SlideShare a Scribd company logo
SaaS Security Playbook
Securing data and applications in
the public cloud
Legal Notices
This presentation is for informational purposes only. INTEL MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS SUMMARY.
Intel, and the Intel logo are trademarks of Intel Corporation in the U.S. and/or other countries.
* Other names and brands may be claimed as the property of others.
Copyright © 2014, Intel Corporation. All rights reserved.
1
Social Mobile
Analytics Cloud
The
SMAC
Stack
SMAC is Changing the Way We Do
Business
3
The SMAC Stack Requires Agile
Security Capabilities
• Enable movement of diverse information to more places
• Variety and growth in devices, internet touch points, and access methods
• More custom mobile applications and services within the enterprise
• The need to adopt standard applications for SaaS in the public cloud
MobileSocial CloudAnalytics
The conversation is no longer about which applications and data will
move to the cloud, but rather which applications
and data will stay on premise.
4
Public Cloud Requires a Playbook
Legal
Security
SMEs
Architects
Privacy
Investigations
E-Discovery
External
Pen Tester
Risk
Manager
Playbook
Architects
Security
Engineers
Product
Owners
Legal 
Privacy
Enterprise Provider
Tenant
Business
Requirements
Use Cases
Information
Classification
Risk Review
5
Steps to Develop a SaaS Security
Playbook
Educate
your team
on SaaS
Know your
data and
inventory
Understand
how to
calculate &
mitigate risk
Define security
controls
responsibility
Perform
security
reviews
during
SaaS
lifecycle
1 2 3 54
6
Lessons Learned
7
• Just as enterprise applications and data are moving to SaaS,
security controls are also moving to SaaS.
• Decide which security controls will remain internally hosted
and managed vs. externally hosted and externally managed.
• Carefully evaluate SaaS providers as some controls are
immature and the ecosystem is evolving.
• Consider short-term contracts to allow flexibility to move to a
new supplier if capabilities or roadmaps no longer align to risk
tolerance.
8

More Related Content

PPSX
The security of SAAS and private cloud
PPTX
SaaS (Software-as-a-Service) as-a-secure-service
PPTX
Security concerns with SaaS layer of cloud computing
PPTX
Securing Software-as-a-Service: Cover your SaaS and protect enterprise data
PPTX
ZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORK
PPTX
Security as a Service Model for Cloud Environment
PDF
Security As A Service
PDF
Implementing zero trust architecture in azure hybrid cloud
The security of SAAS and private cloud
SaaS (Software-as-a-Service) as-a-secure-service
Security concerns with SaaS layer of cloud computing
Securing Software-as-a-Service: Cover your SaaS and protect enterprise data
ZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORK
Security as a Service Model for Cloud Environment
Security As A Service
Implementing zero trust architecture in azure hybrid cloud

What's hot (19)

PDF
Workshop: Threat Intelligence - Part 1
PPT
Security As A Service
PDF
Cloud Security Governance
PDF
SECURING THE CLOUD DATA LAKES
PPT
Securing Sensitive Data in Your Hybrid Cloud
PDF
IT Security As A Service
PDF
Zero Trust Enterprise Network at Adobe
PDF
MEKDA: Multi-Level ECC based Key Distribution and Authentication in Internet ...
PPTX
Zero trust deck 2020
PPTX
Security As A Service In Cloud(SECaaS)
PPTX
Vulnerabilities in SaaS layer of cloud computing
PPTX
Security As A Service
PPTX
The Top Cloud Security Issues
PDF
CSA Introduction 2013 David Ross
PPTX
Mark Lomas | Zero-Trust Trust No One, Trust Nothing
PDF
Mindtree distributed agile journey and guiding principles
PPTX
Rohan s w2 - top 5 tools that help in monitoring compliance for pci dss and...
PPTX
Zero Trust Networks
Workshop: Threat Intelligence - Part 1
Security As A Service
Cloud Security Governance
SECURING THE CLOUD DATA LAKES
Securing Sensitive Data in Your Hybrid Cloud
IT Security As A Service
Zero Trust Enterprise Network at Adobe
MEKDA: Multi-Level ECC based Key Distribution and Authentication in Internet ...
Zero trust deck 2020
Security As A Service In Cloud(SECaaS)
Vulnerabilities in SaaS layer of cloud computing
Security As A Service
The Top Cloud Security Issues
CSA Introduction 2013 David Ross
Mark Lomas | Zero-Trust Trust No One, Trust Nothing
Mindtree distributed agile journey and guiding principles
Rohan s w2 - top 5 tools that help in monitoring compliance for pci dss and...
Zero Trust Networks
Ad

Similar to Intel SaaS Security Playbook (20)

PPTX
Softchoice & Microsoft: Public Cloud Security Webinar
PPT
Cloud Security_Module2.ppt
PDF
Cloud security: Accelerating cloud adoption
PDF
Is the Cloud Safe? Ensuring Security in the Cloud
PPT
Lecture5
PDF
Security - A Digital Transformation Enabler
PPTX
Cloud Computing Presentation
PDF
Martin Vliem (Microsoft): Met vertrouwen naar de cloud
PPTX
Technologies You Need to Safely Use the Cloud
PPT
Lecture31.ppt
PPTX
#ALSummit: Accenture - Making the Move: Enabling Security in the Cloud
PDF
Whose Cloud is It Anyway - Data Security in the Cloud
PPTX
The Cloud and You - the ’as a service’ disruption you can’t ignore
PPTX
Active state private paas is not an oxymoron final
PPTX
What affects security program confidence? - may2014 - bill burns
PPTX
Get Your Head in the Cloud: A Practical Model for Enterprise Cloud Security
PDF
Azure 101: Shared responsibility in the Azure Cloud
PPTX
Security Architecture Best Practices for SaaS Applications
PPT
Cloud Computing Security Needs & Problems Alon Refaeli
PDF
Cloud Security, Standards and Applications
Softchoice & Microsoft: Public Cloud Security Webinar
Cloud Security_Module2.ppt
Cloud security: Accelerating cloud adoption
Is the Cloud Safe? Ensuring Security in the Cloud
Lecture5
Security - A Digital Transformation Enabler
Cloud Computing Presentation
Martin Vliem (Microsoft): Met vertrouwen naar de cloud
Technologies You Need to Safely Use the Cloud
Lecture31.ppt
#ALSummit: Accenture - Making the Move: Enabling Security in the Cloud
Whose Cloud is It Anyway - Data Security in the Cloud
The Cloud and You - the ’as a service’ disruption you can’t ignore
Active state private paas is not an oxymoron final
What affects security program confidence? - may2014 - bill burns
Get Your Head in the Cloud: A Practical Model for Enterprise Cloud Security
Azure 101: Shared responsibility in the Azure Cloud
Security Architecture Best Practices for SaaS Applications
Cloud Computing Security Needs & Problems Alon Refaeli
Cloud Security, Standards and Applications
Ad

More from Intel IT Center (20)

PDF
AI Crash Course- Supercomputing
PPTX
FPGA Inference - DellEMC SURFsara
PDF
High Memory Bandwidth Demo @ One Intel Station
PDF
INFOGRAPHIC: Advantages of Intel vs. IBM Power on SAP HANA solutions
PDF
Disrupt Hackers With Robust User Authentication
PDF
Strengthen Your Enterprise Arsenal Against Cyber Attacks With Hardware-Enhanc...
PDF
Harness Digital Disruption to Create 2022’s Workplace Today
PPTX
Don't Rely on Software Alone. Protect Endpoints with Hardware-Enhanced Security.
PDF
Achieve Unconstrained Collaboration in a Digital World
PDF
Intel® Xeon® Scalable Processors Enabled Applications Marketing Guide
PDF
#NABshow: National Association of Broadcasters 2017 Super Session Presentatio...
PPTX
Identity Protection for the Digital Age
PDF
Three Steps to Making a Digital Workplace a Reality
PDF
Three Steps to Making The Digital Workplace a Reality - by Intel’s Chad Const...
PDF
Intel® Xeon® Processor E7-8800/4800 v4 EAMG 2.0
PDF
Intel® Xeon® Processor E5-2600 v4 Enterprise Database Applications Showcase
PDF
Intel® Xeon® Processor E5-2600 v4 Core Business Applications Showcase
PDF
Intel® Xeon® Processor E5-2600 v4 Financial Security Applications Showcase
PDF
Intel® Xeon® Processor E5-2600 v4 Telco Cloud Digital Applications Showcase
PDF
Intel® Xeon® Processor E5-2600 v4 Tech Computing Applications Showcase
AI Crash Course- Supercomputing
FPGA Inference - DellEMC SURFsara
High Memory Bandwidth Demo @ One Intel Station
INFOGRAPHIC: Advantages of Intel vs. IBM Power on SAP HANA solutions
Disrupt Hackers With Robust User Authentication
Strengthen Your Enterprise Arsenal Against Cyber Attacks With Hardware-Enhanc...
Harness Digital Disruption to Create 2022’s Workplace Today
Don't Rely on Software Alone. Protect Endpoints with Hardware-Enhanced Security.
Achieve Unconstrained Collaboration in a Digital World
Intel® Xeon® Scalable Processors Enabled Applications Marketing Guide
#NABshow: National Association of Broadcasters 2017 Super Session Presentatio...
Identity Protection for the Digital Age
Three Steps to Making a Digital Workplace a Reality
Three Steps to Making The Digital Workplace a Reality - by Intel’s Chad Const...
Intel® Xeon® Processor E7-8800/4800 v4 EAMG 2.0
Intel® Xeon® Processor E5-2600 v4 Enterprise Database Applications Showcase
Intel® Xeon® Processor E5-2600 v4 Core Business Applications Showcase
Intel® Xeon® Processor E5-2600 v4 Financial Security Applications Showcase
Intel® Xeon® Processor E5-2600 v4 Telco Cloud Digital Applications Showcase
Intel® Xeon® Processor E5-2600 v4 Tech Computing Applications Showcase

Recently uploaded (20)

PDF
“Getting Started with Data Analytics Using R – Concepts, Tools & Case Studies”
PDF
Galatica Smart Energy Infrastructure Startup Pitch Deck
PPTX
05. PRACTICAL GUIDE TO MICROSOFT EXCEL.pptx
PPTX
Introduction to Firewall Analytics - Interfirewall and Transfirewall.pptx
PPTX
Computer network topology notes for revision
PPTX
The THESIS FINAL-DEFENSE-PRESENTATION.pptx
PPTX
advance b rammar.pptxfdgdfgdfsgdfgsdgfdfgdfgsdfgdfgdfg
PPTX
ALIMENTARY AND BILIARY CONDITIONS 3-1.pptx
PPTX
climate analysis of Dhaka ,Banglades.pptx
PPTX
oil_refinery_comprehensive_20250804084928 (1).pptx
PPTX
Bharatiya Antariksh Hackathon 2025 Idea Submission PPT.pptx
PPTX
Database Infoormation System (DBIS).pptx
PDF
Clinical guidelines as a resource for EBP(1).pdf
PDF
BF and FI - Blockchain, fintech and Financial Innovation Lesson 2.pdf
PPTX
Global journeys: estimating international migration
PPTX
Acceptance and paychological effects of mandatory extra coach I classes.pptx
PPTX
Supervised vs unsupervised machine learning algorithms
PDF
TRAFFIC-MANAGEMENT-AND-ACCIDENT-INVESTIGATION-WITH-DRIVING-PDF-FILE.pdf
PDF
22.Patil - Early prediction of Alzheimer’s disease using convolutional neural...
PPTX
CEE 2 REPORT G7.pptxbdbshjdgsgjgsjfiuhsd
“Getting Started with Data Analytics Using R – Concepts, Tools & Case Studies”
Galatica Smart Energy Infrastructure Startup Pitch Deck
05. PRACTICAL GUIDE TO MICROSOFT EXCEL.pptx
Introduction to Firewall Analytics - Interfirewall and Transfirewall.pptx
Computer network topology notes for revision
The THESIS FINAL-DEFENSE-PRESENTATION.pptx
advance b rammar.pptxfdgdfgdfsgdfgsdgfdfgdfgsdfgdfgdfg
ALIMENTARY AND BILIARY CONDITIONS 3-1.pptx
climate analysis of Dhaka ,Banglades.pptx
oil_refinery_comprehensive_20250804084928 (1).pptx
Bharatiya Antariksh Hackathon 2025 Idea Submission PPT.pptx
Database Infoormation System (DBIS).pptx
Clinical guidelines as a resource for EBP(1).pdf
BF and FI - Blockchain, fintech and Financial Innovation Lesson 2.pdf
Global journeys: estimating international migration
Acceptance and paychological effects of mandatory extra coach I classes.pptx
Supervised vs unsupervised machine learning algorithms
TRAFFIC-MANAGEMENT-AND-ACCIDENT-INVESTIGATION-WITH-DRIVING-PDF-FILE.pdf
22.Patil - Early prediction of Alzheimer’s disease using convolutional neural...
CEE 2 REPORT G7.pptxbdbshjdgsgjgsjfiuhsd

Intel SaaS Security Playbook

  • 1. SaaS Security Playbook Securing data and applications in the public cloud
  • 2. Legal Notices This presentation is for informational purposes only. INTEL MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS SUMMARY. Intel, and the Intel logo are trademarks of Intel Corporation in the U.S. and/or other countries. * Other names and brands may be claimed as the property of others. Copyright © 2014, Intel Corporation. All rights reserved. 1
  • 3. Social Mobile Analytics Cloud The SMAC Stack SMAC is Changing the Way We Do Business 3
  • 4. The SMAC Stack Requires Agile Security Capabilities • Enable movement of diverse information to more places • Variety and growth in devices, internet touch points, and access methods • More custom mobile applications and services within the enterprise • The need to adopt standard applications for SaaS in the public cloud MobileSocial CloudAnalytics The conversation is no longer about which applications and data will move to the cloud, but rather which applications and data will stay on premise. 4
  • 5. Public Cloud Requires a Playbook Legal Security SMEs Architects Privacy Investigations E-Discovery External Pen Tester Risk Manager Playbook Architects Security Engineers Product Owners Legal Privacy Enterprise Provider Tenant Business Requirements Use Cases Information Classification Risk Review 5
  • 6. Steps to Develop a SaaS Security Playbook Educate your team on SaaS Know your data and inventory Understand how to calculate & mitigate risk Define security controls responsibility Perform security reviews during SaaS lifecycle 1 2 3 54 6
  • 7. Lessons Learned 7 • Just as enterprise applications and data are moving to SaaS, security controls are also moving to SaaS. • Decide which security controls will remain internally hosted and managed vs. externally hosted and externally managed. • Carefully evaluate SaaS providers as some controls are immature and the ecosystem is evolving. • Consider short-term contracts to allow flexibility to move to a new supplier if capabilities or roadmaps no longer align to risk tolerance.
  • 8. 8

Editor's Notes