The document discusses some of the main security concerns with cloud computing, including data privacy, security, and issues of trust. It suggests adopting a layered security approach, using encryption, strong authentication methods, and choosing reputable cloud providers. While cloud computing security risks exist, the document argues providers have incentives to maintain good security practices and outlines some typical security processes providers have in place. It recommends a gradual approach to cloud adoption starting with non-critical systems.
32. Data Lost It is unlikely. Reputable Cloud Providers copy data 3-4 times
33. However, it is normal to store highly value-able datain two or more different cloud providers Data Service replicated replicated Cloud Provider 1 Cloud Provider 2
35. Data in Transit data Internet Cloud Provider It can be secured using encryption technology, e.g. SSL It is used especially for sensitive data
36. Data at Rest Cloud Provider Biggest prize for attackers! More and more cloud providers are developing nativedata encryption Even if it is stolen, it will be useless for attackers
39. Security processes are typically in place for physical access Background Check Two factor authentication Intrusion detection system Audit Video surveillance
40. Multi tenant Infrastructure Corporate 4 Corporate 3 Corporate 2 Corporate 1 …infrastructure is shared by many corporations (tenant)
42. Cloud Providers use isolationtechniques Data Isolation Virtualization Computing Isolation a vulnerability in one tenant has little impact on other tenants
60. Follow discussions and presentations on facebook “I’m Cloud Confused” http://www.facebook.com/pages/Im-Cloud-Confused/219897591208?ref=ts
61. You Us 10simple questions,2minutes to completehttp://surveymonkey.com/s.aspx?sm=NrndNTZkoG6j8BWJYejC1g_3d_3d Will Publish Results on facebook
62. Want to try Cloudfor your business now ? Only a few minutes to setup http://www.slideshare.net/Guppers/guppers-3-minute-walkthrough
63. For more presentations like this, visit, follow, subscribe to: Blog: http://www.andyharjanto.com Twitter: http://twitter.com/harjanto Contact: andy@guppers.com