SlideShare a Scribd company logo
www.hitachiconsulting.com




      A Cloud Framework for Integrated
      Security, Governance, Compliance,
      Content and Service Management

Gartner Symposium ITXPO, October 25, 2011                                                                Chad M. Lawler, Ph.D.
http://www.gartner.com/technology/symposium/orlando/                                                     Director of Consulting Services, Cloud Computing
                                                                                                         chad.lawler@hitachiconsulting.com
                                                           © 2012 Hitachi Consulting Corporation
                                                       Proprietary & Confidential, All Rights Reserved   www.hitachiconsulting.com/cloud
                                                                                                                                © Copyright 2012 Hitachi Consulting
Topics for Today’s Session


 Review Cloud Security Risks

 Cloud Framework Overview

 Focus on Security

 Summary & Q&A



                                © Copyright 2012 Hitachi Consulting
Integrated Cloud Framework - Security, Governance, Compliance,
Content ,Application & Service Management

  Our framework provides businesses with a streamlined capability to rapidly, and securely
   transition application and services to the cloud.
  Our cloud framework helps organizations plan for appropriate cloud application deployment

  Includes the necessary services for deploying well-managed applications in the cloud.

  This framework provides for integrated governance policies

  Provides a well-managed cloud environment that is compliant with internal policies and
   external requirements

  With security services to protect from both vulnerabilities and intrusions

  Services that protect against loss or compromise of sensitive data.

  The framework provides for integrated content management and has automated capabilities
   for appropriate cloud platform selection, content migration and application importing.

                                                                                 © Copyright 2012 Hitachi Consulting   2
What are the top 3 greatest risks of moving to a cloud?


  The right answer depends on the type of business and what is most
  critical
   Businesses must evaluate applications
   Determine appropriate use in the cloud


  Consider the Pillars of IT security (CIA):

  Confidentiality

  Integrity

  Availability


                                                              © Copyright 2012 Hitachi Consulting
What are the top 3 greatest risks of moving to a cloud?


  Confidentiality
   Preventing   sensitive information from being disclosed to unauthorized
    recipients
   Limiting information access and disclosure to authorized users


  Risk - Private Data Exposure
   Riskof potential data or private information leakage
   Can threaten your customer data
   As well as your business services on operations




                                                               © Copyright 2012 Hitachi Consulting
What are the top 3 greatest risks of moving to a cloud?


  Integrity
   Trustworthiness of information resources
   Modifying information resources only in a specified and authorized
    manner
   Ensuring data remains consistent and changes to data are authorized
    by appropriate personnel

  Risk - Data Tampering
   Risk of potential manipulation or altering of critical data
   Can lead to making business decisions based on invalid information


                                                             © Copyright 2012 Hitachi Consulting
What are the top 3 greatest risks of moving to a cloud?


  Availability
   Ensures  systems operate as required
   And authorized users are not denied service
   Allowing systems to be available whenever needed


  Risk - Business Continuity
   Risk of potential interruption to or compromise of your service
    operations
   Service outage, security attack or compromise that may lead to data
    loss
   Operations are interrupted or your data is compromised

                                                             © Copyright 2012 Hitachi Consulting
Cloud Security Risks

        Misuse of cloud computing
                                        Account / service hijacking
        resources



                                        Remote facilities / Security
        Secure Interfaces and APIs
                                        Perimeter


        Risks associated with           Securing personal identification
        multi-tenancy                   information (PII)



        Risk of data loss and leakage   IP Collateral management



                                                              © Copyright 2012 Hitachi Consulting
How to mitigate the risks of moving to the cloud?

   To reduce your risks…
     Risk must first be understood and calculated
     Understand residual risk that you can influence


   Develop a standardized cloud risk decision process
     Help decide which applications are most appropriate
     Leverage cloud application assessment process to define requirements


   Understand and quantify your risk
     Implement a policy that calculates and quantifies cloud application risk
     Includes criteria for:
         Application Risk Tolerance
         Application Security Fit
         Data Protection & SLA Requirements
         Business to Business Policies
         Confidentiality Risk - Private Data Exposure
         Integrity Risk - Data Tampering
         Availability Risk - Business Continuity

                                                                                 © Copyright 2012 Hitachi Consulting
Integrated Cloud Framework - Security, Governance,
 Compliance & Content & Application Management

 Helps Organizations Leverage the Cloud in a Secure Fashion
     Understand cloud application security risk and key areas of consideration
     Evaluates and helps define application and data security requirements
     Enables appropriate planning for cloud security, content and governance
     Serves as a comprehensive guide to reduce cloud adoption risks

 Integrated Cloud Framework: A Roadmap to the Cloud
     Security
       to protect against vulnerabilities, intrusions & compromise of sensitive data
     Governance & Compliance
       for an environment compliant with policies and requirements
     Content Management
       for control of cloud information
     Application Development & Migration
       development, transition and re-platform of enterprise applications


 Provides streamlined capability to rapidly & securely transition to the cloud


                                                                                        © Copyright 2012 Hitachi Consulting   9
Integrated Cloud Framework - Security, Governance, Compliance,
Content ,Application & Service Management
                               Cloud Framework for Integrated Security, Governance, Compliance, Content & Service Management
Consulting Services                                    Program Governance Framework                                                                     Content Management, Security, Governance Dashboard Portal
    Strategic Cloud Advisory               Governance Policy                    Cloud Governance, Certification & Compliance                                                                                  Workflow-Checklist, Certification & Approval
            Services                                                                                                                                Central Cloud Platform Management Console
                                              Enforcement                                          Policy                                                                                                                     Interface
 Cloud Readiness Assessment              Master Security Policy &
            Services                                                            Security              Privacy             Hosting                       Continuous Audit Program Interface                   Site Compliance Reporting Dashboard Interface
                                               Exceptions
  Infrastructure, Transition &                                                                                                                        Vulnerability Scanning, Monitoring, & PII
                                       Risk Impact         Monitoring                                                                                                                                          Metering, Billing & Charge-Back Interface
       Migration Services                Criteria           Criteria
                                                                                  Cloud                 App                 Risk                                 Reporting Interface
 Cloud Security & Governance           Data Class           Hosting
            Services                                                              Legal                Audit            Excellence                  Secure Cloud Environment Incident Reporting                  Role & Access Administration Interface
                                        Criteria            Criteria
         Cloud Starter Kit               Privacy           Marketing
                                                                                Corporate              RACI                 FIT                   Site Requirements, Content Publication Priority &
                                         Criteria           Criteria                                                                                                                                                   Performance SLA Interface




