
Corporate Concerns and Strategies for Cloud IT Security
"Explore essential characteristics, service models, and deployment options in cloud computing along with key concerns and strategies for IT security in the corporate environment. Learn about managing risks, securing data, and implementing effective technology policies."
Download Presentation

Please find below an Image/Link to download the presentation.
The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author. If you encounter any issues during the download, it is possible that the publisher has removed the file from their server.
You are allowed to download the files provided on this website for personal or commercial use, subject to the condition that they are used lawfully. All files are the property of their respective owners.
The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author.
E N D
Presentation Transcript
Corporate Concerns on Cloud Services Environment IT Auditing ELEADER CISA, ITIL (V.2,V.3), IRCA ISMS Auditor (ISO/IEC 27001:2013) and ISFS (ISO/IEC 27002:2005) June 29,2016
STOP ? GO
Essential Characteristics The essential characteristics of On-demand self-service Broad network access Resource pooling Rapid elasticity Measured service Cloud computing
Cloud Service Models Infrastructure as a Service (IaaS) Platforms as a Service (PaaS) Software as a Service (SaaS)
Cloud Deployment Models Public cloud Community cloud Private cloud Hybrid cloud
Concern Topics Business COST/ROI (Return on Investment) Technology IT Security (CIA) Confidentiality Integrity Availability Compliance Process People Terminate Service
COST/ROI (Return on Investment) COST ROI
What is the most valuable asset? Data Application Host (OS) Network Physical/Hardware
Technology (IT Security) Unavailability Loss/Theft/Hacker Disclosure RISK RISK
Technology (IT Security Concern) S - Strategy IT Security Policy IT Security Procedures User Access Management Backup and Recovery Incident and Problem System Development and Maintenance IT Outsourcing etc.
Technology (IT Security Concern) M Manage Change Impact Analysis Requirement Test Launch
Technology (IT Security Concern) A Access Controls User Access Management (User & Admin) Security Parameters (e.g., Password setting) Network Access Remote Access Physical Access and Environmental Controls Log Monitoring SOD (Segregation of duties)
Technology (IT Security Concern) R Recovery BCP (Business Continuity Plan) DRP (Disaster Recovery Plan)
Technology (IT Security Concern) T oThers Backup and Recovery Incident and Problem Management Monitoring
Compliance Concern LAWS (e.g., Computer Crime, Privacy etc.) Regulations (e.g., BOT, SET, OIC, PCI/DSS etc.) Standards (e.g., ISO/IEC 27001 etc.)
Process Concern Vendor Selection (e.g., Qualification, Site Reference, Number of client, Price etc.) Vendor Management Evaluation Visit or Audit Contract Excellent Good Satisfactory Poor
People Concern Resource Utilization The concern of Employee
Terminate Service Concern Data Disposal or Return of Assets
Question? info.ktits@gmail.com ktits_itaudit kasipat thai