SlideShare une entreprise Scribd logo
1  sur  6
Mark Skilton, Director, Strategy Office, Global Infrastructure Services
Co-Chair, Cloud Computing Work Group, The Open Group
Member, ISO JC38 UK Mirror
+44 7787 692197
mark.skilton@capgemini.com
Twitter @mskilton
http://uk.linkedin.com/pub/mark-skilton/1/189/968
“Identity, Privacy, and Data Protection in the
Cloud – What is Being Done? Is it Enough?”
| Capgemini & Cloud
Trust and Risk Trade-off
 In the Cloud everything is perceived as untrusted and insecure
 Many enterprises have company policies requiring data and access to be stored
behind the Corporate firewall; transport between geographies are not allowed
 Industrial certifications require physical isolation, audit and authentication
processes
Trust ?
Internal
Private
Hybrid
Public
Physical
Resources/
locations Edge
Span
of
Insource
&
Outsource
Span of Technology
| Capgemini & Cloud
What’s being done to Secure Cloud……..
Move data
between
SQL and
nonSQL
databases
DBMS Server
Legal Issues
IP Patent Law –
Independence
of software on
device and OS
Bundling
Legal
Definition of
an API e.g.
Google API,
MSFT API
US / EU
Patriot,
SafeHarbor,
DA rules
Cultural Impact
Provisioning
Policy
Management
Amazon gets
FISMA
certification
EU Open
Data
portal
Open Data
standards
W3C
EU inter-
country data
Use of
Public APIs
e.g. Google+
Twitter APIs
Use of APIs/
personal
Data
Protection
TLS, SSL
Transport
Layer end to
end Pass
through
Threats
Hypervisor IOP
e.g. Citrix and
AWS
Device IOP
e.g. User
Experience
and UI e.g.
Ipad ,
Samsung
e.g.
Microsoft
OS 8 – tablet
IOP
EU announce
common Data
Portal
Vertical Sector
B2B Schemas
Vendor
Technology
Standards
seeking
Openness e.g.
DMTF, ODCA,
OMG CCSC
Illustrative
ISA Chip
standards
Database Scalability & Portability
Hypervisor Portability
& Hypervisor Interoperating
Hybrid
Device from service abstraction
Government led
Legal certifications
Vertical industry Government
led Standard schemas
Network transport issues
Choices , NSPs, ISPs
API openness and ownership
Multi-form factor supportability
Apps, content stores access
Personal/vendor Portability
Market / Region
Provider / Entity
Network
API / Gateway /
Portal
Device / Browser
OS
Server
Storage
Software
Application
Data / Payload
Hypervisor
Business Process
DC Hosting
Public Cloud
Hosted
Private Cloud
Hosted
Open Source
Cloud Hosted
Legal &
Security
Industry
Nomenclatures
Deployment strategies
Common Industry standards
Vertical Industry standards
e.g. Oracle, IBM e.g. Amazon &
Others
e.g. open nebula
TechnologyandBusinesstiers
Provisioning Policies
Inter-country data exchange
Multi-form factor data portability
Service IP component bundling
Application environment
Portability
Storage as a
Service
Compute as a Service
Applications as a Service
Desktop as a
Service Big Data as a
Service
Move
application
OpenStack,
CloudStack Shifts
B2B / B2C
Platforms
Device
Store Services
Social Networks,
C2C
Policy Areas
The Open Group – Cloud Computing Interoperability
Portability Project 2012
Examples of some Legal activity in last 12-24 months EU announce
Data Privacy
Controls
| Capgemini & Cloud
How can we get control of Identity, Privacy, and Data
Protection in the Cloud ?
Extensible Boundaries
From Introduction to CIEL – CILE Project – an Open Group project
Work in Progress
Copyright SyntheticSpheres 2012
Identity – Is this controlled
by User Device or
By You in your Cloud Server
or a Proxy Service e.g. OpenID ?
Privacy – What Boundary Conditions
are acceptable to you?
Do you want Closed , Secure Cloud?
Do you want Distributed Secure Cloud?
Do you want Regional/Local Controls
do you want guarantees
What Legal Jurisdiction do you follow?
Data Protection –
Data at Rest – Encryption, IP Control
Data in Transit – Encryption, Monitoring
Data Age – Archive and Audit Control
What Legal Jurisdiction do you follow?
Provider
Consumer
Policy
Management
Boundary
Policy
Management
Legal
Contract
Back to
Back
control
| Capgemini & Cloud
“It is impossible for a distributed computer system to simultaneously
provide all three of the following guarantees: Consistency,
Availability and Partitioning Tolerance”.
Consistency
Availability
Partition Tolerance
GuaranteedC
A
P
Effectiveness
Fidelity
G
P
F
Consistency
Availability Partitioning
Tolerance
Guaranteed
FidelityPerformance
(Reference: Brewer Conjecture 2000, Gilbert, Lynch Formal Proof 2002)
“Brewer’s Conjecture and the feasibility of consistent, available, partition-tolerant web services”
http://lpd.epfl.ch/sgilbert/pubs/BrewersConjecture-SigAct.pdf ACM SIGACT News, Vol 33 Issue 2 (2002) pg 51-59
Brewers Theorem
| Capgemini & Cloud
The Case for Service Orchestration -
managing your Security and Risk
 Consistency and Guarantees
• Strong Multi-Systems Management – Single Accountabilities
• Control Failure Points in system – Strong Identity, Encryption Policies and Tools to manage Usage and Audit Compliance.
 Availability and Effectiveness
• Multi-Source – open technology capabilities
• Business Process Orchestration – Drive Business Performance Outcomes Metrics
 Partition Tolerance and Fidelity
• Introduce and manage disciplined portfolio of IT and Business assets inside and outside the organization in a way that best
serves the needs of consumers and providers. Govern Configuration
• Preserve your elasticity - within “acceptable conditions of use” – know the tolerance levels that are within the distributed
system.
Consistency
Availability
Partition
Tolerance
GuaranteedC
A
P
Effectiveness
Fidelity
G
P
F
Management
Orchestration
Resource
Management
Template
Contiguity
Source
Access
Systems
Management
Process
Orchestration

