SlideShare uma empresa Scribd logo
1 de 22
VCU Cybersecurity Fair Security in the Cloud Presented By:   Bryan Miller
Speaker Introduction What is the “Cloud” SaaS, PaaS, IaaS Public, Private and Hybrid Clouds Vendor Offerings Security Issues Wrap-Up 10/4/2011 Security in the Cloud 1 Agenda
B.S. Information Systems – VCU M.S. Computer Science – VCU President, Syrinx Technologies, 2007 Member of ISSA, HIMSS, InfraGard, ILTA Adjunct Faculty Member in Information Systems and Computer Science @ VCU, FTEMS lecturer CISSP, former Cisco CCIE in R/S Published author Over 25 years in the industry 10/4/2011 Security in the Cloud 2 Speaker Introduction
Convenient, on-demand network access to a shared pool of configurable resources:  Networks Servers Storage Applications Services  Rapid and minimal management effort or service provider interaction (based on NIST) 10/4/2011 Security in the Cloud 3 What is the “Cloud”?
NIST SP 800-145 definition: "Cloud computing is a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction. This cloud model promotes availability and is composed of five essential characteristics, three service models, and four deployment models.” 10/4/2011 Security in the Cloud 4 The NIST Standard for Cloud Computing
IDC – 2008 Security was the factor most likely to discourage the use of cloud computing? 72% of small (<100 employees) businesses 63% of mid-sized (100-199 employees) businesses IDC – 2011 50% of small businesses 47% of mid-sized businesses 10/4/2011 Security in the Cloud 5 First, Some Statistics
By 2014, the conservative estimate is that the “cloud business” will be approximately $100 billion dollars. By 2012, approximately 20% of businesses will not own any IT resources. 10/4/2011 Security in the Cloud 6
10/4/2011 Security in the Cloud 7
10/4/2011 Security in the Cloud 8
Applications delivered over the web Vendor handles software updates and patches Application Programming Interfaces (APIs) integration among S/W ,[object Object]
Salesforce.com
Office 36510/4/2011 Security in the Cloud 9 Software as a Service (SaaS)
Architectural tools to build systems Platform managed and monitored Web-based user interface tools ,[object Object]
Google Apps Engine
Microsoft Azure
Force.com10/4/2011 Security in the Cloud 10 Platform as a Service (PaaS)
Outsource storage, hardware, servers Typically charged on a per-use basis Hardware can be multi-tenant or dedicated ,[object Object]
Amazon Web Services (AWS)
OpenStack
Dell10/4/2011 Security in the Cloud 11 Infrastructure as a Service (IaaS)
Public Shared resources, usually multi-tenant Off-premise Private Resources dedicated to client On-premise or off-premise Hybrid Combination of on-premise and cloud-based services Growing in popularity as companies slowly transition applications 10/4/2011 Security in the Cloud 12 Public vs. Private vs. Hybrid Cloud Models
Amazon Web Services EC2 - IaaS Data centers (Regions) Virginia Northern California Ireland Singapore Tokyo Within each region, services are divided into Availability Zones AWS GovCloud – Accessible by US only, allows government agencies to store data  Currently used by NASA 10/4/2011 Security in the Cloud 13 Vendor Offerings

Mais conteúdo relacionado

Mais procurados

Trust in the mobile internet of things
Trust in the mobile internet of thingsTrust in the mobile internet of things
Trust in the mobile internet of thingsAntonio Gonzalo
 
Xylos Clients Day - Public cloud and security go hand in hand, if you approac...
Xylos Clients Day - Public cloud and security go hand in hand, if you approac...Xylos Clients Day - Public cloud and security go hand in hand, if you approac...
Xylos Clients Day - Public cloud and security go hand in hand, if you approac...Karim Vaes
 
Securing the internet of things: The conversation you need to have with your CEO
Securing the internet of things: The conversation you need to have with your CEOSecuring the internet of things: The conversation you need to have with your CEO
Securing the internet of things: The conversation you need to have with your CEOThe Economist Media Businesses
 
Countering Cybersecurity Risk in Today's IoT World
Countering Cybersecurity Risk in Today's IoT WorldCountering Cybersecurity Risk in Today's IoT World
Countering Cybersecurity Risk in Today's IoT WorldBrad Nicholas
 
