SlideShare a Scribd company logo
1 of 25
Download to read offline
Public cloud and the state
of security
Q4 2017
Hello!
I am Olivier Schmitt
I am here because I love to share knowledge.
Check my linkedin profile.
Disclaimer !
This slideshow is a brief introduction to a complex topic which is
evolving constantly. It is not meant for security professionals but built
for those people discovering public cloud.
Despite the fact I aimed to be honest and fair, some pieces of
information presented here might be incorrect or biased.
Please do you own research and always do your homework.
A major concern
About the fear of losing control ...
1.
State of the Cloud report
RightScale found in « State of the Cloud
report » that security is a major concern
for 25% of the respondents.
Security, while not the highest concern
here, as it was previously, remains in the
top 3.
Some specific concerns
✘ How does the provider comply consistently to security standards ?
✘ Can the provider access my data ?
✘ How is my data segregated from the access of other customers?
✘ Could the provider share my data with a foreign authority ?
✘ How to enforce SLAs ?
✘ Who is responsible or accountable for what ?
The strategy of providers
How does the pros tackle the issue ?
2.
The race to compliance
✘ Cloud providers are competing in the game « Who complies to
anything ?»
✘ Giants are leading the race : AWS, Azure, Google Cloud and, far
behind the growing competition.
The race to compliance - certifications
Source : Olivier Schmitt, Q4 2017
The race to compliance – laws, regulations, privacy
Source : Olivier Schmitt, Q4 2017
Bring in the best people
« Cloud computing is often far more secure than traditional
computing, because companies like Google and Amazon can
attract and retain cyber-security personnel of a higher quality
than many governmental agencies »
Vivek Kundra, Executive Vice President, Industries, Salesforce.com
AWS case study
How does the leader do it ?
3.
How the leader leads ?
AWS owns almost 40% of the
market share and is bigger than
Azure, IBM and Google combined.
A clean model of responsibility
✘ AWS is responsible for protecting the infrastructure that runs all
AWS services offered in the AWS Cloud
✘ The customer is reponsible for the resources and services he
manages or builds on top of AWS.
A clean model of responsibility
From the provider perspective
✘ Robust deployment topology : regions (somewhere on earth) and
availability zones (≥ 2 active datacenters per region)
✘ Physical and environmental security : fire detection and suppression,
power, climate and temperature
✘ Business continuity management : availability, incidence response,
company-wide executive review, communication
✘ Network security : secure network architecture, secure access points,
transmission protection, Amazon coporate segregation, fault tolerant
design
✘ Compliance to standards : SOC, ISO, PCI, ...
From the provider perspective – AWS regions
From the provider perspective – a proven expertise
✘ A huge customer portfolio : 1 million clients in 190 countries (NASA, CIA,
Netflix, General Electric,...)
✘ Amazon.com is build on top of AWS : one of the biggest and most
sensitive online services
✘ A proven experience in infrastructure and cloud service developments :
●
44 datacenters in 16 regions worldwide, 17 new datacenters in project
stage
●
110+ cloud services : from storage to chat bots, from online gaming to data
warehouse
Eat your own dog food
amazon.com brings the scale and the challenge to push AWS toward excellence,
that’s merely a unique position in the market
From the customer perspective – AWS and my data
✘ ISO 27018 : some AWS services are certified
✘ European Union’s General Data Protection Regulation : the GDPR
framework helps cloud infrastructure providers comply and so avoid
penalties while also offering a framework to help customers and end users
to select cloud providers and trust their services. AWS services will comply
with the GDPR when it becomes enforceable on May 25, 2018.
From the customer perspective – dedicated security services
✘ AWS offers a wide variety of security services : AWS Artifact, AWS
Certificate Manager, Amazon Cloud Directory, AWS CloudHSM, AWS
Directory Service, AWS Identity and Access Management, Amazon
Inspector, AWS Key Management Service, AWS Organizations, AWS
Shield, AWS WAF … click here.
✘ A rich and easily accessible documentation : white papers, tutorials,
technical papers, …click here.
From the customer perspective – savy services
✘ Most services offer options related to security
●
Data replication between regions
●
Configuration management
●
Rich encryption features
✘ Services that can support a security policy
●
Monitoring
●
Logging
●
Deep learning to dig and find sensitive data for you
●
Deep integration with Identity and Access Management
Let’s review some concepts
Public cloud providers’ efforts
They made a huge effort to comply
with security best practices and
standards.
AWS leads
Microsoft made huge progress.
Private datacenter at stake
Securing a private datacenter is
harder and harder since hackers
are becoming more sophisticated.
See stories like EQUIFAX,
Yahoo,British Airline, ...
Clean responsibility model
A public cloud provider needs to
provide clean and coherent RACIs,
then each party knows what to do.
Customer must play his
partition
Customers must implement security
policies and should not rely on the
provider solely. 
Logging and monitoring
Trust is based on accountability.
Customers and providers need to
know what’s going on.
Thanks!
Special thanks to all the people who made and released these awesome
resources for free:
✘ Presentation template by SlidesCarnival
✘ To Wade from Italki
Credits

More Related Content

What's hot

Top Security Myths Dispelled - AWS Summit Sydney 2018
Top Security Myths Dispelled - AWS Summit Sydney 2018 Top Security Myths Dispelled - AWS Summit Sydney 2018
Top Security Myths Dispelled - AWS Summit Sydney 2018 Amazon Web Services
 
Protected Workloads Security Shakedown
Protected Workloads Security ShakedownProtected Workloads Security Shakedown
Protected Workloads Security ShakedownAmazon Web Services
 
Cloud Security & Privacy Standard Slide
Cloud Security & Privacy Standard SlideCloud Security & Privacy Standard Slide
Cloud Security & Privacy Standard Slideacinfotec
 
Cloud Data Security Trends.pdf
Cloud Data Security Trends.pdfCloud Data Security Trends.pdf
Cloud Data Security Trends.pdfSun Technologies
 
Get ahead of cloud network security trends and practices in 2020
Get ahead of cloud network security trends and practices in 2020Get ahead of cloud network security trends and practices in 2020
Get ahead of cloud network security trends and practices in 2020Cynthia Hsieh
 
Alert Logic: Realities of Security in the Cloud
Alert Logic: Realities of Security in the CloudAlert Logic: Realities of Security in the Cloud
Alert Logic: Realities of Security in the CloudAlert Logic
 
Simplify security with Trend Micro's Managed Rules
Simplify security with Trend Micro's Managed RulesSimplify security with Trend Micro's Managed Rules
Simplify security with Trend Micro's Managed RulesAmazon Web Services
 
Security Spotlight: The Coca Cola Company - CSS ATX 2017
Security Spotlight: The Coca Cola Company - CSS ATX 2017Security Spotlight: The Coca Cola Company - CSS ATX 2017
Security Spotlight: The Coca Cola Company - CSS ATX 2017Alert Logic
 
Introduction to Cloud Security
Introduction to Cloud SecurityIntroduction to Cloud Security
Introduction to Cloud SecuritySusanne Tedrick
 
Securing Applications in the Cloud
Securing Applications in the CloudSecuring Applications in the Cloud
Securing Applications in the CloudSecurity Innovation
 
The Cloud & I, The CISO challenges with Cloud Computing
The Cloud & I, The CISO challenges with Cloud Computing The Cloud & I, The CISO challenges with Cloud Computing
The Cloud & I, The CISO challenges with Cloud Computing Moshe Ferber
 
C-Level tools for Cloud security
C-Level tools for Cloud securityC-Level tools for Cloud security
C-Level tools for Cloud securityVladimir Jirasek
 
2022 Q1 Webinar Securite du Cloud public (1).pdf
2022 Q1 Webinar Securite du Cloud public (1).pdf2022 Q1 Webinar Securite du Cloud public (1).pdf
2022 Q1 Webinar Securite du Cloud public (1).pdfYounesChafi1
 
The AWS Shared Security Responsibility Model in Practice
The AWS Shared Security Responsibility Model in PracticeThe AWS Shared Security Responsibility Model in Practice
The AWS Shared Security Responsibility Model in PracticeAlert Logic
 
Infosec 2014: Who Is Skybox Security?
Infosec 2014: Who Is Skybox Security? Infosec 2014: Who Is Skybox Security?
Infosec 2014: Who Is Skybox Security? Skybox Security
 
EveryCloud_Company_Intro_Piece
EveryCloud_Company_Intro_PieceEveryCloud_Company_Intro_Piece
EveryCloud_Company_Intro_PiecePaul Richards
 
Secure your cloud applications by building solid foundations with enterprise ...
Secure your cloud applications by building solid foundations with enterprise ...Secure your cloud applications by building solid foundations with enterprise ...
Secure your cloud applications by building solid foundations with enterprise ...Vladimir Jirasek
 

What's hot (20)

Top Security Myths Dispelled - AWS Summit Sydney 2018
Top Security Myths Dispelled - AWS Summit Sydney 2018 Top Security Myths Dispelled - AWS Summit Sydney 2018
Top Security Myths Dispelled - AWS Summit Sydney 2018
 
Protected Workloads Security Shakedown
Protected Workloads Security ShakedownProtected Workloads Security Shakedown
Protected Workloads Security Shakedown
 
Cloud Security & Privacy Standard Slide
Cloud Security & Privacy Standard SlideCloud Security & Privacy Standard Slide
Cloud Security & Privacy Standard Slide
 
Cloud Data Security Trends.pdf
Cloud Data Security Trends.pdfCloud Data Security Trends.pdf
Cloud Data Security Trends.pdf
 
Get ahead of cloud network security trends and practices in 2020
Get ahead of cloud network security trends and practices in 2020Get ahead of cloud network security trends and practices in 2020
Get ahead of cloud network security trends and practices in 2020
 
Alert Logic: Realities of Security in the Cloud
Alert Logic: Realities of Security in the CloudAlert Logic: Realities of Security in the Cloud
Alert Logic: Realities of Security in the Cloud
 
Simplify security with Trend Micro's Managed Rules
Simplify security with Trend Micro's Managed RulesSimplify security with Trend Micro's Managed Rules
Simplify security with Trend Micro's Managed Rules
 
Security Spotlight: The Coca Cola Company - CSS ATX 2017
Security Spotlight: The Coca Cola Company - CSS ATX 2017Security Spotlight: The Coca Cola Company - CSS ATX 2017
Security Spotlight: The Coca Cola Company - CSS ATX 2017
 
Introduction to Cloud Security
Introduction to Cloud SecurityIntroduction to Cloud Security
Introduction to Cloud Security
 
Securing Applications in the Cloud
Securing Applications in the CloudSecuring Applications in the Cloud
Securing Applications in the Cloud
 
Saas security stock company
Saas security stock companySaas security stock company
Saas security stock company
 
The Cloud & I, The CISO challenges with Cloud Computing
The Cloud & I, The CISO challenges with Cloud Computing The Cloud & I, The CISO challenges with Cloud Computing
The Cloud & I, The CISO challenges with Cloud Computing
 
C-Level tools for Cloud security
C-Level tools for Cloud securityC-Level tools for Cloud security
C-Level tools for Cloud security
 
2022 Q1 Webinar Securite du Cloud public (1).pdf
2022 Q1 Webinar Securite du Cloud public (1).pdf2022 Q1 Webinar Securite du Cloud public (1).pdf
2022 Q1 Webinar Securite du Cloud public (1).pdf
 
The AWS Shared Security Responsibility Model in Practice
The AWS Shared Security Responsibility Model in PracticeThe AWS Shared Security Responsibility Model in Practice
The AWS Shared Security Responsibility Model in Practice
 
Infosec 2014: Who Is Skybox Security?
Infosec 2014: Who Is Skybox Security? Infosec 2014: Who Is Skybox Security?
Infosec 2014: Who Is Skybox Security?
 
Security in the cloud
Security in the cloudSecurity in the cloud
Security in the cloud
 
EveryCloud_Company_Intro_Piece
EveryCloud_Company_Intro_PieceEveryCloud_Company_Intro_Piece
EveryCloud_Company_Intro_Piece
 
cloud security ppt
cloud security ppt cloud security ppt
cloud security ppt
 
Secure your cloud applications by building solid foundations with enterprise ...
Secure your cloud applications by building solid foundations with enterprise ...Secure your cloud applications by building solid foundations with enterprise ...
Secure your cloud applications by building solid foundations with enterprise ...
 

Similar to Public cloud and the state of security

Demystifying Cloud Security: Lessons Learned for the Public Sector
Demystifying Cloud Security: Lessons Learned for the Public SectorDemystifying Cloud Security: Lessons Learned for the Public Sector
Demystifying Cloud Security: Lessons Learned for the Public SectorAmazon Web Services
 
AWS Cloud Governance & Security through Automation - Atlanta AWS Builders
AWS Cloud Governance & Security through Automation - Atlanta AWS BuildersAWS Cloud Governance & Security through Automation - Atlanta AWS Builders
AWS Cloud Governance & Security through Automation - Atlanta AWS BuildersJames Strong
 
Keys to success and security in the cloud
Keys to success and security in the cloudKeys to success and security in the cloud
Keys to success and security in the cloudScalar Decisions
 
Keys-to-Success-and-Security-in-the-Cloud
Keys-to-Success-and-Security-in-the-CloudKeys-to-Success-and-Security-in-the-Cloud
Keys-to-Success-and-Security-in-the-Cloudpatmisasi
 
#ALSummit: SCOR Velogica's Journey to SOC2/TYPE2 Via AWS
#ALSummit: SCOR Velogica's Journey to SOC2/TYPE2 Via AWS#ALSummit: SCOR Velogica's Journey to SOC2/TYPE2 Via AWS
#ALSummit: SCOR Velogica's Journey to SOC2/TYPE2 Via AWSAlert Logic
 
Security & Compliance in the Cloud
Security & Compliance in the CloudSecurity & Compliance in the Cloud
Security & Compliance in the CloudAmazon Web Services
 
Whitepaper: Security of the Cloud
Whitepaper: Security of the CloudWhitepaper: Security of the Cloud
Whitepaper: Security of the CloudCloudSmartz
 
DeepArmor
DeepArmorDeepArmor
DeepArmorbrand44
 
Executive Security Simulation Workshop (WPS206) - AWS re:Invent 2018
Executive Security Simulation Workshop (WPS206) - AWS re:Invent 2018Executive Security Simulation Workshop (WPS206) - AWS re:Invent 2018
Executive Security Simulation Workshop (WPS206) - AWS re:Invent 2018Amazon Web Services
 
Legal And Regulatory Issues Cloud Computing...V2.0
Legal And Regulatory Issues Cloud Computing...V2.0Legal And Regulatory Issues Cloud Computing...V2.0
Legal And Regulatory Issues Cloud Computing...V2.0David Spinks
 
Cloud Security By Dr. Anton Ravindran
Cloud Security By Dr. Anton RavindranCloud Security By Dr. Anton Ravindran
Cloud Security By Dr. Anton RavindranGSTF
 
Risk management for cloud computing hb final
Risk management for cloud computing hb finalRisk management for cloud computing hb final
Risk management for cloud computing hb finalChristophe Monnier
 
DIY guide to runbooks, incident reports, and incident response
DIY guide to runbooks, incident reports, and incident responseDIY guide to runbooks, incident reports, and incident response
DIY guide to runbooks, incident reports, and incident responseNathan Case
 
ShareResponsibilityModel.pptx
ShareResponsibilityModel.pptxShareResponsibilityModel.pptx
ShareResponsibilityModel.pptxBabatundeAbioye2
 
Cloud security for banks - the central bank of Israel regulations for cloud s...
Cloud security for banks - the central bank of Israel regulations for cloud s...Cloud security for banks - the central bank of Israel regulations for cloud s...
Cloud security for banks - the central bank of Israel regulations for cloud s...Moshe Ferber
 

Similar to Public cloud and the state of security (20)

Demystifying Cloud Security: Lessons Learned for the Public Sector
Demystifying Cloud Security: Lessons Learned for the Public SectorDemystifying Cloud Security: Lessons Learned for the Public Sector
Demystifying Cloud Security: Lessons Learned for the Public Sector
 
Implementing Governance as Code
Implementing Governance as CodeImplementing Governance as Code
Implementing Governance as Code
 
AWS Cloud Governance & Security through Automation - Atlanta AWS Builders
AWS Cloud Governance & Security through Automation - Atlanta AWS BuildersAWS Cloud Governance & Security through Automation - Atlanta AWS Builders
AWS Cloud Governance & Security through Automation - Atlanta AWS Builders
 
