SlideShare a Scribd company logo
1 of 8
Five Critical Ways to Improve
Security Posture Across Clouds
Copyright © 2012 ServiceMesh, Inc. Proprietary and Confidential 2
The Cloud Security Challenge
Fewer than half of security and
compliance officers feel that they have
the technology they need to secure
their cloud deployments!
Cloud management platforms can play a pivotal role in
cloud security by centralizing the orchestration,
governance and deployment of cloud applications,
platforms and infrastructure across hybrid clouds.
Copyright © 2012 ServiceMesh, Inc. Proprietary and Confidential 3
Cloud Security Tip Number 1:
Policy-based
application and data
governance is
achieved through
policies that can dictate
which application
workload may be
placed in which cloud.
These governance
policies can extend to
include user access
controls and
provisioning
constraints.
Policy
Policy
Policy
Policy
Governance/Security
Roles
Rights & Permissions
Projects Orgs
Network
Infrastructure
Compute Storage
Applications & Platforms
OS
Agents/Utilities
Middleware
App Config.
Data
Code
DevPoliciesOpsPolicies
Copyright © 2012 ServiceMesh, Inc. Proprietary and Confidential 4
Cloud Security Tip Number 2:
Automate installation
and configuration of
security technologies
including industry
standards such as host
intrusion-detection
systems (HIDS), anti-
virus, firewalls,
vulnerability assessment
and patch management.
For IT, concerns regarding
security (66%), integration
stability and reliability (47%) and
ability of cloud computing
solutions to meet
enterprise/industry standards
(35%) challenge adoption.
- IDG Enterprise Cloud Computing: Key
Trends and Future Effects Report 2013
Copyright © 2012 ServiceMesh, Inc. Proprietary and Confidential 5
Cloud Security Tip Number 3:
5
OS & Platforms
Agents/Utilities
Governance
Code
Plan Develop Test Release Operate
Code Code
OS & Platforms
Agents/Utilities
Governance
OS & Platforms
Agents/Utilities
Governance
git
Be sure your cloud
management platform
integrates with
configuration
management
solutions such as
Puppet and Chef to
ensure configuration
compliance to policy.
Copyright © 2012 ServiceMesh, Inc. Proprietary and Confidential 6
Cloud Security Tip Number 4:
Cloud-based VMs running
firewall policies can easily
be configured and
enforced with a cloud
management platform–
both in private and public
cloud environments.
Copyright © 2012 ServiceMesh, Inc. Proprietary and Confidential 7
Cloud Security Tip Number 5:
Cloud management platform policies can
trigger security and vulnerability scans of
VMs to ensure continuous security across
cloud workloads.
servicemesh.com
@servicemesh
servicemesh.com/blog
For more information, find us at:
Thank You
8
LinkedIn
Google+

More Related Content

What's hot

I.T. Geeks Can't Talk to Management
I.T. Geeks Can't Talk to ManagementI.T. Geeks Can't Talk to Management
I.T. Geeks Can't Talk to ManagementTripwire
 
Cyber Risks Implementation on an IP MPLS Network
Cyber Risks Implementation on an IP MPLS NetworkCyber Risks Implementation on an IP MPLS Network
Cyber Risks Implementation on an IP MPLS NetworkGabriel E Ozique
 
Optimizing Security Operations: 5 Keys to Success
Optimizing Security Operations: 5 Keys to SuccessOptimizing Security Operations: 5 Keys to Success
Optimizing Security Operations: 5 Keys to SuccessSirius
 
Guide Preview: Ensuring your enterprise image-viewer if fully secure
Guide Preview: Ensuring your enterprise image-viewer if fully secureGuide Preview: Ensuring your enterprise image-viewer if fully secure
Guide Preview: Ensuring your enterprise image-viewer if fully secureCalgary Scientific Inc.
 
Is The Cloud Secure Enough For Your Data?
Is The Cloud Secure Enough For Your Data?Is The Cloud Secure Enough For Your Data?
Is The Cloud Secure Enough For Your Data?OSIbeyond
 
ISO 27001 Training | ISMS Awareness Training
ISO 27001 Training | ISMS Awareness TrainingISO 27001 Training | ISMS Awareness Training
ISO 27001 Training | ISMS Awareness Traininghimalya sharma
 
Digital IQ in managing risk and cyber threats
Digital IQ in managing risk and cyber threatsDigital IQ in managing risk and cyber threats
Digital IQ in managing risk and cyber threatsMaganathin Veeraragaloo
 
Computer security aspects in
Computer security aspects inComputer security aspects in
Computer security aspects inVishnu Suresh
 
Risks to Cloud based critical infrastructure -- DHS bulletin
Risks to Cloud based critical infrastructure -- DHS bulletinRisks to Cloud based critical infrastructure -- DHS bulletin
Risks to Cloud based critical infrastructure -- DHS bulletinDavid Sweigert
 
The Seven Kinds of Security
The Seven Kinds of SecurityThe Seven Kinds of Security
The Seven Kinds of SecurityVeracode
 
Seven deadly threats and vulnerabilities in cloud
Seven deadly threats and vulnerabilities in cloudSeven deadly threats and vulnerabilities in cloud
Seven deadly threats and vulnerabilities in cloudcloudresearcher
 
The Benefits of Security From a Managed Services Provider
The Benefits of Security From a Managed Services ProviderThe Benefits of Security From a Managed Services Provider
The Benefits of Security From a Managed Services ProviderCSI Solutions
 
Tripwire enterprise 87_datasheet
Tripwire enterprise 87_datasheetTripwire enterprise 87_datasheet
Tripwire enterprise 87_datasheetDevaraj Sl
 
Cybersecurity Framework - Introduction
Cybersecurity Framework - IntroductionCybersecurity Framework - Introduction
Cybersecurity Framework - IntroductionMuhammad Akbar Yasin
 
Protecting your Data in Google Apps
Protecting your Data in Google AppsProtecting your Data in Google Apps
Protecting your Data in Google AppsElastica Inc.
 
DSS ITSEC 2013 Conference 07.11.2013 - IBM Security Strategy
DSS ITSEC 2013 Conference 07.11.2013 - IBM Security StrategyDSS ITSEC 2013 Conference 07.11.2013 - IBM Security Strategy
DSS ITSEC 2013 Conference 07.11.2013 - IBM Security StrategyAndris Soroka
 
Information security in todays world
Information security in todays worldInformation security in todays world
Information security in todays worldSibghatullah Khattak
 

What's hot (19)

I.T. Geeks Can't Talk to Management
I.T. Geeks Can't Talk to ManagementI.T. Geeks Can't Talk to Management
I.T. Geeks Can't Talk to Management
 
Cyber Risks Implementation on an IP MPLS Network
Cyber Risks Implementation on an IP MPLS NetworkCyber Risks Implementation on an IP MPLS Network
Cyber Risks Implementation on an IP MPLS Network
 
Optimizing Security Operations: 5 Keys to Success
Optimizing Security Operations: 5 Keys to SuccessOptimizing Security Operations: 5 Keys to Success
Optimizing Security Operations: 5 Keys to Success
 
Guide Preview: Ensuring your enterprise image-viewer if fully secure
Guide Preview: Ensuring your enterprise image-viewer if fully secureGuide Preview: Ensuring your enterprise image-viewer if fully secure
Guide Preview: Ensuring your enterprise image-viewer if fully secure
 
Is The Cloud Secure Enough For Your Data?
Is The Cloud Secure Enough For Your Data?Is The Cloud Secure Enough For Your Data?
Is The Cloud Secure Enough For Your Data?
 
ISO 27001 Training | ISMS Awareness Training
ISO 27001 Training | ISMS Awareness TrainingISO 27001 Training | ISMS Awareness Training
ISO 27001 Training | ISMS Awareness Training
 
Digital IQ in managing risk and cyber threats
Digital IQ in managing risk and cyber threatsDigital IQ in managing risk and cyber threats
Digital IQ in managing risk and cyber threats
 
Cloud security
Cloud securityCloud security
Cloud security
 
Computer security aspects in
Computer security aspects inComputer security aspects in
Computer security aspects in
 
Risks to Cloud based critical infrastructure -- DHS bulletin
Risks to Cloud based critical infrastructure -- DHS bulletinRisks to Cloud based critical infrastructure -- DHS bulletin
Risks to Cloud based critical infrastructure -- DHS bulletin
 
The Seven Kinds of Security
The Seven Kinds of SecurityThe Seven Kinds of Security
The Seven Kinds of Security
 
Seven deadly threats and vulnerabilities in cloud
Seven deadly threats and vulnerabilities in cloudSeven deadly threats and vulnerabilities in cloud
Seven deadly threats and vulnerabilities in cloud
 