Odoo iot box integration
Odoo iot box integrationOdoo iot box integration
Odoo iot box integrationCeline George
 
An Internet of Things Reference Architecture
An Internet of Things Reference Architecture An Internet of Things Reference Architecture
An Internet of Things Reference Architecture Symantec
 
Open source IoT
Open source IoTOpen source IoT
Open source IoTIoT613
 
TrendMicro: 從雲到端,打造安全的物聯網
TrendMicro: 從雲到端,打造安全的物聯網TrendMicro: 從雲到端,打造安全的物聯網
TrendMicro: 從雲到端,打造安全的物聯網Amazon Web Services
 
Delve Labs - Upcoming Security Challenges for the Internet of Things
Delve Labs - Upcoming Security Challenges for the Internet of ThingsDelve Labs - Upcoming Security Challenges for the Internet of Things
Delve Labs - Upcoming Security Challenges for the Internet of ThingsFrederic Roy-Gobeil, CPA, CGA, M.Tax.
 
Secure your Future with IoT Security Testing | Application Security
Secure your Future with IoT Security Testing | Application SecuritySecure your Future with IoT Security Testing | Application Security
Secure your Future with IoT Security Testing | Application SecurityCigniti Technologies Ltd
 
Watson IoT @Ryerson University - IEEE Chapter
Watson IoT  @Ryerson University - IEEE Chapter  Watson IoT  @Ryerson University - IEEE Chapter
Watson IoT @Ryerson University - IEEE Chapter Markus Van Kempen
 
Internet of things - The Present & The Future
Internet of things - The Present & The FutureInternet of things - The Present & The Future
Internet of things - The Present & The Futureiotians
 
Technology Trends & The Impact for Software Industry
Technology Trends & The Impact for Software IndustryTechnology Trends & The Impact for Software Industry
Technology Trends & The Impact for Software IndustrySoftware Park Thailand
 
INFORMATION SECURITY IN CLOUD COMPUTING
INFORMATION SECURITY IN CLOUD COMPUTINGINFORMATION SECURITY IN CLOUD COMPUTING
INFORMATION SECURITY IN CLOUD COMPUTINGijitcs
 
ICS_WhitePaper_Darktrace
ICS_WhitePaper_DarktraceICS_WhitePaper_Darktrace
ICS_WhitePaper_DarktraceAustin Eppstein
 
Architecting IoT by Mathew - Alcatel Lucent @ MIMOS IoT TWG Day1
Architecting IoT by Mathew - Alcatel Lucent @ MIMOS IoT TWG Day1Architecting IoT by Mathew - Alcatel Lucent @ MIMOS IoT TWG Day1
Architecting IoT by Mathew - Alcatel Lucent @ MIMOS IoT TWG Day1usman sarwar
 

Mais procurados (20)

Trust in the mobile internet of things
Trust in the mobile internet of thingsTrust in the mobile internet of things
Trust in the mobile internet of things
 
IoT in industry
IoT in industryIoT in industry
IoT in industry
 
IoT ecosystem
IoT ecosystemIoT ecosystem
IoT ecosystem
 
Understanding IoT
Understanding IoTUnderstanding IoT
Understanding IoT
 
Xylos Clients Day - Public cloud and security go hand in hand, if you approac...
Xylos Clients Day - Public cloud and security go hand in hand, if you approac...Xylos Clients Day - Public cloud and security go hand in hand, if you approac...
Xylos Clients Day - Public cloud and security go hand in hand, if you approac...
 
Securing the internet of things: The conversation you need to have with your CEO
Securing the internet of things: The conversation you need to have with your CEOSecuring the internet of things: The conversation you need to have with your CEO
Securing the internet of things: The conversation you need to have with your CEO
 
Countering Cybersecurity Risk in Today's IoT World
Countering Cybersecurity Risk in Today's IoT WorldCountering Cybersecurity Risk in Today's IoT World
Countering Cybersecurity Risk in Today's IoT World
 
Odoo iot box integration
Odoo iot box integrationOdoo iot box integration
Odoo iot box integration
 
An Internet of Things Reference Architecture
An Internet of Things Reference Architecture An Internet of Things Reference Architecture
An Internet of Things Reference Architecture
 
