SlideShare ist ein Scribd-Unternehmen logo
1 von 26
Peer Stories:
How RightScale Achieved
PCI Compliance on Cloud Infrastructure
Phil Cox

Rand Wacker

Director, Security &
Compliance
RightScale

VP, Products
CloudPassage

1
About The Presenters

Phil Cox

Rand Wacker

• RightScale, Director of
Security and Compliance

• CloudPassage, VP of Products

• Multiple PCI SIGs

• Cisco Security, IronPort, UC
Berkeley Security/Network Ops

• 20+ years InfoSec

Twitter: @randwacker

Twitter: @sec_prof

2
Introducing RightScale
RightScale pioneered IaaS cloud management
• Enables organizations to manage all of their cloud infrastructure
• Established in 2006, partners with all major cloud providers
• Has launched nearly 6 million servers with the RightScale
management platform

3
RightScale’s PCI Challenge
• Payment processing servers are in scope for PCI DSS
• Built and runs on Amazon Web Services (AWS) for the Infrastructure-asa-Service (IaaS) benefits
• Required PCI DSS compliance on AWS servers

With background as a Qualified
Security Assessor, confident PCI
DSS compliance could be achieved
in an IaaS environment

4
PCI Shared Responsibility (IaaS)
Data

– OS, application, and data
– And the compliance of these
components

App Code
App Framework
Operating System
Virtual Machine

– Infrastructure, networking,
storage, and virtualization
mechanism
– And the compliance of these
components

Hypervisor
Compute & Storage
Shared Network
Physical Facilities

5

Provider
Responsibility

• Service provider responsibility

Customer
Responsibility

• Customer responsibility
One Approach From the CSA
1.

Plan PCI DSS controls for as though your IaaS infrastructure
is your on-premise network

2.

Realize which elements you do not control since it is really not
an on-premise network (e.g. physical facilities)

3.

Talk with a service provider on whether they can and will
cover the elements they control for compliance

4.

Realize which controls don’t apply verbatim to the cloud
environment and figure out how to compensate

6
Options for Achieving PCI DSS
Compliance
• RightScale used its own proven cloud management
platform to deploy the PCI cloud servers in the AWS

• Still needed ongoing visibility and intrusion detection
capabilities in an IaaS environment. Either:
– Build it themselves using traditional security tools
– Buy a cloud security and compliance product

RightScale chose
CloudPassage Halo
to speed up efforts
7
Why RightScale Picked Halo
• Purpose-built for cloud
environments, requiring no development
resources
• Visibility into servers running within an
IaaS infrastructure
• Real-time monitoring and enforcement
• Support for any cloud platform

8
Benefits Experienced with Halo
• Saved Time and Resources
– Saved 6 months of development
time with a part-time staff person
– Takes 1/5 the management time
(2 hours a week with Halo versus
¼ FTE for other tools)

9
Benefits Experienced with Halo

• Established RightScale as a Trusted Advisor with
Customers
– Used as part of RightScale’s reference architecture for PCI DSS
compliance
– Runs on any virtual or cloud platform, protecting various customer
environments
10
Benefits Experienced with Halo
• Helped Enable Sales
– Went to market faster
– Enabled sales to pitch Halo along with RightScale for
compliance

11
Best Practices for PCI DSS Compliance
in IaaS
• Select from PCI Approved Service Provider with the
IaaS features you need
• Avoid storing the Primary Account Numbers (PANs)
• Use purpose-built cloud security products
(we recommend CloudPassage Halo)

12
Poll: PCI Status
• What is the status of your PCI initiative (IaaShosted or otherwise)?
–
–
–
–

We have passed our audits and are fully operational
We have an audit planned within the next year
We are investigating what it will take to be PCI compliant
No plans to go through PCI audits

13
Using CloudPassage Halo for
PCI Compliance

14
Halo is a security-as-a-service
that enables cloud adoption.
• Software-as-a-Service delivery
• Private cloud / SDDC / IaaS

• Elastic application hosting
• Big data analytics

15
Halo consolidates multiple critical
security & compliance controls.
Cloud Firewall
Automation

File Integrity
Monitoring

Multi-Factor
Authentication

Server Account
Managements
Security Event
Alerting

System & Application
Config Security
Vulnerability &
Patch Scanning

REST API
Integrations

16
Halo architecture is
highly
scalable, automated, and is
rapidly deployed.

www-1

mysql-1

bigdata-1

Halo

Halo

Halo

Halo Admin
Web Portal

Halo REST
API
gateway
17

Halo Security
Analytics
Engine
Halo works in any environment.

