SlideShare uma empresa Scribd logo
1 de 29
cloud security webinar Jean-François Audenard – Cloud Security Advisor November 10, 2011
our agenda ,[object Object],[object Object],[object Object],[object Object]
context
our customers are targets CISCO – Global Threat Report – 2Q2011 © Paty Wingrove - Fotolia.com
Cloud concentrate everything ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],© boulevard - Fotolia.com
threats follows the data enterprise Internal network/IT Cloud Services Providers (CSP) threats / attackers threats
expectations
Cloud security is a must have
an expectation AND a business accelerator ,[object Object],highly secure cloud services : A business booster
compliance ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],© Scott Maxwell - Fotolia.com
question : what really changes with cloud ? ,[object Object],[object Object],[object Object],[object Object],[object Object],… the cloud’s economies of scale and flexibility are both a friend and a foe from a security point of  view. The massive concentrations of resources and data present a  more attractive target to attackers, but cloud-based defenses can be more robust, scalable  and cost-effective… Source: Enisa   answer : Cloud require security excellence & associated transparency
building & maintaining trust © Ben Chams - Fotolia.com
trust must be both external & internal internal stakeholders enterprise Cloud Executives Business Units Risk Managers, CISO Corporate IT Employees Cloud providers regulation/standards bodies ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],government specifics regulations standards
ensures data protection data classification & rights assignation private networks, encryption & strong authentication access control, rights management, encryption encryption, asset management crypto-shredding, secure deletion, content discovery create transfer store use archive destroy application security, logical controls, activity monitoring
appropriate level of engagement Cloud service provider management customer’s management responsibilities between parties datacenter servers & network Hypervisor (VMM) VM operating systems middleware applications IaaS PaaS SaaS increased criticality high-level of shared resources    increased responsibilities for the Cloud Service Provider
Cloud models & security public Cloud for enterprises community cloud private cloud hybrid cloud shared infrastructure dedicated infrastructure/staff/processes security is under customer’s control security controlled by the provider Internal risk & compliance still apply here !
implementation rules ,[object Object],[object Object],[object Object],[object Object],© lilufoto - Fotolia.com
Orange cloud services
our cloud security development lifecycle ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],S ecurity  R isk  A ssessment S ecurity  I mplementation  A ssistance S ecurity  R eviews S ecurity  P enetration  T ests T0 T3 T2 T-1 R isks  M itigation  P lan H igh- L evel  R isks  A ssessment Continuous improvement (PDCA) L egal  O bligations  A ssessment
portfolio Infrastructure as a Service Software as a Service IT infrastructure as a Service Security  as a Service Collaboration as a Service Real-Time applications as a Service Back-up and Storage  as a Service Flexible  Computing Premium Messaging Protection Suite Web Protection Suite Unified Collaboration (B2GaaS) Fleet Management Network IVR Business Store Flexible Computing Private 2011 H2 2010 now VPN Galerie IT Plan Contact Center  as a Service Cloud-ready Networking Business VPN Business  Acceleration Flexible Computing Business Telephony Hosted Exchange Orange API Private Applications Store Business Together with Microsoft – Online Services  Flexible SSL Smartphone management Application & Content  Delivery Networking
Web Protection Suite ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],powered by
flexible SSL ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Cloud & security are best friends © laurent hamels - Fotolia.com
Thank you !
Cloud vulnerabilities are an opportunity ? ? ? ? ? ? ? © Yuri Arcurs - Fotolia.com
Cloud specific vulnerabilities On-demand self-service Ubiquitous network access Resource polling Rapid elasticity Measured service NIST Virtualization Hyper-jacking VM-Escape VM sprawl VM Theft Direct vulnerabilities
Direct vulnerabilities ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Yes : Thanks to cloud-specific vulnerabilities On-demand self-service Ubiquitous network access Resource polling Rapid elasticity Measured service NIST Virtualization Hyper-jacking VM-Escape VM sprawl VM Theft Direct vulnerabilities Indirect vulnerabilities Inability to monitor traffic Limited network zoning Single point of failure Forbidden network vulns scans
Indirect vulnerabilities ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],© brodtcast - Fotolia.com

Mais conteúdo relacionado

Mais procurados

Vodafone - Agile Connectivity
Vodafone - Agile ConnectivityVodafone - Agile Connectivity
Vodafone - Agile ConnectivityVodafone UK
 
the new workspace: freedom to work whenever, wherever, on any device
the new workspace: freedom to work whenever, wherever, on any devicethe new workspace: freedom to work whenever, wherever, on any device
the new workspace: freedom to work whenever, wherever, on any deviceOrange Business Services
 
