SlideShare a Scribd company logo
1 of 32
Download to read offline
© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Protecting what matters...
... An enterprise approach to cloud security
Ed Reynolds
HP Fellow, CISSP, CCSK
HP Enterprise Security Services
© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.2
Today’s agenda
TRENDS
PERSPECTIVES
GUIDANCE
© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.3
Worldwide Security Trends & Implications
Cyber threat 56%of organizations have been
the target of a cyber attack
Extended supply chain
44% of all data breach involved
third-party mistakes
Financial loss $8.6M average cost associated
with data breach
Cost of protection 8% of total IT budget
spent on security
Reputation damage 30% market cap reduction due to
recent events
Source: HP internal data, Forrester Research, Ponemon Institute, Coleman Parkes Research
Key Points
• Security is a board of
directors concern
• Security leadership is under
immense pressure
• Need for greater visibility of
business risks and to make
sound security investment
choicesReactive vs. proactive
60% of enterprises spend more time
and money on reactive measures vs.
proactive risk mgmt
© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.4
Managing security challenges
Today, security is a
board-level agenda item
#1 Board Identified Risk:
Reputational Damage
Source: EisnerAmper LLP, February 2011 - Second Annual Board of Directors Survey - 2011: Concerns About Risks Confronting Boards
© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.5
Managing Risk: Current Challenges
Primary Challenges
Nature & Motivation of Attacks
(Fame to national enemies)1
Transformation of Enterprise IT
(Delivery and consumption changes)2
Traditional DC Private Cloud Managed Cloud Public Cloud
Network Storage Servers
Delivery
Regulatory Pressures
(Increasing cost and complexity)3
A New Type of Adversary
Basel III
Enhanced Regulatory Environment
© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.6
HP research: Top concerns for IT executives
67% 66% 63% 54%
Extremely concerned Somewhat concerned Not very concerned
Data privacy
and information
breaches
Lack of skilled
resources to effectively
manage security
Risk associated with more
consumption of apps/IT
services across public,
private & hybrid cloud
Risk associated with
more consumption of
apps/IT services
Source: HP 20:20 CIO Report, 2012
© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.7
Cloud services: adoption is tempered by uncertainty
Security or related component is #1 concern/issue for most enterprises
LOB/IT CIO
Security
Performance
Reliability
Scalability
Service levels
Data security
& protection
Compliance
Auditing
Cost
Governance
Control
Availability
© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.8
CSA: Cloud Computing Top Threats for 2013
Top Threats for 2013
1.Data Breaches
2.Data Loss
3.Account or Service Hijacking
4.Insecure Interfaces and APIs
5.Denial of Service
6.Malicious Insiders
7.Abuse of Cloud Services
8.Insufficient Due Diligence
9.Shared Technology Vulnerabilities
Security for
the cloud
http://cloudsecurityalliance.org/
1. HP’s Rafal Los co-chaired the CSA Top Threats working group
2. HP selected by CSA as Master Training Partner in APJ (initial region)
© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.9
What do we mean by “cloud security”?
• Security for the cloud? Securely use cloud (consumers)
• Security from the cloud? Security-as-a-Service
• Security in the cloud? Embedded security (providers)
• Security across clouds? Hybrid models, interoperability
1
2
3
4
© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.10
Cloud models require different security solutions…
Attack
surface
increases
composition of two
or more clouds
Hybrid cloud
Sold to the public,
mega-scale infrastructure
Public cloud
Shared infrastructure for
specific community
Community cloud
Enterprise-owned
or leased
Private cloud
© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.11
... and different roles & responsibilities regarding security
Cloud
SaaS
PaaS
IaaS
SaaS: Software as a Service, generally provides
application, data and infrastructure security,
with varying degrees of compliance
PaaS: Platform as a Service, may provide some
additional security functions for IDM and secure
application development – security falls to app
developer and customer IT operations
IaaS: Infrastructure as a Service – providers generally
offer basic network & infrastructure security, firewalls,
some tools – but customer is generally responsible
for implementation,operations, monitoring
© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.12
But what is really new about “cloud security”?
Many traditional security concerns are recast as a “cloud problem”. . .
• Many “cloud security incidents“ are issues with
web apps and data-hosting, but at greater scale…
- e.g. Phishing, downtime, data loss, weak passwords, compromised hosts running botnets, etc …
• Unexpected side channels and covert channels arising from shared-resource
environments in public services
- Activity patterns need to be protected in addition to apps and data
• Reputation fate sharing: possible blacklisting or service disruption due to “bad neighbors”
- Need “mutual auditability” (providers need to audit/monitor users)
• Longer trust chains: {SaaS to PaaS to IaaS}
– Y.Chen, et.al, “What’s New About Cloud Computing Security?” UC Berkeley, Jan.20, 2010
© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
“It’snotaboutcloudsecurity–
it’saboutsecuringyour
enterprise’suseofcloud-based
services”
“Cloudsecuritybeginswith,
andaddsto,well-defined
enterprisesecurity”
Perspectives
© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.14
Enterprise approach to cloud security
HP Enterprise Security Services Whitepaper
1. Establish a risk-based approach
2. Design applications to run in the cloud
3. Ongoing auditing and management
© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.15
HP approach to complete information security
Establish a risk-based approach
Actionable
Security
Intelligence
Moving from Reactive to Proactive Information Security & Risk Management
Assess security investments and posture
Transform from silos to a comprehensive view
Optimize to proactively improve security posture
Manage security effectively
Establish a
risk based
approach
© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.16
HP Cloud Security Risk and Control Assessment
Stage 1:
Assessment
Workshop
Business
Issues
Discovery
Strategic
Control Plan
Risk
Assessment
Scope
Engagement with senior management
Stage 2:
Risk
Assessment
Engagement with business-level security
Business
Risk
Assessment
Asset Risk
Assessment
Assets
Prioritized
by Risk
Stage 3:
Controls
Assessment
Cloud
Control
Measures
Consensus
Assessment
Prioritized
Security
Control Plan
Engagement with operational level security
Establish a
risk based
approach
© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.17
Are your applications & data…
The path of least resistance?
Design apps to
run in cloud
© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.18
Secure SDLC: protect data & IP Design apps to
run in cloud
Attacker
Software & data
Hardware
Network
Intellectual
property
Customer
data
Business
processes
Trade
secrets
© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.19
