SlideShare a Scribd company logo
1 of 8
Download to read offline
How does IBM deliver
cloud security?
An IBM paper covering SmartCloud Services1
2   How does IBM deliver cloud security?




Contents                                                            In delivering security for its cloud offerings, IBM looks to and
                                                                    relies upon its strong security heritage and expertise. IBM has
	 2	 Introduction                                                   more than 6,000 security engineers and consultants around the
	 3	 Cloud governance                                               world, designing, building and running security solutions for
                                                                    its customers and helping them address their challenges in this
	 3	 Security governance, risk management and compliance            space. It has a portfolio of more than 3,000 security patents,
	 4	 Problem and information security incident management           with 100 new patents in 2011 alone. IBM also has the largest
                                                                    vulnerability database in the industry and manages over 13
	 4	 Identity and access management                                 billion security related events every day for existing customers.
	 5	
    Discover, categorise, and protect data and
    information assets
                                                                  IBM’s security strategy is based on the IBM Security Framework2,
                                                                    IBM provides security solutions that span this framework and
	 5	 System acquisitions, development and maintenance               works with organisations to take a holistic and risk-based
	 6	 Secure infrastructure against threats and vulnerabilities      approach to security. IBM has extensive experience of delivering
                                                                    in an outsourced and managed services environment and of
	 6	 Physical and personnel security                                having those services internally and externally audited to
                                                                    recognised industry standards.
	 7	 Summary

	 7	 Author                                                         The approach IBM takes to delivering cloud services to its
                                                                    customers is anchored in the IBM Security Framework and
                                                                    the associated IBM Security Blueprint. By using this proven
                                                                    framework and blueprint approach, we have created a set of
Introduction                                                        foundational controls specific to cloud. These Cloud Security
Cloud computing is changing the way we use computing                Foundation Controls have been developed from the foundational
and has the potential for significant economic and efficiency       security management layer of the blueprint and are used to
benefits. But the speed of adoption depends on how quickly          communicate with customers, partners and other stakeholders
trust in new cloud models can be established. Some of the           about how we approach security in our cloud models.
growing cloud security concerns include: security of highly
virtualised environments from targeted threats and attacks,         In this paper we present some of the measures that we
enabling secure collaboration, protection of the data (isolation,   take in relation to these foundational controls. This paper
sharing) in a rapid provisioning and de-provisioning environment    is not intended to be exhaustive and does not describe every
while experiencing the loss of direct control of security           procedure and technical detail for each cloud offering.
compliance, and privacy parameters.

In order to build this trust, IBM has written this paper
to enable discussion around the new security challenges
cloud introduces and how these are addressed by IBM’s
cloud offerings. We highlight the approach IBM takes to
secure cloud services delivered from IBM delivery centres.
SmartCloud   3




1. Cloud governance                                                   2. Security governance, risk management
Governance, risk and compliance are common issues raised              and compliance
by stakeholders. IBM has many managed services operations             As a large enterprise and a service provider, our cloud solutions
in countries around the globe. IBM’s cloud governance builds          reflect our understanding of organisational needs. We have a
on that extensive IBM governance structure. We recognise              robust security compliance programme that has governance
that taking advantage of cloud requires new considerations for        over IBM internal security policies, standards and processes.
governance and that there are important questions about how
data will be managed in the cloud. In order to assist transparency,   •	   IBM has an Information Technology (IT) Security Compliance
IBM aligns its approach to recognised industry standards.                  management system which entails adherence to predefined
                                                                           requirements. These include physical access controls, logical
•	   IBM has internal security policies, standards and processes           access controls (including user ID administration) and security
     consistent with the ISO 27001 framework and control areas.            health checking. Our internal and external audit partners
     In our delivery organisation we also regularly submit these           regularly review these controls.
     policies, standards and processes to both internal audits and    •	   Our processes and controls have evolved through thousands
     external certifications.                                              of engagements around outsourcing, hosting and other
•	   IBM also maintains many industry related certifications               services. They have been further developed with the aim
     such as ISO 9001, ISO 20000 and CMMI across many data                 of meeting the needs of cloud environments.
     centres. For example a customer using SmartCloud Services
     from IBM’s data centre in Ehningen, Germany can expect           We have incorporated governance and risk management best
     that it has both ISO 27001 and ISAE3402 covering the             practices and lessons learned through implementing our own
     physical controls.                                               cloud solutions and building solutions for other large enterprise
                                                                      customers – and applied them to our cloud offerings.
IBM has a comprehensive Service Organisation Controls
(SOC) reporting programme and is undergoing several                   IBM has extensive experience designing and delivering in
SSAE16 or equivalent audits covering many IT services and             multi-tenant environments. Security governance has also
associated controls, from managed services delivery through           been enabled through the way we design, build and deliver
to managed security services. We continue to develop this             solutions guided by an approach called, ‘Secure by Design’.
external auditing approach to cover our cloud services as they
evolve and to stay in line with the standards’ requirements.
4    How does IBM deliver cloud security?




3. Problem and information security                                   4. Identity and access management
incident management                                                   To ensure that only those who need to access cloud
In the event of a problem or incident occurring in the cloud,         environments do so, IBM has developed processes to
formal response processes, aligned to the overall IBM                 ensure that access is tightly controlled. IBM maintains
Corporate Incident Management Processes, are executed and             robust access control and privileged user monitoring to
records retained. IBM has extensive experience of environments        ensure enforcement and compliance regarding access to
with shared users and incident management is handled to best          customer content and information.
efforts to ensure that customers and their data are protected.
                                                                      •	   Access to any system managed by IBM begins with a
•	   IBM has documented policies and procedures relating to the            formal access request and management approval process.
     management and monitoring of security events within its               Once approved, access is revalidated on a periodic basis,
     offerings and infrastructure, including policies on escalation        at least annually, to ensure users still require the level of
     and resolution of incidents.                                          access they have been granted. Systems are also in place
•	   In order to maintain the integrity of these security policies         to ensure that those who leave IBM have their access
     and procedures, and thereby protect our customers, these              rights removed.
     policies are not divulged outside IBM. Procedures are,           •	   IBM Administrators of the cloud have to authenticate to
     however, subjected to internal and external audits on a               the management environment and to the management tools
     regular basis.                                                        in order to gain access to functionality. These activities
                                                                           are monitored and logged to prevent unauthorized access
In the case of a security event, IBM will evaluate the                     to customer virtual environments.
situation, and where an issue has a material impact on a              •	   All customer content managed by IBM is strictly
customer, will notify them of such incidents. IBM also                     controlled and actively monitored. Only those personnel
protects its infrastructure by shutting down instances that                with appropriate authorisation from IBM Corporation
violate acceptable use policy. In addition, IBM has put in                 have access to host management systems.
place log-management of its infrastructure, including network
traffic and administrative functions, to ensure issues can be
investigated. IBM customers can be assured that the cloud
infrastructure monitoring does not capture or retain logs of
customer data, other than metadata.
SmartCloud   5




5. Discover, categorise, and protect data                             Governments have long had the authority to request access
and information assets                                                to data for law enforcement and national security reasons
One often cited concern about cloud is that it places data            and such a request can extend to any company doing business
in new and different places. This applies not just to the user        within that country, regardless of where the company is based
data, but also to the application (source) code.                      or where the data is stored.


IBM has invested in cloud data centres in geographic regions          IBM will thoroughly evaluate its obligations in order to
across the globe with customers able to specify the cloud data        provide the minimum data necessary to comply with legal
centre location they wish to use. Mechanisms for protecting           requests, from governmental authorities for access to data.
data, such as encryption, may also be possible.
                                                                      IBM recommends that customers review the legal and business
•	   We have enabled customers to configure encryption – for          requirements relative to their data and works with them to
     example, of persistent storage – within their guest workloads.   architect solutions that meet their privacy and security needs.
     Customers retain key management responsibility to support
     the security of these processes.                                 6. System acquisitions, development
•	   Encryption can also be built into some applications deployed     and maintenance
     on our cloud services, for example IBM DB2® can encrypt          Ensuring that the systems are built with security controls in
     local databases and support the encryption of customer           mind, and that these controls are maintained throughout the
     information. For some solutions this can also be achieved        operation of the system, is not a new concept to IBM.
     at the file system level.
•	   At the infrastructure level there are additional controls such   •	   Our extensive experience in managing infrastructure
     as encrypting backup media, protection of data on portable            means that cloud operational processes have been built,
     media, as well as during the disposal of storage devices.             to enable that security is applied to the environment
                                                                           throughout its lifecycle.
Processes are also in place to ensure any media removed from          •	   Hypervisors are Common Criteria certified, for example,
the data centre is encrypted for transport, and securely deleted           VMware ESX, PowerVM® and KVM are EAL 4+ certified.
at the end of its use. In addition, in our standard operating              KVM is deployed on hardened SELinux servers, which
procedures, customer data is not removed from the data centre              provides additional isolation capabilities over KVM itself.
without a customer’s permission.                                      •	   Procedures to maintain the security of the infrastructure
                                                                           such as standard infrastructure patch management for
IBM, as an international company with global customers, has                cloud infrastructure.
substantial experience collecting, storing and working with
personally identifiable information – and it has applied these
rules within its managed infrastructure.
6    How does IBM deliver cloud security?




7. Secure infrastructure against threats                                  8. Physical and personnel security
and vulnerabilities                                                       One concern often raised is where the data is located
Securing any infrastructure requires a defence in depth                   and how it will be controlled in the data centre. IBM cloud
approach and IBM uses a number of different processes                     delivery centres are located within established IBM data
and procedures to protect cloud infrastructures. These                    centres and the company has extensive experience in
are underpinned with people and technology to secure                      managing data centres.
the infrastructure against threats and vulnerabilities.
                                                                          •	   IBM has data centres with strong physical controls including,
•	   The solutions have been designed with isolation built in                  but not limited to, CCTV, biometric authentication mechanisms,
     at different levels – at the network, hypervisor and storage              resiliency tools and door alarms. All IBM personnel undergo
     layers. Management and infrastructure components are                      background checks prior to being hired.
     compartmentalised into security zones based on function,             •	   IBM does allow accompanied visitation of its site facilities by
     data types and access requirements, and storage networks and              its customers, however no persons, other than IBM personnel
     guest networks are physically separated. The zone design,                 and agents working on behalf of IBM, are allowed access to
     as well as network flows, requires formal review and approval             the data centre facilities beyond those areas specified for visitors.
     through architecture governance processes.                                Access to the IBM data centre floor is strictly restricted to
•	   Management infrastructure is regularly scanned for vulnerabilities        authorised IBM personnel only and those permitted to carry
     using industry standard tools and master images are regularly             out work on behalf of the company.
     updated to the latest security fix/patch level.                      •	   IBM requires employees to go through training in the handling
•	   I
     	 ntrusion detection and prevention systems (IDPS) are                    of customer data and to demonstrate understanding of those
     utilised at boundaries to the Internet, IBM employs an                    policies. The IBM business conduct guidelines oversee
     approach that does not rely on signature-based vulnerability              expectations and requirements of employees including the
     detection alone. This capability allows protection against                handling of customer data. All IBM employees are required
     previously unseen threats based on behaviour and not                      to re-certify understanding in these areas on a yearly basis.
     just signatures.
•	   A
     	 ll management systems and underlying infrastructure
     periodically undergo security configuration checking to
     ensure system security settings continue to be configured
     in-line with security standards and policy. Host-based
     firewalls within the customer Virtual Machines (VMs) can,
     and should, also be configured to achieve defence in depth.
SmartCloud    7




