How can security requirements of critical Infrastructure IT shape Cloud Computing research?
|
|
|
- Florence McBride
- 10 years ago
- Views:
Transcription
1 SEcure Clud cmputing fr CRitical Infrastructure IT Hw can security requirements f critical Infrastructure IT shape Clud Cmputing research? Dr. Markus Tauber [email protected] Austrian Institute f Technlgy (AIT) 25/04/2013 AIT Austrian Institute f Technlgy ETRA Investigación y Desarrll Fraunhfer Institute fr Experimental Sftware Engineering IESE Karlsruhe Institute f Technlgy NEC Eurpe Lancaster University Mirasys Hellenic Telecmmunicatins Organizatin OTE Ayuntamient de Valencia Amaris
2 What d we mean when we say: Clud Private Public Elasticity Scalability Critical Infrastructure Legal Requirements EU data prtectin SLA Clud Behaviur Resilience Anmaly Detectin Security and Safety Cludificatin SECCRIT Cnsrtium 2
3 Prblem Definitin Everything ges clud Cnsumer data like ur s r phts (ggle mail and ther ggle services) Data base applicatins, especially when expsed t unpredictable lad peaks Gvernmental Data Centres peer with each ther and create private cluds Sn all kinds f applicatins (inc. CI) withut us nticing it. Requirements fr clud applicatins vary Cmmercial nes mainly t deal with lad peaks and t get n-demand hardware resurces (scalability & elasticity) Requirements in CI regarding verall redundancy, data availability, authenticity, secure access are typically higher than in cmmercial applicatins. What is the prblem? Clud services are per definitin paque and make it hard t determine reasns fr failure and hence make the develpment f cuntermeasures hard This als implies that it is hard t determine wh s fault it is SECCRIT Cnsrtium 3
4 CI in the Clud Regulatry Issues Safety Issues (unlike ther clud services CI failure results in catastrphe, cascading effects) Security Issues Resilience's Issues Legal Issues EU Data Prtectin Stringent Regulatry Requirements Which data needs what level f prtectin Increased Awareness and visibility 7/24 availability Cnvergence f user cncerns and CI pririties SECCRIT Cnsrtium 4
5 Key Research Prblems Prvisin f legal guidance fr the use f technical infrmatin in matters f evidence and data prtectin as well as fr SLA Management Nvel Risk Management Appraches and Risk Metrics (inc. Catalgues) fr CI in Clud Envirnments Understanding Clud Behaviur (mnitring, frensic analysis, anmaly detectin, rt cause analysis, resilience analysis in varius layers) Best practise fr secure clud service implementatin in (e.g evaluating methds like cmmn criteria fr cludifying CI sftware) SECCRIT Cnsrtium 5
6 The SECCRIT Prject Why SECCRIT & why CI Cmmercial fcus mre n elasticity & scalability CI has higher interest in security aspects and redundancy Cmmercial user requirements cnverge with CI regulatry requirements Our utput benefits the user and can be applied t cmmercial cluds as well Highly user driven prject including user and advisry bard and real wrld dems What is SECCRIT 10 Partners frm Austria, Finland, Germany, Greece, Spain and the UK. Prject budget 4.8 Mi, partly funded by EC FP7 prgramme Prject duratin SECCRIT Cnsrtium 6
