Cloud Security and Data Protection
|
|
- Harvey Todd
- 8 years ago
- Views:
Transcription
1 Cloud Security and Data Protection Cloud Strategy Partners, LLC Sponsored by: IEEE Educational Activities and IEEE Cloud Computing
2 Course Presenter s Biography This IEEE Cloud Computing tutorial has been developed by Cloud Strategy Partners, LLC. Cloud Strategy Partners, LLC is an expert consultancy firm that specializes in Technology and Strategy relating to Cloud Computing. IEEE elearning Library Cloud Security and Data Protection Transcript pg. 2 / 19
3 Course Summary Security is a complex domain and involves multiple aspects of the infrastructure, systems and applications operation as well as user access management. In this tutorial, we will begin with a review of some basics and next will go with cloud specific security aspects. In the basics we will cover the meanings of Security, and Trust, which are different. We will also look at a Security Services Lifecycle Management (SSLM) model. Finally, we will turn to specifics about Security in Cloud Computing. Note we will apply these via a brief analysis of the AWS and Microsoft Azure security. IEEE elearning Library Cloud Security and Data Protection Transcript pg. 3 / 19
4 Outline Security is a complex domain and involves multiple aspects of the infrastructure, systems and applications operation as well as user access management. We will start with some basics and next will go with cloud specific security aspects. In the basics we will cover the meanings of Security, and Trust, which are different. We will look at a Security Services Lifecycle Management (SSLM) model. Then we will turn to specifics about Security in Cloud Computing We will apply these via a brief analysis of the AWS and Microsoft Azure security. We will not discuss access control and cloud federation issues in detail in this tutorial. This is a subject for a separate tutorial. Responsibilities Split in IaaS, PaaS, SaaS We have seen this illustration in previous Lessons. No let us apply this illustration to Security. This illustration contrasts the different deployment models on the left, a traditional physical server deployment packaged product, and the on the right the three deployment models for Cloud, namely, IaaS, PaaS, SaaS. The responsibilities of the Customer and the Provider are different as one goes from Packaged product to the various models on Cloud. As shown for packaged product the entire stack is the responsibility of the User, from the hardware to the systems software to the application. When deploying on Cloud the responsibility shifts more and more from the User to the Provider as the higher levels of abstraction are used. As one can see in the SaaS model where the User is accessing a completed application, their responsibility is reduced to looking after only their Data. Security management responsibilities split between Customer and Provider for IaaS, PaaS, SaaS service models in a similar manner. In all cases, there is a large underlying Security obligation on the Provider. They are responsible for physical security of the Cloud datacenters as well as Updating firmware and software for platform and for customer management components. They are also responsible for underlying Storage and Networking security. For example Physical Network Firewalls and Intrusion Prevention is a responsibility of the cloud provider. Usually the Cloud Provider will seek certification and keep ongoing compliance of the Cloud platform itself. IEEE elearning Library Cloud Security and Data Protection Transcript pg. 4 / 19
5 That said, Certification and compliance of the cloud platform doesn t imply security and compliance of the customer controlled components. Following the above diagram, the components which the User is responsible for with respect to Deployment, they are also responsible for with respect to Security. It can be seen then that End to End Cloud Security is a shared responsibility between the Cloud Operator and the Cloud User. Security Technologies in Cloud: Network and Service Related Security Protocols This diagram in the Slide illustrates the highly inter-related character of security services and mechanisms. Please note several distinct Security mechanisms in this diagram. At the bottom there is security for Physical Resources and the Network. There is the Cloud Platform security. There is the application and data security. And across these there is the federated access and delivery infrastructure. These layers are mutually dependent and connected to each other over a variety of connectivity protocols. The diagram shown how logically Data are transferred between cloud layers, and it also shows how Data are communicated over secure network and messaging protocols such as IPSec/VPN and HTTPS/TLS/SSL. Authentication and Authorization is present with each inter-service and inter-device (both physical and virtual) communication, at higher layer it can use also Security Token Service (STS) and SAML based security tokens. TCP/IP Protocol Stack and Network Security Protocols This slide shows the larger TCP/IP Protocol Stack and Network Security protocols Cloud Computing follows this model for both networking and for security. So much of the knowledge one may have about networking and security transfers to the Cloud domain. On the other hand, Cloud introduces many complications (mostly due to virtualization) and this adds complexity to security considerations. What Should you Know about Security While the Password is a basis for secure access it is not enough to secure your applications and services. There is whole stack of network and infrastructure or platform security services and mechanisms which need to be applied in a consistent way to ensure high system dependability and availability. IEEE elearning Library Cloud Security and Data Protection Transcript pg. 5 / 19
6 Dependability means the extent to which you can trust or depend on the system We have seen how much the different cloud security layers and mechanisms must communicate with each other. Much of the Basis for Cloud Security is to have secure communication and data transfers in the security protocols and security mechanisms themselves. Security is an overloaded term and may mean different aspects Network/communication Security -Data Security Application Security -Operation Security System Security What kind of data to protect Application Data Personal Data (User ID, personal information) Infrastructure management data Data security must be considered for at least 3 aspects Data in transfer (Communication) Data in-rest (Stored) Data at run-time (Processed) We must also understand the Relations between Security and Trust Comment to Technical trust -Technical trust can only Yes or No Trusted or Not Trusted -Social or reputation based trust may have continuous value such as from 0 to 1 Different Sides of Security and Trust The modern paradigm of remote distributed services and online/downloadable digital content provisioning makes security and trust relations between User and Provider more complex The User and Service Provider are the two actors concerned with own Data/Content security and each other System/Platform trustworthiness Two other aspects of security/trust Data stored vs Data accessed/processed System Idle vs Active (running User session) Trust Relations Between Provider and Customer Now we move to more complex picture of trust relations between the User and the Provider The illustration in the slide shows the way to think about this. On the left we see a Trust Domain which is associated with the User. You can see in this Trust domain there is the User client system, the User Data, and the User Identity Credentials (which may be a password or may be more) IEEE elearning Library Cloud Security and Data Protection Transcript pg. 6 / 19
