SlideShare a Scribd company logo
THE CLOUD
IS AS SECURE AS
      YOU
 WANT IT TO BE



Debashis Banerjee (Yahoo! India)
My son’s first
                     day
                  at school




                      Catered Food
                 on my anniversary party




                 Money in
                 my bank

My seat on the
plane
Today’s Journey

        Refresher to                        Multi device
         the cloud                         Cloud Security
                                             – Mobiles


                                                OTP, SMS
  Ensuring                                     based multi
your cloud is                                  Factor auth
   secure


                Public, Private
                 and Hybrid       Secure
                Cloud Security     APIs


                                             Image: FreeDigitalPhotos.net
Cloud Computing - Refresher

•   Key aspects of using the cloud: Elasticity, On
    Demand, Multi Tenancy, Multi Device, Ability to
    measure Service

•   Type of Clouds - Public Clouds, Private Clouds,
    Hybrid Clouds, Community/Partner Clouds

•   SaaS , PaaS , IaaS
Key questions to ask about Cloud Security?

•   What do you need to protect? Who are your users?
•   Where does your data live? How does it flow? What
    geographies?
•   What are your compliance, logging needs?
•   Is there SSO and Identity management in place?
•   Do you have a mix of physical , virtual, cloud?
•   Who pays for security? Who is accountable for what
    aspect of security?
•   How do you react if a security breach takes place?
Ensuring your cloud solution is secure
                            Identity
                            Provider                                       Strong Auth
Secure                                                                     Multi
                                            Ingress and
Data                                     Egress Security                   Device
In backup                                 Federated SSO                    Access
                   Public Cloud          Privileged Access




                                                                 Geo-Political
   Multi Tenancy                             Private Cloud
                                                                 Considerations
Logging,                Secure Data at
Auditing                rest, motion
Compliance,
Playback                                                           Enterprise
                                           Physical, Virtual
                                           and cloud resources
              Wipeout,
              Encryption
Security in Public Cloud Deployments


•   Strong Identity management
•   Privileged Account Management
•   Place the appropriate type of data in the cloud
•   Have access to compliance and logging , auditing
•   Being a public cloud ensure you impose where you data
    can or cannot travel
•   Wipeout policies
•   Ensure you are comfortable with the security of multi
    tenancy
•   Secure keys
Security in the Private & Hybrid Cloud

   Private:
    • Design such that there is scope to move to a hybrid model

    • Impose SSO

   Hybrid:
    • Segregate your data between clouds

    • Use SAML and ensure appropriate enterprise credentials are
      within the perimeter
    • Have your Federation set up correctly. Enable SSO.

    •   Ensuring enterprise credentials do not travel into the cloud
Multi Device Cloud Security – Mobile Phones

•   The mobile device as an extension of the Cloud
•   Secure Mobile Apps on the cloud.
•   On Cloud and On Device virus scanning
•   Seamless policies for mobile devices
•   Credential life cycle management
•   Secure Roaming Users
Multi Factor Auth – OTPs, SMS based

   Use OTPs effectively to protect your data access to
    the cloud

       GoldKey

     Multi   Factor Auth – AWS/Gemalto

   2 Factor Auth using SMS



                                Image: http://commons.wikimedia.org/wiki/File:RSA-SecurID-Tokens.jpg
Some APIs useful in cloud security


•   Safe Browsing API

•   VM Safe APIs
In Conclusion

•   Cloud Security is critical to succeed in the cloud
•   Choose Private / Public / Hybrid cloud & SaaS /
    PaaS / IaaS
•   Identity & Privileged User Management
•   Compliance, Certification and Logging
•   Consider Multi Device Scenarios
•   Use Strong Authentication
Remember your questions about security to
1. Your child’s school
2. Your anniversary party caterers
3. Your airline
4. Your bank




      And you won’t go
      wrong with
      the Cloud Security !!!!
                                            Image: FreeDigitalPhotos.net

More Related Content

PDF
Cloud security - The Cloud is as Secure as you want it to be! - Indicthreads ...
PPTX
Have content, will travel securely sharing mobile content in the cloud part II
PDF
The cloud is as secure as you want it to be
PPTX
Wayfs and Strays - Jonathan Richardson
ZIP
Context Automation (with video demos)
PDF
9 basic MDM settings to get you started
PDF
Securityinsideout
PDF
Copyright and Technology London 2012: Content Identification - Werner Strydom...
Cloud security - The Cloud is as Secure as you want it to be! - Indicthreads ...
Have content, will travel securely sharing mobile content in the cloud part II
The cloud is as secure as you want it to be
Wayfs and Strays - Jonathan Richardson
Context Automation (with video demos)
9 basic MDM settings to get you started
Securityinsideout
Copyright and Technology London 2012: Content Identification - Werner Strydom...

