E N D
2. Jamie Sharp CISSP
Security Architect
Microsoft Australia How do you secure a cloud? http://www.youtube.com/watch?v=xxHaHdyP01Q
http://www.youtube.com/watch?v=xxHaHdyP01Q
3. Agenda Perspective
Defining the clouds
Understanding the situation
Global Foundation Services
BPOS security
4. http://www.whomovedmycheese.com/http://www.whomovedmycheese.com/
5. Opportunity
6. Trust Westpac has a long and proud history as Australia's first and oldest bank. It was established in 1817 as the Bank of New South Wales.
Westpac has a long and proud history as Australia's first and oldest bank. It was established in 1817 as the Bank of New South Wales.
7. Risk In 2009, 1507 people lost their lives in road accidents
Road Deaths Australia - 2009 Statistical Summary
http://www.bitre.gov.au/publications/69/Files/Ann_Road_Deaths.pdf
Since 1999, 87 people lost their lives in commercial air accidents
Aviation Occurrence Statistics 1999 to 2009
http://www.atsb.gov.au/publications/2009/ar2009016(3).aspx
In 2009, 1507 people lost their lives in road accidents
Road Deaths Australia - 2009 Statistical Summary
http://www.bitre.gov.au/publications/69/Files/Ann_Road_Deaths.pdf
Since 1999, 87 people lost their lives in commercial air accidents
Aviation Occurrence Statistics 1999 to 2009
http://www.atsb.gov.au/publications/2009/ar2009016(3).aspx
8. NIST Definition of Cloud Computing Definition:
Cloud computing is a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction. This cloud model promotes availability and is composed of five essential characteristics, three service models, and four deployment models.
Essential Characteristics:
On-demand self-service
Broad network access
Resource pooling
Rapid elasticity
Measured service http://csrc.nist.gov/groups/SNS/cloud-computing/index.html
http://csrc.nist.gov/groups/SNS/cloud-computing/index.html
9. Defining the clouds
10. Microsoft Cloud Assets
11. http://gnews.com/happy-birthday-to-msn-the-microsoft-network-18201004081024/
http://gnews.com/happy-birthday-to-msn-the-microsoft-network-18201004081024/
12. Understanding the situation
13. Paradigm change
14. What Changes
15. Key Inhibitors to Adopting Cloud Computing
16. Drivers and Barriers for Cloud Computing
17. Cloud Security Alliance - Security Guidance for Critical Areas of Focus in Cloud Computing http://www.cloudsecurityalliance.org/http://www.cloudsecurityalliance.org/
18. Assessing the Security Risks of Cloud Computing – Gartner June 2008 Recommendations:
Apply existing risk assessment methodology to cloud computing
Understand compliance requirements
Demand transparency
Develop a strategy for the use of cloud delivery mechanisms http://www.gartner.com/DisplayDocument?id=685308
http://www.gartner.com/DisplayDocument?id=685308
19. Global Foundation Services
20. Global Foundation Services
21. GFS Datacenter Inventory
22. Video - GFS Global Data Center Strategy http://www.globalfoundationservices.com/infrastructure/index.html
http://www.globalfoundationservices.com/infrastructure/index.html
23. Securing Microsoft’s Cloud Infrastructure http://www.globalfoundationservices.com/security/documents/SecuringtheMSCloudMay09.pdfhttp://www.globalfoundationservices.com/security/documents/SecuringtheMSCloudMay09.pdf
24. Information Security Program
25. Maintain a Deep Set of Security Controls
26. Comprehensive Compliance Framework http://www.globalfoundationservices.com/documents/MicrosoftComplianceFramework1009.pdf
http://www.globalfoundationservices.com/documents/MicrosoftComplianceFramework1009.pdf
27. BPOS Security
28. BPOS Standard and Dedicated Versions http://www.microsoft.com/downloads/details.aspx?FamilyID=5736aaac-994c-4410-b7ce-bdea505a3413&displaylang=en
http://www.microsoft.com/downloads/details.aspx?FamilyID=5736aaac-994c-4410-b7ce-bdea505a3413&DisplayLang=en
http://www.microsoft.com/downloads/details.aspx?FamilyId=5534BEE1-3CAD-4BF0-B92B-A8E545573A3E&displaylang=en
http://www.microsoft.com/downloads/details.aspx?FamilyID=5736aaac-994c-4410-b7ce-bdea505a3413&displaylang=en
http://www.microsoft.com/downloads/details.aspx?FamilyID=5736aaac-994c-4410-b7ce-bdea505a3413&DisplayLang=en
http://www.microsoft.com/downloads/details.aspx?FamilyId=5534BEE1-3CAD-4BF0-B92B-A8E545573A3E&displaylang=en
