SlideShare a Scribd company logo
Modern, Private, Automated
Private Cloud
Partnering with Altera Technologies
Who are we?
Award winning Global Catalyst Advisory spinoff –
Clientele List
Ministry of Foreign Affairs
Civil Service College
Temasek Foundation
OECD
Setia Berhad
1 Group
Association of Small Medium Enterprises
Franchising and Licensing Association of Singapore
Awards
Winner of RHT RMF Green Asia Initiatives Leadership (GAIL)
Sustainability Awards
- Gamechanger
- Innovation
Altera Technologies focusing on
cloud management & technology
Established in February 2014, founding team ex-IBM
• In 5+ years, accumulated more than USD110M in 5 rounds venture
capital funding - latest round C++ in August 2018
• Largest Series C funding round in China Open Source history
• OpenStack Foundation Gold Member
• Linux Foundation & CNCF Silver Member
• 5 out of 10 China Largest OpenStack Deployments in 2016
• Awarded Gartner 2016 China Cool Vendor
• Ranked No. 2 in 2018 OpenStack Foundation User Survey
• Ranked Top 8 Gartner 2017 OpenStack Most Competitive Provider
• Officially certified as CNCF Kubernetes Service Provider in 2018
Leadership
• 2014 May: OpenStack Enterprise Distribution
• 2014 Nov: China’s 1st OpenStack Hybrid Cloud
• 2017 Mar: China’s 1st OpenStack with Kubernetes Converged Platform
• 2018 May: Cloud Ready HCI Product ECS Stack
• 2019 May: True Private Cloud Product ECS
Innovation
• Elected Independent Board Director OpenStack Foundation
• Elected Heat Project PTL OpenStack Foundation
• Ranked Top 10 Globally in TC-Approved Code Contribution
OpenStack/Kubernetes/Ceph
• Led China Linux Kernel Code Contribution
Research Development
EASYSTACK— Making Cloud Computing Easier
500+ large enterprise customers
200+ employees, focused on enterprise cloud
computing software and services
EasyStack has branch offices in 16 cities across mainland
China and in silicon valley, Singapore, Sydney and Taipei
Achievements
100+ Ecosystem Partners
Enterprise IT spending on the true private cloud market
worldwide from 2016 to 2027, by segment (in billion U.S. dollars)
Region
Worldwide
Survey time period
2016 to 2018
Supplementary notes
* Forecast.
The source defines true private cloud as including:
• a transaction relationship with a single provider;
• flexibility in how IT resources are consumed;
• an ability to accommodate hybrid cloud application use cases;
• and availability on a self-service basis;
- and excluding:
• converged systems with limited orchestration and automation;
• self-integrated private cloud involving numerous vendors;
• spending by service providers on public cloud infrastructure;
• services outside the maintenance and management of an
enterprise private cloud, such as data center outsourcing,
colocation, general cloud consulting, etc.;
• and virtual private clouds.
Cloud – The New Business Platform
PUBLIC
CLOUD
PRIVATE
CLOUD
Managed by IT Managed by provider
Two Models Today:
Applications are delivered
and built on cloud platforms
Developers asking for self-service
platforms for faster delivery
IT is being pressured to provide that
or move to AWS
How Public Cloud Looks
CHALLENGES:
Cost scales rapidly
Performance unpredictability
No visibility below VMs
One way migration path
PUBLIC
CLOUD
Admins / Users
CLOUD
UI/API
Challenges with Public Clouds
Issues Description
Rapid cost increase
Total cost over 3 years more than private cloud as network
traffic, etc are not included in the cost
Unpredictable performance Sharing the same physical server with other unknown users
Additional Security risk &
compliance
Require additional security services, audits, etc to secure
cloud
Misconfiguration of security
& services
Experience & review of services and security must be done
with audits to ensure data not accessible by public (see
CapitalOne data leak)
No control below VM
No management of environment below VMs or virtual
network
Lack of OpenAPI
APIs are proprietary, not fully defined and changes regularly.
Tools have to be compatible with the APIs in order to
automate services
Security – Top 5 concerns
Top 5 Security Concerns of Public cloud:
1. Data Breaches – Access of data by unauthorized personnel (eg CapitalOne)
2. Hijacking of Accounts – Usernames/Password hacked, leaked private key, etc
3. Insecure APIs and Interfaces – Proprietary APIs that may have loopholes and
weakness allowing illegal control
4. Insufficient Due Diligence – Due to lack of experience, knowledge or time, system not
properly secured or protected
5. Malware Injections & APT - Malicious code injected into cloud services and runs in the
cloud servers themselves to eavesdrop, compromise the integrity of sensitive
information, and steal data
Rack 1
Cloud Region 1 Cloud Region N
Domain 1
Domain 1
True Private Cloud Feature: Secure Platform
including configuration & data
Tenant
Project 1
Tenant
Project N
Tenant
Project 1
Tenant
Project N
…
… …
Domain N
Multi-Tenant
Organization/Quota
Management
• Each region can be
physically or logically
designed and implemented
• Domain can be
company/organization/busin
ess unit/department
• Tenant Project can be sub-
domain separation
Tenant
Project N
Tenant
Project 1
Tenant
Project N
…
…
Domain N
… Tenant
Project 1
…
Physical and Logical Network Separation
Host 2FA
• Backend host access is protected
by 2FA login
• Ensure only authorized person(s)
allowed into host server(s) console
Server 1
Server N
TOR Switch
1
…
FW
Device(s)
Core
Switch
Rack N
Server 1
Server N
TOR Switch
N
…
…
VM
Instance
Router
Instance
Network
Instance
Network
Instance
VM
Instance
SecurityGroup
Instance
FWaaS
Instance
Floating IP
Instance
Logical Network
Physical Network
Conclusion
Factors Public Cloud Private Cloud
Flexibility on resources – able to turn on / call on
resources on demand 5 4
Control – Able to control the cloud from hardware
to software and service level 2 4.5
Security and privacy – Able to keep the data
securely in the right hand and person and prevent
access by non-authorized entities 1.5 4
Cost – Overall cost of starting and running the cloud
solution 1.5 - 4.5 4
My scoring of the cloud:
Rank scoring: 1 – Weakest, 5 - Strongest
EasyStack True Private Cloud | Quek Keng Oei
CapitalOne Data Breach – What is it
• CNN – “In one of the biggest data breaches ever, a hacker gained access to more than 100
million Capital One customers' accounts and credit card applications earlier this year.”… “tech
company software engineer for Amazon (AMZN) Web Services, the cloud hosting company
that Capital One was using, the Justice Department said. She was able to gain access by exploiting
a misconfigured web application firewall, according to a court filing…”
• DigitalTrends – “…filed a class-action lawsuit Tuesday against Capital One Financial
Corporation “for negligence in failing to safeguard consumers’ personal information” in the recent
data breach that impacted 100 million consumers… ”
• InfoSecurity Magazine – “…the intruder was able to enumerate over 700 S3 Buckets and
ultimately copy sensitive data out of the environment…”
CNN – https://edition.cnn.com/2019/07/29/business/capital-one-data-breach/index.html
DigitalTrends – https://www.digitaltrends.com/news/capital-one-data-breach-class-action-lawsuit/
InfoSecurity Magazine – https://www.infosecurity-magazine.com/infosec/lessons-from-the-capital-one-data/

