SlideShare a Scribd company logo
NCOIC
  Federal Cloud Storefront Workshop
                Nils Puhlmann
                 Co-Founder
September 21st, 2009
Security is a concern




       Copyright © 2009 Cloud Security Alliance   www.cloudsecurityalliance.org
S-P-I Model
                                                  You “RFP”           SaaS
                                                  security in


You build
security in
                                   PaaS
     IaaS




              Copyright © 2009 Cloud Security Alliance    www.cloudsecurityalliance.org
Security and the SPI model




       Copyright © 2009 Cloud Security Alliance   www.cloudsecurityalliance.org
Risk Examples
•   Geo-location of sensitive data

•   Inability to deploy security services (e.g. scanning)

•   Risk with shared computing platform (multi-tenant)

•   Data confidentiality

•   Access via internet – untrusted

•   Cloud vendors for the most part non-committal on security

•   Company data on 3rd party machine

•   Compliance lacking – inability to satisfy auditors

•   Vendors not up to speed from a guidance and auditing perspective

•   Inability to perform forensic investigation
                      Copyright © 2009 Cloud Security Alliance   www.cloudsecurityalliance.org
Meet the Cloud Security Alliance
• Global, not-for-profit organization, started Nov. 2008,
  individual members (free), corporate members and
  affiliated organizations
• Inclusive membership, supporting broad spectrum of
  subject matter expertise: cloud experts, security,
  legal, compliance, virtualization, and on and on…
• We believe Cloud Computing has a robust future, we
  want to make it better
“To promote the use of best practices for providing security assurance
  within Cloud Computing, and provide education on the uses of Cloud
         Computing to help secure all other forms of computing.”

                  Copyright © 2009 Cloud Security Alliance   www.cloudsecurityalliance.org
Current corporate members




      Copyright © 2009 Cloud Security Alliance   www.cloudsecurityalliance.org
Current affiliates




      Cloud-Standards.org

         Copyright © 2009 Cloud Security Alliance   www.cloudsecurityalliance.org
Individual Members
•   4,174 as of September 15th
•   Broad Geographical Distribution
•   Active Working Groups
    •   Editorial
                                                                         •   New Working Groups
    •   Educational Outreach
                                                                             •     Healthcare

    •   Architecture
                                                                             •     Cloud Threat Analysis

    •   Governance, Risk Mgt, Compliance, Business
                                                                             •     US Federal Government
        Continuity                                                           •     Financial Services
    •   Legal & E-Discovery
    •   Portability, Interoperability and Application Security
    •   Identity and Access Mgt, Encryption & Key Mgt
    •   Data Center Operations and Incident Response
    •   Information Lifecycle Management & Storage
    •   Virtualization and Technology Compartmentalization



                              Copyright © 2009 Cloud Security Alliance           www.cloudsecurityalliance.org
Project Roadmap
•   April 2009: Security Guidance for Critical Areas of Focus for
    Cloud Computing – Version 1
•   July 2009: Version 1 translated into Japanese
•   October 2009: Security Guidance for Critical Areas of Focus for
    Cloud Computing – Version 2
•   October 2009: Top Ten Cloud Threats (monthly)
•   November 2009: Provider & Customer Checklists
•   December 2009: eHealth Guidance
•   Global CSA Executive Summits
    • Q1 2010 – Europe
    • Q1 or Q2 2010 - US

                     Copyright © 2009 Cloud Security Alliance   www.cloudsecurityalliance.org
Security Guidance for
Critical Areas of Focus in
     Cloud Computing

                       Download at:
  www.cloudsecurityalliance.org/guidance

         Copyright © 2009 Cloud Security Alliance   www.cloudsecurityalliance.org
Overview of Guidance
       1. Architecture & Framework

Governing in the Cloud                            Operating in the Cloud
 2. Governance & Risk Mgt                              8. Traditional, BCM, DR
 3. Legal                                              9. Data Center Operations
 4. Electronic Discovery                               10. Incident Response
 5. Compliance & Audit                                 11. Application Security
 6. Information Lifecycle Mgt                          12. Encryption & Key Mgt
 7. Portability &                                      13. Identity & Access Mgt
    Interoperability                                   14. Storage
                                                       15. Virtualization
                Copyright © 2009 Cloud Security Alliance    www.cloudsecurityalliance.org
Contact


•   www.cloudsecurityalliance.org
•   info@cloudsecurityalliance.org
•   Twitter: @cloudsa, #csaguide
•   LinkedIn: www.linkedin.com/groups?gid=1864210




                 Copyright © 2009 Cloud Security Alliance   www.cloudsecurityalliance.org
Thank You!



