SlideShare une entreprise Scribd logo
1  sur  12
Can Data be Safe in Public Clouds, in Compliance with Standards? Gilad Parann-Nissany http://www.porticor.comcontact@porticor.com CloudCon, March 30th, 2011 3/29/2011 www.porticor.com           © PORTICOR 2009, 2010
3/29/2011 www.porticor.com           © PORTICOR 2009, 2010 2 The Cloud Security Scales Lets talk about solutions Scare Stories? Or real issues?
Shared Technology Vulnerabilities  Data Loss/Data Leakage Malicious Insiders  Account Service or Hijacking of Traffic Insecure APIs  Nefarious Use of Service  Unknown Risk Profile 3/29/2011 www.porticor.com           © PORTICOR 2009, 2010 3 Threat Analysis: I/PaaS PaaS Platform as a Service IaaS Infrastructure as a Service (*) courtesy “Cloud Security Alliance: Assuring the future of Cloud Computing”: S. Loureiro, 2010
3/29/2011 www.porticor.com           © PORTICOR 2009, 2010 4 Typical Provider Customer Agreement 7.2. Security. We strive to keep Your Content secure, but cannot guarantee that we will be successful at doing so, given the nature of the Internet. Accordingly, without limitation to Section 4.3 above and Section 11.5 below, you acknowledge that you bear sole responsibility for adequate security, protection and backup of Your Content and Applications. We strongly encourage you, where available and appropriate, to (a) use encryption technology to protect Your Content from unauthorized access, (b) routinely archive Your Content, and (c) keep your Applications or any software that you use or run with our Services current with the latest security patches or updates. We will have no liability to you for any unauthorized access or use, corruption, deletion, destruction or loss of any of Your Content or Applications. Makes sense? Yes! But means you have to do some things…
Strong investment in security of the infrastructure Compliance with standards SAS70 ISO 27K PCI Enabling (key word!) customers to be compliant 3/29/2011 www.porticor.com           © PORTICOR 2009, 2010 5 Provider responsibilitiesWhat can you expect?
Detailed advice from White Papers, Industry bodies and the community Emphasis on your responsibility for Security of whatever you install on the Cloud infrastructure Identities and their management Encryption and management of data Significant implementation Ability to achieve certification with standards (PCI, HIPAA, …) 3/29/2011 www.porticor.com           © PORTICOR 2009, 2010 6 Customer responsibilitiesWhat can you expect?
Combining the security of the Cloud Infrastructure with your own responsibilities How? And… … What has really changed? What’s new, what carries over from the “old world”? 3/29/2011 www.porticor.com           © PORTICOR 2009, 2010 7 Cloud SecurityMaking it all happen
Some known concepts translate to cloud with a twist APIs SaaS security Usage of IaaS And of course, there is some pretty new stuff More about this later… 3/29/2011 Copyright 2009, 2010 ©Porticor What’s new? What carries over?
3/29/2011 Copyright 2009, 2010 ©Porticor Translating known concepts to cloud Examples …and more
Secure distributed data storage Keys management Hypervisors and virtual machines Role of encryption changes New data protection measures emerge (i.e. fragmentation) Physical security of cloud environments 3/29/2011 www.porticor.com           © PORTICOR 2009, 2010 10 Some new considerations
Package complex privacy and security technology  Get the operations and economics right Pay as you go Privacy and security solutions can be brought up in a reasonable time – not months Privacy and security have proper service level guarantees Backed by proper SLA and/or Warranty 3/29/2011 www.porticor.com           © PORTICOR 2009, 2010 11 Elasticity, Flexibility, Management
3/29/2011 ©Porticor Thank You! Questions ?

Contenu connexe

Tendances

Towards Better Patient Outcomes and Staying Well: The Promise of Cloud Comput...
Towards Better Patient Outcomes and Staying Well: The Promise of Cloud Comput...Towards Better Patient Outcomes and Staying Well: The Promise of Cloud Comput...
Towards Better Patient Outcomes and Staying Well: The Promise of Cloud Comput...
accacloud
 
Asia's Financial Services on the Cloud 2018: Regulatory Landscape Impacting t...
Asia's Financial Services on the Cloud 2018: Regulatory Landscape Impacting t...Asia's Financial Services on the Cloud 2018: Regulatory Landscape Impacting t...
Asia's Financial Services on the Cloud 2018: Regulatory Landscape Impacting t...
accacloud
 

Tendances (20)

2011-2012 Cloud Assessment Tool (CAT) White Paper
2011-2012 Cloud Assessment Tool (CAT) White Paper2011-2012 Cloud Assessment Tool (CAT) White Paper
2011-2012 Cloud Assessment Tool (CAT) White Paper
 
Towards Better Patient Outcomes and Staying Well: The Promise of Cloud Comput...
Towards Better Patient Outcomes and Staying Well: The Promise of Cloud Comput...Towards Better Patient Outcomes and Staying Well: The Promise of Cloud Comput...
Towards Better Patient Outcomes and Staying Well: The Promise of Cloud Comput...
 
2011 ACCA Cloud Readiness Index
2011 ACCA Cloud Readiness Index2011 ACCA Cloud Readiness Index
2011 ACCA Cloud Readiness Index
 
2015 How important is Cloud Computing for building Crowd Networks? Crowdsourc...
2015 How important is Cloud Computing for building Crowd Networks? Crowdsourc...2015 How important is Cloud Computing for building Crowd Networks? Crowdsourc...
2015 How important is Cloud Computing for building Crowd Networks? Crowdsourc...
 
Asia's Financial Services on the Cloud 2018: Regulatory Landscape Impacting t...
Asia's Financial Services on the Cloud 2018: Regulatory Landscape Impacting t...Asia's Financial Services on the Cloud 2018: Regulatory Landscape Impacting t...
Asia's Financial Services on the Cloud 2018: Regulatory Landscape Impacting t...
 
26 Nov 2013 - Law and Policy Meet the Cloud, by Bernie Trudel [IIC-TRPC Singa...
26 Nov 2013 - Law and Policy Meet the Cloud, by Bernie Trudel [IIC-TRPC Singa...26 Nov 2013 - Law and Policy Meet the Cloud, by Bernie Trudel [IIC-TRPC Singa...
26 Nov 2013 - Law and Policy Meet the Cloud, by Bernie Trudel [IIC-TRPC Singa...
 
28 Feb 2012 - Asia Opportunity, by Mark Ross [Questex Asia, Hong Kong]
28 Feb 2012 - Asia Opportunity, by Mark Ross [Questex Asia, Hong Kong]28 Feb 2012 - Asia Opportunity, by Mark Ross [Questex Asia, Hong Kong]
28 Feb 2012 - Asia Opportunity, by Mark Ross [Questex Asia, Hong Kong]
 
2018 Cross-Border Data Flows: A Review of the Regulatory Enablers, Blockers, ...
2018 Cross-Border Data Flows: A Review of the Regulatory Enablers, Blockers, ...2018 Cross-Border Data Flows: A Review of the Regulatory Enablers, Blockers, ...
2018 Cross-Border Data Flows: A Review of the Regulatory Enablers, Blockers, ...
 
The Impact of Data Sovereignty on Cloud Computing in Asia 2013 by the Asia Cl...
The Impact of Data Sovereignty on Cloud Computing in Asia 2013 by the Asia Cl...The Impact of Data Sovereignty on Cloud Computing in Asia 2013 by the Asia Cl...
The Impact of Data Sovereignty on Cloud Computing in Asia 2013 by the Asia Cl...
 
Asia Cloud Computing Association’s (ACCA) Response to India’s Draft Health Da...
Asia Cloud Computing Association’s (ACCA) Response to India’s Draft Health Da...Asia Cloud Computing Association’s (ACCA) Response to India’s Draft Health Da...
Asia Cloud Computing Association’s (ACCA) Response to India’s Draft Health Da...
 
