SlideShare a Scribd company logo
1 of 55
Demystifying what’s secure and what you need to do
Understanding IT’s Role
in Public Cloud Security
WELCOME
• Thank you for attending
• Today’s topic
• Is there a solution that right for you?
• Setting the stage, what we’re hearing from our
customers…
YOUR PRESENTERS
Skip Purdy
Sr Solutions Architect
Skip.Purdy@softchoice.com
https://www.linkedin.com/in/skippu
Luke Black
Manager, Microsoft Marketing and
Programs
Luke.Black@softchoice.com
https://www.linkedin.com/in/luke-black/
TODAY’S
OBJECTIVE
Help you understand
what a Cloud Provider
secures and what is
your responsibility
AGENDA
• Quick backgrounder on Cloud
• Data center security
• Areas you need to secure
• Security prioritization model
Cloud
Adoption
Time
+ Cust Exp
Manage Risk
Biz Impact
Time
Trad
IT
Biz
Cloud
Adoption
+ Cust Exp
Manage Risk
Biz Impact
Time
Trad
IT
No plan
• Pilots
• 3-5 yrs
Biz
Cloud
Adoption
+ Cust Exp
Manage Risk
Biz Impact
Time
Trad
IT
No plan DI
Y
> 30%
Fail
• Pilots
• 3-5 yrs
Biz
Cloud
Adoption
+ Cust Exp
Manage Risk
Biz Impact
• Skills
gap
Governanc
e• No
control
Time
Trad
IT
No plan DI
Y
> 30%
Fail
• Pilots
• 3-5 yrs
Biz
Cloud
Adoption
+ Cust Exp
Manage Risk
Biz Impact
• Skills
gap
Governanc
e• No
control
Time
Trad
IT
No plan DI
Y
> 30%
Fail
• Pilots
• 3-5 yrs
Biz
Cloud
Adoption
+ Cust Exp
Manage Risk
Biz Impact
• Skills
gap
Governanc
e• No
control
ARE THESE ISSUES?
records lost over the last 12 months
(Forrester, “Top Cybersecurity Threats in 2017”)
2 BILLION
People re-use credentials; the Yahoo! Breach alone is
estimated to have exposed the credentials of more than
25% of global internet users
25%
ARE THESE ISSUES?
of enterprise firms suffered at least two breaches in 2016
44%
Average time to detection of a breach is in excess of 99 days
99 DAYS
ARE THESE ISSUES?
of enterprises report not having enough security staff
62%
of enterprises state finding employees with the right
skills is a further challenge
65%
SHARED SECURITY MODEL
Cloud
Service
s
WHAT DO WE MEAN BY CLOUD?
Infrastructure
as a Service
IaaS
Caching
Legacy
Networking
Security
File
Technical
System Mgmt.
MIGRATE TO IT
Platform
as a Service
PaaS
Application Development
Decision Support
Web
Streaming
BUILD ON IT
Software
as a Service
SaaS
Email
CRM
Collaborative
ERP
CONSUME
SHARED SECURITY MODEL
Responsibility
Data classification &
accountability
Client & end-point
protection
Identity & access
management
Application level
controls
Network
controls
Host
infrastructure
Physical
security
On-Prem IaaS PaaS SaaS
Cloud Customer Cloud Provider
The customer is both
accountable and
responsible for all aspects
of security and operating
solutions when they are
deployed on-premises
On-Prem
With IaaS deployments,
the elements such as
building, servers,
networking hardware, and
the hypervisor, should be
managed by the platform
vendor. The customer is
responsible or has a
shared responsibility for
securing and managing
the operating system,
network configuration,
applications, identity,
clients, and data.
IaaS
PaaS solutions build on
IaaS deployments and the
provider is additionally
responsible to manage
and secure the network
controls. The customer is
still responsible or has a
shared responsibility for
securing and managing
applications, identity,
clients, and data.
PaaS
With SaaS a vendor
provides the application
and abstracts customers
from the underlying
components.
Nonetheless, the
customer continues to be
accountable and must
ensure that data is
classified correctly, and
shares a responsibility to
manage their users, and
end point devices.
SaaS
IN A SHARED RESPONSIBILITY MODEL, A LAYERED APPROACH
TO SECURITY IS ILLUSTRATED AS:
SHARED SECURITY MODEL
Responsibility
Data classification &
accountability
Client & end-point
protection
Identity & access
management
Application level
controls
Network
controls
Host
infrastructure
Physical
security
On-Prem IaaS PaaS SaaS
Cloud Customer Cloud Provider
DATA CENTER SECURITY
A Microsoft Data Center
A CLOUD YOU CAN TRUST
At Microsoft, we never take your
trust for granted
• We are serious about our commitment to
protect customers in a cloud first world.
• We live by standards and practices
designed to earn your confidence.
• We collaborate with industry and regulators
to build trust in the cloud ecosystem.
“Businesses and users are going to embrace
technology only if they can trust it.”
– Satya Nadella
DATACENTER SECURITY
Perimeter
Computer
room
Building
Seismic
bracing
Security
operations center
24X7
security staff
Days of
backup power
Cameras Alarms
Two-factor access control:
Biometric readers & card readers
Barriers Fencing
Infrastructure security controls Operational security controls Compliance
Broadly
Applicable
United States
Government
Industry
Specific
Region/Country
Specific
Microsoft Cloud Compliance Certifications and Attestations
SHARED SECURITY MODEL
Responsibility
Data classification &
accountability
Client & end-point
protection
Identity & access
management
Application level
controls
Network
controls
Host
infrastructure
Physical
security
On-Prem IaaS PaaS SaaS
Cloud Customer Cloud Provider
WHAT IS IDENTITY MANAGEMENT?
LOB app Data Set Word.doc = Read & Write
ACCESS CONTROL (WHAT)
Controls when and how access
is granted to authenticate users
IDENTITY (WHO)
Establishes an validates
a user’s digital identity
STREAMLINING EMPLOYEE IDENTITY AND ACCESS MANAGEMENT TO
APPLICATIONS, SYSTEMS, AND DATA ACROSS THE ORGANIZATION
Sample Size = 2,320
Priority levels for streaming employee identities across organizations
Not on our agenda / Low Priority (1,2) 13%
Moderate Priority (3) 30%
High Priority (4, 5) 56%
Don’t Know (98) 1%
THE CURRENT REALITY
IDENTITY AS THE CORE OF ENTERPRISE MOBILITY
Azure Active Directory as the control plane
Single sign-onSelf-service
Simple connection
On-premises
Other
directories
Windows Server
Active Directory
SaaSAzure
Public
cloud
CloudMicrosoft Azure Active Directory
Customers
Partners
SHARED SECURITY MODEL
Responsibility
Data classification &
accountability
Client & end-point
protection
Identity & access
management
Application level
controls
Network
controls
Host
infrastructure
Physical
security
On-Prem IaaS PaaS SaaS
Cloud Customer Cloud Provider
WHAT DO WE MEAN BY HOST INFRASTRUCTURE (IAAS)
• Managed Operating system
– Patching
– Backup
– Antivirus, malware
• Storage
– Key storage, management of API Keys and Certs
CAPABILITY BENEFITS
AZURE RESOURCE
MANAGER
• Template based deployment
• Manage application infrastructure as source code
• Identical environment configurations
• Resource Policy
• Resource Locks
AZURE STORAGE
ENCRYPTION
• Encryption for Data at Rest
• Client side libraries for encryption in transit
SUPPORTING CAPABILITIES FOR SECURE APPLICATIONS
SHARED SECURITY MODEL
Responsibility
Data classification &
accountability
Client & end-point
protection
Identity & access
management
Application level
controls
Network
controls
Host
infrastructure
Physical
security
On-Prem IaaS PaaS SaaS
Cloud Customer Cloud Provider
WHAT DO WE MEAN BY NETWORK INFRASTRUCTURE (IAAS)
• Configuration, management and securing of network elements:
– Virtual networking
– Load balancing
– DNS
– Gateways
• Means for services to communicate and interoperate
The Ultimate Protection Against Cloud Security
Threats
Barracuda Solutions for Azure
Web Based
Apps
Networking
and
Infrastructure
 Integrated intrusion prevention
 URL filtering
 User and application aware
 IPsec VPNs secure remote
connectivity
 Dynamically scales with your
network
 Data loss prevention
 Application layer DDoS attack
protection
 Granular identity and access
management
 Comprehensive administration
and management
CLOUD SECURITY THREATS
Networking Protection
Application Protection
Continuity gaps
Secure
connectivity
Exploited system
vulnerabilities
Compromised
credentials
Hacked APIs
Data breaches
DDoS attacks
Q&A
SHARED SECURITY MODEL
Responsibility
Data classification &
accountability
Client & end-point
protection
Identity & access
management
Application level
controls
Network
controls
Host
infrastructure
Physical
security
On-Prem IaaS PaaS SaaS
Cloud Customer Cloud Provider
AZURE INFORMATION
PROTECTION
THE EVOLUTION OF INFORMATION PROTECTION
DOCUMENT
TRACKING
DOCUMENT
REVOCATION
Monitor &
respond
LABELINGCLASSIFICATION
Classification &
labeling
ENCRYPTION
Protect
ACCESS
CONTROL
POLICY
ENFORCEMENT
Azure Information
Protection DOCUMENT
TRACKING
DOCUMENT
REVOCATION
Monitor &
respond
LABELINGCLASSIFICATION
Classification &
labeling
ENCRYPTION
Protect
ACCESS
CONTROL
POLICY
ENFORCEMENT
Full Data
Lifecycle
CLASSIFY DATA – BEGIN THE JOURNEY
Classify data based on sensitivity
SECRET
CONFIDENTIAL
INTERNAL
NOT RESTRICTED
IT admin sets policies,
templates, and rules
PERSONAL
Start with the data that is most
sensitive
IT can set automatic rules; users can
complement it
Associate actions such as visual
markings and protection
PROTECT DATA AGAINST UNAUTHORIZED USE
VIEW EDIT COPY PASTE
Email
attachment
FILE
PROTECT DATA NEEDING PROTECTION BY:
Encrypting data
Including authentication requirement and a definition of use rights
(permissions) to the data
Providing protection that is persistent and travels with the data
Personal apps
Corporate apps
Monitor use, control and block abuse
Sue
Joe blocked in North America
Jane accessed from India
Bob accessed from South America
MAP VIEW
Jane blocked in Africa
Jane
Competitors
Jane access is revoked
Sue
Bob
Jane
TIME
ADOPTION
STAGES OF ADOPTION:
Governance Workshop
SaaS TechCheck
Accelerator
Analyzer
Accelerator
Professional Services
Keystone
Detect & Respond
• Monitor ongoing
• Use new capabilities
• Review policies
Secure Data
• Classify data
• Implement rights management solution
• Encryption where required
Secure Host & Network
• Understand your current state
• Secure operating system
• Secure the network
Secure Identity
• Gain control of SaaS
• Align identity
• Make it easy for users
Build Plan
• Define roles & access levels
• Procurement rules
• Resource Policies
TODAY’S
OBJECTIVE
Help you understand
what a Cloud Provider
secures and what is
your responsibility
Q&A
Support Slides
Microsoft security packaging
Office 365
Windows 10
Enterprise
Mobility +
Security
Operations
Mgmt. + Security
Windows Server
2016
SQL Server 2016
Information
protection
Identity-driven
security
Managed mobile
productivity
Identity and access
management
Azure Information
Protection Premium P2
Intelligent classification and
encryption for files shared
inside and outside your
organization
(includes all capabilities in P1)
Azure Information
Protection Premium P1
Manual classification and
encryption for all files and
storage locations
Cloud-based file tracking
Microsoft Cloud
App Security
Enterprise-grade visibility,
control, and protection for
your cloud applications
Microsoft Advanced
Threat Analytics
Protection from advanced
targeted attacks leveraging
user and entity behavioral
analytics
Microsoft Intune
Mobile device and app
management to protect
corporate apps and data on
any device
Azure Active Directory
Premium P2
Identity and access
management with advanced
protection for users and
privileged identities
(includes all capabilities in P1)
Azure Active Directory
Premium P1
Secure single sign-on to
cloud and on-premises apps
MFA, conditional access, and
advanced security reporting
EMS
E3
EMS
E5
•
WHAT DID WE NOT COVER?

