Cloud & Security. Dr Debabrata Nayak Debu.nayak@huawei.com



Similar documents
OWASP Chapter Meeting June Presented by: Brayton Rider, SecureState Chief Architect

Security & Trust in the Cloud

East African Information Conference th August, 2013, Kampala, Uganda. Security and Privacy: Can we trust the cloud?

Strategic Compliance & Securing the Cloud. Annalea Sharack-Ilg, CISSP, AMBCI Technical Director of Information Security

IT Risk and Security Cloud Computing Mike Thomas Erie Insurance May 2011

Perspectives on Moving to the Cloud Paradigm and the Need for Standards. Peter Mell, Tim Grance NIST, Information Technology Laboratory

Cloud Security considerations for business adoption. Ricci IEONG CSA-HK&M Chapter

BMC s Security Strategy for ITSM in the SaaS Environment

Cloud Courses Description

Cloud Computing and Security Risk Analysis Qing Liu Technology Architect STREAM Technology Lab

Security Issues in Cloud Computing

Daren Kinser Auditor, UCSD Jennifer McDonald Auditor, UCSD

Securing and Auditing Cloud Computing. Jason Alexander Chief Information Security Officer


Cloud Services Overview

Cloud Computing Technology

Cloud Models and Platforms

Cloud Courses Description

CHAPTER 8 CLOUD COMPUTING

CLOUD SECURITY SECURITY ASPECTS IN GEOSPATIAL CLOUD. Guided by Prof. S. K. Ghosh Presented by - Soumadip Biswas

Clinical Trials in the Cloud: A New Paradigm?

Security & Cloud Services IAN KAYNE

How To Protect Your Cloud Computing Resources From Attack

Trust but Verify. Vincent Campitelli. VP IT Risk Management

NCTA Cloud Architecture

Key Considerations of Regulatory Compliance in the Public Cloud

Cloud Computing; What is it, How long has it been here, and Where is it going?

Oracle Applications and Cloud Computing - Future Direction

Cloud Services. More agility. More freedom. More choice.

Why Private Cloud? Nenad BUNCIC VPSI 29-JUNE-2015 EPFL, SI-EXHEB

Clo l ud d C ompu p tin i g

Deploying a Geospatial Cloud

Cloud Computing. Bringing the Cloud into Focus

White Paper on CLOUD COMPUTING

Cloud Computing Trends, Examples & What s Ahead

What Cloud computing means in real life

ISSN: (Online) Volume 2, Issue 5, May 2014 International Journal of Advance Research in Computer Science and Management Studies

The Magical Cloud. Lennart Franked. Department for Information and Communicationsystems (ICS), Mid Sweden University, Sundsvall.

Cloud Security and Managing Use Risks

NATO s Journey to the Cloud Vision and Progress

DISTRIBUTED SYSTEMS [COMP9243] Lecture 9a: Cloud Computing WHAT IS CLOUD COMPUTING? 2

RE Think. IT & Business. Invent. IBM SmartCloud Security. Dr. Khaled Negm, SMIEEE, ACM Fellow IBM SW Global Competency Center Leader GCC

Cloud Computing and Standards

Top 10 Cloud Risks That Will Keep You Awake at Night

Auditing Cloud Computing and Outsourced Operations

Understanding the Security, Privacy and Trust Challenges of Cloud Computing

Architectural Implications of Cloud Computing

IBM EXAM QUESTIONS & ANSWERS

The Private Cloud Your Controlled Access Infrastructure

CLOUD COMPUTING. A Primer

Hybrid Cloud Computing

Cloud Computing: Opportunities, Challenges, and Solutions. Jungwoo Ryoo, Ph.D., CISSP, CISA The Pennsylvania State University

Clouds on the Horizon Cloud Security in Today s DoD Environment. Bill Musson Security Analyst

Cloud Security. Peter Jopling IBM UK Ltd Software Group Hursley Labs. peterjopling IBM Corporation

VMware vcloud Powered Services

Cloud Security Introduction and Overview

Secure Cloud Computing through IT Auditing

Cloud models and compliance requirements which is right for you?

Topics. Images courtesy of Majd F. Sakr or from Wikipedia unless otherwise noted.

