Hierarchical Secure Information and Resource Sharing in OpenStack Community Cloud

Size: px
Start display at page:

Download "Hierarchical Secure Information and Resource Sharing in OpenStack Community Cloud"

Transcription

1 Hierarchical Secure Information and Resource Sharing in OpenStack Community Cloud Cyber Incident Response An Model for Information and Resource Sharing Amy(Yun) Zhang, Farhan Patwa, Ravi Sandhu, Bo Tang Institute for Cyber Security University of Texas at San Antonio Aug 15, 2015 Presented by: Amy(Yun) Zhang

2 Community Cloud Community cloud provides services for exclusive use by a specific community, which contains organizations with shared concern, such as mission, security requirements, business models, etc. A community of financial organizations OpenStack 2

3 Cyber Collaboration Initiatives Cyber attacks are becoming increasingly sophisticated. Hard to defend by a single organization on its own. Collaborate to enhance situational awareness Share cyber information in community Malicious activities Technologies, tools, procedures, analytics. 3 Ref:

4 Traditional Cyber Collaboration Traditional collaboration Subscription services Limitations Organizations Sharing information through subscription. Organizations are not actively participating in analyzing and processing the cyber information they submit. Organizations don't directly interact with each other on sharing activities. 4

5 Cyber Collaboration in Community Cloud Cloud platform (community) Cyber Security Committee. Organizations routinely collect cyber information. Cross organization cyber collaborations. 5

6 Community Cyber Incident Response Governance Incident Response Group Cyber Security Committee Organization Security Specialists External Experts Conditional Membership Shared Information 6

7 Assumptions and Scope In a community cloud platform OpenStack Sharing amongst a set of organizations Sensitive cyber information, infrastructure, tools, analytics, etc. May share malicious or infected code/systems (e.g. virus, worms, etc.) Focus on access control model 7

8 OpenStack Dominant open-source cloud IaaS software OpenStack software controls large pools of compute, storage, and networking resources throughout a datacenter, managed through a dashboard or via the OpenStack API.!!!!!! Ref: 8

9 OpenStack HMT HMT : Hierarchical Multitenancy D Cloud Domain 1 Domain n Project 1 Project p Project 1 Project q childproject 1 childproject k child childproject 1 child childproject l 9

10 OSAC Model with HMT Project Hiearachy: Role Inheritance: One-to-one relation: One-to-multiple relation: Multiple-to-multiple relation: Group (GO) Domains (D) ot_service Services (S) Group (UG) Groups (G) s (U) (UO) Group Assignment (GA) Assignment (UA) token_project Projects (P) Project (PO) Project-Role Pair (PRP) token_roles Roles (R) Permission Assignment (PA) PRMS Object Types (OT) Operations (OP) user_token Tokens (T) 10

11 OSAC-HMT-SID Model 11 s (U) Project-Role Pair (PRP) Security Projects (SP) Roles (R) Project-Role Pair (PRP) Projects (P) Roles (R) (UO) Assignment (UA) Assignment (UA) Self Subscription (USS) Assignment (UA) SIP (SIPO) Secure Isolated Domain (SID) Project-Role Pair (PRP) Expert (EUO) Open Project (OPO) Security Project (SPO) Project-Role Pair (PRP) Secure Isolated Projects (SIP) Roles (R) Open Project (OP) Roles (R) Domains (D) Cyber Collaboration Routine Cyber Information Process Expert s Project (PO) Assignment (UA) Cyber Security Forum Project-Role Pair (PRP) Core Project (CP) Roles (R) Cyber Security Committee Core Project (CPO) Assignment (UA) SIP association (assoc)

12 OSAC-HMT-SID Administration Relation and Resources Cloud admin Domain admin SID admin (Cloud admin) Project admin Security Project admin Core Project admin SIP admin Community Cloud Domains SID Projects Secure Projects Core Project Open Project child Projects child Secure Projects SIPs child SIPs 12

13 OSAC-SID Administrative Model SipCreate(uSet, sip) /* A subset of Core Project/domain admin users together create a sip */ SipDelete(uSet, sip) /* The same subset of Core Project/domain admin users together delete a sip*/ Add(adminuser, r, u, sp, p) /* CP/Sip admin can add a user from his home domain Security Project to CP/sip*/ Remove(adminuser, r, u, sp, p) /* CP/Sip admin can remove a user from the Core Project/sip */ OpenSubscribe(u, member, OP) /* s subscribe to Open Project */ OpenUnsubscribe(u, member, OP) /* s unsubcsribe from Open Project */ CopyObject(u, so1, sp, so2, p) /* Copy object from Security Project to Core Project/SIP */ ExportObject(adminuser, so1, p, so2, sp) /* Export object from Core Project/SIP to Security Project */ ExpertCreate(coreadmin, eu) /* Core Project admin users can create an expert user */ ExpertDelete(coreadmin, eu) /* Core Project admin users can delete an expert user */ ExpertList(adminuser) /* Admin users of Core Project and SIPs can list expert users */ ExpertAdd(adminuser, r, eu, proj) /* Core Project/sip admin can add an expert user to Core Project/sip*/ ExpertRemove(adminuser, r, eu, proj) /* Core Project/sip admin can remove an expert user from Core Project/sip */ 13

14 Enforcement Set up the cloud Assign an admin user as Community Cloud:Cloud Admin Domains:Domain Admin Assign domain admins as SID:Cloud Admin Assign domain admins as Security Project: Admin/member Assign users from domains as Core Project: Admin Admin user assign users to SP as member Open Project: member Assign users from home domain as Assign expert users as Core Project: member 14

