Draft v0.7 July 27th. The Nature of Cloud

Size: px
Start display at page:

Download "Draft v0.7 July 27th. The Nature of Cloud"

Transcription

1 Global Security Challenges of Cloud Computing Extended Abstract Sadie Creese and Paul Hopkins International Digital Laboratory, WMG, University of Warwick, UK There is no doubt that cloud computing is a major interest for many organisations and individuals. Across the globe massive investment is being made in infrastructure, applications and business models. Currently expectations of the market potential remain high, with Gartner predicting a services market value of $150bn by Security, control of data and privacy are key priorities and concerns for potential users, and in an enterprise environment a potential barrier to uptake 2. Unsurprisingly, the notion of your digital assets residing on infrastructure outside your direct control, and potentially in a geographical location a great distance away, is one which some find hard to accept. So the global nature of the potential cloud ecosystem results in security challenges which, in part, require a globally co-ordinated response. We explore here the requirements for such a response and reflect on the scope of the challenge. The Nature of Cloud Cloud is a utility computing concept, where resources can be consumed on demand, reconfigured and provisioned rapidly 34. Users of cloud can access computing resources via the Internet as opposed to owning and maintaining the resources themselves. This enables a close coupling between consumption of computing resource and investment, delivering a pay-as-you-use effect. Service providers seek to exploit a business model which is scalable due to minimal management effort, maximal automation and capacity balancing across resources. In a mature cloud ecosystem we can expect to see supply chains within the cloud, where service providers purchase additional resources to enable them to meet peeks in demand without having to maintain such capacity in the long term. To achieve the flexible benefits of the cloud, and to receive the best deal as their needs change, consumers of clouds require portability between clouds and the ability to switch suppliers as they see fit. This in turn requires responsiveness of service providers, and interoperability between clouds at many levels from policy to technology. Cloud is not a new technology, but a new business model which both exploits existing technology, such as Service Orientated Architectures (SOAs), GRIDs and Virtualisation, and demands technology innovations, such as portability of virtual machines 5. A variety of service models are envisaged: Software as a Service (SaaS) where applications are hosted and delivered online via a web browser offering traditional desktop functionality such as Internet-based alternatives to popular word processing/collaboration tools. Platform as a Service (PaaS) where the cloud provides the software platform on which systems run (as opposed to just the software as for SaaS). Infrastructure as a Service (IaaS) where a set of computing resources, such as storage and computing capacity, are hosted in the cloud. Virtualisation permits systems to be built in an ad-hoc manner depending upon demand. Customers then deploy and run their own software stacks to run services. Hardware as a Service (HaaS) where the cloud provides dedicated firmware accessible via the Internet. All of the service models could be offered in a public cloud (via the Internet), and also within a private cloud. Due to concerns surrounding security and privacy enterprise cloud users may seek to combine 1 Gartner: Forecast: Sizing the Cloud; Understanding the Opportunities in Cloud Services. March (2009). 2 IDC Enterprise Panel August Vaquero, L.M., Rodero-Merino, Caceres, J. and Lindner, M. A Break in the Clouds: Toward a Cloud Definition ACM SIGCOMM Computer Communication Review Vol 39 No 1 January 2009 pp IEEE (2008) ORGs for Scalable, Robust, Privacy-Friendly Client Cloud Computing at: 5 Distributed management task force - Open Virtualisation Format. 1

2 private clouds and public clouds into hybrid solutions: Utilising resources from a trusted infrastructure (perhaps a single enterprise or within a trusted community) can provide a mechanism for exploiting the benefits of a cloud service model without releasing digital assets into the wild. For less critical assets the Internet based Cloud will provide a service subject to global competition, and so may be more keenly priced as a resource, and offering the most innovative technologies and applications. Clouds will be responsible for not only data assets but also enterprise functionality which will vary in nature of criticality. We can expect a mature cloud ecosystem to include strong alignment between customer and service provider enterprise processes particularly in support of IT governance (to enable maximal automation and agility), and that best practice exist spanning cloud adoption and delivery. In addition, we can predict a number of properties which will be both necessary and challenging for current information assurance and network security practices: Scalability and agility of provision to meet fluctuating demands for resource, likely to include high levels of automation in the service provisioning process. Performance and quality metrics for cloud services, and optimisation techniques for exploitation within an enterprise. Including optimising hybrid cloud configurations within the context of a risk management strategy. Standardised and automated contractual mechanisms, including service level agreements for all types of cloud service offering (and structured to easily accommodate change). The Threat and Vulnerability Environment To understand the scope of the cloud security challenge for any particular deployment we need to understand the risks associated with cloud exploitation for a particular user or enterprise. This necessitates an understanding of impact which is context dependent. However, it is still possible to consider the broad nature of threat and vulnerability likely to be faced in cloud environments. The cloud vulnerability model is likely to be driven by the technology environment and human factors. The range of potential cloud ecosystem realisations span from the siloed adoption witnessed today (think process heavy procurement), to broad exploitation across various enterprise functions with high agility and mobility between service providers. Where investment in portability and interoperability is low then cloud applications are likely to become customised and bespoke as additional features are delivered. Where such investment is high we can expect dynamically composed services, originating from multiple sources, with heavy automation. Exploiting vulnerabilities in bespoke systems will require focused effort, and similar attacks on other systems will require repeated effort. If security investment is high then it too will be bespoke, so making the investment required of an attacker high in order to mount a successful attack. The most successful threats operating in this environment are likely to be those with insider knowledge. If investment in security is low the investment required of a threat is also low, although the potential payback is still limited to the particular target. In contrast, a cloud ecosystem with high mobility, ability and portability will require commonality within the applications used. This could result in systemic vulnerabilities existing, which could become the result of de-skilled attacks and highly available tool kits. Threats are likely to continue to use distributed modes of attack utilising computing resources of unknowing participants. A lack of security investment to remove vulnerabilities, deter their exploitation and detect attacks will mean 2

