SlideShare ist ein Scribd-Unternehmen logo
1 von 19
Downloaden Sie, um offline zu lesen
www.hitachiconsulting.com




      A Cloud Framework for Integrated
      Security, Governance, Compliance,
      Content and Service Management

Gartner Symposium ITXPO, October 25, 2011                                                                Chad M. Lawler, Ph.D.
http://www.gartner.com/technology/symposium/orlando/                                                     Director of Consulting Services, Cloud Computing
                                                                                                         chad.lawler@hitachiconsulting.com
                                                           © 2012 Hitachi Consulting Corporation
                                                       Proprietary & Confidential, All Rights Reserved   www.hitachiconsulting.com/cloud
                                                                                                                                © Copyright 2012 Hitachi Consulting
Topics for Today’s Session


 Review Cloud Security Risks

 Cloud Framework Overview

 Focus on Security

 Summary & Q&A



                                © Copyright 2012 Hitachi Consulting
Integrated Cloud Framework - Security, Governance, Compliance,
Content ,Application & Service Management

  Our framework provides businesses with a streamlined capability to rapidly, and securely
   transition application and services to the cloud.
  Our cloud framework helps organizations plan for appropriate cloud application deployment

  Includes the necessary services for deploying well-managed applications in the cloud.

  This framework provides for integrated governance policies

  Provides a well-managed cloud environment that is compliant with internal policies and
   external requirements

  With security services to protect from both vulnerabilities and intrusions

  Services that protect against loss or compromise of sensitive data.

  The framework provides for integrated content management and has automated capabilities
   for appropriate cloud platform selection, content migration and application importing.

                                                                                 © Copyright 2012 Hitachi Consulting   2
What are the top 3 greatest risks of moving to a cloud?


  The right answer depends on the type of business and what is most
  critical
   Businesses must evaluate applications
   Determine appropriate use in the cloud


  Consider the Pillars of IT security (CIA):

  Confidentiality

  Integrity

  Availability


                                                              © Copyright 2012 Hitachi Consulting
What are the top 3 greatest risks of moving to a cloud?


  Confidentiality
   Preventing   sensitive information from being disclosed to unauthorized
    recipients
   Limiting information access and disclosure to authorized users


  Risk - Private Data Exposure
   Riskof potential data or private information leakage
   Can threaten your customer data
   As well as your business services on operations




                                                               © Copyright 2012 Hitachi Consulting
What are the top 3 greatest risks of moving to a cloud?


  Integrity
   Trustworthiness of information resources
   Modifying information resources only in a specified and authorized
    manner
   Ensuring data remains consistent and changes to data are authorized
    by appropriate personnel

  Risk - Data Tampering
   Risk of potential manipulation or altering of critical data
   Can lead to making business decisions based on invalid information


                                                             © Copyright 2012 Hitachi Consulting
What are the top 3 greatest risks of moving to a cloud?


  Availability
   Ensures  systems operate as required
   And authorized users are not denied service
   Allowing systems to be available whenever needed


  Risk - Business Continuity
   Risk of potential interruption to or compromise of your service
    operations
   Service outage, security attack or compromise that may lead to data
    loss
   Operations are interrupted or your data is compromised

                                                             © Copyright 2012 Hitachi Consulting
Cloud Security Risks

        Misuse of cloud computing
                                        Account / service hijacking
        resources



                                        Remote facilities / Security
        Secure Interfaces and APIs
                                        Perimeter


        Risks associated with           Securing personal identification
        multi-tenancy                   information (PII)



        Risk of data loss and leakage   IP Collateral management



                                                              © Copyright 2012 Hitachi Consulting
How to mitigate the risks of moving to the cloud?

   To reduce your risks…
     Risk must first be understood and calculated
     Understand residual risk that you can influence


   Develop a standardized cloud risk decision process
     Help decide which applications are most appropriate
     Leverage cloud application assessment process to define requirements


   Understand and quantify your risk
     Implement a policy that calculates and quantifies cloud application risk
     Includes criteria for:
         Application Risk Tolerance
         Application Security Fit
         Data Protection & SLA Requirements
         Business to Business Policies
         Confidentiality Risk - Private Data Exposure
         Integrity Risk - Data Tampering
         Availability Risk - Business Continuity

                                                                                 © Copyright 2012 Hitachi Consulting
Integrated Cloud Framework - Security, Governance,
 Compliance & Content & Application Management

 Helps Organizations Leverage the Cloud in a Secure Fashion
     Understand cloud application security risk and key areas of consideration
     Evaluates and helps define application and data security requirements
     Enables appropriate planning for cloud security, content and governance
     Serves as a comprehensive guide to reduce cloud adoption risks

 Integrated Cloud Framework: A Roadmap to the Cloud
     Security
       to protect against vulnerabilities, intrusions & compromise of sensitive data
     Governance & Compliance
       for an environment compliant with policies and requirements
     Content Management
       for control of cloud information
     Application Development & Migration
       development, transition and re-platform of enterprise applications


