• No results found

Healthcare: La sicurezza nel Cloud October 18, IBM Corporation

N/A
N/A
Protected

Academic year: 2021

Share "Healthcare: La sicurezza nel Cloud October 18, IBM Corporation"

Copied!
12
0
0

Loading.... (view fulltext now)

Full text

(1)
(2)

© 2011 IBM Corporation

Self-Service

Highly Virtualized

Location

Independence

Workload Automation

Rapid Elasticity

Standardization

Cloud Computing Tests The Limits Of Security Operations And Infrastructure

2

People and Identity

Application and Process Network, Server and Endpoint Data and Information

Physical Infrastructure

Governance, Risk and Compliance

Security and Privacy Domains

Multiple Logins, Onboarding Issues

Multi-tenancy, Data Separation

Audit Silos, Compliance Controls Provider Controlled, Lack of Visibility Virtualization, Network Isolation External Facing, Quick Provisioning

To cloud

In a cloud environment, access expands, responsibilities change, control

shifts, and the speed of provisioning resources and applications increases

(3)

Different cloud deployment models also change the way we think

about security

Private cloud

Hybrid IT

Public cloud

Customer responsibility for infrastructure

More customization of security controls

Good visibility into day-to-day operations

Easy to access to logs and policies

Applications and data remain “inside the firewall”

Provider responsibility for infrastructure

Less customization of security controls

No visibility into day-to-day operations

Difficult to access to logs and policies

Applications and data are publically exposed

Changes in

(4)

© 2011 IBM Corporation

Critical Risks Areas in Cloud Computing

Less Control Data Security Security Management Compliance Reliability

Where the information is located and stored, who has access rights, how access is

monitored & managed,

including resiliency Control needed to manage firewall and security settings

for applications and runtime environments in the cloud

Concerns with high availability and loss of service should outages

occur

Challenges with an increase in potential unauthorized exposure

when migrating workloads to a shared network and compute

infrastructure

Restrictions imposed by industry regulations over the

use of clouds for some applications

Risks across private, public and hybrid cloud delivery

(5)

Three Phase Approach

Design Deploy Consume

Establish a cloud strategy and implementation plan to get there.

Build cloud services, in the enterprise and/or as a cloud services provider.

Manage and optimize consumption of cloud services.

Example security capabilities

ƒ Cloud security roadmap

ƒ Secure development

ƒ Network threat protection

ƒ Server security

ƒ Database security

ƒ Application security

ƒ Virtualization security

ƒ Endpoint protection

ƒ Configuration and patch management

ƒ Identity and access management ƒ Secure cloud communications ƒ Managed security services Secure by Design

Focus on building security into the fabric of the cloud.

Workload Driven

Secure cloud resources with innovative features and products.

Service Enabled

Govern the cloud through ongoing security operations and workflow.

(6)

© 2011 IBM Corporation Platform-as-a-Service Middleware Database Web 2.0 Application Runtime Java Runtime Development Tooling Infrastructure-as-a-Service Servers Networking Data Center Storage

Fabric Shared virtualized, dynamic provisioning Application-as-a-Service Collaboration Financials CRM/ERP/HR Industry Applications Business Process-as-a-Service Employee Benefits Mgmt. Industry-specific Processes Procurement Business Travel

Who is responsible for security at the … level?

Datacenter Infrastructure Middleware Application Process

Provider Subscriber Provider Subscriber Provider Subscriber Provider Subscriber Provider/Subscriber service agreement

determines actual responsibilities.

