SlideShare una empresa de Scribd logo
1 de 64
Cloud Security
Dr. Anton Ravindran
Venue: Lecture at
Institute for Research in Applicable
Computing (IRAC),
University of Bedfordshire
5000
Exabytes
$ 150 Billion
Adoption trends
CIO Agenda Report, Gartner, 2013 (2053 CIOs, 36 industries, 41 countries)
CLOUD SECURITY AN EXECUTIVE LEVEL CONCERN
Source: Cloud Security Alliance “Cloud Adoptions Practices & Priorities Survey Report” (2015)
82% of IT professionals in Asia
Pacific continue to regard cloud
data security as an executive-
level concern
GLOBAL CLOUD SECURITY MARKET GROWTH
ANALYSIS 2012-2014 (US$ MILLION)
425.4
629.6
963.4
0
200
400
600
800
1000
1200
2012 2013 2014
41.4% Compound annual
GLOBAL CLOUD SECURITY MARKET BY END-USER SEGMENTATION
38
31
17
9
5
Large Enterprises
Government Agencies
Cloud Service Providers
Medium Enterprises
CLOUD ANATOMY
Cloud Computing Landscape
Cloud Computing Landscape
Gartner predicts revenue of USD 131billion in 2013
A simple definition
“In simple words, the Cloud refers to the
process of sharing resources (such as
hardware, development platforms and/or
software) over the internet. It enables On-
Demand network access to a shared pool of
dynamically configurable computing
resources. These resources are accessed mostly
on a pay-per-use or subscription basis.”
The Cloud Changing the Business Ecosystem, KPMG, 2011
Why do customers use the cloud?
PRIVATE CLOUD VS. PUBLIC CLOUD
Public, Private, Hybrid
Off premises/third-party
Public/
external
Private/
internal
On premises/internal
Hybrid
Image reproduced from Cloud security and privacy, 2009, Mather et al.
Private and hybrid clouds
• Rise in hybrid and private
cloud for sensitive data
• Private cloud cost can be
prohibitive
• Hybrid cloud ranks 4 on
Gartner top 10 strategic
technology trends, 2014
KPMG's The Cloud: Changing the Business Ecosystem, 2011
Models companies use/intend to use*
(Larger companies prefer private)
CHALLENGES
CUSTOMER’S BIGGEST
CONCERN?
 A survey commissioned by Microsoft on ‘Cloud computing
among business leaders and the general population’ states that:
 58% of the general population and 86% of senior business leaders
are excited about the potential of cloud computing.
 But, more than 90% of these same people are concerned about the
security, access and privacy of their own data in the cloud.
Source: Microsoft
Customers’ biggest concerns
KPMG International’s 2012 Global Cloud Provider Survey (n=179)
Customers’ biggest concerns
KPMG International’s 2012 Global Cloud Provider Survey (n=179)
CONTROL, LIABILITY AND
ACCOUNTABILITY
On premise
App
VM
Server
Storage
Network
On premise
(hosted)
App
VM
Server
Storage
Network
IaaS
App
VM
Server
Storage
Network
PaaS
App
Services
Server
Storage
Network
SaaS
App
Services
Server
Storage
Network
Organization has
control
Organization shares
control with vendor
Vendor
has control
Image reproduced from Cloud security and privacy, 2009, Mather et al.
Cloud security
• What’s not new?
• Phishing, password, malware, downtime etc.
• What’s new? Understand…
• Change in trust boundaries
• Impact of using
• Public vs. private cloud
• IaaS vs. PaaS vs. SaaS
• Division of responsibilities between customer and
Cloud Service Provider (CSP)
DEFINING SECURITY IN CLOUD
Confidentiality
Integrity
Availability
Accountability
Assurance
Source: NIST
CLOUD SECURITY IS NO DIFFERENT
Familiar Security
Model
Validated and driven by
customers’ security experts
Benefits all customers
Physical
Network
System
People & Process
CLOUD SECURITY IS NO DIFFERENT
 There are undoubtedly risks associated with the use of
Cloud-based services, just as there are risks associated
other delivery models.
Source: Capgemini
SECURITY IS SHARED
SECURITY & COMPLIANCE IS A SHARED RESPONSIBILITY
Foundation Services
Compute Storage Database Networking
Global
Infrastructure
Edge Locations
Availability Zones
Regions
Responsible for
the security
OF the cloud
Customers have
their choice of
Security IN the
Cloud
Client-side Data
Encryption
Sever-side Data
Encryption
Network Traffic
Protection
Operating System, Network & Firewall Configuration
Platform, Application, Identity & Access Management
Customer Application & ContentC
U
S
T
O
M
E
R
WHY ITS DIFFERENT?
 Most cloud security problems stem from:
 Loss of control
 Lack of trust
 Multi-tenancy
CLOUD DATA AND STORAGE SECURITY
Data-in-transit
Data-at-rest
Processing of Data
(including Multi-tenancy)
 When users use the cloud, user probably won’t know exactly where your data is
hosted, what country it will be stored in?
 Data should be stored and processed by only specific jurisdictions as define by
user.
 Provider should also make contractual commitment to obey privacy
requirement on behalf of their customers,
 Data-centered policies that are generated when a user provides personal or
sensitive information, that travels with that information throughout its lifetime
to ensure that the information is used only in accordance with the policy
DATA LOCATION
Data
Policies