An Overview of IT Risk and Control
An Overview of IT Risk and ControlAn Overview of IT Risk and Control
An Overview of IT Risk and Control
 
The Benefits of Security From a Managed Services Provider
The Benefits of Security From a Managed Services ProviderThe Benefits of Security From a Managed Services Provider
The Benefits of Security From a Managed Services Provider
 
Tripwire enterprise 87_datasheet
Tripwire enterprise 87_datasheetTripwire enterprise 87_datasheet
Tripwire enterprise 87_datasheet
 
Cybersecurity Framework - Introduction
Cybersecurity Framework - IntroductionCybersecurity Framework - Introduction
Cybersecurity Framework - Introduction
 
Protecting your Data in Google Apps
Protecting your Data in Google AppsProtecting your Data in Google Apps
Protecting your Data in Google Apps
 
DSS ITSEC 2013 Conference 07.11.2013 - IBM Security Strategy
DSS ITSEC 2013 Conference 07.11.2013 - IBM Security StrategyDSS ITSEC 2013 Conference 07.11.2013 - IBM Security Strategy
DSS ITSEC 2013 Conference 07.11.2013 - IBM Security Strategy
 
Information security in todays world
Information security in todays worldInformation security in todays world
Information security in todays world
 

Viewers also liked

The Big Win: Stop Playing Small-Ball with Your Cloud Strategy
The Big Win: Stop Playing Small-Ball with Your Cloud StrategyThe Big Win: Stop Playing Small-Ball with Your Cloud Strategy
The Big Win: Stop Playing Small-Ball with Your Cloud StrategyServiceMesh
 
Dogfighting communism coal cloud connect chicago final
Dogfighting communism coal cloud connect chicago finalDogfighting communism coal cloud connect chicago final
Dogfighting communism coal cloud connect chicago finalServiceMesh
 
Does Cloud Matter?
Does Cloud Matter?Does Cloud Matter?
Does Cloud Matter?Dave Roberts
 
Is Private Cloud Right for Your Organization
Is Private Cloud Right for Your OrganizationIs Private Cloud Right for Your Organization
Is Private Cloud Right for Your OrganizationDave Roberts
 
Applications at Scale
Applications at ScaleApplications at Scale
Applications at ScaleServiceMesh
 
Structure 2014 - Launchpad Competition
Structure 2014 - Launchpad CompetitionStructure 2014 - Launchpad Competition
Structure 2014 - Launchpad CompetitionGigaom
 
Cloud Scars: Lessons from the Enterprise Pioneers
Cloud Scars: Lessons from the Enterprise PioneersCloud Scars: Lessons from the Enterprise Pioneers
Cloud Scars: Lessons from the Enterprise PioneersDave Roberts
 
Is Private Cloud Right for Your Organization?
Is Private Cloud Right for Your Organization?Is Private Cloud Right for Your Organization?
Is Private Cloud Right for Your Organization?ServiceMesh
 
Step Up to the Plate: Take Your Cloud Strategy from the Minor League to the M...
Step Up to the Plate: Take Your Cloud Strategy from the Minor League to the M...Step Up to the Plate: Take Your Cloud Strategy from the Minor League to the M...
Step Up to the Plate: Take Your Cloud Strategy from the Minor League to the M...Dave Roberts
 
OpenCloudware: the Cloud application lifecycle management platform
OpenCloudware: the Cloud application lifecycle management platformOpenCloudware: the Cloud application lifecycle management platform
OpenCloudware: the Cloud application lifecycle management platformopencloudware
 
Managing Multiple Clouds in an Enteprise - A Heterogenous Lens
Managing Multiple Clouds in an Enteprise - A Heterogenous LensManaging Multiple Clouds in an Enteprise - A Heterogenous Lens
Managing Multiple Clouds in an Enteprise - A Heterogenous LensMayur Shintre
 
EMCWorld 2013 -ServiceMesh Agility Platform: Cloud-based DevOps with ViPR
EMCWorld 2013 -ServiceMesh Agility Platform: Cloud-based DevOps with ViPREMCWorld 2013 -ServiceMesh Agility Platform: Cloud-based DevOps with ViPR
EMCWorld 2013 -ServiceMesh Agility Platform: Cloud-based DevOps with ViPRServiceMesh
 
CMP slides for Slideshare 12 21-2016
CMP slides for Slideshare 12 21-2016CMP slides for Slideshare 12 21-2016
CMP slides for Slideshare 12 21-2016rastapup
 
