SlideShare una empresa de Scribd logo
1 de 8
Gilad Parann-Nissany June 2nd, 2010 Practicing Security in Public Clouds 6/1/2010 Copyright 2009, 2010 ©Porticor
Porticor 6/1/2010 Copyright 2009, 2010 ©Porticor
Public Clouds and FUD 6/1/2010 Copyright 2009, 2010 © Porticor Pay as you go Reasonable cost On-demand Self service Elastic Scale My precious data in a public place? Who do I trust? How easy to hack? Is encryption enough? Can I control it? Many considerations exist even before clouds Some considerations really are new
How much security do I need? 6/1/2010 Copyright 2009, 2010 ©Porticor
Modern threats…Its far too easy to be a bad guy Hacking is a business today, often involving professional criminals Interesting fact: biggest cloud in the world belongs to the crooks Number of Systems: 6,400,000 Number of CPUs: 18,000,000+ Bandwidth: 28 Terabits  Facilities: 230 Countries …the Conficker worm  6/1/2010 Copyright 2009, 2010 ©Porticor R. Joffe
Security… 6/1/2010 Copyright 2009, 2010 ©Porticor by clarity
Applying Security Concepts to Public Clouds Secure distributed data storage Keys management Hypervisors and virtual machines Intrusion Detection and Prevention (IDS/IPS) Logging and Log forensics Security Information Management Identity Access Management Policy management Denial of Service prevention Web Application Firewall Firewall Virtual Private Networks Encryption Database Firewall Data Leak Prevention Scanning for exploits Scanning for virus Physical security … 6/1/2010 Copyright 2009, 2010 ©Porticor *courtesy CSA
Understand the value of your data and service: sec should be cost effective Understand your complete problem domain Governance & Measurement Architecture & Technology Specifics of your application Answers Some are known already Some are truly new Cloud Operations really is new! Map out – what’s relevant for you Roll your own – or work with someone who has experience? 6/1/2010 Copyright 2009, 2010 ©Porticor

Más contenido relacionado

Destacado

Pharmaceutical Dossiers
Pharmaceutical DossiersPharmaceutical Dossiers
Pharmaceutical DossiersAseprofar
 
Wine.Its Role In Medicine And Health.
Wine.Its Role In Medicine And Health.Wine.Its Role In Medicine And Health.
Wine.Its Role In Medicine And Health.FRIZZT1
 
20100925 cloudy security - porticor
20100925 cloudy security - porticor20100925 cloudy security - porticor
20100925 cloudy security - porticorgiladpn
 
Motivacion claudio jerez
Motivacion claudio jerezMotivacion claudio jerez
Motivacion claudio jerezClaudio Jerez
 
Porticor - Can Data be safe in Public Clouds, in Compliance with Standards
Porticor - Can Data be safe in Public Clouds, in Compliance with StandardsPorticor - Can Data be safe in Public Clouds, in Compliance with Standards
Porticor - Can Data be safe in Public Clouds, in Compliance with Standardsgiladpn
 
I N V E N T O S D E L S I G L O X X
I N V E N T O S  D E L  S I G L O  X XI N V E N T O S  D E L  S I G L O  X X
I N V E N T O S D E L S I G L O X Xx
 
Calendario Reinscripciones 5 To. Semestre
Calendario Reinscripciones 5 To. SemestreCalendario Reinscripciones 5 To. Semestre
Calendario Reinscripciones 5 To. Semestre679
 

Destacado (15)

Pharmaceutical Dossiers
Pharmaceutical DossiersPharmaceutical Dossiers
Pharmaceutical Dossiers
 
Responsiblity To Act Writing Benchmark
Responsiblity To Act Writing BenchmarkResponsiblity To Act Writing Benchmark
Responsiblity To Act Writing Benchmark
 
Wine.Its Role In Medicine And Health.
Wine.Its Role In Medicine And Health.Wine.Its Role In Medicine And Health.
Wine.Its Role In Medicine And Health.
 
Community needs assessment.pla_2014.handout
Community needs assessment.pla_2014.handoutCommunity needs assessment.pla_2014.handout
Community needs assessment.pla_2014.handout
 
20100925 cloudy security - porticor
20100925 cloudy security - porticor20100925 cloudy security - porticor
20100925 cloudy security - porticor
 
Motivacion claudio jerez
Motivacion claudio jerezMotivacion claudio jerez
Motivacion claudio jerez
 
Job Searching 101 Sharpening Your Interview Skills
Job Searching 101 Sharpening Your Interview SkillsJob Searching 101 Sharpening Your Interview Skills
Job Searching 101 Sharpening Your Interview Skills
 
Porticor - Can Data be safe in Public Clouds, in Compliance with Standards
Porticor - Can Data be safe in Public Clouds, in Compliance with StandardsPorticor - Can Data be safe in Public Clouds, in Compliance with Standards
Porticor - Can Data be safe in Public Clouds, in Compliance with Standards
 
Stuffed animals 2010
Stuffed animals 2010Stuffed animals 2010
Stuffed animals 2010
 
