SlideShare a Scribd company logo
1 of 35
Hector Del Castillo
AIPMM
linkd.in/hdelcastillo
What We Will Discuss
1.   What is cloud security
2.   Current situation
3.   Dimensions of cloud security
4.   Security risks
5.   Critical areas
6.   Approaches to reduce risk
7.   Key takeaways
What is Cloud Security?
• An evolving sub-domain of computer security
• A broad set of policies, technologies, and
  controls deployed to protect data,
  applications, and the associated infrastructure
  of cloud computing
• Should not be confused with ‘cloud-based’
  security software offerings
• Many commercial software vendors have
  cloud-based offerings such as anti-virus or
  vulnerability management
Current Situation
• Analysts estimate that cloud computing
  adoption will continue to rapidly increase
• A single, massive cloud data center contains
  more computers than were on the entire
  internet just a few years ago
• Security experts agree that the number of
  attacks and their level of sophistication will
  continue to grow
Source: NIST Special Publication 800-144, Jan 2011
Service Models
                                Software           Platform             Infrastructure
Deployment Models




                                as a Service       as a Service         as a Service
                                (SaaS)             (PaaS)               (IaaS)
                    Private                                 X                     X
                    Hybrid            X                     X                     X
                    Public            X                     X                     X
                    Community         X                     X                     X

                                           Source: NIST Special Publication 800-144, Jan 2011
Cloud Solutions
“Cloud Services
market to grow to
$42B by 2012.”
- IDC




                    Source: ZDNet Blogs
Cloud Security Reference Model




                   Source: Cloud Security Alliance
Dimensions of Cloud Security
• Security and Privacy
  – Data protection
  – Identity management
  – Physical and personnel security
  – Availability
  – Application security
  – Privacy

            Source: "Cloud Security Front and Center,” Forrester Research, 2009.
Dimensions of Cloud Security
• Compliance
  – Business continuity and data recovery
  – Logs and audit trails
  – Unique compliance requirements




            Source: "Cloud Security Front and Center,” Forrester Research, 2009.
Dimensions of Cloud Security
• Legal or Contractual Issues
  – Public records




            Source: "Cloud Security Front and Center,” Forrester Research, 2009.
Security Risks
1.   Privileged user access
2.   Regulatory compliance
3.   Data location
4.   Data segregation
5.   Recovery
6.   Investigative support
7.   Long-term viability
          Source: “Assessing the Security Risks of Cloud Computing,” Gartner, 2008.
Critical Areas
• Cloud Architecture
     – Cloud Computing Architectural Framework




Source: "Security Guidance for Critical Areas of Focus in Cloud Computing V2.1,” CSA, 2009.
Critical Areas
• Governing in the Cloud
     –   Governance and Enterprise Risk Management
     –   Legal and Electronic Discovery
     –   Compliance and Audit
     –   Information Lifecycle Management
     –   Portability and Interoperability



Source: "Security Guidance for Critical Areas of Focus in Cloud Computing V2.1,” CSA, 2009.
Critical Areas
• Operating in the Cloud
     – Traditional Security, Business Continuity, and Disaster
       Recovery
     – Data Center Operations
     – Incident Response, Notification, and Remediation
     – Application Security
     – Encryption and Key Management
     – Identity and Access Management
     – Virtualization
Source: "Security Guidance for Critical Areas of Focus in Cloud Computing V2.1,” CSA, 2009.
Recommendations
   Trust (4)
   Transnational Data Flows (4)
   Transparency (2)
   Transformation (4)



                    Source: “CLOUD2 Summary Report,” TechAmerica, 2011.
Approaches to Reduce Risk
Trust
1. (Security & Assurance Frameworks): Industry
   and government should support and participate
   in the development and implementation of
   international, standardized frameworks for
   securing, assessing, certifying and accrediting
   cloud solutions.


                   Source: “CLOUD2 Summary Report,” TechAmerica, 2011.
Approaches to Reduce Risk
Trust
2. (Identity Management): Should accelerate the
   development of a private sector-led identity
   management ecosystem as envisioned by the
   National Strategy for Trusted Identities in
   Cyberspace (NSTIC) to facilitate the adoption of
   strong authentication technologies and enable
   users to gain secure access to cloud services and
   websites.
                    Source: “CLOUD2 Summary Report,” TechAmerica, 2011.
Approaches to Reduce Risk
Trust
3. (Responses to Data Breaches): Government
   should enact a national data breach law to
   clarify breach notification responsibilities and
   commitments of companies to their customers,
   and also update and strengthen criminal laws
   against those who attack computer systems and
   networks, including cloud computing services.
                    Source: “CLOUD2 Summary Report,” TechAmerica, 2011.
Approaches to Reduce Risk
Trust
4. (Research): Government, industry, and
   academia should develop and execute a joint
   cloud computing research agenda.




                  Source: “CLOUD2 Summary Report,” TechAmerica, 2011.
Approaches to Reduce Risk
Transnational Data Flows
5. (Privacy): The U.S. government and industry
   should promote a comprehensive,
   technology-neutral privacy framework,
   consistent with commonly accepted privacy
   and data protection principles-based
   frameworks such as the OECD principles
   and/or APEC privacy frameworks.
                  Source: “CLOUD2 Summary Report,” TechAmerica, 2011.
Approaches to Reduce Risk
Transnational Data Flows
6. (Government/Law Enforcement Access to
   Data): The U.S. government should
   demonstrate leadership in identifying and
   implementing mechanisms for lawful access
   by law enforcement or government to data
   stored in the cloud.

