SlideShare ist ein Scribd-Unternehmen logo
1 von 44
Ernest Mueller National Instruments theagileadmin.com
ernest.mueller@gmail.com @ernestmueller
(ISP -> colo) + virtualization + HPC
+ (AJAX + SOA -> REST APIs) = IaaS
IDE/4GLs + EAI + SaaS + IaaS = PaaS
((web site -> web app) -> ASP) +
virtualization + fast network + [RIA
browsers && mobile] = SaaS
[IaaS | PaaS | SaaS ] + [ devops |
open source | noSQL ] = cloud
Amazon EC2, Rackspace, VMWare,
Verizon, Terremark, IBM, everyone else
with a data center
Move infrastructure off premise, focus on
value added operations
Usually multitenant virtualized hosting,
REST API driven near-instant
provisioning to scale, utility billing
Salesforce.com, Google Apps, Zoho,
MobileMe, everyone else with some
developers
Bringing the convenience of consumer
apps to the world of business apps
You’ve been doing this forever
(ADT/Paychex, credit card processors)
force.com, Microsoft Azure, Google App
Engine, Heroku, Code2Cloud
Develop apps without needing to mess
with the plumbing
The most newfangled
 Private Cloud
 Virtual Private Cloud
 Hybrid Cloud/Cloudbursting
 This Cloud, That Cloud
cloud + mobile + social + agile = EaaS?
“Cloud? I’ve been doing
that since 1988. It’s just
the same old thing with a
new name."
- Technohipster
Pretty new:
multitenant
massively scalable
elastic self provisioning
pay as you go
Resulting benefits:
agility
economy of scale
low initial investment
scalable cost/opex
resilience
easy delivery
Not new:
virtualization
outsourcing
integration
interwebz
Centralization ->
Delegation, Federation
• "I own it all and control it all" is a myth
• Auditable standards, open protocols
• SLAs are worthless when it matters
• “Cloud computing is about gracefully losing control
while maintaining accountability” -CSA
Outsourcing is Scary!
• Not Hosted Here
Syndrome
• SLAs/contracts vs.
"firing someone"
• Enemy ninjas
• Legal discovery
“I'd rather trust someone
I've never met than the
guys in IT.”
- Developer
Are You This Guy?
Too bad!
Gartner reports that 39% of respondents worldwide are budgeting
money to spend on cloud
Cloud computing is already 10% of total IT services budgets
Cloud is the future of computing
If you make it into security “versus” business outcome – you lose!
Luckily, it doesn’t have to be that way
Sure, there’s security stuff to manage around the cloud, just like
anything
But here’s why the cloud can improve your security posture, and
how it can help you do your job!
 Globally distributed data centers with
multiple availability zones per region
 Data centers: unmarked separate
buildings, biometrics, access logging.
SAS 70 Type II, ISO 27001 in progress
 S3 Storage: highly redundant storage,
control over global distribution
 Disks are zeroed out post-use
 EC2 Instances: image based VMs
 Security Groups – like a software
firewall integrated down to the
hypervisor
 Amazon ops staff can’t see within
your VM or memory
 VPC for private only instances
 Key crypto for machine access
 Multifactor auth available
 “Bring your own key”
 Employee vetting procedures
 Big security department
 Other products - RDS, SNS, SimpleDB,
SQS, monitoring, CDN, etc.
 Via a console or API, you instantiate
instances from images, provision
storage and network, set access keys,
make copies, terminate assets
 Highly Dynamic - IP addresses,
number of servers, etc. change at will
 Key Management
 Image Management
 Encryption of stored data (“Do it”)
 Identity Management
 Poindextery Cross-VM Attacks
 People Who Don’t Get It Yet
 Enthusiasm + Immature Vendors
“But you said the cloud’s
more secure, man!”
- You
You have to ask – “More secure than
what?”
It’s less secure than your mental
model of the perfectly secure system
Which does not exist really – you
need to compare it to the real
security you have going in your
current shop as it stands and see if
