SlideShare a Scribd company logo
1 of 41
Download to read offline
Cloud Computing:
                                          Finding the Silver Lining
                                             Steve Hanna, Juniper Networks




Copyright © 2009 Juniper Networks, Inc.                                      1
Agenda
           What is Cloud Computing?
           Security Analysis of Cloud Computing
           Conclusions




Copyright © 2009 Juniper Networks, Inc.            2
Agenda
           What is Cloud Computing?
           Security Analysis of Cloud Computing
           Conclusions




Copyright © 2009 Juniper Networks, Inc.            3
Cloud Computing Defined
           Dynamically scalable shared resources
            accessed over a network
                •  Only pay for what you use
                •  Shared internally or with other customers
                •  Resources = storage, computing, services, etc.
                •  Internal network or Internet

           Notes
                •  Similar to Timesharing
                           •  Rent IT resources vs. buy
                •  New term – definition still being developed

Copyright © 2009 Juniper Networks, Inc.                             4
Conventional Data Center

                                                                 Data
                                                                Center
                                          Data
                                                 Applications


                                          Enterprise
                                             LAN


       Office User
                                                                         Internet




                                           Remote User


Copyright © 2009 Juniper Networks, Inc.                                             5
Cloud Computing Model                                        Enterprise 2

                                                                                             Cloud
                                                                                            Provider
              Enterprise 1                               Enterprise
                                                            LAN

                                                                                     Data
                                                                                            Applications
                                          Enterprise
                                             LAN


       Office User
                                                                 Internet




                                           Remote User


Copyright © 2009 Juniper Networks, Inc.                                                                    6
Many Flavors of Cloud Computing
           SaaS – Software as a Service
                •  Network-hosted application

           DaaS – Data as a Service
                •  Customer queries against provider’s database

           PaaS– Platform as a Service
                •  Network-hosted software development platform

           IaaS – Infrastructure as a Service
                •  Provider hosts customer VMs or provides network storage

           IPMaaS – Identity and Policy Management as a Service
                •  Provider manages identity and/or access control policy for customer

           NaaS – Network as a Service
                •  Provider offers virtualized networks (e.g. VPNs)


Copyright © 2009 Juniper Networks, Inc.                                                  7
Cloud Computing Providers
                           DaaS           SaaS                   PaaS
  IPM Software & Data




                                          IPMaaS
     Infrastructure




                                 NaaS                IaaS (DC/server)
Copyright © 2009 Juniper Networks, Inc.                                 8
Cloud Computing Pros and Cons


                                                                    Compliance/regulatory
                                                                    laws mandate on-site
                                                  Pros                ownership of data
                                              Reduced costs

                                    Resource sharing is more         Security and privacy
                                           efficient                 Latency & bandwidth
                                                                          guarantees
                                          Management moves to       Absence of robust SLAs
                                             cloud provider
                                                                      Uncertainty around
                                     Consumption based cost             interoperability,
                                                                      portability & lock in
                                           Faster time to roll
                                            out new services        Availability & reliability
                                            Dynamic resource
                                          availability for crunch         Inhibitors
                                                  periods


Copyright © 2009 Juniper Networks, Inc.                                                          9
Who’s using Clouds today?




Copyright © 2009 Juniper Networks, Inc.   10
Example: Mogulus
           Mogulus is a live broadcast platform on the internet.
            (cloud customer)
                •  Producers can use the Mogulus browser-based Studio application
                   to create LIVE, scheduled and on-demand internet television to
                   broadcast anywhere on the web through a single player widget.

           Mogulus is entirely hosted on cloud (cloud provider)

           On Election night Mogulus ramped to:
                •  87000 videos @500kbps = 43.5 Gbps
                •  http://www.mogulus.com




Copyright © 2009 Juniper Networks, Inc.                                             11
Example: Animoto
           Animoto is a video rendering & production house with
            service available over the Internet
             (cloud customer)
              •  With their patent-pending technology and high-end motion design,
                 each video is a fully customized orchestration of user-selected
                 images and music in several formats, including DVD.
           Animoto is entirely hosted on cloud
             (cloud provider)

           Released Facebook App: users were able to easily render
            their photos into MTV like videos
                •    Ramped from 25,000 users to 250,000 users in three days
                •    Signing up 20,000 new users per hour at peak
                •    Went from 50 to 3500 servers in 5 days
                •    Two weeks later scaled back to 100 servers
                •  http://www.animoto.com


Copyright © 2009 Juniper Networks, Inc.                                             12
Example: New York Times
           Timesmachine is a news archive of the
            NY Times available in pdf over the
            Internet to newspaper subscribers
            (cloud customer)

           Timesmachine is entirely hosted on
            cloud (cloud provider)

           Timesmachine needed infrastructure
            to host several terabits of data
             •  Internal IT rejected due to cost
             •  Business owners got the data up on
                cloud for $50 over one weekend
             •  http://timesmachine.nytimes.com

Copyright © 2009 Juniper Networks, Inc.              13
Example: Eli Lilly
           Eli Lilly is the 10th largest pharmaceutical
            company in the world
            (cloud customer)

           Moved entire R&D environment to
            cloud (cloud provider)

           Results:
                •  Reduced costs
                •  Global access to R&D applications
                •  Rapid transition due to VM hosting

                •  Time to deliver new services greatly reduced:
                           •  New server: 7.5 weeks down to 3 minutes
                           •  New collaboration: 8 weeks down to 5
                              minutes
                           •  64 node linux cluster: 12 weeks down to 5
                              minutes




Copyright © 2009 Juniper Networks, Inc.                                   14
Who’s using Clouds today?
           Startups & Small businesses
                •  Can use clouds for everything
                           •  SaaS, IaaS, collaboration services, online presence


           Mid-Size Enterprises
                •  Can use clouds for many things
                           •  Compute cycles for R&D projects, online collaboration, partner
                              integration, social networking, new business tools


           Large Enterprises
                •  More likely to have hybrid models where they keep some things in
                   house
                           •  On premises data for legal and risk management reasons

Copyright © 2009 Juniper Networks, Inc.                                                        15
Agenda
           What is Cloud Computing?
           Security Analysis of Cloud Computing
           Conclusions




Copyright © 2009 Juniper Networks, Inc.            16
Information Security Risk Management
         Process (ISO 27005)
           Establish Context
           Risk Assessment
                •  Identify Risks
                           •    Identify Assets
                           •    Identify Threats
                           •    Identify Existing Controls
                           •    Identify Vulnerabilities
                           •    Identify Consequences
                •  Estimate Risks
                •  Evaluate Risks
           Develop Risk Treatment Plan
                •  Reduce, Retain, Avoid, or Transfer Risks
           Risk Acceptance
           Implement Risk Treatment Plan
           Monitor and Review Risks

Copyright © 2009 Juniper Networks, Inc.                       17
Streamlined Security Analysis Process
           Identify Assets
                •  Which assets are we trying to protect?
                •  What properties of these assets must be maintained?

