SlideShare a Scribd company logo
Cloud Computing What are you afraid of? Copyright 2011 The Word & Brown Companies
Agenda Review the basics Copyright 2011 The Word & Brown Companies At the “Peak of inflated expectations ”  -- Gartner’s Hype Cycle for Emerging Technologies #1 Strategic Technology for  2010  –  Technologies You Can’t Afford to Ignore, Gartner So what is it with Cloud Computing? EMC shuts down online cloud storage service Iron Mountain Becomes Third Provider to Exit Public Cloud Storage Market  Gartner predicts less than one-third of cloud investments will reach ROI by 2011 60% of IT decision-makers see cloud computing as helpful to the business By 2015 Cloud Computing will make up 17% of all IT expenditure worldwide  U.S. Government Adopts “Cloud-first” Policy Fortune 1000 firms shun public cloud  Feds Shy Away From Public Cloud, Call For Security
Copyright 2011 The Word & Brown Companies At its most promising, Cloud Computing is about evolving IT to enable greater responsiveness to business needs while at the same time driving greater efficiencies.  Successful Cloud computing requires a re-thinking of IT in a way that’s fundamentally different from how we’ve approached IT over the last 30 years. There are some reasons to be cautious and you can’t simply move existing applications to a cloud infrastructure without understanding the significant differences in the environments.
Maturity of Key Elements has made Cloud Computing viable Copyright 2011 The Word & Brown Companies Virtualization Service Oriented Architecture (SOA) Broadband Networks Browser as a Platform Open Source Software Horizontal Scaling/“Fail in place computing”
Copyright 2011 The Word & Brown Companies Reasons to Embrace Cloud Computing Costs – Low start up costs, low cost for sporadic use, moves Capex to Opex Consolidation Scalability, rapid provisioning/deprovisioning Simplification Reliability Ease of management Ubiquity of access/Device and location independence Disaster Recovery Improve Agility/Innovation  Security & Compliance
Copyright 2011 The Word & Brown Companies
Copyright 2011 The Word & Brown Companies Optimizing Cost of Capacity SOURCE: The Open Group,  May 2011
Copyright 2011 The Word & Brown Companies Reason to be Wary of Cloud Computing Costs – especially the predictability of costs Access Performance & Reliability Management Vendor Lock in Ownership Security & Compliance 74% of respondents of a recent survey of senior management, IT operations and security professionals don’t believe the cost savings of cloud computing outweigh the security considerations for their organization*   *SOURCE: nCircle Information Security & Compliance Trend Study,   2010
Copyright 2011 The Word & Brown Companies Reason to be Wary of Cloud Computing SOURCE: The Open Group,  May 2011 Response to the question: “What is your biggest concern with Cloud Computing?”
Copyright 2011 The Word & Brown Companies Deployment Models Private Cloud Accessed by a single enterprise  (On or Off-premise) Not a commercial offering Private Cloud Accessed by a single entity -  on or off premise Operated solely for that entity Public Cloud Open to use by multiple organizations Location of data and resources “unknown” Hybrid Cloud  “ Bursting” from Private to Public Split by tier Community Cloud  Supports several organizations in a specific community with like interests. e.g. security, policy, compliance
Copyright 2011 The Word & Brown Companies Five Key Characteristics On-demand Self-service Individuals can set themselves up with little of no help Ubiquitous Network Access  Available through standard Internet-enabled devices Location Independent Resource Pooling Processing and storage demands are balanced across a common infrastructure, with no particular resource assigned to any individual user Rapid Elasticity Consumers can increase or decrease capacity at will Pay Per Use Consumers are charged fees based on their usage of a combination of computing power, bandwidth use and/or storage
Copyright 2011 The Word & Brown Companies Delivery Models Target: Developers, Sys Admins Server, Storage, Network OS, Virtualization, File system Target: Developers  Development  tools Database, Middleware Infrastructure software Target: End users Collaborative applications ERM, CRM, Supply chain apps Ops and manufacturing apps Engineering applications Infrastructure as a Service Platform as a Service Software as a Service
Delivery Models Copyright 2011 The Word & Brown Companies = Managed for You SaaS PaaS IaaS Applications Runtimes Database Operating System Virtualization Server Storage Networking
Cloud Concepts & Terminology Copyright 2011 The Word & Brown Companies
Concerns about Security Copyright 2011 The Word & Brown Companies Customer Admin Users Tenant Tenant External Web Site
Threats 1. Brute force attacks.  2. Buffer overflows.  3. Canonicalization attacks.  4. Cookie manipulation.  5. Cookie replay attacks.  6. Credential theft.  7. Cross-Site Request Forgery (CSRF).  8. Cross-site scripting (XSS).  9. Connection pooling.  10. Data tampering.  11. Denial of service.  12. Dictionary attack.  13. Disclosure of sensitive/confidential data.  14. Elevation of privilege.  15. Encryption.  16. Information disclosure.  17. Luring attacks.  18. Man-in-the-middle attacks.  19. Network eavesdropping.  20. Open Redirects.  21. Password cracking.  22. Repudiation.  23. Session hijacking.  24. Session replay.  25. Session fixation.  26. Spoofing.  27. SQL injection.  28. Throttling Copyright 2011 The Word & Brown Companies .  SOURCE: Securing Microsoft's Cloud Infrastructure
