SlideShare una empresa de Scribd logo
1 de 22
VCU Cybersecurity Fair Security in the Cloud Presented By:   Bryan Miller
Speaker Introduction What is the “Cloud” SaaS, PaaS, IaaS Public, Private and Hybrid Clouds Vendor Offerings Security Issues Wrap-Up 10/4/2011 Security in the Cloud 1 Agenda
B.S. Information Systems – VCU M.S. Computer Science – VCU President, Syrinx Technologies, 2007 Member of ISSA, HIMSS, InfraGard, ILTA Adjunct Faculty Member in Information Systems and Computer Science @ VCU, FTEMS lecturer CISSP, former Cisco CCIE in R/S Published author Over 25 years in the industry 10/4/2011 Security in the Cloud 2 Speaker Introduction
Convenient, on-demand network access to a shared pool of configurable resources:  Networks Servers Storage Applications Services  Rapid and minimal management effort or service provider interaction (based on NIST) 10/4/2011 Security in the Cloud 3 What is the “Cloud”?
NIST SP 800-145 definition: "Cloud computing is a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction. This cloud model promotes availability and is composed of five essential characteristics, three service models, and four deployment models.” 10/4/2011 Security in the Cloud 4 The NIST Standard for Cloud Computing
IDC – 2008 Security was the factor most likely to discourage the use of cloud computing? 72% of small (<100 employees) businesses 63% of mid-sized (100-199 employees) businesses IDC – 2011 50% of small businesses 47% of mid-sized businesses 10/4/2011 Security in the Cloud 5 First, Some Statistics
By 2014, the conservative estimate is that the “cloud business” will be approximately $100 billion dollars. By 2012, approximately 20% of businesses will not own any IT resources. 10/4/2011 Security in the Cloud 6
10/4/2011 Security in the Cloud 7
10/4/2011 Security in the Cloud 8
Applications delivered over the web Vendor handles software updates and patches Application Programming Interfaces (APIs) integration among S/W ,[object Object]
Salesforce.com
Office 36510/4/2011 Security in the Cloud 9 Software as a Service (SaaS)
Architectural tools to build systems Platform managed and monitored Web-based user interface tools ,[object Object]
Google Apps Engine
Microsoft Azure
Force.com10/4/2011 Security in the Cloud 10 Platform as a Service (PaaS)
Outsource storage, hardware, servers Typically charged on a per-use basis Hardware can be multi-tenant or dedicated ,[object Object]
Amazon Web Services (AWS)
OpenStack
Dell10/4/2011 Security in the Cloud 11 Infrastructure as a Service (IaaS)
Public Shared resources, usually multi-tenant Off-premise Private Resources dedicated to client On-premise or off-premise Hybrid Combination of on-premise and cloud-based services Growing in popularity as companies slowly transition applications 10/4/2011 Security in the Cloud 12 Public vs. Private vs. Hybrid Cloud Models
Amazon Web Services EC2 - IaaS Data centers (Regions) Virginia Northern California Ireland Singapore Tokyo Within each region, services are divided into Availability Zones AWS GovCloud – Accessible by US only, allows government agencies to store data  Currently used by NASA 10/4/2011 Security in the Cloud 13 Vendor Offerings

Más contenido relacionado

La actualidad más candente

Delve Labs - Upcoming Security Challenges for the Internet of Things
Delve Labs - Upcoming Security Challenges for the Internet of ThingsDelve Labs - Upcoming Security Challenges for the Internet of Things
Delve Labs - Upcoming Security Challenges for the Internet of Things
Frederic Roy-Gobeil, CPA, CGA, M.Tax.
 
