SlideShare a Scribd company logo
Security Architecture Best Practices 
for SaaS Applications 
22-May-2014 
www.techcello.com
© Techcello www.techcello.com 
Housekeeping Instructions 
 All phones are set to mute. If you have any questions, please type them in the Chat window 
located beside the presentation panel. 
 We have already received several questions from the registrants, which will be answered by the 
speakers during the Q & A session. 
 We will continue to collect more questions during the session as we receive and will try to answer 
them during today’s session. 
 In case if you do not receive answers to your question today, you will certainly receive answers via 
email shortly. 
 Thanks for your participation and enjoy the session!
© Techcello www.techcello.com 
TechCello Introduction 
 Cloud Ready, SaaS/Multi- 
Tenant SaaS Application 
Development Framework 
 Provides end-end SaaS 
Lifecycle Management 
Solution 
 Redefines the way SaaS 
products are built and 
managed 
 Saves anywhere between 
30%-50% of time and cost
© Techcello www.techcello.com 
Speaker Profiles 
Vittal Raj 
International VP, ISACA 
Founder, Pristine Consulting 
 Last two decades into Consulting, Assurance & Training in IS Security, IT 
Compliance/Governance, Enterprise Risk Management, Risk based 
Internal Audit and Digital Forensics. 
 Directed and managed projects in the areas of IS Security 
Implementation, Cyber Crime Forensics & Cyber Law Consulting, 
Network & Web Application Vulnerability Assessments 
 Specialist trainer in IT Risk Management and Information Security 
Jothi Rengarajan 
Chief Technical Architect 
TechCello 
 14+ years of experience in architecting cloud and SaaS solutions 
for both ISVs and Enterprises 
 Chief architect in designing and constructing TechCello 
framework 
 Plays consultative role with customers in implementing technical 
solutions
Gartner forecasts on SaaS…… 
• Saas market set to top $22 b by 2015 
• Surge in software spends by 2015, Stratification of Saas 
• CRM, ERP and office & productivity SaaS on the lead 
• Multi-tenancy way to go supported by innovative tech 
• Customers concerns - Continuity, Security & Contractual
What’s slowing down SaaS adoption ? 
• Application Control & Security Governance 
• Contractual Transparency & SLA Assurance 
• Business Continuity & Resilience 
• Security Management 
– Security of Data in a multi-tenancy model 
– Risk driven Security management 
– Identity and access management (IAM) – Adequacy, Sustainability 
• Privacy and Regulatory concerns 
– Data location , Privacy Compliance, IAM, Licensing, legal & electronic 
discovery 
• Customisation & Transitioning out 
• Continual Independent Assurance 
• Pricing Indemnity 6
Framework based approach 
driven on Stakeholder Expectations 
Goals to Results 
Source: COBIT 5®, ITGI
Application & Interfaces 
Data Security & Information Life Cycle Mngt 
Encryption & Key Management 
Infrastructure & Virtualisation Security 
Data Centre Security 
Identify & Access Management 
Change Control & Configuration Management 
SCM, Transparency & Accountability 
Human Resources 
Business Continuity & Operational Resilience 
Audit, Assurance & Compliance 
Governance & Risk Management 
Key Control Drivers 
Source: CCSA – CCS Matrix
Holistic approach for sustainable governance 
Source: COBIT 5®, ITGI
Managing Operational Risks in SaaS Services 
• SaaS Governance Framework - 
Client 
– Risk Assessment & 
Management 
– Service Level Management 
– Performance Management 
(Metrics & Mechanisms) 
– Auditability and Audits 
• Risk Management & Assurance 
• Standards & Certification 
• Assurance by CSP 
• Insurance 
• Contract Governance 
10 
• Security Management 
– Security Framework – 
Encryption, Data Exchange 
Controls 
• Transition Management 
• Monitoring Capabilities 
• Billing Control 
• Litigation Clauses 
• Regulatory Compliance
International Standards 
• COBIT 5 – Controls and Assurance in the Cloud 
• CSA Guides 
• AICPA Service Organization Control (SOC) 1 Report 
• AICPA/CICA Trust Services (SysTrust and WebTrust) 
• ISO 2700x— Information security management system (ISMS) 
• Cloud Security Matrix—By Cloud Security Alliance 
• NIST SP 800-53—The NIST IT security controls standards, Health 
Information Trust Alliance (HITRUST) 
• BITS—The BITS Shared Assessment Program 
– contains the Standardized Information Gathering (SIG) questionnaire and Agreed Upon 
Procedures (AUP). 
• European Network and Information Security Agency (ENISA) 
– Cloud Computing—Benefits, Risks and Recommendations for Information Security. 
11
‘Trustworthy’ SaaS 
key to customer acquisition & loyalty
Feel free to contact me with your questions, comments & 
feedback: 
R Vittal Raj 
rvittalraj@gmail.com 
Linkedin: rvittalraj
© Techcello www.techcello.com 
SaaS Customer Concerns 
 Data Storage and Segregation 
• Is it a dedicated or a shared environment? 
• If it a shared environment, how is the data segregated from other shared 
environments? 
• How is security managed in the shared environment? What controls are in place? 
 ACL 
• What type of identity management solution is provided? 
• Is Single Sign-On (SSO) provided? What types of SSO options are available? SAML, 
Open Auth etc? 
• What type of user store is available? Can this user store be integrated with Active 
Directory or any other user store database? 
• What type of user security, authentication and authorization options are available?
© Techcello www.techcello.com 
SaaS Customer Concerns 
 Data Security 
• How is the primary data encrypted? What encryption schemes are used? Who 
has access to the decryption keys? How often is this tested? 
 Audits 
• What application & data access audit logs are available? How often can you get 
this? 
• What type of investigative support is provided in cases of breach?
SaaS Security Architecture Goals 
Protection of information. It deals with the prevention and detection of unauthorized 
actions and ensuring confidentiality, integrity of data. 
© Techcello www.techcello.com 
 Robust Tenant data isolation 
 Flexible RBAC – Prevent unauthorized action 
 Proven Data security 
 Prevention of Web related top threats as per OWASP 
 Strong Security Audit Logs
© Techcello www.techcello.com 
Tenant Data Isolation 
Design for a Hybrid Approach
© Techcello www.techcello.com 
Tenant Data Isolation 
 Database 
Routing Based 
On Tenant 
 Application 
Layer Auto 
Tenant Filter 
 Tenant Based 
View Filter
© Techcello www.techcello.com 
ACL Architecture
© Techcello www.techcello.com 
Role Based Access Control (RBAC) 
Authentication 
• Separate Common Identity Provider 
• Identity Provider Support Options 
• Custom Username Password Authentication 
• AD Integrated SSO 
• Open ID Authentication 
• Multi factor authentication 
• Hybrid Authentication Support
© Techcello www.techcello.com 
Role Based Access Control (RBAC) 
Authorization 
• ACL Metadata 
• Use privileges 
• Map with roles 
• Roles should be defined by business users 
• Role mapped to privileges and user mapped to roles 
• Access Check Services 
• Control at a URL, Action, Data and Field level 
• Configuration based privilege control
© Techcello www.techcello.com 
Role Based Access Control (RBAC) 
Authorization 
• Rest API Implementation 
• External Application Integration 
• Oauth2.0 
• HMAC 
• Internal Application Integration 
• Session Token 
• Cookie
© Techcello www.techcello.com 
OWASP – TOP 10 Threats 2013 
A1 
Injection 
A2 
Broken Authentication and 
Session Management (was 
formerly A3) 
A3 
Cross-Site Scripting (XSS) 
(was formerly A2) 
A4 
Insecure Direct Object 
References 
A5 
Security Misconfiguration 
(was formerly A6) 
A6 
Sensitive Data Exposure 
(merged from former A7 
Insecure Cryptographic 
Storage and former A9 
Insufficient Transport Layer 
Protection) 
A7 
Missing Function Level 
Access Control 
(renamed/broadened from 
former A8 Failure to 
Restrict URL Access) 
A8 
Cross-Site Request Forgery 
(CSRF) (was formerly A5) 
A9 
Using Known Vulnerable 
Components (new but was 
part of former A6 – 
Security Misconfiguration) 
A10 
Unvalidated Redirects and 
Forwards
© Techcello www.techcello.com 
Security Testing 
Dynamic 
Testing 
Static 
Testing 
Security 
Verification
© Techcello www.techcello.com 
Security Audit 
Event Audit 
• Audit positive events, more importantly 
audit negative events 
• Should cover, 
• Who does the action? 
• What action is performed? 
• What is the context in which the 
operation is performed? 
• What time is the action performed? 
• Audit details stored in a separate datastore 
for better performance 
• Real-time audit details – audit cache server
© Techcello www.techcello.com 
Security Audit 
Transaction and Change Audit 
• Transaction Audit 
• Snapshot: Exact copy of the row stored in history tables 
• More suitable if requests to access past data are more 
• More data growth 
• Change Audit 
• Only the delta of the state change captured as part of change tables 
• More suitable when changes need to be reported and past data are not required 
much 
• Used more for Security tracking purposes 
• Easier to implement by using methods available out of the box in RDBMS such as CDC 
for SQL server 
• Asynchronous Mode : For better performance and if we wish that audit should not roll 
back the transactions it is advisable to audit in a asynchronous thread.
© Techcello www.techcello.com 
Security Audit 
User Action Audit 
• Audit all user actions 
• Capture the entry url, time, location details, browser details, response status, any 
exceptions 
• Provide analysis on the user actions 
• Can be customized at application layer or can use the webserver logs
© Techcello www.techcello.com 
Security Audit
Cello Stack – At a Glance 
How does it work? 
Administrative 
Tenant 
Licensing Metering Billing Data Backup Modules 
Provisioning 
Security 
User 
Role/Privilege 
Auditing Modules 
Management 
Mgmt. 
Custom Fields Custom LoV 
Ad-hoc Builders 
Cloud Ready, Multi-Tenant Application Development Framework 
Single Sign-on 
Dynamic Data 
Scope 
Business 
Rules 
Workflow 
Dynamic 
Forms 
Enterprise Engines 
Integration Modules 
Settings 
Template 
Events Notification Templates 
Query Chart Reports 
Code 
Productivity Boosters 
Templates 
Master Data 
Mgmt. 
Forms 
Generation 
Application Multi-Tenancy & Tenant Data Isolation 
Themes & 
Logo 
Pre & Post 
Processors 
Configurability 
Modules 
Cello Cloud Adapters
© Techcello www.techcello.com 
Contact Details 
Jothi Rengarajan (jothi.r@techcello.com) 
Vittal Raj (rvittalraj@gmail.com) 
Reference URLs 
Web : http://www.techcello.com 
ROI Calculator : http://www.techcello.com/techcello-roi-calculator 
Demo Videos : http://www.techcello.com/techcello-resources/techcello-product- 
demo 
SaaS e-Book: http://www.techcello.com/techcello-resources/techcello-resources- 
white-papers 
Thank You

