SlideShare ist ein Scribd-Unternehmen logo
1 von 42
Downloaden Sie, um offline zu lesen
Neil Bunn, CTO -- neil.bunn@scalar.ca
October, 2015
Cloud - Security & Success
Scalar leads Canadian Business to
the Next Generation of IT through
Innovation, Expertise & Service
© 2015 Scalar Decisions Inc. Not for distributionoutside of intended audience. 3
Established in 2004
8
Locations
300M
Revenue
800
Clients
© 2015 Scalar Decisions Inc. Not for distributionoutside of intended audience. 4
Key Cloud Partnerships
“The” Cloud…
© 2015 Scalar Decisions Inc. Not for distributionoutside of intended audience.
Lets Define “Cloud”…
“Cloud Computing” by the NIST Definition is:
Cloud computing is a model for enabling ubiquitous, convenient, on-demand network
access to a shared pool of configurable computing resources (e.g., networks, servers,
storage, applications, and services) that can be rapidly provisioned and released with
minimal management effort or service provider interaction. This cloud model is composed of
five essential characteristics, three service models, and four deployment models.
Which really means…..
© 2015 Scalar Decisions Inc. Not for distributionoutside of intended audience.
Cloud…
The “Cloud” revolution is largely about a few key things:
1. Automation
2. Elasticity
3. Flexible Costing*
4. Organization Attitude & Change
Largely, beyond these basics everyone adds their “flavour” to a cloud definition, but the vast
bulk of the benefits of cloud come from the above, coupled with standardization.
Most importantly, our view is that most organizations would see the vast majority of the
benefit of “cloud computing” by ensuring they adhere to most of these elements.
© 2015 Scalar Decisions Inc. Not for distributionoutside of intended audience. 8
Cloud Primer
Broad
Network Access
Automation Flexible Costing
On-Demand
Self-Service
Resource Pooling
Cloud
Characteristics
Software as a Service
(SaaS)
Platform as a Service
(PaaS)
Infrastructure as a
Service (IaaS)
Service Models
Deployment
Models
Public Cloud Hybrid Cloud Private Cloud
© 2015 Scalar Decisions Inc. Not for distributionoutside of intended audience.
Cloud Landscape (IaaS)
© Gartner, sourced from https://aws.amazon.com/resources/analyst-reports/
Limited key players, in any domain (example
here is IaaS providers, actually a surprisingly
small mix of vendors).
Clients need to align themselves with a leader,
the entire bottom left quadrant has changed
rapidly with each release, the top right has
remained largely static.
© 2015 Scalar Decisions Inc. Not for distributionoutside of intended audience.
Path to the Cloud
© 2016 Amazon Web Services, inc
© 2015 Scalar Decisions Inc. Not for distributionoutside of intended audience.
Challenge with migrations…
© 2016 Amazon Web Services, inc
© 2015 Scalar Decisions Inc. Not for distributionoutside of intended audience.
But what is lost in this discussion…
Somehow, almost all of the examples of “great success” in “cloud” has been around cost
cases (O365 vs. running a large on-premise Exchange infrastructure, Box vs. running a
large file sharing environment, Netflix not needing to own hardware, etc.) with two elements
only discussed in passing:
1) Security
a) Of information
b) Of operations
c) Of environments
2) Privacy
a) Protection
b) Compliance
c) Assurance
© 2015 Scalar Decisions Inc. Not for distributionoutside of intended audience.
Which highlights the key challenges…
 Keeping pace with cloud changes
 Globally incompatible legislation and policy
 Non-standard Private & Public clouds
 Lack of continuous Risk Management & Compliance monitoring
 Incomplete Identity Management implementations
 Haphazard response to security incidents
 Lack of data classification policies & rigour
© 2015 Scalar Decisions Inc. Not for distributionoutside of intended audience.
Our Focus Today
To shine a light on getting to Cloud in a safe, secure and privacy compliant manner.
To ensure attendees understand the key terms and elements required to enact a proper
structure for:
 Information Governance
 Policy Compliance
 Security Awareness & Actions
Leveraging “cloud” technologies while adhering to all of the above and still leveraging the
benefits.
Importantly, leveraging cloud providers can make you *more* secure and compliant than
you could ever be using your own on-premise systems. However improperly leveraging
those technologies can destroy all of your security and privacy controls in an instant.
“With great power, comes great responsibility.” -- Peter Parker aka Spiderman
Cloud & Security
© 2015 Scalar Decisions Inc. Not for distributionoutside of intended audience.
Process & Governance
16
Cloud & Security
Cloud Technologies don’t really change the security challenges we’ve faced over
the last 20 years, but they amplify and make necessary even higher degrees of
expedited, automated response.
Cloud systems foundationally demonstrate the need for increased:
Automation, Intelligence and
Analytics
© 2015 Scalar Decisions Inc. Not for distributionoutside of intended audience. 17
Today’s Security Landscape
Traditional
Countermeasures are
Proving Ineffective
Rapidly Changing Threat
Types
Regulatory Compliance
& Corporate Governance
Demands are Increasing
Security Budgets are
Often Insufficient
Many Organizations are
Blind to Security Threats
that are Already Known
Hackers are Increasingly
Motivated
© 2015 Scalar Decisions Inc. Not for distributionoutside of intended audience. 18
Why Security Breaches Continue to be Prevalent
Every technology
eventually fails
Compliance programs
often ignore business risk
Trying to keep hackers
out is a losing battle
A cloud
architecture /
design truism
If you even have one… Especially if you
don’t see them
coming
© 2015 Scalar Decisions Inc. Not for distributionoutside of intended audience. 19
Cloud Security Elements
Global Threat Intelligence &
Research
Advanced Analytics
Protect Critical
Assets
Robust Incident
Handling
Understand Business
Impact
Continuous Validation of
Controls
Architecture & Design
© 2015 Scalar Decisions Inc. Not for distributionoutside of intended audience.
Understand the Security Continuum
Cloud
Provider
Responsibility
Your
responsibility
Foundation Services
Global Infrastructure
Endpoints
Compute Storage Database Netw orking
Regions
Availability
Zones
Edge Locations
Operating System & Network Configuration at Rest
Platform & Application Management
CustomerData
Optional –
Opaque Data
OS (in transit
/ at rest)
Client-side Data Encryption & Data Integrity
Authentication
Server-side Encryption Provided by the
Platform / Protection of Data at Rest
Network Traffic Protection Provided by the
Platform / Protection of Data in Transit
Identity&AccessManagement
Unmanaged Shared Responsibility Model
Cloud Provider
Responsibility
Your
Responsibility
Foundation Services
Global Infrastructure
Endpoints
Compute Storage Database Netw orking
Regions
Availability
Zones
Edge Locations
Operating System & Network Configuration at Rest
Platform & Application Management
CustomerData
Client-side Data Encryption & Data Integrity
Authentication
Server-side Encryption Provided by the
Platform / Protection of Data at Rest
Network Traffic Protection Provided by the
Platform / Protection of Data in Transit
Optional –
Opaque
Data OS (in
transit / at
rest)
Identity&AccessManagement
Managed Shared Responsibility Model
Security Design
© 2015 Scalar Decisions Inc. Not for distributionoutside of intended audience. 25
Getting Started
Prepare
Perform a risk
assessment
Build an effective
security program
Defend Deploy security
infrastructure
Properly configure
and continuously
tune security tools
Respond
Detect & respond to
incidents quickly
Continuously validate the
effectiveness of security
controls
Getting Started
1. Ensure effective governance, risk, and compliance processes exist
2. Audit operational & business processes
3. Manage, people, roles and identities
4. Ensure proper protection of data
5. Enforce privacy policies
6. Assess security provisions for cloud applications
7. Ensure secure cloud networks and connections
8. Evaluate security of physical infrastructure and facilities
9. Manage security terms in the service agreement
10. Understand the security requirements of the exit process
- 26
-
© 2015 Scalar Decisions Inc. Not for distributionoutside of intended audience.
Start with Principles First
Assess Risk Refine and Validate
Controls
Secure by Design
Assess vendors,
applications, processes
and policies against a
formalized threat-risk-
assessment process.
Refine and validate
internal processes to align
with the realities of cloud
(highly dynamic systems,
microservices based
development).
The rapid deployment
elements of cloud computing
provide more time in a
business cycle for
architecture, engineering and
security – through less time
spent in procurement.
© 2015 Scalar Decisions Inc. Not for distributionoutside of intended audience.
- 28
-
Confidentiality
 “Preserving authorized restriction on information access and disclosure, including
