• No results found

Are You Prepared for the Cloud? Nick Kael Principal Security Strategist Symantec

N/A
N/A
Protected

Academic year: 2021

Share "Are You Prepared for the Cloud? Nick Kael Principal Security Strategist Symantec"

Copied!
17
0
0

Loading.... (view fulltext now)

Full text

(1)

Are You Prepared for the

Cloud?

Nick Kael

Principal Security Strategist

Symantec

(2)
(3)

Cloud Computing

refers to the delivery of software (SaaS),

infrastructure (IaaS), and/or platform (PaaS) as a service.

Service Characteristics: Broad Network Access, Rapid

Elasticity, Measured Service, On-Demand Self-Service,

Resource Pooling.

Adaptive and Consumption-based: Can be rapidly

orchestrated, provisioned, implemented and

decommissioned, and scaled up or down; providing for an

on-demand utility-like model

of allocation and consumption.

Can be provided privately or publicly, internally (on premises)

or externally (off-premises) or a hybrid of the two

(4)

Essential Characteristics

• On Demand Self Service • Broad Network Access • Resource Pooling • Rapid Elasticity • Measured Service

Service Models

• Software as a Service (SaaS) • Platform as a Service (PaaS) • Infrastructure as a Service (IaaS)

Deployment Models

• Public • Private • Community • Hybrid

(5)

Cause for Concern

IDC Enterprise Survey on the Cloud

74% of people regarded security as a significant or very

significant challenge in adopting cloud-based

applications

2010 Ponemon Institute report

Most U.S. organizations lack the procedures, policies,

and tools to ensure their sensitive information in the

cloud remains secure. Despite security concerns and the

expected growth in cloud computing, only 27 percent of

respondents said their organizations have procedures for

approving cloud applications that use sensitive or

confidential information.

(6)

Employees Connect In A Whole New Way

Updates lead status on salesforce.com.

Checks Facebook on company group page.

Updates status to say “big meeting today!”

Completes expense report in Concur.

Downloads the latest presentation from SharePoint.

Uploads a new product demo on YouTube.

Posts link on his Facebook profile.

(7)

Information-Centric Secure and manage

information

Technology Trends: Information Increasingly Independent of

Systems

New Computing Models

• Cloud • SaaS • Appliance

New Endpoint Devices

• Netbooks

• Mobile devices

New User Demands

• “Consumerization” of IT • Social networking

• Virtualization • Search

New Spending Focus

• “Decapitalization” of IT • Flexible spending options

System-Centric Secure and manage systems (i.e. hardware,

applications)

(8)

What does that mean for IT Security?

Security

Applications & Data Applications & Data

Salesforce.com SuccessFactors Gmail FaceBook POS MRP CRM Xbox… Streamed Applications SPN Back-up Security Data PDA Applications Security Applications Data Home PC Applications Data Work PC Security Applications Data Mobile Phone Security Applications Data Other Endpoints Internal IT Outsourcer DSP/ISP Applications Data

YIKES!

(9)

Next Generation IT Evolving Toward

“Information-Centric” Computational Architectures

Governance, Risk, and Compliance

Endpoint Management Applications Data Applications Data Applications Data Applications Data Applications Data

Security Security Security Security Security

Work PC Home PC PDA Mobile Phone Other Endpoints

Endpoint Virtualization Cloud-Based Infrastructure • Hyper-scalable • Ultra-high availability • Virtualized Workflow/ automation

Application and Data Mash-ups

Applications & Data Applications & Data

Data Management and Protection • Information Access & Mgmt • Archiving

• Storage and Backup • Disaster Recovery Information-Centric Security

• ID Management & Authentication • Key Management & Encryption • Access Control & Rights Mgmt • Data classification

• Discovery

• Data Loss Prevention

Applications Proprietary

cloud

(10)

In

fr

as

tru

ctu

re

Cloud Paradigms Center on Interfaces: Solutions Needed on

Both Sides

Service

Service

Endpoint

User

– Security – endpoint, DLP, IPS

– Access control (assessment against policy,

attestation of compliance, remediation)

– Endpoint management, virtualization, and

provisioning

– Reputation/trust – each side must attest

and assess credentials of the other (identity)

– Virtualization and abstractions – endpoint,

storage, data/backup availability

– Data and service mobility and availability

– clustering, backup, and portability of services/applications

(11)

• Infrastructure mgmt • Resource mgmt • Incident mgmt • Business continuity • Security mgmt • Compliance mgmt Provider IT Operations (orchestration) • Infrastructure mgmt • Resource mgmt • Incident mgmt • Business continuity • Security mgmt • Compliance mgmt Customer IT Operations