Countermeasures 1. Assume all input is malicious.  2. Audit and log activity through all of the application tiers 3. Avoid storing secrets.  4. Avoid storing sensitive data in the Web space 5. Back up and regularly analyze log files.  6. Be able to disable accounts.  7. Be careful with canonicalization issues.  8. Catch exceptions.  9. Centralize your input and data validation.  10. Consider a centralized exception management framework.  11. Consider authorization granularity.  12. Consider identity flow.  13. Constrain input.  14. Constrain, reject, and sanitize your input.  15. Cycle your keys periodically. 16. Disable anonymous access and authenticate every principle.  17. Do not develop your own cryptography.  18. Do not leak information to the client.  19. Do not log private data such as passwords.  20. Do not pass sensitive data using the HTTP-GET protocol.  21. Do not rely on client-side validation.  22. Do not send passwords over the wire in plaintext.  23. Do not store credentials in plaintext.  24. Do not store database connections, passwords, or keys in plaintext 25. Do not store passwords in user stores.  26. Do not store secrets in code.  27. Do not store sensitive data in persistent cookies.  28. Do not trust fields that the client can manipulate.  29. Do not trust HTTP header information 30. Encrypt communication channels to protect authentication tokens 31. Encrypt sensitive cookie state  32. Encrypt the contents of the authentication cookies  33. Encrypt the data or secure the communication channel.  34. Enforce separation of privileges.  35. Enforce unique transactions.  36. Identify malicious behavior.  Copyright 2011 The Word & Brown Companies SOURCE: Securing Microsoft's Cloud Infrastructure
Countermeasures – con’t. 37. Keep unencrypted data close to the algorithm.  38. Know what good traffic looks like.  39. Limit session lifetime.  40. Log detailed error messages.  41. Log key events.  42. Maintain separate administration privileges.  43. Make sure that users do not bypass your checks.  44. Pass Forms authentication cookies only over HTTPS connections. 45. Protect authentication cookies.  46. Provide strong access controls on sensitive data stores.  47. Reject known bad input.  48. Require strong passwords . 49.  Restrict user access to system-level resources.  50. Retrieve sensitive data on demand.  51. Sanitize input.  52. Secure access to log files.  53. Secure the communication channel for remote administration 54. Secure your configuration store.  55. Secure your encryption keys.  56. Separate public and restricted areas.  57. Store keys in a restricted location.  58. Support password expiration periods. 59. Use account lockout policies for end-user accounts.  60. Use application instrumentation to expose behavior that can be monitored:  61. Use authentication mechanisms that do not require clear text credentials to be passed over the network:  62. Use least privileged accounts.  63. Use least privileged process and service accounts.  64. Use multiple gatekeepers.  65. Use SSL to protect session authentication cookies.  66. Use strong authentication and authorization on administration interfaces.  67. Use structured exception handling.  68. Use the correct algorithm and correct key length.  69. Use tried and tested platform features.  70. Validate all values sent from the client.  71. Validate data for type, length, format, and range . Copyright 2011 The Word & Brown Companies SOURCE: Securing Microsoft's Cloud Infrastructure
Security Models have to change for the Cloud Copyright 2011 The Word & Brown Companies
Security is a shared responsibility Copyright 2011 The Word & Brown Companies On Premises In The Cloud Physical Network Host Application Data Physical Network Host Application Data Customer Responsibilities Cloud provider Responsibilities
Security – on premise Copyright 2011 The Word & Brown Companies
Security – in the Cloud Copyright 2011 The Word & Brown Companies
Security – in the Cloud Copyright 2011 The Word & Brown Companies
Security – in the Cloud Copyright 2011 The Word & Brown Companies Tenant  Instance Tenant  Instance Tenant  Instance Tenant  Instance Tenant  Instance Tenant  Instance Tenant  Instance Network Guest Agent Guest Agent Guest Agent Guest Agent Guest Agent Guest Agent Guest Agent Fabric Controller Root VM Hypervisor Firewall Firewall Firewall Firewall Firewall Firewall VLAN Firewall Packet Filter Packet Filter Firewall Packet Filter Fabric Agent
Cloud Security is a Paradigm Shift Copyright 2011 The Word & Brown Companies Much of the traditional infrastructure security moves to the platform and application layers Network Access Control Lists and Firewalls become host packet filters and virtual firewalls Reduction of attack surface, least privilege, user authentication and input sanitization are key concerns Platform and network level encryption play a role, but the developer has increased responsibility for application encryption design
Copyright 2011 The Word & Brown Companies Concerns about Security Security Advantages of a Public Cloud  Lives behind enterprise-class firewall Lives in very secure facility Thieves may not know where your data lives Your gear is not at risk from disgruntled employee You may gain security expertise from your vendor You vendor may have more rigorous practices around patching, updating and data center management You are not alone when defending against DDoS You are protected from hardware failures
Copyright 2011 The Word & Brown Companies Concerns about Security Security Disadvantages of a Public Cloud Access can be granted from anywhere Your data must travel “in the wild” to the cloud You are dependent on responsiveness, whims & quality of vendor You often don’t know where your data resides or how it is comingled with other tenants  Attacks on others can have an effect on you You have limited transparency regarding security controls Auditing can be difficult You may be subject to jurisdictional issues There is very little established case law Vendor could shut you down suddenly Cloud computing involves an inherent transfer of control, which creates issues around security and privacy.