Private Cloud Database Consolidation with Exadata. Nitin Vengurlekar Technical Director/Cloud Evangelist

INTRODUCTION TO CLOUD COMPUTING CEN483 PARALLEL AND DISTRIBUTED SYSTEMS

Tufts University. Department of Computer Science. COMP 116 Introduction to Computer Security Fall 2014 Final Project. Guocui Gao

Dell Cloud Solutions. The simplest path to your cloud. Marian Kovacik. Solution Engineer

A Study on Analysis and Implementation of a Cloud Computing Framework for Multimedia Convergence Services

Fundamental Concepts and Models

Virtualization Technologies in SCADA/EMS/DMS/OMS. Vendor perspective Norman Sabelli Ventyx, an ABB company

International Research Journal of Engineering and Technology (IRJET) e-issn: Volume: 02 Issue: 05 Aug p-issn:

Perspectives on Cloud Computing and Standards. Peter Mell, Tim Grance NIST, Information Technology Laboratory

Building Private & Hybrid Cloud Solutions

Figure 1 Cloud Computing. 1.What is Cloud: Clouds are of specific commercial interest not just on the acquiring tendency to outsource IT

SECURITY MODELS FOR CLOUD Kurtis E. Minder, CISSP

Cloud Computing: Background, Risks and Audit Recommendations

Securing the Service Desk in the Cloud

INTRODUCING CLOUD POWER

CLOUD COMPUTING An Overview

Kent State University s Cloud Strategy

Cloud SingularLogic:

Subash Krishnaswamy Applications Software Technology Corporation

NETWORK ACCESS CONTROL AND CLOUD SECURITY. Tran Song Dat Phuc SeoulTech 2015

Cloud Computing. Chapter 1 Introducing Cloud Computing

Security issues and Cryptographic techniques in Cloud Computing

Cloud Computing Security Issues

Data Protection: From PKI to Virtualization & Cloud

Orchestrating the New Paradigm Cloud Assurance

Transcription:

Cloud & Security Dr Debabrata Nayak Debu.nayak@huawei.com

AGENDA General description of cloud Cloud Framework Top issues in cloud Cloud Security trend Cloud Security Infrastructure Cloud Security Advantages / Challenges Compliance and certification of cloud security Cloud Security standard participation Summary

Cloud Computing Page 3

What is Cloud Computing? Cloud Computing model for enabling convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction describes the use of a collection of services, applications, information, and infrastructure comprised of pools of computer, network, information, and storage resources NIST defines cloud computing by describing five essential characteristics and attribute On-demand self-service (service-based) Broad network access (uses internet technologies) Resource pooling (shares a pool of resources) Rapid elasticity (scalable and elastic) Measured service (pay-as-you-go) NIST defines three cloud service models PaaS (Platform as a Service) IaaS (Infrastructure as a Service) Saas (Software as a Service) NIST defines four cloud deployment models Private Public Community Hybrid

Page 5

Cloud Framework Service Models Private Cloud Hybrid Clouds Community Cloud Public Cloud Service Models Software as a Service (SaaS) Platform as a Service (PaaS) Infrastructure as a Service (IaaS) Essential Characteristics On Demand Self-Service Broad Network Access Rapid Elasticity Resource Pooling Measured Service Common Characteristics Massive Scale Homogeneity Virtualization Low Cost Software Resilient Computing Geographic Distribution Service Orientation Advanced Security

Cloud Service Models Working Together Page 7

The cloud security is getting lot of attention cisco purchases with 183,000,000 US dollarsbased on Web security 100 200 300 400 500 The cloud The cloud moves safely service raisesfor cloud design software Cisco, environment the NetApp company construction,strengthens VMware ScanSafe. security. promote the sharingprivate end-to-end security and the multi-renters enterprise to business 0 2009 2010 2011 2012 2013 purchase enterprise promote in This Corporation's December, purchase is databasethe an 2009 causesibm its information safety purchase real-time Corporation management work. monitor database According has and obtained strategic security the to IBM data company the planning said protection Guardium thatthis part, Guardium. will the IBM Source:IDC,2009 Microsoft to a new level. renter on Azure cloud uses will environmentthe be same planning technical in 2010 new the will safety private promote mechanism, cloud one softwarenamely later and face provides the multi- Sydney based 10,000,000,000 US dollars decompose equipment security plan. and separates, Sydney in the clouds user's provides cloud between the resources enterprise the equipmentsafe and the network internal connection. emptyplans data center to in 2013, the global cloud computing service market size is 云 计 算 服 务 市 场 44,200,000,000 US dollars Cisco forecast that in 2012 the data central order volume amounts to

Top Issues in Cloud Computing Security Performance 88.5% 88.1% Availability 84.8% Hard to integrate with in-house IT Not enough ability to customize Worried cloud will cost more Bringing back in-house may be difficult Not enough major suppliers yet 74.6% 81.1% 80.3% 84.5% 83.3% 65% 70% 75% 80% 85% 90% % responding 3, 4 or 5 on scale of 1 to 5 (5 being most significant)

