SlideShare a Scribd company logo
1 of 6
Mark Skilton, Director, Strategy Office, Global Infrastructure Services
Co-Chair, Cloud Computing Work Group, The Open Group
Member, ISO JC38 UK Mirror
+44 7787 692197
mark.skilton@capgemini.com
Twitter @mskilton
http://uk.linkedin.com/pub/mark-skilton/1/189/968
“Identity, Privacy, and Data Protection in the
Cloud – What is Being Done? Is it Enough?”
| Capgemini & Cloud
Trust and Risk Trade-off
 In the Cloud everything is perceived as untrusted and insecure
 Many enterprises have company policies requiring data and access to be stored
behind the Corporate firewall; transport between geographies are not allowed
 Industrial certifications require physical isolation, audit and authentication
processes
Trust ?
Internal
Private
Hybrid
Public
Physical
Resources/
locations Edge
Span
of
Insource
&
Outsource
Span of Technology
| Capgemini & Cloud
What’s being done to Secure Cloud……..
Move data
between
SQL and
nonSQL
databases
DBMS Server
Legal Issues
IP Patent Law –
Independence
of software on
device and OS
Bundling
Legal
Definition of
an API e.g.
Google API,
MSFT API
US / EU
Patriot,
SafeHarbor,
DA rules
Cultural Impact
Provisioning
Policy
Management
Amazon gets
FISMA
certification
EU Open
Data
portal
Open Data
standards
W3C
EU inter-
country data
Use of
Public APIs
e.g. Google+
Twitter APIs
Use of APIs/
personal
Data
Protection
TLS, SSL
Transport
Layer end to
end Pass
through
Threats
Hypervisor IOP
e.g. Citrix and
AWS
Device IOP
e.g. User
Experience
and UI e.g.
Ipad ,
Samsung
e.g.
Microsoft
OS 8 – tablet
IOP
EU announce
common Data
Portal
Vertical Sector
B2B Schemas
Vendor
Technology
Standards
seeking
Openness e.g.
DMTF, ODCA,
OMG CCSC
Illustrative
ISA Chip
standards
Database Scalability & Portability
Hypervisor Portability
& Hypervisor Interoperating
Hybrid
Device from service abstraction
Government led
Legal certifications
Vertical industry Government
led Standard schemas
Network transport issues
Choices , NSPs, ISPs
API openness and ownership
Multi-form factor supportability
Apps, content stores access
Personal/vendor Portability
Market / Region
Provider / Entity
Network
API / Gateway /
Portal
Device / Browser
OS
Server
Storage
Software
Application
Data / Payload
Hypervisor
Business Process
DC Hosting
Public Cloud
Hosted
Private Cloud
Hosted
Open Source
Cloud Hosted
Legal &
Security
Industry
Nomenclatures
Deployment strategies
Common Industry standards
Vertical Industry standards
e.g. Oracle, IBM e.g. Amazon &
Others
e.g. open nebula
TechnologyandBusinesstiers
Provisioning Policies
Inter-country data exchange
Multi-form factor data portability
Service IP component bundling
Application environment
Portability
Storage as a
Service
Compute as a Service
Applications as a Service
Desktop as a
Service Big Data as a
Service
Move
application
OpenStack,
CloudStack Shifts
B2B / B2C
Platforms
Device
Store Services
Social Networks,
C2C
Policy Areas
The Open Group – Cloud Computing Interoperability
Portability Project 2012
Examples of some Legal activity in last 12-24 months EU announce
Data Privacy
Controls
| Capgemini & Cloud
How can we get control of Identity, Privacy, and Data
Protection in the Cloud ?
Extensible Boundaries
From Introduction to CIEL – CILE Project – an Open Group project
Work in Progress
Copyright SyntheticSpheres 2012
Identity – Is this controlled
by User Device or
By You in your Cloud Server
or a Proxy Service e.g. OpenID ?
Privacy – What Boundary Conditions
are acceptable to you?
Do you want Closed , Secure Cloud?
Do you want Distributed Secure Cloud?
Do you want Regional/Local Controls
do you want guarantees
What Legal Jurisdiction do you follow?
Data Protection –
Data at Rest – Encryption, IP Control
Data in Transit – Encryption, Monitoring
Data Age – Archive and Audit Control
What Legal Jurisdiction do you follow?
Provider
Consumer
Policy
Management
Boundary
Policy
Management
Legal
Contract
Back to
Back
control
| Capgemini & Cloud
“It is impossible for a distributed computer system to simultaneously
provide all three of the following guarantees: Consistency,
Availability and Partitioning Tolerance”.
Consistency
Availability
Partition Tolerance
GuaranteedC
A
P
Effectiveness
Fidelity
G
P
F
Consistency
Availability Partitioning
Tolerance
Guaranteed
FidelityPerformance
(Reference: Brewer Conjecture 2000, Gilbert, Lynch Formal Proof 2002)
“Brewer’s Conjecture and the feasibility of consistent, available, partition-tolerant web services”
http://lpd.epfl.ch/sgilbert/pubs/BrewersConjecture-SigAct.pdf ACM SIGACT News, Vol 33 Issue 2 (2002) pg 51-59
Brewers Theorem
| Capgemini & Cloud
The Case for Service Orchestration -
managing your Security and Risk
 Consistency and Guarantees
• Strong Multi-Systems Management – Single Accountabilities
• Control Failure Points in system – Strong Identity, Encryption Policies and Tools to manage Usage and Audit Compliance.
 Availability and Effectiveness
• Multi-Source – open technology capabilities
• Business Process Orchestration – Drive Business Performance Outcomes Metrics
 Partition Tolerance and Fidelity
• Introduce and manage disciplined portfolio of IT and Business assets inside and outside the organization in a way that best
serves the needs of consumers and providers. Govern Configuration
• Preserve your elasticity - within “acceptable conditions of use” – know the tolerance levels that are within the distributed
system.
Consistency
Availability
Partition
Tolerance
GuaranteedC
A
P
Effectiveness
Fidelity
G
P
F
Management
Orchestration
Resource
Management
Template
Contiguity
Source
Access
Systems
Management
Process
Orchestration

