SlideShare une entreprise Scribd logo
1  sur  29
Télécharger pour lire hors ligne
Cloud Security & Control: A
Multi-Layer Approach to
Secure Cloud Computing

John Rowell
Chief Technology Officer
OpSource
Twitter: @johnrowell


Paul Sathis
Director, Cloud Computing,
Intel Americas
Intel Corporation
Twitter: @paulinthehouse
Legal Disclaimers
Intel® Virtualization Technology requires a computer system with an enabled Intel® processor, BIOS, virtual machine monitor (VMM) and, for some uses, certain
platform software enabled for it. Functionality, performance or other benefits will vary depending on hardware and software configurations and may require a BIOS
update. Software applications may not be compatible with all operating systems. Please check with your application vendor.
Intel® TXT requires a computer system with Intel® Virtualization Technology, an Intel TXT-enabled processor, chipset, BIOS, Authenticated Code Modules and an
Intel TXT-compatible measured launched environment (MLE). Intel TXT also requires the system to contain a TPM v1.s. For more information, visit
http://www.intel.com/technology/security. In addition, Intel TXT requires that the original equipment manufacturer provides TPM functionality, which requires a TPM-
supported BIOS. TPM functionality must be initialized and may not be available in all countries.
Intel ® AES-NI requires a computer system with an AES-NI enabled processor, as well as non-Intel software to execute the instructions in the correct sequence. For
availability, consult your reseller or system manufacturer. For more information, see http://software.intel.com/en-us/articles/intel-advanced-encryption-standard-
instructions-aes-ni/
Intel processor numbers are not a measure of performance. Processor numbers differentiate features within each processor series, not across different processor
sequences. See http://www.intel.com/products/processor_number for details. Intel products are not intended for use in medical, life saving, life sustaining, critical
control or safety systems, or in nuclear facility applications. All dates and products specified are for planning purposes only and are subject to change without notice
On Slide 4, the sources are as follows:

1)Source: http://www.theregister.co.uk/2009/06/08/webhost_attack/

2)Source: http://www.infoworld.com/d/security-central/it-ops-security-pros-odds-over-virtualization-risks-240

On Slide 10, the sources are as follows:
3)World-record virtualization performance claim based on all published VMmark* 1.x results on http://www.ideasinternational.com/Benchmark-Top-Ten/VMmark-1-x. Top-ranked Fujitsu
PRIMERGY* RX600 S5 uses four Intel® Xeon® processor X7560 (24M cache, 2.26GHz, 6.40GT/s Intel QPI). Software and workloads used in performance tests may have been optimized for
performance only on Intel microprocessors. Performance tests, such as SYSmark and MobileMark, are measured using specific computer systems, components, software, operations, and
functions. Any change to any of those factors may cause the results to vary. You should consult other information and performance tests to assist you in fully evaluating your contemplated
purchases, including the performance of that product when combined with other products.



4)No computer system can provide absolute security under all conditions. Intel® Trusted Execution Technology (Intel® TXT) requires a computer system with Intel® Virtualization
Technology, an Intel TXT-enabled processor, chipset, BIOS, Authenticated Code Modules and an Intel TXT-compatible measured launched environment (MLE). Intel TXT also requires the
system to contain a TPM v1.s. For more information, visit http://www.intel.com/technology/security

5)Intel® AES-NI requires a computer system with an AES-NI enabled processor, as well as non-Intel software to execute the instructions in the correct sequence. AES-NI is available on
select Intel® Xeon® processors. For availability, consult your reseller or system manufacturer. For more information, see http://software.intel.com/en-us/articles/intel-advanced-encryption-
standard-instructions-aes-ni/




Copyright © 2011 Intel Corporation. All rights reserved. Intel, the Intel logo, Xeon and Intel Core are
trademarks or registered trademarks of Intel Corporation or its subsidiaries in the United States and other
countries. All dates and products specified are for planning purposes only and are subject to change without
notice. * Other brands and names maybe claimed as the property of others.
VOTE
• With regards to cloud computing, I am most concerned about the
  following issue:
   − Compliance
   − Multi-tenancy
   − Audit
   − Data Protection
   − All of the above




Copyright © 2011 Intel Corporation. All rights reserved. Intel, the Intel logo, Xeon and Intel Core are
trademarks or registered trademarks of Intel Corporation or its subsidiaries in the United States and other
countries. All dates and products specified are for planning purposes only and are subject to change without
notice. * Other brands and names maybe claimed as the property of others.
Security in the Cloud
          Virtualization                                                           vs.                         Security
             Benefits                                                                                           Needs

                                                                                             “Webhost hack wipes out
                                                                                                 data for 100,000 sites
   New security requirements                                                                      Vaserv suspects zero-day
   for cloud & virtualization:                                                                 virtualization vuln” —The Register1
                                                                                             “IT ops, security pros at odds
     • Abstraction of physical hardware
                                                                                                   over virtualization risks
     • Multi-tenancy movement                                                                 IT pros upbeat about virtualization,
                                                                                                whereas security experts harbor
       implicitly require audit & security                                                     doubts about the security role the
                                                                                              hypervisor can play” —IDG News Service2


                  Cloud & Virtualization Break Many Traditional
                     Perimeter-oriented Security Techniques
Copyright © 2011 Intel Corporation. All rights reserved. Intel, the Intel logo, Xeon and Intel Core are
trademarks or registered trademarks of Intel Corporation or its subsidiaries in the United States and other
countries. All dates and products specified are for planning purposes only and are subject to change without
notice. * Other brands and names maybe claimed as the property of others.
Cloud 2015 Vision
  FEDERATED                                                                                                           AUTOMATED
   Share data                                                                                                          IT can focus
 securely across                                                                                                         more on
    public and                                                                                                       innovation and
  private clouds                                                                                                          less on
                                                                                                                      management



                                                               CLIENT AWARE
                                                              Optimizing services
                                                               based on device
                                                                  capability




Desktops                 Laptops                 Netbooks            Personal Devices               Smartphones   Smart TVs   Embedded

                        Open & Interoperable Solutions Essential
Copyright © 2011 Intel Corporation. All rights reserved. Intel, the Intel logo, Xeon and Intel Core are
trademarks or registered trademarks of Intel Corporation or its subsidiaries in the United States and other
countries. All dates and products specified are for planning purposes only and are subject to change without
notice. * Other brands and names maybe claimed as the property of others.
From Vision to Action




        Helping Cloud Service Providers on Path to Cloud 2015

    Copyright © 2011 Intel Corporation. All rights reserved. Intel, the Intel logo, Xeon and Intel Core are
    trademarks or registered trademarks of Intel Corporation or its subsidiaries in the United States and other
    countries. All dates and products specified are for planning purposes only and are subject to change without
6   notice. * Other brands and names maybe claimed as the property of others.
Intel Platform Technologies
           Intelligence Built-in for Cloud Computing Demands

                                                                       Compute
                                                            Intel® Xeon® processors E7 & 7500
                                                            Series with Hardware-based Security




                                                                       Result:
                         Helps Provider Meet Service Level Agreements
                               Performance for Workload agility
                                     Simpler & Lower Cost




                                       Network                                                       Storage
                                10Gb Ethernet with                                        Open platforms and
                                built-in support for                                         performance
                                   unified fabric                                        breakthroughs (SSDs)