3 the potential benefits to an attacker are relatively high for little investment. An investment in security would necessitate pushing protection measures down to the data level, in order to maintain security in the face of portability, unless service level agreements can be directly tied to the data which they are in part designed to ensure protection of. Attack patterns are continually evolving, however they are likely to include but won t be limited to: compromise of cloud service integrity leading to confidentiality and data losses; creation of malicious clouds in order to gain access to customer data; denial of service attacks launched upon the provisioning applications of cloud services; denial of service attacks launched from within compromised or malicious clouds preventing customer removal of data sticky clouds ; insider threat attacks on integrity, confidentiality and availability of cloud services and customer data. Global Security Challenges Cloud does have characteristics which could lead to requirements which might be unique, and will certainly stretch existing best practice in a number of areas. For the purposes of this paper we concern ourselves only with those which are likely to require a global collaborative response:: Risk Management Practice Fundamentally security begins with risk management, since it is in the application of a risk management methodology that impact and risk mitigation strategies are identified and aligned. In a cloud environment users will depend upon service providers to implement appropriate controls on their behalf. Hence, the practice of risk management, and the controls and mitigations utilised, will need to be standardised across the cloud ecosystem in order for cloud users to make informed decisions and maintain security postures whilst remaining mobile within the marketplace. In the short term it may be that cloud service providers seek to differentiate themselves based upon the controls they offer to users, and the degree to which users can operate controls remotely. It is unlikely that today s best practice in risk management related to out sourcing will directly translate to a mature cloud ecosystem as this necessitates close relationships with service providers, where culture and vision are aligned, relationships are deepened over time and a trust is built up; staying mobile in the cloud could make risk management based on long term relationships undesirable, and technical prevention techniques and contractual risk mitigation more attractive. But these approaches may be difficult from a personal cloud user perspective. Technical prevention techniques usually require some user control and configuration, as with virus protection for example. Individual users of cyberspace already find tangibility of risk problematic, and often choose not to read the small print in order to gain quick access to the desired service or product. Such issues can simply add to vulnerability in the system, and specific weaknesses may differ across cultures and user groups. Ultimately, whether something is done to address the current status quo (which for many appears to be finger crossing) will be down to the cloud service providers, and hence will depend upon whether they can see a clear business case for change. 3

4 If we consider security requirements from a lifecycle perspective: prevent, detect, respond the following we require addressing in a global manner: Prevention of malicious attack Designing, building and testing cloud systems free of vulnerabilities will be challenging. While scale plays a significant factor, the dynamic composition of services across the host, network and application layers has the potential to increase the attack surface but also increased potential for the mis-configuration of composed services, especially if they are not well defined and rapidly assembled. Previously enclosed functionality is also likely to be exposed to many different consumers to help define and build structured services and, while a number of these issues are coexistent with general SOA research challenges 6, testing remains particularly challenging 7. In addition, providing specific security mechanisms may also require global collaboration. If data protection is to be handled at the data level then portability will be necessary, as with a DRM solution. In a global cloud ecosystem this will require standardisation. It may also be necessary to implement some kind of global identity system to enable traceability and forensic investigations when things go wrong. Whilst a single system is highly unlikely, a federated model will still require collaboration and interoperability. In a mature cloud ecosystem with high mobility of users and agile provisioning it may require interoperability of security policy to enable requirements to be ported between services as users move around. Detection of malicious attack Detection of malicious activity within a cloud may not require a global response (unless the cloud service provider spans nation states in which case privacy laws might need to be aligned). However, collaborative attack detection across clouds will require co-operation. The detection of malicious activity is considered difficult within current enterprise environments, with many (often falsepositive) events arising from applications and dedicated intrusion-detection sensors. It is not clear that current techniques would necessarily read directly across into the cloud environment, with dynamically changing services requiring constant re-learning of traffic patterns, and large -scale events that may need to be collected and filtered. If this is to be achieved in real time then standardisation will be required, and an ability to deliver technology capable of reaching back to originating clouds, and mechanisms for identifying attack sources within the clouds. This will require cooperation between cloud service providers and may be in conflict with privacy policies and mechanisms operated 8,9. Hence, privacy protection will become a global issue for cloud computing. 6 Service-Oriented Computing Research Roadmap, Papazoglou, et Al, Dagstuhl Seminar Proceedings 05462, Service Oriented Computing (SOC), A Research Agenda for Service-Oriented Architecture, Kontogiannis, Lewis, Smith, Software Engineering Institute (CMU) EU FP7 project Privacy Aware Security Monitoring, 9 Craig Gentry, Fully homomorphic encryption using ideal lattices, Proceedings of the 41st annual ACM Symposium on Theory of Computing, pp , June

5 Response to and recovery from malicious attack Whilst disaster recovery, business continuity and resilience are well known concepts, how we deliver them in the context of a public and global cloud environment is not clear. Even if cloud service providers offer mirror sites and distribution functions in order to tolerate failures in their systems and offer continuing service, this cannot offer protection in the face of systemic failures or catastrophic attack. In which case cloud users and consumers will need to consider whether they need to create multiple redundancy effects themselves, possibly in the replication of their use of cloud across heterogeneous vendors (and for the truly paranoid vendors using heterogeneous platforms). This in turn only serves to broaden the potential attack surface, and so the optimal strategy will depend highly upon the perceived level of risk. This is likely to vary and business continuity strategies will need to vary with it. There may be an opportunity for trusted cloud ecosystems to be created, which deliver the benefits of a public cloud but in a private manner. Thus limiting the attack surface in an environment where heterogeneous resources could be utilised and shared in a collaborative manner in order to deliver continuity in the face of malicious attack. These are likely to be at least international, if not global. Legal, regulatory, compliance and audit The legal and regulatory environment is particularly challenging for the highly dynamic and international service offering of clouds potentially spanning multiple legal jurisdictions. The ability to transfer data and deliver services requires a knowledge and conformance to the jurisdictions where data is processed and potentially delivered. Ensuring that privacy laws are adhered to is often recognised as being particularly complex in the cloud environment, applicable to both organisations and individual users of the cloud alike. However, regulatory bodies also place additional requirements for good practice on businesses, and in some countries often set defined practice and impose penalties. While most suppliers will want to ensure that the burden for ensuring compliance and enabling them to be audited falls to the user of the cloud, they will have to provide the practical mechanisms to ensure that it can be done for many businesses and where possible ensure that mechanisms do not conflict. Data retention is one such area where requirements are increasingly being examined from the communications layer up to the provision of services such as . Of particular concern is the ability to conduct activities as part of both criminal and civil investigations. Although currently collaborative frameworks exist for the investigation and pursuit of criminal activities, they are generally found to be inadequate in terms of speed of delivery except in the most serious of cases 12. With cloud data and services are easily distributed across many legal jurisdictions and suppliers understanding the responsibilities and getting the agreement of all parties to assist in gathering and understanding the evidence gathered will be highly challenging. While frameworks exist via Mutual Legal Assistance Treaties (MLATS) for criminal investigations, these prove cumbersome except in the most serious of cases, and nothing equivalent exists to assist for civil procedures. It has been suggested that some new technologies, such as virtualisation, may assist in the investigation of incidents. However, the reality is that they are likely to introduce new challenges 12 R. Anderson,R. Bohm,R. Clayton,T. Moore, Security Economics and the Internal Market,

