SlideShare a Scribd company logo
Implementing Cyber Security In
              &
      From The Cloud
      LS Subramanian



          niseindia.com
Today’s Agenda
Cloud Security Alliance (CSA)
CSA’s
“ Security Guidance for Critical Areas
  of Focus in Cloud Computing V 3.0”
Cyber Security Solutions in the Cloud
and from the cloud.
About the Cloud Security Alliance
• Global, not-for-profit organization
• Over 23,000 individual members, 100 corporate
    members, 50 chapters
•   Building best practices and a trusted cloud ecosystem
•   Agile philosophy, rapid development of applied research
     – GRC: Balance compliance with risk management
     – Reference models: build using existing standards
     – Identity: a key foundation of a functioning cloud
       economy
     – Champion interoperability
     – Enable innovation
     – Advocacy of prudent public policy
    “To promote the use of best practices for providing security assurance within
      Cloud Computing, and provide education on the uses of Cloud Computing to
                      help secure all other forms of computing.”
CSA - Initiatives




https://cloudsecurityalliance.org/research/




        Copyright © 2011 Cloud Security Alliance
HOW DO WE BUILD THE
        “TRUSTED CLOUD?”…
•   Strategy
•   Education
•   Security Framework
•   Assessment
•   Build for the Future




                   Copyright © 2011 Cloud Security Alliance   www.cloudsecurityalliance.org
Security Guidance
           for
Critical Areas of Focus
            in
Cloud Computing V3.0
    Prepared by the
Cloud Security Alliance
What is Cloud Computing?
CSA Security Guidance
Cloud Computing Architecture
CSA Security Guidance
 What is Security for Cloud Computing?
Understanding the impact of these differences between
service models and how they are deployed is critical to
     managing the risk posture of an organization.
CSA Guidance Domains

                      Architecture
1. Cloud Computing Architectural Framework
               Governing in the Cloud
2. Governance & Enterprise Risk Management
3. Legal Issues : Contracts & Electronic Discovery
4. Compliance & Audit Management
5. Information Management & Data Security
6. Interoperability & Portability
CSA Guidance Domains
               Operating in the Cloud
7. Traditional Security, Business Continuity & DR
8. Data Center Operations
9. Incident Response
10. Application Security
11. Encryption & Key Mgmt
12. Identity & Access Mgmt
13. Virtualization
14. Security as a Service
CSA - Trend Micro Partnership
 Founding Sponsor of CSA’s HQ in APAC
 Chair of the CSA Executive Council
 Sponsor one global CSA research project
 Sponsor of all CSA events in APAC
 Update from all CSA Chapters in APAC
 CCSK certification for Trend Micro cloud security experts
 Engaging regional key stake holders including government,
  legal experts, service providers, technology providers and
  consumers.
 Customizing/developing relevant best practices and standards
  for the APAC market.
 Centre of excellence for research and training.
 Establishment of global standards secretariat within APAC
Cyber Security Solutions in the
  Cloud and from the cloud
Who Has Control?

 Servers     Virtualization &                      Public Cloud                                Public Cloud Public Cloud
             Private Cloud’’’’’                    IaaS                                        PaaS         SaaS




    End-User (Enterprise)                                                                              Service Provider




                            Trend Micro Confidential 2/26/2013   Copyright 2009 Trend Micro Inc.
SecureCloud: Enterprise Controlled
Data Protection for the Cloud
   Patent pending Trend Micro technology enables
   enterprises to retain control of data in the cloud




                    Trend Micro Confidential2/26/2013   Copyright 2009 Trend Micro Inc. 15
A New Security Architecture For A New Era
 All environments should be considered un-trusted
                Users
                access app
                                                       Deep Security

Datacenter       SecureCloud:
                 •  Facilitates movement between
                                                                       Public Cloud
                    datacenter & cloud
                 •  Delivers control, security and
                    compliance through encryption
                 •                      Host defends
                    Avoids service provider lock-in
                 •                      itself from attack
                    Enables secure storage recycling

                                                         SecureCloud
             Data encrypted
             within the server
                                      Encryption keys
                                      controlled by you

                             Encrypted
    Data                     Data                                        Data

                                   Copyright 2009 Trend Micro Inc.
CNAM – Real Time Attack Detection
ARCHITECTURE
CNAM – Real Time Attack Detection

TOPOLOGY
CNAM – Real Time Attack Detection
MODEL
Acknowledgement
  All ownership and credits for pictures, logos copyright
            and trademarks rests with the owners.
  We Acknowledge & thank owners for the use of their
material in this presentation to educate on cloud computing.



