SlideShare uma empresa Scribd logo
1 de 12
Baixar para ler offline
Making Cloud SLAs readily usable
in the EU private sector
Arthur van der Wees
Managing Director international law firm Arthur’s Legal
Founder & Chief Executive Officer Zapplied Platform
2
Risks, Comfort & Trust in the Cloud
 Cloud Services Challenges:
For the 80% not yet using cloud services, insufficient knowledge is the
main blocking factors (42%).
For the 20% using cloud services, the risk of a security breach is the main
limiting factor (39%).
Eurostat (EC)
Cybersecurity & Data Protection: Threat or Strength?
Risks, Comfort, Trust in & Rewards of the Cloud
60%cited concerns around
data security as a barrier
to adoption.
45%concerned that the
cloud would result in a
lack of data
control.
94%experienced security
benefits they didn’t
previously have on-
premise.
62%said privacy protection
increased as a result of
moving to the cloud.
Initial concerns Realized benefits
Microsoft Azure (ISO 27018)
European Commission Priority: Digital Single Market
C-SIG Drafting Group DG CNECT: Select expert group (CSA, IBM, Microsoft,
Telecom Italia and Arthur’s Legal): EC Cloud SLA Standardisation Guidelines,
ISO and other standardisation. ISO/IEC 17788. ISO/IEC 19086 (I).
Computer Science: TU Darmstadt
Coordination & communication: Trust-IT Services
Security: Cloud Security Alliance
Strategic & Legal: Arthur’s Legal
Cloud Computing & European Commission
5
What do we want to achieve?
Improve transparency, bridging the disconnect between supply and
demand, and increase the uptake of cloud computing by making it
easier for and empower 20 million EU SMEs to understand SLAs
SLA-Ready aims to provide common understanding of Service Level
Agreements (SLAs) for Cloud services with greater standardisation and
transparency so organisations can make an informed decision on what
services to use, what to expect and what to trust.
How to achieve
#Cloud #Trust #Strategy #Performance #Security #Data #Data Protection #SLAReady
SLAs are an important but yet only
one particle in the Cloud Service
Level Ecosystem:
SLA-Ready services will support SMEs with user-friendly practical tools, guides,
and a social marketplace, encouraging them to carefully plan their journey and
make it strategic through an informed, stepping-stone approach, so the Cloud and
applications grow with their business.
The SLA-Ready Common Reference Model will benefit the industry by
integrating a set of SLA components, e.g. common vocabularies, Service Level
Objectives (SLO) service metrics and measurements, as well as best practices
and relevant standards to fill identified gaps in the current SLA landscape.
Ethics & Accountability
Law & Legislation Case Law
Standardisation &
Certification
(Self-regulatory)
Cloud SLA &
Other Contractual
Arrangements
Risk Allocation
& Insurance
Technology
Cloud Service Level Ecosystem
Human
Cloud SLA Life Cycle
When zooming in at one (1) SLA from a legal, negotiation and contract management
perspective, the life cycle of a SLA can be split in seven (7) headline legal life cycle phases:
1.Assessment
2.Preparation
3.Negotiation & Contracting
4.Execution & Operation
5.Updates & Amendments
6.Escalation, and;
7.Termination & Consequences of Termination
4 Main Categories Service Level Objectives (SLOs)
1. Performance
2. Security
3. Data Management
4. (Personal) Data Protection
SLA Life Cycle: Assess, Select, SLA, Execute, Monitor, Update & Terminate
Data Life Cycle: Create/derive, Store, Use/Process, Share, Archive, Destroy
Out of ScopeWithin Scope
Data is not a four letter word
EC Cloud Service Level Agreement Standardisation Guidelines (v20140828)
3D approach | Multi-story of connected data types | Classified data
| Sensitive data | Personal data | Derived data | Proprietary data |
IPR | Encrypted data, with or without Tokenization | Every kind
of data needs to be addressed differently.
Data
Data of any form, nature or structure, that can be created, uploaded, inserted
in, collected or derived from or with cloud services and/or cloud computing,
including without limitation proprietary and non-proprietary data, confidential
and non-confidential data, non-personal and personal data, as well as other
human readable or machine readable data.
State of Practice vs State of Art
Current maturity level of Cloud SLAs of CSPs:
1. Difficult to find, difficult to read & assess: Lot’s of push-back at CSPs
2. Performance: Availability, Uptime & Measurements
3. Incident Management: Response time per prioritised incident
4. Carve-outs & other exclusions: ‘Planned’ Maintenance, Force Majeure, customer, third parties.
5. Less then 10% coverage out of the EC SLA Standardisation Guidelines
6. Difficult to monitor, manage & enforce: status.aws.amazon.com (real-time system status &
status history (35 days)), trust.salesforce.com (real-time system status & planned maintenance),
www.cloudharmony.com/directory (real-time system status & status history (up to 1 year))
CSPs not comfortable, yet.
But how about the cloud customer?
Any question goes!
Thank you
Arthur van der Wees
@SLAReady
@Arthurslegal
vanderwees@arthurslegal.com

Mais conteúdo relacionado

Mais procurados

Design and implement a new cloud security method based on multi clouds on ope...
Design and implement a new cloud security method based on multi clouds on ope...Design and implement a new cloud security method based on multi clouds on ope...
Design and implement a new cloud security method based on multi clouds on ope...csandit
 
Cloud Computing in Healthcare IT
Cloud Computing in Healthcare ITCloud Computing in Healthcare IT
Cloud Computing in Healthcare ITMahindra Satyam
 
Cloud computing - Assessing the Security Risks - Jared Carstensen
Cloud computing - Assessing the Security Risks - Jared CarstensenCloud computing - Assessing the Security Risks - Jared Carstensen
Cloud computing - Assessing the Security Risks - Jared Carstensenjaredcarst
 
Manage risk by protecting apps, data and usage
Manage risk by protecting apps, data and usageManage risk by protecting apps, data and usage
Manage risk by protecting apps, data and usageCitrix
 
Cloud computing and health care - Facing the Future
Cloud computing and health care - Facing the FutureCloud computing and health care - Facing the Future
Cloud computing and health care - Facing the FutureJerry Fahrni
 
Risk management for cloud computing hb final
Risk management for cloud computing hb finalRisk management for cloud computing hb final
Risk management for cloud computing hb finalChristophe Monnier
 
Redefining Business Mobility and Customer Experience
Redefining Business Mobility and Customer ExperienceRedefining Business Mobility and Customer Experience
Redefining Business Mobility and Customer ExperienceCitrix
 
SecSecuring Software as a Service Model of Cloud Computing: Issues and Solutions
SecSecuring Software as a Service Model of Cloud Computing: Issues and SolutionsSecSecuring Software as a Service Model of Cloud Computing: Issues and Solutions
SecSecuring Software as a Service Model of Cloud Computing: Issues and Solutionsijccsa
 
Presentation: To an efficient tool for securing the card data on the Cloud: C...
Presentation: To an efficient tool for securing the card data on the Cloud: C...Presentation: To an efficient tool for securing the card data on the Cloud: C...
Presentation: To an efficient tool for securing the card data on the Cloud: C...Hassan EL ALLOUSSI
 
IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...
IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...
IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...IRJET Journal
 
Coso erm for cloud computing
Coso erm for cloud computingCoso erm for cloud computing
Coso erm for cloud computingVidipOlhyan
 
Legal And Regulatory Issues Cloud Computing...V2.0
Legal And Regulatory Issues Cloud Computing...V2.0Legal And Regulatory Issues Cloud Computing...V2.0
Legal And Regulatory Issues Cloud Computing...V2.0David Spinks
 
Whitepaper: Security of the Cloud
Whitepaper: Security of the CloudWhitepaper: Security of the Cloud
Whitepaper: Security of the CloudCloudSmartz
 
Security in Cloud Computing For Service Delivery Models: Challenges and Solut...
Security in Cloud Computing For Service Delivery Models: Challenges and Solut...Security in Cloud Computing For Service Delivery Models: Challenges and Solut...
Security in Cloud Computing For Service Delivery Models: Challenges and Solut...IJERA Editor
 
