SlideShare a Scribd company logo
1 of 50
What Everyone Ought  To Know About Cloud Security Craig Balding cloudsecurity.org  20/10/09 | Session ID: BUS-106 Classification: Intermediate
Agenda  Decomposing Cloud Objectives Understand Implementations Applying Security
Objectives
Objectives ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Cloud is the  New Pink
Who Said This? "We will make cloud computing announcements, because if orange is the new pink, we'll make orange blouses"
Larry Ellison, CEO
Cloud vs. Grid Google Trends
Actions Speak Louder…
BUT  Cloud != Virtualization
“ ABSTRACTION !”
Defining Cloud “… the market seems to have come to the conclusion that cloud computing has a lot in common with obscenity--you may not be able to define it, but you'll know it when you see it” James Urquhart – The Wisdom of Clouds
Decomposing Cloud
Smells Like Cloud ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Cloud Layers Jericho Forum
Cloud Security?
Cloud Deployments
Cloud Cube Model Jericho Forum
Public Cloud: MS Azure
Public Cloud: Amazon Web Services
Public Cloud: force.com
Virtual Private Cloud
Private Cloud
Key Cloud Security Controls
How Much Time Do We Have? 80 pages
Recap: Risk Mitigation Must Cover… ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
It’s all about Workloads…
… and Providers!
SSL/TLS Is Not The Cure-All
… nor is Hiding Behind Contracts
Cloud Technology Concerns ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
The Hypervisor
Cloud Platform Maturity
InterCloud VPN
Eventually Consistent
Identity / Federation
API Security
Non-Technology Concerns ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Billing
Change Control “… someone once likened the process of upgrading our core websearch infrastructure to “ changing the tires on a car while you’re going at 60 down the freeway.  ” Urs Holzle – SVP Operations, Google
ToS & SLA
Legal
Audits The Tour On/off-site “ Certification” Change Control Security Awareness SDLC, Scans/Testing
Visibility Provider actions Admin activity Intrusion Detection A6 Working Group
Short Term Recommendations ,[object Object],[object Object],[object Object],[object Object],[object Object]
Further Reading & Contact Cloud & Cloud Security http://cloudsecurity.org/resources Email :  [email_address]
Appendix
Cloud Model:  Infrastructure  (IaaS) Chris Hoff
Cloud Model:  Platform  (PaaS) Chris Hoff
Cloud Model:  Software  (SaaS) Chris Hoff

More Related Content

What's hot

Cloud Computing Security Organization Assessments Service Categories Responsi...
Cloud Computing Security Organization Assessments Service Categories Responsi...Cloud Computing Security Organization Assessments Service Categories Responsi...
Cloud Computing Security Organization Assessments Service Categories Responsi...SlideTeam
 
Cloud Computing Security
Cloud Computing SecurityCloud Computing Security
Cloud Computing SecurityPiyush Mittal
 
Cloud computing-security-issues
Cloud computing-security-issuesCloud computing-security-issues
Cloud computing-security-issuesAleem Mohammed
 
Cloud computing security
Cloud computing securityCloud computing security
Cloud computing securityGahya Pandian
 
SOME SECURITY CHALLENGES IN CLOUD COMPUTING
SOME SECURITY CHALLENGES  IN CLOUD COMPUTINGSOME SECURITY CHALLENGES  IN CLOUD COMPUTING
SOME SECURITY CHALLENGES IN CLOUD COMPUTINGHoang Nguyen
 
Cloud Computing Security Issues in Infrastructure as a Service”
Cloud Computing Security Issues in Infrastructure as a Service”Cloud Computing Security Issues in Infrastructure as a Service”
Cloud Computing Security Issues in Infrastructure as a Service”Vivek Maurya
 
Security in cloud computing
Security in cloud computingSecurity in cloud computing
Security in cloud computingveena venugopal
 
CCSK, cloud security framework, Indonesia
CCSK, cloud security framework, IndonesiaCCSK, cloud security framework, Indonesia
CCSK, cloud security framework, IndonesiaWise Pacific Venture
 
Security & Privacy In Cloud Computing
Security & Privacy In Cloud ComputingSecurity & Privacy In Cloud Computing
Security & Privacy In Cloud Computingsaurabh soni
 
CIW Lab with CoheisveFT: Get started in public cloud - Part 1 Cloud & Virtual...
CIW Lab with CoheisveFT: Get started in public cloud - Part 1 Cloud & Virtual...CIW Lab with CoheisveFT: Get started in public cloud - Part 1 Cloud & Virtual...
CIW Lab with CoheisveFT: Get started in public cloud - Part 1 Cloud & Virtual...Ryan Koop
 
Cloud Computing - Security Benefits and Risks
Cloud Computing - Security Benefits and RisksCloud Computing - Security Benefits and Risks
Cloud Computing - Security Benefits and RisksWilliam McBorrough
 
Chap 5 software as a service (saass)
Chap 5 software as a service (saass)Chap 5 software as a service (saass)
Chap 5 software as a service (saass)Raj Sarode
 
Cloud computing security and privacy
Cloud computing security and privacyCloud computing security and privacy
Cloud computing security and privacyAdeel Javaid
 
Cloud Computing: Architecture, IT Security and Operational Perspectives
Cloud Computing: Architecture, IT Security and Operational PerspectivesCloud Computing: Architecture, IT Security and Operational Perspectives
Cloud Computing: Architecture, IT Security and Operational PerspectivesMegan Eskey
 
Cloud Computing Security Issues in Infrastructure as a Service” report
Cloud Computing Security Issues in Infrastructure as a Service” reportCloud Computing Security Issues in Infrastructure as a Service” report
Cloud Computing Security Issues in Infrastructure as a Service” reportVivek Maurya
 
Cloud Computing Ppt
Cloud Computing PptCloud Computing Ppt
Cloud Computing PptAnjoum .
 

What's hot (20)

Cloud Computing Security Organization Assessments Service Categories Responsi...
Cloud Computing Security Organization Assessments Service Categories Responsi...Cloud Computing Security Organization Assessments Service Categories Responsi...
Cloud Computing Security Organization Assessments Service Categories Responsi...
 
Cloud Computing Security
Cloud Computing SecurityCloud Computing Security
Cloud Computing Security
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
 
Cloud computing-security-issues
Cloud computing-security-issuesCloud computing-security-issues
Cloud computing-security-issues
 
Cloud computing security
Cloud computing securityCloud computing security
Cloud computing security
 
Cloud Computing Security Issues
Cloud Computing Security Issues Cloud Computing Security Issues
Cloud Computing Security Issues
 
SOME SECURITY CHALLENGES IN CLOUD COMPUTING
SOME SECURITY CHALLENGES  IN CLOUD COMPUTINGSOME SECURITY CHALLENGES  IN CLOUD COMPUTING
SOME SECURITY CHALLENGES IN CLOUD COMPUTING
 
Cloud Computing Security Issues in Infrastructure as a Service”
Cloud Computing Security Issues in Infrastructure as a Service”Cloud Computing Security Issues in Infrastructure as a Service”
Cloud Computing Security Issues in Infrastructure as a Service”
 
Security in cloud computing
Security in cloud computingSecurity in cloud computing
Security in cloud computing
 
CCSK, cloud security framework, Indonesia
CCSK, cloud security framework, IndonesiaCCSK, cloud security framework, Indonesia
CCSK, cloud security framework, Indonesia
 
Authentication cloud
Authentication cloudAuthentication cloud
Authentication cloud
 
Security & Privacy In Cloud Computing
Security & Privacy In Cloud ComputingSecurity & Privacy In Cloud Computing
Security & Privacy In Cloud Computing
 
CIW Lab with CoheisveFT: Get started in public cloud - Part 1 Cloud & Virtual...
CIW Lab with CoheisveFT: Get started in public cloud - Part 1 Cloud & Virtual...CIW Lab with CoheisveFT: Get started in public cloud - Part 1 Cloud & Virtual...
CIW Lab with CoheisveFT: Get started in public cloud - Part 1 Cloud & Virtual...
 
