SlideShare a Scribd company logo
Microsoft©
Information
Security - Cloud & Mobile
Presented by
Vijay Mohire
1
Introduction
2
Information Security and Risk
Management (IS&RM)
• Microsoft’s Information Security (InfoSec) organization
• Responsible for information security risk management
• Information protection, enterprise business continuity
planning
• Accelerate secure and reliable business for Microsoft,
partners and customers
• Publisher of The Security Risk Management Guide
3
ACE team
• The ACE (Assessment, Consulting & Engineering) team
is the assessment arm of Microsoft’s Information
Security & Risk Mgmt. (IS&RM) organization
• Provides security assessment services to both Microsoft
and Microsoft’s enterprise + public sector customers
• Shares and showcases with external customers how
Microsoft manages risks
• Learns and brings back best practices from Microsoft’s
customers
4
My planned contributions to ACE
Assessments
• Risk assessments – Threat modeling, business impact
analysis, threat to vulnerability pairing, qualitative/
quantitative analysis, STREAD, DREAD
• Compliance checks- ISO, HIPAA, PCI
• Due diligence – Security gap analysis, Future state model
design, constraints assessments
• Strategy - Assess the capability, maturity and roadmaps
for investments in Info Sec, business continuity , migration
to cloud
5
My planned contributions to ACE
Consultation
• Assist clients in achieving their goals in areas of
cloud and mobile security
• Provide advice on use of Microsoft’s security tools,
SDL based development methodology
• Assist clients’ in leveraging security frameworks
• Educate in effective use of security best practices
• Help companies in developing & establishing security
practice, programs, RFP/ RFI 6
My planned contributions to ACE
Engineering
• Manage installation, instrumentation of data center
components where security is in scope
•
• Manage security features in electrical cabling, power
units, physical security devices, storage areas
• Triage and delegate security issues, related to
engineering systems, motherboards
7
My planned contributions to ACE
Program Management
• Plan, design, develop strategies for innovative
security features for ―mobile-first, cloud-first‖
environment
• Delegate, monitor project activities based on program
needs and client feedbacks
• Manage red / blue teams related to penetration
testing / ethical hackers
• Work on internal training programs and mentor
juniors in achieving capabilities in Info Sec 8
Info-Sec basics
9
Risk
What is risk ?
• Risk is a function of the
likelihood of a given threat-
source’s exercising a
particular potential
vulnerability, and the
resulting impact of that
adverse event on the
organization/asset
10
Threat-sources
• Accidental / intentional disclosure
• Alteration of licensed IT components
• System Configuration errors
• Network errors
• Equipment malfunction
• Natural disaster
• War
11
Vulnerability
• A flaw or weakness in
system security
procedures, design,
implementation, or
internal controls
• This could be
exercised (accidentally
triggered or intentionally
exploited) and result in
a security breach or a
violation of the system’s
security policy
12
Risk assessment
• Risk is assessed by identifying threats and
vulnerabilities, then determining the likelihood and
impact for each risk
• Broadly two types
1. Quantitative risk assessment
2. Qualitative risk assessment
13
Quantitative risk assessment
• By assigning values to information, systems, business
processes, recovery costs, etc., impact, and therefore
risk, can be measured in terms of direct and indirect
costs
• Mathematically, quantitative risk can be expressed as
Annualized Loss Expectancy (ALE)
14
Quantitative risk assessment
ALE = SLE * ARO
Where:
• ALE is the expected monetary loss that can be
expected for an asset due to a risk being realized over a
one-year period
• SLE (Single Loss Expectancy) is the value of a single
loss of the asset. This is the impact of the loss
•
• ARO (Annualized Rate of Occurrence) is how often the
loss occurs. This is the likelihood
15
Qualitative risk assessments
• Qualitative risk assessments typically give risk
results of ―High‖, Moderate‖ and ―Low‖.
• By providing the impact and likelihood definition
tables and the description of the impact, it is possible
to adequately communicate the assessment to the
organization’s management
16
Impact and likelihood table
Tabulating the variables to determine the criticality
of the risk that need to be prioritized and addressed
17
Relating threats to vulnerabilities
• Establishing the relationship is
a mandatory activity, since
risk is defined as the exercise
of a threat against vulnerability
• This is often called threat-
vulnerability (T-V) pairing
• For instance, a threat of ―flood‖
obviously applies to a
vulnerability of ―lack of
contingency planning‖
18
How is risk managed?
• There are four basic strategies for
managing risk: mitigation,
transference, acceptance and
avoidance
• For each risk management
strategy, the cost associated with
the strategy and the basic steps
for achieving the strategy (known
as the Plan Of Action &
Milestones or POAM) must also
be determined
19
Mitigation
• Mitigation is the most commonly
considered risk management
strategy
• Mitigation involves fixing the
flaw or providing some type of
compensatory control to reduce
the likelihood or impact
associated with the flaw
• A common mitigation for a
technical security flaw is to
install a patch provided by the
vendor 20
Transference
• Transference is the process of allowing another party to
accept the risk on your behalf
• This is not widely done for IT systems, however cloud
models provide an opportunity
• Using SaaS, PaaS cloud models, some amount of risk
is being transferred to CSP – cloud service provider
21
Acceptance
• Acceptance is the practice of
simply allowing the system to
operate with a known risk
• Many low risks are simply
accepted
• Risks that have an extremely
high cost to mitigate are also
often accepted
22
Avoidance
• Avoidance is the practice of
removing the vulnerable
aspect of the system or even
the system itself
• Example is removing a legacy
admin system that is causing
hi-impact errors in operations
23
Communicating risks
24
Communicating risks
• A Plan Of Action & Milestones (POAM) should be
part of the risk assessment report presented to
management
• The POAM is a tool to communicate to management
on the proposed and actual completion of the
implementation of the risk management strategies
25
Communicating risks
26
Risk management process
27
Framing risk
• Risk framing establishes the context and provides a
common perspective on how organizations manage risk
•
• Risk framing, as its principal output, produces a risk
management strategy that addresses how
organizations intend to assess risk, respond to risk, and
monitor risk
• Mainly senior leaders, program manager at Tier 1 & 2
are responsible
28
Risk assessment
• Risk assessment identifies, prioritizes, and
estimates risk to organizational operations (i.e.,
mission, functions, image, and reputation),
organizational assets, individuals, other
organizations, and the Nation
• All tiers provide their reports to the security officer
for further action plan
29
Risk response
• Risk response identifies, evaluates, decides on, and
implements appropriate courses of action to accept,
avoid, mitigate, share, or transfer risk to organizational
operations and assets, individuals, other
organizations, and the Nation
• Typically occurs at Tier 1 or Tier 2, with feedbacks
from Tier 3
30
Risk monitoring
Risk monitoring provides organizations with the means
to:
(i) verify compliance
(ii) determine the ongoing effectiveness of risk
response measures; and
(iii) identify risk-impacting changes to organizational
information systems and environments of operation
31
Information technology continuity plan
Conduct a business impact analysis to identify:
1. Critical IT resources
2. Outage impacts and allowable outage times
3. Protocols to provide uninterrupted power by using
UPS devices, power
4. Store backup data in a secure and protected offsite
location
5. Develop recovery strategies that allow critical IT
resources to be recovered within 24 hours.
6. Document the recovery strategy
32
Microsoft’s impact analysis
33
General risk assessment tools
• National Institute of Standards & Technology (NIST)
Methodology – US Federal based
• OCTAVE
®
- The Software Engineering Institute (SEI) at
Carnegie Mellon University developed the Operationally
Critical, Threat, Asset and Vulnerability Evaluation
(OCTAVE) process
• FRAP - The Facilitated Risk Assessment Process (FRAP)
is the creation of Thomas Peltier. FRAP uses formal
qualitative risk analysis methodologies using Vulnerability
Analysis, Hazard Impact Analysis, Threat Analysis and
Questionnaires
34
General risk assessment tools
• COBRA - The Consultative, Objective and Bi-functional
Risk Analysis (COBRA) process was created by C & A
Systems Security Ltd.. Risk assessment is a business
issue rather than a technical issue, tools that can be
purchased and utilized to perform self-assessments of
risk
• Risk Watch- Uses an expert knowledge database to
walk the user through a risk assessment and provide
reports on compliance as well as advice on managing
the risks
35
Microsoft security stack / tools
36
Claims based identity for Azure
37
Microsoft offerings
38
AD-DS, WIF, AD-FS
39
Azure - gatekeeper design pattern
40
Microsoft’s STRIDE threat categories
• Spoofing identity – pose as another user
• Tampering with data – malicious modification of data
• Repudiation – can the action (prohibited action) be traced?
• Information disclosure – disclose of information to
individuals who aren’t supposed to have it
• Denial of service – deny access to valid users (e.g.
consume all the CPU time)
• Elevation of privilege – unprivileged user gains privileged
access (becomes part of the trusted system)
41
Microsoft’s DREAD model to rank threat’s
severity
• Damage potential: The extent of the damage if
vulnerability is exploited
• Reproducibility: How often an attempt at exploiting
vulnerability works
• Exploitability: How much effort is required? Is
authentication required?
• Affected users: How widespread could the exploit
become?
• Discoverability: The likelihood that the researcher or
hacker will find it
42
Security development lifecycle (SDL)
• SDL is a software development process that helps
developers build secure code, address compliance
43
SDL tools
Requirements tools
• Microsoft Solutions Framework (MSF) for Capability
Maturity Model Integration (CMMI) / Microsoft
Solutions Framework (MSF) for Agile
Design tool
• Microsoft Threat Modeling Tool 2014 / 2016
44
SDL tools
Implementation tools
• banned.h
• Code Analysis for C/C++
• SiteLock ATL Template
• Anti-Cross Site Scripting (Anti-XSS) Library
• FxCop (assemblies)
• Microsoft Code Analysis Tool .NET (CAT.NET) - binary
code analysis for XSS, SQL Injection
45
SDL tools
Verification tools
• BinScope binary analyzer- binary files
• SDL Regex fuzzer – tests reg. exp for DoS
• SDL MiniFuzz file fuzzer-detects file-handling flaws
• Attack surface analyzer-detect changes in OS, ACL,
registry, Active-X control
• Application verifier-runtime verification tool for native
code 46
SDL tools
Release tools
SDL process template- integrates the policy,
process, and tools associated with Microsoft SDL
Process Guidance version 4.1 directly into your
VSTS
47
Azure network security
• VNet for isolation of VMs
• ACL and NSG – for access control at VM and subnet
level
• Azure Virtual Filtering Platform (VFP) exposes an easy-
to-program interface to network agents that act on behalf
of network controllers and packet processing on each
host running in the datacenter
• Service endpoint and azure fabric level security
mechanism
48
Security for mobile-first, cloud-first world
• Office 365 app permissions - ability to approve or revoke
permissions
• Azure AD Identity Protection - prevents the use of
compromised credentials
• Microsoft Cloud App Security - new advanced security
capability
• Customer Lockbox - integrates the customer into the
approval process
• Azure Security Center- Centralized security policy at the
subscription level+ Resource Group level ( tailored as per
workloads)
49
Security for mobile-first, cloud-first world
• Azure Active Directory Identity Protection - detects
suspicious act, user risk severity is calculated and risk-
based policies can be configured at user level
• WindowsAzure.MobileServices.Backend.Security-
security extensions for your .NET mobile backend (
controller code level permissions)hosted in Microsoft
Azure
• System Center 2012 and InTune- mobile device
management (MDM), BYOD policies, remote wipe out
of data in case of theft
50
Industrial standards
51
Industry security management frameworks
( ISO series )
52
Industry security management frameworks
53
Industry security management frameworks
54
The Payment Card Industry Data Security
Standard (PCI DSS)
• PCI DSS provides a baseline of technical and
operational requirements designed to protect
cardholder data
• PCI DSS applies to all entities involved in payment
card processing—including merchants, processors,
acquirers, issuers, and service providers
55
The Payment Card Industry Data Security
Standard (PCI DSS)
56
The Payment Card Industry Data Security
Standard (PCI DSS)
AUDIT TESTING
57
Disclaimer
• Logos, images, text have been referenced from various sources
like NIST, SANS, PCI journals, David Chappell, Microsoft
websites, and internet data that is freely available. Full rights
belong to the individual owners. References are made strictly for
educational and illustration purposes only and for non-commercial
use. Please take advice of original authors before using them. I
am not responsible for any damages, monetary loss arising from
the use of this document
58
Q & A
59
Thank you
60

