Hierarchical Secure Information and Resource Sharing in OpenStack Community Cloud
|
|
- Joy Singleton
- 8 years ago
- Views:
Transcription
1 Hierarchical Secure Information and Resource Sharing in OpenStack Community Cloud Cyber Incident Response An Model for Information and Resource Sharing Amy(Yun) Zhang, Farhan Patwa, Ravi Sandhu, Bo Tang Institute for Cyber Security University of Texas at San Antonio Aug 15, 2015 Presented by: Amy(Yun) Zhang
2 Community Cloud Community cloud provides services for exclusive use by a specific community, which contains organizations with shared concern, such as mission, security requirements, business models, etc. A community of financial organizations OpenStack 2
3 Cyber Collaboration Initiatives Cyber attacks are becoming increasingly sophisticated. Hard to defend by a single organization on its own. Collaborate to enhance situational awareness Share cyber information in community Malicious activities Technologies, tools, procedures, analytics. 3 Ref:
4 Traditional Cyber Collaboration Traditional collaboration Subscription services Limitations Organizations Sharing information through subscription. Organizations are not actively participating in analyzing and processing the cyber information they submit. Organizations don't directly interact with each other on sharing activities. 4
5 Cyber Collaboration in Community Cloud Cloud platform (community) Cyber Security Committee. Organizations routinely collect cyber information. Cross organization cyber collaborations. 5
6 Community Cyber Incident Response Governance Incident Response Group Cyber Security Committee Organization Security Specialists External Experts Conditional Membership Shared Information 6
7 Assumptions and Scope In a community cloud platform OpenStack Sharing amongst a set of organizations Sensitive cyber information, infrastructure, tools, analytics, etc. May share malicious or infected code/systems (e.g. virus, worms, etc.) Focus on access control model 7
8 OpenStack Dominant open-source cloud IaaS software OpenStack software controls large pools of compute, storage, and networking resources throughout a datacenter, managed through a dashboard or via the OpenStack API.!!!!!! Ref: 8
9 OpenStack HMT HMT : Hierarchical Multitenancy D Cloud Domain 1 Domain n Project 1 Project p Project 1 Project q childproject 1 childproject k child childproject 1 child childproject l 9
10 OSAC Model with HMT Project Hiearachy: Role Inheritance: One-to-one relation: One-to-multiple relation: Multiple-to-multiple relation: Group (GO) Domains (D) ot_service Services (S) Group (UG) Groups (G) s (U) (UO) Group Assignment (GA) Assignment (UA) token_project Projects (P) Project (PO) Project-Role Pair (PRP) token_roles Roles (R) Permission Assignment (PA) PRMS Object Types (OT) Operations (OP) user_token Tokens (T) 10
11 OSAC-HMT-SID Model 11 s (U) Project-Role Pair (PRP) Security Projects (SP) Roles (R) Project-Role Pair (PRP) Projects (P) Roles (R) (UO) Assignment (UA) Assignment (UA) Self Subscription (USS) Assignment (UA) SIP (SIPO) Secure Isolated Domain (SID) Project-Role Pair (PRP) Expert (EUO) Open Project (OPO) Security Project (SPO) Project-Role Pair (PRP) Secure Isolated Projects (SIP) Roles (R) Open Project (OP) Roles (R) Domains (D) Cyber Collaboration Routine Cyber Information Process Expert s Project (PO) Assignment (UA) Cyber Security Forum Project-Role Pair (PRP) Core Project (CP) Roles (R) Cyber Security Committee Core Project (CPO) Assignment (UA) SIP association (assoc)
12 OSAC-HMT-SID Administration Relation and Resources Cloud admin Domain admin SID admin (Cloud admin) Project admin Security Project admin Core Project admin SIP admin Community Cloud Domains SID Projects Secure Projects Core Project Open Project child Projects child Secure Projects SIPs child SIPs 12
13 OSAC-SID Administrative Model SipCreate(uSet, sip) /* A subset of Core Project/domain admin users together create a sip */ SipDelete(uSet, sip) /* The same subset of Core Project/domain admin users together delete a sip*/ Add(adminuser, r, u, sp, p) /* CP/Sip admin can add a user from his home domain Security Project to CP/sip*/ Remove(adminuser, r, u, sp, p) /* CP/Sip admin can remove a user from the Core Project/sip */ OpenSubscribe(u, member, OP) /* s subscribe to Open Project */ OpenUnsubscribe(u, member, OP) /* s unsubcsribe from Open Project */ CopyObject(u, so1, sp, so2, p) /* Copy object from Security Project to Core Project/SIP */ ExportObject(adminuser, so1, p, so2, sp) /* Export object from Core Project/SIP to Security Project */ ExpertCreate(coreadmin, eu) /* Core Project admin users can create an expert user */ ExpertDelete(coreadmin, eu) /* Core Project admin users can delete an expert user */ ExpertList(adminuser) /* Admin users of Core Project and SIPs can list expert users */ ExpertAdd(adminuser, r, eu, proj) /* Core Project/sip admin can add an expert user to Core Project/sip*/ ExpertRemove(adminuser, r, eu, proj) /* Core Project/sip admin can remove an expert user from Core Project/sip */ 13
14 Enforcement Set up the cloud Assign an admin user as Community Cloud:Cloud Admin Domains:Domain Admin Assign domain admins as SID:Cloud Admin Assign domain admins as Security Project: Admin/member Assign users from domains as Core Project: Admin Admin user assign users to SP as member Open Project: member Assign users from home domain as Assign expert users as Core Project: member 14
15 Enforcement SID: Cloud Admin Assign domain admins as Create SIP/child SIP/, assign domain admins as Core Project: Admin Assign users from home domain as Assign expert users as Core Project: member SIP: Admin Assign users from home domain as Assign expert users as child SIP: Admin SIP: member Assign users from home domain as Assign expert users as child SIP s child SIP: Admin child SIP: member Assign users from home domain as Assign expert users as child SIP s child SIP: member 15
16 Conclusion and future work Suggested OSAC-HMT-SID model to OpenStack Cyber collaboration across organizations cyber incident response Self-service Cyber Security Committee. Share data, tools, vms, etc. Potential blueprint for official OpenStack adoption Future work Explore other model options. Explore local roles in the model. Explore models in other dominant cloud platforms. 16
17 Thanks! 17
Hierarchical Secure Information and Resource Sharing in OpenStack Community Cloud
Hierarchical Secure Information and Resource Sharing in OpenStack Community Cloud Yun Zhang, Farhan Patwa, Ravi Sandhu and Bo Tang Institute for Cyber Security and Department of Computer Science University
More informationCyber Incident Response
Secure Information Sharing for Cyber Response Teams Cyber Incident Response Models and Platforms for Information and Resource Sharing UTSA Team Ram Krishnan, Assistant Professor (ECE) Ravi Sandhu, Professor
More informationCommunity-Based Secure Information and Resource Sharing in Azure Cloud IaaS
Community-Based Secure Information and Sharing in Azure Cloud IaaS Yun Zhang Institute for Cyber Security Univ of Texas at San Antonio San Antonio, TX 78249 amy.u.zhang@gmail.com Farhan Patwa Institute
More informationExtending OpenStack Access Control with Domain Trust
Extending OpenStack Access Control with Domain Trust Bo Tang and Ravi Sandhu Institute for Cyber Security and Department of Computer Science University of Texas at San Antonio, One UTSA Circle, San Antonio,
More informationProtect Everything: Networks, Applications and Cloud Services
Protect Everything: Networks, Applications and Cloud Services Tokens & Users Cloud Applications Private Networks Corporate Network API LDAP / Active Directory SAML RADIUS Corporate Network LDAP / Active
More informationSecurity and Cloud Computing
Martin Borrett, Lead Security Architect, Europe, IBM 9 th December 2010 Outline Brief Introduction to Cloud Computing Security: Grand Challenge for the Adoption of Cloud Computing IBM and Cloud Security
More informationMicrosoft Private Cloud
Microsoft Private Cloud Lorenz Wolf, Solution Specialist Datacenter, Microsoft SoftwareOne @ Au Premier Zürich - 22.03.2011 What is PRIVATE CLOUD Private Public Public Cloud Private Cloud shared resources.
