GRUPPO TELECOM ITALIA
Cloud Security @ TIM
Current Practises and Future Challanges
Michele Vecchione @ TIM
1st Workshop of the Project Cluster on Data Protection, Security and Privacy
in the Cloud. 23 February 2016, Napoli, Italy
2
The TIM Group in shortThe TIM Group in shortThe TIM Group in shortThe TIM Group in short
3
TIMTIMTIMTIM CloudCloudCloudCloud StrategyStrategyStrategyStrategy versus OTTversus OTTversus OTTversus OTT PlayersPlayersPlayersPlayers CLOUD e
strategia
Tim
Distinctive Factors of our Cloud Business Model
Three Distinctive factors differenciate TIM cloud offering from OTT players:
Proximity, Compliance to Security&Privacy and Excellence in Quality of experience
high
high
high
Proximity
Quality of
Experience
Compliance&
Security
OTT
TELCO
TelcoTelcoTelcoTelco OTTOTTOTTOTT
Proximity Direct Sales
PreSales Force,
CRM Exploitation,
Customisation,
Local
Infrastructures
Product Centric
Self Service
Quality of
Experience
E2E control
SLA
Low latency
Remote
No direct network
control
Compliance&
Security
EU regulation
SOC/NOC
Consultancy
Rely upon Internet
or third parties
Lower privacy
rules
4
CloudCloudCloudCloud adoptionadoptionadoptionadoption inininin ItalyItalyItalyItaly CLOUD e
strategia
Tim
There is space to grow…. … BUT there are some concerns
Building a secure cloud for hosting Enterprise SAAS is a TOP Priority
5
TIM Cloud Infrastructure: Data Centers
A Secure Physical Infrastructure
Titolo della Relazione
Nome del Relatore, Nome Struttura
RegionalRegionalRegionalRegional Service CentersService CentersService CentersService Centers
NationalNationalNationalNational DCsDCsDCsDCs
IDC CesanoIDC CesanoIDC CesanoIDC Cesano
MadernoMadernoMadernoMaderno
IDC RozzanoIDC RozzanoIDC RozzanoIDC Rozzano
DC BolognaDC BolognaDC BolognaDC Bologna
DC PadovaDC PadovaDC PadovaDC Padova
DC BariDC BariDC BariDC Bari
PalermPalermPalermPalerm
oooo
FirenFirenFirenFiren
zezezeze
TorinTorinTorinTorin
oooo
NapolNapolNapolNapol
iiii
DC OrioloDC OrioloDC OrioloDC Oriolo
RomanoRomanoRomanoRomano
IDC PomeziaIDC PomeziaIDC PomeziaIDC Pomezia
Nord Est AreaNord Est AreaNord Est AreaNord Est Area
BolognaBolognaBolognaBolognaPadovaPadovaPadovaPadova
Systems rooms #
Systems Rooms available area
• Production Systems rooms area
• TLC Systems rooms area
Installed/Active Servers #
• Managed Servers #
15151515 23232323
>4.100>4.100>4.100>4.100 >4.300>4.300>4.300>4.300
>3.600 >3.300
>250 >280
>1.100>1.100>1.100>1.100 >950>950>950>950
>900 >600
Nord Ovest AreaNord Ovest AreaNord Ovest AreaNord Ovest Area
CesanoCesanoCesanoCesanoRozzanoRozzanoRozzanoRozzano
Systems rooms #
Systems Rooms available area
• Production Systems rooms area
• TLC Systems rooms area
Installed/Active Servers #
• Managed Servers #
16161616 11111111
>4.800>4.800>4.800>4.800 >3.500>3.500>3.500>3.500
>4.500 >2.800
>280 >200
>4.700>4.700>4.700>4.700 >2.200>2.200>2.200>2.200
>1.300 >1.500
Center/South AreaCenter/South AreaCenter/South AreaCenter/South Area
OrioloOrioloOrioloOriolo
Systems rooms #
Systems Rooms available area
• Production Systems rooms area
• TLC Systems rooms area
Installed/Active Servers #
• Managed Servers #
13131313 16161616
>3.400>3.400>3.400>3.400 >6.600>6.600>6.600>6.600
>2.900 >6.100
>400 >400
>3.200>3.200>3.200>3.200 >5.400>5.400>5.400>5.400
>3.000 >3.000
BariBariBariBariPomeziaPomeziaPomeziaPomezia
6666
>2.000>2.000>2.000>2.000
>1.800
>90
>800>800>800>800
>700
AciliaAciliaAciliaAcilia
Work in progressWork in progressWork in progressWork in progress
ACILIAACILIAACILIAACILIA
Data Center TIER 4Data Center TIER 4Data Center TIER 4Data Center TIER 4
Area Size
Production System Rooms (6 m Height)
Hi Density power supply
Network supports
>>>>4.0000 mq4.0000 mq4.0000 mq4.0000 mq
>3.500 mq
Fino a 15 Kw/mq
SDN, NFV, NFV, NFV, NFV
6
