SlideShare a Scribd company logo
1 of 50
Cloud Security and Technology Adoption
By John Mathon
February 28, 2014
About the Author
o I am a 30+ year veteran of the computer
industry, 10 patents, publish / subscribe,
founder of TIBCO, also have started a
company in the DLP space as well as worked
at one of the most secure companies
(Bridgewater).
o I am not a security expert.
o I have implemented SaaS solutions in a
number of companies including a company I
founded and a large multibillion dollar
company.
Introduction
o The statement that is heard frequently:
“Cloud security is the biggest factor inhibiting
adoption of the cloud in most companies.”
o The premise of this statement is that cloud
security is a black hole or is much more risky
than traditional enterprise security.
History
o New Technologies that were described as being too insecure to do business with:
o Internet and credit cards
o Internet and email
o Internet and business transactions
o Electronic Signatures
o B2B
o I questioned the reality of these claims
o I believe I was right
o However, economic / business realities forced these things to happen
o So, are the following the same? Are they safe for personal or business use?
o Cloud IaaS
o Mobile Devices
o Cloud SaaS applications
o Cloud Data Storage
o Cloud PaaS
o Internet of Things
o Personal Cloud
The Cloud is a large business today growing
very fast considering it’s size
o Today
o IaaS - $6Billion 2013 business (8yrs from start)
o 136% annual growth rate today
o SaaS companies - $130Billion
o Mobile – 1.5 Billion smartphones
o Social – 1.2 Billion followers (22% of world population, 50% of US
population)
o Future 2017 (4 years)
o Total Cloud Services: $0.5Trillion (4X)
o IaaS - $100Billion (16X)
o PaaS - $14Billion (40X)
o SaaS - $0.4Trillion (3X)
o 2/3rds of all workloads will be processed in the cloud (*Cisco)
o 3 Billion smartphones
Cloud Adoption
o 9/2013 According to a survey from
Spiceworks, 70% of IT professionals are using
cloud-based web hosting applications, with
60% using cloud-based security and 30%
backup applications.
o Numbers climbing very fast with near universal
adoption possible within a few years
o http://www.computerweekly.com/news/2240206038/70-of-IT-professionals-using-cloud-at-work
Why is the Cloud growing so fast?
o For Small Companies
o Less capital needed
o Grow as fast as your business
o Self Service / DevOps
o Cloud providers provide superior service to in-house
o For Large Companies
o Less Capital needed means faster to market
o DevOps efficiencies to compete be more nimble
o Less Excess hardware - A waste of energy, money, space,
time…
o SaaS apps can increase productivity
o APIs, Social, Cloud Services enable new lines of revenue
The potential is almost incalculable in just
the next 5-7 years
o Datacenters of 50% of companies in the world
o SaaS/PaaS and other services
o Becoming the dominant and maybe only way
most software is delivered
o Other impacts
o Social, Behavioral
o Life without the cloud will be essentially
impossible for most people
Why is this overwhelmingly good?
o Most companies are not/should not be managing
technology at the level they are
o They are not competent at security, cost management, optimization or technology in general
o vastly underutilization of what they acquire
o unnecessary duplicative work of many people doing the same technology over and over
o technology that is being used way beyond it’s productive life.
o Universal Connectivity - People, Things, Applications
o Network Effect - Spurring massive cascading unpredictable
innovation
o Possibly not all positive
o Overall huge cost savings and improved efficiency
o Due to the first and second points the US/World economy
will see massive gains in productivity and improvements in
services and technology usage
Financial Firms have a higher standard
o Generally well endowed compared to many
other businesses.
o Federal regulation, International regulation
(Basel and individual country rules) and State
regulation.
o Fines assessed regularly.
o Financial data among the most sensitive and
private of all information of any corporation.
Of great concern to customers.
o 37% of all breaches (2012*)
*http://www.verizonenterprise.com/DBIR/2013/
Other Industries with similar constraints:
o Health
o Aerospace
Ecosystem PaaS’s
o Boeing Ecosystem PaaS
o Encourage airlines to buy Boeing Airplanes
o Create a PaaS for all Airlines and service providers
o Make it easier to buy Boeing, cheaper easier to
run an airline with Boeing airplanes
o Cars
o Google Android, OpenCar, OpenXC, Webinos, Apple, Blackberry / QNX
o Entertainment
o Finance
Should you adopt a technology?
Technology Benefit or Cost
Gives Employees Choice (BYOD,
applications, …)
Increased productivity (and morale, retention)
Is better than an internal technology Increased productivity (anything from slight to huge
benefit)
Is necessary for business with
customers or partners
Increased sales (unavoidable)
saves money over internal service Reduced costs (depends if productivity improvement or
loss accompanies)
Faster time to market Increased sales (potentially huge benefit)
Lack of cohesive common technology Decreased productivity Increased support costs and
difficult integration or sometimes collaboration
More expensive than internal service Increasing costs (not very frequently true especially
when one considers all lifecycle costs). There can be
variable costs that are uncontrolled. Productivity gains
may offset higher cost.
Increased Security Risk Can be mitigated to some extent
These benefits can be substantial
o A new technology can easily give a 30%
increase in productivity, reduced costs or
increased income.
o In many cases it is not optional to use a
certain technology, but how do we do it
safely?
o Security must find ways to minimize risk of the
new technology.
The point of this talk is perspective
o Security is part of a business decision
o The cloud will be made safe for business
o A strategy to minimize risk and maximize adoption
by segregating information and applications in a
fine grained way as they make sense to migrate is
essential
o The safety of the cloud is not great but it is no
worse than where we are in business, possibly
better. This may be sad but it is expected in
my opinion.
Agenda
o What is the cloud?
o Security in General
o Cloud vs Enterprise
o Best practices to adopt cloud services
o Enhanced Security Services for the Cloud
What is the cloud? Many things
o IaaS and Infrastructure Services (compute, data)
o *6B 2013, 136% annual YOY growth
o SaaS (Web Services and applications)
o APIs (at least 20,000 today doubling annually)
o PaaS and Platform Services (iPaaS, DaaS,
APIMaaS, BPMaaS…)
o *14B by 2016
o Mobile Apps, Web and BaaS
o Personal Cloud
o Internet of Things
*Gartner, 2013
Not all information is the same
o Customer information
o Extremely sensitive customer information
o Passwords, pins, personal data, health data, SS#
o Company employee information
o Extremely sensitive employee information
o passwords, SS#
o Company information
o Extremely sensitive company information
o Sales projections, roadmaps, customer interactions,
information that you would be liable for releasing
o Information that gives you significant market
advantage
Risks you face:
o Loss of personal data of employees
o Loss of customer personal data
o Loss of Corporate data that results in lost business
(customers upset, competitors find advantage)
o Loss of Service (Caused by security lapse)
o Lawsuits (loss of data/service related)
o Fines (Loss of data/service considered regulated)
o Reputation Damage
o Transitive Loss (you help someone compromise
someone else)
o And more…
Sources of loss
(irrespective of cloud or not cloud)
o Technology
o External hacking
o Infection / malware
o Denial of service
o Processes
o Physical penetration or data lost in transit
o Poor IT Practices
o People
o Internal
o Employee mistakes / phishing
The Enterprise “physical and electronic” 4 walls is
being continuously eroded by new stuff:
o Employees taking home data or electronics that contain data on
them (cell phones, USB, computers, …)
o SaaS (corporate data contained within)
o APIs and Web services, EDI or partner electronic interfaces
o Personal Cloud
o Internet of Things (coming)
o Cloud Services (IaaS)
o Higher level Cloud Services (PaaS and other)
o Social - Discussion boards, twitter
o Skunkworks/Unauthorized use:
o Personal Cloud(Dropbox, Google docs and apps, …)
o POC’s being done in PaaS or IaaS environments
o Enterprise Apps being used with corporate data
o Interactions with partners through cloud
o The people who violate controls most : IT people and executives
2013 Examples of breaches
Cloud Severity Attack Company Loss
Not
Cloud
Major undisclosed Target, Adobe 200+ million email,
passwords, credit stolen,
Adobe source code
Cloud Major Malware Facebook, Dropbox,
Linkedin
8 Million emails and
passwords lost
Not
Cloud
Major Internal Federal Reserve, NSA,
Dept Homeland Sec
Secrets Disclosed ,
personal information
Not
Cloud
Major Internal Goldman Sachs Trading Algorithms Stolen
Cloud Minor Human Error NYTimes, Twitter,
Cloudflare
Google email reset policies
allowed individuals to be
hacked
Cloud Minor API
Penetration
Linkedin Thousands of profiles
http://thinkprogress.org/security/2013/12/31/3108661/10-biggest-privacy-security-breaches-rocked-2013/#
2013 Examples of breaches
Cloud Severity Attack Company Loss
Cloud Minor Outage Amazon Heroku didn’t have
multiple regions
Not
Cloud
Minor undisclosed Department of
Energy
53,000 employee records
Not
Cloud
Major Physical
Penetration
Advocate Medical
Group
4 million medical records
lost
Cloud Major Human Error CorporateCarOnline 850,000 credit cards,
personal information
Cloud Minor Human Error MongoHQ Thousands of emails
http://thinkprogress.org/security/2013/12/31/3108661/10-biggest-privacy-security-breaches-rocked-2013/#
Cloud vs Enterprise
o Anything that can be accessed from the outside is under identical attack*
o However, on-premises environment users or customers actually suffer
more incidents than those of service provider environments. On-premises
environment users experience an average of 61.4 attacks, while service
provider environment customers averaged only 27.8.*
o After looking at both, there is no proof that cloud computing is any more
of a security risk than traditional internet usage. The research in this paper
has shown that there is no significant difference that makes one better
than the other.
o It is not provable that the cloud is less secure than enterprise security
o *http://searchcloudcomputing.techtarget.com/opinion/Clouds-are-more-secure-than-traditional-IT-systems-and-heres-why
o **http://www.cameron.edu/uploads/34/f4/34f4b845dca4fb2125ba03f0964efed1/3.pdf / Cloud Computing vs Traditional Internet Setting: Which One is More Secur
Security is a problem
o At least 200+million emails disclosed with passwords. Credit
cards of at least 40-80 million people with social sec#’s in
some cases.
o Medical records for 4 million people.
o Average of 60 attacks / year reported
o 37% of breaches affected financial organizations
o 14% insiders
o 19% china related breaches
o 35% involve physical compromise
o 76% exploited weak passwords
o vulnerability discovered to patch: 25-60 days at enterprises!
A Very High Percentage of these losses are non-cloud, possibly as
high as 80%
It is unclear what percentage of private companies disclose
breaches
Cloud Companies are required by law to disclose any loss*
*http://www.csoonline.com/article/221322/cso-disclosure-series-data-breach-notification-laws-state-by-state
Cloud Companies are responding to
threats
o Most cloud companies now enforce multi-
factor authentication
o Most cloud companies employ encryption
with salted passwords
o Google and others changing policies on
password resets
o AWS wiping disks now as default
o The feeling is the cloud service companies are
learning and becoming more and more astute
o What we really need is transparency!
Cloud is theoretically worse on security
o Ability to attack from anywhere and from
anyone could lead to many more attacks
o Specific cloud-based attacks such as exploiting
virtual machine vulnerability, building mobile
apps to exploit APIs
o Ubiquitous connectivity seems to imply more
chance for attacks –
o yet so far not the case
I am not saying:
o Cloud companies are all safer generically
o All Private companies enterprise security is
rotten
o That cloud is better than enterprise for
security if enterprise is done well
I am saying:
o Cloud is not blatantly more insecure than
enterprises
o For whatever reason the attention of hackers
has not become focused on cloud YET because
the number of incidents and severity is still
clearly more in the enterprise
o Some cloud companies are way better than
many enterprises in security today
o For the vast majority of companies large and
small the cloud is probably better
Cloud Companies use the same technology and
approaches as private companies
o Antivirus / Malware detection / Scanning
o Patching regimes
o Audits / Penetration testing
o Personnel training
o DLP technology / hardware
o Multiple authentication schemes
o Automated Event Detection
o Multiple Region backups / DR
o Physical Security
Vast majority of non-cloud companies not
competent in security*
*http://searchcloudcomputing.techtarget.com/opinion/Clouds-are-more-secure-than-traditional-IT-systems-and-heres-
why
This is NOT true in Finance
Companies like Fidelity …hopefully
Actual Losses – some data
o 400 cases of fraudulent ACH transactions of
$255 million with actual loss of $85 million
o July 2009, two U.S. stock exchanges were
victims of a sustained DDoS attack
o Outages have real cost
o Adobe lost actual source code for photoshop
o Reputation risk is an extreme concern
The cloud is not a black hole of security
o No evidence cloud computing IS riskier than
enterprise based computing
o More attacks reported both anecdotally,
statistically as well as admitted by private
companies than companies using cloud services
o Full disclosure at private companies doubtful
o Over the last 4 years as incidents happen the
strength of cloud security has increased. Most
companies now support 2 factor authentication
for instance. But problems clearly still exist.
Cloud vs NonCloud Security
Nine Top Threats
1. Data Breaches
2. Data Loss
3. Account Hijacking
4. Insecure APIs
5. Denial of Service
6. Malicious Insiders
7. Abuse of Cloud Services
8. Insufficient Due Diligence
9. Shared Technology Issues
CLOUD SECURITY ALLIANCE The Notorious Nine: Cloud Computing Top Threats in 2013
© 2013, Cloud Security Alliance. All rights reserved. 7 http://bit.ly/1brlej6
Infoworld 2/2013 http://www.infoworld.com/t/cloud-security/9-top-threats-cloud-computing-security-213428
Cloud Specific Security Concerns
o Data from one company leaking to another
(multi-tenancy isolation failure)
o Demand from one company leaking to
another (poor service)
o Inability to control specific policies and
personnel or change them at will
o Lack of transparency
o Inability to conduct effective investigations
o Naïveté in using the cloud*
o *http://blog.cloudpassage.com/2012/09/13/10-mom-didnt-warn-cloud/
Good Ideas
http://www.intel.com/content/www/us/en/cloud-computing/whats-holding-back-the-cloud-peer-research-report.html
Cloud Services
o Let’s look at various types of Cloud Services
and specific security concerns that don’t exist
necessarily in the enterprise
aaS’es
o IaaS
o Multi-tenancy isolation failures
o Virtualization vulnerabilities
o SaaS
o Multi-tenancy isolation failures
o PaaS - Poorly behaving apps can threaten other apps
o One app taking down another
o Multiplicative SLA weakening
o Very dynamic demand can stress other tenants
New types of security/service concerns
o APIs
o Conscious Malicious Rogue Applications
o inadvertent usage of Applications causing ability to
access information inappropriately
o Demand variations can be chaotic and result in wide
SLAs
o Mobile
o Loss of device
o Containerization problems
o Bad Applications (like virus)
o Employee termination issues
o Hardware hijacking
New types of security/service concerns
o Personal Cloud (moving of my life to the cloud)
o Type of information allowed may be inappropriate
o Sharing less controlled by the enterprise
o Termination – what happens to the information?
o Internet of things
o Privacy
o Potential damage to security depending on type of
device (camera, gps, activity tracking, cars, …)
o Social
o Reputation risk
o Lack of control of information shared by employees
and others
I admit
o It’s tiring and scary to consider all the
possibilities.
o So one has to take perspective.
o You’re not 100% in control
o You need to delegate but monitor
o Being a good manager
Best Practices
o Segregate data and applications in a fine grained way and
move to cloud incrementally as benefits promote adoption
(see adoption slide)
o Establish Service Provider SLA’s
o Negotiate hard for transparency not damages
o Make demands
o Ask questions, audit, stay involved
o Do not settle for applications or vendors which don’t meet your
security requirements. They will want your business and I bet
many will adapt if asked with reasonable proposals
o Watch for changes in the risk profiles
o As the cloud gains more and more adoption it is likely to start
seeing more and more attacks , more sophisticated attacks
What is happening?
o SaaS
o API Management huge (mostly focused on
external but internal growing)
o Reuse and Community collaboration
o BigData, data collection and intelligence
o PaaS Ecosystem and DevOps
o Mobile Apps
o iPaaS
o Personal Cloud / Internet of Things happening
Enterprise Reuse and Refactoring
o Most companies I see are doing this
o Reuse is hard
o It’s not just a registry
o Growing Mobile, API and Web service
application storm presages new era in
enterprise software
New Types of Security Available
o EMM (MDM, MAM) –
o Enterprise Mobility Management, provides control and monitoring of mobile devices
o API Management –
o app based security, fine grained authorization, SLA management
o Ecosystem Private PaaS
o Control of information shared to partners as well as applications
that use information
o Complex Event Processing
o Detect complex events that indicate intrusion, theft, accidental
behavior, suspicious behavior, alert, escalate
o 2 factor authentication, fine grained authorization
o New protocols and technologies support more control
o SDN
o Fingerprint scanners
WSO2 Commercial
o Completely Open Source – No enterprise
versions
o The only complete composable API Centric
Enterprise Application Platform
o Built entirely by WSO2
o Multi-tenant, Cloud Native, Componentized
Integrated Platform
o Built to API Centric, BigData, Mobile, Social,
Cloud, SOA Platform
WSO2 Commercial
o 200 customers worldwide
o In business 8 years
o Leading Enterprises in almost every vertical
industry:
o Retail, Aerospace, Health, Finance, Logistics,
Telecommunications, Government, Travel, …
o Ebay does 5 billion transactions/day on peak days on
our servers
o Boeing, Cisco and other industry leading companies
are starting to build their future technology vision
with WSO2
WSO2 Commercial
o Identity Management
o WSO2 has full suite of identity products supporting all new protocols and
features
o EMM (Enterprise Mobility Management)
o WSO2 has a full EMM suite with both device and application management
o Ecosystem PaaS
o WSO2 is working with several industry leaders to create PaaS’s for their
industry. This gives the leader control over the data and applications like
Apple has for Ios Apps and also encourages development of communities with
the first social enterprise store
o Hybrid Polyglot PaaS technology for sophisticated enterprise deployments
o API Management and Enterprise Store combining API, Mobile and Web
services to promote API Centric Enterprises
o NSA for you – our bigdata and CEP technology gives you the ability to
identify in real time and respond to security events
AND MORE. I have listed just the products relevant to security.
Conclusion
o We have seen the enemy and it is us.
o The issues for the cloud are the issues we deal
with everyday in the enterprise. It’s not a
reason to not adopt the cloud.
o For more info on WSO2: wso2.com
o Services Oxygenated
o John Mathon: VP, Product Strategy
o john@wso2.com

More Related Content

What's hot

Why Cybersecurity is a Data Problem
Why Cybersecurity is a Data ProblemWhy Cybersecurity is a Data Problem
Why Cybersecurity is a Data ProblemBernard Marr
 
Internet of things enabling tech - challenges - opportunities (2016)
Internet of things   enabling tech - challenges - opportunities (2016)Internet of things   enabling tech - challenges - opportunities (2016)
Internet of things enabling tech - challenges - opportunities (2016)Davor Dokonal
 
Uk Security Breach Investigations Report 2010
Uk Security Breach Investigations Report 2010Uk Security Breach Investigations Report 2010
Uk Security Breach Investigations Report 2010Hongyang Wang
 
HIPAA Compliance in the Cloud
HIPAA Compliance in the CloudHIPAA Compliance in the Cloud
HIPAA Compliance in the CloudOnline Tech
 
What Are The Latest Trends in Data Science?
What Are The Latest Trends in Data Science?What Are The Latest Trends in Data Science?
What Are The Latest Trends in Data Science?Bernard Marr
 
Is Your Organization in Crisis?
Is Your Organization in Crisis?Is Your Organization in Crisis?
Is Your Organization in Crisis?BlackBerry
 
These Fascinating Examples Show Why Streaming Data And Real-Time Analytics Ma...
These Fascinating Examples Show Why Streaming Data And Real-Time Analytics Ma...These Fascinating Examples Show Why Streaming Data And Real-Time Analytics Ma...
These Fascinating Examples Show Why Streaming Data And Real-Time Analytics Ma...Bernard Marr
 
How Smart Products Help Companies Profit From Data
How Smart Products Help Companies Profit From DataHow Smart Products Help Companies Profit From Data
How Smart Products Help Companies Profit From DataBernard Marr
 
Cisco IoE Value Index event presentation - 19 june 2013
Cisco IoE Value Index event presentation - 19 june 2013Cisco IoE Value Index event presentation - 19 june 2013
Cisco IoE Value Index event presentation - 19 june 2013John Earnhardt
 
The Secure Business in the Digital Age - 27th September 2017
The Secure Business in the Digital Age - 27th September 2017The Secure Business in the Digital Age - 27th September 2017
The Secure Business in the Digital Age - 27th September 2017Exponential_e
 
Iowa Weighs in on Ethics of Cloud Computing for Lawyers
Iowa Weighs in on Ethics of Cloud Computing for LawyersIowa Weighs in on Ethics of Cloud Computing for Lawyers
Iowa Weighs in on Ethics of Cloud Computing for LawyersNicole Black
 
Enterprise Mobility Applications: Addressing a Growing Gap
Enterprise Mobility Applications: Addressing a Growing GapEnterprise Mobility Applications: Addressing a Growing Gap
Enterprise Mobility Applications: Addressing a Growing GapBlackBerry
 
Internet of Things Ecosystem
Internet of Things Ecosystem Internet of Things Ecosystem
Internet of Things Ecosystem CompTIA
 
11 things IT leaders need to know about the internet of things
11 things IT leaders need to know about the internet of things 11 things IT leaders need to know about the internet of things
11 things IT leaders need to know about the internet of things WGroup
 
Internet of things ecosystem: The quest for value
Internet of things ecosystem: The quest for valueInternet of things ecosystem: The quest for value
Internet of things ecosystem: The quest for valueDeloitte United States
 

What's hot (20)

Why Cybersecurity is a Data Problem
Why Cybersecurity is a Data ProblemWhy Cybersecurity is a Data Problem
Why Cybersecurity is a Data Problem
 
Internet of things enabling tech - challenges - opportunities (2016)
Internet of things   enabling tech - challenges - opportunities (2016)Internet of things   enabling tech - challenges - opportunities (2016)
Internet of things enabling tech - challenges - opportunities (2016)
 
Internet_of_Things_CEO_ magazine
Internet_of_Things_CEO_ magazineInternet_of_Things_CEO_ magazine
Internet_of_Things_CEO_ magazine
 
Uk Security Breach Investigations Report 2010
Uk Security Breach Investigations Report 2010Uk Security Breach Investigations Report 2010
Uk Security Breach Investigations Report 2010
 
HIPAA Compliance in the Cloud
HIPAA Compliance in the CloudHIPAA Compliance in the Cloud
HIPAA Compliance in the Cloud
 
What Are The Latest Trends in Data Science?
What Are The Latest Trends in Data Science?What Are The Latest Trends in Data Science?
What Are The Latest Trends in Data Science?
 
Is Your Organization in Crisis?
Is Your Organization in Crisis?Is Your Organization in Crisis?
Is Your Organization in Crisis?
 
These Fascinating Examples Show Why Streaming Data And Real-Time Analytics Ma...
These Fascinating Examples Show Why Streaming Data And Real-Time Analytics Ma...These Fascinating Examples Show Why Streaming Data And Real-Time Analytics Ma...
These Fascinating Examples Show Why Streaming Data And Real-Time Analytics Ma...
 
The fourth industrial revolution
The fourth industrial revolutionThe fourth industrial revolution
The fourth industrial revolution
 
How Smart Products Help Companies Profit From Data
How Smart Products Help Companies Profit From DataHow Smart Products Help Companies Profit From Data
How Smart Products Help Companies Profit From Data
 
Cisco IoE Value Index event presentation - 19 june 2013
Cisco IoE Value Index event presentation - 19 june 2013Cisco IoE Value Index event presentation - 19 june 2013
Cisco IoE Value Index event presentation - 19 june 2013
 
The Secure Business in the Digital Age - 27th September 2017
The Secure Business in the Digital Age - 27th September 2017The Secure Business in the Digital Age - 27th September 2017
The Secure Business in the Digital Age - 27th September 2017
 
Iowa Weighs in on Ethics of Cloud Computing for Lawyers
Iowa Weighs in on Ethics of Cloud Computing for LawyersIowa Weighs in on Ethics of Cloud Computing for Lawyers
Iowa Weighs in on Ethics of Cloud Computing for Lawyers
 
Enterprise Mobility Applications: Addressing a Growing Gap
Enterprise Mobility Applications: Addressing a Growing GapEnterprise Mobility Applications: Addressing a Growing Gap
Enterprise Mobility Applications: Addressing a Growing Gap
 
Internet of Things Ecosystem
Internet of Things Ecosystem Internet of Things Ecosystem
Internet of Things Ecosystem
 
11 things IT leaders need to know about the internet of things
11 things IT leaders need to know about the internet of things 11 things IT leaders need to know about the internet of things
11 things IT leaders need to know about the internet of things
 
Internet of things ecosystem: The quest for value
Internet of things ecosystem: The quest for valueInternet of things ecosystem: The quest for value
Internet of things ecosystem: The quest for value
 
Ritz 4th-july-gdpr
Ritz 4th-july-gdprRitz 4th-july-gdpr
Ritz 4th-july-gdpr
 
Judicial Frameworks and Privacy Issues of Cloud Computing
Judicial Frameworks and Privacy Issues of Cloud ComputingJudicial Frameworks and Privacy Issues of Cloud Computing
Judicial Frameworks and Privacy Issues of Cloud Computing
 
Wax Switch
Wax SwitchWax Switch
Wax Switch
 

Viewers also liked

E commerce law and ethics
E commerce law and ethicsE commerce law and ethics
E commerce law and ethicsXophia Montawal
 
E-commerce Law in the Philippines
E-commerce Law in the PhilippinesE-commerce Law in the Philippines
E-commerce Law in the PhilippinesRaiaR
 
Indian Information Technology Act
Indian Information Technology ActIndian Information Technology Act
Indian Information Technology ActKaran Bhagatwala
 
Information Technology Act 2000
Information Technology Act 2000Information Technology Act 2000
Information Technology Act 2000Vijay Dalmia
 
Information technology act 2000
Information technology act 2000Information technology act 2000
Information technology act 2000Akash Varaiya
 
Real time Operating System
Real time Operating SystemReal time Operating System
Real time Operating SystemTech_MX
 

Viewers also liked (10)

IT Act,2000 - Law
IT Act,2000 - LawIT Act,2000 - Law
IT Act,2000 - Law
 
E commerce law and ethics
E commerce law and ethicsE commerce law and ethics
E commerce law and ethics
 
Security in Cloud Computing
Security in Cloud ComputingSecurity in Cloud Computing
Security in Cloud Computing
 
E-commerce Law in the Philippines
E-commerce Law in the PhilippinesE-commerce Law in the Philippines
E-commerce Law in the Philippines
 
Indian Information Technology Act
Indian Information Technology ActIndian Information Technology Act
Indian Information Technology Act
 
Information Technology Act 2000
Information Technology Act 2000Information Technology Act 2000
Information Technology Act 2000
 
Information technology act 2000
Information technology act 2000Information technology act 2000
Information technology act 2000
 
Cyber law
Cyber lawCyber law
Cyber law
 
Real time Operating System
Real time Operating SystemReal time Operating System
Real time Operating System
 
E commerce ppt
E commerce pptE commerce ppt
E commerce ppt
 

Similar to Cloud security and cloud adoption public

How CIOs should make Cloud investment - InfotechLead
How CIOs should make Cloud investment - InfotechLeadHow CIOs should make Cloud investment - InfotechLead
How CIOs should make Cloud investment - InfotechLeadArup Das
 
Moving enterprise IT to the cloud
Moving enterprise IT to the cloudMoving enterprise IT to the cloud
Moving enterprise IT to the cloudJan Wiersma
 
Next-Generation Cloud Infrastructure for Financial Services
Next-Generation Cloud Infrastructure for Financial ServicesNext-Generation Cloud Infrastructure for Financial Services
Next-Generation Cloud Infrastructure for Financial ServicesBernard Marr
 
Business with Cloud Computing
Business with  Cloud ComputingBusiness with  Cloud Computing
Business with Cloud ComputingIMC Institute
 
Cloud Computing Webinar
Cloud Computing WebinarCloud Computing Webinar
Cloud Computing WebinarTechSoup
 
Employing cloud ian moyse - workbooks - whitepaper
Employing cloud   ian moyse - workbooks - whitepaperEmploying cloud   ian moyse - workbooks - whitepaper
Employing cloud ian moyse - workbooks - whitepaperITpreneurs
 
Thailand Business with the Cloud Service
Thailand Business with  the Cloud ServiceThailand Business with  the Cloud Service
Thailand Business with the Cloud ServiceIMC Institute
 
The Geospatial Future of Insurance
The Geospatial Future of InsuranceThe Geospatial Future of Insurance
The Geospatial Future of InsuranceHugh Saalmans
 
How to fail in the IoT business
How to fail in the IoT businessHow to fail in the IoT business
How to fail in the IoT businessPerry Lea
 
Data Sovereignty, Security, and Performance Panacea: Why Mastercard Sets the ...
Data Sovereignty, Security, and Performance Panacea: Why Mastercard Sets the ...Data Sovereignty, Security, and Performance Panacea: Why Mastercard Sets the ...
Data Sovereignty, Security, and Performance Panacea: Why Mastercard Sets the ...Dana Gardner
 
IEEE PHM Cloud Computing
IEEE PHM Cloud ComputingIEEE PHM Cloud Computing
IEEE PHM Cloud ComputingJoseph Williams
 
Overcoming The Biggest Barriers To Cloud Computing?
Overcoming The Biggest Barriers To Cloud Computing?Overcoming The Biggest Barriers To Cloud Computing?
Overcoming The Biggest Barriers To Cloud Computing?Bernard Marr
 
Top 10 Cloud Trends for 2017
Top 10 Cloud Trends for 2017Top 10 Cloud Trends for 2017
Top 10 Cloud Trends for 2017Tableau Software
 
2013 Technology Trends
2013 Technology Trends2013 Technology Trends
2013 Technology TrendsSynergisIT
 
Identity and Access Management as a Service Gets Boost with SailPoint's Ident...
Identity and Access Management as a Service Gets Boost with SailPoint's Ident...Identity and Access Management as a Service Gets Boost with SailPoint's Ident...
Identity and Access Management as a Service Gets Boost with SailPoint's Ident...Dana Gardner
 
1594884 - Pearson Education Limited ©Q7-8 2026 Within t.docx
1594884 - Pearson Education Limited ©Q7-8 2026 Within t.docx1594884 - Pearson Education Limited ©Q7-8 2026 Within t.docx
1594884 - Pearson Education Limited ©Q7-8 2026 Within t.docxdurantheseldine
 

Similar to Cloud security and cloud adoption public (20)

How CIOs should make Cloud investment - InfotechLead
How CIOs should make Cloud investment - InfotechLeadHow CIOs should make Cloud investment - InfotechLead
How CIOs should make Cloud investment - InfotechLead
 
Moving enterprise IT to the cloud
Moving enterprise IT to the cloudMoving enterprise IT to the cloud
Moving enterprise IT to the cloud
 
Next-Generation Cloud Infrastructure for Financial Services
Next-Generation Cloud Infrastructure for Financial ServicesNext-Generation Cloud Infrastructure for Financial Services
Next-Generation Cloud Infrastructure for Financial Services
 
Business with Cloud Computing
Business with  Cloud ComputingBusiness with  Cloud Computing
Business with Cloud Computing
 
Cloud Computing Webinar
Cloud Computing WebinarCloud Computing Webinar
Cloud Computing Webinar
 
Employing cloud ian moyse - workbooks - whitepaper
Employing cloud   ian moyse - workbooks - whitepaperEmploying cloud   ian moyse - workbooks - whitepaper
Employing cloud ian moyse - workbooks - whitepaper
 
Thailand Business with the Cloud Service
Thailand Business with  the Cloud ServiceThailand Business with  the Cloud Service
Thailand Business with the Cloud Service
 
ION Hangzhou - Developing the Internet of Things (Morning Keynote)
ION Hangzhou - Developing the Internet of Things (Morning Keynote)ION Hangzhou - Developing the Internet of Things (Morning Keynote)
ION Hangzhou - Developing the Internet of Things (Morning Keynote)
 
The Geospatial Future of Insurance
The Geospatial Future of InsuranceThe Geospatial Future of Insurance
The Geospatial Future of Insurance
 
How to fail in the IoT business
How to fail in the IoT businessHow to fail in the IoT business
How to fail in the IoT business
 
Navigating the Flood of BYOD
Navigating the Flood of BYODNavigating the Flood of BYOD
Navigating the Flood of BYOD
 
Facing the Future - Is the cloud right for you?
Facing the Future - Is the cloud right for you?Facing the Future - Is the cloud right for you?
Facing the Future - Is the cloud right for you?
 
Data Sovereignty, Security, and Performance Panacea: Why Mastercard Sets the ...
Data Sovereignty, Security, and Performance Panacea: Why Mastercard Sets the ...Data Sovereignty, Security, and Performance Panacea: Why Mastercard Sets the ...
Data Sovereignty, Security, and Performance Panacea: Why Mastercard Sets the ...
 
IEEE PHM Cloud Computing
IEEE PHM Cloud ComputingIEEE PHM Cloud Computing
IEEE PHM Cloud Computing
 
Overcoming The Biggest Barriers To Cloud Computing?
Overcoming The Biggest Barriers To Cloud Computing?Overcoming The Biggest Barriers To Cloud Computing?
Overcoming The Biggest Barriers To Cloud Computing?
 
Cloud Industry Forum Report: Cloud for Business, Why Security is No Longer a ...
Cloud Industry Forum Report: Cloud for Business, Why Security is No Longer a ...Cloud Industry Forum Report: Cloud for Business, Why Security is No Longer a ...
Cloud Industry Forum Report: Cloud for Business, Why Security is No Longer a ...
 
Top 10 Cloud Trends for 2017
Top 10 Cloud Trends for 2017Top 10 Cloud Trends for 2017
Top 10 Cloud Trends for 2017
 
2013 Technology Trends
2013 Technology Trends2013 Technology Trends
2013 Technology Trends
 
Identity and Access Management as a Service Gets Boost with SailPoint's Ident...
Identity and Access Management as a Service Gets Boost with SailPoint's Ident...Identity and Access Management as a Service Gets Boost with SailPoint's Ident...
Identity and Access Management as a Service Gets Boost with SailPoint's Ident...
 
1594884 - Pearson Education Limited ©Q7-8 2026 Within t.docx
1594884 - Pearson Education Limited ©Q7-8 2026 Within t.docx1594884 - Pearson Education Limited ©Q7-8 2026 Within t.docx
1594884 - Pearson Education Limited ©Q7-8 2026 Within t.docx
 

More from John Mathon

IOT Success depends on Integration
IOT Success depends on Integration IOT Success depends on Integration
IOT Success depends on Integration John Mathon
 
Enterprise platform 3.0v4 for webinar
Enterprise platform 3.0v4 for webinarEnterprise platform 3.0v4 for webinar
Enterprise platform 3.0v4 for webinarJohn Mathon
 
Successful Industrial IoT patterns
Successful Industrial IoT patterns Successful Industrial IoT patterns
Successful Industrial IoT patterns John Mathon
 
Artificial Intelligence is back, Deep Learning Networks and Quantum possibili...
Artificial Intelligence is back, Deep Learning Networks and Quantum possibili...Artificial Intelligence is back, Deep Learning Networks and Quantum possibili...
Artificial Intelligence is back, Deep Learning Networks and Quantum possibili...John Mathon
 
Iot my buy dont buy maybe
Iot my buy dont buy maybeIot my buy dont buy maybe
Iot my buy dont buy maybeJohn Mathon
 
Fraudless voting with blockchain
Fraudless voting with blockchainFraudless voting with blockchain
Fraudless voting with blockchainJohn Mathon
 
Wso2 con 2014 event driven architecture Publish/Subscribe Pubsub
Wso2 con 2014 event driven architecture Publish/Subscribe PubsubWso2 con 2014 event driven architecture Publish/Subscribe Pubsub
Wso2 con 2014 event driven architecture Publish/Subscribe PubsubJohn Mathon
 
Tesla iot case study
Tesla  iot case studyTesla  iot case study
Tesla iot case studyJohn Mathon
 
Choosing a dev ops paas platform svccd presentation v2 for slideshare
Choosing a dev ops paas platform svccd presentation v2 for slideshareChoosing a dev ops paas platform svccd presentation v2 for slideshare
Choosing a dev ops paas platform svccd presentation v2 for slideshareJohn Mathon
 
Choosing a dev ops paas platform
Choosing a dev ops paas platformChoosing a dev ops paas platform
Choosing a dev ops paas platformJohn Mathon
 
Wso2 con building the api centric enterprise - towards a connected business
Wso2 con   building the api centric enterprise - towards a connected businessWso2 con   building the api centric enterprise - towards a connected business
Wso2 con building the api centric enterprise - towards a connected businessJohn Mathon
 
Wso2 v ision api centric
Wso2 v ision api centricWso2 v ision api centric
Wso2 v ision api centricJohn Mathon
 

More from John Mathon (12)

IOT Success depends on Integration
IOT Success depends on Integration IOT Success depends on Integration
IOT Success depends on Integration
 
Enterprise platform 3.0v4 for webinar
Enterprise platform 3.0v4 for webinarEnterprise platform 3.0v4 for webinar
Enterprise platform 3.0v4 for webinar
 
Successful Industrial IoT patterns
Successful Industrial IoT patterns Successful Industrial IoT patterns
Successful Industrial IoT patterns
 
Artificial Intelligence is back, Deep Learning Networks and Quantum possibili...
Artificial Intelligence is back, Deep Learning Networks and Quantum possibili...Artificial Intelligence is back, Deep Learning Networks and Quantum possibili...
Artificial Intelligence is back, Deep Learning Networks and Quantum possibili...
 
Iot my buy dont buy maybe
Iot my buy dont buy maybeIot my buy dont buy maybe
Iot my buy dont buy maybe
 
Fraudless voting with blockchain
Fraudless voting with blockchainFraudless voting with blockchain
Fraudless voting with blockchain
 
Wso2 con 2014 event driven architecture Publish/Subscribe Pubsub
Wso2 con 2014 event driven architecture Publish/Subscribe PubsubWso2 con 2014 event driven architecture Publish/Subscribe Pubsub
Wso2 con 2014 event driven architecture Publish/Subscribe Pubsub
 
Tesla iot case study
Tesla  iot case studyTesla  iot case study
Tesla iot case study
 
Choosing a dev ops paas platform svccd presentation v2 for slideshare
Choosing a dev ops paas platform svccd presentation v2 for slideshareChoosing a dev ops paas platform svccd presentation v2 for slideshare
Choosing a dev ops paas platform svccd presentation v2 for slideshare
 
Choosing a dev ops paas platform
Choosing a dev ops paas platformChoosing a dev ops paas platform
Choosing a dev ops paas platform
 
Wso2 con building the api centric enterprise - towards a connected business
Wso2 con   building the api centric enterprise - towards a connected businessWso2 con   building the api centric enterprise - towards a connected business
Wso2 con building the api centric enterprise - towards a connected business
 
Wso2 v ision api centric
Wso2 v ision api centricWso2 v ision api centric
Wso2 v ision api centric
 

Cloud security and cloud adoption public

  • 1. Cloud Security and Technology Adoption By John Mathon February 28, 2014
  • 2. About the Author o I am a 30+ year veteran of the computer industry, 10 patents, publish / subscribe, founder of TIBCO, also have started a company in the DLP space as well as worked at one of the most secure companies (Bridgewater). o I am not a security expert. o I have implemented SaaS solutions in a number of companies including a company I founded and a large multibillion dollar company.
  • 3. Introduction o The statement that is heard frequently: “Cloud security is the biggest factor inhibiting adoption of the cloud in most companies.” o The premise of this statement is that cloud security is a black hole or is much more risky than traditional enterprise security.
  • 4. History o New Technologies that were described as being too insecure to do business with: o Internet and credit cards o Internet and email o Internet and business transactions o Electronic Signatures o B2B o I questioned the reality of these claims o I believe I was right o However, economic / business realities forced these things to happen o So, are the following the same? Are they safe for personal or business use? o Cloud IaaS o Mobile Devices o Cloud SaaS applications o Cloud Data Storage o Cloud PaaS o Internet of Things o Personal Cloud
  • 5. The Cloud is a large business today growing very fast considering it’s size o Today o IaaS - $6Billion 2013 business (8yrs from start) o 136% annual growth rate today o SaaS companies - $130Billion o Mobile – 1.5 Billion smartphones o Social – 1.2 Billion followers (22% of world population, 50% of US population) o Future 2017 (4 years) o Total Cloud Services: $0.5Trillion (4X) o IaaS - $100Billion (16X) o PaaS - $14Billion (40X) o SaaS - $0.4Trillion (3X) o 2/3rds of all workloads will be processed in the cloud (*Cisco) o 3 Billion smartphones
  • 6. Cloud Adoption o 9/2013 According to a survey from Spiceworks, 70% of IT professionals are using cloud-based web hosting applications, with 60% using cloud-based security and 30% backup applications. o Numbers climbing very fast with near universal adoption possible within a few years o http://www.computerweekly.com/news/2240206038/70-of-IT-professionals-using-cloud-at-work
  • 7. Why is the Cloud growing so fast? o For Small Companies o Less capital needed o Grow as fast as your business o Self Service / DevOps o Cloud providers provide superior service to in-house o For Large Companies o Less Capital needed means faster to market o DevOps efficiencies to compete be more nimble o Less Excess hardware - A waste of energy, money, space, time… o SaaS apps can increase productivity o APIs, Social, Cloud Services enable new lines of revenue
  • 8. The potential is almost incalculable in just the next 5-7 years o Datacenters of 50% of companies in the world o SaaS/PaaS and other services o Becoming the dominant and maybe only way most software is delivered o Other impacts o Social, Behavioral o Life without the cloud will be essentially impossible for most people
  • 9. Why is this overwhelmingly good? o Most companies are not/should not be managing technology at the level they are o They are not competent at security, cost management, optimization or technology in general o vastly underutilization of what they acquire o unnecessary duplicative work of many people doing the same technology over and over o technology that is being used way beyond it’s productive life. o Universal Connectivity - People, Things, Applications o Network Effect - Spurring massive cascading unpredictable innovation o Possibly not all positive o Overall huge cost savings and improved efficiency o Due to the first and second points the US/World economy will see massive gains in productivity and improvements in services and technology usage
  • 10. Financial Firms have a higher standard o Generally well endowed compared to many other businesses. o Federal regulation, International regulation (Basel and individual country rules) and State regulation. o Fines assessed regularly. o Financial data among the most sensitive and private of all information of any corporation. Of great concern to customers. o 37% of all breaches (2012*) *http://www.verizonenterprise.com/DBIR/2013/
  • 11. Other Industries with similar constraints: o Health o Aerospace
  • 12. Ecosystem PaaS’s o Boeing Ecosystem PaaS o Encourage airlines to buy Boeing Airplanes o Create a PaaS for all Airlines and service providers o Make it easier to buy Boeing, cheaper easier to run an airline with Boeing airplanes o Cars o Google Android, OpenCar, OpenXC, Webinos, Apple, Blackberry / QNX o Entertainment o Finance
  • 13. Should you adopt a technology? Technology Benefit or Cost Gives Employees Choice (BYOD, applications, …) Increased productivity (and morale, retention) Is better than an internal technology Increased productivity (anything from slight to huge benefit) Is necessary for business with customers or partners Increased sales (unavoidable) saves money over internal service Reduced costs (depends if productivity improvement or loss accompanies) Faster time to market Increased sales (potentially huge benefit) Lack of cohesive common technology Decreased productivity Increased support costs and difficult integration or sometimes collaboration More expensive than internal service Increasing costs (not very frequently true especially when one considers all lifecycle costs). There can be variable costs that are uncontrolled. Productivity gains may offset higher cost. Increased Security Risk Can be mitigated to some extent
  • 14. These benefits can be substantial o A new technology can easily give a 30% increase in productivity, reduced costs or increased income. o In many cases it is not optional to use a certain technology, but how do we do it safely? o Security must find ways to minimize risk of the new technology.
  • 15. The point of this talk is perspective o Security is part of a business decision o The cloud will be made safe for business o A strategy to minimize risk and maximize adoption by segregating information and applications in a fine grained way as they make sense to migrate is essential o The safety of the cloud is not great but it is no worse than where we are in business, possibly better. This may be sad but it is expected in my opinion.
  • 16. Agenda o What is the cloud? o Security in General o Cloud vs Enterprise o Best practices to adopt cloud services o Enhanced Security Services for the Cloud
  • 17. What is the cloud? Many things o IaaS and Infrastructure Services (compute, data) o *6B 2013, 136% annual YOY growth o SaaS (Web Services and applications) o APIs (at least 20,000 today doubling annually) o PaaS and Platform Services (iPaaS, DaaS, APIMaaS, BPMaaS…) o *14B by 2016 o Mobile Apps, Web and BaaS o Personal Cloud o Internet of Things *Gartner, 2013
  • 18. Not all information is the same o Customer information o Extremely sensitive customer information o Passwords, pins, personal data, health data, SS# o Company employee information o Extremely sensitive employee information o passwords, SS# o Company information o Extremely sensitive company information o Sales projections, roadmaps, customer interactions, information that you would be liable for releasing o Information that gives you significant market advantage
  • 19. Risks you face: o Loss of personal data of employees o Loss of customer personal data o Loss of Corporate data that results in lost business (customers upset, competitors find advantage) o Loss of Service (Caused by security lapse) o Lawsuits (loss of data/service related) o Fines (Loss of data/service considered regulated) o Reputation Damage o Transitive Loss (you help someone compromise someone else) o And more…
  • 20. Sources of loss (irrespective of cloud or not cloud) o Technology o External hacking o Infection / malware o Denial of service o Processes o Physical penetration or data lost in transit o Poor IT Practices o People o Internal o Employee mistakes / phishing
  • 21. The Enterprise “physical and electronic” 4 walls is being continuously eroded by new stuff: o Employees taking home data or electronics that contain data on them (cell phones, USB, computers, …) o SaaS (corporate data contained within) o APIs and Web services, EDI or partner electronic interfaces o Personal Cloud o Internet of Things (coming) o Cloud Services (IaaS) o Higher level Cloud Services (PaaS and other) o Social - Discussion boards, twitter o Skunkworks/Unauthorized use: o Personal Cloud(Dropbox, Google docs and apps, …) o POC’s being done in PaaS or IaaS environments o Enterprise Apps being used with corporate data o Interactions with partners through cloud o The people who violate controls most : IT people and executives
  • 22. 2013 Examples of breaches Cloud Severity Attack Company Loss Not Cloud Major undisclosed Target, Adobe 200+ million email, passwords, credit stolen, Adobe source code Cloud Major Malware Facebook, Dropbox, Linkedin 8 Million emails and passwords lost Not Cloud Major Internal Federal Reserve, NSA, Dept Homeland Sec Secrets Disclosed , personal information Not Cloud Major Internal Goldman Sachs Trading Algorithms Stolen Cloud Minor Human Error NYTimes, Twitter, Cloudflare Google email reset policies allowed individuals to be hacked Cloud Minor API Penetration Linkedin Thousands of profiles http://thinkprogress.org/security/2013/12/31/3108661/10-biggest-privacy-security-breaches-rocked-2013/#
  • 23. 2013 Examples of breaches Cloud Severity Attack Company Loss Cloud Minor Outage Amazon Heroku didn’t have multiple regions Not Cloud Minor undisclosed Department of Energy 53,000 employee records Not Cloud Major Physical Penetration Advocate Medical Group 4 million medical records lost Cloud Major Human Error CorporateCarOnline 850,000 credit cards, personal information Cloud Minor Human Error MongoHQ Thousands of emails http://thinkprogress.org/security/2013/12/31/3108661/10-biggest-privacy-security-breaches-rocked-2013/#
  • 24. Cloud vs Enterprise o Anything that can be accessed from the outside is under identical attack* o However, on-premises environment users or customers actually suffer more incidents than those of service provider environments. On-premises environment users experience an average of 61.4 attacks, while service provider environment customers averaged only 27.8.* o After looking at both, there is no proof that cloud computing is any more of a security risk than traditional internet usage. The research in this paper has shown that there is no significant difference that makes one better than the other. o It is not provable that the cloud is less secure than enterprise security o *http://searchcloudcomputing.techtarget.com/opinion/Clouds-are-more-secure-than-traditional-IT-systems-and-heres-why o **http://www.cameron.edu/uploads/34/f4/34f4b845dca4fb2125ba03f0964efed1/3.pdf / Cloud Computing vs Traditional Internet Setting: Which One is More Secur
  • 25. Security is a problem o At least 200+million emails disclosed with passwords. Credit cards of at least 40-80 million people with social sec#’s in some cases. o Medical records for 4 million people. o Average of 60 attacks / year reported o 37% of breaches affected financial organizations o 14% insiders o 19% china related breaches o 35% involve physical compromise o 76% exploited weak passwords o vulnerability discovered to patch: 25-60 days at enterprises! A Very High Percentage of these losses are non-cloud, possibly as high as 80% It is unclear what percentage of private companies disclose breaches Cloud Companies are required by law to disclose any loss* *http://www.csoonline.com/article/221322/cso-disclosure-series-data-breach-notification-laws-state-by-state
  • 26. Cloud Companies are responding to threats o Most cloud companies now enforce multi- factor authentication o Most cloud companies employ encryption with salted passwords o Google and others changing policies on password resets o AWS wiping disks now as default o The feeling is the cloud service companies are learning and becoming more and more astute o What we really need is transparency!
  • 27. Cloud is theoretically worse on security o Ability to attack from anywhere and from anyone could lead to many more attacks o Specific cloud-based attacks such as exploiting virtual machine vulnerability, building mobile apps to exploit APIs o Ubiquitous connectivity seems to imply more chance for attacks – o yet so far not the case
  • 28. I am not saying: o Cloud companies are all safer generically o All Private companies enterprise security is rotten o That cloud is better than enterprise for security if enterprise is done well
  • 29. I am saying: o Cloud is not blatantly more insecure than enterprises o For whatever reason the attention of hackers has not become focused on cloud YET because the number of incidents and severity is still clearly more in the enterprise o Some cloud companies are way better than many enterprises in security today o For the vast majority of companies large and small the cloud is probably better
  • 30. Cloud Companies use the same technology and approaches as private companies o Antivirus / Malware detection / Scanning o Patching regimes o Audits / Penetration testing o Personnel training o DLP technology / hardware o Multiple authentication schemes o Automated Event Detection o Multiple Region backups / DR o Physical Security
  • 31. Vast majority of non-cloud companies not competent in security* *http://searchcloudcomputing.techtarget.com/opinion/Clouds-are-more-secure-than-traditional-IT-systems-and-heres- why This is NOT true in Finance Companies like Fidelity …hopefully
  • 32. Actual Losses – some data o 400 cases of fraudulent ACH transactions of $255 million with actual loss of $85 million o July 2009, two U.S. stock exchanges were victims of a sustained DDoS attack o Outages have real cost o Adobe lost actual source code for photoshop o Reputation risk is an extreme concern
  • 33. The cloud is not a black hole of security o No evidence cloud computing IS riskier than enterprise based computing o More attacks reported both anecdotally, statistically as well as admitted by private companies than companies using cloud services o Full disclosure at private companies doubtful o Over the last 4 years as incidents happen the strength of cloud security has increased. Most companies now support 2 factor authentication for instance. But problems clearly still exist.
  • 34. Cloud vs NonCloud Security
  • 35. Nine Top Threats 1. Data Breaches 2. Data Loss 3. Account Hijacking 4. Insecure APIs 5. Denial of Service 6. Malicious Insiders 7. Abuse of Cloud Services 8. Insufficient Due Diligence 9. Shared Technology Issues CLOUD SECURITY ALLIANCE The Notorious Nine: Cloud Computing Top Threats in 2013 © 2013, Cloud Security Alliance. All rights reserved. 7 http://bit.ly/1brlej6 Infoworld 2/2013 http://www.infoworld.com/t/cloud-security/9-top-threats-cloud-computing-security-213428
  • 36. Cloud Specific Security Concerns o Data from one company leaking to another (multi-tenancy isolation failure) o Demand from one company leaking to another (poor service) o Inability to control specific policies and personnel or change them at will o Lack of transparency o Inability to conduct effective investigations o Naïveté in using the cloud* o *http://blog.cloudpassage.com/2012/09/13/10-mom-didnt-warn-cloud/
  • 38. Cloud Services o Let’s look at various types of Cloud Services and specific security concerns that don’t exist necessarily in the enterprise
  • 39. aaS’es o IaaS o Multi-tenancy isolation failures o Virtualization vulnerabilities o SaaS o Multi-tenancy isolation failures o PaaS - Poorly behaving apps can threaten other apps o One app taking down another o Multiplicative SLA weakening o Very dynamic demand can stress other tenants
  • 40. New types of security/service concerns o APIs o Conscious Malicious Rogue Applications o inadvertent usage of Applications causing ability to access information inappropriately o Demand variations can be chaotic and result in wide SLAs o Mobile o Loss of device o Containerization problems o Bad Applications (like virus) o Employee termination issues o Hardware hijacking
  • 41. New types of security/service concerns o Personal Cloud (moving of my life to the cloud) o Type of information allowed may be inappropriate o Sharing less controlled by the enterprise o Termination – what happens to the information? o Internet of things o Privacy o Potential damage to security depending on type of device (camera, gps, activity tracking, cars, …) o Social o Reputation risk o Lack of control of information shared by employees and others
  • 42. I admit o It’s tiring and scary to consider all the possibilities. o So one has to take perspective. o You’re not 100% in control o You need to delegate but monitor o Being a good manager
  • 43. Best Practices o Segregate data and applications in a fine grained way and move to cloud incrementally as benefits promote adoption (see adoption slide) o Establish Service Provider SLA’s o Negotiate hard for transparency not damages o Make demands o Ask questions, audit, stay involved o Do not settle for applications or vendors which don’t meet your security requirements. They will want your business and I bet many will adapt if asked with reasonable proposals o Watch for changes in the risk profiles o As the cloud gains more and more adoption it is likely to start seeing more and more attacks , more sophisticated attacks
  • 44. What is happening? o SaaS o API Management huge (mostly focused on external but internal growing) o Reuse and Community collaboration o BigData, data collection and intelligence o PaaS Ecosystem and DevOps o Mobile Apps o iPaaS o Personal Cloud / Internet of Things happening
  • 45. Enterprise Reuse and Refactoring o Most companies I see are doing this o Reuse is hard o It’s not just a registry o Growing Mobile, API and Web service application storm presages new era in enterprise software
  • 46. New Types of Security Available o EMM (MDM, MAM) – o Enterprise Mobility Management, provides control and monitoring of mobile devices o API Management – o app based security, fine grained authorization, SLA management o Ecosystem Private PaaS o Control of information shared to partners as well as applications that use information o Complex Event Processing o Detect complex events that indicate intrusion, theft, accidental behavior, suspicious behavior, alert, escalate o 2 factor authentication, fine grained authorization o New protocols and technologies support more control o SDN o Fingerprint scanners
  • 47. WSO2 Commercial o Completely Open Source – No enterprise versions o The only complete composable API Centric Enterprise Application Platform o Built entirely by WSO2 o Multi-tenant, Cloud Native, Componentized Integrated Platform o Built to API Centric, BigData, Mobile, Social, Cloud, SOA Platform
  • 48. WSO2 Commercial o 200 customers worldwide o In business 8 years o Leading Enterprises in almost every vertical industry: o Retail, Aerospace, Health, Finance, Logistics, Telecommunications, Government, Travel, … o Ebay does 5 billion transactions/day on peak days on our servers o Boeing, Cisco and other industry leading companies are starting to build their future technology vision with WSO2
  • 49. WSO2 Commercial o Identity Management o WSO2 has full suite of identity products supporting all new protocols and features o EMM (Enterprise Mobility Management) o WSO2 has a full EMM suite with both device and application management o Ecosystem PaaS o WSO2 is working with several industry leaders to create PaaS’s for their industry. This gives the leader control over the data and applications like Apple has for Ios Apps and also encourages development of communities with the first social enterprise store o Hybrid Polyglot PaaS technology for sophisticated enterprise deployments o API Management and Enterprise Store combining API, Mobile and Web services to promote API Centric Enterprises o NSA for you – our bigdata and CEP technology gives you the ability to identify in real time and respond to security events AND MORE. I have listed just the products relevant to security.
  • 50. Conclusion o We have seen the enemy and it is us. o The issues for the cloud are the issues we deal with everyday in the enterprise. It’s not a reason to not adopt the cloud. o For more info on WSO2: wso2.com o Services Oxygenated o John Mathon: VP, Product Strategy o john@wso2.com