SlideShare ist ein Scribd-Unternehmen logo
1 von 72
10 Things I've Learned
About Cloud Security &
      Other Stuff
       Bill Mathews
        (@billford)
Introduction
Introduction
• Who Am I?
Introduction
• Who Am I?
• Why Am I Here?
Introduction
• Who Am I?
• Why Am I Here?
• Why I Care About The Cloud
Introduction
• Who Am I?
• Why Am I Here?
• Why I Care About The Cloud
• Why You Should Too
Top 10 Lists
Top 10 Lists
          • Assumes too much
            knowledge
Top 10 Lists
          • Assumes too much
            knowledge
          • Makes me turn green
            with rage
Top 10 Lists
          • Assumes too much
            knowledge
          • Makes me turn green
            with rage
          • However it is an easier
            way to break things down
            so this is just 10 things
            I've learned
Top 10 Lists
          • Assumes too much
            knowledge
          • Makes me turn green
            with rage
          • However it is an easier
            way to break things down
            so this is just 10 things
            I've learned
          • I wanted to provide a
            basic framework for
            discussion
Why Cloud? Why?
  ^^ Very popular question
           The #1 reason and
           really the only one you
           need is that your users
           are using it. It doesn't
           matter what you think,
           what your feelings are,
           they're using it and
           you better get a grip
           on it.
Control Panels –
A Tale of Two Techs
Control Panels –
A Tale of Two Techs
      • Good / Bad and can be really
        really ugly
Control Panels –
A Tale of Two Techs
      • Good / Bad and can be really
        really ugly
      • Really depends on the provider
Control Panels –
A Tale of Two Techs
      • Good / Bad and can be really
        really ugly
      • Really depends on the provider
      • Can be very granular
Control Panels –
A Tale of Two Techs
      • Good / Bad and can be really
        really ugly
      • Really depends on the provider
      • Can be very granular
      • Can be very limiting
Uptime/Downtime –
Ouch That Hurts
Uptime/Downtime –
Ouch That Hurts

  • This is NOT a problem limited
    to the cloud
Uptime/Downtime –
Ouch That Hurts

  • This is NOT a problem limited
    to the cloud
  • This is a computer problem
Uptime/Downtime –
Ouch That Hurts

  • This is NOT a problem limited
    to the cloud
  • This is a computer problem
  • Budgetary Considerations
Uptime/Downtime –
Ouch That Hurts

  • This is NOT a problem limited
    to the cloud
  • This is a computer problem
  • Budgetary Considerations
  • Personal Experiences
    (Oh Amazon, what have you done?)
APIs – The Bars of
The Cloudy Jail
APIs – The Bars of
The Cloudy Jail
        • A brief history of API
APIs – The Bars of
The Cloudy Jail
        • A brief history of API
        • What can an API do for you?
APIs – The Bars of
The Cloudy Jail
        • A brief history of API
        • What can an API do for you?
        • Why you should like them
APIs – The Bars of
The Cloudy Jail
        • A brief history of API
        • What can an API do for you?
        • Why you should like them
        • Why you should hate them
APIs – The Bars of
The Cloudy Jail
        • A brief history of API
        • What can an API do for you?
        • Why you should like them
        • Why you should hate them
        • Why you should strongly
          distrust them
APIs – The Bars of
The Cloudy Jail
        • A brief history of API
        • What can an API do for you?
        • Why you should like them
        • Why you should hate them
        • Why you should strongly
          distrust them
        • You should really get to know
          them though, seriously
Firewalls Are Dead...
Long Live Firewalls
Firewalls Are Dead...
Long Live Firewalls
• Death of firewalls in the cloud
Firewalls Are Dead...
Long Live Firewalls
• Death of firewalls in the cloud
• Rebirth of firewalls in the cloud
Firewalls Are Dead...
Long Live Firewalls
• Death of firewalls in the cloud
• Rebirth of firewalls in the cloud
• Benefits
Firewalls Are Dead...
Long Live Firewalls
• Death of firewalls in the cloud
• Rebirth of firewalls in the cloud
• Benefits
• Pitfalls
Firewalls Are Dead...
Long Live Firewalls
• Death of firewalls in the cloud
• Rebirth of firewalls in the cloud
• Benefits
• Pitfalls
• Cautionary Tales
Redundancy –
No The Cloud Isn't Magic
Redundancy –
No The Cloud Isn't Magic
      • Yes you still have to plan for
        redundancy and availability,
        even in the cloud
Redundancy –
No The Cloud Isn't Magic
      • Yes you still have to plan for
        redundancy and availability,
        even in the cloud
      • Marketing people lie
        (are you shocked yet?)
Redundancy –
No The Cloud Isn't Magic
      • Yes you still have to plan for
        redundancy and availability,
        even in the cloud
      • Marketing people lie
        (are you shocked yet?)
      • Load Balancing across one
        provider is cool
Redundancy –
No The Cloud Isn't Magic
      • Yes you still have to plan for
        redundancy and availability,
        even in the cloud
      • Marketing people lie
        (are you shocked yet?)
      • Load Balancing across one
        provider is cool
      • Load Balancing across
        multiple providers would be
        mega-awesome-cool
Encrypt Early /
Encrypt Often
Encrypt Early /
Encrypt Often
        • Seriously, just encrypt
          your stuff
Encrypt Early /
Encrypt Often
        • Seriously, just encrypt
          your stuff
        • Logsup experiences
Encrypt Early /
Encrypt Often
        • Seriously, just encrypt
          your stuff
        • Logsup experiences
        • Multi-tenancy is an
          element of the cloud
          you cannot control
Encrypt Early /
Encrypt Often
        • Seriously, just encrypt
          your stuff
        • Logsup experiences
        • Multi-tenancy is an
          element of the cloud
          you cannot control
        • Same can be said of
          your VMWare, Xen,
          whatever infrastructure
Cloud is Cheap!
Cloud is Cheap!
       • Infrastructure as a
         Service (IaaS)
Cloud is Cheap!
       • Infrastructure as a
         Service (IaaS)
       • Platform as a Service
         (PaaS)
Cloud is Cheap!
       • Infrastructure as a
         Service (IaaS)
       • Platform as a Service
         (PaaS)
       • Software as a Service
         (Saas)
Cloud is Cheap!
       • Infrastructure as a
         Service (IaaS)
       • Platform as a Service
         (PaaS)
       • Software as a Service
         (Saas)
       • Cost vs Benefit vs
         Pulling Your Hair Out
         (like me)
Logs in the Cloud –
Long May it Rain
Logs in the Cloud –
       Long May it Rain
•YES you can have your logs
 from and in the cloud and you
 can analyze them too
Logs in the Cloud –
       Long May it Rain
•YES you can have your logs
 from and in the cloud and you
 can analyze them too
•www.loggly.com
Logs in the Cloud –
       Long May it Rain
•YES you can have your logs
 from and in the cloud and you
 can analyze them too
•www.loggly.com
•www.splunkstorm.com
Logs in the Cloud –
       Long May it Rain
•YES you can have your logs
 from and in the cloud and you
 can analyze them too
•www.loggly.com
•www.splunkstorm.com
• Access to your logs
Logs in the Cloud –
       Long May it Rain
•YES you can have your logs
 from and in the cloud and you
 can analyze them too
•www.loggly.com
•www.splunkstorm.com
• Access to your logs
• What to expect
Logs in the Cloud –
       Long May it Rain
•YES you can have your logs
 from and in the cloud and you
 can analyze them too
•www.loggly.com
•www.splunkstorm.com
• Access to your logs
• What to expect
• What not to expect
SLA or Seriously,
Lawyers Again
SLA or Seriously,
Lawyers Again
     • Service Level Agreements
SLA or Seriously,
Lawyers Again
     • Service Level Agreements
     • Uptime guarantees
SLA or Seriously,
Lawyers Again
     • Service Level Agreements
     • Uptime guarantees
     • Compensation for violation
SLA or Seriously,
Lawyers Again
     • Service Level Agreements
     • Uptime guarantees
     • Compensation for violation
     • Some examples
Random Stuff
Random Stuff
• Monitoring in/for the Cloud
Random Stuff
• Monitoring in/for the Cloud
• Amazonian Law
Random Stuff
• Monitoring in/for the Cloud
• Amazonian Law
• Google App Engine
Random Stuff
• Monitoring in/for the Cloud
• Amazonian Law
• Google App Engine
• Uses for various cloud tech
Random Stuff
• Monitoring in/for the Cloud
• Amazonian Law
• Google App Engine
• Uses for various cloud tech
   • Password Cracking/Brute Force
Random Stuff
• Monitoring in/for the Cloud
• Amazonian Law
• Google App Engine
• Uses for various cloud tech
   • Password Cracking/Brute Force
   • Penetration Testing
Random Stuff
• Monitoring in/for the Cloud
• Amazonian Law
• Google App Engine
• Uses for various cloud tech
   • Password Cracking/Brute Force
   • Penetration Testing
   • QA Testing
Random Stuff
• Monitoring in/for the Cloud
• Amazonian Law
• Google App Engine
• Uses for various cloud tech
   • Password Cracking/Brute Force
   • Penetration Testing
   • QA Testing
   • Auditing
Wrap Up / Q&A
• Wrap Up
• Q&A
• Possible Brawl?
• This Presentation is
  Licensed Under
  Creative Commons

Weitere ähnliche Inhalte

Andere mochten auch

An enhancing security for mobile sinks by providing location privacy in wsn
An enhancing security for mobile sinks by providing location privacy in wsnAn enhancing security for mobile sinks by providing location privacy in wsn
An enhancing security for mobile sinks by providing location privacy in wsneSAT Publishing House
 
Sample Cloud Security - Europe
Sample Cloud Security - EuropeSample Cloud Security - Europe
Sample Cloud Security - EuropeResearchFox
 
SearchLove San Diego 2015 | Cindy Krum, 'Mobile-First SEO and How to Prepare ...
SearchLove San Diego 2015 | Cindy Krum, 'Mobile-First SEO and How to Prepare ...SearchLove San Diego 2015 | Cindy Krum, 'Mobile-First SEO and How to Prepare ...
SearchLove San Diego 2015 | Cindy Krum, 'Mobile-First SEO and How to Prepare ...Distilled
 
Increasing Android app security for free - Roberto Gassirà, Roberto Piccirill...
Increasing Android app security for free - Roberto Gassirà, Roberto Piccirill...Increasing Android app security for free - Roberto Gassirà, Roberto Piccirill...
Increasing Android app security for free - Roberto Gassirà, Roberto Piccirill...Codemotion
 
Whoscall 的 Realtime Monitoring 經驗分享
Whoscall 的 Realtime Monitoring 經驗分享Whoscall 的 Realtime Monitoring 經驗分享
Whoscall 的 Realtime Monitoring 經驗分享William Yeh
 
Introduction to Apache Spark Developer Training
Introduction to Apache Spark Developer TrainingIntroduction to Apache Spark Developer Training
Introduction to Apache Spark Developer TrainingCloudera, Inc.
 
Cloud computing security issues and challenges
Cloud computing security issues and challengesCloud computing security issues and challenges
Cloud computing security issues and challengesDheeraj Negi
 

Andere mochten auch (8)

An enhancing security for mobile sinks by providing location privacy in wsn
An enhancing security for mobile sinks by providing location privacy in wsnAn enhancing security for mobile sinks by providing location privacy in wsn
An enhancing security for mobile sinks by providing location privacy in wsn
 
Sample Cloud Security - Europe
Sample Cloud Security - EuropeSample Cloud Security - Europe
Sample Cloud Security - Europe
 
SearchLove San Diego 2015 | Cindy Krum, 'Mobile-First SEO and How to Prepare ...
SearchLove San Diego 2015 | Cindy Krum, 'Mobile-First SEO and How to Prepare ...SearchLove San Diego 2015 | Cindy Krum, 'Mobile-First SEO and How to Prepare ...
SearchLove San Diego 2015 | Cindy Krum, 'Mobile-First SEO and How to Prepare ...
 
Increasing Android app security for free - Roberto Gassirà, Roberto Piccirill...
Increasing Android app security for free - Roberto Gassirà, Roberto Piccirill...Increasing Android app security for free - Roberto Gassirà, Roberto Piccirill...
Increasing Android app security for free - Roberto Gassirà, Roberto Piccirill...
 
Elasticsearch
ElasticsearchElasticsearch
Elasticsearch
 
Whoscall 的 Realtime Monitoring 經驗分享
Whoscall 的 Realtime Monitoring 經驗分享Whoscall 的 Realtime Monitoring 經驗分享
Whoscall 的 Realtime Monitoring 經驗分享
 
Introduction to Apache Spark Developer Training
Introduction to Apache Spark Developer TrainingIntroduction to Apache Spark Developer Training
Introduction to Apache Spark Developer Training
 
Cloud computing security issues and challenges
Cloud computing security issues and challengesCloud computing security issues and challenges
Cloud computing security issues and challenges
 

Ähnlich wie Cloud Security: Ten Things

Cloud conference - mongodb
Cloud conference - mongodbCloud conference - mongodb
Cloud conference - mongodbMitch Pirtle
 
Release the Monkeys ! Testing in the Wild at Netflix
Release the Monkeys !  Testing in the Wild at NetflixRelease the Monkeys !  Testing in the Wild at Netflix
Release the Monkeys ! Testing in the Wild at NetflixGareth Bowles
 
Clean Code - 5
Clean Code - 5Clean Code - 5
Clean Code - 5Don Kim
 
Basic Security for Digital Companies - #MarketersUnbound (2014)
Basic Security for Digital Companies - #MarketersUnbound (2014)Basic Security for Digital Companies - #MarketersUnbound (2014)
Basic Security for Digital Companies - #MarketersUnbound (2014)Justin Bull
 
Social dev camp_2011
Social dev camp_2011Social dev camp_2011
Social dev camp_2011Craig Ulliott
 
Dev/Test in the Cloud - F
Dev/Test in the Cloud - FDev/Test in the Cloud - F
Dev/Test in the Cloud - FChris Riley ☁
 
Jax Devops 2017 Succeeding in the Cloud – the guidebook of Fail
Jax Devops 2017  Succeeding in the Cloud – the guidebook of FailJax Devops 2017  Succeeding in the Cloud – the guidebook of Fail
Jax Devops 2017 Succeeding in the Cloud – the guidebook of FailSteve Poole
 
The cloud is my laboratory, Adam Friedman
The cloud is my laboratory, Adam FriedmanThe cloud is my laboratory, Adam Friedman
The cloud is my laboratory, Adam FriedmanStephen Wallace
 
6 reasons Jubilee could be a Rubyist's new best friend
6 reasons Jubilee could be a Rubyist's new best friend6 reasons Jubilee could be a Rubyist's new best friend
6 reasons Jubilee could be a Rubyist's new best friendForrest Chang
 
The Straight Skinny on Cloud Platforms
The Straight Skinny on Cloud PlatformsThe Straight Skinny on Cloud Platforms
The Straight Skinny on Cloud PlatformsHostway|HOSTING
 
SQL Server High Availability and DR - Too Many Choices!
SQL Server High Availability and DR - Too Many Choices!SQL Server High Availability and DR - Too Many Choices!
SQL Server High Availability and DR - Too Many Choices!Mike Walsh
 
Refactoring RIA Unleashed 2011
Refactoring RIA Unleashed 2011Refactoring RIA Unleashed 2011
Refactoring RIA Unleashed 2011Jesse Warden
 
Deploying distributed software services to the cloud without breaking a sweat
Deploying distributed software services to the cloud without breaking a sweatDeploying distributed software services to the cloud without breaking a sweat
Deploying distributed software services to the cloud without breaking a sweatSusan Potter
 
Distributed software services to the cloud without breaking a sweat
Distributed software services to the cloud without breaking a sweatDistributed software services to the cloud without breaking a sweat
Distributed software services to the cloud without breaking a sweatJosé Ferreiro
 
Design for Scale / Surge 2010
Design for Scale / Surge 2010Design for Scale / Surge 2010
Design for Scale / Surge 2010Christopher Brown
 
THE PLEASURES OF ON-PREM, TOMER GABEL
THE PLEASURES OF ON-PREM, TOMER GABELTHE PLEASURES OF ON-PREM, TOMER GABEL
THE PLEASURES OF ON-PREM, TOMER GABELDevOpsDays Tel Aviv
 
The business case for contributing code
The business case for contributing codeThe business case for contributing code
The business case for contributing codeZivtech, LLC
 
Stop Worrying about Prodweb001 and Start Loving i-98fb9856 (ARC201) | AWS re:...
Stop Worrying about Prodweb001 and Start Loving i-98fb9856 (ARC201) | AWS re:...Stop Worrying about Prodweb001 and Start Loving i-98fb9856 (ARC201) | AWS re:...
Stop Worrying about Prodweb001 and Start Loving i-98fb9856 (ARC201) | AWS re:...Amazon Web Services
 

Ähnlich wie Cloud Security: Ten Things (20)

Cloud conference - mongodb
Cloud conference - mongodbCloud conference - mongodb
Cloud conference - mongodb
 
Release the Monkeys ! Testing in the Wild at Netflix
Release the Monkeys !  Testing in the Wild at NetflixRelease the Monkeys !  Testing in the Wild at Netflix
Release the Monkeys ! Testing in the Wild at Netflix
 
Clean Code - 5
Clean Code - 5Clean Code - 5
Clean Code - 5
 
Ds @ bol
Ds @ bolDs @ bol
Ds @ bol
 
Basic Security for Digital Companies - #MarketersUnbound (2014)
Basic Security for Digital Companies - #MarketersUnbound (2014)Basic Security for Digital Companies - #MarketersUnbound (2014)
Basic Security for Digital Companies - #MarketersUnbound (2014)
 
Social dev camp_2011
Social dev camp_2011Social dev camp_2011
Social dev camp_2011
 
Dev/Test in the Cloud - F
Dev/Test in the Cloud - FDev/Test in the Cloud - F
Dev/Test in the Cloud - F
 
Jax Devops 2017 Succeeding in the Cloud – the guidebook of Fail
Jax Devops 2017  Succeeding in the Cloud – the guidebook of FailJax Devops 2017  Succeeding in the Cloud – the guidebook of Fail
Jax Devops 2017 Succeeding in the Cloud – the guidebook of Fail
 
The cloud is my laboratory, Adam Friedman
The cloud is my laboratory, Adam FriedmanThe cloud is my laboratory, Adam Friedman
The cloud is my laboratory, Adam Friedman
 
6 reasons Jubilee could be a Rubyist's new best friend
6 reasons Jubilee could be a Rubyist's new best friend6 reasons Jubilee could be a Rubyist's new best friend
6 reasons Jubilee could be a Rubyist's new best friend
 
The Straight Skinny on Cloud Platforms
The Straight Skinny on Cloud PlatformsThe Straight Skinny on Cloud Platforms
The Straight Skinny on Cloud Platforms
 
SQL Server High Availability and DR - Too Many Choices!
SQL Server High Availability and DR - Too Many Choices!SQL Server High Availability and DR - Too Many Choices!
SQL Server High Availability and DR - Too Many Choices!
 
Refactoring RIA Unleashed 2011
Refactoring RIA Unleashed 2011Refactoring RIA Unleashed 2011
Refactoring RIA Unleashed 2011
 
Why puppet? Why now?
Why puppet? Why now?Why puppet? Why now?
Why puppet? Why now?
 
Deploying distributed software services to the cloud without breaking a sweat
Deploying distributed software services to the cloud without breaking a sweatDeploying distributed software services to the cloud without breaking a sweat
Deploying distributed software services to the cloud without breaking a sweat
 
Distributed software services to the cloud without breaking a sweat
Distributed software services to the cloud without breaking a sweatDistributed software services to the cloud without breaking a sweat
Distributed software services to the cloud without breaking a sweat
 
Design for Scale / Surge 2010
Design for Scale / Surge 2010Design for Scale / Surge 2010
Design for Scale / Surge 2010
 
THE PLEASURES OF ON-PREM, TOMER GABEL
THE PLEASURES OF ON-PREM, TOMER GABELTHE PLEASURES OF ON-PREM, TOMER GABEL
THE PLEASURES OF ON-PREM, TOMER GABEL
 
The business case for contributing code
The business case for contributing codeThe business case for contributing code
The business case for contributing code
 
Stop Worrying about Prodweb001 and Start Loving i-98fb9856 (ARC201) | AWS re:...
Stop Worrying about Prodweb001 and Start Loving i-98fb9856 (ARC201) | AWS re:...Stop Worrying about Prodweb001 and Start Loving i-98fb9856 (ARC201) | AWS re:...
Stop Worrying about Prodweb001 and Start Loving i-98fb9856 (ARC201) | AWS re:...
 

Mehr von Coastal Pet Products, Inc. (13)

Defense in Depth – Your Security Castle
Defense in Depth – Your Security CastleDefense in Depth – Your Security Castle
Defense in Depth – Your Security Castle
 
IT Security in 2014
IT Security in 2014IT Security in 2014
IT Security in 2014
 
Printer Security
Printer SecurityPrinter Security
Printer Security
 
Domain Name System
Domain Name SystemDomain Name System
Domain Name System
 
Using Big Data for Security Alerting
Using Big Data for Security Alerting Using Big Data for Security Alerting
Using Big Data for Security Alerting
 
SNMP & The Dark Side of the Force
SNMP & The Dark Side of the Force SNMP & The Dark Side of the Force
SNMP & The Dark Side of the Force
 
Sounds of Security
Sounds of SecuritySounds of Security
Sounds of Security
 
Beyond The Splunk App for Enterprise Security
Beyond The Splunk App for Enterprise SecurityBeyond The Splunk App for Enterprise Security
Beyond The Splunk App for Enterprise Security
 
Encryption for Everyone
Encryption for EveryoneEncryption for Everyone
Encryption for Everyone
 
Attacking and Defending Full Disk Encryption
Attacking and Defending Full Disk EncryptionAttacking and Defending Full Disk Encryption
Attacking and Defending Full Disk Encryption
 
Competitive Cyber Security
Competitive Cyber SecurityCompetitive Cyber Security
Competitive Cyber Security
 
Forensics for the Defense
Forensics for the DefenseForensics for the Defense
Forensics for the Defense
 
Big Data, Security Intelligence, (And Why I Hate This Title)
Big Data, Security Intelligence, (And Why I Hate This Title) Big Data, Security Intelligence, (And Why I Hate This Title)
Big Data, Security Intelligence, (And Why I Hate This Title)
 

Kürzlich hochgeladen

The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 

Kürzlich hochgeladen (20)

The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 

Cloud Security: Ten Things

  • 1. 10 Things I've Learned About Cloud Security & Other Stuff Bill Mathews (@billford)
  • 4. Introduction • Who Am I? • Why Am I Here?
  • 5. Introduction • Who Am I? • Why Am I Here? • Why I Care About The Cloud
  • 6. Introduction • Who Am I? • Why Am I Here? • Why I Care About The Cloud • Why You Should Too
  • 8. Top 10 Lists • Assumes too much knowledge
  • 9. Top 10 Lists • Assumes too much knowledge • Makes me turn green with rage
  • 10. Top 10 Lists • Assumes too much knowledge • Makes me turn green with rage • However it is an easier way to break things down so this is just 10 things I've learned
  • 11. Top 10 Lists • Assumes too much knowledge • Makes me turn green with rage • However it is an easier way to break things down so this is just 10 things I've learned • I wanted to provide a basic framework for discussion
  • 12. Why Cloud? Why? ^^ Very popular question The #1 reason and really the only one you need is that your users are using it. It doesn't matter what you think, what your feelings are, they're using it and you better get a grip on it.
  • 13. Control Panels – A Tale of Two Techs
  • 14. Control Panels – A Tale of Two Techs • Good / Bad and can be really really ugly
  • 15. Control Panels – A Tale of Two Techs • Good / Bad and can be really really ugly • Really depends on the provider
  • 16. Control Panels – A Tale of Two Techs • Good / Bad and can be really really ugly • Really depends on the provider • Can be very granular
  • 17. Control Panels – A Tale of Two Techs • Good / Bad and can be really really ugly • Really depends on the provider • Can be very granular • Can be very limiting
  • 19. Uptime/Downtime – Ouch That Hurts • This is NOT a problem limited to the cloud
  • 20. Uptime/Downtime – Ouch That Hurts • This is NOT a problem limited to the cloud • This is a computer problem
  • 21. Uptime/Downtime – Ouch That Hurts • This is NOT a problem limited to the cloud • This is a computer problem • Budgetary Considerations
  • 22. Uptime/Downtime – Ouch That Hurts • This is NOT a problem limited to the cloud • This is a computer problem • Budgetary Considerations • Personal Experiences (Oh Amazon, what have you done?)
  • 23. APIs – The Bars of The Cloudy Jail
  • 24. APIs – The Bars of The Cloudy Jail • A brief history of API
  • 25. APIs – The Bars of The Cloudy Jail • A brief history of API • What can an API do for you?
  • 26. APIs – The Bars of The Cloudy Jail • A brief history of API • What can an API do for you? • Why you should like them
  • 27. APIs – The Bars of The Cloudy Jail • A brief history of API • What can an API do for you? • Why you should like them • Why you should hate them
  • 28. APIs – The Bars of The Cloudy Jail • A brief history of API • What can an API do for you? • Why you should like them • Why you should hate them • Why you should strongly distrust them
  • 29. APIs – The Bars of The Cloudy Jail • A brief history of API • What can an API do for you? • Why you should like them • Why you should hate them • Why you should strongly distrust them • You should really get to know them though, seriously
  • 30. Firewalls Are Dead... Long Live Firewalls
  • 31. Firewalls Are Dead... Long Live Firewalls • Death of firewalls in the cloud
  • 32. Firewalls Are Dead... Long Live Firewalls • Death of firewalls in the cloud • Rebirth of firewalls in the cloud
  • 33. Firewalls Are Dead... Long Live Firewalls • Death of firewalls in the cloud • Rebirth of firewalls in the cloud • Benefits
  • 34. Firewalls Are Dead... Long Live Firewalls • Death of firewalls in the cloud • Rebirth of firewalls in the cloud • Benefits • Pitfalls
  • 35. Firewalls Are Dead... Long Live Firewalls • Death of firewalls in the cloud • Rebirth of firewalls in the cloud • Benefits • Pitfalls • Cautionary Tales
  • 36. Redundancy – No The Cloud Isn't Magic
  • 37. Redundancy – No The Cloud Isn't Magic • Yes you still have to plan for redundancy and availability, even in the cloud
  • 38. Redundancy – No The Cloud Isn't Magic • Yes you still have to plan for redundancy and availability, even in the cloud • Marketing people lie (are you shocked yet?)
  • 39. Redundancy – No The Cloud Isn't Magic • Yes you still have to plan for redundancy and availability, even in the cloud • Marketing people lie (are you shocked yet?) • Load Balancing across one provider is cool
  • 40. Redundancy – No The Cloud Isn't Magic • Yes you still have to plan for redundancy and availability, even in the cloud • Marketing people lie (are you shocked yet?) • Load Balancing across one provider is cool • Load Balancing across multiple providers would be mega-awesome-cool
  • 42. Encrypt Early / Encrypt Often • Seriously, just encrypt your stuff
  • 43. Encrypt Early / Encrypt Often • Seriously, just encrypt your stuff • Logsup experiences
  • 44. Encrypt Early / Encrypt Often • Seriously, just encrypt your stuff • Logsup experiences • Multi-tenancy is an element of the cloud you cannot control
  • 45. Encrypt Early / Encrypt Often • Seriously, just encrypt your stuff • Logsup experiences • Multi-tenancy is an element of the cloud you cannot control • Same can be said of your VMWare, Xen, whatever infrastructure
  • 47. Cloud is Cheap! • Infrastructure as a Service (IaaS)
  • 48. Cloud is Cheap! • Infrastructure as a Service (IaaS) • Platform as a Service (PaaS)
  • 49. Cloud is Cheap! • Infrastructure as a Service (IaaS) • Platform as a Service (PaaS) • Software as a Service (Saas)
  • 50. Cloud is Cheap! • Infrastructure as a Service (IaaS) • Platform as a Service (PaaS) • Software as a Service (Saas) • Cost vs Benefit vs Pulling Your Hair Out (like me)
  • 51. Logs in the Cloud – Long May it Rain
  • 52. Logs in the Cloud – Long May it Rain •YES you can have your logs from and in the cloud and you can analyze them too
  • 53. Logs in the Cloud – Long May it Rain •YES you can have your logs from and in the cloud and you can analyze them too •www.loggly.com
  • 54. Logs in the Cloud – Long May it Rain •YES you can have your logs from and in the cloud and you can analyze them too •www.loggly.com •www.splunkstorm.com
  • 55. Logs in the Cloud – Long May it Rain •YES you can have your logs from and in the cloud and you can analyze them too •www.loggly.com •www.splunkstorm.com • Access to your logs
  • 56. Logs in the Cloud – Long May it Rain •YES you can have your logs from and in the cloud and you can analyze them too •www.loggly.com •www.splunkstorm.com • Access to your logs • What to expect
  • 57. Logs in the Cloud – Long May it Rain •YES you can have your logs from and in the cloud and you can analyze them too •www.loggly.com •www.splunkstorm.com • Access to your logs • What to expect • What not to expect
  • 59. SLA or Seriously, Lawyers Again • Service Level Agreements
  • 60. SLA or Seriously, Lawyers Again • Service Level Agreements • Uptime guarantees
  • 61. SLA or Seriously, Lawyers Again • Service Level Agreements • Uptime guarantees • Compensation for violation
  • 62. SLA or Seriously, Lawyers Again • Service Level Agreements • Uptime guarantees • Compensation for violation • Some examples
  • 64. Random Stuff • Monitoring in/for the Cloud
  • 65. Random Stuff • Monitoring in/for the Cloud • Amazonian Law
  • 66. Random Stuff • Monitoring in/for the Cloud • Amazonian Law • Google App Engine
  • 67. Random Stuff • Monitoring in/for the Cloud • Amazonian Law • Google App Engine • Uses for various cloud tech
  • 68. Random Stuff • Monitoring in/for the Cloud • Amazonian Law • Google App Engine • Uses for various cloud tech • Password Cracking/Brute Force
  • 69. Random Stuff • Monitoring in/for the Cloud • Amazonian Law • Google App Engine • Uses for various cloud tech • Password Cracking/Brute Force • Penetration Testing
  • 70. Random Stuff • Monitoring in/for the Cloud • Amazonian Law • Google App Engine • Uses for various cloud tech • Password Cracking/Brute Force • Penetration Testing • QA Testing
  • 71. Random Stuff • Monitoring in/for the Cloud • Amazonian Law • Google App Engine • Uses for various cloud tech • Password Cracking/Brute Force • Penetration Testing • QA Testing • Auditing
  • 72. Wrap Up / Q&A • Wrap Up • Q&A • Possible Brawl? • This Presentation is Licensed Under Creative Commons

Hinweis der Redaktion

  1. \n
  2. \n
  3. \n
  4. \n
  5. \n
  6. \n
  7. \n
  8. \n
  9. \n
  10. \n
  11. \n
  12. \n
  13. \n
  14. \n
  15. \n
  16. \n
  17. \n
  18. \n
  19. \n
  20. \n
  21. \n
  22. \n
  23. \n
  24. \n
  25. \n
  26. \n
  27. \n
  28. \n
  29. \n
  30. \n
  31. \n
  32. \n
  33. \n
  34. \n
  35. \n
  36. \n
  37. \n
  38. \n
  39. \n
  40. \n
  41. \n
  42. \n
  43. \n
  44. \n
  45. \n
  46. \n
  47. \n
  48. \n
  49. \n
  50. \n
  51. \n
  52. \n
  53. \n
  54. \n
  55. \n
  56. \n
  57. \n
  58. \n
  59. \n
  60. \n