A HYPE-FREE STROLL THROUGH CLOUD STORAGE SECURITY
|
|
|
- Elmer Wilcox
- 9 years ago
- Views:
Transcription
1 Eric A. Hibbard, CISSP, CISA, ISSAP, ISSMP, ISSEP, SCSE Hitachi Data Systems A HYPE-FREE STROLL THROUGH CLOUD STORAGE SECURITY Subhash Sankuratripati NetApp
2 SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA unless otherwise noted. Member companies and individual members may use this material in presentations and literature under the following conditions: Any slide or slides used must be reproduced in their entirety without modification The SNIA must be acknowledged as the source of any material used in the body of any document containing material from these presentations. This presentation is a project of the SNIA Education Committee. Neither the author nor the presenter is an attorney and nothing in this presentation is intended to be, or should be construed as legal advice or an opinion of counsel. If you need legal advice or a legal opinion please contact your attorney. The information presented herein represents the author's personal opinion and current understanding of the relevant issues involved. The author, the presenter, and the SNIA do not assume any responsibility or liability for damages arising out of any reliance on or use of this information. NO WARRANTIES, EXPRESS OR IMPLIED. USE AT YOUR OWN RISK. 2
3 Abstract Cloud storage is emerging as a cloud offering that has appeal to a potentially broad set of organizations. Like other forms of cloud computing, the security must be addressed as part of good governance, managing risks and common sense. The Cloud Security Alliance (CSA) guidance on cloud computing security can be used as a starting point for what some believe is a make-or-break element of cloud storage. This session provides an introduction to cloud computing security concepts and issues as well as identifying key guidance and emerging standards. An overview of the current CSA materials and activities is also provided. Finally, the session will provided a security review of the SNIA Cloud Data Management Interface (CDMI) specification, which includes protective measures employed in the management and access of data and storage. 3
4 Cloud Computing Security: An Introduction 4
5 Key Attributes of Cloud (All Must Be Met) Offsite, by third-party provider - In the cloud execution (offsite, locationagnostic) Accessed via the Internet - Standards-based, universal network access though this doesn t preclude security or quality-of-service value-add Minimal/No IT skills to implement - Online, simplified specification of services and no lengthy implementation of on-premise systems Automated Provisioning - Self-service requesting, near real-time deployment, dynamic & fine-grained scaling Fine-Grained Pricing - Usage-based pricing capability though some providers mask this granularity with long-term, fixed price agreements User Interface - browser & successors System Interface Via Web Services APIs - Providing a standards-based framework for accessing and integrating with and among cloud services Shared resources/common versions - Some ability to customize around the shared services, via configuration options within the service Source: IDC on The Cloud ( 5
6 NIST Cloud Computing Characteristics On-demand self-service. A consumer can unilaterally provision computing capabilities as needed automatically without requiring human interaction with each service s provider. Broad network access. Capabilities are available over the network and accessed through standard mechanisms that promote use by heterogeneous thin or thick client platforms. Resource pooling. The provider s computing resources are pooled to serve multiple consumers using a multi-tenant model, with different physical and virtual resources dynamically assigned and reassigned according to consumer demand. Rapid elasticity. Capabilities can be rapidly and elastically provisioned, in some cases automatically, to quickly scale out and rapidly released to quickly scale in. Measured Service. Cloud systems automatically control and optimize resource use by leveraging a metering capability at some level of abstraction appropriate to the type of service. 6
7 NIST Cloud Service Models Cloud Software as a Service (SaaS). The capability provided to the consumer is to use the provider s applications running on a cloud infrastructure. Cloud Platform as a Service (PaaS). The capability provided to the consumer is to deploy onto the cloud infrastructure consumer-created or acquired applications created using programming languages and tools supported by the provider. Cloud Infrastructure as a Service (IaaS). The capability provided to the consumer is to provision processing, storage, networks, and other fundamental computing resources where the consumer is able to deploy and run arbitrary software, which can include operating systems and applications. 7
8 NIST Cloud Deployment Models Private cloud. The cloud infrastructure is operated solely for an organization. It may be managed by the organization or a third party and may exist on premise or off premise. Public cloud. The cloud infrastructure is made available to the general public or a large industry group and is owned by an organization selling cloud services. Hybrid cloud. The cloud infrastructure is a composition of two or more clouds (private, community, or public) that remain unique entities but are bound together by standardized or proprietary technology that enables data and application portability (e.g., cloud bursting for load-balancing between clouds). NOTE: NIST also defines a community cloud model, which is not included here because it not very common. 8
