SlideShare a Scribd company logo
Cloud Customer Architecture for Securing
Workloads on Cloud Services
Webinar April 19, 2017
http://www.cloud-council.org/deliverables/cloud-customer-architecture-for-securing-workloads-on-cloud-services.htm
The Cloud Standards Customer Council
• Provide customer-led guidance to multiple cloud
standards-defining bodies
• Establishing criteria for open
standards based cloud computing 650+ Organizations
participating
2013/2014 Deliverables
 Convergence of Social, Mobile, Cloud
 Analysis of Public Cloud SLAs
 Cloud Security Standards
 Migrating Apps to Public Cloud Services
 Social Business in the Cloud
 Deploying Big Data in the Cloud
 Practical Guide to Cloud Computing, V2
 Migrating Apps: Performance Rqmnts
 Cloud Interoperability/Portability
http://cloud-council.org
2015 Deliverables
 Web App Hosting Ref. Architecture
 Mobile Ref. Architecture
 Big Data & Analytics Ref. Architecture
 Security for Cloud Computing, V2
 Practical Guide to Cloud SLAs, V2
 Practical Guide to PaaS
THE Customer’s Voice for Cloud Standards!
2016 Deliverables
 Prac Guide to Hybrid Cloud Computing
 Public Cloud Service Agreements, V2
 Cloud Security Standards, V2
 IoT Ref. Architecture
 e-Commerce Ref. Architecture
 Impact of Cloud Computing on Healthcare, V2
 Enterprise Social Collaboration Ref. Architecture
2017 Projects
 Security for Cloud Services Ref. Architecture
 Impact of Cloud Computing on Healthcare
 Hybrid Integration Ref. Architecture
 API Management Ref. Architecture
 Data Residency discussion paper
 Blockchain Ref. Architecture
 Multi-cloud Management whitepaper
 And more!
© 2017 Cloud Standards Customer Council 2
© 2017 Cloud Standards Customer Council www.cloud-council.org 3
Abstract & Agenda
This talk introduces the Cloud Customer Architecture for Securing
Workloads on Cloud Services
 What are Cloud Solution Architectures?
 CSCC’s Cloud Reference Architecture series
• Cloud Customer Architecture for e-Commerce http://bit.ly/2camhIz
• Cloud Customer Architecture for IoT http://bit.ly/2cLcomc
• Cloud Customer Architecture for Big Data http://bit.ly/2crffR2
• Cloud Customer Architecture for Mobile http://bit.ly/2cIYtdI
• Cloud Customer Architecture for Web Application Hosting http://bit.ly/2cgTVK2
• Cloud Customer Architecture for Enterprise Social Collaboration
http://bit.ly/2jDiMPD
• Cloud Customer Architecture for Hybrid Integration http://bit.ly/2lHlLs0
• Cloud Customer Architecture for API Management http://bit.ly/2n59GgY
• Cloud Customer Architecture for Securing Workloads on Cloud Services
http://bit.ly/2puolzX
© 2017 Cloud Standards Customer Council www.cloud-council.org 4
 Cloud Customer Reference Architectures are…
• straightforward description of elements needed to implement particular application
solutions using cloud infrastructure, cloud platforms, cloud software, and cloud services
• deployment neutral (public, private, hybrid) & implementable via IaaS, PaaS, SaaS
• general purpose reusable architectures as well as industry specific architectures
• vendor neutral & open
 Important because they…
• enable cloud customers to understand unique features & advantages of using cloud
computing
• bridge gap between understanding cloud customer needs and cloud provider offerings
• provide practical guidance on how common business applications can be realized from a
cloud customer role perspective
• are stable anchors in a rapidly innovating cloud landscape
• save time, effort & money: be more productive
 Useful when…
• those planning to build cloud based applications
• talking with cloud providers about their offerings
• understanding of the common elements and relationships in relevant solutions
 Target audience:
• those planning on building/purchasing cloud based applications
• developers, architects, managers
 Consistent with ISO/IEC 17789 International Standard Cloud Computing Reference Architecture
Cloud Customer Reference Architectures
Cloud Security Overview
© 2017 Cloud Standards Customer Council 5
 Manage identity and access
 Protect infrastructure, data, and
applications
 Security monitoring and intelligence
 Optimize cloud security operations
Impact of Deployment Models
 Public - resources shared with other tenants;
isolation is an issue
 Private - no sharing with other organizations;
sharing may take place between different
parts of customer organization
 Hybrid - requires careful analysis of the
security elements of each of the connected
systems
Impact of Service Models
 IaaS - customer takes on most
responsibility for security of data,
applications, systems and networks
 PaaS – CSP responsible for security of
platform; customer responsible for
configuring appropriate security options
 SaaS - CSP takes most responsibility for
security of cloud services
Key Aspects of Security Roles & Responsibilities
 Security responsibilities split between
CSP and cloud customer (ISO/IEC 17789)
 Roles and responsibilities should be
documented in cloud service agreement
(ISO/IEC 27017 )
Architecture: Overview
© 2017 Cloud Standards Customer Council 6
Architecture: User Roles
© 2017 Cloud Standards Customer Council 7
 Application User
• Usually have access and control of data
which can be sensitive
• Service accounts may have access for
bulk data updates in cloud environment
 Cloud Admin
• Privileged access users
• Application publishers
• Operators
• Cloud administrators
• Managers and team leads
• Auditors
• Authorized to read sensitive info and
execute potentially destructive actions
• Require an increased level of auditing
 Cloud Developer
• Create, update, and delete applications
• Create cloud service instances and bind
to applications
• Authorized to read sensitive info and
manipulate applications
• Require an increased level of auditing
Architecture: Devices
© 2017 Cloud Standards Customer Council 8
Managed Device – devices that have
Directory Services membership and/or are
controlled by IT under compliance policies
Unmanaged Device – devices which
include personal devices (laptops, mobile
devices), printers, cameras, etc.
Architecture: Enterprise User Directory
© 2017 Cloud Standards Customer Council 9
Enterprise User Directory -
store and manage user profiles,
associated credentials,
password policies and group
membership.
Architecture: Enterprise Applications & Data
© 2017 Cloud Standards Customer Council 10
Enterprise Application
represents applications that run
enterprise business processes
and logic within existing
enterprise systems.
Enterprise Data represents the
one or more systems of record,
for example, transactional data
or data warehouses that
represent the existing data in the
enterprise.
Architecture: Identity & Access Management
© 2017 Cloud Standards Customer Council 11
 Identity lifecycle management –
management of accounts and roles
 Segregation of duties – controlling access
to capabilities based on user role
 Identity-as-a-Service (IDaaS) – enables
cloud apps to externalize user authentication
to a range of different identity providers
 Federation Services – also known as a
Single Sign-on (SSO)
 Privileged Account Management (PAM) – a
set of additional controls for privileged access
accounts
 Multifactor authentication (MFA) –
additional levels of authentication for higher
security
 Mobile Device Management (MDM) –
ensure that mobile devices are compliant with
corporate policies