           Identify Threats
                •  What attacks can be mounted?
                •  What other threats are there (natural disasters, etc.)?

           Identify Countermeasures
                •  How can we counter those attacks?

           Appropriate for Organization-Independent Analysis
                •  We have no organizational context or policies


Copyright © 2009 Juniper Networks, Inc.                                      18
Identify Assets




Copyright © 2009 Juniper Networks, Inc.   19
Conventional Data Center

                                                                 Data
                                                                Center
                                          Data
                                                 Applications


                                          Enterprise
                                             LAN


       Office User
                                                                         Internet




                                           Remote User


Copyright © 2009 Juniper Networks, Inc.                                             20
Cloud Computing Model                                        Enterprise 2

                                                                                             Cloud
                                                                                            Provider
              Enterprise 1                               Enterprise
                                                            LAN

                                                                                     Data
                                                                                            Applications
                                          Enterprise
                                             LAN


       Office User
                                                                 Internet




                                           Remote User


Copyright © 2009 Juniper Networks, Inc.                                                                    21
Identify Assets
           Customer Data


           Customer Applications


           Client Computing Devices




Copyright © 2009 Juniper Networks, Inc.   22
Information Security Principles (Triad)
           C I A

                •  Confidentiality
                           •  Prevent unauthorized disclosure

                •  Integrity
                           •  Preserve information integrity

                •  Availability
                           •  Ensure information is available when needed



Copyright © 2009 Juniper Networks, Inc.                                     23
Identify Assets & Principles
           Customer Data
                •  Confidentiality, integrity, and availability

           Customer Applications
                •  Confidentiality, integrity, and availability

           Client Computing Devices
                •  Confidentiality, integrity, and availability




Copyright © 2009 Juniper Networks, Inc.                           24
Identify Threats




Copyright © 2009 Juniper Networks, Inc.   25
Cloud Computing Model                                        Enterprise 2

                                                                                             Cloud
                                                                                            Provider
              Enterprise 1                               Enterprise
                                                            LAN

                                                                                     Data
                                                                                            Applications
                                          Enterprise
                                             LAN


       Office User
                                                                 Internet




                                           Remote User


Copyright © 2009 Juniper Networks, Inc.                                                                    26
Identify Threats
           Failures in Provider Security

           Attacks by Other Customers

           Availability and Reliability Issues

           Legal and Regulatory Issues

           Perimeter Security Model Broken

           Integrating Provider and Customer Security Systems


Copyright © 2009 Juniper Networks, Inc.                          27
Failures in Provider Security
           Explanation
                •  Provider controls servers, network, etc.
                •  Customer must trust provider’s security
                •  Failures may violate CIA principles

           Countermeasures
                •  Verify and monitor provider’s security

           Notes
                •  Outside verification may suffice
                •  For SMB, provider security may exceed customer
                   security
Copyright © 2009 Juniper Networks, Inc.                             28
Attacks by Other Customers
           Threats
                •  Provider resources shared with untrusted parties
                           •  CPU, storage, network
                •  Customer data and applications must be separated
                •  Failures will violate CIA principles

           Countermeasures
                •  Hypervisors for compute separation
                •  MPLS, VPNs, VLANs, firewalls for network separation
                •  Cryptography (strong)
                •  Application-layer separation (less strong)
Copyright © 2009 Juniper Networks, Inc.                                  29
Availability and Reliability Issues
           Threats
                •  Clouds may be less available than in-house IT
                           •    Complexity increases chance of failure
                           •    Clouds are prominent attack targets
                           •    Internet reliability is spotty
                           •    Shared resources may provide attack vectors
                           •    BUT cloud providers focus on availability

           Countermeasures
                •  Evaluate provider measures to ensure availability
                •  Monitor availability carefully
                •  Plan for downtime
                •  Use public clouds for less essential applications
Copyright © 2009 Juniper Networks, Inc.                                       30
Legal and Regulatory Issues
           Threats
                •  Laws and regulations may prevent cloud computing
                           •  Requirements to retain control
                           •  Certification requirements not met by provider
                           •  Geographical limitations – EU Data Privacy
                •  New locations may trigger new laws and regulations

           Countermeasures
                •  Evaluate legal issues
                •  Require provider compliance with laws and regulations
                •  Restrict geography as needed

Copyright © 2009 Juniper Networks, Inc.                                        31
Perimeter Security Model Broken




Copyright © 2009 Juniper Networks, Inc.    32
Perimeter Security Model

                                                                 Data
                                                                Center
                                          Data
                                                 Applications
               Safe Zone
                                          Enterprise
                                             LAN


                         Office User
                                                                         Internet




                                           Remote User


Copyright © 2009 Juniper Networks, Inc.                                             33
Perimeter Security with Cloud Computing?
                                                                      Enterprise 2

                                                                                             Cloud
                                                                                            Provider
              Enterprise 1                               Enterprise
                                                            LAN

                                                                                     Data
                                                                                            Applications
                                          Enterprise
                                             LAN


       Office User
                                                                 Internet




                                           Remote User


Copyright © 2009 Juniper Networks, Inc.                                                                    34
Perimeter Security Model Broken
           Threats
                •  Including the cloud in your perimeter
                           •  Lets attackers inside the perimeter
                           •  Prevents mobile users from accessing the cloud directly
                •  Not including the cloud in your perimeter
                           •  Essential services aren’t trusted
                           •  No access controls on cloud


           Countermeasures
                •  Drop the perimeter model!