 Sanitization is a process of removing sensitive information from a storage
device .
 What happens to data stored in a cloud computing environment once it has
passed Its user’s “use by date”
 What data sanitization practices does the cloud computing service provider
propose to implement for redundant and retiring data storage devices as and
when these devices are retired or taken out of service.
DATA SANITIZATION
SECURITY IS FAMILIAR
SECURITY IS FAMILIAR
 Visibility
 Auditability
 Controllability
 Agility
SECURITY IS VISIBLE
SECURITY IS VISIBLE
HOW OFTEN DO YOU MAP YOUR NETWORK?
WHAT’S IN YOUR ENVIROMENT RIGHT NOW?
AWS CLOUDTRAIL
You are making
API calls
On a growing set
of services around
the world…
CloudTrail is
continuously
recording API calls
And delivering log
files to you
SECURITY IS VISIBLE
 Who is accessing the resources?
 Who took what action
 When?
 From Where?
 What did they do?
 Logs Logs Logs
 Physical
SECURITY IS AUDITABLE
SECURITY IS AUDITABLE
Security Control Objectives
 Security Organization
 User Access
 Logical Security
 Physical Security and ENV. Safeguards
 Change Management
 Data Integrity, Availability and Redundancy
 Incident Handling
SECURITY IS
CONTROLLABLE
SECURITY IS CONTROLLABLE
 Mange encryption
 Key management Services
 Create, store & retrieve key securely
 Rotate Keys regularly
 Securely Audit access to keys
 Fine grained Access/Firewalls (closed)
 VPC
 Logs of Access Logs of Actions Logs of Activities
 Consistency of Security
Simple Security Controls
Easy to get Right
Easy to Audit
Easy to Enforce
SECURITY IS AGILE
What steps are you [CSP] taking to improve data security and privacy
in your cloud offerings? (top 3)*
CSPs improving security
Tighter
restrictions
on user
access
Greater use
of data
encryption
Improving
real-time
threat
detection
Top SLA parameters
System Availability Regulatory compliance
Data security
Functional capabilities
Response time
Other performance levels
*KPMG International’s 2012 Global Cloud Provider Survey (n=179)
TECHNIQUES &
EXAMPLES
HYPERVISOR BASED FIREWALL
 We do have some options available if we need a higher level of risk
mitigation than what is provided by a virtual firewall appliance i.e.
hypervisor based firewall.
 Example: VMware’s vShield
 A hypervisor based firewall moves the firewall to the other side of the
virtual switch, thus mitigating any risks within the switch itself.
 The problem with hypervisor based firewalls is that they are vendor
specific.
Source: CSA
HYPERVISOR BASED FIREWALL
FIRERACK VIRTUAL FIREWALL
 The Netservers FireRack firewall is an Internet security appliance
designed to provide highly compartmentalized security with
devolved management.
 Security Zones
 It is hence ideally suited for environments such as co-location
hosting or college networks where badly maintained or
untrustworthy computers on the same network as yours could
otherwise pose it a threat.
Source: FireRack
FIRERACK VIRTUAL FIREWALL
AMAZON EC2 FIREWALL SECURITY
CLOUDPASSAGE HALO SVM AND HALO FIREWALL
CSA ENTERPRISE ARCHITECTURE
MTCS MODEL
Level 3
Level 2
Level 1
Security
Controls
in place
Most
Stringent
Stringent
Baseline
Addresses
Security Risks
& Threats to
High impact IT
systems
Moderate impact
IT systems
Low impact IT
systems
Designed for
companies
with
Regulatory
compliance
requirements
Business critical
data and
systems
Business non-
critical data and
system
Examples
Hosting of highly
confidential
business data,
financial records,
medical records
Hosting of
confidential
business data,
email, CRM
Web site hosting
public
information
LIST OF SELECTED MTCS CERTIFIED CSPS
(AS OF 16 OCTOBER 2015)
COMMERCIAL CLOUD SECURITY VENDORS
 Trend Micro
 AppRiver
 Awareness Technologies
 Barracuda Networks
 CloudPassage
 Symantec
US DEPARTMENT OF
TRANSPORTATION
Case Study
Source: www.layer7tech.com
NUMBERS AND VOLUME
DOT
 12 agencies
 60,000 employees
 100’s of business and
government services managed
CARS
 18,000+ car dealers enrolled
 680,000 older vehicles traded
in for new, fuel-efficient cars
THE CHALLENGE
60
THE SOLUTION
LAYER 7 CLOUDSPAN
61
THE RESULTS
 CARS is considered one of the biggest successes of
the Obama administration.
 CARS had a large impact on the economic recovery
by saving or creating tens of thousands of jobs, as
well as by increasing GDP by an estimated $3.8 to
$6.8 billion.
 Going forward, the program will also result in a
reduction of fuel consumption (~33M gallons
annually) and CO2 emissions (~360K metric tons
annually) over the lifetime of the newly purchased
vehicles.
• Change in trust boundaries
• Mostly no new security or privacy
issues per se
CLOUD SECURITY IS FAMILIAR!
“Based on our experience, I believe that we can be even more secure in
the AWS cloud than in our own data centres.”
Tom Soderstrom, CTO, NASA
Nearly 60% of organizations agreed that CSPs[cloud service
providers] provide better security than their own IT
organizations.
Source: IDC 2013 U.S. Cloud Security Survey,
doc#242836,September 2013
THANK YOU

Más contenido relacionado

La actualidad más candente

Cloud is not an option, but is security?
Cloud is not an option, but is security?Cloud is not an option, but is security?
Cloud is not an option, but is security?Jody Keyser
 
Cloud computing & IAAS The Dual Edged Sword of New Technology
Cloud computing & IAAS  The Dual Edged Sword of New Technology Cloud computing & IAAS  The Dual Edged Sword of New Technology
Cloud computing & IAAS The Dual Edged Sword of New Technology Mekhi Da ‘Quay Daniels
 
Citrix cloud services_total_economic_benefits_assessment_guide
Citrix cloud services_total_economic_benefits_assessment_guideCitrix cloud services_total_economic_benefits_assessment_guide
Citrix cloud services_total_economic_benefits_assessment_guideAlejandro Daricz
 
Cloud Security for U.S. Military Agencies
Cloud Security for U.S. Military AgenciesCloud Security for U.S. Military Agencies
Cloud Security for U.S. Military AgenciesNJVC, LLC
 
internal-cloud-audit-risk-guide
internal-cloud-audit-risk-guideinternal-cloud-audit-risk-guide
internal-cloud-audit-risk-guideSatchit Dokras
 
Mindtree distributed agile journey and guiding principles
Mindtree distributed agile journey and guiding principlesMindtree distributed agile journey and guiding principles
Mindtree distributed agile journey and guiding principlesMindtree Ltd.
 
CCSK, cloud security framework, Indonesia
CCSK, cloud security framework, IndonesiaCCSK, cloud security framework, Indonesia
CCSK, cloud security framework, IndonesiaWise Pacific Venture
 
Cloud computing Risk management
Cloud computing Risk management  Cloud computing Risk management
Cloud computing Risk management Padma Jella
 
Optimize IT Infrastructure
Optimize IT InfrastructureOptimize IT Infrastructure
Optimize IT InfrastructureScalar Decisions
 
Data loss prevention by using MRSH-v2 algorithm
Data loss prevention by using MRSH-v2 algorithm Data loss prevention by using MRSH-v2 algorithm
Data loss prevention by using MRSH-v2 algorithm IJECEIAES
 
Cloud Computing Risk Management (Multi Venue)
Cloud Computing Risk Management (Multi Venue)Cloud Computing Risk Management (Multi Venue)
Cloud Computing Risk Management (Multi Venue)Brian K. Dickard
 
Sukumar Nayak-Detailed-Cloud Risk Management and Audit
Sukumar Nayak-Detailed-Cloud Risk Management and AuditSukumar Nayak-Detailed-Cloud Risk Management and Audit
Sukumar Nayak-Detailed-Cloud Risk Management and AuditSukumar Nayak
 
Automatizovaná bezpečnost – nadstandard nebo nutnost?
Automatizovaná bezpečnost – nadstandard nebo nutnost?Automatizovaná bezpečnost – nadstandard nebo nutnost?
Automatizovaná bezpečnost – nadstandard nebo nutnost?MarketingArrowECS_CZ
 
BlockChain Enabled-Cloud Delivered For Network Secuirty
BlockChain Enabled-Cloud Delivered For Network SecuirtyBlockChain Enabled-Cloud Delivered For Network Secuirty
BlockChain Enabled-Cloud Delivered For Network SecuirtyHappiest Minds Technologies
 
Cloud computing understanding security risk and management
Cloud computing   understanding security risk and managementCloud computing   understanding security risk and management
Cloud computing understanding security risk and managementShamsundar Machale (CISSP, CEH)
 
AWS Webcast - AWS haystax afb oct 17(1)
AWS Webcast - AWS haystax afb oct 17(1)AWS Webcast - AWS haystax afb oct 17(1)
AWS Webcast - AWS haystax afb oct 17(1)Amazon Web Services
 

La actualidad más candente (19)

Cloud is not an option, but is security?
Cloud is not an option, but is security?Cloud is not an option, but is security?
Cloud is not an option, but is security?
 
Cloud computing & IAAS The Dual Edged Sword of New Technology
Cloud computing & IAAS  The Dual Edged Sword of New Technology Cloud computing & IAAS  The Dual Edged Sword of New Technology
Cloud computing & IAAS The Dual Edged Sword of New Technology
 
Citrix cloud services_total_economic_benefits_assessment_guide
Citrix cloud services_total_economic_benefits_assessment_guideCitrix cloud services_total_economic_benefits_assessment_guide
Citrix cloud services_total_economic_benefits_assessment_guide
 
Cloud Security for U.S. Military Agencies
Cloud Security for U.S. Military AgenciesCloud Security for U.S. Military Agencies
Cloud Security for U.S. Military Agencies
 
internal-cloud-audit-risk-guide
internal-cloud-audit-risk-guideinternal-cloud-audit-risk-guide
internal-cloud-audit-risk-guide
 
Global Mandate to Secure Cloud Computing
Global Mandate to Secure Cloud ComputingGlobal Mandate to Secure Cloud Computing
Global Mandate to Secure Cloud Computing
 
Mindtree distributed agile journey and guiding principles
Mindtree distributed agile journey and guiding principlesMindtree distributed agile journey and guiding principles
Mindtree distributed agile journey and guiding principles
 
CSA Security Guidance Cloud Computing v3.0
CSA Security Guidance Cloud Computing v3.0CSA Security Guidance Cloud Computing v3.0
CSA Security Guidance Cloud Computing v3.0
 