Summary                                                            Author
Cloud computing offers new possibilities and new security          Nick Coleman
challenges. These challenges range from governance, through        IBM Global Cloud Security Leader
to securing application and infrastructure. Fundamentally it is    Email: coleman@uk.ibm.com
important to be able to assure the security of these new models    twitter.com/teamsecurity
in order to build trust and confidence.
                                                                   Acknowledgments
IBM has extensive experience of delivering in shared               Neil Readshaw
environments, a common characteristic of cloud. This               IBM Senior Technical Staff Member
experience ranges from managed services, through to
infrastructure as a service and platform as a service.             Martin Borrett
                                                                   Director of the IBM Institute for Advanced Security Europe
This paper introduces IBM’s approach to delivering cloud
security for infrastructure services. However it is not intended   References
to be exhaustive and does not describe every procedure and         1	   IBM SmartCloud Enterprise and Enterprise Plus
technical detail for each cloud offering.                               ibm.com/services/uk/en/cloud-enterprise

The key to establishing trust in these new models is choosing      2	   IBM Security Framework
the right cloud computing model for your organisation, and              www.redbooks.ibm.com/abstracts/redp4528.html
being able to deploy workloads using a delivery model with
the appropriate security controls.

We understand this is not just a technical challenge but a
challenge of governance and compliance, applications and
infrastructure, and assurance.
© Copyright IBM Corporation 2012

IBM United Kingdom Limited
76 Upper Ground
South Bank
London
SE1 9PZ

Produced in the United Kingdom
May 2012
All Rights Reserved

IBM, the IBM logo, ibm.com, DB2 and PowerVM are trademarks or
registered trademarks of International Business Machines Corporation in
the United States, other countries, or both. If these and other IBM
trademarked terms are marked on their first occurrence in this
information with a trademark symbol (® or ™), these symbols indicate
U.S. registered or common law trademarks owned by IBM at
the time this information was published. Such trademarks may also be
registered or common law trademarks in other countries. A current list
of IBM trademarks is available on the Web at “Copyright and trademark
information” at ibm.com/legal/copytrade.shtml

Linux is a registered trademark of Linus Torvalds in the United States,
other countries, or both.

Other company, product and service names may be trademarks or
service marks of others.

References in this publication to IBM products and services do not
imply that IBM intends to make them available in all countries in
which IBM operates.

Information may be changed or updated without notice. IBM may also
make improvements and/or changes in the products, practices and/or the
programmes described in this information at any time without notice.
This paper should not be seen as a contractual agreement or indication of
terms of service.


         Please Recycle




                                                  ITW03004-GBEN-00

More Related Content

What's hot

Defense Foundation Product Brief
Defense Foundation Product BriefDefense Foundation Product Brief
Defense Foundation Product Briefwdjohnson1
 
IRJET-Domain Data Security on Cloud
IRJET-Domain Data Security on CloudIRJET-Domain Data Security on Cloud
IRJET-Domain Data Security on CloudIRJET Journal
 
Arrow ECS IBM Partner Jam - Security Update - Vicki Cooper - IBM
Arrow ECS IBM Partner Jam - Security Update - Vicki Cooper - IBMArrow ECS IBM Partner Jam - Security Update - Vicki Cooper - IBM
Arrow ECS IBM Partner Jam - Security Update - Vicki Cooper - IBMArrow ECS UK
 
Valiente Balancing It SecurityCompliance, Complexity & Cost
Valiente Balancing It SecurityCompliance, Complexity & CostValiente Balancing It SecurityCompliance, Complexity & Cost
Valiente Balancing It SecurityCompliance, Complexity & CostGuardEra Access Solutions, Inc.
 
Extending QRadar’s reach and simplifying incident response with BigFix
Extending QRadar’s reach and simplifying incident response with BigFixExtending QRadar’s reach and simplifying incident response with BigFix
Extending QRadar’s reach and simplifying incident response with BigFixLuigi Delgrosso
 
Centralizing security on the mainframe
Centralizing security on the mainframeCentralizing security on the mainframe
Centralizing security on the mainframeArun Gopinath
 
CyberoamBrochure
CyberoamBrochureCyberoamBrochure
CyberoamBrochureMaliha Ali
 
Security Operation Center - Design & Build
Security Operation Center - Design & BuildSecurity Operation Center - Design & Build
Security Operation Center - Design & BuildSameer Paradia
 
Cio ciso security_strategyv1.1
Cio ciso security_strategyv1.1Cio ciso security_strategyv1.1
Cio ciso security_strategyv1.1Anindya Ghosh,
 
Enterprise Mobile Security
Enterprise Mobile SecurityEnterprise Mobile Security
Enterprise Mobile Securitytbeckwith
 
FROM STRATEGY TO ACTION - Vasil Tsvimitidze
FROM STRATEGY TO ACTION - Vasil Tsvimitidze FROM STRATEGY TO ACTION - Vasil Tsvimitidze
FROM STRATEGY TO ACTION - Vasil Tsvimitidze DataExchangeAgency
 

What's hot (13)

Sw keynote
Sw keynoteSw keynote
Sw keynote
 
Defense Foundation Product Brief
Defense Foundation Product BriefDefense Foundation Product Brief
Defense Foundation Product Brief
 
IRJET-Domain Data Security on Cloud
IRJET-Domain Data Security on CloudIRJET-Domain Data Security on Cloud
IRJET-Domain Data Security on Cloud
 
Arrow ECS IBM Partner Jam - Security Update - Vicki Cooper - IBM
Arrow ECS IBM Partner Jam - Security Update - Vicki Cooper - IBMArrow ECS IBM Partner Jam - Security Update - Vicki Cooper - IBM
Arrow ECS IBM Partner Jam - Security Update - Vicki Cooper - IBM
 
Valiente Balancing It SecurityCompliance, Complexity & Cost
Valiente Balancing It SecurityCompliance, Complexity & CostValiente Balancing It SecurityCompliance, Complexity & Cost
Valiente Balancing It SecurityCompliance, Complexity & Cost
 
Extending QRadar’s reach and simplifying incident response with BigFix
Extending QRadar’s reach and simplifying incident response with BigFixExtending QRadar’s reach and simplifying incident response with BigFix
Extending QRadar’s reach and simplifying incident response with BigFix
 
Centralizing security on the mainframe
Centralizing security on the mainframeCentralizing security on the mainframe
Centralizing security on the mainframe
 
Identity Governance Solutions
Identity Governance SolutionsIdentity Governance Solutions
Identity Governance Solutions
 
CyberoamBrochure
CyberoamBrochureCyberoamBrochure
CyberoamBrochure
 
Security Operation Center - Design & Build
Security Operation Center - Design & BuildSecurity Operation Center - Design & Build
Security Operation Center - Design & Build
 
Cio ciso security_strategyv1.1
Cio ciso security_strategyv1.1Cio ciso security_strategyv1.1
Cio ciso security_strategyv1.1
 
Enterprise Mobile Security
Enterprise Mobile SecurityEnterprise Mobile Security
Enterprise Mobile Security
 
FROM STRATEGY TO ACTION - Vasil Tsvimitidze
FROM STRATEGY TO ACTION - Vasil Tsvimitidze FROM STRATEGY TO ACTION - Vasil Tsvimitidze
FROM STRATEGY TO ACTION - Vasil Tsvimitidze
 

Similar to How Does IBM Deliver Cloud Security Paper

IBM Relay 2015: Securing the Future
IBM Relay 2015: Securing the Future IBM Relay 2015: Securing the Future
IBM Relay 2015: Securing the Future IBM
 
Strategies for assessing cloud security
Strategies for assessing cloud securityStrategies for assessing cloud security
Strategies for assessing cloud securityArun Gopinath
 
Ast 0064255 strategies-for_assessing_cloud_security
Ast 0064255 strategies-for_assessing_cloud_securityAst 0064255 strategies-for_assessing_cloud_security
Ast 0064255 strategies-for_assessing_cloud_securityAccenture
 
Cloud Security: What you need to know about IBM SmartCloud Security
Cloud Security: What you need to know about IBM SmartCloud SecurityCloud Security: What you need to know about IBM SmartCloud Security
Cloud Security: What you need to know about IBM SmartCloud SecurityIBM Security
 
VA_InterConnect2017
VA_InterConnect2017VA_InterConnect2017
VA_InterConnect2017Canturk Isci
 
Security Building Blocks of the IBM Cloud Computing Reference Architecture
Security Building Blocks of the IBM Cloud Computing Reference ArchitectureSecurity Building Blocks of the IBM Cloud Computing Reference Architecture
Security Building Blocks of the IBM Cloud Computing Reference ArchitectureStefaan Van daele
 
Cloud security enforcer - Quick steps to avoid the blind spots of shadow it
Cloud security enforcer - Quick steps to avoid the blind spots of shadow itCloud security enforcer - Quick steps to avoid the blind spots of shadow it
Cloud security enforcer - Quick steps to avoid the blind spots of shadow itIBM Security
 
Tecnologie a supporto dei controlli di sicurezza fondamentali
Tecnologie a supporto dei controlli di sicurezza fondamentaliTecnologie a supporto dei controlli di sicurezza fondamentali
Tecnologie a supporto dei controlli di sicurezza fondamentaliJürgen Ambrosi
 
Security Transformation Services
Security Transformation ServicesSecurity Transformation Services
Security Transformation Servicesxband
 
IBM Security Services Overview
IBM Security Services OverviewIBM Security Services Overview
IBM Security Services OverviewCasey Lucas
 
QRadar_on_Cloud_client_presentation.PPTX
QRadar_on_Cloud_client_presentation.PPTXQRadar_on_Cloud_client_presentation.PPTX
QRadar_on_Cloud_client_presentation.PPTXNatashaVerma29
 
glenn_amblercloud_security_ncc_event_22-may-2012_v1 (9)
glenn_amblercloud_security_ncc_event_22-may-2012_v1 (9)glenn_amblercloud_security_ncc_event_22-may-2012_v1 (9)
glenn_amblercloud_security_ncc_event_22-may-2012_v1 (9)Glenn Ambler
 
Securing Your Cloud Applications
Securing Your Cloud ApplicationsSecuring Your Cloud Applications
Securing Your Cloud ApplicationsIBM Security
 