15 Enforcement SID: Cloud Admin Assign domain admins as Create SIP/child SIP/, assign domain admins as Core Project: Admin Assign users from home domain as Assign expert users as Core Project: member SIP: Admin Assign users from home domain as Assign expert users as child SIP: Admin SIP: member Assign users from home domain as Assign expert users as child SIP s child SIP: Admin child SIP: member Assign users from home domain as Assign expert users as child SIP s child SIP: member 15

16 Conclusion and future work Suggested OSAC-HMT-SID model to OpenStack Cyber collaboration across organizations cyber incident response Self-service Cyber Security Committee. Share data, tools, vms, etc. Potential blueprint for official OpenStack adoption Future work Explore other model options. Explore local roles in the model. Explore models in other dominant cloud platforms. 16

17 Thanks! 17

Hierarchical Secure Information and Resource Sharing in OpenStack Community Cloud

Hierarchical Secure Information and Resource Sharing in OpenStack Community Cloud Hierarchical Secure Information and Resource Sharing in OpenStack Community Cloud Yun Zhang, Farhan Patwa, Ravi Sandhu and Bo Tang Institute for Cyber Security and Department of Computer Science University

More information

Cyber Incident Response

Cyber Incident Response Secure Information Sharing for Cyber Response Teams Cyber Incident Response Models and Platforms for Information and Resource Sharing UTSA Team Ram Krishnan, Assistant Professor (ECE) Ravi Sandhu, Professor

More information

Community-Based Secure Information and Resource Sharing in Azure Cloud IaaS

Community-Based Secure Information and Resource Sharing in Azure Cloud IaaS Community-Based Secure Information and Sharing in Azure Cloud IaaS Yun Zhang Institute for Cyber Security Univ of Texas at San Antonio San Antonio, TX 78249 amy.u.zhang@gmail.com Farhan Patwa Institute

More information

Extending OpenStack Access Control with Domain Trust

Extending OpenStack Access Control with Domain Trust Extending OpenStack Access Control with Domain Trust Bo Tang and Ravi Sandhu Institute for Cyber Security and Department of Computer Science University of Texas at San Antonio, One UTSA Circle, San Antonio,

More information

Protect Everything: Networks, Applications and Cloud Services

Protect Everything: Networks, Applications and Cloud Services Protect Everything: Networks, Applications and Cloud Services Tokens & Users Cloud Applications Private Networks Corporate Network API LDAP / Active Directory SAML RADIUS Corporate Network LDAP / Active

More information

Security and Cloud Computing

Security and Cloud Computing Martin Borrett, Lead Security Architect, Europe, IBM 9 th December 2010 Outline Brief Introduction to Cloud Computing Security: Grand Challenge for the Adoption of Cloud Computing IBM and Cloud Security

More information

Microsoft Private Cloud

Microsoft Private Cloud Microsoft Private Cloud Lorenz Wolf, Solution Specialist Datacenter, Microsoft SoftwareOne @ Au Premier Zürich - 22.03.2011 What is PRIVATE CLOUD Private Public Public Cloud Private Cloud shared resources.

More information

Cloud security and OpenStack Primož Cigoj Laboratorij za odprte sisteme in mreže IJS-E5. www.kc-class.eu

Cloud security and OpenStack Primož Cigoj Laboratorij za odprte sisteme in mreže IJS-E5. www.kc-class.eu Cloud security and OpenStack Primož Cigoj Laboratorij za odprte sisteme in mreže IJS-E5 www.kc-class.eu 1 1 Outline Cloud computing General overview Deployment and service models Security issues Threats

More information

Securing the Cloud through Comprehensive Identity Management Solution

Securing the Cloud through Comprehensive Identity Management Solution Securing the Cloud through Comprehensive Identity Management Solution Millie Mak Senior IT Specialist What is Cloud Computing? A user experience and a business model Cloud computing is an emerging style

More information

Healthcare: La sicurezza nel Cloud October 18, 2011. 2011 IBM Corporation

Healthcare: La sicurezza nel Cloud October 18, 2011. 2011 IBM Corporation Healthcare: La sicurezza nel Cloud October 18, 2011 Cloud Computing Tests The Limits Of Security Operations And Infrastructure Security and Privacy Domains People and Identity Data and Information Application

More information

Cloud Security Introduction and Overview

Cloud Security Introduction and Overview Introduction and Overview Klaus Gribi Senior Security Consultant klaus.gribi@swisscom.com May 6, 2015 Agenda 2 1. Cloud Security Cloud Evolution, Service and Deployment models Overview and the Notorious

More information

A Formal Model for Isolation Management in Cloud Infrastructure-as-a-Service

A Formal Model for Isolation Management in Cloud Infrastructure-as-a-Service A Formal Model for Isolation Management in Cloud Infrastructure-as-a-Service Khalid Zaman Bijon 1, Ram Krishnan 2, and Ravi Sandhu 1 1 Institute for Cyber Security & Department of Computer Science, 2 Institute

More information

Red Hat CloudForms Roadmap Build & Manage an Open Hybrid Infrastructure. Xavier Lecauchois & John Hardy Product Management, Red Hat June 12, 2013

