SlideShare una empresa de Scribd logo
1 de 63
InCloud WeTrust Not so fast! “I’m Cloud Confused” series
If you’re new to Cloud Computing,  or just confused… Please try http://www.slideshare.net/Guppers/im-cloud-confused
the biggest Cloud Computing  concerns are… Security  Privacy
Fundamental Question Is Cloud Computing security weaker than  EnterpriseSecurity?
a Typical Reaction when asks about security  SHA256 X.509 Salt AES PKCS IV DES
the street Security is…. Boring Heard it on Complex Hacker stuff Kills usability Necessary Evil Complicates my life
Let’s make it simple Child Play
Let’s pick a simple story You worked hard this year,  you bought a pile of gold bars
Where should you storethem?  House? Bank? Your House Your Bank
What does this thief think? …
Plenty of valuableassets,  but it may have elaborate  securityprotection in place Bank
Some valuableassets, security protection may not as elaborate House
What would you do to boost your protection?
Yes, build layers of defense
Put the fenceup Put
Install additional door locks
Let’s also install alarmsystem  and surveillancecameras
Feel Better?
Oh, don’t forget about adisasterplan
Knock, knock Who’s there?
You control who hasaccessto your house
And, pretty sure  yourinner circle won’t steal from you
Let’s translate… Corporate Data IT Assets(Software, Hardware) Employees
You feel totally in control
Whyin the world you would give up control?
..and many eyes aim at big prizes
when delegating security to other… a few things to consider….
It’s all about It’s all about Trust Trust
Do you trust them that they’ll still be in the  business  tomorrow? Help! Ex-Cloud Provider will work for Food
Didn’t we see this before?
Recommendation Pick servicesthat are backed by major players
Data Lost  It is unlikely.  Reputable Cloud Providers copy data 3-4 times
However, it is normal to store  highly value-able datain  two or more different cloud providers Data Service replicated replicated Cloud Provider 1 Cloud Provider 2
Data Privacy Confidentiality
Data in Transit data Internet Cloud Provider  It can be secured using encryption technology, e.g. SSL It is used especially for sensitive data
Data at Rest Cloud Provider  Biggest prize for attackers! More and more cloud providers are developing nativedata encryption  Even if it is stolen, it will be useless for attackers
You can pick whereyour data resides
Physical Access  Cloud Provider Data Center
Security processes are typically  in place  for physical access  Background Check Two factor authentication Intrusion detection system Audit Video surveillance
Multi tenant Infrastructure Corporate 4 Corporate 3 Corporate 2 Corporate 1 …infrastructure is shared by many corporations (tenant)
Will vulnerabilityin one company  affect others in the cloud?
Cloud Providers use  isolationtechniques Data Isolation Virtualization Computing Isolation a vulnerability in one tenant has little impact on other tenants
Identity
Unwanted guest Employees Cloud Computing Suppliers Customers
Potential External Entry Points Web SiteHTTP(S) Database Queue Web ServicesHTTP(S) Custom Blob(Files, Docs) Worker VM XYZCorp.com
Typical access to a web site  hosted in the Cloud
Example of  astronger authentication process for sensitive web site A8KP
Accessing other Cloud Services (Example) Address https://aservice.mycloudprov.net Key2 Key1 R3ZhU3xAmLIEAnRRyiMHx… xFAlNx4VeRDGQgSQI…
Control which networkor machineshave access  98.237.178.63 83.231.32.17
Let’s look at from  cloud infrastructure provider’s perspectives
TypicalSLAs to compete around 99.95 % uptime
It is in their best interest to  maintain reputation,  best security practice their business depends on it
Headlines they try hard to avoid Data is stolen from …. …. has been down since yesterday Security breach at data center….
Should you migrate all to Cloud?
NO Cloud Computing  is still at infancy
Trust is Always Earned, NeverGiven ---R. Williams
Migrate  non-critical business operations,  departmental level data first  and Observe! Enterprise
It’s not as difficultas you think simplicity, agility and elasticity  (another topic for further discussion)
Excited about new possibilities in  cloudspace?
Follow discussions and presentations on facebook  “I’m Cloud Confused” http://www.facebook.com/pages/Im-Cloud-Confused/219897591208?ref=ts
You Us 10simple questions,2minutes to completehttp://surveymonkey.com/s.aspx?sm=NrndNTZkoG6j8BWJYejC1g_3d_3d Will Publish Results on facebook
Want to try Cloudfor your business now ? Only a few minutes to setup http://www.slideshare.net/Guppers/guppers-3-minute-walkthrough
For more presentations like this, visit,  follow, subscribe to:   Blog: http://www.andyharjanto.com Twitter: http://twitter.com/harjanto Contact: andy@guppers.com

Más contenido relacionado

Destacado

Rihanaaaaaaaaa
RihanaaaaaaaaaRihanaaaaaaaaa
Rihanaaaaaaaaasuzette14
 
10 nazioni piu felici al mondo
10 nazioni piu felici al mondo10 nazioni piu felici al mondo
10 nazioni piu felici al mondoAldo Mencaraglia
 
Speaking presentation
Speaking presentationSpeaking presentation
Speaking presentationlm816100mhs
 
Beyond The Backchannel By Cynthia Calongne
Beyond The Backchannel By Cynthia CalongneBeyond The Backchannel By Cynthia Calongne
Beyond The Backchannel By Cynthia CalongneCynthia Calongne
 
Case drechtwerk - new shoes today
Case drechtwerk - new shoes todayCase drechtwerk - new shoes today
Case drechtwerk - new shoes todaynew shoes today
 
Sosiaalinen media ja järjestötyö
Sosiaalinen media ja järjestötyöSosiaalinen media ja järjestötyö
Sosiaalinen media ja järjestötyöMarko Sykkö
 

Destacado (8)

Moms
MomsMoms
Moms
 
Rihanaaaaaaaaa
RihanaaaaaaaaaRihanaaaaaaaaa
Rihanaaaaaaaaa
 
10 nazioni piu felici al mondo
10 nazioni piu felici al mondo10 nazioni piu felici al mondo
10 nazioni piu felici al mondo
 
Speaking presentation
Speaking presentationSpeaking presentation
Speaking presentation
 
Beyond The Backchannel By Cynthia Calongne
Beyond The Backchannel By Cynthia CalongneBeyond The Backchannel By Cynthia Calongne
Beyond The Backchannel By Cynthia Calongne
 
Case drechtwerk - new shoes today
Case drechtwerk - new shoes todayCase drechtwerk - new shoes today
Case drechtwerk - new shoes today
 
Sosiaalinen media ja järjestötyö
Sosiaalinen media ja järjestötyöSosiaalinen media ja järjestötyö
Sosiaalinen media ja järjestötyö
 
Alumni mentoring
Alumni mentoringAlumni mentoring
Alumni mentoring
 

Similar a Cloudtrust 091204053223 Phpapp01

Securing Your Data In The Cloud
Securing Your Data In The CloudSecuring Your Data In The Cloud
Securing Your Data In The CloudOmer Trajman
 
Why the cloud is more secure than your existing systems
Why the cloud is more secure than your existing systemsWhy the cloud is more secure than your existing systems
Why the cloud is more secure than your existing systemsErnest Mueller
 
A Cloud Security Ghost Story Craig Balding
A Cloud Security Ghost Story   Craig BaldingA Cloud Security Ghost Story   Craig Balding
A Cloud Security Ghost Story Craig Baldingcraigbalding
 
Security in the Cloud: Tips on How to Protect Your Data
Security in the Cloud: Tips on How to Protect Your DataSecurity in the Cloud: Tips on How to Protect Your Data
Security in the Cloud: Tips on How to Protect Your DataProcore Technologies
 
AWS Security Strategy
AWS Security StrategyAWS Security Strategy
AWS Security StrategyTeri Radichel
 
Automating your AWS Security Operations
Automating your AWS Security OperationsAutomating your AWS Security Operations
Automating your AWS Security OperationsAmazon Web Services
 
Automating your AWS Security Operations
Automating your AWS Security OperationsAutomating your AWS Security Operations
Automating your AWS Security OperationsEvident.io
 
Introduction to cloud computing
Introduction to cloud computingIntroduction to cloud computing
Introduction to cloud computingDigital Shende
 
A Throwaway Deck for Cloud Security Essentials 2.0 delivered at RSA 2016
A Throwaway Deck for Cloud Security Essentials 2.0 delivered at RSA 2016A Throwaway Deck for Cloud Security Essentials 2.0 delivered at RSA 2016
A Throwaway Deck for Cloud Security Essentials 2.0 delivered at RSA 2016Shannon Lietz
 
AWS Cloud Security From the Point of View of the Compliance
AWS Cloud Security From the Point of View of the ComplianceAWS Cloud Security From the Point of View of the Compliance
AWS Cloud Security From the Point of View of the ComplianceYury Chemerkin
 