Copyright © 2011 Intel Corporation. All rights reserved. Intel, the Intel logo, Xeon and Intel Core are
trademarks or registered trademarks of Intel Corporation or its subsidiaries in the United States and other
countries. All dates and products specified are for planning purposes only and are subject to change without
notice. * Other brands and names maybe claimed as the property of others.
Cloud Security Services
                                 Enhanced by Intel-based Technology




          Encrypt in the Cloud                                                                          Trust the Cloud
 Use encryption to protect data                                                        Establish a trusted foundation




            Connect to the Cloud                                                                           Audit the Cloud
Establish / verify identities & federate                                                  Build higher assurance into audit

 Copyright © 2011 Intel Corporation. All rights reserved. Intel, the Intel logo, Xeon and Intel Core are
 trademarks or registered trademarks of Intel Corporation or its subsidiaries in the United States and other
 countries. All dates and products specified are for planning purposes only and are subject to change without
 notice. * Other brands and names maybe claimed as the property of others.
Intel-based Technology
                    Establishing Foundation for More Secure Clouds

                                                                          Encrypt
                                                                    Intel® AES-NI




                               Isolate                                                                             Comply
            Intel® VT & Intel® TXT                                                                                 Intel® TXT

                                             VM 1           VM 2
                                                                                                 VM 1                    VM 1         VM 2
                                                VMM

                                           Intel® TXT                                               ??                          VMM



    Copyright © 2011 Intel Corporation. All rights reserved. Intel, the Intel logo, Xeon and Intel Core are
    trademarks or registered trademarks of Intel Corporation or its subsidiaries in the United States and other
    countries. All dates and products specified are for planning purposes only and are subject to change without
9   notice. * Other brands and names maybe claimed as the property of others.
Great Collaboration with OpSource
                   Cloud Services Powered by Intel® Xeon® processor 7500 &
                   E7 Series
                       − Intel Xeon processor E7 series delivers world-record virtualization
                         performance while delivering higher VM densities than any other industry-
                         standard server in the market today3


                   State of the Art Hardware-based Security Technology
                       − Working with Intel on hardware-based security such as Intel® Trusted
                         Execution Technology4 that can be used to verify the trustworthiness
                           of a platform

                   Foundation for High Reliability
                       − Intel Xeon processor E7 series delivers extraordinary server reliability
                         with automatic detection and correction of errors and interconnect error
                         detection and recovery
                       − Helps Opsource deliver on high-availability and cloud performance claims

                         With Intel technology, OpSource can enhance security,
                                meet demanding customer requirements
                                       & drive competitive prices
Copyright © 2011 Intel Corporation. All rights reserved. Intel, the Intel logo, Xeon and Intel Core are
trademarks or registered trademarks of Intel Corporation or its subsidiaries in the United States and other
countries. All dates and products specified are for planning purposes only and are subject to change without
notice. * Other brands and names maybe claimed as the property of others.
Cloud Security & Control: A Multi-Layer Approach to Secure
                           Cloud Computing




                                                                              9/14/2011
                                                                       John Rowell, CTO



Slide 11                  © 2011 OpSource, Inc. All rights reserved.
OpSource: Enterprise Cloud and Managed Hosting

• OpSource provides Enterprise Cloud
  and Managed Hosting Services

• Solutions for Enterprise, SaaS, Service
  Providers (Telecom and Cloud Platforms)

• A Dimension Data Company

• Offices: Santa Clara, CA (HQ); Herndon, VA; Dublin, London, Bangalore

• Unmatched Industry Experience
           – SaaS Hosting and Scaling Software-Oriented Architectures (SOA)
           – High Performance, Secure Cloud Computing




Slide 12                              © 2011 OpSource, Inc. All rights reserved.
Polls Show Security as Top Concern about Public Cloud

• 64% of IT Bosses express concerns about whether corporate data would be
  secure inside cloud service providers' datacenters – Forrester Research


• 56% of CFOs had not invested in public cloud services because of fears over the
  security of sensitive data - SunGard Availability Services Poll




                                  Gartner 2009 Poll

Slide 13                     © 2011 OpSource, Inc. All rights reserved.
Security is a Challenge for Utility Cloud Platforms




Slide 14           © 2011 OpSource, Inc. All rights reserved.
Defense-in-Depth Security Applied to the Cloud

Defense in depth is a best practice in which multiple layers of
security controls (defense) are implemented to provide redundancy
in the event a security control fails or a vulnerability is exploited.

                  Layers of Defense
                  IDS / IPS
                  Segmentation
                   - VLAN
                   - Firewall
                  Authentication and Access
                  Control
                  Data Encryption
                  Incident Response
                  Physical Data Center Security
                  Monitoring and Tuning

Slide 15                © 2011 OpSource, Inc. All rights reserved.
Defense #1: Intrusion Detection System

• Fully-managed Intrusion Detection System (IDS) utilizing
  signature, protocol and anomaly based inspection methods




Slide 16               © 2011 OpSource, Inc. All rights reserved.
Defense #2: Network Segmentation Provides Security Controls


• Customer Controlled Network
  Configuration – configurable Layer 2
  VLANs:
    – Provide segmentation of public and
      private IP space
    – NAT and VIP functions expose only
      those IP addresses you want made
      public
• Customizable ACL-based firewall
  rules allow control of access into
  each network VLAN:
    – Build multi-tier network architectures to
      separate data tiers from front-end web
      tiers to provide an additional layer of
      firewall rules to protect data


   Slide 17                       © 2011 OpSource, Inc. All rights reserved.
Defense #3: Authentication and Access Controls




                                  • VPN access for administration of all
                                    servers
                                  • Unique username and password for
                                    multiple administrators
                                  • Role-based permissions allow cloud
                                    administrators to create sub-admins to
                                    manage only certain resources, such as
                                    servers, storage or networks
                                  • Audit logs and reporting


Slide 18         © 2011 OpSource, Inc. All rights reserved.
Defense #3 (con’t): Authentication and Access Controls

• Intel® TXT establishes a “hardware root of trust” that can be used to
  verify the trustworthiness of a platform4

• Applications for cloud computing
     • Base migration and workload placement decisions on the trustworthiness
      of the infrastructure
     • Control cloud workloads




  Slide 19                   © 2011 OpSource, Inc. All rights reserved.
Defense #4: Data Reliability & Security

• The Intel® Xeon® processor E7 family offers an extensive and
  robust set of RAS features in silicon to provide error detection,
  correction, containment, and recovery in all processors, memory,
  and I/O data paths

• VPN Access

• Data stored with 256-bit encryption at rest and 128-bit SSL
  encryption while in transit

• Working with Intel on utilizing Intel® Advanced Encryption
  Standard - New Instructions to reduce the performance penalties
  usually experienced with pervasive encryption5



Slide 20                © 2011 OpSource, Inc. All rights reserved.
Defense #5: 24x7 Incident Response

• Incident Response Teams handle reports of security incidents. An
  OSIRT will escalate the incident to law enforcement and/or
  executive management as prescribed in security policies




              24 x 7
              x 365




Slide 21               © 2011 OpSource, Inc. All rights reserved.
Defense #6: Datacenters – The Physical Security of the
Cloud

• Meet or Exceed Tier III Standards (highest commercially available
  datacenter rating)
• All areas within facility are monitored with CCTV and onsite guards
  24x7x365 surveillance and audit logs
• Multiple layers of biometric two-factor authentication restricts
  access