                 Source: “CLOUD2 Summary Report,” TechAmerica, 2011.
Approaches to Reduce Risk
Transnational Data Flows
7. (E-Discovery and Forensics): Government
   and industry should enable effective
   practices for collecting information from the
   cloud to meet forensic or e-discovery needs
   in ways that fully support legal due process
   while minimizing impact on cloud provider
   operations.
                   Source: “CLOUD2 Summary Report,” TechAmerica, 2011.
Approaches to Reduce Risk
Transnational Data Flows
8. (Lead by Example): The U.S. government
   should demonstrate its willingness to trust
   cloud computing environments in other
   countries for appropriate government
   workloads.


                  Source: “CLOUD2 Summary Report,” TechAmerica, 2011.
Approaches to Reduce Risk
Transparency
9. (Transparency): Industry should publicly
   disclose information about relevant
   operational aspects of their cloud services,
   including portability, interoperability,
   security, certifications, performance and
   reliability.

                   Source: “CLOUD2 Summary Report,” TechAmerica, 2011.
Approaches to Reduce Risk
Transparency
10. (Data Portability): Cloud providers should
    enable portability of user data through
    documents, tools, and support for agreed-
    upon industry standards and best practices.



                  Source: “CLOUD2 Summary Report,” TechAmerica, 2011.
Approaches to Reduce Risk
Transformation
11. (Federal Acquisition and Budgeting):
    Agencies should demonstrate flexibility in
    adapting existing procurement models to
    facilitate acquisition of cloud services and
    solutions. Congress and OMB should
    demonstrate flexibility in changing budget
    models to help agencies acquire cloud
    services and solutions.
                   Source: “CLOUD2 Summary Report,” TechAmerica, 2011.
Approaches to Reduce Risk
Transformation
12. (Incentives): Government should establish
    policies and processes for providing fiscal
    incentives, rewards and support for agencies
    as they take steps towards implementing
    cloud deployments.


                  Source: “CLOUD2 Summary Report,” TechAmerica, 2011.
Approaches to Reduce Risk
Transformation
13. (Improve Infrastructure): Government and
    industry should embrace the modernization
    of broadband infrastructure and the current
    move to IPv6 to improve the bandwidth and
    reliable connectivity necessary for the
    growth of cloud services.

                  Source: “CLOUD2 Summary Report,” TechAmerica, 2011.
Approaches to Reduce Risk
Transformation
14. (Education/Training): Government, industry,
    and academia should develop and
    disseminate resources for major stakeholder
    communities to be educated on the
    technical, business, and policy issues around
    acquisition, deployment and operation of
    cloud services.
                   Source: “CLOUD2 Summary Report,” TechAmerica, 2011.
Key Takeaways
1   • Cloud security continues to evolve

    • Security issues are global and impact providers
2     and customers
    • Cloud security requires action for government,
3     industry and academia
    • Data owner must implement traditional layered
4     security approach
    • Data owner must segregate data from
5     application
Recommended AFCOM Sessions
1. "DCM18: Securing the Virtualized Environment,”
   Robert Klotz, Akibia, 2011.
2. "DCP10: How Social Media and the Cloud Impact
   Data Center Security,” James Danburg, SA2, 2011.
3. "Cloud07: Managing the Transition Cloud,” Brent
   Eubanks, Latisys, 2011.
4. "Cloud04: The Ins and Outs of Virtual Private
   Clouds,” Sundar Raghavan, Skytap, 2011.
Recommended Reading
1. “Assessing the Security Risks of Cloud Computing,”
   Gartner, 3 June 2008.
2. "Cloud Security Front and Center,” Forrester Research,
   18 Nov 2009.
3. "Security Guidance for Critical Areas of Focus in Cloud
   Computing V2.1,” Cloud Security Alliance, 2009.
4. “Guidelines on Security and Privacy in Public Cloud
   Computing, NIST Special Publication 800-144, Jan 2011.
5. “Summary Report of the Commission on the Leadership
   Opportunity in U.S. Deployment of the Cloud,”
   TechAmerica Foundation, July 2011.
Join My Professional Network!




Hector Del Castillo, PMP, CPM, CPMM
         linkd.in/hdelcastillo
      hmdelcastillo@aipmm.com

More Related Content

What's hot

Security in Cloud Computing
Security in Cloud ComputingSecurity in Cloud Computing
Security in Cloud ComputingAshish Patel
 
A Survey on Cloud Computing Security – Challenges and Trust Issues
A Survey on Cloud Computing Security – Challenges and Trust IssuesA Survey on Cloud Computing Security – Challenges and Trust Issues
A Survey on Cloud Computing Security – Challenges and Trust IssuesIJCSIS Research Publications
 
Cloud computing security & forensics (manu)
Cloud computing security & forensics (manu)Cloud computing security & forensics (manu)
Cloud computing security & forensics (manu)ClubHack
 
Cloud Computing Security
Cloud Computing SecurityCloud Computing Security
Cloud Computing SecurityDhaval Dave
 
A proposal for implementing cloud computing in newspaper company
A proposal for implementing cloud computing in newspaper companyA proposal for implementing cloud computing in newspaper company
A proposal for implementing cloud computing in newspaper companyKingsley Mensah
 
Cloud Computing: Architecture, IT Security and Operational Perspectives
Cloud Computing: Architecture, IT Security and Operational PerspectivesCloud Computing: Architecture, IT Security and Operational Perspectives
Cloud Computing: Architecture, IT Security and Operational PerspectivesMegan Eskey
 
Cloud Computing - Security Benefits and Risks
Cloud Computing - Security Benefits and RisksCloud Computing - Security Benefits and Risks
Cloud Computing - Security Benefits and RisksWilliam McBorrough
 
Cloud computing security issues and challenges
Cloud computing security issues and challengesCloud computing security issues and challenges
Cloud computing security issues and challengesKresimir Popovic
 
Cloud Computing Security Issues in Infrastructure as a Service”
Cloud Computing Security Issues in Infrastructure as a Service”Cloud Computing Security Issues in Infrastructure as a Service”
Cloud Computing Security Issues in Infrastructure as a Service”Vivek Maurya
 
Cloud Computing Security Issues
Cloud Computing Security IssuesCloud Computing Security Issues
Cloud Computing Security IssuesStelios Krasadakis
 
Security issue in cloud by himanshu tiwari
Security issue in cloud by himanshu tiwariSecurity issue in cloud by himanshu tiwari
Security issue in cloud by himanshu tiwaribhanu krishna
 
Cloud Computing- Proposal (Autosaved)
Cloud Computing- Proposal (Autosaved)Cloud Computing- Proposal (Autosaved)
Cloud Computing- Proposal (Autosaved)Zuhair Haroon khan
 
security Issues of cloud computing
security Issues of cloud computingsecurity Issues of cloud computing
security Issues of cloud computingprachupanchal
 
Cloud Security - Security Aspects of Cloud Computing
Cloud Security - Security Aspects of Cloud ComputingCloud Security - Security Aspects of Cloud Computing
Cloud Security - Security Aspects of Cloud ComputingJim Geovedi
 
Evaluation Of The Data Security Methods In Cloud Computing Environments
Evaluation Of The Data Security Methods In Cloud Computing EnvironmentsEvaluation Of The Data Security Methods In Cloud Computing Environments
Evaluation Of The Data Security Methods In Cloud Computing Environmentsijfcstjournal
 
Cloud Computing Security
Cloud Computing SecurityCloud Computing Security
Cloud Computing SecurityNinh Nguyen
 
Data Security Model Enhancement In Cloud Environment
Data Security Model Enhancement In Cloud EnvironmentData Security Model Enhancement In Cloud Environment
Data Security Model Enhancement In Cloud EnvironmentIOSR Journals
 

What's hot (20)

Security in Cloud Computing
Security in Cloud ComputingSecurity in Cloud Computing
Security in Cloud Computing
 
A Survey on Cloud Computing Security – Challenges and Trust Issues
A Survey on Cloud Computing Security – Challenges and Trust IssuesA Survey on Cloud Computing Security – Challenges and Trust Issues
A Survey on Cloud Computing Security – Challenges and Trust Issues
 
Cloud computing security & forensics (manu)
Cloud computing security & forensics (manu)Cloud computing security & forensics (manu)
Cloud computing security & forensics (manu)
 
Cloud Computing Security
Cloud Computing SecurityCloud Computing Security
Cloud Computing Security
 
A proposal for implementing cloud computing in newspaper company
A proposal for implementing cloud computing in newspaper companyA proposal for implementing cloud computing in newspaper company
A proposal for implementing cloud computing in newspaper company
 
Cloud Computing: Architecture, IT Security and Operational Perspectives
Cloud Computing: Architecture, IT Security and Operational PerspectivesCloud Computing: Architecture, IT Security and Operational Perspectives
Cloud Computing: Architecture, IT Security and Operational Perspectives
 
Cloud Computing - Security Benefits and Risks
Cloud Computing - Security Benefits and RisksCloud Computing - Security Benefits and Risks
Cloud Computing - Security Benefits and Risks
 
CLOUD COMPUTING_proposal
CLOUD COMPUTING_proposalCLOUD COMPUTING_proposal
CLOUD COMPUTING_proposal
 
Cloud computing security issues and challenges
Cloud computing security issues and challengesCloud computing security issues and challenges
Cloud computing security issues and challenges
 
Cloud Computing Security Issues in Infrastructure as a Service”
Cloud Computing Security Issues in Infrastructure as a Service”Cloud Computing Security Issues in Infrastructure as a Service”
Cloud Computing Security Issues in Infrastructure as a Service”
 
Cloud Computing Security Issues
Cloud Computing Security IssuesCloud Computing Security Issues
Cloud Computing Security Issues
 
Security issue in cloud by himanshu tiwari
Security issue in cloud by himanshu tiwariSecurity issue in cloud by himanshu tiwari
Security issue in cloud by himanshu tiwari
 
Cloud Computing- Proposal (Autosaved)
Cloud Computing- Proposal (Autosaved)Cloud Computing- Proposal (Autosaved)
Cloud Computing- Proposal (Autosaved)
 
Cloud Security
Cloud Security Cloud Security
Cloud Security
 
Cloud Computing & Security Concerns
Cloud Computing & Security ConcernsCloud Computing & Security Concerns
Cloud Computing & Security Concerns
 
security Issues of cloud computing
security Issues of cloud computingsecurity Issues of cloud computing
security Issues of cloud computing
 
Cloud Security - Security Aspects of Cloud Computing
Cloud Security - Security Aspects of Cloud ComputingCloud Security - Security Aspects of Cloud Computing
Cloud Security - Security Aspects of Cloud Computing
 
Evaluation Of The Data Security Methods In Cloud Computing Environments
Evaluation Of The Data Security Methods In Cloud Computing EnvironmentsEvaluation Of The Data Security Methods In Cloud Computing Environments
Evaluation Of The Data Security Methods In Cloud Computing Environments
 
Cloud Computing Security
Cloud Computing SecurityCloud Computing Security
Cloud Computing Security
 
Data Security Model Enhancement In Cloud Environment
Data Security Model Enhancement In Cloud EnvironmentData Security Model Enhancement In Cloud Environment
Data Security Model Enhancement In Cloud Environment
 

Similar to Cloud01: Best Practices for Virtual Cloud Security - H. Del Castillo, AIPMM

Design and implement a new cloud security method based on multi clouds on ope...
Design and implement a new cloud security method based on multi clouds on ope...Design and implement a new cloud security method based on multi clouds on ope...
Design and implement a new cloud security method based on multi clouds on ope...csandit
 
DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...
DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...
DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...cscpconf
 
DDS - The Proven Data Connectivity Standard for the Industrial IoT (IIoT)
DDS - The Proven Data Connectivity Standard for the Industrial IoT (IIoT)DDS - The Proven Data Connectivity Standard for the Industrial IoT (IIoT)
DDS - The Proven Data Connectivity Standard for the Industrial IoT (IIoT)Gerardo Pardo-Castellote
 
THE IMPACT OF EXISTING SOUTH AFRICAN ICT POLICIES AND REGULATORY LAWS ON CLOU...
THE IMPACT OF EXISTING SOUTH AFRICAN ICT POLICIES AND REGULATORY LAWS ON CLOU...THE IMPACT OF EXISTING SOUTH AFRICAN ICT POLICIES AND REGULATORY LAWS ON CLOU...
THE IMPACT OF EXISTING SOUTH AFRICAN ICT POLICIES AND REGULATORY LAWS ON CLOU...csandit
 
A study on_security_and_privacy_issues_o
A study on_security_and_privacy_issues_oA study on_security_and_privacy_issues_o
A study on_security_and_privacy_issues_oPradeep Muralidhar
 
Cloud Forensics: Drawbacks in Current Methodologies and Proposed Solution
Cloud Forensics: Drawbacks in Current Methodologies and Proposed SolutionCloud Forensics: Drawbacks in Current Methodologies and Proposed Solution
Cloud Forensics: Drawbacks in Current Methodologies and Proposed SolutionIJERA Editor
 
A Review On Data Security In Cloud Computing
A Review On Data Security In Cloud ComputingA Review On Data Security In Cloud Computing
A Review On Data Security In Cloud ComputingYolanda Ivey
 
Introduction to Cloud Computing and Cloud Infrastructure
Introduction to Cloud Computing and Cloud InfrastructureIntroduction to Cloud Computing and Cloud Infrastructure
Introduction to Cloud Computing and Cloud InfrastructureSANTHOSHKUMARKL1
 
Introduction to cloud security
Introduction to cloud securityIntroduction to cloud security
Introduction to cloud securityIAEME Publication
 
Strategic, Privacy and Security Considerations for Adoption of Cloud and Emer...
Strategic, Privacy and Security Considerations for Adoption of Cloud and Emer...Strategic, Privacy and Security Considerations for Adoption of Cloud and Emer...
Strategic, Privacy and Security Considerations for Adoption of Cloud and Emer...Marie-Michelle Strah, PhD
 
SECURITY CONCERN ON CLOUD BASED ON ATTRIBUTES: AN SURVEY
SECURITY CONCERN ON CLOUD BASED ON ATTRIBUTES: AN SURVEYSECURITY CONCERN ON CLOUD BASED ON ATTRIBUTES: AN SURVEY
SECURITY CONCERN ON CLOUD BASED ON ATTRIBUTES: AN SURVEYEditor Jacotech
 
CLOUD COMPUTING -Risks, Countermeasures, Costs and Benefits-
CLOUD COMPUTING -Risks, Countermeasures, Costs and Benefits-CLOUD COMPUTING -Risks, Countermeasures, Costs and Benefits-
CLOUD COMPUTING -Risks, Countermeasures, Costs and Benefits-Lillian Ekwosi-Egbulem
 
Taking Healthcare to the Cloud
Taking Healthcare to the CloudTaking Healthcare to the Cloud
Taking Healthcare to the CloudJerry Collins
 
Review of Business Information Systems – Fourth Quarter 2013 V.docx
Review of Business Information Systems – Fourth Quarter 2013 V.docxReview of Business Information Systems – Fourth Quarter 2013 V.docx
Review of Business Information Systems – Fourth Quarter 2013 V.docxmichael591
 
It auditing to assure a secure cloud computing
It auditing to assure a secure cloud computingIt auditing to assure a secure cloud computing
It auditing to assure a secure cloud computingingenioustech
 

Similar to Cloud01: Best Practices for Virtual Cloud Security - H. Del Castillo, AIPMM (20)

Design and implement a new cloud security method based on multi clouds on ope...
Design and implement a new cloud security method based on multi clouds on ope...Design and implement a new cloud security method based on multi clouds on ope...
Design and implement a new cloud security method based on multi clouds on ope...
 
DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...
DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...
DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...
 
DDS - The Proven Data Connectivity Standard for the Industrial IoT (IIoT)
DDS - The Proven Data Connectivity Standard for the Industrial IoT (IIoT)DDS - The Proven Data Connectivity Standard for the Industrial IoT (IIoT)
DDS - The Proven Data Connectivity Standard for the Industrial IoT (IIoT)
 
Industrial IOT Data Connectivity Standard
Industrial IOT Data Connectivity StandardIndustrial IOT Data Connectivity Standard
Industrial IOT Data Connectivity Standard
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
THE IMPACT OF EXISTING SOUTH AFRICAN ICT POLICIES AND REGULATORY LAWS ON CLOU...
THE IMPACT OF EXISTING SOUTH AFRICAN ICT POLICIES AND REGULATORY LAWS ON CLOU...THE IMPACT OF EXISTING SOUTH AFRICAN ICT POLICIES AND REGULATORY LAWS ON CLOU...
THE IMPACT OF EXISTING SOUTH AFRICAN ICT POLICIES AND REGULATORY LAWS ON CLOU...
 
