SlideShare a Scribd company logo
1 of 35
Hector Del Castillo
AIPMM
linkd.in/hdelcastillo
What We Will Discuss
1.   What is cloud security
2.   Current situation
3.   Dimensions of cloud security
4.   Security risks
5.   Critical areas
6.   Approaches to reduce risk
7.   Key takeaways
What is Cloud Security?
• An evolving sub-domain of computer security
• A broad set of policies, technologies, and
  controls deployed to protect data,
  applications, and the associated infrastructure
  of cloud computing
• Should not be confused with ‘cloud-based’
  security software offerings
• Many commercial software vendors have
  cloud-based offerings such as anti-virus or
  vulnerability management
Current Situation
• Analysts estimate that cloud computing
  adoption will continue to rapidly increase
• A single, massive cloud data center contains
  more computers than were on the entire
  internet just a few years ago
• Security experts agree that the number of
  attacks and their level of sophistication will
  continue to grow
Source: NIST Special Publication 800-144, Jan 2011
Service Models
                                Software           Platform             Infrastructure
Deployment Models




                                as a Service       as a Service         as a Service
                                (SaaS)             (PaaS)               (IaaS)
                    Private                                 X                     X
                    Hybrid            X                     X                     X
                    Public            X                     X                     X
                    Community         X                     X                     X

                                           Source: NIST Special Publication 800-144, Jan 2011
Cloud Solutions
“Cloud Services
market to grow to
$42B by 2012.”
- IDC




                    Source: ZDNet Blogs
Cloud Security Reference Model




                   Source: Cloud Security Alliance
Dimensions of Cloud Security
• Security and Privacy
  – Data protection
  – Identity management
  – Physical and personnel security
  – Availability
  – Application security
  – Privacy

            Source: "Cloud Security Front and Center,” Forrester Research, 2009.
Dimensions of Cloud Security
• Compliance
  – Business continuity and data recovery
  – Logs and audit trails
  – Unique compliance requirements




            Source: "Cloud Security Front and Center,” Forrester Research, 2009.
Dimensions of Cloud Security
• Legal or Contractual Issues
  – Public records




            Source: "Cloud Security Front and Center,” Forrester Research, 2009.
Security Risks
1.   Privileged user access
2.   Regulatory compliance
3.   Data location
4.   Data segregation
5.   Recovery
6.   Investigative support
7.   Long-term viability
          Source: “Assessing the Security Risks of Cloud Computing,” Gartner, 2008.
Critical Areas
• Cloud Architecture
     – Cloud Computing Architectural Framework




Source: "Security Guidance for Critical Areas of Focus in Cloud Computing V2.1,” CSA, 2009.
Critical Areas
• Governing in the Cloud
     –   Governance and Enterprise Risk Management
     –   Legal and Electronic Discovery
     –   Compliance and Audit
     –   Information Lifecycle Management
     –   Portability and Interoperability



Source: "Security Guidance for Critical Areas of Focus in Cloud Computing V2.1,” CSA, 2009.
Critical Areas
• Operating in the Cloud
     – Traditional Security, Business Continuity, and Disaster
       Recovery
     – Data Center Operations
     – Incident Response, Notification, and Remediation
     – Application Security
     – Encryption and Key Management
     – Identity and Access Management
     – Virtualization
Source: "Security Guidance for Critical Areas of Focus in Cloud Computing V2.1,” CSA, 2009.
Recommendations
   Trust (4)
   Transnational Data Flows (4)
   Transparency (2)
   Transformation (4)



                    Source: “CLOUD2 Summary Report,” TechAmerica, 2011.
Approaches to Reduce Risk
Trust
1. (Security & Assurance Frameworks): Industry
   and government should support and participate
   in the development and implementation of
   international, standardized frameworks for
   securing, assessing, certifying and accrediting
   cloud solutions.


                   Source: “CLOUD2 Summary Report,” TechAmerica, 2011.
Approaches to Reduce Risk
Trust
2. (Identity Management): Should accelerate the
   development of a private sector-led identity
   management ecosystem as envisioned by the
   National Strategy for Trusted Identities in
   Cyberspace (NSTIC) to facilitate the adoption of
   strong authentication technologies and enable
   users to gain secure access to cloud services and
   websites.
                    Source: “CLOUD2 Summary Report,” TechAmerica, 2011.
Approaches to Reduce Risk
Trust
3. (Responses to Data Breaches): Government
   should enact a national data breach law to
   clarify breach notification responsibilities and
   commitments of companies to their customers,
   and also update and strengthen criminal laws
   against those who attack computer systems and
   networks, including cloud computing services.
                    Source: “CLOUD2 Summary Report,” TechAmerica, 2011.
Approaches to Reduce Risk
Trust
4. (Research): Government, industry, and
   academia should develop and execute a joint
   cloud computing research agenda.




