SlideShare uma empresa Scribd logo
1 de 32
Cloud Security
Major Hayden, Rackspace
Why are we here today?
Cloud Security // ISACA San Antonio 2013-09-24 2
Who am I?
 Chief Security Architect at Rackspace
 Red Hat Certified Architect and MySQL DBA
 Five years of cloud operations experience
 Integrated Slicehost with Rackspace
 Launched Rackspace’s Cloud Servers product based on
Slicehost technology
 Launched Rackspace’s Open Cloud Servers powered by
OpenStack
Cloud Security // ISACA San Antonio 2013-09-24 3
Today’s big three
1. An understandable and repeatable definition of cloud
really does exist (and I’ll help you learn it)
2. There are different cloud deployment strategies and you
can secure each of them
3. Cloud hosting risks are very similar to the risks from
other IT hosting methods
Cloud Security // ISACA San Antonio 2013-09-24 4
What is cloud hosting?
Cloud Security // ISACA San Antonio 2013-09-24 5
Cloud hosting is a shift from
managing computers
to utilizing
computing resources
Cloud Security // ISACA San Antonio 2013-09-24 6
Cloud Security // ISACA San Antonio 2013-09-24 7
Cloud Security // ISACA San Antonio 2013-09-24 8
Colocation Dedicated Managed Cloud
Cloud Security // ISACA San Antonio 2013-09-24 9
Colocation Dedicated Managed Cloud
Cloud Security // ISACA San Antonio 2013-09-24 10
Colocation Dedicated Managed Cloud
Cloud Security // ISACA San Antonio 2013-09-24 11
Colocation Dedicated Managed Cloud
Key points
 Resources are always available
 Pay for what you use
 Fewer fixed costs, more variable costs
 Maintain business focus
Cloud Security // ISACA San Antonio 2013-09-24 12
Cloud hosting
brings new challenges
Cloud Security // ISACA San Antonio 2013-09-24 13
Homes vs. Apartments
Cloud Security // ISACA San Antonio 2013-09-24 14
Flickr: atelier_tee Flickr: oldtasty
Key points
 Can’t choose your neighbors
 Fluctuating performance
 Stay within the confines of the system
 Service providers can touch your data*
Cloud Security // ISACA San Antonio 2013-09-24 15
Cattle vs. Pets
(Credit goes to Gavin McCance at CERN for this analogy)
Cloud Security // ISACA San Antonio 2013-09-24 16
Key points
 Rely on automation
 Use configuration management
 Build in redundancy based on business needs
Cloud Security // ISACA San Antonio 2013-09-24 17
Cloud types:
Public, Private, and Hybrid
Cloud Security // ISACA San Antonio 2013-09-24 18
Benefits
 Public: easily expandable and cheap
 Private: host with provider or host internally,
fewer noisy neighbor issues, compliance is easier
 Hybrid: helpful for bridging into cloud, allows for
the workloads to run where they run best
Cloud Security // ISACA San Antonio 2013-09-24 19
Let’s go through
your questions
Cloud Security // ISACA San Antonio 2013-09-24 20
What due diligence should
a company perform when
selecting cloud services?
Cloud Security // ISACA San Antonio 2013-09-24 21
Due diligence
 Easy answer: Assess a cloud provider just as you
would any other provider of IT services
 Look for business practice and security maturity
 Test the provider thoroughly ahead of time
 Monitor the provider’s actions closely around
outages or when receiving support
Cloud Security // ISACA San Antonio 2013-09-24 22
What are some
good contractual
agreement clauses?
Cloud Security // ISACA San Antonio 2013-09-24 23
Contractual agreements
 Confidentiality and security requirements
 Encryption standards*
 Service description and SLA’s
 Indemnification
Cloud Security // ISACA San Antonio 2013-09-24 24
What are the risks
if the company
owns the servers?
Cloud Security // ISACA San Antonio 2013-09-24 25
Company-owned server risks
 Similar to self-hosted or vendor-hosted IT
services on dedicated equipment
 IT staff that maintain the servers will have some
level of access to virtual machine data
Cloud Security // ISACA San Antonio 2013-09-24 26
Does the internet-facing
nature of public cloud
create additional risks?
Cloud Security // ISACA San Antonio 2013-09-24 27
Public cloud networking risks
 About the same as internet-facing dedicated
hardware
 Some public clouds may have hardware
networking devices such as firewalls or load
balancers
 Other providers might provide a shared firewall
or load balancer environment to use
Cloud Security // ISACA San Antonio 2013-09-24 28
How do I securely store
data in cloud services?
Cloud Security // ISACA San Antonio 2013-09-24 29
Storing data in cloud
 Your data is never fully safe in any storage
 Understand your most probable threats first
 Make your data less useful to others
 Encryption with digital signatures
 Sharding
 Tokenization (can help with data transport laws)
 Hardware Security Module (HSM)
Cloud Security // ISACA San Antonio 2013-09-24 30
Thanks for inviting me!
Q&A?
Cloud Security // ISACA San Antonio 2013-09-24 31
Have more questions later?
major.hayden@rackspace.com
http://major.io/
Cloud Security
Major Hayden, Rackspace

