SlideShare ist ein Scribd-Unternehmen logo
1 von 22
Downloaden Sie, um offline zu lesen
Security of, for & by Cloud – A synopsis




           LAKSHMI SUBRAMANIAN

              A P R I L 2 3 RD, 2 0 1 2
Talk Outline




               2
State of art



               3
Cloud Computing - Simplified value network




SOURCE: Cloud Computing - Outsourcing 2.0 or a new Business Model for IT Provisioning?, TU Munich   4
Cloud computing players




SOURCE: A map of major cloud players, Bessemer Cloudscape, Dec 2011   5
Why do we care about Cloud
            security?

Security of Cloud
 Cloud security – Current scenario


 Several data breach cases


 Challenges to Cloud security
                                                      ?
 Comparison between traditional and Cloud security

                                                          6
Greatest outsourcing concerns (n=200)




SOURCE: Cloud Security Insights for IT Strategic planning, Intel IT Center, Sep 2011   7
SOURCE: CompTIA’s 9th Annual Information Security Trends (based on 500 US IT and business executives)

                                                                                                        8
Several cases of data breaches




                                 9
Predicted challenges to Cloud security

                                   Insecure layered
        Attractive target             Interfaces
                                                          Advanced
                                                      Persistent threats



Insider attacks                  Challenges
                                                             Resource
                                                           sharing issues


     Unforeseen risks
                                                      Data isolation in
                            Adoption of BYOD           multi tenancy
                            & cloud computing

                                                                            10
Comparison in terms of security

 Traditional networks                         Cloud networks

Most of the present day security controls apply for both the networks

                                      • who                Who does what?
                Defined



Single client – His                     Data isolation
data and applications                   and life cycle
                                        monitoring?

                                        The more transparency with the
Contractual obligations between         Do’s and Don’ts of the
stakeholders – regular process          stakeholders – the more better
                                                                         11
What is the approach to provide
        security for Cloud?


Security for Cloud
 Cloud security controls – Defense in depth

 Approach to resolve underlying threats

 Revisiting challenges




                                               12
Cloud Security Controls – Defense in depth




SOURCE: Cloud security sub-team, Cloud standards customer council, Jan 2012   13
Approach to resolving underlying threats

 Cost savings reinvested to improvise security

 CIA – key consideration for any security related issue

 Collaborative governance structure between customers and providers

 Contractually enforcing security requirements

 Compliance and exceptions as required for risk management policies of
  companies

 Simulation of incident scenarios and appropriate risk treatment plan

 Defense in depth strategy

 Improving awareness among the cloud users will help them play safe

                                                                          14
Revisiting the challenges

      Reinvest                                         Insecure layered
                                                          Interfaces
         Attractive target

                                                               Insider attacks


    Advanced                                        Defense
                                  Challenges
persistent threats                                  in depth
                                                     & CIA
   Compliance, Risk                                                Resource
     management,                                                 sharing issues
         & SLA

        Unforeseen risks
                                                        Data isolation in
                             Adoption of BYOD            multi tenancy
                             & cloud computing
                                        Awareness
                                                                                 15
How does cloud provide
              security?

Security by Cloud
 Security as a Service (SeaaS)

 Future prospects

 SeaaS in cloud for Smartphones




                                   16
Security as a service




 Gartner predicts – Cloud based anti-malware, anti-
  spyware will generate 60% of the revenue by 2013


 CSA focuses on SeaaS from a service provider point of view




                                                           17
Possible Cloud based security services

 Identity Management

 Data loss Protection

 Web Security

 Email Security

 IDS/IPS

 Encryption

 Business Continuity and Disaster Recovery

 Network Security


                                              18
Future prospects


 Feasibility analysis of the proposed security services


 Framing typical implementation guidelines


 Analysing pros and cons of in-house and cloud based
  security services

 Deriving the essence of this aspect in its entirety




                                                           19
SeaaS in Cloud for Smartphones




                                 20
CONCLUSIONS

 CIA will and should remain the key consideration for IT Security
  success

 Cloud computing is NOT as ALIEN as it is presumed to be


 DEFENSE in DEPTH is a powerful strategy


 ALL STAKEHOLDERS are in a way RESPONSIBLE for a cloud security
  breach

 Understanding WHAT DIFFERENCES cloud adoption could make
  specifically is important

 ADDRESSING these issues can help build a SAFE TOMORROW


                                                                     21
THANK YOU



            22

Weitere ähnliche Inhalte

Was ist angesagt?

Trend micro real time threat management press presentation
Trend micro real time threat management press presentationTrend micro real time threat management press presentation
Trend micro real time threat management press presentationAndrew Wong
 
Security assessment for financial institutions
Security assessment for financial institutionsSecurity assessment for financial institutions
Security assessment for financial institutionsZsolt Nemeth
 
Trend Micro - 13martie2012
Trend Micro - 13martie2012Trend Micro - 13martie2012
Trend Micro - 13martie2012Agora Group
 
Trend Micro: Security Challenges and Solutions for the Cloud (Saas) & Cloud S...
Trend Micro: Security Challenges and Solutions for the Cloud (Saas) & Cloud S...Trend Micro: Security Challenges and Solutions for the Cloud (Saas) & Cloud S...
Trend Micro: Security Challenges and Solutions for the Cloud (Saas) & Cloud S...Ingram Micro Cloud
 
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...Amazon Web Services
 
Security in the cloud planning guide
Security in the cloud planning guideSecurity in the cloud planning guide
Security in the cloud planning guideYury Chemerkin
 
Moving target-defense
Moving target-defenseMoving target-defense
Moving target-defenseZsolt Nemeth
 
Cio ciso security_strategyv1.1
Cio ciso security_strategyv1.1Cio ciso security_strategyv1.1
Cio ciso security_strategyv1.1Anindya Ghosh,
 
SCIT Labs - intrusion tolerant systems
SCIT Labs - intrusion tolerant systemsSCIT Labs - intrusion tolerant systems
SCIT Labs - intrusion tolerant systemsZsolt Nemeth
 
Symantec 2006_Annual_Report
Symantec  2006_Annual_ReportSymantec  2006_Annual_Report
Symantec 2006_Annual_Reportfinance40
 
Hakin9 interview w Prof Sood
Hakin9 interview w Prof SoodHakin9 interview w Prof Sood
Hakin9 interview w Prof SoodZsolt Nemeth
 
Hacktive Security - Ethical Hacking Services
Hacktive Security - Ethical Hacking ServicesHacktive Security - Ethical Hacking Services
Hacktive Security - Ethical Hacking ServicesCarlo Pelliccioni, CISSP
 
Cloud security ely kahn
Cloud security   ely kahnCloud security   ely kahn
Cloud security ely kahnEly Kahn
 
BriefingsDirect Transcript--How security leverages virtualization to counter ...
BriefingsDirect Transcript--How security leverages virtualization to counter ...BriefingsDirect Transcript--How security leverages virtualization to counter ...
BriefingsDirect Transcript--How security leverages virtualization to counter ...Dana Gardner
 
Cloud Cuckoo Land to Corporate Acceptance
Cloud Cuckoo Land to Corporate AcceptanceCloud Cuckoo Land to Corporate Acceptance
Cloud Cuckoo Land to Corporate AcceptanceMark Henshaw
 
Big data Propels SIEM into the era of Security Analytics
Big data Propels SIEM into the era of Security Analytics Big data Propels SIEM into the era of Security Analytics
Big data Propels SIEM into the era of Security Analytics EMC
 
Symantec Solutions Working Together
Symantec Solutions Working TogetherSymantec Solutions Working Together
Symantec Solutions Working TogetherCarahsoft
 