Contenu connexe

Tendances

Ciphercloud Solutions Overview hsa oct2011
Ciphercloud Solutions Overview hsa oct2011Ciphercloud Solutions Overview hsa oct2011
Ciphercloud Solutions Overview hsa oct2011Ramy Houssaini
 
What changes for Internet of Things technologies with the EU Data Protection ...
What changes for Internet of Things technologies with the EU Data Protection ...What changes for Internet of Things technologies with the EU Data Protection ...
What changes for Internet of Things technologies with the EU Data Protection ...Giulio Coraggio
 
NSTIC Panel on Mobile-based Identity and Access Management
NSTIC Panel on Mobile-based Identity and Access ManagementNSTIC Panel on Mobile-based Identity and Access Management
NSTIC Panel on Mobile-based Identity and Access ManagementBjorn Hjelm
 
GDPR is coming in Hot. Top Burning Questions Answered to Help You Keep Your C...
GDPR is coming in Hot. Top Burning Questions Answered to Help You Keep Your C...GDPR is coming in Hot. Top Burning Questions Answered to Help You Keep Your C...
GDPR is coming in Hot. Top Burning Questions Answered to Help You Keep Your C...ForgeRock
 
Security On The Edge - A New Way To Think About Securing the Internet of Things
Security On The Edge -  A New Way To Think About Securing the Internet of ThingsSecurity On The Edge -  A New Way To Think About Securing the Internet of Things
Security On The Edge - A New Way To Think About Securing the Internet of ThingsForgeRock
 
Smart City Lecture 4 - Harmonizing the Internet of Things
Smart City Lecture 4 - Harmonizing the Internet of ThingsSmart City Lecture 4 - Harmonizing the Internet of Things
Smart City Lecture 4 - Harmonizing the Internet of ThingsPeter Waher
 
Digital demand - the challenges of being a CIO in the UK HE sector, by John C...
Digital demand - the challenges of being a CIO in the UK HE sector, by John C...Digital demand - the challenges of being a CIO in the UK HE sector, by John C...
Digital demand - the challenges of being a CIO in the UK HE sector, by John C...Jisc
 
Guardtime Names Jeffrey Pearce Director of Intellectual Property
Guardtime Names Jeffrey Pearce Director of Intellectual PropertyGuardtime Names Jeffrey Pearce Director of Intellectual Property
Guardtime Names Jeffrey Pearce Director of Intellectual Propertyflashnewsrelease
 
Data Portability & Application Portability - Cloud Security Expo 2017
Data Portability & Application Portability - Cloud Security Expo 2017Data Portability & Application Portability - Cloud Security Expo 2017
Data Portability & Application Portability - Cloud Security Expo 2017CloudWATCH Consortium
 
ForgeRock Open Identity Stack Summit - Kick-off by Mike Ellis
ForgeRock Open Identity Stack Summit - Kick-off by Mike EllisForgeRock Open Identity Stack Summit - Kick-off by Mike Ellis
ForgeRock Open Identity Stack Summit - Kick-off by Mike EllisForgeRock
 
2015 Identity Summit - CTO Innovation Center
2015 Identity Summit - CTO Innovation Center2015 Identity Summit - CTO Innovation Center
2015 Identity Summit - CTO Innovation CenterForgeRock
 
Cloud Security in SaaS Era 2020
Cloud Security in SaaS Era 2020Cloud Security in SaaS Era 2020
Cloud Security in SaaS Era 2020Eyal Estrin
 
2015 Identity Summit - Stepping Up to New Data Protection Challenges
2015 Identity Summit - Stepping Up to New Data Protection Challenges2015 Identity Summit - Stepping Up to New Data Protection Challenges
2015 Identity Summit - Stepping Up to New Data Protection ChallengesForgeRock
 
Internet of Everything: The CIO's Point of View
Internet of Everything:  The CIO's Point of ViewInternet of Everything:  The CIO's Point of View
Internet of Everything: The CIO's Point of ViewCisco Canada
 
Ericsson Technology Review: Tackling IoT complexity with machine intelligence
Ericsson Technology Review: Tackling IoT complexity with machine intelligenceEricsson Technology Review: Tackling IoT complexity with machine intelligence
Ericsson Technology Review: Tackling IoT complexity with machine intelligenceEricsson
 
5G and edge computing - CORAL perspective
5G and edge computing - CORAL perspective5G and edge computing - CORAL perspective
5G and edge computing - CORAL perspectiveRichard Scott
 
