SlideShare a Scribd company logo
Trust and Transformation:
The Compelling Case for the Cloud

Peter Coffee
VP / Head of Platform Research
salesforce.com inc.
Public Clouds of Public Trust:
The End of ‘Forbidden Zones’
 General       Economic                          Health &        Defense &
                              Transportation
Government    Development                      Human Services   Public Safety




                                Science &
                               Environment




  Political Campaigns & Advocacy                 Culture & Education
Cloud Objections Are Being Addressed

 Security: American Bankers Association blog says an enterprise
  should “verify that any outsourcing partner meets its standards.
  However, once verified, a cloud partner can actually provide
  greater security.”

 Capacity / Availability:
   – Overall service portfolio routinely exceeds 600M transactions/day
   – Availability routinely > four 9s, converging on 24 × 365 operations

 Compliance: United States’ National Institute of Standards and
  Technology says cloud-resident data “can be more available, faster
  to restore, and more reliable… [and] less of a risk than having data
  dispersed on portable computers or removable media.”
Best Practices Matter More than Data Location



                             "There are five common factors that lead
                             to the compromise of database
                             information":
                                  • ignorance
                                  • poor password management
                                  • rampant account sharing
                                  • unfettered access to data
                                  • excessive portability of data


                                          DarkReading.com, October 2009
Trusted Advisors Recommend the Cloud

                     Potential benefits from
                     transitioning to a public
                     cloud computing
                     environment:
                        • Staff Specialization
                        • Platform Strength
                        • Resource Availability
                        • Backup and Recovery
                        • Mobile Endpoints
                        • Data Concentration
Force.com was designed from Line 1…
               …to be “Shared and Secure”
                                  Apply Data
    Login…        Authenticate…   Security Rules…   View Filtered Content




 Password security policies
 Rich Sharing Rules
 User Profiles
 SSO/2-factor solutions
Granular Privilege Assignment
+ Expanding Ecosystem of Management Tools
All Assets Secured, All the Time




                    Despite resource sharing, multitenancy will often
                    improve security. Most current enterprise security
                    models are perimeter-based, making you
                    vulnerable to inside attacks. Multitenant services
                    secure all assets at all times, since those within the
                    main perimeter are all different clients…

                    Multitenancy is here to stay. Our research and
                    analysis indicates that multitenancy is not a less
                    secure model — quite the opposite!
Data Stewardship is a Practice, not a Technology
  Data protection regulations
    – Where can it be stored?
    – Who’s allowed to see it?

  Peel the onion of ‘compliance’
    – Anonymize/encrypt/partition specific fields
    – Cloud disciplines can enhance auditability
         • Role-based privilege assignment
         • Actions taken using granted privileges

  Looking beyond the FUD
    – USA PATRIOT Act sometimes causes concern about powers of US
      government to access data
    – Limited to information-gathering related to matters of urgent national security
    – Use of USA PATRIOT Act requires involvement by all three branches of the
      US government
    – Many other countries, including in Europe, have very similar powers
Trust is Earned by Transparency
Continued Availability Improvement




         Spring ‘11                     Summer ‘11                      Winter ‘12




 inter ’12 release: downtime reduced to 2 hours
     “Great work reducing the pain of the quarterly upgrade so dramatically.
 urtheror difference to of maintenance downtime in downtime and
     The
        reduction our overstated.”
     2 3 hours can’t be
                           business between 2 or 3 minutes of
                                                               FY13
Becoming ‘Securely Social’

  What is the organization’s mission?
  What information supports that mission?
  Where does it originate?
  Who holds it?
  Who can see it?
  What events change it?
  When is that important?
  How do people know?
  How can people act?
  These are not new questions: NSA IAM introduced 2004
Trust is Essential Enabler for Cloud Adoption

  Robust infrastructure security
  Rigorous operational security
  Granular customer controls
    – Role-based privilege sets
    – Convenient access control & audit
  “Sum of all fears” superset protection
    –   Multi-tenancy reduces opportunities for error
    –   The most demanding customer sets the bar
    –   FISMA: FIPS 199 LOW and MODERATE
    –   PCI DSS Compliance Level 1
    –   Comprehensive and continuing audit and certification
Peter Coffee
VP / Head of Platform Research
       pcoffee@salesforce.com
     facebook.com/peter.coffee
         twitter.com/petercoffee
      cloudblog.salesforce.com