Red Hat CloudForms Roadmap Build & Manage an Open Hybrid Infrastructure. Xavier Lecauchois & John Hardy Product Management, Red Hat June 12, 2013 Red Hat CloudForms Roadmap Build & Manage an Open Hybrid Infrastructure Xavier Lecauchois & John Hardy Product Management, Red Hat June 12, 2013 Agenda The Role of I.T. is changing Hybrid Clouds Red Hat

More information

The Science, Engineering, and Business of Cyber Security

The Science, Engineering, and Business of Cyber Security Institute for Cyber Security The Science, Engineering, and Business of Cyber Security Prof. Ravi Sandhu Executive Director, Institute for Cyber Security Lutcher Brown Endowed Chair in Cyber Security COS

More information

IBM Cloud Security Draft for Discussion September 12, 2011. 2011 IBM Corporation

IBM Cloud Security Draft for Discussion September 12, 2011. 2011 IBM Corporation IBM Cloud Security Draft for Discussion September 12, 2011 IBM Point of View: Cloud can be made secure for business As with most new technology paradigms, security concerns surrounding cloud computing

More information

Role and Attribute Based Collaborative Administration of Intra-Tenant Cloud IaaS

Role and Attribute Based Collaborative Administration of Intra-Tenant Cloud IaaS Role and Attribute Based Collaborative Administration of Intra-Tenant Cloud IaaS Xin Jin Department of Computer Science Institute for Cyber Security University of Texas at San Antonio San Antonio, Texas

More information

HBC1533 - How to build your cloud - Steps to Extend your Datacenter

HBC1533 - How to build your cloud - Steps to Extend your Datacenter VMworld 2014 Page 1 HBC1533 - How to build your cloud - Steps to Extend your Datacenter Tuesday, 14 October 2014 14:00 Dave Hill, VMware 5 key steps to Hybrid DC A thing made by combining two different

More information

Security Compliance Auditing of Identity and Access Management in the Cloud: Application to OpenStack

Security Compliance Auditing of Identity and Access Management in the Cloud: Application to OpenStack Security Compliance Auditing of Identity and Access Management in the Cloud: Application to OpenStack Suryadipta Majumdar, Taous Madi, Yushun Wang, Yosr Jarraya, Makan Pourzandi, Lingyu Wang and Mourad

More information

The Cloud, Virtualization, and Security

The Cloud, Virtualization, and Security A Cloud: Large groups of remote servers that are networked to allow centralized, shared data storage and online access to computer services or resources A Cloud: Large groups of remote servers that are

More information

Cyber Security Symposium 2015 September 29,2015

Cyber Security Symposium 2015 September 29,2015 Cyber Security Symposium 2015 September 29,2015 Introducing David Langston Branch Manager Security Management Department of Technology 2 About CalCloud Mission Offer cost-effective cloud solutions that

More information

HP CloudSystem Enterprise

HP CloudSystem Enterprise Technical white paper HP CloudSystem Enterprise Creating a multi-tenancy solution with HP Matrix Operating Environment and HP Cloud Service Automation Table of contents Executive summary 2 Multi-tenancy

More information

Authorization Federation in IaaS Multi Cloud

Authorization Federation in IaaS Multi Cloud Authorization Federation in IaaS Multi Cloud Navid Pustchi, Ram Krishnan and Ravi Sandhu SCC 2015 1 Why Multi Cloud? Collaboration of organizations across clouds. Organizations with resources across multiple

More information

1 What is Cloud Computing?... 2 2 Cloud Infrastructures... 2 2.1 OpenStack... 2 2.2 Amazon EC2... 4 3 CAMF... 5 3.1 Cloud Application Management

1 What is Cloud Computing?... 2 2 Cloud Infrastructures... 2 2.1 OpenStack... 2 2.2 Amazon EC2... 4 3 CAMF... 5 3.1 Cloud Application Management 1 What is Cloud Computing?... 2 2 Cloud Infrastructures... 2 2.1 OpenStack... 2 2.2 Amazon EC2... 4 3 CAMF... 5 3.1 Cloud Application Management Frameworks... 5 3.2 CAMF Framework for Eclipse... 5 3.2.1

More information

Het is een kleine stap naar een hybrid cloud

Het is een kleine stap naar een hybrid cloud Het is een kleine stap naar een hybrid cloud Isabel Moll-Kranenburg Microsoft 14 jaar IT industrie 4 jaar Microsoft Cloud Private Private Cloud Meeting customers where they are The Microsoft Cloud Computing

More information

MULTI-TENANT ACCESS CONTROL FOR CLOUD SERVICES

MULTI-TENANT ACCESS CONTROL FOR CLOUD SERVICES MULTI-TENANT ACCESS CONTROL FOR CLOUD SERVICES APPROVED BY SUPERVISING COMMITTEE: Ravi Sandhu, Ph.D., Chair Kay A. Robbins, Ph.D. Gregory B. White, Ph.D. Weining Zhang, Ph.D. Jaehong Park, Ph.D. Accepted:

More information

Intel IT Cloud 2013 and Beyond. Name Title Month, Day 2013

Intel IT Cloud 2013 and Beyond. Name Title Month, Day 2013 Intel IT Cloud 2013 and Beyond Name Title Month, Day 2013 Legal Notices This presentation is for informational purposes only. INTEL MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS SUMMARY. Intel and the

More information

IPOP-TinCan: User-defined IP-over-P2P Virtual Private Networks

IPOP-TinCan: User-defined IP-over-P2P Virtual Private Networks IPOP-TinCan: User-defined IP-over-P2P Virtual Private Networks Renato Figueiredo Advanced Computing and Information Systems Lab University of Florida ipop-project.org Unit 3: Intra-cloud Virtual Networks

