SlideShare ist ein Scribd-Unternehmen logo
1 von 6
Downloaden Sie, um offline zu lesen
STORIES
The benefits of a security-
first approach to cloud
Make
cloud
secure by
design
Copyright © 2022 Accenture. All rights reserved
Secure
by design
Call for change
As we have seen in the last 18 months, cloud
opens the door to organizational agility on an
unprecedented scale. But security is essential to take
advantage of cloud’s potential. Accenture, with our
size, scale and complexity, has experienced first-
hand the power of cloud security.
Six years ago, Accenture initiated the move into the
cloud. While our recent research has identified that
security and compliance risk is seen as one of top
two pain points of cloud adoption, we were clear
from the outset that cloud security would be a critical
component to supporting our business needs.
Moving from on-premise infrastructure where we had
complete control, to collaborating in the cloud with
vendors and needing to rely on their technology and
environment was a big shift. Infrastructure and new
service capabilities in the cloud are different; we couldn’t
simply replicate what we had on-premise directly into the
cloud.
We needed to reimagine the approach to
implementing our security model to harness
the capabilities of cloud native solutions. We
evolved core security guiding principles to meet
the requirements of operating in the cloud. We
redefined our security rules to flex around the
updated cloud-based infrastructure. Today, when we
look at our security approach we think beyond just
infrastructure to an application, data and code level
as well.
From the initial migration, we are now running 95%
of our applications in the cloud. Our strategy was to
be secure from the start, reframing our security in
terms of cloud capabilities, which has helped us to
see how our cloud solutions can support every
element of security needed within the business.
Copyright © 2022 Accenture. All rights reserved
Principles
in practice
When tech meets human ingenuity
Copyright © 2022 Accenture. All rights reserved
Early on in our cloud continuum journey, we
recognized the need to evolve our security
practices to accommodate our core security
values for the cloud. We wanted to be powered by
code, securing our application and infrastructure
code from the start. We infused analytics that
were behavior-driven, using automated artificial
intelligence (AI) behavioral analytics to identify
anomalies faster and with more accuracy when
working across our cloud platforms. It was
important to us to be cloud agnostic, fit for a
multi-cloud environment, so that the security
framework and principles apply to any cloud
vendor with auditability.
What’s more we embedded robust defense,
relying on multiple layers of security at varying
depths: cloud, network, access, data and
endpoints. We centered our strategy on a zero
trust approach, protecting every aspect of the
cloud security journey by treating everything as
untrusted. With the focus on zero trust, we
followed an identity-centric approach, basing all
access on identity where every request is
explicitly verified.
Copyright © 2022 Accenture. All rights reserved
Cloud security is not
a one-size-fits-all; it’s
multi-faceted. By taking
a comprehensive
view across access,
applications, services
and data we’ve created
a truly holistic cloud
security approach.
PENELOPE PRETT
Chief Information Officer, Accenture
When tech meets human ingenuity
Five core functions contributed to a successful cloud security journey:
We shared responsibilities. As we increased our
software as-a-service (SaaS) and platform as-a-
service (PaaS) consumption in the cloud, we
focused on and trusted in a shared responsibility
model with our cloud vendors. Our partnerships with
Microsoft, Amazon and Google cloud services took
advantage of their experience in the market, their
wide security certifications, and the fact that they
value security as much as we do.
We sought out cloud-based solutions. Cloud
providers are investing heavily in their innovation
offerings and security. By using cloud native and
cloud-based policies, controls, processes and
technologies we were able to tap into an inherent
agility and scale when it came to supporting our
own cloud security.
We enabled compliance. Partnering with our
providers, our cloud security strategy anchors to
industry-recognized standards and continuously
adapts to enterprise business needs. We adhere to
industry defined policies, using alerts, following the
zero trust principle and managing security through
code to maintain compliance.
We increased visibility. We took a multi-layered
approach, enhancing security through cloud vendors’
technology and advanced threat detection solutions.
We gained visibility not only for our own actionable
management, but also external auditability.
We baked in trust. We believe identity is the new
firewall. Our identity-centric approach means we have
adopted a zero trust strategy in which we embed
proper and continuous identity validation. Trust is now
fundamentally going to be driven by identity and role.
Copyright © 2022 Accenture. All rights reserved
Evolving
holistic security
A valuable difference
We have taken a comprehensive view across the
various components of operating in the cloud to
create a truly holistic cloud security strategy. As
we implement this transformational approach to
security across a multi-cloud infrastructure, we
can continue to enforce highly effective security
policies, resources and services.
Here are some of our lessons learned around effective
cloud security:
• Design in terms of the cloud: A cloud continuum
journey requires a very different operating model to
any on-premise solution. Reimagine your security
principles, to unlock the power of security in the cloud
and transform your business.
• Make the cultural shift: Bridge the cultural gap to cloud
native services from the top down. Education and
training can help to change mindsets so that people
understand the benefits of cloud and why your
security posture is important.
• Promote partnership: It’s important to build trusted
relationships with your providers and to look at the
ownership of security as shared. Also, keep in mind
that the investments in security made by the major
cloud providers are far in excess of what’s feasible for
most IT organizations—offering an advantage to those
who collaborate more effectively.
Going forward, to secure and manage access controls
across a multi-cloud environment, we have our sights
set on cross-platform alignment so that all identities align
across all platforms and vendors. Using data as the
key driver, our cloud security will continue to be
comprehensive as our cloud capabilities grow
across platforms.
And we want to discover new solutions and augment our
security with AI for threat detection and machine learning
to remediate our code to prevent potential vulnerabilities.
This combined with our Prevent, Protect, Detect,
and Recover strategy can strengthen our zero
trust imperative.
There's some exciting
things on the horizon. As
our AI and machine
learning capabilities
grow, we’ll be able to
detect anomalies in
behavior and make rapid
decisions to act on
security threats in the
cloud. Having a more
highly automated
response is a powerful
proposition and could
reinvent cloud security
as we know it.
DON GALZARANO
Managing Director—Global IT,
Enterprise Technology, Intelligent
Cloud & Networks, Accenture
Copyright © 2022 Accenture. All rights reserved
Copyright © 2022 Accenture.
All rights reserved.
Accenture and its logo
are trademarks of Accenture.
About Accenture
Accenture is a global professional services company with leading
capabilities in digital, cloud and security. Combining unmatched
experience and specialized skills across more than 40 industries,
we offer Strategy and Consulting, Interactive, Technology and
Operations services — all powered by the world’s largest network of
Advanced Technology and Intelligent Operations centers. Our
699,000 people deliver on the promise of technology and human
ingenuity every day, serving clients in more than 120 countries. We
embrace the power of change to create value and shared success
for our clients, people, shareholders, partners and communities.
Visit us at www.accenture.com.
Contact
Merim Becirovic
Managing Director
Global IT
Enterprise Technology
Don Galzarano
Managing Director
Global IT
Enterprise Technology, Intelligent
Cloud & Networks
/merim-becirovic
/don-galzarano

Weitere ähnliche Inhalte

Was ist angesagt?

The Reinvention Reset | Accenture
The Reinvention Reset | AccentureThe Reinvention Reset | Accenture
The Reinvention Reset | Accentureaccenture
 
Empowering Digital Workers
Empowering Digital WorkersEmpowering Digital Workers
Empowering Digital Workersaccenture
 
Nonprofit reinvention in a time of unprecedented change
 Nonprofit reinvention in a time of unprecedented change Nonprofit reinvention in a time of unprecedented change
Nonprofit reinvention in a time of unprecedented changeaccenture
 
Engineering Services: con gli ingegneri per creare valore sostenibile
Engineering Services: con gli ingegneri per creare valore sostenibileEngineering Services: con gli ingegneri per creare valore sostenibile
Engineering Services: con gli ingegneri per creare valore sostenibileaccenture
 
Unleashing Competitiveness on the Cloud Continuum | Accenture
Unleashing Competitiveness on the Cloud Continuum | AccentureUnleashing Competitiveness on the Cloud Continuum | Accenture
Unleashing Competitiveness on the Cloud Continuum | Accentureaccenture
 
Accenture Intelligent Enterprise Services Survey
Accenture Intelligent Enterprise Services SurveyAccenture Intelligent Enterprise Services Survey
Accenture Intelligent Enterprise Services Surveyaccenture
 
Get the most from your cloud journey
Get the most from your cloud journeyGet the most from your cloud journey
Get the most from your cloud journeyaccenture
 
Semiconductor Gender Parity Study
Semiconductor Gender Parity StudySemiconductor Gender Parity Study
Semiconductor Gender Parity Studyaccenture
 
