Enviar pesquisa
Carregar
Cloud security and security architecture
•
Transferir como PPTX, PDF
•
19 gostaram
•
27,874 visualizações
Vladimir Jirasek
Seguir
Presentation that I gave at ISC2 SecureLondon conference in London on 11th December 2012.
Leia menos
Leia mais
Tecnologia
Denunciar
Compartilhar
Denunciar
Compartilhar
1 de 12
Baixar agora
Recomendados
Cloud Security
Cloud Security
AWS User Group Bengaluru
Cloud Security: A New Perspective
Cloud Security: A New Perspective
Wen-Pai Lu
Cloud Security Architecture.pptx
Cloud Security Architecture.pptx
Moshe Ferber
Cloud security ppt
Cloud security ppt
Venkatesh Chary
Cloud computing and data security
Cloud computing and data security
Mohammed Fazuluddin
Cloud Computing Security
Cloud Computing Security
Ninh Nguyen
Cloud security Presentation
Cloud security Presentation
Ajay p
Cloud Security
Cloud Security
AWS User Group Bengaluru
Recomendados
Cloud Security
Cloud Security
AWS User Group Bengaluru
Cloud Security: A New Perspective
Cloud Security: A New Perspective
Wen-Pai Lu
Cloud Security Architecture.pptx
Cloud Security Architecture.pptx
Moshe Ferber
Cloud security ppt
Cloud security ppt
Venkatesh Chary
Cloud computing and data security
Cloud computing and data security
Mohammed Fazuluddin
Cloud Computing Security
Cloud Computing Security
Ninh Nguyen
Cloud security Presentation
Cloud security Presentation
Ajay p
Cloud Security
Cloud Security
AWS User Group Bengaluru
Cloud security
Cloud security
BikashPokharel3
Introduction to Cloud Security
Introduction to Cloud Security
Legal Services National Technology Assistance Project (LSNTAP)
cloud security ppt
cloud security ppt
Devyani Vaidya
Cloud computing and its security issues
Cloud computing and its security issues
Jyoti Srivastava
Cloud Security Strategy
Cloud Security Strategy
Capgemini
Data security in cloud computing
Data security in cloud computing
Prince Chandu
Cloud computing security
Cloud computing security
Akhila Param
Cloud computing and Cloud security fundamentals
Cloud computing and Cloud security fundamentals
Viresh Suri
Security in cloud computing
Security in cloud computing
veena venugopal
Introduction to cloud computing
Introduction to cloud computing
Jithin Parakka
Cloud security
Cloud security
n|u - The Open Security Community
Cloud security
Cloud security
Niharika Varshney
Cloud security
Cloud security
Tushar Kayande
Key Challenges In CLOUD COMPUTING
Key Challenges In CLOUD COMPUTING
Atul Chounde
Data security in the cloud
Data security in the cloud
IBM Security
Cyber Security and Cloud Computing
Cyber Security and Cloud Computing
Keet Sugathadasa
Cloud security
Cloud security
Mohamed Shalash
Public vs private vs hybrid cloud what is best for your business-
Public vs private vs hybrid cloud what is best for your business-
Everdata Technologies
Infrastructure as a Service ( IaaS)
Infrastructure as a Service ( IaaS)
Ravindra Dastikop
Multi Cloud Architecture Approach
Multi Cloud Architecture Approach
Maganathin Veeraragaloo
2012 10 cloud security architecture
2012 10 cloud security architecture
Vladimir Jirasek
Integrated Cloud Framework: Security, Governance, Compliance, Content Applica...
Integrated Cloud Framework: Security, Governance, Compliance, Content Applica...
Chad Lawler
Mais conteúdo relacionado
Mais procurados
Cloud security
Cloud security
BikashPokharel3
Introduction to Cloud Security
Introduction to Cloud Security
Legal Services National Technology Assistance Project (LSNTAP)
cloud security ppt
cloud security ppt
Devyani Vaidya
Cloud computing and its security issues
Cloud computing and its security issues
Jyoti Srivastava
Cloud Security Strategy
Cloud Security Strategy
Capgemini
Data security in cloud computing
Data security in cloud computing
Prince Chandu
Cloud computing security
Cloud computing security
Akhila Param
Cloud computing and Cloud security fundamentals
Cloud computing and Cloud security fundamentals
Viresh Suri
Security in cloud computing
Security in cloud computing
veena venugopal
Introduction to cloud computing
Introduction to cloud computing
Jithin Parakka
Cloud security
Cloud security
n|u - The Open Security Community
Cloud security
Cloud security
Niharika Varshney
Cloud security
Cloud security
Tushar Kayande
Key Challenges In CLOUD COMPUTING
Key Challenges In CLOUD COMPUTING
Atul Chounde
Data security in the cloud
Data security in the cloud
IBM Security
Cyber Security and Cloud Computing
Cyber Security and Cloud Computing
Keet Sugathadasa
Cloud security
Cloud security
Mohamed Shalash
Public vs private vs hybrid cloud what is best for your business-
Public vs private vs hybrid cloud what is best for your business-
Everdata Technologies
Infrastructure as a Service ( IaaS)
Infrastructure as a Service ( IaaS)
Ravindra Dastikop
Multi Cloud Architecture Approach
Multi Cloud Architecture Approach
Maganathin Veeraragaloo
Mais procurados
(20)
Cloud security
Cloud security
Introduction to Cloud Security
Introduction to Cloud Security
cloud security ppt
cloud security ppt
Cloud computing and its security issues
Cloud computing and its security issues
Cloud Security Strategy
Cloud Security Strategy
Data security in cloud computing
Data security in cloud computing
Cloud computing security
Cloud computing security
Cloud computing and Cloud security fundamentals
Cloud computing and Cloud security fundamentals
Security in cloud computing
Security in cloud computing
Introduction to cloud computing
Introduction to cloud computing
Cloud security
Cloud security
Cloud security
Cloud security
Cloud security
Cloud security
Key Challenges In CLOUD COMPUTING
Key Challenges In CLOUD COMPUTING
Data security in the cloud
Data security in the cloud
Cyber Security and Cloud Computing
Cyber Security and Cloud Computing
Cloud security
Cloud security
Public vs private vs hybrid cloud what is best for your business-
Public vs private vs hybrid cloud what is best for your business-
Infrastructure as a Service ( IaaS)
Infrastructure as a Service ( IaaS)
Multi Cloud Architecture Approach
Multi Cloud Architecture Approach
Semelhante a Cloud security and security architecture
2012 10 cloud security architecture
2012 10 cloud security architecture
Vladimir Jirasek
Integrated Cloud Framework: Security, Governance, Compliance, Content Applica...
Integrated Cloud Framework: Security, Governance, Compliance, Content Applica...
Chad Lawler
Resarch paper i cloud computing
Resarch paper i cloud computing
Bharat Gupta
null Bangalore meet - Cloud Computing and Security
null Bangalore meet - Cloud Computing and Security
n|u - The Open Security Community
What customers want the cloud to be - Jason Waxman GM at Intel, Cloud Slam 20...
What customers want the cloud to be - Jason Waxman GM at Intel, Cloud Slam 20...
Khazret Sapenov
Lss implementing cyber security in the cloud, and from the cloud-feb14
Lss implementing cyber security in the cloud, and from the cloud-feb14
L S Subramanian
Smart, Data-Centric Security for the Post-PC Era
Smart, Data-Centric Security for the Post-PC Era
Trend Micro (EMEA) Limited
Cloud security ely kahn
Cloud security ely kahn
Ely Kahn
Cloud Security - Made simple
Cloud Security - Made simple
Sameer Paradia
Enterprise Security in Cloud
Enterprise Security in Cloud
Lenin Aboagye
Enterprise Security in Hybrid Cloud ISACA-SV 2012
Enterprise Security in Hybrid Cloud ISACA-SV 2012
Symosis Security (Previously C-Level Security)
Security of,for & by cloud
Security of,for & by cloud
Lakshmi Subramanian
Cisco tec chris young - security intelligence operations
Cisco tec chris young - security intelligence operations
Cisco Public Relations
Cloud computing
Cloud computing
saralaanuj
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
Amazon Web Services
Deepsecurity & VDI beveiliging, maximale beveiliging en optimale performance
Deepsecurity & VDI beveiliging, maximale beveiliging en optimale performance
UNIT4 IT Solutions
CloudPassage Overview
CloudPassage Overview
CloudPassage
AWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNet
AWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNet
Amazon Web Services
Virtualization And Cloud Impact Overview Auditor Spin Enterprise Gr Cv4
Virtualization And Cloud Impact Overview Auditor Spin Enterprise Gr Cv4
EnterpriseGRC Solutions, Inc.
451 Research Client Event Nov 10
451 Research Client Event Nov 10
stavvmc
Semelhante a Cloud security and security architecture
(20)
2012 10 cloud security architecture
2012 10 cloud security architecture
Integrated Cloud Framework: Security, Governance, Compliance, Content Applica...
Integrated Cloud Framework: Security, Governance, Compliance, Content Applica...
Resarch paper i cloud computing
Resarch paper i cloud computing
null Bangalore meet - Cloud Computing and Security
null Bangalore meet - Cloud Computing and Security
What customers want the cloud to be - Jason Waxman GM at Intel, Cloud Slam 20...
What customers want the cloud to be - Jason Waxman GM at Intel, Cloud Slam 20...
Lss implementing cyber security in the cloud, and from the cloud-feb14
Lss implementing cyber security in the cloud, and from the cloud-feb14
Smart, Data-Centric Security for the Post-PC Era
Smart, Data-Centric Security for the Post-PC Era
Cloud security ely kahn
Cloud security ely kahn
Cloud Security - Made simple
Cloud Security - Made simple
Enterprise Security in Cloud
Enterprise Security in Cloud
Enterprise Security in Hybrid Cloud ISACA-SV 2012
Enterprise Security in Hybrid Cloud ISACA-SV 2012
Security of,for & by cloud
Security of,for & by cloud
Cisco tec chris young - security intelligence operations
Cisco tec chris young - security intelligence operations
Cloud computing
Cloud computing
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
Deepsecurity & VDI beveiliging, maximale beveiliging en optimale performance
Deepsecurity & VDI beveiliging, maximale beveiliging en optimale performance
CloudPassage Overview
CloudPassage Overview
AWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNet
AWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNet
Virtualization And Cloud Impact Overview Auditor Spin Enterprise Gr Cv4
Virtualization And Cloud Impact Overview Auditor Spin Enterprise Gr Cv4
451 Research Client Event Nov 10
451 Research Client Event Nov 10
Mais de Vladimir Jirasek
Vulnerability management - beyond scanning
Vulnerability management - beyond scanning
Vladimir Jirasek
Vulnerability Management @ DevSecOps London Gathering
Vulnerability Management @ DevSecOps London Gathering
Vladimir Jirasek
C-Level tools for Cloud security
C-Level tools for Cloud security
Vladimir Jirasek
Secure your cloud applications by building solid foundations with enterprise ...
Secure your cloud applications by building solid foundations with enterprise ...
Vladimir Jirasek
Mobile phone as Trusted identity assistant
Mobile phone as Trusted identity assistant
Vladimir Jirasek
Security architecture for LSE 2009
Security architecture for LSE 2009
Vladimir Jirasek
Mobile security summit - 10 mobile risks
Mobile security summit - 10 mobile risks
Vladimir Jirasek
Information Risk Security model and metrics
Information Risk Security model and metrics
Vladimir Jirasek
Integrating Qualys into the patch and vulnerability management processes
Integrating Qualys into the patch and vulnerability management processes
Vladimir Jirasek
Securing mobile population for White Hats
Securing mobile population for White Hats
Vladimir Jirasek
Security models for security architecture
Security models for security architecture
Vladimir Jirasek
Meaningfull security metrics
Meaningfull security metrics
Vladimir Jirasek
CAMM presentation for Cyber Security Gas and Oil june 2011
CAMM presentation for Cyber Security Gas and Oil june 2011
Vladimir Jirasek
ISE UK&Ireland 2008 Showcase Nominee Presentation Vladimir Jirasek
ISE UK&Ireland 2008 Showcase Nominee Presentation Vladimir Jirasek
Vladimir Jirasek
Qualys Webex 24 June 2008
Qualys Webex 24 June 2008
Vladimir Jirasek
Federation For The Cloud Opportunities For A Single Identity
Federation For The Cloud Opportunities For A Single Identity
Vladimir Jirasek
Mais de Vladimir Jirasek
(16)
Vulnerability management - beyond scanning
Vulnerability management - beyond scanning
Vulnerability Management @ DevSecOps London Gathering
Vulnerability Management @ DevSecOps London Gathering
C-Level tools for Cloud security
C-Level tools for Cloud security
Secure your cloud applications by building solid foundations with enterprise ...
Secure your cloud applications by building solid foundations with enterprise ...