             www.cloudsecurityalliance.org

More Related Content

PPTX
HealthSPA Turku-Toni Perämäki Microsoft August 27
PPTX
Cloud Security - Reality or Illusion
PPTX
Netpluz Managed Cyber Security
PPTX
Cloud camp Ghent
PPTX
C-Level tools for Cloud security
PDF
Advantages of privacy by design in IoE
PPTX
Cloudy with a Chance of...Visibility, Accountability & Security
PDF
Maintaining Visibility and Control as Workers and Apps Scatter
HealthSPA Turku-Toni Perämäki Microsoft August 27
Cloud Security - Reality or Illusion
Netpluz Managed Cyber Security
Cloud camp Ghent
C-Level tools for Cloud security
Advantages of privacy by design in IoE
Cloudy with a Chance of...Visibility, Accountability & Security
Maintaining Visibility and Control as Workers and Apps Scatter

What's hot (20)

PPTX
Infosec Europe 2017 Highlights | Lastline, Inc.
PDF
BCS ITNow 201306 - Share Securely
PPTX
“They’re Coming for OUR Internet: We can fight back”
PDF
Security Insights for Mission-Critical Networks
PDF
Corporate Profile 8 - 1 b 3- 25 July
PPT
nullcon 2011 - Protect infrastructure of protect information – Lessons from W...
PPTX
CipherCloud's Solutions for Salesforce Chatter
PPTX
Defining A Cyber Moonshot: Getting Safer in Five Years
PPT
Debunking the mysteries of cloud computing!
PPTX
Global Efforts to Secure Cloud Computing
PDF
Company yufansun
PDF
Embracing the Millennial Tsunami
PPTX
Security In The Cloud Timed
PDF
GWAVACon 2015: GWAVA - Why Unified Archiving Pays Off…
PDF
About Me - Vinay Pandey
PDF
Instituting_Wi-Fi_Policies
PDF
Ministry of Foreign Affairs
PDF
Sprint Secure Portfolio
PDF
Digital demand - the challenges of being a CIO in the UK HE sector, by John C...
PDF
Public Sphere: Gov 2.0 - Martin Stewart Weeks
Infosec Europe 2017 Highlights | Lastline, Inc.
BCS ITNow 201306 - Share Securely
“They’re Coming for OUR Internet: We can fight back”
Security Insights for Mission-Critical Networks
Corporate Profile 8 - 1 b 3- 25 July
nullcon 2011 - Protect infrastructure of protect information – Lessons from W...
CipherCloud's Solutions for Salesforce Chatter
Defining A Cyber Moonshot: Getting Safer in Five Years
Debunking the mysteries of cloud computing!
Global Efforts to Secure Cloud Computing
Company yufansun
Embracing the Millennial Tsunami
Security In The Cloud Timed
GWAVACon 2015: GWAVA - Why Unified Archiving Pays Off…
About Me - Vinay Pandey
Instituting_Wi-Fi_Policies
Ministry of Foreign Affairs
Sprint Secure Portfolio
Digital demand - the challenges of being a CIO in the UK HE sector, by John C...
Public Sphere: Gov 2.0 - Martin Stewart Weeks
Ad

Viewers also liked (7)

PDF
GSAW Presentation on Cloud Security V2.1
PDF
Paving the Way to the Cloud: Cloud Services Brokerage for Highly Secure, Dem...
PPTX
Yongsan presentation 1
PDF
Georgia HIT Summit Keynote
PDF
NJVC-Virtual Global PaaS white paper
PDF
Value Of Cloud Computing For Fed Governmen Oct 8 Tim May
PPT
Value Of Cloud Computing For Fed Governmen Oct 8
GSAW Presentation on Cloud Security V2.1
Paving the Way to the Cloud: Cloud Services Brokerage for Highly Secure, Dem...
Yongsan presentation 1
Georgia HIT Summit Keynote
NJVC-Virtual Global PaaS white paper
Value Of Cloud Computing For Fed Governmen Oct 8 Tim May
Value Of Cloud Computing For Fed Governmen Oct 8
Ad

Similar to Nils Puhlmann Ncoic Slides (20)

