SPECS Secure Provisioning of Cloud Services based on SLA Management

Size: px
Start display at page:

Download "SPECS Secure Provisioning of Cloud Services based on SLA Management"

Transcription

1 SPECS Secure Provisioning of Cloud Services based on SLA Management

2 SPECS Project CeRICT, Italy (coordinator) TUD, Germany IeAT, Romania CSA, United Kingdom FP7-ICT Project Start: 1/11/2013 Project Type: STREP Duration: 30M Total Funding: 3.5 M EU Contribution: 2.4 M XLAB, Slovenia EISI, Ireland

3 SPECS - The Problem Imagine : You are a corporate security manager, You want to migrate some applications to the Cloud. Your Resources Cloud Provider End User Your data

4 SPECS The Problem Data resides on a remote Cloud Service Provider (CSP). Data is security sensitive: Assurance that the CSP's personnel will not have access to your data guarantee that only authorized people can access your data assess a CSP's ability to meet the security requirements, and select a CSP on this basis. What are the security trades-offs offered by different CSPs? - How does one continuously monitor, and enforce the agreed Cloud security levels with the CSP?

5 SPECS - The Problem Denial of Services Your Resources Cloud Provider End User WHO GRANTS YOU? Your data Privacy Cloud Provider

6 SPECS - The Problem Your Resources Denial of Services SLA Cloud Provider End User SPECS SLA Privacy Cloud Provider Your data

7 SPECS Core Idea Problem Statement: End-User Cloud Security (How to compare CSP?, What they grant? How to improve their security features if they do not grant enough? ) Approach: Security-as-a-Service (SECaaS), a Platform which offers security services. Service Level Agreement (SLA) for Security. End-User and CSP features described through SLAs. The SECaaS granted through the SLA life cycle

8 SPECS Platform - WHO GENERAL MODEL Actors: Customers Developer Service Provider Systems: Cloud Application Cloud Platform Cloud Providers

9 SPECS Platform - WHO Interaction Model 1 Hosted Platform Buy resources from Cloud Offer (Security) Services to End Users Buy/Broker resources from Cloud for end user

10 SPECS Platform - WHO Interaction Model 2 Hosting CSP Has its own resources Add Security to its Services for End Users

11 SPECS Platform - WHO Interaction Model 3 End User Platform Buy resources from Cloud End User improve Security on the target services

12 SPECS Platform - HOW The Stack

13 SPECS Platform HOW SLA Management SLA among Users, SPECS and Providers Negotiation Finding the Agreement Monitoring Veryfing the respect of Agreement Enforcement Take Action to grant the Agreement

14 SPECS Platform - HOW SLA Negotiation Conditions: SLA is not fully defined, customer(s) and provider(s) conduct a negotiation process on requirements/services to find agreement Goals Service Provider's view: evaluate the services requested, matching to what can be granted. evaluate the risks related to incorrect evaluation, The customer' s view: evaluate the trade-off across service specifications and the corresponding costs.

15 SPECS Platform HOW - Negotiation Example Scenario: Storing Confidential Data Problem: A User wants to store data on remote Cloud providers, and with data confidentiality requirements. State of the Art: The User chooses a Cloud provider with storage features. Manually checks their SLA, verify the kind of security features offered. Studies different offerings, and chooses. Limitations: Manual evaluation of security. SPECS solution: Single access point: User accesses SPECS services and utilized it to negotiate security requirements. SPECS helps specify needed requirements on a provider even if it does not support it natively

16 SPECS Platform HOW - Negotiation Example Scenario: Security-Oriented Cloud Federation (I) Problem: A User consumes the IaaS resources from a Cloud Federation The User has security requirements that must be fulfilled and observed during the whole usage period. The User may be a Customer or a Cloud Provider. Limitations: No systematic solution for managing the life-cycle of User s security requiremets in a Cloud Federation. Quality of Security (QoSec), refers to the (possibly quantitative) evaluation of security granted by a CSP. No standardized means to specify security requested/provided between Users and CSPs respectively. Manually search for appropriate Cloud offering, particularly in the field of security and privacy possibilities (attributes). SPECS solution: Cloud security can be specified in the form of SLAs. SPECS Security-as-a-Service broker can be deployed between End Users and Cloud Federations to automatically manage the whole SLA life-cycle. SPECS Security-as-a-Service can be used to deploy additional security components when needed by the deployed services SPECS Security-as-a-Service broker can be deployed between End Users and various Clouds or even Cloud Federations to automatically manage the whole SLA life-cycle.

17 SPECS Platform HOW - Negotiation Example Scenario: Security-Oriented Cloud Federation (II) SPECS solution: Cloud security can be specified in the form of SLAs. SPECS Security-as-a-Service broker can be deployed between End Users and Cloud Federations to automatically manage the whole SLA life-cycle. SPECS Security-as-a-Service can be used to deploy additional security components when needed by the deployed services SPECS Security-as-a-Service broker can be deployed between End Users and various Clouds or even Cloud Federations to automatically manage the whole SLA life-cycle.

18 SPECS Platform - HOW SLA Monitoring Conditions: A set of signed SLAs Goals SLA is checked for its actual degree of conformance or for penalties if in violation. Service Provider s view: verifying that the SLA are respected (eventually access infrastructure inaccessible to customers) generating alerts before SLAs are broken, in order to activate remedial actions. Customer's view: Having grants bout the effctive respect of agreed SLAs.

19 SPECS Platform HOW - Monitoring Example Scenario: SLA Run Time Status Problem: A User wants real-time status on SLA accomplishment. State of the Art: The User needs to accept the supplier monitoring or supplier metrics. The User must create local measurements, for example time to resolve an issue, or down time of the service. Limitations: User intervention needed. SPECS solution: SPECS provides a full set of features of monitoring SLA accomplishment. SPECS provides a simple access point to monitoring system. Users know in near real-time what is the status of the SLA.

