Secure Cloud Computing for Critical Infrastructures

Size: px
Start display at page:

Download "Secure Cloud Computing for Critical Infrastructures"

Transcription

1 SEcure Cloud computing for CRitical Infrastructure IT Secure Cloud Computing for Critical Infrastructures Aleksandar Hudic and Christian Wagner AIT Austrian Institute of Technology AIT Austrian Institute of Technology ETRA Investigación y Desarrollo Fraunhofer Institute for Experimental Software Engineering IESE Karlsruhe Institute of Technology NEC Europe Lancaster University Mirasys Hellenic Telecommunications Organization OTE Ayuntamiento de Valencia Amaris

2 Source:

3 The SECCRIT Project Hard Facts Research project on secure Cloud Computing for critical infrastructure IT 10 Partners from Austria, Finland, Germany, Greece, Spain and the UK. Project budget 4.8 Mio, partly funded by the European Union Project duration about % of the project completed 25 public deliverables SECCRIT Consortium 3

4 What are Critical Infrastructures SECCRIT Consortium 4

5 Everything goes to Cloud SECCRIT Consortium 5

6 Motivation Why would someone do that? SECCRIT Consortium 6

7 SECCRIT Consortium 7

8 Motivation Why would someone do that? Possible reduction of costs Pay as you use Managing peak loads Scalable computing resources Potential increased availability SECCRIT Consortium 8

9 now back to the project

10 SECCRIT s Overall Goal analyse and evaluate cloud computing with respect to security risks in sensitive environments i.e. critical infrastructures o o to develop o o o Traffic Control Public Safety (CCTV) methodologies technologies, best practices for secure, trustworthy, high assurance legal compliant cloud computing environments for critical infrastructure IT. Investigate real-world problems SECCRIT Consortium 10

11 Problem Definition High Level Requirements for cloud applications vary o Commercial applications mainly focus on scalability & elasticity o Requirements in CI regarding: overall redundancy, data availability, authenticity, secure access, trust and protection of the citizens are typically higher than in commercial applications. o Common Users Requirements converge with what is CI standard SECCRIT Consortium 11

12 Problem Definition High Level What is the problem? o Cloud services abstract over used resources, are opaque and make it hard to determine technical reasons for (security) failure and hence make the development of countermeasures o This also implies, from a legal perspective, that it is hard to determine who s fault it is and to show one hasn t acted negligent SECCRIT Consortium 12

13 SECCRIT Demonstrator: Traffic Control Gather traffic data from traffic sensors on the road Store traffic data in data bases Generate data and reports about traffic status and traffic evolution Analyse and relate the whole of mobility data Support to define mobility polices and traffic control strategies Control traffic on the road by Traffic Controllers, Traffic Ligths, Variable Messages Signals, etc. Public transportation priority by strategies like offering traffic lights priority Execute traffic control strategies by operators manual actions or by automatic procedures SECCRIT Consortium 13

14 SECCRIT Demonstrator: Public Safety (CCTV) MetroSub CitySec TelCom TenSys CloudCorp The Subway Operator The Security Service Provider The Telecom Operator The Tenant System Mgmt The Cloud Mgmt Provider SECCRIT Consortium 14

15 Key Objectives Legal Guidance on Data Protection and Evidence Understand and manage risk associated with cloud environments Understand cloud behavior in the face of challenges Establish best practices for secure cloud service implementations Demonstration of output in real-world application scenarios SECCRIT Consortium 15

16 Key Objectives Activities & Output Legal Guidance on Data Protection and Evidence Understand and manage risk associated with cloud environments Understand cloud behavior in the face of challenges Establish best practices for secure cloud service implementations Demonstration of output in real-world application scenarios Definition of legal guidance on SLA compliance, provision of evidence, and data protection for cloud services Risk Assessment and Management Methodology Policy Specification Methodology and Tool Cloud Assurance Profile and Evaluation Method Anomaly Detection Techniques and Tools Policy Decision and Enforcement Tools Cloud Resilience Management Framework Tools for Audit Trails and Root Cause Analysis Model Driven Cloud Security Guidelines Orchestration Secure Cloud Storage Demo 1: Storage and Processing of Sensitive Data Demo 2: Hosting Critical Urban Mobility Services SECCRIT Consortium 16

17 SECCRIT Output a) Techno-legal guidance b) Novel Risk Assessment Approaches c) Cloud Security Policy Specification and Enforcement Framework d) Resilience Management Framework (incl. anomaly detection and virtual component deployment) e) Forensic Analysis via Audit Trails for Root Cause Analysis (incl. secure cloud storage) f) Cloud Assurance Approaches g) Process-Oriented Security Guideline and Best Practise Approaches SECCRIT Consortium 17

18 SECCRIT Output a) Techno-legal guidance b) Novel Risk Assessment Approaches c) Cloud Security Policy Specification and Enforcement Framework d) Resilience Management Framework (incl. anomaly detection and virtual component deployment) e) Forensic Analysis via Audit Trails for Root Cause Analysis (incl. secure cloud storage) f) Cloud Assurance Approaches g) Process-Oriented Security Guideline and Best Practise Approaches SECCRIT Consortium 18

19 Techno-Legal Guidance

20 Legal Questions Security Service Operator uses cloud services Uses integrated analysis cloud service (B-AG) and video management cloud service (C-AG) Analysis cloud service + video management run on virtual server video management cloud service uses DB (Y-AG) Y-AG uses storage service SECCRIT Consortium 20

21 SECCRIT Architectural Framework

22 What do we mean when we talk about Cloud? R. Bless, Flittner, M., Horneber, J., Hutchison, D., Jung, C., Pallas, F., Schöller, M., Shirazi, S. Noor ul Ha, Simpson, S., and Smith, P., Whitepaper "AF 1.0" SECCRIT Architectural Framework (and IEEE CloudCom) SECCRIT Consortium 22

23 Cloud Risk Assessment

24 Cloud Risk Assessment There are different stakeholder viewpoints to consider o The Cloud Service Provider In SECCRIT is decomposed into sub roles, including the Tenant and Cloud Infrastructure Provider o The Critical Infrastructure Service Provider When should an assessment be performed? o At the point of deployment, to determine whether to use the Cloud and/or which provider and deployment model to use o During the operation of a service, e.g., periodically or in response to changes in the deployment environment caused by scaling SECCRIT Consortium 24

25 Major Contributions 1. An analysis of risk perceptions regarding the use of cloud o Performed on an individual and organisational basis 2. An extensive cloud-specific threat and vulnerability catalogue that can support a risk assessment 3. An extension to a standard risk assessment process to support critical infrastructure service providers determine the risk of cloud deployment o Supported by the SECCRIT threat and vulnerability catalogue and the open-source Verinice ISMS tool 4. Identified a set of cloud infrastructure metrics that could be used to support online risk assessment

