SlideShare une entreprise Scribd logo
1  sur  20
Télécharger pour lire hors ligne
© 2012 Newvem All rights reserved




                   Cloud Security Management
                     Overview and Challenges




                                    IGT Cloud Management Forum
Who Am I ?
Ofir Nachmani, Cloud Computing Evangelist

         Chief Community at Newvem.com

         Blogger at IAmOnDemand.com

 My Experience
  Cloud Adoption
  SaaS Deployment
  Cloud Management



                      © 2012 Newvem All rights reserved
http://www.quora.com/KnowYourCloud




       © 2012 Newvem All rights reserved
What is the first priority cloud security concern?

               … manage is ensuring there is a consistent, time-
               boxed, and reliable, set of access               control
               policies and systems implemented so that as
               users move around various levels of privileges




http://www.quora.com/KnowYourCloud



                            © 2012 Newvem All rights reserved
What is the first priority cloud security concern?

               First priority is to figure out what data you have there
               and how important it is to you (Data Classification).
               Then look at the risks                  to that data




http://www.quora.com/KnowYourCloud



                            © 2012 Newvem All rights reserved
What is the first priority cloud security concern?

               I can readily think of these risk buckets
               1. Security Risks ….
               2. Privacy Risks ..
               3. Control Risks ..



http://www.quora.com/KnowYourCloud



                            © 2012 Newvem All rights reserved
What is the first priority cloud security concern?

               When on the cloud, it is very important to know what
               laws would be applicable. For example, many of our
                      not want to host in the US
               clients do
               due to PATRIOT Act (and in the inevitable
               Protect IP Act). .. What laws would be applicable on
               the data and what privacy                        laws will protect
               my data on the cloud


http://www.quora.com/KnowYourCloud



                            © 2012 Newvem All rights reserved
What is the first priority cloud security concern?

               Cloud computing is seen as being
                                         more
               vulnerable to online attacks than
               having the data stored on private servers ..
               Additionally, there are considerations concerning data
               security, including                  confidentiality and
               availability

http://www.quora.com/KnowYourCloud



                            © 2012 Newvem All rights reserved
Cloud Security Aspects




                  © 2012 Newvem All rights reserved
Cloud Security Aspects




 April 2011 – 103 US cloud service providers 24 in six European
 countries for a total of 127 separate providers

                             © 2012 Newvem All rights reserved
Less security in the cloud ?




                   © 2012 Newvem All rights reserved
Less security in the cloud ?




    Focus on cost and speed and not on security or data protection
   creates a security hole.


                          © 2012 Newvem All rights reserved
Who is most responsible ?




    Cloud providers see the cloud user as most responsible for security
    Organizations may be over relying on their cloud vendor


                         © 2012 Newvem All rights reserved
More than 300% growth !

  Analyze Your AWS Cloud usage


                          © 2012 Newvem.Com All rights reserved
5 biggest security AWS users’ mistakes
   Leaving database server IP ports open

   Opening access to IP ports from all internal AWS
   servers

   Leaving IP ports open to all IP addresses

   Allowing access to critical IP ports from public
   Internet IP addresses

   Making Amazon Machine Images publicly
   accessible
                    © 2012 Newvem All rights reserved
5 biggest security AWS users’ mistakes




                               CloudRadar
       http://www.newvem.com/topic/cloud-radar

                   © 2012 Newvem All rights reserved
Cloud Insights and Solutions Partners




                   © 2012 Newvem.Com All rights reserved
AWS Security Experts




 More than 300% growth !


 http://www.newvem.com/experts-directory


                           © 2012 Newvem.Com All rights reserved
http://www.newvem.com/Sign-up
        It is Free !
           © 2012 Newvem All rights reserved
THANKS !
      Chief Community at Newvem.com

      Blogger at IAmOnDemand.com

                                                          ofir@newvem.com
                                                           Mobile: 0549961555
                                                           Skype: ofirn76