More information

MS 20246C Monitoring and Operating a Private Cloud

MS 20246C Monitoring and Operating a Private Cloud MS 20246C Monitoring and Operating a Private Cloud Description: Days: 5 Prerequisites: This course describes how to monitor and operate a cloud with Microsoft System Center 2012 R2. This course focuses

More information

CS377: Database Systems Data Security and Privacy. Li Xiong Department of Mathematics and Computer Science Emory University

CS377: Database Systems Data Security and Privacy. Li Xiong Department of Mathematics and Computer Science Emory University CS377: Database Systems Data Security and Privacy Li Xiong Department of Mathematics and Computer Science Emory University 1 Principles of Data Security CIA Confidentiality Triad Prevent the disclosure

More information

A Gentle Introduction to Cloud Computing

A Gentle Introduction to Cloud Computing A Gentle Introduction to Cloud Computing Source: Wikipedia Platform Computing, Inc. Platform Clusters, Grids, Clouds, Whatever Computing The leader in managing large scale shared environments o 18 years

More information

CLOUDFORMS Open Hybrid Cloud

CLOUDFORMS Open Hybrid Cloud Open Hybrid Cloud Cloud Evolution statt Cloud Revolution Lutz Lange, RHCA, Solution Architect, Red Hat Frank Rosendahl, RHCA, Solution Architect, DASEQ GmbH Cloud Operations Management Delivers an Open

More information

Cloud Security. Peter Jopling joplingp@uk.ibm.com IBM UK Ltd Software Group Hursley Labs. peterjopling. 2011 IBM Corporation

Cloud Security. Peter Jopling joplingp@uk.ibm.com IBM UK Ltd Software Group Hursley Labs. peterjopling. 2011 IBM Corporation Cloud Security Peter Jopling joplingp@uk.ibm.com IBM UK Ltd Software Group Hursley Labs peterjopling 2011 IBM Corporation Cloud computing impacts the implementation of security in fundamentally new ways

More information

Accenture Cloud Enterprise Services

Accenture Cloud Enterprise Services BMC User Forum 2011 Accenture Cloud Enterprise Services Martin Jureit, Accenture GmbH Accenture, its logo, and High Performance Delivered are trademarks of Accenture. Agenda Accenture Cloud Enterprise

More information

MANAGEMENT AND ORCHESTRATION WORKFLOW AUTOMATION FOR VBLOCK INFRASTRUCTURE PLATFORMS

MANAGEMENT AND ORCHESTRATION WORKFLOW AUTOMATION FOR VBLOCK INFRASTRUCTURE PLATFORMS VCE Word Template Table of Contents www.vce.com MANAGEMENT AND ORCHESTRATION WORKFLOW AUTOMATION FOR VBLOCK INFRASTRUCTURE PLATFORMS January 2012 VCE Authors: Changbin Gong: Lead Solution Architect Michael

More information

NATIONAL CYBER SECURITY AWARENESS MONTH

NATIONAL CYBER SECURITY AWARENESS MONTH NATIONAL CYBER SECURITY AWARENESS MONTH Tip 1: Security is everyone s responsibility. Develop an awareness framework that challenges, educates and empowers your customers and employees to be part of the

More information

HP Virtualization Performance Viewer

HP Virtualization Performance Viewer HP Virtualization Performance Viewer Efficiently detect and troubleshoot performance issues in virtualized environments Jean-François Muller - Principal Technical Consultant - jeff.muller@hp.com HP Business

More information

HYPER-V CLOUD DEPLOYMENT GUIDES MODULE 3: OPERATIONS

HYPER-V CLOUD DEPLOYMENT GUIDES MODULE 3: OPERATIONS HYPER-V CLOUD DEPLOYMENT GUIDES MODULE 3: OPERATIONS The Hyper-V Cloud Deployment Guides from Microsoft can help IT Pros by: Accelerating deployment by providing best practices for planning and delivering

More information

VMware vcloud Service Definition for a Public Cloud. Version 1.6

VMware vcloud Service Definition for a Public Cloud. Version 1.6 Service Definition for a Public Cloud Version 1.6 Technical WHITE PAPER 2011 VMware, Inc. All rights reserved. This product is protected by U.S. and international copyright and intellectual property laws.

More information

The evolving IT environment: Maximizing potential of open hybrid clouds

The evolving IT environment: Maximizing potential of open hybrid clouds The evolving IT environment: Maximizing potential of open hybrid clouds Every enterprise, from small-and-medium businesses (SMBs) to global enterprises, needs business applications to run its business.

More information

How To Install Openstack On Ubuntu 14.04 (Amd64)

How To Install Openstack On Ubuntu 14.04 (Amd64) Getting Started with HP Helion OpenStack Using the Virtual Cloud Installation Method 1 What is OpenStack Cloud Software? A series of interrelated projects that control pools of compute, storage, and networking

More information

Role Based Access Control

Role Based Access Control Role Based Access Control Role-Based Access Control Models. By R.S. Sandhu, E.J. Coyne, H.L. Feinstein, and C.E. Youman, IEEE Computer, vol 29(2):38--47, February 1996. The most cited paper in access control!

