SlideShare uma empresa Scribd logo
1 de 17
Predicting the Future: Security and Compliance in the Cloud Age
Introduction Misha Govshteyn – CTO, Alert Logic Work in security and web-scale architecture; operate high performance LAMP environment and  Erlang-based compute grid Help hosting/cloud service providers deliver security services Secure Cloud Review blog -> http://www.securecloudreview.com/  What we do at Alert Logic
About this session Objective:Help you make security & compliance decisions that prepare your company for the future This presentation addresses a broad trend of consuming IT as a service Cloud in this context includes  IaaS PaaS SaaS Why take such a broad view? Because each of these models has potential to significantly alter the way you protect your most critical assets
Putting 2010 questions in perspective Questions of today are less important than this fact : IT is increasingly delivered as a service Your IT footprint is already changing… probably adopting some form of cloud services network is already becoming decentralized Some of your data may already be off-premise IaaS? PaaS? SaaS? Private vs Public? IT vs Cloud?
 Formulating a Security Strategy
Your Enterprise in 2015 platform ISV virtualdesktop saas     burst private HR CRM Finance POS web storefront Cloud Enabled Functions Enterprise Software Enterprise Platforms
Cloud questions today and tomorrow
Your enterprise 5 years from now Perimeter is less important than ever More than 50% of your critical data is offsite Some in environments you do not control Some users don’t need your VPN to do their jobs   Securing the enterprise will be characterized by Continuous transfer of security responsibility to service providers of all types Application/protocol level attacks Even more compliance requirements than today
Security trends in next 5 years ,[object Object],Cloud providers will use security as a differentiator Become increasingly more transparent Provide automated attestation and auditing of key controls, including access to logs Native data encryption available & heavily promoted, but sparingly used Most will offer enterprise-level Security-as-a-Service within 2-3 years Changes in security industry Identity management is likely to become the first cloud sec “killer app” Netsec vendors, less strategic to enterprises, will focus on CSPs Application/protocol security and Data Leak Prevention are likely to become increasingly important due to PCI mandates
Cloud impact on network security Most network security products are unable to deal with complexity of CSP networks Big pipes: CSPs already see speeds well in excess of 50gbps Small customers: thousands of customers, some with very little traffic (no native multi-tenancy) Rapid elasticity – changing topology, new IP allocations, new VLANS, more traffic flows Today’s notions of trusted users, networks and computing resources will need to be re-thought ,[object Object],[object Object]
Network firewalls will fade in importance as perimeter disappears
Network security functions subsumed by service providers
Increasingly offered as a service
Become embedded in CSP and NSP network fabric
New security focus:
Applications
Protocols

Mais conteúdo relacionado

Mais procurados

Mais procurados (20)

Cloud Security 101 by Madhav Chablani
Cloud Security 101 by Madhav ChablaniCloud Security 101 by Madhav Chablani
Cloud Security 101 by Madhav Chablani
 
Cloud Security Governance
Cloud Security GovernanceCloud Security Governance
Cloud Security Governance
 
The Notorious 9 Cloud Computing Threats - CSA Congress, San Jose
The Notorious 9 Cloud Computing Threats -  CSA Congress, San JoseThe Notorious 9 Cloud Computing Threats -  CSA Congress, San Jose
The Notorious 9 Cloud Computing Threats - CSA Congress, San Jose
 
Demystifying Prisma Access
Demystifying Prisma AccessDemystifying Prisma Access
Demystifying Prisma Access
 
Understanding SASE
Understanding SASE Understanding SASE
Understanding SASE
 
Introduction to Cloud Security
Introduction to Cloud SecurityIntroduction to Cloud Security
Introduction to Cloud Security
 
Introducing S.A.M.S Connecting the Dots – your SMART technology partner
Introducing S.A.M.S Connecting the Dots – your SMART technology partnerIntroducing S.A.M.S Connecting the Dots – your SMART technology partner
Introducing S.A.M.S Connecting the Dots – your SMART technology partner
 
HARTMANN and Cloudflare Learn how healthcare providers can build resilient in...
HARTMANN and Cloudflare Learn how healthcare providers can build resilient in...HARTMANN and Cloudflare Learn how healthcare providers can build resilient in...
HARTMANN and Cloudflare Learn how healthcare providers can build resilient in...
 