LogicalLogicalLogicalLogical Security: 1)Security: 1)Security: 1)Security: 1) ClarifyClarifyClarifyClarify ResponsabilitiesResponsabilitiesResponsabilitiesResponsabilities accordingaccordingaccordingaccording totototo
thethethethe choosenchoosenchoosenchoosen Service Model and Distribution ModelService Model and Distribution ModelService Model and Distribution ModelService Model and Distribution Model
7
LogicalLogicalLogicalLogical Security: 2)Security: 2)Security: 2)Security: 2) ImplementImplementImplementImplement SecuritySecuritySecuritySecurity accordingaccordingaccordingaccording totototo
ResponsabilityResponsabilityResponsabilityResponsability
Cloud Service Provider Scope:
• Expose clear security levels of cloud SEs
• Inform customer about Certifications, Policies,
Processes, Responsabilities, Security Plan,
L. 196 obligations, and Checks (ex PT and VA)
in charge to TIM
• Contractually sign obligations and SLA
TIM
Customer
Customer Scope:
• Assist customer in understanding residual risk
• Consult the customer to secure its area of responsability
• Provide addictional Security Services and tools to mitigate its own risk
8
LogicalLogicalLogicalLogical Security: 3) SecuritySecurity: 3) SecuritySecurity: 3) SecuritySecurity: 3) Security asasasas a service toa service toa service toa service to supportsupportsupportsupport SAASSAASSAASSAAS
TIM
Security
Competence
Center
TIM
Security
Operation
Center
9
Market Security Addictional Services
Main Offered services
TIM Security Operation Center
AREAAREAAREAAREA
PROTECTIONPROTECTIONPROTECTIONPROTECTION
MAILMAILMAILMAIL
PROTECTIONPROTECTIONPROTECTIONPROTECTION
MSOCMSOCMSOCMSOC
HOSTHOSTHOSTHOST
PROTECTIONPROTECTIONPROTECTIONPROTECTION
SECURITYSECURITYSECURITYSECURITY
ASSESSMENTASSESSMENTASSESSMENTASSESSMENT
SECURITYSECURITYSECURITYSECURITY
MONITORINGMONITORINGMONITORINGMONITORING
DDOSDDOSDDOSDDOS
MITIGATIONMITIGATIONMITIGATIONMITIGATION
Virtual appliances to protect mission critical Web
Application, Data Bases o File Systems running into
the TIM cloud or on premises
Mail Relay service with Antispam &
Antivirus Layer for customer with Mail
Service offered by TIM or at Customer
Premises
Security Appliance Mgnt (IDS, IPS,
Boundary Antivirus, Web Content
Filtering, Antispam)
Distributed Denial-of-Service
Protection, to protect from attacks
aiming to block the service to
legitimate users.
Periodic Vulnerability Assessments,
Penetration Testing, Source Code Audit
executed by the TIM SOC
Monitoring of corporate anti-intrusion
systems to identify and block potential
attacks from internet as well as intranet
users and prevent system violation
• Cisco CCNA (Cisco Certified Network
Associate)
• Microsoft: “Microsoft Windows server”
• SCJP - Sun Certified Java Programmer
• ISO 20000 & 27001 Lead Auditor
• ECDL Core
• QCS - QualysGuard Certified Specialist
• Certified Information Forensics
Investigator – CIFI
• EC-Council Certified Security Analyst –
ECSA
• EC-Council Licensed Penetration Tester
– LTP
• Certified Ethical Hacker – CEH v7
• Microsoft Certified Systems Engineer
• CompTIA Security+ Certified (SYO-201)
• Fortinet Certified Network and Security
Associate (FCNSA)
• Juniper Networks Certified Internet
Associate (JNCIA-FWV)
• QualysGuard Certified Specialist
• Hands on Hacking Web Application
(HOH)
• Network and system security for
company and public administration
• Clavister Firewall Certification
• IT Security & Digital Forensics (Master)
• ISO 9000
• ISO 27001
10
The world is changing rapidly: new security challanges
Where is my Perimeter? With Mobility and cloud, The company perimeter is now The
Internet! New cloud security Access Layers are required to secure corporate Apps
and data that are aware of used endpoint, access location, OS, Strong digital
Identity, and used application .