More Related Content

What's hot

Azure security guidelines for developers
Azure security guidelines for developers Azure security guidelines for developers
Azure security guidelines for developers
Ivo Andreev
 
[WSO2Con EU 2018] Hybrid Cloud API Management - API Microgateways Anywhere
[WSO2Con EU 2018] Hybrid Cloud API Management - API Microgateways Anywhere[WSO2Con EU 2018] Hybrid Cloud API Management - API Microgateways Anywhere
[WSO2Con EU 2018] Hybrid Cloud API Management - API Microgateways Anywhere
WSO2
 
How Secure Are Your APIs?
How Secure Are Your APIs?How Secure Are Your APIs?
How Secure Are Your APIs?
Apigee | Google Cloud
 
I Love APIs 2015: The Mobile Screen Factor - At the Glass Integration with APIs
I Love APIs 2015: The Mobile Screen Factor - At the Glass Integration with APIsI Love APIs 2015: The Mobile Screen Factor - At the Glass Integration with APIs
I Love APIs 2015: The Mobile Screen Factor - At the Glass Integration with APIs
Apigee | Google Cloud
 
Achieving Microservices Maturity
Achieving Microservices MaturityAchieving Microservices Maturity
Achieving Microservices Maturity
Nordic APIs
 
apidays LIVE Paris - Creating a scalable ecosystem of Microservices by Archan...
apidays LIVE Paris - Creating a scalable ecosystem of Microservices by Archan...apidays LIVE Paris - Creating a scalable ecosystem of Microservices by Archan...
apidays LIVE Paris - Creating a scalable ecosystem of Microservices by Archan...
apidays
 
API Security In Cloud Native Era
API Security In Cloud Native EraAPI Security In Cloud Native Era
API Security In Cloud Native Era
WSO2
 
WSO2Con USA 2017: Providing a Pathway from Stovepipe Systems to a Secure SOA ...
WSO2Con USA 2017: Providing a Pathway from Stovepipe Systems to a Secure SOA ...WSO2Con USA 2017: Providing a Pathway from Stovepipe Systems to a Secure SOA ...
WSO2Con USA 2017: Providing a Pathway from Stovepipe Systems to a Secure SOA ...
WSO2
 
apidays LIVE Australia 2020 - Building a scalable API platform for an IoT eco...
apidays LIVE Australia 2020 - Building a scalable API platform for an IoT eco...apidays LIVE Australia 2020 - Building a scalable API platform for an IoT eco...
apidays LIVE Australia 2020 - Building a scalable API platform for an IoT eco...
apidays
 
API Security in a Microservice Architecture
API Security in a Microservice ArchitectureAPI Security in a Microservice Architecture
API Security in a Microservice Architecture
Matt McLarty
 
Deep-Dive: Secure API Management
Deep-Dive: Secure API ManagementDeep-Dive: Secure API Management
Deep-Dive: Secure API Management
Apigee | Google Cloud
 
APIdays Paris 2019 - API Platform Architecture: What to know before going ope...
APIdays Paris 2019 - API Platform Architecture: What to know before going ope...APIdays Paris 2019 - API Platform Architecture: What to know before going ope...
APIdays Paris 2019 - API Platform Architecture: What to know before going ope...
apidays
 
apidays LIVE New York 2021 - OWASP cautions against “insufficient logging & m...
apidays LIVE New York 2021 - OWASP cautions against “insufficient logging & m...apidays LIVE New York 2021 - OWASP cautions against “insufficient logging & m...
apidays LIVE New York 2021 - OWASP cautions against “insufficient logging & m...
apidays
 
API Design Best Practices & Tech Talk : API Craft Meetup @ Apigee
API Design Best Practices & Tech Talk : API Craft Meetup @ ApigeeAPI Design Best Practices & Tech Talk : API Craft Meetup @ Apigee
API Design Best Practices & Tech Talk : API Craft Meetup @ ApigeeAnil Sagar
 
API Services: Harness the Power of Enterprise Infrastructure
API Services: Harness the Power of Enterprise InfrastructureAPI Services: Harness the Power of Enterprise Infrastructure
API Services: Harness the Power of Enterprise Infrastructure
Apigee | Google Cloud
 
Api Gateway
Api GatewayApi Gateway
Api Gateway
KhaqanAshraf
 
Api gateway
Api gatewayApi gateway
Api gateway
enyert
 
APIdays Paris 2019 - API Gateway & Identity Providers, a Match Made in Micros...
APIdays Paris 2019 - API Gateway & Identity Providers, a Match Made in Micros...APIdays Paris 2019 - API Gateway & Identity Providers, a Match Made in Micros...
APIdays Paris 2019 - API Gateway & Identity Providers, a Match Made in Micros...
apidays
 
Perth Meetup February 2021
Perth Meetup February 2021Perth Meetup February 2021
Perth Meetup February 2021
Michael Price
 
Stream Processing in Action
Stream Processing in ActionStream Processing in Action
Stream Processing in Action
WSO2
 

What's hot (20)

Azure security guidelines for developers
Azure security guidelines for developers Azure security guidelines for developers
Azure security guidelines for developers
 
[WSO2Con EU 2018] Hybrid Cloud API Management - API Microgateways Anywhere
[WSO2Con EU 2018] Hybrid Cloud API Management - API Microgateways Anywhere[WSO2Con EU 2018] Hybrid Cloud API Management - API Microgateways Anywhere
[WSO2Con EU 2018] Hybrid Cloud API Management - API Microgateways Anywhere
 
How Secure Are Your APIs?
How Secure Are Your APIs?How Secure Are Your APIs?
How Secure Are Your APIs?
 
