The document discusses cloud security. It notes that cloud security depends on how secure users want their cloud deployment to be. It then covers key aspects of cloud computing like public and private clouds. It asks important questions about security like what needs protection, compliance needs, and identity management. Ensuring the cloud has secure identity, access management, data protection, and logging is discussed. Multi-device access and multi-factor authentication are also covered. The conclusion reminds users to consider these security aspects for various personal and financial services.
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Debashis banerjee cloud_is_as_secure
1. THE CLOUD
IS AS SECURE AS
YOU
WANT IT TO BE
Debashis Banerjee (Yahoo! India)
2. My son’s first
day
at school
Catered Food
on my anniversary party
Money in
my bank
My seat on the
plane
3. Today’s Journey
Refresher to Multi device
the cloud Cloud Security
– Mobiles
OTP, SMS
Ensuring based multi
your cloud is Factor auth
secure
Public, Private
and Hybrid Secure
Cloud Security APIs
Image: FreeDigitalPhotos.net
4. Cloud Computing - Refresher
• Key aspects of using the cloud: Elasticity, On
Demand, Multi Tenancy, Multi Device, Ability to
measure Service
• Type of Clouds - Public Clouds, Private Clouds,
Hybrid Clouds, Community/Partner Clouds
• SaaS , PaaS , IaaS
5. Key questions to ask about Cloud Security?
• What do you need to protect? Who are your users?
• Where does your data live? How does it flow? What
geographies?
• What are your compliance, logging needs?
• Is there SSO and Identity management in place?
• Do you have a mix of physical , virtual, cloud?
• Who pays for security? Who is accountable for what
aspect of security?
• How do you react if a security breach takes place?
6. Ensuring your cloud solution is secure
Identity
Provider Strong Auth
Secure Multi
Ingress and
Data Egress Security Device
In backup Federated SSO Access
Public Cloud Privileged Access
Geo-Political
Multi Tenancy Private Cloud
Considerations
Logging, Secure Data at
Auditing rest, motion
Compliance,
Playback Enterprise
Physical, Virtual
and cloud resources
Wipeout,
Encryption
7. Security in Public Cloud Deployments
• Strong Identity management
• Privileged Account Management
• Place the appropriate type of data in the cloud
• Have access to compliance and logging , auditing
• Being a public cloud ensure you impose where you data
can or cannot travel
• Wipeout policies
• Ensure you are comfortable with the security of multi
tenancy
• Secure keys
8. Security in the Private & Hybrid Cloud
Private:
• Design such that there is scope to move to a hybrid model
• Impose SSO
Hybrid:
• Segregate your data between clouds
• Use SAML and ensure appropriate enterprise credentials are
within the perimeter
• Have your Federation set up correctly. Enable SSO.
• Ensuring enterprise credentials do not travel into the cloud
9. Multi Device Cloud Security – Mobile Phones
• The mobile device as an extension of the Cloud
• Secure Mobile Apps on the cloud.
• On Cloud and On Device virus scanning
• Seamless policies for mobile devices
• Credential life cycle management
• Secure Roaming Users
10. Multi Factor Auth – OTPs, SMS based
Use OTPs effectively to protect your data access to
the cloud
GoldKey
Multi Factor Auth – AWS/Gemalto
2 Factor Auth using SMS
Image: http://commons.wikimedia.org/wiki/File:RSA-SecurID-Tokens.jpg
11. Some APIs useful in cloud security
• Safe Browsing API
• VM Safe APIs
12. In Conclusion
• Cloud Security is critical to succeed in the cloud
• Choose Private / Public / Hybrid cloud & SaaS /
PaaS / IaaS
• Identity & Privileged User Management
• Compliance, Certification and Logging
• Consider Multi Device Scenarios
• Use Strong Authentication
13. Remember your questions about security to
1. Your child’s school
2. Your anniversary party caterers
3. Your airline
4. Your bank
And you won’t go
wrong with
the Cloud Security !!!!
Image: FreeDigitalPhotos.net