Enterprise Cloud Management - 2013 EMC World presentation
Enterprise Cloud Management - 2013 EMC World presentationEnterprise Cloud Management - 2013 EMC World presentation
Enterprise Cloud Management - 2013 EMC World presentationServiceMesh
 
Tutorial foxpro
Tutorial foxpro Tutorial foxpro
Tutorial foxpro febririzqi
 
Gartner report on cloud360 cloud management platform
Gartner report on cloud360 cloud management platformGartner report on cloud360 cloud management platform
Gartner report on cloud360 cloud management platformCognizant
 
Warrantly - Cloud Warranty Management Platform
Warrantly - Cloud Warranty Management PlatformWarrantly - Cloud Warranty Management Platform
Warrantly - Cloud Warranty Management PlatformStartupYard
 
How AppDynamics leveraged sales enablement to grow from one to 350 reps
How AppDynamics leveraged sales enablement to grow from one to 350 repsHow AppDynamics leveraged sales enablement to grow from one to 350 reps
How AppDynamics leveraged sales enablement to grow from one to 350 repsMindTickle
 
Openstack Cloud Management and Automation Using Red Hat Cloudforms 4.0
Openstack Cloud  Management and Automation Using Red Hat Cloudforms 4.0Openstack Cloud  Management and Automation Using Red Hat Cloudforms 4.0
Openstack Cloud Management and Automation Using Red Hat Cloudforms 4.0Prasad Mukhedkar
 
MongoDB Webinar : Transforming Sales Enablement with Next Gen Onboarding
MongoDB Webinar : Transforming Sales Enablement with Next Gen OnboardingMongoDB Webinar : Transforming Sales Enablement with Next Gen Onboarding
MongoDB Webinar : Transforming Sales Enablement with Next Gen OnboardingMindTickle
 

Viewers also liked (20)

The Big Win: Stop Playing Small-Ball with Your Cloud Strategy
The Big Win: Stop Playing Small-Ball with Your Cloud StrategyThe Big Win: Stop Playing Small-Ball with Your Cloud Strategy
The Big Win: Stop Playing Small-Ball with Your Cloud Strategy
 
Dogfighting communism coal cloud connect chicago final
Dogfighting communism coal cloud connect chicago finalDogfighting communism coal cloud connect chicago final
Dogfighting communism coal cloud connect chicago final
 
Does Cloud Matter?
Does Cloud Matter?Does Cloud Matter?
Does Cloud Matter?
 
Is Private Cloud Right for Your Organization
Is Private Cloud Right for Your OrganizationIs Private Cloud Right for Your Organization
Is Private Cloud Right for Your Organization
 
Applications at Scale
Applications at ScaleApplications at Scale
Applications at Scale
 
Structure 2014 - Launchpad Competition
Structure 2014 - Launchpad CompetitionStructure 2014 - Launchpad Competition
Structure 2014 - Launchpad Competition
 
Cloud Scars: Lessons from the Enterprise Pioneers
Cloud Scars: Lessons from the Enterprise PioneersCloud Scars: Lessons from the Enterprise Pioneers
Cloud Scars: Lessons from the Enterprise Pioneers
 
Is Private Cloud Right for Your Organization?
Is Private Cloud Right for Your Organization?Is Private Cloud Right for Your Organization?
Is Private Cloud Right for Your Organization?
 
Step Up to the Plate: Take Your Cloud Strategy from the Minor League to the M...
Step Up to the Plate: Take Your Cloud Strategy from the Minor League to the M...Step Up to the Plate: Take Your Cloud Strategy from the Minor League to the M...
Step Up to the Plate: Take Your Cloud Strategy from the Minor League to the M...
 
OpenCloudware: the Cloud application lifecycle management platform
OpenCloudware: the Cloud application lifecycle management platformOpenCloudware: the Cloud application lifecycle management platform
OpenCloudware: the Cloud application lifecycle management platform
 
Managing Multiple Clouds in an Enteprise - A Heterogenous Lens
Managing Multiple Clouds in an Enteprise - A Heterogenous LensManaging Multiple Clouds in an Enteprise - A Heterogenous Lens
Managing Multiple Clouds in an Enteprise - A Heterogenous Lens
 