More information

Improve Security with Automated Patch Management

Improve Security with Automated Patch Management Improve Security with Automated Patch Management Mark Lillywhite Introduction Security is a combination of protection, detection and response Good Systems Management enables Good Security 2014 a memorable

More information

Sistemi Operativi e Reti. Cloud Computing

Sistemi Operativi e Reti. Cloud Computing 1 Sistemi Operativi e Reti Cloud Computing Facoltà di Scienze Matematiche Fisiche e Naturali Corso di Laurea Magistrale in Informatica Osvaldo Gervasi ogervasi@computer.org 2 Introduction Technologies

More information

Cloud Security: The Grand Challenge

Cloud Security: The Grand Challenge Dr. Paul Ashley IBM Software Group pashley@au1.ibm.com Cloud Security: The Grand Challenge Outline Cloud computing: the pros, the cons, the blind spots Security in the cloud - what are the risks now and

More information

Public Cloud Service Definition

Public Cloud Service Definition Public Version 1.5 TECHNICAL WHITE PAPER Table Of Contents Introduction... 3 Enterprise Hybrid Cloud... 3 Public Cloud.... 4 VMware vcloud Datacenter Services.... 4 Target Markets and Use Cases.... 4 Challenges

More information

MPSTOR Technology Overview

MPSTOR Technology Overview MPSTOR Technology Overview Delivering operational efficiency to the datacenter through software defined storage enabling data centers generate new higher margin revenue streams via a single programmable

More information

Using SouthBound APIs to build an SDN Solution. Dan Mihai Dumitriu Midokura Feb 5 th, 2014

Using SouthBound APIs to build an SDN Solution. Dan Mihai Dumitriu Midokura Feb 5 th, 2014 Using SouthBound APIs to build an SDN Solution Dan Mihai Dumitriu Midokura Feb 5 th, 2014 Agenda About Midokura Drivers of SDN & Network Virtualization Adoption SDN Architectures Why OpenDaylight? Use

More information

Monitoring and Operating a Private Cloud with System Center 2012 R2 (20246) H8Q03S

Monitoring and Operating a Private Cloud with System Center 2012 R2 (20246) H8Q03S HP Education Services course data sheet Monitoring and Operating a Private Cloud with System Center 2012 R2 (20246) H8Q03S Course Overview In this course, you will receive an overview of a private cloud

More information

Security of Information Systems hosted in Clouds: SLA Definition and Enforcement in a Dynamic Environment

Security of Information Systems hosted in Clouds: SLA Definition and Enforcement in a Dynamic Environment Security of Information Systems hosted in Clouds: SLA Definition and Enforcement in a Dynamic Environment Christine Morin Inria Joint work with Louis Rilling (DGA-MI), Anna Giannakou (Inria), Jean-Louis

More information

Cyber Security: Past, Present and Future

Cyber Security: Past, Present and Future Cyber Security: Past, Present and Future Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security (ICS) University of Texas at San Antonio August 2009 ravi.sandhu@utsa.edu www.profsandhu.com

More information

Deep Security. Προστατεύοντας Server Farm. Σωτήρης Δ. Σαράντος. Available Aug 30, 2011. Σύμβουλος Δικτυακών Λύσεων. Copyright 2011 Trend Micro Inc.

Deep Security. Προστατεύοντας Server Farm. Σωτήρης Δ. Σαράντος. Available Aug 30, 2011. Σύμβουλος Δικτυακών Λύσεων. Copyright 2011 Trend Micro Inc. Deep Security Προστατεύοντας Server Farm Available Aug 30, 2011 Σωτήρης Δ. Σαράντος Σύμβουλος Δικτυακών Λύσεων Copyright 2011 Trend Micro Inc. Legacy Security Hinders Datacenter Consolidation Physical

More information

Software Define Storage (SDs) and its application to an Openstack Software Defined Infrastructure (SDi) implementation

Software Define Storage (SDs) and its application to an Openstack Software Defined Infrastructure (SDi) implementation Software Define Storage (SDs) and its application to an Openstack Software Defined Infrastructure (SDi) implementation This paper discusses how data centers, offering a cloud computing service, can deal

More information

Cloud Standardization, Compliance and Certification. Class 2012 event 25.rd of October 2012 Dalibor Baskovc, CEO Zavod e-oblak

Cloud Standardization, Compliance and Certification. Class 2012 event 25.rd of October 2012 Dalibor Baskovc, CEO Zavod e-oblak Cloud Standardization, Compliance and Certification Class 2012 event 25.rd of October 2012 Dalibor Baskovc, CEO Zavod e-oblak Todays Agenda IT Resourcing with Cloud Computing and related challenges Landscape

More information

How To Protect Your Cloud Computing Resources From Attack

How To Protect Your Cloud Computing Resources From Attack Security Considerations for Cloud Computing Steve Ouzman Security Engineer AGENDA Introduction Brief Cloud Overview Security Considerations ServiceNow Security Overview Summary Cloud Computing Overview

More information

locuz.com A comprehensive orchestration tool for setting up private and hybrid clouds

locuz.com A comprehensive orchestration tool for setting up private and hybrid clouds locuz.com A comprehensive orchestration tool for setting up private and hybrid clouds An innovative and flexible cloud platform for creating, deploying and managing highly reliable and scalable cloud infrastructure

More information

Adding value as a Cloud Broker. Nick Hyner Director Cloud Services EMEA Twitter - @nickhyner. Dell.com/Cloud

Adding value as a Cloud Broker. Nick Hyner Director Cloud Services EMEA Twitter - @nickhyner. Dell.com/Cloud Adding value as a Cloud Broker Nick Hyner Director Cloud Services EMEA Twitter - @nickhyner Dell.com/Cloud Overview A. Added Value Brokers in all industries in Digital Era B. Experience of Cloud Marketplace