What's hot (6)

PPT
Protect Your Passwords, Secure Your Servers
PDF
Identity Assertions Draftv5
PPT
P hallam baker_keynote
PPTX
Sogeti Cloud Seminar Identity In The Clouds
PDF
La era de los smart devices mexico
PDF
New Trends in Web Security
Protect Your Passwords, Secure Your Servers
Identity Assertions Draftv5
P hallam baker_keynote
Sogeti Cloud Seminar Identity In The Clouds
La era de los smart devices mexico
New Trends in Web Security
Ad

Viewers also liked (13)

DOC
1102700 laporan jobsheet 1 - vegi laten haju embulni sanyus
DOC
atul_resume
PDF
Debashis banerjee mobile_webappintrosecurity
PPT
Transaction unit1 topic 2
 
PPTX
Is there a Golden Ratio? Test Specialist to Developer in an Agile team
PPT
Changing trends in sw development
 
PPT
Section 3 resistive circuit analysis ii
PPT
Locks with updt nowait
 
PPT
Normalization
 
PPT
Overview of query evaluation
 
PPT
Multivalued dependency
 
PPT
Sequences
 
PPT
Locking unit 1 topic 3
 
1102700 laporan jobsheet 1 - vegi laten haju embulni sanyus
atul_resume
Debashis banerjee mobile_webappintrosecurity
Transaction unit1 topic 2
 
Is there a Golden Ratio? Test Specialist to Developer in an Agile team
Changing trends in sw development
 
Section 3 resistive circuit analysis ii
Locks with updt nowait
 
Normalization
 
Overview of query evaluation
 
Multivalued dependency
 
Sequences
 
Locking unit 1 topic 3
 
Ad

Similar to Debashis banerjee cloud_is_as_secure (20)

PDF
Enterprise Strategy for Cloud Security
PDF
Cloud Security - Made simple
PDF
Who owns security in the cloud
PPTX
Safe Net: Cloud Security Solutions
PPTX
Cloud security and security architecture
PPTX
2012 10 cloud security architecture
PDF
Cloud Security
PDF
Security of,for & by cloud
PPTX
Smart cloud - single to multi cloud
PDF
Smart Cards & Devices Forum 2012 - Securing Cloud Computing
PDF
Oded Tsur - Ca Cloud Security
PPTX
What customers want the cloud to be - Jason Waxman GM at Intel, Cloud Slam 20...
PDF
Security Considerations for Microservices and Multi cloud
PPTX
Brave new world of encryption v1
PDF
Projecting Enterprise Security Requirements on the Cloud
PDF
Peering Through the Cloud Forrester EMEA 2010
PPTX
Monetizing the Enterprise: Borderless Networks
PPTX
Enterprise Security in Hybrid Cloud ISACA-SV 2012
PPTX
Enterprise Security in Cloud
PDF
Simple cloud security explanation
Enterprise Strategy for Cloud Security
Cloud Security - Made simple
Who owns security in the cloud
Safe Net: Cloud Security Solutions
Cloud security and security architecture
2012 10 cloud security architecture
Cloud Security
Security of,for & by cloud
Smart cloud - single to multi cloud
Smart Cards & Devices Forum 2012 - Securing Cloud Computing
Oded Tsur - Ca Cloud Security
What customers want the cloud to be - Jason Waxman GM at Intel, Cloud Slam 20...
Security Considerations for Microservices and Multi cloud
Brave new world of encryption v1
Projecting Enterprise Security Requirements on the Cloud
Peering Through the Cloud Forrester EMEA 2010
Monetizing the Enterprise: Borderless Networks
Enterprise Security in Hybrid Cloud ISACA-SV 2012
Enterprise Security in Cloud
Simple cloud security explanation

Recently uploaded (20)

PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
Modernizing your data center with Dell and AMD
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
 
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
Approach and Philosophy of On baking technology
PDF
KodekX | Application Modernization Development
 
