SlideShare ist ein Scribd-Unternehmen logo
1 von 59
Microsoft Cloud User Group – London
Get Your Cloud Project Past IT Security
Alex Magnay
@AlexMags
About us
CONSULT CREATE CHANGE ADVANCE
A series of thorough
discovery and consultation
sessions enables the KA2
team to understand your
precise business and
technology change
programme requirements.
We cannot do this without
you.
Close collaboration, together
with unrivalled expertise and
fresh thinking enables KA2 to
create customised, future-
proofed technology change
driven programmes that
meet your needs. It is all
about you.
Rigorous end-to-end
programme management
throughout the entire
transformation journey
ensures the implementation
process is fast and efficient.
We will take good care of
you.
With innovation at the core
of everything we do, our
clients can embrace the
future, safe in the knowledge
their businesses will
seamlessly adapt to
whatever is thrown at them.
Your success is our success.
https://ka2.io
contact@ka2.io
Alex Magnay
Twitter: @alexmags
Email: alex@alexmags.com
Microsoft’s YOUR Backbone WAN
The Quest for the Public Cloud!
The Quest for the Public Cloud!
The Quest for the Public Cloud!
Cyber Defence 1975
Now What?
Security is hard
And on public cloud it’s still your problem
Shared Responsibility
https://docs.microsoft.com/en-us/azure/security/azure-security-infrastructure
Shared Responsibility
https://aws.amazon.com/compliance/shared-responsibility-model
Security is hard
And on public cloud it’s still your problem
“To reduce business risk to
acceptable levels from
outside forces and internal
mistakes”
Our two secret weapons!
1. NIST Risk Management Framework
2. Product release roadmap
3. NIST Cyber Security Framework Controls
Our two secret weapons!
1. NIST Risk Management Framework
This is aligned with
2. Product release roadmap
which implements
3. NIST Cyber Security Framework Controls
Categorise
system
and data
Select
controls to
reduce risk
Implement
controls
Assess
controls
Authorise.
Risk is
acceptable
Monitor
https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-37r2.pdf
Risk Management Framework
Categorise
system
and data
Select
controls to
reduce risk
Implement
controls
Assess
controls
Authorise.
Risk is
acceptable
Monitor
https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-37r2.pdf
Risk Management Framework
Categorise
system
and data
Select
controls to
reduce risk
Implement
controls
Assess
controls
Authorise.
Risk is
acceptable
Monitor
https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-37r2.pdf
Risk Management Framework
Categorise
system
and data
Select
controls to
reduce risk
Implement
controls
Assess
controls
Authorise.
Risk is
acceptable
Monitor
https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-37r2.pdf
Risk Management Framework
Categorise
system
and data
Select
controls to
reduce risk
Implement
controls
Assess
controls
Authorise.
Risk is
acceptable
Monitor
https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-37r2.pdf
Risk Management Framework
Categorise
system
and data
Select
controls to
reduce risk
Implement
controls
Assess
controls
Authorise.
Risk is
acceptable
Monitor
https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-37r2.pdf
Risk Management Framework
Categorise
system
and data
Select
controls to
reduce risk
Implement
controls
Assess
controls
Authorise.
Risk is
acceptable
Monitor
https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-37r2.pdf
Risk Management Framework
Categorise
system
and data
Select
controls to
reduce risk
Implement
controls
Assess
controls
Authorise.
Risk is
acceptable
Monitor
https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-37r2.pdf
Risk Management Framework
• What data is moving to public cloud and when?
Product Release roadmap
Product Release roadmap
Product Release roadmap
Release
v0.1
Bootstrap
Release
v0.2
Test data
Release
v0.3
Internal
data
Release
v0.4
Confidential
data
Release
v1.0
Secret data
NIST CyberSecurity Framework
NIST CyberSecurity Framework
• Identify - who/what you’re protecting
• Protect - the data/system
• Detect - problems
• Respond– know who to tell, what to do
• Recover – have a plan
https://www.nist.gov/cyberframework
https://www.nist.gov/cyberframework
Categorise
system
and data
Select
controls to
reduce risk
Implement
controls
Assess
controls
Authorise.
Risk is
acceptable
Monitor
https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-37r2.pdf
Risk Management Framework
Categorise system
• How many users?
• Who are they?
• What data?
Describe your risks
Design your controls to make your risks less likely or lower impact
Example
NIST Function NIST Category Your Risks Your Controls Your Work items
Multifactor authentication (PR.AC) Enable MFA
Priv Identity Management (PR.AC) Enable AAD PIM
Admin roles follow least rights privileged (PR.AC) Implement RBAC
Encrypt communications containing credentails (PR.AC) Disable basic auth
(PR.AC) Rotate service passwords
(PR.AC) Rotate API Keys
Misconfiguration results in
unauthorised access
IT admins complete training module before access (PR.AT) Cloud Admin course tracking
Critical data is uploaded before
environment is ready
Users sign up to terms of use (no business data) (PR.AT) Enable AAD Conditional Access ToS
Data Security Data is not protected Classifiy data (PR.DS) Implement AIP
Maintenance software vulnerabilities OS and application secuirty patching (PR.MA) Enforce auto updates
Protective Technology Malware results in outage,
unauthorised access or data loss
antimalware (PR.PT) Enable Windows Defender ATP
(PR.IP) Block inbound internet access
Identity Management
and Access Control
Awareness and Training
Information Protection
Processes and
Procedures
Data loss protection
Protect
Service account password and API keys rotated
Unauthorised access is obtained
Data loss from attack or
accidental disclosure
Completed controls reduce risk
Sprint1
PR.AC MFA
PR.AC Rotate keys
Sprint2
PR.AC RBAC
PR.IP Block internet
Sprint3
PR.AC AAD PIM