Arkibiz Partners with GuardTime to Provide Auditable E-Documents and Records ...
Arkibiz Partners with GuardTime to Provide Auditable E-Documents and Records ...Arkibiz Partners with GuardTime to Provide Auditable E-Documents and Records ...
Arkibiz Partners with GuardTime to Provide Auditable E-Documents and Records ...flashnewsrelease
 
Trust in the Digital Single Market - Cloud Expo 2017
Trust in the Digital Single Market - Cloud Expo 2017Trust in the Digital Single Market - Cloud Expo 2017
Trust in the Digital Single Market - Cloud Expo 2017CloudWATCH Consortium
 

Tendances (20)

Ciphercloud Solutions Overview hsa oct2011
Ciphercloud Solutions Overview hsa oct2011Ciphercloud Solutions Overview hsa oct2011
Ciphercloud Solutions Overview hsa oct2011
 
What changes for Internet of Things technologies with the EU Data Protection ...
What changes for Internet of Things technologies with the EU Data Protection ...What changes for Internet of Things technologies with the EU Data Protection ...
What changes for Internet of Things technologies with the EU Data Protection ...
 
NSTIC Panel on Mobile-based Identity and Access Management
NSTIC Panel on Mobile-based Identity and Access ManagementNSTIC Panel on Mobile-based Identity and Access Management
NSTIC Panel on Mobile-based Identity and Access Management
 
GDPR is coming in Hot. Top Burning Questions Answered to Help You Keep Your C...
GDPR is coming in Hot. Top Burning Questions Answered to Help You Keep Your C...GDPR is coming in Hot. Top Burning Questions Answered to Help You Keep Your C...
GDPR is coming in Hot. Top Burning Questions Answered to Help You Keep Your C...
 
Security On The Edge - A New Way To Think About Securing the Internet of Things
Security On The Edge -  A New Way To Think About Securing the Internet of ThingsSecurity On The Edge -  A New Way To Think About Securing the Internet of Things
Security On The Edge - A New Way To Think About Securing the Internet of Things
 
Smart City Lecture 4 - Harmonizing the Internet of Things
Smart City Lecture 4 - Harmonizing the Internet of ThingsSmart City Lecture 4 - Harmonizing the Internet of Things
Smart City Lecture 4 - Harmonizing the Internet of Things
 
Digital demand - the challenges of being a CIO in the UK HE sector, by John C...
Digital demand - the challenges of being a CIO in the UK HE sector, by John C...Digital demand - the challenges of being a CIO in the UK HE sector, by John C...
Digital demand - the challenges of being a CIO in the UK HE sector, by John C...
 
Guardtime Names Jeffrey Pearce Director of Intellectual Property
Guardtime Names Jeffrey Pearce Director of Intellectual PropertyGuardtime Names Jeffrey Pearce Director of Intellectual Property
Guardtime Names Jeffrey Pearce Director of Intellectual Property
 
Data Portability & Application Portability - Cloud Security Expo 2017
Data Portability & Application Portability - Cloud Security Expo 2017Data Portability & Application Portability - Cloud Security Expo 2017
Data Portability & Application Portability - Cloud Security Expo 2017
 
ForgeRock Open Identity Stack Summit - Kick-off by Mike Ellis
ForgeRock Open Identity Stack Summit - Kick-off by Mike EllisForgeRock Open Identity Stack Summit - Kick-off by Mike Ellis
ForgeRock Open Identity Stack Summit - Kick-off by Mike Ellis
 
2015 Identity Summit - CTO Innovation Center
2015 Identity Summit - CTO Innovation Center2015 Identity Summit - CTO Innovation Center
2015 Identity Summit - CTO Innovation Center
 
Keith prabhu cloud security-public
Keith prabhu cloud security-publicKeith prabhu cloud security-public
Keith prabhu cloud security-public
 
Cloud Security in SaaS Era 2020
Cloud Security in SaaS Era 2020Cloud Security in SaaS Era 2020
Cloud Security in SaaS Era 2020
 
2015 Identity Summit - Stepping Up to New Data Protection Challenges
2015 Identity Summit - Stepping Up to New Data Protection Challenges2015 Identity Summit - Stepping Up to New Data Protection Challenges
2015 Identity Summit - Stepping Up to New Data Protection Challenges
 
Internet of Everything: The CIO's Point of View
Internet of Everything:  The CIO's Point of ViewInternet of Everything:  The CIO's Point of View
Internet of Everything: The CIO's Point of View
 
Ericsson Technology Review: Tackling IoT complexity with machine intelligence
Ericsson Technology Review: Tackling IoT complexity with machine intelligenceEricsson Technology Review: Tackling IoT complexity with machine intelligence
Ericsson Technology Review: Tackling IoT complexity with machine intelligence
 
5G and edge computing - CORAL perspective
5G and edge computing - CORAL perspective5G and edge computing - CORAL perspective
5G and edge computing - CORAL perspective
 
Arkibiz Partners with GuardTime to Provide Auditable E-Documents and Records ...
Arkibiz Partners with GuardTime to Provide Auditable E-Documents and Records ...Arkibiz Partners with GuardTime to Provide Auditable E-Documents and Records ...
Arkibiz Partners with GuardTime to Provide Auditable E-Documents and Records ...
 
IoT Security
IoT SecurityIoT Security
IoT Security
 
Trust in the Digital Single Market - Cloud Expo 2017
Trust in the Digital Single Market - Cloud Expo 2017Trust in the Digital Single Market - Cloud Expo 2017
Trust in the Digital Single Market - Cloud Expo 2017
 

En vedette

Building a digital enterprise – some practitoner views M.Skilton may 2015 v2
Building a digital enterprise – some practitoner views M.Skilton may 2015 v2Building a digital enterprise – some practitoner views M.Skilton may 2015 v2
Building a digital enterprise – some practitoner views M.Skilton may 2015 v2Mark Skilton
 
Infosecurity magazine webinar v2
Infosecurity magazine webinar v2Infosecurity magazine webinar v2
Infosecurity magazine webinar v2Mark Skilton
 
Privacy in the Age of Big Data: Exploring the Role of Modern Identity Managem...
Privacy in the Age of Big Data: Exploring the Role of Modern Identity Managem...Privacy in the Age of Big Data: Exploring the Role of Modern Identity Managem...
Privacy in the Age of Big Data: Exploring the Role of Modern Identity Managem...Arab Federation for Digital Economy
 
Managing Identity from the Cloud: Transformation Advantages at VantisLife Ins...
Managing Identity from the Cloud: Transformation Advantages at VantisLife Ins...Managing Identity from the Cloud: Transformation Advantages at VantisLife Ins...
Managing Identity from the Cloud: Transformation Advantages at VantisLife Ins...IBM Security
 
Swedbank företagspresentation, september, 2010
Swedbank företagspresentation, september, 2010Swedbank företagspresentation, september, 2010
Swedbank företagspresentation, september, 2010Swedbank
 
Felipe calderón promulga ley de ap ps
Felipe calderón promulga ley de ap psFelipe calderón promulga ley de ap ps
Felipe calderón promulga ley de ap psdiana_escalante
 
Lesson one chords
Lesson one   chordsLesson one   chords
Lesson one chordsbecclehead
 
May cover story - Disruptions for Growth
May cover story - Disruptions for GrowthMay cover story - Disruptions for Growth
May cover story - Disruptions for GrowthPeople Matters
 
Role of data integration in enabling your digital business march 18 12 noon v1
Role of data integration in enabling your digital business march 18 12 noon v1Role of data integration in enabling your digital business march 18 12 noon v1
Role of data integration in enabling your digital business march 18 12 noon v1Mark Skilton
 
Build the digital enterprise mark skilton copyright 2014 v1
Build the digital enterprise mark skilton copyright 2014 v1Build the digital enterprise mark skilton copyright 2014 v1
Build the digital enterprise mark skilton copyright 2014 v1Mark Skilton
 
The connected economy mark skilton july 15 bright talk v2
The connected economy mark skilton july 15   bright talk v2The connected economy mark skilton july 15   bright talk v2
The connected economy mark skilton july 15 bright talk v2Mark Skilton
 

En vedette (12)

Building a digital enterprise – some practitoner views M.Skilton may 2015 v2
Building a digital enterprise – some practitoner views M.Skilton may 2015 v2Building a digital enterprise – some practitoner views M.Skilton may 2015 v2
Building a digital enterprise – some practitoner views M.Skilton may 2015 v2
 
Infosecurity magazine webinar v2
Infosecurity magazine webinar v2Infosecurity magazine webinar v2
Infosecurity magazine webinar v2
 
Privacy in the Age of Big Data: Exploring the Role of Modern Identity Managem...
Privacy in the Age of Big Data: Exploring the Role of Modern Identity Managem...Privacy in the Age of Big Data: Exploring the Role of Modern Identity Managem...
Privacy in the Age of Big Data: Exploring the Role of Modern Identity Managem...
 
Managing Identity from the Cloud: Transformation Advantages at VantisLife Ins...
Managing Identity from the Cloud: Transformation Advantages at VantisLife Ins...Managing Identity from the Cloud: Transformation Advantages at VantisLife Ins...
Managing Identity from the Cloud: Transformation Advantages at VantisLife Ins...
 
Swedbank företagspresentation, september, 2010
Swedbank företagspresentation, september, 2010Swedbank företagspresentation, september, 2010
Swedbank företagspresentation, september, 2010
 
Felipe calderón promulga ley de ap ps
Felipe calderón promulga ley de ap psFelipe calderón promulga ley de ap ps
Felipe calderón promulga ley de ap ps
 
Lesson one chords
Lesson one   chordsLesson one   chords
Lesson one chords
 
May cover story - Disruptions for Growth
May cover story - Disruptions for GrowthMay cover story - Disruptions for Growth
May cover story - Disruptions for Growth
 
Role of data integration in enabling your digital business march 18 12 noon v1
Role of data integration in enabling your digital business march 18 12 noon v1Role of data integration in enabling your digital business march 18 12 noon v1
Role of data integration in enabling your digital business march 18 12 noon v1
 
Hyundai veracruz e_brochure
Hyundai veracruz e_brochureHyundai veracruz e_brochure
Hyundai veracruz e_brochure
 
Build the digital enterprise mark skilton copyright 2014 v1
Build the digital enterprise mark skilton copyright 2014 v1Build the digital enterprise mark skilton copyright 2014 v1
Build the digital enterprise mark skilton copyright 2014 v1
 
