Helix Nebula: Secure Brokering of Cloud Resources for escience. Dr. Jesus Luna Garcia



Similar documents
A public-private partnership building a multidisciplinary cloud platform for data intensive science

Cloud Competency Programme Workshop [1] Secure cloud services in a regulated environment

The ODCA, Helix Nebula and Federated Identity Management. Mick Symonds Principal Solutions Architect Atos Managed Services NL

Helix Nebula, the Science Cloud

Ontwikkelingen binnen cloud services (in het Engels)

A public-private partnership building a multidisciplinary cloud platform for data intensive science

Scientific Cloud Computing Infrastructure for Europe. Bob Jones,

CERN s Scientific Programme and the need for computing resources

Security Issues in Cloud Computing

The Cloud Security Alliance

AGENDA. Trends 2014 De toekomst van ICT: wat is de impact van deze trends Onze visie op de toekomst van ICT. Onze aanpak & wat omvat OCC Q&A

Big Data, Big Risk, Big Rewards. Hussein Syed

TOOLS and BEST PRACTICES

PICSE survey. (PICSE: Procurement Innovation for Cloud services in Europe)

Scientific Cloud Computing Infrastructure for Europe Strategic Plan. Bob Jones,

Cloud Security Introduction and Overview

VALUE PROPOSITION FOR SERVICE PROVIDERS. Helping Service Providers accelerate adoption of the cloud

Company Overview. Enterprise Cloud Solutions

D:C-3.1 Requirements for cloud interoperability

Cloud Security Alliance and Standards. Jim Reavis Executive Director March 2012

Synergies between the Big Data Value (BDV) Public Private Partnership and the Helix Nebula Initiative (HNI)

A view from the Cloud Security Alliance peephole

Cloud Security considerations for business adoption. Ricci IEONG CSA-HK&M Chapter

Workprogramme 2013 objective 1.2. Sandro D Elia. Software & Service Architectures and Infrastructures

Helix Nebula. by Johan Louter

ITIL v3 Service Manager Bridge

SPECS Secure Provisioning of Cloud Services based on SLA Management

Cloud & Trust. Dr. Jesus Luna, CSA Research Director EMEA. Copyright 2014 Cloud Security Alliance.

Enabling multi-cloud resources at CERN within the Helix Nebula project. D. Giordano (CERN IT-SDC) HEPiX Spring 2014 Workshop 23 May 2014

B2B Cloud Services. Transforming the B2B Integration Landscape IBM Corporation

Sofware Engineering, Services and Cloud Computing

Securing The Cloud. Foundational Best Practices For Securing Cloud Computing. Scott Clark. Insert presenter logo here on slide master

Dr. Jesus Luna Garcia

WHITE PAPER SPLUNK SOFTWARE AS A SIEM

ECONOMICS, SECURITY MANAGEMENT AND THE FUTURE INTERNET. Simon Shiu HP Labs 15 th April 2010

Helix Nebula The Science Cloud

Private Clouds. Krishnan Subramanian Analyst & Researcher Krishworld.com. A whitepaper sponsored by Trend Micro Inc.

Ironside Group Rational Solutions

Managing Sprawl of Cloud Services & Data Everywhere in an Enterprise Mazin Yousif, PhD. Cloud Forward 2015 October 7 th

Advanced File Integrity Monitoring for IT Security, Integrity and Compliance: What you need to know

I D C S P O T L I G H T. Ac c e l e r a t i n g Cloud Ad o p t i o n w i t h Standard S e c u r i t y M e a s u r e s

Helix Nebula, the Science Cloud: Potential for Earth Science Franco-British Workshop on Big Data in Science 6-7 November 2012

Concurrent Technologies Corporation (CTC) is an independent, nonprofit, applied scientific research and development professional services

NSW Government. Data Centre & Cloud Readiness Assessment Services Standard. v1.0. June 2015

White Paper. Cloud Vademecum

Public Cloud Workshop Offerings

Service Definition Document

SixSq Cloud Capabilities

Cloud Channel Summit #RCCS15

3 rd -party Security Risk Assessment

Sean Horne CTO EMC UKI. The leakage of Intellectual Property.. .and the risk of Privacy, Trustworthiness, Governance and Data Breaches