Titolo della Relazione
Nome del Relatore, Nome Struttura
How can I intelligently scan all of my Huge Cloud traffic? An enourmous amount of
information about activity monitoring Logs (users, Admins), Anomalies detection
(threads, usage, traffic, data scan) need to be handled every day. A big data
approch must be undertaken.
How I secure IoT? With IoT, Billions of low power and limited CPU devices with be
connected to applications generating trillions of daily events.
How I secure Smartphones? MDM and BYOD have low penetration. How do I secure
these endpoints in a more easy way?
11
The world is changing rapidly: new security challanges
How can IHow can IHow can IHow can I enforceenforceenforceenforce datadatadatadata protectionprotectionprotectionprotection usingusingusingusing cloudcloudcloudcloud???? Corporate applications needs to
enforce data protection in different cloud deployment scenarios. How can I get
visibility on Shadow Cloud? How can I get contextual access control and prevent
data leakage on the cloud?
How can IHow can IHow can IHow can I securesecuresecuresecure the agile and collaborativethe agile and collaborativethe agile and collaborativethe agile and collaborative developmentsdevelopmentsdevelopmentsdevelopments???? Devops is growing
Fast. With continous Development, integration and delivery it is necessary to shift
from a traditional SLDC security enforcement to a more dynamic security
framework.
12
Our Vision: Creating an Digital Ecosystem around the TIM
Cloud
• Expose our Infrastructural assets
(Network, BSS, CRM, Data Sets)
• Aggregate and attract Extewrnal
Communities (R&D, Start-ups, PPAA,
System Integrators, ISV,..)
• Broker Third Parties
(Cloud providers, SW Vendors,..)
• Enable an API economy
• Expose Commercial Capabilities
(sales force, resellers, payments)
• Enable collaborative Dev for
new generation of cloud- ready SAAS
(Mashup, Devops. Micro services)
• Sell IAAS, PAAS and SAAS
• Monetise the community
13
New Security Requirements
• In the new Cloud Ecosystem new security requirements arise:
Titolo della Relazione
Nome del Relatore, Nome Struttura
• Secuity Pre-scan at Dev Stage
• Automatic Testing at Build and Push Time
• Secure microservices Registry
• Scanning container at run time
• WL/BL Container Registry
• Signed containers
• Centralise Log (Big Data)
• Contextual Access Control
• Ecrypt data in motion and data at rest
• Orchestrate enviroments (Dev, Test, Prod)
• Provide Dashboard for security Risk Ass
• Discover Shadow cloud apps
• Protect Mobile and IoT devices with
client less approach
• Provide SSO / Digital ID across apps
• Multi Factor Strong Auth
• IAM across apps
14
Conclusions
• The trend of porting into the cloud existing legacy applications with well defined monolithic
sw architecture will fade away with time
• New security threads are continously arising from new emerging technologies such as IoT,
PAAS, middleware frameworks, microservices, containers,..
• The new TIM cloud will quickly become a collaborative enviroment where a number of
different entities will create together new services by aggregating capabilities under the form
of API, Building blocks, micro-services offered by community members.
Titolo della Relazione
Nome del Relatore, Nome Struttura
The scientific community need to help CPs with new Security Technologies,
Solutions, Methodologies and Standards.
The Cloud MUST Communicate SECURITY By Design!
GrazieThank You!