18
Example Security & Compliance
Automation with Halo
1

Halo activates firewall on boot, applies latest
policies, and orchestrates ongoing policy updates.

2

Halo secures privileged access via dynamic firewall
rules triggered by multi-factor user authentication.

3

Halo scans O.S. configurations for vulnerabilities
and continuously monitors O.S. state and activity.

4

Application configurations are scanned for
vulnerabilities and are continuously monitored.

5

Cryptographic integrity monitoring ensures app
code and binaries are not compromised.

6

Halo monitors system binary and config files for
correct ACLs, file integrity, and vulnerabilities.

7

Application data stores are monitored for access;
outbound firewall rules prevent data extrusion.

1

4
Application
Engine

5
Application Code

6

7
App Storage
Volume

System Storage
Volume

System Administration Services

2

Halo Daemon

Operating System
Workload VM Instance

3
Halo PCI Coverage

20
Halo Grid: PCI & SOC2

• Certified Level 1 Service Provider
– First entirely cloud-based vendor certified across multiple CSPs

– Hosted in Rackspace Cloud & AWS, with full DevOps automation

• Multiple customers recently cleared PCI QSA audits
• Recently announced: SOC2 certification
21
Poll: PCI & IaaS
• What percentage of your “in-scope” PCI systems
run in a private or public IaaS infrastructure?
– 100% of in-scope PCI systems on IaaS
– PCI in-scope systems run across mix of IaaS and traditional
infrastructures
– No in-scope systems on IaaS (all on traditional physical
hardware)
– N/A, we run no PCI in-scope systems

22
Wrapping Up

23
Summary
• PCI compliance on IaaS is possible
• Responsibility shared with cloud provider
• Security and management must be designed to
work in dynamic, highly automated clouds
• CloudPassage Halo designed and built to automate
compliance in today’s complex environments

24
Q&A and Resources

PCI Compliance in the
Public IaaS Cloud:
How I Did It
cloudpassage.com/pci-kit

blog.rightscale.com

25
Thank You!

Phil Cox

Rand Wacker

• Email: phil@rightscale.com

• Email: rand@cloudpassage.com

• Twitter: @sec_prof

• Twitter: @randwacker

www.rightscale.com

www.cloudpassage.com

26

Weitere ähnliche Inhalte

Andere mochten auch

SANS 2013 Report on Critical Security Controls Survey: Moving From Awareness ...
SANS 2013 Report on Critical Security Controls Survey: Moving From Awareness ...SANS 2013 Report on Critical Security Controls Survey: Moving From Awareness ...
SANS 2013 Report on Critical Security Controls Survey: Moving From Awareness ...FireEye, Inc.
 
PCI Compliance on AWS - Evident.io @ AWS Pop-up Loft 2/26/2015
PCI Compliance on AWS - Evident.io @ AWS Pop-up Loft 2/26/2015PCI Compliance on AWS - Evident.io @ AWS Pop-up Loft 2/26/2015
PCI Compliance on AWS - Evident.io @ AWS Pop-up Loft 2/26/2015Evident.io
 
5 Reasons Cyber Attackers Target Small and Medium Businesses
5 Reasons Cyber Attackers Target Small and Medium Businesses 5 Reasons Cyber Attackers Target Small and Medium Businesses
5 Reasons Cyber Attackers Target Small and Medium Businesses FireEye, Inc.
 
M-Trends 2015 セキュリティ最前線からの視点
M-Trends 2015 セキュリティ最前線からの視点M-Trends 2015 セキュリティ最前線からの視点
M-Trends 2015 セキュリティ最前線からの視点FireEye, Inc.
 
