SlideShare une entreprise Scribd logo
1  sur  25
RAHUL GURNANI
CDAC Certified Cyber Security Professional
MS Cyber Law & Information Security,
Indian Institute of Information Technology - Allahabad
agenda
• Virtualization - brief overview
• Essential Features of a cloud environment
• Cloud Service Models
• Cloud Deployment Models
• Benefits of Cloud
• Security Concerns in different Cloud
environments
• Mapping the traditional IT security
requirements to Cloud environment
• Two viewpoints on Cloud Security
VIRTUALIZATION
• A cloud comprises of virtual machines hosted on a remote or local server
which are accessed and used on as and when needed basis.
• The virtual machines can be defined to have any configuration that a real
world machine would have, just the host machine should be able to support
it. Even servers can be hosted easily on a cloud.
• Just imagine if you are able to host your server in a virtual environment,
how much cost, space and business overheads would you save if your servers
are hosted on a cloud !
Essential Features of a cloud 
1.On- Demand Self Service
2.Broad network access
3.Resource Pooling
4.Rapid Elasticity
5.Measured Service
On-demand self-service.
A customer using cloud services should be able to provision
computing capabilities such as server time and network
storage himself as and when required without requiring
human interaction with the service provider.
Broad network access.
The cloud services should be available over the network and
accessible thorugh standard devices such as laptops,
smartphones and tablet computers
Resource pooling. (& Location Independence)
The service provider’s computing resources are pooled to
serve multiple consumers using a multi-tenant model, with
different physical and virtual resources dynamically assigned
and reassigned according to consumer demand.
Rapid elasticity.
• Capabilities can be elastically provisioned and released, in
some cases automatically, to scale rapidly outward and
inward commensurate with demand.
• To the consumer, the capabilities available for provisioning
often appear to be unlimited and can be appropriated in
any quantity at any time.
Measured service.
• Cloud systems automatically control and optimize resource
use by leveraging a metering capability at some level of
abstraction appropriate to the type of service (e.g.,
storage, processing, bandwidth, and active user accounts).
• Resource usage can be monitored, controlled, and
reported, providing transparency for both the provider and
consumer of the utilized service.
Cloud Services
1.Software as a Service (SaaS).
2.Platform as a Service (PaaS).
3.Infrastructure as a Service (IaaS).
4.Business Process as a Service
(BPAAS)
Software as a Service (SaaS).
• The capability provided to the consumer is to use the
provider’s applications running on a cloud infrastructure.
• The applications are accessible from various client devices
through either a thin client interface, such as a web
browser (e.g., web-based email), or a program interface.
• The consumer does not manage or control the underlying
cloud infrastructure including network, servers, operating
systems, storage, or even individual application
capabilities, with the possible exception of limited user-
specific application configuration settings.
Platform as a Service (PaaS).
• The capability provided to the consumer is to deploy onto
the cloud infrastructure consumer-created or acquired
applications created using programming languages,
libraries, services, and tools supported by the provider.
• The consumer does not manage or control the underlying
cloud infrastructure including network, servers, operating
systems, or storage, but has control over the deployed
applications and possibly configuration settings for the
application-hosting environment.
Infrastructure as a Service (IaaS)
• The capability provided to the consumer is to
provision processing, storage, networks, and
other fundamental computing resources.
• The consumer is able to deploy and run arbitrary
software, which can include operating systems
and applications.
• The consumer does not manage or control the
underlying cloud infrastructure but has control
over operating systems, storage, and deployed
applications; and possibly limited control of
select networking components (e.g., host
firewalls).
Business Process as a Service (BPAAS).
• It is a form of business process outsourcing (BPO)
that employs a cloud computing service model.
• Whereas the aim of traditional BPO is to reduce
labor costs, BPaaS reduces labor count through