 Reporting – view of access by users
 Audit and compliance – validates security
controls
 Cloud Security Services – tools for handling
security across cloud environments
Architecture: Infrastructure Security
© 2017 Cloud Standards Customer Council 12
 Physical security
• Implementation guidance is in ISO 27002,
PCI DSS 3.2 and other standards
• Provider should give assurances about
physical security - independent SOC 2
report or ISO 27001 certification
 Infrastructure isolation
• Bare metal systems or dedicated hosts
provide the most isolation
• VMs provide a significant amount of isolation
• Containers provide a lower level of isolation
 Network security
• Proper network segmentation is important
• Controls, such as firewall rules, between
segmented networks are also important
• Use transport level security (i.e., TLS) in
cases where sensitive data is transmitted
• Employ certificate checking
• For Internet facing web services consider the
use of a Web Application Firewall
• Consider your audience
Architecture: Application Security
© 2017 Cloud Standards Customer Council 13
 Threat modelling
• Analyze attack surface
• Identify targets of attack
• Document bad actors & motivations
• Assess operational risks
 Secure design
• Analyze attack surface
• Service and data isolation
 Secure coding
• Input validation
• Output encoding
• Session management
• Credential and password handling
• Protect sensitive data in storage and
in motion
• Error handling and logging
• Protect log information
• Selection and proper use of APIs
and network services
 Security testing
• Attack surface review
• Fuzz testing
• Web app scanning and penetration
testing
 Cloud application security controls
• Cryptography
• Identity & Access Management
• Web Application Firewall
• API security
• Container security
Architecture: Data Security
© 2017 Cloud Standards Customer Council 14
 Data Classification:
• Public, Private, Regulated, Etc.
 Data Protection:
• Data de-identification vs encryption
• Scope & technique of encryption
• Importance of key management
 Data activity monitoring
• Including tenant specific views
 Data access & control
• Secure deletion
• Right to be forgotten
Architecture: Secure DevOps
© 2017 Cloud Standards Customer Council 15
 Secure DevOps is an extension of
application security
 Embed security in a DevOps operational
framework
 Security testing categories:
• Functional testing for authentication,
authorization and identity management
• Non-functional testing for known
weaknesses
• Application and infrastructure security
scanning
• Testing application logic for
vulnerabilities
 Security testing activities:
• Static & Dynamic scans
• Manual code review
• Validated testing of integrated services
 Secure deployment management
Architecture: Governance, Risk & Compliance
© 2017 Cloud Standards Customer Council 16
 Understand the line of responsibility:
• IaaS, PaaS, SaaS all have very different
lines
• Education is essential
 Start with an understanding of risk
• Consider applicable laws, regulations &
organizational security policies
 Consider policy changes needed for cloud:
• Terminology
• Scope (IaaS, PaaS, SaaS)
 Map customer & provider policies
 Leverage the value of compliance &
industry certifications
Architecture: Security Monitoring & Vulnerability
© 2017 Cloud Standards Customer Council 17
 Security monitoring enables proactive
tracking & reaction to security incidents
 Monitoring challenges:
• “Shadow IT”
• Extending corporate security policies to
cloud services
 Monitoring implementation considerations:
• Proxy
• Mobile device manager (MDM)
• Mobile content manager (MCM)
• Gateway device
• Transparent gateway
 Security analytics
• Detect deviations from regular patterns
• Uncover changes in network traffic
• Find activities that exceed defined levels
 Vulnerability management focus:
• Subscribe to Common Vulnerability
Exposure (CVE) lists
• Analyze CVE data to identify and prioritize
relevant vulnerabilities
• Develop a plan to remediate vulnerabilities
in a timely manner
• Test to verify vulnerabilities have been
remediated
 Vulnerability management is multi-phase
process
1. Establish policies
2. Scan to identify vulnerabilities
3. Prioritize vulnerabilities
4. Mitigate vulnerabilities
5. Maintain & monitor vulnerabilities
Key to Success Considerations
Manage access to cloud
applications and resources
 IdAM for use of cloud services and for the applications and resources within
those cloud services
 Seamless IdAM systems covering cloud services and on-premises systems
Protect and secure cloud
apps, data & infrastructure
 Ensure boundary controls in place for all assets related to cloud services
 Encrypt sensitive data
 Encrypt communications
Gain visibility into all
resources on cloud services
 Ensure monitoring of cloud services and the apps/data located on cloud
services
 Integrate cloud service monitoring with monitoring of on-premises resources
Incorporate security into
DevOps for cloud services
 Include “Secure by Design” and “Data Protection by Design” principles into
all applications destined to run on cloud services
 Include security elements into DevOps processes and test security elements
before and during production deployment
Strong security policy and
governance
 Build a comprehensive security policy for all cloud services
 Ensure compliance with all corporate, industry and government
requirements and regulations
 Enforce security policy through measurable security controls
 Check cloud service provider compliance through certifications
Automation of security
services
 Automated , reusable security services provide best support for security
standardization and consistency
Keys to Success
© 2017 Cloud Standards Customer Council 18
© 2017 Cloud Standards Customer Council www.cloud-council.org 19
Call to Action
Join the CSCC Now!
– To have an impact on customer use case based standards requirements
– To learn about all Cloud Standards within one organization
– To help define the CSCC’s future roadmap
– Membership is free & easy: http://www.cloud-council.org/become-a-
member
Get Involved!
– Join one or more of the CSCC Working Groups
http://www.cloud-council.org/workinggroups
Leverage CSCC Collateral
– Visit http://www.cloud-council.org/resource-hub
© 2017 Cloud Standards Customer Council www.cloud-council.org 20
Whitepapers
• Security for Cloud Computing: 10 Steps to Ensure Success v2.0
http://www.cloud-council.org/deliverables/security-for-cloud-computing-10-steps-to-ensure-success.htm
• Cloud Security Standards: What to Expect and What to Negotiate v2.0
http://www.cloud-council.org/deliverables/cloud-security-standards-what-to-expect-and-what-to-
negotiate.htm
Cloud Customer Reference Architectures
• Web Application Hosting
http://www.cloud-council.org/deliverables/cloud-customer-architecture-for-web-application-hosting.htm
• Big Data & Analytics
http://www.cloud-council.org/deliverables/cloud-customer-architecture-for-big-data-and-analytics.htm
• IoT
http://www.cloud-council.org/deliverables/cloud-customer-architecture-for-iot.htm
• Mobile
http://www.cloud-council.org/deliverables/cloud-customer-architecture-for-mobile.htm
• And more!
Additional Resources from the CSCC
View all papers www.cloud-council.org/resource-hub and companion webinars www.cloud-council.org/events
© 2017 Cloud Standards Customer Council 20
21
Thank You