6 and uncertainty; data may be spread across many different machines and providers and the challenge of assuring that the host was not compromised prior to the forensic investigation will be very difficult to address in the shared environment. Concluding Remarks To degree to which security and privacy concerns will prove a barrier to uptake of cloud services is yet to be fully understood. Published surveys certainly suggest that they will. This has led many to propose private, or semi-private, clouds as an alternative solution. Where using a combination of grid techniques to optimise resource usage within an enterprise, and sharing such resources amongst a trusted group or coalition, can avoid the necessity to place assets in more risky hands. Such propositions can certainly mitigate some risks originating from outsider threats. However, this will not alleviate the pressures to create solutions to portability and interoperability issues if we are to avoid being tied into particular service providers and their preferred technologies and partners. The degree to which global security challenges are also challenges for the private cloud is a topic for future research. 6

How to ensure control and security when moving to SaaS/cloud applications

How to ensure control and security when moving to SaaS/cloud applications How to ensure control and security when moving to SaaS/cloud applications Stéphane Hurtaud Partner Information & Technology Risk Deloitte Laurent de la Vaissière Directeur Information & Technology Risk

More information

Inadequacies of Current Risk Controls for the Cloud

Inadequacies of Current Risk Controls for the Cloud Inadequacies of Current Risk Controls for the Cloud Name: Michael Goldsmith Michael Auty, Sadie Creese and Paul Hopkins Venue: CPSRT@CloudCom2010, Indianapolis Date: 2 December 2010 Research supported

More information

INTRODUCTION TO CLOUD COMPUTING CEN483 PARALLEL AND DISTRIBUTED SYSTEMS

INTRODUCTION TO CLOUD COMPUTING CEN483 PARALLEL AND DISTRIBUTED SYSTEMS INTRODUCTION TO CLOUD COMPUTING CEN483 PARALLEL AND DISTRIBUTED SYSTEMS CLOUD COMPUTING Cloud computing is a model for enabling convenient, ondemand network access to a shared pool of configurable computing

More information

The Massachusetts Open Cloud (MOC)

The Massachusetts Open Cloud (MOC) The Massachusetts Open Cloud (MOC) October 11, 2012 Abstract The Massachusetts open cloud is a new non-profit open public cloud that will be hosted (primarily) at the MGHPCC data center. Its mission is

More information

Information Security: Cloud Computing

Information Security: Cloud Computing Information Security: Cloud Computing Simon Taylor MSc CLAS CISSP CISMP PCIRM Director & Principal Consultant All Rights Reserved. Taylor Baines Limited is a Registered Company in England & Wales. Registration

More information

Cloud Courses Description

Cloud Courses Description Courses Description 101: Fundamental Computing and Architecture Computing Concepts and Models. Data center architecture. Fundamental Architecture. Virtualization Basics. platforms: IaaS, PaaS, SaaS. deployment

More information

The Cadence Partnership Service Definition

The Cadence Partnership Service Definition The Cadence Partnership Service Definition About Cadence The Cadence Partnership is an independent management consultancy, specialising in working with a wide range of organisations, solving complex issues

More information

The NREN s core activities are in providing network and associated services to its user community that usually comprises:

The NREN s core activities are in providing network and associated services to its user community that usually comprises: 3 NREN and its Users The NREN s core activities are in providing network and associated services to its user community that usually comprises: Higher education institutions and possibly other levels of

More information

Ensuring security the last barrier to Cloud adoption

Ensuring security the last barrier to Cloud adoption Ensuring security the last barrier to Cloud adoption Publication date: March 2011 Ensuring security the last barrier to Cloud adoption Cloud computing has powerful attractions for the organisation. It

More information

CPNI VIEWPOINT 01/2010 CLOUD COMPUTING

CPNI VIEWPOINT 01/2010 CLOUD COMPUTING CPNI VIEWPOINT 01/2010 CLOUD COMPUTING MARCH 2010 Acknowledgements This viewpoint is based upon a research document compiled on behalf of CPNI by Deloitte. The findings presented here have been subjected

More information

East African Information Conference 13-14 th August, 2013, Kampala, Uganda. Security and Privacy: Can we trust the cloud?