More Related Content

What's hot

Microsoft 365 Enterprise Security with E5 Overview
Microsoft 365 Enterprise Security with E5 OverviewMicrosoft 365 Enterprise Security with E5 Overview
Microsoft 365 Enterprise Security with E5 OverviewDavid J Rosenthal
 
Cloud First Architecture
Cloud First ArchitectureCloud First Architecture
Cloud First ArchitectureCameron Vetter
 
Reducing the Chance of an Office 365 Security Breach
Reducing the Chance of an Office 365 Security BreachReducing the Chance of an Office 365 Security Breach
Reducing the Chance of an Office 365 Security BreachQuest
 
SharePoint Governance: Impacts of Moving to the Cloud
SharePoint Governance: Impacts of Moving to the CloudSharePoint Governance: Impacts of Moving to the Cloud
SharePoint Governance: Impacts of Moving to the CloudChristian Buckley
 
Microsoft 365 and Microsoft Cloud App Security
Microsoft 365 and Microsoft Cloud App SecurityMicrosoft 365 and Microsoft Cloud App Security
Microsoft 365 and Microsoft Cloud App SecurityAlbert Hoitingh
 
Fundamentals of Microsoft 365 Security , Identity and Compliance
Fundamentals of Microsoft 365 Security , Identity and ComplianceFundamentals of Microsoft 365 Security , Identity and Compliance
Fundamentals of Microsoft 365 Security , Identity and ComplianceVignesh Ganesan I Microsoft MVP
 
Beyond the hype: Management and Governance for Office 365
Beyond the hype: Management and Governance for Office 365Beyond the hype: Management and Governance for Office 365
Beyond the hype: Management and Governance for Office 365Roberto Vazquez Delgado
 
Security, Administration & Governance for SharePoint On-Prem, Online, & Every...
Security, Administration & Governance for SharePoint On-Prem, Online, & Every...Security, Administration & Governance for SharePoint On-Prem, Online, & Every...
Security, Administration & Governance for SharePoint On-Prem, Online, & Every...Christian Buckley
 
Office 365 Saturday - Office 365 Security Best Practices
Office 365 Saturday - Office 365 Security Best PracticesOffice 365 Saturday - Office 365 Security Best Practices
Office 365 Saturday - Office 365 Security Best PracticesBenoit HAMET
 
The Future of Business Process With Nintex
The Future of Business Process With NintexThe Future of Business Process With Nintex
The Future of Business Process With NintexDavid J Rosenthal
 
SharePoint Saturday Cambridge: Security & compliance
SharePoint Saturday Cambridge: Security & complianceSharePoint Saturday Cambridge: Security & compliance
SharePoint Saturday Cambridge: Security & complianceAlbert Hoitingh
 
Office 365 for Small Businesses
Office 365 for Small BusinessesOffice 365 for Small Businesses
Office 365 for Small BusinessesCathie Briggette
 
Respond-Recover-Reimagine: Building Business Resilience
Respond-Recover-Reimagine: Building Business ResilienceRespond-Recover-Reimagine: Building Business Resilience
Respond-Recover-Reimagine: Building Business ResilienceDavid J Rosenthal
 
Webinar: Make Your Cloud Strategy Work for 2016
Webinar: Make Your Cloud Strategy Work for 2016Webinar: Make Your Cloud Strategy Work for 2016
Webinar: Make Your Cloud Strategy Work for 2016Alexandra Sasha Tchulkova
 
Office 365 External Collaboration - SharePoint Saturday Twin Cities Nov 2019
Office 365 External Collaboration - SharePoint Saturday Twin Cities Nov 2019Office 365 External Collaboration - SharePoint Saturday Twin Cities Nov 2019
Office 365 External Collaboration - SharePoint Saturday Twin Cities Nov 2019Matthew Ruderman
 

What's hot (20)

Microsoft 365 Enterprise Security with E5 Overview
Microsoft 365 Enterprise Security with E5 OverviewMicrosoft 365 Enterprise Security with E5 Overview
Microsoft 365 Enterprise Security with E5 Overview
 
Cloud First Architecture
Cloud First ArchitectureCloud First Architecture
Cloud First Architecture
 
Azure Security Overview
Azure Security OverviewAzure Security Overview
Azure Security Overview
 
Reducing the Chance of an Office 365 Security Breach
Reducing the Chance of an Office 365 Security BreachReducing the Chance of an Office 365 Security Breach
Reducing the Chance of an Office 365 Security Breach
 
SharePoint Governance: Impacts of Moving to the Cloud
SharePoint Governance: Impacts of Moving to the CloudSharePoint Governance: Impacts of Moving to the Cloud
SharePoint Governance: Impacts of Moving to the Cloud
 
Microsoft 365
Microsoft 365Microsoft 365
Microsoft 365
 
Microsoft 365 and Microsoft Cloud App Security
Microsoft 365 and Microsoft Cloud App SecurityMicrosoft 365 and Microsoft Cloud App Security
Microsoft 365 and Microsoft Cloud App Security
 
Fundamentals of Microsoft 365 Security , Identity and Compliance
Fundamentals of Microsoft 365 Security , Identity and ComplianceFundamentals of Microsoft 365 Security , Identity and Compliance
Fundamentals of Microsoft 365 Security , Identity and Compliance
 
Beyond the hype: Management and Governance for Office 365
Beyond the hype: Management and Governance for Office 365Beyond the hype: Management and Governance for Office 365
Beyond the hype: Management and Governance for Office 365
 
Security, Administration & Governance for SharePoint On-Prem, Online, & Every...
Security, Administration & Governance for SharePoint On-Prem, Online, & Every...Security, Administration & Governance for SharePoint On-Prem, Online, & Every...
Security, Administration & Governance for SharePoint On-Prem, Online, & Every...
 
Office 365 Saturday - Office 365 Security Best Practices
Office 365 Saturday - Office 365 Security Best PracticesOffice 365 Saturday - Office 365 Security Best Practices
Office 365 Saturday - Office 365 Security Best Practices
 
The Future of Business Process With Nintex
The Future of Business Process With NintexThe Future of Business Process With Nintex
The Future of Business Process With Nintex
 
Azure Sentinel.pptx
Azure Sentinel.pptxAzure Sentinel.pptx
Azure Sentinel.pptx
 
SharePoint Saturday Cambridge: Security & compliance
SharePoint Saturday Cambridge: Security & complianceSharePoint Saturday Cambridge: Security & compliance
SharePoint Saturday Cambridge: Security & compliance
 
Office 365 for Small Businesses
Office 365 for Small BusinessesOffice 365 for Small Businesses
Office 365 for Small Businesses
 
Respond-Recover-Reimagine: Building Business Resilience
Respond-Recover-Reimagine: Building Business ResilienceRespond-Recover-Reimagine: Building Business Resilience
Respond-Recover-Reimagine: Building Business Resilience
 
Webinar: Make Your Cloud Strategy Work for 2016
Webinar: Make Your Cloud Strategy Work for 2016Webinar: Make Your Cloud Strategy Work for 2016
Webinar: Make Your Cloud Strategy Work for 2016
 
Windows Azure for IT Pros
Windows Azure for IT ProsWindows Azure for IT Pros
Windows Azure for IT Pros
 
Office 365 External Collaboration - SharePoint Saturday Twin Cities Nov 2019
Office 365 External Collaboration - SharePoint Saturday Twin Cities Nov 2019Office 365 External Collaboration - SharePoint Saturday Twin Cities Nov 2019
Office 365 External Collaboration - SharePoint Saturday Twin Cities Nov 2019
 
Microsoft Cloud
Microsoft CloudMicrosoft Cloud
Microsoft Cloud
 

Similar to Demystifying Cloud Security Responsibilities

Protect your data in / with the Cloud
Protect your data in / with the CloudProtect your data in / with the Cloud
Protect your data in / with the CloudGWAVA
 
CloudPassage Best Practices for Automatic Security Scaling
CloudPassage Best Practices for Automatic Security ScalingCloudPassage Best Practices for Automatic Security Scaling
CloudPassage Best Practices for Automatic Security ScalingAmazon Web Services
 
Xylos Clients Day - Public cloud and security go hand in hand, if you approac...
Xylos Clients Day - Public cloud and security go hand in hand, if you approac...Xylos Clients Day - Public cloud and security go hand in hand, if you approac...
Xylos Clients Day - Public cloud and security go hand in hand, if you approac...Karim Vaes
 
AWS Webcast - Top 3 Ways to Improve Web App Security
AWS Webcast - Top 3 Ways to Improve Web App SecurityAWS Webcast - Top 3 Ways to Improve Web App Security
AWS Webcast - Top 3 Ways to Improve Web App SecurityAmazon Web Services
 
3 Secrets to Becoming a Cloud Security Superhero - Session Sponsored by Trend...
3 Secrets to Becoming a Cloud Security Superhero - Session Sponsored by Trend...3 Secrets to Becoming a Cloud Security Superhero - Session Sponsored by Trend...
3 Secrets to Becoming a Cloud Security Superhero - Session Sponsored by Trend...Amazon Web Services
 
Barracuda WAF: Scalable Security for Applications on AWS
Barracuda WAF: Scalable Security for Applications on AWSBarracuda WAF: Scalable Security for Applications on AWS
Barracuda WAF: Scalable Security for Applications on AWSAmazon Web Services
 
mcafee-cloud-acceleration-and-risks.pdf
mcafee-cloud-acceleration-and-risks.pdfmcafee-cloud-acceleration-and-risks.pdf
mcafee-cloud-acceleration-and-risks.pdfAndreBolo1
 
SharePoint Conference 2018 - Securing Office 365 and SharePoint Online with A...
SharePoint Conference 2018 - Securing Office 365 and SharePoint Online with A...SharePoint Conference 2018 - Securing Office 365 and SharePoint Online with A...
SharePoint Conference 2018 - Securing Office 365 and SharePoint Online with A...Scott Hoag
 
Cloud Security By Dr. Anton Ravindran
Cloud Security By Dr. Anton RavindranCloud Security By Dr. Anton Ravindran
Cloud Security By Dr. Anton RavindranGSTF
 
Azure Fundamentals Part 3
Azure Fundamentals Part 3Azure Fundamentals Part 3
Azure Fundamentals Part 3CCG
 
Chap 6 cloud security
Chap 6 cloud securityChap 6 cloud security
Chap 6 cloud securityRaj Sarode
 