Open source IoT
Open source IoTOpen source IoT
Open source IoT
 
TrendMicro: 從雲到端,打造安全的物聯網
TrendMicro: 從雲到端,打造安全的物聯網TrendMicro: 從雲到端,打造安全的物聯網
TrendMicro: 從雲到端,打造安全的物聯網
 
Delve Labs - Upcoming Security Challenges for the Internet of Things
Delve Labs - Upcoming Security Challenges for the Internet of ThingsDelve Labs - Upcoming Security Challenges for the Internet of Things
Delve Labs - Upcoming Security Challenges for the Internet of Things
 
Secure your Future with IoT Security Testing | Application Security
Secure your Future with IoT Security Testing | Application SecuritySecure your Future with IoT Security Testing | Application Security
Secure your Future with IoT Security Testing | Application Security
 
IBM Xforce Q4 2014
IBM Xforce Q4 2014IBM Xforce Q4 2014
IBM Xforce Q4 2014
 
Watson IoT @Ryerson University - IEEE Chapter
Watson IoT  @Ryerson University - IEEE Chapter  Watson IoT  @Ryerson University - IEEE Chapter
Watson IoT @Ryerson University - IEEE Chapter
 
Internet of things - The Present & The Future
Internet of things - The Present & The FutureInternet of things - The Present & The Future
Internet of things - The Present & The Future
 
Technology Trends & The Impact for Software Industry
Technology Trends & The Impact for Software IndustryTechnology Trends & The Impact for Software Industry
Technology Trends & The Impact for Software Industry
 
INFORMATION SECURITY IN CLOUD COMPUTING
INFORMATION SECURITY IN CLOUD COMPUTINGINFORMATION SECURITY IN CLOUD COMPUTING
INFORMATION SECURITY IN CLOUD COMPUTING
 
ICS_WhitePaper_Darktrace
ICS_WhitePaper_DarktraceICS_WhitePaper_Darktrace
ICS_WhitePaper_Darktrace
 
Architecting IoT by Mathew - Alcatel Lucent @ MIMOS IoT TWG Day1
Architecting IoT by Mathew - Alcatel Lucent @ MIMOS IoT TWG Day1Architecting IoT by Mathew - Alcatel Lucent @ MIMOS IoT TWG Day1
Architecting IoT by Mathew - Alcatel Lucent @ MIMOS IoT TWG Day1
 

Destaque

Fighting The Top 7 Threats to Cloud Cybersecurity
Fighting The Top 7 Threats to Cloud CybersecurityFighting The Top 7 Threats to Cloud Cybersecurity
Fighting The Top 7 Threats to Cloud CybersecurityDavid Zaizar
 
NIST Cloud Computing Reference Architecture
NIST Cloud Computing Reference ArchitectureNIST Cloud Computing Reference Architecture
NIST Cloud Computing Reference ArchitectureThanakrit Lersmethasakul
 
Cloud computing reference architecture from nist and ibm
Cloud computing reference architecture from nist and ibmCloud computing reference architecture from nist and ibm
Cloud computing reference architecture from nist and ibmRichard Kuo
 
Enterprise reference architecture v1.2
Enterprise reference architecture   v1.2Enterprise reference architecture   v1.2
Enterprise reference architecture v1.2Ahmed Fattah
 
Patterns for Cloud Computing
Patterns for Cloud ComputingPatterns for Cloud Computing
Patterns for Cloud ComputingSimon Guest
 
Bahasan 1 lingkup_alat_media_pendidikan
Bahasan 1 lingkup_alat_media_pendidikanBahasan 1 lingkup_alat_media_pendidikan
Bahasan 1 lingkup_alat_media_pendidikanmerysiswinda
 
Cybersecurity and Information Assurance - Cloud Computing
Cybersecurity and Information Assurance - Cloud ComputingCybersecurity and Information Assurance - Cloud Computing
Cybersecurity and Information Assurance - Cloud ComputingJoseph Pindar
 
Cloud security innovation - Cloud Security Alliance East Europe Congress 2013
Cloud security innovation  - Cloud Security Alliance East Europe Congress 2013Cloud security innovation  - Cloud Security Alliance East Europe Congress 2013
Cloud security innovation - Cloud Security Alliance East Europe Congress 2013Moshe Ferber
 