East African Information Conference 13-14 th August, 2013, Kampala, Uganda. Security and Privacy: Can we trust the cloud? East African Information Conference 13-14 th August, 2013, Kampala, Uganda Security and Privacy: Can we trust the cloud? By Dr. David Turahi Director, Information Technology and Information Management

More information

Open Source Sales Force Automation (SFA) in the Cloud SaaS

Open Source Sales Force Automation (SFA) in the Cloud SaaS Open Source Sales Force Automation (SFA) in the Cloud SaaS Service Overview Our open source Sales Force Automation (SFA) in the cloud service allows customers to perform marketing automation through multi

More information

Leveraging the Private Cloud for Competitive Advantage

Leveraging the Private Cloud for Competitive Advantage Leveraging the Private Cloud for Competitive Advantage Introduction While it is universally accepted that organisations will leverage cloud solutions to service their IT needs, there is a lack of clarity

More information

Cloud Courses Description

Cloud Courses Description Cloud Courses Description Cloud 101: Fundamental Cloud Computing and Architecture Cloud Computing Concepts and Models. Fundamental Cloud Architecture. Virtualization Basics. Cloud platforms: IaaS, PaaS,

More information

Assessing Risks in the Cloud

Assessing Risks in the Cloud Assessing Risks in the Cloud Jim Reavis Executive Director Cloud Security Alliance Agenda Definitions of Cloud & Cloud Usage Key Cloud Risks About CSA CSA Guidance approach to Addressing Risks Research

More information

Emergence of Cloud. Definition. Service Models. Deployment Models. Software as a Service (SaaS) Public Cloud. Platform as a Service (PaaS)

Emergence of Cloud. Definition. Service Models. Deployment Models. Software as a Service (SaaS) Public Cloud. Platform as a Service (PaaS) Forth House 28 Rutland Square Edinburgh, Scotland EH1 2BW 0131 202 6018 www.farrpoint.com The best of both worlds A path to business transformation through the use of Cloud technology The demand for cloud

More information

OWASP Chapter Meeting June 2010. Presented by: Brayton Rider, SecureState Chief Architect

OWASP Chapter Meeting June 2010. Presented by: Brayton Rider, SecureState Chief Architect OWASP Chapter Meeting June 2010 Presented by: Brayton Rider, SecureState Chief Architect Agenda What is Cloud Computing? Cloud Service Models Cloud Deployment Models Cloud Computing Security Security Cloud

More information

Energy Efficient Systems

Energy Efficient Systems Energy Efficient Systems Workshop Report (September 2014) Usman Wajid University of Manchester United Kingdom Produced as a result of Workshop on Energy Efficient Systems @ ICT4S conference, Stockholm

More information

Securing The Cloud. Foundational Best Practices For Securing Cloud Computing. Scott Clark. Insert presenter logo here on slide master

Securing The Cloud. Foundational Best Practices For Securing Cloud Computing. Scott Clark. Insert presenter logo here on slide master Securing The Cloud Foundational Best Practices For Securing Cloud Computing Scott Clark Agenda Introduction to Cloud Computing What is Different in the Cloud? CSA Guidance Additional Resources 2 What is

More information

Cloud Computing and Records Management

Cloud Computing and Records Management GPO Box 2343 Adelaide SA 5001 Tel (+61 8) 8204 8773 Fax (+61 8) 8204 8777 DX:336 srsarecordsmanagement@sa.gov.au www.archives.sa.gov.au Cloud Computing and Records Management June 2015 Version 1 Version

More information

Cloud Computing for SCADA

Cloud Computing for SCADA Cloud Computing for SCADA Moving all or part of SCADA applications to the cloud can cut costs significantly while dramatically increasing reliability and scalability. A White Paper from InduSoft Larry

More information

Data Protection Act 1998. Guidance on the use of cloud computing

Data Protection Act 1998. Guidance on the use of cloud computing Data Protection Act 1998 Guidance on the use of cloud computing Contents Overview... 2 Introduction... 2 What is cloud computing?... 3 Definitions... 3 Deployment models... 4 Service models... 5 Layered

More information

Securing Your Journey to the Cloud. Managing security across platforms today and for the future. Table of Contents

Securing Your Journey to the Cloud. Managing security across platforms today and for the future. Table of Contents P h y s i c a l V i r t u a l - C l o u d Securing Your Journey to the Cloud Managing security across platforms today and for the future Table of Contents Executive summary 1 Journey to the cloud varies,

More information

Cloud Computing and Attacks

Cloud Computing and Attacks Cloud Computing and Attacks Joseph Spring School of Computer Science 7COM1027 - Distributed Systems Security 1 Areas for Discussion Cloud Computing Attacks Firewalls 2 Cloud Computing A Cloud is a large

More information

DOBUS And SBL Cloud Services Brochure

DOBUS And SBL Cloud Services Brochure 01347 812100 www.softbox.co.uk DOBUS And SBL Cloud Services Brochure enquiries@softbox.co.uk DOBUS Overview The traditional DOBUS service is a non-internet reliant, resilient, high availability trusted

More information

Cloud Computing Security Considerations

Cloud Computing Security Considerations Cloud Computing Security Considerations Roger Halbheer, Chief Security Advisor, Public Sector, EMEA Doug Cavit, Principal Security Strategist Lead, Trustworthy Computing, USA January 2010 1 Introduction

More information

IT Governance Regulatory. P.K.Patel AGM, MoF

IT Governance Regulatory. P.K.Patel AGM, MoF IT Governance Regulatory Perspective P.K.Patel AGM, MoF Agenda What is IT Governance? Aspects of IT Governance What banks should consider before implementing these aspects? What banks should do for implementation

More information

LOW RISK ADOPTION OF CLOUD INFRA- STRUCTURE FOR ENTERPRISES

LOW RISK ADOPTION OF CLOUD INFRA- STRUCTURE FOR ENTERPRISES LOW RISK ADOPTION OF CLOUD INFRA- STRUCTURE FOR ENTERPRISES Business leaders are recognising that with the emergence of enterprise grade cloud computing, there is no good reason to continue to invest in

More information

White paper Reaping Business Value from a Hybrid Cloud Strategy

White paper Reaping Business Value from a Hybrid Cloud Strategy White paper Fujitsu Hybrid Cloud Services White paper Reaping Business Value from a Hybrid Cloud Strategy How to embrace a hybrid cloud model to maximize the benefits of public and private cloud services

More information

SaaS or On-Premise? How to Select the Right Paths for Your Enterprise. David Linthicum

SaaS or On-Premise? How to Select the Right Paths for Your Enterprise. David Linthicum SaaS or On-Premise? How to Select the Right Paths for Your Enterprise David Linthicum SaaS or On-Premise? How to Select the Right Paths for Your Enterprise 2 Executive Summary The growth of Software- as-

More information

Alternatives to Legacy IT Systems: An Unbiased Look at the Current State of the Cloud Market

Alternatives to Legacy IT Systems: An Unbiased Look at the Current State of the Cloud Market Alternatives to Legacy IT Systems: An Unbiased Look at the Current State of the Cloud Market 2012 SAVVIS. All Rights Reserved. 1 Executive Summary There are a limited number of technologies which have

More information

Why Cloud CompuTing ThreaTens midsized enterprises and WhaT To do about it

Why Cloud CompuTing ThreaTens midsized enterprises and WhaT To do about it The Cloud Threat Why Cloud CompuTing ThreaTens midsized enterprises and WhaT To do about it This white paper outlines the concerns that often prevent midsized enterprises from taking advantage of the Cloud.

