PPT-Securing the Cloud from The z/OS Perspective
Author : min-jolicoeur | Published Date : 2018-10-21
Agenda Introduction The history of The Cloud How virtualization allows for Cloud computing The Cloud Security Exposures Data in Transit from the Mainframe to the
Presentation Embed Code
Download Presentation
Download Presentation The PPT/PDF document "Securing the Cloud from The z/OS Perspe..." is the property of its rightful owner. Permission is granted to download and print the materials on this website for personal, non-commercial use only, and to display it on your personal computer provided you do not modify the materials and that you retain all copyright notices contained in the materials. By downloading content from our website, you accept the terms of this agreement.
Securing the Cloud from The z/OS Perspective: Transcript
Agenda Introduction The history of The Cloud How virtualization allows for Cloud computing The Cloud Security Exposures Data in Transit from the Mainframe to the Cloud Management of Users and Identity provisioning. Karame Claudio Soriente Krzysztof Lichota Srdjan Capkun NECLaboratories Europe Germany ETHZurich Switzerland 9livesdata Poland Abstract The world just witnessed the surge of a new and powerful attacker which was able to coerce operators and acquire Puffs (mantelpieces) 2011 pigment ink on folded rag paper 225 x 300 x 90mm series of 10 images 1 excellence in commissioning specialised services 2 Securing equity and excellence in commissioning specialised services First published: November 2012 Prepared by the Specialised Services Comm | FORTINET White Paper 1 Securing Distributed Enterprise Networks for PCI DSS 3.0 Compliance Accelerating Compliance and Simplifying Complex Networks Introduction Distributed Enterprise networks ha Alan Shieh. †‡. Srikanth. . Kandula. ‡. Albert Greenberg. ‡. †. ‡. Cloud workload is dynamic and hostile. Traditional datacenters. Infrastructure supports small # of internal clients. Software and topology change . Alternative . securing devices for . 4-part . shackles. . . Member and client fully support use . of . split . pin for . shackles . on . permanent / dedicated . fixture points, . rigging . assemblies, items at height, . Confidential – Oracle Internal. Use These Wins and References With Your Customers. March 2017. Note To Sellers. Please use the following public references and anonymous customer slides with your customers. Agenda. Introduction. The history of The Cloud. How virtualization allows for Cloud computing. The Cloud Security Exposures. Data in Transit from the Mainframe to the Cloud. Management of Users and Identity provisioning. 1. CUSTOMER PERSPECTIVE. “We move 80 applications to the Oracle cloud and shut down 2 data centers, saving the company about $400K in operational costs …the new cloud brings modern feature set as well as modern API that improve automation. SummarySecuring DevOps explores how the techniques of DevOps and security should be applied together to make cloud services safer. This introductory book reviews the latest practices used in securing web applications and their infrastructure and teaches you techniques to integrate security directly into your product. You\'ll also learn the core concepts of DevOps such as continuous integration continuous delivery and infrastructure as a service.Purchase of the print book includes a free eBook in PDF Kindle and ePub formats from Manning Publications.About the TechnologyAn application running in the cloud can benefit from incredible efficiencies but they come with unique security threats too. A DevOps team\'s highest priority is understanding those risks and hardening the system against them.About the BookSecuring DevOps teaches you the essential techniques to secure your cloud services. Using compelling case studies it shows you how to build security into automated testing continuous delivery and other core DevOps processes. This experience-rich book is filled with mission-critical strategies to protect web applications against attacks deter fraud attempts and make your services safer when operating at scale. You\'ll also learn to identify assess and secure the unique vulnerabilities posed by cloud deployments and automation tools commonly used in modern infrastructures. What\'s insideAn approach to continuous securityImplementing test-driven security in DevOpsSecurity techniques for cloud servicesWatching for fraud and responding to incidentsSecurity testing and risk assessmentAbout the ReaderReaders should be comfortable with Linux and standard DevOps practices like CI CD and unit testing.About the AuthorJulien Vehent is a security architect and DevOps advocate. He leads the Firefox Operations Security team at Mozilla and is responsible for the security of Firefox\'s high-traffic cloud services and public websites.Table of ContentsSecuring DevOpsPART 1 - Case study applying layers of security to a simple DevOps pipelineBuilding a barebones DevOps pipeline Security layer 1 protecting web applications Security layer 2 protecting cloud infrastructures Security layer 3 securing communications Security layer 4 securing the delivery pipeline PART 2 - Watching for anomalies and protecting services against attacksCollecting and storing logs Analyzing logs for fraud and attacks Detecting intrusions The Caribbean breach a case study in incident response PART 3 - Maturing DevOps securityAssessing risks Testing security Continuous security The Desired Brand Effect Stand Out in a Saturated Market with a Timeless Brand kindly visit us at www.examsdump.com. Prepare your certification exams with real time Certification Questions & Answers verified by experienced professionals! We make your certification journey easier as we provide you learning materials to help you to pass your exams from the first try. Professionally researched by Certified Trainers,our preparation materials contribute to industryshighest-99.6% pass rate among our customers. kindly visit us at www.examsdump.com. Prepare your certification exams with real time Certification Questions & Answers verified by experienced professionals! We make your certification journey easier as we provide you learning materials to help you to pass your exams from the first try. Professionally researched by Certified Trainers,our preparation materials contribute to industryshighest-99.6% pass rate among our customers. Scott M. Stewart. Defense Information Systems Agency. &. Jodi L. Cramer. U.S. Air Force. Agenda. The objective of this presentation is to help components efficiently and effectively acquire cloud services..
Download Document
Here is the link to download the presentation.
"Securing the Cloud from The z/OS Perspective"The content belongs to its owner. You may download and print it for personal use, without modification, and keep all copyright notices. By downloading, you agree to these terms.
Related Documents