RSA: Vision of Secure Virtualization and Trusted Cloud. RNDr. Ivan Svoboda, CSc. RSA, The Security Division of EMC



Podobné dokumenty
Copyright 2011 EMC Corporation. All rights reserved.

Petr Vlk KPCS CZ. WUG Days října 2016

Komentáře CISO týkající se ochrany dat

Správa privilegovaných účtů ve fyzickém a virtuálním prostředí

Firemní strategie pro správu mobilních zařízení, bezpečný přístup a ochranu informací. Praha 15. dubna 2015

System Center Operations Manager

Zabezpečení infrastruktury

SAP a SUSE - dokonalá symbióza s open source. Martin Zikmund Technical Account Manager

GUIDELINES FOR CONNECTION TO FTP SERVER TO TRANSFER PRINTING DATA

Development and Test Cloud

Z ČEHO STAVÍ VELCÍ KLUCI?

Cloud. Nebo zatím jen mlha? Workshop Day 2011 WG06 Jaromír Šlesinger, CA Technologies Bratislava, 13. október 2011

Stavební kameny datových center - úložiště - management

Efektivní provoz koncových stanic

Extreme Forum Datová centra A10, VMWare, Citrix, Microsoft, Ixia

Kybernetické útoky a podvody Inteligentní detekce a obrana

<Insert Picture Here> Jak garantovat bezpečnost systémů ve státní správě

Zabezpečení softwarově definovaných datových center prostřednictvím Check Point vsec a VMware NSX

Potřebujete mít vaše IS ve shodě s legislativou? Bc. Stanislava Birnerová

Desktop Cloud Petr Leština, Igor Hegner

ANECT, SOCA a CISCO Cognitive Threat Analytics Breach Detection v praxi

Cloud Computing IBM Corporation

Security Management. Přednáška pro ISE 21. března Marek Rychlý (a Ivana Burgetová)

Defense-in-Depth. Strategie hloubkové ochrany - účinný přístup k ochraně koncových bodů dle kybernetického zákona

SOA a Cloud Computing

SOCA & Zákon o kybernetické bezpečnosti. od teorie k praxi. Ivan Svoboda & SOCA AFCEA CERT/SOC

Jak se mění IT. IT jako služba a technologické trendy. Tomáš Novák DC & Virtualization Product Specialist tomnovak@cisco.com

Náklady a přínosy datových center

Litosil - application

Rizika výběru cloudového poskytovatele, využití Cloud Control Matrix

Zajištění bezpečnosti privilegovaných účtů

Optimalizace infrastruktury cesta ke kontrole IT. Pavel Salava Specialist Team Unit Lead Microsoft, s.r.o

Desktop Cloud Michal Votava Cloud Solution Representative

Czech Republic. EDUCAnet. Střední odborná škola Pardubice, s.r.o.

Veeam Availability Suite 9.5

Obecný úvod do Cloud Computingu

Zabezpečení platformy SOA. Michal Opatřil Corinex Group

Případová studie. Petr Leština Client IT Architekt. ...aneb implementace IBM cloudu u zákazníka v Čechách IBM Corporation

Rozdělení odpovědnosti za zabezpečení sdíleného cloud prostředí

Produktové portfolio

Tento materiál byl vytvořen v rámci projektu Operačního programu Vzdělávání pro konkurenceschopnost.

Aruba ClearPass bezpečné řízení přístupu do sítě a integrační možnosti. Daniel Fertšák Aruba Systems Engineer

Enterprise Content Management IBM Corporation

ITICA. SAP Školení přehled Seznam kurzů

Bezpečný cloud šifrování a silná autentizace. Ing. Petr Slaba ASKON International s.r.o.