More Related Content

What's hot

Hands on IT risk assessment
Hands on IT risk assessmentHands on IT risk assessment
Hands on IT risk assessment
George Delikouras
 
IIA Facilitated Risk Workshop
IIA Facilitated Risk Workshop IIA Facilitated Risk Workshop
IIA Facilitated Risk Workshop
Ersoy AKSOY
 
Information Serurity Risk Assessment Basics
Information Serurity Risk Assessment BasicsInformation Serurity Risk Assessment Basics
Information Serurity Risk Assessment Basics
Vidyalankar Institute of Technology
 
Security risk management
Security risk managementSecurity risk management
Security risk management
brijesh singh
 
Assuring Digital Strategic Initiatives by
Assuring Digital Strategic Initiatives by Assuring Digital Strategic Initiatives by
Assuring Digital Strategic Initiatives by
FirstMutualHoldings
 
Risk Assessment Process NIST 800-30
Risk Assessment Process NIST 800-30Risk Assessment Process NIST 800-30
Risk Assessment Process NIST 800-30
timmcguinness
 
DEVELOPING AN ICT RISK REGISTER
DEVELOPING AN ICT RISK REGISTERDEVELOPING AN ICT RISK REGISTER
DEVELOPING AN ICT RISK REGISTER
Christopher Nanchengwa
 
INFORMATION AND COMMUNICATIONS TECHNOLOGY PROGRAM
INFORMATION AND COMMUNICATIONS TECHNOLOGY PROGRAMINFORMATION AND COMMUNICATIONS TECHNOLOGY PROGRAM
INFORMATION AND COMMUNICATIONS TECHNOLOGY PROGRAM
Christopher Nanchengwa
 
Information technology risks
Information technology risksInformation technology risks
Information technology risks
salman butt
 
Lesson 3- Fair Approach
Lesson 3- Fair ApproachLesson 3- Fair Approach
Lesson 3- Fair Approach
MLG College of Learning, Inc
 
Risk Based Security Management
Risk Based Security ManagementRisk Based Security Management
Risk Based Security Management
Luis Martins
 
Ir s 1_2_1_kovacs
Ir s 1_2_1_kovacsIr s 1_2_1_kovacs
Ir s 1_2_1_kovacs
Stefan Kovacs
 
Risk Assessments
Risk AssessmentsRisk Assessments
Risk Assessments
JoAnna Cheshire
 
Technology Risk Management
Technology Risk ManagementTechnology Risk Management
Technology Risk Management
Social Tables
 
Information Security Risk Management
Information Security Risk Management Information Security Risk Management
Information Security Risk Management
Ersoy AKSOY
 
IT Risk Management
IT Risk ManagementIT Risk Management
IT Risk Management
Computer Aid, Inc
 
Risk management in Software Industry
Risk management in Software IndustryRisk management in Software Industry
Risk management in Software Industry
Rehan Akhtar
 
Designing NextGen Threat Identification Solutions
Designing NextGen Threat Identification SolutionsDesigning NextGen Threat Identification Solutions
Designing NextGen Threat Identification Solutions
Arun Prabhakar
 
Introduction to Risk Management Fundamentals
Introduction to Risk Management FundamentalsIntroduction to Risk Management Fundamentals
Introduction to Risk Management Fundamentals
Toño Herrera
 

What's hot (19)

Hands on IT risk assessment
Hands on IT risk assessmentHands on IT risk assessment
Hands on IT risk assessment
 
IIA Facilitated Risk Workshop
IIA Facilitated Risk Workshop IIA Facilitated Risk Workshop
IIA Facilitated Risk Workshop
 
Information Serurity Risk Assessment Basics
Information Serurity Risk Assessment BasicsInformation Serurity Risk Assessment Basics
Information Serurity Risk Assessment Basics
 
Security risk management
Security risk managementSecurity risk management
Security risk management
 
Assuring Digital Strategic Initiatives by
Assuring Digital Strategic Initiatives by Assuring Digital Strategic Initiatives by
Assuring Digital Strategic Initiatives by
 
Risk Assessment Process NIST 800-30
Risk Assessment Process NIST 800-30Risk Assessment Process NIST 800-30
Risk Assessment Process NIST 800-30
 
DEVELOPING AN ICT RISK REGISTER
DEVELOPING AN ICT RISK REGISTERDEVELOPING AN ICT RISK REGISTER
DEVELOPING AN ICT RISK REGISTER
 
INFORMATION AND COMMUNICATIONS TECHNOLOGY PROGRAM
INFORMATION AND COMMUNICATIONS TECHNOLOGY PROGRAMINFORMATION AND COMMUNICATIONS TECHNOLOGY PROGRAM
INFORMATION AND COMMUNICATIONS TECHNOLOGY PROGRAM
 
Information technology risks
Information technology risksInformation technology risks
Information technology risks
 
