akamai isms

12
Akamai Information Security Management System Overview Securing the Cloud White Paper

Upload: satyaki-chakravarty

Post on 27-Nov-2014

264 views

Category:

Documents


2 download

TRANSCRIPT

Page 1: Akamai ISMS

Akamai Information Security Management System OverviewSecuring the Cloud

White Paper

Page 2: Akamai ISMS

Table of Contents

PREFACE . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1

EXECUTIVE SUMMARY . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1

AKAMAI NETWORK OVERVIEW. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2

Mapping the Internet . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2

Functioning of the System and the Information Flow . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2

Users Internal/External . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3

Network Intelligence and DNS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3

ORGANIZATION . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3

Privacy Policy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4

EDGE PLATFORM SECURITY . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4

Physical Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4

Host System Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4

Access Control . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4

Network Design . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4

Software Reliability and Integrity . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5

Monitoring and Response . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5

VULNERABILITY MANAGEMENT . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6

INCIDENT RESPONSE AND MANAGEMENT . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6

PERSONNEL . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6

DISASTER RECOVERY AND BUSINESS CONTINUITY . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6

Service Delivery Network Disaster Resiliency . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6

Akamai Facility Disaster Planning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7

SECURITY INITIATIVES . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7

ISO 17799/27000 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7

Security Reviews . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8

Payment Card Transaction Security. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8

Security for End-Users . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8

SUMMARY . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9

Page 3: Akamai ISMS

Akamai Information Security Management System Overview. 1

PrefaceAkamai cannot guarantee that the policies and procedures describe in the document will not change in the future, and this document is not intended to bind Akamai to any particular course of product marketing or development.

This document is intended to provide an overview of Akamai’s Information Security Management System (ISMS) and the security practices and policies designed to ensure a secure and reliable service offering. It is intended for security architects, network administrators, or other technical audiences concerned specifically with performing due diligence on the security of Akamai’s service. More specific inquiries should be made through Akamai sales contacts and will be forwarded to the appropriate Akamai staff for prompt response. While this document is not intended to cover every possible aspect of Akamai security, we believe it provides a sufficiently broad overview of most areas of importance to clients or partners.

This document includes an overview of Akamai’s core technologies and services to provide a context for understanding the security framework that protects Akamai’s network. Comprehensive overviews of individual service offerings are available from Akamai sales representatives.

Executive SummaryAkamai is committed to sharing its Information Security Management System (ISMS) in order to help its customers successfully and securely integrate their web environments with Akamai’s service. This paper describes what Akamai does to prevent malicious or unauthorized use of the Akamai EdgePlatform. This protection is comprised of a formal vulnerability management framework, security management processes, and clear organi-zational roles and responsibilities. The basis of the approach is to satisfy control objectives consistent with ISO 27002 and generally accepted standards of information security, as applicable to the Akamai environment.

Akamai’s Information Security Management System addresses each of the three basic security dimensions (Integrity, Confidentiality, and Availability), to allow information to be shared appropriately in an efficient and effective manner by the design and implementation of management, operational and technical security controls.

Akamai approach is structured to limit business damage by preventing and minimizing the impact of physical and logical disruptions by combining intelligent load management algorithms with unmatched capacity. Unlike traditional solutions, which may provide confidentiality or integrity at the expense of availability, Akamai’s globally distributed platform ensures a highly available Internet presence for its customers in a secure fashion by minimizing exposure to the vagaries of the Internet.

Strong security begins with comprehensive security practices and requires continuous attention and improvement to ensure a consistent, repeatable, secure environment. Security forms the foundation for every aspect of Akamai’s business, from system design and security policy to operations management; not only for network security within the Akamai corporate network, but also to better secure the Internet and each customer’s web presence.

Akamai welcomes inquiries and feedback about its security practices. Please contact a member of the Akamai sales team, who will forward the request to the appropriate security team members for a prompt response.

Page 4: Akamai ISMS

Akamai Information Security Management System Overview. 2

Akamai Network OverviewAkamai operates the EdgePlatform, a global network of tens of thousands of servers in nearly a thousand networks in scores of countries. Akamai builds, operates, updates, manages and maintains the software operating on this platform and employs sophisticated network monitoring technologies to track, analyze and report on current/ real-time system-wide conditions and trends, including security events.

The overall security of Akamai’s network relies on several factors, which work together to provide a secure solution with defense in depth. These components include physical security, host and software security, network and compo-nent design, and 24x7 monitoring and response.

Mapping the Internet

Akamai has devised a number of proprietary algorithms to leverage its distributed architecture. Akamai’s network is designed to operate automatically, in real-time, in the most effective and efficient manner possible. Topological measurements are continuously performed. BGP feeds from hundreds of networks are combined with real-time trace-routes and other measurements to determine the overall connectivity of the Internet.

Figure 1: Akamai EdgePlatform Data Flow

The Akamai EdgePlatform system data flow, illustrates how a customer’s Internet web site is delivered to end-users.

This data is merged with the latency and packet loss information collected real-time from large samplings of nodes on our network. Other data collected includes geographic location of IP addresses, latencies from numerous points on the Internet, DNS information, health of key transit regions of the Internet, and observed routing decisions. The information is collected in a distributed manner and distributed algorithms determine an optimal “map” of end-user IP addresses to Akamai servers.

Functioning of the System and the Information Flow

It is important to note that Akamai personnel do not require access to our customer’s internal systems. Akamai EdgePlatform servers operate as surrogate web servers pulling content from the origin site using standard protocols such as HTTP and HTTPS and do not have any access to the back-end systems of the customer’s hosted facility. The EdgePlatform will simply handle the end-user’s access to the customer’s Internet web site and will make the same end-user request to the web servers (or the origin servers) within the customer’s hosted facility for the purpose of retrieving or refreshing content.

2. Request for content that needs to be fetched or is un-cacheable is forwarded to the origin.

3. Content is delivered from Edge

1. End User requests

Akamai Edge Servers

End Users

End Users

Fire Wall

Customer Origin

Internet

200 Ok

GET

200 Ok

GET

2. Request for content that needs to be fetched or is un-cacheable is forwarded to the origin

1. End User requests

3. Content is delivered from Edge

Page 5: Akamai ISMS

Akamai Information Security Management System Overview. 3

Users Internal/External

“External users” refers to members of the public with access to the Internet who are requesting the customer’s web site content. Data provided would be information managed and published by the customer through its hosted facility. External users do not require authentication outside of services available within HTTP to access the web site content. Processing provided on the EdgePlatform system is web server functionality, specifically responding to requests for content within the protocols supported on the EdgePlatform. These are standard functions in delivering web site content and appli- cations over the Internet.

“Internal users” for the EdgePlatform system are authorized Akamai personnel monitoring and maintaining the EdgePlatform system in general and any authorized customer person-nel. Akamai personnel do not exercise administrative access to a customer’s web content, except as any other external user. Authorized Akamai personnel will have operational control over the EdgePlatform system, ensuring that its distributed network of servers is functioning properly. Authorized customer personnel have access to the reporting tools and customer support tools via the Akamai customer portal. Reporting tools provide data about the customer web site traffic at an aggregate level.

Network Intelligence and DNS

Akamai’s network intelligence system employs DNS and is a necessary requirement for proper operation of many of Akamai’s service offerings. Akamai’s network intelligence infrastructure is spread across the global platform, performing regular and continuous tests on a variety of aspects of network performance and reliability. Data points are aggregated in multiple locations and multiple redundant maps (data structures mapping end-users to edge servers) are generated for each specific service. Maps are run through an integrity-checking process prior to being pushed to Akamai’s DNS servers.

Akamai’s DNS infrastructure uses the end result of each map-making cycle to determine optimal mapping for end-users. Akamai’s network intelligence system uses a set of top- level DNS name servers, authoritative for a variety of domains, and uses technology similar to Enhanced DNS.

Organization Akamai launched commercial service in April 1999 and security has been extremely important from the beginning. The Akamai Information Security Program is structured in accordance with ISO 17799 and ISO 27001 international standards for information security. Akamai has engaged outside audit teams to conduct assessments of Akamai’s security program against these standards.

Accordingly, Akamai continually strives to improve upon its security practices. Included in Akamai’s ongoing security efforts are regular internal reviews and risk assessments for corporate, information, and network security. As Akamai continues to roll out new services on its network, security plays a fundamental role in product design and review for every new feature. In addition to performing frequent internal security reviews, Akamai’s security professionals meet regularly with a cross-functional executive team to review corporate and network security issues.

Page 6: Akamai ISMS

Akamai Information Security Management System Overview. 4

Akamai has a dedicated Information Security Group. The Senior Director of Information Security is responsible for security of the system and the company. The Director reports to the Senior Vice President of Networks and Operations, provides a security status report to the CEO regularly, and works with management across the com- pany to prioritize and schedule security efforts.

Akamai performs both qualitative and quantitative risk assessments of the service network infrastructure on an on-going basis. Risk assessments consider the value of the assets being protected, the exposure presented to those assets by vulnerabilities, and the likelihood of exploitation by various threats.

Akamai has a formal incident response process that includes root cause analysis of the incident. See the section Incident Response & Management for more information.

Privacy Policy

Akamai does not collect or aggregate personally identifiable information about its customers’ users. The Akamai privacy policy is available on the Company’s web site. http://www.akamai.com/html/policies/privacy_principles.html

EdgePlatform SecurityThe overall security of Akamai’s network relies on several factors, which are designed to work together to provide a comprehensive secure solution with defense in depth. These components include physical security, host system security, access control, network design, software reliability and integrity, and 24x7 monitoring and response.

Physical Security

Akamai’s EdgePlatform servers are deployed in facilities worldwide, many of which provide state-of-the-art access control. Akamai requires its providers to enforce verification of Akamai service requests; providers may not attempt to gain any sort of access to Akamai systems without written instructions from Akamai. Failed systems are returned directly to Akamai-contracted facilities that follow strict handling procedures to repair and return them to service. Although Akamai stipulates the above requirements for facility providers, it is important to note that Akamai is not dependent on their compliance to protect its network. The network is designed such that physical compromise of Akamai machines can have only a limited impact on the system as a whole and critical systems are placed in more secure and trusted locations.

Secure Content Delivery Network servers are deployed in professional and secure collocation facilities. These facilities incorporate physical requirements designed to comply with

the Payment Card Industry Data Security Standard, such as video cameras, fire suppression and guards. For more information about Secure Content Delivery contact your Akamai sales representative.

Host System Security

All Akamai servers are designed to function as a bastion host, obviating the need for enclaving the systems behind a separate firewall. The systems are hardened to withstand various types of attack, including various denial-of-service attacks and other known vulnerabilities.

Akamai deploys security-hardened servers and adheres to the principles of minimum access and least privilege. Akamai disables all non-essential IP services on deployed servers to limit opportuni-ties for unauthorized network access. Remote administrative access is only available via cryptographically secure connections and all electronic access to Akamai servers is logged. To further limit access, read-only views and limited diagnostic tools are provided to Akamai personnel performing system diagnostics and analysis, eliminating the need for administrative access to accomplish these functions. Network Operations enforces Akamai’s access control policies and security key management.

Access Control

Akamai’s EdgePlatform servers do not have individual user accounts, and user-level applications (e.g., web browsers) are removed from the system, eliminating the most common virus infection vectors. The systems are hardened by closing all un- needed ports and by removing extraneous software packages and network services.

Administrative logins are restricted to trained and authorized Akamai employees. The Network Operations Group maintains and enforces Akamai’s access control policies and key manage-ment. Read-only views are provided to a limited number of authorized personnel performing system diagnostics and analysis.

Each authorized Akamai user has a set of unique public-key pairs for authentication purposes, and access occurs via an SSH proxy enforcing a role-based access control model. These key pairs are rotated frequently, and Akamai’s Network Operations and Information Security teams routinely review access privileges.

Software changes are executed via automated processes, obviating the need for most human intervention. Akamai’s deployed network functions in an autonomous mode without users logging into the servers to conduct routine system administration.