EMCWorld 2013 -ServiceMesh Agility Platform: Cloud-based DevOps with ViPR
EMCWorld 2013 -ServiceMesh Agility Platform: Cloud-based DevOps with ViPREMCWorld 2013 -ServiceMesh Agility Platform: Cloud-based DevOps with ViPR
EMCWorld 2013 -ServiceMesh Agility Platform: Cloud-based DevOps with ViPR
 
CMP slides for Slideshare 12 21-2016
CMP slides for Slideshare 12 21-2016CMP slides for Slideshare 12 21-2016
CMP slides for Slideshare 12 21-2016
 
Enterprise Cloud Management - 2013 EMC World presentation
Enterprise Cloud Management - 2013 EMC World presentationEnterprise Cloud Management - 2013 EMC World presentation
Enterprise Cloud Management - 2013 EMC World presentation
 
Tutorial foxpro
Tutorial foxpro Tutorial foxpro
Tutorial foxpro
 
Gartner report on cloud360 cloud management platform
Gartner report on cloud360 cloud management platformGartner report on cloud360 cloud management platform
Gartner report on cloud360 cloud management platform
 
Warrantly - Cloud Warranty Management Platform
Warrantly - Cloud Warranty Management PlatformWarrantly - Cloud Warranty Management Platform
Warrantly - Cloud Warranty Management Platform
 
How AppDynamics leveraged sales enablement to grow from one to 350 reps
How AppDynamics leveraged sales enablement to grow from one to 350 repsHow AppDynamics leveraged sales enablement to grow from one to 350 reps
How AppDynamics leveraged sales enablement to grow from one to 350 reps
 
Openstack Cloud Management and Automation Using Red Hat Cloudforms 4.0
Openstack Cloud  Management and Automation Using Red Hat Cloudforms 4.0Openstack Cloud  Management and Automation Using Red Hat Cloudforms 4.0
Openstack Cloud Management and Automation Using Red Hat Cloudforms 4.0
 
MongoDB Webinar : Transforming Sales Enablement with Next Gen Onboarding
MongoDB Webinar : Transforming Sales Enablement with Next Gen OnboardingMongoDB Webinar : Transforming Sales Enablement with Next Gen Onboarding
MongoDB Webinar : Transforming Sales Enablement with Next Gen Onboarding
 

Similar to Five cloud security tips

Legal And Regulatory Issues Cloud Computing...V2.0
Legal And Regulatory Issues Cloud Computing...V2.0Legal And Regulatory Issues Cloud Computing...V2.0
Legal And Regulatory Issues Cloud Computing...V2.0David Spinks
 
Cloud Application Security Best Practices To follow.pdf
Cloud Application Security Best Practices To follow.pdfCloud Application Security Best Practices To follow.pdf
Cloud Application Security Best Practices To follow.pdfTechugo
 
Security and Privacy Issues of Cloud Computing; Solutions and Secure Framework
Security and Privacy Issues of Cloud Computing; Solutions and Secure FrameworkSecurity and Privacy Issues of Cloud Computing; Solutions and Secure Framework
Security and Privacy Issues of Cloud Computing; Solutions and Secure FrameworkIOSR Journals
 
Cloud Application Security Best Practices To follow.pdf
Cloud Application Security Best Practices To follow.pdfCloud Application Security Best Practices To follow.pdf
Cloud Application Security Best Practices To follow.pdfTechugo
 
Fortifying the Digital Sky Exploring the Application of Cybersecurity for Clo...
Fortifying the Digital Sky Exploring the Application of Cybersecurity for Clo...Fortifying the Digital Sky Exploring the Application of Cybersecurity for Clo...
Fortifying the Digital Sky Exploring the Application of Cybersecurity for Clo...cyberprosocial
 
R ramya devi cloud computing
R ramya devi cloud computingR ramya devi cloud computing
R ramya devi cloud computingPriyadharshiniVS
 
INFORMATION SECURITY IN CLOUD COMPUTING
INFORMATION SECURITY IN CLOUD COMPUTINGINFORMATION SECURITY IN CLOUD COMPUTING
INFORMATION SECURITY IN CLOUD COMPUTINGijitcs
 
Fortifying the Digital Sky: Exploring the Application of Cybersecurity for Cl...
Fortifying the Digital Sky: Exploring the Application of Cybersecurity for Cl...Fortifying the Digital Sky: Exploring the Application of Cybersecurity for Cl...
Fortifying the Digital Sky: Exploring the Application of Cybersecurity for Cl...cyberprosocial
 
report on Mobile security
report on Mobile securityreport on Mobile security
report on Mobile securityJAYANT RAJURKAR
 