CSPs' Critical Role in the Race to Net Zero Emissions
CSPs' Critical Role in the Race to Net Zero EmissionsCSPs' Critical Role in the Race to Net Zero Emissions
CSPs' Critical Role in the Race to Net Zero Emissionsaccenture
 
New Value in Sustainability
New Value in SustainabilityNew Value in Sustainability
New Value in Sustainabilityaccenture
 
Rethinking Accenture's network
Rethinking Accenture's networkRethinking Accenture's network
Rethinking Accenture's networkaccenture
 
Pathways to Profitability for the Communications Industry
Pathways to Profitability for the Communications IndustryPathways to Profitability for the Communications Industry
Pathways to Profitability for the Communications Industryaccenture
 
Accenture Communications Industry Narrative Trend Shifts Signals
Accenture Communications Industry Narrative Trend Shifts SignalsAccenture Communications Industry Narrative Trend Shifts Signals
Accenture Communications Industry Narrative Trend Shifts Signalsaccenture
 
The Industrialist: Trends & Innovations - July 2022
The Industrialist: Trends & Innovations - July 2022The Industrialist: Trends & Innovations - July 2022
The Industrialist: Trends & Innovations - July 2022accenture
 
It's learning. Just not as we know it.
It's learning. Just not as we know it.It's learning. Just not as we know it.
It's learning. Just not as we know it.accenture
 
Digitaizing Business Services
Digitaizing Business ServicesDigitaizing Business Services
Digitaizing Business Servicesaccenture
 
Metaverse opportunities for the communications industry
 Metaverse opportunities for the communications industry Metaverse opportunities for the communications industry
Metaverse opportunities for the communications industryaccenture
 
Internal Operations Automation Journey | Accenture
Internal Operations Automation Journey | AccentureInternal Operations Automation Journey | Accenture
Internal Operations Automation Journey | Accentureaccenture
 
The Rise of Forerunners | Accenture
The Rise of Forerunners | AccentureThe Rise of Forerunners | Accenture
The Rise of Forerunners | Accentureaccenture
 
New ways to apply infrastructure data for better business outcomes
New ways to apply infrastructure data for better business outcomesNew ways to apply infrastructure data for better business outcomes
New ways to apply infrastructure data for better business outcomesaccenture
 

Was ist angesagt? (20)

The Reinvention Reset | Accenture
The Reinvention Reset | AccentureThe Reinvention Reset | Accenture
The Reinvention Reset | Accenture
 
Empowering Digital Workers
Empowering Digital WorkersEmpowering Digital Workers
Empowering Digital Workers
 
Nonprofit reinvention in a time of unprecedented change
 Nonprofit reinvention in a time of unprecedented change Nonprofit reinvention in a time of unprecedented change
Nonprofit reinvention in a time of unprecedented change
 
Engineering Services: con gli ingegneri per creare valore sostenibile
Engineering Services: con gli ingegneri per creare valore sostenibileEngineering Services: con gli ingegneri per creare valore sostenibile
Engineering Services: con gli ingegneri per creare valore sostenibile
 
Unleashing Competitiveness on the Cloud Continuum | Accenture
Unleashing Competitiveness on the Cloud Continuum | AccentureUnleashing Competitiveness on the Cloud Continuum | Accenture
Unleashing Competitiveness on the Cloud Continuum | Accenture
 
Accenture Intelligent Enterprise Services Survey
Accenture Intelligent Enterprise Services SurveyAccenture Intelligent Enterprise Services Survey
Accenture Intelligent Enterprise Services Survey
 
Get the most from your cloud journey
Get the most from your cloud journeyGet the most from your cloud journey
Get the most from your cloud journey
 
Semiconductor Gender Parity Study
Semiconductor Gender Parity StudySemiconductor Gender Parity Study
Semiconductor Gender Parity Study
 
CSPs' Critical Role in the Race to Net Zero Emissions
CSPs' Critical Role in the Race to Net Zero EmissionsCSPs' Critical Role in the Race to Net Zero Emissions
CSPs' Critical Role in the Race to Net Zero Emissions
 
New Value in Sustainability
New Value in SustainabilityNew Value in Sustainability
New Value in Sustainability
 
Rethinking Accenture's network
Rethinking Accenture's networkRethinking Accenture's network
Rethinking Accenture's network
 
Pathways to Profitability for the Communications Industry
Pathways to Profitability for the Communications IndustryPathways to Profitability for the Communications Industry
Pathways to Profitability for the Communications Industry
 
Accenture Communications Industry Narrative Trend Shifts Signals
Accenture Communications Industry Narrative Trend Shifts SignalsAccenture Communications Industry Narrative Trend Shifts Signals
Accenture Communications Industry Narrative Trend Shifts Signals
 
The Industrialist: Trends & Innovations - July 2022
The Industrialist: Trends & Innovations - July 2022The Industrialist: Trends & Innovations - July 2022
The Industrialist: Trends & Innovations - July 2022
 
It's learning. Just not as we know it.
It's learning. Just not as we know it.It's learning. Just not as we know it.
It's learning. Just not as we know it.
 