Microsoft System Center Configuration Manager Jan Lukele

Linecard. Technology 03/2016

O jedné metodě migrace velkých objemů dat aneb cesta ke snižování nákladů

Cloud Computing. Tomáš Michaeli Presentation_ID 2006 Cisco Systems, Inc. All rights reserved. Cisco Public

User manual SŘHV Online WEB interface for CUSTOMERS June 2017 version 14 VÍTKOVICE STEEL, a.s. vitkovicesteel.com

Nasazení cloudových služeb u zákazníků v hybridním řešení Windows. Praha,

Bezpečnostní projekt podle BSI-Standardu 100

ICT bezpečnost a její praktická implementace v moderním prostředí

ANECT, SOCA a bezpečnost aplikací

Caroline Glendinning Jenni Brooks Kate Gridley. Social Policy Research Unit University of York

Technická bezpečnostní opatření nejen ve smyslu ZKB. Jan Zdvořáček ASKON International s.r.o.

Cloud Security. Dušan Mondek. Security Specialist IBM Security Office IBM Corporation

Nový přístup k bezpečnosti v budování výpočetní a komunikační infrastruktury


Petr Vlk. Project Manager KPCS CZ

Dohledové systémy Microsoft vs. cesta k vyšší produktivitě IT

Dopady GDPR na design IT Martin Dobiáš, Digital Advisory Services

Introduction to MS Dynamics NAV

Stav podnikové bezpečnosti, Globální zpráva Jakub Jiříček, Symantec ČR a SR

Postup objednávky Microsoft Action Pack Subscription

Project Life-Cycle Data Management

Instantní Cloud: CA AppLogic. Jaromír Šlesinger, CA CEE

Obsah&/&Content& Všeobecné)podmínky)(v)češtině)) Terms)and)Conditions)(in)english)) )

Automatizace pro dynamická datová centra a Cloud. Jaromír Šlesinger, CA CEE Jaromir.slesinger@ca.com

Integrované řízení a zabezpečení sítě cesta k rychlé reakci na kybernetické hrozby

Social Media a firemní komunikace

Petr Vlk KPCS CZ. WUG Days října 2016

Technická komise ISO/JTC1/SC 27 Technická normalizační komise ÚNMZ TNK 20

Nová éra diskových polí IBM Enterprise diskové pole s nízkým TCO! Simon Podepřel, Storage Sales

Sociální sítě jako Velký bratr. Martin Klubal AEC a.s.

Virtualizace desktopu virtuální realita, nebo skutečnost?

Aplikační inteligence a identity management jako základ bezpečné komunikace

ANALÝZA RIZIK CLOUDOVÉHO ŘEŠENÍ Z POHLEDU UŽIVATELE. Václav Žid

DIGITÁLNÍ TRANSFORMACE SE STÁVÁ OTÁZKOU PRO CEO

Petr Zahálka. Hlídejte si data! Je čas začít se zabývat zabezpečením samotných dat.

Ostrava. 16. dubna 2014

Microsoft Lync WEB meeting

Hands-on-Lab. System Center Essentials learning.wbi.cz. Jan Marek. blog: jmarek.wordpress.com

Brno. 30. května 2014

Přehled oblastí Service Portfolio Managementu, Virtualizace a Automatizace. Jaromír Šlesinger, CA CEE jaromir.slesinger@ca-cee.cz

NSX scenariji. Jelena Tatomirović, rež i i že jer

AUDIT STATEMENT REPORT POSTSIGNUM ROOT QCA

Brno. 30. května 2014

Ivo Němeček. Manager, Systems Engineering Cisco and/or its affiliates. All rights reserved. Cisco Public 1

Konsolidace na privátní cloud

ActiPack rozšířil výrobu i své prostory EMBAX Od ledna 2015 jsme vyrobili přes lahviček či kelímků. Děkujeme za Vaši důvěru!

IBM Security. Trusteer Apex. Michal Martínek IBM Corporation IBM Corporation

Deep Security 7.5 Agent-less Anti Malware pro virtualizaci serverů a desktopů

Jak připravit IBM System x server pro zákazníka

SmartCloud Enterprise

Střední průmyslová škola strojnická Olomouc, tř.17. listopadu 49

Progressive loyalty V1.0. Copyright 2017 TALENTHUT

ehealth Day 2016 Jak zavést účinná organizační a technická opatření pro řízení bezpečnosti

Správa a sledování SOA systémů v Oracle SOA Suite

Víme, co se děje aneb Log Management v praxi. Petr Dvořák, GAPP System

Transkript:

RSA: Vision of Secure Virtualization and Trusted Cloud RNDr. Ivan Svoboda, CSc. RSA, The Security Division of EMC

Agenda About RSA Virtualization and Cloud Computing (definitions) RSA / EMC: our experience with cloud Virtualization and Cloud: Risks, Security and Compliance Virtualization and Cloud: RSA security solutions

Meeting our Customers Challenges Secure Access for Increased Mobility & Collaboration Manage Risk and Threats Throughout Enterprise Prove Compliance Consistently & Affordably Secure Virtualization & Cloud Computing 3 How?

How We Do It System for Managing Security, Risk and Compliance Governance, Risk & Compliance Archer egrc Suite Policy Management Risk Management Incident Management Compliance Management Enterprise Management Authentication SecurID Adaptive Auth Auth. Manager Express Identity Security Access / Provision Access Manager Federated Identity Mgr Fraud Prevention Fraud Action Transaction Monitoring efraud Network Data Security Data Loss Prevention DLP Cisco IronPort Network Partners Endpoint Partners Encryption & Tokenization DPM App DPM DC BSAFE Tokenization Microsoft RMS Monitoring / Audit / Reporting SIEM Network Analysis / Forensics envision NetWitness

RSA, The Security Division of EMC Leader 1 st Authentication Data Loss Prevention Leader Web Fraud Detection Leader SIEM Leader egrc

How We Do It System for Managing Security, Risk and Compliance GRC: Risk/ Policy Management RSA Archer Analyze / Discover (Data, Threats) RSA DLP, FraudAction, NetWitness Enforce Controls RSA Encryption, Authentication, Access control, Transaction Monit Log / Report / Audit RSA envision

RSA Komplexní přístup k řešení bezpečnosti Governance, Risk & Compliance Archer egrc Suite Policy Management Risk Management Incident Management Compliance Management Enterprise Management Authentication Identity Security Access / Provision Fraud Prevention Data Security Data Loss Prevention Encryption & Tokenization Network / System Security Cisco Microsoft VMware Monitoring / Audit / Reporting SIEM (envision) NAV (NetWitness)

8 Virtualizace a cloud computing

The Opportunity Enterprise The Public IT Cloud Has Many Has Broad Challenges Appeal Enterprise IT Public Cloud Complex Expensive Inflexible Siloed Simple Low Cost Flexible Dynamic Infrastructure Over Time, Enterprise IT Will Evolve Towards Public Cloud Ideals Copyright 2010 EMC Corporation. All rights reserved. 9

The Opportunity: The Journey to the Cloud The Private Cloud is a Logical First Step Enterprise IT Private Cloud Public Cloud Trusted Controlled Reliable Secure Simple Low Cost Flexible Dynamic Infrastructure 70% Will Spend More On Private Cloud through 2012 - Gartner DC Conference 2009 Copyright 2010 EMC Corporation. All rights reserved. 10

The Opportunity: The Journey to the Cloud Hybrid Virtualize Cloud: Everything, Utilize Service Standardize Provider & Automate Infrastructure Enterprise IT Private Cloud Public Cloud Virtualization Converged Infrastructure Automation Federation GRC Infrastructure as-a-service Infrastructure Hybrid Cloud Copyright 2010 EMC Corporation. All rights reserved. 11

Securing the Journey to The Private Cloud IT Production Lower Costs Business Production Improve Quality Of Service IT-As-A-Service Improve Agility % Virtualized 85% 95% 70% 30% 15% Platinum Gold Visibility into virtualization infrastructure privileged user monitoring access management network security Security Compliance Information-centric security Risk-driven policies IT and security operations alignment Secure multi-tenancy Verifiable chain of trust

