SlideShare a Scribd company logo
© 2012 Newvem All rights reserved




                   Cloud Security Management
                     Overview and Challenges




                                    IGT Cloud Management Forum
Who Am I ?
Ofir Nachmani, Cloud Computing Evangelist

         Chief Community at Newvem.com

         Blogger at IAmOnDemand.com

 My Experience
  Cloud Adoption
  SaaS Deployment
  Cloud Management



                      © 2012 Newvem All rights reserved
http://www.quora.com/KnowYourCloud




       © 2012 Newvem All rights reserved
What is the first priority cloud security concern?

               … manage is ensuring there is a consistent, time-
               boxed, and reliable, set of access               control
               policies and systems implemented so that as
               users move around various levels of privileges




http://www.quora.com/KnowYourCloud



                            © 2012 Newvem All rights reserved
What is the first priority cloud security concern?

               First priority is to figure out what data you have there
               and how important it is to you (Data Classification).
               Then look at the risks                  to that data




http://www.quora.com/KnowYourCloud



                            © 2012 Newvem All rights reserved
What is the first priority cloud security concern?

               I can readily think of these risk buckets
               1. Security Risks ….
               2. Privacy Risks ..
               3. Control Risks ..



http://www.quora.com/KnowYourCloud



                            © 2012 Newvem All rights reserved
What is the first priority cloud security concern?

               When on the cloud, it is very important to know what
               laws would be applicable. For example, many of our
                      not want to host in the US
               clients do
               due to PATRIOT Act (and in the inevitable
               Protect IP Act). .. What laws would be applicable on
               the data and what privacy                        laws will protect
               my data on the cloud


http://www.quora.com/KnowYourCloud



                            © 2012 Newvem All rights reserved
What is the first priority cloud security concern?

               Cloud computing is seen as being
                                         more
               vulnerable to online attacks than
               having the data stored on private servers ..
               Additionally, there are considerations concerning data
               security, including                  confidentiality and
               availability

http://www.quora.com/KnowYourCloud



                            © 2012 Newvem All rights reserved
Cloud Security Aspects




                  © 2012 Newvem All rights reserved
Cloud Security Aspects




 April 2011 – 103 US cloud service providers 24 in six European
 countries for a total of 127 separate providers

                             © 2012 Newvem All rights reserved
Less security in the cloud ?




                   © 2012 Newvem All rights reserved
Less security in the cloud ?




    Focus on cost and speed and not on security or data protection
   creates a security hole.


                          © 2012 Newvem All rights reserved
Who is most responsible ?




    Cloud providers see the cloud user as most responsible for security
    Organizations may be over relying on their cloud vendor


                         © 2012 Newvem All rights reserved
More than 300% growth !

  Analyze Your AWS Cloud usage


                          © 2012 Newvem.Com All rights reserved
5 biggest security AWS users’ mistakes
   Leaving database server IP ports open

   Opening access to IP ports from all internal AWS
   servers

   Leaving IP ports open to all IP addresses

   Allowing access to critical IP ports from public
   Internet IP addresses

   Making Amazon Machine Images publicly
   accessible
                    © 2012 Newvem All rights reserved
5 biggest security AWS users’ mistakes




                               CloudRadar
       http://www.newvem.com/topic/cloud-radar

                   © 2012 Newvem All rights reserved
Cloud Insights and Solutions Partners




                   © 2012 Newvem.Com All rights reserved
AWS Security Experts




 More than 300% growth !


 http://www.newvem.com/experts-directory


                           © 2012 Newvem.Com All rights reserved
http://www.newvem.com/Sign-up
        It is Free !
           © 2012 Newvem All rights reserved
THANKS !
      Chief Community at Newvem.com

      Blogger at IAmOnDemand.com

                                                          ofir@newvem.com
                                                           Mobile: 0549961555
                                                           Skype: ofirn76



                                                      @IAmOnDemand
@KnowYourCloud
                                @Newvem

                  © 2012 Newvem All rights reserved

More Related Content

What's hot

SI Alliance Marketing - Insurance Analytics Solution Webinar
SI Alliance Marketing - Insurance Analytics Solution WebinarSI Alliance Marketing - Insurance Analytics Solution Webinar
SI Alliance Marketing - Insurance Analytics Solution Webinar
David Castro
 
What is software product management
What is software  product managementWhat is software  product management
What is software product management
RahulNarsinghani
 
Accenture: ACIC Rome & Commvault
Accenture: ACIC Rome & Commvault Accenture: ACIC Rome & Commvault
Accenture: ACIC Rome & Commvault
Accenture Italia
 
Cisco Connect Ottawa 2018 multi cloud
Cisco Connect Ottawa 2018 multi cloudCisco Connect Ottawa 2018 multi cloud
Cisco Connect Ottawa 2018 multi cloud
Cisco Canada
 
HEALTHCARE, THE CLOUD, AND ITS SECURITY
HEALTHCARE, THE CLOUD, AND ITS SECURITYHEALTHCARE, THE CLOUD, AND ITS SECURITY
HEALTHCARE, THE CLOUD, AND ITS SECURITY
SilverlineCRM
 
Devoteam Knowledge Communities - 2014 Activity Report
Devoteam Knowledge Communities - 2014 Activity Report   Devoteam Knowledge Communities - 2014 Activity Report
Devoteam Knowledge Communities - 2014 Activity Report
Devoteam
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
Kashyap Parmar
 
Atlas Copco Smart Connected Assembly Industry 4.0
Atlas Copco Smart Connected Assembly Industry 4.0Atlas Copco Smart Connected Assembly Industry 4.0
Atlas Copco Smart Connected Assembly Industry 4.0
JESUS LOPEZ MUÑOZ
 
Software Operability webinar
Software Operability webinarSoftware Operability webinar
Software Operability webinar
HighOps Limited
 
Enable Oauth2.0 with Sentinet API Management (Massimo Crippa @ BTUG Event)
Enable Oauth2.0 with Sentinet API Management (Massimo Crippa @ BTUG Event)Enable Oauth2.0 with Sentinet API Management (Massimo Crippa @ BTUG Event)
Enable Oauth2.0 with Sentinet API Management (Massimo Crippa @ BTUG Event)
Codit
 
Oracle Social Welfare and the Cloud - WernbergTougaard
Oracle Social Welfare and the Cloud - WernbergTougaardOracle Social Welfare and the Cloud - WernbergTougaard
Oracle Social Welfare and the Cloud - WernbergTougaardChristian Wernberg-Tougaard
 
Nff 15112011 education from the cloud
Nff 15112011 education from the cloudNff 15112011 education from the cloud
Nff 15112011 education from the cloud
Fleksibel utdanning Norge
 
WUD2010 Sophia 03 - A. Andres Del Valle (Accenture Labs) : Technology design ...
WUD2010 Sophia 03 - A. Andres Del Valle (Accenture Labs) : Technology design ...WUD2010 Sophia 03 - A. Andres Del Valle (Accenture Labs) : Technology design ...
WUD2010 Sophia 03 - A. Andres Del Valle (Accenture Labs) : Technology design ...
Use Age
 
Manufacturing and the data conundrum
Manufacturing and the data conundrumManufacturing and the data conundrum
Manufacturing and the data conundrum
The Economist Media Businesses
 
accenturetechnologyvision2015slidshare-150129052229-conversion-gate01
accenturetechnologyvision2015slidshare-150129052229-conversion-gate01accenturetechnologyvision2015slidshare-150129052229-conversion-gate01
accenturetechnologyvision2015slidshare-150129052229-conversion-gate01Crissa Toledo
 
Pwc digital-iq-report final
Pwc digital-iq-report finalPwc digital-iq-report final
Pwc digital-iq-report final
Ruud Sommerhalder
 
Key trend in strategic sourcing
Key trend in strategic sourcing Key trend in strategic sourcing
Key trend in strategic sourcing
Abhigupta110
 
