SlideShare a Scribd company logo
Cloud Computing Assessing the Security RisksJared Carstensen
AgendaWhat is the cloud?Why Cloud Computing?Decomposing the CloudUnderstanding ImplementationsTop Security RisksPrivileged User AccessRegulatory ComplianceData LocationData SegregationRecoveryInvestigationsLong Term ViabilityMyths and TruthsRoadmap to Success
Awards / Credentials
Sample of Clients
What is the Cloud?Cloud computing:Private Cloud:Virtual PrivateCloud:is Internet-based computing, whereby shared resources, software, and information are provided to computers and other devices on demand, like the electricity grid.utilisestechnologies of the public cloud but are operated solely for an organisation.  It could be managed by the organisation itself or by a third party on, or off site…..a cloud deployed solely for use of an organisation. This cloud utilisesstandardised technology, and processes of a service provider, which leverages shared resources with dedicated resource pools and tailored Service Model (determined by each provider).
Why Cloud Computing?We are in the midst of a Sea Change‖Collaboration and sharing on a scale never imaginedNEW ECONOMICSINCREASED PRODUCTIVITYREDUCED MANAGEMENTPay for what you use
Lower and predictable costs
Shift from CapEx to OpEx
Accelerate speed to value
No patching, maintenance
Faster deployment
Robust multi-layered security
Reliability and fault-tolerance
Latest software for users
Internet collaboration
Anywhere access
Instant self-provisioning Decomposing the Cloud3 Primary Models for Cloud Computing include:Software as a Services (SaaS)Platform as a Services (PaaS)Infrastructure as a Service (IaaS)
Understanding Implementations?Cloud Computing Service CategoriesOn PremisesInfrastructure as a Service (IaaS)Platform as a Service (PaaS)Software as a Service (SaaS)You manageApplicationsApplicationsApplicationsApplicationsDataDataDataDataYou manageRuntimeRuntimeRuntimeRuntimeManaged by vendorMiddlewareMiddlewareMiddlewareMiddlewareYou manageManaged by vendorO/SO/SO/SO/SVirtualizationVirtualizationVirtualizationVirtualizationManaged by vendorServersServersServersServersStorageStorageStorageStorageNetworkingNetworkingNetworkingNetworking

More Related Content

PDF
Mindtree distributed agile journey and guiding principles
PDF
Enterprise policy-management
PDF
Mindtree agile offering.
PDF
Cloud computing applications for e health
PPTX
4.5.cloud security
PDF
10 Tips for CIOs - Data Security in the Cloud
PDF
Cloud Computing in Healthcare IT
PDF
Optimize IT Infrastructure
Mindtree distributed agile journey and guiding principles
Enterprise policy-management
Mindtree agile offering.
Cloud computing applications for e health
4.5.cloud security
10 Tips for CIOs - Data Security in the Cloud
Cloud Computing in Healthcare IT
Optimize IT Infrastructure

What's hot (18)