Mobile phone as Trusted identity assistant
Mobile phone as Trusted identity assistant
Security architecture for LSE 2009
Security architecture for LSE 2009
Mobile security summit - 10 mobile risks
Mobile security summit - 10 mobile risks
Information Risk Security model and metrics
Information Risk Security model and metrics
Integrating Qualys into the patch and vulnerability management processes
Integrating Qualys into the patch and vulnerability management processes
Securing mobile population for White Hats
Securing mobile population for White Hats
Security models for security architecture
Security models for security architecture
Meaningfull security metrics
Meaningfull security metrics
CAMM presentation for Cyber Security Gas and Oil june 2011
CAMM presentation for Cyber Security Gas and Oil june 2011
ISE UK&Ireland 2008 Showcase Nominee Presentation Vladimir Jirasek
ISE UK&Ireland 2008 Showcase Nominee Presentation Vladimir Jirasek
Qualys Webex 24 June 2008
Qualys Webex 24 June 2008
Federation For The Cloud Opportunities For A Single Identity
Federation For The Cloud Opportunities For A Single Identity
Último
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
Ridwan Fadjar
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
Fwdays
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
charlottematthew16
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
UiPathCommunity
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
gvaughan
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
Lorenzo Miniero
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Patryk Bandurski
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
RankYa
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
Memoori
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Mark Simos
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
Scott Keck-Warren
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
Enterprise Knowledge
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
Fwdays
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
Sergiu Bodiu
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
Padma Pradeep
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
carlostorres15106
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
Kalema Edgar
Training state-of-the-art general text embedding
Training state-of-the-art general text embedding
Zilliz
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Wonjun Hwang
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
Fwdays
Último
(20)
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
Training state-of-the-art general text embedding
Training state-of-the-art general text embedding
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
Cloud security and security architecture
1.
Security architecture and
Cloud computing, are these mutually exclusive? (Introduction to Cloud Security Guidance)
2.
Agenda
Cloud risk assessment x compared to traditional risk assessments Cloud security architectures x compared to security architectures CSA domains Copyright © 2012 Cloud Security Alliance https://cloudsecurityalliance.org.uk
3.
Cloud risk assessment
Identify Context assets establishment Map the data Evaluate flows assets Risk Risk communication assessment Evaluate Map to Cloud Cloud deployments models and Risk treatment models Providers Copyright © 2012 Cloud Security Alliance https://cloudsecurityalliance.org.uk
4.
Cloud model Broad network
Rapid elasticity Measured On-demand access service service Resource pooling Software as a Platform as a Infrastructure Service (SaaS) Service (SaaS) as a Service (SaaS) Publi Private Hybrid Community c Copyright © 2012 Cloud Security Alliance https://cloudsecurityalliance.org.uk
5.
Cloud computing deployment
models Infrastructure Infrastructure Infrastructure Accessible and managed by owned by located consumed by Third party Third party Public Off-premise Untrusted provider provider Organisation Organisation On-premise Private/ o Trusted Community r 3rd party 3rdparty Off-Premise provider provider Both Organisation Both Organisation Both On-Premise Trusted & Hybrid & Third party & Third party & Off-Premise Untrusted provider provider Copyright © 2012 Cloud Security Alliance https://cloudsecurityalliance.org.uk
6.
Cloud model maps
to Security model Cloud model GRC Business continuity SIEM Data security Identity, Access Direct map Cryptography Application sec. Host security Network security Physical security Copyright © 2012 Cloud Security Alliance https://cloudsecurityalliance.org.uk
7.
Responsibilities for areas
in security model compared to delivery models Provider responsible Customer responsible GRC Business continuity SIEM Identity, Access Cryptography Data security Application sec. Host security Network security Physical security IaaS PaaS SaaS IaaS PaaS SaaS Copyright © 2012 Cloud Security Alliance https://cloudsecurityalliance.org.uk
8.
Cloud Security Domains
Governance Operational Governance and Enterprise Risk Traditional Security, Business Management Continuity and Disaster Recovery Legal Issues: Contracts and Electronic Data Center Operations Discovery Incident Response, Notification and Compliance and Audit Remediation Information Management and Data Application Security Security Encryption and Key Management Portability and Interoperability Identity and Access Management Virtualization Security as a Service Copyright © 2012 Cloud Security Alliance https://cloudsecurityalliance.org.uk
9.
Cloud Security Alliance
supports number of projects related to cloud Get involved at https://cloudsecurityalliance.org/resea rch/https://cloudsecurityalliance.org.uk Copyright © 2012 Cloud Security Alliance
10.
How to manage
cloud security • Have a cloud security standard • What to do on an Enterprise level • Before your Cloud project • During your Cloud project How to drive out the • BAU 'seven deadly sins' of cloud computing - new Information Security • Exit from the Cloud provider Forum report • Risks cannot be outsourced • Manage lock-in and exit up-front – especially in SaaS Copyright © 2012 Cloud Security Alliance https://cloudsecurityalliance.org.uk
11.
Contact Help us secure
cloud computing – Get involved • http://cloudsecurityalliance.org.uk • info@cloudsecurityalliance.org.uk • LinkedIn: http://www.linkedin.com/groups/Cloud- Security-Alliance-UK-Chapter-3745837 • Twitter: @CSAUKResearch Copyright © 2012 Cloud Security Alliance https://cloudsecurityalliance.org.uk
12.
Thank you!
www.cloudsecurityalliance.org
Notas do Editor
Do visit the websiteDo join the LinkedIn Groups – you will receive regular email updates
Baixar agora