More information

Cloud Security Who do you trust?

Cloud Security Who do you trust? Thought Leadership White Paper Cloud Computing Cloud Security Who do you trust? Nick Coleman, IBM Cloud Security Leader Martin Borrett, IBM Lead Security Architect 2 Cloud Security Who do you trust? Cloud

More information

Accelerate Your Enterprise Private Cloud Initiative

Accelerate Your Enterprise Private Cloud Initiative Cisco Cloud Comprehensive, enterprise cloud enablement services help you realize a secure, agile, and highly automated infrastructure-as-a-service (IaaS) environment for cost-effective, rapid IT service

More information

IBM & Cloud Computing. Smarter Planet. John Easton UK & Ireland Cloud Computing Technical Leader

IBM & Cloud Computing. Smarter Planet. John Easton UK & Ireland Cloud Computing Technical Leader Cloud Getting hold Computing of the cloud: for a & Cloud Computing Smarter Planet John Easton UK & Ireland Cloud Computing Technical Leader Copyright Corporation 2010 Cloud is important to Corporation

More information

WHITE PAPER: STRATEGIC IMPACT PILLARS FOR EFFICIENT MIGRATION TO CLOUD COMPUTING IN GOVERNMENT

WHITE PAPER: STRATEGIC IMPACT PILLARS FOR EFFICIENT MIGRATION TO CLOUD COMPUTING IN GOVERNMENT WHITE PAPER: STRATEGIC IMPACT PILLARS FOR EFFICIENT MIGRATION TO CLOUD COMPUTING IN GOVERNMENT IntelliDyne, LLC MARCH 2012 STRATEGIC IMPACT PILLARS FOR EFFICIENT MIGRATION TO CLOUD COMPUTING IN GOVERNMENT

More information

Security Issues in Cloud Computing

Security Issues in Cloud Computing Security Issues in Computing CSCI 454/554 Computing w Definition based on NIST: A model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources

More information

The Service, The Cloud & The Method: The Connection Points

The Service, The Cloud & The Method: The Connection Points The Service, The Cloud & The Method: The Connection Points Thomas Erl SOA Systems Inc. Prentice Hall Service-Oriented Computing Series Started in 2003 Text Books are an Official Part of the SOACP Curriculum

More information

Specialist Cloud Services Lot 4 Cloud Printing and Imaging Consultancy Services

Specialist Cloud Services Lot 4 Cloud Printing and Imaging Consultancy Services Specialist Cloud Services Lot 4 Cloud Printing and Imaging Consultancy Services Page 1 1 Contents 1 Contents... 2 2 Transcend360 Introduction... 3 3 Service overview... 4 3.1 Service introduction... 4

More information

Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist, CISSP @TheGrantBrown

Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist, CISSP @TheGrantBrown Cyber Resilience Implementing the Right Strategy Grant Brown specialist, CISSP @TheGrantBrown 1 2 Network + Technology + Customers = $$ 3 Perfect Storm? 1) Increase in Bandwidth (extended reach) 2) Available

More information

Cloud Computing in the Enterprise An Overview. For INF 5890 IT & Management Ben Eaton 24/04/2013

Cloud Computing in the Enterprise An Overview. For INF 5890 IT & Management Ben Eaton 24/04/2013 Cloud Computing in the Enterprise An Overview For INF 5890 IT & Management Ben Eaton 24/04/2013 Cloud Computing in the Enterprise Background Defining the Cloud Issues of Cloud Governance Issue of Cloud

More information

Sytorus Information Security Assessment Overview

Sytorus Information Security Assessment Overview Sytorus Information Assessment Overview Contents Contents 2 Section 1: Our Understanding of the challenge 3 1 The Challenge 4 Section 2: IT-CMF 5 2 The IT-CMF 6 Section 3: Information Management (ISM)

More information

Cloud Security Who do you trust?

Cloud Security Who do you trust? Thought Leadership White Paper Cloud Computing Cloud Security Who do you trust? Nick Coleman, IBM Cloud Security Leader Martin Borrett, IBM Lead Security Architect 2 Cloud Security Who do you trust? Cloud

More information

TBR. Open Standards Are Dissolving Cloud Silos. May 2012. Author: Elizabeth Hedstrom Henlin, Software Analyst elizabeth.hedstromhenlin@tbri.