More information

yvette@yvetteagostini.it yvette@yvetteagostini.it

yvette@yvetteagostini.it yvette@yvetteagostini.it 1 The following is merely a collection of notes taken during works, study and just-for-fun activities No copyright infringements intended: all sources are duly listed at the end of the document This work

More information

Considerations for Adopting PaaS (Platform as a Service)

Considerations for Adopting PaaS (Platform as a Service) Considerations for Adopting PaaS (Platform as a Service) Michael Dolan (mdolan@pivotal.io) Senior Field Engineer April 2015 1 Becoming The Agile Enterprise To effectively achieve its missions, the Department

More information

VMware vcloud Director for Service Providers

VMware vcloud Director for Service Providers Architecture Overview TECHNICAL WHITE PAPER Table of Contents Scope of Document....3 About VMware vcloud Director....3 Platform for Infrastructure Cloud...3 Architecture Overview....3 Constructs of vcloud

More information

ENISA What s On? ENISA as facilitator for enhanced Network and Information Security in Europe. CENTR General Assembly, Brussels October 4, 2012

ENISA What s On? ENISA as facilitator for enhanced Network and Information Security in Europe. CENTR General Assembly, Brussels October 4, 2012 ENISA What s On? ENISA as facilitator for enhanced Network and Information Security in Europe CENTR General Assembly, Brussels October 4, 2012 christoffer.karsberg@enisa.europa.eu 1 Who we are ENISA was

More information

Virtual Datacenter or Virtualization in the datacenter. (OpenStack) Larry Rudolph

Virtual Datacenter or Virtualization in the datacenter. (OpenStack) Larry Rudolph Virtual Datacenter or Virtualization in the datacenter (OpenStack)! Larry Rudolph A merge of several public presentations Rackspace & NASA started it off, and OpenStack has grown dramatically All possible

More information

Audit My OpenStack Cloud!!

Audit My OpenStack Cloud!! Audit My OpenStack Cloud!! Prabhakar Attaluri, IBM Distinguished Engineer, CTO Vinod Chavan, Cloud Executive Wednesday, August 12, 2015: 04:30 PM - 05:30 PM, Dolphin, Southern Hemisphere 3 Insert Custom

More information

D. L. Corbet & Assoc., LLC

D. L. Corbet & Assoc., LLC Demystifying the Cloud OR Cloudy with a Chance of Data D. L. Corbet & Assoc., LLC thelinuxguy@donet.com Why 'The Cloud' Common Clouds Considerations and Risk Why 'The Cloud' Distributed Very Large / Very

More information

Data Center Connector for vsphere 3.0.0

Data Center Connector for vsphere 3.0.0 Product Guide Data Center Connector for vsphere 3.0.0 For use with epolicy Orchestrator 4.6.0, 5.0.0 Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS

More information

Cloud Security Who do you trust?

Cloud Security Who do you trust? Thought Leadership White Paper Cloud Computing Cloud Security Who do you trust? Nick Coleman, IBM Cloud Security Leader Martin Borrett, IBM Lead Security Architect 2 Cloud Security Who do you trust? Cloud

More information

VMware vcloud Architecture Toolkit Public VMware vcloud Service Definition

VMware vcloud Architecture Toolkit Public VMware vcloud Service Definition VMware vcloud Architecture Toolkit Version 2.0.1 October 2011 This product is protected by U.S. and international copyright and intellectual property laws. This product is covered by one or more patents

More information

The Cloud in Regulatory Affairs - Validation, Risk Management and Chances -

The Cloud in Regulatory Affairs - Validation, Risk Management and Chances - 45 min Webinar: November 14th, 2014 The Cloud in Regulatory Affairs - Validation, Risk Management and Chances - www.cunesoft.com Rainer Schwarz Cunesoft Holger Spalt ivigilance 2014 Cunesoft GmbH PART

More information

CloudCIX Bootcamp. The essential IaaS getting started guide. http://www.cix.ie

CloudCIX Bootcamp. The essential IaaS getting started guide. http://www.cix.ie The essential IaaS getting started guide. http://www.cix.ie Revision Date: 17 th August 2015 Contents Acronyms... 2 Table of Figures... 3 1 Welcome... 4 2 Architecture... 5 3 Getting Started... 6 3.1 Login

More information

IBM Spectrum Protect in the Cloud

IBM Spectrum Protect in the Cloud IBM Spectrum Protect in the Cloud. Disclaimer IBM s statements regarding its plans, directions, and intent are subject to change or withdrawal without notice at IBM s sole discretion. Information regarding

More information

SDN Solutions ~SDN for Carrier Data Center~ November, 2013 NEC Corporation

SDN Solutions ~SDN for Carrier Data Center~ November, 2013 NEC Corporation SDN Solutions ~SDN for Carrier Data Center~ November, 2013 NEC Corporation .Strategic Objectives of Carrier, And NEC s Approach Objectives Contribute to improving availability in business process and Network

More information

Cloud Security. Let s Open the Box. Abu Shohel Ahmed ahmed.shohel@ericsson.com NomadicLab, Ericsson Research

Cloud Security. Let s Open the Box. Abu Shohel Ahmed ahmed.shohel@ericsson.com NomadicLab, Ericsson Research t Cloud Security Let s Open the Box t Abu Shohel Ahmed ahmed.shohel@ericsson.com NomadicLab, Ericsson Research Facts about Ericsson Ericsson is a world-leading provider of telecommunication equipment and

More information

Cloud Security Who do you trust?