Copyright 2011 The Word & Brown Companies Concerns about Security Why a public cloud vendor might shut you down… Decides your customer mailing is spam Goes out of business Is sold off to your competitor Didn’t properly build in disaster recovery Didn’t properly plan for appropriate scaling One of its co-tenants is investigated by the government Sometimes, just that tenant's servers seized Sometimes, all servers on premises seized Because of resource pooling, any seizure could negatively affect you
Copyright 2011 The Word & Brown Companies Organizations are moving forward Question: “ What best describes where Cloud Computing fits into your organization’s IT roadmap?” SOURCE: The Open Group,  May 2011
Copyright 2011 The Word & Brown Companies How does a cloud deployment change my risk profile? A cloud computing deployment means you are no longer in complete control of the environment, the data, or the people. A change in control creates a change in risk. Ultimately the data and its sensitivity level will dictate if a cloud model makes sense. What do I need to do to ensure my existing security policy accommodates the cloud model? A shift to a cloud paradigm is an opportunity to improve your overall security posture and your security policies. Ideally you can extend your existing security policies to accommodate this additional platform. Will a cloud deployment compromise my ability to meet regulatory mandates? Cloud deployments shift your risk profile and could affect your ability to meet various regulations. Some cloud applications give you strong reporting and are tailored to meet specific regulatory requirements, others are more generic and cannot or will not meet detailed compliance requirements. Cloud Security: Questions to Ask Before You Jump In
What happens if a breach occurs? How are incidents handled? This is a critical component to your overall agreement with the cloud service provider. The cloud provider (as a service provider), and you as a company may have breach notification policies or regulations you must meet. You must ensure that a cloud provider can support your notification requirements should the need arise.  How do I ensure only authorized employees, partners and customers can access data and applications? Identity and access management is an existing security challenge that is amplified by cloud deployments. How are my data and applications hosted, and what security technologies are in place? This information can directly affect an organization's ability to comply with certain regulations. Transparency is necessary for you to make informed decisions.  Copyright 2011 The Word & Brown Companies Cloud Security: Questions to Ask Before You Jump In
Expectations are high Copyright 2011 The Word & Brown Companies
The Scale is amazing - Microsoft Copyright 2011 The Word & Brown Companies
The Scale is amazing - Google Copyright 2011 The Word & Brown Companies Each Container has 1160 servers and power consumption that can reach 250 kilowatts
Copyright 2011 The Word & Brown Companies Some lessons from Amazon's outage  (or Microsoft’s or Google’s) Read your cloud provider’s SLA  very  carefully Amazingly, this almost four-day outage has  not  breached Amazon’s EC2 (Elastic Compute Cloud) SLA, which “guarantees 99.95% availability of the service within a Region over a trailing 365 period.” Since it has been the EBS (Elastic Block Storage) and RDS (Relational Database Services) rather than EC2 itself that failed the SLA has not been breached, legally speaking.  Don’t take your provider’s assurances for granted Many of the affected customers were paying extra to host their instances in more than one Availability Zone (AZ) which are supposed to be physically separate and protect from virtually any failure. Unfortunately, this turned out to be a technical specification rather than a contractual guarantee.  There are ways you can supplement a cloud provider’s resilience   Decompose resources into independent pools, build in support for quick timeouts and retries, and have interfaces that allow multiple retries of failed requests. Can be difficult if all your experience is in designing tightly-coupled enterprise application stacks that assume a resilient local area network.  Successful cloud apps are not your in house apps simply hosted in the cloud .
Copyright 2011 The Word & Brown Companies Some lessons from Amazon's outage  (or Microsoft’s or Google’s) Building in extra resilience comes at a cost  Choices about the length of outage you can tolerate have cost consequences.  Understanding the trade-offs helps you frame what to ask  A good question to ask Cloud vendors — “Do you take down production infrastructure to test your failover?” (Amazon apparently didn’t and it didn’t work as expected) Amazon’s lack of transparency made recovery harder  Several affected customers complained of the lack of useful information coming from Amazon during the outage - “Our people can’t read from the tea-leaves how to organize our systems for performance, scalability and most importantly disaster recovery. The difference between ‘reasonable’ SLAs and ‘five-9s’ is the difference between improvisation and the complete alignment of our respective operational processes …”  Remember -  an inherent transfer of control Most customers will still forgive Amazon its failings However badly they’ve been affected, providers have sung Amazon’s praises in recognition of how much it’s helped them run a powerful infrastructure at lower cost and effort. In many cases their businesses might not be able to exist at all without a similar infrastructure.
