SlideShare ist ein Scribd-Unternehmen logo
1 von 63
Downloaden Sie, um offline zu lesen
InCloud,[object Object],WeTrust,[object Object],Not so fast!,[object Object],“I’m Cloud Confused” series,[object Object]
If you’re new to Cloud Computing, ,[object Object],or just confused…,[object Object],Please try,[object Object],http://www.slideshare.net/Guppers/im-cloud-confused,[object Object]
the biggest Cloud Computing ,[object Object],concerns are…,[object Object],Security ,[object Object],Privacy,[object Object]
Fundamental Question,[object Object],Is Cloud Computing,[object Object],security weaker,[object Object],than ,[object Object],EnterpriseSecurity? ,[object Object]
a Typical Reaction,[object Object],when asks about security ,[object Object],SHA256,[object Object],X.509,[object Object],Salt,[object Object],AES,[object Object],PKCS,[object Object],IV,[object Object],DES,[object Object]
the street,[object Object],Security is….,[object Object],Boring,[object Object],Heard it on,[object Object],Complex,[object Object],Hacker stuff,[object Object],Kills usability,[object Object],Necessary Evil,[object Object],Complicates my life,[object Object]
Let’s make it simple,[object Object],Child Play,[object Object]
Let’s pick a simple story,[object Object],You worked hard this year, ,[object Object],you bought a pile of gold bars,[object Object]
Where should you storethem? ,[object Object],House?,[object Object],Bank?,[object Object],Your House,[object Object],Your Bank,[object Object]
What does this thief think?,[object Object],…,[object Object]
Plenty of valuableassets, ,[object Object],but it may have elaborate ,[object Object],securityprotection in place,[object Object],Bank,[object Object]
Some valuableassets,,[object Object],security protection may not,[object Object],as elaborate,[object Object],House,[object Object]
What would you do to boost,[object Object],your protection? ,[object Object]
Yes, build layers of defense ,[object Object]
Put the fenceup,[object Object],Put ,[object Object]
Install additional door locks ,[object Object]
Let’s also install alarmsystem ,[object Object],and surveillancecameras,[object Object]
Feel Better?  ,[object Object]
Oh, don’t forget about,[object Object],adisasterplan ,[object Object]
Knock, knock,[object Object],Who’s there?,[object Object]
You control who hasaccessto your house,[object Object]
And, pretty sure ,[object Object],yourinner circle won’t steal from you,[object Object]
Let’s translate…,[object Object],Corporate Data,[object Object],IT Assets(Software, Hardware),[object Object],Employees,[object Object]
You feel totally in control ,[object Object]
Whyin the world,[object Object],you would give up control?,[object Object]
..and many eyes aim at big prizes,[object Object]
when delegating security to other…,[object Object],a few things to consider….,[object Object]
It’s all about,[object Object],It’s all about Trust,[object Object],Trust,[object Object]
Do you trust them that they’ll still be in the ,[object Object],business ,[object Object],tomorrow?,[object Object],Help!,[object Object],Ex-Cloud Provider will,[object Object],work for Food,[object Object]
Didn’t we see this before? ,[object Object]
Recommendation,[object Object],Pick servicesthat are,[object Object],backed by major players,[object Object]
Data Lost ,[object Object],It is unlikely. ,[object Object],Reputable Cloud Providers copy data 3-4 times,[object Object]
However, it is normal to store ,[object Object],highly value-able datain ,[object Object],two or more different cloud providers,[object Object],Data,[object Object],Service,[object Object],replicated,[object Object],replicated,[object Object],Cloud Provider 1,[object Object],Cloud Provider 2,[object Object]
Data Privacy,[object Object],Confidentiality ,[object Object]
Data in Transit,[object Object],data,[object Object],Internet,[object Object],Cloud Provider ,[object Object],It can be secured using encryption technology, e.g. SSL,[object Object],It is used especially for sensitive data,[object Object]
Data at Rest,[object Object],Cloud Provider ,[object Object],Biggest prize for attackers!,[object Object],More and more cloud providers are developing nativedata encryption ,[object Object],Even if it is stolen, it will be useless for attackers,[object Object]