Network Design

Akamai’s unique distributed intelligent network is designed to eliminate single points of failure. Its self-correcting properties allow it to address machine, data center, and network problems and route around any outages or areas of inefficiency for optimal reliability of content and application delivery. Akamai has servers

Page 7: Akamai ISMS

Akamai Information Security Management System Overview. 5

in almost every major network in the US and around the world. This, along with dynamic routing technology, enables Akamai to continue operating in the presence of almost any network outage.

Because of Akamai’s intelligent load management algorithms, attacks against one customer are unlikely to have significant impact on other customers. Akamai’s technology also enables containment of potential damage caused by an attacker. If suspicious or unusual behavior is detected from an Akamai server, that machine can be suspended by directing traffic away. This can be done without impact to Akamai’s service; each server has a set of back up machines that can take over its duties within seconds. Entire data centers can be suspended from serving traffic as well, with minimal impact, as Akamai’s dynamic mapping system will direct users to new data centers within minutes. These fault-tolerant features take effect automatically when machines or data centers fail for any reason, allowing Akamai to continue serving content and applications reliably, even when portions of the service network are not able to serve Internet traffic.

Software Reliability and Integrity

Akamai engineering uses a revision control system that restricts modifications and provides check-in time notification tracking of source code submissions. Access to source code is authenticated with public-key cryptography.

Before being installed on Akamai’s network, software undergoes extensive code review, as well as unit, system, and regression testing. After being system-tested on a test network, the code and configuration changes to be installed are encrypted and signed.

These changes are installed in a staged fashion to ensure minimal impact to Akamai services. Software is installed over secure connections with safeguards to check that components are of the correct revision and have not been modified in transit. In the unlikely case that problems are discovered during the roll-out, Akamai’s fault-tolerant mapping system will direct users away from the affected machines as the problems are addressed.

Akamai’s advanced software management system provides tight control over the soft-ware and configuration on all machines. Any deviations from the specified configuration are corrected, resulting in a highly consistent state across the network.

Akamai also tightly controls all software on the servers. No CGI scripts or customer created executables are run on Akamai servers—with the notable exception of our EdgeComputing service that uses a specially designed “sandbox” environment. For more information about EdgeComputing contact your Akamai sales representative.

Monitoring and Response

Vigilant system monitoring plays a key role in Akamai network security. Each Akamai server has a set of “watch-dog” components that provide system-level monitoring for security events and anomalies such as usage, performance, process counts and abnormal behavior. These components report through a distributed database system that provides alerting and reporting to Akamai’s Network Operations Command Center (NOCC). Additional automated systems within the NOCC analyze and report on system-wide conditions and trends. The 24x7 NOCC staff continually monitors network status, including checking machine performance, data center status, net- work connectivity, and general Internet health, and is trained to respond immediately to any sign of intrusion or other trouble. Machines or entire regions can be suspended with very little impact on the Akamai service.

Page 8: Akamai ISMS

Akamai Information Security Management System Overview. 6

Vulnerability ManagementAkamai has developed an integrated and systematic vulnerability management process to manage remediation across both the EdgePlatform network and the Akamai corporate infrastructure. Success metrics and noncompliance reporting are delivered to both Akamai management and system owners.

The formal tracking method for managing security vulnerabilities begins with members of Akamai’s Information Security Group monitoring software vendor notifications and public reporting forums (e.g., CERT). Software vulnerabilities are analyzed using both a quantitative risk analysis system (the Common Vulnerabil-ity Scoring System) and a qualitative risk analysis system (a threat actor/severity model).

Identified security issues are added to the security project management database. Akamai’s tightly controlled infrastructure allows patches and system updates to be deployed quickly and securely, when the Information Security group determines the need for such measures.

Incident Response and ManagementAkamai has a formal, well-documented incident response process. The process includes procedures for escalating to the technical and business team members with the appropriate expertise based on the severity and complexity of the incident. Escalation paths contain multiple levels, should the first contact not be immediately available.

In the event of suspicious activity related to a customer’s content or account management, Akamai will notify the designated customer representative.

Akamai does not have a standard SLA for security incidents due to the incidents’ varied nature. As noted above, Akamai provides timely response via customer portal notifications, email or other communications with appropriate levels of information based upon the specific incident and its custo- mer impact.

Akamai utilizes a variety of host-based audit controls to provide intrusion detection. Every Akamai server monitors a large collection of events including usage, performance and abnormal behavior. These events are reported through a distributed database system into Akamai’s monitoring system that provides alerting intelligence to the Network Operations Command Center (NOCC). NOCC staff are trained and on call to provide incident management in accordance with Akamai’s incident response procedures.

PersonnelEvery Akamai employee is required to sign a confidentiality agreement as a condition of his or her employment. In addition, Akamai personnel undergo background checks at the time of hire.

Access to systems is provided as required by job function, subject to approval policies specific to the type of information to be accessed.

Akamai employees are provided with our security policy, our business ethics policy, and a general security orientation. Akamai employees must review and acknowledge these policies annually.

Disaster Recovery and Business ContinuityAkamai’s commitment to customer service includes disaster preparedness. Akamai has developed written procedures, policies and strategies, including tests of the Disaster Recovery systems, to add-ress the potential effects of disasters or other unexpected events that could impact the company’s operations. Akamai’s program defines two types of disasters:

• Service Delivery Network Disaster is a failure at a component, system, facility, or network level involving the EdgePlatform net-work. This level of disaster is typically handled by use of multiple redundant components or systems.

• Akamai Facility Disaster is a failure that impacts Akamai corporate facilities, such as major power outage, flooding, major storm damage to the building, etc. This level of disaster is typically handled with a combination of system redundancy and failover protocols.

Service Delivery Network Disaster Resiliency

The structure and operation of the Akamai EdgePlatform are inherently designed to minimize the possibility that a disruption could have any network-wide effect. The built-in self-correcting properties allow it to be uniquely able to deal with machine, data center, and network problems; routing around any outages for optimal reliability of content delivery. This also means that it is easier to contain potential damage caused by a disruption that affects even a significant number of servers or data centers. Entire data centers can be withdrawn from service, with minimal impact, as Akamai’s dynamic mapping algorithms will direct users to new data centers within minutes. These fault-tolerant features automatically activate when machines or data centers fail for any reason, allowing Akamai to continue serving content reliably. Net-work-related disaster recovery plans and procedures are constantly reviewed to ensure the integrity, stability, and fault-tolerance of the system.

Page 9: Akamai ISMS

Akamai Information Security Management System Overview. 7

Akamai Facility Disaster Planning

Akamai has an Emergency Response Team that meets regularly to implement policy and test recovery plans. Documented evacuation plans for all corporate facilities are provided to employees both in writing and through posted evacuation plans.

The Akamai deployed network is managed by the Network Operations Command Center (NOCC). The primary Akamai NOCCs are located in Cambridge, Massachusetts, and Bangalore, India. Akamai has designed our Network Operations Command Center (NOCC) to be redundant, enabling automatic recovery from facility disasters. Edge- Platform technology components are designed to provide data protection at all levels and Akamai has backed up critical data in separated geographic locations.

Secondary operations sites are located in San Mateo, California, and Reston, Virginia, providing redundant capability for ongoing operations in the event of a metro disaster in either or both of our primary locations.

Security InitiativesFor businesses where a web presence plays an integral part in success, delivering content over the Internet means balancing the reward of easy, universal access to content against the difficulty of protecting the integrity of those accessible systems. Akamai’s commitment to best-in-class security policies and practices is designed to minimize the risk to our customers—allowing each to take advantage of the optimal wide-reaching delivery mechanism for its content while retaining the protection and control they demand.

ISO 17799/27000

Akamai undergoes an annual readiness assessment to determine compliance with the ISO 17799 standard “Information technology – Security techniques – Code of practice for information security management.” ISO 17799:2005 measures 11 control categories:

• Security Policy

• Organization Of Information Security

• Asset Management

• Human Resources Security

• Physical And Environmental Security

• Communications And Operations Management

• Access Control

• Information Systems Acquisition, Development And Maintenance

• Information Security Incident Management

• Business Continuity Management

• Compliance

Page 10: Akamai ISMS

Akamai Information Security Management System Overview. 8

Security Reviews

Security is extremely important to Akamai and our customers. Accordingly, Akamai continually strives to improve upon our security practices. Included in Akamai’s ongoing security efforts are regular internal reviews and risk assessments for corporate, information, and network security. Furthermore, as Akamai continues to roll out new services on its network, security plays a fundamental role in service design and review for every new feature. In addition to performing frequent internal security reviews, Akamai’s security professionals meet regularly with a cross-functional executive team to review corporate and network security issues.

