trusted cloud initiative work group session n.
Download
Skip this Video
Loading SlideShow in 5 Seconds..
Trusted Cloud Initiative Work Group Session PowerPoint Presentation
Download Presentation
Trusted Cloud Initiative Work Group Session

Loading in 2 Seconds...

play fullscreen
1 / 12

Trusted Cloud Initiative Work Group Session - PowerPoint PPT Presentation


  • 146 Views
  • Uploaded on

Trusted Cloud Initiative Work Group Session . Architecture Focus Areas. High Level Use Cases. Principles. Define protections that enable trust in the cloud. Develop cross-platform capabilities and patterns for proprietary and open-source providers.

loader
I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
capcha
Download Presentation

Trusted Cloud Initiative Work Group Session


An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
    Presentation Transcript
    1. Trusted Cloud Initiative Work Group Session

    2. Architecture Focus Areas

    3. High Level Use Cases

    4. Principles • Define protections that enable trust in the cloud. • Develop cross-platform capabilities and patterns for proprietary and open-source providers. • Will facilitate trusted and efficient access, administration and resiliency to the customer/consumer. • Provide direction to secure information that is protected by regulations. • The Architecture must facilitate proper and efficient governance, identification, authentication, authorization, administration and auditability. • Centralize security policy, maintenance operation and oversight functions. • Access to information must be secure yet still easy to obtain. • Delegate or Federate access control where appropriate. • Must be easy to adopt and consume, supporting the design of security patterns. • The Architecture must be elastic, flexible and resilient supporting multi-tenant, multi-landlord platforms • The Architecture must address and support multiple levels of protection, including network, operating system, and application security needs.

    5. Goals • Use the breadth of the Cloud Security Alliance • Adjacent initiatives will be a focus for the TCI mandate • Built upon “pillars” from the Cloud Security Alliance • Provide an end-to-end security specification for cloud security • Use the depth of the Cloud Security Alliance membership • Members have credibility from the top of the application to the “bare metal” • GRC and interoperability • Enable a vendor neutral reference architecture specification • All vendor products that enable an end-to-end security platform will be used • Provide a exemplary reference set of implementations • Global examples so that any country can implement the architecture to their requirements • Show examples of standards and how they can be implemented across products • Open source initiative • Where the TCI supports implementation under its direction the implementation is open source Note: The TCI Reference Architecture is not the same as the Cloud Computing Architectural Framework (Domain 1 of the Security Guidance for Critical Areas of Focus in Cloud Computing V2.1)

    6. Holistic Approach to Controls... CSA Controls Matrix

    7. … And Architecture Best Practices CSA Controls Matrix

    8. Reference Model Structure Presentation Services Security and Risk Management (Jericho) Business Operation Support Services (SABSA) Information Technology Operation & Support (ITIL) Application Services Information Services Infrastructure Services (TOGAF)

    9. Mapping from CCM to TCI

    10. How to Use the Architecture Presentation BOSS ITOS SRM Application Information Infrastructure Security Framework and Patterns CSA Controls Matrix CSA Consensus Assessment Reference Architecture

    11. Interactive Website