18

The secure cloud

Embed Size (px)

Citation preview

Page 1: The secure cloud
Page 2: The secure cloud

Flexible and robust SHARED IT

capability delivered over the

INTERNET…

Page 3: The secure cloud

Flexible and robust SHARED IT

capability delivered over the

INTERNET…

Sharing Introduces

Risks

Access via the Internet Introduces

Risks

Page 4: The secure cloud

• Categorized into two streams..

Outside Inside

Page 5: The secure cloud

• First of all, let’s clear some mistruth’s…

Page 6: The secure cloud

• First of all, let’s clear some mistruth’s…

Page 7: The secure cloud

Internet Point of Presence Breach (border firewall)

Secure Communications (to and from the customer network)

Denial of Service (to another hosted customer)

Page 8: The secure cloud

Client Cross-Talk (where one client’s resource demands negatively impact another)

Attacks from within (ie network attacks from behind the border firewall)

Data Loss Prevention

(who can copy your data)

Data Sovereignty

(who owns your data, and can gain access to it)

Page 9: The secure cloud

• We share the responsibility to ensure security; Cloud providers can only go so far.. (in a survey by F5 networks, 33% of respondents though that the provider was responsible for security)

Page 10: The secure cloud

Security

Functionality

Page 11: The secure cloud

• Encrypt your sensitive data

• Install Intrusion Detection on your

Servers

• Enable Firewalls on your Servers

• Leverage and demand control of

firewalls into your hosted network

• Ensure all portals are protected with

SSL; apply password policies

• Ensure any site to site VPNs are using

at least 256 bit encryption

Page 12: The secure cloud

• Every customer operates in their own VLAN

• Every DMZ server resides in a pVLAN

• Local DMZ traffic requires firewall traversal

• Border Firewall – Controlled by us;

Customer Firewall – Controlled by YOU

• Border firewall includes auto DDoS defense

• Resource reservations per customer

• SSL Certificates deployed for all admin

portals

Page 13: The secure cloud

• Checkpoint Border Firewalls with DDoS, IDS enabled – stateful and

application level filtering

• Cisco Nexus Switches with Layer 2/3 security

• VMware vShield stateful packet inspection Firewall per Client

• VMware vShield Site to Site VPNs with 256bit encryption

• CPU, RAM, Network & Storage IO Controls (fair share)

Page 14: The secure cloud

• Delegated “just enough” rights

• Cannot delete or copy customer VMs

• Have no access into customer

networks

• Have no ability to interact with

customer servers

• Auditing and separation of duties

• ITIL aligned operating processes

• Staff all undergo Police checks

Page 15: The secure cloud

• Real-time monitoring and enforcement of platform configuration

(unauthorized change reversed)

• Real-time monitoring and alerting of privileged actions

• Real-time monitoring and alerting from Border firewalls

• Centralized Admin user account repository with strict password

policies

Page 16: The secure cloud

• Security extends to your DATA (in fact, isn't

that what you are protecting!)

• Offshore hosting exposes you to the laws of

the country in which you are hosted

• Beware hosting with USA registered

companies (patriot act)

• For maximum security, ensure your data

remains in Indonesia

• IndonesianCloud is 100% local

Page 17: The secure cloud

• VMware vCloud Powered = Independent verification of our

Architecture

• Investment in the “best of breed” technology

• Completely Transparent; we have nothing to hide

• Completely Open platform; we have no technology lock-in and will

even help you export your VMs

• Strict SLAs with penalties for breach

Page 18: The secure cloud

www.indonesiancloud.com