SlideShare une entreprise Scribd logo
1  sur  26
Peer Stories:
How RightScale Achieved
PCI Compliance on Cloud Infrastructure
Phil Cox

Rand Wacker

Director, Security &
Compliance
RightScale

VP, Products
CloudPassage

1
About The Presenters

Phil Cox

Rand Wacker

• RightScale, Director of
Security and Compliance

• CloudPassage, VP of Products

• Multiple PCI SIGs

• Cisco Security, IronPort, UC
Berkeley Security/Network Ops

• 20+ years InfoSec

Twitter: @randwacker

Twitter: @sec_prof

2
Introducing RightScale
RightScale pioneered IaaS cloud management
• Enables organizations to manage all of their cloud infrastructure
• Established in 2006, partners with all major cloud providers
• Has launched nearly 6 million servers with the RightScale
management platform

3
RightScale’s PCI Challenge
• Payment processing servers are in scope for PCI DSS
• Built and runs on Amazon Web Services (AWS) for the Infrastructure-asa-Service (IaaS) benefits
• Required PCI DSS compliance on AWS servers

With background as a Qualified
Security Assessor, confident PCI
DSS compliance could be achieved
in an IaaS environment

4
PCI Shared Responsibility (IaaS)
Data

– OS, application, and data
– And the compliance of these
components

App Code
App Framework
Operating System
Virtual Machine

– Infrastructure, networking,
storage, and virtualization
mechanism
– And the compliance of these
components

Hypervisor
Compute & Storage
Shared Network
Physical Facilities

5

Provider
Responsibility

• Service provider responsibility

Customer
Responsibility

• Customer responsibility
One Approach From the CSA
1.

Plan PCI DSS controls for as though your IaaS infrastructure
is your on-premise network

2.

Realize which elements you do not control since it is really not
an on-premise network (e.g. physical facilities)

3.

Talk with a service provider on whether they can and will
cover the elements they control for compliance

4.

Realize which controls don’t apply verbatim to the cloud
environment and figure out how to compensate

6
Options for Achieving PCI DSS
Compliance
• RightScale used its own proven cloud management
platform to deploy the PCI cloud servers in the AWS

• Still needed ongoing visibility and intrusion detection
capabilities in an IaaS environment. Either:
– Build it themselves using traditional security tools
– Buy a cloud security and compliance product

RightScale chose
CloudPassage Halo
to speed up efforts
7
Why RightScale Picked Halo
• Purpose-built for cloud
environments, requiring no development
resources
• Visibility into servers running within an
IaaS infrastructure
• Real-time monitoring and enforcement
• Support for any cloud platform

8
Benefits Experienced with Halo
• Saved Time and Resources
– Saved 6 months of development
time with a part-time staff person
– Takes 1/5 the management time
(2 hours a week with Halo versus
¼ FTE for other tools)

9
Benefits Experienced with Halo

• Established RightScale as a Trusted Advisor with
Customers
– Used as part of RightScale’s reference architecture for PCI DSS
compliance
– Runs on any virtual or cloud platform, protecting various customer
environments
10
Benefits Experienced with Halo
• Helped Enable Sales
– Went to market faster
– Enabled sales to pitch Halo along with RightScale for
compliance

11
Best Practices for PCI DSS Compliance
in IaaS
• Select from PCI Approved Service Provider with the
IaaS features you need
• Avoid storing the Primary Account Numbers (PANs)
• Use purpose-built cloud security products
(we recommend CloudPassage Halo)

12
Poll: PCI Status
• What is the status of your PCI initiative (IaaShosted or otherwise)?
–
–
–
–

We have passed our audits and are fully operational
We have an audit planned within the next year
We are investigating what it will take to be PCI compliant
No plans to go through PCI audits

13
Using CloudPassage Halo for
PCI Compliance

14
Halo is a security-as-a-service
that enables cloud adoption.
• Software-as-a-Service delivery
• Private cloud / SDDC / IaaS

• Elastic application hosting
• Big data analytics

15
Halo consolidates multiple critical
security & compliance controls.
Cloud Firewall
Automation

File Integrity
Monitoring

Multi-Factor
Authentication

Server Account
Managements
Security Event
Alerting

System & Application
Config Security
Vulnerability &
Patch Scanning

REST API
Integrations

16
Halo architecture is
highly
scalable, automated, and is
rapidly deployed.

www-1

mysql-1

bigdata-1

Halo

Halo

Halo

Halo Admin
Web Portal

Halo REST
API
gateway
17

Halo Security
Analytics
Engine
Halo works in any environment.