means for protecting personal privacy and proprietary information.”
Integrity
 “Guarding against improper information modification or destruction, and includes
ensuring information non-repudiation and authenticity.”
Availability
 “Ensuring timely and reliable access and use of information.”
Focus for Security
© 2015 Scalar Decisions Inc. Not for distributionoutside of intended audience.
- 29
-
Need-to-know
 Users should only have access to information
(or systems) that enable them to perform
their assigned job functions.
Least privilege
 Users should only have sufficient access
privilege that allow them to perform their
assigned work.
Separation of duties
 No person should be responsible for
completing a task involving sensitive,
valuable or critical information from the
beginning to end.
 No single person should be responsible for
approving his/her own work.
Benchmarks and Guidelines:
 NIST National Checklist, DISA STIGs, CIS
Benchmarks, etc.
Law, Regulations, and Policies:
 FISMA, SOX, GBL, National Security Act,
USA PATRIOT ACT, etc.
 OMB A-130, A-11, etc.
 E.O. 13292, 12968, etc.
 DoD 5200.1-R, etc.
Standards and Best Practices
 NIST FIPS, SP 800-x, etc.
 COBIT, ITIL, Common Criteria
 ISO/IEC 27001, 21827, etc.
 DoDI 8500.2, 8510.01
Security Objectives:
 Confidentiality
 Integrity
 Availability
Security Implementation
Principles:
 Confidentiality, Integrity,
Availability
 Need-to-Know
 Least Privilege
 Separation of Duties
Implementation Principles
© 2015 Scalar Decisions Inc. Not for distributionoutside of intended audience.
- 30
-
Risks & Countermeasures
 Threat Agent. An entity that may act on a
vulnerability.
 Threat. Any potential danger to information life
cycle.
 Vulnerability. A weakness or flaw that may provide
an opportunity for a threat agent.
 Risk. The likelihood of a threat agent exploits the
discovered vulnerability.
 Exposure. An instance of being compromised by a
threat agent.
 Countermeasure / safeguard. An administrative,
operational, or logical mitigation against potential
risk(s).
Threat Agent
Threat
Vulnerability
Risk
Asset
Exposure
Counter
measure
Give rise to
Exploits
Leads to
Can damage
And causes an
Can be countered by a
Indirectlyaffects
Reduces/
Eliminates
Reference:Information Assurance Technical Framework (IATF), Release 2.3
© 2015 Scalar Decisions Inc. Not for distributionoutside of intended audience.
Cloud Security & Data
Proper cloud security combined with
privacy hinges on a clear understanding
of the standard Data Lifecycle and how
to apply it both technically and from a
compliance perspective within a cloud
context.
As a general rule, data is never
destroyed in many cloud provider
platforms and therefor we must both
protect it differently and destroy it
differently.
Creation
Use
Transfer
TransformationStorage
Archival
Destruction
© 2015 Scalar Decisions Inc. Not for distributionoutside of intended audience.
Privacy Implications…
In Ontario, there is no legislative prohibition against the storing of personal
information outside of the province or Canada. However, the Acts and their
regulations require government institutions to ensure that reasonable measures
are in place to protect the privacy and security of the personal information in
their custody or control.
Ontario Information and Privacy Commissioner, Ann Cavoukian
British Columbia and Nova Scotia have more restrictive terminology and
requirements. With Amazon, Microsoft and Softlayer all offering datacenter “in-
country” within this coming public sector fiscal year there are few barriers remaining
to broad public sector cloud adoption for appropriate services.
© 2015 Scalar Decisions Inc. Not for distributionoutside of intended audience.
Mapping to Provided Controls & Measures
With an understanding of required compliance elements, and an outline
of identified & required controls we can then map to appropriate security
implementations.
1) Identity controls via provider toolsets (such as Azure AD, or AWS IAM) or
external tooling (Ping Identity or Okta)
2) Configuration scanning tools (such as CloudCheckr or Evident.io)
3) Cloud Access Security Brokers (Skyhigh, Netskope) for SaaS applications
4) Data inspection devices (provider supplied firewalls, PAN Virtual Edition, F5
virtual editions)
5) Encryption providers (provider based, or external key managers such as
HyTrust, Gemmalto, etc.)
……
© 2015 Scalar Decisions Inc. Not for distributionoutside of intended audience.
Encryption…
A quick note on encryption…
Encryption is critical for cloud security & data controls. It should be widespread. The
Cloud Security Alliance recommends all sensitive data be:
a) Encrypted for data privacy with approved algorithms and long, random keys;
b) Encrypted before it passes from the enterprise to the cloud provider;
c) Should remain encrypted in transit, at rest, and in use;
d) The cloud provider and its staff should never have access to decryption keys.
But it is important to note that encryption should be viewed mostly as a time-lock.
Destroying encryption keys is widely accepted as one possible form of data
protection & destruction when using cloud providers however there is a reasonable
possibility that with enough time (computational or technology advancement) and
funding (state sponsored) most encryption can be broken eventually. Whether there
is a reasonable concern associated with this depends on the data classification.
Specific Suggested Practices
© 2015 Scalar Decisions Inc. Not for distributionoutside of intended audience.
Service Agreements, SLA’s and other fun….
Read them! Understand them!
Regardless of deployment type (IaaS, PaaS, SaaS) there are a few constants:
1. Largely often non-negotiable, unless you are a very, very large scale user (most of us aren’t)
2. Largely deflect most liability back to the consumer
3. Largely define “jurisdictions” of best option to the provider, not consumer, your jurisdictional
requirements WILLvary
4. May contain IP/data ownership clauses needing careful scrutiny
5. Often define rights to audit, disclosures, etc.
6. Contain minimum SLA’s, but often with minimally useful penalties or “make good” clauses
…………
These are all very scary, and can quickly be used as an option to NOT pursue the
cloud… but realistically these are all manageable, in the right context. The important
element is risk management and contract management associated with them. Cloud
is partially cheaper because of risk moved to clients, now you need to spend a bit to
manage the risks moved to you!
© 2015 Scalar Decisions Inc. Not for distributionoutside of intended audience.
Advanced, Cloud-Enabled Security Services
Defense based on:
1) Log, API and Analytics across environments, both on-premise and in-the-cloud
2) Rapid application of correlation analytics, with threat-feed intelligence across
systems
3) Business-context driven escalations and prioritization
4) Comprehensive incident response with 7x24 reaction team, and access to
deeply technical resources across both traditional and cloud-based
environments
5) Leveraging top tier & native as appropriate tooling for both on-premise
deployments and in-the-cloud deployments (ie: Splunk, Logrhythm, Cloudtrail,
Cloudwatch)
© 2015 Scalar Decisions Inc. Not for distributionoutside of intended audience.
Public Cloud Defense - Automation & Recovery
Architect for:
1) Defend the root account – common weakness in public-cloud deployments –
through continuous monitoring & credential inspection
2) Rapid re-instantiation of resources through highly automated deployments
(infrastructure-as-code)
3) Design for capture & forensics as a secondary aspect to recovery (get your
environment back running rapidly, but capture the necessary elements to
determine root-cause)
4) Rapidly iterate environments to enable rapid patching & remediation and
leverage the power of infrastructure-on-demand environments
5) Perform offline forensics to adjust & harden configurations
Vendor Documentation
© 2015 Scalar Decisions Inc. Not for distributionoutside of intended audience.
Amazon Web Services (AWS) - Resources
Critical Documents:
1) https://aws.amazon.com/security/
2) https://aws.amazon.com/compliance/
3) https://cloudsecurityalliance.org/star-registrant/amazon-aws/
4) https://d0.awsstatic.com/whitepapers/compliance/Intro_to_Security_by_Design.pdf
5) https://d0.awsstatic.com/whitepapers/compliance/AWS_Security_at_Scale_Governance_in_
AWS_Whitepaper.pdf
6) https://www.youtube.com/watch?v=YYiV_z9D2CE
© 2015 Scalar Decisions Inc. Not for distributionoutside of intended audience.
Microsoft Azure
Critical Documents:
1) https://azure.microsoft.com/en-us/support/trust-center/
2) http://download.microsoft.com/download/2/0/A/20A1529E-65CB-4266-8651-
1B57B0E42DAA/Protecting-Data-and-Privacy-in-the-Cloud.pdf
3) http://download.microsoft.com/download/1/6/0/160216AA-8445-480B-B60F-
5C8EC8067FCA/WindowsAzure-SecurityPrivacyCompliance.pdf
Thank You
Contacts:
neil.bunn@scalar.ca
@neilbunn,
@scalardecisions
(416) 202-0020