PR.IP Azure firewall
PR.PR Defender ATP
PR.MA Auto update
Completed controls reduce risk
Sprint1
PR.AC MFA
PR.AC Rotate keys
Sprint2
PR.AC RBAC
PR.IP Block internet
Sprint3
PR.AC AAD PIM
PR.IP Azure firewall
PR.PR Defender ATP
PR.MA Auto update
RISK
Categorise
system
and data
Select
controls to
reduce risk
Implement
controls
Assess
controls
Authorise.
Risk is
acceptable
Monitor
https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-37r2.pdf
Risk Management Framework
Assess Controls
• Do they work?
• Can they be circumvented?
• How much residual risk remains?
NIST Function NIST Category Your Risks Your Controls Your Work items
Multifactor authentication (PR.AC) Enable MFA
Priv Identity Management (PR.AC) Enable AAD PIM
Admin roles follow least rights privileged (PR.AC) Implement RBAC
Encrypt communications containing credentails (PR.AC) Disable basic auth
(PR.AC) Rotate service passwords
(PR.AC) Rotate API Keys
Misconfiguration results in
unauthorised access
IT admins complete training module before access (PR.AT) Cloud Admin course tracking
Critical data is uploaded before
environment is ready
Users sign up to terms of use (no business data) (PR.AT) Enable AAD Conditional Access ToS
Data Security Data is not protected Classifiy data (PR.DS) Implement AIP
Maintenance software vulnerabilities OS and application secuirty patching (PR.MA) Enforce auto updates
Protective Technology Malware results in outage,
unauthorised access or data loss
antimalware (PR.PT) Enable Windows Defender ATP
(PR.IP) Block inbound internet access
Identity Management
and Access Control
Awareness and Training
Information Protection
Processes and
Procedures
Data loss protection
Protect
Service account password and API keys rotated
Unauthorised access is obtained
Data loss from attack or
accidental disclosure
Completed controls reduce risk
Sprint1
PR.AC MFA
PR.AC Rotate keys
Sprint2
PR.AC RBAC
PR.IP Block internet
Sprint3
PR.AC AAD PIM
PR.IP Azure firewall
PR.PR Defender ATP
PR.MA Auto update
Release v0.1
Bootstrap
RISK
Categorise
system
and data
Select
controls to
reduce risk
Implement
controls
Assess
controls
Authorise.
Risk is
acceptable
Monitor
https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-37r2.pdf
Risk Management Framework
Risk based approach to
Infra as a Service
(IaaS)
Virtual Datacentre example
(Check this: http://aka.ms/VDC)
Every quest needs a map
Or roadmap, storymap, whatever….
http://www.infrastructures.org/papers/bootstrap/bootstrap.htm
• It’s waterfall (build then run)
• Visualisation of the end goal
• Clear interdependencies
http://www.infrastructures.org/papers/bootstrap/bootstrap.htm
NIST Function Your Risks NIST Category Your Controls Work items
Multifactor authentication
(PR.AC) Enable MFA
Priv Identity Management (PR.AC) Enable AAD PIM
Admin roles follow least rights privileged (PR.AC) Implement RBAC
Encrypt communications containing credentails (PR.AC) Disable basic auth
(PR.AC) Rotate service passwords
(PR.AC) Rotate API Keys
IT admins complete training module before access (PR.AT) Cloud Admin course tracking
Users sign up to terms of use (no business data) (PR.AT) Enable AAD Conditional Access ToS
Data Security Classifiy data (PR.DS) Implement AIP
(PR.IP) Block inbound internet access
(PR.IP) Block outbound internet access
(PR.IP) Implement proxy URL filtering
(PR.IP) Implement proxy DLP
Maintenance OS and application secuirty patching (PR.MA) Enforce auto updates
Protective Technology antimalware (PR.PT) Enable Windows Defender ATP
Identity Management
and Access Control
Awareness and Training
Information Protection
Processes and
Procedures
Data loss protection
Protect Unauthorised access is obtained
Data loss from attack or
accidental disclosure
Service account password and API keys rotated
Malware results in outage,
unauthorised access or data loss
Categoris
e system
and data
Select
controls
to reduce
risk
Impleme
nt
controls
Assess
controls
Authorise
. Risk is
acceptabl
e
Monitor
Categoris
e system
and data
Select
controls
to reduce
risk
Impleme
nt
controls
Assess
controls
Authorise
. Risk is
acceptabl
e
Monitor
Categoris
e system
and data
Select
controls
to reduce
risk
Impleme
nt
controls
Assess
controls
Authorise
. Risk is
acceptabl
e
Monitor
Categoris
e system
and data
Select
controls
to reduce
risk
Impleme
nt
controls
Assess
controls
Authorise
. Risk is
acceptabl
e
Monitor
NIST Function Your Risks NIST Category Your Controls Work items
Multifactor authentication
(PR.AC) Enable MFA
Priv Identity Management (PR.AC) Enable AAD PIM
Admin roles follow least rights privileged (PR.AC) Implement RBAC
Encrypt communications containing credentails (PR.AC) Disable basic auth
(PR.AC) Rotate service passwords
(PR.AC) Rotate API Keys
IT admins complete training module before access (PR.AT) Cloud Admin course tracking
Users sign up to terms of use (no business data) (PR.AT) Enable AAD Conditional Access ToS
Data Security Classifiy data (PR.DS) Implement AIP
(PR.IP) Block inbound internet access
(PR.IP) Block outbound internet access
(PR.IP) Implement proxy URL filtering
(PR.IP) Implement proxy DLP
Maintenance OS and application secuirty patching (PR.MA) Enforce auto updates
Protective Technology antimalware (PR.PT) Enable Windows Defender ATP
Identity Management
and Access Control
Awareness and Training
Information Protection
Processes and
Procedures
Data loss protection
Protect Unauthorised access is obtained
Data loss from attack or
accidental disclosure
Service account password and API keys rotated
Malware results in outage,
unauthorised access or data loss
NIST Function Your Risks NIST Category Your Controls Work items
Multifactor authentication
(PR.AC) Enable MFA
Priv Identity Management (PR.AC) Enable AAD PIM
Admin roles follow least rights privileged (PR.AC) Implement RBAC
Encrypt communications containing credentails (PR.AC) Disable basic auth
(PR.AC) Rotate service passwords
(PR.AC) Rotate API Keys
IT admins complete training module before access (PR.AT) Cloud Admin course tracking