I Love APIs 2015: The Mobile Screen Factor - At the Glass Integration with APIs
I Love APIs 2015: The Mobile Screen Factor - At the Glass Integration with APIsI Love APIs 2015: The Mobile Screen Factor - At the Glass Integration with APIs
I Love APIs 2015: The Mobile Screen Factor - At the Glass Integration with APIs
 
Achieving Microservices Maturity
Achieving Microservices MaturityAchieving Microservices Maturity
Achieving Microservices Maturity
 
apidays LIVE Paris - Creating a scalable ecosystem of Microservices by Archan...
apidays LIVE Paris - Creating a scalable ecosystem of Microservices by Archan...apidays LIVE Paris - Creating a scalable ecosystem of Microservices by Archan...
apidays LIVE Paris - Creating a scalable ecosystem of Microservices by Archan...
 
API Security In Cloud Native Era
API Security In Cloud Native EraAPI Security In Cloud Native Era
API Security In Cloud Native Era
 
WSO2Con USA 2017: Providing a Pathway from Stovepipe Systems to a Secure SOA ...
WSO2Con USA 2017: Providing a Pathway from Stovepipe Systems to a Secure SOA ...WSO2Con USA 2017: Providing a Pathway from Stovepipe Systems to a Secure SOA ...
WSO2Con USA 2017: Providing a Pathway from Stovepipe Systems to a Secure SOA ...
 
apidays LIVE Australia 2020 - Building a scalable API platform for an IoT eco...
apidays LIVE Australia 2020 - Building a scalable API platform for an IoT eco...apidays LIVE Australia 2020 - Building a scalable API platform for an IoT eco...
apidays LIVE Australia 2020 - Building a scalable API platform for an IoT eco...
 
API Security in a Microservice Architecture
API Security in a Microservice ArchitectureAPI Security in a Microservice Architecture
API Security in a Microservice Architecture
 
Deep-Dive: Secure API Management
Deep-Dive: Secure API ManagementDeep-Dive: Secure API Management
Deep-Dive: Secure API Management
 
APIdays Paris 2019 - API Platform Architecture: What to know before going ope...
APIdays Paris 2019 - API Platform Architecture: What to know before going ope...APIdays Paris 2019 - API Platform Architecture: What to know before going ope...
APIdays Paris 2019 - API Platform Architecture: What to know before going ope...
 
apidays LIVE New York 2021 - OWASP cautions against “insufficient logging & m...
apidays LIVE New York 2021 - OWASP cautions against “insufficient logging & m...apidays LIVE New York 2021 - OWASP cautions against “insufficient logging & m...
apidays LIVE New York 2021 - OWASP cautions against “insufficient logging & m...
 
API Design Best Practices & Tech Talk : API Craft Meetup @ Apigee
API Design Best Practices & Tech Talk : API Craft Meetup @ ApigeeAPI Design Best Practices & Tech Talk : API Craft Meetup @ Apigee
API Design Best Practices & Tech Talk : API Craft Meetup @ Apigee
 
API Services: Harness the Power of Enterprise Infrastructure
API Services: Harness the Power of Enterprise InfrastructureAPI Services: Harness the Power of Enterprise Infrastructure
API Services: Harness the Power of Enterprise Infrastructure
 
Api Gateway
Api GatewayApi Gateway
Api Gateway
 
Api gateway
Api gatewayApi gateway
Api gateway
 
APIdays Paris 2019 - API Gateway & Identity Providers, a Match Made in Micros...
APIdays Paris 2019 - API Gateway & Identity Providers, a Match Made in Micros...APIdays Paris 2019 - API Gateway & Identity Providers, a Match Made in Micros...
APIdays Paris 2019 - API Gateway & Identity Providers, a Match Made in Micros...
 
Perth Meetup February 2021
Perth Meetup February 2021Perth Meetup February 2021
Perth Meetup February 2021
 
Stream Processing in Action
Stream Processing in ActionStream Processing in Action
Stream Processing in Action
 

Viewers also liked

Swe cs external 25112013 services
Swe cs external 25112013   servicesSwe cs external 25112013   services
Swe cs external 25112013 services
Afiman Abdul Rahman
 
Fearing the cloud: why the life sciences shouldn't fret
Fearing the cloud: why the life sciences shouldn't fretFearing the cloud: why the life sciences shouldn't fret
Fearing the cloud: why the life sciences shouldn't fret
Cornerstone OnDemand
 
Stephon Grey Profile 2015
Stephon Grey Profile 2015Stephon Grey Profile 2015
Stephon Grey Profile 2015Stephon Grey
 
Continuous Controls Monitoring: Putting Controls in Place is Not Enough
Continuous Controls Monitoring: Putting Controls in Place is Not EnoughContinuous Controls Monitoring: Putting Controls in Place is Not Enough
Continuous Controls Monitoring: Putting Controls in Place is Not Enough
FraudBusters
 
Audit standards for Federal PKI Certification Authorities using PKI
Audit standards for Federal PKI Certification Authorities using PKIAudit standards for Federal PKI Certification Authorities using PKI
Audit standards for Federal PKI Certification Authorities using PKI
David Sweigert
 
Stop the fraudster! Pennsylvania Treasury, Industry Expert Chris Doxey and Fu...
Stop the fraudster! Pennsylvania Treasury, Industry Expert Chris Doxey and Fu...Stop the fraudster! Pennsylvania Treasury, Industry Expert Chris Doxey and Fu...
Stop the fraudster! Pennsylvania Treasury, Industry Expert Chris Doxey and Fu...
Oracle
 
SOC 2/SOC 3 Whitepaper
SOC 2/SOC 3 WhitepaperSOC 2/SOC 3 Whitepaper
SOC 2/SOC 3 WhitepaperDTIMMERMAN
 
Federal government-of-nigeria-ncap-april-2013
Federal government-of-nigeria-ncap-april-2013Federal government-of-nigeria-ncap-april-2013
Federal government-of-nigeria-ncap-april-2013Perkins Abaje
 
Information Technology Portfolio
Information Technology PortfolioInformation Technology Portfolio
Information Technology Portfolio
Purple Mango Creative Solutions (P) Ltd
 
Baigiang kiemtoan english
Baigiang kiemtoan englishBaigiang kiemtoan english
Baigiang kiemtoan english
Thanh Phuong Pham
 
Business and ITSM on the same page at last! ITIL, TOGAF and COBIT working to...
Business and ITSM on the same page at last!  ITIL, TOGAF and COBIT working to...Business and ITSM on the same page at last!  ITIL, TOGAF and COBIT working to...
Business and ITSM on the same page at last! ITIL, TOGAF and COBIT working to...
CTE Solutions Inc.
 
