SlideShare une entreprise Scribd logo
1  sur  12
Cloud Computing



CLOUD SECURITY




    PEDRO ALEXANDER ROMERO
Cloud Security

Agenda
- Security Framework
- What Vendors Should do
- What Customers Should do




                       From: www.rackspace.com/cloud/cloudu
Cloud Security

A Security Framework for the Cloud
The Cloud Security Alliance (CSA) is a non-profit
organization formed to promote the use of best practices for
providing security assurance within Cloud Computing, and
provide education on the uses of Cloud Computing to help
secure all other forms of computing.

Objectives:
 Promote a common level of understanding between the
  consumers and providers
 Promote independent research into best practices.
 Create consensus lists of issues and guidance for cloud
  security assurance
Cloud Security

What Vendors Should Do                            (1/7)

 1.   Physical Data Center Security
 2.   Security of Host Machine Operating System
 3.   Control of Hypervisor
 4.   Network Security
 5.   Virtual Machine Security
Cloud Security

What Vendors Should Do                             (2/7)
1. Physical Data Center Security:


  Security of the Building: Keycard protocols, biometric
   scanning protocols and round-the-clock interior and
   exterior surveillance
  Authorization of Personnel: Only authorized data
   center personnel should be granted access
  Employee Background checking: Before they’re hired
Cloud Security

What Vendors Should Do                                       (3/7)
2. Security of Host Machine Operating System:
 The operating system within which virtual machines are
 hosted requires extra scrutiny as it is the manager for
 guest virtual machines.
    Intrusiondetection system
    The minimum number of users accounts possible
    Limited administrator access to named accounts
    No publicly accessible network accessible services


                 Vulnerabilities in the base OS
      can have impacts on the individual Virtual Machines.
Cloud Security

What Vendors Should Do                                    (4/7)
3. Control of the Hypervisor:
 While, in most cases, control of individual virtual machines
 is the responsibility for the customer, vendors need to
 ensure robust security of the hypervisor itself, the tool
 which keeps the individual virtual machines separate.



Hypervisor or virtual machine monitor (VMM) is a piece of computer
   software, firmware or hardware that creates and runs virtual
                            machines.
Cloud Security

What Vendors Should Do   (5/7)
4. Network Security:
Cloud Security

What Vendors Should Do                               (6/7)
4. Network Security: (Cont.)
 Consists of the policies and procedures adopted by the
 network administrator to prevent and monitor
 unauthorized access, misuse, modification or denial of the
 computer network and network-accessible resources.

   Includes:
      Perimeter Controls
      Network access

      Regulate access control
Cloud Security

What Vendors Should Do                             (7/7)
5.   Virtual Machine Security
                                Virtual machines share
                                the same security
                                vulnerabilities as
                                physical machines and
                                should be protected from
                                the same problems:
                                hardware
                                failures, viruses, hacking
                                , data corruption.
Cloud Security

What Customers Should Do
 Customers too have an important part to play in ensuring
 the security of the solutions they utilize.

1. Firewall
2. Patches and Backups
3. Passwords
4. Controlling Access to Devices Connected to the
   Cloud
5. Ensuring the Security of Staff
Cloud Security

What Customers Should Do

The Whispered Truth - Your Data, Your Responsibility
In Infrastructure as a Service (IaaS) and Platform as a
Service (PaaS) clouds, protecting data at rest is Customer
responsibility not the Providers.
To meet privacy obligations to the company customers and employees,
and to comply with regulatory standards such as PCI DSS and SOX, is a
must to securely encrypt cloud-based data, while keeping operational
overhead to a minimum.

PCI DSS: Payment Card Industry Data Security Standard
SOX:Sarbanes-Oxley Act of 2002

Contenu connexe

Tendances

UserLock Datasheet
UserLock DatasheetUserLock Datasheet
UserLock DatasheetIS Decisions
 
How unified threat management (utm) can benefit your enterprise network envir...
How unified threat management (utm) can benefit your enterprise network envir...How unified threat management (utm) can benefit your enterprise network envir...
How unified threat management (utm) can benefit your enterprise network envir...Cyber Security Infotech Pvt. Ltd.
 
Security architecture, engineering and operations
Security architecture, engineering and operationsSecurity architecture, engineering and operations
Security architecture, engineering and operationsPiyush Jain
 
Do not run business without protection!
Do not run business without protection!Do not run business without protection!
Do not run business without protection!Thomas Miller
 
Cloud security training, certified cloud security professional
Cloud security training, certified cloud security professionalCloud security training, certified cloud security professional
Cloud security training, certified cloud security professionalBryan Len
 
Your Shortcut to BYOD Success
Your Shortcut to BYOD SuccessYour Shortcut to BYOD Success
Your Shortcut to BYOD SuccessSierraware
 
Strategy Cloud and Security as a Service
Strategy Cloud and Security as a ServiceStrategy Cloud and Security as a Service
Strategy Cloud and Security as a ServiceAberla
 
Virtualization security for the cloud computing technology
Virtualization security for the cloud computing technologyVirtualization security for the cloud computing technology
Virtualization security for the cloud computing technologyDeep Ranjan Deb
 
Cloud Security & Control: A Multi-Layer Approach to Secure Cloud Computing
Cloud Security & Control: A Multi-Layer Approach to Secure Cloud ComputingCloud Security & Control: A Multi-Layer Approach to Secure Cloud Computing
Cloud Security & Control: A Multi-Layer Approach to Secure Cloud ComputingOpSource
 
Microsoft Intune - Empowering Enterprise Mobility - Presented by Atidan
Microsoft Intune - Empowering Enterprise Mobility - Presented by Atidan Microsoft Intune - Empowering Enterprise Mobility - Presented by Atidan
Microsoft Intune - Empowering Enterprise Mobility - Presented by Atidan David J Rosenthal
 
ICS (Industrial Control System) Cybersecurity Training
ICS (Industrial Control System) Cybersecurity TrainingICS (Industrial Control System) Cybersecurity Training
ICS (Industrial Control System) Cybersecurity TrainingTonex
 
Information Security Lecture #1 ppt
Information Security Lecture #1 pptInformation Security Lecture #1 ppt
Information Security Lecture #1 pptvasanthimuniasamy
 
Information security group presentation ppt
Information security group presentation   pptInformation security group presentation   ppt
Information security group presentation pptvaishalshah01
 
Alexandru Catalin Cosoi
Alexandru Catalin CosoiAlexandru Catalin Cosoi
Alexandru Catalin Cosoiprincescorpio
 
Linux mail-server-firewall-dealers-thinclient-antivirus-cloud-computing
Linux mail-server-firewall-dealers-thinclient-antivirus-cloud-computingLinux mail-server-firewall-dealers-thinclient-antivirus-cloud-computing
Linux mail-server-firewall-dealers-thinclient-antivirus-cloud-computingSeo Tss
 

Tendances (20)

Microsoft intune
Microsoft intuneMicrosoft intune
Microsoft intune
 
UserLock Datasheet
UserLock DatasheetUserLock Datasheet
UserLock Datasheet
 
How unified threat management (utm) can benefit your enterprise network envir...
How unified threat management (utm) can benefit your enterprise network envir...How unified threat management (utm) can benefit your enterprise network envir...
How unified threat management (utm) can benefit your enterprise network envir...
 
Apani Ov V9
Apani Ov V9Apani Ov V9
Apani Ov V9
 
Network security
Network securityNetwork security
Network security
 
Security architecture, engineering and operations
Security architecture, engineering and operationsSecurity architecture, engineering and operations
Security architecture, engineering and operations
 
Do not run business without protection!
Do not run business without protection!Do not run business without protection!
Do not run business without protection!
 