Michele Vecchione
TIM
Director Vertical Platform Engineering
Michele.vecchione@telecomitalia.it

More Related Content

PDF
Uni palermo 3 3-2016 cloud 2.0
PPTX
Cloud security privacy- org
PPTX
CLOUD SECURITY IN INSURANCE INDUSTRY WITH RESPECT TO INDIAN MARKET
PPTX
Chap 6 cloud security
PDF
PDF
IoT architecture
PDF
Cloud Computing and Security - ISACA Hyderabad Chapter Presentation
PPTX
Security in cloud computing
Uni palermo 3 3-2016 cloud 2.0
Cloud security privacy- org
CLOUD SECURITY IN INSURANCE INDUSTRY WITH RESPECT TO INDIAN MARKET
Chap 6 cloud security
IoT architecture
Cloud Computing and Security - ISACA Hyderabad Chapter Presentation
Security in cloud computing

What's hot (20)

PDF
SN-Security Architecture for Mobile Computing and IoT
PDF
Challenges with Cloud Security by Ken Y Chan
PDF
Data security in cloud environment
PPTX
Security as a Service Model for Cloud Environment
PPTX
Security As A Service In Cloud(SECaaS)
PDF
Cloud Security: challenges and perspectives.
PDF
Cloud Security Demystified
PPTX
CCSK Certificate of Cloud Computing Knowledge - overview
PDF
CCSK, cloud security framework, Indonesia
PPTX
cloud security ppt
PPTX
Cloud Security
PPTX
Cloud computing Risk management
PDF
Cloud security
PDF
Cloud Security & Cloud Encryption Explained
PDF
Cloud Security - Emerging Facets and Frontiers
PDF
Cloud Security And Privacy
PDF
Cloud Computing Security - Cloud Controls Security
PPTX
2012 10 cloud security architecture
PDF
Secaa s cat_10_network_security_implementation_guidance
PPTX
Cloud Computing Security
SN-Security Architecture for Mobile Computing and IoT
Challenges with Cloud Security by Ken Y Chan
Data security in cloud environment
Security as a Service Model for Cloud Environment
Security As A Service In Cloud(SECaaS)
Cloud Security: challenges and perspectives.
Cloud Security Demystified
CCSK Certificate of Cloud Computing Knowledge - overview
CCSK, cloud security framework, Indonesia
cloud security ppt
Cloud Security
Cloud computing Risk management
Cloud security
Cloud Security & Cloud Encryption Explained
Cloud Security - Emerging Facets and Frontiers
Cloud Security And Privacy
Cloud Computing Security - Cloud Controls Security
2012 10 cloud security architecture
Secaa s cat_10_network_security_implementation_guidance
Cloud Computing Security
Ad

Viewers also liked (20)

PDF
Pronunciamiento a la opinión pública nacional e internacional
DOCX
Carta descriptiva webquest
PDF
Recommendation Letter.ORU-Dr. Guthrie
DOC
Mary Elizabeth Bell CV
PDF
Kepler monitoring l_dwarfs_spot
DOCX
Breea Willingham
PPT
Invest Crowdfunding @MontrealNewTech v.en
PPT
Presentación beneficios de produccion
ODP
Introduction to gcin & its internal
PDF
WhoKnew April
PDF
PDF
MissLSUPurple
PDF
Crowdfunding Training - How to Raise $45k in 30 days.
PDF
Gastcollege Bitcoin en Blockchain
PPTX
T3 (Annex) edafologia AG1012
PPTX
T3 Els processos que transformen les roques
PPTX
T1 Edafologia AG1012
PPT
Topical paincontrolmedication
PDF
Jill Konrath - Optimize Me: Insanely More Productive Sales Strategies
DOCX
Ultimo trabajo
Pronunciamiento a la opinión pública nacional e internacional
Carta descriptiva webquest
Recommendation Letter.ORU-Dr. Guthrie
Mary Elizabeth Bell CV
Kepler monitoring l_dwarfs_spot
Breea Willingham
Invest Crowdfunding @MontrealNewTech v.en
Presentación beneficios de produccion
Introduction to gcin & its internal
WhoKnew April
MissLSUPurple
Crowdfunding Training - How to Raise $45k in 30 days.
Gastcollege Bitcoin en Blockchain
T3 (Annex) edafologia AG1012
T3 Els processos que transformen les roques
T1 Edafologia AG1012
Topical paincontrolmedication
Jill Konrath - Optimize Me: Insanely More Productive Sales Strategies
Ultimo trabajo
Ad

Similar to Cloud Security @ TIM - Current Practises and Future Challanges (20)

PDF
Resetting Your Security Thinking for the Public Cloud
PPTX
BSNL Presentation on their service portfolio
PDF
System Security on Cloud
PDF
Head in the Clouds? Let’s get serious about how to benefit from Cloud platfor...