Regulating for a Digital Economy: Understanding the Importance of Cross-Borde...
Regulating for a Digital Economy: Understanding the Importance of Cross-Borde...Regulating for a Digital Economy: Understanding the Importance of Cross-Borde...
Regulating for a Digital Economy: Understanding the Importance of Cross-Borde...
 
2015 Asia's Financial Services: Ready for the Cloud - A Report on FSI Regulat...
2015 Asia's Financial Services: Ready for the Cloud - A Report on FSI Regulat...2015 Asia's Financial Services: Ready for the Cloud - A Report on FSI Regulat...
2015 Asia's Financial Services: Ready for the Cloud - A Report on FSI Regulat...
 
Cloud Readiness Index 2016 by the Asia Cloud Computing Association
Cloud Readiness Index 2016 by the Asia Cloud Computing AssociationCloud Readiness Index 2016 by the Asia Cloud Computing Association
Cloud Readiness Index 2016 by the Asia Cloud Computing Association
 
SMEs in Asia Pacific: The Market for Cloud Computing - Case Studies of 14 mar...
SMEs in Asia Pacific: The Market for Cloud Computing - Case Studies of 14 mar...SMEs in Asia Pacific: The Market for Cloud Computing - Case Studies of 14 mar...
SMEs in Asia Pacific: The Market for Cloud Computing - Case Studies of 14 mar...
 
Report on Cloud Data Regulations 2014: A contribution on how to reduce the co...
Report on Cloud Data Regulations 2014: A contribution on how to reduce the co...Report on Cloud Data Regulations 2014: A contribution on how to reduce the co...
Report on Cloud Data Regulations 2014: A contribution on how to reduce the co...
 
Asia Cloud Computing Association’s (ACCA) Response to the Merchant Acquiring ...
Asia Cloud Computing Association’s (ACCA) Response to the Merchant Acquiring ...Asia Cloud Computing Association’s (ACCA) Response to the Merchant Acquiring ...
Asia Cloud Computing Association’s (ACCA) Response to the Merchant Acquiring ...
 
Cybersecurity at a premium: The state of cyber resilience in insurance
Cybersecurity at a premium: The state of cyber resilience in insuranceCybersecurity at a premium: The state of cyber resilience in insurance
Cybersecurity at a premium: The state of cyber resilience in insurance
 
The ASEAN Data Protection Index 2020
The ASEAN Data Protection Index 2020The ASEAN Data Protection Index 2020
The ASEAN Data Protection Index 2020
 
The Global Interconnection Index - Measuring Growth of the Digital Economy
The Global Interconnection Index - Measuring Growth of the Digital EconomyThe Global Interconnection Index - Measuring Growth of the Digital Economy
The Global Interconnection Index - Measuring Growth of the Digital Economy
 
Cloud Readiness Index 2012 by the Asia Cloud Computing Association
Cloud Readiness Index 2012 by the Asia Cloud Computing AssociationCloud Readiness Index 2012 by the Asia Cloud Computing Association
Cloud Readiness Index 2012 by the Asia Cloud Computing Association
 

En vedette

Wine.Its Role In Medicine And Health.
Wine.Its Role In Medicine And Health.Wine.Its Role In Medicine And Health.
Wine.Its Role In Medicine And Health.
FRIZZT1
 
20100925 cloudy security - porticor
20100925 cloudy security - porticor20100925 cloudy security - porticor
20100925 cloudy security - porticor
giladpn
 
20100602 porticor at igt short
20100602 porticor at igt   short20100602 porticor at igt   short
20100602 porticor at igt short
giladpn
 
Slideshare Project
Slideshare ProjectSlideshare Project
Slideshare Project
suzrocky
 
