HPE Cloud Security
HPE Cloud Security
HPE Cloud Security
These materials are © 2017 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Hybrid Cloud Security For Dummies®, HPE Special Edition
Published by
John Wiley & Sons, Inc.
111 River St.
Hoboken, NJ 07030-5774
www.wiley.com
Copyright © 2017 by John Wiley & Sons, Inc., Hoboken, New Jersey
No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by
any means, electronic, mechanical, photocopying, recording, scanning or otherwise, except as permitted
under Sections 107 or 108 of the 1976 United States Copyright Act, without the prior written permission of the
Publisher. Requests to the Publisher for permission should be addressed to the Permissions Department,
John Wiley & Sons, Inc., 111 River Street, Hoboken, NJ 07030, (201) 748-6011, fax (201) 748-6008, or online at
http://www.wiley.com/go/permissions.
Trademarks: Wiley, For Dummies, the Dummies Man logo, The Dummies Way, Dummies.com, Making
Everything Easier, and related trade dress are trademarks or registered trademarks of John Wiley & Sons,
Inc. and/or its affiliates in the United States and other countries, and may not be used without written
permission. HPE and the HPE logo are trademarks or registered trademarks of Hewlett Packard
Enterprise Development LP. The OpenStack Word Mark and OpenStack Logo are either registered
trademarks/service marks or trademarks/service marks of the OpenStack Foundation, in the United
States and other countries and are used with the OpenStack Foundation’s permission. Neither HPE nor
John Wiley & Sons, Inc. is affiliated with, endorsed or sponsored by the OpenStack Foundation, or the
OpenStack community. Source: http://www.openstack.org/brand/openstack-trademark-policy. All
other trademarks are the property of their respective owners. John Wiley & Sons, Inc., is not associated
with any product or vendor mentioned in this book.
For general information on our other products and services, or how to create a custom For Dummies book
for your business or organization, please contact our Business Development Department in the U.S. at
877-409-4177, contact info@dummies.biz, or visit www.wiley.com/go/custompub. For information about
licensing the For Dummies brand for products or services, contact BrandedRights&Licenses@Wiley.com.
10 9 8 7 6 5 4 3 2 1
Publisher’s Acknowledgments
Some of the people who helped bring this book to market include the following:
These materials are © 2017 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Table of Contents
INTRODUCTION................................................................................................ 1
About This Book.................................................................................... 2
Foolish Assumptions............................................................................. 2
Icons Used in This Book........................................................................ 2
Beyond the Book................................................................................... 3
Where to Go from Here........................................................................ 3
These materials are © 2017 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Shared Access Management.............................................................. 30
Understanding why identity matters........................................... 30
Integrating identity into the cloud............................................... 30
These materials are © 2017 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Introduction
O
ver the past decade, cloud computing has allowed busi-
nesses and data centers to transform from a static, client/
server infrastructure into a virtualized, service-based
model where the business dictates the requirements, and IT is
expected to follow. There is no disputing the fact that the dynamic
nature of cloud computing — whether consumed as a public, pri-
vate, or hybrid cloud model, and whether delivered as
Infrastructure as a Service (IaaS), Platform as a Service (PaaS), or
Software as a Service (SaaS) — has significantly changed the way
in which businesses operate today.
Introduction 1
These materials are © 2017 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
About This Book
This book explores the cloud security threat, principles of a hybrid
cloud security architecture, and some of the security aspects of
HPE Helion OpenStack. It also looks at some of the individual
cloud-centric security technologies that HPE offers, and how
these technologies and services can help an organization to
strengthen its cloud defenses.
Foolish Assumptions
Agatha Christie once said that assumptions are dangerous things,
but in writing this book, I’ve assumed the following about you:
This icon points out information that may well be worth com-
mitting to your nonvolatile memory, your gray matter, or your
noggin — along with anniversaries and birthdays!
These materials are © 2017 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
You won’t find a map of the human genome in this book, but if
you seek to attain the seventh level of NERD-vana, perk up! This
icon explains the jargon beneath the jargon!
Thank you for reading. Hope you enjoy the book. Please take care
of your writers! Seriously, this icon points out helpful suggestions
and useful nuggets of information.
Introduction 3
These materials are © 2017 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
4 Hybrid Cloud Security For Dummies, HPE Special Edition
These materials are © 2017 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
IN THIS CHAPTER
»» Defining hybrid cloud
Chapter 1
Introducing Hybrid
Cloud Security
I
n this chapter, I fill you in on the hybrid cloud and some of
the security threats in a cloud environment. I also discuss the
principles of hybrid cloud security and the importance of due
diligence.
This is where a hybrid cloud model can help. Applications that can
be safely and cost-effectively hosted in a public cloud, maybe as
a Software-as-a-Service (SaaS) offering, get hosted with a cloud
These materials are © 2017 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
provider. One organization might use several different providers
for different applications — for example, Dropbox for file storage,
Microsoft Office 365 for online collaboration tools, and Salesforce
for CRM systems.
Other applications that can benefit from the scalability and flex-
ibility of cloud, but require a bit more customization than a stan-
dard SaaS offering, get moved into Infrastructure-as-a-Service
(IaaS) or enterprise Platform-as-a-Service (PaaS) infrastructure,
as part of either a public cloud or a private cloud. In the case of
a private cloud, the entire infrastructure is run for a single cus-
tomer, whereas with a public cloud the cloud instances are hosted
in a shared environment, such as Microsoft Azure or Amazon Web
Services. IaaS and PaaS can be used for systems hosting home-
grown business intelligence applications or databases, or simply
any applications that are suitable to run in the cloud.
Cloud Models
A number of different cloud delivery models are available for
enterprises today. The main three are
These materials are © 2017 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
maintaining everything above the hypervisor (from the
operating system upward). Well-known examples of IaaS
include Amazon EC2 and Rackspace Cloud Servers.
These materials are © 2017 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
CSP is typically responsible for the security of the solution. The
CSP designs the cloud solution to provide adequate control and
authentication capabilities and to protect the infrastructure
against all manner of cyber threats. The CSP also works to see
that due care is taken in protecting the data held within the cloud.
With a public cloud IaaS instance, the CSP offers basic infrastruc-
ture security — for example, firewalls and VPN connectivity —
but the subscriber is responsible for everything else.
Make sure you’re clear what your CSP is responsible for, and what
it’s not.
Many of these threats are also present in the traditional data cen-
ter environment — threats like data breaches, system vulner-
abilities, or malicious insiders will continue to exist regardless of
where the data is stored and processed.
These materials are © 2017 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Principles of Hybrid Cloud Security
When discussing how to securely transform to a hybrid infra-
structure with clients, HPE focuses on three main security-first
principles. These principles are the same regardless of the CSP,
and they offer a very good foundation for understanding cloud
security.
Shared responsibility
The responsibility for information security can’t be outsourced,
especially in a cloud environment. Ultimately, the buck stops
firmly within the four walls of your own organization.
Be sure to find the right mix of involvement for end users and
solution providers. The vendor may deliver best-in-class security
solutions, but it’s up to the end user to define the right security
policies to protect his or her business model and manage those
security policies from within the cloud, following industry best
practices.
Defense in depth
There is no silver bullet for security — no single solution that will
solve all your security challenges. Especially in a cloud environ-
ment, it’s important to provide multiple layers of security con-
trols, creating redundancies in the protection offered. For example,
These materials are © 2017 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
infrastructure controls can exist in tandem with host layer protec-
tion, as can application controls and data security tools.
• People (P1): Ensures that the right staff with the right knowledge
is performing the correct roles to oversee cloud computing secu-
rity and that users and consumers are made responsible and
knowledgeable on security aspects.
• Policies and procedures (P2): Ensures that the right set of poli-
cies and procedures are in place to govern the security and busi-
ness continuity of a cloud.
• Processes (P3): Ensures that the proper security and business
continuity process models are in place to safeguard the transfer of
data between the consumers and the provider of the cloud ser-
vices and to ensure to proper and secure operation of the cloud
services.
• Products (P4): Ensures that the appropriate defense-in-depth
technologies and solutions are in place to manage and mitigate
security risks.
• Proof (P5): Determines if the correct validation methods, metrics,
and/or key performance indicators (KPIs) are used to track security
control effectiveness in a hybrid cloud.
These materials are © 2017 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Due Diligence
With any model of cloud deployment, it’s possible to outsource
the management of operations and the management of the data,
but it’s never possible to outsource the risk an organization intro-
duces by moving its workloads and data into a cloud environment.
With any planned move to the cloud, you need to follow a full
risk-based approach to ensure that all involved parties are con-
sulted and the implications of moving data and workloads to the
cloud are fully assessed. There should be a common understand-
ing that a breach is inevitable, sooner or later. The processes that
are put in place to deal with this, and the way that the incident
is handled post-breach, will ultimately determine whether the
organization can survive in the long run.