Digitaizing Business Services
Digitaizing Business ServicesDigitaizing Business Services
Digitaizing Business Services
 
Metaverse opportunities for the communications industry
 Metaverse opportunities for the communications industry Metaverse opportunities for the communications industry
Metaverse opportunities for the communications industry
 
Internal Operations Automation Journey | Accenture
Internal Operations Automation Journey | AccentureInternal Operations Automation Journey | Accenture
Internal Operations Automation Journey | Accenture
 
The Rise of Forerunners | Accenture
The Rise of Forerunners | AccentureThe Rise of Forerunners | Accenture
The Rise of Forerunners | Accenture
 
New ways to apply infrastructure data for better business outcomes
New ways to apply infrastructure data for better business outcomesNew ways to apply infrastructure data for better business outcomes
New ways to apply infrastructure data for better business outcomes
 

Ähnlich wie Benefits of a security-first cloud approach

CipherCloud_Corporate Overview
CipherCloud_Corporate OverviewCipherCloud_Corporate Overview
CipherCloud_Corporate OverviewScott Dierks
 
EveryCloud_Company_Intro_Piece
EveryCloud_Company_Intro_PieceEveryCloud_Company_Intro_Piece
EveryCloud_Company_Intro_PieceKeith Purves
 
EveryCloud_Company_Intro_Piece
EveryCloud_Company_Intro_PieceEveryCloud_Company_Intro_Piece
EveryCloud_Company_Intro_PiecePaul Richards
 
What is the significance of cybersecurity in cloud.pptx
What is the significance of cybersecurity in cloud.pptxWhat is the significance of cybersecurity in cloud.pptx
What is the significance of cybersecurity in cloud.pptxInfosectrain3
 
What is the significance of cybersecurity in cloud.pptx
What is the significance of cybersecurity in cloud.pptxWhat is the significance of cybersecurity in cloud.pptx
What is the significance of cybersecurity in cloud.pptxinfosec train
 
Security: Enabling the Journey to the Cloud
Security: Enabling the Journey to the CloudSecurity: Enabling the Journey to the Cloud
Security: Enabling the Journey to the CloudCapgemini
 
Technology Advisory Services in Gurgaon
Technology Advisory Services in GurgaonTechnology Advisory Services in Gurgaon
Technology Advisory Services in GurgaonCloudFenceTechnologi
 
Navigating the Cloud A Comprehensive Guide to Cloud Migration Strategies.pptx
Navigating the Cloud A Comprehensive Guide to Cloud Migration Strategies.pptxNavigating the Cloud A Comprehensive Guide to Cloud Migration Strategies.pptx
Navigating the Cloud A Comprehensive Guide to Cloud Migration Strategies.pptxkathyzink87
 
Top Trends in Cloud Computing for 2023.pptx
Top Trends in Cloud Computing for 2023.pptxTop Trends in Cloud Computing for 2023.pptx
Top Trends in Cloud Computing for 2023.pptxSaadZaman23
 
2014 2nd me cloud conference trust in the cloud v01
2014 2nd me cloud conference trust in the cloud v012014 2nd me cloud conference trust in the cloud v01
2014 2nd me cloud conference trust in the cloud v01promediakw
 
Risk and Cyber Services in Gurgaon
Risk and Cyber Services in GurgaonRisk and Cyber Services in Gurgaon
Risk and Cyber Services in GurgaonCloudFenceTechnologi
 
Google Workspace Partner/Reseller in Gurgaon
Google Workspace Partner/Reseller in GurgaonGoogle Workspace Partner/Reseller in Gurgaon
Google Workspace Partner/Reseller in GurgaonCloudFenceTechnologi
 

Ähnlich wie Benefits of a security-first cloud approach (20)

CipherCloud_Corporate Overview
CipherCloud_Corporate OverviewCipherCloud_Corporate Overview
CipherCloud_Corporate Overview
 