it’s better or worse.
In many cases it’s better.
the proof is in the pudding
mmm… pudding
let’s see how the cloud and
one large IT shop compare
in IT, our online
catalog 30 day
availability: 98.59%
in the cloud, 30 day
availability: 100.0%
in IT, our internal DMZ
implementation – 5
years and counting
in the cloud – a defined
DMZ around every
single server role
in IT, our DR plan is “Pray”
in the cloud, the time to
have our entire system
built from scratch in
another region is 2 hours
in IT, our transport
security can be described
by “telnet’s secure, right?”
and “HTTPS? Not in our
version of Oracle!”
in the cloud, SSL is
everywhere, all logins are
certed
in IT, we have to “scan”
to “discover” our assets
and their OS levels
in the cloud, we create
our systems from a
defined model
programmatically
in the cloud, we alert if
anyone logs into a
server, it’s so rare
in the cloud, if a box is
suspect we crumple it
up and throw it away
(you can make a copy)
is this an unfair comparison?
what is “fair?”
the only meaningful
question is “with my new
app, where objectively is it
better off?”
the cloud gives superpowers
to the little guy
intense resilience
cloud backup
near automatic DR
open standards
APIs and scale drive self service
many cloud providers have more
security staff than you do
you benefit from the security
requirements of all their other
customers
managed security service integration
is a compelling product
security is a differentiator in the
space and suppliers are chasing it
better architecture –
“sharing is the devil”
utility billing drives
sunsetting of old apps/systems
security SaaS products make
enterprise level security accessible
acknowledges reality – devices,
networks, data are everywhere
the cloud age
post "perimeter"
post "SLA"
post "server"
post "web page"
“You can run, but you’ll
just die tired.”
- Me
The Cloud Friendly Ghost
how can you be cloud friendly?
automation
self service
collaboration
fix the tools
extend your reach
make encryption easy
focus on outcomes
 Remember “port knocking?”
 With model driven automation
(“infrastructure as code”) you can
create firewall holes, provision user
accounts, etc. in real time and remove
them once they’re done being used
 If it’s self service, it’s more auditable
than “ask a network admin”
 Increased trend driven by agile
development towards tight
collaboration between developers and
operations staff
 Be the “security buddy”
 Embed with projects, don’t be a
seagull
 By understanding, be understood
 How secure are things usually when
people and teams all work separately?
 Dynamic nature of cloud poses
challenges for old tools
 Encryption is still stupid hard – check
out grendel, and maybe homomorphic
encryption will rescue us
 Note all the “Security as a Service”
offerings springing up- was spam
filtering and scanning, now it’s code
analysis (Veracode, Fortify), IAM
(PingIdentity), virus scan (McAfee), etc.
 Focus on real security
 Naturally it’ll take time for compliance
standards to get with the times – but
don’t assume it can’t be compliant –
some of your auditors have actually
heard of VMs and know what to do
 FUD doesn’t benefit anyone – figuring
out how to “make it happen” –
securely – benefits everyone.
try it –
you’ll like it
 Cloud Security Alliance
(cloudsecurityalliance.org)
 Security Guidance for Critical Areas in Cloud
Computing
(http://cloudsecurityalliance.org/guidance/cs
aguide.v2.1.pdf)
 ENISA Cloud Computing Risk Assessment
(http://www.enisa.europa.eu/act/rm/files/del
iverables/cloud-computing-risk-assessment )
 Book: Cloud Security and Privacy (Mather,
Kumraswamy, Latif) - Yay!
 Book: Cloud Security (Krutz, Vines) - Boo!
 Jericho Forum (jerichoforum.org)
 Amazon Security Center
(aws.amazon.com/security)
 Austin Cloud User Group (acug.cloudug.org)
Cloud Security Benefits and Best Practices