Cloud security training, certified cloud security professional
Cloud security training, certified cloud security professionalCloud security training, certified cloud security professional
Cloud security training, certified cloud security professional
 
Your Shortcut to BYOD Success
Your Shortcut to BYOD SuccessYour Shortcut to BYOD Success
Your Shortcut to BYOD Success
 
Wl security-solutions
Wl security-solutionsWl security-solutions
Wl security-solutions
 
Strategy Cloud and Security as a Service
Strategy Cloud and Security as a ServiceStrategy Cloud and Security as a Service
Strategy Cloud and Security as a Service
 
Virtualization security for the cloud computing technology
Virtualization security for the cloud computing technologyVirtualization security for the cloud computing technology
Virtualization security for the cloud computing technology
 
Cloud Security & Control: A Multi-Layer Approach to Secure Cloud Computing
Cloud Security & Control: A Multi-Layer Approach to Secure Cloud ComputingCloud Security & Control: A Multi-Layer Approach to Secure Cloud Computing
Cloud Security & Control: A Multi-Layer Approach to Secure Cloud Computing
 
Microsoft Intune - Empowering Enterprise Mobility - Presented by Atidan
Microsoft Intune - Empowering Enterprise Mobility - Presented by Atidan Microsoft Intune - Empowering Enterprise Mobility - Presented by Atidan
Microsoft Intune - Empowering Enterprise Mobility - Presented by Atidan
 
ICS (Industrial Control System) Cybersecurity Training
ICS (Industrial Control System) Cybersecurity TrainingICS (Industrial Control System) Cybersecurity Training
ICS (Industrial Control System) Cybersecurity Training
 
Information Security Lecture #1 ppt
Information Security Lecture #1 pptInformation Security Lecture #1 ppt
Information Security Lecture #1 ppt
 
VISULOX-Summary-SN
VISULOX-Summary-SNVISULOX-Summary-SN
VISULOX-Summary-SN
 
Information security group presentation ppt
Information security group presentation   pptInformation security group presentation   ppt
Information security group presentation ppt
 
Alexandru Catalin Cosoi
Alexandru Catalin CosoiAlexandru Catalin Cosoi
Alexandru Catalin Cosoi
 
Linux mail-server-firewall-dealers-thinclient-antivirus-cloud-computing
Linux mail-server-firewall-dealers-thinclient-antivirus-cloud-computingLinux mail-server-firewall-dealers-thinclient-antivirus-cloud-computing
Linux mail-server-firewall-dealers-thinclient-antivirus-cloud-computing
 

En vedette (6)

Micro focus
Micro focusMicro focus
Micro focus
 
Moving to the cloud
Moving to the cloudMoving to the cloud
Moving to the cloud
 
E:\escanear0002
E:\escanear0002E:\escanear0002
E:\escanear0002
 
Unidades de medida de la informacion
Unidades de medida de la informacionUnidades de medida de la informacion
Unidades de medida de la informacion
 
Planestictorca
PlanestictorcaPlanestictorca
Planestictorca
 
Social media - Personal Approach
Social media -  Personal ApproachSocial media -  Personal Approach
Social media - Personal Approach
 

Similaire à Cloud security

Security in a Virtualised Computing
Security in a Virtualised ComputingSecurity in a Virtualised Computing
Security in a Virtualised ComputingIOSR Journals
 
Fadi El Moussa Secure Cloud 2012 V2
Fadi El Moussa Secure Cloud 2012 V2Fadi El Moussa Secure Cloud 2012 V2
Fadi El Moussa Secure Cloud 2012 V2fadielmoussa
 
The ultimate guide to cloud computing security-Hire cloud expert
The ultimate guide to cloud computing security-Hire cloud expertThe ultimate guide to cloud computing security-Hire cloud expert
The ultimate guide to cloud computing security-Hire cloud expertChapter247 Infotech
 
Generic Security Framework for Multiple Heterogeneous Virtual Infrastructures
Generic Security Framework for Multiple Heterogeneous Virtual InfrastructuresGeneric Security Framework for Multiple Heterogeneous Virtual Infrastructures
Generic Security Framework for Multiple Heterogeneous Virtual InfrastructuresIJRES Journal
 