The connected economy mark skilton july 15 bright talk v2
The connected economy mark skilton july 15   bright talk v2The connected economy mark skilton july 15   bright talk v2
The connected economy mark skilton july 15 bright talk v2
 

Similaire à Identity privacy and data protection in the cloud – what is being done is it enough goal capgemini m skilton v1

Presentation cloud security the grand challenge
Presentation   cloud security the grand challengePresentation   cloud security the grand challenge
Presentation cloud security the grand challengexKinAnx
 
Unlock the potential of data security 2020
Unlock the potential of data security 2020Unlock the potential of data security 2020
Unlock the potential of data security 2020Ulf Mattsson
 
Legal And Regulatory Issues Cloud Computing...V2.0
Legal And Regulatory Issues Cloud Computing...V2.0Legal And Regulatory Issues Cloud Computing...V2.0
Legal And Regulatory Issues Cloud Computing...V2.0David Spinks
 
Tech equity - Cloud presentation
Tech equity - Cloud presentationTech equity - Cloud presentation
Tech equity - Cloud presentationAdrian Hall
 
Whitepaper: Security of the Cloud
Whitepaper: Security of the CloudWhitepaper: Security of the Cloud
Whitepaper: Security of the CloudCloudSmartz
 
Cloud Security By Dr. Anton Ravindran
Cloud Security By Dr. Anton RavindranCloud Security By Dr. Anton Ravindran
Cloud Security By Dr. Anton RavindranGSTF
 
IT 833 INFORMATION GOVERNANCEDr. Isaac T. GbenleChapte
IT 833 INFORMATION GOVERNANCEDr. Isaac T. GbenleChapteIT 833 INFORMATION GOVERNANCEDr. Isaac T. GbenleChapte
IT 833 INFORMATION GOVERNANCEDr. Isaac T. GbenleChaptemariuse18nolet
 
IT 833 INFORMATION GOVERNANCEDr. Isaac T. GbenleChapte.docx
IT 833 INFORMATION GOVERNANCEDr. Isaac T. GbenleChapte.docxIT 833 INFORMATION GOVERNANCEDr. Isaac T. GbenleChapte.docx
IT 833 INFORMATION GOVERNANCEDr. Isaac T. GbenleChapte.docxvrickens
 
Cloud computing-security-issues
Cloud computing-security-issuesCloud computing-security-issues
Cloud computing-security-issuesAleem Mohammed
 
EMEA10: Trepidation in Moving to the Cloud
EMEA10: Trepidation in Moving to the CloudEMEA10: Trepidation in Moving to the Cloud
EMEA10: Trepidation in Moving to the CloudCompTIA UK
 
ISACA Cloud Computing Risks
ISACA Cloud Computing RisksISACA Cloud Computing Risks
ISACA Cloud Computing RisksMarc Vael
 
How Secure Is Cloud
How Secure Is CloudHow Secure Is Cloud
How Secure Is CloudWilliam Lam
 
Cloud is not an option, but is security?
Cloud is not an option, but is security?Cloud is not an option, but is security?
Cloud is not an option, but is security?Jody Keyser
 
Securing Cloud Services
Securing Cloud ServicesSecuring Cloud Services
Securing Cloud ServicesJohn Rhoton
 
Cw13 cloud computing & big data by ahmed aamer
Cw13 cloud computing & big data by ahmed aamerCw13 cloud computing & big data by ahmed aamer
Cw13 cloud computing & big data by ahmed aamerinevitablecloud
 
Cloud computing security issues and challenges
Cloud computing security issues and challengesCloud computing security issues and challenges
Cloud computing security issues and challengesKresimir Popovic
 
Visibility and Automation for Enhanced Security
Visibility and Automation for Enhanced SecurityVisibility and Automation for Enhanced Security
Visibility and Automation for Enhanced Securitypatmisasi
 

Similaire à Identity privacy and data protection in the cloud – what is being done is it enough goal capgemini m skilton v1 (20)

Presentation cloud security the grand challenge
Presentation   cloud security the grand challengePresentation   cloud security the grand challenge
Presentation cloud security the grand challenge
 
Unlock the potential of data security 2020
Unlock the potential of data security 2020Unlock the potential of data security 2020
Unlock the potential of data security 2020
 
Legal And Regulatory Issues Cloud Computing...V2.0
Legal And Regulatory Issues Cloud Computing...V2.0Legal And Regulatory Issues Cloud Computing...V2.0
Legal And Regulatory Issues Cloud Computing...V2.0
 
Tech equity - Cloud presentation
Tech equity - Cloud presentationTech equity - Cloud presentation
Tech equity - Cloud presentation
 
Losing Control to the Cloud
Losing Control to the CloudLosing Control to the Cloud
Losing Control to the Cloud
 
Whitepaper: Security of the Cloud
Whitepaper: Security of the CloudWhitepaper: Security of the Cloud
Whitepaper: Security of the Cloud
 
Security of the Cloud
Security of the CloudSecurity of the Cloud
Security of the Cloud
 
Cloud Security By Dr. Anton Ravindran
Cloud Security By Dr. Anton RavindranCloud Security By Dr. Anton Ravindran
Cloud Security By Dr. Anton Ravindran
 