Introduction to Cybersecurity Fundamentals
Introduction to Cybersecurity FundamentalsIntroduction to Cybersecurity Fundamentals
Introduction to Cybersecurity FundamentalsToño Herrera
 
10 Security Essentials Every CxO Should Know
10 Security Essentials Every CxO Should Know10 Security Essentials Every CxO Should Know
10 Security Essentials Every CxO Should KnowIBM Security
 
IBM MQ on cloud and containers
IBM MQ on cloud and containersIBM MQ on cloud and containers
IBM MQ on cloud and containersRobert Parker
 
QRadar-XDR-Solution.pdf
QRadar-XDR-Solution.pdfQRadar-XDR-Solution.pdf
QRadar-XDR-Solution.pdfssuserf5beb3
 
Smarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst ServicesSmarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst ServicesChris Pepin
 

Similar to How Does IBM Deliver Cloud Security Paper (20)

IBM Relay 2015: Securing the Future
IBM Relay 2015: Securing the Future IBM Relay 2015: Securing the Future
IBM Relay 2015: Securing the Future
 
Strategies for assessing cloud security
Strategies for assessing cloud securityStrategies for assessing cloud security
Strategies for assessing cloud security
 
Strategies for assessing cloud security
Strategies for assessing cloud securityStrategies for assessing cloud security
Strategies for assessing cloud security
 
Ast 0064255 strategies-for_assessing_cloud_security
Ast 0064255 strategies-for_assessing_cloud_securityAst 0064255 strategies-for_assessing_cloud_security
Ast 0064255 strategies-for_assessing_cloud_security
 
Cloud Security: What you need to know about IBM SmartCloud Security
Cloud Security: What you need to know about IBM SmartCloud SecurityCloud Security: What you need to know about IBM SmartCloud Security
Cloud Security: What you need to know about IBM SmartCloud Security
 
VA_InterConnect2017
VA_InterConnect2017VA_InterConnect2017
VA_InterConnect2017
 
Security Building Blocks of the IBM Cloud Computing Reference Architecture
Security Building Blocks of the IBM Cloud Computing Reference ArchitectureSecurity Building Blocks of the IBM Cloud Computing Reference Architecture
Security Building Blocks of the IBM Cloud Computing Reference Architecture
 
Cloud security enforcer - Quick steps to avoid the blind spots of shadow it
Cloud security enforcer - Quick steps to avoid the blind spots of shadow itCloud security enforcer - Quick steps to avoid the blind spots of shadow it
Cloud security enforcer - Quick steps to avoid the blind spots of shadow it
 
Tecnologie a supporto dei controlli di sicurezza fondamentali
Tecnologie a supporto dei controlli di sicurezza fondamentaliTecnologie a supporto dei controlli di sicurezza fondamentali
Tecnologie a supporto dei controlli di sicurezza fondamentali
 
Security Transformation Services
Security Transformation ServicesSecurity Transformation Services
Security Transformation Services
 
IBM Security Portfolio - 2015
IBM Security Portfolio - 2015IBM Security Portfolio - 2015
IBM Security Portfolio - 2015
 
IBM Security Services Overview
IBM Security Services OverviewIBM Security Services Overview
IBM Security Services Overview
 
QRadar_on_Cloud_client_presentation.PPTX
QRadar_on_Cloud_client_presentation.PPTXQRadar_on_Cloud_client_presentation.PPTX
QRadar_on_Cloud_client_presentation.PPTX
 
glenn_amblercloud_security_ncc_event_22-may-2012_v1 (9)
glenn_amblercloud_security_ncc_event_22-may-2012_v1 (9)glenn_amblercloud_security_ncc_event_22-may-2012_v1 (9)
glenn_amblercloud_security_ncc_event_22-may-2012_v1 (9)
 
Securing Your Cloud Applications
Securing Your Cloud ApplicationsSecuring Your Cloud Applications
Securing Your Cloud Applications
 
Introduction to Cybersecurity Fundamentals
Introduction to Cybersecurity FundamentalsIntroduction to Cybersecurity Fundamentals
Introduction to Cybersecurity Fundamentals
 
10 Security Essentials Every CxO Should Know
10 Security Essentials Every CxO Should Know10 Security Essentials Every CxO Should Know
10 Security Essentials Every CxO Should Know
 
IBM MQ on cloud and containers
IBM MQ on cloud and containersIBM MQ on cloud and containers
IBM MQ on cloud and containers
 
QRadar-XDR-Solution.pdf
QRadar-XDR-Solution.pdfQRadar-XDR-Solution.pdf
QRadar-XDR-Solution.pdf
 
Smarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst ServicesSmarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst Services
 

More from IBM

The New Economy
The New EconomyThe New Economy
The New EconomyIBM
 
Brand enthusiasm
Brand enthusiasmBrand enthusiasm
Brand enthusiasmIBM
 
Future of enterprise IT function IBM white paper
Future of enterprise IT function IBM white paperFuture of enterprise IT function IBM white paper
Future of enterprise IT function IBM white paperIBM
 
Success in the cloud, why workload matters
Success in the cloud, why workload mattersSuccess in the cloud, why workload matters
Success in the cloud, why workload mattersIBM
 
Responding to and recovering from sophisticated security attacks
Responding to and recovering from sophisticated security attacksResponding to and recovering from sophisticated security attacks
Responding to and recovering from sophisticated security attacksIBM
 
Exploring the-frontiers-of-cloud-computing
Exploring the-frontiers-of-cloud-computingExploring the-frontiers-of-cloud-computing
Exploring the-frontiers-of-cloud-computingIBM
 