Copyright © 2009 Juniper Networks, Inc.                                                 35
Integrating Provider and Customer Security
           Threat
                •  Disconnected provider and customer security systems
                           •  Fired employee retains access to cloud
                           •  Misbehavior in cloud not reported to customer

           Countermeasures
                •  At least, integrate identity management
                           •  Consistent access controls
                •  Better, integrate monitoring and notifications

           Notes
                •  Can use SAML, LDAP, RADIUS, XACML, IF-MAP, etc.

Copyright © 2009 Juniper Networks, Inc.                                       36
Agenda
           What is Cloud Computing?
           Security Analysis of Cloud Computing
           Conclusions




Copyright © 2009 Juniper Networks, Inc.            37
Bottom Line on Cloud Computing Security
           Engage in full risk management process for each case

           For small and medium organizations
                •  Cloud security may be a big improvement!
                •  Cost savings may be large (economies of scale)

           For large organizations
                •  Already have large, secure data centers
                •  Main sweet spots:
                           •  Elastic services
                           •  Internet-facing services

           Employ countermeasures listed above


Copyright © 2009 Juniper Networks, Inc.                             38
Security Analysis Skills Reviewed Today
           Information Security Risk Management Process
                •  Variations used throughout IT industry
                           •  ISO 27005, NIST SP 800-30, etc.
                •  Requires thorough knowledge of threats and controls
                •  Bread and butter of InfoSec – Learn it!
                •  Time-consuming but not difficult

           Streamlined Security Analysis Process
                •  Many variations
                           •  RFC 3552, etc.
                •    Requires thorough knowledge of threats and controls
                •    Useful for organization-independent analysis
                •    Practice this on any RFC or other standard
                •    Become able to do it in 10 minutes

Copyright © 2009 Juniper Networks, Inc.                                    39
Discussion




Copyright © 2009 Juniper Networks, Inc.                40
Copyright © 2009 Juniper Networks, Inc.   41

More Related Content

What's hot

SECURE CLOUD ARCHITECTURE
SECURE CLOUD ARCHITECTURESECURE CLOUD ARCHITECTURE
SECURE CLOUD ARCHITECTUREacijjournal
 
Data Confidentiality in Cloud Computing
Data Confidentiality in Cloud ComputingData Confidentiality in Cloud Computing
Data Confidentiality in Cloud ComputingRitesh Dwivedi
 
Chap 6 cloud security
Chap 6 cloud securityChap 6 cloud security
Chap 6 cloud securityRaj Sarode
 
Security in cloud computing
Security in cloud computingSecurity in cloud computing
Security in cloud computingveena venugopal
 
Cloud security and security architecture
Cloud security and security architectureCloud security and security architecture
Cloud security and security architectureVladimir Jirasek
 
Cloud Computing Security Issues in Infrastructure as a Service”
Cloud Computing Security Issues in Infrastructure as a Service”Cloud Computing Security Issues in Infrastructure as a Service”
Cloud Computing Security Issues in Infrastructure as a Service”Vivek Maurya
 
Cloud computing and data security
Cloud computing and data securityCloud computing and data security
Cloud computing and data securityMohammed Fazuluddin
 
Cloud Computing Security Challenges
Cloud Computing Security ChallengesCloud Computing Security Challenges
Cloud Computing Security ChallengesYateesh Yadav
 
Cloud computing and its security issues
Cloud computing and its security issuesCloud computing and its security issues
Cloud computing and its security issuesJyoti Srivastava
 
Cloud Security ("securing the cloud")
Cloud Security ("securing the cloud")Cloud Security ("securing the cloud")
Cloud Security ("securing the cloud")Vic Winkler
 
Cloud Security - Security Aspects of Cloud Computing
Cloud Security - Security Aspects of Cloud ComputingCloud Security - Security Aspects of Cloud Computing
Cloud Security - Security Aspects of Cloud ComputingJim Geovedi
 
SOME SECURITY CHALLENGES IN CLOUD COMPUTING
SOME SECURITY CHALLENGES  IN CLOUD COMPUTINGSOME SECURITY CHALLENGES  IN CLOUD COMPUTING
SOME SECURITY CHALLENGES IN CLOUD COMPUTINGHoang Nguyen
 
Security & Privacy In Cloud Computing
Security & Privacy In Cloud ComputingSecurity & Privacy In Cloud Computing
Security & Privacy In Cloud Computingsaurabh soni
 
Security issue in cloud by himanshu tiwari
Security issue in cloud by himanshu tiwariSecurity issue in cloud by himanshu tiwari
Security issue in cloud by himanshu tiwaribhanu krishna
 
Cloud Computing Security Organization Assessments Service Categories Responsi...
Cloud Computing Security Organization Assessments Service Categories Responsi...Cloud Computing Security Organization Assessments Service Categories Responsi...
Cloud Computing Security Organization Assessments Service Categories Responsi...SlideTeam
 

What's hot (20)

SECURE CLOUD ARCHITECTURE
SECURE CLOUD ARCHITECTURESECURE CLOUD ARCHITECTURE
SECURE CLOUD ARCHITECTURE
 
Data Confidentiality in Cloud Computing
Data Confidentiality in Cloud ComputingData Confidentiality in Cloud Computing
Data Confidentiality in Cloud Computing
 
Chap 6 cloud security
Chap 6 cloud securityChap 6 cloud security
Chap 6 cloud security
 
Security in cloud computing
Security in cloud computingSecurity in cloud computing
Security in cloud computing
 
Cloud security and security architecture
Cloud security and security architectureCloud security and security architecture
Cloud security and security architecture
 
Cloud Computing Security Issues in Infrastructure as a Service”
Cloud Computing Security Issues in Infrastructure as a Service”Cloud Computing Security Issues in Infrastructure as a Service”
Cloud Computing Security Issues in Infrastructure as a Service”
 
Cloud computing and data security
Cloud computing and data securityCloud computing and data security
Cloud computing and data security
 
Cloud Computing Security Challenges
Cloud Computing Security ChallengesCloud Computing Security Challenges
Cloud Computing Security Challenges
 
