SlideShare a Scribd company logo
1 of 12
Bringing Cloud operational benefits to the world of security and privacy Gilad Parann-Nissany http://www.porticor.comcontact@porticor.com CSA Congress, November 16th-17th, 2010 12/7/2010 www.porticor.com           © PORTICOR 2009, 2010
12/7/2010 www.porticor.com           © PORTICOR 2009, 2010 2
Goals Focus: public cloud Because its in some ways more challenging than private cloud Focus: IaaS/PaaS SaaS controlled by vendor Agenda Baseline assumptions Threat analysis What’s really new? What’s not? Cloud-deployed security tools Demo: WAF in the cloud Cloud-specific security considerations Demo: securing the data layer Summary: flexibility in the cloud 12/7/2010 www.porticor.com           © PORTICOR 2009, 2010 3 “Cloudy” Security
NOT “selling cloud” Customer IT has evaluated what they would feel comfortable putting in the cloud Customer IT understands that – in IaaS/PaaS – they still retain some responsibility Customer IT is asking the questions: “how to meet our responsibility, how to do security reasonably, and what are the tools to use?” 12/7/2010 www.porticor.com           © PORTICOR 2009, 2010 4 Baseline assumptions for this discussion
Shared Technology Vulnerabilities  Data Loss/Data Leakage Malicious Insiders  Account Service or Hijacking of Traffic Insecure APIs  Nefarious Use of Service  Unknown Risk Profile 12/7/2010 www.porticor.com           © PORTICOR 2009, 2010 5 Threat Analysis: I/PaaS PaaS Platform as a Service IaaS Infrastructure as a Service (*) courtesy “Cloud Security Alliance: Assuring the future of Cloud Computing”: S. Loureiro, 2010
Some known concepts translate to cloud with a twist APIs SaaS security Usage of IaaS And of course, there is some pretty new stuff More about this later… 12/7/2010 Copyright 2009, 2010 ©Porticor What’s new? What carries over?
12/7/2010 Copyright 2009, 2010 ©Porticor Translating known concepts to cloud Examples …and more
Cloud Data Demo 1 12/7/2010 Confidential ©Porticor Internet Business Compute
Secure distributed data storage Keys management Hypervisors and virtual machines Role of encryption changes New data protection measures emerge (i.e. fragmentation) Physical security of cloud environments 12/7/2010 www.porticor.com           © PORTICOR 2009, 2010 9 Some new considerations
Cloud Demo 2 12/7/2010 Confidential ©Porticor Internet Business Mgmt Site Compute Data
Package complex privacy and security technology  Get the operations and economics right Pay as you go Privacy and security solutions can be brought up in a reasonable time – not months Privacy and security have proper service level guarantees Backed by proper SLA and/or Warranty 12/7/2010 www.porticor.com           © PORTICOR 2009, 2010 11 Elasticity, Flexibility, Management
12/7/2010 Confidential ©Porticor Thank You! Questions ?

More Related Content

What's hot

Cisco cloud strategy cisco
Cisco cloud strategy ciscoCisco cloud strategy cisco
Cisco cloud strategy cisco
OpenSourceCamp
 
Nick Barcet, Open Source tijdens Infosecurity.nl Storage Expo en Tooling Even...
Nick Barcet, Open Source tijdens Infosecurity.nl Storage Expo en Tooling Even...Nick Barcet, Open Source tijdens Infosecurity.nl Storage Expo en Tooling Even...
Nick Barcet, Open Source tijdens Infosecurity.nl Storage Expo en Tooling Even...
Infosecurity2010
 

What's hot (20)

Getting Your IT Security Learners Ready for the Cloud with CCSK Certification
Getting Your IT Security Learners Ready for the Cloud with CCSK CertificationGetting Your IT Security Learners Ready for the Cloud with CCSK Certification
Getting Your IT Security Learners Ready for the Cloud with CCSK Certification
 
Ten Type of Innovation - Universitas Indonesia
Ten Type of Innovation - Universitas Indonesia Ten Type of Innovation - Universitas Indonesia
Ten Type of Innovation - Universitas Indonesia
 
Ciphercloud Solutions Overview hsa oct2011
Ciphercloud Solutions Overview hsa oct2011Ciphercloud Solutions Overview hsa oct2011
Ciphercloud Solutions Overview hsa oct2011
 
Cisco Keynote at NetApp Insight - Berlin
Cisco Keynote at NetApp Insight - BerlinCisco Keynote at NetApp Insight - Berlin
Cisco Keynote at NetApp Insight - Berlin
 
Identity Live Sydney 2017 - Michael Dowling
Identity Live Sydney 2017 - Michael DowlingIdentity Live Sydney 2017 - Michael Dowling
Identity Live Sydney 2017 - Michael Dowling
 