RSA / EMC: naše zkušenosti s cloudem a virtualizací 13

RSA / EMC: naše zkušenosti s virtualizací 14

RSA / EMC: naše zkušenosti s cloudem Žijeme cloudem Jsme na cestě k privátnímu cloudu (přes 75% virtualizace) Používáme public cloud aplikace (např. CRM) Jsme dodavatelem řešení pro cloud: VCE (VMware, Cisco, EMC) RSA: řešení bezpečnosti pro VCE (Vblock) Dodáváme bezpečnost providerům cloudu Verizon, CSC, AT&T, Poskytujeme řešení SaaS Adaptivní autentizace Transakční monitoring 3D Secure Máme vizi bezpečného cloudu Jsme členy CSA (Cloud Security Alliance) Uvedli jsme řešení Cloud Trust Authority 15

EMC IT s Journey to the Private Cloud IT Production Efficiency % Virtualized Business Production Quality of service IT-as as-a-service Agility Development, test and IT-owned applications We are here 75% 86% 100% 40% 30% 15% Mission-critical applications Run IT as a business 2004-08 2009-10 2011+ Copyright 2010 EMC Corporation. All rights reserved. 16

Self -Service IT Portal Deliver IT as a Service Define Service Catalog, Publish to Self-service IT Portal Service Catalog Policy/SLAdriven Management Availabilit y Security Performan ce Cost 99.99% High 0.2ms $500K Application Service Catalogue VMware vcloud Director 17 Infrastructure Service Catalogue EMC UIM Platinum Gold Silver Bronze Copyright 2010 EMC Corporation. All rights reserved.

www.emc.com/emcit EMC IT Journey to the Private Cloud: A Practitioner's Guide http://www.emc.com/collateral/software/white-papers/h7298-it-journey-private-cloud-wp.pdf Copyright 2010 EMC Corporation. All rights reserved. 18

Jaká jsou doporučení ostatních? US Government CIO (Kundra): 25% of Fed IT Spend on Cloud Services NIST: Guidelines on Security and Privacy in Public Cloud (800-144 Draft) Cloud Security Alliance: Cloud Assesment Initiative Fraud-as-a-Service running in cloud Trojans as a Service 19

Virtualizace a cloud computing: problémy bezpečnosti a souladu 20

Hlavní změny na cestě ke cloudu Enterprise IT Private Cloud Public Cloud Trusted Controlled Reliable Secure Virtualizace Důvěra Simple Low Cost Flexible Dynamic Infrastructure Availabilit y Security Private Cloud Performan ce Cost 99.99% High 0.2ms $500K

Hlavní změny na cestě ke cloudu: krok 1 Dohled (SIEM, DLP, GRC, ) Bezpečnost virtualizace / privátní cloud Virtual Datacenter 1 Virtual Datacenter 2 DMZ PCI HIPAA Test Dev Síťová bezpečnost Fyzická Firma A bezpečnost DMZ ERP FW, AV, IDS, IPS, VPN, AAA, HR

Hlavní změny na cestě ke cloudu: krok 2 Důvěra (Trust = Visibility + Control) Bezpečnost cloudu Dohled (SIEM, DLP, GRC, ) DMZ PCI Bezpečnost virtualizace / privátní cloud Virtual Datacenter 1 HIPAA Virtual Datacenter 2 Test Dev Fyzická bezpečnost Síťová bezpečnost DMZ Firma A HR ERP FW, AV, IDS, IPS, VPN, AAA,

Hlavní změny na cestě ke cloudu: důvěra = SLA? Enterprise IT Private Cloud Public Cloud Virtualizace Důvěra = SLA? Infrastructure Private Cloud Availability Security Performance Cost 99.99% High 0.2ms $500K

Examples: Security at SalesForce.Com

Examples: Security at Google

Examples: Security at Cloud - examples Does XXXX give third parties access to my organization's data? XXXX does not share or reveal private user content such as email or personal information with third parties except as required by law, on request by a user or system administrator, or to protect our systems. These exceptions include requests by users that XXXX support staff access their email messages in order to diagnose problems; when XXXX is required by law to do so; and when we are compelled to disclose personal information because we reasonably believe it's necessary in order to protect the rights, property or safety of XXXX, its users and the public.

