SlideShare una empresa de Scribd logo
1 de 63
Descargar para leer sin conexión
Alessandro Manfredi
Hey Cloud,
it’s the user calling,
he says he wants the security back
alessandro@filerock.com
Agenda
            Alessandro Manfredi                                                                                      alessandro@filerock.com




1. Cloud computing in a nutshell
2. About cloud security
    • Guarantees provided by cloud services
    • Assumptions customers might regret
3. Focus on data security
    • Data integrity check techniques
    • The FileRock solution
    • Demo
           The images used in this presentation are covered by different licenses, see the “Images Licenses” at the end of the deck.
Agenda
            Alessandro Manfredi                                                                                      alessandro@filerock.com




1. Cloud computing in a nutshell          spoiler:
2. About cloud security                  not many
    • Guarantees provided by cloud services
    • Assumptions customers might regret
3. Focus on data security
    • Data integrity check techniques
    • The FileRock solution
    • Demo
           The images used in this presentation are covered by different licenses, see the “Images Licenses” at the end of the deck.
Cloud Computing - What
           Alessandro Manfredi                                                                                      alessandro@filerock.com




Countless definitions and categories...




          The images used in this presentation are covered by different licenses, see the “Images Licenses” at the end of the deck.
Cloud Computing - What
           Alessandro Manfredi                                                                                      alessandro@filerock.com




Countless definitions and categories...

                                                                    On demand
                                                                                            Cost-effective
                                                                                                             Scalable
                                                                                                      etc. etc.

          The images used in this presentation are covered by different licenses, see the “Images Licenses” at the end of the deck.
Cloud Computing - How
        Alessandro Manfredi                                                                                      alessandro@filerock.com




How?




       The images used in this presentation are covered by different licenses, see the “Images Licenses” at the end of the deck.
Cloud Computing - How
           Alessandro Manfredi                                                                                      alessandro@filerock.com




How?                                                               Consolidated hardware
                                                                         Shared infrastructure
                                                                                                           Automated
                                                                                                          provisioning

                                                                                                                                      ...

   Hey, we manage these
                                                                                                     Remote
      stuff from remote!                                                                       administration

          The images used in this presentation are covered by different licenses, see the “Images Licenses” at the end of the deck.
So what about security?
   Alessandro Manfredi                                                                                      alessandro@filerock.com




“The cloud is built on trust”                                                        -- random.choice(cloud_enthusiasts)




  The images used in this presentation are covered by different licenses, see the “Images Licenses” at the end of the deck.
So what about security?
    Alessandro Manfredi                                                                                      alessandro@filerock.com




“The cloud is built on trust”                                                         -- random.choice(cloud_enthusiasts)



                                            WE AND OUR AFFILIATES AND LICENSORS MAKE NO
   THE SERVICE OFFERINGS ARE PROVIDED “AS IS.”

REPRESENTATIONS OR WARRANTIES OF ANY KIND, WHETHER EXPRESS, IMPLIED, STATUTORY OR

    OTHERWISE REGARDING THE SERVICE OFFERINGS OR THE THIRD PARTY CONTENT, INCLUDING ANY

       WARRANTY THAT THE SERVICE OFFERINGS OR THIRD PARTY CONTENT WILL BE

  UNINTERRUPTED, ERROR FREE OR FREE OF HARMFUL COMPONENTS, OR THAT
ANY CONTENT, INCLUDING YOUR CONTENT OR THE THIRD PARTY CONTENT, WILL BE SECURE
 OR NOT OTHERWISE LOST OR DAMAGED. EXCEPT TO THE EXTENT PROHIBITED BY LAW, WE
          AND OUR AFFILIATES AND LICENSORS DISCLAIM ALL WARRANTIES [...]




   The images used in this presentation are covered by different licenses, see the “Images Licenses” at the end of the deck.
So what about security?
    Alessandro Manfredi                                                                                      alessandro@filerock.com




“The cloud is built on trust”                                                         -- random.choice(cloud_enthusiasts)



                                            WE AND OUR AFFILIATES AND LICENSORS MAKE NO
   THE SERVICE OFFERINGS ARE PROVIDED “AS IS.”

REPRESENTATIONS OR WARRANTIES OF ANY KIND, WHETHER EXPRESS, IMPLIED, STATUTORY OR

    OTHERWISE REGARDING THE SERVICE OFFERINGS OR THE THIRD PARTY CONTENT, INCLUDING ANY

       WARRANTY THAT THE SERVICE OFFERINGS OR THIRD PARTY CONTENT WILL BE

  UNINTERRUPTED, ERROR FREE OR FREE OF HARMFUL COMPONENTS, OR THAT
ANY CONTENT, INCLUDING YOUR CONTENT OR THE THIRD PARTY CONTENT, WILL BE SECURE
 OR NOT OTHERWISE LOST OR DAMAGED. EXCEPT TO THE EXTENT PROHIBITED BY LAW, WE
          AND OUR AFFILIATES AND LICENSORS DISCLAIM ALL WARRANTIES [...]




   Source: https://aws.amazon.com/agreement/
   ..do not blame them, it’s common to the ToS of most of the service providers! E.g., see:
   • https://www.rackspace.com/information/legal/cloud/tos
   • https://developers.google.com/appengine/terms


   The images used in this presentation are covered by different licenses, see the “Images Licenses” at the end of the deck.
So what about security?
      Alessandro Manfredi                                                                                      alessandro@filerock.com




  “The big guys probably handle
security better than how you could
          do on premise”




     The images used in this presentation are covered by different licenses, see the “Images Licenses” at the end of the deck.
So what about security?
            Alessandro Manfredi                                                                                      alessandro@filerock.com




     “The big guys probably handle
   security better than how you could
             do on premise”

To some extent, this actually makes sense
 • Operating on a large scale, they have more resources
 • Redundant networks, power sources, etc.
 • Good physical surveillance

           The images used in this presentation are covered by different licenses, see the “Images Licenses” at the end of the deck.
However...
         Alessandro Manfredi                                                                                      alessandro@filerock.com




Betting on a lot of assumptions that the
               provider...




        The images used in this presentation are covered by different licenses, see the “Images Licenses” at the end of the deck.
Assuming that the provider...
  Alessandro Manfredi                                                                                      alessandro@filerock.com




... has no malicious intent ...




 The images used in this presentation are covered by different licenses, see the “Images Licenses” at the end of the deck.
Assuming that the provider...
          Alessandro Manfredi                                                                                      alessandro@filerock.com




... has complete control over employees ...




         The images used in this presentation are covered by different licenses, see the “Images Licenses” at the end of the deck.
Assuming that the provider...
       Alessandro Manfredi                                                                                      alessandro@filerock.com




... uses software that never fails ...




      The images used in this presentation are covered by different licenses, see the “Images Licenses” at the end of the deck.
Assuming that the provider...
             Alessandro Manfredi                                                                                      alessandro@filerock.com




... does not introduce security-critical bugs ...




            The images used in this presentation are covered by different licenses, see the “Images Licenses” at the end of the deck.
Assuming that the provider...
 Alessandro Manfredi                                                                                      alessandro@filerock.com




  ... never screws up ...




The images used in this presentation are covered by different licenses, see the “Images Licenses” at the end of the deck.
Assuming that the provider...
         Alessandro Manfredi                                                                                      alessandro@filerock.com




... always takes good care of your resources,
             even if by ToS / SLA
       they are not legally responsible
           for any error or damage.