                                                                                                                                                                                                                                                                   ITIL Service Management
                                                                                                                                                              Cloud Template Interface
                                         Security Standards - NIST,                   Client Standards & Best Practices -                                                                                        Governance Policy, Portal & Training
                                                                                                                                                           Feedback Collection Interface
                                       PCI,CSA,TwC, HIPAA,GLBA,Vendor              Procurement, Security, Marketing/CMG, Privacy                                                                                      Documentation Interface



                                                                        Cloud Security, Content & Application Services
Application Services                                                     Security Services                                                                                     Content Management Services
                                     Single Sign On (SSO) Identity Management             Vulnerability Scanning, Monitoring, & PII                         Service Desk Integration
     Cloud Assessment                                                                                                                                                                                                  Content Data Classification
                                                  & Authentication                                    Detection Engine                               (Communication, Collaboration, Reporting)
                                                                                           SIEM with Root Cause Analysis & Risk                                                                               Content Compatibility & Compliance Decision
 Cloud Architecture & Design           PKI & Certificate Management System                                                                                Change Management Integration
                                                                                                         Assessment                                                                                                             Engine
      Cloud Application                                                                                                                            Site Requirements, Publication Priority & Cloud
                                         Patch & Log Management System                     Continuous Auditing Program Engine                                                                                    Content Conversion & Standardization
        Development                                                                                                                                            Template Launch Engine
                                      IPS/IDS Event Management & Data Loss                   Secure Cloud to Cloud & Cloud to
 Cloud Application Delivery                                                                                                                                     Feedback Collection                               Compliant Content Migration Process
                                                Prevention Systems                             Datacenter VPN Connectivity

   Managed Cloud Service                 AntiVirus & AntiMalware System                Secure Cloud Platform Content Migration                                Performance SLA Engine                            Non-Compliant Content Migration Process
                                                                                          Deep Code-Level Security Vulnerability
                                      Workflow-Checklist & Approval Engine                                                                              Cloud Platform Selection Automation                   Virtualized Application Automated Migration
                                                                                                        Review



                                                                              Cloud Platform & Hosting Environment
                                                                                                                    System OS                Patch                    AntiVirus                 Data Loss           Single Sign On
                                      Cloud Applications
                                                                                                                   Management              Management                AntiMalware               Prevention           (SSO) Identity            Metering, Billing
                                                                                                                     Backup &                 Log                                            IPS/IDS Event          Management,               & Charge Back
    OS                  Web Server        Database               Middleware            Content                                                                       Secure VPN
                                                                                                                      Restore              Management                                        Management             Authentication

                                                                                                                Cloud Platform & Infrastructure




                                                                                                                                                                                                                             © Copyright 2012 Hitachi Consulting               10
Cloud Framework – Platform & Hosting Environment


                     Cloud Platform & Hosting Environment
                                      Cloud Applications

      OS            Web Server                 Database             Middleware            Content
 System OS       Patch            AntiVirus           Data Loss        Single Sign On
 Management    Management        AntiMalware          Prevention       (SSO) Identity    Metering, Billing &
  Backup &                                          IPS/IDS Event       Management,        Charge Back
              Log Management      Secure VPN
   Restore                                           Management        Authentication

                               Cloud Platform & Infrastructure




                                                                                        © Copyright 2012 Hitachi Consulting
Cloud Framework – Content Management Services


                             Content Management Services
           Service Desk Integration
                                                            Content Data Classification
    (Communication, Collaboration, Reporting)

                                                    Content Compatibility & Compliance Decision
         Change Management Integration
                                                                      Engine

  Site Requirements, Publication Priority & Cloud
                                                       Content Conversion & Standardization
             Template Launch Engine


               Feedback Collection                     Compliant Content Migration Process


             Performance SLA Engine                  Non-Compliant Content Migration Process


       Cloud Platform Selection Automation          Virtualized Application Automated Migration




                                                                                    © Copyright 2012 Hitachi Consulting
Cloud Framework - Security Services



                                          Security Services
   Single Sign On (SSO) Identity Management &        Vulnerability Scanning, Monitoring, & PII Detection
                 Authentication                                           Engine

       PKI & Certificate Management System          SIEM with Root Cause Analysis & Risk Assessment


         Patch & Log Management System                     Continuous Auditing Program Engine

 IPS/IDS Event Management & Data Loss Prevention     Secure Cloud to Cloud & Cloud to Datacenter VPN
                    Systems                                            Connectivity

                                                     Data Encryption & Secure Cloud Platform Content
         AntiVirus & AntiMalware System
                                                                        Migration

      Workflow-Checklist & Approval Engine            Deep Code-Level Security Vulnerability Review



                                                                                          © Copyright 2012 Hitachi Consulting
Cloud Framework – Program Governance Framework

                           Program Governance Framework

   Governance Policy Enforcement        Cloud Governance, Certification & Compliance Policy


  Master Security Policy & Exceptions    Security             Privacy            Hosting

    Risk Impact         Monitoring
                                           Cloud               App                  Risk
      Criteria           Criteria

    Data Class
                     Hosting Criteria      Legal              Audit            Excellence
     Criteria

  Privacy Criteria    Other Criteria     Corporate             RACI                   IT


      Security Standards - NIST,               Client Standards & Best Practices -
  PCI,CSA,TwC, HIPAA,GLBA,Vendor           Procurement, Security, Organization, Privacy




                                                                                 © Copyright 2012 Hitachi Consulting
Cloud Framework – Content Mgmt, Security, Governance Dashboard Portal




                   Content Management, Security, Governance Dashboard Portal
                                                            Workflow-Checklist, Certification & Approval
    Central Cloud Platform Management Console
                                                                            Interface

         Continuous Audit Program Interface                Site Compliance Reporting Dashboard Interface

   Vulnerability Scanning, Monitoring, & PII Reporting
                                                              Metering, Billing & Charge-Back Interface
                        Interface

   Secure Cloud Environment Incident Reporting                 Role & Access Administration Interface

 Site Requirements, Content Publication Priority & Cloud
                                                                     Performance SLA Interface
                  Template Interface
                                                                Governance Policy, Portal & Training
            Feedback Collection Interface
                                                                     Documentation Interface




                                                                                              © Copyright 2012 Hitachi Consulting
Summary & Reccomendations


  Understand that security in the cloud must be managed

  Implement a policy that calculates and quantifies cloud application risk

  Evaluate application and data security requirements

  Plan and budget for implementing security services

  Leverage a framework which covers all the key areas

  Implement and adhere to the framework as a roadmap guide to reduce
   cloud adoption risks

                                                                © Copyright 2012 Hitachi Consulting
Contact us to Learn More about our Cloud Solutions Today


                  Chad M. Lawler, Ph.D.
                  Director of Consulting Services
                  Cloud Computing

                   14643 Dallas Parkway, Suite 800, Dallas, Texas 75254
                   Office: 469.221.2894
                   Email: chad.lawler@hitachiconsulting.com
                   www.hitachiconsulting.com


                              www.cardcloud.com/chadlawler


       Sign up for a free trial to explore our Cloud Ecosystem Management Platform.
          Learn More About the Benefits of Hitachi Consulting Cloud Services at
                         www.hitachiconsulting.com/cloud


                                                                            © Copyright 2012 Hitachi Consulting
© Copyright 2012 Hitachi Consulting

More Related Content

What's hot

Perform a Cloud Readiness Assessment for Your Own Company
Perform a Cloud Readiness Assessment for Your Own CompanyPerform a Cloud Readiness Assessment for Your Own Company
Perform a Cloud Readiness Assessment for Your Own Company
Amazon Web Services
 
Considerations for your Cloud Journey
Considerations for your Cloud JourneyConsiderations for your Cloud Journey
Considerations for your Cloud Journey
Amazon Web Services
 
[Azure Governance] Lesson 1 : Azure Naming Convention
[Azure Governance] Lesson 1 : Azure Naming Convention[Azure Governance] Lesson 1 : Azure Naming Convention
[Azure Governance] Lesson 1 : Azure Naming Convention
☁ Hicham KADIRI ☁
 
How to Set Up a Cloud Cost Optimization Process for your Enterprise
How to Set Up a Cloud Cost Optimization Process for your EnterpriseHow to Set Up a Cloud Cost Optimization Process for your Enterprise
How to Set Up a Cloud Cost Optimization Process for your Enterprise
RightScale
 
Azure Cloud Governance
Azure Cloud GovernanceAzure Cloud Governance
Azure Cloud Governance
Jonathan Wade
 
Cloud Migration, Application Modernization, and Security
Cloud Migration, Application Modernization, and Security Cloud Migration, Application Modernization, and Security
Cloud Migration, Application Modernization, and Security
Tom Laszewski
 
Making a cloud first strategy a practical reality
Making a cloud first strategy a practical realityMaking a cloud first strategy a practical reality
Making a cloud first strategy a practical reality
Amazon Web Services
 
On-premise to Microsoft Azure Cloud Migration.
 On-premise to Microsoft Azure Cloud Migration. On-premise to Microsoft Azure Cloud Migration.
On-premise to Microsoft Azure Cloud Migration.
Emtec Inc.
 
AWS Cloud Adoption Framework
AWS Cloud Adoption Framework AWS Cloud Adoption Framework
AWS Cloud Adoption Framework
Amazon Web Services
 
Migrate to Microsoft Azure with Confidence
Migrate to Microsoft Azure with ConfidenceMigrate to Microsoft Azure with Confidence
Migrate to Microsoft Azure with Confidence
David J Rosenthal
 
Azure governance v4.0
Azure governance v4.0Azure governance v4.0
Azure governance v4.0
Marcos Oikawa
 
Azure Application Modernization
Azure Application ModernizationAzure Application Modernization
Azure Application Modernization
Karina Matos
 
Cloud Migration Strategy Framework
Cloud Migration Strategy FrameworkCloud Migration Strategy Framework
Cloud Migration Strategy Framework
PT Datacomm Diangraha
 
CAF presentation 09 16-2020
CAF presentation 09 16-2020CAF presentation 09 16-2020
CAF presentation 09 16-2020
Michael Nichols
 
A Practical Guide to Cloud Migration
A Practical Guide to Cloud MigrationA Practical Guide to Cloud Migration
A Practical Guide to Cloud Migration
Alaina Carter
 
Azure Migrate
Azure MigrateAzure Migrate
Azure Migrate
Mustafa
 
Cloud Migration Cookbook: A Guide To Moving Your Apps To The Cloud
Cloud Migration Cookbook: A Guide To Moving Your Apps To The CloudCloud Migration Cookbook: A Guide To Moving Your Apps To The Cloud
Cloud Migration Cookbook: A Guide To Moving Your Apps To The Cloud
New Relic
 
AWS Cloud Migration Insights Forum
AWS Cloud Migration Insights ForumAWS Cloud Migration Insights Forum
AWS Cloud Migration Insights Forum
Amazon Web Services
 

What's hot (20)

Perform a Cloud Readiness Assessment for Your Own Company
Perform a Cloud Readiness Assessment for Your Own CompanyPerform a Cloud Readiness Assessment for Your Own Company
Perform a Cloud Readiness Assessment for Your Own Company
 
Considerations for your Cloud Journey
Considerations for your Cloud JourneyConsiderations for your Cloud Journey
Considerations for your Cloud Journey
 
[Azure Governance] Lesson 1 : Azure Naming Convention
[Azure Governance] Lesson 1 : Azure Naming Convention[Azure Governance] Lesson 1 : Azure Naming Convention
[Azure Governance] Lesson 1 : Azure Naming Convention
 
Cloud Migration Workshop
Cloud Migration WorkshopCloud Migration Workshop
Cloud Migration Workshop
 
How to Set Up a Cloud Cost Optimization Process for your Enterprise
How to Set Up a Cloud Cost Optimization Process for your EnterpriseHow to Set Up a Cloud Cost Optimization Process for your Enterprise
How to Set Up a Cloud Cost Optimization Process for your Enterprise
 
Azure Cloud Governance
Azure Cloud GovernanceAzure Cloud Governance
Azure Cloud Governance
 
Cloud Migration, Application Modernization, and Security
Cloud Migration, Application Modernization, and Security Cloud Migration, Application Modernization, and Security
Cloud Migration, Application Modernization, and Security
 
Making a cloud first strategy a practical reality
Making a cloud first strategy a practical realityMaking a cloud first strategy a practical reality
Making a cloud first strategy a practical reality
 
On-premise to Microsoft Azure Cloud Migration.
 On-premise to Microsoft Azure Cloud Migration. On-premise to Microsoft Azure Cloud Migration.
On-premise to Microsoft Azure Cloud Migration.
 