Enabling Trust in the Cloud Enterprises Cloud Service Providers Security & Compliance Visibility & Reporting Identities Information Workload Private Cloud Hybrid Cloud Public Cloud https://cloudsecurityalliance.org/

Examples: CSA questions (1) Compliance - Independent Audits: Do you allow tenants to view your SAS70 Type II/SSAE 16 SOC2/ISAE3402 or similar third party audit reports? Compliance - Third Party Audits: Do you permit tenants to perform independent vulnerability assessments? Data Governance - Secure Disposal: Do you support secure deletion (ex. degausing / cryptographic wiping) of archived data as determined by the tenant? Data Governance - Information Leakage Do you have controls in place to prevent data leakage or intentional/accidential compromise between tenants in a multi-tenant environment? Do you have a DLP solution in place for all systems which interface with your cloud service offering? Data Governance - Risk Assessments Do you provide security control health data in order to allow tenants to implement industry standard Continuous Monitoring (which allows continual tenant validation of your physical and logical control status?)

Examples: CSA questions (2) Information Security - Baseline Requirements: Do you have documented information security baselines for every component of your infrastructure (ex. Hypervisors, operating systems, routers, DNS servers, etc?) Do you have a capability to continuously monitor and report the compliance of your infrastructure against your information security baselines? Information Security - Segregation of Duties : Do you provide tenants with documentation on how you maintain segregation of duties within your cloud service offering? Information Security - Encryption Key Management: Do you encrypt tenant data at rest (on disk/storage) within your environment? Do you maintain key management procedures? Information Security - Incident Management Do you publish a roles and responsibilities document specifying what you vs. your tenants are responsible for during security incidents? Do you have a DLP solution in place for all systems which interface with your cloud service offering? Information Security - Incident Reporting Does your security information and event management (SIEM) system merge data sources (app logs, firewall logs, IDS logs, physical access logs, etc.) for granular analysis and alerting?

Our Customers Are Asking Themselves Can I ensure my virtualized business critical applications are running in a secure and compliant environment? How do I centrally manage compliance across mixed VMware and physical IT environments? Can I respond more quickly to security events in my virtual environment? How do I begin to assess hybrid and public cloud service providers?

Virtualizace a cloud computing: RSA řešení bezpečnosti a souladu 32

Je to bezpečné? A je to v souladu? Běžná odpověď provozovatele IT: ANO! Na bezpečnost velmi dbáme Máme implementovánu spoustu firewallů, Dodržujeme zákony. Prošli jsme auditem Vidíte dovnitř? Kde jsou Vaše data, kdo k nim přistoupil, co se stalo Můžete změřit compliance? Jaká je aktuální realita (technická konfigurace)? Co přesně je/není splněno? Můžete to dokázat/reportovat?

Securing the Journey to The Cloud IT Production Lower Costs Business Production Improve Quality Of Service IT-As-A-Service Improve Agility % Virtualized 85% 95% 70% 30% 15% Platinum Gold Secure multi-tenancy, Verifiable chain of trust Security Compliance, information-centric security, risk-driven policies, IT and security operations alignment Visibility into virtualization infrastructure, privileged user monitoring, access management, network security

Bezpečnost virtuálního a cloudového prostředí VMware: síťová bezpečnost vshield, vcloud Director Virtual firewalls, application protection, RSA: dohled, compliance SIEM, DLP, GRC, Authentication, envision, DLP, Archer, SecurID,

RSA Sada řešení (nejen) pro virtuální prostředí Ochrana identit, řízení přístupu Silná dvoufaktorová a multifaktorová autentizace pro uživatele a administrátory Ochrana citlivých dat před jejich únikem (DLP) Na úložištích, na síti, na virtuálních desktopech Bezpečnostní monitoring celé virtualizované infrastruktury Kompletní SIEM řešení plnící roli Security Operations Center Audit a zajištění shody s legislativou a interními předpisy měření/prokazování compliance : VMware (virtuální i fyzická infrastruktura, privátní cloud) Cloud (compliance podle CSA)

RSA Sada řešení (nejen) pro virtuální prostředí Compliance (GRC) Archer egrc Suite VMware Cloud Identity Security Access / Fraud Authentication Provision Prevention Data Security Data Loss Encryption & Prevention Tokenization Monitoring / Audit / Reporting SIEM (envision)

RSA Solution for VMware View RSA Archer Compliance Dashboard VMware Infrastructure RSA DLP for protection of data in use RSA SecurID for remote authentication Active Directory Clients Validated with Vblock VMware View Manager RSA SecurID for ESX Service Console and vma VMware vcenter RSA envision log management for VMware vcenter & ESX(i) VMware View RSA SecurID RSA DLP Active Directory

RSA Sada řešení (nejen) pro virtuální prostředí Compliance (GRC) Archer egrc Suite VMware Cloud Identity Security Access / Fraud Authentication Provision Prevention Data Security Data Loss Encryption & Prevention Tokenization Monitoring / Audit / Reporting SIEM (envision)

Visibility and Monitoring: RSA envision Consolidated event log management, analysis, and reporting Allows for cross-environment correlation Collects logs from the VMware stack VMware vshield VMware vcenter VMware ESX/ESXi VMware View Manager VMware vcloud Director VMware Collector for RSA envision leverages VMware API s RSA envision Can pull logs from multiple vcenters!

Use Case Scenarios Protecting Management Console Applying Patch to Production System Lost Laptop Unauthorized Administrator

Scenario Apply Patch to Production System - Before Production Datacenter HR Application Server VM PATCH Test Environment HR Application Server VM PATCH HR Database Server VM HR Database Server VM HRDB Name, SSN, DoB, etc HRDB Name, SSN, DoB, etc Is the test Is this A common an way to apply 1 Clone patches virtual is to try environment Who them accessed out in a the test environment Was the VM 3 Apply environment authorized Patch 2to Test production Patch data environment in the test destroyed after In a virtual This sufficiently is world difficult protected you and can time-consuming clone the system, in a production data and all procedure? environment? it was used? environment, & controlled? but very easy in a virtual environment

Scenario Apply Patch to Production System - After Production Datacenter HR Application Server VM PATCH Test Environment HR Application Server VM PATCH HR Database Server VM HR Database Server VM HRDB Name, SSN, DoB, etc HRDB Name, SSN, DoB, etc 3 Apply 1Patch Clone 2to virtual Test production Patch environment environment VM Cloned VM Cloned Patch Applied RSA envision can log the administrative activity from vcenter, like the VM being cloned RSA envision Patch Applied Patch Applied VM Deleted If this is out of policy If the test we environment can alert a security is properly protected, analyst then it will also be monitored by RSA envision

Use Case: Monitoring events in the virtual datacenter

RSA Sada řešení (nejen) pro virtuální prostředí Compliance (GRC) Archer egrc Suite VMware Cloud Identity Security Access / Fraud Authentication Provision Prevention Data Security Data Loss Encryption & Prevention Tokenization Monitoring / Audit / Reporting SIEM (envision)

Use Case: Reducing Risk of VM Theft RISK Securing virtual infrastructure is often a check list of best practices. Hardening VMware environment is complex and difficult to verify. What can I do to limit the risk of VM theft from my datacenter? Need to take preventative steps that limit access to VM file, such as: Disable Datastore Browser Limit Storage User Access Limit use of service console Use least privileged role concept for system and data access

Use Case: Reducing Risk of VM Theft SOLUTION Archer has built in control procedures to check for VM file access and other best practices From a centralized console security and IT ops can easily see if controls enforce policy Solution identifies VMware devices, assesses configuration status, and informs responsible administrator EnVision monitors to ensure security events not disrupting compliance posture Results: Security and compliance best practices directly aligned with regulations and company policies are implemented and verified

Cycle of Compliance: RSA Solution for Cloud Security and Compliance RSA Securbook Discover VMware infrastructure Define security policy Over 100 VMware-specific controls added to Archer library, mapped to regulations/standards Manage security incidents that affect compliance RSA envision collects, analyzes and feeds security incidents from RSA, VMware and ecosystem products to inform Archer dashboards RSA Archer egrc Remediation of non-compliant controls Manual and automated configuration assessment Solution component automatically assesses VMware configuration and updates Archer

