Soumettre la recherche
Mettre en ligne
Cloud security and security architecture
•
Télécharger en tant que PPTX, PDF
•
19 j'aime
•
27,879 vues
Vladimir Jirasek
Suivre
Presentation that I gave at ISC2 SecureLondon conference in London on 11th December 2012.
Lire moins
Lire la suite
Technologie
Signaler
Partager
Signaler
Partager
1 sur 12
Télécharger maintenant
Recommandé
Cloud Security: A New Perspective
Cloud Security: A New Perspective
Wen-Pai Lu
Cloud Computing Security
Cloud Computing Security
Ninh Nguyen
Cloud security Presentation
Cloud security Presentation
Ajay p
Cloud computing and data security
Cloud computing and data security
Mohammed Fazuluddin
Cloud security ppt
Cloud security ppt
Venkatesh Chary
Cloud computing security issues and challenges
Cloud computing security issues and challenges
Dheeraj Negi
Cloud Security - Security Aspects of Cloud Computing
Cloud Security - Security Aspects of Cloud Computing
Jim Geovedi
Cloud Security
Cloud Security
AWS User Group Bengaluru
Recommandé
Cloud Security: A New Perspective
Cloud Security: A New Perspective
Wen-Pai Lu
Cloud Computing Security
Cloud Computing Security
Ninh Nguyen
Cloud security Presentation
Cloud security Presentation
Ajay p
Cloud computing and data security
Cloud computing and data security
Mohammed Fazuluddin
Cloud security ppt
Cloud security ppt
Venkatesh Chary
Cloud computing security issues and challenges
Cloud computing security issues and challenges
Dheeraj Negi
Cloud Security - Security Aspects of Cloud Computing
Cloud Security - Security Aspects of Cloud Computing
Jim Geovedi
Cloud Security
Cloud Security
AWS User Group Bengaluru
Cloud Security
Cloud Security
AWS User Group Bengaluru
Cloud Security And Privacy
Cloud Security And Privacy
tmather
Multi cloud security architecture
Multi cloud security architecture
Maganathin Veeraragaloo
Security Issues of Cloud Computing
Security Issues of Cloud Computing
Falgun Rathod
Cloud Security Architecture.pptx
Cloud Security Architecture.pptx
Moshe Ferber
What is zero trust model (ztm)
What is zero trust model (ztm)
Ahmed Banafa
security Issues of cloud computing
security Issues of cloud computing
prachupanchal
Cloud computing and Cloud security fundamentals
Cloud computing and Cloud security fundamentals
Viresh Suri
Cyber Security and Cloud Computing
Cyber Security and Cloud Computing
Keet Sugathadasa
Zero Trust Model Presentation
Zero Trust Model Presentation
Gowdhaman Jothilingam
Cloud security
Cloud security
Tushar Kayande
Cloud security
Cloud security
Niharika Varshney
Cloud Security
Cloud Security
Devyani Vaidya
CLOUD NATIVE SECURITY
CLOUD NATIVE SECURITY
Maganathin Veeraragaloo
cloud security ppt
cloud security ppt
Devyani Vaidya
Cloud deployment models
Cloud deployment models
Ashok Kumar
Security in cloud computing
Security in cloud computing
veena venugopal
Zero trust in a hybrid architecture
Zero trust in a hybrid architecture
Hybrid IT Europe
Chap 6 cloud security
Chap 6 cloud security
Raj Sarode
Cloud computing-security-issues
Cloud computing-security-issues
Aleem Mohammed
2012 10 cloud security architecture
2012 10 cloud security architecture
Vladimir Jirasek
Integrated Cloud Framework: Security, Governance, Compliance, Content Applica...
Integrated Cloud Framework: Security, Governance, Compliance, Content Applica...
Chad Lawler
Contenu connexe
Tendances
Cloud Security
Cloud Security
AWS User Group Bengaluru
Cloud Security And Privacy
Cloud Security And Privacy
tmather
Multi cloud security architecture
Multi cloud security architecture
Maganathin Veeraragaloo
Security Issues of Cloud Computing
Security Issues of Cloud Computing
Falgun Rathod
Cloud Security Architecture.pptx
Cloud Security Architecture.pptx
Moshe Ferber
What is zero trust model (ztm)
What is zero trust model (ztm)
Ahmed Banafa
security Issues of cloud computing
security Issues of cloud computing
prachupanchal
Cloud computing and Cloud security fundamentals
Cloud computing and Cloud security fundamentals
Viresh Suri
Cyber Security and Cloud Computing
Cyber Security and Cloud Computing
Keet Sugathadasa
Zero Trust Model Presentation
Zero Trust Model Presentation
Gowdhaman Jothilingam
Cloud security
Cloud security
Tushar Kayande
Cloud security
Cloud security
Niharika Varshney
Cloud Security
Cloud Security
Devyani Vaidya
CLOUD NATIVE SECURITY
CLOUD NATIVE SECURITY
Maganathin Veeraragaloo
cloud security ppt
cloud security ppt
Devyani Vaidya
Cloud deployment models
Cloud deployment models
Ashok Kumar
Security in cloud computing
Security in cloud computing
veena venugopal
Zero trust in a hybrid architecture
Zero trust in a hybrid architecture
Hybrid IT Europe
Chap 6 cloud security
Chap 6 cloud security
Raj Sarode
Cloud computing-security-issues
Cloud computing-security-issues
Aleem Mohammed
Tendances
(20)
Cloud Security
Cloud Security
Cloud Security And Privacy
Cloud Security And Privacy
Multi cloud security architecture
Multi cloud security architecture
Security Issues of Cloud Computing
Security Issues of Cloud Computing
Cloud Security Architecture.pptx
Cloud Security Architecture.pptx
What is zero trust model (ztm)
What is zero trust model (ztm)
security Issues of cloud computing
security Issues of cloud computing
Cloud computing and Cloud security fundamentals
Cloud computing and Cloud security fundamentals
Cyber Security and Cloud Computing
Cyber Security and Cloud Computing
Zero Trust Model Presentation
Zero Trust Model Presentation
Cloud security
Cloud security
Cloud security
Cloud security
Cloud Security
Cloud Security
CLOUD NATIVE SECURITY
CLOUD NATIVE SECURITY
cloud security ppt
cloud security ppt
Cloud deployment models
Cloud deployment models
Security in cloud computing
Security in cloud computing
Zero trust in a hybrid architecture
Zero trust in a hybrid architecture
Chap 6 cloud security
Chap 6 cloud security
Cloud computing-security-issues
Cloud computing-security-issues
Similaire à Cloud security and security architecture
2012 10 cloud security architecture
2012 10 cloud security architecture
Vladimir Jirasek
Integrated Cloud Framework: Security, Governance, Compliance, Content Applica...
Integrated Cloud Framework: Security, Governance, Compliance, Content Applica...
Chad Lawler
Resarch paper i cloud computing
Resarch paper i cloud computing
Bharat Gupta
null Bangalore meet - Cloud Computing and Security
null Bangalore meet - Cloud Computing and Security
n|u - The Open Security Community
What customers want the cloud to be - Jason Waxman GM at Intel, Cloud Slam 20...
What customers want the cloud to be - Jason Waxman GM at Intel, Cloud Slam 20...
Khazret Sapenov
Lss implementing cyber security in the cloud, and from the cloud-feb14
Lss implementing cyber security in the cloud, and from the cloud-feb14
L S Subramanian
Smart, Data-Centric Security for the Post-PC Era
Smart, Data-Centric Security for the Post-PC Era
Trend Micro (EMEA) Limited
Cloud security ely kahn
Cloud security ely kahn
Ely Kahn
Cloud Security - Made simple
Cloud Security - Made simple
Sameer Paradia
Enterprise Security in Cloud
Enterprise Security in Cloud
Lenin Aboagye
Enterprise Security in Hybrid Cloud ISACA-SV 2012
Enterprise Security in Hybrid Cloud ISACA-SV 2012
Symosis Security (Previously C-Level Security)
Security of,for & by cloud
Security of,for & by cloud
Lakshmi Subramanian
Cisco tec chris young - security intelligence operations
Cisco tec chris young - security intelligence operations
Cisco Public Relations
Cloud computing
Cloud computing
saralaanuj
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
Amazon Web Services
Deepsecurity & VDI beveiliging, maximale beveiliging en optimale performance
Deepsecurity & VDI beveiliging, maximale beveiliging en optimale performance
UNIT4 IT Solutions
CloudPassage Overview
CloudPassage Overview
CloudPassage
AWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNet
AWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNet
Amazon Web Services
Virtualization And Cloud Impact Overview Auditor Spin Enterprise Gr Cv4
Virtualization And Cloud Impact Overview Auditor Spin Enterprise Gr Cv4
EnterpriseGRC Solutions, Inc.
451 Research Client Event Nov 10
451 Research Client Event Nov 10
stavvmc
Similaire à Cloud security and security architecture
(20)
2012 10 cloud security architecture
2012 10 cloud security architecture
Integrated Cloud Framework: Security, Governance, Compliance, Content Applica...
Integrated Cloud Framework: Security, Governance, Compliance, Content Applica...