ICS_WhitePaper_Darktrace
ICS_WhitePaper_DarktraceICS_WhitePaper_Darktrace
ICS_WhitePaper_Darktrace
Austin Eppstein
 

La actualidad más candente (20)

Trust in the mobile internet of things
Trust in the mobile internet of thingsTrust in the mobile internet of things
Trust in the mobile internet of things
 
IoT in industry
IoT in industryIoT in industry
IoT in industry
 
IoT ecosystem
IoT ecosystemIoT ecosystem
IoT ecosystem
 
Understanding IoT
Understanding IoTUnderstanding IoT
Understanding IoT
 
Xylos Clients Day - Public cloud and security go hand in hand, if you approac...
Xylos Clients Day - Public cloud and security go hand in hand, if you approac...Xylos Clients Day - Public cloud and security go hand in hand, if you approac...
Xylos Clients Day - Public cloud and security go hand in hand, if you approac...
 
Securing the internet of things: The conversation you need to have with your CEO
Securing the internet of things: The conversation you need to have with your CEOSecuring the internet of things: The conversation you need to have with your CEO
Securing the internet of things: The conversation you need to have with your CEO
 
Countering Cybersecurity Risk in Today's IoT World
Countering Cybersecurity Risk in Today's IoT WorldCountering Cybersecurity Risk in Today's IoT World
Countering Cybersecurity Risk in Today's IoT World
 
Odoo iot box integration
Odoo iot box integrationOdoo iot box integration
Odoo iot box integration
 
An Internet of Things Reference Architecture
An Internet of Things Reference Architecture An Internet of Things Reference Architecture
An Internet of Things Reference Architecture
 
Open source IoT
Open source IoTOpen source IoT
Open source IoT
 
TrendMicro: 從雲到端,打造安全的物聯網
TrendMicro: 從雲到端,打造安全的物聯網TrendMicro: 從雲到端,打造安全的物聯網
TrendMicro: 從雲到端,打造安全的物聯網
 
Delve Labs - Upcoming Security Challenges for the Internet of Things
Delve Labs - Upcoming Security Challenges for the Internet of ThingsDelve Labs - Upcoming Security Challenges for the Internet of Things
Delve Labs - Upcoming Security Challenges for the Internet of Things
 
Secure your Future with IoT Security Testing | Application Security
Secure your Future with IoT Security Testing | Application SecuritySecure your Future with IoT Security Testing | Application Security
Secure your Future with IoT Security Testing | Application Security
 
IBM Xforce Q4 2014
IBM Xforce Q4 2014IBM Xforce Q4 2014
IBM Xforce Q4 2014
 
Watson IoT @Ryerson University - IEEE Chapter
Watson IoT  @Ryerson University - IEEE Chapter  Watson IoT  @Ryerson University - IEEE Chapter
Watson IoT @Ryerson University - IEEE Chapter
 
Internet of things - The Present & The Future
Internet of things - The Present & The FutureInternet of things - The Present & The Future
Internet of things - The Present & The Future
 
Technology Trends & The Impact for Software Industry
Technology Trends & The Impact for Software IndustryTechnology Trends & The Impact for Software Industry
Technology Trends & The Impact for Software Industry
 
INFORMATION SECURITY IN CLOUD COMPUTING
INFORMATION SECURITY IN CLOUD COMPUTINGINFORMATION SECURITY IN CLOUD COMPUTING
INFORMATION SECURITY IN CLOUD COMPUTING
 
ICS_WhitePaper_Darktrace
ICS_WhitePaper_DarktraceICS_WhitePaper_Darktrace
ICS_WhitePaper_Darktrace
 
Architecting IoT by Mathew - Alcatel Lucent @ MIMOS IoT TWG Day1
Architecting IoT by Mathew - Alcatel Lucent @ MIMOS IoT TWG Day1Architecting IoT by Mathew - Alcatel Lucent @ MIMOS IoT TWG Day1
Architecting IoT by Mathew - Alcatel Lucent @ MIMOS IoT TWG Day1
 

Destacado

Cloud computing reference architecture from nist and ibm
Cloud computing reference architecture from nist and ibmCloud computing reference architecture from nist and ibm
Cloud computing reference architecture from nist and ibm
Richard Kuo
 
Enterprise reference architecture v1.2
Enterprise reference architecture   v1.2Enterprise reference architecture   v1.2
Enterprise reference architecture v1.2
Ahmed Fattah
 