A study on_security_and_privacy_issues_o
A study on_security_and_privacy_issues_oA study on_security_and_privacy_issues_o
A study on_security_and_privacy_issues_o
 
Cloud Forensics: Drawbacks in Current Methodologies and Proposed Solution
Cloud Forensics: Drawbacks in Current Methodologies and Proposed SolutionCloud Forensics: Drawbacks in Current Methodologies and Proposed Solution
Cloud Forensics: Drawbacks in Current Methodologies and Proposed Solution
 
A Review On Data Security In Cloud Computing
A Review On Data Security In Cloud ComputingA Review On Data Security In Cloud Computing
A Review On Data Security In Cloud Computing
 
Introduction to Cloud Computing and Cloud Infrastructure
Introduction to Cloud Computing and Cloud InfrastructureIntroduction to Cloud Computing and Cloud Infrastructure
Introduction to Cloud Computing and Cloud Infrastructure
 
Introduction to cloud security
Introduction to cloud securityIntroduction to cloud security
Introduction to cloud security
 
Strategic, Privacy and Security Considerations for Adoption of Cloud and Emer...
Strategic, Privacy and Security Considerations for Adoption of Cloud and Emer...Strategic, Privacy and Security Considerations for Adoption of Cloud and Emer...
Strategic, Privacy and Security Considerations for Adoption of Cloud and Emer...
 
SECURITY CONCERN ON CLOUD BASED ON ATTRIBUTES: AN SURVEY
SECURITY CONCERN ON CLOUD BASED ON ATTRIBUTES: AN SURVEYSECURITY CONCERN ON CLOUD BASED ON ATTRIBUTES: AN SURVEY
SECURITY CONCERN ON CLOUD BASED ON ATTRIBUTES: AN SURVEY
 
1376843836 94879193
1376843836  948791931376843836  94879193
1376843836 94879193
 
1376843836 94879193
1376843836  948791931376843836  94879193
1376843836 94879193
 
CLOUD COMPUTING -Risks, Countermeasures, Costs and Benefits-
CLOUD COMPUTING -Risks, Countermeasures, Costs and Benefits-CLOUD COMPUTING -Risks, Countermeasures, Costs and Benefits-
CLOUD COMPUTING -Risks, Countermeasures, Costs and Benefits-
 
Taking Healthcare to the Cloud
Taking Healthcare to the CloudTaking Healthcare to the Cloud
Taking Healthcare to the Cloud
 
Review of Business Information Systems – Fourth Quarter 2013 V.docx
Review of Business Information Systems – Fourth Quarter 2013 V.docxReview of Business Information Systems – Fourth Quarter 2013 V.docx
Review of Business Information Systems – Fourth Quarter 2013 V.docx
 
It auditing to assure a secure cloud computing
It auditing to assure a secure cloud computingIt auditing to assure a secure cloud computing
It auditing to assure a secure cloud computing
 
Slides 530 a2
Slides 530 a2Slides 530 a2
Slides 530 a2
 

More from Hector Del Castillo, CPM, CPMM

PM Job Search Council Info Session - PMI Silver Spring Chapter
PM Job Search Council Info Session - PMI Silver Spring ChapterPM Job Search Council Info Session - PMI Silver Spring Chapter
PM Job Search Council Info Session - PMI Silver Spring ChapterHector Del Castillo, CPM, CPMM
 
WheelTug PLC Pitch Deck | Investor Insights | April 2024
WheelTug PLC Pitch Deck | Investor Insights | April 2024WheelTug PLC Pitch Deck | Investor Insights | April 2024
WheelTug PLC Pitch Deck | Investor Insights | April 2024Hector Del Castillo, CPM, CPMM
 
How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...
How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...
How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...Hector Del Castillo, CPM, CPMM
 
How To Land Your Next PM Dream Job - PMISSC Meeting - April 2024
How To Land Your Next PM Dream Job - PMISSC Meeting - April 2024How To Land Your Next PM Dream Job - PMISSC Meeting - April 2024
How To Land Your Next PM Dream Job - PMISSC Meeting - April 2024Hector Del Castillo, CPM, CPMM
 
The Future of Business: How AI is Transforming Mid-Market Operations, Product...
The Future of Business: How AI is Transforming Mid-Market Operations, Product...The Future of Business: How AI is Transforming Mid-Market Operations, Product...
The Future of Business: How AI is Transforming Mid-Market Operations, Product...Hector Del Castillo, CPM, CPMM
 
How AI is Transforming Project Management - PMI Silver Spring Chapter - Octob...
How AI is Transforming Project Management - PMI Silver Spring Chapter - Octob...How AI is Transforming Project Management - PMI Silver Spring Chapter - Octob...
How AI is Transforming Project Management - PMI Silver Spring Chapter - Octob...Hector Del Castillo, CPM, CPMM
 
Unlocking The Power of Informational Interviews | Bold PM Insights
Unlocking The Power of Informational Interviews | Bold PM InsightsUnlocking The Power of Informational Interviews | Bold PM Insights
Unlocking The Power of Informational Interviews | Bold PM InsightsHector Del Castillo, CPM, CPMM
 
How to Land Your Next PM Dream Job in 90 Days | Great IT Professional | May 2...
How to Land Your Next PM Dream Job in 90 Days | Great IT Professional | May 2...How to Land Your Next PM Dream Job in 90 Days | Great IT Professional | May 2...
How to Land Your Next PM Dream Job in 90 Days | Great IT Professional | May 2...Hector Del Castillo, CPM, CPMM
 
Emotional Agility for Leaders | Great IT Professional | May 17, 2023
Emotional Agility for Leaders | Great IT Professional | May 17, 2023Emotional Agility for Leaders | Great IT Professional | May 17, 2023
Emotional Agility for Leaders | Great IT Professional | May 17, 2023Hector Del Castillo, CPM, CPMM
 