Cloud Computing - Security Benefits and Risks
Cloud Computing - Security Benefits and RisksCloud Computing - Security Benefits and Risks
Cloud Computing - Security Benefits and Risks
 
Chap 5 software as a service (saass)
Chap 5 software as a service (saass)Chap 5 software as a service (saass)
Chap 5 software as a service (saass)
 
Cloud computing security and privacy
Cloud computing security and privacyCloud computing security and privacy
Cloud computing security and privacy
 
Cloud Computing: Architecture, IT Security and Operational Perspectives
Cloud Computing: Architecture, IT Security and Operational PerspectivesCloud Computing: Architecture, IT Security and Operational Perspectives
Cloud Computing: Architecture, IT Security and Operational Perspectives
 
Cloud Computing Security Issues in Infrastructure as a Service” report
Cloud Computing Security Issues in Infrastructure as a Service” reportCloud Computing Security Issues in Infrastructure as a Service” report
Cloud Computing Security Issues in Infrastructure as a Service” report
 
Cloud Computing Ppt
Cloud Computing PptCloud Computing Ppt
Cloud Computing Ppt
 
Cloud services
Cloud servicesCloud services
Cloud services
 

Viewers also liked

Tips for Technical Illustration
Tips for Technical IllustrationTips for Technical Illustration
Tips for Technical IllustrationTricia Spayer
 
Cloud Security - Security Aspects of Cloud Computing
Cloud Security - Security Aspects of Cloud ComputingCloud Security - Security Aspects of Cloud Computing
Cloud Security - Security Aspects of Cloud ComputingJim Geovedi
 
Техническая сторона дизайна: от макета до продукта
Техническая сторона дизайна: от макета до продуктаТехническая сторона дизайна: от макета до продукта
Техническая сторона дизайна: от макета до продуктаNikolay Pyatayev
 
Тех. Документация - UX beyond UI
Тех. Документация - UX beyond UI Тех. Документация - UX beyond UI
Тех. Документация - UX beyond UI Yury Solonitsyn
 
Интерфейс — Совместная работа аналитика и проектировщика
Интерфейс — Совместная работа аналитика и проектировщикаИнтерфейс — Совместная работа аналитика и проектировщика
Интерфейс — Совместная работа аналитика и проектировщикаYury Solonitsyn
 
Chap 6 cloud security
Chap 6 cloud securityChap 6 cloud security
Chap 6 cloud securityRaj Sarode
 
WIAD 2017 — Понятный продукт — От информационной архитектуры к структуре инте...
WIAD 2017 — Понятный продукт — От информационной архитектуры к структуре инте...WIAD 2017 — Понятный продукт — От информационной архитектуры к структуре инте...
WIAD 2017 — Понятный продукт — От информационной архитектуры к структуре инте...Yury Solonitsyn
 
Social media Risk Management Presentation Sample (Animations don't work in sl...
Social media Risk Management Presentation Sample (Animations don't work in sl...Social media Risk Management Presentation Sample (Animations don't work in sl...
Social media Risk Management Presentation Sample (Animations don't work in sl...Alexander Larsen
 
Разработка прототипов на Axure
Разработка прототипов на AxureРазработка прототипов на Axure
Разработка прототипов на AxureSoftline
 
Cybersecurity Law and Risk Management
Cybersecurity Law and Risk ManagementCybersecurity Law and Risk Management
Cybersecurity Law and Risk ManagementKeelan Stewart
 
Онтологии и информационная архитектура: соотношение терминов и потенциал совм...
Онтологии и информационная архитектура: соотношение терминов и потенциал совм...Онтологии и информационная архитектура: соотношение терминов и потенциал совм...
Онтологии и информационная архитектура: соотношение терминов и потенциал совм...Dmitry Kudryavtsev
 
Data security in cloud environment
Data security in cloud environmentData security in cloud environment
Data security in cloud environmentShivam Singh
 
Security Issues of Cloud Computing
Security Issues of Cloud ComputingSecurity Issues of Cloud Computing
Security Issues of Cloud ComputingFalgun Rathod
 

Viewers also liked (20)

Tips for Technical Illustration
Tips for Technical IllustrationTips for Technical Illustration
Tips for Technical Illustration
 
Cloud security ppt
Cloud security pptCloud security ppt
Cloud security ppt
 
Demystifying Cloud Security
Demystifying Cloud SecurityDemystifying Cloud Security
Demystifying Cloud Security
 
Security in Cloud Computing
Security in Cloud ComputingSecurity in Cloud Computing
Security in Cloud Computing
 