You can pick whereyour data resides,[object Object]
Physical Access ,[object Object],Cloud Provider,[object Object],Data Center,[object Object]
Security processes are typically ,[object Object],in place  for physical access ,[object Object],Background Check,[object Object],Two factor authentication,[object Object],Intrusion detection system,[object Object],Audit,[object Object],Video surveillance ,[object Object]
Multi tenant,[object Object],Infrastructure,[object Object],Corporate 4,[object Object],Corporate 3,[object Object],Corporate 2,[object Object],Corporate 1,[object Object],…infrastructure is shared by many corporations (tenant),[object Object]
Will vulnerabilityin one company ,[object Object],affect others in the cloud?,[object Object]
Cloud Providers use ,[object Object],isolationtechniques,[object Object],Data Isolation,[object Object],Virtualization,[object Object],Computing Isolation,[object Object],a vulnerability in one tenant has little impact on other tenants,[object Object]
Identity,[object Object]
Unwanted guest,[object Object],Employees,[object Object],Cloud Computing,[object Object],Suppliers,[object Object],Customers,[object Object]
Potential External Entry Points,[object Object],Web SiteHTTP(S),[object Object],Database,[object Object],Queue,[object Object],Web ServicesHTTP(S),[object Object],Custom,[object Object],Blob(Files, Docs),[object Object],Worker VM,[object Object],XYZCorp.com,[object Object]
Typical access to a web site ,[object Object],hosted in the Cloud,[object Object]
Example of ,[object Object],astronger authentication process,[object Object],for sensitive web site,[object Object],A8KP,[object Object]
Accessing other Cloud Services,[object Object],(Example),[object Object],Address,[object Object],https://aservice.mycloudprov.net,[object Object],Key2,[object Object],Key1,[object Object],R3ZhU3xAmLIEAnRRyiMHx…,[object Object],xFAlNx4VeRDGQgSQI…,[object Object]
Control which networkor machineshave access ,[object Object],98.237.178.63,[object Object],83.231.32.17,[object Object]
Let’s look at from,[object Object], cloud infrastructure provider’s,[object Object],perspectives,[object Object]
TypicalSLAs to compete,[object Object],around,[object Object],99.95,[object Object],% uptime,[object Object]
It is in their best interest to ,[object Object],maintain reputation, ,[object Object],best security practice,[object Object],their business depends on it,[object Object]
Headlines they try hard to avoid,[object Object],Data is stolen from ….,[object Object],…. has been down,[object Object],since yesterday,[object Object],Security breach at data center….,[object Object]
Should you migrate all to Cloud? ,[object Object]
NO,[object Object],Cloud Computing ,[object Object],is still at infancy ,[object Object]
Trust is Always Earned,,[object Object],NeverGiven,[object Object],---R. Williams,[object Object]
Migrate ,[object Object],non-critical business operations, ,[object Object],departmental level data first ,[object Object],and Observe!,[object Object],Enterprise,[object Object]
It’s not as difficultas you think,[object Object],simplicity, agility and elasticity ,[object Object],(another topic for further discussion),[object Object]
Excited about new possibilities in ,[object Object],cloudspace?,[object Object]
Follow discussions and,[object Object],presentations on,[object Object],facebook ,[object Object],“I’m Cloud Confused”,[object Object],http://www.facebook.com/pages/Im-Cloud-Confused/219897591208?ref=ts,[object Object]
You,[object Object],Us,[object Object],10simple questions,2minutes to completehttp://surveymonkey.com/s.aspx?sm=NrndNTZkoG6j8BWJYejC1g_3d_3d,[object Object],Will Publish Results on,[object Object],facebook ,[object Object]
Want to try Cloudfor your business now ?,[object Object],Only a few minutes to setup,[object Object],http://www.slideshare.net/Guppers/guppers-3-minute-walkthrough,[object Object]
For more presentations like this, visit, ,[object Object],follow, subscribe to:  ,[object Object],Blog: http://www.andyharjanto.com,[object Object],Twitter: http://twitter.com/harjanto,[object Object],Contact: andy@guppers.com,[object Object]