The National Vulnerability Database (DHS/US-CERT)
• Lists >47,000 documented vulnerabilities
Undiscovered/unreported (0-day)
vulnerabilities are huge
• 20X1 multiplier
• 47,000 x 20 = estimated 940,000 vulnerabilities
replicated in many products
The risks
Vulnerabilities (security defects)
Quality issue: many more “underwater” than those reported “above the water”
Greater than 80% of attacks
happen at the application layer
Notes: HP research and 1“Public Vulnerabilities Are Tip of the Iceberg,” CNET News, June 1, 2007
Design apps to
run in cloud
© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.20
The National Vulnerability Database (DHS/US-CERT)
• Lists >47,000 documented vulnerabilities
Undiscovered/unreported (0-day)
vulnerabilities are huge
• 20X1 multiplier
• 47,000 x 20 = estimated 940,000 vulnerabilities
replicated in many products
The risks
Vulnerabilities (security defects)
Quality issue: many more “underwater” than those reported “above the water”
But <1% of security spend is
allocated to application security !!!
Notes: HP research and 1“Public Vulnerabilities Are Tip of the Iceberg,” CNET News, June 1, 2007
Design apps to
run in cloud
© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.21
Designing applications to run in the cloud
• Embed security in application architecture
• Address new attack surfaces early in design
• Encrypt “everything” by default – end-to-end
• Adopt new mindset to privacy
• Bounding processes around PII
(e.g. PCI tokenization example)
• Build in audit trails for forensics
• Conduct 3rd party reviews (CATA, Pen.Test)
Design apps to
run in cloud
© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.22
Securing “data-in-process,” in addition to “at rest” and “in motion”
Encryption advances & alternatives∗
Advances
Broadcast encryption: encryption for
groups and memberships
Searchable symmetric encryption:
securely search encrypted data
Identity-based encryption: ad-hoc PKI,
user chooses his own public key
Predicate encryption: fine-grained PKI
Homomorphic encryption: emerging
techniques to compute on ciphertext
* Source: CSA Guidance v3.0Chapter 11
Alternatives*
Tokenization. Data sent to the public cloud
is altered (tokenized) and contains a reference
to the data residing in the private cloud.
Data anonymization. Personally identifiable
information (PII) is stripped before processing.
(Watch assumptions)
Utilizing cloud database controls. Using
(fine-grained) access controls at database
layer to provide segregation.
Design apps to
run in cloud
© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.23
Architecting Security into Applications
Security assurance thought leadership
Requirements/
architecture & design
• Security requirements gap analysis
• Security designed in
• Dramatically reduces risk of vulnerabilities
• More complete and less expensive assurance
• Guides late lifecycle assurance
• The best response to a greater threat
Reactive
Traditional
Proactive
Extending security assurance
Higher ROI
The traditional approach is backwards.
It can never solve the problem by itself
but works great after proactively
prioritizing late life cycle
assurance focus
Post-release
First, people found
vulnerabilities,
patched, and issued
bulletins
Integration/
penetration test
• In-house, more proactive
• More expensive
in isolation
Coding
• Security code scanners
• Code review
• Better when design
supports security
Design apps to
run in cloud
© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.24
Applications rationalisation
Cloud-specific
workload analysis
Risk analysis
& TCO
BPA
HP cloud applications transformation
Level 2 transformation strategy determination (x to x)
Level 1 transformation strategy determination (RE’s)
App
migration
Cloud
service
types
Cloud
deployment
models
IaaS PaaS SaaS
Public Private
Virtual
private
Dedicated/hosted
(retain, retire)
Suitable
for SaaS
Suitable for
preferred target/
public cloud
Need
modernisation
analysis
Not suitable
for cloud
Cloud suitability mapping
• Replace
• Re-architect
• Re-factor
• Re-host
App
migration
Apps
Design apps to
run in cloud
© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.25
Applications modernization strategy
Re-factor Re-architect
Re-host Replace
Application
cloud
strategy
Codingeffort
New value generation potential
IaaS SaaS
PaaS
PaaS
SOA
Design apps to
run in cloud
© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.26
Auditing cloud services
Continuous compliance monitoring is essential
to securely delivering cloud services and ensuring compliance
• Cloud Services are inherently dynamic. The dynamic provisioning and de-provisioning
of resources is a key part of the Cloud value proposition and business model
• Automation for operations and asset management are essential in this
dynamic environment
• Verification of compliance with policy and legislation – such as the EU Data Protection
Directive, GLBA, HIPAA, and Export compliance controls like ITAR –
requires continuously running automation
Yearly or monthly audits are irrelevant in an environment that changes
completely on a daily or hourly basis
Ongoing auditing
& management
© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.27
Are we secure?
Continuous security monitoring Ongoing auditing
& management
© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.28
What about infrastructure and network security?
• Infrastructure and network security are
critical areas for cloud-based solutions
• Enterprises have little or no influence on a
provider’s implementation and controls in
these areas
• A thorough review of the service provider’s
policies should be completed as part of the
due diligence process during contract
negotiation and service sourcing
© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.29
5 key ways to reduce risk
1. Understand your risk profile
2. Architect for the cloud
3. Robust identity, access management
4. Confirm legal, compliance obligations, due diligence
5. “Clear Responsibility” – CSP, Customer, Both
© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.30
Cloud security: guidance for critical areas
Architecture
1. Cloud computing architectural framework
Governance
2. Governance and enterprise risk management
3. Legal issues: contracts and electronic discovery
4. Compliance and audit management
5. Information management and data security
6. Interoperability and portability
Operations
7. Traditional security, business continuity,
and disaster recovery
8. Data center operations
9. Incident response
10. Application security
11. Encryption and key management
12. Identity, entitlement, and access management
13. Virtualization
Security for
the cloud
http://cloudsecurityalliance.org/
https://ccsk.cloudsecurityalliance.org/
© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.31
Final thoughts
 Recognize the threats have changed and become
‘industrialized’
 Employ comprehensive and integrated approach to
enterprise security & risk management
 Conduct security threat analyses for all critical
applications
 Design in security from the beginning: essential
for public cloud usage
 Be vigilant: continual compliance monitoring and
audits, intrusion testing, verifiable backups…
© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Thankyou
Whitepaper: bit.ly/hpcloudsecurity
Email: ed.reynolds@hp.com
URL: hp.com/enterprise/security

