Cloud Security and Data Protection

Size: px
Start display at page:

Download "Cloud Security and Data Protection"

Transcription

1 Cloud Security and Data Protection Cloud Strategy Partners, LLC Sponsored by: IEEE Educational Activities and IEEE Cloud Computing

2 Course Presenter s Biography This IEEE Cloud Computing tutorial has been developed by Cloud Strategy Partners, LLC. Cloud Strategy Partners, LLC is an expert consultancy firm that specializes in Technology and Strategy relating to Cloud Computing. IEEE elearning Library Cloud Security and Data Protection Transcript pg. 2 / 19

3 Course Summary Security is a complex domain and involves multiple aspects of the infrastructure, systems and applications operation as well as user access management. In this tutorial, we will begin with a review of some basics and next will go with cloud specific security aspects. In the basics we will cover the meanings of Security, and Trust, which are different. We will also look at a Security Services Lifecycle Management (SSLM) model. Finally, we will turn to specifics about Security in Cloud Computing. Note we will apply these via a brief analysis of the AWS and Microsoft Azure security. IEEE elearning Library Cloud Security and Data Protection Transcript pg. 3 / 19

4 Outline Security is a complex domain and involves multiple aspects of the infrastructure, systems and applications operation as well as user access management. We will start with some basics and next will go with cloud specific security aspects. In the basics we will cover the meanings of Security, and Trust, which are different. We will look at a Security Services Lifecycle Management (SSLM) model. Then we will turn to specifics about Security in Cloud Computing We will apply these via a brief analysis of the AWS and Microsoft Azure security. We will not discuss access control and cloud federation issues in detail in this tutorial. This is a subject for a separate tutorial. Responsibilities Split in IaaS, PaaS, SaaS We have seen this illustration in previous Lessons. No let us apply this illustration to Security. This illustration contrasts the different deployment models on the left, a traditional physical server deployment packaged product, and the on the right the three deployment models for Cloud, namely, IaaS, PaaS, SaaS. The responsibilities of the Customer and the Provider are different as one goes from Packaged product to the various models on Cloud. As shown for packaged product the entire stack is the responsibility of the User, from the hardware to the systems software to the application. When deploying on Cloud the responsibility shifts more and more from the User to the Provider as the higher levels of abstraction are used. As one can see in the SaaS model where the User is accessing a completed application, their responsibility is reduced to looking after only their Data. Security management responsibilities split between Customer and Provider for IaaS, PaaS, SaaS service models in a similar manner. In all cases, there is a large underlying Security obligation on the Provider. They are responsible for physical security of the Cloud datacenters as well as Updating firmware and software for platform and for customer management components. They are also responsible for underlying Storage and Networking security. For example Physical Network Firewalls and Intrusion Prevention is a responsibility of the cloud provider. Usually the Cloud Provider will seek certification and keep ongoing compliance of the Cloud platform itself. IEEE elearning Library Cloud Security and Data Protection Transcript pg. 4 / 19

5 That said, Certification and compliance of the cloud platform doesn t imply security and compliance of the customer controlled components. Following the above diagram, the components which the User is responsible for with respect to Deployment, they are also responsible for with respect to Security. It can be seen then that End to End Cloud Security is a shared responsibility between the Cloud Operator and the Cloud User. Security Technologies in Cloud: Network and Service Related Security Protocols This diagram in the Slide illustrates the highly inter-related character of security services and mechanisms. Please note several distinct Security mechanisms in this diagram. At the bottom there is security for Physical Resources and the Network. There is the Cloud Platform security. There is the application and data security. And across these there is the federated access and delivery infrastructure. These layers are mutually dependent and connected to each other over a variety of connectivity protocols. The diagram shown how logically Data are transferred between cloud layers, and it also shows how Data are communicated over secure network and messaging protocols such as IPSec/VPN and HTTPS/TLS/SSL. Authentication and Authorization is present with each inter-service and inter-device (both physical and virtual) communication, at higher layer it can use also Security Token Service (STS) and SAML based security tokens. TCP/IP Protocol Stack and Network Security Protocols This slide shows the larger TCP/IP Protocol Stack and Network Security protocols Cloud Computing follows this model for both networking and for security. So much of the knowledge one may have about networking and security transfers to the Cloud domain. On the other hand, Cloud introduces many complications (mostly due to virtualization) and this adds complexity to security considerations. What Should you Know about Security While the Password is a basis for secure access it is not enough to secure your applications and services. There is whole stack of network and infrastructure or platform security services and mechanisms which need to be applied in a consistent way to ensure high system dependability and availability. IEEE elearning Library Cloud Security and Data Protection Transcript pg. 5 / 19

6 Dependability means the extent to which you can trust or depend on the system We have seen how much the different cloud security layers and mechanisms must communicate with each other. Much of the Basis for Cloud Security is to have secure communication and data transfers in the security protocols and security mechanisms themselves. Security is an overloaded term and may mean different aspects Network/communication Security -Data Security Application Security -Operation Security System Security What kind of data to protect Application Data Personal Data (User ID, personal information) Infrastructure management data Data security must be considered for at least 3 aspects Data in transfer (Communication) Data in-rest (Stored) Data at run-time (Processed) We must also understand the Relations between Security and Trust Comment to Technical trust -Technical trust can only Yes or No Trusted or Not Trusted -Social or reputation based trust may have continuous value such as from 0 to 1 Different Sides of Security and Trust The modern paradigm of remote distributed services and online/downloadable digital content provisioning makes security and trust relations between User and Provider more complex The User and Service Provider are the two actors concerned with own Data/Content security and each other System/Platform trustworthiness Two other aspects of security/trust Data stored vs Data accessed/processed System Idle vs Active (running User session) Trust Relations Between Provider and Customer Now we move to more complex picture of trust relations between the User and the Provider The illustration in the slide shows the way to think about this. On the left we see a Trust Domain which is associated with the User. You can see in this Trust domain there is the User client system, the User Data, and the User Identity Credentials (which may be a password or may be more) IEEE elearning Library Cloud Security and Data Protection Transcript pg. 6 / 19

7 On the right we see a Trust Domain which is associated with the Provider. You can see in this Trust domain there is the cloud platform, the data stored by the Provider, the Application running on the Provider cloud, and the data controlled by the application. These two domains establish a Trust Relationship between them which is bi-lateral as shown for example the user trusts that the Cloud is in fact the cloud which the User thinks it is, and the Cloud trusts that the User is the User which is represented to the Cloud. Usually the User trusts the Provider through mechanisms including Secure DNS and Certificates. Usually the Provider trusts the User through a Passwords mechanism. Cloud, OS, Network and Applications Trust Layers This slide provides even deeper insight into security relations between components and layers of the cloud based services and user system or application. In this diagram the Provider is on the left, and the User is on the right. The Provider (cloud platform) employs a security model known as a Trusted Computing Base (TCB) This means it has a root of trust tied originally to the Hardware. All layers above the hardware including the network, the cloud software itself, and the Virtual Machine mechanisms (hypervisors) are tied back to this root of trust. This is why it is called a Trusted Computing Base approach. The software mechanism by which this trust is asserted is usually a Certificate. The User side (application) employs a different trust model, referred to as OSI/Internet security. TCB cant be used because the hardware in fact the total user system is in the wild and subject to any sorts of modifications or endless variety. So a system based on credentials (secrets) are used to establish trust. These are usually in the form of passwords but can be keys, biometrics, challenge/response, etc. This bilateral trust between Provider and User domain is implemented/used in Client/server and Service Oriented Architecture and in OS and hypervisor run-time. A secure communications channel is set up (as illustrated) using an encrypted channel. This can be done using any number of means but is usually a form of Virtual Private Network (VPN). A protocol is followed between the two domains a the bilateral trust is established for a particular task at hand (like running the application on the cloud). This is called a Security Context. IEEE elearning Library Cloud Security and Data Protection Transcript pg. 7 / 19