Weitere ähnliche Inhalte

Was ist angesagt?

Meet Secure Messaging
Meet Secure MessagingMeet Secure Messaging
Meet Secure MessagingRapidScale
 
Multitenant, Dedicated or Hybrid - Which cloud to choose?
Multitenant, Dedicated or Hybrid - Which cloud to choose?Multitenant, Dedicated or Hybrid - Which cloud to choose?
Multitenant, Dedicated or Hybrid - Which cloud to choose?RapidScale
 
Cloud Computing Stats - Benefitting SMBs
Cloud Computing Stats - Benefitting SMBsCloud Computing Stats - Benefitting SMBs
Cloud Computing Stats - Benefitting SMBsRapidScale
 
Cloud Computing Stats - Cloud in the Enterprise
Cloud Computing Stats - Cloud in the EnterpriseCloud Computing Stats - Cloud in the Enterprise
Cloud Computing Stats - Cloud in the EnterpriseRapidScale
 
Compliance in the Cloud
Compliance in the CloudCompliance in the Cloud
Compliance in the CloudRapidScale
 
End Your Security Nightmares with ePlus and Cisco
End Your Security Nightmares with ePlus and CiscoEnd Your Security Nightmares with ePlus and Cisco
End Your Security Nightmares with ePlus and CiscoePlus
 
Cloud security design considerations
Cloud security design considerationsCloud security design considerations
Cloud security design considerationsMike Kavis
 
RapidScale CloudRecovery
RapidScale CloudRecoveryRapidScale CloudRecovery
RapidScale CloudRecoveryRapidScale
 
RapidScale CloudMail
RapidScale CloudMailRapidScale CloudMail
RapidScale CloudMailRapidScale
 
VMWare NSX Ecosystem Overview
VMWare NSX Ecosystem OverviewVMWare NSX Ecosystem Overview
VMWare NSX Ecosystem OverviewScott Clinton
 
Jazoon'12 Enterprise-wide Cloud Governance
Jazoon'12 Enterprise-wide Cloud GovernanceJazoon'12 Enterprise-wide Cloud Governance
Jazoon'12 Enterprise-wide Cloud GovernanceNetcetera
 
NetScaler: One Device, Every Need Guiding Enterprise IT to New Heights
NetScaler: One Device, Every Need Guiding Enterprise IT to New HeightsNetScaler: One Device, Every Need Guiding Enterprise IT to New Heights
NetScaler: One Device, Every Need Guiding Enterprise IT to New HeightsePlus
 
Multi cloud webinar 2019 - slideshare
Multi cloud webinar 2019 - slideshareMulti cloud webinar 2019 - slideshare
Multi cloud webinar 2019 - slideshareThousandEyes
 
Citrix Strategy Brief
Citrix Strategy BriefCitrix Strategy Brief
Citrix Strategy BriefCitrix
 
Enterprise Cloud transformation z pohledu Oracle
Enterprise Cloud transformation z pohledu OracleEnterprise Cloud transformation z pohledu Oracle
Enterprise Cloud transformation z pohledu OracleMarketingArrowECS_CZ
 
CCSK Certificate of Cloud Computing Knowledge - overview
CCSK Certificate of Cloud Computing Knowledge - overviewCCSK Certificate of Cloud Computing Knowledge - overview
CCSK Certificate of Cloud Computing Knowledge - overviewPeter HJ van Eijk
 
January 2015 Webinar - Wins and Successes from 2014
January 2015 Webinar -  Wins and Successes from 2014January 2015 Webinar -  Wins and Successes from 2014
January 2015 Webinar - Wins and Successes from 2014RapidScale
 
ePlus Virtualized Network
ePlus Virtualized NetworkePlus Virtualized Network
ePlus Virtualized NetworkePlus
 
ePlus Intelligent Branch
ePlus Intelligent BranchePlus Intelligent Branch
ePlus Intelligent BranchePlus
 

Was ist angesagt? (20)

Meet Secure Messaging
Meet Secure MessagingMeet Secure Messaging
Meet Secure Messaging
 
Multitenant, Dedicated or Hybrid - Which cloud to choose?
Multitenant, Dedicated or Hybrid - Which cloud to choose?Multitenant, Dedicated or Hybrid - Which cloud to choose?
Multitenant, Dedicated or Hybrid - Which cloud to choose?
 
Cloud Computing Stats - Benefitting SMBs
Cloud Computing Stats - Benefitting SMBsCloud Computing Stats - Benefitting SMBs
Cloud Computing Stats - Benefitting SMBs
 
Cloud Computing Stats - Cloud in the Enterprise
Cloud Computing Stats - Cloud in the EnterpriseCloud Computing Stats - Cloud in the Enterprise
Cloud Computing Stats - Cloud in the Enterprise
 
Compliance in the Cloud
Compliance in the CloudCompliance in the Cloud
Compliance in the Cloud
 
End Your Security Nightmares with ePlus and Cisco
End Your Security Nightmares with ePlus and CiscoEnd Your Security Nightmares with ePlus and Cisco
End Your Security Nightmares with ePlus and Cisco
 
Cloud security design considerations
Cloud security design considerationsCloud security design considerations
Cloud security design considerations
 
RapidScale CloudRecovery
RapidScale CloudRecoveryRapidScale CloudRecovery
RapidScale CloudRecovery
 
RapidScale CloudMail
RapidScale CloudMailRapidScale CloudMail
RapidScale CloudMail
 
VMWare NSX Ecosystem Overview
VMWare NSX Ecosystem OverviewVMWare NSX Ecosystem Overview
VMWare NSX Ecosystem Overview
 
Jazoon'12 Enterprise-wide Cloud Governance
Jazoon'12 Enterprise-wide Cloud GovernanceJazoon'12 Enterprise-wide Cloud Governance
Jazoon'12 Enterprise-wide Cloud Governance
 
NetScaler: One Device, Every Need Guiding Enterprise IT to New Heights
NetScaler: One Device, Every Need Guiding Enterprise IT to New HeightsNetScaler: One Device, Every Need Guiding Enterprise IT to New Heights
NetScaler: One Device, Every Need Guiding Enterprise IT to New Heights
 
Multi cloud webinar 2019 - slideshare
Multi cloud webinar 2019 - slideshareMulti cloud webinar 2019 - slideshare
Multi cloud webinar 2019 - slideshare
 
Cloud services and it security
Cloud services and it securityCloud services and it security
Cloud services and it security
 
Citrix Strategy Brief
Citrix Strategy BriefCitrix Strategy Brief
Citrix Strategy Brief
 
Enterprise Cloud transformation z pohledu Oracle
Enterprise Cloud transformation z pohledu OracleEnterprise Cloud transformation z pohledu Oracle
Enterprise Cloud transformation z pohledu Oracle
 
CCSK Certificate of Cloud Computing Knowledge - overview
CCSK Certificate of Cloud Computing Knowledge - overviewCCSK Certificate of Cloud Computing Knowledge - overview
CCSK Certificate of Cloud Computing Knowledge - overview
 
January 2015 Webinar - Wins and Successes from 2014
January 2015 Webinar -  Wins and Successes from 2014January 2015 Webinar -  Wins and Successes from 2014
January 2015 Webinar - Wins and Successes from 2014
 
ePlus Virtualized Network
ePlus Virtualized NetworkePlus Virtualized Network
ePlus Virtualized Network
 
ePlus Intelligent Branch
ePlus Intelligent BranchePlus Intelligent Branch
ePlus Intelligent Branch
 

Andere mochten auch

Scalar cloud study2016_slideshare
Scalar cloud study2016_slideshareScalar cloud study2016_slideshare
Scalar cloud study2016_slideshareScalar Decisions
 
2016 Scalar Security Study Roadshow
2016 Scalar Security Study Roadshow2016 Scalar Security Study Roadshow
2016 Scalar Security Study RoadshowScalar Decisions
 
Scalar Case Study: Strong Project Management Helps McMaster University Succes...
Scalar Case Study: Strong Project Management Helps McMaster University Succes...Scalar Case Study: Strong Project Management Helps McMaster University Succes...
Scalar Case Study: Strong Project Management Helps McMaster University Succes...Scalar Decisions
 
Cyber Security trends and tactics for 2015
Cyber Security trends and tactics for 2015Cyber Security trends and tactics for 2015
Cyber Security trends and tactics for 2015Scalar Decisions
 
Executive Summary of the 2016 Scalar Security Study
Executive Summary of the 2016 Scalar Security StudyExecutive Summary of the 2016 Scalar Security Study
Executive Summary of the 2016 Scalar Security StudyScalar Decisions
 
Scalar Security Roadshow - Calgary Presentation
Scalar Security Roadshow - Calgary PresentationScalar Security Roadshow - Calgary Presentation
Scalar Security Roadshow - Calgary PresentationScalar Decisions
 
Scalar Security Roadshow - Toronto Stop
Scalar Security Roadshow - Toronto StopScalar Security Roadshow - Toronto Stop
Scalar Security Roadshow - Toronto StopScalar Decisions
 
Scalar Technical session - Network Functions Virtualization leveraging Brocade
Scalar Technical session - Network Functions Virtualization leveraging BrocadeScalar Technical session - Network Functions Virtualization leveraging Brocade
Scalar Technical session - Network Functions Virtualization leveraging BrocadeScalar Decisions
 
Vancouver security road show master deck final
Vancouver   security road show master deck finalVancouver   security road show master deck final
Vancouver security road show master deck finalScalar Decisions
 
Scalar Security Roadshow - Vancouver Presentation
Scalar Security Roadshow - Vancouver PresentationScalar Security Roadshow - Vancouver Presentation
Scalar Security Roadshow - Vancouver PresentationScalar Decisions
 
Scalar customer case study: Rainmaker Entertainment
Scalar customer case study: Rainmaker EntertainmentScalar customer case study: Rainmaker Entertainment
Scalar customer case study: Rainmaker EntertainmentScalar Decisions
 
Scalar Security Roadshow: Toronto Presentation - April 15, 2015
Scalar Security Roadshow: Toronto Presentation - April 15, 2015Scalar Security Roadshow: Toronto Presentation - April 15, 2015
Scalar Security Roadshow: Toronto Presentation - April 15, 2015Scalar Decisions
 
Task Incident Readiness with Veris, Judy Nowak at TASK Toronto, April 27, 2...
Task   Incident Readiness with Veris, Judy Nowak at TASK Toronto, April 27, 2...Task   Incident Readiness with Veris, Judy Nowak at TASK Toronto, April 27, 2...
Task Incident Readiness with Veris, Judy Nowak at TASK Toronto, April 27, 2...patmisasi
 
Scalar Decisions: Emerging Trends and Technologies in Storage
Scalar  Decisions: Emerging Trends and Technologies in StorageScalar  Decisions: Emerging Trends and Technologies in Storage
Scalar Decisions: Emerging Trends and Technologies in Storagepatmisasi
 
Heather Enlow & Chris Ingram - Cybersecurity Act of 2015 and Other Hot Privac...
Heather Enlow & Chris Ingram - Cybersecurity Act of 2015 and Other Hot Privac...Heather Enlow & Chris Ingram - Cybersecurity Act of 2015 and Other Hot Privac...
Heather Enlow & Chris Ingram - Cybersecurity Act of 2015 and Other Hot Privac...centralohioissa
 
Calgary security road show master deck final
Calgary security road show master deck finalCalgary security road show master deck final
Calgary security road show master deck finalScalar Decisions
 
Connect the Dots: Draw a Clear Picture of Social’s Impact on Business Results
Connect the Dots: Draw a Clear Picture of Social’s Impact on Business ResultsConnect the Dots: Draw a Clear Picture of Social’s Impact on Business Results
Connect the Dots: Draw a Clear Picture of Social’s Impact on Business ResultsSpredfast
 
Scalar Security Roadshow - Toronto Presentation
Scalar Security Roadshow - Toronto PresentationScalar Security Roadshow - Toronto Presentation
Scalar Security Roadshow - Toronto PresentationScalar Decisions
 

Andere mochten auch (20)

Scalar cloud study2016_slideshare
Scalar cloud study2016_slideshareScalar cloud study2016_slideshare
Scalar cloud study2016_slideshare
 
2016 Scalar Security Study Roadshow
2016 Scalar Security Study Roadshow2016 Scalar Security Study Roadshow
2016 Scalar Security Study Roadshow
 
Scalar Case Study: Strong Project Management Helps McMaster University Succes...
Scalar Case Study: Strong Project Management Helps McMaster University Succes...Scalar Case Study: Strong Project Management Helps McMaster University Succes...
Scalar Case Study: Strong Project Management Helps McMaster University Succes...
 
Cyber Security trends and tactics for 2015
Cyber Security trends and tactics for 2015Cyber Security trends and tactics for 2015
Cyber Security trends and tactics for 2015
 
Executive Summary of the 2016 Scalar Security Study
Executive Summary of the 2016 Scalar Security StudyExecutive Summary of the 2016 Scalar Security Study
Executive Summary of the 2016 Scalar Security Study
 
Scalar Security Roadshow - Calgary Presentation
Scalar Security Roadshow - Calgary PresentationScalar Security Roadshow - Calgary Presentation
Scalar Security Roadshow - Calgary Presentation
 
Scalar Security Roadshow - Toronto Stop
Scalar Security Roadshow - Toronto StopScalar Security Roadshow - Toronto Stop
Scalar Security Roadshow - Toronto Stop
 
Alfa Tech VestAsia 2012
Alfa Tech VestAsia 2012Alfa Tech VestAsia 2012
Alfa Tech VestAsia 2012
 
Scalar Technical session - Network Functions Virtualization leveraging Brocade
Scalar Technical session - Network Functions Virtualization leveraging BrocadeScalar Technical session - Network Functions Virtualization leveraging Brocade
Scalar Technical session - Network Functions Virtualization leveraging Brocade
 
Vancouver security road show master deck final
Vancouver   security road show master deck finalVancouver   security road show master deck final
Vancouver security road show master deck final
 
Scalar Security Roadshow - Vancouver Presentation
Scalar Security Roadshow - Vancouver PresentationScalar Security Roadshow - Vancouver Presentation
Scalar Security Roadshow - Vancouver Presentation
 
Scalar customer case study: Rainmaker Entertainment
Scalar customer case study: Rainmaker EntertainmentScalar customer case study: Rainmaker Entertainment
Scalar customer case study: Rainmaker Entertainment
 
Scalar Security Roadshow: Toronto Presentation - April 15, 2015
Scalar Security Roadshow: Toronto Presentation - April 15, 2015Scalar Security Roadshow: Toronto Presentation - April 15, 2015
Scalar Security Roadshow: Toronto Presentation - April 15, 2015
 
Task Incident Readiness with Veris, Judy Nowak at TASK Toronto, April 27, 2...
Task   Incident Readiness with Veris, Judy Nowak at TASK Toronto, April 27, 2...Task   Incident Readiness with Veris, Judy Nowak at TASK Toronto, April 27, 2...
Task Incident Readiness with Veris, Judy Nowak at TASK Toronto, April 27, 2...
 