Lesson 3- Fair Approach
Lesson 3- Fair ApproachLesson 3- Fair Approach
Lesson 3- Fair Approach
 
Risk Based Security Management
Risk Based Security ManagementRisk Based Security Management
Risk Based Security Management
 
Ir s 1_2_1_kovacs
Ir s 1_2_1_kovacsIr s 1_2_1_kovacs
Ir s 1_2_1_kovacs
 
Risk Assessments
Risk AssessmentsRisk Assessments
Risk Assessments
 
Technology Risk Management
Technology Risk ManagementTechnology Risk Management
Technology Risk Management
 
Information Security Risk Management
Information Security Risk Management Information Security Risk Management
Information Security Risk Management
 
IT Risk Management
IT Risk ManagementIT Risk Management
IT Risk Management
 
Risk management in Software Industry
Risk management in Software IndustryRisk management in Software Industry
Risk management in Software Industry
 
Designing NextGen Threat Identification Solutions
Designing NextGen Threat Identification SolutionsDesigning NextGen Threat Identification Solutions
Designing NextGen Threat Identification Solutions
 
Introduction to Risk Management Fundamentals
Introduction to Risk Management FundamentalsIntroduction to Risk Management Fundamentals
Introduction to Risk Management Fundamentals
 

Similar to Microsoft InfoSec for cloud and mobile

Step by-step for risk analysis and management-yaser aljohani
Step by-step for risk analysis and management-yaser aljohaniStep by-step for risk analysis and management-yaser aljohani
Step by-step for risk analysis and management-yaser aljohani
yaseraljohani
 
CISSP 8 Domains.pdf
CISSP 8 Domains.pdfCISSP 8 Domains.pdf
CISSP 8 Domains.pdf
dotco
 
Seccurity_Risk_Management.pptyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyy
Seccurity_Risk_Management.pptyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyySeccurity_Risk_Management.pptyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyy
Seccurity_Risk_Management.pptyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyy
chaudhryzunair4
 
Risk-Management-05012023-025512pm.ppt
Risk-Management-05012023-025512pm.pptRisk-Management-05012023-025512pm.ppt
Risk-Management-05012023-025512pm.ppt
YasirShaikh34
 
Risk Management (1) (1).ppt
Risk Management (1) (1).pptRisk Management (1) (1).ppt
Risk Management (1) (1).ppt
AjjuSingh2
 
Managing Security Risks in Manufacturing
Managing Security Risks in ManufacturingManaging Security Risks in Manufacturing
Managing Security Risks in Manufacturing
William McBorrough
 
Connection can help keep your business secure!
Connection can help keep your business secure!Connection can help keep your business secure!
Connection can help keep your business secure!
Heather Salmons Newswanger
 
Risk Assessment
Risk AssessmentRisk Assessment
Risk Assessment
.AIR UNIVERSITY ISLAMABAD
 
R I S K M A N A G E M E N T
R I S K  M A N A G E M E N TR I S K  M A N A G E M E N T
R I S K M A N A G E M E N T
madhav shirur
 
crisc_wk_2a.pptx
crisc_wk_2a.pptxcrisc_wk_2a.pptx
crisc_wk_2a.pptx
dotco
 
Risk Management
Risk ManagementRisk Management
Risk Management
Saqib Raza
 
Lesson 3
Lesson 3Lesson 3
Project Risk Management
 Project Risk Management Project Risk Management
Project Risk Management
Hayat Denzi
 
OOSE-PRESENTATION.pptx
OOSE-PRESENTATION.pptxOOSE-PRESENTATION.pptx
OOSE-PRESENTATION.pptx
RanjitKdk
 
Webinar - Building Team Efficiency and Effectiveness
Webinar - Building Team Efficiency and EffectivenessWebinar - Building Team Efficiency and Effectiveness
Webinar - Building Team Efficiency and Effectiveness
Invensis Learning
 
Security-Brochure
Security-BrochureSecurity-Brochure
Security-Brochure
Tyler Carlson
 
Security-Brochure
Security-BrochureSecurity-Brochure
Security-Brochure
Prahlad Reddy
 
IS-Risk-Management-Lecture-2.pdf
IS-Risk-Management-Lecture-2.pdfIS-Risk-Management-Lecture-2.pdf
IS-Risk-Management-Lecture-2.pdf
AbdulrafiiMohammed
 
Project Risk management
Project Risk management Project Risk management
Project Risk management
CMA (Dr.) Ashok Panigrahi
 
Risk Management Best Practices
Risk Management Best PracticesRisk Management Best Practices
Risk Management Best Practices
PMILebanonChapter
 

Similar to Microsoft InfoSec for cloud and mobile (20)

Step by-step for risk analysis and management-yaser aljohani
Step by-step for risk analysis and management-yaser aljohaniStep by-step for risk analysis and management-yaser aljohani
Step by-step for risk analysis and management-yaser aljohani
 
CISSP 8 Domains.pdf
CISSP 8 Domains.pdfCISSP 8 Domains.pdf
CISSP 8 Domains.pdf
 
Seccurity_Risk_Management.pptyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyy
Seccurity_Risk_Management.pptyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyySeccurity_Risk_Management.pptyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyy
Seccurity_Risk_Management.pptyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyy
 
Risk-Management-05012023-025512pm.ppt
Risk-Management-05012023-025512pm.pptRisk-Management-05012023-025512pm.ppt
Risk-Management-05012023-025512pm.ppt
 
Risk Management (1) (1).ppt
Risk Management (1) (1).pptRisk Management (1) (1).ppt
Risk Management (1) (1).ppt
 
Managing Security Risks in Manufacturing
Managing Security Risks in ManufacturingManaging Security Risks in Manufacturing
Managing Security Risks in Manufacturing
 
Connection can help keep your business secure!
Connection can help keep your business secure!Connection can help keep your business secure!
Connection can help keep your business secure!
 
