Cloud security and security architecture

Vladimir Jirasek
Vladimir JirasekFounder & Managing director, Jirasek Security Ltd - Protecting business agility à Jirasek Security Ltd
Security architecture and Cloud
computing, are these mutually
              exclusive?
 (Introduction to Cloud Security Guidance)
Agenda

   Cloud risk assessment x compared to traditional risk
    assessments
   Cloud security architectures x compared to security
    architectures
   CSA domains




                     Copyright © 2012 Cloud Security Alliance   https://cloudsecurityalliance.org.uk
Cloud risk assessment

                      Identify                                                            Context
                       assets                                                          establishment




Map the data                               Evaluate
   flows                                    assets
                                                                          Risk                                      Risk
                                                                      communication                              assessment




          Evaluate
                                 Map to Cloud
           Cloud
                                 deployments
         models and                                                                    Risk treatment
                                   models
          Providers




                                           Copyright © 2012 Cloud Security Alliance   https://cloudsecurityalliance.org.uk
Cloud model
Broad network   Rapid elasticity                 Measured                 On-demand
   access                                         service                  service

                           Resource pooling




Software as a            Platform as a                            Infrastructure
Service (SaaS)          Service (SaaS)                             as a Service
                                                                      (SaaS)


Publi            Private                      Hybrid                  Community
 c
                       Copyright © 2012 Cloud Security Alliance    https://cloudsecurityalliance.org.uk
Cloud computing deployment
    models
              Infrastructure    Infrastructure                     Infrastructure             Accessible and
               managed by         owned by                             located                 consumed by


                Third party          Third party
Public                                                                Off-premise                   Untrusted
                 provider             provider


                Organisation          Organisation                        On-premise
Private/  o
                                                                                                      Trusted
Community r       3rd party               3rdparty
                                                                          Off-Premise
                   provider               provider

          Both Organisation    Both Organisation
                                                                 Both On-Premise                    Trusted &
Hybrid      & Third party        & Third party
                                                                  & Off-Premise                     Untrusted
              provider             provider



                               Copyright © 2012 Cloud Security Alliance        https://cloudsecurityalliance.org.uk
Cloud model maps to Security model
  Cloud model


                                                                                   GRC
                                                                          Business continuity
                                                                                  SIEM
                                                                             Data security




                                                       Identity, Access
                        Direct map




                                                                                                           Cryptography
                                                                           Application sec.
                                                                             Host security
                                                                           Network security
                                                                           Physical security




                Copyright © 2012 Cloud Security Alliance                     https://cloudsecurityalliance.org.uk
Responsibilities for areas in security
model compared to delivery models
       Provider responsible                                       Customer responsible
                                                                       GRC
                                                      Business continuity
                                           SIEM
                                 Identity, Access
                                   Cryptography
                                                            Data security
                                       Application sec.
                  Host security
          Network security
        Physical security
IaaS         PaaS             SaaS                      IaaS                 PaaS                     SaaS
                            Copyright © 2012 Cloud Security Alliance         https://cloudsecurityalliance.org.uk
Cloud Security Domains
              Governance                                                    Operational
   Governance and Enterprise Risk                         Traditional Security, Business
    Management                                              Continuity and Disaster Recovery

   Legal Issues: Contracts and Electronic                 Data Center Operations
    Discovery
                                                           Incident Response, Notification and
   Compliance and Audit                                    Remediation

   Information Management and Data                        Application Security
    Security
                                                           Encryption and Key Management
   Portability and Interoperability
                                                           Identity and Access Management

                                                           Virtualization

                                                           Security as a Service

                                 Copyright © 2012 Cloud Security Alliance      https://cloudsecurityalliance.org.uk
Cloud Security Alliance supports number
of projects related to cloud




                           Get involved at
               https://cloudsecurityalliance.org/resea
                                 rch/https://cloudsecurityalliance.org.uk
              Copyright © 2012 Cloud Security Alliance
How to manage cloud security
•   Have a cloud security standard
    •   What to do on an Enterprise level
    •   Before your Cloud project
    •   During your Cloud project
                                                                   How to drive out the
    •   BAU                                                        'seven deadly sins' of
                                                                   cloud computing - new
                                                                   Information Security
    •   Exit from the Cloud provider                               Forum report