7 On the right we see a Trust Domain which is associated with the Provider. You can see in this Trust domain there is the cloud platform, the data stored by the Provider, the Application running on the Provider cloud, and the data controlled by the application. These two domains establish a Trust Relationship between them which is bi-lateral as shown for example the user trusts that the Cloud is in fact the cloud which the User thinks it is, and the Cloud trusts that the User is the User which is represented to the Cloud. Usually the User trusts the Provider through mechanisms including Secure DNS and Certificates. Usually the Provider trusts the User through a Passwords mechanism. Cloud, OS, Network and Applications Trust Layers This slide provides even deeper insight into security relations between components and layers of the cloud based services and user system or application. In this diagram the Provider is on the left, and the User is on the right. The Provider (cloud platform) employs a security model known as a Trusted Computing Base (TCB) This means it has a root of trust tied originally to the Hardware. All layers above the hardware including the network, the cloud software itself, and the Virtual Machine mechanisms (hypervisors) are tied back to this root of trust. This is why it is called a Trusted Computing Base approach. The software mechanism by which this trust is asserted is usually a Certificate. The User side (application) employs a different trust model, referred to as OSI/Internet security. TCB cant be used because the hardware in fact the total user system is in the wild and subject to any sorts of modifications or endless variety. So a system based on credentials (secrets) are used to establish trust. These are usually in the form of passwords but can be keys, biometrics, challenge/response, etc. This bilateral trust between Provider and User domain is implemented/used in Client/server and Service Oriented Architecture and in OS and hypervisor run-time. A secure communications channel is set up (as illustrated) using an encrypted channel. This can be done using any number of means but is usually a form of Virtual Private Network (VPN). A protocol is followed between the two domains a the bilateral trust is established for a particular task at hand (like running the application on the cloud). This is called a Security Context. IEEE elearning Library Cloud Security and Data Protection Transcript pg. 7 / 19
8 Cloud Computing Security Challenges Cloud Computing adds a number of challenges to Security. Cloud is different because it runs modules which are dynamically provisioned using automation. Most often, clouds utilize virtualization in compute, in network, and in storage, all of which add additional levels of complexity to securing a cloud. Starting with the most basic level, Cloud security infrastructure should provide a framework for dynamically provisioned cloud security services and infrastructure. As we discussed at the last slide, these services must be based on the hardware/platform based Root of trust. This is partly realized by the SSH secret keys generation during account creation at AWS and Microsoft Azure what you should have learned from hands on labs. More strict security bootstrapping between provider and user domains should use TCB models and mechanisms implemented in the Trusted Computing Group Architecture (TCGA) and Trusted Platform Module (TPM) Common Cloud Security Model In the first days of using Cloud Computing, these were no generally agreed best practices for implementing security. These were some areas of incompatibility between the expected security model on the User side (client server or SOA) and the security model on the Provider side (kernel based OS and hypervisor security mechanisms). A Common Cloud Security Model has been developed which embodies a best practice, now that there are more commonalities in the use cases of Cloud Computing and the way that Public and Private cloud work.. First, on the Cloud side, there is a known SLA and Provider based security model SLA between provider and user defines the provider responsibility and guarantees Providers undergo certification of their cloud infrastructure The Customer/User must trust the Provider Access from the User to the Provider uses VPN and SSH keys which are generated for user infrastructure/vms Simple access control can extended with the Federated Identity Management There is not an easy integration with legacy customer/tenant infrastructure and physical resources IEEE elearning Library Cloud Security and Data Protection Transcript pg. 8 / 19
9 Cloud Environment and Issues to be Addressed Now let us take a look at the Provider (Cloud) side, and understand what issues we must address. At the root of most of the challenges is that the Cloud utilizes heavily Virtualised services and environment There is heavily automated On-demand provisioning and dynamic scalability There is the notion of the multi-tenant application. Here, we have organizational notions in the sharing of the applications, for example a company or organization is the master subscriber, within that there are departments, then within that there are actual Users (people who are employees, or students, or members). Actual application execution as well as actual storage is occurring in changing (uncontrolled) environments, which vary widely from one cloud implementation to another Simply encrypting is not a solution as this will often break indexing and searching. Index-able/Searchable encryption is still a research project. Finally the whole idea of bootstrapping (Trusted Computing Base approach) all the way to include the customer trust domain is not usually possible. General Requirements to Cloud Security Infrastructure What do people ask for when expecting comprehensive Cloud security? Data protection during all stages Access control infrastructure virtualization and dynamic provisioning Security services lifecycle management, Security context management Trust and key management SLA management Security Services Lifecycle Management Model (SSLM) Both Services Lifecycle Management (SLM) and Security Services Lifecycle Management (SSLM) models are implemented as a part of cloud services provisioning platform and have most of stages automated. Security services must be bound to the main services they protect and bootstrapped to both cloud platform and customer side security services Registration & Runtime Binding & Synchronization specifically target such scenarios as 1) Complex multi-component services provisioning 2) Large volume of data transfer, data partitioning 3) Services or processes failure 4) Services upgrade, elasticity, re-engineering IEEE elearning Library Cloud Security and Data Protection Transcript pg. 9 / 19
10 To avoid having to repeat a full services provisioning process to establish a Trusted Computing Base. Relation Between SSLM/SLM Stages and Supporting General and Security Mechanisms This table shows what security mechanisms are required/mandatory or recommended/optional at each SSLM stage. As we discussed on the previous slide GRI (Generic Reservation ID) is important and creates a basis for all services linking, services binding to provisioning session and runtime environment, and the whole process traceability SLA negotiated is done at the initial stage, needs to be monitored during operation, and it is mandatory to be checked after services are terminated. Practical Security Services and Mechanisms Used in Cloud There are a number of Practical Security Services and Mechanisms which are Used in Cloud The most common is the use of the Virtual Private Network (VPN) Virtual Private Cloud (VPC) for creating virtual cloud infrastructure for each customer. Within this, one can use the Secure Shell (SSH) protocol, or the HTTPS and TLS/SSL protocols for secure web access. Each of these are based on the well-known Public Key Infrastructure (PKI) that provides a basis for each of these. PKI is used to generate keys for the encryption. Higher up the stack, we use Access control, that includes Authentication and Authorization, and is supported by Identity Management. This is tied into Identity Management service for user accounts management, which could be standalone to the Cloud, or tied in with Federated Access Control and Federated Identity Management. Make sure one has Key escrow to ensure restoration of encrypted data in case key held by data owner is lost! Data Lifecycle Management Model Once the access issues are solved, one turns to Data protection In the Cloud, Data Protection must be provided for the whole data lifecycle The generalized Data Lifecycle Management (DLM) model contains the following stages that are typically present in majority of user applications: Data collection, registration and storage Data filtering and pre-processing Data processing, data analytics Data visualization, data archiving Data delivery, data sharing IEEE elearning Library Cloud Security and Data Protection Transcript pg. 10 / 19
11 Data Security and Data Lifecycle Management A good Data Protection scheme pays attention to Data Security in the context of Data Lifecycle Management Data security solutions and supporting infrastructure should address a number of problems related to the Data lifecycle These are enumerated in the Slide Data security services and mechanisms should address the following functionality related to different data management activities These are enumerated in the Slide Data Protection in Cloud There are many tools to address these requirements of Data Protection in Cloud Data transfer between data source and cloud system or cloud storage. Data encryption Data replication and migration. Data restoration. Data availability. Secure data storage. These are each described in detail on the Slide Cryptographically Enforced Data-Centric Security Many advocates of Data Protection suggest that aggressive use of Cryptography for data at rest, for data in motion is one of the only ways to ensure Security. There are two large challenges of Cryptographically Enforced Data-Centric Security. One is that data must be decrypted to be processed. This makes it practically unfeasible to achieve full protection of data at all infrastructure layers and during the whole data lifecycle. Also, many applications want to use large footprints of the data to do indexing and search, which again requires large quantities of the data to be decrypted to be indexed or searched. Is there a way for data to remain encrypted all the time? Recent achievement in developing research has yielded the homomorphic encryption by Boneh and Waters (2007) which made it theoretically possible to process encrypted data. There are other methods of working directly with encrypted data as well, for example performing encrypted data comparison, subset queries and arbitrary conjunction of such queries. So far, there are real challenges with encrypting as much of one s data as is practical and realizing the times when it is unencrypted are generating risk. IEEE elearning Library Cloud Security and Data Protection Transcript pg. 11 / 19
12 Cloud Security Standards: NIST and US Federal A number of standards and Best Practices documents are addressing Cloud Security in general. Although primarily developed for USA, NIST standards are worldwide accepted. NIST is known for their excellent definition of Cloud Computing technology and Cloud Computing Reference Architecture specified in the documents NIST SP , A NIST definition of cloud computing, and NIST SP , Cloud Computing Reference Architecture, v1.0. The full set of the cloud related standards includes those detailed on the Slide. Cloud Security and Big Data Security Standards and Business Continuity Planning (BCP) A number of standards and Best Practices documents are addressing Cloud Security in general. Recently with the emergence of Big Data, a number of standards are also published addressing specifically Data Security. Cloud Security Alliance is an authoritative body with wide international membership that provides wide research and best practices collection in cloud security and currently also covering Big Data About cloud and Big Data reports ENISA is a European body that is recognized for their research and activity on cyber infrastructure security with focus on risk and threats analysis. Provided analysis in 2010 and recently published report Overview of current and emerging cyber-threats that analyses both threats to cloud computing and use of cloud computing for new types and scales of attacks. NIST Cloud Computing Security Reference Architecture (NIST SP Draft) Based on NIST Cloud Computing Reference Architecture NIST SP (CCRA). The standard provides detailed analysis of the security architecture components for each of cloud services provisioning stakeholders Cloud Consumer Cloud Provider Cloud Broker Cloud Auditor Cloud Carrier IEEE elearning Library Cloud Security and Data Protection Transcript pg. 12 / 19
13 The security infrastructure needs to be integrated over all cooperating members/stakeholders and Includes the following steps 1 Categorise 2 Identify security requirements 3 Select architecture 4 Assess 5 Authorise 6 Monitor Cloud Services CSA3.0 Security Guidance for Critical Area of Focus in Cloud Computing The document uses CSA Cloud Security Alliance Cloud Services Model that is used to map the security concerns to the cloud services and functional components in different cloud services models IaaS, PaaS, SaaS. Note that CSA splits concerns into two Domains one is Governance, one is Operational. The slide details the components of each. CSA Top Ten Big Data Security and Privacy Challenges Big Data motivate more detailed look at the data security and privacy protection challenges and suggested solutions which are applicable to general data protection in cloud taking into account that that due to scale of Big Data the Big Data applications are implemented in cloud and rely on cloud infrastructure and platform services. CSA Top Ten are defined for the following functional components 1 -Big Data sources that may include sensor, devices, large industrial objects as well as web, network and human activity 2 Data input and data provenance 3 Data processing environment 4 Cloud based Big Data infrastructure 5 Data storage (cloud based) 6 Data output and visualization CSA Top Ten Big Data Security Challenges by Functional Groups CSA details their Top Ten Big Data Security Challenges by Functional Groups Infrastructure Security Access Control and Policy Data Privacy and Confidentiality Data Management The proposed analysis of the security and privacy challenges includes the following sections: 1. Use cases definition 2. Modeling: formalizing a threat model that covers most of the cyber-attack or data-leakage scenarios 3. Analysis: finding tractable solutions based on the threat model IEEE elearning Library Cloud Security and Data Protection Transcript pg. 13 / 19
14 4. Implementation: implementing the solution in existing infrastructures Amazon Web Services Security Model Now we turn to look at the security model as it is implemented in Amazon Web Services. The slide illustrates the three main part of the security aspects/solutions/measures that they addressed: Cloud infrastructure (physical facilities, compliance, and platform) Cloud Services (cloud software) Customer applications Security is declared as one of critical importance to AWS cloud that is targeted to protect customer information and data from integrity compromise, leakage, accidental or deliberate theft, and deletion. The AWS cloud platform design follows best practices for secure software design and includes formal internal design review, threats analysis, risk assessment, as well as regular penetration testing. AWS obtained most of the industry security and compliance certification. AWS Security Shared Responsibility Model As discussed earlier in this lesson, there is a Shared Responsibility Model that splits responsibility for the security of different layers and components between a provider and a customer or tenant. AWS follows this approach, clearly enabling the customer to do their share in the joint responsibility of the Cloud Service Provider and customer. The Cloud Service Provider ensures the cloud infrastructure security and compliance, and provides necessary security services. The Customer/user ensures data security, applications security, correct use of the cloud platform. In the cloud, Security is a shared responsibility, it is no longer possible to provide a platform within which one can deploy any sloppy application and rely on the platform and network to make it secure. This is because of the complexity and scale-out of cloud, security constraints would hinder the ability to construct a large scale out cloud and thus, some of the responsibility is pushed upwards into the parts which scale, including the application itself. IEEE elearning Library Cloud Security and Data Protection Transcript pg. 14 / 19
15 Example: Security Responsibility Sharing in AWS IaaS Infrastructure Services This slide provides an illustration of the Shared Responsibility Model that splits responsibility for the security of different layers and components between a provider and a customer or tenant specifically for AWS. One can see the specific recommendations made by Amazon. This illustration shows the shared responsibilities in an IaaS context. For other cloud service models PaaS and SaaS the responsibility of AWS goes up to OS, network and firewall for PaaS, and also includes the application platform and container for SaaS. However, the responsibility for data always remains with the customer. AWS Security Recommendations: Customer Side Now we consider the recommended security best practices at each layer Recommended security methods for customer cloud infrastructure include: Use Virtual Private Cloud (VPC) to create a secure environment for your cloud services in AWS Use security zoning and network segmentation based on security groups, Network Access Control Lists, host based firewalls Strengthen network security and ensure secure access for users and applications. Create threats protection layer in traffic flow and ensure protection against Denial of Service (DoS) attacks. The slide details a longer list of security best practices Security in Amazon EC2 and S3 AWS implements the following security measures to protect the main cloud platform components and services. Amazon compute (EC2) Security implements: Multiple levels of security including Guest Operating System, Firewall, API to manage VM instances Hypervisor that is a customized version of the Xen hypervisor allows running processes in four privilege modes: host OS is executed Ring 0; guest OS runs in Ring 1, applications run in Ring 3. Instances isolation is also provided by hypervisor that forwards all communication for instances via virtual firewall that resides in the hypervisor layer. Instant SSH keys generation for individual users and groups. Amazon Simple Storage Service (Amazon S3) Security S3 storage is accessed via SSL protocol Data security in rest is provided by encryption and multi-layer physical security AWS adopts a secure and reliable technique for storage device decommissioning. IEEE elearning Library Cloud Security and Data Protection Transcript pg. 15 / 19
16 AWS Identity and Access Management (IAM) AWS Identity and Access Management IAM provides functionality to securely control access to AWS services and resources for individual users and groups by defining individual and group permissions and policies. Examples of using AWS IAM Fine-grained access control to AWS resources Manage access control for mobile applications with Web Identity Providers Integrate with your corporate directory Multi-Factor Authentication for highly privileged users Example: Multi-layer Security in AWS This slide illustrates an example of how an application works with AWS to explicitly enable security at multiple levels We are looking at the sample application topology we worked with earlier in this Lesson, What is shown is for each of the major application tiers, eg, Load Balancer, web tier, caching tier, Database Tier, AWS needs to be specifically configured to allow certain traffic to pass (and the remainder blocked). AWS will not automatically over-ride what gets set up in deployment. It is very easy to make wide open security groups in AWS, which is why it is a good idea to check and configure each tier. Microsoft Azure Cloud Security Microsoft Azure demonstrates no less advanced security than AWS. Microsoft has long term experience in developing security applications. Microsoft Secure software Development Lifecycle is widely respected and used best practice. Azure cloud design claims to follow these practices in the cloud platform security design. Of course Azure also assumes the Shared Responsibility Model that splits responsibility for the security of different layers and components between a provider and a customer or tenant Three components of the cloud environment security: Cloud infrastructure security Datacenter security, trustworthy design; secure operational procedures Certification and compliance; Cloud platform security services Serving both platform security and integration with the customer applications Access control, security policies, customer controlled security services Data protection: cloud platform and user controlled; Customer/tenants applications security IEEE elearning Library Cloud Security and Data Protection Transcript pg. 16 / 19
17 Microsoft Azure Cloud Security Services Azure Security Services from both the customer s and providers operational perspectives: Federated identity and access management based on Microsoft accounts or organizational accounts, enabled by Azure Active Directory Service (AADS) Use of mutual SSL authentication. Component isolation through a layered environment. Virtual Machine state maintenance and configuration integrity. Storage redundancy to minimize the impact of hardware failures. Monitoring, logging, and reporting on administrative actions. Built-in data protection. Control access to customer data and applications Protect data in transit and at rest Dedicated network connectivity with Azure ExpressRoute Microsoft Azure Cloud Security Design Principles Microsoft has detailed several of its key Cloud Security Design Principles. It is likely that AWS implements something like this as well 1. SSL mutual authentication for internal control traffic 2. Certificate and private key management 3. Least privilege principle is applied to running customer service on cloud 4. Access control model in Microsoft Azure Storage -different levels of security. 5. Isolation of hypervisor, Root OS, and Guest VMs 6. Isolation of Fabric Controller (FC) 7. Packets filtering is implemented at the level of Hyper-V hypervisor 8. VLANs and network segmentation provides isolation between segments 9. Isolation of customer access 10. Deletion of Data in Microsoft Azure IEEE elearning Library Cloud Security and Data Protection Transcript pg. 17 / 19
18 Microsoft Azure Security Controls and Capabilities Azure then can deliver a Wide spectrum of Security Controls and Capabilities Zero standing privileges Isolation Azure Virtual Networks and Encrypted communications Data encryption Identity and access Patching and Antivirus/Antimalware protection Intrusion detection and prevention systems Example: AWS Cloud Certification and Compliance Finalizing this tutorial we will give an example of the certification and compliance of AWS and Microsoft Azure clouds. You can assume that they almost equal what give a good basis for integrating services and resources from both platforms in a variety of possible applications. This slide lists the AWS compliance guidelines and standards. Example: Microsoft Azure Certification and Compliance Similar to AWS, here is the Microsoft Azure certification and compliance. You can see it is basically the same as the AWS compliance guidelines and standards Wrap Up and Take Away Security is complex domain and Cloud Security is bringing even more complexity factors to understanding and developing secure cloud based applications and consistent cloud security services. Knowing the basic security and trust management models is important for understanding cloud security and cloud security services Security of the cloud platform is one of key concern areas for cloud provider, first, to protect their datacenter, and second, to provide competitive quality of service to their customers Cloud Security Services Lifecycle Model (SSLM) provides a basis for consistent security services design and integration Data protection in cloud must be provided at all cloud functional layers, across multiple domains, and along the whole data lifecycle Cloud security and data protection is an active standardization area. Major standardization bodies on cloud security are NIST, CSA, ENISA followed by industry related bodies Standardization is especially important for ensuring interoperability and compliance of security services AWS and Microsoft Azure clouds demonstrate well IEEE elearning Library Cloud Security and Data Protection Transcript pg. 18 / 19
19 developed cloud platform with the security in-design supported by numerous security certifications and compliances Three main cloud security domains: (1) cloud infrastructure and platform security; (2) cloud security services; (3) customer applications security IEEE elearning Library Cloud Security and Data Protection Transcript pg. 19 / 19
DISTRIBUTED SYSTEMS [COMP9243] Lecture 9a: Cloud Computing WHAT IS CLOUD COMPUTING? 2
DISTRIBUTED SYSTEMS [COMP9243] Lecture 9a: Cloud Computing Slide 1 Slide 3 A style of computing in which dynamically scalable and often virtualized resources are provided as a service over the Internet.
More informationLecture 02b Cloud Computing II
Mobile Cloud Computing Lecture 02b Cloud Computing II 吳 秀 陽 Shiow-yang Wu T. Sridhar. Cloud Computing A Primer, Part 2: Infrastructure and Implementation Topics. The Internet Protocol Journal, Volume 12,
More informationTitle: Cloud Security, Access Control and Compliance
HPCS 2015 TUTORIAL IV Title: Cloud Security, Access Control and Compliance http://www.uazone.org/demch/presentations.html hpcs2015tutorial-cloud-security-access-control-compliance-v02.pdf Yuri Demchenko
More informationSimone Brunozzi, AWS Technology Evangelist, APAC. Fortress in the Cloud
Simone Brunozzi, AWS Technology Evangelist, APAC Fortress in the Cloud AWS Cloud Security Model Overview Certifications & Accreditations Sarbanes-Oxley (SOX) compliance ISO 27001 Certification PCI DSS
More informationBuilding Energy Security Framework
Building Energy Security Framework Philosophy, Design, and Implementation Building Energy manages multiple subsets of customer data. Customers have strict requirements for regulatory compliance, privacy
More informationSecurity Issues in Cloud Computing
Security Issues in Computing CSCI 454/554 Computing w Definition based on NIST: A model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources
More informationCloud Courses Description
Courses Description 101: Fundamental Computing and Architecture Computing Concepts and Models. Data center architecture. Fundamental Architecture. Virtualization Basics. platforms: IaaS, PaaS, SaaS. deployment
More informationCloud Security Overview
UT DALLAS Erik Jonsson School of Engineering & Computer Science Cloud Security Overview Murat Kantarcioglu Outline Current cloud security techniques Amazon Web services Microsoft Azure Cloud Security Challengers
More informationA Survey on Cloud Security Issues and Techniques
A Survey on Cloud Security Issues and Techniques Garima Gupta 1, P.R.Laxmi 2 and Shubhanjali Sharma 3 1 Department of Computer Engineering, Government Engineering College, Ajmer Guptagarima09@gmail.com
More informationCloud Courses Description
Cloud Courses Description Cloud 101: Fundamental Cloud Computing and Architecture Cloud Computing Concepts and Models. Fundamental Cloud Architecture. Virtualization Basics. Cloud platforms: IaaS, PaaS,
More informationPCI COMPLIANCE ON AWS: HOW TREND MICRO CAN HELP
solution brief PCI COMPLIANCE ON AWS: HOW TREND MICRO CAN HELP AWS AND PCI DSS COMPLIANCE To ensure an end-to-end secure computing environment, Amazon Web Services (AWS) employs a shared security responsibility
More informationGoodData Corporation Security White Paper
GoodData Corporation Security White Paper May 2016 Executive Overview The GoodData Analytics Distribution Platform is designed to help Enterprises and Independent Software Vendors (ISVs) securely share
More informationSECURITY CONCERNS AND SOLUTIONS FOR CLOUD COMPUTING
SECURITY CONCERNS AND SOLUTIONS FOR CLOUD COMPUTING 1. K.SURIYA Assistant professor Department of Computer Applications Dhanalakshmi Srinivasan College of Arts and Science for Womren Perambalur Mail: Surik.mca@gmail.com
More informationOpen Data Center Alliance Usage: Provider Assurance Rev. 1.1
sm Open Data Center Alliance Usage: Provider Assurance Rev. 1.1 Legal Notice This Open Data Center Alliance SM Usage:Provider Assurance is proprietary to the Open Data Center Alliance, Inc. NOTICE TO USERS
More informationOutlook. Corporate Research and Technologies, Munich, Germany. 20 th May 2010
Computing Architecture Computing Introduction Computing Architecture Software Architecture for Outlook Corporate Research and Technologies, Munich, Germany Gerald Kaefer * 4 th Generation Datacenter IEEE
More informationCourse 20533: Implementing Microsoft Azure Infrastructure Solutions
Course 20533: Implementing Microsoft Azure Infrastructure Solutions Overview About this course This course is aimed at experienced IT Professionals who currently administer their on-premises infrastructure.
More informationImplementing Microsoft Azure Infrastructure Solutions
Course Code: M20533 Vendor: Microsoft Course Overview Duration: 5 RRP: 2,025 Implementing Microsoft Azure Infrastructure Solutions Overview This course is aimed at experienced IT Professionals who currently
More informationCloud Computing Governance & Security. Security Risks in the Cloud
Cloud Computing Governance & Security The top ten questions you have to ask Mike Small CEng, FBCS, CITP Fellow Analyst, KuppingerCole This Webinar is supported by Agenda What is the Problem? Ten Cloud
More informationChapter 11 Cloud Application Development
Chapter 11 Cloud Application Development Contents Motivation. Connecting clients to instances through firewalls. Chapter 10 2 Motivation Some of the questions of interest to application developers: How
More informationMicrosoft SharePoint Architectural Models
Microsoft SharePoint This topic is 1 of 5 in a series Introduction to Fundamental SharePoint This series is intended to raise awareness of the different fundamental architectural models through which SharePoint
More informationMOC 20413C: Designing and Implementing a Server Infrastructure
MOC 20413C: Designing and Implementing a Server Infrastructure Course Overview This course provides students with the knowledge and skills to provide an enterprise solution that supports manual and automated
More informationCloud Essentials for Architects using OpenStack
Cloud Essentials for Architects using OpenStack Course Overview Start Date 18th December 2014 Duration 2 Days Location Dublin Course Code SS906 Programme Overview Cloud Computing is gaining increasing
More informationTop 10 Risks in the Cloud
A COALFIRE PERSPECTIVE Top 10 Risks in the Cloud by Balaji Palanisamy, VCP, QSA, Coalfire March 2012 DALLAS DENVER LOS ANGELES NEW YORK SEATTLE Introduction Business leaders today face a complex risk question
More informationSecuring your Virtual Datacenter. Part 1: Preventing, Mitigating Privilege Escalation
Securing your Virtual Datacenter Part 1: Preventing, Mitigating Privilege Escalation Before We Start... Today's discussion is by no means an exhaustive discussion of the security implications of virtualization
More informationDeploy Remote Desktop Gateway on the AWS Cloud
Deploy Remote Desktop Gateway on the AWS Cloud Mike Pfeiffer April 2014 Last updated: May 2015 (revisions) Table of Contents Abstract... 3 Before You Get Started... 3 Three Ways to Use this Guide... 4
More informationNETWORK ACCESS CONTROL AND CLOUD SECURITY. Tran Song Dat Phuc SeoulTech 2015
NETWORK ACCESS CONTROL AND CLOUD SECURITY Tran Song Dat Phuc SeoulTech 2015 Table of Contents Network Access Control (NAC) Network Access Enforcement Methods Extensible Authentication Protocol IEEE 802.1X
More informationCloud Security Introduction and Overview
Introduction and Overview Klaus Gribi Senior Security Consultant klaus.gribi@swisscom.com May 6, 2015 Agenda 2 1. Cloud Security Cloud Evolution, Service and Deployment models Overview and the Notorious
More informationBuilding Secure Cloud Applications. On the Microsoft Windows Azure platform
Building Secure Cloud Applications On the Microsoft Windows Azure platform Contents 1 Security and the cloud 3 1.1 General considerations 3 1.2 Questions to ask 3 2 The Windows Azure platform 4 2.1 Inside
More informationDesigning and Implementing a Server Infrastructure
Page 1 of 7 Overview This 5-day instructor-led course provides you with the skills and knowledge needed to plan, design, and deploy a physical and logical Windows Server 2012 Active Directory Domain Services
More informationKeyword: Cloud computing, service model, deployment model, network layer security.
Volume 4, Issue 2, February 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com An Emerging
More information319 MANAGED HOSTING TECHNICAL DETAILS
319 MANAGED HOSTING TECHNICAL DETAILS 319 NetWorks www.319networks.com Table of Contents Architecture... 4 319 Platform... 5 319 Applications... 5 319 Network Stack... 5 319 Cloud Hosting Technical Details...
More informationFuture of Cloud Computing. Irena Bojanova, Ph.D. UMUC, NIST
Future of Cloud Computing Irena Bojanova, Ph.D. UMUC, NIST No Longer On The Horizon Essential Characteristics On-demand Self-Service Broad Network Access Resource Pooling Rapid Elasticity Measured Service
More informationCloud Security Through Threat Modeling. Robert M. Zigweid Director of Services for IOActive
Cloud Security Through Threat Modeling Robert M. Zigweid Director of Services for IOActive 1 Key Points Introduction Threat Model Primer Assessing Threats Mitigating Threats Sample Threat Model Exercise
More informationSecurity Issues in Cloud Computing
Security Issues in Cloud Computing Dr. A. Askarunisa Professor and Head Vickram College of Engineering, Madurai, Tamilnadu, India N.Ganesh Sr.Lecturer Vickram College of Engineering, Madurai, Tamilnadu,
More informationTHE BLUENOSE SECURITY FRAMEWORK
THE BLUENOSE SECURITY FRAMEWORK Bluenose Analytics, Inc. All rights reserved TABLE OF CONTENTS Bluenose Analytics, Inc. Security Whitepaper ISO 27001/27002 / 1 The Four Pillars of Our Security Program
More informationCloud Computing Security Requirements
Issues in Cloud Security Private, Public, Hybrid Abstract This white paper discusses the major computer security issues confronting an organization when moving to the cloud. Even for small companies, migrating
More informationSecurity Overview Enterprise-Class Secure Mobile File Sharing
Security Overview Enterprise-Class Secure Mobile File Sharing Accellion, Inc. 1 Overview 3 End to End Security 4 File Sharing Security Features 5 Storage 7 Encryption 8 Audit Trail 9 Accellion Public Cloud
More informationSecurity & Trust in the Cloud
Security & Trust in the Cloud Ray Trygstad Director of Information Technology, IIT School of Applied Technology Associate Director, Information Technology & Management Degree Programs Cloud Computing Primer
More informationDesigning and Implementing a Server Infrastructure
Course 20413C: Designing and Implementing a Server Infrastructure Page 1 of 7 Designing and Implementing a Server Infrastructure Course 20413: 4 days; Instructor-Led Introduction This 4-day instructor-led
More informationHow To Protect Your Cloud Computing Resources From Attack
Security Considerations for Cloud Computing Steve Ouzman Security Engineer AGENDA Introduction Brief Cloud Overview Security Considerations ServiceNow Security Overview Summary Cloud Computing Overview
More informationSecuring The Cloud. Russ Fellows, Managing Partner - Evaluator Group Inc.
Securing The Cloud Russ Fellows, Managing Partner - Evaluator Group Inc. SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and individual members may
More informationWhite Paper How Noah Mobile uses Microsoft Azure Core Services
NoahMobile Documentation White Paper How Noah Mobile uses Microsoft Azure Core Services The Noah Mobile Cloud service is built for the Microsoft Azure platform. The solutions that are part of the Noah
More informationGE Measurement & Control. Cyber Security for NEI 08-09
GE Measurement & Control Cyber Security for NEI 08-09 Contents Cyber Security for NEI 08-09...3 Cyber Security Solution Support for NEI 08-09...3 1.0 Access Contols...4 2.0 Audit And Accountability...4
More informationClouds on the Horizon Cloud Security in Today s DoD Environment. Bill Musson Security Analyst
Clouds on the Horizon Cloud Security in Today s DoD Environment Bill Musson Security Analyst Agenda O Overview of Cloud architectures O Essential characteristics O Cloud service models O Cloud deployment
More informationSECURE CLOUD COMPUTING
Outline SECURE CLOUD COMPUTING Introduction (of many buzz words) References What is Cloud Computing Cloud Computing Infrastructure Security Cloud Storage and Data Security Identity Management in the Cloud
More informationSecurity Best Practices for Microsoft Azure Applications
Security Best Practices for Microsoft Azure Applications Varun Sharma Principal Security Engineer, Information Security & Risk Management (ISRM), Microsoft IT Service Lines Application Security Infrastructure
More informationChapter 1: Introduction
Chapter 1 Introduction 1 Chapter 1: Introduction 1.1 Inspiration Cloud Computing Inspired by the cloud computing characteristics like pay per use, rapid elasticity, scalable, on demand self service, secure
More informationHow to Secure Infrastructure Clouds with Trusted Computing Technologies
How to Secure Infrastructure Clouds with Trusted Computing Technologies Nicolae Paladi Swedish Institute of Computer Science 2 Contents 1. Infrastructure-as-a-Service 2. Security challenges of IaaS 3.
More information05.0 Application Development
Number 5.0 Policy Owner Information Security and Technology Policy Application Development Effective 01/01/2014 Last Revision 12/30/2013 Department of Innovation and Technology 5. Application Development
More informationTufts University. Department of Computer Science. COMP 116 Introduction to Computer Security Fall 2014 Final Project. Guocui Gao Guocui.gao@tufts.
Tufts University Department of Computer Science COMP 116 Introduction to Computer Security Fall 2014 Final Project Investigating Security Issues in Cloud Computing Guocui Gao Guocui.gao@tufts.edu Mentor:
More informationImplementing Microsoft Azure Infrastructure Solutions 20533B; 5 Days, Instructor-led
Implementing Microsoft Azure Infrastructure Solutions 20533B; 5 Days, Instructor-led Course Description This course is aimed at experienced IT Professionals who currently administer their on-premises infrastructure.
More informationCOURSE 20413C: DESIGNING AND IMPLEMENTING A SERVER INFRASTRUCTURE
ABOUT THIS COURSE This 5 day course covers the knowledge and skills needed to provide an enterprise solution that supports manual and automated server installations in a physical and virtual environment
More informationDesigning and Implementing a Server Infrastructure
Course Code: M20413 Vendor: Microsoft Course Overview Duration: 5 RRP: 2,025 Designing and Implementing a Server Infrastructure Overview Get hands-on instruction and practice planning, designing and deploying
More informationCourse 20533B: Implementing Microsoft Azure Infrastructure Solutions
Course 20533B: Implementing Microsoft Azure Infrastructure Solutions Sales 406/256-5700 Support 406/252-4959 Fax 406/256-0201 Evergreen Center North 1501 14 th St West, Suite 201 Billings, MT 59102 Course
More informationSecuring The Cloud. Foundational Best Practices For Securing Cloud Computing. Scott Clark. Insert presenter logo here on slide master
Securing The Cloud Foundational Best Practices For Securing Cloud Computing Scott Clark Agenda Introduction to Cloud Computing What is Different in the Cloud? CSA Guidance Additional Resources 2 What is
More informationProactively Secure Your Cloud Computing Platform
Proactively Secure Your Cloud Computing Platform Dr. Krutartha Patel Security Engineer 2010 Check Point Software Technologies Ltd. [Restricted] ONLY for designated groups and individuals Agenda 1 Cloud
More informationNetwork Access Control and Cloud Security
Network Access Control and Cloud Security Overview Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 Jain@cse.wustl.edu Audio/Video recordings of this lecture are available at: http://www.cse.wustl.edu/~jain/cse571-14/
More informationDesigning and Implementing a Server Infrastructure
Course 20413C: Designing and Implementing a Server Infrastructure Course Details Course Outline Module 1: Planning Server Upgrade and Migration This module explains how to plan a server upgrade and migration
More informationDesigning and Implementing a Server Infrastructure 20413C; 5 days, Instructor-led
Designing and Implementing a Server Infrastructure 20413C; 5 days, Instructor-led Course Description Get hands-on instruction and practice planning, designing and deploying a physical and logical Windows
More informationIndustrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1
Industrial Network Security for SCADA, Automation, Process Control and PLC Systems Contents 1 An Introduction to Industrial Network Security 1 1.1 Course overview 1 1.2 The evolution of networking 1 1.3
More informationCloud security and OpenStack Primož Cigoj Laboratorij za odprte sisteme in mreže IJS-E5. www.kc-class.eu
Cloud security and OpenStack Primož Cigoj Laboratorij za odprte sisteme in mreže IJS-E5 www.kc-class.eu 1 1 Outline Cloud computing General overview Deployment and service models Security issues Threats
More informationHost Hardening. Presented by. Douglas Couch & Nathan Heck Security Analysts for ITaP 1
Host Hardening Presented by Douglas Couch & Nathan Heck Security Analysts for ITaP 1 Background National Institute of Standards and Technology Draft Guide to General Server Security SP800-123 Server A
More informationData Protection: From PKI to Virtualization & Cloud
Data Protection: From PKI to Virtualization & Cloud Raymond Yeung CISSP, CISA Senior Regional Director, HK/TW, ASEAN & A/NZ SafeNet Inc. Agenda What is PKI? And Value? Traditional PKI Usage Cloud Security
More informationCourse 20413: Designing and Implementing a Server Infrastructure
Course 20413: Designing and Implementing a Server Infrastructure Overview About this course Get hands-on instruction and practice planning, designing and deploying a physical and logical Windows Server
More informationA Study on Analysis and Implementation of a Cloud Computing Framework for Multimedia Convergence Services
A Study on Analysis and Implementation of a Cloud Computing Framework for Multimedia Convergence Services Ronnie D. Caytiles and Byungjoo Park * Department of Multimedia Engineering, Hannam University
More informationCloud Computing. Adam Barker
Cloud Computing Adam Barker 1 Overview Introduction to Cloud computing Enabling technologies Different types of cloud: IaaS, PaaS and SaaS Cloud terminology Interacting with a cloud: management consoles
More informationSharePoint 2013 Logical Architecture
SharePoint 2013 Logical Architecture This document is provided "as-is". Information and views expressed in this document, including URL and other Internet Web site references, may change without notice.
More informationCS 356 Lecture 25 and 26 Operating System Security. Spring 2013
CS 356 Lecture 25 and 26 Operating System Security Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control
More informationNetop Environment Security. Unified security to all Netop products while leveraging the benefits of cloud computing
Netop Environment Security Unified security to all Netop products while leveraging the benefits of cloud computing Contents Introduction... 2 AWS Infrastructure Security... 3 Standards - Compliancy...
