SlideShare a Scribd company logo
5
Most read
6
Most read
7
Most read
Security architecture and Cloud
computing, are these mutually
              exclusive?
 (Introduction to Cloud Security Guidance)
Agenda

   Cloud risk assessment x compared to traditional risk
    assessments
   Cloud security architectures x compared to security
    architectures
   CSA domains




                     Copyright © 2012 Cloud Security Alliance   https://cloudsecurityalliance.org.uk
Cloud risk assessment

                      Identify                                                            Context
                       assets                                                          establishment




Map the data                               Evaluate
   flows                                    assets
                                                                          Risk                                      Risk
                                                                      communication                              assessment




          Evaluate
                                 Map to Cloud
           Cloud
                                 deployments
         models and                                                                    Risk treatment
                                   models
          Providers




                                           Copyright © 2012 Cloud Security Alliance   https://cloudsecurityalliance.org.uk
Cloud model
Broad network   Rapid elasticity                 Measured                 On-demand
   access                                         service                  service

                           Resource pooling




Software as a            Platform as a                            Infrastructure
Service (SaaS)          Service (SaaS)                             as a Service
                                                                      (SaaS)


Publi            Private                      Hybrid                  Community
 c
                       Copyright © 2012 Cloud Security Alliance    https://cloudsecurityalliance.org.uk
Cloud computing deployment
    models
              Infrastructure    Infrastructure                     Infrastructure             Accessible and
               managed by         owned by                             located                 consumed by


                Third party          Third party
Public                                                                Off-premise                   Untrusted
                 provider             provider


                Organisation          Organisation                        On-premise
Private/  o
                                                                                                      Trusted
Community r       3rd party               3rdparty
                                                                          Off-Premise
                   provider               provider

          Both Organisation    Both Organisation
                                                                 Both On-Premise                    Trusted &
Hybrid      & Third party        & Third party
                                                                  & Off-Premise                     Untrusted
              provider             provider



                               Copyright © 2012 Cloud Security Alliance        https://cloudsecurityalliance.org.uk
Cloud model maps to Security model
  Cloud model


                                                                                   GRC
                                                                          Business continuity
                                                                                  SIEM
                                                                             Data security




                                                       Identity, Access
                        Direct map




                                                                                                           Cryptography
                                                                           Application sec.
                                                                             Host security
                                                                           Network security
                                                                           Physical security




                Copyright © 2012 Cloud Security Alliance                     https://cloudsecurityalliance.org.uk
Responsibilities for areas in security
model compared to delivery models
       Provider responsible                                       Customer responsible
                                                                       GRC
                                                      Business continuity
                                           SIEM
                                 Identity, Access
                                   Cryptography
                                                            Data security
                                       Application sec.
                  Host security
          Network security
        Physical security
IaaS         PaaS             SaaS                      IaaS                 PaaS                     SaaS
                            Copyright © 2012 Cloud Security Alliance         https://cloudsecurityalliance.org.uk
Cloud Security Domains
              Governance                                                    Operational
   Governance and Enterprise Risk                         Traditional Security, Business
    Management                                              Continuity and Disaster Recovery

   Legal Issues: Contracts and Electronic                 Data Center Operations
    Discovery
                                                           Incident Response, Notification and
   Compliance and Audit                                    Remediation

   Information Management and Data                        Application Security
    Security
                                                           Encryption and Key Management
   Portability and Interoperability
                                                           Identity and Access Management

                                                           Virtualization

                                                           Security as a Service

                                 Copyright © 2012 Cloud Security Alliance      https://cloudsecurityalliance.org.uk
Cloud Security Alliance supports number
of projects related to cloud




                           Get involved at
               https://cloudsecurityalliance.org/resea
                                 rch/https://cloudsecurityalliance.org.uk
              Copyright © 2012 Cloud Security Alliance
How to manage cloud security
•   Have a cloud security standard
    •   What to do on an Enterprise level
    •   Before your Cloud project
    •   During your Cloud project
                                                                   How to drive out the
    •   BAU                                                        'seven deadly sins' of
                                                                   cloud computing - new
                                                                   Information Security
    •   Exit from the Cloud provider                               Forum report


•   Risks cannot be outsourced
•   Manage lock-in and exit up-front – especially in SaaS
                       Copyright © 2012 Cloud Security Alliance   https://cloudsecurityalliance.org.uk
Contact

Help us secure cloud computing – Get involved
• http://cloudsecurityalliance.org.uk
• info@cloudsecurityalliance.org.uk
• LinkedIn: http://www.linkedin.com/groups/Cloud-
 Security-Alliance-UK-Chapter-3745837
• Twitter: @CSAUKResearch


                   Copyright © 2012 Cloud Security Alliance   https://cloudsecurityalliance.org.uk
Thank you!



        www.cloudsecurityalliance.org

More Related Content

PPTX
Cloud security Presentation
PDF
Cloud Security: A New Perspective
PPTX
Cloud Security
PDF
Cyber Security and Cloud Computing
PDF
Zero Trust Model Presentation
PPTX
Cloud Security Architecture.pptx
PDF
NIST cybersecurity framework
PDF
Data center Building & General Specification
Cloud security Presentation
Cloud Security: A New Perspective
Cloud Security
Cyber Security and Cloud Computing
Zero Trust Model Presentation
Cloud Security Architecture.pptx
NIST cybersecurity framework
Data center Building & General Specification

What's hot (20)

PDF
Cloud security
PPTX
Cloud computing and Cloud security fundamentals
PPT
Cloud security
PPTX
Cloud security ppt
PPTX
PPTX
Cloud security
PPTX
Cloud Computing Security
PPTX
Cloud Security
PPT
Cloud deployment models
PPT
Cloud computing
PPTX
Cloud computing and Cloud Enabling Technologies
PDF
Microsoft Zero Trust
PPTX
Endpoint Protection
PPTX
Top 10 cloud service providers
PDF
Cloud Security, Standards and Applications
PPT
Security Issues of Cloud Computing
PPTX
Cloud computing presentation
PPTX
CLOUD NATIVE SECURITY
PPSX
Cloud computing
Cloud security
Cloud computing and Cloud security fundamentals
Cloud security
Cloud security ppt
Cloud security
Cloud Computing Security
Cloud Security
Cloud deployment models
Cloud computing
Cloud computing and Cloud Enabling Technologies
Microsoft Zero Trust
Endpoint Protection
Top 10 cloud service providers
Cloud Security, Standards and Applications
Security Issues of Cloud Computing
Cloud computing presentation
CLOUD NATIVE SECURITY
Cloud computing
Ad

Similar to Cloud security and security architecture (20)

PPTX
2012 10 cloud security architecture
PDF
Integrated Cloud Framework: Security, Governance, Compliance, Content Applica...
PDF
Resarch paper i cloud computing
PDF
null Bangalore meet - Cloud Computing and Security
PPTX
What customers want the cloud to be - Jason Waxman GM at Intel, Cloud Slam 20...
PPTX
Lss implementing cyber security in the cloud, and from the cloud-feb14
PPTX
Smart, Data-Centric Security for the Post-PC Era
PDF
Cloud security ely kahn
PDF
Cloud Security - Made simple
PPTX
Enterprise Security in Cloud
PPTX
Enterprise Security in Hybrid Cloud ISACA-SV 2012
PDF
Security of,for & by cloud
PDF
Cisco tec chris young - security intelligence operations
PPT
Cloud computing
PDF
Deepsecurity & VDI beveiliging, maximale beveiliging en optimale performance
PPTX
CloudPassage Overview
PDF
Virtualization And Cloud Impact Overview Auditor Spin Enterprise Gr Cv4
PDF
451 Research Client Event Nov 10
PDF
The Cloud according to VMware
PPTX
IBM Software Day 2013. Unleash business innovation with the next generation o...
2012 10 cloud security architecture
Integrated Cloud Framework: Security, Governance, Compliance, Content Applica...
Resarch paper i cloud computing
null Bangalore meet - Cloud Computing and Security
What customers want the cloud to be - Jason Waxman GM at Intel, Cloud Slam 20...
Lss implementing cyber security in the cloud, and from the cloud-feb14
Smart, Data-Centric Security for the Post-PC Era
Cloud security ely kahn
Cloud Security - Made simple
Enterprise Security in Cloud
Enterprise Security in Hybrid Cloud ISACA-SV 2012
Security of,for & by cloud
Cisco tec chris young - security intelligence operations
Cloud computing
Deepsecurity & VDI beveiliging, maximale beveiliging en optimale performance
CloudPassage Overview
Virtualization And Cloud Impact Overview Auditor Spin Enterprise Gr Cv4
451 Research Client Event Nov 10
The Cloud according to VMware
IBM Software Day 2013. Unleash business innovation with the next generation o...
Ad

More from Vladimir Jirasek (16)

PDF
Vulnerability management - beyond scanning
PPTX
Vulnerability Management @ DevSecOps London Gathering
PPTX
C-Level tools for Cloud security
PPTX
Secure your cloud applications by building solid foundations with enterprise ...
PPT
Mobile phone as Trusted identity assistant
KEY
Security architecture for LSE 2009
PPTX
Mobile security summit - 10 mobile risks
PDF
Information Risk Security model and metrics
PPTX
Integrating Qualys into the patch and vulnerability management processes
PPTX
Securing mobile population for White Hats
PPTX
Security models for security architecture
PPTX
Meaningfull security metrics
PPTX
CAMM presentation for Cyber Security Gas and Oil june 2011
PDF
ISE UK&Ireland 2008 Showcase Nominee Presentation Vladimir Jirasek
PPT
Qualys Webex 24 June 2008
PPTX
Federation For The Cloud Opportunities For A Single Identity
Vulnerability management - beyond scanning
Vulnerability Management @ DevSecOps London Gathering
C-Level tools for Cloud security
Secure your cloud applications by building solid foundations with enterprise ...
Mobile phone as Trusted identity assistant
Security architecture for LSE 2009
Mobile security summit - 10 mobile risks
Information Risk Security model and metrics
Integrating Qualys into the patch and vulnerability management processes
Securing mobile population for White Hats
Security models for security architecture
Meaningfull security metrics
CAMM presentation for Cyber Security Gas and Oil june 2011
ISE UK&Ireland 2008 Showcase Nominee Presentation Vladimir Jirasek
Qualys Webex 24 June 2008
Federation For The Cloud Opportunities For A Single Identity

Recently uploaded (20)

PDF
Advanced Soft Computing BINUS July 2025.pdf
PDF
Electronic commerce courselecture one. Pdf
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
NewMind AI Monthly Chronicles - July 2025
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PPT
Teaching material agriculture food technology
PDF
CIFDAQ's Market Insight: SEC Turns Pro Crypto
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PPTX
breach-and-attack-simulation-cybersecurity-india-chennai-defenderrabbit-2025....
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
solutions_manual_-_materials___processing_in_manufacturing__demargo_.pdf
PDF
KodekX | Application Modernization Development
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Advanced IT Governance
Advanced Soft Computing BINUS July 2025.pdf
Electronic commerce courselecture one. Pdf
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
NewMind AI Monthly Chronicles - July 2025
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Teaching material agriculture food technology
CIFDAQ's Market Insight: SEC Turns Pro Crypto
Mobile App Security Testing_ A Comprehensive Guide.pdf
breach-and-attack-simulation-cybersecurity-india-chennai-defenderrabbit-2025....
Chapter 3 Spatial Domain Image Processing.pdf
solutions_manual_-_materials___processing_in_manufacturing__demargo_.pdf
KodekX | Application Modernization Development
Reach Out and Touch Someone: Haptics and Empathic Computing
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
Diabetes mellitus diagnosis method based random forest with bat algorithm
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Advanced IT Governance

Cloud security and security architecture

  • 1. Security architecture and Cloud computing, are these mutually exclusive? (Introduction to Cloud Security Guidance)
  • 2. Agenda  Cloud risk assessment x compared to traditional risk assessments  Cloud security architectures x compared to security architectures  CSA domains Copyright © 2012 Cloud Security Alliance https://cloudsecurityalliance.org.uk
  • 3. Cloud risk assessment Identify Context assets establishment Map the data Evaluate flows assets Risk Risk communication assessment Evaluate Map to Cloud Cloud deployments models and Risk treatment models Providers Copyright © 2012 Cloud Security Alliance https://cloudsecurityalliance.org.uk
  • 4. Cloud model Broad network Rapid elasticity Measured On-demand access service service Resource pooling Software as a Platform as a Infrastructure Service (SaaS) Service (SaaS) as a Service (SaaS) Publi Private Hybrid Community c Copyright © 2012 Cloud Security Alliance https://cloudsecurityalliance.org.uk
  • 5. Cloud computing deployment models Infrastructure Infrastructure Infrastructure Accessible and managed by owned by located consumed by Third party Third party Public Off-premise Untrusted provider provider Organisation Organisation On-premise Private/ o Trusted Community r 3rd party 3rdparty Off-Premise provider provider Both Organisation Both Organisation Both On-Premise Trusted & Hybrid & Third party & Third party & Off-Premise Untrusted provider provider Copyright © 2012 Cloud Security Alliance https://cloudsecurityalliance.org.uk
  • 6. Cloud model maps to Security model Cloud model GRC Business continuity SIEM Data security Identity, Access Direct map Cryptography Application sec. Host security Network security Physical security Copyright © 2012 Cloud Security Alliance https://cloudsecurityalliance.org.uk
  • 7. Responsibilities for areas in security model compared to delivery models Provider responsible Customer responsible GRC Business continuity SIEM Identity, Access Cryptography Data security Application sec. Host security Network security Physical security IaaS PaaS SaaS IaaS PaaS SaaS Copyright © 2012 Cloud Security Alliance https://cloudsecurityalliance.org.uk
  • 8. Cloud Security Domains Governance Operational  Governance and Enterprise Risk  Traditional Security, Business Management Continuity and Disaster Recovery  Legal Issues: Contracts and Electronic  Data Center Operations Discovery  Incident Response, Notification and  Compliance and Audit Remediation  Information Management and Data  Application Security Security  Encryption and Key Management  Portability and Interoperability  Identity and Access Management  Virtualization  Security as a Service Copyright © 2012 Cloud Security Alliance https://cloudsecurityalliance.org.uk
  • 9. Cloud Security Alliance supports number of projects related to cloud Get involved at https://cloudsecurityalliance.org/resea rch/https://cloudsecurityalliance.org.uk Copyright © 2012 Cloud Security Alliance
  • 10. How to manage cloud security • Have a cloud security standard • What to do on an Enterprise level • Before your Cloud project • During your Cloud project How to drive out the • BAU 'seven deadly sins' of cloud computing - new Information Security • Exit from the Cloud provider Forum report • Risks cannot be outsourced • Manage lock-in and exit up-front – especially in SaaS Copyright © 2012 Cloud Security Alliance https://cloudsecurityalliance.org.uk
  • 11. Contact Help us secure cloud computing – Get involved • http://cloudsecurityalliance.org.uk • info@cloudsecurityalliance.org.uk • LinkedIn: http://www.linkedin.com/groups/Cloud- Security-Alliance-UK-Chapter-3745837 • Twitter: @CSAUKResearch Copyright © 2012 Cloud Security Alliance https://cloudsecurityalliance.org.uk
  • 12. Thank you! www.cloudsecurityalliance.org

Editor's Notes

  • #12: Do visit the websiteDo join the LinkedIn Groups – you will receive regular email updates