Weitere ähnliche Inhalte

Was ist angesagt?

Microsoft Best Practices - AWS India Summit 2012
Microsoft Best Practices - AWS India Summit 2012Microsoft Best Practices - AWS India Summit 2012
Microsoft Best Practices - AWS India Summit 2012Amazon Web Services
 
CloudPassage Overview
CloudPassage OverviewCloudPassage Overview
CloudPassage OverviewCloudPassage
 
SCUGBE_Lowlands_Unite_2017_Rest azured microsoft cloud demystified
SCUGBE_Lowlands_Unite_2017_Rest azured   microsoft cloud demystifiedSCUGBE_Lowlands_Unite_2017_Rest azured   microsoft cloud demystified
SCUGBE_Lowlands_Unite_2017_Rest azured microsoft cloud demystifiedKenny Buntinx
 
Microsoft Azure Cloud Services
Microsoft Azure Cloud ServicesMicrosoft Azure Cloud Services
Microsoft Azure Cloud ServicesDavid J Rosenthal
 
Azure for beginners series session 4
Azure for beginners series session 4Azure for beginners series session 4
Azure for beginners series session 4Lalit Rawat
 
Newt211 final project
Newt211 final projectNewt211 final project
Newt211 final projectBrianCooper73
 
The Cloud Needs An Operating System – Philip J. Windley
The Cloud Needs An Operating System – Philip J. WindleyThe Cloud Needs An Operating System – Philip J. Windley
The Cloud Needs An Operating System – Philip J. WindleyPhil Wolff
 
Practical AWS Security - Scott Hogg
Practical AWS Security - Scott HoggPractical AWS Security - Scott Hogg
Practical AWS Security - Scott HoggTrish McGinity, CCSK
 
Trust No-One Architecture For Services And Data
Trust No-One Architecture For Services And DataTrust No-One Architecture For Services And Data
Trust No-One Architecture For Services And DataAidan Finn
 
Connect your datacenter to Microsoft Azure
Connect your datacenter to Microsoft AzureConnect your datacenter to Microsoft Azure
Connect your datacenter to Microsoft AzureK.Mohamed Faizal
 
Azure from scratch part 2 By Girish Kalamati
Azure from scratch part 2 By Girish KalamatiAzure from scratch part 2 By Girish Kalamati
Azure from scratch part 2 By Girish KalamatiGirish Kalamati
 
Security in the cloud Workshop HSTC 2014
Security in the cloud Workshop HSTC 2014Security in the cloud Workshop HSTC 2014
Security in the cloud Workshop HSTC 2014Akash Mahajan
 
Cloud security privacy- org
Cloud security  privacy- orgCloud security  privacy- org
Cloud security privacy- orgDharmalingam S
 
Virtual Data Center VDC - Azure Cloud Reference Architecture CRA
Virtual Data Center VDC - Azure Cloud Reference Architecture CRAVirtual Data Center VDC - Azure Cloud Reference Architecture CRA
Virtual Data Center VDC - Azure Cloud Reference Architecture CRAAmmar Hasayen
 
A Cloud Security Ghost Story Craig Balding
A Cloud Security Ghost Story   Craig BaldingA Cloud Security Ghost Story   Craig Balding
A Cloud Security Ghost Story Craig Baldingcraigbalding
 
How Symantec Cloud Workload Protection Secures LifeLock on AWS PPT
 How Symantec Cloud Workload Protection Secures LifeLock on AWS PPT How Symantec Cloud Workload Protection Secures LifeLock on AWS PPT
How Symantec Cloud Workload Protection Secures LifeLock on AWS PPTAmazon Web Services
 
Best Practices for IoT Security in the Cloud
Best Practices for IoT Security in the Cloud Best Practices for IoT Security in the Cloud
Best Practices for IoT Security in the Cloud Amazon Web Services
 

Was ist angesagt? (20)

Microsoft Best Practices - AWS India Summit 2012
Microsoft Best Practices - AWS India Summit 2012Microsoft Best Practices - AWS India Summit 2012
Microsoft Best Practices - AWS India Summit 2012
 
CloudPassage Overview
CloudPassage OverviewCloudPassage Overview
CloudPassage Overview
 
Cloud security ppt
Cloud security pptCloud security ppt
Cloud security ppt
 
SCUGBE_Lowlands_Unite_2017_Rest azured microsoft cloud demystified
SCUGBE_Lowlands_Unite_2017_Rest azured   microsoft cloud demystifiedSCUGBE_Lowlands_Unite_2017_Rest azured   microsoft cloud demystified
SCUGBE_Lowlands_Unite_2017_Rest azured microsoft cloud demystified
 
Microsoft Azure Cloud Services
Microsoft Azure Cloud ServicesMicrosoft Azure Cloud Services
Microsoft Azure Cloud Services
 
Azure for beginners series session 4
Azure for beginners series session 4Azure for beginners series session 4
Azure for beginners series session 4
 
Cloud Seeding
Cloud SeedingCloud Seeding
Cloud Seeding
 
Newt211 final project
Newt211 final projectNewt211 final project
Newt211 final project
 
Azure security
Azure  securityAzure  security
Azure security
 
The Cloud Needs An Operating System – Philip J. Windley
The Cloud Needs An Operating System – Philip J. WindleyThe Cloud Needs An Operating System – Philip J. Windley
The Cloud Needs An Operating System – Philip J. Windley
 
Practical AWS Security - Scott Hogg
Practical AWS Security - Scott HoggPractical AWS Security - Scott Hogg
Practical AWS Security - Scott Hogg
 
Trust No-One Architecture For Services And Data
Trust No-One Architecture For Services And DataTrust No-One Architecture For Services And Data
Trust No-One Architecture For Services And Data
 
Connect your datacenter to Microsoft Azure
Connect your datacenter to Microsoft AzureConnect your datacenter to Microsoft Azure
Connect your datacenter to Microsoft Azure
 
Azure from scratch part 2 By Girish Kalamati
Azure from scratch part 2 By Girish KalamatiAzure from scratch part 2 By Girish Kalamati
Azure from scratch part 2 By Girish Kalamati
 
Security in the cloud Workshop HSTC 2014
Security in the cloud Workshop HSTC 2014Security in the cloud Workshop HSTC 2014
Security in the cloud Workshop HSTC 2014
 
Cloud security privacy- org
Cloud security  privacy- orgCloud security  privacy- org
Cloud security privacy- org
 
Virtual Data Center VDC - Azure Cloud Reference Architecture CRA
Virtual Data Center VDC - Azure Cloud Reference Architecture CRAVirtual Data Center VDC - Azure Cloud Reference Architecture CRA
Virtual Data Center VDC - Azure Cloud Reference Architecture CRA
 
A Cloud Security Ghost Story Craig Balding
A Cloud Security Ghost Story   Craig BaldingA Cloud Security Ghost Story   Craig Balding
A Cloud Security Ghost Story Craig Balding
 
How Symantec Cloud Workload Protection Secures LifeLock on AWS PPT
 How Symantec Cloud Workload Protection Secures LifeLock on AWS PPT How Symantec Cloud Workload Protection Secures LifeLock on AWS PPT
How Symantec Cloud Workload Protection Secures LifeLock on AWS PPT
 
Best Practices for IoT Security in the Cloud
Best Practices for IoT Security in the Cloud Best Practices for IoT Security in the Cloud
Best Practices for IoT Security in the Cloud
 

Ähnlich wie Cloud Security Benefits and Best Practices

AWS Cloud Security From the Point of View of the Compliance
AWS Cloud Security From the Point of View of the ComplianceAWS Cloud Security From the Point of View of the Compliance
AWS Cloud Security From the Point of View of the ComplianceYury Chemerkin
 
Automating your AWS Security Operations
Automating your AWS Security OperationsAutomating your AWS Security Operations
Automating your AWS Security OperationsEvident.io
 
Automating your AWS Security Operations
Automating your AWS Security OperationsAutomating your AWS Security Operations
Automating your AWS Security OperationsAmazon Web Services
 
AWS & Intel: A Partnership Dedicated to Cloud Innovations
AWS & Intel: A Partnership Dedicated to Cloud InnovationsAWS & Intel: A Partnership Dedicated to Cloud Innovations
AWS & Intel: A Partnership Dedicated to Cloud InnovationsAmazon Web Services
 
Cloud computing & Security presentation
Cloud computing & Security presentationCloud computing & Security presentation
Cloud computing & Security presentationParveen Yadav
 
AWS Security Challenges
AWS Security ChallengesAWS Security Challenges
AWS Security ChallengesSTO STRATEGY
 
Immutable Infrastructure Security
Immutable Infrastructure SecurityImmutable Infrastructure Security
Immutable Infrastructure SecurityRicky Sanders
 
AWS re:Invent 2016: Life Without SSH: Immutable Infrastructure in Production ...
AWS re:Invent 2016: Life Without SSH: Immutable Infrastructure in Production ...AWS re:Invent 2016: Life Without SSH: Immutable Infrastructure in Production ...
AWS re:Invent 2016: Life Without SSH: Immutable Infrastructure in Production ...Amazon Web Services
 
Cloud Computing and Virtualisation
Cloud Computing and VirtualisationCloud Computing and Virtualisation
Cloud Computing and Virtualisationanupriti
 
Building Secure Services in the Cloud
Building Secure Services in the CloudBuilding Secure Services in the Cloud
Building Secure Services in the CloudSumo Logic
 
CloudSec , don't forget Security in the Cloud !
CloudSec , don't forget Security in the Cloud !CloudSec , don't forget Security in the Cloud !
CloudSec , don't forget Security in the Cloud !Kris Buytaert
 
Introduction to cloud computing
Introduction to cloud computingIntroduction to cloud computing
Introduction to cloud computingDigital Shende
 
Moving "Something Simple" To The Cloud - What It Really Takes
Moving "Something Simple" To The Cloud - What It Really TakesMoving "Something Simple" To The Cloud - What It Really Takes
Moving "Something Simple" To The Cloud - What It Really TakesCloverDX
 
Why integration is key in IoT solutions? (Sam Vanhoutte @Integrate2017)
Why integration is key in IoT solutions? (Sam Vanhoutte @Integrate2017)Why integration is key in IoT solutions? (Sam Vanhoutte @Integrate2017)
Why integration is key in IoT solutions? (Sam Vanhoutte @Integrate2017)Codit
 
AWS Serverless Community Day Keynote and Vendia Launch 6-26-2020
AWS Serverless Community Day Keynote and Vendia Launch 6-26-2020AWS Serverless Community Day Keynote and Vendia Launch 6-26-2020
AWS Serverless Community Day Keynote and Vendia Launch 6-26-2020Tim Wagner
 
Cloud Computing With AWS
Cloud Computing With AWSCloud Computing With AWS
Cloud Computing With AWSMunish Gupta
 

Ähnlich wie Cloud Security Benefits and Best Practices (20)

Jumpstart Azure
Jumpstart AzureJumpstart Azure
Jumpstart Azure
 
Cloud Computing Neccesity
Cloud Computing  NeccesityCloud Computing  Neccesity
Cloud Computing Neccesity
 
AWS Cloud Security From the Point of View of the Compliance
AWS Cloud Security From the Point of View of the ComplianceAWS Cloud Security From the Point of View of the Compliance
AWS Cloud Security From the Point of View of the Compliance
 
Automating your AWS Security Operations
Automating your AWS Security OperationsAutomating your AWS Security Operations
Automating your AWS Security Operations
 
Automating your AWS Security Operations
Automating your AWS Security OperationsAutomating your AWS Security Operations
Automating your AWS Security Operations
 
AWS & Intel: A Partnership Dedicated to Cloud Innovations
AWS & Intel: A Partnership Dedicated to Cloud InnovationsAWS & Intel: A Partnership Dedicated to Cloud Innovations
AWS & Intel: A Partnership Dedicated to Cloud Innovations
 
Cloud computing & Security presentation
Cloud computing & Security presentationCloud computing & Security presentation
Cloud computing & Security presentation
 
AWS Security Challenges
AWS Security ChallengesAWS Security Challenges
AWS Security Challenges
 
Immutable Infrastructure Security
Immutable Infrastructure SecurityImmutable Infrastructure Security
Immutable Infrastructure Security
 
AWS re:Invent 2016: Life Without SSH: Immutable Infrastructure in Production ...
AWS re:Invent 2016: Life Without SSH: Immutable Infrastructure in Production ...AWS re:Invent 2016: Life Without SSH: Immutable Infrastructure in Production ...
AWS re:Invent 2016: Life Without SSH: Immutable Infrastructure in Production ...
 
Cloud Computing and Virtualisation
Cloud Computing and VirtualisationCloud Computing and Virtualisation
Cloud Computing and Virtualisation
 
Building Secure Services in the Cloud
Building Secure Services in the CloudBuilding Secure Services in the Cloud
Building Secure Services in the Cloud
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
CloudSec , don't forget Security in the Cloud !
CloudSec , don't forget Security in the Cloud !CloudSec , don't forget Security in the Cloud !
CloudSec , don't forget Security in the Cloud !
 
Introduction to cloud computing
Introduction to cloud computingIntroduction to cloud computing
Introduction to cloud computing
 
Moving "Something Simple" To The Cloud - What It Really Takes
Moving "Something Simple" To The Cloud - What It Really TakesMoving "Something Simple" To The Cloud - What It Really Takes
Moving "Something Simple" To The Cloud - What It Really Takes
 
Why integration is key in IoT solutions? (Sam Vanhoutte @Integrate2017)
Why integration is key in IoT solutions? (Sam Vanhoutte @Integrate2017)Why integration is key in IoT solutions? (Sam Vanhoutte @Integrate2017)
Why integration is key in IoT solutions? (Sam Vanhoutte @Integrate2017)
 
IASA Atlanta September 2009
IASA Atlanta September 2009IASA Atlanta September 2009
IASA Atlanta September 2009
 
AWS Serverless Community Day Keynote and Vendia Launch 6-26-2020
AWS Serverless Community Day Keynote and Vendia Launch 6-26-2020AWS Serverless Community Day Keynote and Vendia Launch 6-26-2020
AWS Serverless Community Day Keynote and Vendia Launch 6-26-2020
 
Cloud Computing With AWS
Cloud Computing With AWSCloud Computing With AWS
Cloud Computing With AWS
 