Slide 22                 © 2011 OpSource, Inc. All rights reserved.
Defense #7: Monitoring and Tuning

• Edge-to-edge security, visibility and carrier-class threat
  management and remediation utilizing industry leading Arbor
  Networks Peakflow


• Compares real-time network traffic against baseline definitions of
  normal network behavior, immediately flagging all anomalies due
  to security hazards such as:
           – Denial of Service (DoS) attacks
           – Distributed Denial of Service (DDoS) attacks
           – Worms or botnets




Slide 23                         © 2011 OpSource, Inc. All rights reserved.
OpSource’s Approach to Ensuring Security



• Defense in depth is a best practice                          Layers of Defense
  with multiple layers of security                             IDS / IPS
  controls                                                     Segmentation
                                                                - VLAN
      – Cisco hardware-based networking                         - Firewall
      – As part of best practice, intelligent                  Authentication and Access
        servers are needed to secure clouds                    Control
      – Intel technology helps provide                         Data Encryption
        foundation for Trust, Security, &                      Incident Response
        Compliance with Intel® TXT and                         Physical Data Center Security
        Intel® AES-NI
                                                               Monitoring and Tuning
      – Increases confidence that your data
        in the cloud is safe and secure



 Slide 24                     © 2011 OpSource, Inc. All rights reserved.
Setup a Cloud Network to Secure Your Environment




Slide 25         © 2011 OpSource, Inc. All rights reserved.
Setup and Manage Cloud Servers


                                                              Network: Cisco-based firewall,
                                                              VLAN, VPN and load balancing
                                                              included

                                                              User Management: Role-based
                                                              user controls; activity and usage
                                                              reporting

                                                              Support: 24x7 phone support
                                                              included; Managed Services

                                                              Flexibility: 1-8 CPU, 1-64GB
                                                              RAM, 50GB-2.5TB local disk

                                                              Hybrid: Ability to deploy
                                                              dedicated and cloud servers




Slide 26         © 2011 OpSource, Inc. All rights reserved.
Compliance Enhances Trust

• Yearly certification and compliance audits to ensure security




               HIPAA
               Business
               Associate




Slide 27                © 2011 OpSource, Inc. All rights reserved.
VOTE
• Learning about how OpSource secures their cloud solution,
  including the use of Intel Technology has
   − Significantly increased my level of interest in OpSource’s Cloud
     Solutions
   − Slightly increased my level of interest in OpSource’s Cloud Solutions
   − Has not changed my level of interest in OpSource’s Cloud Solutions




Copyright © 2011 Intel Corporation. All rights reserved. Intel, the Intel logo, Xeon and Intel Core are
trademarks or registered trademarks of Intel Corporation or its subsidiaries in the United States and other
countries. All dates and products specified are for planning purposes only and are subject to change without
notice. * Other brands and names maybe claimed as the property of others.
Continue Conversation


John Rowell
Chief Technology Officer
OpSource
Twitter: @johnrowell



Paul Sathis
Director, Cloud Computing,
Intel Americas
Intel Corporation
Twitter: @paulinthehouse

Contenu connexe

Tendances

Critical Infrastructure Security by Subodh Belgi
Critical Infrastructure Security by Subodh BelgiCritical Infrastructure Security by Subodh Belgi
Critical Infrastructure Security by Subodh BelgiClubHack
 
McAffee_Security and System Integrity in Embedded Devices
McAffee_Security and System Integrity in Embedded DevicesMcAffee_Security and System Integrity in Embedded Devices
McAffee_Security and System Integrity in Embedded DevicesIşınsu Akçetin
 
IBM InfoSphere Guardium overview
IBM InfoSphere Guardium overviewIBM InfoSphere Guardium overview
IBM InfoSphere Guardium overviewnazeer325
 
Securing Industrial Control System
Securing Industrial Control SystemSecuring Industrial Control System
Securing Industrial Control SystemHemanth M
 
Guardium Presentation
Guardium PresentationGuardium Presentation
Guardium Presentationtsteh
 
Cisco cybersecurity essentials chapter - 6
Cisco cybersecurity essentials chapter - 6Cisco cybersecurity essentials chapter - 6
Cisco cybersecurity essentials chapter - 6Mukesh Chinta
 
IBM Security Guardium Data Activity Monitor (Data Sheet-USEN)
IBM Security Guardium Data Activity Monitor (Data Sheet-USEN)IBM Security Guardium Data Activity Monitor (Data Sheet-USEN)
IBM Security Guardium Data Activity Monitor (Data Sheet-USEN)Peter Tutty
 
IBM Infosphere Guardium - Database Security
IBM Infosphere Guardium - Database SecurityIBM Infosphere Guardium - Database Security
IBM Infosphere Guardium - Database Securityebuc
 
Waterfall Security Solutions Overview Q1 2012
Waterfall Security Solutions   Overview Q1 2012Waterfall Security Solutions   Overview Q1 2012
Waterfall Security Solutions Overview Q1 2012henkpieper
 
The 300 Leonidas Solution
The 300 Leonidas SolutionThe 300 Leonidas Solution
The 300 Leonidas Solutionmatthew.maisel
 
EPV_PCI DSS White Paper (3) Cyber Ark
EPV_PCI DSS White Paper (3) Cyber ArkEPV_PCI DSS White Paper (3) Cyber Ark
EPV_PCI DSS White Paper (3) Cyber ArkErni Susanti
 
White paper scada (2)
White paper scada (2)White paper scada (2)
White paper scada (2)Ivan Carmona
 
What is micro segmentation?
What is micro segmentation?What is micro segmentation?
What is micro segmentation?Mir Mustafa Ali
 
Case Study: Running a DCS in a Highly Virtualized Environment, Chris Hughes o...
Case Study: Running a DCS in a Highly Virtualized Environment, Chris Hughes o...Case Study: Running a DCS in a Highly Virtualized Environment, Chris Hughes o...
Case Study: Running a DCS in a Highly Virtualized Environment, Chris Hughes o...Digital Bond
 
Safend General Presentation 2010
Safend General Presentation 2010Safend General Presentation 2010
Safend General Presentation 2010Joseph Mark Heinzen
 
CompTIA Security+ Module1: Security fundamentals
CompTIA Security+ Module1: Security fundamentalsCompTIA Security+ Module1: Security fundamentals
CompTIA Security+ Module1: Security fundamentalsGanbayar Sukhbaatar
 
Sb fortinet-nozomi
Sb fortinet-nozomiSb fortinet-nozomi
Sb fortinet-nozomiIvan Carmona
 
Guardium Data Activiy Monitor For C- Level Executives
Guardium Data Activiy Monitor For C- Level ExecutivesGuardium Data Activiy Monitor For C- Level Executives
Guardium Data Activiy Monitor For C- Level ExecutivesCamilo Fandiño Gómez
 
Critical Infrastructure Security Talk At Null Bangalore 13 Feb 2010 Sundar N
Critical Infrastructure Security Talk At Null Bangalore 13 Feb 2010 Sundar NCritical Infrastructure Security Talk At Null Bangalore 13 Feb 2010 Sundar N
Critical Infrastructure Security Talk At Null Bangalore 13 Feb 2010 Sundar Nnull The Open Security Community
 

