SlideShare ist ein Scribd-Unternehmen logo
1 von 13
Downloaden Sie, um offline zu lesen
Secure Cloud Computing:
 An Architecture Ontology Approach
                       KEVIN JACKSON
Forces Driving Cloud Computing - The New IT Era




  rev date 3/25/2009        slide 2
Cloud Computing Value




rev date 3/25/2009       slide 3
Cloud Computing Challenge




rev date 3/25/2009       slide 4
Unified Ontology of Cloud Computing
  (http://www.cs.ucsb.edu/~lyouseff/CCOntology/CloudOntology.pdf)




                                                                    Cloud Application
                                                                         (SaaS)
                                                                      Cloud Software Environment
                                                                                 (PaaS)

                                                           Cloud Software Infrastructure
                                            Computational                Storage        Communications
                                           Resources (IaaS)               (DaaS)           (CaaS)

                                                                    Software Kernal

                                                             Firmware / Hardware (HaaS)

Lamia Youseff
University of California, Santa Barbara

Maria Butrico, Dilma Da Silva
IBM T.J. Watson Research Center
Tactical Employment Issues
 Internet connectivity assumed
 SOA platform
   • Security management
   • Application service discovery and management
   • Workflow orchestration
 Access management
Ontology Modifications for Tactical Cloud Computing
                             Access Management
                              Cloud Application
                             Access Management
                                    (SaaS)
                           Cloud Application (SaaS)
                           Cloud Application (SaaS)
                              Cloud Application
                   Workflow Orchestration – Policy Engine
                                      (SaaS)
                              Workflow Orchestration
                                    Security API
                                   Cloud Software Environment
                                    Security API
                           Services / Services(PaaS)
                                                Discovery
                                   Cloud Software Environment
                           Services / Services Discovery
                                               (PaaS)
                                Service Management
                                Service Management
                                      Cloud Software Environment
                         Cloud Software Infrastructure
                                                   (PaaS)
                                      Cloud Software Environment
                         Cloud Software Infrastructure
                                                  (PaaS)
                              Cloud Software Infrastructure
                                 Network Security Communications
              Computational           Storage
                              Cloud Software Infrastructure
              Computational           Storage         Communications
             Resources (IaaS)          (DaaS)             (CaaS)
                              Network(DaaS)
                                        Connectivity
             Resources (IaaS)                             (CaaS)
                    ComputationalNetwork Storage        Communications
                                           Security
      Computational Resources (IaaS)
                     Resources             (DaaS)          (CaaS)
                                       Storage
                                                        Communications (CaaS)
                                  Software Kernal
              (IaaS)                    (DaaS)
                                  Software Kernal
                               Software Kernal
                               Software Kernal
                        Firmware / Hardware (HaaS)
                        Firmware / Hardware (HaaS)
Tactical Cloud Computing Ontology
                              Access Management
                          Cloud Application (SaaS)
                  Workflow Orchestration – Policy Engine
                               Security API
                       Services / Services Discovery
                                Service Management
                                     Cloud Software Environment
                                                (PaaS)
                              Cloud Software Infrastructure
                                 Network Security
                              Network Connectivity
                                 Network Security
    Computational Resources            Storage
                                                      Communications (CaaS)
            (IaaS)                      (DaaS)

                                 Software Kernal

                        Firmware / Hardware (HaaS)
Ontology Modification – Federated SOA


                                                                                Global Governance
                                                                                    Dynamic Tasking
                                         Access Management                                                                                    Access Management

                                       Cloud Application (SaaS)                                                                             Cloud Application (SaaS)

                                 Workflow Orchestration – Policy Engine                                                               Workflow Orchestration – Policy Engine
                                              Security API                                                                                         Security API
                                       Services / Services Discovery                                                                        Services / Services Discovery

                                           Service Management                                                                                   Service Management

                                                       Cloud Software Environment                                                                           Cloud Software Environment
                                                                  (PaaS)                                                                                               (PaaS)

                                          Cloud Software Infrastructure                                                                        Cloud Software Infrastructure
                                           Network Security                                                                                     Network Security
                                         Network Connectivity                                                                                 Network Connectivity
                                           Network Security                                                                                     Network Security
                                                  Storage                                                                                              Storage
Computational Resources (IaaS)                                               Communications (CaaS)   Computational Resources (IaaS)                                               Communications (CaaS)
                                                   (DaaS)                                                                                               (DaaS)


                                           Software Kernal                                                                                      Software Kernal


                                     Firmware / Hardware (HaaS)                                                                           Firmware / Hardware (HaaS)
Secure Cloud Computing – An Approach
•Access Management
     • “Out of Band”                                          Access Management
                                                            Cloud Application (SaaS)
     authentication
•Security API                                        Workflow Orchestration – Policy Engine

     • Use of services                                             Security API
                                                            Services / Services Discovery
     • Binding of service
                                                                Service Management
     • COI driven
                                                                         Cloud Software Environment
     management                                                                     (PaaS)
•Network Security
                                                              Cloud Software Infrastructure
     • No VPN
                                                                Network Security
     • “Data in Motion”
                                                              Network Connectivity
     security
                                                                Network Security
•Computational Resources         Computational Resources               Storage
                                                                                              Communications (CaaS)
     • VM management                     (IaaS)                         (DaaS)

     • Data-centric security                                    Software Kernal
     model
                                                           Firmware / Hardware (HaaS)
• Storage
     • “Data at Rest” security
     • COI driven access
Network Centric Operations Industry Consortium
 Mission
    Our mission is to facilitate global realization of the benefit inherent in
     Network Centric Operations. To that end, we seek to enable continuously
     increasing levels of interoperability across the spectrum of joint,
     interagency, intergovernmental, and multinational industrial and
     commercial operations. We will execute this mission in good faith as a
     global organization with membership open to all enterprises in quest of
     applying the vast potential of network centric technology to the operational
     challenges faced by our nations and their citizens.
 Past successes
 ◦ Network Centric Analysis Tool (NCAT)
 ◦ NCOIC Interoperability Framework (NIF)
 Future
 ◦ Develop “operational art” in support of netcentric operations
 ◦ Support operational art advances through collaboration (Government,
   Industry, Non-profits, Interest Groups)
 ◦ Provide value to members
    Use of NCOIC developed process provided differentiator in recent
     European procurement for a member company
    NCOIC Patterns addressing interoperability concerns of member
     government agencies
Cloud Computing Operational Art

  Embrace collaboration
     • OSD – tactical Cloud Computing
     • TIGR – Government Cloud Computing
     • Cloud Interoperability Forum
  Use Operational and Capability pattern process to develop Cloud
   Computing Technical Patterns
  Identify key netcentric operations interoperability requirements and
   preferences within identified technical patterns
  Iterate with NCOIC stakeholder companies and government
   organizations
  Use Capability and Operational patterns to validate operational
   impact of reduced cloud interoperability
  Leverage analysis to drive cloud interoperability recommendations
   and best practices
Thank You !
Kevin.jackson@dataline.com
http://cloudcomputing.dataline.com
http://govcloud.ulitzer.com

Weitere ähnliche Inhalte

Was ist angesagt?

AWS Cloud School | London - Part 1
AWS Cloud School | London - Part 1AWS Cloud School | London - Part 1
AWS Cloud School | London - Part 1Amazon Web Services
 
Cloud Computing: Architecture, IT Security and Operational Perspectives
Cloud Computing: Architecture, IT Security and Operational PerspectivesCloud Computing: Architecture, IT Security and Operational Perspectives
Cloud Computing: Architecture, IT Security and Operational PerspectivesMegan Eskey
 
Realize Value of Your Microsoft Investments - Transformation Day Montreal 2018
Realize Value of Your Microsoft Investments - Transformation Day Montreal 2018Realize Value of Your Microsoft Investments - Transformation Day Montreal 2018
Realize Value of Your Microsoft Investments - Transformation Day Montreal 2018Amazon Web Services
 
USAREUR Cloud Computing Training Class Presentation Heidelberg 1
USAREUR Cloud Computing Training Class Presentation Heidelberg 1USAREUR Cloud Computing Training Class Presentation Heidelberg 1
USAREUR Cloud Computing Training Class Presentation Heidelberg 1GovCloud Network
 
2011 State of the Cloud: A Year's Worth of Innovation in 30 Minutes - Jinesh...
2011 State of the Cloud:  A Year's Worth of Innovation in 30 Minutes - Jinesh...2011 State of the Cloud:  A Year's Worth of Innovation in 30 Minutes - Jinesh...
2011 State of the Cloud: A Year's Worth of Innovation in 30 Minutes - Jinesh...Amazon Web Services
 
Practical Approach to Data Maintenance in for PLM in Oracle EBS
Practical Approach to Data Maintenance in for PLM in Oracle EBSPractical Approach to Data Maintenance in for PLM in Oracle EBS
Practical Approach to Data Maintenance in for PLM in Oracle EBSSamsung Electronics
 
Array Networks - Application Availability, Security & Performance
Array Networks - Application Availability, Security & PerformanceArray Networks - Application Availability, Security & Performance
Array Networks - Application Availability, Security & Performance Array Networks
 
A Market Segment Analysis | Leading Cloud Innovators
A Market Segment Analysis | Leading Cloud InnovatorsA Market Segment Analysis | Leading Cloud Innovators
A Market Segment Analysis | Leading Cloud InnovatorsR2Labs
 
Track 2 Session 4_全民直播時代的多CDN監控與觀看體驗最佳化.pptx
Track 2 Session 4_全民直播時代的多CDN監控與觀看體驗最佳化.pptxTrack 2 Session 4_全民直播時代的多CDN監控與觀看體驗最佳化.pptx
Track 2 Session 4_全民直播時代的多CDN監控與觀看體驗最佳化.pptxAmazon Web Services
 
Cloud Foundry Open Tour Keynote
Cloud Foundry Open Tour KeynoteCloud Foundry Open Tour Keynote
Cloud Foundry Open Tour KeynoteRamnivasLaddad
 
NIST Compliance, AWS Federal Pop-Up Loft
NIST Compliance, AWS Federal Pop-Up LoftNIST Compliance, AWS Federal Pop-Up Loft
NIST Compliance, AWS Federal Pop-Up LoftAmazon Web Services
 
