SlideShare a Scribd company logo
Cloud Security
Whatโ€™s so Funny About PaaS Love & Understanding?
About Us
ijaghmani@lixar.com
ca.linkedin.com/in/ismail-jaghmani-58a3858
Frank Boucher
Cloud Solution Architect
Microsoft Azure MVP
P-Seller Technical Solution
Professional
Ismail Jaghmani
Sr. Cloud Developer
fboucher@lixar.com
linkedin.com/in/fboucheros
frankysnotes.com
Agenda
l Quick Context of Security in the cloud
l General Best Practices
l Networking Services
l Security and Identity Services
l Management Tools
SECURITY IS A HOT TOPIC
Security is Shared Responsibility
Cloud ProviderCustomer
Application & Data
Identity & Access Management
Operating System, Network & firewall
configuration
Compute Storage Databases
Availability Zones Regions
Services
Cloud Infrastructure
Application and Data Security Best Practices
l Enforce multi-factor authentication
l Use role based access control
l Use hardware security modules
l Manage with Secure Workstations
l Enable data encryption
Network Services
AWS
Virtual Private Cloud
(VPC)
Azure
Virtual Network
Description
-Network isolation.
-Defined rules to satisfy your security needs.
-Filter and inspect the outbound and inbound traffic.
ExpressRouteDirect Connect
Establishes a dedicated, private
network connection from a location to
the cloud.
Identity Management
AWS
Identity & Access
Management
Azure AD/Role-based
access control
AzureDescription
Provides fine-grained access to
resources in could.
Multi-Factor
Authentication
Multi-Factor
Authentication
More than one method of
authentication.
Azure Active Directory
AWS IAM
Tools and Data protection
AWS
Encryption Encryption
Description
Client Side Encryption
Data in transit encryption
Storage encryption
VM encryption
Key Vault
Key management services
CloudHSM
Creates, controls, and protects
encryption keys. HSM provides
hardware-based key storage.
Inspector Security Center
Automatically assess Network,
VMs, OS and applications
configuration for vulnerabilities or
deviations from best practices.
Azure
Azure Security Center
AWS Inspector
Tools and Data protection
AWS
CloudTrail
CloudWatch
Description
Collect, track, store, analyze, and deliver
metrics and log files.
Trusted Advisor
Provides analysis of cloud resource
configuration and security in
compliance with the best practices.
Availability, Performance, Security
and cost.
Azure
Log Analytics
Advisor
Log Analytics
CloudWatch
AWS Advisor
Azure Advisor
References
โ— Common Vulnerabilities and Exposures
https://cve.mitre.org/index.html
โ— Center for Internet Security (CIS) Benchmarks
https://benchmarks.cisecurity.org
โ— Azure security best practices and patterns https://docs.microsoft.com/en-
us/azure/security/security-best-practices-and-patterns
โ— Microsoft Docs
https://docs.microsoft.com
Cloud security

More Related Content

PDF
Introduction to Microsoft Azure Cloud
PDF
Cloud Security: A New Perspective
PPTX
Cloud Security
PDF
Microsoft Azure Cloud Services
PPTX
AWS Cloud Security
PPT
Intro to Amazon S3
PPTX
Azure storage
PPTX
CASB: Securing your cloud applications
Introduction to Microsoft Azure Cloud
Cloud Security: A New Perspective
Cloud Security
Microsoft Azure Cloud Services
AWS Cloud Security
Intro to Amazon S3
Azure storage
CASB: Securing your cloud applications

What's hot (20)

PPTX
Cloud Security (Domain1- 5)
PPTX
SEIM-Microsoft Sentinel.pptx
PPTX
Cloud security and security architecture
PDF
Introduction to Azure
PPTX
Cloud security Presentation
ย 
PDF
Microsoft Defender and Azure Sentinel
PPTX
Chap 6 cloud security
PDF
Microsoft Azure Active Directory
PPTX
Identity and Access Management Introduction
PDF
Microsoft Zero Trust
PPTX
Microsoft Cloud Adoption Framework for Azure: Governance Conversation
PPTX
Introduction to Amazon S3
PPTX
Azure Identity and access management
PPTX
Cloud Security
PPTX
Azure Security and Management
PPTX
Cloud Security Architecture.pptx
PDF
Zero Trust Model Presentation
PPSX
Key Challenges In CLOUD COMPUTING
PDF
Aryaka Bringing SASE to Life with a Zero Trust WAN.pdf
PDF
CISSP Cheatsheet.pdf
Cloud Security (Domain1- 5)
SEIM-Microsoft Sentinel.pptx
Cloud security and security architecture
Introduction to Azure
Cloud security Presentation
ย 
Microsoft Defender and Azure Sentinel
Chap 6 cloud security
Microsoft Azure Active Directory
Identity and Access Management Introduction
Microsoft Zero Trust
Microsoft Cloud Adoption Framework for Azure: Governance Conversation
Introduction to Amazon S3
Azure Identity and access management
Cloud Security
Azure Security and Management
Cloud Security Architecture.pptx
Zero Trust Model Presentation
Key Challenges In CLOUD COMPUTING
Aryaka Bringing SASE to Life with a Zero Trust WAN.pdf
CISSP Cheatsheet.pdf
Ad

Viewers also liked (13)

PPTX
Azure Redis Cache - Cache on Steroids!
PPTX
Application Insights - Real time telemetry for your cross platform applications
PPTX
Connect the Impossible with Azure Logic App
PPTX
Application Insights - Campinas .NET - Marรงo/2017
PPTX
Load testing with Visual Studio and Azure - Andrew Siemer
PPTX
Performance testing with 100,000 concurrent users in AWS
PPTX
DevOps@Work 2017 - Application insights more control, more power
PPTX
Deep-Dive to Application Insights
PPTX
Microsoft Azure catch-up
PDF
Introduction to Performance testing
PPTX
An Introduction to Performance Testing
PPTX
Introduction to performance testing
PPT
Performance and load testing
Azure Redis Cache - Cache on Steroids!
Application Insights - Real time telemetry for your cross platform applications
Connect the Impossible with Azure Logic App
Application Insights - Campinas .NET - Marรงo/2017
Load testing with Visual Studio and Azure - Andrew Siemer
Performance testing with 100,000 concurrent users in AWS
DevOps@Work 2017 - Application insights more control, more power
Deep-Dive to Application Insights
Microsoft Azure catch-up
Introduction to Performance testing
An Introduction to Performance Testing
Introduction to performance testing
Performance and load testing
Ad

Similar to Cloud security (20)

PPTX
Practical Security for the Cloud
PPTX
Automating your AWS Security Operations
PDF
Top Cloud Infrastructure Practices And Strategies For Maximum Security.pdf
PPTX
Cloud Security By Dr. Anton Ravindran
ย 
DOCX
How to implement cloud computing security
PDF
Top 20 Cloud Security Professional Interview Questions and Answers
PDF
Ready to Ace Your Cloud Security Interview.
PDF
Top 20 Cloud Security Professional Interview Q&A.pdf
PPTX
A Throwaway Deck for Cloud Security Essentials 2.0 delivered at RSA 2016
PDF
Cloud security: Accelerating cloud adoption
PPTX
Cloud Security_ Unit 4
PPT
What Everyone Ought To Know About Cloud Security
PDF
The 3 Recommendations for Cloud Security
ย 
PDF
How We Protect Our Business in the Cloud (The Smart Way)
PDF
Cloud Security - Types, Common Threats & Tips To Mitigate.pdf
PDF
Cloud_security_v2_chpater_9_s_version.pdf
PPTX
Transforming cloud security into an advantage
PPTX
CSS17: Atlanta - Realities of Security in the Cloud
PDF
Azure 101: Shared responsibility in the Azure Cloud
PPT
Cloud computing security - Insights
Practical Security for the Cloud
Automating your AWS Security Operations
Top Cloud Infrastructure Practices And Strategies For Maximum Security.pdf
Cloud Security By Dr. Anton Ravindran
ย 
How to implement cloud computing security
Top 20 Cloud Security Professional Interview Questions and Answers
Ready to Ace Your Cloud Security Interview.
Top 20 Cloud Security Professional Interview Q&A.pdf
A Throwaway Deck for Cloud Security Essentials 2.0 delivered at RSA 2016
Cloud security: Accelerating cloud adoption
Cloud Security_ Unit 4
What Everyone Ought To Know About Cloud Security
The 3 Recommendations for Cloud Security
ย 
How We Protect Our Business in the Cloud (The Smart Way)
Cloud Security - Types, Common Threats & Tips To Mitigate.pdf
Cloud_security_v2_chpater_9_s_version.pdf
Transforming cloud security into an advantage
CSS17: Atlanta - Realities of Security in the Cloud
Azure 101: Shared responsibility in the Azure Cloud
Cloud computing security - Insights