Resarch paper i cloud computing
Resarch paper i cloud computing
null Bangalore meet - Cloud Computing and Security
null Bangalore meet - Cloud Computing and Security
What customers want the cloud to be - Jason Waxman GM at Intel, Cloud Slam 20...
What customers want the cloud to be - Jason Waxman GM at Intel, Cloud Slam 20...
Lss implementing cyber security in the cloud, and from the cloud-feb14
Lss implementing cyber security in the cloud, and from the cloud-feb14
Smart, Data-Centric Security for the Post-PC Era
Smart, Data-Centric Security for the Post-PC Era
Cloud security ely kahn
Cloud security ely kahn
Cloud Security - Made simple
Cloud Security - Made simple
Enterprise Security in Cloud
Enterprise Security in Cloud
Enterprise Security in Hybrid Cloud ISACA-SV 2012
Enterprise Security in Hybrid Cloud ISACA-SV 2012
Security of,for & by cloud
Security of,for & by cloud
Cisco tec chris young - security intelligence operations
Cisco tec chris young - security intelligence operations
Cloud computing
Cloud computing
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
Deepsecurity & VDI beveiliging, maximale beveiliging en optimale performance
Deepsecurity & VDI beveiliging, maximale beveiliging en optimale performance
CloudPassage Overview
CloudPassage Overview
AWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNet
AWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNet
Virtualization And Cloud Impact Overview Auditor Spin Enterprise Gr Cv4
Virtualization And Cloud Impact Overview Auditor Spin Enterprise Gr Cv4
451 Research Client Event Nov 10
451 Research Client Event Nov 10
Plus de Vladimir Jirasek
Vulnerability management - beyond scanning
Vulnerability management - beyond scanning
Vladimir Jirasek
Vulnerability Management @ DevSecOps London Gathering
Vulnerability Management @ DevSecOps London Gathering
Vladimir Jirasek
C-Level tools for Cloud security
C-Level tools for Cloud security
Vladimir Jirasek
Secure your cloud applications by building solid foundations with enterprise ...
Secure your cloud applications by building solid foundations with enterprise ...
Vladimir Jirasek
Mobile phone as Trusted identity assistant
Mobile phone as Trusted identity assistant
Vladimir Jirasek
Security architecture for LSE 2009
Security architecture for LSE 2009
Vladimir Jirasek
Mobile security summit - 10 mobile risks
Mobile security summit - 10 mobile risks
Vladimir Jirasek
Information Risk Security model and metrics
Information Risk Security model and metrics
Vladimir Jirasek
Integrating Qualys into the patch and vulnerability management processes
Integrating Qualys into the patch and vulnerability management processes
Vladimir Jirasek
Securing mobile population for White Hats
Securing mobile population for White Hats
Vladimir Jirasek
Security models for security architecture
Security models for security architecture
Vladimir Jirasek
Meaningfull security metrics
Meaningfull security metrics
Vladimir Jirasek
CAMM presentation for Cyber Security Gas and Oil june 2011
CAMM presentation for Cyber Security Gas and Oil june 2011
Vladimir Jirasek
ISE UK&Ireland 2008 Showcase Nominee Presentation Vladimir Jirasek
ISE UK&Ireland 2008 Showcase Nominee Presentation Vladimir Jirasek
Vladimir Jirasek
Qualys Webex 24 June 2008
Qualys Webex 24 June 2008
Vladimir Jirasek
Federation For The Cloud Opportunities For A Single Identity
Federation For The Cloud Opportunities For A Single Identity
Vladimir Jirasek
Plus de Vladimir Jirasek
(16)
Vulnerability management - beyond scanning
Vulnerability management - beyond scanning
Vulnerability Management @ DevSecOps London Gathering
Vulnerability Management @ DevSecOps London Gathering
C-Level tools for Cloud security
C-Level tools for Cloud security
Secure your cloud applications by building solid foundations with enterprise ...
Secure your cloud applications by building solid foundations with enterprise ...
