S E E D 4 C. ecure mbedded lements & ata protection the loud. By : Jean-Marc Lambert, Cloud Computing R&D, Gemalto

Size: px
Start display at page:

Download "S E E D 4 C. ecure mbedded lements & ata protection the loud. By : Jean-Marc Lambert, Cloud Computing R&D, Gemalto http://www.celticplus-seed4c."

Transcription

1 S E E D 4 C ecure mbedded lements & ata protection the loud By : Jean-Marc Lambert, Cloud Computing R&D, Gemalto

2 Context Security of the Cloud is still an roadblock to massive cloud adoption in critical segments. Customers need trust, and want to keep control of their assets Need to harden cloud security Enforce various security policies (e.g., regulation and business policies) Let customers define & control these policies Provide evidences of the policy enforcement 2

3 Objectives Building a Trusted Cloud Computing Base (TCCB) Based on A Cloud of minimal Trusted Computing Bases: the Ds (Managed by the NoSE : Network of Secure Elements) 3

4 Objectives Building a Trusted Cloud Computing Base (TCCB) Based on A Cloud of minimal Trusted Computing Bases: the Ds (Managed by the NoSE : Network of Secure Elements) And That can guarantee end-to-end security of service 4

5 Korea Spain Finland France Alcatel-Lucent Gemalto ENSI Bourges Inria Wallix Cygate Mikkelin Puhelin Oy Nokia Solutions & Networks Oy, Finceptum Oy VTT Innovalia Association Nextel Software Quality Systems (SQS) Fundación Vicomtech IKUSI BISCAYTIK D4C: Security Embedded Element and Data Privacy for Cloud SOLACIA 5

6 D4C approach From an isolated security to a coordinated security Secure Element Extended () - Store securely critical data and execute securely critical apps - Support multi-tenant data & apps Network of Secure Element Extended (No) - Secure administration & exchange across cloud nodes. - Allow Tenants to manage their credentials & trust seeds. - Eg. allow critical data to be processed only in secure & compliant VMs (certified location, local key storage, ) No Isolated Security Coordinated Security 6

7 Deliver Trusted Services in a multi-nodes Trusted Cloud Execution Environment Trust & Assurance Trust & Assurance Policy Execution Trusted Execution Network Servers 7 7

8 D4C scope of work Modeling, Deployment, Enforcement and Assurance End 2 End Modeling M D Deployment Enforcement E A Assurance In depth security and assurance 8

9 D4C process D4C Users Policy Modeling Policy Assurance No App & Policy Deployment Policy Monitoring based Policy Enforcement 9

10 D4C: Enforcement engine Cooperative security: the model M D SE are multi-tenant (isolated security domains) E A SE services offered by a dedicated VM No Admin: Manage the attached SE (GP), the allocation of nodes to tenants & mirroring Tenant s security domain into SE(s) Tenant Admin: Manage security data and function in tenant security domains SE Tenant 1 security domain Data - Keys Functions - No Admin Tenant Admin Tenant 2 security domain Network of Secure Elements (No) Intranet Data - Keys Functions - Shared security domain Data - Location - Time/date - -Functions - Encrypt/decrypt - 10 West VM South SECURE ELEMENT East West No Admin Web Internal VLAN Hardened Hypervisor (KVM) 1 HOST 1 VM per HOST 1 SE per HOST

11 User W eb Server Use Case Environment Application/ Processing Server Ba nk Do mai n Possible location of SE or Operational Department Authenticaton Domain Authentication Server Database Servers Operational Department Operational Department MSC V L R H L R SMSC A U C EIR NSS VLR2 SMSC2 D4C Use-cases Various types of use-cases at different cloud levels (IaaS, PaaS, SaaS) ANSP AIRLINES AFTN Messages Integration Platform IATA Messages ikloud AOS in SaaS Passenger Services File Sharing App WebCom Services (eg WebRTC, vims) File Sharing App AODB MUSIK Advertising information EU Other SE E Airport 1 Airport Group 1 Airport N Airport Group N Airport 1 Passengers BI Possible locations of the SE Airport system mgt e-gov services IMS communication services Security Operations Center e-banking IAM authentication and auditing Security monitoring PaaS environment Telco services in the cloud (NFV) IaaS level security Administrative access mgt 11 vhsm + key ceremony

12 As a Conclusion : Tenant s defined Security Policy & Control Security aware placement & deployment engine Modeling, Deployment, Enforcement and Assurance solution Enforced by : Seed4C provides : The Network of Secure Elements Extended (No) The Secure Elements physically present in each trustable cloud node. The Assurance Framework providing evidences and allowing continuous monitoring. 12

13 13

Seed4C: A High-security project for Cloud Infrastructure

Seed4C: A High-security project for Cloud Infrastructure Seed4C: A High-security project for Cloud Infrastructure J. Rouzaud-Cornabas (LIP/CC-IN2P3 CNRS) & E. Caron (LIP ENS-Lyon) November 30, 2012 J. Rouzaud-Cornabas (LIP/CC-IN2P3 CNRS) & E. Seed4C: Caron (LIP

More information

Seed4C: A Cloud Security Infrastructure validated on Grid 5000

Seed4C: A Cloud Security Infrastructure validated on Grid 5000 Seed4C: A Cloud Security Infrastructure validated on Grid 5000 E. Caron 1, A. Lefray 1, B. Marquet 2, and J. Rouzaud-Cornabas 1 1 Université de Lyon. LIP Laboratory. UMR CNRS - ENS Lyon - INRIA - UCBL

More information

Cloud Security. Peter Jopling joplingp@uk.ibm.com IBM UK Ltd Software Group Hursley Labs. peterjopling. 2011 IBM Corporation

Cloud Security. Peter Jopling joplingp@uk.ibm.com IBM UK Ltd Software Group Hursley Labs. peterjopling. 2011 IBM Corporation Cloud Security Peter Jopling joplingp@uk.ibm.com IBM UK Ltd Software Group Hursley Labs peterjopling 2011 IBM Corporation Cloud computing impacts the implementation of security in fundamentally new ways

More information

Seed4C: Secured Embedded Element and Data privacy for Cloud federation

Seed4C: Secured Embedded Element and Data privacy for Cloud federation Seed4C: Secured Embedded Element and Data privacy for Cloud federation Eddy Caron, Sylvain Gault, Arnaud Lefray, Jonathan Rouzaud-Cornabas, Guillaume Verger, Yulin Zhang and The Seed4C consortium Eddy.Caron@ens-lyon.fr

More information

IBM Cloud Security Draft for Discussion September 12, 2011. 2011 IBM Corporation

IBM Cloud Security Draft for Discussion September 12, 2011. 2011 IBM Corporation IBM Cloud Security Draft for Discussion September 12, 2011 IBM Point of View: Cloud can be made secure for business As with most new technology paradigms, security concerns surrounding cloud computing

More information

Information Technology: This Year s Hot Issue - Cloud Computing

Information Technology: This Year s Hot Issue - Cloud Computing Information Technology: This Year s Hot Issue - Cloud Computing Presented by: Alan Sutin Global IP & Technology Practice Group GREENBERG TRAURIG, LLP ATTORNEYS AT LAW WWW.GTLAW.COM 2011. All rights reserved.

More information

Securing the Cloud with IBM Security Systems. IBM Security Systems. 2012 IBM Corporation. 2012 2012 IBM IBM Corporation Corporation

Securing the Cloud with IBM Security Systems. IBM Security Systems. 2012 IBM Corporation. 2012 2012 IBM IBM Corporation Corporation Securing the Cloud with IBM Security Systems 1 2012 2012 IBM IBM Corporation Corporation IBM Point of View: Cloud can be made secure for business As with most new technology paradigms, security concerns

More information

Healthcare: La sicurezza nel Cloud October 18, 2011. 2011 IBM Corporation

Healthcare: La sicurezza nel Cloud October 18, 2011. 2011 IBM Corporation Healthcare: La sicurezza nel Cloud October 18, 2011 Cloud Computing Tests The Limits Of Security Operations And Infrastructure Security and Privacy Domains People and Identity Data and Information Application

More information

Architecting and Building a Secure and Compliant Virtual Infrastructure and Private Cloud

Architecting and Building a Secure and Compliant Virtual Infrastructure and Private Cloud Architecting and Building a Secure and Compliant Virtual Infrastructure and Private Cloud Rob Randell, CISSP Principal Systems Engineer Security Specialist Agenda What is the Cloud? Virtualization Basics

More information

Top 10 Cloud Risks That Will Keep You Awake at Night

Top 10 Cloud Risks That Will Keep You Awake at Night Top 10 Cloud Risks That Will Keep You Awake at Night Shankar Babu Chebrolu Ph.D., Vinay Bansal, Pankaj Telang Photo Source flickr.com .. Amazon EC2 (Cloud) to host Eng. Lab testing. We want to use SalesForce.com

More information

Trust but Verify. Vincent Campitelli. VP IT Risk Management

Trust but Verify. Vincent Campitelli. VP IT Risk Management Trust but Verify Vincent Campitelli VP IT Risk Management McKesson Corporation Trust but Verify Cloud Security 3 Agenda Cloud Defined Cloud Opportunities Cloud Challenges What s Different? How to Verify

More information

Strategic Compliance & Securing the Cloud. Annalea Sharack-Ilg, CISSP, AMBCI Technical Director of Information Security

Strategic Compliance & Securing the Cloud. Annalea Sharack-Ilg, CISSP, AMBCI Technical Director of Information Security Strategic Compliance & Securing the Cloud Annalea Sharack-Ilg, CISSP, AMBCI Technical Director of Information Security Complexity and Challenges 2 Complexity and Challenges Compliance Regulatory entities

More information

Third Party Cloud Services Its Adoption in the New Age

Third Party Cloud Services Its Adoption in the New Age Solutions for higher performance! Third Party Cloud Services Its Adoption in the New Age 1 Introduction Cloud computing is the delivery of computing services over the Internet. Cloud services allow individuals

More information

1 Novell Use Cases. 1.1 Use Case: Per Tenant Identity Provider Configuration. 1.1.1 Description/User Story. 1.1.2 Goal or Desired Outcome

1 Novell Use Cases. 1.1 Use Case: Per Tenant Identity Provider Configuration. 1.1.1 Description/User Story. 1.1.2 Goal or Desired Outcome 1 Novell Use Cases 1.1 Use Case: Per Tenant Identity Provider Configuration 1.1.1 Description/User Story Multi-tenant service providers, whether they are SaaS, PaaS, or IaaS vendors, benefit from quick

More information

STRATEGIC WHITE PAPER. Securing cloud environments with Nuage Networks VSP: Policy-based security automation and microsegmentation overview