These materials are © 2017 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
»» Provider suitability: Your CSP will be providing an exten-
sion to your own IT infrastructure, so it’s vital to understand
how it handles its security operations. Has your CSP been
assessed by an independent auditor? Does it have a recent
audit report? How do its service-level agreements (SLAs)
relate to your own internal SLAs?
»» Impact of compliancy: What compliancy regulations are
relevant for your business? Are you performing credit card
transactions? Look at the Payment Card Industry Data
Security Standards (PCI DSS). Maintaining U.S. health data?
Consult the Health Insurance Portability and Accountability
Act (HIPAA). Storing personal data from citizens in the EU?
Know the General Data Protection Regulation (GDPR) and
EU-U.S. Privacy Shield.
Given that many regulations enforce sizeable monetary
penalties for noncompliance, and may hold company
directors personally liable, it’s vital to understand compliancy
requirements before embracing the cloud.
These materials are © 2017 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
IN THIS CHAPTER
»» Understanding the challenges with
traditional security controls in the cloud
»» Defining micro-segmentation
»» Introducing containerization
Chapter 2
Hardening the Cloud
Environment
I
n this chapter, I fill you in on some of the controls you can
use to secure the cloud environment. I discuss the value of
using micro-segmentation to protect the cloud network, and
introduce some of the security challenges around implementing
containerization.
These materials are © 2017 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
ARCHITECTURAL METHODOLOGY
To structure and streamline its Cloud Protection Reference
Architecture, HPE used the methodology described in the HPE Global
Method for IT Solution Architecture (HPE GM ITSA) and the holistic
security control approach provided by the HPE P5 Model.
• Business view: The business view answers the question “Why are
we doing this?”
• Functional view: The functional view answers the question “What
should the solution do?”
• Technical view: The technical view answers the question “How
should the solution work?”
• Implementation view: The implementation view answers the
question “With what will the solution be built?”
These materials are © 2017 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
FIGURE 2-1: Technical cloud security principles and capabilities.
These materials are © 2017 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Plus, in a dynamic cloud environment, with rapid provisioning
and deprovisioning of compute instances, traditional patch man-
agement approaches don’t scale.
These materials are © 2017 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
a reference to the mode of operation of software where
multiple independent instances of one or multiple applications
operate in a shared environment. The instances (tenants) are
logically isolated, but physically integrated.
These materials are © 2017 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Understanding Software
Network Overlays
SDN is starting to become popular in both on-premises and cloud-
based data centers because of the flexibility it can provide over a
traditional data center network (often referred to as a hardware-
defined network).
These materials are © 2017 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Internet Protocol (IP) subnets, and routers. But more and
more traffic in a cloud or virtualized data center is going
east–west rather than north–south. This means that security
devices that have been deployed to offer perimeter protec-
tion are no longer able to see as much of the network traffic
as they previously could. Micro-segmentation deals with this
by deploying distributed routers at the hypervisor level and
enabling access control lists (ACLs) at the closest enforce-
ment point to the VM itself — between the virtual switch and
the virtual network interface controller (NIC).
»» Service chaining: Service chaining (also called service
composer or service insertion) is the ability to integrate other
network security (or network management) devices into
the cloud network environment. It provides particular value
for east–west traffic. For example, both NSX and DCN can
integrate with third-party next-generation firewall solutions
(like the physical and virtual firewall solutions from vendors
such as Fortinet or Palo Alto Networks) to add an additional
layer of control for the traffic that is passed in between VMs.
The service chaining configuration is typically managed at
the distributed router level to provide the needed flexibility.
»» Secure access: Network overlay solutions support the ability
to create VPN tunnels for use to provide either secure access
to clients or secure site-to-site tunnels.
These materials are © 2017 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Standard virtualization offered by VMware, Microsoft Hyper-v, or
KVM provides a hypervisor upon which multiple instances of an
operating system may be provisioned and used. Containerization
differs from this by offering OS-level virtualization — multiple
isolated user space instances sharing a single kernel.
These materials are © 2017 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
CASE STUDY: HPE HELION
OPENSTACK SECURITY
To understand how a provider may customize a cloud OS to improve
security, it’s worth looking at some of the work that HPE has carried
out to add to the security of the open-source OpenStack OS.
HPE Helion OpenStack was designed with three key targets in mind
from a security perspective:
(continued)
These materials are © 2017 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
(continued)
Here are some of the tools that HPE has co-developed in order to
help differentiate Helion OpenStack as a security-hardened product:
These materials are © 2017 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
IN THIS CHAPTER
»» Identifying the role of security in the
software development life cycle
Chapter 3
Securing the Application
Life Cycle
I
n this chapter, you learn about improving the quality of appli-
cations by introducing security into the software development
life cycle (SDLC), the value of data-centric encryption, and the
importance of understanding identity when adopting cloud.
