Step 3: Four Things an IT Manager Can Do To Mitigate Security Vulnerabilities
With protection at the hardware level, you can build trust and compliance into your data center. This means you can: Provide the foundation for a more powerful layered security net of solutions and software features Put more granular controls closer to where your data lives and critical platform services Trust that the physical and virtual infrastructure provisioning your workloads is reliable Trust where your servers are located Control where the VMs are distributed Complement your audit and compliance requirements (for the business unit tenants in your private cloud or as a tenant in a public cloud) Protect confidential data and meet compliance requirements Intel IT is enabling new ways to provide the foundation for cloud controls that can secure data and workloads. We are adding new levels of visibility into what is running and who is running it so you can trust that the infrastructure is reliable and can support compliance. As Intel continues to move to the cloud, we are starting to increase the security level of our environment through greater understanding of what is running in the environment; what it should look like when it is “normal”—not compromised; strengthened data protection; and secure access. Intel recommends prioritizing your security investment through a risk assessment to determine the order and timing for building this level of trust and compliance into your data center in four areas. Encrypt to protect data. Establish a trusted foundation to secure the platform and the infrastructure. Build higher assurance into auditing to strengthen compliance. Establish and verify identities before you federate by controlling access to trusted clients from trusted systems. The remainder of this planning guide will look at how advanced server technologies—in particular, Intel® technologies—can help you build trust and compliance into your data center and set the foundation for cloud security.
12 Intel IT Center Planning Guide | Cloud Security