PPTX
Blueprint for creating a Secure IoT Product
PPTX
Cloud Computing Security Frameworks - our view from exoscale
PDF
Avoiding Limitations of Traditional Approaches to Security
PPTX
The Cloud 9 - Threat & Solutions 2016 by Bobby Dominguez
PPTX
security and compliance in the cloud
PPTX
Minimizing Compliance Resistance to Digital Transformation --- Design for reg...
PDF
AWS Chicago user group meetup on June 24, 2014
PPTX
Monetizing The Enterprise: Borderless Networks
PDF
Cloud & Cybersecurity
PPTX
Cloud Security
PDF
A Different Approach to Securing Your Cloud Journey
PPTX
Comprehensive Cloud Security Requires an Automated Approach
PPTX
Network and Security Reference Architecture For Driving Workstyle Transformation
PPTX
Internet of Things (IOT) Cloud Security by Dr. Anton Ravindran
PDF
Practical Cloud Security A Guide for Secure Design and Deployment 1st Edition...
PDF
Securing your telco cloud
Resetting Your Security Thinking for the Public Cloud
BSNL Presentation on their service portfolio
System Security on Cloud
Head in the Clouds? Let’s get serious about how to benefit from Cloud platfor...
Blueprint for creating a Secure IoT Product
Cloud Computing Security Frameworks - our view from exoscale
Avoiding Limitations of Traditional Approaches to Security
The Cloud 9 - Threat & Solutions 2016 by Bobby Dominguez
security and compliance in the cloud
Minimizing Compliance Resistance to Digital Transformation --- Design for reg...
AWS Chicago user group meetup on June 24, 2014
Monetizing The Enterprise: Borderless Networks
Cloud & Cybersecurity
Cloud Security
A Different Approach to Securing Your Cloud Journey
Comprehensive Cloud Security Requires an Automated Approach
Network and Security Reference Architecture For Driving Workstyle Transformation
Internet of Things (IOT) Cloud Security by Dr. Anton Ravindran
Practical Cloud Security A Guide for Secure Design and Deployment 1st Edition...
Securing your telco cloud

Recently uploaded (20)

PPTX
Internet of Everything -Basic concepts details
PPTX
Modernising the Digital Integration Hub
PPT
Module 1.ppt Iot fundamentals and Architecture
PPTX
Build Your First AI Agent with UiPath.pptx
PDF
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
PDF
Consumable AI The What, Why & How for Small Teams.pdf
PDF
Enhancing plagiarism detection using data pre-processing and machine learning...
PDF
Credit Without Borders: AI and Financial Inclusion in Bangladesh
PDF
A review of recent deep learning applications in wood surface defect identifi...
PDF
“A New Era of 3D Sensing: Transforming Industries and Creating Opportunities,...
PDF
Taming the Chaos: How to Turn Unstructured Data into Decisions
PDF
OpenACC and Open Hackathons Monthly Highlights July 2025
PDF
STKI Israel Market Study 2025 version august
PDF
Architecture types and enterprise applications.pdf
PDF
Convolutional neural network based encoder-decoder for efficient real-time ob...
PPTX
AI IN MARKETING- PRESENTED BY ANWAR KABIR 1st June 2025.pptx
PDF
sbt 2.0: go big (Scala Days 2025 edition)
PDF
A contest of sentiment analysis: k-nearest neighbor versus neural network
PDF
Getting started with AI Agents and Multi-Agent Systems
PPTX
Final SEM Unit 1 for mit wpu at pune .pptx
Internet of Everything -Basic concepts details
Modernising the Digital Integration Hub
Module 1.ppt Iot fundamentals and Architecture
Build Your First AI Agent with UiPath.pptx
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
Consumable AI The What, Why & How for Small Teams.pdf
Enhancing plagiarism detection using data pre-processing and machine learning...
Credit Without Borders: AI and Financial Inclusion in Bangladesh
A review of recent deep learning applications in wood surface defect identifi...