Mais conteúdo relacionado

Mais procurados

A Secure Searchable Encryption Framework for Privacy-Critical Cloud Storage S...
A Secure Searchable Encryption Framework for Privacy-Critical Cloud Storage S...A Secure Searchable Encryption Framework for Privacy-Critical Cloud Storage S...
A Secure Searchable Encryption Framework for Privacy-Critical Cloud Storage S...JAYAPRAKASH JPINFOTECH
 
A Secure Searchable Encryption Framework for Privacy-Critical Cloud Storage S...
A Secure Searchable Encryption Framework for Privacy-Critical Cloud Storage S...A Secure Searchable Encryption Framework for Privacy-Critical Cloud Storage S...
A Secure Searchable Encryption Framework for Privacy-Critical Cloud Storage S...JAYAPRAKASH JPINFOTECH
 
Cisco Connect 2018 Thailand - Next generation hyperconverged infrastructure-s...
Cisco Connect 2018 Thailand - Next generation hyperconverged infrastructure-s...Cisco Connect 2018 Thailand - Next generation hyperconverged infrastructure-s...
Cisco Connect 2018 Thailand - Next generation hyperconverged infrastructure-s...NetworkCollaborators
 
Cisco Connect 2018 Indonesia - Building a secure data center
Cisco Connect 2018 Indonesia - Building a secure data center Cisco Connect 2018 Indonesia - Building a secure data center
Cisco Connect 2018 Indonesia - Building a secure data center NetworkCollaborators
 
Safe Swiss Cloud: Swiss Enterprise Cloud since 2012
Safe Swiss Cloud: Swiss Enterprise Cloud since 2012Safe Swiss Cloud: Swiss Enterprise Cloud since 2012
Safe Swiss Cloud: Swiss Enterprise Cloud since 2012Safe Swiss Cloud
 
vArmour - Securing the Modern Data Centre
vArmour - Securing the Modern Data CentrevArmour - Securing the Modern Data Centre
vArmour - Securing the Modern Data CentreInfront
 
Chris Swan's Cloud World Forum 2015 Presentation: Reperimiterisation in the C...
Chris Swan's Cloud World Forum 2015 Presentation: Reperimiterisation in the C...Chris Swan's Cloud World Forum 2015 Presentation: Reperimiterisation in the C...
Chris Swan's Cloud World Forum 2015 Presentation: Reperimiterisation in the C...Cohesive Networks
 
Securing the modern data centre
Securing the modern data centreSecuring the modern data centre
Securing the modern data centreInfront
 
Automate compliance with cloud guard dome9
Automate compliance with cloud guard dome9Automate compliance with cloud guard dome9
Automate compliance with cloud guard dome9John Varghese
 
Cisco Powered Overview
Cisco Powered OverviewCisco Powered Overview
Cisco Powered OverviewCisco Powered
 
Portuguese Cloud Computing Architects - 2nd Meeting
Portuguese Cloud Computing Architects - 2nd MeetingPortuguese Cloud Computing Architects - 2nd Meeting
Portuguese Cloud Computing Architects - 2nd MeetingVitor Domingos
 
Business Cloud Adoption models in Canada
Business Cloud Adoption models in CanadaBusiness Cloud Adoption models in Canada
Business Cloud Adoption models in CanadaCisco Canada
 
