Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Download
Standard view
Full view
of .
Look up keyword
Like this
1Activity
0 of .
Results for:
No results containing your search query
P. 1
BT Cloud Compute Security by Charles Fox

BT Cloud Compute Security by Charles Fox

Ratings: (0)|Views: 73|Likes:
Published by BT Let's Talk
BT Cloud Compute Security.
Together, we make the cloud secure.

This white paper describes the security perspective of IaaS (Infrastructure as a service) for BT Cloud Compute.

Author: Charles Fox, Enterprise Architect Cyber Warfare, BT.
BT Cloud Compute Security.
Together, we make the cloud secure.

This white paper describes the security perspective of IaaS (Infrastructure as a service) for BT Cloud Compute.

Author: Charles Fox, Enterprise Architect Cyber Warfare, BT.

More info:

Categories:Types, Research
Published by: BT Let's Talk on Sep 16, 2013
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less

10/23/2013

pdf

text

original

 
This white paper describes the security perspective of IaaS(Infrastructure as a service) for BT Cloud ComputeAuthor: Charles Fox, Enterprise Architect Cyber Warfare, BT 
BT Cloud Compute Security
Together, we make the cloud secure
 
BT Compute. Services that adapt
BT Compute. Services that adapt
 
2
BT Cloud Compute Security
Table of contents
1. Introduction
3
2. The cloud: vulnerable, without protection
6 
2.1
Virtualisation and Hypervisor-based attacks 7 
2.2
Insider threats: across the CSP and your organisation 8 
2.3
Data movement and remnants 8
2.4
Phishing attacks to compromise accounts 8 
2.5
Legal and jurisdictional threats 9 
2.6
Threats to physical infrastructure 9 
2.7
Threats to shared infrastructure 9 
2.8
Summary of threats 10
3. BT Cloud Compute: reassuring operational security
11 
3.1
BT Operational Security Controls: ISO compliance 12 
3.2
BT Operational Security Controls: addressing security incidents 12 
3.3
BT Operational Security Controls: addressing data security threats 14 
3.4
BT Operational Security Controls: ghting Hypervisor attack threats
15
4. Personnel security: people on your side
16 
4.1
BT Security Controls: countering insider threats and phishing attacks 17
5. Successfully managing identity and access
18
6. Data and service: portability and protection
20
7. Supply chain assurance
22
8. Ensuring physical security
23
 9. Safeguarding business continuity
25
10. Meeting regulatory and legal requirements
27
 
 
3
BT Cloud Compute Security
1. Introduction
Our expertise. Your ownership. World-leading cloud security
As the popularity of BT cloud services grows, our approach to helping you keep your data securebecomes ever more proactive and innovative. Always remember that real security in the cloud is theresult of a joint effort: it involves you as much as us.This document makes you aware of the threats every cloud user potentially faces. We’ll introduceyou to advanced security measures to counteract them, and the policies and procedures we have inplace to help you safeguard your valuable information.We’ll also make you aware of the responsibility you must necessarily take for the protection of yourown data.
You can then enjoy not only the freedom of control, but also the reassurance of security, from one of theworld’s leading cloud service providers.Together, we can make sure your company enjoys all the advantages and power of the cloud, without theworry for your data’s safety.

You're Reading a Free Preview

Download
scribd
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->