More informationCloud security and OpenStack Primož Cigoj Laboratorij za odprte sisteme in mreže IJS-E5. www.kc-class.eu
Cloud security and OpenStack Primož Cigoj Laboratorij za odprte sisteme in mreže IJS-E5 www.kc-class.eu 1 1 Outline Cloud computing General overview Deployment and service models Security issues Threats
More informationSecuring the Cloud through Comprehensive Identity Management Solution
Securing the Cloud through Comprehensive Identity Management Solution Millie Mak Senior IT Specialist What is Cloud Computing? A user experience and a business model Cloud computing is an emerging style
More informationHealthcare: La sicurezza nel Cloud October 18, 2011. 2011 IBM Corporation
Healthcare: La sicurezza nel Cloud October 18, 2011 Cloud Computing Tests The Limits Of Security Operations And Infrastructure Security and Privacy Domains People and Identity Data and Information Application
More informationCloud Security Introduction and Overview
Introduction and Overview Klaus Gribi Senior Security Consultant klaus.gribi@swisscom.com May 6, 2015 Agenda 2 1. Cloud Security Cloud Evolution, Service and Deployment models Overview and the Notorious
More informationA Formal Model for Isolation Management in Cloud Infrastructure-as-a-Service
A Formal Model for Isolation Management in Cloud Infrastructure-as-a-Service Khalid Zaman Bijon 1, Ram Krishnan 2, and Ravi Sandhu 1 1 Institute for Cyber Security & Department of Computer Science, 2 Institute
More informationRed Hat CloudForms Roadmap Build & Manage an Open Hybrid Infrastructure. Xavier Lecauchois & John Hardy Product Management, Red Hat June 12, 2013
Red Hat CloudForms Roadmap Build & Manage an Open Hybrid Infrastructure Xavier Lecauchois & John Hardy Product Management, Red Hat June 12, 2013 Agenda The Role of I.T. is changing Hybrid Clouds Red Hat
More informationThe Science, Engineering, and Business of Cyber Security
Institute for Cyber Security The Science, Engineering, and Business of Cyber Security Prof. Ravi Sandhu Executive Director, Institute for Cyber Security Lutcher Brown Endowed Chair in Cyber Security COS
More informationIBM Cloud Security Draft for Discussion September 12, 2011. 2011 IBM Corporation
IBM Cloud Security Draft for Discussion September 12, 2011 IBM Point of View: Cloud can be made secure for business As with most new technology paradigms, security concerns surrounding cloud computing
More informationRole and Attribute Based Collaborative Administration of Intra-Tenant Cloud IaaS
Role and Attribute Based Collaborative Administration of Intra-Tenant Cloud IaaS Xin Jin Department of Computer Science Institute for Cyber Security University of Texas at San Antonio San Antonio, Texas
More informationHBC1533 - How to build your cloud - Steps to Extend your Datacenter
VMworld 2014 Page 1 HBC1533 - How to build your cloud - Steps to Extend your Datacenter Tuesday, 14 October 2014 14:00 Dave Hill, VMware 5 key steps to Hybrid DC A thing made by combining two different
More informationSecurity Compliance Auditing of Identity and Access Management in the Cloud: Application to OpenStack
Security Compliance Auditing of Identity and Access Management in the Cloud: Application to OpenStack Suryadipta Majumdar, Taous Madi, Yushun Wang, Yosr Jarraya, Makan Pourzandi, Lingyu Wang and Mourad
More informationThe Cloud, Virtualization, and Security
A Cloud: Large groups of remote servers that are networked to allow centralized, shared data storage and online access to computer services or resources A Cloud: Large groups of remote servers that are
More informationCyber Security Symposium 2015 September 29,2015
Cyber Security Symposium 2015 September 29,2015 Introducing David Langston Branch Manager Security Management Department of Technology 2 About CalCloud Mission Offer cost-effective cloud solutions that
More informationHP CloudSystem Enterprise
Technical white paper HP CloudSystem Enterprise Creating a multi-tenancy solution with HP Matrix Operating Environment and HP Cloud Service Automation Table of contents Executive summary 2 Multi-tenancy
More informationAuthorization Federation in IaaS Multi Cloud
Authorization Federation in IaaS Multi Cloud Navid Pustchi, Ram Krishnan and Ravi Sandhu SCC 2015 1 Why Multi Cloud? Collaboration of organizations across clouds. Organizations with resources across multiple
More information1 What is Cloud Computing?... 2 2 Cloud Infrastructures... 2 2.1 OpenStack... 2 2.2 Amazon EC2... 4 3 CAMF... 5 3.1 Cloud Application Management
1 What is Cloud Computing?... 2 2 Cloud Infrastructures... 2 2.1 OpenStack... 2 2.2 Amazon EC2... 4 3 CAMF... 5 3.1 Cloud Application Management Frameworks... 5 3.2 CAMF Framework for Eclipse... 5 3.2.1
More informationHet is een kleine stap naar een hybrid cloud
Het is een kleine stap naar een hybrid cloud Isabel Moll-Kranenburg Microsoft 14 jaar IT industrie 4 jaar Microsoft Cloud Private Private Cloud Meeting customers where they are The Microsoft Cloud Computing
More informationMULTI-TENANT ACCESS CONTROL FOR CLOUD SERVICES
MULTI-TENANT ACCESS CONTROL FOR CLOUD SERVICES APPROVED BY SUPERVISING COMMITTEE: Ravi Sandhu, Ph.D., Chair Kay A. Robbins, Ph.D. Gregory B. White, Ph.D. Weining Zhang, Ph.D. Jaehong Park, Ph.D. Accepted:
More informationIntel IT Cloud 2013 and Beyond. Name Title Month, Day 2013
Intel IT Cloud 2013 and Beyond Name Title Month, Day 2013 Legal Notices This presentation is for informational purposes only. INTEL MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS SUMMARY. Intel and the
More informationIPOP-TinCan: User-defined IP-over-P2P Virtual Private Networks
IPOP-TinCan: User-defined IP-over-P2P Virtual Private Networks Renato Figueiredo Advanced Computing and Information Systems Lab University of Florida ipop-project.org Unit 3: Intra-cloud Virtual Networks
More informationMS 20246C Monitoring and Operating a Private Cloud
MS 20246C Monitoring and Operating a Private Cloud Description: Days: 5 Prerequisites: This course describes how to monitor and operate a cloud with Microsoft System Center 2012 R2. This course focuses
More informationCS377: Database Systems Data Security and Privacy. Li Xiong Department of Mathematics and Computer Science Emory University
CS377: Database Systems Data Security and Privacy Li Xiong Department of Mathematics and Computer Science Emory University 1 Principles of Data Security CIA Confidentiality Triad Prevent the disclosure
More informationA Gentle Introduction to Cloud Computing
A Gentle Introduction to Cloud Computing Source: Wikipedia Platform Computing, Inc. Platform Clusters, Grids, Clouds, Whatever Computing The leader in managing large scale shared environments o 18 years
More informationCLOUDFORMS Open Hybrid Cloud
Open Hybrid Cloud Cloud Evolution statt Cloud Revolution Lutz Lange, RHCA, Solution Architect, Red Hat Frank Rosendahl, RHCA, Solution Architect, DASEQ GmbH Cloud Operations Management Delivers an Open
More informationCloud Security. Peter Jopling joplingp@uk.ibm.com IBM UK Ltd Software Group Hursley Labs. peterjopling. 2011 IBM Corporation
Cloud Security Peter Jopling joplingp@uk.ibm.com IBM UK Ltd Software Group Hursley Labs peterjopling 2011 IBM Corporation Cloud computing impacts the implementation of security in fundamentally new ways
More informationAccenture Cloud Enterprise Services
BMC User Forum 2011 Accenture Cloud Enterprise Services Martin Jureit, Accenture GmbH Accenture, its logo, and High Performance Delivered are trademarks of Accenture. Agenda Accenture Cloud Enterprise
More informationMANAGEMENT AND ORCHESTRATION WORKFLOW AUTOMATION FOR VBLOCK INFRASTRUCTURE PLATFORMS
VCE Word Template Table of Contents www.vce.com MANAGEMENT AND ORCHESTRATION WORKFLOW AUTOMATION FOR VBLOCK INFRASTRUCTURE PLATFORMS January 2012 VCE Authors: Changbin Gong: Lead Solution Architect Michael
More informationNATIONAL CYBER SECURITY AWARENESS MONTH
NATIONAL CYBER SECURITY AWARENESS MONTH Tip 1: Security is everyone s responsibility. Develop an awareness framework that challenges, educates and empowers your customers and employees to be part of the
More informationHP Virtualization Performance Viewer
HP Virtualization Performance Viewer Efficiently detect and troubleshoot performance issues in virtualized environments Jean-François Muller - Principal Technical Consultant - jeff.muller@hp.com HP Business
More informationHYPER-V CLOUD DEPLOYMENT GUIDES MODULE 3: OPERATIONS
HYPER-V CLOUD DEPLOYMENT GUIDES MODULE 3: OPERATIONS The Hyper-V Cloud Deployment Guides from Microsoft can help IT Pros by: Accelerating deployment by providing best practices for planning and delivering
More informationVMware vcloud Service Definition for a Public Cloud. Version 1.6
Service Definition for a Public Cloud Version 1.6 Technical WHITE PAPER 2011 VMware, Inc. All rights reserved. This product is protected by U.S. and international copyright and intellectual property laws.
More informationThe evolving IT environment: Maximizing potential of open hybrid clouds
The evolving IT environment: Maximizing potential of open hybrid clouds Every enterprise, from small-and-medium businesses (SMBs) to global enterprises, needs business applications to run its business.