•   Risks cannot be outsourced
•   Manage lock-in and exit up-front – especially in SaaS
                       Copyright © 2012 Cloud Security Alliance   https://cloudsecurityalliance.org.uk
Contact

Help us secure cloud computing – Get involved
• http://cloudsecurityalliance.org.uk
• info@cloudsecurityalliance.org.uk
• LinkedIn: http://www.linkedin.com/groups/Cloud-
 Security-Alliance-UK-Chapter-3745837
• Twitter: @CSAUKResearch


                   Copyright © 2012 Cloud Security Alliance   https://cloudsecurityalliance.org.uk
Thank you!



        www.cloudsecurityalliance.org
1 sur 12

Recommandé

Cloud Security Architecture.pptx par
Cloud Security Architecture.pptxCloud Security Architecture.pptx
Cloud Security Architecture.pptxMoshe Ferber
619 vues46 diapositives
Cloud Security par
Cloud SecurityCloud Security
Cloud SecurityAWS User Group Bengaluru
12.4K vues133 diapositives
Cloud Security Strategy par
Cloud Security StrategyCloud Security Strategy
Cloud Security StrategyCapgemini
3.9K vues24 diapositives
Cloud Security - Security Aspects of Cloud Computing par
Cloud Security - Security Aspects of Cloud ComputingCloud Security - Security Aspects of Cloud Computing
Cloud Security - Security Aspects of Cloud ComputingJim Geovedi
13.1K vues16 diapositives
Cloud Computing Security par
Cloud Computing SecurityCloud Computing Security
Cloud Computing SecurityNinh Nguyen
41.6K vues37 diapositives
Cloud Security par
Cloud SecurityCloud Security
Cloud SecurityAWS User Group Bengaluru
1.9K vues133 diapositives

Contenu connexe

Tendances

Cloud computing and Cloud security fundamentals par
Cloud computing and Cloud security fundamentalsCloud computing and Cloud security fundamentals
Cloud computing and Cloud security fundamentalsViresh Suri
9.5K vues40 diapositives
Cloud Security: A New Perspective par
Cloud Security: A New PerspectiveCloud Security: A New Perspective
Cloud Security: A New PerspectiveWen-Pai Lu
1.5K vues29 diapositives
Cloud computing Risk management par
Cloud computing Risk management  Cloud computing Risk management
Cloud computing Risk management Padma Jella
8.9K vues19 diapositives
Privacy in cloud computing par
Privacy in cloud computingPrivacy in cloud computing
Privacy in cloud computingAhmed Nour
4.5K vues18 diapositives
Unit 2 -Cloud Computing Architecture par
Unit 2 -Cloud Computing ArchitectureUnit 2 -Cloud Computing Architecture
Unit 2 -Cloud Computing ArchitectureMonishaNehkal
655 vues23 diapositives
Cloud computing and data security par
Cloud computing and data securityCloud computing and data security
Cloud computing and data securityMohammed Fazuluddin
17.7K vues28 diapositives

Tendances(20)

Cloud computing and Cloud security fundamentals par Viresh Suri
Cloud computing and Cloud security fundamentalsCloud computing and Cloud security fundamentals
Cloud computing and Cloud security fundamentals
Viresh Suri9.5K vues
Cloud Security: A New Perspective par Wen-Pai Lu
Cloud Security: A New PerspectiveCloud Security: A New Perspective
Cloud Security: A New Perspective
Wen-Pai Lu1.5K vues
Cloud computing Risk management par Padma Jella
Cloud computing Risk management  Cloud computing Risk management
Cloud computing Risk management
Padma Jella8.9K vues
Privacy in cloud computing par Ahmed Nour
Privacy in cloud computingPrivacy in cloud computing
Privacy in cloud computing
Ahmed Nour4.5K vues
Unit 2 -Cloud Computing Architecture par MonishaNehkal
Unit 2 -Cloud Computing ArchitectureUnit 2 -Cloud Computing Architecture
Unit 2 -Cloud Computing Architecture
MonishaNehkal655 vues
Cloud computing-security-issues par Aleem Mohammed
Cloud computing-security-issuesCloud computing-security-issues
Cloud computing-security-issues
Aleem Mohammed3.9K vues
Cloud security Presentation par Ajay p
Cloud security PresentationCloud security Presentation
Cloud security Presentation
Ajay p4.9K vues
Cloud Security And Privacy par tmather
Cloud Security And PrivacyCloud Security And Privacy
Cloud Security And Privacy
tmather4.8K vues
Cloud computing security issues and challenges par Dheeraj Negi
Cloud computing security issues and challengesCloud computing security issues and challenges
Cloud computing security issues and challenges
Dheeraj Negi30.3K vues
security Issues of cloud computing par prachupanchal
security Issues of cloud computingsecurity Issues of cloud computing
security Issues of cloud computing
prachupanchal1.4K vues
Data security in cloud computing par Prince Chandu
Data security in cloud computingData security in cloud computing
Data security in cloud computing
Prince Chandu77.5K vues