7 SEcure Clud cmputing fr CRitical Infrastructure IT Cntact Dr. Markus Tauber M +43 (0) [email protected] Austrian Institute f Technlgy (AIT) AIT Austrian Institute f Technlgy ETRA Investigación y Desarrll Fraunhfer Institute fr Experimental Sftware Engineering IESE Karlsruhe Institute f Technlgy NEC Eurpe Lancaster University Mirasys Hellenic Telecmmunicatins Organizatin OTE Ayuntamient de Valencia Amaris
How To Write A Secure Cloud Computing For Critical Infrastructure
SEcure Clud cmputing fr CRitical Infrastructure IT Methds and Technlgies fr Secure Clud Cmputing fr Critical InfrastructureIT Dr Markus Tauber SECCRIT Crdinatr AIT Austrian Institute f Technlgy AIT Austrian
High Assurance in Multi-Layer Cloud Infrastructures
SEcure Cloud computing for CRitical Infrastructure IT High Assurance in Multi-Layer Cloud Infrastructures PhD Research Agenda[1] Austrian Institute of Technology (AIT) / Technical Univsersity of Vienna
Cloud Inspector A Cooperative Tool to Increase Trust in Cloud Computing
SEcure computing for CRitical IT Inspector A Cooperative Tool to Increase Trust in Computing Roland Bless, Matthias Flittner, Robert Bauer Karlsruhe Institute of Technology (KIT) {bless, flittner, robert.bauer}@kit.edu
Secure Cloud Computing for Critical Infrastructures
SEcure Cloud computing for CRitical Infrastructure IT Secure Cloud Computing for Critical Infrastructures Aleksandar Hudic and Christian Wagner AIT Austrian Institute of Technology AIT Austrian Institute
Techno-Legal Motivation
SEcure Cloud computing for CRitical Infrastructure IT Techno-Legal Motivation Ass. iur. Silvia Balaban 24/11/2015 AIT Austrian Institute of Technology ETRA Investigación y Desarrollo Fraunhofer Institute
Securely Managing Cryptographic Keys used within a Cloud Environment
Securely Managing Cryptgraphic Keys used within a Clud Envirnment Dr. Sarbari Gupta [email protected] 703-437-9451 ext 12 2012 NIST Cryptgraphic Key Management Wrkshp September 10-11, 2012 Intrductin
Security Assurance IN Service OuTSourcing (SAINTS)
Security Assurance IN Service OuTSurcing (SAINTS) Mussa OUEDRAOGO, PhD Service Science and Innvatin, CRP Henri Tudr Cnférence EurClud Luxemburg du 26 Fevrier 2013- Migrer vers le Clud Cmputing: pprtunités
G-CLOUD FRAMEWORK SERVICE DEFINITION. Solution Architecture for Cloud Service. Copyright: 2014 6point6 Ltd
G-CLOUD FRAMEWORK SERVICE DEFINITION Slutin Architecture fr Clud Service Cpyright: 2014 6pint6 Ltd G-Clud Service Definitin Slutin Architecture fr Clud Service 1. SERVICE OVERVIEW 6pint6 is an innvative
AHLA. C. Big Data, Cloud Computing and the New World Order for Health Care Privacy
AHLA C. Big Data, Clud Cmputing and the New Wrld Order fr Health Care Privacy Marti Arvin Chief Cmpliance Officer UCLA David Geffen Schl f Medicine Ls Angeles, CA Kirk J. Nahra Wiley Rein LLP Washingtn,
Research Report. Abstract: The Emerging Intersection Between Big Data and Security Analytics. November 2012
Research Reprt Abstract: The Emerging Intersectin Between Big Data and Security Analytics By Jn Oltsik, Senir Principal Analyst With Jennifer Gahm Nvember 2012 2012 by The Enterprise Strategy Grup, Inc.
