SlideShare une entreprise Scribd logo
1  sur  34
Hi – 5
Marcus Hogue
Chris Jacobson
Alexandra Korol
Mark Ordonez
Jinjia Xi
Security of Cloud Computing
Topic Overview
 Introduction
 Cloud Basics
 Securing the Cloud
 Leveraging the Cloud
 Final Recommendations
Introduction
 Cloud Computing Industry is growing
 According to Gartner, worldwide cloud services
revenue is on pace to surpass $56.3 billion in
2009, a 21.3% increase from 2008 revenue of
$46.4 billion, according to Gartner, Inc. The market
is expected to reach $150.1 billion in 2013.
 Businesses are increasing Cloud adoption
 "We expect a great deal of migration towards cloud
computing within the federal government in addition
to the already robust private sector growth. The
growth of the cloud should not outpace our ability to
protect the data that goes into it..." ~ Former White
House advisor Paul Kurtz, partner with Good
Harbor Consulting, LLC
 How can IT leaders ensure security in the
Cloud Basics
 Cloud Characteristics
 Service Models
 SaaS
 IaaS
 PaaS
 Deployment Models
 Public
 Private
 Community
 Hybrid
Cloud Characteristics
Cloud Service Models
 Software as a Service
(SaaS)
 Platform as a Service
(PaaS)
 Infrastructure as a
Service (IaaS)
Natural Evolution of the Web
Source: Lew Tucker, Introduction to Cloud Computing for Enterprise Users
Four Deployment Models
Four Deployment Models
Four Deployment Models
Four Deployment Models
Securing the Cloud
 Security Interaction Model
 Top Security Threats
 Cloud Provider Security Practices – Google Case
Study
Security Interaction Model
Top Security Threats
 Abuse and nefarious use of cloud computing
 Insecure interfaces & API’s
 Unknown risk profile
 Malicious insiders
 Shared technology issues
 Data loss or leakage
 Account or service hijacking
Abuse and nefarious
use of cloud
computing
 Stricter initial registration and validation processes.
 Enhanced credit card fraud monitoring and
coordination.
 Comprehensive introspection of customer network
traffic.
 Monitoring public blacklists for one’s own network
blocks.
Insecure interfaces &
API’s
 Analyze the security model of cloud provider
interfaces.
 Ensure strong authentication and access controls
are
implemented in concert with encrypted transmission.
 Understand the dependency chain associated with
the API.
Unknown risk profile  Disclosure of applicable logs and data.
Partial/full disclosure of infrastructure details
 Monitoring and alerting on necessary information.
Threat Mitigation
Malicious insiders  Enforce strict supply chain management and conduct
a comprehensive supplier assessment.
 Specify human resource requirements as part of
legal contracts.
 Require transparency into overall information security
and management practices, as well as compliance
reporting.
 Determine security breach notification processes.
Shared technology
issues
 Implement security best practices for installation and
configuration.
 Monitor environment for unauthorized
changes/activity.
 Promote strong authentication and access control for
administrative access and operations.
 Enforce service level agreements for patching and
vulnerability remediation.
 Conduct vulnerability scanning and configuration
audits.
Threat Mitigation
Data loss or
leakage
 Implement strong API access control.
 Encrypt and protect integrity of data in transit.
 Analyze data protection at both design and run time.
 Implement strong key generation, storage and
management, and destruction practices.
 Contractually demand providers wipe persistent
media before it is released into the pool.
 Contractually specify provider backup and retention
strategies.
Account or
service
hijacking
 Prohibit the sharing of account credentials between
users and services.
 Leverage strong two-factor authentication
techniques where possible.
 Employ proactive monitoring to detect unauthorized
activity.
 Understand cloud provider security policies and
SLAs.
Threat Mitigation
Google Security Practices
 Organizational and Operational Security
 Data Security
 Threat Evasion
 Safe Access
 Privacy
Google Organizational and
Operational Security
 Holistic approach to security
 Security team
 Develop with security in mind
 Regularly performs security audits and threat
assessments
 Employees screened, trained
 Works with security community and advisors
Google Data Security
 Google Code of Conduct – “Don’t be evil.”
 Physical security
 Logical Security
 Accessibility
 Redundancy
Google Threat Evasion
 Spam and virus protection built into products
 Protects against application & network attacks
Google Safe Access
 Avoids local storage
 Access controls
 Encrypted connections
 Integrated security
Google Privacy
 Privacy policy
 Does not access confidential user data
 Does not alter data
 Maintain own IP rights
 Indemnification, liability
 End of use
Leveraging the Cloud
 Decision Making Process
 Clan Wars Case Study
Decision Making Process
 Identify the asset for cloud deployment
 Evaluate the asset requirements for
confidentiality, integrity, and availability
 Map the asset to potential cloud deployment
models
 Evaluate potential cloud service models and
providers
 Sketch the potential data flow
 Draw conclusions
Case Study: Clan Wars
Company Profile
Online multiplayer game
In Browser Flash
Processes credit card payments
Case Study: Clan Wars
Decision Making Process
 Identified all components as candidates
 Evaluation concluded:
 Payment = High concern on all factors
 Game & data = Medium on all factors
 Primary components mapped:
 Infrastructure (Servers, storage, etc)
 Payment Processing
 Collaboration
Case Study: Clan Wars
Data Flow
Case Study: Clan Wars
Conclusion
Great fit
Risk requirements met
Data flow supports needs
Added benefits
Low cost (saving ~$500/month)
Low maintenance
Performance
Final Recommendation
No universal answer
Evaluate your security needs
versus the capabilities of the
provider
Q & A
Supplemental Material
 The sections that follow will not be covered during
the presentation but are included for reference.
Rackspace Security Practices
 Physical Security
 System Security
 Operational Infrastructure Security
 Client Application Security
Cloud Consumer Best Practices
Operational Domains
• Traditional Security,
Business Continuity, and
Disaster Recovery
• Data Center operations
• Incident Management
• Application security
• Encryption & Key Mgmt
• Identity & access Mgmt
• Virtualization
Governance Domains
• Governance & Enterprise
Risk Mgmt
• Legal and Electronic
Discovery
• Compliance and Audit
• Information Life Cycle
Management
• Portability and
Interoperability