New Horizons for the Accountant v2.0
New Horizons for the Accountant v2.0New Horizons for the Accountant v2.0
New Horizons for the Accountant v2.0
Donny Shimamoto
 
Hanrick Curran Audit Training - Internal Controls - March 2013
Hanrick Curran Audit Training - Internal Controls - March 2013Hanrick Curran Audit Training - Internal Controls - March 2013
Hanrick Curran Audit Training - Internal Controls - March 2013
Matthew Green
 
TehDays Basel - Auditing in sql server 2012 - charley hanania - tech days bas...
TehDays Basel - Auditing in sql server 2012 - charley hanania - tech days bas...TehDays Basel - Auditing in sql server 2012 - charley hanania - tech days bas...
TehDays Basel - Auditing in sql server 2012 - charley hanania - tech days bas...Charley Hanania
 
Fraud Prevention
Fraud PreventionFraud Prevention
Fraud Prevention
Gerald Johnson
 
IAPP Atlanta Chapter Meeting 2013 February
IAPP Atlanta Chapter Meeting 2013 FebruaryIAPP Atlanta Chapter Meeting 2013 February
IAPP Atlanta Chapter Meeting 2013 February
Phil Agcaoili
 
Saving America’s Black Boys National Campaign Launch
Saving America’s Black Boys National Campaign LaunchSaving America’s Black Boys National Campaign Launch
Saving America’s Black Boys National Campaign Launch
ScaleUp Partners LLC
 
Evaluating Vendor Risks - Presentation
Evaluating Vendor Risks - PresentationEvaluating Vendor Risks - Presentation
Evaluating Vendor Risks - PresentationISACA New England
 

Viewers also liked (20)

Swe cs external 25112013 services
Swe cs external 25112013   servicesSwe cs external 25112013   services
Swe cs external 25112013 services
 
Fearing the cloud: why the life sciences shouldn't fret
Fearing the cloud: why the life sciences shouldn't fretFearing the cloud: why the life sciences shouldn't fret
Fearing the cloud: why the life sciences shouldn't fret
 
Stephon Grey Profile 2015
Stephon Grey Profile 2015Stephon Grey Profile 2015
Stephon Grey Profile 2015
 
Continuous Controls Monitoring: Putting Controls in Place is Not Enough
Continuous Controls Monitoring: Putting Controls in Place is Not EnoughContinuous Controls Monitoring: Putting Controls in Place is Not Enough
Continuous Controls Monitoring: Putting Controls in Place is Not Enough
 
Audit standards for Federal PKI Certification Authorities using PKI
Audit standards for Federal PKI Certification Authorities using PKIAudit standards for Federal PKI Certification Authorities using PKI
Audit standards for Federal PKI Certification Authorities using PKI
 
Stop the fraudster! Pennsylvania Treasury, Industry Expert Chris Doxey and Fu...
Stop the fraudster! Pennsylvania Treasury, Industry Expert Chris Doxey and Fu...Stop the fraudster! Pennsylvania Treasury, Industry Expert Chris Doxey and Fu...
Stop the fraudster! Pennsylvania Treasury, Industry Expert Chris Doxey and Fu...
 
SOC 2/SOC 3 Whitepaper
SOC 2/SOC 3 WhitepaperSOC 2/SOC 3 Whitepaper
SOC 2/SOC 3 Whitepaper
 
Federal government-of-nigeria-ncap-april-2013
Federal government-of-nigeria-ncap-april-2013Federal government-of-nigeria-ncap-april-2013
Federal government-of-nigeria-ncap-april-2013
 
Ifc deloitte
Ifc deloitteIfc deloitte
Ifc deloitte
 
Information Technology Portfolio
Information Technology PortfolioInformation Technology Portfolio
Information Technology Portfolio
 
Baigiang kiemtoan english
Baigiang kiemtoan englishBaigiang kiemtoan english
Baigiang kiemtoan english
 
Business and ITSM on the same page at last! ITIL, TOGAF and COBIT working to...
Business and ITSM on the same page at last!  ITIL, TOGAF and COBIT working to...Business and ITSM on the same page at last!  ITIL, TOGAF and COBIT working to...
Business and ITSM on the same page at last! ITIL, TOGAF and COBIT working to...
 
Cia brochure part 1 2
Cia brochure part 1 2Cia brochure part 1 2
Cia brochure part 1 2
 
New Horizons for the Accountant v2.0
New Horizons for the Accountant v2.0New Horizons for the Accountant v2.0
New Horizons for the Accountant v2.0
 
Hanrick Curran Audit Training - Internal Controls - March 2013
Hanrick Curran Audit Training - Internal Controls - March 2013Hanrick Curran Audit Training - Internal Controls - March 2013
Hanrick Curran Audit Training - Internal Controls - March 2013
 
TehDays Basel - Auditing in sql server 2012 - charley hanania - tech days bas...
TehDays Basel - Auditing in sql server 2012 - charley hanania - tech days bas...TehDays Basel - Auditing in sql server 2012 - charley hanania - tech days bas...
TehDays Basel - Auditing in sql server 2012 - charley hanania - tech days bas...
 
Fraud Prevention
Fraud PreventionFraud Prevention
Fraud Prevention
 
IAPP Atlanta Chapter Meeting 2013 February
IAPP Atlanta Chapter Meeting 2013 FebruaryIAPP Atlanta Chapter Meeting 2013 February
IAPP Atlanta Chapter Meeting 2013 February
 
Saving America’s Black Boys National Campaign Launch
Saving America’s Black Boys National Campaign LaunchSaving America’s Black Boys National Campaign Launch
Saving America’s Black Boys National Campaign Launch
 
Evaluating Vendor Risks - Presentation
Evaluating Vendor Risks - PresentationEvaluating Vendor Risks - Presentation
Evaluating Vendor Risks - Presentation
 

Similar to Security architecture best practices for saas applications

Security Architecture Best Practices for SaaS Applications
Security Architecture Best Practices for SaaS ApplicationsSecurity Architecture Best Practices for SaaS Applications
Security Architecture Best Practices for SaaS Applications
Techcello
 
Techcello hp-arch workshop
Techcello hp-arch workshopTechcello hp-arch workshop
Techcello hp-arch workshop
kanimozhin
 
Building multi tenant highly secured applications on .net for any cloud - dem...
Building multi tenant highly secured applications on .net for any cloud - dem...Building multi tenant highly secured applications on .net for any cloud - dem...
Building multi tenant highly secured applications on .net for any cloud - dem...
kanimozhin
 
Building Multi-tenant, Configurable, High Quality Applications on .NET for an...
Building Multi-tenant, Configurable, High Quality Applications on .NET for an...Building Multi-tenant, Configurable, High Quality Applications on .NET for an...
Building Multi-tenant, Configurable, High Quality Applications on .NET for an...
Techcello
 
Building Multi-tenant, Configurable, High Quality Applications on .NET for an...
Building Multi-tenant, Configurable, High Quality Applications on .NET for an...Building Multi-tenant, Configurable, High Quality Applications on .NET for an...
Building Multi-tenant, Configurable, High Quality Applications on .NET for an...
Techcello
 
Iam suite introduction
Iam suite introductionIam suite introduction
Iam suite introductionwardell henley
 
Cloud Security Standards: What to Expect and What to Negotiate V2.0
Cloud Security Standards: What to Expect and What to Negotiate V2.0Cloud Security Standards: What to Expect and What to Negotiate V2.0
Cloud Security Standards: What to Expect and What to Negotiate V2.0
Cloud Standards Customer Council
 
Latest Developments in Cloud Security Standards and Privacy
Latest Developments in Cloud Security Standards and PrivacyLatest Developments in Cloud Security Standards and Privacy
Latest Developments in Cloud Security Standards and Privacy
Cloud Standards Customer Council
 
Cyber Security in The Cloud
Cyber Security in The CloudCyber Security in The Cloud
Cyber Security in The Cloud
PECB
 
AppSec in an Agile World
AppSec in an Agile WorldAppSec in an Agile World
AppSec in an Agile World
David Lindner
 
