SlideShare a Scribd company logo
Why the Cloud can be
Compliant and Secure

       Presented by:
         Jeff Reich
      Chief Risk Officer
    Layered Technologies
Agenda

        ● Abstract Review

        ● Layered Technologies Overview

        ● Speaker Overview

        ● What is a secure cloud?

        ● Table Stakes

        ● Compliance vs Security

        ● Components of Security
                                                                2

Layered Technologies                      Complying To The Higher Standard
Abstract

             This session addresses misconceptions about security in the
             cloud and examines critical differences between compliance
             and security, including how compliance does not always
             ensure secure environments. To establish a secure cloud,
             one must make risk-based decisions that embrace
             compliance but also address practicalities and technical
             capabilities. While achieving compliance is considered
             “table stakes,” cloud security is an investment and must be
             continuous. The audience will learn about key security
             components, such as social engineering, patching, system
             interfaces and more. The presentation will also address the
             importance of grouping similar organizations in the cloud
             because they share common security control needs.



Complying To The Higher Standard                                           .3
About	
  Layered	
  Tech	
  
                                                                         •  First	
  to	
  offer	
  full	
  PCI	
  support	
  in	
  market	
  	
  
                                                                            (since	
  2005)	
  
            Leadership	
                                                 •  Compliance	
  cloud	
  solu7on	
  with	
  built-­‐in	
  security	
  
            posi7on	
  in	
                                                 and	
  controls	
  
            compliant	
  hos7ng	
                                        •  Comprehensive	
  consul7ng	
  and	
  audit	
  services	
  
                                                                            (and	
  partners)	
  

            Market-­‐leading	
                                           •  One	
  of	
  first	
  virtual	
  private	
  data	
  center	
  offers	
  
            cloud/virtualiza7on	
                                        •  Robust	
  community	
  cloud	
  plaOorm	
  with	
  built-­‐in	
  
                                                                            security	
  and	
  controls	
  
            Tiered	
  managed	
                                          •  Monitoring	
  up	
  to	
  full	
  management	
  
            services	
  for	
  client	
                                  •  “LT	
  Anywhere”	
  extension	
  
            choice	
  
            High-­‐touch	
  and	
                                        •  Managed	
  service	
  team	
  specializa7on	
  
            process-­‐driven	
  client	
                                 •  Unified	
  system	
  support	
  for	
  problem	
  diagnos7cs	
  
            support	
                                                    •  Disciplined	
  change	
  and	
  log	
  management	
  


            Global	
  reach	
                                            •  3	
  primary	
  and	
  9	
  secondary	
  data	
  centers	
  	
  
        Only	
  service	
  provider	
  to	
  offer	
  	
  Compliance	
  Guaranteed:	
  	
  our	
  compliance	
  clients	
  are	
  guaranteed	
  	
  
       to	
  pass	
  	
  100	
  percent	
  of	
  every	
  IT	
  audit	
  or	
  assessment	
  sanc7oned	
  by	
  the	
  relevant	
  industry	
  or	
  regulatory	
  en7ty.	
  	
  
                                                                                                                                                                               4
Jeff Reich


            ●  Over 30 years in Cyber Security, Risk Management,
               Physical Security and other areas

            ●  Leadership roles in technology and financial services
               organizations

            ●  Founding member of Cloud Security Alliance

            ●  CRISC, CISSP, CHS-III certifications,…

            ●  ISSA Distinguished Fellow



Complying To The Higher Standard                                       .5
What is a Secure Cloud?


            ● First, let’s agree on what a cloud is…

            ● 5-4-3

                     ●  5 Essential Characteristics

                     ●  4 Deployment Models

                     ●  3 Service Models


Complying To The Higher Standard                       .6
Let’s Agree on the Cloud

            According to NIST:
                       Cloud computing is a model for enabling ubiquitous,
                       convenient, on-demand network access to a shared
                       pool of configurable computing resources (e.g.,
                       networks, servers, storage, applications, and
                       services) that can be rapidly provisioned and
                       released with minimal management effort or service
                       provider interaction. This cloud model is composed
                       of five essential characteristics, three service
                       models, and four deployment models.
                       Source:   The NIST Definition of Cloud Computing Authors: Peter Mell and Tim Grance
                                 Special Publication 800-145




                                                                                                                     7

Layered Technologies                                                                           Complying To The Higher Standard
5 Essential Characteristics


            ● On-demand self-service

            ● Broad network access

            ● Resource pooling

            ● Rapid elasticity

            ● Measured Service

                                                             8

Layered Technologies                   Complying To The Higher Standard
4 Deployment Models


            ● Private cloud

            ● Community cloud

            ● Public cloud

            ● Hybrid cloud
                                                      9

Layered Technologies            Complying To The Higher Standard
3 Service Models


            ● Cloud Software as a Service
              (SaaS)

            ● Cloud Platform as a Service (PaaS)

            ● Cloud Infrastructure as a Service
              (IaaS)
                                                                 10

Layered Technologies                        Complying To The Higher Standard
Table Stakes

          ●  Your compliance needs may include, but are not limited to:
                   ●  PCI-DSS

                   ●  HIPAA

                   ●  FISMA

                   ●  SOX

                   ●  GLB

                   ●  FedRAMP

                   ●  Industry Standards

                   ●  Corporate Policies

                   ●  and many, many more



Complying To The Higher Standard                                          . 11
Compliance vs Security




                                                 Your
                                   Compliant                 Secure
                                                 Best
                                   Practices               Practices
                                               Practices




Complying To The Higher Standard                                       . 12
Managing Costs Around Controls




                                   Potential                   Cost of
                                   Losses                      Controls
    $                                           Good
                                               Business
                                                Sense
                                                                          Tree of FUD




                                           Level of Controls

Complying To The Higher Standard                                                        . 13
Risk Management in the Cloud

            ●  First mistake of many cloud prospects
                       ●  How am I managing risks now?
                       ●  Risk picture may not improve

            ●  What are the most valuable information or process assets
               for your organization?
                       ●  Disclosure                 Confidentiality
                       ●  Modification               Integrity
                       ●  Denial of Access           Availability




                                                                                            14

Layered Technologies                                                   Complying To The Higher Standard
Components of Security


            ●  Trust

            ●  Verification

            ●  Policies, Standards, Guidelines and Procedures

            ●  Situational Awareness

            ●  Training

            ●  Testing

            ●  Lather, rinse, repeat,…




Complying To The Higher Standard                                . 15
Components of Cloud Security


            ●  Trust

            ●  Verification

            ●  Policies, Standards, Guidelines and Procedures

            ●  Situational Awareness

            ●  Training

            ●  Testing

            ●  Lather, rinse, repeat,…




Complying To The Higher Standard                                . 16
Components of Cloud Security


            Your provider should offer:
            ●  Policies

            ●  Validation

            ●  Transparency

            ●  Demonstration of compliance

            ●  Compliance support



            For more information, see www.cloudsecurityalliance.org


Complying To The Higher Standard                                      . 17
Finding a Cloud Environment


                               Private      Hybrid   Community     Public
      Greater Control




                        Iaas


                        PaaS


                        SaaS




                                         Greater Exposure
                                                                                      18

Layered Technologies                                             Complying To The Higher Standard
Contact Me


            ● Jeff Reich
            ● 972-379-8567
            ● jeff.reich@layeredtech.com
            ● Twitter: @jnreich
            ● Skype: jnreich
            ● www.layeredtech.com
                                                          19

Layered Technologies                 Complying To The Higher Standard

More Related Content

PPTX
Cloud Is Built, Now Who's Managing It?
PDF
Dataplex Company Overview
PDF
Transitioning to Next-Generation Firewall Management - 3 Ways to Accelerate t...
PDF
Cloud Security: Perception VS Reality
PDF
Virtualization And Cloud Impact Overview Auditor Spin Enterprise Gr Cv4
PDF
Gateway RIMS (Remote Infrastructure Management Services)
PPT
Cloudcomputingoct2009 100301142544-phpapp02
PPTX
Data Center Security Now and into the Future
Cloud Is Built, Now Who's Managing It?
Dataplex Company Overview
Transitioning to Next-Generation Firewall Management - 3 Ways to Accelerate t...
Cloud Security: Perception VS Reality
Virtualization And Cloud Impact Overview Auditor Spin Enterprise Gr Cv4
Gateway RIMS (Remote Infrastructure Management Services)
Cloudcomputingoct2009 100301142544-phpapp02
Data Center Security Now and into the Future

What's hot (20)

