PRIVACYRELIABILIT Y SECURITY Secures against attacks Protects confidentiality, integrity, and availability of data and systems Helps manage risk Protects.

Slides:



Advertisements
Similar presentations
Impacts of 3 rd Party IaaS on broadband network operations and businesses Prabhat Kumar Managing Partner, i 3 m 3 Solutions.
Advertisements

2 3 Global Foundation Services Security Global Delivery Sustainability Infrastructure.
The CCM framework consists of 11 Control Areas that are important to be measured, especially when comparing between different cloud provider offering.
Security Controls – What Works
Presented by: Rajdeep Biswas Roll No.: 0104IT071082; Branch: IT (VII Sem.) R.K.D.F. Institute of Science & Technology Cloud Computing When Outsourcing.
What is Cloud Computing? o Cloud computing:- is a style of computing in which dynamically scalable and often virtualized resources are provided as a service.
July 8-9, 2014 | Ronald Reagan Building | Washington, DC Federal Cloud Computing Summit Dr. Barry C. West Cloud Tools and Integration.
The Cloud: Demystified Neil Cattermull Frontier Technology.
Cloud Usability Framework
Engineering the Cloud Andrew McCombs March 10th, 2011.
Cloud Computing Guide & Handbook SAI USA Madhav Panwar.
Securing and Auditing Cloud Computing Jason Alexander Chief Information Security Officer.
Travis, Stephanie, Alex.  Cloud computing is a general term for anything that involves delivering hosted services over the Internet.  These services.
Plan Introduction What is Cloud Computing?
Microsoft Internet Safety Enforcement: A worldwide team of lawyers, investigators, technical analysts and other specialists whose mission it is to make.
CLOUD COMPUTING. IAAS / PAAS / SAAS LAYERS. Olena Matokhina Development and Consulting Team Lead 2 ABOUT PRESENTER.
Auditing Logical Access in a Network Environment Presented By, Eric Booker and Mark Ren New York State Comptroller’s Office Network Security Unit.
September * Provide analysis, advice, and recommendations on the impacts that new and emerging technologies are likely to have on the management.
Introduction to Cloud Computing
No one questions that Microsoft can write great software. Customers want to know if we can be innovative, scalable, reliable in the cloud. (1996) 450M+
Cloud computing is the use of computing resources (hardware and software) that are delivered as a service over the Internet. Cloud is the metaphor for.
Company Confidential How to implement privacy and security requirements in practice? Tobias Bräutigam, OTT Senior Legal Counsel, Nokia 8 October
Cloud Computing Kwangyun Cho v=8AXk25TUSRQ.
© Cloud Security Alliance, 2015 Sean Cordero, Chair CCM Laura Posey, Chair CAIQ.
Cloud Computing. What is Cloud Computing? Cloud computing is a model for enabling convenient, on-demand network access to a shared pool of configurable.
SECURITY Is cloud computing secure? Are Microsoft Online Services secure? Is cloud computing secure? Are Microsoft Online Services secure? PRIVACY What.
Lets agree that an Optimized Data Center is not yet a Cloud +=
Computer Science and Engineering 1 Cloud ComputingSecurity.
12,000 anonymized surveyed results Worldwide user base Cloud Security Readiness Tool Security trends report:
Cloud Computing. Cloud Computing defined Dynamically scalable, device-independent and task-centric computing resources are provided online, with all charges.
ISO17799 Maturity. Confidentiality Confidentiality relates to the protection of sensitive data from unauthorized use and distribution. Examples include:
Software Testing in the Cloud Leah Riungu-Kalliosaari.
Plan  Introduction  What is Cloud Computing?  Why is it called ‘’Cloud Computing’’?  Characteristics of Cloud Computing  Advantages of Cloud Computing.
PRIVACYRELIABILIT Y SECURITY Secures against attacks Protects confidentiality, integrity, and availability of data and systems Helps manage risk Protects.
Cloud Computing Security Keep Your Head and Other Data Secure in the Cloud Lynne Pizzini, CISSP, CISM, CIPP Information Systems Security Officer Information.
Cloud Computing Project By:Jessica, Fadiah, and Bill.
The Cloud Earl C. Rich, CRM. We’re Gonna Talk About: Define what The Cloud is Discuss the different types of Clouds Discuss Cloud service-types RIM issues.
Conduct A Strong Evaluation Soar to New Heights! 2013 National Equipment Finance Summit, Albuquerque, NM.
International Security Management Standards. BS ISO/IEC 17799:2005 BS ISO/IEC 27001:2005 First edition – ISO/IEC 17799:2000 Second edition ISO/IEC 17799:2005.
Chapter 8 – Cloud Computing
Cloud computing Cloud Computing1. NIST: Five essential characteristics On-demand self-service Computing capabilities, disks are demanded over the network.
3/12/2013Computer Engg, IIT(BHU)1 CLOUD COMPUTING-1.
John Weigelt, MEng, PEng, CISSP, CISM National Technology Officer Microsoft Canada November 2005 Fighting Fraud Through Data Governance.
1 TCS Confidential. 2 Objective : In this session we will be able to learn:  What is Cloud Computing?  Characteristics  Cloud Flavors  Cloud Deployment.
APEC Privacy Framework “The lack of consumer trust and confidence in the privacy and security of online transactions and information networks is one element.
Delivering Assured Services John Weigelt National Technology Officer Microsoft Canada.
Sponsored by: 1 The State of Corporate A Survey of IT Professionals October 2013.
Cloud, big data, and mobility Your phone today probably meets the minimum requirements to run Windows Server 2003 Transformational change up.
INFORMATION ASSURANCE POLICY. Information Assurance Information operations that protect and defend information and information systems by ensuring their.
INTRODUCTION TO CLOUD COMPUTING. CLOUD  The expression cloud is commonly used in science to describe a large agglomeration of objects that visually appear.
Devices 10 billion Internet- connected devices by 2016 People 1 billion+ people use social media services today Cloud 30 % of data will live in or pass.
Clouding with Microsoft Azure
Law Firm Data Security: What In-house Counsel Need to Know
Understanding The Cloud
What Is ISO ISO 27001, titled "Information Security Management - Specification With Guidance for Use", is the replacement for BS It is intended.
Guidance for the Cloud: An EU Example - CloudWatch
Andrew McCombs March 10th, 2011
Service Organization Control (SOC)
Cloud Computing Team Members: Aleksandra Knezevic Willie Robbins
Capitalize on modern technology
Cloud Security An IaaS Story 2018 © Netskope. All rights reserved.
Cloud Computing.
Cloud Computing Cloud computing refers to “a model of computing that provides access to a shared pool of computing resources (computers, storage, applications,
05 | Making the Cloud Transition
Cloud computing Technology: innovation. Points  Cloud Computing and Social Network Sites have become major trends not only in business but also in various.
Cloud computing Technology: innovation. Points  Cloud Computing and Social Network Sites have become major trends not only in business but also in various.
Emerging technologies-
What is Interesting in the CCSP certification?
Computer Science and Engineering
Cloud Computing for Wireless Networks
Presentation transcript:

PRIVACYRELIABILIT Y SECURITY Secures against attacks Protects confidentiality, integrity, and availability of data and systems Helps manage risk Protects from unwanted communication User choice and control Products, online services adhere to fair information principles Dependable, available Predictable, consistent, responsive service Maintainable Resilient, easily restored Proven, ready

1,000 US consumers surveyed by Wakefield research

Broad Network Access Rapid Elasticity Measured Service Self- Service Resource Pooling Service Model IaaS PaaS SaaS

BENEFIT S privacy security reliability scalability increased agility flexibility Reduced costs CONCER NS

CLOUD PROVIDER SaaSPaaSIaaS RESPONSIBILITY: Data classification Application level controls Client and end point protection Network controls Physical security Identity and access management Host security CLOUD CUSTOMER

57% Time Savings 3X Money Savings 54% Improved Security

44% Security Concerns 61% Industry Standards 59% Transparency

What are your current IT capabilities? Can you improve your people, processes, and technologies? Can cloud reduce your risks while reducing cost?

CCM controlDescription DG-01 Data Governance - Ownership / Stewardship All data shall be designated with stewardship with assigned responsibilities defined, documented and communicated. DG-02 Data Governance - Classification Data, and objects containing data, shall be assigned a classification based on data type, jurisdiction of origin, jurisdiction domiciled, context, legal constraints, contractual constraints, value, sensitivity, criticality to the organization and third party obligation for retention and prevention of unauthorized disclosure or misuse.

Where are you now? Where will you be? Can cloud help?

Microsoft’s Standard Responses on STAR Specific details about Office 365, Windows Azure and Dynamics CRM Security and Privacy is mapped to the CCM and the ISO certification. Standard from the Cloud Security Alliance (CSA) The Cloud Security Alliance Cloud Controls Matrix (CCM) is specifically designed to provide fundamental security principles to guide cloud vendors and to assist prospective cloud customers in assessing the overall security risk of a cloud provider.

Cloud Security Readiness Tool (CSRT) data between October 2012 and March Approximately 5700 anonymized answers to CSRT questions Margin of error +/- 1% USA/EUROPE +/- 10% ASIA

STRONGER INFORMATION SECURITY antivirus/antimalwar e software clock synchronization SECURITY ARCHITECTURE FACILITY SECURITY controlled user access to data

WEAKER OPERATIONS MANAGEMENT effective equipment maintenance LEGAL PROTECTION nondisclosure agreements INFORMATION SECURITY consistent incident reporting OPERATIONS MANAGEMENT effective capacity planning HUMAN RESOURCES SECURITY prudent hiring practices

 If the answer was Almost There or Streamlined, a +1 value was assigned for maturity.  If the answer was Getting Started or Making Progress, a -1 value was assigned for maturity.

Resource planning Equipment maintenance

The better you understand your people, processes, and technologies, the more you will be able to make informed comparisons and evaluate the benefits of the cloud. Visit the Trustworthy Computing – Cloud TechCenter and its many resources: The Cloud Security Readiness Tool A free assessment to help you evaluate the benefits of the cloud create a plan for adoption better understand your organization’s capabilities Additional resources on cloud security, privacy, and reliability microsoft.com/trustedcloud