8 Top Cybersecurity Tools.pdf
8 Top Cybersecurity Tools.pdf8 Top Cybersecurity Tools.pdf
8 Top Cybersecurity Tools.pdfMetaorange
 
Using Virtualization Technique to Increase Security and Reduce Energy Consump...
Using Virtualization Technique to Increase Security and Reduce Energy Consump...Using Virtualization Technique to Increase Security and Reduce Energy Consump...
Using Virtualization Technique to Increase Security and Reduce Energy Consump...IJORCS
 
8 Top Cybersecurity Tools.pptx
8 Top Cybersecurity Tools.pptx8 Top Cybersecurity Tools.pptx
8 Top Cybersecurity Tools.pptxMetaorange
 
The new era of Cyber Security IEC62443
The new era of Cyber Security IEC62443The new era of Cyber Security IEC62443
The new era of Cyber Security IEC62443WoMaster
 
Secure Virtualization for Cloud Environment Using Guest OS and VMM-based Tech...
Secure Virtualization for Cloud Environment Using Guest OS and VMM-based Tech...Secure Virtualization for Cloud Environment Using Guest OS and VMM-based Tech...
Secure Virtualization for Cloud Environment Using Guest OS and VMM-based Tech...ijcncs
 
A SURVEY ON SECURITY CHALLENGES OF VIRTUALIZATION TECHNOLOGY IN CLOUD COMPUTING
A SURVEY ON SECURITY CHALLENGES OF VIRTUALIZATION TECHNOLOGY IN CLOUD COMPUTINGA SURVEY ON SECURITY CHALLENGES OF VIRTUALIZATION TECHNOLOGY IN CLOUD COMPUTING
A SURVEY ON SECURITY CHALLENGES OF VIRTUALIZATION TECHNOLOGY IN CLOUD COMPUTINGijcsit
 
A Survey on Security Challenges of Virtualization Technology in Cloud Computing
A Survey on Security Challenges of Virtualization Technology in Cloud ComputingA Survey on Security Challenges of Virtualization Technology in Cloud Computing
A Survey on Security Challenges of Virtualization Technology in Cloud ComputingAIRCC Publishing Corporation
 
R ramya devi cloud computing
R ramya devi cloud computingR ramya devi cloud computing
R ramya devi cloud computingPriyadharshiniVS
 
Security as a Service Model for Cloud Environment
Security as   a Service Model   for   Cloud   EnvironmentSecurity as   a Service Model   for   Cloud   Environment
Security as a Service Model for Cloud EnvironmentKaashivInfoTech Company
 

Similaire à Cloud security (20)

Security in a Virtualised Computing
Security in a Virtualised ComputingSecurity in a Virtualised Computing
Security in a Virtualised Computing
 
Fadi El Moussa Secure Cloud 2012 V2
Fadi El Moussa Secure Cloud 2012 V2Fadi El Moussa Secure Cloud 2012 V2
Fadi El Moussa Secure Cloud 2012 V2
 
Cloud Security_ Unit 4
Cloud Security_ Unit 4Cloud Security_ Unit 4
Cloud Security_ Unit 4
 
The ultimate guide to cloud computing security-Hire cloud expert
The ultimate guide to cloud computing security-Hire cloud expertThe ultimate guide to cloud computing security-Hire cloud expert
The ultimate guide to cloud computing security-Hire cloud expert
 
CC_ SECURITY ISSUES by a_khoshnoudi @IUST
 CC_ SECURITY ISSUES  by a_khoshnoudi @IUST CC_ SECURITY ISSUES  by a_khoshnoudi @IUST
CC_ SECURITY ISSUES by a_khoshnoudi @IUST
 
Security As A Service In Cloud(SECaaS)
Security As A Service In Cloud(SECaaS)Security As A Service In Cloud(SECaaS)
Security As A Service In Cloud(SECaaS)
 
