SlideShare a Scribd company logo
OCDA U: SECURITY DATA PROTECTION
Matt Lowth (NAB)
Ian Lamont (BMW)
®
AGENDA
2ODCA Data Security 2013 |
Topic
Discuss
Learning
Cloud Data Security
- Usage Scenarios
- Data Security Challenges
- Data Security Lifecycle
Learnings and
Take-aways from this UM
TOPIC & UM BACKGROUND
The ODCA Contributor organizations have created this Usage Model to
collaboratively identify ways in how they agree cloud data security should be
managed, and so as to provide this as a clear message to the Cloud and
Solution Providers, and to share with the general public
The Data Security UM addresses:
1. Concept
2. Important enabling elements
3. Usage Scenario’s
4. Categorization of service
qualities in context of the UM
3ODCA Data Security 2013 |
UM CORE – KEY ELEMENTS
4
Different Security Methodology.
Protecting the data versus protecting your perimeter?
Important to understand what you’re protecting?
Options to lower the sensitivity
of the data by masking or encrypting it?
Ensure access and management
of your data is logged and monitored.
Data Security
Challenges
Data
Classification
Data
encryption &
masking
SIEM
ODCA Data Security 2013 |
COMMON ACCESS TYPES
5ODCA Data Security 2013 |
DATA SECURITY – USAGE SCENARIOS
6
What to think about before you move your
data to the cloud?
How to get your data to the cloud.
How to access your data in the cloud.
How to Backup/Restore information from the
cloud OR delete your data when you’re finished using it.
Transfer
Preparations
Data Transfer
Data Access
Other
Scenarios
ODCA Data Security 2013 |
KEY TAKEAWAYS FOR THIS UM
7
Your data is only as secure as your weakest link.
You need to consider what protection is necessary throughout
your data’s lifecycle, not just protecting the information in transit.
Where does your data live?
It is difficult to apply appropriate protection
to your data if you don’t understand the data’s sensitivity.
Develop
Securely
Data
Lifecycle
Data
Sovereignty
Understand
Your Data
ODCA Data Security 2013 |
KEY INDUSTRY ACTIONS
(STANDARDS AND MORE)
8
Data security must comply with country-specific legal requirements. These
requirements and their implications need to be clearly comprehended by
providers and subscribers.
Are requested to submit input on the proposed data security criteria for the
various assurance levels (Bronze, Silver, Gold, and Platinum).
Should examine their enterprises and understand the data security life cycle;
then they should validate their findings by comparing them to the RFP
questions.
Industry
Wide
Cloud
Provider
Cloud
Subscriber
ODCA Data Security 2013 |
INFORMATION AND ASSETS
9
Available to Members at: www.opendatacenteralliance.org
URL for Public content: www.opendatacenteralliance.org
Standardized
Response Checklists
Accelerate TTM
Shared Practices
Drive Scale
Streamlined
Requirements
Accelerate Adoption
ODCA Data Security 2013 |
QUESTIONS
10
www.opendatacenteralliance.org
UM: Cloud Data Security
From engagement to real adoption and
implementation
ODCA Data Security 2013 |
© 2013 Open Data Center Alliance, Inc. ALL RIGHTS RESERVED.

More Related Content

PDF
Boldon James - How Data Classification can harness the power of Big Data
PPTX
Privacy by Design as a system design strategy - EIC 2019
PPTX
Seclore Advantage Channel Program
PDF
Turtles, Trust and The Future of Cybersecurity
PPTX
Security 24 - Seclore
PPTX
Digital IQ in managing risk and cyber threats
PDF
Secure Islands Case Study - Financial Firm Implements Enhanced DLP
PDF
Qubole GDPR Security and Compliance Whitepaper
Boldon James - How Data Classification can harness the power of Big Data
Privacy by Design as a system design strategy - EIC 2019
Seclore Advantage Channel Program
Turtles, Trust and The Future of Cybersecurity
Security 24 - Seclore
Digital IQ in managing risk and cyber threats
Secure Islands Case Study - Financial Firm Implements Enhanced DLP
Qubole GDPR Security and Compliance Whitepaper

What's hot (20)

PPTX
Webinar: Data Classification - Closing the Gap between Enterprise and SAP Data
PDF
18 Tips for Data Classification - Data Sheet by Secure Islands
PPTX
IRDAI Compliance & Data-Centric Security | Seclore
DOCX
Data privacy and security in uae
PDF
Boldon James - SharePoint: information security's weakest link?
PDF
The journey to Private AI, where Privacy-Preserving ML meets DLT
PPT
3 oraclex evento reg puglia_v2017-09-14-2
PDF
___2360_SP_RBR_4pp_FINAL---Screen
PDF
ISACA Journal Publication - Does your Cloud have a Secure Lining? Shah Sheikh
PDF
Dlp Methodology
PPTX
Introduction to RESILIA and Cyber Resilience
PDF
Cloud Security Governance
PPTX
New York Metro ISSA - PCI DSS Compliance - Ulf Mattsson 2009
PDF
Arthur van der Wees, Arthur's Legal on Making Cloud SLAs readily usable in th...
PDF
Introduction to International Standardization
PDF
TITUS - Top Reasons For Data Classification
PPTX
The EU General Protection Regulation and how Oracle can help
DOCX
Data Security
PDF
Kerangka untuk RPM Information Security Governance: COBIT 5 for Information S...
Webinar: Data Classification - Closing the Gap between Enterprise and SAP Data
18 Tips for Data Classification - Data Sheet by Secure Islands
IRDAI Compliance & Data-Centric Security | Seclore
Data privacy and security in uae
Boldon James - SharePoint: information security's weakest link?
The journey to Private AI, where Privacy-Preserving ML meets DLT
3 oraclex evento reg puglia_v2017-09-14-2
___2360_SP_RBR_4pp_FINAL---Screen
ISACA Journal Publication - Does your Cloud have a Secure Lining? Shah Sheikh
Dlp Methodology
Introduction to RESILIA and Cyber Resilience
Cloud Security Governance
New York Metro ISSA - PCI DSS Compliance - Ulf Mattsson 2009
Arthur van der Wees, Arthur's Legal on Making Cloud SLAs readily usable in th...
Introduction to International Standardization
TITUS - Top Reasons For Data Classification
The EU General Protection Regulation and how Oracle can help
Data Security
Kerangka untuk RPM Information Security Governance: COBIT 5 for Information S...
Ad

Similar to Forecast odcau7 100_ak2 (20)

PPTX
Forecast odcau6 100_eb
PDF
Expanded top ten_big_data_security_and_privacy_challenges
PDF
Top ten big data security and privacy challenges
PPTX
Information security group presentation
PDF
Design and implement a new cloud security method based on multi clouds on ope...
PDF
DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...
PPTX
Information security group presentation ppt
PDF
Ad4502189193
PDF
Cloud Auditing With Zero Knowledge Privacy
PDF
Modern Methods for Managing Data Security
PPTX
Unit -3.pptx cloud Security unit -3 notes
PPTX
Cloud Services As An Enabler: The Strategic, Legal & Pragmatic Approach
PPTX
Cloud Services As An Enabler
PDF
A proposed Solution: Data Availability and Error Correction in Cloud Computing
PDF
Cyber Cops: CloudSecurity - Safeguarding Data in the Cloud
PDF
Preventing Data Cloud Breaches with Zero Trust
PDF
APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...
PPTX
Security in cloud computing
PDF
Security and privacy approach of cloud computing
PPTX
Data_Security_inrefef_CloudComputing.pptx
Forecast odcau6 100_eb
Expanded top ten_big_data_security_and_privacy_challenges
Top ten big data security and privacy challenges
Information security group presentation
Design and implement a new cloud security method based on multi clouds on ope...
DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...
Information security group presentation ppt
Ad4502189193
Cloud Auditing With Zero Knowledge Privacy
Modern Methods for Managing Data Security
Unit -3.pptx cloud Security unit -3 notes
Cloud Services As An Enabler: The Strategic, Legal & Pragmatic Approach
Cloud Services As An Enabler
A proposed Solution: Data Availability and Error Correction in Cloud Computing
Cyber Cops: CloudSecurity - Safeguarding Data in the Cloud
Preventing Data Cloud Breaches with Zero Trust
APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...
Security in cloud computing
Security and privacy approach of cloud computing
Data_Security_inrefef_CloudComputing.pptx
Ad

More from Open Data Center Alliance (20)

PPTX
ODCA DevOps: Magnifying Business Value
PPTX
Cloud & Enterprise IT. Hybrid IT, Coexistence Strategies
PPTX
Open Data Center Alliance 2014 Member Survey on Cloud Adoption
PDF
ODCA Board Best Practice: High Performance Computing at BMW
PDF
Forecast 2014: Making Better Business Decisions with Big Data and IoT
PDF
Forecast 2014: The Grand Challenge, Simplifying IT to Unleash Innovation
PDF
Forecast 2014: Why Open Platforms Matter to Enterprises and Developers
PDF
Forecast 2014: ODCA Cloud Maturity Model V2.0
PDF
Forecast 2014: TOSCA: An Open Standard for Business Application Agility and P...
PDF
Forecast 2014: Maximizing Your Cloud Service Quality and Costs
PDF
Forecast 2014: TOSCA Proof of Concept
PDF
Forecast 2014: Welcome to the ODCA University - School is Way Cool!
PDF
Forecast 2014: Software Defined Networking - What's New?
PDF
Forecast 2014: Cloud-Aware Applications
PDF
Forecast 2014: eDiscovery and Forensics
PDF
Forecast 2014: Cloud Service Brokering
PDF
Forecast 2014: Infrastructure as a Service (IaaS)
PDF
Forecast 2014: SaaS Data Exchange
PDF
Forecast 2014: Business Strategy Enabled by Cloud
PDF
Forecast 2014 Keynote: Re-architecting the Data Center for the Digital Servic...
ODCA DevOps: Magnifying Business Value
Cloud & Enterprise IT. Hybrid IT, Coexistence Strategies
Open Data Center Alliance 2014 Member Survey on Cloud Adoption
ODCA Board Best Practice: High Performance Computing at BMW
Forecast 2014: Making Better Business Decisions with Big Data and IoT
Forecast 2014: The Grand Challenge, Simplifying IT to Unleash Innovation
Forecast 2014: Why Open Platforms Matter to Enterprises and Developers
Forecast 2014: ODCA Cloud Maturity Model V2.0
Forecast 2014: TOSCA: An Open Standard for Business Application Agility and P...
Forecast 2014: Maximizing Your Cloud Service Quality and Costs
Forecast 2014: TOSCA Proof of Concept
Forecast 2014: Welcome to the ODCA University - School is Way Cool!
Forecast 2014: Software Defined Networking - What's New?
Forecast 2014: Cloud-Aware Applications
Forecast 2014: eDiscovery and Forensics
Forecast 2014: Cloud Service Brokering
Forecast 2014: Infrastructure as a Service (IaaS)
Forecast 2014: SaaS Data Exchange
Forecast 2014: Business Strategy Enabled by Cloud
Forecast 2014 Keynote: Re-architecting the Data Center for the Digital Servic...

Recently uploaded (20)

PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
CIFDAQ's Market Insight: SEC Turns Pro Crypto
PDF
Machine learning based COVID-19 study performance prediction
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Electronic commerce courselecture one. Pdf
PDF
Approach and Philosophy of On baking technology
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
KodekX | Application Modernization Development
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
NewMind AI Monthly Chronicles - July 2025
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Encapsulation theory and applications.pdf
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
20250228 LYD VKU AI Blended-Learning.pptx
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
CIFDAQ's Market Insight: SEC Turns Pro Crypto
Machine learning based COVID-19 study performance prediction
Diabetes mellitus diagnosis method based random forest with bat algorithm
Electronic commerce courselecture one. Pdf
Approach and Philosophy of On baking technology
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Network Security Unit 5.pdf for BCA BBA.
Unlocking AI with Model Context Protocol (MCP)
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
KodekX | Application Modernization Development
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Mobile App Security Testing_ A Comprehensive Guide.pdf
NewMind AI Monthly Chronicles - July 2025
Reach Out and Touch Someone: Haptics and Empathic Computing
Encapsulation theory and applications.pdf
Digital-Transformation-Roadmap-for-Companies.pptx
Review of recent advances in non-invasive hemoglobin estimation
Dropbox Q2 2025 Financial Results & Investor Presentation