Cloud computing represents virtualization supercharged by automation, and automation always threatens jobs—especially those of lower-skilled employees. Simply put, cloud computing will displace the jobs of those who perform routine operations tasks. Asking these folks what they think of public cloud computing is like asking a turkey what it thinks of Thanksgiving. How can the CIO justify sticking with an existing system when SaaS and infrastructure alternatives are (or at least appear to business to be) so much cheaper?  IT organizations will come under pressure to meet the cost structures of the best-of-breed public providers.  Failing to rethink the delivery of services—and the organization necessary to deliver them—poses a threat to the job tenure of even the most senior IT executives.  Successful IT executives in the future will be those who recognize that their job is infrastructure management at market rates, not asset ownership.  Copyright 2011 The Word & Brown Companies There may be a significant risk in  not  adopting a Public Cloud model
Questions And Discussion Copyright 2011 The Word & Brown Companies
Links Copyright 2011 The Word & Brown Companies

More Related Content

DOCX
Cloud Computing Security
PPTX
Practical Security for the Cloud
PPTX
Global Azure Bootcamp 216 - Azure Rights Management
PDF
Secure Productive Enterprise from Microsoft and Atidan
PDF
MIST Effective Masquerade Attack Detection in the Cloud
PDF
F5 networks the_expectation_of_ssl_everywhere
PDF
Forcepoint Dynamic Data Protection
PDF
MEKDA: Multi-Level ECC based Key Distribution and Authentication in Internet ...
Cloud Computing Security
Practical Security for the Cloud
Global Azure Bootcamp 216 - Azure Rights Management
Secure Productive Enterprise from Microsoft and Atidan
MIST Effective Masquerade Attack Detection in the Cloud
F5 networks the_expectation_of_ssl_everywhere
Forcepoint Dynamic Data Protection
MEKDA: Multi-Level ECC based Key Distribution and Authentication in Internet ...

What's hot (20)

PDF
Data Security by AES Advanced Encryption Standard
PPTX
Data Con LA 2019 - So You got Hacked, how Quickly Can your Company Recover? b...
PDF
Data loss prevention by using MRSH-v2 algorithm
PPTX
CYBERSECURITY MESH - DIGITAL TRUST FRAMEWORK
PDF
Cloud Security (CASB) for Slack
PDF
Tecnologie a supporto dei controlli di sicurezza fondamentali
PDF
2020-03-05 Secure IT day 2020 Abalon - comment protéger votre environnement ...
PDF
Microsoft Security - New Capabilities In Microsoft 365 E5 Plans
PDF
63 Requirements for CASB
PDF
Guide to CASB Use Cases
PDF
4192 sslvpn sb_0412
PDF
Qubole GDPR Security and Compliance Whitepaper
PDF
ISSA: Cloud data security
PDF
New Approaches to Security and Availability for Cloud Data
 
PDF
Data Con LA 2019 - Securing IoT Data with Pervasive Encryption by Eysha Shirr...
PPTX
The Cloud & I, The CISO challenges with Cloud Computing
PDF
Gartner Magic Quadrant for Secure Email Gateways 2014
PPTX
Cloud Access Security Brokers - CASB
PPTX
Cloud security, Cloud security Access broker, CSAB's 4 pillar, deployment mode
PDF
White Paper: Protecting Your Cloud
Data Security by AES Advanced Encryption Standard
Data Con LA 2019 - So You got Hacked, how Quickly Can your Company Recover? b...
Data loss prevention by using MRSH-v2 algorithm
CYBERSECURITY MESH - DIGITAL TRUST FRAMEWORK
Cloud Security (CASB) for Slack
Tecnologie a supporto dei controlli di sicurezza fondamentali
2020-03-05 Secure IT day 2020 Abalon - comment protéger votre environnement ...
Microsoft Security - New Capabilities In Microsoft 365 E5 Plans
63 Requirements for CASB
Guide to CASB Use Cases
4192 sslvpn sb_0412
Qubole GDPR Security and Compliance Whitepaper
ISSA: Cloud data security
New Approaches to Security and Availability for Cloud Data
 
Data Con LA 2019 - Securing IoT Data with Pervasive Encryption by Eysha Shirr...
The Cloud & I, The CISO challenges with Cloud Computing
Gartner Magic Quadrant for Secure Email Gateways 2014
Cloud Access Security Brokers - CASB
Cloud security, Cloud security Access broker, CSAB's 4 pillar, deployment mode
White Paper: Protecting Your Cloud
Ad

Similar to Cloud computing present (20)

PDF
Lecture27 cc-security2
PDF
Cloud Security
PDF
Cloud Security:Threats & Mitgations
PPTX
Cloud security and services
PPTX
Cloud Computing - The new buzz word
PPT
Cloud computing-security-issues
PPTX
cloudComputingSec_p3.pptx
PDF
Cloud Security - Emerging Facets and Frontiers
PPTX
Novel cloud computingsecurity issues
PPTX
Rightscale Webinar: Designing Private & Hybrid Clouds (Hosted by Citrix)
PPTX
Cloud security Presentation
PPTX
Rik Ferguson
PPT
Cloud Computing Security
PPTX
Cloud computingsec p3
PPT
4831586.ppt
PDF
Cloud Computing
PPT
Cloud Computing Security Issues
PPTX
Cloud computing and its security issues
PDF
Cloud Security - Made simple
PPT
security Issues of cloud computing
Lecture27 cc-security2
Cloud Security
Cloud Security:Threats & Mitgations
Cloud security and services
Cloud Computing - The new buzz word
Cloud computing-security-issues
cloudComputingSec_p3.pptx
Cloud Security - Emerging Facets and Frontiers
Novel cloud computingsecurity issues
Rightscale Webinar: Designing Private & Hybrid Clouds (Hosted by Citrix)
Cloud security Presentation
Rik Ferguson
Cloud Computing Security
Cloud computingsec p3
4831586.ppt
Cloud Computing
Cloud Computing Security Issues
Cloud computing and its security issues
Cloud Security - Made simple
security Issues of cloud computing
Ad

More from James Sutter (20)

PDF
Future of intelligent transportation CIO Roundtable 080214
PDF
Security in the News
PDF
Mobile Security
PPT
3-D Printing_feb_13_2014
PDF
Scrum Agile by David Mann
PPT
It Governance OC CIO Nov,2013
PDF
CIO evolution 10102013
PPT
OC CIO BYOD
PPTX
CIO RoundtableIot IOT
PDF
Technology business management_7.13
PDF
Oc cio roundtable mooney management imperatives for realizing value from clou...
