SlideShare ist ein Scribd-Unternehmen logo
1 von 15
Downloaden Sie, um offline zu lesen
Architecting a secure castle
       in the clouds
        Dr Tim Redhead
            DotSec

         tim@dotsec.com
Strong requirements

Clear understanding of risk

Some very good architecture
Security architecture
●   Identity and Access Management
●   Mobile and ubiquitous devices
●   The cloud and as-a-service model
I think therefore... IAM!
●   Identity and Access Management
●   Great opportunities for IAM in your SecArch
●   Rally to me!
●   Kicking the devil's dog
IAM benefits
●   Cost-effective
             ●   e.g. Limited budget; fixed-price projects.
●   Robust
             ●   e.g History of fault-tolerance and HA.
●   Secure
             ●   No option: Owners and providers want assurance.
●   Claims based
             ●   Flexible, extensible, aligned
We can leave the 20th century

       Client 1                   Client 2                    Client 3



       Internet                   Internet                   Internet




     Services 1                       Aggregate some services
                                Services 2                  Services 3



Database 1                  Merge
                           Database 2                Database 3
                  Dir 1                      Dir 2                       Dir 3
                             some
                          directories
And then we can have nice things
                 Client Client
                      Client


                   Internet




         IdP                     Etc
                     Dir
          Infrastructural sec services

                                          Prov4
Prov1
         Prov2                    Prov3
Fun with mobiles
●   Rocks and hard places
●   Opportunities for enhanced services
●   Marty McFly still lives!
●   Platforms and lava lamps
●   The users are all primed to go
●   I want a flashing one, with the lot!
Who's to know?
●   Dr Gerry McCartney
●   Stuxnet, Flame, Duqu and Zeus
●   Bangs and whispers
Don't be sad

●   RDRBA is your key
●   Fight the battles you can win
●   Thin out the threatscape
●   Coral the zombies
●   Two is better than one
Forecasting clouds
●   Mostly fairly well understood components
●   Risky relationships but not bad per se
●   20 people and 20 answers... sans wine




                              Dilbert ©2012, Universal Uclick
Our uses
Monoliths and memorials
●   RDRBA will guide you
●   Clouds, silver bullets and planning
                                       Client


                                       Presentation
             Security infrastructure




                                                                       Backup and DR
                                                      Virtualisation
                                       Logic


                                       Data store


                                       Network



●   What will you get and what will you lose?
Strong requirements

Clear understanding of risk

Some very good architecture

Weitere ähnliche Inhalte

Ähnlich wie Australian CIO Summit 2012: Architecting a Secure Castle in the Clouds by Dr Tim Redhead, Director, DotSec

MidoNet US Launch - Oct 15
MidoNet US Launch - Oct 15MidoNet US Launch - Oct 15
MidoNet US Launch - Oct 15Midokura
 
DCEU 18: Edge Computing with Docker Enterprise
DCEU 18: Edge Computing with Docker EnterpriseDCEU 18: Edge Computing with Docker Enterprise
DCEU 18: Edge Computing with Docker EnterpriseDocker, Inc.
 
Distributed edge cloud: empowering the IoT revolution
Distributed edge cloud: empowering the IoT revolutionDistributed edge cloud: empowering the IoT revolution
Distributed edge cloud: empowering the IoT revolutionSamy Fodil
 
Cloud as a Flexible & Collaborative Tool for Creators
Cloud as a Flexible & Collaborative Tool for CreatorsCloud as a Flexible & Collaborative Tool for Creators
Cloud as a Flexible & Collaborative Tool for Creatorsjlchatelain
 
You Can’t Do That With Smalltalk!
You Can’t Do That With Smalltalk!You Can’t Do That With Smalltalk!
You Can’t Do That With Smalltalk!ESUG
 
Metaverse - The 'Killer App' for 5G, 6G and Beyond
Metaverse - The 'Killer App' for 5G, 6G and BeyondMetaverse - The 'Killer App' for 5G, 6G and Beyond
Metaverse - The 'Killer App' for 5G, 6G and BeyondAnand Bhojan
 
Cloud Connect
Cloud ConnectCloud Connect
Cloud Connectctrlsblog
 
DCL LavaCon Presentation 2011
DCL LavaCon Presentation 2011DCL LavaCon Presentation 2011
DCL LavaCon Presentation 2011DCLab
 
Converting Unstructured Docs to XML/DITA/ePub
Converting Unstructured Docs to XML/DITA/ePubConverting Unstructured Docs to XML/DITA/ePub
Converting Unstructured Docs to XML/DITA/ePubDCLab
 
Converting Unstructured Docs to XML/DITA/ePub
Converting Unstructured Docs to XML/DITA/ePubConverting Unstructured Docs to XML/DITA/ePub
Converting Unstructured Docs to XML/DITA/ePubDCLab
 
Introduction to Network Virtualization for IaaS Cloud by Midokura at LinuxCon...
Introduction to Network Virtualization for IaaS Cloud by Midokura at LinuxCon...Introduction to Network Virtualization for IaaS Cloud by Midokura at LinuxCon...
Introduction to Network Virtualization for IaaS Cloud by Midokura at LinuxCon...Midokura
 
Solving IoT Hardware Issues With Docker
Solving IoT Hardware Issues With DockerSolving IoT Hardware Issues With Docker
Solving IoT Hardware Issues With DockerWill Hall
 
WillMicroserviceDie.pdf
WillMicroserviceDie.pdfWillMicroserviceDie.pdf
WillMicroserviceDie.pdfEmilyJiang23
 
Smart Grids & Dumb Security => A Guide For Business Managers
Smart Grids & Dumb Security => A Guide For Business ManagersSmart Grids & Dumb Security => A Guide For Business Managers
Smart Grids & Dumb Security => A Guide For Business ManagersFaris Al-Kharusi
 
Design Verification: The Past, Present and Futurere
Design Verification: The Past, Present and FuturereDesign Verification: The Past, Present and Futurere
Design Verification: The Past, Present and FuturereDVClub
 
Design verification--the-past-present-and-future
Design verification--the-past-present-and-futureDesign verification--the-past-present-and-future
Design verification--the-past-present-and-futureObsidian Software
 
DDS Interoperability Demo
DDS Interoperability DemoDDS Interoperability Demo
DDS Interoperability DemoAngelo Corsaro
 
Where worlds collide: Agile, Project Management, Risk and Cloud?
Where worlds collide: Agile, Project Management, Risk and Cloud?Where worlds collide: Agile, Project Management, Risk and Cloud?
Where worlds collide: Agile, Project Management, Risk and Cloud?Livingstone Advisory
 

Ähnlich wie Australian CIO Summit 2012: Architecting a Secure Castle in the Clouds by Dr Tim Redhead, Director, DotSec (20)

OMG DDS Interoperability Demo 2009
OMG DDS Interoperability Demo 2009OMG DDS Interoperability Demo 2009
OMG DDS Interoperability Demo 2009
 
M6d cassandra summit
M6d cassandra summitM6d cassandra summit
M6d cassandra summit
 
MidoNet US Launch - Oct 15
MidoNet US Launch - Oct 15MidoNet US Launch - Oct 15
MidoNet US Launch - Oct 15
 
DCEU 18: Edge Computing with Docker Enterprise
DCEU 18: Edge Computing with Docker EnterpriseDCEU 18: Edge Computing with Docker Enterprise
DCEU 18: Edge Computing with Docker Enterprise
 
Distributed edge cloud: empowering the IoT revolution
Distributed edge cloud: empowering the IoT revolutionDistributed edge cloud: empowering the IoT revolution
Distributed edge cloud: empowering the IoT revolution
 
Cloud as a Flexible & Collaborative Tool for Creators
Cloud as a Flexible & Collaborative Tool for CreatorsCloud as a Flexible & Collaborative Tool for Creators
Cloud as a Flexible & Collaborative Tool for Creators
 
You Can’t Do That With Smalltalk!
You Can’t Do That With Smalltalk!You Can’t Do That With Smalltalk!
You Can’t Do That With Smalltalk!
 
