SlideShare a Scribd company logo
Protect Your Infrastructure: 
The Basics of Cloud Security 
Please direct any questions to us 
via Twitter using hashtag 
#fpwebinar 
#fpwebinar
Protect Your Infrastructure: 
The Basics of Cloud Security 
#fpwebinar
We want to hear from you! 
Please direct any questions to us 
via Twitter using hashtag 
#fpwebinar 
#fpwebinar
What’s in this Fpwebinar? 
! 
Physical security - gated parking, cameras, sensors, lack of signage, biometrics, etc. 
Network security - Routing protocols, patching, firewalls, logging, etc. 
Application security - port access, HTTPS, segmentation, sync user accounts, etc. 
#fpwebinar
Chris Schwab 
President 
Matt Kinder 
Infrastructure Manager 
#fpwebinar
Types of Security: 
! 
! 
Physical, Network and Application 
#fpwebinar
Physical Security 
! 
! 
Gated parking 
Security cameras 
Lack of signage 
Staffed or unstaffed 
Door sensors 
Data Centers go to a great extent to cloak even the parking garage 
#fpwebinar
Physical Security 
! 
! 
Check-in for access using a badge or biometrics 
The more money you spend, the easier it is to audit and control your physical security 
Most breeches occur when someone is standing in front of the system 
#fpwebinar
#fpwebinar 
Physical Security 
! 
! 
Create a fly-trap area for deliveries, etc.
#fpwebinar 
Network Security 
! 
Edge of network, Routing protocol, Server Security
#fpwebinar 
Network Security 
! 
! 
Once in and servers are set up, 
it is paramount to use rigid blueprints for everything you stand up
#fpwebinar 
Network Security 
! 
Edge of network - where public access begins 
Routing protocol protects from the outside in 
Maintain patch levels 
Firewall layers can be as robust or narrow as you’d like 
Keep up with bugs
Network Logging 
! 
! 
Most enterprises have the ability to log every transaction 
Retain as much data as you need 
Flag any keywords or anomalies if possible 
If an event or breech occurs, you’ll know quickly if logging is tied into alerting 
Do your homework before deployment 
Make sure you have all information you need 
#fpwebinar
Application Security 
! 
! 
Port access - only keep needed ports open 
Audit open ports and close any not being used 
IDS/IPS behind firewalls only see traffic getting through 
#fpwebinar
Application Security 
! 
HTTPS - Get an SSL Certificate 
Make sure SQL is not accessible directly from the web 
Segmentation will reduce risk 
Sync user accounts 
Implement and audit virus/malware scanner 
#fpwebinar
#fpwebinar 
Summary 
! 
Described types of security: Physical, Network and Application 
Physical security - gated parking, cameras, sensors, lack of signage, biometrics, etc. 
Network security - Routing protocols, patching, firewalls, logging, etc. 
Application security - port access, HTTPS, segmentation, sync user accounts, etc. 
Follow processes, audit processes
Protect Your Infrastructure: 
The Basics of Cloud Security 
Q&A 
Please direct any questions to us 
via Twitter using hashtag 
#fpwebinar 
#fpwebinar
Thank you! 
! 
Twitter @fpweb • Marketing@fpweb.net • www.fpweb.net 
! 
Please fill out the survey as you exit the webinar and help us choose the next topic! 
#fpwebinar

More Related Content

What's hot

PhD-Guidance-in-Dependable-and-Secure-Computing
PhD-Guidance-in-Dependable-and-Secure-ComputingPhD-Guidance-in-Dependable-and-Secure-Computing
PhD-Guidance-in-Dependable-and-Secure-Computing
Phdtopiccom
 
Businessday okt 2016 - WatchGuard
Businessday okt 2016 - WatchGuardBusinessday okt 2016 - WatchGuard
Businessday okt 2016 - WatchGuard
Marketing Team
 
Anatomy of an Attack - Sophos Day Belux 2014
Anatomy of an Attack - Sophos Day Belux 2014Anatomy of an Attack - Sophos Day Belux 2014
Anatomy of an Attack - Sophos Day Belux 2014
Sophos Benelux
 
4 Steps to Optimal Endpoint Settings
4 Steps to Optimal Endpoint Settings4 Steps to Optimal Endpoint Settings
4 Steps to Optimal Endpoint Settings
Sophos
 
Top 6 Technology Threats to Your Long Term Care Organization
Top 6 Technology Threats to Your Long Term Care Organization Top 6 Technology Threats to Your Long Term Care Organization
Top 6 Technology Threats to Your Long Term Care Organization
Gross, Mendelsohn & Associates
 
Hacker Tricks: How You Can Protect Yourself
Hacker Tricks: How You Can Protect YourselfHacker Tricks: How You Can Protect Yourself
Hacker Tricks: How You Can Protect Yourself
SwiftTech Solutions, Inc.
 
