Your SlideShare is downloading. ×
HOW IS CLOUD SECURITY DIFFERENT FROM ON-PREMISE SECURITY
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

HOW IS CLOUD SECURITY DIFFERENT FROM ON-PREMISE SECURITY

715

Published on

HOW IS CLOUD SECURITY DIFFERENT FROM ON-PREMISE SECURITY

HOW IS CLOUD SECURITY DIFFERENT FROM ON-PREMISE SECURITY

Published in: Technology, Business
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
715
On Slideshare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
39
Comments
0
Likes
0
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. HOW IS CLOUD SECURITYDIFFERENT FROM ON-PREMISE SECURITY http://clean-clouds.com Visit Researcher’s Blog - http://clean-clouds.com
  • 2. • The typical entry point for the customers to the Cloud will be migration of their existing applications to the Cloud, initially as a proof- of-concept and later in production.• Customer will have the following questions: – How does the migrated application exploit the Performance, Scalability, Robustness models for Public Clouds? – How does the migrated application exploit the Security, Systems and Applications Management models for Public Clouds? Visit Researcher’s Blog - http://clean-clouds.com
  • 3. The following security measures represent generalbest practice implementations for cloud security.• Implement and maintain a security program.• Implement strong access and identity management.• Ensure confidential data protection.• Build and maintain a secure cloud infrastructure. – Implement N/W security – Implement virtualization security – Ensure physical security Visit Researcher’s Blog - http://clean-clouds.com
  • 4. Security Concerns for Cloud Computing Visit Researcher’s Blog - http://clean-clouds.com
  • 5. Security Concerns for Cloud ComputingIdentity and Access Network SecurityManagement • How can I ensure data security in• Who has access? transit? Is data on disk is encrypted?• Can the existing authentication • What are the preventive and detective implementation be ported to cloud? controls for the N/W attacks?• How trust is maintained across cloud OS & Virtualization Security and on premise domain? • What are the measures we need to• How to enable single sign on for consider for virtualization security? applications on cloud and on premise? How is your data and applicationData Security isolated from other customers? Is this a logical isolation or physical isolation?• How CIA is maintained and ensured? • How to protect Host Operating• How key credentials are managed? System?• Do you have the right to audit? • How OS level security like OS• How location related jurisdictional hardening are maintained? requirement is addressed? Visit Researcher’s Blog - http://clean-clouds.com
  • 6. Security Concerns for Cloud ComputingPhysical Security• What are the DR mechanism in place?• What are the controls applied to secure physical data centre?Application• What is the possibility of availability of an application?• Is there any assurance provided by the CSP? How to make sure that Application code is what it should be? Visit Researcher’s Blog - http://clean-clouds.com
  • 7. Download with Linkedin Username/Password
  • 8. Download with Linkedin Username/Password
  • 9. Download with Linkedin Username/Password
  • 10. Download with Linkedin Username/Password
  • 11. Download with Linkedin Username/Password

×