Latest Developments in Cloud Security Standards and Privacy
Latest Developments in Cloud Security Standards and PrivacyLatest Developments in Cloud Security Standards and Privacy
Latest Developments in Cloud Security Standards and Privacy
 
Close your security gaps and get 100% of your traffic protected with Cloudflare
Close your security gaps and get 100% of your traffic protected with CloudflareClose your security gaps and get 100% of your traffic protected with Cloudflare
Close your security gaps and get 100% of your traffic protected with Cloudflare
 
The Cloud & I, The CISO challenges with Cloud Computing
The Cloud & I, The CISO challenges with Cloud Computing The Cloud & I, The CISO challenges with Cloud Computing
The Cloud & I, The CISO challenges with Cloud Computing
 
What is SASE
What is SASEWhat is SASE
What is SASE
 
Cloud security what to expect (introduction to cloud security)
Cloud security   what to expect (introduction to cloud security)Cloud security   what to expect (introduction to cloud security)
Cloud security what to expect (introduction to cloud security)
 
Transforming cloud security into an advantage
Transforming cloud security into an advantageTransforming cloud security into an advantage
Transforming cloud security into an advantage
 
Security As A Service
Security As A ServiceSecurity As A Service
Security As A Service
 
John Merline - How make your cloud SASE
John Merline - How make your cloud SASE John Merline - How make your cloud SASE
John Merline - How make your cloud SASE
 
Defcon23 from zero to secure in 1 minute - nir valtman and moshe ferber
Defcon23   from zero to secure in 1 minute - nir valtman and moshe ferberDefcon23   from zero to secure in 1 minute - nir valtman and moshe ferber
Defcon23 from zero to secure in 1 minute - nir valtman and moshe ferber
 
Cloud Access Security Brokers
Cloud Access Security BrokersCloud Access Security Brokers
Cloud Access Security Brokers
 
Thin Air or Solid Ground? Practical Cloud Security
Thin Air or Solid Ground? Practical Cloud SecurityThin Air or Solid Ground? Practical Cloud Security
Thin Air or Solid Ground? Practical Cloud Security
 
Cloud Security Alliance's GRC Stack Overview
Cloud Security Alliance's GRC Stack OverviewCloud Security Alliance's GRC Stack Overview
Cloud Security Alliance's GRC Stack Overview
 

Semelhante a Predicting The Future: Security and Compliance in the Cloud Age

Legal And Regulatory Issues Cloud Computing...V2.0
Legal And Regulatory Issues Cloud Computing...V2.0Legal And Regulatory Issues Cloud Computing...V2.0
Legal And Regulatory Issues Cloud Computing...V2.0
David Spinks
 
Virgílio Vargas Presentations / CloudViews.Org - Cloud Computing Conference 2...
Virgílio Vargas Presentations / CloudViews.Org - Cloud Computing Conference 2...Virgílio Vargas Presentations / CloudViews.Org - Cloud Computing Conference 2...
Virgílio Vargas Presentations / CloudViews.Org - Cloud Computing Conference 2...
EuroCloud
 
Cloud computing and_saas
Cloud computing and_saasCloud computing and_saas
Cloud computing and_saas
kavinalli
 
Cloud computing and_saas
Cloud computing and_saasCloud computing and_saas
Cloud computing and_saas
Rahul Parmar
 
(Dee fleming) Ccloud computing_la_press_final
(Dee fleming) Ccloud computing_la_press_final(Dee fleming) Ccloud computing_la_press_final
(Dee fleming) Ccloud computing_la_press_final
LA_IBM_Cloud_Event
 

Semelhante a Predicting The Future: Security and Compliance in the Cloud Age (20)

Cloud services and it security
Cloud services and it securityCloud services and it security
Cloud services and it security
 
The Cloud Is Rockin' and Rollin' In
The Cloud Is Rockin' and Rollin' InThe Cloud Is Rockin' and Rollin' In
The Cloud Is Rockin' and Rollin' In
 
Cloud Computing Security
Cloud Computing SecurityCloud Computing Security
Cloud Computing Security
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Cloud Ecosystems A Perspective
Cloud Ecosystems A PerspectiveCloud Ecosystems A Perspective
Cloud Ecosystems A Perspective
 
The Trouble with Saas and Hybrid Cloud
The Trouble with Saas and Hybrid CloudThe Trouble with Saas and Hybrid Cloud
The Trouble with Saas and Hybrid Cloud
 
IEEE PHM Cloud Computing
IEEE PHM Cloud ComputingIEEE PHM Cloud Computing
IEEE PHM Cloud Computing
 
Legal And Regulatory Issues Cloud Computing...V2.0
Legal And Regulatory Issues Cloud Computing...V2.0Legal And Regulatory Issues Cloud Computing...V2.0
Legal And Regulatory Issues Cloud Computing...V2.0
 
Cloud Security using NIST guidelines
Cloud Security using NIST guidelinesCloud Security using NIST guidelines
Cloud Security using NIST guidelines
 
Cloud Security using NIST guidelines
Cloud Security using NIST guidelinesCloud Security using NIST guidelines
Cloud Security using NIST guidelines
 
Cloud Computing 101
Cloud Computing 101Cloud Computing 101
Cloud Computing 101
 
Cloud Computing.pptx
Cloud Computing.pptxCloud Computing.pptx
Cloud Computing.pptx
 
Virgílio Vargas Presentations / CloudViews.Org - Cloud Computing Conference 2...
Virgílio Vargas Presentations / CloudViews.Org - Cloud Computing Conference 2...Virgílio Vargas Presentations / CloudViews.Org - Cloud Computing Conference 2...
Virgílio Vargas Presentations / CloudViews.Org - Cloud Computing Conference 2...
 