AWS Cloud Adoption Framework
AWS Cloud Adoption Framework AWS Cloud Adoption Framework
AWS Cloud Adoption Framework
 
Azure migration
Azure migrationAzure migration
Azure migration
 
Migrate to Microsoft Azure with Confidence
Migrate to Microsoft Azure with ConfidenceMigrate to Microsoft Azure with Confidence
Migrate to Microsoft Azure with Confidence
 
Azure governance v4.0
Azure governance v4.0Azure governance v4.0
Azure governance v4.0
 
Azure Application Modernization
Azure Application ModernizationAzure Application Modernization
Azure Application Modernization
 
Cloud Migration Strategy Framework
Cloud Migration Strategy FrameworkCloud Migration Strategy Framework
Cloud Migration Strategy Framework
 
CAF presentation 09 16-2020
CAF presentation 09 16-2020CAF presentation 09 16-2020
CAF presentation 09 16-2020
 
A Practical Guide to Cloud Migration
A Practical Guide to Cloud MigrationA Practical Guide to Cloud Migration
A Practical Guide to Cloud Migration
 
Azure Migrate
Azure MigrateAzure Migrate
Azure Migrate
 
Cloud Migration Cookbook: A Guide To Moving Your Apps To The Cloud
Cloud Migration Cookbook: A Guide To Moving Your Apps To The CloudCloud Migration Cookbook: A Guide To Moving Your Apps To The Cloud
Cloud Migration Cookbook: A Guide To Moving Your Apps To The Cloud
 
AWS Cloud Migration Insights Forum
AWS Cloud Migration Insights ForumAWS Cloud Migration Insights Forum
AWS Cloud Migration Insights Forum
 

Viewers also liked

Security & Compliance in the Cloud - Proactively Managing Governance, Risk & ...
Security & Compliance in the Cloud - Proactively Managing Governance, Risk & ...Security & Compliance in the Cloud - Proactively Managing Governance, Risk & ...
Security & Compliance in the Cloud - Proactively Managing Governance, Risk & ...
Chad Lawler
 
Operational Best Practices in the Cloud
Operational Best Practices in the CloudOperational Best Practices in the Cloud
Operational Best Practices in the Cloud
RightScale
 
Why Enterprise Architecture Must drive Cloud Strategy and Planning
Why Enterprise Architecture Must drive Cloud Strategy and PlanningWhy Enterprise Architecture Must drive Cloud Strategy and Planning
Why Enterprise Architecture Must drive Cloud Strategy and PlanningRateb Abu Hawieleh
 
Enterprise Cloud Operating Model Design
Enterprise Cloud Operating Model DesignEnterprise Cloud Operating Model Design
Enterprise Cloud Operating Model Design
Joseph Schwartz
 
CCAF Criminal Justice Web Progress Report
CCAF Criminal Justice Web Progress ReportCCAF Criminal Justice Web Progress Report
CCAF Criminal Justice Web Progress ReportMark Cain
 
A Framework for Cloud Computing Adoption in South African Government
A Framework for Cloud Computing Adoption in South African GovernmentA Framework for Cloud Computing Adoption in South African Government
A Framework for Cloud Computing Adoption in South African Government
GovCloud Network
 
Jazoon'12 Enterprise-wide Cloud Governance
Jazoon'12 Enterprise-wide Cloud GovernanceJazoon'12 Enterprise-wide Cloud Governance
Jazoon'12 Enterprise-wide Cloud Governance
Netcetera
 
Cloud Security for U.S. Military Agencies
Cloud Security for U.S. Military AgenciesCloud Security for U.S. Military Agencies
Cloud Security for U.S. Military AgenciesNJVC, LLC
 
CCSK, cloud security framework, Indonesia
CCSK, cloud security framework, IndonesiaCCSK, cloud security framework, Indonesia
CCSK, cloud security framework, Indonesia
Wise Pacific Venture
 
Cloud Governance Framework - Required Cloud Sourcing Capabilities
Cloud Governance Framework - Required Cloud Sourcing CapabilitiesCloud Governance Framework - Required Cloud Sourcing Capabilities
Cloud Governance Framework - Required Cloud Sourcing Capabilities
SusanneT
 
Governing in the Cloud
Governing in the CloudGoverning in the Cloud
Governing in the Cloud
Rolf Frydenberg
 
Security & Governance for the Cloud: a Savvis Case Study (Presented at Cloud ...
Security & Governance for the Cloud: a Savvis Case Study (Presented at Cloud ...Security & Governance for the Cloud: a Savvis Case Study (Presented at Cloud ...
Security & Governance for the Cloud: a Savvis Case Study (Presented at Cloud ...
CA API Management
 
Cloud is not an option, but is security?
Cloud is not an option, but is security?Cloud is not an option, but is security?
Cloud is not an option, but is security?
Jody Keyser
 
Security Governance Isp Eng
Security Governance Isp EngSecurity Governance Isp Eng
Security Governance Isp Eng
Maurizio Milazzo
 
The Executive View on Cloud Service Brokers – Cloud Computing Association Con...
The Executive View on Cloud Service Brokers – Cloud Computing Association Con...The Executive View on Cloud Service Brokers – Cloud Computing Association Con...
The Executive View on Cloud Service Brokers – Cloud Computing Association Con...
Chad Lawler
 
cloudSME The European hpc cloud platform for simulation
cloudSME The European hpc cloud platform for simulationcloudSME The European hpc cloud platform for simulation
cloudSME The European hpc cloud platform for simulation
Andreas Ocklenburg
 
Cloud Services Brokerage Demystified
Cloud Services Brokerage DemystifiedCloud Services Brokerage Demystified
Cloud Services Brokerage DemystifiedZach Gardner
 
Podoactiva
PodoactivaPodoactiva
Podoactiva
Andreas Ocklenburg
 
Enhancing Hong Kong's Competitiveness Through Data Center and Cloud Computing...
Enhancing Hong Kong's Competitiveness Through Data Center and Cloud Computing...Enhancing Hong Kong's Competitiveness Through Data Center and Cloud Computing...
Enhancing Hong Kong's Competitiveness Through Data Center and Cloud Computing...
Charles Mok
 
Operations Delivery Business Value
Operations Delivery Business ValueOperations Delivery Business Value
Operations Delivery Business Value
Sonatype
 

Viewers also liked (20)

Security & Compliance in the Cloud - Proactively Managing Governance, Risk & ...
Security & Compliance in the Cloud - Proactively Managing Governance, Risk & ...Security & Compliance in the Cloud - Proactively Managing Governance, Risk & ...
Security & Compliance in the Cloud - Proactively Managing Governance, Risk & ...
 
Operational Best Practices in the Cloud
Operational Best Practices in the CloudOperational Best Practices in the Cloud
Operational Best Practices in the Cloud
 
Why Enterprise Architecture Must drive Cloud Strategy and Planning
Why Enterprise Architecture Must drive Cloud Strategy and PlanningWhy Enterprise Architecture Must drive Cloud Strategy and Planning
Why Enterprise Architecture Must drive Cloud Strategy and Planning
 
Enterprise Cloud Operating Model Design
Enterprise Cloud Operating Model DesignEnterprise Cloud Operating Model Design
Enterprise Cloud Operating Model Design
 
CCAF Criminal Justice Web Progress Report
CCAF Criminal Justice Web Progress ReportCCAF Criminal Justice Web Progress Report
CCAF Criminal Justice Web Progress Report
 
A Framework for Cloud Computing Adoption in South African Government
A Framework for Cloud Computing Adoption in South African GovernmentA Framework for Cloud Computing Adoption in South African Government
A Framework for Cloud Computing Adoption in South African Government
 
Jazoon'12 Enterprise-wide Cloud Governance
Jazoon'12 Enterprise-wide Cloud GovernanceJazoon'12 Enterprise-wide Cloud Governance
Jazoon'12 Enterprise-wide Cloud Governance
 
Cloud Security for U.S. Military Agencies
Cloud Security for U.S. Military AgenciesCloud Security for U.S. Military Agencies
Cloud Security for U.S. Military Agencies
 
CCSK, cloud security framework, Indonesia
CCSK, cloud security framework, IndonesiaCCSK, cloud security framework, Indonesia
CCSK, cloud security framework, Indonesia
 
Cloud Governance Framework - Required Cloud Sourcing Capabilities
Cloud Governance Framework - Required Cloud Sourcing CapabilitiesCloud Governance Framework - Required Cloud Sourcing Capabilities
Cloud Governance Framework - Required Cloud Sourcing Capabilities
 
Governing in the Cloud
Governing in the CloudGoverning in the Cloud
Governing in the Cloud
 
Security & Governance for the Cloud: a Savvis Case Study (Presented at Cloud ...
Security & Governance for the Cloud: a Savvis Case Study (Presented at Cloud ...Security & Governance for the Cloud: a Savvis Case Study (Presented at Cloud ...
Security & Governance for the Cloud: a Savvis Case Study (Presented at Cloud ...
 
Cloud is not an option, but is security?
Cloud is not an option, but is security?Cloud is not an option, but is security?
Cloud is not an option, but is security?
 
Security Governance Isp Eng
Security Governance Isp EngSecurity Governance Isp Eng
Security Governance Isp Eng
 
The Executive View on Cloud Service Brokers – Cloud Computing Association Con...
The Executive View on Cloud Service Brokers – Cloud Computing Association Con...The Executive View on Cloud Service Brokers – Cloud Computing Association Con...
The Executive View on Cloud Service Brokers – Cloud Computing Association Con...
 
cloudSME The European hpc cloud platform for simulation
cloudSME The European hpc cloud platform for simulationcloudSME The European hpc cloud platform for simulation
cloudSME The European hpc cloud platform for simulation
 
Cloud Services Brokerage Demystified
Cloud Services Brokerage DemystifiedCloud Services Brokerage Demystified
Cloud Services Brokerage Demystified
 
Podoactiva
PodoactivaPodoactiva
Podoactiva
 
Enhancing Hong Kong's Competitiveness Through Data Center and Cloud Computing...
Enhancing Hong Kong's Competitiveness Through Data Center and Cloud Computing...Enhancing Hong Kong's Competitiveness Through Data Center and Cloud Computing...
Enhancing Hong Kong's Competitiveness Through Data Center and Cloud Computing...
 
Operations Delivery Business Value
Operations Delivery Business ValueOperations Delivery Business Value
Operations Delivery Business Value
 

Similar to Integrated Cloud Framework: Security, Governance, Compliance, Content Application, and Service Management - Gartner Symposium ITXPO 2011

Cloud security and security architecture
Cloud security and security architectureCloud security and security architecture
Cloud security and security architecture
Vladimir Jirasek
 
Enterprise Security in Cloud
Enterprise Security in CloudEnterprise Security in Cloud
Enterprise Security in CloudLenin Aboagye
 
Enterprise Security in Hybrid Cloud ISACA-SV 2012
Enterprise Security in Hybrid Cloud ISACA-SV 2012Enterprise Security in Hybrid Cloud ISACA-SV 2012
Enterprise Security in Hybrid Cloud ISACA-SV 2012
Symosis Security (Previously C-Level Security)
 
null Bangalore meet - Cloud Computing and Security
null Bangalore meet - Cloud Computing and Securitynull Bangalore meet - Cloud Computing and Security
null Bangalore meet - Cloud Computing and Security
n|u - The Open Security Community
 
