HOW IS CLOUD SECURITY DIFFERENT FROM ON-PREMISE SECURITY

955 views

Published on

HOW IS CLOUD SECURITY DIFFERENT FROM ON-PREMISE SECURITY

Published in: Technology, Business
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
955
On SlideShare
0
From Embeds
0
Number of Embeds
260
Actions
Shares
0
Downloads
42
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

HOW IS CLOUD SECURITY DIFFERENT FROM ON-PREMISE SECURITY

  1. 1. HOW IS CLOUD SECURITYDIFFERENT FROM ON-PREMISE SECURITY http://clean-clouds.com Visit Researcher’s Blog - http://clean-clouds.com
  2. 2. • The typical entry point for the customers to the Cloud will be migration of their existing applications to the Cloud, initially as a proof- of-concept and later in production.• Customer will have the following questions: – How does the migrated application exploit the Performance, Scalability, Robustness models for Public Clouds? – How does the migrated application exploit the Security, Systems and Applications Management models for Public Clouds? Visit Researcher’s Blog - http://clean-clouds.com
  3. 3. The following security measures represent generalbest practice implementations for cloud security.• Implement and maintain a security program.• Implement strong access and identity management.• Ensure confidential data protection.• Build and maintain a secure cloud infrastructure. – Implement N/W security – Implement virtualization security – Ensure physical security Visit Researcher’s Blog - http://clean-clouds.com
  4. 4. Security Concerns for Cloud Computing Visit Researcher’s Blog - http://clean-clouds.com
  5. 5. Security Concerns for Cloud ComputingIdentity and Access Network SecurityManagement • How can I ensure data security in• Who has access? transit? Is data on disk is encrypted?• Can the existing authentication • What are the preventive and detective implementation be ported to cloud? controls for the N/W attacks?• How trust is maintained across cloud OS & Virtualization Security and on premise domain? • What are the measures we need to• How to enable single sign on for consider for virtualization security? applications on cloud and on premise? How is your data and applicationData Security isolated from other customers? Is this a logical isolation or physical isolation?• How CIA is maintained and ensured? • How to protect Host Operating• How key credentials are managed? System?• Do you have the right to audit? • How OS level security like OS• How location related jurisdictional hardening are maintained? requirement is addressed? Visit Researcher’s Blog - http://clean-clouds.com
  6. 6. Security Concerns for Cloud ComputingPhysical Security• What are the DR mechanism in place?• What are the controls applied to secure physical data centre?Application• What is the possibility of availability of an application?• Is there any assurance provided by the CSP? How to make sure that Application code is what it should be? Visit Researcher’s Blog - http://clean-clouds.com
  7. 7. Download with Linkedin Username/Password
  8. 8. Download with Linkedin Username/Password
  9. 9. Download with Linkedin Username/Password
  10. 10. Download with Linkedin Username/Password
  11. 11. Download with Linkedin Username/Password

×