9 NIST View of the Cloud 9
10 An Application View of Cloud Application Domains Service Delivery Models Software-as-a-Service (SaaS) Platform-as-a-Service (PaaS) Infrastructure-as-a-Service (IaaS) Public Hybrid Private SOURCE: Cloud Security and Privacy, Mather, Kumaraswamy and Latif 2009, O Reilly, ISBN:
11 Top Security Concerns with Cloud Understanding how Cloud services provide for the following: Preserving confidentiality, integrity and availability Maintaining appropriate levels of identity and access Control Ensuring appropriate audit and compliance capability Dealing with loss of control Physical and Logical access Trusting the cloud service providers 11
12 Cloud Security (or Insecurity) Core Information Assurance issues to address: Confidentiality Integrity Availability Possession Authenticity Utility Privacy Authorized use Non-repudiation Data loss and/or leakage measures become even more important Data aggregation changes the risk equation Legal and compliance forces require additional due diligence Forced exits and data disposition have to be carefully thought out Incident management become much more complicated 12
13 Possible Security Benefits Centralized data Segmented data and applications Better logging/accountability Standardized images for asset deployment Better resilience to attack & streamlined incident response More streamlined audit and compliance Better visibility to process Faster deployment of applications, services, etc. 13
14 Litigating in the Cloud Privacy and the Cloud Sensitive information is potentially moving around the Internet within the cloud in violation of law Data protection and security dependent on contractual terms and service level agreements Data may be crossing national boundaries (possibly multiple jurisdictions) Digital Evidence and the Cloud Amassing the forensic data from the various sources could be a serious challenge Real-time nature of cloud services may reduce the amount and nature of digital evidence The integrity and authenticity of data may be questionable (for example, inadequate protections against attacks) Electronic Discovery and the Cloud Organizations will have additional challenges identifying relevant data because business units are directly leveraging the Cloud Relevant data could be within the hands of a large number of third parties (suppliers to suppliers) 14
15 Boundary-less subpoena In the traditional world, in order for a government to obtain access to a tenants data, the tenant has to have some physical presence in that country But, in the era of the cloud, all it requires is a physical presence of the cloud provider This is not limited to just the U.S. Patriot Act (Other law enforcement authorities have invoked similar provisions) 15
16 Cloud Standards Activities (1) Cloud Security Alliance (CSA) has released various best practice guides on cloud deployments Distributed Management Task Force (DMTF) has released whitepapers on cloud management and interoperability ISO/IEC JTC 1 Subcommittee 27 (SC27) on IT Security Techniques covers a broad range of security topics ISO/IEC JTC 1 Subcommittee 38 (SC38) on Distributed Application Platforms and Services (DAPS) has a focus on Web services, SOA, and cloud computing Source: cloud-standards.org 16
17 Cloud Standards Activities (2) Object Management Group (OMG) is modeling cloud deployments for portability, interoperability & reuse Open Cloud Consortium (OCC) has developed a benchmark and is working on a reference model for large data clouds Open Grid Forum (OGF) has published an Open Cloud Computing Interface (OCCI) to standardize cloud management tasks Storage Networking Industry Association (SNIA) has released v1.0 of the Cloud Data Management Interface (CDMI) specification More information at 17
18 Cloud Security Resources SNIA Cloud Storage Initiative, Cloud Security Alliance (CSA), Security Guidance for Critical Areas of Focus in Cloud Computing, Top Threats to Cloud Computing, European Network and information Security Agency (ENISA), Cloud Computing Benefits, risks and recommendations for information security, Information Systems Audit and Control Association (ISACA), Cloud Computing: Business Benefits With Security, Governance and Assurance Perspectives, Cloud Security and Privacy, Mather, Kumaraswamy, Latif, 2009, O Reilly Publishing, ISBN:
19 Overview of Cloud Security Alliance (CSA) Activities 19
20 Cloud Security Alliance (CSA) CSA is a non-profit organization formed to promote the use of best practices for providing security assurance within Cloud Computing The CSA objectives: Promote a common level of understanding between the consumers and providers of cloud computing regarding the necessary security requirements and attestation of assurance. Promote independent research into best practices for cloud computing security. Launch awareness campaigns and educational programs on the appropriate uses of cloud computing and cloud security solutions. Create consensus lists of issues and guidance for cloud security assurance. 20
21 CSA Cloud Security Guidance Governance Governance and Enterprise Risk Management Legal and Electronic Discovery Compliance and Audit Information Lifecycle Management Operations Traditional Security, Business Continuity and Disaster Recovery Data Center Operations Incident Response, Notification and Remediation Application Security Portability and Interoperability Encryption and Key Management Identity and Access Management Virtualization NOTE: The governance domains are broad and address strategic and policy issues within a cloud computing environment, while the operational domains focus on more tactical security concerns and implementation within the architecture. SOURCE: Cloud Security Alliance, Security Guidance for Critical Areas of Focus in Cloud Computing, Version 2.1, 2009, 21
22 CSA Cloud Controls Matrix v1.2 Compliance [6] Data Governance [8] Facility Security [8] Human Resources [3] Information Security [34] Legal [2] Operations Management [4] Risk Management [5] Release Management [5] Resiliency [8] Security Architecture [15] Provides mappings on Architectural relevance (Physical, Network, Compute, Storage, Application, Data and Corporate Governance) Delivery Models (SaaS, PaaS, IaaS) Supplier relationships (Service Provider and Tenant) Not currently aligned with the CSA guidance 22
23 CSA Top Threats v1.0 #1: Abuse and Nefarious Use of Cloud Computing #2: Insecure Interfaces and APIs #3: Malicious Insiders #4: Shared Technology Issues #5: Data Loss or Leakage #6: Account or Service Hijacking #7: Unknown Risk Profile 23
24 Cloud storage 24
25 Cloud Provider Security Data confidentiality Is data encrypted at-rest? In transit? If so, who manages the keys? Data segmentation assurances What are the assurances they provide which ensure that a tenants data is kept isolated from others? Data replication Are there locality controls on where data can or cannot physically reside? Data sanitization policies Can they get rid of a tenant s data on demand? How long will that process take? Incident Management How are security incidents handled? Who does breach notifications? Independent assessment A 3 rd party assessment that validates the providers policies and claims would be mandatory 25
26 Cloud storage models Storage as a service typically used for disaster recovery purposes Encrypt at tenant? Encrypt at provider? Key management? IaaS tenant data that is created as part of the business processing Can the key management be controlled by the tenant if data needs to be encrypted? 26
27 Cloud storage access Provider specific protocols Standard CDMI (Cloud Data Management Interface) 27
28 Security Review of CDMI 28
29 Cloud Data Management Interface Applicable to three types of Cloud Storage: Cloud Storage for Cloud Computing Whitepaper at snia.org/cloud the management interface for the lifecycle of storage in a compute cloud Public Storage Cloud Both a Data Path for the Cloud and a Management Path for the Cloud Data Private Cloud Storage As well as hybrid clouds An API for Storage Vendors selling into Cloud based solutions Semantics Simple Containers and Data Objects with tagged Metadata Data System Metadata expresses the data requirements Protocol RESTful HTTP as core interface style JSON (JavaScript Object Notation) format of the representations are extensible 29
30 CDMI Data Objects Stored data can be accessed using native protocols: HTTP, CIFS, NFS, iscsi, SQL, etc. Stored data can also be accessed using CDMI as a Data Path in a standardized manner. This facilitates: Cloud-to-cloud migration Cloud federation Cloud backup Cloud virus scanning Cloud search And more. Desired cloud storage characteristics can be associated with stored data: Replication, Compression, Placement, Retention, QoS, etc. 30
31 The Complete CDMI Picture 31
32 CDMI Security Summary Security refers to the protective measures employed in managing and accessing data and storage. Security measures: Include transport security, user and entity authentication, authorization and access controls, data integrity, data and media sanitization, data retention, protections against malware, data at rest encryption, and security capability queries. Take the form of mandatory, optional, and vendor extensions The transport security and security capability queries are mandatory for all implementation; all other security mechanisms are optional to implement. Client use of security is always optional, but encouraged. 32
33 CDMI Security Objectives Provide a mechanism that assures that the communications between a CDMI client and server cannot be read or modified by a third party Provide a mechanism that allows CDMI clients and servers to provide an assurance of their identity Provide a mechanism that allows control of the actions a CDMI client is permitted to perform on a CDMI server Provide a mechanism for records to be generated for actions performed by a CDMI client on a CDMI server Provide mechanisms to protect data at rest Provide a mechanism to eliminate data in a controlled manner Provide mechanisms to discover the security capabilities of a particular implementation 33
34 Exploiting the Mandatory and Optional Features Always check the security capabilities of your cloud service provider s CDMI implementation Ensure it has adequate protective measures Make a risk based decision to use a particular implementation Use TLS (preferably TLS 1.2) to Authenticate CDMI entities (certificates for servers; HTTP authentication for clients) Encrypt sensitive information communicated between CDMI entities. 34
35 Exploiting the Mandatory and Optional Features (cont.) Use Domains to provide a place for authentication mappings to external authentication providers Audit logging within the context of CDMI Establish logging queues and restrict access Capture messages for all security and data management events Make sure the CDMI client retrieves the messages on a regular basis 35