increased automation, thereby cutting costs in the
process.
• It adheres to cloud computing's traditional
monthly pricing schedule.
• Types of outsourcing services offered via the
BPaaS model include HR functions such as payroll
and benefits administration, procurement,
advertising, marketing and industry operation
processes.
• Private cloud
• Public cloud
• Hybrid cloud
• Community cloud
Deployment Models
Private cloud
• The cloud infrastructure is set up for exclusive use by an individual
organization which may have multiple consumers.
• It may be owned, managed, and operated by the organization itself or a
third party.
• It may be set up in the organizations premises or a remote location.
Community cloud
• It is for exclusive use by a specific community of consumers from
organizations that have shared concerns (e.g., mission, security
requirements, policy, and compliance considerations).
• It may be owned, managed, and operated by one or more of the
organizations in the community, a third party, or some combination of
them, and it may exist on or off premises.
Public cloud
• It is set up for open use by the general public.
• It may be owned, managed, and operated by a
business, academic, or government organization, or
some combination of them. It exists on the premises of
the cloud provider.
Hybrid cloud
• The cloud infrastructure is a composition of two or
more distinct cloud infrastructures (private,
community, or public) that remain unique entities,
• but are bound together by standardized or proprietary
technology that enables data and application
portability (e.g., cloud bursting for load balancing
between clouds).
• Reducing capital Expenditure on IT
• Having a predictable Operations Expenditure
• Letting the organization focus on its core
competency
Security Concerns
TOP CONCERN IN
ADOPTION OF
CLOUD
Physical controls
get replaced by
virtual controls
In a cloud environment, access expands,
control shifts, and the speed of
provisioning resources and applications
increases - greatly affecting all aspects
of IT security.
Cloud computing tests the limits
of security operations and
infrastructure.
Integrated service
management, automation,
provisioning, self service
Key security focus:
Infrastructure and Identity
Manage datacenter
identities
Secure virtual machines
Patch default images
Monitor logs on all
resources
Network isolation
Cloud Enabled Data Center
Infrastructure as a Service
(IaaS): Cut IT expense and
complexity through cloud data
centers
Platform-as-a-Service (PaaS):
Accelerate time to market with
cloud platform services
Pre-built, pre-integrated IT
infrastructures tuned to
application-specific needs
Key security focus:
Applications and Data
Secure shared databases
Encrypt private information
Build secure applications
Keep an audit trail
Integrate existing security
Cloud Platform Services
Advanced platform for
creating, managing, and
monetizing cloud services
Key security focus:
Data and Compliance
Isolate cloud tenants
Policy and regulations
Manage security operations
Build compliant data
centers
Offer backup and resiliency
Cloud Service Provider
Innovate
business models by becoming a
cloud service provider
Software as a Service (SaaS):
Gain immediate
access with business solutions
on cloud
Capabilities provided to
consumers for using a
provider’s applications
Key security focus:
Compliance and
Governance
Harden exposed applications
Securely federate identity
Deploy access controls
Encrypt communications
Manage application policies
Business Solutions on Cloud
People and Identity
Application and Process
Network, Server and Endpoint
Data and Information
Physical Infrastructure
Governance, Risk and Compliance
Security and Privacy Domains
Multiple Logins, Onboarding Issues
Multi-tenancy, Data Separation
Audit Silos, Compliance Controls
Provider Controlled, Lack of Visibility
Virtualization, Network Isolation
External Facing, Quick Provisioning
CLOUD
Self-Service
Highly Virtualized
Location Independence
Workload Automation
Rapid Elasticity
Standardization
How security and privacy domains get related to cloud
environments ?
Two viewpoints for cloud security
Security from the cloud
...cloud is used to deliver security as-a-service - focusing
on services such as vulnerability scanning, web and email
security, etc.
Security for the cloud
..focus is on secure usage of Cloud applications – like by
ensuring Audit, Access and Secure Connectivity.
There are various business solutions
available from different vendors
supporting both the models.
Essential Cloud Security Concepts
Essential Cloud Security Concepts

