Top Banner
Cloud Computing Security – The BIG Data Vasanth Ganesan MS Telecommunications & Business University of Maryland, College Park
14

Cloud Computing - Security (BIG Data)

Nov 07, 2014

Download

Technology

Vasanth Ganesan

A very high level condensed presentation on Data Security issues on the Cloud.
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Cloud Computing - Security (BIG Data)

Cloud ComputingSecurity – The BIG Data

Vasanth GanesanMS Telecommunications & BusinessUniversity of Maryland, College Park

Page 2: Cloud Computing - Security (BIG Data)

What is Cloud Computing?

Its all about “Sharing”

Page 3: Cloud Computing - Security (BIG Data)

Like with anything new, the primary concern is security

RISKS are ALWAYS there!

Page 4: Cloud Computing - Security (BIG Data)

The Stack

SaaS

PaaS

IaaSClou

d Se

curit

y Co

ncer

ns

Ope

ratio

nal E

ffici

ency

Low

LowHigh

High

Page 5: Cloud Computing - Security (BIG Data)

Security Risks &

Potential Opportunities

Page 6: Cloud Computing - Security (BIG Data)

What are your main concerns in your approach to Cloud Computing?

Source: ENISA – An SME Perspective on Cloud, 2009

Page 7: Cloud Computing - Security (BIG Data)

Security

Snap

Copy

Mount

Yesterday Today

Page 8: Cloud Computing - Security (BIG Data)

In Brief – “Data”

• Trust Boundary• Data Security• Identity and Access Management (IAM)• Privacy Considerations

Information Assurance Concerns

CSA Security Guidance v2.1

Page 9: Cloud Computing - Security (BIG Data)

Trust Boundary

• Trust Boundaries have changed with cloud computing

• Note: Different cloud providers might have different trust boundaries

• Data barriers• Need for transparency

Source: Cloud Security and Privacy – Tim Mather

Governance

Enterprise Risk Management

Compliance and Audit

Page 10: Cloud Computing - Security (BIG Data)

Data Security

• Provider’s data collection efforts and monitoring of such

• Use of encryption– Data in Transit– Data at Rest– Key management is a significant issue

• Data lineage• Data provenance• Data remanence

Source: Cloud Security and Privacy – Tim Mather

Information Lifecycle Management

Encryption and Key Management

Compliance and Audit

Page 11: Cloud Computing - Security (BIG Data)

Identity and Access Management

• One of the biggest challenges today• Currently inadequate for Enterprises• Access Control tool

Source: Cloud Security and Privacy – Tim Mather

Identity and Access Management

Traditional security

Compliance and Audit

Page 12: Cloud Computing - Security (BIG Data)

Privacy Considerations

• Data is no longer static• Transborder data issues may be exacerbated– Privacy laws (inconsistent among different

jurisdictions)• Data governance is weak– Encryption is not pervasive– Cloud Providers absolve themselves– Data remanence still is a “?”

Source: Cloud Security and Privacy – Tim Mather

Information Lifecycle Management

Traditional security

Compliance and Audit

Page 13: Cloud Computing - Security (BIG Data)

Then why the Cloud?

Lowers TCO

Time to Market

Flexibility

ScalabilityFocus on

Core Business

Page 14: Cloud Computing - Security (BIG Data)

Potential Questions from the Clients

• Does the provider hold certifications such as ISO 27001/2, SAS 70? If yes, what is the scope of the certifications?

• Does the provider share with the physical location of the servers?• To what extent are storage, memory and other data traces erased from the

machines before being reallocated to a different customer? i.e. Data remanence • Does the provider support the data classification scheme used?• How does the provider guarantee isolation of resources from other customers?• Learn from the Cloud service provider (CSP) about key management. Who

handles and manages the key?• How does the CSP report on its security management?• Does the CSP have an analytics tool to monitor your cloud?• What are the CSP’s control monitoring processes?• Is your data bound by local jurisdiction?