SlideShare ist ein Scribd-Unternehmen logo
1 von 13
Downloaden Sie, um offline zu lesen
Cloud Security Strategy
Overview
Wednesday, July 18, 2018
2
The Cloud Is Someone Else’s
Computer
3
Like A Highway is Someone
Else’s Driveway
4
Of Course Datacenters Vary
5
But Trying to Replicate Internal
Processes Misses the Point
6
Controls That Are Useful on One
Have Less Value on the Other
7
Enforcing legacy processes is
counter productive
Multiplying resources (or people)
doesn’t help it makes things worse
If the control is needed it
MUST be automated
8
Effective Cloud Controls
• The point is the cloud is always changing
– Cloud Control Strategy Must deal with that
– Cloud Controls MUST be continually developed
• Must be Automated
• Must be Specific to the Use
• Must be Integrated
• Should be Dynamically Configurable
• Should be simple, granular, fractal
9
Cloud Security Journey Map
Inherent Encryption – Ante Nothing without this
Data Tagging (Micro-services)
Safe Data Anywhere
Federation
Passwords Optional, FinTech Integrations, secure
SaaS/ASP Connections, B2B convenience, First step for
Cloud IaaS services
Any Customer
Any Data
Any Cloud
Micro Segmentation
Automated Cloud
Infrastructure, Contain the Bad
Non-Persistence
No more patching !!!
Hacks Decay
Secure Scaling
Transient Secrets
Faster Developer
Integrations
Integration possible to:
Machine Learning
NLP Capabilities
Agents/Assistants
External API Dev
10
Important Cloud Security Concepts
1. Inherent Encryption – TLS based encryption is used for all in transit
communications. All data at rest is encrypted at a minimum by the
environment.
2. Transient Secrets – Keys and secrets used to provide access and
sometimes to encrypt data are vaulted and frequently changed
3. Federation – All access between cloud environments are authenticated
and able to be tied back to the requestor and the mechanism to do so is
cryptographically enforced
4. Micro-segmentation – By default environments built in the cloud do not
have access to each other. Specific access patterns using Federation
usually to oauth protected API’s is used. Other access such as network
access must be specifically configured and is usually unnecessary.
5. Non Persistence (Elastic) – Operating System based entities in the cloud
should not exist perpetually. Ideally they only exist for a few hours before
being rebuilt from scratch.
6. Data Tagging (Micro Services) – Most cloud environments tag every
piece of data created, changed and stored with information keys that can
be used to identify owners, transactions and access permissions
11
Micro-Segmentation/Containerization
Identity Services
Key Vault
Remote
Storage
oauth/oidc
protected
API’s
Internal Directories
Internal
Db’s and
Services
Micro-Segmented Container
12
Governance in the Cloud becomes the Development Effort
• Create Patterns that are Secure for their specific use case
• Develop Code to Implement these Patterns
• Implement and automate these patterns
• Approve a Pipline not an application
• Developers to use these patterns freely
• If the developers are in an “Approved” Pipeline their oversight requirements are minimal
• Work With the Developers to Expand the use cases automated in the pipeline and to create
new patterns
• If a Pipeline isn’t or cannot use these patterns then Legacy control reviews MUST still be
used for that pipeline
13
Appendix

Weitere ähnliche Inhalte

Ähnlich wie Cloud Security Strategy Socialization v1.0 Clean.pptx.pdf

Cloud expo 10 myths rex wang oracle ss
Cloud expo 10 myths rex wang oracle ssCloud expo 10 myths rex wang oracle ss
Cloud expo 10 myths rex wang oracle ss
Rex Wang
 
MasterClass Series: Unlocking Data Sharing Velocity with Data Virtualization
MasterClass Series: Unlocking Data Sharing Velocity with Data VirtualizationMasterClass Series: Unlocking Data Sharing Velocity with Data Virtualization
MasterClass Series: Unlocking Data Sharing Velocity with Data Virtualization
Denodo
 
Unit 9 Technological trends in Information Technology By Sulav Acharya
Unit 9 Technological trends in Information Technology By Sulav AcharyaUnit 9 Technological trends in Information Technology By Sulav Acharya
Unit 9 Technological trends in Information Technology By Sulav Acharya
AchSulav
 