CCSK, cloud security framework, Indonesia
CCSK, cloud security framework, IndonesiaCCSK, cloud security framework, Indonesia
CCSK, cloud security framework, Indonesia
 
Cloud computing Risk management
Cloud computing Risk management  Cloud computing Risk management
Cloud computing Risk management
 
Optimize IT Infrastructure
Optimize IT InfrastructureOptimize IT Infrastructure
Optimize IT Infrastructure
 
CSA & GRC Stack
CSA & GRC StackCSA & GRC Stack
CSA & GRC Stack
 
Data loss prevention by using MRSH-v2 algorithm
Data loss prevention by using MRSH-v2 algorithm Data loss prevention by using MRSH-v2 algorithm
Data loss prevention by using MRSH-v2 algorithm
 
Cloud Computing Risk Management (Multi Venue)
Cloud Computing Risk Management (Multi Venue)Cloud Computing Risk Management (Multi Venue)
Cloud Computing Risk Management (Multi Venue)
 
Sukumar Nayak-Detailed-Cloud Risk Management and Audit
Sukumar Nayak-Detailed-Cloud Risk Management and AuditSukumar Nayak-Detailed-Cloud Risk Management and Audit
Sukumar Nayak-Detailed-Cloud Risk Management and Audit
 
Automatizovaná bezpečnost – nadstandard nebo nutnost?
Automatizovaná bezpečnost – nadstandard nebo nutnost?Automatizovaná bezpečnost – nadstandard nebo nutnost?
Automatizovaná bezpečnost – nadstandard nebo nutnost?
 
BlockChain Enabled-Cloud Delivered For Network Secuirty
BlockChain Enabled-Cloud Delivered For Network SecuirtyBlockChain Enabled-Cloud Delivered For Network Secuirty
BlockChain Enabled-Cloud Delivered For Network Secuirty
 
Cloud computing understanding security risk and management
Cloud computing   understanding security risk and managementCloud computing   understanding security risk and management
Cloud computing understanding security risk and management
 
AWS Webcast - AWS haystax afb oct 17(1)
AWS Webcast - AWS haystax afb oct 17(1)AWS Webcast - AWS haystax afb oct 17(1)
AWS Webcast - AWS haystax afb oct 17(1)
 

Similar a Cloud Security By Dr. Anton Ravindran

Keys to success and security in the cloud
Keys to success and security in the cloudKeys to success and security in the cloud
Keys to success and security in the cloudScalar Decisions
 
Keys-to-Success-and-Security-in-the-Cloud
Keys-to-Success-and-Security-in-the-CloudKeys-to-Success-and-Security-in-the-Cloud
Keys-to-Success-and-Security-in-the-Cloudpatmisasi
 
Cloud computing - Assessing the Security Risks - Jared Carstensen
Cloud computing - Assessing the Security Risks - Jared CarstensenCloud computing - Assessing the Security Risks - Jared Carstensen
Cloud computing - Assessing the Security Risks - Jared Carstensenjaredcarst
 
Legal And Regulatory Issues Cloud Computing...V2.0
Legal And Regulatory Issues Cloud Computing...V2.0Legal And Regulatory Issues Cloud Computing...V2.0
Legal And Regulatory Issues Cloud Computing...V2.0David Spinks
 
Demystifying Cloud Security: Lessons Learned for the Public Sector
Demystifying Cloud Security: Lessons Learned for the Public SectorDemystifying Cloud Security: Lessons Learned for the Public Sector
Demystifying Cloud Security: Lessons Learned for the Public SectorAmazon Web Services
 
CloudPassage Best Practices for Automatic Security Scaling
CloudPassage Best Practices for Automatic Security ScalingCloudPassage Best Practices for Automatic Security Scaling
CloudPassage Best Practices for Automatic Security ScalingAmazon Web Services
 
Whitepaper: Security of the Cloud
Whitepaper: Security of the CloudWhitepaper: Security of the Cloud
Whitepaper: Security of the CloudCloudSmartz
 
AWS 클라우드가 이끄는 공공기관 혁신 :: Brad Coughlan :: AWS Summit Seoul 2016
AWS 클라우드가 이끄는 공공기관 혁신 :: Brad Coughlan :: AWS Summit Seoul 2016AWS 클라우드가 이끄는 공공기관 혁신 :: Brad Coughlan :: AWS Summit Seoul 2016
AWS 클라우드가 이끄는 공공기관 혁신 :: Brad Coughlan :: AWS Summit Seoul 2016Amazon Web Services Korea
 
MBT Webinar: Does the security of your business data keep you up at night?
MBT Webinar: Does the security of your business data keep you up at night? MBT Webinar: Does the security of your business data keep you up at night?
MBT Webinar: Does the security of your business data keep you up at night? Jorge García
 
Cloud Security, Standards and Applications
Cloud Security, Standards and ApplicationsCloud Security, Standards and Applications
Cloud Security, Standards and ApplicationsDr. Sunil Kr. Pandey
 
AWS Webcast - Emergency Preparedness and Interagency Collaboration Webinar
AWS Webcast - Emergency Preparedness and Interagency Collaboration Webinar AWS Webcast - Emergency Preparedness and Interagency Collaboration Webinar
AWS Webcast - Emergency Preparedness and Interagency Collaboration Webinar Amazon Web Services
 
Security in cloud computing kashyap kunal
Security in cloud computing  kashyap kunalSecurity in cloud computing  kashyap kunal
Security in cloud computing kashyap kunalKashyap Kunal
 
Top Trends in Cloud Computing for 2023.pptx
Top Trends in Cloud Computing for 2023.pptxTop Trends in Cloud Computing for 2023.pptx
Top Trends in Cloud Computing for 2023.pptxSaadZaman23
 
Why CCSK with InfosecTrain (1).pdf
Why CCSK with InfosecTrain (1).pdfWhy CCSK with InfosecTrain (1).pdf
Why CCSK with InfosecTrain (1).pdfinfosec train
 
Cloud Security using NIST guidelines
Cloud Security using NIST guidelinesCloud Security using NIST guidelines
Cloud Security using NIST guidelinesSrishti Ahuja
 

Similar a Cloud Security By Dr. Anton Ravindran (20)

Cloud services and it security
Cloud services and it securityCloud services and it security
Cloud services and it security
 
Keys to success and security in the cloud
Keys to success and security in the cloudKeys to success and security in the cloud
Keys to success and security in the cloud
 
Keys-to-Success-and-Security-in-the-Cloud
Keys-to-Success-and-Security-in-the-CloudKeys-to-Success-and-Security-in-the-Cloud
Keys-to-Success-and-Security-in-the-Cloud
 
Cloud computing - Assessing the Security Risks - Jared Carstensen
Cloud computing - Assessing the Security Risks - Jared CarstensenCloud computing - Assessing the Security Risks - Jared Carstensen
Cloud computing - Assessing the Security Risks - Jared Carstensen
 
Legal And Regulatory Issues Cloud Computing...V2.0
Legal And Regulatory Issues Cloud Computing...V2.0Legal And Regulatory Issues Cloud Computing...V2.0
Legal And Regulatory Issues Cloud Computing...V2.0
 
Demystifying Cloud Security: Lessons Learned for the Public Sector
Demystifying Cloud Security: Lessons Learned for the Public SectorDemystifying Cloud Security: Lessons Learned for the Public Sector
Demystifying Cloud Security: Lessons Learned for the Public Sector
 
CloudPassage Best Practices for Automatic Security Scaling
CloudPassage Best Practices for Automatic Security ScalingCloudPassage Best Practices for Automatic Security Scaling
CloudPassage Best Practices for Automatic Security Scaling
 
Whitepaper: Security of the Cloud
Whitepaper: Security of the CloudWhitepaper: Security of the Cloud
Whitepaper: Security of the Cloud
 
Security of the Cloud
Security of the CloudSecurity of the Cloud
Security of the Cloud
 
AWS 클라우드가 이끄는 공공기관 혁신 :: Brad Coughlan :: AWS Summit Seoul 2016
AWS 클라우드가 이끄는 공공기관 혁신 :: Brad Coughlan :: AWS Summit Seoul 2016AWS 클라우드가 이끄는 공공기관 혁신 :: Brad Coughlan :: AWS Summit Seoul 2016
AWS 클라우드가 이끄는 공공기관 혁신 :: Brad Coughlan :: AWS Summit Seoul 2016
 
MBT Webinar: Does the security of your business data keep you up at night?
MBT Webinar: Does the security of your business data keep you up at night? MBT Webinar: Does the security of your business data keep you up at night?
MBT Webinar: Does the security of your business data keep you up at night?
 
SECURING THE CLOUD DATA LAKES
SECURING THE CLOUD DATA LAKESSECURING THE CLOUD DATA LAKES
SECURING THE CLOUD DATA LAKES
 
cloud1_aggy.pdf
cloud1_aggy.pdfcloud1_aggy.pdf
cloud1_aggy.pdf
 
Cloud Security, Standards and Applications
Cloud Security, Standards and ApplicationsCloud Security, Standards and Applications
Cloud Security, Standards and Applications
 
Rik Ferguson
Rik FergusonRik Ferguson
Rik Ferguson
 
AWS Webcast - Emergency Preparedness and Interagency Collaboration Webinar
AWS Webcast - Emergency Preparedness and Interagency Collaboration Webinar AWS Webcast - Emergency Preparedness and Interagency Collaboration Webinar
AWS Webcast - Emergency Preparedness and Interagency Collaboration Webinar
 
Security in cloud computing kashyap kunal
Security in cloud computing  kashyap kunalSecurity in cloud computing  kashyap kunal
Security in cloud computing kashyap kunal
 
Top Trends in Cloud Computing for 2023.pptx
Top Trends in Cloud Computing for 2023.pptxTop Trends in Cloud Computing for 2023.pptx
Top Trends in Cloud Computing for 2023.pptx
 
Why CCSK with InfosecTrain (1).pdf
Why CCSK with InfosecTrain (1).pdfWhy CCSK with InfosecTrain (1).pdf
Why CCSK with InfosecTrain (1).pdf
 
Cloud Security using NIST guidelines
Cloud Security using NIST guidelinesCloud Security using NIST guidelines
Cloud Security using NIST guidelines
 

Más de GSTF

GSTF Testimonial
GSTF TestimonialGSTF Testimonial
GSTF TestimonialGSTF
 
GSTF Testimonial
GSTF TestimonialGSTF Testimonial
GSTF TestimonialGSTF
 
GSTF Testimonial
GSTF TestimonialGSTF Testimonial
GSTF TestimonialGSTF
 
GSTF Singapore Testimonial
GSTF Singapore TestimonialGSTF Singapore Testimonial
GSTF Singapore TestimonialGSTF
 
Smart homes, smart cities & smart nations by dr. anton ravindran
Smart homes, smart cities & smart nations by dr. anton ravindranSmart homes, smart cities & smart nations by dr. anton ravindran
Smart homes, smart cities & smart nations by dr. anton ravindranGSTF
 
Entrepreneurship EDUCATION by Dr. Anton Ravindran
Entrepreneurship EDUCATION by Dr. Anton RavindranEntrepreneurship EDUCATION by Dr. Anton Ravindran
Entrepreneurship EDUCATION by Dr. Anton RavindranGSTF
 
Dawn of the Intelligence Age by Dr. Anton Ravindran
Dawn of the Intelligence Age by Dr. Anton RavindranDawn of the Intelligence Age by Dr. Anton Ravindran
Dawn of the Intelligence Age by Dr. Anton RavindranGSTF
 
Internet of Things (IOT) Cloud Security by Dr. Anton Ravindran
Internet of Things (IOT) Cloud Security by Dr. Anton Ravindran Internet of Things (IOT) Cloud Security by Dr. Anton Ravindran
Internet of Things (IOT) Cloud Security by Dr. Anton Ravindran GSTF
 
Appointment of Global Knowledgeas Authorized Training Partner of GSTF for Nor...
Appointment of Global Knowledgeas Authorized Training Partner of GSTF for Nor...Appointment of Global Knowledgeas Authorized Training Partner of GSTF for Nor...
Appointment of Global Knowledgeas Authorized Training Partner of GSTF for Nor...GSTF
 
Powerful Technologies Changing the Planet
Powerful Technologies Changing the PlanetPowerful Technologies Changing the Planet
Powerful Technologies Changing the PlanetGSTF
 

Más de GSTF (10)

GSTF Testimonial
GSTF TestimonialGSTF Testimonial
GSTF Testimonial
 
GSTF Testimonial
GSTF TestimonialGSTF Testimonial
GSTF Testimonial
 
GSTF Testimonial
GSTF TestimonialGSTF Testimonial
GSTF Testimonial
 
GSTF Singapore Testimonial
GSTF Singapore TestimonialGSTF Singapore Testimonial
GSTF Singapore Testimonial
 
Smart homes, smart cities & smart nations by dr. anton ravindran
Smart homes, smart cities & smart nations by dr. anton ravindranSmart homes, smart cities & smart nations by dr. anton ravindran
Smart homes, smart cities & smart nations by dr. anton ravindran
 
Entrepreneurship EDUCATION by Dr. Anton Ravindran
Entrepreneurship EDUCATION by Dr. Anton RavindranEntrepreneurship EDUCATION by Dr. Anton Ravindran
Entrepreneurship EDUCATION by Dr. Anton Ravindran
 
Dawn of the Intelligence Age by Dr. Anton Ravindran
Dawn of the Intelligence Age by Dr. Anton RavindranDawn of the Intelligence Age by Dr. Anton Ravindran
Dawn of the Intelligence Age by Dr. Anton Ravindran
 
Internet of Things (IOT) Cloud Security by Dr. Anton Ravindran
Internet of Things (IOT) Cloud Security by Dr. Anton Ravindran Internet of Things (IOT) Cloud Security by Dr. Anton Ravindran
Internet of Things (IOT) Cloud Security by Dr. Anton Ravindran
 
Appointment of Global Knowledgeas Authorized Training Partner of GSTF for Nor...
Appointment of Global Knowledgeas Authorized Training Partner of GSTF for Nor...Appointment of Global Knowledgeas Authorized Training Partner of GSTF for Nor...
Appointment of Global Knowledgeas Authorized Training Partner of GSTF for Nor...
 
Powerful Technologies Changing the Planet
Powerful Technologies Changing the PlanetPowerful Technologies Changing the Planet
Powerful Technologies Changing the Planet
 

Último

The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...Aggregage
 
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdfDr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdfAdmir Softic
 
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Dave Litwiller
 
Monte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMMonte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMRavindra Nath Shukla
 
Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Neil Kimberley
 
Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...Roland Driesen
 
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...lizamodels9
 
Regression analysis: Simple Linear Regression Multiple Linear Regression
Regression analysis:  Simple Linear Regression Multiple Linear RegressionRegression analysis:  Simple Linear Regression Multiple Linear Regression
Regression analysis: Simple Linear Regression Multiple Linear RegressionRavindra Nath Shukla
 
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...Any kyc Account
 
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableDipal Arora
 
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyThe Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyEthan lee
 
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptxB.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptxpriyanshujha201
 
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service BangaloreCall Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangaloreamitlee9823
 
Cracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxCracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxWorkforce Group
 
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdfRenandantas16
 
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756dollysharma2066
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageMatteo Carbone
 
Call Girls in Gomti Nagar - 7388211116 - With room Service
Call Girls in Gomti Nagar - 7388211116  - With room ServiceCall Girls in Gomti Nagar - 7388211116  - With room Service
Call Girls in Gomti Nagar - 7388211116 - With room Servicediscovermytutordmt
 
Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Roland Driesen
 
Organizational Transformation Lead with Culture
Organizational Transformation Lead with CultureOrganizational Transformation Lead with Culture
Organizational Transformation Lead with CultureSeta Wicaksana
 

Último (20)

The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
 
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdfDr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
 
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
 
Monte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMMonte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSM
 
Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023
 
Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...
 
