SlideShare a Scribd company logo
© 2010 IBM Corporation
ISSA Hawaii Chapter 2010 Discover Security Conference
Discover Security in the Cloud
Ashish Patel, Lead IT Architect
ashishp@ca.ibm.com
13-14 October 2010
© 2010 IBM Corporation
Agenda
 Why do today’s common Business and IT Challenges exist?
 What is Cloud Computing?
 Insight into trends related to Cloud Computing
 Security in the Cloud
 Case Study: IBM’s Development and Test Cloud
 Where do we start?
2
© 2010 IBM Corporation
As the world gets get smarter, more potential risks affect the
Business and they need to be managed through IT.
3
“Data Center” “Smart Planet”
Mainframe
Internet-scale
Distributed
Planet-scale
Open Cloud
Our world is getting
Instrumented
Our world is getting
Intelligent
Our world is getting
Interconnected
© 2010 IBM Corporation
Common Operational Challenges being presented to IT by the
Business.
4
© 2010 IBM Corporation
New technologies almost always introduce new challenges and
issues for any organization.
5
We have control
It is located at X.
It is stored in servers Y, Z.
We have backups in place.
Our administrators control
access.
Our uptime is sufficient.
The auditors are happy.
Our security team is
engaged.
Who has control?
Where is it located?
Where is it stored?
Who backs it up?
Who has access?
How resilient is it?
How do auditors observe?
How does our security
team engage?
Today’s data center Tomorrow’s cloud environment
??
??
??
??
??
??
Technical concerns:
Isolation failure.
Insecure or incomplete data deletion.
Extended network security.
Additional software layers.
© 2010 IBM Corporation
Todays Business Requirements are driving the adoption of Cloud
Computing in the Enterprise.
6
Metering & Billing
Rapid provisioning
Flexible pricing
Elastic scaling
Advanced virtualization
Standardized,
consumable web-
delivered services
Service Catalog
Ordering
CLOUD COMPUTING
STANDARDIZATIONSTANDARDIZATIONVIRTUALIZATIONVIRTUALIZATION AUTOMATIONAUTOMATION
Reduced
Cost
Reduced
Cost
+
“Cloud” is an emerging consumption and delivery model for many IT-based services, in which the user sees only the
service, and has no need to know anything about the technology or implementation
“Cloud” is an emerging consumption and delivery model for many IT-based services, in which the user sees only the
service, and has no need to know anything about the technology or implementation
+ =
© 2010 IBM Corporation
Delivering a Cloud Computing Service involves more than just a
Platform.
7
Metering
& Monitoring
Service Desk
Transition
Learning
License & ELA
Management
Management
Services
SLA
Compliance
Authentication
Authorization
(SSO)
Asset
Management
Procurement
& Disposal
User-
Request
Management
Data Storage
Management
Software
& Image
Management
Deployment
Services
Application
Rationalizatio
n
Provisioning
& Patch
Management
Application
& Network
Profiling
Application
Delivery
User Profile
Management
Systems
Management
Capacity
Management
File & Print
Management
Security &
Remote Access
Management
Session
Life-cycle
Management
Identity &
Directory
Management
High
Availability
Green
Management
Virtual
Shared
Streaming
or Cloud
Service
Support & Integration
Services
Support & Integration
Services
Life-cycle Management
Services
Life-cycle Management
Services
Infrastructure ServicesInfrastructure Services
Platform SoftwarePlatform Software
© 2010 IBM Corporation
Workloads may be at Different Levels of Cloud Readiness in the
organization.
8
© 2010 IBM Corporation
IBM offers one of the broadest choices of delivery models—from
private cloud computing to “on the IBM Cloud.”
9
 Private cloud
 IBM implements
on client
premises
 Can be
configured to
client-specific
workflows
 Internal network
 Client runs and
manages
 Private cloud
 IBM implements
on client or IBM
premises
 Can be
configured to
client-specific
workflows
 Internal network
 IBM operated
 IBM owned
and operated
 Enterprise–only
access to
resources
 Shared facility
and cloud
management
 Standardized
 Network
isolated
 IBM owned and
operated
 Mix of shared
resources
 Shared facility
and cloud
management
 Elastic scaling
 Pay-as-you-go
 Support and
network options
 Currently not
offered by IBM
 Shared
resources
 Elastic scaling
 Pay-as-you-go
 End-user
access (credit
card)
Enterprise
data center
Private
cloud
11
IBM operated
Enterprise
data center
22
Managed
private cloud
IBM owned and
operated
Enterprise
33
Hosted
private cloud
Public access to
cloud services
User A User B User C
User D User E
55
Shared
cloud services
Enterprise C
Enterprise B
Enterprise A
44
Deployment
models
Private Shared Public
© 2010 IBM Corporation
Concerns about data security and privacy are the primary barriers to
public cloud adoption.
10
Percent rating the factor as a significant barrier (4 or 5)
Respondents could select multiple items
69%
54%
53%
52%
47%
Security/privacy of
company data
Service
quality/performance
Doubts about true cost
savings
Insufficient responsiveness
over network
Difficulty integrating with in-
house IT
What, if anything, do you perceive as actual or potential barriers to acquiring public cloud services?
© 2010 IBM Corporation
Security is important because it enables companies to pursue new,
more efficient IT business models.
11
Strategic
Outsourcing
Strategic
Outsourcing
Global
Outsourcing
Global
Outsourcing
Grid
Computing
Grid
Computing
Service
Oriented
Architecture
Service
Oriented
Architecture
Web 2.0
Collaboration
Web 2.0
Collaboration VirtualizationVirtualization
RisksRisksVendor
Trust
Legislative
Boundaries
Distributed
Infrastructure
Web
Threats
Data
Leakage
Shared
Infrastructure
SecuritySecuritySLAs International
Standards
Availability,
Resiliency
Web
Security
Data Leakage
Prevention
Segmentation
Technologies
Cloud
Computing
Cloud
Computing
Cloud Computing is a natural evolution of the evolving IT paradigms listed above.
A variety of security technologies, processes, procedures, laws, and
trust models are required to secure the cloud. There is no silver bullet!
© 2010 IBM Corporation
Cloud customers need assurance that providers are following sound
security practices in mitigating the risks facing both the customer
and the provider.
 The security requirements in cloud
computing are not different from other
distributed environments operated in a
service provider model.
 However, through the low price points
offered in a cloud and an often more
anonymous consumer-provider-
interaction, worries can grow.
12
© 2010 IBM Corporation
Top concerns of security in the cloud focus on a business’ privacy,
protection, and resiliency.
13
Compliance
Complying with SOX, HIPPA
and other regulations may prohibit the use of
clouds for some applications. Comprehensive
auditing capabilities are essential.
Loss of Control
Many companies and governments are
uncomfortable with the idea of their information
located on systems they do not control. Providers
must offer a high degree of security transparency to
help
put customers at ease.
Reliability
High availability will be a key concern. IT departments will
worry about a loss of service should outages occur.
Mission critical applications may not run in the cloud
without strong availability guarantees.
Security Management
Providers must supply easy, visual controls to
manage firewall and security settings for
applications and runtime environments in the
cloud.
Data Security
Migrating workloads to a shared network and
compute infrastructure increases the potential
for unauthorized exposure. Authentication and
access technologies become increasingly
important.
© 2010 IBM Corporation
Gartner reports there are 7 security risks of Cloud Computing, all of
which align with IBM’s Security Framework.
14
Data SegregationData Segregation
Data RecoveryData Recovery
Investigative SupportInvestigative Support
Regulatory ComplianceRegulatory Compliance
Data LocationData Location
Privileged User AccessPrivileged User Access
Disaster RecoveryDisaster Recovery
Gartner: Assessing the Security Risks of Cloud Computing, June 2008
11
22
33
44
55
66
77
11
22
33
44
55
© 2010 IBM Corporation
People and Identity is a top security risk of Cloud Computing.
15
11
Summary: Access management and single sign-on solution that manages the
difficulty of executing security policies across a wide range of Web and
application resources.
Use Case: Validation and processing of user identity information. Addresses
the need of authentication of users to the cloud ecosphere.
Deployment Scenario: Positioned at Application Server to authenticate
access to back end and management functions.
Tivoli Access Manager (TAM)
Service
Management
Systems and Image
Management
Computing
Infrastructure
Systems Storage
Network
Service Requestor
Service Provider
TAM
Privileged User
Access
Separation of
administrative and
user roles in a cloud
environment
© 2010 IBM Corporation
People and Identity is a top security risk of Cloud Computing.
16
11
Summary: Enable trust between SOA-based initiatives by connecting users to
services across business domains and helps enterprises strengthen and
automate user access rights.
Use Case: Validation and processing of user identity information. Addresses
the need of authentication of users to the cloud ecosphere.
Deployment Scenario: Positioned at Application Server to authenticate
access to back end and management functions.
Tivoli Federated Identity Manager (TFIM)Cloud Identity
Federation
Single access
method for users
into cloud and
traditional
applications
Service
Management
Systems and Image
Management
Computing
Infrastructure
Systems Storage
Network
TFIM
3rd
Party
Cloud
Service Requestor
Service Provider
© 2010 IBM Corporation
Data and Information is a top security risk of Cloud Computing.
17
22
Summary: Designed to be shared by thousands of users, the IBM server has
security built into nearly every level of the computer - from the processor to the
OS to the application level.
Use Case: Application isolation, OS containers, encrypted storage, VLANs
and other isolation technologies provide a secure multi-tenant infrastructure.
Deployment Scenario: At the systems, storage, and networking layers of the
cloud.
IBM Systems, Storage, and Network SegmentationData Segregation
Managing shared
data resources
within a multi-tenant
environment
Service
Management
Systems and Image
Management
Computing
Infrastructure
Storage
Network
Service Requestor
Systems
Service Requestor
© 2010 IBM Corporation
Data and Information is a top security risk of Cloud Computing.
18
22
Summary: Information Protection Services is a fully managed, utility based
service based on usage - designed as multi-tenant, public cloud, with over
3,400 customers under management.
Use Case: Remote data protection to provide business continuity and
resiliency to customer datacenters and private clouds.
Deployment Scenario: Automatically backs up data to security-rich IBM data
centers via your existing network.
IBM Information Protection ServicesData Recovery
Backup and
recovery of data
stored remotely in
the cloud
Private
Cloud
Enterprise Data Center
© 2010 IBM Corporation
Application and Process is a top security risk of Cloud Computing.
19
33
Summary: IBM Rational AppScan scans and tests for common Web
application vulnerabilities including SQL-Injection, Cross-Site Scripting and
Buffer Overflow. IBM ISS Professional Security Services performs automated
scans to identify OSes, apps, and their respective vulnerabilities.
Use Case: External or internal testing of cloud applications and their hosted
infrastructure.
Deployment Scenario: Internal testing and remote security services.
IBM Rational AppScan & IBM ISS Vulnerability Assessment ServicesCompliance &
Auditing
Vulnerability and
compliance
checking of cloud
applications
Systems Storage
Network
IBM Rational AppScan
ISS Vulnerability Scanning
Business Applications
Computing
Infrastructure
Email CRM
DB SaaS
BPM Host
© 2010 IBM Corporation
Application and Process is a top security risk of Cloud Computing.
20
33
Summary: IBM ISS Security Event and Log Management Service enables
corporations to compile event and log files from network applications and
operating systems, as well as security technologies, into one seamless
platform.
Use Case: Improves the speed of conducting security investigation and
archives forensically-sound data, admissible as evidence in a court of law, for
a period of up to seven years.
Deployment Scenario: Remote
IBM Audit Technologies & IBM ISS Security Event and Log Management ServiceInvestigative
Support
Ability to inspect
and audit a cloud
provider’s logs and
records
Systems Storage Network
Computing Infrastructure
LOG LOG LOG LOG
Apps
IBM ISS Security Event & Log Management Services
© 2010 IBM Corporation
Networks, Servers, and Endpoints are a top security risk of Cloud
Computing.
21
44
Summary: IBM ISS security products and services driven by X-Force
research, Tivoli Security Software to reduce cost and risk, and IBM Systems
create a highly secure computing environment that minimizes the potential risk
posed by security threats.
Use Case: Flexible policy management, web threat protection, application
control, etc.
Deployment Scenario: In the traditional enterprise IT environment.
IBM Enterprise Security SolutionsEnterprise
Security
Security for existing
IT infrastructure as
it
extends to the
cloud
Systems Security
Software Security
Network Security
Security Services
© 2010 IBM Corporation
Networks, Servers, and Endpoints are a top security risk of Cloud
Computing.
22
44
Summary: IBM offers the industry’s broadest set of virtualization capabilities.
Relying on over 40 years of heritage and attention to security, IBM
virtualization platforms are built with security, not as an afterthought, but as a
requirement. ISS Proventia Server stops threats inside VMs.
Use Case: Security of the virtualization stack that enables flexible, rapid
provisioning across heterogeneous servers and hypervisors.
Deployment Scenario: In the virtual data center.
IBM Systems & IBM ISS Virtualization SecurityVirtualization
Security
Security for pools of
high performance
virtualized
resources
Service
Management
Systems and Image
Management
Computing
Infrastructure
Systems Storage
Virtual Network
Service Requestor
Service Provider
© 2010 IBM Corporation
Physical Infrastructure is a top security risk of Cloud Computing.
23
55
Summary: IBM offers a validation program for cloud
service providers to ensure the resiliency of their
business.
Use Case: By using proven resiliency consulting
methodology, combined with our traditional shared
and dedicated asset business and resiliency
managed services, we are positioning IBM as the
premier resiliency provider to Cloud service
providers.
Deployment Scenario: Remote testing services.
Resilient Cloud Validation ProgramDisaster Recovery
Restoration and
availability of cloud
computing
resources
Resilient
Cloud
Public or Private Cloud
Summary: Infrastructure-as-a-Service
Use Case: IBM delivers project-based cloud
services (private cloud) and managed cloud services
(public clouds) anywhere in the world.
Deployment Scenario: Infrastructure-as-a-service
for development , test and desktop users.
IBM Cloud ServicesData Location
Ability to process
data in specific
jurisdictions
according to local
requirements
© 2010 IBM Corporation
Cloud computing also provides the opportunity to simplify security controls
and defenses.
24
 Centralized Identity and Access Control policies
 Well-defined set of input/output interfaces
People &
Identity
People &
Identity
 Computing services running in isolated domains as defined in service catalogs
 Default encryption of data in motion & at rest
 Virtualized storage providing better inventory, control, and tracking of master data
 Autonomous security policies and procedures
 Personnel and tools with specialized knowledge of the cloud ecosystem
 SLA-backed availability and confidentiality
 Automated provisioning and reclamation of hardened runtime images
 Dynamic allocation of pooled resources to mission-oriented resources
 Simplified, built-in security controls
 Closer coupling of systems for management of physical and logical identity/access
 Strong platform of compute resources with integrated workload-balancing and resiliency
 Highly-fortified physical data centers
Process &
Application
Process &
Application
Physical infrastructurePhysical infrastructure
Information &
Data
Information &
Data
Network Server &
Endpoint
Network Server &
Endpoint
11
22
33
44
55
© 2010 IBM Corporation
As enterprises come to rely on hybrid cloud environments,
management, security and integration disciplines will need to evolve
as well.
 Management of workloads running off-
premise on clouds
– Management of software applications and
services (monitoring, events, availability,
performance)
– Service request management (governance
of service provisioning)
– Dashboard for service visibility
 Security for hybrids
– Control security and resilience of services
(identity management, compliance, isolation)
 Integration (connectivity) of hybrid
applications and information
– On-premise to off-premise business
application connectivity and governance
– Information exchange across the enterprise
and clouds
25
Enterprise Resources
Public
cloud
Trusted cloud
Enterprise management and governance
of cloud software, applications, workload
Private
cloud
© 2010 IBM Corporation
IBM Development and Test Cloud
26
© 2010 IBM Corporation
Shifting your development and test capabilities to the cloud
environment can drive significant benefits.
27
ToFrom
ComplexComplexStandardizationStandardization
NoneNoneSelf serviceSelf service
Fixed cost
model
Fixed cost
modelMetering or billingMetering or billing
WeeksWeeksTest provisioningTest provisioning
Payback period for
new services
Payback period for
new services
Release managementRelease management
Change managementChange management
Server and storage
utilization
Server and storage
utilization
YearsYears
WeeksWeeks
MonthsMonths
10-20 percent10-20 percent
Self serviceSelf service
UnlimitedUnlimited
GranularGranular
MinutesMinutes
MonthsMonths
MinutesMinutes
Days or hoursDays or hours
70-90 percent70-90 percent
Legacy development and
test environments
Cloud-enabled development
and test environments
Cloud accelerates business
value across a wide variety
of domains.
Capabilities
1
Based on results from IBM’s Technology Adoption Program. Client-specific results can only be ascertained after a return on investment analysis.
© 2010 IBM Corporation
IBM Smart Business Development and Test on the IBM Cloud
provides you with an enterprise-class cloud environment for
development and test workloads.
28
The production site is at
http://www.ibm.com/cloud/enterprise
More information on the offering at
http://www.ibm.com/cloud/solutions/development
The solution provides the following:
 Choice of nine virtual server configurations
 Choice of preconfigured software from which
to build private image libraries
 Option to add blocks of persistent storage
 Network isolation option (VPN/VLAN)
 Support options, forums and by phone
 Choice of two sites (US and Germany)
Payment options:
 Pay-as-you-go
– Virtual machines, software images and
static IP addresses per hour usage
charge
– Persistent storage per block per month
– Internet data transfer per GB transferred
 Reserved capacity packages with preferred
pricing
© 2010 IBM Corporation
Security is built into the IBM Smart Business Development
and Test on the IBM Cloud offering.
Virtual infrastructure
 Hypervisor-based isolation with customer configurable firewall rules
 Physical firewall and IPS/IDS between guest virtual machines (VMs)
and Internet
 Optional virtual private network (VPN) and virtual local area network (VLAN)
isolation of account instances
 Connections are encrypted and IBM is isolated from VMs by design (SSH keys)
 Customer has root access to guest virtual machines allowing further hardening
of VMs
 Shared images patched and scanned regularly
Management infrastructure
 Access to the infrastructure is only enabled using web identity through the user
interface portal or APIs
 Complies with IBM security policies, including regular security scans
 Controlled and audited administrative actions and operations
Delivery centers
 Customer data and VMs are kept in the data center where provisioned
 Physical security same as for IBM’s internal data centers
29
IBM Cloud
services
Your servers and
personal computers
(PCs)
Your
firewall
IBM unique security and
authentication model
IBM firewall
Optional VPN gateway
Guest VMs and data
IBM delivery
centers
Management infrastructure
Private and
Shared VLANs
© 2010 IBM Corporation
VPNs are established from client provided infrastructure to a
VPN gateway in the IBM Data Center. Routing is established
to link to client dedicated infrastructure.
30
© 2010 IBM Corporation
You can have your development and test environment running in
minutes on the IBM Cloud.
31
The easy-to-use self service portal guides you
through setting up what you need and triggers the
automated provisioning of your servers.
The easy-to-use self service portal guides you
through setting up what you need and triggers the
automated provisioning of your servers.
Step 1
Click and choose
the service you need
Step 2 Step 3
Choose the hardware
and usage configuration
Application provisioned
and ready to run
© 2010 IBM Corporation
IBM Development and Test Cloud User Experience
32
1. Site Intro
2.Log-in
3. Pick Image
© 2010 IBM Corporation
IBM Development and Test Cloud User Experience
33
5. Verify Configuration4. Pick Size
© 2010 IBM Corporation
IBM Development and Test Cloud User Experience
34
6. Service Agreement 7. Provision
© 2010 IBM Corporation
IBM’s Cloud offerings illustrated how cloud solution choices must be
aligned to workloads.
35
Existing
Smart Business
on the IBM Cloud
Smart Business Cloud
Smart Business
Systems
Standardized services
on the IBM Cloud
Pre-integrated,
workload
optimized systems
Private cloud services,
behind your firewall,
built and/or managed
by IBM
IBM Lotus Live
IBM CloudBurst
IBM Smart Business
Development & Test
Cloud
IBM Smart
Business Desktop
Cloud
IBM Smart
Business
Storage Cloud
Analytics Collaboration Development
and Test
Desktop and
Devices
Infrastructure
Storage
IBM Smart
Analytics System
IBM Smart Business
for SMB (backed by
the IBM cloud)
Infrastructure
Compute
IBM Compute
on
Demand
IBM Information
Protection
Services
Business
Services
IBM BPM
Blueworks (Design
tools)
IBM Smart
Business End
User Support-IBM
Service Assist
IBM Smart Business
Desktop on the IBM
Cloud
IBM Smart
Analytics Cloud
IBM LotusLive
iNotes
IBM Smart
Business
Expense
Reporting on the
IBM Cloud
IBM Information
Archive
IBM Smart Business
Dev & Test on the
IBM Cloud
Lotus
Foundation
© 2010 IBM Corporation
Bridging Development and Operations has proven Business benefits
and should be taken into consideration when deploying Cloud
solutions.
 A complete view of configuration and asset change impact
 Easily identify, trace and manage newly released assets across the void
 Understand which fine grained development assets have been validated for new operational
configurations
36
Federated
Search & Deployment
Operations / Management
Manages all types of information needed by
Service Management process execution
 Capture both actual and authorized application and
service data and topologies
 Establish relationships and references between all
logical/physical entities
 Records configuration relationships using metadata
Discover Relate Control GovernAutomate
Change and Configuration Management
Database
Development
Manages asset information for
development and re-use
 Define asset types
 Creates and manage all types of assets
 Provide development asset traceability and
details
 Collaborate on asset development
Define Search/
Retrieve
Create/
Modify
GovernMeasure
Centralized Software Delivery
© 2010 IBM Corporation
Benefits of Cloud Computing are realized when Cloud usage will be
tailored to the workload.
37
Workloads continuing in traditional environments
 Database
 Transaction processing
 Workloads requiring flexibility and customization
 Highly regulated workloads e.g.
 Sensitivity of employee information
 Health care and legal records
 Workloads subject to Sarbanes-Oxley
Workloads that can be standardised for cloud
 Web infrastructure applications
 Collaboration infrastructure
 Development and test
 High performance computing
Workloads that are made possible by public cloud
 High volume, low cost analytics
 Collaborative business networks
 “Smart” applications
© 2010 IBM Corporation
Ashish Patel, IBM Certified IT Architect
Lead IT Architect, IBM Cloud Services
IBM Global Technology Services
ashishp@ca.ibm.com | 905-413-3867

More Related Content

PPTX
Cloud computing security issues and challenges
DOCX
Cloud Computing Security Issues in Infrastructure as a Service” report
PDF
Presentation on cloud computing security issues using HADOOP and HDFS ARCHITE...
PPT
Cloud Computing Security Issues
PPT
Cloud Computing Security Issues in Infrastructure as a Service”
PDF
Cloud Security - Security Aspects of Cloud Computing
PPT
Cloud computing security
PDF
Evaluation Of The Data Security Methods In Cloud Computing Environments
Cloud computing security issues and challenges
Cloud Computing Security Issues in Infrastructure as a Service” report
Presentation on cloud computing security issues using HADOOP and HDFS ARCHITE...
Cloud Computing Security Issues
Cloud Computing Security Issues in Infrastructure as a Service”
Cloud Security - Security Aspects of Cloud Computing
Cloud computing security
Evaluation Of The Data Security Methods In Cloud Computing Environments

What's hot (20)

PPT
Cloud Computing - Security Benefits and Risks
PPTX
Cloud computing and its security issues
PPTX
Cloud Security Issues 1.04.10
PPT
Security issue in cloud by himanshu tiwari
PPTX
Cloud Computing Security Issues
PDF
Cloud computing security issues and challenges
DOC
Cloud security
PPT
security Issues of cloud computing
PPTX
Authentication cloud
PPT
Cloud Computing Security Challenges
PPTX
Security Issues in Cloud Computing
PPTX
Ryan_Holt_MS_Thesis_Project_Presentation
PDF
Data protection in cloud computing - Data Protection Conference 2011
PDF
SOME SECURITY CHALLENGES IN CLOUD COMPUTING
PPT
Security Issues of Cloud Computing
PPTX
Data Confidentiality in Cloud Computing
PPTX
Ensuring data storage security in cloud computing
PDF
Literature Review: Security on cloud computing
PPT
On technical security issues in cloud computing
PPTX
Data security in cloud computing
Cloud Computing - Security Benefits and Risks
Cloud computing and its security issues
Cloud Security Issues 1.04.10
Security issue in cloud by himanshu tiwari
Cloud Computing Security Issues
Cloud computing security issues and challenges
Cloud security
security Issues of cloud computing
Authentication cloud
Cloud Computing Security Challenges
Security Issues in Cloud Computing
Ryan_Holt_MS_Thesis_Project_Presentation
Data protection in cloud computing - Data Protection Conference 2011
SOME SECURITY CHALLENGES IN CLOUD COMPUTING
Security Issues of Cloud Computing
Data Confidentiality in Cloud Computing
Ensuring data storage security in cloud computing
Literature Review: Security on cloud computing
On technical security issues in cloud computing
Data security in cloud computing
Ad

Similar to Security in Cloud Computing (20)

PDF
Presentation cloud security the grand challenge
PDF
Cloud Security: What you need to know about IBM SmartCloud Security
PDF
Ijaprr vol1-1-1-5dr tejinder
PDF
10 security concerns cloud computing
PDF
Ijaprr vol1-1-1-5dr tejinder
PDF
glenn_amblercloud_security_ncc_event_22-may-2012_v1 (9)
PPTX
Top Trends in Cloud Computing for 2023.pptx
PDF
The Secure Path to Value in the Cloud by Denny Heaberlin
PDF
EMEA10: Trepidation in Moving to the Cloud
ODP
Security Considerations on Hybrid Cloud
PPTX
The why of a cloud ppt
PDF
The-Roadmap-to-Master-Cloud.pdf
PPT
Cloud Computing - Beyond the Hype
 
PDF
Trust based Mechanism for Secure Cloud Computing Environment: A Survey
PDF
Security of Data in Cloud Environment Using DPaaS
PDF
How Secure Is Cloud
DOCX
C11-1 CASE STUDY 11 CLOUD COMPUTING (IN)SECURITY .docx
PDF
It auditing to assure a secure cloud computing
PDF
B018211016
PDF
IRJET- An Effective Protection on Content based Retrieval in Cloud Storehouse
Presentation cloud security the grand challenge
Cloud Security: What you need to know about IBM SmartCloud Security
Ijaprr vol1-1-1-5dr tejinder
10 security concerns cloud computing
Ijaprr vol1-1-1-5dr tejinder
glenn_amblercloud_security_ncc_event_22-may-2012_v1 (9)
Top Trends in Cloud Computing for 2023.pptx
The Secure Path to Value in the Cloud by Denny Heaberlin
EMEA10: Trepidation in Moving to the Cloud
Security Considerations on Hybrid Cloud
The why of a cloud ppt
The-Roadmap-to-Master-Cloud.pdf
Cloud Computing - Beyond the Hype
 
Trust based Mechanism for Secure Cloud Computing Environment: A Survey
Security of Data in Cloud Environment Using DPaaS
How Secure Is Cloud
C11-1 CASE STUDY 11 CLOUD COMPUTING (IN)SECURITY .docx
It auditing to assure a secure cloud computing
B018211016
IRJET- An Effective Protection on Content based Retrieval in Cloud Storehouse
Ad

More from Ashish Patel (16)

PDF
Thinking In Cloud Native
PDF
American Marketing Association, Legendary Leadership Series: Think like a sof...
PDF
Digital is more than just technology
PDF
Digital Transformation: Embracing a Growth Mindset
PDF
Can your business survive the next disaster?
PPTX
Where in the world is your Corporate data?
PPTX
DevOps and the Enterprise Cloud
PPTX
TeraGo Corporate Services Overview
PPTX
IBM Cloud OpenStack Services
PPT
IBM Corporate Services Corps - Experience in Malaysia
PPT
IBM Rational AppScan Technical Overview
PPT
IBM Rational AppScan Product Overview
PPT
Application Response Measurement (ARM) based Monitoring for Eclipse
PPT
IBM Performance Optimizaiton Toolkit for Rational Performance Tester
PPT
IBM Performance Optimizaiton Toolkit for Rational Application Developer
PPT
Using and Extending the Eclipse Test and Performance Tools Platform (TPTP) fo...
Thinking In Cloud Native
American Marketing Association, Legendary Leadership Series: Think like a sof...
Digital is more than just technology
Digital Transformation: Embracing a Growth Mindset
Can your business survive the next disaster?
Where in the world is your Corporate data?
DevOps and the Enterprise Cloud
TeraGo Corporate Services Overview
IBM Cloud OpenStack Services
IBM Corporate Services Corps - Experience in Malaysia
IBM Rational AppScan Technical Overview
IBM Rational AppScan Product Overview
Application Response Measurement (ARM) based Monitoring for Eclipse
IBM Performance Optimizaiton Toolkit for Rational Performance Tester
IBM Performance Optimizaiton Toolkit for Rational Application Developer
Using and Extending the Eclipse Test and Performance Tools Platform (TPTP) fo...

Recently uploaded (20)

PPTX
Cloud computing and distributed systems.
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Approach and Philosophy of On baking technology
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
Modernizing your data center with Dell and AMD
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
KodekX | Application Modernization Development
PDF
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Encapsulation_ Review paper, used for researhc scholars
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PPT
Teaching material agriculture food technology
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Cloud computing and distributed systems.
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Diabetes mellitus diagnosis method based random forest with bat algorithm
Per capita expenditure prediction using model stacking based on satellite ima...
Approach and Philosophy of On baking technology
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Chapter 3 Spatial Domain Image Processing.pdf
Modernizing your data center with Dell and AMD
Mobile App Security Testing_ A Comprehensive Guide.pdf
KodekX | Application Modernization Development
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Dropbox Q2 2025 Financial Results & Investor Presentation
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Encapsulation_ Review paper, used for researhc scholars
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Teaching material agriculture food technology
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx

Security in Cloud Computing

  • 1. © 2010 IBM Corporation ISSA Hawaii Chapter 2010 Discover Security Conference Discover Security in the Cloud Ashish Patel, Lead IT Architect ashishp@ca.ibm.com 13-14 October 2010
  • 2. © 2010 IBM Corporation Agenda  Why do today’s common Business and IT Challenges exist?  What is Cloud Computing?  Insight into trends related to Cloud Computing  Security in the Cloud  Case Study: IBM’s Development and Test Cloud  Where do we start? 2
  • 3. © 2010 IBM Corporation As the world gets get smarter, more potential risks affect the Business and they need to be managed through IT. 3 “Data Center” “Smart Planet” Mainframe Internet-scale Distributed Planet-scale Open Cloud Our world is getting Instrumented Our world is getting Intelligent Our world is getting Interconnected
  • 4. © 2010 IBM Corporation Common Operational Challenges being presented to IT by the Business. 4
  • 5. © 2010 IBM Corporation New technologies almost always introduce new challenges and issues for any organization. 5 We have control It is located at X. It is stored in servers Y, Z. We have backups in place. Our administrators control access. Our uptime is sufficient. The auditors are happy. Our security team is engaged. Who has control? Where is it located? Where is it stored? Who backs it up? Who has access? How resilient is it? How do auditors observe? How does our security team engage? Today’s data center Tomorrow’s cloud environment ?? ?? ?? ?? ?? ?? Technical concerns: Isolation failure. Insecure or incomplete data deletion. Extended network security. Additional software layers.
  • 6. © 2010 IBM Corporation Todays Business Requirements are driving the adoption of Cloud Computing in the Enterprise. 6 Metering & Billing Rapid provisioning Flexible pricing Elastic scaling Advanced virtualization Standardized, consumable web- delivered services Service Catalog Ordering CLOUD COMPUTING STANDARDIZATIONSTANDARDIZATIONVIRTUALIZATIONVIRTUALIZATION AUTOMATIONAUTOMATION Reduced Cost Reduced Cost + “Cloud” is an emerging consumption and delivery model for many IT-based services, in which the user sees only the service, and has no need to know anything about the technology or implementation “Cloud” is an emerging consumption and delivery model for many IT-based services, in which the user sees only the service, and has no need to know anything about the technology or implementation + =
  • 7. © 2010 IBM Corporation Delivering a Cloud Computing Service involves more than just a Platform. 7 Metering & Monitoring Service Desk Transition Learning License & ELA Management Management Services SLA Compliance Authentication Authorization (SSO) Asset Management Procurement & Disposal User- Request Management Data Storage Management Software & Image Management Deployment Services Application Rationalizatio n Provisioning & Patch Management Application & Network Profiling Application Delivery User Profile Management Systems Management Capacity Management File & Print Management Security & Remote Access Management Session Life-cycle Management Identity & Directory Management High Availability Green Management Virtual Shared Streaming or Cloud Service Support & Integration Services Support & Integration Services Life-cycle Management Services Life-cycle Management Services Infrastructure ServicesInfrastructure Services Platform SoftwarePlatform Software
  • 8. © 2010 IBM Corporation Workloads may be at Different Levels of Cloud Readiness in the organization. 8
  • 9. © 2010 IBM Corporation IBM offers one of the broadest choices of delivery models—from private cloud computing to “on the IBM Cloud.” 9  Private cloud  IBM implements on client premises  Can be configured to client-specific workflows  Internal network  Client runs and manages  Private cloud  IBM implements on client or IBM premises  Can be configured to client-specific workflows  Internal network  IBM operated  IBM owned and operated  Enterprise–only access to resources  Shared facility and cloud management  Standardized  Network isolated  IBM owned and operated  Mix of shared resources  Shared facility and cloud management  Elastic scaling  Pay-as-you-go  Support and network options  Currently not offered by IBM  Shared resources  Elastic scaling  Pay-as-you-go  End-user access (credit card) Enterprise data center Private cloud 11 IBM operated Enterprise data center 22 Managed private cloud IBM owned and operated Enterprise 33 Hosted private cloud Public access to cloud services User A User B User C User D User E 55 Shared cloud services Enterprise C Enterprise B Enterprise A 44 Deployment models Private Shared Public
  • 10. © 2010 IBM Corporation Concerns about data security and privacy are the primary barriers to public cloud adoption. 10 Percent rating the factor as a significant barrier (4 or 5) Respondents could select multiple items 69% 54% 53% 52% 47% Security/privacy of company data Service quality/performance Doubts about true cost savings Insufficient responsiveness over network Difficulty integrating with in- house IT What, if anything, do you perceive as actual or potential barriers to acquiring public cloud services?
  • 11. © 2010 IBM Corporation Security is important because it enables companies to pursue new, more efficient IT business models. 11 Strategic Outsourcing Strategic Outsourcing Global Outsourcing Global Outsourcing Grid Computing Grid Computing Service Oriented Architecture Service Oriented Architecture Web 2.0 Collaboration Web 2.0 Collaboration VirtualizationVirtualization RisksRisksVendor Trust Legislative Boundaries Distributed Infrastructure Web Threats Data Leakage Shared Infrastructure SecuritySecuritySLAs International Standards Availability, Resiliency Web Security Data Leakage Prevention Segmentation Technologies Cloud Computing Cloud Computing Cloud Computing is a natural evolution of the evolving IT paradigms listed above. A variety of security technologies, processes, procedures, laws, and trust models are required to secure the cloud. There is no silver bullet!
  • 12. © 2010 IBM Corporation Cloud customers need assurance that providers are following sound security practices in mitigating the risks facing both the customer and the provider.  The security requirements in cloud computing are not different from other distributed environments operated in a service provider model.  However, through the low price points offered in a cloud and an often more anonymous consumer-provider- interaction, worries can grow. 12
  • 13. © 2010 IBM Corporation Top concerns of security in the cloud focus on a business’ privacy, protection, and resiliency. 13 Compliance Complying with SOX, HIPPA and other regulations may prohibit the use of clouds for some applications. Comprehensive auditing capabilities are essential. Loss of Control Many companies and governments are uncomfortable with the idea of their information located on systems they do not control. Providers must offer a high degree of security transparency to help put customers at ease. Reliability High availability will be a key concern. IT departments will worry about a loss of service should outages occur. Mission critical applications may not run in the cloud without strong availability guarantees. Security Management Providers must supply easy, visual controls to manage firewall and security settings for applications and runtime environments in the cloud. Data Security Migrating workloads to a shared network and compute infrastructure increases the potential for unauthorized exposure. Authentication and access technologies become increasingly important.
  • 14. © 2010 IBM Corporation Gartner reports there are 7 security risks of Cloud Computing, all of which align with IBM’s Security Framework. 14 Data SegregationData Segregation Data RecoveryData Recovery Investigative SupportInvestigative Support Regulatory ComplianceRegulatory Compliance Data LocationData Location Privileged User AccessPrivileged User Access Disaster RecoveryDisaster Recovery Gartner: Assessing the Security Risks of Cloud Computing, June 2008 11 22 33 44 55 66 77 11 22 33 44 55
  • 15. © 2010 IBM Corporation People and Identity is a top security risk of Cloud Computing. 15 11 Summary: Access management and single sign-on solution that manages the difficulty of executing security policies across a wide range of Web and application resources. Use Case: Validation and processing of user identity information. Addresses the need of authentication of users to the cloud ecosphere. Deployment Scenario: Positioned at Application Server to authenticate access to back end and management functions. Tivoli Access Manager (TAM) Service Management Systems and Image Management Computing Infrastructure Systems Storage Network Service Requestor Service Provider TAM Privileged User Access Separation of administrative and user roles in a cloud environment
  • 16. © 2010 IBM Corporation People and Identity is a top security risk of Cloud Computing. 16 11 Summary: Enable trust between SOA-based initiatives by connecting users to services across business domains and helps enterprises strengthen and automate user access rights. Use Case: Validation and processing of user identity information. Addresses the need of authentication of users to the cloud ecosphere. Deployment Scenario: Positioned at Application Server to authenticate access to back end and management functions. Tivoli Federated Identity Manager (TFIM)Cloud Identity Federation Single access method for users into cloud and traditional applications Service Management Systems and Image Management Computing Infrastructure Systems Storage Network TFIM 3rd Party Cloud Service Requestor Service Provider
  • 17. © 2010 IBM Corporation Data and Information is a top security risk of Cloud Computing. 17 22 Summary: Designed to be shared by thousands of users, the IBM server has security built into nearly every level of the computer - from the processor to the OS to the application level. Use Case: Application isolation, OS containers, encrypted storage, VLANs and other isolation technologies provide a secure multi-tenant infrastructure. Deployment Scenario: At the systems, storage, and networking layers of the cloud. IBM Systems, Storage, and Network SegmentationData Segregation Managing shared data resources within a multi-tenant environment Service Management Systems and Image Management Computing Infrastructure Storage Network Service Requestor Systems Service Requestor
  • 18. © 2010 IBM Corporation Data and Information is a top security risk of Cloud Computing. 18 22 Summary: Information Protection Services is a fully managed, utility based service based on usage - designed as multi-tenant, public cloud, with over 3,400 customers under management. Use Case: Remote data protection to provide business continuity and resiliency to customer datacenters and private clouds. Deployment Scenario: Automatically backs up data to security-rich IBM data centers via your existing network. IBM Information Protection ServicesData Recovery Backup and recovery of data stored remotely in the cloud Private Cloud Enterprise Data Center
  • 19. © 2010 IBM Corporation Application and Process is a top security risk of Cloud Computing. 19 33 Summary: IBM Rational AppScan scans and tests for common Web application vulnerabilities including SQL-Injection, Cross-Site Scripting and Buffer Overflow. IBM ISS Professional Security Services performs automated scans to identify OSes, apps, and their respective vulnerabilities. Use Case: External or internal testing of cloud applications and their hosted infrastructure. Deployment Scenario: Internal testing and remote security services. IBM Rational AppScan & IBM ISS Vulnerability Assessment ServicesCompliance & Auditing Vulnerability and compliance checking of cloud applications Systems Storage Network IBM Rational AppScan ISS Vulnerability Scanning Business Applications Computing Infrastructure Email CRM DB SaaS BPM Host
  • 20. © 2010 IBM Corporation Application and Process is a top security risk of Cloud Computing. 20 33 Summary: IBM ISS Security Event and Log Management Service enables corporations to compile event and log files from network applications and operating systems, as well as security technologies, into one seamless platform. Use Case: Improves the speed of conducting security investigation and archives forensically-sound data, admissible as evidence in a court of law, for a period of up to seven years. Deployment Scenario: Remote IBM Audit Technologies & IBM ISS Security Event and Log Management ServiceInvestigative Support Ability to inspect and audit a cloud provider’s logs and records Systems Storage Network Computing Infrastructure LOG LOG LOG LOG Apps IBM ISS Security Event & Log Management Services
  • 21. © 2010 IBM Corporation Networks, Servers, and Endpoints are a top security risk of Cloud Computing. 21 44 Summary: IBM ISS security products and services driven by X-Force research, Tivoli Security Software to reduce cost and risk, and IBM Systems create a highly secure computing environment that minimizes the potential risk posed by security threats. Use Case: Flexible policy management, web threat protection, application control, etc. Deployment Scenario: In the traditional enterprise IT environment. IBM Enterprise Security SolutionsEnterprise Security Security for existing IT infrastructure as it extends to the cloud Systems Security Software Security Network Security Security Services
  • 22. © 2010 IBM Corporation Networks, Servers, and Endpoints are a top security risk of Cloud Computing. 22 44 Summary: IBM offers the industry’s broadest set of virtualization capabilities. Relying on over 40 years of heritage and attention to security, IBM virtualization platforms are built with security, not as an afterthought, but as a requirement. ISS Proventia Server stops threats inside VMs. Use Case: Security of the virtualization stack that enables flexible, rapid provisioning across heterogeneous servers and hypervisors. Deployment Scenario: In the virtual data center. IBM Systems & IBM ISS Virtualization SecurityVirtualization Security Security for pools of high performance virtualized resources Service Management Systems and Image Management Computing Infrastructure Systems Storage Virtual Network Service Requestor Service Provider
  • 23. © 2010 IBM Corporation Physical Infrastructure is a top security risk of Cloud Computing. 23 55 Summary: IBM offers a validation program for cloud service providers to ensure the resiliency of their business. Use Case: By using proven resiliency consulting methodology, combined with our traditional shared and dedicated asset business and resiliency managed services, we are positioning IBM as the premier resiliency provider to Cloud service providers. Deployment Scenario: Remote testing services. Resilient Cloud Validation ProgramDisaster Recovery Restoration and availability of cloud computing resources Resilient Cloud Public or Private Cloud Summary: Infrastructure-as-a-Service Use Case: IBM delivers project-based cloud services (private cloud) and managed cloud services (public clouds) anywhere in the world. Deployment Scenario: Infrastructure-as-a-service for development , test and desktop users. IBM Cloud ServicesData Location Ability to process data in specific jurisdictions according to local requirements
  • 24. © 2010 IBM Corporation Cloud computing also provides the opportunity to simplify security controls and defenses. 24  Centralized Identity and Access Control policies  Well-defined set of input/output interfaces People & Identity People & Identity  Computing services running in isolated domains as defined in service catalogs  Default encryption of data in motion & at rest  Virtualized storage providing better inventory, control, and tracking of master data  Autonomous security policies and procedures  Personnel and tools with specialized knowledge of the cloud ecosystem  SLA-backed availability and confidentiality  Automated provisioning and reclamation of hardened runtime images  Dynamic allocation of pooled resources to mission-oriented resources  Simplified, built-in security controls  Closer coupling of systems for management of physical and logical identity/access  Strong platform of compute resources with integrated workload-balancing and resiliency  Highly-fortified physical data centers Process & Application Process & Application Physical infrastructurePhysical infrastructure Information & Data Information & Data Network Server & Endpoint Network Server & Endpoint 11 22 33 44 55
  • 25. © 2010 IBM Corporation As enterprises come to rely on hybrid cloud environments, management, security and integration disciplines will need to evolve as well.  Management of workloads running off- premise on clouds – Management of software applications and services (monitoring, events, availability, performance) – Service request management (governance of service provisioning) – Dashboard for service visibility  Security for hybrids – Control security and resilience of services (identity management, compliance, isolation)  Integration (connectivity) of hybrid applications and information – On-premise to off-premise business application connectivity and governance – Information exchange across the enterprise and clouds 25 Enterprise Resources Public cloud Trusted cloud Enterprise management and governance of cloud software, applications, workload Private cloud
  • 26. © 2010 IBM Corporation IBM Development and Test Cloud 26
  • 27. © 2010 IBM Corporation Shifting your development and test capabilities to the cloud environment can drive significant benefits. 27 ToFrom ComplexComplexStandardizationStandardization NoneNoneSelf serviceSelf service Fixed cost model Fixed cost modelMetering or billingMetering or billing WeeksWeeksTest provisioningTest provisioning Payback period for new services Payback period for new services Release managementRelease management Change managementChange management Server and storage utilization Server and storage utilization YearsYears WeeksWeeks MonthsMonths 10-20 percent10-20 percent Self serviceSelf service UnlimitedUnlimited GranularGranular MinutesMinutes MonthsMonths MinutesMinutes Days or hoursDays or hours 70-90 percent70-90 percent Legacy development and test environments Cloud-enabled development and test environments Cloud accelerates business value across a wide variety of domains. Capabilities 1 Based on results from IBM’s Technology Adoption Program. Client-specific results can only be ascertained after a return on investment analysis.
  • 28. © 2010 IBM Corporation IBM Smart Business Development and Test on the IBM Cloud provides you with an enterprise-class cloud environment for development and test workloads. 28 The production site is at http://www.ibm.com/cloud/enterprise More information on the offering at http://www.ibm.com/cloud/solutions/development The solution provides the following:  Choice of nine virtual server configurations  Choice of preconfigured software from which to build private image libraries  Option to add blocks of persistent storage  Network isolation option (VPN/VLAN)  Support options, forums and by phone  Choice of two sites (US and Germany) Payment options:  Pay-as-you-go – Virtual machines, software images and static IP addresses per hour usage charge – Persistent storage per block per month – Internet data transfer per GB transferred  Reserved capacity packages with preferred pricing
  • 29. © 2010 IBM Corporation Security is built into the IBM Smart Business Development and Test on the IBM Cloud offering. Virtual infrastructure  Hypervisor-based isolation with customer configurable firewall rules  Physical firewall and IPS/IDS between guest virtual machines (VMs) and Internet  Optional virtual private network (VPN) and virtual local area network (VLAN) isolation of account instances  Connections are encrypted and IBM is isolated from VMs by design (SSH keys)  Customer has root access to guest virtual machines allowing further hardening of VMs  Shared images patched and scanned regularly Management infrastructure  Access to the infrastructure is only enabled using web identity through the user interface portal or APIs  Complies with IBM security policies, including regular security scans  Controlled and audited administrative actions and operations Delivery centers  Customer data and VMs are kept in the data center where provisioned  Physical security same as for IBM’s internal data centers 29 IBM Cloud services Your servers and personal computers (PCs) Your firewall IBM unique security and authentication model IBM firewall Optional VPN gateway Guest VMs and data IBM delivery centers Management infrastructure Private and Shared VLANs
  • 30. © 2010 IBM Corporation VPNs are established from client provided infrastructure to a VPN gateway in the IBM Data Center. Routing is established to link to client dedicated infrastructure. 30
  • 31. © 2010 IBM Corporation You can have your development and test environment running in minutes on the IBM Cloud. 31 The easy-to-use self service portal guides you through setting up what you need and triggers the automated provisioning of your servers. The easy-to-use self service portal guides you through setting up what you need and triggers the automated provisioning of your servers. Step 1 Click and choose the service you need Step 2 Step 3 Choose the hardware and usage configuration Application provisioned and ready to run
  • 32. © 2010 IBM Corporation IBM Development and Test Cloud User Experience 32 1. Site Intro 2.Log-in 3. Pick Image
  • 33. © 2010 IBM Corporation IBM Development and Test Cloud User Experience 33 5. Verify Configuration4. Pick Size
  • 34. © 2010 IBM Corporation IBM Development and Test Cloud User Experience 34 6. Service Agreement 7. Provision
  • 35. © 2010 IBM Corporation IBM’s Cloud offerings illustrated how cloud solution choices must be aligned to workloads. 35 Existing Smart Business on the IBM Cloud Smart Business Cloud Smart Business Systems Standardized services on the IBM Cloud Pre-integrated, workload optimized systems Private cloud services, behind your firewall, built and/or managed by IBM IBM Lotus Live IBM CloudBurst IBM Smart Business Development & Test Cloud IBM Smart Business Desktop Cloud IBM Smart Business Storage Cloud Analytics Collaboration Development and Test Desktop and Devices Infrastructure Storage IBM Smart Analytics System IBM Smart Business for SMB (backed by the IBM cloud) Infrastructure Compute IBM Compute on Demand IBM Information Protection Services Business Services IBM BPM Blueworks (Design tools) IBM Smart Business End User Support-IBM Service Assist IBM Smart Business Desktop on the IBM Cloud IBM Smart Analytics Cloud IBM LotusLive iNotes IBM Smart Business Expense Reporting on the IBM Cloud IBM Information Archive IBM Smart Business Dev & Test on the IBM Cloud Lotus Foundation
  • 36. © 2010 IBM Corporation Bridging Development and Operations has proven Business benefits and should be taken into consideration when deploying Cloud solutions.  A complete view of configuration and asset change impact  Easily identify, trace and manage newly released assets across the void  Understand which fine grained development assets have been validated for new operational configurations 36 Federated Search & Deployment Operations / Management Manages all types of information needed by Service Management process execution  Capture both actual and authorized application and service data and topologies  Establish relationships and references between all logical/physical entities  Records configuration relationships using metadata Discover Relate Control GovernAutomate Change and Configuration Management Database Development Manages asset information for development and re-use  Define asset types  Creates and manage all types of assets  Provide development asset traceability and details  Collaborate on asset development Define Search/ Retrieve Create/ Modify GovernMeasure Centralized Software Delivery
  • 37. © 2010 IBM Corporation Benefits of Cloud Computing are realized when Cloud usage will be tailored to the workload. 37 Workloads continuing in traditional environments  Database  Transaction processing  Workloads requiring flexibility and customization  Highly regulated workloads e.g.  Sensitivity of employee information  Health care and legal records  Workloads subject to Sarbanes-Oxley Workloads that can be standardised for cloud  Web infrastructure applications  Collaboration infrastructure  Development and test  High performance computing Workloads that are made possible by public cloud  High volume, low cost analytics  Collaborative business networks  “Smart” applications
  • 38. © 2010 IBM Corporation Ashish Patel, IBM Certified IT Architect Lead IT Architect, IBM Cloud Services IBM Global Technology Services ashishp@ca.ibm.com | 905-413-3867