26 The SECCRIT Threat and Vulnerability Catalogue Primary data sources: 1. Performed an extension literature survey of existing catalogues and organisations of threats and vulnerabilities, e.g., CSA s Notorious Nine 2. Carried out a structured security analysis, based on the SECCRIT architectural framework and different deployment models 3. Leveraged findings from the cloud risk survey Management-oriented View Box model Virtual environment Local scaling Resource pooling SECCRIT Consortium 26

27 The SECCRIT Threat and Vulnerability Catalogue Organised items into categories NIST s essential characteristics of cloud computing at the core Identified impact type, i.e., CIA, and references when possible SECCRIT Consortium 27

28 Cloud Risk Deployment Assessment Process SECCRIT Consortium 28

29 Conclusion Four major contributions: 1. An analysis of risk perceptions regarding the use of cloud 2. An extensive cloud-specific threat and vulnerability catalogue 3. Extension to a standard risk assessment process to support critical infrastructure service providers determine the risk of cloud deployment 4. Cloud infrastructure metrics that could be used to support online risk assessment The threat and vulnerability catalogue is being put forward as a contribution to the ETSI ISG on Network Function Virtualisation (NFV) SECCRIT Consortium 29

30 Cloud Assurance Approaches

31 Cloud Assurance Framework Assurance Level 1-7 MONITORING ARTIFACTS SECCRIT Consortium 31

32 Aspects of Assurance SECCRIT Consortium 32

33 Research questions / challenges How to assure that security properties are met across distinct cloud layers with different stake holders? Levels of Abstraction (The SECCRIT architecture) How to derive continuous assessment of security properties across the clouds architecture? How can security be assessed, measured or scaled in respect to a certain predefined set of security properties (assurance levels)? How to aggregate/inherit security across different stake holders in Cloud? R. Bless, Flittner, M., Horneber, J., Hutchison, D., Jung, C., Pallas, F., Schöller, M., Shirazi, S. Noor ul Ha, Simpson, S., and Smith, P., Whitepaper "AF 1.0" SECCRIT Architectural Framework (and IEEE CloudCom) SECCRIT Consortium 33

34 Security properties Security-aware SLA specification language and cloud security dependency model Certification models Core Certification mechanisms Methodologies for Risk Assessment and Management The Notorious Nine: Cloud Computing Top Threats in SECCRIT Consortium 34

35 Identified categories/properties ID SECURITY PROPERTY CATEGORY VULNERABILITY THREATS DEPENDENCIES SP_1 SP_2 SP_3 SP_4 SP_5 User Authentication and Identity assurance level Identity Assurance Loss of human-operated control point to verify security and privacy settings Insufficient authentication security, e.g., weak authentication mechanisms, on the cloud management interface Data deletion quality level Data Disposal Data recovery vulnerabilities, e.g., unauthorised access to data in memory or on disk from previous users Storage Freshness Durability Data recovery vulnerabilities, e.g., unauthorised access to data in memory or on disk from previous users Data alteration prevention / detection Data Breaches, Data Loss, Shared Technology Vulnerabilities Account or Service Traffic Hijacking Insecure Interfaces and APIs, Malicious Insiders Data Breaches, Account or Service Traffic Hijacking, Insecure Interfaces and APIs, Malicious Insiders, Insufficient Due Diligence Data Breaches, Account or Service Traffic Hijacking, Insecure Interfaces and APIs, Malicious Insiders, Insufficient Due Diligence Integrity Poor/ no integrity checks of the billing information Data Breaches Insecure Interfaces and APIs Insufficient Due Diligence Storage Retrievability Durability Poor/ no backup & restore strategy is in place to prevent the loss of billing information, e.g., in the case of a system failure Data Breaches Insecure Interfaces and APIs Insufficient Due Diligence None None None SP_1, SP_2, SP_3 SP_4 SP_6 SP_7 Data leakage detection / prevention Cryptographic module protection level Data Leakage Key Management Poor/ no encryption of the VM data through a wide-area migration process Unmonitored and unencrypted network traffic between VMs is possible, e.g., for VMs on the same node through virtual network Unencrypted physical storage, which is the underlying for allocated virtual storage of the VMs Data Breaches Malicious Insiders Shared Technology Vulnerabilities Insufficient Due Diligence Shared Technology Vulnerabilities Data Breaches Malicious Insiders SP_5 None SECCRIT Consortium 35

36 Assurance Assessment Framework ABSTRACTION LEVEL User Level Application Level Critical Infrastructure Target of Evaluation Framework elements: Component of Evaluation (CoE) o Component dependencies (CD) o Association (AS) Group of Evaluation (GoE) Target of Evaluation (ToE) Virtual Infrastructure Level Tenant Physical Infrastructure Level Cloud Infrastructure Assurance Profile: o o o o o GROUP OF EVALUATION GROUP OF EVALUATION Assurance Type (AT) Assurance Properties (AP) Assurance Class (AC) Security Objectives (SO) Assessment Interval (AI) Common Criteria Framework for Information Technology Security Evaluation, CCDB USB Working Group, 2012, part 1-3. Online available: SECCRIT Consortium 36

37 Initial assurance policy set INITIAL POLICY SET AL K AC X :! VS, (1) VS = {SPV 1, SPV 2 SPV N }, (2) SPVi= [ SP 1, SP 2, SP 3, SP 4 ], SP i = {0,1} (3) VS AL K :! SPVi, i (4) SPVi AC X : SPVi = k (5) AC X = {SPV 1, SPV 2, SPV 3, SPV n } (6) (7) ACS AL = AC X (SPV i ), AC X CoE M, i {1 N} (8) ACS AL (i) DAL VS (i) (9) AL VS DAL VS (10) (DAL VS (i) AL VS (i)) AL(AC X )=i, AC X CoE M (11)! ALi Min(CALj) i {1 7}, j {1 N} (12) Each assurance class is associated with at least on vector set Vector set is a compound of N Security Property vectors Security Property Vector is a set of K Security Properties associated with true or false Each Vector Set of a particular Assurance Level is associated with All Security Property Vectors in a class have the same cardinality Assurance Class is a compound of distinct Security property vectors Individual SPV can be found only at one Assurance class Bitwise conjunction of Security property vector bits of an individual Assurance Class Assurance Class of the evaluated object directly depends on the assurance of the associated components SECCRIT Consortium 37

38 Service abstraction Service/infrastructure abstraction via the General tree model: Clustering assurance class properties to a particular assurance level SECCRIT Consortium 38

39 Prototype use cases analysis GENERAL TREE MODEL ANALYSIS: tree traversal post order method level based bit conjunction vertical post order assurance aggregation (a) (b) SECCRIT Consortium 39

40 Assurance calculation algorithm Algorithm steps: 1. Bitwise conjunction SPV[i] for each vector in an Evaluated Vectors Set 2. Reducing the potential combination set 3. Checking the remained subset begin procedure: for i=k i=1 do if ( CoE C (SPV[i])! AL M, M {1,2,,7}) { AL = M; end procedure } else if ( CoE SPV i 0) { discard SPV where SPV[i] =1; continue; } else ( CoE SPV i 1) { discard SPV where SPV[i] =0; continue; } end procedure SECCRIT Consortium 40

41 Future work Building a comprehensive security property catalogue in line with the critical infrastructure requirements (demo partner feedback) Investigating whether the current Cloud monitoring tools are capable of conducting cross layer monitoring or supporting assurance approach Demonstrating the approach by applying it on general demo scenario, in line with both of our demo scenarios, on OpenStack SECCRIT Consortium 41

42 Conclusion customizable framework for analyzing predefined set of security properties across the cloud stack user and provider centric advanced and transparent monitoring model across cloud stack autonomic and cumulative analysis of the cloud infrastructure technology independent assessment framework integration of exiting work of SECCRIT project e.g.: monitoring, root cause and forensic analysis tools, legal requirements, vulnerability catalogue SECCRIT Consortium 42

43 Any Questions? SECCRIT Consortium 43

44 SEcure Cloud computing for CRitical Infrastructure IT Contact Aleksandar Hudic, Christian Wagner AIT Austrian Institute of Technology AIT Austrian Institute of Technology ETRA Investigación y Desarrollo Fraunhofer Institute for Experimental Software Engineering IESE Karlsruhe Institute of Technology NEC Europe Lancaster University Mirasys Hellenic Telecommunications Organization OTE Ayuntamiento de Valencia Amaris

High Assurance in Multi-Layer Cloud Infrastructures

High Assurance in Multi-Layer Cloud Infrastructures SEcure Cloud computing for CRitical Infrastructure IT High Assurance in Multi-Layer Cloud Infrastructures PhD Research Agenda[1] Austrian Institute of Technology (AIT) / Technical Univsersity of Vienna

More information

Techno-Legal Motivation

Techno-Legal Motivation SEcure Cloud computing for CRitical Infrastructure IT Techno-Legal Motivation Ass. iur. Silvia Balaban 24/11/2015 AIT Austrian Institute of Technology ETRA Investigación y Desarrollo Fraunhofer Institute

More information

How To Write A Secure Cloud Computing For Critical Infrastructure

How To Write A Secure Cloud Computing For Critical Infrastructure SEcure Clud cmputing fr CRitical Infrastructure IT Methds and Technlgies fr Secure Clud Cmputing fr Critical InfrastructureIT Dr Markus Tauber SECCRIT Crdinatr AIT Austrian Institute f Technlgy AIT Austrian

More information

Cloud Inspector A Cooperative Tool to Increase Trust in Cloud Computing

Cloud Inspector A Cooperative Tool to Increase Trust in Cloud Computing SEcure computing for CRitical IT Inspector A Cooperative Tool to Increase Trust in Computing Roland Bless, Matthias Flittner, Robert Bauer Karlsruhe Institute of Technology (KIT) {bless, flittner, robert.bauer}@kit.edu

More information

How can security requirements of critical Infrastructure IT shape Cloud Computing research?

How can security requirements of critical Infrastructure IT shape Cloud Computing research? SEcure Clud cmputing fr CRitical Infrastructure IT Hw can security requirements f critical Infrastructure IT shape Clud Cmputing research? Dr. Markus Tauber markus.tauber@ait.ac.at Austrian Institute f

More information

Cloud Security Introduction and Overview

Cloud Security Introduction and Overview Introduction and Overview Klaus Gribi Senior Security Consultant klaus.gribi@swisscom.com May 6, 2015 Agenda 2 1. Cloud Security Cloud Evolution, Service and Deployment models Overview and the Notorious

More information

Security Management of Cloud-Native Applications. Presented By: Rohit Sharma MSc in Dependable Software Systems (DESEM)

Security Management of Cloud-Native Applications. Presented By: Rohit Sharma MSc in Dependable Software Systems (DESEM) Security Management of Cloud-Native Applications Presented By: Rohit Sharma MSc in Dependable Software Systems (DESEM) 1 Outline Context State-of-the-Art Design Patterns Threats to cloud systems Security

More information

Security Issues in Cloud Computing

Security Issues in Cloud Computing Security Issues in Computing CSCI 454/554 Computing w Definition based on NIST: A model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources

More information

Preface Introduction

Preface Introduction Preface Introduction Cloud computing is revolutionizing all aspects of technologies to provide scalability, flexibility and cost-effectiveness. It has become a challenge to ensure the security of cloud

More information

SECURITY THREATS TO CLOUD COMPUTING

SECURITY THREATS TO CLOUD COMPUTING IMPACT: International Journal of Research in Engineering & Technology (IMPACT: IJRET) ISSN(E): 2321-8843; ISSN(P): 2347-4599 Vol. 2, Issue 3, Mar 2014, 101-106 Impact Journals SECURITY THREATS TO CLOUD

More information

Securing The Cloud. Foundational Best Practices For Securing Cloud Computing. Scott Clark. Insert presenter logo here on slide master

Securing The Cloud. Foundational Best Practices For Securing Cloud Computing. Scott Clark. Insert presenter logo here on slide master Securing The Cloud Foundational Best Practices For Securing Cloud Computing Scott Clark Agenda Introduction to Cloud Computing What is Different in the Cloud? CSA Guidance Additional Resources 2 What is

More information

Cloud Computing Governance & Security. Security Risks in the Cloud

Cloud Computing Governance & Security. Security Risks in the Cloud Cloud Computing Governance & Security The top ten questions you have to ask Mike Small CEng, FBCS, CITP Fellow Analyst, KuppingerCole This Webinar is supported by Agenda What is the Problem? Ten Cloud

More information

Cloud security architecture

Cloud security architecture ericsson White paper Uen 284 23-3244 January 2015 Cloud security architecture from process to deployment The Trust Engine concept and logical cloud security architecture presented in this paper provide

More information

An Architectural Model for Deploying Critical Infrastructure Services in the Cloud

An Architectural Model for Deploying Critical Infrastructure Services in the Cloud An Architectural Model for Deploying Critical s in the Marcus Schöller NEC Europe Ltd. Heidelberg, Germany Email: marcus.schoeller@neclab.eu Roland Bless, Frank Pallas, Jens Horneber Karlsruhe Institute

More information

The Magical Cloud. Lennart Franked. Department for Information and Communicationsystems (ICS), Mid Sweden University, Sundsvall.