20 Problem: SPECS Platform HOW - Monitoring Example Scenario: SLA Run Time Status (I) A Customer consumes Cloud services by different CSPs. The Customer needs the tools to systematically reason about Cloud SLAs, including side-by-side CSP comparison, negotiation and continuous monitoring. Limitations: Lack of the automated tools to aid prospective Cloud customers taking decisions about the stored CSP information (e.g., comparing different providers, evaluating trade-offs, etc.). For current Cloud customers, there are not tools allowing them to monitor in real-time the fulfillment of the contracted Cloud SLA. Lack of customization, as the users are only able to assess compliance with respect to the full SLA used by the repository (i.e., not with subsets of these SLA). SPECS solution: With SPECS it is possible to provide prospective/existing Cloud customers with a real-time Dashboard to enable basic features (e.g., comparing two or more CSP side-by-side) and, also more advanced SLA operations (e.g., real time monitoring of specific SLA clauses). This Dashboard can be integrated to existing repositories such as STAR, to provide a full-solution for Cloud users.

21 SPECS Platform HOW - Monitoring Example Scenario: SLA Run Time Status (II) SPECS solution: With SPECS it is possible to provide prospective/existing Cloud customers with a real-time Dashboard to enable basic features (e.g., comparing two or more CSP side-by-side) and, also more advanced SLA operations (e.g., real time monitoring of specific SLA clauses). This Dashboard can be integrated to existing repositories such as STAR, to provide a full-solution for Cloud users.

22 SPECS Platform - HOW SLA Enforcement Conditions: A set of signed SLAs Goals the actions needed to respect the SLAs are effectively taken Service Provider s view: At service startup/dynamicly (reconfiguration) Activation of software modules, acquisition of resources, Policy definition and management Improving/selecting security features of Cloud Providers Customer's view: the application of the service requirements explicitly requested into the SLA

23 SPECS Platform - HOW SLA Enforcement Conditions: A set of signed SLAs Goals the actions needed to respect the SLAs are effectively taken Service Provider s view: At service startup/dynamicly (reconfiguration) Activation of software modules, acquisition of resources, Policy definition and management Improving/selecting security features of Cloud Providers Customer's view: the application of the service requirements explicitly requested into the SLA

24 Milestones MS Milestone name Date Means of verification 1 Preliminary Framework Definition 2 Framework Design and Proof-of-Concept M6 D1.1.1,D1.2,D2.1,D3.1,D4.1, D4.2, D6.1, D7.1 M12 D1.1.2, D2.1.2, D2.2, D3.2, D4.1.2, D4.4.2, D4.3.1, D4.4.1, D4.5.1, D , D , D6.2.1, D Framework Prototype M18 D1.3, D1.6, D2.3.1, D3.3, D3.4.1, D , D Framework Operative M24 D1.1.3, D1.4, D2.2, D4.2, Prototype D4.3, D4.5.2, D6.2.2, D7.2.2, 5 Framework Operative M30 D1.5, D1.6.2, D2.3.2, D.3.4.2, D.4.3.3, D.4.5.3, D5.2, D5.3., D5.4, D6.2.3, D7.2.3, D7.3

25 Objective 1: Design an innovative Security Platform-as-a-Service Offer a solution for the SPECS Security-as-a- Service approach, proposing a clear design for a Platform-as-a-Service dedicated to security services and to SLA life cycle management. SO1.1 Design a Security SLA-Oriented Platformas-a-Service SO1.2 Design services dedicated to security SLA Management SO1.3 Design of the interaction protocols among different SLA modules

26 Objective 2: Allow user-centric negotiation of Cloud SLA Propose solution for helping End Users to negotiate Cloud SLA effectively with a set of CSP, by understanding the resulting trade-offs. SO2.1 Design of user-centric Cloud SLA negotiation solution for security parameters SO2.2 Develop the techniques to systematically evaluate the trade-offs related with offered security in Cloud SLA SO2.3 Provide a reference implementation of security negotiation services for Cloud SLA

27 Objective 3: Innovative Solutions for Continuous Security Monitoring Design and implement SLA monitoring solutions dedicated to continuously control the security offered by CSP and to help ensuring the granted QoSec. SO3.1 Identify the requirements for continuously monitoring the fulfillment of SLA in what concerns to the SPECS measures of interest. SO3.2 Evaluate the appropriateness of the stateof-the-art services for SPECS monitoring. SO3.4 Propose innovative monitoring services

28 Objective 4: Develop Innovative Security Services to Enforce SLA Offer a clear design and an implementation of services dedicated to grant security features to Cloud end users in order to fulfill an agreed SLA and, keep a sustained QoSec.. SO4.1 Services to check the effective availability of security features, supprt Negotiation, grant SLAs. SO4.2 Services able to monitor and react in order to respect an agreed Cloud SLA. SO4.3 Provide a sustained QoSec during the life cycle of the application/service, as agreed on the Cloud SLA- SO4.4 Offer additional security services to end users in order to sustain a minimum required QoSec.

29 Objective 5: Real-world validation of SPECS outcomes Implement two relevant use cases to empirically validate the outcomes of the project. SO5.1 Definition of SPECS Platform Use Cases through a set of real applications SO5.2 Design and implement real applications using the SPECS platform.

Dr. Jesus Luna Garcia

Dr. Jesus Luna Garcia Cloud Accountability and SLAs: research challenges and opportunities Dr. Jesus Luna Garcia jluna@cloudsecurityalliance.org Outline Cloud SLA s one year ago Open Research Challenges: Standardization/certification

More information

Making SLA s Useful for Security

Making SLA s Useful for Security Making SLA s Useful for Security Neeraj Suri www.deeds.informatik.tu-darmstadt.de 11/15/2013 Suri/CIRRUS 1 Service Level Agreement (SLA) Contract which describes the Service, the associated quality levels

More information

Preliminary Design of a Platform-as-a-Service to Provide Security in Cloud

Preliminary Design of a Platform-as-a-Service to Provide Security in Cloud Preliminary Design of a Platform-as-a-Service to Provide Security in Valentina Casola 1, Alessandra De Benedictis 1, Massimiliano Rak 2 and Umberto Villano 3 1 Università Federico II di Napoli, Dipartimento

More information

Accelerating Cloud adoption with Security Level Agreements automation, monitoring and industry standards compliance

Accelerating Cloud adoption with Security Level Agreements automation, monitoring and industry standards compliance Accelerating Cloud adoption with Security Level Agreements automation, monitoring and industry standards compliance Cirrus Workshop, Vienna, Austria, November 19, 2013 Dr. Said Tabet Senior Technologist

More information

Leveraging the Potential of Cloud Security Service Level Agreements through Standards

Leveraging the Potential of Cloud Security Service Level Agreements through Standards 1 Leveraging the Potential of Cloud Security Service Level Agreements through Standards Jesus Luna, Neeraj Suri, Michaela Iorga and Anil Karmel Abstract: Despite the undisputed advantages of Cloud computing,

More information

Nokia Siemens Networks Device Management Solution Executive summary

Nokia Siemens Networks Device Management Solution Executive summary NOKIA SIEMENS NETWORKS DEVICE MANAGEMENT SOLUTION Nokia Siemens Networks Device Management Solution Executive summary 2/6 NOKIA SIEMENS NETWORKS DEVICE MANAGEMENT SOLUTION 1. Introduction In today s markets,

More information

Becoming a Cloud Services Broker. Neelam Chakrabarty Sr. Product Marketing Manager, HP SW Cloud Products, HP April 17, 2013

Becoming a Cloud Services Broker. Neelam Chakrabarty Sr. Product Marketing Manager, HP SW Cloud Products, HP April 17, 2013 Becoming a Cloud Services Broker Neelam Chakrabarty Sr. Product Marketing Manager, HP SW Cloud Products, HP April 17, 2013 Hybrid delivery for the future Traditional IT Evolving current state Future Information

More information

Minder. simplifying IT. All-in-one solution to monitor Network, Server, Application & Log Data

Minder. simplifying IT. All-in-one solution to monitor Network, Server, Application & Log Data Minder simplifying IT All-in-one solution to monitor Network, Server, Application & Log Data Simplify the Complexity of Managing Your IT Environment... To help you ensure the availability and performance

More information

A Model for Accomplishing and Managing Dynamic Cloud Federations

A Model for Accomplishing and Managing Dynamic Cloud Federations A Model for Accomplishing and Managing Dynamic Cloud Federations London, CFM workshop 2014, December 8 th Giuseppe Andronico, INFN CT Marco Fargetta (INFN CT), Maurizio Paone (INFN CT), Salvatore Monforte

More information

The Application Readiness Level Metric

The Application Readiness Level Metric The Application Readiness Level Metric NASA Application Readiness Levels (ARLs) The NASA Applied Sciences Program has instituted a nine-step Application Readiness Level (ARL) index to track and manage

More information

Self-protecting multi-cloud applications

Self-protecting multi-cloud applications Self-protecting multi-cloud applications Antonio M. Ortiz 1, Erkuden Rios 2, Wissam Mallouli 1, Eider Iturbe 2, Edgardo Montes de Oca 1 1 Montimage R&D. Paris, France Email: {antonio.ortiz, wissam.mallouli,

More information

PICSE survey. (PICSE: Procurement Innovation for Cloud services in Europe)

PICSE survey. (PICSE: Procurement Innovation for Cloud services in Europe) PICSE survey (PICSE: Procurement Innovation for Cloud services in Europe) To ensure that Europe reaps the benefits of the shift to cloud computing, there is the need to focus on new ways of procuring cloud

More information

Consor;um (partners) ARES conference Toulouse, 24 August 2015

Consor;um (partners) ARES conference Toulouse, 24 August 2015 1 2 3 Consor;um (partners) 4 The honest- but- curious CSP model (cloud service provider)? 5 an attack tolerant framework Ambi;on in the context of honest-but-curious CSPs preserving the benefits associated

More information

Audit of the CFPB s Acquisition and Contract Management of Select Cloud Computing Services

Audit of the CFPB s Acquisition and Contract Management of Select Cloud Computing Services O F F I C E O F IN S P E C TO R GENERAL Audit Report 2014-IT-C-016 Audit of the CFPB s Acquisition and Contract Management of Select Cloud Computing Services September 30, 2014 B O A R D O F G O V E R

More information

Helix Nebula: Secure Brokering of Cloud Resources for escience. Dr. Jesus Luna Garcia

Helix Nebula: Secure Brokering of Cloud Resources for escience. Dr. Jesus Luna Garcia Helix Nebula: Secure Brokering of Cloud Resources for escience Dr. Jesus Luna Garcia Outline Background The Blue-Box architecture Security Goals and Requirements Let s imagine Why a Public-Private Partnership

More information

Seamless adaptive multi- cloud management of service- based applications. European Open Cloud Collaboration Workshop, May 15, 2014, Brussels

Seamless adaptive multi- cloud management of service- based applications. European Open Cloud Collaboration Workshop, May 15, 2014, Brussels Seamless adaptive multi- cloud management of service- based applications European Open Cloud Collaboration Workshop, May 15, 2014, Brussels Interoperability and portability are a few of the main challenges

More information

The Next Generation Data Centers: SPECS and The 3 rd Platform.