More Related Content

PPTX
OpenStack 3rd Birthday Presentation
PDF
Deploying NGINX in Cloud Native Kubernetes
PDF
Migrating to Cloud Native Solutions
PPTX
Zero-downtime deployment with Kubernetes [Meetup #21 - 01]
PPTX
PKS - Solving Complexity for Modern Data Workloads
PPTX
CDK - The next big thing - Quang Phuong
PPTX
Orchestrating stateful applications with PKS and Portworx
PPTX
CNCF Introduction - Feb 2018
OpenStack 3rd Birthday Presentation
Deploying NGINX in Cloud Native Kubernetes
Migrating to Cloud Native Solutions
Zero-downtime deployment with Kubernetes [Meetup #21 - 01]
PKS - Solving Complexity for Modern Data Workloads
CDK - The next big thing - Quang Phuong
Orchestrating stateful applications with PKS and Portworx
CNCF Introduction - Feb 2018

What's hot (20)

PPTX
Building Cloud Native Applications Using Azure Kubernetes Service
PDF
VietOpenStack meetup 7th Kilo overview
PPTX
Real World Example of Orchestrating Docker, Node JS, NFV on OpenStack
PDF
Welcome at OPEN'22
PPTX
Application Centric Microservices Architecture
PPTX
Enabling Microservices Frameworks to Solve Business Problems
PPTX
StampedeCon 2015 Keynote
PDF
Intro - Cloud Native
PDF
Dipping Your Toes Into Cloud Native Application Development
PDF
WSO2Con ASIA 2016: WSO2 Cloud Strategy Update
PPTX
20 mins to Faking the DevOps Unicorn by Matt williams, Datadog
PDF
cncf overview and building edge computing using kubernetes
PDF
More Than An "API" | Jae Lee
PPTX
CWIN17 london becoming cloud native part 2 - guy martin docker
PPTX
Enabling application portability with the greatest of ease!
PPTX
Cloud 2.0 - How Containers, Microservices and Open Source Software are Redefi...
PDF
Secure Infrastructure Provisioning with Terraform Cloud, Vault + GitLab CI
PPTX
Why cloud native matters
PDF
Edge Orchestration & Federated Kubernetes Clusters - Open Networking Summit 2018
PDF
Prometheus - basics
Building Cloud Native Applications Using Azure Kubernetes Service
VietOpenStack meetup 7th Kilo overview
Real World Example of Orchestrating Docker, Node JS, NFV on OpenStack
Welcome at OPEN'22
Application Centric Microservices Architecture
Enabling Microservices Frameworks to Solve Business Problems
StampedeCon 2015 Keynote
Intro - Cloud Native
Dipping Your Toes Into Cloud Native Application Development
WSO2Con ASIA 2016: WSO2 Cloud Strategy Update
20 mins to Faking the DevOps Unicorn by Matt williams, Datadog
cncf overview and building edge computing using kubernetes
More Than An "API" | Jae Lee
CWIN17 london becoming cloud native part 2 - guy martin docker
Enabling application portability with the greatest of ease!
Cloud 2.0 - How Containers, Microservices and Open Source Software are Redefi...
Secure Infrastructure Provisioning with Terraform Cloud, Vault + GitLab CI
Why cloud native matters
Edge Orchestration & Federated Kubernetes Clusters - Open Networking Summit 2018
Prometheus - basics
Ad

Similar to EasyStack True Private Cloud | Quek Keng Oei (20)

PDF
Cloud Security - Emerging Facets and Frontiers
PDF
Dr. Michael Valivullah, NASS/USDA - Cloud Computing
PDF
Cloud Computing Risk Management (Multi Venue)
PPTX
6.introducing private clouds
PPTX
Deployment of private cloud infrastructure copy
PPTX
Cloud Computing in Business and facts
PPT
2010.10.07. Le Cloud Computing pour les N...ouveaux - Loic Simon - Club Allia...
PDF
Third Party Cloud Management
PPTX
Deployment of private cloud infrastructure.
PDF
Cloud deep-dive0212
PDF
Securing The Journey To The Cloud
PPTX
Cloud Computing : Top to Bottom
PDF
How secured and safe is Cloud?
PPTX
Softlayer Bluemix User Summit 2015 Keynote
PPTX
Presentation on cloud computing
PPTX
Is Private Cloud Right for Your Organization
PDF
Sukumar Nayak-Detailed-Cloud Risk Management and Audit
PDF
A Survey on Cloud Computing Security Issues, Vendor Evaluation and Selection ...
PPTX
Cloud is not an option, but is security?
Cloud Security - Emerging Facets and Frontiers
Dr. Michael Valivullah, NASS/USDA - Cloud Computing
Cloud Computing Risk Management (Multi Venue)
6.introducing private clouds
Deployment of private cloud infrastructure copy
Cloud Computing in Business and facts
2010.10.07. Le Cloud Computing pour les N...ouveaux - Loic Simon - Club Allia...
Third Party Cloud Management
Deployment of private cloud infrastructure.
Cloud deep-dive0212
Securing The Journey To The Cloud
Cloud Computing : Top to Bottom
How secured and safe is Cloud?
Softlayer Bluemix User Summit 2015 Keynote
Presentation on cloud computing
Is Private Cloud Right for Your Organization
Sukumar Nayak-Detailed-Cloud Risk Management and Audit
A Survey on Cloud Computing Security Issues, Vendor Evaluation and Selection ...
Cloud is not an option, but is security?
Ad

More from Vietnam Open Infrastructure User Group (20)

PDF
Room 3 - 5 - Nguyễn Văn Hoàn - 101 Bugs, issues when I work with Ceph
PDF
Room 2 - 3 - Nguyễn Hoài Nam & Nguyễn Việt Hùng - Terraform & Pulumi Comparin...
PDF
Room 3 - 6 - Nguyễn Văn Thắng & Dzung Nguyen - Ứng dụng openzfs làm lưu trữ t...
PDF
Room 3 - 4 - Lê Quang Hiếu - How to be a cool dad: Leverage DIY Home Automati...
PDF
Room 3 - 2 - Trần Tuấn Anh - Defending Software Supply Chain Security in Bank...
PPTX
Room 3 - 7 - Nguyễn Như Phúc Huy - Vitastor: a fast and simple Ceph-like bloc...
PDF
Room 3 - 1 - Nguyễn Xuân Trường Lâm - Zero touch on-premise storage infrastru...
PPTX
Room 2 - 2 - Giang Thiên Phú - Kinh nghiệm tối ưu mongodb với database hơn 10...
PDF
Room 2 - 6 - Đinh Tuấn Phong - Migrate opensource database to Kubernetes easi...
PPTX
Room 2 - 4 - Juncheng Anthony Lin - Redhat - A Practical Approach to Traditio...
PDF
Room 2 - 7 - Lã Mạnh Hà - Agile + DevOps = A great combination
PPTX
Room 2 - 1 - Phạm Quang Minh - A real DevOps culture in practice
PDF
Room 2 - 5 - Seong Soo - NHN Cloud - Upstream contribution mentoring program ...
PDF
Room 1 - 2 - Nguyễn Văn Thắng & Dzung Nguyen - Proxmox VE và ZFS over iscsi
PPTX
Room 1 - 6 - Trần Quốc Sang - Autoscaling for multi cloud platform based on S...
PPTX
Room 1 - 3 - Lê Anh Tuấn - Build a High Performance Identification at GHTK wi...
PPTX
Room 1 - 7 - Lê Quốc Đạt - Upgrading network of Openstack to SDN with Tungste...
PDF
Room 1 - 5 - Thủy Đặng - Load balancing k8s services on baremetal with Cilium...
PDF
Room 1 - 4 - Phạm Tường Chiến & Trần Văn Thắng - Deliver managed Kubernetes C...
PDF
Room 1 - 1 - Benoit TELLIER - On premise email inbound service with Apache James
Room 3 - 5 - Nguyễn Văn Hoàn - 101 Bugs, issues when I work with Ceph
Room 2 - 3 - Nguyễn Hoài Nam & Nguyễn Việt Hùng - Terraform & Pulumi Comparin...
Room 3 - 6 - Nguyễn Văn Thắng & Dzung Nguyen - Ứng dụng openzfs làm lưu trữ t...
Room 3 - 4 - Lê Quang Hiếu - How to be a cool dad: Leverage DIY Home Automati...
Room 3 - 2 - Trần Tuấn Anh - Defending Software Supply Chain Security in Bank...
Room 3 - 7 - Nguyễn Như Phúc Huy - Vitastor: a fast and simple Ceph-like bloc...
Room 3 - 1 - Nguyễn Xuân Trường Lâm - Zero touch on-premise storage infrastru...
Room 2 - 2 - Giang Thiên Phú - Kinh nghiệm tối ưu mongodb với database hơn 10...
Room 2 - 6 - Đinh Tuấn Phong - Migrate opensource database to Kubernetes easi...
Room 2 - 4 - Juncheng Anthony Lin - Redhat - A Practical Approach to Traditio...
Room 2 - 7 - Lã Mạnh Hà - Agile + DevOps = A great combination
Room 2 - 1 - Phạm Quang Minh - A real DevOps culture in practice
Room 2 - 5 - Seong Soo - NHN Cloud - Upstream contribution mentoring program ...
Room 1 - 2 - Nguyễn Văn Thắng & Dzung Nguyen - Proxmox VE và ZFS over iscsi
Room 1 - 6 - Trần Quốc Sang - Autoscaling for multi cloud platform based on S...
Room 1 - 3 - Lê Anh Tuấn - Build a High Performance Identification at GHTK wi...
Room 1 - 7 - Lê Quốc Đạt - Upgrading network of Openstack to SDN with Tungste...
Room 1 - 5 - Thủy Đặng - Load balancing k8s services on baremetal with Cilium...
Room 1 - 4 - Phạm Tường Chiến & Trần Văn Thắng - Deliver managed Kubernetes C...
Room 1 - 1 - Benoit TELLIER - On premise email inbound service with Apache James