Bahasan 1 lingkup_alat_media_pendidikan
Bahasan 1 lingkup_alat_media_pendidikanBahasan 1 lingkup_alat_media_pendidikan
Bahasan 1 lingkup_alat_media_pendidikan
merysiswinda
 
Cloud security innovation - Cloud Security Alliance East Europe Congress 2013
Cloud security innovation  - Cloud Security Alliance East Europe Congress 2013Cloud security innovation  - Cloud Security Alliance East Europe Congress 2013
Cloud security innovation - Cloud Security Alliance East Europe Congress 2013
Moshe Ferber
 
Progress towards security in the Cloud-Héctor Sánchez, Microsoft
Progress towards security in the Cloud-Héctor Sánchez, MicrosoftProgress towards security in the Cloud-Héctor Sánchez, Microsoft
Progress towards security in the Cloud-Héctor Sánchez, Microsoft
Mind the Byte
 
Trends in recent technology
Trends in recent technologyTrends in recent technology
Trends in recent technology
sai krishna
 

Destacado (20)

Fighting The Top 7 Threats to Cloud Cybersecurity
Fighting The Top 7 Threats to Cloud CybersecurityFighting The Top 7 Threats to Cloud Cybersecurity
Fighting The Top 7 Threats to Cloud Cybersecurity
 
Cloud Reference Model
Cloud Reference ModelCloud Reference Model
Cloud Reference Model
 
NIST Cloud Computing Reference Architecture
NIST Cloud Computing Reference ArchitectureNIST Cloud Computing Reference Architecture
NIST Cloud Computing Reference Architecture
 
Cloud computing reference architecture from nist and ibm
Cloud computing reference architecture from nist and ibmCloud computing reference architecture from nist and ibm
Cloud computing reference architecture from nist and ibm
 
Enterprise reference architecture v1.2
Enterprise reference architecture   v1.2Enterprise reference architecture   v1.2
Enterprise reference architecture v1.2
 
Patterns for Cloud Computing
Patterns for Cloud ComputingPatterns for Cloud Computing
Patterns for Cloud Computing
 
Trends in Cybersecurity
Trends in CybersecurityTrends in Cybersecurity
Trends in Cybersecurity
 
Bahasan 1 lingkup_alat_media_pendidikan
Bahasan 1 lingkup_alat_media_pendidikanBahasan 1 lingkup_alat_media_pendidikan
Bahasan 1 lingkup_alat_media_pendidikan
 
Mind the Byte
Mind the ByteMind the Byte
Mind the Byte
 
Cybersecurity and Information Assurance - Cloud Computing
Cybersecurity and Information Assurance - Cloud ComputingCybersecurity and Information Assurance - Cloud Computing
Cybersecurity and Information Assurance - Cloud Computing
 
Cloud security innovation - Cloud Security Alliance East Europe Congress 2013
Cloud security innovation  - Cloud Security Alliance East Europe Congress 2013Cloud security innovation  - Cloud Security Alliance East Europe Congress 2013
Cloud security innovation - Cloud Security Alliance East Europe Congress 2013
 
Enterprise reference architecture v1.1.ppt
Enterprise reference architecture   v1.1.pptEnterprise reference architecture   v1.1.ppt
Enterprise reference architecture v1.1.ppt
 
Cloud security what to expect (introduction to cloud security)
Cloud security   what to expect (introduction to cloud security)Cloud security   what to expect (introduction to cloud security)
Cloud security what to expect (introduction to cloud security)
 
ACI's Global Encryption, Cloud & Cybersecurity Controls
ACI's Global Encryption, Cloud & Cybersecurity Controls ACI's Global Encryption, Cloud & Cybersecurity Controls
ACI's Global Encryption, Cloud & Cybersecurity Controls
 
Progress towards security in the Cloud-Héctor Sánchez, Microsoft
Progress towards security in the Cloud-Héctor Sánchez, MicrosoftProgress towards security in the Cloud-Héctor Sánchez, Microsoft
Progress towards security in the Cloud-Héctor Sánchez, Microsoft
 
Cloud Computing Architecture
Cloud Computing Architecture Cloud Computing Architecture
Cloud Computing Architecture
 
Enterprise Architecture Governance for an Enterprise Transformation Journey: ...
Enterprise Architecture Governance for an Enterprise Transformation Journey: ...Enterprise Architecture Governance for an Enterprise Transformation Journey: ...
Enterprise Architecture Governance for an Enterprise Transformation Journey: ...
 