Risk Assessment
Risk AssessmentRisk Assessment
Risk Assessment
 
R I S K M A N A G E M E N T
R I S K  M A N A G E M E N TR I S K  M A N A G E M E N T
R I S K M A N A G E M E N T
 
crisc_wk_2a.pptx
crisc_wk_2a.pptxcrisc_wk_2a.pptx
crisc_wk_2a.pptx
 
Risk Management
Risk ManagementRisk Management
Risk Management
 
Lesson 3
Lesson 3Lesson 3
Lesson 3
 
Project Risk Management
 Project Risk Management Project Risk Management
Project Risk Management
 
OOSE-PRESENTATION.pptx
OOSE-PRESENTATION.pptxOOSE-PRESENTATION.pptx
OOSE-PRESENTATION.pptx
 
Webinar - Building Team Efficiency and Effectiveness
Webinar - Building Team Efficiency and EffectivenessWebinar - Building Team Efficiency and Effectiveness
Webinar - Building Team Efficiency and Effectiveness
 
Security-Brochure
Security-BrochureSecurity-Brochure
Security-Brochure
 
Security-Brochure
Security-BrochureSecurity-Brochure
Security-Brochure
 
IS-Risk-Management-Lecture-2.pdf
IS-Risk-Management-Lecture-2.pdfIS-Risk-Management-Lecture-2.pdf
IS-Risk-Management-Lecture-2.pdf
 
Project Risk management
Project Risk management Project Risk management
Project Risk management
 
Risk Management Best Practices
Risk Management Best PracticesRisk Management Best Practices
Risk Management Best Practices
 

More from Vijayananda Mohire

Quantum Algorithms for Electronics - IEEE Certificate
Quantum Algorithms for Electronics - IEEE CertificateQuantum Algorithms for Electronics - IEEE Certificate
Quantum Algorithms for Electronics - IEEE Certificate
Vijayananda Mohire
 
NexGen Solutions for cloud platforms, powered by GenQAI
NexGen Solutions for cloud platforms, powered by GenQAINexGen Solutions for cloud platforms, powered by GenQAI
NexGen Solutions for cloud platforms, powered by GenQAI
Vijayananda Mohire
 
Certificate- Peer Review of Book Chapter on ML
Certificate- Peer Review of Book Chapter on MLCertificate- Peer Review of Book Chapter on ML
Certificate- Peer Review of Book Chapter on ML
Vijayananda Mohire
 
Key projects Data Science and Engineering
Key projects Data Science and EngineeringKey projects Data Science and Engineering
Key projects Data Science and Engineering
Vijayananda Mohire
 
Key projects Data Science and Engineering
Key projects Data Science and EngineeringKey projects Data Science and Engineering
Key projects Data Science and Engineering
Vijayananda Mohire
 
Bhadale IT Hub-Multi Cloud and Multi QAI
Bhadale IT Hub-Multi Cloud and Multi QAIBhadale IT Hub-Multi Cloud and Multi QAI
Bhadale IT Hub-Multi Cloud and Multi QAI
Vijayananda Mohire
 
My key hands-on projects in Quantum, and QAI
My key hands-on projects in Quantum, and QAIMy key hands-on projects in Quantum, and QAI
My key hands-on projects in Quantum, and QAI
Vijayananda Mohire
 
Azure Quantum Workspace for developing Q# based quantum circuits
Azure Quantum Workspace for developing Q# based quantum circuitsAzure Quantum Workspace for developing Q# based quantum circuits
Azure Quantum Workspace for developing Q# based quantum circuits
Vijayananda Mohire
 
Key projects in AI, ML and Generative AI
Key projects in AI, ML and Generative AIKey projects in AI, ML and Generative AI
Key projects in AI, ML and Generative AI
Vijayananda Mohire
 
My Journey towards Artificial Intelligence
My Journey towards Artificial IntelligenceMy Journey towards Artificial Intelligence
My Journey towards Artificial Intelligence
Vijayananda Mohire
 
Bhadale IT Cloud Solutions for Agriculture
Bhadale IT Cloud Solutions for AgricultureBhadale IT Cloud Solutions for Agriculture
Bhadale IT Cloud Solutions for Agriculture
Vijayananda Mohire
 
Bhadale IT Cloud Solutions for Agriculture
Bhadale IT Cloud Solutions for AgricultureBhadale IT Cloud Solutions for Agriculture
Bhadale IT Cloud Solutions for Agriculture
Vijayananda Mohire
 
Bhadale IT Intel and Azure Cloud Offerings
Bhadale IT Intel and Azure Cloud OfferingsBhadale IT Intel and Azure Cloud Offerings
Bhadale IT Intel and Azure Cloud Offerings
Vijayananda Mohire
 
GitHub Copilot-vijaymohire
GitHub Copilot-vijaymohireGitHub Copilot-vijaymohire
GitHub Copilot-vijaymohire
Vijayananda Mohire
 
Practical ChatGPT From Use Cases to Prompt Engineering & Ethical Implications
Practical ChatGPT From Use Cases to Prompt Engineering & Ethical ImplicationsPractical ChatGPT From Use Cases to Prompt Engineering & Ethical Implications
Practical ChatGPT From Use Cases to Prompt Engineering & Ethical Implications
Vijayananda Mohire
 
Cloud Infrastructure - Partner Delivery Accelerator (APAC)
Cloud Infrastructure - Partner Delivery Accelerator (APAC)Cloud Infrastructure - Partner Delivery Accelerator (APAC)
Cloud Infrastructure - Partner Delivery Accelerator (APAC)
Vijayananda Mohire
 
Red Hat Sales Specialist - Red Hat Enterprise Linux
Red Hat Sales Specialist - Red Hat Enterprise LinuxRed Hat Sales Specialist - Red Hat Enterprise Linux
Red Hat Sales Specialist - Red Hat Enterprise Linux
Vijayananda Mohire
 