        The images used in this presentation are covered by different licenses, see the “Images Licenses” at the end of the deck.
What can possibly go wrong?
         Alessandro Manfredi                                                                                      alessandro@filerock.com




Wait, what can possibly go wrong with
services used by hundreds of millions of
     customers around the world?

        The images used in this presentation are covered by different licenses, see the “Images Licenses” at the end of the deck.
Mistakes happen
                   Alessandro Manfredi                                                                                      alessandro@filerock.com



On June 2011, for few hours
any Dropbox account was
  accessible with any
       password




( not blaming them, these
   things can happen )


                  The images used in this presentation are covered by different licenses, see the “Images Licenses” at the end of the deck.

                  Screenshots of web pages can include contents whose license is defined by the relative publisher.
What about enterprise services?
            Alessandro Manfredi                                                                                      alessandro@filerock.com




Ok, but that’s just because it’s a consumer service...
It will never happen in an enterprise-class service...
Plus everyone now offers two factor authentication.


           The images used in this presentation are covered by different licenses, see the “Images Licenses” at the end of the deck.
Even big security firms have security breaches
                   Alessandro Manfredi                                                                                      alessandro@filerock.com



  Earlier in 2011, RSA was
  victim of a breach that
compromised customers
 protected by their SecurID




( again, not blaming them,
 these things can happen )


                  The images used in this presentation are covered by different licenses, see the “Images Licenses” at the end of the deck.

                  Screenshots of web pages can include contents whose license is defined by the relative publisher.
Even when providers behave as you expect...
         Alessandro Manfredi                                                                                      alessandro@filerock.com




 Cloud providers must obey the laws
enforced in the country where they are
                based.




        The images used in this presentation are covered by different licenses, see the “Images Licenses” at the end of the deck.
Even when providers behave as you expect...
                 Alessandro Manfredi                                                                                      alessandro@filerock.com




   Cloud providers must obey the laws
  enforced in the country where they are
                  based.

Authorities can access                                                                 Data might be intentionally
     your data                                                                             tampered or made
                                                                                              unavailable




                The images used in this presentation are covered by different licenses, see the “Images Licenses” at the end of the deck.
Data security
 Alessandro Manfredi                                                                                      alessandro@filerock.com




Focus on data security




The images used in this presentation are covered by different licenses, see the “Images Licenses” at the end of the deck.
Data security
            Alessandro Manfredi                                                                                      alessandro@filerock.com




             Three main concerns


    C
Confidentiality                        Integrity
                                                  I                                              Availability
                                                                                                             A
           The images used in this presentation are covered by different licenses, see the “Images Licenses” at the end of the deck.
Data security
            Alessandro Manfredi                                                                                      alessandro@filerock.com




             Three main concerns


    C
Confidentiality                        Integrity
                                                  I                                              Availability
                                                                                                             A
           The images used in this presentation are covered by different licenses, see the “Images Licenses” at the end of the deck.
Why integrity matters
 Alessandro Manfredi                                                                                      alessandro@filerock.com




The images used in this presentation are covered by different licenses, see the “Images Licenses” at the end of the deck.
Why integrity matters
                Alessandro Manfredi                                                                                      alessandro@filerock.com




1 Data is stored
  on the cloud




               The images used in this presentation are covered by different licenses, see the “Images Licenses” at the end of the deck.
Why integrity matters
 Alessandro Manfredi                                                                                      alessandro@filerock.com


                                                                     2          The provider experiences
                                                                                a fault or a breach.
                                                                                Data gets corrupted.
                                                                                (possibly, a previous
                                                                                version of the data is
                                                                                restored from a backup)




The images used in this presentation are covered by different licenses, see the “Images Licenses” at the end of the deck.
Why integrity matters
 Alessandro Manfredi                                                                                      alessandro@filerock.com




                                                                  3 The user wants to recover
                                                                    his data from the cloud
The images used in this presentation are covered by different licenses, see the “Images Licenses” at the end of the deck.
Why integrity matters
 Alessandro Manfredi                                                                                      alessandro@filerock.com




                                                                                      4          Corrupted data is
                                                                                               retrieved by the user
                                                                                                without any notice




The images used in this presentation are covered by different licenses, see the “Images Licenses” at the end of the deck.
Why integrity matters
 Alessandro Manfredi                                                                                      alessandro@filerock.com




                   5 The corrupted data is used by the user
                     in his own activity, unnoticed.
The images used in this presentation are covered by different licenses, see the “Images Licenses” at the end of the deck.
Integrity check, from 10.000 ft
 Alessandro Manfredi                                                                                      alessandro@filerock.com




The images used in this presentation are covered by different licenses, see the “Images Licenses” at the end of the deck.
Integrity check, from 10.000 ft
                Alessandro Manfredi                                                                                      alessandro@filerock.com




1 Data is stored
  on the cloud




               The images used in this presentation are covered by different licenses, see the “Images Licenses” at the end of the deck.
Integrity check, from 10.000 ft
            Alessandro Manfredi                                                                                      alessandro@filerock.com




2 A fingerprint of the whole data set,
  called basis, is efficiently recomputed
           The images used in this presentation are covered by different licenses, see the “Images Licenses” at the end of the deck.
Integrity check, from 10.000 ft
 Alessandro Manfredi                                                                                      alessandro@filerock.com




                                                                  3 The user wants to recover
                                                                    his data from the cloud
The images used in this presentation are covered by different licenses, see the “Images Licenses” at the end of the deck.
Integrity check, from 10.000 ft
 Alessandro Manfredi                                                                                      alessandro@filerock.com




                                                                                                      4         The software
                                                                                                                retrieves the
                                                                                                                data together
                                                                                                                with a proof
                                                                                                                 of integrity




The images used in this presentation are covered by different licenses, see the “Images Licenses” at the end of the deck.
Integrity check, from 10.000 ft
 Alessandro Manfredi                                                                                      alessandro@filerock.com




                  5 The integrity of the data is checked by
                    matching the proof with the last trusted basis.
The images used in this presentation are covered by different licenses, see the “Images Licenses” at the end of the deck.
How is that done?
 Alessandro Manfredi                                                                                      alessandro@filerock.com




The images used in this presentation are covered by different licenses, see the “Images Licenses” at the end of the deck.
Authenticated Data Structures
             Alessandro Manfredi                                                                                      alessandro@filerock.com




                       a


    b                                                     c


d       e                                f                                 g


A       B                              C                                  D

            The images used in this presentation are covered by different licenses, see the “Images Licenses” at the end of the deck.
Authenticated Data Structures
             Alessandro Manfredi                                                                                      alessandro@filerock.com




                       a                                                basis: a fingerprint of
                                                                           the whole data set
    b                                                     c


d       e                                f                                 g


A       B                              C                                  D                                                             data
            The images used in this presentation are covered by different licenses, see the “Images Licenses” at the end of the deck.
Authenticated Data Structures
             Alessandro Manfredi                                                                                      alessandro@filerock.com




                       a                                                basis: a fingerprint of
                                                                           the whole data set
    b                                                     c
                                                                                                                      kept safe
                                                                                                                     client side,
d       e                                f                                 g                                        updated on
                                                                                                                      any data
                                                                                                                    modification

A       B                              C                                  D                                                             data
            The images used in this presentation are covered by different licenses, see the “Images Licenses” at the end of the deck.
Example: Integrity check for “D"
             Alessandro Manfredi                                                                                      alessandro@filerock.com




                       a


    b                                                     c


d       e                                f                                 g


A       B                              C                                  D

            The images used in this presentation are covered by different licenses, see the “Images Licenses” at the end of the deck.
Example: Integrity check for “D"
             Alessandro Manfredi                                                                                      alessandro@filerock.com




                       a


    b                                                     c


d       e                                f                                 g


A       B                              C                                  D                                       D = data
            The images used in this presentation are covered by different licenses, see the “Images Licenses” at the end of the deck.
Example: Integrity check for “D"
                       Alessandro Manfredi                                                                                      alessandro@filerock.com