                                                      @IAmOnDemand
@KnowYourCloud
                                @Newvem

                  © 2012 Newvem All rights reserved

Contenu connexe

Tendances

Oracle Social Welfare and the Cloud - WernbergTougaard
Oracle Social Welfare and the Cloud - WernbergTougaardOracle Social Welfare and the Cloud - WernbergTougaard
Oracle Social Welfare and the Cloud - WernbergTougaard
Christian Wernberg-Tougaard
 
accenturetechnologyvision2015slidshare-150129052229-conversion-gate01
accenturetechnologyvision2015slidshare-150129052229-conversion-gate01accenturetechnologyvision2015slidshare-150129052229-conversion-gate01
accenturetechnologyvision2015slidshare-150129052229-conversion-gate01
Crissa Toledo
 

Tendances (20)

SI Alliance Marketing - Insurance Analytics Solution Webinar
SI Alliance Marketing - Insurance Analytics Solution WebinarSI Alliance Marketing - Insurance Analytics Solution Webinar
SI Alliance Marketing - Insurance Analytics Solution Webinar
 
What is software product management
What is software  product managementWhat is software  product management
What is software product management
 
Accenture: ACIC Rome & Commvault
Accenture: ACIC Rome & Commvault Accenture: ACIC Rome & Commvault
Accenture: ACIC Rome & Commvault
 
Cisco Connect Ottawa 2018 multi cloud
Cisco Connect Ottawa 2018 multi cloudCisco Connect Ottawa 2018 multi cloud
Cisco Connect Ottawa 2018 multi cloud
 
HEALTHCARE, THE CLOUD, AND ITS SECURITY
HEALTHCARE, THE CLOUD, AND ITS SECURITYHEALTHCARE, THE CLOUD, AND ITS SECURITY
HEALTHCARE, THE CLOUD, AND ITS SECURITY
 
Devoteam Knowledge Communities - 2014 Activity Report
Devoteam Knowledge Communities - 2014 Activity Report   Devoteam Knowledge Communities - 2014 Activity Report
Devoteam Knowledge Communities - 2014 Activity Report
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Atlas Copco Smart Connected Assembly Industry 4.0
Atlas Copco Smart Connected Assembly Industry 4.0Atlas Copco Smart Connected Assembly Industry 4.0
Atlas Copco Smart Connected Assembly Industry 4.0
 
Software Operability webinar
Software Operability webinarSoftware Operability webinar
Software Operability webinar
 
Enable Oauth2.0 with Sentinet API Management (Massimo Crippa @ BTUG Event)
Enable Oauth2.0 with Sentinet API Management (Massimo Crippa @ BTUG Event)Enable Oauth2.0 with Sentinet API Management (Massimo Crippa @ BTUG Event)
Enable Oauth2.0 with Sentinet API Management (Massimo Crippa @ BTUG Event)
 
Oracle Social Welfare and the Cloud - WernbergTougaard
Oracle Social Welfare and the Cloud - WernbergTougaardOracle Social Welfare and the Cloud - WernbergTougaard
Oracle Social Welfare and the Cloud - WernbergTougaard
 
Nff 15112011 education from the cloud
Nff 15112011 education from the cloudNff 15112011 education from the cloud
Nff 15112011 education from the cloud
 
Accenture Motivated By Mobility
Accenture   Motivated By MobilityAccenture   Motivated By Mobility
Accenture Motivated By Mobility
 
WUD2010 Sophia 03 - A. Andres Del Valle (Accenture Labs) : Technology design ...
WUD2010 Sophia 03 - A. Andres Del Valle (Accenture Labs) : Technology design ...WUD2010 Sophia 03 - A. Andres Del Valle (Accenture Labs) : Technology design ...
WUD2010 Sophia 03 - A. Andres Del Valle (Accenture Labs) : Technology design ...
 
Manufacturing and the data conundrum
Manufacturing and the data conundrumManufacturing and the data conundrum
Manufacturing and the data conundrum
 
accenturetechnologyvision2015slidshare-150129052229-conversion-gate01
accenturetechnologyvision2015slidshare-150129052229-conversion-gate01accenturetechnologyvision2015slidshare-150129052229-conversion-gate01
accenturetechnologyvision2015slidshare-150129052229-conversion-gate01
 
Pwc digital-iq-report final
Pwc digital-iq-report finalPwc digital-iq-report final
Pwc digital-iq-report final
 
Key trend in strategic sourcing
Key trend in strategic sourcing Key trend in strategic sourcing
Key trend in strategic sourcing
 
Reaching Net Zero by 2050
Reaching Net Zero by 2050Reaching Net Zero by 2050
Reaching Net Zero by 2050
 
Case Study - Microsemi Uses Microsoft Dynamics AX to Reduce Costs and Improve...
Case Study - Microsemi Uses Microsoft Dynamics AX to Reduce Costs and Improve...Case Study - Microsemi Uses Microsoft Dynamics AX to Reduce Costs and Improve...
Case Study - Microsemi Uses Microsoft Dynamics AX to Reduce Costs and Improve...
 

En vedette

เที่ยว Koh phi phi
เที่ยว Koh phi phiเที่ยว Koh phi phi
เที่ยว Koh phi phi
TIFFY55
 
Security Management in the Cloud
Security Management in the CloudSecurity Management in the Cloud
Security Management in the Cloud
GaryArdito
 
Slides cloud computing
Slides cloud computingSlides cloud computing
Slides cloud computing
Haslina
 

En vedette (13)

Cloud security ppt
Cloud security pptCloud security ppt
Cloud security ppt
 
เที่ยว Koh phi phi
เที่ยว Koh phi phiเที่ยว Koh phi phi
เที่ยว Koh phi phi
 
Security Management in the Cloud
Security Management in the CloudSecurity Management in the Cloud
Security Management in the Cloud
 
Integrated Cloud Security
Integrated Cloud SecurityIntegrated Cloud Security
Integrated Cloud Security
 
Presentation cloud management platform
Presentation   cloud management platformPresentation   cloud management platform
Presentation cloud management platform
 
Enterprise Cloud Risk And Security
Enterprise Cloud Risk And SecurityEnterprise Cloud Risk And Security
Enterprise Cloud Risk And Security
 
Data security in the cloud
Data security in the cloud Data security in the cloud
Data security in the cloud
 
AWS Summit Seoul 2015 - 국내 사례로 본 클라우드 운영 최적화 (이주완-메가존)
AWS Summit Seoul 2015 -  국내 사례로 본 클라우드 운영 최적화  (이주완-메가존)AWS Summit Seoul 2015 -  국내 사례로 본 클라우드 운영 최적화  (이주완-메가존)
AWS Summit Seoul 2015 - 국내 사례로 본 클라우드 운영 최적화 (이주완-메가존)
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
External Analysis Strategic Management Ljmu
External Analysis   Strategic Management LjmuExternal Analysis   Strategic Management Ljmu
External Analysis Strategic Management Ljmu
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Slides cloud computing
Slides cloud computingSlides cloud computing
Slides cloud computing
 
Cloud computing simple ppt
Cloud computing simple pptCloud computing simple ppt
Cloud computing simple ppt
 

Similaire à Cloud security management by newvem

Securing Your Cloud Servers with Halo NetSec
Securing Your Cloud Servers with Halo NetSecSecuring Your Cloud Servers with Halo NetSec
Securing Your Cloud Servers with Halo NetSec
CloudPassage
 
Lions and Tigers and Cloud, Oh My! The Truth Behind Cloud Security and Risks
Lions and Tigers and Cloud, Oh My! The Truth Behind Cloud Security and RisksLions and Tigers and Cloud, Oh My! The Truth Behind Cloud Security and Risks
Lions and Tigers and Cloud, Oh My! The Truth Behind Cloud Security and Risks
SAP Ariba
 

Similaire à Cloud security management by newvem (20)

Cloud Security Strategy
Cloud Security StrategyCloud Security Strategy
Cloud Security Strategy
 
Five cloud security tips
Five cloud security tipsFive cloud security tips
Five cloud security tips
 
Cloud Computing and Security - ISACA Hyderabad Chapter Presentation
Cloud Computing and Security - ISACA Hyderabad Chapter PresentationCloud Computing and Security - ISACA Hyderabad Chapter Presentation
Cloud Computing and Security - ISACA Hyderabad Chapter Presentation
 
Securing Your Cloud Servers with Halo NetSec
Securing Your Cloud Servers with Halo NetSecSecuring Your Cloud Servers with Halo NetSec
Securing Your Cloud Servers with Halo NetSec
 
Infor i Business Cloud
Infor i Business CloudInfor i Business Cloud
Infor i Business Cloud
 
secued cloud
 secued cloud secued cloud
secued cloud
 
Cloud security
Cloud securityCloud security
Cloud security
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
 
CCSK, cloud security framework, Indonesia
CCSK, cloud security framework, IndonesiaCCSK, cloud security framework, Indonesia
CCSK, cloud security framework, Indonesia
 
Building A Cloud-Ready Security Program
Building A Cloud-Ready Security ProgramBuilding A Cloud-Ready Security Program
Building A Cloud-Ready Security Program
 
Secued Cloud
 Secued  Cloud Secued  Cloud
Secued Cloud
 
Cloud Security - Kloudlearn
Cloud Security - KloudlearnCloud Security - Kloudlearn
Cloud Security - Kloudlearn
 
UNIT -V.docx
UNIT -V.docxUNIT -V.docx
UNIT -V.docx
 
Lions and Tigers and Cloud, Oh My! The Truth Behind Cloud Security and Risks
Lions and Tigers and Cloud, Oh My! The Truth Behind Cloud Security and RisksLions and Tigers and Cloud, Oh My! The Truth Behind Cloud Security and Risks
Lions and Tigers and Cloud, Oh My! The Truth Behind Cloud Security and Risks
 
Global Efforts to Secure Cloud Computing
Global Efforts to Secure Cloud Computing Global Efforts to Secure Cloud Computing
Global Efforts to Secure Cloud Computing
 
secued cloud ppt
secued cloud pptsecued cloud ppt
secued cloud ppt
 
Lss implementing cyber security in the cloud, and from the cloud-feb14
Lss implementing cyber security in the cloud, and from the cloud-feb14Lss implementing cyber security in the cloud, and from the cloud-feb14
Lss implementing cyber security in the cloud, and from the cloud-feb14
 
OWASP Cloud Top 10
OWASP Cloud Top 10OWASP Cloud Top 10
OWASP Cloud Top 10
 
Cloud Backup Overview
Cloud Backup OverviewCloud Backup Overview
Cloud Backup Overview
 
Cloud securityperspectives cmg
Cloud securityperspectives cmgCloud securityperspectives cmg
Cloud securityperspectives cmg
 

Plus de Newvewm

Plus de Newvewm (12)

Entrepreneur un slideshow v6
Entrepreneur un slideshow v6Entrepreneur un slideshow v6
Entrepreneur un slideshow v6
 
The Inevitable Cloud Outage
The Inevitable Cloud OutageThe Inevitable Cloud Outage
The Inevitable Cloud Outage
 
Newvem's Utilization Heat Map
Newvem's Utilization Heat MapNewvem's Utilization Heat Map
Newvem's Utilization Heat Map
 
Hitting Your Cloud’s Usage Sweet Spot
Hitting Your Cloud’s Usage Sweet SpotHitting Your Cloud’s Usage Sweet Spot
Hitting Your Cloud’s Usage Sweet Spot
 
Cloudpreneurs - McKinsey Reveals Fast Growth of Cloud Adoption
Cloudpreneurs - McKinsey Reveals Fast Growth of Cloud AdoptionCloudpreneurs - McKinsey Reveals Fast Growth of Cloud Adoption
Cloudpreneurs - McKinsey Reveals Fast Growth of Cloud Adoption
 
Onavo aws summit 2012
Onavo   aws summit 2012Onavo   aws summit 2012
Onavo aws summit 2012
 
ClickSoftware AWS Customer Case
ClickSoftware AWS Customer CaseClickSoftware AWS Customer Case
ClickSoftware AWS Customer Case
 
SaaS as a Security Hazard - Google Apps Security Example
SaaS as a Security Hazard - Google Apps Security ExampleSaaS as a Security Hazard - Google Apps Security Example
SaaS as a Security Hazard - Google Apps Security Example
 
Hadoop & MapReduce
Hadoop & MapReduceHadoop & MapReduce
Hadoop & MapReduce
 
Monitoring Your AWS Cloud Infrastructure
Monitoring Your AWS Cloud InfrastructureMonitoring Your AWS Cloud Infrastructure
Monitoring Your AWS Cloud Infrastructure
 
OneHourTranslation - AWS Cloud Case Study
OneHourTranslation - AWS Cloud Case StudyOneHourTranslation - AWS Cloud Case Study
OneHourTranslation - AWS Cloud Case Study
 
Secure Your AWS Cloud Data by Porticor
Secure Your AWS Cloud Data by PorticorSecure Your AWS Cloud Data by Porticor
Secure Your AWS Cloud Data by Porticor
 

Dernier

Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Dernier (20)

Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source Milvus
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 

Cloud security management by newvem

  • 1. © 2012 Newvem All rights reserved Cloud Security Management Overview and Challenges IGT Cloud Management Forum
  • 2. Who Am I ? Ofir Nachmani, Cloud Computing Evangelist Chief Community at Newvem.com Blogger at IAmOnDemand.com My Experience  Cloud Adoption  SaaS Deployment  Cloud Management © 2012 Newvem All rights reserved
  • 3. http://www.quora.com/KnowYourCloud © 2012 Newvem All rights reserved
  • 4. What is the first priority cloud security concern? … manage is ensuring there is a consistent, time- boxed, and reliable, set of access control policies and systems implemented so that as users move around various levels of privileges http://www.quora.com/KnowYourCloud © 2012 Newvem All rights reserved
  • 5. What is the first priority cloud security concern? First priority is to figure out what data you have there and how important it is to you (Data Classification). Then look at the risks to that data http://www.quora.com/KnowYourCloud © 2012 Newvem All rights reserved
  • 6. What is the first priority cloud security concern? I can readily think of these risk buckets 1. Security Risks …. 2. Privacy Risks .. 3. Control Risks .. http://www.quora.com/KnowYourCloud © 2012 Newvem All rights reserved
  • 7. What is the first priority cloud security concern? When on the cloud, it is very important to know what laws would be applicable. For example, many of our not want to host in the US clients do due to PATRIOT Act (and in the inevitable Protect IP Act). .. What laws would be applicable on the data and what privacy laws will protect my data on the cloud http://www.quora.com/KnowYourCloud © 2012 Newvem All rights reserved
  • 8. What is the first priority cloud security concern? Cloud computing is seen as being more vulnerable to online attacks than having the data stored on private servers .. Additionally, there are considerations concerning data security, including confidentiality and availability http://www.quora.com/KnowYourCloud © 2012 Newvem All rights reserved
  • 9. Cloud Security Aspects © 2012 Newvem All rights reserved
  • 10. Cloud Security Aspects April 2011 – 103 US cloud service providers 24 in six European countries for a total of 127 separate providers © 2012 Newvem All rights reserved
  • 11. Less security in the cloud ? © 2012 Newvem All rights reserved
  • 12. Less security in the cloud ? Focus on cost and speed and not on security or data protection creates a security hole. © 2012 Newvem All rights reserved
  • 13. Who is most responsible ? Cloud providers see the cloud user as most responsible for security Organizations may be over relying on their cloud vendor © 2012 Newvem All rights reserved
  • 14. More than 300% growth ! Analyze Your AWS Cloud usage © 2012 Newvem.Com All rights reserved
  • 15. 5 biggest security AWS users’ mistakes Leaving database server IP ports open Opening access to IP ports from all internal AWS servers Leaving IP ports open to all IP addresses Allowing access to critical IP ports from public Internet IP addresses Making Amazon Machine Images publicly accessible © 2012 Newvem All rights reserved
  • 16. 5 biggest security AWS users’ mistakes CloudRadar http://www.newvem.com/topic/cloud-radar © 2012 Newvem All rights reserved
  • 17. Cloud Insights and Solutions Partners © 2012 Newvem.Com All rights reserved
  • 18. AWS Security Experts More than 300% growth ! http://www.newvem.com/experts-directory © 2012 Newvem.Com All rights reserved
  • 19. http://www.newvem.com/Sign-up It is Free ! © 2012 Newvem All rights reserved
  • 20. THANKS ! Chief Community at Newvem.com Blogger at IAmOnDemand.com ofir@newvem.com Mobile: 0549961555 Skype: ofirn76 @IAmOnDemand @KnowYourCloud @Newvem © 2012 Newvem All rights reserved