Soumettre la recherche
Mettre en ligne
2012 10 cloud security architecture
•
Télécharger en tant que PPTX, PDF
•
1 j'aime
•
1,038 vues
Vladimir Jirasek
Suivre
Signaler
Partager
Signaler
Partager
1 sur 7
Télécharger maintenant
Recommandé
C-Level tools for Cloud security
C-Level tools for Cloud security
Vladimir Jirasek
Secure your cloud applications by building solid foundations with enterprise ...
Secure your cloud applications by building solid foundations with enterprise ...
Vladimir Jirasek
The Cloud & I, The CISO challenges with Cloud Computing
The Cloud & I, The CISO challenges with Cloud Computing
Moshe Ferber
Cloud Security: A New Perspective
Cloud Security: A New Perspective
Wen-Pai Lu
Cloud security, Cloud security Access broker, CSAB's 4 pillar, deployment mode
Cloud security, Cloud security Access broker, CSAB's 4 pillar, deployment mode
Himani Singh
Lss implementing cyber security in the cloud, and from the cloud-feb14
Lss implementing cyber security in the cloud, and from the cloud-feb14
L S Subramanian
Cloud security
Cloud security
François Boucher
Cloud Privacy & Security compliance
Cloud Privacy & Security compliance
Bryan Starbuck
Recommandé
C-Level tools for Cloud security
C-Level tools for Cloud security
Vladimir Jirasek
Secure your cloud applications by building solid foundations with enterprise ...
Secure your cloud applications by building solid foundations with enterprise ...
Vladimir Jirasek
The Cloud & I, The CISO challenges with Cloud Computing
The Cloud & I, The CISO challenges with Cloud Computing
Moshe Ferber
Cloud Security: A New Perspective
Cloud Security: A New Perspective
Wen-Pai Lu
Cloud security, Cloud security Access broker, CSAB's 4 pillar, deployment mode
Cloud security, Cloud security Access broker, CSAB's 4 pillar, deployment mode
Himani Singh
Lss implementing cyber security in the cloud, and from the cloud-feb14
Lss implementing cyber security in the cloud, and from the cloud-feb14
L S Subramanian
Cloud security
Cloud security
François Boucher
Cloud Privacy & Security compliance
Cloud Privacy & Security compliance
Bryan Starbuck
Guide to CASB Use Cases
Guide to CASB Use Cases
Sachin Yadav
Cloud Access Security Brokers - CASB
Cloud Access Security Brokers - CASB
Samrat Das
Cloud Security
Cloud Security
The TNS Group
secureit-cloudsecurity-151130141528-lva1-app6892.pdf
secureit-cloudsecurity-151130141528-lva1-app6892.pdf
YounesChafi1
Cloud Security Demystified
Cloud Security Demystified
Michael Torres
Architect secure cloud services.
Architect secure cloud services.
Moshe Ferber
Security As A Service In Cloud(SECaaS)
Security As A Service In Cloud(SECaaS)
أحلام انصارى
Cloud security for financial services
Cloud security for financial services
Moshe Ferber
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB)
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB)
Iftikhar Ali Iqbal
CASB — Your new best friend for safe cloud adoption?
CASB — Your new best friend for safe cloud adoption?
Digital Transformation EXPO Event Series
The Notorious 9 Cloud Computing Threats - CSA Congress, San Jose
The Notorious 9 Cloud Computing Threats - CSA Congress, San Jose
Moshe Ferber
Cloud security privacy- org
Cloud security privacy- org
Dharmalingam S
Surviving the lions den - how to sell SaaS services to security oriented cust...
Surviving the lions den - how to sell SaaS services to security oriented cust...
Moshe Ferber
Cloud security
Cloud security
BikashPokharel3
Automatizovaná bezpečnost – nadstandard nebo nutnost?
Automatizovaná bezpečnost – nadstandard nebo nutnost?
MarketingArrowECS_CZ
Global Mandate to Secure Cloud Computing
Global Mandate to Secure Cloud Computing
CloudSecurityAllianceAustralia
Cloud Security - Emerging Facets and Frontiers
Cloud Security - Emerging Facets and Frontiers
Gokul Alex
Security As A Service
Security As A Service
George Fares
Symantec Webinar | Tips for Successful CASB Projects
Symantec Webinar | Tips for Successful CASB Projects
Symantec
Why Everyone Needs a Cloud-First Security Program - SASEfaction Guaranteed!