More Related Content

PPT
Presentation For IAC Federal Acquisition
PDF
Threats and risks to cloud computing
PDF
Csathreats.v1.0
PDF
Peering Through the Cloud Forrester EMEA 2010
PPTX
Top 5 Cloud Security Threats in Healthcare
PDF
Akamai___WebSecurity_eBook_Final
PDF
Cloud Security Top Threats
PDF
Building Cyber Resilience in the Digital Economy
Presentation For IAC Federal Acquisition
Threats and risks to cloud computing
Csathreats.v1.0
Peering Through the Cloud Forrester EMEA 2010
Top 5 Cloud Security Threats in Healthcare
Akamai___WebSecurity_eBook_Final
Cloud Security Top Threats
Building Cyber Resilience in the Digital Economy

What's hot (20)

PDF
Journey to cyber resilience
PDF
Mitigating Web 2.0 Threats
PPTX
IT Security for Nonprofits
PPTX
Cloud Computing Security Threats and Responses
PPTX
Csa about-threats-june-2010-ibm
PDF
BCS ITNow 201406 - The Risk Business
PDF
Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...
PDF
Managed security services for financial services firms
PPTX
Trend Micro - Targeted attacks: Have you found yours?
PPTX
Seclore: Information Rights Management
PPTX
Windstream Managed Network Security Presentation
PPTX
Achieving Caribbean Cybersecuirty
PDF
Privacy in Computer Vision
PDF
Data Security in Collaboration
PPT
001.itsecurity bcp v1
PPTX
Self defending data webinar (feb13)
PDF
DSS ITSEC CONFERENCE - Lumension Security - Intelligent application whiteli...
PDF
Hakin9 interview w Prof Sood
PPTX
Small but Not Forgotten: Cybersecurity for the Small Firm Presented by Accell...
PPT
Lee Newcombe, Capgemini “Security threats associated with cloud computing”
Journey to cyber resilience
Mitigating Web 2.0 Threats
IT Security for Nonprofits
Cloud Computing Security Threats and Responses
Csa about-threats-june-2010-ibm
BCS ITNow 201406 - The Risk Business
Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...
Managed security services for financial services firms
Trend Micro - Targeted attacks: Have you found yours?
Seclore: Information Rights Management
Windstream Managed Network Security Presentation
Achieving Caribbean Cybersecuirty
Privacy in Computer Vision
Data Security in Collaboration
001.itsecurity bcp v1
Self defending data webinar (feb13)
DSS ITSEC CONFERENCE - Lumension Security - Intelligent application whiteli...
Hakin9 interview w Prof Sood
Small but Not Forgotten: Cybersecurity for the Small Firm Presented by Accell...
Lee Newcombe, Capgemini “Security threats associated with cloud computing”
Ad

Viewers also liked (12)

PPT
Cloud Computing Jobs In India
PPTX
Hadoop & distributed cloud computing
PPTX
Keith Fricke - CISO for an Hour
PPT
[Slideshare] fardhu'ain(batch#15-january-2016)lesson-#8-arkanul-iiman-(believ...
PDF
CSA Cloud Trust Protocol and A4Cloud: Enforcing cloud accountability through ...
PPTX
Composing a case management solution with SaaS, PaaS, On-premise products
PPTX
Standard org chart & role descriptions
PPTX
2012-01 How to Secure a Cloud Identity Roadmap
PDF
CA Technologies and Deloitte: Unleash and Protect your Business with Identity...
PDF
F5 TLS & SSL Practices
PDF
Video on the web: from trend to landmark
PPT
Identity and Access Management Reference Architecture for Cloud Computing
Cloud Computing Jobs In India
Hadoop & distributed cloud computing
Keith Fricke - CISO for an Hour
[Slideshare] fardhu'ain(batch#15-january-2016)lesson-#8-arkanul-iiman-(believ...
CSA Cloud Trust Protocol and A4Cloud: Enforcing cloud accountability through ...
Composing a case management solution with SaaS, PaaS, On-premise products
Standard org chart & role descriptions
2012-01 How to Secure a Cloud Identity Roadmap
CA Technologies and Deloitte: Unleash and Protect your Business with Identity...
F5 TLS & SSL Practices
Video on the web: from trend to landmark
Identity and Access Management Reference Architecture for Cloud Computing
Ad

Similar to Cloud Security: Trust and Transformation (20)