8 Cloud Computing Security Challenges Cloud Computing adds a number of challenges to Security. Cloud is different because it runs modules which are dynamically provisioned using automation. Most often, clouds utilize virtualization in compute, in network, and in storage, all of which add additional levels of complexity to securing a cloud. Starting with the most basic level, Cloud security infrastructure should provide a framework for dynamically provisioned cloud security services and infrastructure. As we discussed at the last slide, these services must be based on the hardware/platform based Root of trust. This is partly realized by the SSH secret keys generation during account creation at AWS and Microsoft Azure what you should have learned from hands on labs. More strict security bootstrapping between provider and user domains should use TCB models and mechanisms implemented in the Trusted Computing Group Architecture (TCGA) and Trusted Platform Module (TPM) Common Cloud Security Model In the first days of using Cloud Computing, these were no generally agreed best practices for implementing security. These were some areas of incompatibility between the expected security model on the User side (client server or SOA) and the security model on the Provider side (kernel based OS and hypervisor security mechanisms). A Common Cloud Security Model has been developed which embodies a best practice, now that there are more commonalities in the use cases of Cloud Computing and the way that Public and Private cloud work.. First, on the Cloud side, there is a known SLA and Provider based security model SLA between provider and user defines the provider responsibility and guarantees Providers undergo certification of their cloud infrastructure The Customer/User must trust the Provider Access from the User to the Provider uses VPN and SSH keys which are generated for user infrastructure/vms Simple access control can extended with the Federated Identity Management There is not an easy integration with legacy customer/tenant infrastructure and physical resources IEEE elearning Library Cloud Security and Data Protection Transcript pg. 8 / 19

9 Cloud Environment and Issues to be Addressed Now let us take a look at the Provider (Cloud) side, and understand what issues we must address. At the root of most of the challenges is that the Cloud utilizes heavily Virtualised services and environment There is heavily automated On-demand provisioning and dynamic scalability There is the notion of the multi-tenant application. Here, we have organizational notions in the sharing of the applications, for example a company or organization is the master subscriber, within that there are departments, then within that there are actual Users (people who are employees, or students, or members). Actual application execution as well as actual storage is occurring in changing (uncontrolled) environments, which vary widely from one cloud implementation to another Simply encrypting is not a solution as this will often break indexing and searching. Index-able/Searchable encryption is still a research project. Finally the whole idea of bootstrapping (Trusted Computing Base approach) all the way to include the customer trust domain is not usually possible. General Requirements to Cloud Security Infrastructure What do people ask for when expecting comprehensive Cloud security? Data protection during all stages Access control infrastructure virtualization and dynamic provisioning Security services lifecycle management, Security context management Trust and key management SLA management Security Services Lifecycle Management Model (SSLM) Both Services Lifecycle Management (SLM) and Security Services Lifecycle Management (SSLM) models are implemented as a part of cloud services provisioning platform and have most of stages automated. Security services must be bound to the main services they protect and bootstrapped to both cloud platform and customer side security services Registration & Runtime Binding & Synchronization specifically target such scenarios as 1) Complex multi-component services provisioning 2) Large volume of data transfer, data partitioning 3) Services or processes failure 4) Services upgrade, elasticity, re-engineering IEEE elearning Library Cloud Security and Data Protection Transcript pg. 9 / 19

10 To avoid having to repeat a full services provisioning process to establish a Trusted Computing Base. Relation Between SSLM/SLM Stages and Supporting General and Security Mechanisms This table shows what security mechanisms are required/mandatory or recommended/optional at each SSLM stage. As we discussed on the previous slide GRI (Generic Reservation ID) is important and creates a basis for all services linking, services binding to provisioning session and runtime environment, and the whole process traceability SLA negotiated is done at the initial stage, needs to be monitored during operation, and it is mandatory to be checked after services are terminated. Practical Security Services and Mechanisms Used in Cloud There are a number of Practical Security Services and Mechanisms which are Used in Cloud The most common is the use of the Virtual Private Network (VPN) Virtual Private Cloud (VPC) for creating virtual cloud infrastructure for each customer. Within this, one can use the Secure Shell (SSH) protocol, or the HTTPS and TLS/SSL protocols for secure web access. Each of these are based on the well-known Public Key Infrastructure (PKI) that provides a basis for each of these. PKI is used to generate keys for the encryption. Higher up the stack, we use Access control, that includes Authentication and Authorization, and is supported by Identity Management. This is tied into Identity Management service for user accounts management, which could be standalone to the Cloud, or tied in with Federated Access Control and Federated Identity Management. Make sure one has Key escrow to ensure restoration of encrypted data in case key held by data owner is lost! Data Lifecycle Management Model Once the access issues are solved, one turns to Data protection In the Cloud, Data Protection must be provided for the whole data lifecycle The generalized Data Lifecycle Management (DLM) model contains the following stages that are typically present in majority of user applications: Data collection, registration and storage Data filtering and pre-processing Data processing, data analytics Data visualization, data archiving Data delivery, data sharing IEEE elearning Library Cloud Security and Data Protection Transcript pg. 10 / 19

11 Data Security and Data Lifecycle Management A good Data Protection scheme pays attention to Data Security in the context of Data Lifecycle Management Data security solutions and supporting infrastructure should address a number of problems related to the Data lifecycle These are enumerated in the Slide Data security services and mechanisms should address the following functionality related to different data management activities These are enumerated in the Slide Data Protection in Cloud There are many tools to address these requirements of Data Protection in Cloud Data transfer between data source and cloud system or cloud storage. Data encryption Data replication and migration. Data restoration. Data availability. Secure data storage. These are each described in detail on the Slide Cryptographically Enforced Data-Centric Security Many advocates of Data Protection suggest that aggressive use of Cryptography for data at rest, for data in motion is one of the only ways to ensure Security. There are two large challenges of Cryptographically Enforced Data-Centric Security. One is that data must be decrypted to be processed. This makes it practically unfeasible to achieve full protection of data at all infrastructure layers and during the whole data lifecycle. Also, many applications want to use large footprints of the data to do indexing and search, which again requires large quantities of the data to be decrypted to be indexed or searched. Is there a way for data to remain encrypted all the time? Recent achievement in developing research has yielded the homomorphic encryption by Boneh and Waters (2007) which made it theoretically possible to process encrypted data. There are other methods of working directly with encrypted data as well, for example performing encrypted data comparison, subset queries and arbitrary conjunction of such queries. So far, there are real challenges with encrypting as much of one s data as is practical and realizing the times when it is unencrypted are generating risk. IEEE elearning Library Cloud Security and Data Protection Transcript pg. 11 / 19

12 Cloud Security Standards: NIST and US Federal A number of standards and Best Practices documents are addressing Cloud Security in general. Although primarily developed for USA, NIST standards are worldwide accepted. NIST is known for their excellent definition of Cloud Computing technology and Cloud Computing Reference Architecture specified in the documents NIST SP , A NIST definition of cloud computing, and NIST SP , Cloud Computing Reference Architecture, v1.0. The full set of the cloud related standards includes those detailed on the Slide. Cloud Security and Big Data Security Standards and Business Continuity Planning (BCP) A number of standards and Best Practices documents are addressing Cloud Security in general. Recently with the emergence of Big Data, a number of standards are also published addressing specifically Data Security. Cloud Security Alliance is an authoritative body with wide international membership that provides wide research and best practices collection in cloud security and currently also covering Big Data About cloud and Big Data reports ENISA is a European body that is recognized for their research and activity on cyber infrastructure security with focus on risk and threats analysis. Provided analysis in 2010 and recently published report Overview of current and emerging cyber-threats that analyses both threats to cloud computing and use of cloud computing for new types and scales of attacks. NIST Cloud Computing Security Reference Architecture (NIST SP Draft) Based on NIST Cloud Computing Reference Architecture NIST SP (CCRA). The standard provides detailed analysis of the security architecture components for each of cloud services provisioning stakeholders Cloud Consumer Cloud Provider Cloud Broker Cloud Auditor Cloud Carrier IEEE elearning Library Cloud Security and Data Protection Transcript pg. 12 / 19

13 The security infrastructure needs to be integrated over all cooperating members/stakeholders and Includes the following steps 1 Categorise 2 Identify security requirements 3 Select architecture 4 Assess 5 Authorise 6 Monitor Cloud Services CSA3.0 Security Guidance for Critical Area of Focus in Cloud Computing The document uses CSA Cloud Security Alliance Cloud Services Model that is used to map the security concerns to the cloud services and functional components in different cloud services models IaaS, PaaS, SaaS. Note that CSA splits concerns into two Domains one is Governance, one is Operational. The slide details the components of each. CSA Top Ten Big Data Security and Privacy Challenges Big Data motivate more detailed look at the data security and privacy protection challenges and suggested solutions which are applicable to general data protection in cloud taking into account that that due to scale of Big Data the Big Data applications are implemented in cloud and rely on cloud infrastructure and platform services. CSA Top Ten are defined for the following functional components 1 -Big Data sources that may include sensor, devices, large industrial objects as well as web, network and human activity 2 Data input and data provenance 3 Data processing environment 4 Cloud based Big Data infrastructure 5 Data storage (cloud based) 6 Data output and visualization CSA Top Ten Big Data Security Challenges by Functional Groups CSA details their Top Ten Big Data Security Challenges by Functional Groups Infrastructure Security Access Control and Policy Data Privacy and Confidentiality Data Management The proposed analysis of the security and privacy challenges includes the following sections: 1. Use cases definition 2. Modeling: formalizing a threat model that covers most of the cyber-attack or data-leakage scenarios 3. Analysis: finding tractable solutions based on the threat model IEEE elearning Library Cloud Security and Data Protection Transcript pg. 13 / 19

14 4. Implementation: implementing the solution in existing infrastructures Amazon Web Services Security Model Now we turn to look at the security model as it is implemented in Amazon Web Services. The slide illustrates the three main part of the security aspects/solutions/measures that they addressed: Cloud infrastructure (physical facilities, compliance, and platform) Cloud Services (cloud software) Customer applications Security is declared as one of critical importance to AWS cloud that is targeted to protect customer information and data from integrity compromise, leakage, accidental or deliberate theft, and deletion. The AWS cloud platform design follows best practices for secure software design and includes formal internal design review, threats analysis, risk assessment, as well as regular penetration testing. AWS obtained most of the industry security and compliance certification. AWS Security Shared Responsibility Model As discussed earlier in this lesson, there is a Shared Responsibility Model that splits responsibility for the security of different layers and components between a provider and a customer or tenant. AWS follows this approach, clearly enabling the customer to do their share in the joint responsibility of the Cloud Service Provider and customer. The Cloud Service Provider ensures the cloud infrastructure security and compliance, and provides necessary security services. The Customer/user ensures data security, applications security, correct use of the cloud platform. In the cloud, Security is a shared responsibility, it is no longer possible to provide a platform within which one can deploy any sloppy application and rely on the platform and network to make it secure. This is because of the complexity and scale-out of cloud, security constraints would hinder the ability to construct a large scale out cloud and thus, some of the responsibility is pushed upwards into the parts which scale, including the application itself. IEEE elearning Library Cloud Security and Data Protection Transcript pg. 14 / 19

15 Example: Security Responsibility Sharing in AWS IaaS Infrastructure Services This slide provides an illustration of the Shared Responsibility Model that splits responsibility for the security of different layers and components between a provider and a customer or tenant specifically for AWS. One can see the specific recommendations made by Amazon. This illustration shows the shared responsibilities in an IaaS context. For other cloud service models PaaS and SaaS the responsibility of AWS goes up to OS, network and firewall for PaaS, and also includes the application platform and container for SaaS. However, the responsibility for data always remains with the customer. AWS Security Recommendations: Customer Side Now we consider the recommended security best practices at each layer Recommended security methods for customer cloud infrastructure include: Use Virtual Private Cloud (VPC) to create a secure environment for your cloud services in AWS Use security zoning and network segmentation based on security groups, Network Access Control Lists, host based firewalls Strengthen network security and ensure secure access for users and applications. Create threats protection layer in traffic flow and ensure protection against Denial of Service (DoS) attacks. The slide details a longer list of security best practices Security in Amazon EC2 and S3 AWS implements the following security measures to protect the main cloud platform components and services. Amazon compute (EC2) Security implements: Multiple levels of security including Guest Operating System, Firewall, API to manage VM instances Hypervisor that is a customized version of the Xen hypervisor allows running processes in four privilege modes: host OS is executed Ring 0; guest OS runs in Ring 1, applications run in Ring 3. Instances isolation is also provided by hypervisor that forwards all communication for instances via virtual firewall that resides in the hypervisor layer. Instant SSH keys generation for individual users and groups. Amazon Simple Storage Service (Amazon S3) Security S3 storage is accessed via SSL protocol Data security in rest is provided by encryption and multi-layer physical security AWS adopts a secure and reliable technique for storage device decommissioning. IEEE elearning Library Cloud Security and Data Protection Transcript pg. 15 / 19

16 AWS Identity and Access Management (IAM) AWS Identity and Access Management IAM provides functionality to securely control access to AWS services and resources for individual users and groups by defining individual and group permissions and policies. Examples of using AWS IAM Fine-grained access control to AWS resources Manage access control for mobile applications with Web Identity Providers Integrate with your corporate directory Multi-Factor Authentication for highly privileged users Example: Multi-layer Security in AWS This slide illustrates an example of how an application works with AWS to explicitly enable security at multiple levels We are looking at the sample application topology we worked with earlier in this Lesson, What is shown is for each of the major application tiers, eg, Load Balancer, web tier, caching tier, Database Tier, AWS needs to be specifically configured to allow certain traffic to pass (and the remainder blocked). AWS will not automatically over-ride what gets set up in deployment. It is very easy to make wide open security groups in AWS, which is why it is a good idea to check and configure each tier. Microsoft Azure Cloud Security Microsoft Azure demonstrates no less advanced security than AWS. Microsoft has long term experience in developing security applications. Microsoft Secure software Development Lifecycle is widely respected and used best practice. Azure cloud design claims to follow these practices in the cloud platform security design. Of course Azure also assumes the Shared Responsibility Model that splits responsibility for the security of different layers and components between a provider and a customer or tenant Three components of the cloud environment security: Cloud infrastructure security Datacenter security, trustworthy design; secure operational procedures Certification and compliance; Cloud platform security services Serving both platform security and integration with the customer applications Access control, security policies, customer controlled security services Data protection: cloud platform and user controlled; Customer/tenants applications security IEEE elearning Library Cloud Security and Data Protection Transcript pg. 16 / 19

17 Microsoft Azure Cloud Security Services Azure Security Services from both the customer s and providers operational perspectives: Federated identity and access management based on Microsoft accounts or organizational accounts, enabled by Azure Active Directory Service (AADS) Use of mutual SSL authentication. Component isolation through a layered environment. Virtual Machine state maintenance and configuration integrity. Storage redundancy to minimize the impact of hardware failures. Monitoring, logging, and reporting on administrative actions. Built-in data protection. Control access to customer data and applications Protect data in transit and at rest Dedicated network connectivity with Azure ExpressRoute Microsoft Azure Cloud Security Design Principles Microsoft has detailed several of its key Cloud Security Design Principles. It is likely that AWS implements something like this as well 1. SSL mutual authentication for internal control traffic 2. Certificate and private key management 3. Least privilege principle is applied to running customer service on cloud 4. Access control model in Microsoft Azure Storage -different levels of security. 5. Isolation of hypervisor, Root OS, and Guest VMs 6. Isolation of Fabric Controller (FC) 7. Packets filtering is implemented at the level of Hyper-V hypervisor 8. VLANs and network segmentation provides isolation between segments 9. Isolation of customer access 10. Deletion of Data in Microsoft Azure IEEE elearning Library Cloud Security and Data Protection Transcript pg. 17 / 19

18 Microsoft Azure Security Controls and Capabilities Azure then can deliver a Wide spectrum of Security Controls and Capabilities Zero standing privileges Isolation Azure Virtual Networks and Encrypted communications Data encryption Identity and access Patching and Antivirus/Antimalware protection Intrusion detection and prevention systems Example: AWS Cloud Certification and Compliance Finalizing this tutorial we will give an example of the certification and compliance of AWS and Microsoft Azure clouds. You can assume that they almost equal what give a good basis for integrating services and resources from both platforms in a variety of possible applications. This slide lists the AWS compliance guidelines and standards. Example: Microsoft Azure Certification and Compliance Similar to AWS, here is the Microsoft Azure certification and compliance. You can see it is basically the same as the AWS compliance guidelines and standards Wrap Up and Take Away Security is complex domain and Cloud Security is bringing even more complexity factors to understanding and developing secure cloud based applications and consistent cloud security services. Knowing the basic security and trust management models is important for understanding cloud security and cloud security services Security of the cloud platform is one of key concern areas for cloud provider, first, to protect their datacenter, and second, to provide competitive quality of service to their customers Cloud Security Services Lifecycle Model (SSLM) provides a basis for consistent security services design and integration Data protection in cloud must be provided at all cloud functional layers, across multiple domains, and along the whole data lifecycle Cloud security and data protection is an active standardization area. Major standardization bodies on cloud security are NIST, CSA, ENISA followed by industry related bodies Standardization is especially important for ensuring interoperability and compliance of security services AWS and Microsoft Azure clouds demonstrate well IEEE elearning Library Cloud Security and Data Protection Transcript pg. 18 / 19

19 developed cloud platform with the security in-design supported by numerous security certifications and compliances Three main cloud security domains: (1) cloud infrastructure and platform security; (2) cloud security services; (3) customer applications security IEEE elearning Library Cloud Security and Data Protection Transcript pg. 19 / 19

DISTRIBUTED SYSTEMS [COMP9243] Lecture 9a: Cloud Computing WHAT IS CLOUD COMPUTING? 2

DISTRIBUTED SYSTEMS [COMP9243] Lecture 9a: Cloud Computing WHAT IS CLOUD COMPUTING? 2 DISTRIBUTED SYSTEMS [COMP9243] Lecture 9a: Cloud Computing Slide 1 Slide 3 A style of computing in which dynamically scalable and often virtualized resources are provided as a service over the Internet.

More information

Lecture 02b Cloud Computing II

Lecture 02b Cloud Computing II Mobile Cloud Computing Lecture 02b Cloud Computing II 吳 秀 陽 Shiow-yang Wu T. Sridhar. Cloud Computing A Primer, Part 2: Infrastructure and Implementation Topics. The Internet Protocol Journal, Volume 12,

More information

Title: Cloud Security, Access Control and Compliance

Title: Cloud Security, Access Control and Compliance HPCS 2015 TUTORIAL IV Title: Cloud Security, Access Control and Compliance http://www.uazone.org/demch/presentations.html hpcs2015tutorial-cloud-security-access-control-compliance-v02.pdf Yuri Demchenko

More information

Simone Brunozzi, AWS Technology Evangelist, APAC. Fortress in the Cloud

Simone Brunozzi, AWS Technology Evangelist, APAC. Fortress in the Cloud Simone Brunozzi, AWS Technology Evangelist, APAC Fortress in the Cloud AWS Cloud Security Model Overview Certifications & Accreditations Sarbanes-Oxley (SOX) compliance ISO 27001 Certification PCI DSS

More information

Building Energy Security Framework

Building Energy Security Framework Building Energy Security Framework Philosophy, Design, and Implementation Building Energy manages multiple subsets of customer data. Customers have strict requirements for regulatory compliance, privacy

More information

Security Issues in Cloud Computing

Security Issues in Cloud Computing Security Issues in Computing CSCI 454/554 Computing w Definition based on NIST: A model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources

More information

Cloud Courses Description

Cloud Courses Description Courses Description 101: Fundamental Computing and Architecture Computing Concepts and Models. Data center architecture. Fundamental Architecture. Virtualization Basics. platforms: IaaS, PaaS, SaaS. deployment

More information

Cloud Security Overview

Cloud Security Overview UT DALLAS Erik Jonsson School of Engineering & Computer Science Cloud Security Overview Murat Kantarcioglu Outline Current cloud security techniques Amazon Web services Microsoft Azure Cloud Security Challengers

More information

A Survey on Cloud Security Issues and Techniques

A Survey on Cloud Security Issues and Techniques A Survey on Cloud Security Issues and Techniques Garima Gupta 1, P.R.Laxmi 2 and Shubhanjali Sharma 3 1 Department of Computer Engineering, Government Engineering College, Ajmer Guptagarima09@gmail.com

More information

Cloud Courses Description

Cloud Courses Description Cloud Courses Description Cloud 101: Fundamental Cloud Computing and Architecture Cloud Computing Concepts and Models. Fundamental Cloud Architecture. Virtualization Basics. Cloud platforms: IaaS, PaaS,

More information

PCI COMPLIANCE ON AWS: HOW TREND MICRO CAN HELP

PCI COMPLIANCE ON AWS: HOW TREND MICRO CAN HELP solution brief PCI COMPLIANCE ON AWS: HOW TREND MICRO CAN HELP AWS AND PCI DSS COMPLIANCE To ensure an end-to-end secure computing environment, Amazon Web Services (AWS) employs a shared security responsibility

More information

GoodData Corporation Security White Paper

GoodData Corporation Security White Paper GoodData Corporation Security White Paper May 2016 Executive Overview The GoodData Analytics Distribution Platform is designed to help Enterprises and Independent Software Vendors (ISVs) securely share

More information

SECURITY CONCERNS AND SOLUTIONS FOR CLOUD COMPUTING

SECURITY CONCERNS AND SOLUTIONS FOR CLOUD COMPUTING SECURITY CONCERNS AND SOLUTIONS FOR CLOUD COMPUTING 1. K.SURIYA Assistant professor Department of Computer Applications Dhanalakshmi Srinivasan College of Arts and Science for Womren Perambalur Mail: Surik.mca@gmail.com

More information

Open Data Center Alliance Usage: Provider Assurance Rev. 1.1

Open Data Center Alliance Usage: Provider Assurance Rev. 1.1 sm Open Data Center Alliance Usage: Provider Assurance Rev. 1.1 Legal Notice This Open Data Center Alliance SM Usage:Provider Assurance is proprietary to the Open Data Center Alliance, Inc. NOTICE TO USERS

More information

Outlook. Corporate Research and Technologies, Munich, Germany. 20 th May 2010

Outlook. Corporate Research and Technologies, Munich, Germany. 20 th May 2010 Computing Architecture Computing Introduction Computing Architecture Software Architecture for Outlook Corporate Research and Technologies, Munich, Germany Gerald Kaefer * 4 th Generation Datacenter IEEE

More information

Course 20533: Implementing Microsoft Azure Infrastructure Solutions

Course 20533: Implementing Microsoft Azure Infrastructure Solutions Course 20533: Implementing Microsoft Azure Infrastructure Solutions Overview About this course This course is aimed at experienced IT Professionals who currently administer their on-premises infrastructure.

More information

Implementing Microsoft Azure Infrastructure Solutions

Implementing Microsoft Azure Infrastructure Solutions Course Code: M20533 Vendor: Microsoft Course Overview Duration: 5 RRP: 2,025 Implementing Microsoft Azure Infrastructure Solutions Overview This course is aimed at experienced IT Professionals who currently

More information

Cloud Computing Governance & Security. Security Risks in the Cloud

Cloud Computing Governance & Security. Security Risks in the Cloud Cloud Computing Governance & Security The top ten questions you have to ask Mike Small CEng, FBCS, CITP Fellow Analyst, KuppingerCole This Webinar is supported by Agenda What is the Problem? Ten Cloud

More information

Chapter 11 Cloud Application Development

Chapter 11 Cloud Application Development Chapter 11 Cloud Application Development Contents Motivation. Connecting clients to instances through firewalls. Chapter 10 2 Motivation Some of the questions of interest to application developers: How

More information

Microsoft SharePoint Architectural Models

Microsoft SharePoint Architectural Models Microsoft SharePoint This topic is 1 of 5 in a series Introduction to Fundamental SharePoint This series is intended to raise awareness of the different fundamental architectural models through which SharePoint

More information

MOC 20413C: Designing and Implementing a Server Infrastructure

MOC 20413C: Designing and Implementing a Server Infrastructure MOC 20413C: Designing and Implementing a Server Infrastructure Course Overview This course provides students with the knowledge and skills to provide an enterprise solution that supports manual and automated

More information

Cloud Essentials for Architects using OpenStack

Cloud Essentials for Architects using OpenStack Cloud Essentials for Architects using OpenStack Course Overview Start Date 18th December 2014 Duration 2 Days Location Dublin Course Code SS906 Programme Overview Cloud Computing is gaining increasing

More information

Top 10 Risks in the Cloud

Top 10 Risks in the Cloud A COALFIRE PERSPECTIVE Top 10 Risks in the Cloud by Balaji Palanisamy, VCP, QSA, Coalfire March 2012 DALLAS DENVER LOS ANGELES NEW YORK SEATTLE Introduction Business leaders today face a complex risk question

More information

Securing your Virtual Datacenter. Part 1: Preventing, Mitigating Privilege Escalation

Securing your Virtual Datacenter. Part 1: Preventing, Mitigating Privilege Escalation Securing your Virtual Datacenter Part 1: Preventing, Mitigating Privilege Escalation Before We Start... Today's discussion is by no means an exhaustive discussion of the security implications of virtualization

More information

Deploy Remote Desktop Gateway on the AWS Cloud

Deploy Remote Desktop Gateway on the AWS Cloud Deploy Remote Desktop Gateway on the AWS Cloud Mike Pfeiffer April 2014 Last updated: May 2015 (revisions) Table of Contents Abstract... 3 Before You Get Started... 3 Three Ways to Use this Guide... 4

More information

NETWORK ACCESS CONTROL AND CLOUD SECURITY. Tran Song Dat Phuc SeoulTech 2015

NETWORK ACCESS CONTROL AND CLOUD SECURITY. Tran Song Dat Phuc SeoulTech 2015 NETWORK ACCESS CONTROL AND CLOUD SECURITY Tran Song Dat Phuc SeoulTech 2015 Table of Contents Network Access Control (NAC) Network Access Enforcement Methods Extensible Authentication Protocol IEEE 802.1X

More information

Cloud Security Introduction and Overview

Cloud Security Introduction and Overview Introduction and Overview Klaus Gribi Senior Security Consultant klaus.gribi@swisscom.com May 6, 2015 Agenda 2 1. Cloud Security Cloud Evolution, Service and Deployment models Overview and the Notorious

More information

Building Secure Cloud Applications. On the Microsoft Windows Azure platform

Building Secure Cloud Applications. On the Microsoft Windows Azure platform Building Secure Cloud Applications On the Microsoft Windows Azure platform Contents 1 Security and the cloud 3 1.1 General considerations 3 1.2 Questions to ask 3 2 The Windows Azure platform 4 2.1 Inside

More information

Designing and Implementing a Server Infrastructure

Designing and Implementing a Server Infrastructure Page 1 of 7 Overview This 5-day instructor-led course provides you with the skills and knowledge needed to plan, design, and deploy a physical and logical Windows Server 2012 Active Directory Domain Services

More information

Keyword: Cloud computing, service model, deployment model, network layer security.

Keyword: Cloud computing, service model, deployment model, network layer security. Volume 4, Issue 2, February 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com An Emerging

More information

319 MANAGED HOSTING TECHNICAL DETAILS

319 MANAGED HOSTING TECHNICAL DETAILS 319 MANAGED HOSTING TECHNICAL DETAILS 319 NetWorks www.319networks.com Table of Contents Architecture... 4 319 Platform... 5 319 Applications... 5 319 Network Stack... 5 319 Cloud Hosting Technical Details...

More information

Future of Cloud Computing. Irena Bojanova, Ph.D. UMUC, NIST

Future of Cloud Computing. Irena Bojanova, Ph.D. UMUC, NIST Future of Cloud Computing Irena Bojanova, Ph.D. UMUC, NIST No Longer On The Horizon Essential Characteristics On-demand Self-Service Broad Network Access Resource Pooling Rapid Elasticity Measured Service

More information

Cloud Security Through Threat Modeling. Robert M. Zigweid Director of Services for IOActive

Cloud Security Through Threat Modeling. Robert M. Zigweid Director of Services for IOActive Cloud Security Through Threat Modeling Robert M. Zigweid Director of Services for IOActive 1 Key Points Introduction Threat Model Primer Assessing Threats Mitigating Threats Sample Threat Model Exercise

More information

Security Issues in Cloud Computing

Security Issues in Cloud Computing Security Issues in Cloud Computing Dr. A. Askarunisa Professor and Head Vickram College of Engineering, Madurai, Tamilnadu, India N.Ganesh Sr.Lecturer Vickram College of Engineering, Madurai, Tamilnadu,

More information

THE BLUENOSE SECURITY FRAMEWORK

THE BLUENOSE SECURITY FRAMEWORK THE BLUENOSE SECURITY FRAMEWORK Bluenose Analytics, Inc. All rights reserved TABLE OF CONTENTS Bluenose Analytics, Inc. Security Whitepaper ISO 27001/27002 / 1 The Four Pillars of Our Security Program

More information

Cloud Computing Security Requirements

Cloud Computing Security Requirements Issues in Cloud Security Private, Public, Hybrid Abstract This white paper discusses the major computer security issues confronting an organization when moving to the cloud. Even for small companies, migrating

More information

Security Overview Enterprise-Class Secure Mobile File Sharing

Security Overview Enterprise-Class Secure Mobile File Sharing Security Overview Enterprise-Class Secure Mobile File Sharing Accellion, Inc. 1 Overview 3 End to End Security 4 File Sharing Security Features 5 Storage 7 Encryption 8 Audit Trail 9 Accellion Public Cloud

More information

Security & Trust in the Cloud

Security & Trust in the Cloud Security & Trust in the Cloud Ray Trygstad Director of Information Technology, IIT School of Applied Technology Associate Director, Information Technology & Management Degree Programs Cloud Computing Primer

More information

Designing and Implementing a Server Infrastructure

Designing and Implementing a Server Infrastructure Course 20413C: Designing and Implementing a Server Infrastructure Page 1 of 7 Designing and Implementing a Server Infrastructure Course 20413: 4 days; Instructor-Led Introduction This 4-day instructor-led

More information

How To Protect Your Cloud Computing Resources From Attack

How To Protect Your Cloud Computing Resources From Attack Security Considerations for Cloud Computing Steve Ouzman Security Engineer AGENDA Introduction Brief Cloud Overview Security Considerations ServiceNow Security Overview Summary Cloud Computing Overview

More information

Securing The Cloud. Russ Fellows, Managing Partner - Evaluator Group Inc.

Securing The Cloud. Russ Fellows, Managing Partner - Evaluator Group Inc. Securing The Cloud Russ Fellows, Managing Partner - Evaluator Group Inc. SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and individual members may

More information

White Paper How Noah Mobile uses Microsoft Azure Core Services

White Paper How Noah Mobile uses Microsoft Azure Core Services NoahMobile Documentation White Paper How Noah Mobile uses Microsoft Azure Core Services The Noah Mobile Cloud service is built for the Microsoft Azure platform. The solutions that are part of the Noah

More information

GE Measurement & Control. Cyber Security for NEI 08-09

GE Measurement & Control. Cyber Security for NEI 08-09 GE Measurement & Control Cyber Security for NEI 08-09 Contents Cyber Security for NEI 08-09...3 Cyber Security Solution Support for NEI 08-09...3 1.0 Access Contols...4 2.0 Audit And Accountability...4

More information

Clouds on the Horizon Cloud Security in Today s DoD Environment. Bill Musson Security Analyst

Clouds on the Horizon Cloud Security in Today s DoD Environment. Bill Musson Security Analyst Clouds on the Horizon Cloud Security in Today s DoD Environment Bill Musson Security Analyst Agenda O Overview of Cloud architectures O Essential characteristics O Cloud service models O Cloud deployment

More information

SECURE CLOUD COMPUTING

SECURE CLOUD COMPUTING Outline SECURE CLOUD COMPUTING Introduction (of many buzz words) References What is Cloud Computing Cloud Computing Infrastructure Security Cloud Storage and Data Security Identity Management in the Cloud

More information

Security Best Practices for Microsoft Azure Applications

Security Best Practices for Microsoft Azure Applications Security Best Practices for Microsoft Azure Applications Varun Sharma Principal Security Engineer, Information Security & Risk Management (ISRM), Microsoft IT Service Lines Application Security Infrastructure

More information

Chapter 1: Introduction

Chapter 1: Introduction Chapter 1 Introduction 1 Chapter 1: Introduction 1.1 Inspiration Cloud Computing Inspired by the cloud computing characteristics like pay per use, rapid elasticity, scalable, on demand self service, secure

More information

How to Secure Infrastructure Clouds with Trusted Computing Technologies

How to Secure Infrastructure Clouds with Trusted Computing Technologies How to Secure Infrastructure Clouds with Trusted Computing Technologies Nicolae Paladi Swedish Institute of Computer Science 2 Contents 1. Infrastructure-as-a-Service 2. Security challenges of IaaS 3.

More information

05.0 Application Development

05.0 Application Development Number 5.0 Policy Owner Information Security and Technology Policy Application Development Effective 01/01/2014 Last Revision 12/30/2013 Department of Innovation and Technology 5. Application Development

More information

Tufts University. Department of Computer Science. COMP 116 Introduction to Computer Security Fall 2014 Final Project. Guocui Gao Guocui.gao@tufts.

Tufts University. Department of Computer Science. COMP 116 Introduction to Computer Security Fall 2014 Final Project. Guocui Gao Guocui.gao@tufts. Tufts University Department of Computer Science COMP 116 Introduction to Computer Security Fall 2014 Final Project Investigating Security Issues in Cloud Computing Guocui Gao Guocui.gao@tufts.edu Mentor:

More information

Implementing Microsoft Azure Infrastructure Solutions 20533B; 5 Days, Instructor-led

Implementing Microsoft Azure Infrastructure Solutions 20533B; 5 Days, Instructor-led Implementing Microsoft Azure Infrastructure Solutions 20533B; 5 Days, Instructor-led Course Description This course is aimed at experienced IT Professionals who currently administer their on-premises infrastructure.

More information

COURSE 20413C: DESIGNING AND IMPLEMENTING A SERVER INFRASTRUCTURE

COURSE 20413C: DESIGNING AND IMPLEMENTING A SERVER INFRASTRUCTURE ABOUT THIS COURSE This 5 day course covers the knowledge and skills needed to provide an enterprise solution that supports manual and automated server installations in a physical and virtual environment

More information

Designing and Implementing a Server Infrastructure

Designing and Implementing a Server Infrastructure Course Code: M20413 Vendor: Microsoft Course Overview Duration: 5 RRP: 2,025 Designing and Implementing a Server Infrastructure Overview Get hands-on instruction and practice planning, designing and deploying

More information

Course 20533B: Implementing Microsoft Azure Infrastructure Solutions

Course 20533B: Implementing Microsoft Azure Infrastructure Solutions Course 20533B: Implementing Microsoft Azure Infrastructure Solutions Sales 406/256-5700 Support 406/252-4959 Fax 406/256-0201 Evergreen Center North 1501 14 th St West, Suite 201 Billings, MT 59102 Course

More information

Securing The Cloud. Foundational Best Practices For Securing Cloud Computing. Scott Clark. Insert presenter logo here on slide master

Securing The Cloud. Foundational Best Practices For Securing Cloud Computing. Scott Clark. Insert presenter logo here on slide master Securing The Cloud Foundational Best Practices For Securing Cloud Computing Scott Clark Agenda Introduction to Cloud Computing What is Different in the Cloud? CSA Guidance Additional Resources 2 What is

More information

Proactively Secure Your Cloud Computing Platform

Proactively Secure Your Cloud Computing Platform Proactively Secure Your Cloud Computing Platform Dr. Krutartha Patel Security Engineer 2010 Check Point Software Technologies Ltd. [Restricted] ONLY for designated groups and individuals Agenda 1 Cloud

More information

Network Access Control and Cloud Security

Network Access Control and Cloud Security Network Access Control and Cloud Security Overview Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 Jain@cse.wustl.edu Audio/Video recordings of this lecture are available at: http://www.cse.wustl.edu/~jain/cse571-14/

More information

Designing and Implementing a Server Infrastructure

Designing and Implementing a Server Infrastructure Course 20413C: Designing and Implementing a Server Infrastructure Course Details Course Outline Module 1: Planning Server Upgrade and Migration This module explains how to plan a server upgrade and migration

More information

Designing and Implementing a Server Infrastructure 20413C; 5 days, Instructor-led

Designing and Implementing a Server Infrastructure 20413C; 5 days, Instructor-led Designing and Implementing a Server Infrastructure 20413C; 5 days, Instructor-led Course Description Get hands-on instruction and practice planning, designing and deploying a physical and logical Windows

More information

Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1

Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1 Industrial Network Security for SCADA, Automation, Process Control and PLC Systems Contents 1 An Introduction to Industrial Network Security 1 1.1 Course overview 1 1.2 The evolution of networking 1 1.3

More information

Cloud security and OpenStack Primož Cigoj Laboratorij za odprte sisteme in mreže IJS-E5. www.kc-class.eu

Cloud security and OpenStack Primož Cigoj Laboratorij za odprte sisteme in mreže IJS-E5. www.kc-class.eu Cloud security and OpenStack Primož Cigoj Laboratorij za odprte sisteme in mreže IJS-E5 www.kc-class.eu 1 1 Outline Cloud computing General overview Deployment and service models Security issues Threats

More information

Host Hardening. Presented by. Douglas Couch & Nathan Heck Security Analysts for ITaP 1

Host Hardening. Presented by. Douglas Couch & Nathan Heck Security Analysts for ITaP 1 Host Hardening Presented by Douglas Couch & Nathan Heck Security Analysts for ITaP 1 Background National Institute of Standards and Technology Draft Guide to General Server Security SP800-123 Server A

More information

Data Protection: From PKI to Virtualization & Cloud

Data Protection: From PKI to Virtualization & Cloud Data Protection: From PKI to Virtualization & Cloud Raymond Yeung CISSP, CISA Senior Regional Director, HK/TW, ASEAN & A/NZ SafeNet Inc. Agenda What is PKI? And Value? Traditional PKI Usage Cloud Security

More information

Course 20413: Designing and Implementing a Server Infrastructure

Course 20413: Designing and Implementing a Server Infrastructure Course 20413: Designing and Implementing a Server Infrastructure Overview About this course Get hands-on instruction and practice planning, designing and deploying a physical and logical Windows Server

More information

A Study on Analysis and Implementation of a Cloud Computing Framework for Multimedia Convergence Services

A Study on Analysis and Implementation of a Cloud Computing Framework for Multimedia Convergence Services A Study on Analysis and Implementation of a Cloud Computing Framework for Multimedia Convergence Services Ronnie D. Caytiles and Byungjoo Park * Department of Multimedia Engineering, Hannam University

More information

Cloud Computing. Adam Barker

Cloud Computing. Adam Barker Cloud Computing Adam Barker 1 Overview Introduction to Cloud computing Enabling technologies Different types of cloud: IaaS, PaaS and SaaS Cloud terminology Interacting with a cloud: management consoles

More information

SharePoint 2013 Logical Architecture

SharePoint 2013 Logical Architecture SharePoint 2013 Logical Architecture This document is provided "as-is". Information and views expressed in this document, including URL and other Internet Web site references, may change without notice.

More information

CS 356 Lecture 25 and 26 Operating System Security. Spring 2013

CS 356 Lecture 25 and 26 Operating System Security. Spring 2013 CS 356 Lecture 25 and 26 Operating System Security Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control

More information

Netop Environment Security. Unified security to all Netop products while leveraging the benefits of cloud computing

Netop Environment Security. Unified security to all Netop products while leveraging the benefits of cloud computing Netop Environment Security Unified security to all Netop products while leveraging the benefits of cloud computing Contents Introduction... 2 AWS Infrastructure Security... 3 Standards - Compliancy...

More information

70-414: Implementing a Cloud Based Infrastructure. Course Overview

70-414: Implementing a Cloud Based Infrastructure. Course Overview 70-414: Implementing a Cloud Based Infrastructure Course Overview This course covers will prepare the student for Exam 70-414: Implementing a Cloud Based Infrastructure. Students will learn how to create

More information

How To Extend Security Policies To Public Clouds

How To Extend Security Policies To Public Clouds What You Will Learn Public sector organizations without the budget to build a private cloud can consider public cloud services. The drawback until now has been tenants limited ability to implement their

More information

Cloud Infrastructure Security

Cloud Infrastructure Security Cloud Infrastructure Security Dimiter Velev 1 and Plamena Zlateva 2 1 University of National and World Economy, UNSS - Studentski grad, 1700 Sofia, Bulgaria dvelev@unwe.acad.bg 2 Institute of Control and

More information

Cloud Security considerations for business adoption. Ricci IEONG CSA-HK&M Chapter

Cloud Security considerations for business adoption. Ricci IEONG CSA-HK&M Chapter Cloud Security considerations for business adoption Ricci IEONG CSA-HK&M Chapter What is Cloud Computing? Slide 2 What is Cloud Computing? My Cloud @ Internet Pogoplug What is Cloud Computing? Compute

More information

Desingning and Implementing a Server Infrastructure

Desingning and Implementing a Server Infrastructure About this Course Desingning and Implementing a Server Get hands-on instruction and practice planning, designing and deploying a physical and logical Windows Server 2012 R2 enterprise infrastructure in

More information

Architecture Guidelines Application Security

Architecture Guidelines Application Security Executive Summary These guidelines describe best practice for application security for 2 or 3 tier web-based applications. It covers the use of common security mechanisms including Authentication, Authorisation

More information

Deployment Guide: Unidesk and Hyper- V

Deployment Guide: Unidesk and Hyper- V TECHNICAL WHITE PAPER Deployment Guide: Unidesk and Hyper- V This document provides a high level overview of Unidesk 3.x and Remote Desktop Services. It covers how Unidesk works, an architectural overview

More information

Cloud Computing: Opportunities, Challenges, and Solutions. Jungwoo Ryoo, Ph.D., CISSP, CISA The Pennsylvania State University

Cloud Computing: Opportunities, Challenges, and Solutions. Jungwoo Ryoo, Ph.D., CISSP, CISA The Pennsylvania State University Cloud Computing: Opportunities, Challenges, and Solutions Jungwoo Ryoo, Ph.D., CISSP, CISA The Pennsylvania State University What is cloud computing? What are some of the keywords? How many of you cannot