CIS Security Benchmark
CIS Security BenchmarkCIS Security Benchmark
CIS Security Benchmark
Rahul Khengare
 
PhD-Guidance-in-Information-Security
PhD-Guidance-in-Information-SecurityPhD-Guidance-in-Information-Security
PhD-Guidance-in-Information-Security
Phdtopiccom
 
85% of App Store Apps Fail OWASP Mobile Top 10: Are you exposed?
85% of App Store Apps Fail OWASP Mobile Top 10: Are you exposed?85% of App Store Apps Fail OWASP Mobile Top 10: Are you exposed?
85% of App Store Apps Fail OWASP Mobile Top 10: Are you exposed?
NowSecure
 
Check Point Infinity powered by R80.10
Check Point Infinity powered by R80.10Check Point Infinity powered by R80.10
Check Point Infinity powered by R80.10
MarketingArrowECS_CZ
 
Symantec: čas přítomný a budoucí
Symantec: čas přítomný a budoucíSymantec: čas přítomný a budoucí
Symantec: čas přítomný a budoucí
MarketingArrowECS_CZ
 
Zabezpečení mobilních zařízení ve firemním prostředí
Zabezpečení mobilních zařízení ve firemním prostředíZabezpečení mobilních zařízení ve firemním prostředí
Zabezpečení mobilních zařízení ve firemním prostředí
MarketingArrowECS_CZ
 
Cyberoam Firewall Presentation
Cyberoam Firewall PresentationCyberoam Firewall Presentation
Cyberoam Firewall Presentation
Manoj Kumar Mishra
 
Cyberwar poster english
Cyberwar poster englishCyberwar poster english
Cyberwar poster englishAbbas Badran
 
Check Point NGFW
Check Point NGFWCheck Point NGFW
Check Point NGFW
Group of company MUK
 
INFINITY Presentation
INFINITY PresentationINFINITY Presentation
INFINITY Presentation
Cristian Garcia G.
 
WatchGuard - Security event juni 2016
WatchGuard - Security event juni 2016WatchGuard - Security event juni 2016
WatchGuard - Security event juni 2016
Marketing Team
 
It security and awareness training 5 10-2018
It security and awareness training 5 10-2018It security and awareness training 5 10-2018
It security and awareness training 5 10-2018
jubke
 
Detect and Respond to Threats Better with IBM Security App Exchange Partners
Detect and Respond to Threats Better with IBM Security App Exchange PartnersDetect and Respond to Threats Better with IBM Security App Exchange Partners
Detect and Respond to Threats Better with IBM Security App Exchange Partners
IBM Security
 
160415 lan and-wan-secure-access-architecture
160415 lan and-wan-secure-access-architecture160415 lan and-wan-secure-access-architecture
160415 lan and-wan-secure-access-architecture
Lan & Wan Solutions
 

What's hot (20)

PhD-Guidance-in-Dependable-and-Secure-Computing
PhD-Guidance-in-Dependable-and-Secure-ComputingPhD-Guidance-in-Dependable-and-Secure-Computing
PhD-Guidance-in-Dependable-and-Secure-Computing
 
Businessday okt 2016 - WatchGuard
Businessday okt 2016 - WatchGuardBusinessday okt 2016 - WatchGuard
Businessday okt 2016 - WatchGuard
 
Anatomy of an Attack - Sophos Day Belux 2014
Anatomy of an Attack - Sophos Day Belux 2014Anatomy of an Attack - Sophos Day Belux 2014
Anatomy of an Attack - Sophos Day Belux 2014
 
4 Steps to Optimal Endpoint Settings
4 Steps to Optimal Endpoint Settings4 Steps to Optimal Endpoint Settings
4 Steps to Optimal Endpoint Settings
 
