SlideShare a Scribd company logo
1Copyright © 2016 Capgemini and Sogeti – Internal use only. All Rights Reserved.
Security: Enabling the
Journey to the Cloud
Andy Powell
VP UK Cybersecurity - Capgemini
Doug Davidson
UK CTO for Cybersecurity- Capgemini
2Copyright © 2016 Capgemini and Sogeti. All Rights Reserved.
Securing the Journey to the Cloud | #CWIN16 Sept 2016
Agenda
 Cloud Security Overview
 Cloud Security Challenges
 Cloud Security Transformation
 Lessons and takeaways
 Q&A
3Copyright © 2016 Capgemini and Sogeti. All Rights Reserved.
Securing the Journey to the Cloud | #CWIN16 Sept 2016
Countering the Threat – ‘a truly Medieval Approach’
…with Cloud Services, where’s the perimeter now?
Once we knew where the Enterprise boundary was...
4Copyright © 2016 Capgemini and Sogeti. All Rights Reserved.
Securing the Journey to the Cloud | #CWIN16 Sept 2016
Adopting cloud requires an organization to rethink security to effectively safeguard assets and data
 Leasing computing power in the cloud, sharing the
security responsibility with CSPs
 Utilising an ecosystem of cloud security solution
providers
 No customization of solutions, shift to informed
selection upfront
 Control moved to the business users (end-point
devices) and partners (servers)
 Identity and Access Management in the Cloud
(IDaaS) as key control and business enabler for
organisations
 Focus on Shared Responsibility and holistic risk
management to prioritise mitigation actions
 Cloud aligned policies and procedures aligned with
the shared responsibility model
Traditional Enterprise IT Cloud
 Building and maintaining IT and Security
capabilities in-house
 Working with a selective group IT and Security
suppliers
 In house developed systems or far reaching
customisation of commercial packages
 IT having direct control on all assets, data and
devices
 Identity and Access Management as one of the
control elements in the Security Managers toolkit
 Focus on vulnerability and patch management
from a product perspective
 Policies and procedures tailored to an in-house IT
landscape
Hybridised Enterprise/Cloud services will be here for some time to come..
5Copyright © 2016 Capgemini and Sogeti. All Rights Reserved.
Securing the Journey to the Cloud | #CWIN16 Sept 2016
CloudSupplierManages
CustomerManages
Applications
Data
Virtualization
Runtime
Middleware
O/S
Servers
Storage
Networking
Applications
Data
Virtualization
Runtime
Middleware
O/S
Servers
Storage
Networking
Applications
Data
Virtualization
Runtime
Middleware
O/S
Servers
Storage
Networking
Applications
Data
Virtualization
Runtime
Middleware
O/S
Servers
Storage
Networking
On-Premises
Infrastructure
(as a Service)
Platform
(as a Service)
Software
(as a Service)
Information and Data Protection
Identity & Access Management
Governance Risk & Compliance
Information and Data Protection
Identity & Access Management
Governance Risk & Compliance
Information and Data Protection
Identity & Access Management
Governance Risk & Compliance
Information and Data Protection
Identity & Access Management
Governance Risk & Compliance
CloudSupplierManages
CloudSupplierManages
CustomerManages
CustomerManages
CustomerManages
Shared Responsibility – The New Paradigm
Governance, Risk and Compliance, Identity & Access Management and Information & Data Protection will always be
the responsibility of the data owner
6Copyright © 2016 Capgemini and Sogeti. All Rights Reserved.
Securing the Journey to the Cloud | #CWIN16 Sept 2016
With Cloud Services, Identity is literally the Key…
Identity Management is always the responsibility of the data
owner. This is never shared or outsourced
An IDAM Strategy must be in place to reduce potential Cloud
Identity security issues
Enterprise Identity management reviews and remediation
should be undertaken prior to adopting Cloud Services
Federation or replication of existing Enterprise Identity’s into
the Cloud can introduce a significant risk
Many organisations already have extensive issues within their
existing Enterprise Identity Management systems
7Copyright © 2016 Capgemini and Sogeti. All Rights Reserved.
Securing the Journey to the Cloud | #CWIN16 Sept 2016
Data and Information Protection
Data assets and Information Protection are always the
responsibility of the data owner. This is never shared or
outsourced
Robust automated Security tools and controls must be used
to control, monitor and alert over data access, usage, release
and destruction
Staff Education and Awareness and ongoing guidance is
critical to support new ways of secure working
The organisations data types, use cases and security risk
management approaches must be published in an agreed Data
Handling Model (DHM).
Organisations must create a Cloud Security Strategy and align
their existing IT Security Strategy to this
Data
Sensitivity
Create Store
Use
ShareArchive
Destroy
Assure information assets
throughout the data Lifecycle
8Copyright © 2016 Capgemini and Sogeti. All Rights Reserved.
Securing the Journey to the Cloud | #CWIN16 Sept 2016
Currently this is a Layered Cake approach...