The Next Generation Data Centers: SPECS and The 3 rd Platform. The Next Generation Data Centers: SPECS and The 3 rd Platform. Dr. Silvio La Porta Senior Research Scientist EMC Research Europe Dr. Said Tabet Senior Technology Strategist Corporate CTO Office, EMC 1

More information

ASCETiC Whitepaper. Motivation. ASCETiC Toolbox Business Goals. Approach

ASCETiC Whitepaper. Motivation. ASCETiC Toolbox Business Goals. Approach ASCETiC Whitepaper Motivation The increased usage of ICT, together with growing energy costs and the need to reduce greenhouse gases emissions call for energy-efficient technologies that decrease the overall

More information

8 Tips for Winning the IT Asset Management Challenge START

8 Tips for Winning the IT Asset Management Challenge START Tips for Winning the IT Asset Management Challenge START A successful IT Asset Management (ITAM) program can help you lower your costs and increase your asset utilization. You benefit by avoiding unplanned

More information

Open Data Center Alliance Usage: Cloud Based Identity Governance and Auditing REV. 1.0

Open Data Center Alliance Usage: Cloud Based Identity Governance and Auditing REV. 1.0 sm Open Data Center Alliance Usage: Cloud Based Identity Governance and Auditing REV. 1.0 Table of Contents Legal Notice... 3 Executive Summary... 4 Purpose... 5 Reference Framework... 5 Context... 6 Applicability...

More information

Managing Cloud Computing Services in the Enterprise

Managing Cloud Computing Services in the Enterprise WHITE PAPER Managing Cloud Computing Services in the Enterprise THE VALUE OF A SINGLE, INTEGRATED CLOUD MANAGEMENT PLATFORM Managing Cloud Computing Services in the Enterprise 2 How does your organization

More information

Cloud Federations in Contrail

Cloud Federations in Contrail Cloud Federations in Contrail Emanuele Carlini 1,3, Massimo Coppola 1, Patrizio Dazzi 1, Laura Ricci 1,2, GiacomoRighetti 1,2 " 1 - CNR - ISTI, Pisa, Italy" 2 - University of Pisa, C.S. Dept" 3 - IMT Lucca,

More information

Outline. Introduction Cloud service models The worst mistakes in cloud security Conclusion

Outline. Introduction Cloud service models The worst mistakes in cloud security Conclusion The Worst Mistakes in Cloud Security Dr. Eugene Schultz, CISSP, CISM, GSLC Chief Technology Officer Emagined Security Eugene.Schultz@emagined.com ISSA-LA Security Summit West Los Angeles, California June

More information

Consulting Company providing expertise and advices around Collaboration, Communication solutions, Cloud & Business Intelligence

Consulting Company providing expertise and advices around Collaboration, Communication solutions, Cloud & Business Intelligence Consulting Company providing expertise and advices around Collaboration, Communication solutions, Cloud & Business Intelligence Who we are? What we believe in? What we deliver? Who we are? We are a team

More information

A Strawman Model. NIST Cloud Computing Reference Architecture and Taxonomy Working Group. January 3, 2011

A Strawman Model. NIST Cloud Computing Reference Architecture and Taxonomy Working Group. January 3, 2011 A Strawman Model NIST Cloud Computing Reference Architecture and Taxonomy Working Group January 3, 2011 Objective Our objective is to define a neutral architecture consistent with NIST definition of cloud

More information

OFFICE OF AUDITS & ADVISORY SERVICES CLOUD COMPUTING AUDIT FINAL REPORT

OFFICE OF AUDITS & ADVISORY SERVICES CLOUD COMPUTING AUDIT FINAL REPORT County of San Diego Auditor and Controller OFFICE OF AUDITS & ADVISORY SERVICES CLOUD COMPUTING AUDIT FINAL REPORT Chief of Audits: Juan R. Perez Audit Manager: Lynne Prizzia, CISA, CRISC Senior Auditor:

More information

Contents. 1010 Huntcliff, Suite 1350, Atlanta, Georgia, 30350, USA http://www.nevatech.com

Contents. 1010 Huntcliff, Suite 1350, Atlanta, Georgia, 30350, USA http://www.nevatech.com Sentinet Overview Contents Overview... 3 Architecture... 3 Technology Stack... 4 Features Summary... 6 Repository... 6 Runtime Management... 6 Services Virtualization and Mediation... 9 Communication and

More information

BMC Software Consulting Services. Fermilab Computing Division Service Catalog & Communications: Process and Procedures

BMC Software Consulting Services. Fermilab Computing Division Service Catalog & Communications: Process and Procedures BMC Software Consulting Services Service Catalog & Communications: Process and Procedures Policies, Client: Date : Version : Fermilab 02/12/2009 1.0 GENERAL Description Purpose This document establishes

More information

Unlock the code IT Asset Management

Unlock the code IT Asset Management HP Software: Apps meet Ops 2015 Unlock the code IT Asset Management Luc Landuyt/ April 2 nd, 2015 Copyright 2015 Hewlett-Packard Development Company, L.P. The information contained herein is subject to

More information

Public Cloud Workshop Offerings

Public Cloud Workshop Offerings Cloud Perspectives a division of Woodward Systems Inc. Public Cloud Workshop Offerings Cloud Computing Measurement and Governance in the Cloud Duration: 1 Day Purpose: This workshop will benefit those

More information

Monitoring, Managing and Supporting Enterprise Clouds with Oracle Enterprise Manager 12c Name, Title Oracle

Monitoring, Managing and Supporting Enterprise Clouds with Oracle Enterprise Manager 12c Name, Title Oracle Monitoring, Managing and Supporting Enterprise Clouds with Oracle Enterprise Manager 12c Name, Title Oracle Complete Cloud Lifecycle Management Optimize Plan Meter & Charge Manage Applications and Business

More information

Sentinet for BizTalk Server SENTINET 3.1

Sentinet for BizTalk Server SENTINET 3.1 for BizTalk Server SENTINET 3.1 for BizTalk Server 1 Contents Introduction... 2 SOA and APIs Repository... 3 Security... 3 Mediation and Virtualization... 3 Authentication and Authorization... 4 Monitoring,

More information

Overview. FedRAMP CONOPS

Overview. FedRAMP CONOPS Concept of Operations (CONOPS) Version 1.0 February 7, 2012 Overview Cloud computing technology allows the Federal Government to address demand from citizens for better, faster services and to save resources,

More information

UNITED STATES DEPARTMENT OF EDUCATION OFFICE OF INSPECTOR GENERAL. September 24, 2010

UNITED STATES DEPARTMENT OF EDUCATION OFFICE OF INSPECTOR GENERAL. September 24, 2010 UNITED STATES DEPARTMENT OF EDUCATION OFFICE OF INSPECTOR GENERAL September 24, 2010 AUDIT SERVICES FINAL ALERT MEMORANDUM TO: Danny Harris Chief Information Officer Office of the Chief Information Officer

More information

CLOUD MIGRATION STRATEGIES

CLOUD MIGRATION STRATEGIES CLOUD MIGRATION STRATEGIES Faculty Contributor: Dr. Rahul De Student Contributors: Mayur Agrawal, Sudheender S Abstract This article identifies the common challenges that typical IT managers face while

More information

SP Monitor. nfx One gives MSPs the agility and power they need to confidently grow their security services business. NFX FOR MSP SOLUTION BRIEF

SP Monitor. nfx One gives MSPs the agility and power they need to confidently grow their security services business. NFX FOR MSP SOLUTION BRIEF NFX FOR MSP SOLUTION BRIEF SP Monitor Jump Start Security-as-a-Service Designed to give you everything you need to get started immediately providing security-as-a service, SP Monitor is a real-time event

More information

Daniel Field, Atos Spain. Towards the European Open Science Cloud, Heidelberg, 20/01/2016

Daniel Field, Atos Spain. Towards the European Open Science Cloud, Heidelberg, 20/01/2016 Daniel Field, Atos Spain Towards the European Open Science Cloud, Heidelberg, 20/01/2016 SLALOM is ready to use Cloud SLAs SLALOM will take theory to practice, providing a trusted verifiable starting point

More information

Research and Innovation Challenges in Data Protection, Security and Privacy in the Cloud: Map of synergies of the clustered projects Version 2.

Research and Innovation Challenges in Data Protection, Security and Privacy in the Cloud: Map of synergies of the clustered projects Version 2. Research and Innovation Challenges in Data Protection, Security and Privacy in the Cloud: Map of synergies of the clustered projects Version 2.0 Authors: Beatriz Gallego-Nicasio Crespo, ATOS Spain S.A.,

More information

CA API Management SaaS

CA API Management SaaS SaaS Listing CA API Management SaaS 1. Introduction This document provides standards and features that apply to the CA API Management SaaS offering ( Service ) provided to the Customer and defines the

More information

Implementation of ANSI/AAMI/IEC 62304 Medical Device Software Lifecycle Processes.

Implementation of ANSI/AAMI/IEC 62304 Medical Device Software Lifecycle Processes. Implementation of ANSI/AAMI/IEC 62304 Medical Device Software Lifecycle Processes.. www.pharmout.net Page 1 of 15 Version-02 1. Scope 1.1. Purpose This paper reviews the implementation of the ANSI/AAMI/IEC

More information

Managing Cloud Services in the Enterprise The Value of Cloud Services Brokers

Managing Cloud Services in the Enterprise The Value of Cloud Services Brokers Whitepaper: Managing Cloud Services in the Enterprise The Value of Cloud Services Brokers Whitepaper: Managing Cloud Services in the Enterprise 2 The cloud has revolutionized the way businesses operate

More information

SeaClouds Project D6.2 - Case Study test-beds and key features mapping

SeaClouds Project D6.2 - Case Study test-beds and key features mapping SeaClouds Project D6.2 - Case Study test-beds and key features mapping Project Acronym Project Title Call identifier Grant agreement no. 610531 Start Date 1 st October 2013 Ending Date 31 st March 2016

More information

NIST Cloud Computing Reference Architecture

NIST Cloud Computing Reference Architecture NIST Cloud Computing Reference Architecture Version 1 March 30, 2011 2 Acknowledgements This reference architecture was developed and prepared by Dr. Fang Liu, Jin Tong, Dr. Jian Mao, Knowcean Consulting

More information

Expert Reference Series of White Papers. Understanding NIST s Cloud Computing Reference Architecture: Part II

Expert Reference Series of White Papers. Understanding NIST s Cloud Computing Reference Architecture: Part II Expert Reference Series of White Papers Understanding NIST s Cloud Computing Reference Architecture: Part II info@globalknowledge.net www.globalknowledge.net Understanding NIST s Cloud Computing Reference

More information

AHP-Based Quantitative Approach for Assessing and Comparing Cloud Security

AHP-Based Quantitative Approach for Assessing and Comparing Cloud Security AHP-Based Quantitative Approach for Assessing and Comparing Cloud Security Ahmed Taha, Ruben Trapero, Jesus Luna and Neeraj Suri TU Darmstadt, Germany CSA (Europe), United Kingdom Email:{ataha, rtrapero,

More information

White Paper. An Overview of the Kalido Data Governance Director Operationalizing Data Governance Programs Through Data Policy Management

White Paper. An Overview of the Kalido Data Governance Director Operationalizing Data Governance Programs Through Data Policy Management White Paper An Overview of the Kalido Data Governance Director Operationalizing Data Governance Programs Through Data Policy Management Managing Data as an Enterprise Asset By setting up a structure of

More information

Fundamental Concepts and Models

Fundamental Concepts and Models Chapter 4: Fundamental Concepts and Models Nora Almezeini MIS Department, CBA, KSU From Cloud Computing by Thomas Erl, Zaigham Mahmood, and Ricardo Puttini(ISBN: 0133387526) Copyright 2013 Arcitura Education,

More information

Building More Reliable Cloud Services The CUMULUS Project

Building More Reliable Cloud Services The CUMULUS Project Building More Reliable Cloud Services The CUMULUS Project Antonio Álvarez Romero aalvarez@wtelecom.es London, 17 th June 2014 1 Table of contents Motivations Goals to be achieved What is CUMULUS? Application

More information

Aternity Virtual Desktop Monitoring. Complete Visibility Ensures Successful VDI Outcomes

Aternity Virtual Desktop Monitoring. Complete Visibility Ensures Successful VDI Outcomes Aternity Virtual Desktop Monitoring Complete Visibility Ensures Successful VDI Outcomes Realizing the Benefits of VDI Requires Illuminating Four Performance Blind Spots Without comprehensive visibility

More information

The Jamcracker Enterprise CSB AppStore Unifying Cloud Services Delivery and Management for Enterprise IT

The Jamcracker Enterprise CSB AppStore Unifying Cloud Services Delivery and Management for Enterprise IT The Jamcracker Enterprise CSB AppStore Unifying Cloud Services Delivery and Management for Enterprise IT Jamcracker, Inc. 4677 Old Ironsides Drive Santa Clara, CA, USA 95054 www.jamcracker.com Table of

More information

The Cloud Seen from the U.S.A.