Cloud Encryption
Cloud EncryptionCloud Encryption
Cloud Encryption
 
Cloud security
Cloud security Cloud security
Cloud security
 
Authentication cloud
Authentication cloudAuthentication cloud
Authentication cloud
 
Cloud computing and its security issues
Cloud computing and its security issuesCloud computing and its security issues
Cloud computing and its security issues
 
Cloud Security ("securing the cloud")
Cloud Security ("securing the cloud")Cloud Security ("securing the cloud")
Cloud Security ("securing the cloud")
 
Cloud Security - Security Aspects of Cloud Computing
Cloud Security - Security Aspects of Cloud ComputingCloud Security - Security Aspects of Cloud Computing
Cloud Security - Security Aspects of Cloud Computing
 
SOME SECURITY CHALLENGES IN CLOUD COMPUTING
SOME SECURITY CHALLENGES  IN CLOUD COMPUTINGSOME SECURITY CHALLENGES  IN CLOUD COMPUTING
SOME SECURITY CHALLENGES IN CLOUD COMPUTING
 
Security & Privacy In Cloud Computing
Security & Privacy In Cloud ComputingSecurity & Privacy In Cloud Computing
Security & Privacy In Cloud Computing
 
Security issue in cloud by himanshu tiwari
Security issue in cloud by himanshu tiwariSecurity issue in cloud by himanshu tiwari
Security issue in cloud by himanshu tiwari
 
Cloud Computing & Security Concerns
Cloud Computing & Security ConcernsCloud Computing & Security Concerns
Cloud Computing & Security Concerns
 
Cloud Computing Security Issues
Cloud Computing Security Issues Cloud Computing Security Issues
Cloud Computing Security Issues
 
Cloud Computing Security Organization Assessments Service Categories Responsi...
Cloud Computing Security Organization Assessments Service Categories Responsi...Cloud Computing Security Organization Assessments Service Categories Responsi...
Cloud Computing Security Organization Assessments Service Categories Responsi...
 

Viewers also liked

Cloud computing security - Insights
Cloud computing security - InsightsCloud computing security - Insights
Cloud computing security - Insightsgiorgiacaleffi
 
Cloud computing & Security presentation
Cloud computing & Security presentationCloud computing & Security presentation
Cloud computing & Security presentationParveen Yadav
 
Cloud Computing - Security Benefits and Risks
Cloud Computing - Security Benefits and RisksCloud Computing - Security Benefits and Risks
Cloud Computing - Security Benefits and RisksWilliam McBorrough
 
Cloud computing security
Cloud computing security Cloud computing security
Cloud computing security Akhila Param
 
Cloud Computing and Security - ISACA Hyderabad Chapter Presentation
Cloud Computing and Security - ISACA Hyderabad Chapter PresentationCloud Computing and Security - ISACA Hyderabad Chapter Presentation
Cloud Computing and Security - ISACA Hyderabad Chapter PresentationVenkateswar Reddy Melachervu
 
Cloud computing-security-issues
Cloud computing-security-issuesCloud computing-security-issues
Cloud computing-security-issuesAleem Mohammed
 
2013 State of Cloud Survey SMB Results
2013 State of Cloud Survey SMB Results2013 State of Cloud Survey SMB Results
2013 State of Cloud Survey SMB ResultsSymantec
 
Breaking through the Clouds
Breaking through the CloudsBreaking through the Clouds
Breaking through the CloudsAndy Piper
 
2013 Future of Cloud Computing - 3rd Annual Survey Results
2013 Future of Cloud Computing - 3rd Annual Survey Results2013 Future of Cloud Computing - 3rd Annual Survey Results
2013 Future of Cloud Computing - 3rd Annual Survey ResultsMichael Skok
 
Intro to cloud computing — MegaCOMM 2013, Jerusalem
Intro to cloud computing — MegaCOMM 2013, JerusalemIntro to cloud computing — MegaCOMM 2013, Jerusalem
Intro to cloud computing — MegaCOMM 2013, JerusalemReuven Lerner
 
Can we hack open source #cloud platforms to help reduce emissions?
Can we hack open source #cloud platforms to help reduce emissions?Can we hack open source #cloud platforms to help reduce emissions?
Can we hack open source #cloud platforms to help reduce emissions?Tom Raftery
 
Summer School Scale Cloud Across the Enterprise
Summer School   Scale Cloud Across the EnterpriseSummer School   Scale Cloud Across the Enterprise
Summer School Scale Cloud Across the EnterpriseWSO2
 
Simplifying The Cloud Top 10 Questions By SMBs
Simplifying The Cloud Top 10 Questions By SMBsSimplifying The Cloud Top 10 Questions By SMBs
Simplifying The Cloud Top 10 Questions By SMBsSun Digital, Inc.
 
Penetrating the Cloud: Opportunities & Challenges for Businesses
Penetrating the Cloud: Opportunities & Challenges for BusinessesPenetrating the Cloud: Opportunities & Challenges for Businesses
Penetrating the Cloud: Opportunities & Challenges for BusinessesCompTIA
 
The Inevitable Cloud Outage
The Inevitable Cloud OutageThe Inevitable Cloud Outage
The Inevitable Cloud OutageNewvewm
 
Avoiding Cloud Outage
Avoiding Cloud OutageAvoiding Cloud Outage
Avoiding Cloud OutageNati Shalom
 
LinuxFest NW 2013: Hitchhiker's Guide to Open Source Cloud Computing
LinuxFest NW 2013: Hitchhiker's Guide to Open Source Cloud ComputingLinuxFest NW 2013: Hitchhiker's Guide to Open Source Cloud Computing
LinuxFest NW 2013: Hitchhiker's Guide to Open Source Cloud ComputingMark Hinkle
 

Viewers also liked (20)

Cloud computing security - Insights
Cloud computing security - InsightsCloud computing security - Insights
Cloud computing security - Insights
 
Cloud computing & Security presentation
Cloud computing & Security presentationCloud computing & Security presentation
Cloud computing & Security presentation
 
Cloud Computing - Security Benefits and Risks
Cloud Computing - Security Benefits and RisksCloud Computing - Security Benefits and Risks
Cloud Computing - Security Benefits and Risks
 