Orange Group Overview
Orange Group OverviewOrange Group Overview
Orange Group OverviewOsama Shawky
 
New Company Presentation 9 18 09
New Company Presentation 9 18 09New Company Presentation 9 18 09
New Company Presentation 9 18 09scharter
 
WBS Connect Company Presentation
WBS Connect Company PresentationWBS Connect Company Presentation
WBS Connect Company Presentationcummins1
 
Towards the extinction of mega data centres? To which extent should the Clou...
 Towards the extinction of mega data centres? To which extent should the Clou... Towards the extinction of mega data centres? To which extent should the Clou...
Towards the extinction of mega data centres? To which extent should the Clou...Thierry Coupaye
 
Orange Business Services: Cloud A Multinational B2B Perspective
Orange Business Services:  Cloud A Multinational B2B PerspectiveOrange Business Services:  Cloud A Multinational B2B Perspective
Orange Business Services: Cloud A Multinational B2B Perspectiveitnewsafrica
 
the age of cloud: private cloud, SaaS and the future in Asia Pacific
the age of cloud: private cloud, SaaS and the future in Asia Pacificthe age of cloud: private cloud, SaaS and the future in Asia Pacific
the age of cloud: private cloud, SaaS and the future in Asia PacificOrange Business Services
 
Cisco Mobility - IBM & IDC event
Cisco Mobility - IBM & IDC eventCisco Mobility - IBM & IDC event
Cisco Mobility - IBM & IDC eventMatteo Masi
 
SDN/NFV: Create a network that’s ahead of your business
SDN/NFV: Create a network that’s ahead of your businessSDN/NFV: Create a network that’s ahead of your business
SDN/NFV: Create a network that’s ahead of your businessOrange Business Services
 
DWS15 Connected Things Forum - Guest Keynote - Paul-Edouard LAUNAY - Jasper
DWS15 Connected Things Forum - Guest Keynote - Paul-Edouard LAUNAY - JasperDWS15 Connected Things Forum - Guest Keynote - Paul-Edouard LAUNAY - Jasper
DWS15 Connected Things Forum - Guest Keynote - Paul-Edouard LAUNAY - JasperIDATE DigiWorld
 
Are containers the future of it
Are containers the future of itAre containers the future of it
Are containers the future of itDaniel Chiossi
 
Industry's first ICT Converged Agile gateway for Enterprises
Industry's first ICT Converged Agile gateway for EnterprisesIndustry's first ICT Converged Agile gateway for Enterprises
Industry's first ICT Converged Agile gateway for EnterprisesHuawei Enterprise
 
Twtelecom Exec Overview3 Q09
Twtelecom Exec Overview3 Q09Twtelecom Exec Overview3 Q09
Twtelecom Exec Overview3 Q09meyersb1
 
[CompTIA] 4th Annual Trends in Cloud Computing - Full Report
[CompTIA] 4th Annual Trends in Cloud Computing - Full Report[CompTIA] 4th Annual Trends in Cloud Computing - Full Report
[CompTIA] 4th Annual Trends in Cloud Computing - Full ReportAssespro Nacional
 

Mais procurados (20)

Orange Business Live 2013 cloud breakout
Orange Business Live 2013 cloud breakoutOrange Business Live 2013 cloud breakout
Orange Business Live 2013 cloud breakout
 
Vodafone - Agile Connectivity
Vodafone - Agile ConnectivityVodafone - Agile Connectivity
Vodafone - Agile Connectivity
 
Vodafone cx
Vodafone cxVodafone cx
Vodafone cx
 
the new workspace: freedom to work whenever, wherever, on any device
the new workspace: freedom to work whenever, wherever, on any devicethe new workspace: freedom to work whenever, wherever, on any device
the new workspace: freedom to work whenever, wherever, on any device
 
Orange Group Overview
Orange Group OverviewOrange Group Overview
Orange Group Overview
 
New Company Presentation 9 18 09
New Company Presentation 9 18 09New Company Presentation 9 18 09
New Company Presentation 9 18 09
 
WBS Connect Company Presentation
WBS Connect Company PresentationWBS Connect Company Presentation
WBS Connect Company Presentation
 
Towards the extinction of mega data centres? To which extent should the Clou...
 Towards the extinction of mega data centres? To which extent should the Clou... Towards the extinction of mega data centres? To which extent should the Clou...
Towards the extinction of mega data centres? To which extent should the Clou...
 