Winning Governance Strategies for the Technology Disruptions of our Time
Winning Governance Strategies for the Technology Disruptions of our TimeWinning Governance Strategies for the Technology Disruptions of our Time
Winning Governance Strategies for the Technology Disruptions of our Time
CloudHesive
 
Aicpa tech+panel presentation t6 managing risks and security 2014 v3
Aicpa tech+panel presentation t6 managing risks and security 2014 v3Aicpa tech+panel presentation t6 managing risks and security 2014 v3
Aicpa tech+panel presentation t6 managing risks and security 2014 v3Doeren Mayhew
 
(SEC310) Keeping Developers and Auditors Happy in the Cloud
(SEC310) Keeping Developers and Auditors Happy in the Cloud(SEC310) Keeping Developers and Auditors Happy in the Cloud
(SEC310) Keeping Developers and Auditors Happy in the Cloud
Amazon Web Services
 
Webinar-GBA Episode 7-Managing blockchain infrastructure for enterprise-grade...
Webinar-GBA Episode 7-Managing blockchain infrastructure for enterprise-grade...Webinar-GBA Episode 7-Managing blockchain infrastructure for enterprise-grade...
Webinar-GBA Episode 7-Managing blockchain infrastructure for enterprise-grade...
Zeeve
 
Cloud computing and Cloud security fundamentals
Cloud computing and Cloud security fundamentalsCloud computing and Cloud security fundamentals
Cloud computing and Cloud security fundamentals
Viresh Suri
 
RightScale Webinar: Security and Compliance in the Cloud
RightScale Webinar: Security and Compliance in the CloudRightScale Webinar: Security and Compliance in the Cloud
RightScale Webinar: Security and Compliance in the Cloud
RightScale
 
Decision Matrix for IoT Product Development
Decision Matrix for IoT Product DevelopmentDecision Matrix for IoT Product Development
Decision Matrix for IoT Product Development
Alexey Pyshkin
 
IT_Security_Service Delivery_Consultant
IT_Security_Service Delivery_Consultant IT_Security_Service Delivery_Consultant
IT_Security_Service Delivery_Consultant Saravanan Purushothaman
 
Hyperledger Austin meetup July 10, 2018
Hyperledger Austin meetup July 10, 2018Hyperledger Austin meetup July 10, 2018
Hyperledger Austin meetup July 10, 2018
Oracle Developers
 

Similar to Security architecture best practices for saas applications (20)

Security Architecture Best Practices for SaaS Applications
Security Architecture Best Practices for SaaS ApplicationsSecurity Architecture Best Practices for SaaS Applications
Security Architecture Best Practices for SaaS Applications
 
Techcello hp-arch workshop
Techcello hp-arch workshopTechcello hp-arch workshop
Techcello hp-arch workshop
 
Building multi tenant highly secured applications on .net for any cloud - dem...
Building multi tenant highly secured applications on .net for any cloud - dem...Building multi tenant highly secured applications on .net for any cloud - dem...
Building multi tenant highly secured applications on .net for any cloud - dem...
 
Building Multi-tenant, Configurable, High Quality Applications on .NET for an...
Building Multi-tenant, Configurable, High Quality Applications on .NET for an...Building Multi-tenant, Configurable, High Quality Applications on .NET for an...
Building Multi-tenant, Configurable, High Quality Applications on .NET for an...
 
Building Multi-tenant, Configurable, High Quality Applications on .NET for an...
Building Multi-tenant, Configurable, High Quality Applications on .NET for an...Building Multi-tenant, Configurable, High Quality Applications on .NET for an...
Building Multi-tenant, Configurable, High Quality Applications on .NET for an...
 
Iam suite introduction
Iam suite introductionIam suite introduction
Iam suite introduction
 
Cloud Security Standards: What to Expect and What to Negotiate V2.0
Cloud Security Standards: What to Expect and What to Negotiate V2.0Cloud Security Standards: What to Expect and What to Negotiate V2.0
Cloud Security Standards: What to Expect and What to Negotiate V2.0
 
Latest Developments in Cloud Security Standards and Privacy
Latest Developments in Cloud Security Standards and PrivacyLatest Developments in Cloud Security Standards and Privacy
Latest Developments in Cloud Security Standards and Privacy
 
Cyber Security in The Cloud
Cyber Security in The CloudCyber Security in The Cloud
Cyber Security in The Cloud
 
AppSec in an Agile World
AppSec in an Agile WorldAppSec in an Agile World
AppSec in an Agile World
 
Winning Governance Strategies for the Technology Disruptions of our Time
Winning Governance Strategies for the Technology Disruptions of our TimeWinning Governance Strategies for the Technology Disruptions of our Time
Winning Governance Strategies for the Technology Disruptions of our Time
 
Aicpa tech+panel presentation t6 managing risks and security 2014 v3
Aicpa tech+panel presentation t6 managing risks and security 2014 v3Aicpa tech+panel presentation t6 managing risks and security 2014 v3
Aicpa tech+panel presentation t6 managing risks and security 2014 v3
 
(SEC310) Keeping Developers and Auditors Happy in the Cloud
(SEC310) Keeping Developers and Auditors Happy in the Cloud(SEC310) Keeping Developers and Auditors Happy in the Cloud
(SEC310) Keeping Developers and Auditors Happy in the Cloud
 
Webinar-GBA Episode 7-Managing blockchain infrastructure for enterprise-grade...
Webinar-GBA Episode 7-Managing blockchain infrastructure for enterprise-grade...Webinar-GBA Episode 7-Managing blockchain infrastructure for enterprise-grade...
Webinar-GBA Episode 7-Managing blockchain infrastructure for enterprise-grade...
 
Cloud computing and Cloud security fundamentals
Cloud computing and Cloud security fundamentalsCloud computing and Cloud security fundamentals
Cloud computing and Cloud security fundamentals
 
RightScale Webinar: Security and Compliance in the Cloud
RightScale Webinar: Security and Compliance in the CloudRightScale Webinar: Security and Compliance in the Cloud
RightScale Webinar: Security and Compliance in the Cloud
 
ODell - Resume
ODell - ResumeODell - Resume
ODell - Resume
 
Decision Matrix for IoT Product Development
Decision Matrix for IoT Product DevelopmentDecision Matrix for IoT Product Development
Decision Matrix for IoT Product Development
 
IT_Security_Service Delivery_Consultant
IT_Security_Service Delivery_Consultant IT_Security_Service Delivery_Consultant
IT_Security_Service Delivery_Consultant
 
Hyperledger Austin meetup July 10, 2018
Hyperledger Austin meetup July 10, 2018Hyperledger Austin meetup July 10, 2018
Hyperledger Austin meetup July 10, 2018
 

More from kanimozhin

Webinar series part 2 recipe for a successful saa s company - migrating sing...
Webinar series part 2  recipe for a successful saa s company - migrating sing...Webinar series part 2  recipe for a successful saa s company - migrating sing...
Webinar series part 2 recipe for a successful saa s company - migrating sing...
kanimozhin
 
Techcello webinar ppt slideshare
Techcello webinar ppt slideshareTechcello webinar ppt slideshare
Techcello webinar ppt slideshare
kanimozhin
 
Slcm webinar
Slcm webinarSlcm webinar
Slcm webinar
kanimozhin
 
Techcello at a glance
Techcello at a glanceTechcello at a glance
Techcello at a glance
kanimozhin
 
Recipe for successful saas company part 1
Recipe for successful saas company part 1Recipe for successful saas company part 1
Recipe for successful saas company part 1
kanimozhin
 
Single vs. multi tenant cost comparison
Single vs. multi tenant cost comparisonSingle vs. multi tenant cost comparison
Single vs. multi tenant cost comparison
kanimozhin
 
Saas challenges and solutions
Saas challenges and solutionsSaas challenges and solutions
Saas challenges and solutions
kanimozhin
 
Leveraging azure and cello for delivering highly scalable multi tenant
Leveraging azure and cello for delivering highly scalable multi tenantLeveraging azure and cello for delivering highly scalable multi tenant
Leveraging azure and cello for delivering highly scalable multi tenant
kanimozhin
 