 Provides streamlined capability to rapidly & securely transition to the cloud


                                                                                        © Copyright 2012 Hitachi Consulting   9
Integrated Cloud Framework - Security, Governance, Compliance,
Content ,Application & Service Management
                               Cloud Framework for Integrated Security, Governance, Compliance, Content & Service Management
Consulting Services                                    Program Governance Framework                                                                     Content Management, Security, Governance Dashboard Portal
    Strategic Cloud Advisory               Governance Policy                    Cloud Governance, Certification & Compliance                                                                                  Workflow-Checklist, Certification & Approval
            Services                                                                                                                                Central Cloud Platform Management Console
                                              Enforcement                                          Policy                                                                                                                     Interface
 Cloud Readiness Assessment              Master Security Policy &
            Services                                                            Security              Privacy             Hosting                       Continuous Audit Program Interface                   Site Compliance Reporting Dashboard Interface
                                               Exceptions
  Infrastructure, Transition &                                                                                                                        Vulnerability Scanning, Monitoring, & PII
                                       Risk Impact         Monitoring                                                                                                                                          Metering, Billing & Charge-Back Interface
       Migration Services                Criteria           Criteria
                                                                                  Cloud                 App                 Risk                                 Reporting Interface
 Cloud Security & Governance           Data Class           Hosting
            Services                                                              Legal                Audit            Excellence                  Secure Cloud Environment Incident Reporting                  Role & Access Administration Interface
                                        Criteria            Criteria
         Cloud Starter Kit               Privacy           Marketing
                                                                                Corporate              RACI                 FIT                   Site Requirements, Content Publication Priority &
                                         Criteria           Criteria                                                                                                                                                   Performance SLA Interface




                                                                                                                                                                                                                                                                   ITIL Service Management
                                                                                                                                                              Cloud Template Interface
                                         Security Standards - NIST,                   Client Standards & Best Practices -                                                                                        Governance Policy, Portal & Training
                                                                                                                                                           Feedback Collection Interface
                                       PCI,CSA,TwC, HIPAA,GLBA,Vendor              Procurement, Security, Marketing/CMG, Privacy                                                                                      Documentation Interface



                                                                        Cloud Security, Content & Application Services
Application Services                                                     Security Services                                                                                     Content Management Services
                                     Single Sign On (SSO) Identity Management             Vulnerability Scanning, Monitoring, & PII                         Service Desk Integration
     Cloud Assessment                                                                                                                                                                                                  Content Data Classification
                                                  & Authentication                                    Detection Engine                               (Communication, Collaboration, Reporting)
                                                                                           SIEM with Root Cause Analysis & Risk                                                                               Content Compatibility & Compliance Decision
 Cloud Architecture & Design           PKI & Certificate Management System                                                                                Change Management Integration
                                                                                                         Assessment                                                                                                             Engine
      Cloud Application                                                                                                                            Site Requirements, Publication Priority & Cloud
                                         Patch & Log Management System                     Continuous Auditing Program Engine                                                                                    Content Conversion & Standardization
        Development                                                                                                                                            Template Launch Engine
                                      IPS/IDS Event Management & Data Loss                   Secure Cloud to Cloud & Cloud to
 Cloud Application Delivery                                                                                                                                     Feedback Collection                               Compliant Content Migration Process
                                                Prevention Systems                             Datacenter VPN Connectivity

   Managed Cloud Service                 AntiVirus & AntiMalware System                Secure Cloud Platform Content Migration                                Performance SLA Engine                            Non-Compliant Content Migration Process
                                                                                          Deep Code-Level Security Vulnerability
                                      Workflow-Checklist & Approval Engine                                                                              Cloud Platform Selection Automation                   Virtualized Application Automated Migration
                                                                                                        Review



                                                                              Cloud Platform & Hosting Environment
                                                                                                                    System OS                Patch                    AntiVirus                 Data Loss           Single Sign On
                                      Cloud Applications
                                                                                                                   Management              Management                AntiMalware               Prevention           (SSO) Identity            Metering, Billing
                                                                                                                     Backup &                 Log                                            IPS/IDS Event          Management,               & Charge Back
    OS                  Web Server        Database               Middleware            Content                                                                       Secure VPN
                                                                                                                      Restore              Management                                        Management             Authentication

                                                                                                                Cloud Platform & Infrastructure




                                                                                                                                                                                                                             © Copyright 2012 Hitachi Consulting               10
Cloud Framework – Platform & Hosting Environment


                     Cloud Platform & Hosting Environment
                                      Cloud Applications

      OS            Web Server                 Database             Middleware            Content
 System OS       Patch            AntiVirus           Data Loss        Single Sign On
 Management    Management        AntiMalware          Prevention       (SSO) Identity    Metering, Billing &
  Backup &                                          IPS/IDS Event       Management,        Charge Back
              Log Management      Secure VPN
   Restore                                           Management        Authentication

                               Cloud Platform & Infrastructure




                                                                                        © Copyright 2012 Hitachi Consulting
Cloud Framework – Content Management Services


                             Content Management Services
           Service Desk Integration
                                                            Content Data Classification
    (Communication, Collaboration, Reporting)

                                                    Content Compatibility & Compliance Decision
         Change Management Integration
                                                                      Engine

  Site Requirements, Publication Priority & Cloud
                                                       Content Conversion & Standardization
             Template Launch Engine