“A New Era of 3D Sensing: Transforming Industries and Creating Opportunities,...
Taming the Chaos: How to Turn Unstructured Data into Decisions
OpenACC and Open Hackathons Monthly Highlights July 2025
STKI Israel Market Study 2025 version august
Architecture types and enterprise applications.pdf
Convolutional neural network based encoder-decoder for efficient real-time ob...
AI IN MARKETING- PRESENTED BY ANWAR KABIR 1st June 2025.pptx
sbt 2.0: go big (Scala Days 2025 edition)
A contest of sentiment analysis: k-nearest neighbor versus neural network
Getting started with AI Agents and Multi-Agent Systems
Final SEM Unit 1 for mit wpu at pune .pptx

Cloud Security @ TIM - Current Practises and Future Challanges

  • 1. GRUPPO TELECOM ITALIA Cloud Security @ TIM Current Practises and Future Challanges Michele Vecchione @ TIM 1st Workshop of the Project Cluster on Data Protection, Security and Privacy in the Cloud. 23 February 2016, Napoli, Italy
  • 2. 2 The TIM Group in shortThe TIM Group in shortThe TIM Group in shortThe TIM Group in short
  • 3. 3 TIMTIMTIMTIM CloudCloudCloudCloud StrategyStrategyStrategyStrategy versus OTTversus OTTversus OTTversus OTT PlayersPlayersPlayersPlayers CLOUD e strategia Tim Distinctive Factors of our Cloud Business Model Three Distinctive factors differenciate TIM cloud offering from OTT players: Proximity, Compliance to Security&Privacy and Excellence in Quality of experience high high high Proximity Quality of Experience Compliance& Security OTT TELCO TelcoTelcoTelcoTelco OTTOTTOTTOTT Proximity Direct Sales PreSales Force, CRM Exploitation, Customisation, Local Infrastructures Product Centric Self Service Quality of Experience E2E control SLA Low latency Remote No direct network control Compliance& Security EU regulation SOC/NOC Consultancy Rely upon Internet or third parties Lower privacy rules
  • 4. 4 CloudCloudCloudCloud adoptionadoptionadoptionadoption inininin ItalyItalyItalyItaly CLOUD e strategia Tim There is space to grow…. … BUT there are some concerns Building a secure cloud for hosting Enterprise SAAS is a TOP Priority
  • 5. 5 TIM Cloud Infrastructure: Data Centers A Secure Physical Infrastructure Titolo della Relazione Nome del Relatore, Nome Struttura RegionalRegionalRegionalRegional Service CentersService CentersService CentersService Centers NationalNationalNationalNational DCsDCsDCsDCs IDC CesanoIDC CesanoIDC CesanoIDC Cesano MadernoMadernoMadernoMaderno IDC RozzanoIDC RozzanoIDC RozzanoIDC Rozzano DC BolognaDC BolognaDC BolognaDC Bologna DC PadovaDC PadovaDC PadovaDC Padova DC BariDC BariDC BariDC Bari PalermPalermPalermPalerm oooo FirenFirenFirenFiren zezezeze TorinTorinTorinTorin oooo NapolNapolNapolNapol iiii DC OrioloDC OrioloDC OrioloDC Oriolo RomanoRomanoRomanoRomano IDC PomeziaIDC PomeziaIDC PomeziaIDC Pomezia Nord Est AreaNord Est AreaNord Est AreaNord Est Area BolognaBolognaBolognaBolognaPadovaPadovaPadovaPadova Systems rooms # Systems Rooms available area • Production Systems rooms area • TLC Systems rooms area Installed/Active Servers # • Managed Servers # 15151515 23232323 >4.100>4.100>4.100>4.100 >4.300>4.300>4.300>4.300 >3.600 >3.300 >250 >280 >1.100>1.100>1.100>1.100 >950>950>950>950 >900 >600 Nord Ovest AreaNord Ovest AreaNord Ovest AreaNord Ovest Area CesanoCesanoCesanoCesanoRozzanoRozzanoRozzanoRozzano Systems rooms # Systems Rooms available area • Production Systems rooms area • TLC Systems rooms area Installed/Active Servers # • Managed Servers # 16161616 11111111 >4.800>4.800>4.800>4.800 >3.500>3.500>3.500>3.500 >4.500 >2.800 >280 >200 >4.700>4.700>4.700>4.700 >2.200>2.200>2.200>2.200 >1.300 >1.500 Center/South AreaCenter/South AreaCenter/South AreaCenter/South Area OrioloOrioloOrioloOriolo Systems rooms # Systems Rooms available area • Production Systems rooms area • TLC Systems rooms area Installed/Active Servers # • Managed Servers # 13131313 16161616 >3.400>3.400>3.400>3.400 >6.600>6.600>6.600>6.600 >2.900 >6.100 >400 >400 >3.200>3.200>3.200>3.200 >5.400>5.400>5.400>5.400 >3.000 >3.000 BariBariBariBariPomeziaPomeziaPomeziaPomezia 6666 >2.000>2.000>2.000>2.000 >1.800 >90 >800>800>800>800 >700 AciliaAciliaAciliaAcilia Work in progressWork in progressWork in progressWork in progress ACILIAACILIAACILIAACILIA Data Center TIER 4Data Center TIER 4Data Center TIER 4Data Center TIER 4 Area Size Production System Rooms (6 m Height) Hi Density power supply Network supports >>>>4.0000 mq4.0000 mq4.0000 mq4.0000 mq >3.500 mq Fino a 15 Kw/mq SDN, NFV, NFV, NFV, NFV