TBR. Open Standards Are Dissolving Cloud Silos. May 2012. Author: Elizabeth Hedstrom Henlin, Software Analyst elizabeth.hedstromhenlin@tbri. Open Standards Are Dissolving Cloud Silos May 2012 Author: Elizabeth Hedstrom Henlin, Software Analyst elizabeth.hedstromhenlin@tbri.com TBR T EC H N O LO G Y B U S I N ES S R ES EAR C H, I N C. Contents

More information

Strategies for assessing cloud security

Strategies for assessing cloud security IBM Global Technology Services Thought Leadership White Paper November 2010 Strategies for assessing cloud security 2 Securing the cloud: from strategy development to ongoing assessment Executive summary

More information

How To Make Money From Your Desktop Virtualisation

How To Make Money From Your Desktop Virtualisation Shaping the future of end user services Desktop Virtualisation Seize opportunities before others see them Remember the not-too-distant past?» Traditional thin client systems struggled to gain wide acceptance,

More information

Securing Your Data In The Cloud: an insiders perspective

Securing Your Data In The Cloud: an insiders perspective Securing Your Data In The Cloud: an insiders perspective INTRODUCTION As the increasing use of cloud computing and other technologies is changing the world of data management, keeping your data private

More information

CLOUD MIGRATION. Celina Alexandre M6807

CLOUD MIGRATION. Celina Alexandre M6807 CLOUD MIGRATION M6807 S Content 1. Introduction 2. Methodology 3. Requirements Definition Phase 3.1. Strategy 3.2. Knowledge 06/05/15 2 Content 4. Analysis Phase 4.1. Aplications and Systems 4.2. Development

More information

Cloud computing: benefits, risks and recommendations for information security

Cloud computing: benefits, risks and recommendations for information security Cloud computing: benefits, risks and recommendations for information security Dr Giles Hogben Secure Services Programme Manager European Network and Information Security Agency (ENISA) Goals of my presentation

More information

Cloud, where are we? Mark Potts, HP Fellow, CTO Cloud November 2014

Cloud, where are we? Mark Potts, HP Fellow, CTO Cloud November 2014 Cloud, where are we? Mark Potts, HP Fellow, CTO Cloud November 2014 What do the experts say? 3 4 This graphic was published by Gartner, Inc. as part of a larger research document and should be evaluated

More information

Using the Cloud to fill the void between the business and the IT Department

Using the Cloud to fill the void between the business and the IT Department Using the Cloud to fill the void between the business and the IT Department David Bennett IT Consultant david.bennett@changeharbour.com Agenda The legal services market Business demands on the IT Department

More information

Infopaper. Demystifying Platform as a Service

Infopaper. Demystifying Platform as a Service Demystifying Platform as a Service The dividing lines between PaaS and IaaS may be blurring, but it s important for outsourcers of IT infrastructure to understand what sets Private PaaS apart from commodity

More information

Cloud Computing Evolution Not Revolution

Cloud Computing Evolution Not Revolution Cloud Computing Evolution Not Revolution Craig Magee Head of Global Infrastructure Strategy & Architecture ANZ Banking Group 26 November 2010 Cloud Computing Evolution Not Revolution Ontology Evolutionary

More information

IT Services. Capita Private Cloud. Cloud potential unleashed

IT Services. Capita Private Cloud. Cloud potential unleashed IT Services Capita Private Cloud Cloud potential unleashed Cloud computing at its best Cloud is fast becoming an integral part of every IT strategy. It reduces cost and complexity, whilst bringing freedom,

More information

What Cloud computing means in real life

What Cloud computing means in real life ITU TRCSL Symposium on Cloud Computing Session 2: Cloud Computing Foundation and Requirements What Cloud computing means in real life Saman Perera Senior General Manager Information Systems Mobitel (Pvt)

More information

Successful Strategies for Implementing SaaS/Cloud Solutions in Healthcare

Successful Strategies for Implementing SaaS/Cloud Solutions in Healthcare Successful Strategies for Implementing SaaS/Cloud Solutions in Healthcare WHITEPAPER Executive Summary As healthcare organizations struggle with competing priorities such as HITECH/ARRA, Meaningful option

More information

CYBERSECURITY IN FINANCIAL SERVICES POINT OF VIEW CHALLENGE 1 REGULATORY COMPLIANCE ACROSS GEOGRAPHIES

CYBERSECURITY IN FINANCIAL SERVICES POINT OF VIEW CHALLENGE 1 REGULATORY COMPLIANCE ACROSS GEOGRAPHIES POINT OF VIEW CYBERSECURITY IN FINANCIAL SERVICES Financial services institutions are globally challenged to keep pace with changing and covert cybersecurity threats while relying on traditional response

More information

Industry. Head of Research Service Desk Institute

Industry. Head of Research Service Desk Institute Asset Management in the ITSM Industry Prepared by Daniel Wood Head of Research Service Desk Institute Sponsored by Declaration We believe the information in this document to be accurate, relevant and truthful

More information

Securing business data. CNS White Paper. Cloud for Enterprise. Effective Management of Data Security

Securing business data. CNS White Paper. Cloud for Enterprise. Effective Management of Data Security Securing business data CNS White Paper Cloud for Enterprise Effective Management of Data Security Jeff Finch, Head of Business Development, CNS Mosaic 2nd July 2015 Contents 1 Non-Disclosure Statement...

More information

Cloud Services. More agility. More freedom. More choice.

Cloud Services. More agility. More freedom. More choice. Cloud Services More agility. More freedom. More choice. What is cloud computing? No longer on the horizon: the cloud has come to business computing. Why consider moving to a cloud model? Why now? Cloud

More information

How To Protect Your Cloud From Attack

How To Protect Your Cloud From Attack A Trend Micro White Paper August 2015 Trend Micro Cloud Protection Security for Your Unique Cloud Infrastructure Contents Introduction...3 Private Cloud...4 VM-Level Security...4 Agentless Security to

More information

An example ITIL -based model for effective Service Integration and Management. Kevin Holland. AXELOS.com

An example ITIL -based model for effective Service Integration and Management. Kevin Holland. AXELOS.com An example ITIL -based model for effective Service Integration and Management Kevin Holland AXELOS.com White Paper April 2015 Contents Introduction to Service Integration and Management 4 An example SIAM

More information

What Does Cloud Computing Mean for the Indian Army?