Mobile phone as Trusted identity assistant
Mobile phone as Trusted identity assistant
Security architecture for LSE 2009
Security architecture for LSE 2009
Mobile security summit - 10 mobile risks
Mobile security summit - 10 mobile risks
Information Risk Security model and metrics
Information Risk Security model and metrics
Integrating Qualys into the patch and vulnerability management processes
Integrating Qualys into the patch and vulnerability management processes
Securing mobile population for White Hats
Securing mobile population for White Hats
Security models for security architecture
Security models for security architecture
Meaningfull security metrics
Meaningfull security metrics
CAMM presentation for Cyber Security Gas and Oil june 2011
CAMM presentation for Cyber Security Gas and Oil june 2011
ISE UK&Ireland 2008 Showcase Nominee Presentation Vladimir Jirasek
ISE UK&Ireland 2008 Showcase Nominee Presentation Vladimir Jirasek
Qualys Webex 24 June 2008
Qualys Webex 24 June 2008
Federation For The Cloud Opportunities For A Single Identity
Federation For The Cloud Opportunities For A Single Identity
Dernier
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
Andrey Devyatkin
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
Pixlogix Infotech
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
Rafal Los
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
hans926745
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
Maria Levchenko
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
Gabriella Davis
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
wesley chun
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
Product Anonymous
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
HampshireHUG
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
Michael W. Hawkins
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
UK Journal
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
apidays
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
DianaGray10
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
ThousandEyes
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
Igalia
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
Principled Technologies
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
Anna Loughnan Colquhoun
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
lior mazor
Dernier
(20)
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
Cloud security and security architecture
1.
Security architecture and
Cloud computing, are these mutually exclusive? (Introduction to Cloud Security Guidance)
2.
Agenda
Cloud risk assessment x compared to traditional risk assessments Cloud security architectures x compared to security architectures CSA domains Copyright © 2012 Cloud Security Alliance https://cloudsecurityalliance.org.uk
3.
Cloud risk assessment
Identify Context assets establishment Map the data Evaluate flows assets Risk Risk communication assessment Evaluate Map to Cloud Cloud deployments models and Risk treatment models Providers Copyright © 2012 Cloud Security Alliance https://cloudsecurityalliance.org.uk
4.
Cloud model Broad network
Rapid elasticity Measured On-demand access service service Resource pooling Software as a Platform as a Infrastructure Service (SaaS) Service (SaaS) as a Service (SaaS) Publi Private Hybrid Community c Copyright © 2012 Cloud Security Alliance https://cloudsecurityalliance.org.uk
5.
Cloud computing deployment
models Infrastructure Infrastructure Infrastructure Accessible and managed by owned by located consumed by Third party Third party Public Off-premise Untrusted provider provider Organisation Organisation On-premise Private/ o Trusted Community r 3rd party 3rdparty Off-Premise provider provider Both Organisation Both Organisation Both On-Premise Trusted & Hybrid & Third party & Third party & Off-Premise Untrusted provider provider Copyright © 2012 Cloud Security Alliance https://cloudsecurityalliance.org.uk
6.
Cloud model maps
to Security model Cloud model GRC Business continuity SIEM Data security Identity, Access Direct map Cryptography Application sec. Host security Network security Physical security Copyright © 2012 Cloud Security Alliance https://cloudsecurityalliance.org.uk
7.
Responsibilities for areas
in security model compared to delivery models Provider responsible Customer responsible GRC Business continuity SIEM Identity, Access Cryptography Data security Application sec. Host security Network security Physical security IaaS PaaS SaaS IaaS PaaS SaaS Copyright © 2012 Cloud Security Alliance https://cloudsecurityalliance.org.uk
8.
Cloud Security Domains
Governance Operational Governance and Enterprise Risk Traditional Security, Business Management Continuity and Disaster Recovery Legal Issues: Contracts and Electronic Data Center Operations Discovery Incident Response, Notification and Compliance and Audit Remediation Information Management and Data Application Security Security Encryption and Key Management Portability and Interoperability Identity and Access Management Virtualization Security as a Service Copyright © 2012 Cloud Security Alliance https://cloudsecurityalliance.org.uk
9.
Cloud Security Alliance
supports number of projects related to cloud Get involved at https://cloudsecurityalliance.org/resea rch/https://cloudsecurityalliance.org.uk Copyright © 2012 Cloud Security Alliance
10.
How to manage
cloud security • Have a cloud security standard • What to do on an Enterprise level • Before your Cloud project • During your Cloud project How to drive out the • BAU 'seven deadly sins' of cloud computing - new Information Security • Exit from the Cloud provider Forum report • Risks cannot be outsourced • Manage lock-in and exit up-front – especially in SaaS Copyright © 2012 Cloud Security Alliance https://cloudsecurityalliance.org.uk
11.
Contact Help us secure
cloud computing – Get involved • http://cloudsecurityalliance.org.uk • info@cloudsecurityalliance.org.uk • LinkedIn: http://www.linkedin.com/groups/Cloud- Security-Alliance-UK-Chapter-3745837 • Twitter: @CSAUKResearch Copyright © 2012 Cloud Security Alliance https://cloudsecurityalliance.org.uk
12.
Thank you!
www.cloudsecurityalliance.org
Notes de l'éditeur
Do visit the websiteDo join the LinkedIn Groups – you will receive regular email updates
Télécharger maintenant