SlideShare a Scribd company logo
20N2012- Is there any danger or risk in Green?
Is there any danger
 or risk in “Green”
        Part I
NIST’s Cloud Computing Description
                   NIST’s definition



•   On demand
•   Shared pool
•   Configurable
•   Rapidly provisioned



                                                 3
Hybrid Clouds
 Deployment
   Models
                  Private Cloud           Community Cloud             Public Cloud


Service Models       SaaS                     PaaS                         IaaS



                                     On-demand Self Service
  Essential
Characteristics      Broad network access                    Rapid elasticity

                       Resource pooling                    Measured Service


                         Massive scale                     Resilient computing
  Common                 Homogeneity                  Geographic distribution
Characteristics
                         Virtualization                    Service orientation

                      Low cost software                     Advance Security
• Opex reduction
            • Capex deferral
 Private


            • Opex reduction
            • Capex deferral
  Public    • Speed to Market




            •   Opex reduction
            •   Capex deferral
Community   •   Speed to market
            •   New value chains
20N2012- Is there any danger or risk in Green?
20N2012- Is there any danger or risk in Green?
Potential Issues

• Data residency – time delay between data being
    requested and delivered
•   Security and confidentiality of data being stored
    outside the company
•   Business buy-in; convincing companies of the
    infrastructure and reliability
Trust

• For now, many companies are only using cloud
    computing for small projects in our country
•   The trust hasn’t been accepted
•   Details such as licensing, privacy, security,
    compliance and network monitoring need to be
    thought carefully for the trust to be realized
Security and Privacy: Barrier to Adoption?




                                             10
What is there to Secure Cloud?

•   Cloud provisioning services
•   Cloud data storage services
•   Cloud processing infrastructure
•   Cloud support services
•   Cloud network and perimeter security
•   Elastic elements; storage, processing, virtual
    networks
Cloud risks and threads
•   Loss of governance
•   Lock-in
•   Isolation failure
•   Compliance risks
•   Management interface compromise
•   Data protection
•   Insecure or incomplete data deletion
•   Malicious insider
•     Authentication abuse
•     Operations breakdown
•     Misuse of cloud-specific technology
20N2012- Is there any danger or risk in Green?
Is there any danger
 or risk in “Green”
        Part II

More Related Content

PDF
Lost in the Fog: Is Cloud Computing the Future for Digital Information
PDF
Hosting And Co Location
PPTX
5.cloudsecurity
PPT
Cloudcomputingoct2009 100301142544-phpapp02
PDF
Plenary_three_Cloud_computing_-_is_social_housing_ready_for_it_-_Phil_Copperw...
PDF
Cloud Computing Security
PPTX
Chap 5 software as a service (saass)
PPTX
The Cloud: Privacy and Forensics
Lost in the Fog: Is Cloud Computing the Future for Digital Information
Hosting And Co Location
5.cloudsecurity
Cloudcomputingoct2009 100301142544-phpapp02
Plenary_three_Cloud_computing_-_is_social_housing_ready_for_it_-_Phil_Copperw...
Cloud Computing Security
Chap 5 software as a service (saass)
The Cloud: Privacy and Forensics

What's hot (19)

PPTX
Data Security Essentials for Cloud Computing - JavaOne 2013
PDF
Cloud security design considerations
PPTX
Chap 4 platform as a service (paa s)
PPTX
Cloud Computing
PDF
Disaster recovery solutions and datacentre replacements
PPT
security Issues of cloud computing
PDF
Cloud Security: A New Perspective
PPTX
Cloud computing security
PPT
Cloud complete
PPTX
Firewall
PDF
The Latest in Cloud Computing Standards
PDF
Cloud Computing v.s. Cyber Security
PPTX
cloud computing encrypted
PDF
Cloud Computing - ISO/IEC 17788
PDF
Hybrid Cloud: OpenStack and Other Approaches
PPT
Cloud Computing Security Challenges
PPTX
SaaS Challenges & Security Concerns
PPTX
Security in Cloud Computing
PPTX
Cloud Access Security Brokers - CASB
Data Security Essentials for Cloud Computing - JavaOne 2013
Cloud security design considerations
Chap 4 platform as a service (paa s)
Cloud Computing
Disaster recovery solutions and datacentre replacements
security Issues of cloud computing
Cloud Security: A New Perspective
Cloud computing security
Cloud complete
Firewall
The Latest in Cloud Computing Standards
Cloud Computing v.s. Cyber Security
cloud computing encrypted
Cloud Computing - ISO/IEC 17788
Hybrid Cloud: OpenStack and Other Approaches
Cloud Computing Security Challenges
SaaS Challenges & Security Concerns
Security in Cloud Computing
Cloud Access Security Brokers - CASB
Ad

Similar to 20N2012- Is there any danger or risk in Green? (20)

PDF
MISA Cloud workshop - Cloud 101
PPTX
Bright and Gray areas of Clound Computing
PDF
Deadly Sins Bcs Elite
PPTX
Introduction: Build infrastucture-as-a-service Clouds with Apache CloudStack
PPTX
Virtualization and cloud computing
PPTX
Cloud fest 2012_jc02
PPTX
Cloud Computing : Security and Forensics
PDF
Info Sec 2010 Possibilities And Security Challenges Of Cloud Computing (Han...
PDF
Eo navigating the cloud
PDF
Eo navigating the cloud v8
PPTX
Cloud computing and business impact
PPTX
Rubik cloud risks-jun2012
PDF
Avoiding a mushroom cloud
PPT
Chris millercloud
PDF
Going to the Cloud
PPTX
security and compliance in the cloud
PPTX
Lets Do the Cloud-CFO Summit 2013
PDF
Towards a Federated Cloud Ecosystem
PPTX
Cloud_ Computing_ Presentation. pptx
PPTX
Oracle cloud computing strategy
MISA Cloud workshop - Cloud 101
Bright and Gray areas of Clound Computing
Deadly Sins Bcs Elite
Introduction: Build infrastucture-as-a-service Clouds with Apache CloudStack
Virtualization and cloud computing
Cloud fest 2012_jc02
Cloud Computing : Security and Forensics
Info Sec 2010 Possibilities And Security Challenges Of Cloud Computing (Han...
Eo navigating the cloud
Eo navigating the cloud v8
Cloud computing and business impact
Rubik cloud risks-jun2012
Avoiding a mushroom cloud
Chris millercloud
Going to the Cloud
security and compliance in the cloud
Lets Do the Cloud-CFO Summit 2013
Towards a Federated Cloud Ecosystem
Cloud_ Computing_ Presentation. pptx
Oracle cloud computing strategy
Ad

Recently uploaded (20)

PPTX
202450812 BayCHI UCSC-SV 20250812 v17.pptx
PDF
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
PDF
GENETICS IN BIOLOGY IN SECONDARY LEVEL FORM 3
PDF
Indian roads congress 037 - 2012 Flexible pavement
PDF
Practical Manual AGRO-233 Principles and Practices of Natural Farming
PDF
advance database management system book.pdf
PPTX
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
PPTX
Lesson notes of climatology university.
PDF
A GUIDE TO GENETICS FOR UNDERGRADUATE MEDICAL STUDENTS
PPTX
Unit 4 Skeletal System.ppt.pptxopresentatiom
PDF
Chinmaya Tiranga quiz Grand Finale.pdf
PDF
Weekly quiz Compilation Jan -July 25.pdf
PDF
Computing-Curriculum for Schools in Ghana
PDF
A systematic review of self-coping strategies used by university students to ...
PDF
medical_surgical_nursing_10th_edition_ignatavicius_TEST_BANK_pdf.pdf
PPTX
Onco Emergencies - Spinal cord compression Superior vena cava syndrome Febr...
PPTX
UNIT III MENTAL HEALTH NURSING ASSESSMENT
PDF
RTP_AR_KS1_Tutor's Guide_English [FOR REPRODUCTION].pdf
PDF
Classroom Observation Tools for Teachers
PPTX
Radiologic_Anatomy_of_the_Brachial_plexus [final].pptx
202450812 BayCHI UCSC-SV 20250812 v17.pptx
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
GENETICS IN BIOLOGY IN SECONDARY LEVEL FORM 3
Indian roads congress 037 - 2012 Flexible pavement
Practical Manual AGRO-233 Principles and Practices of Natural Farming
advance database management system book.pdf
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
Lesson notes of climatology university.
A GUIDE TO GENETICS FOR UNDERGRADUATE MEDICAL STUDENTS
Unit 4 Skeletal System.ppt.pptxopresentatiom
Chinmaya Tiranga quiz Grand Finale.pdf
Weekly quiz Compilation Jan -July 25.pdf
Computing-Curriculum for Schools in Ghana
A systematic review of self-coping strategies used by university students to ...
medical_surgical_nursing_10th_edition_ignatavicius_TEST_BANK_pdf.pdf
Onco Emergencies - Spinal cord compression Superior vena cava syndrome Febr...
UNIT III MENTAL HEALTH NURSING ASSESSMENT
RTP_AR_KS1_Tutor's Guide_English [FOR REPRODUCTION].pdf
Classroom Observation Tools for Teachers
Radiologic_Anatomy_of_the_Brachial_plexus [final].pptx

20N2012- Is there any danger or risk in Green?

  • 2. Is there any danger or risk in “Green” Part I
  • 3. NIST’s Cloud Computing Description NIST’s definition • On demand • Shared pool • Configurable • Rapidly provisioned 3
  • 4. Hybrid Clouds Deployment Models Private Cloud Community Cloud Public Cloud Service Models SaaS PaaS IaaS On-demand Self Service Essential Characteristics Broad network access Rapid elasticity Resource pooling Measured Service Massive scale Resilient computing Common Homogeneity Geographic distribution Characteristics Virtualization Service orientation Low cost software Advance Security
  • 5. • Opex reduction • Capex deferral Private • Opex reduction • Capex deferral Public • Speed to Market • Opex reduction • Capex deferral Community • Speed to market • New value chains
  • 8. Potential Issues • Data residency – time delay between data being requested and delivered • Security and confidentiality of data being stored outside the company • Business buy-in; convincing companies of the infrastructure and reliability
  • 9. Trust • For now, many companies are only using cloud computing for small projects in our country • The trust hasn’t been accepted • Details such as licensing, privacy, security, compliance and network monitoring need to be thought carefully for the trust to be realized
  • 10. Security and Privacy: Barrier to Adoption? 10
  • 11. What is there to Secure Cloud? • Cloud provisioning services • Cloud data storage services • Cloud processing infrastructure • Cloud support services • Cloud network and perimeter security • Elastic elements; storage, processing, virtual networks
  • 12. Cloud risks and threads • Loss of governance • Lock-in • Isolation failure • Compliance risks • Management interface compromise • Data protection • Insecure or incomplete data deletion • Malicious insider • Authentication abuse • Operations breakdown • Misuse of cloud-specific technology
  • 14. Is there any danger or risk in “Green” Part II

Editor's Notes

  • #2: HitoallwelcometoRollOutCloudtraining program
  • #3: Inthis video wearegoingtobegintotalk aboutsecurity in thecloud..I firstreviewwhat is cloudcomputingandbenefitsandthenwillbeginwithpotentialissues in Cloudandwillmentionrisksandtreaths.. Andthisseriewillcontinuewithsomesecurityscenarios at nextvideos..
  • #5: Okey, hereyou can seetfiveessentialcharacteristicsin themiddleHerearethecommonCharacteristics of CloudComputingThe service models… SaaS,PaaS, I aaSAnddeployementmodels.. Hybrid, private, communityandpublic..Youmayfinddetailedinformationaboutthisslide at mychannelunderRollOutCloudplaylist.. The name of the video is NIST definition of Cloud Computing.
  • #6: So, lets talk aboutthebenefits of cloudcomputing..What is Capex?A capital expenditure (Capex ) : is incurred when a business spends money either to buy fixed assets or to add to the value of an existing fixed asset with a useful life that extends beyond the taxable year. Capex are used by a company to acquire or upgrade physical assets such as equipment, property, or industrial buildings. For tax purposes, capital expenditures are costs that cannot be deducted in the year in which they are paid or incurred and must be capitalized. The capital expenditure costs are amortized or depreciated over the life of the asset in question.What is Opex?Operational expenses (Opex) : is an ongoing cost for running a product business, or system. Its counterpart, a capital expenditure (CAPEX), is the cost of developing or providing non-consumable parts for the product or system. In business, an operating expense is a day-to-day expense such as sales and administration, or research & development, as opposed to production, costs, and pricing.Soletstake a look at deploymentmodels,ForallDeploymentmodels, weseereduction on operationalcostsandretardation on capitalexpenses as opportunities. Forpublicandcommunitymodelskeepupwithagility in business is theplus.Forcommunity model, workingwithpartnersaddsnewvaluechains. And I getthecurrentadaptionmaturitygraphfromStevenHill’spresentation at UP 2010 Cloud Computing Conference
  • #8: Benefitsbenefitsandbenefits.. Everybodytalksaboutbenefits of thecloudcomputing.. Herearesome..Immediate benefits we face first in ITReduce in cost.. well how this is happening? It is happening with The billing model which is pay as per usage and non purchased infrastructure and low maintenace since you do not purchase the infrastructure in Efficiency.. energy efficiency in terms of cost savings as well as environmental responsibilitycloud computing speed ups development and testing cycles, improves the quality of the applicationinterms of the operational efficiencies it accelerates the movement of IT service delivery closer to the efficiency and agility goalsIncrease flexibility in IT.. by transforming computers from something that we buy and operate ourselvesto something that is operated by a third party. With enterprises having to adapt, even more rapidly, to changing business conditions, and to speed to deliverSystem die? Move the container. We may recover a system today in under 30 minutes.. Virtualization gives that flexibility and to test new versions (or even different versions) of any operating system as installed into the “virtual” environment. And Service Oriented Architecture enables innovation through collaboration and flexibility..At next stage we would face with enhance collaboration and user experience, facilitate business agility and better services for citizens As long term we see promoting Sustainability, transforming Education enpowerinviduals and accelerate innovation as benefits of cloud computing
  • #11: As I seefrom 2008tillnowcoverage of the cloud makes us believe that security andprivacyarethe main or one of the main barriers for Cloud computing adoption.Let’stake a look at firstwhatweneedtosecure in thecloud..
  • #12: Pillars of cloudprovisioningare self-service, automationandpolicy.. Please,remember when ATMs appeared in bank lobbies, allowing customers to access their accounts directly instead of having to wait in line -- during banker's hours, of course -- to see a teller. Now, weare creating online identities and communities using self-service tools, naturally want to self-provision technologies that help usalso do our jobs.And do not forgetutomation relies on policies..The benefit of using online storage services doesn’t end at file protection. In fact, a large appeal of such services steams from convenient accessibility. Cloud storage services give you access to your most frequently used and important files no matter where you are. Whether on your smartphone or work computer, you can access, view and edit your stored data.******************Basically, a cloud storage system can be considered to be a network of distributeddata centers which typically uses cloud computing technologies like virtualization,and offers some kind of interface for storing data.. Basic cloud storage services are generallyaccessedviaAPIs-applicationprogramminginterfaces*Registrationandlogin*Transportation - The actualtransmission of all data with the remote storage servers is also handled by the clientsoftware, soIt is important to use appropriate cryptographic functions.*Encryption - The main reason to use a cloud storage provider- for both individuals and compa-nies- is to always have a backup of valuable data which is off-premises yet easilyaccessible.So, all data should be encrypted on the client system before the data istransmitted into the cloud using a key unknown to the service provider.*filesharing- Sharing files appears in three differentfavors :(1) Sharing files with other subscribers of the same service.(2) Sharing files with a closed group of non-subscribers.(3) Sharing files with everybodyThis is not a technical point but it is important tomakeclearthe difference between file publication and file sharing in a closed user group.*deduplication - Data deduplication is employed by many storage providers since it enables them tosave large amounts of storage space, thereby reducing costs.privacy issues can only occur if the cloud storageprovider uses both client-side and cross user deduplication.*multipledevices-In the time of ubiquitous computing devices, a typical user has multiple devices toaccess his data depending on his current location.During the installation on a new devicen, the credentials are usually stored locally*server location- Ideally, the storage providerwould offerdifferent storage locations from which the user can choose. The conse-quences of data storage location with regard to privacy and legal issues is important.********************************Now, aboutsecurity on IaaS;The security issues are a little different, depending on whether you use a public cloud or private cloud implementation of IaaS..For both scenarios, you should consider the following security issues:Data leakage protection and usage monitoringAuthentication and authorizationIncident response and forensics capabilitiesInfrastructure hardeningEnd to end encryption****************************When storing information in the cloud, you must comply with state, federal and industry-related data privacy laws. Before you transfer any data to the cloud, find out whether doing so will not make you noncompliant.*When accessing data and applications via the internet, you must have strict controls over who can access them. Consult standards such as the Security Assertion Markup Language (SAML) and Active Directory Federation Services (ADFS) when setting up access and identity controls.*Your cloud support services should have a set of policies, procedures and processes to ensure business continuity in the event of a disaster. Make sure you know how to retrieve the data you store in the cloud if your IT systems fail.*************************************Information Security Principles (Triad)  C I A • Confidentiality Prevent unauthorized disclosure. Integrity Preserve information integrity • Availability Ensure information is available when needed**• Provider resources shared with untrusted parties • CPU, storage, network • Customer data and applications must be separated Laws and regulations may prevent cloud computing • Requirements to retain control • Certification requirements not met by provider • Geographical limitations – EU Data Privacy • New locations may trigger new laws and regulations**Including the cloud in your perimeter • Lets attackers inside the perimeter • Prevents mobile users from accessing the cloud directly • Not including the cloud in your perimeter • Essential services aren’t trusted • No access controls on cloud Dropperimeter model!!***Fired employee retains access to cloud • Misbehavior in cloud not reported to customer
  • #13: Herearetheknownrisksandthreads in cloudcomputing.. KnowingallandlearningaboutCountermeasureswillhelpyou in a safeenvironment in Cloud..I willcontinue on security on nextvideos..
  • #14: ThankyouforlisteningRollOutcloudtraining.. Keepwatchingandcommenting us.Seeyounext time..Byeforknow