SlideShare a Scribd company logo
1 of 27
Download to read offline
SPECS Project
Secure Provisioning of Cloud Services based on SLA
Management
Berlin, Germany
16th September 2015
Agenda
 SPECS Introduction
 Security Service Level Agreement
 SPECS Demo
 SPECS Framework
CeRICT, Italy (coordinator)
TUD, Germany
IeAT, Romania
CSA, United Kingdom
XLAB, Slovenia
EISI, Ireland
FP7-ICT-10-610795
Project Start: 1/11/2013
Project Type: STREP
Duration: 30M
Total Funding: 3.5 M
EU Contribution: 2.4 M
SPECS Project
SPECS: Addressed Objective
 Problem Statement:
 End-User Cloud Security: How to compare Cloud Service Providers (CSPs)?,
What they grant? How to improve their security features if they do not grant
enough? …
 Challenges:
 Security Service Level Agreement (SLA): Adoption of Security SLA to states the
security grants between CSPs and Cloud Service Customers (CSCs)
 Security SLA Negotiation: Security SLA are evaluated to help CSC in selecting
the servicesand customized according to Customers requirements
 Security SLA (Automatic) Enforcement: Services are customized and enriched
with ad-hoc security mechanisms to grant the requested security SLAs
 Security SLA Continuous Monitoring: CSC conitnuously monitors the services to
be assured on the respect of agreed Secrutity SLAs
SPECS: A Platform for security SLAs
Negotiate Security SLAs,
Use cloud services,
Broker cloud services
Enforce additional security controls
Monitor security
SECURITY SERVICE LEVEL
AGREEMENT
Security Service Level Agreement in Practice:
How to represent security, How to measure it, How to grant the security level and a
concrete example of SPECS automatic enforcement of Security SLAs
Security Service Level Agreement
What (Security) SLAs should be
 CSP delivers services with an
SLA that details each grant
offered
 CSC compares offerings from
different CSPs
 CSC are able to verify the
respect of SLA and request
penalties when unrespected
What (Security) SLAs are today
 CSP offers a natural language
description of what it is able to
grant
 Few services are able to compare
concretely security offered by CSPs
 CSC have no concrete tools to
monitor an SLA
How to Obtain Concrete SLAs
 Issue 1: SLA Life cycle to automate their management
 Definition of the Process of SLA Management, taking into
account both CSP and CSC
 Issue 2: Security SLA Model to represent the grants
 What is the content of a SLAs? How to offer security grants?
 Gap among Customers (focused on risks) and Providers
(focused on security mechanisms offered)
 Issue 3: Automatic Enforcement/Monitoring of SLA
 Is a Security SLA (automatically) implementable?
SLA Life Cycle
Negotiation Phase: Establishing the agreement
Implementation Phase: CSP takes all the
actions needed to grant SLA over target services
Monitoring Phase: Both CSP and CSC monitor
services, to verify that SLA are respected
Remediation Phase: CSP performs action
in order to remdiate to an SLA violation
Renegotiation Phase: one of the party aims
at changing the terms of the agreement
A Security SLA Model
 Define Security terms according to standards and known best
practices, understandable by both CSC and CSP
 Security terms must be measurable and verifiable for both
CSC and CSP
 Implementable in cloud (self-service, on-demand cloud
characteristics)
 Automate negotiation of the agreement terms
 Automate implementation of SLA
 Automate monitoring of SLA
Security Model: Core Idea
 Best Practice:
 Risk Assessment helps in
identification of threats and
security requirements
 Selection of standard security
controls (a safeguard or
countermeasure prescribed to
protect confidentiality, integrity,
and availability)
 Certification verifies the
respect of security controls
 Security SLA made of
 Declarative Part:
Declaration of Security
Controls applied to the service
delivered.
 Measurable Part:
Declaration of the Security
Metrics that can be used by
CSC to verify the security Level
 Mapping:
Relates Controls and Metrics
11/19/2015 WP or Event Reference 11
Security SLA Model
12
Declarative
Measurable
Security SLA: Standard Format
 In order to enable the (automated) SLA processing Security
SLA must be represented in a machine readable format
 SPECS relies on WS-Agreement (OGF GFD-192) and offers a
set of extension to:
 Represent security controls (NIST 800-53rev4, CCM v3.0)
 Represent Standard Security Metrics (NIST RATAX)
 SPECS Map Security Metrics against security controls
11/19/2015 WP or Event Reference 13
Security SLA
14
What SLA
declare
What SLA measure
What the SLA protect
How declaration and
measurement are
associated
Implementable Security SLAs
 Are the Security SLA implementable? Is the Security SLA Model
Concrete?
 Additional Concepts:
 Security SLA Template: According to WS-Agreement approach
Security SLA are negotiated through templates that summarizes the
terms that can be negotiated
 Security Mechanisms: To grant security controls we introduce the
concept of security mechanism: a software, offered –as-a-service
that enrich the provided services with the safeguards and
countermeasures requested
11/19/2015 WP or Event Reference 15
Implementable Security SLA
11/19/2015 WP or Event Reference 16
Templates
to negotiate
with
customers
Security Mechanisms
IMPLEMENT
& DECLARE
security controls
& security metrics
Security SLA Model: how to use
Cloud Service Provider
 Security Controls enforced
through dedicated security
mechanisms
 Security Metrics can be
monitored through dedicated
tools
 SLA helps to verify correctness of
configuration and automates
service protection
Cloud Service Customer
 Security Controls grants the respect
of security requirements
 Customers are able to select and
compare providers
 SLA can be verified using Security
Metrics, whose definition is
standard
11/19/2015 WP or Event Reference 17
SECURITY SLA IN PRACTICE
A Demonstration of an application able to automate SLA Management
11/19/2015 WP or Event Reference 18
Demonstration Video
SPECS ARCHITECTURE
11/19/2015 WP or Event Reference 19
SPECS: What Offers
11/19/2015 WP or Event Reference 20
SPECS Platform
 A Platfrom that offers SPECS Core Services
(Negotiation, Monitoring, Enforcement)
 A Platform able to execute and manage SPECS Applications
SPECS Applications
 Application that offers cloud services protected by Security SLA
SPECS Open Source Framework
 Core Components to automate the SLA Life Cycle
 Security Mechanisms (and their metadata) to protect default services
 Tools to setup a SPECS Platform
WHO Uses SPECS
11/19/2015 WP or Event Reference 21
Cloud Service
Providers
 Use the SPECS PaaS
 Offer SPECS Applications
 Enrich their offerings with Security SLA
 Can customize their offerings according to specific security requirements (PA
example)
They are the SPECS Owners
Developers
 Use the SPECS Framework
 Know the security requirements of their customers
 Develop SPECS Applications
They are the SPECS Application Developers
Customers
 Negotiate Security SLAs
 Use the services offered by SPECS Applications
They are the End Users
SPECS Usage
SPECS as Third Party
 SPECS runs independently of a
single CSP, brokering resources
SPECS in a CSP
 SPECS runs INSIDE a CSP, using
the local resources and granting
SLAs
11/19/2015 Presentation template 22
Cloud Service Provider (CSP)
SPECS Framework
11/19/2015 Presentation template
23
SLA Platform
NegotiationMonitoring Enforcement
SPECS Application
Enabling Platform
Vertical
Layer
SPECS Framework in detail
11/19/2015 Presentation template 24
SPECS Behaviour
11/19/2015 WP or Event Reference 34
SPECS FRAMEWORK
SPECS Framework – The Open Source Solution
11/19/2015 WP or Event Reference 36
https://bitbucket.org/specs-team/
https://bamboo.services.ieat.ro/
http://mvn.services.ieat.ro/
Enabling Platform Demonstration Video
QUESTIONS?
16 November 2015 Berlin Workshop on Governance-Accountability-Compliance in the Cloud
CSA EMEA Congress
37

More Related Content

Viewers also liked

Aims2011 slacc-presentation final-version
Aims2011 slacc-presentation final-versionAims2011 slacc-presentation final-version
Aims2011 slacc-presentation final-versionictseserv
 
The Path To Cloud - an Infograph on Cloud Migration
The Path To Cloud - an Infograph on Cloud MigrationThe Path To Cloud - an Infograph on Cloud Migration
The Path To Cloud - an Infograph on Cloud MigrationInApp
 
Cloud migration pattern using microservices
Cloud migration pattern using microservicesCloud migration pattern using microservices
Cloud migration pattern using microservicesSeong-Bok Lee
 
5 Cloud Migration Experiences Not to Be Repeated
5 Cloud Migration Experiences Not to Be Repeated5 Cloud Migration Experiences Not to Be Repeated
5 Cloud Migration Experiences Not to Be RepeatedHostway|HOSTING
 
Forecast 2014 Keynote: State of Cloud Migration…What's Occurring Now, and Wha...
Forecast 2014 Keynote: State of Cloud Migration…What's Occurring Now, and Wha...Forecast 2014 Keynote: State of Cloud Migration…What's Occurring Now, and Wha...
Forecast 2014 Keynote: State of Cloud Migration…What's Occurring Now, and Wha...Open Data Center Alliance
 
Tracking SLAs In Cloud
Tracking SLAs In CloudTracking SLAs In Cloud
Tracking SLAs In CloudSatish Agrawal
 
Assess enterprise applications for cloud migration
Assess enterprise applications for cloud migrationAssess enterprise applications for cloud migration
Assess enterprise applications for cloud migrationnanda1505
 
Planning for a (Mostly) Hassle-Free Cloud Migration | VTUG 2016 Winter Warmer
Planning for a (Mostly) Hassle-Free Cloud Migration | VTUG 2016 Winter WarmerPlanning for a (Mostly) Hassle-Free Cloud Migration | VTUG 2016 Winter Warmer
Planning for a (Mostly) Hassle-Free Cloud Migration | VTUG 2016 Winter WarmerJoe Conlin
 
Outsourcing SLA versus Cloud SLA by Jurian Burgers
Outsourcing SLA versus Cloud SLA by Jurian BurgersOutsourcing SLA versus Cloud SLA by Jurian Burgers
Outsourcing SLA versus Cloud SLA by Jurian BurgersITpreneurs
 
SLAs in Virtualized Cloud Computing Infrastructures with QoS Assurance
SLAs in Virtualized Cloud Computing Infrastructures with QoS AssuranceSLAs in Virtualized Cloud Computing Infrastructures with QoS Assurance
SLAs in Virtualized Cloud Computing Infrastructures with QoS Assurancetcucinotta
 
Autonomic SLA-driven Provisioning for Cloud Applications
Autonomic SLA-driven Provisioning for Cloud ApplicationsAutonomic SLA-driven Provisioning for Cloud Applications
Autonomic SLA-driven Provisioning for Cloud Applicationsnbonvin
 
Hierarchical SLA-based Service Selection for Multi-Cloud Environments
Hierarchical SLA-based Service Selection for Multi-Cloud EnvironmentsHierarchical SLA-based Service Selection for Multi-Cloud Environments
Hierarchical SLA-based Service Selection for Multi-Cloud EnvironmentsSoodeh Farokhi
 
Measureable Cloud Migration
Measureable Cloud MigrationMeasureable Cloud Migration
Measureable Cloud MigrationTori Wieldt
 
Cloud Migration: Tales from the Trenches
Cloud Migration: Tales from the TrenchesCloud Migration: Tales from the Trenches
Cloud Migration: Tales from the TrenchesHostway|HOSTING
 
SQ-006: Quality Metrics and Measurements
SQ-006: Quality Metrics and MeasurementsSQ-006: Quality Metrics and Measurements
SQ-006: Quality Metrics and MeasurementsDigiLEAF Inc
 
Taking the Mystery Out of Public Cloud Migration - ScienceLogic
Taking the Mystery Out of Public Cloud Migration - ScienceLogicTaking the Mystery Out of Public Cloud Migration - ScienceLogic
Taking the Mystery Out of Public Cloud Migration - ScienceLogicScienceLogic
 

Viewers also liked (19)

Aims2011 slacc-presentation final-version
Aims2011 slacc-presentation final-versionAims2011 slacc-presentation final-version
Aims2011 slacc-presentation final-version
 
The Path To Cloud - an Infograph on Cloud Migration
The Path To Cloud - an Infograph on Cloud MigrationThe Path To Cloud - an Infograph on Cloud Migration
The Path To Cloud - an Infograph on Cloud Migration
 
Cloud migration pattern using microservices
Cloud migration pattern using microservicesCloud migration pattern using microservices
Cloud migration pattern using microservices
 
5 Cloud Migration Experiences Not to Be Repeated
5 Cloud Migration Experiences Not to Be Repeated5 Cloud Migration Experiences Not to Be Repeated
5 Cloud Migration Experiences Not to Be Repeated
 
Forecast 2014 Keynote: State of Cloud Migration…What's Occurring Now, and Wha...
Forecast 2014 Keynote: State of Cloud Migration…What's Occurring Now, and Wha...Forecast 2014 Keynote: State of Cloud Migration…What's Occurring Now, and Wha...
Forecast 2014 Keynote: State of Cloud Migration…What's Occurring Now, and Wha...
 
Tracking SLAs In Cloud
Tracking SLAs In CloudTracking SLAs In Cloud
Tracking SLAs In Cloud
 
Assess enterprise applications for cloud migration
Assess enterprise applications for cloud migrationAssess enterprise applications for cloud migration
Assess enterprise applications for cloud migration
 
How we measure quality of JIRA deployments to Cloud?
How we measure quality of JIRA deployments to Cloud?How we measure quality of JIRA deployments to Cloud?
How we measure quality of JIRA deployments to Cloud?
 
Cloud computing final
Cloud computing finalCloud computing final
Cloud computing final
 
Planning for a (Mostly) Hassle-Free Cloud Migration | VTUG 2016 Winter Warmer
Planning for a (Mostly) Hassle-Free Cloud Migration | VTUG 2016 Winter WarmerPlanning for a (Mostly) Hassle-Free Cloud Migration | VTUG 2016 Winter Warmer
Planning for a (Mostly) Hassle-Free Cloud Migration | VTUG 2016 Winter Warmer
 
Outsourcing SLA versus Cloud SLA by Jurian Burgers
Outsourcing SLA versus Cloud SLA by Jurian BurgersOutsourcing SLA versus Cloud SLA by Jurian Burgers
Outsourcing SLA versus Cloud SLA by Jurian Burgers
 
SLAs in Virtualized Cloud Computing Infrastructures with QoS Assurance
SLAs in Virtualized Cloud Computing Infrastructures with QoS AssuranceSLAs in Virtualized Cloud Computing Infrastructures with QoS Assurance
SLAs in Virtualized Cloud Computing Infrastructures with QoS Assurance
 
Autonomic SLA-driven Provisioning for Cloud Applications
Autonomic SLA-driven Provisioning for Cloud ApplicationsAutonomic SLA-driven Provisioning for Cloud Applications
Autonomic SLA-driven Provisioning for Cloud Applications
 
Hierarchical SLA-based Service Selection for Multi-Cloud Environments
Hierarchical SLA-based Service Selection for Multi-Cloud EnvironmentsHierarchical SLA-based Service Selection for Multi-Cloud Environments
Hierarchical SLA-based Service Selection for Multi-Cloud Environments
 