Contenu connexe

Similaire à cloudComputingSec_p3.pptx

Guide to security patterns for cloud systems and data security in aws and azure
Guide to security patterns for cloud systems and data security in aws and azureGuide to security patterns for cloud systems and data security in aws and azure
Guide to security patterns for cloud systems and data security in aws and azureAbdul Khan
 
APIsecure 2023 - Approaching Multicloud API Security USing Metacloud, David L...
APIsecure 2023 - Approaching Multicloud API Security USing Metacloud, David L...APIsecure 2023 - Approaching Multicloud API Security USing Metacloud, David L...
APIsecure 2023 - Approaching Multicloud API Security USing Metacloud, David L...apidays
 
2011 IIA Pittsburgh Grant Thornton LLP Presentation (Nov 2011)
2011 IIA Pittsburgh Grant Thornton LLP Presentation (Nov 2011)2011 IIA Pittsburgh Grant Thornton LLP Presentation (Nov 2011)
2011 IIA Pittsburgh Grant Thornton LLP Presentation (Nov 2011)Danny Miller
 
the_role_of_resilience_data_in_ensuring_cloud_security.pdf
the_role_of_resilience_data_in_ensuring_cloud_security.pdfthe_role_of_resilience_data_in_ensuring_cloud_security.pdf
the_role_of_resilience_data_in_ensuring_cloud_security.pdfsarah david
 
CloudPassage Best Practices for Automatic Security Scaling
CloudPassage Best Practices for Automatic Security ScalingCloudPassage Best Practices for Automatic Security Scaling
CloudPassage Best Practices for Automatic Security ScalingAmazon Web Services
 
Security Considerations When Using Cloud Infrastructure Services.pdf
Security Considerations When Using Cloud Infrastructure Services.pdfSecurity Considerations When Using Cloud Infrastructure Services.pdf
Security Considerations When Using Cloud Infrastructure Services.pdfCiente
 