               Feedback Collection                     Compliant Content Migration Process


             Performance SLA Engine                  Non-Compliant Content Migration Process


       Cloud Platform Selection Automation          Virtualized Application Automated Migration




                                                                                    © Copyright 2012 Hitachi Consulting
Cloud Framework - Security Services



                                          Security Services
   Single Sign On (SSO) Identity Management &        Vulnerability Scanning, Monitoring, & PII Detection
                 Authentication                                           Engine

       PKI & Certificate Management System          SIEM with Root Cause Analysis & Risk Assessment


         Patch & Log Management System                     Continuous Auditing Program Engine

 IPS/IDS Event Management & Data Loss Prevention     Secure Cloud to Cloud & Cloud to Datacenter VPN
                    Systems                                            Connectivity

                                                     Data Encryption & Secure Cloud Platform Content
         AntiVirus & AntiMalware System
                                                                        Migration

      Workflow-Checklist & Approval Engine            Deep Code-Level Security Vulnerability Review



                                                                                          © Copyright 2012 Hitachi Consulting
Cloud Framework – Program Governance Framework

                           Program Governance Framework

   Governance Policy Enforcement        Cloud Governance, Certification & Compliance Policy


  Master Security Policy & Exceptions    Security             Privacy            Hosting

    Risk Impact         Monitoring
                                           Cloud               App                  Risk
      Criteria           Criteria

    Data Class
                     Hosting Criteria      Legal              Audit            Excellence
     Criteria

  Privacy Criteria    Other Criteria     Corporate             RACI                   IT


      Security Standards - NIST,               Client Standards & Best Practices -
  PCI,CSA,TwC, HIPAA,GLBA,Vendor           Procurement, Security, Organization, Privacy




                                                                                 © Copyright 2012 Hitachi Consulting
Cloud Framework – Content Mgmt, Security, Governance Dashboard Portal




                   Content Management, Security, Governance Dashboard Portal
                                                            Workflow-Checklist, Certification & Approval
    Central Cloud Platform Management Console
                                                                            Interface

         Continuous Audit Program Interface                Site Compliance Reporting Dashboard Interface

   Vulnerability Scanning, Monitoring, & PII Reporting
                                                              Metering, Billing & Charge-Back Interface
                        Interface

   Secure Cloud Environment Incident Reporting                 Role & Access Administration Interface

 Site Requirements, Content Publication Priority & Cloud
                                                                     Performance SLA Interface
                  Template Interface
                                                                Governance Policy, Portal & Training
            Feedback Collection Interface
                                                                     Documentation Interface




                                                                                              © Copyright 2012 Hitachi Consulting
Summary & Reccomendations


  Understand that security in the cloud must be managed

  Implement a policy that calculates and quantifies cloud application risk

  Evaluate application and data security requirements

  Plan and budget for implementing security services

  Leverage a framework which covers all the key areas

  Implement and adhere to the framework as a roadmap guide to reduce
   cloud adoption risks

                                                                © Copyright 2012 Hitachi Consulting
Contact us to Learn More about our Cloud Solutions Today


                  Chad M. Lawler, Ph.D.
                  Director of Consulting Services
                  Cloud Computing

                   14643 Dallas Parkway, Suite 800, Dallas, Texas 75254
                   Office: 469.221.2894
                   Email: chad.lawler@hitachiconsulting.com
                   www.hitachiconsulting.com


                              www.cardcloud.com/chadlawler


       Sign up for a free trial to explore our Cloud Ecosystem Management Platform.
          Learn More About the Benefits of Hitachi Consulting Cloud Services at
                         www.hitachiconsulting.com/cloud


                                                                            © Copyright 2012 Hitachi Consulting
© Copyright 2012 Hitachi Consulting

Weitere ähnliche Inhalte

Was ist angesagt?

Cloud migration strategies
Cloud migration strategiesCloud migration strategies
Cloud migration strategies
SogetiLabs
 
Introduction to the Well-Architected Framework and Tool - SVC212 - Chicago AW...
Introduction to the Well-Architected Framework and Tool - SVC212 - Chicago AW...Introduction to the Well-Architected Framework and Tool - SVC212 - Chicago AW...
Introduction to the Well-Architected Framework and Tool - SVC212 - Chicago AW...
Amazon Web Services
 
AWS Cloud Center Excellence Quick Start Prescriptive Guidance
AWS Cloud Center Excellence Quick Start Prescriptive GuidanceAWS Cloud Center Excellence Quick Start Prescriptive Guidance
AWS Cloud Center Excellence Quick Start Prescriptive Guidance
Tom Laszewski
 
HigherEducation-Cloud Operating Model and Approach Forward.pdf
HigherEducation-Cloud Operating Model and Approach Forward.pdfHigherEducation-Cloud Operating Model and Approach Forward.pdf
HigherEducation-Cloud Operating Model and Approach Forward.pdf
Amazon Web Services
 

Was ist angesagt? (20)

An Overview of Best Practices for Large Scale Migrations - AWS Transformation...
An Overview of Best Practices for Large Scale Migrations - AWS Transformation...An Overview of Best Practices for Large Scale Migrations - AWS Transformation...
An Overview of Best Practices for Large Scale Migrations - AWS Transformation...
 
