SlideShare une entreprise Scribd logo
1  sur  6
Télécharger pour lire hors ligne
Information Security in the
  Government Workshop
   Cloud and e-Service Security
 Disaster, Data Loss and the Cloud
  Dr. Richard H.L. Marshall, Esq.
Disaster, Data Loss and the Cloud
• Many Companies and USG agencies consider their data to be their
  most valuable asset.
• However, they’ve been challenged trying to keep their “crown
  jewels” safe, especially from the increasing number of natural
  disasters as well as host of man-made problems.
• The cloud offers a way to better protect their data. The growing
  acceptance of using the cloud to safely store data will continue to
  increase as costs come down and ease of accessibility increases.
• Storage and backup solutions are the most popular cloud
  applications.
• The cloud provides many benefits over traditional methods of
  storing and backing up data such as using USB flash drives or
  CDs/DVDs.
• Cloud backup is automatic and restoration is simplified.
Reassing Cloud Security
• The cloud provides numerous mechanisms for safeguarding data.
• Traditionally, a program runs on a dedicated physical machine and
  any system outage or physical issue would impact the program
  directly and result in data loss.
• With the cloud, the program runs on a virtual machine. The
  physical layer is separated from the software layer.
• This pools all the physical resources, allocating them when they are
  needed, and eliminates the single point of failure in the traditional
  approach.
• The cloud operating system supports data storage by distribution
  mode or mirror mode, meaning that the data will be duplicated and
  stored in different physical disks in the pool.
• Cloud advocates assert that this guarantees data safety and allows
  for easy data recovery
Reassing Cloud Security
• Organizations such as the USG opt to implement a multipronged
  approach to data protection.
• It can provide automatic data encryption, auditing of operation
  logs, more stringent ways to authenticate users and other security
  mechanisms.
• Security concerns include authentication, authorization, accounting
  (AAA) services; encryption; storage; security breaches; regulatory
  compliance; location of data and users; and other risks associated
  with isolating sensitive corporate data.
• Add to this array of concerns the potential loss of control over your
  data, and the cloud model starts to get a little scary.
• No matter where your applications live in the cloud or how they are
  being served, one theme is consistent: You are hosting and
  delivering your critical data at a third-party location, not within your
  four walls, and keeping that data safe is a top priority.
Reassing Cloud Security
• The problem is that you really do not know where in the cloud the
  data is at any given moment.
• IT departments are already anxious about the confidentially and
  integrity of sensitive data.
• Hosting this data in the cloud highlights not only concerns about
  protecting critical data in a third-party location but also role-based
  access control to that data for normal business functions.
• The cloud does not lend itself to static security controls.
• Like all other elements within cloud architecture, security must be
  integrated into a centralized, dynamic control plane.
• In the cloud, security solutions must have the capability to intercept
  all data traffic, interpret its context, and then make appropriate
  decisions about that traffic, including instructing other cloud
  elements how to handle it.
Reassing Cloud Security
• One of the biggest areas of concern for both cloud vendors and
  customers alike is strong authentication, authorization, and
  automatic encryption of data to and from the cloud.
• Users and administrators alike need to be authenticated—with
  strong or two-factor authentication—to ensure that only authorized
  personnel are able to access data.
• And, the data itself needs to be segmented to ensure there is no
  leakage to other users or systems.
• AAA services along with secure, encrypted tunnels to manage your
  cloud infrastructure should be at the top of the basic cloud services
  offered by vendors.
• Since data can be housed at a distant location where you have less
  physical control, logical control becomes paramount, and enforcing
  strict access to raw data and protecting data in transit (such as
  uploading new data) becomes critical to the business.