Cloud Security Who do you trust? Thought Leadership White Paper Cloud Computing Cloud Security Who do you trust? Nick Coleman, IBM Cloud Security Leader Martin Borrett, IBM Lead Security Architect 2 Cloud Security Who do you trust? Cloud

More information

Security Issues in Cloud Computing

Security Issues in Cloud Computing Security Issues in Computing CSCI 454/554 Computing w Definition based on NIST: A model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources

More information

Clodoaldo Barrera Chief Technical Strategist IBM System Storage. Making a successful transition to Software Defined Storage

Clodoaldo Barrera Chief Technical Strategist IBM System Storage. Making a successful transition to Software Defined Storage Clodoaldo Barrera Chief Technical Strategist IBM System Storage Making a successful transition to Software Defined Storage Open Server Summit Santa Clara Nov 2014 Data at the core of everything Data is

More information

Management for the Mobile-Cloud Era

Management for the Mobile-Cloud Era Management for the Mobile-Cloud Era Sajai Krishnan VP Product Marketing Cloud Management Business Unit September 10, 2014 2014 VMware Inc. All rights reserved. Mobile-cloud Era - The CIO paradox New expectations

More information

STeP-IN SUMMIT 2013. June 18 21, 2013 at Bangalore, INDIA. Performance Testing of an IAAS Cloud Software (A CloudStack Use Case)

STeP-IN SUMMIT 2013. June 18 21, 2013 at Bangalore, INDIA. Performance Testing of an IAAS Cloud Software (A CloudStack Use Case) 10 th International Conference on Software Testing June 18 21, 2013 at Bangalore, INDIA by Sowmya Krishnan, Senior Software QA Engineer, Citrix Copyright: STeP-IN Forum and Quality Solutions for Information

More information

Installation Guide Avi Networks Cloud Application Delivery Platform Integration with Cisco Application Policy Infrastructure

Installation Guide Avi Networks Cloud Application Delivery Platform Integration with Cisco Application Policy Infrastructure Installation Guide Avi Networks Cloud Application Delivery Platform Integration with Cisco Application Policy Infrastructure August 2015 Table of Contents 1 Introduction... 3 Purpose... 3 Products... 3

More information

A unified architecture of IaaS cloud solutions

A unified architecture of IaaS cloud solutions A unified architecture of IaaS cloud solutions CLASS Conference 2012 (CLASS'12) Robert Dukarić and Matjaž B. Jurič XLAB and FRI Introduction At least 50 different definitions of Cloud Computing. Introduction

More information

Public cloud? Private cloud? What is

Public cloud? Private cloud? What is Public cloud? Private cloud? What is the difference? Prepared for: Business/Person/Event Name Date: October 5 th 6 th, 2010 This presentation outlines general information regarding our services and is

More information

VIRTUALIZED SERVICES PLATFORM Software Defined Networking for enterprises and service providers

VIRTUALIZED SERVICES PLATFORM Software Defined Networking for enterprises and service providers VIRTUALIZED SERVICES PLATFORM Software Defined Networking for enterprises and service providers Why it s unique The Nuage Networks VSP is the only enterprise and service provider-grade SDN platform that:

More information

APAC OF POSSIBILITIES: TIPS FOR INCREASING CLOUD SECURITY AND ADOPTION

APAC OF POSSIBILITIES: TIPS FOR INCREASING CLOUD SECURITY AND ADOPTION APAC OF POSSIBILITIES: TIPS FOR INCREASING CLOUD SECURITY AND ADOPTION Ken Low Director of Enterprise Security, Asia Pacific, Trend Micro Chairman, Asia Pacific Executive Council, Cloud Security Alliance

More information

FLOSSK: FLOSSTalk OpenStack 22 nd February, 2012. Arturo Suarez: Founder, COO&BizDev StackOps 21/02/12 1

FLOSSK: FLOSSTalk OpenStack 22 nd February, 2012. Arturo Suarez: Founder, COO&BizDev StackOps 21/02/12 1 FLOSSK: FLOSSTalk OpenStack 22 nd February, 2012 Arturo Suarez: Founder, COO&BizDev StackOps 21/02/12 1 l l Introductions OpenStack l l l l l Identifying the gap A little bit of history The Projects The

More information

Office of Emergency Communications (OEC) Mobile Applications for Public Safety (MAPS)

Office of Emergency Communications (OEC) Mobile Applications for Public Safety (MAPS) Office of Emergency Communications (OEC) Mobile Applications for Public Safety (MAPS) PSCR Public Safety Broadband Stakeholder Conference June 4 th, 2014 Alex Kreilein Technology Policy Strategist Office

More information

Securing the Journey to the Private Cloud. Dominique Dessy RSA, the Security Division of EMC

Securing the Journey to the Private Cloud. Dominique Dessy RSA, the Security Division of EMC Securing the Journey to the Private Cloud Dominique Dessy RSA, the Security Division of EMC June 2010 Securing the Journey to The Private Cloud The Journey IT Production Business Production IT-As-A-Service

More information

GAO. INFORMATION SECURITY Governmentwide Guidance Needed to Assist Agencies in Implementing Cloud Computing

GAO. INFORMATION SECURITY Governmentwide Guidance Needed to Assist Agencies in Implementing Cloud Computing GAO For Release on Delivery Expected at 10:00 a.m. EDT Thursday, July 1, 2010 United States Government Accountability Office Testimony Before the Committee on Oversight and Government Reform and Its Subcommittee

More information

Kerberos-Based Authentication for OpenStack Cloud Infrastructure as a Service

Kerberos-Based Authentication for OpenStack Cloud Infrastructure as a Service Kerberos-Based Authentication for OpenStack Cloud Infrastructure as a Service Sazzad Masud and Ram Krishnan University of Texas at San Antonio Sazzad.Masud@gmail.com, Ram.Krishnan@utsa.edu Abstract Cloud

More information

Netzwerkvirtualisierung? Aber mit Sicherheit!