• Still an emergent area in Cloud Services
• Demonstrating Cloud Service Provider compliance is still a
challenge for regulated industries
• SOC, SIEM, GRC Integration is challenging
• Poor Platform integration (generic API’s etc)
• Cloud Service Provider Logs and reports
• Generally individually tailored
Governance, Risk & Compliance
Governance Risk and Compliance is always the
responsibility of the data owner. This is never shared or
outsourced.
Additional security controls and services may be required to
demonstrate assurance over and above that supplied by the
Cloud Service Provider
9Copyright © 2016 Capgemini and Sogeti. All Rights Reserved.
Securing the Journey to the Cloud | #CWIN16 Sept 2016
Enforcing Security across the Enterprise and Cloud
Design security in from the outset:
• AD remediation prior to Migration/Federation
• Network design and connectivity
• Secure Apps design and Testing
• Managed Platform and Tennant Configurations
• Virtual Firewalls, Micro-Segmentation, IRM, DLP, etc
• No Loss Encryption, HSM’s, Tokenisation, etc
• Cloud Access Security Brokers (CASB)
• API monitoring, regulation and control
• Shadow IT & Cloud Discovery
Enterprises have Gateway security Services … Cloud based
services don’t..
Automated Security tools and controls must be used to
protect, control and alert on data usage
Business Use Cases - design supportive security around
current and projected business needs
Cloud Access Security
Broker
Cloud Apps
Protected
Cloud traffic
Cloud traffic logs
Cloud
Discovery
App
connectors
Your organization from any location
Firewalls
Proxies
API
10Copyright © 2016 Capgemini and Sogeti. All Rights Reserved.
Securing the Journey to the Cloud | #CWIN16 Sept 2016
Cloud Security Transformation
11Copyright © 2016 Capgemini and Sogeti. All Rights Reserved.
Securing the Journey to the Cloud | #CWIN16 Sept 2016
Cloud Security Transformation Lifecycle
ProcurePrepare
Operate & Monitor
Transform &
Recycle
Implement
& Orchestrate
CCSRMCSRM
• Oversight and Management
• Service Management
• Supplier Management
• High Level Architecture
• Low Level Architecture
• Technical Implementation
• Testing & Integration
• Contract Review
• Technology Gap
Analysis
• SLA negotiation
• Scaling Plan
• Cloud Security
Reference Model
• Security Strategy
• Risk Assessment
• Control Framework
• Technology Roadmap
•Whitespot Analysis
•Framing & Vendor
Selection
•Value Prototype
Cloud Security Transformation to the Cloud is the same for every company but with different starting points
and ambition levels
12Copyright © 2016 Capgemini and Sogeti. All Rights Reserved.
Securing the Journey to the Cloud | #CWIN16 Sept 2016
The Cloud Security Reference Model (CSRM)
Our CSRM identifies 14 key information security control domains that are
Essential to ensuring that cloud services are consumed and managed in a secure manner.
Governance Risk & Compliance
Company Security
BaselineCloud Service Provider Security
Baseline
Cloud Security Baseline
Responsive
Security
Management
Secure Application
Development
Identity & Access Management
Threat & Vulnerability Management
Information & Data Protection
Security Monitoring Services
Cloud Supplier Management
Change
Management
Secure
Development
Security Testing
IR & Crisis
Management
Disaster Recovery &
BCM
Legal & Electronic
Discovery
Training & Awareness
13Copyright © 2016 Capgemini and Sogeti. All Rights Reserved.
Securing the Journey to the Cloud | #CWIN16 Sept 2016
Prepare
Define Customer
Security Baseline
Define CSP
Security Baseline
Define new Cloud
Security Baseline
for the service(s)
 Review:
 Security strategy
 Information Protection
requirements
 Current compliance regime
 Create:
 Revised Cloud Security
Strategy
 Data classification and asset
inventory
 High Level Target
Architecture
 Risk Register and align
Control frameworks
 Security Capabilities
Catalogue
 Review:
 CSP Platform Infrastructure security
 Physical and environmental security
 Security incident procedures & plans :
Contingency planning and disaster
recovery policies and procedures, etc
 Security of data storage, transmission,
residency and audit controls
 Gap Assessment
 CSP v’s Customer Baseline
 Create New:
 Security Reference Model
 Cloud Security Strategy
 Risk Assessment model
 Control Framework
 Data Handling Model
 Cloud Security Target
Operating Model
 Technology Roadmap
14
Securing the Journey to the Cloud | 2016
Copyright © 2016 Capgemini and Sogeti. All Rights Reserved
Procure
Depth of analysis and alignment to enable Leadership decisions
White Spot Analysis IT
driven research
 Identifies and evaluates
leading security solutions
 Long-list to shortlist
 Output: IT target
application
recommendation.
