Visions of Clouds and Cloud Security. Rob Randell, CISSP Senior Security and Compliance Specialist VMware, Inc.



Similar documents
Architecting and Building a Secure and Compliant Virtual Infrastructure and Private Cloud

Applying a Holistic Defense-in- Depth Approach to The Cloud (with a dash of application security thrown in)

Securing The Cloud. Foundational Best Practices For Securing Cloud Computing. Scott Clark. Insert presenter logo here on slide master

10/25/2012 BY VORAPOJ LOOKMAIPUN CISSP, CISA, CISM, CRISC, CEH Agenda. Security Cases What is Cloud? Road Map Security Concerns

Securing the Cloud. A Review of Cloud Computing, Security Implications and Best Practices W H I T E P A P E R

Cloud Computing Technology

VMware for your hosting services

SMS. Cloud Computing. Systems Management Specialists. Grupo SMS option 3 for sales

Cloud Security Alliance and Standards. Jim Reavis Executive Director March 2012

Cloud Security and Managing Use Risks

Whose Cloud Is It Anyway? Exploring Data Security, Ownership and Control

Cloud Courses Description

Security, Compliance & Risk Management for Cloud Relationships. Adnan Dakhwe, MS, CISA, CRISC, CRMA Safeway Inc. In-Depth Seminars D32

Virginia Government Finance Officers Association Spring Conference May 28, Cloud Security 101

SECURITY MODELS FOR CLOUD Kurtis E. Minder, CISSP

Healthcare Enterprise View of Cloud What is Cloud Additional Needs Cloud Models Cloud Economics 101 Stack Decision Framework

CHAPTER 8 CLOUD COMPUTING

White Paper on CLOUD COMPUTING

Security Issues in Cloud Computing

Cloud Computing Security Issues

Cloud Services Overview

VMware Security Briefing. Rob Randell, CISSP Senior Security Specialist SE

Cloud Courses Description

How To Compare Cloud Computing To Cloud Platforms And Cloud Computing

Purpose. Service Model SaaS (Applications) PaaS (APIs) IaaS (Virtualization) Use Case 1: Public Use Case 2: Use Case 3: Public.

Enhancing Operational Capacities and Capabilities through Cloud Technologies

The Cloud as a Computing Platform: Options for the Enterprise

Cloud Security considerations for business adoption. Ricci IEONG CSA-HK&M Chapter


CLOUD COMPUTING & SECURITY -A PRACTICAL APPROACH

Today s Speakers. A Conversation with Robbie Forkish, Forkish Consulting 9/1/2009. Webtorials Editorial/Analyst Division

Cloud Computing: Making the right choices

Cloud Architecture and Management. M.I. Deen General Manager (Enterprise Solutions) Sri Lanka Telecom

Cloud Computing and Security Risk Analysis Qing Liu Technology Architect STREAM Technology Lab

Outline. What is cloud computing? History Cloud service models Cloud deployment forms Advantages/disadvantages

Secure Cloud Computing through IT Auditing

Trust but Verify. Vincent Campitelli. VP IT Risk Management

Are You Prepared for the Cloud? Nick Kael Principal Security Strategist Symantec

Cloud models and compliance requirements which is right for you?

A Primer on Cloud Computing. By Anand Ganesan Byteonic.com

Dispelling the Myths about Cloud Computing Security

Mitigating Information Security Risks of Virtualization Technologies

Global Efforts to Secure Cloud Computing

Virtual Datacenter. You ve built your business making smart decisions. Here s another. Why Choose CenterBeam?

NCTA Cloud Architecture

Cloud Security Framework (CSF): Gap Analysis & Roadmap

Deploying ArcGIS for Server using Managed Services

Building Out Your Cloud-Ready Solutions. Clark D. Richey, Jr., Principal Technologist, DoD

Sichere Virtualisierung mit VMware

Geoff Raines Cloud Engineer

Contents. What is Cloud Computing? Why Cloud computing? Cloud Anatomy Cloud computing technology Cloud computing products and market

Cloud Security Framework (CSF): Gap Analysis & Roadmap

VMware vcloud Architecture Toolkit Public VMware vcloud Service Definition

Security Overview Enterprise-Class Secure Mobile File Sharing

CUMULUX WHICH CLOUD PLATFORM IS RIGHT FOR YOU? COMPARING CLOUD PLATFORMS. Review Business and Technology Series