Recently uploaded (20)

PDF
Electronic commerce courselecture one. Pdf
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
KodekX | Application Modernization Development
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
CIFDAQ's Market Insight: SEC Turns Pro Crypto
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PPTX
A Presentation on Artificial Intelligence
DOCX
The AUB Centre for AI in Media Proposal.docx
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
PDF
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
PDF
Machine learning based COVID-19 study performance prediction
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
cuic standard and advanced reporting.pdf
PDF
Modernizing your data center with Dell and AMD
PDF
Approach and Philosophy of On baking technology
Electronic commerce courselecture one. Pdf
Per capita expenditure prediction using model stacking based on satellite ima...
Mobile App Security Testing_ A Comprehensive Guide.pdf
KodekX | Application Modernization Development
Reach Out and Touch Someone: Haptics and Empathic Computing
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
CIFDAQ's Market Insight: SEC Turns Pro Crypto
Digital-Transformation-Roadmap-for-Companies.pptx
A Presentation on Artificial Intelligence
The AUB Centre for AI in Media Proposal.docx
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
NewMind AI Weekly Chronicles - August'25 Week I
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
Machine learning based COVID-19 study performance prediction
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
cuic standard and advanced reporting.pdf
Modernizing your data center with Dell and AMD
Approach and Philosophy of On baking technology