Contenu connexe

Plus de E-Government Center Moldova

The nexus of Social, Mobile, Cloud and Big Data Analytics
The nexus of Social, Mobile, Cloud and Big Data AnalyticsThe nexus of Social, Mobile, Cloud and Big Data Analytics
The nexus of Social, Mobile, Cloud and Big Data AnalyticsE-Government Center Moldova
 
Prezentare compartiment securitatea 05 03 2013 p sincariuc
Prezentare compartiment securitatea 05 03 2013 p sincariucPrezentare compartiment securitatea 05 03 2013 p sincariuc
Prezentare compartiment securitatea 05 03 2013 p sincariucE-Government Center Moldova
 
Can e government work in the cloud reichstaedter
Can e government work in the cloud reichstaedterCan e government work in the cloud reichstaedter
Can e government work in the cloud reichstaedterE-Government Center Moldova
 
Driving government efficiency and innovation through cloud computing k...
Driving government efficiency and  innovation through      cloud computing  k...Driving government efficiency and  innovation through      cloud computing  k...
Driving government efficiency and innovation through cloud computing k...E-Government Center Moldova
 
Unleashing the potential of cloud computing in europe francisco garcia moran
Unleashing the potential of cloud computing in europe francisco garcia moranUnleashing the potential of cloud computing in europe francisco garcia moran
Unleashing the potential of cloud computing in europe francisco garcia moranE-Government Center Moldova
 
Government innovation through cloud computing arthur riel
Government innovation through cloud computing arthur rielGovernment innovation through cloud computing arthur riel
Government innovation through cloud computing arthur rielE-Government Center Moldova
 

Plus de E-Government Center Moldova (20)

The nexus of Social, Mobile, Cloud and Big Data Analytics
The nexus of Social, Mobile, Cloud and Big Data AnalyticsThe nexus of Social, Mobile, Cloud and Big Data Analytics
The nexus of Social, Mobile, Cloud and Big Data Analytics
 
Digital Transformation by Richard Baird
Digital Transformation by Richard BairdDigital Transformation by Richard Baird
Digital Transformation by Richard Baird
 
Mpay&Mcloud
Mpay&McloudMpay&Mcloud
Mpay&Mcloud
 
Presentation cert gov-md 05.03.2013
Presentation cert gov-md 05.03.2013Presentation cert gov-md 05.03.2013
Presentation cert gov-md 05.03.2013
 
Hannes astok data protection agency
Hannes astok data protection agencyHannes astok data protection agency
Hannes astok data protection agency
 
Prezentare compartiment securitatea 05 03 2013 p sincariuc
Prezentare compartiment securitatea 05 03 2013 p sincariucPrezentare compartiment securitatea 05 03 2013 p sincariuc
Prezentare compartiment securitatea 05 03 2013 p sincariuc
 
Hannes astok policy development
Hannes astok policy developmentHannes astok policy development
Hannes astok policy development
 
Digital security hannes astok
Digital security hannes astokDigital security hannes astok
Digital security hannes astok
 
Assessing cybersecurity_Anto Veldre
Assessing cybersecurity_Anto VeldreAssessing cybersecurity_Anto Veldre
Assessing cybersecurity_Anto Veldre
 
MCloud operational framework
MCloud operational frameworkMCloud operational framework
MCloud operational framework
 
Arhitectura de securitate_MCloud
Arhitectura de securitate_MCloudArhitectura de securitate_MCloud
Arhitectura de securitate_MCloud
 
Ibm smart cloud solutions m-cloud
Ibm smart cloud solutions   m-cloudIbm smart cloud solutions   m-cloud
Ibm smart cloud solutions m-cloud
 
Ibm security virtual server protection
Ibm security virtual server protectionIbm security virtual server protection
Ibm security virtual server protection
 
Can e government work in the cloud reichstaedter
Can e government work in the cloud reichstaedterCan e government work in the cloud reichstaedter
Can e government work in the cloud reichstaedter
 
Driving government efficiency and innovation through cloud computing k...
Driving government efficiency and  innovation through      cloud computing  k...Driving government efficiency and  innovation through      cloud computing  k...
Driving government efficiency and innovation through cloud computing k...
 