More information

SPACK FIREWALL RESTRICTION WITH SECURITY IN CLOUD OVER THE VIRTUAL ENVIRONMENT

SPACK FIREWALL RESTRICTION WITH SECURITY IN CLOUD OVER THE VIRTUAL ENVIRONMENT SPACK FIREWALL RESTRICTION WITH SECURITY IN CLOUD OVER THE VIRTUAL ENVIRONMENT V. Devi PG Scholar, Department of CSE, Indira Institute of Engineering & Technology, India. J. Chenni Kumaran Associate Professor,

More information

PCI COMPLIANCE ON AWS: HOW TREND MICRO CAN HELP

PCI COMPLIANCE ON AWS: HOW TREND MICRO CAN HELP SOLUTION BRIEF PCI COMPLIANCE ON AWS: HOW TREND MICRO CAN HELP The benefits of cloud computing are clear and compelling: no upfront investment, low ongoing costs, flexible capacity and fast application

More information

Architectural Implications of Cloud Computing

Architectural Implications of Cloud Computing Architectural Implications of Cloud Computing Grace Lewis Research, Technology and Systems Solutions (RTSS) Program Lewis is a senior member of the technical staff at the SEI in the Research, Technology,

More information

Assignment # 1 (Cloud Computing Security)

Assignment # 1 (Cloud Computing Security) Assignment # 1 (Cloud Computing Security) Group Members: Abdullah Abid Zeeshan Qaiser M. Umar Hayat Table of Contents Windows Azure Introduction... 4 Windows Azure Services... 4 1. Compute... 4 a) Virtual

More information

Windows Azure and private cloud

Windows Azure and private cloud Windows Azure and private cloud Joe Chou Senior Program Manager China Cloud Innovation Center Customer Advisory Team Microsoft Asia-Pacific Research and Development Group 1 Agenda Cloud Computing Fundamentals

More information

NCTA Cloud Operations

NCTA Cloud Operations NCTA Cloud Operations 093018 Lesson 1: Cloud Operations Topic A: Overview of Cloud Computing Solutions Identify the core concepts of cloud computing. Operations Terminology Identify the terminology used

More information

Security Model for VM in Cloud

Security Model for VM in Cloud Security Model for VM in Cloud 1 Venkataramana.Kanaparti, 2 Naveen Kumar R, 3 Rajani.S, 4 Padmavathamma M, 5 Anitha.C 1,2,3,5 Research Scholars, 4Research Supervisor 1,2,3,4,5 Dept. of Computer Science,

More information

Security Controls for the Autodesk 360 Managed Services

Security Controls for the Autodesk 360 Managed Services Autodesk Trust Center Security Controls for the Autodesk 360 Managed Services Autodesk strives to apply the operational best practices of leading cloud-computing providers around the world. Sound practices

More information

Threat Modeling Cloud Applications

Threat Modeling Cloud Applications Threat Modeling Cloud Applications What You Don t Know Will Hurt You Scott Matsumoto Principal Consultant smatsumoto@cigital.com Software Confidence. Achieved. www.cigital.com info@cigital.com +1.703.404.9293

More information

Level Agreements, and loss of availability due to security breach: Amazon EC2 and S3, Microsoft Windows Azure Compute and Storage.

Level Agreements, and loss of availability due to security breach: Amazon EC2 and S3, Microsoft Windows Azure Compute and Storage. Concordia University College of Alberta Master of Information Systems Security Management (MISSM) Program 7128 Ada Boulevard, Edmonton, AB Canada T5B 4E4 A comparative case study on Cloud Service Providers,

More information

yvette@yvetteagostini.it yvette@yvetteagostini.it

yvette@yvetteagostini.it yvette@yvetteagostini.it 1 The following is merely a collection of notes taken during works, study and just-for-fun activities No copyright infringements intended: all sources are duly listed at the end of the document This work

More information

STRATEGIC WHITE PAPER. Securing cloud environments with Nuage Networks VSP: Policy-based security automation and microsegmentation overview

STRATEGIC WHITE PAPER. Securing cloud environments with Nuage Networks VSP: Policy-based security automation and microsegmentation overview STRATEGIC WHITE PAPER Securing cloud environments with Nuage Networks VSP: Policy-based security automation and microsegmentation overview Abstract Cloud architectures rely on Software-Defined Networking

More information

Cloud S ecurity Security Processes & Practices Jinesh Varia

Cloud S ecurity Security Processes & Practices Jinesh Varia Cloud Security Processes & Practices Jinesh Varia Overview Certifications Physical Security Backups EC2 Security S3 Security SimpleDB Security SQS Security Best Practices AWS Security White Paper Available

More information

Security & Cloud Services IAN KAYNE

Security & Cloud Services IAN KAYNE Security & Cloud Services IAN KAYNE CloudComponents CLOUD SERVICES Dynamically scalable infrastructure, services and software based on broad network accessibility NETWORK ACCESS INTERNAL ESTATE CloudComponents

More information

Cloud Computing Technology

Cloud Computing Technology Cloud Computing Technology The Architecture Overview Danairat T. Certified Java Programmer, TOGAF Silver danairat@gmail.com, +66-81-559-1446 1 Agenda What is Cloud Computing? Case Study Service Model Architectures

More information

HIPAA Compliant Infrastructure Services. Real Security Outcomes. Delivered.

HIPAA Compliant Infrastructure Services. Real Security Outcomes. Delivered. Real Security Outcomes. Delivered. Deploying healthcare and healthcare related services to the cloud can be frightening. The requirements of HIPAA can be difficult to navigate, and while many vendors claim

More information

The Cloud, Virtualization, and Security

The Cloud, Virtualization, and Security A Cloud: Large groups of remote servers that are networked to allow centralized, shared data storage and online access to computer services or resources A Cloud: Large groups of remote servers that are

More information

SECURITY MODELS FOR CLOUD 2012. Kurtis E. Minder, CISSP

SECURITY MODELS FOR CLOUD 2012. Kurtis E. Minder, CISSP SECURITY MODELS FOR CLOUD 2012 Kurtis E. Minder, CISSP INTRODUCTION Kurtis E. Minder, Technical Sales Professional Companies: Roles: Security Design Engineer Systems Engineer Sales Engineer Salesperson

More information

Architecting and Building a Secure and Compliant Virtual Infrastructure and Private Cloud

Architecting and Building a Secure and Compliant Virtual Infrastructure and Private Cloud Architecting and Building a Secure and Compliant Virtual Infrastructure and Private Cloud Rob Randell, CISSP Principal Systems Engineer Security Specialist Agenda What is the Cloud? Virtualization Basics

More information

Microsoft 20533 - Implementing Microsoft Azure Infrastructure Solutions

Microsoft 20533 - Implementing Microsoft Azure Infrastructure Solutions 1800 ULEARN (853 276) www.ddls.com.au Microsoft 20533 - Implementing Microsoft Azure Infrastructure Solutions Length 5 days Price $4389.00 (inc GST) Version C Overview This course is intended for IT professionals

More information

Certified Information Systems Auditor (CISA)

Certified Information Systems Auditor (CISA) Certified Information Systems Auditor (CISA) Course Introduction Course Introduction Module 01 - The Process of Auditing Information Systems Lesson 1: Management of the Audit Function Organization of the

More information