More informationHow To Install Openstack On Ubuntu 14.04 (Amd64)
Getting Started with HP Helion OpenStack Using the Virtual Cloud Installation Method 1 What is OpenStack Cloud Software? A series of interrelated projects that control pools of compute, storage, and networking
More informationRole Based Access Control
Role Based Access Control Role-Based Access Control Models. By R.S. Sandhu, E.J. Coyne, H.L. Feinstein, and C.E. Youman, IEEE Computer, vol 29(2):38--47, February 1996. The most cited paper in access control!
More informationImprove Security with Automated Patch Management
Improve Security with Automated Patch Management Mark Lillywhite Introduction Security is a combination of protection, detection and response Good Systems Management enables Good Security 2014 a memorable
More informationSistemi Operativi e Reti. Cloud Computing
1 Sistemi Operativi e Reti Cloud Computing Facoltà di Scienze Matematiche Fisiche e Naturali Corso di Laurea Magistrale in Informatica Osvaldo Gervasi ogervasi@computer.org 2 Introduction Technologies
More informationCloud Security: The Grand Challenge
Dr. Paul Ashley IBM Software Group pashley@au1.ibm.com Cloud Security: The Grand Challenge Outline Cloud computing: the pros, the cons, the blind spots Security in the cloud - what are the risks now and
More informationPublic Cloud Service Definition
Public Version 1.5 TECHNICAL WHITE PAPER Table Of Contents Introduction... 3 Enterprise Hybrid Cloud... 3 Public Cloud.... 4 VMware vcloud Datacenter Services.... 4 Target Markets and Use Cases.... 4 Challenges
More informationMPSTOR Technology Overview
MPSTOR Technology Overview Delivering operational efficiency to the datacenter through software defined storage enabling data centers generate new higher margin revenue streams via a single programmable
More informationUsing SouthBound APIs to build an SDN Solution. Dan Mihai Dumitriu Midokura Feb 5 th, 2014
Using SouthBound APIs to build an SDN Solution Dan Mihai Dumitriu Midokura Feb 5 th, 2014 Agenda About Midokura Drivers of SDN & Network Virtualization Adoption SDN Architectures Why OpenDaylight? Use
More informationMonitoring and Operating a Private Cloud with System Center 2012 R2 (20246) H8Q03S
HP Education Services course data sheet Monitoring and Operating a Private Cloud with System Center 2012 R2 (20246) H8Q03S Course Overview In this course, you will receive an overview of a private cloud
More informationSecurity of Information Systems hosted in Clouds: SLA Definition and Enforcement in a Dynamic Environment
Security of Information Systems hosted in Clouds: SLA Definition and Enforcement in a Dynamic Environment Christine Morin Inria Joint work with Louis Rilling (DGA-MI), Anna Giannakou (Inria), Jean-Louis
More informationCyber Security: Past, Present and Future
Cyber Security: Past, Present and Future Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security (ICS) University of Texas at San Antonio August 2009 ravi.sandhu@utsa.edu www.profsandhu.com
More informationDeep Security. Προστατεύοντας Server Farm. Σωτήρης Δ. Σαράντος. Available Aug 30, 2011. Σύμβουλος Δικτυακών Λύσεων. Copyright 2011 Trend Micro Inc.