Integrity Proof                  a


        b                                                           c


  d               e                                f                                 g


  A           B                                  C                                  D                                       D = data
                      The images used in this presentation are covered by different licenses, see the “Images Licenses” at the end of the deck.
Example: Integrity check for “D"
             Alessandro Manfredi                                                                                      alessandro@filerock.com




                       a


    b                                                     c


d       e                                f                                 g                         g = hash(D)


A       B                              C                                  D                                       D = data
            The images used in this presentation are covered by different licenses, see the “Images Licenses” at the end of the deck.
Example: Integrity check for “D"
             Alessandro Manfredi                                                                                      alessandro@filerock.com




                       a


    b                                                     c                                     c = hash(f, g)


d       e                                f                                 g                         g = hash(D)


A       B                              C                                  D                                       D = data
            The images used in this presentation are covered by different licenses, see the “Images Licenses” at the end of the deck.
Example: Integrity check for “D"
             Alessandro Manfredi                                                                                      alessandro@filerock.com




                       a                                                                        a = hash(b, c)

    b                                                     c                                     c = hash(f, g)


d       e                                f                                 g                         g = hash(D)


A       B                              C                                  D                                       D = data
            The images used in this presentation are covered by different licenses, see the “Images Licenses” at the end of the deck.
Example: Integrity check for “D"
             Alessandro Manfredi                                                                                      alessandro@filerock.com


                                           must match the
                                            trusted basis
                       a                                                                        a = hash(b, c)

    b                                                     c                                     c = hash(f, g)


d       e                                f                                 g                         g = hash(D)


A       B                              C                                  D                                       D = data
            The images used in this presentation are covered by different licenses, see the “Images Licenses” at the end of the deck.
Integrity check capabilities
             Alessandro Manfredi                                                                                      alessandro@filerock.com




• Verify integrity of the whole dataset
   • ...including completeness
• Work in log(dataset_size) time
• Only the basis needs to be stored locally
   • ...small as the output of an hash function




            The images used in this presentation are covered by different licenses, see the “Images Licenses” at the end of the deck.
Integrity check capabilities
             Alessandro Manfredi                                                                                      alessandro@filerock.com




• Verify integrity of the whole dataset
   • ...including completeness
• Work in log(dataset_size) time
• Only the basis needs to be stored locally
   • ...small as the output of an hash function

• Always work with correct data
• Can be used for specific SLAs
            The images used in this presentation are covered by different licenses, see the “Images Licenses” at the end of the deck.
By the way, if you look at the FileRock ToS...
  Alessandro Manfredi                                                                                      alessandro@filerock.com




     As the other services,
all warranties are disclaimed.

 The images used in this presentation are covered by different licenses, see the “Images Licenses” at the end of the deck.
Your reaction...
 Alessandro Manfredi                                                                                      alessandro@filerock.com




                    Are you kidding me?




The images used in this presentation are covered by different licenses, see the “Images Licenses” at the end of the deck.
The FileRock Solution
             Alessandro Manfredi                                                                                      alessandro@filerock.com




• Open source client
• Client-side encryption
   • Encryption keys never shared with the service
• Client-side integrity check
• Data replication
   • Local replication (synchronization)
   • Remote replication (cross-provider)*
            *not implemented yet
            The images used in this presentation are covered by different licenses, see the “Images Licenses” at the end of the deck.
The FileRock Solution
             Alessandro Manfredi                                                                                      alessandro@filerock.com




• Open source client                                                                    Available
                                                                                              on
• Client-side encryption
   • Encryption keys never shared with the service
• Client-side integrity check
• Data replication
   • Local replication (synchronization)
   • Remote replication (cross-provider)*
            *not implemented yet
            The images used in this presentation are covered by different licenses, see the “Images Licenses” at the end of the deck.
FileRock: how it looks now
 Alessandro Manfredi                                                                                      alessandro@filerock.com




The images used in this presentation are covered by different licenses, see the “Images Licenses” at the end of the deck.
FileRock Toolkit Demo
 Alessandro Manfredi                                                                                      alessandro@filerock.com




The images used in this presentation are covered by different licenses, see the “Images Licenses” at the end of the deck.
FileRock - Try it
     Alessandro Manfredi                                                                                      alessandro@filerock.com




https://www.filerock.com/register


    The images used in this presentation are covered by different licenses, see the “Images Licenses” at the end of the deck.
Alessandro Manfredi
Hey Cloud,
it’s the user calling,
he says he wants the security back
alessandro@filerock.com


    @n0on3
    in/n0on3
End of the presentation
Images Licenses




                                                  Free for personal use


Public Domain


                                                                                                                             Free for commercial use
                                                                                                                               do not redistribute


    See the owner note

                                              Copyright belongs to the
                                                original authors and
                                                     publishers
                     The images used in this presentation are covered by different licenses, see the “Images Licenses” at the end of the deck.

Más contenido relacionado

Similar a Cara cloud, ha chiamato l’utente, rivuole la sicurezza by Alessandro Manfredi

Mythical Mysfits - Monolith to microservices with Docker and Fargate - MAD305...
Mythical Mysfits - Monolith to microservices with Docker and Fargate - MAD305...Mythical Mysfits - Monolith to microservices with Docker and Fargate - MAD305...
Mythical Mysfits - Monolith to microservices with Docker and Fargate - MAD305...Amazon Web Services
 
True Image Enterprise User Guide Eng
True Image Enterprise User Guide EngTrue Image Enterprise User Guide Eng
True Image Enterprise User Guide Engguest52eeb2
 
Azure Virtual Network Tutorial | Azure Virtual Machine Tutorial | Azure Train...
Azure Virtual Network Tutorial | Azure Virtual Machine Tutorial | Azure Train...Azure Virtual Network Tutorial | Azure Virtual Machine Tutorial | Azure Train...
Azure Virtual Network Tutorial | Azure Virtual Machine Tutorial | Azure Train...Edureka!
 
Bat Blue Cloud Sec Presentation 4
Bat Blue Cloud Sec Presentation 4Bat Blue Cloud Sec Presentation 4
Bat Blue Cloud Sec Presentation 4bpasdar
 
The Cloudy, Foggy and Misty Internet of Things -- Toward Fluid IoT Architect...
The Cloudy, Foggy and Misty Internet of Things --  Toward Fluid IoT Architect...The Cloudy, Foggy and Misty Internet of Things --  Toward Fluid IoT Architect...
The Cloudy, Foggy and Misty Internet of Things -- Toward Fluid IoT Architect...Angelo Corsaro
 
Operational Complexity: The Biggest Security Threat to Your AWS Environment
Operational Complexity: The Biggest Security Threat to Your AWS EnvironmentOperational Complexity: The Biggest Security Threat to Your AWS Environment
Operational Complexity: The Biggest Security Threat to Your AWS EnvironmentCryptzone
 
Secure Coding principles by example: Build Security In from the start - Carlo...
Secure Coding principles by example: Build Security In from the start - Carlo...Secure Coding principles by example: Build Security In from the start - Carlo...
Secure Coding principles by example: Build Security In from the start - Carlo...Codemotion
 
Seclore FileSecure IBM Filenet Walkthrough
Seclore FileSecure IBM Filenet WalkthroughSeclore FileSecure IBM Filenet Walkthrough
Seclore FileSecure IBM Filenet Walkthroughsiddarthc
 