Measureable Cloud Migration
Measureable Cloud MigrationMeasureable Cloud Migration
Measureable Cloud Migration
 
Cloud Migration: Tales from the Trenches
Cloud Migration: Tales from the TrenchesCloud Migration: Tales from the Trenches
Cloud Migration: Tales from the Trenches
 
SQ-006: Quality Metrics and Measurements
SQ-006: Quality Metrics and MeasurementsSQ-006: Quality Metrics and Measurements
SQ-006: Quality Metrics and Measurements
 
Cloud Migration
Cloud MigrationCloud Migration
Cloud Migration
 
Taking the Mystery Out of Public Cloud Migration - ScienceLogic
Taking the Mystery Out of Public Cloud Migration - ScienceLogicTaking the Mystery Out of Public Cloud Migration - ScienceLogic
Taking the Mystery Out of Public Cloud Migration - ScienceLogic
 

Similar to Massimiliano Raks, Naples University on SPECS: Secure provisioning of cloud services based on SLA management

Service Compositions: Curse or Blessing for Security?
Service Compositions: Curse or Blessing for Security?Service Compositions: Curse or Blessing for Security?
Service Compositions: Curse or Blessing for Security?Achim D. Brucker
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
SDF_Security_A4_0606
SDF_Security_A4_0606SDF_Security_A4_0606
SDF_Security_A4_0606Eben Visser
 
Why CCSK with InfosecTrain (1).pdf
Why CCSK with InfosecTrain (1).pdfWhy CCSK with InfosecTrain (1).pdf
Why CCSK with InfosecTrain (1).pdfinfosec train
 
SLA Based Information Security Metric for Cloud Computing from COBIT 4.1 Fram...
SLA Based Information Security Metric for Cloud Computing from COBIT 4.1 Fram...SLA Based Information Security Metric for Cloud Computing from COBIT 4.1 Fram...
SLA Based Information Security Metric for Cloud Computing from COBIT 4.1 Fram...ijcncs
 
G6 independent certification for CSP v3
G6 independent certification for CSP v3G6 independent certification for CSP v3
G6 independent certification for CSP v3Ummey Humayra
 
Introduction to the CSA Cloud Controls Matrix
Introduction to the CSA Cloud Controls MatrixIntroduction to the CSA Cloud Controls Matrix
Introduction to the CSA Cloud Controls MatrixJohn Yeoh
 
Cloud Security using NIST guidelines
Cloud Security using NIST guidelinesCloud Security using NIST guidelines
Cloud Security using NIST guidelinesSrishti Ahuja
 
Cloud Security using NIST guidelines
Cloud Security using NIST guidelinesCloud Security using NIST guidelines
Cloud Security using NIST guidelinesSrishti Ahuja
 
Free and open cloud security posture monitoring
Free and open cloud security posture monitoringFree and open cloud security posture monitoring
Free and open cloud security posture monitoringElasticsearch
 
Nsx security deep dive
Nsx security deep diveNsx security deep dive
Nsx security deep divesolarisyougood
 
VMworld 2013: Get on with Business - VMware Reference Architectures Help Stre...
VMworld 2013: Get on with Business - VMware Reference Architectures Help Stre...VMworld 2013: Get on with Business - VMware Reference Architectures Help Stre...
VMworld 2013: Get on with Business - VMware Reference Architectures Help Stre...VMworld
 
The Cloud Crossover
The Cloud CrossoverThe Cloud Crossover
The Cloud CrossoverArmor
 
Cloud Security, Standards and Applications
Cloud Security, Standards and ApplicationsCloud Security, Standards and Applications
Cloud Security, Standards and ApplicationsDr. Sunil Kr. Pandey
 
AWS re:Invent 2016: Chalk Talk: Applying Security-by-Design to Drive Complian...
AWS re:Invent 2016: Chalk Talk: Applying Security-by-Design to Drive Complian...AWS re:Invent 2016: Chalk Talk: Applying Security-by-Design to Drive Complian...
AWS re:Invent 2016: Chalk Talk: Applying Security-by-Design to Drive Complian...Amazon Web Services
 
SOA Security Model For EAI
SOA Security Model For EAISOA Security Model For EAI
SOA Security Model For EAIvivekjv
 
#ALSummit: SCOR Velogica's Journey to SOC2/TYPE2 Via AWS
#ALSummit: SCOR Velogica's Journey to SOC2/TYPE2 Via AWS#ALSummit: SCOR Velogica's Journey to SOC2/TYPE2 Via AWS
#ALSummit: SCOR Velogica's Journey to SOC2/TYPE2 Via AWSAlert Logic
 
Escrow Presentation Final
Escrow Presentation FinalEscrow Presentation Final
Escrow Presentation FinalTony_Clarke
 
CSA Atlanta Chapter Meeting Q1'2013 and RSA Conference 2013 CSA Announcements
CSA Atlanta Chapter Meeting Q1'2013 and RSA Conference 2013 CSA AnnouncementsCSA Atlanta Chapter Meeting Q1'2013 and RSA Conference 2013 CSA Announcements
CSA Atlanta Chapter Meeting Q1'2013 and RSA Conference 2013 CSA AnnouncementsPhil Agcaoili
 

Similar to Massimiliano Raks, Naples University on SPECS: Secure provisioning of cloud services based on SLA management (20)

Service Compositions: Curse or Blessing for Security?
Service Compositions: Curse or Blessing for Security?Service Compositions: Curse or Blessing for Security?
Service Compositions: Curse or Blessing for Security?
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
 
SDF_Security_A4_0606
SDF_Security_A4_0606SDF_Security_A4_0606
SDF_Security_A4_0606
 
Why CCSK with InfosecTrain (1).pdf
Why CCSK with InfosecTrain (1).pdfWhy CCSK with InfosecTrain (1).pdf
Why CCSK with InfosecTrain (1).pdf
 
SLA Based Information Security Metric for Cloud Computing from COBIT 4.1 Fram...
SLA Based Information Security Metric for Cloud Computing from COBIT 4.1 Fram...SLA Based Information Security Metric for Cloud Computing from COBIT 4.1 Fram...
SLA Based Information Security Metric for Cloud Computing from COBIT 4.1 Fram...
 
G6 independent certification for CSP v3
G6 independent certification for CSP v3G6 independent certification for CSP v3
G6 independent certification for CSP v3
 
Introduction to the CSA Cloud Controls Matrix
Introduction to the CSA Cloud Controls MatrixIntroduction to the CSA Cloud Controls Matrix
Introduction to the CSA Cloud Controls Matrix
 
Cloud Security using NIST guidelines
Cloud Security using NIST guidelinesCloud Security using NIST guidelines
Cloud Security using NIST guidelines
 
Cloud Security using NIST guidelines
Cloud Security using NIST guidelinesCloud Security using NIST guidelines
Cloud Security using NIST guidelines
 
Free and open cloud security posture monitoring
Free and open cloud security posture monitoringFree and open cloud security posture monitoring
Free and open cloud security posture monitoring
 
Nsx security deep dive
Nsx security deep diveNsx security deep dive
Nsx security deep dive
 
VMworld 2013: Get on with Business - VMware Reference Architectures Help Stre...
VMworld 2013: Get on with Business - VMware Reference Architectures Help Stre...VMworld 2013: Get on with Business - VMware Reference Architectures Help Stre...
VMworld 2013: Get on with Business - VMware Reference Architectures Help Stre...
 
The Cloud Crossover
The Cloud CrossoverThe Cloud Crossover
The Cloud Crossover
 
Cloud Security, Standards and Applications
Cloud Security, Standards and ApplicationsCloud Security, Standards and Applications
Cloud Security, Standards and Applications
 
AWS re:Invent 2016: Chalk Talk: Applying Security-by-Design to Drive Complian...
AWS re:Invent 2016: Chalk Talk: Applying Security-by-Design to Drive Complian...AWS re:Invent 2016: Chalk Talk: Applying Security-by-Design to Drive Complian...
AWS re:Invent 2016: Chalk Talk: Applying Security-by-Design to Drive Complian...
 
SOA Security Model For EAI
SOA Security Model For EAISOA Security Model For EAI
SOA Security Model For EAI
 
#ALSummit: SCOR Velogica's Journey to SOC2/TYPE2 Via AWS
#ALSummit: SCOR Velogica's Journey to SOC2/TYPE2 Via AWS#ALSummit: SCOR Velogica's Journey to SOC2/TYPE2 Via AWS
#ALSummit: SCOR Velogica's Journey to SOC2/TYPE2 Via AWS
 
Escrow Presentation Final
Escrow Presentation FinalEscrow Presentation Final
Escrow Presentation Final
 
Losing Control to the Cloud
Losing Control to the CloudLosing Control to the Cloud
Losing Control to the Cloud
 
CSA Atlanta Chapter Meeting Q1'2013 and RSA Conference 2013 CSA Announcements
CSA Atlanta Chapter Meeting Q1'2013 and RSA Conference 2013 CSA AnnouncementsCSA Atlanta Chapter Meeting Q1'2013 and RSA Conference 2013 CSA Announcements
CSA Atlanta Chapter Meeting Q1'2013 and RSA Conference 2013 CSA Announcements
 

More from SLA-Ready Network

The European Cloud Initiative
The European Cloud InitiativeThe European Cloud Initiative
The European Cloud InitiativeSLA-Ready Network
 
“Tools” and Standards for Cloud-SLA
“Tools” and Standards for Cloud-SLA“Tools” and Standards for Cloud-SLA
“Tools” and Standards for Cloud-SLASLA-Ready Network
 
European Open Science Cloud (EOSC) From vision to action
European Open Science Cloud (EOSC) From vision to actionEuropean Open Science Cloud (EOSC) From vision to action
European Open Science Cloud (EOSC) From vision to actionSLA-Ready Network
 
SLA-Ready Common Reference Model
SLA-Ready Common Reference ModelSLA-Ready Common Reference Model
SLA-Ready Common Reference ModelSLA-Ready Network
 