18
Example Security & Compliance
Automation with Halo
1

Halo activates firewall on boot, applies latest
policies, and orchestrates ongoing policy updates.

2

Halo secures privileged access via dynamic firewall
rules triggered by multi-factor user authentication.

3

Halo scans O.S. configurations for vulnerabilities
and continuously monitors O.S. state and activity.

4

Application configurations are scanned for
vulnerabilities and are continuously monitored.

5

Cryptographic integrity monitoring ensures app
code and binaries are not compromised.

6

Halo monitors system binary and config files for
correct ACLs, file integrity, and vulnerabilities.

7

Application data stores are monitored for access;
outbound firewall rules prevent data extrusion.

1

4
Application
Engine

5
Application Code

6

7
App Storage
Volume

System Storage
Volume

System Administration Services

2

Halo Daemon

Operating System
Workload VM Instance

3
Halo PCI Coverage

20
Halo Grid: PCI & SOC2

• Certified Level 1 Service Provider
– First entirely cloud-based vendor certified across multiple CSPs

– Hosted in Rackspace Cloud & AWS, with full DevOps automation

• Multiple customers recently cleared PCI QSA audits
• Recently announced: SOC2 certification
21
Poll: PCI & IaaS
• What percentage of your “in-scope” PCI systems
run in a private or public IaaS infrastructure?
– 100% of in-scope PCI systems on IaaS
– PCI in-scope systems run across mix of IaaS and traditional
infrastructures
– No in-scope systems on IaaS (all on traditional physical
hardware)
– N/A, we run no PCI in-scope systems

22
Wrapping Up

23
Summary
• PCI compliance on IaaS is possible
• Responsibility shared with cloud provider
• Security and management must be designed to
work in dynamic, highly automated clouds
• CloudPassage Halo designed and built to automate
compliance in today’s complex environments

24
Q&A and Resources

PCI Compliance in the
Public IaaS Cloud:
How I Did It
cloudpassage.com/pci-kit

blog.rightscale.com

25
Thank You!

Phil Cox

Rand Wacker

• Email: phil@rightscale.com

• Email: rand@cloudpassage.com

• Twitter: @sec_prof

• Twitter: @randwacker

www.rightscale.com

www.cloudpassage.com

26

Contenu connexe

En vedette

SANS 2013 Report on Critical Security Controls Survey: Moving From Awareness ...
SANS 2013 Report on Critical Security Controls Survey: Moving From Awareness ...SANS 2013 Report on Critical Security Controls Survey: Moving From Awareness ...
SANS 2013 Report on Critical Security Controls Survey: Moving From Awareness ...FireEye, Inc.
 
PCI Compliance on AWS - Evident.io @ AWS Pop-up Loft 2/26/2015
PCI Compliance on AWS - Evident.io @ AWS Pop-up Loft 2/26/2015PCI Compliance on AWS - Evident.io @ AWS Pop-up Loft 2/26/2015
PCI Compliance on AWS - Evident.io @ AWS Pop-up Loft 2/26/2015Evident.io
 
5 Reasons Cyber Attackers Target Small and Medium Businesses
5 Reasons Cyber Attackers Target Small and Medium Businesses 5 Reasons Cyber Attackers Target Small and Medium Businesses
5 Reasons Cyber Attackers Target Small and Medium Businesses FireEye, Inc.
 
M-Trends 2015 セキュリティ最前線からの視点
M-Trends 2015 セキュリティ最前線からの視点M-Trends 2015 セキュリティ最前線からの視点
M-Trends 2015 セキュリティ最前線からの視点FireEye, Inc.
 