Payment Card Transaction Security

Akamai accelerates online credit card transactions for 75 of the top 100 online retailers. To help its retail customers achieve compliance with the Payment Cards Industry Data Security Standard (PCI-DSS), Akamai has secured certification from the PCI Standards Security Council for our Secure Content Delivery Network. To maintain compliance, Akamai undergoes an annual penetration test and quarterly vulnerability audits from a PCI-certified third party. Akamai provides its PCI Compli-ance customers with access to automated tools for validating site configurations, infrastructure reports, and contractual obligations for PCI compliance, incident notification, and incident response.

Security for End-users

Akamai has a well-established support model for responding to end-users with security concerns. Most users initiate correspondence with Akamai’s Customer Care organization. Customer Care will work with the user to determine if there is a potential security issue. If Customer Care is unable to resolve the concern, the Information Security Group is contacted to provide additional support and diagnostics.

Akamai’s network and systems may occasionally act as a conduit or storage mechanism for personal user information that is collected by our customers (e.g., Akamai could have log data that would match IP addresses of end-users to the sites they have visited). Akamai is committed to meeting all of our obligations to our customers to protect their data and only to collect, use, and disclose it for authorized purposes.

Page 11: Akamai ISMS

Akamai Information Security Management System Overview. 9

SummaryAkamai’s Information Security Management System (ISMS) is designed to ensure that Akamai’s EdgePlatform provides the most secure way to increase performance and reliability across the Internet.

Strong security begins with comprehensive security practices and requires continuous attention and improvement to ensure a consistent, repeatable, secure environment. Security forms the foundation for every aspect of Akamai’s business, from system design and security policy to operations management; not only for network security within the Akamai corporate network, but also to better secure the Internet and each customer’s web presence.

Akamai strives to address each of the key security principles of confidentiality, integrity, and availability in its network, software, and service offerings. Unlike traditional solutions, which may provide confidentiality or integrity at the expense of availability, Akamai’s globally distributed platform ensures a highly available Internet presence for its customers, in a secure fashion, without subjecting them to the vagaries of the Internet.

Akamai welcomes inquiries and feedback about its security practices. Please contact a member of the Akamai sales team, who will forward the request to the appropriate security team members for a prompt response.

Page 12: Akamai ISMS

©2009 Akamai Technologies, Inc. All Rights Reserved. Reproduction in whole or

in part in any form or medium without express written permission is prohibited.

Akamai and the Akamai wave logo are registered trademarks. Other trademarks

contained herein are the property of their respective owners. Akamai believes that the

information in this publication is accurate as of its publication date; such information

is subject to change without notice.

International Offices

Unterfoehring, GermanyParis, FranceMilan, ItalyLondon, EnglandMadrid, SpainStockholm, Sweden

Bangalore, IndiaSydney, AustraliaBeijing, ChinaTokyo, JapanSeoul, KoreaSingapore

Akamai Technologies, Inc.

U.S. Headquarters

8 Cambridge CenterCambridge, MA 02142Tel 617.444.3000Fax 617.444.3001U.S. toll-free 877.4AKAMAI(877.425.2624)

www.akamai.com

The Akamai DifferenceAkamai® provides market-leading managed services for powering rich media, dynamic transactions, and enterprise applications online. Having pioneered the content delivery market one decade ago, Akamai’s services have been adopted by the world’s most recognized brands across diverse industries. The alternative to centralized Web infrastructure, Akamai’s global network of tens of thousands of distributed servers provides the scale, reliability, insight and performance for businesses to succeed online. Akamai has transformed the Internet into a more viable place to inform, entertain, interact, and collaborate. To experience The Akamai Difference, visit www.akamai.com.

1 November 2009 - This document is intended to provide certain background information on Akamai as of the above date. This information is subject to change from time to time as Akamai’s business and systems change, and thus should not serve as a representation or warranty.