Cloud computing security
Cloud computing securityCloud computing security
Cloud computing security
 
Cloud computing security
Cloud computing security Cloud computing security
Cloud computing security
 
Security in cloud computing
Security in cloud computingSecurity in cloud computing
Security in cloud computing
 
Cloud Computing and Security - ISACA Hyderabad Chapter Presentation
Cloud Computing and Security - ISACA Hyderabad Chapter PresentationCloud Computing and Security - ISACA Hyderabad Chapter Presentation
Cloud Computing and Security - ISACA Hyderabad Chapter Presentation
 
Cloud computing-security-issues
Cloud computing-security-issuesCloud computing-security-issues
Cloud computing-security-issues
 
2013 State of Cloud Survey SMB Results
2013 State of Cloud Survey SMB Results2013 State of Cloud Survey SMB Results
2013 State of Cloud Survey SMB Results
 
Breaking through the Clouds
Breaking through the CloudsBreaking through the Clouds
Breaking through the Clouds
 
2013 Future of Cloud Computing - 3rd Annual Survey Results
2013 Future of Cloud Computing - 3rd Annual Survey Results2013 Future of Cloud Computing - 3rd Annual Survey Results
2013 Future of Cloud Computing - 3rd Annual Survey Results
 
Intro to cloud computing — MegaCOMM 2013, Jerusalem
Intro to cloud computing — MegaCOMM 2013, JerusalemIntro to cloud computing — MegaCOMM 2013, Jerusalem
Intro to cloud computing — MegaCOMM 2013, Jerusalem
 
Cloud security ppt
Cloud security pptCloud security ppt
Cloud security ppt
 
Can we hack open source #cloud platforms to help reduce emissions?
Can we hack open source #cloud platforms to help reduce emissions?Can we hack open source #cloud platforms to help reduce emissions?
Can we hack open source #cloud platforms to help reduce emissions?
 
Summer School Scale Cloud Across the Enterprise
Summer School   Scale Cloud Across the EnterpriseSummer School   Scale Cloud Across the Enterprise
Summer School Scale Cloud Across the Enterprise
 
Simplifying The Cloud Top 10 Questions By SMBs
Simplifying The Cloud Top 10 Questions By SMBsSimplifying The Cloud Top 10 Questions By SMBs
Simplifying The Cloud Top 10 Questions By SMBs
 
Penetrating the Cloud: Opportunities & Challenges for Businesses
Penetrating the Cloud: Opportunities & Challenges for BusinessesPenetrating the Cloud: Opportunities & Challenges for Businesses
Penetrating the Cloud: Opportunities & Challenges for Businesses
 
The Inevitable Cloud Outage
The Inevitable Cloud OutageThe Inevitable Cloud Outage
The Inevitable Cloud Outage
 
Avoiding Cloud Outage
Avoiding Cloud OutageAvoiding Cloud Outage
Avoiding Cloud Outage
 
LinuxFest NW 2013: Hitchhiker's Guide to Open Source Cloud Computing
LinuxFest NW 2013: Hitchhiker's Guide to Open Source Cloud ComputingLinuxFest NW 2013: Hitchhiker's Guide to Open Source Cloud Computing
LinuxFest NW 2013: Hitchhiker's Guide to Open Source Cloud Computing
 

Similar to Cloud Computing Security

Cccc net app_wallacefung
Cccc net app_wallacefungCccc net app_wallacefung
Cccc net app_wallacefungCloud Congress
 
CCCC NetApp Wallace Fung
CCCC NetApp Wallace FungCCCC NetApp Wallace Fung
CCCC NetApp Wallace FungCloud Congress
 
Cloud Computing for Beginners
Cloud Computing for Beginners Cloud Computing for Beginners
Cloud Computing for Beginners Suman Singh
 
The Ever Changing Cloud, CloudExpo 2012
The Ever Changing Cloud, CloudExpo 2012The Ever Changing Cloud, CloudExpo 2012
The Ever Changing Cloud, CloudExpo 2012Lew Tucker
 
Opportunites and Challenges in Cloud COmputing
Opportunites and Challenges in Cloud COmputingOpportunites and Challenges in Cloud COmputing
Opportunites and Challenges in Cloud COmputingACMBangalore
 
How Cloud Providers' Business Needs Drive Enterprise Identity & Security
How Cloud Providers' Business Needs Drive Enterprise Identity & SecurityHow Cloud Providers' Business Needs Drive Enterprise Identity & Security
How Cloud Providers' Business Needs Drive Enterprise Identity & SecurityNovell
 
Build 4 The Cloud By Cisco V Mware2
Build 4 The Cloud By Cisco V Mware2Build 4 The Cloud By Cisco V Mware2
Build 4 The Cloud By Cisco V Mware2Azlan NL
 
Cloud Computing at UTM Shillong
Cloud Computing at UTM ShillongCloud Computing at UTM Shillong
Cloud Computing at UTM ShillongCapgemini
 
Cloud Networking: Network aspects of the cloud
Cloud Networking: Network aspects of the cloudCloud Networking: Network aspects of the cloud
Cloud Networking: Network aspects of the cloudSAIL
 
Programmable WAN Networking is SFW (Open Networking Summit version)
Programmable WAN Networking is SFW (Open Networking Summit version)Programmable WAN Networking is SFW (Open Networking Summit version)
Programmable WAN Networking is SFW (Open Networking Summit version)Juniper Networks
 
IBM Global Technology Services - Resilience - The Silver Lining to Cloud Comp...
IBM Global Technology Services - Resilience - The Silver Lining to Cloud Comp...IBM Global Technology Services - Resilience - The Silver Lining to Cloud Comp...
IBM Global Technology Services - Resilience - The Silver Lining to Cloud Comp...Vincent Kwon
 
Day 3 p4 - cloud strategy
Day 3   p4 - cloud strategyDay 3   p4 - cloud strategy
Day 3 p4 - cloud strategyLilian Schaffer
 
Day 3 p4 - cloud strategy
Day 3   p4 - cloud strategyDay 3   p4 - cloud strategy
Day 3 p4 - cloud strategyLilian Schaffer
 
Ronny haraldsvik new managed services
Ronny haraldsvik new managed servicesRonny haraldsvik new managed services
Ronny haraldsvik new managed servicesPranowo Budi Sulistyo
 