Keys to success and security in the cloud
Keys to success and security in the cloudKeys to success and security in the cloud
Keys to success and security in the cloud
 
Keys-to-Success-and-Security-in-the-Cloud
Keys-to-Success-and-Security-in-the-CloudKeys-to-Success-and-Security-in-the-Cloud
Keys-to-Success-and-Security-in-the-Cloud
 
GRC Dynamics in Securing Cloud
GRC Dynamics in Securing CloudGRC Dynamics in Securing Cloud
GRC Dynamics in Securing Cloud
 
#ALSummit: SCOR Velogica's Journey to SOC2/TYPE2 Via AWS
#ALSummit: SCOR Velogica's Journey to SOC2/TYPE2 Via AWS#ALSummit: SCOR Velogica's Journey to SOC2/TYPE2 Via AWS
#ALSummit: SCOR Velogica's Journey to SOC2/TYPE2 Via AWS
 
Cloud services and it security
Cloud services and it securityCloud services and it security
Cloud services and it security
 
Security & Compliance in the Cloud
Security & Compliance in the CloudSecurity & Compliance in the Cloud
Security & Compliance in the Cloud
 
Whitepaper: Security of the Cloud
Whitepaper: Security of the CloudWhitepaper: Security of the Cloud
Whitepaper: Security of the Cloud
 
Security of the Cloud
Security of the CloudSecurity of the Cloud
Security of the Cloud
 
DeepArmor
DeepArmorDeepArmor
DeepArmor
 
Executive Security Simulation Workshop (WPS206) - AWS re:Invent 2018
Executive Security Simulation Workshop (WPS206) - AWS re:Invent 2018Executive Security Simulation Workshop (WPS206) - AWS re:Invent 2018
Executive Security Simulation Workshop (WPS206) - AWS re:Invent 2018
 
Legal And Regulatory Issues Cloud Computing...V2.0
Legal And Regulatory Issues Cloud Computing...V2.0Legal And Regulatory Issues Cloud Computing...V2.0
Legal And Regulatory Issues Cloud Computing...V2.0
 
Cloud Security By Dr. Anton Ravindran
Cloud Security By Dr. Anton RavindranCloud Security By Dr. Anton Ravindran
Cloud Security By Dr. Anton Ravindran
 
Risk management for cloud computing hb final
Risk management for cloud computing hb finalRisk management for cloud computing hb final
Risk management for cloud computing hb final
 
Cloud Computing Security
Cloud Computing SecurityCloud Computing Security
Cloud Computing Security
 
DIY guide to runbooks, incident reports, and incident response
DIY guide to runbooks, incident reports, and incident responseDIY guide to runbooks, incident reports, and incident response
DIY guide to runbooks, incident reports, and incident response
 
ShareResponsibilityModel.pptx
ShareResponsibilityModel.pptxShareResponsibilityModel.pptx
ShareResponsibilityModel.pptx
 
Cloud security for banks - the central bank of Israel regulations for cloud s...
Cloud security for banks - the central bank of Israel regulations for cloud s...Cloud security for banks - the central bank of Israel regulations for cloud s...
Cloud security for banks - the central bank of Israel regulations for cloud s...
 

Recently uploaded

Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 

Recently uploaded (20)

Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 

Public cloud and the state of security

  • 1. Public cloud and the state of security Q4 2017
  • 2. Hello! I am Olivier Schmitt I am here because I love to share knowledge. Check my linkedin profile.
  • 3. Disclaimer ! This slideshow is a brief introduction to a complex topic which is evolving constantly. It is not meant for security professionals but built for those people discovering public cloud. Despite the fact I aimed to be honest and fair, some pieces of information presented here might be incorrect or biased. Please do you own research and always do your homework.
  • 4. A major concern About the fear of losing control ... 1.
  • 5. State of the Cloud report RightScale found in « State of the Cloud report » that security is a major concern for 25% of the respondents. Security, while not the highest concern here, as it was previously, remains in the top 3.
  • 6. Some specific concerns ✘ How does the provider comply consistently to security standards ? ✘ Can the provider access my data ? ✘ How is my data segregated from the access of other customers? ✘ Could the provider share my data with a foreign authority ? ✘ How to enforce SLAs ? ✘ Who is responsible or accountable for what ?
  • 7. The strategy of providers How does the pros tackle the issue ? 2.
  • 8. The race to compliance ✘ Cloud providers are competing in the game « Who complies to anything ?» ✘ Giants are leading the race : AWS, Azure, Google Cloud and, far behind the growing competition.
  • 9. The race to compliance - certifications Source : Olivier Schmitt, Q4 2017
  • 10. The race to compliance – laws, regulations, privacy Source : Olivier Schmitt, Q4 2017
  • 11. Bring in the best people « Cloud computing is often far more secure than traditional computing, because companies like Google and Amazon can attract and retain cyber-security personnel of a higher quality than many governmental agencies » Vivek Kundra, Executive Vice President, Industries, Salesforce.com
  • 12. AWS case study How does the leader do it ? 3.
  • 13. How the leader leads ? AWS owns almost 40% of the market share and is bigger than Azure, IBM and Google combined.
  • 14. A clean model of responsibility ✘ AWS is responsible for protecting the infrastructure that runs all AWS services offered in the AWS Cloud ✘ The customer is reponsible for the resources and services he manages or builds on top of AWS.
  • 15. A clean model of responsibility
  • 16. From the provider perspective ✘ Robust deployment topology : regions (somewhere on earth) and availability zones (≥ 2 active datacenters per region) ✘ Physical and environmental security : fire detection and suppression, power, climate and temperature ✘ Business continuity management : availability, incidence response, company-wide executive review, communication ✘ Network security : secure network architecture, secure access points, transmission protection, Amazon coporate segregation, fault tolerant design ✘ Compliance to standards : SOC, ISO, PCI, ...
  • 17. From the provider perspective – AWS regions
  • 18. From the provider perspective – a proven expertise ✘ A huge customer portfolio : 1 million clients in 190 countries (NASA, CIA, Netflix, General Electric,...) ✘ Amazon.com is build on top of AWS : one of the biggest and most sensitive online services ✘ A proven experience in infrastructure and cloud service developments : ● 44 datacenters in 16 regions worldwide, 17 new datacenters in project stage ● 110+ cloud services : from storage to chat bots, from online gaming to data warehouse
  • 19. Eat your own dog food amazon.com brings the scale and the challenge to push AWS toward excellence, that’s merely a unique position in the market
  • 20. From the customer perspective – AWS and my data ✘ ISO 27018 : some AWS services are certified ✘ European Union’s General Data Protection Regulation : the GDPR framework helps cloud infrastructure providers comply and so avoid penalties while also offering a framework to help customers and end users to select cloud providers and trust their services. AWS services will comply with the GDPR when it becomes enforceable on May 25, 2018.
  • 21. From the customer perspective – dedicated security services ✘ AWS offers a wide variety of security services : AWS Artifact, AWS Certificate Manager, Amazon Cloud Directory, AWS CloudHSM, AWS Directory Service, AWS Identity and Access Management, Amazon Inspector, AWS Key Management Service, AWS Organizations, AWS Shield, AWS WAF … click here. ✘ A rich and easily accessible documentation : white papers, tutorials, technical papers, …click here.
  • 22. From the customer perspective – savy services ✘ Most services offer options related to security ● Data replication between regions ● Configuration management ● Rich encryption features ✘ Services that can support a security policy ● Monitoring ● Logging ● Deep learning to dig and find sensitive data for you ● Deep integration with Identity and Access Management
  • 23. Let’s review some concepts Public cloud providers’ efforts They made a huge effort to comply with security best practices and standards. AWS leads Microsoft made huge progress. Private datacenter at stake Securing a private datacenter is harder and harder since hackers are becoming more sophisticated. See stories like EQUIFAX, Yahoo,British Airline, ... Clean responsibility model A public cloud provider needs to provide clean and coherent RACIs, then each party knows what to do. Customer must play his partition Customers must implement security policies and should not rely on the provider solely.  Logging and monitoring Trust is based on accountability. Customers and providers need to know what’s going on.
  • 25. Special thanks to all the people who made and released these awesome resources for free: ✘ Presentation template by SlidesCarnival ✘ To Wade from Italki Credits