Zero Trust 20211105
Zero Trust 20211105 Zero Trust 20211105
Zero Trust 20211105 Thomas Treml
 
talk6securingcloudamarprusty-191030091632.pptx
talk6securingcloudamarprusty-191030091632.pptxtalk6securingcloudamarprusty-191030091632.pptx
talk6securingcloudamarprusty-191030091632.pptxTrongMinhHoang1
 
MBT Webinar: Does the security of your business data keep you up at night?
MBT Webinar: Does the security of your business data keep you up at night? MBT Webinar: Does the security of your business data keep you up at night?
MBT Webinar: Does the security of your business data keep you up at night? Jorge García
 
Csa about-threats-june-2010-ibm
Csa about-threats-june-2010-ibmCsa about-threats-june-2010-ibm
Csa about-threats-june-2010-ibmSergio Loureiro
 
the_role_of_resilience_data_in_ensuring_cloud_security.pptx
the_role_of_resilience_data_in_ensuring_cloud_security.pptxthe_role_of_resilience_data_in_ensuring_cloud_security.pptx
the_role_of_resilience_data_in_ensuring_cloud_security.pptxsarah david
 
Presentation on Effectively and Securely Using the Cloud Computing Paradigm v26
Presentation on Effectively and Securely Using the Cloud Computing Paradigm v26Presentation on Effectively and Securely Using the Cloud Computing Paradigm v26
Presentation on Effectively and Securely Using the Cloud Computing Paradigm v26Bill Annibell
 
Presentation On Effectively And Securely Using The Cloud Computing Paradigm V26
Presentation On Effectively And Securely Using The Cloud Computing Paradigm V26Presentation On Effectively And Securely Using The Cloud Computing Paradigm V26
Presentation On Effectively And Securely Using The Cloud Computing Paradigm V26TT L
 
Preventing Cloud Data Breaches.pdf
Preventing Cloud Data Breaches.pdfPreventing Cloud Data Breaches.pdf
Preventing Cloud Data Breaches.pdfChinatu Uzuegbu
 

Similaire à cloudComputingSec_p3.pptx (20)

SECURING THE CLOUD DATA LAKES
SECURING THE CLOUD DATA LAKESSECURING THE CLOUD DATA LAKES
SECURING THE CLOUD DATA LAKES
 
Guide to security patterns for cloud systems and data security in aws and azure
Guide to security patterns for cloud systems and data security in aws and azureGuide to security patterns for cloud systems and data security in aws and azure
Guide to security patterns for cloud systems and data security in aws and azure
 
Governing in the Cloud
Governing in the CloudGoverning in the Cloud
Governing in the Cloud
 
APIsecure 2023 - Approaching Multicloud API Security USing Metacloud, David L...
APIsecure 2023 - Approaching Multicloud API Security USing Metacloud, David L...APIsecure 2023 - Approaching Multicloud API Security USing Metacloud, David L...
APIsecure 2023 - Approaching Multicloud API Security USing Metacloud, David L...
 
2011 IIA Pittsburgh Grant Thornton LLP Presentation (Nov 2011)
2011 IIA Pittsburgh Grant Thornton LLP Presentation (Nov 2011)2011 IIA Pittsburgh Grant Thornton LLP Presentation (Nov 2011)
2011 IIA Pittsburgh Grant Thornton LLP Presentation (Nov 2011)
 
the_role_of_resilience_data_in_ensuring_cloud_security.pdf
the_role_of_resilience_data_in_ensuring_cloud_security.pdfthe_role_of_resilience_data_in_ensuring_cloud_security.pdf
the_role_of_resilience_data_in_ensuring_cloud_security.pdf
 
Ad4502189193
Ad4502189193Ad4502189193
Ad4502189193
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
 
CloudPassage Best Practices for Automatic Security Scaling
CloudPassage Best Practices for Automatic Security ScalingCloudPassage Best Practices for Automatic Security Scaling
CloudPassage Best Practices for Automatic Security Scaling
 
Security Considerations When Using Cloud Infrastructure Services.pdf
Security Considerations When Using Cloud Infrastructure Services.pdfSecurity Considerations When Using Cloud Infrastructure Services.pdf
Security Considerations When Using Cloud Infrastructure Services.pdf
 
Zero Trust 20211105
Zero Trust 20211105 Zero Trust 20211105
Zero Trust 20211105
 
talk6securingcloudamarprusty-191030091632.pptx
talk6securingcloudamarprusty-191030091632.pptxtalk6securingcloudamarprusty-191030091632.pptx
talk6securingcloudamarprusty-191030091632.pptx
 
MBT Webinar: Does the security of your business data keep you up at night?
MBT Webinar: Does the security of your business data keep you up at night? MBT Webinar: Does the security of your business data keep you up at night?
MBT Webinar: Does the security of your business data keep you up at night?
 
