SlideShare una empresa de Scribd logo
1 de 18
Data Governance and
Management in Cloud
Siauw Nam Khong
April 27th 2019
1
Industry 3.0 – Industry 4.0
Industry 4.0 Cloud Computation
 Services and Solutions that are
delivered and consumed in real
time over internet are Cloud
Service
• Example : When you store your
photos online, use webmail, or
social networking site, you are
using a “cloud computing” service.
 Cloud Computing is a delivery
model of computing service over
the internet
• It enables real time development,
deployment, and delivery of
broad range of products, service,
and solution
Information Flow in Cloud
• How to classify information?
• Which information to secure?
• What should be the basis to secure it?
• What is the value of information?
• How much to spend on securing information?
CIA Model
Confidentiality, Integrity & Availability
• Confidentiality: Is to protect information from accidental
or malicious disclosure.
• Integrity: Is to protect information from accidental or
intentional (malicious) modification.
• Availability: Is to make sure that information is available to
those who need it and when they need it.
Confidentiality
• Equivalent to privacy:
• Prevent sensitive information from reaching the wrong
people
• Right people can get the authorized acess
• Trained to guard the data with strong password
• Avoid social engineering hack
• Data Encryption
• Encrypted connection with 2 Factor Authentication:
• With biometric verification, security tokens.
• Logging, audit trails
Integrity
• Maintain the consistency, accuracy and
trustworthiness of data over its entire life cycle.
• Additional Digital Hash (checksums), Digital Signature
(cryptographic checksums)
• Version control to prevent erroneous changes or
accidental deletion by authorized users.
• Backups or redundancy of data.
Availability
• Hardware availability
• Link redundancy
• Load Balancer
• Disaster Recovery Plan
• Data Backup in different geographically-isolated
location.
• Extra security equipment or software:
• Firewalls
• Proxy Servers
• Intrusion Detecting System / Intrusion Preventing System
Compute Resource Virtualization
Infrastructure
as a Service
(laaS)
Platform as
a Service
(PaaS)
Software as
a Service
(SaaS)On-Premises IT Colocation Hosting
4
© 2016 Gartner, Inc. and/or its affiliates. All rights reserved.
Provider-Supplied, Managed
Self-Supplied, Managed
Data CenterData CenterData CenterData CenterData CenterData Center
Network & StorageNetwork & StorageNetwork & StorageNetwork & StorageNetwork & StorageNetwork & Storage
Physical ServersPhysical ServersPhysical ServersPhysical ServersPhysical ServersPhysical Servers
VirtualizationVirtualizationVirtualization + CMPVirtualizationVirtualizationVirtualization
Operating SystemOperating SystemOperating SystemOperating SystemOperating SystemOperating System
DatabasesDatabasesDatabasesDatabasesDatabasesDatabases
ApplicationsApplicationsApplicationsApplicationsApplicationsApplications
DataDataDataDataDataData
Virtual Machines vs Containers
Network Resource Virtualization
Legacy
Virtualized
Network Virtualization:
Simplification
More on Network Virtualization
• Distributed Firewall
• Microsegmentation
• Logical switch
• VXLAN and logical network segmentation
• Distributed Logical Router
• A logical router that can span across all of physical hosts
• Solves traffic hairpinning – routed traffic between two VMs on the
same host never leaves the host
• Traditional routing protocols to peer your VMware
environment with the outside world
• NSX Edge
• Load balancing, VPN services, NAT, DHCP, etc.
Network Virtualization Example
Physical
Host 2
VNI 5003DB1 DB2 DB3
VNI 5002APP1 APP2 APP3
DFW
DFW
VNI 5001Web1 Web2
INTERNET
FW
FW -
VPN
VNI 5004
EXTRANET
FW -
VPN
MGMT
JumpHost1 JumpHost2
DFW DFW
DFW
Physical
Host 1
Physical
Host 3
Physical
Host 4
Physical
Host 5
Backup Strategy
One System for Any Data
• Backup Any Data: OS, VM, apps.
• Restore Any Data: bytes, blocks, bricks, objects, whole
systems
• Transfer Any Data: huge files, lots of small files, hot data,
big data
• Store on Any Data Media: disks, tapes or in the cloud
Most Complete System for Your Data
• Ensures consistency and recoverability of Your Data
• De-duplicates and compresses Your Data for efficient
storage and transmission
• Use authentication and strong encryption for security of
Your Data
• Provides monitoring, auditing, reporting, data retention and
other means of safeguarding Your Data
3-2-1 Rule of Backup
https://www.youtube.com/watch?v=wLX5wEUGlE0
Disaster Recovery Strategy
Local
Datacenter
Real-time data
replication
• Real-time monitoring
• Web-based interface
Local Datacenter with Tier III Design, KVM &
Vmware hypervisors, Multiple OS supported
(Microsoft, Linux, Custom OS), 24x7 Support (NOC
& SOC),
HOT
 Multi-site
datacenter
 Real-time data
replication
 Up to zero data loss
guaranteed
 Immediately
recovery
Data Governance and Management in Cloud pak nam

Más contenido relacionado

La actualidad más candente

cloud computing encrypted
cloud computing encryptedcloud computing encrypted
cloud computing encryptedDevanandPatil6
 
Hadoop and Data Access Security
Hadoop and Data Access SecurityHadoop and Data Access Security
Hadoop and Data Access SecurityCloudera, Inc.
 
Project Rhino: Enhancing Data Protection for Hadoop
Project Rhino: Enhancing Data Protection for HadoopProject Rhino: Enhancing Data Protection for Hadoop
Project Rhino: Enhancing Data Protection for HadoopCloudera, Inc.
 
Comprehensive Security for the Enterprise IV: Visibility Through a Single End...
Comprehensive Security for the Enterprise IV: Visibility Through a Single End...Comprehensive Security for the Enterprise IV: Visibility Through a Single End...
Comprehensive Security for the Enterprise IV: Visibility Through a Single End...Cloudera, Inc.
 
150618 tryggve update
150618 tryggve update150618 tryggve update
150618 tryggve updateanttipursula
 
Safe use of personal data in research
Safe use of personal data in researchSafe use of personal data in research
Safe use of personal data in researchanttipursula
 
Raabit and bacteria
Raabit and bacteriaRaabit and bacteria
Raabit and bacteriasabin kafle
 
The Cloud Security Rules
The Cloud Security RulesThe Cloud Security Rules
The Cloud Security RulesKai Roer
 
Advanced Cryptography for Cloud Security
Advanced Cryptography for Cloud SecurityAdvanced Cryptography for Cloud Security
Advanced Cryptography for Cloud SecurityNeel Chakraborty
 
Solving access for hybrid it Axians (introducing pulse secure) - Networkshop44
Solving access for hybrid it  Axians (introducing pulse secure) - Networkshop44Solving access for hybrid it  Axians (introducing pulse secure) - Networkshop44
Solving access for hybrid it Axians (introducing pulse secure) - Networkshop44Jisc
 
Comprehensive Security for the Enterprise II: Guarding the Perimeter and Cont...
Comprehensive Security for the Enterprise II: Guarding the Perimeter and Cont...Comprehensive Security for the Enterprise II: Guarding the Perimeter and Cont...
Comprehensive Security for the Enterprise II: Guarding the Perimeter and Cont...Cloudera, Inc.
 
Ricon 2015 final
Ricon 2015 finalRicon 2015 final
Ricon 2015 finalKevin Jones
 
WSO2 Guest Webinar: Securing SaaS Apps with Multi-factor Authentication with ...
WSO2 Guest Webinar: Securing SaaS Apps with Multi-factor Authentication with ...WSO2 Guest Webinar: Securing SaaS Apps with Multi-factor Authentication with ...
WSO2 Guest Webinar: Securing SaaS Apps with Multi-factor Authentication with ...WSO2
 
Global bigdata conf_01282013
Global bigdata conf_01282013Global bigdata conf_01282013
Global bigdata conf_01282013HPCC Systems
 
Tryggve support for-research
Tryggve support for-researchTryggve support for-research
Tryggve support for-researchanttipursula
 
A hybrid cloud approach for secure authorized deduplication
A hybrid cloud approach for secure authorized deduplicationA hybrid cloud approach for secure authorized deduplication
A hybrid cloud approach for secure authorized deduplicationLeMeniz Infotech
 
Corporate & Regulatory Compliance Boot Camp - Data Privacy Compliance
Corporate & Regulatory Compliance Boot Camp - Data Privacy ComplianceCorporate & Regulatory Compliance Boot Camp - Data Privacy Compliance
Corporate & Regulatory Compliance Boot Camp - Data Privacy ComplianceFinancial Poise
 
C* Summit 2013: Lock it Up: Securing Sensitive Data by Sam Heywood
C* Summit 2013: Lock it Up: Securing Sensitive Data by Sam HeywoodC* Summit 2013: Lock it Up: Securing Sensitive Data by Sam Heywood
C* Summit 2013: Lock it Up: Securing Sensitive Data by Sam HeywoodDataStax Academy
 
Software Defined Perimeter - A New Paradigm for Securing Digital Infrastructu...
Software Defined Perimeter - A New Paradigm for Securing Digital Infrastructu...Software Defined Perimeter - A New Paradigm for Securing Digital Infrastructu...
Software Defined Perimeter - A New Paradigm for Securing Digital Infrastructu...Government Technology & Services Coalition
 

La actualidad más candente (20)

cloud computing encrypted
cloud computing encryptedcloud computing encrypted
cloud computing encrypted
 
Hadoop and Data Access Security
Hadoop and Data Access SecurityHadoop and Data Access Security
Hadoop and Data Access Security
 
Project Rhino: Enhancing Data Protection for Hadoop
Project Rhino: Enhancing Data Protection for HadoopProject Rhino: Enhancing Data Protection for Hadoop
Project Rhino: Enhancing Data Protection for Hadoop
 
Cloud security
Cloud securityCloud security
Cloud security
 
Comprehensive Security for the Enterprise IV: Visibility Through a Single End...
Comprehensive Security for the Enterprise IV: Visibility Through a Single End...Comprehensive Security for the Enterprise IV: Visibility Through a Single End...
Comprehensive Security for the Enterprise IV: Visibility Through a Single End...
 
150618 tryggve update
150618 tryggve update150618 tryggve update
150618 tryggve update
 
Safe use of personal data in research
Safe use of personal data in researchSafe use of personal data in research
Safe use of personal data in research
 
Raabit and bacteria
Raabit and bacteriaRaabit and bacteria
Raabit and bacteria
 
The Cloud Security Rules
The Cloud Security RulesThe Cloud Security Rules
The Cloud Security Rules
 
Advanced Cryptography for Cloud Security
Advanced Cryptography for Cloud SecurityAdvanced Cryptography for Cloud Security
Advanced Cryptography for Cloud Security
 
Solving access for hybrid it Axians (introducing pulse secure) - Networkshop44
Solving access for hybrid it  Axians (introducing pulse secure) - Networkshop44Solving access for hybrid it  Axians (introducing pulse secure) - Networkshop44
Solving access for hybrid it Axians (introducing pulse secure) - Networkshop44
 
Comprehensive Security for the Enterprise II: Guarding the Perimeter and Cont...
Comprehensive Security for the Enterprise II: Guarding the Perimeter and Cont...Comprehensive Security for the Enterprise II: Guarding the Perimeter and Cont...
Comprehensive Security for the Enterprise II: Guarding the Perimeter and Cont...
 
Ricon 2015 final
Ricon 2015 finalRicon 2015 final
Ricon 2015 final
 
WSO2 Guest Webinar: Securing SaaS Apps with Multi-factor Authentication with ...
WSO2 Guest Webinar: Securing SaaS Apps with Multi-factor Authentication with ...WSO2 Guest Webinar: Securing SaaS Apps with Multi-factor Authentication with ...
WSO2 Guest Webinar: Securing SaaS Apps with Multi-factor Authentication with ...
 
Global bigdata conf_01282013
Global bigdata conf_01282013Global bigdata conf_01282013
Global bigdata conf_01282013
 
Tryggve support for-research
Tryggve support for-researchTryggve support for-research
Tryggve support for-research
 
A hybrid cloud approach for secure authorized deduplication
A hybrid cloud approach for secure authorized deduplicationA hybrid cloud approach for secure authorized deduplication
A hybrid cloud approach for secure authorized deduplication
 
Corporate & Regulatory Compliance Boot Camp - Data Privacy Compliance
Corporate & Regulatory Compliance Boot Camp - Data Privacy ComplianceCorporate & Regulatory Compliance Boot Camp - Data Privacy Compliance
Corporate & Regulatory Compliance Boot Camp - Data Privacy Compliance
 
C* Summit 2013: Lock it Up: Securing Sensitive Data by Sam Heywood
C* Summit 2013: Lock it Up: Securing Sensitive Data by Sam HeywoodC* Summit 2013: Lock it Up: Securing Sensitive Data by Sam Heywood
C* Summit 2013: Lock it Up: Securing Sensitive Data by Sam Heywood
 
Software Defined Perimeter - A New Paradigm for Securing Digital Infrastructu...
Software Defined Perimeter - A New Paradigm for Securing Digital Infrastructu...Software Defined Perimeter - A New Paradigm for Securing Digital Infrastructu...
Software Defined Perimeter - A New Paradigm for Securing Digital Infrastructu...
 

Similar a Data Governance and Management in Cloud pak nam

Security Issues of Cloud Computing
Security Issues of Cloud ComputingSecurity Issues of Cloud Computing
Security Issues of Cloud ComputingFalgun Rathod
 
Plnog13 2014 security intelligence_pkedra_v1
Plnog13 2014 security intelligence_pkedra_v1Plnog13 2014 security intelligence_pkedra_v1
Plnog13 2014 security intelligence_pkedra_v1PROIDEA
 
110307 cloud security requirements gourley
110307 cloud security requirements gourley110307 cloud security requirements gourley
110307 cloud security requirements gourleyGovCloud Network
 
Cloud data governance, risk management and compliance ny metro joint cyber...
Cloud data governance, risk management and compliance    ny metro joint cyber...Cloud data governance, risk management and compliance    ny metro joint cyber...
Cloud data governance, risk management and compliance ny metro joint cyber...Ulf Mattsson
 
Presentacion de solucion cloud de navegacion segura
Presentacion de solucion cloud de navegacion seguraPresentacion de solucion cloud de navegacion segura
Presentacion de solucion cloud de navegacion seguraRogerChaucaZea
 
Data Analytics Governance and Ethics
Data Analytics Governance and EthicsData Analytics Governance and Ethics
Data Analytics Governance and EthicsHPCC Systems
 
Cloud Security for Regulated Firms - Securing my cloud and proving it
Cloud Security for Regulated Firms - Securing my cloud and proving itCloud Security for Regulated Firms - Securing my cloud and proving it
Cloud Security for Regulated Firms - Securing my cloud and proving itHentsū
 
Fighting cyber fraud with hadoop
Fighting cyber fraud with hadoopFighting cyber fraud with hadoop
Fighting cyber fraud with hadoopNiel Dunnage
 
Securing The Clouds with The Standard Best Practices-1.pdf
Securing The Clouds with The Standard Best Practices-1.pdfSecuring The Clouds with The Standard Best Practices-1.pdf
Securing The Clouds with The Standard Best Practices-1.pdfChinatu Uzuegbu
 
Extending security in the cloud network box - v4
Extending security in the cloud   network box - v4Extending security in the cloud   network box - v4
Extending security in the cloud network box - v4Valencell, Inc.
 
Software Defined Networking in the ATMOSPHERE project
Software Defined Networking in the ATMOSPHERE projectSoftware Defined Networking in the ATMOSPHERE project
Software Defined Networking in the ATMOSPHERE projectATMOSPHERE .
 