2012-01 How to Secure a Cloud Identity Roadmap
2012-01 How to Secure a Cloud Identity Roadmap2012-01 How to Secure a Cloud Identity Roadmap
2012-01 How to Secure a Cloud Identity Roadmap
Raleigh ISSA
 
Csa about-threats-june-2010-ibm
Csa about-threats-june-2010-ibmCsa about-threats-june-2010-ibm
Csa about-threats-june-2010-ibmSergio Loureiro
 
AWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNet
AWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNetAWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNet
AWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNetAmazon Web Services
 
The Perfect Storm
The Perfect StormThe Perfect Storm
The Perfect Storm
Ramsés Gallego
 
Enterprise Strategy for Cloud Security
Enterprise Strategy for Cloud SecurityEnterprise Strategy for Cloud Security
Enterprise Strategy for Cloud Security
Bob Rhubart
 
Top Trends in Cloud Computing for 2023.pptx
Top Trends in Cloud Computing for 2023.pptxTop Trends in Cloud Computing for 2023.pptx
Top Trends in Cloud Computing for 2023.pptx
SaadZaman23
 
security and compliance in the cloud
security and compliance in the cloudsecurity and compliance in the cloud
security and compliance in the cloudAjay Rathi
 
Cloud Clinique Enterprise IT Certification Program - Module Matrix
Cloud Clinique   Enterprise IT Certification Program - Module MatrixCloud Clinique   Enterprise IT Certification Program - Module Matrix
Cloud Clinique Enterprise IT Certification Program - Module Matrix
Adrian Hall
 
The Cloud according to VMware
The Cloud according to VMwareThe Cloud according to VMware
The Cloud according to VMwareOpSource
 
Windstream Webinar: The Latest Trends in Virtualization: Is the cloud right f...
Windstream Webinar: The Latest Trends in Virtualization: Is the cloud right f...Windstream Webinar: The Latest Trends in Virtualization: Is the cloud right f...
Windstream Webinar: The Latest Trends in Virtualization: Is the cloud right f...
Windstream Enterprise
 
Risk Factory: PCI Compliance in the Cloud
Risk Factory: PCI Compliance in the CloudRisk Factory: PCI Compliance in the Cloud
Risk Factory: PCI Compliance in the Cloud
Risk Crew
 
Enterprise Security Architecture: From access to audit
Enterprise Security Architecture: From access to auditEnterprise Security Architecture: From access to audit
Enterprise Security Architecture: From access to audit
Bob Rhubart
 
Security in Cloud Computing
Security in Cloud ComputingSecurity in Cloud Computing
Security in Cloud Computing
Ashish Patel
 
Cloud Application Rationalization- The Cloud, the Enterprise, and Making the ...
Cloud Application Rationalization- The Cloud, the Enterprise, and Making the ...Cloud Application Rationalization- The Cloud, the Enterprise, and Making the ...
Cloud Application Rationalization- The Cloud, the Enterprise, and Making the ...
Chad Lawler
 

Similar to Integrated Cloud Framework: Security, Governance, Compliance, Content Application, and Service Management - Gartner Symposium ITXPO 2011 (20)

Cloud security and security architecture
Cloud security and security architectureCloud security and security architecture
Cloud security and security architecture
 
Enterprise Security in Cloud
Enterprise Security in CloudEnterprise Security in Cloud
Enterprise Security in Cloud
 
Enterprise Security in Hybrid Cloud ISACA-SV 2012
Enterprise Security in Hybrid Cloud ISACA-SV 2012Enterprise Security in Hybrid Cloud ISACA-SV 2012
Enterprise Security in Hybrid Cloud ISACA-SV 2012
 
null Bangalore meet - Cloud Computing and Security
null Bangalore meet - Cloud Computing and Securitynull Bangalore meet - Cloud Computing and Security
null Bangalore meet - Cloud Computing and Security
 
2012-01 How to Secure a Cloud Identity Roadmap
2012-01 How to Secure a Cloud Identity Roadmap2012-01 How to Secure a Cloud Identity Roadmap
2012-01 How to Secure a Cloud Identity Roadmap
 
Presd1 10
Presd1 10Presd1 10
Presd1 10
 
Csa about-threats-june-2010-ibm
Csa about-threats-june-2010-ibmCsa about-threats-june-2010-ibm
Csa about-threats-june-2010-ibm
 
AWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNet
AWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNetAWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNet
AWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNet
 
The Perfect Storm
The Perfect StormThe Perfect Storm
The Perfect Storm
 
Enterprise Strategy for Cloud Security
Enterprise Strategy for Cloud SecurityEnterprise Strategy for Cloud Security
Enterprise Strategy for Cloud Security
 
Top Trends in Cloud Computing for 2023.pptx
Top Trends in Cloud Computing for 2023.pptxTop Trends in Cloud Computing for 2023.pptx
Top Trends in Cloud Computing for 2023.pptx
 
security and compliance in the cloud
security and compliance in the cloudsecurity and compliance in the cloud
security and compliance in the cloud
 
Cloud Clinique Enterprise IT Certification Program - Module Matrix
Cloud Clinique   Enterprise IT Certification Program - Module MatrixCloud Clinique   Enterprise IT Certification Program - Module Matrix
Cloud Clinique Enterprise IT Certification Program - Module Matrix
 
The Cloud according to VMware
The Cloud according to VMwareThe Cloud according to VMware
The Cloud according to VMware
 
Windstream Webinar: The Latest Trends in Virtualization: Is the cloud right f...
Windstream Webinar: The Latest Trends in Virtualization: Is the cloud right f...Windstream Webinar: The Latest Trends in Virtualization: Is the cloud right f...
Windstream Webinar: The Latest Trends in Virtualization: Is the cloud right f...
 
