Five Steps to Securing Cloud Servers

Watch Now

To watch this webinar you’ll need an Infosecurity Magazine account. Log in or sign up below.

Log In

Sign Up

Get up-to-the-minute news and opinions, plus access to a wide assortment of Information Security resources that will keep you current and informed.

This will be used to identify you if you take part in our online comments.

Your password should:

  • be at least eight characters long
  • be no more than 25 characters long
  • contain at least one uppercase, lowercase and special character
  • contain at least one digit
  • only contain alphanumeric characters or ~!@#$%^&*()_-+=?.

For more information explaining how we use your information please see our privacy policy.

By registering you agree with our terms and conditions.

Many organizations are facing a Catch-22 when it comes to migrating applications to the cloud. They get the biggest ROI by migrating business-critical apps that need to scale rapidly and on-demand. But these are precisely the applications that need the tightest security controls. Executive management is pressing for progress on cost savings, but sorting through the variety of security issues unique to cloud environments can be dauntingly complex.

The solution is to break the process of securing cloud servers into a set of well defined, achievable steps that enable IT organizations to securely extend their existing enterprise infrastructure out into their cloud environment.

In this free webinar, Ryan Holland of the Cloud Security Alliance (CSA) will initially discuss the key requirements for securing cloud systems. David McNeely, senior director of product management at Centrify, will then present a five-step process, using Amazon EC2 as an example, for automating provisioning of security policies, centralizing account and privilege management, hardening network access, auditing systems, and implementing enterprise-centric single sign-on. Uri Budnik, ISV Program Director at RightScale, will describe how RightScale’s ServerTemplate and RightScripts can be used to achieve the automated provisioning and system lockdown.


Drew Amorosi

Drew Amorosi Deputy Editor, Infosecurity Magazine

Uri Budnik

Uri Budnik ISV Program Director, RightScale

    Ryan Holland

    Ryan Holland, Cloud Security Alliance

      David McNeely

      David McNeely Director of Product Management, Centrify Corporati