- The document discusses cloud computing concepts including virtualization, essential cloud features, cloud service models (SaaS, PaaS, IaaS, BPaaS), deployment models (private, public, hybrid, community cloud), and benefits of cloud computing.
- It outlines security concerns in cloud environments related to issues like physical controls being replaced by virtual controls, expanded access and shifted control, and increased speed of provisioning. It discusses how security domains map to cloud environments.
- Finally, it presents two viewpoints on cloud security - security from the cloud focuses on security-as-a-service, while security for the cloud focuses on secure usage of cloud applications.
A cloud, in very simple terms, is a place where information technology (IT) resources such as computer hardware, operating systems, networks, storage, databases, and even entire software applications are available instantly, on-demand
In Cloud, existing vulnerabilities, threats, and associated attacks raise several security concerns. Vulnerabilities in Cloud can be defined as the loopholes in the security architecture of Cloud, which can be exploited by an adversary via sophisticated techniques to gain access to the network and other infrastructure resources. In these slides, we discuss major Cloud specific vulnerabilities, which pose serious threats to Cloud computing.
"Cloud computing security or, more simply, cloud security refers to a broad set of policies, technologies, and controls deployed to protect data, applications, and the associated infrastructure of cloud computing.
It is a sub-domain of computer security, network security, and, more broadly, information security." By Ambrish Gangal
This slides is a final project presentation for Cloud Security course in Harvard Extension School. It describes how to design a HIPAA Compliance Auditing and Logging in Cloud Infrastructure for a fictitious company called GoodBuy.
A cloud, in very simple terms, is a place where information technology (IT) resources such as computer hardware, operating systems, networks, storage, databases, and even entire software applications are available instantly, on-demand
In Cloud, existing vulnerabilities, threats, and associated attacks raise several security concerns. Vulnerabilities in Cloud can be defined as the loopholes in the security architecture of Cloud, which can be exploited by an adversary via sophisticated techniques to gain access to the network and other infrastructure resources. In these slides, we discuss major Cloud specific vulnerabilities, which pose serious threats to Cloud computing.
"Cloud computing security or, more simply, cloud security refers to a broad set of policies, technologies, and controls deployed to protect data, applications, and the associated infrastructure of cloud computing.
It is a sub-domain of computer security, network security, and, more broadly, information security." By Ambrish Gangal
This slides is a final project presentation for Cloud Security course in Harvard Extension School. It describes how to design a HIPAA Compliance Auditing and Logging in Cloud Infrastructure for a fictitious company called GoodBuy.
In the talk I speak about our year long journey of implementing a distributed system that needed to run on scale, and what mistakes we made and how we learnt from them. Talk also touches on a very interesting problem of ordering writes in a distributed environment without any locking. The takeaway for the audience would be around how to approach a problem when they are solving for scale.
This talk was presented at AWS Community Day Bengaluru 2019 by Manik Jindal, Computer Scientist, Adobe
There are many security threats in cloud computing. But the major security threats in the security of the data is third party auditor of data or user data. The various security model varies from application to application. After studying the model of proof of retrievability. The new model will proposed for E-learning, while putting the data on the cloud because security is important factor
CloudFirst Provide custom IT services Google cloud hosting, Private Cloud, AWS Cloud, Public Cloud, G suite services in Mumbai, Bangalore, Pune, Chennai, Hyderabad, Delhi, Noida & across India.
In Cloud computing we explain the basics of cloud and its model. It contain contents which distinguish between different types of clouds and its characteristics. With the help of presented point you will able to select your required cloud solution that can meet your company requirements.
Security threat issues and countermeasures in cloud computingJahangeer Qadiree
Cloud computing field has reached to the highest level of technical heights. The security problems of cloud computing hinders
its development. It is totally internet based technology where the resources and information shared on a distributed network. So
it is important for both provider as well as consumer to provide the security and trust to share the data for developing clou d
computing applications. Because now organizations are now moving fast towards the cloud. So there is the possibility of threats
that will harm the data on the cloud. In our paper we mainly focuses on security threats of cloud computing system also we
mention some solutions and countermeasures on these security problems
Cloud computing security is the set of control-based technologies and policies designed to adhere to regulatory compliance rules and protect information, data applications and infrastructure associated with cloud computing use
Security in the cloud Workshop HSTC 2014Akash Mahajan
A broad overview of what it takes to be secure. This is more of an introduction where we introduce the basic terms around Cloud Computing and how do we go about securing our information assets(Data, Applications and Infrastructure)
The workshop was fun because all the slides were paired with real world examples of security breaches and attacks.
Cloud Computing Security Organization Assessments Service Categories Responsi...SlideTeam
This complete deck covers various topics and highlights important concepts. It has PPT slides which cater to your business needs. This complete deck presentation emphasizes Cloud Computing Security Organisation Assessments Service Categories Responsibility and has templates with professional background images and relevant content. This deck consists of total of twelve slides. Our designers have created customizable templates, keeping your convenience in mind. You can edit the colour, text and font size with ease. Not just this, you can also add or delete the content if needed. Get access to this fully editable complete presentation by clicking the download button below. https://bit.ly/3cmXz7E
Cloud Security is critical to Data Security and Application Resilience against CyberAttacks. This talk looks at Security Best Practices that need to be practised.
This talk was presented at AWS Community Day Bengaluru 2019 by Amar Prusty, Cloud-Data Center Consultant Architect, DXC Technology
Cloud computing is an advancement to keep up information and applications with the utilization of web and focal remote servers. It enables clients to utilize applications without connection and get to their individual reports at any PC with web get to. This headway gifts productive enlisting by joining limit, prepare, memory and trade speed. Scattered figuring outfit clients and endeavors with various aptitudes to store and process their information in untouchable server farms.
Think Like an Attacker™
The Core Security Attack Intelligence platform proactively identifies the most likely threats to your business by simulating what an attacker would do to reach your critical assets.
- Consolidate and prioritize vulnerability scanner data
- Core Insight prioritizes attack paths to your critical assets
- Further test and validate vulnerable systems based on attack paths
To learn more, visit http://www.coresecurity.com/think-like-an-attacker
Data protection in cloud computing - Data Protection Conference 2011Cloud Legal Project
Kuan Hon's slides for workshop on data protection in cloud computing at Data Protection 2011 conference organised by Holyrood in Edinburgh, UK on 24 February 2011.
To achieve this, hosting providers are required to implement solutions that rely on robust cloud computing infrastructure that is secured against data loss and external threats.
In the talk I speak about our year long journey of implementing a distributed system that needed to run on scale, and what mistakes we made and how we learnt from them. Talk also touches on a very interesting problem of ordering writes in a distributed environment without any locking. The takeaway for the audience would be around how to approach a problem when they are solving for scale.
This talk was presented at AWS Community Day Bengaluru 2019 by Manik Jindal, Computer Scientist, Adobe
There are many security threats in cloud computing. But the major security threats in the security of the data is third party auditor of data or user data. The various security model varies from application to application. After studying the model of proof of retrievability. The new model will proposed for E-learning, while putting the data on the cloud because security is important factor
CloudFirst Provide custom IT services Google cloud hosting, Private Cloud, AWS Cloud, Public Cloud, G suite services in Mumbai, Bangalore, Pune, Chennai, Hyderabad, Delhi, Noida & across India.
In Cloud computing we explain the basics of cloud and its model. It contain contents which distinguish between different types of clouds and its characteristics. With the help of presented point you will able to select your required cloud solution that can meet your company requirements.
Security threat issues and countermeasures in cloud computingJahangeer Qadiree
Cloud computing field has reached to the highest level of technical heights. The security problems of cloud computing hinders
its development. It is totally internet based technology where the resources and information shared on a distributed network. So
it is important for both provider as well as consumer to provide the security and trust to share the data for developing clou d
computing applications. Because now organizations are now moving fast towards the cloud. So there is the possibility of threats
that will harm the data on the cloud. In our paper we mainly focuses on security threats of cloud computing system also we
mention some solutions and countermeasures on these security problems
Cloud computing security is the set of control-based technologies and policies designed to adhere to regulatory compliance rules and protect information, data applications and infrastructure associated with cloud computing use
Security in the cloud Workshop HSTC 2014Akash Mahajan
A broad overview of what it takes to be secure. This is more of an introduction where we introduce the basic terms around Cloud Computing and how do we go about securing our information assets(Data, Applications and Infrastructure)
The workshop was fun because all the slides were paired with real world examples of security breaches and attacks.
Cloud Computing Security Organization Assessments Service Categories Responsi...SlideTeam
This complete deck covers various topics and highlights important concepts. It has PPT slides which cater to your business needs. This complete deck presentation emphasizes Cloud Computing Security Organisation Assessments Service Categories Responsibility and has templates with professional background images and relevant content. This deck consists of total of twelve slides. Our designers have created customizable templates, keeping your convenience in mind. You can edit the colour, text and font size with ease. Not just this, you can also add or delete the content if needed. Get access to this fully editable complete presentation by clicking the download button below. https://bit.ly/3cmXz7E
Cloud Security is critical to Data Security and Application Resilience against CyberAttacks. This talk looks at Security Best Practices that need to be practised.
This talk was presented at AWS Community Day Bengaluru 2019 by Amar Prusty, Cloud-Data Center Consultant Architect, DXC Technology
Cloud computing is an advancement to keep up information and applications with the utilization of web and focal remote servers. It enables clients to utilize applications without connection and get to their individual reports at any PC with web get to. This headway gifts productive enlisting by joining limit, prepare, memory and trade speed. Scattered figuring outfit clients and endeavors with various aptitudes to store and process their information in untouchable server farms.
Think Like an Attacker™
The Core Security Attack Intelligence platform proactively identifies the most likely threats to your business by simulating what an attacker would do to reach your critical assets.
- Consolidate and prioritize vulnerability scanner data
- Core Insight prioritizes attack paths to your critical assets
- Further test and validate vulnerable systems based on attack paths
To learn more, visit http://www.coresecurity.com/think-like-an-attacker
Data protection in cloud computing - Data Protection Conference 2011Cloud Legal Project
Kuan Hon's slides for workshop on data protection in cloud computing at Data Protection 2011 conference organised by Holyrood in Edinburgh, UK on 24 February 2011.
To achieve this, hosting providers are required to implement solutions that rely on robust cloud computing infrastructure that is secured against data loss and external threats.
Although cloud computing presents a compelling business case for companies looking to reduce spending, streamline processes, and increase accessibility, the very idea of trans-border data flows raises the hackles of privacy advocates all over the globe. In Canada, government and members of the public have expressed serious concern over the potential misuse of personal information gone offshore. Join Else for an overview of those concerns and what they might mean for your organization.
Most of us think of technology mainly in terms of the useful or entertaining things it does FOR us. However, what it does TO us is just as important, if not more. Technology exerts powerful influences on how we think, feel, and behave – often by accident, but increasingly by design. By increasing your insight into how technology can impact you, your employees, and your customers, this presentation will boost your ability to shape those impacts to actively support - and avoid undermining - the growth of your business.
Sections:
Introduction
Cloud Computing background
Securing the Cloud
Virtualization
Mobile Cloud Computing
User safety & energy consumption
Author’s proposal
Conclusion
In order to make cloud computing to be adopted by users and enterprises, security concerns of users should be rectified by making cloud environment trustworthy, discussed by Latif et al. in the assessment of cloud computing risks[2].
We address the questions related to:
security concerns and threats over general cloud computing,
(2) the solutions for these problems and
(3) mobile users safety in convergence with energy consumption.
Gartner did an Audience survey at the Gartner US data center conference Dec 2013 showing that the No. 1 Issue Slowing Adoption of Public Cloud Computing was Security. Cloud is a place where 82% of organization will store sensitive data in the next 2 years according to a study from Ponemon Institute. The Ponemon Institute concluded that Cloud security is an oxymoron for many companies. Sixty-two percent of respondents do not agree or are unsure that cloud services are thoroughly vetted before deployment. Sixty-nine percent believe there is a failure to be proactive in assessing information that is too sensitive to be stored in the cloud. 46 percent of IT professionals in this study say their organizations have stopped or slowed the adoption of cloud services because of security concerns, indicating there is still work to be done to continue advancing cloud adoption. Cloud Security Alliance (CSA) showed that reported cloud outages due to “Insecure Interfaces & APIs”accounted for 29% of all threats; and “Data Loss & Leakage” accounted for 25% of all threats reported. 25% of reported cloud outages did not reveal the causes of the outages. The aim of this report is to encourage transparency and accountability from cloud service providers. Consumers have no control over security once data is inside the public cloud. Completely reliant on provider for application and storage security. A private cloud gives a single Cloud Consumers organization the exclusive access to and usage of the infrastructure and computational resources. But Consumer has limited capability to manage security within outsourced IaaS private cloud. Depending upon the type of Cloud Deployment Model additional threats vectors (that would have not come into the equation for a non-cloud deployment) could be induced. An example of such a threat vector in a SAAS deployment would be induced by multi-tenancy when the same application run time is being used to service multiple tenants and their segregated data. Cloud computing may present different risks to an organization than traditional IT solutions. Examples from Cloud Security Alliance highlighting concerns that Virtualization is bringing. This is one of the key elements of Infrastructure as a Service (IaaS) cloud offerings and private clouds, and it is increasingly used in portions of the back-end of Platform as a Service (PaaS) and SaaS (Software as a Service) providers as well. Just to mention a few examples: A few exmples of Hypervisor Architecture Concerns include: VM Encryption - Virtual machine images are vulnerable to theft or modification when they are dormant or running. The solution to this problem is to encrypt virtual machine images at all times, but there are performance concerns at this time. For high security or regulated environments, the performance cost is worth it. Encryption must be combined with administrative controls, DLP, and audit trails to prevent a snapshot of a running VM from “escaping into the wild,” which
Cloud computing is an evolving paradigm. The NIST definition characterizes important aspects of cloud computing and is intended to serve as a means for broad comparisons of cloud services and deployment strategies, and to provide a baseline for discussion from what is cloud computing to how to best use cloud computing.
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...SOFTTECHHUB
The choice of an operating system plays a pivotal role in shaping our computing experience. For decades, Microsoft's Windows has dominated the market, offering a familiar and widely adopted platform for personal and professional use. However, as technological advancements continue to push the boundaries of innovation, alternative operating systems have emerged, challenging the status quo and offering users a fresh perspective on computing.
One such alternative that has garnered significant attention and acclaim is Nitrux Linux 3.5.0, a sleek, powerful, and user-friendly Linux distribution that promises to redefine the way we interact with our devices. With its focus on performance, security, and customization, Nitrux Linux presents a compelling case for those seeking to break free from the constraints of proprietary software and embrace the freedom and flexibility of open-source computing.
UiPath Test Automation using UiPath Test Suite series, part 5DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 5. In this session, we will cover CI/CD with devops.
Topics covered:
CI/CD with in UiPath
End-to-end overview of CI/CD pipeline with Azure devops
Speaker:
Lyndsey Byblow, Test Suite Sales Engineer @ UiPath, Inc.
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
In the rapidly evolving landscape of technologies, XML continues to play a vital role in structuring, storing, and transporting data across diverse systems. The recent advancements in artificial intelligence (AI) present new methodologies for enhancing XML development workflows, introducing efficiency, automation, and intelligent capabilities. This presentation will outline the scope and perspective of utilizing AI in XML development. The potential benefits and the possible pitfalls will be highlighted, providing a balanced view of the subject.
We will explore the capabilities of AI in understanding XML markup languages and autonomously creating structured XML content. Additionally, we will examine the capacity of AI to enrich plain text with appropriate XML markup. Practical examples and methodological guidelines will be provided to elucidate how AI can be effectively prompted to interpret and generate accurate XML markup.
Further emphasis will be placed on the role of AI in developing XSLT, or schemas such as XSD and Schematron. We will address the techniques and strategies adopted to create prompts for generating code, explaining code, or refactoring the code, and the results achieved.
The discussion will extend to how AI can be used to transform XML content. In particular, the focus will be on the use of AI XPath extension functions in XSLT, Schematron, Schematron Quick Fixes, or for XML content refactoring.
The presentation aims to deliver a comprehensive overview of AI usage in XML development, providing attendees with the necessary knowledge to make informed decisions. Whether you’re at the early stages of adopting AI or considering integrating it in advanced XML development, this presentation will cover all levels of expertise.
By highlighting the potential advantages and challenges of integrating AI with XML development tools and languages, the presentation seeks to inspire thoughtful conversation around the future of XML development. We’ll not only delve into the technical aspects of AI-powered XML development but also discuss practical implications and possible future directions.
Maruthi Prithivirajan, Head of ASEAN & IN Solution Architecture, Neo4j
Get an inside look at the latest Neo4j innovations that enable relationship-driven intelligence at scale. Learn more about the newest cloud integrations and product enhancements that make Neo4j an essential choice for developers building apps with interconnected data and generative AI.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
Pushing the limits of ePRTC: 100ns holdover for 100 daysAdtran
At WSTS 2024, Alon Stern explored the topic of parametric holdover and explained how recent research findings can be implemented in real-world PNT networks to achieve 100 nanoseconds of accuracy for up to 100 days.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Securing your Kubernetes cluster_ a step-by-step guide to success !
Cloud computing & security basics
1. RAHUL GURNANI
CDAC Certified Cyber Security Professional
MS Cyber Law & Information Security,
Indian Institute of Information Technology - Allahabad
2. agenda
• Virtualization - brief overview
• Essential Features of a cloud environment
• Cloud Service Models
• Cloud Deployment Models
• Benefits of Cloud
• Security Concerns in different Cloud
environments
• Mapping the traditional IT security
requirements to Cloud environment
• Two viewpoints on Cloud Security
3.
4. VIRTUALIZATION
• A cloud comprises of virtual machines hosted on a remote or local server
which are accessed and used on as and when needed basis.
• The virtual machines can be defined to have any configuration that a real
world machine would have, just the host machine should be able to support
it. Even servers can be hosted easily on a cloud.
• Just imagine if you are able to host your server in a virtual environment,
how much cost, space and business overheads would you save if your servers
are hosted on a cloud !
5. Essential Features of a cloud
1.On- Demand Self Service
2.Broad network access
3.Resource Pooling
4.Rapid Elasticity
5.Measured Service
6. On-demand self-service.
A customer using cloud services should be able to provision
computing capabilities such as server time and network
storage himself as and when required without requiring
human interaction with the service provider.
Broad network access.
The cloud services should be available over the network and
accessible thorugh standard devices such as laptops,
smartphones and tablet computers
Resource pooling. (& Location Independence)
The service provider’s computing resources are pooled to
serve multiple consumers using a multi-tenant model, with
different physical and virtual resources dynamically assigned
and reassigned according to consumer demand.
7. Rapid elasticity.
• Capabilities can be elastically provisioned and released, in
some cases automatically, to scale rapidly outward and
inward commensurate with demand.
• To the consumer, the capabilities available for provisioning
often appear to be unlimited and can be appropriated in
any quantity at any time.
Measured service.
• Cloud systems automatically control and optimize resource
use by leveraging a metering capability at some level of
abstraction appropriate to the type of service (e.g.,
storage, processing, bandwidth, and active user accounts).
• Resource usage can be monitored, controlled, and
reported, providing transparency for both the provider and
consumer of the utilized service.
8. Cloud Services
1.Software as a Service (SaaS).
2.Platform as a Service (PaaS).
3.Infrastructure as a Service (IaaS).
4.Business Process as a Service
(BPAAS)
9. Software as a Service (SaaS).
• The capability provided to the consumer is to use the
provider’s applications running on a cloud infrastructure.
• The applications are accessible from various client devices
through either a thin client interface, such as a web
browser (e.g., web-based email), or a program interface.
• The consumer does not manage or control the underlying
cloud infrastructure including network, servers, operating
systems, storage, or even individual application
capabilities, with the possible exception of limited user-
specific application configuration settings.
10. Platform as a Service (PaaS).
• The capability provided to the consumer is to deploy onto
the cloud infrastructure consumer-created or acquired
applications created using programming languages,
libraries, services, and tools supported by the provider.
• The consumer does not manage or control the underlying
cloud infrastructure including network, servers, operating
systems, or storage, but has control over the deployed
applications and possibly configuration settings for the
application-hosting environment.
11. Infrastructure as a Service (IaaS)
• The capability provided to the consumer is to
provision processing, storage, networks, and
other fundamental computing resources.
• The consumer is able to deploy and run arbitrary
software, which can include operating systems
and applications.
• The consumer does not manage or control the
underlying cloud infrastructure but has control
over operating systems, storage, and deployed
applications; and possibly limited control of
select networking components (e.g., host
firewalls).
12. Business Process as a Service (BPAAS).
• It is a form of business process outsourcing (BPO)
that employs a cloud computing service model.
• Whereas the aim of traditional BPO is to reduce
labor costs, BPaaS reduces labor count through
increased automation, thereby cutting costs in the
process.
• It adheres to cloud computing's traditional
monthly pricing schedule.
• Types of outsourcing services offered via the
BPaaS model include HR functions such as payroll
and benefits administration, procurement,
advertising, marketing and industry operation
processes.
13. • Private cloud
• Public cloud
• Hybrid cloud
• Community cloud
Deployment Models
14. Private cloud
• The cloud infrastructure is set up for exclusive use by an individual
organization which may have multiple consumers.
• It may be owned, managed, and operated by the organization itself or a
third party.
• It may be set up in the organizations premises or a remote location.
Community cloud
• It is for exclusive use by a specific community of consumers from
organizations that have shared concerns (e.g., mission, security
requirements, policy, and compliance considerations).
• It may be owned, managed, and operated by one or more of the
organizations in the community, a third party, or some combination of
them, and it may exist on or off premises.
15. Public cloud
• It is set up for open use by the general public.
• It may be owned, managed, and operated by a
business, academic, or government organization, or
some combination of them. It exists on the premises of
the cloud provider.
Hybrid cloud
• The cloud infrastructure is a composition of two or
more distinct cloud infrastructures (private,
community, or public) that remain unique entities,
• but are bound together by standardized or proprietary
technology that enables data and application
portability (e.g., cloud bursting for load balancing
between clouds).
16.
17. • Reducing capital Expenditure on IT
• Having a predictable Operations Expenditure
• Letting the organization focus on its core
competency
18.
19. Security Concerns
TOP CONCERN IN
ADOPTION OF
CLOUD
Physical controls
get replaced by
virtual controls
In a cloud environment, access expands,
control shifts, and the speed of
provisioning resources and applications
increases - greatly affecting all aspects
of IT security.
Cloud computing tests the limits
of security operations and
infrastructure.
20. Integrated service
management, automation,
provisioning, self service
Key security focus:
Infrastructure and Identity
Manage datacenter
identities
Secure virtual machines
Patch default images
Monitor logs on all
resources
Network isolation
Cloud Enabled Data Center
Infrastructure as a Service
(IaaS): Cut IT expense and
complexity through cloud data
centers
Platform-as-a-Service (PaaS):
Accelerate time to market with
cloud platform services
Pre-built, pre-integrated IT
infrastructures tuned to
application-specific needs
Key security focus:
Applications and Data
Secure shared databases
Encrypt private information
Build secure applications
Keep an audit trail
Integrate existing security
Cloud Platform Services
21. Advanced platform for
creating, managing, and
monetizing cloud services
Key security focus:
Data and Compliance
Isolate cloud tenants
Policy and regulations
Manage security operations
Build compliant data
centers
Offer backup and resiliency
Cloud Service Provider
Innovate
business models by becoming a
cloud service provider
Software as a Service (SaaS):
Gain immediate
access with business solutions
on cloud
Capabilities provided to
consumers for using a
provider’s applications
Key security focus:
Compliance and
Governance
Harden exposed applications
Securely federate identity
Deploy access controls
Encrypt communications
Manage application policies
Business Solutions on Cloud
22. People and Identity
Application and Process
Network, Server and Endpoint
Data and Information
Physical Infrastructure
Governance, Risk and Compliance
Security and Privacy Domains
Multiple Logins, Onboarding Issues
Multi-tenancy, Data Separation
Audit Silos, Compliance Controls
Provider Controlled, Lack of Visibility
Virtualization, Network Isolation
External Facing, Quick Provisioning
CLOUD
Self-Service
Highly Virtualized
Location Independence
Workload Automation
Rapid Elasticity
Standardization
How security and privacy domains get related to cloud
environments ?
23. Two viewpoints for cloud security
Security from the cloud
...cloud is used to deliver security as-a-service - focusing
on services such as vulnerability scanning, web and email
security, etc.
Security for the cloud
..focus is on secure usage of Cloud applications – like by
ensuring Audit, Access and Secure Connectivity.
There are various business solutions
available from different vendors
supporting both the models.