These materials are © 2017 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
fulfill specific business needs, and hackers are also starting to
focus on finding vulnerabilities in these made-to-measure appli-
cations for maximum impact.
These materials are © 2017 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
»» Involve people from the application security team at the
product requirements planning stage.
»» Introduce source code scanning as a gate process, ensuring
that all code intended for release into a production environ-
ment is first scanned using whatever tool the organization
has chosen.
These materials are © 2017 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
to go beyond black box testing by integrating dynamic and run-
time analysis to find more vulnerabilities and fix them faster.
RASP solutions are fairly new. There are also other technologies
that can offer similar functionalities in a cloud, but they typically
work from an outside-in approach rather than inside-out. As an
alternative to RASP, cloud applications can be protected using a
WAF, a network IPS (NIPS) or host IPS (HIPS), or more tradi-
tional controls such as antivirus (AV) software. The RASP solution
within the HPE Fortify portfolio is HPE Application Defender.
These materials are © 2017 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Knowing the Importance of
Data-Centric Security
In addition to securing the application, you need to secure the
data being used by the application.
One of the major concerns for any organization putting data into
the cloud — whether the data is customer records or intellectual
property — is what happens to that data if the cloud instance
is breached. If you believe that sooner or later every company
will get breached, security becomes even more relevant. A suit-
able solution to the problem is data encryption — after all, if the
information is stored in a format that makes no sense to hackers,
it will have limited value to them if they steal it.
These materials are © 2017 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
»» Data at rest: Data residing in a persistent format inside the
cloud — for example, file storage, or database records. The
key here is to protect the data being held inside the database
or file system so that if a cybercriminal were able to breach
the exterior defenses, the data inside the database or file
system would still be protected and of limited value. In a
cloud environment, especially one being managed by a cloud
service provider (CSP), it’s important to address the manage-
ment of the encryption keys, deciding exactly who should
have access to them.
»» Data in use: Data that has been loaded into an application
for processing, and is being held in the system memory.
Typically, this data is in a plain text format, and would be
readable by anyone able to intercept the information. If your
organization wants to work with true end-to-end encryption
through the life cycle of the data, you need to identify a
solution for data in use encryption.
These materials are © 2017 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
this is where data-centric security can help. Data-centric security
involves encrypting the individual pieces of data that are being
stored, rather than encrypting the storage or transport medium
itself. The data then remains in this encrypted format through-
out the life cycle of the data, and it’s only decrypted by processes
that have a requirement to process the unencrypted version of
the data.
These materials are © 2017 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Shared Access Management
Remembering usernames and passwords is a challenge for every
user, and the more applications that a user has access to, the
harder it is to come up with unique but memorable passwords.
Password management tools can definitely help here, but when
an enterprise is looking to adopt hybrid cloud and SaaS appli-
cations, being able to integrate the use of an enterprise identity
directory across all the cloud applications using identity federa-
tion is very beneficial.
These materials are © 2017 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
support multiple sources of authentication, including a built-in
authentication system and integrations with enterprise directo-
ries such as OpenLDAP or Microsoft Active Directory.
These materials are © 2017 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
32 Hybrid Cloud Security For Dummies, HPE Special Edition
These materials are © 2017 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
IN THIS CHAPTER
»» Understanding the value of security
intelligence in the cloud
Chapter 4
Monitoring the Cloud
T
his chapter looks at the importance of event monitoring in
the cloud, and addresses some of the challenges around
compliance and regulations.
These materials are © 2017 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Implementing cloud security
with big data
In large enterprises, the number of events that a SIEM platform
can receive can be in the millions or even billions per day. For
example, the HPE SOC receives, on average, 21 billion security
events every single day. SIEM platforms use a variety of analyti-
cal techniques to reduce the huge amount of information that the
analyst receives to the most relevant information. These tech-
niques can include user behavioral analytics or malware analytics
to help detect both known and unknown threat vectors.
These materials are © 2017 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
blocking capabilities around public cloud usage. It integrates with
the SIEM and sends events to be correlated, providing enterprises
with the ability to monitor and detect a wide range of threats in
the cloud infrastructure, as well as with third-party apps.