36 Exploiting the Mandatory and Optional Features (cont.) Align the automatic deletion capability with the organization s data retention policy Prior to using Holds, understand the process and mechanism for lifting the Holds For cryptographic functionality, it is always important to verify that the implementation has complied with the requested algorithm; something other than what was requested may be used 36
37 Final Thoughts 37
38 Summary It is possible to engineer solutions across most cloud services today that meet or exceed the security provided within the enterprise however, the capability to execute may not be a reality! The various value propositions of cloud (agility, low cost, scalability, security) are often conflated, suggesting all four can be achieved simultaneously and in equal proportions; this is a fallacy because trade-off are almost always required. 38
39 Cloud Security Tips Cloud-based security is not a substitute for existing ICT security think defense in depth Understand the Terms of Service this is the best you can expect Don t put anything in the cloud you wouldn t want someone else to see (government, competitor, or a private litigant) Placing consumer data in the cloud could put you at risk of violating the law where is it? 39
40 Final Thoughts Security and legal issues will persist as challenges for organizations that choose to use cloud computing, but there are promising signs that some of these issues will be addressed. It is, however, extremely important to understand the risks and to enter the cloud with your eyes wide open (i.e., select a cloud service provider that offers an appropriate set of contractual terms and conditions as well as demonstrable risk mitigations). 40
41 SNIA Security Organizations SNIA Security Technical Work Group (TWG) Focus: Requirements, architectures, interfaces, practices, technology, educational materials, and terminology for storage networking. Storage Security Industry Forum (SSIF) Focus: Educational materials, customer needs, whitepapers, and best practices for storage security. 41
42 Other SNIA Security Tutorials Data Encryption Track: Thursday 8:30 am: Implementing Stored-Data Encryption Thursday 11:15 am: Practical Secure Storage: A Vendor Agnostic Overview 42
43 Q&A / Feedback Please send any questions or comments on this presentation to SNIA: [email protected] Many thanks to the following individuals for their contributions to this tutorial. - SNIA Education Committee Eric A. Hibbard, CISSP, CISA Subhash Sankuratripati SNIA Security TWG SNIA Cloud Storage TWG 43
Cloud Storage Security with a Focus on CDMI. Eric A. Hibbard, CISSP, CISA, ISSAP, ISSMP, ISSEP, SCSE Hitachi Data Systems
Cloud Storage Security with a Focus on CDMI Eric A. Hibbard, CISSP, CISA, ISSAP, ISSMP, ISSEP, SCSE Hitachi Data Systems SNIA Legal Notice The material contained in this tutorial is copyrighted by the
CLOUD STORAGE SECURITY INTRODUCTION. Gordon Arnold, IBM
CLOUD STORAGE SECURITY INTRODUCTION Gordon Arnold, IBM SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and individual members may use this material
STORAGE SECURITY TUTORIAL With a focus on Cloud Storage. Gordon Arnold, IBM
STORAGE SECURITY TUTORIAL With a focus on Cloud Storage Gordon Arnold, IBM SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and individual members
Interoperable Cloud Storage with the CDMI Standard
Interoperable Cloud Storage with the CDMI Standard Storage and Data Management in a post-filesystem World Mark Carlson, SNIA TC and Oracle Co-Chair, SNIA Cloud Storage TWG and Initiative Author: Mark Carlson,
Storage Clouds. Karthik Ramarao. Director of Strategy and Technology and CTO Asia Pacific, NetApp Board Director SNIA South Asia
Deploying PRESENTATION Public, TITLE Private, GOES HERE and Hybrid Storage Clouds Karthik Ramarao Director of Strategy and Technology and CTO Asia Pacific, NetApp Board Director SNIA South Asia SNIA Legal
Unmasking Virtualization Security. Eric A. Hibbard, CISSP, CISA Hitachi Data Systems
Eric A. Hibbard, CISSP, CISA Hitachi Data Systems SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA unless otherwise noted. Member companies and individual members may
Cloud Computing and Security Risk Analysis Qing Liu Technology Architect STREAM Technology Lab [email protected]
Cloud Computing and Security Risk Analysis Qing Liu Technology Architect STREAM Technology Lab [email protected] 1 Disclaimers This presentation provides education on Cloud Computing and its security
Cloud Storage Standards Overview and Research Ideas Brainstorm
Cloud Storage Standards Overview and Research Ideas Brainstorm Mark Carlson, SNIA TC and Sun Chair, SNIA Cloud Storage TWG CMU SDI Lecture 12 th November 2009 Abstract! Cloud Storage is a new business
Security Issues in Cloud Computing
Security Issues in Computing CSCI 454/554 Computing w Definition based on NIST: A model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources
Cloud Data Management Interface (CDMI) The Cloud Storage Standard. Mark Carlson, SNIA TC and Oracle Chair, SNIA Cloud Storage TWG
Cloud Data Management Interface (CDMI) The Cloud Storage Standard Mark Carlson, SNIA TC and Oracle Chair, SNIA Cloud Storage TWG SNIA Legal Notice The material contained in this tutorial is copyrighted
GOT LAWYERS? THEY'VE GOT STORAGE AND ESI IN THE CROSS-HAIRS!