Users sign up to terms of use (no business data) (PR.AT) Enable AAD Conditional Access ToS
Data Security Classifiy data (PR.DS) Implement AIP
(PR.IP) Block inbound internet access
(PR.IP) Block outbound internet access
(PR.IP) Implement proxy URL filtering
(PR.IP) Implement proxy DLP
Maintenance OS and application secuirty patching (PR.MA) Enforce auto updates
Protective Technology antimalware (PR.PT) Enable Windows Defender ATP
Identity Management
and Access Control
Awareness and Training
Information Protection
Processes and
Procedures
Data loss protection
Protect Unauthorised access is obtained
Data loss from attack or
accidental disclosure
Service account password and API keys rotated
Malware results in outage,
unauthorised access or data loss
NIST Function Your Risks NIST Category Your Controls Work items
Multifactor authentication
(PR.AC) Enable MFA
Priv Identity Management (PR.AC) Enable AAD PIM
Admin roles follow least rights privileged (PR.AC) Implement RBAC
Encrypt communications containing credentails (PR.AC) Disable basic auth
(PR.AC) Rotate service passwords
(PR.AC) Rotate API Keys
IT admins complete training module before access (PR.AT) Cloud Admin course tracking
Users sign up to terms of use (no business data) (PR.AT) Enable AAD Conditional Access ToS
Data Security Classifiy data (PR.DS) Implement AIP
(PR.IP) Block inbound internet access
(PR.IP) Block outbound internet access
(PR.IP) Implement proxy URL filtering
(PR.IP) Implement proxy DLP
Maintenance OS and application secuirty patching (PR.MA) Enforce auto updates
Protective Technology antimalware (PR.PT) Enable Windows Defender ATP
Identity Management
and Access Control
Awareness and Training
Information Protection
Processes and
Procedures
Data loss protection
Protect Unauthorised access is obtained
Data loss from attack or
accidental disclosure
Service account password and API keys rotated
Malware results in outage,
unauthorised access or data loss
Categoris
e system
and data
Select
controls
to reduce
risk
Impleme
nt
controls
Assess
controls
Authorise
. Risk is
acceptabl
e
Monitor
Categoris
e system
and data
Select
controls
to reduce
risk
Impleme
nt
controls
Assess
controls
Authorise
. Risk is
acceptabl
e
Monitor
Categoris
e system
and data
Select
controls
to reduce
risk
Impleme
nt
controls
Assess
controls
Authorise
. Risk is
acceptabl
e
Monitor
Categoris
e system
and data
Select
controls
to reduce
risk
Impleme
nt
controls
Assess
controls
Authorise
. Risk is
acceptabl
e
Monitor
NIST Function Your Risks NIST Category Your Controls Work items
Multifactor authentication
(PR.AC) Enable MFA
Priv Identity Management (PR.AC) Enable AAD PIM
Admin roles follow least rights privileged (PR.AC) Implement RBAC
Encrypt communications containing credentails (PR.AC) Disable basic auth
(PR.AC) Rotate service passwords
(PR.AC) Rotate API Keys
IT admins complete training module before access (PR.AT) Cloud Admin course tracking
Users sign up to terms of use (no business data) (PR.AT) Enable AAD Conditional Access ToS
Data Security Classifiy data (PR.DS) Implement AIP
(PR.IP) Block inbound internet access
(PR.IP) Block outbound internet access
(PR.IP) Implement proxy URL filtering
(PR.IP) Implement proxy DLP
Maintenance OS and application secuirty patching (PR.MA) Enforce auto updates
Protective Technology antimalware (PR.PT) Enable Windows Defender ATP
Identity Management
and Access Control
Awareness and Training
Information Protection
Processes and
Procedures
Data loss protection
Protect Unauthorised access is obtained
Data loss from attack or
accidental disclosure
Service account password and API keys rotated
Malware results in outage,
unauthorised access or data loss
NIST Function Your Risks NIST Category Your Controls Work items
Multifactor authentication
(PR.AC) Enable MFA
Priv Identity Management (PR.AC) Enable AAD PIM
Admin roles follow least rights privileged (PR.AC) Implement RBAC
Encrypt communications containing credentails (PR.AC) Disable basic auth
(PR.AC) Rotate service passwords
(PR.AC) Rotate API Keys
IT admins complete training module before access (PR.AT) Cloud Admin course tracking
Users sign up to terms of use (no business data) (PR.AT) Enable AAD Conditional Access ToS
Data Security Classifiy data (PR.DS) Implement AIP
(PR.IP) Block inbound internet access
(PR.IP) Block outbound internet access
(PR.IP) Implement proxy URL filtering
(PR.IP) Implement proxy DLP
Maintenance OS and application secuirty patching (PR.MA) Enforce auto updates
Protective Technology antimalware (PR.PT) Enable Windows Defender ATP
Identity Management
and Access Control
Awareness and Training
Information Protection
Processes and
Procedures
Data loss protection
Protect Unauthorised access is obtained
Data loss from attack or
accidental disclosure
Service account password and API keys rotated
Malware results in outage,
unauthorised access or data loss
Shortcuts
• Embed someone from InfoSec in your team (DevSecOps)
They can review controls as they’re implemented
• Learning by doing takes time…
Work with a cloud migration specialist
Inherit their code and security controls
Jump ahead to IAM v7, landing zone v9 etc..
• Be a chameleon. Fold into existing governance
• Call your team the Cloud Adoption Team (CAT)
Thanks!
KA2 is an expert technology change consultancy specialising in financial services, the insurance
industry and public sector. The company provides expert services across the entire technology
change spectrum including; cloud migration, target operating models and digital transformation
strategies; the modern workplace; service management; enterprise architecture; network design;
enterprise security and voice and unified communications. The team includes highly skilled and
experienced programme leaders, technical architects, solutions consultants and business analysts
who all bring a proven track record in delivering successful technology change programmes for a
wide range of blue-chip organisations.
Email: contact@ka2.io