Cloud Security: A matter of trust?
Cloud Security: A matter of trust?Cloud Security: A matter of trust?
Cloud Security: A matter of trust?Mark Williams
 
0th PPT - BLOCKCHAIN-CBE (1).ppt
0th PPT - BLOCKCHAIN-CBE (1).ppt0th PPT - BLOCKCHAIN-CBE (1).ppt
0th PPT - BLOCKCHAIN-CBE (1).pptVarioTechnology
 
Securing Your Mobile Applications
Securing Your Mobile ApplicationsSecuring Your Mobile Applications
Securing Your Mobile ApplicationsGreg Patton
 
Security Considerations When Using Cloud Infrastructure Services.pdf
Security Considerations When Using Cloud Infrastructure Services.pdfSecurity Considerations When Using Cloud Infrastructure Services.pdf
Security Considerations When Using Cloud Infrastructure Services.pdfCiente
 
Scality SDS Day, London, 20 SEP 2017
Scality SDS Day, London, 20 SEP 2017Scality SDS Day, London, 20 SEP 2017
Scality SDS Day, London, 20 SEP 2017Chris Evans
 
talk6securingcloudamarprusty-191030091632.pptx
talk6securingcloudamarprusty-191030091632.pptxtalk6securingcloudamarprusty-191030091632.pptx
talk6securingcloudamarprusty-191030091632.pptxTrongMinhHoang1
 
security Issues of cloud computing
security Issues of cloud computingsecurity Issues of cloud computing
security Issues of cloud computingprachupanchal
 

Similar a Data Governance and Management in Cloud pak nam (20)

Security Issues of Cloud Computing
Security Issues of Cloud ComputingSecurity Issues of Cloud Computing
Security Issues of Cloud Computing
 
Plnog13 2014 security intelligence_pkedra_v1
Plnog13 2014 security intelligence_pkedra_v1Plnog13 2014 security intelligence_pkedra_v1
Plnog13 2014 security intelligence_pkedra_v1
 
Ccna sec 01
Ccna sec 01Ccna sec 01
Ccna sec 01
 
110307 cloud security requirements gourley
110307 cloud security requirements gourley110307 cloud security requirements gourley
110307 cloud security requirements gourley
 
Risks and Benefits of Cloud Computing
Risks and Benefits of Cloud ComputingRisks and Benefits of Cloud Computing
Risks and Benefits of Cloud Computing
 
Cloud data governance, risk management and compliance ny metro joint cyber...
Cloud data governance, risk management and compliance    ny metro joint cyber...Cloud data governance, risk management and compliance    ny metro joint cyber...
Cloud data governance, risk management and compliance ny metro joint cyber...
 
Presentacion de solucion cloud de navegacion segura
Presentacion de solucion cloud de navegacion seguraPresentacion de solucion cloud de navegacion segura
Presentacion de solucion cloud de navegacion segura
 
Data Analytics Governance and Ethics
Data Analytics Governance and EthicsData Analytics Governance and Ethics
Data Analytics Governance and Ethics
 
Cloud Security for Regulated Firms - Securing my cloud and proving it
Cloud Security for Regulated Firms - Securing my cloud and proving itCloud Security for Regulated Firms - Securing my cloud and proving it
Cloud Security for Regulated Firms - Securing my cloud and proving it
 
Fighting cyber fraud with hadoop
Fighting cyber fraud with hadoopFighting cyber fraud with hadoop
Fighting cyber fraud with hadoop
 
Securing The Clouds with The Standard Best Practices-1.pdf
Securing The Clouds with The Standard Best Practices-1.pdfSecuring The Clouds with The Standard Best Practices-1.pdf
Securing The Clouds with The Standard Best Practices-1.pdf
 
Extending security in the cloud network box - v4
Extending security in the cloud   network box - v4Extending security in the cloud   network box - v4
Extending security in the cloud network box - v4
 
Software Defined Networking in the ATMOSPHERE project
Software Defined Networking in the ATMOSPHERE projectSoftware Defined Networking in the ATMOSPHERE project
Software Defined Networking in the ATMOSPHERE project
 
Cloud Security: A matter of trust?
Cloud Security: A matter of trust?Cloud Security: A matter of trust?
Cloud Security: A matter of trust?
 