Tendances (20)

Critical Infrastructure Security by Subodh Belgi
Critical Infrastructure Security by Subodh BelgiCritical Infrastructure Security by Subodh Belgi
Critical Infrastructure Security by Subodh Belgi
 
McAffee_Security and System Integrity in Embedded Devices
McAffee_Security and System Integrity in Embedded DevicesMcAffee_Security and System Integrity in Embedded Devices
McAffee_Security and System Integrity in Embedded Devices
 
IBM InfoSphere Guardium overview
IBM InfoSphere Guardium overviewIBM InfoSphere Guardium overview
IBM InfoSphere Guardium overview
 
Securing Industrial Control System
Securing Industrial Control SystemSecuring Industrial Control System
Securing Industrial Control System
 
Guardium Presentation
Guardium PresentationGuardium Presentation
Guardium Presentation
 
Lesson 2 Cryptography tools
Lesson 2 Cryptography toolsLesson 2 Cryptography tools
Lesson 2 Cryptography tools
 
Cisco cybersecurity essentials chapter - 6
Cisco cybersecurity essentials chapter - 6Cisco cybersecurity essentials chapter - 6
Cisco cybersecurity essentials chapter - 6
 
IBM Security Guardium Data Activity Monitor (Data Sheet-USEN)
IBM Security Guardium Data Activity Monitor (Data Sheet-USEN)IBM Security Guardium Data Activity Monitor (Data Sheet-USEN)
IBM Security Guardium Data Activity Monitor (Data Sheet-USEN)
 
IBM Infosphere Guardium - Database Security
IBM Infosphere Guardium - Database SecurityIBM Infosphere Guardium - Database Security
IBM Infosphere Guardium - Database Security
 
Waterfall Security Solutions Overview Q1 2012
Waterfall Security Solutions   Overview Q1 2012Waterfall Security Solutions   Overview Q1 2012
Waterfall Security Solutions Overview Q1 2012
 
The 300 Leonidas Solution
The 300 Leonidas SolutionThe 300 Leonidas Solution
The 300 Leonidas Solution
 
EPV_PCI DSS White Paper (3) Cyber Ark
EPV_PCI DSS White Paper (3) Cyber ArkEPV_PCI DSS White Paper (3) Cyber Ark
EPV_PCI DSS White Paper (3) Cyber Ark
 
White paper scada (2)
White paper scada (2)White paper scada (2)
White paper scada (2)
 
What is micro segmentation?
What is micro segmentation?What is micro segmentation?
What is micro segmentation?
 
Case Study: Running a DCS in a Highly Virtualized Environment, Chris Hughes o...
Case Study: Running a DCS in a Highly Virtualized Environment, Chris Hughes o...Case Study: Running a DCS in a Highly Virtualized Environment, Chris Hughes o...
Case Study: Running a DCS in a Highly Virtualized Environment, Chris Hughes o...
 
Safend General Presentation 2010
Safend General Presentation 2010Safend General Presentation 2010
Safend General Presentation 2010
 
CompTIA Security+ Module1: Security fundamentals
CompTIA Security+ Module1: Security fundamentalsCompTIA Security+ Module1: Security fundamentals
CompTIA Security+ Module1: Security fundamentals
 
Sb fortinet-nozomi
Sb fortinet-nozomiSb fortinet-nozomi
Sb fortinet-nozomi
 
Guardium Data Activiy Monitor For C- Level Executives
Guardium Data Activiy Monitor For C- Level ExecutivesGuardium Data Activiy Monitor For C- Level Executives
Guardium Data Activiy Monitor For C- Level Executives
 
Critical Infrastructure Security Talk At Null Bangalore 13 Feb 2010 Sundar N
Critical Infrastructure Security Talk At Null Bangalore 13 Feb 2010 Sundar NCritical Infrastructure Security Talk At Null Bangalore 13 Feb 2010 Sundar N
Critical Infrastructure Security Talk At Null Bangalore 13 Feb 2010 Sundar N
 

Similaire à Cloud Security & Control: A Multi-Layer Approach to Secure Cloud Computing

(ATS4-GS03) Partner Session - Intel Balanced Cloud Solutions for the Healthca...
(ATS4-GS03) Partner Session - Intel Balanced Cloud Solutions for the Healthca...(ATS4-GS03) Partner Session - Intel Balanced Cloud Solutions for the Healthca...
(ATS4-GS03) Partner Session - Intel Balanced Cloud Solutions for the Healthca...BIOVIA
 
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...HyTrust
 
Intel IT Cloud Strategy
Intel IT Cloud StrategyIntel IT Cloud Strategy
Intel IT Cloud Strategytdwiindia
 
Intel_Solid State Discs and Wireless Solutions in Embedded Devices
Intel_Solid State Discs and Wireless Solutions in Embedded DevicesIntel_Solid State Discs and Wireless Solutions in Embedded Devices
Intel_Solid State Discs and Wireless Solutions in Embedded DevicesIşınsu Akçetin
 
Secure and Scale Your Virtual Infrastructure While Meeting Compliance Mandates
Secure and Scale Your Virtual Infrastructure While Meeting Compliance MandatesSecure and Scale Your Virtual Infrastructure While Meeting Compliance Mandates
Secure and Scale Your Virtual Infrastructure While Meeting Compliance MandatesHyTrust
 
Алексей Слепцов_"Интернет вещей. Что это и для чего"
Алексей Слепцов_"Интернет вещей. Что это и для чего"Алексей Слепцов_"Интернет вещей. Что это и для чего"
Алексей Слепцов_"Интернет вещей. Что это и для чего"GeeksLab Odessa
 
“Acceleration of Deep Learning Using OpenVINO: 3D Seismic Case Study,” a Pres...
“Acceleration of Deep Learning Using OpenVINO: 3D Seismic Case Study,” a Pres...“Acceleration of Deep Learning Using OpenVINO: 3D Seismic Case Study,” a Pres...
“Acceleration of Deep Learning Using OpenVINO: 3D Seismic Case Study,” a Pres...Edge AI and Vision Alliance
 
Cloud Security: Perception Vs. Reality
Cloud Security: Perception Vs. RealityCloud Security: Perception Vs. Reality
Cloud Security: Perception Vs. RealityInternap
 
EMC - Accelerate Cloud Journey Webinar
EMC - Accelerate Cloud Journey WebinarEMC - Accelerate Cloud Journey Webinar
EMC - Accelerate Cloud Journey WebinarErin Banks
 
Cloud Technology: Now Entering the Business Process Phase
Cloud Technology: Now Entering the Business Process PhaseCloud Technology: Now Entering the Business Process Phase
Cloud Technology: Now Entering the Business Process Phasefinteligent
 
Intel Cloud Summit: Greg Brown McAfee
Intel Cloud Summit: Greg Brown McAfeeIntel Cloud Summit: Greg Brown McAfee
Intel Cloud Summit: Greg Brown McAfeeIntelAPAC
 
Introduction to container networking in K8s - SDN/NFV London meetup
Introduction to container networking in K8s - SDN/NFV  London meetupIntroduction to container networking in K8s - SDN/NFV  London meetup
Introduction to container networking in K8s - SDN/NFV London meetupHaidee McMahon
 