Enterprise reference architecture v1.1.ppt
Enterprise reference architecture   v1.1.pptEnterprise reference architecture   v1.1.ppt
Enterprise reference architecture v1.1.pptAhmed Fattah
 
Cloud security what to expect (introduction to cloud security)
Cloud security   what to expect (introduction to cloud security)Cloud security   what to expect (introduction to cloud security)
Cloud security what to expect (introduction to cloud security)Moshe Ferber
 
ACI's Global Encryption, Cloud & Cybersecurity Controls
ACI's Global Encryption, Cloud & Cybersecurity Controls ACI's Global Encryption, Cloud & Cybersecurity Controls
ACI's Global Encryption, Cloud & Cybersecurity Controls Dyan Cornacchio
 
Progress towards security in the Cloud-Héctor Sánchez, Microsoft
Progress towards security in the Cloud-Héctor Sánchez, MicrosoftProgress towards security in the Cloud-Héctor Sánchez, Microsoft
Progress towards security in the Cloud-Héctor Sánchez, MicrosoftMind the Byte
 
Cloud Computing Architecture
Cloud Computing Architecture Cloud Computing Architecture
Cloud Computing Architecture Vasu Jain
 
Enterprise Architecture Governance for an Enterprise Transformation Journey: ...
Enterprise Architecture Governance for an Enterprise Transformation Journey: ...Enterprise Architecture Governance for an Enterprise Transformation Journey: ...
Enterprise Architecture Governance for an Enterprise Transformation Journey: ...Marcelo Sávio
 
Embracing Cybersecurity on Cloud Computing
Embracing Cybersecurity on Cloud ComputingEmbracing Cybersecurity on Cloud Computing
Embracing Cybersecurity on Cloud ComputingPECB
 
Trends in recent technology
Trends in recent technologyTrends in recent technology
Trends in recent technologysai krishna
 
Protecting Yourself from the Heartbleed Bug
Protecting Yourself from the Heartbleed BugProtecting Yourself from the Heartbleed Bug
Protecting Yourself from the Heartbleed BugDavid Sweigert
 

Destaque (20)

Fighting The Top 7 Threats to Cloud Cybersecurity
Fighting The Top 7 Threats to Cloud CybersecurityFighting The Top 7 Threats to Cloud Cybersecurity
Fighting The Top 7 Threats to Cloud Cybersecurity
 
Cloud Reference Model
Cloud Reference ModelCloud Reference Model
Cloud Reference Model
 
NIST Cloud Computing Reference Architecture
NIST Cloud Computing Reference ArchitectureNIST Cloud Computing Reference Architecture
NIST Cloud Computing Reference Architecture
 
Cloud computing reference architecture from nist and ibm
Cloud computing reference architecture from nist and ibmCloud computing reference architecture from nist and ibm
Cloud computing reference architecture from nist and ibm
 
Enterprise reference architecture v1.2
Enterprise reference architecture   v1.2Enterprise reference architecture   v1.2
Enterprise reference architecture v1.2
 
Patterns for Cloud Computing
Patterns for Cloud ComputingPatterns for Cloud Computing
Patterns for Cloud Computing
 
Trends in Cybersecurity
Trends in CybersecurityTrends in Cybersecurity
Trends in Cybersecurity
 
Bahasan 1 lingkup_alat_media_pendidikan
Bahasan 1 lingkup_alat_media_pendidikanBahasan 1 lingkup_alat_media_pendidikan
Bahasan 1 lingkup_alat_media_pendidikan
 
Mind the Byte
Mind the ByteMind the Byte
Mind the Byte
 
Cybersecurity and Information Assurance - Cloud Computing
Cybersecurity and Information Assurance - Cloud ComputingCybersecurity and Information Assurance - Cloud Computing
Cybersecurity and Information Assurance - Cloud Computing
 
Cloud security innovation - Cloud Security Alliance East Europe Congress 2013
Cloud security innovation  - Cloud Security Alliance East Europe Congress 2013Cloud security innovation  - Cloud Security Alliance East Europe Congress 2013
Cloud security innovation - Cloud Security Alliance East Europe Congress 2013
 
