SlideShare a Scribd company logo
1 of 38
Cloud Computing: Network Security in the Cloud Team #5 Chris Verdin ShantHovespian AwetHagos Jason Reifman John Meador 4/15/2010 1
Agenda Cloud Intro by Chris SaaSby Shant PaaSby Awet IaaSby Jason WEB Security in the Cloudby John Conclusionby Chris ???  -ask 4/15/2010 2
Introduction 4/15/2010 3
Deployment Models: 4/15/2010 4
Deployment Models: 4/15/2010 5
Deployment Models: 4/15/2010 6
Software as a Service SaaS Web Video http://www.youtube.com/watch?v=MHxUzR88A-Y ASP v.sSaaS Summary & Benefits 4/15/2010 7 SaaS PaaS IaaS Cloud Stack
ASPs vsSaaS 4/15/2010 8 SaaS PaaS IaaS Cloud Stack
SaaS Today 4/15/2010 9 SaaS PaaS IaaS Cloud Stack
Summary & Benefits SaaStifaction Benefits: Quicker time to value Lower cost of ownership Higher return on investment Greater scalability and agility State-of-the-Industry/State-of-the-Art 4/15/2010 10 SaaS PaaS IaaS Cloud Stack
Platform as a Service Force.com boasts to be fastest way to build custom cloud apps and Web sites With Force.com, you can build and deliver applications 5 times faster, at about ½ the cost of traditional software platforms. They deliver a complete platform with a simplified programming model so just about any business can use it to build apps. SaaS PaaS IaaS Cloud Stack 4/15/2010 11
Platform as a Service – Force.com features Unlimited real-time database customizations 	Every application links with a database that stores information about your business’ employees, events, or inventory. Force.com enables users to easily setup a database with walkthrough wizards that aid in building custom objects and relationships.  Programmable user interface 	Force.com can automatically generate a rich user interface (dashboard). Or a developer can build their own UI with Web technologies such as JavaScript, Flash, or CSS.  Programmable cloud logic 	Apps need business logic to ensure rules and calculate results or deal with exceptions. Fore.com has an easy-to-use formula language similar to Excel. It also includes programming language and Eclipse-based IDE developers can use to write their on code that runs on Force.com Visual process manager 	Most business process can be mapped out with Force.com’s visual process manager and point-and-click workflow. You can rapidly build application wizards, design multi-step processes, and automate manual tasks including approvals, assign tasks, send out alerts and send messages. 4/15/2010 12 SaaS PaaS IaaS Cloud Stack
Platform as a Service SaaS PaaS IaaS Cloud Stack Force.com video: http://www.youtube.com/watch?v=EzE6haADxRc 4/15/2010 13
Infrastructure as a Service Aka “Utility” as a Service;  on-demand, metered  IaaS is lower on the cloud stack or “down stack” and closest to the hardware IaaS provides the underlying hardware and operating system resources IaaS offers CPU, memory, storage, networking and security as a package.  Infrastructure can include firewalls, virtual private networks (VPNs), virtual machines (VMs), routers, switches, physical servers, and storage/databases. 4/15/2010 14 SaaS PaaS IaaS Cloud Stack
Virtualization Cloud computing is a set of pooled resources delivered over the internet. To pool resources we use virtualization. Virtualization – used to create logical versions of a physical device or operating system. Device can be server, storage or network equip. Two types of virtualization: Segmentation Aggregation 4/15/2010 15 SaaS PaaS IaaS Cloud Stack
Virtualization Segmentation -  enables many virtual instances within a single physical device *Take advantage of underutilized resources  SaaS PaaS IaaS Cloud Stack Application Application Application OS OS OS 4/15/2010 16
Virtualization Aggregation – enables multiple physical devices to be represented by a single virtual instance. Allows physical resources to be added to a cluster as needed = “on-demand”. Provides scalability Manifested in today’s utility or grid computing. 4/15/2010 17 SaaS PaaS IaaS Cloud Stack
Segmentation + Aggregation Consider the benefits of having a single server virtual machine (leveraging segmentation) depend upon a network-attached storage array as its “disk” (leveraging aggregation). => Runtime isolation and storage scalability IAAS providers have used the combination of segmentation and aggregation to allow customers to:  Pay as they go for the services they use.  While being able to scale up or down.   4/15/2010 18 SaaS PaaS IaaS Cloud Stack
Benefitsof IaaS Access to expensive hardware -incl. servers on an as need basis without considerable set-up and maintenance costs. Cost savings also includes: IT staff  Storage space Energy bills  Scalability – adjust your settings online to add or remove resources based on business needs. 4/15/2010 19 SaaS PaaS IaaS Cloud Stack
Benefitsof IaaS(cont.) Access to backup, security, and data management services. Service providers are able to very quickly make copies of a virtual environment to provide back-up services, and testing environments or “sandboxes”. Don’t have to physically move machines to relocate employee. Increased efficiency of existing resources due to virtualization.   4/15/2010 20 SaaS PaaS IaaS Cloud Stack
Risks of IaaS Large concern is Loss of Control In an IaaS offering the responsibility for securing: The underlying infrastructure and abstraction layers belongs to the provider,  The remainder of the stack is the consumer’s responsibility. Confidentiality can be a concern because data can be moved across multiple networks. 4/15/2010 21 SaaS PaaS IaaS Cloud Stack
Service Level Agreement SLA -the only legal agreement between the service provider and client contract that can cover a wide range of issues: Defining service  Performance management Problem management Customer’s duties and responsibilities  Security Disaster recovery Business continuity  4/15/2010 22 SaaS PaaS IaaS Cloud Stack
Trusting the Virtual Machine Image IaaS providers make a vast number of virtual machine images available to their customers Some of these virtual machine images are provided by the IaaS provider itself, but some are provided by other customers. virtual image should undergo the same level of security verification and hardening for hosts within the enterprise. Options:  provide your own image or get from trusted host. 4/15/2010 23 SaaS PaaS IaaS Cloud Stack
Hardening Hosts ,[object Object],IaaS platforms provide the ability to block and filter traffic based on IP address and port. Not equivalent to the network security controls in most enterprises.  Hosts running within an IaaS are similar to hosts running in the DMZ (demilitarized zone)of your enterprise’s network. Like being in the DMZ where the hosts are on the internet it is especially import to harden the hosts. 4/15/2010 24 SaaS PaaS IaaS Cloud Stack
Hardening Hosts (cont.) A best practice for cloud-based applications is to build custom operating systems and application platform images that have only the capabilities necessary to support the application stack. Limits the overall attack surface of the host. Greatly reduces the number of patches needed to keep that application stack secure. 4/15/2010 25 SaaS PaaS IaaS Cloud Stack
Securing Inter-host Communication  Hosts are running in a shared infrastructure with other companies so it is important to secure the communication in a cloud-based application.  Administrators that maintain the data center running the hosts and network should not be afforded the same level of trust as administrators of an internal data center. 4/15/2010 26 SaaS PaaS IaaS Cloud Stack
IaaS Provider example Amazon Web Services – uses the same global computing infrastructure that Amazon.com uses for their retail business. Amazon’s scalable, reliable, and secure distributed computing infrastructure has been honed for over 13 years. Services include: Amazon Elastic Compute Cloud (Amazon EC2™) Amazon Simple Storage Service (Amazon S3™)  Amazon CloudFront™ Amazon SimpleDB™ Amazon Simple Queue Service (Amazon SQS™) 4/15/2010 27 SaaS PaaS IaaS Cloud Stack
Security features of AWS Amazon EC2’s instances cannot send spoofed network traffic.   Port scanning is a violation of Amazons policy, when unauthorized port scanning occurs it is automatically stopped and blocked.   To help prevent man in the middle attacks all of the AWS APIs are available via SSL-protected endpoints which provide server authentication.  Packet sniffing by other tenants is mitigated since it is not possible for a virtual instance running in promiscuous mode to receive or “sniff” traffic that is intended for a different virtual instance.  4/15/2010 28 SaaS PaaS IaaS Cloud Stack
Cloud Standard Organizations and Task Forces Risks in Cloud Computing Legal Issues in Cloud Computing Security in the Cloud 4/15/2010 29
Security in the Cloud Cloud Standard Organizations  and Task Forces ,[object Object]
National Institute of Standards and Technology (NIST)
American Institute of Certified Public Accountants (AICPA)
Distributed Management Task Force (DMTF)4/15/2010 30
Security in the Cloud Risks in Cloud Computing Standards Risk Operational Risk Security Risk Compliance Risk 4/15/2010 31
Security in the Cloud Risks in Cloud Computing Standards Risk Standards do not yet exist CSA, NIST AICPA and DTMF developing a set of standards for Cloud Computing Standards will apply to security, operational auditing and compliance 4/15/2010 32
Security in the Cloud Risks in Cloud Computing Operational Risk Primary Risk Firm’s data is now housed and controlled by the Cloud Provider Safety and control of a firm’s data Other Risks Data Segregation Disaster Recovery  4/15/2010 33
Security in the Cloud Risks in Cloud Computing Security Risk Primary Risk  Unauthorized access to a firm’s data and processes Authentication and Authorization Controlled at the Cloud Provider and not at the firm Federated SOA authentication may be a future option On-line Identity SOA’s now exist 4/15/2010 34
Security in the Cloud Risks in Cloud Computing ,[object Object]

More Related Content

What's hot

CIW Lab with CoheisveFT: Get started in public cloud - Part 1 Cloud & Virtual...
CIW Lab with CoheisveFT: Get started in public cloud - Part 1 Cloud & Virtual...CIW Lab with CoheisveFT: Get started in public cloud - Part 1 Cloud & Virtual...
CIW Lab with CoheisveFT: Get started in public cloud - Part 1 Cloud & Virtual...Ryan Koop
 
Transitioning to Hybrid Cloud
Transitioning to Hybrid CloudTransitioning to Hybrid Cloud
Transitioning to Hybrid CloudProlifics
 
Cloud Computing - Challenges and Opportunities - Jens Nimis
Cloud Computing - Challenges and Opportunities  -  Jens NimisCloud Computing - Challenges and Opportunities  -  Jens Nimis
Cloud Computing - Challenges and Opportunities - Jens NimisJensNimis
 
SaaS Challenges & Security Concerns
SaaS Challenges & Security ConcernsSaaS Challenges & Security Concerns
SaaS Challenges & Security ConcernsKannan Subbiah
 
Cloud Computing Training PPT
Cloud Computing Training PPTCloud Computing Training PPT
Cloud Computing Training PPTAmit Poonia
 
Business Drivers and Challenges of Cloud Computing and Social Networking Appl...
Business Drivers and Challenges of Cloud Computing and Social Networking Appl...Business Drivers and Challenges of Cloud Computing and Social Networking Appl...
Business Drivers and Challenges of Cloud Computing and Social Networking Appl...M Biro
 
Private Cloud With System Center Project
Private Cloud With System Center ProjectPrivate Cloud With System Center Project
Private Cloud With System Center ProjectAbhijit Kundu
 
What is cloud computing
What is cloud computingWhat is cloud computing
What is cloud computingDan Morrill
 
Hybrid and Private Cloud Architectures
Hybrid and Private Cloud ArchitecturesHybrid and Private Cloud Architectures
Hybrid and Private Cloud ArchitecturesDavid Linthicum
 
Cloud computing 2
Cloud computing 2Cloud computing 2
Cloud computing 2Shyam Kona
 
Overview of Cloud Computing
Overview of Cloud ComputingOverview of Cloud Computing
Overview of Cloud ComputingJim Kaskade
 
Cloud computing hybrid architecture
Cloud computing   hybrid architectureCloud computing   hybrid architecture
Cloud computing hybrid architectureAbhijeet Singh
 
Cloud Computing security issues
Cloud Computing security issuesCloud Computing security issues
Cloud Computing security issuesPradeepti Kamble
 
Ima Cloud Computing Mar2010 V8
Ima Cloud Computing Mar2010 V8Ima Cloud Computing Mar2010 V8
Ima Cloud Computing Mar2010 V8Tony Pearson
 
IBM Private Cloud Solutions with IBM i
IBM Private Cloud Solutions with IBM iIBM Private Cloud Solutions with IBM i
IBM Private Cloud Solutions with IBM iLuca Comparini
 
EMC Cloud Management
EMC Cloud ManagementEMC Cloud Management
EMC Cloud ManagementCenk Ersoy
 
SoftwareGuru 2009 - Cloud Computing
SoftwareGuru 2009 - Cloud ComputingSoftwareGuru 2009 - Cloud Computing
SoftwareGuru 2009 - Cloud ComputingJose Tam
 
IBM Cloud Services Portfolio
IBM Cloud Services PortfolioIBM Cloud Services Portfolio
IBM Cloud Services PortfolioBernd Thomsen
 

What's hot (20)

Cloud Reference Model
Cloud Reference ModelCloud Reference Model
Cloud Reference Model
 
CIW Lab with CoheisveFT: Get started in public cloud - Part 1 Cloud & Virtual...
CIW Lab with CoheisveFT: Get started in public cloud - Part 1 Cloud & Virtual...CIW Lab with CoheisveFT: Get started in public cloud - Part 1 Cloud & Virtual...
CIW Lab with CoheisveFT: Get started in public cloud - Part 1 Cloud & Virtual...
 
Transitioning to Hybrid Cloud
Transitioning to Hybrid CloudTransitioning to Hybrid Cloud
Transitioning to Hybrid Cloud
 
Cloud Computing - Challenges and Opportunities - Jens Nimis
Cloud Computing - Challenges and Opportunities  -  Jens NimisCloud Computing - Challenges and Opportunities  -  Jens Nimis
Cloud Computing - Challenges and Opportunities - Jens Nimis
 
SaaS Challenges & Security Concerns
SaaS Challenges & Security ConcernsSaaS Challenges & Security Concerns
SaaS Challenges & Security Concerns
 
Cloud Computing Training PPT
Cloud Computing Training PPTCloud Computing Training PPT
Cloud Computing Training PPT
 
Business Drivers and Challenges of Cloud Computing and Social Networking Appl...
Business Drivers and Challenges of Cloud Computing and Social Networking Appl...Business Drivers and Challenges of Cloud Computing and Social Networking Appl...
Business Drivers and Challenges of Cloud Computing and Social Networking Appl...
 
Private Cloud With System Center Project
Private Cloud With System Center ProjectPrivate Cloud With System Center Project
Private Cloud With System Center Project
 
What is cloud computing
What is cloud computingWhat is cloud computing
What is cloud computing
 
Hybrid and Private Cloud Architectures
Hybrid and Private Cloud ArchitecturesHybrid and Private Cloud Architectures
Hybrid and Private Cloud Architectures
 
Cloud computing 2
Cloud computing 2Cloud computing 2
Cloud computing 2
 
Overview of Cloud Computing
Overview of Cloud ComputingOverview of Cloud Computing
Overview of Cloud Computing
 
Cloud computing hybrid architecture
Cloud computing   hybrid architectureCloud computing   hybrid architecture
Cloud computing hybrid architecture
 
Cloud Computing security issues
Cloud Computing security issuesCloud Computing security issues
Cloud Computing security issues
 
Ima Cloud Computing Mar2010 V8
Ima Cloud Computing Mar2010 V8Ima Cloud Computing Mar2010 V8
Ima Cloud Computing Mar2010 V8
 
IBM Private Cloud Solutions with IBM i
IBM Private Cloud Solutions with IBM iIBM Private Cloud Solutions with IBM i
IBM Private Cloud Solutions with IBM i
 
EMC Cloud Management
EMC Cloud ManagementEMC Cloud Management
EMC Cloud Management
 
Practical Guide to Hybrid Cloud Computing
Practical Guide to Hybrid Cloud ComputingPractical Guide to Hybrid Cloud Computing
Practical Guide to Hybrid Cloud Computing
 
SoftwareGuru 2009 - Cloud Computing
SoftwareGuru 2009 - Cloud ComputingSoftwareGuru 2009 - Cloud Computing
SoftwareGuru 2009 - Cloud Computing
 
IBM Cloud Services Portfolio
IBM Cloud Services PortfolioIBM Cloud Services Portfolio
IBM Cloud Services Portfolio
 

Viewers also liked

Cloud computing - new class of network based computing
Cloud computing - new class of network based computingCloud computing - new class of network based computing
Cloud computing - new class of network based computingAshita Agrawal
 
Slides cloud computing
Slides cloud computingSlides cloud computing
Slides cloud computingHaslina
 
Cloud computing security
Cloud computing securityCloud computing security
Cloud computing securityGahya Pandian
 
Market oriented Cloud Computing
Market oriented Cloud ComputingMarket oriented Cloud Computing
Market oriented Cloud ComputingJithin Parakka
 
A Survey on Resource Allocation & Monitoring in Cloud Computing
A Survey on Resource Allocation & Monitoring in Cloud ComputingA Survey on Resource Allocation & Monitoring in Cloud Computing
A Survey on Resource Allocation & Monitoring in Cloud ComputingMohd Hairey
 
CLOUD COMPUTING UNIT-5 NOTES
CLOUD COMPUTING UNIT-5 NOTESCLOUD COMPUTING UNIT-5 NOTES
CLOUD COMPUTING UNIT-5 NOTESTushar Dhoot
 
Google Cloud Platform: Prototype ->Production-> Planet scale
Google Cloud Platform: Prototype ->Production-> Planet scaleGoogle Cloud Platform: Prototype ->Production-> Planet scale
Google Cloud Platform: Prototype ->Production-> Planet scaleIdan Tohami
 
Guide to big data analytics
Guide to big data analyticsGuide to big data analytics
Guide to big data analyticsGahya Pandian
 
Network management
Network managementNetwork management
Network managementMohd Arif
 
Cloud Security - Security Aspects of Cloud Computing
Cloud Security - Security Aspects of Cloud ComputingCloud Security - Security Aspects of Cloud Computing
Cloud Security - Security Aspects of Cloud ComputingJim Geovedi
 
Cloud computing security issues and challenges
Cloud computing security issues and challengesCloud computing security issues and challenges
Cloud computing security issues and challengesDheeraj Negi
 
Cloud Computing Security
Cloud Computing SecurityCloud Computing Security
Cloud Computing SecurityNinh Nguyen
 
Cloud security and security architecture
Cloud security and security architectureCloud security and security architecture
Cloud security and security architectureVladimir Jirasek
 
Data security in cloud computing
Data security in cloud computingData security in cloud computing
Data security in cloud computingPrince Chandu
 
Cloud computing Basics
Cloud computing BasicsCloud computing Basics
Cloud computing BasicsSagar Sane
 
Introduction of Cloud computing
Introduction of Cloud computingIntroduction of Cloud computing
Introduction of Cloud computingRkrishna Mishra
 

Viewers also liked (20)

Cloud computing - new class of network based computing
Cloud computing - new class of network based computingCloud computing - new class of network based computing
Cloud computing - new class of network based computing
 
Slides cloud computing
Slides cloud computingSlides cloud computing
Slides cloud computing
 
CloudSecurity
CloudSecurityCloudSecurity
CloudSecurity
 
Cloud computing security
Cloud computing securityCloud computing security
Cloud computing security
 
Market oriented Cloud Computing
Market oriented Cloud ComputingMarket oriented Cloud Computing
Market oriented Cloud Computing
 
A Survey on Resource Allocation & Monitoring in Cloud Computing
A Survey on Resource Allocation & Monitoring in Cloud ComputingA Survey on Resource Allocation & Monitoring in Cloud Computing
A Survey on Resource Allocation & Monitoring in Cloud Computing
 
CLOUD COMPUTING UNIT-5 NOTES
CLOUD COMPUTING UNIT-5 NOTESCLOUD COMPUTING UNIT-5 NOTES
CLOUD COMPUTING UNIT-5 NOTES
 
Google Cloud Platform: Prototype ->Production-> Planet scale
Google Cloud Platform: Prototype ->Production-> Planet scaleGoogle Cloud Platform: Prototype ->Production-> Planet scale
Google Cloud Platform: Prototype ->Production-> Planet scale
 
Guide to big data analytics
Guide to big data analyticsGuide to big data analytics
Guide to big data analytics
 
Network management
Network managementNetwork management
Network management
 
Cloud Computing Security Issues
Cloud Computing Security Issues Cloud Computing Security Issues
Cloud Computing Security Issues
 
Cloud Security - Security Aspects of Cloud Computing
Cloud Security - Security Aspects of Cloud ComputingCloud Security - Security Aspects of Cloud Computing
Cloud Security - Security Aspects of Cloud Computing
 
Cloud security ppt
Cloud security pptCloud security ppt
Cloud security ppt
 
Cloud computing security issues and challenges
Cloud computing security issues and challengesCloud computing security issues and challenges
Cloud computing security issues and challenges
 
Cloud Computing Security
Cloud Computing SecurityCloud Computing Security
Cloud Computing Security
 
Cloud security and security architecture
Cloud security and security architectureCloud security and security architecture
Cloud security and security architecture
 
Data security in cloud computing
Data security in cloud computingData security in cloud computing
Data security in cloud computing
 
Cloud computing Basics
Cloud computing BasicsCloud computing Basics
Cloud computing Basics
 
Introduction of Cloud computing
Introduction of Cloud computingIntroduction of Cloud computing
Introduction of Cloud computing
 
cloud computing ppt
cloud computing pptcloud computing ppt
cloud computing ppt
 

Similar to Cloud Computing Presentation

describing-the-significant-use-of-cloud-computing-service-models-cuneiform
describing-the-significant-use-of-cloud-computing-service-models-cuneiformdescribing-the-significant-use-of-cloud-computing-service-models-cuneiform
describing-the-significant-use-of-cloud-computing-service-models-cuneiformCuneiform Consulting Pvt Ltd.
 
Cloud computing
Cloud computingCloud computing
Cloud computingThor Tolo
 
Stackato PaaS Architecture white paper
Stackato PaaS Architecture white paperStackato PaaS Architecture white paper
Stackato PaaS Architecture white paperAngie Hirata
 
Service Models
Service ModelsService Models
Service ModelsAllwyn24
 
Feet On The Ground Head In The Cloud
Feet On The Ground Head In The CloudFeet On The Ground Head In The Cloud
Feet On The Ground Head In The Clouddchmielewski
 
Microsoft Private Cloud Strategy
Microsoft Private Cloud StrategyMicrosoft Private Cloud Strategy
Microsoft Private Cloud StrategyAmit Gatenyo
 
Cloud Computing Overview
Cloud Computing OverviewCloud Computing Overview
Cloud Computing OverviewShylaja Balaji
 
Cloud Computing and its Services
Cloud Computing and its ServicesCloud Computing and its Services
Cloud Computing and its Servicesmuneeb hassan
 
Cloud computing ppt
Cloud computing pptCloud computing ppt
Cloud computing pptdineshm106
 
Everything about Cloud Computing
Everything about Cloud ComputingEverything about Cloud Computing
Everything about Cloud ComputingIDS Infotech
 
Sap Seminar Leveraging Cloud Infrastructure
Sap Seminar Leveraging Cloud InfrastructureSap Seminar Leveraging Cloud Infrastructure
Sap Seminar Leveraging Cloud InfrastructurePT Datacomm Diangraha
 
Ravi namboori | Cloud computing
Ravi namboori | Cloud computingRavi namboori | Cloud computing
Ravi namboori | Cloud computingravi varmanamboori
 
Comprehensive Information on Platform as a Service
Comprehensive Information on Platform as a ServiceComprehensive Information on Platform as a Service
Comprehensive Information on Platform as a ServiceHTS Hosting
 

Similar to Cloud Computing Presentation (20)

describing-the-significant-use-of-cloud-computing-service-models-cuneiform
describing-the-significant-use-of-cloud-computing-service-models-cuneiformdescribing-the-significant-use-of-cloud-computing-service-models-cuneiform
describing-the-significant-use-of-cloud-computing-service-models-cuneiform
 
UNIT - I.docx
UNIT - I.docxUNIT - I.docx
UNIT - I.docx
 
Module 3-cloud computing
Module 3-cloud computingModule 3-cloud computing
Module 3-cloud computing
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Stackato PaaS Architecture white paper
Stackato PaaS Architecture white paperStackato PaaS Architecture white paper
Stackato PaaS Architecture white paper
 
C loud seminar
C loud  seminarC loud  seminar
C loud seminar
 
Service Models
Service ModelsService Models
Service Models
 
Feet On The Ground Head In The Cloud
Feet On The Ground Head In The CloudFeet On The Ground Head In The Cloud
Feet On The Ground Head In The Cloud
 
Microsoft Private Cloud Strategy
Microsoft Private Cloud StrategyMicrosoft Private Cloud Strategy
Microsoft Private Cloud Strategy
 
Cloud computing
Cloud computing Cloud computing
Cloud computing
 
Unit 3 Cloud Computing.pdf
Unit 3 Cloud Computing.pdfUnit 3 Cloud Computing.pdf
Unit 3 Cloud Computing.pdf
 
Cloud Computing Overview
Cloud Computing OverviewCloud Computing Overview
Cloud Computing Overview
 
Cloud Security Alliance's GRC Stack Overview
Cloud Security Alliance's GRC Stack OverviewCloud Security Alliance's GRC Stack Overview
Cloud Security Alliance's GRC Stack Overview
 
Cloud Computing and its Services
Cloud Computing and its ServicesCloud Computing and its Services
Cloud Computing and its Services
 
Cloud computing ppt
Cloud computing pptCloud computing ppt
Cloud computing ppt
 
Everything about Cloud Computing
Everything about Cloud ComputingEverything about Cloud Computing
Everything about Cloud Computing
 
Sap Seminar Leveraging Cloud Infrastructure
Sap Seminar Leveraging Cloud InfrastructureSap Seminar Leveraging Cloud Infrastructure
Sap Seminar Leveraging Cloud Infrastructure
 
Ravi namboori | Cloud computing
Ravi namboori | Cloud computingRavi namboori | Cloud computing
Ravi namboori | Cloud computing
 
Comprehensive Information on Platform as a Service
Comprehensive Information on Platform as a ServiceComprehensive Information on Platform as a Service
Comprehensive Information on Platform as a Service
 
ravi namboori_Cloud computing
ravi namboori_Cloud computing ravi namboori_Cloud computing
ravi namboori_Cloud computing
 

Cloud Computing Presentation

  • 1. Cloud Computing: Network Security in the Cloud Team #5 Chris Verdin ShantHovespian AwetHagos Jason Reifman John Meador 4/15/2010 1
  • 2. Agenda Cloud Intro by Chris SaaSby Shant PaaSby Awet IaaSby Jason WEB Security in the Cloudby John Conclusionby Chris ??? -ask 4/15/2010 2
  • 7. Software as a Service SaaS Web Video http://www.youtube.com/watch?v=MHxUzR88A-Y ASP v.sSaaS Summary & Benefits 4/15/2010 7 SaaS PaaS IaaS Cloud Stack
  • 8. ASPs vsSaaS 4/15/2010 8 SaaS PaaS IaaS Cloud Stack
  • 9. SaaS Today 4/15/2010 9 SaaS PaaS IaaS Cloud Stack
  • 10. Summary & Benefits SaaStifaction Benefits: Quicker time to value Lower cost of ownership Higher return on investment Greater scalability and agility State-of-the-Industry/State-of-the-Art 4/15/2010 10 SaaS PaaS IaaS Cloud Stack
  • 11. Platform as a Service Force.com boasts to be fastest way to build custom cloud apps and Web sites With Force.com, you can build and deliver applications 5 times faster, at about ½ the cost of traditional software platforms. They deliver a complete platform with a simplified programming model so just about any business can use it to build apps. SaaS PaaS IaaS Cloud Stack 4/15/2010 11
  • 12. Platform as a Service – Force.com features Unlimited real-time database customizations Every application links with a database that stores information about your business’ employees, events, or inventory. Force.com enables users to easily setup a database with walkthrough wizards that aid in building custom objects and relationships. Programmable user interface Force.com can automatically generate a rich user interface (dashboard). Or a developer can build their own UI with Web technologies such as JavaScript, Flash, or CSS. Programmable cloud logic Apps need business logic to ensure rules and calculate results or deal with exceptions. Fore.com has an easy-to-use formula language similar to Excel. It also includes programming language and Eclipse-based IDE developers can use to write their on code that runs on Force.com Visual process manager Most business process can be mapped out with Force.com’s visual process manager and point-and-click workflow. You can rapidly build application wizards, design multi-step processes, and automate manual tasks including approvals, assign tasks, send out alerts and send messages. 4/15/2010 12 SaaS PaaS IaaS Cloud Stack
  • 13. Platform as a Service SaaS PaaS IaaS Cloud Stack Force.com video: http://www.youtube.com/watch?v=EzE6haADxRc 4/15/2010 13
  • 14. Infrastructure as a Service Aka “Utility” as a Service; on-demand, metered IaaS is lower on the cloud stack or “down stack” and closest to the hardware IaaS provides the underlying hardware and operating system resources IaaS offers CPU, memory, storage, networking and security as a package. Infrastructure can include firewalls, virtual private networks (VPNs), virtual machines (VMs), routers, switches, physical servers, and storage/databases. 4/15/2010 14 SaaS PaaS IaaS Cloud Stack
  • 15. Virtualization Cloud computing is a set of pooled resources delivered over the internet. To pool resources we use virtualization. Virtualization – used to create logical versions of a physical device or operating system. Device can be server, storage or network equip. Two types of virtualization: Segmentation Aggregation 4/15/2010 15 SaaS PaaS IaaS Cloud Stack
  • 16. Virtualization Segmentation - enables many virtual instances within a single physical device *Take advantage of underutilized resources SaaS PaaS IaaS Cloud Stack Application Application Application OS OS OS 4/15/2010 16
  • 17. Virtualization Aggregation – enables multiple physical devices to be represented by a single virtual instance. Allows physical resources to be added to a cluster as needed = “on-demand”. Provides scalability Manifested in today’s utility or grid computing. 4/15/2010 17 SaaS PaaS IaaS Cloud Stack
  • 18. Segmentation + Aggregation Consider the benefits of having a single server virtual machine (leveraging segmentation) depend upon a network-attached storage array as its “disk” (leveraging aggregation). => Runtime isolation and storage scalability IAAS providers have used the combination of segmentation and aggregation to allow customers to: Pay as they go for the services they use. While being able to scale up or down. 4/15/2010 18 SaaS PaaS IaaS Cloud Stack
  • 19. Benefitsof IaaS Access to expensive hardware -incl. servers on an as need basis without considerable set-up and maintenance costs. Cost savings also includes: IT staff Storage space Energy bills Scalability – adjust your settings online to add or remove resources based on business needs. 4/15/2010 19 SaaS PaaS IaaS Cloud Stack
  • 20. Benefitsof IaaS(cont.) Access to backup, security, and data management services. Service providers are able to very quickly make copies of a virtual environment to provide back-up services, and testing environments or “sandboxes”. Don’t have to physically move machines to relocate employee. Increased efficiency of existing resources due to virtualization. 4/15/2010 20 SaaS PaaS IaaS Cloud Stack
  • 21. Risks of IaaS Large concern is Loss of Control In an IaaS offering the responsibility for securing: The underlying infrastructure and abstraction layers belongs to the provider, The remainder of the stack is the consumer’s responsibility. Confidentiality can be a concern because data can be moved across multiple networks. 4/15/2010 21 SaaS PaaS IaaS Cloud Stack
  • 22. Service Level Agreement SLA -the only legal agreement between the service provider and client contract that can cover a wide range of issues: Defining service Performance management Problem management Customer’s duties and responsibilities Security Disaster recovery Business continuity 4/15/2010 22 SaaS PaaS IaaS Cloud Stack
  • 23. Trusting the Virtual Machine Image IaaS providers make a vast number of virtual machine images available to their customers Some of these virtual machine images are provided by the IaaS provider itself, but some are provided by other customers. virtual image should undergo the same level of security verification and hardening for hosts within the enterprise. Options: provide your own image or get from trusted host. 4/15/2010 23 SaaS PaaS IaaS Cloud Stack
  • 24.
  • 25. Hardening Hosts (cont.) A best practice for cloud-based applications is to build custom operating systems and application platform images that have only the capabilities necessary to support the application stack. Limits the overall attack surface of the host. Greatly reduces the number of patches needed to keep that application stack secure. 4/15/2010 25 SaaS PaaS IaaS Cloud Stack
  • 26. Securing Inter-host Communication Hosts are running in a shared infrastructure with other companies so it is important to secure the communication in a cloud-based application. Administrators that maintain the data center running the hosts and network should not be afforded the same level of trust as administrators of an internal data center. 4/15/2010 26 SaaS PaaS IaaS Cloud Stack
  • 27. IaaS Provider example Amazon Web Services – uses the same global computing infrastructure that Amazon.com uses for their retail business. Amazon’s scalable, reliable, and secure distributed computing infrastructure has been honed for over 13 years. Services include: Amazon Elastic Compute Cloud (Amazon EC2™) Amazon Simple Storage Service (Amazon S3™) Amazon CloudFront™ Amazon SimpleDB™ Amazon Simple Queue Service (Amazon SQS™) 4/15/2010 27 SaaS PaaS IaaS Cloud Stack
  • 28. Security features of AWS Amazon EC2’s instances cannot send spoofed network traffic. Port scanning is a violation of Amazons policy, when unauthorized port scanning occurs it is automatically stopped and blocked. To help prevent man in the middle attacks all of the AWS APIs are available via SSL-protected endpoints which provide server authentication. Packet sniffing by other tenants is mitigated since it is not possible for a virtual instance running in promiscuous mode to receive or “sniff” traffic that is intended for a different virtual instance. 4/15/2010 28 SaaS PaaS IaaS Cloud Stack
  • 29. Cloud Standard Organizations and Task Forces Risks in Cloud Computing Legal Issues in Cloud Computing Security in the Cloud 4/15/2010 29
  • 30.
  • 31. National Institute of Standards and Technology (NIST)
  • 32. American Institute of Certified Public Accountants (AICPA)
  • 33. Distributed Management Task Force (DMTF)4/15/2010 30
  • 34. Security in the Cloud Risks in Cloud Computing Standards Risk Operational Risk Security Risk Compliance Risk 4/15/2010 31
  • 35. Security in the Cloud Risks in Cloud Computing Standards Risk Standards do not yet exist CSA, NIST AICPA and DTMF developing a set of standards for Cloud Computing Standards will apply to security, operational auditing and compliance 4/15/2010 32
  • 36. Security in the Cloud Risks in Cloud Computing Operational Risk Primary Risk Firm’s data is now housed and controlled by the Cloud Provider Safety and control of a firm’s data Other Risks Data Segregation Disaster Recovery 4/15/2010 33
  • 37. Security in the Cloud Risks in Cloud Computing Security Risk Primary Risk Unauthorized access to a firm’s data and processes Authentication and Authorization Controlled at the Cloud Provider and not at the firm Federated SOA authentication may be a future option On-line Identity SOA’s now exist 4/15/2010 34
  • 38.
  • 40. Firms are ultimately responsible for compliance to Federal and State regulatory laws
  • 41. Health Insurance Portability and Privacy Act – (HIPPA)
  • 42. Personal medical information for the Insurance and Medical Industry
  • 43. Sarbanes-Oxley Act of 2002 (SOX)
  • 44. Covers reporting and accounting of corporate income and operating expenses4/15/2010 35
  • 45. Security in the Cloud Legal Issues in Cloud Computing Legal Short List Trans Border Information Flow Data on the cloud may be subject to the laws of multiple jurisdictions Cyber Attacks Impact large population of unrelated users New Data Privacy Laws Businesses may be legally barred from placing certain kinds of information on the cloud 4/15/2010 36