SaaS Security.pptx
SaaS Security.pptxSaaS Security.pptx
SaaS Security.pptxchelsi33
 
saassecurity-230424030940-08314322.pdf
saassecurity-230424030940-08314322.pdfsaassecurity-230424030940-08314322.pdf
saassecurity-230424030940-08314322.pdfSahilSingh316535
 
talk6securingcloudamarprusty-191030091632.pptx
talk6securingcloudamarprusty-191030091632.pptxtalk6securingcloudamarprusty-191030091632.pptx
talk6securingcloudamarprusty-191030091632.pptxTrongMinhHoang1
 
Security and Compliance with SharePoint and Office 365
Security and Compliance with SharePoint and Office 365Security and Compliance with SharePoint and Office 365
Security and Compliance with SharePoint and Office 365Richard Harbridge
 
Microsoft Azure Cloud Services
Microsoft Azure Cloud ServicesMicrosoft Azure Cloud Services
Microsoft Azure Cloud ServicesDavid J Rosenthal
 

Similar to Demystifying Cloud Security Responsibilities (20)

Protect your data in / with the Cloud
Protect your data in / with the CloudProtect your data in / with the Cloud
Protect your data in / with the Cloud
 
CloudPassage Best Practices for Automatic Security Scaling
CloudPassage Best Practices for Automatic Security ScalingCloudPassage Best Practices for Automatic Security Scaling
CloudPassage Best Practices for Automatic Security Scaling
 
Xylos Clients Day - Public cloud and security go hand in hand, if you approac...
Xylos Clients Day - Public cloud and security go hand in hand, if you approac...Xylos Clients Day - Public cloud and security go hand in hand, if you approac...
Xylos Clients Day - Public cloud and security go hand in hand, if you approac...
 
AWS Webcast - Top 3 Ways to Improve Web App Security
AWS Webcast - Top 3 Ways to Improve Web App SecurityAWS Webcast - Top 3 Ways to Improve Web App Security
AWS Webcast - Top 3 Ways to Improve Web App Security
 
3 Secrets to Becoming a Cloud Security Superhero - Session Sponsored by Trend...
3 Secrets to Becoming a Cloud Security Superhero - Session Sponsored by Trend...3 Secrets to Becoming a Cloud Security Superhero - Session Sponsored by Trend...
3 Secrets to Becoming a Cloud Security Superhero - Session Sponsored by Trend...
 
Barracuda WAF: Scalable Security for Applications on AWS
Barracuda WAF: Scalable Security for Applications on AWSBarracuda WAF: Scalable Security for Applications on AWS
Barracuda WAF: Scalable Security for Applications on AWS
 
mcafee-cloud-acceleration-and-risks.pdf
mcafee-cloud-acceleration-and-risks.pdfmcafee-cloud-acceleration-and-risks.pdf
mcafee-cloud-acceleration-and-risks.pdf
 
Lecture31.ppt
Lecture31.pptLecture31.ppt
Lecture31.ppt
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
 
SharePoint Conference 2018 - Securing Office 365 and SharePoint Online with A...
SharePoint Conference 2018 - Securing Office 365 and SharePoint Online with A...SharePoint Conference 2018 - Securing Office 365 and SharePoint Online with A...
SharePoint Conference 2018 - Securing Office 365 and SharePoint Online with A...
 
Cloud Security By Dr. Anton Ravindran
Cloud Security By Dr. Anton RavindranCloud Security By Dr. Anton Ravindran
Cloud Security By Dr. Anton Ravindran
 
Azure Fundamentals Part 3
Azure Fundamentals Part 3Azure Fundamentals Part 3
Azure Fundamentals Part 3
 
Lecture5
Lecture5Lecture5
Lecture5
 
Chap 6 cloud security
Chap 6 cloud securityChap 6 cloud security
Chap 6 cloud security
 
SaaS Security.pptx
SaaS Security.pptxSaaS Security.pptx
SaaS Security.pptx
 
saassecurity-230424030940-08314322.pdf
saassecurity-230424030940-08314322.pdfsaassecurity-230424030940-08314322.pdf
saassecurity-230424030940-08314322.pdf
 
talk6securingcloudamarprusty-191030091632.pptx
talk6securingcloudamarprusty-191030091632.pptxtalk6securingcloudamarprusty-191030091632.pptx
talk6securingcloudamarprusty-191030091632.pptx
 
Security and Compliance with SharePoint and Office 365
Security and Compliance with SharePoint and Office 365Security and Compliance with SharePoint and Office 365
Security and Compliance with SharePoint and Office 365
 
Microsoft Azure Cloud Services
Microsoft Azure Cloud ServicesMicrosoft Azure Cloud Services
Microsoft Azure Cloud Services
 

More from Softchoice Corporation

Leveraging Office 365 Through Modern Licensing
Leveraging Office 365 Through Modern LicensingLeveraging Office 365 Through Modern Licensing
Leveraging Office 365 Through Modern LicensingSoftchoice Corporation
 
Leveraging Azure Through Modern Licensing
Leveraging Azure Through Modern LicensingLeveraging Azure Through Modern Licensing
Leveraging Azure Through Modern LicensingSoftchoice Corporation
 
The Softchoice Innovation Report 2018: Four New Roles For CIOS In The Modern ...
The Softchoice Innovation Report 2018: Four New Roles For CIOS In The Modern ...The Softchoice Innovation Report 2018: Four New Roles For CIOS In The Modern ...
The Softchoice Innovation Report 2018: Four New Roles For CIOS In The Modern ...Softchoice Corporation
 
Webinar: Azure backup and disaster recovery
Webinar: Azure backup and disaster recoveryWebinar: Azure backup and disaster recovery
Webinar: Azure backup and disaster recoverySoftchoice Corporation
 
Etude Softchoice: la collaboration en action
Etude Softchoice:  la collaboration en actionEtude Softchoice:  la collaboration en action
Etude Softchoice: la collaboration en actionSoftchoice Corporation
 
Collaboration Unleashed: Softchoice Research Study 2017
Collaboration Unleashed: Softchoice Research Study 2017Collaboration Unleashed: Softchoice Research Study 2017
Collaboration Unleashed: Softchoice Research Study 2017Softchoice Corporation
 
Étude Softchoice. Favoriser l’innovation : les actes en disent plus long que ...
Étude Softchoice. Favoriser l’innovation : les actes en disent plus long que ...Étude Softchoice. Favoriser l’innovation : les actes en disent plus long que ...
Étude Softchoice. Favoriser l’innovation : les actes en disent plus long que ...Softchoice Corporation
 
Softchoice Webinar: Virtual Whiteboard Session on Hybrid Cloud
Softchoice Webinar: Virtual Whiteboard Session on Hybrid Cloud Softchoice Webinar: Virtual Whiteboard Session on Hybrid Cloud
Softchoice Webinar: Virtual Whiteboard Session on Hybrid Cloud Softchoice Corporation
 
Enabling Innovation: A 2017 Softchoice Research Study
Enabling Innovation: A 2017 Softchoice Research StudyEnabling Innovation: A 2017 Softchoice Research Study
Enabling Innovation: A 2017 Softchoice Research StudySoftchoice Corporation
 
Getting secure in a mobile-first world with EMS
Getting secure in a mobile-first world with EMSGetting secure in a mobile-first world with EMS
Getting secure in a mobile-first world with EMSSoftchoice Corporation
 
Effective Management of Azure through Operations Management Suite (OMS) Webinar
Effective Management of Azure through Operations Management Suite (OMS) WebinarEffective Management of Azure through Operations Management Suite (OMS) Webinar
Effective Management of Azure through Operations Management Suite (OMS) WebinarSoftchoice Corporation
 
Improving Application Security With Azure
Improving Application Security With AzureImproving Application Security With Azure
Improving Application Security With AzureSoftchoice Corporation
 
Softchoice | Encore des imprudences dans le nuage
Softchoice | Encore des imprudences dans le nuageSoftchoice | Encore des imprudences dans le nuage
Softchoice | Encore des imprudences dans le nuageSoftchoice Corporation
 
Softchoice Discovery Series: Cloud Cost Governance
Softchoice Discovery Series: Cloud Cost GovernanceSoftchoice Discovery Series: Cloud Cost Governance
Softchoice Discovery Series: Cloud Cost GovernanceSoftchoice Corporation
 
Still Careless Users In The Cloud - Research Study
Still Careless Users In The Cloud - Research StudyStill Careless Users In The Cloud - Research Study
Still Careless Users In The Cloud - Research StudySoftchoice Corporation
 
From Prosperity to Extinction: A Tale of Blockbuster Proportions
From Prosperity to Extinction: A Tale of Blockbuster ProportionsFrom Prosperity to Extinction: A Tale of Blockbuster Proportions
From Prosperity to Extinction: A Tale of Blockbuster ProportionsSoftchoice Corporation
 

More from Softchoice Corporation (20)

Benchmarking IT Agility Final Report
Benchmarking IT Agility Final ReportBenchmarking IT Agility Final Report
Benchmarking IT Agility Final Report
 
Leveraging Office 365 Through Modern Licensing
Leveraging Office 365 Through Modern LicensingLeveraging Office 365 Through Modern Licensing
Leveraging Office 365 Through Modern Licensing
 
Leveraging Azure Through Modern Licensing
Leveraging Azure Through Modern LicensingLeveraging Azure Through Modern Licensing
Leveraging Azure Through Modern Licensing
 
The Softchoice Innovation Report 2018: Four New Roles For CIOS In The Modern ...
The Softchoice Innovation Report 2018: Four New Roles For CIOS In The Modern ...The Softchoice Innovation Report 2018: Four New Roles For CIOS In The Modern ...
The Softchoice Innovation Report 2018: Four New Roles For CIOS In The Modern ...
 
Webinar: Azure backup and disaster recovery
Webinar: Azure backup and disaster recoveryWebinar: Azure backup and disaster recovery
Webinar: Azure backup and disaster recovery
 
Etude Softchoice: la collaboration en action
Etude Softchoice:  la collaboration en actionEtude Softchoice:  la collaboration en action
Etude Softchoice: la collaboration en action
 
Collaboration Unleashed: Softchoice Research Study 2017
Collaboration Unleashed: Softchoice Research Study 2017Collaboration Unleashed: Softchoice Research Study 2017
Collaboration Unleashed: Softchoice Research Study 2017
 
Unleashing the Power of Office 365
Unleashing the Power of Office 365Unleashing the Power of Office 365
Unleashing the Power of Office 365
 
Azure cloud governance deck
Azure cloud governance deckAzure cloud governance deck
Azure cloud governance deck
 
Étude Softchoice. Favoriser l’innovation : les actes en disent plus long que ...
Étude Softchoice. Favoriser l’innovation : les actes en disent plus long que ...Étude Softchoice. Favoriser l’innovation : les actes en disent plus long que ...
Étude Softchoice. Favoriser l’innovation : les actes en disent plus long que ...
 
Softchoice Webinar: Virtual Whiteboard Session on Hybrid Cloud
Softchoice Webinar: Virtual Whiteboard Session on Hybrid Cloud Softchoice Webinar: Virtual Whiteboard Session on Hybrid Cloud
Softchoice Webinar: Virtual Whiteboard Session on Hybrid Cloud
 
Enabling Innovation: A 2017 Softchoice Research Study
Enabling Innovation: A 2017 Softchoice Research StudyEnabling Innovation: A 2017 Softchoice Research Study
Enabling Innovation: A 2017 Softchoice Research Study
 
Getting secure in a mobile-first world with EMS
Getting secure in a mobile-first world with EMSGetting secure in a mobile-first world with EMS
Getting secure in a mobile-first world with EMS
 
Effective Management of Azure through Operations Management Suite (OMS) Webinar
Effective Management of Azure through Operations Management Suite (OMS) WebinarEffective Management of Azure through Operations Management Suite (OMS) Webinar
Effective Management of Azure through Operations Management Suite (OMS) Webinar
 
Improving Application Security With Azure
Improving Application Security With AzureImproving Application Security With Azure
Improving Application Security With Azure
 
Softchoice | Encore des imprudences dans le nuage
Softchoice | Encore des imprudences dans le nuageSoftchoice | Encore des imprudences dans le nuage
Softchoice | Encore des imprudences dans le nuage
 
Softchoice Discovery Series: Cloud Cost Governance
Softchoice Discovery Series: Cloud Cost GovernanceSoftchoice Discovery Series: Cloud Cost Governance
Softchoice Discovery Series: Cloud Cost Governance
 
Still Careless Users In The Cloud - Research Study
Still Careless Users In The Cloud - Research StudyStill Careless Users In The Cloud - Research Study
Still Careless Users In The Cloud - Research Study
 
THE ECONOMICS OF AZURE MANAGEMENT
THE ECONOMICS OF AZURE MANAGEMENTTHE ECONOMICS OF AZURE MANAGEMENT
THE ECONOMICS OF AZURE MANAGEMENT
 
From Prosperity to Extinction: A Tale of Blockbuster Proportions
From Prosperity to Extinction: A Tale of Blockbuster ProportionsFrom Prosperity to Extinction: A Tale of Blockbuster Proportions
From Prosperity to Extinction: A Tale of Blockbuster Proportions
 

Recently uploaded

Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfjimielynbastida
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 

Recently uploaded (20)

Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdf
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 

Demystifying Cloud Security Responsibilities

  • 1. Demystifying what’s secure and what you need to do Understanding IT’s Role in Public Cloud Security
  • 2. WELCOME • Thank you for attending • Today’s topic • Is there a solution that right for you? • Setting the stage, what we’re hearing from our customers…
  • 3. YOUR PRESENTERS Skip Purdy Sr Solutions Architect Skip.Purdy@softchoice.com https://www.linkedin.com/in/skippu Luke Black Manager, Microsoft Marketing and Programs Luke.Black@softchoice.com https://www.linkedin.com/in/luke-black/
  • 4. TODAY’S OBJECTIVE Help you understand what a Cloud Provider secures and what is your responsibility
  • 5. AGENDA • Quick backgrounder on Cloud • Data center security • Areas you need to secure • Security prioritization model
  • 8. Time Trad IT No plan • Pilots • 3-5 yrs Biz Cloud Adoption + Cust Exp Manage Risk Biz Impact
  • 9. Time Trad IT No plan DI Y > 30% Fail • Pilots • 3-5 yrs Biz Cloud Adoption + Cust Exp Manage Risk Biz Impact • Skills gap Governanc e• No control
  • 10. Time Trad IT No plan DI Y > 30% Fail • Pilots • 3-5 yrs Biz Cloud Adoption + Cust Exp Manage Risk Biz Impact • Skills gap Governanc e• No control
  • 11. Time Trad IT No plan DI Y > 30% Fail • Pilots • 3-5 yrs Biz Cloud Adoption + Cust Exp Manage Risk Biz Impact • Skills gap Governanc e• No control
  • 12. ARE THESE ISSUES? records lost over the last 12 months (Forrester, “Top Cybersecurity Threats in 2017”) 2 BILLION People re-use credentials; the Yahoo! Breach alone is estimated to have exposed the credentials of more than 25% of global internet users 25%
  • 13. ARE THESE ISSUES? of enterprise firms suffered at least two breaches in 2016 44% Average time to detection of a breach is in excess of 99 days 99 DAYS
  • 14. ARE THESE ISSUES? of enterprises report not having enough security staff 62% of enterprises state finding employees with the right skills is a further challenge 65%
  • 15.
  • 17. WHAT DO WE MEAN BY CLOUD? Infrastructure as a Service IaaS Caching Legacy Networking Security File Technical System Mgmt. MIGRATE TO IT Platform as a Service PaaS Application Development Decision Support Web Streaming BUILD ON IT Software as a Service SaaS Email CRM Collaborative ERP CONSUME
  • 18. SHARED SECURITY MODEL Responsibility Data classification & accountability Client & end-point protection Identity & access management Application level controls Network controls Host infrastructure Physical security On-Prem IaaS PaaS SaaS Cloud Customer Cloud Provider
  • 19. The customer is both accountable and responsible for all aspects of security and operating solutions when they are deployed on-premises On-Prem With IaaS deployments, the elements such as building, servers, networking hardware, and the hypervisor, should be managed by the platform vendor. The customer is responsible or has a shared responsibility for securing and managing the operating system, network configuration, applications, identity, clients, and data. IaaS PaaS solutions build on IaaS deployments and the provider is additionally responsible to manage and secure the network controls. The customer is still responsible or has a shared responsibility for securing and managing applications, identity, clients, and data. PaaS With SaaS a vendor provides the application and abstracts customers from the underlying components. Nonetheless, the customer continues to be accountable and must ensure that data is classified correctly, and shares a responsibility to manage their users, and end point devices. SaaS IN A SHARED RESPONSIBILITY MODEL, A LAYERED APPROACH TO SECURITY IS ILLUSTRATED AS:
  • 20. SHARED SECURITY MODEL Responsibility Data classification & accountability Client & end-point protection Identity & access management Application level controls Network controls Host infrastructure Physical security On-Prem IaaS PaaS SaaS Cloud Customer Cloud Provider
  • 23. A CLOUD YOU CAN TRUST At Microsoft, we never take your trust for granted • We are serious about our commitment to protect customers in a cloud first world. • We live by standards and practices designed to earn your confidence. • We collaborate with industry and regulators to build trust in the cloud ecosystem. “Businesses and users are going to embrace technology only if they can trust it.” – Satya Nadella
  • 24. DATACENTER SECURITY Perimeter Computer room Building Seismic bracing Security operations center 24X7 security staff Days of backup power Cameras Alarms Two-factor access control: Biometric readers & card readers Barriers Fencing Infrastructure security controls Operational security controls Compliance
  • 26.
  • 27. SHARED SECURITY MODEL Responsibility Data classification & accountability Client & end-point protection Identity & access management Application level controls Network controls Host infrastructure Physical security On-Prem IaaS PaaS SaaS Cloud Customer Cloud Provider
  • 28. WHAT IS IDENTITY MANAGEMENT? LOB app Data Set Word.doc = Read & Write ACCESS CONTROL (WHAT) Controls when and how access is granted to authenticate users IDENTITY (WHO) Establishes an validates a user’s digital identity
  • 29. STREAMLINING EMPLOYEE IDENTITY AND ACCESS MANAGEMENT TO APPLICATIONS, SYSTEMS, AND DATA ACROSS THE ORGANIZATION Sample Size = 2,320 Priority levels for streaming employee identities across organizations Not on our agenda / Low Priority (1,2) 13% Moderate Priority (3) 30% High Priority (4, 5) 56% Don’t Know (98) 1%
  • 31. IDENTITY AS THE CORE OF ENTERPRISE MOBILITY Azure Active Directory as the control plane Single sign-onSelf-service Simple connection On-premises Other directories Windows Server Active Directory SaaSAzure Public cloud CloudMicrosoft Azure Active Directory Customers Partners
  • 32.
  • 33. SHARED SECURITY MODEL Responsibility Data classification & accountability Client & end-point protection Identity & access management Application level controls Network controls Host infrastructure Physical security On-Prem IaaS PaaS SaaS Cloud Customer Cloud Provider
  • 34. WHAT DO WE MEAN BY HOST INFRASTRUCTURE (IAAS) • Managed Operating system – Patching – Backup – Antivirus, malware • Storage – Key storage, management of API Keys and Certs
  • 35. CAPABILITY BENEFITS AZURE RESOURCE MANAGER • Template based deployment • Manage application infrastructure as source code • Identical environment configurations • Resource Policy • Resource Locks AZURE STORAGE ENCRYPTION • Encryption for Data at Rest • Client side libraries for encryption in transit SUPPORTING CAPABILITIES FOR SECURE APPLICATIONS
  • 36. SHARED SECURITY MODEL Responsibility Data classification & accountability Client & end-point protection Identity & access management Application level controls Network controls Host infrastructure Physical security On-Prem IaaS PaaS SaaS Cloud Customer Cloud Provider
  • 37. WHAT DO WE MEAN BY NETWORK INFRASTRUCTURE (IAAS) • Configuration, management and securing of network elements: – Virtual networking – Load balancing – DNS – Gateways • Means for services to communicate and interoperate
  • 38. The Ultimate Protection Against Cloud Security Threats Barracuda Solutions for Azure Web Based Apps Networking and Infrastructure  Integrated intrusion prevention  URL filtering  User and application aware  IPsec VPNs secure remote connectivity  Dynamically scales with your network  Data loss prevention  Application layer DDoS attack protection  Granular identity and access management  Comprehensive administration and management CLOUD SECURITY THREATS Networking Protection Application Protection Continuity gaps Secure connectivity Exploited system vulnerabilities Compromised credentials Hacked APIs Data breaches DDoS attacks
  • 39. Q&A
  • 40. SHARED SECURITY MODEL Responsibility Data classification & accountability Client & end-point protection Identity & access management Application level controls Network controls Host infrastructure Physical security On-Prem IaaS PaaS SaaS Cloud Customer Cloud Provider
  • 42. THE EVOLUTION OF INFORMATION PROTECTION DOCUMENT TRACKING DOCUMENT REVOCATION Monitor & respond LABELINGCLASSIFICATION Classification & labeling ENCRYPTION Protect ACCESS CONTROL POLICY ENFORCEMENT
  • 43. Azure Information Protection DOCUMENT TRACKING DOCUMENT REVOCATION Monitor & respond LABELINGCLASSIFICATION Classification & labeling ENCRYPTION Protect ACCESS CONTROL POLICY ENFORCEMENT Full Data Lifecycle
  • 44. CLASSIFY DATA – BEGIN THE JOURNEY Classify data based on sensitivity SECRET CONFIDENTIAL INTERNAL NOT RESTRICTED IT admin sets policies, templates, and rules PERSONAL Start with the data that is most sensitive IT can set automatic rules; users can complement it Associate actions such as visual markings and protection
  • 45. PROTECT DATA AGAINST UNAUTHORIZED USE VIEW EDIT COPY PASTE Email attachment FILE PROTECT DATA NEEDING PROTECTION BY: Encrypting data Including authentication requirement and a definition of use rights (permissions) to the data Providing protection that is persistent and travels with the data Personal apps Corporate apps
  • 46. Monitor use, control and block abuse Sue Joe blocked in North America Jane accessed from India Bob accessed from South America MAP VIEW Jane blocked in Africa Jane Competitors Jane access is revoked Sue Bob Jane
  • 47. TIME ADOPTION STAGES OF ADOPTION: Governance Workshop SaaS TechCheck Accelerator Analyzer Accelerator Professional Services Keystone Detect & Respond • Monitor ongoing • Use new capabilities • Review policies Secure Data • Classify data • Implement rights management solution • Encryption where required Secure Host & Network • Understand your current state • Secure operating system • Secure the network Secure Identity • Gain control of SaaS • Align identity • Make it easy for users Build Plan • Define roles & access levels • Procurement rules • Resource Policies
  • 48. TODAY’S OBJECTIVE Help you understand what a Cloud Provider secures and what is your responsibility
  • 49. Q&A
  • 51. Microsoft security packaging Office 365 Windows 10 Enterprise Mobility + Security Operations Mgmt. + Security Windows Server 2016 SQL Server 2016
  • 52.
  • 53.
  • 54. Information protection Identity-driven security Managed mobile productivity Identity and access management Azure Information Protection Premium P2 Intelligent classification and encryption for files shared inside and outside your organization (includes all capabilities in P1) Azure Information Protection Premium P1 Manual classification and encryption for all files and storage locations Cloud-based file tracking Microsoft Cloud App Security Enterprise-grade visibility, control, and protection for your cloud applications Microsoft Advanced Threat Analytics Protection from advanced targeted attacks leveraging user and entity behavioral analytics Microsoft Intune Mobile device and app management to protect corporate apps and data on any device Azure Active Directory Premium P2 Identity and access management with advanced protection for users and privileged identities (includes all capabilities in P1) Azure Active Directory Premium P1 Secure single sign-on to cloud and on-premises apps MFA, conditional access, and advanced security reporting EMS E3 EMS E5
  • 55. • WHAT DID WE NOT COVER?

Editor's Notes

  1. Let’s bring together everything we discussed today.
  2. Content Developers: Provide recommendation for DSM welcome/introduction notes below Sample: You’re busy. We know. Thank you for spending this time with us Today’s session is on cloud & the challenges consumption based spending presents us with We recognize within the room organizations are at different states of cloud adoption, and there are no one-size fits all solutions, but we promise there will be something of value here for everyone. I’d like to start by relating what I’m hearing from customers
  3. DSM: Here’s your presenters. Please make notes of any questions you have and we will be happy to answer.
  4. Welcome to our Discovery Series on Cloud Security. There has been a lot of interest and opportunity with Cloud technologies the past few years and also confusion around Cloud Security. This confusion can cause slower adoption of Cloud technologies or open new risks. That’s why Softchoice selected our Discovery Series to be on Cloud Security to clear up some of that confusion. Our goal is that be the end of the conversation today you will have a better idea of what the Cloud Provider’s responsibilities are and what yours are with respect to security.
  5. Cloud mean many different things to different people so we will start today level setting on what we mean by Cloud in the context of the conversation today. We will show a model of cloud security responsibilities that will form a foundation for the discussion today.
  6. ASK: Does someone have an example, either within their organization or one from the industry, where the Business has deployed IT without involving the business? What problems does that cause?
  7. All these areas are areas of security risk for companies moving to Cloud. ASK: Which of these are you most concerned about for Cloud Security?
  8. If you are feeling overwhelmed with addressing Cloud Security – do not worry – there is a step by step way to approach it.
  9. Further up the stack – less you have to do
  10. There is a lot to cover in security and we certainly don’t have time to cover all of it today. However, we will discuss those keys areas, that no matter what you are doing in the cloud, you should ensure you have in place for security foundation. We’ve highlighted what we will cover here.
  11. GD: The title of this slide will be “Microsoft Data Center Security”
  12. Microsoft is committed – starting at the top – to providing a cloud you can trust. We take very seriously our commitment to protect customers in a cloud-first world. We follow a set of standards and best practices to ensure that our cloud services are reliable and perform as you need them to. And we actively partner with a wide range of industry and government entities to establish confidence and trust in the wider cloud ecosystem.
  13. Slide script: Microsoft datacenters employ controls at the perimeter, building, and computer room with increasing security at each level, utilizing a combination of technology and traditional physical measures. Security starts at the perimeter with camera monitoring, security officers, physical barriers and fencing. At the building, seismic bracing and extensive environmental protections protect the physical structure and integrated alarms, cameras, and access controls (including two-factor authentication via biometrics and smart cards) govern access. The systems are monitored 24x7 from the operations center. Similar access controls are used at the computer room, which also has redundant power.
  14. With the extensive security and data protection measures we have in place, we are able to achieve a broad range of international, industry, and regional certifications and attestations from recognized third-party authorities. This table illustrates the certifications and attestations for our key cloud services. Background Certifications and attestations represent verification that control activities operate in accordance with expectations. Operating a huge global cloud infrastructure, across many businesses, comes with the need to meet an array of compliance and regulatory obligations. With this in mind, Microsoft products and services hold key certifications, attestations, and authorizations as applicable to their service. Several key certifications and attestations deserve to be highlighted: Our ISO 27001:2013 certification provides assurance of a broad, risk-based information security program. Microsoft Cloud Infrastructure and Operations—the organization that builds, manages, and secures our datacenters globally—was the first major cloud service infrastructure to be certified for ISO 27001. Microsoft’s Cloud Infrastructure & Operations (MCIO) team has gone beyond the ISO/IEC 27001:2013 standard (which includes some 150 security controls) to develop over 800 defense-in-depth security controls to account for the unique challenges of the cloud infrastructure and what it takes to mitigate some of the risks involved. Microsoft is the first cloud computing platform to meet the worlds first international standard for cloud privacy—ISO/IEC 27018 as verified by independent auditors. Under ISO 27018, cloud service providers (CSPs) must operate under five key principles: CSPs must not use the personal data they receive for advertising and marketing unless expressly instructed to do so by the customer. Moreover, it must be possible for a customer to use the service without submitting to such use of its personal data for advertising or marketing. Customers have explicit control of how their information is used. CSPs must inform customers where their data resides, disclose the use of subcontractors to process PII and make clear commitments about how that data is handled. In case of a breach, CSPs should notify customers, and keep clear records about the incident and the response to it. A successful third-party audit of a CSP’s compliance documents the service’s conformance with the standard, and can then be relied upon by the customer to support their own regulatory obligations. To remain compliant, the CSP must subject itself to yearly third-party reviews. We have SSAE 16/ISAE 3402 SOC 1, 2, and 3 attestations in place. These attestations are both type I and type II. They provide assurance of effective control performance. In 2012, Microsoft became one of the first in the industry to successfully complete a SOC 2 Type 2 and SOC 3 audit (which are designed to better accommodate cloud services) for our cloud infrastructure (datacenters and networks). We continue to demonstrate compliance through ongoing assessments. In 2008, Microsoft was the first major cloud service provider to receive a SAS 70 report (the predecessor to SOC reports) for our cloud infrastructure. Microsoft was an early adopter of the SOC 1, SOC 2 and SOC 3 in 2011. The SOC audit reports attest to the design and operating effectiveness of controls related to security, availability, and confidentiality. We meet the US HIPAA/HITECH health data protection requirements and have incorporated those requirements into our ISO 27001 program. Microsoft was the first major productivity cloud service vendor to offer a HIPAA Business Associate Agreement (BAA) to healthcare entities with access to Protected Health Information (PHI). We have since extended that to offer a single HIPAA BAA for all of our commercial online services. We meet the Payment Card Industry Data Security Standard as an infrastructure provider. Microsoft’s first FISMA Authorization to Operate (ATO) was granted in 2010 for the MCIO cloud organization. Since then, Microsoft enterprise cloud services, including Office 365 and Microsoft Azure, have received provisional authorities to operate (P-ATOs) by the Federal Risk and Authorization Program (FedRAMP) Joint Authorization Board (JAB). In the United Kingdom, Azure was awarded Impact Level 2 (IL2) accreditation, further enhancing Microsoft and its partner offerings on the current G-Cloud procurement Framework and CloudStore. The industry organization Cloud Security Alliance (CSA) created a Cloud Controls Matrix to identify primary criteria for service offerings. Microsoft was the first cloud service provider to complete a third-party assessment against the Cloud Security Alliance (CSA) Cloud Controls Matrix (CCM) as part of its SOC 2 audit for Azure. This assessment was completed as a means of meeting the assurance and reporting needs of the majority of cloud services users worldwide. We have incorporated many other obligations to our compliance program, providing assurance that we are able to meet obligations such as the European Union Data Protection Directive and California Senate Bill 1386, such as the European Union Data Protection Directive and California Senate Bill 1386. Notes: Updated August 2015 Not every certification is listed on this slide. Not every Azure and Office 365 service has been fully audited for every certification.
  15. Further up the stack – less you have to do
