SlideShare ist ein Scribd-Unternehmen logo
1 von 8
Remote Access
Server on Multi
Tenant Cloud for
Telcos & OSPs
BY
PRADEEP KUMAR YADAV. (CEO & CISO, HITEC INDIA)
Remote Access Server


Remote Access is the ability to get access to a computer or a network from
a remote distance. A Remote Access Server is the computer and
associated software that is set up to handle users seeking access to
network remotely.



A Remote Access Server usually includes or is associated with a firewall
server to ensure security and a router that can forward the remote access
request to another part of the corporate network.



A remote access server could be hosted on a multi-tenant cloud so that a
small group of different organizations Remote Access Users can share the
common pool of RAS and its routers.



A remote access server may also be used as part of a virtual private
network (VPN) or a Cloud connecting with Service Providers cloud.
Typical Multi Vendors RAS Setup
Remote Access Requirements as
per Regulatory Compliances


TSP must deploy Remote Access Server by 31/12/2013 .



All Remote Access to the TSP be done only via Remote Access Server with the entire
Remote sessions Server Activities video recording, Users credentials records, Access within
Country only, Device Log records, storage on the TSP data center.



The Remote monitoring of on-Line and Off Line session by term cell.



Data for 2 Years to be kept on 1-year Online and 1 Year off line mode for audit by
DoT.Vendors to TSP also adhere to the requirements and do the needful at their NOC
End.
Key Elements of Remote Access
1 ACL (Access Control List)


1.1 MAC (Media Access Control) filtering



1.2 IP (Internet Protocol) address filtering

2 Tunneling and encryption


2.1 SSL VPN (Secure Sockets Layer Virtual Private Network)



2.2 VPN (Virtual Private Network)



2.3 L2TP (Layer 2 Tunneling Protocol)



2.4 PPTP (Point-to-Point Tunneling Protocol)



2.5 IPsec (Internet Protocol Security)

3 Remote access


3.1 RAS (Remote Access Service)



3.2 RDP (Remote Desktop Protocol)



3.3 PPPoE (Point-to-Point Protocol over Ethernet)



3.4 PPP (Point-to-Point Protocol)



3.5 VNC (Virtual Network Computing)



3.6 ICA (Independent Computing Architecture)

4 Screen, Command, and Session Activity Log recording Software tool (and Monitoring)
5 Device LOG and Change Management Recording as Text File
6 Data Base with 1+1 Year Storage. 1 GB + 1 GB Ok for One Vendor Remote Session.
Multi Tenancy Architecture Basics


Multi-tenancy is an architecture in which a single instance of a software
application serves multiple customers. Each customer is called a tenant.
Tenants may be given the ability to customize some parts of the
application.



Multi-tenancy can be economical because software, hardware and
maintenance costs are shared. It can be contrasted with single-tenancy,
an architecture in which each customer has their own software instance
and may be given access to limited Network and applications.



A software-as-a-service (SaaS) provider, for example, can run one instance
of its application on one instance of a database and provide web access
to multiple customers. In such a scenario, each tenant's data is isolated
and remains invisible to other tenants.
Multi Tenant Cloud – Individual &
Collaboration
Thanks.


pradeep@hitecindia.org



www.hitecindia.org

Weitere ähnliche Inhalte

Mehr von Priyanka Aash

Mehr von Priyanka Aash (20)

DPDP Act 2023.pdf
DPDP Act 2023.pdfDPDP Act 2023.pdf
DPDP Act 2023.pdf
 
Cyber Truths_Are you Prepared version 1.1.pptx.pdf
Cyber Truths_Are you Prepared version 1.1.pptx.pdfCyber Truths_Are you Prepared version 1.1.pptx.pdf
Cyber Truths_Are you Prepared version 1.1.pptx.pdf
 
Cyber Crisis Management.pdf
Cyber Crisis Management.pdfCyber Crisis Management.pdf
Cyber Crisis Management.pdf
 
CISOPlatform journey.pptx.pdf
CISOPlatform journey.pptx.pdfCISOPlatform journey.pptx.pdf
CISOPlatform journey.pptx.pdf
 
Chennai Chapter.pptx.pdf
Chennai Chapter.pptx.pdfChennai Chapter.pptx.pdf
Chennai Chapter.pptx.pdf
 
Cloud attack vectors_Moshe.pdf
Cloud attack vectors_Moshe.pdfCloud attack vectors_Moshe.pdf
Cloud attack vectors_Moshe.pdf
 
Stories From The Web 3 Battlefield
Stories From The Web 3 BattlefieldStories From The Web 3 Battlefield
Stories From The Web 3 Battlefield
 
