SlideShare a Scribd company logo
Modern Cloud Data Security Practices
The World of Interconnected Devices
Jonathan LeBlanc. | Twitter: @jcleblanc | Email: jleblanc@box.com
A tale of a hackathon, voice
payments, and the security
through requests not to steal.
Jonathan LeBlanc. | Twitter: @jcleblanc | Email: jleblanc@box.com
Case Study: Fixing that
massive security hole
Jonathan LeBlanc. | Twitter: @jcleblanc | Email: jleblanc@box.com
How do we enhance the data?
How do we secure the data?
Jonathan LeBlanc. | Twitter: @jcleblanc | Email: jleblanc@box.com
How do we enhance the data?
Jonathan LeBlanc. | Twitter: @jcleblanc | Email: jleblanc@box.com
Serverless framework provides the
compute and data management from
stored data location to machine learning
engine.
Machine learning system provides the
data enhancement capabilities which
improves the underlying source data’s
metadata (information about information).
7
Jonathan LeBlanc. | Twitter: @jcleblanc | Email: jleblanc@box.com
Case Study: Enhancing Video
Indexing Data
Jonathan LeBlanc. | Twitter: @jcleblanc | Email: jleblanc@box.com
Cloud Data
Data store &
initial metadata
Serverless Framework
Callback handler and code
execution
Machine Learning
Data processor and
enhancer
Webhook
Metadata
Execute
Callback
Jonathan LeBlanc. | Twitter: @jcleblanc | Email: jleblanc@box.com
// JSON payload for a sample video file
{
"status": "active",
"author": "Jonathan LeBlanc",
"currentState": "staging",
"type": "video-content-d086c908-2498-4d3e-8a1f-01e82bfc2abe",
"parent": "folder_94784195",
"id": "46586c534-21e1-619r-bera-521a0573914e",
"version": 1,
"typeVersion": 1,
"scope": "enterprise_5425632”
}
Normal File Payload
Jonathan LeBlanc. | Twitter: @jcleblanc | Email: jleblanc@box.com
// JSON payload for a sample video file with additional metadata
{
"token": { …read / write tokens for restricted access… }
"transcription": {[
"start_time" : "1523550398",
"end_time" : " 1523551036",
"text": "text transcription",
"tone": "emotion analysis of tone",
"image": "image capture of person speaking",
"data": { …user data analysis… }
]},
"status": "active",
"author": "Jonathan LeBlanc",
"currentState": "staging",
…
}
Enhanced File Payload
Jonathan LeBlanc. | Twitter: @jcleblanc | Email: jleblanc@box.com
How do we secure the data?
Jonathan LeBlanc. | Twitter: @jcleblanc | Email: jleblanc@box.com
Modern Cloud Data Security Practices
Regional Regulations
• General Data Protection Regulations (EU)
• Personal Information Protection and Electronic
Documents Act (Canada)
• Personal Information Protection Act (South Korea)
• etc.
Encrypted Data at Rest
Using encryption keys to be able to store data securely.
This can be done on a company and individual account
basis.
Jonathan LeBlanc. | Twitter: @jcleblanc | Email: jleblanc@box.com
Document Retention and Disposition
How long should personal documents be stored for?
Should documents be retained for a period of time after deletion?
Should documents always be retained?
Regulatory Compliance
How do you ensure tight controls over how data is shared?
Ensuring data meets regulatory compliance standards:
• PCI DSS: Payment Card Industry Data Security Standard
• HIPAA: Health Insurance Portability and Accountability Act
• FedRAMP: Federal Risk and Authorization Management Program
Jonathan LeBlanc. | Twitter: @jcleblanc | Email: jleblanc@box.com
Jonathan LeBlanc. | Twitter: @jcleblanc | Email: jleblanc@box.com
Cloud Data
Data store &
initial metadata
Serverless Framework
Callback handler and code
execution
Machine Learning
Data processor and
enhancer
Webhook
Metadata
Execute
Callback
Jonathan LeBlanc. | Twitter: @jcleblanc | Email: jleblanc@box.com
18
Access Tokens
Provides access to application and
root account, as well as the
machine learning account.
Privileged Data
The data that’s provided through
the transmission channels.
Jonathan LeBlanc. | Twitter: @jcleblanc | Email: jleblanc@box.com
Access Token
Master token with
full access
Downscoped Token
Limited token with tightly
scoped access
Timed Usage
Limited usage by
scope & time
Jonathan LeBlanc. | Twitter: @jcleblanc | Email: jleblanc@box.com
Cloud Data Secure Vault
Payment Issuer
Bank
1. PAN
6. Status 3. Token
2. PAN
5.Status
4.Token
Jonathan LeBlanc. | Twitter: @jcleblanc | Email: jleblanc@box.com
Data at Rest Data in Motion
Jonathan LeBlanc. | Twitter: @jcleblanc | Email: jleblanc@box.com
How do we enhance the data?
How do we secure the data?
Jonathan LeBlanc. | Twitter: @jcleblanc | Email: jleblanc@box.com
Modern Cloud Data Security Practices

More Related Content

PDF
Cryptocollege how blockchain can reimagine higher education. J. David Judd
PPTX
Records Management: The Future is Not What it Used to Be
PDF
Mathews blockchain presentation
DOCX
Securing data with blockchain and ai
PDF
IRJET-Block Chain based Cyber Security System for Data Transfer
PDF
02_07_2018_«El valor de blockchain en el registro de la actividad académica: ...
PDF
Education revolution and how blockchain is helping
PPTX
DNA Ledger ID
Cryptocollege how blockchain can reimagine higher education. J. David Judd
Records Management: The Future is Not What it Used to Be
Mathews blockchain presentation
Securing data with blockchain and ai
IRJET-Block Chain based Cyber Security System for Data Transfer
02_07_2018_«El valor de blockchain en el registro de la actividad académica: ...
Education revolution and how blockchain is helping
DNA Ledger ID

What's hot (20)

PDF
Understanding blockchaintechnology
PDF
How Blockchains Are Transforming Adult Education
PDF
Ijsrp published research paper november 2020
PPTX
Blockchain Thinking: The Brain as a DAC (Decentralized Autonomous Corporation)
PDF
IRJET- Secure E-Documents Storage using Blockchain
PDF
Decentralized Markets for Data and Artificial Intelligence
PPTX
data mining privacy concerns ppt presentation
PPT
Identity: Future directions (David Orrell, Eduserv Foundation)
PDF
Iowa Weighs in on Ethics of Cloud Computing for Lawyers
PPTX
BigchainDB and IoT at Bosch Connected worlds
PDF
Collusion Attack: A Kernel-Based Privacy Preserving Techniques in Data Mining
PDF
Web tracking and privacy law
PDF
Data Breach Visualization
PPT
Log Mining: Beyond Log Analysis
PDF
Strategies for integrating semantic and blockchain technologies
PDF
Decentralised Semantic Web @ International Semantic Web Research Summer Schoo...
PDF
Visibility and digital art: Blockchain as an ownership layer on the Internet
PDF
The Weakest Point of Security in IoT
PPTX
Blockchain Network Theory
PDF
The Blockchain and Kudos: A Distributed System for Educational Record, Reputa...
Understanding blockchaintechnology
How Blockchains Are Transforming Adult Education
Ijsrp published research paper november 2020
Blockchain Thinking: The Brain as a DAC (Decentralized Autonomous Corporation)
IRJET- Secure E-Documents Storage using Blockchain
Decentralized Markets for Data and Artificial Intelligence
data mining privacy concerns ppt presentation
Identity: Future directions (David Orrell, Eduserv Foundation)
Iowa Weighs in on Ethics of Cloud Computing for Lawyers
BigchainDB and IoT at Bosch Connected worlds
Collusion Attack: A Kernel-Based Privacy Preserving Techniques in Data Mining
Web tracking and privacy law
Data Breach Visualization
Log Mining: Beyond Log Analysis
Strategies for integrating semantic and blockchain technologies
Decentralised Semantic Web @ International Semantic Web Research Summer Schoo...
Visibility and digital art: Blockchain as an ownership layer on the Internet
The Weakest Point of Security in IoT
Blockchain Network Theory
The Blockchain and Kudos: A Distributed System for Educational Record, Reputa...
Ad