The Cloud Seen from the U.S.A. The Cloud Seen from the U.S.A. Stephen R. Bell, Counselor to the U.S. Coordinator, International Communications and Information Policy, U.S. Department of State OUTLINE Commercial drivers of Cloud services

More information

ITL BULLETIN FOR JUNE 2012 CLOUD COMPUTING: A REVIEW OF FEATURES, BENEFITS, AND RISKS, AND RECOMMENDATIONS FOR SECURE, EFFICIENT IMPLEMENTATIONS

ITL BULLETIN FOR JUNE 2012 CLOUD COMPUTING: A REVIEW OF FEATURES, BENEFITS, AND RISKS, AND RECOMMENDATIONS FOR SECURE, EFFICIENT IMPLEMENTATIONS ITL BULLETIN FOR JUNE 2012 CLOUD COMPUTING: A REVIEW OF FEATURES, BENEFITS, AND RISKS, AND RECOMMENDATIONS FOR SECURE, EFFICIENT IMPLEMENTATIONS Shirley Radack, Editor Computer Security Division Information

More information

Summit Platform. IT and Business Challenges. SUMMUS IT Management Solutions. IT Service Management (ITSM) Datasheet. Key Benefits

Summit Platform. IT and Business Challenges. SUMMUS IT Management Solutions. IT Service Management (ITSM) Datasheet. Key Benefits Summit Platform The Summit Platform provides IT organizations a comprehensive, integrated IT management solution that combines IT service management, IT asset management, availability management, and project

More information

ITSM Process Description

ITSM Process Description ITSM Process Description Office of Information Technology Incident Management 1 Table of Contents Table of Contents 1. Introduction 2. Incident Management Goals, Objectives, CSFs and KPIs 3. Incident Management

More information

Georgiana Macariu, Dana Petcu, CiprianCraciun, Silviu Panica, Marian Neagul eaustria Research Institute Timisoara, Romania

Georgiana Macariu, Dana Petcu, CiprianCraciun, Silviu Panica, Marian Neagul eaustria Research Institute Timisoara, Romania Open source API and platform for heterogeneous Cloud computing environments Georgiana Macariu, Dana Petcu, CiprianCraciun, Silviu Panica, Marian Neagul eaustria Research Institute Timisoara, Romania Problem

More information

Federation of Cloud Computing Infrastructure

Federation of Cloud Computing Infrastructure IJSTE International Journal of Science Technology & Engineering Vol. 1, Issue 1, July 2014 ISSN(online): 2349 784X Federation of Cloud Computing Infrastructure Riddhi Solani Kavita Singh Rathore B. Tech.

More information

White Paper How Noah Mobile uses Microsoft Azure Core Services

White Paper How Noah Mobile uses Microsoft Azure Core Services NoahMobile Documentation White Paper How Noah Mobile uses Microsoft Azure Core Services The Noah Mobile Cloud service is built for the Microsoft Azure platform. The solutions that are part of the Noah

More information

Managed File Transfer in Enterprise Java Applications

Managed File Transfer in Enterprise Java Applications Managed File Transfer in Enterprise Java Applications By David Sims Flux I: Why Should You Care About Managed File Transfer? In an SOA world, bulk data transfer occurs largely by way of file transfer.

More information

Cloud Service Rollout. Chapter 9

Cloud Service Rollout. Chapter 9 Cloud Service Rollout Chapter 9 Cloud Service Topics Cloud service rollout plans vary depending on the type of cloud service SaaS, PaaS, or IaaS and the vendor. Unit Topics Identifying vendor roles and

More information

The problem of cloud data governance

The problem of cloud data governance The problem of cloud data governance Vasilis Tountopoulos, Athens Technology Center S.A. (ATC) CSP EU Forum 2014 - Thursday, 22 nd May, 2014 Focus on data protection in the cloud Why data governance in

More information

CLOUD SERVICE LEVEL AGREEMENTS Meeting Customer and Provider needs

CLOUD SERVICE LEVEL AGREEMENTS Meeting Customer and Provider needs CLOUD SERVICE LEVEL AGREEMENTS Meeting Customer and Provider needs Eric Simmon January 28 th, 2014 BACKGROUND Federal Cloud Computing Strategy Efficiency improvements will shift resources towards higher-value

More information

IDENTITY & ACCESS MANAGEMENT IN THE CLOUD

IDENTITY & ACCESS MANAGEMENT IN THE CLOUD IDENTITY & ACCESS MANAGEMENT IN THE CLOUD www.wipro.com Niraj Kumar Shukla Table of Contents 3... 1. Introduction 3... 2. IAM Approach 4... 2.1. Phase I - Plan 4...2.1.1. Understanding the Environment

More information

IAAS CLOUD EXCHANGE WHITEPAPER

IAAS CLOUD EXCHANGE WHITEPAPER IAAS CLOUD EXCHANGE WHITEPAPER Whitepaper, July 2013 TABLE OF CONTENTS Abstract... 2 Introduction... 2 Challenges... 2 Decoupled architecture... 3 Support for different consumer business models... 3 Support

More information

Five Fundamental Data Quality Practices

Five Fundamental Data Quality Practices Five Fundamental Data Quality Practices W H I T E PA P E R : DATA QUALITY & DATA INTEGRATION David Loshin WHITE PAPER: DATA QUALITY & DATA INTEGRATION Five Fundamental Data Quality Practices 2 INTRODUCTION