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
 
Regression analysis: Simple Linear Regression Multiple Linear Regression
Regression analysis:  Simple Linear Regression Multiple Linear RegressionRegression analysis:  Simple Linear Regression Multiple Linear Regression
Regression analysis: Simple Linear Regression Multiple Linear Regression
 
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
 
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
 
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyThe Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
 
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptxB.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
 
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service BangaloreCall Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
 
Cracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxCracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptx
 
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
 
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usage
 
Call Girls in Gomti Nagar - 7388211116 - With room Service
Call Girls in Gomti Nagar - 7388211116  - With room ServiceCall Girls in Gomti Nagar - 7388211116  - With room Service
Call Girls in Gomti Nagar - 7388211116 - With room Service
 
Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...
 
Organizational Transformation Lead with Culture
Organizational Transformation Lead with CultureOrganizational Transformation Lead with Culture
Organizational Transformation Lead with Culture
 

Cloud Security By Dr. Anton Ravindran

  • 1. Cloud Security Dr. Anton Ravindran Venue: Lecture at Institute for Research in Applicable Computing (IRAC), University of Bedfordshire
  • 3.
  • 4. Adoption trends CIO Agenda Report, Gartner, 2013 (2053 CIOs, 36 industries, 41 countries)
  • 5. CLOUD SECURITY AN EXECUTIVE LEVEL CONCERN Source: Cloud Security Alliance “Cloud Adoptions Practices & Priorities Survey Report” (2015) 82% of IT professionals in Asia Pacific continue to regard cloud data security as an executive- level concern
  • 6. GLOBAL CLOUD SECURITY MARKET GROWTH ANALYSIS 2012-2014 (US$ MILLION) 425.4 629.6 963.4 0 200 400 600 800 1000 1200 2012 2013 2014 41.4% Compound annual
  • 7. GLOBAL CLOUD SECURITY MARKET BY END-USER SEGMENTATION 38 31 17 9 5 Large Enterprises Government Agencies Cloud Service Providers Medium Enterprises
  • 10. Cloud Computing Landscape Gartner predicts revenue of USD 131billion in 2013
  • 11. A simple definition “In simple words, the Cloud refers to the process of sharing resources (such as hardware, development platforms and/or software) over the internet. It enables On- Demand network access to a shared pool of dynamically configurable computing resources. These resources are accessed mostly on a pay-per-use or subscription basis.” The Cloud Changing the Business Ecosystem, KPMG, 2011
  • 12. Why do customers use the cloud?
  • 13. PRIVATE CLOUD VS. PUBLIC CLOUD
  • 14. Public, Private, Hybrid Off premises/third-party Public/ external Private/ internal On premises/internal Hybrid Image reproduced from Cloud security and privacy, 2009, Mather et al.
  • 15. Private and hybrid clouds • Rise in hybrid and private cloud for sensitive data • Private cloud cost can be prohibitive • Hybrid cloud ranks 4 on Gartner top 10 strategic technology trends, 2014 KPMG's The Cloud: Changing the Business Ecosystem, 2011 Models companies use/intend to use* (Larger companies prefer private)
  • 17. CUSTOMER’S BIGGEST CONCERN?  A survey commissioned by Microsoft on ‘Cloud computing among business leaders and the general population’ states that:  58% of the general population and 86% of senior business leaders are excited about the potential of cloud computing.  But, more than 90% of these same people are concerned about the security, access and privacy of their own data in the cloud. Source: Microsoft
  • 18. Customers’ biggest concerns KPMG International’s 2012 Global Cloud Provider Survey (n=179)
  • 19. Customers’ biggest concerns KPMG International’s 2012 Global Cloud Provider Survey (n=179)
  • 20. CONTROL, LIABILITY AND ACCOUNTABILITY On premise App VM Server Storage Network On premise (hosted) App VM Server Storage Network IaaS App VM Server Storage Network PaaS App Services Server Storage Network SaaS App Services Server Storage Network Organization has control Organization shares control with vendor Vendor has control Image reproduced from Cloud security and privacy, 2009, Mather et al.
  • 21. Cloud security • What’s not new? • Phishing, password, malware, downtime etc. • What’s new? Understand… • Change in trust boundaries • Impact of using • Public vs. private cloud • IaaS vs. PaaS vs. SaaS • Division of responsibilities between customer and Cloud Service Provider (CSP)
  • 22. DEFINING SECURITY IN CLOUD Confidentiality Integrity Availability Accountability Assurance Source: NIST
  • 23. CLOUD SECURITY IS NO DIFFERENT Familiar Security Model Validated and driven by customers’ security experts Benefits all customers Physical Network System People & Process CLOUD SECURITY IS NO DIFFERENT
  • 24.  There are undoubtedly risks associated with the use of Cloud-based services, just as there are risks associated other delivery models. Source: Capgemini
  • 26. SECURITY & COMPLIANCE IS A SHARED RESPONSIBILITY Foundation Services Compute Storage Database Networking Global Infrastructure Edge Locations Availability Zones Regions Responsible for the security OF the cloud Customers have their choice of Security IN the Cloud Client-side Data Encryption Sever-side Data Encryption Network Traffic Protection Operating System, Network & Firewall Configuration Platform, Application, Identity & Access Management Customer Application & ContentC U S T O M E R