Eric A. Hibbard, CISSP, CISA, ISSAP, ISSMP, ISSEP, SCSE Hitachi Data Systems GOT LAWYERS? THEY'VE GOT STORAGE AND ESI IN THE CROSS-HAIRS! David Stevens Dell SNIA Legal Notice The material contained in
[email protected] [email protected]
1 The following is merely a collection of notes taken during works, study and just-for-fun activities No copyright infringements intended: all sources are duly listed at the end of the document This work
Cloud Computing: What needs to Be Validated and Qualified. Ivan Soto
Cloud Computing: What needs to Be Validated and Qualified Ivan Soto Learning Objectives At the end of this session we will have covered: Technical Overview of the Cloud Risk Factors Cloud Security & Data
Cloud Computing. Course: Designing and Implementing Service Oriented Business Processes
Cloud Computing Supplementary slides Course: Designing and Implementing Service Oriented Business Processes 1 Introduction Cloud computing represents a new way, in some cases a more cost effective way,
Enterprise Architecture and the Cloud. Marty Stogsdill, Oracle
Marty Stogsdill, Oracle SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA unless otherwise noted. Member companies and individual members may use this material in presentations
Cloud Storage: Where Does It Fit Into Tomorrow s IT?
Cloud Storage: Where Does It Fit Into Tomorrow s IT? Vincent Franceschini CTO Distributed Data Storage Solutions Hitachi Data Systems Corporation [email protected] Constant, increasing reliance
Managing Cloud Computing Risk
Managing Cloud Computing Risk Presented By: Dan Desko; Manager, Internal IT Audit & Risk Advisory Services Schneider Downs & Co. Inc. [email protected] Learning Objectives Understand how to identify
Deploying Public, Private, and Hybrid Storage Clouds. Marty Stogsdill, Oracle
Deploying Public, Private, and Hybrid Storage Clouds Marty Stogsdill, Oracle SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA unless otherwise noted. Member companies
The Hybrid Cloud: Bringing Cloud-Based IT Services to State Government
The Hybrid Cloud: Bringing Cloud-Based IT Services to State Government October 4, 2009 Prepared By: Robert Woolley and David Fletcher Introduction Provisioning Information Technology (IT) services to enterprises
Storage Clouds. Enterprise Architecture and the Cloud. Author and Presenter: Marty Stogsdill, Oracle
Deploying PRESENTATION Public, TITLE Private, GOES HERE and Hybrid Storage Clouds Enterprise Architecture and the Cloud Author and Presenter: Marty Stogsdill, Oracle SNIA Legal Notice The material contained
Cloud Security Introduction and Overview
Introduction and Overview Klaus Gribi Senior Security Consultant [email protected] May 6, 2015 Agenda 2 1. Cloud Security Cloud Evolution, Service and Deployment models Overview and the Notorious
Cloud Security considerations for business adoption. Ricci IEONG CSA-HK&M Chapter
Cloud Security considerations for business adoption Ricci IEONG CSA-HK&M Chapter What is Cloud Computing? Slide 2 What is Cloud Computing? My Cloud @ Internet Pogoplug What is Cloud Computing? Compute
East African Information Conference 13-14 th August, 2013, Kampala, Uganda. Security and Privacy: Can we trust the cloud?
East African Information Conference 13-14 th August, 2013, Kampala, Uganda Security and Privacy: Can we trust the cloud? By Dr. David Turahi Director, Information Technology and Information Management
White Paper on CLOUD COMPUTING
White Paper on CLOUD COMPUTING INDEX 1. Introduction 2. Features of Cloud Computing 3. Benefits of Cloud computing 4. Service models of Cloud Computing 5. Deployment models of Cloud Computing 6. Examples
Running head: TAKING A DEEPER LOOK AT THE CLOUD: SOLUTION OR 1
Running head: TAKING A DEEPER LOOK AT THE CLOUD: SOLUTION OR 1 Taking a Deeper Look at the Cloud: Solution or Security Risk? LoyCurtis Smith East Carolina University TAKING A DEEPER LOOK AT THE CLOUD:
Cloud definitions you've been pretending to understand. Jack Daniel, Reluctant CISSP, MVP Community Development Manager, Astaro
Cloud definitions you've been pretending to understand Jack Daniel, Reluctant CISSP, MVP Community Development Manager, Astaro You keep using that word cloud. I do not think it means what you think it
Enterprise Architecture and the Cloud. Marty Stogsdill, Oracle
Marty Stogsdill, Oracle SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA unless otherwise noted. Member companies and individual members may use this material in presentations
Implementing, Serving, and Using Cloud Storage
Implementing, Serving, and Using Cloud Storage Cloud Storage Initiative October 2010 Table of Contents Introduction...1 The Business Case for Cloud Storage...1 Applications for Cloud Storage...3 Backup...3
The Business Case for the Cloud. Presenter: Alex McDonald, Industry Standards, CTO Office, NetApp Author: Marty Stogsdill, Oracle
Presenter: Alex McDonald, Industry Standards, CTO Office, NetApp Author: Marty Stogsdill, Oracle SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA unless otherwise noted.