                  Source: “CLOUD2 Summary Report,” TechAmerica, 2011.
Approaches to Reduce Risk
Transnational Data Flows
5. (Privacy): The U.S. government and industry
   should promote a comprehensive,
   technology-neutral privacy framework,
   consistent with commonly accepted privacy
   and data protection principles-based
   frameworks such as the OECD principles
   and/or APEC privacy frameworks.
                  Source: “CLOUD2 Summary Report,” TechAmerica, 2011.
Approaches to Reduce Risk
Transnational Data Flows
6. (Government/Law Enforcement Access to
   Data): The U.S. government should
   demonstrate leadership in identifying and
   implementing mechanisms for lawful access
   by law enforcement or government to data
   stored in the cloud.

                 Source: “CLOUD2 Summary Report,” TechAmerica, 2011.
Approaches to Reduce Risk
Transnational Data Flows
7. (E-Discovery and Forensics): Government
   and industry should enable effective
   practices for collecting information from the
   cloud to meet forensic or e-discovery needs
   in ways that fully support legal due process
   while minimizing impact on cloud provider
   operations.
                   Source: “CLOUD2 Summary Report,” TechAmerica, 2011.
Approaches to Reduce Risk
Transnational Data Flows
8. (Lead by Example): The U.S. government
   should demonstrate its willingness to trust
   cloud computing environments in other
   countries for appropriate government
   workloads.


                  Source: “CLOUD2 Summary Report,” TechAmerica, 2011.
Approaches to Reduce Risk
Transparency
9. (Transparency): Industry should publicly
   disclose information about relevant
   operational aspects of their cloud services,
   including portability, interoperability,
   security, certifications, performance and
   reliability.

                   Source: “CLOUD2 Summary Report,” TechAmerica, 2011.
Approaches to Reduce Risk
Transparency
10. (Data Portability): Cloud providers should
    enable portability of user data through
    documents, tools, and support for agreed-
    upon industry standards and best practices.



                  Source: “CLOUD2 Summary Report,” TechAmerica, 2011.
Approaches to Reduce Risk
Transformation
11. (Federal Acquisition and Budgeting):
    Agencies should demonstrate flexibility in
    adapting existing procurement models to
    facilitate acquisition of cloud services and
    solutions. Congress and OMB should
    demonstrate flexibility in changing budget
    models to help agencies acquire cloud
    services and solutions.
                   Source: “CLOUD2 Summary Report,” TechAmerica, 2011.
Approaches to Reduce Risk
Transformation
12. (Incentives): Government should establish
    policies and processes for providing fiscal
    incentives, rewards and support for agencies
    as they take steps towards implementing
    cloud deployments.


                  Source: “CLOUD2 Summary Report,” TechAmerica, 2011.
Approaches to Reduce Risk
Transformation
13. (Improve Infrastructure): Government and
    industry should embrace the modernization
    of broadband infrastructure and the current
    move to IPv6 to improve the bandwidth and
    reliable connectivity necessary for the
    growth of cloud services.

                  Source: “CLOUD2 Summary Report,” TechAmerica, 2011.
Approaches to Reduce Risk
Transformation
14. (Education/Training): Government, industry,
    and academia should develop and
    disseminate resources for major stakeholder
    communities to be educated on the
    technical, business, and policy issues around
    acquisition, deployment and operation of
    cloud services.
                   Source: “CLOUD2 Summary Report,” TechAmerica, 2011.
Key Takeaways
1   • Cloud security continues to evolve

    • Security issues are global and impact providers
2     and customers
    • Cloud security requires action for government,
3     industry and academia
    • Data owner must implement traditional layered
4     security approach
    • Data owner must segregate data from
5     application
Recommended AFCOM Sessions
1. "DCM18: Securing the Virtualized Environment,”
   Robert Klotz, Akibia, 2011.
2. "DCP10: How Social Media and the Cloud Impact
   Data Center Security,” James Danburg, SA2, 2011.
3. "Cloud07: Managing the Transition Cloud,” Brent
   Eubanks, Latisys, 2011.
4. "Cloud04: The Ins and Outs of Virtual Private
   Clouds,” Sundar Raghavan, Skytap, 2011.
Recommended Reading
1. “Assessing the Security Risks of Cloud Computing,”
   Gartner, 3 June 2008.
2. "Cloud Security Front and Center,” Forrester Research,
   18 Nov 2009.
3. "Security Guidance for Critical Areas of Focus in Cloud
   Computing V2.1,” Cloud Security Alliance, 2009.
4. “Guidelines on Security and Privacy in Public Cloud
   Computing, NIST Special Publication 800-144, Jan 2011.
5. “Summary Report of the Commission on the Leadership
   Opportunity in U.S. Deployment of the Cloud,”
   TechAmerica Foundation, July 2011.
Join My Professional Network!




