SlideShare a Scribd company logo
© 2010 Cisco Systems, Inc. All rights reserved. Cisco Confidential 1
Jean-François Pujol
Cisco Systems
Cloud Security
© 2010 Cisco Systems, Inc. All rights reserved. Cisco Systems 2© 2008 Cisco Systems, Inc. All rights reserved. Cisco SystemsPresentation_ID
… and one other
Public Cloud
Private Cloud
Virtual Private
Cloud
Hybrid Cloud
Community
Cloud
Quick reminder :
Cloud Deployment Model
Public Cloud
Cloud infrastructure made available to the
general public.
Private Cloud
Cloud infrastructure operated solely for an
organization.
Virtual Private
Cloud
Cloud services that simulate the private
cloud experience in public cloud
infrastructure
Hybrid Cloud
Cloud infrastructure composed of two or
more clouds that interoperate or federate
through technology
Community
Cloud
Cloud infrastructure shared by several
organizations and supporting a specific
community
NIST
Deployment
Models
© 2010 Cisco Systems, Inc. All rights reserved. Cisco Systems 3
Public vs. Private Cloud Security
While the technology basement remains the same, we
may consider two different approaches to the problem :
  Public Cloud :
– Delegation versus Trust
  Private Cloud :
– Abstraction / Virtualization versus Complexity
© 2010 Cisco Systems, Inc. All rights reserved. Cisco Systems 4
Considerations about the
Public Cloud Security
© 2010 Cisco Systems, Inc. All rights reserved. Cisco Systems 5
The New World : Shifting Borders
IT Consumerization
Device
Border
Mobile
Worker
Location
Border
Internal Applications
IaaS,SaaS
Application As A Service
Application
Border
© 2010 Cisco Systems, Inc. All rights reserved. Cisco Systems 6
The (not so) New World : Location Border
Mobile
Worker
Location
Border
Internal Applications
© 2010 Cisco Systems, Inc. All rights reserved. Cisco Systems 7
Traditional Corporate Border
Corporate Border
Branch Office
Applications
and Data
Corporate Office
Policy
Attackers
© 2010 Cisco Systems, Inc. All rights reserved. Cisco Systems 8
Now with Mobile Users and VPNs
Corporate Border
Branch Office
Applications
and Data
Corporate Office
Policy
Attackers
Home Office
Mobile
User
© 2010 Cisco Systems, Inc. All rights reserved. Cisco Systems 9
With Mobile Users when
not protected by VPNs…
Corporate Border
Branch Office
Applications
and Data
Corporate Office
Policy
Attackers
Home Office
Mobile
User
© 2010 Cisco Systems, Inc. All rights reserved. Cisco Systems 10
The New World : Application Border
Internal Applications
IaaS,SaaS
Application As A Service
Application
Border
© 2010 Cisco Systems, Inc. All rights reserved. Cisco Systems 11© 2008 Cisco Systems, Inc. All rights reserved. Cisco SystemsPresentation_ID
...Everything is Cloud
The Consumer’s View of Cloud
© 2010 Cisco Systems, Inc. All rights reserved. Cisco Systems 12
These Cloudy Days …
  Internet is reliable
  Cloud services are well known in the consumer market,
and the consumer market creates some pressure in the
enterprise world.
  Is LinkedIn a consumer/personal or business service ?
  Enterprises are turning every single task into a process.
It creates a strong traction for adopting services (OPEX
vs CAPEX)
© 2010 Cisco Systems, Inc. All rights reserved. Cisco Systems 13
Organizations don’t have even the
choice …
© 2010 Cisco Systems, Inc. All rights reserved. Cisco Systems 14
Organizations don’t have even the
choice …
© 2010 Cisco Systems, Inc. All rights reserved. Cisco Systems 16
Organizations don’t have even the
choice …
© 2010 Cisco Systems, Inc. All rights reserved. Cisco Systems 17
Organizations don’t have even the
choice …
© 2010 Cisco Systems, Inc. All rights reserved. Cisco Systems 18
Organizations don’t have even the
choice …
© 2010 Cisco Systems, Inc. All rights reserved. Cisco Systems 19
First security concern
  Enterprises are using unmanaged cloud services today
– in a more or less control way
  On public and (almost) free consumer platforms :
– No real control over the corporate image
– Risks of information leakage
– Risks of misleading
– Risks of Social Engineering attacks
© 2010 Cisco Systems, Inc. All rights reserved. Cisco Systems 20
Global trend for outsourcing
  Every business process is analyzed :
– Down to a single application
– Down to any individual
  If you can define it, measure it, and it is not a core
business activity, you want to outsource it
© 2010 Cisco Systems, Inc. All rights reserved. Cisco Systems 21
Can you afford to manage the risk ?
Imagine you have :
  A couple of consultants
  Employees under temporary contract
  A complete department is outsourced (Dev, Marketing,
etc…)
  Datacenter exploitation is outsourced
  Networks, servers, premises, and people are
outsourced
  Cloud based services
© 2010 Cisco Systems, Inc. All rights reserved. Cisco Systems 22
Key to Broader Adoption of Cloud: Trust
Before the Economics of Cloud Computing Can be Considered,
Organizations Require a Trusted Service Infrastructure
Security Control
Service-Level
Management
Compliance
© 2010 Cisco Systems, Inc. All rights reserved. Cisco Systems 23© 2008 Cisco Systems, Inc. All rights reserved. Cisco SystemsPresentation_ID
Enterprise Deployment Models
Distinguishing between Ownership and Control
Ownership
Control
Internal Resources
All cloud
resources
owned by or
dedicated to
enterprise
External Resources
All cloud
resources owned
by providers;
used by many
customers
Private Cloud
Cloud definition/
governance
controlled by
enterprise
Public Cloud
Cloud definition/
governance
controlled by
provider
© 2010 Cisco Systems, Inc. All rights reserved. Cisco Systems 24
Data
App
VM
Server
Storage
Network
Dedicated IT
Data
App
VM
Server
Storage
Network
Data
App
VM
Server
Storage
Network
Data
App
VM
Server
Storage
Network
Data
App
VM
Server
Storage
Network
Hosting Provider Public Iaas Public Paas Public Saas
Organization shares control
with service providerOrganization has control Service provider has control
Control and Trust evolve with cloud
© 2010 Cisco Systems, Inc. All rights reserved. Cisco Systems 25
What This Means To Security
Amazon EC2 - IaaS
The lower down the stack the Cloud provider
stops, the more security you are tactically
responsible for implementing & managing
yourself.
Salesforce - SaaS
Google AppEngine - PaaS
© 2010 Cisco Systems, Inc. All rights reserved. Cisco Systems 26
The Cloud Security Alliance’s 13 Critical Areas Of Focus for Cloud:
1. Architecture & Framework
Governing the Cloud Operating the Cloud
2. Governance & Risk Mgmt 8. Traditional BCM, DR
3. Legal & Electronic Discovery 9. Datacenter Operations
5. Compliance & Audit 10. Incident Response
6. Information Lifecycle Mgmt 11. Application Security
7. Portability & Interoperability 12. Encryption & Key Mgmt
13. Identity & Access Mgmt
www.cloudsecurityalliance.org
Cloud Security Alliance - Guidance
© 2010 Cisco Systems, Inc. All rights reserved. Cisco Systems 27
The Cloud Security Alliance’s Top Threats to Cloud Computing V1.0 :
www.cloudsecurityalliance.org
Cloud Security Alliance
Top Threats to Cloud Computing
1. Abuse and Nefarious Use of Cloud
2. Insecure Interfaces and APIs
3. Malicious Insiders
4. Shared Technology
5. Data Loss or
6. Account or Service Hijacking
7. Unknown Risk Profile
© 2010 Cisco Systems, Inc. All rights reserved. Cisco Systems 28
Some important factors to consider
for the service
 Single Tenancy / Multi-tenancy
 Isolated Data / Co-mingled Data
 Dedicated Security / Socialist Security
 On-premise / Off-premise
© 2010 Cisco Systems, Inc. All rights reserved. Cisco Systems 29
CloudAudit & the A6 Deliverable
 Provide a common interface
and namespace that allows
cloud computing providers to
automate the Audit, Assertion,
Assessment, and Assurance
(A6) of their environments
 Allow authorized consumers of
services to do likewise via an
open, extensible and secure
interface and methodology.
http://www.cloudaudit.org
© 2010 Cisco Systems, Inc. All rights reserved. Cisco Systems 30
That is the question …
 May your private organization be potentially
more secure than a public cloud service ?
 (and/or cheaper …)
© 2010 Cisco Systems, Inc. All rights reserved. Cisco Systems 31
Saleforce.com
82 000 + customers …
© 2010 Cisco Systems, Inc. All rights reserved. Cisco Systems 32
Saleforce.com
82 000 + customers …
© 2010 Cisco Systems, Inc. All rights reserved. Cisco Systems 33
Could you Trust Force.com ?
© 2010 Cisco Systems, Inc. All rights reserved. Cisco Systems 34
Force.com Security Literature
© 2010 Cisco Systems, Inc. All rights reserved. Cisco Systems 35
Security recommendations
  1# educate your users
  2# Identify your primary security contact
  3# Secure Employee Systems
  4# Implement IP restrictions
  5# strengthen password policies
  6# require secure sessions
  7# Decrease session timeout value
Reference: http://wiki.developerforce.com/index.php/
An_Overview_of_Force.com_SecuritySecurity
Webinar : https://salesforce.acrobat.com/securitywebinar
© 2010 Cisco Systems, Inc. All rights reserved. Cisco Systems 36
The New World : Device Borders
IT Consumerization
Device
BorderInternal Applications
Are they still corporate assets ?
© 2010 Cisco Systems, Inc. All rights reserved. Cisco Systems 37
Desktop Virtualization is part of the
Security Journey
© 2010 Cisco Systems, Inc. All rights reserved. Cisco Systems 38
Corporate Border
Branch Office
Applications
and Data
Corporate Office
Policy
Attackers
Home Office
Coffee
Shop
Customers
Airport
Mobile
User Partners
Platform
as a Service
Infrastructure
as a Service
X
as a Service
Software
as a Service
Concern: Security in a Cloud World
© 2010 Cisco Systems, Inc. All rights reserved. Cisco Systems 39
Branch
Office
Corporate
Office
Home
Office
SaaS Access Control
Regaining Visibility and Control Through Identity
SAML-
basedAnyConnect
Secure
Mobility Client
Visibility | Centralized Enforcement | Single Source Revocation
Redirect @ Login
SaaS
Single
Sign On
Web
Security
Appliance
Directory
© 2010 Cisco Systems, Inc. All rights reserved. Cisco Systems 40
AnyConnect Secure Mobility Vision
On-Premise Gateway or Cloud Policy Enforcement
Cisco
Cisco
Web Security Appliance
ASA
The image cannot be
displayed. Your
computer may not have
enough memory to open
the image, or the image
may have been
corrupted. Restart your
computer, and then
open the file again. If
the red x still appears,
you may have to delete
the image and then
insert it again.
Social Networking
Enterprise SaaS
News
EmailIntegration
of ScanSafe’s client
ON-PREMISE
AnyConnect
© 2010 Cisco Systems, Inc. All rights reserved. Cisco Systems 41
Mobile Users and Secured Cloud Access
Corporate Border
Branch Office
Applications
and Data
Corporate Office
Policy
Attackers
Home Office
Mobile
User
Enterprise SaaS
© 2010 Cisco Systems, Inc. All rights reserved. Cisco Systems 42
Non Secured Users Should Be Filtered
Out
Corporate Border
Branch Office
Applications
and Data
Corporate Office
Policy
Attackers
Home Office
Mobile
User
Enterprise SaaS
© 2010 Cisco Systems, Inc. All rights reserved. Cisco Systems 43
Public Services Access Can Be
Filtered Out
https://na1.salesforce.com/help/doc/en/salesforce_security_impl_guide.pdf
© 2010 Cisco Systems, Inc. All rights reserved. Cisco Systems 44
Considerations about the
Private Cloud Security
© 2010 Cisco Systems, Inc. All rights reserved. Cisco Systems 45
Trusted
Controlled
Reliable
Secure
CLOSED
First days of a Private Cloud
Anchored on Trust & Control
© 2010 Cisco Systems, Inc. All rights reserved. Cisco Systems 46
Highly Virtualized
Data Centers and
Cloud Computing
Trusted
Controlled
Reliable
Secure
Flexible
Dynamic
On-demand
Efficient
Cloud Computing
Targeting Agility and Efficiency
© 2010 Cisco Systems, Inc. All rights reserved. Cisco Systems 47
Virtualization & Cloud Driving New
Requirements in Data Center
VDC-1
VDC-2
Hypervisor
App
OS
App
OS
App
OS
Dedicated
Network
Services
Firewall SLB/ADC WAN Opt
Virtual Service Nodes (VSNs)
• Virtual appliance form factor
• Dynamic Instantiation/Provisioning
• Service transparent to VM mobility
• Support scale-out
• Large scale multi-tenant operation
• Application-specific
services
• Form factors:
•  Appliance
•  Switch module
Virtual Network Services
© 2010 Cisco Systems, Inc. All rights reserved. Cisco Systems 48
Fully Inter-connected Network Services
Vision
ASA	
  
SIA
Nexus 1000V
SIA
Inter-connected
services across
physical and virtual
environments
SIA: Service Insertion Architecture
VSN
vPath
SIA
SIA
Distribution Layer
Services
Virtual Network
Services
VSN
© 2010 Cisco Systems, Inc. All rights reserved. Cisco Systems 49
Data Center Security Challenges
  Virtualization
  Applications
  Data Loss
  Compliance
  Availability
© 2010 Cisco Systems, Inc. All rights reserved. Cisco Systems 50
Cloud-Specific Issues Emerging
 Organizational & Operational Misalignment
 Monoculture of Operating Systems, Virtualized
Components & Platforms
 Privacy Of Data/Metadata, Exfiltration and
Leakage
 Inability to Deploy Compensating or Detective
Controls
 Segmentation & Isolation In Multi-tenant
environments...
© 2010 Cisco Systems, Inc. All rights reserved. Cisco Systems 51
Cloud Happiness
  Centralized Data (sort of...)
  Segmented data/applications
  Better Logging/Accountability
  Standardized images for asset deployment
  Better Resilience to attack & streamlined incident
response
  More streamlined Audit and Compliance
  Better visibility to process
  Faster deployment of applications, services, etc.
The Cloud can provide the following security benefits:
© 2010 Cisco Systems, Inc. All rights reserved. Cisco Systems 52
Key Takeaways
© 2010 Cisco Systems, Inc. All rights reserved. Cisco Systems 53
Key Takeaways
(From A Customer’s Perspective)
  Have a risk assessment methodology, classify assets and
data.
  Interrogate vendors and providers; use the same diligence that
you would for outsourced services today; focus on resilience/
recovery, SLA’s, confidentiality, privacy and segmentation.
  The challenge is to match business/security requirements
against the various *aaS model(s)
  Each of the *aaS models provides a delicate balance of
openness, flexibility, control, security and extensibility
  Regardless of the model, you are still responsible for some
element of security
© 2010 Cisco Systems, Inc. All rights reserved. Cisco Systems 54
References
  Cloud literature on Cisco.com
http://www.cisco.com/en/US/netsol/ns976/index.html
  Cloud Computing Google Groups:
  Cloud Computing
http://groups.google.com/group/cloud-computing
  Cloud Computing Interoperability Forum
http://groups.google.com/group/cloudforum
  Cloud Storage
http://groups.google.com/group/cloudstorage
  Attend a local
  Join the Cloud Security Alliance & CloudAudit...
© 2010 Cisco Systems, Inc. All rights reserved. Cisco Systems 55

More Related Content

PPTX
Network Security
PPT
Cloud Computing Security Challenges
PPTX
Cloud computing in a nutshell
PPTX
Virtualization
PPTX
Cloud Security
PPTX
Multi cloud security architecture
PPT
Introduction to Cyber Security
PPTX
AWS Cloud Security
Network Security
Cloud Computing Security Challenges
Cloud computing in a nutshell
Virtualization
Cloud Security
Multi cloud security architecture
Introduction to Cyber Security
AWS Cloud Security

What's hot (20)

PPTX
SOAR and SIEM.pptx
PPTX
Advantages and disadvantages of cloud computing ppt.pptx
PPTX
Security architecture, engineering and operations
PPTX
Cloud security
PPTX
Azure AD とアプリケーションを SAML 連携する際に陥る事例と対処方法について
PPTX
Cloud security and security architecture
PDF
hardningproject(公開用).pdf
PPTX
Cloud Service Models
PDF
Cloud computing
PDF
IaaS, SaaS, PasS : Cloud Computing
PDF
Introduction of microsoft azure
PDF
Cloud Security: A New Perspective
PDF
Awsのインフラをデザインパターン駆使して設計構築
PPTX
Cloud computing
PPTX
What is zero trust model (ztm)
PPTX
MULTI-CLOUD ARCHITECTURE
PPTX
Azure: PaaS or IaaS
PPTX
App Modernization with Microsoft Azure
PPTX
Azure security and Compliance
SOAR and SIEM.pptx
Advantages and disadvantages of cloud computing ppt.pptx
Security architecture, engineering and operations
Cloud security
Azure AD とアプリケーションを SAML 連携する際に陥る事例と対処方法について
Cloud security and security architecture
hardningproject(公開用).pdf
Cloud Service Models
Cloud computing
IaaS, SaaS, PasS : Cloud Computing
Introduction of microsoft azure
Cloud Security: A New Perspective
Awsのインフラをデザインパターン駆使して設計構築
Cloud computing
What is zero trust model (ztm)
MULTI-CLOUD ARCHITECTURE
Azure: PaaS or IaaS
App Modernization with Microsoft Azure
Azure security and Compliance
Ad

Viewers also liked (11)

PPTX
Cisco Web and Email Security Overview
PDF
Cisco VMDC Cloud Security 1.0 Design Guide
PDF
Cloud Security Solution Overview
PDF
2010: Mobile Security - Intense overview
PDF
Cisco VMDC Cloud Security 1.0 Design Guide
PDF
StarLink Award certificate
PDF
Sample Slides from the Impactful Presentation Skills Workshop
PDF
Persuasive Communication at IILM, Gurgaon
PPTX
Data Center Trends 2014
PPT
High Impact Presentation
PPTX
10 Powerful Body Language Tips for your next Presentation
Cisco Web and Email Security Overview
Cisco VMDC Cloud Security 1.0 Design Guide
Cloud Security Solution Overview
2010: Mobile Security - Intense overview
Cisco VMDC Cloud Security 1.0 Design Guide
StarLink Award certificate
Sample Slides from the Impactful Presentation Skills Workshop
Persuasive Communication at IILM, Gurgaon
Data Center Trends 2014
High Impact Presentation
10 Powerful Body Language Tips for your next Presentation
Ad

Similar to Presentation cisco cloud security (20)

PPT
5787355.ppt
PDF
Presentation capturing the cloud opportunity
PPT
Security in Cloud Computing
PPTX
AMER Introduction to ThousandEyes Webinar
PDF
Presentation cloud, the whole offer
PDF
Security and Virtualization in the Data Center
PDF
Cisco Fog Computing Solutions: Unleash the Power of the Internet of Things
PDF
Computing solutions
PPTX
How to Optimize Your AWS Environment for Improved Cloud Performance
PPTX
How to Optimize Your AWS Environment for Improved Cloud Performance
PPTX
Realize True Business Value With ThousandEyes
PDF
Intercloud_Fabric
PPT
Features of cloud
PPTX
EMEA What is ThousandEyes? Webinar
PPTX
Cloud Computing Security Frameworks - our view from exoscale
PDF
glenn_amblercloud_security_ncc_event_22-may-2012_v1 (9)
PDF
PDF
BYOD Transforming the Enterprise
PDF
Cloud Security: What you need to know about IBM SmartCloud Security
PPTX
How to Monitor Digital Dependencies Across Your Modern IT Stack
5787355.ppt
Presentation capturing the cloud opportunity
Security in Cloud Computing
AMER Introduction to ThousandEyes Webinar
Presentation cloud, the whole offer
Security and Virtualization in the Data Center
Cisco Fog Computing Solutions: Unleash the Power of the Internet of Things
Computing solutions
How to Optimize Your AWS Environment for Improved Cloud Performance
How to Optimize Your AWS Environment for Improved Cloud Performance
Realize True Business Value With ThousandEyes
Intercloud_Fabric
Features of cloud
EMEA What is ThousandEyes? Webinar
Cloud Computing Security Frameworks - our view from exoscale
glenn_amblercloud_security_ncc_event_22-may-2012_v1 (9)
BYOD Transforming the Enterprise
Cloud Security: What you need to know about IBM SmartCloud Security
How to Monitor Digital Dependencies Across Your Modern IT Stack

More from xKinAnx (20)

PPTX
Engage for success ibm spectrum accelerate 2
PPTX
Accelerate with ibm storage ibm spectrum virtualize hyper swap deep dive
PDF
Software defined storage provisioning using ibm smart cloud
PDF
Ibm spectrum virtualize 101
PDF
Accelerate with ibm storage ibm spectrum virtualize hyper swap deep dive dee...
PDF
04 empalis -ibm_spectrum_protect_-_strategy_and_directions
PPTX
Ibm spectrum scale fundamentals workshop for americas part 1 components archi...
PPTX
Ibm spectrum scale fundamentals workshop for americas part 2 IBM Spectrum Sca...
PPTX
Ibm spectrum scale fundamentals workshop for americas part 3 Information Life...
PPTX
Ibm spectrum scale fundamentals workshop for americas part 4 Replication, Str...
PPTX
Ibm spectrum scale fundamentals workshop for americas part 4 spectrum scale_r...
PPTX
Ibm spectrum scale fundamentals workshop for americas part 5 spectrum scale_c...
PPTX
Ibm spectrum scale fundamentals workshop for americas part 6 spectrumscale el...
PPTX
Ibm spectrum scale fundamentals workshop for americas part 7 spectrumscale el...
PPT
Ibm spectrum scale fundamentals workshop for americas part 8 spectrumscale ba...
PPTX
Ibm spectrum scale fundamentals workshop for americas part 5 ess gnr-usecases...
PDF
Presentation disaster recovery in virtualization and cloud
PDF
Presentation disaster recovery for oracle fusion middleware with the zfs st...
PDF
Presentation differentiated virtualization for enterprise clouds, large and...
PDF
Presentation desktops for the cloud the view rollout
Engage for success ibm spectrum accelerate 2
Accelerate with ibm storage ibm spectrum virtualize hyper swap deep dive
Software defined storage provisioning using ibm smart cloud
Ibm spectrum virtualize 101
Accelerate with ibm storage ibm spectrum virtualize hyper swap deep dive dee...
04 empalis -ibm_spectrum_protect_-_strategy_and_directions
Ibm spectrum scale fundamentals workshop for americas part 1 components archi...
Ibm spectrum scale fundamentals workshop for americas part 2 IBM Spectrum Sca...
Ibm spectrum scale fundamentals workshop for americas part 3 Information Life...
Ibm spectrum scale fundamentals workshop for americas part 4 Replication, Str...
Ibm spectrum scale fundamentals workshop for americas part 4 spectrum scale_r...
Ibm spectrum scale fundamentals workshop for americas part 5 spectrum scale_c...
Ibm spectrum scale fundamentals workshop for americas part 6 spectrumscale el...
Ibm spectrum scale fundamentals workshop for americas part 7 spectrumscale el...
Ibm spectrum scale fundamentals workshop for americas part 8 spectrumscale ba...
Ibm spectrum scale fundamentals workshop for americas part 5 ess gnr-usecases...
Presentation disaster recovery in virtualization and cloud
Presentation disaster recovery for oracle fusion middleware with the zfs st...
Presentation differentiated virtualization for enterprise clouds, large and...
Presentation desktops for the cloud the view rollout

Recently uploaded (20)

PPTX
Cloud computing and distributed systems.
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PPTX
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
Encapsulation theory and applications.pdf
PPTX
Spectroscopy.pptx food analysis technology
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PPTX
Big Data Technologies - Introduction.pptx
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
Cloud computing and distributed systems.
Understanding_Digital_Forensics_Presentation.pptx
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
The AUB Centre for AI in Media Proposal.docx
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
Programs and apps: productivity, graphics, security and other tools
Agricultural_Statistics_at_a_Glance_2022_0.pdf
NewMind AI Weekly Chronicles - August'25 Week I
Encapsulation theory and applications.pdf
Spectroscopy.pptx food analysis technology
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Per capita expenditure prediction using model stacking based on satellite ima...
Big Data Technologies - Introduction.pptx
Spectral efficient network and resource selection model in 5G networks
Chapter 3 Spatial Domain Image Processing.pdf
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Mobile App Security Testing_ A Comprehensive Guide.pdf

Presentation cisco cloud security

  • 1. © 2010 Cisco Systems, Inc. All rights reserved. Cisco Confidential 1 Jean-François Pujol Cisco Systems Cloud Security
  • 2. © 2010 Cisco Systems, Inc. All rights reserved. Cisco Systems 2© 2008 Cisco Systems, Inc. All rights reserved. Cisco SystemsPresentation_ID … and one other Public Cloud Private Cloud Virtual Private Cloud Hybrid Cloud Community Cloud Quick reminder : Cloud Deployment Model Public Cloud Cloud infrastructure made available to the general public. Private Cloud Cloud infrastructure operated solely for an organization. Virtual Private Cloud Cloud services that simulate the private cloud experience in public cloud infrastructure Hybrid Cloud Cloud infrastructure composed of two or more clouds that interoperate or federate through technology Community Cloud Cloud infrastructure shared by several organizations and supporting a specific community NIST Deployment Models
  • 3. © 2010 Cisco Systems, Inc. All rights reserved. Cisco Systems 3 Public vs. Private Cloud Security While the technology basement remains the same, we may consider two different approaches to the problem :   Public Cloud : – Delegation versus Trust   Private Cloud : – Abstraction / Virtualization versus Complexity
  • 4. © 2010 Cisco Systems, Inc. All rights reserved. Cisco Systems 4 Considerations about the Public Cloud Security
  • 5. © 2010 Cisco Systems, Inc. All rights reserved. Cisco Systems 5 The New World : Shifting Borders IT Consumerization Device Border Mobile Worker Location Border Internal Applications IaaS,SaaS Application As A Service Application Border
  • 6. © 2010 Cisco Systems, Inc. All rights reserved. Cisco Systems 6 The (not so) New World : Location Border Mobile Worker Location Border Internal Applications
  • 7. © 2010 Cisco Systems, Inc. All rights reserved. Cisco Systems 7 Traditional Corporate Border Corporate Border Branch Office Applications and Data Corporate Office Policy Attackers
  • 8. © 2010 Cisco Systems, Inc. All rights reserved. Cisco Systems 8 Now with Mobile Users and VPNs Corporate Border Branch Office Applications and Data Corporate Office Policy Attackers Home Office Mobile User
  • 9. © 2010 Cisco Systems, Inc. All rights reserved. Cisco Systems 9 With Mobile Users when not protected by VPNs… Corporate Border Branch Office Applications and Data Corporate Office Policy Attackers Home Office Mobile User
  • 10. © 2010 Cisco Systems, Inc. All rights reserved. Cisco Systems 10 The New World : Application Border Internal Applications IaaS,SaaS Application As A Service Application Border
  • 11. © 2010 Cisco Systems, Inc. All rights reserved. Cisco Systems 11© 2008 Cisco Systems, Inc. All rights reserved. Cisco SystemsPresentation_ID ...Everything is Cloud The Consumer’s View of Cloud
  • 12. © 2010 Cisco Systems, Inc. All rights reserved. Cisco Systems 12 These Cloudy Days …   Internet is reliable   Cloud services are well known in the consumer market, and the consumer market creates some pressure in the enterprise world.   Is LinkedIn a consumer/personal or business service ?   Enterprises are turning every single task into a process. It creates a strong traction for adopting services (OPEX vs CAPEX)
  • 13. © 2010 Cisco Systems, Inc. All rights reserved. Cisco Systems 13 Organizations don’t have even the choice …
  • 14. © 2010 Cisco Systems, Inc. All rights reserved. Cisco Systems 14 Organizations don’t have even the choice …
  • 15. © 2010 Cisco Systems, Inc. All rights reserved. Cisco Systems 16 Organizations don’t have even the choice …
  • 16. © 2010 Cisco Systems, Inc. All rights reserved. Cisco Systems 17 Organizations don’t have even the choice …
  • 17. © 2010 Cisco Systems, Inc. All rights reserved. Cisco Systems 18 Organizations don’t have even the choice …
  • 18. © 2010 Cisco Systems, Inc. All rights reserved. Cisco Systems 19 First security concern   Enterprises are using unmanaged cloud services today – in a more or less control way   On public and (almost) free consumer platforms : – No real control over the corporate image – Risks of information leakage – Risks of misleading – Risks of Social Engineering attacks
  • 19. © 2010 Cisco Systems, Inc. All rights reserved. Cisco Systems 20 Global trend for outsourcing   Every business process is analyzed : – Down to a single application – Down to any individual   If you can define it, measure it, and it is not a core business activity, you want to outsource it
  • 20. © 2010 Cisco Systems, Inc. All rights reserved. Cisco Systems 21 Can you afford to manage the risk ? Imagine you have :   A couple of consultants   Employees under temporary contract   A complete department is outsourced (Dev, Marketing, etc…)   Datacenter exploitation is outsourced   Networks, servers, premises, and people are outsourced   Cloud based services
  • 21. © 2010 Cisco Systems, Inc. All rights reserved. Cisco Systems 22 Key to Broader Adoption of Cloud: Trust Before the Economics of Cloud Computing Can be Considered, Organizations Require a Trusted Service Infrastructure Security Control Service-Level Management Compliance
  • 22. © 2010 Cisco Systems, Inc. All rights reserved. Cisco Systems 23© 2008 Cisco Systems, Inc. All rights reserved. Cisco SystemsPresentation_ID Enterprise Deployment Models Distinguishing between Ownership and Control Ownership Control Internal Resources All cloud resources owned by or dedicated to enterprise External Resources All cloud resources owned by providers; used by many customers Private Cloud Cloud definition/ governance controlled by enterprise Public Cloud Cloud definition/ governance controlled by provider
  • 23. © 2010 Cisco Systems, Inc. All rights reserved. Cisco Systems 24 Data App VM Server Storage Network Dedicated IT Data App VM Server Storage Network Data App VM Server Storage Network Data App VM Server Storage Network Data App VM Server Storage Network Hosting Provider Public Iaas Public Paas Public Saas Organization shares control with service providerOrganization has control Service provider has control Control and Trust evolve with cloud
  • 24. © 2010 Cisco Systems, Inc. All rights reserved. Cisco Systems 25 What This Means To Security Amazon EC2 - IaaS The lower down the stack the Cloud provider stops, the more security you are tactically responsible for implementing & managing yourself. Salesforce - SaaS Google AppEngine - PaaS
  • 25. © 2010 Cisco Systems, Inc. All rights reserved. Cisco Systems 26 The Cloud Security Alliance’s 13 Critical Areas Of Focus for Cloud: 1. Architecture & Framework Governing the Cloud Operating the Cloud 2. Governance & Risk Mgmt 8. Traditional BCM, DR 3. Legal & Electronic Discovery 9. Datacenter Operations 5. Compliance & Audit 10. Incident Response 6. Information Lifecycle Mgmt 11. Application Security 7. Portability & Interoperability 12. Encryption & Key Mgmt 13. Identity & Access Mgmt www.cloudsecurityalliance.org Cloud Security Alliance - Guidance
  • 26. © 2010 Cisco Systems, Inc. All rights reserved. Cisco Systems 27 The Cloud Security Alliance’s Top Threats to Cloud Computing V1.0 : www.cloudsecurityalliance.org Cloud Security Alliance Top Threats to Cloud Computing 1. Abuse and Nefarious Use of Cloud 2. Insecure Interfaces and APIs 3. Malicious Insiders 4. Shared Technology 5. Data Loss or 6. Account or Service Hijacking 7. Unknown Risk Profile
  • 27. © 2010 Cisco Systems, Inc. All rights reserved. Cisco Systems 28 Some important factors to consider for the service  Single Tenancy / Multi-tenancy  Isolated Data / Co-mingled Data  Dedicated Security / Socialist Security  On-premise / Off-premise
  • 28. © 2010 Cisco Systems, Inc. All rights reserved. Cisco Systems 29 CloudAudit & the A6 Deliverable  Provide a common interface and namespace that allows cloud computing providers to automate the Audit, Assertion, Assessment, and Assurance (A6) of their environments  Allow authorized consumers of services to do likewise via an open, extensible and secure interface and methodology. http://www.cloudaudit.org
  • 29. © 2010 Cisco Systems, Inc. All rights reserved. Cisco Systems 30 That is the question …  May your private organization be potentially more secure than a public cloud service ?  (and/or cheaper …)
  • 30. © 2010 Cisco Systems, Inc. All rights reserved. Cisco Systems 31 Saleforce.com 82 000 + customers …
  • 31. © 2010 Cisco Systems, Inc. All rights reserved. Cisco Systems 32 Saleforce.com 82 000 + customers …
  • 32. © 2010 Cisco Systems, Inc. All rights reserved. Cisco Systems 33 Could you Trust Force.com ?
  • 33. © 2010 Cisco Systems, Inc. All rights reserved. Cisco Systems 34 Force.com Security Literature
  • 34. © 2010 Cisco Systems, Inc. All rights reserved. Cisco Systems 35 Security recommendations   1# educate your users   2# Identify your primary security contact   3# Secure Employee Systems   4# Implement IP restrictions   5# strengthen password policies   6# require secure sessions   7# Decrease session timeout value Reference: http://wiki.developerforce.com/index.php/ An_Overview_of_Force.com_SecuritySecurity Webinar : https://salesforce.acrobat.com/securitywebinar
  • 35. © 2010 Cisco Systems, Inc. All rights reserved. Cisco Systems 36 The New World : Device Borders IT Consumerization Device BorderInternal Applications Are they still corporate assets ?
  • 36. © 2010 Cisco Systems, Inc. All rights reserved. Cisco Systems 37 Desktop Virtualization is part of the Security Journey
  • 37. © 2010 Cisco Systems, Inc. All rights reserved. Cisco Systems 38 Corporate Border Branch Office Applications and Data Corporate Office Policy Attackers Home Office Coffee Shop Customers Airport Mobile User Partners Platform as a Service Infrastructure as a Service X as a Service Software as a Service Concern: Security in a Cloud World
  • 38. © 2010 Cisco Systems, Inc. All rights reserved. Cisco Systems 39 Branch Office Corporate Office Home Office SaaS Access Control Regaining Visibility and Control Through Identity SAML- basedAnyConnect Secure Mobility Client Visibility | Centralized Enforcement | Single Source Revocation Redirect @ Login SaaS Single Sign On Web Security Appliance Directory
  • 39. © 2010 Cisco Systems, Inc. All rights reserved. Cisco Systems 40 AnyConnect Secure Mobility Vision On-Premise Gateway or Cloud Policy Enforcement Cisco Cisco Web Security Appliance ASA The image cannot be displayed. Your computer may not have enough memory to open the image, or the image may have been corrupted. Restart your computer, and then open the file again. If the red x still appears, you may have to delete the image and then insert it again. Social Networking Enterprise SaaS News EmailIntegration of ScanSafe’s client ON-PREMISE AnyConnect
  • 40. © 2010 Cisco Systems, Inc. All rights reserved. Cisco Systems 41 Mobile Users and Secured Cloud Access Corporate Border Branch Office Applications and Data Corporate Office Policy Attackers Home Office Mobile User Enterprise SaaS
  • 41. © 2010 Cisco Systems, Inc. All rights reserved. Cisco Systems 42 Non Secured Users Should Be Filtered Out Corporate Border Branch Office Applications and Data Corporate Office Policy Attackers Home Office Mobile User Enterprise SaaS
  • 42. © 2010 Cisco Systems, Inc. All rights reserved. Cisco Systems 43 Public Services Access Can Be Filtered Out https://na1.salesforce.com/help/doc/en/salesforce_security_impl_guide.pdf
  • 43. © 2010 Cisco Systems, Inc. All rights reserved. Cisco Systems 44 Considerations about the Private Cloud Security
  • 44. © 2010 Cisco Systems, Inc. All rights reserved. Cisco Systems 45 Trusted Controlled Reliable Secure CLOSED First days of a Private Cloud Anchored on Trust & Control
  • 45. © 2010 Cisco Systems, Inc. All rights reserved. Cisco Systems 46 Highly Virtualized Data Centers and Cloud Computing Trusted Controlled Reliable Secure Flexible Dynamic On-demand Efficient Cloud Computing Targeting Agility and Efficiency
  • 46. © 2010 Cisco Systems, Inc. All rights reserved. Cisco Systems 47 Virtualization & Cloud Driving New Requirements in Data Center VDC-1 VDC-2 Hypervisor App OS App OS App OS Dedicated Network Services Firewall SLB/ADC WAN Opt Virtual Service Nodes (VSNs) • Virtual appliance form factor • Dynamic Instantiation/Provisioning • Service transparent to VM mobility • Support scale-out • Large scale multi-tenant operation • Application-specific services • Form factors: •  Appliance •  Switch module Virtual Network Services
  • 47. © 2010 Cisco Systems, Inc. All rights reserved. Cisco Systems 48 Fully Inter-connected Network Services Vision ASA   SIA Nexus 1000V SIA Inter-connected services across physical and virtual environments SIA: Service Insertion Architecture VSN vPath SIA SIA Distribution Layer Services Virtual Network Services VSN
  • 48. © 2010 Cisco Systems, Inc. All rights reserved. Cisco Systems 49 Data Center Security Challenges   Virtualization   Applications   Data Loss   Compliance   Availability
  • 49. © 2010 Cisco Systems, Inc. All rights reserved. Cisco Systems 50 Cloud-Specific Issues Emerging  Organizational & Operational Misalignment  Monoculture of Operating Systems, Virtualized Components & Platforms  Privacy Of Data/Metadata, Exfiltration and Leakage  Inability to Deploy Compensating or Detective Controls  Segmentation & Isolation In Multi-tenant environments...
  • 50. © 2010 Cisco Systems, Inc. All rights reserved. Cisco Systems 51 Cloud Happiness   Centralized Data (sort of...)   Segmented data/applications   Better Logging/Accountability   Standardized images for asset deployment   Better Resilience to attack & streamlined incident response   More streamlined Audit and Compliance   Better visibility to process   Faster deployment of applications, services, etc. The Cloud can provide the following security benefits:
  • 51. © 2010 Cisco Systems, Inc. All rights reserved. Cisco Systems 52 Key Takeaways
  • 52. © 2010 Cisco Systems, Inc. All rights reserved. Cisco Systems 53 Key Takeaways (From A Customer’s Perspective)   Have a risk assessment methodology, classify assets and data.   Interrogate vendors and providers; use the same diligence that you would for outsourced services today; focus on resilience/ recovery, SLA’s, confidentiality, privacy and segmentation.   The challenge is to match business/security requirements against the various *aaS model(s)   Each of the *aaS models provides a delicate balance of openness, flexibility, control, security and extensibility   Regardless of the model, you are still responsible for some element of security
  • 53. © 2010 Cisco Systems, Inc. All rights reserved. Cisco Systems 54 References   Cloud literature on Cisco.com http://www.cisco.com/en/US/netsol/ns976/index.html   Cloud Computing Google Groups:   Cloud Computing http://groups.google.com/group/cloud-computing   Cloud Computing Interoperability Forum http://groups.google.com/group/cloudforum   Cloud Storage http://groups.google.com/group/cloudstorage   Attend a local   Join the Cloud Security Alliance & CloudAudit...
  • 54. © 2010 Cisco Systems, Inc. All rights reserved. Cisco Systems 55