Top Banner
A Private Story... Cost of time in Pharma Research and Disco $150/Sec For a Block Buster Pro
36

A Private Story...

Feb 23, 2016

Download

Documents

denim

A Private Story. Cost of time in Pharma Research and Discovery. $150/Sec For a Block Buster Project. Imagine a Scientist. Who wants 25 servers. Now!!!. To crunch some numbers!. IT Dept. Try 3 Months!!!. “You want it when?”. He finds a friendly IT Guy. - PowerPoint PPT Presentation
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: A Private Story...

A Private Story...

Cost of time in Pharma Research and Discovery

$150/Sec

For a Block Buster Project

Page 2: A Private Story...

Imagine a Scientist...

Page 3: A Private Story...

Who wants 25 servers...

Now!!!

To crunch some numbers!

Page 4: A Private Story...

IT Dept....

“You want it when?”Try 3 Months!!!

Page 5: A Private Story...

He finds a friendly IT GuyWho’s being playing in the Clouds!

Page 6: A Private Story...

So he built 25 virtual servers ...

...in about an hour

Page 7: A Private Story...

But he built them wrong!

Page 8: A Private Story...

He built them faster next time!

Page 9: A Private Story...

He built them faster next time!

Page 11: A Private Story...

Drat it won’t finish today!

Page 12: A Private Story...

So they built 250 virtual servers!

Page 13: A Private Story...

And the scientist was happy!The processing completed...

Page 14: A Private Story...

$89 ?

The Cost?

Page 15: A Private Story...

The Benefits of the Cloudsor

Avoiding The Cloud Trap!

Adrian Seccombe

Page 16: A Private Story...

Then decide to which type of Cloud you want to move?

F I R S T C L A S S I F Y Y O U R D A T A !!! Determine what rules MUST apply to it.

Must it only exist in specific trust levels? For example can it leave Europe?Does it have to stay in Safe Harbours?Must it stay in Europe?

We need a universal data classification model that is simple (cf G8 TLP)We need a recognised trust level standard for all aspects of computing We need standardised meta data that signals to “cloud security” the data’s security needs

Page 17: A Private Story...

Then decide do you want to move to the Clouds

Page 18: A Private Story...

To Cloud or Not to Cloud?

Clouds

Traditional

Page 19: A Private Story...

Then decide what data you want to allow in the Clouds

Page 20: A Private Story...

With what degree of translucency

Page 21: A Private Story...

For all Clouds are not equal...

Fully automatedData Redundancy

Fully automatedDisaster Recovery

Fully automatedData Backup and

Recovery

Fully automatedSystem Redundancy

Full on Clouds this way >>>>>

<<<< Same old Traditional Approach

Self owned Disk StorageData Redundancy ...sometimes

Warmish Back up Data CentreFor Disaster RecoverySignificant switching impactAnd testing costs

Tapes sent by TruckData Backup andRecovery variable risk

ManualSystem Recovery

Page 22: A Private Story...

Then decide what level you want to operate in the Clouds

Page 23: A Private Story...

Cloud Layers

Process

Software

Platform

Infrastructure

Outcome / ValueA

b s

t r a

c t

I o n

o

c c

u r s

h

e r e

!

1st

2nd

3rd

Last!

Orc

hest

ratio

n

Security and IdA

M

Page 24: A Private Story...

Then decide to which type of Cloud you want to move

Page 25: A Private Story...

Cloud Patterns

Internal

External

Page 26: A Private Story...

Cloud Patterns

Proprietary Open

Page 27: A Private Story...

Cloud Patterns

Proprietary Open

Internal

External

Page 28: A Private Story...

Cloud Patterns

Perimeterised

Deperimeterised

To get through hereYou need the

C O A

Page 29: A Private Story...

Cloud Patterns

Perimeterised

Deperimeterised

Proprietary Open

Internal

External

Page 30: A Private Story...

Cloud Patterns

Perimeterised

Deperimeterised

Proprietary Open

Internal

External

We need inter cloud “IPI” standards... especially those that enable Collaboration.

Page 31: A Private Story...

Cloud Patterns

Perimeterised

Deperimeterised

Proprietary Open

Internal

External

Recognise that some interfaces will be easier to enable than others!.

Page 32: A Private Story...

Cloud Patterns

Perimeterised

Deperimeterised

Proprietary Open

Internal

External

Page 33: A Private Story...

...and ”then” ensure the controls you require are

available in the Clouds... ...Oops!!!

You mean “Cloud Security Central”

doesn’t exist?

Page 34: A Private Story...

Cloud Layers

Process

Software

Platform

Infrastructure

Outcome / ValueA

b s

t r a

c t

I o n

o

c c

u r s

h

e r e

!

1st

2nd

3rd

Last!

Orc

hest

ratio

n

Security and IdA

M

Cloud Maturity Scale

Page 35: A Private Story...

We haven’t even identified all the needs yet.

Bread Crumb DetectorBread Crumb Hoover

Cloud Identity Services

and their ProvidersWhat about Trust Levels?

Page 36: A Private Story...

Proposed Individual Trust LevelsTrust Intent Impact Trust Level Authentication PhysicalLevel Label Activity World equiv

T0 Stay None Anonymous None - Unidentified

T1 Self Insignificant Self Asserted None PseudonymAssertion*

T2 Proof Minor Document Verified Authenticated: Proof of Abodeof Identity Name, Address, Age Electricity

Bill

T3 T2+ Ability Major Legally/ Financially Authenticate Credit Credit Card to Commit Verified Worthiness and / Pay

Payment Method

Pay Ability to Pay Varied Single use Authenticate Credit Financially Worthiness and Single CashVerified Use Payment Method

T4 T2+ Material Government Government Passport Gov Id Verified

T5 Protect Catastrophic Military Grade Positive Vetting Security Lives Clearance