Cloud security by security vendors paying attention Traditional security factorybusiness The cloud moves safely in 2009 the second quarter, the tendency science and technology purchase provides the security management software's privacyperson enterprise Third Brigade. This purchase lets the tendency be able to bring more needlesto virtualization and cloud computation security tool. According to the tendency indicated that this purchase realitypresent they have ensured the business data center security the strategy to anticipate. in 2009 Mike Philippine Purchase Security Software Company MX Logic. Regarding the Mike PhilippinesSaid that this is a very important transaction, has integrated for own product mix whennext wields great power with great arrogance the software and the service. In and Symantec's competition,this purchase let the Mike Philippines occupy the vantage point. The Symantec Corporation 2008 year's end have purchased the online correspondence and the network security service raisefor discusses MessageLabs, the conformity MessageLabs service founds one newlysaas product department. in April, 2009 Symantec Corporation purchases the OEM partner, the SaaS specialized manufacturerappstream. AppStream will bring a brand-new market to SymantecOpportunity - - tabletop virtualization.

News Headlines Amazon Encrypts CloudFront, but Security Comes at a Price! Google Security Breach a Warning Sign for Cloud Security? IBM Managed Security Helps Shore Up Cloud Offerings Multi-tenant SaaS Secured By Oracle Identity Management

Security Model You RFP security in SaaS Software as a Service You build security in IaaS Infrastructure as a Service PaaS Platform as a Service Page 12

A Basic cryptography model Cipher text Encryption Algorithm Decryption Algorithm Plain text Plain text Shared secret key Shared secret key

SYMMETRIC KEY CRYPTOSYSTEM D E B A 1101 1110 1011 1010 (Message) 1000 1000 1000 1000 (Encryption Key) 0101 0110 0011 0010 (5632 Ciphertext) 1000 1000 1000 1000 (Decryption Key) 1101 1110 1011 1010 D E B A (Original Message)

Design of secure cryptographic system Cracker M C M Sender (A) Encryption C= E B (M) Decryption M=D B (C) Receiver (B) E E B D M^ DB Key distribution Center Hacker

INTEGRITY CHECK External Network D E B A 1101 1110 1011 1010 1101 1010 1011 1010 Internal Network 1101 1010 1011 1010 1101 1010 1101 1010 D A D A

Cloud Computing Security Architecture Cloud Computing Security Architecture Page 17

Cloud Security Advantages Exposure of internal sensitive data reduced by shifting public data to a external cloud Cloud homogeneity simplifies security auditing/testing Clouds enable automated security management both internally and externally Redundancy / Disaster Recovery Reduces in-house IT security administration

Cloud Security Challenges Trust Putting too much trust to vendor s security model Auditing and investigation Customer may be out of loop in audit events and findings Obtaining support for investigations at mercy of the provider Logging Challenges Administration Indirect security administrator accountability Security configurations Identity management Implementation Black box implementations can t be examined Public cloud vs internal cloud security Data Regulatory differences and difficulties across national boundaries Data retention issues Data protection in storage and transit Ownership

Locking down the cloud Securing the cloud trust multi-tenancy encryption compliance Achieving goals privacy secure access transparency

Security Requirements and Features All of your IT security requirements apply Trust Platform trust and trusted computing identity management, user provisioning and access control Federation, control of privileges, SSO Authentication, authorization and auditing Privileged user management Web access management Encryption Key management and provisioning Data leak protection Data storage and transit Security profile per network Multi-tenancy Multi-tenant logging management Network, VM, Application, process, and data isolation Security, OS, and Resource Management Security DMZ per virtual application Security profile per compute profile Compliance Auditing Log management Regional/national/international compliances and certification Legal intercept Data Privacy

Compliance and Certification Security related Cloud-specific group ITU Cloud Focus Group ETSI cloud security group SAS70 Auditing compliance TIA942 US Data Center ISO 27001 Common Criteria certification and compliance ISO 15489 LEED Records and Information Management Leadership in Energy and Environmental Design: green data center NIST FIPS 140-2 Security Requirements for Cryptographic Modules ISA s Security Assurance Certification Embedded Device Security Assessment

Page 23

ITU activities in Cloud Security Making a balance between all the standards Cloud definition and ecosystem Identity in Cloud PKI Infrastructure for cloud Key Management Scheme for Cloud Cloud Security Architecture Cloud service, resource management and middleware Cloud computing platform secure architecture

Page 25

Cloud Security Framework Page 26

Standards/Fora and Cloud Computing

Summary Security is the number one concern in cloud computing New challenges in cloud computing bring forward new threats and risks More complex than traditional IT security The Cloud needs to be secure, guarantee privacy, access and transparency Regulations and laws are catching up but need to expand beyond data privacy Compliance and certification are very important in measuring the effort put into building the cloud and to provide assurances Standards and forum play important role in promoting openness and interoperability

THANK YOU