Leveraging The Clouds For Reliable Web Applications Presentation
Leveraging The Clouds For Reliable Web Applications PresentationLeveraging The Clouds For Reliable Web Applications Presentation
Leveraging The Clouds For Reliable Web Applications PresentationWeb 2.0 Expo
 
Your Future with Cloud Computing - Dr. Werner Vogels - AWS Summit 2012 Australia
Your Future with Cloud Computing - Dr. Werner Vogels - AWS Summit 2012 AustraliaYour Future with Cloud Computing - Dr. Werner Vogels - AWS Summit 2012 Australia
Your Future with Cloud Computing - Dr. Werner Vogels - AWS Summit 2012 AustraliaAmazon Web Services
 
Jazoon 2012 - Systems Integration in the Cloud Era with Apache Camel
Jazoon 2012 - Systems Integration in the Cloud Era with Apache CamelJazoon 2012 - Systems Integration in the Cloud Era with Apache Camel
Jazoon 2012 - Systems Integration in the Cloud Era with Apache CamelKai Wähner
 
Security: A Driving Force Behind Cloud Adoption
Security: A Driving Force Behind Cloud AdoptionSecurity: A Driving Force Behind Cloud Adoption
Security: A Driving Force Behind Cloud AdoptionAmazon Web Services
 
2011.11.22 - Comment développer un Business de Cloud Builder - 8ème Forum du ...
2011.11.22 - Comment développer un Business de Cloud Builder - 8ème Forum du ...2011.11.22 - Comment développer un Business de Cloud Builder - 8ème Forum du ...
2011.11.22 - Comment développer un Business de Cloud Builder - 8ème Forum du ...Club Cloud des Partenaires
 
Azure vmware solutions para partners
Azure vmware solutions para partnersAzure vmware solutions para partners
Azure vmware solutions para partnersskadobayashi
 
Cloud Computing – Time for delivery. The question is not “if”, but “how, whe...
Cloud Computing – Time for delivery.  The question is not “if”, but “how, whe...Cloud Computing – Time for delivery.  The question is not “if”, but “how, whe...
Cloud Computing – Time for delivery. The question is not “if”, but “how, whe...Capgemini
 

Was ist angesagt? (20)

AWS Cloud School | London - Part 1
AWS Cloud School | London - Part 1AWS Cloud School | London - Part 1
AWS Cloud School | London - Part 1
 
Cloud Computing: Architecture, IT Security and Operational Perspectives
Cloud Computing: Architecture, IT Security and Operational PerspectivesCloud Computing: Architecture, IT Security and Operational Perspectives
Cloud Computing: Architecture, IT Security and Operational Perspectives
 
Going to the Cloud
Going to the Cloud Going to the Cloud
Going to the Cloud
 
Realize Value of Your Microsoft Investments - Transformation Day Montreal 2018
Realize Value of Your Microsoft Investments - Transformation Day Montreal 2018Realize Value of Your Microsoft Investments - Transformation Day Montreal 2018
Realize Value of Your Microsoft Investments - Transformation Day Montreal 2018
 
USAREUR Cloud Computing Training Class Presentation Heidelberg 1
USAREUR Cloud Computing Training Class Presentation Heidelberg 1USAREUR Cloud Computing Training Class Presentation Heidelberg 1
USAREUR Cloud Computing Training Class Presentation Heidelberg 1
 
2011 State of the Cloud: A Year's Worth of Innovation in 30 Minutes - Jinesh...
2011 State of the Cloud:  A Year's Worth of Innovation in 30 Minutes - Jinesh...2011 State of the Cloud:  A Year's Worth of Innovation in 30 Minutes - Jinesh...
2011 State of the Cloud: A Year's Worth of Innovation in 30 Minutes - Jinesh...
 
Practical Approach to Data Maintenance in for PLM in Oracle EBS
Practical Approach to Data Maintenance in for PLM in Oracle EBSPractical Approach to Data Maintenance in for PLM in Oracle EBS
Practical Approach to Data Maintenance in for PLM in Oracle EBS
 
Array Networks - Application Availability, Security & Performance
Array Networks - Application Availability, Security & PerformanceArray Networks - Application Availability, Security & Performance
Array Networks - Application Availability, Security & Performance
 
A Market Segment Analysis | Leading Cloud Innovators
A Market Segment Analysis | Leading Cloud InnovatorsA Market Segment Analysis | Leading Cloud Innovators
A Market Segment Analysis | Leading Cloud Innovators
 
Track 2 Session 4_全民直播時代的多CDN監控與觀看體驗最佳化.pptx
Track 2 Session 4_全民直播時代的多CDN監控與觀看體驗最佳化.pptxTrack 2 Session 4_全民直播時代的多CDN監控與觀看體驗最佳化.pptx
Track 2 Session 4_全民直播時代的多CDN監控與觀看體驗最佳化.pptx
 
Cloud Foundry Open Tour Keynote
Cloud Foundry Open Tour KeynoteCloud Foundry Open Tour Keynote
Cloud Foundry Open Tour Keynote
 
NIST Compliance, AWS Federal Pop-Up Loft
NIST Compliance, AWS Federal Pop-Up LoftNIST Compliance, AWS Federal Pop-Up Loft
NIST Compliance, AWS Federal Pop-Up Loft
 