Making cloud SLAs readily usable in the EU private sector
Making cloud SLAs readily usable in the EU private sector Making cloud SLAs readily usable in the EU private sector
Making cloud SLAs readily usable in the EU private sector SLA-Ready Network
 
Helix Nebula Science Cloud Joint Pre‐Commercial Procurement
Helix Nebula Science Cloud Joint Pre‐Commercial ProcurementHelix Nebula Science Cloud Joint Pre‐Commercial Procurement
Helix Nebula Science Cloud Joint Pre‐Commercial ProcurementSLA-Ready Network
 
Cloud Services As An Enabler: the Strategic, Legal & Pragmatic Approach
Cloud Services As An Enabler: the Strategic, Legal & Pragmatic ApproachCloud Services As An Enabler: the Strategic, Legal & Pragmatic Approach
Cloud Services As An Enabler: the Strategic, Legal & Pragmatic ApproachSLA-Ready Network
 
Cloud Services As An Enabler
Cloud Services As An EnablerCloud Services As An Enabler
Cloud Services As An EnablerSLA-Ready Network
 
SLA-Ready Common Reference Model
SLA-Ready Common Reference ModelSLA-Ready Common Reference Model
SLA-Ready Common Reference ModelSLA-Ready Network
 
Getting to grips with a Service Level Agreement and how SLA-Ready can help
Getting to grips with a Service Level Agreement and how SLA-Ready can helpGetting to grips with a Service Level Agreement and how SLA-Ready can help
Getting to grips with a Service Level Agreement and how SLA-Ready can helpSLA-Ready Network
 
Cloud Services As An Enabler
Cloud Services As An EnablerCloud Services As An Enabler
Cloud Services As An EnablerSLA-Ready Network
 
Getting to grips with a Service Level Agreement and how SLA-Ready can help
Getting to grips with a Service Level Agreement and how SLA-Ready can helpGetting to grips with a Service Level Agreement and how SLA-Ready can help
Getting to grips with a Service Level Agreement and how SLA-Ready can helpSLA-Ready Network
 
Practical tools supporting businesses when adopting cloud services
Practical tools supporting businesses when adopting cloud servicesPractical tools supporting businesses when adopting cloud services
Practical tools supporting businesses when adopting cloud servicesSLA-Ready Network
 
SLA-Ready Common Reference Model
SLA-Ready Common Reference ModelSLA-Ready Common Reference Model
SLA-Ready Common Reference ModelSLA-Ready Network
 
Cloud Services As An Enabler: The Strategic, Legal & Pragmatic Approach
Cloud Services As An Enabler: The Strategic, Legal & Pragmatic ApproachCloud Services As An Enabler: The Strategic, Legal & Pragmatic Approach
Cloud Services As An Enabler: The Strategic, Legal & Pragmatic ApproachSLA-Ready Network
 
Bob Jones, CERN on PICSE: Procurement of cloud services in Europe
Bob Jones, CERN on PICSE: Procurement of cloud services in EuropeBob Jones, CERN on PICSE: Procurement of cloud services in Europe
Bob Jones, CERN on PICSE: Procurement of cloud services in EuropeSLA-Ready Network
 
Siani Pearson, HP Labs UK on a Common Vision for Governance, Accountability a...
Siani Pearson, HP Labs UK on a Common Vision for Governance, Accountability a...Siani Pearson, HP Labs UK on a Common Vision for Governance, Accountability a...
Siani Pearson, HP Labs UK on a Common Vision for Governance, Accountability a...SLA-Ready Network
 

More from SLA-Ready Network (20)

European CIO Association
European CIO AssociationEuropean CIO Association
European CIO Association
 
The European Cloud Initiative
The European Cloud InitiativeThe European Cloud Initiative
The European Cloud Initiative
 
“Tools” and Standards for Cloud-SLA
“Tools” and Standards for Cloud-SLA“Tools” and Standards for Cloud-SLA
“Tools” and Standards for Cloud-SLA
 
European Open Science Cloud (EOSC) From vision to action
European Open Science Cloud (EOSC) From vision to actionEuropean Open Science Cloud (EOSC) From vision to action
European Open Science Cloud (EOSC) From vision to action
 
GÉANT network
GÉANT networkGÉANT network
GÉANT network
 
SLA-Ready Common Reference Model
SLA-Ready Common Reference ModelSLA-Ready Common Reference Model
SLA-Ready Common Reference Model
 
Making cloud SLAs readily usable in the EU private sector
Making cloud SLAs readily usable in the EU private sector Making cloud SLAs readily usable in the EU private sector
Making cloud SLAs readily usable in the EU private sector
 
Helix Nebula Science Cloud Joint Pre‐Commercial Procurement
Helix Nebula Science Cloud Joint Pre‐Commercial ProcurementHelix Nebula Science Cloud Joint Pre‐Commercial Procurement
Helix Nebula Science Cloud Joint Pre‐Commercial Procurement
 
Cloud Services As An Enabler: the Strategic, Legal & Pragmatic Approach
Cloud Services As An Enabler: the Strategic, Legal & Pragmatic ApproachCloud Services As An Enabler: the Strategic, Legal & Pragmatic Approach
Cloud Services As An Enabler: the Strategic, Legal & Pragmatic Approach
 