More Related Content

What's hot

Interoperability and Portability for Cloud Computing: A Guide V2.0
Interoperability and Portability for Cloud Computing: A Guide V2.0Interoperability and Portability for Cloud Computing: A Guide V2.0
Interoperability and Portability for Cloud Computing: A Guide V2.0
Cloud Standards Customer Council
 
Cloud Foundry Road Map in 2017
Cloud Foundry Road Map in 2017Cloud Foundry Road Map in 2017
Cloud Foundry Road Map in 2017
Cloud Standards Customer Council
 
Cloud Customer Architecture for e-Commerce
Cloud Customer Architecture for e-CommerceCloud Customer Architecture for e-Commerce
Cloud Customer Architecture for e-Commerce
Cloud Standards Customer Council
 
Practical Guide to Platform-as-a-Service
Practical Guide to Platform-as-a-Service Practical Guide to Platform-as-a-Service
Practical Guide to Platform-as-a-Service
Cloud Standards Customer Council
 
Practical Guide to Cloud Management Platforms
Practical Guide to Cloud Management PlatformsPractical Guide to Cloud Management Platforms
Practical Guide to Cloud Management Platforms
Cloud Standards Customer Council
 
Cloud Foundry Roadmap in 2016
Cloud Foundry Roadmap in 2016Cloud Foundry Roadmap in 2016
Cloud Foundry Roadmap in 2016
Cloud Standards Customer Council
 
Hyperledger: Market, Technology & Community Update
Hyperledger: Market, Technology & Community UpdateHyperledger: Market, Technology & Community Update
Hyperledger: Market, Technology & Community Update
Cloud Standards Customer Council
 
Security for Cloud Computing: 10 Steps to Ensure Success V3.0
Security for Cloud Computing: 10 Steps to Ensure Success V3.0Security for Cloud Computing: 10 Steps to Ensure Success V3.0
Security for Cloud Computing: 10 Steps to Ensure Success V3.0
Cloud Standards Customer Council
 
Latest Developments in Cloud Security Standards and Privacy
Latest Developments in Cloud Security Standards and PrivacyLatest Developments in Cloud Security Standards and Privacy
Latest Developments in Cloud Security Standards and Privacy
Cloud Standards Customer Council
 
Cloud Customer Architecture for Blockchain
Cloud Customer Architecture for BlockchainCloud Customer Architecture for Blockchain
Cloud Customer Architecture for Blockchain
Cloud Standards Customer Council
 
Where's My Data? Managing the Data Residency Challenge
Where's My Data? Managing the Data Residency ChallengeWhere's My Data? Managing the Data Residency Challenge
Where's My Data? Managing the Data Residency Challenge
Cloud Standards Customer Council
 
Data Residency: Challenges and the Need for Standards
Data Residency: Challenges and the Need for StandardsData Residency: Challenges and the Need for Standards
Data Residency: Challenges and the Need for Standards
Cloud Standards Customer Council
 
Kubernetes and Container Technologies from Cloud Native Computing Foundation
Kubernetes and Container Technologies from Cloud Native Computing FoundationKubernetes and Container Technologies from Cloud Native Computing Foundation
Kubernetes and Container Technologies from Cloud Native Computing Foundation
Cloud Standards Customer Council
 
Hybrid Integration
Hybrid IntegrationHybrid Integration
Hybrid Integration
BizTalk360
 
Microservices in the Enterprise: A Research Study and Reference Architecture
Microservices in the Enterprise: A Research Study and Reference ArchitectureMicroservices in the Enterprise: A Research Study and Reference Architecture
Microservices in the Enterprise: A Research Study and Reference Architecture
Jesus Rodriguez
 
Digital Integration Hub - Maximise Your APIs
Digital Integration Hub - Maximise Your APIsDigital Integration Hub - Maximise Your APIs
Digital Integration Hub - Maximise Your APIs
Daniel Toomey
 
Sukumar Nayak-Agile-DevOps-Cloud Management
Sukumar Nayak-Agile-DevOps-Cloud ManagementSukumar Nayak-Agile-DevOps-Cloud Management
Sukumar Nayak-Agile-DevOps-Cloud ManagementSukumar Nayak
 
XaaS Overview
XaaS OverviewXaaS Overview
Automate and simplify multi cloud complexity with f5 and hashi corp
Automate and simplify multi cloud complexity with f5 and hashi corpAutomate and simplify multi cloud complexity with f5 and hashi corp
Automate and simplify multi cloud complexity with f5 and hashi corp
Mitchell Pronschinske
 
IBM + REDHAT "Creating the World's Leading Hybrid Cloud Provider..."
IBM + REDHAT "Creating the World's Leading Hybrid Cloud Provider..."IBM + REDHAT "Creating the World's Leading Hybrid Cloud Provider..."
IBM + REDHAT "Creating the World's Leading Hybrid Cloud Provider..."
Gustavo Cuervo
 

What's hot (20)

Interoperability and Portability for Cloud Computing: A Guide V2.0
Interoperability and Portability for Cloud Computing: A Guide V2.0Interoperability and Portability for Cloud Computing: A Guide V2.0
Interoperability and Portability for Cloud Computing: A Guide V2.0
 
Cloud Foundry Road Map in 2017
Cloud Foundry Road Map in 2017Cloud Foundry Road Map in 2017
Cloud Foundry Road Map in 2017
 
Cloud Customer Architecture for e-Commerce
Cloud Customer Architecture for e-CommerceCloud Customer Architecture for e-Commerce
Cloud Customer Architecture for e-Commerce
 
Practical Guide to Platform-as-a-Service
Practical Guide to Platform-as-a-Service Practical Guide to Platform-as-a-Service
Practical Guide to Platform-as-a-Service
 
Practical Guide to Cloud Management Platforms
Practical Guide to Cloud Management PlatformsPractical Guide to Cloud Management Platforms
Practical Guide to Cloud Management Platforms
 
Cloud Foundry Roadmap in 2016
Cloud Foundry Roadmap in 2016Cloud Foundry Roadmap in 2016
Cloud Foundry Roadmap in 2016
 
Hyperledger: Market, Technology & Community Update
Hyperledger: Market, Technology & Community UpdateHyperledger: Market, Technology & Community Update
Hyperledger: Market, Technology & Community Update
 
Security for Cloud Computing: 10 Steps to Ensure Success V3.0
Security for Cloud Computing: 10 Steps to Ensure Success V3.0Security for Cloud Computing: 10 Steps to Ensure Success V3.0
Security for Cloud Computing: 10 Steps to Ensure Success V3.0
 
Latest Developments in Cloud Security Standards and Privacy
Latest Developments in Cloud Security Standards and PrivacyLatest Developments in Cloud Security Standards and Privacy
Latest Developments in Cloud Security Standards and Privacy
 
Cloud Customer Architecture for Blockchain
Cloud Customer Architecture for BlockchainCloud Customer Architecture for Blockchain
Cloud Customer Architecture for Blockchain
 
Where's My Data? Managing the Data Residency Challenge
Where's My Data? Managing the Data Residency ChallengeWhere's My Data? Managing the Data Residency Challenge
Where's My Data? Managing the Data Residency Challenge
 
Data Residency: Challenges and the Need for Standards
Data Residency: Challenges and the Need for StandardsData Residency: Challenges and the Need for Standards
Data Residency: Challenges and the Need for Standards
 
Kubernetes and Container Technologies from Cloud Native Computing Foundation
Kubernetes and Container Technologies from Cloud Native Computing FoundationKubernetes and Container Technologies from Cloud Native Computing Foundation
Kubernetes and Container Technologies from Cloud Native Computing Foundation
 
Hybrid Integration
Hybrid IntegrationHybrid Integration
Hybrid Integration
 
Microservices in the Enterprise: A Research Study and Reference Architecture
Microservices in the Enterprise: A Research Study and Reference ArchitectureMicroservices in the Enterprise: A Research Study and Reference Architecture
Microservices in the Enterprise: A Research Study and Reference Architecture
 
Digital Integration Hub - Maximise Your APIs
Digital Integration Hub - Maximise Your APIsDigital Integration Hub - Maximise Your APIs
Digital Integration Hub - Maximise Your APIs
 
Sukumar Nayak-Agile-DevOps-Cloud Management
Sukumar Nayak-Agile-DevOps-Cloud ManagementSukumar Nayak-Agile-DevOps-Cloud Management
Sukumar Nayak-Agile-DevOps-Cloud Management
 
XaaS Overview
XaaS OverviewXaaS Overview
XaaS Overview
 
Automate and simplify multi cloud complexity with f5 and hashi corp
Automate and simplify multi cloud complexity with f5 and hashi corpAutomate and simplify multi cloud complexity with f5 and hashi corp
Automate and simplify multi cloud complexity with f5 and hashi corp
 
IBM + REDHAT "Creating the World's Leading Hybrid Cloud Provider..."
IBM + REDHAT "Creating the World's Leading Hybrid Cloud Provider..."IBM + REDHAT "Creating the World's Leading Hybrid Cloud Provider..."
IBM + REDHAT "Creating the World's Leading Hybrid Cloud Provider..."
 

Similar to Cloud Customer Architecture for Securing Workloads on Cloud Services

IT4651w-CC-1b-Introduction.pptx
IT4651w-CC-1b-Introduction.pptxIT4651w-CC-1b-Introduction.pptx
IT4651w-CC-1b-Introduction.pptx
nada542773
 
Cloud Security Standards: What to Expect and What to Negotiate V2.0
Cloud Security Standards: What to Expect and What to Negotiate V2.0Cloud Security Standards: What to Expect and What to Negotiate V2.0
Cloud Security Standards: What to Expect and What to Negotiate V2.0
Cloud Standards Customer Council
 
APIs from the Edge to the Mesh
APIs from the Edge to the MeshAPIs from the Edge to the Mesh
APIs from the Edge to the Mesh
Nordic APIs
 
Cscc cloud-customer-architecture-for-e commerce
Cscc cloud-customer-architecture-for-e commerceCscc cloud-customer-architecture-for-e commerce
Cscc cloud-customer-architecture-for-e commerce
r_arorabms
 
Cloud Ecosystems A Perspective
Cloud Ecosystems A PerspectiveCloud Ecosystems A Perspective
Cloud Ecosystems A Perspective
jmcdaniel650
 
Radu crahmaliuc 23feb2012
Radu crahmaliuc 23feb2012Radu crahmaliuc 23feb2012
Radu crahmaliuc 23feb2012Agora Group
 
Becomming a cloud governance ninja linthicum interop fall 2013
Becomming a cloud governance ninja linthicum interop fall 2013Becomming a cloud governance ninja linthicum interop fall 2013
Becomming a cloud governance ninja linthicum interop fall 2013David Linthicum
 
Practical Guide to Hybrid Cloud Computing
Practical Guide to Hybrid Cloud ComputingPractical Guide to Hybrid Cloud Computing
Practical Guide to Hybrid Cloud Computing
Cloud Standards Customer Council
 
Cloud Computing & Business Intelligence
Cloud Computing & Business IntelligenceCloud Computing & Business Intelligence
Cloud Computing & Business IntelligenceSudip Chatterjee
 
Ibm cloud forum managing heterogenousclouds_final
Ibm cloud forum managing heterogenousclouds_finalIbm cloud forum managing heterogenousclouds_final
Ibm cloud forum managing heterogenousclouds_finalMauricio Godoy
 
Multi Cloud Architecture Approach
Multi Cloud Architecture ApproachMulti Cloud Architecture Approach
Multi Cloud Architecture Approach
Maganathin Veeraragaloo
 
Cloud Computing Tearm paper for first year IS student
Cloud Computing Tearm paper for first year IS studentCloud Computing Tearm paper for first year IS student
Cloud Computing Tearm paper for first year IS student
bemnitekalegn
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
MerisCon ARTDesign
 
(ENT202) Four Critical Things to Consider When Moving Your Core Business Appl...
(ENT202) Four Critical Things to Consider When Moving Your Core Business Appl...(ENT202) Four Critical Things to Consider When Moving Your Core Business Appl...
(ENT202) Four Critical Things to Consider When Moving Your Core Business Appl...
Amazon Web Services
 
1 (1).pptx
1 (1).pptx1 (1).pptx
1 (1).pptx
SabitaRajbanshi1
 
Cloud Use Cases And Standards
Cloud Use Cases And StandardsCloud Use Cases And Standards
Cloud Use Cases And Standards
GovCloud Network
 
The Ultimate Guide to Cloud Migration - A Whitepaper by RapidValue
The Ultimate Guide to Cloud Migration - A Whitepaper by RapidValueThe Ultimate Guide to Cloud Migration - A Whitepaper by RapidValue
The Ultimate Guide to Cloud Migration - A Whitepaper by RapidValue
RapidValue
 
dtechnClouologyassociatepart2
dtechnClouologyassociatepart2dtechnClouologyassociatepart2
dtechnClouologyassociatepart2
Anne Starr
 
Steve Mills - Dispelling the Vapor Around Cloud Computing
Steve Mills - Dispelling the Vapor Around Cloud ComputingSteve Mills - Dispelling the Vapor Around Cloud Computing
Steve Mills - Dispelling the Vapor Around Cloud ComputingMauricio Godoy
 
Cloud computing
Cloud computingCloud computing
Cloud computingshethzaid
 

Similar to Cloud Customer Architecture for Securing Workloads on Cloud Services (20)

IT4651w-CC-1b-Introduction.pptx
IT4651w-CC-1b-Introduction.pptxIT4651w-CC-1b-Introduction.pptx
IT4651w-CC-1b-Introduction.pptx
 