Deep Security Προστατεύοντας Server Farm Available Aug 30, 2011 Σωτήρης Δ. Σαράντος Σύμβουλος Δικτυακών Λύσεων Copyright 2011 Trend Micro Inc. Legacy Security Hinders Datacenter Consolidation Physical
More informationSoftware Define Storage (SDs) and its application to an Openstack Software Defined Infrastructure (SDi) implementation
Software Define Storage (SDs) and its application to an Openstack Software Defined Infrastructure (SDi) implementation This paper discusses how data centers, offering a cloud computing service, can deal
More informationCloud Standardization, Compliance and Certification. Class 2012 event 25.rd of October 2012 Dalibor Baskovc, CEO Zavod e-oblak
Cloud Standardization, Compliance and Certification Class 2012 event 25.rd of October 2012 Dalibor Baskovc, CEO Zavod e-oblak Todays Agenda IT Resourcing with Cloud Computing and related challenges Landscape
More informationHow To Protect Your Cloud Computing Resources From Attack
Security Considerations for Cloud Computing Steve Ouzman Security Engineer AGENDA Introduction Brief Cloud Overview Security Considerations ServiceNow Security Overview Summary Cloud Computing Overview
More informationlocuz.com A comprehensive orchestration tool for setting up private and hybrid clouds
locuz.com A comprehensive orchestration tool for setting up private and hybrid clouds An innovative and flexible cloud platform for creating, deploying and managing highly reliable and scalable cloud infrastructure
More informationAdding value as a Cloud Broker. Nick Hyner Director Cloud Services EMEA Twitter - @nickhyner. Dell.com/Cloud
Adding value as a Cloud Broker Nick Hyner Director Cloud Services EMEA Twitter - @nickhyner Dell.com/Cloud Overview A. Added Value Brokers in all industries in Digital Era B. Experience of Cloud Marketplace
More informationyvette@yvetteagostini.it yvette@yvetteagostini.it
1 The following is merely a collection of notes taken during works, study and just-for-fun activities No copyright infringements intended: all sources are duly listed at the end of the document This work
More informationConsiderations for Adopting PaaS (Platform as a Service)
Considerations for Adopting PaaS (Platform as a Service) Michael Dolan (mdolan@pivotal.io) Senior Field Engineer April 2015 1 Becoming The Agile Enterprise To effectively achieve its missions, the Department
More informationVMware vcloud Director for Service Providers
Architecture Overview TECHNICAL WHITE PAPER Table of Contents Scope of Document....3 About VMware vcloud Director....3 Platform for Infrastructure Cloud...3 Architecture Overview....3 Constructs of vcloud
More informationENISA What s On? ENISA as facilitator for enhanced Network and Information Security in Europe. CENTR General Assembly, Brussels October 4, 2012
ENISA What s On? ENISA as facilitator for enhanced Network and Information Security in Europe CENTR General Assembly, Brussels October 4, 2012 christoffer.karsberg@enisa.europa.eu 1 Who we are ENISA was
More informationVirtual Datacenter or Virtualization in the datacenter. (OpenStack) Larry Rudolph
Virtual Datacenter or Virtualization in the datacenter (OpenStack)! Larry Rudolph A merge of several public presentations Rackspace & NASA started it off, and OpenStack has grown dramatically All possible
More informationAudit My OpenStack Cloud!!
Audit My OpenStack Cloud!! Prabhakar Attaluri, IBM Distinguished Engineer, CTO Vinod Chavan, Cloud Executive Wednesday, August 12, 2015: 04:30 PM - 05:30 PM, Dolphin, Southern Hemisphere 3 Insert Custom
More informationD. L. Corbet & Assoc., LLC
Demystifying the Cloud OR Cloudy with a Chance of Data D. L. Corbet & Assoc., LLC thelinuxguy@donet.com Why 'The Cloud' Common Clouds Considerations and Risk Why 'The Cloud' Distributed Very Large / Very
More informationData Center Connector for vsphere 3.0.0
Product Guide Data Center Connector for vsphere 3.0.0 For use with epolicy Orchestrator 4.6.0, 5.0.0 Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS
More informationCloud Security Who do you trust?
Thought Leadership White Paper Cloud Computing Cloud Security Who do you trust? Nick Coleman, IBM Cloud Security Leader Martin Borrett, IBM Lead Security Architect 2 Cloud Security Who do you trust? Cloud
More informationVMware vcloud Architecture Toolkit Public VMware vcloud Service Definition
VMware vcloud Architecture Toolkit Version 2.0.1 October 2011 This product is protected by U.S. and international copyright and intellectual property laws. This product is covered by one or more patents
More informationThe Cloud in Regulatory Affairs - Validation, Risk Management and Chances -
45 min Webinar: November 14th, 2014 The Cloud in Regulatory Affairs - Validation, Risk Management and Chances - www.cunesoft.com Rainer Schwarz Cunesoft Holger Spalt ivigilance 2014 Cunesoft GmbH PART
More informationCloudCIX Bootcamp. The essential IaaS getting started guide. http://www.cix.ie
The essential IaaS getting started guide. http://www.cix.ie Revision Date: 17 th August 2015 Contents Acronyms... 2 Table of Figures... 3 1 Welcome... 4 2 Architecture... 5 3 Getting Started... 6 3.1 Login
More informationIBM Spectrum Protect in the Cloud
IBM Spectrum Protect in the Cloud. Disclaimer IBM s statements regarding its plans, directions, and intent are subject to change or withdrawal without notice at IBM s sole discretion. Information regarding
More informationSDN Solutions ~SDN for Carrier Data Center~ November, 2013 NEC Corporation
SDN Solutions ~SDN for Carrier Data Center~ November, 2013 NEC Corporation .Strategic Objectives of Carrier, And NEC s Approach Objectives Contribute to improving availability in business process and Network
More informationCloud Security. Let s Open the Box. Abu Shohel Ahmed ahmed.shohel@ericsson.com NomadicLab, Ericsson Research
t Cloud Security Let s Open the Box t Abu Shohel Ahmed ahmed.shohel@ericsson.com NomadicLab, Ericsson Research Facts about Ericsson Ericsson is a world-leading provider of telecommunication equipment and
More informationCloud Security Who do you trust?