PDF
Erp governance methodology and case studies v rjt
PDF
Controlling project costs
PDF
CIO Branding
PPT
Google apps CIO Peer Group presentation
PDF
CIO Roundtable 10-12
PDF
CIO presentation aug 2012
PDF
Mobile security v2
PDF
Peer group itsm presentation 6.12
PPT
CIO Value Issue
Future of intelligent transportation CIO Roundtable 080214
Security in the News
Mobile Security
3-D Printing_feb_13_2014
Scrum Agile by David Mann
It Governance OC CIO Nov,2013
CIO evolution 10102013
OC CIO BYOD
CIO RoundtableIot IOT
Technology business management_7.13
Oc cio roundtable mooney management imperatives for realizing value from clou...
Erp governance methodology and case studies v rjt
Controlling project costs
CIO Branding
Google apps CIO Peer Group presentation
CIO Roundtable 10-12
CIO presentation aug 2012
Mobile security v2
Peer group itsm presentation 6.12
CIO Value Issue

Recently uploaded (20)

PPTX
Week 4 Term 3 Study Techniques revisited.pptx
PDF
Abdominal Access Techniques with Prof. Dr. R K Mishra
PPTX
Cell Structure & Organelles in detailed.
PDF
VCE English Exam - Section C Student Revision Booklet
PPTX
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
PDF
Microbial disease of the cardiovascular and lymphatic systems
PPTX
human mycosis Human fungal infections are called human mycosis..pptx
PPTX
Institutional Correction lecture only . . .
PPTX
The Healthy Child – Unit II | Child Health Nursing I | B.Sc Nursing 5th Semester
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PPTX
Cell Types and Its function , kingdom of life
PDF
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
PDF
FourierSeries-QuestionsWithAnswers(Part-A).pdf
PPTX
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
PDF
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
PDF
O5-L3 Freight Transport Ops (International) V1.pdf
PDF
Origin of periodic table-Mendeleev’s Periodic-Modern Periodic table
PDF
Classroom Observation Tools for Teachers
PPTX
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
PDF
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
Week 4 Term 3 Study Techniques revisited.pptx
Abdominal Access Techniques with Prof. Dr. R K Mishra
Cell Structure & Organelles in detailed.
VCE English Exam - Section C Student Revision Booklet
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
Microbial disease of the cardiovascular and lymphatic systems
human mycosis Human fungal infections are called human mycosis..pptx
Institutional Correction lecture only . . .
The Healthy Child – Unit II | Child Health Nursing I | B.Sc Nursing 5th Semester
Final Presentation General Medicine 03-08-2024.pptx
Cell Types and Its function , kingdom of life
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
FourierSeries-QuestionsWithAnswers(Part-A).pdf
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
O5-L3 Freight Transport Ops (International) V1.pdf
Origin of periodic table-Mendeleev’s Periodic-Modern Periodic table
Classroom Observation Tools for Teachers
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student

Cloud computing present

  • 1. Cloud Computing What are you afraid of? Copyright 2011 The Word & Brown Companies
  • 2. Agenda Review the basics Copyright 2011 The Word & Brown Companies At the “Peak of inflated expectations ” -- Gartner’s Hype Cycle for Emerging Technologies #1 Strategic Technology for 2010 – Technologies You Can’t Afford to Ignore, Gartner So what is it with Cloud Computing? EMC shuts down online cloud storage service Iron Mountain Becomes Third Provider to Exit Public Cloud Storage Market Gartner predicts less than one-third of cloud investments will reach ROI by 2011 60% of IT decision-makers see cloud computing as helpful to the business By 2015 Cloud Computing will make up 17% of all IT expenditure worldwide U.S. Government Adopts “Cloud-first” Policy Fortune 1000 firms shun public cloud Feds Shy Away From Public Cloud, Call For Security
  • 3. Copyright 2011 The Word & Brown Companies At its most promising, Cloud Computing is about evolving IT to enable greater responsiveness to business needs while at the same time driving greater efficiencies. Successful Cloud computing requires a re-thinking of IT in a way that’s fundamentally different from how we’ve approached IT over the last 30 years. There are some reasons to be cautious and you can’t simply move existing applications to a cloud infrastructure without understanding the significant differences in the environments.