Netzwerkvirtualisierung? Aber mit Sicherheit! Netzwerkvirtualisierung? Aber mit Sicherheit! Markus Schönberger Advisory Technology Consultant Trend Micro Stephan Bohnengel Sr. Network Virtualization SE VMware Agenda Background and Basic Introduction

More information

10965 - IT Service Management with System Center Service Manager

10965 - IT Service Management with System Center Service Manager 10965 - IT Service Management with System Center Service Manager Duration: 4 Days Course Price: $2,975 Course Description Course Overview This four day training course will provide students with the key

More information

HPE Software SAP Automation

HPE Software SAP Automation HPE Software SAP Automation Request to Fulfill with Operations Orchestration Peter Gibbels HPE Software Chief Technologist IT4IT Global X-portfolio Architecture - SAP George Giloan HPE Software Developer

More information

Security Management of Cloud-Native Applications. Presented By: Rohit Sharma MSc in Dependable Software Systems (DESEM)

Security Management of Cloud-Native Applications. Presented By: Rohit Sharma MSc in Dependable Software Systems (DESEM) Security Management of Cloud-Native Applications Presented By: Rohit Sharma MSc in Dependable Software Systems (DESEM) 1 Outline Context State-of-the-Art Design Patterns Threats to cloud systems Security

More information

An Oracle White Paper June 2014. Security and the Oracle Database Cloud Service

An Oracle White Paper June 2014. Security and the Oracle Database Cloud Service An Oracle White Paper June 2014 Security and the Oracle Database Cloud Service 1 Table of Contents Overview... 3 Security architecture... 4 User areas... 4 Accounts... 4 Identity Domains... 4 Database

More information

Building Storage as a Service with OpenStack. Greg Elkinbard Senior Technical Director

Building Storage as a Service with OpenStack. Greg Elkinbard Senior Technical Director Building Storage as a Service with OpenStack Greg Elkinbard Senior Technical Director MIRANTIS 2012 PAGE 1 About the Presenter Greg Elkinbard Senior Technical Director at Mirantis Builds on demand IaaS

More information

WildFire Reporting. WildFire Administrator s Guide 55. Copyright 2007-2015 Palo Alto Networks

WildFire Reporting. WildFire Administrator s Guide 55. Copyright 2007-2015 Palo Alto Networks WildFire Reporting When malware is discovered on your network, it is important to take quick action to prevent spread of the malware to other systems. To ensure immediate alerts to malware discovered on

More information

Cloud Computing Risk and Rewards

Cloud Computing Risk and Rewards Cloud Computing Risk and Rewards John Lazarine Vice President and Chief Audit Executive Mark Salamasick Director of Center for Internal Auditing For Dallas CPA Society Convergence 2013 May 8, 2013 John

More information

The Art of Virtualization with Free Software

The Art of Virtualization with Free Software Master on Free Software 2009/2010 {mvidal,jfcastro}@libresoft.es GSyC/Libresoft URJC April 24th, 2010 (cc) 2010. Some rights reserved. This work is licensed under a Creative Commons Attribution-Share Alike

More information

Implementing Multi-Tenanted Storage for Service Providers with Cloudian HyperStore. The Challenge SOLUTION GUIDE

Implementing Multi-Tenanted Storage for Service Providers with Cloudian HyperStore. The Challenge SOLUTION GUIDE Implementing Multi-Tenanted Storage for Service Providers with Cloudian HyperStore COST EFFECTIVE SCALABLE STORAGE PLATFORM FOR CLOUD STORAGE SERVICES SOLUTION GUIDE The Challenge Service providers (MSPs/ISPs/ASPs)

More information

EMC ViPR Software Defined Storage

EMC ViPR Software Defined Storage EMC ViPR Software Defined Storage Virtualize Everything Compromise Nothing VIRTUALIZE EVERYTHING COMPROMISE NOTHING Dayne Turbitt Regional Sales Director EMC Advanced Software Division 1 IT is Being Transformed

More information

Cloud Security - Risiken und Chancen

Cloud Security - Risiken und Chancen Dr. Matthias Schunter, MBA IBM Research Zürich, mts@zurich.ibm.com, http://www.schunter.org Simple Questions Today s Data Center Tomorrow s Public Cloud We Have Control It s located at X. It s stored in

More information

Threat Intelligence. How to Implement Software-Defined Protection. Nir Naaman, CISSP Senior Security Architect

Threat Intelligence. How to Implement Software-Defined Protection. Nir Naaman, CISSP Senior Security Architect How to Implement Software-Defined Protection Nir Naaman, CISSP Senior Security Architect Threat Intelligence 1 The Spanish flu, 1918 killing at least 50-100 million people worldwide. 2 The H1N1 Pandemic,

More information