Thought Leadership White Paper Cloud Computing Cloud Security Who do you trust? Nick Coleman, IBM Cloud Security Leader Martin Borrett, IBM Lead Security Architect 2 Cloud Security Who do you trust? Cloud
More informationSecurity Issues in Cloud Computing
Security Issues in Computing CSCI 454/554 Computing w Definition based on NIST: A model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources
More informationClodoaldo Barrera Chief Technical Strategist IBM System Storage. Making a successful transition to Software Defined Storage
Clodoaldo Barrera Chief Technical Strategist IBM System Storage Making a successful transition to Software Defined Storage Open Server Summit Santa Clara Nov 2014 Data at the core of everything Data is
More informationManagement for the Mobile-Cloud Era
Management for the Mobile-Cloud Era Sajai Krishnan VP Product Marketing Cloud Management Business Unit September 10, 2014 2014 VMware Inc. All rights reserved. Mobile-cloud Era - The CIO paradox New expectations
More informationSTeP-IN SUMMIT 2013. June 18 21, 2013 at Bangalore, INDIA. Performance Testing of an IAAS Cloud Software (A CloudStack Use Case)
10 th International Conference on Software Testing June 18 21, 2013 at Bangalore, INDIA by Sowmya Krishnan, Senior Software QA Engineer, Citrix Copyright: STeP-IN Forum and Quality Solutions for Information
More informationInstallation Guide Avi Networks Cloud Application Delivery Platform Integration with Cisco Application Policy Infrastructure
Installation Guide Avi Networks Cloud Application Delivery Platform Integration with Cisco Application Policy Infrastructure August 2015 Table of Contents 1 Introduction... 3 Purpose... 3 Products... 3
More informationA unified architecture of IaaS cloud solutions
A unified architecture of IaaS cloud solutions CLASS Conference 2012 (CLASS'12) Robert Dukarić and Matjaž B. Jurič XLAB and FRI Introduction At least 50 different definitions of Cloud Computing. Introduction
More informationPublic cloud? Private cloud? What is
Public cloud? Private cloud? What is the difference? Prepared for: Business/Person/Event Name Date: October 5 th 6 th, 2010 This presentation outlines general information regarding our services and is
More informationVIRTUALIZED SERVICES PLATFORM Software Defined Networking for enterprises and service providers
VIRTUALIZED SERVICES PLATFORM Software Defined Networking for enterprises and service providers Why it s unique The Nuage Networks VSP is the only enterprise and service provider-grade SDN platform that:
More informationAPAC OF POSSIBILITIES: TIPS FOR INCREASING CLOUD SECURITY AND ADOPTION
APAC OF POSSIBILITIES: TIPS FOR INCREASING CLOUD SECURITY AND ADOPTION Ken Low Director of Enterprise Security, Asia Pacific, Trend Micro Chairman, Asia Pacific Executive Council, Cloud Security Alliance
More informationFLOSSK: FLOSSTalk OpenStack 22 nd February, 2012. Arturo Suarez: Founder, COO&BizDev StackOps 21/02/12 1
FLOSSK: FLOSSTalk OpenStack 22 nd February, 2012 Arturo Suarez: Founder, COO&BizDev StackOps 21/02/12 1 l l Introductions OpenStack l l l l l Identifying the gap A little bit of history The Projects The
More informationOffice of Emergency Communications (OEC) Mobile Applications for Public Safety (MAPS)
Office of Emergency Communications (OEC) Mobile Applications for Public Safety (MAPS) PSCR Public Safety Broadband Stakeholder Conference June 4 th, 2014 Alex Kreilein Technology Policy Strategist Office
More informationSecuring the Journey to the Private Cloud. Dominique Dessy RSA, the Security Division of EMC
Securing the Journey to the Private Cloud Dominique Dessy RSA, the Security Division of EMC June 2010 Securing the Journey to The Private Cloud The Journey IT Production Business Production IT-As-A-Service
More informationGAO. INFORMATION SECURITY Governmentwide Guidance Needed to Assist Agencies in Implementing Cloud Computing
GAO For Release on Delivery Expected at 10:00 a.m. EDT Thursday, July 1, 2010 United States Government Accountability Office Testimony Before the Committee on Oversight and Government Reform and Its Subcommittee
More informationKerberos-Based Authentication for OpenStack Cloud Infrastructure as a Service
Kerberos-Based Authentication for OpenStack Cloud Infrastructure as a Service Sazzad Masud and Ram Krishnan University of Texas at San Antonio Sazzad.Masud@gmail.com, Ram.Krishnan@utsa.edu Abstract Cloud
More informationNetzwerkvirtualisierung? Aber mit Sicherheit!