Leveraging The Clouds For Reliable Web Applications Presentation
Leveraging The Clouds For Reliable Web Applications PresentationLeveraging The Clouds For Reliable Web Applications Presentation
Leveraging The Clouds For Reliable Web Applications Presentation
 
Your Future with Cloud Computing - Dr. Werner Vogels - AWS Summit 2012 Australia
Your Future with Cloud Computing - Dr. Werner Vogels - AWS Summit 2012 AustraliaYour Future with Cloud Computing - Dr. Werner Vogels - AWS Summit 2012 Australia
Your Future with Cloud Computing - Dr. Werner Vogels - AWS Summit 2012 Australia
 
Jazoon 2012 - Systems Integration in the Cloud Era with Apache Camel
Jazoon 2012 - Systems Integration in the Cloud Era with Apache CamelJazoon 2012 - Systems Integration in the Cloud Era with Apache Camel
Jazoon 2012 - Systems Integration in the Cloud Era with Apache Camel
 
Security: A Driving Force Behind Cloud Adoption
Security: A Driving Force Behind Cloud AdoptionSecurity: A Driving Force Behind Cloud Adoption
Security: A Driving Force Behind Cloud Adoption
 
2011.11.22 - Comment développer un Business de Cloud Builder - 8ème Forum du ...
2011.11.22 - Comment développer un Business de Cloud Builder - 8ème Forum du ...2011.11.22 - Comment développer un Business de Cloud Builder - 8ème Forum du ...
2011.11.22 - Comment développer un Business de Cloud Builder - 8ème Forum du ...
 
Azure vmware solutions para partners
Azure vmware solutions para partnersAzure vmware solutions para partners
Azure vmware solutions para partners
 
Cloud Computing – Time for delivery. The question is not “if”, but “how, whe...
Cloud Computing – Time for delivery.  The question is not “if”, but “how, whe...Cloud Computing – Time for delivery.  The question is not “if”, but “how, whe...
Cloud Computing – Time for delivery. The question is not “if”, but “how, whe...
 
Roadmap to hyper hybrid cloud
Roadmap to hyper hybrid cloudRoadmap to hyper hybrid cloud
Roadmap to hyper hybrid cloud
 

Ähnlich wie GSAW Presentation on Cloud Security V2.1

Cloud computing 101
Cloud computing 101Cloud computing 101
Cloud computing 101kriggins
 
MPLS 2010: Network Enabled Cloud and Service Models
MPLS 2010: Network Enabled Cloud and Service ModelsMPLS 2010: Network Enabled Cloud and Service Models
MPLS 2010: Network Enabled Cloud and Service ModelsCisco Service Provider
 
CCitDG Presenation
CCitDG PresenationCCitDG Presenation
CCitDG PresenationDatabarracks
 
NIC 2013 - Configure and Deploy Private Cloud
NIC 2013 - Configure and Deploy Private CloudNIC 2013 - Configure and Deploy Private Cloud
NIC 2013 - Configure and Deploy Private CloudKristian Nese
 
Cloudforce Essentials 2012 - Understanding Force.com in 60 Minutes or Less
Cloudforce Essentials 2012 - Understanding Force.com  in 60 Minutes or LessCloudforce Essentials 2012 - Understanding Force.com  in 60 Minutes or Less
Cloudforce Essentials 2012 - Understanding Force.com in 60 Minutes or LessSalesforce_APAC
 
Aras PLM Software Leveraging the Cloud
Aras PLM Software Leveraging the CloudAras PLM Software Leveraging the Cloud
Aras PLM Software Leveraging the CloudAras
 
Aras Leveraging the Cloud for PLM
Aras Leveraging the Cloud for PLMAras Leveraging the Cloud for PLM
Aras Leveraging the Cloud for PLMAras
 
Mach Technology
Mach Technology Mach Technology
Mach Technology Open Stack
 
Systems Integration in the Cloud Era - API vs. Integration Framework vs. Ente...
Systems Integration in the Cloud Era - API vs. Integration Framework vs. Ente...Systems Integration in the Cloud Era - API vs. Integration Framework vs. Ente...
Systems Integration in the Cloud Era - API vs. Integration Framework vs. Ente...Kai Wähner
 
Next Generation – Systems Integration in the Cloud Era with Apache Camel - Ja...
Next Generation – Systems Integration in the Cloud Era with Apache Camel - Ja...Next Generation – Systems Integration in the Cloud Era with Apache Camel - Ja...
Next Generation – Systems Integration in the Cloud Era with Apache Camel - Ja...Kai Wähner
 
Raindance - Tooling for the Clouds
Raindance - Tooling for the CloudsRaindance - Tooling for the Clouds
Raindance - Tooling for the CloudsMarkus Knauer
 
BlazeClan Technologies
BlazeClan TechnologiesBlazeClan Technologies
BlazeClan TechnologiesVaroon Rajani
 
High Value Cloud Services
High Value Cloud ServicesHigh Value Cloud Services
High Value Cloud ServicesLaura Ventura
 
Paving the Way to IT-as-a-Service
Paving the Way to IT-as-a-ServicePaving the Way to IT-as-a-Service
Paving the Way to IT-as-a-Servicebuildacloud
 
Data Protection Jurisdiction and International Transfers in Cloud Computing
Data Protection Jurisdiction and International Transfers in Cloud ComputingData Protection Jurisdiction and International Transfers in Cloud Computing
Data Protection Jurisdiction and International Transfers in Cloud ComputingCloud Legal Project
 
Cloud architecture and deployment: The Kognitio checklist, Nigel Sanctuary, K...
Cloud architecture and deployment: The Kognitio checklist, Nigel Sanctuary, K...Cloud architecture and deployment: The Kognitio checklist, Nigel Sanctuary, K...
Cloud architecture and deployment: The Kognitio checklist, Nigel Sanctuary, K...CloudOps Summit
 
Blaze clan company presentation
Blaze clan   company presentationBlaze clan   company presentation
Blaze clan company presentationSupratik Ghatak
 
BlazeClan Technologies - Company Presentation
BlazeClan Technologies - Company PresentationBlazeClan Technologies - Company Presentation
BlazeClan Technologies - Company PresentationSupratik Ghatak
 

Ähnlich wie GSAW Presentation on Cloud Security V2.1 (20)

Cloud computing 101
Cloud computing 101Cloud computing 101
Cloud computing 101
 
MPLS 2010: Network Enabled Cloud and Service Models
MPLS 2010: Network Enabled Cloud and Service ModelsMPLS 2010: Network Enabled Cloud and Service Models
MPLS 2010: Network Enabled Cloud and Service Models
 
Dataline SOA-R
Dataline SOA-RDataline SOA-R
Dataline SOA-R
 
CCitDG Presenation
CCitDG PresenationCCitDG Presenation
CCitDG Presenation
 
NIC 2013 - Configure and Deploy Private Cloud
NIC 2013 - Configure and Deploy Private CloudNIC 2013 - Configure and Deploy Private Cloud
NIC 2013 - Configure and Deploy Private Cloud
 
Cloudforce Essentials 2012 - Understanding Force.com in 60 Minutes or Less
Cloudforce Essentials 2012 - Understanding Force.com  in 60 Minutes or LessCloudforce Essentials 2012 - Understanding Force.com  in 60 Minutes or Less
Cloudforce Essentials 2012 - Understanding Force.com in 60 Minutes or Less
 
Aras PLM Software Leveraging the Cloud
Aras PLM Software Leveraging the CloudAras PLM Software Leveraging the Cloud
Aras PLM Software Leveraging the Cloud
 
Aras Leveraging the Cloud for PLM
Aras Leveraging the Cloud for PLMAras Leveraging the Cloud for PLM
Aras Leveraging the Cloud for PLM
 
Mach Technology
Mach Technology Mach Technology
Mach Technology
 
Systems Integration in the Cloud Era - API vs. Integration Framework vs. Ente...
Systems Integration in the Cloud Era - API vs. Integration Framework vs. Ente...Systems Integration in the Cloud Era - API vs. Integration Framework vs. Ente...
Systems Integration in the Cloud Era - API vs. Integration Framework vs. Ente...
 
Next Generation – Systems Integration in the Cloud Era with Apache Camel - Ja...
Next Generation – Systems Integration in the Cloud Era with Apache Camel - Ja...Next Generation – Systems Integration in the Cloud Era with Apache Camel - Ja...
Next Generation – Systems Integration in the Cloud Era with Apache Camel - Ja...
 
Raindance - Tooling for the Clouds
Raindance - Tooling for the CloudsRaindance - Tooling for the Clouds
Raindance - Tooling for the Clouds
 
BlazeClan Technologies
BlazeClan TechnologiesBlazeClan Technologies
BlazeClan Technologies
 
High Value Cloud Services
High Value Cloud ServicesHigh Value Cloud Services
High Value Cloud Services
 
Paving the Way to IT-as-a-Service
Paving the Way to IT-as-a-ServicePaving the Way to IT-as-a-Service
Paving the Way to IT-as-a-Service
 
Data Protection Jurisdiction and International Transfers in Cloud Computing
Data Protection Jurisdiction and International Transfers in Cloud ComputingData Protection Jurisdiction and International Transfers in Cloud Computing
Data Protection Jurisdiction and International Transfers in Cloud Computing
 
Cloud architecture and deployment: The Kognitio checklist, Nigel Sanctuary, K...
Cloud architecture and deployment: The Kognitio checklist, Nigel Sanctuary, K...Cloud architecture and deployment: The Kognitio checklist, Nigel Sanctuary, K...
Cloud architecture and deployment: The Kognitio checklist, Nigel Sanctuary, K...
 
Blaze clan company presentation
Blaze clan   company presentationBlaze clan   company presentation
Blaze clan company presentation
 
Cloud Service Models
Cloud Service ModelsCloud Service Models
Cloud Service Models
 
BlazeClan Technologies - Company Presentation
BlazeClan Technologies - Company PresentationBlazeClan Technologies - Company Presentation
BlazeClan Technologies - Company Presentation
 

Mehr von GovCloud Network

IaaS Price performance-benchmark
IaaS Price performance-benchmarkIaaS Price performance-benchmark
IaaS Price performance-benchmarkGovCloud Network
 
Cloud computing training what's right for me
Cloud computing training what's right for meCloud computing training what's right for me
Cloud computing training what's right for meGovCloud Network
 
ViON Corporation: Surviving IT Change
ViON Corporation: Surviving IT ChangeViON Corporation: Surviving IT Change
ViON Corporation: Surviving IT ChangeGovCloud Network
 
Staying Safe in Cyberspace
Staying Safe in CyberspaceStaying Safe in Cyberspace
Staying Safe in CyberspaceGovCloud Network
 
Vets 360 Services - Military Dedication - Corporate Success
Vets 360 Services - Military Dedication - Corporate SuccessVets 360 Services - Military Dedication - Corporate Success
Vets 360 Services - Military Dedication - Corporate SuccessGovCloud Network
 
GovCloud Network LLC Overview - June 25, 2014
GovCloud Network LLC Overview - June 25, 2014GovCloud Network LLC Overview - June 25, 2014
GovCloud Network LLC Overview - June 25, 2014GovCloud Network
 
Army PEO EIS Cloud Architecture
Army PEO EIS Cloud Architecture   Army PEO EIS Cloud Architecture
Army PEO EIS Cloud Architecture GovCloud Network
 
ICH Agile Cloud Session 1-Highlights /Prospective Svc Offerings Kevin Jackson
ICH Agile Cloud Session 1-Highlights /Prospective Svc Offerings   Kevin JacksonICH Agile Cloud Session 1-Highlights /Prospective Svc Offerings   Kevin Jackson
ICH Agile Cloud Session 1-Highlights /Prospective Svc Offerings Kevin JacksonGovCloud Network
 
Improving Cybersecurity and Resilience Through Acquisition Emile Monette GSA
Improving Cybersecurity and Resilience Through Acquisition   Emile Monette GSAImproving Cybersecurity and Resilience Through Acquisition   Emile Monette GSA
Improving Cybersecurity and Resilience Through Acquisition Emile Monette GSAGovCloud Network
 
@AgileCLoud_ICH Presentation - 20140521 US Navy OPNAV - Capt Christopher Page
@AgileCLoud_ICH Presentation - 20140521 US Navy OPNAV - Capt Christopher Page@AgileCLoud_ICH Presentation - 20140521 US Navy OPNAV - Capt Christopher Page
@AgileCLoud_ICH Presentation - 20140521 US Navy OPNAV - Capt Christopher PageGovCloud Network
 
Agile Cloud Conference 2 Introduction - John Brennan
Agile Cloud Conference 2 Introduction - John BrennanAgile Cloud Conference 2 Introduction - John Brennan
Agile Cloud Conference 2 Introduction - John BrennanGovCloud Network
 
DoD Business Capability Lifecycle (BCL) Guide (Draft)
DoD Business Capability Lifecycle  (BCL)  Guide (Draft)DoD Business Capability Lifecycle  (BCL)  Guide (Draft)
DoD Business Capability Lifecycle (BCL) Guide (Draft)GovCloud Network
 
GovCloud Network Overview Presentation
GovCloud Network Overview PresentationGovCloud Network Overview Presentation
GovCloud Network Overview PresentationGovCloud Network
 
PM ISE Information Interoperability Presentation -agile sourcing brief
PM ISE Information Interoperability Presentation -agile sourcing briefPM ISE Information Interoperability Presentation -agile sourcing brief
PM ISE Information Interoperability Presentation -agile sourcing briefGovCloud Network
 
Intrusion Detection on Public IaaS - Kevin L. Jackson
Intrusion Detection on Public IaaS  - Kevin L. JacksonIntrusion Detection on Public IaaS  - Kevin L. Jackson
Intrusion Detection on Public IaaS - Kevin L. JacksonGovCloud Network
 
A Framework for Cloud Computing Adoption in South African Government
A Framework for Cloud Computing Adoption in South African GovernmentA Framework for Cloud Computing Adoption in South African Government
A Framework for Cloud Computing Adoption in South African GovernmentGovCloud Network
 
NCOIC GCC OWS-10 presentation 10 7 2013
NCOIC GCC OWS-10 presentation 10 7 2013NCOIC GCC OWS-10 presentation 10 7 2013
NCOIC GCC OWS-10 presentation 10 7 2013GovCloud Network
 
Tech gate kevin l jackson - 09-21-2013
Tech gate   kevin l jackson - 09-21-2013Tech gate   kevin l jackson - 09-21-2013
Tech gate kevin l jackson - 09-21-2013GovCloud Network
 
Paving the Way to the Cloud: Cloud Services Brokerage for Highly Secure, Dem...
Paving the Way to the Cloud:  Cloud Services Brokerage for Highly Secure, Dem...Paving the Way to the Cloud:  Cloud Services Brokerage for Highly Secure, Dem...
Paving the Way to the Cloud: Cloud Services Brokerage for Highly Secure, Dem...GovCloud Network
 
Government cloud deployment lessons learned final (4 4 2013)
Government cloud deployment lessons learned final (4 4 2013)Government cloud deployment lessons learned final (4 4 2013)
Government cloud deployment lessons learned final (4 4 2013)GovCloud Network
 

Mehr von GovCloud Network (20)