More Related Content

What's hot

Multi-Cloud, Multi-Network Cyber Awareness, Monitoring and Management by Fran...
Multi-Cloud, Multi-Network Cyber Awareness, Monitoring and Management by Fran...Multi-Cloud, Multi-Network Cyber Awareness, Monitoring and Management by Fran...
Multi-Cloud, Multi-Network Cyber Awareness, Monitoring and Management by Fran...
TheAnfieldGroup
 
Cloud Computing Risk Management (Multi Venue)
Cloud Computing Risk Management (Multi Venue)Cloud Computing Risk Management (Multi Venue)
Cloud Computing Risk Management (Multi Venue)
Brian K. Dickard
 
Migrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Migrating Critical Applications To The Cloud - ISACA Seattle - SanitizedMigrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Migrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Norm Barber
 
Information and Identity Protection - Data Loss Prevention, Encryption, User ...
Information and Identity Protection - Data Loss Prevention, Encryption, User ...Information and Identity Protection - Data Loss Prevention, Encryption, User ...
Information and Identity Protection - Data Loss Prevention, Encryption, User ...
Symantec APJ
 

What's hot (20)

Ohm2013 cloud security 101 slideshare
Ohm2013 cloud security 101 slideshareOhm2013 cloud security 101 slideshare
Ohm2013 cloud security 101 slideshare
 
Key Security Insights: Examining 2014 to predict emerging threats
Key Security Insights: Examining 2014 to predict emerging threats Key Security Insights: Examining 2014 to predict emerging threats
Key Security Insights: Examining 2014 to predict emerging threats
 
Humans Are The Weakest Link – How DLP Can Help
Humans Are The Weakest Link – How DLP Can HelpHumans Are The Weakest Link – How DLP Can Help
Humans Are The Weakest Link – How DLP Can Help
 
Adapting for the Internet of Things
Adapting for the Internet of ThingsAdapting for the Internet of Things
Adapting for the Internet of Things
 
Understanding cyber resilience
Understanding cyber resilienceUnderstanding cyber resilience
Understanding cyber resilience
 
J3602068071
J3602068071J3602068071
J3602068071
 
EMEA10: Trepidation in Moving to the Cloud
EMEA10: Trepidation in Moving to the CloudEMEA10: Trepidation in Moving to the Cloud
EMEA10: Trepidation in Moving to the Cloud
 
Multi-Cloud, Multi-Network Cyber Awareness, Monitoring and Management by Fran...
Multi-Cloud, Multi-Network Cyber Awareness, Monitoring and Management by Fran...Multi-Cloud, Multi-Network Cyber Awareness, Monitoring and Management by Fran...
Multi-Cloud, Multi-Network Cyber Awareness, Monitoring and Management by Fran...
 
MT74 - Is Your Tech Support Keeping Up with Your Instr Tech
MT74 - Is Your Tech Support Keeping Up with Your Instr TechMT74 - Is Your Tech Support Keeping Up with Your Instr Tech
MT74 - Is Your Tech Support Keeping Up with Your Instr Tech
 
A Smarter, More Secure Internet of Things
A Smarter, More Secure Internet of Things A Smarter, More Secure Internet of Things
A Smarter, More Secure Internet of Things
 
Reddix Group - Quantum AI - Presentation
Reddix Group - Quantum AI - PresentationReddix Group - Quantum AI - Presentation
Reddix Group - Quantum AI - Presentation
 
Cloud Data Protection for the Masses
Cloud Data Protection for the MassesCloud Data Protection for the Masses
Cloud Data Protection for the Masses
 
Security Strategies for Success
Security Strategies for SuccessSecurity Strategies for Success
Security Strategies for Success
 
Cloud Computing Risk Management (Multi Venue)
Cloud Computing Risk Management (Multi Venue)Cloud Computing Risk Management (Multi Venue)
Cloud Computing Risk Management (Multi Venue)
 
Cloud is not an option, but is security?
Cloud is not an option, but is security?Cloud is not an option, but is security?
Cloud is not an option, but is security?
 
Migrating Critical Applications to the Cloud - isaca seattle - sanitized
Migrating Critical Applications to the Cloud - isaca seattle - sanitizedMigrating Critical Applications to the Cloud - isaca seattle - sanitized
Migrating Critical Applications to the Cloud - isaca seattle - sanitized
 
Migrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Migrating Critical Applications To The Cloud - ISACA Seattle - SanitizedMigrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Migrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
 
Cloud Governance Framework - Required Cloud Sourcing Capabilities
Cloud Governance Framework - Required Cloud Sourcing CapabilitiesCloud Governance Framework - Required Cloud Sourcing Capabilities
Cloud Governance Framework - Required Cloud Sourcing Capabilities
 
Information and Identity Protection - Data Loss Prevention, Encryption, User ...
Information and Identity Protection - Data Loss Prevention, Encryption, User ...Information and Identity Protection - Data Loss Prevention, Encryption, User ...
Information and Identity Protection - Data Loss Prevention, Encryption, User ...
 
