32
FS15 Title Slide (WIP) Shaun Gordon, CSIO, New Relic

SaaS Security Programs: Build What You Seek

Embed Size (px)

Citation preview

Page 1: SaaS Security Programs: Build What You Seek

FS15 Title Slide (WIP)

• Shaun Gordon, CSIO, New Relic

Page 2: SaaS Security Programs: Build What You Seek

©2008-15 New Relic, Inc. All rights reserved.  

Safe Harbor

This document and the information herein (including any information that may be incorporated by reference) is provided for informational purposes only and should not be construed as an offer, commitment, promise or obligation on behalf of New Relic, Inc. (“New Relic”) to sell securities or deliver any product, material, code, functionality, or other feature. Any information provided hereby is proprietary to New Relic and may not be replicated or disclosed without New Relic’s express written permission.

Such information may contain forward-looking statements within the meaning of federal securities laws. Any statement that is not a historical fact or refers to expectations, projections, future plans, objectives, estimates, goals, or other characterizations of future events is a forward-looking statement. These forward-looking statements can often be identified as such because the context of the statement will include words such as “believes,” “anticipates,” “expects” or words of similar import.

Actual results may differ materially from those expressed in these forward-looking statements, which speak only as of the date hereof, and are subject to change at any time without notice. Existing and prospective investors, customers and other third parties transacting business with New Relic are cautioned not to place undue reliance on this forward-looking information. The achievement or success of the matters covered by such forward-looking statements are based on New Relic’s current assumptions, expectations, and beliefs and are subject to substantial risks, uncertainties, assumptions, and changes in circumstances that may cause the actual results, performance, or achievements to differ materially from those expressed or implied in any forward-looking statement. Further information on factors that could affect such forward-looking statements is included in the filings we make with the SEC from time to time. Copies of these documents may be obtained by visiting New Relic’s Investor Relations website at ir.newrelic.com or the SEC’s website at www.sec.gov.

New Relic assumes no obligation and does not intend to update these forward-looking statements, except as required by law. New Relic makes no warranties, expressed or implied, in this document or otherwise, with respect to the information provided.

Page 3: SaaS Security Programs: Build What You Seek

Effective SaaS Security

Page 4: SaaS Security Programs: Build What You Seek

ChecklistNot a

Page 5: SaaS Security Programs: Build What You Seek

Not a

Shopping List

Page 6: SaaS Security Programs: Build What You Seek

It’s about

Maturity

Page 7: SaaS Security Programs: Build What You Seek

The TeamProcessesPolicies

ComplianceMonitoring

TransparencyMindset

Maturity is

Page 8: SaaS Security Programs: Build What You Seek

The Team

Page 9: SaaS Security Programs: Build What You Seek

Describe your security organization, including the title of person who leads it, the size, and the number of people 100% dedicated to it?

How do you handle security incidents? Describe your response to any recent security

event.

Questions about The Team

Page 10: SaaS Security Programs: Build What You Seek

Processes

Page 11: SaaS Security Programs: Build What You Seek

How is the security team involved in reviewing the software development process?

How do you ensure or validate the security of the code that is pushed to your production

systems?

How are the employees or 3rd parties authenticated?

How do you ensure employees are deprovisioned when they leave the company, and appropriately reprovisioned when they

change roles?

Questions about Processes

Page 12: SaaS Security Programs: Build What You Seek

Policies

Page 13: SaaS Security Programs: Build What You Seek

Do you have documented security policies? Please provide copies, if available.

Do you classify data based on sensitivity? If so, how?

What are your data sharing and retention policies and practices?

Do you allow your employees to remove customer data from the production environment? If so, under

what circumstances?

Which of your employees have access to customer data and why?

Which third-parties will have access to that data, and how do you ensure that they will protect it?

Questions about Policies

Page 14: SaaS Security Programs: Build What You Seek
Page 15: SaaS Security Programs: Build What You Seek

Do you have a good understanding of the regulations and/or industry standards that are largely applicable to you? Please list them, as

well as your current evaluation of your compliance status (yes, no, partially) with

each one.Are there any major security exceptions and gaps that you are aware of impacting your compliance obligations? If so, what is your

roadmap for addressing them?