Mehr von Ernest Mueller

AlienVault USM Anywhere: Building a Security SaaS in AWS in Six Months
AlienVault USM Anywhere: Building a Security SaaS in AWS in Six MonthsAlienVault USM Anywhere: Building a Security SaaS in AWS in Six Months
AlienVault USM Anywhere: Building a Security SaaS in AWS in Six MonthsErnest Mueller
 
The DevOps Panel - Innotech Austin CD Summit
The DevOps Panel - Innotech Austin CD SummitThe DevOps Panel - Innotech Austin CD Summit
The DevOps Panel - Innotech Austin CD SummitErnest Mueller
 
Lean Security - LASCON 2016
Lean Security - LASCON 2016Lean Security - LASCON 2016
Lean Security - LASCON 2016Ernest Mueller
 
Lean Security - OWASP Austin March 2016
Lean Security - OWASP Austin March 2016Lean Security - OWASP Austin March 2016
Lean Security - OWASP Austin March 2016Ernest Mueller
 
Lean Security - RSA 2016
Lean Security - RSA 2016Lean Security - RSA 2016
Lean Security - RSA 2016Ernest Mueller
 
DevOps Transformations
DevOps TransformationsDevOps Transformations
DevOps TransformationsErnest Mueller
 
DevOps State of the Union 2015
DevOps State of the Union 2015DevOps State of the Union 2015
DevOps State of the Union 2015Ernest Mueller
 
App Assessments Reloaded
App Assessments ReloadedApp Assessments Reloaded
App Assessments ReloadedErnest Mueller
 
Metrics Driven Development and DevOps - Agile 2014
Metrics Driven Development and DevOps - Agile 2014Metrics Driven Development and DevOps - Agile 2014
Metrics Driven Development and DevOps - Agile 2014Ernest Mueller
 
2012 - A Release Odyssey
2012 - A Release Odyssey2012 - A Release Odyssey
2012 - A Release OdysseyErnest Mueller
 
CloudAustin Black Friday 2013
CloudAustin Black Friday 2013CloudAustin Black Friday 2013
CloudAustin Black Friday 2013Ernest Mueller
 
DevOps and Cloud at NI
DevOps and Cloud at NIDevOps and Cloud at NI
DevOps and Cloud at NIErnest Mueller
 
Business model driven cloud adoption - what NI is doing in the cloud
Business model driven cloud adoption -  what  NI is doing in the cloudBusiness model driven cloud adoption -  what  NI is doing in the cloud
Business model driven cloud adoption - what NI is doing in the cloudErnest Mueller
 
Inside Microsoft Azure
Inside Microsoft AzureInside Microsoft Azure
Inside Microsoft AzureErnest Mueller
 

Mehr von Ernest Mueller (20)

DevOps at a Distance
DevOps at a DistanceDevOps at a Distance
DevOps at a Distance
 
AlienVault USM Anywhere: Building a Security SaaS in AWS in Six Months
AlienVault USM Anywhere: Building a Security SaaS in AWS in Six MonthsAlienVault USM Anywhere: Building a Security SaaS in AWS in Six Months
AlienVault USM Anywhere: Building a Security SaaS in AWS in Six Months
 
Intro to DevOps
Intro to DevOpsIntro to DevOps
Intro to DevOps
 
The DevOps Panel - Innotech Austin CD Summit
The DevOps Panel - Innotech Austin CD SummitThe DevOps Panel - Innotech Austin CD Summit
The DevOps Panel - Innotech Austin CD Summit
 
Lean Security - LASCON 2016
Lean Security - LASCON 2016Lean Security - LASCON 2016
Lean Security - LASCON 2016
 
Lean Security - OWASP Austin March 2016
Lean Security - OWASP Austin March 2016Lean Security - OWASP Austin March 2016
Lean Security - OWASP Austin March 2016
 
Lean Security - RSA 2016
Lean Security - RSA 2016Lean Security - RSA 2016
Lean Security - RSA 2016
 
DevOps Transformations
DevOps TransformationsDevOps Transformations
DevOps Transformations
 
DevOps State of the Union 2015
DevOps State of the Union 2015DevOps State of the Union 2015
DevOps State of the Union 2015
 
DevOps 101
DevOps 101DevOps 101
DevOps 101
 
App Assessments Reloaded
App Assessments ReloadedApp Assessments Reloaded
App Assessments Reloaded
 