More Related Content

What's hot

Digital demand - the challenges of being a CIO in the UK HE sector, by John C...
Digital demand - the challenges of being a CIO in the UK HE sector, by John C...Digital demand - the challenges of being a CIO in the UK HE sector, by John C...
Digital demand - the challenges of being a CIO in the UK HE sector, by John C...
Jisc
 

What's hot (20)

Ciphercloud Solutions Overview hsa oct2011
Ciphercloud Solutions Overview hsa oct2011Ciphercloud Solutions Overview hsa oct2011
Ciphercloud Solutions Overview hsa oct2011
 
What changes for Internet of Things technologies with the EU Data Protection ...
What changes for Internet of Things technologies with the EU Data Protection ...What changes for Internet of Things technologies with the EU Data Protection ...
What changes for Internet of Things technologies with the EU Data Protection ...
 
NSTIC Panel on Mobile-based Identity and Access Management
NSTIC Panel on Mobile-based Identity and Access ManagementNSTIC Panel on Mobile-based Identity and Access Management
NSTIC Panel on Mobile-based Identity and Access Management
 
GDPR is coming in Hot. Top Burning Questions Answered to Help You Keep Your C...
GDPR is coming in Hot. Top Burning Questions Answered to Help You Keep Your C...GDPR is coming in Hot. Top Burning Questions Answered to Help You Keep Your C...
GDPR is coming in Hot. Top Burning Questions Answered to Help You Keep Your C...
 
Security On The Edge - A New Way To Think About Securing the Internet of Things
Security On The Edge -  A New Way To Think About Securing the Internet of ThingsSecurity On The Edge -  A New Way To Think About Securing the Internet of Things
Security On The Edge - A New Way To Think About Securing the Internet of Things
 
Smart City Lecture 4 - Harmonizing the Internet of Things
Smart City Lecture 4 - Harmonizing the Internet of ThingsSmart City Lecture 4 - Harmonizing the Internet of Things
Smart City Lecture 4 - Harmonizing the Internet of Things
 
Digital demand - the challenges of being a CIO in the UK HE sector, by John C...
Digital demand - the challenges of being a CIO in the UK HE sector, by John C...Digital demand - the challenges of being a CIO in the UK HE sector, by John C...
Digital demand - the challenges of being a CIO in the UK HE sector, by John C...
 
Guardtime Names Jeffrey Pearce Director of Intellectual Property
Guardtime Names Jeffrey Pearce Director of Intellectual PropertyGuardtime Names Jeffrey Pearce Director of Intellectual Property
Guardtime Names Jeffrey Pearce Director of Intellectual Property
 
Data Portability & Application Portability - Cloud Security Expo 2017
Data Portability & Application Portability - Cloud Security Expo 2017Data Portability & Application Portability - Cloud Security Expo 2017
Data Portability & Application Portability - Cloud Security Expo 2017
 
ForgeRock Open Identity Stack Summit - Kick-off by Mike Ellis
ForgeRock Open Identity Stack Summit - Kick-off by Mike EllisForgeRock Open Identity Stack Summit - Kick-off by Mike Ellis
ForgeRock Open Identity Stack Summit - Kick-off by Mike Ellis
 
2015 Identity Summit - CTO Innovation Center
2015 Identity Summit - CTO Innovation Center2015 Identity Summit - CTO Innovation Center
2015 Identity Summit - CTO Innovation Center
 
Keith prabhu cloud security-public
Keith prabhu cloud security-publicKeith prabhu cloud security-public
Keith prabhu cloud security-public
 
Cloud Security in SaaS Era 2020
Cloud Security in SaaS Era 2020Cloud Security in SaaS Era 2020
Cloud Security in SaaS Era 2020
 
2015 Identity Summit - Stepping Up to New Data Protection Challenges
2015 Identity Summit - Stepping Up to New Data Protection Challenges2015 Identity Summit - Stepping Up to New Data Protection Challenges
2015 Identity Summit - Stepping Up to New Data Protection Challenges
 
Internet of Everything: The CIO's Point of View
Internet of Everything:  The CIO's Point of ViewInternet of Everything:  The CIO's Point of View
Internet of Everything: The CIO's Point of View
 
Ericsson Technology Review: Tackling IoT complexity with machine intelligence
Ericsson Technology Review: Tackling IoT complexity with machine intelligenceEricsson Technology Review: Tackling IoT complexity with machine intelligence
Ericsson Technology Review: Tackling IoT complexity with machine intelligence
 
5G and edge computing - CORAL perspective
5G and edge computing - CORAL perspective5G and edge computing - CORAL perspective
5G and edge computing - CORAL perspective
 
Arkibiz Partners with GuardTime to Provide Auditable E-Documents and Records ...
Arkibiz Partners with GuardTime to Provide Auditable E-Documents and Records ...Arkibiz Partners with GuardTime to Provide Auditable E-Documents and Records ...
Arkibiz Partners with GuardTime to Provide Auditable E-Documents and Records ...
 
IoT Security
IoT SecurityIoT Security
IoT Security
 
Trust in the Digital Single Market - Cloud Expo 2017
Trust in the Digital Single Market - Cloud Expo 2017Trust in the Digital Single Market - Cloud Expo 2017
Trust in the Digital Single Market - Cloud Expo 2017
 

Viewers also liked

Felipe calderón promulga ley de ap ps
Felipe calderón promulga ley de ap psFelipe calderón promulga ley de ap ps
Felipe calderón promulga ley de ap ps
diana_escalante
 
Lesson one chords
Lesson one   chordsLesson one   chords
Lesson one chords
becclehead
 
The connected economy mark skilton july 15 bright talk v2
The connected economy mark skilton july 15   bright talk v2The connected economy mark skilton july 15   bright talk v2
The connected economy mark skilton july 15 bright talk v2
Mark Skilton
 

Viewers also liked (12)

Building a digital enterprise – some practitoner views M.Skilton may 2015 v2
Building a digital enterprise – some practitoner views M.Skilton may 2015 v2Building a digital enterprise – some practitoner views M.Skilton may 2015 v2
Building a digital enterprise – some practitoner views M.Skilton may 2015 v2
 
Infosecurity magazine webinar v2
Infosecurity magazine webinar v2Infosecurity magazine webinar v2
Infosecurity magazine webinar v2
 
Privacy in the Age of Big Data: Exploring the Role of Modern Identity Managem...
Privacy in the Age of Big Data: Exploring the Role of Modern Identity Managem...Privacy in the Age of Big Data: Exploring the Role of Modern Identity Managem...
Privacy in the Age of Big Data: Exploring the Role of Modern Identity Managem...
 
Managing Identity from the Cloud: Transformation Advantages at VantisLife Ins...
Managing Identity from the Cloud: Transformation Advantages at VantisLife Ins...Managing Identity from the Cloud: Transformation Advantages at VantisLife Ins...
Managing Identity from the Cloud: Transformation Advantages at VantisLife Ins...
 
Swedbank företagspresentation, september, 2010
Swedbank företagspresentation, september, 2010Swedbank företagspresentation, september, 2010
Swedbank företagspresentation, september, 2010
 
Felipe calderón promulga ley de ap ps
Felipe calderón promulga ley de ap psFelipe calderón promulga ley de ap ps
Felipe calderón promulga ley de ap ps
 
Lesson one chords
Lesson one   chordsLesson one   chords
Lesson one chords
 
May cover story - Disruptions for Growth
May cover story - Disruptions for GrowthMay cover story - Disruptions for Growth
May cover story - Disruptions for Growth
 
Role of data integration in enabling your digital business march 18 12 noon v1
Role of data integration in enabling your digital business march 18 12 noon v1Role of data integration in enabling your digital business march 18 12 noon v1
Role of data integration in enabling your digital business march 18 12 noon v1
 
Hyundai veracruz e_brochure
Hyundai veracruz e_brochureHyundai veracruz e_brochure
Hyundai veracruz e_brochure
 
Build the digital enterprise mark skilton copyright 2014 v1
Build the digital enterprise mark skilton copyright 2014 v1Build the digital enterprise mark skilton copyright 2014 v1
Build the digital enterprise mark skilton copyright 2014 v1
 
The connected economy mark skilton july 15 bright talk v2
The connected economy mark skilton july 15   bright talk v2The connected economy mark skilton july 15   bright talk v2
The connected economy mark skilton july 15 bright talk v2
 

Similar to Identity privacy and data protection in the cloud – what is being done is it enough goal capgemini m skilton v1

Legal And Regulatory Issues Cloud Computing...V2.0
Legal And Regulatory Issues Cloud Computing...V2.0Legal And Regulatory Issues Cloud Computing...V2.0
Legal And Regulatory Issues Cloud Computing...V2.0
David Spinks
 
IT 833 INFORMATION GOVERNANCEDr. Isaac T. GbenleChapte
IT 833 INFORMATION GOVERNANCEDr. Isaac T. GbenleChapteIT 833 INFORMATION GOVERNANCEDr. Isaac T. GbenleChapte
IT 833 INFORMATION GOVERNANCEDr. Isaac T. GbenleChapte
mariuse18nolet
 
IT 833 INFORMATION GOVERNANCEDr. Isaac T. GbenleChapte.docx
IT 833 INFORMATION GOVERNANCEDr. Isaac T. GbenleChapte.docxIT 833 INFORMATION GOVERNANCEDr. Isaac T. GbenleChapte.docx
IT 833 INFORMATION GOVERNANCEDr. Isaac T. GbenleChapte.docx
vrickens
 
How Secure Is Cloud
How Secure Is CloudHow Secure Is Cloud
How Secure Is Cloud
William Lam
 
Cw13 cloud computing & big data by ahmed aamer
Cw13 cloud computing & big data by ahmed aamerCw13 cloud computing & big data by ahmed aamer
Cw13 cloud computing & big data by ahmed aamer
inevitablecloud
 

Similar to Identity privacy and data protection in the cloud – what is being done is it enough goal capgemini m skilton v1 (20)

Presentation cloud security the grand challenge
Presentation   cloud security the grand challengePresentation   cloud security the grand challenge
Presentation cloud security the grand challenge
 
Unlock the potential of data security 2020
Unlock the potential of data security 2020Unlock the potential of data security 2020
Unlock the potential of data security 2020
 
Legal And Regulatory Issues Cloud Computing...V2.0
Legal And Regulatory Issues Cloud Computing...V2.0Legal And Regulatory Issues Cloud Computing...V2.0
Legal And Regulatory Issues Cloud Computing...V2.0
 
Tech equity - Cloud presentation
Tech equity - Cloud presentationTech equity - Cloud presentation
Tech equity - Cloud presentation
 
Losing Control to the Cloud
Losing Control to the CloudLosing Control to the Cloud
Losing Control to the Cloud
 
Whitepaper: Security of the Cloud
Whitepaper: Security of the CloudWhitepaper: Security of the Cloud
Whitepaper: Security of the Cloud
 
Security of the Cloud
Security of the CloudSecurity of the Cloud
Security of the Cloud
 
Cloud Security By Dr. Anton Ravindran
Cloud Security By Dr. Anton RavindranCloud Security By Dr. Anton Ravindran
Cloud Security By Dr. Anton Ravindran
 
IT 833 INFORMATION GOVERNANCEDr. Isaac T. GbenleChapte
IT 833 INFORMATION GOVERNANCEDr. Isaac T. GbenleChapteIT 833 INFORMATION GOVERNANCEDr. Isaac T. GbenleChapte
IT 833 INFORMATION GOVERNANCEDr. Isaac T. GbenleChapte
 
IT 833 INFORMATION GOVERNANCEDr. Isaac T. GbenleChapte.docx
IT 833 INFORMATION GOVERNANCEDr. Isaac T. GbenleChapte.docxIT 833 INFORMATION GOVERNANCEDr. Isaac T. GbenleChapte.docx
IT 833 INFORMATION GOVERNANCEDr. Isaac T. GbenleChapte.docx
 
Cloud computing-security-issues
Cloud computing-security-issuesCloud computing-security-issues
Cloud computing-security-issues
 
Cloud services and it security
Cloud services and it securityCloud services and it security
Cloud services and it security
 
EMEA10: Trepidation in Moving to the Cloud
EMEA10: Trepidation in Moving to the CloudEMEA10: Trepidation in Moving to the Cloud
EMEA10: Trepidation in Moving to the Cloud
 
ISACA Cloud Computing Risks
ISACA Cloud Computing RisksISACA Cloud Computing Risks
ISACA Cloud Computing Risks
 
How Secure Is Cloud
How Secure Is CloudHow Secure Is Cloud
How Secure Is Cloud
 
Cloud is not an option, but is security?
Cloud is not an option, but is security?Cloud is not an option, but is security?
Cloud is not an option, but is security?
 
Securing Cloud Services
Securing Cloud ServicesSecuring Cloud Services
Securing Cloud Services
 
Cw13 cloud computing & big data by ahmed aamer
Cw13 cloud computing & big data by ahmed aamerCw13 cloud computing & big data by ahmed aamer
Cw13 cloud computing & big data by ahmed aamer
 
Cloud computing security issues and challenges
Cloud computing security issues and challengesCloud computing security issues and challenges
Cloud computing security issues and challenges
 
Visibility and Automation for Enhanced Security
Visibility and Automation for Enhanced SecurityVisibility and Automation for Enhanced Security
Visibility and Automation for Enhanced Security
 

More from Mark Skilton

Big data and digital ecosystem mark skilton jan 2014 v1
Big data and digital ecosystem mark skilton jan 2014 v1Big data and digital ecosystem mark skilton jan 2014 v1
Big data and digital ecosystem mark skilton jan 2014 v1
Mark Skilton
 

More from Mark Skilton (14)

Exploring potential of ng cost of infrastructure m skilton sept 23 2014 v1
Exploring potential of ng cost of infrastructure m skilton sept 23 2014 v1Exploring potential of ng cost of infrastructure m skilton sept 23 2014 v1
Exploring potential of ng cost of infrastructure m skilton sept 23 2014 v1
 
The rise of digital ecosystems m skilton june 11 2014 conected suplychain li...
The rise of digital ecosystems  m skilton june 11 2014 conected suplychain li...The rise of digital ecosystems  m skilton june 11 2014 conected suplychain li...
The rise of digital ecosystems m skilton june 11 2014 conected suplychain li...
 
Digital security and the IT Department cw500 M Skilton May 22 2014 London v1
Digital security and the IT Department cw500 M Skilton May 22 2014 London v1Digital security and the IT Department cw500 M Skilton May 22 2014 London v1
Digital security and the IT Department cw500 M Skilton May 22 2014 London v1
 
Creating value in the digital economy Prof Mark Skilton May 2014
Creating value in the digital economy Prof Mark Skilton  May 2014 Creating value in the digital economy Prof Mark Skilton  May 2014
Creating value in the digital economy Prof Mark Skilton May 2014
 
Big data and digital ecosystem mark skilton jan 2014 v1
Big data and digital ecosystem mark skilton jan 2014 v1Big data and digital ecosystem mark skilton jan 2014 v1
Big data and digital ecosystem mark skilton jan 2014 v1
 
Knowing where the safe zone is ovum october 22 2013
Knowing where the safe zone is  ovum october 22 2013 Knowing where the safe zone is  ovum october 22 2013
Knowing where the safe zone is ovum october 22 2013
 
Identifying successful business models to drive monetization of your cloud se...
Identifying successful business models to drive monetization of your cloud se...Identifying successful business models to drive monetization of your cloud se...
Identifying successful business models to drive monetization of your cloud se...
 
Closing the gap in your cloud ecosystem capgemini mark skilton v1
Closing the gap in your cloud ecosystem capgemini mark skilton v1Closing the gap in your cloud ecosystem capgemini mark skilton v1
Closing the gap in your cloud ecosystem capgemini mark skilton v1
 
Capgemini cloud expoeurope jan 25 2012 m skilton v1.4
Capgemini cloud expoeurope jan 25 2012 m skilton  v1.4Capgemini cloud expoeurope jan 25 2012 m skilton  v1.4
Capgemini cloud expoeurope jan 25 2012 m skilton v1.4
 
EU digital agenda event standards capgemini mark skilton june 2011
EU digital agenda event standards capgemini  mark skilton june 2011EU digital agenda event standards capgemini  mark skilton june 2011
EU digital agenda event standards capgemini mark skilton june 2011
 
Cloud computing metrics for successful business architecture and strategy cap...
Cloud computing metrics for successful business architecture and strategy cap...Cloud computing metrics for successful business architecture and strategy cap...
Cloud computing metrics for successful business architecture and strategy cap...
 
Visualization of an digital ecosystem capgemini m skilton v1
Visualization of an digital ecosystem    capgemini m skilton v1Visualization of an digital ecosystem    capgemini m skilton v1
Visualization of an digital ecosystem capgemini m skilton v1
 
Digital transformation and the role of cloud computing Capgemini Mark Skilt...
Digital transformation and the role of cloud computing   Capgemini Mark Skilt...Digital transformation and the role of cloud computing   Capgemini Mark Skilt...
Digital transformation and the role of cloud computing Capgemini Mark Skilt...
 
Platform 3 kickoff april 4 2013 my thoughts mark skilton v2
Platform 3 kickoff april 4 2013 my thoughts  mark skilton v2Platform 3 kickoff april 4 2013 my thoughts  mark skilton v2
Platform 3 kickoff april 4 2013 my thoughts mark skilton v2
 

Recently uploaded

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Recently uploaded (20)

HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 

Identity privacy and data protection in the cloud – what is being done is it enough goal capgemini m skilton v1

  • 1. Mark Skilton, Director, Strategy Office, Global Infrastructure Services Co-Chair, Cloud Computing Work Group, The Open Group Member, ISO JC38 UK Mirror +44 7787 692197 mark.skilton@capgemini.com Twitter @mskilton http://uk.linkedin.com/pub/mark-skilton/1/189/968 “Identity, Privacy, and Data Protection in the Cloud – What is Being Done? Is it Enough?”
  • 2. | Capgemini & Cloud Trust and Risk Trade-off  In the Cloud everything is perceived as untrusted and insecure  Many enterprises have company policies requiring data and access to be stored behind the Corporate firewall; transport between geographies are not allowed  Industrial certifications require physical isolation, audit and authentication processes Trust ? Internal Private Hybrid Public Physical Resources/ locations Edge Span of Insource & Outsource Span of Technology
  • 3. | Capgemini & Cloud What’s being done to Secure Cloud…….. Move data between SQL and nonSQL databases DBMS Server Legal Issues IP Patent Law – Independence of software on device and OS Bundling Legal Definition of an API e.g. Google API, MSFT API US / EU Patriot, SafeHarbor, DA rules Cultural Impact Provisioning Policy Management Amazon gets FISMA certification EU Open Data portal Open Data standards W3C EU inter- country data Use of Public APIs e.g. Google+ Twitter APIs Use of APIs/ personal Data Protection TLS, SSL Transport Layer end to end Pass through Threats Hypervisor IOP e.g. Citrix and AWS Device IOP e.g. User Experience and UI e.g. Ipad , Samsung e.g. Microsoft OS 8 – tablet IOP EU announce common Data Portal Vertical Sector B2B Schemas Vendor Technology Standards seeking Openness e.g. DMTF, ODCA, OMG CCSC Illustrative ISA Chip standards Database Scalability & Portability Hypervisor Portability & Hypervisor Interoperating Hybrid Device from service abstraction Government led Legal certifications Vertical industry Government led Standard schemas Network transport issues Choices , NSPs, ISPs API openness and ownership Multi-form factor supportability Apps, content stores access Personal/vendor Portability Market / Region Provider / Entity Network API / Gateway / Portal Device / Browser OS Server Storage Software Application Data / Payload Hypervisor Business Process DC Hosting Public Cloud Hosted Private Cloud Hosted Open Source Cloud Hosted Legal & Security Industry Nomenclatures Deployment strategies Common Industry standards Vertical Industry standards e.g. Oracle, IBM e.g. Amazon & Others e.g. open nebula TechnologyandBusinesstiers Provisioning Policies Inter-country data exchange Multi-form factor data portability Service IP component bundling Application environment Portability Storage as a Service Compute as a Service Applications as a Service Desktop as a Service Big Data as a Service Move application OpenStack, CloudStack Shifts B2B / B2C Platforms Device Store Services Social Networks, C2C Policy Areas The Open Group – Cloud Computing Interoperability Portability Project 2012 Examples of some Legal activity in last 12-24 months EU announce Data Privacy Controls
  • 4. | Capgemini & Cloud How can we get control of Identity, Privacy, and Data Protection in the Cloud ? Extensible Boundaries From Introduction to CIEL – CILE Project – an Open Group project Work in Progress Copyright SyntheticSpheres 2012 Identity – Is this controlled by User Device or By You in your Cloud Server or a Proxy Service e.g. OpenID ? Privacy – What Boundary Conditions are acceptable to you? Do you want Closed , Secure Cloud? Do you want Distributed Secure Cloud? Do you want Regional/Local Controls do you want guarantees What Legal Jurisdiction do you follow? Data Protection – Data at Rest – Encryption, IP Control Data in Transit – Encryption, Monitoring Data Age – Archive and Audit Control What Legal Jurisdiction do you follow? Provider Consumer Policy Management Boundary Policy Management Legal Contract Back to Back control
  • 5. | Capgemini & Cloud “It is impossible for a distributed computer system to simultaneously provide all three of the following guarantees: Consistency, Availability and Partitioning Tolerance”. Consistency Availability Partition Tolerance GuaranteedC A P Effectiveness Fidelity G P F Consistency Availability Partitioning Tolerance Guaranteed FidelityPerformance (Reference: Brewer Conjecture 2000, Gilbert, Lynch Formal Proof 2002) “Brewer’s Conjecture and the feasibility of consistent, available, partition-tolerant web services” http://lpd.epfl.ch/sgilbert/pubs/BrewersConjecture-SigAct.pdf ACM SIGACT News, Vol 33 Issue 2 (2002) pg 51-59 Brewers Theorem
  • 6. | Capgemini & Cloud The Case for Service Orchestration - managing your Security and Risk  Consistency and Guarantees • Strong Multi-Systems Management – Single Accountabilities • Control Failure Points in system – Strong Identity, Encryption Policies and Tools to manage Usage and Audit Compliance.  Availability and Effectiveness • Multi-Source – open technology capabilities • Business Process Orchestration – Drive Business Performance Outcomes Metrics  Partition Tolerance and Fidelity • Introduce and manage disciplined portfolio of IT and Business assets inside and outside the organization in a way that best serves the needs of consumers and providers. Govern Configuration • Preserve your elasticity - within “acceptable conditions of use” – know the tolerance levels that are within the distributed system. Consistency Availability Partition Tolerance GuaranteedC A P Effectiveness Fidelity G P F Management Orchestration Resource Management Template Contiguity Source Access Systems Management Process Orchestration