Scalar Decisions: Emerging Trends and Technologies in Storage
Scalar  Decisions: Emerging Trends and Technologies in StorageScalar  Decisions: Emerging Trends and Technologies in Storage
Scalar Decisions: Emerging Trends and Technologies in Storage
 
Heather Enlow & Chris Ingram - Cybersecurity Act of 2015 and Other Hot Privac...
Heather Enlow & Chris Ingram - Cybersecurity Act of 2015 and Other Hot Privac...Heather Enlow & Chris Ingram - Cybersecurity Act of 2015 and Other Hot Privac...
Heather Enlow & Chris Ingram - Cybersecurity Act of 2015 and Other Hot Privac...
 
12210943 pss7
12210943 pss712210943 pss7
12210943 pss7
 
Calgary security road show master deck final
Calgary security road show master deck finalCalgary security road show master deck final
Calgary security road show master deck final
 
Connect the Dots: Draw a Clear Picture of Social’s Impact on Business Results
Connect the Dots: Draw a Clear Picture of Social’s Impact on Business ResultsConnect the Dots: Draw a Clear Picture of Social’s Impact on Business Results
Connect the Dots: Draw a Clear Picture of Social’s Impact on Business Results
 
Scalar Security Roadshow - Toronto Presentation
Scalar Security Roadshow - Toronto PresentationScalar Security Roadshow - Toronto Presentation
Scalar Security Roadshow - Toronto Presentation
 

Ähnlich wie Keys to success and security in the cloud

2014 2nd me cloud conference trust in the cloud v01
2014 2nd me cloud conference trust in the cloud v012014 2nd me cloud conference trust in the cloud v01
2014 2nd me cloud conference trust in the cloud v01promediakw
 
Cloud Security By Dr. Anton Ravindran
Cloud Security By Dr. Anton RavindranCloud Security By Dr. Anton Ravindran
Cloud Security By Dr. Anton RavindranGSTF
 
ShareResponsibilityModel.pptx
ShareResponsibilityModel.pptxShareResponsibilityModel.pptx
ShareResponsibilityModel.pptxBabatundeAbioye2
 
Richard Knight: Real world stories from the frontline of enterprise Cloud
Richard Knight: Real world stories from the frontline of enterprise CloudRichard Knight: Real world stories from the frontline of enterprise Cloud
Richard Knight: Real world stories from the frontline of enterprise CloudDe Novo
 
Enabling Cloud Computing
Enabling Cloud ComputingEnabling Cloud Computing
Enabling Cloud Computingtntsa1972
 
Whitepaper: Security of the Cloud
Whitepaper: Security of the CloudWhitepaper: Security of the Cloud
Whitepaper: Security of the CloudCloudSmartz
 
CLOUD COMPUTING -DETAILED APPROACH
CLOUD COMPUTING -DETAILED APPROACHCLOUD COMPUTING -DETAILED APPROACH
CLOUD COMPUTING -DETAILED APPROACHSHAIMA A R
 
EMEA10: Trepidation in Moving to the Cloud
EMEA10: Trepidation in Moving to the CloudEMEA10: Trepidation in Moving to the Cloud
EMEA10: Trepidation in Moving to the CloudCompTIA UK
 
Fearing the cloud: why the life sciences shouldn't fret
Fearing the cloud: why the life sciences shouldn't fretFearing the cloud: why the life sciences shouldn't fret
Fearing the cloud: why the life sciences shouldn't fretCornerstone OnDemand
 
May 2013 Federal Cloud Computing Summit Keynote by David Cearly
May 2013 Federal Cloud Computing Summit Keynote by David CearlyMay 2013 Federal Cloud Computing Summit Keynote by David Cearly
May 2013 Federal Cloud Computing Summit Keynote by David CearlyTim Harvey
 
Cloudcomputingppt 12746363271272 Phpapp01
Cloudcomputingppt 12746363271272 Phpapp01Cloudcomputingppt 12746363271272 Phpapp01
Cloudcomputingppt 12746363271272 Phpapp01Chindala Murali
 
Cloud Computing Ppt
Cloud Computing PptCloud Computing Ppt
Cloud Computing PptAnjoum .
 
Demystifying The Cloud-iON Cloud ERP
Demystifying The Cloud-iON Cloud ERPDemystifying The Cloud-iON Cloud ERP
Demystifying The Cloud-iON Cloud ERPChirantan Ghosh
 
LinuxCon North America 2013: Why Lease When You Can Buy Your Cloud
LinuxCon North America 2013: Why Lease When You Can Buy Your CloudLinuxCon North America 2013: Why Lease When You Can Buy Your Cloud
LinuxCon North America 2013: Why Lease When You Can Buy Your CloudMark Hinkle
 
Accelerated Saa S Exec Briefing V2
Accelerated Saa S Exec Briefing V2Accelerated Saa S Exec Briefing V2
Accelerated Saa S Exec Briefing V2jeffirby
 
Demystifying Cloud Security: Lessons Learned for the Public Sector
Demystifying Cloud Security: Lessons Learned for the Public SectorDemystifying Cloud Security: Lessons Learned for the Public Sector
Demystifying Cloud Security: Lessons Learned for the Public SectorAmazon Web Services
 

Ähnlich wie Keys to success and security in the cloud (20)

Losing Control to the Cloud
Losing Control to the CloudLosing Control to the Cloud
Losing Control to the Cloud
 
Securing The Journey To The Cloud
Securing The Journey To The Cloud Securing The Journey To The Cloud
Securing The Journey To The Cloud
 
2014 2nd me cloud conference trust in the cloud v01
2014 2nd me cloud conference trust in the cloud v012014 2nd me cloud conference trust in the cloud v01
2014 2nd me cloud conference trust in the cloud v01
 
Cloud Security By Dr. Anton Ravindran
Cloud Security By Dr. Anton RavindranCloud Security By Dr. Anton Ravindran
Cloud Security By Dr. Anton Ravindran
 
ShareResponsibilityModel.pptx
ShareResponsibilityModel.pptxShareResponsibilityModel.pptx
ShareResponsibilityModel.pptx
 
Richard Knight: Real world stories from the frontline of enterprise Cloud
Richard Knight: Real world stories from the frontline of enterprise CloudRichard Knight: Real world stories from the frontline of enterprise Cloud
Richard Knight: Real world stories from the frontline of enterprise Cloud
 
Enabling Cloud Computing
Enabling Cloud ComputingEnabling Cloud Computing
Enabling Cloud Computing
 
Whitepaper: Security of the Cloud
Whitepaper: Security of the CloudWhitepaper: Security of the Cloud
Whitepaper: Security of the Cloud
 
Security of the Cloud
Security of the CloudSecurity of the Cloud
Security of the Cloud
 
CLOUD COMPUTING -DETAILED APPROACH
CLOUD COMPUTING -DETAILED APPROACHCLOUD COMPUTING -DETAILED APPROACH
CLOUD COMPUTING -DETAILED APPROACH
 
EMEA10: Trepidation in Moving to the Cloud
EMEA10: Trepidation in Moving to the CloudEMEA10: Trepidation in Moving to the Cloud
EMEA10: Trepidation in Moving to the Cloud
 
Fearing the cloud: why the life sciences shouldn't fret
Fearing the cloud: why the life sciences shouldn't fretFearing the cloud: why the life sciences shouldn't fret
Fearing the cloud: why the life sciences shouldn't fret
 
May 2013 Federal Cloud Computing Summit Keynote by David Cearly
May 2013 Federal Cloud Computing Summit Keynote by David CearlyMay 2013 Federal Cloud Computing Summit Keynote by David Cearly
May 2013 Federal Cloud Computing Summit Keynote by David Cearly
 