More information

File Governance Provides the Management in MFT White Paper December 2011

File Governance Provides the Management in MFT White Paper December 2011 File Governance Provides the Management in MFT White Paper December 2011 ISSUED BY: Jonathan Lampe Chief Analyst File Transfer Consulting Peter Sedgwick Product Marketing Primeur www.primeur.com Primeur

More information

White Paper. Cloud Vademecum

White Paper. Cloud Vademecum White Paper Cloud Vademecum Cloud is the new IT paradigm this document offers a collection of thoughts, internal and external discussions and information. The goal is to inspire and stimulate the route

More information

LANDesk Professional Services

LANDesk Professional Services LANDesk Professional Services Service Description For G-Cloud Background Drawing upon 25 years of experience, LANDesk today is recognized as a leading provider of systems and endpoint security management,

More information

How To Standardize Itil V3.3.5

How To Standardize Itil V3.3.5 Business white paper Standardize your ITSM An HP approach based on best practices Table of contents 3 Introduction 3 Benefits and challenges 5 The HP approach to standardizing ITSM 6 Establish an IT operations

More information

Application Management Services (AMS)

Application Management Services (AMS) Contents 1. AMS : An Overview 2. AMS : Models 3. Delivery Organization 4. Processes & Tools 5. Transition Methodology 6. Pricing Application Management Services (AMS) Enterprise Application Services Capability

More information

Service Virtualization:

Service Virtualization: Service Virtualization: Reduce the time and cost to develop and test modern, composite applications Business white paper Table of contents Why you need service virtualization 3 The challenges of composite

More information

SERVICE ORIENTED APPLICATION MANAGEMENT DO CURRENT TECHNIQUES MEET THE REQUIREMENTS?

SERVICE ORIENTED APPLICATION MANAGEMENT DO CURRENT TECHNIQUES MEET THE REQUIREMENTS? In: New Developments in Distributed Applications and Interoperable Systems: 3rd IFIP International Working Conference (DAIS 2001), Cracow, Poland Kluwer Academic Publishers, September 2001 SERVICE ORIENTED

More information

Data Sheet Netrounds Control Center

Data Sheet Netrounds Control Center Data Sheet Netrounds Control Center The core component of Netrounds is a unifying cloud-based Control Center, which provides a consolidated GUI for operations staff as well as a cloud API for external

More information

Planning and Administering Windows Server 2008 Servers

Planning and Administering Windows Server 2008 Servers Planning and Administering Windows Server 2008 Servers MOC6430 About this Course Elements of this syllabus are subject to change. This five-day instructor-led course provides students with the knowledge

More information

Security Issues in Cloud Computing

Security Issues in Cloud Computing Security Issues in Computing CSCI 454/554 Computing w Definition based on NIST: A model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources

More information

CYCLOPS The Ultimate Billing Framework for Cloud Services Dr. Piyush Harsh, ICCLab InIT Zurich University of Applied Sciences Zürcher Fachhochschule

CYCLOPS The Ultimate Billing Framework for Cloud Services Dr. Piyush Harsh, ICCLab InIT Zurich University of Applied Sciences Zürcher Fachhochschule CYCLOPS The Ultimate Billing Framework for Cloud Services Dr. Piyush Harsh, ICCLab InIT Zurich University of Applied Sciences Cloud services today Commoditization Same set of services being offered Compute,

More information

Technical Report CLOUD; Cloud private-sector user recommendations

Technical Report CLOUD; Cloud private-sector user recommendations TR 103 126 V1.1.1 (2012-11) Technical Report CLOUD; Cloud private-sector user recommendations 2 TR 103 126 V1.1.1 (2012-11) Reference DTR/CLOUD-0011-UserRec Keywords CLOUD, Requirements, USER 650 Route

More information

IT Service Management tools - Acquisition and implementation

IT Service Management tools - Acquisition and implementation IT Service Management tools - and implementation Christian F. Nissen, CFN People A/S ITIL and PRINCE2 are Registered Trade Marks of Axelos in the United Kingdom and other countries COBIT is a registered

More information

MKS Integrity & CMMI. July, 2007

MKS Integrity & CMMI. July, 2007 & CMMI July, 2007 Why the drive for CMMI? Missed commitments Spiralling costs Late delivery to the market Last minute crunches Inadequate management visibility Too many surprises Quality problems Customer

More information

Annex 1. Contract Checklist for Cloud-Based Genomic Research Version 1.0, 21 July 2015

Annex 1. Contract Checklist for Cloud-Based Genomic Research Version 1.0, 21 July 2015 Annex 1. Contract Checklist for Cloud-Based Genomic Research Version 1.0, 21 July 2015 The following comprises a checklist of areas that genomic research organizations or consortia (collectively referred

More information

Sentinet for Windows Azure SENTINET

Sentinet for Windows Azure SENTINET Sentinet for Windows Azure SENTINET Sentinet for Windows Azure 1 Contents Introduction... 2 Customer Benefits... 2 Deployment Topologies... 3 Isolated Deployment Model... 3 Collocated Deployment Model...