The Magical Cloud. Lennart Franked. Department for Information and Communicationsystems (ICS), Mid Sweden University, Sundsvall. The Magical Cloud Lennart Franked Department for Information and Communicationsystems (ICS), Mid Sweden University, Sundsvall. 2014-10-20 Lennart Franked (MIUN IKS) The Magical Cloud 2014-10-20 1 / 35

More information

HIPAA CRITICAL AREAS TECHNICAL SECURITY FOCUS FOR CLOUD DEPLOYMENT

HIPAA CRITICAL AREAS TECHNICAL SECURITY FOCUS FOR CLOUD DEPLOYMENT HIPAA CRITICAL AREAS TECHNICAL SECURITY FOCUS FOR CLOUD DEPLOYMENT A Review List This paper was put together with Security in mind, ISO, and HIPAA, for guidance as you move into a cloud deployment Dr.

More information

Cloud Computing and Security Risk Analysis Qing Liu Technology Architect STREAM Technology Lab Qing.Liu@chi.frb.org

Cloud Computing and Security Risk Analysis Qing Liu Technology Architect STREAM Technology Lab Qing.Liu@chi.frb.org Cloud Computing and Security Risk Analysis Qing Liu Technology Architect STREAM Technology Lab Qing.Liu@chi.frb.org 1 Disclaimers This presentation provides education on Cloud Computing and its security

More information

STeP-IN SUMMIT 2013. June 18 21, 2013 at Bangalore, INDIA. Performance Testing of an IAAS Cloud Software (A CloudStack Use Case)

STeP-IN SUMMIT 2013. June 18 21, 2013 at Bangalore, INDIA. Performance Testing of an IAAS Cloud Software (A CloudStack Use Case) 10 th International Conference on Software Testing June 18 21, 2013 at Bangalore, INDIA by Sowmya Krishnan, Senior Software QA Engineer, Citrix Copyright: STeP-IN Forum and Quality Solutions for Information

More information

Security Property Development and Analysis of Cloud Infrastructure

Security Property Development and Analysis of Cloud Infrastructure SEcure Cloud computing for CRitical infrastructure IT Contract No 312758 Deliverable: 5.2 Cloud assurance profile and evaluation method AIT Austrian Institute of Technology ETRA Investigación y Desarrollo

More information

Top 10 Risks in the Cloud

Top 10 Risks in the Cloud A COALFIRE PERSPECTIVE Top 10 Risks in the Cloud by Balaji Palanisamy, VCP, QSA, Coalfire March 2012 DALLAS DENVER LOS ANGELES NEW YORK SEATTLE Introduction Business leaders today face a complex risk question

More information

Future @ Cloud: Cloud Computing meets Smart Ecosystems

Future @ Cloud: Cloud Computing meets Smart Ecosystems Future @ Cloud: Cloud Computing meets Smart Ecosystems Joerg Doerr, Fraunhofer IESE, Kaiserslautern, Germany Joerg.Doerr@iese.fraunhofer.de Fraunhofer-Institute for Experimental Software Engineering (IESE)

More information

NETWORK ACCESS CONTROL AND CLOUD SECURITY. Tran Song Dat Phuc SeoulTech 2015

NETWORK ACCESS CONTROL AND CLOUD SECURITY. Tran Song Dat Phuc SeoulTech 2015 NETWORK ACCESS CONTROL AND CLOUD SECURITY Tran Song Dat Phuc SeoulTech 2015 Table of Contents Network Access Control (NAC) Network Access Enforcement Methods Extensible Authentication Protocol IEEE 802.1X

More information

Public Cloud Security: Surviving in a Hostile Multitenant Environment

Public Cloud Security: Surviving in a Hostile Multitenant Environment Public Cloud Security: Surviving in a Hostile Multitenant Environment SESSION ID: EXP-R01 Mark Russinovich Technical Fellow Windows Azure, Microsoft @markrussinovich The Third Computing Era Security Could

More information

Cloud-Security: Show-Stopper or Enabling Technology?

Cloud-Security: Show-Stopper or Enabling Technology? Cloud-Security: Show-Stopper or Enabling Technology? Fraunhofer Institute for Secure Information Technology (SIT) Technische Universität München Open Grid Forum, 16.3,. 2010, Munich Overview 1. Cloud Characteristics

More information

Software-Defined Networks Powered by VellOS

Software-Defined Networks Powered by VellOS WHITE PAPER Software-Defined Networks Powered by VellOS Agile, Flexible Networking for Distributed Applications Vello s SDN enables a low-latency, programmable solution resulting in a faster and more flexible

More information

Security Issues in Cloud Computing

Security Issues in Cloud Computing Security Issues in Cloud Computing Dr. A. Askarunisa Professor and Head Vickram College of Engineering, Madurai, Tamilnadu, India N.Ganesh Sr.Lecturer Vickram College of Engineering, Madurai, Tamilnadu,

More information

GoodData Corporation Security White Paper

GoodData Corporation Security White Paper GoodData Corporation Security White Paper May 2016 Executive Overview The GoodData Analytics Distribution Platform is designed to help Enterprises and Independent Software Vendors (ISVs) securely share

More information

Is it Time to Trust the Cloud? Unpacking the Notorious Nine

Is it Time to Trust the Cloud? Unpacking the Notorious Nine Is it Time to Trust the Cloud? Unpacking the Notorious Nine Jonathan C. Trull, CISO, Qualys Cloud Security Alliance Agenda Cloud Security Model Background on the Notorious Nine Unpacking the Notorious

More information

Assessing, Evaluating and Managing Cloud Computing Security

Assessing, Evaluating and Managing Cloud Computing Security Assessing, Evaluating and Managing Cloud Computing Security S.SENTHIL KUMAR 1, R.KANAKARAJ 2 1,2 ASSISTANT PROESSOR, DEPARTMENT OF COMMERCE WITH COMPUTER APPLICATIONS Dr.SNS RAJALAKSHMI COLLEGE OF ARTS

More information

Cloudified IP Multimedia Subsystem (IMS) for Network Function Virtualization (NFV)-based architectures