Editor's Notes

  • #5: IT has many challenges ahead of it, and behind it. Rephrased sometimes but all challenges just the same. We are going to look at a few trends going on in this environment that you may or may not be aware of.
  • #6: The graphic on the center-left of the slide depicts ”Today’s data center”, showing a group of servers associated with a building. The servers are enclosed in a box with three figures in each corner – a clock, security guard, and a certification badge. The arrow mark points from this graphic to another on the right, which depicts ”Tomorrow’s cloud environment”. This graphic shows a group of servers inside a figure of a cloud and overlaid by numerous question marks. These servers are associated with a map of the world. When you are considering a new technology such as cloud, there are always challenges and dependencies that need to be addressed. This chart summarizes many of the concerns that customers have expressed. On the left, the well-known established environment which, while well understood, stable and secure, is costly, slow to change and labor intensive. On the right, the cloud environment with the value proposition we have discussed, but with a lot of uncertainties. It is not the intention in this session to try to answer all of these questions, only to recognize that these challenges exist and that IBM has answers to them. However, it is also fair to say, that not all the answers will satisfy the needs of all enterprise workloads. There are workloads (understood as IT usage scenarios, be that by developers, testers or end users) for which the cloud is not suited, that best reside in the enterprise data center, behind the enterprise firewall. However, there are workloads that fit well into a cloud context, for example the majority of development and test activities and many production workloads with less sensitive data (for example web servers with static content). The challenge is therefore to identify the workloads for which the cloud is “good enough.”
  • #7: Infrastructure Leverage Virtualization of Hardware - Drives lower capital requirements Utilization of Infrastructure - Virtualized environments only get benefits of scale if they are highly utilized Labor Leverage Self Service - Clients who can “serve themselves” require less support and get services Automation of Management - Take repeatable tasks and automate Standardization of Workloads - More complexity = less automation possible = people needed
  • #10: IBM is unique in offering a range of deployment models based on your workload requirements. Deployment models 1 and 2 fall under Smart Business Development and Test Cloud, which comprises private cloud services, behind your firewall, on premise. Deployment models 3 and 4 fall under Smart Business Development and Test on the IBM Cloud, which leverages standardized services on the IBM Cloud. This slide illustrates the five cloud delivery models – private cloud, managed private cloud, hosted private cloud, shared cloud services and public access to cloud services, and the features of each model. Model 4 is outlined to indicate that it is the deployment model that IBM Smart Business Development and Test on the Cloud leverages.
  • #11: We also asked our panel of 1,090 what factors would keep them from using a public cloud service. Respondents could select multiple items and were asked to rank factors of a scale of 1 to 5, where "1" means "Not a Significant Barrier" and "5" means “A Very Significant Barrier." Concerns about security and privacy of company data represent the most significant barrier to public cloud services. Concerns about service quality – both the computing services and responsiveness of delivery over the Internet – also ranked high, as did doubts about the promises of cost savings.
  • #13: Security is a basic requirement within any IT environment. Security is like a seat belt, you only appreciate it after it saves you in an accident. Security in a Cloud is really no different from security in any highly distributed environment. Where is becomes different is who provides security capabilities, which varies depending on the type of Cloud. In a Software as a Service environment, more responsibility falls on the provider as they are not only providing data storage and processing, but the actual application which is being used. In Infrastructure as a Service models, the cloud provider is purely a custodian of the data and processing, data, applications and processing is opaque to the provider, they simply provide the resources which one uses. We will focus on Infrastructure as a Service offerings that IBM is building as public clouds. Each stake holder in an IT environment has a different perspective on security, ultimately confidence in a cloud provider is a matter of trust. Just as an outsourcing situation is a matter of trust, though trust is built with contractual obligations that the provider must meet. Clouds introduce a more homogenous environment, which allows for less customization (generally) on a contractual basis.
  • #14: Governance means control. Within a traditional IT center, or a private cloud, the customer maintains control over all systems, data, and processing which is done. When one moves to a public cloud (or a hybrid cloud) one is trusting the cloud provider to maintain control over the data and processing in a responsible manner. Trust is built by the provider being open about how they handle a customers data and processing within the provider controlled infrastructure. As with an outsourcing situation, the cloud provider needs to clearly demonstrate that they have security controls and policies which they manage their systems to. The provider also needs to clearly delineate their role, and what the customer is expected to do. Compliance. There is not any one size fits all approach to compliance, as there are a variety of different regulations, rules and policies which affect different environments. A cloud provider must have adequate controls in place that allow one to be compliant with their different regulations. In the case of the IaaS environment, these generally fall into how the provider manages the underlying infrastructure, how they monitor and audit the environment, how they handle privileged access to the infrastructure, how they assure customers that they are separated from other customers. Our current infrastructure-focused service products, customer data is opaque to the provider. Provider is a custodian of the data, and does not touch the customer data. Typically in industry-specific compliance policies, from an infrastructure perspective, deal with: Managing privileged access Auditing of accesses to data by provider staff Policies and practices for dealing with incidents For IBM, these are standard security items, handled in a controlled way in our data center operations Logging Infrastructure systems enable operating system audit capabilities End to end operation flows are logged and auditable Audit log data is retained for 90 days Logs are monitored and incident tickets raised for any actions which are not permitted. Intrusion Infrastructure is monitored by Intrusion Detection & Protection systems (IDS/IPS) Internet points of ingress and egress are monitored with IDS/IPS Future - will provide customer specific IDS/IPS through hypervisor introspection technology Reporting Internal reporting of security incidents through monitoring of audit data Future - customer level reports of actions which affect/alter the security of the infrastructure that directly relates to their resources. Security Management. Fundamental in any cloud environment is the separation of customers from each other, and from the providers infrastructure. Our IaaS offerings provide multi-tenancy through providing multiple instances of operating systems on a single hardware platform. Our cloud offerings provide this through a variety of mechanisms, some of which depend on how the customer wants to interact with our cloud. Through a technology called Trusted Virtual Data Centers (TVDC) customers can specify firewall rules that apply to their guests. TVDC differs from host based Firewalls in the guest operating systems, by instantiating the rules at the hypervisor level, by doing this, the management and enforcement of the firewall rules is moved out of the guest operating system. This means that if a guest were to be compromised, the firewall rules would still be enforced. Customers manage these facilities from the management portal. We also offer VLAN separation for those customers who wish to have effectively a dedicated network. Customers using this model, would connect from their enterprise via an IPSEC VPN, and all their guest operating systems would exist on a dedicated VLAN segment within the infrastructure. In all cases, the customer is responsible for managing the guest operating systems. IBM does not access or touch guest operating systems once they have been instantiated and turned over to the customer (with the exception of terminating instances based on customers utilization of the management portal). Persistent storage is provided through the use of Virtual Disk Drives (VDD). A VDD is simply a file that is attached to a guest operating system as if it were a physical disk drive. The guest sees this as a block device. The infrastructure manages the file services, with each customers VDD's being contained on a separate file system, with file permissions associated to a unique UID for that customer. Guest operating systems will run under this UID, therefore ensuring that the hypervisor controlled files can only be accessed by that particular customer. Mechanisms Hypervisors - enforces separation of operating system instances within a single physical hardware system. Provides a “logical” air-gap between customers Network Separation Firewalls - Customer controlled implemented independent of the operating systems at the hypervisor utilizing Trusted Virtual Domains Virtual LANs Customers can choose to have their guest images on a dedicated virtual LAN VLANs connect back to the customer using Virtual Private Networks Data Security. As stated before, the infrastructure controls access to customer data. There are effectively two types of data storage that we deal with, ephemeral and persistent storage. Ephemeral storage is a resource local to a hypervisor instance. It represents temporary runtime storage that is not persistent across termination and re-start of a virtual machine. Persistent storage was discussed before, and represents storage which persists even when a virtual machine is not running. One key issue is the concept of "object reuse". Since both ephemeral and persistent storage may contain customer data, simply deleting the storage resource when it is no longer needed (in the case of the persistent storage, when the customer specifies to destroy that storage from the management portal) is insufficient, as re-allocation of the blocks may allow for access to old data. Our cloud offerings will make use of secure deletion capabilities which will use a US Department of Defense "scrubbing" algorithm to overwrite files BEFORE they are deleted. Such a "scrubbing" operation overwrites the disk blocks associated with the file with random patterns of data, thereby eliminating all vestiges of the original data. This is applied to both ephemeral and persistent storage. Data Protection Customers provided with the ability to create “virtual disk drives”(VDD) (files which are presented to virtual machines as block devices). Customer can utilize operating system and application level encryption against these as they are accessed as native file systems to the guests. Each customers data is stored in a unique “file set” within the CC storage structure Access Control Lists (ACL’s) are used to ensure separation of customers. Guests run as a specific “customer” user. ACL’s on files are set to that user. Data Destruction Any data on disk is securely erased using a US DoD algorithm when deleted Ephemeral storage - when the storage is no longer used by a virtual machine Customer VDDs - when deleted from the management console. Security for Cloud Management. Customers manage virtual machines (creation, instantiation, deletion) and VDDs through a web portal interface. This portal application authenticates customers using what is known in IBM as "web identity". This is a unique username and password in an IBM controlled LDAP repository, in the future we will support federated identities so that customers do not need to maintain a separate userid and password for access to the management capabilities. This portal application uses its own LDAP to determine the authorizations which a given customer user can perform. Customer administrators control authorizing other users to perform operations against only that customers resources. The portal