A Comprehensive Approach To Third Party Risk Management White Paper 20180103
A Comprehensive Approach To Third Party Risk Management White Paper 20180103A Comprehensive Approach To Third Party Risk Management White Paper 20180103
A Comprehensive Approach To Third Party Risk Management White Paper 20180103DVV Solutions Third Party Risk Management
 

Mais procurados (20)

Host your Cloud – Netmagic Solutions
Host your Cloud – Netmagic SolutionsHost your Cloud – Netmagic Solutions
Host your Cloud – Netmagic Solutions
 
Design and implement a new cloud security method based on multi clouds on ope...
Design and implement a new cloud security method based on multi clouds on ope...Design and implement a new cloud security method based on multi clouds on ope...
Design and implement a new cloud security method based on multi clouds on ope...
 
J3602068071
J3602068071J3602068071
J3602068071
 
Cloud Computing in Healthcare IT
Cloud Computing in Healthcare ITCloud Computing in Healthcare IT
Cloud Computing in Healthcare IT
 
Cloud computing - Assessing the Security Risks - Jared Carstensen
Cloud computing - Assessing the Security Risks - Jared CarstensenCloud computing - Assessing the Security Risks - Jared Carstensen
Cloud computing - Assessing the Security Risks - Jared Carstensen
 
Manage risk by protecting apps, data and usage
Manage risk by protecting apps, data and usageManage risk by protecting apps, data and usage
Manage risk by protecting apps, data and usage
 
Cloud computing and health care - Facing the Future
Cloud computing and health care - Facing the FutureCloud computing and health care - Facing the Future
Cloud computing and health care - Facing the Future
 
Risk management for cloud computing hb final
Risk management for cloud computing hb finalRisk management for cloud computing hb final
Risk management for cloud computing hb final
 
Redefining Business Mobility and Customer Experience
Redefining Business Mobility and Customer ExperienceRedefining Business Mobility and Customer Experience
Redefining Business Mobility and Customer Experience
 
SecSecuring Software as a Service Model of Cloud Computing: Issues and Solutions
SecSecuring Software as a Service Model of Cloud Computing: Issues and SolutionsSecSecuring Software as a Service Model of Cloud Computing: Issues and Solutions
SecSecuring Software as a Service Model of Cloud Computing: Issues and Solutions
 
Presentation: To an efficient tool for securing the card data on the Cloud: C...
Presentation: To an efficient tool for securing the card data on the Cloud: C...Presentation: To an efficient tool for securing the card data on the Cloud: C...
Presentation: To an efficient tool for securing the card data on the Cloud: C...
 
IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...
IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...
IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...
 
Software defined networking
Software defined networkingSoftware defined networking
Software defined networking
 
Coso erm for cloud computing
Coso erm for cloud computingCoso erm for cloud computing
Coso erm for cloud computing
 
Legal And Regulatory Issues Cloud Computing...V2.0
Legal And Regulatory Issues Cloud Computing...V2.0Legal And Regulatory Issues Cloud Computing...V2.0
Legal And Regulatory Issues Cloud Computing...V2.0
 
Whitepaper: Security of the Cloud
Whitepaper: Security of the CloudWhitepaper: Security of the Cloud
Whitepaper: Security of the Cloud
 
Security of the Cloud
Security of the CloudSecurity of the Cloud
Security of the Cloud
 
Security in Cloud Computing For Service Delivery Models: Challenges and Solut...
Security in Cloud Computing For Service Delivery Models: Challenges and Solut...Security in Cloud Computing For Service Delivery Models: Challenges and Solut...
Security in Cloud Computing For Service Delivery Models: Challenges and Solut...
 
Netmagic the-storage-matrix
Netmagic the-storage-matrixNetmagic the-storage-matrix
Netmagic the-storage-matrix
 
A Comprehensive Approach To Third Party Risk Management White Paper 20180103
A Comprehensive Approach To Third Party Risk Management White Paper 20180103A Comprehensive Approach To Third Party Risk Management White Paper 20180103
A Comprehensive Approach To Third Party Risk Management White Paper 20180103
 

Semelhante a Arthur van der Wees, Arthur's Legal on Making Cloud SLAs readily usable in the EU private sector

Cloud Services As An Enabler
Cloud Services As An EnablerCloud Services As An Enabler
Cloud Services As An EnablerSLA-Ready Network
 
DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...
DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...
DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...cscpconf
 
Cloud Services As An Enabler: the Strategic, Legal & Pragmatic Approach
Cloud Services As An Enabler: the Strategic, Legal & Pragmatic ApproachCloud Services As An Enabler: the Strategic, Legal & Pragmatic Approach
Cloud Services As An Enabler: the Strategic, Legal & Pragmatic ApproachSLA-Ready Network
 
Cloud computing-security-issues
Cloud computing-security-issuesCloud computing-security-issues
Cloud computing-security-issuesAleem Mohammed
 
Cloud computing seminar report
Cloud computing seminar reportCloud computing seminar report
Cloud computing seminar reportshafzonly
 
Cloud computing Risk management
Cloud computing Risk management  Cloud computing Risk management
Cloud computing Risk management Padma Jella
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER) International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER) ijceronline
 
Cloud Computing - A future prerogative
Cloud Computing - A future prerogativeCloud Computing - A future prerogative
Cloud Computing - A future prerogativeWayne Poggenpoel
 
The Art of Cloud Auditing - ISACA ID
The Art of Cloud Auditing - ISACA IDThe Art of Cloud Auditing - ISACA ID
The Art of Cloud Auditing - ISACA IDEryk Budi Pratama
 
A Trusted TPA Model, to Improve Security & Reliability for Cloud Storage
A Trusted TPA Model, to Improve Security & Reliability for Cloud StorageA Trusted TPA Model, to Improve Security & Reliability for Cloud Storage
A Trusted TPA Model, to Improve Security & Reliability for Cloud StorageIRJET Journal
 
2014 2nd me cloud conference trust in the cloud v01
2014 2nd me cloud conference trust in the cloud v012014 2nd me cloud conference trust in the cloud v01
2014 2nd me cloud conference trust in the cloud v01promediakw
 
MIST Effective Masquerade Attack Detection in the Cloud
MIST Effective Masquerade Attack Detection in the CloudMIST Effective Masquerade Attack Detection in the Cloud
MIST Effective Masquerade Attack Detection in the CloudKumar Goud
 
EMEA10: Trepidation in Moving to the Cloud
EMEA10: Trepidation in Moving to the CloudEMEA10: Trepidation in Moving to the Cloud
EMEA10: Trepidation in Moving to the CloudCompTIA UK
 
ISACA Journal Publication - Does your Cloud have a Secure Lining? Shah Sheikh
ISACA Journal Publication - Does your Cloud have a Secure Lining? Shah SheikhISACA Journal Publication - Does your Cloud have a Secure Lining? Shah Sheikh
ISACA Journal Publication - Does your Cloud have a Secure Lining? Shah SheikhShah Sheikh
 
IRJET- SAAS Attacks Defense Mechanisms and Digital Forensic
IRJET-  	  SAAS Attacks Defense Mechanisms and Digital ForensicIRJET-  	  SAAS Attacks Defense Mechanisms and Digital Forensic
IRJET- SAAS Attacks Defense Mechanisms and Digital ForensicIRJET Journal
 
IDC Study on Enterprise Hybrid Cloud Strategies
IDC Study on Enterprise Hybrid Cloud StrategiesIDC Study on Enterprise Hybrid Cloud Strategies
IDC Study on Enterprise Hybrid Cloud StrategiesEMC
 
Why CCSK with InfosecTrain (1).pdf
Why CCSK with InfosecTrain (1).pdfWhy CCSK with InfosecTrain (1).pdf
Why CCSK with InfosecTrain (1).pdfinfosec train
 

Semelhante a Arthur van der Wees, Arthur's Legal on Making Cloud SLAs readily usable in the EU private sector (20)

Cloud Services As An Enabler
Cloud Services As An EnablerCloud Services As An Enabler
Cloud Services As An Enabler
 
DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...
DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...
DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...
 
Cloud and compliance REX
Cloud and compliance REXCloud and compliance REX
Cloud and compliance REX
 
Cloud services and it security
Cloud services and it securityCloud services and it security
Cloud services and it security
 
Cloud Services As An Enabler: the Strategic, Legal & Pragmatic Approach
Cloud Services As An Enabler: the Strategic, Legal & Pragmatic ApproachCloud Services As An Enabler: the Strategic, Legal & Pragmatic Approach
Cloud Services As An Enabler: the Strategic, Legal & Pragmatic Approach
 
SECURITY ISSUES IN CLOUD COMPUTING
SECURITY ISSUES IN CLOUD COMPUTINGSECURITY ISSUES IN CLOUD COMPUTING
SECURITY ISSUES IN CLOUD COMPUTING
 
Cloud computing-security-issues
Cloud computing-security-issuesCloud computing-security-issues
Cloud computing-security-issues
 
Cloud computing seminar report
Cloud computing seminar reportCloud computing seminar report
Cloud computing seminar report
 
Cloud computing Risk management
Cloud computing Risk management  Cloud computing Risk management
Cloud computing Risk management
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER) International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Cloud Computing - A future prerogative
Cloud Computing - A future prerogativeCloud Computing - A future prerogative
Cloud Computing - A future prerogative
 
The Art of Cloud Auditing - ISACA ID
The Art of Cloud Auditing - ISACA IDThe Art of Cloud Auditing - ISACA ID
The Art of Cloud Auditing - ISACA ID
 
A Trusted TPA Model, to Improve Security & Reliability for Cloud Storage
A Trusted TPA Model, to Improve Security & Reliability for Cloud StorageA Trusted TPA Model, to Improve Security & Reliability for Cloud Storage
A Trusted TPA Model, to Improve Security & Reliability for Cloud Storage
 
2014 2nd me cloud conference trust in the cloud v01
2014 2nd me cloud conference trust in the cloud v012014 2nd me cloud conference trust in the cloud v01
2014 2nd me cloud conference trust in the cloud v01
 
MIST Effective Masquerade Attack Detection in the Cloud
MIST Effective Masquerade Attack Detection in the CloudMIST Effective Masquerade Attack Detection in the Cloud
MIST Effective Masquerade Attack Detection in the Cloud
 
EMEA10: Trepidation in Moving to the Cloud
EMEA10: Trepidation in Moving to the CloudEMEA10: Trepidation in Moving to the Cloud
EMEA10: Trepidation in Moving to the Cloud
 
ISACA Journal Publication - Does your Cloud have a Secure Lining? Shah Sheikh
ISACA Journal Publication - Does your Cloud have a Secure Lining? Shah SheikhISACA Journal Publication - Does your Cloud have a Secure Lining? Shah Sheikh
ISACA Journal Publication - Does your Cloud have a Secure Lining? Shah Sheikh
 
IRJET- SAAS Attacks Defense Mechanisms and Digital Forensic
IRJET-  	  SAAS Attacks Defense Mechanisms and Digital ForensicIRJET-  	  SAAS Attacks Defense Mechanisms and Digital Forensic
IRJET- SAAS Attacks Defense Mechanisms and Digital Forensic
 
IDC Study on Enterprise Hybrid Cloud Strategies
IDC Study on Enterprise Hybrid Cloud StrategiesIDC Study on Enterprise Hybrid Cloud Strategies
IDC Study on Enterprise Hybrid Cloud Strategies
 
Why CCSK with InfosecTrain (1).pdf
Why CCSK with InfosecTrain (1).pdfWhy CCSK with InfosecTrain (1).pdf
Why CCSK with InfosecTrain (1).pdf
 

Mais de SLA-Ready Network

The European Cloud Initiative
The European Cloud InitiativeThe European Cloud Initiative
The European Cloud InitiativeSLA-Ready Network
 
“Tools” and Standards for Cloud-SLA
“Tools” and Standards for Cloud-SLA“Tools” and Standards for Cloud-SLA
“Tools” and Standards for Cloud-SLASLA-Ready Network
 
European Open Science Cloud (EOSC) From vision to action
European Open Science Cloud (EOSC) From vision to actionEuropean Open Science Cloud (EOSC) From vision to action
European Open Science Cloud (EOSC) From vision to actionSLA-Ready Network
 
SLA-Ready Common Reference Model
SLA-Ready Common Reference ModelSLA-Ready Common Reference Model
SLA-Ready Common Reference ModelSLA-Ready Network
 
Making cloud SLAs readily usable in the EU private sector
Making cloud SLAs readily usable in the EU private sector Making cloud SLAs readily usable in the EU private sector
Making cloud SLAs readily usable in the EU private sector SLA-Ready Network
 
Helix Nebula Science Cloud Joint Pre‐Commercial Procurement
Helix Nebula Science Cloud Joint Pre‐Commercial ProcurementHelix Nebula Science Cloud Joint Pre‐Commercial Procurement
Helix Nebula Science Cloud Joint Pre‐Commercial ProcurementSLA-Ready Network
 
SLA-Ready Common Reference Model
SLA-Ready Common Reference ModelSLA-Ready Common Reference Model
SLA-Ready Common Reference ModelSLA-Ready Network
 
Getting to grips with a Service Level Agreement and how SLA-Ready can help
Getting to grips with a Service Level Agreement and how SLA-Ready can helpGetting to grips with a Service Level Agreement and how SLA-Ready can help
Getting to grips with a Service Level Agreement and how SLA-Ready can helpSLA-Ready Network
 
Getting to grips with a Service Level Agreement and how SLA-Ready can help
Getting to grips with a Service Level Agreement and how SLA-Ready can helpGetting to grips with a Service Level Agreement and how SLA-Ready can help
Getting to grips with a Service Level Agreement and how SLA-Ready can helpSLA-Ready Network
 
Practical tools supporting businesses when adopting cloud services
Practical tools supporting businesses when adopting cloud servicesPractical tools supporting businesses when adopting cloud services
Practical tools supporting businesses when adopting cloud servicesSLA-Ready Network
 
SLA-Ready Common Reference Model
SLA-Ready Common Reference ModelSLA-Ready Common Reference Model
SLA-Ready Common Reference ModelSLA-Ready Network
 
Bob Jones, CERN on PICSE: Procurement of cloud services in Europe
Bob Jones, CERN on PICSE: Procurement of cloud services in EuropeBob Jones, CERN on PICSE: Procurement of cloud services in Europe
Bob Jones, CERN on PICSE: Procurement of cloud services in EuropeSLA-Ready Network
 
Massimiliano Raks, Naples University on SPECS: Secure provisioning of cloud s...
Massimiliano Raks, Naples University on SPECS: Secure provisioning of cloud s...Massimiliano Raks, Naples University on SPECS: Secure provisioning of cloud s...
Massimiliano Raks, Naples University on SPECS: Secure provisioning of cloud s...SLA-Ready Network
 
Siani Pearson, HP Labs UK on a Common Vision for Governance, Accountability a...
Siani Pearson, HP Labs UK on a Common Vision for Governance, Accountability a...Siani Pearson, HP Labs UK on a Common Vision for Governance, Accountability a...
Siani Pearson, HP Labs UK on a Common Vision for Governance, Accountability a...SLA-Ready Network
 

Mais de SLA-Ready Network (17)

European CIO Association
European CIO AssociationEuropean CIO Association
European CIO Association
 
The European Cloud Initiative
The European Cloud InitiativeThe European Cloud Initiative
The European Cloud Initiative
 
“Tools” and Standards for Cloud-SLA
“Tools” and Standards for Cloud-SLA“Tools” and Standards for Cloud-SLA
“Tools” and Standards for Cloud-SLA
 
European Open Science Cloud (EOSC) From vision to action
European Open Science Cloud (EOSC) From vision to actionEuropean Open Science Cloud (EOSC) From vision to action
European Open Science Cloud (EOSC) From vision to action
 
GÉANT network
GÉANT networkGÉANT network
GÉANT network
 
SLA-Ready Common Reference Model
SLA-Ready Common Reference ModelSLA-Ready Common Reference Model
SLA-Ready Common Reference Model
 
Making cloud SLAs readily usable in the EU private sector
Making cloud SLAs readily usable in the EU private sector Making cloud SLAs readily usable in the EU private sector
Making cloud SLAs readily usable in the EU private sector
 
Helix Nebula Science Cloud Joint Pre‐Commercial Procurement
Helix Nebula Science Cloud Joint Pre‐Commercial ProcurementHelix Nebula Science Cloud Joint Pre‐Commercial Procurement
Helix Nebula Science Cloud Joint Pre‐Commercial Procurement
 
SLA-Ready Common Reference Model
SLA-Ready Common Reference ModelSLA-Ready Common Reference Model
SLA-Ready Common Reference Model
 
Getting to grips with a Service Level Agreement and how SLA-Ready can help
Getting to grips with a Service Level Agreement and how SLA-Ready can helpGetting to grips with a Service Level Agreement and how SLA-Ready can help
Getting to grips with a Service Level Agreement and how SLA-Ready can help
 
Getting to grips with a Service Level Agreement and how SLA-Ready can help
Getting to grips with a Service Level Agreement and how SLA-Ready can helpGetting to grips with a Service Level Agreement and how SLA-Ready can help
Getting to grips with a Service Level Agreement and how SLA-Ready can help
 
Practical tools supporting businesses when adopting cloud services
Practical tools supporting businesses when adopting cloud servicesPractical tools supporting businesses when adopting cloud services
Practical tools supporting businesses when adopting cloud services
 
SLA-Ready Common Reference Model
SLA-Ready Common Reference ModelSLA-Ready Common Reference Model
SLA-Ready Common Reference Model
 
Are you SLA-Ready?
Are you SLA-Ready?Are you SLA-Ready?
Are you SLA-Ready?
 
Bob Jones, CERN on PICSE: Procurement of cloud services in Europe
Bob Jones, CERN on PICSE: Procurement of cloud services in EuropeBob Jones, CERN on PICSE: Procurement of cloud services in Europe
Bob Jones, CERN on PICSE: Procurement of cloud services in Europe
 
Massimiliano Raks, Naples University on SPECS: Secure provisioning of cloud s...
Massimiliano Raks, Naples University on SPECS: Secure provisioning of cloud s...Massimiliano Raks, Naples University on SPECS: Secure provisioning of cloud s...
Massimiliano Raks, Naples University on SPECS: Secure provisioning of cloud s...
 
Siani Pearson, HP Labs UK on a Common Vision for Governance, Accountability a...
Siani Pearson, HP Labs UK on a Common Vision for Governance, Accountability a...Siani Pearson, HP Labs UK on a Common Vision for Governance, Accountability a...
Siani Pearson, HP Labs UK on a Common Vision for Governance, Accountability a...
 

Último

Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 

Último (20)

Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 

Arthur van der Wees, Arthur's Legal on Making Cloud SLAs readily usable in the EU private sector

  • 1. Making Cloud SLAs readily usable in the EU private sector Arthur van der Wees Managing Director international law firm Arthur’s Legal Founder & Chief Executive Officer Zapplied Platform
  • 2. 2 Risks, Comfort & Trust in the Cloud  Cloud Services Challenges: For the 80% not yet using cloud services, insufficient knowledge is the main blocking factors (42%). For the 20% using cloud services, the risk of a security breach is the main limiting factor (39%). Eurostat (EC)
  • 3. Cybersecurity & Data Protection: Threat or Strength? Risks, Comfort, Trust in & Rewards of the Cloud 60%cited concerns around data security as a barrier to adoption. 45%concerned that the cloud would result in a lack of data control. 94%experienced security benefits they didn’t previously have on- premise. 62%said privacy protection increased as a result of moving to the cloud. Initial concerns Realized benefits Microsoft Azure (ISO 27018)
  • 4. European Commission Priority: Digital Single Market C-SIG Drafting Group DG CNECT: Select expert group (CSA, IBM, Microsoft, Telecom Italia and Arthur’s Legal): EC Cloud SLA Standardisation Guidelines, ISO and other standardisation. ISO/IEC 17788. ISO/IEC 19086 (I). Computer Science: TU Darmstadt Coordination & communication: Trust-IT Services Security: Cloud Security Alliance Strategic & Legal: Arthur’s Legal Cloud Computing & European Commission
  • 5. 5 What do we want to achieve? Improve transparency, bridging the disconnect between supply and demand, and increase the uptake of cloud computing by making it easier for and empower 20 million EU SMEs to understand SLAs SLA-Ready aims to provide common understanding of Service Level Agreements (SLAs) for Cloud services with greater standardisation and transparency so organisations can make an informed decision on what services to use, what to expect and what to trust.
  • 6. How to achieve #Cloud #Trust #Strategy #Performance #Security #Data #Data Protection #SLAReady SLAs are an important but yet only one particle in the Cloud Service Level Ecosystem: SLA-Ready services will support SMEs with user-friendly practical tools, guides, and a social marketplace, encouraging them to carefully plan their journey and make it strategic through an informed, stepping-stone approach, so the Cloud and applications grow with their business. The SLA-Ready Common Reference Model will benefit the industry by integrating a set of SLA components, e.g. common vocabularies, Service Level Objectives (SLO) service metrics and measurements, as well as best practices and relevant standards to fill identified gaps in the current SLA landscape.
  • 7. Ethics & Accountability Law & Legislation Case Law Standardisation & Certification (Self-regulatory) Cloud SLA & Other Contractual Arrangements Risk Allocation & Insurance Technology Cloud Service Level Ecosystem Human
  • 8. Cloud SLA Life Cycle When zooming in at one (1) SLA from a legal, negotiation and contract management perspective, the life cycle of a SLA can be split in seven (7) headline legal life cycle phases: 1.Assessment 2.Preparation 3.Negotiation & Contracting 4.Execution & Operation 5.Updates & Amendments 6.Escalation, and; 7.Termination & Consequences of Termination
  • 9. 4 Main Categories Service Level Objectives (SLOs) 1. Performance 2. Security 3. Data Management 4. (Personal) Data Protection SLA Life Cycle: Assess, Select, SLA, Execute, Monitor, Update & Terminate Data Life Cycle: Create/derive, Store, Use/Process, Share, Archive, Destroy Out of ScopeWithin Scope
  • 10. Data is not a four letter word EC Cloud Service Level Agreement Standardisation Guidelines (v20140828) 3D approach | Multi-story of connected data types | Classified data | Sensitive data | Personal data | Derived data | Proprietary data | IPR | Encrypted data, with or without Tokenization | Every kind of data needs to be addressed differently. Data Data of any form, nature or structure, that can be created, uploaded, inserted in, collected or derived from or with cloud services and/or cloud computing, including without limitation proprietary and non-proprietary data, confidential and non-confidential data, non-personal and personal data, as well as other human readable or machine readable data.
  • 11. State of Practice vs State of Art Current maturity level of Cloud SLAs of CSPs: 1. Difficult to find, difficult to read & assess: Lot’s of push-back at CSPs 2. Performance: Availability, Uptime & Measurements 3. Incident Management: Response time per prioritised incident 4. Carve-outs & other exclusions: ‘Planned’ Maintenance, Force Majeure, customer, third parties. 5. Less then 10% coverage out of the EC SLA Standardisation Guidelines 6. Difficult to monitor, manage & enforce: status.aws.amazon.com (real-time system status & status history (35 days)), trust.salesforce.com (real-time system status & planned maintenance), www.cloudharmony.com/directory (real-time system status & status history (up to 1 year)) CSPs not comfortable, yet. But how about the cloud customer?
  • 12. Any question goes! Thank you Arthur van der Wees @SLAReady @Arthurslegal vanderwees@arthurslegal.com