IT 833 INFORMATION GOVERNANCEDr. Isaac T. GbenleChapte
IT 833 INFORMATION GOVERNANCEDr. Isaac T. GbenleChapteIT 833 INFORMATION GOVERNANCEDr. Isaac T. GbenleChapte
IT 833 INFORMATION GOVERNANCEDr. Isaac T. GbenleChapte
 
IT 833 INFORMATION GOVERNANCEDr. Isaac T. GbenleChapte.docx
IT 833 INFORMATION GOVERNANCEDr. Isaac T. GbenleChapte.docxIT 833 INFORMATION GOVERNANCEDr. Isaac T. GbenleChapte.docx
IT 833 INFORMATION GOVERNANCEDr. Isaac T. GbenleChapte.docx
 
Cloud computing-security-issues
Cloud computing-security-issuesCloud computing-security-issues
Cloud computing-security-issues
 
Cloud services and it security
Cloud services and it securityCloud services and it security
Cloud services and it security
 
EMEA10: Trepidation in Moving to the Cloud
EMEA10: Trepidation in Moving to the CloudEMEA10: Trepidation in Moving to the Cloud
EMEA10: Trepidation in Moving to the Cloud
 
ISACA Cloud Computing Risks
ISACA Cloud Computing RisksISACA Cloud Computing Risks
ISACA Cloud Computing Risks
 
How Secure Is Cloud
How Secure Is CloudHow Secure Is Cloud
How Secure Is Cloud
 
Cloud is not an option, but is security?
Cloud is not an option, but is security?Cloud is not an option, but is security?
Cloud is not an option, but is security?
 
Securing Cloud Services
Securing Cloud ServicesSecuring Cloud Services
Securing Cloud Services
 
Cw13 cloud computing & big data by ahmed aamer
Cw13 cloud computing & big data by ahmed aamerCw13 cloud computing & big data by ahmed aamer
Cw13 cloud computing & big data by ahmed aamer
 
Cloud computing security issues and challenges
Cloud computing security issues and challengesCloud computing security issues and challenges
Cloud computing security issues and challenges
 
Visibility and Automation for Enhanced Security
Visibility and Automation for Enhanced SecurityVisibility and Automation for Enhanced Security
Visibility and Automation for Enhanced Security
 

Plus de Mark Skilton

Exploring potential of ng cost of infrastructure m skilton sept 23 2014 v1
Exploring potential of ng cost of infrastructure m skilton sept 23 2014 v1Exploring potential of ng cost of infrastructure m skilton sept 23 2014 v1
Exploring potential of ng cost of infrastructure m skilton sept 23 2014 v1Mark Skilton
 
The rise of digital ecosystems m skilton june 11 2014 conected suplychain li...
The rise of digital ecosystems  m skilton june 11 2014 conected suplychain li...The rise of digital ecosystems  m skilton june 11 2014 conected suplychain li...
The rise of digital ecosystems m skilton june 11 2014 conected suplychain li...Mark Skilton
 
Digital security and the IT Department cw500 M Skilton May 22 2014 London v1
Digital security and the IT Department cw500 M Skilton May 22 2014 London v1Digital security and the IT Department cw500 M Skilton May 22 2014 London v1
Digital security and the IT Department cw500 M Skilton May 22 2014 London v1Mark Skilton
 
Creating value in the digital economy Prof Mark Skilton May 2014
Creating value in the digital economy Prof Mark Skilton  May 2014 Creating value in the digital economy Prof Mark Skilton  May 2014
Creating value in the digital economy Prof Mark Skilton May 2014 Mark Skilton
 
Big data and digital ecosystem mark skilton jan 2014 v1
Big data and digital ecosystem mark skilton jan 2014 v1Big data and digital ecosystem mark skilton jan 2014 v1
Big data and digital ecosystem mark skilton jan 2014 v1Mark Skilton
 
Knowing where the safe zone is ovum october 22 2013
Knowing where the safe zone is  ovum october 22 2013 Knowing where the safe zone is  ovum october 22 2013
Knowing where the safe zone is ovum october 22 2013 Mark Skilton
 
Identifying successful business models to drive monetization of your cloud se...
Identifying successful business models to drive monetization of your cloud se...Identifying successful business models to drive monetization of your cloud se...
Identifying successful business models to drive monetization of your cloud se...Mark Skilton
 
Closing the gap in your cloud ecosystem capgemini mark skilton v1
Closing the gap in your cloud ecosystem capgemini mark skilton v1Closing the gap in your cloud ecosystem capgemini mark skilton v1
Closing the gap in your cloud ecosystem capgemini mark skilton v1Mark Skilton
 
Capgemini cloud expoeurope jan 25 2012 m skilton v1.4
Capgemini cloud expoeurope jan 25 2012 m skilton  v1.4Capgemini cloud expoeurope jan 25 2012 m skilton  v1.4
Capgemini cloud expoeurope jan 25 2012 m skilton v1.4Mark Skilton
 
EU digital agenda event standards capgemini mark skilton june 2011
EU digital agenda event standards capgemini  mark skilton june 2011EU digital agenda event standards capgemini  mark skilton june 2011
EU digital agenda event standards capgemini mark skilton june 2011Mark Skilton
 
