Can I Trust the Cloud?W. Wyatt StarnesVP Advanced Concepts
Background Harris Corporation
More than 16,000 employees including nearly 7,000 engineers and scientists
$6 billion annual revenue
Industry leader in mission critical networked systems
Significant investment in Cyber Integrated SolutionsWyatt StarnesLeads research and development for Harris Trusted Enterprise Cloud and the Harris Cyber Integration CenterInstrumental in establishing industry standards for security, compliance, and systems measurementFounder and former CEO of Signacert and Tripwire36 years experience in high technology with eight startupsHarris has a 115-year history of engineering excellence, technical innovation, and customer delight.
The Buzz about Cloud
Everyone is Talking Cloud…
…but Which Cloud and Can I Trust it?Can I Trust the Cloud?Which Cloud?Private CloudOn premise enterprise data centerPublic CloudOff premise, multi-tenantShared resourcesCommunity CloudEnterprise membershipHybrid CloudMultiple elements of the aboveInformation Week Analytics Cloud Computing Survey, 2009. Respondents were asked: How concerned are you with the following issues as they relate to cloud computing? (range from 1 to 5)
Barriers to the Cloud are RealTrustCost & Control
What is Trust in the Cloud?
What is Trust?Trust - Noun. Reliance on the integrity, strength, ability, surety, etc., of a person or thing.
Confident expectation of something.What is Trust in the Cloud?“Trust in cloud computing is defined as the continuous monitoring of all quality of service (QoS) elements that impact business service delivery and continuity.  These include supply chain provenance, life cycle integrity, governance, security, privacy and transparency.”
What is Trust in the Cloud?“…..….the commission supports programs such as Security Content Automation Protocol, or S-CAP, a standard which enables the automation of reporting and verifying IT security control parameters.  S-CAP provides a ready method to capture, test and continuously monitor the controls and integrity settings required to achieve the respective standard and/or compliance requirements.”
Security ≠ TrustTraditional security methods focus on keeping bad code outHarris adds Positive Assurance enabling full integrity verification All active elements in the infrastructure are monitored and validated including servers & network components (firewalls, routers, switches)Explicit Trust through Positive Platform Assurance
The Pillars of TrustTRUSTSupply ChainPositive AssuranceService DeliverySecurity & Compliance
Building the Trusted Cloud
The Trusted Enterprise CloudWorld-class and purpose-built infrastructure – the Cyber Integration Center and Harris’ network of cyber facilities and operations centersBest-of-breed systems and processes – focused on virtualization, automation, a unique end-to-end service model, and customized control through the client portalTrust Enablement Technology – continuous monitoring and assessment of the device and  software supply chain using our Global Trust Repository of 3 billion (growing by 3 million a day!) industry standard reference images and external vulnerability feedsApplication Data and Signature Database+2000 other vendorsGlobal Trust Repository(GTR)Enterprise Trust ServerCompliance AssessmentReferenceConfigurationsReportingInventory ReportsChange ReportsCompliance ReportsNotificationsIT InfrastructureEcommerce Service
Trading Service
Virtual Infrastructure
Web Servers
Database Servers
File Servers
Directory ServersThe industry’s first enterprise-grade, high-assurance cloud computing solution
Proof that the code was actually built by the named supplier is a crucial element of software and device validation or attestationTrust and Supply ChainDo I know that the software elements that I am loading and running on my platform ARE what they say they are?What proof do I have that the code I am using was actually built by the named vendor?Is an increasing concern  for software & hardware vendors and users in all sectors
Cyber Integration Center100,000 sq ft dedicated facility
Buffered VA location
Operations support ISO 20000, ISO 27001, SAS70 Type 2, NIST 800-53-High
Three secure data rooms

More Related Content

PDF
Webroot - self-defending IoT devices & gateways
PDF
Unlock the full potential of IoT
PPTX
NIST Cybersecurity Framework (CSF) on the Public Cloud
PDF
Thin Air or Solid Ground? Practical Cloud Security
PPTX
Digital Transformation - Cisco's Journey
PPTX
Security and governance in the cloud
PDF
CSA Introduction 2013 David Ross
PPT
Securing Servers in Public and Hybrid Clouds
Webroot - self-defending IoT devices & gateways
Unlock the full potential of IoT
NIST Cybersecurity Framework (CSF) on the Public Cloud
Thin Air or Solid Ground? Practical Cloud Security
Digital Transformation - Cisco's Journey
Security and governance in the cloud
CSA Introduction 2013 David Ross
Securing Servers in Public and Hybrid Clouds

What's hot (20)

PDF
Global Mandate to Secure Cloud Computing
PDF
Enterprise Cloud transformation z pohledu Oracle
PPTX
Rohan s w2 - top 5 tools that help in monitoring compliance for pci dss and...
PPTX
Cloud computing Risk management
PDF
NIST Cyber Security Framework: 4 Steps for CIOs - Deloitte CIO - WSJ
PDF
Biznet Gio Presentation - Database Security
PPTX
Webinar compiled powerpoint
PPTX
The Software-Defined Perimeter: Securing Network Access for the Modern Workforce
PPT
Cisco Security Technical Alliances
PDF
Assessing the Security of Cloud SaaS Solutions
PDF
Mindtree distributed agile journey and guiding principles
PDF
Biznet Gio Presentation - Cloud Computing
PDF
IT_RFO10-14-ITS_AppendixA_20100513
PDF
The Inside Story: Leveraging the IIC's Industrial Internet Security Framework
PDF
How to Keep your Atlassian Cloud Secure
PPTX
Enterprise Security in Hybrid Cloud ISACA-SV 2012
PDF
[Cisco Connect 2018 - Vietnam] Rajinder singh cisco sd-wan-next generation ...
PPT
Cloud Security: Make Your CISO Successful
PPTX
Runecast Analyzer Overview
PDF
Runecast: Simplified Security with Unparalleled Transparency (March 2022)
Global Mandate to Secure Cloud Computing
Enterprise Cloud transformation z pohledu Oracle
Rohan s w2 - top 5 tools that help in monitoring compliance for pci dss and...
Cloud computing Risk management
NIST Cyber Security Framework: 4 Steps for CIOs - Deloitte CIO - WSJ
Biznet Gio Presentation - Database Security
Webinar compiled powerpoint
The Software-Defined Perimeter: Securing Network Access for the Modern Workforce
Cisco Security Technical Alliances
Assessing the Security of Cloud SaaS Solutions
Mindtree distributed agile journey and guiding principles
Biznet Gio Presentation - Cloud Computing
IT_RFO10-14-ITS_AppendixA_20100513
The Inside Story: Leveraging the IIC's Industrial Internet Security Framework
How to Keep your Atlassian Cloud Secure
Enterprise Security in Hybrid Cloud ISACA-SV 2012
[Cisco Connect 2018 - Vietnam] Rajinder singh cisco sd-wan-next generation ...
Cloud Security: Make Your CISO Successful
Runecast Analyzer Overview
Runecast: Simplified Security with Unparalleled Transparency (March 2022)
Ad

Similar to Can I Trust the Cloud? (20)

PPTX
Building and Operating Clouds
PPTX
Securing The Clouds Proactively-BlackisTech.pptx
PDF
Securing The Clouds with The Standard Best Practices-1.pdf
PPTX
Lss implementing cyber security in the cloud, and from the cloud-feb14
PDF
Get Informed About Cloud Computing for Enterprise IT by Opus Interactive
PPTX
To Cloud or Not To Cloud
PPTX
To cloud or not to cloud
PPTX
Cloud Security: A matter of trust?
PDF
Presentation cisco cloud security
PPTX
2014 2nd me cloud conference trust in the cloud v01
PPT
Effectively and Securely Using the Cloud Computing Paradigm
PDF
my cloud
PPTX
Leverage your business with cloud architecture
PPTX
MARLABS - Cloud services CIO Conference
PPT
Presentation on Effectively and Securely Using the Cloud Computing Paradigm v26
PPT
Presentation On Effectively And Securely Using The Cloud Computing Paradigm V26
PDF
Sukumar Nayak-Detailed-Cloud Risk Management and Audit
PPTX
Why the cloud is more secure than your existing systems
PPT
Cloud strategy briefing 101
PPTX
The Future of IT
Building and Operating Clouds
Securing The Clouds Proactively-BlackisTech.pptx
Securing The Clouds with The Standard Best Practices-1.pdf
Lss implementing cyber security in the cloud, and from the cloud-feb14
Get Informed About Cloud Computing for Enterprise IT by Opus Interactive
To Cloud or Not To Cloud
To cloud or not to cloud
Cloud Security: A matter of trust?
Presentation cisco cloud security
2014 2nd me cloud conference trust in the cloud v01
Effectively and Securely Using the Cloud Computing Paradigm
my cloud
Leverage your business with cloud architecture
MARLABS - Cloud services CIO Conference
Presentation on Effectively and Securely Using the Cloud Computing Paradigm v26
Presentation On Effectively And Securely Using The Cloud Computing Paradigm V26
Sukumar Nayak-Detailed-Cloud Risk Management and Audit
Why the cloud is more secure than your existing systems
Cloud strategy briefing 101
The Future of IT
Ad