Recently uploaded (20)

PPT
Teaching material agriculture food technology
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
CIFDAQ's Market Insight: SEC Turns Pro Crypto
ย 
PDF
Spectral efficient network and resource selection model in 5G networks
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
Encapsulation_ Review paper, used for researhc scholars
DOCX
The AUB Centre for AI in Media Proposal.docx
ย 
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
ย 
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Review of recent advances in non-invasive hemoglobin estimation
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
ย 
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
KodekX | Application Modernization Development
ย 
PDF
Empathic Computing: Creating Shared Understanding
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Teaching material agriculture food technology
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
CIFDAQ's Market Insight: SEC Turns Pro Crypto
ย 
Spectral efficient network and resource selection model in 5G networks
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Encapsulation_ Review paper, used for researhc scholars
The AUB Centre for AI in Media Proposal.docx
ย 
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
ย 
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Building Integrated photovoltaic BIPV_UPV.pdf
Review of recent advances in non-invasive hemoglobin estimation
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Dropbox Q2 2025 Financial Results & Investor Presentation
ย 
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
KodekX | Application Modernization Development
ย 
Empathic Computing: Creating Shared Understanding
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...

Cloud security

  • 1. Cloud Security Whatโ€™s so Funny About PaaS Love & Understanding?
  • 2. About Us ijaghmani@lixar.com ca.linkedin.com/in/ismail-jaghmani-58a3858 Frank Boucher Cloud Solution Architect Microsoft Azure MVP P-Seller Technical Solution Professional Ismail Jaghmani Sr. Cloud Developer fboucher@lixar.com linkedin.com/in/fboucheros frankysnotes.com
  • 3. Agenda l Quick Context of Security in the cloud l General Best Practices l Networking Services l Security and Identity Services l Management Tools
  • 4. SECURITY IS A HOT TOPIC
  • 5. Security is Shared Responsibility Cloud ProviderCustomer Application & Data Identity & Access Management Operating System, Network & firewall configuration Compute Storage Databases Availability Zones Regions Services Cloud Infrastructure
  • 6. Application and Data Security Best Practices l Enforce multi-factor authentication l Use role based access control l Use hardware security modules l Manage with Secure Workstations l Enable data encryption
  • 7. Network Services AWS Virtual Private Cloud (VPC) Azure Virtual Network Description -Network isolation. -Defined rules to satisfy your security needs. -Filter and inspect the outbound and inbound traffic. ExpressRouteDirect Connect Establishes a dedicated, private network connection from a location to the cloud.
  • 8. Identity Management AWS Identity & Access Management Azure AD/Role-based access control AzureDescription Provides fine-grained access to resources in could. Multi-Factor Authentication Multi-Factor Authentication More than one method of authentication.
  • 11. Tools and Data protection AWS Encryption Encryption Description Client Side Encryption Data in transit encryption Storage encryption VM encryption Key Vault Key management services CloudHSM Creates, controls, and protects encryption keys. HSM provides hardware-based key storage. Inspector Security Center Automatically assess Network, VMs, OS and applications configuration for vulnerabilities or deviations from best practices. Azure
  • 14. Tools and Data protection AWS CloudTrail CloudWatch Description Collect, track, store, analyze, and deliver metrics and log files. Trusted Advisor Provides analysis of cloud resource configuration and security in compliance with the best practices. Availability, Performance, Security and cost. Azure Log Analytics Advisor
  • 19. References โ— Common Vulnerabilities and Exposures https://cve.mitre.org/index.html โ— Center for Internet Security (CIS) Benchmarks https://benchmarks.cisecurity.org โ— Azure security best practices and patterns https://docs.microsoft.com/en- us/azure/security/security-best-practices-and-patterns โ— Microsoft Docs https://docs.microsoft.com

Editor's Notes

  • #4: We need to a Security image here
  • #6: Ismal