Cloud computing metrics for successful business architecture and strategy cap...
Cloud computing metrics for successful business architecture and strategy cap...Cloud computing metrics for successful business architecture and strategy cap...
Cloud computing metrics for successful business architecture and strategy cap...Mark Skilton
 
Visualization of an digital ecosystem capgemini m skilton v1
Visualization of an digital ecosystem    capgemini m skilton v1Visualization of an digital ecosystem    capgemini m skilton v1
Visualization of an digital ecosystem capgemini m skilton v1Mark Skilton
 
Digital transformation and the role of cloud computing Capgemini Mark Skilt...
Digital transformation and the role of cloud computing   Capgemini Mark Skilt...Digital transformation and the role of cloud computing   Capgemini Mark Skilt...
Digital transformation and the role of cloud computing Capgemini Mark Skilt...Mark Skilton
 
Platform 3 kickoff april 4 2013 my thoughts mark skilton v2
Platform 3 kickoff april 4 2013 my thoughts  mark skilton v2Platform 3 kickoff april 4 2013 my thoughts  mark skilton v2
Platform 3 kickoff april 4 2013 my thoughts mark skilton v2Mark Skilton
 

Plus de Mark Skilton (14)

Exploring potential of ng cost of infrastructure m skilton sept 23 2014 v1
Exploring potential of ng cost of infrastructure m skilton sept 23 2014 v1Exploring potential of ng cost of infrastructure m skilton sept 23 2014 v1
Exploring potential of ng cost of infrastructure m skilton sept 23 2014 v1
 
The rise of digital ecosystems m skilton june 11 2014 conected suplychain li...
The rise of digital ecosystems  m skilton june 11 2014 conected suplychain li...The rise of digital ecosystems  m skilton june 11 2014 conected suplychain li...
The rise of digital ecosystems m skilton june 11 2014 conected suplychain li...
 
Digital security and the IT Department cw500 M Skilton May 22 2014 London v1
Digital security and the IT Department cw500 M Skilton May 22 2014 London v1Digital security and the IT Department cw500 M Skilton May 22 2014 London v1
Digital security and the IT Department cw500 M Skilton May 22 2014 London v1
 
Creating value in the digital economy Prof Mark Skilton May 2014
Creating value in the digital economy Prof Mark Skilton  May 2014 Creating value in the digital economy Prof Mark Skilton  May 2014
Creating value in the digital economy Prof Mark Skilton May 2014
 
Big data and digital ecosystem mark skilton jan 2014 v1
Big data and digital ecosystem mark skilton jan 2014 v1Big data and digital ecosystem mark skilton jan 2014 v1
Big data and digital ecosystem mark skilton jan 2014 v1
 
Knowing where the safe zone is ovum october 22 2013
Knowing where the safe zone is  ovum october 22 2013 Knowing where the safe zone is  ovum october 22 2013
Knowing where the safe zone is ovum october 22 2013
 
Identifying successful business models to drive monetization of your cloud se...
Identifying successful business models to drive monetization of your cloud se...Identifying successful business models to drive monetization of your cloud se...
Identifying successful business models to drive monetization of your cloud se...
 
Closing the gap in your cloud ecosystem capgemini mark skilton v1
Closing the gap in your cloud ecosystem capgemini mark skilton v1Closing the gap in your cloud ecosystem capgemini mark skilton v1
Closing the gap in your cloud ecosystem capgemini mark skilton v1
 
Capgemini cloud expoeurope jan 25 2012 m skilton v1.4
Capgemini cloud expoeurope jan 25 2012 m skilton  v1.4Capgemini cloud expoeurope jan 25 2012 m skilton  v1.4
Capgemini cloud expoeurope jan 25 2012 m skilton v1.4
 
EU digital agenda event standards capgemini mark skilton june 2011
EU digital agenda event standards capgemini  mark skilton june 2011EU digital agenda event standards capgemini  mark skilton june 2011
EU digital agenda event standards capgemini mark skilton june 2011
 
Cloud computing metrics for successful business architecture and strategy cap...
Cloud computing metrics for successful business architecture and strategy cap...Cloud computing metrics for successful business architecture and strategy cap...
Cloud computing metrics for successful business architecture and strategy cap...
 
Visualization of an digital ecosystem capgemini m skilton v1
Visualization of an digital ecosystem    capgemini m skilton v1Visualization of an digital ecosystem    capgemini m skilton v1
Visualization of an digital ecosystem capgemini m skilton v1
 
Digital transformation and the role of cloud computing Capgemini Mark Skilt...
Digital transformation and the role of cloud computing   Capgemini Mark Skilt...Digital transformation and the role of cloud computing   Capgemini Mark Skilt...
Digital transformation and the role of cloud computing Capgemini Mark Skilt...
 