Enterprise reference architecture v1.1.ppt
Enterprise reference architecture   v1.1.pptEnterprise reference architecture   v1.1.ppt
Enterprise reference architecture v1.1.ppt
 
Cloud security what to expect (introduction to cloud security)
Cloud security   what to expect (introduction to cloud security)Cloud security   what to expect (introduction to cloud security)
Cloud security what to expect (introduction to cloud security)
 
ACI's Global Encryption, Cloud & Cybersecurity Controls
ACI's Global Encryption, Cloud & Cybersecurity Controls ACI's Global Encryption, Cloud & Cybersecurity Controls
ACI's Global Encryption, Cloud & Cybersecurity Controls
 
Progress towards security in the Cloud-Héctor Sánchez, Microsoft
Progress towards security in the Cloud-Héctor Sánchez, MicrosoftProgress towards security in the Cloud-Héctor Sánchez, Microsoft
Progress towards security in the Cloud-Héctor Sánchez, Microsoft
 
Cloud Computing Architecture
Cloud Computing Architecture Cloud Computing Architecture
Cloud Computing Architecture
 
Enterprise Architecture Governance for an Enterprise Transformation Journey: ...
Enterprise Architecture Governance for an Enterprise Transformation Journey: ...Enterprise Architecture Governance for an Enterprise Transformation Journey: ...
Enterprise Architecture Governance for an Enterprise Transformation Journey: ...
 
Embracing Cybersecurity on Cloud Computing
Embracing Cybersecurity on Cloud ComputingEmbracing Cybersecurity on Cloud Computing
Embracing Cybersecurity on Cloud Computing
 
Trends in recent technology
Trends in recent technologyTrends in recent technology
Trends in recent technology
 
Protecting Yourself from the Heartbleed Bug
Protecting Yourself from the Heartbleed BugProtecting Yourself from the Heartbleed Bug
Protecting Yourself from the Heartbleed Bug
 

Semelhante a VCU Cybersecurity Fair: Security in the Cloud

Cloud Computing Introduction
Cloud Computing IntroductionCloud Computing Introduction
Cloud Computing IntroductionCraig Dickson
 
Best example of Cloud computing is my academic digital library.
Best example of Cloud computing is my academic digital library.Best example of Cloud computing is my academic digital library.
Best example of Cloud computing is my academic digital library.Aman Pandey
 
Enabling Innovative Business Opportunities Through Secure Cloud Adoption - Se...
Enabling Innovative Business Opportunities Through Secure Cloud Adoption - Se...Enabling Innovative Business Opportunities Through Secure Cloud Adoption - Se...
Enabling Innovative Business Opportunities Through Secure Cloud Adoption - Se...Amazon Web Services
 
(Pdf) yury chemerkin deep_intel_2013
(Pdf) yury chemerkin deep_intel_2013(Pdf) yury chemerkin deep_intel_2013
(Pdf) yury chemerkin deep_intel_2013STO STRATEGY
 
(Pdf) yury chemerkin intelligence_sec_2013
(Pdf) yury chemerkin intelligence_sec_2013(Pdf) yury chemerkin intelligence_sec_2013
(Pdf) yury chemerkin intelligence_sec_2013STO STRATEGY
 
(Pdf) yury chemerkin ita_2013
(Pdf) yury chemerkin ita_2013(Pdf) yury chemerkin ita_2013
(Pdf) yury chemerkin ita_2013STO STRATEGY
 
A Detailed Analysis of the Issues and Solutions for Securing Data in Cloud
A Detailed Analysis of the Issues and Solutions for Securing Data  in CloudA Detailed Analysis of the Issues and Solutions for Securing Data  in Cloud
A Detailed Analysis of the Issues and Solutions for Securing Data in CloudIOSR Journals
 
On technical security issues in cloud computing
On technical security issues in cloud computingOn technical security issues in cloud computing
On technical security issues in cloud computingsashi799
 
Cloud Storage
Cloud StorageCloud Storage
Cloud StorageVishalR50
 
Ericsson Cloud Computing
Ericsson Cloud Computing Ericsson Cloud Computing
Ericsson Cloud Computing scotgardner
 