Framing
 Vendor driven functional
demonstrations
 Engages business
stakeholders to assess
solution fit
 Develops initial view of roll
out options & value
 3 short-listed solutions
 Output: Aligned business
and IT recommendation
Value Prototyping
 Business driven validation
 Based on Business, IT and
program proof points
 Involves a working prototype
showcasing real customer
scenarios and data
 Confirms program strategy
and business case
 1 solution
 Output: Aligned business and
IT decision with Executive
sign off
15
Securing the Journey to the Cloud | 2016
Copyright © 2016 Capgemini and Sogeti. All Rights Reserved
Implement & Orchestrate
 Identify Shadow IT cloud services
 Evaluate and select cloud services that meet security and
compliance requirements using a registry of cloud services and
their security controls
 Protect enterprise data in the cloud by preventing certain types
of sensitive data from being uploaded, and encrypting and
tokenizing data
 Identify threats, malware, viruses and potential misuse of cloud
services
 Enforce and monitor Enterprise GRC policies and practices in
cloud services
 Enforce differing levels of data access, Apps utilisation and cloud
service functionality based on the user, the user’s device,
location, and operating system
Enterprise
SaaS
IaaSManaged
Security
Provider (MSP)
Ensuring
visibility
Data Security
Regulatory & policy
compliance
Threat
protection
16
Securing the Journey to the Cloud | 2016
Copyright © 2016 Capgemini and Sogeti. All Rights Reserved
Operate & Monitor
 A centralised view of all cloud services is best practice, providing a
single pane of glass to manage and monitor service delivery against
business need and defined security requirements
 Visibility is key to deal with evolving threats and maintaining control
 Enterprise wide security must be kept, irrespective of Cloud provider,
service or application
 The security operation and monitoring aspects must also be flexible
enough to adapt in an agile and extensible way to support business
need.
 e.g. use of pre-defined “templated” cloud security controls that
can be implemented at short notice to respond to recognised or
potential business use-cases
Operating in the Cloud brings the need to control and monitor
the various Cloud service providers and applications:
17
Securing the Journey to the Cloud | 2016
Copyright © 2016 Capgemini and Sogeti. All Rights Reserved
Transform & Recycle
 Sun setting of end-of-life applications which are unsecure or no
longer meet the business needs
 Sun setting of security applications or services which do not meet
security objectives or do not deliver sufficient protection
 Identification of next generation solutions which will improve cloud
security
 Update and reuse of effective standards and practices
 Compliance with legal data retention requirements – both in current
and successor cloud offerings
 Secure migration of services to new cloud offerings
 Secure migration/deletion/archiving of data retained in existing or
legacy cloud services
 Update, reuse and integration of effective supporting security
services (e.g. CASB)
Transformation and migration to new applications and platforms
requires:
18
Securing the Journey to the Cloud | 2016
Copyright © 2016 Capgemini and Sogeti. All Rights Reserved
Lessons Learned
Understand the changed risks landscape1
Rethink your existing Security Strategy to address this
and shared responsibility model with the Cloud Security
Provider (CSP)
2
Align disparate security initiatives under one uniform
Information Security Strategy3
Align the revised Information Security Strategy with the
overall Cloud Strategy of the organization4
Build the Cloud Security Target Operating Model5
Plan for change with a Cloud Security Transformation
Roadmap6
Procure and implement appropriate technical controls7
Monitor, Manage, Revise and maintain…8
19
Securing the Journey to the Cloud | 2016
Copyright © 2016 Capgemini and Sogeti. All Rights Reserved
Cloud Services Security is Possible!
Any
Questions?
20Copyright © 2016 Capgemini and Sogeti. All Rights Reserved.
Securing the Journey to the Cloud | #CWIN16 Sept 2016
Contact information
Andy
Powell
Head of Cybersecurity BD/Sales UK
andy.powell@capgemini.com
Doug
Davidson
Head of Cloud Security Offers
& UK Cyber Security CTO
doug.davidson@capgemini.com
Partnership House
Hollingswood road
Central park
Telford
TF29TZ
Insert contact
picture
Insert contact
picture

More Related Content

PDF
The (R)evolution of Predictive Operations & Maintenance
PPTX
CWIN17 san francisco-geert vanderlinden-don't be stranded without a (gdpr) plan
PPTX
Top Ten Trends in Insurance 2017
PDF
Banking Trends for 2016
PDF
Breaking Bad Data: The Journey to Data-fuelled Digital Transformation
PPTX
Top-10 Trends in Property & Casualty Insurance: 2018
PPTX
Applied Innovation for the Unorganization
PPTX
Digital Transformation Trends in Insurance
The (R)evolution of Predictive Operations & Maintenance
CWIN17 san francisco-geert vanderlinden-don't be stranded without a (gdpr) plan
Top Ten Trends in Insurance 2017
Banking Trends for 2016
Breaking Bad Data: The Journey to Data-fuelled Digital Transformation
Top-10 Trends in Property & Casualty Insurance: 2018
Applied Innovation for the Unorganization
Digital Transformation Trends in Insurance

What's hot (20)

PPTX
Data Center of the Future: Designing a modernized, high performance computing...