Csa about-threats-june-2010-ibm
Csa about-threats-june-2010-ibmCsa about-threats-june-2010-ibm
Csa about-threats-june-2010-ibm
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
 
the_role_of_resilience_data_in_ensuring_cloud_security.pptx
the_role_of_resilience_data_in_ensuring_cloud_security.pptxthe_role_of_resilience_data_in_ensuring_cloud_security.pptx
the_role_of_resilience_data_in_ensuring_cloud_security.pptx
 
Presentation on Effectively and Securely Using the Cloud Computing Paradigm v26
Presentation on Effectively and Securely Using the Cloud Computing Paradigm v26Presentation on Effectively and Securely Using the Cloud Computing Paradigm v26
Presentation on Effectively and Securely Using the Cloud Computing Paradigm v26
 
Presentation On Effectively And Securely Using The Cloud Computing Paradigm V26
Presentation On Effectively And Securely Using The Cloud Computing Paradigm V26Presentation On Effectively And Securely Using The Cloud Computing Paradigm V26
Presentation On Effectively And Securely Using The Cloud Computing Paradigm V26
 
Preventing Cloud Data Breaches.pdf
Preventing Cloud Data Breaches.pdfPreventing Cloud Data Breaches.pdf
Preventing Cloud Data Breaches.pdf
 

Dernier

Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Victor Rentea
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Bhuvaneswari Subramani
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelDeepika Singh
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...apidays
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistandanishmna97
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontologyjohnbeverley2021
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 

Dernier (20)

