Your SlideShare is downloading. ×
0
Cloud security
Cloud security
Cloud security
Cloud security
Cloud security
Cloud security
Cloud security
Cloud security
Cloud security
Cloud security
Cloud security
Cloud security
Cloud security
Cloud security
Cloud security
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

Cloud security

6,061

Published on

Security Lab at The Alexandra Institute focuses on developing solutions and concepts that enable secure utilisation of current and future IT and internet-based solutions. We focus on four leading …

Security Lab at The Alexandra Institute focuses on developing solutions and concepts that enable secure utilisation of current and future IT and internet-based solutions. We focus on four leading technological trends:

Pervasive Computing
Cloud Computing
Mutual Computing
Privacy

Contact either Head of Research & Innovation
Security lab - jakob.i.pagter@alexandra.dk

Published in: Technology, Business
0 Comments
3 Likes
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total Views
6,061
On Slideshare
0
From Embeds
0
Number of Embeds
2
Actions
Shares
0
Downloads
114
Comments
0
Likes
3
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide
  • Generally, SaaS provides the most integrated functionality built directly into the offering, with the least consumer extensibility, and a relatively high level of integrated security (at least the provider bears a responsibility for security).PaaS is intended to enable developers to build their own applications on top of the platform. As a result it tends to be more extensible than SaaS, at the expense of customerready features. This tradeoff extends to security features and capabilities, where the built-in capabilities are less complete, but there is more flexibility to layer on additional security.IaaS provides few if any application-like features, but enormous extensibility. This generally means less integrated security capabilities and functionality beyond protecting the infrastructure itself. This model requires that operating systems, applications, and content be managed and secured by the cloud consumer.
  • Transcript

    1. Alexandra Instituttet<br />Cloud computing Security<br />6/5/2011<br />
    2. Alexandra Institute<br />Cloud computingSecurity<br />
    3. What Is Cloud Computing?<br />
    4. Cloud Benefits<br />
    5. B2B Scenario<br />
    6. B2B2C Scenario (Business to Business to Customer)<br />
    7. Innovation In Assembly Scenario<br />
    8. Cloud Computing Evolution<br />
    9. Cloud Service Models<br />http://www.katescomment.com/iaas-paas-saas-definition/<br />
    10. Multi-Tenancy<br />
    11. Alexandra Institute<br />Cloud computing<br />Security<br />
    12. 14 Specific Cloud Computing Security Challenges*<br />Migrating PII & sensitive data to the cloud<br /><ul><li>EU Data Protection Directive & U.S. Safe Harbor program
    13. Exposure of data to foreign government & data
    14. Subpoenas
    15. Data retention & records management issues
    16. Privacy Impact Assessments (PIA)</li></ul>Identity & Access Management<br />Multi-tenancy<br />Logging & Monitoring<br />Data ownership /custodianship<br />Quality of Service guarantees<br />Securing hypervisors (Blue Pill)<br />*Cloud Computing An insight in the Governance & Security aspectsMarc Vael<br />
    17. 14 Specific Cloud Computing Security Challenges*<br />Attracting hackers (high value target)<br />Security of virtual OS in the cloud<br />BCP / DRP<br />Data encryption & key management<br /><ul><li>Encrypting access to cloud resource control interface
    18. Encrypting administrative access to OS instances
    19. Encrypting access to applications
    20. Encrypting application data at rest</li></ul>Public cloud vs. Internal cloud security<br />Lack of public SaaS version control<br />14.Using SLAs to obtain cloud security<br /><ul><li>Suggested requirements for cloud SLAs
    21. Issues with cloud forensics & e-discovery</li></ul>*Cloud Computing An insight in the Governance & Security aspectsMarc Vael<br />
    22. Domain 2 Governance and Enterprise Risk Management<br />Domain3<br />Legal and Electronic Discovery<br />Domain 7<br />Traditional Security, Business Continuity, and Disaster Recovery<br />Domain 12 Identity and Access Management<br />Domain 11 Encryption and Key Management<br />Domain 5 Information Lifecycle Management<br />Domain 13 Virtualization<br />Domain 11 Encryption and Key Management<br />Domain 9Incident Response, Notification, and Remediation<br />Domain 7<br />Traditional Security, Business Continuity, and Disaster Recovery<br />Domain 12 <br />Identity and Access Management<br />Domain 6 Portability and Interoperability<br />Domain 10<br />Application Security<br />How Security Gets Integrated<br />Domain 2 Governance and Enterprise Risk Management<br />Domain 6 Portability and Interoperability<br />Domain 4 Compliance and Audit<br />Domain 6 Portability and Interoperability<br />Domain 8 Data Center Operations<br />
    23. For more information go to Alexandra.dk/CCSK<br />

    ×