RedHat_Transcript_Jan_2024
RedHat_Transcript_Jan_2024RedHat_Transcript_Jan_2024
RedHat_Transcript_Jan_2024
Vijayananda Mohire
 
Generative AI Business Transformation
Generative AI Business TransformationGenerative AI Business Transformation
Generative AI Business Transformation
Vijayananda Mohire
 
Microsoft Learn Transcript Jan 2024- vijaymohire
Microsoft Learn Transcript Jan 2024- vijaymohireMicrosoft Learn Transcript Jan 2024- vijaymohire
Microsoft Learn Transcript Jan 2024- vijaymohire
Vijayananda Mohire
 

More from Vijayananda Mohire (20)

Quantum Algorithms for Electronics - IEEE Certificate
Quantum Algorithms for Electronics - IEEE CertificateQuantum Algorithms for Electronics - IEEE Certificate
Quantum Algorithms for Electronics - IEEE Certificate
 
NexGen Solutions for cloud platforms, powered by GenQAI
NexGen Solutions for cloud platforms, powered by GenQAINexGen Solutions for cloud platforms, powered by GenQAI
NexGen Solutions for cloud platforms, powered by GenQAI
 
Certificate- Peer Review of Book Chapter on ML
Certificate- Peer Review of Book Chapter on MLCertificate- Peer Review of Book Chapter on ML
Certificate- Peer Review of Book Chapter on ML
 
Key projects Data Science and Engineering
Key projects Data Science and EngineeringKey projects Data Science and Engineering
Key projects Data Science and Engineering
 
Key projects Data Science and Engineering
Key projects Data Science and EngineeringKey projects Data Science and Engineering
Key projects Data Science and Engineering
 
Bhadale IT Hub-Multi Cloud and Multi QAI
Bhadale IT Hub-Multi Cloud and Multi QAIBhadale IT Hub-Multi Cloud and Multi QAI
Bhadale IT Hub-Multi Cloud and Multi QAI
 
My key hands-on projects in Quantum, and QAI
My key hands-on projects in Quantum, and QAIMy key hands-on projects in Quantum, and QAI
My key hands-on projects in Quantum, and QAI
 
Azure Quantum Workspace for developing Q# based quantum circuits
Azure Quantum Workspace for developing Q# based quantum circuitsAzure Quantum Workspace for developing Q# based quantum circuits
Azure Quantum Workspace for developing Q# based quantum circuits
 
Key projects in AI, ML and Generative AI
Key projects in AI, ML and Generative AIKey projects in AI, ML and Generative AI
Key projects in AI, ML and Generative AI
 
My Journey towards Artificial Intelligence
My Journey towards Artificial IntelligenceMy Journey towards Artificial Intelligence
My Journey towards Artificial Intelligence
 
Bhadale IT Cloud Solutions for Agriculture
Bhadale IT Cloud Solutions for AgricultureBhadale IT Cloud Solutions for Agriculture
Bhadale IT Cloud Solutions for Agriculture
 
Bhadale IT Cloud Solutions for Agriculture
Bhadale IT Cloud Solutions for AgricultureBhadale IT Cloud Solutions for Agriculture
Bhadale IT Cloud Solutions for Agriculture
 
Bhadale IT Intel and Azure Cloud Offerings
Bhadale IT Intel and Azure Cloud OfferingsBhadale IT Intel and Azure Cloud Offerings
Bhadale IT Intel and Azure Cloud Offerings
 
GitHub Copilot-vijaymohire
GitHub Copilot-vijaymohireGitHub Copilot-vijaymohire
GitHub Copilot-vijaymohire
 
Practical ChatGPT From Use Cases to Prompt Engineering & Ethical Implications
Practical ChatGPT From Use Cases to Prompt Engineering & Ethical ImplicationsPractical ChatGPT From Use Cases to Prompt Engineering & Ethical Implications
Practical ChatGPT From Use Cases to Prompt Engineering & Ethical Implications
 
Cloud Infrastructure - Partner Delivery Accelerator (APAC)
Cloud Infrastructure - Partner Delivery Accelerator (APAC)Cloud Infrastructure - Partner Delivery Accelerator (APAC)
Cloud Infrastructure - Partner Delivery Accelerator (APAC)
 
Red Hat Sales Specialist - Red Hat Enterprise Linux
Red Hat Sales Specialist - Red Hat Enterprise LinuxRed Hat Sales Specialist - Red Hat Enterprise Linux
Red Hat Sales Specialist - Red Hat Enterprise Linux
 
RedHat_Transcript_Jan_2024
RedHat_Transcript_Jan_2024RedHat_Transcript_Jan_2024
RedHat_Transcript_Jan_2024
 
Generative AI Business Transformation
Generative AI Business TransformationGenerative AI Business Transformation
Generative AI Business Transformation
 
Microsoft Learn Transcript Jan 2024- vijaymohire
Microsoft Learn Transcript Jan 2024- vijaymohireMicrosoft Learn Transcript Jan 2024- vijaymohire
Microsoft Learn Transcript Jan 2024- vijaymohire
 

Recently uploaded

Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
Pixlogix Infotech
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
Tomaz Bratanic
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
Infrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI modelsInfrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI models
Zilliz
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
IndexBug
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
Zilliz
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
Zilliz
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
Mariano Tinti
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 

Recently uploaded (20)

Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
Infrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI modelsInfrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI models
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 