Platform 3 kickoff april 4 2013 my thoughts mark skilton v2
Platform 3 kickoff april 4 2013 my thoughts  mark skilton v2Platform 3 kickoff april 4 2013 my thoughts  mark skilton v2
Platform 3 kickoff april 4 2013 my thoughts mark skilton v2
 

Dernier

How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 

Dernier (20)

How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 

Identity privacy and data protection in the cloud – what is being done is it enough goal capgemini m skilton v1

  • 1. Mark Skilton, Director, Strategy Office, Global Infrastructure Services Co-Chair, Cloud Computing Work Group, The Open Group Member, ISO JC38 UK Mirror +44 7787 692197 mark.skilton@capgemini.com Twitter @mskilton http://uk.linkedin.com/pub/mark-skilton/1/189/968 “Identity, Privacy, and Data Protection in the Cloud – What is Being Done? Is it Enough?”
  • 2. | Capgemini & Cloud Trust and Risk Trade-off  In the Cloud everything is perceived as untrusted and insecure  Many enterprises have company policies requiring data and access to be stored behind the Corporate firewall; transport between geographies are not allowed  Industrial certifications require physical isolation, audit and authentication processes Trust ? Internal Private Hybrid Public Physical Resources/ locations Edge Span of Insource & Outsource Span of Technology
  • 3. | Capgemini & Cloud What’s being done to Secure Cloud…….. Move data between SQL and nonSQL databases DBMS Server Legal Issues IP Patent Law – Independence of software on device and OS Bundling Legal Definition of an API e.g. Google API, MSFT API US / EU Patriot, SafeHarbor, DA rules Cultural Impact Provisioning Policy Management Amazon gets FISMA certification EU Open Data portal Open Data standards W3C EU inter- country data Use of Public APIs e.g. Google+ Twitter APIs Use of APIs/ personal Data Protection TLS, SSL Transport Layer end to end Pass through Threats Hypervisor IOP e.g. Citrix and AWS Device IOP e.g. User Experience and UI e.g. Ipad , Samsung e.g. Microsoft OS 8 – tablet IOP EU announce common Data Portal Vertical Sector B2B Schemas Vendor Technology Standards seeking Openness e.g. DMTF, ODCA, OMG CCSC Illustrative ISA Chip standards Database Scalability & Portability Hypervisor Portability & Hypervisor Interoperating Hybrid Device from service abstraction Government led Legal certifications Vertical industry Government led Standard schemas Network transport issues Choices , NSPs, ISPs API openness and ownership Multi-form factor supportability Apps, content stores access Personal/vendor Portability Market / Region Provider / Entity Network API / Gateway / Portal Device / Browser OS Server Storage Software Application Data / Payload Hypervisor Business Process DC Hosting Public Cloud Hosted Private Cloud Hosted Open Source Cloud Hosted Legal & Security Industry Nomenclatures Deployment strategies Common Industry standards Vertical Industry standards e.g. Oracle, IBM e.g. Amazon & Others e.g. open nebula TechnologyandBusinesstiers Provisioning Policies Inter-country data exchange Multi-form factor data portability Service IP component bundling Application environment Portability Storage as a Service Compute as a Service Applications as a Service Desktop as a Service Big Data as a Service Move application OpenStack, CloudStack Shifts B2B / B2C Platforms Device Store Services Social Networks, C2C Policy Areas The Open Group – Cloud Computing Interoperability Portability Project 2012 Examples of some Legal activity in last 12-24 months EU announce Data Privacy Controls
  • 4. | Capgemini & Cloud How can we get control of Identity, Privacy, and Data Protection in the Cloud ? Extensible Boundaries From Introduction to CIEL – CILE Project – an Open Group project Work in Progress Copyright SyntheticSpheres 2012 Identity – Is this controlled by User Device or By You in your Cloud Server or a Proxy Service e.g. OpenID ? Privacy – What Boundary Conditions are acceptable to you? Do you want Closed , Secure Cloud? Do you want Distributed Secure Cloud? Do you want Regional/Local Controls do you want guarantees What Legal Jurisdiction do you follow? Data Protection – Data at Rest – Encryption, IP Control Data in Transit – Encryption, Monitoring Data Age – Archive and Audit Control What Legal Jurisdiction do you follow? Provider Consumer Policy Management Boundary Policy Management Legal Contract Back to Back control
  • 5. | Capgemini & Cloud “It is impossible for a distributed computer system to simultaneously provide all three of the following guarantees: Consistency, Availability and Partitioning Tolerance”. Consistency Availability Partition Tolerance GuaranteedC A P Effectiveness Fidelity G P F Consistency Availability Partitioning Tolerance Guaranteed FidelityPerformance (Reference: Brewer Conjecture 2000, Gilbert, Lynch Formal Proof 2002) “Brewer’s Conjecture and the feasibility of consistent, available, partition-tolerant web services” http://lpd.epfl.ch/sgilbert/pubs/BrewersConjecture-SigAct.pdf ACM SIGACT News, Vol 33 Issue 2 (2002) pg 51-59 Brewers Theorem
  • 6. | Capgemini & Cloud The Case for Service Orchestration - managing your Security and Risk  Consistency and Guarantees • Strong Multi-Systems Management – Single Accountabilities • Control Failure Points in system – Strong Identity, Encryption Policies and Tools to manage Usage and Audit Compliance.  Availability and Effectiveness • Multi-Source – open technology capabilities • Business Process Orchestration – Drive Business Performance Outcomes Metrics  Partition Tolerance and Fidelity • Introduce and manage disciplined portfolio of IT and Business assets inside and outside the organization in a way that best serves the needs of consumers and providers. Govern Configuration • Preserve your elasticity - within “acceptable conditions of use” – know the tolerance levels that are within the distributed system. Consistency Availability Partition Tolerance GuaranteedC A P Effectiveness Fidelity G P F Management Orchestration Resource Management Template Contiguity Source Access Systems Management Process Orchestration