Metrics Driven Development and DevOps - Agile 2014
Metrics Driven Development and DevOps - Agile 2014Metrics Driven Development and DevOps - Agile 2014
Metrics Driven Development and DevOps - Agile 2014
 
The DevOps Centipede
The DevOps CentipedeThe DevOps Centipede
The DevOps Centipede
 
2012 - A Release Odyssey
2012 - A Release Odyssey2012 - A Release Odyssey
2012 - A Release Odyssey
 
Mobile and the Cloud
Mobile and the CloudMobile and the Cloud
Mobile and the Cloud
 
CloudAustin Black Friday 2013
CloudAustin Black Friday 2013CloudAustin Black Friday 2013
CloudAustin Black Friday 2013
 
Cloud Monitoring
Cloud MonitoringCloud Monitoring
Cloud Monitoring
 
DevOps and Cloud at NI
DevOps and Cloud at NIDevOps and Cloud at NI
DevOps and Cloud at NI
 
Business model driven cloud adoption - what NI is doing in the cloud
Business model driven cloud adoption -  what  NI is doing in the cloudBusiness model driven cloud adoption -  what  NI is doing in the cloud
Business model driven cloud adoption - what NI is doing in the cloud
 
Inside Microsoft Azure
Inside Microsoft AzureInside Microsoft Azure
Inside Microsoft Azure
 

Kürzlich hochgeladen

Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DaySri Ambati
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 

Kürzlich hochgeladen (20)

Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 

Cloud Security Benefits and Best Practices

  • 1. Ernest Mueller National Instruments theagileadmin.com ernest.mueller@gmail.com @ernestmueller
  • 2.
  • 3. (ISP -> colo) + virtualization + HPC + (AJAX + SOA -> REST APIs) = IaaS IDE/4GLs + EAI + SaaS + IaaS = PaaS ((web site -> web app) -> ASP) + virtualization + fast network + [RIA browsers && mobile] = SaaS [IaaS | PaaS | SaaS ] + [ devops | open source | noSQL ] = cloud
  • 4. Amazon EC2, Rackspace, VMWare, Verizon, Terremark, IBM, everyone else with a data center Move infrastructure off premise, focus on value added operations Usually multitenant virtualized hosting, REST API driven near-instant provisioning to scale, utility billing
  • 5. Salesforce.com, Google Apps, Zoho, MobileMe, everyone else with some developers Bringing the convenience of consumer apps to the world of business apps You’ve been doing this forever (ADT/Paychex, credit card processors)
  • 6. force.com, Microsoft Azure, Google App Engine, Heroku, Code2Cloud Develop apps without needing to mess with the plumbing The most newfangled
  • 7.  Private Cloud  Virtual Private Cloud  Hybrid Cloud/Cloudbursting  This Cloud, That Cloud cloud + mobile + social + agile = EaaS?
  • 8. “Cloud? I’ve been doing that since 1988. It’s just the same old thing with a new name." - Technohipster
  • 9. Pretty new: multitenant massively scalable elastic self provisioning pay as you go Resulting benefits: agility economy of scale low initial investment scalable cost/opex resilience easy delivery Not new: virtualization outsourcing integration interwebz
  • 10. Centralization -> Delegation, Federation • "I own it all and control it all" is a myth • Auditable standards, open protocols • SLAs are worthless when it matters • “Cloud computing is about gracefully losing control while maintaining accountability” -CSA Outsourcing is Scary! • Not Hosted Here Syndrome • SLAs/contracts vs. "firing someone" • Enemy ninjas • Legal discovery
  • 11. “I'd rather trust someone I've never met than the guys in IT.” - Developer
  • 12. Are You This Guy?
  • 13. Too bad! Gartner reports that 39% of respondents worldwide are budgeting money to spend on cloud Cloud computing is already 10% of total IT services budgets Cloud is the future of computing If you make it into security “versus” business outcome – you lose! Luckily, it doesn’t have to be that way Sure, there’s security stuff to manage around the cloud, just like anything But here’s why the cloud can improve your security posture, and how it can help you do your job!
  • 14.  Globally distributed data centers with multiple availability zones per region  Data centers: unmarked separate buildings, biometrics, access logging. SAS 70 Type II, ISO 27001 in progress  S3 Storage: highly redundant storage, control over global distribution  Disks are zeroed out post-use  EC2 Instances: image based VMs
  • 15.  Security Groups – like a software firewall integrated down to the hypervisor  Amazon ops staff can’t see within your VM or memory  VPC for private only instances  Key crypto for machine access  Multifactor auth available  “Bring your own key”
  • 16.  Employee vetting procedures  Big security department  Other products - RDS, SNS, SimpleDB, SQS, monitoring, CDN, etc.  Via a console or API, you instantiate instances from images, provision storage and network, set access keys, make copies, terminate assets
  • 17.  Highly Dynamic - IP addresses, number of servers, etc. change at will  Key Management  Image Management  Encryption of stored data (“Do it”)  Identity Management  Poindextery Cross-VM Attacks  People Who Don’t Get It Yet  Enthusiasm + Immature Vendors
  • 18. “But you said the cloud’s more secure, man!” - You
  • 19. You have to ask – “More secure than what?” It’s less secure than your mental model of the perfectly secure system Which does not exist really – you need to compare it to the real security you have going in your current shop as it stands and see if it’s better or worse. In many cases it’s better.
  • 20.
  • 21. the proof is in the pudding mmm… pudding let’s see how the cloud and one large IT shop compare
  • 22. in IT, our online catalog 30 day availability: 98.59% in the cloud, 30 day availability: 100.0%
  • 23. in IT, our internal DMZ implementation – 5 years and counting in the cloud – a defined DMZ around every single server role
  • 24. in IT, our DR plan is “Pray” in the cloud, the time to have our entire system built from scratch in another region is 2 hours
  • 25. in IT, our transport security can be described by “telnet’s secure, right?” and “HTTPS? Not in our version of Oracle!” in the cloud, SSL is everywhere, all logins are certed
  • 26. in IT, we have to “scan” to “discover” our assets and their OS levels in the cloud, we create our systems from a defined model programmatically
  • 27. in the cloud, we alert if anyone logs into a server, it’s so rare in the cloud, if a box is suspect we crumple it up and throw it away (you can make a copy)
  • 28.
  • 29. is this an unfair comparison? what is “fair?” the only meaningful question is “with my new app, where objectively is it better off?”
  • 30. the cloud gives superpowers to the little guy intense resilience cloud backup near automatic DR open standards APIs and scale drive self service
  • 31. many cloud providers have more security staff than you do you benefit from the security requirements of all their other customers managed security service integration is a compelling product security is a differentiator in the space and suppliers are chasing it
  • 32. better architecture – “sharing is the devil” utility billing drives sunsetting of old apps/systems security SaaS products make enterprise level security accessible acknowledges reality – devices, networks, data are everywhere
  • 33. the cloud age post "perimeter" post "SLA" post "server" post "web page"
  • 34. “You can run, but you’ll just die tired.” - Me
  • 36. how can you be cloud friendly? automation self service collaboration fix the tools extend your reach make encryption easy focus on outcomes
  • 37.  Remember “port knocking?”  With model driven automation (“infrastructure as code”) you can create firewall holes, provision user accounts, etc. in real time and remove them once they’re done being used  If it’s self service, it’s more auditable than “ask a network admin”
  • 38.  Increased trend driven by agile development towards tight collaboration between developers and operations staff  Be the “security buddy”  Embed with projects, don’t be a seagull  By understanding, be understood  How secure are things usually when people and teams all work separately?
  • 39.  Dynamic nature of cloud poses challenges for old tools  Encryption is still stupid hard – check out grendel, and maybe homomorphic encryption will rescue us  Note all the “Security as a Service” offerings springing up- was spam filtering and scanning, now it’s code analysis (Veracode, Fortify), IAM (PingIdentity), virus scan (McAfee), etc.
  • 40.  Focus on real security  Naturally it’ll take time for compliance standards to get with the times – but don’t assume it can’t be compliant – some of your auditors have actually heard of VMs and know what to do  FUD doesn’t benefit anyone – figuring out how to “make it happen” – securely – benefits everyone.
  • 42.  Cloud Security Alliance (cloudsecurityalliance.org)  Security Guidance for Critical Areas in Cloud Computing (http://cloudsecurityalliance.org/guidance/cs aguide.v2.1.pdf)  ENISA Cloud Computing Risk Assessment (http://www.enisa.europa.eu/act/rm/files/del iverables/cloud-computing-risk-assessment )
  • 43.  Book: Cloud Security and Privacy (Mather, Kumraswamy, Latif) - Yay!  Book: Cloud Security (Krutz, Vines) - Boo!  Jericho Forum (jerichoforum.org)  Amazon Security Center (aws.amazon.com/security)  Austin Cloud User Group (acug.cloudug.org)