CCSK Certificate of Cloud Computing Knowledge - overview
CCSK Certificate of Cloud Computing Knowledge - overviewCCSK Certificate of Cloud Computing Knowledge - overview
CCSK Certificate of Cloud Computing Knowledge - overview
 
Cisco cloud strategy cisco
Cisco cloud strategy ciscoCisco cloud strategy cisco
Cisco cloud strategy cisco
 
IBB Energie AG
IBB Energie AGIBB Energie AG
IBB Energie AG
 
uPort's Privacy Preserving User Management System for Ethereum dApps
uPort's Privacy Preserving User Management System for Ethereum dAppsuPort's Privacy Preserving User Management System for Ethereum dApps
uPort's Privacy Preserving User Management System for Ethereum dApps
 
Nick Barcet, Open Source tijdens Infosecurity.nl Storage Expo en Tooling Even...
Nick Barcet, Open Source tijdens Infosecurity.nl Storage Expo en Tooling Even...Nick Barcet, Open Source tijdens Infosecurity.nl Storage Expo en Tooling Even...
Nick Barcet, Open Source tijdens Infosecurity.nl Storage Expo en Tooling Even...
 
MILCOM 2013 Keynote Presentation: Larry Payne
MILCOM 2013 Keynote Presentation: Larry Payne MILCOM 2013 Keynote Presentation: Larry Payne
MILCOM 2013 Keynote Presentation: Larry Payne
 
The Cloud & I, The CISO challenges with Cloud Computing
The Cloud & I, The CISO challenges with Cloud Computing The Cloud & I, The CISO challenges with Cloud Computing
The Cloud & I, The CISO challenges with Cloud Computing
 
Internet of everything
Internet of everything Internet of everything
Internet of everything
 
CCSK, cloud security framework, Indonesia
CCSK, cloud security framework, IndonesiaCCSK, cloud security framework, Indonesia
CCSK, cloud security framework, Indonesia
 
Intel’s Strategy in IoT Standards
Intel’s Strategy in IoT StandardsIntel’s Strategy in IoT Standards
Intel’s Strategy in IoT Standards
 
Ramin elahi fog_computing_ecosystem_final_dec22_updated
Ramin elahi fog_computing_ecosystem_final_dec22_updatedRamin elahi fog_computing_ecosystem_final_dec22_updated
Ramin elahi fog_computing_ecosystem_final_dec22_updated
 
Neotel
Neotel Neotel
Neotel
 
The Notorious 9 Cloud Computing Threats - CSA Congress, San Jose
The Notorious 9 Cloud Computing Threats -  CSA Congress, San JoseThe Notorious 9 Cloud Computing Threats -  CSA Congress, San Jose
The Notorious 9 Cloud Computing Threats - CSA Congress, San Jose
 
Devil's Bargain: Sacrificing Strategic Investments to Fund Today's Problems
Devil's Bargain: Sacrificing Strategic Investments to Fund Today's ProblemsDevil's Bargain: Sacrificing Strategic Investments to Fund Today's Problems
Devil's Bargain: Sacrificing Strategic Investments to Fund Today's Problems
 
Enterprise Ethereum : How It Differs From DLT?
Enterprise Ethereum : How It Differs From DLT?Enterprise Ethereum : How It Differs From DLT?
Enterprise Ethereum : How It Differs From DLT?
 

Viewers also liked

Synthèse-Publics du Festival d'Avignon 2011
Synthèse-Publics du Festival d'Avignon 2011Synthèse-Publics du Festival d'Avignon 2011
Synthèse-Publics du Festival d'Avignon 2011
Aude Rochat
 

Viewers also liked (11)

Mindfulness
MindfulnessMindfulness
Mindfulness
 
Wentworth LOR
Wentworth LORWentworth LOR
Wentworth LOR
 
Preparing for Today's Job Market - The Interview
Preparing for Today's Job Market - The InterviewPreparing for Today's Job Market - The Interview
Preparing for Today's Job Market - The Interview
 
Zyga Patient Brochure
Zyga Patient BrochureZyga Patient Brochure
Zyga Patient Brochure
 
Prezentacja dzielnice
Prezentacja dzielnicePrezentacja dzielnice
Prezentacja dzielnice
 
Wentworth LOR (Billingsley)
Wentworth LOR (Billingsley)Wentworth LOR (Billingsley)
Wentworth LOR (Billingsley)
 
pinkdino A4 2
pinkdino A4 2pinkdino A4 2
pinkdino A4 2
 
Welcome by Programmatic Bootcamp Host
Welcome by Programmatic Bootcamp HostWelcome by Programmatic Bootcamp Host
Welcome by Programmatic Bootcamp Host
 