Internal – on-premises External – Services

Business Process-a-a-S Software-a-a-S Platform -a-a-S Infrastructure -a-a-S Applications / Middleware OS / VM’s Infrastructure

Business Process & Procedures

1

Data/ Information centric Security & Protection

Hetrogeneous On-Premise to Provider and back to Enterprise IT Management Solutions

IT Management Technology/solution provider Infrastructure/Platform Technology provider IT Mgmt As A Svc

(12)

Approach

• Cloud computing challenges surround its

interfaces

– Security – attestation, identity,

authentication, policy measurement and remediation, antimalware, data leakage prevention

– Availability – backup, storage management, H/A failover, application level granular

measurement and migration, orchestration – Endpoint management

• Building OnRamps to the Cloud

– Build internal models to understand requirements and issues and to provide transition path

– Gain benefits of cloud computing attributes with existing architectures

• Infrastructure mgmt • Resource mgmt • Incident mgmt • Business continuity • Security mgmt • Compliance mgmt Provider IT Operations (orchestration) • Infrastructure mgmt • Resource mgmt • Incident mgmt • Business continuity • Security mgmt • Compliance mgmt Customer IT Operations Business Process-a-a-S Software-a-a-S Platform -a-a-S Infrastructure -a-a-S Applications / Middleware OS / VM’s Infrastructure

Business Process & ProceduresData/ Information centric Security & Protection

Hetrogeneous On-Premise to Provider and back to Enterprise IT Management Solutions

IT Management Technology/solution provider Infrastructure/Platform Technology provider IT Mg mt As A Svc

(13)

Moving to the Cloud

Things to consider as you move to the Cloud

• Identify the Asset for Cloud Deployment ?

– Data

– Application/Functions or Processes

• Evaluate the asset to be moved to the cloud based on Risk/impact to your

business.

– How would we be harmed if ……….

• Map that asset to the possible Cloud deployment models ?

– Public – Private – Community – Hybrid

• Evaluate the Cloud Models and Possible Service Providers • Map Potential Data Flows

(14)

Moving to the Cloud

Things to consider as you move to the Cloud

• Mapping the Cloud Model to the Security Controls and Compliance Model • Areas of critical focus:

• Governance

– Governance & Enterprise Risk Management – Legal and Electronic Discovery

– Compliance & Audit – Information Lifecycle

– Portability & Interoperability

• Operational

– Traditional Security, Business Continuity, Disaster Recovery – Data Center Operations

– Incident Response, Notification and remediation – Application Security

– Encryption & Key Management – Identity & Access Management – Virtualization

(15)

Secure Cloud Enablement

How does your enterprise enable secure Cloud ?

• What is the critical information to protect? Where is this data?

How will it be used?

• Does the critical information have the right level of control?

• How will heterogeneous access and broad network connectivity

be controlled?

• How will security and performance be managed in a highly

virtualized environment?

• How can automation be used to abstract services from the

infrastructure that provides them?

(16)

Sources

• NIST

(17)

Thank You !

Nick L. Kael

Principal Security Strategist

Symantec – Security Business Practice

References

Related documents

Trading Finance Inst.Sales/ Account Mgmt WLP Wealth Mgmt Operations Private Sales/ Acct Mgmt Fund Mgmt Sales Trading Market Making Contracts Cash Mgmt Cust.Service Reconciliation /

The inhibitory activities of Anogeissus leiocarpus and Terminalia glaucescens on Helicobacter pylori as revealed from our study compared fairly well with clarithromycin (a

Project Integration Mgmt Project Integration Mgmt 1 Project Scope Mgmt Project Scope Mgmt 2 Project Time Mgmt Project Time Mgmt 3 Project Cost Mgmt Project Cost Mgmt 4

In [5, 7], Guesmia proved the boundary stabilization of the linear elastodynamic system, with variables coefficients, under restrictive conditions on the shape of the domain and on

The class schedule needs to follow standard scheduling patterns, accommodate required contact hours for each class, meet ADA needs for both students and faculty, comply with

Get inked on your tattoo lettering roman numeral tattoos lettering, honor and why it is meant to get tattooed with a date of style!. Event that tugs at home with roman numeral

Process sales arising out of the M-C model are based on sales planning (management) and evaluation of the reached targets on the basis of managerial

The emission reductions from steam savings are determined by the emission factor of the fuel combusted in the boiler times the increase in steam savings which are multiplied with