Calendario Reinscripciones 5 To. Semestre
Calendario Reinscripciones 5 To. SemestreCalendario Reinscripciones 5 To. Semestre
Calendario Reinscripciones 5 To. Semestre
679
 
I N V E N T O S D E L S I G L O X X
I N V E N T O S  D E L  S I G L O  X XI N V E N T O S  D E L  S I G L O  X X
I N V E N T O S D E L S I G L O X X
x
 

En vedette (19)

Public space dan open space
Public space dan open spacePublic space dan open space
Public space dan open space
 
Wine.Its Role In Medicine And Health.
Wine.Its Role In Medicine And Health.Wine.Its Role In Medicine And Health.
Wine.Its Role In Medicine And Health.
 
Responsiblity To Act Writing Benchmark
Responsiblity To Act Writing BenchmarkResponsiblity To Act Writing Benchmark
Responsiblity To Act Writing Benchmark
 
20100925 cloudy security - porticor
20100925 cloudy security - porticor20100925 cloudy security - porticor
20100925 cloudy security - porticor
 
Community needs assessment.pla_2014.handout
Community needs assessment.pla_2014.handoutCommunity needs assessment.pla_2014.handout
Community needs assessment.pla_2014.handout
 
Pharmaceutical Dossiers
Pharmaceutical DossiersPharmaceutical Dossiers
Pharmaceutical Dossiers
 
20100602 porticor at igt short
20100602 porticor at igt   short20100602 porticor at igt   short
20100602 porticor at igt short
 
The place of Public Access TV today
The place of Public Access TV todayThe place of Public Access TV today
The place of Public Access TV today
 
Motivacion claudio jerez
Motivacion claudio jerezMotivacion claudio jerez
Motivacion claudio jerez
 
Job Searching 101 Sharpening Your Interview Skills
Job Searching 101 Sharpening Your Interview SkillsJob Searching 101 Sharpening Your Interview Skills
Job Searching 101 Sharpening Your Interview Skills
 
Stuffed Animal Sleepover
Stuffed Animal SleepoverStuffed Animal Sleepover
Stuffed Animal Sleepover
 
Stuffed animals 2010
Stuffed animals 2010Stuffed animals 2010
Stuffed animals 2010
 
Big Talk from Small Libraries 2015
Big Talk from Small Libraries 2015Big Talk from Small Libraries 2015
Big Talk from Small Libraries 2015
 
Job Searching 101 Skills Employers Look For
Job Searching 101 Skills Employers Look ForJob Searching 101 Skills Employers Look For
Job Searching 101 Skills Employers Look For
 
Melting Pot or Salad Bowl
Melting Pot or Salad BowlMelting Pot or Salad Bowl
Melting Pot or Salad Bowl
 
Public place ppt
Public place pptPublic place ppt
Public place ppt
 
Slideshare Project
Slideshare ProjectSlideshare Project
Slideshare Project
 
Calendario Reinscripciones 5 To. Semestre
Calendario Reinscripciones 5 To. SemestreCalendario Reinscripciones 5 To. Semestre
Calendario Reinscripciones 5 To. Semestre
 
I N V E N T O S D E L S I G L O X X
I N V E N T O S  D E L  S I G L O  X XI N V E N T O S  D E L  S I G L O  X X
I N V E N T O S D E L S I G L O X X
 

Similaire à Porticor - Can Data be safe in Public Clouds, in Compliance with Standards

Achieving Data Dissemination with Security using FIWARE and Intel Software Gu...
Achieving Data Dissemination with Security using FIWARE and Intel Software Gu...Achieving Data Dissemination with Security using FIWARE and Intel Software Gu...
Achieving Data Dissemination with Security using FIWARE and Intel Software Gu...
Dalton Valadares
 
How Secure Is Cloud
How Secure Is CloudHow Secure Is Cloud
How Secure Is Cloud
William Lam
 
Csa about-threats-june-2010-ibm
Csa about-threats-june-2010-ibmCsa about-threats-june-2010-ibm
Csa about-threats-june-2010-ibm
Sergio Loureiro
 

Similaire à Porticor - Can Data be safe in Public Clouds, in Compliance with Standards (20)

Presentation cloud security the grand challenge
Presentation   cloud security the grand challengePresentation   cloud security the grand challenge
Presentation cloud security the grand challenge
 
B018211016
B018211016B018211016
B018211016
 
Achieving Data Dissemination with Security using FIWARE and Intel Software Gu...
Achieving Data Dissemination with Security using FIWARE and Intel Software Gu...Achieving Data Dissemination with Security using FIWARE and Intel Software Gu...
Achieving Data Dissemination with Security using FIWARE and Intel Software Gu...
 
Cloud Computing Security Issues and Challenges
Cloud Computing Security Issues and ChallengesCloud Computing Security Issues and Challenges
Cloud Computing Security Issues and Challenges
 
INFORMATION SECURITY IN CLOUD COMPUTING
INFORMATION SECURITY IN CLOUD COMPUTINGINFORMATION SECURITY IN CLOUD COMPUTING
INFORMATION SECURITY IN CLOUD COMPUTING
 
Security in Cloud Computing
Security in Cloud ComputingSecurity in Cloud Computing
Security in Cloud Computing
 
Cloud computing security issues and challenges
Cloud computing security issues and challengesCloud computing security issues and challenges
Cloud computing security issues and challenges
 
Cloud Encryption Gateways (how enterprises can leverage cloud SaaS without co...
Cloud Encryption Gateways (how enterprises can leverage cloud SaaS without co...Cloud Encryption Gateways (how enterprises can leverage cloud SaaS without co...
Cloud Encryption Gateways (how enterprises can leverage cloud SaaS without co...
 
Cloud Security - Types, Common Threats & Tips To Mitigate.pdf
Cloud Security - Types, Common Threats & Tips To Mitigate.pdfCloud Security - Types, Common Threats & Tips To Mitigate.pdf
Cloud Security - Types, Common Threats & Tips To Mitigate.pdf
 
Slides 530 a2
Slides 530 a2Slides 530 a2
Slides 530 a2
 
How Secure Is Cloud
How Secure Is CloudHow Secure Is Cloud
How Secure Is Cloud
 
Cisco Fog Computing Solutions: Unleash the Power of the Internet of Things
Cisco Fog Computing Solutions: Unleash the Power of the Internet of ThingsCisco Fog Computing Solutions: Unleash the Power of the Internet of Things
Cisco Fog Computing Solutions: Unleash the Power of the Internet of Things
 
Computing solutions
Computing solutionsComputing solutions
Computing solutions
 
DDS - The Proven Data Connectivity Standard for the Industrial IoT (IIoT)
DDS - The Proven Data Connectivity Standard for the Industrial IoT (IIoT)DDS - The Proven Data Connectivity Standard for the Industrial IoT (IIoT)
DDS - The Proven Data Connectivity Standard for the Industrial IoT (IIoT)
 
Industrial IOT Data Connectivity Standard
Industrial IOT Data Connectivity StandardIndustrial IOT Data Connectivity Standard
Industrial IOT Data Connectivity Standard
 
10 security concerns cloud computing
10 security concerns cloud computing10 security concerns cloud computing
10 security concerns cloud computing
 
No More Dark Clouds: A Privacy Preserving Framework for the Cloud
No More Dark Clouds: A Privacy Preserving Framework for the CloudNo More Dark Clouds: A Privacy Preserving Framework for the Cloud
No More Dark Clouds: A Privacy Preserving Framework for the Cloud
 
Presentation cisco cloud security
Presentation   cisco cloud securityPresentation   cisco cloud security
Presentation cisco cloud security
 
Csa about-threats-june-2010-ibm
Csa about-threats-june-2010-ibmCsa about-threats-june-2010-ibm
Csa about-threats-june-2010-ibm
 