AWS Summit Stockholm 2014 – T2 – Understanding AWS security
AWS Summit Stockholm 2014 – T2 – Understanding AWS securityAWS Summit Stockholm 2014 – T2 – Understanding AWS security
AWS Summit Stockholm 2014 – T2 – Understanding AWS securityAmazon Web Services
 
Free Course - Infrastructure Security Consultant course by Carlo Dapino
Free Course - Infrastructure Security Consultant course by Carlo DapinoFree Course - Infrastructure Security Consultant course by Carlo Dapino
Free Course - Infrastructure Security Consultant course by Carlo DapinoCarlo Dapino
 
Giant bags of mostly water
Giant bags of mostly waterGiant bags of mostly water
Giant bags of mostly waterroensel
 
Security Patterns for Microservice Architectures
Security Patterns for Microservice ArchitecturesSecurity Patterns for Microservice Architectures
Security Patterns for Microservice ArchitecturesVMware Tanzu
 
Security Patterns for Microservice Architectures - SpringOne 2020
Security Patterns for Microservice Architectures - SpringOne 2020Security Patterns for Microservice Architectures - SpringOne 2020
Security Patterns for Microservice Architectures - SpringOne 2020Matt Raible
 
Meetup Protect from Ransomware Attacks
Meetup Protect from Ransomware AttacksMeetup Protect from Ransomware Attacks
Meetup Protect from Ransomware AttacksCloudHesive
 
Security & Cryptography In Linux
Security & Cryptography In LinuxSecurity & Cryptography In Linux
Security & Cryptography In LinuxAhmed Mekkawy
 
Immutable Infrastructure Security
Immutable Infrastructure SecurityImmutable Infrastructure Security
Immutable Infrastructure SecurityRicky Sanders
 
Irmintroductionforautocad 110415002444-phpapp02
Irmintroductionforautocad 110415002444-phpapp02Irmintroductionforautocad 110415002444-phpapp02
Irmintroductionforautocad 110415002444-phpapp02gilberteric
 

Similar a Cara cloud, ha chiamato l’utente, rivuole la sicurezza by Alessandro Manfredi (20)

Mythical Mysfits - Monolith to microservices with Docker and Fargate - MAD305...
Mythical Mysfits - Monolith to microservices with Docker and Fargate - MAD305...Mythical Mysfits - Monolith to microservices with Docker and Fargate - MAD305...
Mythical Mysfits - Monolith to microservices with Docker and Fargate - MAD305...
 
True Image Enterprise User Guide Eng
True Image Enterprise User Guide EngTrue Image Enterprise User Guide Eng
True Image Enterprise User Guide Eng
 
Azure Virtual Network Tutorial | Azure Virtual Machine Tutorial | Azure Train...
Azure Virtual Network Tutorial | Azure Virtual Machine Tutorial | Azure Train...Azure Virtual Network Tutorial | Azure Virtual Machine Tutorial | Azure Train...
Azure Virtual Network Tutorial | Azure Virtual Machine Tutorial | Azure Train...
 
Bat Blue Cloud Sec Presentation 4
Bat Blue Cloud Sec Presentation 4Bat Blue Cloud Sec Presentation 4
Bat Blue Cloud Sec Presentation 4
 
The Cloudy, Foggy and Misty Internet of Things -- Toward Fluid IoT Architect...
The Cloudy, Foggy and Misty Internet of Things --  Toward Fluid IoT Architect...The Cloudy, Foggy and Misty Internet of Things --  Toward Fluid IoT Architect...
The Cloudy, Foggy and Misty Internet of Things -- Toward Fluid IoT Architect...
 
Fog Computing Defined
Fog Computing DefinedFog Computing Defined
Fog Computing Defined
 
Operational Complexity: The Biggest Security Threat to Your AWS Environment
Operational Complexity: The Biggest Security Threat to Your AWS EnvironmentOperational Complexity: The Biggest Security Threat to Your AWS Environment
Operational Complexity: The Biggest Security Threat to Your AWS Environment
 
Secure Coding principles by example: Build Security In from the start - Carlo...
Secure Coding principles by example: Build Security In from the start - Carlo...Secure Coding principles by example: Build Security In from the start - Carlo...
Secure Coding principles by example: Build Security In from the start - Carlo...
 
Seclore FileSecure IBM Filenet Walkthrough
Seclore FileSecure IBM Filenet WalkthroughSeclore FileSecure IBM Filenet Walkthrough
Seclore FileSecure IBM Filenet Walkthrough
 
Cloud security part one
Cloud security part oneCloud security part one
Cloud security part one
 
Firefox (in)Security
Firefox (in)SecurityFirefox (in)Security
Firefox (in)Security
 
AWS Summit Stockholm 2014 – T2 – Understanding AWS security
AWS Summit Stockholm 2014 – T2 – Understanding AWS securityAWS Summit Stockholm 2014 – T2 – Understanding AWS security
AWS Summit Stockholm 2014 – T2 – Understanding AWS security
 
Free Course - Infrastructure Security Consultant course by Carlo Dapino
Free Course - Infrastructure Security Consultant course by Carlo DapinoFree Course - Infrastructure Security Consultant course by Carlo Dapino
Free Course - Infrastructure Security Consultant course by Carlo Dapino
 
Giant bags of mostly water
Giant bags of mostly waterGiant bags of mostly water
Giant bags of mostly water
 
Security Patterns for Microservice Architectures
Security Patterns for Microservice ArchitecturesSecurity Patterns for Microservice Architectures
Security Patterns for Microservice Architectures
 
Security Patterns for Microservice Architectures - SpringOne 2020
Security Patterns for Microservice Architectures - SpringOne 2020Security Patterns for Microservice Architectures - SpringOne 2020
Security Patterns for Microservice Architectures - SpringOne 2020
 
Meetup Protect from Ransomware Attacks
Meetup Protect from Ransomware AttacksMeetup Protect from Ransomware Attacks
Meetup Protect from Ransomware Attacks
 
Security & Cryptography In Linux
Security & Cryptography In LinuxSecurity & Cryptography In Linux
Security & Cryptography In Linux
 
Immutable Infrastructure Security
Immutable Infrastructure SecurityImmutable Infrastructure Security
Immutable Infrastructure Security
 
Irmintroductionforautocad 110415002444-phpapp02
Irmintroductionforautocad 110415002444-phpapp02Irmintroductionforautocad 110415002444-phpapp02
Irmintroductionforautocad 110415002444-phpapp02
 

Más de Codemotion

Fuzz-testing: A hacker's approach to making your code more secure | Pascal Ze...
Fuzz-testing: A hacker's approach to making your code more secure | Pascal Ze...Fuzz-testing: A hacker's approach to making your code more secure | Pascal Ze...
Fuzz-testing: A hacker's approach to making your code more secure | Pascal Ze...Codemotion
 
Pompili - From hero to_zero: The FatalNoise neverending story
Pompili - From hero to_zero: The FatalNoise neverending storyPompili - From hero to_zero: The FatalNoise neverending story
Pompili - From hero to_zero: The FatalNoise neverending storyCodemotion
 
Pastore - Commodore 65 - La storia
Pastore - Commodore 65 - La storiaPastore - Commodore 65 - La storia
Pastore - Commodore 65 - La storiaCodemotion
 
Pennisi - Essere Richard Altwasser
Pennisi - Essere Richard AltwasserPennisi - Essere Richard Altwasser
Pennisi - Essere Richard AltwasserCodemotion
 