Weitere ähnliche Inhalte

Andere mochten auch

Rihanaaaaaaaaa
RihanaaaaaaaaaRihanaaaaaaaaa
Rihanaaaaaaaaasuzette14
 
10 nazioni piu felici al mondo
10 nazioni piu felici al mondo10 nazioni piu felici al mondo
10 nazioni piu felici al mondoAldo Mencaraglia
 
Speaking presentation
Speaking presentationSpeaking presentation
Speaking presentationlm816100mhs
 
Beyond The Backchannel By Cynthia Calongne
Beyond The Backchannel By Cynthia CalongneBeyond The Backchannel By Cynthia Calongne
Beyond The Backchannel By Cynthia CalongneCynthia Calongne
 
Case drechtwerk - new shoes today
Case drechtwerk - new shoes todayCase drechtwerk - new shoes today
Case drechtwerk - new shoes todaynew shoes today
 
Sosiaalinen media ja järjestötyö
Sosiaalinen media ja järjestötyöSosiaalinen media ja järjestötyö
Sosiaalinen media ja järjestötyöMarko Sykkö
 

Andere mochten auch (8)

Moms
MomsMoms
Moms
 
Rihanaaaaaaaaa
RihanaaaaaaaaaRihanaaaaaaaaa
Rihanaaaaaaaaa
 
10 nazioni piu felici al mondo
10 nazioni piu felici al mondo10 nazioni piu felici al mondo
10 nazioni piu felici al mondo
 
Speaking presentation
Speaking presentationSpeaking presentation
Speaking presentation
 
Beyond The Backchannel By Cynthia Calongne
Beyond The Backchannel By Cynthia CalongneBeyond The Backchannel By Cynthia Calongne
Beyond The Backchannel By Cynthia Calongne
 
Case drechtwerk - new shoes today
Case drechtwerk - new shoes todayCase drechtwerk - new shoes today
Case drechtwerk - new shoes today
 
Sosiaalinen media ja järjestötyö
Sosiaalinen media ja järjestötyöSosiaalinen media ja järjestötyö
Sosiaalinen media ja järjestötyö
 
Alumni mentoring
Alumni mentoringAlumni mentoring
Alumni mentoring
 

Ähnlich wie Cloudtrust 091204053223 Phpapp01

Securing Your Data In The Cloud
Securing Your Data In The CloudSecuring Your Data In The Cloud
Securing Your Data In The CloudOmer Trajman
 
Why the cloud is more secure than your existing systems
Why the cloud is more secure than your existing systemsWhy the cloud is more secure than your existing systems
Why the cloud is more secure than your existing systemsErnest Mueller
 
A Cloud Security Ghost Story Craig Balding
A Cloud Security Ghost Story   Craig BaldingA Cloud Security Ghost Story   Craig Balding
A Cloud Security Ghost Story Craig Baldingcraigbalding
 
Security in the Cloud: Tips on How to Protect Your Data
Security in the Cloud: Tips on How to Protect Your DataSecurity in the Cloud: Tips on How to Protect Your Data
Security in the Cloud: Tips on How to Protect Your DataProcore Technologies
 
AWS Security Strategy
AWS Security StrategyAWS Security Strategy
AWS Security StrategyTeri Radichel
 
Automating your AWS Security Operations
Automating your AWS Security OperationsAutomating your AWS Security Operations
Automating your AWS Security OperationsAmazon Web Services
 
Automating your AWS Security Operations
Automating your AWS Security OperationsAutomating your AWS Security Operations
Automating your AWS Security OperationsEvident.io
 
Introduction to cloud computing
Introduction to cloud computingIntroduction to cloud computing
Introduction to cloud computingDigital Shende
 
A Throwaway Deck for Cloud Security Essentials 2.0 delivered at RSA 2016
A Throwaway Deck for Cloud Security Essentials 2.0 delivered at RSA 2016A Throwaway Deck for Cloud Security Essentials 2.0 delivered at RSA 2016
A Throwaway Deck for Cloud Security Essentials 2.0 delivered at RSA 2016Shannon Lietz
 
AWS Cloud Security From the Point of View of the Compliance
AWS Cloud Security From the Point of View of the ComplianceAWS Cloud Security From the Point of View of the Compliance
AWS Cloud Security From the Point of View of the ComplianceYury Chemerkin
 
Aws training in bangalore
Aws training in bangalore Aws training in bangalore
Aws training in bangalore apponix123
 
From Zero to Cloud in 30 minutes
From Zero to Cloud in 30 minutesFrom Zero to Cloud in 30 minutes
From Zero to Cloud in 30 minutesSimone Brunozzi
 
There is No Server: Immutable Infrastructure and Serverless Architecture
There is No Server: Immutable Infrastructure and Serverless ArchitectureThere is No Server: Immutable Infrastructure and Serverless Architecture
There is No Server: Immutable Infrastructure and Serverless ArchitectureSonatype
 
Network Security R U Secure???
Network Security R U Secure???Network Security R U Secure???
Network Security R U Secure???trendy updates
 