Stuffed Animal Sleepover
Stuffed Animal SleepoverStuffed Animal Sleepover
Stuffed Animal Sleepover
 
Big Talk from Small Libraries 2015
Big Talk from Small Libraries 2015Big Talk from Small Libraries 2015
Big Talk from Small Libraries 2015
 
Job Searching 101 Skills Employers Look For
Job Searching 101 Skills Employers Look ForJob Searching 101 Skills Employers Look For
Job Searching 101 Skills Employers Look For
 
Melting Pot or Salad Bowl
Melting Pot or Salad BowlMelting Pot or Salad Bowl
Melting Pot or Salad Bowl
 
I N V E N T O S D E L S I G L O X X
I N V E N T O S  D E L  S I G L O  X XI N V E N T O S  D E L  S I G L O  X X
I N V E N T O S D E L S I G L O X X
 
Calendario Reinscripciones 5 To. Semestre
Calendario Reinscripciones 5 To. SemestreCalendario Reinscripciones 5 To. Semestre
Calendario Reinscripciones 5 To. Semestre
 

Similar a 20100602 porticor at igt short

Privacy and security in IoT
Privacy and security in IoTPrivacy and security in IoT
Privacy and security in IoTVasco Veloso
 
FOG COMPUTING- Presentation
FOG COMPUTING- Presentation FOG COMPUTING- Presentation
FOG COMPUTING- Presentation Anjana Shivangi
 
LTE Femtocells: Stepping Stone for Killer Applications
LTE Femtocells: Stepping Stone for Killer ApplicationsLTE Femtocells: Stepping Stone for Killer Applications
LTE Femtocells: Stepping Stone for Killer ApplicationseXplanoTech
 
Internet of Things (IoT) Security using stream cipher.ppt
Internet of Things (IoT)  Security using stream cipher.pptInternet of Things (IoT)  Security using stream cipher.ppt
Internet of Things (IoT) Security using stream cipher.pptAliSalman110
 
Building trust in IoT, by Gemalto
Building trust in IoT, by GemaltoBuilding trust in IoT, by Gemalto
Building trust in IoT, by GemaltoHaider Iqbal
 
IoT security fresh thinking 2017 sep 9
IoT security fresh thinking 2017 sep 9IoT security fresh thinking 2017 sep 9
IoT security fresh thinking 2017 sep 9Arvind Tiwary
 
IDC Cloud Security and Managed Services Conference Riyadh KSA
IDC Cloud Security and Managed Services Conference Riyadh KSAIDC Cloud Security and Managed Services Conference Riyadh KSA
IDC Cloud Security and Managed Services Conference Riyadh KSAJorge Sebastiao
 
Advanced Encryption on the JVM v0.2.8
Advanced Encryption on the JVM v0.2.8Advanced Encryption on the JVM v0.2.8
Advanced Encryption on the JVM v0.2.8Matthew McCullough
 
Fears about Computer Technology
Fears about Computer TechnologyFears about Computer Technology
Fears about Computer Technology100656472mercier
 
Catching the Internet of Things (IoT) Wave
Catching the Internet of Things (IoT) WaveCatching the Internet of Things (IoT) Wave
Catching the Internet of Things (IoT) WaveChuck Petras
 
How changing mobile and media technologies is changing the way we create inno...
How changing mobile and media technologies is changing the way we create inno...How changing mobile and media technologies is changing the way we create inno...
How changing mobile and media technologies is changing the way we create inno...Osaka University
 
small-dumb-cheap-and-copious-the-future-of-the-internet-of-things
small-dumb-cheap-and-copious-the-future-of-the-internet-of-thingssmall-dumb-cheap-and-copious-the-future-of-the-internet-of-things
small-dumb-cheap-and-copious-the-future-of-the-internet-of-thingsMeshDynamics
 
2015Apr21 IoT Global innovation forum Dallas Texas USA
2015Apr21 IoT Global innovation forum Dallas Texas USA2015Apr21 IoT Global innovation forum Dallas Texas USA
2015Apr21 IoT Global innovation forum Dallas Texas USACJ Boguszewski
 

Similar a 20100602 porticor at igt short (20)

Privacy and security in IoT
Privacy and security in IoTPrivacy and security in IoT
Privacy and security in IoT
 
2020-04-29 SIT Insights in Technology - Serguei Beloussov
2020-04-29 SIT Insights in Technology - Serguei Beloussov2020-04-29 SIT Insights in Technology - Serguei Beloussov
2020-04-29 SIT Insights in Technology - Serguei Beloussov
 
FOG COMPUTING- Presentation
FOG COMPUTING- Presentation FOG COMPUTING- Presentation
FOG COMPUTING- Presentation
 
LTE Femtocells: Stepping Stone for Killer Applications
LTE Femtocells: Stepping Stone for Killer ApplicationsLTE Femtocells: Stepping Stone for Killer Applications
LTE Femtocells: Stepping Stone for Killer Applications
 