Unit 9 Technological trends in Information Technology By Sulav Acharya
Unit 9 Technological trends in Information Technology By Sulav AcharyaUnit 9 Technological trends in Information Technology By Sulav Acharya
Unit 9 Technological trends in Information Technology By Sulav Acharya
AchSulav
 
Becomming a cloud governance ninja linthicum interop fall 2013
Becomming a cloud governance ninja linthicum interop fall 2013Becomming a cloud governance ninja linthicum interop fall 2013
Becomming a cloud governance ninja linthicum interop fall 2013
David Linthicum
 
Migrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Migrating Critical Applications To The Cloud - ISACA Seattle - SanitizedMigrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Migrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Norm Barber
 

Ähnlich wie Cloud Security Strategy Socialization v1.0 Clean.pptx.pdf (20)

Cloud expo 10 myths rex wang oracle ss
Cloud expo 10 myths rex wang oracle ssCloud expo 10 myths rex wang oracle ss
Cloud expo 10 myths rex wang oracle ss
 
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
 
the_role_of_resilience_data_in_ensuring_cloud_security.pptx
the_role_of_resilience_data_in_ensuring_cloud_security.pptxthe_role_of_resilience_data_in_ensuring_cloud_security.pptx
the_role_of_resilience_data_in_ensuring_cloud_security.pptx
 
Get ready for_an_autonomous_data_driven_future_ext
Get ready for_an_autonomous_data_driven_future_extGet ready for_an_autonomous_data_driven_future_ext
Get ready for_an_autonomous_data_driven_future_ext
 
MasterClass Series: Unlocking Data Sharing Velocity with Data Virtualization
MasterClass Series: Unlocking Data Sharing Velocity with Data VirtualizationMasterClass Series: Unlocking Data Sharing Velocity with Data Virtualization
MasterClass Series: Unlocking Data Sharing Velocity with Data Virtualization
 
Alex Hanway - Securing the Breach: Using a Holistic Data Protection Framework
Alex Hanway - Securing the Breach: Using a Holistic Data Protection FrameworkAlex Hanway - Securing the Breach: Using a Holistic Data Protection Framework
Alex Hanway - Securing the Breach: Using a Holistic Data Protection Framework
 
Unit 9 Technological trends in Information Technology By Sulav Acharya
Unit 9 Technological trends in Information Technology By Sulav AcharyaUnit 9 Technological trends in Information Technology By Sulav Acharya
Unit 9 Technological trends in Information Technology By Sulav Acharya
 
Unit 9 Technological trends in Information Technology By Sulav Acharya
Unit 9 Technological trends in Information Technology By Sulav AcharyaUnit 9 Technological trends in Information Technology By Sulav Acharya
Unit 9 Technological trends in Information Technology By Sulav Acharya
 
Multi Cloud Architecture Approach
Multi Cloud Architecture ApproachMulti Cloud Architecture Approach
Multi Cloud Architecture Approach
 
VMworld 2013: Separating Cloud Hype from Reality in Healthcare – a Real-Life ...
VMworld 2013: Separating Cloud Hype from Reality in Healthcare – a Real-Life ...VMworld 2013: Separating Cloud Hype from Reality in Healthcare – a Real-Life ...
VMworld 2013: Separating Cloud Hype from Reality in Healthcare – a Real-Life ...
 
Becomming a cloud governance ninja linthicum interop fall 2013
Becomming a cloud governance ninja linthicum interop fall 2013Becomming a cloud governance ninja linthicum interop fall 2013
Becomming a cloud governance ninja linthicum interop fall 2013
 
Migrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Migrating Critical Applications To The Cloud - ISACA Seattle - SanitizedMigrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Migrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
 
Migrating Critical Applications to the Cloud - isaca seattle - sanitized
Migrating Critical Applications to the Cloud - isaca seattle - sanitizedMigrating Critical Applications to the Cloud - isaca seattle - sanitized
Migrating Critical Applications to the Cloud - isaca seattle - sanitized
 
How to Migrate to Cloud with Complete Confidence and Trust
How to Migrate to Cloud with Complete Confidence and TrustHow to Migrate to Cloud with Complete Confidence and Trust
How to Migrate to Cloud with Complete Confidence and Trust
 