PDF
Cloud Governance Framework - Required Cloud Sourcing Capabilities
PDF
CIS13: Security's New Normal: Is Cloud the Answer?
PDF
internal-cloud-audit-risk-guide
PDF
Cloud Computing Stats - Cloud in the Enterprise
PDF
Data-Centric Security for the Extended Enterprise
PDF
Cloud Computing Stats - Cloud for Healthcare
PDF
365 infographic-compliance
PDF
HIGH-IMPACT USE CASES POWERED BY NEXT-GENERATION NETWORK ANALYTICS
PDF
Forcepoint Dynamic Data Protection
PDF
A Question of Trust: How Service Providers Can Attract More Customers by Deli...
PDF
Keys to success and security in the cloud
PDF
Product Assessment and Consulting Offerings
PPT
Cutting To The Chase: Cloud From A Customers Perspective
PDF
Global Mandate to Secure Cloud Computing
PDF
Mike Palmer of Veritas: Debunking the myths of multi-cloud to achieve 360 Dat...
PDF
Scaling the Cloud - Cloud Security
PPTX
Best Practices for the Cloud
PDF
Understanding SASE
Cloud Governance Framework - Required Cloud Sourcing Capabilities
CIS13: Security's New Normal: Is Cloud the Answer?
internal-cloud-audit-risk-guide
Cloud Computing Stats - Cloud in the Enterprise
Data-Centric Security for the Extended Enterprise
Cloud Computing Stats - Cloud for Healthcare
365 infographic-compliance
HIGH-IMPACT USE CASES POWERED BY NEXT-GENERATION NETWORK ANALYTICS
Forcepoint Dynamic Data Protection
A Question of Trust: How Service Providers Can Attract More Customers by Deli...
Keys to success and security in the cloud
Product Assessment and Consulting Offerings
Cutting To The Chase: Cloud From A Customers Perspective
Global Mandate to Secure Cloud Computing
Mike Palmer of Veritas: Debunking the myths of multi-cloud to achieve 360 Dat...
Scaling the Cloud - Cloud Security
Best Practices for the Cloud
Understanding SASE
Ad

Viewers also liked (15)

PPT
Betty rogers presentation evaluation. 1ppt
PDF
Yakhouba
PPTX
HR Post Employment
PDF
IBM Global Technology Services - Resilience - The Silver Lining to Cloud Comp...
KEY
Cloudersize - A cardio, strength & conditioning program for a firmer, more to...
PPT
20131202 ucp mc_ts_s4
PDF
IFRS in India via IND AS
PPTX
Data Segregation
PDF
Stratus Fault-Tolerant Cloud Infrastructure Software for NFV using OpenStack
PPTX
Data Segregation for Remedyforce SaaS Help Desk and High-Speed Digital Servic...
PPTX
Cyber Threats & Cybersecurity - Are You Ready? - Jared Carstensen
KEY
Cloud Security Alliance - Cloud Summit Keynote
PDF
Oliver James Presentation Updated
PPTX
Securing the Cloud
PDF
LinkedIn SlideShare: Knowledge, Well-Presented
Betty rogers presentation evaluation. 1ppt
Yakhouba
HR Post Employment
IBM Global Technology Services - Resilience - The Silver Lining to Cloud Comp...
Cloudersize - A cardio, strength & conditioning program for a firmer, more to...
20131202 ucp mc_ts_s4
IFRS in India via IND AS
Data Segregation
Stratus Fault-Tolerant Cloud Infrastructure Software for NFV using OpenStack
Data Segregation for Remedyforce SaaS Help Desk and High-Speed Digital Servic...
Cyber Threats & Cybersecurity - Are You Ready? - Jared Carstensen
Cloud Security Alliance - Cloud Summit Keynote
Oliver James Presentation Updated
Securing the Cloud
LinkedIn SlideShare: Knowledge, Well-Presented
Ad

Similar to Cloud computing - Assessing the Security Risks - Jared Carstensen (20)

PDF
Cloud services and it security
PPT
Auditing in the Cloud
PDF
Cloud computing
PPTX
9 Things You Need to Know Before Moving to the Cloud
PDF
Whitepaper: Security of the Cloud
PDF
Security of the Cloud
PPTX
Cloud Security By Dr. Anton Ravindran
PPT
htcia-5-2015
PPTX
the_role_of_resilience_data_in_ensuring_cloud_security.pptx
PDF
Cloud Security, Standards and Applications
PDF
Law firms keep sensitive client data secure with CloudMask
PDF
SECURING THE CLOUD DATA LAKES
PDF
the_role_of_resilience_data_in_ensuring_cloud_security.pdf
PDF
10 Tips for CIOS Data Security in the Cloud
PDF
Global Security Certification for Governments
PPSX
The security of SAAS and private cloud
PDF
Securing sensitive data for the health care industry
PPT
Security with Cloud Computing
PPT
Security Problem With Cloud Computing
PPT
Security Problem With Cloud Computing
Cloud services and it security
Auditing in the Cloud
Cloud computing
9 Things You Need to Know Before Moving to the Cloud
Whitepaper: Security of the Cloud
Security of the Cloud
Cloud Security By Dr. Anton Ravindran
htcia-5-2015
the_role_of_resilience_data_in_ensuring_cloud_security.pptx
Cloud Security, Standards and Applications
Law firms keep sensitive client data secure with CloudMask
SECURING THE CLOUD DATA LAKES
the_role_of_resilience_data_in_ensuring_cloud_security.pdf
10 Tips for CIOS Data Security in the Cloud
Global Security Certification for Governments
The security of SAAS and private cloud
Securing sensitive data for the health care industry
Security with Cloud Computing
Security Problem With Cloud Computing
Security Problem With Cloud Computing

