SlideShare a Scribd company logo
VCU Cybersecurity FairSecurity in the CloudPresented By:  Bryan Miller
Speaker IntroductionWhat is the “Cloud”SaaS, PaaS, IaaSPublic, Private and Hybrid CloudsVendor OfferingsSecurity IssuesWrap-Up10/4/2011Security in the Cloud1Agenda
B.S. Information Systems – VCUM.S. Computer Science – VCUPresident, Syrinx Technologies, 2007Member of ISSA, HIMSS, InfraGard, ILTAAdjunct Faculty Member in Information Systems and Computer Science @ VCU, FTEMS lecturerCISSP, former Cisco CCIE in R/SPublished authorOver 25 years in the industry10/4/2011Security in the Cloud2Speaker Introduction
Convenient, on-demand network access to a shared pool of configurable resources: NetworksServersStorageApplicationsServices Rapid and minimal management effort or service provider interaction (based on NIST)10/4/2011Security in the Cloud3What is the “Cloud”?
NIST SP 800-145 definition:"Cloud computing is a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction. This cloud model promotes availability and is composed of five essential characteristics, three service models, and four deployment models.”10/4/2011Security in the Cloud4The NIST Standard for Cloud Computing
IDC – 2008Security was the factor most likely to discourage the use of cloud computing?72% of small (<100 employees) businesses63% of mid-sized (100-199 employees) businessesIDC – 201150% of small businesses47% of mid-sized businesses10/4/2011Security in the Cloud5First, Some Statistics
By 2014, the conservative estimate is that the “cloud business” will be approximately $100 billion dollars.By 2012, approximately 20% of businesses will not own any IT resources.10/4/2011Security in the Cloud6
10/4/2011Security in the Cloud7
10/4/2011Security in the Cloud8
Applications delivered over the webVendor handles software updates and patchesApplication Programming Interfaces (APIs) integration among S/WExamples
Salesforce.com
Office 36510/4/2011Security in the Cloud9Software as a Service (SaaS)
Architectural tools to build systemsPlatform managed and monitoredWeb-based user interface toolsExamples
Google Apps Engine
Microsoft Azure
Force.com10/4/2011Security in the Cloud10Platform as a Service (PaaS)
Outsource storage, hardware, serversTypically charged on a per-use basisHardware can be multi-tenant or dedicatedExamples
Amazon Web Services (AWS)
OpenStack
Dell10/4/2011Security in the Cloud11Infrastructure as a Service (IaaS)
PublicShared resources, usually multi-tenantOff-premisePrivateResources dedicated to clientOn-premise or off-premiseHybridCombination of on-premise and cloud-based servicesGrowing in popularity as companies slowly transition applications10/4/2011Security in the Cloud12Public vs. Private vs. Hybrid Cloud Models
Amazon Web Services EC2 - IaaSData centers (Regions)VirginiaNorthern CaliforniaIrelandSingaporeTokyoWithin each region, services are divided into Availability ZonesAWS GovCloud – Accessible by US only, allows government agencies to store data Currently used by NASA10/4/2011Security in the Cloud13Vendor Offerings

More Related Content

PPTX
Security In an IoT World
PPTX
Infrastructure Auditing
PPTX
PCI Compliance - What does it mean to me?
PDF
Chris Swan's presentation from the London Tech Entrepreneurs' Meetup
PDF
CABA Whitepaper - Cybersecurity in Smart Buildings
PDF
IT Security Trends 2013
PDF
Building the Internet of Everything
PDF
Scaling IoT Security
Security In an IoT World
Infrastructure Auditing
PCI Compliance - What does it mean to me?
Chris Swan's presentation from the London Tech Entrepreneurs' Meetup
CABA Whitepaper - Cybersecurity in Smart Buildings
IT Security Trends 2013
Building the Internet of Everything
Scaling IoT Security

What's hot (20)

PDF
Trust in the mobile internet of things
PDF
IoT in industry
PDF
IoT ecosystem
PDF
Understanding IoT
PPTX
Xylos Clients Day - Public cloud and security go hand in hand, if you approac...
PDF
Securing the internet of things: The conversation you need to have with your CEO
PDF
Countering Cybersecurity Risk in Today's IoT World
PDF
Odoo iot box integration
PDF
An Internet of Things Reference Architecture
PPTX
Open source IoT
PDF
Delve Labs - Upcoming Security Challenges for the Internet of Things
PDF
Secure your Future with IoT Security Testing | Application Security
PDF
IBM Xforce Q4 2014
PDF
Watson IoT @Ryerson University - IEEE Chapter
PPSX
Internet of things - The Present & The Future
PDF
Technology Trends & The Impact for Software Industry
PDF
INFORMATION SECURITY IN CLOUD COMPUTING
PDF
ICS_WhitePaper_Darktrace
PDF
Architecting IoT by Mathew - Alcatel Lucent @ MIMOS IoT TWG Day1
PDF
Reinventing Cybersecurity in the Internet of Things
Trust in the mobile internet of things
IoT in industry
IoT ecosystem
Understanding IoT
Xylos Clients Day - Public cloud and security go hand in hand, if you approac...
Securing the internet of things: The conversation you need to have with your CEO
Countering Cybersecurity Risk in Today's IoT World
Odoo iot box integration
An Internet of Things Reference Architecture
Open source IoT
Delve Labs - Upcoming Security Challenges for the Internet of Things
Secure your Future with IoT Security Testing | Application Security
IBM Xforce Q4 2014
Watson IoT @Ryerson University - IEEE Chapter
Internet of things - The Present & The Future
Technology Trends & The Impact for Software Industry
INFORMATION SECURITY IN CLOUD COMPUTING
ICS_WhitePaper_Darktrace
Architecting IoT by Mathew - Alcatel Lucent @ MIMOS IoT TWG Day1
Reinventing Cybersecurity in the Internet of Things
Ad

Viewers also liked (20)

PDF
Fighting The Top 7 Threats to Cloud Cybersecurity
PPTX
Cloud Reference Model
PPTX
NIST Cloud Computing Reference Architecture
PDF
Cloud computing reference architecture from nist and ibm
PDF
Enterprise reference architecture v1.2
PDF
Patterns for Cloud Computing
PPTX
Trends in Cybersecurity
PPTX
Bahasan 1 lingkup_alat_media_pendidikan
PDF
Mind the Byte
PDF
Cybersecurity and Information Assurance - Cloud Computing
PPTX
Cloud security innovation - Cloud Security Alliance East Europe Congress 2013
PDF
Enterprise reference architecture v1.1.ppt
PPTX
Cloud security what to expect (introduction to cloud security)
PDF
ACI's Global Encryption, Cloud & Cybersecurity Controls
PPTX
Progress towards security in the Cloud-Héctor Sánchez, Microsoft
PPTX
Cloud Computing Architecture
PDF
Enterprise Architecture Governance for an Enterprise Transformation Journey: ...
PPTX
Trends in recent technology
PDF
Protecting Yourself from the Heartbleed Bug
PDF
Cloud Computing & Cybersecurity
Fighting The Top 7 Threats to Cloud Cybersecurity
Cloud Reference Model
NIST Cloud Computing Reference Architecture
Cloud computing reference architecture from nist and ibm
Enterprise reference architecture v1.2
Patterns for Cloud Computing
Trends in Cybersecurity
Bahasan 1 lingkup_alat_media_pendidikan
Mind the Byte
Cybersecurity and Information Assurance - Cloud Computing
Cloud security innovation - Cloud Security Alliance East Europe Congress 2013
Enterprise reference architecture v1.1.ppt
Cloud security what to expect (introduction to cloud security)
ACI's Global Encryption, Cloud & Cybersecurity Controls
Progress towards security in the Cloud-Héctor Sánchez, Microsoft
Cloud Computing Architecture
Enterprise Architecture Governance for an Enterprise Transformation Journey: ...
Trends in recent technology
Protecting Yourself from the Heartbleed Bug
Cloud Computing & Cybersecurity
Ad

Similar to Cloud Computing Security (20)

