Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Letting Go of Control - #BSidesATL 2010
1. Letting Go of Control
A 12-Step Program for Embracing the Cloud
with host Taylor Banks Copyright (C) 2010 by Taylor Banks
Saturday, October 9, 2010
2. Hi, I’m Taylor
• and I’m a control freak.
• and I’m a security professional.
• and I’m a bit OCD.
• and I just put my data in the cloud.
Copyright (C) 2010 by Taylor Banks
Saturday, October 9, 2010
3. Step 1: Admit that you
are powerless over cloud
Copyright (C) 2010 by Taylor Banks
Saturday, October 9, 2010
4. The cloud is coming
Step 1: Admit that you
are powerless over cloud
Copyright (C) 2010 by Taylor Banks
Saturday, October 9, 2010
5. The cloud is coming
Recognize that it’s happening
Step 1: Admit that you
are powerless over cloud
Copyright (C) 2010 by Taylor Banks
Saturday, October 9, 2010
6. The cloud is coming
Recognize that it’s happening
You are [not] in control
Step 1: Admit that you
are powerless over cloud
Copyright (C) 2010 by Taylor Banks
Saturday, October 9, 2010
7. The cloud is coming
Recognize that it’s happening
You are [not] in control
CONTROL
Copyright (C) 2010 by Taylor Banks
Saturday, October 9, 2010
8. *These statements have not been evaluated by the CSA
This presentation is not designed to diagnose, prevent,
treat or cure any cloud security problems / conditions.
Copyright (C) 2010 by Taylor Banks
Saturday, October 9, 2010
10. Step 2: Believe that a provider
greater than yourself exists
and is necessary to meet the needs of your dynamic
customer population
Copyright (C) 2010 by Taylor Banks
Saturday, October 9, 2010
11. Step 2: Believe that a provider
greater than yourself exists
•100,000,000 purchase orders
•100,000 hackers from China
•100 users from Iowa
and is necessary to meet the needs of your dynamic
customer population
Copyright (C) 2010 by Taylor Banks
Saturday, October 9, 2010
12. Step 3: Make a
decision to turn
your life and
your will over to
(as we
understand
Google)
Copyright (C) 2010 by Taylor Banks
Saturday, October 9, 2010
13. Step 4: Make a searching and
fearless inventory of your
datacenter
Copyright (C) 2010 by Taylor Banks
Saturday, October 9, 2010
14. Step 5: Admit to Google, to
yourself, and another human
being the exact nature of your
Saturday, October 9, 2010
data indiscretions Copyright (C) 2010 by Taylor Banks
15. Step 6: Demonstrate a
readiness to remote desktop
Saturday, October 9, 2010
Copyright (C) 2010 by Taylor Banks
16. Step 7: Humbly ask
others to host your data
Copyright (C) 2010 by Taylor Banks
Saturday, October 9, 2010
17. Step 8: Make
a list of places where
your data remains
unprotected
and be willing to encrypt it all
Copyright (C) 2010 by Taylor Banks
Saturday, October 9, 2010
18. Step 9:
Encrypt all
unprotected
data
except when to do so would affect its usability
Copyright (C) 2010 by Taylor Banks
Saturday, October 9, 2010
19. Step 9: Encrypt all unprotected data
`
except when to do so would affect its usability
Copyright (C) 2010 by Taylor Banks
Saturday, October 9, 2010
20. Step 10: Continue to
inventory your use of the
cloud
and when wrong, promptly admit it Copyright (C) 2010 by Taylor Banks
Saturday, October 9, 2010
21. Step 11: Seek through prayer
and mediation to improve your
conscious contact with Google
as we understand Google,
praying only for knowledge of
Google's will for us and the
power to carry that out
Copyright (C) 2010 by Taylor Banks
Saturday, October 9, 2010
22. Step 12: Having had a spiritual
awakening, carry this message
to other control freaks
and practice these principles in your affairs
Copyright (C) 2010 by Taylor Banks
Saturday, October 9, 2010
23. Thank you!
Taylor@Cloudin48.com
Copyright (C) 2010 by Taylor Banks
Saturday, October 9, 2010