SecDevOps: The New Black of IT
SecDevOps: The New Black of ITSecDevOps: The New Black of IT
SecDevOps: The New Black of ITCloudPassage
 
Ten Security Product Categories You've Probably Never Heard Of
Ten Security Product Categories You've Probably Never Heard OfTen Security Product Categories You've Probably Never Heard Of
Ten Security Product Categories You've Probably Never Heard OfAdrian Sanabria
 
Meeting PCI DSS Requirements with AWS and CloudPassage
Meeting PCI DSS Requirements with AWS and CloudPassageMeeting PCI DSS Requirements with AWS and CloudPassage
Meeting PCI DSS Requirements with AWS and CloudPassageCloudPassage
 
what is cloud security(Basics)
what is cloud security(Basics)what is cloud security(Basics)
what is cloud security(Basics)Santhosh Kumar
 
SANS 2013 Report: Digital Forensics and Incident Response Survey
SANS 2013 Report: Digital Forensics and Incident Response Survey  SANS 2013 Report: Digital Forensics and Incident Response Survey
SANS 2013 Report: Digital Forensics and Incident Response Survey FireEye, Inc.
 
M-Trends 2015 セキュリティ最前線からの視点
M-Trends 2015 セキュリティ最前線からの視点M-Trends 2015 セキュリティ最前線からの視点
M-Trends 2015 セキュリティ最前線からの視点FireEye, Inc.
 
Security and Compliance – Most Commonly Asked Questions - Technical 101
Security and Compliance – Most Commonly Asked Questions - Technical 101Security and Compliance – Most Commonly Asked Questions - Technical 101
Security and Compliance – Most Commonly Asked Questions - Technical 101Amazon Web Services
 
Cloud security enforcer - Quick steps to avoid the blind spots of shadow it
Cloud security enforcer - Quick steps to avoid the blind spots of shadow itCloud security enforcer - Quick steps to avoid the blind spots of shadow it
Cloud security enforcer - Quick steps to avoid the blind spots of shadow itIBM Security
 
Connected Cares: The Open Road For Hackers
Connected Cares: The Open Road For HackersConnected Cares: The Open Road For Hackers
Connected Cares: The Open Road For HackersFireEye, Inc.
 
CSA colorado 2016 presentation CloudPassage
CSA colorado 2016 presentation CloudPassageCSA colorado 2016 presentation CloudPassage
CSA colorado 2016 presentation CloudPassageTrish McGinity, CCSK
 
2013 Incident Response Survey
2013 Incident Response Survey2013 Incident Response Survey
2013 Incident Response SurveyFireEye, Inc.
 

Andere mochten auch (16)

SANS 2013 Report on Critical Security Controls Survey: Moving From Awareness ...
SANS 2013 Report on Critical Security Controls Survey: Moving From Awareness ...SANS 2013 Report on Critical Security Controls Survey: Moving From Awareness ...
SANS 2013 Report on Critical Security Controls Survey: Moving From Awareness ...
 
PCI Compliance on AWS - Evident.io @ AWS Pop-up Loft 2/26/2015
PCI Compliance on AWS - Evident.io @ AWS Pop-up Loft 2/26/2015PCI Compliance on AWS - Evident.io @ AWS Pop-up Loft 2/26/2015
PCI Compliance on AWS - Evident.io @ AWS Pop-up Loft 2/26/2015
 
5 Reasons Cyber Attackers Target Small and Medium Businesses
5 Reasons Cyber Attackers Target Small and Medium Businesses 5 Reasons Cyber Attackers Target Small and Medium Businesses
5 Reasons Cyber Attackers Target Small and Medium Businesses
 
M-Trends 2015 セキュリティ最前線からの視点
M-Trends 2015 セキュリティ最前線からの視点M-Trends 2015 セキュリティ最前線からの視点
M-Trends 2015 セキュリティ最前線からの視点
 
SecDevOps: The New Black of IT
SecDevOps: The New Black of ITSecDevOps: The New Black of IT
SecDevOps: The New Black of IT
 
Ten Security Product Categories You've Probably Never Heard Of
Ten Security Product Categories You've Probably Never Heard OfTen Security Product Categories You've Probably Never Heard Of
Ten Security Product Categories You've Probably Never Heard Of
 