Internet of Things (IoT) Security using stream cipher.ppt
Internet of Things (IoT)  Security using stream cipher.pptInternet of Things (IoT)  Security using stream cipher.ppt
Internet of Things (IoT) Security using stream cipher.ppt
 
Building trust in IoT, by Gemalto
Building trust in IoT, by GemaltoBuilding trust in IoT, by Gemalto
Building trust in IoT, by Gemalto
 
semppt.pptx
semppt.pptxsemppt.pptx
semppt.pptx
 
IoT security fresh thinking 2017 sep 9
IoT security fresh thinking 2017 sep 9IoT security fresh thinking 2017 sep 9
IoT security fresh thinking 2017 sep 9
 
IDC Cloud Security and Managed Services Conference Riyadh KSA
IDC Cloud Security and Managed Services Conference Riyadh KSAIDC Cloud Security and Managed Services Conference Riyadh KSA
IDC Cloud Security and Managed Services Conference Riyadh KSA
 
semppt.pptx
semppt.pptxsemppt.pptx
semppt.pptx
 
semppt.pptx
semppt.pptxsemppt.pptx
semppt.pptx
 
Advanced Encryption on the JVM v0.2.8
Advanced Encryption on the JVM v0.2.8Advanced Encryption on the JVM v0.2.8
Advanced Encryption on the JVM v0.2.8
 
Fears about Computer Technology
Fears about Computer TechnologyFears about Computer Technology
Fears about Computer Technology
 
What are the 7 Common IoT Protocols.pdf
What are the 7 Common IoT Protocols.pdfWhat are the 7 Common IoT Protocols.pdf
What are the 7 Common IoT Protocols.pdf
 
What are the 7 Common IoT Protocols.pdf
What are the 7 Common IoT Protocols.pdfWhat are the 7 Common IoT Protocols.pdf
What are the 7 Common IoT Protocols.pdf
 
Catching the Internet of Things (IoT) Wave
Catching the Internet of Things (IoT) WaveCatching the Internet of Things (IoT) Wave
Catching the Internet of Things (IoT) Wave
 
How changing mobile and media technologies is changing the way we create inno...
How changing mobile and media technologies is changing the way we create inno...How changing mobile and media technologies is changing the way we create inno...
How changing mobile and media technologies is changing the way we create inno...
 
small-dumb-cheap-and-copious-the-future-of-the-internet-of-things
small-dumb-cheap-and-copious-the-future-of-the-internet-of-thingssmall-dumb-cheap-and-copious-the-future-of-the-internet-of-things
small-dumb-cheap-and-copious-the-future-of-the-internet-of-things
 
2015Apr21 IoT Global innovation forum Dallas Texas USA
2015Apr21 IoT Global innovation forum Dallas Texas USA2015Apr21 IoT Global innovation forum Dallas Texas USA
2015Apr21 IoT Global innovation forum Dallas Texas USA
 
Serguei Beloussov - Future of computing
Serguei Beloussov - Future of computingSerguei Beloussov - Future of computing
Serguei Beloussov - Future of computing
 

Último

Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 

Último (20)

Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 

20100602 porticor at igt short

  • 1. Gilad Parann-Nissany June 2nd, 2010 Practicing Security in Public Clouds 6/1/2010 Copyright 2009, 2010 ©Porticor
  • 2. Porticor 6/1/2010 Copyright 2009, 2010 ©Porticor
  • 3. Public Clouds and FUD 6/1/2010 Copyright 2009, 2010 © Porticor Pay as you go Reasonable cost On-demand Self service Elastic Scale My precious data in a public place? Who do I trust? How easy to hack? Is encryption enough? Can I control it? Many considerations exist even before clouds Some considerations really are new
  • 4. How much security do I need? 6/1/2010 Copyright 2009, 2010 ©Porticor
  • 5. Modern threats…Its far too easy to be a bad guy Hacking is a business today, often involving professional criminals Interesting fact: biggest cloud in the world belongs to the crooks Number of Systems: 6,400,000 Number of CPUs: 18,000,000+ Bandwidth: 28 Terabits Facilities: 230 Countries …the Conficker worm  6/1/2010 Copyright 2009, 2010 ©Porticor R. Joffe
  • 6. Security… 6/1/2010 Copyright 2009, 2010 ©Porticor by clarity
  • 7. Applying Security Concepts to Public Clouds Secure distributed data storage Keys management Hypervisors and virtual machines Intrusion Detection and Prevention (IDS/IPS) Logging and Log forensics Security Information Management Identity Access Management Policy management Denial of Service prevention Web Application Firewall Firewall Virtual Private Networks Encryption Database Firewall Data Leak Prevention Scanning for exploits Scanning for virus Physical security … 6/1/2010 Copyright 2009, 2010 ©Porticor *courtesy CSA
  • 8. Understand the value of your data and service: sec should be cost effective Understand your complete problem domain Governance & Measurement Architecture & Technology Specifics of your application Answers Some are known already Some are truly new Cloud Operations really is new! Map out – what’s relevant for you Roll your own – or work with someone who has experience? 6/1/2010 Copyright 2009, 2010 ©Porticor