Why Everyone Needs a Cloud-First Security Program - SASEfaction Guaranteed!
Netskope
Cloud security and security architecture
Cloud security and security architecture
Vladimir Jirasek
Cloud Security - Made simple
Cloud Security - Made simple
Sameer Paradia
Contenu connexe
Tendances
Guide to CASB Use Cases
Guide to CASB Use Cases
Sachin Yadav
Cloud Access Security Brokers - CASB
Cloud Access Security Brokers - CASB
Samrat Das
Cloud Security
Cloud Security
The TNS Group
secureit-cloudsecurity-151130141528-lva1-app6892.pdf
secureit-cloudsecurity-151130141528-lva1-app6892.pdf
YounesChafi1
Cloud Security Demystified
Cloud Security Demystified
Michael Torres
Architect secure cloud services.
Architect secure cloud services.
Moshe Ferber
Security As A Service In Cloud(SECaaS)
Security As A Service In Cloud(SECaaS)
أحلام انصارى
Cloud security for financial services
Cloud security for financial services
Moshe Ferber
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB)
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB)
Iftikhar Ali Iqbal
CASB — Your new best friend for safe cloud adoption?
CASB — Your new best friend for safe cloud adoption?
Digital Transformation EXPO Event Series
The Notorious 9 Cloud Computing Threats - CSA Congress, San Jose
The Notorious 9 Cloud Computing Threats - CSA Congress, San Jose
Moshe Ferber
Cloud security privacy- org
Cloud security privacy- org
Dharmalingam S
Surviving the lions den - how to sell SaaS services to security oriented cust...
Surviving the lions den - how to sell SaaS services to security oriented cust...
Moshe Ferber
Cloud security
Cloud security
BikashPokharel3
Automatizovaná bezpečnost – nadstandard nebo nutnost?
Automatizovaná bezpečnost – nadstandard nebo nutnost?
MarketingArrowECS_CZ
Global Mandate to Secure Cloud Computing
Global Mandate to Secure Cloud Computing
CloudSecurityAllianceAustralia
Cloud Security - Emerging Facets and Frontiers
Cloud Security - Emerging Facets and Frontiers
Gokul Alex
Security As A Service
Security As A Service
George Fares
Symantec Webinar | Tips for Successful CASB Projects
Symantec Webinar | Tips for Successful CASB Projects
Symantec
Why Everyone Needs a Cloud-First Security Program - SASEfaction Guaranteed!
Why Everyone Needs a Cloud-First Security Program - SASEfaction Guaranteed!
Netskope
Tendances
(20)
Guide to CASB Use Cases
Guide to CASB Use Cases
Cloud Access Security Brokers - CASB
Cloud Access Security Brokers - CASB
Cloud Security
Cloud Security
secureit-cloudsecurity-151130141528-lva1-app6892.pdf
secureit-cloudsecurity-151130141528-lva1-app6892.pdf
Cloud Security Demystified
Cloud Security Demystified
Architect secure cloud services.
Architect secure cloud services.
Security As A Service In Cloud(SECaaS)
Security As A Service In Cloud(SECaaS)
Cloud security for financial services
Cloud security for financial services
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB)
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB)
CASB — Your new best friend for safe cloud adoption?
CASB — Your new best friend for safe cloud adoption?
The Notorious 9 Cloud Computing Threats - CSA Congress, San Jose
The Notorious 9 Cloud Computing Threats - CSA Congress, San Jose
Cloud security privacy- org
Cloud security privacy- org
Surviving the lions den - how to sell SaaS services to security oriented cust...
Surviving the lions den - how to sell SaaS services to security oriented cust...
Cloud security
Cloud security
Automatizovaná bezpečnost – nadstandard nebo nutnost?
Automatizovaná bezpečnost – nadstandard nebo nutnost?
Global Mandate to Secure Cloud Computing
Global Mandate to Secure Cloud Computing
Cloud Security - Emerging Facets and Frontiers
Cloud Security - Emerging Facets and Frontiers
Security As A Service
Security As A Service
Symantec Webinar | Tips for Successful CASB Projects
Symantec Webinar | Tips for Successful CASB Projects
Why Everyone Needs a Cloud-First Security Program - SASEfaction Guaranteed!
Why Everyone Needs a Cloud-First Security Program - SASEfaction Guaranteed!