Dns2
Dns2Dns2
Dns2
 
Meeting PCI DSS Requirements with AWS and CloudPassage
Meeting PCI DSS Requirements with AWS and CloudPassageMeeting PCI DSS Requirements with AWS and CloudPassage
Meeting PCI DSS Requirements with AWS and CloudPassage
 
what is cloud security(Basics)
what is cloud security(Basics)what is cloud security(Basics)
what is cloud security(Basics)
 
SANS 2013 Report: Digital Forensics and Incident Response Survey
SANS 2013 Report: Digital Forensics and Incident Response Survey  SANS 2013 Report: Digital Forensics and Incident Response Survey
SANS 2013 Report: Digital Forensics and Incident Response Survey
 
M-Trends 2015 セキュリティ最前線からの視点
M-Trends 2015 セキュリティ最前線からの視点M-Trends 2015 セキュリティ最前線からの視点
M-Trends 2015 セキュリティ最前線からの視点
 
Security and Compliance – Most Commonly Asked Questions - Technical 101
Security and Compliance – Most Commonly Asked Questions - Technical 101Security and Compliance – Most Commonly Asked Questions - Technical 101
Security and Compliance – Most Commonly Asked Questions - Technical 101
 
Cloud security enforcer - Quick steps to avoid the blind spots of shadow it
Cloud security enforcer - Quick steps to avoid the blind spots of shadow itCloud security enforcer - Quick steps to avoid the blind spots of shadow it
Cloud security enforcer - Quick steps to avoid the blind spots of shadow it
 
Connected Cares: The Open Road For Hackers
Connected Cares: The Open Road For HackersConnected Cares: The Open Road For Hackers
Connected Cares: The Open Road For Hackers
 
CSA colorado 2016 presentation CloudPassage
CSA colorado 2016 presentation CloudPassageCSA colorado 2016 presentation CloudPassage
CSA colorado 2016 presentation CloudPassage
 
2013 Incident Response Survey
2013 Incident Response Survey2013 Incident Response Survey
2013 Incident Response Survey
 

Mehr von CloudPassage

Best Practices for Workload Security: Securing Servers in Modern Data Center ...
Best Practices for Workload Security: Securing Servers in Modern Data Center ...Best Practices for Workload Security: Securing Servers in Modern Data Center ...
Best Practices for Workload Security: Securing Servers in Modern Data Center ...CloudPassage
 
CloudPassage Careers
CloudPassage CareersCloudPassage Careers
CloudPassage CareersCloudPassage
 
Transforming the CSO Role to Business Enabler
Transforming the CSO Role to Business EnablerTransforming the CSO Role to Business Enabler
Transforming the CSO Role to Business EnablerCloudPassage
 
Rethinking Security: The Cloud Infrastructure Effect
Rethinking Security: The Cloud Infrastructure EffectRethinking Security: The Cloud Infrastructure Effect
Rethinking Security: The Cloud Infrastructure EffectCloudPassage
 
Webinar compiled powerpoint
Webinar compiled powerpointWebinar compiled powerpoint
Webinar compiled powerpointCloudPassage
 
Security and Compliance for Enterprise Cloud Infrastructure
Security and Compliance for Enterprise Cloud InfrastructureSecurity and Compliance for Enterprise Cloud Infrastructure
Security and Compliance for Enterprise Cloud InfrastructureCloudPassage
 
Technologies You Need to Safely Use the Cloud
Technologies You Need to Safely Use the CloudTechnologies You Need to Safely Use the Cloud
Technologies You Need to Safely Use the CloudCloudPassage
 
Cloud Security: Make Your CISO Successful
Cloud Security: Make Your CISO SuccessfulCloud Security: Make Your CISO Successful
Cloud Security: Make Your CISO SuccessfulCloudPassage
 
Secure Cloud Development Resources with DevOps
Secure Cloud Development Resources with DevOpsSecure Cloud Development Resources with DevOps
Secure Cloud Development Resources with DevOpsCloudPassage
 
45 Minutes to PCI Compliance in the Cloud
45 Minutes to PCI Compliance in the Cloud45 Minutes to PCI Compliance in the Cloud
45 Minutes to PCI Compliance in the CloudCloudPassage
 