CIS13: IDaaS. The Now Big Thing
CIS13: IDaaS. The Now Big ThingCIS13: IDaaS. The Now Big Thing
CIS13: IDaaS. The Now Big ThingCloudIDSummit
 
OpenStack Benelux Conference 2014 | Openstack Iaas and the Future of Applicat...
OpenStack Benelux Conference 2014 | Openstack Iaas and the Future of Applicat...OpenStack Benelux Conference 2014 | Openstack Iaas and the Future of Applicat...
OpenStack Benelux Conference 2014 | Openstack Iaas and the Future of Applicat...Guston Remie
 

Mais procurados (18)

A Secure Searchable Encryption Framework for Privacy-Critical Cloud Storage S...
A Secure Searchable Encryption Framework for Privacy-Critical Cloud Storage S...A Secure Searchable Encryption Framework for Privacy-Critical Cloud Storage S...
A Secure Searchable Encryption Framework for Privacy-Critical Cloud Storage S...
 
A Secure Searchable Encryption Framework for Privacy-Critical Cloud Storage S...
A Secure Searchable Encryption Framework for Privacy-Critical Cloud Storage S...A Secure Searchable Encryption Framework for Privacy-Critical Cloud Storage S...
A Secure Searchable Encryption Framework for Privacy-Critical Cloud Storage S...
 
Cisco Connect 2018 Thailand - Next generation hyperconverged infrastructure-s...
Cisco Connect 2018 Thailand - Next generation hyperconverged infrastructure-s...Cisco Connect 2018 Thailand - Next generation hyperconverged infrastructure-s...
Cisco Connect 2018 Thailand - Next generation hyperconverged infrastructure-s...
 
In Cloud We Trust
In Cloud We TrustIn Cloud We Trust
In Cloud We Trust
 
Dome9 Public Cloud Security
Dome9 Public Cloud SecurityDome9 Public Cloud Security
Dome9 Public Cloud Security
 
Cisco Connect 2018 Indonesia - Building a secure data center
Cisco Connect 2018 Indonesia - Building a secure data center Cisco Connect 2018 Indonesia - Building a secure data center
Cisco Connect 2018 Indonesia - Building a secure data center
 
Cloud security
Cloud securityCloud security
Cloud security
 
Safe Swiss Cloud: Swiss Enterprise Cloud since 2012
Safe Swiss Cloud: Swiss Enterprise Cloud since 2012Safe Swiss Cloud: Swiss Enterprise Cloud since 2012
Safe Swiss Cloud: Swiss Enterprise Cloud since 2012
 
vArmour - Securing the Modern Data Centre
vArmour - Securing the Modern Data CentrevArmour - Securing the Modern Data Centre
vArmour - Securing the Modern Data Centre
 
Chris Swan's Cloud World Forum 2015 Presentation: Reperimiterisation in the C...
Chris Swan's Cloud World Forum 2015 Presentation: Reperimiterisation in the C...Chris Swan's Cloud World Forum 2015 Presentation: Reperimiterisation in the C...
Chris Swan's Cloud World Forum 2015 Presentation: Reperimiterisation in the C...
 
Securing the modern data centre
Securing the modern data centreSecuring the modern data centre
Securing the modern data centre
 
Automate compliance with cloud guard dome9
Automate compliance with cloud guard dome9Automate compliance with cloud guard dome9
Automate compliance with cloud guard dome9
 
Cisco Powered Overview
Cisco Powered OverviewCisco Powered Overview
Cisco Powered Overview
 
Portuguese Cloud Computing Architects - 2nd Meeting
Portuguese Cloud Computing Architects - 2nd MeetingPortuguese Cloud Computing Architects - 2nd Meeting
Portuguese Cloud Computing Architects - 2nd Meeting
 
Business Cloud Adoption models in Canada
Business Cloud Adoption models in CanadaBusiness Cloud Adoption models in Canada
Business Cloud Adoption models in Canada
 
Zabbix at Netco (Tobias van Hoogen / 12-02-2015)
Zabbix at Netco (Tobias van Hoogen / 12-02-2015)Zabbix at Netco (Tobias van Hoogen / 12-02-2015)
Zabbix at Netco (Tobias van Hoogen / 12-02-2015)
 
CIS13: IDaaS. The Now Big Thing
CIS13: IDaaS. The Now Big ThingCIS13: IDaaS. The Now Big Thing
CIS13: IDaaS. The Now Big Thing
 
OpenStack Benelux Conference 2014 | Openstack Iaas and the Future of Applicat...
OpenStack Benelux Conference 2014 | Openstack Iaas and the Future of Applicat...OpenStack Benelux Conference 2014 | Openstack Iaas and the Future of Applicat...
OpenStack Benelux Conference 2014 | Openstack Iaas and the Future of Applicat...
 

