Sign Insider My list ({}% $ quantity) My Briefcase ({$ quantity}) My Downloads ({$ quantity}) Logout More News ICT ICT ICT ICT Strategy Background ICT Business IT Library
Topics CITE 2014 Digitization Cost Internet of Things Privacy Policy Big Data Blog Business Intelligence Career Cloud Consumerization Data Center Development Ecommerce Hardware IT Management Management Market Trends Mobility Networking Open Source Outsourcing Government Project Management Social Media Software Storage Telecommunication Virtualization Young Pro Specials Zero Distance Events CIO Summit 2014
Overview topics + CITE 2014 + Digitizing + Cost + Internet of Things + Privacy tomb raider Policy Big Data Blog Business Intelligence Career Cloud Consumerization Data Center Development Ecommerce Hardware IT Management Management Market Trends Mobility Networking Open Source Outsourcing Government Project Management Social Media Software Storage Telecommunication Virtualization Young Pro Zero Distance CIO Summit 2014
Opinion - Reliable application and data security for cloud service providers (CSP) business critical. A challenging component is the PCI compliancy, to handle safely. All payment details from customers tomb raider
The Payment Card Industry (PCI) Council, composed by all the major credit card companies, was launched in 2006 with the development of their Data Security Standards (DSS). That's 12 standards for both safely handling and storing information about users and credit card payments, in order to prevent fraud., Hacking and other security threats That PCI DDS standards also apply to all parts of the ICT infrastructure, including applications, servers, network devices and virtualized machines (VMs).
In the 2013 revision of PCI DDS are some considerations and tools added to give measure for different cloud components and services. Their PCI compliancy CSPs the opportunity Depending on the service they provide models (SaaS, PaaS or IaaS), namely the different roles and responsibilities split between the CSP and its customers. PCI compliancy for CSPs today an important aspect in marketing to convince their security reliability customers. The virtualization dilemma
In the 2013 PCI guidelines state that several virtualization structures require their own security solution. There is no one-size-fits-all solution, because of the differences between private, public and hybrid clouds. Furthermore, the compliance also depends on the agreements made between the CSP and its client. Fortunately, there are basic guidelines that they must all meet. Like the fact that the CSP is responsible tomb raider for the complete security from the data center to the hypervisor level. It is quite easy to satisfy by choosing sufficiently prevent information leakage and also provides enough capacity and scalability hardware.
Furthermore, providers should work with SaaS and PaaS models, actually 100% guarantee tomb raider the security and control at the level of the application-related cloud layers. In other words, there is hardly anything the customer requires. That application layers are the most dynamic part of the CSP business, tomb raider which was hitherto difficult to ensure compliance. A good solution for this are known as application delivery controllers (ADC), which is precisely at this layer are doing their job. Application delivery controllers provide a solution
ADCs are the new generation tomb raider load balancers, which besides guaranteeing the application performance at layer 4 through 7, performing more and more security tasks nowadays. Simply because they contain special purpose fast hardware and software. These appliances offer comprehensive tomb raider security tomb raider software with its multi-tenancy services, including Web Application Firewall (WAF), SSL / TLS and STARTTLS encryption tomb raider and DDoS protection. tomb raider This allows CSPs to 1-9 PCI standards. By integrating with other IT infrastructure and security tools, ADCs in the right place in the network tomb raider is within reach full compliance.
Additionally tomb raider always there was a need to establish clear security procedures to worry about the roles and responsibilities agreements with customers and schools at applying it. All CSP staff Other people keep unnecessary because the weakest link in the PCI compliant security solution.
My insider overview Logout
1 other jobs
Development tomb raider Lead IT
Flexible
CIO newsletter
No comments:
Post a Comment