PDF
10 security concerns cloud computing
PDF
Cloud computing: identifying and managing legal risks
PPT
Radu crahmaliuc 23feb2012
PPT
Cloud Computing & Security Concerns
PDF
Cloud Computing
PPT
Cloud computing
PDF
Dr. Michael Valivullah, NASS/USDA - Cloud Computing
PPTX
Slides 530 a2
PDF
Cloud Computing Contracts and Services: What's Really Happening Out There? T...
PPT
Intro To Cloud Computing
PPTX
Greg Dixon - 2011 ScanSource POS & Barcoding Partner Conference
PPTX
Cloud computing jayanth
PPTX
Basics of cloud Computing and various concepts.pptx
PPTX
Cloud Computing
PDF
MISA Cloud workshop - Cloud 101
PPTX
Executive Briefing: Strategic Issues Surrounding Cloud Services
PDF
Cloud Computing 101 Workshop Sample
PDF
The Complexities of Cloud Computing - The Rules are New, But is the Game
PPT
Cloud computing
PDF
Taiye Lambo - Auditing the cloud
10 security concerns cloud computing
Cloud computing: identifying and managing legal risks
Radu crahmaliuc 23feb2012
Cloud Computing & Security Concerns
Cloud Computing
Cloud computing
Dr. Michael Valivullah, NASS/USDA - Cloud Computing
Slides 530 a2
Cloud Computing Contracts and Services: What's Really Happening Out There? T...
Intro To Cloud Computing
Greg Dixon - 2011 ScanSource POS & Barcoding Partner Conference
Cloud computing jayanth
Basics of cloud Computing and various concepts.pptx
Cloud Computing
MISA Cloud workshop - Cloud 101
Executive Briefing: Strategic Issues Surrounding Cloud Services
Cloud Computing 101 Workshop Sample
The Complexities of Cloud Computing - The Rules are New, But is the Game
Cloud computing
Taiye Lambo - Auditing the cloud

More from syrinxtech (7)

PPTX
Low Hanging Fruit from Penetration Testing
PPTX
Virtual CSO
PPTX
Remote Access Security
PPTX
Virtualization Security
PPTX
Focus Your Business
PPTX
Penetration Testing as an auditing tool
PPTX
Web Database Server Best Practices
Low Hanging Fruit from Penetration Testing
Virtual CSO
Remote Access Security
Virtualization Security
Focus Your Business
Penetration Testing as an auditing tool
Web Database Server Best Practices