For example, consider a use case where a user enters the office
in London with a swipe card, and logs into her workstation using
her enterprise credentials. Every SIEM platform should be able
to correlate these two events as acceptable behavior. However,
five minutes later, the same user is identified as logging into her
Office 365 account from an IP address based in China — on its
These materials are © 2017 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
own, this is also a normal event. Realistically, though, there is no
way that the user could have traveled from London to China in
such a short period of time, so this suggests that the Office 365
credentials may have been compromised. However, the only way
a security analyst could identify the malicious behavior is if the
cloud events are being correlated in context with the enterprise
events. ArcSight, together with the User Behavior Analytics mod-
ule, can detect anomalous user and entity behavior to help quickly
discover and prioritize the most suspicious and abnormal activi-
ties back to the security analyst in real-time, giving him powerful
analytics tools to be able to identify security incidents across his
entire IT infrastructure.
These materials are © 2017 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
baseline for security, but it typically won’t dictate all the security
controls that need to be applied to be fully secure.
These materials are © 2017 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
HPE offers a number of solutions that can help customers to
maintain uniform compliance across hybrid cloud infrastruc-
tures, including HPE IT Operations Compliance, HPE Verity, and
compliance reporting packs for HPE ArcSight.
Data Sovereignty
A main concern that organizations are faced with when consider-
ing the move to the cloud is the issue of data sovereignty (where data
is located in the cloud at any time). In the traditional data center,
it was fairly easy to address this concern: The data was stored on
servers in the data center, and it could easily be tied to a specific
geography. But in a cloud environment, the concept of geographical
boundaries becomes very blurry, especially when you look at large
CSPs offering elasticity, cloud bursting, and geographic redun-
dancy in the case of service outages. In fact, it’s usually impossible
to know with any degree of certainty exactly where your data is at
any particular time when the data is stored in a public cloud.
These materials are © 2017 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
GDPR (Regulation EU 2016/679) was adopted by the EU in April 2016,
and is expected to come fully into force in May 2018, replacing the
older EU data protection directive (95/46/EC). Businesses are being
advised to start preparation for compliance with GDPR sooner rather
than later.
These materials are © 2017 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Business Continuity and Disaster
Recovery Planning
Business continuity planning (BCP) and disaster recovery plan-
ning (DRP) is an important part of any IT strategy, because it
helps an organization prepare for the unexpected — whether it’s
a cyber incident, a natural disaster, or an equipment failure —
and return to normal business operations as quickly as possible.
These materials are © 2017 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
A STRUCTURED SERVICE
APPROACH
HPE can provide the following Cloud Protection services to help cus-
tomers build secure and compliant hybrid clouds:
These materials are © 2017 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
42 Hybrid Cloud Security For Dummies, HPE Special Edition
These materials are © 2017 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
IN THIS CHAPTER
»» Recognizing what you need to do to
make your cloud platform secure
Chapter 5
Ten Tips for
Implementing a Secure
Cloud Platform
M
oving an organization to the cloud introduces a lot of
new challenges to think about, not least those related to
security. You need to build a platform that satisfies the
needs of the business, but at the same time ensure that it doesn’t
introduce any unnecessary security risks that could compromise
the organization’s data or intellectual property.
These materials are © 2017 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
and use this information to help identify the most appropri-
ate cloud service providers and service partners.
»» Infrastructure security: Choose a secure hybrid cloud
platform, considering platform hardening, virtual machine
life cycle management, and approach to network security
and containerization.
»» Secure application development: Integrate security into
the software development life cycle to reduce the application
vulnerability footprint. This may require a change in the way
developers are educated, but it will lead to higher-quality
software.
»» Data-centric security: Use a data-centric approach to
encrypting confidential data and personally identifiable
information (PII), while ensuring that the data can be
processed and stored without impacting applications or
business processes.
»» Cloud identity management: Use federated identities to
integrate cloud identity and access management into the
corporate identity governance model, identifying roles and
responsibilities.
»» Security event visibility: Support the hybrid cloud with
continuous security monitoring and expand enterprise
security visibility by integrating alerts originating from the
cloud into the enterprise security information and event
management (SIEM) platform.
»» Continuous regulatory compliance: Understand compli-
ancy and regulatory requirements, policies, and procedures,
and identify appropriate controls that enable a business to
securely transform into a cloud-based operating model
without incurring additional business risk.
»» Cloud availability: Integrate the hybrid cloud operating
model into organizational business continuity and disaster
recovery planning to ensure that any cloud downtime is
planned for appropriately.
These materials are © 2017 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
These materials are © 2017 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
WILEY END USER LICENSE AGREEMENT
Go to www.wiley.com/go/eula to access Wiley’s ebook EULA.