Semelhante a ISACA Cloud Security Presentation 2013-09-24

cloud Raid
cloud Raidcloud Raid
cloud Raidgsmenon1
 
Keys to success and security in the cloud
Keys to success and security in the cloudKeys to success and security in the cloud
Keys to success and security in the cloudScalar Decisions
 
Keys-to-Success-and-Security-in-the-Cloud
Keys-to-Success-and-Security-in-the-CloudKeys-to-Success-and-Security-in-the-Cloud
Keys-to-Success-and-Security-in-the-Cloudpatmisasi
 
(Pdf) yury chemerkin _i-society_2013
(Pdf) yury chemerkin _i-society_2013(Pdf) yury chemerkin _i-society_2013
(Pdf) yury chemerkin _i-society_2013STO STRATEGY
 
Security Threat Solution over Single Cloud To Multi-Cloud Using DepSky Model
Security Threat Solution over Single Cloud To Multi-Cloud Using DepSky ModelSecurity Threat Solution over Single Cloud To Multi-Cloud Using DepSky Model
Security Threat Solution over Single Cloud To Multi-Cloud Using DepSky ModelIOSR Journals
 
Lss implementing cyber security in the cloud, and from the cloud-feb14
Lss implementing cyber security in the cloud, and from the cloud-feb14Lss implementing cyber security in the cloud, and from the cloud-feb14
Lss implementing cyber security in the cloud, and from the cloud-feb14L S Subramanian
 
A Comparative Review on Data Security Challenges in Cloud Computing
A Comparative Review on Data Security Challenges in Cloud ComputingA Comparative Review on Data Security Challenges in Cloud Computing
A Comparative Review on Data Security Challenges in Cloud ComputingIRJET Journal
 
Effectively and Securely Using the Cloud Computing Paradigm
Effectively and Securely Using the Cloud Computing ParadigmEffectively and Securely Using the Cloud Computing Paradigm
Effectively and Securely Using the Cloud Computing Paradigmfanc1985
 
Issues in cloud computing
Issues in cloud computingIssues in cloud computing
Issues in cloud computingronak patel
 
Security of Cloud Computing Survey
Security of Cloud Computing SurveySecurity of Cloud Computing Survey
Security of Cloud Computing SurveyLubna_Alhenaki
 
(Pdf) yury chemerkin _i-society-2013 proceedings
(Pdf) yury chemerkin _i-society-2013 proceedings(Pdf) yury chemerkin _i-society-2013 proceedings
(Pdf) yury chemerkin _i-society-2013 proceedingsSTO STRATEGY
 
AWS Cloud Security From the Point of View of the Compliance
AWS Cloud Security From the Point of View of the ComplianceAWS Cloud Security From the Point of View of the Compliance
AWS Cloud Security From the Point of View of the ComplianceYury Chemerkin
 
A Secure Framework for Cloud Computing With Multi-cloud Service Providers
A Secure Framework for Cloud Computing With Multi-cloud Service ProvidersA Secure Framework for Cloud Computing With Multi-cloud Service Providers
A Secure Framework for Cloud Computing With Multi-cloud Service Providersiosrjce
 
Cloud Security using NIST guidelines
Cloud Security using NIST guidelinesCloud Security using NIST guidelines
Cloud Security using NIST guidelinesSrishti Ahuja
 
Cloud Security using NIST guidelines
Cloud Security using NIST guidelinesCloud Security using NIST guidelines
Cloud Security using NIST guidelinesSrishti Ahuja
 

Semelhante a ISACA Cloud Security Presentation 2013-09-24 (20)

cloud Raid
cloud Raidcloud Raid
cloud Raid
 
Keys to success and security in the cloud
Keys to success and security in the cloudKeys to success and security in the cloud
Keys to success and security in the cloud
 