Embracing Cybersecurity on Cloud Computing
Embracing Cybersecurity on Cloud ComputingEmbracing Cybersecurity on Cloud Computing
Embracing Cybersecurity on Cloud Computing
 
Trends in recent technology
Trends in recent technologyTrends in recent technology
Trends in recent technology
 
Protecting Yourself from the Heartbleed Bug
Protecting Yourself from the Heartbleed BugProtecting Yourself from the Heartbleed Bug
Protecting Yourself from the Heartbleed Bug
 

Similar a Cloud Computing Security

(Pdf) yury chemerkin deep_intel_2013
(Pdf) yury chemerkin deep_intel_2013(Pdf) yury chemerkin deep_intel_2013
(Pdf) yury chemerkin deep_intel_2013
STO STRATEGY
 
(Pdf) yury chemerkin intelligence_sec_2013
(Pdf) yury chemerkin intelligence_sec_2013(Pdf) yury chemerkin intelligence_sec_2013
(Pdf) yury chemerkin intelligence_sec_2013
STO STRATEGY
 
(Pdf) yury chemerkin ita_2013
(Pdf) yury chemerkin ita_2013(Pdf) yury chemerkin ita_2013
(Pdf) yury chemerkin ita_2013
STO STRATEGY
 
Ericsson Cloud Computing
Ericsson Cloud Computing Ericsson Cloud Computing
Ericsson Cloud Computing
scotgardner
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
Kelvin Lam
 

Similar a Cloud Computing Security (20)

Cloud Computing Introduction
Cloud Computing IntroductionCloud Computing Introduction
Cloud Computing Introduction
 
Best example of Cloud computing is my academic digital library.
Best example of Cloud computing is my academic digital library.Best example of Cloud computing is my academic digital library.
Best example of Cloud computing is my academic digital library.
 
Enabling Innovative Business Opportunities Through Secure Cloud Adoption - Se...
Enabling Innovative Business Opportunities Through Secure Cloud Adoption - Se...Enabling Innovative Business Opportunities Through Secure Cloud Adoption - Se...
Enabling Innovative Business Opportunities Through Secure Cloud Adoption - Se...
 
(Pdf) yury chemerkin deep_intel_2013
(Pdf) yury chemerkin deep_intel_2013(Pdf) yury chemerkin deep_intel_2013
(Pdf) yury chemerkin deep_intel_2013
 
(Pdf) yury chemerkin intelligence_sec_2013
(Pdf) yury chemerkin intelligence_sec_2013(Pdf) yury chemerkin intelligence_sec_2013
(Pdf) yury chemerkin intelligence_sec_2013
 
(Pdf) yury chemerkin ita_2013
(Pdf) yury chemerkin ita_2013(Pdf) yury chemerkin ita_2013
(Pdf) yury chemerkin ita_2013
 
A Detailed Analysis of the Issues and Solutions for Securing Data in Cloud
A Detailed Analysis of the Issues and Solutions for Securing Data  in CloudA Detailed Analysis of the Issues and Solutions for Securing Data  in Cloud
A Detailed Analysis of the Issues and Solutions for Securing Data in Cloud
 
On technical security issues in cloud computing
On technical security issues in cloud computingOn technical security issues in cloud computing
On technical security issues in cloud computing
 
Cloud Storage
Cloud StorageCloud Storage
Cloud Storage
 
Ericsson Cloud Computing
Ericsson Cloud Computing Ericsson Cloud Computing
Ericsson Cloud Computing
 
Why Cloud Management Makes Sense
Why Cloud Management Makes SenseWhy Cloud Management Makes Sense
Why Cloud Management Makes Sense
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Cloud Computing: Overview and Examples
Cloud Computing: Overview and ExamplesCloud Computing: Overview and Examples
Cloud Computing: Overview and Examples
 
