SlideShare a Scribd company logo
Five Critical Ways to Improve
Security Posture Across Clouds
Copyright © 2012 ServiceMesh, Inc. Proprietary and Confidential 2
The Cloud Security Challenge
Fewer than half of security and
compliance officers feel that they have
the technology they need to secure
their cloud deployments!
Cloud management platforms can play a pivotal role in
cloud security by centralizing the orchestration,
governance and deployment of cloud applications,
platforms and infrastructure across hybrid clouds.
Copyright © 2012 ServiceMesh, Inc. Proprietary and Confidential 3
Cloud Security Tip Number 1:
Policy-based
application and data
governance is
achieved through
policies that can dictate
which application
workload may be
placed in which cloud.
These governance
policies can extend to
include user access
controls and
provisioning
constraints.
Policy
Policy
Policy
Policy
Governance/Security
Roles
Rights & Permissions
Projects Orgs
Network
Infrastructure
Compute Storage
Applications & Platforms
OS
Agents/Utilities
Middleware
App Config.
Data
Code
DevPoliciesOpsPolicies
Copyright © 2012 ServiceMesh, Inc. Proprietary and Confidential 4
Cloud Security Tip Number 2:
Automate installation
and configuration of
security technologies
including industry
standards such as host
intrusion-detection
systems (HIDS), anti-
virus, firewalls,
vulnerability assessment
and patch management.
For IT, concerns regarding
security (66%), integration
stability and reliability (47%) and
ability of cloud computing
solutions to meet
enterprise/industry standards
(35%) challenge adoption.
- IDG Enterprise Cloud Computing: Key
Trends and Future Effects Report 2013
Copyright © 2012 ServiceMesh, Inc. Proprietary and Confidential 5
Cloud Security Tip Number 3:
5
OS & Platforms
Agents/Utilities
Governance
Code
Plan Develop Test Release Operate
Code Code
OS & Platforms
Agents/Utilities
Governance
OS & Platforms
Agents/Utilities
Governance
git
Be sure your cloud
management platform
integrates with
configuration
management
solutions such as
Puppet and Chef to
ensure configuration
compliance to policy.
Copyright © 2012 ServiceMesh, Inc. Proprietary and Confidential 6
Cloud Security Tip Number 4:
Cloud-based VMs running
firewall policies can easily
be configured and
enforced with a cloud
management platform–
both in private and public
cloud environments.
Copyright © 2012 ServiceMesh, Inc. Proprietary and Confidential 7
Cloud Security Tip Number 5:
Cloud management platform policies can
trigger security and vulnerability scans of
VMs to ensure continuous security across
cloud workloads.
servicemesh.com
@servicemesh
servicemesh.com/blog
For more information, find us at:
Thank You
8
LinkedIn
Google+

More Related Content

PDF
HOW TO TROUBLESHOOT SECURITY INCIDENTS IN A CLOUD ENVIRONMENT?
POT
Automation alley day in the cloud presentation - formatted
PPT
Basics of Information System Security
PDF
Octree securapro mauleverer case study
PPTX
Is iso 27001, an answer to security
PDF
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
PPTX
Proatively Engaged: Questions Executives Should Ask Their Security Teams
PPTX
Network Security Risks and Challenges for Enterprises
HOW TO TROUBLESHOOT SECURITY INCIDENTS IN A CLOUD ENVIRONMENT?
Automation alley day in the cloud presentation - formatted
Basics of Information System Security
Octree securapro mauleverer case study
Is iso 27001, an answer to security
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Proatively Engaged: Questions Executives Should Ask Their Security Teams
Network Security Risks and Challenges for Enterprises

What's hot (19)

PPTX
I.T. Geeks Can't Talk to Management
PPTX
Cyber Risks Implementation on an IP MPLS Network
PPTX
Optimizing Security Operations: 5 Keys to Success
PDF
Guide Preview: Ensuring your enterprise image-viewer if fully secure
PDF
Is The Cloud Secure Enough For Your Data?
DOCX
ISO 27001 Training | ISMS Awareness Training
PPTX
Digital IQ in managing risk and cyber threats
PPTX
PPTX
Computer security aspects in
PDF
Risks to Cloud based critical infrastructure -- DHS bulletin
PDF
The Seven Kinds of Security
PDF
Seven deadly threats and vulnerabilities in cloud
PPTX
An Overview of IT Risk and Control
PPTX
The Benefits of Security From a Managed Services Provider
PDF
Tripwire enterprise 87_datasheet
PPTX
Cybersecurity Framework - Introduction
PPTX
Protecting your Data in Google Apps
PPT
DSS ITSEC 2013 Conference 07.11.2013 - IBM Security Strategy
PPT
Information security in todays world
I.T. Geeks Can't Talk to Management
Cyber Risks Implementation on an IP MPLS Network
Optimizing Security Operations: 5 Keys to Success
Guide Preview: Ensuring your enterprise image-viewer if fully secure
Is The Cloud Secure Enough For Your Data?
ISO 27001 Training | ISMS Awareness Training
Digital IQ in managing risk and cyber threats
Computer security aspects in
Risks to Cloud based critical infrastructure -- DHS bulletin
The Seven Kinds of Security
Seven deadly threats and vulnerabilities in cloud
An Overview of IT Risk and Control
The Benefits of Security From a Managed Services Provider
Tripwire enterprise 87_datasheet
Cybersecurity Framework - Introduction
Protecting your Data in Google Apps
DSS ITSEC 2013 Conference 07.11.2013 - IBM Security Strategy
Information security in todays world
Ad

Viewers also liked (20)

PPTX
The Big Win: Stop Playing Small-Ball with Your Cloud Strategy
KEY
Dogfighting communism coal cloud connect chicago final
PPTX
Does Cloud Matter?
PPTX
Is Private Cloud Right for Your Organization
PPTX
Applications at Scale
PPTX
Structure 2014 - Launchpad Competition
PPTX
Cloud Scars: Lessons from the Enterprise Pioneers
PPTX
Is Private Cloud Right for Your Organization?
PPTX
Step Up to the Plate: Take Your Cloud Strategy from the Minor League to the M...
PDF
OpenCloudware: the Cloud application lifecycle management platform
PDF
Managing Multiple Clouds in an Enteprise - A Heterogenous Lens
PPTX
EMCWorld 2013 -ServiceMesh Agility Platform: Cloud-based DevOps with ViPR
PPTX
CMP slides for Slideshare 12 21-2016
PPTX
Enterprise Cloud Management - 2013 EMC World presentation
PDF
Tutorial foxpro
PDF
Gartner report on cloud360 cloud management platform
PPTX
Warrantly - Cloud Warranty Management Platform
PDF
How AppDynamics leveraged sales enablement to grow from one to 350 reps
PDF
Openstack Cloud Management and Automation Using Red Hat Cloudforms 4.0
PPTX
MongoDB Webinar : Transforming Sales Enablement with Next Gen Onboarding
The Big Win: Stop Playing Small-Ball with Your Cloud Strategy
Dogfighting communism coal cloud connect chicago final
Does Cloud Matter?
Is Private Cloud Right for Your Organization
Applications at Scale
Structure 2014 - Launchpad Competition
Cloud Scars: Lessons from the Enterprise Pioneers
Is Private Cloud Right for Your Organization?
Step Up to the Plate: Take Your Cloud Strategy from the Minor League to the M...
OpenCloudware: the Cloud application lifecycle management platform
Managing Multiple Clouds in an Enteprise - A Heterogenous Lens
EMCWorld 2013 -ServiceMesh Agility Platform: Cloud-based DevOps with ViPR
CMP slides for Slideshare 12 21-2016
Enterprise Cloud Management - 2013 EMC World presentation
Tutorial foxpro
Gartner report on cloud360 cloud management platform
Warrantly - Cloud Warranty Management Platform
How AppDynamics leveraged sales enablement to grow from one to 350 reps
Openstack Cloud Management and Automation Using Red Hat Cloudforms 4.0
MongoDB Webinar : Transforming Sales Enablement with Next Gen Onboarding
Ad

Similar to Five cloud security tips (20)

PDF
Cloud Security Assessment Guide: Ensuring Robust Protection for Your Cloud En...
PDF
Avoiding Limitations of Traditional Approaches to Security
PDF
Enterprise Cloud Governance: A Frictionless Approach
PDF
Security in the cloud planning guide
PPTX
Comprehensive Cloud Security Requires an Automated Approach
PDF
3 steps to gain control of cloud security
PDF
Resetting Your Security Thinking for the Public Cloud
PPTX
I am sharing 'unit 4' with youuuuuu.PPTX
PPTX
I am sharing 'unit 4' with youuuuuu.PPTX
PDF
Top Cloud Infrastructure Practices And Strategies For Maximum Security.pdf
PPTX
Cloud-Architecture-Technology-Deovps-Eng
PDF
Cloud Security Governance
PDF
The 3 Recommendations for Cloud Security
PDF
TENDENCIAS DE SEGURIDAD PARA AMBIENTES EN LA NUBE
PPT
Security cloud forum_2011
PPT
Managing Effective Security Policies Across Hybrid and Multi-Cloud Environment
PDF
AWS November meetup Slides
PDF
AWS User Group November
PDF
Risk management for cloud computing hb final
PPTX
Container Workload Security Solution Ideas by Mandy Sidana.pptx
Cloud Security Assessment Guide: Ensuring Robust Protection for Your Cloud En...
Avoiding Limitations of Traditional Approaches to Security
Enterprise Cloud Governance: A Frictionless Approach
Security in the cloud planning guide
Comprehensive Cloud Security Requires an Automated Approach
3 steps to gain control of cloud security
Resetting Your Security Thinking for the Public Cloud
I am sharing 'unit 4' with youuuuuu.PPTX
I am sharing 'unit 4' with youuuuuu.PPTX
Top Cloud Infrastructure Practices And Strategies For Maximum Security.pdf
Cloud-Architecture-Technology-Deovps-Eng
Cloud Security Governance
The 3 Recommendations for Cloud Security
TENDENCIAS DE SEGURIDAD PARA AMBIENTES EN LA NUBE
Security cloud forum_2011
Managing Effective Security Policies Across Hybrid and Multi-Cloud Environment
AWS November meetup Slides
AWS User Group November
Risk management for cloud computing hb final
Container Workload Security Solution Ideas by Mandy Sidana.pptx

Recently uploaded (20)

PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Machine learning based COVID-19 study performance prediction
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PPTX
A Presentation on Artificial Intelligence
PDF
Modernizing your data center with Dell and AMD
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
PDF
Approach and Philosophy of On baking technology
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
NewMind AI Monthly Chronicles - July 2025
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
Per capita expenditure prediction using model stacking based on satellite ima...
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Machine learning based COVID-19 study performance prediction
Review of recent advances in non-invasive hemoglobin estimation
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
“AI and Expert System Decision Support & Business Intelligence Systems”
A Presentation on Artificial Intelligence
Modernizing your data center with Dell and AMD
Mobile App Security Testing_ A Comprehensive Guide.pdf
Advanced methodologies resolving dimensionality complications for autism neur...
Network Security Unit 5.pdf for BCA BBA.
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
Approach and Philosophy of On baking technology
Diabetes mellitus diagnosis method based random forest with bat algorithm
NewMind AI Monthly Chronicles - July 2025
Chapter 3 Spatial Domain Image Processing.pdf
NewMind AI Weekly Chronicles - August'25 Week I
Understanding_Digital_Forensics_Presentation.pptx
Dropbox Q2 2025 Financial Results & Investor Presentation

Five cloud security tips

  • 1. Five Critical Ways to Improve Security Posture Across Clouds
  • 2. Copyright © 2012 ServiceMesh, Inc. Proprietary and Confidential 2 The Cloud Security Challenge Fewer than half of security and compliance officers feel that they have the technology they need to secure their cloud deployments! Cloud management platforms can play a pivotal role in cloud security by centralizing the orchestration, governance and deployment of cloud applications, platforms and infrastructure across hybrid clouds.
  • 3. Copyright © 2012 ServiceMesh, Inc. Proprietary and Confidential 3 Cloud Security Tip Number 1: Policy-based application and data governance is achieved through policies that can dictate which application workload may be placed in which cloud. These governance policies can extend to include user access controls and provisioning constraints. Policy Policy Policy Policy Governance/Security Roles Rights & Permissions Projects Orgs Network Infrastructure Compute Storage Applications & Platforms OS Agents/Utilities Middleware App Config. Data Code DevPoliciesOpsPolicies
  • 4. Copyright © 2012 ServiceMesh, Inc. Proprietary and Confidential 4 Cloud Security Tip Number 2: Automate installation and configuration of security technologies including industry standards such as host intrusion-detection systems (HIDS), anti- virus, firewalls, vulnerability assessment and patch management. For IT, concerns regarding security (66%), integration stability and reliability (47%) and ability of cloud computing solutions to meet enterprise/industry standards (35%) challenge adoption. - IDG Enterprise Cloud Computing: Key Trends and Future Effects Report 2013
  • 5. Copyright © 2012 ServiceMesh, Inc. Proprietary and Confidential 5 Cloud Security Tip Number 3: 5 OS & Platforms Agents/Utilities Governance Code Plan Develop Test Release Operate Code Code OS & Platforms Agents/Utilities Governance OS & Platforms Agents/Utilities Governance git Be sure your cloud management platform integrates with configuration management solutions such as Puppet and Chef to ensure configuration compliance to policy.
  • 6. Copyright © 2012 ServiceMesh, Inc. Proprietary and Confidential 6 Cloud Security Tip Number 4: Cloud-based VMs running firewall policies can easily be configured and enforced with a cloud management platform– both in private and public cloud environments.
  • 7. Copyright © 2012 ServiceMesh, Inc. Proprietary and Confidential 7 Cloud Security Tip Number 5: Cloud management platform policies can trigger security and vulnerability scans of VMs to ensure continuous security across cloud workloads.