EasyStack True Private Cloud | Quek Keng Oei

  • 1. Modern, Private, Automated Private Cloud Partnering with Altera Technologies
  • 2. Who are we? Award winning Global Catalyst Advisory spinoff – Clientele List Ministry of Foreign Affairs Civil Service College Temasek Foundation OECD Setia Berhad 1 Group Association of Small Medium Enterprises Franchising and Licensing Association of Singapore Awards Winner of RHT RMF Green Asia Initiatives Leadership (GAIL) Sustainability Awards - Gamechanger - Innovation Altera Technologies focusing on cloud management & technology
  • 3. Established in February 2014, founding team ex-IBM • In 5+ years, accumulated more than USD110M in 5 rounds venture capital funding - latest round C++ in August 2018 • Largest Series C funding round in China Open Source history • OpenStack Foundation Gold Member • Linux Foundation & CNCF Silver Member • 5 out of 10 China Largest OpenStack Deployments in 2016 • Awarded Gartner 2016 China Cool Vendor • Ranked No. 2 in 2018 OpenStack Foundation User Survey • Ranked Top 8 Gartner 2017 OpenStack Most Competitive Provider • Officially certified as CNCF Kubernetes Service Provider in 2018 Leadership • 2014 May: OpenStack Enterprise Distribution • 2014 Nov: China’s 1st OpenStack Hybrid Cloud • 2017 Mar: China’s 1st OpenStack with Kubernetes Converged Platform • 2018 May: Cloud Ready HCI Product ECS Stack • 2019 May: True Private Cloud Product ECS Innovation • Elected Independent Board Director OpenStack Foundation • Elected Heat Project PTL OpenStack Foundation • Ranked Top 10 Globally in TC-Approved Code Contribution OpenStack/Kubernetes/Ceph • Led China Linux Kernel Code Contribution Research Development EASYSTACK— Making Cloud Computing Easier 500+ large enterprise customers 200+ employees, focused on enterprise cloud computing software and services EasyStack has branch offices in 16 cities across mainland China and in silicon valley, Singapore, Sydney and Taipei Achievements 100+ Ecosystem Partners
  • 4. Enterprise IT spending on the true private cloud market worldwide from 2016 to 2027, by segment (in billion U.S. dollars) Region Worldwide Survey time period 2016 to 2018 Supplementary notes * Forecast. The source defines true private cloud as including: • a transaction relationship with a single provider; • flexibility in how IT resources are consumed; • an ability to accommodate hybrid cloud application use cases; • and availability on a self-service basis; - and excluding: • converged systems with limited orchestration and automation; • self-integrated private cloud involving numerous vendors; • spending by service providers on public cloud infrastructure; • services outside the maintenance and management of an enterprise private cloud, such as data center outsourcing, colocation, general cloud consulting, etc.; • and virtual private clouds.
  • 5. Cloud – The New Business Platform PUBLIC CLOUD PRIVATE CLOUD Managed by IT Managed by provider Two Models Today: Applications are delivered and built on cloud platforms Developers asking for self-service platforms for faster delivery IT is being pressured to provide that or move to AWS
  • 6. How Public Cloud Looks CHALLENGES: Cost scales rapidly Performance unpredictability No visibility below VMs One way migration path PUBLIC CLOUD Admins / Users CLOUD UI/API
  • 7. Challenges with Public Clouds Issues Description Rapid cost increase Total cost over 3 years more than private cloud as network traffic, etc are not included in the cost Unpredictable performance Sharing the same physical server with other unknown users Additional Security risk & compliance Require additional security services, audits, etc to secure cloud Misconfiguration of security & services Experience & review of services and security must be done with audits to ensure data not accessible by public (see CapitalOne data leak) No control below VM No management of environment below VMs or virtual network Lack of OpenAPI APIs are proprietary, not fully defined and changes regularly. Tools have to be compatible with the APIs in order to automate services
  • 8. Security – Top 5 concerns Top 5 Security Concerns of Public cloud: 1. Data Breaches – Access of data by unauthorized personnel (eg CapitalOne) 2. Hijacking of Accounts – Usernames/Password hacked, leaked private key, etc 3. Insecure APIs and Interfaces – Proprietary APIs that may have loopholes and weakness allowing illegal control 4. Insufficient Due Diligence – Due to lack of experience, knowledge or time, system not properly secured or protected 5. Malware Injections & APT - Malicious code injected into cloud services and runs in the cloud servers themselves to eavesdrop, compromise the integrity of sensitive information, and steal data
  • 9. Rack 1 Cloud Region 1 Cloud Region N Domain 1 Domain 1 True Private Cloud Feature: Secure Platform including configuration & data Tenant Project 1 Tenant Project N Tenant Project 1 Tenant Project N … … … Domain N Multi-Tenant Organization/Quota Management • Each region can be physically or logically designed and implemented • Domain can be company/organization/busin ess unit/department • Tenant Project can be sub- domain separation Tenant Project N Tenant Project 1 Tenant Project N … … Domain N … Tenant Project 1 … Physical and Logical Network Separation Host 2FA • Backend host access is protected by 2FA login • Ensure only authorized person(s) allowed into host server(s) console Server 1 Server N TOR Switch 1 … FW Device(s) Core Switch Rack N Server 1 Server N TOR Switch N … … VM Instance Router Instance Network Instance Network Instance VM Instance SecurityGroup Instance FWaaS Instance Floating IP Instance Logical Network Physical Network
  • 10. Conclusion Factors Public Cloud Private Cloud Flexibility on resources – able to turn on / call on resources on demand 5 4 Control – Able to control the cloud from hardware to software and service level 2 4.5 Security and privacy – Able to keep the data securely in the right hand and person and prevent access by non-authorized entities 1.5 4 Cost – Overall cost of starting and running the cloud solution 1.5 - 4.5 4 My scoring of the cloud: Rank scoring: 1 – Weakest, 5 - Strongest
  • 12. CapitalOne Data Breach – What is it • CNN – “In one of the biggest data breaches ever, a hacker gained access to more than 100 million Capital One customers' accounts and credit card applications earlier this year.”… “tech company software engineer for Amazon (AMZN) Web Services, the cloud hosting company that Capital One was using, the Justice Department said. She was able to gain access by exploiting a misconfigured web application firewall, according to a court filing…” • DigitalTrends – “…filed a class-action lawsuit Tuesday against Capital One Financial Corporation “for negligence in failing to safeguard consumers’ personal information” in the recent data breach that impacted 100 million consumers… ” • InfoSecurity Magazine – “…the intruder was able to enumerate over 700 S3 Buckets and ultimately copy sensitive data out of the environment…” CNN – https://edition.cnn.com/2019/07/29/business/capital-one-data-breach/index.html DigitalTrends – https://www.digitaltrends.com/news/capital-one-data-breach-class-action-lawsuit/ InfoSecurity Magazine – https://www.infosecurity-magazine.com/infosec/lessons-from-the-capital-one-data/

Editor's Notes

  • #4: Left side: Step through point by point Right side: Briefly touch on the achievements
  • #12: I hope you gain some valuable knowledge on what I have shared. Especially for those of you who are on digital transformation journey where cloud enablement is part of your plan, do consider speaking to EasyStack at the exhibition area booth. Happy to address your questions later today! Thank you