Cloud Security- Is my data safe?Justin Pirie@justinpirieblog.mimecast.comjpirie@mimecast.comCloud Circle - LondonNovember 29th2010matthewbradley
Analyst Blogger
Community Manager
Social Media Influence
Where I work
Cloud Services for Microsoft Exchangetipiro
Cloud Wrapper
Email Securitymatthewbradley
Email Continuityneilalderney123
Email Archivedolescum
How the problem used to be solved...
Benefits of Google Apps
For Microsoft Exchange
What do users get?minifig
Unlimited Storagemescon
Fast SearchRonan_C
Uptimeszeke
Over 600,000 users can’t be wrong!
Cloud Security- Is my data safe?matthewbradley
2010 Hype Cycle
2010 Hype Cycle
Grand Canyon between adoptersJames Marvin Phelps (mandj98)
Adopters: Cloud Improved Security57%
Non Adopters: Cloud = Security Risk62%
Unsure about Cloud Security?jessicafm
Security Presented as BinaryMarkOMeara
Reality...cdw9
Cloud = Outsourcingstev.ie
BUT with Technical Detail AbstractedRev. XanatosSatanicosBombasticos (ClintJCL)
Which makes Clouds OpaqueAndrew Coulter Enright
The reason Cloud is powerfuldok1
Is also it’s Achilles HeelMoff
Need for Transparencysalmannas
While Protecting Vendor IP... schoschie
AND Cloud is embryonicviralbus
Standards just emergingmayakamina
So.... Caveat Emptor jeffc5000
And why it sometimes feels like this...gxdoyle
Independent Audit?ScottMJones
No Standards!!!Leo Reynolds
Independent 3rd Parties: SAS70, CESGwallyg
Missing Piece?MyklRoventine
ISO 27001...Leo Reynolds
Should you adopt ISO 27001?massdistraction
Best Practice Policy: ENISATheTruthAbout
Investigate Availability GuaranteesYukon White Light
Data Jurisdiction: clarify IXQUICK
Who has control of your data?DumindaJayasena
Baseline Current RisksChuck “Caveman” Coker
i.e. Where are we today?Chris D 2006
Trusting Users....Thai Jasmine (Take good care :-))
And Sysadmins....leftcase
Others...Tambako the Jaguar
Permissions Nightmaremarimoon
Managing those risks?Patrick Q
Is expensivejo'nas
Got the budget?The Prime Minister's Office
“Quiscustodietipsoscustodes?”
Cloud: Guards Guard
Cloud Security?matt.hintsa
#1. It’s their BusinessEsthr
#2. Financially Responsiblewwarby
#3. Scalelaffy4k
#4. Specialised SkillsSarahMcDॐ
#5. Cumulative Effect of Multiple CustomersLeo Reynolds
#6. Best Practice: Embedded, Distributed Lars Plougmann
#7. FocusChris Campbell
Want to be the Guards Guard?
Remember: Caveat Emptor jeffc5000
But proportional to Riskgxdoyle
Over to DamienJustin Pirie@justinpirieblog.mimecast.comjpirie@mimecast.commatthewbradley
Security, reliability, compliance and governance; the importance of aligning the Cloud with your existing security and governance policies Damien BehanIT Director, Brodies LLP
“The internet is not for private things, do not put them there” – a twittererhttp://datavis.tumblr.com/post/1372863949/internet-vs-privacy-a-helpful-venn-diagram
Perceptions of the cloud?SECURITYTHE CLOUD
“The fact of the matter is that the cloud is just another boring make vs. buy decision, and the sooner those in IT management realize this, the less likely they are to build potentially career-ending plans based on clouds and rainbows.” Patrick Gray on zdnet.com
Due diligenceLike any outsourcing service, ask…Why?
Who?
What?
Where?
How?

More Related Content

PPTX
Scot-Cloud 2015
PDF
Microsoft Azure Security Overview - Microsoft - CSS Dallas Azure
KEY
PPTX
10 Common Cloud Computing Myths
PPTX
PDF
Cloud Computing for Nonprofits
PPTX
Swindon- Talk on Cloud
PDF
10 Step Guide to Cloud Security - 10th Magnitude - CSS Dallas Azure
Scot-Cloud 2015
Microsoft Azure Security Overview - Microsoft - CSS Dallas Azure
10 Common Cloud Computing Myths
Cloud Computing for Nonprofits
Swindon- Talk on Cloud
10 Step Guide to Cloud Security - 10th Magnitude - CSS Dallas Azure

Viewers also liked (15)

PPTX
Empowering and Securing BYOD Email
PPTX
Cloud and The Channel- Where's the space?
PPTX
The end of IT as we know it.
PPTX
Secure Your AWS Cloud Data by Porticor
PPTX
Synergistic outcomes company
PPTX
HostingCon 2011- How Not Just to Survive but Thrive in the Evolving Hosting M...
PPTX
Unifying Devices in the Cloud
PPTX
Big data, security, and the cloud
PPTX
The Great Migration- Cloud Circle
PPT
Attaining data security in cloud computing
PPT
Data security in the cloud
PPTX
ค่าเฉลี่ยเลขคณิต
PPTX
PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD COMPUTING
PPTX
Microsoft Azure vs Amazon Web Services (AWS) Services & Feature Mapping
PPTX
Data security in cloud computing
Empowering and Securing BYOD Email
Cloud and The Channel- Where's the space?
The end of IT as we know it.
Secure Your AWS Cloud Data by Porticor
Synergistic outcomes company
HostingCon 2011- How Not Just to Survive but Thrive in the Evolving Hosting M...
Unifying Devices in the Cloud
Big data, security, and the cloud
The Great Migration- Cloud Circle
Attaining data security in cloud computing
Data security in the cloud
ค่าเฉลี่ยเลขคณิต
PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD COMPUTING
Microsoft Azure vs Amazon Web Services (AWS) Services & Feature Mapping
Data security in cloud computing
Ad

Similar to Cloud Security: Is My Data Safe? (20)

PPTX
Cloud Security- In Perspective
PPT
Auditing in the Cloud
PPTX
Cloud Security By Dr. Anton Ravindran
PPTX
Cloud Computing Security Essentials for beginners
PPTX
Cloud computing - Assessing the Security Risks - Jared Carstensen
PDF
How Secure Is Cloud
PPTX
Cloud Security: A matter of trust?
PDF
Security of the Cloud
PDF
Whitepaper: Security of the Cloud
PPTX
cloud computer security fundamentals Unit-5.pptx
POT
Automation alley day in the cloud presentation - formatted
PDF
Cybersecurity in the Cloud: Safer Than You Think
PDF
Losing Control to the Cloud
PDF
Cloud Security - Kloudlearn
PDF
Facing the Future - Is the cloud right for you?
PPTX
Managing Cloud Business Solutions for Salisbury/Modbury Digital Enterprise Pr...
PDF
Sleeping well with cloud services
PPTX
Cloud Security: Risks and Recommendations for New Entrants
PPTX
Cloud security: Risks and Rewards for New Entrants
PDF
Cloud Security, Standards and Applications
Cloud Security- In Perspective
Auditing in the Cloud
Cloud Security By Dr. Anton Ravindran
Cloud Computing Security Essentials for beginners
Cloud computing - Assessing the Security Risks - Jared Carstensen
How Secure Is Cloud
Cloud Security: A matter of trust?
Security of the Cloud
Whitepaper: Security of the Cloud
cloud computer security fundamentals Unit-5.pptx
Automation alley day in the cloud presentation - formatted
Cybersecurity in the Cloud: Safer Than You Think
Losing Control to the Cloud
Cloud Security - Kloudlearn
Facing the Future - Is the cloud right for you?
Managing Cloud Business Solutions for Salisbury/Modbury Digital Enterprise Pr...
Sleeping well with cloud services
Cloud Security: Risks and Recommendations for New Entrants
Cloud security: Risks and Rewards for New Entrants
Cloud Security, Standards and Applications
Ad

More from Justin Pirie (20)

PPTX
Adoption Trends for SaaS- Cloud Computing World Forum 2012
PPTX
Microsoft Hosters Sweden- Becoming a Trusted Advisor to Sell Cloud
PPTX
CLT Law Conference Cloud intro
PPTX
Copenhagen Lean Startup
PPTX
Bristol Tech Startup School: Lean Startup
PPTX
Microsoft Worldwide Partner Conference Session
PPTX
Cloud- A Technical or Organisational Challenge? Or Both?
PPTX
Email: The Future Direction
PPTX
Cloud and the Channel- A Perfect Storm?
PPTX
Lean Startup - A Primer for Entrepreneurs
PPTX
The Hidden Security Danger – Don’t Let Email Be Your Downfall
PPTX
Mimecast Partner Day
PPTX
CLT Legal Cloud Conference
PPTX
Cloud: Space for the Channel?
PPTX
Cloud Adoption Secrets
PPTX
Lean Startup- a primer for Entrepreneurs
PPT
Constructing the Case for Cloud
PPTX
Cloud. Why? How
PPTX
Rackspace Feb 2010 with Text
PPTX
Does the Cloud ROI Stack up- or does it fall?
Adoption Trends for SaaS- Cloud Computing World Forum 2012
Microsoft Hosters Sweden- Becoming a Trusted Advisor to Sell Cloud
CLT Law Conference Cloud intro
Copenhagen Lean Startup
Bristol Tech Startup School: Lean Startup
Microsoft Worldwide Partner Conference Session
Cloud- A Technical or Organisational Challenge? Or Both?
Email: The Future Direction
Cloud and the Channel- A Perfect Storm?
Lean Startup - A Primer for Entrepreneurs
The Hidden Security Danger – Don’t Let Email Be Your Downfall
Mimecast Partner Day
CLT Legal Cloud Conference
Cloud: Space for the Channel?
Cloud Adoption Secrets
Lean Startup- a primer for Entrepreneurs
Constructing the Case for Cloud
Cloud. Why? How
Rackspace Feb 2010 with Text
Does the Cloud ROI Stack up- or does it fall?