Orange Business Services: Cloud A Multinational B2B Perspective
Orange Business Services:  Cloud A Multinational B2B PerspectiveOrange Business Services:  Cloud A Multinational B2B Perspective
Orange Business Services: Cloud A Multinational B2B Perspective
 
the age of cloud: private cloud, SaaS and the future in Asia Pacific
the age of cloud: private cloud, SaaS and the future in Asia Pacificthe age of cloud: private cloud, SaaS and the future in Asia Pacific
the age of cloud: private cloud, SaaS and the future in Asia Pacific
 
Cisco Mobility - IBM & IDC event
Cisco Mobility - IBM & IDC eventCisco Mobility - IBM & IDC event
Cisco Mobility - IBM & IDC event
 
Werkplek Van De Toekomst
Werkplek Van De ToekomstWerkplek Van De Toekomst
Werkplek Van De Toekomst
 
SDN/NFV: Create a network that’s ahead of your business
SDN/NFV: Create a network that’s ahead of your businessSDN/NFV: Create a network that’s ahead of your business
SDN/NFV: Create a network that’s ahead of your business
 
DWS15 Connected Things Forum - Guest Keynote - Paul-Edouard LAUNAY - Jasper
DWS15 Connected Things Forum - Guest Keynote - Paul-Edouard LAUNAY - JasperDWS15 Connected Things Forum - Guest Keynote - Paul-Edouard LAUNAY - Jasper
DWS15 Connected Things Forum - Guest Keynote - Paul-Edouard LAUNAY - Jasper
 
Are containers the future of it
Are containers the future of itAre containers the future of it
Are containers the future of it
 
Industry's first ICT Converged Agile gateway for Enterprises
Industry's first ICT Converged Agile gateway for EnterprisesIndustry's first ICT Converged Agile gateway for Enterprises
Industry's first ICT Converged Agile gateway for Enterprises
 
Twtelecom Exec Overview3 Q09
Twtelecom Exec Overview3 Q09Twtelecom Exec Overview3 Q09
Twtelecom Exec Overview3 Q09
 
IBB Energie AG
IBB Energie AGIBB Energie AG
IBB Energie AG
 
Schmitz Cargobull
Schmitz CargobullSchmitz Cargobull
Schmitz Cargobull
 
[CompTIA] 4th Annual Trends in Cloud Computing - Full Report
[CompTIA] 4th Annual Trends in Cloud Computing - Full Report[CompTIA] 4th Annual Trends in Cloud Computing - Full Report
[CompTIA] 4th Annual Trends in Cloud Computing - Full Report
 

Destaque

[FR] BYOD et sécurité des mobiles le temps d’un café preview
[FR] BYOD et sécurité des mobiles le temps d’un café preview[FR] BYOD et sécurité des mobiles le temps d’un café preview
[FR] BYOD et sécurité des mobiles le temps d’un café previewOrange Business Services
 
communications unifiées - orange business
communications unifiées - orange businesscommunications unifiées - orange business
communications unifiées - orange businessOrange Business Services
 
[FR] la normalisation du cloud en un éclair preview
[FR] la normalisation du cloud en un éclair preview[FR] la normalisation du cloud en un éclair preview
[FR] la normalisation du cloud en un éclair previewOrange Business Services
 
Solutions de collaboration à la demande: Business Together as a Service
Solutions de collaboration à la demande: Business Together as a ServiceSolutions de collaboration à la demande: Business Together as a Service
Solutions de collaboration à la demande: Business Together as a ServiceOrange Business Services
 
[infographic] multichannel CRM: going with the flow
[infographic] multichannel CRM: going with the flow[infographic] multichannel CRM: going with the flow
[infographic] multichannel CRM: going with the flowOrange Business Services
 
[infographic] high-growth markets: diversity in opportunity
[infographic] high-growth markets: diversity in opportunity[infographic] high-growth markets: diversity in opportunity
[infographic] high-growth markets: diversity in opportunityOrange Business Services
 
improving outcomes with connected healthcare
improving outcomes with connected healthcareimproving outcomes with connected healthcare
improving outcomes with connected healthcareOrange Business Services
 

Destaque (11)

le nouvel espace de travail
le nouvel espace de travaille nouvel espace de travail
le nouvel espace de travail
 
M2M is smart
M2M is smartM2M is smart
M2M is smart
 
[FR] BYOD et sécurité des mobiles le temps d’un café preview
[FR] BYOD et sécurité des mobiles le temps d’un café preview[FR] BYOD et sécurité des mobiles le temps d’un café preview
[FR] BYOD et sécurité des mobiles le temps d’un café preview
 
communications unifiées - orange business
communications unifiées - orange businesscommunications unifiées - orange business
communications unifiées - orange business
 
[FR] la normalisation du cloud en un éclair preview
[FR] la normalisation du cloud en un éclair preview[FR] la normalisation du cloud en un éclair preview
[FR] la normalisation du cloud en un éclair preview
 
Solutions de collaboration à la demande: Business Together as a Service
Solutions de collaboration à la demande: Business Together as a ServiceSolutions de collaboration à la demande: Business Together as a Service
Solutions de collaboration à la demande: Business Together as a Service
 
[infographic] multichannel CRM: going with the flow
[infographic] multichannel CRM: going with the flow[infographic] multichannel CRM: going with the flow
[infographic] multichannel CRM: going with the flow
 
[infographic] high-growth markets: diversity in opportunity
[infographic] high-growth markets: diversity in opportunity[infographic] high-growth markets: diversity in opportunity
[infographic] high-growth markets: diversity in opportunity
 
women and mobile - enriching lives
women and mobile - enriching liveswomen and mobile - enriching lives
women and mobile - enriching lives
 
improving outcomes with connected healthcare
improving outcomes with connected healthcareimproving outcomes with connected healthcare
improving outcomes with connected healthcare
 
Get well, stay well with m-health
Get well, stay well with m-healthGet well, stay well with m-health
Get well, stay well with m-health
 

Semelhante a Cloud Computing Security

Predicting The Future: Security and Compliance in the Cloud Age
Predicting The Future: Security and Compliance in the Cloud AgePredicting The Future: Security and Compliance in the Cloud Age
Predicting The Future: Security and Compliance in the Cloud AgeAlert Logic
 
Security in cloud computing kashyap kunal
Security in cloud computing  kashyap kunalSecurity in cloud computing  kashyap kunal
Security in cloud computing kashyap kunalKashyap Kunal
 
ShareResponsibilityModel.pptx
ShareResponsibilityModel.pptxShareResponsibilityModel.pptx
ShareResponsibilityModel.pptxBabatundeAbioye2
 
Cloud Application Security --Symantec
 Cloud Application Security --Symantec Cloud Application Security --Symantec
Cloud Application Security --SymantecAbhishek Sood
 
Legal And Regulatory Issues Cloud Computing...V2.0
Legal And Regulatory Issues Cloud Computing...V2.0Legal And Regulatory Issues Cloud Computing...V2.0
Legal And Regulatory Issues Cloud Computing...V2.0David Spinks
 
Get ahead of cloud network security trends and practices in 2020
Get ahead of cloud network security trends and practices in 2020Get ahead of cloud network security trends and practices in 2020
Get ahead of cloud network security trends and practices in 2020Cynthia Hsieh
 
Cloud Security - Types, Common Threats & Tips To Mitigate.pdf
Cloud Security - Types, Common Threats & Tips To Mitigate.pdfCloud Security - Types, Common Threats & Tips To Mitigate.pdf
Cloud Security - Types, Common Threats & Tips To Mitigate.pdfDataSpace Academy
 
The Cloud Crossover
The Cloud CrossoverThe Cloud Crossover
The Cloud CrossoverArmor
 
Cloud Computing Security Needs & Problems Alon Refaeli
Cloud Computing Security Needs & Problems   Alon RefaeliCloud Computing Security Needs & Problems   Alon Refaeli
Cloud Computing Security Needs & Problems Alon Refaelirefaeli
 
Cloud Security using NIST guidelines
Cloud Security using NIST guidelinesCloud Security using NIST guidelines
Cloud Security using NIST guidelinesSrishti Ahuja
 
Cloud Security using NIST guidelines
Cloud Security using NIST guidelinesCloud Security using NIST guidelines
Cloud Security using NIST guidelinesSrishti Ahuja
 
glenn_amblercloud_security_ncc_event_22-may-2012_v1 (9)
glenn_amblercloud_security_ncc_event_22-may-2012_v1 (9)glenn_amblercloud_security_ncc_event_22-may-2012_v1 (9)
glenn_amblercloud_security_ncc_event_22-may-2012_v1 (9)Glenn Ambler
 
ISACA Journal Publication - Does your Cloud have a Secure Lining? Shah Sheikh
ISACA Journal Publication - Does your Cloud have a Secure Lining? Shah SheikhISACA Journal Publication - Does your Cloud have a Secure Lining? Shah Sheikh
ISACA Journal Publication - Does your Cloud have a Secure Lining? Shah SheikhShah Sheikh
 
Forcepoint Corporate Presentation_Short.pptx
Forcepoint Corporate Presentation_Short.pptxForcepoint Corporate Presentation_Short.pptx
Forcepoint Corporate Presentation_Short.pptxcaesar92
 