PDF
Cloud Webinar Neiditz Weitz Mitchell Goodman
PPTX
Extending security in the cloud network box - v4
PPTX
OWASP Cloud Top 10
PPTX
Executive Briefing: Strategic Issues Surrounding Cloud Services
PPTX
Cloud Security - Idealware
PDF
110307 cloud security requirements gourley
PDF
The Cloud Beckons, But is it Safe?
PDF
Ciphercloud Solutions Overview hsa oct2011
PPTX
Brave new world of encryption v1
PDF
Requirements for Public Sector Cloud Computing
PPTX
Enterprise Security in Hybrid Cloud ISACA-SV 2012
PPTX
Enterprise Security in Cloud
PDF
The Complexities of Cloud Computing - The Rules are New, But is the Game
PPT
Cloud Computing and Records Management
PDF
Cloud Security - A Visibility Challenge
PDF
Secure Cloud Computing
PPT
Cloudy with a chance of downtime
PDF
Emc keynote 0945 1030
PPTX
Cloud Computing - Security (BIG Data)
Cloud Webinar Neiditz Weitz Mitchell Goodman
Extending security in the cloud network box - v4
OWASP Cloud Top 10
Executive Briefing: Strategic Issues Surrounding Cloud Services
Cloud Security - Idealware
110307 cloud security requirements gourley
The Cloud Beckons, But is it Safe?
Ciphercloud Solutions Overview hsa oct2011
Brave new world of encryption v1
Requirements for Public Sector Cloud Computing
Enterprise Security in Hybrid Cloud ISACA-SV 2012
Enterprise Security in Cloud
The Complexities of Cloud Computing - The Rules are New, But is the Game
Cloud Computing and Records Management
Cloud Security - A Visibility Challenge
Secure Cloud Computing
Cloudy with a chance of downtime
Emc keynote 0945 1030
Cloud Computing - Security (BIG Data)

More from Peter Coffee (20)

PPTX
Create And Keep a Customer
PDF
Snowforce 2017 Keynote - Peter Coffee
PDF
#PaveItForward 2016 - Peter Coffee
PDF
Game of Phones - Becoming the Architects of Connection (Midwest Dreamin' Clos...
PDF
Inside Out and Upside Down - FOO Camp 2016 - Peter Coffee
PDF
Big Data Goes to Work - Liberating Latent Value in a Connected World - P.Coffee
PDF
Forcing Functions: Reconceiving Everything - Peter Coffee at AITP San Diego C...
PDF
Forces of the Future That's Now - Peter Coffee at SoTeC 2015
PDF
Fusion Trumps Confusion - 2015
PDF
Unleash innovation on the Customer Success Platform
PDF
It's About The Citizen - Changing Needs and Rising Expectations
PDF
Busting Silos, Boosting Communities
PDF
What Is "Secure"?
PDF
Governing The Connected Everything
PDF
The Rising Floor of Platform - MIT Platform Summit 2014
PDF
New Services, No Silos: The Next 15 Years
PDF
How To Thrive In A World of Connected Customers
PDF
Looking Back at the Next Ten Years - Fusion Symposium 2024
PDF
Delighting the Customer - The New Business Normal
PDF
Redefining "Clean IT": Rejecting Incremental Improvement
Create And Keep a Customer
Snowforce 2017 Keynote - Peter Coffee
#PaveItForward 2016 - Peter Coffee
Game of Phones - Becoming the Architects of Connection (Midwest Dreamin' Clos...
Inside Out and Upside Down - FOO Camp 2016 - Peter Coffee
Big Data Goes to Work - Liberating Latent Value in a Connected World - P.Coffee
Forcing Functions: Reconceiving Everything - Peter Coffee at AITP San Diego C...
Forces of the Future That's Now - Peter Coffee at SoTeC 2015
Fusion Trumps Confusion - 2015
Unleash innovation on the Customer Success Platform
It's About The Citizen - Changing Needs and Rising Expectations
Busting Silos, Boosting Communities
What Is "Secure"?
Governing The Connected Everything
The Rising Floor of Platform - MIT Platform Summit 2014
New Services, No Silos: The Next 15 Years
How To Thrive In A World of Connected Customers
Looking Back at the Next Ten Years - Fusion Symposium 2024
Delighting the Customer - The New Business Normal
Redefining "Clean IT": Rejecting Incremental Improvement

Recently uploaded (20)

PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Modernizing your data center with Dell and AMD
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Encapsulation theory and applications.pdf
PDF
KodekX | Application Modernization Development
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PPT
Teaching material agriculture food technology
PPTX
Cloud computing and distributed systems.
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
Network Security Unit 5.pdf for BCA BBA.
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
PDF
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Modernizing your data center with Dell and AMD
Advanced methodologies resolving dimensionality complications for autism neur...
Unlocking AI with Model Context Protocol (MCP)
Encapsulation theory and applications.pdf
KodekX | Application Modernization Development
“AI and Expert System Decision Support & Business Intelligence Systems”
Diabetes mellitus diagnosis method based random forest with bat algorithm
Teaching material agriculture food technology
Cloud computing and distributed systems.
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Network Security Unit 5.pdf for BCA BBA.
Digital-Transformation-Roadmap-for-Companies.pptx
Review of recent advances in non-invasive hemoglobin estimation
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx

Cloud Security: Trust and Transformation

  • 1. Trust and Transformation: The Compelling Case for the Cloud Peter Coffee VP / Head of Platform Research salesforce.com inc.
  • 2. Public Clouds of Public Trust: The End of ‘Forbidden Zones’ General Economic Health & Defense & Transportation Government Development Human Services Public Safety Science & Environment Political Campaigns & Advocacy Culture & Education
  • 3. Cloud Objections Are Being Addressed  Security: American Bankers Association blog says an enterprise should “verify that any outsourcing partner meets its standards. However, once verified, a cloud partner can actually provide greater security.”  Capacity / Availability: – Overall service portfolio routinely exceeds 600M transactions/day – Availability routinely > four 9s, converging on 24 × 365 operations  Compliance: United States’ National Institute of Standards and Technology says cloud-resident data “can be more available, faster to restore, and more reliable… [and] less of a risk than having data dispersed on portable computers or removable media.”
  • 4. Best Practices Matter More than Data Location "There are five common factors that lead to the compromise of database information": • ignorance • poor password management • rampant account sharing • unfettered access to data • excessive portability of data DarkReading.com, October 2009
  • 5. Trusted Advisors Recommend the Cloud Potential benefits from transitioning to a public cloud computing environment: • Staff Specialization • Platform Strength • Resource Availability • Backup and Recovery • Mobile Endpoints • Data Concentration
  • 6. Force.com was designed from Line 1… …to be “Shared and Secure” Apply Data Login… Authenticate… Security Rules… View Filtered Content  Password security policies  Rich Sharing Rules  User Profiles  SSO/2-factor solutions
  • 7. Granular Privilege Assignment + Expanding Ecosystem of Management Tools
  • 8. All Assets Secured, All the Time Despite resource sharing, multitenancy will often improve security. Most current enterprise security models are perimeter-based, making you vulnerable to inside attacks. Multitenant services secure all assets at all times, since those within the main perimeter are all different clients… Multitenancy is here to stay. Our research and analysis indicates that multitenancy is not a less secure model — quite the opposite!
  • 9. Data Stewardship is a Practice, not a Technology  Data protection regulations – Where can it be stored? – Who’s allowed to see it?  Peel the onion of ‘compliance’ – Anonymize/encrypt/partition specific fields – Cloud disciplines can enhance auditability • Role-based privilege assignment • Actions taken using granted privileges  Looking beyond the FUD – USA PATRIOT Act sometimes causes concern about powers of US government to access data – Limited to information-gathering related to matters of urgent national security – Use of USA PATRIOT Act requires involvement by all three branches of the US government – Many other countries, including in Europe, have very similar powers
  • 10. Trust is Earned by Transparency
  • 11. Continued Availability Improvement Spring ‘11 Summer ‘11 Winter ‘12 inter ’12 release: downtime reduced to 2 hours “Great work reducing the pain of the quarterly upgrade so dramatically. urtheror difference to of maintenance downtime in downtime and The reduction our overstated.” 2 3 hours can’t be business between 2 or 3 minutes of FY13
  • 12. Becoming ‘Securely Social’  What is the organization’s mission?  What information supports that mission?  Where does it originate?  Who holds it?  Who can see it?  What events change it?  When is that important?  How do people know?  How can people act?  These are not new questions: NSA IAM introduced 2004
  • 13. Trust is Essential Enabler for Cloud Adoption  Robust infrastructure security  Rigorous operational security  Granular customer controls – Role-based privilege sets – Convenient access control & audit  “Sum of all fears” superset protection – Multi-tenancy reduces opportunities for error – The most demanding customer sets the bar – FISMA: FIPS 199 LOW and MODERATE – PCI DSS Compliance Level 1 – Comprehensive and continuing audit and certification
  • 14. Peter Coffee VP / Head of Platform Research pcoffee@salesforce.com facebook.com/peter.coffee twitter.com/petercoffee cloudblog.salesforce.com

Editor's Notes

  • #6: Granular, governable and auditable privilege assignment elevates security in the cloud above what’s achieved in legacy environments
  • #7: When you design from Day 1 for massive sharing, you build in a representation of data ownership from the bottom up instead of trying to construct a perimeter
  • #8: Granular, governable and auditable privilege assignment elevates security in the cloud above what’s achieved in legacy environments
  • #10: Regulations often fail to reflect the state of technology and the current understanding of best practices, but governments still…govern
  • #14: What security or similar certifications do you have? (i.e. FIPS, SAS-70, PCI)