0th PPT - BLOCKCHAIN-CBE (1).ppt
0th PPT - BLOCKCHAIN-CBE (1).ppt0th PPT - BLOCKCHAIN-CBE (1).ppt
0th PPT - BLOCKCHAIN-CBE (1).ppt
 
Securing Your Mobile Applications
Securing Your Mobile ApplicationsSecuring Your Mobile Applications
Securing Your Mobile Applications
 
Security Considerations When Using Cloud Infrastructure Services.pdf
Security Considerations When Using Cloud Infrastructure Services.pdfSecurity Considerations When Using Cloud Infrastructure Services.pdf
Security Considerations When Using Cloud Infrastructure Services.pdf
 
Scality SDS Day, London, 20 SEP 2017
Scality SDS Day, London, 20 SEP 2017Scality SDS Day, London, 20 SEP 2017
Scality SDS Day, London, 20 SEP 2017
 
talk6securingcloudamarprusty-191030091632.pptx
talk6securingcloudamarprusty-191030091632.pptxtalk6securingcloudamarprusty-191030091632.pptx
talk6securingcloudamarprusty-191030091632.pptx
 
security Issues of cloud computing
security Issues of cloud computingsecurity Issues of cloud computing
security Issues of cloud computing
 

Más de PT Datacomm Diangraha

Start Your Cloud Native Journey with Containerization
Start Your Cloud Native Journey with ContainerizationStart Your Cloud Native Journey with Containerization
Start Your Cloud Native Journey with ContainerizationPT Datacomm Diangraha
 
Converting Your Existing SAP Server Infrastructure to a Modern Cloud-Based Ar...
Converting Your Existing SAP Server Infrastructure to a Modern Cloud-Based Ar...Converting Your Existing SAP Server Infrastructure to a Modern Cloud-Based Ar...
Converting Your Existing SAP Server Infrastructure to a Modern Cloud-Based Ar...PT Datacomm Diangraha
 
Sutedjo - Digital Transformation for SAP
Sutedjo -  Digital Transformation for SAPSutedjo -  Digital Transformation for SAP
Sutedjo - Digital Transformation for SAPPT Datacomm Diangraha
 
Nam Khong - SAP on Cloud for Your Intelligent Enterprise
Nam Khong - SAP on Cloud for Your Intelligent EnterpriseNam Khong - SAP on Cloud for Your Intelligent Enterprise
Nam Khong - SAP on Cloud for Your Intelligent EnterprisePT Datacomm Diangraha
 
Micro services container - Nam Khong
Micro services container - Nam KhongMicro services container - Nam Khong
Micro services container - Nam KhongPT Datacomm Diangraha
 
Kubernetes Benefits - Sutedjo Tjahjadi
Kubernetes Benefits - Sutedjo TjahjadiKubernetes Benefits - Sutedjo Tjahjadi
Kubernetes Benefits - Sutedjo TjahjadiPT Datacomm Diangraha
 
OCP Datacomm RedHat - Kubernetes Launch
OCP Datacomm RedHat - Kubernetes LaunchOCP Datacomm RedHat - Kubernetes Launch
OCP Datacomm RedHat - Kubernetes LaunchPT Datacomm Diangraha
 
Cloud computing for making indonesia 4.0
Cloud computing for making indonesia 4.0 Cloud computing for making indonesia 4.0
Cloud computing for making indonesia 4.0 PT Datacomm Diangraha
 
Disaster Recovery: Understanding Trend, Methodology, Solution, and Standard
Disaster Recovery:  Understanding Trend, Methodology, Solution, and StandardDisaster Recovery:  Understanding Trend, Methodology, Solution, and Standard
Disaster Recovery: Understanding Trend, Methodology, Solution, and StandardPT Datacomm Diangraha
 

Más de PT Datacomm Diangraha (20)

Openshift Workshop
Openshift Workshop Openshift Workshop
Openshift Workshop
 
Start Your Cloud Native Journey with Containerization
Start Your Cloud Native Journey with ContainerizationStart Your Cloud Native Journey with Containerization
Start Your Cloud Native Journey with Containerization
 
Disaster Recovery Cook Book
Disaster Recovery Cook BookDisaster Recovery Cook Book
Disaster Recovery Cook Book
 
Converting Your Existing SAP Server Infrastructure to a Modern Cloud-Based Ar...
Converting Your Existing SAP Server Infrastructure to a Modern Cloud-Based Ar...Converting Your Existing SAP Server Infrastructure to a Modern Cloud-Based Ar...
Converting Your Existing SAP Server Infrastructure to a Modern Cloud-Based Ar...
 