Keys-to-Success-and-Security-in-the-Cloud
Keys-to-Success-and-Security-in-the-CloudKeys-to-Success-and-Security-in-the-Cloud
Keys-to-Success-and-Security-in-the-Cloud
 
cloud computing.pdf
cloud computing.pdfcloud computing.pdf
cloud computing.pdf
 
(Pdf) yury chemerkin _i-society_2013
(Pdf) yury chemerkin _i-society_2013(Pdf) yury chemerkin _i-society_2013
(Pdf) yury chemerkin _i-society_2013
 
Cloud security
Cloud security Cloud security
Cloud security
 
Security Threat Solution over Single Cloud To Multi-Cloud Using DepSky Model
Security Threat Solution over Single Cloud To Multi-Cloud Using DepSky ModelSecurity Threat Solution over Single Cloud To Multi-Cloud Using DepSky Model
Security Threat Solution over Single Cloud To Multi-Cloud Using DepSky Model
 
Cloud security
Cloud securityCloud security
Cloud security
 
Lss implementing cyber security in the cloud, and from the cloud-feb14
Lss implementing cyber security in the cloud, and from the cloud-feb14Lss implementing cyber security in the cloud, and from the cloud-feb14
Lss implementing cyber security in the cloud, and from the cloud-feb14
 
A Comparative Review on Data Security Challenges in Cloud Computing
A Comparative Review on Data Security Challenges in Cloud ComputingA Comparative Review on Data Security Challenges in Cloud Computing
A Comparative Review on Data Security Challenges in Cloud Computing
 
Effectively and Securely Using the Cloud Computing Paradigm
Effectively and Securely Using the Cloud Computing ParadigmEffectively and Securely Using the Cloud Computing Paradigm
Effectively and Securely Using the Cloud Computing Paradigm
 
Issues in cloud computing
Issues in cloud computingIssues in cloud computing
Issues in cloud computing
 
Security of Cloud Computing Survey
Security of Cloud Computing SurveySecurity of Cloud Computing Survey
Security of Cloud Computing Survey
 
(Pdf) yury chemerkin _i-society-2013 proceedings
(Pdf) yury chemerkin _i-society-2013 proceedings(Pdf) yury chemerkin _i-society-2013 proceedings
(Pdf) yury chemerkin _i-society-2013 proceedings
 
AWS Cloud Security From the Point of View of the Compliance
AWS Cloud Security From the Point of View of the ComplianceAWS Cloud Security From the Point of View of the Compliance
AWS Cloud Security From the Point of View of the Compliance
 
I017225966
I017225966I017225966
I017225966
 
A Secure Framework for Cloud Computing With Multi-cloud Service Providers
A Secure Framework for Cloud Computing With Multi-cloud Service ProvidersA Secure Framework for Cloud Computing With Multi-cloud Service Providers
A Secure Framework for Cloud Computing With Multi-cloud Service Providers
 
Cloud Security using NIST guidelines
Cloud Security using NIST guidelinesCloud Security using NIST guidelines
Cloud Security using NIST guidelines
 
Cloud Security using NIST guidelines
Cloud Security using NIST guidelinesCloud Security using NIST guidelines
Cloud Security using NIST guidelines
 
UNIT -V.docx
UNIT -V.docxUNIT -V.docx
UNIT -V.docx
 

Mais de Major Hayden

Continuous Kernel Integration
Continuous Kernel IntegrationContinuous Kernel Integration
Continuous Kernel IntegrationMajor Hayden
 
I was too burned out to name this talk
I was too burned out to name this talkI was too burned out to name this talk
I was too burned out to name this talkMajor Hayden
 
Cookies for kernel developers
Cookies for kernel developersCookies for kernel developers
Cookies for kernel developersMajor Hayden
 
Deploying Kubernetes without scaring off your security team - KubeCon 2017
Deploying Kubernetes without scaring off your security team - KubeCon 2017Deploying Kubernetes without scaring off your security team - KubeCon 2017
Deploying Kubernetes without scaring off your security team - KubeCon 2017Major Hayden
 