Michel Schudel - Let's build a blockchain... in 40 minutes! - Codemotion Amst...
Michel Schudel - Let's build a blockchain... in 40 minutes! - Codemotion Amst...Michel Schudel - Let's build a blockchain... in 40 minutes! - Codemotion Amst...
Michel Schudel - Let's build a blockchain... in 40 minutes! - Codemotion Amst...Codemotion
 
Richard Süselbeck - Building your own ride share app - Codemotion Amsterdam 2019
Richard Süselbeck - Building your own ride share app - Codemotion Amsterdam 2019Richard Süselbeck - Building your own ride share app - Codemotion Amsterdam 2019
Richard Süselbeck - Building your own ride share app - Codemotion Amsterdam 2019Codemotion
 
Eward Driehuis - What we learned from 20.000 attacks - Codemotion Amsterdam 2019
Eward Driehuis - What we learned from 20.000 attacks - Codemotion Amsterdam 2019Eward Driehuis - What we learned from 20.000 attacks - Codemotion Amsterdam 2019
Eward Driehuis - What we learned from 20.000 attacks - Codemotion Amsterdam 2019Codemotion
 
Francesco Baldassarri - Deliver Data at Scale - Codemotion Amsterdam 2019 -
Francesco Baldassarri  - Deliver Data at Scale - Codemotion Amsterdam 2019 - Francesco Baldassarri  - Deliver Data at Scale - Codemotion Amsterdam 2019 -
Francesco Baldassarri - Deliver Data at Scale - Codemotion Amsterdam 2019 - Codemotion
 
Martin Förtsch, Thomas Endres - Stereoscopic Style Transfer AI - Codemotion A...
Martin Förtsch, Thomas Endres - Stereoscopic Style Transfer AI - Codemotion A...Martin Förtsch, Thomas Endres - Stereoscopic Style Transfer AI - Codemotion A...
Martin Förtsch, Thomas Endres - Stereoscopic Style Transfer AI - Codemotion A...Codemotion
 
Melanie Rieback, Klaus Kursawe - Blockchain Security: Melting the "Silver Bul...
Melanie Rieback, Klaus Kursawe - Blockchain Security: Melting the "Silver Bul...Melanie Rieback, Klaus Kursawe - Blockchain Security: Melting the "Silver Bul...
Melanie Rieback, Klaus Kursawe - Blockchain Security: Melting the "Silver Bul...Codemotion
 
Angelo van der Sijpt - How well do you know your network stack? - Codemotion ...
Angelo van der Sijpt - How well do you know your network stack? - Codemotion ...Angelo van der Sijpt - How well do you know your network stack? - Codemotion ...
Angelo van der Sijpt - How well do you know your network stack? - Codemotion ...Codemotion
 
Lars Wolff - Performance Testing for DevOps in the Cloud - Codemotion Amsterd...
Lars Wolff - Performance Testing for DevOps in the Cloud - Codemotion Amsterd...Lars Wolff - Performance Testing for DevOps in the Cloud - Codemotion Amsterd...
Lars Wolff - Performance Testing for DevOps in the Cloud - Codemotion Amsterd...Codemotion
 
Sascha Wolter - Conversational AI Demystified - Codemotion Amsterdam 2019
Sascha Wolter - Conversational AI Demystified - Codemotion Amsterdam 2019Sascha Wolter - Conversational AI Demystified - Codemotion Amsterdam 2019
Sascha Wolter - Conversational AI Demystified - Codemotion Amsterdam 2019Codemotion
 
Michele Tonutti - Scaling is caring - Codemotion Amsterdam 2019
Michele Tonutti - Scaling is caring - Codemotion Amsterdam 2019Michele Tonutti - Scaling is caring - Codemotion Amsterdam 2019
Michele Tonutti - Scaling is caring - Codemotion Amsterdam 2019Codemotion
 
Pat Hermens - From 100 to 1,000+ deployments a day - Codemotion Amsterdam 2019
Pat Hermens - From 100 to 1,000+ deployments a day - Codemotion Amsterdam 2019Pat Hermens - From 100 to 1,000+ deployments a day - Codemotion Amsterdam 2019
Pat Hermens - From 100 to 1,000+ deployments a day - Codemotion Amsterdam 2019Codemotion
 
James Birnie - Using Many Worlds of Compute Power with Quantum - Codemotion A...
James Birnie - Using Many Worlds of Compute Power with Quantum - Codemotion A...James Birnie - Using Many Worlds of Compute Power with Quantum - Codemotion A...
James Birnie - Using Many Worlds of Compute Power with Quantum - Codemotion A...Codemotion
 
Don Goodman-Wilson - Chinese food, motor scooters, and open source developmen...
Don Goodman-Wilson - Chinese food, motor scooters, and open source developmen...Don Goodman-Wilson - Chinese food, motor scooters, and open source developmen...
Don Goodman-Wilson - Chinese food, motor scooters, and open source developmen...Codemotion
 
Pieter Omvlee - The story behind Sketch - Codemotion Amsterdam 2019
Pieter Omvlee - The story behind Sketch - Codemotion Amsterdam 2019Pieter Omvlee - The story behind Sketch - Codemotion Amsterdam 2019
Pieter Omvlee - The story behind Sketch - Codemotion Amsterdam 2019Codemotion
 
Dave Farley - Taking Back “Software Engineering” - Codemotion Amsterdam 2019
Dave Farley - Taking Back “Software Engineering” - Codemotion Amsterdam 2019Dave Farley - Taking Back “Software Engineering” - Codemotion Amsterdam 2019
Dave Farley - Taking Back “Software Engineering” - Codemotion Amsterdam 2019Codemotion
 
Joshua Hoffman - Should the CTO be Coding? - Codemotion Amsterdam 2019
Joshua Hoffman - Should the CTO be Coding? - Codemotion Amsterdam 2019Joshua Hoffman - Should the CTO be Coding? - Codemotion Amsterdam 2019
Joshua Hoffman - Should the CTO be Coding? - Codemotion Amsterdam 2019Codemotion
 

Más de Codemotion (20)

Fuzz-testing: A hacker's approach to making your code more secure | Pascal Ze...
Fuzz-testing: A hacker's approach to making your code more secure | Pascal Ze...Fuzz-testing: A hacker's approach to making your code more secure | Pascal Ze...
Fuzz-testing: A hacker's approach to making your code more secure | Pascal Ze...
 
Pompili - From hero to_zero: The FatalNoise neverending story
Pompili - From hero to_zero: The FatalNoise neverending storyPompili - From hero to_zero: The FatalNoise neverending story
Pompili - From hero to_zero: The FatalNoise neverending story
 
Pastore - Commodore 65 - La storia
Pastore - Commodore 65 - La storiaPastore - Commodore 65 - La storia
Pastore - Commodore 65 - La storia
 
Pennisi - Essere Richard Altwasser
Pennisi - Essere Richard AltwasserPennisi - Essere Richard Altwasser
Pennisi - Essere Richard Altwasser
 
Michel Schudel - Let's build a blockchain... in 40 minutes! - Codemotion Amst...
Michel Schudel - Let's build a blockchain... in 40 minutes! - Codemotion Amst...Michel Schudel - Let's build a blockchain... in 40 minutes! - Codemotion Amst...
Michel Schudel - Let's build a blockchain... in 40 minutes! - Codemotion Amst...
 