PDF
What You Need To Know About The New PCI Cloud Guidelines
PPTX
Business Intelligence In Cloud Computing A Tokenization Approach Final
PPTX
Cloud Computing security Challenges for Defense Forces
PPTX
Why We Fail: How an architect learned to stop worrying and love the cloud
PDF
Info Sec 2010 Possibilities And Security Challenges Of Cloud Computing (Han...
PDF
NSX on VMware Data Center
PDF
Cloud Security: Perception Vs. Reality
PDF
PCI Compliance and Cloud Reference Architecture
PPTX
Migrating To Cloud & Security @ FOBE 2011
PPTX
Defending the Data Center: Managing Users from the Edge to the Application
PDF
Security for v mware
PPTX
Security models for security architecture
PDF
Whitepaper - Data Security while outsourcing
PDF
360is Capabilities
PDF
Secure and Scale Your Virtual Infrastructure While Meeting Compliance Mandates
PDF
Build 4 The Cloud By Cisco V Mware2
PPTX
Extending security in the cloud network box - v4
PDF
CLUSIR DU 12 JUIN
PPTX
Best Practices for Cloud Security
PPT
Cloud Computing: Architecture, IT Security and Operational Perspectives
What You Need To Know About The New PCI Cloud Guidelines
Business Intelligence In Cloud Computing A Tokenization Approach Final
Cloud Computing security Challenges for Defense Forces
Why We Fail: How an architect learned to stop worrying and love the cloud
Info Sec 2010 Possibilities And Security Challenges Of Cloud Computing (Han...
NSX on VMware Data Center
Cloud Security: Perception Vs. Reality
PCI Compliance and Cloud Reference Architecture
Migrating To Cloud & Security @ FOBE 2011
Defending the Data Center: Managing Users from the Edge to the Application
Security for v mware
Security models for security architecture
Whitepaper - Data Security while outsourcing
360is Capabilities
Secure and Scale Your Virtual Infrastructure While Meeting Compliance Mandates
Build 4 The Cloud By Cisco V Mware2
Extending security in the cloud network box - v4
CLUSIR DU 12 JUIN
Best Practices for Cloud Security
Cloud Computing: Architecture, IT Security and Operational Perspectives
Ad

Similar to Why the Cloud can be Compliant and Secure (20)

PPSX
Why the Cloud can be Compliant and Secure
PDF
PCI-DSS Compliant Cloud - Design & Architecture Best Practices
PDF
The Cloud according to VMware
PPTX
Transforming cloud security into an advantage
PDF
Security in the cloud planning guide
PDF
The Cloud Crossover
PPTX
Moving Enterprise Applications to the Cloud
PPTX
Shared responsibility - a model for good cloud security
PDF
Security Authorization: An Approach for Community Cloud Computing Environments
PPTX
Cloud security ppt
PDF
Who owns security in the cloud
PPTX
Shared responsibility - a model for good cloud security
PDF
Is it an internal affair
PDF
null Bangalore meet - Cloud Computing and Security
PDF
Windstream Webinar: The Latest Trends in Virtualization: Is the cloud right f...
PDF
Security & Compliance in the Cloud [2019]
PDF
Cloud Lock-in vs. Cloud Interoperability - Indicthreads cloud computing conf...
PDF
Strategies for assessing cloud security
PDF
Ast 0064255 strategies-for_assessing_cloud_security
PDF
Strategies for assessing cloud security
Why the Cloud can be Compliant and Secure
PCI-DSS Compliant Cloud - Design & Architecture Best Practices
The Cloud according to VMware
Transforming cloud security into an advantage
Security in the cloud planning guide
The Cloud Crossover
Moving Enterprise Applications to the Cloud
Shared responsibility - a model for good cloud security
Security Authorization: An Approach for Community Cloud Computing Environments
Cloud security ppt
Who owns security in the cloud
Shared responsibility - a model for good cloud security
Is it an internal affair
null Bangalore meet - Cloud Computing and Security
Windstream Webinar: The Latest Trends in Virtualization: Is the cloud right f...
Security & Compliance in the Cloud [2019]
Cloud Lock-in vs. Cloud Interoperability - Indicthreads cloud computing conf...
Strategies for assessing cloud security
Ast 0064255 strategies-for_assessing_cloud_security
Strategies for assessing cloud security
Ad

More from InnoTech (20)

PDF
"So you want to raise funding and build a team?"
PDF
Artificial Intelligence is Maturing
PDF
What is AI without Data?
PDF
Courageous Leadership - When it Matters Most
PPTX
The Gathering Storm
PPTX
Sql Server tips from the field
PPTX
Quantum Computing and its security implications
PPSX
Converged Infrastructure
PPTX
Making the most out of collaboration with Office 365
PPTX
Blockchain use cases and case studies
PPTX
Blockchain: Exploring the Fundamentals and Promising Potential
PDF
Business leaders are engaging labor differently - Is your IT ready?
PDF
AI 3.0: Is it Finally Time for Artificial Intelligence and Sensor Networks to...
PPTX
Using Business Intelligence to Bring Your Data to Life
PDF
User requirements is a fallacy
PDF
What I Wish I Knew Before I Signed that Contract - San Antonio
PPTX
Disaster Recovery Plan - Quorum
PPTX
Share point saturday access services 2015 final 2
PDF
Sp tech festdallas - office 365 groups - planner session
PPTX
Power apps presentation
"So you want to raise funding and build a team?"
Artificial Intelligence is Maturing
What is AI without Data?
Courageous Leadership - When it Matters Most
The Gathering Storm
Sql Server tips from the field
Quantum Computing and its security implications
Converged Infrastructure
Making the most out of collaboration with Office 365
Blockchain use cases and case studies
Blockchain: Exploring the Fundamentals and Promising Potential
Business leaders are engaging labor differently - Is your IT ready?
AI 3.0: Is it Finally Time for Artificial Intelligence and Sensor Networks to...
Using Business Intelligence to Bring Your Data to Life
User requirements is a fallacy
What I Wish I Knew Before I Signed that Contract - San Antonio
Disaster Recovery Plan - Quorum
Share point saturday access services 2015 final 2
Sp tech festdallas - office 365 groups - planner session
Power apps presentation

Recently uploaded (20)

PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
KodekX | Application Modernization Development
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Empathic Computing: Creating Shared Understanding
PDF
Approach and Philosophy of On baking technology
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Unlocking AI with Model Context Protocol (MCP)
PPTX
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Electronic commerce courselecture one. Pdf
PPTX
Spectroscopy.pptx food analysis technology
Building Integrated photovoltaic BIPV_UPV.pdf
Diabetes mellitus diagnosis method based random forest with bat algorithm
Spectral efficient network and resource selection model in 5G networks
MIND Revenue Release Quarter 2 2025 Press Release
Dropbox Q2 2025 Financial Results & Investor Presentation
KodekX | Application Modernization Development
The AUB Centre for AI in Media Proposal.docx
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
Encapsulation_ Review paper, used for researhc scholars
Empathic Computing: Creating Shared Understanding
Approach and Philosophy of On baking technology
“AI and Expert System Decision Support & Business Intelligence Systems”
Unlocking AI with Model Context Protocol (MCP)
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
Chapter 3 Spatial Domain Image Processing.pdf
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
20250228 LYD VKU AI Blended-Learning.pptx
Electronic commerce courselecture one. Pdf
Spectroscopy.pptx food analysis technology

