SlideShare a Scribd company logo
Protecting Your
Data on the Cloud
Derek Meng
01
03
02Information security
management of
enterprise's migration to
cloud
Overview
04
RAM Product Design
RAM User and MaxCompute Demo: Add RAM user into
MaxCompute Project
CSA 2016: Top 12 security threats of enterprise's migration to cloud
Data leakage
AccessKey or password leakage/
Lack of IAM practices
API security
System and application software
vulnerabilities
Account sharing or hijacking
Internal attacks
(employees/outsourced
personnel/ISVs)
APTs
Data loss
Insufficient understanding of cloud Technologies
Malicious utilization of cloud services
Denial of Service (DoS)
Technical module sharing
https://cloudsecurityalliance.org/group/top-threats/
1
2
3
4
5
6
7
8
9
10
11
12
About Alibaba Cloud accounts
Alibaba Cloud Resources
Alibaba Cloud Account 2
(Tenant2)
• Basic unit for multi-tenant isolation
on the cloud platform
• Owner of resources
(ResourceOwner)
• Subject of metering and billing
• Permission administrator (root)
Alibaba Cloud Resources
Alibaba Cloud Account 1
(Tenant1)
Explanations about Alibaba Cloud accounts
Alibaba Cloud account security
• Security goal of Alibaba Cloud accounts:
Protect cloud resources from unauthorized access
• Credentials
- Password
- Multi-factor authentication (MFA)
- API AccessKey
Alibaba Cloud Resources
Alibaba Cloud Account 1
(Tenant1)
Alibaba Cloud account vs User
Who	is	the	user?
Employee
Alibaba Cloud Resources
Alibaba Cloud Account
(Buyer)
Application
Alibaba Cloud Resources
Alibaba Cloud Account
(Buyer)
App
Alibaba Cloud account vs User
Who	is	the	user?
Mobile App
Alibaba Cloud Resources
Alibaba Cloud Account
(Buyer)
App
Client
Alibaba Cloud account vs User
Who	is	the	user?
An Alibaba Cloud service
Alibaba Cloud Resources
Alibaba Cloud Account
(Buyer)
ECS
Alibaba Cloud account vs User
Who	is	the	user?
How to centrally manage the
identities and access permissions
of users for tenants?
Question
01
03
02Information security
management of
enterprise's migration to
cloud
Overview
04
RAM Product Design
RAM User and MaxCompute Demo: Add RAM user into
MaxCompute Project
RAM (Resource Access Management)
Alibaba Cloud Resources
Alibaba Cloud Account
(Tenant)
RAMApp
User
authorization
policy
User
• Centralized user
management
• Centralized permission
management
• Unified access control
• Centralized user audit
• Unified bill
RAM core features
App
Authorization capabilities: the minimum granularity and
the strongest control
Scenario description:
To authorize an employee to download only
the privatebucket data of OSS, the operator
must be in the internal network with MFA
logon authentication.
RAM authorization policy description
(Policy language):
A traditional access control matrix
(e.g., ACL) cannot describe
Grant what operation On what object To what user;
{
"Version":"1",
"Statement":[
{
"Effect":"Allow",
"Action":"oss:Get*",
"Resource":"acs:oss:*:*:privatebucket/*",
"Condition":{
"Bool":{
"acs:MFAPresent":"true"
},
"IpAddress":{
"acs:SourceIp":"42.120.88.0/24"
}
}
}
]
}
Implementation of RAM user authorization
Alibaba Cloud Resources
Alibaba Cloud Account
(Tenant)
Check	PermissionApp
User
authorization
policy
User
App
Console or
APIInternet
User
characteristic
Request
characteristic
Resource
characteristic
Protecting Your Big Data on the Cloud

More Related Content

PPTX
Leveraging ApsaraDB to Deploy Business Data on the Cloud
PPTX
Migration to Alibaba Cloud
PPTX
Launch and Scale Your E-commerce Website with Magento
PPTX
Big Data Quickstart Series 3: Perform Data Integration
PPTX
How to Leverage Big Data to Deliver Smart Logistics
PDF
Getting Started with Elasticsearch
PPTX
Introduction to Alibaba Cloud
PPTX
Discovering Cloud Networking: VPC, VPN, Express Connect & Server Load Balancer
Leveraging ApsaraDB to Deploy Business Data on the Cloud
Migration to Alibaba Cloud
Launch and Scale Your E-commerce Website with Magento
Big Data Quickstart Series 3: Perform Data Integration
How to Leverage Big Data to Deliver Smart Logistics
Getting Started with Elasticsearch
Introduction to Alibaba Cloud
Discovering Cloud Networking: VPC, VPN, Express Connect & Server Load Balancer

What's hot (18)

PDF
Serverless Computing: Driving Innovation and Business Value
PPTX
Responding to Digital Transformation With RDS Database Technology
PDF
Why a Multi-cloud Strategy is Essential
PPTX
How to Set Up ApsaraDB for RDS on Alibaba Cloud
PDF
Aneka platform
PDF
Building Complete Private Clouds with Apache CloudStack and Riak CS
PPTX
Benchmark of Alibaba Cloud capabilities
PPTX
AliCloud Object Storage Service (OSS) Core Features
PDF
Better, faster, cheaper infrastructure with apache cloud stack and riak cs redux
PPTX
Cloud Bursting with A10 Lightning ADS
PDF
Cloudlytics: In Depth S3 & CloudFront Log Analysis - Featuring Reports
PDF
Kubernetes Connectivity to Cloud Native Kafka | Christina Lin and Evan Shorti...
PPT
AWS Summit Berlin 2013 - Big Data Analytics
PPTX
NextGen IBM Cloud Monitoring and Logging
PDF
Designing For Multicloud, CF Summit Frankfurt 2016
PPTX
IBM Cloud Object Storage
PDF
Microsoft: Building a Massively Scalable System with DataStax and Microsoft's...
PPTX
Applying ML on your Data in Motion with AWS and Confluent | Joseph Morais, Co...
Serverless Computing: Driving Innovation and Business Value
Responding to Digital Transformation With RDS Database Technology
Why a Multi-cloud Strategy is Essential
How to Set Up ApsaraDB for RDS on Alibaba Cloud
Aneka platform
Building Complete Private Clouds with Apache CloudStack and Riak CS
Benchmark of Alibaba Cloud capabilities
AliCloud Object Storage Service (OSS) Core Features
Better, faster, cheaper infrastructure with apache cloud stack and riak cs redux
Cloud Bursting with A10 Lightning ADS
Cloudlytics: In Depth S3 & CloudFront Log Analysis - Featuring Reports
Kubernetes Connectivity to Cloud Native Kafka | Christina Lin and Evan Shorti...
AWS Summit Berlin 2013 - Big Data Analytics
NextGen IBM Cloud Monitoring and Logging
Designing For Multicloud, CF Summit Frankfurt 2016
IBM Cloud Object Storage
Microsoft: Building a Massively Scalable System with DataStax and Microsoft's...
Applying ML on your Data in Motion with AWS and Confluent | Joseph Morais, Co...
Ad

Similar to Protecting Your Big Data on the Cloud (20)

PDF
Securing Your Cloud Applications
PDF
Scaling Databricks to Run Data and ML Workloads on Millions of VMs
PDF
Best Practice Public Cloud Security
PPTX
OASIS Workshop: Identity, Privacy, and Data Protection in the Cloud – What is...
PPTX
PaaS or Fail: Rule the Cloud with Altus
PPTX
AWS Basic Practitioner Heena Talreja.pptx
PPT
Making Sense Of Cloud Computing - by Mark Rivington
PPTX
PaaS or Fail: Rule the Cloud with Altus
PPTX
MongoDB World 2018: Tutorial - How to Build Applications with MongoDB Atlas &...
PPTX
VANMATHY V cloud computing
PPTX
How McGraw Hill Uses Sumo Logic and AWS for Operational and Security Intellig...
PDF
Webinar hiware
PPTX
Application Security in the Cloud - Best Practices
PDF
Aws lambda webinar -buraku
PPTX
IAM.pptxIAM.pptxIAM.pptxIAM.pptxIAM.pptx
PPTX
Multi cloud governance best practices - AWS, Azure, GCP
PPT
Oracle Keynote Cloud Expo 11-04-09
PDF
Future of Your Atlassian Platform - Data Center and Cloud Migration
PDF
CyberArk Interview Questions and Answers for 2022.pdf
PDF
CyberArk Interview Questions and Answers for 2022.pdf
Securing Your Cloud Applications
Scaling Databricks to Run Data and ML Workloads on Millions of VMs
Best Practice Public Cloud Security
OASIS Workshop: Identity, Privacy, and Data Protection in the Cloud – What is...
PaaS or Fail: Rule the Cloud with Altus
AWS Basic Practitioner Heena Talreja.pptx
Making Sense Of Cloud Computing - by Mark Rivington
PaaS or Fail: Rule the Cloud with Altus
MongoDB World 2018: Tutorial - How to Build Applications with MongoDB Atlas &...
VANMATHY V cloud computing
How McGraw Hill Uses Sumo Logic and AWS for Operational and Security Intellig...
Webinar hiware
Application Security in the Cloud - Best Practices
Aws lambda webinar -buraku
IAM.pptxIAM.pptxIAM.pptxIAM.pptxIAM.pptx
Multi cloud governance best practices - AWS, Azure, GCP
Oracle Keynote Cloud Expo 11-04-09
Future of Your Atlassian Platform - Data Center and Cloud Migration
CyberArk Interview Questions and Answers for 2022.pdf
CyberArk Interview Questions and Answers for 2022.pdf
Ad

More from Alibaba Cloud (13)

PDF
Alibaba Cloud’s ET City Brain - Empowering Cities to Think
PDF
Loan Default Prediction with Machine Learning
PDF
Next Level Digital Media with Alibaba Cloud (Part 2)
PDF
An Introduction to Alibaba Cloud’s Message Service
PDF
Next Generation Retail Part 3 - Retail Transformation Best Practices
PPTX
Cyber Security Compliance Solutions for Foreign Companies in China - Alibaba ...
PPTX
The Next Generation of Retail - Unlocking Alibaba Retail Cloud
PPTX
How to Leverage ApsaraDB to Deploy Business Data on the Cloud
PPTX
Big Data Quickstart Series 1: Create Powerful Data Visualization
PPTX
Introduction to Elastic Compute Service on Alibaba Cloud to Power Your Busine...
PPTX
Guide to Cybersecurity Compliance in China
PPTX
Introduction to WAF and Network Application Security
PPTX
China Connect Webinar: ChinaConnect: How to Apply for an ICP License in 2017
Alibaba Cloud’s ET City Brain - Empowering Cities to Think
Loan Default Prediction with Machine Learning
Next Level Digital Media with Alibaba Cloud (Part 2)
An Introduction to Alibaba Cloud’s Message Service
Next Generation Retail Part 3 - Retail Transformation Best Practices
Cyber Security Compliance Solutions for Foreign Companies in China - Alibaba ...
The Next Generation of Retail - Unlocking Alibaba Retail Cloud
How to Leverage ApsaraDB to Deploy Business Data on the Cloud
Big Data Quickstart Series 1: Create Powerful Data Visualization
Introduction to Elastic Compute Service on Alibaba Cloud to Power Your Busine...
Guide to Cybersecurity Compliance in China
Introduction to WAF and Network Application Security
China Connect Webinar: ChinaConnect: How to Apply for an ICP License in 2017

Recently uploaded (20)

PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Electronic commerce courselecture one. Pdf
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PPTX
MYSQL Presentation for SQL database connectivity
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Advanced IT Governance
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
cuic standard and advanced reporting.pdf
PDF
solutions_manual_-_materials___processing_in_manufacturing__demargo_.pdf
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PPTX
breach-and-attack-simulation-cybersecurity-india-chennai-defenderrabbit-2025....
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
GDG Cloud Iasi [PUBLIC] Florian Blaga - Unveiling the Evolution of Cybersecur...
PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Electronic commerce courselecture one. Pdf
The Rise and Fall of 3GPP – Time for a Sabbatical?
Unlocking AI with Model Context Protocol (MCP)
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
MYSQL Presentation for SQL database connectivity
20250228 LYD VKU AI Blended-Learning.pptx
Advanced IT Governance
Advanced methodologies resolving dimensionality complications for autism neur...
Network Security Unit 5.pdf for BCA BBA.
cuic standard and advanced reporting.pdf
solutions_manual_-_materials___processing_in_manufacturing__demargo_.pdf
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
breach-and-attack-simulation-cybersecurity-india-chennai-defenderrabbit-2025....
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
NewMind AI Weekly Chronicles - August'25 Week I
GDG Cloud Iasi [PUBLIC] Florian Blaga - Unveiling the Evolution of Cybersecur...
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
“AI and Expert System Decision Support & Business Intelligence Systems”

Protecting Your Big Data on the Cloud

  • 1. Protecting Your Data on the Cloud Derek Meng
  • 2. 01 03 02Information security management of enterprise's migration to cloud Overview 04 RAM Product Design RAM User and MaxCompute Demo: Add RAM user into MaxCompute Project
  • 3. CSA 2016: Top 12 security threats of enterprise's migration to cloud Data leakage AccessKey or password leakage/ Lack of IAM practices API security System and application software vulnerabilities Account sharing or hijacking Internal attacks (employees/outsourced personnel/ISVs) APTs Data loss Insufficient understanding of cloud Technologies Malicious utilization of cloud services Denial of Service (DoS) Technical module sharing https://cloudsecurityalliance.org/group/top-threats/ 1 2 3 4 5 6 7 8 9 10 11 12
  • 4. About Alibaba Cloud accounts Alibaba Cloud Resources Alibaba Cloud Account 2 (Tenant2) • Basic unit for multi-tenant isolation on the cloud platform • Owner of resources (ResourceOwner) • Subject of metering and billing • Permission administrator (root) Alibaba Cloud Resources Alibaba Cloud Account 1 (Tenant1) Explanations about Alibaba Cloud accounts
  • 5. Alibaba Cloud account security • Security goal of Alibaba Cloud accounts: Protect cloud resources from unauthorized access • Credentials - Password - Multi-factor authentication (MFA) - API AccessKey Alibaba Cloud Resources Alibaba Cloud Account 1 (Tenant1)
  • 6. Alibaba Cloud account vs User Who is the user? Employee Alibaba Cloud Resources Alibaba Cloud Account (Buyer)
  • 7. Application Alibaba Cloud Resources Alibaba Cloud Account (Buyer) App Alibaba Cloud account vs User Who is the user?
  • 8. Mobile App Alibaba Cloud Resources Alibaba Cloud Account (Buyer) App Client Alibaba Cloud account vs User Who is the user?
  • 9. An Alibaba Cloud service Alibaba Cloud Resources Alibaba Cloud Account (Buyer) ECS Alibaba Cloud account vs User Who is the user?
  • 10. How to centrally manage the identities and access permissions of users for tenants? Question
  • 11. 01 03 02Information security management of enterprise's migration to cloud Overview 04 RAM Product Design RAM User and MaxCompute Demo: Add RAM user into MaxCompute Project
  • 12. RAM (Resource Access Management) Alibaba Cloud Resources Alibaba Cloud Account (Tenant) RAMApp User authorization policy User • Centralized user management • Centralized permission management • Unified access control • Centralized user audit • Unified bill RAM core features App
  • 13. Authorization capabilities: the minimum granularity and the strongest control Scenario description: To authorize an employee to download only the privatebucket data of OSS, the operator must be in the internal network with MFA logon authentication. RAM authorization policy description (Policy language): A traditional access control matrix (e.g., ACL) cannot describe Grant what operation On what object To what user; { "Version":"1", "Statement":[ { "Effect":"Allow", "Action":"oss:Get*", "Resource":"acs:oss:*:*:privatebucket/*", "Condition":{ "Bool":{ "acs:MFAPresent":"true" }, "IpAddress":{ "acs:SourceIp":"42.120.88.0/24" } } } ] }
  • 14. Implementation of RAM user authorization Alibaba Cloud Resources Alibaba Cloud Account (Tenant) Check PermissionApp User authorization policy User App Console or APIInternet User characteristic Request characteristic Resource characteristic