SecDevOps: The New Black of IT
SecDevOps: The New Black of ITSecDevOps: The New Black of IT
SecDevOps: The New Black of ITCloudPassage
 
Ten Security Product Categories You've Probably Never Heard Of
Ten Security Product Categories You've Probably Never Heard OfTen Security Product Categories You've Probably Never Heard Of
Ten Security Product Categories You've Probably Never Heard OfAdrian Sanabria
 
Meeting PCI DSS Requirements with AWS and CloudPassage
Meeting PCI DSS Requirements with AWS and CloudPassageMeeting PCI DSS Requirements with AWS and CloudPassage
Meeting PCI DSS Requirements with AWS and CloudPassageCloudPassage
 
what is cloud security(Basics)
what is cloud security(Basics)what is cloud security(Basics)
what is cloud security(Basics)Santhosh Kumar
 
SANS 2013 Report: Digital Forensics and Incident Response Survey
SANS 2013 Report: Digital Forensics and Incident Response Survey  SANS 2013 Report: Digital Forensics and Incident Response Survey
SANS 2013 Report: Digital Forensics and Incident Response Survey FireEye, Inc.
 
M-Trends 2015 セキュリティ最前線からの視点
M-Trends 2015 セキュリティ最前線からの視点M-Trends 2015 セキュリティ最前線からの視点
M-Trends 2015 セキュリティ最前線からの視点FireEye, Inc.
 
Security and Compliance – Most Commonly Asked Questions - Technical 101
Security and Compliance – Most Commonly Asked Questions - Technical 101Security and Compliance – Most Commonly Asked Questions - Technical 101
Security and Compliance – Most Commonly Asked Questions - Technical 101Amazon Web Services
 
Cloud security enforcer - Quick steps to avoid the blind spots of shadow it
Cloud security enforcer - Quick steps to avoid the blind spots of shadow itCloud security enforcer - Quick steps to avoid the blind spots of shadow it
Cloud security enforcer - Quick steps to avoid the blind spots of shadow itIBM Security
 
Connected Cares: The Open Road For Hackers
Connected Cares: The Open Road For HackersConnected Cares: The Open Road For Hackers
Connected Cares: The Open Road For HackersFireEye, Inc.
 
CSA colorado 2016 presentation CloudPassage
CSA colorado 2016 presentation CloudPassageCSA colorado 2016 presentation CloudPassage
CSA colorado 2016 presentation CloudPassageTrish McGinity, CCSK
 
2013 Incident Response Survey
2013 Incident Response Survey2013 Incident Response Survey
2013 Incident Response SurveyFireEye, Inc.
 

En vedette (16)

SANS 2013 Report on Critical Security Controls Survey: Moving From Awareness ...
SANS 2013 Report on Critical Security Controls Survey: Moving From Awareness ...SANS 2013 Report on Critical Security Controls Survey: Moving From Awareness ...
SANS 2013 Report on Critical Security Controls Survey: Moving From Awareness ...
 
PCI Compliance on AWS - Evident.io @ AWS Pop-up Loft 2/26/2015
PCI Compliance on AWS - Evident.io @ AWS Pop-up Loft 2/26/2015PCI Compliance on AWS - Evident.io @ AWS Pop-up Loft 2/26/2015
PCI Compliance on AWS - Evident.io @ AWS Pop-up Loft 2/26/2015
 
5 Reasons Cyber Attackers Target Small and Medium Businesses
5 Reasons Cyber Attackers Target Small and Medium Businesses 5 Reasons Cyber Attackers Target Small and Medium Businesses
5 Reasons Cyber Attackers Target Small and Medium Businesses
 
M-Trends 2015 セキュリティ最前線からの視点
M-Trends 2015 セキュリティ最前線からの視点M-Trends 2015 セキュリティ最前線からの視点
M-Trends 2015 セキュリティ最前線からの視点
 
SecDevOps: The New Black of IT
SecDevOps: The New Black of ITSecDevOps: The New Black of IT
SecDevOps: The New Black of IT
 
Ten Security Product Categories You've Probably Never Heard Of
Ten Security Product Categories You've Probably Never Heard OfTen Security Product Categories You've Probably Never Heard Of
Ten Security Product Categories You've Probably Never Heard Of
 
Dns2
Dns2Dns2
Dns2
 
Meeting PCI DSS Requirements with AWS and CloudPassage
Meeting PCI DSS Requirements with AWS and CloudPassageMeeting PCI DSS Requirements with AWS and CloudPassage
Meeting PCI DSS Requirements with AWS and CloudPassage
 
what is cloud security(Basics)
what is cloud security(Basics)what is cloud security(Basics)
what is cloud security(Basics)
 
SANS 2013 Report: Digital Forensics and Incident Response Survey
SANS 2013 Report: Digital Forensics and Incident Response Survey  SANS 2013 Report: Digital Forensics and Incident Response Survey
SANS 2013 Report: Digital Forensics and Incident Response Survey
 
M-Trends 2015 セキュリティ最前線からの視点
M-Trends 2015 セキュリティ最前線からの視点M-Trends 2015 セキュリティ最前線からの視点
M-Trends 2015 セキュリティ最前線からの視点
 
Security and Compliance – Most Commonly Asked Questions - Technical 101
Security and Compliance – Most Commonly Asked Questions - Technical 101Security and Compliance – Most Commonly Asked Questions - Technical 101
Security and Compliance – Most Commonly Asked Questions - Technical 101
 
Cloud security enforcer - Quick steps to avoid the blind spots of shadow it
Cloud security enforcer - Quick steps to avoid the blind spots of shadow itCloud security enforcer - Quick steps to avoid the blind spots of shadow it
Cloud security enforcer - Quick steps to avoid the blind spots of shadow it
 
Connected Cares: The Open Road For Hackers
Connected Cares: The Open Road For HackersConnected Cares: The Open Road For Hackers
Connected Cares: The Open Road For Hackers
 
CSA colorado 2016 presentation CloudPassage
CSA colorado 2016 presentation CloudPassageCSA colorado 2016 presentation CloudPassage
CSA colorado 2016 presentation CloudPassage
 
2013 Incident Response Survey
2013 Incident Response Survey2013 Incident Response Survey
2013 Incident Response Survey
 

Plus de CloudPassage

Best Practices for Workload Security: Securing Servers in Modern Data Center ...
Best Practices for Workload Security: Securing Servers in Modern Data Center ...Best Practices for Workload Security: Securing Servers in Modern Data Center ...
Best Practices for Workload Security: Securing Servers in Modern Data Center ...CloudPassage
 
CloudPassage Careers
CloudPassage CareersCloudPassage Careers
CloudPassage CareersCloudPassage
 
Transforming the CSO Role to Business Enabler
Transforming the CSO Role to Business EnablerTransforming the CSO Role to Business Enabler
Transforming the CSO Role to Business EnablerCloudPassage
 
Rethinking Security: The Cloud Infrastructure Effect
Rethinking Security: The Cloud Infrastructure EffectRethinking Security: The Cloud Infrastructure Effect
Rethinking Security: The Cloud Infrastructure EffectCloudPassage
 
Webinar compiled powerpoint
Webinar compiled powerpointWebinar compiled powerpoint
Webinar compiled powerpointCloudPassage
 
Security and Compliance for Enterprise Cloud Infrastructure
Security and Compliance for Enterprise Cloud InfrastructureSecurity and Compliance for Enterprise Cloud Infrastructure
Security and Compliance for Enterprise Cloud InfrastructureCloudPassage
 
Technologies You Need to Safely Use the Cloud
Technologies You Need to Safely Use the CloudTechnologies You Need to Safely Use the Cloud
Technologies You Need to Safely Use the CloudCloudPassage
 
Cloud Security: Make Your CISO Successful
Cloud Security: Make Your CISO SuccessfulCloud Security: Make Your CISO Successful
Cloud Security: Make Your CISO SuccessfulCloudPassage
 
Secure Cloud Development Resources with DevOps
Secure Cloud Development Resources with DevOpsSecure Cloud Development Resources with DevOps
Secure Cloud Development Resources with DevOpsCloudPassage
 
45 Minutes to PCI Compliance in the Cloud
45 Minutes to PCI Compliance in the Cloud45 Minutes to PCI Compliance in the Cloud
45 Minutes to PCI Compliance in the CloudCloudPassage
 