Comprehensive Cloud Security Requires an Automated Approach
Comprehensive Cloud Security Requires an Automated ApproachComprehensive Cloud Security Requires an Automated Approach
Comprehensive Cloud Security Requires an Automated ApproachCloudPassage
 
Security that works with, not against, your SaaS business
Security that works with, not against, your SaaS businessSecurity that works with, not against, your SaaS business
Security that works with, not against, your SaaS businessCloudPassage
 
Integrating Security into DevOps
Integrating Security into DevOpsIntegrating Security into DevOps
Integrating Security into DevOpsCloudPassage
 
What You Need To Know About The New PCI Cloud Guidelines
What You Need To Know About The New PCI Cloud GuidelinesWhat You Need To Know About The New PCI Cloud Guidelines
What You Need To Know About The New PCI Cloud GuidelinesCloudPassage
 
What You Haven't Heard (Yet) About Cloud Security
What You Haven't Heard (Yet) About Cloud SecurityWhat You Haven't Heard (Yet) About Cloud Security
What You Haven't Heard (Yet) About Cloud SecurityCloudPassage
 
Delivering Secure OpenStack IaaS for SaaS Products
Delivering Secure OpenStack IaaS for SaaS ProductsDelivering Secure OpenStack IaaS for SaaS Products
Delivering Secure OpenStack IaaS for SaaS ProductsCloudPassage
 
CloudPassage Overview
CloudPassage OverviewCloudPassage Overview
CloudPassage OverviewCloudPassage
 
Halo Installfest Slides
Halo Installfest SlidesHalo Installfest Slides
Halo Installfest SlidesCloudPassage
 
Automating Security for the Cloud - Make it Easy, Make it Safe
Automating Security for the Cloud - Make it Easy, Make it SafeAutomating Security for the Cloud - Make it Easy, Make it Safe
Automating Security for the Cloud - Make it Easy, Make it SafeCloudPassage
 

Mehr von CloudPassage (20)

Best Practices for Workload Security: Securing Servers in Modern Data Center ...
Best Practices for Workload Security: Securing Servers in Modern Data Center ...Best Practices for Workload Security: Securing Servers in Modern Data Center ...
Best Practices for Workload Security: Securing Servers in Modern Data Center ...
 
CloudPassage Careers
CloudPassage CareersCloudPassage Careers
CloudPassage Careers
 
Transforming the CSO Role to Business Enabler
Transforming the CSO Role to Business EnablerTransforming the CSO Role to Business Enabler
Transforming the CSO Role to Business Enabler
 
Rethinking Security: The Cloud Infrastructure Effect
Rethinking Security: The Cloud Infrastructure EffectRethinking Security: The Cloud Infrastructure Effect
Rethinking Security: The Cloud Infrastructure Effect
 
Webinar compiled powerpoint
Webinar compiled powerpointWebinar compiled powerpoint
Webinar compiled powerpoint
 
Security and Compliance for Enterprise Cloud Infrastructure
Security and Compliance for Enterprise Cloud InfrastructureSecurity and Compliance for Enterprise Cloud Infrastructure
Security and Compliance for Enterprise Cloud Infrastructure
 
Technologies You Need to Safely Use the Cloud
Technologies You Need to Safely Use the CloudTechnologies You Need to Safely Use the Cloud
Technologies You Need to Safely Use the Cloud
 
Cloud Security: Make Your CISO Successful
Cloud Security: Make Your CISO SuccessfulCloud Security: Make Your CISO Successful
Cloud Security: Make Your CISO Successful
 
Secure Cloud Development Resources with DevOps
Secure Cloud Development Resources with DevOpsSecure Cloud Development Resources with DevOps
Secure Cloud Development Resources with DevOps
 
45 Minutes to PCI Compliance in the Cloud
45 Minutes to PCI Compliance in the Cloud45 Minutes to PCI Compliance in the Cloud
45 Minutes to PCI Compliance in the Cloud
 
Comprehensive Cloud Security Requires an Automated Approach
Comprehensive Cloud Security Requires an Automated ApproachComprehensive Cloud Security Requires an Automated Approach
Comprehensive Cloud Security Requires an Automated Approach
 