Richard Süselbeck - Building your own ride share app - Codemotion Amsterdam 2019
Richard Süselbeck - Building your own ride share app - Codemotion Amsterdam 2019Richard Süselbeck - Building your own ride share app - Codemotion Amsterdam 2019
Richard Süselbeck - Building your own ride share app - Codemotion Amsterdam 2019
 
Eward Driehuis - What we learned from 20.000 attacks - Codemotion Amsterdam 2019
Eward Driehuis - What we learned from 20.000 attacks - Codemotion Amsterdam 2019Eward Driehuis - What we learned from 20.000 attacks - Codemotion Amsterdam 2019
Eward Driehuis - What we learned from 20.000 attacks - Codemotion Amsterdam 2019
 
Francesco Baldassarri - Deliver Data at Scale - Codemotion Amsterdam 2019 -
Francesco Baldassarri  - Deliver Data at Scale - Codemotion Amsterdam 2019 - Francesco Baldassarri  - Deliver Data at Scale - Codemotion Amsterdam 2019 -
Francesco Baldassarri - Deliver Data at Scale - Codemotion Amsterdam 2019 -
 
Martin Förtsch, Thomas Endres - Stereoscopic Style Transfer AI - Codemotion A...
Martin Förtsch, Thomas Endres - Stereoscopic Style Transfer AI - Codemotion A...Martin Förtsch, Thomas Endres - Stereoscopic Style Transfer AI - Codemotion A...
Martin Förtsch, Thomas Endres - Stereoscopic Style Transfer AI - Codemotion A...
 
Melanie Rieback, Klaus Kursawe - Blockchain Security: Melting the "Silver Bul...
Melanie Rieback, Klaus Kursawe - Blockchain Security: Melting the "Silver Bul...Melanie Rieback, Klaus Kursawe - Blockchain Security: Melting the "Silver Bul...
Melanie Rieback, Klaus Kursawe - Blockchain Security: Melting the "Silver Bul...
 
Angelo van der Sijpt - How well do you know your network stack? - Codemotion ...
Angelo van der Sijpt - How well do you know your network stack? - Codemotion ...Angelo van der Sijpt - How well do you know your network stack? - Codemotion ...
Angelo van der Sijpt - How well do you know your network stack? - Codemotion ...
 
Lars Wolff - Performance Testing for DevOps in the Cloud - Codemotion Amsterd...
Lars Wolff - Performance Testing for DevOps in the Cloud - Codemotion Amsterd...Lars Wolff - Performance Testing for DevOps in the Cloud - Codemotion Amsterd...
Lars Wolff - Performance Testing for DevOps in the Cloud - Codemotion Amsterd...
 
Sascha Wolter - Conversational AI Demystified - Codemotion Amsterdam 2019
Sascha Wolter - Conversational AI Demystified - Codemotion Amsterdam 2019Sascha Wolter - Conversational AI Demystified - Codemotion Amsterdam 2019
Sascha Wolter - Conversational AI Demystified - Codemotion Amsterdam 2019
 
Michele Tonutti - Scaling is caring - Codemotion Amsterdam 2019
Michele Tonutti - Scaling is caring - Codemotion Amsterdam 2019Michele Tonutti - Scaling is caring - Codemotion Amsterdam 2019
Michele Tonutti - Scaling is caring - Codemotion Amsterdam 2019
 
Pat Hermens - From 100 to 1,000+ deployments a day - Codemotion Amsterdam 2019
Pat Hermens - From 100 to 1,000+ deployments a day - Codemotion Amsterdam 2019Pat Hermens - From 100 to 1,000+ deployments a day - Codemotion Amsterdam 2019
Pat Hermens - From 100 to 1,000+ deployments a day - Codemotion Amsterdam 2019
 
James Birnie - Using Many Worlds of Compute Power with Quantum - Codemotion A...
James Birnie - Using Many Worlds of Compute Power with Quantum - Codemotion A...James Birnie - Using Many Worlds of Compute Power with Quantum - Codemotion A...
James Birnie - Using Many Worlds of Compute Power with Quantum - Codemotion A...
 
Don Goodman-Wilson - Chinese food, motor scooters, and open source developmen...
Don Goodman-Wilson - Chinese food, motor scooters, and open source developmen...Don Goodman-Wilson - Chinese food, motor scooters, and open source developmen...
Don Goodman-Wilson - Chinese food, motor scooters, and open source developmen...
 
Pieter Omvlee - The story behind Sketch - Codemotion Amsterdam 2019
Pieter Omvlee - The story behind Sketch - Codemotion Amsterdam 2019Pieter Omvlee - The story behind Sketch - Codemotion Amsterdam 2019
Pieter Omvlee - The story behind Sketch - Codemotion Amsterdam 2019
 
Dave Farley - Taking Back “Software Engineering” - Codemotion Amsterdam 2019
Dave Farley - Taking Back “Software Engineering” - Codemotion Amsterdam 2019Dave Farley - Taking Back “Software Engineering” - Codemotion Amsterdam 2019
Dave Farley - Taking Back “Software Engineering” - Codemotion Amsterdam 2019
 
Joshua Hoffman - Should the CTO be Coding? - Codemotion Amsterdam 2019
Joshua Hoffman - Should the CTO be Coding? - Codemotion Amsterdam 2019Joshua Hoffman - Should the CTO be Coding? - Codemotion Amsterdam 2019
Joshua Hoffman - Should the CTO be Coding? - Codemotion Amsterdam 2019
 

Último

[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 

Último (20)