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
 
A proposed Solution: Data Availability and Error Correction in Cloud Computing
A proposed Solution: Data Availability and Error Correction in Cloud ComputingA proposed Solution: Data Availability and Error Correction in Cloud Computing
A proposed Solution: Data Availability and Error Correction in Cloud Computing
 
SECURING THE CLOUD DATA LAKES
SECURING THE CLOUD DATA LAKESSECURING THE CLOUD DATA LAKES
SECURING THE CLOUD DATA LAKES
 
Bringing Enterprise to the Blockchain - Moving from Science Experiment to Pra...
Bringing Enterprise to the Blockchain - Moving from Science Experiment to Pra...Bringing Enterprise to the Blockchain - Moving from Science Experiment to Pra...
Bringing Enterprise to the Blockchain - Moving from Science Experiment to Pra...
 
Software Defined Networking in the ATMOSPHERE project
Software Defined Networking in the ATMOSPHERE projectSoftware Defined Networking in the ATMOSPHERE project
Software Defined Networking in the ATMOSPHERE project
 
How to Overcome Network Access Control Limitations for Better Network Security
How to Overcome Network Access Control Limitations for Better Network SecurityHow to Overcome Network Access Control Limitations for Better Network Security
How to Overcome Network Access Control Limitations for Better Network Security
 

Kürzlich hochgeladen

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 

Kürzlich hochgeladen (20)

CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdf
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 

Cloud Security Strategy Socialization v1.0 Clean.pptx.pdf

  • 2. 2 The Cloud Is Someone Else’s Computer
  • 3. 3 Like A Highway is Someone Else’s Driveway
  • 5. 5 But Trying to Replicate Internal Processes Misses the Point
  • 6. 6 Controls That Are Useful on One Have Less Value on the Other
  • 7. 7 Enforcing legacy processes is counter productive Multiplying resources (or people) doesn’t help it makes things worse If the control is needed it MUST be automated
  • 8. 8 Effective Cloud Controls • The point is the cloud is always changing – Cloud Control Strategy Must deal with that – Cloud Controls MUST be continually developed • Must be Automated • Must be Specific to the Use • Must be Integrated • Should be Dynamically Configurable • Should be simple, granular, fractal
  • 9. 9 Cloud Security Journey Map Inherent Encryption – Ante Nothing without this Data Tagging (Micro-services) Safe Data Anywhere Federation Passwords Optional, FinTech Integrations, secure SaaS/ASP Connections, B2B convenience, First step for Cloud IaaS services Any Customer Any Data Any Cloud Micro Segmentation Automated Cloud Infrastructure, Contain the Bad Non-Persistence No more patching !!! Hacks Decay Secure Scaling Transient Secrets Faster Developer Integrations Integration possible to: Machine Learning NLP Capabilities Agents/Assistants External API Dev
  • 10. 10 Important Cloud Security Concepts 1. Inherent Encryption – TLS based encryption is used for all in transit communications. All data at rest is encrypted at a minimum by the environment. 2. Transient Secrets – Keys and secrets used to provide access and sometimes to encrypt data are vaulted and frequently changed 3. Federation – All access between cloud environments are authenticated and able to be tied back to the requestor and the mechanism to do so is cryptographically enforced 4. Micro-segmentation – By default environments built in the cloud do not have access to each other. Specific access patterns using Federation usually to oauth protected API’s is used. Other access such as network access must be specifically configured and is usually unnecessary. 5. Non Persistence (Elastic) – Operating System based entities in the cloud should not exist perpetually. Ideally they only exist for a few hours before being rebuilt from scratch. 6. Data Tagging (Micro Services) – Most cloud environments tag every piece of data created, changed and stored with information keys that can be used to identify owners, transactions and access permissions
  • 12. 12 Governance in the Cloud becomes the Development Effort • Create Patterns that are Secure for their specific use case • Develop Code to Implement these Patterns • Implement and automate these patterns • Approve a Pipline not an application • Developers to use these patterns freely • If the developers are in an “Approved” Pipeline their oversight requirements are minimal • Work With the Developers to Expand the use cases automated in the pipeline and to create new patterns • If a Pipeline isn’t or cannot use these patterns then Legacy control reviews MUST still be used for that pipeline