Security that works with, not against, your SaaS business
Security that works with, not against, your SaaS businessSecurity that works with, not against, your SaaS business
Security that works with, not against, your SaaS business
 
Integrating Security into DevOps
Integrating Security into DevOpsIntegrating Security into DevOps
Integrating Security into DevOps
 
What You Need To Know About The New PCI Cloud Guidelines
What You Need To Know About The New PCI Cloud GuidelinesWhat You Need To Know About The New PCI Cloud Guidelines
What You Need To Know About The New PCI Cloud Guidelines
 
What You Haven't Heard (Yet) About Cloud Security
What You Haven't Heard (Yet) About Cloud SecurityWhat You Haven't Heard (Yet) About Cloud Security
What You Haven't Heard (Yet) About Cloud Security
 
Delivering Secure OpenStack IaaS for SaaS Products
Delivering Secure OpenStack IaaS for SaaS ProductsDelivering Secure OpenStack IaaS for SaaS Products
Delivering Secure OpenStack IaaS for SaaS Products
 
CloudPassage Overview
CloudPassage OverviewCloudPassage Overview
CloudPassage Overview
 
PCI and the Cloud
PCI and the CloudPCI and the Cloud
PCI and the Cloud
 
Halo Installfest Slides
Halo Installfest SlidesHalo Installfest Slides
Halo Installfest Slides
 
Automating Security for the Cloud - Make it Easy, Make it Safe
Automating Security for the Cloud - Make it Easy, Make it SafeAutomating Security for the Cloud - Make it Easy, Make it Safe
Automating Security for the Cloud - Make it Easy, Make it Safe
 

Kürzlich hochgeladen

Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024TopCSSGallery
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkPixlogix Infotech
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxfnnc6jmgwh
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Nikki Chapple
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 

Kürzlich hochgeladen (20)

Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App Framework
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 