Project Management Trends in a Hybrid World | Great IT Professional | May 2,...
Project Management Trends in a Hybrid World  | Great IT Professional | May 2,...Project Management Trends in a Hybrid World  | Great IT Professional | May 2,...
Project Management Trends in a Hybrid World | Great IT Professional | May 2,...Hector Del Castillo, CPM, CPMM
 
How to Land Your Next PM Dream Job Quickly | PMI Silver Spring Chapter | Apri...
How to Land Your Next PM Dream Job Quickly | PMI Silver Spring Chapter | Apri...How to Land Your Next PM Dream Job Quickly | PMI Silver Spring Chapter | Apri...
How to Land Your Next PM Dream Job Quickly | PMI Silver Spring Chapter | Apri...Hector Del Castillo, CPM, CPMM
 
Your First 90 Days in a New Leadership Role | Great IT Professional | Februar...
Your First 90 Days in a New Leadership Role | Great IT Professional | Februar...Your First 90 Days in a New Leadership Role | Great IT Professional | Februar...
Your First 90 Days in a New Leadership Role | Great IT Professional | Februar...Hector Del Castillo, CPM, CPMM
 
How To Land Your Next Product Dream Job in 90 Days | ProductCamp DC
How To Land Your Next Product Dream Job in 90 Days  | ProductCamp DCHow To Land Your Next Product Dream Job in 90 Days  | ProductCamp DC
How To Land Your Next Product Dream Job in 90 Days | ProductCamp DCHector Del Castillo, CPM, CPMM
 
Looking Back, Looking Ahead | December 2022 ProductCamp DC
Looking Back, Looking Ahead | December 2022 ProductCamp DCLooking Back, Looking Ahead | December 2022 ProductCamp DC
Looking Back, Looking Ahead | December 2022 ProductCamp DCHector Del Castillo, CPM, CPMM
 
Future of Product Management 2023 | Product Summit Online™
Future of Product Management 2023 | Product Summit Online™Future of Product Management 2023 | Product Summit Online™
Future of Product Management 2023 | Product Summit Online™Hector Del Castillo, CPM, CPMM
 
Your First 90 Days in a New Product Role | Product Summit Online™
Your First 90 Days in a New Product Role | Product Summit Online™Your First 90 Days in a New Product Role | Product Summit Online™
Your First 90 Days in a New Product Role | Product Summit Online™Hector Del Castillo, CPM, CPMM
 

More from Hector Del Castillo, CPM, CPMM (20)

PM Job Search Council Info Session - PMI Silver Spring Chapter
PM Job Search Council Info Session - PMI Silver Spring ChapterPM Job Search Council Info Session - PMI Silver Spring Chapter
PM Job Search Council Info Session - PMI Silver Spring Chapter
 
WheelTug PLC Pitch Deck | Investor Insights | April 2024
WheelTug PLC Pitch Deck | Investor Insights | April 2024WheelTug PLC Pitch Deck | Investor Insights | April 2024
WheelTug PLC Pitch Deck | Investor Insights | April 2024
 
How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...
How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...
How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...
 
How To Land Your Next PM Dream Job - PMISSC Meeting - April 2024
How To Land Your Next PM Dream Job - PMISSC Meeting - April 2024How To Land Your Next PM Dream Job - PMISSC Meeting - April 2024
How To Land Your Next PM Dream Job - PMISSC Meeting - April 2024
 
The Future of Business: How AI is Transforming Mid-Market Operations, Product...
The Future of Business: How AI is Transforming Mid-Market Operations, Product...The Future of Business: How AI is Transforming Mid-Market Operations, Product...
The Future of Business: How AI is Transforming Mid-Market Operations, Product...
 
Byond Business Growth Live CEO M&A Panel Discussion
Byond Business Growth Live CEO M&A Panel DiscussionByond Business Growth Live CEO M&A Panel Discussion
Byond Business Growth Live CEO M&A Panel Discussion
 
End of Times Views - Book of Revelation Summary
End of Times Views - Book of Revelation SummaryEnd of Times Views - Book of Revelation Summary
End of Times Views - Book of Revelation Summary
 
How AI is Transforming Project Management - PMI Silver Spring Chapter - Octob...
How AI is Transforming Project Management - PMI Silver Spring Chapter - Octob...How AI is Transforming Project Management - PMI Silver Spring Chapter - Octob...
How AI is Transforming Project Management - PMI Silver Spring Chapter - Octob...
 
Unlocking The Power of Informational Interviews | Bold PM Insights
Unlocking The Power of Informational Interviews | Bold PM InsightsUnlocking The Power of Informational Interviews | Bold PM Insights
Unlocking The Power of Informational Interviews | Bold PM Insights
 
Product Management Fundamentals
Product Management FundamentalsProduct Management Fundamentals
Product Management Fundamentals
 
How to Land Your Next PM Dream Job in 90 Days | Great IT Professional | May 2...
How to Land Your Next PM Dream Job in 90 Days | Great IT Professional | May 2...How to Land Your Next PM Dream Job in 90 Days | Great IT Professional | May 2...
How to Land Your Next PM Dream Job in 90 Days | Great IT Professional | May 2...
 
Emotional Agility for Leaders | Great IT Professional | May 17, 2023
Emotional Agility for Leaders | Great IT Professional | May 17, 2023Emotional Agility for Leaders | Great IT Professional | May 17, 2023
Emotional Agility for Leaders | Great IT Professional | May 17, 2023
 
Project Management Trends in a Hybrid World | Great IT Professional | May 2,...
Project Management Trends in a Hybrid World  | Great IT Professional | May 2,...Project Management Trends in a Hybrid World  | Great IT Professional | May 2,...
Project Management Trends in a Hybrid World | Great IT Professional | May 2,...
 