Netzwerkvirtualisierung? Aber mit Sicherheit! Markus Schönberger Advisory Technology Consultant Trend Micro Stephan Bohnengel Sr. Network Virtualization SE VMware Agenda Background and Basic Introduction
More information10965 - IT Service Management with System Center Service Manager
10965 - IT Service Management with System Center Service Manager Duration: 4 Days Course Price: $2,975 Course Description Course Overview This four day training course will provide students with the key
More informationHPE Software SAP Automation
HPE Software SAP Automation Request to Fulfill with Operations Orchestration Peter Gibbels HPE Software Chief Technologist IT4IT Global X-portfolio Architecture - SAP George Giloan HPE Software Developer
More informationSecurity Management of Cloud-Native Applications. Presented By: Rohit Sharma MSc in Dependable Software Systems (DESEM)
Security Management of Cloud-Native Applications Presented By: Rohit Sharma MSc in Dependable Software Systems (DESEM) 1 Outline Context State-of-the-Art Design Patterns Threats to cloud systems Security
More informationAn Oracle White Paper June 2014. Security and the Oracle Database Cloud Service
An Oracle White Paper June 2014 Security and the Oracle Database Cloud Service 1 Table of Contents Overview... 3 Security architecture... 4 User areas... 4 Accounts... 4 Identity Domains... 4 Database
More informationBuilding Storage as a Service with OpenStack. Greg Elkinbard Senior Technical Director
Building Storage as a Service with OpenStack Greg Elkinbard Senior Technical Director MIRANTIS 2012 PAGE 1 About the Presenter Greg Elkinbard Senior Technical Director at Mirantis Builds on demand IaaS
More informationWildFire Reporting. WildFire Administrator s Guide 55. Copyright 2007-2015 Palo Alto Networks
WildFire Reporting When malware is discovered on your network, it is important to take quick action to prevent spread of the malware to other systems. To ensure immediate alerts to malware discovered on
More informationCloud Computing Risk and Rewards
Cloud Computing Risk and Rewards John Lazarine Vice President and Chief Audit Executive Mark Salamasick Director of Center for Internal Auditing For Dallas CPA Society Convergence 2013 May 8, 2013 John
More informationThe Art of Virtualization with Free Software
Master on Free Software 2009/2010 {mvidal,jfcastro}@libresoft.es GSyC/Libresoft URJC April 24th, 2010 (cc) 2010. Some rights reserved. This work is licensed under a Creative Commons Attribution-Share Alike
More informationImplementing Multi-Tenanted Storage for Service Providers with Cloudian HyperStore. The Challenge SOLUTION GUIDE
Implementing Multi-Tenanted Storage for Service Providers with Cloudian HyperStore COST EFFECTIVE SCALABLE STORAGE PLATFORM FOR CLOUD STORAGE SERVICES SOLUTION GUIDE The Challenge Service providers (MSPs/ISPs/ASPs)
More informationEMC ViPR Software Defined Storage
EMC ViPR Software Defined Storage Virtualize Everything Compromise Nothing VIRTUALIZE EVERYTHING COMPROMISE NOTHING Dayne Turbitt Regional Sales Director EMC Advanced Software Division 1 IT is Being Transformed
More informationCloud Security - Risiken und Chancen
Dr. Matthias Schunter, MBA IBM Research Zürich, mts@zurich.ibm.com, http://www.schunter.org Simple Questions Today s Data Center Tomorrow s Public Cloud We Have Control It s located at X. It s stored in
More informationThreat Intelligence. How to Implement Software-Defined Protection. Nir Naaman, CISSP Senior Security Architect
How to Implement Software-Defined Protection Nir Naaman, CISSP Senior Security Architect Threat Intelligence 1 The Spanish flu, 1918 killing at least 50-100 million people worldwide. 2 The H1N1 Pandemic,
More information