  16. GD: Please re-do this image to clean it up. I don’t have access to the original
  17. Microsoft has a solution for this [Click] Traditional identity and access management solutions providing sing-sign on to on-premises applications and directory services such as Active Directory and others are used from the vast majority of organizations and huge investments were made to deploy and maintain them. These solutions are perfect for the on-premises world. [Click] Now, as we have discussed, there are new pressing requirements to provide the same experience to cloud applications hosted in any public cloud. [Click] Azure Active Directory can be the solution to this new challenge by extending the reach of on-premises identities to the cloud in a secure and efficient way. [Click] In order to do that, one simple connection is needed from on-premises directories to Azure AD. [Click] and everything else will be handled by Azure AD. Secure single sign-on to thousands of SaaS applications hosted in any cloud by using the same credentials that exist on-premises, and even add multifactor authentication without changing code [Click] And we don’t forget the users. Azure AD provides Self-service capabilities and easy access to all the application, consumer or business, they need. in the cloud but on-premises too (Application Proxy)
  18. Approved by Demi Albuz But the issue will not be resolved just by wrangling identity; understanding where your data, information and intellectual property is going is important as well. Cloud App Security identifies the services in use in your organization, and offers the tools to control access, sharing and loss prevention as well as to identify abnormal usage, high risk usage and security incidents. This insight assists your organization’s ability to detect, respond to and prevent threats.
  19. Further up the stack – less you have to do
  20. With IaaS the customer has responsibility for securing and managing
  21. Azure Resource Manager enables you to work with the resources in your solution as a group. You can deploy, update or delete all of the resources for your solution in a single, coordinated operation. You use a template for deployment and that template can work for different environments such as testing, staging and production. Resource Manager provides security, auditing, and tagging features to help you manage your resources after deployment. Resource Manager provides several benefits: You can deploy, manage, and monitor all of the resources for your solution as a group, rather than handling these resources individually. You can repeatedly deploy your solution throughout the development lifecycle and have confidence your resources are deployed in a consistent state. You can manage your infrastructure through declarative templates rather than scripts. You can define the dependencies between resources so they are deployed in the correct order. You can apply access control to all services in your resource group because Role-Based Access Control (RBAC) is natively integrated into the management platform. You can apply tags to resources to logically organize all of the resources in your subscription. You can clarify billing for your organization by viewing the rolled-up costs for the entire group or for a group of resources sharing the same tag. Resource Policy Azure Resource Manager now allows you to control access through custom policies. With policies, you can prevent users in your organization from breaking conventions that are needed to manage your organization's resources. You create policy definitions that describe the actions or resources that are specifically denied. You assign those policy definitions at the desired scope, such as the subscription, resource group, or an individual resource. Policies and RBAC work together. To be able to use policy, the user must be authenticated through RBAC. Unlike RBAC, policy is a default allow and explicit deny system. RBAC focuses on the actions a user can perform at different scopes. For example, a particular user is added to the contributor role for a resource group at the desired scope, so the user can make changes to that resource group. Policy focuses on resource actions at various scopes. For example, through policies, you can control the types of resources that can be provisioned or restrict the locations in which the resources can be provisioned. Resource Locks As an administrator, you may need to lock a subscription, resource group or resource to prevent other users in your organization from accidentally deleting or modifying critical resources. You can set the lock level to CanNotDelete or ReadOnly. CanNotDelete means authorized users can still read and modify a resource, but they can't delete it. ReadOnly means authorized users can read from a resource, but they can't delete it or perform any actions on it. The permission on the resource is restricted to the Reader role. Applying ReadOnly can lead to unexpected results because some operations that seem like read operations actually require additional actions. For example, placing a ReadOnly lock on a storage account will prevent all users from listing the keys. The list keys operation is handled through a POST request because the returned keys are available for write operations. For another example, placing a ReadOnly lock on an App Service resource will prevent Visual Studio Server Explorer from being able to display files for the resource because that interaction requires write access. Unlike role-based access control, you use management locks to apply a restriction across all users and roles. Storage Service Encryption A new feature of Azure Storage that will encrypt data when it is written to your Azure Storage supporting block blobs, page blobs and append blobs. This feature can be enabled for new storage accounts using the Azure Resource Manager deployment model and is available for all redundancy levels (LRS, ZRS, GRS, RA-GRS). Storage Service Encryption is available for both Standard and Premium Storage, handling encryption, decryption, and key management in a totally transparent fashion. All data is encrypted using 256-bit AES encryption, one of the strongest block ciphers available.  Azure Disk Encryption A new capability that lets you encrypt your Windows and Linux IaaS virtual machine disks. Azure Disk Encryption leverages the industry standard BitLocker feature of Windows and the DM-Crypt feature of Linux to provide volume encryption for the OS and the data disks. The solution is integrated with Azure Key Vault to help you control and manage the disk encryption keys and secrets in your key vault subscription, while ensuring that all data in the virtual machine disks are encrypted at rest in your Azure storage. (in this case, Key Vault stands in for a hardware based TPM
  22. Further up the stack – less you have to do
  23. With IaaS the customer has responsibility for securing and managing
  24. Further up the stack – less you have to do
  25. 1.For years, RMS helped businesses provide persistent protection over their data through encryption, access control and policy enforcement 2.We added tracking and revocation capabilities for greater control over shared data 3. Now we also have classification and labeling capabilities so that you can identify what data needs protection and protect only the data that needs protection
  26. 1.For years, RMS helped businesses provide persistent protection over their data through encryption, access control and policy enforcement 2.We added tracking and revocation capabilities for greater control over shared data 3. Now we also have classification and labeling capabilities so that you can identify what data needs protection and protect only the data that needs protection
  27. Data is born protected, Using companies’ criteria Enforced by IT Enforced on any device <keep personal data.... Personal>
  28. Extra protection is available for sensitive data Not just encryption, but rights of who can access it and what they can do with the data
  29. Welcome to our Discovery Series on Cloud Security. There has been a lot of interest and opportunity with Cloud technologies the past few years and also confusion around Cloud Security. This confusion can cause slower adoption of Cloud technologies or open new risks. That’s why Softchoice selected our Discovery Series to be on Cloud Security to clear up some of that confusion. Our goal is that be the end of the conversation today you will have a better idea of what the Cloud Provider’s responsibilities are and what yours are with respect to security.
  30. 2 min: high level set on security strategy and tech - O365, Azure, EMS, OMS à CISO comprehensive security package is ECS
  31. Current
  32. Most of our day will focus on EMS. This slide is here to level-set on what is included in the two levels. Before we talk to customers about products, it is best to engage the security story all-up. So let’s start there.