PDF
Presd1 10
PDF
CCSK, cloud security framework, Indonesia
PPTX
Lss implementing cyber security in the cloud, and from the cloud-feb14
PPTX
What is Cloud Security, and Can I Have Some?
PDF
Cloud Security Alliance - Guidance
PPTX
CSA Atlanta Chapter Meeting Q1'2013 and RSA Conference 2013 CSA Announcements
PPT
3245224.ppt
PPTX
Csa about-threats-june-2010-ibm
PPTX
Cloud is not an option, but is security?
PDF
Global Mandate to Secure Cloud Computing
PPTX
security and compliance in the cloud
PPT
Effectively and Securely Using the Cloud Computing Paradigm
PPTX
Scott Hogg - Gtri cloud security knowledge and certs
PPT
Your clouds must be transparent - an intro to Cloud Security Alliance
PPT
Presentation on Effectively and Securely Using the Cloud Computing Paradigm v26
PPT
Presentation On Effectively And Securely Using The Cloud Computing Paradigm V26
PPTX
Enterprise Security in Hybrid Cloud ISACA-SV 2012
PPTX
Enterprise Security in Cloud
PPT
Cloud Security Alliance's GRC Stack Overview
PPTX
Cloud security for banks - the central bank of Israel regulations for cloud s...
Presd1 10
CCSK, cloud security framework, Indonesia
Lss implementing cyber security in the cloud, and from the cloud-feb14
What is Cloud Security, and Can I Have Some?
Cloud Security Alliance - Guidance
CSA Atlanta Chapter Meeting Q1'2013 and RSA Conference 2013 CSA Announcements
3245224.ppt
Csa about-threats-june-2010-ibm
Cloud is not an option, but is security?
Global Mandate to Secure Cloud Computing
security and compliance in the cloud
Effectively and Securely Using the Cloud Computing Paradigm
Scott Hogg - Gtri cloud security knowledge and certs
Your clouds must be transparent - an intro to Cloud Security Alliance
Presentation on Effectively and Securely Using the Cloud Computing Paradigm v26
Presentation On Effectively And Securely Using The Cloud Computing Paradigm V26
Enterprise Security in Hybrid Cloud ISACA-SV 2012
Enterprise Security in Cloud
Cloud Security Alliance's GRC Stack Overview
Cloud security for banks - the central bank of Israel regulations for cloud s...

More from GovCloud Network (20)

PDF
IaaS Price performance-benchmark
PDF
Cloud computing training what's right for me
PDF
ViON Corporation: Surviving IT Change
PDF
Staying Safe in Cyberspace
PDF
Vets 360 Services - Military Dedication - Corporate Success
PDF
GovCloud Network LLC Overview - June 25, 2014
PDF
Army PEO EIS Cloud Architecture
PDF
ICH Agile Cloud Session 1-Highlights /Prospective Svc Offerings Kevin Jackson
PDF
Improving Cybersecurity and Resilience Through Acquisition Emile Monette GSA
PDF
@AgileCLoud_ICH Presentation - 20140521 US Navy OPNAV - Capt Christopher Page
PDF
Agile Cloud Conference 2 Introduction - John Brennan
PDF
DoD Business Capability Lifecycle (BCL) Guide (Draft)
PPTX
GovCloud Network Overview Presentation
PPTX
PM ISE Information Interoperability Presentation -agile sourcing brief
PDF
Intrusion Detection on Public IaaS - Kevin L. Jackson
PDF
A Framework for Cloud Computing Adoption in South African Government
PDF
NCOIC GCC OWS-10 presentation 10 7 2013
PDF
Tech gate kevin l jackson - 09-21-2013
PDF
Government cloud deployment lessons learned final (4 4 2013)
PDF
Cloud computing-made-easy
IaaS Price performance-benchmark
Cloud computing training what's right for me
ViON Corporation: Surviving IT Change
Staying Safe in Cyberspace
Vets 360 Services - Military Dedication - Corporate Success
GovCloud Network LLC Overview - June 25, 2014
Army PEO EIS Cloud Architecture
ICH Agile Cloud Session 1-Highlights /Prospective Svc Offerings Kevin Jackson
Improving Cybersecurity and Resilience Through Acquisition Emile Monette GSA
@AgileCLoud_ICH Presentation - 20140521 US Navy OPNAV - Capt Christopher Page
Agile Cloud Conference 2 Introduction - John Brennan
DoD Business Capability Lifecycle (BCL) Guide (Draft)
GovCloud Network Overview Presentation
PM ISE Information Interoperability Presentation -agile sourcing brief
Intrusion Detection on Public IaaS - Kevin L. Jackson
A Framework for Cloud Computing Adoption in South African Government
NCOIC GCC OWS-10 presentation 10 7 2013
Tech gate kevin l jackson - 09-21-2013
Government cloud deployment lessons learned final (4 4 2013)
Cloud computing-made-easy

Recently uploaded (20)

PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PPTX
breach-and-attack-simulation-cybersecurity-india-chennai-defenderrabbit-2025....
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PPT
Teaching material agriculture food technology
PDF
Empathic Computing: Creating Shared Understanding
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
Advanced IT Governance
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Advanced Soft Computing BINUS July 2025.pdf
Reach Out and Touch Someone: Haptics and Empathic Computing
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
breach-and-attack-simulation-cybersecurity-india-chennai-defenderrabbit-2025....
“AI and Expert System Decision Support & Business Intelligence Systems”
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Review of recent advances in non-invasive hemoglobin estimation
Chapter 3 Spatial Domain Image Processing.pdf
The Rise and Fall of 3GPP – Time for a Sabbatical?
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Dropbox Q2 2025 Financial Results & Investor Presentation
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Teaching material agriculture food technology
Empathic Computing: Creating Shared Understanding
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Advanced IT Governance
Unlocking AI with Model Context Protocol (MCP)
Advanced Soft Computing BINUS July 2025.pdf

Nils Puhlmann Ncoic Slides

  • 1. NCOIC Federal Cloud Storefront Workshop Nils Puhlmann Co-Founder September 21st, 2009
  • 2. Security is a concern Copyright © 2009 Cloud Security Alliance www.cloudsecurityalliance.org
  • 3. S-P-I Model You “RFP” SaaS security in You build security in PaaS IaaS Copyright © 2009 Cloud Security Alliance www.cloudsecurityalliance.org
  • 4. Security and the SPI model Copyright © 2009 Cloud Security Alliance www.cloudsecurityalliance.org
  • 5. Risk Examples • Geo-location of sensitive data • Inability to deploy security services (e.g. scanning) • Risk with shared computing platform (multi-tenant) • Data confidentiality • Access via internet – untrusted • Cloud vendors for the most part non-committal on security • Company data on 3rd party machine • Compliance lacking – inability to satisfy auditors • Vendors not up to speed from a guidance and auditing perspective • Inability to perform forensic investigation Copyright © 2009 Cloud Security Alliance www.cloudsecurityalliance.org
  • 6. Meet the Cloud Security Alliance • Global, not-for-profit organization, started Nov. 2008, individual members (free), corporate members and affiliated organizations • Inclusive membership, supporting broad spectrum of subject matter expertise: cloud experts, security, legal, compliance, virtualization, and on and on… • We believe Cloud Computing has a robust future, we want to make it better “To promote the use of best practices for providing security assurance within Cloud Computing, and provide education on the uses of Cloud Computing to help secure all other forms of computing.” Copyright © 2009 Cloud Security Alliance www.cloudsecurityalliance.org
  • 7. Current corporate members Copyright © 2009 Cloud Security Alliance www.cloudsecurityalliance.org
  • 8. Current affiliates Cloud-Standards.org Copyright © 2009 Cloud Security Alliance www.cloudsecurityalliance.org
  • 9. Individual Members • 4,174 as of September 15th • Broad Geographical Distribution • Active Working Groups • Editorial • New Working Groups • Educational Outreach • Healthcare • Architecture • Cloud Threat Analysis • Governance, Risk Mgt, Compliance, Business • US Federal Government Continuity • Financial Services • Legal & E-Discovery • Portability, Interoperability and Application Security • Identity and Access Mgt, Encryption & Key Mgt • Data Center Operations and Incident Response • Information Lifecycle Management & Storage • Virtualization and Technology Compartmentalization Copyright © 2009 Cloud Security Alliance www.cloudsecurityalliance.org
  • 10. Project Roadmap • April 2009: Security Guidance for Critical Areas of Focus for Cloud Computing – Version 1 • July 2009: Version 1 translated into Japanese • October 2009: Security Guidance for Critical Areas of Focus for Cloud Computing – Version 2 • October 2009: Top Ten Cloud Threats (monthly) • November 2009: Provider & Customer Checklists • December 2009: eHealth Guidance • Global CSA Executive Summits • Q1 2010 – Europe • Q1 or Q2 2010 - US Copyright © 2009 Cloud Security Alliance www.cloudsecurityalliance.org
  • 11. Security Guidance for Critical Areas of Focus in Cloud Computing Download at: www.cloudsecurityalliance.org/guidance Copyright © 2009 Cloud Security Alliance www.cloudsecurityalliance.org
  • 12. Overview of Guidance 1. Architecture & Framework Governing in the Cloud Operating in the Cloud 2. Governance & Risk Mgt 8. Traditional, BCM, DR 3. Legal 9. Data Center Operations 4. Electronic Discovery 10. Incident Response 5. Compliance & Audit 11. Application Security 6. Information Lifecycle Mgt 12. Encryption & Key Mgt 7. Portability & 13. Identity & Access Mgt Interoperability 14. Storage 15. Virtualization Copyright © 2009 Cloud Security Alliance www.cloudsecurityalliance.org
  • 13. Contact • www.cloudsecurityalliance.org • info@cloudsecurityalliance.org • Twitter: @cloudsa, #csaguide • LinkedIn: www.linkedin.com/groups?gid=1864210 Copyright © 2009 Cloud Security Alliance www.cloudsecurityalliance.org
  • 14. Thank You! www.cloudsecurityalliance.org