As the central authority over all change requests, HyTrust Appliance provides granular, user-specific log records that can be used for regulatory compliance, troubleshooting, and forensic analysis. It offers deep visibility into the state of the virtual infrastructure. Unlike VMware vCenter* Server, HyTrust Appliance not only records valid requests but invalid attempts as well—which is critical for security purposes. Additionally, every request is tied to the identity of a specific user, and all relevant information—actual request, source IP, target IP, and so forth—is collected. With total visibility from HyTrust, organizations can handle audits easily and rely on their logs for forensics if there is ever a need for investigation.
The McAfee Cloud Security Platform enforces data protection policies for information leaving the network through e-mail, web mail, instant messaging, wikis, blogs, portals, and Web 2.0 technologies. Customers can take a variety of remediation actions—including encrypting, redirecting, quarantining, and even blocking—to ensure compliance with regulations governing the privacy of sensitive information and reduce the data risk to the business. The McAfee Cloud Security Platform also provides comprehensive incident reporting and monitoring to gather all needed data, such as sender, recipient, time stamp, and network evidence, for proper analysis, investigation and audit, remediation, and risk assessment.
OpSource tracks each activity or change to the cloud environment. Every change made to the system (adding a user, deleting a user, adding a server, changing the CPU on a server, deleting a server, and so forth) is tracked and logged. Usage is also logged. Logging and the ability to create reports are critical to providing the audit trail necessary to meet strict audit and compliance requirements. OpSource is also SAS 70 Type II certified, enabling our customers to simplify and accelerate their own certification processes.
One of our core strengths is consolidating security data and audit logs in a single location for a unified reporting view of the entire organization’s security posture. SecRAMP’s team provides security audit support as part of our managed service, which makes it easy to tune, automate, consolidate, and report on security events and audit logs. These services are provided to cloud security customers to help simplify the tasks involved in proving regulatory compliance to the various certifying bodies. Our architecture allows us to easily provide supporting data for audits such as Payment Card Industry (PCI), Sarbanes-Oxley (SOX), and FISMA.
Our hypervisor security monitoring tools include compliance auditing of all of a customer’s systems. Compliance audit rule sets can either be custom defined, or we can use prebuilt compliance assessments based on common industry best practices and leading regulatory standards. The tools provide reporting capabilities that facilitate third-party auditing requirements for SSAE 16, FISMA, Federal Financial Institutions Examination Council (FFIEC), PCI-DSS, National Institute of Standards and Technology (NIST), and so forth.
25 Intel IT Center Vendor Round Table | Cloud Security