More information

The Way to SOA Concept, Architectural Components and Organization

The Way to SOA Concept, Architectural Components and Organization The Way to SOA Concept, Architectural Components and Organization Eric Scholz Director Product Management Software AG Seite 1 Goals of business and IT Business Goals Increase business agility Support new

More information

Ensuring Contract Compliance through integration of Ariba Contracts and SAP ECC Michael Chavez and Sean Rhoades, Deloitte Consulting LLP

Ensuring Contract Compliance through integration of Ariba Contracts and SAP ECC Michael Chavez and Sean Rhoades, Deloitte Consulting LLP Orange County Convention Center Orlando, Florida June 3-5, 2014 Ensuring Contract Compliance through integration of Ariba Contracts and SAP ECC Michael Chavez and Sean Rhoades, Deloitte Consulting LLP

More information

How To Understand Cloud Computing

How To Understand Cloud Computing Capacity Management Ensures Success for Enterprise Cloud Consumers At one time or another in our lives, we have all looked up at the clouds; watching a neverending parade of different forms and faces that

More information

Cloud Computing in a Regulated Environment

Cloud Computing in a Regulated Environment Computing in a Regulated Environment White Paper by David Stephenson CTG Regulatory Compliance Subject Matter Expert February 2014 CTG (UK) Limited, 11 Beacontree Plaza, Gillette Way, READING, Berks RG2

More information

Sentinet for BizTalk Server SENTINET

Sentinet for BizTalk Server SENTINET Sentinet for BizTalk Server SENTINET Sentinet for BizTalk Server 1 Contents Introduction... 2 Sentinet Benefits... 3 SOA and APIs Repository... 4 Security... 4 Mediation and Virtualization... 5 Authentication

More information

LR120 LoadRunner 12.0 Essentials

LR120 LoadRunner 12.0 Essentials LR120 LoadRunner 12.0 Essentials Overview This five-day course introduces students to HP LoadRunner 12.0, including the usage of Virtual User Generator (VuGen), Controller and Analysis tools. This course

More information

WHITE PAPER. Leveraging a LEAN model of catalogbased performance testing for quality, efficiency and cost effectiveness

WHITE PAPER. Leveraging a LEAN model of catalogbased performance testing for quality, efficiency and cost effectiveness WHITE PAPER Leveraging a LEAN model of catalogbased performance testing for quality, efficiency and cost effectiveness Traditionally, organizations have leveraged project-based models for performance testing.

More information

Auditing Cloud Computing. A Security and Privacy Guide. Wiley Corporate F&A

Auditing Cloud Computing. A Security and Privacy Guide. Wiley Corporate F&A Brochure More information from http://www.researchandmarkets.com/reports/2213812/ Auditing Cloud Computing. A Security and Privacy Guide. Wiley Corporate F&A Description: The auditor's guide to ensuring

More information

The Importance of Information Delivery in IT Operations

The Importance of Information Delivery in IT Operations The Importance of Information Delivery in IT Operations David Williams Notes accompany this presentation. Please select Notes Page view. These materials can be reproduced only with written approval from

More information

MS-20246: Monitoring and Operating a Private Cloud

MS-20246: Monitoring and Operating a Private Cloud MS-20246: Monitoring and Operating a Private Cloud Description This course describes how to monitor and operate a cloud with Microsoft System Center 2012 R2. This course focuses on how to manage and administer

More information

Course 10750A: Monitoring and Operating a Private Cloud with System Center 2012

Course 10750A: Monitoring and Operating a Private Cloud with System Center 2012 Course 10750A: Monitoring and Operating a Private Cloud with System Center 2012 Duration: 5 Days What you will learn This course describes how to monitor and operate a private cloud with Microsoft System

More information

Cloud Security Audit for Migration and Continuous Monitoring

Cloud Security Audit for Migration and Continuous Monitoring Cloud Security Audit for Migration and Continuous Monitoring Umar Mukhtar Ismail, Shareeful Islam,2 School of Architecture, Computing & Engineering, University of East London,UK 2 SBA Research, Austria

More information

The ITIL v.3 Foundation Examination

The ITIL v.3 Foundation Examination The ITIL v.3 Foundation Examination ITIL v. 3 Foundation Examination: Sample Paper B, version 3.1 Multiple Choice Instructions 1. All 40 questions should be attempted. 2. There are no trick questions.

More information

How To Improve Cloud Infrastructure

How To Improve Cloud Infrastructure Report on the public consultation for H2020 work programme 2014-15: Cloud Computing, Software and Services Rapporteur: David Griffin Presentation to EC DG CONNECT, E.2, Software & Services, Cloud, Brussels,

More information

CLOUDFORMS Open Hybrid Cloud

CLOUDFORMS Open Hybrid Cloud Open Hybrid Cloud Cloud Evolution statt Cloud Revolution Lutz Lange, RHCA, Solution Architect, Red Hat Frank Rosendahl, RHCA, Solution Architect, DASEQ GmbH Cloud Operations Management Delivers an Open

More information

Contract Management The Mavericks Won t Like This!

Contract Management The Mavericks Won t Like This! Contract Management The Mavericks Won t Like This! Keith Wallis How Much Did That Project Cost? Real Life Example Original contract amount $500K Variations scope changes not visible Total variations =

More information

Concurrent Technologies Corporation (CTC) is an independent, nonprofit, applied scientific research and development professional services

Concurrent Technologies Corporation (CTC) is an independent, nonprofit, applied scientific research and development professional services Concurrent Technologies Corporation (CTC) is an independent, nonprofit, applied scientific research and development professional services organization providing innovative management and technology-based

More information

How To Use Cloud Computing For Federal Agencies

How To Use Cloud Computing For Federal Agencies Cloud Computing Briefing Scott Renda Office of Management and Budget www.whitehouse.gov/omb/egov Cloud Computing Basics Style of computing Cloud Computing: What Does it Mean? Close public/private sector

More information

A framework for secure migration processes of legacy systems to the cloud

A framework for secure migration processes of legacy systems to the cloud A framework for secure migration processes of legacy systems to the cloud A framework for secure migration processes of legacy systems to the cloud 1. Introduction 2. SMiLe2Cloud 3. Conclusions 1. Introduction

More information

Cloud Computing Best Practices. Creating Effective Cloud Computing Contracts for the Federal Government: Best Practices for Acquiring IT as a Service

Cloud Computing Best Practices. Creating Effective Cloud Computing Contracts for the Federal Government: Best Practices for Acquiring IT as a Service Cloud Computing Best Practices Cloud Computing Best Practices Creating Effective Cloud Computing Contracts for the Federal Government: Best Practices for Acquiring IT as a Service Overview Cloud Computing

More information