Security Landscape of Cloud Computing Amrith Nawoor Sales Consulting Team Leader East Africa & SADC 1
This document is for informational purposes. It is not a commitment to deliver any material, code, or functionality, and should not be relied upon in making purchasing decisions. The development, release, and timing of any features or functionality described in this document remains at the sole discretion of Oracle. This document in any form, software or printed matter, contains proprietary information that is the exclusive property of Oracle. This document and information contained herein may not be disclosed, copied, reproduced or distributed to anyone outside Oracle without prior written consent of Oracle. This document is not part of your license agreement nor can it be incorporated into any contractual agreement with Oracle or its subsidiaries or affiliates. 2
Program Agenda Cloud Computing, Challenges An Inside Out Approach Securing The Cloud Security at Every Layer 3
Customers have multiple options with Cloud Deployment Model Service Model Operating Model Private Applications (SaaS) Customer Owns Customer Operates Public Hybrid Platform (PaaS) Infrastructure (IaaS) Customer Owns Provider Operates Provider Owns Provider Operates 4
Concerns & Challenges Integrating existing applications Interoperability & Portability 5
SECURITY 6
$7B FRAUD 6M LinkedIn Passwords STOLEN Credit Cards 12M STOLEN Sony Société Générale 7
$7B FRAUD 6M Passwords STOLEN Credit Cards 12M STOLEN Sony Société Générale LinkedIn Total Loss from CYBERCRIME 8
1. Brand Decline 2. Regulatory Fines 3. Financial Loss 9
Directive 95/46/EC FERC FIPS SEC KASB 40 % Security Budget Spent on SOX CJIS CA 541 NERC ISO27001 10
on Security response has been reactive, shifted attention away from apps and data 2007 2010 11
$400 $ 500 Endpoint Security Vulnerability Management Network Security Email Security Average Cost of Security Other Security breached Gartner 2010 hacking breached privilege from records against records db web\app servers misuse stolen credentials servers server 12
Hacking Involved Stolen Credentials APPLICATIONS MIDDLEWARE DATABASE OPERATING SYSTEM Breached Records from Web/App Servers Breached Records from Db Servers From Privilege Misuse Verizon Data Breach 2012 SERVERS STORAGE Attacks Against Servers Breaches Against Offline Data Breaches Against File Servers 13
LinkedIn Sony VULNERABILITIES were on the Société Générale 14
MANAGE THE RISKS SECURITY PREVENT THE THREATS INSIDE OUT UNLOCK THE OPPORTUNITIES 15 Insert Information Protection Policy Classification from Slide 11
SECURITY AT EACH LAYER SECURITY BETWEEN LAYERS SECURITY BETWEEN SYSTEMS S E C U R I T Y S E C U R I T Y S E C U R I T Y S E C U R I T Y S E C U R I T Y S E C U R I T Y S E C U R I T Y 16
SECURE THE 17
CONTROL 18
TOP 5 CONCERNS CSO Online Survey 2011 Data access from & Ongoing concerns Co-mingling of Security & 19
Identity Management & Compliance Mobile data access, sign-on and compliance reporting Scalable Repository Complete Access Identity Governance 20
Reduce Risks of Co-mingling Data Secure databases in the cloud Shared database pool Managed in the cloud Consistent & efficient Eliminates data silo complexity Better security & lower cost 21
HARDWARE SECURITY WITHOUT COMPROMISE SOFTWARE 22
DEFENSE IN-DEPTH 23 SECURITY INSIDE OUT SECURE WHAT S STRATEGIC
MANAGE 24
PREVENT 25
UNLOCK 26
27
SECURE YOUR FUTURE 28
Data Security Fraud Detection Compliance Reporting 29
DATA STORAGE APPLICATION & authorization at the database level 30
FRAUD DETECTION 31 Insert Information Protection Policy Classification from Slide 13