Cloud Security - Security Aspects of Cloud Computing
Cloud Security - Security Aspects of Cloud ComputingCloud Security - Security Aspects of Cloud Computing
Cloud Security - Security Aspects of Cloud Computing
 
Техническая сторона дизайна: от макета до продукта
Техническая сторона дизайна: от макета до продуктаТехническая сторона дизайна: от макета до продукта
Техническая сторона дизайна: от макета до продукта
 
BoilerExpo guidlines
BoilerExpo guidlinesBoilerExpo guidlines
BoilerExpo guidlines
 
Что такое стиль?
Что такое стиль?Что такое стиль?
Что такое стиль?
 
Тех. Документация - UX beyond UI
Тех. Документация - UX beyond UI Тех. Документация - UX beyond UI
Тех. Документация - UX beyond UI
 
Интерфейс — Совместная работа аналитика и проектировщика
Интерфейс — Совместная работа аналитика и проектировщикаИнтерфейс — Совместная работа аналитика и проектировщика
Интерфейс — Совместная работа аналитика и проектировщика
 
Chap 6 cloud security
Chap 6 cloud securityChap 6 cloud security
Chap 6 cloud security
 
Information & Cyber Security Risk
Information & Cyber Security RiskInformation & Cyber Security Risk
Information & Cyber Security Risk
 
WIAD 2017 — Понятный продукт — От информационной архитектуры к структуре инте...
WIAD 2017 — Понятный продукт — От информационной архитектуры к структуре инте...WIAD 2017 — Понятный продукт — От информационной архитектуры к структуре инте...
WIAD 2017 — Понятный продукт — От информационной архитектуры к структуре инте...
 
Social media Risk Management Presentation Sample (Animations don't work in sl...
Social media Risk Management Presentation Sample (Animations don't work in sl...Social media Risk Management Presentation Sample (Animations don't work in sl...
Social media Risk Management Presentation Sample (Animations don't work in sl...
 
Разработка прототипов на Axure
Разработка прототипов на AxureРазработка прототипов на Axure
Разработка прототипов на Axure
 
Cybersecurity Law and Risk Management
Cybersecurity Law and Risk ManagementCybersecurity Law and Risk Management
Cybersecurity Law and Risk Management
 
Онтологии и информационная архитектура: соотношение терминов и потенциал совм...
Онтологии и информационная архитектура: соотношение терминов и потенциал совм...Онтологии и информационная архитектура: соотношение терминов и потенциал совм...
Онтологии и информационная архитектура: соотношение терминов и потенциал совм...
 
Data security in cloud environment
Data security in cloud environmentData security in cloud environment
Data security in cloud environment
 
Типографика
ТипографикаТипографика
Типографика
 
Security Issues of Cloud Computing
Security Issues of Cloud ComputingSecurity Issues of Cloud Computing
Security Issues of Cloud Computing
 

Similar to What Everyone Ought To Know About Cloud Security

(Pdf) yury chemerkin deep_intel_2013
(Pdf) yury chemerkin deep_intel_2013(Pdf) yury chemerkin deep_intel_2013
(Pdf) yury chemerkin deep_intel_2013STO STRATEGY
 
(Pdf) yury chemerkin ita_2013
(Pdf) yury chemerkin ita_2013(Pdf) yury chemerkin ita_2013
(Pdf) yury chemerkin ita_2013STO STRATEGY
 
(Pdf) yury chemerkin intelligence_sec_2013
(Pdf) yury chemerkin intelligence_sec_2013(Pdf) yury chemerkin intelligence_sec_2013
(Pdf) yury chemerkin intelligence_sec_2013STO STRATEGY
 
(Pdf) yury chemerkin _i-society_2013
(Pdf) yury chemerkin _i-society_2013(Pdf) yury chemerkin _i-society_2013
(Pdf) yury chemerkin _i-society_2013STO STRATEGY
 
Demystifying Cloud Security: Lessons Learned for the Public Sector
Demystifying Cloud Security: Lessons Learned for the Public SectorDemystifying Cloud Security: Lessons Learned for the Public Sector
Demystifying Cloud Security: Lessons Learned for the Public SectorAmazon Web Services
 
