Data Security & PCI-DSS Compliance in Cloud & Virtual Data Centers (vDCs) Data Security in a Cloudy World Sangeeta Anand General Manager & Corporate Vice.

Slides:



Advertisements
Similar presentations
System Center 2012 R2 Overview
Advertisements

Notes: Update as of 1/13/2010. Vulnerabilities are included for SQL Server 2000, SQL Server 2005, SQL Server Oracle (8i, 9i, 9iR2, 10g, 10gR2,11g),
SafeNet Luna XML Hardware Security Module
Security, Privacy and the Cloud Connecticut Community Providers’ Association June 20, 2014 Steven R Bulmer, VP of Professional Services.
Dell Compellent and SafeNet KeySecure
1 Security on OpenStack 11/7/2013 Brian Chong – Global Technology Strategist.
11© 2011 Hitachi Data Systems. All rights reserved. HITACHI DATA DISCOVERY FOR MICROSOFT® SHAREPOINT ® SOLUTION SCALING YOUR SHAREPOINT ENVIRONMENT PRESENTER.
Security in the Cloud: Can You Trust What You Can’t Touch? Rob Johnson Security Architect, Cloud Engineering Unisys Corp.
Security Controls – What Works
Unified Logs and Reporting for Hybrid Centralized Management
Notes: Update as of 12/31/2010 inclusive. Chart counts NIST CVE – Reported Software Flaws by “published” date, utilizing the NIST NVD. SQL Server.
Pre-adoption concern 60% cited concerns around data security as a barrier to adoption 45% concerned that the cloud would result in a lack of data control.
Symantec Vision and Strategy for the Information-Centric Enterprise Muhamed Bavçiç Senior Technology Consultant SEE.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
© Centrify Corporation. All Rights Reserved. Unified Identity Management across Data Center, Cloud and Mobile.
A Comprehensive Solution Team Mag 5 Valerie B., Derek C., Jimmy C., Julia M., Mark Z.
Effectively Integrating Information Technology (IT) Security into the Acquisition Process Section 5: Security Controls.
Real Security for Server Virtualization Rajiv Motwani 2 nd October 2010.
Cloud Computing Cloud Security– an overview Keke Chen.
Treasury in the Cloud Bob Stark – Vice President, Strategy September 17, 2014.
Market Trends Enterprise Web Applications Cloud Computing SaaS Applications BYOD Data Compliance Regulations 30 Second Elevator Pitch Web browsers have.
Copyright 2009 Trend Micro Inc. OfficeScan 10.5 VDI-aware endpoint security.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
© 2010 IBM Corporation Cloudy with a chance of security Information security in virtual environments Johan Celis Security Solutions Architect EMEA IBM.
© Copyright 2015 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. 1 Buying factors – HP.
What Keeps You Awake at Night Compliance Corporate Governance Critical Infrastructure Are there regulatory risks? Do employees respect and adhere to internal.
1 Solving the records management problem A cloud-computing approach to archiving Amanda Kleha Product Marketing, Google May 20, 2008.
Dell Connected Security Solutions Simplify & unify.
1 CISCO SAFE: VALIDATED SECURITY REFERENCE ARCHITECTURE What It Is Business Transformation Top Questions To Ask To Initiate The Sale Where It Fits KEY.
ISO17799 Maturity. Confidentiality Confidentiality relates to the protection of sensitive data from unauthorized use and distribution. Examples include:
Javier Salido, CIPP Sr. Program Manager Trustworthy Computing Group Microsoft Corporation SESSION CODE: SIA337.
Copyright © 2015 Centrify Corporation. All Rights Reserved. 1 Secure & Unified Identity for End Users & Privileged Users.
1 © 2014 Cloudera, Inc. All rights reserved. Preventing a Big Data Security Breach.
