Presentation is loading. Please wait.

Presentation is loading. Please wait.

Preventing Good People From Doing Bad Things Best Practices for Cloud Security Brian Anderson Chief Marketing Officer & Author of “Preventing Good People.

Similar presentations


Presentation on theme: "Preventing Good People From Doing Bad Things Best Practices for Cloud Security Brian Anderson Chief Marketing Officer & Author of “Preventing Good People."— Presentation transcript:

1 Preventing Good People From Doing Bad Things Best Practices for Cloud Security Brian Anderson Chief Marketing Officer & Author of “Preventing Good People From Doing Bad Things”

2 1 Public, Private and Hybrid Cloud Computing Security For infrastructure, end points, data and applications Across physical, virtual, public, private and hybrid cloud environments Empower IT governance to strengthen security, improve productivity, drive compliance and reduce expense Vision Securing the Perimeter Within Consistent policy-driven, role-based access control, fine grained privilege delegation, logging, monitoring and reporting Server & Desktop Physical & Virtualization Windows, Linux, Unix Network Device Security Network Device Security Data Security & Leak Prevention Data Security & Leak Prevention Governance, Risk & Compliance Governance, Risk & Compliance

3 2 The Problem is Broad and Deep The threat from attacks is a statistical certainty and businesses of every type and size are vulnerable. Organizations are experiencing multiple breaches: 59 percent had two or more breaches in the past 12 months. Only 11 percent of companies know the source of all network security breaches.

4 3 Privileges are Misused in Different Ways Insider attacks cost an average $2.7 Million per attack 1 Desktop configuration errors cost companies $120/yr/pc 2 Virtual sprawl and malware are ever-present realities Source: 1 Computer Security Institute and FBI Survey. Source: 2 IDC Report: The Relationship between IT Labor Costs and Best Practices for Identity and Access Management with Active

5 4 48% of all data breaches were caused by insiders (+26%) 1 48% involved privilege misuse (+26%) 1 98% of all data breaches came from servers 1 Insider vs Outsider Threats “Organizations continue to struggle with excessive user privilege as it remains the primary attack point for data breaches and unauthorized transactions.” ~ Mark Diodati, Burton/Gartner Group External Threat Anti-Virus Firewalls E-mail Security Web Security Internal Threat Data Security & Leak Prevention Privileged Identity Management Intrusion Detection & Prevention Source: 1 “2010 Data Breach Investigations Report“ by Verizon with US Secret Service BeyondTrust

6 5 End Point Vulnerabilities in a SAAS World

7 6 Requirements:  Anti-Virus  Patch Management  Privilege Elevation  End Point DLP Best Practice For Cloud Security Employ a Full Suite of EndPoint Security Tools

8 7 Cloud Computing Reality – Public, Hybrid or Private Increasing scale – from thousands to tens of thousands servers Increasing complexity makes configuration and change management challenging – Complex directory structures are a major pain point Reliability is critical to realizing operational improvement Impact of Virtualization and Cloud Computing

9 8 Requirements:  Account for All Privileged Users  Manage Provisioning/De-Provisioning Privileged Credentials  Implement a “Least Privilege” based Control System  Monitor and Reconcile Privileged Activity  Maintain a High Quality Audit Repository  Automate Compliance Reporting Best Practice For Cloud Security Full Life-Cycle Control of Privileged Users

10 9 Impact of Virtualization and Cloud Computing Customer Requirements For Enterprise Grade Cloud Security Scalable, enterprise grade fabric Seamless integrations with on-premise and cloud directories Allow admins to manage policies not infrastructure Dynamically react to changes in virtual environment Quantifiable performance metrics of how its performing

11 10 Policy Files 10 How Least Privilege Works Submit Host (pbrun) Master Host (pbmasterd) Request a Privileged TaskRejected Log Host (pblogd) Event Logs I/O logs Accepted Privileged Task Privileged User Run Host (pblocald) 1 1 2 2 2 2 3 3 4 4 Task Delegation / Privilege Escalation

12 11 Policy Files 11 Fully Cloud Based Least Privilege Submit Host (pbrun) Master Host (pbmasterd) Request a Privileged TaskRejected Log Host (pblogd) Event Logs I/O logs Accepted Privileged Task Privileged User Run Host (pblocald) 1 1 2 2 2 2 3 3 4 4 On- Premise Hosted

13 12 Policy Files 12 Cloud Hosted Least Privilege Submit Host (pbrun) Master Host (pbmasterd) Request a Privileged TaskRejected Log Host (pblogd) Event Logs I/O logs Accepted Privileged Task Privileged User Run Host (pblocald) 1 1 2 2 2 2 3 3 4 4 On- Premise Hosted

14 Thank You 818.575.4000 www.beyondtrust.com. Connect with us...


Download ppt "Preventing Good People From Doing Bad Things Best Practices for Cloud Security Brian Anderson Chief Marketing Officer & Author of “Preventing Good People."

Similar presentations


Ads by Google