  • 4. Maturity of Key Elements has made Cloud Computing viable Copyright 2011 The Word & Brown Companies Virtualization Service Oriented Architecture (SOA) Broadband Networks Browser as a Platform Open Source Software Horizontal Scaling/“Fail in place computing”
  • 5. Copyright 2011 The Word & Brown Companies Reasons to Embrace Cloud Computing Costs – Low start up costs, low cost for sporadic use, moves Capex to Opex Consolidation Scalability, rapid provisioning/deprovisioning Simplification Reliability Ease of management Ubiquity of access/Device and location independence Disaster Recovery Improve Agility/Innovation Security & Compliance
  • 6. Copyright 2011 The Word & Brown Companies
  • 7. Copyright 2011 The Word & Brown Companies Optimizing Cost of Capacity SOURCE: The Open Group, May 2011
  • 8. Copyright 2011 The Word & Brown Companies Reason to be Wary of Cloud Computing Costs – especially the predictability of costs Access Performance & Reliability Management Vendor Lock in Ownership Security & Compliance 74% of respondents of a recent survey of senior management, IT operations and security professionals don’t believe the cost savings of cloud computing outweigh the security considerations for their organization* *SOURCE: nCircle Information Security & Compliance Trend Study, 2010
  • 9. Copyright 2011 The Word & Brown Companies Reason to be Wary of Cloud Computing SOURCE: The Open Group, May 2011 Response to the question: “What is your biggest concern with Cloud Computing?”
  • 10. Copyright 2011 The Word & Brown Companies Deployment Models Private Cloud Accessed by a single enterprise (On or Off-premise) Not a commercial offering Private Cloud Accessed by a single entity - on or off premise Operated solely for that entity Public Cloud Open to use by multiple organizations Location of data and resources “unknown” Hybrid Cloud “ Bursting” from Private to Public Split by tier Community Cloud Supports several organizations in a specific community with like interests. e.g. security, policy, compliance
  • 11. Copyright 2011 The Word & Brown Companies Five Key Characteristics On-demand Self-service Individuals can set themselves up with little of no help Ubiquitous Network Access Available through standard Internet-enabled devices Location Independent Resource Pooling Processing and storage demands are balanced across a common infrastructure, with no particular resource assigned to any individual user Rapid Elasticity Consumers can increase or decrease capacity at will Pay Per Use Consumers are charged fees based on their usage of a combination of computing power, bandwidth use and/or storage
  • 12. Copyright 2011 The Word & Brown Companies Delivery Models Target: Developers, Sys Admins Server, Storage, Network OS, Virtualization, File system Target: Developers Development tools Database, Middleware Infrastructure software Target: End users Collaborative applications ERM, CRM, Supply chain apps Ops and manufacturing apps Engineering applications Infrastructure as a Service Platform as a Service Software as a Service
  • 13. Delivery Models Copyright 2011 The Word & Brown Companies = Managed for You SaaS PaaS IaaS Applications Runtimes Database Operating System Virtualization Server Storage Networking
  • 14. Cloud Concepts & Terminology Copyright 2011 The Word & Brown Companies
  • 15. Concerns about Security Copyright 2011 The Word & Brown Companies Customer Admin Users Tenant Tenant External Web Site
  • 16. Threats 1. Brute force attacks. 2. Buffer overflows. 3. Canonicalization attacks. 4. Cookie manipulation. 5. Cookie replay attacks. 6. Credential theft. 7. Cross-Site Request Forgery (CSRF). 8. Cross-site scripting (XSS). 9. Connection pooling. 10. Data tampering. 11. Denial of service. 12. Dictionary attack. 13. Disclosure of sensitive/confidential data. 14. Elevation of privilege. 15. Encryption. 16. Information disclosure. 17. Luring attacks. 18. Man-in-the-middle attacks. 19. Network eavesdropping. 20. Open Redirects. 21. Password cracking. 22. Repudiation. 23. Session hijacking. 24. Session replay. 25. Session fixation. 26. Spoofing. 27. SQL injection. 28. Throttling Copyright 2011 The Word & Brown Companies . SOURCE: Securing Microsoft's Cloud Infrastructure
  • 17. Countermeasures 1. Assume all input is malicious. 2. Audit and log activity through all of the application tiers 3. Avoid storing secrets. 4. Avoid storing sensitive data in the Web space 5. Back up and regularly analyze log files. 6. Be able to disable accounts. 7. Be careful with canonicalization issues. 8. Catch exceptions. 9. Centralize your input and data validation. 10. Consider a centralized exception management framework. 11. Consider authorization granularity. 12. Consider identity flow. 13. Constrain input. 14. Constrain, reject, and sanitize your input. 15. Cycle your keys periodically. 16. Disable anonymous access and authenticate every principle. 17. Do not develop your own cryptography. 18. Do not leak information to the client. 19. Do not log private data such as passwords. 20. Do not pass sensitive data using the HTTP-GET protocol. 21. Do not rely on client-side validation. 22. Do not send passwords over the wire in plaintext. 23. Do not store credentials in plaintext. 24. Do not store database connections, passwords, or keys in plaintext 25. Do not store passwords in user stores. 26. Do not store secrets in code. 27. Do not store sensitive data in persistent cookies. 28. Do not trust fields that the client can manipulate. 29. Do not trust HTTP header information 30. Encrypt communication channels to protect authentication tokens 31. Encrypt sensitive cookie state 32. Encrypt the contents of the authentication cookies 33. Encrypt the data or secure the communication channel. 34. Enforce separation of privileges. 35. Enforce unique transactions. 36. Identify malicious behavior. Copyright 2011 The Word & Brown Companies SOURCE: Securing Microsoft's Cloud Infrastructure
  • 18. Countermeasures – con’t. 37. Keep unencrypted data close to the algorithm. 38. Know what good traffic looks like. 39. Limit session lifetime. 40. Log detailed error messages. 41. Log key events. 42. Maintain separate administration privileges. 43. Make sure that users do not bypass your checks. 44. Pass Forms authentication cookies only over HTTPS connections. 45. Protect authentication cookies. 46. Provide strong access controls on sensitive data stores. 47. Reject known bad input. 48. Require strong passwords . 49. Restrict user access to system-level resources. 50. Retrieve sensitive data on demand. 51. Sanitize input. 52. Secure access to log files. 53. Secure the communication channel for remote administration 54. Secure your configuration store. 55. Secure your encryption keys. 56. Separate public and restricted areas. 57. Store keys in a restricted location. 58. Support password expiration periods. 59. Use account lockout policies for end-user accounts. 60. Use application instrumentation to expose behavior that can be monitored: 61. Use authentication mechanisms that do not require clear text credentials to be passed over the network: 62. Use least privileged accounts. 63. Use least privileged process and service accounts. 64. Use multiple gatekeepers. 65. Use SSL to protect session authentication cookies. 66. Use strong authentication and authorization on administration interfaces. 67. Use structured exception handling. 68. Use the correct algorithm and correct key length. 69. Use tried and tested platform features. 70. Validate all values sent from the client. 71. Validate data for type, length, format, and range . Copyright 2011 The Word & Brown Companies SOURCE: Securing Microsoft's Cloud Infrastructure
  • 19. Security Models have to change for the Cloud Copyright 2011 The Word & Brown Companies
  • 20. Security is a shared responsibility Copyright 2011 The Word & Brown Companies On Premises In The Cloud Physical Network Host Application Data Physical Network Host Application Data Customer Responsibilities Cloud provider Responsibilities
  • 21. Security – on premise Copyright 2011 The Word & Brown Companies
  • 22. Security – in the Cloud Copyright 2011 The Word & Brown Companies
  • 23. Security – in the Cloud Copyright 2011 The Word & Brown Companies
  • 24. Security – in the Cloud Copyright 2011 The Word & Brown Companies Tenant Instance Tenant Instance Tenant Instance Tenant Instance Tenant Instance Tenant Instance Tenant Instance Network Guest Agent Guest Agent Guest Agent Guest Agent Guest Agent Guest Agent Guest Agent Fabric Controller Root VM Hypervisor Firewall Firewall Firewall Firewall Firewall Firewall VLAN Firewall Packet Filter Packet Filter Firewall Packet Filter Fabric Agent
  • 25. Cloud Security is a Paradigm Shift Copyright 2011 The Word & Brown Companies Much of the traditional infrastructure security moves to the platform and application layers Network Access Control Lists and Firewalls become host packet filters and virtual firewalls Reduction of attack surface, least privilege, user authentication and input sanitization are key concerns Platform and network level encryption play a role, but the developer has increased responsibility for application encryption design
  • 26. Copyright 2011 The Word & Brown Companies Concerns about Security Security Advantages of a Public Cloud Lives behind enterprise-class firewall Lives in very secure facility Thieves may not know where your data lives Your gear is not at risk from disgruntled employee You may gain security expertise from your vendor You vendor may have more rigorous practices around patching, updating and data center management You are not alone when defending against DDoS You are protected from hardware failures
  • 27. Copyright 2011 The Word & Brown Companies Concerns about Security Security Disadvantages of a Public Cloud Access can be granted from anywhere Your data must travel “in the wild” to the cloud You are dependent on responsiveness, whims & quality of vendor You often don’t know where your data resides or how it is comingled with other tenants Attacks on others can have an effect on you You have limited transparency regarding security controls Auditing can be difficult You may be subject to jurisdictional issues There is very little established case law Vendor could shut you down suddenly Cloud computing involves an inherent transfer of control, which creates issues around security and privacy.
