SlideShare uma empresa Scribd logo
1 de 12
Bringing Cloud operational benefits to the world of security and privacy Gilad Parann-Nissany http://www.porticor.comcontact@porticor.com CSA Congress, November 16th-17th, 2010 12/7/2010 www.porticor.com           © PORTICOR 2009, 2010
12/7/2010 www.porticor.com           © PORTICOR 2009, 2010 2
Goals Focus: public cloud Because its in some ways more challenging than private cloud Focus: IaaS/PaaS SaaS controlled by vendor Agenda Baseline assumptions Threat analysis What’s really new? What’s not? Cloud-deployed security tools Demo: WAF in the cloud Cloud-specific security considerations Demo: securing the data layer Summary: flexibility in the cloud 12/7/2010 www.porticor.com           © PORTICOR 2009, 2010 3 “Cloudy” Security
NOT “selling cloud” Customer IT has evaluated what they would feel comfortable putting in the cloud Customer IT understands that – in IaaS/PaaS – they still retain some responsibility Customer IT is asking the questions: “how to meet our responsibility, how to do security reasonably, and what are the tools to use?” 12/7/2010 www.porticor.com           © PORTICOR 2009, 2010 4 Baseline assumptions for this discussion
Shared Technology Vulnerabilities  Data Loss/Data Leakage Malicious Insiders  Account Service or Hijacking of Traffic Insecure APIs  Nefarious Use of Service  Unknown Risk Profile 12/7/2010 www.porticor.com           © PORTICOR 2009, 2010 5 Threat Analysis: I/PaaS PaaS Platform as a Service IaaS Infrastructure as a Service (*) courtesy “Cloud Security Alliance: Assuring the future of Cloud Computing”: S. Loureiro, 2010
Some known concepts translate to cloud with a twist APIs SaaS security Usage of IaaS And of course, there is some pretty new stuff More about this later… 12/7/2010 Copyright 2009, 2010 ©Porticor What’s new? What carries over?
12/7/2010 Copyright 2009, 2010 ©Porticor Translating known concepts to cloud Examples …and more
Cloud Data Demo 1 12/7/2010 Confidential ©Porticor Internet Business Compute
Secure distributed data storage Keys management Hypervisors and virtual machines Role of encryption changes New data protection measures emerge (i.e. fragmentation) Physical security of cloud environments 12/7/2010 www.porticor.com           © PORTICOR 2009, 2010 9 Some new considerations
Cloud Demo 2 12/7/2010 Confidential ©Porticor Internet Business Mgmt Site Compute Data
Package complex privacy and security technology  Get the operations and economics right Pay as you go Privacy and security solutions can be brought up in a reasonable time – not months Privacy and security have proper service level guarantees Backed by proper SLA and/or Warranty 12/7/2010 www.porticor.com           © PORTICOR 2009, 2010 11 Elasticity, Flexibility, Management
12/7/2010 Confidential ©Porticor Thank You! Questions ?

Mais conteúdo relacionado

Mais procurados

Cisco cloud strategy cisco
Cisco cloud strategy ciscoCisco cloud strategy cisco
Cisco cloud strategy cisco
OpenSourceCamp
 
Nick Barcet, Open Source tijdens Infosecurity.nl Storage Expo en Tooling Even...
Nick Barcet, Open Source tijdens Infosecurity.nl Storage Expo en Tooling Even...Nick Barcet, Open Source tijdens Infosecurity.nl Storage Expo en Tooling Even...
Nick Barcet, Open Source tijdens Infosecurity.nl Storage Expo en Tooling Even...
Infosecurity2010
 

Mais procurados (20)

Getting Your IT Security Learners Ready for the Cloud with CCSK Certification
Getting Your IT Security Learners Ready for the Cloud with CCSK CertificationGetting Your IT Security Learners Ready for the Cloud with CCSK Certification
Getting Your IT Security Learners Ready for the Cloud with CCSK Certification
 
Ten Type of Innovation - Universitas Indonesia
Ten Type of Innovation - Universitas Indonesia Ten Type of Innovation - Universitas Indonesia
Ten Type of Innovation - Universitas Indonesia
 
Ciphercloud Solutions Overview hsa oct2011
Ciphercloud Solutions Overview hsa oct2011Ciphercloud Solutions Overview hsa oct2011
Ciphercloud Solutions Overview hsa oct2011
 