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PPTX
Big Data Technologies - Introduction.pptx
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
cuic standard and advanced reporting.pdf
PDF
Empathic Computing: Creating Shared Understanding
PDF
Review of recent advances in non-invasive hemoglobin estimation
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Modernizing your data center with Dell and AMD
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
 
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Approach and Philosophy of On baking technology
KodekX | Application Modernization Development
 
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Big Data Technologies - Introduction.pptx
Advanced methodologies resolving dimensionality complications for autism neur...
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Chapter 3 Spatial Domain Image Processing.pdf
Diabetes mellitus diagnosis method based random forest with bat algorithm
Mobile App Security Testing_ A Comprehensive Guide.pdf
NewMind AI Weekly Chronicles - August'25 Week I
Encapsulation_ Review paper, used for researhc scholars
cuic standard and advanced reporting.pdf
Empathic Computing: Creating Shared Understanding
Review of recent advances in non-invasive hemoglobin estimation

Debashis banerjee cloud_is_as_secure

  • 1. THE CLOUD IS AS SECURE AS YOU WANT IT TO BE Debashis Banerjee (Yahoo! India)
  • 2. My son’s first day at school Catered Food on my anniversary party Money in my bank My seat on the plane
  • 3. Today’s Journey Refresher to Multi device the cloud Cloud Security – Mobiles OTP, SMS Ensuring based multi your cloud is Factor auth secure Public, Private and Hybrid Secure Cloud Security APIs Image: FreeDigitalPhotos.net
  • 4. Cloud Computing - Refresher • Key aspects of using the cloud: Elasticity, On Demand, Multi Tenancy, Multi Device, Ability to measure Service • Type of Clouds - Public Clouds, Private Clouds, Hybrid Clouds, Community/Partner Clouds • SaaS , PaaS , IaaS
  • 5. Key questions to ask about Cloud Security? • What do you need to protect? Who are your users? • Where does your data live? How does it flow? What geographies? • What are your compliance, logging needs? • Is there SSO and Identity management in place? • Do you have a mix of physical , virtual, cloud? • Who pays for security? Who is accountable for what aspect of security? • How do you react if a security breach takes place?
  • 6. Ensuring your cloud solution is secure Identity Provider Strong Auth Secure Multi Ingress and Data Egress Security Device In backup Federated SSO Access Public Cloud Privileged Access Geo-Political Multi Tenancy Private Cloud Considerations Logging, Secure Data at Auditing rest, motion Compliance, Playback Enterprise Physical, Virtual and cloud resources Wipeout, Encryption
  • 7. Security in Public Cloud Deployments • Strong Identity management • Privileged Account Management • Place the appropriate type of data in the cloud • Have access to compliance and logging , auditing • Being a public cloud ensure you impose where you data can or cannot travel • Wipeout policies • Ensure you are comfortable with the security of multi tenancy • Secure keys
  • 8. Security in the Private & Hybrid Cloud  Private: • Design such that there is scope to move to a hybrid model • Impose SSO  Hybrid: • Segregate your data between clouds • Use SAML and ensure appropriate enterprise credentials are within the perimeter • Have your Federation set up correctly. Enable SSO. • Ensuring enterprise credentials do not travel into the cloud
  • 9. Multi Device Cloud Security – Mobile Phones • The mobile device as an extension of the Cloud • Secure Mobile Apps on the cloud. • On Cloud and On Device virus scanning • Seamless policies for mobile devices • Credential life cycle management • Secure Roaming Users
  • 10. Multi Factor Auth – OTPs, SMS based  Use OTPs effectively to protect your data access to the cloud  GoldKey  Multi Factor Auth – AWS/Gemalto  2 Factor Auth using SMS Image: http://commons.wikimedia.org/wiki/File:RSA-SecurID-Tokens.jpg
  • 11. Some APIs useful in cloud security • Safe Browsing API • VM Safe APIs
  • 12. In Conclusion • Cloud Security is critical to succeed in the cloud • Choose Private / Public / Hybrid cloud & SaaS / PaaS / IaaS • Identity & Privileged User Management • Compliance, Certification and Logging • Consider Multi Device Scenarios • Use Strong Authentication
  • 13. Remember your questions about security to 1. Your child’s school 2. Your anniversary party caterers 3. Your airline 4. Your bank And you won’t go wrong with the Cloud Security !!!! Image: FreeDigitalPhotos.net