Securing OpenStack and Beyond with Ansible
Securing OpenStack and Beyond with AnsibleSecuring OpenStack and Beyond with Ansible
Securing OpenStack and Beyond with AnsibleMajor Hayden
 
Grow your community: Inspire an Impostor
Grow your community: Inspire an ImpostorGrow your community: Inspire an Impostor
Grow your community: Inspire an ImpostorMajor Hayden
 
Holistic Security for OpenStack Clouds
Holistic Security for OpenStack CloudsHolistic Security for OpenStack Clouds
Holistic Security for OpenStack CloudsMajor Hayden
 
When flexibility met simplicity: the friendship of OpenStack and Ansible
When flexibility met simplicity: the friendship of OpenStack and AnsibleWhen flexibility met simplicity: the friendship of OpenStack and Ansible
When flexibility met simplicity: the friendship of OpenStack and AnsibleMajor Hayden
 
Flexible, simple deployments with OpenStack-Ansible
Flexible, simple deployments with OpenStack-AnsibleFlexible, simple deployments with OpenStack-Ansible
Flexible, simple deployments with OpenStack-AnsibleMajor Hayden
 
Automated Security Hardening with OpenStack-Ansible
Automated Security Hardening with OpenStack-AnsibleAutomated Security Hardening with OpenStack-Ansible
Automated Security Hardening with OpenStack-AnsibleMajor Hayden
 
Taming the Technical Talk - OWASP San Antonio
Taming the Technical Talk - OWASP San AntonioTaming the Technical Talk - OWASP San Antonio
Taming the Technical Talk - OWASP San AntonioMajor Hayden
 
OpenStack-Ansible Security
OpenStack-Ansible SecurityOpenStack-Ansible Security
OpenStack-Ansible SecurityMajor Hayden
 
Taming the Technical Talk
Taming the Technical TalkTaming the Technical Talk
Taming the Technical TalkMajor Hayden
 
The New Normal - Rackspace Solve 2015
The New Normal - Rackspace Solve 2015The New Normal - Rackspace Solve 2015
The New Normal - Rackspace Solve 2015Major Hayden
 
Five things I learned about information security
Five things I learned about information securityFive things I learned about information security
Five things I learned about information securityMajor Hayden
 
Be an inspiration, not an impostor (Texas Linux Fest 2015)
Be an inspiration, not an impostor (Texas Linux Fest 2015)Be an inspiration, not an impostor (Texas Linux Fest 2015)
Be an inspiration, not an impostor (Texas Linux Fest 2015)Major Hayden
 
Be an inspiration, not an impostor (Fedora Flock 2015)
Be an inspiration, not an impostor (Fedora Flock 2015)Be an inspiration, not an impostor (Fedora Flock 2015)
Be an inspiration, not an impostor (Fedora Flock 2015)Major Hayden
 
The New Normal: Managing the constant stream of new vulnerabilities
The New Normal: Managing the constant stream of new vulnerabilitiesThe New Normal: Managing the constant stream of new vulnerabilities
The New Normal: Managing the constant stream of new vulnerabilitiesMajor Hayden
 
Cloud Data Security
Cloud Data SecurityCloud Data Security
Cloud Data SecurityMajor Hayden
 

Mais de Major Hayden (19)

Continuous Kernel Integration
Continuous Kernel IntegrationContinuous Kernel Integration
Continuous Kernel Integration
 
I was too burned out to name this talk
I was too burned out to name this talkI was too burned out to name this talk
I was too burned out to name this talk
 
Cookies for kernel developers
Cookies for kernel developersCookies for kernel developers
Cookies for kernel developers
 
Deploying Kubernetes without scaring off your security team - KubeCon 2017
Deploying Kubernetes without scaring off your security team - KubeCon 2017Deploying Kubernetes without scaring off your security team - KubeCon 2017
Deploying Kubernetes without scaring off your security team - KubeCon 2017
 
Securing OpenStack and Beyond with Ansible
Securing OpenStack and Beyond with AnsibleSecuring OpenStack and Beyond with Ansible
Securing OpenStack and Beyond with Ansible
 
Grow your community: Inspire an Impostor
Grow your community: Inspire an ImpostorGrow your community: Inspire an Impostor
Grow your community: Inspire an Impostor
 
