SlideShare une entreprise Scribd logo
1  sur  26
Télécharger pour lire hors ligne
How Good Security Architecture Saves
Corporate Workers from Covid-19
Narudom Roongsiriwong, CISSP
MiSSConf(SP6), June 6, 2020
WhoAmI
● Lazy Blogger
– Japan, Security, FOSS, Politics, Christian
– http://narudomr.blogspot.com
● Information Security since 1995
● Web Application Development since 1998
● SVP, Head of IT Security, Kiatnakin Bank PLC (KKP)
● Committee Member, Thailand Banking Sector CERT (TB-CERT)
● APAC Research Advisory Council Member at Cloud Security Alliance Asia Pacific
● Consultant, OWASP Thailand Chapter
● Committee Member, National Digital ID Project, Technical Team
● Chief Information Security Officer (CISO) of the Year 2017, NetworkWorld Asia
● Contact: narudom@owasp.org
Me & COVID-19
● Jan 28, The first case was identified in Hokkaido
● Jan 29, An ANA’s charter flight evacuating Japanese citizens from Wuhan’s
quarantined epicenter of the new COVID-19 outbreak arrived Tokyo
● Jan 31, I arrived Tokyo
● Feb 2, I arrived Hakodate, Hokkaido
● Feb 4, I arrived Sapporo, Hokkaido joining Sapporo Snow Festival which has
been pinpointed as among a growing cluster of COVID-19 infections across
Japan
● Feb 10, I went back to Bangkok
● Feb 14, The first case of an infected person found in Hokkaido
● Feb 24, Kiatnakin Bank announced that who has returned from COVID-19
risky country starting from Feb 11-24 must be inspected for COVID-19 self-
quarantined for 14 days
COVID-19, My Company & Work from Home
● Late January to March, 2020: Infrastructure preparation
– Virtual App & Desktop servers setting up and burst licenses but
not activated
– VPN servers and burst licenses for non-production environment
– Outgoing internet traffic bursting
– Security redesigns
● March 17, Internal communication on how to Work From
Home (WFH) during COVID-19 pandemic, how to install and
use Virtual App, how to transfer office telephone to private
phone number
● March 18, Delegation revision
March 19, IT Security Awareness: Security recommendation for WFHMarch 19, IT Security Awareness: Security recommendation for WFH
COVID-19, My Company & Work from Home
● March 23, Internal communication on rules of using internal
systems from personal devices according to Work From
Home during COVID-19 pandemic
● March 24, I started working from home
Application Class Restriction
● Financial Transaction Operation → On Premise Only
● On-Premise Non-Transaction Operation → Virtual App
● Cloud Applications → Native from Anywhere
● Non-Production Environment → VPN
KK COVID-19 Related Statistics
Employees Infected
60%
Work from Home
2 Years Ago
● The first cloud based e-learning application was up and
running with troublesome for IT help desk
Lessons Learned from the First Move
● Moving to cloud computing without architectural design
leads to troublesome
● Without cloud security architecture, it could lead to disaster
● There are missing components those could help moving to
cloud computing effectively
Multi-Cloud Architecture
 We adopt many cloud strategies at the same time
 Multi-Cloud is unavoidable
*The image is from vmworld2017
What is Multi-Cloud?
This term reflects the strategic decision to use multiple
cloud environments—public, private, or hybrid—to run
enterprise applications, and the decision to use a mix of
cloud service providers.
Why Use a Multi-Cloud Architecture?
 Choice: Flexibility and the ability to avoid vendor lock-
in.
 Disaster Avoidance: Ensures that you always have
compute resources and data storage available so you
can avoid downtime.
 Compliance: Many multi-cloud environments can help
enterprises achieve their goals for governance, risk
management and compliance regulations.
How Secure is Multi-Cloud?
 Multi-cloud security has the specific challenge of
protecting data in a consistent way across a variety of
cloud providers
 Third-party partners handle different aspects of
security
 The importance is to clearly define and distribute
security responsibilities among the parties
Design Strategies in Multi-Cloud Architecture
● Maintain Few IaaS Providers
● Secure Identity Management
● Backup Data to On-Premise
● Do Data De-Indentification
Strategy #1: Maintain Few IaaS Providers
● Limit different expertise,
environments and tools
● Reduce operational
complexity
● Limit risk exposure
*The image is from vmworld2017
Strategy #2: Secure Identity Management
● Retail customer users are not the main problem, all access from
the Internet
● Organizational users are the real problem, either SSO or active
directory is widely used in the existing environment
● The best way is to export the existing organizational user
authentication to centralized cloud identity management for cloud
based applications’ authentication
● Recommend tactics
– Always synchronize or export from on premise to cloud
– Do not allow the external pull user identity but push to the external
– Store hash of hash on the external
Strategy #2 Example: Microsoft Azure AD
*The image is from Mircosoft Azure
Strategy #3: Backup Data to On-Premise
● Ensure that we backup necessary data set need to continue
running the business
● Incrementally backup to on-premise
● Do not always rely on cloud service providers
● Think if we have to terminate the service provider without
data backup
Strategy #4: Do Data De-Identification
● De-identification is the process used to prevent someone's
personal identity from being revealed
● Deidentified data cannot be linked to any one individual
account
● De-identification techniques include:
– Pseudonymization
– Anonymization
Key Components: Office Suite for Business
*The image is from computerworld.com
Rooms for Security Improvement
● 2nd factor authentication enforcement for cloud applications
from day one
● Security redesigns to adopt cloud security services
– On-premise access controls
– Cloud-native, security information event management (SIEM)
and security orchestration automated response solution
COVID-19 Accelerates Transformation CycleCOVID-19 Accelerates Transformation Cycle
How Good Security Architecture Saves Corporate Workers from COVID-19

Contenu connexe

Tendances

ION-E Defense In Depth Presentation for The Institiute of Internal Auditors
ION-E Defense In Depth Presentation for The Institiute of Internal AuditorsION-E Defense In Depth Presentation for The Institiute of Internal Auditors
ION-E Defense In Depth Presentation for The Institiute of Internal Auditors
mdagrossa
 

Tendances (20)

Enterprise 360 degree risk management
Enterprise 360 degree risk managementEnterprise 360 degree risk management
Enterprise 360 degree risk management
 
Risk Based Software Planning
Risk Based Software PlanningRisk Based Software Planning
Risk Based Software Planning
 
Secure Software Development Adoption Strategy
Secure Software Development Adoption StrategySecure Software Development Adoption Strategy
Secure Software Development Adoption Strategy
 
Unlock Security Insight from Machine Data
Unlock Security Insight from Machine DataUnlock Security Insight from Machine Data
Unlock Security Insight from Machine Data
 
Top 10 Bad Coding Practices Lead to Security Problems
Top 10 Bad Coding Practices Lead to Security ProblemsTop 10 Bad Coding Practices Lead to Security Problems
Top 10 Bad Coding Practices Lead to Security Problems
 
National Digital ID Platform Technical Forum
National Digital ID Platform Technical ForumNational Digital ID Platform Technical Forum
National Digital ID Platform Technical Forum
 
Embedded System Security: Learning from Banking and Payment Industry
Embedded System Security: Learning from Banking and Payment IndustryEmbedded System Security: Learning from Banking and Payment Industry
Embedded System Security: Learning from Banking and Payment Industry
 
ION-E Defense In Depth Presentation for The Institiute of Internal Auditors
ION-E Defense In Depth Presentation for The Institiute of Internal AuditorsION-E Defense In Depth Presentation for The Institiute of Internal Auditors
ION-E Defense In Depth Presentation for The Institiute of Internal Auditors
 