Sutedjo - open banking may 27, 2021
Sutedjo - open banking may 27, 2021Sutedjo - open banking may 27, 2021
Sutedjo - open banking may 27, 2021
 
Darwin - PT IMI
Darwin - PT IMIDarwin - PT IMI
Darwin - PT IMI
 
Sutedjo - Introduction to Cloud
Sutedjo - Introduction to CloudSutedjo - Introduction to Cloud
Sutedjo - Introduction to Cloud
 
Aditya - Connecting Future
Aditya - Connecting FutureAditya - Connecting Future
Aditya - Connecting Future
 
Wiranto
WirantoWiranto
Wiranto
 
Sutedjo - Digital Transformation for SAP
Sutedjo -  Digital Transformation for SAPSutedjo -  Digital Transformation for SAP
Sutedjo - Digital Transformation for SAP
 
Nam Khong - SAP on Cloud for Your Intelligent Enterprise
Nam Khong - SAP on Cloud for Your Intelligent EnterpriseNam Khong - SAP on Cloud for Your Intelligent Enterprise
Nam Khong - SAP on Cloud for Your Intelligent Enterprise
 
Micro services container - Nam Khong
Micro services container - Nam KhongMicro services container - Nam Khong
Micro services container - Nam Khong
 
Kubernetes Benefits - Sutedjo Tjahjadi
Kubernetes Benefits - Sutedjo TjahjadiKubernetes Benefits - Sutedjo Tjahjadi
Kubernetes Benefits - Sutedjo Tjahjadi
 
OCP Datacomm RedHat - Kubernetes Launch
OCP Datacomm RedHat - Kubernetes LaunchOCP Datacomm RedHat - Kubernetes Launch
OCP Datacomm RedHat - Kubernetes Launch
 
Cloud computing for making indonesia 4.0
Cloud computing for making indonesia 4.0 Cloud computing for making indonesia 4.0
Cloud computing for making indonesia 4.0
 
Cloud technology for hospitality
Cloud technology for hospitalityCloud technology for hospitality
Cloud technology for hospitality
 
Why build sap on cloud
Why build sap on cloudWhy build sap on cloud
Why build sap on cloud
 
Sap migration to cloud
Sap migration to cloudSap migration to cloud
Sap migration to cloud
 
Disaster Recovery: Understanding Trend, Methodology, Solution, and Standard
Disaster Recovery:  Understanding Trend, Methodology, Solution, and StandardDisaster Recovery:  Understanding Trend, Methodology, Solution, and Standard
Disaster Recovery: Understanding Trend, Methodology, Solution, and Standard
 
Hot Disaster Recovery Using Zerto
Hot Disaster Recovery Using ZertoHot Disaster Recovery Using Zerto
Hot Disaster Recovery Using Zerto
 

Último

AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 

Último (20)

AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 

Data Governance and Management in Cloud pak nam

  • 1. Data Governance and Management in Cloud Siauw Nam Khong April 27th 2019 1
  • 2. Industry 3.0 – Industry 4.0
  • 3. Industry 4.0 Cloud Computation  Services and Solutions that are delivered and consumed in real time over internet are Cloud Service • Example : When you store your photos online, use webmail, or social networking site, you are using a “cloud computing” service.  Cloud Computing is a delivery model of computing service over the internet • It enables real time development, deployment, and delivery of broad range of products, service, and solution
  • 4. Information Flow in Cloud • How to classify information? • Which information to secure? • What should be the basis to secure it? • What is the value of information? • How much to spend on securing information?
  • 5. CIA Model Confidentiality, Integrity & Availability • Confidentiality: Is to protect information from accidental or malicious disclosure. • Integrity: Is to protect information from accidental or intentional (malicious) modification. • Availability: Is to make sure that information is available to those who need it and when they need it.
  • 6. Confidentiality • Equivalent to privacy: • Prevent sensitive information from reaching the wrong people • Right people can get the authorized acess • Trained to guard the data with strong password • Avoid social engineering hack • Data Encryption • Encrypted connection with 2 Factor Authentication: • With biometric verification, security tokens. • Logging, audit trails
  • 7. Integrity • Maintain the consistency, accuracy and trustworthiness of data over its entire life cycle. • Additional Digital Hash (checksums), Digital Signature (cryptographic checksums) • Version control to prevent erroneous changes or accidental deletion by authorized users. • Backups or redundancy of data.
  • 8. Availability • Hardware availability • Link redundancy • Load Balancer • Disaster Recovery Plan • Data Backup in different geographically-isolated location. • Extra security equipment or software: • Firewalls • Proxy Servers • Intrusion Detecting System / Intrusion Preventing System
  • 9. Compute Resource Virtualization Infrastructure as a Service (laaS) Platform as a Service (PaaS) Software as a Service (SaaS)On-Premises IT Colocation Hosting 4 © 2016 Gartner, Inc. and/or its affiliates. All rights reserved. Provider-Supplied, Managed Self-Supplied, Managed Data CenterData CenterData CenterData CenterData CenterData Center Network & StorageNetwork & StorageNetwork & StorageNetwork & StorageNetwork & StorageNetwork & Storage Physical ServersPhysical ServersPhysical ServersPhysical ServersPhysical ServersPhysical Servers VirtualizationVirtualizationVirtualization + CMPVirtualizationVirtualizationVirtualization Operating SystemOperating SystemOperating SystemOperating SystemOperating SystemOperating System DatabasesDatabasesDatabasesDatabasesDatabasesDatabases ApplicationsApplicationsApplicationsApplicationsApplicationsApplications DataDataDataDataDataData
  • 10. Virtual Machines vs Containers
  • 13. More on Network Virtualization • Distributed Firewall • Microsegmentation • Logical switch • VXLAN and logical network segmentation • Distributed Logical Router • A logical router that can span across all of physical hosts • Solves traffic hairpinning – routed traffic between two VMs on the same host never leaves the host • Traditional routing protocols to peer your VMware environment with the outside world • NSX Edge • Load balancing, VPN services, NAT, DHCP, etc.
  • 14. Network Virtualization Example Physical Host 2 VNI 5003DB1 DB2 DB3 VNI 5002APP1 APP2 APP3 DFW DFW VNI 5001Web1 Web2 INTERNET FW FW - VPN VNI 5004 EXTRANET FW - VPN MGMT JumpHost1 JumpHost2 DFW DFW DFW Physical Host 1 Physical Host 3 Physical Host 4 Physical Host 5
  • 15. Backup Strategy One System for Any Data • Backup Any Data: OS, VM, apps. • Restore Any Data: bytes, blocks, bricks, objects, whole systems • Transfer Any Data: huge files, lots of small files, hot data, big data • Store on Any Data Media: disks, tapes or in the cloud Most Complete System for Your Data • Ensures consistency and recoverability of Your Data • De-duplicates and compresses Your Data for efficient storage and transmission • Use authentication and strong encryption for security of Your Data • Provides monitoring, auditing, reporting, data retention and other means of safeguarding Your Data
  • 16. 3-2-1 Rule of Backup https://www.youtube.com/watch?v=wLX5wEUGlE0
  • 17. Disaster Recovery Strategy Local Datacenter Real-time data replication • Real-time monitoring • Web-based interface Local Datacenter with Tier III Design, KVM & Vmware hypervisors, Multiple OS supported (Microsoft, Linux, Custom OS), 24x7 Support (NOC & SOC), HOT  Multi-site datacenter  Real-time data replication  Up to zero data loss guaranteed  Immediately recovery

Notas del editor

  1. This is the first page. You can change the text into anything that suit your need.