Recently uploaded (20)

PPTX
Training Program for knowledge in solar cell and solar industry
PPTX
Build Your First AI Agent with UiPath.pptx
PDF
The-Future-of-Automotive-Quality-is-Here-AI-Driven-Engineering.pdf
PDF
sbt 2.0: go big (Scala Days 2025 edition)
PDF
Taming the Chaos: How to Turn Unstructured Data into Decisions
PDF
The influence of sentiment analysis in enhancing early warning system model f...
PPTX
AI-driven Assurance Across Your End-to-end Network With ThousandEyes
PDF
Data Virtualization in Action: Scaling APIs and Apps with FME
PDF
Transform-Your-Supply-Chain-with-AI-Driven-Quality-Engineering.pdf
PDF
4 layer Arch & Reference Arch of IoT.pdf
PDF
Accessing-Finance-in-Jordan-MENA 2024 2025.pdf
PDF
Improvisation in detection of pomegranate leaf disease using transfer learni...
PDF
Consumable AI The What, Why & How for Small Teams.pdf
PDF
Comparative analysis of machine learning models for fake news detection in so...
PDF
Transform-Your-Streaming-Platform-with-AI-Driven-Quality-Engineering.pdf
DOCX
Basics of Cloud Computing - Cloud Ecosystem
PDF
5-Ways-AI-is-Revolutionizing-Telecom-Quality-Engineering.pdf
PDF
giants, standing on the shoulders of - by Daniel Stenberg
PDF
Produktkatalog für HOBO Datenlogger, Wetterstationen, Sensoren, Software und ...
PDF
Statistics on Ai - sourced from AIPRM.pdf
Training Program for knowledge in solar cell and solar industry
Build Your First AI Agent with UiPath.pptx
The-Future-of-Automotive-Quality-is-Here-AI-Driven-Engineering.pdf
sbt 2.0: go big (Scala Days 2025 edition)
Taming the Chaos: How to Turn Unstructured Data into Decisions
The influence of sentiment analysis in enhancing early warning system model f...
AI-driven Assurance Across Your End-to-end Network With ThousandEyes
Data Virtualization in Action: Scaling APIs and Apps with FME
Transform-Your-Supply-Chain-with-AI-Driven-Quality-Engineering.pdf
4 layer Arch & Reference Arch of IoT.pdf
Accessing-Finance-in-Jordan-MENA 2024 2025.pdf
Improvisation in detection of pomegranate leaf disease using transfer learni...
Consumable AI The What, Why & How for Small Teams.pdf
Comparative analysis of machine learning models for fake news detection in so...
Transform-Your-Streaming-Platform-with-AI-Driven-Quality-Engineering.pdf
Basics of Cloud Computing - Cloud Ecosystem
5-Ways-AI-is-Revolutionizing-Telecom-Quality-Engineering.pdf
giants, standing on the shoulders of - by Daniel Stenberg
Produktkatalog für HOBO Datenlogger, Wetterstationen, Sensoren, Software und ...
Statistics on Ai - sourced from AIPRM.pdf

Can I Trust the Cloud?