Metaverse - The 'Killer App' for 5G, 6G and Beyond
Metaverse - The 'Killer App' for 5G, 6G and BeyondMetaverse - The 'Killer App' for 5G, 6G and Beyond
Metaverse - The 'Killer App' for 5G, 6G and Beyond
 
Cloud Connect
Cloud ConnectCloud Connect
Cloud Connect
 
DCL LavaCon Presentation 2011
DCL LavaCon Presentation 2011DCL LavaCon Presentation 2011
DCL LavaCon Presentation 2011
 
Converting Unstructured Docs to XML/DITA/ePub
Converting Unstructured Docs to XML/DITA/ePubConverting Unstructured Docs to XML/DITA/ePub
Converting Unstructured Docs to XML/DITA/ePub
 
Converting Unstructured Docs to XML/DITA/ePub
Converting Unstructured Docs to XML/DITA/ePubConverting Unstructured Docs to XML/DITA/ePub
Converting Unstructured Docs to XML/DITA/ePub
 
Introduction to Network Virtualization for IaaS Cloud by Midokura at LinuxCon...
Introduction to Network Virtualization for IaaS Cloud by Midokura at LinuxCon...Introduction to Network Virtualization for IaaS Cloud by Midokura at LinuxCon...
Introduction to Network Virtualization for IaaS Cloud by Midokura at LinuxCon...
 
Solving IoT Hardware Issues With Docker
Solving IoT Hardware Issues With DockerSolving IoT Hardware Issues With Docker
Solving IoT Hardware Issues With Docker
 
WillMicroserviceDie.pdf
WillMicroserviceDie.pdfWillMicroserviceDie.pdf
WillMicroserviceDie.pdf
 
Smart Grids & Dumb Security => A Guide For Business Managers
Smart Grids & Dumb Security => A Guide For Business ManagersSmart Grids & Dumb Security => A Guide For Business Managers
Smart Grids & Dumb Security => A Guide For Business Managers
 
Design Verification: The Past, Present and Futurere
Design Verification: The Past, Present and FuturereDesign Verification: The Past, Present and Futurere
Design Verification: The Past, Present and Futurere
 
Design verification--the-past-present-and-future
Design verification--the-past-present-and-futureDesign verification--the-past-present-and-future
Design verification--the-past-present-and-future
 
DDS Interoperability Demo
DDS Interoperability DemoDDS Interoperability Demo
DDS Interoperability Demo
 
Where worlds collide: Agile, Project Management, Risk and Cloud?
Where worlds collide: Agile, Project Management, Risk and Cloud?Where worlds collide: Agile, Project Management, Risk and Cloud?
Where worlds collide: Agile, Project Management, Risk and Cloud?
 

Mehr von IT Network marcus evans

How CIOs Can Bridge the Gap Between Executive Leadership and IT Teams - Greg ...
How CIOs Can Bridge the Gap Between Executive Leadership and IT Teams - Greg ...How CIOs Can Bridge the Gap Between Executive Leadership and IT Teams - Greg ...
How CIOs Can Bridge the Gap Between Executive Leadership and IT Teams - Greg ...IT Network marcus evans
 
How the IT Function Can Enable the Organisation to Achieve its Goals - Anupam...
How the IT Function Can Enable the Organisation to Achieve its Goals - Anupam...How the IT Function Can Enable the Organisation to Achieve its Goals - Anupam...
How the IT Function Can Enable the Organisation to Achieve its Goals - Anupam...IT Network marcus evans
 
What CIOs Need to Know about the Future of Technology - Steve Sammartino, Fu...
What CIOs Need to Know about the Future of Technology  - Steve Sammartino, Fu...What CIOs Need to Know about the Future of Technology  - Steve Sammartino, Fu...
What CIOs Need to Know about the Future of Technology - Steve Sammartino, Fu...IT Network marcus evans
 
The Low Risk Way to Expanding a Business into South East Asia Joe Fussell & D...
The Low Risk Way to Expanding a Business into South East Asia Joe Fussell & D...The Low Risk Way to Expanding a Business into South East Asia Joe Fussell & D...
The Low Risk Way to Expanding a Business into South East Asia Joe Fussell & D...IT Network marcus evans
 
Why IT Systems Need to Conduct IT System Penetration Tests - Chris Gatford, N...
Why IT Systems Need to Conduct IT System Penetration Tests - Chris Gatford, N...Why IT Systems Need to Conduct IT System Penetration Tests - Chris Gatford, N...
Why IT Systems Need to Conduct IT System Penetration Tests - Chris Gatford, N...IT Network marcus evans
 
Gestión, Ejecución, y Eficiencia a Escala Panregional. Desafíos a Superar-Ant...
Gestión, Ejecución, y Eficiencia a Escala Panregional. Desafíos a Superar-Ant...Gestión, Ejecución, y Eficiencia a Escala Panregional. Desafíos a Superar-Ant...
Gestión, Ejecución, y Eficiencia a Escala Panregional. Desafíos a Superar-Ant...IT Network marcus evans
 
Time Machines: The Evolution and Application of Predictive Analytics-Dr Steve...
Time Machines: The Evolution and Application of Predictive Analytics-Dr Steve...Time Machines: The Evolution and Application of Predictive Analytics-Dr Steve...
Time Machines: The Evolution and Application of Predictive Analytics-Dr Steve...IT Network marcus evans
 
Data Breaches and Security: Ditching Data Disasters-Michael McNeil, Philips H...
Data Breaches and Security: Ditching Data Disasters-Michael McNeil, Philips H...Data Breaches and Security: Ditching Data Disasters-Michael McNeil, Philips H...
Data Breaches and Security: Ditching Data Disasters-Michael McNeil, Philips H...IT Network marcus evans
 
How CIOs Can Execute Change Programmes Successfully - Melissa Bell news release
How CIOs Can Execute Change Programmes Successfully - Melissa Bell news releaseHow CIOs Can Execute Change Programmes Successfully - Melissa Bell news release
How CIOs Can Execute Change Programmes Successfully - Melissa Bell news releaseIT Network marcus evans
 
Transitioning to a Digital Enterprise - Dan Hushon News Release
Transitioning to a Digital Enterprise -  Dan Hushon News ReleaseTransitioning to a Digital Enterprise -  Dan Hushon News Release
Transitioning to a Digital Enterprise - Dan Hushon News ReleaseIT Network marcus evans
 
The one-on-one meetings with potential customers is what matters most
The one-on-one meetings with potential customers is what matters mostThe one-on-one meetings with potential customers is what matters most
The one-on-one meetings with potential customers is what matters mostIT Network marcus evans
 
Where marcus evans fits in our business development mix
Where marcus evans fits in our business development mixWhere marcus evans fits in our business development mix
Where marcus evans fits in our business development mixIT Network marcus evans
 
Crafting the Right Mobile Device Management Framework to Mitigate Risks and M...
Crafting the Right Mobile Device Management Framework to Mitigate Risks and M...Crafting the Right Mobile Device Management Framework to Mitigate Risks and M...
Crafting the Right Mobile Device Management Framework to Mitigate Risks and M...IT Network marcus evans
 
Adaptive Transformation: Transitioning from Resource to Flow Efficiency
Adaptive Transformation: Transitioning from Resource to Flow Efficiency Adaptive Transformation: Transitioning from Resource to Flow Efficiency
Adaptive Transformation: Transitioning from Resource to Flow Efficiency IT Network marcus evans
 
The Shifting Role of the CIO as a Strategic Innovator
The Shifting Role of the CIO as a Strategic InnovatorThe Shifting Role of the CIO as a Strategic Innovator
The Shifting Role of the CIO as a Strategic InnovatorIT Network marcus evans
 
Active Defence: Safeguarding Crucial Capability while Boosting Functionality ...
Active Defence: Safeguarding Crucial Capability while Boosting Functionality ...Active Defence: Safeguarding Crucial Capability while Boosting Functionality ...
Active Defence: Safeguarding Crucial Capability while Boosting Functionality ...IT Network marcus evans
 
Outsourcing to Save IT Costs: Interview with: George Bower, President and Chi...
Outsourcing to Save IT Costs: Interview with: George Bower, President and Chi...Outsourcing to Save IT Costs: Interview with: George Bower, President and Chi...
Outsourcing to Save IT Costs: Interview with: George Bower, President and Chi...IT Network marcus evans
 
Building IT Infrastructures to Interact with Big Data - Doug Roberts, Associ...
Building IT Infrastructures to Interact with Big Data  - Doug Roberts, Associ...Building IT Infrastructures to Interact with Big Data  - Doug Roberts, Associ...
Building IT Infrastructures to Interact with Big Data - Doug Roberts, Associ...IT Network marcus evans
 
How Infosec Can Become a Business Enabler: Interview with: Dr Tim Redhead, Di...
How Infosec Can Become a Business Enabler: Interview with: Dr Tim Redhead, Di...How Infosec Can Become a Business Enabler: Interview with: Dr Tim Redhead, Di...
How Infosec Can Become a Business Enabler: Interview with: Dr Tim Redhead, Di...IT Network marcus evans
 

Mehr von IT Network marcus evans (20)

How CIOs Can Bridge the Gap Between Executive Leadership and IT Teams - Greg ...
How CIOs Can Bridge the Gap Between Executive Leadership and IT Teams - Greg ...How CIOs Can Bridge the Gap Between Executive Leadership and IT Teams - Greg ...
How CIOs Can Bridge the Gap Between Executive Leadership and IT Teams - Greg ...
 
How the IT Function Can Enable the Organisation to Achieve its Goals - Anupam...
How the IT Function Can Enable the Organisation to Achieve its Goals - Anupam...How the IT Function Can Enable the Organisation to Achieve its Goals - Anupam...
How the IT Function Can Enable the Organisation to Achieve its Goals - Anupam...
 
What CIOs Need to Know about the Future of Technology - Steve Sammartino, Fu...
What CIOs Need to Know about the Future of Technology  - Steve Sammartino, Fu...What CIOs Need to Know about the Future of Technology  - Steve Sammartino, Fu...
What CIOs Need to Know about the Future of Technology - Steve Sammartino, Fu...
 
The Low Risk Way to Expanding a Business into South East Asia Joe Fussell & D...
The Low Risk Way to Expanding a Business into South East Asia Joe Fussell & D...The Low Risk Way to Expanding a Business into South East Asia Joe Fussell & D...
The Low Risk Way to Expanding a Business into South East Asia Joe Fussell & D...
 
Why IT Systems Need to Conduct IT System Penetration Tests - Chris Gatford, N...
Why IT Systems Need to Conduct IT System Penetration Tests - Chris Gatford, N...Why IT Systems Need to Conduct IT System Penetration Tests - Chris Gatford, N...
Why IT Systems Need to Conduct IT System Penetration Tests - Chris Gatford, N...
 
Gestión, Ejecución, y Eficiencia a Escala Panregional. Desafíos a Superar-Ant...
Gestión, Ejecución, y Eficiencia a Escala Panregional. Desafíos a Superar-Ant...Gestión, Ejecución, y Eficiencia a Escala Panregional. Desafíos a Superar-Ant...
Gestión, Ejecución, y Eficiencia a Escala Panregional. Desafíos a Superar-Ant...
 
Time Machines: The Evolution and Application of Predictive Analytics-Dr Steve...
Time Machines: The Evolution and Application of Predictive Analytics-Dr Steve...Time Machines: The Evolution and Application of Predictive Analytics-Dr Steve...
Time Machines: The Evolution and Application of Predictive Analytics-Dr Steve...
 
Data Breaches and Security: Ditching Data Disasters-Michael McNeil, Philips H...
Data Breaches and Security: Ditching Data Disasters-Michael McNeil, Philips H...Data Breaches and Security: Ditching Data Disasters-Michael McNeil, Philips H...
Data Breaches and Security: Ditching Data Disasters-Michael McNeil, Philips H...
 
How CIOs Can Execute Change Programmes Successfully - Melissa Bell news release
How CIOs Can Execute Change Programmes Successfully - Melissa Bell news releaseHow CIOs Can Execute Change Programmes Successfully - Melissa Bell news release
How CIOs Can Execute Change Programmes Successfully - Melissa Bell news release
 
Transitioning to a Digital Enterprise - Dan Hushon News Release
Transitioning to a Digital Enterprise -  Dan Hushon News ReleaseTransitioning to a Digital Enterprise -  Dan Hushon News Release
Transitioning to a Digital Enterprise - Dan Hushon News Release
 
Grow Your Business
Grow Your Business Grow Your Business
Grow Your Business
 
The one-on-one meetings with potential customers is what matters most
The one-on-one meetings with potential customers is what matters mostThe one-on-one meetings with potential customers is what matters most
The one-on-one meetings with potential customers is what matters most
 
Where marcus evans fits in our business development mix
Where marcus evans fits in our business development mixWhere marcus evans fits in our business development mix
Where marcus evans fits in our business development mix
 
Crafting the Right Mobile Device Management Framework to Mitigate Risks and M...
Crafting the Right Mobile Device Management Framework to Mitigate Risks and M...Crafting the Right Mobile Device Management Framework to Mitigate Risks and M...
Crafting the Right Mobile Device Management Framework to Mitigate Risks and M...
 
Adaptive Transformation: Transitioning from Resource to Flow Efficiency
Adaptive Transformation: Transitioning from Resource to Flow Efficiency Adaptive Transformation: Transitioning from Resource to Flow Efficiency
Adaptive Transformation: Transitioning from Resource to Flow Efficiency
 
The Shifting Role of the CIO as a Strategic Innovator
The Shifting Role of the CIO as a Strategic InnovatorThe Shifting Role of the CIO as a Strategic Innovator
The Shifting Role of the CIO as a Strategic Innovator
 
Active Defence: Safeguarding Crucial Capability while Boosting Functionality ...
Active Defence: Safeguarding Crucial Capability while Boosting Functionality ...Active Defence: Safeguarding Crucial Capability while Boosting Functionality ...
Active Defence: Safeguarding Crucial Capability while Boosting Functionality ...
 
Outsourcing to Save IT Costs: Interview with: George Bower, President and Chi...
Outsourcing to Save IT Costs: Interview with: George Bower, President and Chi...Outsourcing to Save IT Costs: Interview with: George Bower, President and Chi...
Outsourcing to Save IT Costs: Interview with: George Bower, President and Chi...
 
Building IT Infrastructures to Interact with Big Data - Doug Roberts, Associ...
Building IT Infrastructures to Interact with Big Data  - Doug Roberts, Associ...Building IT Infrastructures to Interact with Big Data  - Doug Roberts, Associ...
Building IT Infrastructures to Interact with Big Data - Doug Roberts, Associ...
 
How Infosec Can Become a Business Enabler: Interview with: Dr Tim Redhead, Di...
How Infosec Can Become a Business Enabler: Interview with: Dr Tim Redhead, Di...How Infosec Can Become a Business Enabler: Interview with: Dr Tim Redhead, Di...
How Infosec Can Become a Business Enabler: Interview with: Dr Tim Redhead, Di...
 

Kürzlich hochgeladen

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 

Kürzlich hochgeladen (20)

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 

Australian CIO Summit 2012: Architecting a Secure Castle in the Clouds by Dr Tim Redhead, Director, DotSec

  • 1. Architecting a secure castle in the clouds Dr Tim Redhead DotSec tim@dotsec.com
  • 2. Strong requirements Clear understanding of risk Some very good architecture
  • 3. Security architecture ● Identity and Access Management ● Mobile and ubiquitous devices ● The cloud and as-a-service model
  • 4. I think therefore... IAM! ● Identity and Access Management ● Great opportunities for IAM in your SecArch ● Rally to me! ● Kicking the devil's dog
  • 5. IAM benefits ● Cost-effective ● e.g. Limited budget; fixed-price projects. ● Robust ● e.g History of fault-tolerance and HA. ● Secure ● No option: Owners and providers want assurance. ● Claims based ● Flexible, extensible, aligned
  • 6. We can leave the 20th century Client 1 Client 2 Client 3 Internet Internet Internet Services 1 Aggregate some services Services 2 Services 3 Database 1 Merge Database 2 Database 3 Dir 1 Dir 2 Dir 3 some directories
  • 7. And then we can have nice things Client Client Client Internet IdP Etc Dir Infrastructural sec services Prov4 Prov1 Prov2 Prov3
  • 8. Fun with mobiles ● Rocks and hard places ● Opportunities for enhanced services ● Marty McFly still lives! ● Platforms and lava lamps ● The users are all primed to go ● I want a flashing one, with the lot!
  • 9.
  • 10. Who's to know? ● Dr Gerry McCartney ● Stuxnet, Flame, Duqu and Zeus ● Bangs and whispers
  • 11. Don't be sad ● RDRBA is your key ● Fight the battles you can win ● Thin out the threatscape ● Coral the zombies ● Two is better than one
  • 12. Forecasting clouds ● Mostly fairly well understood components ● Risky relationships but not bad per se ● 20 people and 20 answers... sans wine Dilbert ©2012, Universal Uclick
  • 14. Monoliths and memorials ● RDRBA will guide you ● Clouds, silver bullets and planning Client Presentation Security infrastructure Backup and DR Virtualisation Logic Data store Network ● What will you get and what will you lose?
  • 15. Strong requirements Clear understanding of risk Some very good architecture