NETWORK ACCESS CONTROL AND CLOUD SECURITY. Tran Song Dat Phuc SeoulTech 2015
NETWORK ACCESS CONTROL AND CLOUD SECURITY Tran Song Dat Phuc SeoulTech 2015 Table of Contents Network Access Control (NAC) Network Access Enforcement Methods Extensible Authentication Protocol IEEE 802.1X
Securing The Cloud. Foundational Best Practices For Securing Cloud Computing. Scott Clark. Insert presenter logo here on slide master
Securing The Cloud Foundational Best Practices For Securing Cloud Computing Scott Clark Agenda Introduction to Cloud Computing What is Different in the Cloud? CSA Guidance Additional Resources 2 What is
LEGAL ISSUES IN CLOUD COMPUTING
LEGAL ISSUES IN CLOUD COMPUTING RITAMBHARA AGRAWAL INTELLIGERE 1 CLOUD COMPUTING Cloud computing is a model for enabling convenient, on-demand network access to a shared pool of configurable computing
September 2009 Cloud Storage for Cloud Computing
September 2009 Cloud Storage for Cloud Computing This paper is a joint production of the Storage Networking Industry Association and the Open Grid Forum. Copyright 2009 Open Grid Forum, Copyright 2009
IS PRIVATE CLOUD A UNICORN?
IS PRIVATE CLOUD A UNICORN? With all of the discussion, adoption, and expansion of cloud offerings there is a constant debate that continues to rear its head: Public vs. Private or more bluntly Is there
Assessing Risks in the Cloud
Assessing Risks in the Cloud Jim Reavis Executive Director Cloud Security Alliance Agenda Definitions of Cloud & Cloud Usage Key Cloud Risks About CSA CSA Guidance approach to Addressing Risks Research
Securing The Cloud. Russ Fellows, Managing Partner - Evaluator Group Inc.
Securing The Cloud Russ Fellows, Managing Partner - Evaluator Group Inc. SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and individual members may
Legal Issues in the Cloud: A Case Study. Jason Epstein
Legal Issues in the Cloud: A Case Study Jason Epstein Outline Overview of Cloud Computing Service Models (SaaS, PaaS, IaaS) Deployment Models (Private, Community, Public, Hybrid) Adoption Different types
Cloud Computing. Bringing the Cloud into Focus
Cloud Computing Bringing the Cloud into Focus November 2011 Introduction Ken Cochrane CEO, IT/NET Partner, KPGM Performance and Technology National co-leader IT Advisory Services KPMG Andrew Brewin Vice
10/25/2012 BY VORAPOJ LOOKMAIPUN CISSP, CISA, CISM, CRISC, CEH [email protected]. Agenda. Security Cases What is Cloud? Road Map Security Concerns
BY VORAPOJ LOOKMAIPUN CISSP, CISA, CISM, CRISC, CEH [email protected] Agenda Security Cases What is Cloud? Road Map Security Concerns 1 Security Cases on Cloud Data Protection - Two arrested in ipad
journey to a hybrid cloud
journey to a hybrid cloud Virtualization and Automation VI015SN journey to a hybrid cloud Jim Sweeney, CTO GTSI about the speaker Jim Sweeney GTSI, Chief Technology Officer 35 years of engineering experience
INTRODUCTION TO CLOUD COMPUTING CEN483 PARALLEL AND DISTRIBUTED SYSTEMS
INTRODUCTION TO CLOUD COMPUTING CEN483 PARALLEL AND DISTRIBUTED SYSTEMS CLOUD COMPUTING Cloud computing is a model for enabling convenient, ondemand network access to a shared pool of configurable computing
Cloud Computing: Risks and Auditing
IIA Chicago Chapter 53 rd Annual Seminar April 15, 2013, Donald E. Stephens Convention Center @IIAChicago #IIACHI Cloud Computing: Risks Auditing Phil Lageschulte/Partner/KPMG Sailesh Gadia/Director/KPMG
Capturing the New Frontier:
Capturing the New Frontier: How Software Security Unlocks the Power of Cloud Computing Executive Summary Cloud computing is garnering a vast share of IT interest. Its promise of revolutionary cost savings
Cloud Security Implications for Financial Institutions By Scott Galyk Director of Software Development FIMAC Solutions, LLC
Cloud Security Implications for Financial Institutions By Scott Galyk Director of Software Development FIMAC Solutions, LLC www.fmsinc.org 1 2015 Financial Managers Society, Inc. Cloud Security Implications
Storage Cloud Environments. Alex McDonald NetApp
