《2393 Cyber Security on Power - a Technology Review.pdf》由会员分享,可在线阅读,更多相关《2393 Cyber Security on Power - a Technology Review.pdf(27页珍藏版)》请在三个皮匠报告上搜索。
1、October 21-24,2024Mandalay Bay Convention CenterLas Vegas,NevadaTim HillRocket Software,Inc.Distinguished Engineer3293Cyber Security on Power a Technology ReviewAgenda2Cybersecurity Protection FrameworkEndpoint ProtectionTechnologiesLatest updates in IBM PowerSCIBM TechXchange|2024 IBM CorporationId
2、entifyAsset Management HW,SW,app.inventory discoveryPowerSC(AIX,i,LoP)IAM&PAM-Discover Risk Users&Apps,SODViolations,etc.-Discover Privileged users andaccounts-PowerSC MFA(AIX,i,LoP)Data&Crypto-Unstructured and Structureddata discovery&classification.-Key discovery and agilitySupply Chain Risk Manag
3、ement-IBM Systems O-TTPScertificationProtectIAM&PAM (Verify)-PowerSC MFA(AIX,i,LoP)Crypto,Data&Privacy-AIX LV Encryption with HPCS(4Q22)-Linux LUKS w.HPCS(4Q22)-PQC algorithm acceleration-Fully Homomorphic Encryption-IBM Security GuardiumThreat Management-IBM Power FLTR-IBM Systems PSIRT-Automated p
4、atching:OS-specific,PowerSC(AIX,i,LoP)Protective TechnologyPower FW Security and Trusted bootPower10 BMC secure bootPower10 Transparent MemoryEncryptionPower10 Return OrientedProgramming protectionContainer InfrastructurePartnership w.Aqua secure thebuild and infrastructureDetectAnomalies and Events
5、PowerSC EDR(AIX,i,LoP)Security Continuous MonitoringIBM Qradar privileged usermonitoring,network anomalydetectionContinuous CompliancePowerSC ComplianceMonitoring health checkingDetection ProcessesNetwork-IBM Qradar-3rd party anomaly detectiontools:e.g.IBM Cloud CIS-CloudInternet Services(CloudFlare
6、)Container InfrastructurePartnership w.Aqua-”driftdetection”RespondResponse PlanningPowerSC EDR(AIX,i,LoP)CommunicationsAnalysisPowerSC EDR(AIX,i,LoP)MitigationImprovementsRecoverRecovery PlanningSafeguarded copies for IBM iNIST framework with Power and IBM SecurityIBM Power/February 2022 2022 IBM C