Synthèse-Publics du Festival d'Avignon 2011
Synthèse-Publics du Festival d'Avignon 2011Synthèse-Publics du Festival d'Avignon 2011
Synthèse-Publics du Festival d'Avignon 2011
 
FINAL CAPSTONE Library
FINAL CAPSTONE Library FINAL CAPSTONE Library
FINAL CAPSTONE Library
 
Kanjana02
Kanjana02Kanjana02
Kanjana02
 

Similar to 20100925 cloudy security - porticor

Executive Briefing: Strategic Issues Surrounding Cloud Services
Executive Briefing:  Strategic Issues Surrounding Cloud ServicesExecutive Briefing:  Strategic Issues Surrounding Cloud Services
Executive Briefing: Strategic Issues Surrounding Cloud Services
WhitmeyerTuffin
 
How Secure Is Cloud
How Secure Is CloudHow Secure Is Cloud
How Secure Is Cloud
William Lam
 
Research Report: Cloud Trends in 2011 and beyond
Research Report: Cloud Trends in 2011 and beyondResearch Report: Cloud Trends in 2011 and beyond
Research Report: Cloud Trends in 2011 and beyond
Krishnan Subramanian
 
The Management of Security in Cloud Computing Ramgovind.docx
The Management of Security in Cloud Computing  Ramgovind.docxThe Management of Security in Cloud Computing  Ramgovind.docx
The Management of Security in Cloud Computing Ramgovind.docx
cherry686017
 

Similar to 20100925 cloudy security - porticor (20)

Porticor - Can Data be safe in Public Clouds, in Compliance with Standards
Porticor - Can Data be safe in Public Clouds, in Compliance with StandardsPorticor - Can Data be safe in Public Clouds, in Compliance with Standards
Porticor - Can Data be safe in Public Clouds, in Compliance with Standards
 
Slides 530 a2
Slides 530 a2Slides 530 a2
Slides 530 a2
 
Security in Cloud Computing
Security in Cloud ComputingSecurity in Cloud Computing
Security in Cloud Computing
 
Cloud Computing Security Issues and Challenges
Cloud Computing Security Issues and ChallengesCloud Computing Security Issues and Challenges
Cloud Computing Security Issues and Challenges
 
No More Dark Clouds: A Privacy Preserving Framework for the Cloud
No More Dark Clouds: A Privacy Preserving Framework for the CloudNo More Dark Clouds: A Privacy Preserving Framework for the Cloud
No More Dark Clouds: A Privacy Preserving Framework for the Cloud
 
An Analysis of Cloud Security
An Analysis of Cloud SecurityAn Analysis of Cloud Security
An Analysis of Cloud Security
 
PROOM
PROOMPROOM
PROOM
 
Cloud Encryption Gateways (how enterprises can leverage cloud SaaS without co...
Cloud Encryption Gateways (how enterprises can leverage cloud SaaS without co...Cloud Encryption Gateways (how enterprises can leverage cloud SaaS without co...
Cloud Encryption Gateways (how enterprises can leverage cloud SaaS without co...
 
Massonet Philippe Panel - Security in the clouds: An Academic Perspective
Massonet Philippe Panel - Security in the clouds: An Academic PerspectiveMassonet Philippe Panel - Security in the clouds: An Academic Perspective
Massonet Philippe Panel - Security in the clouds: An Academic Perspective
 
What is cloud
What is cloudWhat is cloud
What is cloud
 
Fio presentation on Cloud Computing Solution
Fio presentation on Cloud Computing SolutionFio presentation on Cloud Computing Solution
Fio presentation on Cloud Computing Solution
 
Executive Briefing: Strategic Issues Surrounding Cloud Services
Executive Briefing:  Strategic Issues Surrounding Cloud ServicesExecutive Briefing:  Strategic Issues Surrounding Cloud Services
Executive Briefing: Strategic Issues Surrounding Cloud Services
 
How Secure Is Cloud
How Secure Is CloudHow Secure Is Cloud
How Secure Is Cloud
 
600.412.Lecture05
600.412.Lecture05600.412.Lecture05
600.412.Lecture05
 
Ad4502189193
Ad4502189193Ad4502189193
Ad4502189193
 
Research Report: Cloud Trends in 2011 and beyond
Research Report: Cloud Trends in 2011 and beyondResearch Report: Cloud Trends in 2011 and beyond
Research Report: Cloud Trends in 2011 and beyond
 
The Management of Security in Cloud Computing Ramgovind.docx
The Management of Security in Cloud Computing  Ramgovind.docxThe Management of Security in Cloud Computing  Ramgovind.docx
The Management of Security in Cloud Computing Ramgovind.docx
 
Presentation capturing the cloud opportunity
Presentation   capturing the cloud opportunityPresentation   capturing the cloud opportunity
Presentation capturing the cloud opportunity
 
Cloud Computing - Why and How? (by Forrester Research, Inc.)
Cloud Computing - Why and How? (by Forrester Research, Inc.)Cloud Computing - Why and How? (by Forrester Research, Inc.)
Cloud Computing - Why and How? (by Forrester Research, Inc.)
 