EveryCloud_Company_Intro_Piece
EveryCloud_Company_Intro_PieceEveryCloud_Company_Intro_Piece
EveryCloud_Company_Intro_Piece
 
EveryCloud_Company_Intro_Piece
EveryCloud_Company_Intro_PieceEveryCloud_Company_Intro_Piece
EveryCloud_Company_Intro_Piece
 
Hire Cloud Architect.pdf
Hire Cloud Architect.pdfHire Cloud Architect.pdf
Hire Cloud Architect.pdf
 
What is the significance of cybersecurity in cloud.pptx
What is the significance of cybersecurity in cloud.pptxWhat is the significance of cybersecurity in cloud.pptx
What is the significance of cybersecurity in cloud.pptx
 
What is the significance of cybersecurity in cloud.pptx
What is the significance of cybersecurity in cloud.pptxWhat is the significance of cybersecurity in cloud.pptx
What is the significance of cybersecurity in cloud.pptx
 
Security: Enabling the Journey to the Cloud
Security: Enabling the Journey to the CloudSecurity: Enabling the Journey to the Cloud
Security: Enabling the Journey to the Cloud
 
Google Workspace Services
Google Workspace ServicesGoogle Workspace Services
Google Workspace Services
 
Azure Partners
Azure PartnersAzure Partners
Azure Partners
 
GCP Partner
GCP PartnerGCP Partner
GCP Partner
 
Microsoft Partner
Microsoft PartnerMicrosoft Partner
Microsoft Partner
 
Technology Advisory Services in Gurgaon
Technology Advisory Services in GurgaonTechnology Advisory Services in Gurgaon
Technology Advisory Services in Gurgaon
 
Google Workspace Partner
Google Workspace PartnerGoogle Workspace Partner
Google Workspace Partner
 
Navigating the Cloud A Comprehensive Guide to Cloud Migration Strategies.pptx
Navigating the Cloud A Comprehensive Guide to Cloud Migration Strategies.pptxNavigating the Cloud A Comprehensive Guide to Cloud Migration Strategies.pptx
Navigating the Cloud A Comprehensive Guide to Cloud Migration Strategies.pptx
 
Top Trends in Cloud Computing for 2023.pptx
Top Trends in Cloud Computing for 2023.pptxTop Trends in Cloud Computing for 2023.pptx
Top Trends in Cloud Computing for 2023.pptx
 
CloudWALL Profile ENG
CloudWALL Profile ENGCloudWALL Profile ENG
CloudWALL Profile ENG
 
2014 2nd me cloud conference trust in the cloud v01
2014 2nd me cloud conference trust in the cloud v012014 2nd me cloud conference trust in the cloud v01
2014 2nd me cloud conference trust in the cloud v01
 
Risk and Cyber Services in Gurgaon
Risk and Cyber Services in GurgaonRisk and Cyber Services in Gurgaon
Risk and Cyber Services in Gurgaon
 
Google Workspace Partner/Reseller in Gurgaon
Google Workspace Partner/Reseller in GurgaonGoogle Workspace Partner/Reseller in Gurgaon
Google Workspace Partner/Reseller in Gurgaon
 
Office 365 Services in Gurgaon
Office 365 Services in GurgaonOffice 365 Services in Gurgaon
Office 365 Services in Gurgaon
 

Mehr von accenture

The Industrialist: Trends & Innovations - January 2024
The Industrialist: Trends & Innovations - January 2024The Industrialist: Trends & Innovations - January 2024
The Industrialist: Trends & Innovations - January 2024accenture
 
The Industrialist: Trends & Innovations - September 2023
The Industrialist: Trends & Innovations - September 2023The Industrialist: Trends & Innovations - September 2023
The Industrialist: Trends & Innovations - September 2023accenture
 
Accenture Technology Vision - How the trends apply to higher education
Accenture Technology Vision - How the trends apply to higher education Accenture Technology Vision - How the trends apply to higher education
Accenture Technology Vision - How the trends apply to higher education accenture
 
The Industrialist: Trends & Innovations - July 2023
The Industrialist: Trends & Innovations - July 2023The Industrialist: Trends & Innovations - July 2023
The Industrialist: Trends & Innovations - July 2023accenture
 
Accenture Technology Vision - How the trends apply to higher education
Accenture Technology Vision - How the trends apply to higher education Accenture Technology Vision - How the trends apply to higher education
Accenture Technology Vision - How the trends apply to higher education accenture
 