Similaire à Cloud security and security architecture

2012 10 cloud security architecture par
2012 10 cloud security architecture2012 10 cloud security architecture
2012 10 cloud security architectureVladimir Jirasek
1K vues7 diapositives
Integrated Cloud Framework: Security, Governance, Compliance, Content Applica... par
Integrated Cloud Framework: Security, Governance, Compliance, Content Applica...Integrated Cloud Framework: Security, Governance, Compliance, Content Applica...
Integrated Cloud Framework: Security, Governance, Compliance, Content Applica...Chad Lawler
4K vues19 diapositives
Resarch paper i cloud computing par
Resarch paper   i cloud computingResarch paper   i cloud computing
Resarch paper i cloud computingBharat Gupta
567 vues9 diapositives
null Bangalore meet - Cloud Computing and Security par
null Bangalore meet - Cloud Computing and Securitynull Bangalore meet - Cloud Computing and Security
null Bangalore meet - Cloud Computing and Securityn|u - The Open Security Community
2.6K vues34 diapositives
What customers want the cloud to be - Jason Waxman GM at Intel, Cloud Slam 20... par
What customers want the cloud to be - Jason Waxman GM at Intel, Cloud Slam 20...What customers want the cloud to be - Jason Waxman GM at Intel, Cloud Slam 20...
What customers want the cloud to be - Jason Waxman GM at Intel, Cloud Slam 20...Khazret Sapenov
692 vues30 diapositives
Lss implementing cyber security in the cloud, and from the cloud-feb14 par
Lss implementing cyber security in the cloud, and from the cloud-feb14Lss implementing cyber security in the cloud, and from the cloud-feb14
Lss implementing cyber security in the cloud, and from the cloud-feb14L S Subramanian
535 vues21 diapositives

Similaire à Cloud security and security architecture(20)

Integrated Cloud Framework: Security, Governance, Compliance, Content Applica... par Chad Lawler
Integrated Cloud Framework: Security, Governance, Compliance, Content Applica...Integrated Cloud Framework: Security, Governance, Compliance, Content Applica...
Integrated Cloud Framework: Security, Governance, Compliance, Content Applica...
Chad Lawler4K vues
Resarch paper i cloud computing par Bharat Gupta
Resarch paper   i cloud computingResarch paper   i cloud computing
Resarch paper i cloud computing
Bharat Gupta567 vues
What customers want the cloud to be - Jason Waxman GM at Intel, Cloud Slam 20... par Khazret Sapenov
What customers want the cloud to be - Jason Waxman GM at Intel, Cloud Slam 20...What customers want the cloud to be - Jason Waxman GM at Intel, Cloud Slam 20...
What customers want the cloud to be - Jason Waxman GM at Intel, Cloud Slam 20...
Khazret Sapenov692 vues
Lss implementing cyber security in the cloud, and from the cloud-feb14 par L S Subramanian
Lss implementing cyber security in the cloud, and from the cloud-feb14Lss implementing cyber security in the cloud, and from the cloud-feb14
Lss implementing cyber security in the cloud, and from the cloud-feb14
L S Subramanian535 vues
Cloud security ely kahn par Ely Kahn
Cloud security   ely kahnCloud security   ely kahn
Cloud security ely kahn
Ely Kahn943 vues
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A... par Amazon Web Services
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
Deepsecurity & VDI beveiliging, maximale beveiliging en optimale performance par UNIT4 IT Solutions
Deepsecurity & VDI beveiliging, maximale beveiliging en optimale performanceDeepsecurity & VDI beveiliging, maximale beveiliging en optimale performance
Deepsecurity & VDI beveiliging, maximale beveiliging en optimale performance
AWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNet par Amazon Web Services
AWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNetAWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNet
AWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNet
451 Research Client Event Nov 10 par stavvmc
451 Research Client Event Nov 10451 Research Client Event Nov 10
451 Research Client Event Nov 10
stavvmc422 vues