  • 27. WHY ITS DIFFERENT?  Most cloud security problems stem from:  Loss of control  Lack of trust  Multi-tenancy
  • 28. CLOUD DATA AND STORAGE SECURITY Data-in-transit Data-at-rest Processing of Data (including Multi-tenancy)
  • 29.  When users use the cloud, user probably won’t know exactly where your data is hosted, what country it will be stored in?  Data should be stored and processed by only specific jurisdictions as define by user.  Provider should also make contractual commitment to obey privacy requirement on behalf of their customers,  Data-centered policies that are generated when a user provides personal or sensitive information, that travels with that information throughout its lifetime to ensure that the information is used only in accordance with the policy DATA LOCATION Data Policies
  • 30.  Sanitization is a process of removing sensitive information from a storage device .  What happens to data stored in a cloud computing environment once it has passed Its user’s “use by date”  What data sanitization practices does the cloud computing service provider propose to implement for redundant and retiring data storage devices as and when these devices are retired or taken out of service. DATA SANITIZATION
  • 32. SECURITY IS FAMILIAR  Visibility  Auditability  Controllability  Agility
  • 34. SECURITY IS VISIBLE HOW OFTEN DO YOU MAP YOUR NETWORK? WHAT’S IN YOUR ENVIROMENT RIGHT NOW?
  • 35.
  • 36. AWS CLOUDTRAIL You are making API calls On a growing set of services around the world… CloudTrail is continuously recording API calls And delivering log files to you
  • 37. SECURITY IS VISIBLE  Who is accessing the resources?  Who took what action  When?  From Where?  What did they do?  Logs Logs Logs  Physical
  • 39. SECURITY IS AUDITABLE Security Control Objectives  Security Organization  User Access  Logical Security  Physical Security and ENV. Safeguards  Change Management  Data Integrity, Availability and Redundancy  Incident Handling
  • 41. SECURITY IS CONTROLLABLE  Mange encryption  Key management Services  Create, store & retrieve key securely  Rotate Keys regularly  Securely Audit access to keys  Fine grained Access/Firewalls (closed)  VPC  Logs of Access Logs of Actions Logs of Activities  Consistency of Security
  • 42. Simple Security Controls Easy to get Right Easy to Audit Easy to Enforce
  • 44. What steps are you [CSP] taking to improve data security and privacy in your cloud offerings? (top 3)* CSPs improving security Tighter restrictions on user access Greater use of data encryption Improving real-time threat detection
  • 45. Top SLA parameters System Availability Regulatory compliance Data security Functional capabilities Response time Other performance levels *KPMG International’s 2012 Global Cloud Provider Survey (n=179)
  • 47. HYPERVISOR BASED FIREWALL  We do have some options available if we need a higher level of risk mitigation than what is provided by a virtual firewall appliance i.e. hypervisor based firewall.  Example: VMware’s vShield  A hypervisor based firewall moves the firewall to the other side of the virtual switch, thus mitigating any risks within the switch itself.  The problem with hypervisor based firewalls is that they are vendor specific.
  • 49. FIRERACK VIRTUAL FIREWALL  The Netservers FireRack firewall is an Internet security appliance designed to provide highly compartmentalized security with devolved management.  Security Zones  It is hence ideally suited for environments such as co-location hosting or college networks where badly maintained or untrustworthy computers on the same network as yours could otherwise pose it a threat.
  • 52. CLOUDPASSAGE HALO SVM AND HALO FIREWALL
  • 54. MTCS MODEL Level 3 Level 2 Level 1 Security Controls in place Most Stringent Stringent Baseline Addresses Security Risks & Threats to High impact IT systems Moderate impact IT systems Low impact IT systems Designed for companies with Regulatory compliance requirements Business critical data and systems Business non- critical data and system Examples Hosting of highly confidential business data, financial records, medical records Hosting of confidential business data, email, CRM Web site hosting public information
  • 55. LIST OF SELECTED MTCS CERTIFIED CSPS (AS OF 16 OCTOBER 2015)
  • 56. COMMERCIAL CLOUD SECURITY VENDORS  Trend Micro  AppRiver  Awareness Technologies  Barracuda Networks  CloudPassage  Symantec
  • 57. US DEPARTMENT OF TRANSPORTATION Case Study Source: www.layer7tech.com
  • 58. NUMBERS AND VOLUME DOT  12 agencies  60,000 employees  100’s of business and government services managed CARS  18,000+ car dealers enrolled  680,000 older vehicles traded in for new, fuel-efficient cars
  • 60. THE SOLUTION LAYER 7 CLOUDSPAN 61
  • 61. THE RESULTS  CARS is considered one of the biggest successes of the Obama administration.  CARS had a large impact on the economic recovery by saving or creating tens of thousands of jobs, as well as by increasing GDP by an estimated $3.8 to $6.8 billion.  Going forward, the program will also result in a reduction of fuel consumption (~33M gallons annually) and CO2 emissions (~360K metric tons annually) over the lifetime of the newly purchased vehicles.
  • 62. • Change in trust boundaries • Mostly no new security or privacy issues per se
  • 63. CLOUD SECURITY IS FAMILIAR! “Based on our experience, I believe that we can be even more secure in the AWS cloud than in our own data centres.” Tom Soderstrom, CTO, NASA Nearly 60% of organizations agreed that CSPs[cloud service providers] provide better security than their own IT organizations. Source: IDC 2013 U.S. Cloud Security Survey, doc#242836,September 2013