Lessons Learned From Ransomware Attacks
Lessons Learned From Ransomware AttacksLessons Learned From Ransomware Attacks
Lessons Learned From Ransomware Attacks
 
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
 
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
 
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
 
Cloud Security: Limitations of Cloud Security Groups and Flow Logs
Cloud Security: Limitations of Cloud Security Groups and Flow LogsCloud Security: Limitations of Cloud Security Groups and Flow Logs
Cloud Security: Limitations of Cloud Security Groups and Flow Logs
 
Cyber Security Governance
Cyber Security GovernanceCyber Security Governance
Cyber Security Governance
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Web Application Penetration Testing
Web Application Penetration Testing Web Application Penetration Testing
Web Application Penetration Testing
 
Hardware Security on Vehicles
Hardware Security on VehiclesHardware Security on Vehicles
Hardware Security on Vehicles
 
Web hacking using Cyber range
Web hacking using Cyber rangeWeb hacking using Cyber range
Web hacking using Cyber range
 
Hacking IoT with EXPLIoT Framework
Hacking IoT with EXPLIoT FrameworkHacking IoT with EXPLIoT Framework
Hacking IoT with EXPLIoT Framework
 
Telecom Security
Telecom SecurityTelecom Security
Telecom Security
 
Creating New Models To Combat Business Email Compromise
Creating New Models To Combat Business Email CompromiseCreating New Models To Combat Business Email Compromise
Creating New Models To Combat Business Email Compromise
 

Kürzlich hochgeladen

The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
ZurliaSoop
 

Kürzlich hochgeladen (20)

Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptx
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxOn_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 

ciso-platform-annual-summit-2013-Remote access server on multi tenant cloud for telc os & osps(pradeep k yadav)

  • 1. Remote Access Server on Multi Tenant Cloud for Telcos & OSPs BY PRADEEP KUMAR YADAV. (CEO & CISO, HITEC INDIA)
  • 2. Remote Access Server  Remote Access is the ability to get access to a computer or a network from a remote distance. A Remote Access Server is the computer and associated software that is set up to handle users seeking access to network remotely.  A Remote Access Server usually includes or is associated with a firewall server to ensure security and a router that can forward the remote access request to another part of the corporate network.  A remote access server could be hosted on a multi-tenant cloud so that a small group of different organizations Remote Access Users can share the common pool of RAS and its routers.  A remote access server may also be used as part of a virtual private network (VPN) or a Cloud connecting with Service Providers cloud.
  • 4. Remote Access Requirements as per Regulatory Compliances  TSP must deploy Remote Access Server by 31/12/2013 .  All Remote Access to the TSP be done only via Remote Access Server with the entire Remote sessions Server Activities video recording, Users credentials records, Access within Country only, Device Log records, storage on the TSP data center.  The Remote monitoring of on-Line and Off Line session by term cell.  Data for 2 Years to be kept on 1-year Online and 1 Year off line mode for audit by DoT.Vendors to TSP also adhere to the requirements and do the needful at their NOC End.
  • 5. Key Elements of Remote Access 1 ACL (Access Control List)  1.1 MAC (Media Access Control) filtering  1.2 IP (Internet Protocol) address filtering 2 Tunneling and encryption  2.1 SSL VPN (Secure Sockets Layer Virtual Private Network)  2.2 VPN (Virtual Private Network)  2.3 L2TP (Layer 2 Tunneling Protocol)  2.4 PPTP (Point-to-Point Tunneling Protocol)  2.5 IPsec (Internet Protocol Security) 3 Remote access  3.1 RAS (Remote Access Service)  3.2 RDP (Remote Desktop Protocol)  3.3 PPPoE (Point-to-Point Protocol over Ethernet)  3.4 PPP (Point-to-Point Protocol)  3.5 VNC (Virtual Network Computing)  3.6 ICA (Independent Computing Architecture) 4 Screen, Command, and Session Activity Log recording Software tool (and Monitoring) 5 Device LOG and Change Management Recording as Text File 6 Data Base with 1+1 Year Storage. 1 GB + 1 GB Ok for One Vendor Remote Session.
  • 6. Multi Tenancy Architecture Basics  Multi-tenancy is an architecture in which a single instance of a software application serves multiple customers. Each customer is called a tenant. Tenants may be given the ability to customize some parts of the application.  Multi-tenancy can be economical because software, hardware and maintenance costs are shared. It can be contrasted with single-tenancy, an architecture in which each customer has their own software instance and may be given access to limited Network and applications.  A software-as-a-service (SaaS) provider, for example, can run one instance of its application on one instance of a database and provide web access to multiple customers. In such a scenario, each tenant's data is isolated and remains invisible to other tenants.
  • 7. Multi Tenant Cloud – Individual & Collaboration