Peer Stories: How RightScale Achieved PCI on Cloud Infrastructure

  • 1. Peer Stories: How RightScale Achieved PCI Compliance on Cloud Infrastructure Phil Cox Rand Wacker Director, Security & Compliance RightScale VP, Products CloudPassage 1
  • 2. About The Presenters Phil Cox Rand Wacker • RightScale, Director of Security and Compliance • CloudPassage, VP of Products • Multiple PCI SIGs • Cisco Security, IronPort, UC Berkeley Security/Network Ops • 20+ years InfoSec Twitter: @randwacker Twitter: @sec_prof 2
  • 3. Introducing RightScale RightScale pioneered IaaS cloud management • Enables organizations to manage all of their cloud infrastructure • Established in 2006, partners with all major cloud providers • Has launched nearly 6 million servers with the RightScale management platform 3
  • 4. RightScale’s PCI Challenge • Payment processing servers are in scope for PCI DSS • Built and runs on Amazon Web Services (AWS) for the Infrastructure-asa-Service (IaaS) benefits • Required PCI DSS compliance on AWS servers With background as a Qualified Security Assessor, confident PCI DSS compliance could be achieved in an IaaS environment 4
  • 5. PCI Shared Responsibility (IaaS) Data – OS, application, and data – And the compliance of these components App Code App Framework Operating System Virtual Machine – Infrastructure, networking, storage, and virtualization mechanism – And the compliance of these components Hypervisor Compute & Storage Shared Network Physical Facilities 5 Provider Responsibility • Service provider responsibility Customer Responsibility • Customer responsibility
  • 6. One Approach From the CSA 1. Plan PCI DSS controls for as though your IaaS infrastructure is your on-premise network 2. Realize which elements you do not control since it is really not an on-premise network (e.g. physical facilities) 3. Talk with a service provider on whether they can and will cover the elements they control for compliance 4. Realize which controls don’t apply verbatim to the cloud environment and figure out how to compensate 6
  • 7. Options for Achieving PCI DSS Compliance • RightScale used its own proven cloud management platform to deploy the PCI cloud servers in the AWS • Still needed ongoing visibility and intrusion detection capabilities in an IaaS environment. Either: – Build it themselves using traditional security tools – Buy a cloud security and compliance product RightScale chose CloudPassage Halo to speed up efforts 7
  • 8. Why RightScale Picked Halo • Purpose-built for cloud environments, requiring no development resources • Visibility into servers running within an IaaS infrastructure • Real-time monitoring and enforcement • Support for any cloud platform 8
  • 9. Benefits Experienced with Halo • Saved Time and Resources – Saved 6 months of development time with a part-time staff person – Takes 1/5 the management time (2 hours a week with Halo versus ¼ FTE for other tools) 9
  • 10. Benefits Experienced with Halo • Established RightScale as a Trusted Advisor with Customers – Used as part of RightScale’s reference architecture for PCI DSS compliance – Runs on any virtual or cloud platform, protecting various customer environments 10
  • 11. Benefits Experienced with Halo • Helped Enable Sales – Went to market faster – Enabled sales to pitch Halo along with RightScale for compliance 11
  • 12. Best Practices for PCI DSS Compliance in IaaS • Select from PCI Approved Service Provider with the IaaS features you need • Avoid storing the Primary Account Numbers (PANs) • Use purpose-built cloud security products (we recommend CloudPassage Halo) 12
  • 13. Poll: PCI Status • What is the status of your PCI initiative (IaaShosted or otherwise)? – – – – We have passed our audits and are fully operational We have an audit planned within the next year We are investigating what it will take to be PCI compliant No plans to go through PCI audits 13
  • 14. Using CloudPassage Halo for PCI Compliance 14
  • 15. Halo is a security-as-a-service that enables cloud adoption. • Software-as-a-Service delivery • Private cloud / SDDC / IaaS • Elastic application hosting • Big data analytics 15
  • 16. Halo consolidates multiple critical security & compliance controls. Cloud Firewall Automation File Integrity Monitoring Multi-Factor Authentication Server Account Managements Security Event Alerting System & Application Config Security Vulnerability & Patch Scanning REST API Integrations 16
  • 17. Halo architecture is highly scalable, automated, and is rapidly deployed. www-1 mysql-1 bigdata-1 Halo Halo Halo Halo Admin Web Portal Halo REST API gateway 17 Halo Security Analytics Engine
  • 18. Halo works in any environment. 18
  • 19. Example Security & Compliance Automation with Halo 1 Halo activates firewall on boot, applies latest policies, and orchestrates ongoing policy updates. 2 Halo secures privileged access via dynamic firewall rules triggered by multi-factor user authentication. 3 Halo scans O.S. configurations for vulnerabilities and continuously monitors O.S. state and activity. 4 Application configurations are scanned for vulnerabilities and are continuously monitored. 5 Cryptographic integrity monitoring ensures app code and binaries are not compromised. 6 Halo monitors system binary and config files for correct ACLs, file integrity, and vulnerabilities. 7 Application data stores are monitored for access; outbound firewall rules prevent data extrusion. 1 4 Application Engine 5 Application Code 6 7 App Storage Volume System Storage Volume System Administration Services 2 Halo Daemon Operating System Workload VM Instance 3
  • 21. Halo Grid: PCI & SOC2 • Certified Level 1 Service Provider – First entirely cloud-based vendor certified across multiple CSPs – Hosted in Rackspace Cloud & AWS, with full DevOps automation • Multiple customers recently cleared PCI QSA audits • Recently announced: SOC2 certification 21
  • 22. Poll: PCI & IaaS • What percentage of your “in-scope” PCI systems run in a private or public IaaS infrastructure? – 100% of in-scope PCI systems on IaaS – PCI in-scope systems run across mix of IaaS and traditional infrastructures – No in-scope systems on IaaS (all on traditional physical hardware) – N/A, we run no PCI in-scope systems 22
  • 24. Summary • PCI compliance on IaaS is possible • Responsibility shared with cloud provider • Security and management must be designed to work in dynamic, highly automated clouds • CloudPassage Halo designed and built to automate compliance in today’s complex environments 24
  • 25. Q&A and Resources PCI Compliance in the Public IaaS Cloud: How I Did It cloudpassage.com/pci-kit blog.rightscale.com 25
  • 26. Thank You! Phil Cox Rand Wacker • Email: phil@rightscale.com • Email: rand@cloudpassage.com • Twitter: @sec_prof • Twitter: @randwacker www.rightscale.com www.cloudpassage.com 26