SlideShare a Scribd company logo
How Privacy in the Cloud Affects
Organizations
Thilina Piyasundara
Systems Engineer
WSO2 Cloud Team
Agenda
Why Organizations Moving to Cloud?
Risks/Challenges in Cloud
Top Privacy Challenges in Cloud
Legal Obligations
How to Protect Privacy in Cloud?
Cloud Services for Organizations
Image source: https://blog.cloudsecurityalliance.org/wp-content/uploads/2014/07/top-20-enterprise-blog.jpeg
Why Organizations Moving to Cloud?
● Maintaining Focus on the Business
● Business Agility
● Reduced Capital Expenditures
● Scale
● Access from Anywhere
● Staffing Efficiency
● Security and Disaster Recovery
● API Driven Architectures and Collaboration Between Organizations
Statistics
How Privacy in the Cloud Affects Organizations
Risks/Challenges in Cloud
Data Breaches
*Not directly related to cloud
Top Privacy Challenges in Cloud
Data Breaches
http://www.informationisbeautiful.net/visualizations/worlds-biggest-data-breaches-hacks/
Legal Obligations
A business that stores information in the cloud must be able to control access
to and use of the information as well as protect the legal rights of the
individuals whose information has been sent to the cloud.
Laws prohibit some data from being used for secondary reasons other than
the purpose for which it was originally collected.
How to Protect Privacy in Cloud?
Privacy Principles
● Storage and security of personal information
● Access to personal information
● Correctness of personal information
● Limits on use of personal information
● Limits on disclosure of personal information
Shared Responsibility Model in Cloud
Data Protection
Securing data in creation
● How you collect or generate information?
○ Open forms
○ Insecure websites
○ Publically available data
○ Trust factors
● Solutions
○ Secure web applications
with authorization like
Google Forms
Securing data in rest
● How you protect data in rest (storage)?
○ Who can access data?
○ How you store data (raw files/binary/databases)?
○ What encryption algorithms use to encrypt data?
● Solutions
○ Manage user access to storages
○ Support multiple data centers in different geographical locations
○ Support full disk encryption and database encryption
○ Highly available data volumes for instances and object storages for
files/objects
Securing data while processing
● Where you process data?
○ Is the data processes in a shared environment?
● Solutions
Securing data while transmission
● How you move data from one location to another?
○ Can someone intercept and get your data?
○ Can someone alter your data streams?
● Solutions
○ Use IPSec VPNs
○ Use TLS for web traffic
○ Use DNSSec for DNS
Securing data archives
● How you keep backups?
○ Backup frequency
○ Data retention
○ Backup storage security
○ Access to backup data
○ Validate integrity
● Solutions
○ Encrypt before storing
○ Manage user access to archives and encryption keys
○ Replication over geographical locations
Destroy data securely
● How you delete data?
○ Data retention
○ Can we make public?
○ Can we forget about backups?
○ What about data storage hardware?
● Solutions
○ Write arbitrary data to data blocks
○ Cloud provides use standard ways to destruct data
Policies and Compliance
● Policies
○ Have a proper security policy
○ Manage proper data classification
○ Properly manage access to data in all stages
○ Align processes with international standards
● Compliance
○ EU data protection act
○ Health Insurance Portability and Accountability Act (HIPAA)
○ Children Online Privacy Protection Act (COPPA)
○ Electronic Communications Privacy Act (ECPA)
○ Fair Credit Reporting Act (FCRA)
○ Fair and Accurate Credit Transaction Act (FACTA)
○ Gramm Leach Bliley Act and the related privacy rules
How Privacy in the Cloud Affects Organizations
The Debate on Personal Privacy and National
Security
Thank You!

More Related Content

PDF
How Privacy in the Cloud Affects End-Users
PDF
Dealing with Common Data Requirements in Your Enterprise
PPTX
A Little Security For Big Data
PPTX
Your only as strong as your weakest link – Edward Ogden
PDF
Realizing the Value of Social: Evolving from Social Media to Customer Experience
PPTX
How can cas bs help
PPTX
Big data security challenges and recommendations!
PPTX
Security bigdata
How Privacy in the Cloud Affects End-Users
Dealing with Common Data Requirements in Your Enterprise
A Little Security For Big Data
Your only as strong as your weakest link – Edward Ogden
Realizing the Value of Social: Evolving from Social Media to Customer Experience
How can cas bs help
Big data security challenges and recommendations!
Security bigdata

What's hot (20)

PDF
SPUnite17 Microsoft Cloud Deutschland
PDF
Expanded top ten_big_data_security_and_privacy_challenges
PDF
Corporate & Regulatory Compliance Boot Camp - Data Privacy Compliance
PDF
C* Summit 2013: Lock it Up: Securing Sensitive Data by Sam Heywood
PDF
Personal Data Privacy Semantics in Multi-Agent Systems Interactions
PDF
Cloud Types and Security- Which one is right for you?
ODP
Securing The Cloud
PPTX
Jun 15 privacy in the cloud at financial institutions at the object managemen...
PPTX
PDF
Audit Log Protection: Avoiding a False Sense of Security
PDF
Kogni - A Data Security Product. Discovers, Secures, & Monitors Sensitive Ent...
PDF
What Is "Secure"?
PDF
Serverless Security Checklist
PPTX
Customer Data Privacy & Protection | Seclore
PDF
Enabling privacy and_traceability_in_supply_chains_using_blockchain_and_zero_...
PPTX
2010 07 BSidesLV Mobilizing The PCI Resistance 1c
PDF
dev.privacy: GDPR in a nutshell - Evan Tedeschi - Codemotion Amsterdam 2018
PPTX
Seclore Advantage Channel Program
PPTX
Cloud Data Security
PDF
Prevoty Integri Datasheet
SPUnite17 Microsoft Cloud Deutschland
Expanded top ten_big_data_security_and_privacy_challenges
Corporate & Regulatory Compliance Boot Camp - Data Privacy Compliance
C* Summit 2013: Lock it Up: Securing Sensitive Data by Sam Heywood
Personal Data Privacy Semantics in Multi-Agent Systems Interactions
Cloud Types and Security- Which one is right for you?
Securing The Cloud
Jun 15 privacy in the cloud at financial institutions at the object managemen...
Audit Log Protection: Avoiding a False Sense of Security
Kogni - A Data Security Product. Discovers, Secures, & Monitors Sensitive Ent...
What Is "Secure"?
Serverless Security Checklist
Customer Data Privacy & Protection | Seclore
Enabling privacy and_traceability_in_supply_chains_using_blockchain_and_zero_...
2010 07 BSidesLV Mobilizing The PCI Resistance 1c
dev.privacy: GDPR in a nutshell - Evan Tedeschi - Codemotion Amsterdam 2018
Seclore Advantage Channel Program
Cloud Data Security
Prevoty Integri Datasheet
Ad

Viewers also liked (20)

PDF
Detecção de Fraudes em Licitações Usando Batch Analytics com WSO2
PDF
Integração SAP com Plataformas 100% OpenSource
PDF
WSO2 Guest Webinar: Securing SaaS Apps with Multi-factor Authentication with ...
PDF
Webinar: Message Tracing and Debugging in WSO2 Enterprise Service Bus
PDF
Enhanced Developer Experience with WSO2 Enterprise Service Bus Tooling
PPTX
WSO2 Product Release Webinar: WSO2 Identity Server 5.2.0
PDF
WSO2Con USA 2017: Identity Solution Patterns
PDF
WSO2Con USA 2017: Introduction to Security: End-to-End Identity Management
PDF
Solution Architecture Patterns for Digital Transformation
PPTX
Identity Management for Web Application Developers
PDF
WSO2Con USA 2017: Implementing a Modern API Management Solution that Benefits...
PPTX
WSO2Con USA 2017: Building a Secure Enterprise
PDF
WSO2Con USA 2017: Positioning WSO2 for Quicker Uptake
PDF
WSO2Con USA 2017: Building an Effective API Architecture
PDF
WSO2Con USA 2017: Building Enterprise Grade IoT Architectures for Digital Tra...
PDF
WSO2Con USA 2017: Managing Verifone’s New Payment Device “Carbon” with WSO2’s...
PDF
WSO2Con USA 2017: Scalable Real-time Complex Event Processing at Uber
PDF
Google Analytics 100% (not provided) - what does it mean?
PPTX
Social Media and Privacy
PPT
Privacy & social media
Detecção de Fraudes em Licitações Usando Batch Analytics com WSO2
Integração SAP com Plataformas 100% OpenSource
WSO2 Guest Webinar: Securing SaaS Apps with Multi-factor Authentication with ...
Webinar: Message Tracing and Debugging in WSO2 Enterprise Service Bus
Enhanced Developer Experience with WSO2 Enterprise Service Bus Tooling
WSO2 Product Release Webinar: WSO2 Identity Server 5.2.0
WSO2Con USA 2017: Identity Solution Patterns
WSO2Con USA 2017: Introduction to Security: End-to-End Identity Management
Solution Architecture Patterns for Digital Transformation
Identity Management for Web Application Developers
WSO2Con USA 2017: Implementing a Modern API Management Solution that Benefits...
WSO2Con USA 2017: Building a Secure Enterprise
WSO2Con USA 2017: Positioning WSO2 for Quicker Uptake
WSO2Con USA 2017: Building an Effective API Architecture
WSO2Con USA 2017: Building Enterprise Grade IoT Architectures for Digital Tra...
WSO2Con USA 2017: Managing Verifone’s New Payment Device “Carbon” with WSO2’s...
WSO2Con USA 2017: Scalable Real-time Complex Event Processing at Uber
Google Analytics 100% (not provided) - what does it mean?
Social Media and Privacy
Privacy & social media
Ad

Similar to How Privacy in the Cloud Affects Organizations (20)

PDF
04 - VMUGIT - Lecce 2018 - Giampiero Petrosi, Rubrik
PDF
Understanding the Future of Data Storage
PPT
Effective data protection for businesses with multiple locations
PDF
Efficient Cloud Storage & Data Management Solutions
PDF
SureSkills GDPR - Discover the Smart Solution
PDF
cloud computing related to communication.pdf
PPTX
Group 4
PPTX
Group 4
PPTX
Webinar: How to Design Primary Storage for GDPR
PDF
Cloud data governance, risk management and compliance ny metro joint cyber...
PDF
A proposed Solution: Data Availability and Error Correction in Cloud Computing
PPTX
Make the Upgrade: Data protection in the cloud
PDF
Encryption Technique for a Trusted Cloud Computing Environment
PDF
H017155360
PDF
Encryption Technique for a Trusted Cloud Computing Environment
PDF
Encryption Technique for a Trusted Cloud Computing Environment
PDF
Safeguarding Sensitive Data with Encryption
PDF
Cloud Auditing With Zero Knowledge Privacy
PPTX
Unit -3.pptx cloud Security unit -3 notes
PPTX
Microsoft Cloud GDPR Compliance Options (SUGUK)
04 - VMUGIT - Lecce 2018 - Giampiero Petrosi, Rubrik
Understanding the Future of Data Storage
Effective data protection for businesses with multiple locations
Efficient Cloud Storage & Data Management Solutions
SureSkills GDPR - Discover the Smart Solution
cloud computing related to communication.pdf
Group 4
Group 4
Webinar: How to Design Primary Storage for GDPR
Cloud data governance, risk management and compliance ny metro joint cyber...
A proposed Solution: Data Availability and Error Correction in Cloud Computing
Make the Upgrade: Data protection in the cloud
Encryption Technique for a Trusted Cloud Computing Environment
H017155360
Encryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing Environment
Safeguarding Sensitive Data with Encryption
Cloud Auditing With Zero Knowledge Privacy
Unit -3.pptx cloud Security unit -3 notes
Microsoft Cloud GDPR Compliance Options (SUGUK)

More from WSO2 (20)

PDF
Demystifying CMS-0057-F - Compliance Made Seamless with WSO2
PDF
Quantum Threats Are Closer Than You Think – Act Now to Stay Secure
PDF
Modern Platform Engineering with Choreo - The AI-Native Internal Developer Pl...
PDF
Application Modernization with Choreo - The AI-Native Internal Developer Plat...
PDF
Build Smarter, Deliver Faster with Choreo - An AI Native Internal Developer P...
PDF
Platformless Modernization with Choreo.pdf
PDF
Application Modernization with Choreo for the BFSI Sector
PDF
Choreo - The AI-Native Internal Developer Platform as a Service: Overview
PDF
[Roundtable] Choreo - The AI-Native Internal Developer Platform as a Service
PPTX
WSO2Con 2025 - Building AI Applications in the Enterprise (Part 1)
PPTX
WSO2Con 2025 - Building Secure Business Customer and Partner Experience (B2B)...
PPTX
WSO2Con 2025 - Building Secure Customer Experience Apps
PPTX
WSO2Con 2025 - AI-Driven API Design, Development, and Consumption with Enhanc...
PPTX
WSO2Con 2025 - AI-Driven API Design, Development, and Consumption with Enhanc...
PPTX
WSO2Con 2025 - Unified Management of Ingress and Egress Across Multiple API G...
PPTX
WSO2Con 2025 - How an Internal Developer Platform Lets Developers Focus on Code
PPTX
WSO2Con 2025 - Architecting Cloud-Native Applications
PDF
Mastering Intelligent Digital Experiences with Platformless Modernization
PDF
Accelerate Enterprise Software Engineering with Platformless
PDF
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
Demystifying CMS-0057-F - Compliance Made Seamless with WSO2
Quantum Threats Are Closer Than You Think – Act Now to Stay Secure
Modern Platform Engineering with Choreo - The AI-Native Internal Developer Pl...
Application Modernization with Choreo - The AI-Native Internal Developer Plat...
Build Smarter, Deliver Faster with Choreo - An AI Native Internal Developer P...
Platformless Modernization with Choreo.pdf
Application Modernization with Choreo for the BFSI Sector
Choreo - The AI-Native Internal Developer Platform as a Service: Overview
[Roundtable] Choreo - The AI-Native Internal Developer Platform as a Service
WSO2Con 2025 - Building AI Applications in the Enterprise (Part 1)
WSO2Con 2025 - Building Secure Business Customer and Partner Experience (B2B)...
WSO2Con 2025 - Building Secure Customer Experience Apps
WSO2Con 2025 - AI-Driven API Design, Development, and Consumption with Enhanc...
WSO2Con 2025 - AI-Driven API Design, Development, and Consumption with Enhanc...
WSO2Con 2025 - Unified Management of Ingress and Egress Across Multiple API G...
WSO2Con 2025 - How an Internal Developer Platform Lets Developers Focus on Code
WSO2Con 2025 - Architecting Cloud-Native Applications
Mastering Intelligent Digital Experiences with Platformless Modernization
Accelerate Enterprise Software Engineering with Platformless
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation

Recently uploaded (20)

PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Empathic Computing: Creating Shared Understanding
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
Encapsulation_ Review paper, used for researhc scholars
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PPTX
Big Data Technologies - Introduction.pptx
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
PPTX
A Presentation on Artificial Intelligence
PDF
Approach and Philosophy of On baking technology
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
NewMind AI Monthly Chronicles - July 2025
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
CIFDAQ's Market Insight: SEC Turns Pro Crypto
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
“AI and Expert System Decision Support & Business Intelligence Systems”
Empathic Computing: Creating Shared Understanding
Diabetes mellitus diagnosis method based random forest with bat algorithm
The AUB Centre for AI in Media Proposal.docx
Encapsulation_ Review paper, used for researhc scholars
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Big Data Technologies - Introduction.pptx
Building Integrated photovoltaic BIPV_UPV.pdf
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
A Presentation on Artificial Intelligence
Approach and Philosophy of On baking technology
Chapter 3 Spatial Domain Image Processing.pdf
Unlocking AI with Model Context Protocol (MCP)
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
NewMind AI Monthly Chronicles - July 2025
Per capita expenditure prediction using model stacking based on satellite ima...
Understanding_Digital_Forensics_Presentation.pptx
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
CIFDAQ's Market Insight: SEC Turns Pro Crypto
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...