Microsoft InfoSec for cloud and mobile

  • 1. Microsoft© Information Security - Cloud & Mobile Presented by Vijay Mohire 1
  • 3. Information Security and Risk Management (IS&RM) • Microsoft’s Information Security (InfoSec) organization • Responsible for information security risk management • Information protection, enterprise business continuity planning • Accelerate secure and reliable business for Microsoft, partners and customers • Publisher of The Security Risk Management Guide 3
  • 4. ACE team • The ACE (Assessment, Consulting & Engineering) team is the assessment arm of Microsoft’s Information Security & Risk Mgmt. (IS&RM) organization • Provides security assessment services to both Microsoft and Microsoft’s enterprise + public sector customers • Shares and showcases with external customers how Microsoft manages risks • Learns and brings back best practices from Microsoft’s customers 4
  • 5. My planned contributions to ACE Assessments • Risk assessments – Threat modeling, business impact analysis, threat to vulnerability pairing, qualitative/ quantitative analysis, STREAD, DREAD • Compliance checks- ISO, HIPAA, PCI • Due diligence – Security gap analysis, Future state model design, constraints assessments • Strategy - Assess the capability, maturity and roadmaps for investments in Info Sec, business continuity , migration to cloud 5
  • 6. My planned contributions to ACE Consultation • Assist clients in achieving their goals in areas of cloud and mobile security • Provide advice on use of Microsoft’s security tools, SDL based development methodology • Assist clients’ in leveraging security frameworks • Educate in effective use of security best practices • Help companies in developing & establishing security practice, programs, RFP/ RFI 6
  • 7. My planned contributions to ACE Engineering • Manage installation, instrumentation of data center components where security is in scope • • Manage security features in electrical cabling, power units, physical security devices, storage areas • Triage and delegate security issues, related to engineering systems, motherboards 7
  • 8. My planned contributions to ACE Program Management • Plan, design, develop strategies for innovative security features for ―mobile-first, cloud-first‖ environment • Delegate, monitor project activities based on program needs and client feedbacks • Manage red / blue teams related to penetration testing / ethical hackers • Work on internal training programs and mentor juniors in achieving capabilities in Info Sec 8
  • 10. Risk What is risk ? • Risk is a function of the likelihood of a given threat- source’s exercising a particular potential vulnerability, and the resulting impact of that adverse event on the organization/asset 10
  • 11. Threat-sources • Accidental / intentional disclosure • Alteration of licensed IT components • System Configuration errors • Network errors • Equipment malfunction • Natural disaster • War 11
  • 12. Vulnerability • A flaw or weakness in system security procedures, design, implementation, or internal controls • This could be exercised (accidentally triggered or intentionally exploited) and result in a security breach or a violation of the system’s security policy 12
  • 13. Risk assessment • Risk is assessed by identifying threats and vulnerabilities, then determining the likelihood and impact for each risk • Broadly two types 1. Quantitative risk assessment 2. Qualitative risk assessment 13
  • 14. Quantitative risk assessment • By assigning values to information, systems, business processes, recovery costs, etc., impact, and therefore risk, can be measured in terms of direct and indirect costs • Mathematically, quantitative risk can be expressed as Annualized Loss Expectancy (ALE) 14
  • 15. Quantitative risk assessment ALE = SLE * ARO Where: • ALE is the expected monetary loss that can be expected for an asset due to a risk being realized over a one-year period • SLE (Single Loss Expectancy) is the value of a single loss of the asset. This is the impact of the loss • • ARO (Annualized Rate of Occurrence) is how often the loss occurs. This is the likelihood 15
  • 16. Qualitative risk assessments • Qualitative risk assessments typically give risk results of ―High‖, Moderate‖ and ―Low‖. • By providing the impact and likelihood definition tables and the description of the impact, it is possible to adequately communicate the assessment to the organization’s management 16
  • 17. Impact and likelihood table Tabulating the variables to determine the criticality of the risk that need to be prioritized and addressed 17
  • 18. Relating threats to vulnerabilities • Establishing the relationship is a mandatory activity, since risk is defined as the exercise of a threat against vulnerability • This is often called threat- vulnerability (T-V) pairing • For instance, a threat of ―flood‖ obviously applies to a vulnerability of ―lack of contingency planning‖ 18
  • 19. How is risk managed? • There are four basic strategies for managing risk: mitigation, transference, acceptance and avoidance • For each risk management strategy, the cost associated with the strategy and the basic steps for achieving the strategy (known as the Plan Of Action & Milestones or POAM) must also be determined 19
  • 20. Mitigation • Mitigation is the most commonly considered risk management strategy • Mitigation involves fixing the flaw or providing some type of compensatory control to reduce the likelihood or impact associated with the flaw • A common mitigation for a technical security flaw is to install a patch provided by the vendor 20
  • 21. Transference • Transference is the process of allowing another party to accept the risk on your behalf • This is not widely done for IT systems, however cloud models provide an opportunity • Using SaaS, PaaS cloud models, some amount of risk is being transferred to CSP – cloud service provider 21
  • 22. Acceptance • Acceptance is the practice of simply allowing the system to operate with a known risk • Many low risks are simply accepted • Risks that have an extremely high cost to mitigate are also often accepted 22
  • 23. Avoidance • Avoidance is the practice of removing the vulnerable aspect of the system or even the system itself • Example is removing a legacy admin system that is causing hi-impact errors in operations 23
  • 25. Communicating risks • A Plan Of Action & Milestones (POAM) should be part of the risk assessment report presented to management • The POAM is a tool to communicate to management on the proposed and actual completion of the implementation of the risk management strategies 25
  • 28. Framing risk • Risk framing establishes the context and provides a common perspective on how organizations manage risk • • Risk framing, as its principal output, produces a risk management strategy that addresses how organizations intend to assess risk, respond to risk, and monitor risk • Mainly senior leaders, program manager at Tier 1 & 2 are responsible 28
