SlideShare a Scribd company logo
Securing the Cloud (Don’t get lost in the fog) Chris Munt M/Gateway Developments Ltd
Topics Real World View Assessing risk Corporate/Lawyers View Analysis of commercial risk Technical View Using technology to mitigate risk
Real world view
Assessing risk What risks are you exposed to?
Assessing risk
Assessing risk Indentify weaknesses
Assessing risk Can technology help?
Assessing risk Source: XKCD web comic:  http://xkcd.com/
Assessing risk Lost in the fog of fanciful terms used to describe technology?
Assessing risk Cyberspace Virtualization Cloud computing Private Cloud Public Cloud Hybrid Cloud Cloudware IaaS, PaaS, SaaS
Assessing risk Cloud Computing Real computers
Real databases
Real networks Who’s watching you?
Assessing risk What about human factors?
Assessing risk
Assessing risk
Assessing risk “ You must change your password every few weeks and it must be constructed from no less than twelve characters which will include a mixture of upper and lower case letters, digits and punctuation characters”
Assessing risk Security versus Convenience?
Assessing risk
Assessing risk Why would anyone want to break your security?
Assessing risk
Assessing risk What’s your data worth to you? What’s it worth to someone else?
Assessing risk Lindisfarne Castle, Holy Island ~1797 by Thomas Girtin (1775–1802)
Assessing risk Best security is data locked in a secure room Not practical Sensible compromise required Must be practical with safeguards against all  likely  risks
Corporate/Lawyers view
Cloud Computing: Risks to an organization Focus on Security and Accountability
Gartner report June 2008 Identify seven areas of risk
Suggest questions to be directed at service provider
Reference: http://www.infoworld.com/article/08/07/02/Gartner_Seven_cloudcomputing_security_risks_1.html
User Access Risk Privileged user access Who has access to your data?
Who administers the systems?
Governance
Regulatory Compliance  Risk You are ultimately responsible for the security and integrity of your own data What is in your data?
Do you store sensitive information about others?
Is the supplier subject to external audit in the same way as conventional suppliers of outsourcing solutions?
Data Location Risk You probably have no control of where your data is physically held Can you insist that it be held within a certain jurisdiction?
Can the Cloud provider sign up to local privacy requirements on behalf of their customers?
Data Segregation Risk Your data is usually stored in shared environments along with the data of other customers. Ask about encryption schemes used and how they are verified
Assess risk of encryption accidents Possibility of rendering data unreadable
Risks Associated With Recovery Even with modern equipment disasters can (and do) still happen Can the supplier do a complete recovery?
How long will a full recovery take?
Granularity of recovery?
Risks inherent in investigating security breaches and illegal activity Inherent difficulty in investigating illegal activity in shared environments To what extent can the supplier support investigative work?
To what extent do  you  have to account for illegal activity involving your application and/or data?
Risks associated with sustainability Long term viability of supplier What happens if the supplier goes bust?
What happens if the supplier is taken over by another company?
How would you get your data back (and port it to another platform) if you needed to?
Technical view
Cloud Computing: Security Standards compliance Credit Card transactions Payment Card Industry – PCI compliance 4 Levels Confidential data Medical records

More Related Content

PDF
Protect customer's personal information eng 191018
PDF
Enterprise policy-management
PDF
Data loss prevention by using MRSH-v2 algorithm
PDF
Umer Khalid Thesis Abstract
PDF
What is Two Factor Authentication
PPTX
How can cas bs help
PDF
Data Security by AES Advanced Encryption Standard
PDF
How Privacy in the Cloud Affects Organizations
Protect customer's personal information eng 191018
Enterprise policy-management
Data loss prevention by using MRSH-v2 algorithm
Umer Khalid Thesis Abstract
What is Two Factor Authentication
How can cas bs help
Data Security by AES Advanced Encryption Standard
How Privacy in the Cloud Affects Organizations

What's hot (20)

PPTX
Novel cloud computingsecurity issues
PPTX
Presentation Pci-dss compliance on the cloud
PDF
SaaS Platform Securing
PPTX
PCI-DSS COMPLIANCE ON THE CLOUD
PPTX
Practical Applications of Block Chain Technologies
PPTX
What is a secure enterprise architecture roadmap?
DOCX
Office 365 data loss prevention
PPTX
CYBERSECURITY MESH - DIGITAL TRUST FRAMEWORK
PPTX
Security&Governance
PDF
Blockchain for Accounting & Assurance
PDF
White Paper: Protecting Your Cloud
PPTX
Cloud computing Risk management
PDF
Managed Detection and Response (MDR) Whitepaper
PPTX
Logs in Security and Compliance flare
PDF
Gartner Magic Quadrant for Secure Email Gateways 2014
PPTX
Technology Overview - Symantec Data Loss Prevention (DLP)
PPTX
IDM Reconciliation
DOCX
Scalable and secure of personal health records in cloud computing using attri...
PDF
Institucional proofpoint
PDF
Bridger Insight brochure
Novel cloud computingsecurity issues
Presentation Pci-dss compliance on the cloud
SaaS Platform Securing
PCI-DSS COMPLIANCE ON THE CLOUD
Practical Applications of Block Chain Technologies
What is a secure enterprise architecture roadmap?
Office 365 data loss prevention
CYBERSECURITY MESH - DIGITAL TRUST FRAMEWORK
Security&Governance
Blockchain for Accounting & Assurance
White Paper: Protecting Your Cloud
Cloud computing Risk management
Managed Detection and Response (MDR) Whitepaper
Logs in Security and Compliance flare
Gartner Magic Quadrant for Secure Email Gateways 2014
Technology Overview - Symantec Data Loss Prevention (DLP)
IDM Reconciliation
Scalable and secure of personal health records in cloud computing using attri...
Institucional proofpoint
Bridger Insight brochure
Ad