How Privacy in the Cloud Affects Organizations

  • 1. How Privacy in the Cloud Affects Organizations Thilina Piyasundara Systems Engineer WSO2 Cloud Team
  • 2. Agenda Why Organizations Moving to Cloud? Risks/Challenges in Cloud Top Privacy Challenges in Cloud Legal Obligations How to Protect Privacy in Cloud?
  • 3. Cloud Services for Organizations Image source: https://blog.cloudsecurityalliance.org/wp-content/uploads/2014/07/top-20-enterprise-blog.jpeg
  • 4. Why Organizations Moving to Cloud? ● Maintaining Focus on the Business ● Business Agility ● Reduced Capital Expenditures ● Scale ● Access from Anywhere ● Staffing Efficiency ● Security and Disaster Recovery ● API Driven Architectures and Collaboration Between Organizations
  • 8. Data Breaches *Not directly related to cloud
  • 11. Legal Obligations A business that stores information in the cloud must be able to control access to and use of the information as well as protect the legal rights of the individuals whose information has been sent to the cloud. Laws prohibit some data from being used for secondary reasons other than the purpose for which it was originally collected.
  • 12. How to Protect Privacy in Cloud?
  • 13. Privacy Principles ● Storage and security of personal information ● Access to personal information ● Correctness of personal information ● Limits on use of personal information ● Limits on disclosure of personal information
  • 16. Securing data in creation ● How you collect or generate information? ○ Open forms ○ Insecure websites ○ Publically available data ○ Trust factors ● Solutions ○ Secure web applications with authorization like Google Forms
  • 17. Securing data in rest ● How you protect data in rest (storage)? ○ Who can access data? ○ How you store data (raw files/binary/databases)? ○ What encryption algorithms use to encrypt data? ● Solutions ○ Manage user access to storages ○ Support multiple data centers in different geographical locations ○ Support full disk encryption and database encryption ○ Highly available data volumes for instances and object storages for files/objects
  • 18. Securing data while processing ● Where you process data? ○ Is the data processes in a shared environment? ● Solutions
  • 19. Securing data while transmission ● How you move data from one location to another? ○ Can someone intercept and get your data? ○ Can someone alter your data streams? ● Solutions ○ Use IPSec VPNs ○ Use TLS for web traffic ○ Use DNSSec for DNS
  • 20. Securing data archives ● How you keep backups? ○ Backup frequency ○ Data retention ○ Backup storage security ○ Access to backup data ○ Validate integrity ● Solutions ○ Encrypt before storing ○ Manage user access to archives and encryption keys ○ Replication over geographical locations
  • 21. Destroy data securely ● How you delete data? ○ Data retention ○ Can we make public? ○ Can we forget about backups? ○ What about data storage hardware? ● Solutions ○ Write arbitrary data to data blocks ○ Cloud provides use standard ways to destruct data
  • 22. Policies and Compliance ● Policies ○ Have a proper security policy ○ Manage proper data classification ○ Properly manage access to data in all stages ○ Align processes with international standards ● Compliance ○ EU data protection act ○ Health Insurance Portability and Accountability Act (HIPAA) ○ Children Online Privacy Protection Act (COPPA) ○ Electronic Communications Privacy Act (ECPA) ○ Fair Credit Reporting Act (FCRA) ○ Fair and Accurate Credit Transaction Act (FACTA) ○ Gramm Leach Bliley Act and the related privacy rules
  • 24. The Debate on Personal Privacy and National Security