29. Assessing the Security Risks of Cloud Computing - Gartner What to evaluate
Privileged user access
Compliance
Data location
Data segregation
Availability
Recovery
Investigative support
Viability
http://www.gartner.com/DisplayDocument?id=685308http://www.gartner.com/DisplayDocument?id=685308
30. Privileged User AccessAdmin Authentication Individual accounts for traceability
Least privilege and service segregation approach
Two-factor authentication for physical and logical access
Automatic revocation of credentials with employment status changes
Background Checks
31. Privileged User AccessDatacenter Security
32. Compliance
33. Data Segregation and ProtectionCommunications All BPOS-S authentication and content traffic encrypted using SSL
BPOS-D requires a dedicated transport means between MOS and the customer
Enabled via the following options:
Internet-based site-to-site VPN
Customer-provided connectivity, typically an MPLS link
34. Data Segregation and ProtectionNetwork Security Firewalls used for packet inspection and enforcing rules
ACLs are used to filter networks based on protocol/port
Intrusion detection and prevention systems in LANs and the edge
VLANs (802.1q) used to segregate broadcast domains and segregate BPOS-D customers
35. Data Segregation and ProtectionBPOS-D Logical Network Security
36. Data Segregation and ProtectionIdentity Segregation in BPOS-D BPOS-D Active Directory forest will trust the customer forest(s)
Customer forest(s) never trust BPOS-D
Default trust type is External, per domain
Forest trust is an option, required by SharePoint for USG support
Domain controllers co-located at Microsoft datacenter
37. Data Segregation and ProtectionBPOS-D Active Directory Logical Design
38. Data Segregation and ProtectionMalware and Antispam Protection Antispam and antimalware protection for Exchange Online provided by FOPE
Connection, protocol and content level filtering
Leverages Microsoft reputation when delivering e-mail
Malware protection for SharePoint online provided by Forefront Protection for SharePoint
Multiple engine support
39. Availability Global Foundation Services provides core infrastructure
SLAs are defined for each service
MOS provides a 99.9% availability SLA
Performance to SLA held to financial penalty clauses
Backed by Microsoft Support http://www.microsoft.com/downloads/details.aspx?familyid=7FBD1A59-0148-450D-9BDF-50AF6C634B07&displaylang=en
http://www.microsoft.com/downloads/details.aspx?displaylang=en&FamilyID=069df92a-4f58-45e3-bbf8-93ed6bcb61d1
http://www.microsoft.com/downloads/details.aspx?familyid=4888FF5B-14A7-4F60-AC35-4713F5F08445&displaylang=enhttp://www.microsoft.com/downloads/details.aspx?familyid=7FBD1A59-0148-450D-9BDF-50AF6C634B07&displaylang=en
http://www.microsoft.com/downloads/details.aspx?displaylang=en&FamilyID=069df92a-4f58-45e3-bbf8-93ed6bcb61d1
http://www.microsoft.com/downloads/details.aspx?familyid=4888FF5B-14A7-4F60-AC35-4713F5F08445&displaylang=en
40. Recovery Redundant server and network resources
SQL Mirroring to prevent data loss due to disk failure
All data replicated to at least two datacenters
Log-Shipping every 15 minutes
Delayed playback
Database backups to support up to 7 days of non-disaster-related data loss/recoverability
User and site admin accessible Recycle Bins
41. Investigative SupportExchange Hosted Archiving Additional service, not part of BPOS
Helps customers comply with e-discovery requirements
Delivers complete message archiving with no capital investments
Automatic message retention of inbound, outbound and internal messages
Fully indexed for integrated message discovery and retrieval using Web-based interface
42. Get Ready for Cloud! Risk Based Approach
http://edge.technet.com/Media/How-Microsoft-Uses-Risk-Tracker-to-Reduce-Risk/
Identity & Access Management
http://www.microsoft.com/forefront/en/us/identity-access-management.aspx
Threat Modelling
http://technet.microsoft.com/en-us/library/dd941826.aspx
Compliance
http://technet.microsoft.com/en-us/library/cc677002.aspx
43. Thanks for coming!
45. Complete evaluation forms on Schedule Builder
Be in the running for a Jabra GN2000 USB Noise-Cancelling Mono headset