Cloud Migration Workshop
Cloud Migration WorkshopCloud Migration Workshop
Cloud Migration Workshop
 
Azure Cloud Governance
Azure Cloud GovernanceAzure Cloud Governance
Azure Cloud Governance
 
Cloud migration strategies
Cloud migration strategiesCloud migration strategies
Cloud migration strategies
 
Introduction to the Well-Architected Framework and Tool - SVC212 - Chicago AW...
Introduction to the Well-Architected Framework and Tool - SVC212 - Chicago AW...Introduction to the Well-Architected Framework and Tool - SVC212 - Chicago AW...
Introduction to the Well-Architected Framework and Tool - SVC212 - Chicago AW...
 
Cloud Migration Cookbook: A Guide To Moving Your Apps To The Cloud
Cloud Migration Cookbook: A Guide To Moving Your Apps To The CloudCloud Migration Cookbook: A Guide To Moving Your Apps To The Cloud
Cloud Migration Cookbook: A Guide To Moving Your Apps To The Cloud
 
Considerations for your Cloud Journey
Considerations for your Cloud JourneyConsiderations for your Cloud Journey
Considerations for your Cloud Journey
 
Azure Arc Overview from Microsoft
Azure Arc Overview from MicrosoftAzure Arc Overview from Microsoft
Azure Arc Overview from Microsoft
 
Azure governance v4.0
Azure governance v4.0Azure governance v4.0
Azure governance v4.0
 
A Roadmap to Cloud Center of Excellence Adoption
A Roadmap to Cloud Center of Excellence AdoptionA Roadmap to Cloud Center of Excellence Adoption
A Roadmap to Cloud Center of Excellence Adoption
 
AWS Cloud Center Excellence Quick Start Prescriptive Guidance
AWS Cloud Center Excellence Quick Start Prescriptive GuidanceAWS Cloud Center Excellence Quick Start Prescriptive Guidance
AWS Cloud Center Excellence Quick Start Prescriptive Guidance
 
Microsoft Azure Security Overview
Microsoft Azure Security OverviewMicrosoft Azure Security Overview
Microsoft Azure Security Overview
 
Azure Cloud Adoption Framework + Governance - Sana Khan and Jay Kumar
Azure Cloud Adoption Framework + Governance - Sana Khan and Jay Kumar Azure Cloud Adoption Framework + Governance - Sana Khan and Jay Kumar
Azure Cloud Adoption Framework + Governance - Sana Khan and Jay Kumar
 
An Introduction to the AWS Well Architected Framework - Webinar
An Introduction to the AWS Well Architected Framework - WebinarAn Introduction to the AWS Well Architected Framework - Webinar
An Introduction to the AWS Well Architected Framework - Webinar
 
HigherEducation-Cloud Operating Model and Approach Forward.pdf
HigherEducation-Cloud Operating Model and Approach Forward.pdfHigherEducation-Cloud Operating Model and Approach Forward.pdf
HigherEducation-Cloud Operating Model and Approach Forward.pdf
 
Cloud Migration Strategy Framework
Cloud Migration Strategy FrameworkCloud Migration Strategy Framework
Cloud Migration Strategy Framework
 
Cloud Adoption Framework - Overview_partner.pptx
Cloud Adoption Framework - Overview_partner.pptxCloud Adoption Framework - Overview_partner.pptx
Cloud Adoption Framework - Overview_partner.pptx
 
Creating an Operating Model to enable a high frequency organization
Creating an Operating Model to enable a high frequency organizationCreating an Operating Model to enable a high frequency organization
Creating an Operating Model to enable a high frequency organization
 
Cloud Migration, Application Modernization, and Security
Cloud Migration, Application Modernization, and Security Cloud Migration, Application Modernization, and Security
Cloud Migration, Application Modernization, and Security
 
Cloud Security Fundamentals Webinar
Cloud Security Fundamentals WebinarCloud Security Fundamentals Webinar
Cloud Security Fundamentals Webinar
 

Andere mochten auch

Why Enterprise Architecture Must drive Cloud Strategy and Planning
Why Enterprise Architecture Must drive Cloud Strategy and PlanningWhy Enterprise Architecture Must drive Cloud Strategy and Planning
Why Enterprise Architecture Must drive Cloud Strategy and Planning
Rateb Abu Hawieleh
 
CCAF Criminal Justice Web Progress Report
CCAF Criminal Justice Web Progress ReportCCAF Criminal Justice Web Progress Report
CCAF Criminal Justice Web Progress Report
Mark Cain
 
Jazoon'12 Enterprise-wide Cloud Governance
Jazoon'12 Enterprise-wide Cloud GovernanceJazoon'12 Enterprise-wide Cloud Governance
Jazoon'12 Enterprise-wide Cloud Governance
Netcetera
 
Cloud Security for U.S. Military Agencies
Cloud Security for U.S. Military AgenciesCloud Security for U.S. Military Agencies
Cloud Security for U.S. Military Agencies
NJVC, LLC
 
Cloud Services Brokerage Demystified
Cloud Services Brokerage DemystifiedCloud Services Brokerage Demystified
Cloud Services Brokerage Demystified
Zach Gardner
 

Andere mochten auch (20)

Security & Compliance in the Cloud - Proactively Managing Governance, Risk & ...
Security & Compliance in the Cloud - Proactively Managing Governance, Risk & ...Security & Compliance in the Cloud - Proactively Managing Governance, Risk & ...
Security & Compliance in the Cloud - Proactively Managing Governance, Risk & ...
 