IRJET- A Survey on SaaS-Attacks and Digital Forensic
IRJET-  	  A Survey on SaaS-Attacks and Digital ForensicIRJET-  	  A Survey on SaaS-Attacks and Digital Forensic
IRJET- A Survey on SaaS-Attacks and Digital ForensicIRJET Journal
 
Risk management for cloud computing hb final
Risk management for cloud computing hb finalRisk management for cloud computing hb final
Risk management for cloud computing hb finalChristophe Monnier
 
Accelerated Saa S Exec Briefing V2
Accelerated Saa S Exec Briefing V2Accelerated Saa S Exec Briefing V2
Accelerated Saa S Exec Briefing V2jeffirby
 

Semelhante a Cloud Computing Security (20)

Predicting The Future: Security and Compliance in the Cloud Age
Predicting The Future: Security and Compliance in the Cloud AgePredicting The Future: Security and Compliance in the Cloud Age
Predicting The Future: Security and Compliance in the Cloud Age
 
Security in cloud computing kashyap kunal
Security in cloud computing  kashyap kunalSecurity in cloud computing  kashyap kunal
Security in cloud computing kashyap kunal
 
ShareResponsibilityModel.pptx
ShareResponsibilityModel.pptxShareResponsibilityModel.pptx
ShareResponsibilityModel.pptx
 
Cloud Application Security --Symantec
 Cloud Application Security --Symantec Cloud Application Security --Symantec
Cloud Application Security --Symantec
 
Legal And Regulatory Issues Cloud Computing...V2.0
Legal And Regulatory Issues Cloud Computing...V2.0Legal And Regulatory Issues Cloud Computing...V2.0
Legal And Regulatory Issues Cloud Computing...V2.0
 
Get ahead of cloud network security trends and practices in 2020
Get ahead of cloud network security trends and practices in 2020Get ahead of cloud network security trends and practices in 2020
Get ahead of cloud network security trends and practices in 2020
 
Cloud Security - Types, Common Threats & Tips To Mitigate.pdf
Cloud Security - Types, Common Threats & Tips To Mitigate.pdfCloud Security - Types, Common Threats & Tips To Mitigate.pdf
Cloud Security - Types, Common Threats & Tips To Mitigate.pdf
 
The Cloud Crossover
The Cloud CrossoverThe Cloud Crossover
The Cloud Crossover
 
Cloud Computing Security Needs & Problems Alon Refaeli
Cloud Computing Security Needs & Problems   Alon RefaeliCloud Computing Security Needs & Problems   Alon Refaeli
Cloud Computing Security Needs & Problems Alon Refaeli
 
Cloud Security using NIST guidelines
Cloud Security using NIST guidelinesCloud Security using NIST guidelines
Cloud Security using NIST guidelines
 
Cloud Security using NIST guidelines
Cloud Security using NIST guidelinesCloud Security using NIST guidelines
Cloud Security using NIST guidelines
 
glenn_amblercloud_security_ncc_event_22-may-2012_v1 (9)
glenn_amblercloud_security_ncc_event_22-may-2012_v1 (9)glenn_amblercloud_security_ncc_event_22-may-2012_v1 (9)
glenn_amblercloud_security_ncc_event_22-may-2012_v1 (9)
 
Cloud services and it security
Cloud services and it securityCloud services and it security
Cloud services and it security
 
ISACA Journal Publication - Does your Cloud have a Secure Lining? Shah Sheikh
ISACA Journal Publication - Does your Cloud have a Secure Lining? Shah SheikhISACA Journal Publication - Does your Cloud have a Secure Lining? Shah Sheikh
ISACA Journal Publication - Does your Cloud have a Secure Lining? Shah Sheikh
 
Forcepoint Corporate Presentation_Short.pptx
Forcepoint Corporate Presentation_Short.pptxForcepoint Corporate Presentation_Short.pptx
Forcepoint Corporate Presentation_Short.pptx
 
CloudWALL Profile ENG
CloudWALL Profile ENGCloudWALL Profile ENG
CloudWALL Profile ENG
 
IRJET- A Survey on SaaS-Attacks and Digital Forensic
IRJET-  	  A Survey on SaaS-Attacks and Digital ForensicIRJET-  	  A Survey on SaaS-Attacks and Digital Forensic
IRJET- A Survey on SaaS-Attacks and Digital Forensic
 
Risk management for cloud computing hb final
Risk management for cloud computing hb finalRisk management for cloud computing hb final
Risk management for cloud computing hb final
 
SECURITY ISSUES IN CLOUD COMPUTING
SECURITY ISSUES IN CLOUD COMPUTINGSECURITY ISSUES IN CLOUD COMPUTING
SECURITY ISSUES IN CLOUD COMPUTING
 