Why Cloud Management Makes Sense
Why Cloud Management Makes SenseWhy Cloud Management Makes Sense
Why Cloud Management Makes SenseRightScale
 
Automating your AWS Security Operations
Automating your AWS Security OperationsAutomating your AWS Security Operations
Automating your AWS Security OperationsEvident.io
 
Automating your AWS Security Operations
Automating your AWS Security OperationsAutomating your AWS Security Operations
Automating your AWS Security OperationsAmazon Web Services
 
The Ultimate Guide For Cloud Penetration Testing.pdf
The Ultimate Guide For Cloud Penetration Testing.pdfThe Ultimate Guide For Cloud Penetration Testing.pdf
The Ultimate Guide For Cloud Penetration Testing.pdfCraw Cyber Security
 
Cloud computing security - Insights
Cloud computing security - InsightsCloud computing security - Insights
Cloud computing security - Insightsgiorgiacaleffi
 
ATLO Software Delivers Secure Training Programs with Sophos UTM on AWS.pdf
ATLO Software Delivers Secure Training Programs with Sophos UTM on AWS.pdfATLO Software Delivers Secure Training Programs with Sophos UTM on AWS.pdf
ATLO Software Delivers Secure Training Programs with Sophos UTM on AWS.pdfAmazon Web Services
 
AWS at 2017 FS-ISAC APAC Summit: Move Better, Faster and More Securely: Cloud...
AWS at 2017 FS-ISAC APAC Summit: Move Better, Faster and More Securely: Cloud...AWS at 2017 FS-ISAC APAC Summit: Move Better, Faster and More Securely: Cloud...
AWS at 2017 FS-ISAC APAC Summit: Move Better, Faster and More Securely: Cloud...Amazon Web Services
 
(Pdf) yury chemerkin _i-society-2013 proceedings
(Pdf) yury chemerkin _i-society-2013 proceedings(Pdf) yury chemerkin _i-society-2013 proceedings
(Pdf) yury chemerkin _i-society-2013 proceedingsSTO STRATEGY
 
LinuxCon North America 2013: Why Lease When You Can Buy Your Cloud
LinuxCon North America 2013: Why Lease When You Can Buy Your CloudLinuxCon North America 2013: Why Lease When You Can Buy Your Cloud
LinuxCon North America 2013: Why Lease When You Can Buy Your CloudMark Hinkle
 
Cloud_Security_–_An_Overview_coure subject.pdf
Cloud_Security_–_An_Overview_coure subject.pdfCloud_Security_–_An_Overview_coure subject.pdf
Cloud_Security_–_An_Overview_coure subject.pdfAlexanderJPSibarani1
 
Moving to cloud computing step by step linthicum
Moving to cloud computing step by step linthicumMoving to cloud computing step by step linthicum
Moving to cloud computing step by step linthicumDavid Linthicum
 
CloudPassage Best Practices for Automatic Security Scaling
CloudPassage Best Practices for Automatic Security ScalingCloudPassage Best Practices for Automatic Security Scaling
CloudPassage Best Practices for Automatic Security ScalingAmazon Web Services
 
Cloud security for banks - the central bank of Israel regulations for cloud s...
Cloud security for banks - the central bank of Israel regulations for cloud s...Cloud security for banks - the central bank of Israel regulations for cloud s...
Cloud security for banks - the central bank of Israel regulations for cloud s...Moshe Ferber
 

Similar to What Everyone Ought To Know About Cloud Security (20)

(Pdf) yury chemerkin deep_intel_2013
(Pdf) yury chemerkin deep_intel_2013(Pdf) yury chemerkin deep_intel_2013
(Pdf) yury chemerkin deep_intel_2013
 
(Pdf) yury chemerkin ita_2013
(Pdf) yury chemerkin ita_2013(Pdf) yury chemerkin ita_2013
(Pdf) yury chemerkin ita_2013
 
(Pdf) yury chemerkin intelligence_sec_2013
(Pdf) yury chemerkin intelligence_sec_2013(Pdf) yury chemerkin intelligence_sec_2013
(Pdf) yury chemerkin intelligence_sec_2013
 
(Pdf) yury chemerkin _i-society_2013
(Pdf) yury chemerkin _i-society_2013(Pdf) yury chemerkin _i-society_2013
(Pdf) yury chemerkin _i-society_2013
 