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 

cloudComputingSec_p3.pptx

  • 1. Hi – 5 Marcus Hogue Chris Jacobson Alexandra Korol Mark Ordonez Jinjia Xi Security of Cloud Computing
  • 2. Topic Overview  Introduction  Cloud Basics  Securing the Cloud  Leveraging the Cloud  Final Recommendations
  • 3. Introduction  Cloud Computing Industry is growing  According to Gartner, worldwide cloud services revenue is on pace to surpass $56.3 billion in 2009, a 21.3% increase from 2008 revenue of $46.4 billion, according to Gartner, Inc. The market is expected to reach $150.1 billion in 2013.  Businesses are increasing Cloud adoption  "We expect a great deal of migration towards cloud computing within the federal government in addition to the already robust private sector growth. The growth of the cloud should not outpace our ability to protect the data that goes into it..." ~ Former White House advisor Paul Kurtz, partner with Good Harbor Consulting, LLC  How can IT leaders ensure security in the
  • 4. Cloud Basics  Cloud Characteristics  Service Models  SaaS  IaaS  PaaS  Deployment Models  Public  Private  Community  Hybrid
  • 6. Cloud Service Models  Software as a Service (SaaS)  Platform as a Service (PaaS)  Infrastructure as a Service (IaaS)
  • 7. Natural Evolution of the Web Source: Lew Tucker, Introduction to Cloud Computing for Enterprise Users
  • 12. Securing the Cloud  Security Interaction Model  Top Security Threats  Cloud Provider Security Practices – Google Case Study
  • 14. Top Security Threats  Abuse and nefarious use of cloud computing  Insecure interfaces & API’s  Unknown risk profile  Malicious insiders  Shared technology issues  Data loss or leakage  Account or service hijacking
  • 15. Abuse and nefarious use of cloud computing  Stricter initial registration and validation processes.  Enhanced credit card fraud monitoring and coordination.  Comprehensive introspection of customer network traffic.  Monitoring public blacklists for one’s own network blocks. Insecure interfaces & API’s  Analyze the security model of cloud provider interfaces.  Ensure strong authentication and access controls are implemented in concert with encrypted transmission.  Understand the dependency chain associated with the API. Unknown risk profile  Disclosure of applicable logs and data. Partial/full disclosure of infrastructure details  Monitoring and alerting on necessary information. Threat Mitigation
  • 16. Malicious insiders  Enforce strict supply chain management and conduct a comprehensive supplier assessment.  Specify human resource requirements as part of legal contracts.  Require transparency into overall information security and management practices, as well as compliance reporting.  Determine security breach notification processes. Shared technology issues  Implement security best practices for installation and configuration.  Monitor environment for unauthorized changes/activity.  Promote strong authentication and access control for administrative access and operations.  Enforce service level agreements for patching and vulnerability remediation.  Conduct vulnerability scanning and configuration audits. Threat Mitigation
  • 17. Data loss or leakage  Implement strong API access control.  Encrypt and protect integrity of data in transit.  Analyze data protection at both design and run time.  Implement strong key generation, storage and management, and destruction practices.  Contractually demand providers wipe persistent media before it is released into the pool.  Contractually specify provider backup and retention strategies. Account or service hijacking  Prohibit the sharing of account credentials between users and services.  Leverage strong two-factor authentication techniques where possible.  Employ proactive monitoring to detect unauthorized activity.  Understand cloud provider security policies and SLAs. Threat Mitigation
  • 18. Google Security Practices  Organizational and Operational Security  Data Security  Threat Evasion  Safe Access  Privacy
  • 19. Google Organizational and Operational Security  Holistic approach to security  Security team  Develop with security in mind  Regularly performs security audits and threat assessments  Employees screened, trained  Works with security community and advisors
  • 20. Google Data Security  Google Code of Conduct – “Don’t be evil.”  Physical security  Logical Security  Accessibility  Redundancy
  • 21. Google Threat Evasion  Spam and virus protection built into products  Protects against application & network attacks
  • 22. Google Safe Access  Avoids local storage  Access controls  Encrypted connections  Integrated security
  • 23. Google Privacy  Privacy policy  Does not access confidential user data  Does not alter data  Maintain own IP rights  Indemnification, liability  End of use
  • 24. Leveraging the Cloud  Decision Making Process  Clan Wars Case Study
  • 25. Decision Making Process  Identify the asset for cloud deployment  Evaluate the asset requirements for confidentiality, integrity, and availability  Map the asset to potential cloud deployment models  Evaluate potential cloud service models and providers  Sketch the potential data flow  Draw conclusions
  • 26. Case Study: Clan Wars Company Profile Online multiplayer game In Browser Flash Processes credit card payments
  • 27. Case Study: Clan Wars Decision Making Process  Identified all components as candidates  Evaluation concluded:  Payment = High concern on all factors  Game & data = Medium on all factors  Primary components mapped:  Infrastructure (Servers, storage, etc)  Payment Processing  Collaboration
  • 28. Case Study: Clan Wars Data Flow
  • 29. Case Study: Clan Wars Conclusion Great fit Risk requirements met Data flow supports needs Added benefits Low cost (saving ~$500/month) Low maintenance Performance
  • 30. Final Recommendation No universal answer Evaluate your security needs versus the capabilities of the provider
  • 31. Q & A
  • 32. Supplemental Material  The sections that follow will not be covered during the presentation but are included for reference.
  • 33. Rackspace Security Practices  Physical Security  System Security  Operational Infrastructure Security  Client Application Security
  • 34. Cloud Consumer Best Practices Operational Domains • Traditional Security, Business Continuity, and Disaster Recovery • Data Center operations • Incident Management • Application security • Encryption & Key Mgmt • Identity & access Mgmt • Virtualization Governance Domains • Governance & Enterprise Risk Mgmt • Legal and Electronic Discovery • Compliance and Audit • Information Life Cycle Management • Portability and Interoperability