Operational Best Practices in the Cloud
Operational Best Practices in the CloudOperational Best Practices in the Cloud
Operational Best Practices in the Cloud
 
Why Enterprise Architecture Must drive Cloud Strategy and Planning
Why Enterprise Architecture Must drive Cloud Strategy and PlanningWhy Enterprise Architecture Must drive Cloud Strategy and Planning
Why Enterprise Architecture Must drive Cloud Strategy and Planning
 
Enterprise Cloud Operating Model Design
Enterprise Cloud Operating Model DesignEnterprise Cloud Operating Model Design
Enterprise Cloud Operating Model Design
 
CCAF Criminal Justice Web Progress Report
CCAF Criminal Justice Web Progress ReportCCAF Criminal Justice Web Progress Report
CCAF Criminal Justice Web Progress Report
 
A Framework for Cloud Computing Adoption in South African Government
A Framework for Cloud Computing Adoption in South African GovernmentA Framework for Cloud Computing Adoption in South African Government
A Framework for Cloud Computing Adoption in South African Government
 
Jazoon'12 Enterprise-wide Cloud Governance
Jazoon'12 Enterprise-wide Cloud GovernanceJazoon'12 Enterprise-wide Cloud Governance
Jazoon'12 Enterprise-wide Cloud Governance
 
Cloud Security for U.S. Military Agencies
Cloud Security for U.S. Military AgenciesCloud Security for U.S. Military Agencies
Cloud Security for U.S. Military Agencies
 
CCSK, cloud security framework, Indonesia
CCSK, cloud security framework, IndonesiaCCSK, cloud security framework, Indonesia
CCSK, cloud security framework, Indonesia
 
Cloud Governance Framework - Required Cloud Sourcing Capabilities
Cloud Governance Framework - Required Cloud Sourcing CapabilitiesCloud Governance Framework - Required Cloud Sourcing Capabilities
Cloud Governance Framework - Required Cloud Sourcing Capabilities
 
Governing in the Cloud
Governing in the CloudGoverning in the Cloud
Governing in the Cloud
 
Security & Governance for the Cloud: a Savvis Case Study (Presented at Cloud ...
Security & Governance for the Cloud: a Savvis Case Study (Presented at Cloud ...Security & Governance for the Cloud: a Savvis Case Study (Presented at Cloud ...
Security & Governance for the Cloud: a Savvis Case Study (Presented at Cloud ...
 
Cloud is not an option, but is security?
Cloud is not an option, but is security?Cloud is not an option, but is security?
Cloud is not an option, but is security?
 
Security Governance Isp Eng
Security Governance Isp EngSecurity Governance Isp Eng
Security Governance Isp Eng
 
The Executive View on Cloud Service Brokers – Cloud Computing Association Con...
The Executive View on Cloud Service Brokers – Cloud Computing Association Con...The Executive View on Cloud Service Brokers – Cloud Computing Association Con...
The Executive View on Cloud Service Brokers – Cloud Computing Association Con...
 
cloudSME The European hpc cloud platform for simulation
cloudSME The European hpc cloud platform for simulationcloudSME The European hpc cloud platform for simulation
cloudSME The European hpc cloud platform for simulation
 
Cloud Services Brokerage Demystified
Cloud Services Brokerage DemystifiedCloud Services Brokerage Demystified
Cloud Services Brokerage Demystified
 
Podoactiva
PodoactivaPodoactiva
Podoactiva
 
Enhancing Hong Kong's Competitiveness Through Data Center and Cloud Computing...
Enhancing Hong Kong's Competitiveness Through Data Center and Cloud Computing...Enhancing Hong Kong's Competitiveness Through Data Center and Cloud Computing...
Enhancing Hong Kong's Competitiveness Through Data Center and Cloud Computing...
 
Operations Delivery Business Value
Operations Delivery Business ValueOperations Delivery Business Value
Operations Delivery Business Value
 

Ähnlich wie Integrated Cloud Framework: Security, Governance, Compliance, Content Application, and Service Management - Gartner Symposium ITXPO 2011

Enterprise Security in Cloud
Enterprise Security in CloudEnterprise Security in Cloud
Enterprise Security in Cloud
Lenin Aboagye
 
Csa about-threats-june-2010-ibm
Csa about-threats-june-2010-ibmCsa about-threats-june-2010-ibm
Csa about-threats-june-2010-ibm
Sergio Loureiro
 
AWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNet
AWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNetAWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNet
AWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNet
Amazon Web Services
 
security and compliance in the cloud
security and compliance in the cloudsecurity and compliance in the cloud
security and compliance in the cloud
Ajay Rathi
 
The Cloud according to VMware
The Cloud according to VMwareThe Cloud according to VMware
The Cloud according to VMware
OpSource
 