Weitere ähnliche Inhalte

Was ist angesagt?

PPT-Splunk-LegacySIEM-101_FINAL
PPT-Splunk-LegacySIEM-101_FINALPPT-Splunk-LegacySIEM-101_FINAL
PPT-Splunk-LegacySIEM-101_FINAL
Risi Avila
 

Was ist angesagt? (20)

ExpertsLiveNL - Post Breach Security with ATA or ATP
ExpertsLiveNL - Post Breach Security with ATA or ATPExpertsLiveNL - Post Breach Security with ATA or ATP
ExpertsLiveNL - Post Breach Security with ATA or ATP
 
IBM QRadar Xforce
IBM QRadar XforceIBM QRadar Xforce
IBM QRadar Xforce
 
Securing Your Public Cloud Infrastructure
Securing Your Public Cloud InfrastructureSecuring Your Public Cloud Infrastructure
Securing Your Public Cloud Infrastructure
 
Cyber Security Threat Modeling
Cyber Security Threat ModelingCyber Security Threat Modeling
Cyber Security Threat Modeling
 
Making Threat Intelligence Actionable Final
Making Threat Intelligence Actionable FinalMaking Threat Intelligence Actionable Final
Making Threat Intelligence Actionable Final
 
How to Choose the Right Security Information and Event Management (SIEM) Solu...
How to Choose the Right Security Information and Event Management (SIEM) Solu...How to Choose the Right Security Information and Event Management (SIEM) Solu...
How to Choose the Right Security Information and Event Management (SIEM) Solu...
 
Achieving Defendable Architectures Via Threat Driven Methodologies
Achieving Defendable Architectures Via Threat Driven MethodologiesAchieving Defendable Architectures Via Threat Driven Methodologies
Achieving Defendable Architectures Via Threat Driven Methodologies
 
Whitepaper IBM Qradar Security Intelligence
Whitepaper IBM Qradar Security IntelligenceWhitepaper IBM Qradar Security Intelligence
Whitepaper IBM Qradar Security Intelligence
 
PPT-Splunk-LegacySIEM-101_FINAL
PPT-Splunk-LegacySIEM-101_FINALPPT-Splunk-LegacySIEM-101_FINAL
PPT-Splunk-LegacySIEM-101_FINAL
 
Westjets Security Architecture Made Simple We Finally Got It Right
Westjets Security Architecture Made Simple We Finally Got It RightWestjets Security Architecture Made Simple We Finally Got It Right
Westjets Security Architecture Made Simple We Finally Got It Right
 
Security Whack-a-Mole: SANS 2017 Threat Landscape Survey
Security Whack-a-Mole: SANS 2017 Threat Landscape SurveySecurity Whack-a-Mole: SANS 2017 Threat Landscape Survey
Security Whack-a-Mole: SANS 2017 Threat Landscape Survey
 
IBM QRadar Security Intelligence Overview
IBM QRadar Security Intelligence OverviewIBM QRadar Security Intelligence Overview
IBM QRadar Security Intelligence Overview
 
Industrial Control Systems Cybersecurity Technology Selection
Industrial Control Systems Cybersecurity Technology SelectionIndustrial Control Systems Cybersecurity Technology Selection
Industrial Control Systems Cybersecurity Technology Selection
 
Qualys Brochure for CISOs
Qualys Brochure for CISOsQualys Brochure for CISOs
Qualys Brochure for CISOs
 
2019 10-app gate sdp 101 09a
2019 10-app gate sdp 101 09a2019 10-app gate sdp 101 09a
2019 10-app gate sdp 101 09a
 
Incident response-in-the-cloud
Incident response-in-the-cloudIncident response-in-the-cloud
Incident response-in-the-cloud
 
SplunkSummit 2015 - Splunk User Behavioral Analytics
SplunkSummit 2015 - Splunk User Behavioral AnalyticsSplunkSummit 2015 - Splunk User Behavioral Analytics
SplunkSummit 2015 - Splunk User Behavioral Analytics
 
Data security solutions_Baltics_IBM_QRadar_SIEM_Use_Cases_28.01.2014
Data security solutions_Baltics_IBM_QRadar_SIEM_Use_Cases_28.01.2014Data security solutions_Baltics_IBM_QRadar_SIEM_Use_Cases_28.01.2014
Data security solutions_Baltics_IBM_QRadar_SIEM_Use_Cases_28.01.2014
 
Splunk for Security-Hands On
Splunk for Security-Hands OnSplunk for Security-Hands On
Splunk for Security-Hands On
 
Identity-Based Security and Privacy for the Internet of Things
Identity-Based Security and Privacy for the Internet of ThingsIdentity-Based Security and Privacy for the Internet of Things
Identity-Based Security and Privacy for the Internet of Things
 

Ähnlich wie Risk Management for Public Cloud Projects

SCADA Cyber Sec | ISACA 2013 | Patricia Watson
SCADA Cyber Sec | ISACA 2013 | Patricia WatsonSCADA Cyber Sec | ISACA 2013 | Patricia Watson
SCADA Cyber Sec | ISACA 2013 | Patricia Watson
Patricia M Watson
 

Ähnlich wie Risk Management for Public Cloud Projects (20)

Slide Griffin - Practical Attacks and Mitigations
Slide Griffin - Practical Attacks and MitigationsSlide Griffin - Practical Attacks and Mitigations
Slide Griffin - Practical Attacks and Mitigations
 
Uac sales pres_20_apr09-2
Uac sales pres_20_apr09-2Uac sales pres_20_apr09-2
Uac sales pres_20_apr09-2
 
So You Want a Job in Cybersecurity
So You Want a Job in CybersecuritySo You Want a Job in Cybersecurity
So You Want a Job in Cybersecurity
 
cybersecurity-careers.pdf
cybersecurity-careers.pdfcybersecurity-careers.pdf
cybersecurity-careers.pdf
 
Splunk conf2014 - Operationalizing Advanced Threat Defense
Splunk conf2014 - Operationalizing Advanced Threat DefenseSplunk conf2014 - Operationalizing Advanced Threat Defense
Splunk conf2014 - Operationalizing Advanced Threat Defense
 
Secure & Automate AWS Deployments with Next-Generation Security from Palo Alt...
Secure & Automate AWS Deployments with Next-Generation Security from Palo Alt...Secure & Automate AWS Deployments with Next-Generation Security from Palo Alt...
Secure & Automate AWS Deployments with Next-Generation Security from Palo Alt...
 
How PCI And PA DSS will change enterprise applications
How PCI And PA DSS will change enterprise applicationsHow PCI And PA DSS will change enterprise applications
How PCI And PA DSS will change enterprise applications
 
Cyber Crime Conference 2017 - DFLabs Supervised Active Intelligence - Andrea ...
Cyber Crime Conference 2017 - DFLabs Supervised Active Intelligence - Andrea ...Cyber Crime Conference 2017 - DFLabs Supervised Active Intelligence - Andrea ...
Cyber Crime Conference 2017 - DFLabs Supervised Active Intelligence - Andrea ...
 