Digital Euro: Implications for the Financial System
Digital Euro: Implications for the Financial SystemDigital Euro: Implications for the Financial System
Digital Euro: Implications for the Financial Systemaccenture
 
More deals, less money: the Black founder funding journey
More deals, less money: the Black founder funding journeyMore deals, less money: the Black founder funding journey
More deals, less money: the Black founder funding journeyaccenture
 
The Industrialist: Trends & Innovations - June 2023
The Industrialist: Trends & Innovations - June 2023The Industrialist: Trends & Innovations - June 2023
The Industrialist: Trends & Innovations - June 2023accenture
 
The Industrialist: Trends & Innovations - March 2023
The Industrialist: Trends & Innovations - March 2023The Industrialist: Trends & Innovations - March 2023
The Industrialist: Trends & Innovations - March 2023accenture
 
Free to be 100% me
Free to be 100% meFree to be 100% me
Free to be 100% meaccenture
 
The Industrialist: Trends & Innovations - February 2023
The Industrialist: Trends & Innovations - February 2023The Industrialist: Trends & Innovations - February 2023
The Industrialist: Trends & Innovations - February 2023accenture
 
Mundo gamer e a oportunidade de entrada pela abordagem do movimento
Mundo gamer e a oportunidade de entrada pela abordagem do movimentoMundo gamer e a oportunidade de entrada pela abordagem do movimento
Mundo gamer e a oportunidade de entrada pela abordagem do movimentoaccenture
 
The Industrialist: Trends & Innovations - January 2023
The Industrialist: Trends & Innovations - January 2023The Industrialist: Trends & Innovations - January 2023
The Industrialist: Trends & Innovations - January 2023accenture
 
Reimagining the Agenda | Accenture
Reimagining the Agenda | AccentureReimagining the Agenda | Accenture
Reimagining the Agenda | Accentureaccenture
 
Climate Leadership Eleventh Hour | Accenture
Climate Leadership Eleventh Hour | AccentureClimate Leadership Eleventh Hour | Accenture
Climate Leadership Eleventh Hour | Accentureaccenture
 
Sustainable Value Chain
Sustainable Value ChainSustainable Value Chain
Sustainable Value Chainaccenture
 
Chemical Companies in the Metaverse
Chemical Companies in the MetaverseChemical Companies in the Metaverse
Chemical Companies in the Metaverseaccenture
 
Sustainable Value Chain
Sustainable Value ChainSustainable Value Chain
Sustainable Value Chainaccenture
 
Value Untangled Slideshare
Value Untangled SlideshareValue Untangled Slideshare
Value Untangled Slideshareaccenture
 
The Industrialist: Trends & Innovations - November 2022
The Industrialist: Trends & Innovations - November 2022The Industrialist: Trends & Innovations - November 2022
The Industrialist: Trends & Innovations - November 2022accenture
 

Mehr von accenture (20)

The Industrialist: Trends & Innovations - January 2024
The Industrialist: Trends & Innovations - January 2024The Industrialist: Trends & Innovations - January 2024
The Industrialist: Trends & Innovations - January 2024
 
The Industrialist: Trends & Innovations - September 2023
The Industrialist: Trends & Innovations - September 2023The Industrialist: Trends & Innovations - September 2023
The Industrialist: Trends & Innovations - September 2023
 
Accenture Technology Vision - How the trends apply to higher education
Accenture Technology Vision - How the trends apply to higher education Accenture Technology Vision - How the trends apply to higher education
Accenture Technology Vision - How the trends apply to higher education
 
The Industrialist: Trends & Innovations - July 2023
The Industrialist: Trends & Innovations - July 2023The Industrialist: Trends & Innovations - July 2023
The Industrialist: Trends & Innovations - July 2023
 
Accenture Technology Vision - How the trends apply to higher education
Accenture Technology Vision - How the trends apply to higher education Accenture Technology Vision - How the trends apply to higher education
Accenture Technology Vision - How the trends apply to higher education
 
Digital Euro: Implications for the Financial System
Digital Euro: Implications for the Financial SystemDigital Euro: Implications for the Financial System
Digital Euro: Implications for the Financial System
 
More deals, less money: the Black founder funding journey
More deals, less money: the Black founder funding journeyMore deals, less money: the Black founder funding journey
More deals, less money: the Black founder funding journey
 