Global Efforts to Secure Cloud Computing

Nine Network Considerations in the New HIPAA Landscape

Preemptive security solutions for healthcare

Adopting Cloud Computing with a RISK Mitigation Strategy

SOA and API Management

ISSUE BRIEF. Cloud Security for Federal Agencies. Achieving greater efficiency and better security through federally certified cloud services

Cloud Computing and Security Risk Analysis Qing Liu Technology Architect STREAM Technology Lab

SAFECode Security Development Lifecycle (SDL)

Protecting Official Records as Evidence in the Cloud Environment. Anne Thurston

Why companies in the EU are adopting more and more cloud-based security solutions?

Allison Stanton, Director of E-Discovery U.S. Department of Justice, Civil Division. U.S. Department of Agriculture

Cloud security architecture

Making Sure Cloud Security is Not Up in Smoke: Integrating Protection in the Acquisition Process Digital Government Institute Cloud-Enabled

Agenda. What is cloud? Cloud based services The Good bad and Ugly.. Anatomy of a cloud Guidelines for you

CIO SUMMIT l LAS VEGAS

CAS8489 Delivering Security as a Service (SIEMaaS) November 2014

Team A SaaS Strategy

RSA envision. Platform. Real-time Actionable Security Information, Streamlined Incident Handling, Effective Security Measures. RSA Solution Brief

Information Technology Engineers Examination. Information Security Specialist Examination. (Level 4) Syllabus

SOC 3 for Security and Availability

Achieve ITIL Compliance with APTARE. Leveraging the Information Technology Infrastructure Library for Managed Services Providers (MSPs)

The Next Generation of Security Leaders

Delivery date: 18 October 2014

Secure HIPAA Compliant Cloud Computing

Securing SharePoint 101. Rob Rachwald Imperva

MANAGEMENT SOLUTIONS SAFEGUARD BUSINESS CONTINUITY AND PRODUCTIVITY WITH MIMECAST

CITY UNIVERSITY OF HONG KONG

The Way to SOA Concept, Architectural Components and Organization

Open Certification Framework. Vision Statement

Making SLA s Useful for Security

Intelligent Protection for Applications in the Cloud Industrial Case Studies Rob Rowlingson

Complete Database Security. Thomas Kyte

Forrest General Hospital Drives Greater Process Efficiency and Compliance through Contract Management Centralization

Defining Generic Architecture for Cloud Infrastructure as a Service Model

Developing Secure Software in the Age of Advanced Persistent Threats

Redesigning IT Service Organization for Digital Era

Building an Effective

Vodafone Total Managed Mobility

Why & How Cloud computing is enabling the digital transformation of financial services institutions

SaaS the new normal. Service-now.com, Terry Brown

2015 Cloud Security Alliance All Rights Reserved

ARMA: Information Governance: A Revenue Source Potential

Hybrid Cloud Computing

Managing Cloud Data Security in Regulated Industries for 2016

What Cloud computing means in real life

PROJECT Domeny.tv Domeny.tv

Emerging Approaches in a Cloud-Connected Enterprise: Containers and Microservices

Transcription:

Helix Nebula: Secure Brokering of Cloud Resources for escience Dr. Jesus Luna Garcia

Outline Background The Blue-Box architecture Security Goals and Requirements

Let s imagine

Why a Public-Private Partnership for escience? The scale and complexity of services needed to satisfy Europe s IT-intense scientific research & space organizations are beyond what can be provided by any single company. European escience requires the collaboration of a variety of service providers and SMEs!

Helix Nebula: big science teams up with big business Strategic Plan Establish a federated multi-tenant, multiprovider cloud infrastructure To support the computing capacity needs for the ATLAS experiment Setting up a new service to simplify analysis of large genomes, for a deeper insight into evolution and biodiversity To create an Earth Observation platform, focusing on earthquake and volcano research Identify and adopt policies for trust, security and privacy Create governance structure Define funding schemes Adopters

Long Term Goal To create a multi-tenant Open Market Place for Science, where data, scientists, funding bodies, SMEs and downstream industry meet to work towards common interests An ecosystem to transform data into valuable information

Timeline 2011 2012-2013 2014 Endorse the Common Strategy Agree on the Partnership Select flagships use cases Define governance model Pilot Phase Deploy flagships, Analysis of functionality, performance & financial model Towards an open market for Science

Broker-based architecture: the Blue Box Each customer and supplier have a single connection to the Blue Box resulting in M + N relationships

What is a Cloud Broker? According to Gartner, Cloud Brokers may be classified 3 different categories as intermediaries between Cloud Providers and Cloud Consumers: 1) Cloud Service Intermediation: The broker provides added value to a cloud service, enhancing some capabilities or guaranties offered by the underlying cloud provider to cloud consumers. 2) Aggregation: The broker acts as an integrator, combining several Cloud Provider services into one, ensuring security and governance of data circulating between the composing services. 3) Cloud Service Arbitrage: The broker continuously attempts to select the best cloud provider based on price/feature considerations, potentially changing and migrating data between providers frequently.

Blue Box: Security Goals Baseline security policy across the HN federation. Secure data transfer between providers. Well-defined security service levels. Security assurance/transparency for cloud services. Centralized (continuous) security monitoring and incident response.

Security Service Levels "If you can not measure it, you can not improve it. Lord Kelvin (1824 1907) It is uncommon for cloud providers to specify the security level associated with their products and services. This limits informed customer decisions on security offerings: Despite the belief that my cloud provider seems secure, is it actually secure enough for my needs? Is my (confidential) data in the cloud more secure than in my data center? How do I compare different cloud offers with regards to security and price? If it s so important, then why is cloud security not measured?

Security Service Levels What makes it hard to measure cloud security? All the possible threats are not known. Quantitative vs. Qualitative vs. Uncertainty Technology-specificity: measuring security in cloud computing has several challenges e.g., IaaS-PaaS-SaaS supply chains. How to reason about measured cloud security? Security aggregation: drawing (useful) conclusions based on 100+ security controls. Security negotiation and adaptation (e.g., automated incident response). Specifying/standardizing security parameters in Cloud SLA s.

Security Assurance/Transparency The CSA Open Certification Framework is an industry initiative to allow global, accredited, trusted certification of cloud providers.

CSA STAR: Security, Trust & Assurance Registry Launched in 2011, the CSA STAR is the first step in improving transparency and assurance in the cloud. The STAR is a publicly accessible registry that documents the security controls provided by cloud computing offerings Helps users to assess the security of cloud providers Searchable registry to allow cloud customers to review the security practices of providers, accelerating their due diligence and leading to higher quality procurement experiences. It is based on a multilayered structure defined by Open Certification Framework Working Group

Continuous Security Monitoring Confidentiality level Uptime consumer CTP provider = Reports + Commitments + Alerts

Blue Box: Security requirements (at a glance) Authentication, Authorization and Accountability Role Based Access Control e.g. for remote management interface. Accountability security-related logging, signed timestamping, WORM functionality. Data lifecycle Secure de-provisioning/deletion/decommissioning (degauss etc ) Specific data export/portability requirements (formats, time limits) Cryptography Key management Crypto hardware/acceleration Entropy/randomness sources. Incident and vulnerability management Incident response services and service levels Testing requirements (e.g. external pen-testing) Third party security services used, interfaces required. Legal/Policy/Compliance Certifications Sector-specific laws applicable (e.g. for healthcare data). Processing of personal data Location/jurisdiction-limitations Third parties/subcontractors Breach notification requirements Maximum, minimum data retention Purpose limitation.

The road ahead Solving the security challenges associated with cloud brokers. Legacy security services. Don t forget high performance!

Thank you! Contact@helix-nebula.eu http://www.helix-nebula.eu All Helix Nebula public documents are held in an open access repository: https://cds.cern.ch/search?cc=helix+nebula&ln=en&jrec=1