The Making of a simple Cyber Threat Intelligence Gathering System
The Making of a simple Cyber Threat Intelligence Gathering SystemThe Making of a simple Cyber Threat Intelligence Gathering System
The Making of a simple Cyber Threat Intelligence Gathering System
 
Cyber intelligence for corporate security
Cyber intelligence for corporate securityCyber intelligence for corporate security
Cyber intelligence for corporate security
 
Secure Code Review 101
Secure Code Review 101Secure Code Review 101
Secure Code Review 101
 
Security Fundamentals and Threat Modelling
Security Fundamentals and Threat ModellingSecurity Fundamentals and Threat Modelling
Security Fundamentals and Threat Modelling
 
Cyber threat intelligence: maturity and metrics
Cyber threat intelligence: maturity and metricsCyber threat intelligence: maturity and metrics
Cyber threat intelligence: maturity and metrics
 
Actionable Threat Intelligence
Actionable Threat IntelligenceActionable Threat Intelligence
Actionable Threat Intelligence
 
Threat Intelligence Is Like Three Day Potty Training
Threat Intelligence Is Like Three Day Potty TrainingThreat Intelligence Is Like Three Day Potty Training
Threat Intelligence Is Like Three Day Potty Training
 
Architecting for Security Resilience
Architecting for Security ResilienceArchitecting for Security Resilience
Architecting for Security Resilience
 
2016 ISSA Conference Threat Intelligence Keynote philA
2016 ISSA Conference Threat Intelligence Keynote philA2016 ISSA Conference Threat Intelligence Keynote philA
2016 ISSA Conference Threat Intelligence Keynote philA
 
Bridging the Gap Between Threat Intelligence and Risk Management
Bridging the Gap Between Threat Intelligence and Risk ManagementBridging the Gap Between Threat Intelligence and Risk Management
Bridging the Gap Between Threat Intelligence and Risk Management
 
Cybersecurity on Business Resilience
Cybersecurity on Business ResilienceCybersecurity on Business Resilience
Cybersecurity on Business Resilience
 
Threat Intelligence Workshop
Threat Intelligence WorkshopThreat Intelligence Workshop
Threat Intelligence Workshop
 

Similaire à How Good Security Architecture Saves Corporate Workers from COVID-19

iotsecurity-171108154118.pdf
iotsecurity-171108154118.pdfiotsecurity-171108154118.pdf
iotsecurity-171108154118.pdf
KerimBozkanli
 
Blockade.io : One Click Browser Defense
Blockade.io : One Click Browser DefenseBlockade.io : One Click Browser Defense
Blockade.io : One Click Browser Defense
RiskIQ, Inc.
 
Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...
Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...
Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...
TrustArc
 

Similaire à How Good Security Architecture Saves Corporate Workers from COVID-19 (20)

Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
 
19BCP072_Presentation_Final.pdf
19BCP072_Presentation_Final.pdf19BCP072_Presentation_Final.pdf
19BCP072_Presentation_Final.pdf
 
iotsecurity-171108154118.pdf
iotsecurity-171108154118.pdfiotsecurity-171108154118.pdf
iotsecurity-171108154118.pdf
 
IoT Security
IoT SecurityIoT Security
IoT Security
 
Cyber Rangers S1 E2
Cyber Rangers S1 E2Cyber Rangers S1 E2
Cyber Rangers S1 E2
 
Webinar: 5 Key Trends That Could Challenge Your Data Protection Plan in 2018
Webinar: 5 Key Trends That Could Challenge Your Data Protection Plan in 2018Webinar: 5 Key Trends That Could Challenge Your Data Protection Plan in 2018
Webinar: 5 Key Trends That Could Challenge Your Data Protection Plan in 2018
 
apidays LIVE Paris 2021 - Data privacy in the era of cloud native app by Guil...
apidays LIVE Paris 2021 - Data privacy in the era of cloud native app by Guil...apidays LIVE Paris 2021 - Data privacy in the era of cloud native app by Guil...
apidays LIVE Paris 2021 - Data privacy in the era of cloud native app by Guil...
 