Cloud Computing Enables Consumer-Centered Healthcare
Cloud Computing Enables Consumer-Centered HealthcareCloud Computing Enables Consumer-Centered Healthcare
Cloud Computing Enables Consumer-Centered Healthcare
 
Risk Factory: PCI Compliance in the Cloud
Risk Factory: PCI Compliance in the CloudRisk Factory: PCI Compliance in the Cloud
Risk Factory: PCI Compliance in the Cloud
 
Enterprise Security Architecture: From access to audit
Enterprise Security Architecture: From access to auditEnterprise Security Architecture: From access to audit
Enterprise Security Architecture: From access to audit
 
Security in Cloud Computing
Security in Cloud ComputingSecurity in Cloud Computing
Security in Cloud Computing
 
Cloud Application Rationalization- The Cloud, the Enterprise, and Making the ...
Cloud Application Rationalization- The Cloud, the Enterprise, and Making the ...Cloud Application Rationalization- The Cloud, the Enterprise, and Making the ...
Cloud Application Rationalization- The Cloud, the Enterprise, and Making the ...
 

Recently uploaded

FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
g2nightmarescribd
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 

Recently uploaded (20)

FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 

Integrated Cloud Framework: Security, Governance, Compliance, Content Application, and Service Management - Gartner Symposium ITXPO 2011