[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 

Cara cloud, ha chiamato l’utente, rivuole la sicurezza by Alessandro Manfredi

  • 1. Alessandro Manfredi Hey Cloud, it’s the user calling, he says he wants the security back alessandro@filerock.com
  • 2. Agenda Alessandro Manfredi alessandro@filerock.com 1. Cloud computing in a nutshell 2. About cloud security • Guarantees provided by cloud services • Assumptions customers might regret 3. Focus on data security • Data integrity check techniques • The FileRock solution • Demo The images used in this presentation are covered by different licenses, see the “Images Licenses” at the end of the deck.
  • 3. Agenda Alessandro Manfredi alessandro@filerock.com 1. Cloud computing in a nutshell spoiler: 2. About cloud security not many • Guarantees provided by cloud services • Assumptions customers might regret 3. Focus on data security • Data integrity check techniques • The FileRock solution • Demo The images used in this presentation are covered by different licenses, see the “Images Licenses” at the end of the deck.
  • 4. Cloud Computing - What Alessandro Manfredi alessandro@filerock.com Countless definitions and categories... The images used in this presentation are covered by different licenses, see the “Images Licenses” at the end of the deck.
  • 5. Cloud Computing - What Alessandro Manfredi alessandro@filerock.com Countless definitions and categories... On demand Cost-effective Scalable etc. etc. The images used in this presentation are covered by different licenses, see the “Images Licenses” at the end of the deck.
  • 6. Cloud Computing - How Alessandro Manfredi alessandro@filerock.com How? The images used in this presentation are covered by different licenses, see the “Images Licenses” at the end of the deck.
  • 7. Cloud Computing - How Alessandro Manfredi alessandro@filerock.com How? Consolidated hardware Shared infrastructure Automated provisioning ... Hey, we manage these Remote stuff from remote! administration The images used in this presentation are covered by different licenses, see the “Images Licenses” at the end of the deck.
  • 8. So what about security? Alessandro Manfredi alessandro@filerock.com “The cloud is built on trust” -- random.choice(cloud_enthusiasts) The images used in this presentation are covered by different licenses, see the “Images Licenses” at the end of the deck.
  • 9. So what about security? Alessandro Manfredi alessandro@filerock.com “The cloud is built on trust” -- random.choice(cloud_enthusiasts) WE AND OUR AFFILIATES AND LICENSORS MAKE NO THE SERVICE OFFERINGS ARE PROVIDED “AS IS.” REPRESENTATIONS OR WARRANTIES OF ANY KIND, WHETHER EXPRESS, IMPLIED, STATUTORY OR OTHERWISE REGARDING THE SERVICE OFFERINGS OR THE THIRD PARTY CONTENT, INCLUDING ANY WARRANTY THAT THE SERVICE OFFERINGS OR THIRD PARTY CONTENT WILL BE UNINTERRUPTED, ERROR FREE OR FREE OF HARMFUL COMPONENTS, OR THAT ANY CONTENT, INCLUDING YOUR CONTENT OR THE THIRD PARTY CONTENT, WILL BE SECURE OR NOT OTHERWISE LOST OR DAMAGED. EXCEPT TO THE EXTENT PROHIBITED BY LAW, WE AND OUR AFFILIATES AND LICENSORS DISCLAIM ALL WARRANTIES [...] The images used in this presentation are covered by different licenses, see the “Images Licenses” at the end of the deck.
  • 10. So what about security? Alessandro Manfredi alessandro@filerock.com “The cloud is built on trust” -- random.choice(cloud_enthusiasts) WE AND OUR AFFILIATES AND LICENSORS MAKE NO THE SERVICE OFFERINGS ARE PROVIDED “AS IS.” REPRESENTATIONS OR WARRANTIES OF ANY KIND, WHETHER EXPRESS, IMPLIED, STATUTORY OR OTHERWISE REGARDING THE SERVICE OFFERINGS OR THE THIRD PARTY CONTENT, INCLUDING ANY WARRANTY THAT THE SERVICE OFFERINGS OR THIRD PARTY CONTENT WILL BE UNINTERRUPTED, ERROR FREE OR FREE OF HARMFUL COMPONENTS, OR THAT ANY CONTENT, INCLUDING YOUR CONTENT OR THE THIRD PARTY CONTENT, WILL BE SECURE OR NOT OTHERWISE LOST OR DAMAGED. EXCEPT TO THE EXTENT PROHIBITED BY LAW, WE AND OUR AFFILIATES AND LICENSORS DISCLAIM ALL WARRANTIES [...] Source: https://aws.amazon.com/agreement/ ..do not blame them, it’s common to the ToS of most of the service providers! E.g., see: • https://www.rackspace.com/information/legal/cloud/tos • https://developers.google.com/appengine/terms The images used in this presentation are covered by different licenses, see the “Images Licenses” at the end of the deck.
  • 11. So what about security? Alessandro Manfredi alessandro@filerock.com “The big guys probably handle security better than how you could do on premise” The images used in this presentation are covered by different licenses, see the “Images Licenses” at the end of the deck.
  • 12. So what about security? Alessandro Manfredi alessandro@filerock.com “The big guys probably handle security better than how you could do on premise” To some extent, this actually makes sense • Operating on a large scale, they have more resources • Redundant networks, power sources, etc. • Good physical surveillance The images used in this presentation are covered by different licenses, see the “Images Licenses” at the end of the deck.
  • 13. However... Alessandro Manfredi alessandro@filerock.com Betting on a lot of assumptions that the provider... The images used in this presentation are covered by different licenses, see the “Images Licenses” at the end of the deck.
  • 14. Assuming that the provider... Alessandro Manfredi alessandro@filerock.com ... has no malicious intent ... The images used in this presentation are covered by different licenses, see the “Images Licenses” at the end of the deck.
  • 15. Assuming that the provider... Alessandro Manfredi alessandro@filerock.com ... has complete control over employees ... The images used in this presentation are covered by different licenses, see the “Images Licenses” at the end of the deck.
  • 16. Assuming that the provider... Alessandro Manfredi alessandro@filerock.com ... uses software that never fails ... The images used in this presentation are covered by different licenses, see the “Images Licenses” at the end of the deck.
  • 17. Assuming that the provider... Alessandro Manfredi alessandro@filerock.com ... does not introduce security-critical bugs ... The images used in this presentation are covered by different licenses, see the “Images Licenses” at the end of the deck.
  • 18. Assuming that the provider... Alessandro Manfredi alessandro@filerock.com ... never screws up ... The images used in this presentation are covered by different licenses, see the “Images Licenses” at the end of the deck.
  • 19. Assuming that the provider... Alessandro Manfredi alessandro@filerock.com ... always takes good care of your resources, even if by ToS / SLA they are not legally responsible for any error or damage. The images used in this presentation are covered by different licenses, see the “Images Licenses” at the end of the deck.
  • 20. What can possibly go wrong? Alessandro Manfredi alessandro@filerock.com Wait, what can possibly go wrong with services used by hundreds of millions of customers around the world? The images used in this presentation are covered by different licenses, see the “Images Licenses” at the end of the deck.
  • 21. Mistakes happen Alessandro Manfredi alessandro@filerock.com On June 2011, for few hours any Dropbox account was accessible with any password ( not blaming them, these things can happen ) The images used in this presentation are covered by different licenses, see the “Images Licenses” at the end of the deck. Screenshots of web pages can include contents whose license is defined by the relative publisher.
  • 22. What about enterprise services? Alessandro Manfredi alessandro@filerock.com Ok, but that’s just because it’s a consumer service... It will never happen in an enterprise-class service... Plus everyone now offers two factor authentication. The images used in this presentation are covered by different licenses, see the “Images Licenses” at the end of the deck.
  • 23. Even big security firms have security breaches Alessandro Manfredi alessandro@filerock.com Earlier in 2011, RSA was victim of a breach that compromised customers protected by their SecurID ( again, not blaming them, these things can happen ) The images used in this presentation are covered by different licenses, see the “Images Licenses” at the end of the deck. Screenshots of web pages can include contents whose license is defined by the relative publisher.
  • 24. Even when providers behave as you expect... Alessandro Manfredi alessandro@filerock.com Cloud providers must obey the laws enforced in the country where they are based. The images used in this presentation are covered by different licenses, see the “Images Licenses” at the end of the deck.
  • 25. Even when providers behave as you expect... Alessandro Manfredi alessandro@filerock.com Cloud providers must obey the laws enforced in the country where they are based. Authorities can access Data might be intentionally your data tampered or made unavailable The images used in this presentation are covered by different licenses, see the “Images Licenses” at the end of the deck.
  • 26. Data security Alessandro Manfredi alessandro@filerock.com Focus on data security The images used in this presentation are covered by different licenses, see the “Images Licenses” at the end of the deck.
  • 27. Data security Alessandro Manfredi alessandro@filerock.com Three main concerns C Confidentiality Integrity I Availability A The images used in this presentation are covered by different licenses, see the “Images Licenses” at the end of the deck.
