SlideShare a Scribd company logo
The cloud is as secure as
  you want it to be...


              Debashis Banerjee
                    Yahoo! India




                                   1
My son’s first
                     day
                   at school




                     Catered Food
                 on my anniversary party




                 Money in
                 my bank
My seat on the
plane                                      2
Today’s Journey
                                         Multi device
       Refresher to
                                            Cloud
        the cloud
                                          Security –
                                           Mobiles




                                             OTP, SMS
 Ensuring                                   based multi
your cloud                                  Factor auth
 is secure



              Public, Private
               and Hybrid       Secure
              Cloud Security     APIs


                                                               3
                                           Image: FreeDigitalPhotos.net
Cloud Computing - Refresher

  • Key aspects of using the cloud: Elasticity, On Demand,
    Multi Tenancy, Multi Device, Ability to measure
    Service


  • Type of Clouds - Public Clouds, Private Clouds,
    Hybrid Clouds, Community/Partner Clouds


  • Deployment models : SaaS , PaaS , IaaS


                                                         4
Key questions to ask about security?
• What do you need to protect? Who are your users?
• Where does your data live? How does it flow? What
  geographies?
• What are your compliance, logging needs?
• Is there SSO and Identity management in place?
• Do you have a mix of physical , virtual, cloud?
• Who pays for security? Who is accountable for what aspect of
• security?
• How do you react if a security breach takes place?




                                                                 5
Ensuring your cloud solution is secure
                           Identity
                           Provider                                      Strong Auth
Secure                                                                   Multi
                                          Ingress and                    Device
Data                                   Egress Security
In backup                                                                Access
                                       Federated SSO
                                       Privileged Access
                Public Cloud




                                                               Geo-Political
  Multi Tenancy                            Private Cloud       Considerations
Logging,              Secure Data at
Auditing              rest, motion
Compliance,
Playback                                                         Enterprise
                                         Physical, Virtual
                                         and cloud resources
              Wipeout,
                                                                                6
              Encryption
Security in Public Cloud Deployments
• Strong Identity management
• Privileged Account Management
• Place the appropriate type of data in the cloud
• Have access to compliance and logging , auditing
• Being a public cloud ensure you impose where you data can or
  cannot travel
• Wipeout policies
• Ensure you are comfortable with the security of multi tenancy
• Secure keys




                                                                  7
Security in the Private & Hybrid Cloud
Private:
   • Design such that there is scope to move to a hybrid model
   • Impose SSO
Hybrid:
   • Segregate your data between clouds
   • Use SAML and ensure appropriate enterprise credentials are
     within the perimeter
   • Have your Federation set up correctly. Enable SSO.
   • Ensuring enterprise credentials do not travel into the cloud


                                                                    8
Multi Device Cloud Security – Mobile
 Phones
• The mobile device as an extension of the Cloud
• Secure Mobile Apps on the cloud.
• On Cloud and On Device virus scanning
• Seamless policies for mobile devices
• Credential life cycle management
• Secure Roaming Users




                                                   9
Multi Factor Auth – OTPs, SMS based

Use OTPs effectively to protect your data access to the cloud

   GoldKey


   Multi Factor Auth – AWS/Gemalto


   2 Factor Auth using SMS




                                                                                               10
                                     Image: http://commons.wikimedia.org/wiki/File:RSA-SecurID-Tokens.jpg
Some APIs useful in cloud security


• Safe Browsing API


• VM Safe APIs




                                     11
In Conclusion

• Cloud Security is critical to succeed in the cloud
• Choose Private / Public / Hybrid cloud & SaaS / PaaS / IaaS
• Identity & Privileged User Management
• Compliance, Certification and Logging
• Consider Multi Device Scenarios
• Use Strong Authentication




                                                                12
Remember your questions about security to
1. Your child’s school
2. Your anniversary party caterers
3. Your airline
4. Your bank




   And you won’t go
   wrong with
   the Cloud Security !!!!
                                            Image: FreeDigitalPhotos.net
                                                              13

More Related Content

PDF
Debashis banerjee cloud_is_as_secure
PPTX
Have content, will travel securely sharing mobile content in the cloud part II
PDF
Symantec Ubiquity
PPTX
Symantec Advances Enterprise Mobility Strategy
PDF
Symantec Virtualization Launch VMworld 2012
PPTX
Winkler Cloud, ORCON, and Mobility
PDF
Key2 share moosecon
PPTX
Sxsw ppt voice-1
Debashis banerjee cloud_is_as_secure
Have content, will travel securely sharing mobile content in the cloud part II
Symantec Ubiquity
Symantec Advances Enterprise Mobility Strategy
Symantec Virtualization Launch VMworld 2012
Winkler Cloud, ORCON, and Mobility
Key2 share moosecon
Sxsw ppt voice-1

What's hot (18)

PPTX
Wayfs and Strays - Jonathan Richardson
PPTX
Sophos Complete Security
PDF
Copyright and Technology London 2012: Content Identification - Werner Strydom...
PDF
Bapinger Network Security
PDF
FaceTime - DSS @Vilnius 2010
PDF
ekey+ Presentation
PDF
Daniel künzli cloudgateway.next
PDF
Smau Bari 2012 Marco Soldi
PDF
Aus lug lotus protector
PDF
Stronger/Multi-factor Authentication for Enterprise Applications
PPTX
Green Security
PPT
Protect Your Passwords, Secure Your Servers
PDF
Cloudsecurity
PPTX
Safenet Authentication Service, SAS
PDF
Ruckus BYOD whitepaper
PDF
Cidway Secure Mobile Access Transactions Short 05 12
PPTX
Webinar - Easy multi factor authentication strategies and PCI DSS
PDF
Security Intelligence
Wayfs and Strays - Jonathan Richardson
Sophos Complete Security
Copyright and Technology London 2012: Content Identification - Werner Strydom...
Bapinger Network Security
FaceTime - DSS @Vilnius 2010
ekey+ Presentation
Daniel künzli cloudgateway.next
Smau Bari 2012 Marco Soldi
Aus lug lotus protector
Stronger/Multi-factor Authentication for Enterprise Applications
Green Security
Protect Your Passwords, Secure Your Servers
Cloudsecurity
Safenet Authentication Service, SAS
Ruckus BYOD whitepaper
Cidway Secure Mobile Access Transactions Short 05 12
Webinar - Easy multi factor authentication strategies and PCI DSS
Security Intelligence
Ad

Viewers also liked (10)

DOCX
تقرير التقن الحوسبة السحابية
PDF
التصيد الإلكتروني
PDF
مميزات الحوسبة السحابية
PPTX
Cloud computing
PDF
PDF
Global Mandate to Secure Cloud Computing
PDF
GSAW Presentation on Cloud Security V2.1
PDF
Cloud computing Security
PPTX
أساسيات أمن المعلومات
PPT
الحوسبة السحابية
تقرير التقن الحوسبة السحابية
التصيد الإلكتروني
مميزات الحوسبة السحابية
Cloud computing
Global Mandate to Secure Cloud Computing
GSAW Presentation on Cloud Security V2.1
Cloud computing Security
أساسيات أمن المعلومات
الحوسبة السحابية
Ad

Similar to Cloud security - The Cloud is as Secure as you want it to be! - Indicthreads cloud computing conference 2011 (20)

PDF
The cloud is as secure as you want it to be
PPTX
Safe Net: Cloud Security Solutions
PPTX
Executive Alliance Dallas - Accellion Presentation
PPTX
Extending security in the cloud network box - v4
PPTX
Enterprise Security in Cloud
PPTX
Enterprise Security in Hybrid Cloud ISACA-SV 2012
PPT
Trend micro - Your journey to the cloud, where are you
PDF
Peering Through the Cloud Forrester EMEA 2010
PDF
Smart Cards & Devices Forum 2012 - Securing Cloud Computing
PPTX
Present trends in Cloud Security in AWS platform
PPT
Udløs potentialet i Enterprise Mobility, Vijay Dheap, IBM US
PDF
How to Make Your IoT Devices Secure, Act Autonomously & Trusted Subjects
PDF
Intel Cloud Summit: Greg Brown McAfee
PPTX
Security and Mobile Application Management with Worklight
PPTX
CloudPassage Overview
PDF
Deepsecurity & VDI beveiliging, maximale beveiliging en optimale performance
PPTX
Mark Carlile, EMEA Enterprise Lead at Airwatch - Mobile content strategies an...
PDF
Protecting Data in the Cloud
PPTX
Webinar on Enterprise Security & android
PDF
SmartCard Forum 2010 - Enterprise authentication
The cloud is as secure as you want it to be
Safe Net: Cloud Security Solutions
Executive Alliance Dallas - Accellion Presentation
Extending security in the cloud network box - v4
Enterprise Security in Cloud
Enterprise Security in Hybrid Cloud ISACA-SV 2012
Trend micro - Your journey to the cloud, where are you
Peering Through the Cloud Forrester EMEA 2010
Smart Cards & Devices Forum 2012 - Securing Cloud Computing
Present trends in Cloud Security in AWS platform
Udløs potentialet i Enterprise Mobility, Vijay Dheap, IBM US
How to Make Your IoT Devices Secure, Act Autonomously & Trusted Subjects
Intel Cloud Summit: Greg Brown McAfee
Security and Mobile Application Management with Worklight
CloudPassage Overview
Deepsecurity & VDI beveiliging, maximale beveiliging en optimale performance
Mark Carlile, EMEA Enterprise Lead at Airwatch - Mobile content strategies an...
Protecting Data in the Cloud
Webinar on Enterprise Security & android
SmartCard Forum 2010 - Enterprise authentication

More from IndicThreads (20)

PPTX
Http2 is here! And why the web needs it
ODP
Understanding Bitcoin (Blockchain) and its Potential for Disruptive Applications
PPT
Go Programming Language - Learning The Go Lang way
PPT
Building Resilient Microservices
PPT
App using golang indicthreads
PDF
Building on quicksand microservices indicthreads
PDF
How to Think in RxJava Before Reacting
PPT
Iot secure connected devices indicthreads
PDF
Real world IoT for enterprises
PPT
IoT testing and quality assurance indicthreads
PPT
Functional Programming Past Present Future
PDF
Harnessing the Power of Java 8 Streams
PDF
Building & scaling a live streaming mobile platform - Gr8 road to fame
PPTX
Internet of things architecture perspective - IndicThreads Conference
PDF
Cars and Computers: Building a Java Carputer
PPTX
Scrap Your MapReduce - Apache Spark
PPT
Continuous Integration (CI) and Continuous Delivery (CD) using Jenkins & Docker
PPTX
Speed up your build pipeline for faster feedback
PPT
Unraveling OpenStack Clouds
PPTX
Digital Transformation of the Enterprise. What IT leaders need to know!
Http2 is here! And why the web needs it
Understanding Bitcoin (Blockchain) and its Potential for Disruptive Applications
Go Programming Language - Learning The Go Lang way
Building Resilient Microservices
App using golang indicthreads
Building on quicksand microservices indicthreads
How to Think in RxJava Before Reacting
Iot secure connected devices indicthreads
Real world IoT for enterprises
IoT testing and quality assurance indicthreads
Functional Programming Past Present Future
Harnessing the Power of Java 8 Streams
Building & scaling a live streaming mobile platform - Gr8 road to fame
Internet of things architecture perspective - IndicThreads Conference
Cars and Computers: Building a Java Carputer
Scrap Your MapReduce - Apache Spark
Continuous Integration (CI) and Continuous Delivery (CD) using Jenkins & Docker
Speed up your build pipeline for faster feedback
Unraveling OpenStack Clouds
Digital Transformation of the Enterprise. What IT leaders need to know!