Oracle Open World Preso on Cloud Economics
Oracle Open World Preso on Cloud EconomicsOracle Open World Preso on Cloud Economics
Oracle Open World Preso on Cloud EconomicsRon Batra
 
Kaseya Connect 2012 - Managing Intel vPro With Kaseya
Kaseya Connect 2012 - Managing Intel vPro With KaseyaKaseya Connect 2012 - Managing Intel vPro With Kaseya
Kaseya Connect 2012 - Managing Intel vPro With KaseyaKaseya
 
AIDC Summit LA- Hands-on Training
AIDC Summit LA- Hands-on Training AIDC Summit LA- Hands-on Training
AIDC Summit LA- Hands-on Training Intel® Software
 
Best Practices for Cloud Security
Best Practices for Cloud SecurityBest Practices for Cloud Security
Best Practices for Cloud SecurityIT@Intel
 
How Intel Is Managing IT In A Downturn
How Intel Is Managing IT In A DownturnHow Intel Is Managing IT In A Downturn
How Intel Is Managing IT In A DownturnUmair Mohsin
 

Similaire à Cloud Security & Control: A Multi-Layer Approach to Secure Cloud Computing (20)

(ATS4-GS03) Partner Session - Intel Balanced Cloud Solutions for the Healthca...
(ATS4-GS03) Partner Session - Intel Balanced Cloud Solutions for the Healthca...(ATS4-GS03) Partner Session - Intel Balanced Cloud Solutions for the Healthca...
(ATS4-GS03) Partner Session - Intel Balanced Cloud Solutions for the Healthca...
 
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
 
Intel IT Cloud Strategy
Intel IT Cloud StrategyIntel IT Cloud Strategy
Intel IT Cloud Strategy
 
Intel_Solid State Discs and Wireless Solutions in Embedded Devices
Intel_Solid State Discs and Wireless Solutions in Embedded DevicesIntel_Solid State Discs and Wireless Solutions in Embedded Devices
Intel_Solid State Discs and Wireless Solutions in Embedded Devices
 
federal reserve.
federal reserve.federal reserve.
federal reserve.
 
Secure and Scale Your Virtual Infrastructure While Meeting Compliance Mandates
Secure and Scale Your Virtual Infrastructure While Meeting Compliance MandatesSecure and Scale Your Virtual Infrastructure While Meeting Compliance Mandates
Secure and Scale Your Virtual Infrastructure While Meeting Compliance Mandates
 
Алексей Слепцов_"Интернет вещей. Что это и для чего"
Алексей Слепцов_"Интернет вещей. Что это и для чего"Алексей Слепцов_"Интернет вещей. Что это и для чего"
Алексей Слепцов_"Интернет вещей. Что это и для чего"
 
The Intel Xeon Scalable Processor and IoT
The Intel Xeon Scalable Processor and IoTThe Intel Xeon Scalable Processor and IoT
The Intel Xeon Scalable Processor and IoT
 
“Acceleration of Deep Learning Using OpenVINO: 3D Seismic Case Study,” a Pres...
“Acceleration of Deep Learning Using OpenVINO: 3D Seismic Case Study,” a Pres...“Acceleration of Deep Learning Using OpenVINO: 3D Seismic Case Study,” a Pres...
“Acceleration of Deep Learning Using OpenVINO: 3D Seismic Case Study,” a Pres...
 
Cloud Security: Perception Vs. Reality
Cloud Security: Perception Vs. RealityCloud Security: Perception Vs. Reality
Cloud Security: Perception Vs. Reality
 
EMC - Accelerate Cloud Journey Webinar
EMC - Accelerate Cloud Journey WebinarEMC - Accelerate Cloud Journey Webinar
EMC - Accelerate Cloud Journey Webinar
 
Cloud Technology: Now Entering the Business Process Phase
Cloud Technology: Now Entering the Business Process PhaseCloud Technology: Now Entering the Business Process Phase
Cloud Technology: Now Entering the Business Process Phase
 
Intel Cloud Summit: Greg Brown McAfee
Intel Cloud Summit: Greg Brown McAfeeIntel Cloud Summit: Greg Brown McAfee
Intel Cloud Summit: Greg Brown McAfee
 
Introduction to container networking in K8s - SDN/NFV London meetup
Introduction to container networking in K8s - SDN/NFV  London meetupIntroduction to container networking in K8s - SDN/NFV  London meetup
Introduction to container networking in K8s - SDN/NFV London meetup
 
Oracle Open World Preso on Cloud Economics
Oracle Open World Preso on Cloud EconomicsOracle Open World Preso on Cloud Economics
Oracle Open World Preso on Cloud Economics
 
Kaseya Connect 2012 - Managing Intel vPro With Kaseya
Kaseya Connect 2012 - Managing Intel vPro With KaseyaKaseya Connect 2012 - Managing Intel vPro With Kaseya
Kaseya Connect 2012 - Managing Intel vPro With Kaseya
 
AIDC Summit LA- Hands-on Training
AIDC Summit LA- Hands-on Training AIDC Summit LA- Hands-on Training
AIDC Summit LA- Hands-on Training
 
Oow con7393
Oow con7393Oow con7393
Oow con7393
 
Best Practices for Cloud Security
Best Practices for Cloud SecurityBest Practices for Cloud Security
Best Practices for Cloud Security
 
How Intel Is Managing IT In A Downturn
How Intel Is Managing IT In A DownturnHow Intel Is Managing IT In A Downturn
How Intel Is Managing IT In A Downturn
 

Plus de OpSource

Customer Success: The Key To SaaS Company Profitability
Customer Success: The Key To SaaS Company ProfitabilityCustomer Success: The Key To SaaS Company Profitability
Customer Success: The Key To SaaS Company ProfitabilityOpSource
 
Hot Cloud Companies: Tap In Systems - The Problem: Managing Cloud Complexities
Hot Cloud Companies: Tap In Systems - The Problem: Managing Cloud ComplexitiesHot Cloud Companies: Tap In Systems - The Problem: Managing Cloud Complexities
Hot Cloud Companies: Tap In Systems - The Problem: Managing Cloud ComplexitiesOpSource
 
Strategies for Web Application Security
Strategies for Web Application SecurityStrategies for Web Application Security
Strategies for Web Application SecurityOpSource
 
Overview & Demo: OpSource Cloud
Overview & Demo: OpSource CloudOverview & Demo: OpSource Cloud
Overview & Demo: OpSource CloudOpSource
 
Demo: Easily Deploy Applications with Standing Cloud
Demo: Easily Deploy Applications with Standing CloudDemo: Easily Deploy Applications with Standing Cloud
Demo: Easily Deploy Applications with Standing CloudOpSource
 
Public, Private and Hybrid: For Enterprise, It's All About the Cloud
Public, Private and Hybrid: For Enterprise, It's All About the CloudPublic, Private and Hybrid: For Enterprise, It's All About the Cloud
Public, Private and Hybrid: For Enterprise, It's All About the CloudOpSource
 
Scalable & Cost Effective SaaS: Case Study: Accept Software
Scalable & Cost Effective SaaS: Case Study: Accept SoftwareScalable & Cost Effective SaaS: Case Study: Accept Software
Scalable & Cost Effective SaaS: Case Study: Accept SoftwareOpSource
 
Challenges & Solutions for SaaS ISVs
Challenges & Solutions for SaaS ISVsChallenges & Solutions for SaaS ISVs
Challenges & Solutions for SaaS ISVsOpSource
 
SAP Business Objects
SAP Business ObjectsSAP Business Objects
SAP Business ObjectsOpSource
 
Saas business model_thinkstrategies
Saas business model_thinkstrategiesSaas business model_thinkstrategies
Saas business model_thinkstrategiesOpSource
 
Scaling SaaS on Oracle
Scaling SaaS on OracleScaling SaaS on Oracle
Scaling SaaS on OracleOpSource
 
Create Secure Site-to-Cloud VPN Connections
Create Secure Site-to-Cloud VPN ConnectionsCreate Secure Site-to-Cloud VPN Connections
Create Secure Site-to-Cloud VPN ConnectionsOpSource
 
Vendor Landscape: Cloud IaaS
Vendor Landscape: Cloud IaaSVendor Landscape: Cloud IaaS
Vendor Landscape: Cloud IaaSOpSource
 
Cloud Disaster Recovery
Cloud Disaster Recovery Cloud Disaster Recovery
Cloud Disaster Recovery OpSource
 
Leaders in the Cloud: Identifying Cloud Business Value for Customers
Leaders in the Cloud: Identifying Cloud Business Value for CustomersLeaders in the Cloud: Identifying Cloud Business Value for Customers
Leaders in the Cloud: Identifying Cloud Business Value for CustomersOpSource
 
Case Study: ClearBenefits
Case Study: ClearBenefitsCase Study: ClearBenefits
Case Study: ClearBenefitsOpSource
 
Case Study: ACCEPT
Case Study: ACCEPTCase Study: ACCEPT
Case Study: ACCEPTOpSource
 
Astoria case study
Astoria case studyAstoria case study
Astoria case studyOpSource
 
Case Study: Aerohive
Case Study: AerohiveCase Study: Aerohive
Case Study: AerohiveOpSource
 
The Build vs. Buy Decision for SaaS Delivery
The Build vs. Buy Decision for SaaS DeliveryThe Build vs. Buy Decision for SaaS Delivery
The Build vs. Buy Decision for SaaS DeliveryOpSource
 

Plus de OpSource (20)

Customer Success: The Key To SaaS Company Profitability
Customer Success: The Key To SaaS Company ProfitabilityCustomer Success: The Key To SaaS Company Profitability
Customer Success: The Key To SaaS Company Profitability
 
Hot Cloud Companies: Tap In Systems - The Problem: Managing Cloud Complexities
Hot Cloud Companies: Tap In Systems - The Problem: Managing Cloud ComplexitiesHot Cloud Companies: Tap In Systems - The Problem: Managing Cloud Complexities
Hot Cloud Companies: Tap In Systems - The Problem: Managing Cloud Complexities
 
Strategies for Web Application Security
Strategies for Web Application SecurityStrategies for Web Application Security
Strategies for Web Application Security
 
Overview & Demo: OpSource Cloud
Overview & Demo: OpSource CloudOverview & Demo: OpSource Cloud
Overview & Demo: OpSource Cloud
 
Demo: Easily Deploy Applications with Standing Cloud
Demo: Easily Deploy Applications with Standing CloudDemo: Easily Deploy Applications with Standing Cloud
Demo: Easily Deploy Applications with Standing Cloud
 
Public, Private and Hybrid: For Enterprise, It's All About the Cloud
Public, Private and Hybrid: For Enterprise, It's All About the CloudPublic, Private and Hybrid: For Enterprise, It's All About the Cloud
Public, Private and Hybrid: For Enterprise, It's All About the Cloud
 
Scalable & Cost Effective SaaS: Case Study: Accept Software
Scalable & Cost Effective SaaS: Case Study: Accept SoftwareScalable & Cost Effective SaaS: Case Study: Accept Software
Scalable & Cost Effective SaaS: Case Study: Accept Software
 
Challenges & Solutions for SaaS ISVs
Challenges & Solutions for SaaS ISVsChallenges & Solutions for SaaS ISVs
Challenges & Solutions for SaaS ISVs
 
SAP Business Objects
SAP Business ObjectsSAP Business Objects
SAP Business Objects
 
Saas business model_thinkstrategies
Saas business model_thinkstrategiesSaas business model_thinkstrategies
Saas business model_thinkstrategies
 
Scaling SaaS on Oracle
Scaling SaaS on OracleScaling SaaS on Oracle
Scaling SaaS on Oracle
 
Create Secure Site-to-Cloud VPN Connections
Create Secure Site-to-Cloud VPN ConnectionsCreate Secure Site-to-Cloud VPN Connections
Create Secure Site-to-Cloud VPN Connections
 
Vendor Landscape: Cloud IaaS
Vendor Landscape: Cloud IaaSVendor Landscape: Cloud IaaS
Vendor Landscape: Cloud IaaS
 
Cloud Disaster Recovery
Cloud Disaster Recovery Cloud Disaster Recovery
Cloud Disaster Recovery
 
Leaders in the Cloud: Identifying Cloud Business Value for Customers
Leaders in the Cloud: Identifying Cloud Business Value for CustomersLeaders in the Cloud: Identifying Cloud Business Value for Customers
Leaders in the Cloud: Identifying Cloud Business Value for Customers
 
Case Study: ClearBenefits
Case Study: ClearBenefitsCase Study: ClearBenefits
Case Study: ClearBenefits
 
Case Study: ACCEPT
Case Study: ACCEPTCase Study: ACCEPT
Case Study: ACCEPT
 
Astoria case study
Astoria case studyAstoria case study
Astoria case study
 
Case Study: Aerohive
Case Study: AerohiveCase Study: Aerohive
Case Study: Aerohive
 
The Build vs. Buy Decision for SaaS Delivery
The Build vs. Buy Decision for SaaS DeliveryThe Build vs. Buy Decision for SaaS Delivery
The Build vs. Buy Decision for SaaS Delivery
 

Dernier

Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 

Dernier (20)

Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 

Cloud Security & Control: A Multi-Layer Approach to Secure Cloud Computing

  • 1. Cloud Security & Control: A Multi-Layer Approach to Secure Cloud Computing John Rowell Chief Technology Officer OpSource Twitter: @johnrowell Paul Sathis Director, Cloud Computing, Intel Americas Intel Corporation Twitter: @paulinthehouse
  • 2. Legal Disclaimers Intel® Virtualization Technology requires a computer system with an enabled Intel® processor, BIOS, virtual machine monitor (VMM) and, for some uses, certain platform software enabled for it. Functionality, performance or other benefits will vary depending on hardware and software configurations and may require a BIOS update. Software applications may not be compatible with all operating systems. Please check with your application vendor. Intel® TXT requires a computer system with Intel® Virtualization Technology, an Intel TXT-enabled processor, chipset, BIOS, Authenticated Code Modules and an Intel TXT-compatible measured launched environment (MLE). Intel TXT also requires the system to contain a TPM v1.s. For more information, visit http://www.intel.com/technology/security. In addition, Intel TXT requires that the original equipment manufacturer provides TPM functionality, which requires a TPM- supported BIOS. TPM functionality must be initialized and may not be available in all countries. Intel ® AES-NI requires a computer system with an AES-NI enabled processor, as well as non-Intel software to execute the instructions in the correct sequence. For availability, consult your reseller or system manufacturer. For more information, see http://software.intel.com/en-us/articles/intel-advanced-encryption-standard- instructions-aes-ni/ Intel processor numbers are not a measure of performance. Processor numbers differentiate features within each processor series, not across different processor sequences. See http://www.intel.com/products/processor_number for details. Intel products are not intended for use in medical, life saving, life sustaining, critical control or safety systems, or in nuclear facility applications. All dates and products specified are for planning purposes only and are subject to change without notice On Slide 4, the sources are as follows: 1)Source: http://www.theregister.co.uk/2009/06/08/webhost_attack/ 2)Source: http://www.infoworld.com/d/security-central/it-ops-security-pros-odds-over-virtualization-risks-240 On Slide 10, the sources are as follows: 3)World-record virtualization performance claim based on all published VMmark* 1.x results on http://www.ideasinternational.com/Benchmark-Top-Ten/VMmark-1-x. Top-ranked Fujitsu PRIMERGY* RX600 S5 uses four Intel® Xeon® processor X7560 (24M cache, 2.26GHz, 6.40GT/s Intel QPI). Software and workloads used in performance tests may have been optimized for performance only on Intel microprocessors. Performance tests, such as SYSmark and MobileMark, are measured using specific computer systems, components, software, operations, and functions. Any change to any of those factors may cause the results to vary. You should consult other information and performance tests to assist you in fully evaluating your contemplated purchases, including the performance of that product when combined with other products. 4)No computer system can provide absolute security under all conditions. Intel® Trusted Execution Technology (Intel® TXT) requires a computer system with Intel® Virtualization Technology, an Intel TXT-enabled processor, chipset, BIOS, Authenticated Code Modules and an Intel TXT-compatible measured launched environment (MLE). Intel TXT also requires the system to contain a TPM v1.s. For more information, visit http://www.intel.com/technology/security 5)Intel® AES-NI requires a computer system with an AES-NI enabled processor, as well as non-Intel software to execute the instructions in the correct sequence. AES-NI is available on select Intel® Xeon® processors. For availability, consult your reseller or system manufacturer. For more information, see http://software.intel.com/en-us/articles/intel-advanced-encryption- standard-instructions-aes-ni/ Copyright © 2011 Intel Corporation. All rights reserved. Intel, the Intel logo, Xeon and Intel Core are trademarks or registered trademarks of Intel Corporation or its subsidiaries in the United States and other countries. All dates and products specified are for planning purposes only and are subject to change without notice. * Other brands and names maybe claimed as the property of others.
  • 3. VOTE • With regards to cloud computing, I am most concerned about the following issue: − Compliance − Multi-tenancy − Audit − Data Protection − All of the above Copyright © 2011 Intel Corporation. All rights reserved. Intel, the Intel logo, Xeon and Intel Core are trademarks or registered trademarks of Intel Corporation or its subsidiaries in the United States and other countries. All dates and products specified are for planning purposes only and are subject to change without notice. * Other brands and names maybe claimed as the property of others.
  • 4. Security in the Cloud Virtualization vs. Security Benefits Needs “Webhost hack wipes out data for 100,000 sites New security requirements Vaserv suspects zero-day for cloud & virtualization: virtualization vuln” —The Register1 “IT ops, security pros at odds • Abstraction of physical hardware over virtualization risks • Multi-tenancy movement IT pros upbeat about virtualization, whereas security experts harbor implicitly require audit & security doubts about the security role the hypervisor can play” —IDG News Service2 Cloud & Virtualization Break Many Traditional Perimeter-oriented Security Techniques Copyright © 2011 Intel Corporation. All rights reserved. Intel, the Intel logo, Xeon and Intel Core are trademarks or registered trademarks of Intel Corporation or its subsidiaries in the United States and other countries. All dates and products specified are for planning purposes only and are subject to change without notice. * Other brands and names maybe claimed as the property of others.
  • 5. Cloud 2015 Vision FEDERATED AUTOMATED Share data IT can focus securely across more on public and innovation and private clouds less on management CLIENT AWARE Optimizing services based on device capability Desktops Laptops Netbooks Personal Devices Smartphones Smart TVs Embedded Open & Interoperable Solutions Essential Copyright © 2011 Intel Corporation. All rights reserved. Intel, the Intel logo, Xeon and Intel Core are trademarks or registered trademarks of Intel Corporation or its subsidiaries in the United States and other countries. All dates and products specified are for planning purposes only and are subject to change without notice. * Other brands and names maybe claimed as the property of others.
  • 6. From Vision to Action Helping Cloud Service Providers on Path to Cloud 2015 Copyright © 2011 Intel Corporation. All rights reserved. Intel, the Intel logo, Xeon and Intel Core are trademarks or registered trademarks of Intel Corporation or its subsidiaries in the United States and other countries. All dates and products specified are for planning purposes only and are subject to change without 6 notice. * Other brands and names maybe claimed as the property of others.
  • 7. Intel Platform Technologies Intelligence Built-in for Cloud Computing Demands Compute Intel® Xeon® processors E7 & 7500 Series with Hardware-based Security Result: Helps Provider Meet Service Level Agreements Performance for Workload agility Simpler & Lower Cost Network Storage 10Gb Ethernet with Open platforms and built-in support for performance unified fabric breakthroughs (SSDs) Copyright © 2011 Intel Corporation. All rights reserved. Intel, the Intel logo, Xeon and Intel Core are trademarks or registered trademarks of Intel Corporation or its subsidiaries in the United States and other countries. All dates and products specified are for planning purposes only and are subject to change without notice. * Other brands and names maybe claimed as the property of others.
  • 8. Cloud Security Services Enhanced by Intel-based Technology Encrypt in the Cloud Trust the Cloud Use encryption to protect data Establish a trusted foundation Connect to the Cloud Audit the Cloud Establish / verify identities & federate Build higher assurance into audit Copyright © 2011 Intel Corporation. All rights reserved. Intel, the Intel logo, Xeon and Intel Core are trademarks or registered trademarks of Intel Corporation or its subsidiaries in the United States and other countries. All dates and products specified are for planning purposes only and are subject to change without notice. * Other brands and names maybe claimed as the property of others.
  • 9. Intel-based Technology Establishing Foundation for More Secure Clouds Encrypt Intel® AES-NI Isolate Comply Intel® VT & Intel® TXT Intel® TXT VM 1 VM 2 VM 1 VM 1 VM 2 VMM Intel® TXT ?? VMM Copyright © 2011 Intel Corporation. All rights reserved. Intel, the Intel logo, Xeon and Intel Core are trademarks or registered trademarks of Intel Corporation or its subsidiaries in the United States and other countries. All dates and products specified are for planning purposes only and are subject to change without 9 notice. * Other brands and names maybe claimed as the property of others.
  • 10. Great Collaboration with OpSource Cloud Services Powered by Intel® Xeon® processor 7500 & E7 Series − Intel Xeon processor E7 series delivers world-record virtualization performance while delivering higher VM densities than any other industry- standard server in the market today3 State of the Art Hardware-based Security Technology − Working with Intel on hardware-based security such as Intel® Trusted Execution Technology4 that can be used to verify the trustworthiness of a platform Foundation for High Reliability − Intel Xeon processor E7 series delivers extraordinary server reliability with automatic detection and correction of errors and interconnect error detection and recovery − Helps Opsource deliver on high-availability and cloud performance claims With Intel technology, OpSource can enhance security, meet demanding customer requirements & drive competitive prices Copyright © 2011 Intel Corporation. All rights reserved. Intel, the Intel logo, Xeon and Intel Core are trademarks or registered trademarks of Intel Corporation or its subsidiaries in the United States and other countries. All dates and products specified are for planning purposes only and are subject to change without notice. * Other brands and names maybe claimed as the property of others.
  • 11. Cloud Security & Control: A Multi-Layer Approach to Secure Cloud Computing 9/14/2011 John Rowell, CTO Slide 11 © 2011 OpSource, Inc. All rights reserved.
  • 12. OpSource: Enterprise Cloud and Managed Hosting • OpSource provides Enterprise Cloud and Managed Hosting Services • Solutions for Enterprise, SaaS, Service Providers (Telecom and Cloud Platforms) • A Dimension Data Company • Offices: Santa Clara, CA (HQ); Herndon, VA; Dublin, London, Bangalore • Unmatched Industry Experience – SaaS Hosting and Scaling Software-Oriented Architectures (SOA) – High Performance, Secure Cloud Computing Slide 12 © 2011 OpSource, Inc. All rights reserved.
  • 13. Polls Show Security as Top Concern about Public Cloud • 64% of IT Bosses express concerns about whether corporate data would be secure inside cloud service providers' datacenters – Forrester Research • 56% of CFOs had not invested in public cloud services because of fears over the security of sensitive data - SunGard Availability Services Poll Gartner 2009 Poll Slide 13 © 2011 OpSource, Inc. All rights reserved.
  • 14. Security is a Challenge for Utility Cloud Platforms Slide 14 © 2011 OpSource, Inc. All rights reserved.
  • 15. Defense-in-Depth Security Applied to the Cloud Defense in depth is a best practice in which multiple layers of security controls (defense) are implemented to provide redundancy in the event a security control fails or a vulnerability is exploited. Layers of Defense IDS / IPS Segmentation - VLAN - Firewall Authentication and Access Control Data Encryption Incident Response Physical Data Center Security Monitoring and Tuning Slide 15 © 2011 OpSource, Inc. All rights reserved.
  • 16. Defense #1: Intrusion Detection System • Fully-managed Intrusion Detection System (IDS) utilizing signature, protocol and anomaly based inspection methods Slide 16 © 2011 OpSource, Inc. All rights reserved.
  • 17. Defense #2: Network Segmentation Provides Security Controls • Customer Controlled Network Configuration – configurable Layer 2 VLANs: – Provide segmentation of public and private IP space – NAT and VIP functions expose only those IP addresses you want made public • Customizable ACL-based firewall rules allow control of access into each network VLAN: – Build multi-tier network architectures to separate data tiers from front-end web tiers to provide an additional layer of firewall rules to protect data Slide 17 © 2011 OpSource, Inc. All rights reserved.
  • 18. Defense #3: Authentication and Access Controls • VPN access for administration of all servers • Unique username and password for multiple administrators • Role-based permissions allow cloud administrators to create sub-admins to manage only certain resources, such as servers, storage or networks • Audit logs and reporting Slide 18 © 2011 OpSource, Inc. All rights reserved.
  • 19. Defense #3 (con’t): Authentication and Access Controls • Intel® TXT establishes a “hardware root of trust” that can be used to verify the trustworthiness of a platform4 • Applications for cloud computing • Base migration and workload placement decisions on the trustworthiness of the infrastructure • Control cloud workloads Slide 19 © 2011 OpSource, Inc. All rights reserved.
  • 20. Defense #4: Data Reliability & Security • The Intel® Xeon® processor E7 family offers an extensive and robust set of RAS features in silicon to provide error detection, correction, containment, and recovery in all processors, memory, and I/O data paths • VPN Access • Data stored with 256-bit encryption at rest and 128-bit SSL encryption while in transit • Working with Intel on utilizing Intel® Advanced Encryption Standard - New Instructions to reduce the performance penalties usually experienced with pervasive encryption5 Slide 20 © 2011 OpSource, Inc. All rights reserved.
  • 21. Defense #5: 24x7 Incident Response • Incident Response Teams handle reports of security incidents. An OSIRT will escalate the incident to law enforcement and/or executive management as prescribed in security policies 24 x 7 x 365 Slide 21 © 2011 OpSource, Inc. All rights reserved.
  • 22. Defense #6: Datacenters – The Physical Security of the Cloud • Meet or Exceed Tier III Standards (highest commercially available datacenter rating) • All areas within facility are monitored with CCTV and onsite guards 24x7x365 surveillance and audit logs • Multiple layers of biometric two-factor authentication restricts access Slide 22 © 2011 OpSource, Inc. All rights reserved.
  • 23. Defense #7: Monitoring and Tuning • Edge-to-edge security, visibility and carrier-class threat management and remediation utilizing industry leading Arbor Networks Peakflow • Compares real-time network traffic against baseline definitions of normal network behavior, immediately flagging all anomalies due to security hazards such as: – Denial of Service (DoS) attacks – Distributed Denial of Service (DDoS) attacks – Worms or botnets Slide 23 © 2011 OpSource, Inc. All rights reserved.
  • 24. OpSource’s Approach to Ensuring Security • Defense in depth is a best practice Layers of Defense with multiple layers of security IDS / IPS controls Segmentation - VLAN – Cisco hardware-based networking - Firewall – As part of best practice, intelligent Authentication and Access servers are needed to secure clouds Control – Intel technology helps provide Data Encryption foundation for Trust, Security, & Incident Response Compliance with Intel® TXT and Physical Data Center Security Intel® AES-NI Monitoring and Tuning – Increases confidence that your data in the cloud is safe and secure Slide 24 © 2011 OpSource, Inc. All rights reserved.
  • 25. Setup a Cloud Network to Secure Your Environment Slide 25 © 2011 OpSource, Inc. All rights reserved.
  • 26. Setup and Manage Cloud Servers Network: Cisco-based firewall, VLAN, VPN and load balancing included User Management: Role-based user controls; activity and usage reporting Support: 24x7 phone support included; Managed Services Flexibility: 1-8 CPU, 1-64GB RAM, 50GB-2.5TB local disk Hybrid: Ability to deploy dedicated and cloud servers Slide 26 © 2011 OpSource, Inc. All rights reserved.
  • 27. Compliance Enhances Trust • Yearly certification and compliance audits to ensure security HIPAA Business Associate Slide 27 © 2011 OpSource, Inc. All rights reserved.
  • 28. VOTE • Learning about how OpSource secures their cloud solution, including the use of Intel Technology has − Significantly increased my level of interest in OpSource’s Cloud Solutions − Slightly increased my level of interest in OpSource’s Cloud Solutions − Has not changed my level of interest in OpSource’s Cloud Solutions Copyright © 2011 Intel Corporation. All rights reserved. Intel, the Intel logo, Xeon and Intel Core are trademarks or registered trademarks of Intel Corporation or its subsidiaries in the United States and other countries. All dates and products specified are for planning purposes only and are subject to change without notice. * Other brands and names maybe claimed as the property of others.
  • 29. Continue Conversation John Rowell Chief Technology Officer OpSource Twitter: @johnrowell Paul Sathis Director, Cloud Computing, Intel Americas Intel Corporation Twitter: @paulinthehouse