SCADA Cyber Sec | ISACA 2013 | Patricia Watson
SCADA Cyber Sec | ISACA 2013 | Patricia WatsonSCADA Cyber Sec | ISACA 2013 | Patricia Watson
SCADA Cyber Sec | ISACA 2013 | Patricia Watson
 
Sourcefire Webinar - NEW GENERATION IPS
Sourcefire Webinar -  NEW GENERATION IPSSourcefire Webinar -  NEW GENERATION IPS
Sourcefire Webinar - NEW GENERATION IPS
 
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
 
Security assessment with a hint of CISSP Prep
Security assessment with a hint of CISSP PrepSecurity assessment with a hint of CISSP Prep
Security assessment with a hint of CISSP Prep
 
DEVNET-1180 Security from the Cloud
DEVNET-1180	Security from the CloudDEVNET-1180	Security from the Cloud
DEVNET-1180 Security from the Cloud
 
Panda Security - Adaptive Defense 360
Panda Security - Adaptive Defense 360Panda Security - Adaptive Defense 360
Panda Security - Adaptive Defense 360
 
Proactive Threat Detection and Safeguarding of Data for Enhanced Cyber resili...
Proactive Threat Detection and Safeguarding of Data for Enhanced Cyber resili...Proactive Threat Detection and Safeguarding of Data for Enhanced Cyber resili...
Proactive Threat Detection and Safeguarding of Data for Enhanced Cyber resili...
 
Cloudbrew 2019 - Azure Security
Cloudbrew 2019 - Azure SecurityCloudbrew 2019 - Azure Security
Cloudbrew 2019 - Azure Security
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
 
SCADA and HMI Security in InduSoft Web Studio
SCADA and HMI Security in InduSoft Web StudioSCADA and HMI Security in InduSoft Web Studio
SCADA and HMI Security in InduSoft Web Studio
 
Splunk for Enterprise Security Featuring User Behavior Analytics
Splunk for Enterprise Security Featuring User Behavior Analytics Splunk for Enterprise Security Featuring User Behavior Analytics
Splunk for Enterprise Security Featuring User Behavior Analytics
 
NISTSP80037rev2-by Beruos.pptx
NISTSP80037rev2-by Beruos.pptxNISTSP80037rev2-by Beruos.pptx
NISTSP80037rev2-by Beruos.pptx
 

Kürzlich hochgeladen

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Kürzlich hochgeladen (20)

Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 

Risk Management for Public Cloud Projects

  • 1. Microsoft Cloud User Group – London Get Your Cloud Project Past IT Security Alex Magnay @AlexMags
  • 2. About us CONSULT CREATE CHANGE ADVANCE A series of thorough discovery and consultation sessions enables the KA2 team to understand your precise business and technology change programme requirements. We cannot do this without you. Close collaboration, together with unrivalled expertise and fresh thinking enables KA2 to create customised, future- proofed technology change driven programmes that meet your needs. It is all about you. Rigorous end-to-end programme management throughout the entire transformation journey ensures the implementation process is fast and efficient. We will take good care of you. With innovation at the core of everything we do, our clients can embrace the future, safe in the knowledge their businesses will seamlessly adapt to whatever is thrown at them. Your success is our success. https://ka2.io contact@ka2.io
  • 4.
  • 5.
  • 6.
  • 7.
  • 9. The Quest for the Public Cloud!
  • 10. The Quest for the Public Cloud!
  • 11. The Quest for the Public Cloud! Cyber Defence 1975
  • 13. Security is hard And on public cloud it’s still your problem
  • 16.
  • 17.
  • 18. Security is hard And on public cloud it’s still your problem
  • 19. “To reduce business risk to acceptable levels from outside forces and internal mistakes”
  • 20. Our two secret weapons! 1. NIST Risk Management Framework 2. Product release roadmap 3. NIST Cyber Security Framework Controls
  • 21. Our two secret weapons! 1. NIST Risk Management Framework This is aligned with 2. Product release roadmap which implements 3. NIST Cyber Security Framework Controls
  • 22. Categorise system and data Select controls to reduce risk Implement controls Assess controls Authorise. Risk is acceptable Monitor https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-37r2.pdf Risk Management Framework
  • 23. Categorise system and data Select controls to reduce risk Implement controls Assess controls Authorise. Risk is acceptable Monitor https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-37r2.pdf Risk Management Framework
  • 24. Categorise system and data Select controls to reduce risk Implement controls Assess controls Authorise. Risk is acceptable Monitor https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-37r2.pdf Risk Management Framework
  • 25. Categorise system and data Select controls to reduce risk Implement controls Assess controls Authorise. Risk is acceptable Monitor https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-37r2.pdf Risk Management Framework
  • 26. Categorise system and data Select controls to reduce risk Implement controls Assess controls Authorise. Risk is acceptable Monitor https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-37r2.pdf Risk Management Framework
  • 27. Categorise system and data Select controls to reduce risk Implement controls Assess controls Authorise. Risk is acceptable Monitor https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-37r2.pdf Risk Management Framework
  • 28. Categorise system and data Select controls to reduce risk Implement controls Assess controls Authorise. Risk is acceptable Monitor https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-37r2.pdf Risk Management Framework
  • 29. Categorise system and data Select controls to reduce risk Implement controls Assess controls Authorise. Risk is acceptable Monitor https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-37r2.pdf Risk Management Framework
  • 30. • What data is moving to public cloud and when? Product Release roadmap
  • 32. Product Release roadmap Release v0.1 Bootstrap Release v0.2 Test data Release v0.3 Internal data Release v0.4 Confidential data Release v1.0 Secret data
  • 34. NIST CyberSecurity Framework • Identify - who/what you’re protecting • Protect - the data/system • Detect - problems • Respond– know who to tell, what to do • Recover – have a plan https://www.nist.gov/cyberframework
  • 36. Categorise system and data Select controls to reduce risk Implement controls Assess controls Authorise. Risk is acceptable Monitor https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-37r2.pdf Risk Management Framework Categorise system • How many users? • Who are they? • What data?
  • 37. Describe your risks Design your controls to make your risks less likely or lower impact
  • 38. Example NIST Function NIST Category Your Risks Your Controls Your Work items Multifactor authentication (PR.AC) Enable MFA Priv Identity Management (PR.AC) Enable AAD PIM Admin roles follow least rights privileged (PR.AC) Implement RBAC Encrypt communications containing credentails (PR.AC) Disable basic auth (PR.AC) Rotate service passwords (PR.AC) Rotate API Keys Misconfiguration results in unauthorised access IT admins complete training module before access (PR.AT) Cloud Admin course tracking Critical data is uploaded before environment is ready Users sign up to terms of use (no business data) (PR.AT) Enable AAD Conditional Access ToS Data Security Data is not protected Classifiy data (PR.DS) Implement AIP Maintenance software vulnerabilities OS and application secuirty patching (PR.MA) Enforce auto updates Protective Technology Malware results in outage, unauthorised access or data loss antimalware (PR.PT) Enable Windows Defender ATP (PR.IP) Block inbound internet access Identity Management and Access Control Awareness and Training Information Protection Processes and Procedures Data loss protection Protect Service account password and API keys rotated Unauthorised access is obtained Data loss from attack or accidental disclosure
  • 39. Completed controls reduce risk Sprint1 PR.AC MFA PR.AC Rotate keys Sprint2 PR.AC RBAC PR.IP Block internet Sprint3 PR.AC AAD PIM PR.IP Azure firewall PR.PR Defender ATP PR.MA Auto update
  • 40. Completed controls reduce risk Sprint1 PR.AC MFA PR.AC Rotate keys Sprint2 PR.AC RBAC PR.IP Block internet Sprint3 PR.AC AAD PIM PR.IP Azure firewall PR.PR Defender ATP PR.MA Auto update RISK
  • 41. Categorise system and data Select controls to reduce risk Implement controls Assess controls Authorise. Risk is acceptable Monitor https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-37r2.pdf Risk Management Framework Assess Controls • Do they work? • Can they be circumvented? • How much residual risk remains?
  • 42. NIST Function NIST Category Your Risks Your Controls Your Work items Multifactor authentication (PR.AC) Enable MFA Priv Identity Management (PR.AC) Enable AAD PIM Admin roles follow least rights privileged (PR.AC) Implement RBAC Encrypt communications containing credentails (PR.AC) Disable basic auth (PR.AC) Rotate service passwords (PR.AC) Rotate API Keys Misconfiguration results in unauthorised access IT admins complete training module before access (PR.AT) Cloud Admin course tracking Critical data is uploaded before environment is ready Users sign up to terms of use (no business data) (PR.AT) Enable AAD Conditional Access ToS Data Security Data is not protected Classifiy data (PR.DS) Implement AIP Maintenance software vulnerabilities OS and application secuirty patching (PR.MA) Enforce auto updates Protective Technology Malware results in outage, unauthorised access or data loss antimalware (PR.PT) Enable Windows Defender ATP (PR.IP) Block inbound internet access Identity Management and Access Control Awareness and Training Information Protection Processes and Procedures Data loss protection Protect Service account password and API keys rotated Unauthorised access is obtained Data loss from attack or accidental disclosure
  • 43. Completed controls reduce risk Sprint1 PR.AC MFA PR.AC Rotate keys Sprint2 PR.AC RBAC PR.IP Block internet Sprint3 PR.AC AAD PIM PR.IP Azure firewall PR.PR Defender ATP PR.MA Auto update Release v0.1 Bootstrap RISK
  • 44. Categorise system and data Select controls to reduce risk Implement controls Assess controls Authorise. Risk is acceptable Monitor https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-37r2.pdf Risk Management Framework
  • 45. Risk based approach to Infra as a Service (IaaS) Virtual Datacentre example (Check this: http://aka.ms/VDC)
  • 46. Every quest needs a map Or roadmap, storymap, whatever….
  • 48. • It’s waterfall (build then run) • Visualisation of the end goal • Clear interdependencies http://www.infrastructures.org/papers/bootstrap/bootstrap.htm
  • 49.