Similar to Securing The Cloud (20)

PPTX
Cloud Security: A matter of trust?
PPT
28_Security-Privacy-inxssudusd_Cloud.ppt
PPT
28_Security-Privacy-in_Cloud_AND_real.ppt
PDF
Cloud Security
PDF
Lecture27 cc-security2
PDF
Cloud Security
DOCX
Issue identification cloud computing
PPTX
Securing your Cloud Deployment
PDF
Cloud Security - Emerging Facets and Frontiers
PPT
Cloud computing security and privacy christian goire
PDF
Cloud_security_v2_chpater_9_s_version.pdf
PPTX
Practical Security for the Cloud
PPTX
Cloud computing - Assessing the Security Risks - Jared Carstensen
PPTX
What is Cloud Security, and Can I Have Some?
PPTX
Myppt1.pptx on ics subject for 6th semester
PDF
Cloud computing security issues and challenges
PPTX
Security in the cloud Workshop HSTC 2014
PPTX
Cloud Security - Idealware
PDF
The Cloud Beckons, But is it Safe?
PPTX
Cloud Computing Security Essentials for beginners
Cloud Security: A matter of trust?
28_Security-Privacy-inxssudusd_Cloud.ppt
28_Security-Privacy-in_Cloud_AND_real.ppt
Cloud Security
Lecture27 cc-security2
Cloud Security
Issue identification cloud computing
Securing your Cloud Deployment
Cloud Security - Emerging Facets and Frontiers
Cloud computing security and privacy christian goire
Cloud_security_v2_chpater_9_s_version.pdf
Practical Security for the Cloud
Cloud computing - Assessing the Security Risks - Jared Carstensen
What is Cloud Security, and Can I Have Some?
Myppt1.pptx on ics subject for 6th semester
Cloud computing security issues and challenges
Security in the cloud Workshop HSTC 2014
Cloud Security - Idealware
The Cloud Beckons, But is it Safe?
Cloud Computing Security Essentials for beginners
Ad

More from george.james (20)

PPT
Fosdem 2010 GT.M and OpenStreetMap
PPT
M/DB and M/DB:X
PDF
Lost In The Clouds
PPT
On a cloudy day you can scale forever
PPT
Bad Light Stops Play
ODP
Out Of The Slipstream Proposal
PPT
Lightning In The Clouds
ODP
Lost In The Clouds
PPT
Mumps the Internet scale database
PPT
Web Development Environments: Choose the best or go with the rest
PPT
Web Servers: Architecture and Security
PPT
Google's BigTable
PPT
Report from DEVCON 2008
PPT
Michelle's Wallpaper
PPT
The experiences of migrating a large scale, high performance healthcare network
PPT
Beyond The MVC
PPT
Amazon S3 and EC2
PDF
FIS-PIP™ – A high end database application development platform
PPT
Web Design and Programming
PPT
Querying the Web
Fosdem 2010 GT.M and OpenStreetMap
M/DB and M/DB:X
Lost In The Clouds
On a cloudy day you can scale forever
Bad Light Stops Play
Out Of The Slipstream Proposal
Lightning In The Clouds
Lost In The Clouds
Mumps the Internet scale database
Web Development Environments: Choose the best or go with the rest
Web Servers: Architecture and Security
Google's BigTable
Report from DEVCON 2008
Michelle's Wallpaper
The experiences of migrating a large scale, high performance healthcare network
Beyond The MVC
Amazon S3 and EC2
FIS-PIP™ – A high end database application development platform
Web Design and Programming
Querying the Web

Recently uploaded (20)

PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Encapsulation theory and applications.pdf
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
NewMind AI Monthly Chronicles - July 2025
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
CIFDAQ's Market Insight: SEC Turns Pro Crypto
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PPT
Teaching material agriculture food technology
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Spectral efficient network and resource selection model in 5G networks
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
cuic standard and advanced reporting.pdf
Understanding_Digital_Forensics_Presentation.pptx
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Building Integrated photovoltaic BIPV_UPV.pdf
Encapsulation theory and applications.pdf
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
NewMind AI Monthly Chronicles - July 2025
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
Network Security Unit 5.pdf for BCA BBA.
CIFDAQ's Market Insight: SEC Turns Pro Crypto
The AUB Centre for AI in Media Proposal.docx
Encapsulation_ Review paper, used for researhc scholars
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Teaching material agriculture food technology
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Spectral efficient network and resource selection model in 5G networks
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
cuic standard and advanced reporting.pdf

Securing The Cloud