Recently uploaded (20)

PPT
Teaching material agriculture food technology
PDF
GDG Cloud Iasi [PUBLIC] Florian Blaga - Unveiling the Evolution of Cybersecur...
PDF
Advanced IT Governance
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
Advanced Soft Computing BINUS July 2025.pdf
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
PPTX
MYSQL Presentation for SQL database connectivity
PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
PPTX
Big Data Technologies - Introduction.pptx
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
GamePlan Trading System Review: Professional Trader's Honest Take
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Electronic commerce courselecture one. Pdf
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
PDF
Empathic Computing: Creating Shared Understanding
Teaching material agriculture food technology
GDG Cloud Iasi [PUBLIC] Florian Blaga - Unveiling the Evolution of Cybersecur...
Advanced IT Governance
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Advanced Soft Computing BINUS July 2025.pdf
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
MYSQL Presentation for SQL database connectivity
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
Big Data Technologies - Introduction.pptx
Diabetes mellitus diagnosis method based random forest with bat algorithm
“AI and Expert System Decision Support & Business Intelligence Systems”
Advanced methodologies resolving dimensionality complications for autism neur...
GamePlan Trading System Review: Professional Trader's Honest Take
Chapter 3 Spatial Domain Image Processing.pdf
Reach Out and Touch Someone: Haptics and Empathic Computing
Electronic commerce courselecture one. Pdf
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Unlocking AI with Model Context Protocol (MCP)
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
Empathic Computing: Creating Shared Understanding