How to build, manage and operate a successful saas business
How to build, manage and operate a successful saas businessHow to build, manage and operate a successful saas business
How to build, manage and operate a successful saas business
kanimozhin
 
How to benchmark the maturity of your saas solution
How to benchmark the maturity of your saas solutionHow to benchmark the maturity of your saas solution
How to benchmark the maturity of your saas solution
kanimozhin
 
Engineering & operational services plug in for cloud providers
Engineering & operational services plug in for cloud providersEngineering & operational services plug in for cloud providers
Engineering & operational services plug in for cloud providers
kanimozhin
 
Cello Saas getting started
Cello Saas getting startedCello Saas getting started
Cello Saas getting started
kanimozhin
 
Building a scalable and profitable saa s business model
Building a scalable and profitable saa s business modelBuilding a scalable and profitable saa s business model
Building a scalable and profitable saa s business model
kanimozhin
 
10 features to check out in your subscription management solution
10 features to check out in your subscription management solution10 features to check out in your subscription management solution
10 features to check out in your subscription management solution
kanimozhin
 
9 quotable quotes about multi tenancy
9 quotable quotes about multi tenancy9 quotable quotes about multi tenancy
9 quotable quotes about multi tenancy
kanimozhin
 

More from kanimozhin (15)

Webinar series part 2 recipe for a successful saa s company - migrating sing...
Webinar series part 2  recipe for a successful saa s company - migrating sing...Webinar series part 2  recipe for a successful saa s company - migrating sing...
Webinar series part 2 recipe for a successful saa s company - migrating sing...
 
Techcello webinar ppt slideshare
Techcello webinar ppt slideshareTechcello webinar ppt slideshare
Techcello webinar ppt slideshare
 
Slcm webinar
Slcm webinarSlcm webinar
Slcm webinar
 
Techcello at a glance
Techcello at a glanceTechcello at a glance
Techcello at a glance
 
Recipe for successful saas company part 1
Recipe for successful saas company part 1Recipe for successful saas company part 1
Recipe for successful saas company part 1
 
Single vs. multi tenant cost comparison
Single vs. multi tenant cost comparisonSingle vs. multi tenant cost comparison
Single vs. multi tenant cost comparison
 
Saas challenges and solutions
Saas challenges and solutionsSaas challenges and solutions
Saas challenges and solutions
 
Leveraging azure and cello for delivering highly scalable multi tenant
Leveraging azure and cello for delivering highly scalable multi tenantLeveraging azure and cello for delivering highly scalable multi tenant
Leveraging azure and cello for delivering highly scalable multi tenant
 
How to build, manage and operate a successful saas business
How to build, manage and operate a successful saas businessHow to build, manage and operate a successful saas business
How to build, manage and operate a successful saas business
 
How to benchmark the maturity of your saas solution
How to benchmark the maturity of your saas solutionHow to benchmark the maturity of your saas solution
How to benchmark the maturity of your saas solution
 
Engineering & operational services plug in for cloud providers
Engineering & operational services plug in for cloud providersEngineering & operational services plug in for cloud providers
Engineering & operational services plug in for cloud providers
 
Cello Saas getting started
Cello Saas getting startedCello Saas getting started
Cello Saas getting started
 
Building a scalable and profitable saa s business model
Building a scalable and profitable saa s business modelBuilding a scalable and profitable saa s business model
Building a scalable and profitable saa s business model
 
10 features to check out in your subscription management solution
10 features to check out in your subscription management solution10 features to check out in your subscription management solution
10 features to check out in your subscription management solution
 
9 quotable quotes about multi tenancy
9 quotable quotes about multi tenancy9 quotable quotes about multi tenancy
9 quotable quotes about multi tenancy
 

Recently uploaded

The-McKinsey-7S-Framework. strategic management
The-McKinsey-7S-Framework. strategic managementThe-McKinsey-7S-Framework. strategic management
The-McKinsey-7S-Framework. strategic management
Bojamma2
 
Introduction to Amazon company 111111111111
Introduction to Amazon company 111111111111Introduction to Amazon company 111111111111
Introduction to Amazon company 111111111111
zoyaansari11365
 
LA HUG - Video Testimonials with Chynna Morgan - June 2024
LA HUG - Video Testimonials with Chynna Morgan - June 2024LA HUG - Video Testimonials with Chynna Morgan - June 2024
LA HUG - Video Testimonials with Chynna Morgan - June 2024
Lital Barkan
 
Business Valuation Principles for Entrepreneurs
Business Valuation Principles for EntrepreneursBusiness Valuation Principles for Entrepreneurs
Business Valuation Principles for Entrepreneurs
Ben Wann
 
falcon-invoice-discounting-a-premier-platform-for-investors-in-india
falcon-invoice-discounting-a-premier-platform-for-investors-in-indiafalcon-invoice-discounting-a-premier-platform-for-investors-in-india
falcon-invoice-discounting-a-premier-platform-for-investors-in-india
Falcon Invoice Discounting
 
Tata Group Dials Taiwan for Its Chipmaking Ambition in Gujarat’s Dholera
Tata Group Dials Taiwan for Its Chipmaking Ambition in Gujarat’s DholeraTata Group Dials Taiwan for Its Chipmaking Ambition in Gujarat’s Dholera
Tata Group Dials Taiwan for Its Chipmaking Ambition in Gujarat’s Dholera
Avirahi City Dholera
 
Unveiling the Secrets How Does Generative AI Work.pdf
Unveiling the Secrets How Does Generative AI Work.pdfUnveiling the Secrets How Does Generative AI Work.pdf
Unveiling the Secrets How Does Generative AI Work.pdf
Sam H
 
5 Things You Need To Know Before Hiring a Videographer
5 Things You Need To Know Before Hiring a Videographer5 Things You Need To Know Before Hiring a Videographer
5 Things You Need To Know Before Hiring a Videographer
ofm712785
 
Discover the innovative and creative projects that highlight my journey throu...
Discover the innovative and creative projects that highlight my journey throu...Discover the innovative and creative projects that highlight my journey throu...
Discover the innovative and creative projects that highlight my journey throu...
dylandmeas
 
Attending a job Interview for B1 and B2 Englsih learners
Attending a job Interview for B1 and B2 Englsih learnersAttending a job Interview for B1 and B2 Englsih learners
Attending a job Interview for B1 and B2 Englsih learners
Erika906060
 
VAT Registration Outlined In UAE: Benefits and Requirements
VAT Registration Outlined In UAE: Benefits and RequirementsVAT Registration Outlined In UAE: Benefits and Requirements
VAT Registration Outlined In UAE: Benefits and Requirements
uae taxgpt
 
一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理
一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理
一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理
taqyed
 
FINAL PRESENTATION.pptx12143241324134134
FINAL PRESENTATION.pptx12143241324134134FINAL PRESENTATION.pptx12143241324134134
FINAL PRESENTATION.pptx12143241324134134
LR1709MUSIC
 
BeMetals Presentation_May_22_2024 .pdf
BeMetals Presentation_May_22_2024   .pdfBeMetals Presentation_May_22_2024   .pdf
BeMetals Presentation_May_22_2024 .pdf
DerekIwanaka1
 
RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...
RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...
RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...
BBPMedia1
 
Cree_Rey_BrandIdentityKit.PDF_PersonalBd
Cree_Rey_BrandIdentityKit.PDF_PersonalBdCree_Rey_BrandIdentityKit.PDF_PersonalBd
Cree_Rey_BrandIdentityKit.PDF_PersonalBd
creerey
 
amptalk_RecruitingDeck_english_2024.06.05
amptalk_RecruitingDeck_english_2024.06.05amptalk_RecruitingDeck_english_2024.06.05
amptalk_RecruitingDeck_english_2024.06.05
marketing317746
 