Cloud Computing Security Keep Your Head and Other Data Secure in the Cloud Lynne Pizzini, CISSP, CISM, CIPP Information Systems Security Officer Information.
Trust: A Cloudy Concept Infrastructure Security in The Cloud Kartik Shahani Country Manager - India & SAARC RSA, The Security Division of EMC.
NON-COMPULSORY BRIEFING SESSION REQUEST FOR INFORMATION: ICT SECURITY SOLUTIONS RAF /2015/00019 Date: 29 September 2015 Time: 10:00.
Building a Fully Trusted Authentication Environment
Architecture & Cybersecurity – Module 3 ELO-100Identify the features of virtualization. (Figure 3) ELO-060Identify the different components of a cloud.
Alliance Key Manager for Windows Azure Puts Encryption Key Management and Data Breach Security at Your Fingertips COMPANY PROFILE: TOWNSEND SECURITY Townsend.
What’s New Data Loss Prevention 14. Information is Everywhere Brings Productivity, Agility, Convenience ……and Problems Copyright © 2015 Symantec Corporation.
Information Security Framework Regulatory Compliance and Reporting Auditing and Validation Metrics Definition and Collection Reporting (management, regulatory,
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Data-Centric Security and User Access Controls for Hadoop on Microsoft Azure MICROSOFT AZURE APP BUILDER PROFILE: BLUETALON BlueTalon provides data-centric.
Introducing Novell ® Identity Manager 4 Insert Presenter's Name (16pt) Insert Presenter's Title (14pt) Insert Company/ (14pt)
Microsoft Azure and ServiceNow: Extending IT Best Practices to the Microsoft Cloud to Give Enterprises Total Control of Their Infrastructure MICROSOFT.
RECLAIM CONTROL OF MOBILE AND DISTRIBUTED DATA January 13, 2016.
1 © SafeNet Confidential and Proprietary SafeNet KeySecure with Luna HSM Management.
1 March © SafeNet Confidential and Proprietary Cloud Security Solutions March 2011 Customer Use Case Scenarios.
Security Policy and Key Management Centrally Manage Encryption Keys - Oracle TDE, SQL Server TDE and Vormetric. Tina Stewart, Vice President.
Commvault and Nutanix October Changing IT landscape Today’s Challenges Datacenter Complexity Building for Scale Managing disparate solutions.
Your Office 365 Journey Prepare, Migrate, and Operate with Barracuda
Chapter 6: Securing the Cloud
NON-COMPULSORY BRIEFING SESSION REQUEST FOR INFORMATION: ICT SECURITY SOLUTIONS RAF /2015/00019 Date: 29 September 2015 Time: 10:00.
Dell Compellent and SafeNet KeySecure
Cloud Security– an overview Keke Chen
92% of the world’s data was created in the past 2 years
Virtualization & Security real solutions
Secure & Unified Identity
Assessing the Security of the Cloud
Cloud Security An IaaS Story 2018 © Netskope. All rights reserved.
Data Security for Microsoft Azure
Unitrends Enterprise Backup Solution Offers Backup and Recovery of Data in the Microsoft Azure Cloud for Better Protection of Virtual and Physical Systems.
Dell Data Protection | Rapid Recovery: Simple, Quick, Configurable, and Affordable Cloud-Based Backup, Retention, and Archiving Powered by Microsoft Azure.
Security for What Matters Most: Data & Identities
BluSync by ParaBlu Offers Secure Enterprise File Collaboration and Synchronization Solution That Uses Azure Blob Storage to Enable Secure Sharing MICROSOFT.
Salesforce.com Salesforce.com is the world leader in on-demand customer relationship management (CRM) services Manages sales, marketing, customer service,
IT Management Services Infrastructure Services
Protect data in core business applications
Presentation transcript:

Data Security & PCI-DSS Compliance in Cloud & Virtual Data Centers (vDCs) Data Security in a Cloudy World Sangeeta Anand General Manager & Corporate Vice President, Data Protection October 2012

Introduction Cloud & vDC Data Security ChallengesPCI Version 2.0 & Encryption for Data SecurityRecommended StepsSafeNet Inc. 2

“Let’s Move to Virtualization / Cloud!”… 3 Cloud Saves Money! So why aren’t they saving more!? Enterprise cloud spending is estimated to grow from $15B in 2011 to $53B in Overall investment in cloud security is projected to grow Into a $1.5 billion market by 2015.

Anatomy of the Cloud and Virtualization

Anatomy of a Dense Virtual Infrastructure APP OS Hypervisor Compute Layer Storage Backup Snapshots Mgmt Plane Mgmt Plane  The hypervisor enables each physical host (compute power) to host multiple virtual guests (VMs)  VMware ESXi  Xen (e.g. AWS)  Each management plane may span across multiple physical hosts  Storage can be directly attached, SAN or NAS

Losing Control in a Virtual World? VMs are easy to copy (and steal.)VMs are easy to move. VMs introduce a new class of privileged users and administrators—server, storage, backup, and application—all operating independently. VMs have multiple instances, snapshots and backups of data. APP OS Hypervisor Compute Layer Storage Backup Snapshots Shredding data capability if data at risk or switch providers

Cloud Migration E-commerce App server Cloud/Virtual Administrators (can manage VMs) Payment info or other sensitive data Cloud/Virtual Administrators Internal Admins Users Data ownership and governance in an untrusted environment Lawful surrender of data Shredding data capability if data at risk or switch providers VMs introduce a new class of privileged users and administrators—server, storage, backup, and application—all operating independently.

Key Data Security Concerns in vDCs & Cloud Environment 8 Are all my data instances secure? Can I assure only authorized access to my data? Can I “pull the plug” on data that’s at risk of exposure? Data Security Risk of Breach and Data Loss Who is accessing my data? Can I enforce an effective access control policy? Can I present a trusted audit trail of all access events to my data? Data Compliance Lack of Data Control Do I know where all my data instances are? Can I trace every legitimate replication/copy/instantiation event of my data? Can I trace unauthorized copying of my data? Data Governance Lack of Visibility © SafeNet Confidential and Proprietary

IT Security is stopping projects. Compliance/Audit has tons of questions. Cloud and Virtualization growth IS being limited. IT Security Group: The cloud isn’t secure. I don’t trust Providers. I don’t know how to secure that thing! Compliance Audit Group: Show me your security. Prove compliance in Clouds. Convince me! Data Security Concerns Stall Virtualizationn/ Cloud Adoption

PCI 3.4 Addresses Data Security in Virtualized / Cloud Environments  PCI 1.0: 2004 Encryption Data (Section 3.4) IT: Huge issues in data discovery  PCI 1.1: 2006 Key Management clarifications, Compensating Controls IT: Needed time to comply, begin using compensating controls  PCI 1.2: 2008 More Key Management clarifications IT: Better use of encryption, issues with Key Management compliance, compensating controls in use  PCI 2.0: 2011 Clarifications on virtualization 10 Some organizations have achieved PCI compliance using compensating controls for the data protection. Compensating controls assume physical ownership and isolation as risk mitigation strategy. IaaS will drive re-thinking of risk mitigation without physical control.

PCI DSS Virtualization Guidelines: Section 3 Best practices on encryption and key management Moving Sensitive Data in the cloud Separation of duties – to prevent access by unauthorized personnel Keys do not co-exist with encrypted data Virtualized Key Management functions/components do not co-exist with the encrypted virtual host

PCI Compliance Drives Encryption in Cloud & vDCs  Encryption is becoming a fundamental technology for protecting data in the cloud: Isolation of data in multi-tenant environments Separation of duties Role and policy based access  The cloud changes everything –Multiple uses for a virtual resource that contains sensitive data make it difficult to apply the needed controls  The cloud changes nothing –Every rule of a mandate still applies when migrating sensitive data to the cloud –Many infrastructure roles and responsibilities may drop out of view, but compliance responsibility remains with you

Principle Trust/Ownership Hypervisor Disclosure/Visibility Issues Limit use of X Big issue in SaaS, in your control for the most part in IaaS and PaaS Use secure development practices X Issue in SaaS and PaaS Control access to XXX Issues in all cases. Issues of user identification, authorization rights, privileged cloud user Encrypt in transitX Most likely already addressed, but customer to cloud, intracloud communication can be an issue Optional encrypt at rest XX Huge issue in data sitting in the cloud, across all platforms. Keep confidential XXX Main issue is guaranteeing the “trust” in data when you don’t “trust” the cloud. Keep the integrity of XXX Main issue is guaranteeing the “trust” in data when you don’t “trust” the cloud. Enforce separation of duties of access and administration XXX Fundemenal issue of cloud employee and cloud administrator access. Extends to both physical and logical security. Invokes separation of duties issues around all controls. Report and audit your controls for X Can you prove it to your auditor. Encryption enables authentication and authorization layer. Encryption directly addresses many regulator requirements. Shows high standard of care. Encryption inherently provides for integrity controls. Encryption fundamentally isolates your data from other tenants in a share cloud environment, shields from unauthorized data breach. Encryption can add additional authentication and authorization layer for users and administrators. Customer owned encryption definitively shows separation from cloud. Encryption Key ownership is tangible proof to data ownership. Encrypt/Decrypt actions become easy log and audit proofs. Why Encryption ?