Ähnlich wie Integrated Cloud Framework: Security, Governance, Compliance, Content Application, and Service Management - Gartner Symposium ITXPO 2011 (20)

Cloud security and security architecture
Cloud security and security architectureCloud security and security architecture
Cloud security and security architecture
 
Enterprise Security in Cloud
Enterprise Security in CloudEnterprise Security in Cloud
Enterprise Security in Cloud
 
Enterprise Security in Hybrid Cloud ISACA-SV 2012
Enterprise Security in Hybrid Cloud ISACA-SV 2012Enterprise Security in Hybrid Cloud ISACA-SV 2012
Enterprise Security in Hybrid Cloud ISACA-SV 2012
 
null Bangalore meet - Cloud Computing and Security
null Bangalore meet - Cloud Computing and Securitynull Bangalore meet - Cloud Computing and Security
null Bangalore meet - Cloud Computing and Security
 
2012-01 How to Secure a Cloud Identity Roadmap
2012-01 How to Secure a Cloud Identity Roadmap2012-01 How to Secure a Cloud Identity Roadmap
2012-01 How to Secure a Cloud Identity Roadmap
 
Presd1 10
Presd1 10Presd1 10
Presd1 10
 
Csa about-threats-june-2010-ibm
Csa about-threats-june-2010-ibmCsa about-threats-june-2010-ibm
Csa about-threats-june-2010-ibm
 
AWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNet
AWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNetAWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNet
AWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNet
 
The Perfect Storm
The Perfect StormThe Perfect Storm
The Perfect Storm
 
Enterprise Strategy for Cloud Security
Enterprise Strategy for Cloud SecurityEnterprise Strategy for Cloud Security
Enterprise Strategy for Cloud Security
 
Top Trends in Cloud Computing for 2023.pptx
Top Trends in Cloud Computing for 2023.pptxTop Trends in Cloud Computing for 2023.pptx
Top Trends in Cloud Computing for 2023.pptx
 
security and compliance in the cloud
security and compliance in the cloudsecurity and compliance in the cloud
security and compliance in the cloud
 
Cloud Clinique Enterprise IT Certification Program - Module Matrix
Cloud Clinique   Enterprise IT Certification Program - Module MatrixCloud Clinique   Enterprise IT Certification Program - Module Matrix
Cloud Clinique Enterprise IT Certification Program - Module Matrix
 
The Cloud according to VMware
The Cloud according to VMwareThe Cloud according to VMware
The Cloud according to VMware
 
Windstream Webinar: The Latest Trends in Virtualization: Is the cloud right f...
Windstream Webinar: The Latest Trends in Virtualization: Is the cloud right f...Windstream Webinar: The Latest Trends in Virtualization: Is the cloud right f...
Windstream Webinar: The Latest Trends in Virtualization: Is the cloud right f...
 
Cloud Computing Enables Consumer-Centered Healthcare
Cloud Computing Enables Consumer-Centered HealthcareCloud Computing Enables Consumer-Centered Healthcare
Cloud Computing Enables Consumer-Centered Healthcare
 
Risk Factory: PCI Compliance in the Cloud
Risk Factory: PCI Compliance in the CloudRisk Factory: PCI Compliance in the Cloud
Risk Factory: PCI Compliance in the Cloud
 
Enterprise Security Architecture: From access to audit
Enterprise Security Architecture: From access to auditEnterprise Security Architecture: From access to audit
Enterprise Security Architecture: From access to audit
 
Security in Cloud Computing
Security in Cloud ComputingSecurity in Cloud Computing
Security in Cloud Computing
 
Cloud Application Rationalization- The Cloud, the Enterprise, and Making the ...
Cloud Application Rationalization- The Cloud, the Enterprise, and Making the ...Cloud Application Rationalization- The Cloud, the Enterprise, and Making the ...
Cloud Application Rationalization- The Cloud, the Enterprise, and Making the ...
 

Kürzlich hochgeladen

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Kürzlich hochgeladen (20)

2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 

Integrated Cloud Framework: Security, Governance, Compliance, Content Application, and Service Management - Gartner Symposium ITXPO 2011