Cloud Computing Security

  • 1. VCU Cybersecurity FairSecurity in the CloudPresented By: Bryan Miller
  • 2. Speaker IntroductionWhat is the “Cloud”SaaS, PaaS, IaaSPublic, Private and Hybrid CloudsVendor OfferingsSecurity IssuesWrap-Up10/4/2011Security in the Cloud1Agenda
  • 3. B.S. Information Systems – VCUM.S. Computer Science – VCUPresident, Syrinx Technologies, 2007Member of ISSA, HIMSS, InfraGard, ILTAAdjunct Faculty Member in Information Systems and Computer Science @ VCU, FTEMS lecturerCISSP, former Cisco CCIE in R/SPublished authorOver 25 years in the industry10/4/2011Security in the Cloud2Speaker Introduction
  • 4. Convenient, on-demand network access to a shared pool of configurable resources: NetworksServersStorageApplicationsServices Rapid and minimal management effort or service provider interaction (based on NIST)10/4/2011Security in the Cloud3What is the “Cloud”?
  • 5. NIST SP 800-145 definition:"Cloud computing is a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction. This cloud model promotes availability and is composed of five essential characteristics, three service models, and four deployment models.”10/4/2011Security in the Cloud4The NIST Standard for Cloud Computing
  • 6. IDC – 2008Security was the factor most likely to discourage the use of cloud computing?72% of small (<100 employees) businesses63% of mid-sized (100-199 employees) businessesIDC – 201150% of small businesses47% of mid-sized businesses10/4/2011Security in the Cloud5First, Some Statistics
  • 7. By 2014, the conservative estimate is that the “cloud business” will be approximately $100 billion dollars.By 2012, approximately 20% of businesses will not own any IT resources.10/4/2011Security in the Cloud6
  • 10. Applications delivered over the webVendor handles software updates and patchesApplication Programming Interfaces (APIs) integration among S/WExamples
  • 12. Office 36510/4/2011Security in the Cloud9Software as a Service (SaaS)
  • 13. Architectural tools to build systemsPlatform managed and monitoredWeb-based user interface toolsExamples
  • 16. Force.com10/4/2011Security in the Cloud10Platform as a Service (PaaS)
  • 17. Outsource storage, hardware, serversTypically charged on a per-use basisHardware can be multi-tenant or dedicatedExamples
  • 20. Dell10/4/2011Security in the Cloud11Infrastructure as a Service (IaaS)
  • 21. PublicShared resources, usually multi-tenantOff-premisePrivateResources dedicated to clientOn-premise or off-premiseHybridCombination of on-premise and cloud-based servicesGrowing in popularity as companies slowly transition applications10/4/2011Security in the Cloud12Public vs. Private vs. Hybrid Cloud Models
  • 22. Amazon Web Services EC2 - IaaSData centers (Regions)VirginiaNorthern CaliforniaIrelandSingaporeTokyoWithin each region, services are divided into Availability ZonesAWS GovCloud – Accessible by US only, allows government agencies to store data Currently used by NASA10/4/2011Security in the Cloud13Vendor Offerings
  • 23. Microsoft Azure – PaaSWindows Azure – OS providing scalable compute and storage facilitiesWindows SQL Azure – Cloud-based, scalable version of SQL ServerOpenStack - IaaSOpen source softwareOver 100 partner companiesRackspaceDellCitrixCisco10/4/2011Security in the Cloud14
  • 24. Dell – IaaSBuilt on VMware technology (vCloud family of products)Adding support for Azure and OpenStack3 models:Pay as you goReservedDedicatedApple iCloud - SaaSStores music, photos, applications, calendars, documents5 GB of free storage10/4/2011Security in the Cloud15
  • 25. Take into account the following:Response timesData corruptionService degradation/outageData breachBackup/Restore issuesWhat happens if the company closes or is soldRegulatory issuesHIPAA – do you have a BA agreement in place?PCI – are you sure your provider is compliant?10/4/2011Security in the Cloud16What about SLAs?
  • 26. Bloomberg News reported that hackers used AWS’s EC2 to launch an attack against Sony’s PlayStation Network.The attack reportedly compromised the personal accounts of more than 100 million Sony customers.Prices for EC2 range from 3 cents to $2.48 an hour for users on the East coast of the U.S. Dual GPU setups are currently priced at $2.10/hr.Network World magazine reported that Exploits as a Service (EaaS) is becoming a profitable business.10/4/2011Security in the Cloud17Security Issues
  • 27. Definition: The point at which cloud computing causes a catastrophic failure.Intellectual property is the lifeblood of an organization.IP can get lost in the shuffle of VM sprawl, data sprawl, technology sprawl or the speed at which business is performed.How can things go wrong?A salesperson mails himself a report to Gmail for home access.A customer service team uses Dropbox1 to transfer client files.A PM is frustrated by IT policies and stands up a free server in the Amazon EC2 cloud1 June 2011: Passwords optional for 4 hours, approximately 100 accounts were affected10/4/2011Security in the Cloud18Cloudpocalypse
  • 28. Amazon EC2 OutagesJuly, 2008Affected multiple Availability ZonesAffected US and EUApril, 2011Affected Reddit, Foursquare, QuoraElastic Book Store went offline (provides mountable disk volumes to EC2)3 days of outage for some usersWhy? During maintenance the data traffic was moved to a secondary, low-capacity network instead of the proper backup networksAugust, 2011Why: Lightning strike in Dublin, IrelandKnocked European cloud services offline for 2 daysAffected Netflix, Quora, Foursquare10/4/2011Security in the Cloud19When the Cloud Dissipates
  • 29. Gmail Outages2008:July 16 – “long outage”August 6 – up to 15 hoursAugust 11 – 2 hoursAugust 15 – up to 24 hoursOctober 16 – 30 hours2009:February 24 – 2 hoursSeptember 1 – 2 hours2011:February 27 – several hoursAugust 8 – several hours10/4/2011Security in the Cloud20
  • 30. Decide if the cloud is appropriate for the given business modelChoose the vendor and precisely define the SLATest thoroughly before moving into productionMigrate slowly and carefully watch the metricsMake sure the users/clients are happyRoutinely test the backup and restore processDon’t forget about DR and BCP10/4/2011Security in the Cloud21Wrap-Up