Similaire à 2012 10 cloud security architecture
Cloud security and security architecture
Cloud security and security architecture
Vladimir Jirasek
Cloud Security - Made simple
Cloud Security - Made simple
Sameer Paradia
Integrated Cloud Framework: Security, Governance, Compliance, Content Applica...
Integrated Cloud Framework: Security, Governance, Compliance, Content Applica...
Chad Lawler
Security of,for & by cloud
Security of,for & by cloud
Lakshmi Subramanian
Cloud security ely kahn
Cloud security ely kahn
Ely Kahn
Securing Your Cloud Servers with Halo NetSec
Securing Your Cloud Servers with Halo NetSec
CloudPassage
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec
CloudPassage Overview
CloudPassage Overview
CloudPassage
null Bangalore meet - Cloud Computing and Security
null Bangalore meet - Cloud Computing and Security
n|u - The Open Security Community
Cisco tec chris young - security intelligence operations
Cisco tec chris young - security intelligence operations
Cisco Public Relations
Neupart Isaca April 2012
Neupart Isaca April 2012
Lars Neupart
Risk Factory: PCI Compliance in the Cloud
Risk Factory: PCI Compliance in the Cloud
Risk Crew
AWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNet
AWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNet
Amazon Web Services
Resarch paper i cloud computing
Resarch paper i cloud computing
Bharat Gupta
Enterprise Security in Cloud
Enterprise Security in Cloud
Lenin Aboagye
Enterprise Security in Hybrid Cloud ISACA-SV 2012
Enterprise Security in Hybrid Cloud ISACA-SV 2012
Symosis Security (Previously C-Level Security)
What customers want the cloud to be - Jason Waxman GM at Intel, Cloud Slam 20...
What customers want the cloud to be - Jason Waxman GM at Intel, Cloud Slam 20...
Khazret Sapenov
Protecting Data in the Cloud
Protecting Data in the Cloud
Neil Readshaw
марко Safe net@rainbow-informzashita - februar 2012
марко Safe net@rainbow-informzashita - februar 2012
Валерий Коржов
Cw13 securing your journey to the cloud by rami naccache-trend micro
Cw13 securing your journey to the cloud by rami naccache-trend micro
TheInevitableCloud
Similaire à 2012 10 cloud security architecture
(20)
Cloud security and security architecture
Cloud security and security architecture
Cloud Security - Made simple
Cloud Security - Made simple
Integrated Cloud Framework: Security, Governance, Compliance, Content Applica...
Integrated Cloud Framework: Security, Governance, Compliance, Content Applica...
Security of,for & by cloud
Security of,for & by cloud
Cloud security ely kahn
Cloud security ely kahn
Securing Your Cloud Servers with Halo NetSec
Securing Your Cloud Servers with Halo NetSec
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
CloudPassage Overview
CloudPassage Overview
null Bangalore meet - Cloud Computing and Security
null Bangalore meet - Cloud Computing and Security
Cisco tec chris young - security intelligence operations
Cisco tec chris young - security intelligence operations
Neupart Isaca April 2012
Neupart Isaca April 2012
Risk Factory: PCI Compliance in the Cloud
Risk Factory: PCI Compliance in the Cloud
AWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNet
AWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNet
Resarch paper i cloud computing
Resarch paper i cloud computing
Enterprise Security in Cloud
Enterprise Security in Cloud
Enterprise Security in Hybrid Cloud ISACA-SV 2012
Enterprise Security in Hybrid Cloud ISACA-SV 2012
What customers want the cloud to be - Jason Waxman GM at Intel, Cloud Slam 20...
What customers want the cloud to be - Jason Waxman GM at Intel, Cloud Slam 20...