What Does Cloud Computing Mean for the Indian Army? What Does Cloud Computing Mean for the Indian Army? Sanjay Sethi A YouTube video 1 buzzing on the Internet, and received by me from one of my Higher Defence Management Course mates motivated me to pen

More information

Bimodal IT. PaaS and Containers, what are they all about? By Rhys Sharp Chief Technology Officer. August 2015

Bimodal IT. PaaS and Containers, what are they all about? By Rhys Sharp Chief Technology Officer. August 2015 Bimodal IT PaaS and Containers, what are they all about? By Rhys Sharp Chief Technology Officer August 2015 Bimodal IT - Paas and Containers, what are they all about? www.fedr8.com 1 Introduction The IT

More information

Cloud Computing in a Government Context

Cloud Computing in a Government Context Cloud Computing in a Government Context Introduction There has been a lot of hype around cloud computing to the point where, according to Gartner, 1 it has become 'deafening'. However, it is important

More information

AVAILABILITY SERVICES CLouD SECuRITY

AVAILABILITY SERVICES CLouD SECuRITY AVAILABILITY SERVICES CLouD SECuRITY Buyer Be aware There is one simple but golden tenet: security in the cloud is exactly the same as security in a physical shared environment and should be approached

More information

Big Data, Big Risk, Big Rewards. Hussein Syed

Big Data, Big Risk, Big Rewards. Hussein Syed Big Data, Big Risk, Big Rewards Hussein Syed Discussion Topics Information Security in healthcare Cyber Security Big Data Security Security and Privacy concerns Security and Privacy Governance Big Data

More information

itg CloudBase is a suite of fully managed Hybrid & Private Cloud Services ready to support your business onwards and upwards into the future.

itg CloudBase is a suite of fully managed Hybrid & Private Cloud Services ready to support your business onwards and upwards into the future. Web Filtering Email Filtering Mail Archiving Cloud Backup Disaster Recovery Virtual Machines Private Cloud itg CloudBase is a suite of fully managed Hybrid & Private Cloud Services ready to support your

More information

JISC. Technical Review of Using Cloud for Research. Guidance Notes to Cloud Infrastructure Service Providers. Introduction

JISC. Technical Review of Using Cloud for Research. Guidance Notes to Cloud Infrastructure Service Providers. Introduction JISC Technical Review of Using Cloud for Research Guidance Notes to Cloud Infrastructure Service Providers May, 2010 Introduction Provisioning and maintenance of research computing facilities is a core

More information

Keywords: Cloud computing, Characteristics of Cloud computing, Models of Cloud computing, Distance learning, Higher education.

Keywords: Cloud computing, Characteristics of Cloud computing, Models of Cloud computing, Distance learning, Higher education. Volume 5, Issue 6, June 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Analysis of Cloud

More information

A white paper from Fordway on CLOUD COMPUTING. Why private cloud should be your first step on the cloud computing journey - and how to get there

A white paper from Fordway on CLOUD COMPUTING. Why private cloud should be your first step on the cloud computing journey - and how to get there A white paper from Fordway on CLOUD COMPUTING Why private cloud should be your first step on the cloud computing journey - and how to get there PRIVATE CLOUD WHITE PAPER January 2012 www.fordway.com Page

More information

IT Enterprise Services

IT Enterprise Services IT Enterprise Services Capita Private Cloud Agile Infrastructure-as-a-Service (IaaS) Cloud potential unleashed Cloud computing at its best Cloud is now an integral part of every IT strategy. It reduces

More information

THOUGHT LEADERSHIP. Journey to Cloud 9. Navigating a path to secure cloud computing. Alastair Broom Solutions Director, Integralis

THOUGHT LEADERSHIP. Journey to Cloud 9. Navigating a path to secure cloud computing. Alastair Broom Solutions Director, Integralis Journey to Cloud 9 Navigating a path to secure cloud computing Alastair Broom Solutions Director, Integralis March 2012 Navigating a path to secure cloud computing 2 Living on Cloud 9 Cloud computing represents

More information

White Paper on CLOUD COMPUTING

White Paper on CLOUD COMPUTING White Paper on CLOUD COMPUTING INDEX 1. Introduction 2. Features of Cloud Computing 3. Benefits of Cloud computing 4. Service models of Cloud Computing 5. Deployment models of Cloud Computing 6. Examples

More information

Cloud Computing: Contracting and Compliance Issues for In-House Counsel

Cloud Computing: Contracting and Compliance Issues for In-House Counsel International In-house Counsel Journal Vol. 6, No. 23, Spring 2013, 1 Cloud Computing: Contracting and Compliance Issues for In-House Counsel SHAHAB AHMED Director Legal and Corporate Affairs, Microsoft,

More information

I D C A N A L Y S T C O N N E C T I O N

I D C A N A L Y S T C O N N E C T I O N I D C A N A L Y S T C O N N E C T I O N Robert Westervelt Research Manager, Security Products T h e R o l e a nd Value of Continuous Security M o nitoring August 2015 Continuous security monitoring (CSM)

More information

Technology Strategy April 2014

Technology Strategy April 2014 Technology Strategy April 2014 Contents Overview 1 Our environment 1 Why change? 2 Our vision for technology what success looks like 3 Our approach 7 Transformation shifts how will we know we have been

More information

Guardian365. Managed IT Support Services Suite

Guardian365. Managed IT Support Services Suite Guardian365 Managed IT Support Services Suite What will you get from us? Award Winning Team Deloitte Best Managed Company in 2015. Ranked in the Top 3 globally for Best Managed Service Desk by the Service

More information

Cube52 Cloud. Infrastructure as a Service. The Challenge

Cube52 Cloud. Infrastructure as a Service. The Challenge Infrastructure as a Service CIOs today find themselves at a junction with regard to how they deploy resources. Some keep all their IT in house to retain control while others turn towards cloud computing

More information

CLOUD SECURITY SECURITY ASPECTS IN GEOSPATIAL CLOUD. Guided by Prof. S. K. Ghosh Presented by - Soumadip Biswas

CLOUD SECURITY SECURITY ASPECTS IN GEOSPATIAL CLOUD. Guided by Prof. S. K. Ghosh Presented by - Soumadip Biswas CLOUD SECURITY SECURITY ASPECTS IN GEOSPATIAL CLOUD Guided by Prof. S. K. Ghosh Presented by - Soumadip Biswas PART 1 A brief Concept of cloud Issues in cloud Security Issues A BRIEF The Evolution Super

More information

Clouds on the Horizon Cloud Security in Today s DoD Environment. Bill Musson Security Analyst