PPTX
A new era for the chemicals industry: Cloud computing changes the game
PPTX
Machine Learning in Banking
PDF
Failing and Failing Fast in AppDev – How Do We Keep up in AppSec?
PDF
Fabrizio Biscotti Gartner - SMAU Milano 2017
PPTX
Intelligent Enterprise Unleashed
PDF
CWIN17 san francisco-blockchain three ways to prevent it from failing in the ...
PPTX
Top Ten Trends in Capital Markets 2017
PDF
Overcoming Operational & Financial Barriers to Cloud
PPTX
ICGEB adopts UNiversePath on Microsoft Azure
PPTX
Accenture Security CG&S Cyber Resilience
PPTX
The New Energy Consumer: What Promises Do Blockchain Technologies Offer Energ...
PDF
Back Office Transformation | Accenture
PDF
Capgemini & EMC Transform Brazilian Businesses with Next-Generation Cloud Sol...
PDF
Double the profits through digital transformation - digital insurance in Africa
PDF
The Currency of Trust: Why Banks and Insurers Must Make Customer Data Safer a...
PDF
Pensions on the Blockchain
PDF
The Digital Shift in Financial Services
PDF
Big Data: Real-life Examples of Business Value Generation
PDF
Redefining Public Sector Finance in a Digital World
Data Center of the Future: Designing a modernized, high performance computing...
A new era for the chemicals industry: Cloud computing changes the game
Machine Learning in Banking
Failing and Failing Fast in AppDev – How Do We Keep up in AppSec?
Fabrizio Biscotti Gartner - SMAU Milano 2017
Intelligent Enterprise Unleashed
CWIN17 san francisco-blockchain three ways to prevent it from failing in the ...
Top Ten Trends in Capital Markets 2017
Overcoming Operational & Financial Barriers to Cloud
ICGEB adopts UNiversePath on Microsoft Azure
Accenture Security CG&S Cyber Resilience
The New Energy Consumer: What Promises Do Blockchain Technologies Offer Energ...
Back Office Transformation | Accenture
Capgemini & EMC Transform Brazilian Businesses with Next-Generation Cloud Sol...
Double the profits through digital transformation - digital insurance in Africa
The Currency of Trust: Why Banks and Insurers Must Make Customer Data Safer a...
Pensions on the Blockchain
The Digital Shift in Financial Services
Big Data: Real-life Examples of Business Value Generation
Redefining Public Sector Finance in a Digital World
Ad

Viewers also liked (20)

PPTX
Top Ten Trends in Wealth Management 2017
PPTX
UKOUG Journey To The Cloud - March 2017
PDF
Lessons Learned from an early Multi-Cloud journey
PPTX
Journey to the cloud
PPTX
Data Centre Evolution: Securing Your Journey to the Cloud
PDF
soCloud: distributed multi-cloud platform for deploying, executing and managi...
PDF
Adopting Agile Testing
PDF
Agile - Transforming Small Team Thinking Into Big Business Results
PPT
Standing on the clouds
PDF
Cloud,beyond the hype, looking at the journey to Cloud
PDF
Philip Hung Cao - Cloud security, the journey has begun
PDF
Security & Privacy in Cloud Computing
PDF
Privacy and security in the cloud Challenges and solutions for our future inf...
PPT
Software Association of Oregon Cloud Computing Presentation
PPTX
The Journey to Becoming Cloud Native – A Three Step Path to Modernizing Appli...
PDF
Journey to the Cloud, Hype or Opportunity
PDF
Dimension Data – Enabling the Journey to the Cloud: Real Examples
PPT
Physical Security Domain
PDF
Chela stress test
Top Ten Trends in Wealth Management 2017
UKOUG Journey To The Cloud - March 2017
Lessons Learned from an early Multi-Cloud journey
Journey to the cloud
Data Centre Evolution: Securing Your Journey to the Cloud
soCloud: distributed multi-cloud platform for deploying, executing and managi...
Adopting Agile Testing
Agile - Transforming Small Team Thinking Into Big Business Results
Standing on the clouds
Cloud,beyond the hype, looking at the journey to Cloud
Philip Hung Cao - Cloud security, the journey has begun
Security & Privacy in Cloud Computing
Privacy and security in the cloud Challenges and solutions for our future inf...
Software Association of Oregon Cloud Computing Presentation
The Journey to Becoming Cloud Native – A Three Step Path to Modernizing Appli...