Deploying PRESENTATION Public, TITLE Private, GOES HERE and Hybrid Storage Cloud Environments Alex McDonald NetApp Webcast Presenter Alex McDonald joined NetApp in 2005, after more than 30 years in a variety
Overview of Cloud Computing and Cloud Computing s Use in Government Justin Heyman CGCIO, Information Technology Specialist, Township of Franklin
Overview of Cloud Computing and Cloud Computing s Use in Government Justin Heyman CGCIO, Information Technology Specialist, Township of Franklin Best Practices for Security in the Cloud John Essner, Director
Security Issues in Cloud Computing
Security Issues in Cloud Computing Dr. A. Askarunisa Professor and Head Vickram College of Engineering, Madurai, Tamilnadu, India N.Ganesh Sr.Lecturer Vickram College of Engineering, Madurai, Tamilnadu,
Lifting the Fog Around Cloud Computing. Eric A. Hibbard, CISSP-ISSAP, ISSEP, ISSMP, CISA CTO Security & Privacy Hitachi Data systems
Lifting the Fog Around Cloud Computing Eric A. Hibbard, CISSP-ISSAP, ISSEP, ISSMP, CISA CTO Security & Privacy Hitachi Data systems 1 Straw Poll Cloud Awareness A. To truly understand clouds one should
OWASP Chapter Meeting June 2010. Presented by: Brayton Rider, SecureState Chief Architect
OWASP Chapter Meeting June 2010 Presented by: Brayton Rider, SecureState Chief Architect Agenda What is Cloud Computing? Cloud Service Models Cloud Deployment Models Cloud Computing Security Security Cloud
A white paper from Fordway on CLOUD COMPUTING. Why private cloud should be your first step on the cloud computing journey - and how to get there
A white paper from Fordway on CLOUD COMPUTING Why private cloud should be your first step on the cloud computing journey - and how to get there PRIVATE CLOUD WHITE PAPER January 2012 www.fordway.com Page
SNIA Storage Security Best Practices
Author: Eric A. Hibbard, CISSP, CISA, ISSAP, ISSMP, ISSEP, SCSE Hitachi Data Systems SNIA Storage Security Best Practices Presented by Gordon Arnold Senior Technical Staff, IBM Chair Storage Security Industry
How To Manage Cloud Data Safely
Information Governance In The Cloud Galina Datskovsky, Ph. D., CRM President of ARMA International SVP Information Governance Solutions Topics Cloud Characteristics And Risks Information Management In
See Appendix A for the complete definition which includes the five essential characteristics, three service models, and four deployment models.
Cloud Strategy Information Systems and Technology Bruce Campbell What is the Cloud? From http://csrc.nist.gov/publications/nistpubs/800-145/sp800-145.pdf Cloud computing is a model for enabling ubiquitous,
Cloud Computing and Records Management
GPO Box 2343 Adelaide SA 5001 Tel (+61 8) 8204 8773 Fax (+61 8) 8204 8777 DX:336 [email protected] www.archives.sa.gov.au Cloud Computing and Records Management June 2015 Version 1 Version
Cloud Computing Security Issues
Copyright Marchany 2010 Cloud Computing Security Issues Randy Marchany, VA Tech IT Security, [email protected] Something Old, Something New New: Cloud describes the use of a collection of services, applications,
Cloud Infrastructure Security
Cloud Infrastructure Security Dimiter Velev 1 and Plamena Zlateva 2 1 University of National and World Economy, UNSS - Studentski grad, 1700 Sofia, Bulgaria [email protected] 2 Institute of Control and
The Magical Cloud. Lennart Franked. Department for Information and Communicationsystems (ICS), Mid Sweden University, Sundsvall.
The Magical Cloud Lennart Franked Department for Information and Communicationsystems (ICS), Mid Sweden University, Sundsvall. 2014-10-20 Lennart Franked (MIUN IKS) The Magical Cloud 2014-10-20 1 / 35
Kent State University s Cloud Strategy
Kent State University s Cloud Strategy Table of Contents Item Page 1. From the CIO 3 2. Strategic Direction for Cloud Computing at Kent State 4 3. Cloud Computing at Kent State University 5 4. Methodology
HIPAA CRITICAL AREAS TECHNICAL SECURITY FOCUS FOR CLOUD DEPLOYMENT
HIPAA CRITICAL AREAS TECHNICAL SECURITY FOCUS FOR CLOUD DEPLOYMENT A Review List This paper was put together with Security in mind, ISO, and HIPAA, for guidance as you move into a cloud deployment Dr.
