IT Management Services Infrastructure Services

Slides:



Advertisements
Similar presentations
Course: e-Governance Project Lifecycle Day 1
Advertisements

BENEFITS OF SUCCESSFUL IT MODERNIZATION
Notes: Update as of 1/13/2010. Vulnerabilities are included for SQL Server 2000, SQL Server 2005, SQL Server Oracle (8i, 9i, 9iR2, 10g, 10gR2,11g),
Security, Privacy and the Cloud Connecticut Community Providers’ Association June 20, 2014 Steven R Bulmer, VP of Professional Services.
Smart Grid - Cyber Security Small Rural Electric George Gamble Black & Veatch
Security in the Cloud: Can You Trust What You Can’t Touch? Rob Johnson Security Architect, Cloud Engineering Unisys Corp.
Security Controls – What Works
© 2004 Visible Systems Corporation. All rights reserved. 1 (800) 6VISIBLE Holistic View of the Enterprise Business Development Operations.
Advanced Metering Infrastructure AMI Security Roadmap April 13, 2007.
NIST framework vs TENACE Protect Function (Sestriere, Gennaio 2015)
Security Offering. Cyber Security Solutions 2 Assessment Analysis & Planning Design & Architecture Development & Implementation O&M Critical Infrastructure.
Cloud Usability Framework
Plan Introduction What is Cloud Computing?
Computer Associates Solutions Managing eBusiness Catalin Matei, April 12, 2005
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
No one questions that Microsoft can write great software. Customers want to know if we can be innovative, scalable, reliable in the cloud. (1996) 450M+
Jim Reavis, Executive Director Cloud Security Alliance November 22, 2010 Developing a Baseline On Cloud Security.
Copyright © 2006 CyberRAVE LLC. All rights reserved. 1 Virtual Private Network Service Grid A Fixed-to-Mobile Secure Communications Framework Managed Security.
© 2001 Carnegie Mellon University S8A-1 OCTAVE SM Process 8 Develop Protection Strategy Workshop A: Protection Strategy Development Software Engineering.
Thomas Levy. Agenda 1.Aims: Reducing Cyber Risk 2.Information Risk Management 3.Secure Configuration 4.Network Security 5.Managing User Access 6.Education.
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
ISO17799 Maturity. Confidentiality Confidentiality relates to the protection of sensitive data from unauthorized use and distribution. Examples include:
Roadmap to Maturity FISMA and ISO 2700x. Technical Controls Data IntegritySDLC & Change Management Operations Management Authentication, Authorization.
Plan  Introduction  What is Cloud Computing?  Why is it called ‘’Cloud Computing’’?  Characteristics of Cloud Computing  Advantages of Cloud Computing.
2009 Federal IT Summit Cloud Computing Breakout October 28, 2009.
1 © Material United States Department of the Interior Federal Information Security Management Act (FISMA) April 2008 Larry Ruffin & Joe Seger.
Engineering Essential Characteristics Security Engineering Process Overview.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Working with HIT Systems
1 MISA Model Douglas Petry Manager Information Security Architecture Methodist Health System Managed Information Security.
Objective: Enable portability and semi-automatic management of applications across clouds regardless of provider platform or infrastructure thus expanding.
Security Environment Assessment. Outline  Overview  Key Sources and Participants  General Findings  Policy / Procedures  Host Systems  Network Components.
Nov 22/26 Tech Forum 2015 Roberto Trinconi Cloud the New Path to the Business Leadership.
Information Security Framework Regulatory Compliance and Reporting Auditing and Validation Metrics Definition and Collection Reporting (management, regulatory,
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Sicherheitsaspekte beim Betrieb von IT-Systemen Christian Leichtfried, BDE Smart Energy IBM Austria December 2011.
Cisco Consulting Services for Application-Centric Cloud Your Company Needs Fast IT Cisco Application-Centric Cloud Can Help.
© 2010 IBM Corporation John Pritchard Cloud Architect Cloud Computing Client Engagements January, 2010 IBM Cloud Computing Reference Architecture.
 December 2010 US Chief Information Officer Vivek Kundra released the Federal Cloud Computing Strategy. This became to be what is known as “Cloud First”
Clouding with Microsoft Azure
Dr. Ir. Yeffry Handoko Putra
READ ME FIRST Use this template to create your Partner datasheet for Azure Stack Foundation. The intent is that this document can be saved to PDF and provided.
Mobile Application Solution
Safeguarding CDI - compliance with DFARS
Viewtrust software overview
CLOUD ARCHITECTURE Many organizations and researchers have defined the architecture for cloud computing. Basically the whole system can be divided into.
Presenter: Mohammed Jalaluddin
ISO 9001:2008/ AS9100 Registered Management Systems Registration
Cyber Security Enterprise Risk Management: Key to an Organization’s Resilience Richard A. Spires CEO, Learning Tree International Former CIO, IRS and.
CIM Modeling for E&U - (Short Version)
Introduction to the Federal Defense Acquisition Regulation
All-Inclusive Testing in API Management
Mobile Application Solution
Cloud Application Marketplaces
Securing Your Digital Transformation
Cloud Security An IaaS Story 2018 © Netskope. All rights reserved.
Developing a Baseline On Cloud Security Jim Reavis, Executive Director
Cybersecurity Special Public Meeting/Commission Workshop for Natural Gas Utilities September 27, 2018.
Cloud Application Marketplaces
JOINED AT THE HIP: DEVSECOPS AND CLOUD-BASED ASSETS
Cybersecurity ATD technical
What is Interesting in the CCSP certification?
AMI Security Roadmap April 13, 2007.
NIST Cloud Computing Reference Architecture
Managing IT Risk in a digital Transformation AGE
Cloud Application Marketplaces
Microsoft Training & Certifications
UDTSecure TM.
Information Technology Organization Overview RFP #220-05
Cloud Computing for Wireless Networks
Presentation transcript:

IT Management Services Infrastructure Services Controls Wells Fargo Technology Controls Cube Security Controls Business Controls Regulatory Controls The Technology Controls Cube defines controls across three dimensions to establish clear accountability and ensure completeness of coverage Controls – Defines the requirement Operations – Defines how the control is implemented and who is responsible for implementing the control Technology Stack – Defines where the control is implemented in the technology stack Applications Data Services Security Services IT Management Services Platform Services Infrastructure Services Operations Tech Stack

Full Stack Automation (FSA) Scope for DevSecOps Controls deployed in a uniform manner across the technology stack by leveraging Full Stack Automation Cross-organizational, engineering practice and capability that breaks down barriers and establishes collaboration between development, security, and operations organizations using automation to focus on rapid, frequent delivery of secure infrastructure and software to production Encompasses intake to release of software and manages those flows predictably, transparently, and with minimal human intervention/effort – from Sunrise to Sunset Provides built-in security controls through automation of the software development lifecycle along with enablement of security monitoring and integration with cyber threat management

Full Stack Automation (FSA) for DevSecOps IT Management Servceis Supply Chain / Vendor Management Change Management Asset/ Configuration Management Incident, Event/ Problem Management Knowledge Management Release/ Deploy Management IT Financial Management Full Stack Automation Artifact Repository Environment App Infrastructure Platform (middleware) Security Accounts, sub- nets, network isolation, Encryption, IAM IaaS PaaS Virtual Perimeter App CI CD Testing Orchestrator VCS Images Libraries Templates Configs Security Services Application Information Security Cyber Defense Management Center Identity / Access Management Information Security Risk Management Infrastructure Information Security Third Party Information Security Vulnerability Management Workforce Accountability

Controls Security Controls Business Controls Regulatory Controls The Security Controls are a baseline of the FedRAMP controls in NIST SP 800-53 tailored to Wells Fargo’s environment, standards, and responsibilities in developing and maintaining our cloud services. FedRAMP is a highly regarded controls framework in the security and risk community that allows for traceability to our various regulatory requirements and industry-recognized risk management frameworks. The Security Controls form the baseline of controls from which business controls and regulatory controls can be layered. Security Controls Business Controls Regulatory Controls Technical, operational, and managerial controls to identify, mitigate, and manage security risks. Process-oriented controls to ensure the enterprise actualizes the benefits of technology and optimizes costs Industry and regional requirements for conducting certain types of business in certain regions Access Control Audit and Accountability Awareness and Training Security Assessment and Authorization Configuration Management Contingency Planning Identification and Authentication Incident Response Maintenance Media Protection Physical and Environmental Security Planning Personnel Security Risk Assessment System and Services Acquisition System and Communications Protection System and Information Integrity Financial Management and Cost Optimization Customer Engagement and Business Alignment Business Continuity Data Governance GDPR FFIEC PCI SOX

Technology Stack and Operations The “Technology” and “Operations” components of the Technology Controls Cube are in alignment with the services and capabilities outlined in the Wells Fargo IT Service Model and the Wells Fargo IT Capability Model Technology Stack Operations Infrastructure Services Platform Services Applications IT Management Services Security Services Data Services Data Center Data Center Network Physical Compute Virtual Compute Storage End User Devices Logical Network Configuration Operating System Middleware Database Runtime API Custom Applications COTS and Open Source Applications Cloud Service Configuration Collaboration Tools Supply Chain / Vendor Management Change Management Asset and Configuration Management Incident, Event, and Problem Management Knowledge Management Release and Deployment Management Facilities Management IT Financial Management Application Information Security Cyber Defense Management Identity and Access Management Information Protection Information Security Risk Management Infrastructure Information Security Third Party Information Security Vulnerability Management Workforce Accountability Data Governance Data Architecture Transaction Processing Data Integration and Management

Cost of Fixing Defects Across the Lifecycle