Corporate Concerns and Strategies for Cloud IT Security

corporate concerns on cloud services environment n.w
1 / 22
Embed
Share

"Explore essential characteristics, service models, and deployment options in cloud computing along with key concerns and strategies for IT security in the corporate environment. Learn about managing risks, securing data, and implementing effective technology policies."

  • Cloud Computing
  • IT Security
  • Corporate Concerns
  • Technology Strategies
  • Data Management

Uploaded on | 0 Views


Download Presentation

Please find below an Image/Link to download the presentation.

The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author. If you encounter any issues during the download, it is possible that the publisher has removed the file from their server.

You are allowed to download the files provided on this website for personal or commercial use, subject to the condition that they are used lawfully. All files are the property of their respective owners.

The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author.

E N D

Presentation Transcript


  1. Corporate Concerns on Cloud Services Environment IT Auditing ELEADER CISA, ITIL (V.2,V.3), IRCA ISMS Auditor (ISO/IEC 27001:2013) and ISFS (ISO/IEC 27002:2005) June 29,2016

  2. STOP ? GO

  3. Essential Characteristics The essential characteristics of On-demand self-service Broad network access Resource pooling Rapid elasticity Measured service Cloud computing

  4. Cloud Service Models Infrastructure as a Service (IaaS) Platforms as a Service (PaaS) Software as a Service (SaaS)

  5. Cloud Deployment Models Public cloud Community cloud Private cloud Hybrid cloud

  6. Concern Topics Business COST/ROI (Return on Investment) Technology IT Security (CIA) Confidentiality Integrity Availability Compliance Process People Terminate Service

  7. COST/ROI (Return on Investment) COST ROI

  8. What is the most valuable asset? Data Application Host (OS) Network Physical/Hardware

  9. Technology (IT Security) Unavailability Loss/Theft/Hacker Disclosure RISK RISK

  10. Technology (IT Security Concern)

  11. Technology (IT Security Concern) S - Strategy IT Security Policy IT Security Procedures User Access Management Backup and Recovery Incident and Problem System Development and Maintenance IT Outsourcing etc.

  12. Technology (IT Security Concern) M Manage Change Impact Analysis Requirement Test Launch

  13. Technology (IT Security Concern) A Access Controls User Access Management (User & Admin) Security Parameters (e.g., Password setting) Network Access Remote Access Physical Access and Environmental Controls Log Monitoring SOD (Segregation of duties)

  14. Technology (IT Security Concern) R Recovery BCP (Business Continuity Plan) DRP (Disaster Recovery Plan)

  15. Technology (IT Security Concern) T oThers Backup and Recovery Incident and Problem Management Monitoring

  16. Compliance Concern LAWS (e.g., Computer Crime, Privacy etc.) Regulations (e.g., BOT, SET, OIC, PCI/DSS etc.) Standards (e.g., ISO/IEC 27001 etc.)

  17. Process Concern Vendor Selection (e.g., Qualification, Site Reference, Number of client, Price etc.) Vendor Management Evaluation Visit or Audit Contract Excellent Good Satisfactory Poor

  18. People Concern Resource Utilization The concern of Employee

  19. Terminate Service Concern Data Disposal or Return of Assets

  20. Question? info.ktits@gmail.com ktits_itaudit kasipat thai

  21. Thank You

Related


More Related Content