Who owns security in the cloud
Who owns security in the cloudWho owns security in the cloud
Who owns security in the cloudTrend Micro
 
Optimizing Cloud Computing with IPv6
Optimizing Cloud Computing with IPv6Optimizing Cloud Computing with IPv6
Optimizing Cloud Computing with IPv6John Rhoton
 

Similar to Cloud Computing Security (20)

Cccc net app_wallacefung
Cccc net app_wallacefungCccc net app_wallacefung
Cccc net app_wallacefung
 
CCCC NetApp Wallace Fung
CCCC NetApp Wallace FungCCCC NetApp Wallace Fung
CCCC NetApp Wallace Fung
 
An enterprise journey in the Cloud
An enterprise journey in the CloudAn enterprise journey in the Cloud
An enterprise journey in the Cloud
 
Cloud Computing for Beginners
Cloud Computing for Beginners Cloud Computing for Beginners
Cloud Computing for Beginners
 
The Ever Changing Cloud, CloudExpo 2012
The Ever Changing Cloud, CloudExpo 2012The Ever Changing Cloud, CloudExpo 2012
The Ever Changing Cloud, CloudExpo 2012
 
Opportunites and Challenges in Cloud COmputing
Opportunites and Challenges in Cloud COmputingOpportunites and Challenges in Cloud COmputing
Opportunites and Challenges in Cloud COmputing
 
How Cloud Providers' Business Needs Drive Enterprise Identity & Security
How Cloud Providers' Business Needs Drive Enterprise Identity & SecurityHow Cloud Providers' Business Needs Drive Enterprise Identity & Security
How Cloud Providers' Business Needs Drive Enterprise Identity & Security
 
Build 4 The Cloud By Cisco V Mware2
Build 4 The Cloud By Cisco V Mware2Build 4 The Cloud By Cisco V Mware2
Build 4 The Cloud By Cisco V Mware2
 
Cloud Computing at UTM Shillong
Cloud Computing at UTM ShillongCloud Computing at UTM Shillong
Cloud Computing at UTM Shillong
 
Cloud Networking: Network aspects of the cloud
Cloud Networking: Network aspects of the cloudCloud Networking: Network aspects of the cloud
Cloud Networking: Network aspects of the cloud
 
Programmable WAN Networking is SFW
Programmable WAN Networking is SFWProgrammable WAN Networking is SFW
Programmable WAN Networking is SFW
 
Programmable WAN Networking is SFW (Open Networking Summit version)
Programmable WAN Networking is SFW (Open Networking Summit version)Programmable WAN Networking is SFW (Open Networking Summit version)
Programmable WAN Networking is SFW (Open Networking Summit version)
 
IBM Global Technology Services - Resilience - The Silver Lining to Cloud Comp...
IBM Global Technology Services - Resilience - The Silver Lining to Cloud Comp...IBM Global Technology Services - Resilience - The Silver Lining to Cloud Comp...
IBM Global Technology Services - Resilience - The Silver Lining to Cloud Comp...
 
Chris millercloud
Chris millercloudChris millercloud
Chris millercloud
 
Day 3 p4 - cloud strategy
Day 3   p4 - cloud strategyDay 3   p4 - cloud strategy
Day 3 p4 - cloud strategy
 
Day 3 p4 - cloud strategy
Day 3   p4 - cloud strategyDay 3   p4 - cloud strategy
Day 3 p4 - cloud strategy
 
Monetizing the Enterprise: Borderless Networks
Monetizing the Enterprise: Borderless NetworksMonetizing the Enterprise: Borderless Networks
Monetizing the Enterprise: Borderless Networks
 
Ronny haraldsvik new managed services
Ronny haraldsvik new managed servicesRonny haraldsvik new managed services
Ronny haraldsvik new managed services
 
Who owns security in the cloud
Who owns security in the cloudWho owns security in the cloud
Who owns security in the cloud
 
Optimizing Cloud Computing with IPv6
Optimizing Cloud Computing with IPv6Optimizing Cloud Computing with IPv6
Optimizing Cloud Computing with IPv6
 

More from Piyush Mittal

More from Piyush Mittal (20)

Power mock
Power mockPower mock
Power mock
 
Design pattern tutorial
Design pattern tutorialDesign pattern tutorial
Design pattern tutorial
 
Reflection
ReflectionReflection
Reflection
 
Gpu archi
Gpu archiGpu archi
Gpu archi
 
Cuda Architecture
Cuda ArchitectureCuda Architecture
Cuda Architecture
 
Intel open mp
Intel open mpIntel open mp
Intel open mp
 
Intro to parallel computing
Intro to parallel computingIntro to parallel computing
Intro to parallel computing
 
Cuda toolkit reference manual
Cuda toolkit reference manualCuda toolkit reference manual
Cuda toolkit reference manual
 
Matrix multiplication using CUDA
Matrix multiplication using CUDAMatrix multiplication using CUDA
Matrix multiplication using CUDA
 
Channel coding
Channel codingChannel coding
Channel coding
 
Basics of Coding Theory
Basics of Coding TheoryBasics of Coding Theory
Basics of Coding Theory
 
Java cheat sheet
Java cheat sheetJava cheat sheet
Java cheat sheet
 
Google app engine cheat sheet
Google app engine cheat sheetGoogle app engine cheat sheet
Google app engine cheat sheet
 
Git cheat sheet
Git cheat sheetGit cheat sheet
Git cheat sheet
 
Vi cheat sheet
Vi cheat sheetVi cheat sheet
Vi cheat sheet
 
Css cheat sheet
Css cheat sheetCss cheat sheet
Css cheat sheet
 
Cpp cheat sheet
Cpp cheat sheetCpp cheat sheet
Cpp cheat sheet
 
Ubuntu cheat sheet
Ubuntu cheat sheetUbuntu cheat sheet
Ubuntu cheat sheet
 
Php cheat sheet
Php cheat sheetPhp cheat sheet
Php cheat sheet
 
oracle 9i cheat sheet
oracle 9i cheat sheetoracle 9i cheat sheet
oracle 9i cheat sheet
 

Recently uploaded

SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 

Recently uploaded (20)

SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 

Cloud Computing Security

  • 1. Cloud Computing: Finding the Silver Lining Steve Hanna, Juniper Networks Copyright © 2009 Juniper Networks, Inc. 1
  • 2. Agenda   What is Cloud Computing?   Security Analysis of Cloud Computing   Conclusions Copyright © 2009 Juniper Networks, Inc. 2
  • 3. Agenda   What is Cloud Computing?   Security Analysis of Cloud Computing   Conclusions Copyright © 2009 Juniper Networks, Inc. 3
  • 4. Cloud Computing Defined   Dynamically scalable shared resources accessed over a network •  Only pay for what you use •  Shared internally or with other customers •  Resources = storage, computing, services, etc. •  Internal network or Internet   Notes •  Similar to Timesharing •  Rent IT resources vs. buy •  New term – definition still being developed Copyright © 2009 Juniper Networks, Inc. 4
  • 5. Conventional Data Center Data Center Data Applications Enterprise LAN Office User Internet Remote User Copyright © 2009 Juniper Networks, Inc. 5
  • 6. Cloud Computing Model Enterprise 2 Cloud Provider Enterprise 1 Enterprise LAN Data Applications Enterprise LAN Office User Internet Remote User Copyright © 2009 Juniper Networks, Inc. 6
  • 7. Many Flavors of Cloud Computing   SaaS – Software as a Service •  Network-hosted application   DaaS – Data as a Service •  Customer queries against provider’s database   PaaS– Platform as a Service •  Network-hosted software development platform   IaaS – Infrastructure as a Service •  Provider hosts customer VMs or provides network storage   IPMaaS – Identity and Policy Management as a Service •  Provider manages identity and/or access control policy for customer   NaaS – Network as a Service •  Provider offers virtualized networks (e.g. VPNs) Copyright © 2009 Juniper Networks, Inc. 7
  • 8. Cloud Computing Providers DaaS SaaS PaaS IPM Software & Data IPMaaS Infrastructure NaaS IaaS (DC/server) Copyright © 2009 Juniper Networks, Inc. 8
  • 9. Cloud Computing Pros and Cons Compliance/regulatory laws mandate on-site Pros ownership of data Reduced costs Resource sharing is more Security and privacy efficient Latency & bandwidth guarantees Management moves to Absence of robust SLAs cloud provider Uncertainty around Consumption based cost interoperability, portability & lock in Faster time to roll out new services Availability & reliability Dynamic resource availability for crunch Inhibitors periods Copyright © 2009 Juniper Networks, Inc. 9
  • 10. Who’s using Clouds today? Copyright © 2009 Juniper Networks, Inc. 10
  • 11. Example: Mogulus   Mogulus is a live broadcast platform on the internet. (cloud customer) •  Producers can use the Mogulus browser-based Studio application to create LIVE, scheduled and on-demand internet television to broadcast anywhere on the web through a single player widget.   Mogulus is entirely hosted on cloud (cloud provider)   On Election night Mogulus ramped to: •  87000 videos @500kbps = 43.5 Gbps •  http://www.mogulus.com Copyright © 2009 Juniper Networks, Inc. 11
  • 12. Example: Animoto   Animoto is a video rendering & production house with service available over the Internet (cloud customer) •  With their patent-pending technology and high-end motion design, each video is a fully customized orchestration of user-selected images and music in several formats, including DVD.   Animoto is entirely hosted on cloud (cloud provider)   Released Facebook App: users were able to easily render their photos into MTV like videos •  Ramped from 25,000 users to 250,000 users in three days •  Signing up 20,000 new users per hour at peak •  Went from 50 to 3500 servers in 5 days •  Two weeks later scaled back to 100 servers •  http://www.animoto.com Copyright © 2009 Juniper Networks, Inc. 12
  • 13. Example: New York Times   Timesmachine is a news archive of the NY Times available in pdf over the Internet to newspaper subscribers (cloud customer)   Timesmachine is entirely hosted on cloud (cloud provider)   Timesmachine needed infrastructure to host several terabits of data •  Internal IT rejected due to cost •  Business owners got the data up on cloud for $50 over one weekend •  http://timesmachine.nytimes.com Copyright © 2009 Juniper Networks, Inc. 13
  • 14. Example: Eli Lilly   Eli Lilly is the 10th largest pharmaceutical company in the world (cloud customer)   Moved entire R&D environment to cloud (cloud provider)   Results: •  Reduced costs •  Global access to R&D applications •  Rapid transition due to VM hosting •  Time to deliver new services greatly reduced: •  New server: 7.5 weeks down to 3 minutes •  New collaboration: 8 weeks down to 5 minutes •  64 node linux cluster: 12 weeks down to 5 minutes Copyright © 2009 Juniper Networks, Inc. 14
  • 15. Who’s using Clouds today?   Startups & Small businesses •  Can use clouds for everything •  SaaS, IaaS, collaboration services, online presence   Mid-Size Enterprises •  Can use clouds for many things •  Compute cycles for R&D projects, online collaboration, partner integration, social networking, new business tools   Large Enterprises •  More likely to have hybrid models where they keep some things in house •  On premises data for legal and risk management reasons Copyright © 2009 Juniper Networks, Inc. 15
  • 16. Agenda   What is Cloud Computing?   Security Analysis of Cloud Computing   Conclusions Copyright © 2009 Juniper Networks, Inc. 16
  • 17. Information Security Risk Management Process (ISO 27005)   Establish Context   Risk Assessment •  Identify Risks •  Identify Assets •  Identify Threats •  Identify Existing Controls •  Identify Vulnerabilities •  Identify Consequences •  Estimate Risks •  Evaluate Risks   Develop Risk Treatment Plan •  Reduce, Retain, Avoid, or Transfer Risks   Risk Acceptance   Implement Risk Treatment Plan   Monitor and Review Risks Copyright © 2009 Juniper Networks, Inc. 17
  • 18. Streamlined Security Analysis Process   Identify Assets •  Which assets are we trying to protect? •  What properties of these assets must be maintained?   Identify Threats •  What attacks can be mounted? •  What other threats are there (natural disasters, etc.)?   Identify Countermeasures •  How can we counter those attacks?   Appropriate for Organization-Independent Analysis •  We have no organizational context or policies Copyright © 2009 Juniper Networks, Inc. 18