Hector Del Castillo, PMP, CPM, CPMM
         linkd.in/hdelcastillo
      hmdelcastillo@aipmm.com

More Related Content

What's hot

A Survey on Cloud Computing Security – Challenges and Trust Issues
A Survey on Cloud Computing Security – Challenges and Trust IssuesA Survey on Cloud Computing Security – Challenges and Trust Issues
A Survey on Cloud Computing Security – Challenges and Trust Issues
IJCSIS Research Publications
 
Cloud computing security & forensics (manu)
Cloud computing security & forensics (manu)Cloud computing security & forensics (manu)
Cloud computing security & forensics (manu)
ClubHack
 
Cloud Computing Security
Cloud Computing SecurityCloud Computing Security
Cloud Computing Security
Dhaval Dave
 
Cloud Computing Security Issues in Infrastructure as a Service”
Cloud Computing Security Issues in Infrastructure as a Service”Cloud Computing Security Issues in Infrastructure as a Service”
Cloud Computing Security Issues in Infrastructure as a Service”
Vivek Maurya
 
Cloud Computing- Proposal (Autosaved)
Cloud Computing- Proposal (Autosaved)Cloud Computing- Proposal (Autosaved)
Cloud Computing- Proposal (Autosaved)
Zuhair Haroon khan
 

What's hot (20)

Security in Cloud Computing
Security in Cloud ComputingSecurity in Cloud Computing
Security in Cloud Computing
 
A Survey on Cloud Computing Security – Challenges and Trust Issues
A Survey on Cloud Computing Security – Challenges and Trust IssuesA Survey on Cloud Computing Security – Challenges and Trust Issues
A Survey on Cloud Computing Security – Challenges and Trust Issues
 
Cloud computing security & forensics (manu)
Cloud computing security & forensics (manu)Cloud computing security & forensics (manu)
Cloud computing security & forensics (manu)
 
Cloud Computing Security
Cloud Computing SecurityCloud Computing Security
Cloud Computing Security
 
A proposal for implementing cloud computing in newspaper company
A proposal for implementing cloud computing in newspaper companyA proposal for implementing cloud computing in newspaper company
A proposal for implementing cloud computing in newspaper company
 
Cloud Computing: Architecture, IT Security and Operational Perspectives
Cloud Computing: Architecture, IT Security and Operational PerspectivesCloud Computing: Architecture, IT Security and Operational Perspectives
Cloud Computing: Architecture, IT Security and Operational Perspectives
 
Cloud Computing - Security Benefits and Risks
Cloud Computing - Security Benefits and RisksCloud Computing - Security Benefits and Risks
Cloud Computing - Security Benefits and Risks
 
CLOUD COMPUTING_proposal
CLOUD COMPUTING_proposalCLOUD COMPUTING_proposal
CLOUD COMPUTING_proposal
 
Cloud computing security issues and challenges
Cloud computing security issues and challengesCloud computing security issues and challenges
Cloud computing security issues and challenges
 
Cloud Computing Security Issues in Infrastructure as a Service”
Cloud Computing Security Issues in Infrastructure as a Service”Cloud Computing Security Issues in Infrastructure as a Service”
Cloud Computing Security Issues in Infrastructure as a Service”
 
Cloud Computing Security Issues
Cloud Computing Security IssuesCloud Computing Security Issues
Cloud Computing Security Issues
 
Security issue in cloud by himanshu tiwari
Security issue in cloud by himanshu tiwariSecurity issue in cloud by himanshu tiwari
Security issue in cloud by himanshu tiwari
 
Cloud Computing- Proposal (Autosaved)
Cloud Computing- Proposal (Autosaved)Cloud Computing- Proposal (Autosaved)
Cloud Computing- Proposal (Autosaved)
 
Cloud Security
Cloud Security Cloud Security
Cloud Security
 
Cloud Computing & Security Concerns
Cloud Computing & Security ConcernsCloud Computing & Security Concerns
Cloud Computing & Security Concerns
 
security Issues of cloud computing
security Issues of cloud computingsecurity Issues of cloud computing
security Issues of cloud computing
 
Cloud Security - Security Aspects of Cloud Computing
Cloud Security - Security Aspects of Cloud ComputingCloud Security - Security Aspects of Cloud Computing
Cloud Security - Security Aspects of Cloud Computing
 
Evaluation Of The Data Security Methods In Cloud Computing Environments
Evaluation Of The Data Security Methods In Cloud Computing EnvironmentsEvaluation Of The Data Security Methods In Cloud Computing Environments
Evaluation Of The Data Security Methods In Cloud Computing Environments
 
Cloud Computing Security
Cloud Computing SecurityCloud Computing Security
Cloud Computing Security
 
Data Security Model Enhancement In Cloud Environment
Data Security Model Enhancement In Cloud EnvironmentData Security Model Enhancement In Cloud Environment
Data Security Model Enhancement In Cloud Environment
 

Similar to Cloud01: Best Practices for Virtual Cloud Security - H. Del Castillo, AIPMM

