does your cloud solution look like a mushroom 1 asset
play

Does Your Cloud Solution Look Like a Mushroom? 1: Asset - PowerPoint PPT Presentation

Does Your Cloud Solution Look Like a Mushroom? 1: Asset Identification 2: Identify Risks 3: Countermeasures 4: What risks does solution cause? 5: Costs and Trade-offs 1: Asset Identification 5: Identify Risks? 1: Asset Identification 5:


  1. Does Your Cloud Solution Look Like a Mushroom?

  2. 1: Asset Identification 2: Identify Risks 3: Countermeasures 4: What risks does solution cause? 5: Costs and Trade-offs

  3. 1: Asset Identification 5: Identify Risks?

  4. 1: Asset Identification 5: Identify Risks?

  5. 1: Asset Identification 5: Identify Risks?

  6. 1: Asset Identification 5: Identify Risks? Python Script by François Marier

  7. 1: Asset Identification 5: Identify Risks?

  8. 1: Asset Identification 2: Identify Risks 3: Countermeasures 4: What risks does solution cause? 5: Costs and Trade-offs

  9. 2: Identify Risks 5: Identify Risks?

  10. 2: Identify Risks Risk = Likelihood * Impact 5: Identify Risks?

  11. 2: Identify Risks 5: Identify Risks? Dependency

  12. 2: Identify Risks Likelihood Threat Agent Factors 5: Identify Risks? ● Skill level ● Motive ● Opportunity ● Size

  13. 2: Identify Risks Likelihood Vulnerability Factors 5: Identify Risks? ● Ease of discovery ● Ease of exploit ● Awareness ● Intrusion detection

  14. 2: Identify Risks Impact Technical Factors 5: Identify Risks? ● Loss of confidentiality ● Loss of integrity ● Loss of availability ● Loss of accountability

  15. 2: Identify Risks Impact Business Factors 5: Identify Risks? ● Financial damage ● Reputation damage ● Non-compliance ● Privacy violation

  16. 2: Identify Risks The Cloud vs In-House Security Comparisons

  17. 2: Identify Risks The Cloud vs In-House Security Comparisons

  18. 2: Identify Risks The Cloud vs In-House Security Comparisons

  19. 2: Identify Risks Control Lost

  20. 2: Identify Risks 5: Identify Risks?

  21. 1: Asset Identification 2: Identify Risks 3: Countermeasures 4: What risks does solution cause? 5: Costs and Trade-offs

  22. 3: Countermeasures

  23. 3: Countermeasures ● Avoid Commercial ● Use Public-Domain

  24. 3: Countermeasures

  25. 3: Countermeasures Hardening VPS's ● Create Multiple Partitions ● Review Password Strategies ● Disable Remote Root Logins ● Harden SSH

  26. 3: Countermeasures Hardening VPS's ● Disable or Remove Services ● Schedule Backups ● Keep Systems Up to date ● Logging to Off-site

  27. 3: Countermeasures Hardening VPS's

  28. 3: Countermeasures Hardening VPS's

  29. 3: Countermeasures Hardening VPS's

  30. 3: Countermeasures Break Your System

  31. 1: Asset Identification 2: Identify Risks 3: Countermeasures 4: Risks that solution causes 5: Costs and Trade-offs

  32. 4: Risks that solution causes New Risks

  33. 4: Risks that solution causes New Risks

  34. 4: Risks that solution causes New Risks >

  35. 4: Risks that solution causes New Mitigated

  36. 1: Asset Identification 2: Identify Risks 3: Countermeasures 4: Risks that solution causes 5: Costs and Trade-offs

  37. 5: Costs and Trade-offs Establish Value Loss of Convenience

  38. 5: Costs and Trade-offs Staying on Top

  39. Resource Compilation ● Cloud Security Assessment ● Automation ● Security Focused Facility ● In-house Cloud Planning

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend