SlideShare a Scribd company logo
Making Cloud SLAs readily usable
in the EU private sector
Arthur van der Wees
Managing Director international law firm Arthur’s Legal
Founder & Chief Executive Officer Zapplied Platform
2
Risks, Comfort & Trust in the Cloud
 Cloud Services Challenges:
For the 80% not yet using cloud services, insufficient knowledge is the
main blocking factors (42%).
For the 20% using cloud services, the risk of a security breach is the main
limiting factor (39%).
Eurostat (EC)
Cybersecurity & Data Protection: Threat or Strength?
Risks, Comfort, Trust in & Rewards of the Cloud
60%cited concerns around
data security as a barrier
to adoption.
45%concerned that the
cloud would result in a
lack of data
control.
94%experienced security
benefits they didn’t
previously have on-
premise.
62%said privacy protection
increased as a result of
moving to the cloud.
Initial concerns Realized benefits
Microsoft Azure (ISO 27018)
European Commission Priority: Digital Single Market
C-SIG Drafting Group DG CNECT: Select expert group (CSA, IBM, Microsoft,
Telecom Italia and Arthur’s Legal): EC Cloud SLA Standardisation Guidelines,
ISO and other standardisation. ISO/IEC 17788. ISO/IEC 19086 (I).
Computer Science: TU Darmstadt
Coordination & communication: Trust-IT Services
Security: Cloud Security Alliance
Strategic & Legal: Arthur’s Legal
Cloud Computing & European Commission
5
What do we want to achieve?
Improve transparency, bridging the disconnect between supply and
demand, and increase the uptake of cloud computing by making it
easier for and empower 20 million EU SMEs to understand SLAs
SLA-Ready aims to provide common understanding of Service Level
Agreements (SLAs) for Cloud services with greater standardisation and
transparency so organisations can make an informed decision on what
services to use, what to expect and what to trust.
How to achieve
#Cloud #Trust #Strategy #Performance #Security #Data #Data Protection #SLAReady
SLAs are an important but yet only
one particle in the Cloud Service
Level Ecosystem:
SLA-Ready services will support SMEs with user-friendly practical tools, guides,
and a social marketplace, encouraging them to carefully plan their journey and
make it strategic through an informed, stepping-stone approach, so the Cloud and
applications grow with their business.
The SLA-Ready Common Reference Model will benefit the industry by
integrating a set of SLA components, e.g. common vocabularies, Service Level
Objectives (SLO) service metrics and measurements, as well as best practices
and relevant standards to fill identified gaps in the current SLA landscape.
Ethics & Accountability
Law & Legislation Case Law
Standardisation &
Certification
(Self-regulatory)
Cloud SLA &
Other Contractual
Arrangements
Risk Allocation
& Insurance
Technology
Cloud Service Level Ecosystem
Human
Cloud SLA Life Cycle
When zooming in at one (1) SLA from a legal, negotiation and contract management
perspective, the life cycle of a SLA can be split in seven (7) headline legal life cycle phases:
1.Assessment
2.Preparation
3.Negotiation & Contracting
4.Execution & Operation
5.Updates & Amendments
6.Escalation, and;
7.Termination & Consequences of Termination
4 Main Categories Service Level Objectives (SLOs)
1. Performance
2. Security
3. Data Management
4. (Personal) Data Protection
SLA Life Cycle: Assess, Select, SLA, Execute, Monitor, Update & Terminate
Data Life Cycle: Create/derive, Store, Use/Process, Share, Archive, Destroy
Out of ScopeWithin Scope
Data is not a four letter word
EC Cloud Service Level Agreement Standardisation Guidelines (v20140828)
3D approach | Multi-story of connected data types | Classified data
| Sensitive data | Personal data | Derived data | Proprietary data |
IPR | Encrypted data, with or without Tokenization | Every kind
of data needs to be addressed differently.
Data
Data of any form, nature or structure, that can be created, uploaded, inserted
in, collected or derived from or with cloud services and/or cloud computing,
including without limitation proprietary and non-proprietary data, confidential
and non-confidential data, non-personal and personal data, as well as other
human readable or machine readable data.
State of Practice vs State of Art
Current maturity level of Cloud SLAs of CSPs:
1. Difficult to find, difficult to read & assess: Lot’s of push-back at CSPs
2. Performance: Availability, Uptime & Measurements
3. Incident Management: Response time per prioritised incident
4. Carve-outs & other exclusions: ‘Planned’ Maintenance, Force Majeure, customer, third parties.
5. Less then 10% coverage out of the EC SLA Standardisation Guidelines
6. Difficult to monitor, manage & enforce: status.aws.amazon.com (real-time system status &
status history (35 days)), trust.salesforce.com (real-time system status & planned maintenance),
www.cloudharmony.com/directory (real-time system status & status history (up to 1 year))
CSPs not comfortable, yet.
But how about the cloud customer?
Any question goes!
Thank you
Arthur van der Wees
@SLAReady
@Arthurslegal
vanderwees@arthurslegal.com

More Related Content

What's hot

Host your Cloud – Netmagic Solutions
Host your Cloud – Netmagic SolutionsHost your Cloud – Netmagic Solutions
Host your Cloud – Netmagic Solutions
Netmagic Solutions Pvt. Ltd.
 
Design and implement a new cloud security method based on multi clouds on ope...
Design and implement a new cloud security method based on multi clouds on ope...Design and implement a new cloud security method based on multi clouds on ope...
Design and implement a new cloud security method based on multi clouds on ope...
csandit
 
J3602068071
J3602068071J3602068071
J3602068071
ijceronline
 
Cloud Computing in Healthcare IT
Cloud Computing in Healthcare ITCloud Computing in Healthcare IT
Cloud Computing in Healthcare IT
Mahindra Satyam
 
Cloud computing - Assessing the Security Risks - Jared Carstensen
Cloud computing - Assessing the Security Risks - Jared CarstensenCloud computing - Assessing the Security Risks - Jared Carstensen
Cloud computing - Assessing the Security Risks - Jared Carstensen
jaredcarst
 
Manage risk by protecting apps, data and usage
Manage risk by protecting apps, data and usageManage risk by protecting apps, data and usage
Manage risk by protecting apps, data and usage
Citrix
 
Cloud computing and health care - Facing the Future
Cloud computing and health care - Facing the FutureCloud computing and health care - Facing the Future
Cloud computing and health care - Facing the Future
Jerry Fahrni
 
Risk management for cloud computing hb final
Risk management for cloud computing hb finalRisk management for cloud computing hb final
Risk management for cloud computing hb final
Christophe Monnier
 
Redefining Business Mobility and Customer Experience
Redefining Business Mobility and Customer ExperienceRedefining Business Mobility and Customer Experience
Redefining Business Mobility and Customer Experience
Citrix
 
SecSecuring Software as a Service Model of Cloud Computing: Issues and Solutions
SecSecuring Software as a Service Model of Cloud Computing: Issues and SolutionsSecSecuring Software as a Service Model of Cloud Computing: Issues and Solutions
SecSecuring Software as a Service Model of Cloud Computing: Issues and Solutions
ijccsa
 
Presentation: To an efficient tool for securing the card data on the Cloud: C...
Presentation: To an efficient tool for securing the card data on the Cloud: C...Presentation: To an efficient tool for securing the card data on the Cloud: C...
Presentation: To an efficient tool for securing the card data on the Cloud: C...
Hassan EL ALLOUSSI
 
IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...
IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...
IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...
IRJET Journal
 
Software defined networking
Software defined networkingSoftware defined networking
Software defined networking
Netmagic Solutions Pvt. Ltd.
 
Coso erm for cloud computing
Coso erm for cloud computingCoso erm for cloud computing
Coso erm for cloud computing
VidipOlhyan
 
Legal And Regulatory Issues Cloud Computing...V2.0
Legal And Regulatory Issues Cloud Computing...V2.0Legal And Regulatory Issues Cloud Computing...V2.0
Legal And Regulatory Issues Cloud Computing...V2.0
David Spinks
 
Whitepaper: Security of the Cloud
Whitepaper: Security of the CloudWhitepaper: Security of the Cloud
Whitepaper: Security of the Cloud
CloudSmartz
 
Security of the Cloud
Security of the CloudSecurity of the Cloud
Security of the Cloud
Epoch Universal, Inc.
 
Security in Cloud Computing For Service Delivery Models: Challenges and Solut...
Security in Cloud Computing For Service Delivery Models: Challenges and Solut...Security in Cloud Computing For Service Delivery Models: Challenges and Solut...
Security in Cloud Computing For Service Delivery Models: Challenges and Solut...
IJERA Editor
 
Netmagic the-storage-matrix
Netmagic the-storage-matrixNetmagic the-storage-matrix
Netmagic the-storage-matrix
Netmagic Solutions Pvt. Ltd.
 
A Comprehensive Approach To Third Party Risk Management White Paper 20180103
A Comprehensive Approach To Third Party Risk Management White Paper 20180103A Comprehensive Approach To Third Party Risk Management White Paper 20180103
A Comprehensive Approach To Third Party Risk Management White Paper 20180103
DVV Solutions Third Party Risk Management
 

What's hot (20)

Host your Cloud – Netmagic Solutions
Host your Cloud – Netmagic SolutionsHost your Cloud – Netmagic Solutions
Host your Cloud – Netmagic Solutions
 
Design and implement a new cloud security method based on multi clouds on ope...
Design and implement a new cloud security method based on multi clouds on ope...Design and implement a new cloud security method based on multi clouds on ope...
Design and implement a new cloud security method based on multi clouds on ope...
 
J3602068071
J3602068071J3602068071
J3602068071
 
Cloud Computing in Healthcare IT
Cloud Computing in Healthcare ITCloud Computing in Healthcare IT
Cloud Computing in Healthcare IT
 
Cloud computing - Assessing the Security Risks - Jared Carstensen
Cloud computing - Assessing the Security Risks - Jared CarstensenCloud computing - Assessing the Security Risks - Jared Carstensen
Cloud computing - Assessing the Security Risks - Jared Carstensen
 
Manage risk by protecting apps, data and usage
Manage risk by protecting apps, data and usageManage risk by protecting apps, data and usage
Manage risk by protecting apps, data and usage
 
Cloud computing and health care - Facing the Future
Cloud computing and health care - Facing the FutureCloud computing and health care - Facing the Future
Cloud computing and health care - Facing the Future
 
Risk management for cloud computing hb final
Risk management for cloud computing hb finalRisk management for cloud computing hb final
Risk management for cloud computing hb final
 
Redefining Business Mobility and Customer Experience
Redefining Business Mobility and Customer ExperienceRedefining Business Mobility and Customer Experience
Redefining Business Mobility and Customer Experience
 
SecSecuring Software as a Service Model of Cloud Computing: Issues and Solutions
SecSecuring Software as a Service Model of Cloud Computing: Issues and SolutionsSecSecuring Software as a Service Model of Cloud Computing: Issues and Solutions
SecSecuring Software as a Service Model of Cloud Computing: Issues and Solutions
 
Presentation: To an efficient tool for securing the card data on the Cloud: C...
Presentation: To an efficient tool for securing the card data on the Cloud: C...Presentation: To an efficient tool for securing the card data on the Cloud: C...
Presentation: To an efficient tool for securing the card data on the Cloud: C...
 
IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...
IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...
IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...
 
Software defined networking
Software defined networkingSoftware defined networking
Software defined networking
 
Coso erm for cloud computing
Coso erm for cloud computingCoso erm for cloud computing
Coso erm for cloud computing
 
Legal And Regulatory Issues Cloud Computing...V2.0
Legal And Regulatory Issues Cloud Computing...V2.0Legal And Regulatory Issues Cloud Computing...V2.0
Legal And Regulatory Issues Cloud Computing...V2.0
 
Whitepaper: Security of the Cloud
Whitepaper: Security of the CloudWhitepaper: Security of the Cloud
Whitepaper: Security of the Cloud
 
Security of the Cloud
Security of the CloudSecurity of the Cloud
Security of the Cloud
 
Security in Cloud Computing For Service Delivery Models: Challenges and Solut...
Security in Cloud Computing For Service Delivery Models: Challenges and Solut...Security in Cloud Computing For Service Delivery Models: Challenges and Solut...
Security in Cloud Computing For Service Delivery Models: Challenges and Solut...
 
Netmagic the-storage-matrix
Netmagic the-storage-matrixNetmagic the-storage-matrix
Netmagic the-storage-matrix
 
A Comprehensive Approach To Third Party Risk Management White Paper 20180103
A Comprehensive Approach To Third Party Risk Management White Paper 20180103A Comprehensive Approach To Third Party Risk Management White Paper 20180103
A Comprehensive Approach To Third Party Risk Management White Paper 20180103
 

Similar to Arthur van der Wees, Arthur's Legal on Making Cloud SLAs readily usable in the EU private sector

Cloud Services As An Enabler
Cloud Services As An EnablerCloud Services As An Enabler
Cloud Services As An Enabler
SLA-Ready Network
 
DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...
DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...
DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...
cscpconf
 
Cloud and compliance REX
Cloud and compliance REXCloud and compliance REX
Cloud and compliance REX
Antoine Vigneron
 
Cloud services and it security
Cloud services and it securityCloud services and it security
Cloud services and it security
East Midlands Cyber Security Forum
 
Cloud Services As An Enabler: the Strategic, Legal & Pragmatic Approach
Cloud Services As An Enabler: the Strategic, Legal & Pragmatic ApproachCloud Services As An Enabler: the Strategic, Legal & Pragmatic Approach
Cloud Services As An Enabler: the Strategic, Legal & Pragmatic Approach
SLA-Ready Network
 
SECURITY ISSUES IN CLOUD COMPUTING
SECURITY ISSUES IN CLOUD COMPUTINGSECURITY ISSUES IN CLOUD COMPUTING
Cloud computing-security-issues
Cloud computing-security-issuesCloud computing-security-issues
Cloud computing-security-issues
Aleem Mohammed
 
Cloud computing seminar report
Cloud computing seminar reportCloud computing seminar report
Cloud computing seminar report
shafzonly
 
Cloud computing Risk management
Cloud computing Risk management  Cloud computing Risk management
Cloud computing Risk management
Padma Jella
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER) International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
ijceronline
 
Cloud Computing - A future prerogative
Cloud Computing - A future prerogativeCloud Computing - A future prerogative
Cloud Computing - A future prerogative
Wayne Poggenpoel
 
The Art of Cloud Auditing - ISACA ID
The Art of Cloud Auditing - ISACA IDThe Art of Cloud Auditing - ISACA ID
The Art of Cloud Auditing - ISACA ID
Eryk Budi Pratama
 
A Trusted TPA Model, to Improve Security & Reliability for Cloud Storage
A Trusted TPA Model, to Improve Security & Reliability for Cloud StorageA Trusted TPA Model, to Improve Security & Reliability for Cloud Storage
A Trusted TPA Model, to Improve Security & Reliability for Cloud Storage
IRJET Journal
 
2014 2nd me cloud conference trust in the cloud v01
2014 2nd me cloud conference trust in the cloud v012014 2nd me cloud conference trust in the cloud v01
2014 2nd me cloud conference trust in the cloud v01
promediakw
 
MIST Effective Masquerade Attack Detection in the Cloud
MIST Effective Masquerade Attack Detection in the CloudMIST Effective Masquerade Attack Detection in the Cloud
MIST Effective Masquerade Attack Detection in the Cloud
Kumar Goud
 
EMEA10: Trepidation in Moving to the Cloud
EMEA10: Trepidation in Moving to the CloudEMEA10: Trepidation in Moving to the Cloud
EMEA10: Trepidation in Moving to the Cloud
CompTIA UK
 
ISACA Journal Publication - Does your Cloud have a Secure Lining? Shah Sheikh
ISACA Journal Publication - Does your Cloud have a Secure Lining? Shah SheikhISACA Journal Publication - Does your Cloud have a Secure Lining? Shah Sheikh
ISACA Journal Publication - Does your Cloud have a Secure Lining? Shah Sheikh
Shah Sheikh
 
IRJET- SAAS Attacks Defense Mechanisms and Digital Forensic
IRJET-  	  SAAS Attacks Defense Mechanisms and Digital ForensicIRJET-  	  SAAS Attacks Defense Mechanisms and Digital Forensic
IRJET- SAAS Attacks Defense Mechanisms and Digital Forensic
IRJET Journal
 
IDC Study on Enterprise Hybrid Cloud Strategies
IDC Study on Enterprise Hybrid Cloud StrategiesIDC Study on Enterprise Hybrid Cloud Strategies
IDC Study on Enterprise Hybrid Cloud Strategies
EMC
 
Why CCSK with InfosecTrain (1).pdf
Why CCSK with InfosecTrain (1).pdfWhy CCSK with InfosecTrain (1).pdf
Why CCSK with InfosecTrain (1).pdf
infosec train
 

Similar to Arthur van der Wees, Arthur's Legal on Making Cloud SLAs readily usable in the EU private sector (20)

Cloud Services As An Enabler
Cloud Services As An EnablerCloud Services As An Enabler
Cloud Services As An Enabler
 
DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...
DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...
DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...
 
Cloud and compliance REX
Cloud and compliance REXCloud and compliance REX
Cloud and compliance REX
 
Cloud services and it security
Cloud services and it securityCloud services and it security
Cloud services and it security
 
Cloud Services As An Enabler: the Strategic, Legal & Pragmatic Approach
Cloud Services As An Enabler: the Strategic, Legal & Pragmatic ApproachCloud Services As An Enabler: the Strategic, Legal & Pragmatic Approach
Cloud Services As An Enabler: the Strategic, Legal & Pragmatic Approach
 
SECURITY ISSUES IN CLOUD COMPUTING
SECURITY ISSUES IN CLOUD COMPUTINGSECURITY ISSUES IN CLOUD COMPUTING
SECURITY ISSUES IN CLOUD COMPUTING
 
Cloud computing-security-issues
Cloud computing-security-issuesCloud computing-security-issues
Cloud computing-security-issues
 
Cloud computing seminar report
Cloud computing seminar reportCloud computing seminar report
Cloud computing seminar report
 
Cloud computing Risk management
Cloud computing Risk management  Cloud computing Risk management
Cloud computing Risk management
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER) International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Cloud Computing - A future prerogative
Cloud Computing - A future prerogativeCloud Computing - A future prerogative
Cloud Computing - A future prerogative
 
The Art of Cloud Auditing - ISACA ID
The Art of Cloud Auditing - ISACA IDThe Art of Cloud Auditing - ISACA ID
The Art of Cloud Auditing - ISACA ID
 
A Trusted TPA Model, to Improve Security & Reliability for Cloud Storage
A Trusted TPA Model, to Improve Security & Reliability for Cloud StorageA Trusted TPA Model, to Improve Security & Reliability for Cloud Storage
A Trusted TPA Model, to Improve Security & Reliability for Cloud Storage
 
2014 2nd me cloud conference trust in the cloud v01
2014 2nd me cloud conference trust in the cloud v012014 2nd me cloud conference trust in the cloud v01
2014 2nd me cloud conference trust in the cloud v01
 
MIST Effective Masquerade Attack Detection in the Cloud
MIST Effective Masquerade Attack Detection in the CloudMIST Effective Masquerade Attack Detection in the Cloud
MIST Effective Masquerade Attack Detection in the Cloud
 
EMEA10: Trepidation in Moving to the Cloud
EMEA10: Trepidation in Moving to the CloudEMEA10: Trepidation in Moving to the Cloud
EMEA10: Trepidation in Moving to the Cloud
 
ISACA Journal Publication - Does your Cloud have a Secure Lining? Shah Sheikh
ISACA Journal Publication - Does your Cloud have a Secure Lining? Shah SheikhISACA Journal Publication - Does your Cloud have a Secure Lining? Shah Sheikh
ISACA Journal Publication - Does your Cloud have a Secure Lining? Shah Sheikh
 
IRJET- SAAS Attacks Defense Mechanisms and Digital Forensic
IRJET-  	  SAAS Attacks Defense Mechanisms and Digital ForensicIRJET-  	  SAAS Attacks Defense Mechanisms and Digital Forensic
IRJET- SAAS Attacks Defense Mechanisms and Digital Forensic
 
IDC Study on Enterprise Hybrid Cloud Strategies
IDC Study on Enterprise Hybrid Cloud StrategiesIDC Study on Enterprise Hybrid Cloud Strategies
IDC Study on Enterprise Hybrid Cloud Strategies
 
Why CCSK with InfosecTrain (1).pdf
Why CCSK with InfosecTrain (1).pdfWhy CCSK with InfosecTrain (1).pdf
Why CCSK with InfosecTrain (1).pdf
 

More from SLA-Ready Network

European CIO Association
European CIO AssociationEuropean CIO Association
European CIO Association
SLA-Ready Network
 
The European Cloud Initiative
The European Cloud InitiativeThe European Cloud Initiative
The European Cloud Initiative
SLA-Ready Network
 
“Tools” and Standards for Cloud-SLA
“Tools” and Standards for Cloud-SLA“Tools” and Standards for Cloud-SLA
“Tools” and Standards for Cloud-SLA
SLA-Ready Network
 
European Open Science Cloud (EOSC) From vision to action
European Open Science Cloud (EOSC) From vision to actionEuropean Open Science Cloud (EOSC) From vision to action
European Open Science Cloud (EOSC) From vision to action
SLA-Ready Network
 
GÉANT network
GÉANT networkGÉANT network
GÉANT network
SLA-Ready Network
 
SLA-Ready Common Reference Model
SLA-Ready Common Reference ModelSLA-Ready Common Reference Model
SLA-Ready Common Reference Model
SLA-Ready Network
 
Making cloud SLAs readily usable in the EU private sector
Making cloud SLAs readily usable in the EU private sector Making cloud SLAs readily usable in the EU private sector
Making cloud SLAs readily usable in the EU private sector
SLA-Ready Network
 
Helix Nebula Science Cloud Joint Pre‐Commercial Procurement
Helix Nebula Science Cloud Joint Pre‐Commercial ProcurementHelix Nebula Science Cloud Joint Pre‐Commercial Procurement
Helix Nebula Science Cloud Joint Pre‐Commercial Procurement
SLA-Ready Network
 
SLA-Ready Common Reference Model
SLA-Ready Common Reference ModelSLA-Ready Common Reference Model
SLA-Ready Common Reference Model
SLA-Ready Network
 
Getting to grips with a Service Level Agreement and how SLA-Ready can help
Getting to grips with a Service Level Agreement and how SLA-Ready can helpGetting to grips with a Service Level Agreement and how SLA-Ready can help
Getting to grips with a Service Level Agreement and how SLA-Ready can help
SLA-Ready Network
 
Getting to grips with a Service Level Agreement and how SLA-Ready can help
Getting to grips with a Service Level Agreement and how SLA-Ready can helpGetting to grips with a Service Level Agreement and how SLA-Ready can help
Getting to grips with a Service Level Agreement and how SLA-Ready can help
SLA-Ready Network
 
Practical tools supporting businesses when adopting cloud services
Practical tools supporting businesses when adopting cloud servicesPractical tools supporting businesses when adopting cloud services
Practical tools supporting businesses when adopting cloud services
SLA-Ready Network
 
SLA-Ready Common Reference Model
SLA-Ready Common Reference ModelSLA-Ready Common Reference Model
SLA-Ready Common Reference Model
SLA-Ready Network
 
Are you SLA-Ready?
Are you SLA-Ready?Are you SLA-Ready?
Are you SLA-Ready?
SLA-Ready Network
 
Bob Jones, CERN on PICSE: Procurement of cloud services in Europe
Bob Jones, CERN on PICSE: Procurement of cloud services in EuropeBob Jones, CERN on PICSE: Procurement of cloud services in Europe
Bob Jones, CERN on PICSE: Procurement of cloud services in Europe
SLA-Ready Network
 
Massimiliano Raks, Naples University on SPECS: Secure provisioning of cloud s...
Massimiliano Raks, Naples University on SPECS: Secure provisioning of cloud s...Massimiliano Raks, Naples University on SPECS: Secure provisioning of cloud s...
Massimiliano Raks, Naples University on SPECS: Secure provisioning of cloud s...
SLA-Ready Network
 
Siani Pearson, HP Labs UK on a Common Vision for Governance, Accountability a...
Siani Pearson, HP Labs UK on a Common Vision for Governance, Accountability a...Siani Pearson, HP Labs UK on a Common Vision for Governance, Accountability a...
Siani Pearson, HP Labs UK on a Common Vision for Governance, Accountability a...
SLA-Ready Network
 

More from SLA-Ready Network (17)

European CIO Association
European CIO AssociationEuropean CIO Association
European CIO Association
 
The European Cloud Initiative
The European Cloud InitiativeThe European Cloud Initiative
The European Cloud Initiative
 
“Tools” and Standards for Cloud-SLA
“Tools” and Standards for Cloud-SLA“Tools” and Standards for Cloud-SLA
“Tools” and Standards for Cloud-SLA
 
European Open Science Cloud (EOSC) From vision to action
European Open Science Cloud (EOSC) From vision to actionEuropean Open Science Cloud (EOSC) From vision to action
European Open Science Cloud (EOSC) From vision to action
 
GÉANT network
GÉANT networkGÉANT network
GÉANT network
 
SLA-Ready Common Reference Model
SLA-Ready Common Reference ModelSLA-Ready Common Reference Model
SLA-Ready Common Reference Model
 
Making cloud SLAs readily usable in the EU private sector
Making cloud SLAs readily usable in the EU private sector Making cloud SLAs readily usable in the EU private sector
Making cloud SLAs readily usable in the EU private sector
 
Helix Nebula Science Cloud Joint Pre‐Commercial Procurement
Helix Nebula Science Cloud Joint Pre‐Commercial ProcurementHelix Nebula Science Cloud Joint Pre‐Commercial Procurement
Helix Nebula Science Cloud Joint Pre‐Commercial Procurement
 
SLA-Ready Common Reference Model
SLA-Ready Common Reference ModelSLA-Ready Common Reference Model
SLA-Ready Common Reference Model
 
Getting to grips with a Service Level Agreement and how SLA-Ready can help
Getting to grips with a Service Level Agreement and how SLA-Ready can helpGetting to grips with a Service Level Agreement and how SLA-Ready can help
Getting to grips with a Service Level Agreement and how SLA-Ready can help
 
Getting to grips with a Service Level Agreement and how SLA-Ready can help
Getting to grips with a Service Level Agreement and how SLA-Ready can helpGetting to grips with a Service Level Agreement and how SLA-Ready can help
Getting to grips with a Service Level Agreement and how SLA-Ready can help
 
Practical tools supporting businesses when adopting cloud services
Practical tools supporting businesses when adopting cloud servicesPractical tools supporting businesses when adopting cloud services
Practical tools supporting businesses when adopting cloud services
 
SLA-Ready Common Reference Model
SLA-Ready Common Reference ModelSLA-Ready Common Reference Model
SLA-Ready Common Reference Model
 
Are you SLA-Ready?
Are you SLA-Ready?Are you SLA-Ready?
Are you SLA-Ready?
 
Bob Jones, CERN on PICSE: Procurement of cloud services in Europe
Bob Jones, CERN on PICSE: Procurement of cloud services in EuropeBob Jones, CERN on PICSE: Procurement of cloud services in Europe
Bob Jones, CERN on PICSE: Procurement of cloud services in Europe
 
Massimiliano Raks, Naples University on SPECS: Secure provisioning of cloud s...
Massimiliano Raks, Naples University on SPECS: Secure provisioning of cloud s...Massimiliano Raks, Naples University on SPECS: Secure provisioning of cloud s...
Massimiliano Raks, Naples University on SPECS: Secure provisioning of cloud s...
 
Siani Pearson, HP Labs UK on a Common Vision for Governance, Accountability a...
Siani Pearson, HP Labs UK on a Common Vision for Governance, Accountability a...Siani Pearson, HP Labs UK on a Common Vision for Governance, Accountability a...
Siani Pearson, HP Labs UK on a Common Vision for Governance, Accountability a...
 

Recently uploaded

Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
Zilliz
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
Mariano Tinti
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
panagenda
 
Infrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI modelsInfrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI models
Zilliz
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 

Recently uploaded (20)

Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
 
Infrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI modelsInfrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI models
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 

Arthur van der Wees, Arthur's Legal on Making Cloud SLAs readily usable in the EU private sector

  • 1. Making Cloud SLAs readily usable in the EU private sector Arthur van der Wees Managing Director international law firm Arthur’s Legal Founder & Chief Executive Officer Zapplied Platform
  • 2. 2 Risks, Comfort & Trust in the Cloud  Cloud Services Challenges: For the 80% not yet using cloud services, insufficient knowledge is the main blocking factors (42%). For the 20% using cloud services, the risk of a security breach is the main limiting factor (39%). Eurostat (EC)
  • 3. Cybersecurity & Data Protection: Threat or Strength? Risks, Comfort, Trust in & Rewards of the Cloud 60%cited concerns around data security as a barrier to adoption. 45%concerned that the cloud would result in a lack of data control. 94%experienced security benefits they didn’t previously have on- premise. 62%said privacy protection increased as a result of moving to the cloud. Initial concerns Realized benefits Microsoft Azure (ISO 27018)
  • 4. European Commission Priority: Digital Single Market C-SIG Drafting Group DG CNECT: Select expert group (CSA, IBM, Microsoft, Telecom Italia and Arthur’s Legal): EC Cloud SLA Standardisation Guidelines, ISO and other standardisation. ISO/IEC 17788. ISO/IEC 19086 (I). Computer Science: TU Darmstadt Coordination & communication: Trust-IT Services Security: Cloud Security Alliance Strategic & Legal: Arthur’s Legal Cloud Computing & European Commission
  • 5. 5 What do we want to achieve? Improve transparency, bridging the disconnect between supply and demand, and increase the uptake of cloud computing by making it easier for and empower 20 million EU SMEs to understand SLAs SLA-Ready aims to provide common understanding of Service Level Agreements (SLAs) for Cloud services with greater standardisation and transparency so organisations can make an informed decision on what services to use, what to expect and what to trust.
  • 6. How to achieve #Cloud #Trust #Strategy #Performance #Security #Data #Data Protection #SLAReady SLAs are an important but yet only one particle in the Cloud Service Level Ecosystem: SLA-Ready services will support SMEs with user-friendly practical tools, guides, and a social marketplace, encouraging them to carefully plan their journey and make it strategic through an informed, stepping-stone approach, so the Cloud and applications grow with their business. The SLA-Ready Common Reference Model will benefit the industry by integrating a set of SLA components, e.g. common vocabularies, Service Level Objectives (SLO) service metrics and measurements, as well as best practices and relevant standards to fill identified gaps in the current SLA landscape.
  • 7. Ethics & Accountability Law & Legislation Case Law Standardisation & Certification (Self-regulatory) Cloud SLA & Other Contractual Arrangements Risk Allocation & Insurance Technology Cloud Service Level Ecosystem Human
  • 8. Cloud SLA Life Cycle When zooming in at one (1) SLA from a legal, negotiation and contract management perspective, the life cycle of a SLA can be split in seven (7) headline legal life cycle phases: 1.Assessment 2.Preparation 3.Negotiation & Contracting 4.Execution & Operation 5.Updates & Amendments 6.Escalation, and; 7.Termination & Consequences of Termination
  • 9. 4 Main Categories Service Level Objectives (SLOs) 1. Performance 2. Security 3. Data Management 4. (Personal) Data Protection SLA Life Cycle: Assess, Select, SLA, Execute, Monitor, Update & Terminate Data Life Cycle: Create/derive, Store, Use/Process, Share, Archive, Destroy Out of ScopeWithin Scope
  • 10. Data is not a four letter word EC Cloud Service Level Agreement Standardisation Guidelines (v20140828) 3D approach | Multi-story of connected data types | Classified data | Sensitive data | Personal data | Derived data | Proprietary data | IPR | Encrypted data, with or without Tokenization | Every kind of data needs to be addressed differently. Data Data of any form, nature or structure, that can be created, uploaded, inserted in, collected or derived from or with cloud services and/or cloud computing, including without limitation proprietary and non-proprietary data, confidential and non-confidential data, non-personal and personal data, as well as other human readable or machine readable data.
  • 11. State of Practice vs State of Art Current maturity level of Cloud SLAs of CSPs: 1. Difficult to find, difficult to read & assess: Lot’s of push-back at CSPs 2. Performance: Availability, Uptime & Measurements 3. Incident Management: Response time per prioritised incident 4. Carve-outs & other exclusions: ‘Planned’ Maintenance, Force Majeure, customer, third parties. 5. Less then 10% coverage out of the EC SLA Standardisation Guidelines 6. Difficult to monitor, manage & enforce: status.aws.amazon.com (real-time system status & status history (35 days)), trust.salesforce.com (real-time system status & planned maintenance), www.cloudharmony.com/directory (real-time system status & status history (up to 1 year)) CSPs not comfortable, yet. But how about the cloud customer?
  • 12. Any question goes! Thank you Arthur van der Wees @SLAReady @Arthurslegal vanderwees@arthurslegal.com