Cloud Security Alliance's GRC Stack Overview
Cloud Security Alliance's GRC Stack OverviewCloud Security Alliance's GRC Stack Overview
Cloud Security Alliance's GRC Stack Overview
 
Demystifying Cloud Security: Lessons Learned for the Public Sector
Demystifying Cloud Security: Lessons Learned for the Public SectorDemystifying Cloud Security: Lessons Learned for the Public Sector
Demystifying Cloud Security: Lessons Learned for the Public Sector
 
Why Cloud Management Makes Sense
Why Cloud Management Makes SenseWhy Cloud Management Makes Sense
Why Cloud Management Makes Sense
 
Automating your AWS Security Operations
Automating your AWS Security OperationsAutomating your AWS Security Operations
Automating your AWS Security Operations
 
Automating your AWS Security Operations
Automating your AWS Security OperationsAutomating your AWS Security Operations
Automating your AWS Security Operations
 
The Ultimate Guide For Cloud Penetration Testing.pdf
The Ultimate Guide For Cloud Penetration Testing.pdfThe Ultimate Guide For Cloud Penetration Testing.pdf
The Ultimate Guide For Cloud Penetration Testing.pdf
 
Cloud computing security - Insights
Cloud computing security - InsightsCloud computing security - Insights
Cloud computing security - Insights
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
ATLO Software Delivers Secure Training Programs with Sophos UTM on AWS.pdf
ATLO Software Delivers Secure Training Programs with Sophos UTM on AWS.pdfATLO Software Delivers Secure Training Programs with Sophos UTM on AWS.pdf
ATLO Software Delivers Secure Training Programs with Sophos UTM on AWS.pdf
 
AWS at 2017 FS-ISAC APAC Summit: Move Better, Faster and More Securely: Cloud...
AWS at 2017 FS-ISAC APAC Summit: Move Better, Faster and More Securely: Cloud...AWS at 2017 FS-ISAC APAC Summit: Move Better, Faster and More Securely: Cloud...
AWS at 2017 FS-ISAC APAC Summit: Move Better, Faster and More Securely: Cloud...
 
(Pdf) yury chemerkin _i-society-2013 proceedings
(Pdf) yury chemerkin _i-society-2013 proceedings(Pdf) yury chemerkin _i-society-2013 proceedings
(Pdf) yury chemerkin _i-society-2013 proceedings
 
LinuxCon North America 2013: Why Lease When You Can Buy Your Cloud
LinuxCon North America 2013: Why Lease When You Can Buy Your CloudLinuxCon North America 2013: Why Lease When You Can Buy Your Cloud
LinuxCon North America 2013: Why Lease When You Can Buy Your Cloud
 
Cloud_Security_–_An_Overview_coure subject.pdf
Cloud_Security_–_An_Overview_coure subject.pdfCloud_Security_–_An_Overview_coure subject.pdf
Cloud_Security_–_An_Overview_coure subject.pdf
 
Moving to cloud computing step by step linthicum
Moving to cloud computing step by step linthicumMoving to cloud computing step by step linthicum
Moving to cloud computing step by step linthicum
 
CloudPassage Best Practices for Automatic Security Scaling
CloudPassage Best Practices for Automatic Security ScalingCloudPassage Best Practices for Automatic Security Scaling
CloudPassage Best Practices for Automatic Security Scaling
 
Cloud security for banks - the central bank of Israel regulations for cloud s...
Cloud security for banks - the central bank of Israel regulations for cloud s...Cloud security for banks - the central bank of Israel regulations for cloud s...
Cloud security for banks - the central bank of Israel regulations for cloud s...
 

Recently uploaded

Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 

Recently uploaded (20)

Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 

What Everyone Ought To Know About Cloud Security

Editor's Notes

  1. NPR Interview 1 month after starting cloudsecurity.org (!) Google Alerts on “cloud security” UP from 3 per day to 50 per day Google Trends
  2. Who said this? The cloud “haters” felt they’d found a leader
  3. Larry Ellison’s famous quote on Cloud Largely seen as sideswipe at the emerging cloud industry
  4. Google search volume globally Who heavily marketed Grid? ORACLE
  5. But hold on Larry Didn’t you recently acquire Sun? And then VirtualIron? Translation: Larry now owns 3 hypervisors, a core technology of infrastructure clouds (note: there are different clouds and some don’t rely on hypervisors) Even the apparent cynics recognise the business opportunity.
  6. Cloud is not virtualization.
  7. As Google will correctly tell you, there are more paths to cloud than virtualization. It’s all about ABSTRACTION Virtualization is *ONE* form of abstraction. An important form, but not the only way. Take Google AppEngine – no virtualization anywhere. More a fabric – an army of commodity machines knitted together with distributed software. Not a hypervisor in sight… “ The fabric’s role is to abstract the underlying physical and logical architecture from the developer, and - typically - to assume the burden of scaling. “ – James Urquhart
  8. Notably, Jericho defines 5 layers showing 4 points of abstraction Going from the bottom: Infrastructure: the ‘compute’, ‘storage’ and ‘network’ layer. Sysadmin focus. Platform: a sort of ‘application toolbox’ layer, abstracting away visibility of infrastructure. Developer focus. Software: a finished application, delivered as a service Process: XXX Outcome/value: XXX
  9. “ Mr Hare, I trump your agility with my security!” said Security Tortoise craning his neck to see if the hare was indeed still there. An article in CFO mag put it like this: “ But like Linux, Blackberries, and iPhones, cloud computing will allow business units to elude outdated IT policies until they can be updated” Review a model by Chris Hoff that links cloud layers to specific security controls we all know and love.
  10. The Cloud Cube gives us a handy lense through which to view cloud deployment scenarios, or formations Jericho uses 4 criteria to differentiate cloud “formations” external/internal; is the cloud inside your org or off-site? Propietary/open: who owns what? How interoperable is the service? How easily can I move my data & applications? This is about portability/lock-in Limitations on sharing applications Perimeterised/De-peremeterised architectures: a primary theme of the JC acknowledging the connectedness required for effective collaboration and the impact that has on our traditional perimeter controls (see COA: Collaboration Oriented Architecture) Insourced/Outsourced:your own staff vs. 3 rd party (I.e. a policy issue) Ultimately cloud can offer a level of agility business longs for, that IT departments struggle to deliver on.
  11. Walkthrough highlighting security features & published security policy.
  12. Walkthrough highlighting security features & published security policy.
  13. Walkthrough highlighting security features & published security policy.
  14. Amazon VPC Define “isolated”: single NIC switched between public/customer specific VPC? Lack of technical details: Black Box – “Trust us” Amazon Security Whitepaper doesn’t track improvements/changes in a timely way
  15. DC conversion – leverage existing compute/storage/network Also for traditional hosting providers seeking to become ‘cloud providers’ Walkthrough highlighting security features.
  16. Earlier we reviewed the key attributes of a cloud service – now we consider some of the specific security issues and control options around those.
  17. Before getting giddy over a cloud provider that introduces your favourite security control ™ and jumping on, we need to take a step back. We need to identify workloads that are suitable for cloud processing/storage. A workload could be a defined set of data (storage as a service), an application (SaaS) or a legacy application bundled inside a VM (IaaS). How do we do this? Hopefully we have an asset inventory and owner, not just physical assets, but applications and perhaps, even information (or at least buckets of information associated in some way). Those assets need to be mapped to our data classification scheme. Again, if we don’t have one, we need one! With knowledge of what we have, how sensitive it is, what are responsibilities are and how “connected” it is to other systems and other parties we can start to make informed choices. By making our decisions based on organisations tolerance of risk (which should be embodied in actionable security policies). If we can’t articulate this, this is a red flag. Don’t pass to Cloud. Fix this first. So, its all about workloads…and…
  18. Providers. Cloud providers. What makes a cloud provider different from a traditional provider? <PAUSE> They run cloud platforms that meet the criteria we talked about earlier. Each of those criteria have associated security concerns. How well your provide does at figuring those out and building controls that fit your appetite for risk Once you’ve figured out what workloads you have that may be suitable for cloud today, you’ll need to find a suitable provider. Cloud is immature today and the assurance around cloud implementations often (but not always) reflect this. You may in fact wish to be your own provider. More likely you’ll mix and match workloads to providers (external/internal and public/private) based on criticality, sensitivity etc. As resources are shared at a logical level rather than a physical level, you need to find out from prospective cloud providers how they keep things separate and very importantly, what proof they have that their controls are working in the face of a determined, intelligent adversary. Ultimately the controls need to be “resistant enough” (you get to define how much based on context) to attack & able to comply with whatever policies apply to your org Therefore, we need to map workloads to required security controls and in turn map those to providers (and assurance levels we need) That means revisiting our security policies, data classification and matching cloud provider security controls with workloads.
  19. SSL and now TLS are important network security protocols but they are not a cure-all but that’s how we’ve been treating them from a web app and services perspective. The applied research from Moxie Marlinspike alone has provided enough evidence that putting all our eggs in one basket – one security control – is ultimately sloppy engineering. However, SSL is often the key control touted by Cloud providers…
  20. … customers on the other hand may be tempted to hide behind contracts. Contracts with Cloud service providers are important of course but they do NOT relieve us of our obligations. We are still accountable even if another party is executing on our behalf. There will be those that ‘blame the cloud provider’ but this won’t wash for regulated entities – you auditors will be looking at you.
  21. Lets talk about some of the Cloud Technology specific concerns.
  22. Hypervisor security has so far won lions share of vuln research. hypervisor thinning Commodity But cloudsec is more than virtsec.
  23. Brand new cloud platforms – stitching together open source software. The provider makes the “custom” glue. Is responsible for updating libraries etc when vulns discovered. Fresh attack surface..
  24. All the usual VPN security concerns – nothing particularly new here but clearly, breaking into a VM that provides a VPN bridge back into a customer is a concern.
  25. Distributed storage – eventually consistent (amazon s3) – distributed programming challenge
  26. Federation Identify is not a solved in the enterprise, let alone on the Internet As we migrate some workloads to the cloud, so we need to think about how we transfer identities. Kim Cameron – now at MS has done some pioneering work in this area. Recommend reading the laws of identity to understand the background to claims and assertions.
  27. API security: WS* etc. Easier said than done. All the classic web services issues + multiple providers aka multiple “origins” with no direct browser support for XML crypto etc. XML Parsers Monitoring of API usage (note sensepost research highlighted this isn’t happening at the providers). EC2 Wrap around attacks etc. Bad crypto x 2
  28. Lets talk about some of the Cloud Technology specific concerns.
  29. Cloud Billing systems are brand new – sparkly new. Hard to design – read the blogs of the billing systems designers (you can bet the bad guys will) For the cloud customer they have to care about: Accuracy Payment methods Soft / hard limits Financial DoS Missed payments -> data retention 60 days, 90 days? So those are some of the technology concerns…what about the non-technology concerns?
  30. OK so this quote was about their websearch infrastructure. But how often do you see a ‘we’re going down for maintainance sign?” And before that he said: “ Configuration issues and rate of change play a pretty significant role in many outages at Google” “ We’re constantly building and rebuilding systems” And what about TRANSPARENCY…over unfixed security issues? Providers have a real balancing act here.
  31. Critically important to thoroughly read Terms of Service agreements and SLAs. SLAs 99.5% uptime – public cloud. Internal uptime metrics? ToS: focus on: data ownership Data retention/deletion clauses (non-payment etc) Generally, zero liability, at best service credits
  32. Cross border FBI Data Center Seizure E-discovery Data destruction Cloud Failure: legal rights
  33. All the classic outsourcing questions BUT in a highly dynamic, cloud environment. Where do you plumb in your NIDS/NIPS? Introspection possibilities Background story on A6 Working Group How to join.
  34. Infrastructure as a Service: Amazon EC2, GoGrid, Flexiscale Facilities – the Data Center: Power, HVAC & Floorspace Hardware – The silicon: compute, network storage Abstraction & Core Connectivity & Delivery: sat between hardware & API’s – the “magic glue” APIs: This is the customer facing API, the management interface… Provides a way for customers to consume the services. Changes as additional features are added.
  35. Platform as a Service Integration & Middleware on the left Breaks out to Database, Messaging, Queuing & IAM/Auth Examples: Google AppEngine, Force.com
  36. Decomposing the layers to better wrap our heads around somewhat abstract concepts.