Cloud Security Planning

Slides:



Advertisements
Similar presentations
Mobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information.
Advertisements

Contact Center Security Strategies Grant Sainsbury Practice Director, Dimension Data.
Didzis Balodis, CISSP, Head of IT Security and Infrastructure at SQUALIO Using the Cloud - practical security implications.
Cloud Computing How secure is it? Author: Marziyeh Arabnejad Revised/Edited: James Childress April 2014 Tandy School of Computer Science.
Chapter 2 Information Security Overview The Executive Guide to Information Security manual.
Current Job Components Information Technology Department Network Systems Administration Telecommunications Database Design and Administration.
Thomas Levy. Agenda 1.Aims: Reducing Cyber Risk 2.Information Risk Management 3.Secure Configuration 4.Network Security 5.Managing User Access 6.Education.
Enterprise Risk Management & IT Compliance March 30, 2010 Presented by: Ken Rowe, Director Enterprise Systems Assurance & Chief Security Officer University.
Kacper Rams, Matt Starr, Megan Stephens. Overview BYOD Introduction Risks Controls.
Put your company logo here Confidential Data Upgrade from 8.x to 9.0.
12 Steps to Cloud Security A guide to securing your Cloud Deployment Vishnu Vettrivel Principal Engineering Lead,
CIO Perspectives on Security Fabrício Brasileiro Regional Sales Manager.
Nov 22/26 Tech Forum 2015 Roberto Trinconi Cloud the New Path to the Business Leadership.
BYOD: An IT Security Perspective. What is BYOD? Bring your own device - refers to the policy of permitting employees to bring personally owned mobile.
© ITT Educational Services, Inc. All rights reserved. IS3220 Information Technology Infrastructure Security Unit 10 Network Security Management.
Chapter 15 Telecommunication Department Management.
WINDOWS AZURE AND THE HYBRID CLOUD. Hybrid Concepts and Cloud Services.
Clouding with Microsoft Azure
Azure Stack Foundation
EAST AFRICAN DATA HANDLERS DATA SECURITY/MOBILITY
Deployment Planning Services
Building ARM IaaS Application Environment
3 Do you monitor for unauthorized intrusion activity?
Stop Cyber Threats With Adaptive Micro-Segmentation
Deployment Planning Services
Enterprise Security in Practice
“Introduction to Azure Security Center”
Microsoft Virtual Academy
Deployment Planning Services
Hybrid Management and Security
Deployment Planning Services
SaaS Application Deep Dive
Cloud Adoption Framework
Securing the Network Perimeter with ISA 2004
DIRECTOR OF CLOUD SERVICES
9/4/2018 6:45 PM Secure your Office 365 environment with best practices recommended for political campaigns Ethan Chumley Campaign Technology Advisor Civic.
Measure Effectiveness of Communication, Engage Your Employees, and Bridge Communication Gaps with Sparrow App and Power of Microsoft Azure MICROSOFT AZURE.
Threat Management Gateway
AX 2009/2012 Upgrade to Dynamics 365 FO
Cloud Security.
Rights Management Services (RMS)
Matt G change over point ?
IS4550 Security Policies and Implementation
Cisco Dumps PDF Implementing Cisco Network Security RealExamCollection.com.
CompTIA CAS-003 Exam Study Material - CompTIA CAS-003 Exam Dumps Realexamdumps.com
Company Overview & Strategy
Threat Trends and Protection Strategies Barbara Laswell, Ph. D
Microsoft Virtual Academy
Microsoft Virtual Academy
VPN What, where, who, why when?.
Microsoft Virtual Academy
12 STEPS TO A GDPR AWARE NETWORK
Contact Center Security Strategies
TEMPLATE NOTES Our datasheet and mini-case study templates are formatted specifically for consistency of branding at Microsoft. Please do not alter font.
Microsoft Virtual Academy
System Center Marketing
Microsoft Virtual Academy
3 Do you monitor for unauthorized intrusion activity?
Microsoft Virtual Academy
Microsoft Virtual Academy
Data Security and Privacy Techniques for Modern Databases
IT Management Services Infrastructure Services
In the attack index…what number is your Company?
Microsoft Virtual Academy
Fy ‘08 NETWORK PLANNING TASK FORCE
3 Do you monitor for unauthorized intrusion activity?
OU BATTLECARD: Oracle Identity Management Training
Microsoft Virtual Academy
Cloud Computing for Wireless Networks
Presentation transcript:

Cloud Security Planning Scott Morley – Principal Application Architect

Agenda Understanding the Cloud perimeter Default insecurity Defense in depth RBAC importance Encryption Azure Security Center vCISO

OneNeck® IT Solutions at a Glance Providing hybrid IT Solutions to mid-market & enterprise-sized companies Backed by the Fortune 1000® strength of Telephone and Data Systems [NYSE: TDS] Formed in 2010 through strategic acquisitions; each doing business over 15 years Headquartered in Madison, Wisconsin Nearly 550 employees 8 data centers in 6 states Coast-to-coast presence  OneNeck IT Solutions at a Glance A little about us … We provide hybrid IT Solutions to mid-market and enterprise-sized companies We are backed by Telephone and Data Systems, #504 on the most recent Fortune 1000 list Though OneNeck IT Solutions (as it’s known today) was just formed in 2014, the companies which make up OneNeck have been doing business for more than 20 years, dating back to 1993. We have a presence in 15 states and 9 data centers strategically located across the country We employ more than 600 people and have over 400 technical resources

Setting the Baseline VS

The Perimeter Internet/ExpressRoute VPN/RDP/HTTPs VPN

Open by Default RDP or HTTPS open to the world Can be adjusted by templates ACLs are generally IP based VPN/Express Route/Direct Connect

Defense in Depth Maintained security policies and standards Employee training and awareness Network perimeter defenses (ACL) Malware defenses Risk assessments Vulnerability management Penetration Testing Data encryption (in motion and at rest) MFA Backups

Role Based Authentication RBAC is more for subscription level access Different for OS/Application level Easy to get out of control Main roles: Owner/Admin Contributor Billing Read Only

Encryption File system Drives Databases Communication Implement a key management practice

Azure Security Center Cross location security monitoring https://azure.microsoft.com/en-us/services/security-center/ Cross location security monitoring Includes traditional security systems Uses advanced ML/AI capabilities Tracks usage patterns

Virtual Chief Information Security Officer vCISO Security as a Service Can’t justify full time position Prevent head in the sand syndrome Benefit of group knowledge Understanding of your business