Your SlideShare is downloading. ×
Cloud security
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×

Introducing the official SlideShare app

Stunning, full-screen experience for iPhone and Android

Text the download link to your phone

Standard text messaging rates apply

Cloud security

6,022
views

Published on

Security Lab at The Alexandra Institute focuses on developing solutions and concepts that enable secure utilisation of current and future IT and internet-based solutions. We focus on four leading …

Security Lab at The Alexandra Institute focuses on developing solutions and concepts that enable secure utilisation of current and future IT and internet-based solutions. We focus on four leading technological trends:

Pervasive Computing
Cloud Computing
Mutual Computing
Privacy

Contact either Head of Research & Innovation
Security lab - jakob.i.pagter@alexandra.dk

Published in: Technology, Business

0 Comments
3 Likes
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total Views
6,022
On Slideshare
0
From Embeds
0
Number of Embeds
2
Actions
Shares
0
Downloads
113
Comments
0
Likes
3
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide
  • Generally, SaaS provides the most integrated functionality built directly into the offering, with the least consumer extensibility, and a relatively high level of integrated security (at least the provider bears a responsibility for security).PaaS is intended to enable developers to build their own applications on top of the platform. As a result it tends to be more extensible than SaaS, at the expense of customerready features. This tradeoff extends to security features and capabilities, where the built-in capabilities are less complete, but there is more flexibility to layer on additional security.IaaS provides few if any application-like features, but enormous extensibility. This generally means less integrated security capabilities and functionality beyond protecting the infrastructure itself. This model requires that operating systems, applications, and content be managed and secured by the cloud consumer.
  • Transcript

    • 1. Alexandra Instituttet
      Cloud computing Security
      6/5/2011
    • 2. Alexandra Institute
      Cloud computingSecurity
    • 3. What Is Cloud Computing?
    • 4. Cloud Benefits
    • 5. B2B Scenario
    • 6. B2B2C Scenario (Business to Business to Customer)
    • 7. Innovation In Assembly Scenario
    • 8. Cloud Computing Evolution
    • 9. Cloud Service Models
      http://www.katescomment.com/iaas-paas-saas-definition/
    • 10. Multi-Tenancy
    • 11. Alexandra Institute
      Cloud computing
      Security
    • 12. 14 Specific Cloud Computing Security Challenges*
      Migrating PII & sensitive data to the cloud
      • EU Data Protection Directive & U.S. Safe Harbor program
      • 13. Exposure of data to foreign government & data
      • 14. Subpoenas
      • 15. Data retention & records management issues
      • 16. Privacy Impact Assessments (PIA)
      Identity & Access Management
      Multi-tenancy
      Logging & Monitoring
      Data ownership /custodianship
      Quality of Service guarantees
      Securing hypervisors (Blue Pill)
      *Cloud Computing An insight in the Governance & Security aspectsMarc Vael
    • 17. 14 Specific Cloud Computing Security Challenges*
      Attracting hackers (high value target)
      Security of virtual OS in the cloud
      BCP / DRP
      Data encryption & key management
      • Encrypting access to cloud resource control interface
      • 18. Encrypting administrative access to OS instances
      • 19. Encrypting access to applications
      • 20. Encrypting application data at rest
      Public cloud vs. Internal cloud security
      Lack of public SaaS version control
      14.Using SLAs to obtain cloud security
      • Suggested requirements for cloud SLAs
      • 21. Issues with cloud forensics & e-discovery
      *Cloud Computing An insight in the Governance & Security aspectsMarc Vael
    • 22. Domain 2 Governance and Enterprise Risk Management
      Domain3
      Legal and Electronic Discovery
      Domain 7
      Traditional Security, Business Continuity, and Disaster Recovery
      Domain 12 Identity and Access Management
      Domain 11 Encryption and Key Management
      Domain 5 Information Lifecycle Management
      Domain 13 Virtualization
      Domain 11 Encryption and Key Management
      Domain 9Incident Response, Notification, and Remediation
      Domain 7
      Traditional Security, Business Continuity, and Disaster Recovery
      Domain 12
      Identity and Access Management
      Domain 6 Portability and Interoperability
      Domain 10
      Application Security
      How Security Gets Integrated
      Domain 2 Governance and Enterprise Risk Management
      Domain 6 Portability and Interoperability
      Domain 4 Compliance and Audit
      Domain 6 Portability and Interoperability
      Domain 8 Data Center Operations
    • 23. For more information go to Alexandra.dk/CCSK