  • 50. NIST Function Your Risks NIST Category Your Controls Work items Multifactor authentication (PR.AC) Enable MFA Priv Identity Management (PR.AC) Enable AAD PIM Admin roles follow least rights privileged (PR.AC) Implement RBAC Encrypt communications containing credentails (PR.AC) Disable basic auth (PR.AC) Rotate service passwords (PR.AC) Rotate API Keys IT admins complete training module before access (PR.AT) Cloud Admin course tracking Users sign up to terms of use (no business data) (PR.AT) Enable AAD Conditional Access ToS Data Security Classifiy data (PR.DS) Implement AIP (PR.IP) Block inbound internet access (PR.IP) Block outbound internet access (PR.IP) Implement proxy URL filtering (PR.IP) Implement proxy DLP Maintenance OS and application secuirty patching (PR.MA) Enforce auto updates Protective Technology antimalware (PR.PT) Enable Windows Defender ATP Identity Management and Access Control Awareness and Training Information Protection Processes and Procedures Data loss protection Protect Unauthorised access is obtained Data loss from attack or accidental disclosure Service account password and API keys rotated Malware results in outage, unauthorised access or data loss Categoris e system and data Select controls to reduce risk Impleme nt controls Assess controls Authorise . Risk is acceptabl e Monitor Categoris e system and data Select controls to reduce risk Impleme nt controls Assess controls Authorise . Risk is acceptabl e Monitor Categoris e system and data Select controls to reduce risk Impleme nt controls Assess controls Authorise . Risk is acceptabl e Monitor Categoris e system and data Select controls to reduce risk Impleme nt controls Assess controls Authorise . Risk is acceptabl e Monitor NIST Function Your Risks NIST Category Your Controls Work items Multifactor authentication (PR.AC) Enable MFA Priv Identity Management (PR.AC) Enable AAD PIM Admin roles follow least rights privileged (PR.AC) Implement RBAC Encrypt communications containing credentails (PR.AC) Disable basic auth (PR.AC) Rotate service passwords (PR.AC) Rotate API Keys IT admins complete training module before access (PR.AT) Cloud Admin course tracking Users sign up to terms of use (no business data) (PR.AT) Enable AAD Conditional Access ToS Data Security Classifiy data (PR.DS) Implement AIP (PR.IP) Block inbound internet access (PR.IP) Block outbound internet access (PR.IP) Implement proxy URL filtering (PR.IP) Implement proxy DLP Maintenance OS and application secuirty patching (PR.MA) Enforce auto updates Protective Technology antimalware (PR.PT) Enable Windows Defender ATP Identity Management and Access Control Awareness and Training Information Protection Processes and Procedures Data loss protection Protect Unauthorised access is obtained Data loss from attack or accidental disclosure Service account password and API keys rotated Malware results in outage, unauthorised access or data loss NIST Function Your Risks NIST Category Your Controls Work items Multifactor authentication (PR.AC) Enable MFA Priv Identity Management (PR.AC) Enable AAD PIM Admin roles follow least rights privileged (PR.AC) Implement RBAC Encrypt communications containing credentails (PR.AC) Disable basic auth (PR.AC) Rotate service passwords (PR.AC) Rotate API Keys IT admins complete training module before access (PR.AT) Cloud Admin course tracking Users sign up to terms of use (no business data) (PR.AT) Enable AAD Conditional Access ToS Data Security Classifiy data (PR.DS) Implement AIP (PR.IP) Block inbound internet access (PR.IP) Block outbound internet access (PR.IP) Implement proxy URL filtering (PR.IP) Implement proxy DLP Maintenance OS and application secuirty patching (PR.MA) Enforce auto updates Protective Technology antimalware (PR.PT) Enable Windows Defender ATP Identity Management and Access Control Awareness and Training Information Protection Processes and Procedures Data loss protection Protect Unauthorised access is obtained Data loss from attack or accidental disclosure Service account password and API keys rotated Malware results in outage, unauthorised access or data loss
  • 51.
  • 52.
  • 53.
  • 54.
  • 55. NIST Function Your Risks NIST Category Your Controls Work items Multifactor authentication (PR.AC) Enable MFA Priv Identity Management (PR.AC) Enable AAD PIM Admin roles follow least rights privileged (PR.AC) Implement RBAC Encrypt communications containing credentails (PR.AC) Disable basic auth (PR.AC) Rotate service passwords (PR.AC) Rotate API Keys IT admins complete training module before access (PR.AT) Cloud Admin course tracking Users sign up to terms of use (no business data) (PR.AT) Enable AAD Conditional Access ToS Data Security Classifiy data (PR.DS) Implement AIP (PR.IP) Block inbound internet access (PR.IP) Block outbound internet access (PR.IP) Implement proxy URL filtering (PR.IP) Implement proxy DLP Maintenance OS and application secuirty patching (PR.MA) Enforce auto updates Protective Technology antimalware (PR.PT) Enable Windows Defender ATP Identity Management and Access Control Awareness and Training Information Protection Processes and Procedures Data loss protection Protect Unauthorised access is obtained Data loss from attack or accidental disclosure Service account password and API keys rotated Malware results in outage, unauthorised access or data loss Categoris e system and data Select controls to reduce risk Impleme nt controls Assess controls Authorise . Risk is acceptabl e Monitor Categoris e system and data Select controls to reduce risk Impleme nt controls Assess controls Authorise . Risk is acceptabl e Monitor Categoris e system and data Select controls to reduce risk Impleme nt controls Assess controls Authorise . Risk is acceptabl e Monitor Categoris e system and data Select controls to reduce risk Impleme nt controls Assess controls Authorise . Risk is acceptabl e Monitor NIST Function Your Risks NIST Category Your Controls Work items Multifactor authentication (PR.AC) Enable MFA Priv Identity Management (PR.AC) Enable AAD PIM Admin roles follow least rights privileged (PR.AC) Implement RBAC Encrypt communications containing credentails (PR.AC) Disable basic auth (PR.AC) Rotate service passwords (PR.AC) Rotate API Keys IT admins complete training module before access (PR.AT) Cloud Admin course tracking Users sign up to terms of use (no business data) (PR.AT) Enable AAD Conditional Access ToS Data Security Classifiy data (PR.DS) Implement AIP (PR.IP) Block inbound internet access (PR.IP) Block outbound internet access (PR.IP) Implement proxy URL filtering (PR.IP) Implement proxy DLP Maintenance OS and application secuirty patching (PR.MA) Enforce auto updates Protective Technology antimalware (PR.PT) Enable Windows Defender ATP Identity Management and Access Control Awareness and Training Information Protection Processes and Procedures Data loss protection Protect Unauthorised access is obtained Data loss from attack or accidental disclosure Service account password and API keys rotated Malware results in outage, unauthorised access or data loss NIST Function Your Risks NIST Category Your Controls Work items Multifactor authentication (PR.AC) Enable MFA Priv Identity Management (PR.AC) Enable AAD PIM Admin roles follow least rights privileged (PR.AC) Implement RBAC Encrypt communications containing credentails (PR.AC) Disable basic auth (PR.AC) Rotate service passwords (PR.AC) Rotate API Keys IT admins complete training module before access (PR.AT) Cloud Admin course tracking Users sign up to terms of use (no business data) (PR.AT) Enable AAD Conditional Access ToS Data Security Classifiy data (PR.DS) Implement AIP (PR.IP) Block inbound internet access (PR.IP) Block outbound internet access (PR.IP) Implement proxy URL filtering (PR.IP) Implement proxy DLP Maintenance OS and application secuirty patching (PR.MA) Enforce auto updates Protective Technology antimalware (PR.PT) Enable Windows Defender ATP Identity Management and Access Control Awareness and Training Information Protection Processes and Procedures Data loss protection Protect Unauthorised access is obtained Data loss from attack or accidental disclosure Service account password and API keys rotated Malware results in outage, unauthorised access or data loss
  • 56. Shortcuts • Embed someone from InfoSec in your team (DevSecOps) They can review controls as they’re implemented • Learning by doing takes time… Work with a cloud migration specialist Inherit their code and security controls Jump ahead to IAM v7, landing zone v9 etc.. • Be a chameleon. Fold into existing governance • Call your team the Cloud Adoption Team (CAT)
  • 57.
  • 58.
  • 59. Thanks! KA2 is an expert technology change consultancy specialising in financial services, the insurance industry and public sector. The company provides expert services across the entire technology change spectrum including; cloud migration, target operating models and digital transformation strategies; the modern workplace; service management; enterprise architecture; network design; enterprise security and voice and unified communications. The team includes highly skilled and experienced programme leaders, technical architects, solutions consultants and business analysts who all bring a proven track record in delivering successful technology change programmes for a wide range of blue-chip organisations. Email: contact@ka2.io