Contenu connexe

Tendances

Lessons learnt building a Distributed Linked List on S3
Lessons learnt building a Distributed Linked List on S3Lessons learnt building a Distributed Linked List on S3
Lessons learnt building a Distributed Linked List on S3AWS User Group Bengaluru
 
Security threats in cloud computing
Security threats  in cloud computingSecurity threats  in cloud computing
Security threats in cloud computingPuneet Arora
 
Chap 4 platform as a service (paa s)
Chap 4 platform as a service (paa s)Chap 4 platform as a service (paa s)
Chap 4 platform as a service (paa s)Raj Sarode
 
Cloud computing & dbms
Cloud computing & dbmsCloud computing & dbms
Cloud computing & dbmsZaid Shabbir
 
security Issues of cloud computing
security Issues of cloud computingsecurity Issues of cloud computing
security Issues of cloud computingprachupanchal
 
Security threat issues and countermeasures in cloud computing
Security threat issues and countermeasures in cloud computingSecurity threat issues and countermeasures in cloud computing
Security threat issues and countermeasures in cloud computingJahangeer Qadiree
 
Cloud Computing Security
Cloud Computing SecurityCloud Computing Security
Cloud Computing SecurityNithin Raj
 
Security in the cloud Workshop HSTC 2014
Security in the cloud Workshop HSTC 2014Security in the cloud Workshop HSTC 2014
Security in the cloud Workshop HSTC 2014Akash Mahajan
 
Third party cloud services cloud computing
Third party cloud services cloud computingThird party cloud services cloud computing
Third party cloud services cloud computingSohailAliMalik
 
Security challenges of cloud computing
Security challenges of cloud computingSecurity challenges of cloud computing
Security challenges of cloud computingMd. Hasibur Rashid
 
Secure cloud storage privacy preserving public auditing for data storage secu...
Secure cloud storage privacy preserving public auditing for data storage secu...Secure cloud storage privacy preserving public auditing for data storage secu...
Secure cloud storage privacy preserving public auditing for data storage secu...rajender147
 
Top 5 Cloud Security Threats in Healthcare
Top 5 Cloud Security Threats in HealthcareTop 5 Cloud Security Threats in Healthcare
Top 5 Cloud Security Threats in HealthcareBitglass
 
Cloud Computing Security Organization Assessments Service Categories Responsi...
Cloud Computing Security Organization Assessments Service Categories Responsi...Cloud Computing Security Organization Assessments Service Categories Responsi...
Cloud Computing Security Organization Assessments Service Categories Responsi...SlideTeam
 
Cloud Computing Training
Cloud Computing TrainingCloud Computing Training
Cloud Computing TrainingAlisha Tope
 
Know Your Attacker - Core Security
Know Your Attacker - Core SecurityKnow Your Attacker - Core Security
Know Your Attacker - Core SecurityCore Security
 
Data protection in cloud computing - Data Protection Conference 2011
Data protection in cloud computing - Data Protection Conference 2011Data protection in cloud computing - Data Protection Conference 2011
Data protection in cloud computing - Data Protection Conference 2011Cloud Legal Project
 

Tendances (20)

Lessons learnt building a Distributed Linked List on S3
Lessons learnt building a Distributed Linked List on S3Lessons learnt building a Distributed Linked List on S3
Lessons learnt building a Distributed Linked List on S3
 
Security threats in cloud computing
Security threats  in cloud computingSecurity threats  in cloud computing
Security threats in cloud computing
 
AWS Cloud | Public Cloud | Private Cloud | Google Cloud Hosting
AWS Cloud | Public Cloud | Private Cloud | Google Cloud Hosting AWS Cloud | Public Cloud | Private Cloud | Google Cloud Hosting
AWS Cloud | Public Cloud | Private Cloud | Google Cloud Hosting
 
Chap 4 platform as a service (paa s)
Chap 4 platform as a service (paa s)Chap 4 platform as a service (paa s)
Chap 4 platform as a service (paa s)
 
Cloud computing & dbms
Cloud computing & dbmsCloud computing & dbms
Cloud computing & dbms
 
security Issues of cloud computing
security Issues of cloud computingsecurity Issues of cloud computing
security Issues of cloud computing
 
Security threat issues and countermeasures in cloud computing
Security threat issues and countermeasures in cloud computingSecurity threat issues and countermeasures in cloud computing
Security threat issues and countermeasures in cloud computing
 
G0314043
G0314043G0314043
G0314043
 
Cloud Computing Security
Cloud Computing SecurityCloud Computing Security
Cloud Computing Security
 
Security in the cloud Workshop HSTC 2014
Security in the cloud Workshop HSTC 2014Security in the cloud Workshop HSTC 2014
Security in the cloud Workshop HSTC 2014
 
Third party cloud services cloud computing
Third party cloud services cloud computingThird party cloud services cloud computing
Third party cloud services cloud computing
 
Security challenges of cloud computing
Security challenges of cloud computingSecurity challenges of cloud computing
Security challenges of cloud computing
 
cloud computing
 cloud computing cloud computing
cloud computing
 
Secure cloud storage privacy preserving public auditing for data storage secu...
Secure cloud storage privacy preserving public auditing for data storage secu...Secure cloud storage privacy preserving public auditing for data storage secu...
Secure cloud storage privacy preserving public auditing for data storage secu...
 
Top 5 Cloud Security Threats in Healthcare
Top 5 Cloud Security Threats in HealthcareTop 5 Cloud Security Threats in Healthcare
Top 5 Cloud Security Threats in Healthcare
 
Cloud Computing Security Organization Assessments Service Categories Responsi...
Cloud Computing Security Organization Assessments Service Categories Responsi...Cloud Computing Security Organization Assessments Service Categories Responsi...
Cloud Computing Security Organization Assessments Service Categories Responsi...
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
 
Cloud Computing Training
Cloud Computing TrainingCloud Computing Training
Cloud Computing Training
 
Know Your Attacker - Core Security
Know Your Attacker - Core SecurityKnow Your Attacker - Core Security
Know Your Attacker - Core Security
 
Data protection in cloud computing - Data Protection Conference 2011
Data protection in cloud computing - Data Protection Conference 2011Data protection in cloud computing - Data Protection Conference 2011
Data protection in cloud computing - Data Protection Conference 2011
 

En vedette

Manual usuario fabricante-router-xavi-7968
Manual usuario fabricante-router-xavi-7968Manual usuario fabricante-router-xavi-7968
Manual usuario fabricante-router-xavi-7968mcetpm
 
Privacy Concerns and Cloud Computing
Privacy Concerns and Cloud ComputingPrivacy Concerns and Cloud Computing
Privacy Concerns and Cloud ComputingAIIM International
 
Grow your business by shaping the human impacts of technology
Grow your business by shaping the human impacts of technologyGrow your business by shaping the human impacts of technology
Grow your business by shaping the human impacts of technologyMichael Siepmann, Ph.D.
 
10 security concerns cloud computing
10 security concerns cloud computing10 security concerns cloud computing
10 security concerns cloud computingHossam Zein
 
Computer security basics
Computer security  basicsComputer security  basics
Computer security basicsSrinu Potnuru
 
Cloud Computing Security Issues
Cloud Computing Security IssuesCloud Computing Security Issues
Cloud Computing Security IssuesStelios Krasadakis
 
Concerns with cloud computing
Concerns with cloud computingConcerns with cloud computing
Concerns with cloud computingUlf Mattsson
 
The shortest path to cloud success - your roadmap
The shortest path to cloud success - your roadmapThe shortest path to cloud success - your roadmap
The shortest path to cloud success - your roadmapGabe Akisanmi
 