Cloudcomputingppt 12746363271272 Phpapp01
Cloudcomputingppt 12746363271272 Phpapp01Cloudcomputingppt 12746363271272 Phpapp01
Cloudcomputingppt 12746363271272 Phpapp01
 
Cloud Computing
Cloud Computing Cloud Computing
Cloud Computing
 
Cloud Computing Ppt
Cloud Computing PptCloud Computing Ppt
Cloud Computing Ppt
 
Demystifying The Cloud-iON Cloud ERP
Demystifying The Cloud-iON Cloud ERPDemystifying The Cloud-iON Cloud ERP
Demystifying The Cloud-iON Cloud ERP
 
LinuxCon North America 2013: Why Lease When You Can Buy Your Cloud
LinuxCon North America 2013: Why Lease When You Can Buy Your CloudLinuxCon North America 2013: Why Lease When You Can Buy Your Cloud
LinuxCon North America 2013: Why Lease When You Can Buy Your Cloud
 
Accelerated Saa S Exec Briefing V2
Accelerated Saa S Exec Briefing V2Accelerated Saa S Exec Briefing V2
Accelerated Saa S Exec Briefing V2
 
Demystifying Cloud Security: Lessons Learned for the Public Sector
Demystifying Cloud Security: Lessons Learned for the Public SectorDemystifying Cloud Security: Lessons Learned for the Public Sector
Demystifying Cloud Security: Lessons Learned for the Public Sector
 

Mehr von Scalar Decisions

La transformation numérique de Scalar
La transformation numérique de ScalarLa transformation numérique de Scalar
La transformation numérique de ScalarScalar Decisions
 
2017 Scalar Security Study Summary
2017 Scalar Security Study Summary2017 Scalar Security Study Summary
2017 Scalar Security Study SummaryScalar Decisions
 
Résumé de l’étude sur la sécurité de Scalar 2016
Résumé de l’étude sur la sécurité de Scalar 2016Résumé de l’étude sur la sécurité de Scalar 2016
Résumé de l’étude sur la sécurité de Scalar 2016Scalar Decisions
 
2016 Scalar Security Study: The Cyber Security Readiness of Canadian Organiza...
2016 Scalar Security Study: The Cyber Security Readiness of Canadian Organiza...2016 Scalar Security Study: The Cyber Security Readiness of Canadian Organiza...
2016 Scalar Security Study: The Cyber Security Readiness of Canadian Organiza...Scalar Decisions
 
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.Scalar Decisions
 
Scalar Security Roadshow April 2015
Scalar Security Roadshow April 2015Scalar Security Roadshow April 2015
Scalar Security Roadshow April 2015Scalar Decisions
 
Hyperconverged Infrastructure: The Leading Edge of Virtualization
Hyperconverged Infrastructure: The Leading Edge of VirtualizationHyperconverged Infrastructure: The Leading Edge of Virtualization
Hyperconverged Infrastructure: The Leading Edge of VirtualizationScalar Decisions
 
The road to clustered data ontap.
The road to clustered data ontap.The road to clustered data ontap.
The road to clustered data ontap.Scalar Decisions
 
The Cyber Security Readiness of Canadian Organizations
The Cyber Security Readiness of Canadian OrganizationsThe Cyber Security Readiness of Canadian Organizations
The Cyber Security Readiness of Canadian OrganizationsScalar Decisions
 
Where Technology Meets Medicine: SickKids High Performance Computing Data Centre
Where Technology Meets Medicine: SickKids High Performance Computing Data CentreWhere Technology Meets Medicine: SickKids High Performance Computing Data Centre
Where Technology Meets Medicine: SickKids High Performance Computing Data CentreScalar Decisions
 
Scalar Customer Case Study: Toronto 2015 Pan Am/Parapan Am Games
Scalar Customer Case Study: Toronto 2015 Pan Am/Parapan Am GamesScalar Customer Case Study: Toronto 2015 Pan Am/Parapan Am Games
Scalar Customer Case Study: Toronto 2015 Pan Am/Parapan Am GamesScalar Decisions
 
Scalar Security Roadshow - Ottawa Presentation
Scalar Security Roadshow - Ottawa PresentationScalar Security Roadshow - Ottawa Presentation
Scalar Security Roadshow - Ottawa PresentationScalar Decisions
 
Sheridan College: Scalar Customer Case Study
Sheridan College: Scalar Customer Case StudySheridan College: Scalar Customer Case Study
Sheridan College: Scalar Customer Case StudyScalar Decisions
 
City of Airdrie: Scalar Customer Case Study
City of Airdrie: Scalar Customer Case StudyCity of Airdrie: Scalar Customer Case Study
City of Airdrie: Scalar Customer Case StudyScalar Decisions
 

Mehr von Scalar Decisions (17)

La transformation numérique de Scalar
La transformation numérique de ScalarLa transformation numérique de Scalar
La transformation numérique de Scalar
 
Digital Transformation
Digital TransformationDigital Transformation
Digital Transformation
 
2017 Scalar Security Study Summary
2017 Scalar Security Study Summary2017 Scalar Security Study Summary
2017 Scalar Security Study Summary
 
Résumé de l’étude sur la sécurité de Scalar 2016
Résumé de l’étude sur la sécurité de Scalar 2016Résumé de l’étude sur la sécurité de Scalar 2016
Résumé de l’étude sur la sécurité de Scalar 2016
 
2016 Scalar Security Study: The Cyber Security Readiness of Canadian Organiza...
2016 Scalar Security Study: The Cyber Security Readiness of Canadian Organiza...2016 Scalar Security Study: The Cyber Security Readiness of Canadian Organiza...
2016 Scalar Security Study: The Cyber Security Readiness of Canadian Organiza...
 
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
 
Scalar Security Roadshow April 2015
Scalar Security Roadshow April 2015Scalar Security Roadshow April 2015
Scalar Security Roadshow April 2015
 
Cloudforms Workshop
Cloudforms WorkshopCloudforms Workshop
Cloudforms Workshop
 
XtremIO
XtremIOXtremIO
XtremIO
 
Hyperconverged Infrastructure: The Leading Edge of Virtualization
Hyperconverged Infrastructure: The Leading Edge of VirtualizationHyperconverged Infrastructure: The Leading Edge of Virtualization
Hyperconverged Infrastructure: The Leading Edge of Virtualization
 
The road to clustered data ontap.
The road to clustered data ontap.The road to clustered data ontap.
The road to clustered data ontap.
 
The Cyber Security Readiness of Canadian Organizations
The Cyber Security Readiness of Canadian OrganizationsThe Cyber Security Readiness of Canadian Organizations
The Cyber Security Readiness of Canadian Organizations
 
Where Technology Meets Medicine: SickKids High Performance Computing Data Centre
Where Technology Meets Medicine: SickKids High Performance Computing Data CentreWhere Technology Meets Medicine: SickKids High Performance Computing Data Centre
Where Technology Meets Medicine: SickKids High Performance Computing Data Centre
 
Scalar Customer Case Study: Toronto 2015 Pan Am/Parapan Am Games
Scalar Customer Case Study: Toronto 2015 Pan Am/Parapan Am GamesScalar Customer Case Study: Toronto 2015 Pan Am/Parapan Am Games
Scalar Customer Case Study: Toronto 2015 Pan Am/Parapan Am Games
 
Scalar Security Roadshow - Ottawa Presentation
Scalar Security Roadshow - Ottawa PresentationScalar Security Roadshow - Ottawa Presentation
Scalar Security Roadshow - Ottawa Presentation
 
Sheridan College: Scalar Customer Case Study
Sheridan College: Scalar Customer Case StudySheridan College: Scalar Customer Case Study
Sheridan College: Scalar Customer Case Study
 
City of Airdrie: Scalar Customer Case Study
City of Airdrie: Scalar Customer Case StudyCity of Airdrie: Scalar Customer Case Study
City of Airdrie: Scalar Customer Case Study
 

Kürzlich hochgeladen

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 

Kürzlich hochgeladen (20)