Journey to the Cloud, Hype or Opportunity
Dimension Data – Enabling the Journey to the Cloud: Real Examples
Physical Security Domain
Chela stress test
Ad

Similar to Security: Enabling the Journey to the Cloud (20)

PDF
Keys to success and security in the cloud
PDF
Keys-to-Success-and-Security-in-the-Cloud
PPTX
2014 2nd me cloud conference trust in the cloud v01
PDF
Itmgen 4317 security
PPTX
What is the significance of cybersecurity in cloud.pptx
PPTX
ShareResponsibilityModel.pptx
PPTX
CSA Atlanta Q1'2016 Chapter Meeting
PPTX
What is the significance of cybersecurity in cloud.pptx
PPTX
Top Trends in Cloud Computing for 2023.pptx
PPTX
Larry Whiteside - Optiv Cloud ready or steam rolled csa version
PPTX
Evolution security controls towards Cloud Services
PDF
EveryCloud_Company_Intro_Piece
PDF
EveryCloud_Company_Intro_Piece
PDF
Zero trust strategy: cloud security by design
PDF
Cloud Security, Standards and Applications
PPTX
Cloud Security By Dr. Anton Ravindran
PDF
Symantec Best Practices for Cloud Security: Insights from the Front Lines
PPTX
Accelerated Saa S Exec Briefing V2
PDF
Cloud Security - Types, Common Threats & Tips To Mitigate.pdf
PPTX
Csa summit argentina-reavis
Keys to success and security in the cloud
Keys-to-Success-and-Security-in-the-Cloud
2014 2nd me cloud conference trust in the cloud v01
Itmgen 4317 security
What is the significance of cybersecurity in cloud.pptx
ShareResponsibilityModel.pptx
CSA Atlanta Q1'2016 Chapter Meeting
What is the significance of cybersecurity in cloud.pptx
Top Trends in Cloud Computing for 2023.pptx
Larry Whiteside - Optiv Cloud ready or steam rolled csa version
Evolution security controls towards Cloud Services
EveryCloud_Company_Intro_Piece
EveryCloud_Company_Intro_Piece
Zero trust strategy: cloud security by design
Cloud Security, Standards and Applications
Cloud Security By Dr. Anton Ravindran
Symantec Best Practices for Cloud Security: Insights from the Front Lines
Accelerated Saa S Exec Briefing V2
Cloud Security - Types, Common Threats & Tips To Mitigate.pdf
Csa summit argentina-reavis

More from Capgemini (20)

PPTX
Top Healthcare Trends 2022
PPTX
Top P&C Insurance Trends 2022
PPTX
Commercial Banking Trends book 2022
PPTX
Top Trends in Payments 2022
PPTX
Top Trends in Wealth Management 2022
PPTX
Retail Banking Trends book 2022
PPTX
Top Life Insurance Trends 2022
PPTX
キャップジェミニ、あなたの『RISE WITH SAP』のパートナーです
PPTX
Property & Casualty Insurance Top Trends 2021
PPTX
Life Insurance Top Trends 2021
PPTX
Top Trends in Commercial Banking: 2021
PPTX
Top Trends in Wealth Management: 2021
PPTX
Top Trends in Payments: 2021
PPTX
Health Insurance Top Trends 2021
PPTX
Top Trends in Retail Banking: 2021
PDF
Capgemini’s Connected Autonomous Planning
PPTX
Top Trends in Retail Banking: 2020
PPTX
Top Trends in Life Insurance: 2020
PPTX
Top Trends in Health Insurance: 2020
PPTX
Top Trends in Payments: 2020
Top Healthcare Trends 2022
Top P&C Insurance Trends 2022
Commercial Banking Trends book 2022
Top Trends in Payments 2022
Top Trends in Wealth Management 2022
Retail Banking Trends book 2022
Top Life Insurance Trends 2022
キャップジェミニ、あなたの『RISE WITH SAP』のパートナーです
Property & Casualty Insurance Top Trends 2021
Life Insurance Top Trends 2021
Top Trends in Commercial Banking: 2021
Top Trends in Wealth Management: 2021
Top Trends in Payments: 2021
Health Insurance Top Trends 2021
Top Trends in Retail Banking: 2021
Capgemini’s Connected Autonomous Planning
Top Trends in Retail Banking: 2020
Top Trends in Life Insurance: 2020
Top Trends in Health Insurance: 2020
Top Trends in Payments: 2020

Recently uploaded (20)

PPTX
worship songs, in any order, compilation
PPTX
_ISO_Presentation_ISO 9001 and 45001.pptx
PPTX
Tour Presentation Educational Activity.pptx
PDF
Parts of Speech Prepositions Presentation in Colorful Cute Style_20250724_230...
PPTX
Effective_Handling_Information_Presentation.pptx
PPTX
Role and Responsibilities of Bangladesh Coast Guard Base, Mongla Challenges
PPTX
fundraisepro pitch deck elegant and modern
DOCX
"Project Management: Ultimate Guide to Tools, Techniques, and Strategies (2025)"
PDF
Nykaa-Strategy-Case-Fixing-Retention-UX-and-D2C-Engagement (1).pdf
PDF
Why Top Brands Trust Enuncia Global for Language Solutions.pdf
PPTX
Understanding-Communication-Berlos-S-M-C-R-Model.pptx
PPTX
Presentation for DGJV QMS (PQP)_12.03.2025.pptx
PPTX
Learning-Plan-5-Policies-and-Practices.pptx
PPTX
Introduction to Effective Communication.pptx
PPTX
Emphasizing It's Not The End 08 06 2025.pptx
PPTX
nose tajweed for the arabic alphabets for the responsive
PPTX
Hydrogel Based delivery Cancer Treatment
PPTX
Project and change Managment: short video sequences for IBA
PPTX
Non-Verbal-Communication .mh.pdf_110245_compressed.pptx
PPTX
Tablets And Capsule Preformulation Of Paracetamol
worship songs, in any order, compilation
_ISO_Presentation_ISO 9001 and 45001.pptx
Tour Presentation Educational Activity.pptx
Parts of Speech Prepositions Presentation in Colorful Cute Style_20250724_230...
Effective_Handling_Information_Presentation.pptx
Role and Responsibilities of Bangladesh Coast Guard Base, Mongla Challenges
fundraisepro pitch deck elegant and modern
"Project Management: Ultimate Guide to Tools, Techniques, and Strategies (2025)"
Nykaa-Strategy-Case-Fixing-Retention-UX-and-D2C-Engagement (1).pdf
Why Top Brands Trust Enuncia Global for Language Solutions.pdf
Understanding-Communication-Berlos-S-M-C-R-Model.pptx
Presentation for DGJV QMS (PQP)_12.03.2025.pptx
Learning-Plan-5-Policies-and-Practices.pptx
Introduction to Effective Communication.pptx
Emphasizing It's Not The End 08 06 2025.pptx
nose tajweed for the arabic alphabets for the responsive
Hydrogel Based delivery Cancer Treatment
Project and change Managment: short video sequences for IBA
Non-Verbal-Communication .mh.pdf_110245_compressed.pptx
Tablets And Capsule Preformulation Of Paracetamol

Security: Enabling the Journey to the Cloud

  • 1. 1Copyright © 2016 Capgemini and Sogeti – Internal use only. All Rights Reserved. Security: Enabling the Journey to the Cloud Andy Powell VP UK Cybersecurity - Capgemini Doug Davidson UK CTO for Cybersecurity- Capgemini
  • 2. 2Copyright © 2016 Capgemini and Sogeti. All Rights Reserved. Securing the Journey to the Cloud | #CWIN16 Sept 2016 Agenda  Cloud Security Overview  Cloud Security Challenges  Cloud Security Transformation  Lessons and takeaways  Q&A
  • 3. 3Copyright © 2016 Capgemini and Sogeti. All Rights Reserved. Securing the Journey to the Cloud | #CWIN16 Sept 2016 Countering the Threat – ‘a truly Medieval Approach’ …with Cloud Services, where’s the perimeter now? Once we knew where the Enterprise boundary was...
  • 4. 4Copyright © 2016 Capgemini and Sogeti. All Rights Reserved. Securing the Journey to the Cloud | #CWIN16 Sept 2016 Adopting cloud requires an organization to rethink security to effectively safeguard assets and data  Leasing computing power in the cloud, sharing the security responsibility with CSPs  Utilising an ecosystem of cloud security solution providers  No customization of solutions, shift to informed selection upfront  Control moved to the business users (end-point devices) and partners (servers)  Identity and Access Management in the Cloud (IDaaS) as key control and business enabler for organisations  Focus on Shared Responsibility and holistic risk management to prioritise mitigation actions  Cloud aligned policies and procedures aligned with the shared responsibility model Traditional Enterprise IT Cloud  Building and maintaining IT and Security capabilities in-house  Working with a selective group IT and Security suppliers  In house developed systems or far reaching customisation of commercial packages  IT having direct control on all assets, data and devices  Identity and Access Management as one of the control elements in the Security Managers toolkit  Focus on vulnerability and patch management from a product perspective  Policies and procedures tailored to an in-house IT landscape Hybridised Enterprise/Cloud services will be here for some time to come..
  • 5. 5Copyright © 2016 Capgemini and Sogeti. All Rights Reserved. Securing the Journey to the Cloud | #CWIN16 Sept 2016 CloudSupplierManages CustomerManages Applications Data Virtualization Runtime Middleware O/S Servers Storage Networking Applications Data Virtualization Runtime Middleware O/S Servers Storage Networking Applications Data Virtualization Runtime Middleware O/S Servers Storage Networking Applications Data Virtualization Runtime Middleware O/S Servers Storage Networking On-Premises Infrastructure (as a Service) Platform (as a Service) Software (as a Service) Information and Data Protection Identity & Access Management Governance Risk & Compliance Information and Data Protection Identity & Access Management Governance Risk & Compliance Information and Data Protection Identity & Access Management Governance Risk & Compliance Information and Data Protection Identity & Access Management Governance Risk & Compliance CloudSupplierManages CloudSupplierManages CustomerManages CustomerManages CustomerManages Shared Responsibility – The New Paradigm Governance, Risk and Compliance, Identity & Access Management and Information & Data Protection will always be the responsibility of the data owner
  • 6. 6Copyright © 2016 Capgemini and Sogeti. All Rights Reserved. Securing the Journey to the Cloud | #CWIN16 Sept 2016 With Cloud Services, Identity is literally the Key… Identity Management is always the responsibility of the data owner. This is never shared or outsourced An IDAM Strategy must be in place to reduce potential Cloud Identity security issues Enterprise Identity management reviews and remediation should be undertaken prior to adopting Cloud Services Federation or replication of existing Enterprise Identity’s into the Cloud can introduce a significant risk Many organisations already have extensive issues within their existing Enterprise Identity Management systems
  • 7. 7Copyright © 2016 Capgemini and Sogeti. All Rights Reserved. Securing the Journey to the Cloud | #CWIN16 Sept 2016 Data and Information Protection Data assets and Information Protection are always the responsibility of the data owner. This is never shared or outsourced Robust automated Security tools and controls must be used to control, monitor and alert over data access, usage, release and destruction Staff Education and Awareness and ongoing guidance is critical to support new ways of secure working The organisations data types, use cases and security risk management approaches must be published in an agreed Data Handling Model (DHM). Organisations must create a Cloud Security Strategy and align their existing IT Security Strategy to this Data Sensitivity Create Store Use ShareArchive Destroy Assure information assets throughout the data Lifecycle
  • 8. 8Copyright © 2016 Capgemini and Sogeti. All Rights Reserved. Securing the Journey to the Cloud | #CWIN16 Sept 2016 Currently this is a Layered Cake approach... • Still an emergent area in Cloud Services • Demonstrating Cloud Service Provider compliance is still a challenge for regulated industries • SOC, SIEM, GRC Integration is challenging • Poor Platform integration (generic API’s etc) • Cloud Service Provider Logs and reports • Generally individually tailored Governance, Risk & Compliance Governance Risk and Compliance is always the responsibility of the data owner. This is never shared or outsourced. Additional security controls and services may be required to demonstrate assurance over and above that supplied by the Cloud Service Provider
  • 9. 9Copyright © 2016 Capgemini and Sogeti. All Rights Reserved. Securing the Journey to the Cloud | #CWIN16 Sept 2016 Enforcing Security across the Enterprise and Cloud Design security in from the outset: • AD remediation prior to Migration/Federation • Network design and connectivity • Secure Apps design and Testing • Managed Platform and Tennant Configurations • Virtual Firewalls, Micro-Segmentation, IRM, DLP, etc • No Loss Encryption, HSM’s, Tokenisation, etc • Cloud Access Security Brokers (CASB) • API monitoring, regulation and control • Shadow IT & Cloud Discovery Enterprises have Gateway security Services … Cloud based services don’t.. Automated Security tools and controls must be used to protect, control and alert on data usage Business Use Cases - design supportive security around current and projected business needs Cloud Access Security Broker Cloud Apps Protected Cloud traffic Cloud traffic logs Cloud Discovery App connectors Your organization from any location Firewalls Proxies API
  • 10. 10Copyright © 2016 Capgemini and Sogeti. All Rights Reserved. Securing the Journey to the Cloud | #CWIN16 Sept 2016 Cloud Security Transformation
  • 11. 11Copyright © 2016 Capgemini and Sogeti. All Rights Reserved. Securing the Journey to the Cloud | #CWIN16 Sept 2016 Cloud Security Transformation Lifecycle ProcurePrepare Operate & Monitor Transform & Recycle Implement & Orchestrate CCSRMCSRM • Oversight and Management • Service Management • Supplier Management • High Level Architecture • Low Level Architecture • Technical Implementation • Testing & Integration • Contract Review • Technology Gap Analysis • SLA negotiation • Scaling Plan • Cloud Security Reference Model • Security Strategy • Risk Assessment • Control Framework • Technology Roadmap •Whitespot Analysis •Framing & Vendor Selection •Value Prototype Cloud Security Transformation to the Cloud is the same for every company but with different starting points and ambition levels
  • 12. 12Copyright © 2016 Capgemini and Sogeti. All Rights Reserved. Securing the Journey to the Cloud | #CWIN16 Sept 2016 The Cloud Security Reference Model (CSRM) Our CSRM identifies 14 key information security control domains that are Essential to ensuring that cloud services are consumed and managed in a secure manner. Governance Risk & Compliance Company Security BaselineCloud Service Provider Security Baseline Cloud Security Baseline Responsive Security Management Secure Application Development Identity & Access Management Threat & Vulnerability Management Information & Data Protection Security Monitoring Services Cloud Supplier Management Change Management Secure Development Security Testing IR & Crisis Management Disaster Recovery & BCM Legal & Electronic Discovery Training & Awareness