Cisco Keynote at NetApp Insight - Berlin
Cisco Keynote at NetApp Insight - BerlinCisco Keynote at NetApp Insight - Berlin
Cisco Keynote at NetApp Insight - Berlin
 
Identity Live Sydney 2017 - Michael Dowling
Identity Live Sydney 2017 - Michael DowlingIdentity Live Sydney 2017 - Michael Dowling
Identity Live Sydney 2017 - Michael Dowling
 
CCSK Certificate of Cloud Computing Knowledge - overview
CCSK Certificate of Cloud Computing Knowledge - overviewCCSK Certificate of Cloud Computing Knowledge - overview
CCSK Certificate of Cloud Computing Knowledge - overview
 
Cisco cloud strategy cisco
Cisco cloud strategy ciscoCisco cloud strategy cisco
Cisco cloud strategy cisco
 
IBB Energie AG
IBB Energie AGIBB Energie AG
IBB Energie AG
 
uPort's Privacy Preserving User Management System for Ethereum dApps
uPort's Privacy Preserving User Management System for Ethereum dAppsuPort's Privacy Preserving User Management System for Ethereum dApps
uPort's Privacy Preserving User Management System for Ethereum dApps
 
Nick Barcet, Open Source tijdens Infosecurity.nl Storage Expo en Tooling Even...
Nick Barcet, Open Source tijdens Infosecurity.nl Storage Expo en Tooling Even...Nick Barcet, Open Source tijdens Infosecurity.nl Storage Expo en Tooling Even...
Nick Barcet, Open Source tijdens Infosecurity.nl Storage Expo en Tooling Even...
 
MILCOM 2013 Keynote Presentation: Larry Payne
MILCOM 2013 Keynote Presentation: Larry Payne MILCOM 2013 Keynote Presentation: Larry Payne
MILCOM 2013 Keynote Presentation: Larry Payne
 
The Cloud & I, The CISO challenges with Cloud Computing
The Cloud & I, The CISO challenges with Cloud Computing The Cloud & I, The CISO challenges with Cloud Computing
The Cloud & I, The CISO challenges with Cloud Computing
 
Internet of everything
Internet of everything Internet of everything
Internet of everything
 
CCSK, cloud security framework, Indonesia
CCSK, cloud security framework, IndonesiaCCSK, cloud security framework, Indonesia
CCSK, cloud security framework, Indonesia
 
Intel’s Strategy in IoT Standards
Intel’s Strategy in IoT StandardsIntel’s Strategy in IoT Standards
Intel’s Strategy in IoT Standards
 
Ramin elahi fog_computing_ecosystem_final_dec22_updated
Ramin elahi fog_computing_ecosystem_final_dec22_updatedRamin elahi fog_computing_ecosystem_final_dec22_updated
Ramin elahi fog_computing_ecosystem_final_dec22_updated
 
Neotel
Neotel Neotel
Neotel
 
The Notorious 9 Cloud Computing Threats - CSA Congress, San Jose
The Notorious 9 Cloud Computing Threats -  CSA Congress, San JoseThe Notorious 9 Cloud Computing Threats -  CSA Congress, San Jose
The Notorious 9 Cloud Computing Threats - CSA Congress, San Jose
 
Devil's Bargain: Sacrificing Strategic Investments to Fund Today's Problems
Devil's Bargain: Sacrificing Strategic Investments to Fund Today's ProblemsDevil's Bargain: Sacrificing Strategic Investments to Fund Today's Problems
Devil's Bargain: Sacrificing Strategic Investments to Fund Today's Problems
 
Enterprise Ethereum : How It Differs From DLT?
Enterprise Ethereum : How It Differs From DLT?Enterprise Ethereum : How It Differs From DLT?
Enterprise Ethereum : How It Differs From DLT?
 

Destaque

Synthèse-Publics du Festival d'Avignon 2011
Synthèse-Publics du Festival d'Avignon 2011Synthèse-Publics du Festival d'Avignon 2011
Synthèse-Publics du Festival d'Avignon 2011
Aude Rochat
 

Destaque (11)

Mindfulness
MindfulnessMindfulness
Mindfulness
 
Wentworth LOR
Wentworth LORWentworth LOR
Wentworth LOR
 
Preparing for Today's Job Market - The Interview
Preparing for Today's Job Market - The InterviewPreparing for Today's Job Market - The Interview
Preparing for Today's Job Market - The Interview
 
Zyga Patient Brochure
Zyga Patient BrochureZyga Patient Brochure
Zyga Patient Brochure
 
Prezentacja dzielnice
Prezentacja dzielnicePrezentacja dzielnice
Prezentacja dzielnice
 
Wentworth LOR (Billingsley)
Wentworth LOR (Billingsley)Wentworth LOR (Billingsley)
Wentworth LOR (Billingsley)
 
pinkdino A4 2
pinkdino A4 2pinkdino A4 2
pinkdino A4 2
 
Welcome by Programmatic Bootcamp Host
Welcome by Programmatic Bootcamp HostWelcome by Programmatic Bootcamp Host
Welcome by Programmatic Bootcamp Host
 
Synthèse-Publics du Festival d'Avignon 2011
Synthèse-Publics du Festival d'Avignon 2011Synthèse-Publics du Festival d'Avignon 2011
Synthèse-Publics du Festival d'Avignon 2011
 
FINAL CAPSTONE Library
FINAL CAPSTONE Library FINAL CAPSTONE Library
FINAL CAPSTONE Library
 
Kanjana02
Kanjana02Kanjana02
Kanjana02
 

Semelhante a 20100925 cloudy security - porticor

Executive Briefing: Strategic Issues Surrounding Cloud Services
Executive Briefing:  Strategic Issues Surrounding Cloud ServicesExecutive Briefing:  Strategic Issues Surrounding Cloud Services
Executive Briefing: Strategic Issues Surrounding Cloud Services
WhitmeyerTuffin
 
How Secure Is Cloud
How Secure Is CloudHow Secure Is Cloud
How Secure Is Cloud
William Lam
 
Research Report: Cloud Trends in 2011 and beyond
Research Report: Cloud Trends in 2011 and beyondResearch Report: Cloud Trends in 2011 and beyond
Research Report: Cloud Trends in 2011 and beyond
Krishnan Subramanian
 
The Management of Security in Cloud Computing Ramgovind.docx
The Management of Security in Cloud Computing  Ramgovind.docxThe Management of Security in Cloud Computing  Ramgovind.docx
The Management of Security in Cloud Computing Ramgovind.docx
cherry686017
 

Semelhante a 20100925 cloudy security - porticor (20)

Porticor - Can Data be safe in Public Clouds, in Compliance with Standards
Porticor - Can Data be safe in Public Clouds, in Compliance with StandardsPorticor - Can Data be safe in Public Clouds, in Compliance with Standards
Porticor - Can Data be safe in Public Clouds, in Compliance with Standards
 
Slides 530 a2
Slides 530 a2Slides 530 a2
Slides 530 a2
 
Security in Cloud Computing
Security in Cloud ComputingSecurity in Cloud Computing
Security in Cloud Computing
 
Cloud Computing Security Issues and Challenges
Cloud Computing Security Issues and ChallengesCloud Computing Security Issues and Challenges
Cloud Computing Security Issues and Challenges
 
No More Dark Clouds: A Privacy Preserving Framework for the Cloud
No More Dark Clouds: A Privacy Preserving Framework for the CloudNo More Dark Clouds: A Privacy Preserving Framework for the Cloud
No More Dark Clouds: A Privacy Preserving Framework for the Cloud
 
An Analysis of Cloud Security
An Analysis of Cloud SecurityAn Analysis of Cloud Security
An Analysis of Cloud Security
 
PROOM
PROOMPROOM
PROOM
 
Cloud Encryption Gateways (how enterprises can leverage cloud SaaS without co...
Cloud Encryption Gateways (how enterprises can leverage cloud SaaS without co...Cloud Encryption Gateways (how enterprises can leverage cloud SaaS without co...
Cloud Encryption Gateways (how enterprises can leverage cloud SaaS without co...
 
Massonet Philippe Panel - Security in the clouds: An Academic Perspective
Massonet Philippe Panel - Security in the clouds: An Academic PerspectiveMassonet Philippe Panel - Security in the clouds: An Academic Perspective
Massonet Philippe Panel - Security in the clouds: An Academic Perspective
 
What is cloud
What is cloudWhat is cloud
What is cloud
 
Fio presentation on Cloud Computing Solution
Fio presentation on Cloud Computing SolutionFio presentation on Cloud Computing Solution
Fio presentation on Cloud Computing Solution
 
Executive Briefing: Strategic Issues Surrounding Cloud Services
Executive Briefing:  Strategic Issues Surrounding Cloud ServicesExecutive Briefing:  Strategic Issues Surrounding Cloud Services
Executive Briefing: Strategic Issues Surrounding Cloud Services
 
How Secure Is Cloud
How Secure Is CloudHow Secure Is Cloud
How Secure Is Cloud
 
600.412.Lecture05
600.412.Lecture05600.412.Lecture05
600.412.Lecture05
 
Ad4502189193
Ad4502189193Ad4502189193
Ad4502189193
 
Research Report: Cloud Trends in 2011 and beyond
Research Report: Cloud Trends in 2011 and beyondResearch Report: Cloud Trends in 2011 and beyond
Research Report: Cloud Trends in 2011 and beyond
 
The Management of Security in Cloud Computing Ramgovind.docx
The Management of Security in Cloud Computing  Ramgovind.docxThe Management of Security in Cloud Computing  Ramgovind.docx
The Management of Security in Cloud Computing Ramgovind.docx
 
Presentation capturing the cloud opportunity
Presentation   capturing the cloud opportunityPresentation   capturing the cloud opportunity
Presentation capturing the cloud opportunity
 
Cloud Computing - Why and How? (by Forrester Research, Inc.)
Cloud Computing - Why and How? (by Forrester Research, Inc.)Cloud Computing - Why and How? (by Forrester Research, Inc.)
Cloud Computing - Why and How? (by Forrester Research, Inc.)
 
Cloud Computing & Security Concerns
Cloud Computing & Security ConcernsCloud Computing & Security Concerns
Cloud Computing & Security Concerns
 

Último

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Último (20)

Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 

20100925 cloudy security - porticor

  • 1. Bringing Cloud operational benefits to the world of security and privacy Gilad Parann-Nissany http://www.porticor.comcontact@porticor.com CSA Congress, November 16th-17th, 2010 12/7/2010 www.porticor.com © PORTICOR 2009, 2010
  • 2. 12/7/2010 www.porticor.com © PORTICOR 2009, 2010 2
  • 3. Goals Focus: public cloud Because its in some ways more challenging than private cloud Focus: IaaS/PaaS SaaS controlled by vendor Agenda Baseline assumptions Threat analysis What’s really new? What’s not? Cloud-deployed security tools Demo: WAF in the cloud Cloud-specific security considerations Demo: securing the data layer Summary: flexibility in the cloud 12/7/2010 www.porticor.com © PORTICOR 2009, 2010 3 “Cloudy” Security
  • 4. NOT “selling cloud” Customer IT has evaluated what they would feel comfortable putting in the cloud Customer IT understands that – in IaaS/PaaS – they still retain some responsibility Customer IT is asking the questions: “how to meet our responsibility, how to do security reasonably, and what are the tools to use?” 12/7/2010 www.porticor.com © PORTICOR 2009, 2010 4 Baseline assumptions for this discussion
  • 5. Shared Technology Vulnerabilities Data Loss/Data Leakage Malicious Insiders Account Service or Hijacking of Traffic Insecure APIs Nefarious Use of Service Unknown Risk Profile 12/7/2010 www.porticor.com © PORTICOR 2009, 2010 5 Threat Analysis: I/PaaS PaaS Platform as a Service IaaS Infrastructure as a Service (*) courtesy “Cloud Security Alliance: Assuring the future of Cloud Computing”: S. Loureiro, 2010
  • 6. Some known concepts translate to cloud with a twist APIs SaaS security Usage of IaaS And of course, there is some pretty new stuff More about this later… 12/7/2010 Copyright 2009, 2010 ©Porticor What’s new? What carries over?
  • 7. 12/7/2010 Copyright 2009, 2010 ©Porticor Translating known concepts to cloud Examples …and more
  • 8. Cloud Data Demo 1 12/7/2010 Confidential ©Porticor Internet Business Compute
  • 9. Secure distributed data storage Keys management Hypervisors and virtual machines Role of encryption changes New data protection measures emerge (i.e. fragmentation) Physical security of cloud environments 12/7/2010 www.porticor.com © PORTICOR 2009, 2010 9 Some new considerations
  • 10. Cloud Demo 2 12/7/2010 Confidential ©Porticor Internet Business Mgmt Site Compute Data
  • 11. Package complex privacy and security technology Get the operations and economics right Pay as you go Privacy and security solutions can be brought up in a reasonable time – not months Privacy and security have proper service level guarantees Backed by proper SLA and/or Warranty 12/7/2010 www.porticor.com © PORTICOR 2009, 2010 11 Elasticity, Flexibility, Management
  • 12. 12/7/2010 Confidential ©Porticor Thank You! Questions ?