Encryption Accelerates Move to Virtualized DC / Cloud 14 “Lawful Order” to Cloud Provider for DataDestruction of Virtualized /Cloud Data Physical Location Issues of Cloud / Virtualized Data

Agenda Cloud & vDC Data Security ChallengesPCI Version 2.0 & Encryption for Data SecurityRecommended StepsSafeNet Inc. 15

Step 1 : Commit to Build a Compliant Data Secure Infrastructure Many Regulations and Many ControlsUnified Framework Regulatory Framework All regulations are based on the same confidentiality and integrity goals Common Data Protection Mandates  Limit use of confidential data  Control access to confidential data  Guarantee confidentiality of confidential data  Maintain the integrity of confidential data  Enforce administrator separation of duties on systems confidential data  Maintain audit and log records of confidential data activities * P-V-C is Physical, Virtual, Cloud

Step 2: Use Multi Level Encryption Aligning PCI 3.4 in IaaS & Virtual Environments  Use Instance & Storage Encryption Isolation data in multi-tenant clouds Reduce overall exposed footprint, minimize surface area of leaks Enforce separation of duties requirements  Data level encryption Database and application encryption solutions enable security policies to be more granularly applied to specific subsets of data Secures data as it progresses through workflows, and represents an ideal complement to instance encryption  Re-Examine System Data Encryption Eliminate reliance on compensating controls Use data encryption to manage data lifecycle risks Take advantage in advances in system encryption when architecting IaaS based applications 17

Step 3: Use Key Mgmt to Address PCI DSS section 3.5 & 3.6  Use Customer-owned Key Management Strategically Definitive proof of ownership and control to auditors Adhere to proper key storage requirements (Section 3.5/6) Use standards like NIST and OASIS KMIP  Use Advanced Key Management Appliances & Hardware Security Modules Store cryptographic keys in secure, purpose-built devices Key themselves encrypted Streamline activities like key rotation and deletion Ensures the highest level of security

SafeNet Inc …Who are we? Protect High Value Information in the Worlds Most Complex Environments Solutions for Cloud and Virtualization Security Solutions for Compliance and Data Governance Solutions for Identity and Transaction Security

SafeNet Delivers A Compliance Infrastructure….Unifying control of data 20 Unified encryption across multiple tiers Across multiple vendor platforms Centralized policy enforcement Central key management Logging and auditing Role-based controls Unified Environment

Database File Shares Virtual Instances Virtual Storage Storage Customer On-Premises Database File Shares Application Servers We Enable Transition to vDCs/Cloud

Virtual Instances Virtual Storage Customer On-Premises Database Mainframe File Shares Application Servers Maintains control (Separation of duty) Maintains visibility (& ‘Auditability’) EAL & FIPS level of key security & management On-Premises Key Management We Enable Transition to vDCs/Cloud

ProtectV is the industry’s first comprehensive high-assurance solution for securing both virtualization and cloud infrastructure. This gives you the freedom to migrate to virtual and cloud environments while maintaining full visibility, control and security of data. Introducing ProtectV….

Storage Hypervisor Hardware Layer Backup Snapshots App OS App OS App OS App OS App OS App OS Data copied into OS partition’s RAM - encrypted Data copied into storage - encrypted ProtectV for Securing the Virtual Infrastructure Data used by financial app Data copied in hourly snapshot - encrypted App OS ProtectV Enables Customers to Migrate Compliant Data to vDCs / Cloud

Insert Your Name Insert Your Title Insert Date Questions? SafeNet, Inc. |