Top Banner
Click to edit Master title style CLOUD COMPUTING SECURITY 6/5/2011 Alexandra Instituttet
15

Cloud security

Jan 15, 2015

Download

Technology

Security Lab at The Alexandra Institute focuses on developing solutions and concepts that enable secure utilisation of current and future IT and internet-based solutions. We focus on four leading technological trends:

Pervasive Computing
Cloud Computing
Mutual Computing
Privacy

Contact either Head of Research & Innovation
Security lab - [email protected]
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Cloud security

Click to edit Master title style

CLOUD COMPUTING SECURITY

6/5/2011

Alexandra Instituttet

Page 2: Cloud security

Click to edit Master title style

CLOUD COMPUTINGSECURITY

Alexandra Institute

Page 3: Cloud security

Click to edit Master title styleWhat Is Cloud Computing?Cloud collection of services• Infrastructure• Compute• Network• Storage resources

• Applications• Information

These components can be rapidly• Orchestrated• provisioned• implemented • Decommissioned• scaled up or down

on-demand utility• like model of allocation and consumption

Page 4: Cloud security

Click to edit Master title styleCloud Benefits

• ROI• Focus on core• Improving financial performance• Clear IT budgeting

• IT Chargeback • Responsibility Accounting

Operational efficiency

• Time to Market improvement• Agility• Return on Engagement

Revenue growth

• Innovation in Assembly• Externalization of core capabilities• Business Leverage of new technologies

Organization's business transformation The Cloud-Tail

Page 5: Cloud security

Click to edit Master title styleB2B Scenario

Supply chain • Enables smaller Investment in various

organizations, and using supply chain as a service• Different business use a common supply chain,

allowing implementation of• tracking• measuring• planning

Products Recall Service • This service allows to production companies and

networks to cooperate in the case of an event that requires the return of product from the shelves.

• The service is on Cloud Computing Platform For Manufacturing of GS1 and HP Canada.

ROI

improved financial performance

dispersing the mist around the IT budgeting

improving the Time To Market Agility

Innovation in Assembly

Page 6: Cloud security

Click to edit Master title style

return on investment

improved financial performance

Externalization of core capability

improving the Time To Market

Agility

Improving Return On Engagement

Innovation in Assembly

Provision of services• Provision of services in the cloud

community related organization• Distributors, agents, customers and

service providers etc.

CRM• Strengthen ties with those elements that

are channel customer care• Improves customer service and

streamlines the supply chain "from the client, through the distributor organization

B2B2C Scenario (Business to Business to Customer)

Page 7: Cloud security

Click to edit Master title style

Mashup • Third party organization combine services

from organization A and organization B and generates a third cloud service that has a new business potential.

Examples• The cooperation between Facebook to

Amazon, which Facebook Applications swarming on Amazon's EC2 infrastructure

• Appirio company's application, installed as a Facebook Application and author of the Facebook for Salesforce.com.

Innovation In Assembly Scenario

Improving Return On Engagement

Innovation In Assembly

improved financial performance

dispersing the mist around the IT budgeting

Agility

business leveraging of new technologies innovation

Improving time to market

Externalization of core capability

Page 8: Cloud security

Click to edit Master title style

CLOUD COMPUTING

Elasticity Evolution

Operations Evolution

Sourcing Evolution

Cloud Computing Evolution

Page 9: Cloud security

Click to edit Master title styleCloud Service Models

http://www.katescomment.com/iaas-paas-saas-definition/

Page 10: Cloud security

Click to edit Master title styleMulti-Tenancy

Multi-Tenancy• Refers to a situation in which one

program, need to serve at the same time the number of consumer organizations (Tenants)

separation• Solution that supports Multi-Tenancy,

capable of creating separation between the different Tenants

Chinese walls• The barrier Principles are essential to

create "Chinese walls" between different service consumers in sharing infrastructure and resources

Page 11: Cloud security

CLOUD COMPUTINGAlexandra Institute

SECURITY

Page 12: Cloud security

Click to edit Master title style14 Specific Cloud Computing Security Challenges*1. Migrating PII & sensitive data to the cloud

EU Data Protection Directive & U.S. Safe Harbor program Exposure of data to foreign government & data Subpoenas Data retention & records management issues Privacy Impact Assessments (PIA)

2. Identity & Access Management3. Multi-tenancy4. Logging & Monitoring5. Data ownership /custodianship6. Quality of Service guarantees7. Securing hypervisors (Blue Pill)

*Cloud Computing An insight in the Governance & Security aspects\Marc Vael

Page 13: Cloud security

Click to edit Master title style14 Specific Cloud Computing Security Challenges*8. Attracting hackers (high value target)9. Security of virtual OS in the cloud10.BCP / DRP11. Data encryption & key management

Encrypting access to cloud resource control interface Encrypting administrative access to OS instances Encrypting access to applications Encrypting application data at rest

12.Public cloud vs. Internal cloud security13.Lack of public SaaS version control14.14.Using SLAs to obtain cloud security

Suggested requirements for cloud SLAs Issues with cloud forensics & e-discovery

*Cloud Computing An insight in the Governance & Security aspects\Marc Vael

Page 14: Cloud security

Click to edit Master title style

How Security Gets Integrated

Domain 2 Governance

and Enterprise

Risk Management

Domain 2 Governance

and Enterprise

Risk Management

Domain 4 Compliance and Audit

Domain 5 Information

Lifecycle Management

Domain 6 Portability

and Interoperability

Domain 6 Portability

and Interoperability

Domain 10Application

Security

Domain 6 Portability

and Interoperability

Domain 8 Data Center Operations

Domain3Legal and Electronic Discovery

Domain 7Traditional Security,

Business Continuity, and

Disaster Recovery

Domain 7Traditional Security,

Business Continuity, and

Disaster Recovery

Domain 9Incident Response,

Notification, and Remediation

Domain 11 Encryption and

Key Management

Domain 11 Encryption and Key

Management

Domain 12 Identity and Access

Management

Domain 12 Identity and

Access Management

Domain 13 Virtualization

Page 15: Cloud security

Click to edit Master title styleFor more information go to Alexandra.dk/CCSK