  • 28. Data security Alessandro Manfredi alessandro@filerock.com Three main concerns C Confidentiality Integrity I Availability A The images used in this presentation are covered by different licenses, see the “Images Licenses” at the end of the deck.
  • 29. Why integrity matters Alessandro Manfredi alessandro@filerock.com The images used in this presentation are covered by different licenses, see the “Images Licenses” at the end of the deck.
  • 30. Why integrity matters Alessandro Manfredi alessandro@filerock.com 1 Data is stored on the cloud The images used in this presentation are covered by different licenses, see the “Images Licenses” at the end of the deck.
  • 31. Why integrity matters Alessandro Manfredi alessandro@filerock.com 2 The provider experiences a fault or a breach. Data gets corrupted. (possibly, a previous version of the data is restored from a backup) The images used in this presentation are covered by different licenses, see the “Images Licenses” at the end of the deck.
  • 32. Why integrity matters Alessandro Manfredi alessandro@filerock.com 3 The user wants to recover his data from the cloud The images used in this presentation are covered by different licenses, see the “Images Licenses” at the end of the deck.
  • 33. Why integrity matters Alessandro Manfredi alessandro@filerock.com 4 Corrupted data is retrieved by the user without any notice The images used in this presentation are covered by different licenses, see the “Images Licenses” at the end of the deck.
  • 34. Why integrity matters Alessandro Manfredi alessandro@filerock.com 5 The corrupted data is used by the user in his own activity, unnoticed. The images used in this presentation are covered by different licenses, see the “Images Licenses” at the end of the deck.
  • 35. Integrity check, from 10.000 ft Alessandro Manfredi alessandro@filerock.com The images used in this presentation are covered by different licenses, see the “Images Licenses” at the end of the deck.
  • 36. Integrity check, from 10.000 ft Alessandro Manfredi alessandro@filerock.com 1 Data is stored on the cloud The images used in this presentation are covered by different licenses, see the “Images Licenses” at the end of the deck.
  • 37. Integrity check, from 10.000 ft Alessandro Manfredi alessandro@filerock.com 2 A fingerprint of the whole data set, called basis, is efficiently recomputed The images used in this presentation are covered by different licenses, see the “Images Licenses” at the end of the deck.
  • 38. Integrity check, from 10.000 ft Alessandro Manfredi alessandro@filerock.com 3 The user wants to recover his data from the cloud The images used in this presentation are covered by different licenses, see the “Images Licenses” at the end of the deck.
  • 39. Integrity check, from 10.000 ft Alessandro Manfredi alessandro@filerock.com 4 The software retrieves the data together with a proof of integrity The images used in this presentation are covered by different licenses, see the “Images Licenses” at the end of the deck.
  • 40. Integrity check, from 10.000 ft Alessandro Manfredi alessandro@filerock.com 5 The integrity of the data is checked by matching the proof with the last trusted basis. The images used in this presentation are covered by different licenses, see the “Images Licenses” at the end of the deck.
  • 41. How is that done? Alessandro Manfredi alessandro@filerock.com The images used in this presentation are covered by different licenses, see the “Images Licenses” at the end of the deck.
  • 42. Authenticated Data Structures Alessandro Manfredi alessandro@filerock.com a b c d e f g A B C D The images used in this presentation are covered by different licenses, see the “Images Licenses” at the end of the deck.
  • 43. Authenticated Data Structures Alessandro Manfredi alessandro@filerock.com a basis: a fingerprint of the whole data set b c d e f g A B C D data The images used in this presentation are covered by different licenses, see the “Images Licenses” at the end of the deck.
  • 44. Authenticated Data Structures Alessandro Manfredi alessandro@filerock.com a basis: a fingerprint of the whole data set b c kept safe client side, d e f g updated on any data modification A B C D data The images used in this presentation are covered by different licenses, see the “Images Licenses” at the end of the deck.
  • 45. Example: Integrity check for “D" Alessandro Manfredi alessandro@filerock.com a b c d e f g A B C D The images used in this presentation are covered by different licenses, see the “Images Licenses” at the end of the deck.
  • 46. Example: Integrity check for “D" Alessandro Manfredi alessandro@filerock.com a b c d e f g A B C D D = data The images used in this presentation are covered by different licenses, see the “Images Licenses” at the end of the deck.
  • 47. Example: Integrity check for “D" Alessandro Manfredi alessandro@filerock.com Integrity Proof a b c d e f g A B C D D = data The images used in this presentation are covered by different licenses, see the “Images Licenses” at the end of the deck.
  • 48. Example: Integrity check for “D" Alessandro Manfredi alessandro@filerock.com a b c d e f g g = hash(D) A B C D D = data The images used in this presentation are covered by different licenses, see the “Images Licenses” at the end of the deck.
  • 49. Example: Integrity check for “D" Alessandro Manfredi alessandro@filerock.com a b c c = hash(f, g) d e f g g = hash(D) A B C D D = data The images used in this presentation are covered by different licenses, see the “Images Licenses” at the end of the deck.
  • 50. Example: Integrity check for “D" Alessandro Manfredi alessandro@filerock.com a a = hash(b, c) b c c = hash(f, g) d e f g g = hash(D) A B C D D = data The images used in this presentation are covered by different licenses, see the “Images Licenses” at the end of the deck.
  • 51. Example: Integrity check for “D" Alessandro Manfredi alessandro@filerock.com must match the trusted basis a a = hash(b, c) b c c = hash(f, g) d e f g g = hash(D) A B C D D = data The images used in this presentation are covered by different licenses, see the “Images Licenses” at the end of the deck.
  • 52. Integrity check capabilities Alessandro Manfredi alessandro@filerock.com • Verify integrity of the whole dataset • ...including completeness • Work in log(dataset_size) time • Only the basis needs to be stored locally • ...small as the output of an hash function The images used in this presentation are covered by different licenses, see the “Images Licenses” at the end of the deck.
  • 53. Integrity check capabilities Alessandro Manfredi alessandro@filerock.com • Verify integrity of the whole dataset • ...including completeness • Work in log(dataset_size) time • Only the basis needs to be stored locally • ...small as the output of an hash function • Always work with correct data • Can be used for specific SLAs The images used in this presentation are covered by different licenses, see the “Images Licenses” at the end of the deck.
  • 54. By the way, if you look at the FileRock ToS... Alessandro Manfredi alessandro@filerock.com As the other services, all warranties are disclaimed. The images used in this presentation are covered by different licenses, see the “Images Licenses” at the end of the deck.
  • 55. Your reaction... Alessandro Manfredi alessandro@filerock.com Are you kidding me? The images used in this presentation are covered by different licenses, see the “Images Licenses” at the end of the deck.
  • 56. The FileRock Solution Alessandro Manfredi alessandro@filerock.com • Open source client • Client-side encryption • Encryption keys never shared with the service • Client-side integrity check • Data replication • Local replication (synchronization) • Remote replication (cross-provider)* *not implemented yet The images used in this presentation are covered by different licenses, see the “Images Licenses” at the end of the deck.
  • 57. The FileRock Solution Alessandro Manfredi alessandro@filerock.com • Open source client Available on • Client-side encryption • Encryption keys never shared with the service • Client-side integrity check • Data replication • Local replication (synchronization) • Remote replication (cross-provider)* *not implemented yet The images used in this presentation are covered by different licenses, see the “Images Licenses” at the end of the deck.
  • 58. FileRock: how it looks now Alessandro Manfredi alessandro@filerock.com The images used in this presentation are covered by different licenses, see the “Images Licenses” at the end of the deck.
  • 59. FileRock Toolkit Demo Alessandro Manfredi alessandro@filerock.com The images used in this presentation are covered by different licenses, see the “Images Licenses” at the end of the deck.
  • 60. FileRock - Try it Alessandro Manfredi alessandro@filerock.com https://www.filerock.com/register The images used in this presentation are covered by different licenses, see the “Images Licenses” at the end of the deck.
  • 61. Alessandro Manfredi Hey Cloud, it’s the user calling, he says he wants the security back alessandro@filerock.com @n0on3 in/n0on3
  • 62. End of the presentation
  • 63. Images Licenses Free for personal use Public Domain Free for commercial use do not redistribute See the owner note Copyright belongs to the original authors and publishers The images used in this presentation are covered by different licenses, see the “Images Licenses” at the end of the deck.