   Material for this presentation has been sourced from
   CSA, NIST & Trend Micro & Net Monastery & others.
   We thank the organizations for allowing us to use this
                          material.
The Future of Computing is the
            Cloud

   lssubramanian@niseindia.com

More Related Content

PDF
secureit-cloudsecurity-151130141528-lva1-app6892.pdf
PPTX
2012 10 cloud security architecture
PPTX
The Cloud & I, The CISO challenges with Cloud Computing
PPTX
ProtectV - Data Security for the Cloud
PPTX
Cloud Security
PDF
Cloud Security & Cloud Encryption Explained
PDF
2022 Q1 Webinar Securite du Cloud public (1).pdf
PDF
Cloud Computing Security - Cloud Controls Security
secureit-cloudsecurity-151130141528-lva1-app6892.pdf
2012 10 cloud security architecture
The Cloud & I, The CISO challenges with Cloud Computing
ProtectV - Data Security for the Cloud
Cloud Security
Cloud Security & Cloud Encryption Explained
2022 Q1 Webinar Securite du Cloud public (1).pdf
Cloud Computing Security - Cloud Controls Security

What's hot (20)

PDF
CCSK, cloud security framework, Indonesia
PDF
Cloud security
PPTX
Security as a Service Model for Cloud Environment
PDF
Automated Security for the Real-time Enterprise with VMware NSX and Trend Mic...
PPTX
cloud security ppt
PPTX
Cloud Security for U.S. Military Agencies
PPTX
Security As A Service In Cloud(SECaaS)
PDF
Cloud Security Guide - Ref Architecture and Gov. Model
PPTX
C-Level tools for Cloud security
PPTX
Cloud security privacy- org
PDF
Cloud Security: A New Perspective
PDF
Cloud Security Governance
PPTX
Cloud security and security architecture
PDF
SECURE CLOUD ARCHITECTURE
PDF
Cloud Security
PPTX
Rik Ferguson
PDF
Cloud Security Demystified
PPTX
The Notorious 9 Cloud Computing Threats - CSA Congress, San Jose
PDF
Cyber Security and Cloud Computing
PDF
Cloud summit demystifying cloud security
CCSK, cloud security framework, Indonesia
Cloud security
Security as a Service Model for Cloud Environment
Automated Security for the Real-time Enterprise with VMware NSX and Trend Mic...
cloud security ppt
Cloud Security for U.S. Military Agencies
Security As A Service In Cloud(SECaaS)
Cloud Security Guide - Ref Architecture and Gov. Model
C-Level tools for Cloud security
Cloud security privacy- org
Cloud Security: A New Perspective
Cloud Security Governance
Cloud security and security architecture
SECURE CLOUD ARCHITECTURE
Cloud Security
Rik Ferguson
Cloud Security Demystified
The Notorious 9 Cloud Computing Threats - CSA Congress, San Jose
Cyber Security and Cloud Computing
Cloud summit demystifying cloud security
Ad

Similar to Lss implementing cyber security in the cloud, and from the cloud-feb14 (20)