Cloud Security Standards: What to Expect and What to Negotiate V2.0
Cloud Security Standards: What to Expect and What to Negotiate V2.0Cloud Security Standards: What to Expect and What to Negotiate V2.0
Cloud Security Standards: What to Expect and What to Negotiate V2.0
 
APIs from the Edge to the Mesh
APIs from the Edge to the MeshAPIs from the Edge to the Mesh
APIs from the Edge to the Mesh
 
Cscc cloud-customer-architecture-for-e commerce
Cscc cloud-customer-architecture-for-e commerceCscc cloud-customer-architecture-for-e commerce
Cscc cloud-customer-architecture-for-e commerce
 
Cloud Ecosystems A Perspective
Cloud Ecosystems A PerspectiveCloud Ecosystems A Perspective
Cloud Ecosystems A Perspective
 
Radu crahmaliuc 23feb2012
Radu crahmaliuc 23feb2012Radu crahmaliuc 23feb2012
Radu crahmaliuc 23feb2012
 
Becomming a cloud governance ninja linthicum interop fall 2013
Becomming a cloud governance ninja linthicum interop fall 2013Becomming a cloud governance ninja linthicum interop fall 2013
Becomming a cloud governance ninja linthicum interop fall 2013
 
Practical Guide to Hybrid Cloud Computing
Practical Guide to Hybrid Cloud ComputingPractical Guide to Hybrid Cloud Computing
Practical Guide to Hybrid Cloud Computing
 
Cloud Computing & Business Intelligence
Cloud Computing & Business IntelligenceCloud Computing & Business Intelligence
Cloud Computing & Business Intelligence
 
Ibm cloud forum managing heterogenousclouds_final
Ibm cloud forum managing heterogenousclouds_finalIbm cloud forum managing heterogenousclouds_final
Ibm cloud forum managing heterogenousclouds_final
 
Multi Cloud Architecture Approach
Multi Cloud Architecture ApproachMulti Cloud Architecture Approach
Multi Cloud Architecture Approach
 
Cloud Computing Tearm paper for first year IS student
Cloud Computing Tearm paper for first year IS studentCloud Computing Tearm paper for first year IS student
Cloud Computing Tearm paper for first year IS student
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
(ENT202) Four Critical Things to Consider When Moving Your Core Business Appl...
(ENT202) Four Critical Things to Consider When Moving Your Core Business Appl...(ENT202) Four Critical Things to Consider When Moving Your Core Business Appl...
(ENT202) Four Critical Things to Consider When Moving Your Core Business Appl...
 
1 (1).pptx
1 (1).pptx1 (1).pptx
1 (1).pptx
 
Cloud Use Cases And Standards
Cloud Use Cases And StandardsCloud Use Cases And Standards
Cloud Use Cases And Standards
 
The Ultimate Guide to Cloud Migration - A Whitepaper by RapidValue
The Ultimate Guide to Cloud Migration - A Whitepaper by RapidValueThe Ultimate Guide to Cloud Migration - A Whitepaper by RapidValue
The Ultimate Guide to Cloud Migration - A Whitepaper by RapidValue
 
dtechnClouologyassociatepart2
dtechnClouologyassociatepart2dtechnClouologyassociatepart2
dtechnClouologyassociatepart2
 
Steve Mills - Dispelling the Vapor Around Cloud Computing
Steve Mills - Dispelling the Vapor Around Cloud ComputingSteve Mills - Dispelling the Vapor Around Cloud Computing
Steve Mills - Dispelling the Vapor Around Cloud Computing
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 

More from Cloud Standards Customer Council

What's New in Cloud Foundry
What's New in Cloud FoundryWhat's New in Cloud Foundry
What's New in Cloud Foundry
Cloud Standards Customer Council
 
Hyperledger: Advancing Blockchain Technology for Business
Hyperledger: Advancing Blockchain Technology for BusinessHyperledger: Advancing Blockchain Technology for Business
Hyperledger: Advancing Blockchain Technology for Business
Cloud Standards Customer Council
 
Interoperability and Portability for Cloud Computing: A Guide
Interoperability and Portability for Cloud Computing: A GuideInteroperability and Portability for Cloud Computing: A Guide
Interoperability and Portability for Cloud Computing: A Guide
Cloud Standards Customer Council
 
Cloud Customer Architecture for IoT
Cloud Customer Architecture for IoTCloud Customer Architecture for IoT
Cloud Customer Architecture for IoT
Cloud Standards Customer Council
 
OASIS TOSCA: Cloud Portability and Lifecycle Management
OASIS TOSCA: Cloud Portability and Lifecycle ManagementOASIS TOSCA: Cloud Portability and Lifecycle Management
OASIS TOSCA: Cloud Portability and Lifecycle Management
Cloud Standards Customer Council
 
Highlights of OpenStack Mitaka and the OpenStack Summit
Highlights of OpenStack Mitaka and the OpenStack SummitHighlights of OpenStack Mitaka and the OpenStack Summit
Highlights of OpenStack Mitaka and the OpenStack Summit
Cloud Standards Customer Council
 

More from Cloud Standards Customer Council (6)

What's New in Cloud Foundry
What's New in Cloud FoundryWhat's New in Cloud Foundry
What's New in Cloud Foundry
 
Hyperledger: Advancing Blockchain Technology for Business
Hyperledger: Advancing Blockchain Technology for BusinessHyperledger: Advancing Blockchain Technology for Business
Hyperledger: Advancing Blockchain Technology for Business
 
Interoperability and Portability for Cloud Computing: A Guide
Interoperability and Portability for Cloud Computing: A GuideInteroperability and Portability for Cloud Computing: A Guide
Interoperability and Portability for Cloud Computing: A Guide
 
Cloud Customer Architecture for IoT
Cloud Customer Architecture for IoTCloud Customer Architecture for IoT
Cloud Customer Architecture for IoT
 
OASIS TOSCA: Cloud Portability and Lifecycle Management
OASIS TOSCA: Cloud Portability and Lifecycle ManagementOASIS TOSCA: Cloud Portability and Lifecycle Management
OASIS TOSCA: Cloud Portability and Lifecycle Management
 
Highlights of OpenStack Mitaka and the OpenStack Summit
Highlights of OpenStack Mitaka and the OpenStack SummitHighlights of OpenStack Mitaka and the OpenStack Summit
Highlights of OpenStack Mitaka and the OpenStack Summit
 

Recently uploaded

Globus Connect Server Deep Dive - GlobusWorld 2024
Globus Connect Server Deep Dive - GlobusWorld 2024Globus Connect Server Deep Dive - GlobusWorld 2024
Globus Connect Server Deep Dive - GlobusWorld 2024
Globus
 