does not provide any mechanism to interface directly to a customers guest operating systems, it only provides the means to manage instances of guests and persistent storage. The portal is built using various tivoli security capabilities, including IBM Directory Server and Web Seal. The portal interfaces with a set of systems we call the "common cloud management platform". Portal operations drive automation work flows, and all operations are logged such that each action can be traced back to a specific customer user who initiated the operation. Administrative Portal Authenticated via Web Identity Authorized via Portal Access Controls Provides interfaces to initiate automated work flows for discrete tasks Customer manages the privileges of their user base Operations logged - end to end transaction auditing Operating Systems Guests Once provisioned IBM has no direct access to the guest VM;s Customers provided with initial SSH Key pair or Administrative password Customers MUST change these and any middleware administrative passwords upon taking control over the guest Malicious Insider. As discussed in the loss of governance topic, the cloud provider maintains privileged capabilities against the infrastructure. Since the data and processing exist within that infrastructure, there always exists potential mechanisms for access to the individual customer resources. How the cloud provider manages this privileged access, and ensures that provider administrators do not behave inappropriately is key. First, we extensively use automation. Automation allows for very specific work flows to be performed, and as previously mentioned the initiation of these work flows can start from the portal (or may be initiated by monitoring of the infrastructure - for example, detecting that a physical system is failing and moving virtual machines to a different physical machine). All steps in the work flow are logged, so that an audit trail is maintained. While automation will be the means by which the bulk of the management of infrastructure will be performed, there will always be cases where an administrator will have to access aspects of the infrastructure. This may be for trouble shooting problems, or may be needed for unanticipated situations. IBM will manage the infrastructure to the same corporate security policy that we use for our internal data processing systems. This is called ITCS104 (though the name is not really important, what is important is that we have an established policy that governs our management of the infrastructure). Once provisioned, IBM maintains no access to the customers virtual machines (we do provision machines with initial SSH Key pairs, or administrative passwords, and customers should change those immediately upon gaining access). Should an IBM administrator need access to a customer VM, the customer would have to explicitly enable a username and password for that access on the individual virtual machine, and delete that user immediately. As it relates to the infrastructure, each administrator will use a unique user id and password (we do not allow for shared id's, in fact, the automation also authenticates to the infrastructure using a unique user id). The use of root/administrator ID's is explicitly prohibited. Administrative users are granted privileges following the "least privilege" principle. Administrators are only granted those privileges needed to fulfill their role. All operations performed against the infrastructure systems are logged, and monitored. Should an administrative user perform an action such as accessing a customers VDD, this will raise a security alert, identifying that a specific user performed an unauthorized action. IBM will then apply our Business Conduct Guidelines for disciplinary action, as customer data is considered highly confidential, and therefore subject to disciplinary action which may require termination of the employee. The need for an individual to have a privileged identity against infrastructure is reviewed quarterly (per ITCS104) as well as on an annual basis. Identities are removed immediately upon an employee leaving the company. Automation Not a traditional Security construct Automation assures control over specific administrative tasks which are broken down to well defined work flow sequences. Automation is audited end to end to be able to re-construct a given work flow Human Administration All infrastructure components are managed/operated to the same policies as IBM Internal systems (ITCS104). Shared user ID’s are prohibited. Each administrative user uses their own ID to authenticate. User authorizations assigned based on least privilege principles. IBM’s business conduct guidelines provide the framework for disciplinary action should administrative privileges be abused.
  • #26: The graphic on the slide consists of a conceptual image representing a hybrid cloud. In the upper left corner is a public cloud, in the upper right corner is a cloud that is trusted or private, and at the bottom are enterprise resources, connected to resources in the two clouds through the Internet. The enterprise resources are the base for providing management and governance of cloud software, applications and workload. The diagram illustrates the path that many enterprises are on to have a hybrid environment, often called a hybrid cloud, consisting of one or more cloud implementations with the characteristics we discussed earlier, combined with a ‘classic’ enterprise data center infrastructure. Some see this as a threat to the enterprise data center; others see it as an opportunity to expand beyond the data center to provide new levels of service, speed and cost efficiency. Irrespective, the disciplines and competencies of most types of IT professionals are evolving to encompass cloud concepts. Some of these disciplines are highlighted here, including IT infrastructure management, security and integration. IBM is uniquely positioned to help enterprises and their IT professionals through this evolution, based on best-of-breed offerings in both the enterprise data center and the cloud.
  • #28: This chart depicts the common attributes of cloud computing and the associated business impact of what a cloud-enabled enterprise can accomplish. A cloud environment enables self‑service, resulting in projects being able to get started very quickly, and self provisioning or rapid provisioning. Some of the key functionalities include: Server and storage—IT resources from servers to storage, network and applications are pooled and virtualized to help provide an implementation-independent, efficient infrastructure, with elastic scaling—environments that can scale up and down by large factors as demand changes. Self-service portal—”Point-and-click” access to IT resources. Automated provisioning—Resources are provisioned on demand, helping to reduce IT resource setup and configuration cycle times. Service catalog ordering—Uniform offerings are readily available from a service catalog on a metered basis. Flexible pricing—Simple predefined bundles or pay by consumption with metering and subscription models help make pricing of IT services more flexible. The graphic on the slide consists of a box separated by a diagonal line with a picture of a cloud in between. The upper-left part of the box is white in color and has the words “Cloud accelerates business value across a wide variety of domains.” The lower-right section of the box is shaded in blue. An arrow mark above the box indicates the transition from a legacy development and test environment to one that is cloud-based.
  • #29: The image is a screen capture of a portion of IBM Smart Business Development and Test on the IBM Cloud developer Internet site, and highlight showing a “View demo” function. The ‘view demo’ graphic is a link to a demo pop-up. Nine 32- and 64-bit configuration options allow you to pick the virtual machine (VM) instance sizes that best fit your needs. With the persistent storage option, you can order blocks of persistent storage to use with a virtual machine instance for longer term storage of content. Small (256 GB), medium (512 GB) and large (2048 GB) blocks are available. IBM standard and add-on support services can help enhance the availability and security of your development and test environment. Standard services: Technical support for all services—available through the web portal and by checking the online Cloud Service forum pages after log-in. Around-the-clock monitoring and management of the IBM cloud infrastructure, including: Security activities for the IBM Cloud Center base infrastructure to govern access to and use of our services Scheduled maintenance for the IBM Cloud Center base infrastructure to maintain our services Fee-based add-on services: Remote on-boarding support to help account managers and end users learn how to navigate and use the self-service web portal Premium support—around-the-clock telephone support with a web-based service request ticketing system Add-on Linux operating system assistance on top of premium support IBM provides network bandwidth for inbound and outbound data transfers between the IBM Cloud Center and the Internet for you to access and use the services. IBM tracks and measures the amount of data transferred. Data transfer is charged for on a GB-transferred basis. Reserved capacity packages consist of pools of resources from which customers can provision as required. They carry a monthly charge but also offer preferred (discounted) rates on the virtual servers provisioned.
  • #30: IPS - Intrusion prevention solution; IDS - Intrusion detection solution; SSH - Secure Shell; API – application programming interface The IBM Cloud was designed with enterprise security as a top priority. With the IBM Cloud, security-rich access is provided through the Internet (IPS/IDS, SSH/HTTPS, web identity) to a management infrastructure, and content is delivered in compliance with IBM's security standards. Access to the infrastructure self-service portal and APIs is restricted to users with an IBM web identity. The infrastructure complies with IBM security policies, including regular security scans and controlled administrative actions and operations. Within the IBM delivery centers, customer data and virtual machines are kept in the data center where provisioned, and the physical security is the same as that for IBM’s own internal data centers. The graphic on the slide provides a high-level overview of the flow of data that takes place between a client environment and IBM’s cloud delivery centers. The top of the graphic contains a picture of a PC monitor and server, with a line leading downwards to an image depicting the client’s firewall and then to a cloud (IBM cloud services). From there, a line flows further downwards through another firewall (IBM’s) and an image depicting IBM’s unique security and authentication model and then leading to IBM’s delivery centers, which contains guest virtual machines and data.
  • #32: The graphic on the slide indicates the three steps required to setup and deploy a service on the IBM Cloud. It consists of three boxes, the first one to select an image, the second to configure it and the third indicating that the application is provisioned. Above the third box is a picture of a hand holding a stopwatch, indicating the three steps can be accomplished quickly. Typical workflow steps: User logs into IBM Smart Business Development and Test on the IBM Cloud through a security-rich web portal. User selects the virtual image for the tool required from the image catalog and agrees with the “Terms and Conditions.” User selects the server and storage required for the service, based on the user’s needs. User requests the provisioning of an instance from the selected image on the selected hardware in the IBM Cloud. User’s development and test teams can use the provisioned instance as required. The user can save a customized version of the instance as a private image for future reuse, if desired. When completed, the user de-provisions the instance, releasing the hardware for other users. Most of the provisioning functions can also be accomplished using the built in Application Programming Interfaces (APIs): Command-line interface (CLI) and RESTful APIs Security APIs Compute Cloud APIs
  • #37: Development repositories and processes manage information for development and reuse of assets. CCMDB and IT processes manage information needed for service management and process execution. Scenario 1 Development releases a software image. A software package needs to be created and deployed into production. Scenario 2 Incident/problem is found in production; a RFC is opened. Linking the RFC and the fix pack that addresses that RFC. Scenario 3 Existing CI (configuration item from CCMDB) are created as packages in RAM for a potential search/find/linkage to development assets