cloud security
play

CLOUD SECURITY OR: HOW I LEARNED TO STOP WORRYING AND LOVE THE CLOUD - PowerPoint PPT Presentation

Click to edit Master title style CLOUD SECURITY OR: HOW I LEARNED TO STOP WORRYING AND LOVE THE CLOUD Jakob I. Pagter (Alon Hazay) Alexandra Instituttet A/S About the Alexandra Institute Click to edit Master title style Non-profit


  1. Click to edit Master title style CLOUD SECURITY OR: HOW I LEARNED TO STOP WORRYING AND LOVE THE CLOUD Jakob I. Pagter (Alon Hazay) Alexandra Instituttet A/S �

  2. About the Alexandra Institute Click to edit Master title style • Non-profit application oriented research institution – focus on IT • GTS – Godkendt Teknologisk Service Institut • 100+ employees generating Commercial R&D • Development • Consultancy • Researchers • Providers • Ideation • Users • Networks • Dissemination inspiration

  3. Essential Characteristics of Cloud Click to edit Master title style Computing On-demand self-service • provision computing capabilities automatically without requiring human interaction Broad network access • Capabilities are available over the network promote use by heterogeneous thin or thick client Measured Service Resource usage can be monitored, controlled, and reported, providing transparency Rapid elasticity • Capabilities can be rapidly and elastically provisioned, automatically, to quickly scale out or rapidly scale in Resource pooling • A sense of location independence. customer has no control or knowledge over the location of the resources

  4. Deployment Model Click to edit Master title style 4

  5. Cloud Service Models - Click to edit Master title style

  6. NIST Visual Model of Cloud Computing Click to edit Master title style Definition

  7. Click to edit Master title style 7

  8. Governance and compliance Click to edit Master title style • We have four datacenters in the US, two in Europe and two in Asia. Even though you choose to store your data in Europe instead of Worldwide, your data will be stored at least three times. Two times on your main location and one time at a secondary data center’ Statement MS Azure:

  9. Click to edit Master title style

  10. Amazon Outage Click to edit Master title style http://aws.amazon.com/message/65648/

  11. Account or Service Hijacking Click to edit Master title style • Zeus botnet running an unauthorized command and control center on Amazon's EC2 cloud computing infrastructure.

  12. Multi-Tenancy Click to edit Master title style Multi-Tenancy ¡ Separation ¡ • one program, need to • Solution that supports serve at the same time the Multi-Tenancy, capable of number of consumer creating separation organizations (Tenants) ¡ between the different Tenants ¡

  13. Virtualization vulnerabilities by vendor Click to edit Master title style Low percentages for Oracle, IBM, and Microsoft • VMware: 80.9% • Oracle: 1.8% • RedHat: 6.9% • IBM: 1.1% • Citrix: 5.8% • Microsoft: 0.9%

  14. Insecure Interfaces and APIs Click to edit Master title style Web service Web service man-in-middle redirection message attack ¡ alteration attack

  15. Click to edit Master title style 15

  16. Business pros (and cons!) Click to edit Master title style Fate- Indbygget sharing sikkerhed 2000 Stordrift Tilføjet $150.000 Location sikkerhed Samlet Armbrust et al.: Above The Clouds , 2011 sikkerhed Berkeley 2009 $1500 ? ? IaaS PaaS SaaS ? Omkostning Lokation Agilitet Virtualisering Hvem Selvbetjening • er på? Innovation Tredjeparter • hvor? • hvilke Compliance data? APIs Kompleksitet Innovation Availability Risikoprofil? Omkostning Innovation … ??!! År1 År2 År3 År4 År5 År6 År7 År8

  17. Cloud Security Alliance Click to edit Master title style The CSA is a member-driven organization, chartered with promoting the use of best practices for providing security assurance within Cloud Computing.

  18. Get certified! Click to edit Master title style alexandra.dk/ccsk

  19. Get certified! Click to edit Master title style 19 Alexandra – Sikkerhed og Innovation i Skyen

  20. Click to edit Master title style

  21. A (proper) encrypted Dropbox Click to edit Master title style Data hidden to Dropbox Transparent integration

  22. Shallow confidentiality Click to edit Master title style No real confidentiality web server.. Computation: decrypted! ?! Storage: encrypted Local computation

  23. Deep confidentiality Click to edit Master title style web server.. Security Performance Computation: encrypted! Storage: encrypted

  24. Case: energiauktion.dk (via partisia.com) Click to edit Master title style 100 90 80 70 2. Submit bids 1. Define Usage 60 auction 50 Base cost 40 30 SMC cost 20 (amortized) 10 0 Elasticity 0-2 2-4 6-8 10-12 14-16 18-20 22-24 2-3 4-6 8-10 12-14 16-18 20-22 3. Find => confidentiality! winner 4. Make the deal

  25. Thx for you attention! Click to edit Master title style PS: Please remember to evalueate the presentations (incl. this one ;)

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend