SlideShare a Scribd company logo
1 of 16
Download to read offline
Square10 Solutions LLCConfidential
Cloud Security.
Understand the Technical to Enable
Business Decisions
ILTA – New York City
1
Presenters
2
John LaVigne, a Systems Engineer for Fortinet, has over
15 years of experience in the network field. His focus today
is on network security solutions for customers. John has
previously worked in a number of project delivery roles in
networking, security and messaging.
Nick Sandone is a System Architect with Square10
Solutions. His areas of expertise include network design
and optimization, advanced threat protection, enterprise
monitoring, and securing cloud and hybrid networks. Nick
has diverse experience having worked in industries ranging
from legal, engineering and healthcare to cloud-based
supply chain management.
Patrick Sklodowski, a Principal with Square10 Solutions,
is a proven technology professional with over two decades
of expertise. He works with clients to provide solutions
focused on strategic delivery and the alignment of
technology with business requirements. His areas of
specialty include system architecture, delivery of cloud
solutions, messaging, technical project management,
disaster recovery and complex migrations.
Cloud Security = Shared Responsibility
3
• Know Your Role and Responsibilities!
• Responsibility dependent on:
• Type of service
• Delivery model
• Service provider
Courtesy of AWS
Today’s Focus
4Courtesy of Microsoft
Physical Security
5
• Not “our” problem!
Host Infrastructure
6
• Secure the virtual device like it’s
“within your walls”
• AV & threat protection
• Patching
• Application updates
• Host encryption
Network Controls
7
• What can we expect from CSP?
• Provide the infrastructure
• Protect their infrastructure
• Basic built-in tools for customer
Network Controls
8
• CSP Provides
• Virtual Networking
• Load Balancing
• DNS
• Gateway
• VPN
• Network Security Groups (group of ACLs)
• Basic NAT or PAT
• Basic port open port closed
• Logical Network Segmentation
Network Controls
9
• Customer Responsibility
• Next Generation Firewall (NGFW)
• Web Application Firewall (WAF)
• Route all traffic through NGFW
• Access Management
• Consider 2FA
• Interrogate/Inspect traffic
• AV/Malware/IPS/DLP
• Log and monitor traffic
• Encrypt traffic
Application Level Controls
10
• Infrastructure as a Service (IaaS)
• We install the applications, we must
security them!
• Platform as a Service (PaaS)
• SQL
• Web Services
• PaaS protection through
• Application level “firewall” settings
• Identity management
• SAML
• Azure Active Directory
“Because you’re building systems on top of the AWS
cloud infrastructure, the security responsibilities will
be shared: AWS manages the underlying
infrastructure, and you secure anything you put on
the infrastructure or connect to the infrastructure.”
- Amazon Web Services
“Sharing the Security Services”
Identity & Access Management
11
• Access and authorization
• Identity protection
• Service management through user access
• Tools
• Multi Factor Authentication
• Same sign on / Single sign on
• Identity providers / SAML
• Roles
• Auditing and alerting
• Conditional access
Single Sign On and Identity Management
12
• More password = less secure passwords
• Identity providers – OKTA, Duo,
Microsoft, OneLogin
• Regardless of Identity Solution
• Every business needs to be setup in
Microsoft Azure Active Directory
• Most businesses should be federated
with Azure Active Directory
• Enables
• Windows Store for Business
• Identity management
• Keeps users away from consumer
accounts!
Client & End-point Protection
13
• End-points are always our responsibility
• How end point connects determines risk
• PaaS is probably connected to my network
• IaaS same risks as on-prem
• SaaS more likely app or browser based
devices won’t directly access systems
• Device has access to data flowing through it!
• Advanced threat protection
• Microsoft Defender and Intune
• Cylance
• Carbon Black
Data Classification & Accountability
14
• Compliance obligations
• Distinguish - and potentially secure - sensitive
data
• SaaS - capabilities aren’t meaningful without
classification – Digital Loss Prevention
• PaaS & IaaS – Data management fully your
responsibility
• Backups
• Encryption
Resources
15
• Data Classification for Cloud Computing
• http://aka.ms/dataclassificationforcloud
• The ABC’s of the Share Responsibility Model
• https://www.trendmicro.com/aws/aws-shared-security-model/
• Microsoft Incident Response and shared responsibility for cloud computing
• https://azure.microsoft.com/en-us/blog/microsoft-incident-response-and-shared-responsibility-for-cloud-computing/
• What Does Shared Responsibility in the Cloud Mean
• https://blogs.msdn.microsoft.com/azuresecurity/2016/04/18/what-does-shared-responsibility-in-the-cloud-mean/
• Shared Responsibility Model
• https://aws.amazon.com/compliance/shared-responsibility-model/
• Everything you need to know about Microsoft Azure security
• https://channel9.msdn.com/Events/Ignite/Microsoft-Ignite-Orlando-2017/BRK2210
16

More Related Content

What's hot

Migrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Migrating Critical Applications To The Cloud - ISACA Seattle - SanitizedMigrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Migrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Norm Barber
 
Security concerns with SaaS layer of cloud computing
Security concerns with SaaS layer of cloud computingSecurity concerns with SaaS layer of cloud computing
Security concerns with SaaS layer of cloud computing
Clinton DSouza
 

What's hot (20)

Cloud security for banks - the central bank of Israel regulations for cloud s...
Cloud security for banks - the central bank of Israel regulations for cloud s...Cloud security for banks - the central bank of Israel regulations for cloud s...
Cloud security for banks - the central bank of Israel regulations for cloud s...
 
The Notorious 9 Cloud Computing Threats - CSA Congress, San Jose
The Notorious 9 Cloud Computing Threats -  CSA Congress, San JoseThe Notorious 9 Cloud Computing Threats -  CSA Congress, San Jose
The Notorious 9 Cloud Computing Threats - CSA Congress, San Jose
 
Surviving the lions den - how to sell SaaS services to security oriented cust...
Surviving the lions den - how to sell SaaS services to security oriented cust...Surviving the lions den - how to sell SaaS services to security oriented cust...
Surviving the lions den - how to sell SaaS services to security oriented cust...
 
Transforming cloud security into an advantage
Transforming cloud security into an advantageTransforming cloud security into an advantage
Transforming cloud security into an advantage
 
Cloud security
Cloud securityCloud security
Cloud security
 
Robert Brzezinski - Office 365 Security & Compliance: Cloudy Collaboration......
Robert Brzezinski - Office 365 Security & Compliance: Cloudy Collaboration......Robert Brzezinski - Office 365 Security & Compliance: Cloudy Collaboration......
Robert Brzezinski - Office 365 Security & Compliance: Cloudy Collaboration......
 
Cloud Security Demystified
Cloud Security DemystifiedCloud Security Demystified
Cloud Security Demystified
 
The Top Cloud Security Issues
The Top Cloud Security IssuesThe Top Cloud Security Issues
The Top Cloud Security Issues
 
Security for cloud native workloads
Security for cloud native workloadsSecurity for cloud native workloads
Security for cloud native workloads
 
The Cloud & I, The CISO challenges with Cloud Computing
The Cloud & I, The CISO challenges with Cloud Computing The Cloud & I, The CISO challenges with Cloud Computing
The Cloud & I, The CISO challenges with Cloud Computing
 
Migrating Critical Applications to the Cloud - isaca seattle - sanitized
Migrating Critical Applications to the Cloud - isaca seattle - sanitizedMigrating Critical Applications to the Cloud - isaca seattle - sanitized
Migrating Critical Applications to the Cloud - isaca seattle - sanitized
 
Migrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Migrating Critical Applications To The Cloud - ISACA Seattle - SanitizedMigrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Migrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
 
CSA SV Threat detection and prediction
CSA SV Threat detection and predictionCSA SV Threat detection and prediction
CSA SV Threat detection and prediction
 
cloud security ppt
cloud security ppt cloud security ppt
cloud security ppt
 
What the auditor need to know about cloud computing
What the auditor need to know about cloud computingWhat the auditor need to know about cloud computing
What the auditor need to know about cloud computing
 
Defcon23 from zero to secure in 1 minute - nir valtman and moshe ferber
Defcon23   from zero to secure in 1 minute - nir valtman and moshe ferberDefcon23   from zero to secure in 1 minute - nir valtman and moshe ferber
Defcon23 from zero to secure in 1 minute - nir valtman and moshe ferber
 
Tour to Azure Security Center
Tour to Azure Security CenterTour to Azure Security Center
Tour to Azure Security Center
 
Security concerns with SaaS layer of cloud computing
Security concerns with SaaS layer of cloud computingSecurity concerns with SaaS layer of cloud computing
Security concerns with SaaS layer of cloud computing
 
Securing virtual workload and cloud
Securing virtual workload and cloudSecuring virtual workload and cloud
Securing virtual workload and cloud
 
ZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORK
ZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORKZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORK
ZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORK
 

Similar to The Share Responsibility Model of Cloud Computing - ILTA NYC

Enterprise Security in Cloud
Enterprise Security in CloudEnterprise Security in Cloud
Enterprise Security in Cloud
Lenin Aboagye
 

Similar to The Share Responsibility Model of Cloud Computing - ILTA NYC (20)

Azure 101: Shared responsibility in the Azure Cloud
Azure 101: Shared responsibility in the Azure CloudAzure 101: Shared responsibility in the Azure Cloud
Azure 101: Shared responsibility in the Azure Cloud
 
Trusted Environment. Blockchain for business: best practices, experience, tips
Trusted Environment. Blockchain for business: best practices, experience, tipsTrusted Environment. Blockchain for business: best practices, experience, tips
Trusted Environment. Blockchain for business: best practices, experience, tips
 
Chap 6 cloud security
Chap 6 cloud securityChap 6 cloud security
Chap 6 cloud security
 
Managed security services
Managed security servicesManaged security services
Managed security services
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
 
Rik Ferguson
Rik FergusonRik Ferguson
Rik Ferguson
 
Enterprise Security in Cloud
Enterprise Security in CloudEnterprise Security in Cloud
Enterprise Security in Cloud
 
Enterprise Security in Hybrid Cloud ISACA-SV 2012
Enterprise Security in Hybrid Cloud ISACA-SV 2012Enterprise Security in Hybrid Cloud ISACA-SV 2012
Enterprise Security in Hybrid Cloud ISACA-SV 2012
 
talk6securingcloudamarprusty-191030091632.pptx
talk6securingcloudamarprusty-191030091632.pptxtalk6securingcloudamarprusty-191030091632.pptx
talk6securingcloudamarprusty-191030091632.pptx
 
AWS Partner Webcast - Web App Security on AWS: How to Make Shared Security Wo...
AWS Partner Webcast - Web App Security on AWS: How to Make Shared Security Wo...AWS Partner Webcast - Web App Security on AWS: How to Make Shared Security Wo...
AWS Partner Webcast - Web App Security on AWS: How to Make Shared Security Wo...
 
Presd1 10
Presd1 10Presd1 10
Presd1 10
 
Outpost24 webinar - Mastering the art of multicloud security
Outpost24 webinar - Mastering the art of multicloud securityOutpost24 webinar - Mastering the art of multicloud security
Outpost24 webinar - Mastering the art of multicloud security
 
Shared responsibility - a model for good cloud security
Shared responsibility - a model for good cloud securityShared responsibility - a model for good cloud security
Shared responsibility - a model for good cloud security
 
Maturing Your Organization from DevOps to DevSecOps
Maturing Your Organization from DevOps to DevSecOpsMaturing Your Organization from DevOps to DevSecOps
Maturing Your Organization from DevOps to DevSecOps
 
Maturing your organization from DevOps to DevSecOps
Maturing your organization from DevOps to DevSecOpsMaturing your organization from DevOps to DevSecOps
Maturing your organization from DevOps to DevSecOps
 
Shared responsibility - a model for good cloud security
Shared responsibility - a model for good cloud securityShared responsibility - a model for good cloud security
Shared responsibility - a model for good cloud security
 
Session Sponsored by Trend Micro: 3 Secrets to Becoming a Cloud Security Supe...
Session Sponsored by Trend Micro: 3 Secrets to Becoming a Cloud Security Supe...Session Sponsored by Trend Micro: 3 Secrets to Becoming a Cloud Security Supe...
Session Sponsored by Trend Micro: 3 Secrets to Becoming a Cloud Security Supe...
 
AWS Summit Auckland Platinum Sponsor presentation - Trend Micro
AWS Summit Auckland Platinum Sponsor presentation - Trend MicroAWS Summit Auckland Platinum Sponsor presentation - Trend Micro
AWS Summit Auckland Platinum Sponsor presentation - Trend Micro
 
5787355.ppt
5787355.ppt5787355.ppt
5787355.ppt
 

Recently uploaded

Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Recently uploaded (20)

Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDM
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 

The Share Responsibility Model of Cloud Computing - ILTA NYC

  • 1. Square10 Solutions LLCConfidential Cloud Security. Understand the Technical to Enable Business Decisions ILTA – New York City 1
  • 2. Presenters 2 John LaVigne, a Systems Engineer for Fortinet, has over 15 years of experience in the network field. His focus today is on network security solutions for customers. John has previously worked in a number of project delivery roles in networking, security and messaging. Nick Sandone is a System Architect with Square10 Solutions. His areas of expertise include network design and optimization, advanced threat protection, enterprise monitoring, and securing cloud and hybrid networks. Nick has diverse experience having worked in industries ranging from legal, engineering and healthcare to cloud-based supply chain management. Patrick Sklodowski, a Principal with Square10 Solutions, is a proven technology professional with over two decades of expertise. He works with clients to provide solutions focused on strategic delivery and the alignment of technology with business requirements. His areas of specialty include system architecture, delivery of cloud solutions, messaging, technical project management, disaster recovery and complex migrations.
  • 3. Cloud Security = Shared Responsibility 3 • Know Your Role and Responsibilities! • Responsibility dependent on: • Type of service • Delivery model • Service provider Courtesy of AWS
  • 5. Physical Security 5 • Not “our” problem!
  • 6. Host Infrastructure 6 • Secure the virtual device like it’s “within your walls” • AV & threat protection • Patching • Application updates • Host encryption
  • 7. Network Controls 7 • What can we expect from CSP? • Provide the infrastructure • Protect their infrastructure • Basic built-in tools for customer
  • 8. Network Controls 8 • CSP Provides • Virtual Networking • Load Balancing • DNS • Gateway • VPN • Network Security Groups (group of ACLs) • Basic NAT or PAT • Basic port open port closed • Logical Network Segmentation
  • 9. Network Controls 9 • Customer Responsibility • Next Generation Firewall (NGFW) • Web Application Firewall (WAF) • Route all traffic through NGFW • Access Management • Consider 2FA • Interrogate/Inspect traffic • AV/Malware/IPS/DLP • Log and monitor traffic • Encrypt traffic
  • 10. Application Level Controls 10 • Infrastructure as a Service (IaaS) • We install the applications, we must security them! • Platform as a Service (PaaS) • SQL • Web Services • PaaS protection through • Application level “firewall” settings • Identity management • SAML • Azure Active Directory “Because you’re building systems on top of the AWS cloud infrastructure, the security responsibilities will be shared: AWS manages the underlying infrastructure, and you secure anything you put on the infrastructure or connect to the infrastructure.” - Amazon Web Services “Sharing the Security Services”
  • 11. Identity & Access Management 11 • Access and authorization • Identity protection • Service management through user access • Tools • Multi Factor Authentication • Same sign on / Single sign on • Identity providers / SAML • Roles • Auditing and alerting • Conditional access
  • 12. Single Sign On and Identity Management 12 • More password = less secure passwords • Identity providers – OKTA, Duo, Microsoft, OneLogin • Regardless of Identity Solution • Every business needs to be setup in Microsoft Azure Active Directory • Most businesses should be federated with Azure Active Directory • Enables • Windows Store for Business • Identity management • Keeps users away from consumer accounts!
  • 13. Client & End-point Protection 13 • End-points are always our responsibility • How end point connects determines risk • PaaS is probably connected to my network • IaaS same risks as on-prem • SaaS more likely app or browser based devices won’t directly access systems • Device has access to data flowing through it! • Advanced threat protection • Microsoft Defender and Intune • Cylance • Carbon Black
  • 14. Data Classification & Accountability 14 • Compliance obligations • Distinguish - and potentially secure - sensitive data • SaaS - capabilities aren’t meaningful without classification – Digital Loss Prevention • PaaS & IaaS – Data management fully your responsibility • Backups • Encryption
  • 15. Resources 15 • Data Classification for Cloud Computing • http://aka.ms/dataclassificationforcloud • The ABC’s of the Share Responsibility Model • https://www.trendmicro.com/aws/aws-shared-security-model/ • Microsoft Incident Response and shared responsibility for cloud computing • https://azure.microsoft.com/en-us/blog/microsoft-incident-response-and-shared-responsibility-for-cloud-computing/ • What Does Shared Responsibility in the Cloud Mean • https://blogs.msdn.microsoft.com/azuresecurity/2016/04/18/what-does-shared-responsibility-in-the-cloud-mean/ • Shared Responsibility Model • https://aws.amazon.com/compliance/shared-responsibility-model/ • Everything you need to know about Microsoft Azure security • https://channel9.msdn.com/Events/Ignite/Microsoft-Ignite-Orlando-2017/BRK2210
  • 16. 16