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 

Keys to success and security in the cloud

  • 1. Neil Bunn, CTO -- neil.bunn@scalar.ca October, 2015 Cloud - Security & Success
  • 2. Scalar leads Canadian Business to the Next Generation of IT through Innovation, Expertise & Service
  • 3. © 2015 Scalar Decisions Inc. Not for distributionoutside of intended audience. 3 Established in 2004 8 Locations 300M Revenue 800 Clients
  • 4. © 2015 Scalar Decisions Inc. Not for distributionoutside of intended audience. 4 Key Cloud Partnerships
  • 6. © 2015 Scalar Decisions Inc. Not for distributionoutside of intended audience. Lets Define “Cloud”… “Cloud Computing” by the NIST Definition is: Cloud computing is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction. This cloud model is composed of five essential characteristics, three service models, and four deployment models. Which really means…..
  • 7. © 2015 Scalar Decisions Inc. Not for distributionoutside of intended audience. Cloud… The “Cloud” revolution is largely about a few key things: 1. Automation 2. Elasticity 3. Flexible Costing* 4. Organization Attitude & Change Largely, beyond these basics everyone adds their “flavour” to a cloud definition, but the vast bulk of the benefits of cloud come from the above, coupled with standardization. Most importantly, our view is that most organizations would see the vast majority of the benefit of “cloud computing” by ensuring they adhere to most of these elements.
  • 8. © 2015 Scalar Decisions Inc. Not for distributionoutside of intended audience. 8 Cloud Primer Broad Network Access Automation Flexible Costing On-Demand Self-Service Resource Pooling Cloud Characteristics Software as a Service (SaaS) Platform as a Service (PaaS) Infrastructure as a Service (IaaS) Service Models Deployment Models Public Cloud Hybrid Cloud Private Cloud
  • 9. © 2015 Scalar Decisions Inc. Not for distributionoutside of intended audience. Cloud Landscape (IaaS) © Gartner, sourced from https://aws.amazon.com/resources/analyst-reports/ Limited key players, in any domain (example here is IaaS providers, actually a surprisingly small mix of vendors). Clients need to align themselves with a leader, the entire bottom left quadrant has changed rapidly with each release, the top right has remained largely static.
  • 10. © 2015 Scalar Decisions Inc. Not for distributionoutside of intended audience. Path to the Cloud © 2016 Amazon Web Services, inc
  • 11. © 2015 Scalar Decisions Inc. Not for distributionoutside of intended audience. Challenge with migrations… © 2016 Amazon Web Services, inc
  • 12. © 2015 Scalar Decisions Inc. Not for distributionoutside of intended audience. But what is lost in this discussion… Somehow, almost all of the examples of “great success” in “cloud” has been around cost cases (O365 vs. running a large on-premise Exchange infrastructure, Box vs. running a large file sharing environment, Netflix not needing to own hardware, etc.) with two elements only discussed in passing: 1) Security a) Of information b) Of operations c) Of environments 2) Privacy a) Protection b) Compliance c) Assurance
  • 13. © 2015 Scalar Decisions Inc. Not for distributionoutside of intended audience. Which highlights the key challenges…  Keeping pace with cloud changes  Globally incompatible legislation and policy  Non-standard Private & Public clouds  Lack of continuous Risk Management & Compliance monitoring  Incomplete Identity Management implementations  Haphazard response to security incidents  Lack of data classification policies & rigour
  • 14. © 2015 Scalar Decisions Inc. Not for distributionoutside of intended audience. Our Focus Today To shine a light on getting to Cloud in a safe, secure and privacy compliant manner. To ensure attendees understand the key terms and elements required to enact a proper structure for:  Information Governance  Policy Compliance  Security Awareness & Actions Leveraging “cloud” technologies while adhering to all of the above and still leveraging the benefits. Importantly, leveraging cloud providers can make you *more* secure and compliant than you could ever be using your own on-premise systems. However improperly leveraging those technologies can destroy all of your security and privacy controls in an instant. “With great power, comes great responsibility.” -- Peter Parker aka Spiderman
  • 16. © 2015 Scalar Decisions Inc. Not for distributionoutside of intended audience. Process & Governance 16 Cloud & Security Cloud Technologies don’t really change the security challenges we’ve faced over the last 20 years, but they amplify and make necessary even higher degrees of expedited, automated response. Cloud systems foundationally demonstrate the need for increased: Automation, Intelligence and Analytics
  • 17. © 2015 Scalar Decisions Inc. Not for distributionoutside of intended audience. 17 Today’s Security Landscape Traditional Countermeasures are Proving Ineffective Rapidly Changing Threat Types Regulatory Compliance & Corporate Governance Demands are Increasing Security Budgets are Often Insufficient Many Organizations are Blind to Security Threats that are Already Known Hackers are Increasingly Motivated
  • 18. © 2015 Scalar Decisions Inc. Not for distributionoutside of intended audience. 18 Why Security Breaches Continue to be Prevalent Every technology eventually fails Compliance programs often ignore business risk Trying to keep hackers out is a losing battle A cloud architecture / design truism If you even have one… Especially if you don’t see them coming
  • 19. © 2015 Scalar Decisions Inc. Not for distributionoutside of intended audience. 19 Cloud Security Elements Global Threat Intelligence & Research Advanced Analytics Protect Critical Assets Robust Incident Handling Understand Business Impact Continuous Validation of Controls
  • 21. © 2015 Scalar Decisions Inc. Not for distributionoutside of intended audience. Understand the Security Continuum
  • 22. Cloud Provider Responsibility Your responsibility Foundation Services Global Infrastructure Endpoints Compute Storage Database Netw orking Regions Availability Zones Edge Locations Operating System & Network Configuration at Rest Platform & Application Management CustomerData Optional – Opaque Data OS (in transit / at rest) Client-side Data Encryption & Data Integrity Authentication Server-side Encryption Provided by the Platform / Protection of Data at Rest Network Traffic Protection Provided by the Platform / Protection of Data in Transit Identity&AccessManagement Unmanaged Shared Responsibility Model
  • 23. Cloud Provider Responsibility Your Responsibility Foundation Services Global Infrastructure Endpoints Compute Storage Database Netw orking Regions Availability Zones Edge Locations Operating System & Network Configuration at Rest Platform & Application Management CustomerData Client-side Data Encryption & Data Integrity Authentication Server-side Encryption Provided by the Platform / Protection of Data at Rest Network Traffic Protection Provided by the Platform / Protection of Data in Transit Optional – Opaque Data OS (in transit / at rest) Identity&AccessManagement Managed Shared Responsibility Model
  • 25. © 2015 Scalar Decisions Inc. Not for distributionoutside of intended audience. 25 Getting Started Prepare Perform a risk assessment Build an effective security program Defend Deploy security infrastructure Properly configure and continuously tune security tools Respond Detect & respond to incidents quickly Continuously validate the effectiveness of security controls
  • 26. Getting Started 1. Ensure effective governance, risk, and compliance processes exist 2. Audit operational & business processes 3. Manage, people, roles and identities 4. Ensure proper protection of data 5. Enforce privacy policies 6. Assess security provisions for cloud applications 7. Ensure secure cloud networks and connections 8. Evaluate security of physical infrastructure and facilities 9. Manage security terms in the service agreement 10. Understand the security requirements of the exit process - 26 -
  • 27. © 2015 Scalar Decisions Inc. Not for distributionoutside of intended audience. Start with Principles First Assess Risk Refine and Validate Controls Secure by Design Assess vendors, applications, processes and policies against a formalized threat-risk- assessment process. Refine and validate internal processes to align with the realities of cloud (highly dynamic systems, microservices based development). The rapid deployment elements of cloud computing provide more time in a business cycle for architecture, engineering and security – through less time spent in procurement.