Cloud Services As An Enabler
Cloud Services As An EnablerCloud Services As An Enabler
Cloud Services As An Enabler
 
SLA-Ready Common Reference Model
SLA-Ready Common Reference ModelSLA-Ready Common Reference Model
SLA-Ready Common Reference Model
 
Getting to grips with a Service Level Agreement and how SLA-Ready can help
Getting to grips with a Service Level Agreement and how SLA-Ready can helpGetting to grips with a Service Level Agreement and how SLA-Ready can help
Getting to grips with a Service Level Agreement and how SLA-Ready can help
 
Cloud Services As An Enabler
Cloud Services As An EnablerCloud Services As An Enabler
Cloud Services As An Enabler
 
Getting to grips with a Service Level Agreement and how SLA-Ready can help
Getting to grips with a Service Level Agreement and how SLA-Ready can helpGetting to grips with a Service Level Agreement and how SLA-Ready can help
Getting to grips with a Service Level Agreement and how SLA-Ready can help
 
Practical tools supporting businesses when adopting cloud services
Practical tools supporting businesses when adopting cloud servicesPractical tools supporting businesses when adopting cloud services
Practical tools supporting businesses when adopting cloud services
 
SLA-Ready Common Reference Model
SLA-Ready Common Reference ModelSLA-Ready Common Reference Model
SLA-Ready Common Reference Model
 
Cloud Services As An Enabler: The Strategic, Legal & Pragmatic Approach
Cloud Services As An Enabler: The Strategic, Legal & Pragmatic ApproachCloud Services As An Enabler: The Strategic, Legal & Pragmatic Approach
Cloud Services As An Enabler: The Strategic, Legal & Pragmatic Approach
 
Are you SLA-Ready?
Are you SLA-Ready?Are you SLA-Ready?
Are you SLA-Ready?
 
Bob Jones, CERN on PICSE: Procurement of cloud services in Europe
Bob Jones, CERN on PICSE: Procurement of cloud services in EuropeBob Jones, CERN on PICSE: Procurement of cloud services in Europe
Bob Jones, CERN on PICSE: Procurement of cloud services in Europe
 
Siani Pearson, HP Labs UK on a Common Vision for Governance, Accountability a...
Siani Pearson, HP Labs UK on a Common Vision for Governance, Accountability a...Siani Pearson, HP Labs UK on a Common Vision for Governance, Accountability a...
Siani Pearson, HP Labs UK on a Common Vision for Governance, Accountability a...
 

Recently uploaded

TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfhans926745
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesBoston Institute of Analytics
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 

Recently uploaded (20)

TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 

Massimiliano Raks, Naples University on SPECS: Secure provisioning of cloud services based on SLA management