Get your house on order
Get your house on orderGet your house on order
Get your house on order
 

Viewers also liked

Focus Group Open Source 22.11.2011 Boris Sofronic
Focus Group Open Source 22.11.2011 Boris SofronicFocus Group Open Source 22.11.2011 Boris Sofronic
Focus Group Open Source 22.11.2011 Boris Sofronic
Roberto Galoppini
 
Utilizzo del Software OpenStack per la realizzazione di piattaforme "Cloud" -...
Utilizzo del Software OpenStack per la realizzazione di piattaforme "Cloud" -...Utilizzo del Software OpenStack per la realizzazione di piattaforme "Cloud" -...
Utilizzo del Software OpenStack per la realizzazione di piattaforme "Cloud" -...
Enrico Franceschini
 
20140415 アドタイデイズ 安西パート
20140415 アドタイデイズ 安西パート20140415 アドタイデイズ 安西パート
20140415 アドタイデイズ 安西パート
Keisuke Anzai
 
JD Edwards & Peoplesoft 1 _ Doug Hughes _ Oracle applications strategy and ro...
JD Edwards & Peoplesoft 1 _ Doug Hughes _ Oracle applications strategy and ro...JD Edwards & Peoplesoft 1 _ Doug Hughes _ Oracle applications strategy and ro...
JD Edwards & Peoplesoft 1 _ Doug Hughes _ Oracle applications strategy and ro...
InSync2011
 
JDE & Peoplesoft 1 | John Schiff | JD Edwards Go9.pdf
JDE & Peoplesoft 1 | John Schiff | JD Edwards Go9.pdfJDE & Peoplesoft 1 | John Schiff | JD Edwards Go9.pdf
JDE & Peoplesoft 1 | John Schiff | JD Edwards Go9.pdf
InSync2011
 

Viewers also liked (20)

OpenStack User Group Italia
OpenStack User Group ItaliaOpenStack User Group Italia
OpenStack User Group Italia
 
VMware - Openstack e VMware: la strana coppia
VMware - Openstack e VMware: la strana coppia VMware - Openstack e VMware: la strana coppia
VMware - Openstack e VMware: la strana coppia
 
Stack Overflow - It's All About Performance - Marco Cecconi - Codemotion Roma...
Stack Overflow - It's All About Performance - Marco Cecconi - Codemotion Roma...Stack Overflow - It's All About Performance - Marco Cecconi - Codemotion Roma...
Stack Overflow - It's All About Performance - Marco Cecconi - Codemotion Roma...
 
Ocp overview del progetto
Ocp overview del progettoOcp overview del progetto
Ocp overview del progetto
 
Un'Infrastruttura di Sviluppo Web Enterprise Distribuita Basata su Modelli Pa...
Un'Infrastruttura di Sviluppo Web Enterprise Distribuita Basata su Modelli Pa...Un'Infrastruttura di Sviluppo Web Enterprise Distribuita Basata su Modelli Pa...
Un'Infrastruttura di Sviluppo Web Enterprise Distribuita Basata su Modelli Pa...
 
MySQL Tech Tour 2016 - Panoramica sul progetto Openstack
MySQL Tech Tour 2016 - Panoramica sul progetto OpenstackMySQL Tech Tour 2016 - Panoramica sul progetto Openstack
MySQL Tech Tour 2016 - Panoramica sul progetto Openstack
 
Focus Group Open Source 22.11.2011 Boris Sofronic
Focus Group Open Source 22.11.2011 Boris SofronicFocus Group Open Source 22.11.2011 Boris Sofronic
Focus Group Open Source 22.11.2011 Boris Sofronic
 
Cloud Computing reale: le basi, il presente ed il futuro del Cloud Computing
Cloud Computing reale: le basi, il presente ed il futuro del Cloud ComputingCloud Computing reale: le basi, il presente ed il futuro del Cloud Computing
Cloud Computing reale: le basi, il presente ed il futuro del Cloud Computing
 
Mitsumoto Akiyo - 2014 Symposium on Financial Education in Korea
Mitsumoto Akiyo - 2014 Symposium on Financial Education in KoreaMitsumoto Akiyo - 2014 Symposium on Financial Education in Korea
Mitsumoto Akiyo - 2014 Symposium on Financial Education in Korea
 
Utilizzo del Software OpenStack per la realizzazione di piattaforme "Cloud" -...
Utilizzo del Software OpenStack per la realizzazione di piattaforme "Cloud" -...Utilizzo del Software OpenStack per la realizzazione di piattaforme "Cloud" -...
Utilizzo del Software OpenStack per la realizzazione di piattaforme "Cloud" -...
 
Alla scoperta di Ubuntu Phone, lo smartphone open-source - Codemotion techmee...
Alla scoperta di Ubuntu Phone, lo smartphone open-source - Codemotion techmee...Alla scoperta di Ubuntu Phone, lo smartphone open-source - Codemotion techmee...
Alla scoperta di Ubuntu Phone, lo smartphone open-source - Codemotion techmee...
 
20140415 アドタイデイズ 安西パート
20140415 アドタイデイズ 安西パート20140415 アドタイデイズ 安西パート
20140415 アドタイデイズ 安西パート
 
2013年11月15日開催OAUG JDE SIGセミナー ジェクシード消費税改正対応サービス
2013年11月15日開催OAUG JDE SIGセミナー ジェクシード消費税改正対応サービス2013年11月15日開催OAUG JDE SIGセミナー ジェクシード消費税改正対応サービス
2013年11月15日開催OAUG JDE SIGセミナー ジェクシード消費税改正対応サービス
 
JD Edwards & Peoplesoft 1 _ Doug Hughes _ Oracle applications strategy and ro...
JD Edwards & Peoplesoft 1 _ Doug Hughes _ Oracle applications strategy and ro...JD Edwards & Peoplesoft 1 _ Doug Hughes _ Oracle applications strategy and ro...
JD Edwards & Peoplesoft 1 _ Doug Hughes _ Oracle applications strategy and ro...
 