Cloud Computing Risks N Controls V1.0
Cloud Computing Risks N Controls V1.0Cloud Computing Risks N Controls V1.0
Cloud Computing Risks N Controls V1.0
 
Cloud Computing 2010 - EMC - Bruno Melandri
Cloud Computing 2010 - EMC - Bruno MelandriCloud Computing 2010 - EMC - Bruno Melandri
Cloud Computing 2010 - EMC - Bruno Melandri
 
Visibility from user to infrastructure on AWS
Visibility from user to infrastructure on AWSVisibility from user to infrastructure on AWS
Visibility from user to infrastructure on AWS
 
Cloud Computing and Security - by KLC Consulting
Cloud Computing and Security - by KLC ConsultingCloud Computing and Security - by KLC Consulting
Cloud Computing and Security - by KLC Consulting
 
cc.pptx
cc.pptxcc.pptx
cc.pptx
 
cloud computing models
cloud computing modelscloud computing models
cloud computing models
 
Final
FinalFinal
Final
 

Más de syrinxtech (7)

Low Hanging Fruit from Penetration Testing
Low Hanging Fruit from Penetration TestingLow Hanging Fruit from Penetration Testing
Low Hanging Fruit from Penetration Testing
 
Virtual CSO
Virtual CSOVirtual CSO
Virtual CSO
 
Remote Access Security
Remote Access SecurityRemote Access Security
Remote Access Security
 
Virtualization Security
Virtualization SecurityVirtualization Security
Virtualization Security
 
Focus Your Business
Focus Your BusinessFocus Your Business
Focus Your Business
 
Penetration Testing as an auditing tool
Penetration Testing as an auditing toolPenetration Testing as an auditing tool
Penetration Testing as an auditing tool
 
Web Database Server Best Practices
Web Database Server Best PracticesWeb Database Server Best Practices
Web Database Server Best Practices
 