Free Cloud e-guide
Free Cloud e-guideFree Cloud e-guide
Free Cloud e-guideIBM
 
IBM & CIF - Cloud Channel Research 2013
IBM & CIF - Cloud Channel Research 2013IBM & CIF - Cloud Channel Research 2013
IBM & CIF - Cloud Channel Research 2013IBM
 
Big data cloud cloud circle keynote_final laura colvine 8th november 2012
Big data cloud cloud circle keynote_final laura colvine 8th november 2012Big data cloud cloud circle keynote_final laura colvine 8th november 2012
Big data cloud cloud circle keynote_final laura colvine 8th november 2012IBM
 
Future of the it department 17 may 2012 mt
Future of the it department 17 may 2012 mtFuture of the it department 17 may 2012 mt
Future of the it department 17 may 2012 mtIBM
 
Cloud The Future Of The IT Department
Cloud   The Future Of The IT DepartmentCloud   The Future Of The IT Department
Cloud The Future Of The IT DepartmentIBM
 
IBM Partnering For A Smarter Planet Exploring The Role Of Ecosystems In Evo...
IBM Partnering For A Smarter Planet   Exploring The Role Of Ecosystems In Evo...IBM Partnering For A Smarter Planet   Exploring The Role Of Ecosystems In Evo...
IBM Partnering For A Smarter Planet Exploring The Role Of Ecosystems In Evo...IBM
 

More from IBM (12)

The New Economy
The New EconomyThe New Economy
The New Economy
 
Brand enthusiasm
Brand enthusiasmBrand enthusiasm
Brand enthusiasm
 
Future of enterprise IT function IBM white paper
Future of enterprise IT function IBM white paperFuture of enterprise IT function IBM white paper
Future of enterprise IT function IBM white paper
 
Success in the cloud, why workload matters
Success in the cloud, why workload mattersSuccess in the cloud, why workload matters
Success in the cloud, why workload matters
 
Responding to and recovering from sophisticated security attacks
Responding to and recovering from sophisticated security attacksResponding to and recovering from sophisticated security attacks
Responding to and recovering from sophisticated security attacks
 
Exploring the-frontiers-of-cloud-computing
Exploring the-frontiers-of-cloud-computingExploring the-frontiers-of-cloud-computing
Exploring the-frontiers-of-cloud-computing
 
Free Cloud e-guide
Free Cloud e-guideFree Cloud e-guide
Free Cloud e-guide
 
IBM & CIF - Cloud Channel Research 2013
IBM & CIF - Cloud Channel Research 2013IBM & CIF - Cloud Channel Research 2013
IBM & CIF - Cloud Channel Research 2013
 
Big data cloud cloud circle keynote_final laura colvine 8th november 2012
Big data cloud cloud circle keynote_final laura colvine 8th november 2012Big data cloud cloud circle keynote_final laura colvine 8th november 2012
Big data cloud cloud circle keynote_final laura colvine 8th november 2012
 
Future of the it department 17 may 2012 mt
Future of the it department 17 may 2012 mtFuture of the it department 17 may 2012 mt
Future of the it department 17 may 2012 mt
 
Cloud The Future Of The IT Department
Cloud   The Future Of The IT DepartmentCloud   The Future Of The IT Department
Cloud The Future Of The IT Department
 
IBM Partnering For A Smarter Planet Exploring The Role Of Ecosystems In Evo...
IBM Partnering For A Smarter Planet   Exploring The Role Of Ecosystems In Evo...IBM Partnering For A Smarter Planet   Exploring The Role Of Ecosystems In Evo...
IBM Partnering For A Smarter Planet Exploring The Role Of Ecosystems In Evo...
 