Ad4502189193
Ad4502189193Ad4502189193
Ad4502189193
 

Porticor - Can Data be safe in Public Clouds, in Compliance with Standards

  • 1. Can Data be Safe in Public Clouds, in Compliance with Standards? Gilad Parann-Nissany http://www.porticor.comcontact@porticor.com CloudCon, March 30th, 2011 3/29/2011 www.porticor.com © PORTICOR 2009, 2010
  • 2. 3/29/2011 www.porticor.com © PORTICOR 2009, 2010 2 The Cloud Security Scales Lets talk about solutions Scare Stories? Or real issues?
  • 3. Shared Technology Vulnerabilities Data Loss/Data Leakage Malicious Insiders Account Service or Hijacking of Traffic Insecure APIs Nefarious Use of Service Unknown Risk Profile 3/29/2011 www.porticor.com © PORTICOR 2009, 2010 3 Threat Analysis: I/PaaS PaaS Platform as a Service IaaS Infrastructure as a Service (*) courtesy “Cloud Security Alliance: Assuring the future of Cloud Computing”: S. Loureiro, 2010
  • 4. 3/29/2011 www.porticor.com © PORTICOR 2009, 2010 4 Typical Provider Customer Agreement 7.2. Security. We strive to keep Your Content secure, but cannot guarantee that we will be successful at doing so, given the nature of the Internet. Accordingly, without limitation to Section 4.3 above and Section 11.5 below, you acknowledge that you bear sole responsibility for adequate security, protection and backup of Your Content and Applications. We strongly encourage you, where available and appropriate, to (a) use encryption technology to protect Your Content from unauthorized access, (b) routinely archive Your Content, and (c) keep your Applications or any software that you use or run with our Services current with the latest security patches or updates. We will have no liability to you for any unauthorized access or use, corruption, deletion, destruction or loss of any of Your Content or Applications. Makes sense? Yes! But means you have to do some things…
  • 5. Strong investment in security of the infrastructure Compliance with standards SAS70 ISO 27K PCI Enabling (key word!) customers to be compliant 3/29/2011 www.porticor.com © PORTICOR 2009, 2010 5 Provider responsibilitiesWhat can you expect?
  • 6. Detailed advice from White Papers, Industry bodies and the community Emphasis on your responsibility for Security of whatever you install on the Cloud infrastructure Identities and their management Encryption and management of data Significant implementation Ability to achieve certification with standards (PCI, HIPAA, …) 3/29/2011 www.porticor.com © PORTICOR 2009, 2010 6 Customer responsibilitiesWhat can you expect?
  • 7. Combining the security of the Cloud Infrastructure with your own responsibilities How? And… … What has really changed? What’s new, what carries over from the “old world”? 3/29/2011 www.porticor.com © PORTICOR 2009, 2010 7 Cloud SecurityMaking it all happen
  • 8. Some known concepts translate to cloud with a twist APIs SaaS security Usage of IaaS And of course, there is some pretty new stuff More about this later… 3/29/2011 Copyright 2009, 2010 ©Porticor What’s new? What carries over?
  • 9. 3/29/2011 Copyright 2009, 2010 ©Porticor Translating known concepts to cloud Examples …and more
  • 10. Secure distributed data storage Keys management Hypervisors and virtual machines Role of encryption changes New data protection measures emerge (i.e. fragmentation) Physical security of cloud environments 3/29/2011 www.porticor.com © PORTICOR 2009, 2010 10 Some new considerations
  • 11. Package complex privacy and security technology Get the operations and economics right Pay as you go Privacy and security solutions can be brought up in a reasonable time – not months Privacy and security have proper service level guarantees Backed by proper SLA and/or Warranty 3/29/2011 www.porticor.com © PORTICOR 2009, 2010 11 Elasticity, Flexibility, Management
  • 12. 3/29/2011 ©Porticor Thank You! Questions ?