  • 1. www.hitachiconsulting.com A Cloud Framework for Integrated Security, Governance, Compliance, Content and Service Management Gartner Symposium ITXPO, October 25, 2011 Chad M. Lawler, Ph.D. http://www.gartner.com/technology/symposium/orlando/ Director of Consulting Services, Cloud Computing chad.lawler@hitachiconsulting.com © 2012 Hitachi Consulting Corporation Proprietary & Confidential, All Rights Reserved www.hitachiconsulting.com/cloud © Copyright 2012 Hitachi Consulting
  • 2. Topics for Today’s Session Review Cloud Security Risks Cloud Framework Overview Focus on Security Summary & Q&A © Copyright 2012 Hitachi Consulting
  • 3. Integrated Cloud Framework - Security, Governance, Compliance, Content ,Application & Service Management  Our framework provides businesses with a streamlined capability to rapidly, and securely transition application and services to the cloud.  Our cloud framework helps organizations plan for appropriate cloud application deployment  Includes the necessary services for deploying well-managed applications in the cloud.  This framework provides for integrated governance policies  Provides a well-managed cloud environment that is compliant with internal policies and external requirements  With security services to protect from both vulnerabilities and intrusions  Services that protect against loss or compromise of sensitive data.  The framework provides for integrated content management and has automated capabilities for appropriate cloud platform selection, content migration and application importing. © Copyright 2012 Hitachi Consulting 2
  • 4. What are the top 3 greatest risks of moving to a cloud?  The right answer depends on the type of business and what is most critical  Businesses must evaluate applications  Determine appropriate use in the cloud  Consider the Pillars of IT security (CIA):  Confidentiality  Integrity  Availability © Copyright 2012 Hitachi Consulting
  • 5. What are the top 3 greatest risks of moving to a cloud? Confidentiality Preventing sensitive information from being disclosed to unauthorized recipients Limiting information access and disclosure to authorized users Risk - Private Data Exposure Riskof potential data or private information leakage Can threaten your customer data As well as your business services on operations © Copyright 2012 Hitachi Consulting
  • 6. What are the top 3 greatest risks of moving to a cloud? Integrity Trustworthiness of information resources Modifying information resources only in a specified and authorized manner Ensuring data remains consistent and changes to data are authorized by appropriate personnel Risk - Data Tampering Risk of potential manipulation or altering of critical data Can lead to making business decisions based on invalid information © Copyright 2012 Hitachi Consulting
  • 7. What are the top 3 greatest risks of moving to a cloud? Availability Ensures systems operate as required And authorized users are not denied service Allowing systems to be available whenever needed Risk - Business Continuity Risk of potential interruption to or compromise of your service operations Service outage, security attack or compromise that may lead to data loss Operations are interrupted or your data is compromised © Copyright 2012 Hitachi Consulting
  • 8. Cloud Security Risks Misuse of cloud computing Account / service hijacking resources Remote facilities / Security Secure Interfaces and APIs Perimeter Risks associated with Securing personal identification multi-tenancy information (PII) Risk of data loss and leakage IP Collateral management © Copyright 2012 Hitachi Consulting
  • 9. How to mitigate the risks of moving to the cloud?  To reduce your risks…  Risk must first be understood and calculated  Understand residual risk that you can influence  Develop a standardized cloud risk decision process  Help decide which applications are most appropriate  Leverage cloud application assessment process to define requirements  Understand and quantify your risk  Implement a policy that calculates and quantifies cloud application risk  Includes criteria for:  Application Risk Tolerance  Application Security Fit  Data Protection & SLA Requirements  Business to Business Policies  Confidentiality Risk - Private Data Exposure  Integrity Risk - Data Tampering  Availability Risk - Business Continuity © Copyright 2012 Hitachi Consulting
  • 10. Integrated Cloud Framework - Security, Governance, Compliance & Content & Application Management  Helps Organizations Leverage the Cloud in a Secure Fashion  Understand cloud application security risk and key areas of consideration  Evaluates and helps define application and data security requirements  Enables appropriate planning for cloud security, content and governance  Serves as a comprehensive guide to reduce cloud adoption risks  Integrated Cloud Framework: A Roadmap to the Cloud  Security  to protect against vulnerabilities, intrusions & compromise of sensitive data  Governance & Compliance  for an environment compliant with policies and requirements  Content Management  for control of cloud information  Application Development & Migration  development, transition and re-platform of enterprise applications  Provides streamlined capability to rapidly & securely transition to the cloud © Copyright 2012 Hitachi Consulting 9