Cloud computing - Assessing the Security Risks - Jared Carstensen

  • 1. Cloud Computing Assessing the Security RisksJared Carstensen
  • 2. AgendaWhat is the cloud?Why Cloud Computing?Decomposing the CloudUnderstanding ImplementationsTop Security RisksPrivileged User AccessRegulatory ComplianceData LocationData SegregationRecoveryInvestigationsLong Term ViabilityMyths and TruthsRoadmap to Success
  • 5. What is the Cloud?Cloud computing:Private Cloud:Virtual PrivateCloud:is Internet-based computing, whereby shared resources, software, and information are provided to computers and other devices on demand, like the electricity grid.utilisestechnologies of the public cloud but are operated solely for an organisation. It could be managed by the organisation itself or by a third party on, or off site…..a cloud deployed solely for use of an organisation. This cloud utilisesstandardised technology, and processes of a service provider, which leverages shared resources with dedicated resource pools and tailored Service Model (determined by each provider).
  • 6. Why Cloud Computing?We are in the midst of a Sea Change‖Collaboration and sharing on a scale never imaginedNEW ECONOMICSINCREASED PRODUCTIVITYREDUCED MANAGEMENTPay for what you use
  • 17. Instant self-provisioning Decomposing the Cloud3 Primary Models for Cloud Computing include:Software as a Services (SaaS)Platform as a Services (PaaS)Infrastructure as a Service (IaaS)
  • 18. Understanding Implementations?Cloud Computing Service CategoriesOn PremisesInfrastructure as a Service (IaaS)Platform as a Service (PaaS)Software as a Service (SaaS)You manageApplicationsApplicationsApplicationsApplicationsDataDataDataDataYou manageRuntimeRuntimeRuntimeRuntimeManaged by vendorMiddlewareMiddlewareMiddlewareMiddlewareYou manageManaged by vendorO/SO/SO/SO/SVirtualizationVirtualizationVirtualizationVirtualizationManaged by vendorServersServersServersServersStorageStorageStorageStorageNetworkingNetworkingNetworkingNetworking
  • 19. Top Security RisksPrivileged User AccessSensitive Data processed outside the organisation / enterprise brings with it an inherent level risk, as the outsourced services tend to bypass the “physical, logical and personnel controls”.Know your provider! Get as much information as you can about the people who will manage your data! Best practice – what standards do they follow or are they certified to?How often are they assessed and controls tested and verified?You wouldn’t give someone all your data without asking what they are going to do with it would you?
  • 20. Regulatory ComplianceIt remains YOUR responsibility!Customers are ultimately responsible for the security and integrity of the data they collect, even when held by a service provider. You cannot “surrender or transfer” your responsibilities under the Data Protection Act (Irish and UK). If you collect the information, you need to ensure the information is held in accordance with the 8 key principles of the Data Protection Act.International Data Transfer
  • 21. Data LocationWhere is It? What laws is it governed by?When organisations use the cloud – most probably don’t even know where their data is held or hosted?What country is it in?What laws govern it?Who has access to it?“smaller cloud providers are not carrying cyber insurance, and have no plans to do so until the larger customers push back”-Hartford Financial Services Group (New York)
  • 22. Data SegregationData SegregationIn the vast majority of cases, data in the cloud is stored and hosted in a shared environment alongside data from other customers.How is this controlled?What accountability is there?How is CIA enforced?What happens in the case of an investigation?Can I get my data back if I need it?
  • 23. Data RecoveryDisaster Recovery / Business ContinuityData Backup and replication are NOT a given when utilising cloud computing. There is often little to no continuity around data backup and replication in standard agreements. Most of these agreements tend to ensure availability around the service provided by the provider and not the contents or data.Always check to ensure your provider can tell you what will happen to your data in the event of a disaster!Service Level Agreements should be thoroughly checked and reviewed to ensure they align with the business requirements before proceeding.
  • 24. Investigations & SupportIllegal / Inappropriate activityThe investigation of inappropriate or illegal activities may be impossible in cloud computing for a number of reasons. What technology / systems are being utilised by the provider?Is there an intelligent system being used to detect anomalies or attacks?What processes / procedures are in place to ensure any breaches can be detected?Will your provider notify you of any breaches (most don’t)?What happens if my information is taken as part of an investigation?
  • 25. Long Term ViabilityHow viable is my provider long term?In an ideal world, your cloud computing provider will never go broke, get acquired or swallowed up by a larger company.Recent stories:SAP acquire Coghead (Cloud Computing)HP acquires ArcSight (from RSA)IBM acquires CastIron (Cloud Computing)Dell acquires Perot Systems“The most mature cloud services are only 3 years old”
  • 27. Roadmap to SuccessKeys to successEnsure your Cloud is future proofEnsure you have a detailed and realistic plan which is scalable
  • 28. If your organisation is fast paced, ensure your provider is tooKnow your organisation and its requirementsClearly define your cloud users, admins and roles upfront
  • 29. No plans stay the same - make sure you are flexible and be realisticPlan your services and ensure you have support (both internally and externally)Ensure you “remove” redundant services effectively (unless for continuity)Evaluate your internal processes before and afterDo current processes make sense? Can these be improved on? If so, how?
  • 30. Why are we moving? Know the benefits and the business case before movingJared Carstensenjared@teaminfosec.comhttp://www.TeamInfoSec.comTel: +353 1 813 5551Thank You