PPTX
What is Cloud Security, and Can I Have Some?
PDF
Nils Puhlmann Ncoic Slides
PPTX
Securing The Clouds Proactively-BlackisTech.pptx
PDF
Who owns security in the cloud
PPT
Presentation on Effectively and Securely Using the Cloud Computing Paradigm v26
PPT
Presentation On Effectively And Securely Using The Cloud Computing Paradigm V26
PPT
Effectively and Securely Using the Cloud Computing Paradigm
PPT
Cloudcomputingoct2009 100301142544-phpapp02
PDF
Cloud computing understanding security risk and management
PDF
Presd1 10
PPTX
Cloud computing and Cloud security fundamentals
PPT
4831586.ppt
PPTX
talk6securingcloudamarprusty-191030091632.pptx
PDF
Ciphercloud Solutions Overview hsa oct2011
PDF
ISACA Journal Publication - Does your Cloud have a Secure Lining? Shah Sheikh
PPT
Cloud Security Alliance's GRC Stack Overview
PDF
Dr. Michael Valivullah, NASS/USDA - Cloud Computing
PDF
Cloudsecurity
PDF
Taiye Lambo - Auditing the cloud
PDF
INFORMATION SECURITY IN CLOUD COMPUTING
What is Cloud Security, and Can I Have Some?
Nils Puhlmann Ncoic Slides
Securing The Clouds Proactively-BlackisTech.pptx
Who owns security in the cloud
Presentation on Effectively and Securely Using the Cloud Computing Paradigm v26
Presentation On Effectively And Securely Using The Cloud Computing Paradigm V26
Effectively and Securely Using the Cloud Computing Paradigm
Cloudcomputingoct2009 100301142544-phpapp02
Cloud computing understanding security risk and management
Presd1 10
Cloud computing and Cloud security fundamentals
4831586.ppt
talk6securingcloudamarprusty-191030091632.pptx
Ciphercloud Solutions Overview hsa oct2011
ISACA Journal Publication - Does your Cloud have a Secure Lining? Shah Sheikh
Cloud Security Alliance's GRC Stack Overview
Dr. Michael Valivullah, NASS/USDA - Cloud Computing
Cloudsecurity
Taiye Lambo - Auditing the cloud
INFORMATION SECURITY IN CLOUD COMPUTING
Ad

Recently uploaded (20)

PDF
Hindu Circuler Economy - Model (Concept)
PDF
DOC-20250806-WA0002._20250806_112011_0000.pdf
PDF
Power and position in leadershipDOC-20250808-WA0011..pdf
PDF
Nidhal Samdaie CV - International Business Consultant
PDF
Lecture 3 - Risk Management and Compliance.pdf
PDF
Chapter 5_Foreign Exchange Market in .pdf
PDF
Types of control:Qualitative vs Quantitative
PPTX
DMT - Profile Brief About Business .pptx
DOCX
unit 1 COST ACCOUNTING AND COST SHEET
PDF
Roadmap Map-digital Banking feature MB,IB,AB
PDF
A Brief Introduction About Julia Allison
PDF
MSPs in 10 Words - Created by US MSP Network
PDF
Reconciliation AND MEMORANDUM RECONCILATION
PPTX
ICG2025_ICG 6th steering committee 30-8-24.pptx
PPTX
AI-assistance in Knowledge Collection and Curation supporting Safe and Sustai...
PDF
Elevate Cleaning Efficiency Using Tallfly Hair Remover Roller Factory Expertise
PPTX
Amazon (Business Studies) management studies
DOCX
unit 2 cost accounting- Tender and Quotation & Reconciliation Statement
PDF
Laughter Yoga Basic Learning Workshop Manual
PDF
Katrina Stoneking: Shaking Up the Alcohol Beverage Industry
Hindu Circuler Economy - Model (Concept)
DOC-20250806-WA0002._20250806_112011_0000.pdf
Power and position in leadershipDOC-20250808-WA0011..pdf
Nidhal Samdaie CV - International Business Consultant
Lecture 3 - Risk Management and Compliance.pdf
Chapter 5_Foreign Exchange Market in .pdf
Types of control:Qualitative vs Quantitative
DMT - Profile Brief About Business .pptx
unit 1 COST ACCOUNTING AND COST SHEET
Roadmap Map-digital Banking feature MB,IB,AB
A Brief Introduction About Julia Allison
MSPs in 10 Words - Created by US MSP Network
Reconciliation AND MEMORANDUM RECONCILATION
ICG2025_ICG 6th steering committee 30-8-24.pptx
AI-assistance in Knowledge Collection and Curation supporting Safe and Sustai...
Elevate Cleaning Efficiency Using Tallfly Hair Remover Roller Factory Expertise
Amazon (Business Studies) management studies
unit 2 cost accounting- Tender and Quotation & Reconciliation Statement
Laughter Yoga Basic Learning Workshop Manual
Katrina Stoneking: Shaking Up the Alcohol Beverage Industry

Lss implementing cyber security in the cloud, and from the cloud-feb14

  • 1. Implementing Cyber Security In & From The Cloud LS Subramanian niseindia.com
  • 2. Today’s Agenda Cloud Security Alliance (CSA) CSA’s “ Security Guidance for Critical Areas of Focus in Cloud Computing V 3.0” Cyber Security Solutions in the Cloud and from the cloud.
  • 3. About the Cloud Security Alliance • Global, not-for-profit organization • Over 23,000 individual members, 100 corporate members, 50 chapters • Building best practices and a trusted cloud ecosystem • Agile philosophy, rapid development of applied research – GRC: Balance compliance with risk management – Reference models: build using existing standards – Identity: a key foundation of a functioning cloud economy – Champion interoperability – Enable innovation – Advocacy of prudent public policy “To promote the use of best practices for providing security assurance within Cloud Computing, and provide education on the uses of Cloud Computing to help secure all other forms of computing.”
  • 5. HOW DO WE BUILD THE “TRUSTED CLOUD?”… • Strategy • Education • Security Framework • Assessment • Build for the Future Copyright © 2011 Cloud Security Alliance www.cloudsecurityalliance.org
  • 6. Security Guidance for Critical Areas of Focus in Cloud Computing V3.0 Prepared by the Cloud Security Alliance
  • 7. What is Cloud Computing?
  • 8. CSA Security Guidance Cloud Computing Architecture
  • 9. CSA Security Guidance What is Security for Cloud Computing? Understanding the impact of these differences between service models and how they are deployed is critical to managing the risk posture of an organization.
  • 10. CSA Guidance Domains Architecture 1. Cloud Computing Architectural Framework Governing in the Cloud 2. Governance & Enterprise Risk Management 3. Legal Issues : Contracts & Electronic Discovery 4. Compliance & Audit Management 5. Information Management & Data Security 6. Interoperability & Portability
  • 11. CSA Guidance Domains Operating in the Cloud 7. Traditional Security, Business Continuity & DR 8. Data Center Operations 9. Incident Response 10. Application Security 11. Encryption & Key Mgmt 12. Identity & Access Mgmt 13. Virtualization 14. Security as a Service
  • 12. CSA - Trend Micro Partnership  Founding Sponsor of CSA’s HQ in APAC  Chair of the CSA Executive Council  Sponsor one global CSA research project  Sponsor of all CSA events in APAC  Update from all CSA Chapters in APAC  CCSK certification for Trend Micro cloud security experts  Engaging regional key stake holders including government, legal experts, service providers, technology providers and consumers.  Customizing/developing relevant best practices and standards for the APAC market.  Centre of excellence for research and training.  Establishment of global standards secretariat within APAC
  • 13. Cyber Security Solutions in the Cloud and from the cloud
  • 14. Who Has Control? Servers Virtualization & Public Cloud Public Cloud Public Cloud Private Cloud’’’’’ IaaS PaaS SaaS End-User (Enterprise) Service Provider Trend Micro Confidential 2/26/2013 Copyright 2009 Trend Micro Inc.
  • 15. SecureCloud: Enterprise Controlled Data Protection for the Cloud Patent pending Trend Micro technology enables enterprises to retain control of data in the cloud Trend Micro Confidential2/26/2013 Copyright 2009 Trend Micro Inc. 15
  • 16. A New Security Architecture For A New Era All environments should be considered un-trusted Users access app Deep Security Datacenter SecureCloud: • Facilitates movement between Public Cloud datacenter & cloud • Delivers control, security and compliance through encryption • Host defends Avoids service provider lock-in • itself from attack Enables secure storage recycling SecureCloud Data encrypted within the server Encryption keys controlled by you Encrypted Data Data Data Copyright 2009 Trend Micro Inc.
  • 17. CNAM – Real Time Attack Detection ARCHITECTURE
  • 18. CNAM – Real Time Attack Detection TOPOLOGY
  • 19. CNAM – Real Time Attack Detection MODEL
  • 20. Acknowledgement All ownership and credits for pictures, logos copyright and trademarks rests with the owners. We Acknowledge & thank owners for the use of their material in this presentation to educate on cloud computing. Material for this presentation has been sourced from CSA, NIST & Trend Micro & Net Monastery & others. We thank the organizations for allowing us to use this material.
  • 21. The Future of Computing is the Cloud lssubramanian@niseindia.com