  • 1. www.hitachiconsulting.com A Cloud Framework for Integrated Security, Governance, Compliance, Content and Service Management Gartner Symposium ITXPO, October 25, 2011 Chad M. Lawler, Ph.D. http://www.gartner.com/technology/symposium/orlando/ Director of Consulting Services, Cloud Computing chad.lawler@hitachiconsulting.com © 2012 Hitachi Consulting Corporation Proprietary & Confidential, All Rights Reserved www.hitachiconsulting.com/cloud © Copyright 2012 Hitachi Consulting
  • 2. Topics for Today’s Session Review Cloud Security Risks Cloud Framework Overview Focus on Security Summary & Q&A © Copyright 2012 Hitachi Consulting
  • 3. Integrated Cloud Framework - Security, Governance, Compliance, Content ,Application & Service Management  Our framework provides businesses with a streamlined capability to rapidly, and securely transition application and services to the cloud.  Our cloud framework helps organizations plan for appropriate cloud application deployment  Includes the necessary services for deploying well-managed applications in the cloud.  This framework provides for integrated governance policies  Provides a well-managed cloud environment that is compliant with internal policies and external requirements  With security services to protect from both vulnerabilities and intrusions  Services that protect against loss or compromise of sensitive data.  The framework provides for integrated content management and has automated capabilities for appropriate cloud platform selection, content migration and application importing. © Copyright 2012 Hitachi Consulting 2
  • 4. What are the top 3 greatest risks of moving to a cloud?  The right answer depends on the type of business and what is most critical  Businesses must evaluate applications  Determine appropriate use in the cloud  Consider the Pillars of IT security (CIA):  Confidentiality  Integrity  Availability © Copyright 2012 Hitachi Consulting
  • 5. What are the top 3 greatest risks of moving to a cloud? Confidentiality Preventing sensitive information from being disclosed to unauthorized recipients Limiting information access and disclosure to authorized users Risk - Private Data Exposure Riskof potential data or private information leakage Can threaten your customer data As well as your business services on operations © Copyright 2012 Hitachi Consulting
  • 6. What are the top 3 greatest risks of moving to a cloud? Integrity Trustworthiness of information resources Modifying information resources only in a specified and authorized manner Ensuring data remains consistent and changes to data are authorized by appropriate personnel Risk - Data Tampering Risk of potential manipulation or altering of critical data Can lead to making business decisions based on invalid information © Copyright 2012 Hitachi Consulting
  • 7. What are the top 3 greatest risks of moving to a cloud? Availability Ensures systems operate as required And authorized users are not denied service Allowing systems to be available whenever needed Risk - Business Continuity Risk of potential interruption to or compromise of your service operations Service outage, security attack or compromise that may lead to data loss Operations are interrupted or your data is compromised © Copyright 2012 Hitachi Consulting
  • 8. Cloud Security Risks Misuse of cloud computing Account / service hijacking resources Remote facilities / Security Secure Interfaces and APIs Perimeter Risks associated with Securing personal identification multi-tenancy information (PII) Risk of data loss and leakage IP Collateral management © Copyright 2012 Hitachi Consulting
  • 9. How to mitigate the risks of moving to the cloud?  To reduce your risks…  Risk must first be understood and calculated  Understand residual risk that you can influence  Develop a standardized cloud risk decision process  Help decide which applications are most appropriate  Leverage cloud application assessment process to define requirements  Understand and quantify your risk  Implement a policy that calculates and quantifies cloud application risk  Includes criteria for:  Application Risk Tolerance  Application Security Fit  Data Protection & SLA Requirements  Business to Business Policies  Confidentiality Risk - Private Data Exposure  Integrity Risk - Data Tampering  Availability Risk - Business Continuity © Copyright 2012 Hitachi Consulting
  • 10. Integrated Cloud Framework - Security, Governance, Compliance & Content & Application Management  Helps Organizations Leverage the Cloud in a Secure Fashion  Understand cloud application security risk and key areas of consideration  Evaluates and helps define application and data security requirements  Enables appropriate planning for cloud security, content and governance  Serves as a comprehensive guide to reduce cloud adoption risks  Integrated Cloud Framework: A Roadmap to the Cloud  Security  to protect against vulnerabilities, intrusions & compromise of sensitive data  Governance & Compliance  for an environment compliant with policies and requirements  Content Management  for control of cloud information  Application Development & Migration  development, transition and re-platform of enterprise applications  Provides streamlined capability to rapidly & securely transition to the cloud © Copyright 2012 Hitachi Consulting 9
  • 11. Integrated Cloud Framework - Security, Governance, Compliance, Content ,Application & Service Management Cloud Framework for Integrated Security, Governance, Compliance, Content & Service Management Consulting Services Program Governance Framework Content Management, Security, Governance Dashboard Portal Strategic Cloud Advisory Governance Policy Cloud Governance, Certification & Compliance Workflow-Checklist, Certification & Approval Services Central Cloud Platform Management Console Enforcement Policy Interface Cloud Readiness Assessment Master Security Policy & Services Security Privacy Hosting Continuous Audit Program Interface Site Compliance Reporting Dashboard Interface Exceptions Infrastructure, Transition & Vulnerability Scanning, Monitoring, & PII Risk Impact Monitoring Metering, Billing & Charge-Back Interface Migration Services Criteria Criteria Cloud App Risk Reporting Interface Cloud Security & Governance Data Class Hosting Services Legal Audit Excellence Secure Cloud Environment Incident Reporting Role & Access Administration Interface Criteria Criteria Cloud Starter Kit Privacy Marketing Corporate RACI FIT Site Requirements, Content Publication Priority & Criteria Criteria Performance SLA Interface ITIL Service Management Cloud Template Interface Security Standards - NIST, Client Standards & Best Practices - Governance Policy, Portal & Training Feedback Collection Interface PCI,CSA,TwC, HIPAA,GLBA,Vendor Procurement, Security, Marketing/CMG, Privacy Documentation Interface Cloud Security, Content & Application Services Application Services Security Services Content Management Services Single Sign On (SSO) Identity Management Vulnerability Scanning, Monitoring, & PII Service Desk Integration Cloud Assessment Content Data Classification & Authentication Detection Engine (Communication, Collaboration, Reporting) SIEM with Root Cause Analysis & Risk Content Compatibility & Compliance Decision Cloud Architecture & Design PKI & Certificate Management System Change Management Integration Assessment Engine Cloud Application Site Requirements, Publication Priority & Cloud Patch & Log Management System Continuous Auditing Program Engine Content Conversion & Standardization Development Template Launch Engine IPS/IDS Event Management & Data Loss Secure Cloud to Cloud & Cloud to Cloud Application Delivery Feedback Collection Compliant Content Migration Process Prevention Systems Datacenter VPN Connectivity Managed Cloud Service AntiVirus & AntiMalware System Secure Cloud Platform Content Migration Performance SLA Engine Non-Compliant Content Migration Process Deep Code-Level Security Vulnerability Workflow-Checklist & Approval Engine Cloud Platform Selection Automation Virtualized Application Automated Migration Review Cloud Platform & Hosting Environment System OS Patch AntiVirus Data Loss Single Sign On Cloud Applications Management Management AntiMalware Prevention (SSO) Identity Metering, Billing Backup & Log IPS/IDS Event Management, & Charge Back OS Web Server Database Middleware Content Secure VPN Restore Management Management Authentication Cloud Platform & Infrastructure © Copyright 2012 Hitachi Consulting 10
  • 12. Cloud Framework – Platform & Hosting Environment Cloud Platform & Hosting Environment Cloud Applications OS Web Server Database Middleware Content System OS Patch AntiVirus Data Loss Single Sign On Management Management AntiMalware Prevention (SSO) Identity Metering, Billing & Backup & IPS/IDS Event Management, Charge Back Log Management Secure VPN Restore Management Authentication Cloud Platform & Infrastructure © Copyright 2012 Hitachi Consulting
  • 13. Cloud Framework – Content Management Services Content Management Services Service Desk Integration Content Data Classification (Communication, Collaboration, Reporting) Content Compatibility & Compliance Decision Change Management Integration Engine Site Requirements, Publication Priority & Cloud Content Conversion & Standardization Template Launch Engine Feedback Collection Compliant Content Migration Process Performance SLA Engine Non-Compliant Content Migration Process Cloud Platform Selection Automation Virtualized Application Automated Migration © Copyright 2012 Hitachi Consulting
  • 14. Cloud Framework - Security Services Security Services Single Sign On (SSO) Identity Management & Vulnerability Scanning, Monitoring, & PII Detection Authentication Engine PKI & Certificate Management System SIEM with Root Cause Analysis & Risk Assessment Patch & Log Management System Continuous Auditing Program Engine IPS/IDS Event Management & Data Loss Prevention Secure Cloud to Cloud & Cloud to Datacenter VPN Systems Connectivity Data Encryption & Secure Cloud Platform Content AntiVirus & AntiMalware System Migration Workflow-Checklist & Approval Engine Deep Code-Level Security Vulnerability Review © Copyright 2012 Hitachi Consulting
  • 15. Cloud Framework – Program Governance Framework Program Governance Framework Governance Policy Enforcement Cloud Governance, Certification & Compliance Policy Master Security Policy & Exceptions Security Privacy Hosting Risk Impact Monitoring Cloud App Risk Criteria Criteria Data Class Hosting Criteria Legal Audit Excellence Criteria Privacy Criteria Other Criteria Corporate RACI IT Security Standards - NIST, Client Standards & Best Practices - PCI,CSA,TwC, HIPAA,GLBA,Vendor Procurement, Security, Organization, Privacy © Copyright 2012 Hitachi Consulting
  • 16. Cloud Framework – Content Mgmt, Security, Governance Dashboard Portal Content Management, Security, Governance Dashboard Portal Workflow-Checklist, Certification & Approval Central Cloud Platform Management Console Interface Continuous Audit Program Interface Site Compliance Reporting Dashboard Interface Vulnerability Scanning, Monitoring, & PII Reporting Metering, Billing & Charge-Back Interface Interface Secure Cloud Environment Incident Reporting Role & Access Administration Interface Site Requirements, Content Publication Priority & Cloud Performance SLA Interface Template Interface Governance Policy, Portal & Training Feedback Collection Interface Documentation Interface © Copyright 2012 Hitachi Consulting
  • 17. Summary & Reccomendations  Understand that security in the cloud must be managed  Implement a policy that calculates and quantifies cloud application risk  Evaluate application and data security requirements  Plan and budget for implementing security services  Leverage a framework which covers all the key areas  Implement and adhere to the framework as a roadmap guide to reduce cloud adoption risks © Copyright 2012 Hitachi Consulting
  • 18. Contact us to Learn More about our Cloud Solutions Today Chad M. Lawler, Ph.D. Director of Consulting Services Cloud Computing 14643 Dallas Parkway, Suite 800, Dallas, Texas 75254 Office: 469.221.2894 Email: chad.lawler@hitachiconsulting.com www.hitachiconsulting.com www.cardcloud.com/chadlawler Sign up for a free trial to explore our Cloud Ecosystem Management Platform. Learn More About the Benefits of Hitachi Consulting Cloud Services at www.hitachiconsulting.com/cloud © Copyright 2012 Hitachi Consulting
  • 19. © Copyright 2012 Hitachi Consulting