Panoramica sul progetto OpenStack
Panoramica sul progetto OpenStackPanoramica sul progetto OpenStack
Panoramica sul progetto OpenStack
 
Erp
ErpErp
Erp
 
Jdedwards EnterpriseOne Implementing Workflow
Jdedwards EnterpriseOne Implementing WorkflowJdedwards EnterpriseOne Implementing Workflow
Jdedwards EnterpriseOne Implementing Workflow
 
MySQL Tech Tour 2016 - Database-as-a-Service con MySQL e Oracle Openstack
MySQL Tech Tour 2016 - Database-as-a-Service con MySQL e Oracle OpenstackMySQL Tech Tour 2016 - Database-as-a-Service con MySQL e Oracle Openstack
MySQL Tech Tour 2016 - Database-as-a-Service con MySQL e Oracle Openstack
 
Jd edward ppt by me
Jd edward ppt by meJd edward ppt by me
Jd edward ppt by me
 
JDE & Peoplesoft 1 | John Schiff | JD Edwards Go9.pdf
JDE & Peoplesoft 1 | John Schiff | JD Edwards Go9.pdfJDE & Peoplesoft 1 | John Schiff | JD Edwards Go9.pdf
JDE & Peoplesoft 1 | John Schiff | JD Edwards Go9.pdf
 

Similar to Protecting What Matters...An Enterprise Approach to Cloud Security

wp-security-dbsec-cloud-3225125
wp-security-dbsec-cloud-3225125wp-security-dbsec-cloud-3225125
wp-security-dbsec-cloud-3225125
Gabor Bokor
 

Similar to Protecting What Matters...An Enterprise Approach to Cloud Security (20)

Cyber Warfare e scenari di mercato
Cyber Warfare e scenari di mercatoCyber Warfare e scenari di mercato
Cyber Warfare e scenari di mercato
 
Top 10 tips for effective SOC/NOC collaboration or integration
Top 10 tips for effective SOC/NOC collaboration or integrationTop 10 tips for effective SOC/NOC collaboration or integration
Top 10 tips for effective SOC/NOC collaboration or integration
 
HP Enterprise Software: Making your applications and information work for you
HP Enterprise Software: Making your applications and information work for youHP Enterprise Software: Making your applications and information work for you
HP Enterprise Software: Making your applications and information work for you
 
Retail security-services--client-presentation
Retail security-services--client-presentationRetail security-services--client-presentation
Retail security-services--client-presentation
 
Primendi Visiooniseminar 2014 - Kuidas lahendada võrgu turvalisus mobiilses k...
Primendi Visiooniseminar 2014 - Kuidas lahendada võrgu turvalisus mobiilses k...Primendi Visiooniseminar 2014 - Kuidas lahendada võrgu turvalisus mobiilses k...
Primendi Visiooniseminar 2014 - Kuidas lahendada võrgu turvalisus mobiilses k...
 
Making Network Security Relevant
Making Network Security RelevantMaking Network Security Relevant
Making Network Security Relevant
 
Are your Cloud Services Secure and Compliant today?
Are your Cloud Services Secure and Compliant today?Are your Cloud Services Secure and Compliant today?
Are your Cloud Services Secure and Compliant today?
 
Innovation Without Compromise: The Challenges of Securing Big Data
Innovation Without Compromise: The Challenges of Securing Big DataInnovation Without Compromise: The Challenges of Securing Big Data
Innovation Without Compromise: The Challenges of Securing Big Data
 
HP Discover - Developing new applications for the cloud
HP Discover - Developing new applications for the cloudHP Discover - Developing new applications for the cloud
HP Discover - Developing new applications for the cloud
 
Cloud computing Introductory Session
Cloud computing Introductory SessionCloud computing Introductory Session
Cloud computing Introductory Session
 
Transform IT Service Delivery Helion
Transform IT Service Delivery Helion Transform IT Service Delivery Helion
Transform IT Service Delivery Helion
 
David valovcin big data - big risk
David valovcin big data - big riskDavid valovcin big data - big risk
David valovcin big data - big risk
 
Big Data Security Analytics (BDSA) with Randy Franklin
Big Data Security Analytics (BDSA) with Randy FranklinBig Data Security Analytics (BDSA) with Randy Franklin
Big Data Security Analytics (BDSA) with Randy Franklin
 
To Serve and Protect: Making Sense of Hadoop Security
To Serve and Protect: Making Sense of Hadoop Security To Serve and Protect: Making Sense of Hadoop Security
To Serve and Protect: Making Sense of Hadoop Security
 
Introduction to Cloud Security
Introduction to Cloud SecurityIntroduction to Cloud Security
Introduction to Cloud Security
 
wp-security-dbsec-cloud-3225125
wp-security-dbsec-cloud-3225125wp-security-dbsec-cloud-3225125
wp-security-dbsec-cloud-3225125
 
Forcepoint Corporate Presentation_Short.pptx
Forcepoint Corporate Presentation_Short.pptxForcepoint Corporate Presentation_Short.pptx
Forcepoint Corporate Presentation_Short.pptx
 
Big Data Security with HP ArcSight
Big Data Security with HP ArcSightBig Data Security with HP ArcSight
Big Data Security with HP ArcSight
 
Big data security
Big data securityBig data security
Big data security
 
Digital Transformation in the Cloud: What They Don’t Always Tell You [2020]
Digital Transformation in the Cloud: What They Don’t Always Tell You [2020]Digital Transformation in the Cloud: What They Don’t Always Tell You [2020]
Digital Transformation in the Cloud: What They Don’t Always Tell You [2020]
 

More from InnoTech

More from InnoTech (20)

"So you want to raise funding and build a team?"
"So you want to raise funding and build a team?""So you want to raise funding and build a team?"
"So you want to raise funding and build a team?"
 
Artificial Intelligence is Maturing
Artificial Intelligence is MaturingArtificial Intelligence is Maturing
Artificial Intelligence is Maturing
 
What is AI without Data?
What is AI without Data?What is AI without Data?
What is AI without Data?
 
Courageous Leadership - When it Matters Most
Courageous Leadership - When it Matters MostCourageous Leadership - When it Matters Most
Courageous Leadership - When it Matters Most
 
The Gathering Storm
The Gathering StormThe Gathering Storm
The Gathering Storm
 
Sql Server tips from the field
Sql Server tips from the fieldSql Server tips from the field
Sql Server tips from the field
 
Quantum Computing and its security implications
Quantum Computing and its security implicationsQuantum Computing and its security implications
Quantum Computing and its security implications
 
Converged Infrastructure
Converged InfrastructureConverged Infrastructure
Converged Infrastructure
 
Making the most out of collaboration with Office 365
Making the most out of collaboration with Office 365Making the most out of collaboration with Office 365
Making the most out of collaboration with Office 365
 
Blockchain use cases and case studies
Blockchain use cases and case studiesBlockchain use cases and case studies
Blockchain use cases and case studies
 
Blockchain: Exploring the Fundamentals and Promising Potential
Blockchain: Exploring the Fundamentals and Promising Potential Blockchain: Exploring the Fundamentals and Promising Potential
Blockchain: Exploring the Fundamentals and Promising Potential
 
Business leaders are engaging labor differently - Is your IT ready?
Business leaders are engaging labor differently - Is your IT ready?Business leaders are engaging labor differently - Is your IT ready?
Business leaders are engaging labor differently - Is your IT ready?
 
AI 3.0: Is it Finally Time for Artificial Intelligence and Sensor Networks to...
AI 3.0: Is it Finally Time for Artificial Intelligence and Sensor Networks to...AI 3.0: Is it Finally Time for Artificial Intelligence and Sensor Networks to...
AI 3.0: Is it Finally Time for Artificial Intelligence and Sensor Networks to...
 
Using Business Intelligence to Bring Your Data to Life
Using Business Intelligence to Bring Your Data to LifeUsing Business Intelligence to Bring Your Data to Life
Using Business Intelligence to Bring Your Data to Life
 
User requirements is a fallacy
User requirements is a fallacyUser requirements is a fallacy
User requirements is a fallacy
 
What I Wish I Knew Before I Signed that Contract - San Antonio
What I Wish I Knew Before I Signed that Contract - San Antonio What I Wish I Knew Before I Signed that Contract - San Antonio
What I Wish I Knew Before I Signed that Contract - San Antonio
 
Disaster Recovery Plan - Quorum
Disaster Recovery Plan - QuorumDisaster Recovery Plan - Quorum
Disaster Recovery Plan - Quorum
 
Share point saturday access services 2015 final 2
Share point saturday access services 2015 final 2Share point saturday access services 2015 final 2
Share point saturday access services 2015 final 2
 
Sp tech festdallas - office 365 groups - planner session
Sp tech festdallas - office 365 groups - planner sessionSp tech festdallas - office 365 groups - planner session
Sp tech festdallas - office 365 groups - planner session
 
Power apps presentation
Power apps presentationPower apps presentation
Power apps presentation
 

Recently uploaded

Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
lizamodels9
 
Call Girls From Raj Nagar Extension Ghaziabad❤️8448577510 ⊹Best Escorts Servi...
Call Girls From Raj Nagar Extension Ghaziabad❤️8448577510 ⊹Best Escorts Servi...Call Girls From Raj Nagar Extension Ghaziabad❤️8448577510 ⊹Best Escorts Servi...
Call Girls From Raj Nagar Extension Ghaziabad❤️8448577510 ⊹Best Escorts Servi...
lizamodels9
 
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
lizamodels9
 
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
amitlee9823
 
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
amitlee9823
 
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
dollysharma2066
 
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
amitlee9823
 
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al MizharAl Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
allensay1
 
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...
Anamikakaur10
 

Recently uploaded (20)

Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
 
PHX May 2024 Corporate Presentation Final
PHX May 2024 Corporate Presentation FinalPHX May 2024 Corporate Presentation Final
PHX May 2024 Corporate Presentation Final
 
Falcon Invoice Discounting: Unlock Your Business Potential
Falcon Invoice Discounting: Unlock Your Business PotentialFalcon Invoice Discounting: Unlock Your Business Potential
Falcon Invoice Discounting: Unlock Your Business Potential
 
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
 
Uneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration PresentationUneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration Presentation
 
Call Girls From Raj Nagar Extension Ghaziabad❤️8448577510 ⊹Best Escorts Servi...
Call Girls From Raj Nagar Extension Ghaziabad❤️8448577510 ⊹Best Escorts Servi...Call Girls From Raj Nagar Extension Ghaziabad❤️8448577510 ⊹Best Escorts Servi...
Call Girls From Raj Nagar Extension Ghaziabad❤️8448577510 ⊹Best Escorts Servi...
 
Marel Q1 2024 Investor Presentation from May 8, 2024
Marel Q1 2024 Investor Presentation from May 8, 2024Marel Q1 2024 Investor Presentation from May 8, 2024
Marel Q1 2024 Investor Presentation from May 8, 2024
 
Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...
Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...
Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...
 
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
 
Whitefield CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
Whitefield CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRLWhitefield CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
Whitefield CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
 
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
 
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
 
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdfDr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
 
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableCall Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
 
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
 
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
 
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
 
Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...
Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...
Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...
 
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al MizharAl Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
 
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...
 

Protecting What Matters...An Enterprise Approach to Cloud Security

  • 1. © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. Protecting what matters... ... An enterprise approach to cloud security Ed Reynolds HP Fellow, CISSP, CCSK HP Enterprise Security Services
  • 2. © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.2 Today’s agenda TRENDS PERSPECTIVES GUIDANCE
  • 3. © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.3 Worldwide Security Trends & Implications Cyber threat 56%of organizations have been the target of a cyber attack Extended supply chain 44% of all data breach involved third-party mistakes Financial loss $8.6M average cost associated with data breach Cost of protection 8% of total IT budget spent on security Reputation damage 30% market cap reduction due to recent events Source: HP internal data, Forrester Research, Ponemon Institute, Coleman Parkes Research Key Points • Security is a board of directors concern • Security leadership is under immense pressure • Need for greater visibility of business risks and to make sound security investment choicesReactive vs. proactive 60% of enterprises spend more time and money on reactive measures vs. proactive risk mgmt
  • 4. © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.4 Managing security challenges Today, security is a board-level agenda item #1 Board Identified Risk: Reputational Damage Source: EisnerAmper LLP, February 2011 - Second Annual Board of Directors Survey - 2011: Concerns About Risks Confronting Boards
  • 5. © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.5 Managing Risk: Current Challenges Primary Challenges Nature & Motivation of Attacks (Fame to national enemies)1 Transformation of Enterprise IT (Delivery and consumption changes)2 Traditional DC Private Cloud Managed Cloud Public Cloud Network Storage Servers Delivery Regulatory Pressures (Increasing cost and complexity)3 A New Type of Adversary Basel III Enhanced Regulatory Environment
  • 6. © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.6 HP research: Top concerns for IT executives 67% 66% 63% 54% Extremely concerned Somewhat concerned Not very concerned Data privacy and information breaches Lack of skilled resources to effectively manage security Risk associated with more consumption of apps/IT services across public, private & hybrid cloud Risk associated with more consumption of apps/IT services Source: HP 20:20 CIO Report, 2012
  • 7. © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.7 Cloud services: adoption is tempered by uncertainty Security or related component is #1 concern/issue for most enterprises LOB/IT CIO Security Performance Reliability Scalability Service levels Data security & protection Compliance Auditing Cost Governance Control Availability
  • 8. © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.8 CSA: Cloud Computing Top Threats for 2013 Top Threats for 2013 1.Data Breaches 2.Data Loss 3.Account or Service Hijacking 4.Insecure Interfaces and APIs 5.Denial of Service 6.Malicious Insiders 7.Abuse of Cloud Services 8.Insufficient Due Diligence 9.Shared Technology Vulnerabilities Security for the cloud http://cloudsecurityalliance.org/ 1. HP’s Rafal Los co-chaired the CSA Top Threats working group 2. HP selected by CSA as Master Training Partner in APJ (initial region)
  • 9. © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.9 What do we mean by “cloud security”? • Security for the cloud? Securely use cloud (consumers) • Security from the cloud? Security-as-a-Service • Security in the cloud? Embedded security (providers) • Security across clouds? Hybrid models, interoperability 1 2 3 4
  • 10. © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.10 Cloud models require different security solutions… Attack surface increases composition of two or more clouds Hybrid cloud Sold to the public, mega-scale infrastructure Public cloud Shared infrastructure for specific community Community cloud Enterprise-owned or leased Private cloud
  • 11. © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.11 ... and different roles & responsibilities regarding security Cloud SaaS PaaS IaaS SaaS: Software as a Service, generally provides application, data and infrastructure security, with varying degrees of compliance PaaS: Platform as a Service, may provide some additional security functions for IDM and secure application development – security falls to app developer and customer IT operations IaaS: Infrastructure as a Service – providers generally offer basic network & infrastructure security, firewalls, some tools – but customer is generally responsible for implementation,operations, monitoring
  • 12. © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.12 But what is really new about “cloud security”? Many traditional security concerns are recast as a “cloud problem”. . . • Many “cloud security incidents“ are issues with web apps and data-hosting, but at greater scale… - e.g. Phishing, downtime, data loss, weak passwords, compromised hosts running botnets, etc … • Unexpected side channels and covert channels arising from shared-resource environments in public services - Activity patterns need to be protected in addition to apps and data • Reputation fate sharing: possible blacklisting or service disruption due to “bad neighbors” - Need “mutual auditability” (providers need to audit/monitor users) • Longer trust chains: {SaaS to PaaS to IaaS} – Y.Chen, et.al, “What’s New About Cloud Computing Security?” UC Berkeley, Jan.20, 2010
  • 13. © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. “It’snotaboutcloudsecurity– it’saboutsecuringyour enterprise’suseofcloud-based services” “Cloudsecuritybeginswith, andaddsto,well-defined enterprisesecurity” Perspectives
  • 14. © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.14 Enterprise approach to cloud security HP Enterprise Security Services Whitepaper 1. Establish a risk-based approach 2. Design applications to run in the cloud 3. Ongoing auditing and management
  • 15. © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.15 HP approach to complete information security Establish a risk-based approach Actionable Security Intelligence Moving from Reactive to Proactive Information Security & Risk Management Assess security investments and posture Transform from silos to a comprehensive view Optimize to proactively improve security posture Manage security effectively Establish a risk based approach
  • 16. © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.16 HP Cloud Security Risk and Control Assessment Stage 1: Assessment Workshop Business Issues Discovery Strategic Control Plan Risk Assessment Scope Engagement with senior management Stage 2: Risk Assessment Engagement with business-level security Business Risk Assessment Asset Risk Assessment Assets Prioritized by Risk Stage 3: Controls Assessment Cloud Control Measures Consensus Assessment Prioritized Security Control Plan Engagement with operational level security Establish a risk based approach
  • 17. © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.17 Are your applications & data… The path of least resistance? Design apps to run in cloud
  • 18. © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.18 Secure SDLC: protect data & IP Design apps to run in cloud Attacker Software & data Hardware Network Intellectual property Customer data Business processes Trade secrets
  • 19. © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.19 The National Vulnerability Database (DHS/US-CERT) • Lists >47,000 documented vulnerabilities Undiscovered/unreported (0-day) vulnerabilities are huge • 20X1 multiplier • 47,000 x 20 = estimated 940,000 vulnerabilities replicated in many products The risks Vulnerabilities (security defects) Quality issue: many more “underwater” than those reported “above the water” Greater than 80% of attacks happen at the application layer Notes: HP research and 1“Public Vulnerabilities Are Tip of the Iceberg,” CNET News, June 1, 2007 Design apps to run in cloud
  • 20. © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.20 The National Vulnerability Database (DHS/US-CERT) • Lists >47,000 documented vulnerabilities Undiscovered/unreported (0-day) vulnerabilities are huge • 20X1 multiplier • 47,000 x 20 = estimated 940,000 vulnerabilities replicated in many products The risks Vulnerabilities (security defects) Quality issue: many more “underwater” than those reported “above the water” But <1% of security spend is allocated to application security !!! Notes: HP research and 1“Public Vulnerabilities Are Tip of the Iceberg,” CNET News, June 1, 2007 Design apps to run in cloud
  • 21. © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.21 Designing applications to run in the cloud • Embed security in application architecture • Address new attack surfaces early in design • Encrypt “everything” by default – end-to-end • Adopt new mindset to privacy • Bounding processes around PII (e.g. PCI tokenization example) • Build in audit trails for forensics • Conduct 3rd party reviews (CATA, Pen.Test) Design apps to run in cloud
  • 22. © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.22 Securing “data-in-process,” in addition to “at rest” and “in motion” Encryption advances & alternatives∗ Advances Broadcast encryption: encryption for groups and memberships Searchable symmetric encryption: securely search encrypted data Identity-based encryption: ad-hoc PKI, user chooses his own public key Predicate encryption: fine-grained PKI Homomorphic encryption: emerging techniques to compute on ciphertext * Source: CSA Guidance v3.0Chapter 11 Alternatives* Tokenization. Data sent to the public cloud is altered (tokenized) and contains a reference to the data residing in the private cloud. Data anonymization. Personally identifiable information (PII) is stripped before processing. (Watch assumptions) Utilizing cloud database controls. Using (fine-grained) access controls at database layer to provide segregation. Design apps to run in cloud
  • 23. © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.23 Architecting Security into Applications Security assurance thought leadership Requirements/ architecture & design • Security requirements gap analysis • Security designed in • Dramatically reduces risk of vulnerabilities • More complete and less expensive assurance • Guides late lifecycle assurance • The best response to a greater threat Reactive Traditional Proactive Extending security assurance Higher ROI The traditional approach is backwards. It can never solve the problem by itself but works great after proactively prioritizing late life cycle assurance focus Post-release First, people found vulnerabilities, patched, and issued bulletins Integration/ penetration test • In-house, more proactive • More expensive in isolation Coding • Security code scanners • Code review • Better when design supports security Design apps to run in cloud
  • 24. © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.24 Applications rationalisation Cloud-specific workload analysis Risk analysis & TCO BPA HP cloud applications transformation Level 2 transformation strategy determination (x to x) Level 1 transformation strategy determination (RE’s) App migration Cloud service types Cloud deployment models IaaS PaaS SaaS Public Private Virtual private Dedicated/hosted (retain, retire) Suitable for SaaS Suitable for preferred target/ public cloud Need modernisation analysis Not suitable for cloud Cloud suitability mapping • Replace • Re-architect • Re-factor • Re-host App migration Apps Design apps to run in cloud
  • 25. © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.25 Applications modernization strategy Re-factor Re-architect Re-host Replace Application cloud strategy Codingeffort New value generation potential IaaS SaaS PaaS PaaS SOA Design apps to run in cloud
  • 26. © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.26 Auditing cloud services Continuous compliance monitoring is essential to securely delivering cloud services and ensuring compliance • Cloud Services are inherently dynamic. The dynamic provisioning and de-provisioning of resources is a key part of the Cloud value proposition and business model • Automation for operations and asset management are essential in this dynamic environment • Verification of compliance with policy and legislation – such as the EU Data Protection Directive, GLBA, HIPAA, and Export compliance controls like ITAR – requires continuously running automation Yearly or monthly audits are irrelevant in an environment that changes completely on a daily or hourly basis Ongoing auditing & management
  • 27. © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.27 Are we secure? Continuous security monitoring Ongoing auditing & management
  • 28. © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.28 What about infrastructure and network security? • Infrastructure and network security are critical areas for cloud-based solutions • Enterprises have little or no influence on a provider’s implementation and controls in these areas • A thorough review of the service provider’s policies should be completed as part of the due diligence process during contract negotiation and service sourcing
  • 29. © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.29 5 key ways to reduce risk 1. Understand your risk profile 2. Architect for the cloud 3. Robust identity, access management 4. Confirm legal, compliance obligations, due diligence 5. “Clear Responsibility” – CSP, Customer, Both
  • 30. © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.30 Cloud security: guidance for critical areas Architecture 1. Cloud computing architectural framework Governance 2. Governance and enterprise risk management 3. Legal issues: contracts and electronic discovery 4. Compliance and audit management 5. Information management and data security 6. Interoperability and portability Operations 7. Traditional security, business continuity, and disaster recovery 8. Data center operations 9. Incident response 10. Application security 11. Encryption and key management 12. Identity, entitlement, and access management 13. Virtualization Security for the cloud http://cloudsecurityalliance.org/ https://ccsk.cloudsecurityalliance.org/
  • 31. © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.31 Final thoughts  Recognize the threats have changed and become ‘industrialized’  Employ comprehensive and integrated approach to enterprise security & risk management  Conduct security threat analyses for all critical applications  Design in security from the beginning: essential for public cloud usage  Be vigilant: continual compliance monitoring and audits, intrusion testing, verifiable backups…
  • 32. © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. Thankyou Whitepaper: bit.ly/hpcloudsecurity Email: ed.reynolds@hp.com URL: hp.com/enterprise/security