Aws training in bangalore
Aws training in bangalore Aws training in bangalore
Aws training in bangalore apponix123
 
From Zero to Cloud in 30 minutes
From Zero to Cloud in 30 minutesFrom Zero to Cloud in 30 minutes
From Zero to Cloud in 30 minutesSimone Brunozzi
 
There is No Server: Immutable Infrastructure and Serverless Architecture
There is No Server: Immutable Infrastructure and Serverless ArchitectureThere is No Server: Immutable Infrastructure and Serverless Architecture
There is No Server: Immutable Infrastructure and Serverless ArchitectureSonatype
 
Network Security R U Secure???
Network Security R U Secure???Network Security R U Secure???
Network Security R U Secure???trendy updates
 
Presentation copy
Presentation   copyPresentation   copy
Presentation copyAdel Zalok
 
Six things to take into account when choosing cloud solutions
Six things to take into account when choosing cloud solutionsSix things to take into account when choosing cloud solutions
Six things to take into account when choosing cloud solutionsF-Secure Corporation
 
Cyber Security and Cloud Computing
Cyber Security and Cloud ComputingCyber Security and Cloud Computing
Cyber Security and Cloud ComputingKeet Sugathadasa
 

Similar a Cloudtrust 091204053223 Phpapp01 (20)

Securing Your Data In The Cloud
Securing Your Data In The CloudSecuring Your Data In The Cloud
Securing Your Data In The Cloud
 
Why the cloud is more secure than your existing systems
Why the cloud is more secure than your existing systemsWhy the cloud is more secure than your existing systems
Why the cloud is more secure than your existing systems
 
A Cloud Security Ghost Story Craig Balding
A Cloud Security Ghost Story   Craig BaldingA Cloud Security Ghost Story   Craig Balding
A Cloud Security Ghost Story Craig Balding
 
Security in the Cloud: Tips on How to Protect Your Data
Security in the Cloud: Tips on How to Protect Your DataSecurity in the Cloud: Tips on How to Protect Your Data
Security in the Cloud: Tips on How to Protect Your Data
 
AWS Security Strategy
AWS Security StrategyAWS Security Strategy
AWS Security Strategy
 
Automating your AWS Security Operations
Automating your AWS Security OperationsAutomating your AWS Security Operations
Automating your AWS Security Operations
 
Automating your AWS Security Operations
Automating your AWS Security OperationsAutomating your AWS Security Operations
Automating your AWS Security Operations
 
Introduction to cloud computing
Introduction to cloud computingIntroduction to cloud computing
Introduction to cloud computing
 
A Throwaway Deck for Cloud Security Essentials 2.0 delivered at RSA 2016
A Throwaway Deck for Cloud Security Essentials 2.0 delivered at RSA 2016A Throwaway Deck for Cloud Security Essentials 2.0 delivered at RSA 2016
A Throwaway Deck for Cloud Security Essentials 2.0 delivered at RSA 2016
 
AWS Cloud Security From the Point of View of the Compliance
AWS Cloud Security From the Point of View of the ComplianceAWS Cloud Security From the Point of View of the Compliance
AWS Cloud Security From the Point of View of the Compliance
 
Aws training in bangalore
Aws training in bangalore Aws training in bangalore
Aws training in bangalore
 
From Zero to Cloud in 30 minutes
From Zero to Cloud in 30 minutesFrom Zero to Cloud in 30 minutes
From Zero to Cloud in 30 minutes
 
There is No Server: Immutable Infrastructure and Serverless Architecture
There is No Server: Immutable Infrastructure and Serverless ArchitectureThere is No Server: Immutable Infrastructure and Serverless Architecture
There is No Server: Immutable Infrastructure and Serverless Architecture
 
Network Security R U Secure???
Network Security R U Secure???Network Security R U Secure???
Network Security R U Secure???
 
Presentation copy
Presentation   copyPresentation   copy
Presentation copy
 
Six things to take into account when choosing cloud solutions
Six things to take into account when choosing cloud solutionsSix things to take into account when choosing cloud solutions
Six things to take into account when choosing cloud solutions
 
Cyber Security and Cloud Computing
Cyber Security and Cloud ComputingCyber Security and Cloud Computing
Cyber Security and Cloud Computing
 
cloud-computing-security.ppt
cloud-computing-security.pptcloud-computing-security.ppt
cloud-computing-security.ppt
 
Cloud security
Cloud securityCloud security
Cloud security
 
Cloud security
Cloud securityCloud security
Cloud security
 

Cloudtrust 091204053223 Phpapp01