Building Private & Hybrid Cloud Solutions

INCIDENT RESPONSE CHECKLIST

Lecture 02a Cloud Computing I

idash Infrastructure to Host Sensitive Data: HIPAA Cloud Storage and Compute

Building an Internal Cloud that is ready for the external Cloud

Navigating The World of Cloud Computing

SECURING HEALTH INFORMATION IN THE CLOUD. Feisal Nanji, Executive Director, Techumen

Overview of Cloud Computing and Cloud Computing s Use in Government Justin Heyman CGCIO, Information Technology Specialist, Township of Franklin

Covering my IaaS: Security and Extending the Datacenter. Brian Bourne Tadd Axon

Hosted ediscovery: Adoption, Use, and Results. September, 2011

CenterBeam Managed Services Overview

The Private Cloud Your Controlled Access Infrastructure

Cloud Security & Risk Management PRESENTATION AT THE OPEN GROUP CONFERENCE

Plant Software in the Cloud Fact vs. Myth

Security in the Software Defined Data Center

Cloud Computing Trends, Examples & What s Ahead

Electronic Records Storage Options and Overview

Virtualization Security and Best Practices. Rob Randell, CISSP Senior Security Specialist SE

Cloud Computing An Internal Audit Perspective. Heather Paquette, Partner Tom Humbert, Manager

Chapter 11 Cloud Application Development

Cloud and Regulations: A match made in heaven, or the worst blind date ever?

Cloud Models and Platforms

How To Protect Your Cloud Computing Resources From Attack

BMC Control-M for Cloud. BMC Control-M Workload Automation

EMA Radar for Private Cloud Platforms: Q1 2013

What Cloud computing means in real life

Platform Leadership in Software as a Service: How Platforms Facilitate Innovation

BUSINESS MANAGEMENT SUPPORT

Proactively Secure Your Cloud Computing Platform

Oracle ERP & The Cloud. Presented by Adriaan Kruger

Application Security Best Practices. Matt Tavis Principal Solutions Architect

Looming server failure / datacenter disaster adds a thrill to the job

Platforms in the Cloud

Guideline on Implementing Cloud Identity and Access Management

International Journal of Innovative Technology & Adaptive Management (IJITAM) ISSN: , Volume-1, Issue-5, February 2014

Cloud Security Certification

Virtualization and Cloud Computing

How to Grow and Transform your Security Program into the Cloud

Keith Luck, CISSP, CCSK Security & Compliance Specialist, VMware, Inc. kluck@vmware.com

PCI COMPLIANCE ON AWS: HOW TREND MICRO CAN HELP

What Is It? Business Architecture Research Challenges Bibliography. Cloud Computing. Research Challenges Overview. Carlos Eduardo Moreira dos Santos

Welcome. Panel. Cloud Computing New Challenges in Data Integrity and Security 13 November 2014

Cloud Computing and the Lure of Hosted Solutions

Williamson County Technology Services Technology Project Questionnaire for Vendor (To be filled out withprospective solution provider)

Where in the Cloud are You? Session Thursday, March 5, 2015: 1:45 PM-2:45 PM Virginia (Sheraton Seattle)

Transcription:

Visions of Clouds and Cloud Security Rob Randell, CISSP Senior Security and Compliance Specialist VMware, Inc.

Visions of Clouds and Cloud Security What is the Cloud? PAAS SAAS IAAS Chris Hoff s Model of the Cloud Cloud Security Alliance s 15 Domains We will focus on IAAS Virtualization is the Basis Basic Virtualization Overview What is the private cloud? Internal Cloud External Cloud Internal Cloud + External Cloud = Private Cloud Benefits of the Private Cloud Limitations of the Private Cloud Cloud Security Reference Architecture

What is the Cloud? X as a Service Types of Clouds Software as a Service (SaaS) Salesforce.com Google Apps Platform as a Service (PaaS) Google App Engine Force.com Infrastucture as a Service (IaaS) Amazon EC2 Rackspace Savvis

Security Considerations of Each Type of Cloud Software (SaaS) Least extensibility and greatest amount of security responsibility taken on by the cloud provider Infrastructure (IaaS) Greatest extensibility and least amount of security responsibility taken on by the cloud provider Platform (PaaS) Lies somewhere in the middle, with extensibility and security features which must be leveraged by the customer

Cloud Model

What This Means To Security Salesforce - SaaS The lower down the stack the Cloud provider stops, the more security you are tactically responsible for implementing & managing yourself. Google AppEngine - PaaS Amazon EC2 - IaaS