Cloudified IP Multimedia Subsystem (IMS) for Network Function Virtualization (NFV)-based architectures 4th Workshop on Mobile Cloud Networking, June 19th, 2014, Lisbon, Portugal Cloudified IP Multimedia Subsystem (IMS) for Network Function Virtualization (NFV)-based architectures Giuseppe Carella, Marius

More information

International Journal of Innovative Technology & Adaptive Management (IJITAM) ISSN: 2347-3622, Volume-1, Issue-5, February 2014

International Journal of Innovative Technology & Adaptive Management (IJITAM) ISSN: 2347-3622, Volume-1, Issue-5, February 2014 An Overview on Cloud Computing Services And Related Threats Bipasha Mallick Assistant Professor, Haldia Institute Of Technology bipasm@gmail.com Abstract. Cloud computing promises to increase the velocity

More information

Cloud Security: An Independent Assessent

Cloud Security: An Independent Assessent Cloud Security: An Independent Assessent A Quantix White Paper Dec 2010 Call us on: 0115 983 6200 Visit us on-line at: www.quantix-uk.com E-mail us at : enquiries@quantix-uk.com Why are people concerned

More information

Managing Cloud Computing Risk

Managing Cloud Computing Risk Managing Cloud Computing Risk Presented By: Dan Desko; Manager, Internal IT Audit & Risk Advisory Services Schneider Downs & Co. Inc. ddesko@schneiderdowns.com Learning Objectives Understand how to identify

More information

Cloud Essentials for Architects using OpenStack

Cloud Essentials for Architects using OpenStack Cloud Essentials for Architects using OpenStack Course Overview Start Date 18th December 2014 Duration 2 Days Location Dublin Course Code SS906 Programme Overview Cloud Computing is gaining increasing

More information

Management of Security Information and Events in Future Internet

Management of Security Information and Events in Future Internet Management of Security Information and Events in Future Internet Who? Andrew Hutchison 1 Roland Rieke 2 From? 1 T-Systems South Africa 2 Fraunhofer Institute for Secure Information Technology SIT When?

More information

CAN NUCLEAR INSTALLATIONS AND RESEARCH CENTERS ADOPT CLOUD COMPUTING?

CAN NUCLEAR INSTALLATIONS AND RESEARCH CENTERS ADOPT CLOUD COMPUTING? CAN NUCLEAR INSTALLATIONS AND RESEARCH CENTERS ADOPT CLOUD COMPUTING? Ameer Pichan School of Electrical Engineering & Computing Curtin University, Australia What is it? Similar to other services net r

More information

IaaS Cloud Architectures: Virtualized Data Centers to Federated Cloud Infrastructures

IaaS Cloud Architectures: Virtualized Data Centers to Federated Cloud Infrastructures IaaS Cloud Architectures: Virtualized Data Centers to Federated Cloud Infrastructures Dr. Sanjay P. Ahuja, Ph.D. 2010-14 FIS Distinguished Professor of Computer Science School of Computing, UNF Introduction

More information

Information Security Team

Information Security Team Title Document number Add document Document status number Draft Owner Approver(s) CISO Information Security Team Version Version history Version date 0.01-0.05 Initial drafts of handbook 26 Oct 2015 Preface

More information

How To Protect Your Cloud Computing Resources From Attack

How To Protect Your Cloud Computing Resources From Attack Security Considerations for Cloud Computing Steve Ouzman Security Engineer AGENDA Introduction Brief Cloud Overview Security Considerations ServiceNow Security Overview Summary Cloud Computing Overview

More information

What Cloud computing means in real life

What Cloud computing means in real life ITU TRCSL Symposium on Cloud Computing Session 2: Cloud Computing Foundation and Requirements What Cloud computing means in real life Saman Perera Senior General Manager Information Systems Mobitel (Pvt)

More information

Seed4C: A Cloud Security Infrastructure validated on Grid 5000

Seed4C: A Cloud Security Infrastructure validated on Grid 5000 Seed4C: A Cloud Security Infrastructure validated on Grid 5000 E. Caron 1, A. Lefray 1, B. Marquet 2, and J. Rouzaud-Cornabas 1 1 Université de Lyon. LIP Laboratory. UMR CNRS - ENS Lyon - INRIA - UCBL

More information

Advanced File Integrity Monitoring for IT Security, Integrity and Compliance: What you need to know

Advanced File Integrity Monitoring for IT Security, Integrity and Compliance: What you need to know Whitepaper Advanced File Integrity Monitoring for IT Security, Integrity and Compliance: What you need to know Phone (0) 161 914 7798 www.distology.com info@distology.com detecting the unknown Integrity

More information

Looking Ahead The Path to Moving Security into the Cloud

Looking Ahead The Path to Moving Security into the Cloud Looking Ahead The Path to Moving Security into the Cloud Gerhard Eschelbeck Sophos Session ID: SPO2-107 Session Classification: Intermediate Agenda The Changing Threat Landscape Evolution of Application

More information

Compliance and Cloud Computing

Compliance and Cloud Computing Compliance and Cloud Computing Balaji Palanisamy Director, Southwest- US Coalfire Systems, Inc. July 24, 2014 Agenda Introduction Cloud Computing Basics Cloud Computing Threats Security vs. Compliance

More information

Cloud Computing Standards: Overview and ITU-T positioning

Cloud Computing Standards: Overview and ITU-T positioning ITU Workshop on Cloud Computing (Tunis, Tunisia, 18-19 June 2012) Cloud Computing Standards: Overview and ITU-T positioning Dr France Telecom, Orange Labs Networks & Carriers / R&D Chairman ITU-T Working

More information

Protecting Official Records as Evidence in the Cloud Environment. Anne Thurston

Protecting Official Records as Evidence in the Cloud Environment. Anne Thurston Protecting Official Records as Evidence in the Cloud Environment Anne Thurston Introduction In a cloud computing environment, government records are held in virtual storage. A service provider looks after

More information

How to ensure control and security when moving to SaaS/cloud applications

How to ensure control and security when moving to SaaS/cloud applications How to ensure control and security when moving to SaaS/cloud applications Stéphane Hurtaud Partner Information & Technology Risk Deloitte Laurent de la Vaissière Directeur Information & Technology Risk

More information

Cloud Security & Standardization. Markku Siltanen Tietoturvakonsultti CISA, CGEIT, CRISC

Cloud Security & Standardization. Markku Siltanen Tietoturvakonsultti CISA, CGEIT, CRISC 0 Copyright 2011 FUJITSU Cloud Security & Standardization Markku Siltanen Tietoturvakonsultti CISA, CGEIT, CRISC Cloud computing 1 Copyright 2011 FUJITSU Characteristics of cloud 2 Copyright 2011 FUJITSU

More information

7/15/2011. Monitoring and Managing VDI. Monitoring a VDI Deployment. Veeam Monitor. Veeam Monitor

7/15/2011. Monitoring and Managing VDI. Monitoring a VDI Deployment. Veeam Monitor. Veeam Monitor Monitoring a VDI Deployment Monitoring and Managing VDI with Veeam Aseem Anwar S.E. Channel UKI Need for real-time performance metrics Detailed alerting and fault finding tools Identification of bottlenecks

More information

What REALLY matters in Cloud Security? RE: Internet of things sensors, data, security and beyond!