Cloud Computing Security
Cloud Computing SecurityCloud Computing Security
Cloud Computing Securityneicher
 
Cloud Computing Security
Cloud Computing SecurityCloud Computing Security
Cloud Computing SecurityNinh Nguyen
 
Turist în orașul meu craiova
Turist în orașul meu  craiovaTurist în orașul meu  craiova
Turist în orașul meu craiovaGheorghitoiumaria
 
L.I.T. Clothing Boutique
L.I.T. Clothing BoutiqueL.I.T. Clothing Boutique
L.I.T. Clothing BoutiquePortfolio
 
AdMix Affiliate Network
AdMix Affiliate NetworkAdMix Affiliate Network
AdMix Affiliate NetworkDom Pérignon
 

En vedette (20)

Manual usuario fabricante-router-xavi-7968
Manual usuario fabricante-router-xavi-7968Manual usuario fabricante-router-xavi-7968
Manual usuario fabricante-router-xavi-7968
 
How to Overcome Content Security Concerns in the Cloud
How to Overcome Content Security Concerns in the CloudHow to Overcome Content Security Concerns in the Cloud
How to Overcome Content Security Concerns in the Cloud
 
Privacy Concerns and Cloud Computing
Privacy Concerns and Cloud ComputingPrivacy Concerns and Cloud Computing
Privacy Concerns and Cloud Computing
 
Grow your business by shaping the human impacts of technology
Grow your business by shaping the human impacts of technologyGrow your business by shaping the human impacts of technology
Grow your business by shaping the human impacts of technology
 
10 security concerns cloud computing
10 security concerns cloud computing10 security concerns cloud computing
10 security concerns cloud computing
 
Cloud Computing & Security Concerns
Cloud Computing & Security ConcernsCloud Computing & Security Concerns
Cloud Computing & Security Concerns
 
Computer security basics
Computer security  basicsComputer security  basics
Computer security basics
 
Cloud Computing Security Issues
Cloud Computing Security IssuesCloud Computing Security Issues
Cloud Computing Security Issues
 
Concerns with cloud computing
Concerns with cloud computingConcerns with cloud computing
Concerns with cloud computing
 
The shortest path to cloud success - your roadmap
The shortest path to cloud success - your roadmapThe shortest path to cloud success - your roadmap
The shortest path to cloud success - your roadmap
 
Cloud Computing Security
Cloud Computing SecurityCloud Computing Security
Cloud Computing Security
 
Cloud Computing Security
Cloud Computing SecurityCloud Computing Security
Cloud Computing Security
 
Foresight
ForesightForesight
Foresight
 
SugarCRM for Mac Users
SugarCRM for Mac UsersSugarCRM for Mac Users
SugarCRM for Mac Users
 
Turist în orașul meu craiova
Turist în orașul meu  craiovaTurist în orașul meu  craiova
Turist în orașul meu craiova
 
L.I.T. Clothing Boutique
L.I.T. Clothing BoutiqueL.I.T. Clothing Boutique
L.I.T. Clothing Boutique
 
Collagesss
CollagesssCollagesss
Collagesss
 
Reasoning
ReasoningReasoning
Reasoning
 
AdMix Affiliate Network
AdMix Affiliate NetworkAdMix Affiliate Network
AdMix Affiliate Network
 
HHS
HHSHHS
HHS
 

Similaire à Essential Cloud Security Concepts

Cloud computing explained
Cloud computing explained Cloud computing explained
Cloud computing explained Juan Pablo
 
CLOUD COMPUTING.ppt
CLOUD COMPUTING.pptCLOUD COMPUTING.ppt
CLOUD COMPUTING.pptDss
 
Information Storage and Management
Information Storage and Management Information Storage and Management
Information Storage and Management AngelineR
 
Unit iii virtualitation
Unit iii   virtualitationUnit iii   virtualitation
Unit iii virtualitationrajmurugaaa
 
cloudintro-lec018.1.ppt
cloudintro-lec018.1.pptcloudintro-lec018.1.ppt
cloudintro-lec018.1.pptgunvinit931
 
