Five Steps to Securing Cloud Servers

Watch Now

To watch this webinar you’ll need an Infosecurity Magazine account. Log in or sign up below.

Log in
Sign up

Get up-to-the-minute news and opinions, plus access to a wide assortment of Information Security resources that will keep you current and informed.

This will be used to identify you if you take part in our online comments.

Your password should:

  • be at least eight characters long
  • be no more than 25 characters long
  • contain at least one uppercase, lowercase and special character
  • contain at least one digit
  • only contain alphanumeric characters or ~!@#$%^&*()_-+=?.

For more information explaining how we use your information please see our privacy policy.

By registering you agree with our terms and conditions.

Many organizations are facing a Catch-22 when it comes to migrating applications to the cloud. They get the biggest ROI by migrating business-critical apps that need to scale rapidly and on-demand. But these are precisely the applications that need the tightest security controls. Executive management is pressing for progress on cost savings, but sorting through the variety of security issues unique to cloud environments can be dauntingly complex.

The solution is to break the process of securing cloud servers into a set of well defined, achievable steps that enable IT organizations to securely extend their existing enterprise infrastructure out into their cloud environment.

In this free webinar, Ryan Holland of the Cloud Security Alliance (CSA) will initially discuss the key requirements for securing cloud systems. David McNeely, senior director of product management at Centrify, will then present a five-step process, using Amazon EC2 as an example, for automating provisioning of security policies, centralizing account and privilege management, hardening network access, auditing systems, and implementing enterprise-centric single sign-on. Uri Budnik, ISV Program Director at RightScale, will describe how RightScale’s ServerTemplate and RightScripts can be used to achieve the automated provisioning and system lockdown.


Photo of Drew Amorosi

Drew Amorosi

Deputy Editor, Infosecurity Magazine

Uri Budnik

ISV Program Director, RightScale

Ryan Holland

Cloud Security Alliance

David McNeely

Director of Product Management, Centrify Corporati

Should you watch this webinar your information may be shared with the sponsors indicated above. Please see Infosecurity Magazine’s privacy policy for more information.