An Architecture for Providing Security to Cloud Resources
An Architecture for Providing Security to Cloud ResourcesAn Architecture for Providing Security to Cloud Resources
An Architecture for Providing Security to Cloud ResourcesNiranjana Padmanabhan
 
CRTC Cloud Security- Jeff Crume
CRTC Cloud Security- Jeff CrumeCRTC Cloud Security- Jeff Crume
CRTC Cloud Security- Jeff CrumeKrisValerio
 

Was ist angesagt? (20)

Trend micro real time threat management press presentation
Trend micro real time threat management press presentationTrend micro real time threat management press presentation
Trend micro real time threat management press presentation
 
Security assessment for financial institutions
Security assessment for financial institutionsSecurity assessment for financial institutions
Security assessment for financial institutions
 
VSD Infotech
VSD InfotechVSD Infotech
VSD Infotech
 
Trend Micro - 13martie2012
Trend Micro - 13martie2012Trend Micro - 13martie2012
Trend Micro - 13martie2012
 
Trend Micro: Security Challenges and Solutions for the Cloud (Saas) & Cloud S...
Trend Micro: Security Challenges and Solutions for the Cloud (Saas) & Cloud S...Trend Micro: Security Challenges and Solutions for the Cloud (Saas) & Cloud S...
Trend Micro: Security Challenges and Solutions for the Cloud (Saas) & Cloud S...
 
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
 
Security in the cloud planning guide
Security in the cloud planning guideSecurity in the cloud planning guide
Security in the cloud planning guide
 
Moving target-defense
Moving target-defenseMoving target-defense
Moving target-defense
 
Cio ciso security_strategyv1.1
Cio ciso security_strategyv1.1Cio ciso security_strategyv1.1
Cio ciso security_strategyv1.1
 
SCIT Labs - intrusion tolerant systems
SCIT Labs - intrusion tolerant systemsSCIT Labs - intrusion tolerant systems
SCIT Labs - intrusion tolerant systems
 
Symantec 2006_Annual_Report
Symantec  2006_Annual_ReportSymantec  2006_Annual_Report
Symantec 2006_Annual_Report
 
Hakin9 interview w Prof Sood
Hakin9 interview w Prof SoodHakin9 interview w Prof Sood
Hakin9 interview w Prof Sood
 
Hacktive Security - Ethical Hacking Services
Hacktive Security - Ethical Hacking ServicesHacktive Security - Ethical Hacking Services
Hacktive Security - Ethical Hacking Services
 
Cloud security ely kahn
Cloud security   ely kahnCloud security   ely kahn
Cloud security ely kahn
 
BriefingsDirect Transcript--How security leverages virtualization to counter ...
BriefingsDirect Transcript--How security leverages virtualization to counter ...BriefingsDirect Transcript--How security leverages virtualization to counter ...
BriefingsDirect Transcript--How security leverages virtualization to counter ...
 
Cloud Cuckoo Land to Corporate Acceptance
Cloud Cuckoo Land to Corporate AcceptanceCloud Cuckoo Land to Corporate Acceptance
Cloud Cuckoo Land to Corporate Acceptance
 
Big data Propels SIEM into the era of Security Analytics
Big data Propels SIEM into the era of Security Analytics Big data Propels SIEM into the era of Security Analytics
Big data Propels SIEM into the era of Security Analytics
 
Symantec Solutions Working Together
Symantec Solutions Working TogetherSymantec Solutions Working Together
Symantec Solutions Working Together
 
An Architecture for Providing Security to Cloud Resources
An Architecture for Providing Security to Cloud ResourcesAn Architecture for Providing Security to Cloud Resources
An Architecture for Providing Security to Cloud Resources
 
CRTC Cloud Security- Jeff Crume
CRTC Cloud Security- Jeff CrumeCRTC Cloud Security- Jeff Crume
CRTC Cloud Security- Jeff Crume
 