  • 19. Identify Assets Copyright © 2009 Juniper Networks, Inc. 19
  • 20. Conventional Data Center Data Center Data Applications Enterprise LAN Office User Internet Remote User Copyright © 2009 Juniper Networks, Inc. 20
  • 21. Cloud Computing Model Enterprise 2 Cloud Provider Enterprise 1 Enterprise LAN Data Applications Enterprise LAN Office User Internet Remote User Copyright © 2009 Juniper Networks, Inc. 21
  • 22. Identify Assets   Customer Data   Customer Applications   Client Computing Devices Copyright © 2009 Juniper Networks, Inc. 22
  • 23. Information Security Principles (Triad)   C I A •  Confidentiality •  Prevent unauthorized disclosure •  Integrity •  Preserve information integrity •  Availability •  Ensure information is available when needed Copyright © 2009 Juniper Networks, Inc. 23
  • 24. Identify Assets & Principles   Customer Data •  Confidentiality, integrity, and availability   Customer Applications •  Confidentiality, integrity, and availability   Client Computing Devices •  Confidentiality, integrity, and availability Copyright © 2009 Juniper Networks, Inc. 24
  • 25. Identify Threats Copyright © 2009 Juniper Networks, Inc. 25
  • 26. Cloud Computing Model Enterprise 2 Cloud Provider Enterprise 1 Enterprise LAN Data Applications Enterprise LAN Office User Internet Remote User Copyright © 2009 Juniper Networks, Inc. 26
  • 27. Identify Threats   Failures in Provider Security   Attacks by Other Customers   Availability and Reliability Issues   Legal and Regulatory Issues   Perimeter Security Model Broken   Integrating Provider and Customer Security Systems Copyright © 2009 Juniper Networks, Inc. 27
  • 28. Failures in Provider Security   Explanation •  Provider controls servers, network, etc. •  Customer must trust provider’s security •  Failures may violate CIA principles   Countermeasures •  Verify and monitor provider’s security   Notes •  Outside verification may suffice •  For SMB, provider security may exceed customer security Copyright © 2009 Juniper Networks, Inc. 28
  • 29. Attacks by Other Customers   Threats •  Provider resources shared with untrusted parties •  CPU, storage, network •  Customer data and applications must be separated •  Failures will violate CIA principles   Countermeasures •  Hypervisors for compute separation •  MPLS, VPNs, VLANs, firewalls for network separation •  Cryptography (strong) •  Application-layer separation (less strong) Copyright © 2009 Juniper Networks, Inc. 29
  • 30. Availability and Reliability Issues   Threats •  Clouds may be less available than in-house IT •  Complexity increases chance of failure •  Clouds are prominent attack targets •  Internet reliability is spotty •  Shared resources may provide attack vectors •  BUT cloud providers focus on availability   Countermeasures •  Evaluate provider measures to ensure availability •  Monitor availability carefully •  Plan for downtime •  Use public clouds for less essential applications Copyright © 2009 Juniper Networks, Inc. 30
  • 31. Legal and Regulatory Issues   Threats •  Laws and regulations may prevent cloud computing •  Requirements to retain control •  Certification requirements not met by provider •  Geographical limitations – EU Data Privacy •  New locations may trigger new laws and regulations   Countermeasures •  Evaluate legal issues •  Require provider compliance with laws and regulations •  Restrict geography as needed Copyright © 2009 Juniper Networks, Inc. 31
  • 32. Perimeter Security Model Broken Copyright © 2009 Juniper Networks, Inc. 32
  • 33. Perimeter Security Model Data Center Data Applications Safe Zone Enterprise LAN Office User Internet Remote User Copyright © 2009 Juniper Networks, Inc. 33
  • 34. Perimeter Security with Cloud Computing? Enterprise 2 Cloud Provider Enterprise 1 Enterprise LAN Data Applications Enterprise LAN Office User Internet Remote User Copyright © 2009 Juniper Networks, Inc. 34
  • 35. Perimeter Security Model Broken   Threats •  Including the cloud in your perimeter •  Lets attackers inside the perimeter •  Prevents mobile users from accessing the cloud directly •  Not including the cloud in your perimeter •  Essential services aren’t trusted •  No access controls on cloud   Countermeasures •  Drop the perimeter model! Copyright © 2009 Juniper Networks, Inc. 35
  • 36. Integrating Provider and Customer Security   Threat •  Disconnected provider and customer security systems •  Fired employee retains access to cloud •  Misbehavior in cloud not reported to customer   Countermeasures •  At least, integrate identity management •  Consistent access controls •  Better, integrate monitoring and notifications   Notes •  Can use SAML, LDAP, RADIUS, XACML, IF-MAP, etc. Copyright © 2009 Juniper Networks, Inc. 36
  • 37. Agenda   What is Cloud Computing?   Security Analysis of Cloud Computing   Conclusions Copyright © 2009 Juniper Networks, Inc. 37
  • 38. Bottom Line on Cloud Computing Security   Engage in full risk management process for each case   For small and medium organizations •  Cloud security may be a big improvement! •  Cost savings may be large (economies of scale)   For large organizations •  Already have large, secure data centers •  Main sweet spots: •  Elastic services •  Internet-facing services   Employ countermeasures listed above Copyright © 2009 Juniper Networks, Inc. 38
  • 39. Security Analysis Skills Reviewed Today   Information Security Risk Management Process •  Variations used throughout IT industry •  ISO 27005, NIST SP 800-30, etc. •  Requires thorough knowledge of threats and controls •  Bread and butter of InfoSec – Learn it! •  Time-consuming but not difficult   Streamlined Security Analysis Process •  Many variations •  RFC 3552, etc. •  Requires thorough knowledge of threats and controls •  Useful for organization-independent analysis •  Practice this on any RFC or other standard •  Become able to do it in 10 minutes Copyright © 2009 Juniper Networks, Inc. 39
  • 40. Discussion Copyright © 2009 Juniper Networks, Inc. 40
  • 41. Copyright © 2009 Juniper Networks, Inc. 41