Comprehensive Cloud Security Requires an Automated Approach
Comprehensive Cloud Security Requires an Automated ApproachComprehensive Cloud Security Requires an Automated Approach
Comprehensive Cloud Security Requires an Automated ApproachCloudPassage
 
Security that works with, not against, your SaaS business
Security that works with, not against, your SaaS businessSecurity that works with, not against, your SaaS business
Security that works with, not against, your SaaS businessCloudPassage
 
Integrating Security into DevOps
Integrating Security into DevOpsIntegrating Security into DevOps
Integrating Security into DevOpsCloudPassage
 
What You Need To Know About The New PCI Cloud Guidelines
What You Need To Know About The New PCI Cloud GuidelinesWhat You Need To Know About The New PCI Cloud Guidelines
What You Need To Know About The New PCI Cloud GuidelinesCloudPassage
 
What You Haven't Heard (Yet) About Cloud Security
What You Haven't Heard (Yet) About Cloud SecurityWhat You Haven't Heard (Yet) About Cloud Security
What You Haven't Heard (Yet) About Cloud SecurityCloudPassage
 
Delivering Secure OpenStack IaaS for SaaS Products
Delivering Secure OpenStack IaaS for SaaS ProductsDelivering Secure OpenStack IaaS for SaaS Products
Delivering Secure OpenStack IaaS for SaaS ProductsCloudPassage
 
CloudPassage Overview
CloudPassage OverviewCloudPassage Overview
CloudPassage OverviewCloudPassage
 
Halo Installfest Slides
Halo Installfest SlidesHalo Installfest Slides
Halo Installfest SlidesCloudPassage
 
Automating Security for the Cloud - Make it Easy, Make it Safe
Automating Security for the Cloud - Make it Easy, Make it SafeAutomating Security for the Cloud - Make it Easy, Make it Safe
Automating Security for the Cloud - Make it Easy, Make it SafeCloudPassage
 

Plus de CloudPassage (20)

Best Practices for Workload Security: Securing Servers in Modern Data Center ...
Best Practices for Workload Security: Securing Servers in Modern Data Center ...Best Practices for Workload Security: Securing Servers in Modern Data Center ...
Best Practices for Workload Security: Securing Servers in Modern Data Center ...
 
CloudPassage Careers
CloudPassage CareersCloudPassage Careers
CloudPassage Careers
 
Transforming the CSO Role to Business Enabler
Transforming the CSO Role to Business EnablerTransforming the CSO Role to Business Enabler
Transforming the CSO Role to Business Enabler
 
Rethinking Security: The Cloud Infrastructure Effect
Rethinking Security: The Cloud Infrastructure EffectRethinking Security: The Cloud Infrastructure Effect
Rethinking Security: The Cloud Infrastructure Effect
 
Webinar compiled powerpoint
Webinar compiled powerpointWebinar compiled powerpoint
Webinar compiled powerpoint
 
Security and Compliance for Enterprise Cloud Infrastructure
Security and Compliance for Enterprise Cloud InfrastructureSecurity and Compliance for Enterprise Cloud Infrastructure
Security and Compliance for Enterprise Cloud Infrastructure
 
Technologies You Need to Safely Use the Cloud
Technologies You Need to Safely Use the CloudTechnologies You Need to Safely Use the Cloud
Technologies You Need to Safely Use the Cloud
 
Cloud Security: Make Your CISO Successful
Cloud Security: Make Your CISO SuccessfulCloud Security: Make Your CISO Successful
Cloud Security: Make Your CISO Successful
 
Secure Cloud Development Resources with DevOps
Secure Cloud Development Resources with DevOpsSecure Cloud Development Resources with DevOps
Secure Cloud Development Resources with DevOps
 
45 Minutes to PCI Compliance in the Cloud
45 Minutes to PCI Compliance in the Cloud45 Minutes to PCI Compliance in the Cloud
45 Minutes to PCI Compliance in the Cloud
 
Comprehensive Cloud Security Requires an Automated Approach
Comprehensive Cloud Security Requires an Automated ApproachComprehensive Cloud Security Requires an Automated Approach
Comprehensive Cloud Security Requires an Automated Approach
 