Hinweis der Redaktion

  1. A problem my consultancy hit on a recent cloud migration engagement, whats happening now and hopefully you’ll be able to make use of this too.
  2. Last seen working at public cloud service provider Hentsu spinning up infra for new hedge funds and migrating hedge funds to public cloud Background engineering teams investment banking, asset management regulatory compliance, high security, high availability, high tech Industry cert certifications & scout computer badge!!
  3. Loaded up with Historical cargo
  4. CEO of Infor at AWS Summit 2014 Building a computer room/dc is kind of interesting Keeping it running is a burden Huge distraction from working on stuff the business or the customer actually cares about Move dcs to public cloud and refocus on more important stuff that’s going to make company money/customers happy Building and maintaining DCs does keep you busy, doesn't make you valuable
  5. Azure datacenters are positioned on laylines of tremendous connectivity If you’re an international organization , investigate if you can ditch your point to point international lease lines and use public cloud provider as a hub to link your offices and datacenters. When comparing the cost of on prem vs public cloud
  6. You assemble a team of mercenaries/contractors
  7. Infosec Fortress
  8. Cyber defence 1976
  9. Administration – who has access to what (from where), rbac, how you operate the service, still you
  10. AWS – same deal, still up to you to secure the data
  11. Where’s the magic dial?
  12. 1 A way of discussing risk with infosec and getting approvals 2. Release roadmap, what we’re going to do in stages 3. Helps us figure out risks and what to do about them
  13. Click through
  14. Categorize the system and the information processed, stored, and transmitted by the system based on an analysis of the impact of loss Describe the risk – what bad things could happen with this system / this data
  15. Select an initial set of controls for the system and tailor the controls as needed to reduce risk to an acceptable level based on an assessment of risk. Technical/process NIST Cyber Framework can help with this
  16. Implement the controls and describe how the controls are employed within the system and its environment of operation.
  17. Assess the controls to determine if the controls are implemented correctly, operating as intended, and producing the desired outcomes with respect to satisfying the security and privacy requirements.
  18. Authorize the system or common controls based on a determination that the risk to organizational operations and assets, individuals, other organizations, and the Nation is acceptable.
  19. Monitor the system and the associated controls on an ongoing basis to include assessing control effectiveness, documenting changes to the system and environment of operation, conducting risk assessments and impact analyses, and reporting the security and privacy posture of the system.
  20. Categorize the system and the information processed, stored, and transmitted by the system based on an analysis of the impact of loss Describe the risk – what bad things could happen with this system / this data
  21. Click to releases
  22. Categorize the system and the information processed, stored, and transmitted by the system based on an analysis of the impact of loss Select an initial set of controls for the system and tailor the controls as needed to reduce risk to an acceptable level based on an assessment of risk. Implement the controls and describe how the controls are employed within the system and its environment of operation. Assess the controls to determine if the controls are implemented correctly, operating as intended, and producing the desired outcomes with respect to satisfying the security and privacy requirements. Authorize the system or common controls based on a determination that the risk to organizational operations and assets, individuals, other organizations, and the Nation is acceptable. Monitor the system and the associated controls on an ongoing basis to include assessing control effectiveness, documenting changes to the system and environment of operation, conducting risk assessments and impact analyses, and reporting the security and privacy posture of the system.
  23. Secret weapon number 3
  24. Categorize the system and the information processed, stored, and transmitted by the system based on an analysis of the impact of loss Select an initial set of controls for the system and tailor the controls as needed to reduce risk to an acceptable level based on an assessment of risk. Technical/process Implement the controls and describe how the controls are employed within the system and its environment of operation. Assess the controls to determine if the controls are implemented correctly, operating as intended, and producing the desired outcomes with respect to satisfying the security and privacy requirements. Authorize the system or common controls based on a determination that the risk to organizational operations and assets, individuals, other organizations, and the Nation is acceptable. Monitor the system and the associated controls on an ongoing basis to include assessing control effectiveness, documenting changes to the system and environment of operation, conducting risk assessments and impact analyses, and reporting the security and privacy posture of the system.
  25. Risk – whats the bad thing that could happen Control – what makes it unlikely or lower impact Work items – well defined so people can crack on Talk with infosec, which risks and controls will get you to next stage on your roadmap?
  26. Categorize the system and the information processed, stored, and transmitted by the system based on an analysis of the impact of loss Select an initial set of controls for the system and tailor the controls as needed to reduce risk to an acceptable level based on an assessment of risk. Technical/process Implement the controls and describe how the controls are employed within the system and its environment of operation. Assess the controls to determine if the controls are implemented correctly, operating as intended, and producing the desired outcomes with respect to satisfying the security and privacy requirements. Authorize the system or common controls based on a determination that the risk to organizational operations and assets, individuals, other organizations, and the Nation is acceptable. Monitor the system and the associated controls on an ongoing basis to include assessing control effectiveness, documenting changes to the system and environment of operation, conducting risk assessments and impact analyses, and reporting the security and privacy posture of the system.
  27. 50% green
  28. Monitor the system and the associated controls on an ongoing basis to include assessing control effectiveness, documenting changes to the system and environment of operation, conducting risk assessments and impact analyses, and reporting the security and privacy posture of the system.
  29. Excuse the GFX, it was 1998, on unix, we’re lucky it’s not ASCII art!
  30. High risk – don’t put anything important here! Getting better, safer… Time for low value apps…. Party time, upload the business critical data
  31. High risk – don’t put anything important here! Getting better, safer… Time for low value apps…. Party time, upload the business critical data
  32. Bootstrap – POCs look like this often
  33. Central ID and RBAC
  34. App ready
  35. Data ready
  36. High risk – don’t put anything important here! Getting better, safer… Time for low value apps…. Party time, upload the business critical data
  37. But the burners on
  38. Stop fighting with IT Security Find that common ground, common language. Agree a plan, execute the plan and keep talking throughout.
  39. May your quests by really successful!
  40. A problem my consultancy hit on a recent cloud migration engagement, whats happening now and hopefully you’ll be able to make use of this too.