Similar to Modern Cloud Data Security Practices (20)

PDF
Global bigdata conf_01282013
PPTX
Emerging application and data protection for cloud
DOCX
Abdelkrim Boujraf references-in-research-papers-v0.03
PDF
Isaca new delhi india privacy and big data
PDF
Isaca new delhi india - privacy and big data
PPTX
The Hacking Games - Cloud Vulnerabilities Meetup 22032023.pptx
PDF
Protecting privacy in practice
PPTX
Evolving regulations are changing the way we think about tools and technology
PDF
12 02-14 information security managers - unannotated
PPTX
ISACA Houston - Practical data privacy and de-identification techniques
PPTX
Jul 16 isaca london data protection, security and privacy risks - on premis...
PDF
OpenID Foundation FAPI WG: June 2017 Update
PDF
API Days 2016 Day 1: OpenID Financial API WG
PPTX
What i learned at the infosecurity isaca north america expo and conference 2019
PPTX
OpenID Foundation Foundation Financial API (FAPI) WG
PDF
API World 2019 Presentation on Securing sensitive data through APIs and AI pa...
PDF
Solving the Really Big Tech Problems with IoT
PPTX
Next generation data protection and security for oracle users - gdpr blockc...
PDF
Data Analytics Governance and Ethics
PDF
Spotlight on Technology 2017
Global bigdata conf_01282013
Emerging application and data protection for cloud
Abdelkrim Boujraf references-in-research-papers-v0.03
Isaca new delhi india privacy and big data
Isaca new delhi india - privacy and big data
The Hacking Games - Cloud Vulnerabilities Meetup 22032023.pptx
Protecting privacy in practice
Evolving regulations are changing the way we think about tools and technology
12 02-14 information security managers - unannotated
ISACA Houston - Practical data privacy and de-identification techniques
Jul 16 isaca london data protection, security and privacy risks - on premis...
OpenID Foundation FAPI WG: June 2017 Update
API Days 2016 Day 1: OpenID Financial API WG
What i learned at the infosecurity isaca north america expo and conference 2019
OpenID Foundation Foundation Financial API (FAPI) WG
API World 2019 Presentation on Securing sensitive data through APIs and AI pa...
Solving the Really Big Tech Problems with IoT
Next generation data protection and security for oracle users - gdpr blockc...
Data Analytics Governance and Ethics
Spotlight on Technology 2017
Ad

More from Jonathan LeBlanc (20)

PDF
JavaScript App Security: Auth and Identity on the Client
PDF
Improving Developer Onboarding Through Intelligent Data Insights
PDF
Better Data with Machine Learning and Serverless
PPTX
Best Practices for Application Development with Box
PPTX
Box Platform Overview
PPTX
Box Platform Developer Workshop
PPTX
Box Authentication Types
PPTX
Understanding Box UI Elements
PPTX
Understanding Box applications, tokens, and scoping
PPTX
The Future of Online Money: Creating Secure Payments Globally
PDF
Modern API Security with JSON Web Tokens
PPTX
Creating an In-Aisle Purchasing System from Scratch
PDF
Secure Payments Over Mixed Communication Media
PDF
Protecting the Future of Mobile Payments
PDF
Node.js Authentication and Data Security
PDF
PHP Identity and Data Security
PPTX
Secure Payments Over Mixed Communication Media
PDF
Protecting the Future of Mobile Payments
PPTX
Future of Identity, Data, and Wearable Security
PDF
Kill All Passwords
JavaScript App Security: Auth and Identity on the Client
Improving Developer Onboarding Through Intelligent Data Insights
Better Data with Machine Learning and Serverless
Best Practices for Application Development with Box
Box Platform Overview
Box Platform Developer Workshop
Box Authentication Types
Understanding Box UI Elements
Understanding Box applications, tokens, and scoping
The Future of Online Money: Creating Secure Payments Globally
Modern API Security with JSON Web Tokens
Creating an In-Aisle Purchasing System from Scratch
Secure Payments Over Mixed Communication Media
Protecting the Future of Mobile Payments
Node.js Authentication and Data Security
PHP Identity and Data Security
Secure Payments Over Mixed Communication Media
Protecting the Future of Mobile Payments
Future of Identity, Data, and Wearable Security
Kill All Passwords

Recently uploaded (20)

PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Approach and Philosophy of On baking technology
PPTX
sap open course for s4hana steps from ECC to s4
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Empathic Computing: Creating Shared Understanding
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Encapsulation theory and applications.pdf
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PPTX
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Review of recent advances in non-invasive hemoglobin estimation
Approach and Philosophy of On baking technology
sap open course for s4hana steps from ECC to s4
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Encapsulation_ Review paper, used for researhc scholars
Empathic Computing: Creating Shared Understanding
The AUB Centre for AI in Media Proposal.docx
Advanced methodologies resolving dimensionality complications for autism neur...
Encapsulation theory and applications.pdf
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Diabetes mellitus diagnosis method based random forest with bat algorithm
Dropbox Q2 2025 Financial Results & Investor Presentation
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
Unlocking AI with Model Context Protocol (MCP)
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Programs and apps: productivity, graphics, security and other tools
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx

Modern Cloud Data Security Practices

  • 2. The World of Interconnected Devices Jonathan LeBlanc. | Twitter: @jcleblanc | Email: jleblanc@box.com
  • 3. A tale of a hackathon, voice payments, and the security through requests not to steal. Jonathan LeBlanc. | Twitter: @jcleblanc | Email: jleblanc@box.com
  • 4. Case Study: Fixing that massive security hole Jonathan LeBlanc. | Twitter: @jcleblanc | Email: jleblanc@box.com
  • 5. How do we enhance the data? How do we secure the data? Jonathan LeBlanc. | Twitter: @jcleblanc | Email: jleblanc@box.com
  • 6. How do we enhance the data? Jonathan LeBlanc. | Twitter: @jcleblanc | Email: jleblanc@box.com
  • 7. Serverless framework provides the compute and data management from stored data location to machine learning engine. Machine learning system provides the data enhancement capabilities which improves the underlying source data’s metadata (information about information). 7 Jonathan LeBlanc. | Twitter: @jcleblanc | Email: jleblanc@box.com
  • 8. Case Study: Enhancing Video Indexing Data Jonathan LeBlanc. | Twitter: @jcleblanc | Email: jleblanc@box.com
  • 9. Cloud Data Data store & initial metadata Serverless Framework Callback handler and code execution Machine Learning Data processor and enhancer Webhook Metadata Execute Callback Jonathan LeBlanc. | Twitter: @jcleblanc | Email: jleblanc@box.com
  • 10. // JSON payload for a sample video file { "status": "active", "author": "Jonathan LeBlanc", "currentState": "staging", "type": "video-content-d086c908-2498-4d3e-8a1f-01e82bfc2abe", "parent": "folder_94784195", "id": "46586c534-21e1-619r-bera-521a0573914e", "version": 1, "typeVersion": 1, "scope": "enterprise_5425632” } Normal File Payload Jonathan LeBlanc. | Twitter: @jcleblanc | Email: jleblanc@box.com
  • 11. // JSON payload for a sample video file with additional metadata { "token": { …read / write tokens for restricted access… } "transcription": {[ "start_time" : "1523550398", "end_time" : " 1523551036", "text": "text transcription", "tone": "emotion analysis of tone", "image": "image capture of person speaking", "data": { …user data analysis… } ]}, "status": "active", "author": "Jonathan LeBlanc", "currentState": "staging", … } Enhanced File Payload Jonathan LeBlanc. | Twitter: @jcleblanc | Email: jleblanc@box.com
  • 12. How do we secure the data? Jonathan LeBlanc. | Twitter: @jcleblanc | Email: jleblanc@box.com
  • 14. Regional Regulations • General Data Protection Regulations (EU) • Personal Information Protection and Electronic Documents Act (Canada) • Personal Information Protection Act (South Korea) • etc. Encrypted Data at Rest Using encryption keys to be able to store data securely. This can be done on a company and individual account basis. Jonathan LeBlanc. | Twitter: @jcleblanc | Email: jleblanc@box.com
  • 15. Document Retention and Disposition How long should personal documents be stored for? Should documents be retained for a period of time after deletion? Should documents always be retained? Regulatory Compliance How do you ensure tight controls over how data is shared? Ensuring data meets regulatory compliance standards: • PCI DSS: Payment Card Industry Data Security Standard • HIPAA: Health Insurance Portability and Accountability Act • FedRAMP: Federal Risk and Authorization Management Program Jonathan LeBlanc. | Twitter: @jcleblanc | Email: jleblanc@box.com
  • 16. Jonathan LeBlanc. | Twitter: @jcleblanc | Email: jleblanc@box.com
  • 17. Cloud Data Data store & initial metadata Serverless Framework Callback handler and code execution Machine Learning Data processor and enhancer Webhook Metadata Execute Callback Jonathan LeBlanc. | Twitter: @jcleblanc | Email: jleblanc@box.com
  • 18. 18 Access Tokens Provides access to application and root account, as well as the machine learning account. Privileged Data The data that’s provided through the transmission channels. Jonathan LeBlanc. | Twitter: @jcleblanc | Email: jleblanc@box.com
  • 19. Access Token Master token with full access Downscoped Token Limited token with tightly scoped access Timed Usage Limited usage by scope & time Jonathan LeBlanc. | Twitter: @jcleblanc | Email: jleblanc@box.com
  • 20. Cloud Data Secure Vault Payment Issuer Bank 1. PAN 6. Status 3. Token 2. PAN 5.Status 4.Token Jonathan LeBlanc. | Twitter: @jcleblanc | Email: jleblanc@box.com
  • 21. Data at Rest Data in Motion Jonathan LeBlanc. | Twitter: @jcleblanc | Email: jleblanc@box.com
  • 22. How do we enhance the data? How do we secure the data? Jonathan LeBlanc. | Twitter: @jcleblanc | Email: jleblanc@box.com

Editor's Notes

  • #3: Introduction - We're in an age where our digital lives, data, and many facets of our day to day lives are interconnected through a host of sites, services, and hardware, with a presence living within secure cloud data systems.
  • #4: Story time – hack supplying credit card information
  • #5: How we can solve the same issues with the hack
  • #6: Two questions - how do we enhance the data sources and how do we secure them
  • #8: Serverless frameworks and machine learning
  • #9: Use case of how these systems can work together
  • #10: Webhook -> Lambda -> ML Service -> Lambda callback -> Original data
  • #11: metadata payload for a file / folder
  • #12: metadata payload after having been adjusted with ML systems
  • #14: Data security by country - how much access does government have
  • #16: https://emrisk.com/cpt-blog/pci-hipaa-fedramp-cloud-compliance/
  • #17: http://blog.securitymetrics.com/2016/10/-how-much-does-a-data-breach-cost.html
  • #18: Webhook -> Lambda -> ML Service -> Lambda callback -> Original data
  • #20: Token security - providing downscoped tokens
  • #21: Tokenization for payment security http://www.paymentscardsandmobile.com/payment-card-tokenization/ https://www.emvco.com/terms-of-use/?u=/wp-content/uploads/documents/EMVCo-Payment-Tokenisation-Specification-Technical-Framework-v2.0-1.pdf
  • #22: Identity - data at rest vs data in motion
  • #23: Two questions - how do we enhance the data sources and how do we secure them