Clouds on the Horizon Cloud Security in Today s DoD Environment. Bill Musson Security Analyst Clouds on the Horizon Cloud Security in Today s DoD Environment Bill Musson Security Analyst Agenda O Overview of Cloud architectures O Essential characteristics O Cloud service models O Cloud deployment

More information

SAA Consultants. B2B Exchange Management. Managed File Transfer. Enterprise Application Integration Management. Compliant Audit Security Management

SAA Consultants. B2B Exchange Management. Managed File Transfer. Enterprise Application Integration Management. Compliant Audit Security Management SAA Consultants B2B Exchange Management Managed File Transfer Enterprise Application Integration Management Compliant Audit Security Management Secure Commerce Delivering improved efficiency via products

More information

A Look into the Cloud

A Look into the Cloud A Look into the Cloud An Allstream White Paper 1 Table of contents Why is everybody talking about the cloud? 1 Trends driving the move to the cloud 1 What actually is the cloud? 2 Private and public clouds

More information

How To Protect Your Cloud Computing Resources From Attack

How To Protect Your Cloud Computing Resources From Attack Security Considerations for Cloud Computing Steve Ouzman Security Engineer AGENDA Introduction Brief Cloud Overview Security Considerations ServiceNow Security Overview Summary Cloud Computing Overview

More information

GETRONICS: A BALANCED CLOUD POSITION

GETRONICS: A BALANCED CLOUD POSITION GETRONICS: A BALANCED CLOUD POSITION GETRONICS: A BALANCED CLOUD POSITION IN DISCUSSIONS WITH OUR CLIENTS, CLOUD STRATEGY IS REGULARLY TOP OF THE AGENDA. BUT CLOUD CAN BE A DILEMMA FOR SENIOR ENTERPRISE

More information

Datosphere Platform Product Brief

Datosphere Platform Product Brief Datosphere Platform Product Brief No organization is immune to the explosive growth in the volume of electronically stored information (ESI). The rapid growth of ESI is having a tangible impact upon organizations

More information

Capturing the New Frontier:

Capturing the New Frontier: Capturing the New Frontier: How Software Security Unlocks the Power of Cloud Computing Executive Summary Cloud computing is garnering a vast share of IT interest. Its promise of revolutionary cost savings

More information

The sky s the limit: How medium-sized businesses can capitalise on the cloud to propel business growth. A white paper by Pegasus Software

The sky s the limit: How medium-sized businesses can capitalise on the cloud to propel business growth. A white paper by Pegasus Software The sky s the limit: How medium-sized businesses can capitalise on the cloud to propel business growth A white paper by Pegasus Software Cloud: a definition The term Cloud Computing refers to software,

More information

White Paper: Cloud Security. Cloud Security

White Paper: Cloud Security. Cloud Security White Paper: Cloud Security Cloud Security Introduction Due to the increase in available bandwidth and technological advances in the area of virtualisation, and the desire of IT managers to provide dynamically

More information

Using Cloud Computing to Drive Innovation: Technological Opportunities and

Using Cloud Computing to Drive Innovation: Technological Opportunities and Using Cloud Computing to Drive Innovation: Technological Opportunities and Management Challenges Edgar A. Whitley Based on work with Leslie P Willcocks and Will Venters MSc Management, Information Systems

More information

CAPABILITY STATEMENT

CAPABILITY STATEMENT WHO WE ARE UberGlobal Enterprise is the dedicated government and enterprise business division of Australian web service provider, UberGlobal. UberGlobal was founded through the merger of a number of medium

More information

Cloud Computing in a Regulated Environment

Cloud Computing in a Regulated Environment Computing in a Regulated Environment White Paper by David Stephenson CTG Regulatory Compliance Subject Matter Expert February 2014 CTG (UK) Limited, 11 Beacontree Plaza, Gillette Way, READING, Berks RG2

More information

Module 1: Facilitated e-learning

Module 1: Facilitated e-learning Module 1: Facilitated e-learning CHAPTER 3: OVERVIEW OF CLOUD COMPUTING AND MOBILE CLOUDING: CHALLENGES AND OPPORTUNITIES FOR CAs... 3 PART 1: CLOUD AND MOBILE COMPUTING... 3 Learning Objectives... 3 1.1

More information

One Cloud doesn t fit all:

One Cloud doesn t fit all: One Cloud doesn t fit all: The emerging trends in multi-vendor cloud platforms To cloud or not to cloud is no longer the question. Organisations have moved beyond the deliberation stage, and with many

More information

security in the cloud White Paper Series

security in the cloud White Paper Series security in the cloud White Paper Series 2 THE MOVE TO THE CLOUD Cloud computing is being rapidly embraced across all industries. Terms like software as a service (SaaS), infrastructure as a service (IaaS),

More information

HIPAA CRITICAL AREAS TECHNICAL SECURITY FOCUS FOR CLOUD DEPLOYMENT

HIPAA CRITICAL AREAS TECHNICAL SECURITY FOCUS FOR CLOUD DEPLOYMENT HIPAA CRITICAL AREAS TECHNICAL SECURITY FOCUS FOR CLOUD DEPLOYMENT A Review List This paper was put together with Security in mind, ISO, and HIPAA, for guidance as you move into a cloud deployment Dr.

More information

Private & Hybrid Cloud: Risk, Security and Audit. Scott Lowry, Hassan Javed VMware, Inc. March 2012

Private & Hybrid Cloud: Risk, Security and Audit. Scott Lowry, Hassan Javed VMware, Inc. March 2012 Private & Hybrid Cloud: Risk, Security and Audit Scott Lowry, Hassan Javed VMware, Inc. March 2012 Private and Hybrid Cloud - Risk, Security and Audit Objectives: Explain the technology and benefits behind

More information

Introduction to SOA governance and service lifecycle management.

Introduction to SOA governance and service lifecycle management. -oriented architecture White paper March 2009 Introduction to SOA governance and Best practices for development and deployment Bill Brown, executive IT architect, worldwide SOA governance SGMM lead, SOA

More information