(7)

Capabilities provided to consumers for using a provider’s applications

Key security focus:

Compliance and Governance ƒHarden exposed applications

ƒSecurely federate identity

ƒDeploy access controls

ƒEncrypt communications

ƒManage application policies

Integrated service

management, automation, provisioning, self service

Key security focus:

Infrastructure and Identity ƒManage datacenter identities

ƒSecure virtual machines

ƒPatch default images

ƒMonitor logs on all resources

ƒNetwork isolation

Pre-built, pre-integrated IT infrastructures tuned to application-specific needs

Key security focus: Applications and Data ƒSecure shared databases

ƒEncrypt private information

ƒBuild secure applications

ƒKeep an audit trail

ƒIntegrate existing security

Advanced platform for creating, managing, and monetizing cloud services

Key security focus: Data and Compliance ƒIsolate cloud tenants

ƒPolicy and regulations

ƒManage security operations

ƒBuild compliant data centers

ƒOffer backup and resiliency

Each pattern has its own set of key security concerns

Cloud Enabled Data Center Cloud Platform Services Cloud Service Provider Business Solutions on Cloud

Infrastructure as a Service (IaaS): Cut IT expense and complexity

through cloud data centers

Platform-as-a-Service (PaaS): Accelerate time to market with cloud

platform services Innovate business models by becoming a cloud service provider Software as a Service (SaaS): Gain immediate access with business

(8)

© 2011 IBM Corporation

Different workloads require different security controls in the Cloud

8

Simple migration of the Cloud ƒ Analytics

ƒ Infrastructure storage ƒ Industry applications ƒ Collaboration

ƒ Workplace, Desktop and devices

ƒ Business processes ƒ Disaster recovery ƒ Development & Test ƒ Infrastructure Compute

New Business Model ƒ Collaborative health care ƒ Medical imaging ƒ Financial risk ƒ Energy Management Analysis of individual requirements ƒ Sensitive data

ƒ Highly customized data ƒ Not yet virtualized software ƒ Legal restrictions

ƒ Complex processes and transactions

ƒ Regulation intensive systems ƒ Mature workload

ƒ Isolated workload ƒ Preproduction systems ƒ Batch processing systems

(9)

An IBM Customer Example

Secure data access to healthcare

applications and data.

Inability to provision physicians, nurses, and other

staff-members to appropriately entitled applications in a secure and timely manner.

Business challenge

• Cross Clinics Identity Management

• Outsourcing Identity and Access Management burden

Key security requirements

(10)
(11)
(12)

© 2011 IBM Corporation

Design Deploy Consume GRC ƒ Understand the concerns of

your unique cloud initiative

IBM Cloud Security

Roadmap Service X

Identity ƒ Enable single sign on across multiple cloud services IBM Tivoli Federated

Identity Manager Business GW X

Data ƒ Protect and monitor access to shared databases IBM InfoSphere Guardium X X

Intrusion ƒ Defend users and apps from network attacks

IBM Security Network

Intrusion Prevention System X

Virtualization ƒ Protect VMs and hypervisor from advanced threats

IBM Virtual Server

Protection for VMware X X

Patch Management

ƒ Provide patch and config

management of VMs IBM Tivoli Endpoint Manager for Security and Compliance X X

Entry points to get started with IBM security solutions for cloud

12

Cloud Security On Ramps

References

Related documents

interviews will be scheduled once the application materials are submitted. DPD application evaluation criteria are available in the Appendix of this handbook. For access to the

Three Major Layers of IT Cloud Services Cloud Applications (Apps-as-a-service) Cloud (Application) Platforms (Platform-as-a-Service) Cloud Infrastructure

In models of money supply growth ∆m, output growth ∆y, inflation ∆p, fluctuations in an interest rate ∆r and a rate spread rr, however, we find only one case in which

In this section, we discuss the cointegration test that we use to examine evidence of a long-run relationship between gold and oil spot prices and between gold and oil futures

When analysing changes occurring in the milk yield and composition depending on successive lactation it was concluded that the highest amount of obtained milk, calculated FCM and

The central finding of the paper is a general existence re- sult: there always exists a sequence of payoff-improving trades that leads to a stable vote allocation in finite time,

• To assess the relevance/ To what extent does the Project respond to the priorities defined in the Moldova National Development Strategy 2020, Family Code, Code of Education,

However, the ability for unions to reduce injury rates does not appear to increase monotonically as they progress along a workplace instrumentality continuum from recognition alone to