Why Cloud Management Makes Sense
Why Cloud Management Makes SenseWhy Cloud Management Makes Sense
Why Cloud Management Makes SenseRightScale
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud ComputingKelvin Lam
 
Cloud Computing: Overview and Examples
Cloud Computing: Overview and ExamplesCloud Computing: Overview and Examples
Cloud Computing: Overview and ExamplesEueung Mulyana
 
Cloud Computing Risks N Controls V1.0
Cloud Computing Risks N Controls V1.0Cloud Computing Risks N Controls V1.0
Cloud Computing Risks N Controls V1.0itilsme
 
Cloud Computing 2010 - EMC - Bruno Melandri
Cloud Computing 2010 - EMC - Bruno MelandriCloud Computing 2010 - EMC - Bruno Melandri
Cloud Computing 2010 - EMC - Bruno MelandriManuela Moroncini
 
Visibility from user to infrastructure on AWS
Visibility from user to infrastructure on AWSVisibility from user to infrastructure on AWS
Visibility from user to infrastructure on AWSAppDynamics
 
Cloud Computing and Security - by KLC Consulting
Cloud Computing and Security - by KLC ConsultingCloud Computing and Security - by KLC Consulting
Cloud Computing and Security - by KLC Consultingkylelai
 

Semelhante a VCU Cybersecurity Fair: Security in the Cloud (20)

Cloud Computing Introduction
Cloud Computing IntroductionCloud Computing Introduction
Cloud Computing Introduction
 
Best example of Cloud computing is my academic digital library.
Best example of Cloud computing is my academic digital library.Best example of Cloud computing is my academic digital library.
Best example of Cloud computing is my academic digital library.
 
Enabling Innovative Business Opportunities Through Secure Cloud Adoption - Se...
Enabling Innovative Business Opportunities Through Secure Cloud Adoption - Se...Enabling Innovative Business Opportunities Through Secure Cloud Adoption - Se...
Enabling Innovative Business Opportunities Through Secure Cloud Adoption - Se...
 
(Pdf) yury chemerkin deep_intel_2013
(Pdf) yury chemerkin deep_intel_2013(Pdf) yury chemerkin deep_intel_2013
(Pdf) yury chemerkin deep_intel_2013
 
(Pdf) yury chemerkin intelligence_sec_2013
(Pdf) yury chemerkin intelligence_sec_2013(Pdf) yury chemerkin intelligence_sec_2013
(Pdf) yury chemerkin intelligence_sec_2013
 
(Pdf) yury chemerkin ita_2013
(Pdf) yury chemerkin ita_2013(Pdf) yury chemerkin ita_2013
(Pdf) yury chemerkin ita_2013
 
A Detailed Analysis of the Issues and Solutions for Securing Data in Cloud
A Detailed Analysis of the Issues and Solutions for Securing Data  in CloudA Detailed Analysis of the Issues and Solutions for Securing Data  in Cloud
A Detailed Analysis of the Issues and Solutions for Securing Data in Cloud
 
On technical security issues in cloud computing
On technical security issues in cloud computingOn technical security issues in cloud computing
On technical security issues in cloud computing
 
Cloud Storage
Cloud StorageCloud Storage
Cloud Storage
 
Ericsson Cloud Computing
Ericsson Cloud Computing Ericsson Cloud Computing
Ericsson Cloud Computing
 
Why Cloud Management Makes Sense
Why Cloud Management Makes SenseWhy Cloud Management Makes Sense
Why Cloud Management Makes Sense
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Cloud Computing: Overview and Examples
Cloud Computing: Overview and ExamplesCloud Computing: Overview and Examples
Cloud Computing: Overview and Examples
 
Cloud Computing Risks N Controls V1.0
Cloud Computing Risks N Controls V1.0Cloud Computing Risks N Controls V1.0
Cloud Computing Risks N Controls V1.0
 
Cloud Computing 2010 - EMC - Bruno Melandri
Cloud Computing 2010 - EMC - Bruno MelandriCloud Computing 2010 - EMC - Bruno Melandri
Cloud Computing 2010 - EMC - Bruno Melandri
 
Visibility from user to infrastructure on AWS
Visibility from user to infrastructure on AWSVisibility from user to infrastructure on AWS
Visibility from user to infrastructure on AWS
 