  • 29. Risk assessment • Risk assessment identifies, prioritizes, and estimates risk to organizational operations (i.e., mission, functions, image, and reputation), organizational assets, individuals, other organizations, and the Nation • All tiers provide their reports to the security officer for further action plan 29
  • 30. Risk response • Risk response identifies, evaluates, decides on, and implements appropriate courses of action to accept, avoid, mitigate, share, or transfer risk to organizational operations and assets, individuals, other organizations, and the Nation • Typically occurs at Tier 1 or Tier 2, with feedbacks from Tier 3 30
  • 31. Risk monitoring Risk monitoring provides organizations with the means to: (i) verify compliance (ii) determine the ongoing effectiveness of risk response measures; and (iii) identify risk-impacting changes to organizational information systems and environments of operation 31
  • 32. Information technology continuity plan Conduct a business impact analysis to identify: 1. Critical IT resources 2. Outage impacts and allowable outage times 3. Protocols to provide uninterrupted power by using UPS devices, power 4. Store backup data in a secure and protected offsite location 5. Develop recovery strategies that allow critical IT resources to be recovered within 24 hours. 6. Document the recovery strategy 32
  • 34. General risk assessment tools • National Institute of Standards & Technology (NIST) Methodology – US Federal based • OCTAVE ® - The Software Engineering Institute (SEI) at Carnegie Mellon University developed the Operationally Critical, Threat, Asset and Vulnerability Evaluation (OCTAVE) process • FRAP - The Facilitated Risk Assessment Process (FRAP) is the creation of Thomas Peltier. FRAP uses formal qualitative risk analysis methodologies using Vulnerability Analysis, Hazard Impact Analysis, Threat Analysis and Questionnaires 34
  • 35. General risk assessment tools • COBRA - The Consultative, Objective and Bi-functional Risk Analysis (COBRA) process was created by C & A Systems Security Ltd.. Risk assessment is a business issue rather than a technical issue, tools that can be purchased and utilized to perform self-assessments of risk • Risk Watch- Uses an expert knowledge database to walk the user through a risk assessment and provide reports on compliance as well as advice on managing the risks 35
  • 37. Claims based identity for Azure 37
  • 40. Azure - gatekeeper design pattern 40
  • 41. Microsoft’s STRIDE threat categories • Spoofing identity – pose as another user • Tampering with data – malicious modification of data • Repudiation – can the action (prohibited action) be traced? • Information disclosure – disclose of information to individuals who aren’t supposed to have it • Denial of service – deny access to valid users (e.g. consume all the CPU time) • Elevation of privilege – unprivileged user gains privileged access (becomes part of the trusted system) 41
  • 42. Microsoft’s DREAD model to rank threat’s severity • Damage potential: The extent of the damage if vulnerability is exploited • Reproducibility: How often an attempt at exploiting vulnerability works • Exploitability: How much effort is required? Is authentication required? • Affected users: How widespread could the exploit become? • Discoverability: The likelihood that the researcher or hacker will find it 42
  • 43. Security development lifecycle (SDL) • SDL is a software development process that helps developers build secure code, address compliance 43
  • 44. SDL tools Requirements tools • Microsoft Solutions Framework (MSF) for Capability Maturity Model Integration (CMMI) / Microsoft Solutions Framework (MSF) for Agile Design tool • Microsoft Threat Modeling Tool 2014 / 2016 44
  • 45. SDL tools Implementation tools • banned.h • Code Analysis for C/C++ • SiteLock ATL Template • Anti-Cross Site Scripting (Anti-XSS) Library • FxCop (assemblies) • Microsoft Code Analysis Tool .NET (CAT.NET) - binary code analysis for XSS, SQL Injection 45
  • 46. SDL tools Verification tools • BinScope binary analyzer- binary files • SDL Regex fuzzer – tests reg. exp for DoS • SDL MiniFuzz file fuzzer-detects file-handling flaws • Attack surface analyzer-detect changes in OS, ACL, registry, Active-X control • Application verifier-runtime verification tool for native code 46
  • 47. SDL tools Release tools SDL process template- integrates the policy, process, and tools associated with Microsoft SDL Process Guidance version 4.1 directly into your VSTS 47
  • 48. Azure network security • VNet for isolation of VMs • ACL and NSG – for access control at VM and subnet level • Azure Virtual Filtering Platform (VFP) exposes an easy- to-program interface to network agents that act on behalf of network controllers and packet processing on each host running in the datacenter • Service endpoint and azure fabric level security mechanism 48
  • 49. Security for mobile-first, cloud-first world • Office 365 app permissions - ability to approve or revoke permissions • Azure AD Identity Protection - prevents the use of compromised credentials • Microsoft Cloud App Security - new advanced security capability • Customer Lockbox - integrates the customer into the approval process • Azure Security Center- Centralized security policy at the subscription level+ Resource Group level ( tailored as per workloads) 49
  • 50. Security for mobile-first, cloud-first world • Azure Active Directory Identity Protection - detects suspicious act, user risk severity is calculated and risk- based policies can be configured at user level • WindowsAzure.MobileServices.Backend.Security- security extensions for your .NET mobile backend ( controller code level permissions)hosted in Microsoft Azure • System Center 2012 and InTune- mobile device management (MDM), BYOD policies, remote wipe out of data in case of theft 50
  • 52. Industry security management frameworks ( ISO series ) 52
  • 55. The Payment Card Industry Data Security Standard (PCI DSS) • PCI DSS provides a baseline of technical and operational requirements designed to protect cardholder data • PCI DSS applies to all entities involved in payment card processing—including merchants, processors, acquirers, issuers, and service providers 55
  • 56. The Payment Card Industry Data Security Standard (PCI DSS) 56
  • 57. The Payment Card Industry Data Security Standard (PCI DSS) AUDIT TESTING 57
  • 58. Disclaimer • Logos, images, text have been referenced from various sources like NIST, SANS, PCI journals, David Chappell, Microsoft websites, and internet data that is freely available. Full rights belong to the individual owners. References are made strictly for educational and illustration purposes only and for non-commercial use. Please take advice of original authors before using them. I am not responsible for any damages, monetary loss arising from the use of this document 58