RISE with SAP and Journey to the Intelligent Enterprise
RISE with SAP and Journey to the Intelligent EnterpriseRISE with SAP and Journey to the Intelligent Enterprise
RISE with SAP and Journey to the Intelligent Enterprise
Srikant77
 
Lecture 1 Introduction to games development
Lecture 1 Introduction to games developmentLecture 1 Introduction to games development
Lecture 1 Introduction to games development
abdulrafaychaudhry
 
OpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoam
OpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoamOpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoam
OpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoam
takuyayamamoto1800
 
Quarkus Hidden and Forbidden Extensions
Quarkus Hidden and Forbidden ExtensionsQuarkus Hidden and Forbidden Extensions
Quarkus Hidden and Forbidden Extensions
Max Andersen
 
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...
Anthony Dahanne
 
Vitthal Shirke Microservices Resume Montevideo
Vitthal Shirke Microservices Resume MontevideoVitthal Shirke Microservices Resume Montevideo
Vitthal Shirke Microservices Resume Montevideo
Vitthal Shirke
 
Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...
Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...
Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...
informapgpstrackings
 
Using IESVE for Room Loads Analysis - Australia & New Zealand
Using IESVE for Room Loads Analysis - Australia & New ZealandUsing IESVE for Room Loads Analysis - Australia & New Zealand
Using IESVE for Room Loads Analysis - Australia & New Zealand
IES VE
 
Into the Box 2024 - Keynote Day 2 Slides.pdf
Into the Box 2024 - Keynote Day 2 Slides.pdfInto the Box 2024 - Keynote Day 2 Slides.pdf
Into the Box 2024 - Keynote Day 2 Slides.pdf
Ortus Solutions, Corp
 
Globus Compute wth IRI Workflows - GlobusWorld 2024
Globus Compute wth IRI Workflows - GlobusWorld 2024Globus Compute wth IRI Workflows - GlobusWorld 2024
Globus Compute wth IRI Workflows - GlobusWorld 2024
Globus
 
May Marketo Masterclass, London MUG May 22 2024.pdf
May Marketo Masterclass, London MUG May 22 2024.pdfMay Marketo Masterclass, London MUG May 22 2024.pdf
May Marketo Masterclass, London MUG May 22 2024.pdf
Adele Miller
 
GlobusWorld 2024 Opening Keynote session
GlobusWorld 2024 Opening Keynote sessionGlobusWorld 2024 Opening Keynote session
GlobusWorld 2024 Opening Keynote session
Globus
 
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdfDominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
AMB-Review
 
Enterprise Resource Planning System in Telangana
Enterprise Resource Planning System in TelanganaEnterprise Resource Planning System in Telangana
Enterprise Resource Planning System in Telangana
NYGGS Automation Suite
 
Developing Distributed High-performance Computing Capabilities of an Open Sci...
Developing Distributed High-performance Computing Capabilities of an Open Sci...Developing Distributed High-performance Computing Capabilities of an Open Sci...
Developing Distributed High-performance Computing Capabilities of an Open Sci...
Globus
 
Large Language Models and the End of Programming
Large Language Models and the End of ProgrammingLarge Language Models and the End of Programming
Large Language Models and the End of Programming
Matt Welsh
 
Navigating the Metaverse: A Journey into Virtual Evolution"
Navigating the Metaverse: A Journey into Virtual Evolution"Navigating the Metaverse: A Journey into Virtual Evolution"
Navigating the Metaverse: A Journey into Virtual Evolution"
Donna Lenk
 
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, BetterWebinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
XfilesPro
 
Top Features to Include in Your Winzo Clone App for Business Growth (4).pptx
Top Features to Include in Your Winzo Clone App for Business Growth (4).pptxTop Features to Include in Your Winzo Clone App for Business Growth (4).pptx
Top Features to Include in Your Winzo Clone App for Business Growth (4).pptx
rickgrimesss22
 

Recently uploaded (20)

Globus Connect Server Deep Dive - GlobusWorld 2024
Globus Connect Server Deep Dive - GlobusWorld 2024Globus Connect Server Deep Dive - GlobusWorld 2024
Globus Connect Server Deep Dive - GlobusWorld 2024
 
RISE with SAP and Journey to the Intelligent Enterprise
RISE with SAP and Journey to the Intelligent EnterpriseRISE with SAP and Journey to the Intelligent Enterprise
RISE with SAP and Journey to the Intelligent Enterprise
 
Lecture 1 Introduction to games development
Lecture 1 Introduction to games developmentLecture 1 Introduction to games development
Lecture 1 Introduction to games development
 
OpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoam
OpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoamOpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoam
OpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoam
 
Quarkus Hidden and Forbidden Extensions
Quarkus Hidden and Forbidden ExtensionsQuarkus Hidden and Forbidden Extensions
Quarkus Hidden and Forbidden Extensions
 
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...
 
Vitthal Shirke Microservices Resume Montevideo
Vitthal Shirke Microservices Resume MontevideoVitthal Shirke Microservices Resume Montevideo
Vitthal Shirke Microservices Resume Montevideo
 
Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...
Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...
Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...
 
Using IESVE for Room Loads Analysis - Australia & New Zealand
Using IESVE for Room Loads Analysis - Australia & New ZealandUsing IESVE for Room Loads Analysis - Australia & New Zealand
Using IESVE for Room Loads Analysis - Australia & New Zealand
 
Into the Box 2024 - Keynote Day 2 Slides.pdf
Into the Box 2024 - Keynote Day 2 Slides.pdfInto the Box 2024 - Keynote Day 2 Slides.pdf
Into the Box 2024 - Keynote Day 2 Slides.pdf
 
Globus Compute wth IRI Workflows - GlobusWorld 2024
Globus Compute wth IRI Workflows - GlobusWorld 2024Globus Compute wth IRI Workflows - GlobusWorld 2024
Globus Compute wth IRI Workflows - GlobusWorld 2024
 
May Marketo Masterclass, London MUG May 22 2024.pdf
May Marketo Masterclass, London MUG May 22 2024.pdfMay Marketo Masterclass, London MUG May 22 2024.pdf
May Marketo Masterclass, London MUG May 22 2024.pdf
 
GlobusWorld 2024 Opening Keynote session
GlobusWorld 2024 Opening Keynote sessionGlobusWorld 2024 Opening Keynote session
GlobusWorld 2024 Opening Keynote session
 
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdfDominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
 
Enterprise Resource Planning System in Telangana
Enterprise Resource Planning System in TelanganaEnterprise Resource Planning System in Telangana
Enterprise Resource Planning System in Telangana
 
Developing Distributed High-performance Computing Capabilities of an Open Sci...
Developing Distributed High-performance Computing Capabilities of an Open Sci...Developing Distributed High-performance Computing Capabilities of an Open Sci...
Developing Distributed High-performance Computing Capabilities of an Open Sci...
 
