SlideShare ist ein Scribd-Unternehmen logo
1 von 6
5/22/2011




            Session: Cloud Security Overview!
                                    y
            Speaker: Mohamed El‐Refaey
            Mohamed@egyptcloudforum.com

            http://twitter.com/#!/melrefaey
            http://twitter.com/#!/egyptcloudforum

            http://www.facebook.com/?ref=home#!/pages/Egypt‐Cloud‐
            Forum/111055065588154

            http://eg.linkedin.com/in/mohamedelrefaey




                                                    Agenda


• Cloud Security  Overview

• Operating in the cloud & Security.

• Standards, Initiatives and Certifications

• Take Aways




                                                                             1
5/22/2011




                                                                        Cloud Security


   Open
  Security
Architecture
Actor-centric
Actor centric view of
 cloud architecture




                                              CSA Areas of Focus


                                            Security, Buss Cont., DR
               ing in the Cloud




                                            Data Center Operations

                                  Incident Response, Notification, Remediation

                                              Application Security
         Operati




                                        Encryption & Key Management

                                        Identity & Access Management

                                                 Virtualization




                                                                                                2
5/22/2011




                                CSA Areas of Focus



                                       Cloud Architecture
           ance the Cloud




                            Governance & Enterprise Risk Management

                                   Legal & Electronic Discovery

                                       Compliance & Audit
                                          p
     Governa




                                Information lifecycle Management

                                  Portability & Interoperability




                                     Top Threats (As defined by CSA)


• Abuse and Nefarious Use of Cloud
  Abuse and Nefarious Use of Cloud 
  Computing
• Insecure Application Programming 
  Interfaces
• Malicious Insiders
• Shared Technology Vulnerabilities
  Shared Technology Vulnerabilities
• Data Loss/Leakage
• Account, Service & Traffic Hijacking
• Unknown Risk Profile




                                                                              3
5/22/2011




                      Cloud Threat Model Threats
• Risk 1: Resource Exhaustion
• Risk 2: Customer Isolation Failure
• Risk 3: Management Interface Compromise
• Risk 4: Interception of Data in Transmission
• Risk 5: Data leakage on Upload/Download, Intra‐cloud
• Risk 6: Insecure or Ineffective Deletion of Data
• Risk 7: Distributed Denial of Service (DDoS)
• Risk 8 Economic Denial of Service
  Risk 8: Economic Denial of Service
• Risk 9: Loss or Compromise of Encryption Keys
• Risk 10: Malicious Probes or Scans
…
• Risk 25   … Check ENISA document for the rest …




            Is my data safe in the cloud?




                                                                4
5/22/2011




                               Cloud Security Initiatives 
                                    & Certificates


•   Trusted Cloud               McAfee Cloud 
      Initiative                                             CloudAudit
                                  Security
    •    Cloud 
        Security 
        Alliance




                                                Certificate of Cloud 
                     FedRAMP                    Security Knowledge




                                                                                 5
5/22/2011




                           Some Take Aways


• Beware the trap of trusting the cloud vendors too
  Beware the trap of trusting the cloud vendors too 
  much
• Centralized cloud model puts huge power and control 
  in the hands of cloud players.
• Wikileaks and Amazon!
• Cloud computing is a harkening back to centralizing 
  everything (Just not as the Internet engineered 
  distributed model)
• Cloud Computing is not a problem‐free panacea for 
  businesses




                 Thank
                 Th k you
           Now, it is time for Q&A




                                                                6

Weitere ähnliche Inhalte

Empfohlen

How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
ThinkNow
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
Kurio // The Social Media Age(ncy)
 

Empfohlen (20)

How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work
 
ChatGPT webinar slides
ChatGPT webinar slidesChatGPT webinar slides
ChatGPT webinar slides
 

Egypt Cloud Day, May2011 -- Cloud Security

  • 1. 5/22/2011 Session: Cloud Security Overview! y Speaker: Mohamed El‐Refaey Mohamed@egyptcloudforum.com http://twitter.com/#!/melrefaey http://twitter.com/#!/egyptcloudforum http://www.facebook.com/?ref=home#!/pages/Egypt‐Cloud‐ Forum/111055065588154 http://eg.linkedin.com/in/mohamedelrefaey Agenda • Cloud Security  Overview • Operating in the cloud & Security. • Standards, Initiatives and Certifications • Take Aways 1
  • 2. 5/22/2011 Cloud Security Open Security Architecture Actor-centric Actor centric view of cloud architecture CSA Areas of Focus Security, Buss Cont., DR ing in the Cloud Data Center Operations Incident Response, Notification, Remediation Application Security Operati Encryption & Key Management Identity & Access Management Virtualization 2
  • 3. 5/22/2011 CSA Areas of Focus Cloud Architecture ance the Cloud Governance & Enterprise Risk Management Legal & Electronic Discovery Compliance & Audit p Governa Information lifecycle Management Portability & Interoperability Top Threats (As defined by CSA) • Abuse and Nefarious Use of Cloud Abuse and Nefarious Use of Cloud  Computing • Insecure Application Programming  Interfaces • Malicious Insiders • Shared Technology Vulnerabilities Shared Technology Vulnerabilities • Data Loss/Leakage • Account, Service & Traffic Hijacking • Unknown Risk Profile 3
  • 4. 5/22/2011 Cloud Threat Model Threats • Risk 1: Resource Exhaustion • Risk 2: Customer Isolation Failure • Risk 3: Management Interface Compromise • Risk 4: Interception of Data in Transmission • Risk 5: Data leakage on Upload/Download, Intra‐cloud • Risk 6: Insecure or Ineffective Deletion of Data • Risk 7: Distributed Denial of Service (DDoS) • Risk 8 Economic Denial of Service Risk 8: Economic Denial of Service • Risk 9: Loss or Compromise of Encryption Keys • Risk 10: Malicious Probes or Scans … • Risk 25   … Check ENISA document for the rest … Is my data safe in the cloud? 4
  • 5. 5/22/2011 Cloud Security Initiatives  & Certificates • Trusted Cloud  McAfee Cloud  Initiative CloudAudit Security • Cloud  Security  Alliance Certificate of Cloud  FedRAMP Security Knowledge 5
  • 6. 5/22/2011 Some Take Aways • Beware the trap of trusting the cloud vendors too Beware the trap of trusting the cloud vendors too  much • Centralized cloud model puts huge power and control  in the hands of cloud players. • Wikileaks and Amazon! • Cloud computing is a harkening back to centralizing  everything (Just not as the Internet engineered  distributed model) • Cloud Computing is not a problem‐free panacea for  businesses Thank Th k you Now, it is time for Q&A 6