System Security @ NECSTLab and Breaking the Laws of Robotics: Attacking Indus...
System Security @ NECSTLab and Breaking the Laws of Robotics: Attacking Indus...System Security @ NECSTLab and Breaking the Laws of Robotics: Attacking Indus...
System Security @ NECSTLab and Breaking the Laws of Robotics: Attacking Indus...
 
Blockade.io : One Click Browser Defense
Blockade.io : One Click Browser DefenseBlockade.io : One Click Browser Defense
Blockade.io : One Click Browser Defense
 
InfoSec: Evolve Thyself to Keep Pace in the Age of DevOps
InfoSec: Evolve Thyself to Keep Pace in the Age of DevOpsInfoSec: Evolve Thyself to Keep Pace in the Age of DevOps
InfoSec: Evolve Thyself to Keep Pace in the Age of DevOps
 
Bitglass Webinar - 5 Cloud Security Best Practices for 2018
Bitglass Webinar - 5 Cloud Security Best Practices for 2018Bitglass Webinar - 5 Cloud Security Best Practices for 2018
Bitglass Webinar - 5 Cloud Security Best Practices for 2018
 
CIS13: The Power of the Cloud and Transformation in the Enterprise
CIS13: The Power of the Cloud and Transformation in the EnterpriseCIS13: The Power of the Cloud and Transformation in the Enterprise
CIS13: The Power of the Cloud and Transformation in the Enterprise
 
Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...
Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...
Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...
 
Shift Left Security - The What, Why and How
Shift Left Security - The What, Why and HowShift Left Security - The What, Why and How
Shift Left Security - The What, Why and How
 
Building a cybersecurity strategy for growing companies (IDC Day 2022 - Tashk...
Building a cybersecurity strategy for growing companies (IDC Day 2022 - Tashk...Building a cybersecurity strategy for growing companies (IDC Day 2022 - Tashk...
Building a cybersecurity strategy for growing companies (IDC Day 2022 - Tashk...
 
What The Cyber Entails-2.pdf
What The Cyber Entails-2.pdfWhat The Cyber Entails-2.pdf
What The Cyber Entails-2.pdf
 
Overcoming Top 10 Challenges in Enterprise Application Development
Overcoming Top 10 Challenges in Enterprise Application DevelopmentOvercoming Top 10 Challenges in Enterprise Application Development
Overcoming Top 10 Challenges in Enterprise Application Development
 
Vulnerability Management – Opportunities and Challenges!
Vulnerability Management – Opportunities and Challenges!Vulnerability Management – Opportunities and Challenges!
Vulnerability Management – Opportunities and Challenges!
 
Privacy by Design as a system design strategy - EIC 2019
Privacy by Design as a system design strategy - EIC 2019 Privacy by Design as a system design strategy - EIC 2019
Privacy by Design as a system design strategy - EIC 2019
 
Tech Conferences To Share Ways Of Building A Robust Cybersecurity Culture
Tech Conferences To Share Ways Of Building A Robust Cybersecurity CultureTech Conferences To Share Ways Of Building A Robust Cybersecurity Culture
Tech Conferences To Share Ways Of Building A Robust Cybersecurity Culture
 

Plus de Narudom Roongsiriwong, CISSP

Plus de Narudom Roongsiriwong, CISSP (16)

Biometric Authentication.pdf
Biometric Authentication.pdfBiometric Authentication.pdf
Biometric Authentication.pdf
 
Security Shift Leftmost - Secure Architecture.pdf
Security Shift Leftmost - Secure Architecture.pdfSecurity Shift Leftmost - Secure Architecture.pdf
Security Shift Leftmost - Secure Architecture.pdf
 
Security Patterns for Software Development
Security Patterns for Software DevelopmentSecurity Patterns for Software Development
Security Patterns for Software Development
 