Cloud Computing and Security - by KLC Consulting
Cloud Computing and Security - by KLC ConsultingCloud Computing and Security - by KLC Consulting
Cloud Computing and Security - by KLC Consulting
 
cc.pptx
cc.pptxcc.pptx
cc.pptx
 
cloud computing models
cloud computing modelscloud computing models
cloud computing models
 
Final
FinalFinal
Final
 

Mais de syrinxtech

Low Hanging Fruit from Penetration Testing
Low Hanging Fruit from Penetration TestingLow Hanging Fruit from Penetration Testing
Low Hanging Fruit from Penetration Testingsyrinxtech
 
Remote Access Security
Remote Access SecurityRemote Access Security
Remote Access Securitysyrinxtech
 
Virtualization Security
Virtualization SecurityVirtualization Security
Virtualization Securitysyrinxtech
 
Focus Your Business
Focus Your BusinessFocus Your Business
Focus Your Businesssyrinxtech
 
Penetration Testing as an auditing tool
Penetration Testing as an auditing toolPenetration Testing as an auditing tool
Penetration Testing as an auditing toolsyrinxtech
 
Web Database Server Best Practices
Web Database Server Best PracticesWeb Database Server Best Practices
Web Database Server Best Practicessyrinxtech
 

Mais de syrinxtech (7)

Low Hanging Fruit from Penetration Testing
Low Hanging Fruit from Penetration TestingLow Hanging Fruit from Penetration Testing
Low Hanging Fruit from Penetration Testing
 
Virtual CSO
Virtual CSOVirtual CSO
Virtual CSO
 
Remote Access Security
Remote Access SecurityRemote Access Security
Remote Access Security
 
Virtualization Security
Virtualization SecurityVirtualization Security
Virtualization Security
 
Focus Your Business
Focus Your BusinessFocus Your Business
Focus Your Business
 
Penetration Testing as an auditing tool
Penetration Testing as an auditing toolPenetration Testing as an auditing tool
Penetration Testing as an auditing tool
 
Web Database Server Best Practices
Web Database Server Best PracticesWeb Database Server Best Practices
Web Database Server Best Practices
 