Recently uploaded (20)

PDF
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
PDF
Flame analysis and combustion estimation using large language and vision assi...
PDF
Developing a website for English-speaking practice to English as a foreign la...
PDF
sustainability-14-14877-v2.pddhzftheheeeee
PDF
A comparative study of natural language inference in Swahili using monolingua...
PDF
Taming the Chaos: How to Turn Unstructured Data into Decisions
PPTX
Configure Apache Mutual Authentication
PDF
A contest of sentiment analysis: k-nearest neighbor versus neural network
PPTX
Chapter 5: Probability Theory and Statistics
PDF
Consumable AI The What, Why & How for Small Teams.pdf
PDF
TrustArc Webinar - Click, Consent, Trust: Winning the Privacy Game
PPT
Module 1.ppt Iot fundamentals and Architecture
PDF
Hybrid horned lizard optimization algorithm-aquila optimizer for DC motor
PDF
A review of recent deep learning applications in wood surface defect identifi...
PPTX
2018-HIPAA-Renewal-Training for executives
PPTX
Modernising the Digital Integration Hub
PDF
Zenith AI: Advanced Artificial Intelligence
PDF
sbt 2.0: go big (Scala Days 2025 edition)
DOCX
search engine optimization ppt fir known well about this
PDF
Enhancing emotion recognition model for a student engagement use case through...
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
Flame analysis and combustion estimation using large language and vision assi...
Developing a website for English-speaking practice to English as a foreign la...
sustainability-14-14877-v2.pddhzftheheeeee
A comparative study of natural language inference in Swahili using monolingua...
Taming the Chaos: How to Turn Unstructured Data into Decisions
Configure Apache Mutual Authentication
A contest of sentiment analysis: k-nearest neighbor versus neural network
Chapter 5: Probability Theory and Statistics
Consumable AI The What, Why & How for Small Teams.pdf
TrustArc Webinar - Click, Consent, Trust: Winning the Privacy Game
Module 1.ppt Iot fundamentals and Architecture
Hybrid horned lizard optimization algorithm-aquila optimizer for DC motor
A review of recent deep learning applications in wood surface defect identifi...
2018-HIPAA-Renewal-Training for executives
Modernising the Digital Integration Hub
Zenith AI: Advanced Artificial Intelligence
sbt 2.0: go big (Scala Days 2025 edition)
search engine optimization ppt fir known well about this
Enhancing emotion recognition model for a student engagement use case through...

Cloud Security: Is My Data Safe?