  • 13. 13Copyright © 2016 Capgemini and Sogeti. All Rights Reserved. Securing the Journey to the Cloud | #CWIN16 Sept 2016 Prepare Define Customer Security Baseline Define CSP Security Baseline Define new Cloud Security Baseline for the service(s)  Review:  Security strategy  Information Protection requirements  Current compliance regime  Create:  Revised Cloud Security Strategy  Data classification and asset inventory  High Level Target Architecture  Risk Register and align Control frameworks  Security Capabilities Catalogue  Review:  CSP Platform Infrastructure security  Physical and environmental security  Security incident procedures & plans : Contingency planning and disaster recovery policies and procedures, etc  Security of data storage, transmission, residency and audit controls  Gap Assessment  CSP v’s Customer Baseline  Create New:  Security Reference Model  Cloud Security Strategy  Risk Assessment model  Control Framework  Data Handling Model  Cloud Security Target Operating Model  Technology Roadmap
  • 14. 14 Securing the Journey to the Cloud | 2016 Copyright © 2016 Capgemini and Sogeti. All Rights Reserved Procure Depth of analysis and alignment to enable Leadership decisions White Spot Analysis IT driven research  Identifies and evaluates leading security solutions  Long-list to shortlist  Output: IT target application recommendation. Framing  Vendor driven functional demonstrations  Engages business stakeholders to assess solution fit  Develops initial view of roll out options & value  3 short-listed solutions  Output: Aligned business and IT recommendation Value Prototyping  Business driven validation  Based on Business, IT and program proof points  Involves a working prototype showcasing real customer scenarios and data  Confirms program strategy and business case  1 solution  Output: Aligned business and IT decision with Executive sign off
  • 15. 15 Securing the Journey to the Cloud | 2016 Copyright © 2016 Capgemini and Sogeti. All Rights Reserved Implement & Orchestrate  Identify Shadow IT cloud services  Evaluate and select cloud services that meet security and compliance requirements using a registry of cloud services and their security controls  Protect enterprise data in the cloud by preventing certain types of sensitive data from being uploaded, and encrypting and tokenizing data  Identify threats, malware, viruses and potential misuse of cloud services  Enforce and monitor Enterprise GRC policies and practices in cloud services  Enforce differing levels of data access, Apps utilisation and cloud service functionality based on the user, the user’s device, location, and operating system Enterprise SaaS IaaSManaged Security Provider (MSP) Ensuring visibility Data Security Regulatory & policy compliance Threat protection
  • 16. 16 Securing the Journey to the Cloud | 2016 Copyright © 2016 Capgemini and Sogeti. All Rights Reserved Operate & Monitor  A centralised view of all cloud services is best practice, providing a single pane of glass to manage and monitor service delivery against business need and defined security requirements  Visibility is key to deal with evolving threats and maintaining control  Enterprise wide security must be kept, irrespective of Cloud provider, service or application  The security operation and monitoring aspects must also be flexible enough to adapt in an agile and extensible way to support business need.  e.g. use of pre-defined “templated” cloud security controls that can be implemented at short notice to respond to recognised or potential business use-cases Operating in the Cloud brings the need to control and monitor the various Cloud service providers and applications:
  • 17. 17 Securing the Journey to the Cloud | 2016 Copyright © 2016 Capgemini and Sogeti. All Rights Reserved Transform & Recycle  Sun setting of end-of-life applications which are unsecure or no longer meet the business needs  Sun setting of security applications or services which do not meet security objectives or do not deliver sufficient protection  Identification of next generation solutions which will improve cloud security  Update and reuse of effective standards and practices  Compliance with legal data retention requirements – both in current and successor cloud offerings  Secure migration of services to new cloud offerings  Secure migration/deletion/archiving of data retained in existing or legacy cloud services  Update, reuse and integration of effective supporting security services (e.g. CASB) Transformation and migration to new applications and platforms requires:
  • 18. 18 Securing the Journey to the Cloud | 2016 Copyright © 2016 Capgemini and Sogeti. All Rights Reserved Lessons Learned Understand the changed risks landscape1 Rethink your existing Security Strategy to address this and shared responsibility model with the Cloud Security Provider (CSP) 2 Align disparate security initiatives under one uniform Information Security Strategy3 Align the revised Information Security Strategy with the overall Cloud Strategy of the organization4 Build the Cloud Security Target Operating Model5 Plan for change with a Cloud Security Transformation Roadmap6 Procure and implement appropriate technical controls7 Monitor, Manage, Revise and maintain…8
  • 19. 19 Securing the Journey to the Cloud | 2016 Copyright © 2016 Capgemini and Sogeti. All Rights Reserved Cloud Services Security is Possible! Any Questions?
  • 20. 20Copyright © 2016 Capgemini and Sogeti. All Rights Reserved. Securing the Journey to the Cloud | #CWIN16 Sept 2016 Contact information Andy Powell Head of Cybersecurity BD/Sales UK andy.powell@capgemini.com Doug Davidson Head of Cloud Security Offers & UK Cyber Security CTO doug.davidson@capgemini.com Partnership House Hollingswood road Central park Telford TF29TZ Insert contact picture Insert contact picture