Cloudanatomy Infostructure! Content & Context - Applications, Information, Services Metastructure! Glue & Guts - IPAM, IAM, BGP, DNS, etc. Infrastructure! Sprockets & Moving Parts - Compute, Network, Storage

Mapping the Model to the Metal Cloud Model Find the Gaps! Security Control Model Applications SDLC, Binary Analysis, Scanners, WebApp Firewalls, Transactional Sec. Compliance Model Information Management Network Trusted Computing DLP, CMF, Database Activity Monitoring, Encryption GRC, IAM, VA/VM, Patch Management," Configuration Management, Monitoring NIDS/NIPS, Firewalls, DPI, Anti-DDoS," QoS, DNSSEC, OAuth Hardware & Software RoT & API s PCI Firewalls Code Review WAF Encryption Unique User IDs Anti-Virus Monitoring/IDS/IPS Patch/Vulnerability Management Physical Access Control Two-Factor Authentication... HIPAA Compute & Storage Physical Host-based Firewalls, HIDS/HIPS, " Integrity & File/log Management, Encryption, Masking Physical Plant Security, CCTV, Guards GLBA SOX

Cloud Security Alliance s 15 Domains of Cloud Computing 1. Cloud Computing Architectural Framework 2. Governance and Enterprise Risk Management 3. Legal 4. Electronic Discovery 5. Compliance and Audit 6. Information Lifecycle Management 7. Portability and Interoperability 8. Traditional Security, Business Continuity and Disaster Recovery 9. Data Center Operations 10. Incident Response, Notification, Remediation 11. Application Security 12. Encryption and Key Management 13. Identity and Access Management 14. Storage 15. Virtualization

Infrastructure as a Service Hardware Virtualization is the basis of the IaaS Model Examples include: VMware vsphere MS HyperV Citrix XenServer

Virtualization Basics

Pools of Shared Resources Traditional View Cloud View Exchange Operating VMware Infrastructure System PCI Operating VMware Infrastructure System VMware vsphere DNS Operating VMware Infrastructure System CRM Operating VMware Infrastructure System CPU Pool Memory Pool Storage Pool Interconnect Pool

The Datacenter Today Trusted Control Reliable Secure Data Center

Cloud Computing Trusted Control Reliable Secure Flexible Dynamic On-demand Efficient Data Center Cloud Computing

Bring the Cloud to the Enterprise Trusted Control Reliable Secure Flexible Dynamic On-demand Efficient Virtualized Data Center Internal Cloud Virtualization Information Security Cloud Computing External Cloud

To Build a Private Cloud Private Cloud Federation Virtualized Data Center Internal Cloud Virtualization Information Security Cloud Computing External Cloud

Benefits of the Private Cloud What are the benefits of a private cloud? Expand scalability Lower infrastructure Increase utilization Improve end-user productivity Improve reliability Increase security Gain access to more sophisticated applications Downsize the IT department Save energy

Limitations of the Private Cloud Limitations of Existing Cloud Computing Solutions A lack of interoperability Application Compatibility Difficulty in meeting compliance regulations Inadequate security

Cloud Security Reference Architecture SAN Cust A 6 SAN Cust B 6 SSL VPN 5 Customer Mgt Net Customer A Customer B Customer C Customer D 3 3 3 3 Port group A Port group B Port group C Port group D Service Provider Cloud (protected) VMotion Network 5 1 Service Provider Security Gateway Network (protected) 7 Network (external) Customer A DMZ Customer B DMZ Customer C DMZ Customer D DMZ 2 4 Service Provider Cloud DMZ Security Policy Cust-A Compute Profile Network Profile Identity Profile 1 5 8 7 Public Cloud Service Provider Cloud Gateway Security Policy Cust-D Compute Profile Network Profile Identity Profile 1 5 8 Private Cloud Cust A 1 5 8 Security Policy Cust-B Compute Profile Network Profile Identity Profile Private Cloud Cust B 1 5 8 Security Policy Cust-C Compute Profile Network Profile Identity Profile Private Cloud Cust C Private Cloud Cust D

Cloud Security Reference Architecture 1. Security profile per compute profile 2. Security DMZ per vapp 3. OS Management 4. Resource Management 5. Security profile per network 6. Data Security 7. Security Authentication, Authorization, and Auditing 8. Identity Management

Questions? Rob Randell, CISSP Senior Security and Compliance Specialist VMware, Inc.