Search Disrupted Google’s Leaked Documents Rock the SEO World.pdf
Search Disrupted Google’s Leaked Documents Rock the SEO World.pdfSearch Disrupted Google’s Leaked Documents Rock the SEO World.pdf
Search Disrupted Google’s Leaked Documents Rock the SEO World.pdf
Arihant Webtech Pvt. Ltd
 
ENTREPRENEURSHIP TRAINING.ppt for graduating class (1).ppt
ENTREPRENEURSHIP TRAINING.ppt for graduating class (1).pptENTREPRENEURSHIP TRAINING.ppt for graduating class (1).ppt
ENTREPRENEURSHIP TRAINING.ppt for graduating class (1).ppt
zechu97
 
Affordable Stationery Printing Services in Jaipur | Navpack n Print
Affordable Stationery Printing Services in Jaipur | Navpack n PrintAffordable Stationery Printing Services in Jaipur | Navpack n Print
Affordable Stationery Printing Services in Jaipur | Navpack n Print
Navpack & Print
 

Recently uploaded (20)

The-McKinsey-7S-Framework. strategic management
The-McKinsey-7S-Framework. strategic managementThe-McKinsey-7S-Framework. strategic management
The-McKinsey-7S-Framework. strategic management
 
Introduction to Amazon company 111111111111
Introduction to Amazon company 111111111111Introduction to Amazon company 111111111111
Introduction to Amazon company 111111111111
 
LA HUG - Video Testimonials with Chynna Morgan - June 2024
LA HUG - Video Testimonials with Chynna Morgan - June 2024LA HUG - Video Testimonials with Chynna Morgan - June 2024
LA HUG - Video Testimonials with Chynna Morgan - June 2024
 
Business Valuation Principles for Entrepreneurs
Business Valuation Principles for EntrepreneursBusiness Valuation Principles for Entrepreneurs
Business Valuation Principles for Entrepreneurs
 
falcon-invoice-discounting-a-premier-platform-for-investors-in-india
falcon-invoice-discounting-a-premier-platform-for-investors-in-indiafalcon-invoice-discounting-a-premier-platform-for-investors-in-india
falcon-invoice-discounting-a-premier-platform-for-investors-in-india
 
Tata Group Dials Taiwan for Its Chipmaking Ambition in Gujarat’s Dholera
Tata Group Dials Taiwan for Its Chipmaking Ambition in Gujarat’s DholeraTata Group Dials Taiwan for Its Chipmaking Ambition in Gujarat’s Dholera
Tata Group Dials Taiwan for Its Chipmaking Ambition in Gujarat’s Dholera
 
Unveiling the Secrets How Does Generative AI Work.pdf
Unveiling the Secrets How Does Generative AI Work.pdfUnveiling the Secrets How Does Generative AI Work.pdf
Unveiling the Secrets How Does Generative AI Work.pdf
 
5 Things You Need To Know Before Hiring a Videographer
5 Things You Need To Know Before Hiring a Videographer5 Things You Need To Know Before Hiring a Videographer
5 Things You Need To Know Before Hiring a Videographer
 
Discover the innovative and creative projects that highlight my journey throu...
Discover the innovative and creative projects that highlight my journey throu...Discover the innovative and creative projects that highlight my journey throu...
Discover the innovative and creative projects that highlight my journey throu...
 
Attending a job Interview for B1 and B2 Englsih learners
Attending a job Interview for B1 and B2 Englsih learnersAttending a job Interview for B1 and B2 Englsih learners
Attending a job Interview for B1 and B2 Englsih learners
 
VAT Registration Outlined In UAE: Benefits and Requirements
VAT Registration Outlined In UAE: Benefits and RequirementsVAT Registration Outlined In UAE: Benefits and Requirements
VAT Registration Outlined In UAE: Benefits and Requirements
 
一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理
一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理
一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理
 
FINAL PRESENTATION.pptx12143241324134134
FINAL PRESENTATION.pptx12143241324134134FINAL PRESENTATION.pptx12143241324134134
FINAL PRESENTATION.pptx12143241324134134
 
BeMetals Presentation_May_22_2024 .pdf
BeMetals Presentation_May_22_2024   .pdfBeMetals Presentation_May_22_2024   .pdf
BeMetals Presentation_May_22_2024 .pdf
 
RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...
RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...
RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...
 
Cree_Rey_BrandIdentityKit.PDF_PersonalBd
Cree_Rey_BrandIdentityKit.PDF_PersonalBdCree_Rey_BrandIdentityKit.PDF_PersonalBd
Cree_Rey_BrandIdentityKit.PDF_PersonalBd
 
amptalk_RecruitingDeck_english_2024.06.05
amptalk_RecruitingDeck_english_2024.06.05amptalk_RecruitingDeck_english_2024.06.05
amptalk_RecruitingDeck_english_2024.06.05
 
Search Disrupted Google’s Leaked Documents Rock the SEO World.pdf
Search Disrupted Google’s Leaked Documents Rock the SEO World.pdfSearch Disrupted Google’s Leaked Documents Rock the SEO World.pdf
Search Disrupted Google’s Leaked Documents Rock the SEO World.pdf
 
ENTREPRENEURSHIP TRAINING.ppt for graduating class (1).ppt
ENTREPRENEURSHIP TRAINING.ppt for graduating class (1).pptENTREPRENEURSHIP TRAINING.ppt for graduating class (1).ppt
ENTREPRENEURSHIP TRAINING.ppt for graduating class (1).ppt
 
Affordable Stationery Printing Services in Jaipur | Navpack n Print
Affordable Stationery Printing Services in Jaipur | Navpack n PrintAffordable Stationery Printing Services in Jaipur | Navpack n Print
Affordable Stationery Printing Services in Jaipur | Navpack n Print
 