STRATEGIC WHITE PAPER. Securing cloud environments with Nuage Networks VSP: Policy-based security automation and microsegmentation overview STRATEGIC WHITE PAPER Securing cloud environments with Nuage Networks VSP: Policy-based security automation and microsegmentation overview Abstract Cloud architectures rely on Software-Defined Networking

More information

Secure Multi Tenancy In the Cloud. Boris Strongin VP Engineering and Co-founder, Hytrust Inc. bstrongin@hytrust.com

Secure Multi Tenancy In the Cloud. Boris Strongin VP Engineering and Co-founder, Hytrust Inc. bstrongin@hytrust.com Secure Multi Tenancy In the Cloud Boris Strongin VP Engineering and Co-founder, Hytrust Inc. bstrongin@hytrust.com At-a-Glance Trends Do MORE with LESS Increased Insider Threat Increasing IT spend on cloud

More information

Cloud Computing Governance & Security. Security Risks in the Cloud

Cloud Computing Governance & Security. Security Risks in the Cloud Cloud Computing Governance & Security The top ten questions you have to ask Mike Small CEng, FBCS, CITP Fellow Analyst, KuppingerCole This Webinar is supported by Agenda What is the Problem? Ten Cloud

More information

Private Cloud Database Consolidation with Exadata. Nitin Vengurlekar Technical Director/Cloud Evangelist

Private Cloud Database Consolidation with Exadata. Nitin Vengurlekar Technical Director/Cloud Evangelist Private Cloud Database Consolidation with Exadata Nitin Vengurlekar Technical Director/Cloud Evangelist Agenda Private Cloud vs. Public Cloud Business Drivers for Private Cloud Database Architectures for

More information

Computer Science. About PaaS Security. Donghoon Kim Henry E. Schaffer Mladen A. Vouk

Computer Science. About PaaS Security. Donghoon Kim Henry E. Schaffer Mladen A. Vouk About PaaS Security Donghoon Kim Henry E. Schaffer Mladen A. Vouk North Carolina State University, USA May 21, 2015 @ ICACON 2015 Outline Introduction Background Contribution PaaS Vulnerabilities and Countermeasures

More information

Solutions as a Service N.Konstantinidis Technical Director - MNG

Solutions as a Service N.Konstantinidis Technical Director - MNG Med Nautilus Greece Connected World April 10, 2014 Solutions as a Service N.Konstantinidis Technical Director - MNG MedNautilus Greece Solutions as a Service 2014 SINCE 2002 Data Center Physical Colocation

More information

Cloud Security Through Threat Modeling. Robert M. Zigweid Director of Services for IOActive

Cloud Security Through Threat Modeling. Robert M. Zigweid Director of Services for IOActive Cloud Security Through Threat Modeling Robert M. Zigweid Director of Services for IOActive 1 Key Points Introduction Threat Model Primer Assessing Threats Mitigating Threats Sample Threat Model Exercise

More information

SECURITY MODELS FOR CLOUD 2012. Kurtis E. Minder, CISSP

SECURITY MODELS FOR CLOUD 2012. Kurtis E. Minder, CISSP SECURITY MODELS FOR CLOUD 2012 Kurtis E. Minder, CISSP INTRODUCTION Kurtis E. Minder, Technical Sales Professional Companies: Roles: Security Design Engineer Systems Engineer Sales Engineer Salesperson

More information

Clouds on the Horizon Cloud Security in Today s DoD Environment. Bill Musson Security Analyst

Clouds on the Horizon Cloud Security in Today s DoD Environment. Bill Musson Security Analyst Clouds on the Horizon Cloud Security in Today s DoD Environment Bill Musson Security Analyst Agenda O Overview of Cloud architectures O Essential characteristics O Cloud service models O Cloud deployment

More information

Seamless Cloud Abstraction, Model and Interfaces

Seamless Cloud Abstraction, Model and Interfaces ITU Kaleidoscope 2011 The fully networked human? Innovations for future networks and services Seamless Cloud Abstraction, Model and Interfaces Masum Z Hasan, PhD Cisco Systems masum@cisco.com Cape Town,

More information

Cloud computing and its relation to SDN and NFV Future Internet Assembly, Athens 19/03/2014. 2013 Nokia Solutions and Networks. All rights reserved.

Cloud computing and its relation to SDN and NFV Future Internet Assembly, Athens 19/03/2014. 2013 Nokia Solutions and Networks. All rights reserved. Cloud computing and its relation to SDN and NFV Future Internet Assembly, Athens 19/03/2014 2013 Nokia Solutions and Networks. All rights reserved. Clarification of basic terms: NFV, SDN and Cloud Computing

More information

EAaaS Cloud Security Best Practices

EAaaS Cloud Security Best Practices EAaaS Cloud Security Best Practices A Technical White Paper by Sennovate Inc Jan 2013 EAaaS Cloud Security Best Practices Page 1 Introduction: Cloud security is an ever evolving subject that is difficult

More information

www.boost ur skills.com

www.boost ur skills.com www.boost ur skills.com AWS CLOUD COMPUTING WORKSHOP Write us at training@boosturskills.com BOOSTURSKILLS No 1736 1st Amrutha College Road Kasavanhalli,Off Sarjapur Road,Bangalore-35 1) Introduction &

More information

Security of Information Systems hosted in Clouds: SLA Definition and Enforcement in a Dynamic Environment