Cloud computing and_saas
Cloud computing and_saasCloud computing and_saas
Cloud computing and_saas
 
Cloud computing and_saas
Cloud computing and_saasCloud computing and_saas
Cloud computing and_saas
 
Cloud computing and_saas
Cloud computing and_saasCloud computing and_saas
Cloud computing and_saas
 
(Dee fleming) Ccloud computing_la_press_final
(Dee fleming) Ccloud computing_la_press_final(Dee fleming) Ccloud computing_la_press_final
(Dee fleming) Ccloud computing_la_press_final
 
Unlocking the value of the cloud - The benefits of deploying asset and facili...
Unlocking the value of the cloud - The benefits of deploying asset and facili...Unlocking the value of the cloud - The benefits of deploying asset and facili...
Unlocking the value of the cloud - The benefits of deploying asset and facili...
 
Cloud computing adoption in sap technologies
Cloud computing adoption in sap technologiesCloud computing adoption in sap technologies
Cloud computing adoption in sap technologies
 
Global IT BPM Market Perspective by Dolat Capital with special coverage on cl...
Global IT BPM Market Perspective by Dolat Capital with special coverage on cl...Global IT BPM Market Perspective by Dolat Capital with special coverage on cl...
Global IT BPM Market Perspective by Dolat Capital with special coverage on cl...
 

Último

Último (20)

Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 

Predicting The Future: Security and Compliance in the Cloud Age

  • 1. Predicting the Future: Security and Compliance in the Cloud Age
  • 2. Introduction Misha Govshteyn – CTO, Alert Logic Work in security and web-scale architecture; operate high performance LAMP environment and Erlang-based compute grid Help hosting/cloud service providers deliver security services Secure Cloud Review blog -> http://www.securecloudreview.com/ What we do at Alert Logic
  • 3. About this session Objective:Help you make security & compliance decisions that prepare your company for the future This presentation addresses a broad trend of consuming IT as a service Cloud in this context includes IaaS PaaS SaaS Why take such a broad view? Because each of these models has potential to significantly alter the way you protect your most critical assets
  • 4. Putting 2010 questions in perspective Questions of today are less important than this fact : IT is increasingly delivered as a service Your IT footprint is already changing… probably adopting some form of cloud services network is already becoming decentralized Some of your data may already be off-premise IaaS? PaaS? SaaS? Private vs Public? IT vs Cloud?
  • 5. Formulating a Security Strategy
  • 6. Your Enterprise in 2015 platform ISV virtualdesktop saas     burst private HR CRM Finance POS web storefront Cloud Enabled Functions Enterprise Software Enterprise Platforms
  • 7. Cloud questions today and tomorrow
  • 8. Your enterprise 5 years from now Perimeter is less important than ever More than 50% of your critical data is offsite Some in environments you do not control Some users don’t need your VPN to do their jobs Securing the enterprise will be characterized by Continuous transfer of security responsibility to service providers of all types Application/protocol level attacks Even more compliance requirements than today
  • 9.
  • 10.
  • 11. Network firewalls will fade in importance as perimeter disappears
  • 12. Network security functions subsumed by service providers
  • 14. Become embedded in CSP and NSP network fabric
  • 18.
  • 19. CSP vs Customer responsibility Customer /Managed Service Cloud Service Provider
  • 20.
  • 21. Auditing of key controls
  • 24. X-Factor: the Auditors Passing a compliance audit in the cloud in next 5 years will require equal parts luck and planning Improving your chances Distant future: find an auditor that understands and has experience in cloud environments Today: help your auditor understand your environment API? CSA? XML? A6? Hadoop? EC2? VPC? XEN?
  • 25. First steps Engage with your IT security and auditors Build a roadmap for dealing with the dissolving perimeter and set realistic goals for your team Understand how Security SaaS fits into your current and future strategy Explore technologies/efforts important to secure cloud adoption: IDM, OWASP, WAF, CSA, A6 Choose cloud environments that understand and plan to address your evolving security needs
  • 26. Alert Logic http://www.alertlogic.com/ Secure Cloud Review Blog http://www.securecloudreview.com/ Email: misha@alertlogic.com Twitter: @CToMG