Plus de Vladimir Jirasek

Vulnerability management - beyond scanning par
Vulnerability management - beyond scanningVulnerability management - beyond scanning
Vulnerability management - beyond scanningVladimir Jirasek
287 vues11 diapositives
Vulnerability Management @ DevSecOps London Gathering par
Vulnerability Management @ DevSecOps London GatheringVulnerability Management @ DevSecOps London Gathering
Vulnerability Management @ DevSecOps London GatheringVladimir Jirasek
196 vues7 diapositives
C-Level tools for Cloud security par
C-Level tools for Cloud securityC-Level tools for Cloud security
C-Level tools for Cloud securityVladimir Jirasek
827 vues7 diapositives
Secure your cloud applications by building solid foundations with enterprise ... par
Secure your cloud applications by building solid foundations with enterprise ...Secure your cloud applications by building solid foundations with enterprise ...
Secure your cloud applications by building solid foundations with enterprise ...Vladimir Jirasek
1.8K vues35 diapositives
Mobile phone as Trusted identity assistant par
Mobile phone as Trusted identity assistantMobile phone as Trusted identity assistant
Mobile phone as Trusted identity assistantVladimir Jirasek
1.5K vues18 diapositives
Security architecture for LSE 2009 par
Security architecture for LSE 2009Security architecture for LSE 2009
Security architecture for LSE 2009Vladimir Jirasek
725 vues34 diapositives

Plus de Vladimir Jirasek(16)

Vulnerability management - beyond scanning par Vladimir Jirasek
Vulnerability management - beyond scanningVulnerability management - beyond scanning
Vulnerability management - beyond scanning
Vladimir Jirasek287 vues
Vulnerability Management @ DevSecOps London Gathering par Vladimir Jirasek
Vulnerability Management @ DevSecOps London GatheringVulnerability Management @ DevSecOps London Gathering
Vulnerability Management @ DevSecOps London Gathering
Vladimir Jirasek196 vues
Secure your cloud applications by building solid foundations with enterprise ... par Vladimir Jirasek
Secure your cloud applications by building solid foundations with enterprise ...Secure your cloud applications by building solid foundations with enterprise ...
Secure your cloud applications by building solid foundations with enterprise ...
Vladimir Jirasek1.8K vues
Mobile phone as Trusted identity assistant par Vladimir Jirasek
Mobile phone as Trusted identity assistantMobile phone as Trusted identity assistant
Mobile phone as Trusted identity assistant
Vladimir Jirasek1.5K vues
Mobile security summit - 10 mobile risks par Vladimir Jirasek
Mobile security summit - 10 mobile risksMobile security summit - 10 mobile risks
Mobile security summit - 10 mobile risks
Vladimir Jirasek2.7K vues
Information Risk Security model and metrics par Vladimir Jirasek
Information Risk Security model and metricsInformation Risk Security model and metrics
Information Risk Security model and metrics
Vladimir Jirasek1.5K vues
Integrating Qualys into the patch and vulnerability management processes par Vladimir Jirasek
Integrating Qualys into the patch and vulnerability management processesIntegrating Qualys into the patch and vulnerability management processes
Integrating Qualys into the patch and vulnerability management processes
Vladimir Jirasek2.5K vues
Securing mobile population for White Hats par Vladimir Jirasek
Securing mobile population for White HatsSecuring mobile population for White Hats
Securing mobile population for White Hats
Vladimir Jirasek615 vues
Security models for security architecture par Vladimir Jirasek
Security models for security architectureSecurity models for security architecture
Security models for security architecture
Vladimir Jirasek17.9K vues
CAMM presentation for Cyber Security Gas and Oil june 2011 par Vladimir Jirasek
CAMM presentation for Cyber Security Gas and Oil june 2011CAMM presentation for Cyber Security Gas and Oil june 2011
CAMM presentation for Cyber Security Gas and Oil june 2011
Vladimir Jirasek740 vues
ISE UK&Ireland 2008 Showcase Nominee Presentation Vladimir Jirasek par Vladimir Jirasek
ISE UK&Ireland 2008  Showcase Nominee Presentation Vladimir JirasekISE UK&Ireland 2008  Showcase Nominee Presentation Vladimir Jirasek
ISE UK&Ireland 2008 Showcase Nominee Presentation Vladimir Jirasek
Vladimir Jirasek412 vues
Federation For The Cloud Opportunities For A Single Identity par Vladimir Jirasek
Federation For The Cloud  Opportunities For A Single IdentityFederation For The Cloud  Opportunities For A Single Identity
Federation For The Cloud Opportunities For A Single Identity
Vladimir Jirasek6.6K vues

