrid, Public - IaaS, PaaS, SaaS • All Cloud providers are not created equal - Look for independent audit reports • Cloud security is new • The security concepts remain unchanged • Unfortunately many used network defenses to compensate for weak application security • Cloud requires more effort or tools to be as secure • NIST used the existing SP 800-53 and SP 800-37 to develop FedRAMP • Oh by the way, Department of Homeland Security recently announced it is moving services to a cloud provider that has been reviewed under FedRAMP • The only reason enterprises move to the cloud is cost reduction, reallocation, etc. • Security can also be enhanced if you incorporate the following in your migration - Security by Design, Active Monitoring, Incident Response Plan
  • 6. A Quick Cloud Analogy Your data happily in the cloud Procurement PII Financial Email Payroll HR An incident beyond yourYour data no longer just in the cloud control occurs Payroll PII Email Procurement Financial HR
  • 7. Data Loss in Summary To an Resulting in Data Can Leak Outsider Breach • Trade Secrets • Stored on the • Thieves, • Company • Account network or mobsters, defamation Numbers shared drives other • Monetary • Social Security • Copied on nefarious expense per Numbers removable characters record lost • Intellectual media • Competitors • Loss of assets Property • Transferred • Regulators • Breach of • Health electronically • Unauthorized customer Records Internal Users trust • Other • Press/Media Personal Information
  • 8. Top Reasons for Data Loss Hardware Failure Human 35% Error 28% Software Theft/Mal Failure icious 14% Employee Action Virus 17% 6%
  • 9. Cloud Security Challenges There are a number of security issues associated with cloud computing, but data security is arguably the biggest issue. Main areas of concern specific to data security include: Access Protection Segregation Recovery
  • 10. Access Data placed in the cloud are accessed and managed by persons other than privileged users within the customer’s organization. • What type and level of security checks are Access enforced on those individuals? • How are those checks enforced? • What policies are in place to ensure roles and privileges are enforced?
  • 11. Protection The nature of cloud computing means data can be stored at any geographical location at any given time. • Apart from some cloud service providers such as Amazon who offers their customers the option of Protection choosing between different zones in which to store their data, it is uncommon to see a cloud computing service contract where the customer is guaranteed that their data would not be transferred outside a specified region. • Customers need to be aware that local laws may apply to data held on servers within the cloud, and that it is their responsibility to comply with data protection laws under various jurisdictions worldwide where their data is held.
  • 12. Segregation Data in the cloud is typically stored in a shared environment whereby one customer’s data is stored alongside another customer’s data. • While it is difficult to assure data segregation, customers should review the cloud Segregation vendor’s architecture to ensure proper data segregation is available and that data leak prevention (DLP) measures are in place.
  • 13. Recovery As with traditional IT systems, unexpected problems can and will occur with cloud computing. • What plan is in place to recover customer’s data in event of a disaster, how long will data Recovery restoration take and the impact on business continuity?
  • 14. Cloud Security Best Practices • Ask where data will be kept and enquire the details of data protection laws in the relevant jurisdictions. • Include clauses in the cloud service contract that your data always belong to you, that you can reclaim your data at any time and that your data shall not be disclosed to any third party. • Make it as hard as possible to gain access to your systems and then to your data by implementing two-factor user authentication. • Ensure that data is encrypted both ways across the Internet by using, for example, mutual SSL. Ensure that data is encrypted when at rest, as well as when in motion from one location to another. You, the customer, should have control of key materials used for encrypting and decrypting data. • Develop good password policies – how they’re created, changed and protected. • Seek an independent security audit of the cloud vendor.
  • 15. Where do you go from here?
  • 16. Risk-based Framework Establish Identify Govern Assess Loosely based on NIST RMF
  • 17. Security by DESIGN • Understand your security philosophy • Know all of the components for each information system • Implement the controls that bring risk down to the level acceptable to your organization
  • 18. Implement Active MONITORING • Customers would rather hear bad news from you than from the media • Mitigation cannot happen if you do not know adverse events are occurring • What, How, Who
  • 19. Develop a RESPONSE Team and Plan • Security is not a guarantee • Most events can be categorized with operational, technic al, and legal responses planned • Training and awareness are key
  • 21. Thank You! Resources What’s next? FedRAMP 2nd Webinar in the Series http://www.gsa.gov/portal/category/1 02371 • Timing: Early March • Topic: How to advance your Cloud Security Alliance https://cloudsecurityalliance.org/ organizational security • Details: You tell us… FFIEC (not really cloud but outsourced providers) http://ithandbook.ffiec.gov/it- What do you want to hear about in booklets/outsourcing-technology- the next webinar? services/appendix-d-managed-security- service-providers.aspx NIST (SP800-144) Email us at marketing@6fusion.com http://www.nist.gov/customcf/get_pdf. with your ideas! cfm?pub_id=909494

Editor's Notes

  1. Embrace a secure-by-design approach: IT organizations need to focus on identifying controls that address the lack of direct access to information. Taking an approach that is secure by design forms the foundation of the organizations strategy for entering the cloud and allows the organization to consistently approach security needs based on the workloads and granular data represented in their cloud efforts. This also facilitates the implementation of resiliency and audit capabilities in the cloud, allowing organizations to extend their security philosophy into the cloud.
  2. Embrace a secure-by-design approach: IT organizations need to focus on identifying controls that address the lack of direct access to information. Taking an approach that is secure by design forms the foundation of the organizations strategy for entering the cloud and allows the organization to consistently approach security needs based on the workloads and granular data represented in their cloud efforts. This also facilitates the implementation of resiliency and audit capabilities in the cloud, allowing organizations to extend their security philosophy into the cloud.
  3. Implement an active monitoring solution: For organizations to address availability or instability conditions they must implement an active monitoring solution, failure to do so relies on cues from users which could result in damages ranging from poor customer satisfaction, to loss of customers. Organizations need to make determinations as to the monitoring and intervals based on data content and should implement manual or automated procedures to respond to related events.
  4. Develop a plan and educate the response team: A large element of security is the response to threats and how rapidly an organization can respond to threats and adverse events. Organizations should document logical responses to event classes and implement education programs to facilitate response to said conditions.