VCU Cybersecurity Fair: Security in the Cloud

  • 1. VCU Cybersecurity Fair Security in the Cloud Presented By: Bryan Miller
  • 2. Speaker Introduction What is the “Cloud” SaaS, PaaS, IaaS Public, Private and Hybrid Clouds Vendor Offerings Security Issues Wrap-Up 10/4/2011 Security in the Cloud 1 Agenda
  • 3. B.S. Information Systems – VCU M.S. Computer Science – VCU President, Syrinx Technologies, 2007 Member of ISSA, HIMSS, InfraGard, ILTA Adjunct Faculty Member in Information Systems and Computer Science @ VCU, FTEMS lecturer CISSP, former Cisco CCIE in R/S Published author Over 25 years in the industry 10/4/2011 Security in the Cloud 2 Speaker Introduction
  • 4. Convenient, on-demand network access to a shared pool of configurable resources: Networks Servers Storage Applications Services Rapid and minimal management effort or service provider interaction (based on NIST) 10/4/2011 Security in the Cloud 3 What is the “Cloud”?
  • 5. NIST SP 800-145 definition: "Cloud computing is a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction. This cloud model promotes availability and is composed of five essential characteristics, three service models, and four deployment models.” 10/4/2011 Security in the Cloud 4 The NIST Standard for Cloud Computing
  • 6. IDC – 2008 Security was the factor most likely to discourage the use of cloud computing? 72% of small (<100 employees) businesses 63% of mid-sized (100-199 employees) businesses IDC – 2011 50% of small businesses 47% of mid-sized businesses 10/4/2011 Security in the Cloud 5 First, Some Statistics
  • 7. By 2014, the conservative estimate is that the “cloud business” will be approximately $100 billion dollars. By 2012, approximately 20% of businesses will not own any IT resources. 10/4/2011 Security in the Cloud 6
  • 8. 10/4/2011 Security in the Cloud 7
  • 9. 10/4/2011 Security in the Cloud 8
  • 10.
  • 12. Office 36510/4/2011 Security in the Cloud 9 Software as a Service (SaaS)
  • 13.
  • 16. Force.com10/4/2011 Security in the Cloud 10 Platform as a Service (PaaS)
  • 17.
  • 20. Dell10/4/2011 Security in the Cloud 11 Infrastructure as a Service (IaaS)
  • 21. Public Shared resources, usually multi-tenant Off-premise Private Resources dedicated to client On-premise or off-premise Hybrid Combination of on-premise and cloud-based services Growing in popularity as companies slowly transition applications 10/4/2011 Security in the Cloud 12 Public vs. Private vs. Hybrid Cloud Models
  • 22. Amazon Web Services EC2 - IaaS Data centers (Regions) Virginia Northern California Ireland Singapore Tokyo Within each region, services are divided into Availability Zones AWS GovCloud – Accessible by US only, allows government agencies to store data Currently used by NASA 10/4/2011 Security in the Cloud 13 Vendor Offerings
  • 23. Microsoft Azure – PaaS Windows Azure – OS providing scalable compute and storage facilities Windows SQL Azure – Cloud-based, scalable version of SQL Server OpenStack - IaaS Open source software Over 100 partner companies Rackspace Dell Citrix Cisco 10/4/2011 Security in the Cloud 14
  • 24. Dell – IaaS Built on VMware technology (vCloud family of products) Adding support for Azure and OpenStack 3 models: Pay as you go Reserved Dedicated Apple iCloud - SaaS Stores music, photos, applications, calendars, documents 5 GB of free storage 10/4/2011 Security in the Cloud 15
  • 25. Take into account the following: Response times Data corruption Service degradation/outage Data breach Backup/Restore issues What happens if the company closes or is sold Regulatory issues HIPAA – do you have a BA agreement in place? PCI – are you sure your provider is compliant? 10/4/2011 Security in the Cloud 16 What about SLAs?
  • 26. Bloomberg News reported that hackers used AWS’s EC2 to launch an attack against Sony’s PlayStation Network. The attack reportedly compromised the personal accounts of more than 100 million Sony customers. Prices for EC2 range from 3 cents to $2.48 an hour for users on the East coast of the U.S. Dual GPU setups are currently priced at $2.10/hr. Network World magazine reported that Exploits as a Service (EaaS) is becoming a profitable business. 10/4/2011 Security in the Cloud 17 Security Issues
  • 27. Definition: The point at which cloud computing causes a catastrophic failure. Intellectual property is the lifeblood of an organization. IP can get lost in the shuffle of VM sprawl, data sprawl, technology sprawl or the speed at which business is performed. How can things go wrong? A salesperson mails himself a report to Gmail for home access. A customer service team uses Dropbox1 to transfer client files. A PM is frustrated by IT policies and stands up a free server in the Amazon EC2 cloud 1 June 2011: Passwords optional for 4 hours, approximately 100 accounts were affected 10/4/2011 Security in the Cloud 18 Cloudpocalypse
  • 28. Amazon EC2 Outages July, 2008 Affected multiple Availability Zones Affected US and EU April, 2011 Affected Reddit, Foursquare, Quora Elastic Book Store went offline (provides mountable disk volumes to EC2) 3 days of outage for some users Why? During maintenance the data traffic was moved to a secondary, low-capacity network instead of the proper backup networks August, 2011 Why: Lightning strike in Dublin, Ireland Knocked European cloud services offline for 2 days Affected Netflix, Quora, Foursquare 10/4/2011 Security in the Cloud 19 When the Cloud Dissipates
  • 29. Gmail Outages 2008: July 16 – “long outage” August 6 – up to 15 hours August 11 – 2 hours August 15 – up to 24 hours October 16 – 30 hours 2009: February 24 – 2 hours September 1 – 2 hours 2011: February 27 – several hours August 8 – several hours 10/4/2011 Security in the Cloud 20
  • 30. Decide if the cloud is appropriate for the given business model Choose the vendor and precisely define the SLA Test thoroughly before moving into production Migrate slowly and carefully watch the metrics Make sure the users/clients are happy Routinely test the backup and restore process Don’t forget about DR and BCP 10/4/2011 Security in the Cloud 21 Wrap-Up