Security that works with, not against, your SaaS business
Security that works with, not against, your SaaS businessSecurity that works with, not against, your SaaS business
Security that works with, not against, your SaaS business
 
Integrating Security into DevOps
Integrating Security into DevOpsIntegrating Security into DevOps
Integrating Security into DevOps
 
What You Need To Know About The New PCI Cloud Guidelines
What You Need To Know About The New PCI Cloud GuidelinesWhat You Need To Know About The New PCI Cloud Guidelines
What You Need To Know About The New PCI Cloud Guidelines
 
What You Haven't Heard (Yet) About Cloud Security
What You Haven't Heard (Yet) About Cloud SecurityWhat You Haven't Heard (Yet) About Cloud Security
What You Haven't Heard (Yet) About Cloud Security
 
Delivering Secure OpenStack IaaS for SaaS Products
Delivering Secure OpenStack IaaS for SaaS ProductsDelivering Secure OpenStack IaaS for SaaS Products
Delivering Secure OpenStack IaaS for SaaS Products
 
CloudPassage Overview
CloudPassage OverviewCloudPassage Overview
CloudPassage Overview
 
PCI and the Cloud
PCI and the CloudPCI and the Cloud
PCI and the Cloud
 
Halo Installfest Slides
Halo Installfest SlidesHalo Installfest Slides
Halo Installfest Slides
 
Automating Security for the Cloud - Make it Easy, Make it Safe
Automating Security for the Cloud - Make it Easy, Make it SafeAutomating Security for the Cloud - Make it Easy, Make it Safe
Automating Security for the Cloud - Make it Easy, Make it Safe
 

Dernier

Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 

Dernier (20)

Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 

Peer Stories: How RightScale Achieved PCI on Cloud Infrastructure

  • 1. Peer Stories: How RightScale Achieved PCI Compliance on Cloud Infrastructure Phil Cox Rand Wacker Director, Security & Compliance RightScale VP, Products CloudPassage 1
  • 2. About The Presenters Phil Cox Rand Wacker • RightScale, Director of Security and Compliance • CloudPassage, VP of Products • Multiple PCI SIGs • Cisco Security, IronPort, UC Berkeley Security/Network Ops • 20+ years InfoSec Twitter: @randwacker Twitter: @sec_prof 2
  • 3. Introducing RightScale RightScale pioneered IaaS cloud management • Enables organizations to manage all of their cloud infrastructure • Established in 2006, partners with all major cloud providers • Has launched nearly 6 million servers with the RightScale management platform 3
  • 4. RightScale’s PCI Challenge • Payment processing servers are in scope for PCI DSS • Built and runs on Amazon Web Services (AWS) for the Infrastructure-asa-Service (IaaS) benefits • Required PCI DSS compliance on AWS servers With background as a Qualified Security Assessor, confident PCI DSS compliance could be achieved in an IaaS environment 4
  • 5. PCI Shared Responsibility (IaaS) Data – OS, application, and data – And the compliance of these components App Code App Framework Operating System Virtual Machine – Infrastructure, networking, storage, and virtualization mechanism – And the compliance of these components Hypervisor Compute & Storage Shared Network Physical Facilities 5 Provider Responsibility • Service provider responsibility Customer Responsibility • Customer responsibility
  • 6. One Approach From the CSA 1. Plan PCI DSS controls for as though your IaaS infrastructure is your on-premise network 2. Realize which elements you do not control since it is really not an on-premise network (e.g. physical facilities) 3. Talk with a service provider on whether they can and will cover the elements they control for compliance 4. Realize which controls don’t apply verbatim to the cloud environment and figure out how to compensate 6
  • 7. Options for Achieving PCI DSS Compliance • RightScale used its own proven cloud management platform to deploy the PCI cloud servers in the AWS • Still needed ongoing visibility and intrusion detection capabilities in an IaaS environment. Either: – Build it themselves using traditional security tools – Buy a cloud security and compliance product RightScale chose CloudPassage Halo to speed up efforts 7
  • 8. Why RightScale Picked Halo • Purpose-built for cloud environments, requiring no development resources • Visibility into servers running within an IaaS infrastructure • Real-time monitoring and enforcement • Support for any cloud platform 8
  • 9. Benefits Experienced with Halo • Saved Time and Resources – Saved 6 months of development time with a part-time staff person – Takes 1/5 the management time (2 hours a week with Halo versus ¼ FTE for other tools) 9
  • 10. Benefits Experienced with Halo • Established RightScale as a Trusted Advisor with Customers – Used as part of RightScale’s reference architecture for PCI DSS compliance – Runs on any virtual or cloud platform, protecting various customer environments 10
  • 11. Benefits Experienced with Halo • Helped Enable Sales – Went to market faster – Enabled sales to pitch Halo along with RightScale for compliance 11
  • 12. Best Practices for PCI DSS Compliance in IaaS • Select from PCI Approved Service Provider with the IaaS features you need • Avoid storing the Primary Account Numbers (PANs) • Use purpose-built cloud security products (we recommend CloudPassage Halo) 12
  • 13. Poll: PCI Status • What is the status of your PCI initiative (IaaShosted or otherwise)? – – – – We have passed our audits and are fully operational We have an audit planned within the next year We are investigating what it will take to be PCI compliant No plans to go through PCI audits 13
  • 14. Using CloudPassage Halo for PCI Compliance 14
  • 15. Halo is a security-as-a-service that enables cloud adoption. • Software-as-a-Service delivery • Private cloud / SDDC / IaaS • Elastic application hosting • Big data analytics 15
  • 16. Halo consolidates multiple critical security & compliance controls. Cloud Firewall Automation File Integrity Monitoring Multi-Factor Authentication Server Account Managements Security Event Alerting System & Application Config Security Vulnerability & Patch Scanning REST API Integrations 16
  • 17. Halo architecture is highly scalable, automated, and is rapidly deployed. www-1 mysql-1 bigdata-1 Halo Halo Halo Halo Admin Web Portal Halo REST API gateway 17 Halo Security Analytics Engine
  • 18. Halo works in any environment. 18
  • 19. Example Security & Compliance Automation with Halo 1 Halo activates firewall on boot, applies latest policies, and orchestrates ongoing policy updates. 2 Halo secures privileged access via dynamic firewall rules triggered by multi-factor user authentication. 3 Halo scans O.S. configurations for vulnerabilities and continuously monitors O.S. state and activity. 4 Application configurations are scanned for vulnerabilities and are continuously monitored. 5 Cryptographic integrity monitoring ensures app code and binaries are not compromised. 6 Halo monitors system binary and config files for correct ACLs, file integrity, and vulnerabilities. 7 Application data stores are monitored for access; outbound firewall rules prevent data extrusion. 1 4 Application Engine 5 Application Code 6 7 App Storage Volume System Storage Volume System Administration Services 2 Halo Daemon Operating System Workload VM Instance 3
  • 21. Halo Grid: PCI & SOC2 • Certified Level 1 Service Provider – First entirely cloud-based vendor certified across multiple CSPs – Hosted in Rackspace Cloud & AWS, with full DevOps automation • Multiple customers recently cleared PCI QSA audits • Recently announced: SOC2 certification 21
  • 22. Poll: PCI & IaaS • What percentage of your “in-scope” PCI systems run in a private or public IaaS infrastructure? – 100% of in-scope PCI systems on IaaS – PCI in-scope systems run across mix of IaaS and traditional infrastructures – No in-scope systems on IaaS (all on traditional physical hardware) – N/A, we run no PCI in-scope systems 22
  • 24. Summary • PCI compliance on IaaS is possible • Responsibility shared with cloud provider • Security and management must be designed to work in dynamic, highly automated clouds • CloudPassage Halo designed and built to automate compliance in today’s complex environments 24
  • 25. Q&A and Resources PCI Compliance in the Public IaaS Cloud: How I Did It cloudpassage.com/pci-kit blog.rightscale.com 25
  • 26. Thank You! Phil Cox Rand Wacker • Email: phil@rightscale.com • Email: rand@cloudpassage.com • Twitter: @sec_prof • Twitter: @randwacker www.rightscale.com www.cloudpassage.com 26