How to Land Your Next PM Dream Job Quickly | PMI Silver Spring Chapter | Apri...
How to Land Your Next PM Dream Job Quickly | PMI Silver Spring Chapter | Apri...How to Land Your Next PM Dream Job Quickly | PMI Silver Spring Chapter | Apri...
How to Land Your Next PM Dream Job Quickly | PMI Silver Spring Chapter | Apri...
 
Your First 90 Days in a New Leadership Role | Great IT Professional | Februar...
Your First 90 Days in a New Leadership Role | Great IT Professional | Februar...Your First 90 Days in a New Leadership Role | Great IT Professional | Februar...
Your First 90 Days in a New Leadership Role | Great IT Professional | Februar...
 
How To Land Your Next Product Dream Job in 90 Days | ProductCamp DC
How To Land Your Next Product Dream Job in 90 Days  | ProductCamp DCHow To Land Your Next Product Dream Job in 90 Days  | ProductCamp DC
How To Land Your Next Product Dream Job in 90 Days | ProductCamp DC
 
Looking Back, Looking Ahead | December 2022 ProductCamp DC
Looking Back, Looking Ahead | December 2022 ProductCamp DCLooking Back, Looking Ahead | December 2022 ProductCamp DC
Looking Back, Looking Ahead | December 2022 ProductCamp DC
 
Future of Product Management 2023 | Product Summit Online™
Future of Product Management 2023 | Product Summit Online™Future of Product Management 2023 | Product Summit Online™
Future of Product Management 2023 | Product Summit Online™
 
Your First 90 Days in a New Product Role | Product Summit Online™
Your First 90 Days in a New Product Role | Product Summit Online™Your First 90 Days in a New Product Role | Product Summit Online™
Your First 90 Days in a New Product Role | Product Summit Online™
 
PM vs. PM | PMISSC 2022 Symposium
PM vs. PM | PMISSC 2022 SymposiumPM vs. PM | PMISSC 2022 Symposium
PM vs. PM | PMISSC 2022 Symposium
 

Recently uploaded

Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfUmakantAnnand
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docxPoojaSen20
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...M56BOOKSTORE PRODUCT/SERVICE
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 

Recently uploaded (20)

Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.Compdf
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docx
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 

Cloud01: Best Practices for Virtual Cloud Security - H. Del Castillo, AIPMM

  • 2. What We Will Discuss 1. What is cloud security 2. Current situation 3. Dimensions of cloud security 4. Security risks 5. Critical areas 6. Approaches to reduce risk 7. Key takeaways
  • 3. What is Cloud Security? • An evolving sub-domain of computer security • A broad set of policies, technologies, and controls deployed to protect data, applications, and the associated infrastructure of cloud computing • Should not be confused with ‘cloud-based’ security software offerings • Many commercial software vendors have cloud-based offerings such as anti-virus or vulnerability management
  • 4. Current Situation • Analysts estimate that cloud computing adoption will continue to rapidly increase • A single, massive cloud data center contains more computers than were on the entire internet just a few years ago • Security experts agree that the number of attacks and their level of sophistication will continue to grow
  • 5. Source: NIST Special Publication 800-144, Jan 2011
  • 6. Service Models Software Platform Infrastructure Deployment Models as a Service as a Service as a Service (SaaS) (PaaS) (IaaS) Private X X Hybrid X X X Public X X X Community X X X Source: NIST Special Publication 800-144, Jan 2011
  • 8. “Cloud Services market to grow to $42B by 2012.” - IDC Source: ZDNet Blogs
  • 9. Cloud Security Reference Model Source: Cloud Security Alliance
  • 10. Dimensions of Cloud Security • Security and Privacy – Data protection – Identity management – Physical and personnel security – Availability – Application security – Privacy Source: "Cloud Security Front and Center,” Forrester Research, 2009.
  • 11. Dimensions of Cloud Security • Compliance – Business continuity and data recovery – Logs and audit trails – Unique compliance requirements Source: "Cloud Security Front and Center,” Forrester Research, 2009.
  • 12. Dimensions of Cloud Security • Legal or Contractual Issues – Public records Source: "Cloud Security Front and Center,” Forrester Research, 2009.
  • 13. Security Risks 1. Privileged user access 2. Regulatory compliance 3. Data location 4. Data segregation 5. Recovery 6. Investigative support 7. Long-term viability Source: “Assessing the Security Risks of Cloud Computing,” Gartner, 2008.
  • 14. Critical Areas • Cloud Architecture – Cloud Computing Architectural Framework Source: "Security Guidance for Critical Areas of Focus in Cloud Computing V2.1,” CSA, 2009.
  • 15. Critical Areas • Governing in the Cloud – Governance and Enterprise Risk Management – Legal and Electronic Discovery – Compliance and Audit – Information Lifecycle Management – Portability and Interoperability Source: "Security Guidance for Critical Areas of Focus in Cloud Computing V2.1,” CSA, 2009.
  • 16. Critical Areas • Operating in the Cloud – Traditional Security, Business Continuity, and Disaster Recovery – Data Center Operations – Incident Response, Notification, and Remediation – Application Security – Encryption and Key Management – Identity and Access Management – Virtualization Source: "Security Guidance for Critical Areas of Focus in Cloud Computing V2.1,” CSA, 2009.
  • 17. Recommendations  Trust (4)  Transnational Data Flows (4)  Transparency (2)  Transformation (4) Source: “CLOUD2 Summary Report,” TechAmerica, 2011.
  • 18. Approaches to Reduce Risk Trust 1. (Security & Assurance Frameworks): Industry and government should support and participate in the development and implementation of international, standardized frameworks for securing, assessing, certifying and accrediting cloud solutions. Source: “CLOUD2 Summary Report,” TechAmerica, 2011.
  • 19. Approaches to Reduce Risk Trust 2. (Identity Management): Should accelerate the development of a private sector-led identity management ecosystem as envisioned by the National Strategy for Trusted Identities in Cyberspace (NSTIC) to facilitate the adoption of strong authentication technologies and enable users to gain secure access to cloud services and websites. Source: “CLOUD2 Summary Report,” TechAmerica, 2011.
  • 20. Approaches to Reduce Risk Trust 3. (Responses to Data Breaches): Government should enact a national data breach law to clarify breach notification responsibilities and commitments of companies to their customers, and also update and strengthen criminal laws against those who attack computer systems and networks, including cloud computing services. Source: “CLOUD2 Summary Report,” TechAmerica, 2011.
  • 21. Approaches to Reduce Risk Trust 4. (Research): Government, industry, and academia should develop and execute a joint cloud computing research agenda. Source: “CLOUD2 Summary Report,” TechAmerica, 2011.
  • 22. Approaches to Reduce Risk Transnational Data Flows 5. (Privacy): The U.S. government and industry should promote a comprehensive, technology-neutral privacy framework, consistent with commonly accepted privacy and data protection principles-based frameworks such as the OECD principles and/or APEC privacy frameworks. Source: “CLOUD2 Summary Report,” TechAmerica, 2011.
  • 23. Approaches to Reduce Risk Transnational Data Flows 6. (Government/Law Enforcement Access to Data): The U.S. government should demonstrate leadership in identifying and implementing mechanisms for lawful access by law enforcement or government to data stored in the cloud. Source: “CLOUD2 Summary Report,” TechAmerica, 2011.
  • 24. Approaches to Reduce Risk Transnational Data Flows 7. (E-Discovery and Forensics): Government and industry should enable effective practices for collecting information from the cloud to meet forensic or e-discovery needs in ways that fully support legal due process while minimizing impact on cloud provider operations. Source: “CLOUD2 Summary Report,” TechAmerica, 2011.
  • 25. Approaches to Reduce Risk Transnational Data Flows 8. (Lead by Example): The U.S. government should demonstrate its willingness to trust cloud computing environments in other countries for appropriate government workloads. Source: “CLOUD2 Summary Report,” TechAmerica, 2011.
  • 26. Approaches to Reduce Risk Transparency 9. (Transparency): Industry should publicly disclose information about relevant operational aspects of their cloud services, including portability, interoperability, security, certifications, performance and reliability. Source: “CLOUD2 Summary Report,” TechAmerica, 2011.
  • 27. Approaches to Reduce Risk Transparency 10. (Data Portability): Cloud providers should enable portability of user data through documents, tools, and support for agreed- upon industry standards and best practices. Source: “CLOUD2 Summary Report,” TechAmerica, 2011.
  • 28. Approaches to Reduce Risk Transformation 11. (Federal Acquisition and Budgeting): Agencies should demonstrate flexibility in adapting existing procurement models to facilitate acquisition of cloud services and solutions. Congress and OMB should demonstrate flexibility in changing budget models to help agencies acquire cloud services and solutions. Source: “CLOUD2 Summary Report,” TechAmerica, 2011.
  • 29. Approaches to Reduce Risk Transformation 12. (Incentives): Government should establish policies and processes for providing fiscal incentives, rewards and support for agencies as they take steps towards implementing cloud deployments. Source: “CLOUD2 Summary Report,” TechAmerica, 2011.
  • 30. Approaches to Reduce Risk Transformation 13. (Improve Infrastructure): Government and industry should embrace the modernization of broadband infrastructure and the current move to IPv6 to improve the bandwidth and reliable connectivity necessary for the growth of cloud services. Source: “CLOUD2 Summary Report,” TechAmerica, 2011.
  • 31. Approaches to Reduce Risk Transformation 14. (Education/Training): Government, industry, and academia should develop and disseminate resources for major stakeholder communities to be educated on the technical, business, and policy issues around acquisition, deployment and operation of cloud services. Source: “CLOUD2 Summary Report,” TechAmerica, 2011.
  • 32. Key Takeaways 1 • Cloud security continues to evolve • Security issues are global and impact providers 2 and customers • Cloud security requires action for government, 3 industry and academia • Data owner must implement traditional layered 4 security approach • Data owner must segregate data from 5 application
  • 33. Recommended AFCOM Sessions 1. "DCM18: Securing the Virtualized Environment,” Robert Klotz, Akibia, 2011. 2. "DCP10: How Social Media and the Cloud Impact Data Center Security,” James Danburg, SA2, 2011. 3. "Cloud07: Managing the Transition Cloud,” Brent Eubanks, Latisys, 2011. 4. "Cloud04: The Ins and Outs of Virtual Private Clouds,” Sundar Raghavan, Skytap, 2011.
  • 34. Recommended Reading 1. “Assessing the Security Risks of Cloud Computing,” Gartner, 3 June 2008. 2. "Cloud Security Front and Center,” Forrester Research, 18 Nov 2009. 3. "Security Guidance for Critical Areas of Focus in Cloud Computing V2.1,” Cloud Security Alliance, 2009. 4. “Guidelines on Security and Privacy in Public Cloud Computing, NIST Special Publication 800-144, Jan 2011. 5. “Summary Report of the Commission on the Leadership Opportunity in U.S. Deployment of the Cloud,” TechAmerica Foundation, July 2011.
  • 35. Join My Professional Network! Hector Del Castillo, PMP, CPM, CPMM linkd.in/hdelcastillo hmdelcastillo@aipmm.com