ERAC. Efficient and Robust Architecture for the big data Cloud. Tor Skeie
ERAC Efficient and Rbust Architecture fr the big data Clud Tr Skeie Clud cmputing challenges Results f a survey amng enterprises, cnducted by IDC Surce: IDC Enterprise Panel 2009 Perfrmance requires pwer
THOMSON REUTERS C-TRACK CASE MANAGEMENT SYSTEM SOFTWARE AS A SERVICE SERVICE DEFINITION FOR G-CLOUD 6
THOMSON REUTERS C-TRACK CASE MANAGEMENT SYSTEM SOFTWARE AS A SERVICE SERVICE DEFINITION FOR G-CLOUD 6 C-Track Case Management System (CMS) is a cnfigurable, brwser based case management system fr all levels
CLOUD COMPUTING: SECURITY THREATS AND MECHANISM
CLOUD COMPUTING: SECURITY THREATS AND MECHANISM Vaishali Jshi 1, Lakshmi 2, Vivek Gupta 3 1,2,3 Department f Cmputer Science Engineering, Acrplis Technical Campus, Indre ABSTRACT Clud cmputing is a mdel
UC4 AUTOMATED VIRTUALIZATION Intelligent Service Automation for Physical and Virtual Environments
Fr mre infrmatin abut UC4 prducts please visit www.uc4.cm. UC4 AUTOMATED VIRTUALIZATION Intelligent Service Autmatin fr Physical and Virtual Envirnments Intrductin This whitepaper describes hw the UC4
State of Wisconsin DET Agency Managed Virtual Services Service Offering Definition
State f Wiscnsin DET Agency Managed Virtual Services Service Offering Definitin Dcument Revisin Histry Date Versin Creatr Ntes 6/03/08 1.0 James Sylla Initial draft 9/21/11 1.7 Amy Dustin Annual review
Service Level Agreement in IBM T Clud - ITAP
G-Clud Lt 4: Specialist Clud Services Service Definitin 100 Lngwater Avenue Green Park Reading Berkshire RG2 6GP Tel: 0118 9213 510 Email: [email protected] Website: www.dssec.c.uk Intrductin Thank yu fr
Succession Planning & Leadership Development: Your Utility s Bridge to the Future
Successin Planning & Leadership Develpment: Yur Utility s Bridge t the Future Richard L. Gerstberger, P.E. TAP Resurce Develpment Grup, Inc. 4625 West 32 nd Ave Denver, CO 80212 ABSTRACT A few years ag,
OFFICIAL JOB SPECIFICATION. Network Services Analyst. Network Services Team Manager
JOB SPECIFICATION FUNCTION JOB TITLE REPORTING TO GRADE WORK PATTERN LOCATION IT & Digital Netwrk Services Analyst Netwrk Services Team Manager Band D Full-time Birmingham TRAVEL REQUIRED Occasinally ROLE
Simplifying Big Data Integration A Software as a Service Approach ~ Preliminary Analysis and Design ~
The BigIaS Platfrm Simplifying Big Data Integratin A Sftware as a Service Apprach ~ Preliminary Analysis and Design ~ September 5 th, 2013 Sgndal, Nrway Dumitru Rman Claudia Daniela Pp Rxana Iana Rman
State of Wisconsin. File Server Service Service Offering Definition
State f Wiscnsin File Server Service Service Offering Definitin Dcument Revisin Histry Date Versin Creatr Ntes 2/16/2008 1.0 JD Urfer First pass 2/16/2008 2.0 Tm Runge Editing changes 2/19/2009 2.1 Tm
Systems Support - Extended
1 General Overview This is a Service Level Agreement ( SLA ) between and the Enterprise Windws Services t dcument: The technlgy services the Enterprise Windws Services prvides t the custmer. The targets
Copernicus & Big Data: A Perspective from the European EO Services Industry. Geoff Sawyer: EARSC Secretary General
Cpernicus & Big Data: A Perspective frm the Eurpean EO Services Industry. Geff Sawyer: EARSC Secretary General What is EARSC? EARSC is a trade assciatin (NPO), funded in 1989, which represents cmpanies:
FINANCE SCRUTINY SUB-COMMITTEE
REPORT FOR: PERFORMANCE AND FINANCE SCRUTINY SUB-COMMITTEE Date f Meeting: 6 January 2015 Subject: Staff Survey and Sickness Absence Mnitring Results and Actin plans Respnsible Officer: Scrutiny Lead Member
Version: Modified By: Date: Approved By: Date: 1.0 Michael Hawkins October 29, 2013 Dan Bowden November 2013
Versin: Mdified By: Date: Apprved By: Date: 1.0 Michael Hawkins Octber 29, 2013 Dan Bwden Nvember 2013 Rule 4-004J Payment Card Industry (PCI) Patch Management (prpsed) 01.1 Purpse The purpse f the Patch
Business Continuity Management Systems Foundation Training Course
Certificatin criteria fr Business Cntinuity Management Systems Fundatin Training Curse CONTENTS 1. INTRODUCTION 2. LEARNING OBJECTIVES 3. ENABLING OBJECTIVES KNOWLEDGE & SKILLS 4. TRAINING METHODS 5. COURSE
Configuring, Monitoring and Deploying a Private Cloud with System Center 2012 Boot Camp
Cnfiguring, Mnitring and Deplying a Private Clud with System Center 2012 Bt Camp Length: 5 Days Technlgy: Micrsft System Center 2012 Delivery Methd: Instructr-led Hands-n Audience Prfile This curse is
Session 9 : Information Security and Risk
INFORMATION STRATEGY Sessin 9 : Infrmatin Security and Risk Tharaka Tennekn B.Sc (Hns) Cmputing, MBA (PIM - USJ) POST GRADUATE DIPLOMA IN BUSINESS AND FINANCE 2014 Infrmatin Management Framewrk 2 Infrmatin
POLICY 1390 Information Technology Continuity of Business Planning Issued: June 4, 2009 Revised: June 12, 2014
State f Michigan POLICY 1390 Infrmatin Technlgy Cntinuity f Business Planning Issued: June 4, 2009 Revised: June 12, 2014 SUBJECT: APPLICATION: PURPOSE: CONTACT AGENCY: Plicy fr Infrmatin Technlgy (IT)
How To Deal With A Data Breach In The European Law
Data Prtectin: Regulating Cyber Security Jnathan Bamfrd Head f Strategic Liaisn Hw des DP regulatin affect cyber security? Data Prtectin Act 1998: apprpriate security Privacy and Electrnic Cmmunicatin
Basics of Supply Chain Management
The Champlain Valley APICS Chapter is a premier prfessinal assciatin fr supply chain and peratins management and wrking tgether with the APICS rganizatin the leading prvider f research, educatin and certificatin
Aim The aim of a communication plan states the overall goal of the communication effort.
Develping a Cmmunicatin Plan- Aim Aim The aim f a cmmunicatin plan states the verall gal f the cmmunicatin effrt. Determining the Aim Ask yurself r yur team what the verall gal f the cmmunicatin plan is.
Information Services Hosting Arrangements
Infrmatin Services Hsting Arrangements Purpse The purpse f this service is t prvide secure, supprted, and reasnably accessible cmputing envirnments fr departments at DePaul that are in need f server-based
Volume 2, Issue 11, November 2014 International Journal of Advance Research in Computer Science and Management Studies
Vlume 2, Issue 11, Nvember 2014 Internatinal Jurnal f Advance Research in Cmputer Science and Management Studies Research Article / Survey Paper / Case Study Available nline at: www.ijarcsms.cm ISSN: 2321
GUIDELINE INFORMATION MANAGEMENT (IM) PROGRAM PLAN
Gvernment f Newfundland and Labradr Office f the Chief Infrmatin Officer Infrmatin Management Branch GUIDELINE INFORMATION MANAGEMENT (IM) PROGRAM PLAN Guideline (Definitin): OCIO Guidelines derive frm
Professional Leaders/Specialists
Psitin Prfile Psitin Lcatin Reprting t Jb family Band BI/Infrmatin Manager Wellingtn Prfessinal Leaders/Specialists Band I Date February 2013 1. POSITION PURPOSE The purpse f this psitin is t: Lead and
Plus500CY Ltd. Statement on Privacy and Cookie Policy
Plus500CY Ltd. Statement n Privacy and Ckie Plicy Statement n Privacy and Ckie Plicy This website is perated by Plus500CY Ltd. ("we, us r ur"). It is ur plicy t respect the cnfidentiality f infrmatin and
Helpdesk Services at the Executive Office of Energy and Environmental Affairs is defined as follows:
5. Helpdesk Services 5.1 Sectin Overview This sectin f the plan defines Helpdesk Services at EOEEA as well as the key ratinale and benefits f cnslidating Helpdesk Services. Descriptins f the baseline current
Protection of Critical Infrastructure
Prtectin f Critical Infrastructure Speaker: Mindaugas Razbadauskas Cmmunicatins Regulatry Authrity f the Republic f Lithuania 4-5 th Octber Belgrad Slide 1 f 22 Critical Infrastructure Prtectin Critical
Workshop on Business Analysis
Wrkshp n Business Analysis 1. Prgram Overview Three days Business Analysis wrkshp frm Raj InftechBiz Slutins prvides 360 degree view f all activities pertaining t Business Analysis functin. Business Analysis
Growing Your Cloud Infrastructure: Planning, Design and Operation
w h i t e p a p e r p a g e 1 f 12 Grwing Yur Clud Infrastructure: Planning, Design and Operatin Abstract Clud cmputing services are expanding and evlving rapidly. But with this fast, largescale grwth
Electronic and Information Resources Accessibility Compliance Plan
Electrnic and Infrmatin Resurces Accessibility Cmpliance Plan Intrductin The University f Nrth Texas at Dallas (UNTD) is cmmitted t prviding a wrk envirnment that affrds equal access and pprtunity t therwise
The Whole of Government Approach: Models and Tools for EGOV Strategy & Alignment
The Whle f Gvernment Apprach: Mdels and Tls fr EGOV & Alignment Adegbyega Oj (in cllabratin with T. Janwski and E. Estevez) United Natins University [email protected] OVERVIEW 1. THE WG APPROACH 2. APPLICATION
Case Study. Sonata develops. comprehensive BI Application for a leading provider of Animal Nutrition Solutions. Ananthakrishnan
Case Study Ananthakrishnan Snata develps J Architect, Snata Sftware cmprehensive BI Applicatin fr a leading prvider f Animal Nutritin Slutins Snata Sftware Limited www.snata-sftware.cm www.snata-sftware.cm
ITIL Service Offerings & Agreement (SOA) Certification Program - 5 Days
ITIL Service Offerings & Agreement (SOA) Certificatin Prgram - 5 Days Prgram Overview ITIL is a set f best practices guidance that has becme a wrldwide-adpted framewrk fr Infrmatin Technlgy Services Management
Customer Support & Software Enhancements Policy
Custmer Supprt & Sftware Enhancements Plicy Welcme t Manhattan Assciates Custmer Supprt Organizatin (CSO). Staying current n Custmer Supprt & Sftware Enhancements and n a supprted versin f the licensed
Towards Novel Certification Models in Cloud Infrastructures (the CUMULUS approach)
Twards Nvel Certificatin Mdels in Clud Infrastructures (the CUMULUS apprach) Prfessr G. Spanudakis Schl f Infrmatics CSP Frum, 18-19 April 2013, Brussels Outline Clud Security Still a prblem? Prvider perspective
OnX is uniquely positioned to help your organization rapidly gain the necessary skills to enable the successful deployment of SDN.
Slutin Brief SDN Training OVERVIEW SDN is mving faster than previus netwrking advancements. Sme teams have already deplyed and are mnitring their envirnments, while thers are just starting t ask abut SDN
How To Measure Call Quality On Your Service Desk
Hw T Measure Call Quality On Yur Service Desk - 1 - Declaratin We believe the infrmatin in this dcument t be accurate, relevant and truthful based n ur experience and the infrmatin prvided t us t date.