Forecast odcau7 100_ak2

  • 1. OCDA U: SECURITY DATA PROTECTION Matt Lowth (NAB) Ian Lamont (BMW) ®
  • 2. AGENDA 2ODCA Data Security 2013 | Topic Discuss Learning Cloud Data Security - Usage Scenarios - Data Security Challenges - Data Security Lifecycle Learnings and Take-aways from this UM
  • 3. TOPIC & UM BACKGROUND The ODCA Contributor organizations have created this Usage Model to collaboratively identify ways in how they agree cloud data security should be managed, and so as to provide this as a clear message to the Cloud and Solution Providers, and to share with the general public The Data Security UM addresses: 1. Concept 2. Important enabling elements 3. Usage Scenario’s 4. Categorization of service qualities in context of the UM 3ODCA Data Security 2013 |
  • 4. UM CORE – KEY ELEMENTS 4 Different Security Methodology. Protecting the data versus protecting your perimeter? Important to understand what you’re protecting? Options to lower the sensitivity of the data by masking or encrypting it? Ensure access and management of your data is logged and monitored. Data Security Challenges Data Classification Data encryption & masking SIEM ODCA Data Security 2013 |
  • 5. COMMON ACCESS TYPES 5ODCA Data Security 2013 |
  • 6. DATA SECURITY – USAGE SCENARIOS 6 What to think about before you move your data to the cloud? How to get your data to the cloud. How to access your data in the cloud. How to Backup/Restore information from the cloud OR delete your data when you’re finished using it. Transfer Preparations Data Transfer Data Access Other Scenarios ODCA Data Security 2013 |
  • 7. KEY TAKEAWAYS FOR THIS UM 7 Your data is only as secure as your weakest link. You need to consider what protection is necessary throughout your data’s lifecycle, not just protecting the information in transit. Where does your data live? It is difficult to apply appropriate protection to your data if you don’t understand the data’s sensitivity. Develop Securely Data Lifecycle Data Sovereignty Understand Your Data ODCA Data Security 2013 |
  • 8. KEY INDUSTRY ACTIONS (STANDARDS AND MORE) 8 Data security must comply with country-specific legal requirements. These requirements and their implications need to be clearly comprehended by providers and subscribers. Are requested to submit input on the proposed data security criteria for the various assurance levels (Bronze, Silver, Gold, and Platinum). Should examine their enterprises and understand the data security life cycle; then they should validate their findings by comparing them to the RFP questions. Industry Wide Cloud Provider Cloud Subscriber ODCA Data Security 2013 |
  • 9. INFORMATION AND ASSETS 9 Available to Members at: www.opendatacenteralliance.org URL for Public content: www.opendatacenteralliance.org Standardized Response Checklists Accelerate TTM Shared Practices Drive Scale Streamlined Requirements Accelerate Adoption ODCA Data Security 2013 |
  • 10. QUESTIONS 10 www.opendatacenteralliance.org UM: Cloud Data Security From engagement to real adoption and implementation ODCA Data Security 2013 |
  • 11. © 2013 Open Data Center Alliance, Inc. ALL RIGHTS RESERVED.

Editor's Notes

  • #5: N-Tier architecture vs protect the data.Low/Medium/High confidentiality, important to understand these concepts What else can you do with the data to protect it? SIEM - (Compliance monitoring / Provider assurance) – you just missed it. – you should come to the previous session.Ian: Ask what’s happening in BMW for Data Classification & SIEM?
  • #6: Different access types- Customer Data AccessThe customer typically accesses data in the cloud through an application which provides him a service around the data. The customer will typically come from an uncontrollable external network – generalized as Internet. The access goes through a traditional DMZ architecture with an outer firewall – a reverse proxy enforcing the user authentication and applying access control for the requested application.Staff Data AccessStaff members will access their resources in the cloud through their enterprise firewall or virtual private network (VPN) connection to an access gateway which ensures the user is coming from an identified organization (the cloud subscriber). Staff members will perform admin tasks as well as use applications running in the cloud. Basically, their roles and accessible resources will be controlled by an access control or policy server similar to that controlling the access of the customers (i.e., from a cloud provider’s point of view, these are all customers).- Sysadmin Data AccessThe SysAdmin has OS-level access the the cloud provider’s servers and is under control of an admin gateway to limit the access to systems the admin is entitled to. The admin gateway can be implemented as a function on each server, which enforces role-based access control on the OS level (e.g., PowerBroker).Figure 6 illustrates the SysAdmin access path to data. Basically, the SysAdmin has access to all servers on the OS level. He always accesses data directly, as he has no application entitlements.Application Data AccessThings to think about here include whether you need to think about MASSL for auth, account credentials etc..See the Identity mgmt usage models.
  • #8: Data Sovereignty – In .AU, lots of talk of it, but no real impacts as of yet as people aren’t using public cloud for highly sensitive services. I hear Data Sovereignty is a problem in Europe – how do you see this affecting Cloud adoption in this area?