  • 28. © 2015 Scalar Decisions Inc. Not for distributionoutside of intended audience. - 28 - Confidentiality  “Preserving authorized restriction on information access and disclosure, including means for protecting personal privacy and proprietary information.” Integrity  “Guarding against improper information modification or destruction, and includes ensuring information non-repudiation and authenticity.” Availability  “Ensuring timely and reliable access and use of information.” Focus for Security
  • 29. © 2015 Scalar Decisions Inc. Not for distributionoutside of intended audience. - 29 - Need-to-know  Users should only have access to information (or systems) that enable them to perform their assigned job functions. Least privilege  Users should only have sufficient access privilege that allow them to perform their assigned work. Separation of duties  No person should be responsible for completing a task involving sensitive, valuable or critical information from the beginning to end.  No single person should be responsible for approving his/her own work. Benchmarks and Guidelines:  NIST National Checklist, DISA STIGs, CIS Benchmarks, etc. Law, Regulations, and Policies:  FISMA, SOX, GBL, National Security Act, USA PATRIOT ACT, etc.  OMB A-130, A-11, etc.  E.O. 13292, 12968, etc.  DoD 5200.1-R, etc. Standards and Best Practices  NIST FIPS, SP 800-x, etc.  COBIT, ITIL, Common Criteria  ISO/IEC 27001, 21827, etc.  DoDI 8500.2, 8510.01 Security Objectives:  Confidentiality  Integrity  Availability Security Implementation Principles:  Confidentiality, Integrity, Availability  Need-to-Know  Least Privilege  Separation of Duties Implementation Principles
  • 30. © 2015 Scalar Decisions Inc. Not for distributionoutside of intended audience. - 30 - Risks & Countermeasures  Threat Agent. An entity that may act on a vulnerability.  Threat. Any potential danger to information life cycle.  Vulnerability. A weakness or flaw that may provide an opportunity for a threat agent.  Risk. The likelihood of a threat agent exploits the discovered vulnerability.  Exposure. An instance of being compromised by a threat agent.  Countermeasure / safeguard. An administrative, operational, or logical mitigation against potential risk(s). Threat Agent Threat Vulnerability Risk Asset Exposure Counter measure Give rise to Exploits Leads to Can damage And causes an Can be countered by a Indirectlyaffects Reduces/ Eliminates Reference:Information Assurance Technical Framework (IATF), Release 2.3
  • 31. © 2015 Scalar Decisions Inc. Not for distributionoutside of intended audience. Cloud Security & Data Proper cloud security combined with privacy hinges on a clear understanding of the standard Data Lifecycle and how to apply it both technically and from a compliance perspective within a cloud context. As a general rule, data is never destroyed in many cloud provider platforms and therefor we must both protect it differently and destroy it differently. Creation Use Transfer TransformationStorage Archival Destruction
  • 32. © 2015 Scalar Decisions Inc. Not for distributionoutside of intended audience. Privacy Implications… In Ontario, there is no legislative prohibition against the storing of personal information outside of the province or Canada. However, the Acts and their regulations require government institutions to ensure that reasonable measures are in place to protect the privacy and security of the personal information in their custody or control. Ontario Information and Privacy Commissioner, Ann Cavoukian British Columbia and Nova Scotia have more restrictive terminology and requirements. With Amazon, Microsoft and Softlayer all offering datacenter “in- country” within this coming public sector fiscal year there are few barriers remaining to broad public sector cloud adoption for appropriate services.
  • 33. © 2015 Scalar Decisions Inc. Not for distributionoutside of intended audience. Mapping to Provided Controls & Measures With an understanding of required compliance elements, and an outline of identified & required controls we can then map to appropriate security implementations. 1) Identity controls via provider toolsets (such as Azure AD, or AWS IAM) or external tooling (Ping Identity or Okta) 2) Configuration scanning tools (such as CloudCheckr or Evident.io) 3) Cloud Access Security Brokers (Skyhigh, Netskope) for SaaS applications 4) Data inspection devices (provider supplied firewalls, PAN Virtual Edition, F5 virtual editions) 5) Encryption providers (provider based, or external key managers such as HyTrust, Gemmalto, etc.) ……
  • 34. © 2015 Scalar Decisions Inc. Not for distributionoutside of intended audience. Encryption… A quick note on encryption… Encryption is critical for cloud security & data controls. It should be widespread. The Cloud Security Alliance recommends all sensitive data be: a) Encrypted for data privacy with approved algorithms and long, random keys; b) Encrypted before it passes from the enterprise to the cloud provider; c) Should remain encrypted in transit, at rest, and in use; d) The cloud provider and its staff should never have access to decryption keys. But it is important to note that encryption should be viewed mostly as a time-lock. Destroying encryption keys is widely accepted as one possible form of data protection & destruction when using cloud providers however there is a reasonable possibility that with enough time (computational or technology advancement) and funding (state sponsored) most encryption can be broken eventually. Whether there is a reasonable concern associated with this depends on the data classification.
  • 36. © 2015 Scalar Decisions Inc. Not for distributionoutside of intended audience. Service Agreements, SLA’s and other fun…. Read them! Understand them! Regardless of deployment type (IaaS, PaaS, SaaS) there are a few constants: 1. Largely often non-negotiable, unless you are a very, very large scale user (most of us aren’t) 2. Largely deflect most liability back to the consumer 3. Largely define “jurisdictions” of best option to the provider, not consumer, your jurisdictional requirements WILLvary 4. May contain IP/data ownership clauses needing careful scrutiny 5. Often define rights to audit, disclosures, etc. 6. Contain minimum SLA’s, but often with minimally useful penalties or “make good” clauses ………… These are all very scary, and can quickly be used as an option to NOT pursue the cloud… but realistically these are all manageable, in the right context. The important element is risk management and contract management associated with them. Cloud is partially cheaper because of risk moved to clients, now you need to spend a bit to manage the risks moved to you!
  • 37. © 2015 Scalar Decisions Inc. Not for distributionoutside of intended audience. Advanced, Cloud-Enabled Security Services Defense based on: 1) Log, API and Analytics across environments, both on-premise and in-the-cloud 2) Rapid application of correlation analytics, with threat-feed intelligence across systems 3) Business-context driven escalations and prioritization 4) Comprehensive incident response with 7x24 reaction team, and access to deeply technical resources across both traditional and cloud-based environments 5) Leveraging top tier & native as appropriate tooling for both on-premise deployments and in-the-cloud deployments (ie: Splunk, Logrhythm, Cloudtrail, Cloudwatch)
  • 38. © 2015 Scalar Decisions Inc. Not for distributionoutside of intended audience. Public Cloud Defense - Automation & Recovery Architect for: 1) Defend the root account – common weakness in public-cloud deployments – through continuous monitoring & credential inspection 2) Rapid re-instantiation of resources through highly automated deployments (infrastructure-as-code) 3) Design for capture & forensics as a secondary aspect to recovery (get your environment back running rapidly, but capture the necessary elements to determine root-cause) 4) Rapidly iterate environments to enable rapid patching & remediation and leverage the power of infrastructure-on-demand environments 5) Perform offline forensics to adjust & harden configurations
  • 40. © 2015 Scalar Decisions Inc. Not for distributionoutside of intended audience. Amazon Web Services (AWS) - Resources Critical Documents: 1) https://aws.amazon.com/security/ 2) https://aws.amazon.com/compliance/ 3) https://cloudsecurityalliance.org/star-registrant/amazon-aws/ 4) https://d0.awsstatic.com/whitepapers/compliance/Intro_to_Security_by_Design.pdf 5) https://d0.awsstatic.com/whitepapers/compliance/AWS_Security_at_Scale_Governance_in_ AWS_Whitepaper.pdf 6) https://www.youtube.com/watch?v=YYiV_z9D2CE
  • 41. © 2015 Scalar Decisions Inc. Not for distributionoutside of intended audience. Microsoft Azure Critical Documents: 1) https://azure.microsoft.com/en-us/support/trust-center/ 2) http://download.microsoft.com/download/2/0/A/20A1529E-65CB-4266-8651- 1B57B0E42DAA/Protecting-Data-and-Privacy-in-the-Cloud.pdf 3) http://download.microsoft.com/download/1/6/0/160216AA-8445-480B-B60F- 5C8EC8067FCA/WindowsAzure-SecurityPrivacyCompliance.pdf