Design and implement a new cloud security method based on multi clouds on ope...
Design and implement a new cloud security method based on multi clouds on ope...Design and implement a new cloud security method based on multi clouds on ope...
Design and implement a new cloud security method based on multi clouds on ope...csandit
 
DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...
DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...
DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...cscpconf
 
Cloud Security - Types, Common Threats & Tips To Mitigate.pdf
Cloud Security - Types, Common Threats & Tips To Mitigate.pdfCloud Security - Types, Common Threats & Tips To Mitigate.pdf
Cloud Security - Types, Common Threats & Tips To Mitigate.pdfDataSpace Academy
 
the_role_of_resilience_data_in_ensuring_cloud_security.pptx
the_role_of_resilience_data_in_ensuring_cloud_security.pptxthe_role_of_resilience_data_in_ensuring_cloud_security.pptx
the_role_of_resilience_data_in_ensuring_cloud_security.pptxsarah david
 
the_role_of_resilience_data_in_ensuring_cloud_security.pdf
the_role_of_resilience_data_in_ensuring_cloud_security.pdfthe_role_of_resilience_data_in_ensuring_cloud_security.pdf
the_role_of_resilience_data_in_ensuring_cloud_security.pdfsarah david
 
Strategies for assessing cloud security
Strategies for assessing cloud securityStrategies for assessing cloud security
Strategies for assessing cloud securityArun Gopinath
 
Ast 0064255 strategies-for_assessing_cloud_security
Ast 0064255 strategies-for_assessing_cloud_securityAst 0064255 strategies-for_assessing_cloud_security
Ast 0064255 strategies-for_assessing_cloud_securityAccenture
 
legal and ethical.ppt
legal and ethical.pptlegal and ethical.ppt
legal and ethical.pptAdhisthangurung
 
Cloud computing seminar report
Cloud computing seminar reportCloud computing seminar report
Cloud computing seminar reportshafzonly
 

Similar to Five cloud security tips (20)

Legal And Regulatory Issues Cloud Computing...V2.0
Legal And Regulatory Issues Cloud Computing...V2.0Legal And Regulatory Issues Cloud Computing...V2.0
Legal And Regulatory Issues Cloud Computing...V2.0
 
Cloud Application Security Best Practices To follow.pdf
Cloud Application Security Best Practices To follow.pdfCloud Application Security Best Practices To follow.pdf
Cloud Application Security Best Practices To follow.pdf
 
Security and Privacy Issues of Cloud Computing; Solutions and Secure Framework
Security and Privacy Issues of Cloud Computing; Solutions and Secure FrameworkSecurity and Privacy Issues of Cloud Computing; Solutions and Secure Framework
Security and Privacy Issues of Cloud Computing; Solutions and Secure Framework
 
Cloud Application Security Best Practices To follow.pdf
Cloud Application Security Best Practices To follow.pdfCloud Application Security Best Practices To follow.pdf
Cloud Application Security Best Practices To follow.pdf
 
Fortifying the Digital Sky Exploring the Application of Cybersecurity for Clo...
Fortifying the Digital Sky Exploring the Application of Cybersecurity for Clo...Fortifying the Digital Sky Exploring the Application of Cybersecurity for Clo...
Fortifying the Digital Sky Exploring the Application of Cybersecurity for Clo...
 
R ramya devi cloud computing
R ramya devi cloud computingR ramya devi cloud computing
R ramya devi cloud computing
 
INFORMATION SECURITY IN CLOUD COMPUTING
INFORMATION SECURITY IN CLOUD COMPUTINGINFORMATION SECURITY IN CLOUD COMPUTING
INFORMATION SECURITY IN CLOUD COMPUTING
 
Fortifying the Digital Sky: Exploring the Application of Cybersecurity for Cl...
Fortifying the Digital Sky: Exploring the Application of Cybersecurity for Cl...Fortifying the Digital Sky: Exploring the Application of Cybersecurity for Cl...
Fortifying the Digital Sky: Exploring the Application of Cybersecurity for Cl...
 
report on Mobile security
report on Mobile securityreport on Mobile security
report on Mobile security
 
Design and implement a new cloud security method based on multi clouds on ope...
Design and implement a new cloud security method based on multi clouds on ope...Design and implement a new cloud security method based on multi clouds on ope...
Design and implement a new cloud security method based on multi clouds on ope...
 
DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...
DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...
DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...
 
Cloud Security - Types, Common Threats & Tips To Mitigate.pdf
Cloud Security - Types, Common Threats & Tips To Mitigate.pdfCloud Security - Types, Common Threats & Tips To Mitigate.pdf
Cloud Security - Types, Common Threats & Tips To Mitigate.pdf
 
the_role_of_resilience_data_in_ensuring_cloud_security.pptx
the_role_of_resilience_data_in_ensuring_cloud_security.pptxthe_role_of_resilience_data_in_ensuring_cloud_security.pptx
the_role_of_resilience_data_in_ensuring_cloud_security.pptx
 
the_role_of_resilience_data_in_ensuring_cloud_security.pdf
the_role_of_resilience_data_in_ensuring_cloud_security.pdfthe_role_of_resilience_data_in_ensuring_cloud_security.pdf
the_role_of_resilience_data_in_ensuring_cloud_security.pdf
 
Cloud Security_ Unit 4
Cloud Security_ Unit 4Cloud Security_ Unit 4
Cloud Security_ Unit 4
 
Strategies for assessing cloud security
Strategies for assessing cloud securityStrategies for assessing cloud security
Strategies for assessing cloud security
 
Strategies for assessing cloud security
Strategies for assessing cloud securityStrategies for assessing cloud security
Strategies for assessing cloud security
 
Ast 0064255 strategies-for_assessing_cloud_security
Ast 0064255 strategies-for_assessing_cloud_securityAst 0064255 strategies-for_assessing_cloud_security
Ast 0064255 strategies-for_assessing_cloud_security
 
legal and ethical.ppt
legal and ethical.pptlegal and ethical.ppt
legal and ethical.ppt
 
Cloud computing seminar report
Cloud computing seminar reportCloud computing seminar report
Cloud computing seminar report
 

Recently uploaded

Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel AraĂșjo
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 

Recently uploaded (20)

Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 

Five cloud security tips

  • 1. Five Critical Ways to Improve Security Posture Across Clouds
  • 2. Copyright © 2012 ServiceMesh, Inc. Proprietary and Confidential 2 The Cloud Security Challenge Fewer than half of security and compliance officers feel that they have the technology they need to secure their cloud deployments! Cloud management platforms can play a pivotal role in cloud security by centralizing the orchestration, governance and deployment of cloud applications, platforms and infrastructure across hybrid clouds.
  • 3. Copyright © 2012 ServiceMesh, Inc. Proprietary and Confidential 3 Cloud Security Tip Number 1: Policy-based application and data governance is achieved through policies that can dictate which application workload may be placed in which cloud. These governance policies can extend to include user access controls and provisioning constraints. Policy Policy Policy Policy Governance/Security Roles Rights & Permissions Projects Orgs Network Infrastructure Compute Storage Applications & Platforms OS Agents/Utilities Middleware App Config. Data Code DevPoliciesOpsPolicies
  • 4. Copyright © 2012 ServiceMesh, Inc. Proprietary and Confidential 4 Cloud Security Tip Number 2: Automate installation and configuration of security technologies including industry standards such as host intrusion-detection systems (HIDS), anti- virus, firewalls, vulnerability assessment and patch management. For IT, concerns regarding security (66%), integration stability and reliability (47%) and ability of cloud computing solutions to meet enterprise/industry standards (35%) challenge adoption. - IDG Enterprise Cloud Computing: Key Trends and Future Effects Report 2013
  • 5. Copyright © 2012 ServiceMesh, Inc. Proprietary and Confidential 5 Cloud Security Tip Number 3: 5 OS & Platforms Agents/Utilities Governance Code Plan Develop Test Release Operate Code Code OS & Platforms Agents/Utilities Governance OS & Platforms Agents/Utilities Governance git Be sure your cloud management platform integrates with configuration management solutions such as Puppet and Chef to ensure configuration compliance to policy.
  • 6. Copyright © 2012 ServiceMesh, Inc. Proprietary and Confidential 6 Cloud Security Tip Number 4: Cloud-based VMs running firewall policies can easily be configured and enforced with a cloud management platform– both in private and public cloud environments.
  • 7. Copyright © 2012 ServiceMesh, Inc. Proprietary and Confidential 7 Cloud Security Tip Number 5: Cloud management platform policies can trigger security and vulnerability scans of VMs to ensure continuous security across cloud workloads.