Star storage m cloud week
Star storage m cloud weekStar storage m cloud week
Star storage m cloud week
 
Unleashing the potential of cloud computing in europe francisco garcia moran
Unleashing the potential of cloud computing in europe francisco garcia moranUnleashing the potential of cloud computing in europe francisco garcia moran
Unleashing the potential of cloud computing in europe francisco garcia moran
 
Government innovation through cloud computing arthur riel
Government innovation through cloud computing arthur rielGovernment innovation through cloud computing arthur riel
Government innovation through cloud computing arthur riel
 
4 francisco garcia_moran_moldova_2013
4 francisco garcia_moran_moldova_20134 francisco garcia_moran_moldova_2013
4 francisco garcia_moran_moldova_2013
 
3 platforma tehnologica_m-cloud
3 platforma tehnologica_m-cloud3 platforma tehnologica_m-cloud
3 platforma tehnologica_m-cloud
 

Richard marshall information_security_in_the_government_workshop6

  • 1. Information Security in the Government Workshop Cloud and e-Service Security Disaster, Data Loss and the Cloud Dr. Richard H.L. Marshall, Esq.
  • 2. Disaster, Data Loss and the Cloud • Many Companies and USG agencies consider their data to be their most valuable asset. • However, they’ve been challenged trying to keep their “crown jewels” safe, especially from the increasing number of natural disasters as well as host of man-made problems. • The cloud offers a way to better protect their data. The growing acceptance of using the cloud to safely store data will continue to increase as costs come down and ease of accessibility increases. • Storage and backup solutions are the most popular cloud applications. • The cloud provides many benefits over traditional methods of storing and backing up data such as using USB flash drives or CDs/DVDs. • Cloud backup is automatic and restoration is simplified.
  • 3. Reassing Cloud Security • The cloud provides numerous mechanisms for safeguarding data. • Traditionally, a program runs on a dedicated physical machine and any system outage or physical issue would impact the program directly and result in data loss. • With the cloud, the program runs on a virtual machine. The physical layer is separated from the software layer. • This pools all the physical resources, allocating them when they are needed, and eliminates the single point of failure in the traditional approach. • The cloud operating system supports data storage by distribution mode or mirror mode, meaning that the data will be duplicated and stored in different physical disks in the pool. • Cloud advocates assert that this guarantees data safety and allows for easy data recovery
  • 4. Reassing Cloud Security • Organizations such as the USG opt to implement a multipronged approach to data protection. • It can provide automatic data encryption, auditing of operation logs, more stringent ways to authenticate users and other security mechanisms. • Security concerns include authentication, authorization, accounting (AAA) services; encryption; storage; security breaches; regulatory compliance; location of data and users; and other risks associated with isolating sensitive corporate data. • Add to this array of concerns the potential loss of control over your data, and the cloud model starts to get a little scary. • No matter where your applications live in the cloud or how they are being served, one theme is consistent: You are hosting and delivering your critical data at a third-party location, not within your four walls, and keeping that data safe is a top priority.
  • 5. Reassing Cloud Security • The problem is that you really do not know where in the cloud the data is at any given moment. • IT departments are already anxious about the confidentially and integrity of sensitive data. • Hosting this data in the cloud highlights not only concerns about protecting critical data in a third-party location but also role-based access control to that data for normal business functions. • The cloud does not lend itself to static security controls. • Like all other elements within cloud architecture, security must be integrated into a centralized, dynamic control plane. • In the cloud, security solutions must have the capability to intercept all data traffic, interpret its context, and then make appropriate decisions about that traffic, including instructing other cloud elements how to handle it.
  • 6. Reassing Cloud Security • One of the biggest areas of concern for both cloud vendors and customers alike is strong authentication, authorization, and automatic encryption of data to and from the cloud. • Users and administrators alike need to be authenticated—with strong or two-factor authentication—to ensure that only authorized personnel are able to access data. • And, the data itself needs to be segmented to ensure there is no leakage to other users or systems. • AAA services along with secure, encrypted tunnels to manage your cloud infrastructure should be at the top of the basic cloud services offered by vendors. • Since data can be housed at a distant location where you have less physical control, logical control becomes paramount, and enforcing strict access to raw data and protecting data in transit (such as uploading new data) becomes critical to the business.