  • 6. 6 LogicalLogicalLogicalLogical Security: 1)Security: 1)Security: 1)Security: 1) ClarifyClarifyClarifyClarify ResponsabilitiesResponsabilitiesResponsabilitiesResponsabilities accordingaccordingaccordingaccording totototo thethethethe choosenchoosenchoosenchoosen Service Model and Distribution ModelService Model and Distribution ModelService Model and Distribution ModelService Model and Distribution Model
  • 7. 7 LogicalLogicalLogicalLogical Security: 2)Security: 2)Security: 2)Security: 2) ImplementImplementImplementImplement SecuritySecuritySecuritySecurity accordingaccordingaccordingaccording totototo ResponsabilityResponsabilityResponsabilityResponsability Cloud Service Provider Scope: • Expose clear security levels of cloud SEs • Inform customer about Certifications, Policies, Processes, Responsabilities, Security Plan, L. 196 obligations, and Checks (ex PT and VA) in charge to TIM • Contractually sign obligations and SLA TIM Customer Customer Scope: • Assist customer in understanding residual risk • Consult the customer to secure its area of responsability • Provide addictional Security Services and tools to mitigate its own risk
  • 8. 8 LogicalLogicalLogicalLogical Security: 3) SecuritySecurity: 3) SecuritySecurity: 3) SecuritySecurity: 3) Security asasasas a service toa service toa service toa service to supportsupportsupportsupport SAASSAASSAASSAAS TIM Security Competence Center TIM Security Operation Center
  • 9. 9 Market Security Addictional Services Main Offered services TIM Security Operation Center AREAAREAAREAAREA PROTECTIONPROTECTIONPROTECTIONPROTECTION MAILMAILMAILMAIL PROTECTIONPROTECTIONPROTECTIONPROTECTION MSOCMSOCMSOCMSOC HOSTHOSTHOSTHOST PROTECTIONPROTECTIONPROTECTIONPROTECTION SECURITYSECURITYSECURITYSECURITY ASSESSMENTASSESSMENTASSESSMENTASSESSMENT SECURITYSECURITYSECURITYSECURITY MONITORINGMONITORINGMONITORINGMONITORING DDOSDDOSDDOSDDOS MITIGATIONMITIGATIONMITIGATIONMITIGATION Virtual appliances to protect mission critical Web Application, Data Bases o File Systems running into the TIM cloud or on premises Mail Relay service with Antispam & Antivirus Layer for customer with Mail Service offered by TIM or at Customer Premises Security Appliance Mgnt (IDS, IPS, Boundary Antivirus, Web Content Filtering, Antispam) Distributed Denial-of-Service Protection, to protect from attacks aiming to block the service to legitimate users. Periodic Vulnerability Assessments, Penetration Testing, Source Code Audit executed by the TIM SOC Monitoring of corporate anti-intrusion systems to identify and block potential attacks from internet as well as intranet users and prevent system violation • Cisco CCNA (Cisco Certified Network Associate) • Microsoft: “Microsoft Windows server” • SCJP - Sun Certified Java Programmer • ISO 20000 & 27001 Lead Auditor • ECDL Core • QCS - QualysGuard Certified Specialist • Certified Information Forensics Investigator – CIFI • EC-Council Certified Security Analyst – ECSA • EC-Council Licensed Penetration Tester – LTP • Certified Ethical Hacker – CEH v7 • Microsoft Certified Systems Engineer • CompTIA Security+ Certified (SYO-201) • Fortinet Certified Network and Security Associate (FCNSA) • Juniper Networks Certified Internet Associate (JNCIA-FWV) • QualysGuard Certified Specialist • Hands on Hacking Web Application (HOH) • Network and system security for company and public administration • Clavister Firewall Certification • IT Security & Digital Forensics (Master) • ISO 9000 • ISO 27001