What REALLY matters in Cloud Security? RE: Internet of things sensors, data, security and beyond! What REALLY matters in Cloud Security? RE: Internet of things sensors, data, security and beyond! HOW to best integrate security into the office AND the cloud? And what is a thing is that MORE we have

More information

Cloud Computing: Opportunities, Challenges, and Solutions. Jungwoo Ryoo, Ph.D., CISSP, CISA The Pennsylvania State University

Cloud Computing: Opportunities, Challenges, and Solutions. Jungwoo Ryoo, Ph.D., CISSP, CISA The Pennsylvania State University Cloud Computing: Opportunities, Challenges, and Solutions Jungwoo Ryoo, Ph.D., CISSP, CISA The Pennsylvania State University What is cloud computing? What are some of the keywords? How many of you cannot

More information

SECURITY IN SERVICE LEVEL AGREEMENTS FOR CLOUD COMPUTING

SECURITY IN SERVICE LEVEL AGREEMENTS FOR CLOUD COMPUTING SECURITY IN SERVICE LEVEL AGREEMENTS FOR CLOUD COMPUTING Karin Bernsmed, Martin Gilje Jaatun SINTEF Information and Communication Technology, Trondheim, Norway Karin.Bernsmed@sintef.no, Martin.G.Jaatun@sintef.no

More information

Cloud Security. Let s Open the Box. Abu Shohel Ahmed ahmed.shohel@ericsson.com NomadicLab, Ericsson Research

Cloud Security. Let s Open the Box. Abu Shohel Ahmed ahmed.shohel@ericsson.com NomadicLab, Ericsson Research t Cloud Security Let s Open the Box t Abu Shohel Ahmed ahmed.shohel@ericsson.com NomadicLab, Ericsson Research Facts about Ericsson Ericsson is a world-leading provider of telecommunication equipment and

More information

Control your corner of the cloud.

Control your corner of the cloud. Chapter 1 of 5 Control your corner of the cloud. From the halls of government to the high-rise towers of the corporate world, forward-looking organizations are recognizing the potential of cloud computing

More information

Las Vegas Datacenter Overview. Product Overview and Data Sheet. Created on 6/18/2014 3:49:00 PM

Las Vegas Datacenter Overview. Product Overview and Data Sheet. Created on 6/18/2014 3:49:00 PM Las Vegas Datacenter Overview Product Overview and Data Sheet Product Data Sheet Maintaining a Software as a Service (SaaS) environment with market leading availability and security is something that Active

More information

Security Challenges of Cloud Providers ( Wie baue ich sichere Luftschlösser in den Wolken )

Security Challenges of Cloud Providers ( Wie baue ich sichere Luftschlösser in den Wolken ) 23.11.2015 Jan Philipp Manager, Cyber Risk Services Enterprise Architect Security Challenges of Cloud Providers ( Wie baue ich sichere Luftschlösser in den Wolken ) Purpose today Introduction» Who I am

More information

A Secure System Development Framework for SaaS Applications in Cloud Computing

A Secure System Development Framework for SaaS Applications in Cloud Computing A Secure System Development Framework for SaaS Applications in Cloud Computing Eren TATAR, Emrah TOMUR AbstractThe adoption of cloud computing is ever increasing through its economical and operational

More information

Security Risk Solutions Limited is a privately owned Kenyan company that was established in 2007.

Security Risk Solutions Limited is a privately owned Kenyan company that was established in 2007. Information Security Management Present and Future By: Jona Owitti, CISA Director, Security Risk Solutions Limited Immediate Past Chairman, ISACA Kenya Chapter About SRS www.securityrisksolutions.net -

More information

Network Security Administrator

Network Security Administrator Network Security Administrator Course ID ECC600 Course Description This course looks at the network security in defensive view. The ENSA program is designed to provide fundamental skills needed to analyze

More information

TOP FIVE RECOMMENDATIONS FOR ENCRYPTING LAPTOP DATA A BEST PRACTICES GUIDE

TOP FIVE RECOMMENDATIONS FOR ENCRYPTING LAPTOP DATA A BEST PRACTICES GUIDE TOP FIVE RECOMMENDATIONS FOR ENCRYPTING LAPTOP DATA A BEST PRACTICES GUIDE TODAY S HIGHLY MOBILE WORKFORCE IS PLACING NEW DEMANDS ON IT TEAMS WHEN PROTECTING LAPTOP DATA To guard this corporate data at

More information

Secure Services and Quality Testing SST. Security Engineering Privacy by Design Trusted Solutions. Mario Hoffmann. for Service Ecosystems

Secure Services and Quality Testing SST. Security Engineering Privacy by Design Trusted Solutions. Mario Hoffmann. for Service Ecosystems Secure Services and Quality Testing SST Security Engineering Privacy by Design Trusted Solutions for Service Ecosystems Mario Hoffmann Head of Department Fraunhofer AISEC in a nutshell Fraunhofer Profile

More information

Residual risk. 3 Compliance challenges (i.e. right to examine, exit clause, privacy acy etc.)

Residual risk. 3 Compliance challenges (i.e. right to examine, exit clause, privacy acy etc.) Organizational risks 1 Lock-in Risk of not being able to migrate easily from one provider to another 2 Loss of Governance Control and influence on the cloud providers, and conflicts between customer hardening

More information

Security Threats in Cloud Computing Environments 1

Security Threats in Cloud Computing Environments 1 Security Threats in Cloud Computing Environments 1 Kangchan Lee Electronics and Telecommunications Research Institute chan@etr.re.kr Abstract Cloud computing is a model for enabling service user s ubiquitous,

More information

Cloud Storage and Backup

Cloud Storage and Backup Cloud Storage and Backup Cloud Storage and Backup Cloud Storage and Backup services from iomartcloud have been designed to deliver the performance, capacity, security and flexibility needed to address

More information

White Paper: Cloud Security. Cloud Security

White Paper: Cloud Security. Cloud Security White Paper: Cloud Security Cloud Security Introduction Due to the increase in available bandwidth and technological advances in the area of virtualisation, and the desire of IT managers to provide dynamically