Cloud Computing basic concept to understand
Cloud Computing basic concept to understandCloud Computing basic concept to understand
Cloud Computing basic concept to understandRahulBhole12
 
Cloud computing ppt
Cloud computing pptCloud computing ppt
Cloud computing pptJagriti Rai
 
Cloud Computing Fundamentals
Cloud Computing FundamentalsCloud Computing Fundamentals
Cloud Computing FundamentalsSonia Nagpal
 
Radu crahmaliuc 23feb2012
Radu crahmaliuc 23feb2012Radu crahmaliuc 23feb2012
Radu crahmaliuc 23feb2012Agora Group
 
An introduction to the cloud 11 v1
An introduction to the cloud 11 v1An introduction to the cloud 11 v1
An introduction to the cloud 11 v1charan7575
 
Cloud Computing.pptx
Cloud Computing.pptxCloud Computing.pptx
Cloud Computing.pptxNikitaOG
 
Introduction to Cloud Computing.pptx
Introduction to Cloud Computing.pptxIntroduction to Cloud Computing.pptx
Introduction to Cloud Computing.pptxsarahabbas40
 
A cross referenced whitepaper on cloud computing
A cross referenced whitepaper on cloud computingA cross referenced whitepaper on cloud computing
A cross referenced whitepaper on cloud computingShahzad
 
Cloud computing presentation
Cloud computing presentationCloud computing presentation
Cloud computing presentationAkash Tripathi
 

Similaire à Essential Cloud Security Concepts (20)

The cloud ecosystem
The cloud ecosystemThe cloud ecosystem
The cloud ecosystem
 
Cloud computing explained
Cloud computing explained Cloud computing explained
Cloud computing explained
 
Definition of Cloud Computing
Definition of Cloud ComputingDefinition of Cloud Computing
Definition of Cloud Computing
 
CLOUD COMPUTING.ppt
CLOUD COMPUTING.pptCLOUD COMPUTING.ppt
CLOUD COMPUTING.ppt
 
Information Storage and Management
Information Storage and Management Information Storage and Management
Information Storage and Management
 
Unit iii virtualitation
Unit iii   virtualitationUnit iii   virtualitation
Unit iii virtualitation
 
cloudintro-lec018.1.ppt
cloudintro-lec018.1.pptcloudintro-lec018.1.ppt
cloudintro-lec018.1.ppt
 
Cloud Computing basic concept to understand
Cloud Computing basic concept to understandCloud Computing basic concept to understand
Cloud Computing basic concept to understand
 
Cloud computing ppt
Cloud computing pptCloud computing ppt
Cloud computing ppt
 
Cloud Computing Fundamentals
Cloud Computing FundamentalsCloud Computing Fundamentals
Cloud Computing Fundamentals
 
Radu crahmaliuc 23feb2012
Radu crahmaliuc 23feb2012Radu crahmaliuc 23feb2012
Radu crahmaliuc 23feb2012
 
12458003.ppt
12458003.ppt12458003.ppt
12458003.ppt
 
An introduction to the cloud 11 v1
An introduction to the cloud 11 v1An introduction to the cloud 11 v1
An introduction to the cloud 11 v1
 
Cloud Computing.pptx
Cloud Computing.pptxCloud Computing.pptx
Cloud Computing.pptx
 
Introduction to Cloud Computing.pptx
Introduction to Cloud Computing.pptxIntroduction to Cloud Computing.pptx
Introduction to Cloud Computing.pptx
 
Cloud presentation NELA
Cloud presentation NELACloud presentation NELA
Cloud presentation NELA
 
A cross referenced whitepaper on cloud computing
A cross referenced whitepaper on cloud computingA cross referenced whitepaper on cloud computing
A cross referenced whitepaper on cloud computing
 