Editor's Notes

  • #2: Intro Myself and where I workAnswer the key question- is my data safeWhat are the hurdles we have to cross? What are the actionable things we can do?Why should you consider going to the cloud?
  • #9: Security
  • #10: Continutity
  • #11: Archive
  • #13: Bringing all the benefits of Google apps- horizontal scalability, reliability, etc
  • #14: To Microsoft Exchange
  • #21: 2010 Gartner Hype Cycle for emerging technologies
  • #22: 2010 Gartner Hype Cycle for emerging technologies
  • #24: From the Mimecast Cloud Adoption Survey http://www.mimecast.com/events-press/press-releases/article/view/cloud-computing-delivering-on-its-promise-but-doubts-still-hold-back-adoption/462/
  • #25: From the Mimecast Cloud Adoption Survey http://www.mimecast.com/events-press/press-releases/article/view/cloud-computing-delivering-on-its-promise-but-doubts-still-hold-back-adoption/462/
  • #26: Why are some People are unsure about Cloud Security
  • #27: Security is often presented as a binary object. It’s not.
  • #28: It’s much more complex than that.
  • #30: Technical details are abstracted
  • #31: Probably because of the relative opacity of Cloud compared to the transparency of a private network and the control you can exert on it
  • #33: Are it’s Achilles heel
  • #35: Without revealing to much intellectual property- the main differentiator in Cloud
  • #37: Standards are only just emerging
  • #38: Buyer Beware- http://en.wikipedia.org/wiki/Caveat_emptorUnder the doctrine of caveat emptor, the buyer could not recover from the seller for defects on the property that rendered the property unfit for ordinary purposes. The only exception was if the seller actively concealed latent defects or otherwise made material misrepresentations amounting to fraud.Before statutory law, the buyer had no warranty of the quality of goods. In many jurisdictions now, the law requires that goods must be of "merchantable quality". However, this implied warranty can be difficult to enforce and may not apply to all products. Hence, buyers are still advised to be cautious.
  • #39: Which is why we in cloud feel like we’re being beaten up...
  • #40: Independent Audit?
  • #41: There are no standards...There is not a best practice independent security methodology for cloud. Clouds are opaque. Technical complexity is abstracted. Proper audit / DD requires transparency. But transparency would reveal IP.
  • #42: Independent 3rd party is so important to validate claims in depthSAS 70, CESG etc
  • #43: Spot the missing one?
  • #44: ISO 27001- ISO 27001 doesn’t fit the cloud- 5 year old standard currently- to be reviewed in 2012- CSA helping update controls for the Cloud
  • #45: ·          Should you adopt ISO 20071? What sort of protection will it grant you? Yes. Because it’s a framework for managing security. A process. Set of Documentation. Set of controls. Working out how much acceptable risk What risk are you exposed to Which are greater than the accpectablerisck What controls do you need to manage- taken from annex A Deploy the controls in an auditable way- constantly approve Compliance- testing Governance Risk Complaince- testing to make sure your controls It Scales
  • #46: Control and governance; what should be the basis of your Cloud Data Best Practice Policy- ENISA
  • #47: ·          Investigating availability guarantees and penalties and examining your supplier’s disaster recovery strategy Important- they do what they say the do The bar to what you set that at needs to be relevant to what you have already- BASELINE!!! Realistic expectation Based on the data you’re going to outsource Look at historical performance- not a predictor for the future- but relevant Look at their DR strategy- if you have 2 data centres- that should be the expectation Map your requirements to the provider
  • #48: ·          Data compliance; the importance of clarifying where your data will be stored and who will have access to your information Jurisdiction EU/ Patriot / RIPA / Safe Harbour
  • #49: ·          Ultimately, who has control over your data? When you save your data- need to understand Look at service providers to the same extent MBTF- encryption look at service providers Cloud should be architected differently People shouldn’t be fooled by “cloud” technology See behind the fog Often it’s really hard because of the opaqueness   Integretity of Data Critical End to end vs middleware Designed to hook together  Managing service provider obligations Asses the risk- make sure the risk you’re willing to accept is related in the SLA Review- annually? Any deviation look for recompense or additional controls Blunt instrument Make sure compliance and information governance are involved early on in the process of negotiating SLA- lawyers don’t know about GRC
  • #50: The key is to understand your current risks- baseline them
  • #51: i.e. Where are we today?
  • #52: Users Applications File shares Email Document management
  • #53: Sysadmins User based access Server access Database access
  • #54: Others: Internet VPN Extranet Customer/Partner portals API’s Suppliers Telco’s Tape warehousing Backup delivery personnel
  • #55: Ends up in a Permissions Nightmare- or a brittle infrastructure
  • #56: How are we managing those risks today?
  • #58: Are you given the budget / skills to do it?
  • #59: “Quiscustodietipsoscustodes?”Who will guard the guards themselves?DecimusIuniusIuvenalis
  • #60: Cloud can be a way to become a guard’s guard, instead of the guard
  • #61: Reasons to go Cloud Security
  • #62: Reason to go Cloud security #1 It’s their business- and their reputation depends on it
  • #63: #2 Money - they are held financially responsible
  • #64: Reason #3 Scale- Cloud platforms have scale that customers could never achieve on their own- protecting against large scale attacks
  • #65: Reason #4 Specialised Skills- employ specific people to do specialised job. Cumulative effect of multiple customers
  • #66: Cumulative effect of multiple customers
  • #67: Best Practice embedded in organisation and distributed. Not dependent on one person
  • #68: Not just about competence and budget- but focus. It’s all they do.
  • #69: Cloud can be a way to become a guard’s guard, instead of the guard
  • #70: Buyer Beware- http://en.wikipedia.org/wiki/Caveat_emptorUnder the doctrine of caveat emptor, the buyer could not recover from the seller for defects on the property that rendered the property unfit for ordinary purposes. The only exception was if the seller actively concealed latent defects or otherwise made material misrepresentations amounting to fraud.Before statutory law, the buyer had no warranty of the quality of goods. In many jurisdictions now, the law requires that goods must be of "merchantable quality". However, this implied warranty can be difficult to enforce and may not apply to all products. Hence, buyers are still advised to be cautious.
  • #71: But make it proportional to risk- especially to CURRENT RISKS