Cloud Security. DLT Solutions LLC June 2011. #DLTCloud
Cloud Security DLT Solutions LLC June 2011 Contact Information DLT Cloud Advisory Group 1-855-CLOUD01 (256-8301) [email protected] www.dlt.com/cloud Your Hosts Van Ristau Chief Technology Officer, DLT Solutions
What Cloud computing means in real life
ITU TRCSL Symposium on Cloud Computing Session 2: Cloud Computing Foundation and Requirements What Cloud computing means in real life Saman Perera Senior General Manager Information Systems Mobitel (Pvt)
Essential Characteristics of Cloud Computing: On-Demand Self-Service Rapid Elasticity Location Independence Resource Pooling Measured Service
Cloud Computing Although cloud computing is quite a recent term, elements of the concept have been around for years. It is the maturation of Internet. Cloud Computing is the fine end result of a long chain;
AskAvanade: Answering the Burning Questions around Cloud Computing
AskAvanade: Answering the Burning Questions around Cloud Computing There is a great deal of interest in better leveraging the benefits of cloud computing. While there is a lot of excitement about the cloud,
Storage Multi-Tenancy for Cloud Computing. Paul Feresten, NetApp; SNIA Cloud Storage Initiative Member
Paul Feresten, NetApp; SNIA Cloud Storage Initiative Member March, 2010 Table of Contents Introduction...1 What is Multi-Tenancy?...2 Storage Multi-Tenancy...2 Enabling Cloud-Based Data Management CDMI...3
Cloud Security Alliance New Zealand Contribution to the Privacy Commissioner. 23 February 2012
Cloud Security Alliance New Zealand Contribution to the Privacy Commissioner 23 February 2012 Foreword Cloud Security Alliance New Zealand Chapter is grateful to Privacy Commissioner for giving an opportunity
Clouds on the Horizon Cloud Security in Today s DoD Environment. Bill Musson Security Analyst
Clouds on the Horizon Cloud Security in Today s DoD Environment Bill Musson Security Analyst Agenda O Overview of Cloud architectures O Essential characteristics O Cloud service models O Cloud deployment
Cloud Computing; What is it, How long has it been here, and Where is it going?
Cloud Computing; What is it, How long has it been here, and Where is it going? David Losacco, CPA, CIA, CISA Principal January 10, 2013 Agenda The Cloud WHAT IS THE CLOUD? How long has it been here? Where
Cloud Computing Standards: Overview and ITU-T positioning
ITU Workshop on Cloud Computing (Tunis, Tunisia, 18-19 June 2012) Cloud Computing Standards: Overview and ITU-T positioning Dr France Telecom, Orange Labs Networks & Carriers / R&D Chairman ITU-T Working
Managing Data Storage in the Public Cloud. October 2009
October 2009 Table of Contents Introduction...1 What is a Public Cloud?...1 Managing Data Storage as a Service...2 Improving Public Cloud Storage CDMI...4 How CDMI Works...4 Metadata in CDMI... 6 CDMI
The NIST Definition of Cloud Computing (Draft)
Special Publication 800-145 (Draft) The NIST Definition of Cloud Computing (Draft) Recommendations of the National Institute of Standards and Technology Peter Mell Timothy Grance NIST Special Publication
CLOUD COMPUTING DEMYSTIFIED
CLOUD COMPUTING DEMYSTIFIED Definitions you ve been pretending to understand JACK DANIEL, CCSK, CISSP, MVP ENTERPRISE SECURITY Definitions Words have meaning, professionals need to understand them. We
Key Considerations of Regulatory Compliance in the Public Cloud
Key Considerations of Regulatory Compliance in the Public Cloud W. Noel Haskins-Hafer CRMA, CISA, CISM, CFE, CGEIT, CRISC 10 April, 2013 [email protected] Disclaimer Unless otherwise specified,
6 Cloud computing overview
6 Cloud computing overview 6.1 General ISO/IEC 17788:2014 (E) Cloud Computing Overview Page 1 of 6 Cloud computing is a paradigm for enabling network access to a scalable and elastic pool of shareable
Architecting the Cloud
Architecting the Cloud Sumanth Tarigopula Director, India Center, Best Shore Applications Services 2011Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without
How To Create A Cloud Backup Service
Cloud Backup Recovery and Restore Requirements Ashar Baig, Asigra Chairman, SNIA Cloud Backup Recovery and Restore (BURR) Special Interest Group (SIG) SNIA Legal Notice The material contained in this tutorial
Cloud Computing Governance & Security. Security Risks in the Cloud
Cloud Computing Governance & Security The top ten questions you have to ask Mike Small CEng, FBCS, CITP Fellow Analyst, KuppingerCole This Webinar is supported by Agenda What is the Problem? Ten Cloud
Cloud Computing in the Federal Sector: What is it, what to worry about, and what to negotiate.
Cloud Computing in the Federal Sector: What is it, what to worry about, and what to negotiate. Presented by: Sabrina M. Segal, USITC, Counselor to the Inspector General, [email protected] Reference
Cloud Computing and Standards
Cloud Computing and Standards Heather Kreger CTO International Standards, IBM [email protected] 2012 IBM Corporation Technology will play the key role in success Speed Value 90% 1 view cloud as critical