How Does IBM Deliver Cloud Security Paper

  • 1. How does IBM deliver cloud security? An IBM paper covering SmartCloud Services1
  • 2. 2 How does IBM deliver cloud security? Contents In delivering security for its cloud offerings, IBM looks to and relies upon its strong security heritage and expertise. IBM has 2 Introduction more than 6,000 security engineers and consultants around the 3 Cloud governance world, designing, building and running security solutions for its customers and helping them address their challenges in this 3 Security governance, risk management and compliance space. It has a portfolio of more than 3,000 security patents, 4 Problem and information security incident management with 100 new patents in 2011 alone. IBM also has the largest vulnerability database in the industry and manages over 13 4 Identity and access management billion security related events every day for existing customers. 5 Discover, categorise, and protect data and information assets IBM’s security strategy is based on the IBM Security Framework2, IBM provides security solutions that span this framework and 5 System acquisitions, development and maintenance works with organisations to take a holistic and risk-based 6 Secure infrastructure against threats and vulnerabilities approach to security. IBM has extensive experience of delivering in an outsourced and managed services environment and of 6 Physical and personnel security having those services internally and externally audited to recognised industry standards. 7 Summary 7 Author The approach IBM takes to delivering cloud services to its customers is anchored in the IBM Security Framework and the associated IBM Security Blueprint. By using this proven framework and blueprint approach, we have created a set of Introduction foundational controls specific to cloud. These Cloud Security Cloud computing is changing the way we use computing Foundation Controls have been developed from the foundational and has the potential for significant economic and efficiency security management layer of the blueprint and are used to benefits. But the speed of adoption depends on how quickly communicate with customers, partners and other stakeholders trust in new cloud models can be established. Some of the about how we approach security in our cloud models. growing cloud security concerns include: security of highly virtualised environments from targeted threats and attacks, In this paper we present some of the measures that we enabling secure collaboration, protection of the data (isolation, take in relation to these foundational controls. This paper sharing) in a rapid provisioning and de-provisioning environment is not intended to be exhaustive and does not describe every while experiencing the loss of direct control of security procedure and technical detail for each cloud offering. compliance, and privacy parameters. In order to build this trust, IBM has written this paper to enable discussion around the new security challenges cloud introduces and how these are addressed by IBM’s cloud offerings. We highlight the approach IBM takes to secure cloud services delivered from IBM delivery centres.
  • 3. SmartCloud 3 1. Cloud governance 2. Security governance, risk management Governance, risk and compliance are common issues raised and compliance by stakeholders. IBM has many managed services operations As a large enterprise and a service provider, our cloud solutions in countries around the globe. IBM’s cloud governance builds reflect our understanding of organisational needs. We have a on that extensive IBM governance structure. We recognise robust security compliance programme that has governance that taking advantage of cloud requires new considerations for over IBM internal security policies, standards and processes. governance and that there are important questions about how data will be managed in the cloud. In order to assist transparency, • IBM has an Information Technology (IT) Security Compliance IBM aligns its approach to recognised industry standards. management system which entails adherence to predefined requirements. These include physical access controls, logical • IBM has internal security policies, standards and processes access controls (including user ID administration) and security consistent with the ISO 27001 framework and control areas. health checking. Our internal and external audit partners In our delivery organisation we also regularly submit these regularly review these controls. policies, standards and processes to both internal audits and • Our processes and controls have evolved through thousands external certifications. of engagements around outsourcing, hosting and other • IBM also maintains many industry related certifications services. They have been further developed with the aim such as ISO 9001, ISO 20000 and CMMI across many data of meeting the needs of cloud environments. centres. For example a customer using SmartCloud Services from IBM’s data centre in Ehningen, Germany can expect We have incorporated governance and risk management best that it has both ISO 27001 and ISAE3402 covering the practices and lessons learned through implementing our own physical controls. cloud solutions and building solutions for other large enterprise customers – and applied them to our cloud offerings. IBM has a comprehensive Service Organisation Controls (SOC) reporting programme and is undergoing several IBM has extensive experience designing and delivering in SSAE16 or equivalent audits covering many IT services and multi-tenant environments. Security governance has also associated controls, from managed services delivery through been enabled through the way we design, build and deliver to managed security services. We continue to develop this solutions guided by an approach called, ‘Secure by Design’. external auditing approach to cover our cloud services as they evolve and to stay in line with the standards’ requirements.
  • 4. 4 How does IBM deliver cloud security? 3. Problem and information security 4. Identity and access management incident management To ensure that only those who need to access cloud In the event of a problem or incident occurring in the cloud, environments do so, IBM has developed processes to formal response processes, aligned to the overall IBM ensure that access is tightly controlled. IBM maintains Corporate Incident Management Processes, are executed and robust access control and privileged user monitoring to records retained. IBM has extensive experience of environments ensure enforcement and compliance regarding access to with shared users and incident management is handled to best customer content and information. efforts to ensure that customers and their data are protected. • Access to any system managed by IBM begins with a • IBM has documented policies and procedures relating to the formal access request and management approval process. management and monitoring of security events within its Once approved, access is revalidated on a periodic basis, offerings and infrastructure, including policies on escalation at least annually, to ensure users still require the level of and resolution of incidents. access they have been granted. Systems are also in place • In order to maintain the integrity of these security policies to ensure that those who leave IBM have their access and procedures, and thereby protect our customers, these rights removed. policies are not divulged outside IBM. Procedures are, • IBM Administrators of the cloud have to authenticate to however, subjected to internal and external audits on a the management environment and to the management tools regular basis. in order to gain access to functionality. These activities are monitored and logged to prevent unauthorized access In the case of a security event, IBM will evaluate the to customer virtual environments. situation, and where an issue has a material impact on a • All customer content managed by IBM is strictly customer, will notify them of such incidents. IBM also controlled and actively monitored. Only those personnel protects its infrastructure by shutting down instances that with appropriate authorisation from IBM Corporation violate acceptable use policy. In addition, IBM has put in have access to host management systems. place log-management of its infrastructure, including network traffic and administrative functions, to ensure issues can be investigated. IBM customers can be assured that the cloud infrastructure monitoring does not capture or retain logs of customer data, other than metadata.