More information

Life in the Cloud A Service Provider s View. Michael Smith mismith@akamai.com Security Evangelist

Life in the Cloud A Service Provider s View. Michael Smith mismith@akamai.com Security Evangelist Life in the Cloud A Service Provider s View Michael Smith mismith@akamai.com Security Evangelist 1 Agenda Cloud is Secure, Right? Building a Cloud Security Program Security Program Case Study Features,

More information

Security Model for VM in Cloud

Security Model for VM in Cloud Security Model for VM in Cloud 1 Venkataramana.Kanaparti, 2 Naveen Kumar R, 3 Rajani.S, 4 Padmavathamma M, 5 Anitha.C 1,2,3,5 Research Scholars, 4Research Supervisor 1,2,3,4,5 Dept. of Computer Science,

More information

Unmasking Virtualization Security. Eric A. Hibbard, CISSP, CISA Hitachi Data Systems

Unmasking Virtualization Security. Eric A. Hibbard, CISSP, CISA Hitachi Data Systems Eric A. Hibbard, CISSP, CISA Hitachi Data Systems SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA unless otherwise noted. Member companies and individual members may

More information

Cloud security and OpenStack Primož Cigoj Laboratorij za odprte sisteme in mreže IJS-E5. www.kc-class.eu

Cloud security and OpenStack Primož Cigoj Laboratorij za odprte sisteme in mreže IJS-E5. www.kc-class.eu Cloud security and OpenStack Primož Cigoj Laboratorij za odprte sisteme in mreže IJS-E5 www.kc-class.eu 1 1 Outline Cloud computing General overview Deployment and service models Security issues Threats

More information

Cloud Federations in Contrail

Cloud Federations in Contrail Cloud Federations in Contrail Emanuele Carlini 1,3, Massimo Coppola 1, Patrizio Dazzi 1, Laura Ricci 1,2, GiacomoRighetti 1,2 " 1 - CNR - ISTI, Pisa, Italy" 2 - University of Pisa, C.S. Dept" 3 - IMT Lucca,

More information

Developing the Corporate Security Architecture. www.avient.ca Alex Woda July 22, 2009

Developing the Corporate Security Architecture. www.avient.ca Alex Woda July 22, 2009 Developing the Corporate Security Architecture www.avient.ca Alex Woda July 22, 2009 Avient Solutions Group Avient Solutions Group is based in Markham and is a professional services firm specializing in

More information

CLOUD STORAGE SECURITY INTRODUCTION. Gordon Arnold, IBM

CLOUD STORAGE SECURITY INTRODUCTION. Gordon Arnold, IBM CLOUD STORAGE SECURITY INTRODUCTION Gordon Arnold, IBM SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and individual members may use this material

More information

Secure Code Development

Secure Code Development ISACA South Florida 7th Annual WOW! Event Copyright Elevate Consult LLC. All Rights Reserved 1 Agenda i. Background ii. iii. iv. Building a Business Case for Secure Coding Top-Down Approach to Develop

More information

CSA Virtualisation Working Group Best Practices for Mitigating Risks in Virtualized Environments

CSA Virtualisation Working Group Best Practices for Mitigating Risks in Virtualized Environments CSA Virtualisation Working Group Best Practices for Mitigating Risks in Virtualized Environments Kelvin Ng Tao Yao Sing Heng Yiak Por Acknowledgeme nts Co-Chairs Kapil Raina, Zscaler Kelvin Ng, Nanyang

More information

Monitoring, Managing and Supporting Enterprise Clouds with Oracle Enterprise Manager 12c Name, Title Oracle

Monitoring, Managing and Supporting Enterprise Clouds with Oracle Enterprise Manager 12c Name, Title Oracle Monitoring, Managing and Supporting Enterprise Clouds with Oracle Enterprise Manager 12c Name, Title Oracle Complete Cloud Lifecycle Management Optimize Plan Meter & Charge Manage Applications and Business

More information

Digital Pathways. Harlow Enterprise Hub, Edinburgh Way, Harlow CM20 2NQ. 0844 586 0040 intouch@digitalpathways.co.uk www.digpath.co.

Digital Pathways. Harlow Enterprise Hub, Edinburgh Way, Harlow CM20 2NQ. 0844 586 0040 intouch@digitalpathways.co.uk www.digpath.co. Harlow Enterprise Hub, Edinburgh Way, Harlow CM20 2NQ 0844 586 0040 intouch@digitalpathways.co.uk Security Services Menu has a full range of Security Services, some of which are also offered as a fully

More information

Achta's IBAN Validation API Service Overview (achta.com)

Achta's IBAN Validation API Service Overview (achta.com) Tel: 00 353 (0) 14773295 e: info@achta.com Achta's IBAN Validation API Service Overview (achta.com) Summary At Achta we have built a secure, scalable and cloud based API for SEPA. One of our core offerings

More information

Federated Application Centric Infrastructure (ACI) Fabrics for Dual Data Center Deployments

Federated Application Centric Infrastructure (ACI) Fabrics for Dual Data Center Deployments Federated Application Centric Infrastructure (ACI) Fabrics for Dual Data Center Deployments March 13, 2015 Abstract To provide redundancy and disaster recovery, most organizations deploy multiple data

More information

Designing a Cloud Storage System

Designing a Cloud Storage System Designing a Cloud Storage System End to End Cloud Storage When designing a cloud storage system, there is value in decoupling the system s archival capacity (its ability to persistently store large volumes

More information

Trust areas: a security paradigm for the Future Internet

Trust areas: a security paradigm for the Future Internet Trust areas: a security paradigm for the Future Internet Carsten Rudolph Fraunhofer Institute for Secure Information Technology SIT Rheinstrasse 75, Darmstadt, Germany Carsten.Rudolph@sit.fraunhofer.de

More information

Introduction to Cyber Security / Information Security

Introduction to Cyber Security / Information Security Introduction to Cyber Security / Information Security Syllabus for Introduction to Cyber Security / Information Security program * for students of University of Pune is given below. The program will be

More information

Software-Defined Network (SDN) & Network Function Virtualization (NFV) Po-Ching Lin Dept. CSIE, National Chung Cheng University

Software-Defined Network (SDN) & Network Function Virtualization (NFV) Po-Ching Lin Dept. CSIE, National Chung Cheng University Software-Defined Network (SDN) & Network Function Virtualization (NFV) Po-Ching Lin Dept. CSIE, National Chung Cheng University Transition to NFV Cost of deploying network functions: Operating expense

More information

Cloud Computing. Benefits and Risks. Bill Wells, CISSP, CISM, CISA, CRISC, CIPP/IT bill.wells@transamerica.com

Cloud Computing. Benefits and Risks. Bill Wells, CISSP, CISM, CISA, CRISC, CIPP/IT bill.wells@transamerica.com Cloud Computing Benefits and Risks Bill Wells, CISSP, CISM, CISA, CRISC, CIPP/IT bill.wells@transamerica.com 10/3/2012 1 Let s make sure we re all talking about the same thing. WHAT IS CLOUD COMPUTING?