  • 10. 10 The world is changing rapidly: new security challanges Where is my Perimeter? With Mobility and cloud, The company perimeter is now The Internet! New cloud security Access Layers are required to secure corporate Apps and data that are aware of used endpoint, access location, OS, Strong digital Identity, and used application . Titolo della Relazione Nome del Relatore, Nome Struttura How can I intelligently scan all of my Huge Cloud traffic? An enourmous amount of information about activity monitoring Logs (users, Admins), Anomalies detection (threads, usage, traffic, data scan) need to be handled every day. A big data approch must be undertaken. How I secure IoT? With IoT, Billions of low power and limited CPU devices with be connected to applications generating trillions of daily events. How I secure Smartphones? MDM and BYOD have low penetration. How do I secure these endpoints in a more easy way?
  • 11. 11 The world is changing rapidly: new security challanges How can IHow can IHow can IHow can I enforceenforceenforceenforce datadatadatadata protectionprotectionprotectionprotection usingusingusingusing cloudcloudcloudcloud???? Corporate applications needs to enforce data protection in different cloud deployment scenarios. How can I get visibility on Shadow Cloud? How can I get contextual access control and prevent data leakage on the cloud? How can IHow can IHow can IHow can I securesecuresecuresecure the agile and collaborativethe agile and collaborativethe agile and collaborativethe agile and collaborative developmentsdevelopmentsdevelopmentsdevelopments???? Devops is growing Fast. With continous Development, integration and delivery it is necessary to shift from a traditional SLDC security enforcement to a more dynamic security framework.
  • 12. 12 Our Vision: Creating an Digital Ecosystem around the TIM Cloud • Expose our Infrastructural assets (Network, BSS, CRM, Data Sets) • Aggregate and attract Extewrnal Communities (R&D, Start-ups, PPAA, System Integrators, ISV,..) • Broker Third Parties (Cloud providers, SW Vendors,..) • Enable an API economy • Expose Commercial Capabilities (sales force, resellers, payments) • Enable collaborative Dev for new generation of cloud- ready SAAS (Mashup, Devops. Micro services) • Sell IAAS, PAAS and SAAS • Monetise the community
  • 13. 13 New Security Requirements • In the new Cloud Ecosystem new security requirements arise: Titolo della Relazione Nome del Relatore, Nome Struttura • Secuity Pre-scan at Dev Stage • Automatic Testing at Build and Push Time • Secure microservices Registry • Scanning container at run time • WL/BL Container Registry • Signed containers • Centralise Log (Big Data) • Contextual Access Control • Ecrypt data in motion and data at rest • Orchestrate enviroments (Dev, Test, Prod) • Provide Dashboard for security Risk Ass • Discover Shadow cloud apps • Protect Mobile and IoT devices with client less approach • Provide SSO / Digital ID across apps • Multi Factor Strong Auth • IAM across apps
  • 14. 14 Conclusions • The trend of porting into the cloud existing legacy applications with well defined monolithic sw architecture will fade away with time • New security threads are continously arising from new emerging technologies such as IoT, PAAS, middleware frameworks, microservices, containers,.. • The new TIM cloud will quickly become a collaborative enviroment where a number of different entities will create together new services by aggregating capabilities under the form of API, Building blocks, micro-services offered by community members. Titolo della Relazione Nome del Relatore, Nome Struttura The scientific community need to help CPs with new Security Technologies, Solutions, Methodologies and Standards. The Cloud MUST Communicate SECURITY By Design!