Accelerated Saa S Exec Briefing V2
Accelerated Saa S Exec Briefing V2Accelerated Saa S Exec Briefing V2
Accelerated Saa S Exec Briefing V2
 

Mais de Orange Business Services

OT-IT convergence and IoT: innovate at scale and mitigate cyber risks
OT-IT convergence and IoT: innovate at scale and mitigate cyber risksOT-IT convergence and IoT: innovate at scale and mitigate cyber risks
OT-IT convergence and IoT: innovate at scale and mitigate cyber risksOrange Business Services
 
Asia-Pacific: smart mobility for the public sector with Orange
Asia-Pacific: smart mobility for the public sector with Orange Asia-Pacific: smart mobility for the public sector with Orange
Asia-Pacific: smart mobility for the public sector with Orange Orange Business Services
 
Driving Forward Digital Technology and the Automotive Industry in Asia-Pacific
Driving Forward Digital Technology and the Automotive Industry in Asia-PacificDriving Forward Digital Technology and the Automotive Industry in Asia-Pacific
Driving Forward Digital Technology and the Automotive Industry in Asia-PacificOrange Business Services
 
How to deliver faster AI insights while safeguarding data security and privacy?
How to deliver faster AI insights while safeguarding data security and privacy? How to deliver faster AI insights while safeguarding data security and privacy?
How to deliver faster AI insights while safeguarding data security and privacy? Orange Business Services
 
Building the connected Supply Chain – how digital is transforming Asia-Pacific
Building the connected Supply Chain – how digital is transforming Asia-PacificBuilding the connected Supply Chain – how digital is transforming Asia-Pacific
Building the connected Supply Chain – how digital is transforming Asia-PacificOrange Business Services
 
How digital is transforming financial services in Asia Pacific
How digital is transforming financial services in Asia Pacific How digital is transforming financial services in Asia Pacific
How digital is transforming financial services in Asia Pacific Orange Business Services
 
Digitally transforming the Asia Pacific building construction industry
Digitally transforming the Asia Pacific building construction industryDigitally transforming the Asia Pacific building construction industry
Digitally transforming the Asia Pacific building construction industryOrange Business Services
 
World café restitution atelier le manager digital 3.0 villageby-ca_12_07_2016
World café   restitution atelier le manager digital 3.0 villageby-ca_12_07_2016World café   restitution atelier le manager digital 3.0 villageby-ca_12_07_2016
World café restitution atelier le manager digital 3.0 villageby-ca_12_07_2016Orange Business Services
 
World café people and digital supports ppt interventions plénières villageby_...
World café people and digital supports ppt interventions plénières villageby_...World café people and digital supports ppt interventions plénières villageby_...
World café people and digital supports ppt interventions plénières villageby_...Orange Business Services
 
Skype Entreprise, tremplin de la transformation digitale ?
Skype Entreprise, tremplin de la transformation digitale ?Skype Entreprise, tremplin de la transformation digitale ?
Skype Entreprise, tremplin de la transformation digitale ?Orange Business Services
 
[FR] Cercle Premier RSE : COP 21, comment le digital peut aider ? #CercleRSE
[FR] Cercle Premier RSE : COP 21, comment le digital peut aider ? #CercleRSE[FR] Cercle Premier RSE : COP 21, comment le digital peut aider ? #CercleRSE
[FR] Cercle Premier RSE : COP 21, comment le digital peut aider ? #CercleRSEOrange Business Services
 
Internet des Objets et Big data pour les assurances : la révolution est en ma...
Internet des Objets et Big data pour les assurances : la révolution est en ma...Internet des Objets et Big data pour les assurances : la révolution est en ma...
Internet des Objets et Big data pour les assurances : la révolution est en ma...Orange Business Services
 
Digitally transforming transport and logistics
Digitally transforming transport and logisticsDigitally transforming transport and logistics
Digitally transforming transport and logisticsOrange Business Services
 
Smart cities - leading the way towards Digital India
Smart cities - leading the way towards Digital IndiaSmart cities - leading the way towards Digital India
Smart cities - leading the way towards Digital IndiaOrange Business Services
 
Digging deep - the digital transformation of mining
Digging deep - the digital transformation of miningDigging deep - the digital transformation of mining
Digging deep - the digital transformation of miningOrange Business Services
 
Retail therapy - the digital transformation of shopping
Retail therapy - the digital transformation of shoppingRetail therapy - the digital transformation of shopping
Retail therapy - the digital transformation of shoppingOrange Business Services
 
[infographie] Comment optimiser la gestion des déchets ?
[infographie] Comment optimiser la gestion des déchets ?[infographie] Comment optimiser la gestion des déchets ?
[infographie] Comment optimiser la gestion des déchets ?Orange Business Services
 
[infographie] une connectivité flexible grâce au réseau hybride
[infographie] une connectivité flexible grâce au réseau hybride[infographie] une connectivité flexible grâce au réseau hybride
[infographie] une connectivité flexible grâce au réseau hybrideOrange Business Services
 

Mais de Orange Business Services (20)

OT-IT convergence and IoT: innovate at scale and mitigate cyber risks
OT-IT convergence and IoT: innovate at scale and mitigate cyber risksOT-IT convergence and IoT: innovate at scale and mitigate cyber risks
OT-IT convergence and IoT: innovate at scale and mitigate cyber risks
 
Asia-Pacific: smart mobility for the public sector with Orange
Asia-Pacific: smart mobility for the public sector with Orange Asia-Pacific: smart mobility for the public sector with Orange
Asia-Pacific: smart mobility for the public sector with Orange
 
Driving Forward Digital Technology and the Automotive Industry in Asia-Pacific
Driving Forward Digital Technology and the Automotive Industry in Asia-PacificDriving Forward Digital Technology and the Automotive Industry in Asia-Pacific
Driving Forward Digital Technology and the Automotive Industry in Asia-Pacific
 
How to deliver faster AI insights while safeguarding data security and privacy?
How to deliver faster AI insights while safeguarding data security and privacy? How to deliver faster AI insights while safeguarding data security and privacy?
How to deliver faster AI insights while safeguarding data security and privacy?
 
Building the connected Supply Chain – how digital is transforming Asia-Pacific
Building the connected Supply Chain – how digital is transforming Asia-PacificBuilding the connected Supply Chain – how digital is transforming Asia-Pacific
Building the connected Supply Chain – how digital is transforming Asia-Pacific
 
How digital is transforming financial services in Asia Pacific
How digital is transforming financial services in Asia Pacific How digital is transforming financial services in Asia Pacific
How digital is transforming financial services in Asia Pacific
 
Digitally transforming the Asia Pacific building construction industry
Digitally transforming the Asia Pacific building construction industryDigitally transforming the Asia Pacific building construction industry
Digitally transforming the Asia Pacific building construction industry
 
World café restitution atelier le manager digital 3.0 villageby-ca_12_07_2016
World café   restitution atelier le manager digital 3.0 villageby-ca_12_07_2016World café   restitution atelier le manager digital 3.0 villageby-ca_12_07_2016
World café restitution atelier le manager digital 3.0 villageby-ca_12_07_2016
 
World café people and digital supports ppt interventions plénières villageby_...
World café people and digital supports ppt interventions plénières villageby_...World café people and digital supports ppt interventions plénières villageby_...
World café people and digital supports ppt interventions plénières villageby_...
 
Orange Data Centre and Cloud
Orange Data Centre and CloudOrange Data Centre and Cloud
Orange Data Centre and Cloud
 
Skype Entreprise, tremplin de la transformation digitale ?
Skype Entreprise, tremplin de la transformation digitale ?Skype Entreprise, tremplin de la transformation digitale ?
Skype Entreprise, tremplin de la transformation digitale ?
 
[FR] Cercle Premier RSE : COP 21, comment le digital peut aider ? #CercleRSE
[FR] Cercle Premier RSE : COP 21, comment le digital peut aider ? #CercleRSE[FR] Cercle Premier RSE : COP 21, comment le digital peut aider ? #CercleRSE
[FR] Cercle Premier RSE : COP 21, comment le digital peut aider ? #CercleRSE
 
Internet des Objets et Big data pour les assurances : la révolution est en ma...
Internet des Objets et Big data pour les assurances : la révolution est en ma...Internet des Objets et Big data pour les assurances : la révolution est en ma...
Internet des Objets et Big data pour les assurances : la révolution est en ma...
 
Digitally transforming transport and logistics
Digitally transforming transport and logisticsDigitally transforming transport and logistics
Digitally transforming transport and logistics
 
Smart cities - leading the way towards Digital India
Smart cities - leading the way towards Digital IndiaSmart cities - leading the way towards Digital India
Smart cities - leading the way towards Digital India
 
Digging deep - the digital transformation of mining
Digging deep - the digital transformation of miningDigging deep - the digital transformation of mining
Digging deep - the digital transformation of mining
 
Retail therapy - the digital transformation of shopping
Retail therapy - the digital transformation of shoppingRetail therapy - the digital transformation of shopping
Retail therapy - the digital transformation of shopping
 
[White Paper] Are containers the future ?
[White Paper] Are containers the future ?[White Paper] Are containers the future ?
[White Paper] Are containers the future ?
 
[infographie] Comment optimiser la gestion des déchets ?
[infographie] Comment optimiser la gestion des déchets ?[infographie] Comment optimiser la gestion des déchets ?
[infographie] Comment optimiser la gestion des déchets ?
 
[infographie] une connectivité flexible grâce au réseau hybride
[infographie] une connectivité flexible grâce au réseau hybride[infographie] une connectivité flexible grâce au réseau hybride
[infographie] une connectivité flexible grâce au réseau hybride
 

Último

TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdfChristopherTHyatt
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 

Último (20)

TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 

Cloud Computing Security

  • 1. cloud security webinar Jean-François Audenard – Cloud Security Advisor November 10, 2011
  • 2.
  • 4. our customers are targets CISCO – Global Threat Report – 2Q2011 © Paty Wingrove - Fotolia.com
  • 5.
  • 6. threats follows the data enterprise Internal network/IT Cloud Services Providers (CSP) threats / attackers threats
  • 8. Cloud security is a must have
  • 9.
  • 10.
  • 11.
  • 12. building & maintaining trust © Ben Chams - Fotolia.com
  • 13.
  • 14. ensures data protection data classification & rights assignation private networks, encryption & strong authentication access control, rights management, encryption encryption, asset management crypto-shredding, secure deletion, content discovery create transfer store use archive destroy application security, logical controls, activity monitoring
  • 15. appropriate level of engagement Cloud service provider management customer’s management responsibilities between parties datacenter servers & network Hypervisor (VMM) VM operating systems middleware applications IaaS PaaS SaaS increased criticality high-level of shared resources  increased responsibilities for the Cloud Service Provider
  • 16. Cloud models & security public Cloud for enterprises community cloud private cloud hybrid cloud shared infrastructure dedicated infrastructure/staff/processes security is under customer’s control security controlled by the provider Internal risk & compliance still apply here !
  • 17.
  • 19.
  • 20. portfolio Infrastructure as a Service Software as a Service IT infrastructure as a Service Security as a Service Collaboration as a Service Real-Time applications as a Service Back-up and Storage as a Service Flexible Computing Premium Messaging Protection Suite Web Protection Suite Unified Collaboration (B2GaaS) Fleet Management Network IVR Business Store Flexible Computing Private 2011 H2 2010 now VPN Galerie IT Plan Contact Center as a Service Cloud-ready Networking Business VPN Business Acceleration Flexible Computing Business Telephony Hosted Exchange Orange API Private Applications Store Business Together with Microsoft – Online Services Flexible SSL Smartphone management Application & Content Delivery Networking
  • 21.
  • 22.
  • 23. Cloud & security are best friends © laurent hamels - Fotolia.com
  • 25. Cloud vulnerabilities are an opportunity ? ? ? ? ? ? ? © Yuri Arcurs - Fotolia.com
  • 26. Cloud specific vulnerabilities On-demand self-service Ubiquitous network access Resource polling Rapid elasticity Measured service NIST Virtualization Hyper-jacking VM-Escape VM sprawl VM Theft Direct vulnerabilities
  • 27.
  • 28. Yes : Thanks to cloud-specific vulnerabilities On-demand self-service Ubiquitous network access Resource polling Rapid elasticity Measured service NIST Virtualization Hyper-jacking VM-Escape VM sprawl VM Theft Direct vulnerabilities Indirect vulnerabilities Inability to monitor traffic Limited network zoning Single point of failure Forbidden network vulns scans
  • 29.

Notas do Editor

  1. CISCO – Global Threat Report – 2Q2011 http://www.cisco.com/en/US/prod/collateral/vpndevc/cisco_global_threat_report_2q2011.pdf DUQU http://www.schneier.com/blog/archives/2011/10/new_malware_duq.html http://www.symantec.com/connect/w32_duqu_precursor_next_stuxnet http://www.symantec.com/content/en/us/enterprise/media/security_response/whitepapers/w32_duqu_the_precursor_to_the_next_stuxnet_research.pdf NITRO http://www.symantec.com/content/en/us/enterprise/media/security_response/whitepapers/the_nitro_attacks.pdf
  2. La menace suit à la trace les données, quelque soit leur localisation, dans le cloud ou sur les périphériques mobiles….
  3. TODO : Titre à retravailler/préciser….
  4. presentation title
  5. Exemple : SecuityInTTM pour les prohets de conception de service Exemple : Un qui n’a pas de SecuerityInttM TODO: Enlever slides « Recommamdations » et le
  6. presentation title