More information

ENHANCING CLOUD SECURITY WITH CONTEXT-AWARE USAGE CONTROL POLICIES CHRISTIAN JUNG, ANDREAS EITEL, REINHARD SCHWARZ

ENHANCING CLOUD SECURITY WITH CONTEXT-AWARE USAGE CONTROL POLICIES CHRISTIAN JUNG, ANDREAS EITEL, REINHARD SCHWARZ FRAUNHOFER INSTITUTE FOR EXPERIMENTAL SOFTWARE ENGINEERING IESE ENHANCING CLOUD SECURITY WITH CONTEXT-AWARE USAGE CONTROL POLICIES CHRISTIAN JUNG, ANDREAS EITEL, REINHARD SCHWARZ Christian Jung christian.jung@iese.fraunhofer.de

More information

A PRACTICAL APPROACH TO INCLUDE SECURITY IN SOFTWARE DEVELOPMENT

A PRACTICAL APPROACH TO INCLUDE SECURITY IN SOFTWARE DEVELOPMENT A PRACTICAL APPROACH TO INCLUDE SECURITY IN SOFTWARE DEVELOPMENT Chandramohan Muniraman, University of Houston-Victoria, chandram@houston.rr.com Meledath Damodaran, University of Houston-Victoria, damodaranm@uhv.edu

More information

Enterprise Key Management: A Strategic Approach ENTERPRISE KEY MANAGEMENT A SRATEGIC APPROACH. White Paper February 2010 www.alvandsolutions.

Enterprise Key Management: A Strategic Approach ENTERPRISE KEY MANAGEMENT A SRATEGIC APPROACH. White Paper February 2010 www.alvandsolutions. Enterprise Key Management: A Strategic Approach ENTERPRISE KEY MANAGEMENT A SRATEGIC APPROACH White Paper February 2010 www.alvandsolutions.com Overview Today s increasing security threats and regulatory

More information

Brainloop Cloud Security

Brainloop Cloud Security Whitepaper Brainloop Cloud Security Guide to secure collaboration in the cloud www.brainloop.com Sharing information over the internet The internet is the ideal platform for sharing data globally and communicating

More information

Tufts University. Department of Computer Science. COMP 116 Introduction to Computer Security Fall 2014 Final Project. Guocui Gao Guocui.gao@tufts.

Tufts University. Department of Computer Science. COMP 116 Introduction to Computer Security Fall 2014 Final Project. Guocui Gao Guocui.gao@tufts. Tufts University Department of Computer Science COMP 116 Introduction to Computer Security Fall 2014 Final Project Investigating Security Issues in Cloud Computing Guocui Gao Guocui.gao@tufts.edu Mentor:

More information

DISTRIBUTED SYSTEMS [COMP9243] Lecture 9a: Cloud Computing WHAT IS CLOUD COMPUTING? 2

DISTRIBUTED SYSTEMS [COMP9243] Lecture 9a: Cloud Computing WHAT IS CLOUD COMPUTING? 2 DISTRIBUTED SYSTEMS [COMP9243] Lecture 9a: Cloud Computing Slide 1 Slide 3 A style of computing in which dynamically scalable and often virtualized resources are provided as a service over the Internet.

More information

Usable access control enabled by Sensing Enterprise architectures

Usable access control enabled by Sensing Enterprise architectures Usable access control enabled by Sensing Enterprise architectures IWEI 2015 Nimes, France, May 27-29th Mikel Uriarte Itzazelaia, muriarte@nextel.es 27/05/2015 Application domain: Seaports The need Port

More information

Appendix to; Assessing Systemic Risk to Cloud Computing Technology as Complex Interconnected Systems of Systems

Appendix to; Assessing Systemic Risk to Cloud Computing Technology as Complex Interconnected Systems of Systems Appendix to; Assessing Systemic Risk to Cloud Computing Technology as Complex Interconnected Systems of Systems Yacov Y. Haimes and Barry M. Horowitz Zhenyu Guo, Eva Andrijcic, and Joshua Bogdanor Center

More information

Cloud Computing - Starting Points for Privacy and Transparency

Cloud Computing - Starting Points for Privacy and Transparency Computing - Starting Points for Privacy and Transparency Ina Schiering Ostfalia University of Applied Science Wolfenbüttel, Germany IFIP Summerschool: Privacy and Identity Management for Life, Helsingborg,

More information

NFV: THE MYTH OF APPLICATION-LEVEL HIGH AVAILABILITY

NFV: THE MYTH OF APPLICATION-LEVEL HIGH AVAILABILITY NFV: THE MYTH OF APPLICATION-LEVEL HIGH AVAILABILITY INNOVATORS START HERE. EXECUTIVE SUMMARY Telecom operators want to offer their customers services that perform as expected when the service is requested.

More information

How To Design A Cloud Data Storage Service For A Cloud Computer System

How To Design A Cloud Data Storage Service For A Cloud Computer System Ensuring Security Services for Data Storing and Data Sharing in Cloud Computing D. Raman 1, Bojja Vamshikrishna 2 1 Associate Professor Department of Computer Science and Engineering, Vardhaman College

More information

Resilient deployment of virtual network functions

Resilient deployment of virtual network functions Resilient deployment of virtual network functions Marcus Schöller, Martin Stiemerling, Andreas Ripke NEC Europe Ltd. Heidelberg, Germany Email: marcus.schoeller@neclab.eu Roland Bless Karlsruhe Institute

More information

Data Protection: From PKI to Virtualization & Cloud

Data Protection: From PKI to Virtualization & Cloud Data Protection: From PKI to Virtualization & Cloud Raymond Yeung CISSP, CISA Senior Regional Director, HK/TW, ASEAN & A/NZ SafeNet Inc. Agenda What is PKI? And Value? Traditional PKI Usage Cloud Security

More information

Cloud Infrastructure Services for Service Providers VERYX TECHNOLOGIES

Cloud Infrastructure Services for Service Providers VERYX TECHNOLOGIES Cloud Infrastructure Services for Service Providers VERYX TECHNOLOGIES Meeting the 7 Challenges in Testing and Performance Management Introduction With advent of the cloud paradigm, organizations are transitioning

More information