Cloud computing presentation
Cloud computing presentationCloud computing presentation
Cloud computing presentation
 
Cloud Computing.pptx
Cloud Computing.pptxCloud Computing.pptx
Cloud Computing.pptx
 
CC.pptx
CC.pptxCC.pptx
CC.pptx
 

Dernier

[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 

Dernier (20)

[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 

Essential Cloud Security Concepts

  • 1. RAHUL GURNANI CDAC Certified Cyber Security Professional MS Cyber Law & Information Security, Indian Institute of Information Technology - Allahabad
  • 2. agenda • Virtualization - brief overview • Essential Features of a cloud environment • Cloud Service Models • Cloud Deployment Models • Benefits of Cloud • Security Concerns in different Cloud environments • Mapping the traditional IT security requirements to Cloud environment • Two viewpoints on Cloud Security
  • 3.
  • 4. VIRTUALIZATION • A cloud comprises of virtual machines hosted on a remote or local server which are accessed and used on as and when needed basis. • The virtual machines can be defined to have any configuration that a real world machine would have, just the host machine should be able to support it. Even servers can be hosted easily on a cloud. • Just imagine if you are able to host your server in a virtual environment, how much cost, space and business overheads would you save if your servers are hosted on a cloud !
  • 5. Essential Features of a cloud  1.On- Demand Self Service 2.Broad network access 3.Resource Pooling 4.Rapid Elasticity 5.Measured Service
  • 6. On-demand self-service. A customer using cloud services should be able to provision computing capabilities such as server time and network storage himself as and when required without requiring human interaction with the service provider. Broad network access. The cloud services should be available over the network and accessible thorugh standard devices such as laptops, smartphones and tablet computers Resource pooling. (& Location Independence) The service provider’s computing resources are pooled to serve multiple consumers using a multi-tenant model, with different physical and virtual resources dynamically assigned and reassigned according to consumer demand.
  • 7. Rapid elasticity. • Capabilities can be elastically provisioned and released, in some cases automatically, to scale rapidly outward and inward commensurate with demand. • To the consumer, the capabilities available for provisioning often appear to be unlimited and can be appropriated in any quantity at any time. Measured service. • Cloud systems automatically control and optimize resource use by leveraging a metering capability at some level of abstraction appropriate to the type of service (e.g., storage, processing, bandwidth, and active user accounts). • Resource usage can be monitored, controlled, and reported, providing transparency for both the provider and consumer of the utilized service.
  • 8. Cloud Services 1.Software as a Service (SaaS). 2.Platform as a Service (PaaS). 3.Infrastructure as a Service (IaaS). 4.Business Process as a Service (BPAAS)
  • 9. Software as a Service (SaaS). • The capability provided to the consumer is to use the provider’s applications running on a cloud infrastructure. • The applications are accessible from various client devices through either a thin client interface, such as a web browser (e.g., web-based email), or a program interface. • The consumer does not manage or control the underlying cloud infrastructure including network, servers, operating systems, storage, or even individual application capabilities, with the possible exception of limited user- specific application configuration settings.
  • 10. Platform as a Service (PaaS). • The capability provided to the consumer is to deploy onto the cloud infrastructure consumer-created or acquired applications created using programming languages, libraries, services, and tools supported by the provider. • The consumer does not manage or control the underlying cloud infrastructure including network, servers, operating systems, or storage, but has control over the deployed applications and possibly configuration settings for the application-hosting environment.
  • 11. Infrastructure as a Service (IaaS) • The capability provided to the consumer is to provision processing, storage, networks, and other fundamental computing resources. • The consumer is able to deploy and run arbitrary software, which can include operating systems and applications. • The consumer does not manage or control the underlying cloud infrastructure but has control over operating systems, storage, and deployed applications; and possibly limited control of select networking components (e.g., host firewalls).