Cloud Computing Security

  • 1. VCU Cybersecurity Fair Security in the Cloud Presented By: Bryan Miller
  • 2. Speaker Introduction What is the “Cloud” SaaS, PaaS, IaaS Public, Private and Hybrid Clouds Vendor Offerings Security Issues Wrap-Up 10/4/2011 Security in the Cloud 1 Agenda
  • 3. B.S. Information Systems – VCU M.S. Computer Science – VCU President, Syrinx Technologies, 2007 Member of ISSA, HIMSS, InfraGard, ILTA Adjunct Faculty Member in Information Systems and Computer Science @ VCU, FTEMS lecturer CISSP, former Cisco CCIE in R/S Published author Over 25 years in the industry 10/4/2011 Security in the Cloud 2 Speaker Introduction
  • 4. Convenient, on-demand network access to a shared pool of configurable resources: Networks Servers Storage Applications Services Rapid and minimal management effort or service provider interaction (based on NIST) 10/4/2011 Security in the Cloud 3 What is the “Cloud”?
  • 5. NIST SP 800-145 definition: "Cloud computing is a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction. This cloud model promotes availability and is composed of five essential characteristics, three service models, and four deployment models.” 10/4/2011 Security in the Cloud 4 The NIST Standard for Cloud Computing
  • 6. IDC – 2008 Security was the factor most likely to discourage the use of cloud computing? 72% of small (<100 employees) businesses 63% of mid-sized (100-199 employees) businesses IDC – 2011 50% of small businesses 47% of mid-sized businesses 10/4/2011 Security in the Cloud 5 First, Some Statistics
  • 7. By 2014, the conservative estimate is that the “cloud business” will be approximately $100 billion dollars. By 2012, approximately 20% of businesses will not own any IT resources. 10/4/2011 Security in the Cloud 6
  • 8. 10/4/2011 Security in the Cloud 7
  • 9. 10/4/2011 Security in the Cloud 8
  • 10.
  • 12. Office 36510/4/2011 Security in the Cloud 9 Software as a Service (SaaS)
  • 13.
  • 16. Force.com10/4/2011 Security in the Cloud 10 Platform as a Service (PaaS)
  • 17.
  • 20. Dell10/4/2011 Security in the Cloud 11 Infrastructure as a Service (IaaS)
  • 21. Public Shared resources, usually multi-tenant Off-premise Private Resources dedicated to client On-premise or off-premise Hybrid Combination of on-premise and cloud-based services Growing in popularity as companies slowly transition applications 10/4/2011 Security in the Cloud 12 Public vs. Private vs. Hybrid Cloud Models
  • 22. Amazon Web Services EC2 - IaaS Data centers (Regions) Virginia Northern California Ireland Singapore Tokyo Within each region, services are divided into Availability Zones AWS GovCloud – Accessible by US only, allows government agencies to store data Currently used by NASA 10/4/2011 Security in the Cloud 13 Vendor Offerings
  • 23. Microsoft Azure – PaaS Windows Azure – OS providing scalable compute and storage facilities Windows SQL Azure – Cloud-based, scalable version of SQL Server OpenStack - IaaS Open source software Over 100 partner companies Rackspace Dell Citrix Cisco 10/4/2011 Security in the Cloud 14
  • 24. Dell – IaaS Built on VMware technology (vCloud family of products) Adding support for Azure and OpenStack 3 models: Pay as you go Reserved Dedicated Apple iCloud - SaaS Stores music, photos, applications, calendars, documents 5 GB of free storage 10/4/2011 Security in the Cloud 15
  • 25. Take into account the following: Response times Data corruption Service degradation/outage Data breach Backup/Restore issues What happens if the company closes or is sold Regulatory issues HIPAA – do you have a BA agreement in place? PCI – are you sure your provider is compliant? 10/4/2011 Security in the Cloud 16 What about SLAs?
  • 26. Bloomberg News reported that hackers used AWS’s EC2 to launch an attack against Sony’s PlayStation Network. The attack reportedly compromised the personal accounts of more than 100 million Sony customers. Prices for EC2 range from 3 cents to $2.48 an hour for users on the East coast of the U.S. Dual GPU setups are currently priced at $2.10/hr. Network World magazine reported that Exploits as a Service (EaaS) is becoming a profitable business. 10/4/2011 Security in the Cloud 17 Security Issues
  • 27. Definition: The point at which cloud computing causes a catastrophic failure. Intellectual property is the lifeblood of an organization. IP can get lost in the shuffle of VM sprawl, data sprawl, technology sprawl or the speed at which business is performed. How can things go wrong? A salesperson mails himself a report to Gmail for home access. A customer service team uses Dropbox1 to transfer client files. A PM is frustrated by IT policies and stands up a free server in the Amazon EC2 cloud 1 June 2011: Passwords optional for 4 hours, approximately 100 accounts were affected 10/4/2011 Security in the Cloud 18 Cloudpocalypse
  • 28. Amazon EC2 Outages July, 2008 Affected multiple Availability Zones Affected US and EU April, 2011 Affected Reddit, Foursquare, Quora Elastic Book Store went offline (provides mountable disk volumes to EC2) 3 days of outage for some users Why? During maintenance the data traffic was moved to a secondary, low-capacity network instead of the proper backup networks August, 2011 Why: Lightning strike in Dublin, Ireland Knocked European cloud services offline for 2 days Affected Netflix, Quora, Foursquare 10/4/2011 Security in the Cloud 19 When the Cloud Dissipates
  • 29. Gmail Outages 2008: July 16 – “long outage” August 6 – up to 15 hours August 11 – 2 hours August 15 – up to 24 hours October 16 – 30 hours 2009: February 24 – 2 hours September 1 – 2 hours 2011: February 27 – several hours August 8 – several hours 10/4/2011 Security in the Cloud 20
  • 30. Decide if the cloud is appropriate for the given business model Choose the vendor and precisely define the SLA Test thoroughly before moving into production Migrate slowly and carefully watch the metrics Make sure the users/clients are happy Routinely test the backup and restore process Don’t forget about DR and BCP 10/4/2011 Security in the Cloud 21 Wrap-Up