Reaching Net Zero by 2050
Reaching Net Zero by 2050Reaching Net Zero by 2050
Reaching Net Zero by 2050
accenture
 
Case Study - Microsemi Uses Microsoft Dynamics AX to Reduce Costs and Improve...
Case Study - Microsemi Uses Microsoft Dynamics AX to Reduce Costs and Improve...Case Study - Microsemi Uses Microsoft Dynamics AX to Reduce Costs and Improve...
Case Study - Microsemi Uses Microsoft Dynamics AX to Reduce Costs and Improve...
Armanino LLP
 

What's hot (20)

SI Alliance Marketing - Insurance Analytics Solution Webinar
SI Alliance Marketing - Insurance Analytics Solution WebinarSI Alliance Marketing - Insurance Analytics Solution Webinar
SI Alliance Marketing - Insurance Analytics Solution Webinar
 
What is software product management
What is software  product managementWhat is software  product management
What is software product management
 
Accenture: ACIC Rome & Commvault
Accenture: ACIC Rome & Commvault Accenture: ACIC Rome & Commvault
Accenture: ACIC Rome & Commvault
 
Cisco Connect Ottawa 2018 multi cloud
Cisco Connect Ottawa 2018 multi cloudCisco Connect Ottawa 2018 multi cloud
Cisco Connect Ottawa 2018 multi cloud
 
HEALTHCARE, THE CLOUD, AND ITS SECURITY
HEALTHCARE, THE CLOUD, AND ITS SECURITYHEALTHCARE, THE CLOUD, AND ITS SECURITY
HEALTHCARE, THE CLOUD, AND ITS SECURITY
 
Devoteam Knowledge Communities - 2014 Activity Report
Devoteam Knowledge Communities - 2014 Activity Report   Devoteam Knowledge Communities - 2014 Activity Report
Devoteam Knowledge Communities - 2014 Activity Report
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Atlas Copco Smart Connected Assembly Industry 4.0
Atlas Copco Smart Connected Assembly Industry 4.0Atlas Copco Smart Connected Assembly Industry 4.0
Atlas Copco Smart Connected Assembly Industry 4.0
 
Software Operability webinar
Software Operability webinarSoftware Operability webinar
Software Operability webinar
 
Enable Oauth2.0 with Sentinet API Management (Massimo Crippa @ BTUG Event)
Enable Oauth2.0 with Sentinet API Management (Massimo Crippa @ BTUG Event)Enable Oauth2.0 with Sentinet API Management (Massimo Crippa @ BTUG Event)
Enable Oauth2.0 with Sentinet API Management (Massimo Crippa @ BTUG Event)
 
Oracle Social Welfare and the Cloud - WernbergTougaard
Oracle Social Welfare and the Cloud - WernbergTougaardOracle Social Welfare and the Cloud - WernbergTougaard
Oracle Social Welfare and the Cloud - WernbergTougaard
 
Nff 15112011 education from the cloud
Nff 15112011 education from the cloudNff 15112011 education from the cloud
Nff 15112011 education from the cloud
 
Accenture Motivated By Mobility
Accenture   Motivated By MobilityAccenture   Motivated By Mobility
Accenture Motivated By Mobility
 
WUD2010 Sophia 03 - A. Andres Del Valle (Accenture Labs) : Technology design ...
WUD2010 Sophia 03 - A. Andres Del Valle (Accenture Labs) : Technology design ...WUD2010 Sophia 03 - A. Andres Del Valle (Accenture Labs) : Technology design ...
WUD2010 Sophia 03 - A. Andres Del Valle (Accenture Labs) : Technology design ...
 
Manufacturing and the data conundrum
Manufacturing and the data conundrumManufacturing and the data conundrum
Manufacturing and the data conundrum
 
accenturetechnologyvision2015slidshare-150129052229-conversion-gate01
accenturetechnologyvision2015slidshare-150129052229-conversion-gate01accenturetechnologyvision2015slidshare-150129052229-conversion-gate01
accenturetechnologyvision2015slidshare-150129052229-conversion-gate01
 
Pwc digital-iq-report final
Pwc digital-iq-report finalPwc digital-iq-report final
Pwc digital-iq-report final
 
Key trend in strategic sourcing
Key trend in strategic sourcing Key trend in strategic sourcing
Key trend in strategic sourcing
 
Reaching Net Zero by 2050
Reaching Net Zero by 2050Reaching Net Zero by 2050
Reaching Net Zero by 2050
 
Case Study - Microsemi Uses Microsoft Dynamics AX to Reduce Costs and Improve...
Case Study - Microsemi Uses Microsoft Dynamics AX to Reduce Costs and Improve...Case Study - Microsemi Uses Microsoft Dynamics AX to Reduce Costs and Improve...
Case Study - Microsemi Uses Microsoft Dynamics AX to Reduce Costs and Improve...
 

Viewers also liked

Cloud security ppt
Cloud security pptCloud security ppt
Cloud security ppt
Venkatesh Chary
 
เที่ยว Koh phi phi
เที่ยว Koh phi phiเที่ยว Koh phi phi
เที่ยว Koh phi phiTIFFY55
 
Security Management in the Cloud
Security Management in the CloudSecurity Management in the Cloud
Security Management in the CloudGaryArdito
 
Integrated Cloud Security
Integrated Cloud SecurityIntegrated Cloud Security
Integrated Cloud Security
OneLogin
 
Presentation cloud management platform
Presentation   cloud management platformPresentation   cloud management platform
Presentation cloud management platform
xKinAnx
 
Enterprise Cloud Risk And Security
Enterprise Cloud Risk And SecurityEnterprise Cloud Risk And Security
Enterprise Cloud Risk And Security
Mark Masterson
 
Data security in the cloud
Data security in the cloud Data security in the cloud
Data security in the cloud
IBM Security
 
AWS Summit Seoul 2015 - 국내 사례로 본 클라우드 운영 최적화 (이주완-메가존)
AWS Summit Seoul 2015 -  국내 사례로 본 클라우드 운영 최적화  (이주완-메가존)AWS Summit Seoul 2015 -  국내 사례로 본 클라우드 운영 최적화  (이주완-메가존)
AWS Summit Seoul 2015 - 국내 사례로 본 클라우드 운영 최적화 (이주완-메가존)
Amazon Web Services Korea
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
Biswajit Pratihari
 
External Analysis Strategic Management Ljmu
External Analysis   Strategic Management LjmuExternal Analysis   Strategic Management Ljmu
External Analysis Strategic Management Ljmu
snoozed
 
Slides cloud computing
Slides cloud computingSlides cloud computing
Slides cloud computingHaslina
 
Cloud computing simple ppt
Cloud computing simple pptCloud computing simple ppt
Cloud computing simple ppt
Agarwaljay
 

Viewers also liked (13)

Cloud security ppt
Cloud security pptCloud security ppt
Cloud security ppt
 
เที่ยว Koh phi phi
เที่ยว Koh phi phiเที่ยว Koh phi phi
เที่ยว Koh phi phi
 
Security Management in the Cloud
Security Management in the CloudSecurity Management in the Cloud
Security Management in the Cloud
 
Integrated Cloud Security
Integrated Cloud SecurityIntegrated Cloud Security
Integrated Cloud Security
 
Presentation cloud management platform
Presentation   cloud management platformPresentation   cloud management platform
Presentation cloud management platform
 
Enterprise Cloud Risk And Security
Enterprise Cloud Risk And SecurityEnterprise Cloud Risk And Security
Enterprise Cloud Risk And Security
 
Data security in the cloud
Data security in the cloud Data security in the cloud
Data security in the cloud
 
AWS Summit Seoul 2015 - 국내 사례로 본 클라우드 운영 최적화 (이주완-메가존)
AWS Summit Seoul 2015 -  국내 사례로 본 클라우드 운영 최적화  (이주완-메가존)AWS Summit Seoul 2015 -  국내 사례로 본 클라우드 운영 최적화  (이주완-메가존)
AWS Summit Seoul 2015 - 국내 사례로 본 클라우드 운영 최적화 (이주완-메가존)
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
External Analysis Strategic Management Ljmu
External Analysis   Strategic Management LjmuExternal Analysis   Strategic Management Ljmu
External Analysis Strategic Management Ljmu
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Slides cloud computing
Slides cloud computingSlides cloud computing
Slides cloud computing
 
Cloud computing simple ppt
Cloud computing simple pptCloud computing simple ppt
Cloud computing simple ppt
 

Similar to Cloud security management by newvem

Cloud Security Strategy
Cloud Security StrategyCloud Security Strategy
Cloud Security Strategy
Capgemini
 
Five cloud security tips
Five cloud security tipsFive cloud security tips
Five cloud security tips
ServiceMesh
 
Cloud Computing and Security - ISACA Hyderabad Chapter Presentation
Cloud Computing and Security - ISACA Hyderabad Chapter PresentationCloud Computing and Security - ISACA Hyderabad Chapter Presentation
Cloud Computing and Security - ISACA Hyderabad Chapter Presentation
Venkateswar Reddy Melachervu
 
Securing Your Cloud Servers with Halo NetSec
Securing Your Cloud Servers with Halo NetSecSecuring Your Cloud Servers with Halo NetSec
Securing Your Cloud Servers with Halo NetSecCloudPassage
 
Infor i Business Cloud
Infor i Business CloudInfor i Business Cloud
Infor i Business Cloud
Inforsystemi
 
secued cloud
 secued cloud secued cloud
secued cloud
Devyani Vaidya
 
Cloud security
Cloud securityCloud security
Cloud security
Niharika Varshney
 
CCSK, cloud security framework, Indonesia
CCSK, cloud security framework, IndonesiaCCSK, cloud security framework, Indonesia
CCSK, cloud security framework, Indonesia
Wise Pacific Venture
 
Building A Cloud-Ready Security Program
Building A Cloud-Ready Security ProgramBuilding A Cloud-Ready Security Program
Building A Cloud-Ready Security Program
NetIQ
 
Secued Cloud
 Secued  Cloud Secued  Cloud
Secued Cloud
Devyani Vaidya
 
Cloud Security - Kloudlearn
Cloud Security - KloudlearnCloud Security - Kloudlearn
Cloud Security - Kloudlearn
KloudLearn
 
UNIT -V.docx
UNIT -V.docxUNIT -V.docx
UNIT -V.docx
Revathiparamanathan
 
Lions and Tigers and Cloud, Oh My! The Truth Behind Cloud Security and Risks
Lions and Tigers and Cloud, Oh My! The Truth Behind Cloud Security and RisksLions and Tigers and Cloud, Oh My! The Truth Behind Cloud Security and Risks
Lions and Tigers and Cloud, Oh My! The Truth Behind Cloud Security and RisksSAP Ariba
 
Global Efforts to Secure Cloud Computing
Global Efforts to Secure Cloud Computing Global Efforts to Secure Cloud Computing
Global Efforts to Secure Cloud Computing
InnoTech
 
secued cloud ppt
secued cloud pptsecued cloud ppt
secued cloud ppt
Kartik Kalpande Patil
 
Lss implementing cyber security in the cloud, and from the cloud-feb14
Lss implementing cyber security in the cloud, and from the cloud-feb14Lss implementing cyber security in the cloud, and from the cloud-feb14
Lss implementing cyber security in the cloud, and from the cloud-feb14
L S Subramanian
 
OWASP Cloud Top 10
OWASP Cloud Top 10OWASP Cloud Top 10
OWASP Cloud Top 10
Ludovic Petit
 
Cloud Backup Overview
Cloud Backup OverviewCloud Backup Overview
Cloud Backup Overview
ddaragh
 
A Comprehensive Guide to Cloud Computing Security | CyberPro Magazine
A Comprehensive Guide to Cloud Computing Security | CyberPro MagazineA Comprehensive Guide to Cloud Computing Security | CyberPro Magazine
A Comprehensive Guide to Cloud Computing Security | CyberPro Magazine
cyberprosocial
 

Similar to Cloud security management by newvem (20)

Cloud Security Strategy
Cloud Security StrategyCloud Security Strategy
Cloud Security Strategy
 
Five cloud security tips
Five cloud security tipsFive cloud security tips
Five cloud security tips
 
Cloud Computing and Security - ISACA Hyderabad Chapter Presentation
Cloud Computing and Security - ISACA Hyderabad Chapter PresentationCloud Computing and Security - ISACA Hyderabad Chapter Presentation
Cloud Computing and Security - ISACA Hyderabad Chapter Presentation
 
Securing Your Cloud Servers with Halo NetSec
Securing Your Cloud Servers with Halo NetSecSecuring Your Cloud Servers with Halo NetSec
Securing Your Cloud Servers with Halo NetSec
 
Infor i Business Cloud
Infor i Business CloudInfor i Business Cloud
Infor i Business Cloud
 
secued cloud
 secued cloud secued cloud
secued cloud
 
Cloud security
Cloud securityCloud security
Cloud security
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
 
CCSK, cloud security framework, Indonesia
CCSK, cloud security framework, IndonesiaCCSK, cloud security framework, Indonesia
CCSK, cloud security framework, Indonesia
 
Building A Cloud-Ready Security Program
Building A Cloud-Ready Security ProgramBuilding A Cloud-Ready Security Program
Building A Cloud-Ready Security Program
 
Secued Cloud
 Secued  Cloud Secued  Cloud
Secued Cloud
 
Cloud Security - Kloudlearn
Cloud Security - KloudlearnCloud Security - Kloudlearn
Cloud Security - Kloudlearn
 
UNIT -V.docx
UNIT -V.docxUNIT -V.docx
UNIT -V.docx
 
Lions and Tigers and Cloud, Oh My! The Truth Behind Cloud Security and Risks
Lions and Tigers and Cloud, Oh My! The Truth Behind Cloud Security and RisksLions and Tigers and Cloud, Oh My! The Truth Behind Cloud Security and Risks
Lions and Tigers and Cloud, Oh My! The Truth Behind Cloud Security and Risks
 
Global Efforts to Secure Cloud Computing
Global Efforts to Secure Cloud Computing Global Efforts to Secure Cloud Computing
Global Efforts to Secure Cloud Computing
 
secued cloud ppt
secued cloud pptsecued cloud ppt
secued cloud ppt
 
Lss implementing cyber security in the cloud, and from the cloud-feb14
Lss implementing cyber security in the cloud, and from the cloud-feb14Lss implementing cyber security in the cloud, and from the cloud-feb14
Lss implementing cyber security in the cloud, and from the cloud-feb14
 
OWASP Cloud Top 10
OWASP Cloud Top 10OWASP Cloud Top 10
OWASP Cloud Top 10
 
Cloud Backup Overview
Cloud Backup OverviewCloud Backup Overview
Cloud Backup Overview
 
A Comprehensive Guide to Cloud Computing Security | CyberPro Magazine
A Comprehensive Guide to Cloud Computing Security | CyberPro MagazineA Comprehensive Guide to Cloud Computing Security | CyberPro Magazine
A Comprehensive Guide to Cloud Computing Security | CyberPro Magazine
 

More from Newvewm

Entrepreneur un slideshow v6
Entrepreneur un slideshow v6Entrepreneur un slideshow v6
Entrepreneur un slideshow v6
Newvewm
 
The Inevitable Cloud Outage
The Inevitable Cloud OutageThe Inevitable Cloud Outage
The Inevitable Cloud Outage
Newvewm
 
Newvem's Utilization Heat Map
Newvem's Utilization Heat MapNewvem's Utilization Heat Map
Newvem's Utilization Heat Map
Newvewm
 
Hitting Your Cloud’s Usage Sweet Spot
Hitting Your Cloud’s Usage Sweet SpotHitting Your Cloud’s Usage Sweet Spot
Hitting Your Cloud’s Usage Sweet Spot
Newvewm
 
Cloudpreneurs - McKinsey Reveals Fast Growth of Cloud Adoption
Cloudpreneurs - McKinsey Reveals Fast Growth of Cloud AdoptionCloudpreneurs - McKinsey Reveals Fast Growth of Cloud Adoption
Cloudpreneurs - McKinsey Reveals Fast Growth of Cloud Adoption
Newvewm
 
Onavo aws summit 2012
Onavo   aws summit 2012Onavo   aws summit 2012
Onavo aws summit 2012
Newvewm
 
ClickSoftware AWS Customer Case
ClickSoftware AWS Customer CaseClickSoftware AWS Customer Case
ClickSoftware AWS Customer Case
Newvewm
 
SaaS as a Security Hazard - Google Apps Security Example
SaaS as a Security Hazard - Google Apps Security ExampleSaaS as a Security Hazard - Google Apps Security Example
SaaS as a Security Hazard - Google Apps Security Example
Newvewm
 
Hadoop & MapReduce
Hadoop & MapReduceHadoop & MapReduce
Hadoop & MapReduce
Newvewm
 
Monitoring Your AWS Cloud Infrastructure
Monitoring Your AWS Cloud InfrastructureMonitoring Your AWS Cloud Infrastructure
Monitoring Your AWS Cloud Infrastructure
Newvewm
 
OneHourTranslation - AWS Cloud Case Study
OneHourTranslation - AWS Cloud Case StudyOneHourTranslation - AWS Cloud Case Study
OneHourTranslation - AWS Cloud Case Study
Newvewm
 
Secure Your AWS Cloud Data by Porticor
Secure Your AWS Cloud Data by PorticorSecure Your AWS Cloud Data by Porticor
Secure Your AWS Cloud Data by Porticor
Newvewm
 

More from Newvewm (12)

Entrepreneur un slideshow v6
Entrepreneur un slideshow v6Entrepreneur un slideshow v6
Entrepreneur un slideshow v6
 
The Inevitable Cloud Outage
The Inevitable Cloud OutageThe Inevitable Cloud Outage
The Inevitable Cloud Outage
 
Newvem's Utilization Heat Map
Newvem's Utilization Heat MapNewvem's Utilization Heat Map
Newvem's Utilization Heat Map
 
Hitting Your Cloud’s Usage Sweet Spot
Hitting Your Cloud’s Usage Sweet SpotHitting Your Cloud’s Usage Sweet Spot
Hitting Your Cloud’s Usage Sweet Spot
 
Cloudpreneurs - McKinsey Reveals Fast Growth of Cloud Adoption
Cloudpreneurs - McKinsey Reveals Fast Growth of Cloud AdoptionCloudpreneurs - McKinsey Reveals Fast Growth of Cloud Adoption
Cloudpreneurs - McKinsey Reveals Fast Growth of Cloud Adoption
 
Onavo aws summit 2012
Onavo   aws summit 2012Onavo   aws summit 2012
Onavo aws summit 2012
 
ClickSoftware AWS Customer Case
ClickSoftware AWS Customer CaseClickSoftware AWS Customer Case
ClickSoftware AWS Customer Case
 
SaaS as a Security Hazard - Google Apps Security Example
SaaS as a Security Hazard - Google Apps Security ExampleSaaS as a Security Hazard - Google Apps Security Example
SaaS as a Security Hazard - Google Apps Security Example
 
Hadoop & MapReduce
Hadoop & MapReduceHadoop & MapReduce
Hadoop & MapReduce
 
Monitoring Your AWS Cloud Infrastructure
Monitoring Your AWS Cloud InfrastructureMonitoring Your AWS Cloud Infrastructure
Monitoring Your AWS Cloud Infrastructure
 
OneHourTranslation - AWS Cloud Case Study
OneHourTranslation - AWS Cloud Case StudyOneHourTranslation - AWS Cloud Case Study
OneHourTranslation - AWS Cloud Case Study
 
Secure Your AWS Cloud Data by Porticor
Secure Your AWS Cloud Data by PorticorSecure Your AWS Cloud Data by Porticor
Secure Your AWS Cloud Data by Porticor
 

Recently uploaded

Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
Bhaskar Mitra
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 

Recently uploaded (20)

Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 

Cloud security management by newvem

  • 1. © 2012 Newvem All rights reserved Cloud Security Management Overview and Challenges IGT Cloud Management Forum
  • 2. Who Am I ? Ofir Nachmani, Cloud Computing Evangelist Chief Community at Newvem.com Blogger at IAmOnDemand.com My Experience  Cloud Adoption  SaaS Deployment  Cloud Management © 2012 Newvem All rights reserved
  • 3. http://www.quora.com/KnowYourCloud © 2012 Newvem All rights reserved
  • 4. What is the first priority cloud security concern? … manage is ensuring there is a consistent, time- boxed, and reliable, set of access control policies and systems implemented so that as users move around various levels of privileges http://www.quora.com/KnowYourCloud © 2012 Newvem All rights reserved
  • 5. What is the first priority cloud security concern? First priority is to figure out what data you have there and how important it is to you (Data Classification). Then look at the risks to that data http://www.quora.com/KnowYourCloud © 2012 Newvem All rights reserved
  • 6. What is the first priority cloud security concern? I can readily think of these risk buckets 1. Security Risks …. 2. Privacy Risks .. 3. Control Risks .. http://www.quora.com/KnowYourCloud © 2012 Newvem All rights reserved
  • 7. What is the first priority cloud security concern? When on the cloud, it is very important to know what laws would be applicable. For example, many of our not want to host in the US clients do due to PATRIOT Act (and in the inevitable Protect IP Act). .. What laws would be applicable on the data and what privacy laws will protect my data on the cloud http://www.quora.com/KnowYourCloud © 2012 Newvem All rights reserved
  • 8. What is the first priority cloud security concern? Cloud computing is seen as being more vulnerable to online attacks than having the data stored on private servers .. Additionally, there are considerations concerning data security, including confidentiality and availability http://www.quora.com/KnowYourCloud © 2012 Newvem All rights reserved
  • 9. Cloud Security Aspects © 2012 Newvem All rights reserved
  • 10. Cloud Security Aspects April 2011 – 103 US cloud service providers 24 in six European countries for a total of 127 separate providers © 2012 Newvem All rights reserved
  • 11. Less security in the cloud ? © 2012 Newvem All rights reserved
  • 12. Less security in the cloud ? Focus on cost and speed and not on security or data protection creates a security hole. © 2012 Newvem All rights reserved
  • 13. Who is most responsible ? Cloud providers see the cloud user as most responsible for security Organizations may be over relying on their cloud vendor © 2012 Newvem All rights reserved
  • 14. More than 300% growth ! Analyze Your AWS Cloud usage © 2012 Newvem.Com All rights reserved
  • 15. 5 biggest security AWS users’ mistakes Leaving database server IP ports open Opening access to IP ports from all internal AWS servers Leaving IP ports open to all IP addresses Allowing access to critical IP ports from public Internet IP addresses Making Amazon Machine Images publicly accessible © 2012 Newvem All rights reserved
  • 16. 5 biggest security AWS users’ mistakes CloudRadar http://www.newvem.com/topic/cloud-radar © 2012 Newvem All rights reserved
  • 17. Cloud Insights and Solutions Partners © 2012 Newvem.Com All rights reserved
  • 18. AWS Security Experts More than 300% growth ! http://www.newvem.com/experts-directory © 2012 Newvem.Com All rights reserved
  • 19. http://www.newvem.com/Sign-up It is Free ! © 2012 Newvem All rights reserved
  • 20. THANKS ! Chief Community at Newvem.com Blogger at IAmOnDemand.com ofir@newvem.com Mobile: 0549961555 Skype: ofirn76 @IAmOnDemand @KnowYourCloud @Newvem © 2012 Newvem All rights reserved