Security of Information Systems hosted in Clouds: SLA Definition and Enforcement in a Dynamic Environment Security of Information Systems hosted in Clouds: SLA Definition and Enforcement in a Dynamic Environment Christine Morin Inria Joint work with Louis Rilling (DGA-MI), Anna Giannakou (Inria), Jean-Louis

More information

Building Storage Service in a Private Cloud

Building Storage Service in a Private Cloud Building Storage Service in a Private Cloud Sateesh Potturu & Deepak Vasudevan Wipro Technologies Abstract Storage in a private cloud is the storage that sits within a particular enterprise security domain

More information

Cloud, security and the mobile enterprise: An end-to-end manageability challenge

Cloud, security and the mobile enterprise: An end-to-end manageability challenge GreHack-2012 19 th October, Grenoble France Cloud, security and the mobile enterprise: An end-to-end manageability challenge Boris Balacheff Dave Penkler seamless, secure, context-aware experiences for

More information

OpenStack in the Enterprise: From Strategy to Real Life. Radhesh Balakrishnan General Manager OpenStack radhesh@redhat.com

OpenStack in the Enterprise: From Strategy to Real Life. Radhesh Balakrishnan General Manager OpenStack radhesh@redhat.com OpenStack in the Enterprise: From Strategy to Real Life Radhesh Balakrishnan General Manager OpenStack radhesh@redhat.com Enterprise IT Challenges Seismic Shift in Enterprise IT EXISTING EMERGING Applications

More information

PCI DSS and the A10 Solution

PCI DSS and the A10 Solution White Paper A10 Thunder Series PCI DSS and the A10 Solution For cloud service providers, A10 s Thunder Series & AX Series appliances and SoftAX are the first step towards PCI compliance, allowing you to

More information

Security & Trust in the Cloud

Security & Trust in the Cloud Security & Trust in the Cloud Ray Trygstad Director of Information Technology, IIT School of Applied Technology Associate Director, Information Technology & Management Degree Programs Cloud Computing Primer

More information

Bringing Cloud Security Down to Earth. Andreas M Antonopoulos Senior Vice President & Founding Partner www.nemertes.com

Bringing Cloud Security Down to Earth. Andreas M Antonopoulos Senior Vice President & Founding Partner www.nemertes.com Bringing Cloud Security Down to Earth Andreas M Antonopoulos Senior Vice President & Founding Partner www.nemertes.com Agenda About Nemertes Cloud Dynamics and Adoption Assessing Risk of Cloud Services

More information

STeP-IN SUMMIT 2013. June 18 21, 2013 at Bangalore, INDIA. Performance Testing of an IAAS Cloud Software (A CloudStack Use Case)

STeP-IN SUMMIT 2013. June 18 21, 2013 at Bangalore, INDIA. Performance Testing of an IAAS Cloud Software (A CloudStack Use Case) 10 th International Conference on Software Testing June 18 21, 2013 at Bangalore, INDIA by Sowmya Krishnan, Senior Software QA Engineer, Citrix Copyright: STeP-IN Forum and Quality Solutions for Information

More information

SECURE CLOUD COMPUTING

SECURE CLOUD COMPUTING Outline SECURE CLOUD COMPUTING Introduction (of many buzz words) References What is Cloud Computing Cloud Computing Infrastructure Security Cloud Storage and Data Security Identity Management in the Cloud

More information

Windows Azure and private cloud

Windows Azure and private cloud Windows Azure and private cloud Joe Chou Senior Program Manager China Cloud Innovation Center Customer Advisory Team Microsoft Asia-Pacific Research and Development Group 1 Agenda Cloud Computing Fundamentals

More information

Lecture 02b Cloud Computing II

Lecture 02b Cloud Computing II Mobile Cloud Computing Lecture 02b Cloud Computing II 吳 秀 陽 Shiow-yang Wu T. Sridhar. Cloud Computing A Primer, Part 2: Infrastructure and Implementation Topics. The Internet Protocol Journal, Volume 12,

More information

The OpenCloudware collaborative project

The OpenCloudware collaborative project The OpenCloudware collaborative project «Delivering a Cloud Platorm for Building, Maintaining and Operating Enterprise PaaS Distributed Applications» Alban Richard, UShareSoft CEO Cedric Thomas, OW2 CEO

More information

Cloud Computing Security Issues

Cloud Computing Security Issues Copyright Marchany 2010 Cloud Computing Security Issues Randy Marchany, VA Tech IT Security, marchany@vt.edu Something Old, Something New New: Cloud describes the use of a collection of services, applications,

More information

East African Information Conference 13-14 th August, 2013, Kampala, Uganda. Security and Privacy: Can we trust the cloud?

East African Information Conference 13-14 th August, 2013, Kampala, Uganda. Security and Privacy: Can we trust the cloud? East African Information Conference 13-14 th August, 2013, Kampala, Uganda Security and Privacy: Can we trust the cloud? By Dr. David Turahi Director, Information Technology and Information Management

More information

Whose Cloud Is It Anyway? Exploring Data Security, Ownership and Control

Whose Cloud Is It Anyway? Exploring Data Security, Ownership and Control SESSION ID: CSV-W02 Whose Cloud Is It Anyway? Exploring Data Security, Ownership and Control David Etue VP, Business Development, Identity and Data Protection Gemalto @djetue Cloud and Virtualization Are

More information

Security & Cloud Services IAN KAYNE

Security & Cloud Services IAN KAYNE Security & Cloud Services IAN KAYNE CloudComponents CLOUD SERVICES Dynamically scalable infrastructure, services and software based on broad network accessibility NETWORK ACCESS INTERNAL ESTATE CloudComponents

More information

Why Cisco for Cloud? IT Service Delivery, Orchestration and Automation

Why Cisco for Cloud? IT Service Delivery, Orchestration and Automation Why Cisco for Cloud? IT Service Delivery, Orchestration and Automation Sascha Merg Technical Lead for Data Center Sales, Cisco Central Europe samerg@cisco.com June 2014 Agenda What is ITaaS and why should

More information

Business Values of Network and Security Virtualization

Business Values of Network and Security Virtualization Business Values of Network and Security Virtualization VMware NSX in the context of the Software Defined Data Center Klaus Jansen Virtual Networks Sales Specialist VMware NSBU 2014 VMware Inc. All rights

More information

The OpenCloudware collaborative project

The OpenCloudware collaborative project The OpenCloudware collaborative project An Infrastructure platform for Building, Maintaining and Operating Enterprise Distributed Applications in the Cloud Towards a PaaS management stack over multiple

More information

Barnaby Jeans Sr. Solution Architect Business Critical Applications

Barnaby Jeans Sr. Solution Architect Business Critical Applications Barnaby Jeans Sr. Solution Architect Business Critical Applications Connected, Mobile, Information-Centric World Business Reduction in Complexity via New IT Architectures and Business Models The IT Dilemma

More information

Hybrid Cloud Identity and Access Management Challenges

Hybrid Cloud Identity and Access Management Challenges Hybrid Cloud Identity and Access Management Challenges Intro: Timothy P. McAliley timothy.mcaliley@microsoft.com Microsoft Premier Field Engineer, SQL Server, Washington, DC CISA, CISM, CISSP, ITIL V3,

More information

Cloud Models and Platforms

Cloud Models and Platforms Cloud Models and Platforms Dr. Sanjay P. Ahuja, Ph.D. 2010-14 FIS Distinguished Professor of Computer Science School of Computing, UNF A Working Definition of Cloud Computing Cloud computing is a model

More information

A Proof of Concept Cloud Based Solution. Mark Evans Tessella Inc. PASIG Austin, TX - January 13 th 2012

A Proof of Concept Cloud Based Solution. Mark Evans Tessella Inc. PASIG Austin, TX - January 13 th 2012 A Proof of Concept Cloud Based Solution Mark Evans Tessella Inc PASIG Austin, TX - January 13 th 2012 Agenda Background to Tessella and Safety Deposit Box Primary drivers Our Journey to a proof of concept

More information

SECURING HEALTH INFORMATION IN THE CLOUD. Feisal Nanji, Executive Director, Techumen feisal@techumen.com

SECURING HEALTH INFORMATION IN THE CLOUD. Feisal Nanji, Executive Director, Techumen feisal@techumen.com SECURING HEALTH INFORMATION IN THE CLOUD Feisal Nanji, Executive Director, Techumen feisal@techumen.com Conflict of Interest Disclosure Feisal Nanji, MPP, CISSP Has no real or apparent conflicts of interest

More information

Closing the cloud and virtualization gap

Closing the cloud and virtualization gap Closing the cloud and virtualization gap Use cases for workload security White Paper Table of Contents 3 Introduction Encouraging cross-functional collaboration Prepare for the worst 4 Operational risk

More information

Identity & Access Management The Cloud Perspective. Andrea Themistou 08 October 2015

Identity & Access Management The Cloud Perspective. Andrea Themistou 08 October 2015 Identity & Management The Cloud Perspective Andrea Themistou 08 October 2015 Agenda Cloud Adoption Benefits & Risks Security Evolution for Cloud Adoption Securing Cloud Applications with IAM Securing Cloud

More information

PLUMgrid Open Networking Suite Service Insertion Architecture

PLUMgrid Open Networking Suite Service Insertion Architecture White Paper PLUMgrid Open Networking Suite Service Insertion Architecture Introduction A rapid increase in the use of cloud services across the globe require networks to be adaptable and flexible. PLUMgrid

More information

PCI COMPLIANCE ON AWS: HOW TREND MICRO CAN HELP

PCI COMPLIANCE ON AWS: HOW TREND MICRO CAN HELP solution brief PCI COMPLIANCE ON AWS: HOW TREND MICRO CAN HELP AWS AND PCI DSS COMPLIANCE To ensure an end-to-end secure computing environment, Amazon Web Services (AWS) employs a shared security responsibility

More information

Securing Virtual Applications and Servers

Securing Virtual Applications and Servers White Paper Securing Virtual Applications and Servers Overview Security concerns are the most often cited obstacle to application virtualization and adoption of cloud-computing models. Merely replicating

More information

Oracle Applications and Cloud Computing - Future Direction

Oracle Applications and Cloud Computing - Future Direction Oracle Applications and Cloud Computing - Future Direction February 26, 2010 03:00 PM 03:40 PM Presented By Subash Krishnaswamy skrishna@astcorporation.com Vijay Tirumalai vtirumalai@astcorporation.com

More information

Cloud Computing, and REST-based Architectures Reid Holmes

Cloud Computing, and REST-based Architectures Reid Holmes Material and some slide content from: - Software Architecture: Foundations, Theory, and Practice - Krzysztof Czarnecki Cloud Computing, and REST-based Architectures Reid Holmes Cloud precursors Grid Computing:

More information

Consumption IT. Michael Shepherd Business Development Manager. Cisco Public Sector May 1 st 2014

Consumption IT. Michael Shepherd Business Development Manager. Cisco Public Sector May 1 st 2014 Consumption IT Michael Shepherd Business Development Manager Cisco Public Sector May 1 st 2014 Short Bio Cloud BDM in Public Sector (SLED + FED) Cisco for 14 + years Focused on cloud for 4 + years Awareness,

More information

2013 ovh.com. All rights reserved

2013 ovh.com. All rights reserved Abstract During this session, the user will learn how to optimize security, rights, network layers to build Private, Hybrid & Public Cloud range of services based on a same infrastructure using VMware

More information

Symantec App Center 4.0 Admin Documentation

Symantec App Center 4.0 Admin Documentation Symantec App Center 4.0 Admin Documentation Installation Planning Guide September 2012 Symantec Corporation, 2012 Page 1 Table of Contents Purpose of Document... 3 Deployment Options Overview... 3 Public

More information

Journey to the Private Cloud. Key Enabling Technologies

Journey to the Private Cloud. Key Enabling Technologies Journey to the Private Cloud Key Enabling Technologies Jeffrey Nick Chief Technology Officer Senior Vice President EMC Corporation June 2010 1 The current I/T state: Infrastructure sprawl Information explosion

More information

Consolidated Technology Services PRIVATE CLOUD SERVICE. March 2014

Consolidated Technology Services PRIVATE CLOUD SERVICE. March 2014 Consolidated Technology Services PRIVATE CLOUD SERVICE March 2014 Topics Service Strategy Features and Benefits Service Options Rates Deployment Strategy Next Steps 2 Private Cloud Service Strategy Transform

More information

SUSE Cloud 2.0. Pete Chadwick. Douglas Jarvis. Senior Product Manager pchadwick@suse.com. Product Marketing Manager djarvis@suse.

SUSE Cloud 2.0. Pete Chadwick. Douglas Jarvis. Senior Product Manager pchadwick@suse.com. Product Marketing Manager djarvis@suse. SUSE Cloud 2.0 Pete Chadwick Douglas Jarvis Senior Product Manager pchadwick@suse.com Product Marketing Manager djarvis@suse.com SUSE Cloud SUSE Cloud is an open source software solution based on OpenStack

More information

How To Secure Cloud Computing

How To Secure Cloud Computing A hole in the cloud: Is cloud secure? N. Vijaykumar Infosys Technologies Limited, Bangalore presented at Security in cloud is a key challenge! 70% 60% 50% 40% 30% 20% 10% 0% Data integrity tampering Hacker

More information

Architecture des plates-formes IaaS Etat des lieux et perspectives

Architecture des plates-formes IaaS Etat des lieux et perspectives Architecture des plates-formes IaaS Etat des lieux et perspectives Frédéric Dang Tran Orange Labs Joint CompatibleOne and OSCi workshop, 7 June 2011 1 Outline > Scope and objectives > User-facing API and

More information

SUSE Cloud Installation: Best Practices Using an Existing SMT and KVM Environment

SUSE Cloud Installation: Best Practices Using an Existing SMT and KVM Environment Best Practices Guide www.suse.com SUSE Cloud Installation: Best Practices Using an Existing SMT and KVM Environment Written by B1 Systems GmbH Table of Contents Introduction...3 Use Case Overview...3 Hardware

More information

Linux/Open Source and Cloud computing Wim Coekaerts Senior Vice President, Linux and Virtualization Engineering

Linux/Open Source and Cloud computing Wim Coekaerts Senior Vice President, Linux and Virtualization Engineering Linux/Open Source and Cloud computing Wim Coekaerts Senior Vice President, Linux and Virtualization Engineering NIST Definition of Cloud Computing Cloud computing is a model for enabling convenient, on-demand

More information

Cloud Security. DLT Solutions LLC June 2011. #DLTCloud

Cloud Security. DLT Solutions LLC June 2011. #DLTCloud Cloud Security DLT Solutions LLC June 2011 Contact Information DLT Cloud Advisory Group 1-855-CLOUD01 (256-8301) cloud@dlt.com www.dlt.com/cloud Your Hosts Van Ristau Chief Technology Officer, DLT Solutions

More information

Security Issues in Cloud Computing

Security Issues in Cloud Computing Security Issues in Computing CSCI 454/554 Computing w Definition based on NIST: A model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources

More information

Cloud and VM Based Security

Cloud and VM Based Security Cloud and Based Security Supoj Aram-ekkalarb Network Security Consultant 2012 Check Point Software Technologies Ltd. [PROTECTED] All rights reserved. 2012 Check Point Software Technologies Ltd. [PROTECTED]

More information

Cloud Security Overview

Cloud Security Overview UT DALLAS Erik Jonsson School of Engineering & Computer Science Cloud Security Overview Murat Kantarcioglu Outline Current cloud security techniques Amazon Web services Microsoft Azure Cloud Security Challengers

More information

Can You be HIPAA/HITECH Compliant in the Cloud?

Can You be HIPAA/HITECH Compliant in the Cloud? Can You be HIPAA/HITECH Compliant in the Cloud? Background For the first 10 years of its existence, the Health Insurance Portability and Accountability Act of 1996 (HIPAA) was a toothless tiger. Although

More information

Intel IT Cloud 2013 and Beyond. Name Title Month, Day 2013

Intel IT Cloud 2013 and Beyond. Name Title Month, Day 2013 Intel IT Cloud 2013 and Beyond Name Title Month, Day 2013 Legal Notices This presentation is for informational purposes only. INTEL MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS SUMMARY. Intel and the

More information

PCI COMPLIANCE ON AWS: HOW TREND MICRO CAN HELP

PCI COMPLIANCE ON AWS: HOW TREND MICRO CAN HELP SOLUTION BRIEF PCI COMPLIANCE ON AWS: HOW TREND MICRO CAN HELP The benefits of cloud computing are clear and compelling: no upfront investment, low ongoing costs, flexible capacity and fast application

More information

Transport SDN - Clearing the Roadblocks to Wide-scale Commercial

Transport SDN - Clearing the Roadblocks to Wide-scale Commercial Transport SDN - Clearing the Roadblocks to Wide-scale Commercial Vishnu Shukla OIF President Verizon, USA OFC Los Angeles, March 25, 2015 Changing Role of Transport Networks A new kind of business customer

More information

Cloud Computing Tutorial

Cloud Computing Tutorial Cloud Computing Tutorial CLOUD COMPUTINGTUTORIAL by tutorialspoint.com tutorialspoint.com i ABOUT THE TUTORIAL Cloud Computing Tutorial Cloud Computing provides us a means by which we can access the applications

More information

locuz.com A comprehensive orchestration tool for setting up private and hybrid clouds

locuz.com A comprehensive orchestration tool for setting up private and hybrid clouds locuz.com A comprehensive orchestration tool for setting up private and hybrid clouds An innovative and flexible cloud platform for creating, deploying and managing highly reliable and scalable cloud infrastructure

More information

CLOUD COMPUTING & SECURITY -A PRACTICAL APPROACH

CLOUD COMPUTING & SECURITY -A PRACTICAL APPROACH CLOUD COMPUTING & SECURITY -A PRACTICAL APPROACH ORGANIZED BY र ट र य इल क ट र नक एव स चन प र य गक स थ न, ग रखप र National Institute of Electronics and Information Technology (NIELIT) Gorakhpur An Autonomous

More information

Overlay Networks: Connecting and Protecting Across Regions with Docker. Patrick Kerpan, CEO

Overlay Networks: Connecting and Protecting Across Regions with Docker. Patrick Kerpan, CEO Overlay Networks: Connecting and Protecting Across Regions with Docker Patrick Kerpan, CEO Agenda Background: Cohesive and the cloud Cloud Networking: Limitations Overlay networks: To the rescue Enter

More information

Cloud Computing Trends

Cloud Computing Trends UT DALLAS Erik Jonsson School of Engineering & Computer Science Cloud Computing Trends What is cloud computing? Cloud computing refers to the apps and services delivered over the internet. Software delivered

More information

Configuration Management Why we should care! Anne-Rose Suriel Senior Systems Engineer

Configuration Management Why we should care! Anne-Rose Suriel Senior Systems Engineer Configuration Management Why we should care! Anne-Rose Suriel Senior Systems Engineer Agenda 1. Introduction to Configuration Management 2. Importance of Configuration Management 3. Should we care? 4.

More information

Cloud Security. Nantawan Wongkachonkitti Electronic Government Agency, Thailand Cloud Security Alliance, Thailand Chapter October 2014

Cloud Security. Nantawan Wongkachonkitti Electronic Government Agency, Thailand Cloud Security Alliance, Thailand Chapter October 2014 Cloud Security Nantawan Wongkachonkitti Electronic Government Agency, Thailand Cloud Security Alliance, Thailand Chapter October 2014 Agenda Introduction Security Assessment for Cloud Secure Cloud Infrastructure

More information

雲 端 發 展 與 安 全 趨 勢. 陳 建 宏 Jovi Chen 技 術 顧 問 jovichen@checkpoint.com. 2011 Check Point Software Technologies Ltd. [Unrestricted] For everyone

雲 端 發 展 與 安 全 趨 勢. 陳 建 宏 Jovi Chen 技 術 顧 問 jovichen@checkpoint.com. 2011 Check Point Software Technologies Ltd. [Unrestricted] For everyone 雲 端 發 展 與 安 全 趨 勢 陳 建 宏 Jovi Chen 技 術 顧 問 jovichen@checkpoint.com 2011 Check Point Software Technologies Ltd. [Unrestricted] For everyone Agenda 1 雲 端 發 展 概 況 2 私 有 雲 演 進 過 程 及 未 來 3 雲 端 虛 擬 化 的 安 全 疑

More information

Threat Modeling Cloud Applications

Threat Modeling Cloud Applications Threat Modeling Cloud Applications What You Don t Know Will Hurt You Scott Matsumoto Principal Consultant smatsumoto@cigital.com Software Confidence. Achieved. www.cigital.com info@cigital.com +1.703.404.9293

More information

Nokia Networks. Nokia Networks. telco cloud is on the brink of live deployment

Nokia Networks. Nokia Networks. telco cloud is on the brink of live deployment Nokia Networks Nokia Networks telco cloud is on the brink of live deployment With Nokia Networks multi-stack telco cloud approach, operators have the freedom to choose the cloud platform that matches their

More information

Mirantis OpenStack Express: Security White Paper

Mirantis OpenStack Express: Security White Paper Mirantis OpenStack Express: Security White Paper Version 1.0 2005 2014 All Rights Reserved www.mirantis.com 1 Introduction While the vast majority IT professionals are now familiar with the cost-saving

More information

Towards the Magic Green Broker Jean-Louis Pazat IRISA 1/29. Jean-Louis Pazat. IRISA/INSA Rennes, FRANCE MYRIADS Project Team

Towards the Magic Green Broker Jean-Louis Pazat IRISA 1/29. Jean-Louis Pazat. IRISA/INSA Rennes, FRANCE MYRIADS Project Team Towards the Magic Green Broker Jean-Louis Pazat IRISA 1/29 Jean-Louis Pazat IRISA/INSA Rennes, FRANCE MYRIADS Project Team Towards the Magic Green Broker Jean-Louis Pazat IRISA 2/29 OUTLINE Clouds and

More information

Cisco Prime Network Services Controller. Sonali Kalje Sr. Product Manager Cloud and Virtualization, Cisco Systems

Cisco Prime Network Services Controller. Sonali Kalje Sr. Product Manager Cloud and Virtualization, Cisco Systems Cisco Prime Network Services Controller Sonali Kalje Sr. Product Manager Cloud and Virtualization, Cisco Systems Agenda Cloud Networking Challenges Prime Network Services Controller L4-7 Services Solutions

More information

Securing the Physical, Virtual, Cloud Continuum

Securing the Physical, Virtual, Cloud Continuum Securing the Physical, Virtual, Cloud Continuum By Ted Ritter, CISSP Senior Research Analyst Executive Summary The data center is undergoing a radical shift, from virtualization towards internal cloud

More information

vcloud Suite Architecture Overview and Use Cases

vcloud Suite Architecture Overview and Use Cases vcloud Suite Architecture Overview and Use Cases vcloud Suite 5.8 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new

More information

ABC of Storage Security. M. Granata NetApp System Engineer

ABC of Storage Security. M. Granata NetApp System Engineer ABC of Storage Security M. Granata NetApp System Engineer Encryption Challenges Meet Regulatory Requirements No Performance Impact Ease of Installation Government and industry regulations mandate protection

More information

http://www.alljntuworld.in/

http://www.alljntuworld.in/ Table of Content Cloud Computing Tutorial... 2 Audience... 2 Prerequisites... 2 Copyright & Disclaimer Notice... 2 Cloud Computing - Overview... 9 What is Cloud?... 9 What is Cloud Computing?... 9 Basic

More information

Cloud Security: Evaluating Risks within IAAS/PAAS/SAAS

Cloud Security: Evaluating Risks within IAAS/PAAS/SAAS Cloud Security: Evaluating Risks within IAAS/PAAS/SAAS Char Sample Security Engineer, Carnegie Mellon University CERT Information Security Decisions TechTarget Disclaimer Standard Disclaimer - This talk

More information

SAS and (the) Cloud. Dave Annis SAS Solutions ondemand

SAS and (the) Cloud. Dave Annis SAS Solutions ondemand SAS and (the) Cloud Dave Annis SAS Solutions ondemand Is it Cloud or is it The Cloud? * Cloud 1. Technology designed to free applications from traditional hardware constraints 2. Strategy to exploit the

More information

THE CLASSIC DILEMMA: INTRANET VS. CLOUD

THE CLASSIC DILEMMA: INTRANET VS. CLOUD THE CLASSIC DILEMMA: INTRANET VS. CLOUD With most of the boxes ticked, be it time, cost, fit for purpose or user experience, adoption of cloud in various forms and shapes is becoming an essential differentiator

More information

H Y T RUST: S OLUTION B RIEF. Solve the Nosy Neighbor Problem in Multi-Tenant Environments

H Y T RUST: S OLUTION B RIEF. Solve the Nosy Neighbor Problem in Multi-Tenant Environments H Y T RUST: S OLUTION B RIEF Solve the Nosy Neighbor Problem in Multi-Tenant Environments Summary A private cloud with multiple tenants such as business units of an enterprise or customers of a cloud service

More information

Purpose. Service Model SaaS (Applications) PaaS (APIs) IaaS (Virtualization) Use Case 1: Public Use Case 2: Use Case 3: Public.

Purpose. Service Model SaaS (Applications) PaaS (APIs) IaaS (Virtualization) Use Case 1: Public Use Case 2: Use Case 3: Public. Federal CIO Council Information Security and Identity Management Committee (ISIMC) Guidelines for the Secure Use of Cloud Computing by Federal Departments and Agencies DRAFT V0.41 Earl Crane, CISSP, CISM

More information

Using ArcGIS for Server in the Amazon Cloud

Using ArcGIS for Server in the Amazon Cloud Federal GIS Conference February 9 10, 2015 Washington, DC Using ArcGIS for Server in the Amazon Cloud Bonnie Stayer, Esri Amy Ramsdell, Blue Raster Session Outline AWS Overview ArcGIS in AWS Cloud Builder

More information

Securely Architecting the Internal Cloud. Rob Randell, CISSP Senior Security and Compliance Specialist VMware, Inc.

Securely Architecting the Internal Cloud. Rob Randell, CISSP Senior Security and Compliance Specialist VMware, Inc. Securely Architecting the Internal Cloud Rob Randell, CISSP Senior Security and Compliance Specialist VMware, Inc. Securely Building the Internal Cloud Virtualization is the Key How Virtualization Affects

More information