Dernier

VNF Integration and Support in CloudStack - Wei Zhou - ShapeBlue par
VNF Integration and Support in CloudStack - Wei Zhou - ShapeBlueVNF Integration and Support in CloudStack - Wei Zhou - ShapeBlue
VNF Integration and Support in CloudStack - Wei Zhou - ShapeBlueShapeBlue
85 vues54 diapositives
HTTP headers that make your website go faster - devs.gent November 2023 par
HTTP headers that make your website go faster - devs.gent November 2023HTTP headers that make your website go faster - devs.gent November 2023
HTTP headers that make your website go faster - devs.gent November 2023Thijs Feryn
28 vues151 diapositives
Backroll, News and Demo - Pierre Charton, Matthias Dhellin, Ousmane Diarra - ... par
Backroll, News and Demo - Pierre Charton, Matthias Dhellin, Ousmane Diarra - ...Backroll, News and Demo - Pierre Charton, Matthias Dhellin, Ousmane Diarra - ...
Backroll, News and Demo - Pierre Charton, Matthias Dhellin, Ousmane Diarra - ...ShapeBlue
83 vues15 diapositives
Don’t Make A Human Do A Robot’s Job! : 6 Reasons Why AI Will Save Us & Not De... par
Don’t Make A Human Do A Robot’s Job! : 6 Reasons Why AI Will Save Us & Not De...Don’t Make A Human Do A Robot’s Job! : 6 Reasons Why AI Will Save Us & Not De...
Don’t Make A Human Do A Robot’s Job! : 6 Reasons Why AI Will Save Us & Not De...Moses Kemibaro
29 vues38 diapositives
The Research Portal of Catalonia: Growing more (information) & more (services) par
The Research Portal of Catalonia: Growing more (information) & more (services)The Research Portal of Catalonia: Growing more (information) & more (services)
The Research Portal of Catalonia: Growing more (information) & more (services)CSUC - Consorci de Serveis Universitaris de Catalunya
136 vues25 diapositives
PharoJS - Zürich Smalltalk Group Meetup November 2023 par
PharoJS - Zürich Smalltalk Group Meetup November 2023PharoJS - Zürich Smalltalk Group Meetup November 2023
PharoJS - Zürich Smalltalk Group Meetup November 2023Noury Bouraqadi
141 vues17 diapositives

Dernier(20)

VNF Integration and Support in CloudStack - Wei Zhou - ShapeBlue par ShapeBlue
VNF Integration and Support in CloudStack - Wei Zhou - ShapeBlueVNF Integration and Support in CloudStack - Wei Zhou - ShapeBlue
VNF Integration and Support in CloudStack - Wei Zhou - ShapeBlue
ShapeBlue85 vues
HTTP headers that make your website go faster - devs.gent November 2023 par Thijs Feryn
HTTP headers that make your website go faster - devs.gent November 2023HTTP headers that make your website go faster - devs.gent November 2023
HTTP headers that make your website go faster - devs.gent November 2023
Thijs Feryn28 vues
Backroll, News and Demo - Pierre Charton, Matthias Dhellin, Ousmane Diarra - ... par ShapeBlue
Backroll, News and Demo - Pierre Charton, Matthias Dhellin, Ousmane Diarra - ...Backroll, News and Demo - Pierre Charton, Matthias Dhellin, Ousmane Diarra - ...
Backroll, News and Demo - Pierre Charton, Matthias Dhellin, Ousmane Diarra - ...
ShapeBlue83 vues
Don’t Make A Human Do A Robot’s Job! : 6 Reasons Why AI Will Save Us & Not De... par Moses Kemibaro
Don’t Make A Human Do A Robot’s Job! : 6 Reasons Why AI Will Save Us & Not De...Don’t Make A Human Do A Robot’s Job! : 6 Reasons Why AI Will Save Us & Not De...
Don’t Make A Human Do A Robot’s Job! : 6 Reasons Why AI Will Save Us & Not De...
Moses Kemibaro29 vues
PharoJS - Zürich Smalltalk Group Meetup November 2023 par Noury Bouraqadi
PharoJS - Zürich Smalltalk Group Meetup November 2023PharoJS - Zürich Smalltalk Group Meetup November 2023
PharoJS - Zürich Smalltalk Group Meetup November 2023
Noury Bouraqadi141 vues
CloudStack and GitOps at Enterprise Scale - Alex Dometrius, Rene Glover - AT&T par ShapeBlue
CloudStack and GitOps at Enterprise Scale - Alex Dometrius, Rene Glover - AT&TCloudStack and GitOps at Enterprise Scale - Alex Dometrius, Rene Glover - AT&T
CloudStack and GitOps at Enterprise Scale - Alex Dometrius, Rene Glover - AT&T
ShapeBlue56 vues
Zero to Cloud Hero: Crafting a Private Cloud from Scratch with XCP-ng, Xen Or... par ShapeBlue
Zero to Cloud Hero: Crafting a Private Cloud from Scratch with XCP-ng, Xen Or...Zero to Cloud Hero: Crafting a Private Cloud from Scratch with XCP-ng, Xen Or...
Zero to Cloud Hero: Crafting a Private Cloud from Scratch with XCP-ng, Xen Or...
ShapeBlue88 vues
NTGapps NTG LowCode Platform par Mustafa Kuğu
NTGapps NTG LowCode Platform NTGapps NTG LowCode Platform
NTGapps NTG LowCode Platform
Mustafa Kuğu141 vues
2FA and OAuth2 in CloudStack - Andrija Panić - ShapeBlue par ShapeBlue
2FA and OAuth2 in CloudStack - Andrija Panić - ShapeBlue2FA and OAuth2 in CloudStack - Andrija Panić - ShapeBlue
2FA and OAuth2 in CloudStack - Andrija Panić - ShapeBlue
ShapeBlue50 vues
Developments to CloudStack’s SDN ecosystem: Integration with VMWare NSX 4 - P... par ShapeBlue
Developments to CloudStack’s SDN ecosystem: Integration with VMWare NSX 4 - P...Developments to CloudStack’s SDN ecosystem: Integration with VMWare NSX 4 - P...
Developments to CloudStack’s SDN ecosystem: Integration with VMWare NSX 4 - P...
ShapeBlue82 vues
CloudStack Object Storage - An Introduction - Vladimir Petrov - ShapeBlue par ShapeBlue
CloudStack Object Storage - An Introduction - Vladimir Petrov - ShapeBlueCloudStack Object Storage - An Introduction - Vladimir Petrov - ShapeBlue
CloudStack Object Storage - An Introduction - Vladimir Petrov - ShapeBlue
ShapeBlue46 vues
DRaaS using Snapshot copy and destination selection (DRaaS) - Alexandre Matti... par ShapeBlue
DRaaS using Snapshot copy and destination selection (DRaaS) - Alexandre Matti...DRaaS using Snapshot copy and destination selection (DRaaS) - Alexandre Matti...
DRaaS using Snapshot copy and destination selection (DRaaS) - Alexandre Matti...
ShapeBlue46 vues
Why and How CloudStack at weSystems - Stephan Bienek - weSystems par ShapeBlue
Why and How CloudStack at weSystems - Stephan Bienek - weSystemsWhy and How CloudStack at weSystems - Stephan Bienek - weSystems
Why and How CloudStack at weSystems - Stephan Bienek - weSystems
ShapeBlue111 vues
State of the Union - Rohit Yadav - Apache CloudStack par ShapeBlue
State of the Union - Rohit Yadav - Apache CloudStackState of the Union - Rohit Yadav - Apache CloudStack
State of the Union - Rohit Yadav - Apache CloudStack
ShapeBlue145 vues
GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N... par James Anderson
GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N...GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N...
GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N...
James Anderson133 vues

Cloud security and security architecture

  • 1. Security architecture and Cloud computing, are these mutually exclusive? (Introduction to Cloud Security Guidance)
  • 2. Agenda  Cloud risk assessment x compared to traditional risk assessments  Cloud security architectures x compared to security architectures  CSA domains Copyright © 2012 Cloud Security Alliance https://cloudsecurityalliance.org.uk
  • 3. Cloud risk assessment Identify Context assets establishment Map the data Evaluate flows assets Risk Risk communication assessment Evaluate Map to Cloud Cloud deployments models and Risk treatment models Providers Copyright © 2012 Cloud Security Alliance https://cloudsecurityalliance.org.uk
  • 4. Cloud model Broad network Rapid elasticity Measured On-demand access service service Resource pooling Software as a Platform as a Infrastructure Service (SaaS) Service (SaaS) as a Service (SaaS) Publi Private Hybrid Community c Copyright © 2012 Cloud Security Alliance https://cloudsecurityalliance.org.uk
  • 5. Cloud computing deployment models Infrastructure Infrastructure Infrastructure Accessible and managed by owned by located consumed by Third party Third party Public Off-premise Untrusted provider provider Organisation Organisation On-premise Private/ o Trusted Community r 3rd party 3rdparty Off-Premise provider provider Both Organisation Both Organisation Both On-Premise Trusted & Hybrid & Third party & Third party & Off-Premise Untrusted provider provider Copyright © 2012 Cloud Security Alliance https://cloudsecurityalliance.org.uk
  • 6. Cloud model maps to Security model Cloud model GRC Business continuity SIEM Data security Identity, Access Direct map Cryptography Application sec. Host security Network security Physical security Copyright © 2012 Cloud Security Alliance https://cloudsecurityalliance.org.uk
  • 7. Responsibilities for areas in security model compared to delivery models Provider responsible Customer responsible GRC Business continuity SIEM Identity, Access Cryptography Data security Application sec. Host security Network security Physical security IaaS PaaS SaaS IaaS PaaS SaaS Copyright © 2012 Cloud Security Alliance https://cloudsecurityalliance.org.uk
  • 8. Cloud Security Domains Governance Operational  Governance and Enterprise Risk  Traditional Security, Business Management Continuity and Disaster Recovery  Legal Issues: Contracts and Electronic  Data Center Operations Discovery  Incident Response, Notification and  Compliance and Audit Remediation  Information Management and Data  Application Security Security  Encryption and Key Management  Portability and Interoperability  Identity and Access Management  Virtualization  Security as a Service Copyright © 2012 Cloud Security Alliance https://cloudsecurityalliance.org.uk
  • 9. Cloud Security Alliance supports number of projects related to cloud Get involved at https://cloudsecurityalliance.org/resea rch/https://cloudsecurityalliance.org.uk Copyright © 2012 Cloud Security Alliance
  • 10. How to manage cloud security • Have a cloud security standard • What to do on an Enterprise level • Before your Cloud project • During your Cloud project How to drive out the • BAU 'seven deadly sins' of cloud computing - new Information Security • Exit from the Cloud provider Forum report • Risks cannot be outsourced • Manage lock-in and exit up-front – especially in SaaS Copyright © 2012 Cloud Security Alliance https://cloudsecurityalliance.org.uk
  • 11. Contact Help us secure cloud computing – Get involved • http://cloudsecurityalliance.org.uk • info@cloudsecurityalliance.org.uk • LinkedIn: http://www.linkedin.com/groups/Cloud- Security-Alliance-UK-Chapter-3745837 • Twitter: @CSAUKResearch Copyright © 2012 Cloud Security Alliance https://cloudsecurityalliance.org.uk
  • 12. Thank you! www.cloudsecurityalliance.org

Notes de l'éditeur

  1. Do visit the websiteDo join the LinkedIn Groups – you will receive regular email updates