Top 6 Technology Threats to Your Long Term Care Organization
Top 6 Technology Threats to Your Long Term Care Organization Top 6 Technology Threats to Your Long Term Care Organization
Top 6 Technology Threats to Your Long Term Care Organization
 
Hacker Tricks: How You Can Protect Yourself
Hacker Tricks: How You Can Protect YourselfHacker Tricks: How You Can Protect Yourself
Hacker Tricks: How You Can Protect Yourself
 
CIS Security Benchmark
CIS Security BenchmarkCIS Security Benchmark
CIS Security Benchmark
 
PhD-Guidance-in-Information-Security
PhD-Guidance-in-Information-SecurityPhD-Guidance-in-Information-Security
PhD-Guidance-in-Information-Security
 
85% of App Store Apps Fail OWASP Mobile Top 10: Are you exposed?
85% of App Store Apps Fail OWASP Mobile Top 10: Are you exposed?85% of App Store Apps Fail OWASP Mobile Top 10: Are you exposed?
85% of App Store Apps Fail OWASP Mobile Top 10: Are you exposed?
 
Check Point Infinity powered by R80.10
Check Point Infinity powered by R80.10Check Point Infinity powered by R80.10
Check Point Infinity powered by R80.10
 
Symantec: čas přítomný a budoucí
Symantec: čas přítomný a budoucíSymantec: čas přítomný a budoucí
Symantec: čas přítomný a budoucí
 
Zabezpečení mobilních zařízení ve firemním prostředí
Zabezpečení mobilních zařízení ve firemním prostředíZabezpečení mobilních zařízení ve firemním prostředí
Zabezpečení mobilních zařízení ve firemním prostředí
 
Cyberoam Firewall Presentation
Cyberoam Firewall PresentationCyberoam Firewall Presentation
Cyberoam Firewall Presentation
 
Cyberwar poster english
Cyberwar poster englishCyberwar poster english
Cyberwar poster english
 
Check Point NGFW
Check Point NGFWCheck Point NGFW
Check Point NGFW
 
INFINITY Presentation
INFINITY PresentationINFINITY Presentation
INFINITY Presentation
 
WatchGuard - Security event juni 2016
WatchGuard - Security event juni 2016WatchGuard - Security event juni 2016
WatchGuard - Security event juni 2016
 
It security and awareness training 5 10-2018
It security and awareness training 5 10-2018It security and awareness training 5 10-2018
It security and awareness training 5 10-2018
 
Detect and Respond to Threats Better with IBM Security App Exchange Partners
Detect and Respond to Threats Better with IBM Security App Exchange PartnersDetect and Respond to Threats Better with IBM Security App Exchange Partners
Detect and Respond to Threats Better with IBM Security App Exchange Partners
 
160415 lan and-wan-secure-access-architecture
160415 lan and-wan-secure-access-architecture160415 lan and-wan-secure-access-architecture
160415 lan and-wan-secure-access-architecture
 

Similar to Protect Your Infrastructure: Basics of Cloud Security | Fpwebinar

Overview of Information Security & Privacy
Overview of Information Security & PrivacyOverview of Information Security & Privacy
Overview of Information Security & Privacy
Nawanan Theera-Ampornpunt
 
Cybercrime future perspectives
Cybercrime future perspectivesCybercrime future perspectives
Cybercrime future perspectives
SensePost
 
Estratégia de segurança da Cisco (um diferencial para seus negócios)
Estratégia de segurança da Cisco (um diferencial para seus negócios)Estratégia de segurança da Cisco (um diferencial para seus negócios)
Estratégia de segurança da Cisco (um diferencial para seus negócios)
Cisco do Brasil
 
Making Log Data Useful: SIEM and Log Management Together by Dr. Anton Chuvakin
Making Log Data Useful: SIEM and Log Management Together by Dr. Anton ChuvakinMaking Log Data Useful: SIEM and Log Management Together by Dr. Anton Chuvakin
Making Log Data Useful: SIEM and Log Management Together by Dr. Anton Chuvakin
Anton Chuvakin
 
Making Log Data Useful: SIEM and Log Management Together
Making Log Data Useful: SIEM and Log Management TogetherMaking Log Data Useful: SIEM and Log Management Together
Making Log Data Useful: SIEM and Log Management Together
Anton Chuvakin
 
SELJE - VFP and IT Security.pptx
SELJE - VFP and IT Security.pptxSELJE - VFP and IT Security.pptx
SELJE - VFP and IT Security.pptx
Eric Selje
 
Employing automated security systems in critical facilities.pptx
Employing automated security systems in critical facilities.pptxEmploying automated security systems in critical facilities.pptx
Employing automated security systems in critical facilities.pptx
Jeffrey Lam
 
Secure Your Mobile Apps
Secure Your Mobile AppsSecure Your Mobile Apps
Secure Your Mobile Apps
primomh
 
Agile Chennai 2022 - Shyam Sundar | Everything there is to know about Cyber s...
Agile Chennai 2022 - Shyam Sundar | Everything there is to know about Cyber s...Agile Chennai 2022 - Shyam Sundar | Everything there is to know about Cyber s...
Agile Chennai 2022 - Shyam Sundar | Everything there is to know about Cyber s...
AgileNetwork
 
Elementary-Information-Security-Practices
Elementary-Information-Security-PracticesElementary-Information-Security-Practices
Elementary-Information-Security-PracticesOctogence
 
Mobile security services 2012
Mobile security services 2012Mobile security services 2012
Mobile security services 2012Tjylen Veselyj
 
Developing Secure Applications and Defending Against Common Attacks
Developing Secure Applications and Defending Against Common AttacksDeveloping Secure Applications and Defending Against Common Attacks
Developing Secure Applications and Defending Against Common Attacks
PayPalX Developer Network
 
Securing Your Business
Securing Your BusinessSecuring Your Business
Securing Your Business
Jose L. Quiñones-Borrero
 
Slideshare fintech-may26th-def
Slideshare fintech-may26th-defSlideshare fintech-may26th-def
Slideshare fintech-may26th-def
Qafis
 
Webinar: Beyond Two-Factor: Secure Access Control for Office 365
 Webinar: Beyond Two-Factor: Secure Access Control for Office 365 Webinar: Beyond Two-Factor: Secure Access Control for Office 365
Webinar: Beyond Two-Factor: Secure Access Control for Office 365
SecureAuth
 
The 300 Leonidas Solution
The 300 Leonidas SolutionThe 300 Leonidas Solution
The 300 Leonidas Solution
matthew.maisel
 
IoT Security and Privacy Considerations
IoT Security and Privacy ConsiderationsIoT Security and Privacy Considerations
IoT Security and Privacy Considerations
Kenny Huang Ph.D.
 
Stopping Breaches at the Perimeter: Strategies for Secure Access Control
Stopping Breaches at the Perimeter: Strategies for Secure Access ControlStopping Breaches at the Perimeter: Strategies for Secure Access Control
Stopping Breaches at the Perimeter: Strategies for Secure Access Control
SecureAuth
 
When Worlds Collide: Ethics and Technology for Lawyers
When Worlds Collide: Ethics and Technology for LawyersWhen Worlds Collide: Ethics and Technology for Lawyers
When Worlds Collide: Ethics and Technology for Lawyers
rtrautz
 
Emea Corporate Presentation 0709 Lin
Emea Corporate Presentation 0709 LinEmea Corporate Presentation 0709 Lin
Emea Corporate Presentation 0709 LinJoe Sarno
 

Similar to Protect Your Infrastructure: Basics of Cloud Security | Fpwebinar (20)

Overview of Information Security & Privacy
Overview of Information Security & PrivacyOverview of Information Security & Privacy
Overview of Information Security & Privacy
 
Cybercrime future perspectives
Cybercrime future perspectivesCybercrime future perspectives
Cybercrime future perspectives
 
Estratégia de segurança da Cisco (um diferencial para seus negócios)
Estratégia de segurança da Cisco (um diferencial para seus negócios)Estratégia de segurança da Cisco (um diferencial para seus negócios)
Estratégia de segurança da Cisco (um diferencial para seus negócios)
 
Making Log Data Useful: SIEM and Log Management Together by Dr. Anton Chuvakin
Making Log Data Useful: SIEM and Log Management Together by Dr. Anton ChuvakinMaking Log Data Useful: SIEM and Log Management Together by Dr. Anton Chuvakin
Making Log Data Useful: SIEM and Log Management Together by Dr. Anton Chuvakin
 
Making Log Data Useful: SIEM and Log Management Together
Making Log Data Useful: SIEM and Log Management TogetherMaking Log Data Useful: SIEM and Log Management Together
Making Log Data Useful: SIEM and Log Management Together
 
SELJE - VFP and IT Security.pptx
SELJE - VFP and IT Security.pptxSELJE - VFP and IT Security.pptx
SELJE - VFP and IT Security.pptx
 
Employing automated security systems in critical facilities.pptx
Employing automated security systems in critical facilities.pptxEmploying automated security systems in critical facilities.pptx
Employing automated security systems in critical facilities.pptx
 
Secure Your Mobile Apps
Secure Your Mobile AppsSecure Your Mobile Apps
Secure Your Mobile Apps
 
Agile Chennai 2022 - Shyam Sundar | Everything there is to know about Cyber s...
Agile Chennai 2022 - Shyam Sundar | Everything there is to know about Cyber s...Agile Chennai 2022 - Shyam Sundar | Everything there is to know about Cyber s...
Agile Chennai 2022 - Shyam Sundar | Everything there is to know about Cyber s...
 
Elementary-Information-Security-Practices
Elementary-Information-Security-PracticesElementary-Information-Security-Practices
Elementary-Information-Security-Practices
 
Mobile security services 2012
Mobile security services 2012Mobile security services 2012
Mobile security services 2012
 
Developing Secure Applications and Defending Against Common Attacks
Developing Secure Applications and Defending Against Common AttacksDeveloping Secure Applications and Defending Against Common Attacks
Developing Secure Applications and Defending Against Common Attacks
 
Securing Your Business
Securing Your BusinessSecuring Your Business
Securing Your Business
 
Slideshare fintech-may26th-def
Slideshare fintech-may26th-defSlideshare fintech-may26th-def
Slideshare fintech-may26th-def
 
Webinar: Beyond Two-Factor: Secure Access Control for Office 365
 Webinar: Beyond Two-Factor: Secure Access Control for Office 365 Webinar: Beyond Two-Factor: Secure Access Control for Office 365
Webinar: Beyond Two-Factor: Secure Access Control for Office 365
 
The 300 Leonidas Solution
The 300 Leonidas SolutionThe 300 Leonidas Solution
The 300 Leonidas Solution
 
IoT Security and Privacy Considerations
IoT Security and Privacy ConsiderationsIoT Security and Privacy Considerations
IoT Security and Privacy Considerations
 
Stopping Breaches at the Perimeter: Strategies for Secure Access Control
Stopping Breaches at the Perimeter: Strategies for Secure Access ControlStopping Breaches at the Perimeter: Strategies for Secure Access Control
Stopping Breaches at the Perimeter: Strategies for Secure Access Control
 
When Worlds Collide: Ethics and Technology for Lawyers
When Worlds Collide: Ethics and Technology for LawyersWhen Worlds Collide: Ethics and Technology for Lawyers
When Worlds Collide: Ethics and Technology for Lawyers
 
Emea Corporate Presentation 0709 Lin
Emea Corporate Presentation 0709 LinEmea Corporate Presentation 0709 Lin
Emea Corporate Presentation 0709 Lin
 

More from Fpweb

Make it Personal: Applying Your Dynamic Content Personalization Strategy
Make it Personal: Applying Your Dynamic Content Personalization StrategyMake it Personal: Applying Your Dynamic Content Personalization Strategy
Make it Personal: Applying Your Dynamic Content Personalization Strategy
Fpweb
 
Optimize Your SharePoint Strategy for the New Year
Optimize Your SharePoint Strategy for the New YearOptimize Your SharePoint Strategy for the New Year
Optimize Your SharePoint Strategy for the New Year
Fpweb
 
Navigating SharePoint and the Cloud in the Financial Industry
Navigating SharePoint and the Cloud in the Financial IndustryNavigating SharePoint and the Cloud in the Financial Industry
Navigating SharePoint and the Cloud in the Financial Industry
Fpweb
 
Power Your Business: Creating Successful SharePoint Users
Power Your Business: Creating Successful SharePoint Users Power Your Business: Creating Successful SharePoint Users
Power Your Business: Creating Successful SharePoint Users
Fpweb
 
Outsourcing Management & Support for your On-Premises SharePoint
Outsourcing Management & Support for your On-Premises SharePointOutsourcing Management & Support for your On-Premises SharePoint
Outsourcing Management & Support for your On-Premises SharePoint
Fpweb
 
Securing the Legal Industry with SharePoint Fpwebinar
Securing the Legal Industry with SharePoint Fpwebinar Securing the Legal Industry with SharePoint Fpwebinar
Securing the Legal Industry with SharePoint Fpwebinar
Fpweb
 
The Hybrid Cloud: Making Office 365 and the Private Cloud work for you | Fpwe...
The Hybrid Cloud: Making Office 365 and the Private Cloud work for you | Fpwe...The Hybrid Cloud: Making Office 365 and the Private Cloud work for you | Fpwe...
The Hybrid Cloud: Making Office 365 and the Private Cloud work for you | Fpwe...
Fpweb
 
The Great Migration: Moving Your SharePoint | Fpwebinar
The Great Migration: Moving Your SharePoint | Fpwebinar The Great Migration: Moving Your SharePoint | Fpwebinar
The Great Migration: Moving Your SharePoint | Fpwebinar
Fpweb
 
Come Prepared: What to Bring to the Cloud Conversation | Fpwebinar
Come Prepared: What to Bring to the Cloud Conversation | Fpwebinar Come Prepared: What to Bring to the Cloud Conversation | Fpwebinar
Come Prepared: What to Bring to the Cloud Conversation | Fpwebinar
Fpweb
 
Keeping Control of Your Data in the Cloud | Fpwebinar
Keeping Control of Your Data in the Cloud | Fpwebinar Keeping Control of Your Data in the Cloud | Fpwebinar
Keeping Control of Your Data in the Cloud | Fpwebinar
Fpweb
 
Save the Farm: Disaster Recovery for SharePoint | Fpwebinar
Save the Farm: Disaster Recovery for SharePoint | Fpwebinar Save the Farm: Disaster Recovery for SharePoint | Fpwebinar
Save the Farm: Disaster Recovery for SharePoint | Fpwebinar
Fpweb
 
Data Security: Best Practices in the Hybrid Cloud | Fpwebinar
Data Security: Best Practices in the Hybrid Cloud | FpwebinarData Security: Best Practices in the Hybrid Cloud | Fpwebinar
Data Security: Best Practices in the Hybrid Cloud | Fpwebinar
Fpweb
 

More from Fpweb (12)

Make it Personal: Applying Your Dynamic Content Personalization Strategy
Make it Personal: Applying Your Dynamic Content Personalization StrategyMake it Personal: Applying Your Dynamic Content Personalization Strategy
Make it Personal: Applying Your Dynamic Content Personalization Strategy
 
Optimize Your SharePoint Strategy for the New Year
Optimize Your SharePoint Strategy for the New YearOptimize Your SharePoint Strategy for the New Year
Optimize Your SharePoint Strategy for the New Year
 
Navigating SharePoint and the Cloud in the Financial Industry
Navigating SharePoint and the Cloud in the Financial IndustryNavigating SharePoint and the Cloud in the Financial Industry
Navigating SharePoint and the Cloud in the Financial Industry
 
Power Your Business: Creating Successful SharePoint Users
Power Your Business: Creating Successful SharePoint Users Power Your Business: Creating Successful SharePoint Users
Power Your Business: Creating Successful SharePoint Users
 
Outsourcing Management & Support for your On-Premises SharePoint
Outsourcing Management & Support for your On-Premises SharePointOutsourcing Management & Support for your On-Premises SharePoint
Outsourcing Management & Support for your On-Premises SharePoint
 
Securing the Legal Industry with SharePoint Fpwebinar
Securing the Legal Industry with SharePoint Fpwebinar Securing the Legal Industry with SharePoint Fpwebinar
Securing the Legal Industry with SharePoint Fpwebinar
 
The Hybrid Cloud: Making Office 365 and the Private Cloud work for you | Fpwe...
The Hybrid Cloud: Making Office 365 and the Private Cloud work for you | Fpwe...The Hybrid Cloud: Making Office 365 and the Private Cloud work for you | Fpwe...
The Hybrid Cloud: Making Office 365 and the Private Cloud work for you | Fpwe...
 
The Great Migration: Moving Your SharePoint | Fpwebinar
The Great Migration: Moving Your SharePoint | Fpwebinar The Great Migration: Moving Your SharePoint | Fpwebinar
The Great Migration: Moving Your SharePoint | Fpwebinar
 
Come Prepared: What to Bring to the Cloud Conversation | Fpwebinar
Come Prepared: What to Bring to the Cloud Conversation | Fpwebinar Come Prepared: What to Bring to the Cloud Conversation | Fpwebinar
Come Prepared: What to Bring to the Cloud Conversation | Fpwebinar
 
Keeping Control of Your Data in the Cloud | Fpwebinar
Keeping Control of Your Data in the Cloud | Fpwebinar Keeping Control of Your Data in the Cloud | Fpwebinar
Keeping Control of Your Data in the Cloud | Fpwebinar
 
Save the Farm: Disaster Recovery for SharePoint | Fpwebinar
Save the Farm: Disaster Recovery for SharePoint | Fpwebinar Save the Farm: Disaster Recovery for SharePoint | Fpwebinar
Save the Farm: Disaster Recovery for SharePoint | Fpwebinar
 
Data Security: Best Practices in the Hybrid Cloud | Fpwebinar
Data Security: Best Practices in the Hybrid Cloud | FpwebinarData Security: Best Practices in the Hybrid Cloud | Fpwebinar
Data Security: Best Practices in the Hybrid Cloud | Fpwebinar
 

Recently uploaded

State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
CatarinaPereira64715
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
Abida Shariff
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
Fwdays
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 

Recently uploaded (20)

State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 

Protect Your Infrastructure: Basics of Cloud Security | Fpwebinar

  • 1. Protect Your Infrastructure: The Basics of Cloud Security Please direct any questions to us via Twitter using hashtag #fpwebinar #fpwebinar
  • 2.
  • 3. Protect Your Infrastructure: The Basics of Cloud Security #fpwebinar
  • 4. We want to hear from you! Please direct any questions to us via Twitter using hashtag #fpwebinar #fpwebinar
  • 5. What’s in this Fpwebinar? ! Physical security - gated parking, cameras, sensors, lack of signage, biometrics, etc. Network security - Routing protocols, patching, firewalls, logging, etc. Application security - port access, HTTPS, segmentation, sync user accounts, etc. #fpwebinar
  • 6. Chris Schwab President Matt Kinder Infrastructure Manager #fpwebinar
  • 7. Types of Security: ! ! Physical, Network and Application #fpwebinar
  • 8. Physical Security ! ! Gated parking Security cameras Lack of signage Staffed or unstaffed Door sensors Data Centers go to a great extent to cloak even the parking garage #fpwebinar
  • 9. Physical Security ! ! Check-in for access using a badge or biometrics The more money you spend, the easier it is to audit and control your physical security Most breeches occur when someone is standing in front of the system #fpwebinar
  • 10. #fpwebinar Physical Security ! ! Create a fly-trap area for deliveries, etc.
  • 11. #fpwebinar Network Security ! Edge of network, Routing protocol, Server Security
  • 12. #fpwebinar Network Security ! ! Once in and servers are set up, it is paramount to use rigid blueprints for everything you stand up
  • 13. #fpwebinar Network Security ! Edge of network - where public access begins Routing protocol protects from the outside in Maintain patch levels Firewall layers can be as robust or narrow as you’d like Keep up with bugs
  • 14. Network Logging ! ! Most enterprises have the ability to log every transaction Retain as much data as you need Flag any keywords or anomalies if possible If an event or breech occurs, you’ll know quickly if logging is tied into alerting Do your homework before deployment Make sure you have all information you need #fpwebinar
  • 15. Application Security ! ! Port access - only keep needed ports open Audit open ports and close any not being used IDS/IPS behind firewalls only see traffic getting through #fpwebinar
  • 16. Application Security ! HTTPS - Get an SSL Certificate Make sure SQL is not accessible directly from the web Segmentation will reduce risk Sync user accounts Implement and audit virus/malware scanner #fpwebinar
  • 17. #fpwebinar Summary ! Described types of security: Physical, Network and Application Physical security - gated parking, cameras, sensors, lack of signage, biometrics, etc. Network security - Routing protocols, patching, firewalls, logging, etc. Application security - port access, HTTPS, segmentation, sync user accounts, etc. Follow processes, audit processes
  • 18. Protect Your Infrastructure: The Basics of Cloud Security Q&A Please direct any questions to us via Twitter using hashtag #fpwebinar #fpwebinar
  • 19. Thank you! ! Twitter @fpweb • Marketing@fpweb.net • www.fpweb.net ! Please fill out the survey as you exit the webinar and help us choose the next topic! #fpwebinar