  • 1. Can I Trust the Cloud?W. Wyatt StarnesVP Advanced Concepts
  • 3. More than 16,000 employees including nearly 7,000 engineers and scientists
  • 5. Industry leader in mission critical networked systems
  • 6. Significant investment in Cyber Integrated SolutionsWyatt StarnesLeads research and development for Harris Trusted Enterprise Cloud and the Harris Cyber Integration CenterInstrumental in establishing industry standards for security, compliance, and systems measurementFounder and former CEO of Signacert and Tripwire36 years experience in high technology with eight startupsHarris has a 115-year history of engineering excellence, technical innovation, and customer delight.
  • 9. …but Which Cloud and Can I Trust it?Can I Trust the Cloud?Which Cloud?Private CloudOn premise enterprise data centerPublic CloudOff premise, multi-tenantShared resourcesCommunity CloudEnterprise membershipHybrid CloudMultiple elements of the aboveInformation Week Analytics Cloud Computing Survey, 2009. Respondents were asked: How concerned are you with the following issues as they relate to cloud computing? (range from 1 to 5)
  • 10. Barriers to the Cloud are RealTrustCost & Control
  • 11. What is Trust in the Cloud?
  • 12. What is Trust?Trust - Noun. Reliance on the integrity, strength, ability, surety, etc., of a person or thing.
  • 13. Confident expectation of something.What is Trust in the Cloud?“Trust in cloud computing is defined as the continuous monitoring of all quality of service (QoS) elements that impact business service delivery and continuity. These include supply chain provenance, life cycle integrity, governance, security, privacy and transparency.”
  • 14. What is Trust in the Cloud?“…..….the commission supports programs such as Security Content Automation Protocol, or S-CAP, a standard which enables the automation of reporting and verifying IT security control parameters. S-CAP provides a ready method to capture, test and continuously monitor the controls and integrity settings required to achieve the respective standard and/or compliance requirements.”
  • 15. Security ≠ TrustTraditional security methods focus on keeping bad code outHarris adds Positive Assurance enabling full integrity verification All active elements in the infrastructure are monitored and validated including servers & network components (firewalls, routers, switches)Explicit Trust through Positive Platform Assurance
  • 16. The Pillars of TrustTRUSTSupply ChainPositive AssuranceService DeliverySecurity & Compliance
  • 18. The Trusted Enterprise CloudWorld-class and purpose-built infrastructure – the Cyber Integration Center and Harris’ network of cyber facilities and operations centersBest-of-breed systems and processes – focused on virtualization, automation, a unique end-to-end service model, and customized control through the client portalTrust Enablement Technology – continuous monitoring and assessment of the device and software supply chain using our Global Trust Repository of 3 billion (growing by 3 million a day!) industry standard reference images and external vulnerability feedsApplication Data and Signature Database+2000 other vendorsGlobal Trust Repository(GTR)Enterprise Trust ServerCompliance AssessmentReferenceConfigurationsReportingInventory ReportsChange ReportsCompliance ReportsNotificationsIT InfrastructureEcommerce Service
  • 24. Directory ServersThe industry’s first enterprise-grade, high-assurance cloud computing solution
  • 25. Proof that the code was actually built by the named supplier is a crucial element of software and device validation or attestationTrust and Supply ChainDo I know that the software elements that I am loading and running on my platform ARE what they say they are?What proof do I have that the code I am using was actually built by the named vendor?Is an increasing concern for software & hardware vendors and users in all sectors
  • 26. Cyber Integration Center100,000 sq ft dedicated facility
  • 28. Operations support ISO 20000, ISO 27001, SAS70 Type 2, NIST 800-53-High
  • 30. IT capacity > 340 W/sq ft
  • 31. On site Client Operations & Security Center
  • 34. Five, 500 ton, high efficiency centrifugal chillers
  • 35. Chemical free cooling water reuse
  • 36. Green IT Audacious Idea AwardTwo physically diverse telecom pathways Two water sources used for coolingDual power sources from two separate substationsNine generators for backup power100’ perimeter security fence with intrusion detection
  • 37. Interior and exterior motion-activated video monitoring
  • 38. Biometric access scanners and man-trap portal
  • 39. 24/7/365 on-site security guards & video surveillanceDelivering Cyber Assurance Through Continuous Monitoring and ControlAutomation, Vulnerability Identification & Software Authenticity ValidationExplicit TrustAutomated Positive Platform Assurance and S/W Supply Chain validationS-CAP:Security Content Automated ProtocolConfiguration Management & Vulnerability AssessmentHigh Fidelity Software SignaturesSecurity Foundation is NIST SP800-53 (High Impact)Security Tools & Components (Based on SP800-53)Log MonitoringIntrusion PreventionAnti-MalwareDLPOtherFoundationAutomated Defense In Depth Security Controls via NIST SP800-53/37Risk Management – NIST SP800-37Complete Cyber Assurance
  • 40. Marquee Facility Backed by a Global Support NetworkHarris Cyber Integration CenterMultiple Harris Cyber facilities
  • 41. CapRock, GCS & Other network backbones
  • 44. 18 Teleports Across 6 Continents
  • 45. 6 Network Operations Centers (24x7)
  • 46. 83 PoPs on Global Terrestrial Network
  • 48. Choose the Cloud That’s Right for YouHarris Trusted Enterprise Cloud™Trusted Dedicated CloudClient ATrusted Dedicated CloudClient BTrusted Dedicated CloudClient CVPN or VPLSTrustedPrivateCloudTrusted Multi-Tenant CloudClient AClient BClient CClient EnterpriseCyber Integrated Solutions Client Operations & Security CenterChoose the elements of your cloud. Manage as one system.
  • 49. Choose the Cloud That’s Right for YouHarris Trusted Enterprise Cloud™Three core components to create the cloud architecture that is right for your enterprise
  • 51. Cloud Infrastructure as a Service (IaaS)
  • 52. Harris Trusted Enterprise Cloud security controls and trust enablement technology
  • 54. Control & management via the Cyber Operations and Security Center (COSC)Trusted Dedicated CloudClient ATrusted Dedicated CloudClient BTrusted Dedicated CloudClient CVPN or VPLSTrustedPrivateCloudTrusted Multi-Tenant CloudClient AClient BClient CClient EnterpriseCyber Integrated Solutions Client Operations & Security CenterChoose the elements of your cloud. Manage as one system.
  • 55. Trusted Enterprise Cloud ConfigurationsHosted cloud infrastructure for provisioning on demand
  • 56. Secure multi-tenant or dedicated single tenant infrastructure
  • 59. Designed to exceed the VCE VMDC 2.0 Reference ArchitectureTrusted Dedicated CloudClient ATrusted Dedicated CloudClient BTrusted Dedicated CloudClient CVPN or VPLSTrustedPrivateCloudTrusted Multi-Tenant CloudClient AClient BClient CClient EnterpriseCyber Integrated Solutions Client Operations & Security CenterChoose the elements of your cloud. Manage as one system.
  • 60. Trusted Private CloudOn-premise cloud – remotely managed by Harris Client Operations and Security Center
  • 61. Capacity and agility benefits of cloud computing with the control of on-premise equipment
  • 62. Harris trust enablement technologies
  • 63. Eases migration path to the cloudTrusted Enterprise CloudTrusted Dedicated CloudClient ATrusted Dedicated CloudClient BTrusted Dedicated CloudClient CVPN or VPLSTrustedPrivateCloudTrusted Multi-Tenant CloudClient AClient BClient CClient EnterpriseCyber Integrated Solutions Client Operations & Security CenterChoose the elements of your cloud. Manage as one system.
  • 64. Key Features & Benefits
  • 65. You Can Trust the Cloud!
  • 66. You Can Trust the Cloud!
  • 67. You Can Trust the Cloud!“The Harris Trusted Enterprise Cloud clearly offers advanced security and trust capabilities far in excess of what you'd normally find in the vast majority of enterprise IT environments.  It's arguably much better than you could do yourself, or – at least – do in a reasonable fashion.”“They created a purpose-built enterprise cloud that was arguably orders of magnitude more secure and more trusted than anything an IT environment could do for themselves.”“You'll see, it's far far better in many regards.”
  • 68. Trust In The CloudThe industry’s first enterprise-grade, high-assurance cloud computing solutionWorld class partners providing best of breed technologyCyber integration expertise to cost effectively meet the unique needs of your businessTrust enablement technology that goes beyond security to unprecedented visibility and control of your infrastructurewww.cyber.harris.com