  • 5. SmartCloud 5 5. Discover, categorise, and protect data Governments have long had the authority to request access and information assets to data for law enforcement and national security reasons One often cited concern about cloud is that it places data and such a request can extend to any company doing business in new and different places. This applies not just to the user within that country, regardless of where the company is based data, but also to the application (source) code. or where the data is stored. IBM has invested in cloud data centres in geographic regions IBM will thoroughly evaluate its obligations in order to across the globe with customers able to specify the cloud data provide the minimum data necessary to comply with legal centre location they wish to use. Mechanisms for protecting requests, from governmental authorities for access to data. data, such as encryption, may also be possible. IBM recommends that customers review the legal and business • We have enabled customers to configure encryption – for requirements relative to their data and works with them to example, of persistent storage – within their guest workloads. architect solutions that meet their privacy and security needs. Customers retain key management responsibility to support the security of these processes. 6. System acquisitions, development • Encryption can also be built into some applications deployed and maintenance on our cloud services, for example IBM DB2® can encrypt Ensuring that the systems are built with security controls in local databases and support the encryption of customer mind, and that these controls are maintained throughout the information. For some solutions this can also be achieved operation of the system, is not a new concept to IBM. at the file system level. • At the infrastructure level there are additional controls such • Our extensive experience in managing infrastructure as encrypting backup media, protection of data on portable means that cloud operational processes have been built, media, as well as during the disposal of storage devices. to enable that security is applied to the environment throughout its lifecycle. Processes are also in place to ensure any media removed from • Hypervisors are Common Criteria certified, for example, the data centre is encrypted for transport, and securely deleted VMware ESX, PowerVM® and KVM are EAL 4+ certified. at the end of its use. In addition, in our standard operating KVM is deployed on hardened SELinux servers, which procedures, customer data is not removed from the data centre provides additional isolation capabilities over KVM itself. without a customer’s permission. • Procedures to maintain the security of the infrastructure such as standard infrastructure patch management for IBM, as an international company with global customers, has cloud infrastructure. substantial experience collecting, storing and working with personally identifiable information – and it has applied these rules within its managed infrastructure.
  • 6. 6 How does IBM deliver cloud security? 7. Secure infrastructure against threats 8. Physical and personnel security and vulnerabilities One concern often raised is where the data is located Securing any infrastructure requires a defence in depth and how it will be controlled in the data centre. IBM cloud approach and IBM uses a number of different processes delivery centres are located within established IBM data and procedures to protect cloud infrastructures. These centres and the company has extensive experience in are underpinned with people and technology to secure managing data centres. the infrastructure against threats and vulnerabilities. • IBM has data centres with strong physical controls including, • The solutions have been designed with isolation built in but not limited to, CCTV, biometric authentication mechanisms, at different levels – at the network, hypervisor and storage resiliency tools and door alarms. All IBM personnel undergo layers. Management and infrastructure components are background checks prior to being hired. compartmentalised into security zones based on function, • IBM does allow accompanied visitation of its site facilities by data types and access requirements, and storage networks and its customers, however no persons, other than IBM personnel guest networks are physically separated. The zone design, and agents working on behalf of IBM, are allowed access to as well as network flows, requires formal review and approval the data centre facilities beyond those areas specified for visitors. through architecture governance processes. Access to the IBM data centre floor is strictly restricted to • Management infrastructure is regularly scanned for vulnerabilities authorised IBM personnel only and those permitted to carry using industry standard tools and master images are regularly out work on behalf of the company. updated to the latest security fix/patch level. • IBM requires employees to go through training in the handling • I ntrusion detection and prevention systems (IDPS) are of customer data and to demonstrate understanding of those utilised at boundaries to the Internet, IBM employs an policies. The IBM business conduct guidelines oversee approach that does not rely on signature-based vulnerability expectations and requirements of employees including the detection alone. This capability allows protection against handling of customer data. All IBM employees are required previously unseen threats based on behaviour and not to re-certify understanding in these areas on a yearly basis. just signatures. • A ll management systems and underlying infrastructure periodically undergo security configuration checking to ensure system security settings continue to be configured in-line with security standards and policy. Host-based firewalls within the customer Virtual Machines (VMs) can, and should, also be configured to achieve defence in depth.
  • 7. SmartCloud 7 Summary Author Cloud computing offers new possibilities and new security Nick Coleman challenges. These challenges range from governance, through IBM Global Cloud Security Leader to securing application and infrastructure. Fundamentally it is Email: coleman@uk.ibm.com important to be able to assure the security of these new models twitter.com/teamsecurity in order to build trust and confidence. Acknowledgments IBM has extensive experience of delivering in shared Neil Readshaw environments, a common characteristic of cloud. This IBM Senior Technical Staff Member experience ranges from managed services, through to infrastructure as a service and platform as a service. Martin Borrett Director of the IBM Institute for Advanced Security Europe This paper introduces IBM’s approach to delivering cloud security for infrastructure services. However it is not intended References to be exhaustive and does not describe every procedure and 1 IBM SmartCloud Enterprise and Enterprise Plus technical detail for each cloud offering. ibm.com/services/uk/en/cloud-enterprise The key to establishing trust in these new models is choosing 2 IBM Security Framework the right cloud computing model for your organisation, and www.redbooks.ibm.com/abstracts/redp4528.html being able to deploy workloads using a delivery model with the appropriate security controls. We understand this is not just a technical challenge but a challenge of governance and compliance, applications and infrastructure, and assurance.
  • 8. © Copyright IBM Corporation 2012 IBM United Kingdom Limited 76 Upper Ground South Bank London SE1 9PZ Produced in the United Kingdom May 2012 All Rights Reserved IBM, the IBM logo, ibm.com, DB2 and PowerVM are trademarks or registered trademarks of International Business Machines Corporation in the United States, other countries, or both. If these and other IBM trademarked terms are marked on their first occurrence in this information with a trademark symbol (® or ™), these symbols indicate U.S. registered or common law trademarks owned by IBM at the time this information was published. Such trademarks may also be registered or common law trademarks in other countries. A current list of IBM trademarks is available on the Web at “Copyright and trademark information” at ibm.com/legal/copytrade.shtml Linux is a registered trademark of Linus Torvalds in the United States, other countries, or both. Other company, product and service names may be trademarks or service marks of others. References in this publication to IBM products and services do not imply that IBM intends to make them available in all countries in which IBM operates. Information may be changed or updated without notice. IBM may also make improvements and/or changes in the products, practices and/or the programmes described in this information at any time without notice. This paper should not be seen as a contractual agreement or indication of terms of service. Please Recycle ITW03004-GBEN-00