Blockchain and Cryptocurrency for Dummies
Blockchain and Cryptocurrency for DummiesBlockchain and Cryptocurrency for Dummies
Blockchain and Cryptocurrency for Dummies
 
DevSecOps 101
DevSecOps 101DevSecOps 101
DevSecOps 101
 
Secure Your Encryption with HSM
Secure Your Encryption with HSMSecure Your Encryption with HSM
Secure Your Encryption with HSM
 
OWASP Top 10 Proactive Control 2016 (C5-C10)
OWASP Top 10 Proactive Control 2016 (C5-C10)OWASP Top 10 Proactive Control 2016 (C5-C10)
OWASP Top 10 Proactive Control 2016 (C5-C10)
 
Secure PHP Coding
Secure PHP CodingSecure PHP Coding
Secure PHP Coding
 
AnyID and Privacy
AnyID and PrivacyAnyID and Privacy
AnyID and Privacy
 
OWASP Top 10 A4 – Insecure Direct Object Reference
OWASP Top 10 A4 – Insecure Direct Object ReferenceOWASP Top 10 A4 – Insecure Direct Object Reference
OWASP Top 10 A4 – Insecure Direct Object Reference
 
Payment Card System Overview
Payment Card System OverviewPayment Card System Overview
Payment Card System Overview
 
AnyID: Security Point of View
AnyID: Security Point of ViewAnyID: Security Point of View
AnyID: Security Point of View
 
Database Firewall with Snort
Database Firewall with SnortDatabase Firewall with Snort
Database Firewall with Snort
 
Business continuity & disaster recovery planning (BCP & DRP)
Business continuity & disaster recovery planning (BCP & DRP)Business continuity & disaster recovery planning (BCP & DRP)
Business continuity & disaster recovery planning (BCP & DRP)
 
Risk Management in Project Management
Risk Management in Project ManagementRisk Management in Project Management
Risk Management in Project Management
 
CarbonCredit-V4
CarbonCredit-V4CarbonCredit-V4
CarbonCredit-V4
 

Dernier

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Dernier (20)

Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 

How Good Security Architecture Saves Corporate Workers from COVID-19

  • 1. How Good Security Architecture Saves Corporate Workers from Covid-19 Narudom Roongsiriwong, CISSP MiSSConf(SP6), June 6, 2020
  • 2. WhoAmI ● Lazy Blogger – Japan, Security, FOSS, Politics, Christian – http://narudomr.blogspot.com ● Information Security since 1995 ● Web Application Development since 1998 ● SVP, Head of IT Security, Kiatnakin Bank PLC (KKP) ● Committee Member, Thailand Banking Sector CERT (TB-CERT) ● APAC Research Advisory Council Member at Cloud Security Alliance Asia Pacific ● Consultant, OWASP Thailand Chapter ● Committee Member, National Digital ID Project, Technical Team ● Chief Information Security Officer (CISO) of the Year 2017, NetworkWorld Asia ● Contact: narudom@owasp.org
  • 3. Me & COVID-19 ● Jan 28, The first case was identified in Hokkaido ● Jan 29, An ANA’s charter flight evacuating Japanese citizens from Wuhan’s quarantined epicenter of the new COVID-19 outbreak arrived Tokyo ● Jan 31, I arrived Tokyo ● Feb 2, I arrived Hakodate, Hokkaido ● Feb 4, I arrived Sapporo, Hokkaido joining Sapporo Snow Festival which has been pinpointed as among a growing cluster of COVID-19 infections across Japan ● Feb 10, I went back to Bangkok ● Feb 14, The first case of an infected person found in Hokkaido ● Feb 24, Kiatnakin Bank announced that who has returned from COVID-19 risky country starting from Feb 11-24 must be inspected for COVID-19 self- quarantined for 14 days
  • 4.
  • 5. COVID-19, My Company & Work from Home ● Late January to March, 2020: Infrastructure preparation – Virtual App & Desktop servers setting up and burst licenses but not activated – VPN servers and burst licenses for non-production environment – Outgoing internet traffic bursting – Security redesigns ● March 17, Internal communication on how to Work From Home (WFH) during COVID-19 pandemic, how to install and use Virtual App, how to transfer office telephone to private phone number ● March 18, Delegation revision
  • 6. March 19, IT Security Awareness: Security recommendation for WFHMarch 19, IT Security Awareness: Security recommendation for WFH
  • 7.
  • 8. COVID-19, My Company & Work from Home ● March 23, Internal communication on rules of using internal systems from personal devices according to Work From Home during COVID-19 pandemic ● March 24, I started working from home
  • 9. Application Class Restriction ● Financial Transaction Operation → On Premise Only ● On-Premise Non-Transaction Operation → Virtual App ● Cloud Applications → Native from Anywhere ● Non-Production Environment → VPN
  • 10. KK COVID-19 Related Statistics Employees Infected 60% Work from Home
  • 11. 2 Years Ago ● The first cloud based e-learning application was up and running with troublesome for IT help desk
  • 12. Lessons Learned from the First Move ● Moving to cloud computing without architectural design leads to troublesome ● Without cloud security architecture, it could lead to disaster ● There are missing components those could help moving to cloud computing effectively
  • 13. Multi-Cloud Architecture  We adopt many cloud strategies at the same time  Multi-Cloud is unavoidable *The image is from vmworld2017
  • 14. What is Multi-Cloud? This term reflects the strategic decision to use multiple cloud environments—public, private, or hybrid—to run enterprise applications, and the decision to use a mix of cloud service providers.
  • 15. Why Use a Multi-Cloud Architecture?  Choice: Flexibility and the ability to avoid vendor lock- in.  Disaster Avoidance: Ensures that you always have compute resources and data storage available so you can avoid downtime.  Compliance: Many multi-cloud environments can help enterprises achieve their goals for governance, risk management and compliance regulations.
  • 16. How Secure is Multi-Cloud?  Multi-cloud security has the specific challenge of protecting data in a consistent way across a variety of cloud providers  Third-party partners handle different aspects of security  The importance is to clearly define and distribute security responsibilities among the parties
  • 17. Design Strategies in Multi-Cloud Architecture ● Maintain Few IaaS Providers ● Secure Identity Management ● Backup Data to On-Premise ● Do Data De-Indentification
  • 18. Strategy #1: Maintain Few IaaS Providers ● Limit different expertise, environments and tools ● Reduce operational complexity ● Limit risk exposure *The image is from vmworld2017
  • 19. Strategy #2: Secure Identity Management ● Retail customer users are not the main problem, all access from the Internet ● Organizational users are the real problem, either SSO or active directory is widely used in the existing environment ● The best way is to export the existing organizational user authentication to centralized cloud identity management for cloud based applications’ authentication ● Recommend tactics – Always synchronize or export from on premise to cloud – Do not allow the external pull user identity but push to the external – Store hash of hash on the external
  • 20. Strategy #2 Example: Microsoft Azure AD *The image is from Mircosoft Azure
  • 21. Strategy #3: Backup Data to On-Premise ● Ensure that we backup necessary data set need to continue running the business ● Incrementally backup to on-premise ● Do not always rely on cloud service providers ● Think if we have to terminate the service provider without data backup
  • 22. Strategy #4: Do Data De-Identification ● De-identification is the process used to prevent someone's personal identity from being revealed ● Deidentified data cannot be linked to any one individual account ● De-identification techniques include: – Pseudonymization – Anonymization
  • 23. Key Components: Office Suite for Business *The image is from computerworld.com
  • 24. Rooms for Security Improvement ● 2nd factor authentication enforcement for cloud applications from day one ● Security redesigns to adopt cloud security services – On-premise access controls – Cloud-native, security information event management (SIEM) and security orchestration automated response solution
  • 25. COVID-19 Accelerates Transformation CycleCOVID-19 Accelerates Transformation Cycle