Generic Security Framework for Multiple Heterogeneous Virtual Infrastructures
Generic Security Framework for Multiple Heterogeneous Virtual InfrastructuresGeneric Security Framework for Multiple Heterogeneous Virtual Infrastructures
Generic Security Framework for Multiple Heterogeneous Virtual Infrastructures
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Rik Ferguson
Rik FergusonRik Ferguson
Rik Ferguson
 
8 Top Cybersecurity Tools.pdf
8 Top Cybersecurity Tools.pdf8 Top Cybersecurity Tools.pdf
8 Top Cybersecurity Tools.pdf
 
Using Virtualization Technique to Increase Security and Reduce Energy Consump...
Using Virtualization Technique to Increase Security and Reduce Energy Consump...Using Virtualization Technique to Increase Security and Reduce Energy Consump...
Using Virtualization Technique to Increase Security and Reduce Energy Consump...
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
 
8 Top Cybersecurity Tools.pptx
8 Top Cybersecurity Tools.pptx8 Top Cybersecurity Tools.pptx
8 Top Cybersecurity Tools.pptx
 
The new era of Cyber Security IEC62443
The new era of Cyber Security IEC62443The new era of Cyber Security IEC62443
The new era of Cyber Security IEC62443
 
Secure Virtualization for Cloud Environment Using Guest OS and VMM-based Tech...
Secure Virtualization for Cloud Environment Using Guest OS and VMM-based Tech...Secure Virtualization for Cloud Environment Using Guest OS and VMM-based Tech...
Secure Virtualization for Cloud Environment Using Guest OS and VMM-based Tech...
 
MBM Security Products Matrix
MBM Security Products MatrixMBM Security Products Matrix
MBM Security Products Matrix
 
A SURVEY ON SECURITY CHALLENGES OF VIRTUALIZATION TECHNOLOGY IN CLOUD COMPUTING
A SURVEY ON SECURITY CHALLENGES OF VIRTUALIZATION TECHNOLOGY IN CLOUD COMPUTINGA SURVEY ON SECURITY CHALLENGES OF VIRTUALIZATION TECHNOLOGY IN CLOUD COMPUTING
A SURVEY ON SECURITY CHALLENGES OF VIRTUALIZATION TECHNOLOGY IN CLOUD COMPUTING
 
A Survey on Security Challenges of Virtualization Technology in Cloud Computing
A Survey on Security Challenges of Virtualization Technology in Cloud ComputingA Survey on Security Challenges of Virtualization Technology in Cloud Computing
A Survey on Security Challenges of Virtualization Technology in Cloud Computing
 
R ramya devi cloud computing
R ramya devi cloud computingR ramya devi cloud computing
R ramya devi cloud computing
 
Security as a Service Model for Cloud Environment
Security as   a Service Model   for   Cloud   EnvironmentSecurity as   a Service Model   for   Cloud   Environment
Security as a Service Model for Cloud Environment
 

Plus de Pedro Alexander Romero Tortosa (12)

Cloud Conversations
Cloud ConversationsCloud Conversations
Cloud Conversations
 
PRINCE2 Basic Concepts
PRINCE2 Basic ConceptsPRINCE2 Basic Concepts
PRINCE2 Basic Concepts
 
Servicios de Campo
Servicios de CampoServicios de Campo
Servicios de Campo
 
Escenarios migración a la nube
Escenarios migración a la nubeEscenarios migración a la nube
Escenarios migración a la nube
 
¿Por qué la Nube?
¿Por qué la Nube?¿Por qué la Nube?
¿Por qué la Nube?
 
