23
Architecture, Security and Scalability in the Cloud Andrey Kolesnikov VP, TechOps Pritesh Parekh Chief Security Officer

Subscribed 2015: Architecture, Security, Scalability

Embed Size (px)

Citation preview

Page 1: Subscribed 2015: Architecture, Security, Scalability

Architecture, Security and Scalability in the Cloud

Andrey Kolesnikov VP, TechOps

Pritesh ParekhChief Security Officer

Page 2: Subscribed 2015: Architecture, Security, Scalability

Agenda

Industry Trends

Compliance Strategy

Securing SaaS

Product Security

Look Inside the platform

Scale and Resiliency

Ops Approach

Page 3: Subscribed 2015: Architecture, Security, Scalability

Security and

Trust

Page 4: Subscribed 2015: Architecture, Security, Scalability

Industry Data

Security Breaches

Courtesy: www.informationisbeautiful.net

Page 5: Subscribed 2015: Architecture, Security, Scalability

Courtesy: Symantec 2015 Internet Security Threat Report

Industry Data

Security Breaches

2014

Page 6: Subscribed 2015: Architecture, Security, Scalability

Courtesy: Symantec 2015 Internet Security Threat Report

Industry Data

Security Breaches

2014

Page 7: Subscribed 2015: Architecture, Security, Scalability

Courtesy: Symantec 2015 Internet Security Threat Report

Industry Data Security Breaches 2014

Page 8: Subscribed 2015: Architecture, Security, Scalability
Page 9: Subscribed 2015: Architecture, Security, Scalability

Courtesy: Symantec 2015 Internet Security Threat Report

Industry Data

Security Breaches

2014• Top 3 entry point used for hacking

• Weak Authentication (Employee or Third Party Vendors)

• Malware infected using Phishing

• Application or Server Weakness

• Top motives are CC data and PII with email address

• Average Cost per data breach is $3.5 million or $145 per compromised

record (does not include loss of reputation)

• Hackers targeting CFOs to gain monetary advantage on market moving

information

Page 10: Subscribed 2015: Architecture, Security, Scalability

Industry Leading

Compliance Strategy

• Required for all service providers storing or processing credit cards

• PCI DSS Level 1 since 2008• 200+ Security Controls required

• Supports Customer SOX compliance• SSAE 16 SOC 1 Type II since 2009• SOC 2 Type II based on Trust Services Principles

• HHS HIPAA audit program as a Business Associate• Compliance with Security, Privacy and Breach Notification

requirements

• Provides a method for U.S. companies to transfer personal data from the EU to US

• Protection of consumer personal data

Page 11: Subscribed 2015: Architecture, Security, Scalability

Enterprise-grade Data Security

• TLS Encryption

• Network Firewall and Web Application Firewall

• Host Intrusion Detection Systems

• Sensitive Data Encryption using FIPS certified Hardware Encryption

• Multiple layers of authentication

• Continuous Application Pen Testing

• Daily Network Scans & Third Party Security testing

• Centralized Logging and Real-time Alerting

• Secure SSAE16 Compliant Data Centers

Load Balancers Load Balancers

Log ServersDB Servers

Firewall IDS

Firewall IDS

Zuora UI Customer Apps APIs

TLS

Storage

Encryption ApplianceApp Servers

Enterprise-grade Data Security

Page 12: Subscribed 2015: Architecture, Security, Scalability

Strong authentication features

support enterprise ecosystem

integration• Strong Security Policies

• 2-factor Authentication

• Single Sign-on support

• IP-address filtering

Page 13: Subscribed 2015: Architecture, Security, Scalability

Granular data access features supports SOX compliance requirements

65 distinct permissions for standard and admin user roles

Page 14: Subscribed 2015: Architecture, Security, Scalability

Data Access Control

WORLDWIDE

NORTH AMERICA

US CANADA

EUROPE

ITALY FRANCE

Page 15: Subscribed 2015: Architecture, Security, Scalability

• Greater Control with the hierarchy based data access feature

• Access can be granted on a need-to-know basis (department, geo-location, product etc.)

Data Access Control

Page 16: Subscribed 2015: Architecture, Security, Scalability

Ops

Page 17: Subscribed 2015: Architecture, Security, Scalability

Private CloudCommercial SoftwareQuarterly ReleasesSQL VMsMTBFDIY

Stack Trends

Public CloudOSSContinuous DeliveryNoSQLContainersMTTRSaaS

SaaS v1.0 SaaS v2.Current

SLIDE HEADER

Page 18: Subscribed 2015: Architecture, Security, Scalability

Across Zuora Platform

Transactions a

month

Rows of data

synchronized and

exported

Average Monthly Volume Snapshot:

Average platform

compute utilization

1.3B

22B

40%

Page 19: Subscribed 2015: Architecture, Security, Scalability

3 Team Pillars

Customer, Technology,

Business

50/50Developer/

SysEng Ratio

2 Public Cloud

Regions

2Operation Centers

900+ Nodes

2 Geo Distributed

datacenters

Look Inside

Page 20: Subscribed 2015: Architecture, Security, Scalability

TiersEphemeral

Persistent

Infrastructure

Fault

DomainsVertical

Horizontal

ScaleHorizontal

Vertical

Partition

Approach to

Infrastructure

Page 21: Subscribed 2015: Architecture, Security, Scalability

Embed Ops into Dev

Durability > Availability

API > Scripts

Metrics, Metrics, Metrics

Ops Approach

Page 22: Subscribed 2015: Architecture, Security, Scalability

GRIDGRIDSummary

GRID

• Compliance Certifications – PCI, SOC1, SOC2 and HIPPA

• Data Security – Web Application Firewall, Host Based Intrusion Detection System and Continuous Security Testing

• Product Security – 2FA, SSO, Data Access Controls and Strong Security Policies

• Infrastructure – Public/Private Cloud, OSS

• Architecture – Right size/approach for the problem

• Operators – Mix of Developers and Systems Engineers

Page 23: Subscribed 2015: Architecture, Security, Scalability

HEADING

Section break slide

Q&A