Notes de l'éditeur

  1. “Worldwide cloud services revenue is on pace to surpass $56.3 billion in 2009, a 21.3 percent increase from 2008 revenue of $46.4 billion, according to Gartner, Inc. The market is expected to reach $150.1 billion in 2013.” Business processes delivered as cloud services are the largest segment of the overall cloud services market, accounting for 83 percent of the overall market in 2008. The segment, consisting of cloud-based advertising, e-commerce, human resources and payments processing, is forecast to grow 19.8 percent in 2009 to $46.6 billion, up from $38.9 billion in 2008. While much of the publicity for cloud computing currently centers on systems infrastructure delivered as a service, this is still an early-stage market. In 2008, such services accounted for only 5.5 percent of the overall cloud services market and are expected to account for 6 percent of the market in 2009. Infrastructure services revenue was $2.5 billion in 2008 and is forecast to reach $3.2 billion in 2009.
  2. General Definition – Cloud computing is the delivery of hosting services that are provided to a client over the Internet. Cloud computing is different from traditional hosting because it is on demand, a user can specify how much of the service they want and the services are completely managed by the provider of the service. http://searchcloudcomputing.techtarget.com/sDefinition/0,,sid201_gci1287881,00.html On-Demand self-service – The client can allocate resources with no interaction with a person. Examples of this are network storage. Broad network access – Access to resources on the network can be accesses by many different platforms(Cell phone, laptops, etc) Resource pooling – The cloud provider pools computing resources to support many customers. Resources can be dynamically assigned based on customer demand. Also, customers do not know the exact location of resources, but generally know the region. Resources that are pooled can include but are not limited to storage, processing, network bandwidth. Private clouds also are able to pool resources between separate parts of the same organization. Rapid Elasticity – Resources can be scaled up or down quickly. This is opaque to the customer, since the customer sees unlimited resources available and has the ability to purchase any amount of resources in any quantity for any amount of time Measured Service – Service that consumers are using is tracked and metered. This allowed the cloud to “control and optimize” resources that are being leveraged by customers. Three implementations of cloud computing – Infrastructure as a service, Platform as a service and Software as a service, which will be discussed on the next slide. (15) CSA - Security Guidance for Critical Areas of Focus in Cloud Computing v2.1.pdf
  3. CSA, Security guidance for critical areas of focus in cloud computing There are so many different cloud deployment options. This is a popular service model. It is called SPI service models. SPI refers to Software as a Service, Platform as a Service, or Infrastructure as a Service, explained in depth in next slides Higher layers are built on lower layers. Higher abstractions include lower ones. IaaS: Customer rent fundamental computing resources from service providers (for example: processing, storage, networks and so on). And they are able to run their own operation system and applications. While they do not need manage and maintain hardware. Example: Amazon EC2 provides resizable compute capacity in the cloud. PaaS: Customers deploy applications onto the provider’s infrastructure. These applications are created using programming languages and tools supported by the providers. Beside the hardware, customers do not manage operation systems. Example: Google App Engine supports two application environments: Java and Python SaaS: Customers use the provider’s application which is accessible over the Internet. Customers only need control limited user-specific application configuration setting. Example: Salesforce.Com offers CRM application. Customers use the CRM system as web application.
  4. Natural Evolution of the Web How to set up new web sites traditionally? In general, there are three steps: buy compute and storage / hardware of servers, build developer platforms, create application => output is web sites How cloud has changed this process? With cold computing, company can easily take a shortcut to build website. Some of the potential benefits include cost savings and the built-in flexibility.
  5. Regardless of the service model utilized (SaaS, PaaS, or IaaS) there are four deployment models for cloud services that address specific requirements:   Public Cloud The cloud infrastructure is made available to any organizations. For example: company may build their datacenter with Amazon Simple Storage Service, a secure VPN connect storage service and enterprise intranet. (Both service providers and company are benefit from economies of scale.)
  6. Private Cloud If company has to keep lots of sensitive information in datacenter, public cloud maybe is not best approach. The private cloud is usually a pool of resource inside a company. But it may be managed by either the company or a third party. Private cloud offers the benefit and flexibility of cloud and does not scarify security.
  7. Community Cloud The cloud infrastructure is shared by several organizations and supports a specific community that has shared concerns (e.g., mission, security requirements, policy, or compliance considerations). The US Government and NASA created a community cloud for all US government agencies.