IaaS Price performance-benchmark
IaaS Price performance-benchmarkIaaS Price performance-benchmark
IaaS Price performance-benchmark
 
Cloud computing training what's right for me
Cloud computing training what's right for meCloud computing training what's right for me
Cloud computing training what's right for me
 
ViON Corporation: Surviving IT Change
ViON Corporation: Surviving IT ChangeViON Corporation: Surviving IT Change
ViON Corporation: Surviving IT Change
 
Staying Safe in Cyberspace
Staying Safe in CyberspaceStaying Safe in Cyberspace
Staying Safe in Cyberspace
 
Vets 360 Services - Military Dedication - Corporate Success
Vets 360 Services - Military Dedication - Corporate SuccessVets 360 Services - Military Dedication - Corporate Success
Vets 360 Services - Military Dedication - Corporate Success
 
GovCloud Network LLC Overview - June 25, 2014
GovCloud Network LLC Overview - June 25, 2014GovCloud Network LLC Overview - June 25, 2014
GovCloud Network LLC Overview - June 25, 2014
 
Army PEO EIS Cloud Architecture
Army PEO EIS Cloud Architecture   Army PEO EIS Cloud Architecture
Army PEO EIS Cloud Architecture
 
ICH Agile Cloud Session 1-Highlights /Prospective Svc Offerings Kevin Jackson
ICH Agile Cloud Session 1-Highlights /Prospective Svc Offerings   Kevin JacksonICH Agile Cloud Session 1-Highlights /Prospective Svc Offerings   Kevin Jackson
ICH Agile Cloud Session 1-Highlights /Prospective Svc Offerings Kevin Jackson
 
Improving Cybersecurity and Resilience Through Acquisition Emile Monette GSA
Improving Cybersecurity and Resilience Through Acquisition   Emile Monette GSAImproving Cybersecurity and Resilience Through Acquisition   Emile Monette GSA
Improving Cybersecurity and Resilience Through Acquisition Emile Monette GSA
 
@AgileCLoud_ICH Presentation - 20140521 US Navy OPNAV - Capt Christopher Page
@AgileCLoud_ICH Presentation - 20140521 US Navy OPNAV - Capt Christopher Page@AgileCLoud_ICH Presentation - 20140521 US Navy OPNAV - Capt Christopher Page
@AgileCLoud_ICH Presentation - 20140521 US Navy OPNAV - Capt Christopher Page
 
Agile Cloud Conference 2 Introduction - John Brennan
Agile Cloud Conference 2 Introduction - John BrennanAgile Cloud Conference 2 Introduction - John Brennan
Agile Cloud Conference 2 Introduction - John Brennan
 
DoD Business Capability Lifecycle (BCL) Guide (Draft)
DoD Business Capability Lifecycle  (BCL)  Guide (Draft)DoD Business Capability Lifecycle  (BCL)  Guide (Draft)
DoD Business Capability Lifecycle (BCL) Guide (Draft)
 
GovCloud Network Overview Presentation
GovCloud Network Overview PresentationGovCloud Network Overview Presentation
GovCloud Network Overview Presentation
 
PM ISE Information Interoperability Presentation -agile sourcing brief
PM ISE Information Interoperability Presentation -agile sourcing briefPM ISE Information Interoperability Presentation -agile sourcing brief
PM ISE Information Interoperability Presentation -agile sourcing brief
 
Intrusion Detection on Public IaaS - Kevin L. Jackson
Intrusion Detection on Public IaaS  - Kevin L. JacksonIntrusion Detection on Public IaaS  - Kevin L. Jackson
Intrusion Detection on Public IaaS - Kevin L. Jackson
 
A Framework for Cloud Computing Adoption in South African Government
A Framework for Cloud Computing Adoption in South African GovernmentA Framework for Cloud Computing Adoption in South African Government
A Framework for Cloud Computing Adoption in South African Government
 
NCOIC GCC OWS-10 presentation 10 7 2013
NCOIC GCC OWS-10 presentation 10 7 2013NCOIC GCC OWS-10 presentation 10 7 2013
NCOIC GCC OWS-10 presentation 10 7 2013
 
Tech gate kevin l jackson - 09-21-2013
Tech gate   kevin l jackson - 09-21-2013Tech gate   kevin l jackson - 09-21-2013
Tech gate kevin l jackson - 09-21-2013
 
Paving the Way to the Cloud: Cloud Services Brokerage for Highly Secure, Dem...
Paving the Way to the Cloud:  Cloud Services Brokerage for Highly Secure, Dem...Paving the Way to the Cloud:  Cloud Services Brokerage for Highly Secure, Dem...
Paving the Way to the Cloud: Cloud Services Brokerage for Highly Secure, Dem...
 