Large Language Models and the End of Programming
Large Language Models and the End of ProgrammingLarge Language Models and the End of Programming
Large Language Models and the End of Programming
 
Navigating the Metaverse: A Journey into Virtual Evolution"
Navigating the Metaverse: A Journey into Virtual Evolution"Navigating the Metaverse: A Journey into Virtual Evolution"
Navigating the Metaverse: A Journey into Virtual Evolution"
 
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, BetterWebinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
 
Top Features to Include in Your Winzo Clone App for Business Growth (4).pptx
Top Features to Include in Your Winzo Clone App for Business Growth (4).pptxTop Features to Include in Your Winzo Clone App for Business Growth (4).pptx
Top Features to Include in Your Winzo Clone App for Business Growth (4).pptx
 

Cloud Customer Architecture for Securing Workloads on Cloud Services

  • 1. Cloud Customer Architecture for Securing Workloads on Cloud Services Webinar April 19, 2017 http://www.cloud-council.org/deliverables/cloud-customer-architecture-for-securing-workloads-on-cloud-services.htm
  • 2. The Cloud Standards Customer Council • Provide customer-led guidance to multiple cloud standards-defining bodies • Establishing criteria for open standards based cloud computing 650+ Organizations participating 2013/2014 Deliverables  Convergence of Social, Mobile, Cloud  Analysis of Public Cloud SLAs  Cloud Security Standards  Migrating Apps to Public Cloud Services  Social Business in the Cloud  Deploying Big Data in the Cloud  Practical Guide to Cloud Computing, V2  Migrating Apps: Performance Rqmnts  Cloud Interoperability/Portability http://cloud-council.org 2015 Deliverables  Web App Hosting Ref. Architecture  Mobile Ref. Architecture  Big Data & Analytics Ref. Architecture  Security for Cloud Computing, V2  Practical Guide to Cloud SLAs, V2  Practical Guide to PaaS THE Customer’s Voice for Cloud Standards! 2016 Deliverables  Prac Guide to Hybrid Cloud Computing  Public Cloud Service Agreements, V2  Cloud Security Standards, V2  IoT Ref. Architecture  e-Commerce Ref. Architecture  Impact of Cloud Computing on Healthcare, V2  Enterprise Social Collaboration Ref. Architecture 2017 Projects  Security for Cloud Services Ref. Architecture  Impact of Cloud Computing on Healthcare  Hybrid Integration Ref. Architecture  API Management Ref. Architecture  Data Residency discussion paper  Blockchain Ref. Architecture  Multi-cloud Management whitepaper  And more! © 2017 Cloud Standards Customer Council 2
  • 3. © 2017 Cloud Standards Customer Council www.cloud-council.org 3 Abstract & Agenda This talk introduces the Cloud Customer Architecture for Securing Workloads on Cloud Services  What are Cloud Solution Architectures?  CSCC’s Cloud Reference Architecture series • Cloud Customer Architecture for e-Commerce http://bit.ly/2camhIz • Cloud Customer Architecture for IoT http://bit.ly/2cLcomc • Cloud Customer Architecture for Big Data http://bit.ly/2crffR2 • Cloud Customer Architecture for Mobile http://bit.ly/2cIYtdI • Cloud Customer Architecture for Web Application Hosting http://bit.ly/2cgTVK2 • Cloud Customer Architecture for Enterprise Social Collaboration http://bit.ly/2jDiMPD • Cloud Customer Architecture for Hybrid Integration http://bit.ly/2lHlLs0 • Cloud Customer Architecture for API Management http://bit.ly/2n59GgY • Cloud Customer Architecture for Securing Workloads on Cloud Services http://bit.ly/2puolzX
  • 4. © 2017 Cloud Standards Customer Council www.cloud-council.org 4  Cloud Customer Reference Architectures are… • straightforward description of elements needed to implement particular application solutions using cloud infrastructure, cloud platforms, cloud software, and cloud services • deployment neutral (public, private, hybrid) & implementable via IaaS, PaaS, SaaS • general purpose reusable architectures as well as industry specific architectures • vendor neutral & open  Important because they… • enable cloud customers to understand unique features & advantages of using cloud computing • bridge gap between understanding cloud customer needs and cloud provider offerings • provide practical guidance on how common business applications can be realized from a cloud customer role perspective • are stable anchors in a rapidly innovating cloud landscape • save time, effort & money: be more productive  Useful when… • those planning to build cloud based applications • talking with cloud providers about their offerings • understanding of the common elements and relationships in relevant solutions  Target audience: • those planning on building/purchasing cloud based applications • developers, architects, managers  Consistent with ISO/IEC 17789 International Standard Cloud Computing Reference Architecture Cloud Customer Reference Architectures
  • 5. Cloud Security Overview © 2017 Cloud Standards Customer Council 5  Manage identity and access  Protect infrastructure, data, and applications  Security monitoring and intelligence  Optimize cloud security operations Impact of Deployment Models  Public - resources shared with other tenants; isolation is an issue  Private - no sharing with other organizations; sharing may take place between different parts of customer organization  Hybrid - requires careful analysis of the security elements of each of the connected systems Impact of Service Models  IaaS - customer takes on most responsibility for security of data, applications, systems and networks  PaaS – CSP responsible for security of platform; customer responsible for configuring appropriate security options  SaaS - CSP takes most responsibility for security of cloud services Key Aspects of Security Roles & Responsibilities  Security responsibilities split between CSP and cloud customer (ISO/IEC 17789)  Roles and responsibilities should be documented in cloud service agreement (ISO/IEC 27017 )
  • 6. Architecture: Overview © 2017 Cloud Standards Customer Council 6
  • 7. Architecture: User Roles © 2017 Cloud Standards Customer Council 7  Application User • Usually have access and control of data which can be sensitive • Service accounts may have access for bulk data updates in cloud environment  Cloud Admin • Privileged access users • Application publishers • Operators • Cloud administrators • Managers and team leads • Auditors • Authorized to read sensitive info and execute potentially destructive actions • Require an increased level of auditing  Cloud Developer • Create, update, and delete applications • Create cloud service instances and bind to applications • Authorized to read sensitive info and manipulate applications • Require an increased level of auditing
  • 8. Architecture: Devices © 2017 Cloud Standards Customer Council 8 Managed Device – devices that have Directory Services membership and/or are controlled by IT under compliance policies Unmanaged Device – devices which include personal devices (laptops, mobile devices), printers, cameras, etc.
  • 9. Architecture: Enterprise User Directory © 2017 Cloud Standards Customer Council 9 Enterprise User Directory - store and manage user profiles, associated credentials, password policies and group membership.
  • 10. Architecture: Enterprise Applications & Data © 2017 Cloud Standards Customer Council 10 Enterprise Application represents applications that run enterprise business processes and logic within existing enterprise systems. Enterprise Data represents the one or more systems of record, for example, transactional data or data warehouses that represent the existing data in the enterprise.