Presentation copy
Presentation   copyPresentation   copy
Presentation copyAdel Zalok
 
Six things to take into account when choosing cloud solutions
Six things to take into account when choosing cloud solutionsSix things to take into account when choosing cloud solutions
Six things to take into account when choosing cloud solutionsF-Secure Corporation
 
Cyber Security and Cloud Computing
Cyber Security and Cloud ComputingCyber Security and Cloud Computing
Cyber Security and Cloud ComputingKeet Sugathadasa
 

Ähnlich wie Cloudtrust 091204053223 Phpapp01 (20)

Securing Your Data In The Cloud
Securing Your Data In The CloudSecuring Your Data In The Cloud
Securing Your Data In The Cloud
 
Why the cloud is more secure than your existing systems
Why the cloud is more secure than your existing systemsWhy the cloud is more secure than your existing systems
Why the cloud is more secure than your existing systems
 
A Cloud Security Ghost Story Craig Balding
A Cloud Security Ghost Story   Craig BaldingA Cloud Security Ghost Story   Craig Balding
A Cloud Security Ghost Story Craig Balding
 
Security in the Cloud: Tips on How to Protect Your Data
Security in the Cloud: Tips on How to Protect Your DataSecurity in the Cloud: Tips on How to Protect Your Data
Security in the Cloud: Tips on How to Protect Your Data
 
AWS Security Strategy
AWS Security StrategyAWS Security Strategy
AWS Security Strategy
 
Automating your AWS Security Operations
Automating your AWS Security OperationsAutomating your AWS Security Operations
Automating your AWS Security Operations
 
Automating your AWS Security Operations
Automating your AWS Security OperationsAutomating your AWS Security Operations
Automating your AWS Security Operations
 
Introduction to cloud computing
Introduction to cloud computingIntroduction to cloud computing
Introduction to cloud computing
 
A Throwaway Deck for Cloud Security Essentials 2.0 delivered at RSA 2016
A Throwaway Deck for Cloud Security Essentials 2.0 delivered at RSA 2016A Throwaway Deck for Cloud Security Essentials 2.0 delivered at RSA 2016
A Throwaway Deck for Cloud Security Essentials 2.0 delivered at RSA 2016
 
AWS Cloud Security From the Point of View of the Compliance
AWS Cloud Security From the Point of View of the ComplianceAWS Cloud Security From the Point of View of the Compliance
AWS Cloud Security From the Point of View of the Compliance
 
Aws training in bangalore
Aws training in bangalore Aws training in bangalore
Aws training in bangalore
 
From Zero to Cloud in 30 minutes
From Zero to Cloud in 30 minutesFrom Zero to Cloud in 30 minutes
From Zero to Cloud in 30 minutes
 
There is No Server: Immutable Infrastructure and Serverless Architecture
There is No Server: Immutable Infrastructure and Serverless ArchitectureThere is No Server: Immutable Infrastructure and Serverless Architecture
There is No Server: Immutable Infrastructure and Serverless Architecture
 
Network Security R U Secure???
Network Security R U Secure???Network Security R U Secure???
Network Security R U Secure???
 
Presentation copy
Presentation   copyPresentation   copy
Presentation copy
 
Six things to take into account when choosing cloud solutions
Six things to take into account when choosing cloud solutionsSix things to take into account when choosing cloud solutions
Six things to take into account when choosing cloud solutions
 
Cyber Security and Cloud Computing
Cyber Security and Cloud ComputingCyber Security and Cloud Computing
Cyber Security and Cloud Computing
 
cloud-computing-security.ppt
cloud-computing-security.pptcloud-computing-security.ppt
cloud-computing-security.ppt
 
Cloud security
Cloud securityCloud security
Cloud security
 
Cloud security
Cloud securityCloud security
Cloud security
 

Cloudtrust 091204053223 Phpapp01

  • 1.
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.
  • 29.
  • 30.
  • 31.
  • 32.
  • 33.
  • 34.
  • 35.
  • 36.
  • 37.
  • 38.
  • 39.
  • 40.
  • 41.
  • 42.
  • 43.
  • 44.
  • 45.
  • 46.
  • 47.
  • 48.
  • 49.
  • 50.
  • 51.
  • 52.
  • 53.
  • 54.
  • 55.
  • 56.
  • 57.
  • 58.
  • 59.
  • 60.
  • 61.
  • 62.
  • 63.