  • 1. SPECS Project Secure Provisioning of Cloud Services based on SLA Management Berlin, Germany 16th September 2015
  • 2. Agenda  SPECS Introduction  Security Service Level Agreement  SPECS Demo  SPECS Framework
  • 3. CeRICT, Italy (coordinator) TUD, Germany IeAT, Romania CSA, United Kingdom XLAB, Slovenia EISI, Ireland FP7-ICT-10-610795 Project Start: 1/11/2013 Project Type: STREP Duration: 30M Total Funding: 3.5 M EU Contribution: 2.4 M SPECS Project
  • 4. SPECS: Addressed Objective  Problem Statement:  End-User Cloud Security: How to compare Cloud Service Providers (CSPs)?, What they grant? How to improve their security features if they do not grant enough? …  Challenges:  Security Service Level Agreement (SLA): Adoption of Security SLA to states the security grants between CSPs and Cloud Service Customers (CSCs)  Security SLA Negotiation: Security SLA are evaluated to help CSC in selecting the servicesand customized according to Customers requirements  Security SLA (Automatic) Enforcement: Services are customized and enriched with ad-hoc security mechanisms to grant the requested security SLAs  Security SLA Continuous Monitoring: CSC conitnuously monitors the services to be assured on the respect of agreed Secrutity SLAs
  • 5. SPECS: A Platform for security SLAs Negotiate Security SLAs, Use cloud services, Broker cloud services Enforce additional security controls Monitor security
  • 6. SECURITY SERVICE LEVEL AGREEMENT Security Service Level Agreement in Practice: How to represent security, How to measure it, How to grant the security level and a concrete example of SPECS automatic enforcement of Security SLAs
  • 7. Security Service Level Agreement What (Security) SLAs should be  CSP delivers services with an SLA that details each grant offered  CSC compares offerings from different CSPs  CSC are able to verify the respect of SLA and request penalties when unrespected What (Security) SLAs are today  CSP offers a natural language description of what it is able to grant  Few services are able to compare concretely security offered by CSPs  CSC have no concrete tools to monitor an SLA
  • 8. How to Obtain Concrete SLAs  Issue 1: SLA Life cycle to automate their management  Definition of the Process of SLA Management, taking into account both CSP and CSC  Issue 2: Security SLA Model to represent the grants  What is the content of a SLAs? How to offer security grants?  Gap among Customers (focused on risks) and Providers (focused on security mechanisms offered)  Issue 3: Automatic Enforcement/Monitoring of SLA  Is a Security SLA (automatically) implementable?
  • 9. SLA Life Cycle Negotiation Phase: Establishing the agreement Implementation Phase: CSP takes all the actions needed to grant SLA over target services Monitoring Phase: Both CSP and CSC monitor services, to verify that SLA are respected Remediation Phase: CSP performs action in order to remdiate to an SLA violation Renegotiation Phase: one of the party aims at changing the terms of the agreement
  • 10. A Security SLA Model  Define Security terms according to standards and known best practices, understandable by both CSC and CSP  Security terms must be measurable and verifiable for both CSC and CSP  Implementable in cloud (self-service, on-demand cloud characteristics)  Automate negotiation of the agreement terms  Automate implementation of SLA  Automate monitoring of SLA
  • 11. Security Model: Core Idea  Best Practice:  Risk Assessment helps in identification of threats and security requirements  Selection of standard security controls (a safeguard or countermeasure prescribed to protect confidentiality, integrity, and availability)  Certification verifies the respect of security controls  Security SLA made of  Declarative Part: Declaration of Security Controls applied to the service delivered.  Measurable Part: Declaration of the Security Metrics that can be used by CSC to verify the security Level  Mapping: Relates Controls and Metrics 11/19/2015 WP or Event Reference 11
  • 13. Security SLA: Standard Format  In order to enable the (automated) SLA processing Security SLA must be represented in a machine readable format  SPECS relies on WS-Agreement (OGF GFD-192) and offers a set of extension to:  Represent security controls (NIST 800-53rev4, CCM v3.0)  Represent Standard Security Metrics (NIST RATAX)  SPECS Map Security Metrics against security controls 11/19/2015 WP or Event Reference 13
  • 14. Security SLA 14 What SLA declare What SLA measure What the SLA protect How declaration and measurement are associated
  • 15. Implementable Security SLAs  Are the Security SLA implementable? Is the Security SLA Model Concrete?  Additional Concepts:  Security SLA Template: According to WS-Agreement approach Security SLA are negotiated through templates that summarizes the terms that can be negotiated  Security Mechanisms: To grant security controls we introduce the concept of security mechanism: a software, offered –as-a-service that enrich the provided services with the safeguards and countermeasures requested 11/19/2015 WP or Event Reference 15
  • 16. Implementable Security SLA 11/19/2015 WP or Event Reference 16 Templates to negotiate with customers Security Mechanisms IMPLEMENT & DECLARE security controls & security metrics
  • 17. Security SLA Model: how to use Cloud Service Provider  Security Controls enforced through dedicated security mechanisms  Security Metrics can be monitored through dedicated tools  SLA helps to verify correctness of configuration and automates service protection Cloud Service Customer  Security Controls grants the respect of security requirements  Customers are able to select and compare providers  SLA can be verified using Security Metrics, whose definition is standard 11/19/2015 WP or Event Reference 17
  • 18. SECURITY SLA IN PRACTICE A Demonstration of an application able to automate SLA Management 11/19/2015 WP or Event Reference 18 Demonstration Video
  • 19. SPECS ARCHITECTURE 11/19/2015 WP or Event Reference 19
  • 20. SPECS: What Offers 11/19/2015 WP or Event Reference 20 SPECS Platform  A Platfrom that offers SPECS Core Services (Negotiation, Monitoring, Enforcement)  A Platform able to execute and manage SPECS Applications SPECS Applications  Application that offers cloud services protected by Security SLA SPECS Open Source Framework  Core Components to automate the SLA Life Cycle  Security Mechanisms (and their metadata) to protect default services  Tools to setup a SPECS Platform
  • 21. WHO Uses SPECS 11/19/2015 WP or Event Reference 21 Cloud Service Providers  Use the SPECS PaaS  Offer SPECS Applications  Enrich their offerings with Security SLA  Can customize their offerings according to specific security requirements (PA example) They are the SPECS Owners Developers  Use the SPECS Framework  Know the security requirements of their customers  Develop SPECS Applications They are the SPECS Application Developers Customers  Negotiate Security SLAs  Use the services offered by SPECS Applications They are the End Users
  • 22. SPECS Usage SPECS as Third Party  SPECS runs independently of a single CSP, brokering resources SPECS in a CSP  SPECS runs INSIDE a CSP, using the local resources and granting SLAs 11/19/2015 Presentation template 22 Cloud Service Provider (CSP)
  • 23. SPECS Framework 11/19/2015 Presentation template 23 SLA Platform NegotiationMonitoring Enforcement SPECS Application Enabling Platform Vertical Layer
  • 24. SPECS Framework in detail 11/19/2015 Presentation template 24
  • 25. SPECS Behaviour 11/19/2015 WP or Event Reference 34
  • 26. SPECS FRAMEWORK SPECS Framework – The Open Source Solution 11/19/2015 WP or Event Reference 36 https://bitbucket.org/specs-team/ https://bamboo.services.ieat.ro/ http://mvn.services.ieat.ro/ Enabling Platform Demonstration Video
  • 27. QUESTIONS? 16 November 2015 Berlin Workshop on Governance-Accountability-Compliance in the Cloud CSA EMEA Congress 37