Ähnlich wie Security of,for & by cloud

Becoming the safe choice for the cloud by addressing cloud fraud & security t...
Becoming the safe choice for the cloud by addressing cloud fraud & security t...Becoming the safe choice for the cloud by addressing cloud fraud & security t...
Becoming the safe choice for the cloud by addressing cloud fraud & security t...cVidya Networks
 
CLUSIR DU 12 JUIN
CLUSIR DU 12  JUIN CLUSIR DU 12  JUIN
CLUSIR DU 12 JUIN ndelannoy
 
Secure Your Virtualized Environment. Protection from Advanced Persistent Thre...
Secure Your Virtualized Environment. Protection from Advanced Persistent Thre...Secure Your Virtualized Environment. Protection from Advanced Persistent Thre...
Secure Your Virtualized Environment. Protection from Advanced Persistent Thre...Acrodex
 
Deepsecurity & VDI beveiliging, maximale beveiliging en optimale performance
Deepsecurity & VDI beveiliging, maximale beveiliging en optimale performanceDeepsecurity & VDI beveiliging, maximale beveiliging en optimale performance
Deepsecurity & VDI beveiliging, maximale beveiliging en optimale performanceUNIT4 IT Solutions
 
Cloud securityperspectives cmg
Cloud securityperspectives cmgCloud securityperspectives cmg
Cloud securityperspectives cmgNeha Dhawan
 
IBM Tivoli - Security Solutions for the Cloud
IBM Tivoli - Security Solutions for the CloudIBM Tivoli - Security Solutions for the Cloud
IBM Tivoli - Security Solutions for the CloudVincent Kwon
 
Cloud security and security architecture
Cloud security and security architectureCloud security and security architecture
Cloud security and security architectureVladimir Jirasek
 
The Cloud according to VMware
The Cloud according to VMwareThe Cloud according to VMware
The Cloud according to VMwareOpSource
 
2012 10 cloud security architecture
2012 10 cloud security architecture2012 10 cloud security architecture
2012 10 cloud security architectureVladimir Jirasek
 
What customers want the cloud to be - Jason Waxman GM at Intel, Cloud Slam 20...
What customers want the cloud to be - Jason Waxman GM at Intel, Cloud Slam 20...What customers want the cloud to be - Jason Waxman GM at Intel, Cloud Slam 20...
What customers want the cloud to be - Jason Waxman GM at Intel, Cloud Slam 20...Khazret Sapenov
 
AWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNet
AWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNetAWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNet
AWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNetAmazon Web Services
 
Cloud Security: Perception Vs. Reality
Cloud Security: Perception Vs. RealityCloud Security: Perception Vs. Reality
Cloud Security: Perception Vs. RealityInternap
 
Smart, Data-Centric Security for the Post-PC Era
Smart, Data-Centric Security for the Post-PC EraSmart, Data-Centric Security for the Post-PC Era
Smart, Data-Centric Security for the Post-PC EraTrend Micro (EMEA) Limited
 
Big data, security, and the cloud
Big data, security, and the cloudBig data, security, and the cloud
Big data, security, and the cloudPano Xinos
 
Safe Net: Cloud Security Solutions
Safe Net: Cloud Security SolutionsSafe Net: Cloud Security Solutions
Safe Net: Cloud Security SolutionsASBIS SK
 
Cloud Security: Perception VS Reality
Cloud Security: Perception VS RealityCloud Security: Perception VS Reality
Cloud Security: Perception VS RealityKVH Co. Ltd.
 
Peering Through the Cloud Forrester EMEA 2010
Peering Through the Cloud Forrester EMEA 2010Peering Through the Cloud Forrester EMEA 2010
Peering Through the Cloud Forrester EMEA 2010graywilliams
 
Cloud Computing IT Lexicon's Latest Hot Spot
Cloud Computing IT Lexicon's Latest Hot SpotCloud Computing IT Lexicon's Latest Hot Spot
Cloud Computing IT Lexicon's Latest Hot SpotTech Mahindra
 
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...HyTrust
 

Ähnlich wie Security of,for & by cloud (20)

Becoming the safe choice for the cloud by addressing cloud fraud & security t...
Becoming the safe choice for the cloud by addressing cloud fraud & security t...Becoming the safe choice for the cloud by addressing cloud fraud & security t...
Becoming the safe choice for the cloud by addressing cloud fraud & security t...
 
CLUSIR DU 12 JUIN
CLUSIR DU 12  JUIN CLUSIR DU 12  JUIN
CLUSIR DU 12 JUIN
 
Secure Your Virtualized Environment. Protection from Advanced Persistent Thre...
Secure Your Virtualized Environment. Protection from Advanced Persistent Thre...Secure Your Virtualized Environment. Protection from Advanced Persistent Thre...
Secure Your Virtualized Environment. Protection from Advanced Persistent Thre...
 
Deepsecurity & VDI beveiliging, maximale beveiliging en optimale performance
Deepsecurity & VDI beveiliging, maximale beveiliging en optimale performanceDeepsecurity & VDI beveiliging, maximale beveiliging en optimale performance
Deepsecurity & VDI beveiliging, maximale beveiliging en optimale performance
 
Cloud securityperspectives cmg
Cloud securityperspectives cmgCloud securityperspectives cmg
Cloud securityperspectives cmg
 
IBM Tivoli - Security Solutions for the Cloud
IBM Tivoli - Security Solutions for the CloudIBM Tivoli - Security Solutions for the Cloud
IBM Tivoli - Security Solutions for the Cloud
 
Cloud security and security architecture
Cloud security and security architectureCloud security and security architecture
Cloud security and security architecture
 
The Cloud according to VMware
The Cloud according to VMwareThe Cloud according to VMware
The Cloud according to VMware
 
2012 10 cloud security architecture
2012 10 cloud security architecture2012 10 cloud security architecture
2012 10 cloud security architecture
 
What customers want the cloud to be - Jason Waxman GM at Intel, Cloud Slam 20...
What customers want the cloud to be - Jason Waxman GM at Intel, Cloud Slam 20...What customers want the cloud to be - Jason Waxman GM at Intel, Cloud Slam 20...
What customers want the cloud to be - Jason Waxman GM at Intel, Cloud Slam 20...
 
AWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNet
AWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNetAWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNet
AWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNet
 
Cloud Security: Perception Vs. Reality
Cloud Security: Perception Vs. RealityCloud Security: Perception Vs. Reality
Cloud Security: Perception Vs. Reality
 
Smart cloud - single to multi cloud
Smart cloud - single to multi cloud Smart cloud - single to multi cloud
Smart cloud - single to multi cloud
 
Smart, Data-Centric Security for the Post-PC Era
Smart, Data-Centric Security for the Post-PC EraSmart, Data-Centric Security for the Post-PC Era
Smart, Data-Centric Security for the Post-PC Era
 
Big data, security, and the cloud
Big data, security, and the cloudBig data, security, and the cloud
Big data, security, and the cloud
 
Safe Net: Cloud Security Solutions
Safe Net: Cloud Security SolutionsSafe Net: Cloud Security Solutions
Safe Net: Cloud Security Solutions
 
Cloud Security: Perception VS Reality
Cloud Security: Perception VS RealityCloud Security: Perception VS Reality
Cloud Security: Perception VS Reality
 
Peering Through the Cloud Forrester EMEA 2010
Peering Through the Cloud Forrester EMEA 2010Peering Through the Cloud Forrester EMEA 2010
Peering Through the Cloud Forrester EMEA 2010
 
Cloud Computing IT Lexicon's Latest Hot Spot
Cloud Computing IT Lexicon's Latest Hot SpotCloud Computing IT Lexicon's Latest Hot Spot
Cloud Computing IT Lexicon's Latest Hot Spot
 