  • 12. Business Process as a Service (BPAAS). • It is a form of business process outsourcing (BPO) that employs a cloud computing service model. • Whereas the aim of traditional BPO is to reduce labor costs, BPaaS reduces labor count through increased automation, thereby cutting costs in the process. • It adheres to cloud computing's traditional monthly pricing schedule. • Types of outsourcing services offered via the BPaaS model include HR functions such as payroll and benefits administration, procurement, advertising, marketing and industry operation processes.
  • 13. • Private cloud • Public cloud • Hybrid cloud • Community cloud Deployment Models
  • 14. Private cloud • The cloud infrastructure is set up for exclusive use by an individual organization which may have multiple consumers. • It may be owned, managed, and operated by the organization itself or a third party. • It may be set up in the organizations premises or a remote location. Community cloud • It is for exclusive use by a specific community of consumers from organizations that have shared concerns (e.g., mission, security requirements, policy, and compliance considerations). • It may be owned, managed, and operated by one or more of the organizations in the community, a third party, or some combination of them, and it may exist on or off premises.
  • 15. Public cloud • It is set up for open use by the general public. • It may be owned, managed, and operated by a business, academic, or government organization, or some combination of them. It exists on the premises of the cloud provider. Hybrid cloud • The cloud infrastructure is a composition of two or more distinct cloud infrastructures (private, community, or public) that remain unique entities, • but are bound together by standardized or proprietary technology that enables data and application portability (e.g., cloud bursting for load balancing between clouds).
  • 16.
  • 17. • Reducing capital Expenditure on IT • Having a predictable Operations Expenditure • Letting the organization focus on its core competency
  • 18.
  • 19. Security Concerns TOP CONCERN IN ADOPTION OF CLOUD Physical controls get replaced by virtual controls In a cloud environment, access expands, control shifts, and the speed of provisioning resources and applications increases - greatly affecting all aspects of IT security. Cloud computing tests the limits of security operations and infrastructure.
  • 20. Integrated service management, automation, provisioning, self service Key security focus: Infrastructure and Identity Manage datacenter identities Secure virtual machines Patch default images Monitor logs on all resources Network isolation Cloud Enabled Data Center Infrastructure as a Service (IaaS): Cut IT expense and complexity through cloud data centers Platform-as-a-Service (PaaS): Accelerate time to market with cloud platform services Pre-built, pre-integrated IT infrastructures tuned to application-specific needs Key security focus: Applications and Data Secure shared databases Encrypt private information Build secure applications Keep an audit trail Integrate existing security Cloud Platform Services
  • 21. Advanced platform for creating, managing, and monetizing cloud services Key security focus: Data and Compliance Isolate cloud tenants Policy and regulations Manage security operations Build compliant data centers Offer backup and resiliency Cloud Service Provider Innovate business models by becoming a cloud service provider Software as a Service (SaaS): Gain immediate access with business solutions on cloud Capabilities provided to consumers for using a provider’s applications Key security focus: Compliance and Governance Harden exposed applications Securely federate identity Deploy access controls Encrypt communications Manage application policies Business Solutions on Cloud
  • 22. People and Identity Application and Process Network, Server and Endpoint Data and Information Physical Infrastructure Governance, Risk and Compliance Security and Privacy Domains Multiple Logins, Onboarding Issues Multi-tenancy, Data Separation Audit Silos, Compliance Controls Provider Controlled, Lack of Visibility Virtualization, Network Isolation External Facing, Quick Provisioning CLOUD Self-Service Highly Virtualized Location Independence Workload Automation Rapid Elasticity Standardization How security and privacy domains get related to cloud environments ?
  • 23. Two viewpoints for cloud security Security from the cloud ...cloud is used to deliver security as-a-service - focusing on services such as vulnerability scanning, web and email security, etc. Security for the cloud ..focus is on secure usage of Cloud applications – like by ensuring Audit, Access and Secure Connectivity. There are various business solutions available from different vendors supporting both the models.