Mapping VMware Security Controls to Regulations and Standards Authoritative Source Regulations (PCI-DSS, etc.) 10.10.04 Administrator and Operator Logs CxO RSA Archer egrc Control Standard Generalized security controls CS-179 Activity Logs system start/stop/config changes etc. Control Procedure Technology-specific control CP-108324 Persistent logging on ESXi Server VI Admin

Distribution and Tracking Control Procedures Security Admin Server Admin Project Manager Network Admin RSA Archer egrc VI Admin

RSA Solution for Cloud Security and Compliance Automated Measurement Agent VI Component Discovery and Population VI Configuration Measurement VMware-specific Controls RSA Archer egrc alerts RSA envision 51

52 VMware compliance: live demo

Control Procedures List, Status and Measurement Method

Control Procedures List, Status and Measurement Method

Compliance Dashboard across Physical and Virtual

RSA Sada řešení (nejen) pro virtuální prostředí Compliance (GRC) Archer egrc Suite VMware Cloud Identity Security Access / Fraud Authentication Provision Prevention Data Security Data Loss Encryption & Prevention Tokenization Monitoring / Audit / Reporting SIEM (envision)

Making Archer the Best GRC Solution for Hybrid Clouds Cloud Architecture Governance and Enterprise Risk Management Legal and Electronic Discovery Compliance and Audit Information Lifecycle Management Portability and Interoperability Security, Bus. Cont,, and Disaster Recovery Data Center Operations Incident Response, Notification, Remediation Application Security Encryption and Key Management Virtualization Identity and Access Management Assessing Service Provider Compliance RSA Solution for Cloud Security and Compliance aligns with CSA Consensus Assessment Questions by automating 195 questions that customers can issue to assess cloud service providers. Cloud Security Alliance s 13 domains of focus for cloud computing

CSA Assessment Questionnaire in Archer

Use Case: Assessing Cloud Service Providers RISK: Choosing the wrong service provider Results: Benchmarking vendors based on CSA standards

Creating the Trusted Cloud Trust = Visibility + Control Control: Availability Integrity Confidentiality Visibility: Compliance Governance Risk Management Availabilit y Security Private Cloud Performan ce Cost 99.99% High 0.2ms $500K 60

Hlavní změny na cestě ke cloudu Enterprise IT Private Cloud Public Cloud Cloud provider A Virtualizace Infrastructure Důvěra = SLA? Cloud provider B Cloud provider C Availabilit y Security Private Cloud Performan ce Cost Cloud provider D 99.99% High 0.2ms $500K

RSA Cloud Trust Authority Identity Services Compliance profiling 62

RSA řešení pro bezpečnost a compliance Vidíte dovnitř? Kde jsou Vaše data, kdo k nim přistoupil, co se stalo Můžete změřit compliance? Jaká je aktuální realita (technická konfigurace)? Co přesně je/není splněno? Můžete to dokázat/reportovat?

More Information Info o RSA resenich pro virtualizaci a cloud: www.rsa.com/rsavirtualization uvodni demo: http://www.rsa.com/experience/virtual/rsa_virtual_journ ey.html Reseni pro VMware: http://www.rsa.com/node.aspx?id=3684 Reseni pro Cloud (zakladem je zase virtualizace): http://www.rsa.com/node.aspx?id=1130 reseni pro VMware View: http://www.rsa.com/node.aspx?id=1334

RSA SecurBook: Cloud Security and Compliance www.rsa.com/rsavirtualization A technical guide for deploying and operating RSA Solution for Cloud Security and Compliance Documents solution architecture Solution deployment and configuration guides Operational guidance for effectively using the solution Troubleshooting guidance 65

More Information www.rsa.com/rsavirtualization RSA SecurBooks Technical guides for deploying and operating RSA Solutions EMC Solutions for VMware Webcasts - Every Thursday at 11:00 AM ET Join us for Webcasts: http://mediazone.brighttalk.com/comm/isc2/a7082f81e6-17335-2838-18812

Questions/Feedback/Discussion RSA Contacts: Ivan Svoboda: Key Account Manager ivan.svoboda@rsa.com + 420 604 293 394 67

www.rsa.com/securecloud Thank you!