  8. Hybrid Cloud The cloud infrastructure is a combination of two or more clouds (private, community, or public) that remain unique entities. The different types of clouds are bound together by standardized or proprietary technology that enables data and application portability.
  9. Investigate provider security practices Identify gaps between provider and consumer security policies; address as appropriate.
  10. <TODO> Insert brief description of each type of threat
  11. <TODO> Insert example of one of these threats
  12. <TODO> Insert example of one of these threats
  13. <TODO> Insert example of one of these threats
  14. Google takes a holistic approach to security They design security into products, architecture, infrastructure, and systems from the beginning. Google employs a full time security team They develop, document, and implement comprehensive security policies. The team is divided into functional areas: Perimeter defense Infrastructure defense Application defense Vulnerability detection and response The team focuses its efforts on preventative measures, and they respond to other security issues as they arise. …
  15. Google Code of Conduct The corporate culture is security- and user-centric. Physical security Google has a large global network of distributed datacenters. Geographic location of datacenters chosen to provide protection against catastrophic events. Physical access to the datacenters is limited, tightly controlled, and audited. Logical security … Accessibility … Redundancy Multiple levels of redundancy are used to ensure reliability and availability. Google maintains mirrors within a data center, as well as between datacenters.
  16. Spam and virus protection … Application & network attacks …
  17. Avoids local storage … Access controls … Encrypted connections … Integrated security …
  18. Privacy policy … Does not access confidential user data … Does not alter data … Maintain own IP rights … Indemnification, liability … End of use …
  19. Identify the asset for cloud deployment Data Applications / Functions / Processes Evaluate the asset requirements for confidentiality, integrity, and availability. Sample questions to ask include: 1. How would we be harmed if the asset became widely public and widely distributed? 2. How would we be harmed if an employee of our cloud provider accessed the asset? 3. How would we be harmed if the process or function were manipulated by an outsider? 4. How would we be harmed if the process or function failed to provide expected results? 5. How would we be harmed if the information/data were unexpectedly changed? 6. How would we be harmed if the asset were unavailable for a period of time? Map the asset to potential cloud deployment models Public Private, internal Private, external Community Hybrid Evaluate potential cloud service models and providers Service models: SaaS, IaaS, PaaS Providers: Google, Amazon, Microsoft, Rackspace Sketch the potential data flow Map data flow between organization, cloud, and other entities (i.e.: customer, vendor, etc) Before making a decision, it is important to understand whether, and how, data can move in and out of the cloud Draw conclusions
  20. Since the game is multiplayer and browser based, there is a high risk for users attempting to modify the data stream. The concern grows when considering credit card data may be involved in the process.
  21. As the company was starting from scratch, all components were considered for cloud candidates. The evaluation showed that the payment system was the highest concern. If the game was hacked in any way, we would restore from backup (and process refunds if needed). The primary components were infrastructure, payment processing, and tools for collaborating internally (such as Google Apps, Dropbox, etc.)
  22. The user begins a session by browsing to the website where they will be directed to one of two web servers via DNS round-robin load balancing. Once the user initiates the game, the flash client (SWF files) are downloaded from the CDN and the flash client begins communicating with the Java application servers via an AMF gateway to the tomcat application server. Payments happen via the web tier and the payments are processed directly via Paypal through calls to their API, rather than by Clan War’s web servers. The general process is: Clan Wars tells PayPal “User X wants to make a payment to us for $Y” PayPal handles the transaction PayPal returns a succeed/fail code for the transaction Clan Wars approves the transaction and the customer receives the item they are paying for. At no step in the process does the credit card information reside on Clan War’s servers.
  23. Usage based billing primary benefit in cost Cost of servers ~$320/month Cost of CDN ~$100/month Cost of traditional servers ~$875/month ======== Maintenance benefits: Backup/snapshots Resize servers Clone servers Data Redundancy (RAID 0+1) No concerns about maintaining file regional file servers
  24. “Close the Gap”
  25. Physical Security Limited access to data centers Biometric Scanning and access card access to datacenter Visual Monitoring via security cameras Auditing by independent firm All employees have a background screening before getting hired System Security Systems run by secure OS that always has latest patches Firewall and VPN access User can get an optional IDS Operational Security Employee training on data and privacy policies All systems are audited and logged, when someone accesses the system Follows ISO17799 security policies and procedures Application Security Passwords are stored encrypted and transmitted encrypted Random initial passwords