Government cloud deployment lessons learned final (4 4 2013)
Government cloud deployment lessons learned final (4 4 2013)Government cloud deployment lessons learned final (4 4 2013)
Government cloud deployment lessons learned final (4 4 2013)
 

Kürzlich hochgeladen

ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 

Kürzlich hochgeladen (20)

ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 

GSAW Presentation on Cloud Security V2.1

  • 1. Secure Cloud Computing: An Architecture Ontology Approach KEVIN JACKSON
  • 2. Forces Driving Cloud Computing - The New IT Era rev date 3/25/2009 slide 2
  • 3. Cloud Computing Value rev date 3/25/2009 slide 3
  • 4. Cloud Computing Challenge rev date 3/25/2009 slide 4
  • 5. Unified Ontology of Cloud Computing (http://www.cs.ucsb.edu/~lyouseff/CCOntology/CloudOntology.pdf) Cloud Application (SaaS) Cloud Software Environment (PaaS) Cloud Software Infrastructure Computational Storage Communications Resources (IaaS) (DaaS) (CaaS) Software Kernal Firmware / Hardware (HaaS) Lamia Youseff University of California, Santa Barbara Maria Butrico, Dilma Da Silva IBM T.J. Watson Research Center
  • 6. Tactical Employment Issues  Internet connectivity assumed  SOA platform • Security management • Application service discovery and management • Workflow orchestration  Access management
  • 7. Ontology Modifications for Tactical Cloud Computing Access Management Cloud Application Access Management (SaaS) Cloud Application (SaaS) Cloud Application (SaaS) Cloud Application Workflow Orchestration – Policy Engine (SaaS) Workflow Orchestration Security API Cloud Software Environment Security API Services / Services(PaaS) Discovery Cloud Software Environment Services / Services Discovery (PaaS) Service Management Service Management Cloud Software Environment Cloud Software Infrastructure (PaaS) Cloud Software Environment Cloud Software Infrastructure (PaaS) Cloud Software Infrastructure Network Security Communications Computational Storage Cloud Software Infrastructure Computational Storage Communications Resources (IaaS) (DaaS) (CaaS) Network(DaaS) Connectivity Resources (IaaS) (CaaS) ComputationalNetwork Storage Communications Security Computational Resources (IaaS) Resources (DaaS) (CaaS) Storage Communications (CaaS) Software Kernal (IaaS) (DaaS) Software Kernal Software Kernal Software Kernal Firmware / Hardware (HaaS) Firmware / Hardware (HaaS)
  • 8. Tactical Cloud Computing Ontology Access Management Cloud Application (SaaS) Workflow Orchestration – Policy Engine Security API Services / Services Discovery Service Management Cloud Software Environment (PaaS) Cloud Software Infrastructure Network Security Network Connectivity Network Security Computational Resources Storage Communications (CaaS) (IaaS) (DaaS) Software Kernal Firmware / Hardware (HaaS)
  • 9. Ontology Modification – Federated SOA Global Governance Dynamic Tasking Access Management Access Management Cloud Application (SaaS) Cloud Application (SaaS) Workflow Orchestration – Policy Engine Workflow Orchestration – Policy Engine Security API Security API Services / Services Discovery Services / Services Discovery Service Management Service Management Cloud Software Environment Cloud Software Environment (PaaS) (PaaS) Cloud Software Infrastructure Cloud Software Infrastructure Network Security Network Security Network Connectivity Network Connectivity Network Security Network Security Storage Storage Computational Resources (IaaS) Communications (CaaS) Computational Resources (IaaS) Communications (CaaS) (DaaS) (DaaS) Software Kernal Software Kernal Firmware / Hardware (HaaS) Firmware / Hardware (HaaS)
  • 10. Secure Cloud Computing – An Approach •Access Management • “Out of Band” Access Management Cloud Application (SaaS) authentication •Security API Workflow Orchestration – Policy Engine • Use of services Security API Services / Services Discovery • Binding of service Service Management • COI driven Cloud Software Environment management (PaaS) •Network Security Cloud Software Infrastructure • No VPN Network Security • “Data in Motion” Network Connectivity security Network Security •Computational Resources Computational Resources Storage Communications (CaaS) • VM management (IaaS) (DaaS) • Data-centric security Software Kernal model Firmware / Hardware (HaaS) • Storage • “Data at Rest” security • COI driven access
  • 11. Network Centric Operations Industry Consortium  Mission  Our mission is to facilitate global realization of the benefit inherent in Network Centric Operations. To that end, we seek to enable continuously increasing levels of interoperability across the spectrum of joint, interagency, intergovernmental, and multinational industrial and commercial operations. We will execute this mission in good faith as a global organization with membership open to all enterprises in quest of applying the vast potential of network centric technology to the operational challenges faced by our nations and their citizens.  Past successes ◦ Network Centric Analysis Tool (NCAT) ◦ NCOIC Interoperability Framework (NIF)  Future ◦ Develop “operational art” in support of netcentric operations ◦ Support operational art advances through collaboration (Government, Industry, Non-profits, Interest Groups) ◦ Provide value to members  Use of NCOIC developed process provided differentiator in recent European procurement for a member company  NCOIC Patterns addressing interoperability concerns of member government agencies
  • 12. Cloud Computing Operational Art  Embrace collaboration • OSD – tactical Cloud Computing • TIGR – Government Cloud Computing • Cloud Interoperability Forum  Use Operational and Capability pattern process to develop Cloud Computing Technical Patterns  Identify key netcentric operations interoperability requirements and preferences within identified technical patterns  Iterate with NCOIC stakeholder companies and government organizations  Use Capability and Operational patterns to validate operational impact of reduced cloud interoperability  Leverage analysis to drive cloud interoperability recommendations and best practices