Protecting Data in the Cloud
Protecting Data in the Cloud
марко Safe net@rainbow-informzashita - februar 2012
марко Safe net@rainbow-informzashita - februar 2012
Cw13 securing your journey to the cloud by rami naccache-trend micro
Cw13 securing your journey to the cloud by rami naccache-trend micro
Plus de Vladimir Jirasek
Vulnerability management - beyond scanning
Vulnerability management - beyond scanning
Vladimir Jirasek
Vulnerability Management @ DevSecOps London Gathering
Vulnerability Management @ DevSecOps London Gathering
Vladimir Jirasek
Mobile phone as Trusted identity assistant
Mobile phone as Trusted identity assistant
Vladimir Jirasek
Security architecture for LSE 2009
Security architecture for LSE 2009
Vladimir Jirasek
Mobile security summit - 10 mobile risks
Mobile security summit - 10 mobile risks
Vladimir Jirasek
Information Risk Security model and metrics
Information Risk Security model and metrics
Vladimir Jirasek
Integrating Qualys into the patch and vulnerability management processes
Integrating Qualys into the patch and vulnerability management processes
Vladimir Jirasek
Securing mobile population for White Hats
Securing mobile population for White Hats
Vladimir Jirasek
Security models for security architecture
Security models for security architecture
Vladimir Jirasek
Meaningfull security metrics
Meaningfull security metrics
Vladimir Jirasek
CAMM presentation for Cyber Security Gas and Oil june 2011
CAMM presentation for Cyber Security Gas and Oil june 2011
Vladimir Jirasek
ISE UK&Ireland 2008 Showcase Nominee Presentation Vladimir Jirasek
ISE UK&Ireland 2008 Showcase Nominee Presentation Vladimir Jirasek
Vladimir Jirasek
Qualys Webex 24 June 2008
Qualys Webex 24 June 2008
Vladimir Jirasek
Federation For The Cloud Opportunities For A Single Identity
Federation For The Cloud Opportunities For A Single Identity
Vladimir Jirasek
Plus de Vladimir Jirasek
(14)
Vulnerability management - beyond scanning
Vulnerability management - beyond scanning
Vulnerability Management @ DevSecOps London Gathering
Vulnerability Management @ DevSecOps London Gathering
Mobile phone as Trusted identity assistant
Mobile phone as Trusted identity assistant
Security architecture for LSE 2009
Security architecture for LSE 2009
Mobile security summit - 10 mobile risks
Mobile security summit - 10 mobile risks
Information Risk Security model and metrics
Information Risk Security model and metrics
Integrating Qualys into the patch and vulnerability management processes
Integrating Qualys into the patch and vulnerability management processes
Securing mobile population for White Hats
Securing mobile population for White Hats
Security models for security architecture
Security models for security architecture
Meaningfull security metrics
Meaningfull security metrics
CAMM presentation for Cyber Security Gas and Oil june 2011
CAMM presentation for Cyber Security Gas and Oil june 2011
ISE UK&Ireland 2008 Showcase Nominee Presentation Vladimir Jirasek
ISE UK&Ireland 2008 Showcase Nominee Presentation Vladimir Jirasek
Qualys Webex 24 June 2008
Qualys Webex 24 June 2008
Federation For The Cloud Opportunities For A Single Identity
Federation For The Cloud Opportunities For A Single Identity
2012 10 cloud security architecture
1.
Security architecture and
Cloud computing, are these mutually exclusive? Vladimir Jirasek Director of Research, CSA UK 25 October 2012
2.
Cloud model maps
to Security model Cloud model GRC Business continuity SIEM Data security Identity, Access Direct map Cryptography Application sec. Host security Network security Physical security Copyright © 2012 Cloud Security Alliance https://cloudsecurityalliance.org.uk
3.
Responsibilities for areas
in security model compared to delivery models Provider responsible Customer responsible GRC Business continuity SIEM Identity, Access Cryptography Data security Application sec. Host security Network security Physical security IaaS PaaS SaaS IaaS PaaS SaaS Copyright © 2012 Cloud Security Alliance https://cloudsecurityalliance.org.uk
4.
How to manage
cloud security • Have a cloud security standard • What to do on an Enterprise level • Before your Cloud project • During your Cloud project How to drive out the • BAU 'seven deadly sins' of cloud computing - new Information Security • Exit from the Cloud provider Forum report • Risks cannot be outsourced • Manage lock-in and exit up-front – especially in SaaS Copyright © 2012 Cloud Security Alliance https://cloudsecurityalliance.org.uk
5.
Cloud Security Alliance
supports number of projects related to cloud Get involved at https://cloudsecurityalliance.org/resea rch/https://cloudsecurityalliance.org.uk Copyright © 2012 Cloud Security Alliance
6.
Contact •
Help us secure cloud computing • http://cloudsecurityalliance.org.uk • info@cloudsecurityalliance.org.uk • LinkedIn: http://www.linkedin.com/groups/Cloud- Security-Alliance-UK-Chapter-3745837 • Twitter: @CSAUKResearch Copyright © 2012 Cloud Security Alliance https://cloudsecurityalliance.org.uk
7.
Thank you!
www.cloudsecurityalliance.org
Notes de l'éditeur
Do visit the websiteDo join the LinkedIn Groups – you will receive regular email updates
Télécharger maintenant