Questions about Compliance

Page 16: SaaS Security Programs: Build What You Seek

Monitoring

Page 17: SaaS Security Programs: Build What You Seek

How do you know if there are new vulnerabilities in your network, servers,

and applications?How would you know if your network,

servers, and/or applications are breached or compromised?

How do you monitor, log, and/or audit all access to your network and/or customer

data?

Questions about Monitoring

Page 18: SaaS Security Programs: Build What You Seek
Page 19: SaaS Security Programs: Build What You Seek

Do you perform external assessments, and at what frequency? Please provide

latest reports, if available..

Questions about Transparency

Page 20: SaaS Security Programs: Build What You Seek

Mindset

Page 21: SaaS Security Programs: Build What You Seek

AwarenessComplianceand Security

Page 22: SaaS Security Programs: Build What You Seek
Page 23: SaaS Security Programs: Build What You Seek

Consists ofOur Company

People

Page 24: SaaS Security Programs: Build What You Seek

We play the

LongGame

Page 25: SaaS Security Programs: Build What You Seek

We manage our

Capital

Page 26: SaaS Security Programs: Build What You Seek

How are information security responsibilities communicated to employees who work with

customer data? How frequently?

Questions about Mindset

Page 27: SaaS Security Programs: Build What You Seek

Measure?How do we

Page 28: SaaS Security Programs: Build What You Seek

UNCONSCIOUS INCOMPETENCE UNCONSCIOUS COMPETENCE

CONSCIOUS INCOMPETENCE CONSCIOUS COMPETENCE

Learning Matrix

Page 29: SaaS Security Programs: Build What You Seek

UNCONSCIOUS INCOMPETENCE UNCONSCIOUS COMPETENCE

CONSCIOUS INCOMPETENCE CONSCIOUS COMPETENCE

No Security Program or TeamHandwaving

No Policies or ProcessesPoor Access Control

No Compliance AwarenessSecurity back-of-mind

Large Security TeamFormal Security Reviews

Audited Policies & ProcessesCompliance Evidence

Companywide Mindset

Designated not Dedicated Sec TeamUnderstanding Concerns

Ad-Hoc Policies & ProcessesAware of Compliance Requirements

Checklist Security

Dedicated Security TeamDocumented Policies &

ProcessesNo Compliance Auditing

Security MonitoringPragmatic Security

Security Maturity Matrix

Page 30: SaaS Security Programs: Build What You Seek

UNCONSCIOUS INCOMPETENCE UNCONSCIOUS COMPETENCE

CONSCIOUS INCOMPETENCE CONSCIOUS COMPETENCE

OK for PUBLIC data(but even then, we probably

wouldn’t recommend)

OK for any RESTRICTED data

(e.g. CCs, SSNs)

OK for INTERNAL data(e.g. Workplace plans)

OK for CONFIDENTIAL data(e.g. customer data, PII, finance

data)

Allowable USe

Page 31: SaaS Security Programs: Build What You Seek

UNCONSCIOUS INCOMPETENCE UNCONSCIOUS COMPETENCE

CONSCIOUS INCOMPETENCE CONSCIOUS COMPETENCE

No Security Program or TeamHandwaving

No Policies or ProcessesPoor Access Control

No Compliance AwarenessSecurity back-of-mind

Large Security TeamFormal Security Reviews

Audited Policies & ProcessesCompliance Evidence

Companywide Mindset

Designated not Dedicated Sec TeamUnderstanding Concerns

Ad-Hoc Policies & ProcessesAware of Compliance Requirements

Checklist Security

Dedicated Security TeamDocumented Policies &

ProcessesNo Compliance Auditing

Security MonitoringPragmatic Security

Security Maturity Matrix

Page 32: SaaS Security Programs: Build What You Seek

FS15 Thank You Slide (WIP)

• Shaun Gordon, CSIO, New Relic