  • 11. Architecture: Identity & Access Management © 2017 Cloud Standards Customer Council 11  Identity lifecycle management – management of accounts and roles  Segregation of duties – controlling access to capabilities based on user role  Identity-as-a-Service (IDaaS) – enables cloud apps to externalize user authentication to a range of different identity providers  Federation Services – also known as a Single Sign-on (SSO)  Privileged Account Management (PAM) – a set of additional controls for privileged access accounts  Multifactor authentication (MFA) – additional levels of authentication for higher security  Mobile Device Management (MDM) – ensure that mobile devices are compliant with corporate policies  Reporting – view of access by users  Audit and compliance – validates security controls  Cloud Security Services – tools for handling security across cloud environments
  • 12. Architecture: Infrastructure Security © 2017 Cloud Standards Customer Council 12  Physical security • Implementation guidance is in ISO 27002, PCI DSS 3.2 and other standards • Provider should give assurances about physical security - independent SOC 2 report or ISO 27001 certification  Infrastructure isolation • Bare metal systems or dedicated hosts provide the most isolation • VMs provide a significant amount of isolation • Containers provide a lower level of isolation  Network security • Proper network segmentation is important • Controls, such as firewall rules, between segmented networks are also important • Use transport level security (i.e., TLS) in cases where sensitive data is transmitted • Employ certificate checking • For Internet facing web services consider the use of a Web Application Firewall • Consider your audience
  • 13. Architecture: Application Security © 2017 Cloud Standards Customer Council 13  Threat modelling • Analyze attack surface • Identify targets of attack • Document bad actors & motivations • Assess operational risks  Secure design • Analyze attack surface • Service and data isolation  Secure coding • Input validation • Output encoding • Session management • Credential and password handling • Protect sensitive data in storage and in motion • Error handling and logging • Protect log information • Selection and proper use of APIs and network services  Security testing • Attack surface review • Fuzz testing • Web app scanning and penetration testing  Cloud application security controls • Cryptography • Identity & Access Management • Web Application Firewall • API security • Container security
  • 14. Architecture: Data Security © 2017 Cloud Standards Customer Council 14  Data Classification: • Public, Private, Regulated, Etc.  Data Protection: • Data de-identification vs encryption • Scope & technique of encryption • Importance of key management  Data activity monitoring • Including tenant specific views  Data access & control • Secure deletion • Right to be forgotten
  • 15. Architecture: Secure DevOps © 2017 Cloud Standards Customer Council 15  Secure DevOps is an extension of application security  Embed security in a DevOps operational framework  Security testing categories: • Functional testing for authentication, authorization and identity management • Non-functional testing for known weaknesses • Application and infrastructure security scanning • Testing application logic for vulnerabilities  Security testing activities: • Static & Dynamic scans • Manual code review • Validated testing of integrated services  Secure deployment management
  • 16. Architecture: Governance, Risk & Compliance © 2017 Cloud Standards Customer Council 16  Understand the line of responsibility: • IaaS, PaaS, SaaS all have very different lines • Education is essential  Start with an understanding of risk • Consider applicable laws, regulations & organizational security policies  Consider policy changes needed for cloud: • Terminology • Scope (IaaS, PaaS, SaaS)  Map customer & provider policies  Leverage the value of compliance & industry certifications
  • 17. Architecture: Security Monitoring & Vulnerability © 2017 Cloud Standards Customer Council 17  Security monitoring enables proactive tracking & reaction to security incidents  Monitoring challenges: • “Shadow IT” • Extending corporate security policies to cloud services  Monitoring implementation considerations: • Proxy • Mobile device manager (MDM) • Mobile content manager (MCM) • Gateway device • Transparent gateway  Security analytics • Detect deviations from regular patterns • Uncover changes in network traffic • Find activities that exceed defined levels  Vulnerability management focus: • Subscribe to Common Vulnerability Exposure (CVE) lists • Analyze CVE data to identify and prioritize relevant vulnerabilities • Develop a plan to remediate vulnerabilities in a timely manner • Test to verify vulnerabilities have been remediated  Vulnerability management is multi-phase process 1. Establish policies 2. Scan to identify vulnerabilities 3. Prioritize vulnerabilities 4. Mitigate vulnerabilities 5. Maintain & monitor vulnerabilities
  • 18. Key to Success Considerations Manage access to cloud applications and resources  IdAM for use of cloud services and for the applications and resources within those cloud services  Seamless IdAM systems covering cloud services and on-premises systems Protect and secure cloud apps, data & infrastructure  Ensure boundary controls in place for all assets related to cloud services  Encrypt sensitive data  Encrypt communications Gain visibility into all resources on cloud services  Ensure monitoring of cloud services and the apps/data located on cloud services  Integrate cloud service monitoring with monitoring of on-premises resources Incorporate security into DevOps for cloud services  Include “Secure by Design” and “Data Protection by Design” principles into all applications destined to run on cloud services  Include security elements into DevOps processes and test security elements before and during production deployment Strong security policy and governance  Build a comprehensive security policy for all cloud services  Ensure compliance with all corporate, industry and government requirements and regulations  Enforce security policy through measurable security controls  Check cloud service provider compliance through certifications Automation of security services  Automated , reusable security services provide best support for security standardization and consistency Keys to Success © 2017 Cloud Standards Customer Council 18
  • 19. © 2017 Cloud Standards Customer Council www.cloud-council.org 19 Call to Action Join the CSCC Now! – To have an impact on customer use case based standards requirements – To learn about all Cloud Standards within one organization – To help define the CSCC’s future roadmap – Membership is free & easy: http://www.cloud-council.org/become-a- member Get Involved! – Join one or more of the CSCC Working Groups http://www.cloud-council.org/workinggroups Leverage CSCC Collateral – Visit http://www.cloud-council.org/resource-hub
  • 20. © 2017 Cloud Standards Customer Council www.cloud-council.org 20 Whitepapers • Security for Cloud Computing: 10 Steps to Ensure Success v2.0 http://www.cloud-council.org/deliverables/security-for-cloud-computing-10-steps-to-ensure-success.htm • Cloud Security Standards: What to Expect and What to Negotiate v2.0 http://www.cloud-council.org/deliverables/cloud-security-standards-what-to-expect-and-what-to- negotiate.htm Cloud Customer Reference Architectures • Web Application Hosting http://www.cloud-council.org/deliverables/cloud-customer-architecture-for-web-application-hosting.htm • Big Data & Analytics http://www.cloud-council.org/deliverables/cloud-customer-architecture-for-big-data-and-analytics.htm • IoT http://www.cloud-council.org/deliverables/cloud-customer-architecture-for-iot.htm • Mobile http://www.cloud-council.org/deliverables/cloud-customer-architecture-for-mobile.htm • And more! Additional Resources from the CSCC View all papers www.cloud-council.org/resource-hub and companion webinars www.cloud-council.org/events © 2017 Cloud Standards Customer Council 20