Why the Cloud can be Compliant and Secure

  • 1. Why the Cloud can be Compliant and Secure Presented by: Jeff Reich Chief Risk Officer Layered Technologies
  • 2. Agenda ● Abstract Review ● Layered Technologies Overview ● Speaker Overview ● What is a secure cloud? ● Table Stakes ● Compliance vs Security ● Components of Security 2 Layered Technologies Complying To The Higher Standard
  • 3. Abstract This session addresses misconceptions about security in the cloud and examines critical differences between compliance and security, including how compliance does not always ensure secure environments. To establish a secure cloud, one must make risk-based decisions that embrace compliance but also address practicalities and technical capabilities. While achieving compliance is considered “table stakes,” cloud security is an investment and must be continuous. The audience will learn about key security components, such as social engineering, patching, system interfaces and more. The presentation will also address the importance of grouping similar organizations in the cloud because they share common security control needs. Complying To The Higher Standard .3
  • 4. About  Layered  Tech   •  First  to  offer  full  PCI  support  in  market     (since  2005)   Leadership   •  Compliance  cloud  solu7on  with  built-­‐in  security   posi7on  in   and  controls   compliant  hos7ng   •  Comprehensive  consul7ng  and  audit  services   (and  partners)   Market-­‐leading   •  One  of  first  virtual  private  data  center  offers   cloud/virtualiza7on   •  Robust  community  cloud  plaOorm  with  built-­‐in   security  and  controls   Tiered  managed   •  Monitoring  up  to  full  management   services  for  client   •  “LT  Anywhere”  extension   choice   High-­‐touch  and   •  Managed  service  team  specializa7on   process-­‐driven  client   •  Unified  system  support  for  problem  diagnos7cs   support   •  Disciplined  change  and  log  management   Global  reach   •  3  primary  and  9  secondary  data  centers     Only  service  provider  to  offer    Compliance  Guaranteed:    our  compliance  clients  are  guaranteed     to  pass    100  percent  of  every  IT  audit  or  assessment  sanc7oned  by  the  relevant  industry  or  regulatory  en7ty.     4
  • 5. Jeff Reich ●  Over 30 years in Cyber Security, Risk Management, Physical Security and other areas ●  Leadership roles in technology and financial services organizations ●  Founding member of Cloud Security Alliance ●  CRISC, CISSP, CHS-III certifications,… ●  ISSA Distinguished Fellow Complying To The Higher Standard .5
  • 6. What is a Secure Cloud? ● First, let’s agree on what a cloud is… ● 5-4-3 ●  5 Essential Characteristics ●  4 Deployment Models ●  3 Service Models Complying To The Higher Standard .6
  • 7. Let’s Agree on the Cloud According to NIST: Cloud computing is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction. This cloud model is composed of five essential characteristics, three service models, and four deployment models. Source: The NIST Definition of Cloud Computing Authors: Peter Mell and Tim Grance Special Publication 800-145 7 Layered Technologies Complying To The Higher Standard
  • 8. 5 Essential Characteristics ● On-demand self-service ● Broad network access ● Resource pooling ● Rapid elasticity ● Measured Service 8 Layered Technologies Complying To The Higher Standard
  • 9. 4 Deployment Models ● Private cloud ● Community cloud ● Public cloud ● Hybrid cloud 9 Layered Technologies Complying To The Higher Standard
  • 10. 3 Service Models ● Cloud Software as a Service (SaaS) ● Cloud Platform as a Service (PaaS) ● Cloud Infrastructure as a Service (IaaS) 10 Layered Technologies Complying To The Higher Standard
  • 11. Table Stakes ●  Your compliance needs may include, but are not limited to: ●  PCI-DSS ●  HIPAA ●  FISMA ●  SOX ●  GLB ●  FedRAMP ●  Industry Standards ●  Corporate Policies ●  and many, many more Complying To The Higher Standard . 11
  • 12. Compliance vs Security Your Compliant Secure Best Practices Practices Practices Complying To The Higher Standard . 12
  • 13. Managing Costs Around Controls Potential Cost of Losses Controls $ Good Business Sense Tree of FUD Level of Controls Complying To The Higher Standard . 13
  • 14. Risk Management in the Cloud ●  First mistake of many cloud prospects ●  How am I managing risks now? ●  Risk picture may not improve ●  What are the most valuable information or process assets for your organization? ●  Disclosure Confidentiality ●  Modification Integrity ●  Denial of Access Availability 14 Layered Technologies Complying To The Higher Standard
  • 15. Components of Security ●  Trust ●  Verification ●  Policies, Standards, Guidelines and Procedures ●  Situational Awareness ●  Training ●  Testing ●  Lather, rinse, repeat,… Complying To The Higher Standard . 15
  • 16. Components of Cloud Security ●  Trust ●  Verification ●  Policies, Standards, Guidelines and Procedures ●  Situational Awareness ●  Training ●  Testing ●  Lather, rinse, repeat,… Complying To The Higher Standard . 16
  • 17. Components of Cloud Security Your provider should offer: ●  Policies ●  Validation ●  Transparency ●  Demonstration of compliance ●  Compliance support For more information, see www.cloudsecurityalliance.org Complying To The Higher Standard . 17
  • 18. Finding a Cloud Environment Private Hybrid Community Public Greater Control Iaas PaaS SaaS Greater Exposure 18 Layered Technologies Complying To The Higher Standard
  • 19. Contact Me ● Jeff Reich ● 972-379-8567 ● jeff.reich@layeredtech.com ● Twitter: @jnreich ● Skype: jnreich ● www.layeredtech.com 19 Layered Technologies Complying To The Higher Standard