Recently uploaded (20)

PDF
Empathic Computing: Creating Shared Understanding
PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Review of recent advances in non-invasive hemoglobin estimation
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
KodekX | Application Modernization Development
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PPT
Teaching material agriculture food technology
PPTX
A Presentation on Artificial Intelligence
Empathic Computing: Creating Shared Understanding
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
Unlocking AI with Model Context Protocol (MCP)
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Encapsulation_ Review paper, used for researhc scholars
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Review of recent advances in non-invasive hemoglobin estimation
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Spectral efficient network and resource selection model in 5G networks
Advanced methodologies resolving dimensionality complications for autism neur...
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
KodekX | Application Modernization Development
20250228 LYD VKU AI Blended-Learning.pptx
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Teaching material agriculture food technology
A Presentation on Artificial Intelligence

Cloud security - The Cloud is as Secure as you want it to be! - Indicthreads cloud computing conference 2011

  • 1. The cloud is as secure as you want it to be... Debashis Banerjee Yahoo! India 1
  • 2. My son’s first day at school Catered Food on my anniversary party Money in my bank My seat on the plane 2
  • 3. Today’s Journey Multi device Refresher to Cloud the cloud Security – Mobiles OTP, SMS Ensuring based multi your cloud Factor auth is secure Public, Private and Hybrid Secure Cloud Security APIs 3 Image: FreeDigitalPhotos.net
  • 4. Cloud Computing - Refresher • Key aspects of using the cloud: Elasticity, On Demand, Multi Tenancy, Multi Device, Ability to measure Service • Type of Clouds - Public Clouds, Private Clouds, Hybrid Clouds, Community/Partner Clouds • Deployment models : SaaS , PaaS , IaaS 4
  • 5. Key questions to ask about security? • What do you need to protect? Who are your users? • Where does your data live? How does it flow? What geographies? • What are your compliance, logging needs? • Is there SSO and Identity management in place? • Do you have a mix of physical , virtual, cloud? • Who pays for security? Who is accountable for what aspect of • security? • How do you react if a security breach takes place? 5
  • 6. Ensuring your cloud solution is secure Identity Provider Strong Auth Secure Multi Ingress and Device Data Egress Security In backup Access Federated SSO Privileged Access Public Cloud Geo-Political Multi Tenancy Private Cloud Considerations Logging, Secure Data at Auditing rest, motion Compliance, Playback Enterprise Physical, Virtual and cloud resources Wipeout, 6 Encryption
  • 7. Security in Public Cloud Deployments • Strong Identity management • Privileged Account Management • Place the appropriate type of data in the cloud • Have access to compliance and logging , auditing • Being a public cloud ensure you impose where you data can or cannot travel • Wipeout policies • Ensure you are comfortable with the security of multi tenancy • Secure keys 7
  • 8. Security in the Private & Hybrid Cloud Private: • Design such that there is scope to move to a hybrid model • Impose SSO Hybrid: • Segregate your data between clouds • Use SAML and ensure appropriate enterprise credentials are within the perimeter • Have your Federation set up correctly. Enable SSO. • Ensuring enterprise credentials do not travel into the cloud 8
  • 9. Multi Device Cloud Security – Mobile Phones • The mobile device as an extension of the Cloud • Secure Mobile Apps on the cloud. • On Cloud and On Device virus scanning • Seamless policies for mobile devices • Credential life cycle management • Secure Roaming Users 9
  • 10. Multi Factor Auth – OTPs, SMS based Use OTPs effectively to protect your data access to the cloud GoldKey Multi Factor Auth – AWS/Gemalto 2 Factor Auth using SMS 10 Image: http://commons.wikimedia.org/wiki/File:RSA-SecurID-Tokens.jpg
  • 11. Some APIs useful in cloud security • Safe Browsing API • VM Safe APIs 11
  • 12. In Conclusion • Cloud Security is critical to succeed in the cloud • Choose Private / Public / Hybrid cloud & SaaS / PaaS / IaaS • Identity & Privileged User Management • Compliance, Certification and Logging • Consider Multi Device Scenarios • Use Strong Authentication 12
  • 13. Remember your questions about security to 1. Your child’s school 2. Your anniversary party caterers 3. Your airline 4. Your bank And you won’t go wrong with the Cloud Security !!!! Image: FreeDigitalPhotos.net 13