Change Management Process
Change Management Prcess B1.10 Change Management Prcess 1. Intrductin This plicy utlines [Yur Cmpany] s apprach t managing change within the rganisatin. All changes in strategy, activities and prcesses
Secure Outsourced Computation in a Multi-Tenant Cloud. Seny Kamara - Microsoft Research Mariana Raykova - Columbia
Secure Outsurced Cmputatin in a Multi-Tenant Clud Seny Kamara - Micrsft Research Mariana Raykva - Clumbia Outsurced Cmputatin (x, f ) f (x) IBM WCSC 2 The Clud IBM WCSC 3 Virtualized Servers App1 App2
Enterprise Security Management CIS 259
Enterprise Security Management CIS 259 Prerequisites CIS 175 Descriptin This curse is designed t cver the managerial aspects f cmputer security and risk management fr enterprises. The student will attain
How Does Cloud Computing Work?
Hw Des Clud Cmputing Wrk? Carl Mazzanti, CEO, emazzanti Technlgies IT Supprt and Clud Cmputing Services fr Small Business Hbken, NJ and NYC, 201-360- 4400 Owner [Pick the date] Hw des Clud Cmputing Wrk?
Change Management Process For [Project Name]
Management Prcess Fr [Prject Name] i 1 Intrductin The is fllwed during the Executin phase f the Prject Management Life Cycle, nce the prject has been frmally defined and planned. 1.1 What is a Management
2 DAY TRAINING THE BASICS OF PROJECT MANAGEMENT
2 DAY TRAINING THE BASICS OF PROJECT MANAGEMENT BASICS f Prject management 1.1. Objectives All participants will learn abut prject-based wrking by getting hands-n experience f a number f techniques. The
Represent New College Stamford at both national and regional events and serve on appropriate external committees.
JOB DESCRIPTION Pst: Reprts t: Respnsible fr: Executive Directr Partnerships & Skills Principal and Chief Executive Apprenticeship Develpment Manager Head f Marketing Business Sales Team Salary: Attractive
Health and Safety Training and Supervision
Intrductin: Health and Safety Training and Supervisin University f Nttingham is cmmitted t maintaining and develping standards f excellence in all aspects f its business. T that end, the University aspires
Guidelines for Outsourcing, Offshoring, and Cloud Services
Preview Guidelines fr Outsurcing, Offshring, and Clud Services Frewrd Data security and data prtectin challenges arise in mst utsurcing and ffshring transactins, particularly where services are clud based.
Erasmus+ Joint Master Degrees. (JMDs) EACEA Unit A.3. Date: in 12 pts
Erasmus+ Jint Master Degrees (JMDs) EACEA Unit A.3 Date: in 12 pts Key Actin 1 Learning mbility f individuals - Higher Educatin - OPEN TO THE WORLD 1. Credit mbility Internatinal pening f Erasmus, mre
AN ROINN OIDEACHAIS THE LEAVING CERTIFICATE
AN ROINN OIDEACHAIS THE LEAVING CERTIFICATE BUSINESS SYLLABUS (HIGHER LEVEL and ORDINARY LEVEL 1 Cntents Preamble (ii) 1. Intrductin 1 2. Structure f the syllabus 3 3. Business syllabus Peple in business
JACK CROWLEY, PMP 3856 Mill Mount Drive Powhatan, Virginia 23139 804-245-0689 [email protected]
JACK CROWLEY, PMP 3856 Mill Munt Drive Pwhatan, Virginia 23139 804-245-0689 [email protected] SENIOR PROGRAM MANAGEMENT PROFILE Senir Prgram Manager with ver twenty years experience in prtfli-prgram-prject
Direct Marketing Production Printing & Value-Added Services: A strategy for growth
A Queste Cmpany Direct Marketing Prductin Printing & Value-Added Services: A strategy fr grwth Prductin Printing & Media A Multi-Client Study Direct Marketing Prductin Printing & Value-Added Services:
