SlideShare a Scribd company logo
Projecting Enterprise Security
Requirements on the Cloud
Case Study-




                                                             Cloud

Presented by:
Billy Cox– Director Cloud Computing Strategy, Intel
Blake Dournaee– Product Manager & Author- SOA Demystified, Intel
Topic Agenda




•   Enterprise Risk Factors & Criteria
•   What can Enterpise Control             Enterprise
                                          Requirements
•   Emerging Standards & Models
•   What Can be Done Today
•   Summary of Intel Cloud Capabilities
Potential Risk- Illustrated




                                                   Amazon Ec2
             Keys to the Castle




Basic Auth Enterprise
Credentials
Compromised For Access




                            Enterprise VM Images
Potential Risk- Illustrated




                                           Amazon Ec2




Rogue Image Trojan
Injected Amongst
Enterprise VMs
Potential Risk- Illustrated

     Virus replayed back
     in Enterprise



                                      Amazon Ec2




              Data sent and lost to
              unknown source
Enterprise Risks & Security Interests

Risk                         Enterprise     Provider

Insecure, Porous APIs        Major Risk     Man in the middle, content threats, code injection, DoS attacks

                                            Don’t care. API security converges along with market price
Logical Multi-Tenancy        Unknown Risk   Virtual machine attacks, malicious code, comingled data

                                            Don’t care. Security of the multi-tenant architecture is a problem for [Insert Hypervisor Vendor
                                            Name] to solve. Oh, and trust us that your data is separate from your neighbor

Data Protection and          Major Risk     Reduced confidentiality for private data stored in the clear at the cloud provider
Leakage
                                            Opposite incentive. Clear text data allows me to provide increased functions based on search

Data Loss and Reliability    Major Risk     Unavailability or loss of critical enterprise data

                                            Care a little. Infrastructure reliability is guaranteed according to my SLA, plus you get a refund if
                                            we mess up ☺
Audit and Monitoring         Major Risk     Rogue uses of cloud services in Enterprise

                                            Care a little. I will provide basic monitoring of infrastructure but the rest is up to you

Cloud Provider Insider       Unknown Risk   Mismatched security practices at CSP creates a weak link for attackers
Threats
                                            Don’t care. We are secure enough. Just trust us.
Account Hacking, Access      Major Risk     Coarse access control at CSP increases the value of a stolen account
Control, and Authorization
                                            Care a little. AAA mechanisms must be good enough to support my SaaS app. It’s your job to
                                            map to our way of handling identities.
Where does Control Lie?

                                         Provider
                                                         Enterprise




Four of the seven risks are directly under the enterprise control
•   Insecure, Porous APIs
•   Data Protection and Leakage
•   Audit and Monitoring
•   Account Hacking, Access Control, and Authorization



Short of a boycott, the remaining 3 are largely out of control…
•   Logical Multi-Tenancy
•   Data Loss and Reliability
•   Cloud Provider Insider Threats
DMTF Cloud Standards
SNIA Cloud Standards
Cloud -                   Eucalyptus
                                                             Cloud Client
             Customer                                        (consumer)
             Network


     Lab Infrastructure               Eucalyptus Cloud                  Bulk Storage
                                       Infrastructure
                                                                             iSCSI
                                                   Walrus
        Caching        Router      Cloud           Storage                  Storage
         Proxy                    Controller       Service                  Server


Cluster block storage
and compute                       Block                      Block
                                                                         Power
managers           Cluster       Storage      Cluster
                                                            Storage
                                                           Controller
                                                                                      Power
                  Controller    Controller
                                             Controller                 Manager       Management

            Node                                            Node
          Controller                                      Controller

            Node                                            Node
          Controller                                      Controller                   KA3
            Node                                            Node
          Controller                                      Controller

            Node                                            Node
          Controller       Compute Clusters               Controller

            Node                                            Node
          Controller                                      Controller
Slide 10

KA3        Fix box titles
           Kelly Anderson, 21/05/2010
Basic Model

                                                                                Cloud Provider



                        Web Service Request
                                                                                      UDDI or Resource

Enterprise
                                                                       Credentials
                                                                        & Policies
                 User
                                             User
                                          Credentials
                                           & Policies

       IdM
                                                        Security Profile




                                                                                     Internal IdM
    • Authentication token
    • Customer access control policies
    • Customer data protection policies
Cloud Access through a Broker

                                                                                                                   Cloud Service
                                                          Cloud Broker                                                Provider
                                                                                                      Broker Token

                     Web                                                                                                          UDDI or
                    Service                                          UDDI or Resource
                                                                                                                                  Resource
Enterprise          Request
                                                       Credentials                                                 Broker
                                                        & Policies                                               Credentials
             User                                                                         Broker
                                 User                                                                             & Policies
                                                                                        Credentials
                              Credentials                                                & Policies
                               & Policies

    IdM
                                            Security                                                  Security
                                            Profile                                                    Profile




                                                              Internal IdM                                                Internal IdM
                    External IdM
#1 – Broker as Management Entry Point


                                                                         Cloud
                                                                         Provider


                                                             Cloud Mgr              Cloud Site 1

Enterprise
Consumer           Request
                                           Service Gateway


                                                                                    Cloud Site 2
  IdM

                  Identity
                  Reference
                                                                                    Cloud Site 3
             • Entry point for cloud management (not
               data, only mgmt)
             • Single point of entry and validation for
               all sites and Cloud Consumers
             • Consistent credentials validation
#2 –Broker as Outbound PEP

                             Dynamic
Enterprise                   Perimeter
Consumer


                                       Private
                                        Cloud                  Cloud Provider 1
  User




  User




                                                                Cloud Provider 2
  User



                                                    UDDI or
                                                    Resource
    • Cloud customer accesses multiple clouds
    • Internal users don’t want to see that
      complexity
    • Broker directs based in policy and converts
      protocols as necessary
    • Secures provider access credentials
Public Cloud & SaaS
Private Cloud Virtual Gateway Usage Model

                                                                                    Private
                                           3. SOAP, REST or JSON
                                               SAML Response
                                                                                    Cloud 1



       Enterprise                                                   Service Virtualization
                                              2. Virtualize, Load
                                               Balance, Firewall,
                                             Generate SAML Token


           Portal & CRM App
                                                                                              Partner
                                                                                    Private
                                                                                    Cloud 2


  IdM , Active                                                      API & Token Broker
Directory, ABAC
                      1. User AuthN/Auth-
                         SOAP/REST, Kerberos, Basic
                         Auth, Siteminder, X.509




                                              Dynamic Enterprise
                                              Perimeter


                              In VPDC, Service Gateway protects access to
                               Services, maps credentials, enforces ABAC,
                                      brokers protocols & formats
CloudBurst Security Using Virtual Gateway

  3. Local
     Authentication
                                                             4. Mapped to an AWS
                                                                Credential in Request
                                                                for Resource

                               2. Locate
                                  Resource(s)                                            Amazon EC2
     Enterprise                                                                           Storage
                                                                                         Public Cloud

                                             Private
  IdM or                                      Cloud
  Active
 Directory

             UDDI or                        API & HSM
             Resource
                                                                                         Force.com Apps
Portal or Web                                                                             Public Cloud
                                   Dynamic
  Service                          Enterprise
                                   Perimeter                  5. Generate SAML
                                                                 Request with Request
                                                                 for Resource to Force




                 1. Request with
                    Credentials to Access
                    a Resource



                                Manage, secure, hide Cloud brokering complexity.
                                    Convert formats. Provide access control
More Information on Intel SOA Expressway & Cloud
                                                        w
                                           er brings ne
                           T his Intel pap
                                         ud Security
                           detail to Clo
                                         t practices”
                           Alliance bes      vis
                                  – Jim Rea
                                                irector,
                                    Executive D
                                                  ty Alliance
                                     Cloud Securi
www.dynamicperimeter.com
Questions?



Click on the questions tab on your screen, type in your question, name
                   and e-mail address; then hit submit.

More Related Content

PPTX
Cloud Access Security Brokers - CASB
PDF
Cloud Access Security Brokers
PDF
Guide to CASB Use Cases
PPTX
Securing virtual workload and cloud
PPTX
Comprehensive Information on CASB
PPTX
Cloud security ppt
PDF
Session 2017 CASB: the Swiss army knife that wants to be a magic wand - en re...
PPTX
cloud security ppt
Cloud Access Security Brokers - CASB
Cloud Access Security Brokers
Guide to CASB Use Cases
Securing virtual workload and cloud
Comprehensive Information on CASB
Cloud security ppt
Session 2017 CASB: the Swiss army knife that wants to be a magic wand - en re...
cloud security ppt

What's hot (19)

PDF
CASB — Your new best friend for safe cloud adoption?
PDF
Security OF The Cloud
PPTX
Cloud security
PPTX
Cloud Security
PPT
Security & Privacy In Cloud Computing
PDF
Azure 101: Shared responsibility in the Azure Cloud
PPTX
Azure security and Compliance
PDF
Microsoft Azure Cloud Services
PPTX
Multi Cloud Architecture Approach
PDF
63 Requirements for CASB
PPTX
Azure security
PDF
AWS Security Best Practices, SaaS and Compliance
PPTX
Cloud security (domain11 14)
PPTX
Security in cloud computing
PDF
Cloud Security Engineering - Tools and Techniques
PPTX
Operational Complexity: The Biggest Security Threat to Your AWS Environment
PDF
Cloud Security: What you need to know about IBM SmartCloud Security
PPT
Cloud Security Alliance's GRC Stack Overview
CASB — Your new best friend for safe cloud adoption?
Security OF The Cloud
Cloud security
Cloud Security
Security & Privacy In Cloud Computing
Azure 101: Shared responsibility in the Azure Cloud
Azure security and Compliance
Microsoft Azure Cloud Services
Multi Cloud Architecture Approach
63 Requirements for CASB
Azure security
AWS Security Best Practices, SaaS and Compliance
Cloud security (domain11 14)
Security in cloud computing
Cloud Security Engineering - Tools and Techniques
Operational Complexity: The Biggest Security Threat to Your AWS Environment
Cloud Security: What you need to know about IBM SmartCloud Security
Cloud Security Alliance's GRC Stack Overview
Ad

Similar to Projecting Enterprise Security Requirements on the Cloud (20)

PPTX
What customers want the cloud to be - Jason Waxman GM at Intel, Cloud Slam 20...
PPT
Trend micro - Your journey to the cloud, where are you
PDF
Layer 7 & Burton Group: New Cloud Security Model Requirements
PPTX
BayThreat Why The Cloud Changes Everything
PDF
Security in a Cloudy Architecture
PPTX
The role of hyper-v in nist model
PDF
Enterprise Strategy for Cloud Security
PDF
Intel Cloud Summit: Greg Brown McAfee
PPTX
NIC 2013 - Configure and Deploy Private Cloud
PDF
Deepsecurity & VDI beveiliging, maximale beveiliging en optimale performance
PPTX
System Center 2012: Bringing the Microsoft Private Cloud Down to Earth
PDF
Seguridad en SQL Azure Windows azure
PPTX
Managing Cloud Security: Intrusion Detection Services in a Public Cloud
PDF
Cloud Security: Perception Vs. Reality
PDF
Enterprise Applications on AWS
PDF
A Practical Approach to Delivering Cloud Platforms Using Novell Solutions: Ho...
PDF
Be Prepared for Tomorrow's IT Forecast: Great Chance of Hybrid Clouds
PDF
Be Prepared for Tomorrow's IT Forecast Great Chance of Hybrid Clouds
PDF
Cloud Security - Made simple
PPTX
17h30 aws enterprise_app_jvaria
What customers want the cloud to be - Jason Waxman GM at Intel, Cloud Slam 20...
Trend micro - Your journey to the cloud, where are you
Layer 7 & Burton Group: New Cloud Security Model Requirements
BayThreat Why The Cloud Changes Everything
Security in a Cloudy Architecture
The role of hyper-v in nist model
Enterprise Strategy for Cloud Security
Intel Cloud Summit: Greg Brown McAfee
NIC 2013 - Configure and Deploy Private Cloud
Deepsecurity & VDI beveiliging, maximale beveiliging en optimale performance
System Center 2012: Bringing the Microsoft Private Cloud Down to Earth
Seguridad en SQL Azure Windows azure
Managing Cloud Security: Intrusion Detection Services in a Public Cloud
Cloud Security: Perception Vs. Reality
Enterprise Applications on AWS
A Practical Approach to Delivering Cloud Platforms Using Novell Solutions: Ho...
Be Prepared for Tomorrow's IT Forecast: Great Chance of Hybrid Clouds
Be Prepared for Tomorrow's IT Forecast Great Chance of Hybrid Clouds
Cloud Security - Made simple
17h30 aws enterprise_app_jvaria
Ad

More from Scientia Groups (14)

PDF
System Center 2012 R2 - Enterprise Automation
PDF
System Center 2012 Orchestrator R2 - Enterprise IT Automation
PPTX
System Center Endpoint Protection
PDF
Brute forcing Wi-Fi Protected Setup
PDF
NIST Definition of Cloud Computing
PDF
Delivering a secure and fast boot experience with uefi
PDF
NSA Best Practices Datasheets
PDF
Zeus and Antivirus
PDF
Cybercriminals target online banking
PDF
PDF
Partners Guide - System Center
PDF
CISO Survey Report 2010
PPTX
2010 1 22 Partner Marketing Call Welcome Rotating Deck
PPTX
Quarterly Marketing Call Presentation 1 22 10
System Center 2012 R2 - Enterprise Automation
System Center 2012 Orchestrator R2 - Enterprise IT Automation
System Center Endpoint Protection
Brute forcing Wi-Fi Protected Setup
NIST Definition of Cloud Computing
Delivering a secure and fast boot experience with uefi
NSA Best Practices Datasheets
Zeus and Antivirus
Cybercriminals target online banking
Partners Guide - System Center
CISO Survey Report 2010
2010 1 22 Partner Marketing Call Welcome Rotating Deck
Quarterly Marketing Call Presentation 1 22 10

Recently uploaded (20)

PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
CIFDAQ's Market Insight: SEC Turns Pro Crypto
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Machine learning based COVID-19 study performance prediction
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
GamePlan Trading System Review: Professional Trader's Honest Take
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
GDG Cloud Iasi [PUBLIC] Florian Blaga - Unveiling the Evolution of Cybersecur...
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Spectral efficient network and resource selection model in 5G networks
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Electronic commerce courselecture one. Pdf
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
Modernizing your data center with Dell and AMD
PPT
Teaching material agriculture food technology
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
[발표본] 너의 과제는 클라우드에 있어_KTDS_김동현_20250524.pdf
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Diabetes mellitus diagnosis method based random forest with bat algorithm
CIFDAQ's Market Insight: SEC Turns Pro Crypto
“AI and Expert System Decision Support & Business Intelligence Systems”
Machine learning based COVID-19 study performance prediction
Unlocking AI with Model Context Protocol (MCP)
GamePlan Trading System Review: Professional Trader's Honest Take
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
GDG Cloud Iasi [PUBLIC] Florian Blaga - Unveiling the Evolution of Cybersecur...
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Spectral efficient network and resource selection model in 5G networks
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Electronic commerce courselecture one. Pdf
The AUB Centre for AI in Media Proposal.docx
Modernizing your data center with Dell and AMD
Teaching material agriculture food technology
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
Mobile App Security Testing_ A Comprehensive Guide.pdf
[발표본] 너의 과제는 클라우드에 있어_KTDS_김동현_20250524.pdf

Projecting Enterprise Security Requirements on the Cloud

  • 1. Projecting Enterprise Security Requirements on the Cloud Case Study- Cloud Presented by: Billy Cox– Director Cloud Computing Strategy, Intel Blake Dournaee– Product Manager & Author- SOA Demystified, Intel
  • 2. Topic Agenda • Enterprise Risk Factors & Criteria • What can Enterpise Control Enterprise Requirements • Emerging Standards & Models • What Can be Done Today • Summary of Intel Cloud Capabilities
  • 3. Potential Risk- Illustrated Amazon Ec2 Keys to the Castle Basic Auth Enterprise Credentials Compromised For Access Enterprise VM Images
  • 4. Potential Risk- Illustrated Amazon Ec2 Rogue Image Trojan Injected Amongst Enterprise VMs
  • 5. Potential Risk- Illustrated Virus replayed back in Enterprise Amazon Ec2 Data sent and lost to unknown source
  • 6. Enterprise Risks & Security Interests Risk Enterprise Provider Insecure, Porous APIs Major Risk Man in the middle, content threats, code injection, DoS attacks Don’t care. API security converges along with market price Logical Multi-Tenancy Unknown Risk Virtual machine attacks, malicious code, comingled data Don’t care. Security of the multi-tenant architecture is a problem for [Insert Hypervisor Vendor Name] to solve. Oh, and trust us that your data is separate from your neighbor Data Protection and Major Risk Reduced confidentiality for private data stored in the clear at the cloud provider Leakage Opposite incentive. Clear text data allows me to provide increased functions based on search Data Loss and Reliability Major Risk Unavailability or loss of critical enterprise data Care a little. Infrastructure reliability is guaranteed according to my SLA, plus you get a refund if we mess up ☺ Audit and Monitoring Major Risk Rogue uses of cloud services in Enterprise Care a little. I will provide basic monitoring of infrastructure but the rest is up to you Cloud Provider Insider Unknown Risk Mismatched security practices at CSP creates a weak link for attackers Threats Don’t care. We are secure enough. Just trust us. Account Hacking, Access Major Risk Coarse access control at CSP increases the value of a stolen account Control, and Authorization Care a little. AAA mechanisms must be good enough to support my SaaS app. It’s your job to map to our way of handling identities.
  • 7. Where does Control Lie? Provider Enterprise Four of the seven risks are directly under the enterprise control • Insecure, Porous APIs • Data Protection and Leakage • Audit and Monitoring • Account Hacking, Access Control, and Authorization Short of a boycott, the remaining 3 are largely out of control… • Logical Multi-Tenancy • Data Loss and Reliability • Cloud Provider Insider Threats
  • 10. Cloud - Eucalyptus Cloud Client Customer (consumer) Network Lab Infrastructure Eucalyptus Cloud Bulk Storage Infrastructure iSCSI Walrus Caching Router Cloud Storage Storage Proxy Controller Service Server Cluster block storage and compute Block Block Power managers Cluster Storage Cluster Storage Controller Power Controller Controller Controller Manager Management Node Node Controller Controller Node Node Controller Controller KA3 Node Node Controller Controller Node Node Controller Compute Clusters Controller Node Node Controller Controller
  • 11. Slide 10 KA3 Fix box titles Kelly Anderson, 21/05/2010
  • 12. Basic Model Cloud Provider Web Service Request UDDI or Resource Enterprise Credentials & Policies User User Credentials & Policies IdM Security Profile Internal IdM • Authentication token • Customer access control policies • Customer data protection policies
  • 13. Cloud Access through a Broker Cloud Service Cloud Broker Provider Broker Token Web UDDI or Service UDDI or Resource Resource Enterprise Request Credentials Broker & Policies Credentials User Broker User & Policies Credentials Credentials & Policies & Policies IdM Security Security Profile Profile Internal IdM Internal IdM External IdM
  • 14. #1 – Broker as Management Entry Point Cloud Provider Cloud Mgr Cloud Site 1 Enterprise Consumer Request Service Gateway Cloud Site 2 IdM Identity Reference Cloud Site 3 • Entry point for cloud management (not data, only mgmt) • Single point of entry and validation for all sites and Cloud Consumers • Consistent credentials validation
  • 15. #2 –Broker as Outbound PEP Dynamic Enterprise Perimeter Consumer Private Cloud Cloud Provider 1 User User Cloud Provider 2 User UDDI or Resource • Cloud customer accesses multiple clouds • Internal users don’t want to see that complexity • Broker directs based in policy and converts protocols as necessary • Secures provider access credentials
  • 17. Private Cloud Virtual Gateway Usage Model Private 3. SOAP, REST or JSON SAML Response Cloud 1 Enterprise Service Virtualization 2. Virtualize, Load Balance, Firewall, Generate SAML Token Portal & CRM App Partner Private Cloud 2 IdM , Active API & Token Broker Directory, ABAC 1. User AuthN/Auth- SOAP/REST, Kerberos, Basic Auth, Siteminder, X.509 Dynamic Enterprise Perimeter In VPDC, Service Gateway protects access to Services, maps credentials, enforces ABAC, brokers protocols & formats
  • 18. CloudBurst Security Using Virtual Gateway 3. Local Authentication 4. Mapped to an AWS Credential in Request for Resource 2. Locate Resource(s) Amazon EC2 Enterprise Storage Public Cloud Private IdM or Cloud Active Directory UDDI or API & HSM Resource Force.com Apps Portal or Web Public Cloud Dynamic Service Enterprise Perimeter 5. Generate SAML Request with Request for Resource to Force 1. Request with Credentials to Access a Resource Manage, secure, hide Cloud brokering complexity. Convert formats. Provide access control
  • 19. More Information on Intel SOA Expressway & Cloud w er brings ne T his Intel pap ud Security detail to Clo t practices” Alliance bes vis – Jim Rea irector, Executive D ty Alliance Cloud Securi www.dynamicperimeter.com
  • 20. Questions? Click on the questions tab on your screen, type in your question, name and e-mail address; then hit submit.