Security architecture best practices for saas applications

  • 1. Security Architecture Best Practices for SaaS Applications 22-May-2014 www.techcello.com
  • 2. © Techcello www.techcello.com Housekeeping Instructions  All phones are set to mute. If you have any questions, please type them in the Chat window located beside the presentation panel.  We have already received several questions from the registrants, which will be answered by the speakers during the Q & A session.  We will continue to collect more questions during the session as we receive and will try to answer them during today’s session.  In case if you do not receive answers to your question today, you will certainly receive answers via email shortly.  Thanks for your participation and enjoy the session!
  • 3. © Techcello www.techcello.com TechCello Introduction  Cloud Ready, SaaS/Multi- Tenant SaaS Application Development Framework  Provides end-end SaaS Lifecycle Management Solution  Redefines the way SaaS products are built and managed  Saves anywhere between 30%-50% of time and cost
  • 4. © Techcello www.techcello.com Speaker Profiles Vittal Raj International VP, ISACA Founder, Pristine Consulting  Last two decades into Consulting, Assurance & Training in IS Security, IT Compliance/Governance, Enterprise Risk Management, Risk based Internal Audit and Digital Forensics.  Directed and managed projects in the areas of IS Security Implementation, Cyber Crime Forensics & Cyber Law Consulting, Network & Web Application Vulnerability Assessments  Specialist trainer in IT Risk Management and Information Security Jothi Rengarajan Chief Technical Architect TechCello  14+ years of experience in architecting cloud and SaaS solutions for both ISVs and Enterprises  Chief architect in designing and constructing TechCello framework  Plays consultative role with customers in implementing technical solutions
  • 5. Gartner forecasts on SaaS…… • Saas market set to top $22 b by 2015 • Surge in software spends by 2015, Stratification of Saas • CRM, ERP and office & productivity SaaS on the lead • Multi-tenancy way to go supported by innovative tech • Customers concerns - Continuity, Security & Contractual
  • 6. What’s slowing down SaaS adoption ? • Application Control & Security Governance • Contractual Transparency & SLA Assurance • Business Continuity & Resilience • Security Management – Security of Data in a multi-tenancy model – Risk driven Security management – Identity and access management (IAM) – Adequacy, Sustainability • Privacy and Regulatory concerns – Data location , Privacy Compliance, IAM, Licensing, legal & electronic discovery • Customisation & Transitioning out • Continual Independent Assurance • Pricing Indemnity 6
  • 7. Framework based approach driven on Stakeholder Expectations Goals to Results Source: COBIT 5®, ITGI
  • 8. Application & Interfaces Data Security & Information Life Cycle Mngt Encryption & Key Management Infrastructure & Virtualisation Security Data Centre Security Identify & Access Management Change Control & Configuration Management SCM, Transparency & Accountability Human Resources Business Continuity & Operational Resilience Audit, Assurance & Compliance Governance & Risk Management Key Control Drivers Source: CCSA – CCS Matrix
  • 9. Holistic approach for sustainable governance Source: COBIT 5®, ITGI
  • 10. Managing Operational Risks in SaaS Services • SaaS Governance Framework - Client – Risk Assessment & Management – Service Level Management – Performance Management (Metrics & Mechanisms) – Auditability and Audits • Risk Management & Assurance • Standards & Certification • Assurance by CSP • Insurance • Contract Governance 10 • Security Management – Security Framework – Encryption, Data Exchange Controls • Transition Management • Monitoring Capabilities • Billing Control • Litigation Clauses • Regulatory Compliance
  • 11. International Standards • COBIT 5 – Controls and Assurance in the Cloud • CSA Guides • AICPA Service Organization Control (SOC) 1 Report • AICPA/CICA Trust Services (SysTrust and WebTrust) • ISO 2700x— Information security management system (ISMS) • Cloud Security Matrix—By Cloud Security Alliance • NIST SP 800-53—The NIST IT security controls standards, Health Information Trust Alliance (HITRUST) • BITS—The BITS Shared Assessment Program – contains the Standardized Information Gathering (SIG) questionnaire and Agreed Upon Procedures (AUP). • European Network and Information Security Agency (ENISA) – Cloud Computing—Benefits, Risks and Recommendations for Information Security. 11
  • 12. ‘Trustworthy’ SaaS key to customer acquisition & loyalty
  • 13. Feel free to contact me with your questions, comments & feedback: R Vittal Raj rvittalraj@gmail.com Linkedin: rvittalraj
  • 14. © Techcello www.techcello.com SaaS Customer Concerns  Data Storage and Segregation • Is it a dedicated or a shared environment? • If it a shared environment, how is the data segregated from other shared environments? • How is security managed in the shared environment? What controls are in place?  ACL • What type of identity management solution is provided? • Is Single Sign-On (SSO) provided? What types of SSO options are available? SAML, Open Auth etc? • What type of user store is available? Can this user store be integrated with Active Directory or any other user store database? • What type of user security, authentication and authorization options are available?
  • 15. © Techcello www.techcello.com SaaS Customer Concerns  Data Security • How is the primary data encrypted? What encryption schemes are used? Who has access to the decryption keys? How often is this tested?  Audits • What application & data access audit logs are available? How often can you get this? • What type of investigative support is provided in cases of breach?
  • 16. SaaS Security Architecture Goals Protection of information. It deals with the prevention and detection of unauthorized actions and ensuring confidentiality, integrity of data. © Techcello www.techcello.com  Robust Tenant data isolation  Flexible RBAC – Prevent unauthorized action  Proven Data security  Prevention of Web related top threats as per OWASP  Strong Security Audit Logs
  • 17. © Techcello www.techcello.com Tenant Data Isolation Design for a Hybrid Approach
  • 18. © Techcello www.techcello.com Tenant Data Isolation  Database Routing Based On Tenant  Application Layer Auto Tenant Filter  Tenant Based View Filter
  • 19. © Techcello www.techcello.com ACL Architecture
  • 20. © Techcello www.techcello.com Role Based Access Control (RBAC) Authentication • Separate Common Identity Provider • Identity Provider Support Options • Custom Username Password Authentication • AD Integrated SSO • Open ID Authentication • Multi factor authentication • Hybrid Authentication Support
  • 21. © Techcello www.techcello.com Role Based Access Control (RBAC) Authorization • ACL Metadata • Use privileges • Map with roles • Roles should be defined by business users • Role mapped to privileges and user mapped to roles • Access Check Services • Control at a URL, Action, Data and Field level • Configuration based privilege control
  • 22. © Techcello www.techcello.com Role Based Access Control (RBAC) Authorization • Rest API Implementation • External Application Integration • Oauth2.0 • HMAC • Internal Application Integration • Session Token • Cookie
  • 23. © Techcello www.techcello.com OWASP – TOP 10 Threats 2013 A1 Injection A2 Broken Authentication and Session Management (was formerly A3) A3 Cross-Site Scripting (XSS) (was formerly A2) A4 Insecure Direct Object References A5 Security Misconfiguration (was formerly A6) A6 Sensitive Data Exposure (merged from former A7 Insecure Cryptographic Storage and former A9 Insufficient Transport Layer Protection) A7 Missing Function Level Access Control (renamed/broadened from former A8 Failure to Restrict URL Access) A8 Cross-Site Request Forgery (CSRF) (was formerly A5) A9 Using Known Vulnerable Components (new but was part of former A6 – Security Misconfiguration) A10 Unvalidated Redirects and Forwards
  • 24. © Techcello www.techcello.com Security Testing Dynamic Testing Static Testing Security Verification
  • 25. © Techcello www.techcello.com Security Audit Event Audit • Audit positive events, more importantly audit negative events • Should cover, • Who does the action? • What action is performed? • What is the context in which the operation is performed? • What time is the action performed? • Audit details stored in a separate datastore for better performance • Real-time audit details – audit cache server
  • 26. © Techcello www.techcello.com Security Audit Transaction and Change Audit • Transaction Audit • Snapshot: Exact copy of the row stored in history tables • More suitable if requests to access past data are more • More data growth • Change Audit • Only the delta of the state change captured as part of change tables • More suitable when changes need to be reported and past data are not required much • Used more for Security tracking purposes • Easier to implement by using methods available out of the box in RDBMS such as CDC for SQL server • Asynchronous Mode : For better performance and if we wish that audit should not roll back the transactions it is advisable to audit in a asynchronous thread.
  • 27. © Techcello www.techcello.com Security Audit User Action Audit • Audit all user actions • Capture the entry url, time, location details, browser details, response status, any exceptions • Provide analysis on the user actions • Can be customized at application layer or can use the webserver logs
  • 29. Cello Stack – At a Glance How does it work? Administrative Tenant Licensing Metering Billing Data Backup Modules Provisioning Security User Role/Privilege Auditing Modules Management Mgmt. Custom Fields Custom LoV Ad-hoc Builders Cloud Ready, Multi-Tenant Application Development Framework Single Sign-on Dynamic Data Scope Business Rules Workflow Dynamic Forms Enterprise Engines Integration Modules Settings Template Events Notification Templates Query Chart Reports Code Productivity Boosters Templates Master Data Mgmt. Forms Generation Application Multi-Tenancy & Tenant Data Isolation Themes & Logo Pre & Post Processors Configurability Modules Cello Cloud Adapters
  • 30. © Techcello www.techcello.com Contact Details Jothi Rengarajan (jothi.r@techcello.com) Vittal Raj (rvittalraj@gmail.com) Reference URLs Web : http://www.techcello.com ROI Calculator : http://www.techcello.com/techcello-roi-calculator Demo Videos : http://www.techcello.com/techcello-resources/techcello-product- demo SaaS e-Book: http://www.techcello.com/techcello-resources/techcello-resources- white-papers Thank You

Editor's Notes

  1. Custom Store Password encryption/ hashing Password change policy externalization Active Directory Integration Identity Federation
  2. Custom Store Password encryption/ hashing Password change policy externalization Active Directory Integration Identity Federation