Holistic Security for OpenStack Clouds
Holistic Security for OpenStack CloudsHolistic Security for OpenStack Clouds
Holistic Security for OpenStack Clouds
 
When flexibility met simplicity: the friendship of OpenStack and Ansible
When flexibility met simplicity: the friendship of OpenStack and AnsibleWhen flexibility met simplicity: the friendship of OpenStack and Ansible
When flexibility met simplicity: the friendship of OpenStack and Ansible
 
Flexible, simple deployments with OpenStack-Ansible
Flexible, simple deployments with OpenStack-AnsibleFlexible, simple deployments with OpenStack-Ansible
Flexible, simple deployments with OpenStack-Ansible
 
Automated Security Hardening with OpenStack-Ansible
Automated Security Hardening with OpenStack-AnsibleAutomated Security Hardening with OpenStack-Ansible
Automated Security Hardening with OpenStack-Ansible
 
Taming the Technical Talk - OWASP San Antonio
Taming the Technical Talk - OWASP San AntonioTaming the Technical Talk - OWASP San Antonio
Taming the Technical Talk - OWASP San Antonio
 
OpenStack-Ansible Security
OpenStack-Ansible SecurityOpenStack-Ansible Security
OpenStack-Ansible Security
 
Taming the Technical Talk
Taming the Technical TalkTaming the Technical Talk
Taming the Technical Talk
 
The New Normal - Rackspace Solve 2015
The New Normal - Rackspace Solve 2015The New Normal - Rackspace Solve 2015
The New Normal - Rackspace Solve 2015
 
Five things I learned about information security
Five things I learned about information securityFive things I learned about information security
Five things I learned about information security
 
Be an inspiration, not an impostor (Texas Linux Fest 2015)
Be an inspiration, not an impostor (Texas Linux Fest 2015)Be an inspiration, not an impostor (Texas Linux Fest 2015)
Be an inspiration, not an impostor (Texas Linux Fest 2015)
 
Be an inspiration, not an impostor (Fedora Flock 2015)
Be an inspiration, not an impostor (Fedora Flock 2015)Be an inspiration, not an impostor (Fedora Flock 2015)
Be an inspiration, not an impostor (Fedora Flock 2015)
 
The New Normal: Managing the constant stream of new vulnerabilities
The New Normal: Managing the constant stream of new vulnerabilitiesThe New Normal: Managing the constant stream of new vulnerabilities
The New Normal: Managing the constant stream of new vulnerabilities
 
Cloud Data Security
Cloud Data SecurityCloud Data Security
Cloud Data Security
 

Último

Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 

Último (20)

Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 

ISACA Cloud Security Presentation 2013-09-24

  • 2. Why are we here today? Cloud Security // ISACA San Antonio 2013-09-24 2
  • 3. Who am I?  Chief Security Architect at Rackspace  Red Hat Certified Architect and MySQL DBA  Five years of cloud operations experience  Integrated Slicehost with Rackspace  Launched Rackspace’s Cloud Servers product based on Slicehost technology  Launched Rackspace’s Open Cloud Servers powered by OpenStack Cloud Security // ISACA San Antonio 2013-09-24 3
  • 4. Today’s big three 1. An understandable and repeatable definition of cloud really does exist (and I’ll help you learn it) 2. There are different cloud deployment strategies and you can secure each of them 3. Cloud hosting risks are very similar to the risks from other IT hosting methods Cloud Security // ISACA San Antonio 2013-09-24 4
  • 5. What is cloud hosting? Cloud Security // ISACA San Antonio 2013-09-24 5
  • 6. Cloud hosting is a shift from managing computers to utilizing computing resources Cloud Security // ISACA San Antonio 2013-09-24 6
  • 7. Cloud Security // ISACA San Antonio 2013-09-24 7
  • 8. Cloud Security // ISACA San Antonio 2013-09-24 8 Colocation Dedicated Managed Cloud
  • 9. Cloud Security // ISACA San Antonio 2013-09-24 9 Colocation Dedicated Managed Cloud
  • 10. Cloud Security // ISACA San Antonio 2013-09-24 10 Colocation Dedicated Managed Cloud
  • 11. Cloud Security // ISACA San Antonio 2013-09-24 11 Colocation Dedicated Managed Cloud
  • 12. Key points  Resources are always available  Pay for what you use  Fewer fixed costs, more variable costs  Maintain business focus Cloud Security // ISACA San Antonio 2013-09-24 12
  • 13. Cloud hosting brings new challenges Cloud Security // ISACA San Antonio 2013-09-24 13
  • 14. Homes vs. Apartments Cloud Security // ISACA San Antonio 2013-09-24 14 Flickr: atelier_tee Flickr: oldtasty
  • 15. Key points  Can’t choose your neighbors  Fluctuating performance  Stay within the confines of the system  Service providers can touch your data* Cloud Security // ISACA San Antonio 2013-09-24 15
  • 16. Cattle vs. Pets (Credit goes to Gavin McCance at CERN for this analogy) Cloud Security // ISACA San Antonio 2013-09-24 16
  • 17. Key points  Rely on automation  Use configuration management  Build in redundancy based on business needs Cloud Security // ISACA San Antonio 2013-09-24 17
  • 18. Cloud types: Public, Private, and Hybrid Cloud Security // ISACA San Antonio 2013-09-24 18
  • 19. Benefits  Public: easily expandable and cheap  Private: host with provider or host internally, fewer noisy neighbor issues, compliance is easier  Hybrid: helpful for bridging into cloud, allows for the workloads to run where they run best Cloud Security // ISACA San Antonio 2013-09-24 19
  • 20. Let’s go through your questions Cloud Security // ISACA San Antonio 2013-09-24 20
  • 21. What due diligence should a company perform when selecting cloud services? Cloud Security // ISACA San Antonio 2013-09-24 21
  • 22. Due diligence  Easy answer: Assess a cloud provider just as you would any other provider of IT services  Look for business practice and security maturity  Test the provider thoroughly ahead of time  Monitor the provider’s actions closely around outages or when receiving support Cloud Security // ISACA San Antonio 2013-09-24 22
  • 23. What are some good contractual agreement clauses? Cloud Security // ISACA San Antonio 2013-09-24 23
  • 24. Contractual agreements  Confidentiality and security requirements  Encryption standards*  Service description and SLA’s  Indemnification Cloud Security // ISACA San Antonio 2013-09-24 24
  • 25. What are the risks if the company owns the servers? Cloud Security // ISACA San Antonio 2013-09-24 25
  • 26. Company-owned server risks  Similar to self-hosted or vendor-hosted IT services on dedicated equipment  IT staff that maintain the servers will have some level of access to virtual machine data Cloud Security // ISACA San Antonio 2013-09-24 26
  • 27. Does the internet-facing nature of public cloud create additional risks? Cloud Security // ISACA San Antonio 2013-09-24 27
  • 28. Public cloud networking risks  About the same as internet-facing dedicated hardware  Some public clouds may have hardware networking devices such as firewalls or load balancers  Other providers might provide a shared firewall or load balancer environment to use Cloud Security // ISACA San Antonio 2013-09-24 28
  • 29. How do I securely store data in cloud services? Cloud Security // ISACA San Antonio 2013-09-24 29
  • 30. Storing data in cloud  Your data is never fully safe in any storage  Understand your most probable threats first  Make your data less useful to others  Encryption with digital signatures  Sharding  Tokenization (can help with data transport laws)  Hardware Security Module (HSM) Cloud Security // ISACA San Antonio 2013-09-24 30
  • 31. Thanks for inviting me! Q&A? Cloud Security // ISACA San Antonio 2013-09-24 31 Have more questions later? major.hayden@rackspace.com http://major.io/

Notas do Editor

  1. What is cloud hosting?What changes does it bring?How can you host applications in cloud safely?
  2. Evolution of water utilities is similar to the evolution of cloud
  3. Assemble your own buckets, maintain themSpend time dragging buckets to the river and backAdding water-carrying capacity is hard workAll costs fixed
  4. Rent buckets, no maintenanceStill spend time dragging buckets to the river and backAdding water-carrying capacity is slightly less difficultAlmost all costs fixed
  5. Rent buckets, no maintenanceSomeone else hauls your buckets to the river and back for youAdding water-carrying capacity depends on bucket vendor’s capacityAlmost all costs variable
  6. No more buckets neededWater is transported to a place very close to your homeAdding capacity is quick – just pull more waterAll costs variable