Dynamics 365 Glosario
Dynamics 365 GlosarioDynamics 365 Glosario
Dynamics 365 Glosario
 
Lead Nurturing - Mercadeo
Lead Nurturing - MercadeoLead Nurturing - Mercadeo
Lead Nurturing - Mercadeo
 
Dynamics 365 General
Dynamics 365 GeneralDynamics 365 General
Dynamics 365 General
 
Cloud computing stack
Cloud computing stackCloud computing stack
Cloud computing stack
 
Cloud Computing - Economics
Cloud Computing - EconomicsCloud Computing - Economics
Cloud Computing - Economics
 
Cloud computing revolution no evolution
Cloud computing revolution   no evolutionCloud computing revolution   no evolution
Cloud computing revolution no evolution
 
Espanhol Comercial Final
Espanhol Comercial FinalEspanhol Comercial Final
Espanhol Comercial Final
 

Dernier

Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfhans926745
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 

Dernier (20)

Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 

Cloud security

  • 1. Cloud Computing CLOUD SECURITY PEDRO ALEXANDER ROMERO
  • 2. Cloud Security Agenda - Security Framework - What Vendors Should do - What Customers Should do From: www.rackspace.com/cloud/cloudu
  • 3. Cloud Security A Security Framework for the Cloud The Cloud Security Alliance (CSA) is a non-profit organization formed to promote the use of best practices for providing security assurance within Cloud Computing, and provide education on the uses of Cloud Computing to help secure all other forms of computing. Objectives:  Promote a common level of understanding between the consumers and providers  Promote independent research into best practices.  Create consensus lists of issues and guidance for cloud security assurance
  • 4. Cloud Security What Vendors Should Do (1/7) 1. Physical Data Center Security 2. Security of Host Machine Operating System 3. Control of Hypervisor 4. Network Security 5. Virtual Machine Security
  • 5. Cloud Security What Vendors Should Do (2/7) 1. Physical Data Center Security:  Security of the Building: Keycard protocols, biometric scanning protocols and round-the-clock interior and exterior surveillance  Authorization of Personnel: Only authorized data center personnel should be granted access  Employee Background checking: Before they’re hired
  • 6. Cloud Security What Vendors Should Do (3/7) 2. Security of Host Machine Operating System: The operating system within which virtual machines are hosted requires extra scrutiny as it is the manager for guest virtual machines.  Intrusiondetection system  The minimum number of users accounts possible  Limited administrator access to named accounts  No publicly accessible network accessible services Vulnerabilities in the base OS can have impacts on the individual Virtual Machines.
  • 7. Cloud Security What Vendors Should Do (4/7) 3. Control of the Hypervisor: While, in most cases, control of individual virtual machines is the responsibility for the customer, vendors need to ensure robust security of the hypervisor itself, the tool which keeps the individual virtual machines separate. Hypervisor or virtual machine monitor (VMM) is a piece of computer software, firmware or hardware that creates and runs virtual machines.
  • 8. Cloud Security What Vendors Should Do (5/7) 4. Network Security:
  • 9. Cloud Security What Vendors Should Do (6/7) 4. Network Security: (Cont.) Consists of the policies and procedures adopted by the network administrator to prevent and monitor unauthorized access, misuse, modification or denial of the computer network and network-accessible resources. Includes:  Perimeter Controls  Network access  Regulate access control
  • 10. Cloud Security What Vendors Should Do (7/7) 5. Virtual Machine Security Virtual machines share the same security vulnerabilities as physical machines and should be protected from the same problems: hardware failures, viruses, hacking , data corruption.
  • 11. Cloud Security What Customers Should Do Customers too have an important part to play in ensuring the security of the solutions they utilize. 1. Firewall 2. Patches and Backups 3. Passwords 4. Controlling Access to Devices Connected to the Cloud 5. Ensuring the Security of Staff
  • 12. Cloud Security What Customers Should Do The Whispered Truth - Your Data, Your Responsibility In Infrastructure as a Service (IaaS) and Platform as a Service (PaaS) clouds, protecting data at rest is Customer responsibility not the Providers. To meet privacy obligations to the company customers and employees, and to comply with regulatory standards such as PCI DSS and SOX, is a must to securely encrypt cloud-based data, while keeping operational overhead to a minimum. PCI DSS: Payment Card Industry Data Security Standard SOX:Sarbanes-Oxley Act of 2002