  • 28. Copyright 2011 The Word & Brown Companies Concerns about Security Why a public cloud vendor might shut you down… Decides your customer mailing is spam Goes out of business Is sold off to your competitor Didn’t properly build in disaster recovery Didn’t properly plan for appropriate scaling One of its co-tenants is investigated by the government Sometimes, just that tenant's servers seized Sometimes, all servers on premises seized Because of resource pooling, any seizure could negatively affect you
  • 29. Copyright 2011 The Word & Brown Companies Organizations are moving forward Question: “ What best describes where Cloud Computing fits into your organization’s IT roadmap?” SOURCE: The Open Group, May 2011
  • 30. Copyright 2011 The Word & Brown Companies How does a cloud deployment change my risk profile? A cloud computing deployment means you are no longer in complete control of the environment, the data, or the people. A change in control creates a change in risk. Ultimately the data and its sensitivity level will dictate if a cloud model makes sense. What do I need to do to ensure my existing security policy accommodates the cloud model? A shift to a cloud paradigm is an opportunity to improve your overall security posture and your security policies. Ideally you can extend your existing security policies to accommodate this additional platform. Will a cloud deployment compromise my ability to meet regulatory mandates? Cloud deployments shift your risk profile and could affect your ability to meet various regulations. Some cloud applications give you strong reporting and are tailored to meet specific regulatory requirements, others are more generic and cannot or will not meet detailed compliance requirements. Cloud Security: Questions to Ask Before You Jump In
  • 31. What happens if a breach occurs? How are incidents handled? This is a critical component to your overall agreement with the cloud service provider. The cloud provider (as a service provider), and you as a company may have breach notification policies or regulations you must meet. You must ensure that a cloud provider can support your notification requirements should the need arise. How do I ensure only authorized employees, partners and customers can access data and applications? Identity and access management is an existing security challenge that is amplified by cloud deployments. How are my data and applications hosted, and what security technologies are in place? This information can directly affect an organization's ability to comply with certain regulations. Transparency is necessary for you to make informed decisions. Copyright 2011 The Word & Brown Companies Cloud Security: Questions to Ask Before You Jump In
  • 32. Expectations are high Copyright 2011 The Word & Brown Companies
  • 33. The Scale is amazing - Microsoft Copyright 2011 The Word & Brown Companies
  • 34. The Scale is amazing - Google Copyright 2011 The Word & Brown Companies Each Container has 1160 servers and power consumption that can reach 250 kilowatts
  • 35. Copyright 2011 The Word & Brown Companies Some lessons from Amazon's outage (or Microsoft’s or Google’s) Read your cloud provider’s SLA very carefully Amazingly, this almost four-day outage has not breached Amazon’s EC2 (Elastic Compute Cloud) SLA, which “guarantees 99.95% availability of the service within a Region over a trailing 365 period.” Since it has been the EBS (Elastic Block Storage) and RDS (Relational Database Services) rather than EC2 itself that failed the SLA has not been breached, legally speaking. Don’t take your provider’s assurances for granted Many of the affected customers were paying extra to host their instances in more than one Availability Zone (AZ) which are supposed to be physically separate and protect from virtually any failure. Unfortunately, this turned out to be a technical specification rather than a contractual guarantee. There are ways you can supplement a cloud provider’s resilience Decompose resources into independent pools, build in support for quick timeouts and retries, and have interfaces that allow multiple retries of failed requests. Can be difficult if all your experience is in designing tightly-coupled enterprise application stacks that assume a resilient local area network. Successful cloud apps are not your in house apps simply hosted in the cloud .
  • 36. Copyright 2011 The Word & Brown Companies Some lessons from Amazon's outage (or Microsoft’s or Google’s) Building in extra resilience comes at a cost Choices about the length of outage you can tolerate have cost consequences. Understanding the trade-offs helps you frame what to ask A good question to ask Cloud vendors — “Do you take down production infrastructure to test your failover?” (Amazon apparently didn’t and it didn’t work as expected) Amazon’s lack of transparency made recovery harder Several affected customers complained of the lack of useful information coming from Amazon during the outage - “Our people can’t read from the tea-leaves how to organize our systems for performance, scalability and most importantly disaster recovery. The difference between ‘reasonable’ SLAs and ‘five-9s’ is the difference between improvisation and the complete alignment of our respective operational processes …” Remember - an inherent transfer of control Most customers will still forgive Amazon its failings However badly they’ve been affected, providers have sung Amazon’s praises in recognition of how much it’s helped them run a powerful infrastructure at lower cost and effort. In many cases their businesses might not be able to exist at all without a similar infrastructure.
  • 37. Cloud computing represents virtualization supercharged by automation, and automation always threatens jobs—especially those of lower-skilled employees. Simply put, cloud computing will displace the jobs of those who perform routine operations tasks. Asking these folks what they think of public cloud computing is like asking a turkey what it thinks of Thanksgiving. How can the CIO justify sticking with an existing system when SaaS and infrastructure alternatives are (or at least appear to business to be) so much cheaper? IT organizations will come under pressure to meet the cost structures of the best-of-breed public providers. Failing to rethink the delivery of services—and the organization necessary to deliver them—poses a threat to the job tenure of even the most senior IT executives. Successful IT executives in the future will be those who recognize that their job is infrastructure management at market rates, not asset ownership. Copyright 2011 The Word & Brown Companies There may be a significant risk in not adopting a Public Cloud model
  • 38. Questions And Discussion Copyright 2011 The Word & Brown Companies
  • 39. Links Copyright 2011 The Word & Brown Companies