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
 

Security of,for & by cloud

  • 1. Security of, for & by Cloud – A synopsis LAKSHMI SUBRAMANIAN A P R I L 2 3 RD, 2 0 1 2
  • 4. Cloud Computing - Simplified value network SOURCE: Cloud Computing - Outsourcing 2.0 or a new Business Model for IT Provisioning?, TU Munich 4
  • 5. Cloud computing players SOURCE: A map of major cloud players, Bessemer Cloudscape, Dec 2011 5
  • 6. Why do we care about Cloud security? Security of Cloud  Cloud security – Current scenario  Several data breach cases  Challenges to Cloud security ?  Comparison between traditional and Cloud security 6
  • 7. Greatest outsourcing concerns (n=200) SOURCE: Cloud Security Insights for IT Strategic planning, Intel IT Center, Sep 2011 7
  • 8. SOURCE: CompTIA’s 9th Annual Information Security Trends (based on 500 US IT and business executives) 8
  • 9. Several cases of data breaches 9
  • 10. Predicted challenges to Cloud security Insecure layered Attractive target Interfaces Advanced Persistent threats Insider attacks Challenges Resource sharing issues Unforeseen risks Data isolation in Adoption of BYOD multi tenancy & cloud computing 10
  • 11. Comparison in terms of security Traditional networks Cloud networks Most of the present day security controls apply for both the networks • who Who does what? Defined Single client – His Data isolation data and applications and life cycle monitoring? The more transparency with the Contractual obligations between Do’s and Don’ts of the stakeholders – regular process stakeholders – the more better 11
  • 12. What is the approach to provide security for Cloud? Security for Cloud  Cloud security controls – Defense in depth  Approach to resolve underlying threats  Revisiting challenges 12
  • 13. Cloud Security Controls – Defense in depth SOURCE: Cloud security sub-team, Cloud standards customer council, Jan 2012 13
  • 14. Approach to resolving underlying threats  Cost savings reinvested to improvise security  CIA – key consideration for any security related issue  Collaborative governance structure between customers and providers  Contractually enforcing security requirements  Compliance and exceptions as required for risk management policies of companies  Simulation of incident scenarios and appropriate risk treatment plan  Defense in depth strategy  Improving awareness among the cloud users will help them play safe 14
  • 15. Revisiting the challenges Reinvest Insecure layered Interfaces Attractive target Insider attacks Advanced Defense Challenges persistent threats in depth & CIA Compliance, Risk Resource management, sharing issues & SLA Unforeseen risks Data isolation in Adoption of BYOD multi tenancy & cloud computing Awareness 15
  • 16. How does cloud provide security? Security by Cloud  Security as a Service (SeaaS)  Future prospects  SeaaS in cloud for Smartphones 16
  • 17. Security as a service  Gartner predicts – Cloud based anti-malware, anti- spyware will generate 60% of the revenue by 2013  CSA focuses on SeaaS from a service provider point of view 17
  • 18. Possible Cloud based security services  Identity Management  Data loss Protection  Web Security  Email Security  IDS/IPS  Encryption  Business Continuity and Disaster Recovery  Network Security 18
  • 19. Future prospects  Feasibility analysis of the proposed security services  Framing typical implementation guidelines  Analysing pros and cons of in-house and cloud based security services  Deriving the essence of this aspect in its entirety 19
  • 20. SeaaS in Cloud for Smartphones 20
  • 21. CONCLUSIONS  CIA will and should remain the key consideration for IT Security success  Cloud computing is NOT as ALIEN as it is presumed to be  DEFENSE in DEPTH is a powerful strategy  ALL STAKEHOLDERS are in a way RESPONSIBLE for a cloud security breach  Understanding WHAT DIFFERENCES cloud adoption could make specifically is important  ADDRESSING these issues can help build a SAFE TOMORROW 21
  • 22. THANK YOU 22