More information70-414: Implementing a Cloud Based Infrastructure. Course Overview
70-414: Implementing a Cloud Based Infrastructure Course Overview This course covers will prepare the student for Exam 70-414: Implementing a Cloud Based Infrastructure. Students will learn how to create
More informationHow To Extend Security Policies To Public Clouds
What You Will Learn Public sector organizations without the budget to build a private cloud can consider public cloud services. The drawback until now has been tenants limited ability to implement their
More informationCloud Infrastructure Security
Cloud Infrastructure Security Dimiter Velev 1 and Plamena Zlateva 2 1 University of National and World Economy, UNSS - Studentski grad, 1700 Sofia, Bulgaria dvelev@unwe.acad.bg 2 Institute of Control and
More informationCloud Security considerations for business adoption. Ricci IEONG CSA-HK&M Chapter
Cloud Security considerations for business adoption Ricci IEONG CSA-HK&M Chapter What is Cloud Computing? Slide 2 What is Cloud Computing? My Cloud @ Internet Pogoplug What is Cloud Computing? Compute
More informationDesingning and Implementing a Server Infrastructure
About this Course Desingning and Implementing a Server Get hands-on instruction and practice planning, designing and deploying a physical and logical Windows Server 2012 R2 enterprise infrastructure in
More informationArchitecture Guidelines Application Security
Executive Summary These guidelines describe best practice for application security for 2 or 3 tier web-based applications. It covers the use of common security mechanisms including Authentication, Authorisation
More informationDeployment Guide: Unidesk and Hyper- V
TECHNICAL WHITE PAPER Deployment Guide: Unidesk and Hyper- V This document provides a high level overview of Unidesk 3.x and Remote Desktop Services. It covers how Unidesk works, an architectural overview
More informationCloud Computing: Opportunities, Challenges, and Solutions. Jungwoo Ryoo, Ph.D., CISSP, CISA The Pennsylvania State University
Cloud Computing: Opportunities, Challenges, and Solutions Jungwoo Ryoo, Ph.D., CISSP, CISA The Pennsylvania State University What is cloud computing? What are some of the keywords? How many of you cannot
More informationSPACK FIREWALL RESTRICTION WITH SECURITY IN CLOUD OVER THE VIRTUAL ENVIRONMENT
SPACK FIREWALL RESTRICTION WITH SECURITY IN CLOUD OVER THE VIRTUAL ENVIRONMENT V. Devi PG Scholar, Department of CSE, Indira Institute of Engineering & Technology, India. J. Chenni Kumaran Associate Professor,
More informationPCI COMPLIANCE ON AWS: HOW TREND MICRO CAN HELP
SOLUTION BRIEF PCI COMPLIANCE ON AWS: HOW TREND MICRO CAN HELP The benefits of cloud computing are clear and compelling: no upfront investment, low ongoing costs, flexible capacity and fast application
More informationArchitectural Implications of Cloud Computing
Architectural Implications of Cloud Computing Grace Lewis Research, Technology and Systems Solutions (RTSS) Program Lewis is a senior member of the technical staff at the SEI in the Research, Technology,
More informationAssignment # 1 (Cloud Computing Security)
Assignment # 1 (Cloud Computing Security) Group Members: Abdullah Abid Zeeshan Qaiser M. Umar Hayat Table of Contents Windows Azure Introduction... 4 Windows Azure Services... 4 1. Compute... 4 a) Virtual
More informationWindows Azure and private cloud
Windows Azure and private cloud Joe Chou Senior Program Manager China Cloud Innovation Center Customer Advisory Team Microsoft Asia-Pacific Research and Development Group 1 Agenda Cloud Computing Fundamentals
More informationNCTA Cloud Operations
NCTA Cloud Operations 093018 Lesson 1: Cloud Operations Topic A: Overview of Cloud Computing Solutions Identify the core concepts of cloud computing. Operations Terminology Identify the terminology used
More informationSecurity Model for VM in Cloud
Security Model for VM in Cloud 1 Venkataramana.Kanaparti, 2 Naveen Kumar R, 3 Rajani.S, 4 Padmavathamma M, 5 Anitha.C 1,2,3,5 Research Scholars, 4Research Supervisor 1,2,3,4,5 Dept. of Computer Science,
More informationSecurity Controls for the Autodesk 360 Managed Services
Autodesk Trust Center Security Controls for the Autodesk 360 Managed Services Autodesk strives to apply the operational best practices of leading cloud-computing providers around the world. Sound practices
More informationThreat Modeling Cloud Applications
Threat Modeling Cloud Applications What You Don t Know Will Hurt You Scott Matsumoto Principal Consultant smatsumoto@cigital.com Software Confidence. Achieved. www.cigital.com info@cigital.com +1.703.404.9293
More informationLevel Agreements, and loss of availability due to security breach: Amazon EC2 and S3, Microsoft Windows Azure Compute and Storage.
Concordia University College of Alberta Master of Information Systems Security Management (MISSM) Program 7128 Ada Boulevard, Edmonton, AB Canada T5B 4E4 A comparative case study on Cloud Service Providers,
More informationyvette@yvetteagostini.it yvette@yvetteagostini.it
1 The following is merely a collection of notes taken during works, study and just-for-fun activities No copyright infringements intended: all sources are duly listed at the end of the document This work
More informationSTRATEGIC WHITE PAPER. Securing cloud environments with Nuage Networks VSP: Policy-based security automation and microsegmentation overview
STRATEGIC WHITE PAPER Securing cloud environments with Nuage Networks VSP: Policy-based security automation and microsegmentation overview Abstract Cloud architectures rely on Software-Defined Networking
More informationCloud S ecurity Security Processes & Practices Jinesh Varia
Cloud Security Processes & Practices Jinesh Varia Overview Certifications Physical Security Backups EC2 Security S3 Security SimpleDB Security SQS Security Best Practices AWS Security White Paper Available
More informationSecurity & Cloud Services IAN KAYNE
Security & Cloud Services IAN KAYNE CloudComponents CLOUD SERVICES Dynamically scalable infrastructure, services and software based on broad network accessibility NETWORK ACCESS INTERNAL ESTATE CloudComponents
More informationCloud Computing Technology
Cloud Computing Technology The Architecture Overview Danairat T. Certified Java Programmer, TOGAF Silver danairat@gmail.com, +66-81-559-1446 1 Agenda What is Cloud Computing? Case Study Service Model Architectures
More informationHIPAA Compliant Infrastructure Services. Real Security Outcomes. Delivered.
Real Security Outcomes. Delivered. Deploying healthcare and healthcare related services to the cloud can be frightening. The requirements of HIPAA can be difficult to navigate, and while many vendors claim
More informationThe Cloud, Virtualization, and Security
A Cloud: Large groups of remote servers that are networked to allow centralized, shared data storage and online access to computer services or resources A Cloud: Large groups of remote servers that are
More informationSECURITY MODELS FOR CLOUD 2012. Kurtis E. Minder, CISSP
SECURITY MODELS FOR CLOUD 2012 Kurtis E. Minder, CISSP INTRODUCTION Kurtis E. Minder, Technical Sales Professional Companies: Roles: Security Design Engineer Systems Engineer Sales Engineer Salesperson
More informationArchitecting and Building a Secure and Compliant Virtual Infrastructure and Private Cloud
Architecting and Building a Secure and Compliant Virtual Infrastructure and Private Cloud Rob Randell, CISSP Principal Systems Engineer Security Specialist Agenda What is the Cloud? Virtualization Basics
More informationMicrosoft 20533 - Implementing Microsoft Azure Infrastructure Solutions
1800 ULEARN (853 276) www.ddls.com.au Microsoft 20533 - Implementing Microsoft Azure Infrastructure Solutions Length 5 days Price $4389.00 (inc GST) Version C Overview This course is intended for IT professionals
More informationCertified Information Systems Auditor (CISA)
Certified Information Systems Auditor (CISA) Course Introduction Course Introduction Module 01 - The Process of Auditing Information Systems Lesson 1: Management of the Audit Function Organization of the
More information