  • 11. Integrated Cloud Framework - Security, Governance, Compliance, Content ,Application & Service Management Cloud Framework for Integrated Security, Governance, Compliance, Content & Service Management Consulting Services Program Governance Framework Content Management, Security, Governance Dashboard Portal Strategic Cloud Advisory Governance Policy Cloud Governance, Certification & Compliance Workflow-Checklist, Certification & Approval Services Central Cloud Platform Management Console Enforcement Policy Interface Cloud Readiness Assessment Master Security Policy & Services Security Privacy Hosting Continuous Audit Program Interface Site Compliance Reporting Dashboard Interface Exceptions Infrastructure, Transition & Vulnerability Scanning, Monitoring, & PII Risk Impact Monitoring Metering, Billing & Charge-Back Interface Migration Services Criteria Criteria Cloud App Risk Reporting Interface Cloud Security & Governance Data Class Hosting Services Legal Audit Excellence Secure Cloud Environment Incident Reporting Role & Access Administration Interface Criteria Criteria Cloud Starter Kit Privacy Marketing Corporate RACI FIT Site Requirements, Content Publication Priority & Criteria Criteria Performance SLA Interface ITIL Service Management Cloud Template Interface Security Standards - NIST, Client Standards & Best Practices - Governance Policy, Portal & Training Feedback Collection Interface PCI,CSA,TwC, HIPAA,GLBA,Vendor Procurement, Security, Marketing/CMG, Privacy Documentation Interface Cloud Security, Content & Application Services Application Services Security Services Content Management Services Single Sign On (SSO) Identity Management Vulnerability Scanning, Monitoring, & PII Service Desk Integration Cloud Assessment Content Data Classification & Authentication Detection Engine (Communication, Collaboration, Reporting) SIEM with Root Cause Analysis & Risk Content Compatibility & Compliance Decision Cloud Architecture & Design PKI & Certificate Management System Change Management Integration Assessment Engine Cloud Application Site Requirements, Publication Priority & Cloud Patch & Log Management System Continuous Auditing Program Engine Content Conversion & Standardization Development Template Launch Engine IPS/IDS Event Management & Data Loss Secure Cloud to Cloud & Cloud to Cloud Application Delivery Feedback Collection Compliant Content Migration Process Prevention Systems Datacenter VPN Connectivity Managed Cloud Service AntiVirus & AntiMalware System Secure Cloud Platform Content Migration Performance SLA Engine Non-Compliant Content Migration Process Deep Code-Level Security Vulnerability Workflow-Checklist & Approval Engine Cloud Platform Selection Automation Virtualized Application Automated Migration Review Cloud Platform & Hosting Environment System OS Patch AntiVirus Data Loss Single Sign On Cloud Applications Management Management AntiMalware Prevention (SSO) Identity Metering, Billing Backup & Log IPS/IDS Event Management, & Charge Back OS Web Server Database Middleware Content Secure VPN Restore Management Management Authentication Cloud Platform & Infrastructure © Copyright 2012 Hitachi Consulting 10
  • 12. Cloud Framework – Platform & Hosting Environment Cloud Platform & Hosting Environment Cloud Applications OS Web Server Database Middleware Content System OS Patch AntiVirus Data Loss Single Sign On Management Management AntiMalware Prevention (SSO) Identity Metering, Billing & Backup & IPS/IDS Event Management, Charge Back Log Management Secure VPN Restore Management Authentication Cloud Platform & Infrastructure © Copyright 2012 Hitachi Consulting
  • 13. Cloud Framework – Content Management Services Content Management Services Service Desk Integration Content Data Classification (Communication, Collaboration, Reporting) Content Compatibility & Compliance Decision Change Management Integration Engine Site Requirements, Publication Priority & Cloud Content Conversion & Standardization Template Launch Engine Feedback Collection Compliant Content Migration Process Performance SLA Engine Non-Compliant Content Migration Process Cloud Platform Selection Automation Virtualized Application Automated Migration © Copyright 2012 Hitachi Consulting
  • 14. Cloud Framework - Security Services Security Services Single Sign On (SSO) Identity Management & Vulnerability Scanning, Monitoring, & PII Detection Authentication Engine PKI & Certificate Management System SIEM with Root Cause Analysis & Risk Assessment Patch & Log Management System Continuous Auditing Program Engine IPS/IDS Event Management & Data Loss Prevention Secure Cloud to Cloud & Cloud to Datacenter VPN Systems Connectivity Data Encryption & Secure Cloud Platform Content AntiVirus & AntiMalware System Migration Workflow-Checklist & Approval Engine Deep Code-Level Security Vulnerability Review © Copyright 2012 Hitachi Consulting
  • 15. Cloud Framework – Program Governance Framework Program Governance Framework Governance Policy Enforcement Cloud Governance, Certification & Compliance Policy Master Security Policy & Exceptions Security Privacy Hosting Risk Impact Monitoring Cloud App Risk Criteria Criteria Data Class Hosting Criteria Legal Audit Excellence Criteria Privacy Criteria Other Criteria Corporate RACI IT Security Standards - NIST, Client Standards & Best Practices - PCI,CSA,TwC, HIPAA,GLBA,Vendor Procurement, Security, Organization, Privacy © Copyright 2012 Hitachi Consulting
  • 16. Cloud Framework – Content Mgmt, Security, Governance Dashboard Portal Content Management, Security, Governance Dashboard Portal Workflow-Checklist, Certification & Approval Central Cloud Platform Management Console Interface Continuous Audit Program Interface Site Compliance Reporting Dashboard Interface Vulnerability Scanning, Monitoring, & PII Reporting Metering, Billing & Charge-Back Interface Interface Secure Cloud Environment Incident Reporting Role & Access Administration Interface Site Requirements, Content Publication Priority & Cloud Performance SLA Interface Template Interface Governance Policy, Portal & Training Feedback Collection Interface Documentation Interface © Copyright 2012 Hitachi Consulting
  • 17. Summary & Reccomendations  Understand that security in the cloud must be managed  Implement a policy that calculates and quantifies cloud application risk  Evaluate application and data security requirements  Plan and budget for implementing security services  Leverage a framework which covers all the key areas  Implement and adhere to the framework as a roadmap guide to reduce cloud adoption risks © Copyright 2012 Hitachi Consulting
  • 18. Contact us to Learn More about our Cloud Solutions Today Chad M. Lawler, Ph.D. Director of Consulting Services Cloud Computing 14643 Dallas Parkway, Suite 800, Dallas, Texas 75254 Office: 469.221.2894 Email: chad.lawler@hitachiconsulting.com www.hitachiconsulting.com www.cardcloud.com/chadlawler Sign up for a free trial to explore our Cloud Ecosystem Management Platform. Learn More About the Benefits of Hitachi Consulting Cloud Services at www.hitachiconsulting.com/cloud © Copyright 2012 Hitachi Consulting
  • 19. © Copyright 2012 Hitachi Consulting