The Industrialist: Trends & Innovations - June 2023
The Industrialist: Trends & Innovations - June 2023The Industrialist: Trends & Innovations - June 2023
The Industrialist: Trends & Innovations - June 2023
 
The Industrialist: Trends & Innovations - March 2023
The Industrialist: Trends & Innovations - March 2023The Industrialist: Trends & Innovations - March 2023
The Industrialist: Trends & Innovations - March 2023
 
Free to be 100% me
Free to be 100% meFree to be 100% me
Free to be 100% me
 
The Industrialist: Trends & Innovations - February 2023
The Industrialist: Trends & Innovations - February 2023The Industrialist: Trends & Innovations - February 2023
The Industrialist: Trends & Innovations - February 2023
 
Mundo gamer e a oportunidade de entrada pela abordagem do movimento
Mundo gamer e a oportunidade de entrada pela abordagem do movimentoMundo gamer e a oportunidade de entrada pela abordagem do movimento
Mundo gamer e a oportunidade de entrada pela abordagem do movimento
 
The Industrialist: Trends & Innovations - January 2023
The Industrialist: Trends & Innovations - January 2023The Industrialist: Trends & Innovations - January 2023
The Industrialist: Trends & Innovations - January 2023
 
Reimagining the Agenda | Accenture
Reimagining the Agenda | AccentureReimagining the Agenda | Accenture
Reimagining the Agenda | Accenture
 
Climate Leadership Eleventh Hour | Accenture
Climate Leadership Eleventh Hour | AccentureClimate Leadership Eleventh Hour | Accenture
Climate Leadership Eleventh Hour | Accenture
 
Sustainable Value Chain
Sustainable Value ChainSustainable Value Chain
Sustainable Value Chain
 
Chemical Companies in the Metaverse
Chemical Companies in the MetaverseChemical Companies in the Metaverse
Chemical Companies in the Metaverse
 
Sustainable Value Chain
Sustainable Value ChainSustainable Value Chain
Sustainable Value Chain
 
Value Untangled Slideshare
Value Untangled SlideshareValue Untangled Slideshare
Value Untangled Slideshare
 
The Industrialist: Trends & Innovations - November 2022
The Industrialist: Trends & Innovations - November 2022The Industrialist: Trends & Innovations - November 2022
The Industrialist: Trends & Innovations - November 2022
 

Kürzlich hochgeladen

Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 

Kürzlich hochgeladen (20)

Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 

Benefits of a security-first cloud approach

  • 1. STORIES The benefits of a security- first approach to cloud Make cloud secure by design
  • 2. Copyright © 2022 Accenture. All rights reserved Secure by design Call for change As we have seen in the last 18 months, cloud opens the door to organizational agility on an unprecedented scale. But security is essential to take advantage of cloud’s potential. Accenture, with our size, scale and complexity, has experienced first- hand the power of cloud security. Six years ago, Accenture initiated the move into the cloud. While our recent research has identified that security and compliance risk is seen as one of top two pain points of cloud adoption, we were clear from the outset that cloud security would be a critical component to supporting our business needs. Moving from on-premise infrastructure where we had complete control, to collaborating in the cloud with vendors and needing to rely on their technology and environment was a big shift. Infrastructure and new service capabilities in the cloud are different; we couldn’t simply replicate what we had on-premise directly into the cloud. We needed to reimagine the approach to implementing our security model to harness the capabilities of cloud native solutions. We evolved core security guiding principles to meet the requirements of operating in the cloud. We redefined our security rules to flex around the updated cloud-based infrastructure. Today, when we look at our security approach we think beyond just infrastructure to an application, data and code level as well. From the initial migration, we are now running 95% of our applications in the cloud. Our strategy was to be secure from the start, reframing our security in terms of cloud capabilities, which has helped us to see how our cloud solutions can support every element of security needed within the business.
  • 3. Copyright © 2022 Accenture. All rights reserved Principles in practice When tech meets human ingenuity Copyright © 2022 Accenture. All rights reserved Early on in our cloud continuum journey, we recognized the need to evolve our security practices to accommodate our core security values for the cloud. We wanted to be powered by code, securing our application and infrastructure code from the start. We infused analytics that were behavior-driven, using automated artificial intelligence (AI) behavioral analytics to identify anomalies faster and with more accuracy when working across our cloud platforms. It was important to us to be cloud agnostic, fit for a multi-cloud environment, so that the security framework and principles apply to any cloud vendor with auditability. What’s more we embedded robust defense, relying on multiple layers of security at varying depths: cloud, network, access, data and endpoints. We centered our strategy on a zero trust approach, protecting every aspect of the cloud security journey by treating everything as untrusted. With the focus on zero trust, we followed an identity-centric approach, basing all access on identity where every request is explicitly verified.
  • 4. Copyright © 2022 Accenture. All rights reserved Cloud security is not a one-size-fits-all; it’s multi-faceted. By taking a comprehensive view across access, applications, services and data we’ve created a truly holistic cloud security approach. PENELOPE PRETT Chief Information Officer, Accenture When tech meets human ingenuity Five core functions contributed to a successful cloud security journey: We shared responsibilities. As we increased our software as-a-service (SaaS) and platform as-a- service (PaaS) consumption in the cloud, we focused on and trusted in a shared responsibility model with our cloud vendors. Our partnerships with Microsoft, Amazon and Google cloud services took advantage of their experience in the market, their wide security certifications, and the fact that they value security as much as we do. We sought out cloud-based solutions. Cloud providers are investing heavily in their innovation offerings and security. By using cloud native and cloud-based policies, controls, processes and technologies we were able to tap into an inherent agility and scale when it came to supporting our own cloud security. We enabled compliance. Partnering with our providers, our cloud security strategy anchors to industry-recognized standards and continuously adapts to enterprise business needs. We adhere to industry defined policies, using alerts, following the zero trust principle and managing security through code to maintain compliance. We increased visibility. We took a multi-layered approach, enhancing security through cloud vendors’ technology and advanced threat detection solutions. We gained visibility not only for our own actionable management, but also external auditability. We baked in trust. We believe identity is the new firewall. Our identity-centric approach means we have adopted a zero trust strategy in which we embed proper and continuous identity validation. Trust is now fundamentally going to be driven by identity and role.
  • 5. Copyright © 2022 Accenture. All rights reserved Evolving holistic security A valuable difference We have taken a comprehensive view across the various components of operating in the cloud to create a truly holistic cloud security strategy. As we implement this transformational approach to security across a multi-cloud infrastructure, we can continue to enforce highly effective security policies, resources and services. Here are some of our lessons learned around effective cloud security: • Design in terms of the cloud: A cloud continuum journey requires a very different operating model to any on-premise solution. Reimagine your security principles, to unlock the power of security in the cloud and transform your business. • Make the cultural shift: Bridge the cultural gap to cloud native services from the top down. Education and training can help to change mindsets so that people understand the benefits of cloud and why your security posture is important. • Promote partnership: It’s important to build trusted relationships with your providers and to look at the ownership of security as shared. Also, keep in mind that the investments in security made by the major cloud providers are far in excess of what’s feasible for most IT organizations—offering an advantage to those who collaborate more effectively. Going forward, to secure and manage access controls across a multi-cloud environment, we have our sights set on cross-platform alignment so that all identities align across all platforms and vendors. Using data as the key driver, our cloud security will continue to be comprehensive as our cloud capabilities grow across platforms. And we want to discover new solutions and augment our security with AI for threat detection and machine learning to remediate our code to prevent potential vulnerabilities. This combined with our Prevent, Protect, Detect, and Recover strategy can strengthen our zero trust imperative. There's some exciting things on the horizon. As our AI and machine learning capabilities grow, we’ll be able to detect anomalies in behavior and make rapid decisions to act on security threats in the cloud. Having a more highly automated response is a powerful proposition and could reinvent cloud security as we know it. DON GALZARANO Managing Director—Global IT, Enterprise Technology, Intelligent Cloud & Networks, Accenture
  • 6. Copyright © 2022 Accenture. All rights reserved Copyright © 2022 Accenture. All rights reserved. Accenture and its logo are trademarks of Accenture. About Accenture Accenture is a global professional services company with leading capabilities in digital, cloud and security. Combining unmatched experience and specialized skills across more than 40 industries, we offer Strategy and Consulting, Interactive, Technology and Operations services — all powered by the world’s largest network of Advanced Technology and Intelligent Operations centers. Our 699,000 people deliver on the promise of technology and human ingenuity every day, serving clients in more than 120 countries. We embrace the power of change to create value and shared success for our clients, people, shareholders, partners and communities. Visit us at www.accenture.com. Contact Merim Becirovic Managing Director Global IT Enterprise Technology Don Galzarano Managing Director Global IT Enterprise Technology, Intelligent Cloud & Networks /merim-becirovic /don-galzarano