Cloud Computing & Security Concerns
Cloud Computing & Security ConcernsCloud Computing & Security Concerns
Cloud Computing & Security Concerns
 

Recently uploaded

Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
FIDO Alliance
 
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
FIDO Alliance
 

Recently uploaded (20)

Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
 
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsContinuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
 
Microsoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireMicrosoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - Questionnaire
 
Overview of Hyperledger Foundation
Overview of Hyperledger FoundationOverview of Hyperledger Foundation
Overview of Hyperledger Foundation
 
Google I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGoogle I/O Extended 2024 Warsaw
Google I/O Extended 2024 Warsaw
 
TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024
 
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
 
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
 
State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!
 
ADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptx
 
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdfWhere to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
 
WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024
 
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
 
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfIntroduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdf
 
Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe
 
Working together SRE & Platform Engineering
Working together SRE & Platform EngineeringWorking together SRE & Platform Engineering
Working together SRE & Platform Engineering
 
AI mind or machine power point presentation
AI mind or machine power point presentationAI mind or machine power point presentation
AI mind or machine power point presentation
 
Intro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераIntro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджера
 
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfHow Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
 

20100925 cloudy security - porticor

  • 1. Bringing Cloud operational benefits to the world of security and privacy Gilad Parann-Nissany http://www.porticor.comcontact@porticor.com CSA Congress, November 16th-17th, 2010 12/7/2010 www.porticor.com © PORTICOR 2009, 2010
  • 2. 12/7/2010 www.porticor.com © PORTICOR 2009, 2010 2
  • 3. Goals Focus: public cloud Because its in some ways more challenging than private cloud Focus: IaaS/PaaS SaaS controlled by vendor Agenda Baseline assumptions Threat analysis What’s really new? What’s not? Cloud-deployed security tools Demo: WAF in the cloud Cloud-specific security considerations Demo: securing the data layer Summary: flexibility in the cloud 12/7/2010 www.porticor.com © PORTICOR 2009, 2010 3 “Cloudy” Security
  • 4. NOT “selling cloud” Customer IT has evaluated what they would feel comfortable putting in the cloud Customer IT understands that – in IaaS/PaaS – they still retain some responsibility Customer IT is asking the questions: “how to meet our responsibility, how to do security reasonably, and what are the tools to use?” 12/7/2010 www.porticor.com © PORTICOR 2009, 2010 4 Baseline assumptions for this discussion
  • 5. Shared Technology Vulnerabilities Data Loss/Data Leakage Malicious Insiders Account Service or Hijacking of Traffic Insecure APIs Nefarious Use of Service Unknown Risk Profile 12/7/2010 www.porticor.com © PORTICOR 2009, 2010 5 Threat Analysis: I/PaaS PaaS Platform as a Service IaaS Infrastructure as a Service (*) courtesy “Cloud Security Alliance: Assuring the future of Cloud Computing”: S. Loureiro, 2010
  • 6. Some known concepts translate to cloud with a twist APIs SaaS security Usage of IaaS And of course, there is some pretty new stuff More about this later… 12/7/2010 Copyright 2009, 2010 ©Porticor What’s new? What carries over?
  • 7. 12/7/2010 Copyright 2009, 2010 ©Porticor Translating known concepts to cloud Examples …and more
  • 8. Cloud Data Demo 1 12/7/2010 Confidential ©Porticor Internet Business Compute
  • 9. Secure distributed data storage Keys management Hypervisors and virtual machines Role of encryption changes New data protection measures emerge (i.e. fragmentation) Physical security of cloud environments 12/7/2010 www.porticor.com © PORTICOR 2009, 2010 9 Some new considerations
  • 10. Cloud Demo 2 12/7/2010 Confidential ©Porticor Internet Business Mgmt Site Compute Data
  • 11. Package complex privacy and security technology Get the operations and economics right Pay as you go Privacy and security solutions can be brought up in a reasonable time – not months Privacy and security have proper service level guarantees Backed by proper SLA and/or Warranty 12/7/2010 www.porticor.com © PORTICOR 2009, 2010 11 Elasticity, Flexibility, Management
  • 12. 12/7/2010 Confidential ©Porticor Thank You! Questions ?