Introduction to cloud security
Introduction to cloud securityIntroduction to cloud security
Introduction to cloud security
IAEME Publication
 
SECURITY CONCERN ON CLOUD BASED ON ATTRIBUTES: AN SURVEY
SECURITY CONCERN ON CLOUD BASED ON ATTRIBUTES: AN SURVEYSECURITY CONCERN ON CLOUD BASED ON ATTRIBUTES: AN SURVEY
SECURITY CONCERN ON CLOUD BASED ON ATTRIBUTES: AN SURVEY
Editor Jacotech
 
Review of Business Information Systems – Fourth Quarter 2013 V.docx
Review of Business Information Systems – Fourth Quarter 2013 V.docxReview of Business Information Systems – Fourth Quarter 2013 V.docx
Review of Business Information Systems – Fourth Quarter 2013 V.docx
michael591
 

Similar to Cloud01: Best Practices for Virtual Cloud Security - H. Del Castillo, AIPMM (20)

Design and implement a new cloud security method based on multi clouds on ope...
Design and implement a new cloud security method based on multi clouds on ope...Design and implement a new cloud security method based on multi clouds on ope...
Design and implement a new cloud security method based on multi clouds on ope...
 
DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...
DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...
DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...
 
DDS - The Proven Data Connectivity Standard for the Industrial IoT (IIoT)
DDS - The Proven Data Connectivity Standard for the Industrial IoT (IIoT)DDS - The Proven Data Connectivity Standard for the Industrial IoT (IIoT)
DDS - The Proven Data Connectivity Standard for the Industrial IoT (IIoT)
 
Industrial IOT Data Connectivity Standard
Industrial IOT Data Connectivity StandardIndustrial IOT Data Connectivity Standard
Industrial IOT Data Connectivity Standard
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
THE IMPACT OF EXISTING SOUTH AFRICAN ICT POLICIES AND REGULATORY LAWS ON CLOU...
THE IMPACT OF EXISTING SOUTH AFRICAN ICT POLICIES AND REGULATORY LAWS ON CLOU...THE IMPACT OF EXISTING SOUTH AFRICAN ICT POLICIES AND REGULATORY LAWS ON CLOU...
THE IMPACT OF EXISTING SOUTH AFRICAN ICT POLICIES AND REGULATORY LAWS ON CLOU...
 
A study on_security_and_privacy_issues_o
A study on_security_and_privacy_issues_oA study on_security_and_privacy_issues_o
A study on_security_and_privacy_issues_o
 
Cloud Forensics: Drawbacks in Current Methodologies and Proposed Solution
Cloud Forensics: Drawbacks in Current Methodologies and Proposed SolutionCloud Forensics: Drawbacks in Current Methodologies and Proposed Solution
Cloud Forensics: Drawbacks in Current Methodologies and Proposed Solution
 
A Review On Data Security In Cloud Computing
A Review On Data Security In Cloud ComputingA Review On Data Security In Cloud Computing
A Review On Data Security In Cloud Computing
 
Introduction to Cloud Computing and Cloud Infrastructure
Introduction to Cloud Computing and Cloud InfrastructureIntroduction to Cloud Computing and Cloud Infrastructure
Introduction to Cloud Computing and Cloud Infrastructure
 
Introduction to cloud security
Introduction to cloud securityIntroduction to cloud security
Introduction to cloud security
 
Strategic, Privacy and Security Considerations for Adoption of Cloud and Emer...
Strategic, Privacy and Security Considerations for Adoption of Cloud and Emer...Strategic, Privacy and Security Considerations for Adoption of Cloud and Emer...
Strategic, Privacy and Security Considerations for Adoption of Cloud and Emer...
 
SECURITY CONCERN ON CLOUD BASED ON ATTRIBUTES: AN SURVEY
SECURITY CONCERN ON CLOUD BASED ON ATTRIBUTES: AN SURVEYSECURITY CONCERN ON CLOUD BASED ON ATTRIBUTES: AN SURVEY
SECURITY CONCERN ON CLOUD BASED ON ATTRIBUTES: AN SURVEY
 
1376843836 94879193
1376843836  948791931376843836  94879193
1376843836 94879193
 
1376843836 94879193
1376843836  948791931376843836  94879193
1376843836 94879193
 
CLOUD COMPUTING -Risks, Countermeasures, Costs and Benefits-
CLOUD COMPUTING -Risks, Countermeasures, Costs and Benefits-CLOUD COMPUTING -Risks, Countermeasures, Costs and Benefits-
CLOUD COMPUTING -Risks, Countermeasures, Costs and Benefits-
 
Taking Healthcare to the Cloud
Taking Healthcare to the CloudTaking Healthcare to the Cloud
Taking Healthcare to the Cloud
 
Review of Business Information Systems – Fourth Quarter 2013 V.docx
Review of Business Information Systems – Fourth Quarter 2013 V.docxReview of Business Information Systems – Fourth Quarter 2013 V.docx
Review of Business Information Systems – Fourth Quarter 2013 V.docx
 
It auditing to assure a secure cloud computing
It auditing to assure a secure cloud computingIt auditing to assure a secure cloud computing
It auditing to assure a secure cloud computing
 
Slides 530 a2
Slides 530 a2Slides 530 a2
Slides 530 a2
 

More from Hector Del Castillo, CPM, CPMM

PM Job Search Council Info Session - PMI Silver Spring Chapter
PM Job Search Council Info Session - PMI Silver Spring ChapterPM Job Search Council Info Session - PMI Silver Spring Chapter
PM Job Search Council Info Session - PMI Silver Spring Chapter
Hector Del Castillo, CPM, CPMM
 
How To Land Your Next PM Dream Job - PMISSC Meeting - April 2024
How To Land Your Next PM Dream Job - PMISSC Meeting - April 2024How To Land Your Next PM Dream Job - PMISSC Meeting - April 2024
How To Land Your Next PM Dream Job - PMISSC Meeting - April 2024
Hector Del Castillo, CPM, CPMM
 
The Future of Business: How AI is Transforming Mid-Market Operations, Product...
The Future of Business: How AI is Transforming Mid-Market Operations, Product...The Future of Business: How AI is Transforming Mid-Market Operations, Product...
The Future of Business: How AI is Transforming Mid-Market Operations, Product...
Hector Del Castillo, CPM, CPMM
 
How AI is Transforming Project Management - PMI Silver Spring Chapter - Octob...
How AI is Transforming Project Management - PMI Silver Spring Chapter - Octob...How AI is Transforming Project Management - PMI Silver Spring Chapter - Octob...
How AI is Transforming Project Management - PMI Silver Spring Chapter - Octob...
Hector Del Castillo, CPM, CPMM
 
Unlocking The Power of Informational Interviews | Bold PM Insights
Unlocking The Power of Informational Interviews | Bold PM InsightsUnlocking The Power of Informational Interviews | Bold PM Insights
Unlocking The Power of Informational Interviews | Bold PM Insights
Hector Del Castillo, CPM, CPMM
 
How to Land Your Next PM Dream Job in 90 Days | Great IT Professional | May 2...
How to Land Your Next PM Dream Job in 90 Days | Great IT Professional | May 2...How to Land Your Next PM Dream Job in 90 Days | Great IT Professional | May 2...
How to Land Your Next PM Dream Job in 90 Days | Great IT Professional | May 2...
Hector Del Castillo, CPM, CPMM
 
Emotional Agility for Leaders | Great IT Professional | May 17, 2023
Emotional Agility for Leaders | Great IT Professional | May 17, 2023Emotional Agility for Leaders | Great IT Professional | May 17, 2023
Emotional Agility for Leaders | Great IT Professional | May 17, 2023
Hector Del Castillo, CPM, CPMM
 
Project Management Trends in a Hybrid World | Great IT Professional | May 2,...
Project Management Trends in a Hybrid World  | Great IT Professional | May 2,...Project Management Trends in a Hybrid World  | Great IT Professional | May 2,...
Project Management Trends in a Hybrid World | Great IT Professional | May 2,...
Hector Del Castillo, CPM, CPMM
 
Your First 90 Days in a New Leadership Role | Great IT Professional | Februar...
Your First 90 Days in a New Leadership Role | Great IT Professional | Februar...Your First 90 Days in a New Leadership Role | Great IT Professional | Februar...
Your First 90 Days in a New Leadership Role | Great IT Professional | Februar...
Hector Del Castillo, CPM, CPMM
 
How To Land Your Next Product Dream Job in 90 Days | ProductCamp DC
How To Land Your Next Product Dream Job in 90 Days  | ProductCamp DCHow To Land Your Next Product Dream Job in 90 Days  | ProductCamp DC
How To Land Your Next Product Dream Job in 90 Days | ProductCamp DC
Hector Del Castillo, CPM, CPMM
 
Looking Back, Looking Ahead | December 2022 ProductCamp DC
Looking Back, Looking Ahead | December 2022 ProductCamp DCLooking Back, Looking Ahead | December 2022 ProductCamp DC
Looking Back, Looking Ahead | December 2022 ProductCamp DC
Hector Del Castillo, CPM, CPMM
 
Your First 90 Days in a New Product Role | Product Summit Online™
Your First 90 Days in a New Product Role | Product Summit Online™Your First 90 Days in a New Product Role | Product Summit Online™
Your First 90 Days in a New Product Role | Product Summit Online™
Hector Del Castillo, CPM, CPMM
 
PM vs. PM | PMISSC 2022 Symposium
PM vs. PM | PMISSC 2022 SymposiumPM vs. PM | PMISSC 2022 Symposium
PM vs. PM | PMISSC 2022 Symposium
Hector Del Castillo, CPM, CPMM
 

More from Hector Del Castillo, CPM, CPMM (20)

PM Job Search Council Info Session - PMI Silver Spring Chapter
PM Job Search Council Info Session - PMI Silver Spring ChapterPM Job Search Council Info Session - PMI Silver Spring Chapter
PM Job Search Council Info Session - PMI Silver Spring Chapter
 
WheelTug PLC Pitch Deck | Investor Insights | April 2024
WheelTug PLC Pitch Deck | Investor Insights | April 2024WheelTug PLC Pitch Deck | Investor Insights | April 2024
WheelTug PLC Pitch Deck | Investor Insights | April 2024
 
How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...
How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...
How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...
 
How To Land Your Next PM Dream Job - PMISSC Meeting - April 2024
How To Land Your Next PM Dream Job - PMISSC Meeting - April 2024How To Land Your Next PM Dream Job - PMISSC Meeting - April 2024
How To Land Your Next PM Dream Job - PMISSC Meeting - April 2024
 
The Future of Business: How AI is Transforming Mid-Market Operations, Product...
The Future of Business: How AI is Transforming Mid-Market Operations, Product...The Future of Business: How AI is Transforming Mid-Market Operations, Product...
The Future of Business: How AI is Transforming Mid-Market Operations, Product...
 
Byond Business Growth Live CEO M&A Panel Discussion
Byond Business Growth Live CEO M&A Panel DiscussionByond Business Growth Live CEO M&A Panel Discussion
Byond Business Growth Live CEO M&A Panel Discussion
 
End of Times Views - Book of Revelation Summary
End of Times Views - Book of Revelation SummaryEnd of Times Views - Book of Revelation Summary
End of Times Views - Book of Revelation Summary
 
How AI is Transforming Project Management - PMI Silver Spring Chapter - Octob...
How AI is Transforming Project Management - PMI Silver Spring Chapter - Octob...How AI is Transforming Project Management - PMI Silver Spring Chapter - Octob...
How AI is Transforming Project Management - PMI Silver Spring Chapter - Octob...
 
Unlocking The Power of Informational Interviews | Bold PM Insights
Unlocking The Power of Informational Interviews | Bold PM InsightsUnlocking The Power of Informational Interviews | Bold PM Insights
Unlocking The Power of Informational Interviews | Bold PM Insights
 
Product Management Fundamentals
Product Management FundamentalsProduct Management Fundamentals
Product Management Fundamentals
 
How to Land Your Next PM Dream Job in 90 Days | Great IT Professional | May 2...
How to Land Your Next PM Dream Job in 90 Days | Great IT Professional | May 2...How to Land Your Next PM Dream Job in 90 Days | Great IT Professional | May 2...
How to Land Your Next PM Dream Job in 90 Days | Great IT Professional | May 2...
 
Emotional Agility for Leaders | Great IT Professional | May 17, 2023
Emotional Agility for Leaders | Great IT Professional | May 17, 2023Emotional Agility for Leaders | Great IT Professional | May 17, 2023
Emotional Agility for Leaders | Great IT Professional | May 17, 2023
 
Project Management Trends in a Hybrid World | Great IT Professional | May 2,...
Project Management Trends in a Hybrid World  | Great IT Professional | May 2,...Project Management Trends in a Hybrid World  | Great IT Professional | May 2,...
Project Management Trends in a Hybrid World | Great IT Professional | May 2,...
 
How to Land Your Next PM Dream Job Quickly | PMI Silver Spring Chapter | Apri...
How to Land Your Next PM Dream Job Quickly | PMI Silver Spring Chapter | Apri...How to Land Your Next PM Dream Job Quickly | PMI Silver Spring Chapter | Apri...
How to Land Your Next PM Dream Job Quickly | PMI Silver Spring Chapter | Apri...
 
Your First 90 Days in a New Leadership Role | Great IT Professional | Februar...
Your First 90 Days in a New Leadership Role | Great IT Professional | Februar...Your First 90 Days in a New Leadership Role | Great IT Professional | Februar...
Your First 90 Days in a New Leadership Role | Great IT Professional | Februar...
 
How To Land Your Next Product Dream Job in 90 Days | ProductCamp DC
How To Land Your Next Product Dream Job in 90 Days  | ProductCamp DCHow To Land Your Next Product Dream Job in 90 Days  | ProductCamp DC
How To Land Your Next Product Dream Job in 90 Days | ProductCamp DC
 
Looking Back, Looking Ahead | December 2022 ProductCamp DC
Looking Back, Looking Ahead | December 2022 ProductCamp DCLooking Back, Looking Ahead | December 2022 ProductCamp DC
Looking Back, Looking Ahead | December 2022 ProductCamp DC
 
Future of Product Management 2023 | Product Summit Online™
Future of Product Management 2023 | Product Summit Online™Future of Product Management 2023 | Product Summit Online™
Future of Product Management 2023 | Product Summit Online™
 
Your First 90 Days in a New Product Role | Product Summit Online™
Your First 90 Days in a New Product Role | Product Summit Online™Your First 90 Days in a New Product Role | Product Summit Online™
Your First 90 Days in a New Product Role | Product Summit Online™
 
PM vs. PM | PMISSC 2022 Symposium
PM vs. PM | PMISSC 2022 SymposiumPM vs. PM | PMISSC 2022 Symposium
PM vs. PM | PMISSC 2022 Symposium
 

Recently uploaded

Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
kauryashika82
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
Chris Hunter
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
PECB
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 

Recently uploaded (20)

Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural ResourcesEnergy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 

Cloud01: Best Practices for Virtual Cloud Security - H. Del Castillo, AIPMM

  • 2. What We Will Discuss 1. What is cloud security 2. Current situation 3. Dimensions of cloud security 4. Security risks 5. Critical areas 6. Approaches to reduce risk 7. Key takeaways
  • 3. What is Cloud Security? • An evolving sub-domain of computer security • A broad set of policies, technologies, and controls deployed to protect data, applications, and the associated infrastructure of cloud computing • Should not be confused with ‘cloud-based’ security software offerings • Many commercial software vendors have cloud-based offerings such as anti-virus or vulnerability management
  • 4. Current Situation • Analysts estimate that cloud computing adoption will continue to rapidly increase • A single, massive cloud data center contains more computers than were on the entire internet just a few years ago • Security experts agree that the number of attacks and their level of sophistication will continue to grow
  • 5. Source: NIST Special Publication 800-144, Jan 2011
  • 6. Service Models Software Platform Infrastructure Deployment Models as a Service as a Service as a Service (SaaS) (PaaS) (IaaS) Private X X Hybrid X X X Public X X X Community X X X Source: NIST Special Publication 800-144, Jan 2011
  • 8. “Cloud Services market to grow to $42B by 2012.” - IDC Source: ZDNet Blogs
  • 9. Cloud Security Reference Model Source: Cloud Security Alliance
  • 10. Dimensions of Cloud Security • Security and Privacy – Data protection – Identity management – Physical and personnel security – Availability – Application security – Privacy Source: "Cloud Security Front and Center,” Forrester Research, 2009.
  • 11. Dimensions of Cloud Security • Compliance – Business continuity and data recovery – Logs and audit trails – Unique compliance requirements Source: "Cloud Security Front and Center,” Forrester Research, 2009.
  • 12. Dimensions of Cloud Security • Legal or Contractual Issues – Public records Source: "Cloud Security Front and Center,” Forrester Research, 2009.
  • 13. Security Risks 1. Privileged user access 2. Regulatory compliance 3. Data location 4. Data segregation 5. Recovery 6. Investigative support 7. Long-term viability Source: “Assessing the Security Risks of Cloud Computing,” Gartner, 2008.
  • 14. Critical Areas • Cloud Architecture – Cloud Computing Architectural Framework Source: "Security Guidance for Critical Areas of Focus in Cloud Computing V2.1,” CSA, 2009.
  • 15. Critical Areas • Governing in the Cloud – Governance and Enterprise Risk Management – Legal and Electronic Discovery – Compliance and Audit – Information Lifecycle Management – Portability and Interoperability Source: "Security Guidance for Critical Areas of Focus in Cloud Computing V2.1,” CSA, 2009.
  • 16. Critical Areas • Operating in the Cloud – Traditional Security, Business Continuity, and Disaster Recovery – Data Center Operations – Incident Response, Notification, and Remediation – Application Security – Encryption and Key Management – Identity and Access Management – Virtualization Source: "Security Guidance for Critical Areas of Focus in Cloud Computing V2.1,” CSA, 2009.
  • 17. Recommendations  Trust (4)  Transnational Data Flows (4)  Transparency (2)  Transformation (4) Source: “CLOUD2 Summary Report,” TechAmerica, 2011.
  • 18. Approaches to Reduce Risk Trust 1. (Security & Assurance Frameworks): Industry and government should support and participate in the development and implementation of international, standardized frameworks for securing, assessing, certifying and accrediting cloud solutions. Source: “CLOUD2 Summary Report,” TechAmerica, 2011.
  • 19. Approaches to Reduce Risk Trust 2. (Identity Management): Should accelerate the development of a private sector-led identity management ecosystem as envisioned by the National Strategy for Trusted Identities in Cyberspace (NSTIC) to facilitate the adoption of strong authentication technologies and enable users to gain secure access to cloud services and websites. Source: “CLOUD2 Summary Report,” TechAmerica, 2011.
  • 20. Approaches to Reduce Risk Trust 3. (Responses to Data Breaches): Government should enact a national data breach law to clarify breach notification responsibilities and commitments of companies to their customers, and also update and strengthen criminal laws against those who attack computer systems and networks, including cloud computing services. Source: “CLOUD2 Summary Report,” TechAmerica, 2011.
  • 21. Approaches to Reduce Risk Trust 4. (Research): Government, industry, and academia should develop and execute a joint cloud computing research agenda. Source: “CLOUD2 Summary Report,” TechAmerica, 2011.
  • 22. Approaches to Reduce Risk Transnational Data Flows 5. (Privacy): The U.S. government and industry should promote a comprehensive, technology-neutral privacy framework, consistent with commonly accepted privacy and data protection principles-based frameworks such as the OECD principles and/or APEC privacy frameworks. Source: “CLOUD2 Summary Report,” TechAmerica, 2011.
  • 23. Approaches to Reduce Risk Transnational Data Flows 6. (Government/Law Enforcement Access to Data): The U.S. government should demonstrate leadership in identifying and implementing mechanisms for lawful access by law enforcement or government to data stored in the cloud. Source: “CLOUD2 Summary Report,” TechAmerica, 2011.
  • 24. Approaches to Reduce Risk Transnational Data Flows 7. (E-Discovery and Forensics): Government and industry should enable effective practices for collecting information from the cloud to meet forensic or e-discovery needs in ways that fully support legal due process while minimizing impact on cloud provider operations. Source: “CLOUD2 Summary Report,” TechAmerica, 2011.
  • 25. Approaches to Reduce Risk Transnational Data Flows 8. (Lead by Example): The U.S. government should demonstrate its willingness to trust cloud computing environments in other countries for appropriate government workloads. Source: “CLOUD2 Summary Report,” TechAmerica, 2011.
  • 26. Approaches to Reduce Risk Transparency 9. (Transparency): Industry should publicly disclose information about relevant operational aspects of their cloud services, including portability, interoperability, security, certifications, performance and reliability. Source: “CLOUD2 Summary Report,” TechAmerica, 2011.
  • 27. Approaches to Reduce Risk Transparency 10. (Data Portability): Cloud providers should enable portability of user data through documents, tools, and support for agreed- upon industry standards and best practices. Source: “CLOUD2 Summary Report,” TechAmerica, 2011.
  • 28. Approaches to Reduce Risk Transformation 11. (Federal Acquisition and Budgeting): Agencies should demonstrate flexibility in adapting existing procurement models to facilitate acquisition of cloud services and solutions. Congress and OMB should demonstrate flexibility in changing budget models to help agencies acquire cloud services and solutions. Source: “CLOUD2 Summary Report,” TechAmerica, 2011.
  • 29. Approaches to Reduce Risk Transformation 12. (Incentives): Government should establish policies and processes for providing fiscal incentives, rewards and support for agencies as they take steps towards implementing cloud deployments. Source: “CLOUD2 Summary Report,” TechAmerica, 2011.
  • 30. Approaches to Reduce Risk Transformation 13. (Improve Infrastructure): Government and industry should embrace the modernization of broadband infrastructure and the current move to IPv6 to improve the bandwidth and reliable connectivity necessary for the growth of cloud services. Source: “CLOUD2 Summary Report,” TechAmerica, 2011.
  • 31. Approaches to Reduce Risk Transformation 14. (Education/Training): Government, industry, and academia should develop and disseminate resources for major stakeholder communities to be educated on the technical, business, and policy issues around acquisition, deployment and operation of cloud services. Source: “CLOUD2 Summary Report,” TechAmerica, 2011.
  • 32. Key Takeaways 1 • Cloud security continues to evolve • Security issues are global and impact providers 2 and customers • Cloud security requires action for government, 3 industry and academia • Data owner must implement traditional layered 4 security approach • Data owner must segregate data from 5 application
  • 33. Recommended AFCOM Sessions 1. "DCM18: Securing the Virtualized Environment,” Robert Klotz, Akibia, 2011. 2. "DCP10: How Social Media and the Cloud Impact Data Center Security,” James Danburg, SA2, 2011. 3. "Cloud07: Managing the Transition Cloud,” Brent Eubanks, Latisys, 2011. 4. "Cloud04: The Ins and Outs of Virtual Private Clouds,” Sundar Raghavan, Skytap, 2011.
  • 34. Recommended Reading 1. “Assessing the Security Risks of Cloud Computing,” Gartner, 3 June 2008. 2. "Cloud Security Front and Center,” Forrester Research, 18 Nov 2009. 3. "Security Guidance for Critical Areas of Focus in Cloud Computing V2.1,” Cloud Security Alliance, 2009. 4. “Guidelines on Security and Privacy in Public Cloud Computing, NIST Special Publication 800-144, Jan 2011. 5. “Summary Report of the Commission on the Leadership Opportunity in U.S. Deployment of the Cloud,” TechAmerica Foundation, July 2011.
  • 35. Join My Professional Network! Hector Del Castillo, PMP, CPM, CPMM linkd.in/hdelcastillo hmdelcastillo@aipmm.com