SlideShare a Scribd company logo
1 of 28
https://www.cloudsecurityalliance.jp/Copyright © 2017 Cloud Security Alliance Japan Chapter
Eiji Sasahara, Ph.D., MBA
Cloud Security Alliance Japan Chapter – Kansai Region
Opportunities of Cross-Asia Collaboration
on Secure Containers & Microservices
14th September, 2019
https://www.cloudsecurityalliance.jp/Copyright © 2017 Cloud Security Alliance Japan Chapter 2
1. Introduction of Cloud Security Alliance
Japan Chapter – Kansai Region
2. Utilization of Secure Application Containers
3. Utilization of Secure Microservices
4. Opportunities of Cross-Asia Collaboration
on Secure Containers & Microservices
https://www.cloudsecurityalliance.jp/Copyright © 2017 Cloud Security Alliance Japan Chapter 3
1. Introduction of Cloud Security Alliance
Japan Chapter – Kansai Region
https://www.cloudsecurityalliance.jp/Copyright © 2017 Cloud Security Alliance Japan Chapter 4
Cloud Security Alliance Japan Chapter
# of local members(as of May 31, 2019)
• Corp: 34 companies
• Individual: 132 people
Cloud Security Alliance Japan Chapter –Kansai Region
Officially Established in June 1, 2019
Kick-off seminar on July 11, 2019
• Key Note by the Ministry of Economy, Trade and Industry
Regional WGs, including Application Containers &
Microservices WG, SLA Innovation WG, and Health WG
https://www.cloudsecurityalliance.jp/Copyright © 2017 Cloud Security Alliance Japan Chapter 5
Japan-India Talent Development and Exchange
Initiative @CSA Japan – Kansai Region
Co-Chairs: Eiji Sasahara, Jin Arita
Encouraging international talent development and exchange activities
between CSA Japan Chapter Health Information Management (HIM)
User WG/SLA Innovation WG/Application Containers & Microservices
(ACM) WG and CSA Regional Chapters in India.
Actively collaborating with relevant stakeholder communities (i.e.
universities & educational institutions, research institutes, industry
associations, cluster collaboration platform, and regional government
agencies) inside/outside Japan on Japan-India talent development and
exchange activities in the fields of health/wellness, cloud SLA and
containers/microservices security.
https://www.cloudsecurityalliance.jp/Copyright © 2017 Cloud Security Alliance Japan Chapter 6
Perspectives to Attract Non-Japanese Enterprises in
Kansai, including Kyoto, Kobe and Osaka
https://www.cloudsecurityalliance.jp/Copyright © 2017 Cloud Security Alliance Japan Chapter 7
2. Utilization of Secure Application
Containers
2-1. Use Case of Application
Containers: Industry 4.0
2-2. Security Standards for
Application Containers
https://www.cloudsecurityalliance.jp/Copyright © 2017 Cloud Security Alliance Japan Chapter 8
Tim Bayer et al. “A Fog-Cloud Computing Infrastructure
for Condition Monitoring and Distributing Industry 4.0
Services”(May 2-4, 2019)
https://opus.hs-furtwangen.de/frontdoor/index/index/docId/5418
Architecture & Containerization
Infrastructure Services.
Kubernetes Master.
Kubernetes Nodes.
Networking and Communication
Source: Tim Bayer et al. “A Fog-Cloud Computing Infrastructure for
Condition Monitoring and Distributing Industry 4.0 Services”(May 2-4,
2019)
https://www.cloudsecurityalliance.jp/Copyright © 2017 Cloud Security Alliance Japan Chapter 9
Requirements for Architecture
Source: Tim Bayer et al. “A Fog-Cloud Computing Infrastructure for Condition Monitoring and Distributing Industry 4.0
Services”(May 2-4, 2019)
Items Requirements
Develop a
Industry 4.0
Service
R1: Support distributed data processing tasks between Cloud and Fog nodes
R2: Provide all required functionalities to provide suitable node management,
inter-node communication, and task execution
Integrating
Measurement
Probes
R3: Determine node conditions by integrating and deploying measurement
probes on the nodes
R4: Provide support for centralized and decentralized measurement probes
R5: Provide a uniform way to execute the measurement probes and services
on all nodes regardless of the actual technology they use
R6: Provide a consistent execution environment that is suitable to migrate
measurement probes and services during runtime
Integrate
Distribution
Algorithms
R7: Integration of distribution algorithms that make use of the measurement
results to deploy an application service accordingly
R8: Provide a common interface to apply and configure different distribution
algorithms
https://www.cloudsecurityalliance.jp/Copyright © 2017 Cloud Security Alliance Japan Chapter 10
Architecture Overview:
Management
Layer
Worker Layer
Source: Tim Bayer et al. “A Fog-Cloud Computing Infrastructure for Condition Monitoring and Distributing Industry 4.0
Services”(May 2-4, 2019)
https://www.cloudsecurityalliance.jp/Copyright © 2017 Cloud Security Alliance Japan Chapter 11
Application Example:
Source: Tim Bayer et al. “A Fog-Cloud Computing Infrastructure for Condition Monitoring and Distributing Industry 4.0
Services”(May 2-4, 2019)
https://www.cloudsecurityalliance.jp/Copyright © 2017 Cloud Security Alliance Japan Chapter 12
National Institute of Standards and Technology (NIST),
“SP 800-190: Application Container Security Guide”
(September 25, 2017)
https://csrc.nist.gov/publications/detail/sp/800-190/final
Container
Technology
Architecture
Tiers and
Components
Source: NIST , “SP 800-190: Application Container Security Guide” (September 25, 2017)
https://www.cloudsecurityalliance.jp/Copyright © 2017 Cloud Security Alliance Japan Chapter 13
Major Risks for Core Components of Container Technologies(1)
Source: NIST , “SP 800-190: Application Container Security Guide” (September 25, 2017)
Component Risk
Image Image vulnerabilities
Image configuration defects
Embedded malware
Embedded clear text secrets
Use of untrusted images
Registry Insecure connections to registries
Stale images in registries
Insufficient authentication and authorization restrictions
Orchestrator Unbounded administrative access
Unauthorized access
Poorly separated inter-container network traffic
Mixing of workload sensitivity levels
Orchestrator node trust
https://www.cloudsecurityalliance.jp/Copyright © 2017 Cloud Security Alliance Japan Chapter 14
Major Risks for Core Components of Container Technologies(2)
Source: NIST , “SP 800-190: Application Container Security Guide” (September 25, 2017)
Component Risk
Container Vulnerabilities within the runtime software
Unbounded network access from containers
Insecure container runtime configurations
App vulnerabilities
Rogue containers
Host OS Large attack surface
Shared kernel
Host OS component vulnerabilities
Improper user access rights
Host OS file system tampering
https://www.cloudsecurityalliance.jp/Copyright © 2017 Cloud Security Alliance Japan Chapter 15
3. Utilization of Microservices
and Security
3-1. Use Case of Microservices:
Connected Cars
3-2. Security Standards for
Microservices
https://www.cloudsecurityalliance.jp/Copyright © 2017 Cloud Security Alliance Japan Chapter 16
Salman Taherizadeh et al. “A Capillary Computing
Architecture for Dynamic Internet of Things: Orchestration
of Microservices from Edge Devices to Fog and Cloud
Providers.”
https://www.ncbi.nlm.nih.gov/pmc/articles/PMC6164252/
Applications structure of
monolithic versus
Microservices architecture.
Source: Sensors (Basel). 2018 Sep 4;18(9). pii: E2938. doi:
10.3390/s18092938.
https://www.cloudsecurityalliance.jp/Copyright © 2017 Cloud Security Alliance Japan Chapter 17
Onloading or offloading Microservices between different
layers (Edge, Fog and Cloud) in the proposed capillary
distributed computing architecture.
Source: Sensors
(Basel). 2018 Sep
4;18(9). pii: E2938. doi:
10.3390/s18092938.
Cloud Layer
Fog Layer
Edge Layer
https://www.cloudsecurityalliance.jp/Copyright © 2017 Cloud Security Alliance Japan Chapter 18
The proposed capillary distributed computing
architecture for smart IoT applications.
Source: Sensors
(Basel). 2018 Sep
4;18(9). pii: E2938. doi:
10.3390/s18092938.
https://www.cloudsecurityalliance.jp/Copyright © 2017 Cloud Security Alliance Japan Chapter 19
Motorhome Artificial Intelligence Communication
Hardware(MACH) Edge node developed in one of our
ongoing projects called OPTIMUM is settled in the vehicle.
Source: Sensors (Basel). 2018 Sep 4;18(9). pii: E2938. doi: 10.3390/s18092938.
https://www.cloudsecurityalliance.jp/Copyright © 2017 Cloud Security Alliance Japan Chapter 20
Node Selection
Rank (NSR) values
offered by two Fog
nodes in a specific
part of
the trip.
Source: Sensors (Basel). 2018 Sep
4;18(9). pii: E2938. doi:
10.3390/s18092938.
https://www.cloudsecurityalliance.jp/Copyright © 2017 Cloud Security Alliance Japan Chapter 21
National Institute of Standards and Technology (NIST),
“SP 800-204: Security Strategies for Microservices-
based Application Systems” (August 7, 2019)
https://www.nist.gov/publications/security-strategies-microservices-based-application-systems
Monolithic Architecture Vs. Microservices Architecture
Source: NIST , “SP 800-204: Security Strategies for Microservices-based Application Systems ” (August 7, 2019)
https://www.cloudsecurityalliance.jp/Copyright © 2017 Cloud Security Alliance Japan Chapter 22
Security strategies for the design and deployment of
microservices-based application systems
Source: NIST , “SP 800-204: Security Strategies for Microservices-based Application Systems ” (August 7, 2019)
Threats Security Strategies
Identity and access management -Authentication (MS-SS-1)
-Access Management (MS-SS-2)
Service Discovery Mechanism -Service Registry Configuration (MS-SS-3)
Secure Communication Protocols -Secure Communication (MS-SS-4)
Security Monitoring -Security Monitoring (MS-SS-5)
Circuit Breaker implementation -Implementing Circuit Breakers (MS-SS-6)
Load Balancing -Load Balancing(MS-SS-7)
Rate Limiting (Throttling) -Late Limiting(MS-SS-8)
https://www.cloudsecurityalliance.jp/Copyright © 2017 Cloud Security Alliance Japan Chapter 23
Security strategies for the design and deployment of
microservices-based application systems (Continue.)
Source: NIST , “SP 800-204: Security Strategies for Microservices-based Application Systems ” (August 7, 2019)
Threats Security Strategies
Integrity Assurance -Induction of New Versions of
Microservices (MS-SS-9)
-Handling Session Persistence (MS-SS-10)
Countering Internet-based Attacks -Preventing Credential Abuse and Stuffing
Attacks (MS-SS-11)
Architectural Frameworks in
Microservices
-API Gateway Implementation (MS-SS-12)
-Service Mesh Implementation (MS-SS-13)
https://www.cloudsecurityalliance.jp/Copyright © 2017 Cloud Security Alliance Japan Chapter 24
4. Opportunities of Cross-Asia Collaboration on
Secure Containers & Microservices
https://www.cloudsecurityalliance.jp/Copyright © 2017 Cloud Security Alliance Japan Chapter 25
Source:Cabinet Office, Government of Japan, “Society 5.0”
(https://www8.cao.go.jp/cstp/english/society5_0/index.html)
“Society 5.0” Initiative by the Japanese Government
“Cloud by
Default”
Principle
https://www.cloudsecurityalliance.jp/Copyright © 2017 Cloud Security Alliance Japan Chapter 26
Source: IT Strategic
Headquarters, “Declaration to
Be the World’s Most Advanced
IT Nation
Basic Plan for the Advancement
of Public and Private Sector
Data Utilization “ (May, 2017)
“Cloud by
Default”
Principle
Cloud-native Tech for Integrated Medical Care & Nursing
Care, Anytime &Anywhere
https://www.cloudsecurityalliance.jp/Copyright © 2017 Cloud Security Alliance Japan Chapter 27
Why don’t you join CSA’s Application Containers &
Microservices WG from APAC?
(https://cloudsecurityalliance.org/research/working-groups/containerization/)
https://www.cloudsecurityalliance.jp/Copyright © 2017 Cloud Security Alliance Japan Chapter 28
https://www.linkedin.com/in/esasahara
https://www.facebook.com/esasahara
https://twitter.com/esasahara
Cloud Security Alliance Japan Chapter
http://www.cloudsecurityalliance.jp/

More Related Content

What's hot

Automate and Enhance Application Security Analysis
Automate and Enhance Application Security AnalysisAutomate and Enhance Application Security Analysis
Automate and Enhance Application Security AnalysisCarlos Andrés García
 
Greg Brown - Intel Big Data & Cloud Summit 2013
Greg Brown - Intel Big Data & Cloud Summit 2013Greg Brown - Intel Big Data & Cloud Summit 2013
Greg Brown - Intel Big Data & Cloud Summit 2013IntelAPAC
 
Introduction to Cloud Security
Introduction to Cloud SecurityIntroduction to Cloud Security
Introduction to Cloud SecuritySusanne Tedrick
 
Lacework slides from AWS Meetups
Lacework slides from AWS MeetupsLacework slides from AWS Meetups
Lacework slides from AWS MeetupsJohn Varghese
 
2012 10 cloud security architecture
2012 10 cloud security architecture2012 10 cloud security architecture
2012 10 cloud security architectureVladimir Jirasek
 
Defcon 27 - The Future of Command and Control
Defcon 27 - The Future of Command and ControlDefcon 27 - The Future of Command and Control
Defcon 27 - The Future of Command and ControlNetskope
 
#ITSitioEnRSA - Presentacion de Jeef Reed de Cisco
#ITSitioEnRSA - Presentacion de Jeef Reed de Cisco #ITSitioEnRSA - Presentacion de Jeef Reed de Cisco
#ITSitioEnRSA - Presentacion de Jeef Reed de Cisco ITSitio.com
 
Tomorrow Starts Here - Security Everywhere
Tomorrow Starts Here - Security Everywhere Tomorrow Starts Here - Security Everywhere
Tomorrow Starts Here - Security Everywhere Cisco Canada
 
Winning Strategy For Hybrid Cloud Environments
Winning Strategy For Hybrid Cloud EnvironmentsWinning Strategy For Hybrid Cloud Environments
Winning Strategy For Hybrid Cloud EnvironmentsCarl De Groote
 
Governance for the Cloud Age - DEM12-R - AWS re:Inforce 2019
 Governance for the Cloud Age - DEM12-R - AWS re:Inforce 2019  Governance for the Cloud Age - DEM12-R - AWS re:Inforce 2019
Governance for the Cloud Age - DEM12-R - AWS re:Inforce 2019 Amazon Web Services
 
Safe code CSA cloud final1213
Safe code CSA cloud final1213Safe code CSA cloud final1213
Safe code CSA cloud final1213Giuliano Tavaroli
 
SACON - Automating SecOps (Murray Goldschmidt)
SACON - Automating SecOps (Murray Goldschmidt)SACON - Automating SecOps (Murray Goldschmidt)
SACON - Automating SecOps (Murray Goldschmidt)Priyanka Aash
 
CSA Atlanta Chapter Meeting Q1'2013 and RSA Conference 2013 CSA Announcements
CSA Atlanta Chapter Meeting Q1'2013 and RSA Conference 2013 CSA AnnouncementsCSA Atlanta Chapter Meeting Q1'2013 and RSA Conference 2013 CSA Announcements
CSA Atlanta Chapter Meeting Q1'2013 and RSA Conference 2013 CSA AnnouncementsPhil Agcaoili
 
Tenzin thiley bhutia
Tenzin thiley bhutiaTenzin thiley bhutia
Tenzin thiley bhutiaTenzin Thiley
 
July 31, 2020 - CSA LA event slides
July 31, 2020 - CSA LA event slidesJuly 31, 2020 - CSA LA event slides
July 31, 2020 - CSA LA event slidesSoCalLAAdmin
 
Cisco Connect 2018 Thailand - Cybersecurity strategy an integrated approach k...
Cisco Connect 2018 Thailand - Cybersecurity strategy an integrated approach k...Cisco Connect 2018 Thailand - Cybersecurity strategy an integrated approach k...
Cisco Connect 2018 Thailand - Cybersecurity strategy an integrated approach k...NetworkCollaborators
 
Kaspersky Lab announces specialised cybersecurity solution for industrial sys...
Kaspersky Lab announces specialised cybersecurity solution for industrial sys...Kaspersky Lab announces specialised cybersecurity solution for industrial sys...
Kaspersky Lab announces specialised cybersecurity solution for industrial sys...Vikram Kalkat
 
Beyond S3 Buckets - Effective Countermeasures for Emerging Cloud Threats
Beyond S3 Buckets - Effective Countermeasures for Emerging Cloud ThreatsBeyond S3 Buckets - Effective Countermeasures for Emerging Cloud Threats
Beyond S3 Buckets - Effective Countermeasures for Emerging Cloud ThreatsSBWebinars
 
(SACON) Wasim Halani - OSINT threat hunting
(SACON) Wasim Halani - OSINT threat hunting(SACON) Wasim Halani - OSINT threat hunting
(SACON) Wasim Halani - OSINT threat huntingPriyanka Aash
 

What's hot (20)

Automate and Enhance Application Security Analysis
Automate and Enhance Application Security AnalysisAutomate and Enhance Application Security Analysis
Automate and Enhance Application Security Analysis
 
Greg Brown - Intel Big Data & Cloud Summit 2013
Greg Brown - Intel Big Data & Cloud Summit 2013Greg Brown - Intel Big Data & Cloud Summit 2013
Greg Brown - Intel Big Data & Cloud Summit 2013
 
Introduction to Cloud Security
Introduction to Cloud SecurityIntroduction to Cloud Security
Introduction to Cloud Security
 
Lacework slides from AWS Meetups
Lacework slides from AWS MeetupsLacework slides from AWS Meetups
Lacework slides from AWS Meetups
 
2012 10 cloud security architecture
2012 10 cloud security architecture2012 10 cloud security architecture
2012 10 cloud security architecture
 
Defcon 27 - The Future of Command and Control
Defcon 27 - The Future of Command and ControlDefcon 27 - The Future of Command and Control
Defcon 27 - The Future of Command and Control
 
#ITSitioEnRSA - Presentacion de Jeef Reed de Cisco
#ITSitioEnRSA - Presentacion de Jeef Reed de Cisco #ITSitioEnRSA - Presentacion de Jeef Reed de Cisco
#ITSitioEnRSA - Presentacion de Jeef Reed de Cisco
 
Tomorrow Starts Here - Security Everywhere
Tomorrow Starts Here - Security Everywhere Tomorrow Starts Here - Security Everywhere
Tomorrow Starts Here - Security Everywhere
 
CLOUD SECURITY IN INSURANCE INDUSTRY WITH RESPECT TO INDIAN MARKET
CLOUD SECURITY IN INSURANCE INDUSTRY WITH RESPECT TO INDIAN MARKETCLOUD SECURITY IN INSURANCE INDUSTRY WITH RESPECT TO INDIAN MARKET
CLOUD SECURITY IN INSURANCE INDUSTRY WITH RESPECT TO INDIAN MARKET
 
Winning Strategy For Hybrid Cloud Environments
Winning Strategy For Hybrid Cloud EnvironmentsWinning Strategy For Hybrid Cloud Environments
Winning Strategy For Hybrid Cloud Environments
 
Governance for the Cloud Age - DEM12-R - AWS re:Inforce 2019
 Governance for the Cloud Age - DEM12-R - AWS re:Inforce 2019  Governance for the Cloud Age - DEM12-R - AWS re:Inforce 2019
Governance for the Cloud Age - DEM12-R - AWS re:Inforce 2019
 
Safe code CSA cloud final1213
Safe code CSA cloud final1213Safe code CSA cloud final1213
Safe code CSA cloud final1213
 
SACON - Automating SecOps (Murray Goldschmidt)
SACON - Automating SecOps (Murray Goldschmidt)SACON - Automating SecOps (Murray Goldschmidt)
SACON - Automating SecOps (Murray Goldschmidt)
 
CSA Atlanta Chapter Meeting Q1'2013 and RSA Conference 2013 CSA Announcements
CSA Atlanta Chapter Meeting Q1'2013 and RSA Conference 2013 CSA AnnouncementsCSA Atlanta Chapter Meeting Q1'2013 and RSA Conference 2013 CSA Announcements
CSA Atlanta Chapter Meeting Q1'2013 and RSA Conference 2013 CSA Announcements
 
Tenzin thiley bhutia
Tenzin thiley bhutiaTenzin thiley bhutia
Tenzin thiley bhutia
 
July 31, 2020 - CSA LA event slides
July 31, 2020 - CSA LA event slidesJuly 31, 2020 - CSA LA event slides
July 31, 2020 - CSA LA event slides
 
Cisco Connect 2018 Thailand - Cybersecurity strategy an integrated approach k...
Cisco Connect 2018 Thailand - Cybersecurity strategy an integrated approach k...Cisco Connect 2018 Thailand - Cybersecurity strategy an integrated approach k...
Cisco Connect 2018 Thailand - Cybersecurity strategy an integrated approach k...
 
Kaspersky Lab announces specialised cybersecurity solution for industrial sys...
Kaspersky Lab announces specialised cybersecurity solution for industrial sys...Kaspersky Lab announces specialised cybersecurity solution for industrial sys...
Kaspersky Lab announces specialised cybersecurity solution for industrial sys...
 
Beyond S3 Buckets - Effective Countermeasures for Emerging Cloud Threats
Beyond S3 Buckets - Effective Countermeasures for Emerging Cloud ThreatsBeyond S3 Buckets - Effective Countermeasures for Emerging Cloud Threats
Beyond S3 Buckets - Effective Countermeasures for Emerging Cloud Threats
 
(SACON) Wasim Halani - OSINT threat hunting
(SACON) Wasim Halani - OSINT threat hunting(SACON) Wasim Halani - OSINT threat hunting
(SACON) Wasim Halani - OSINT threat hunting
 

Similar to Opportunities of Cross-Asia Collaboration on Secure Containers & Microservices

Advance security in cloud computing for military weapons
Advance security in cloud computing for military weaponsAdvance security in cloud computing for military weapons
Advance security in cloud computing for military weaponsIRJET Journal
 
System Approach for Single Keyword Search for Encrypted Data Files Guarantees...
System Approach for Single Keyword Search for Encrypted Data Files Guarantees...System Approach for Single Keyword Search for Encrypted Data Files Guarantees...
System Approach for Single Keyword Search for Encrypted Data Files Guarantees...IRJET Journal
 
IRJET- Comparison Among RSA, AES and DES
IRJET-  	  Comparison Among RSA, AES and DESIRJET-  	  Comparison Among RSA, AES and DES
IRJET- Comparison Among RSA, AES and DESIRJET Journal
 
IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...
IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...
IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...IRJET Journal
 
Incredible Compute Density: Cisco DNA Center Platform: Digging Deeper with APIs
Incredible Compute Density: Cisco DNA Center Platform: Digging Deeper with APIsIncredible Compute Density: Cisco DNA Center Platform: Digging Deeper with APIs
Incredible Compute Density: Cisco DNA Center Platform: Digging Deeper with APIsRobb Boyd
 
Assurance of Security and Privacy Requirements for Cloud Deployment Model
Assurance of Security and Privacy Requirements for Cloud Deployment ModelAssurance of Security and Privacy Requirements for Cloud Deployment Model
Assurance of Security and Privacy Requirements for Cloud Deployment ModelIJMTST Journal
 
Introduction to cloud security
Introduction to cloud securityIntroduction to cloud security
Introduction to cloud securityIAEME Publication
 
TUW-ASE Summer 2015: IoT Cloud Systems
TUW-ASE Summer 2015:  IoT Cloud SystemsTUW-ASE Summer 2015:  IoT Cloud Systems
TUW-ASE Summer 2015: IoT Cloud SystemsHong-Linh Truong
 
MESSENGER: ANDROID MESSENGER WITH END TO END ENCRYPTION
MESSENGER: ANDROID MESSENGER WITH END TO END ENCRYPTIONMESSENGER: ANDROID MESSENGER WITH END TO END ENCRYPTION
MESSENGER: ANDROID MESSENGER WITH END TO END ENCRYPTIONIRJET Journal
 
A secure cloud service deployment framework for DevOps
A secure cloud service deployment framework for DevOpsA secure cloud service deployment framework for DevOps
A secure cloud service deployment framework for DevOpsnooriasukmaningtyas
 
IRJET- Efficient and Secure Data Storage in Cloud Computing
IRJET- Efficient and Secure Data Storage in Cloud ComputingIRJET- Efficient and Secure Data Storage in Cloud Computing
IRJET- Efficient and Secure Data Storage in Cloud ComputingIRJET Journal
 
IRJET- Data and Technical Security Issues in Cloud Computing Databases
IRJET- Data and Technical Security Issues in Cloud Computing DatabasesIRJET- Data and Technical Security Issues in Cloud Computing Databases
IRJET- Data and Technical Security Issues in Cloud Computing DatabasesIRJET Journal
 
Review on Security Aspects for Cloud Architecture
Review on Security Aspects for Cloud Architecture Review on Security Aspects for Cloud Architecture
Review on Security Aspects for Cloud Architecture IJECEIAES
 
IRJET- Execution of Privacy - Preserving Multi-Keyword Positioned Search Over...
IRJET- Execution of Privacy - Preserving Multi-Keyword Positioned Search Over...IRJET- Execution of Privacy - Preserving Multi-Keyword Positioned Search Over...
IRJET- Execution of Privacy - Preserving Multi-Keyword Positioned Search Over...IRJET Journal
 
Cloud Computing: Its Applications and Security Issues (A Major Challenge in C...
Cloud Computing: Its Applications and Security Issues (A Major Challenge in C...Cloud Computing: Its Applications and Security Issues (A Major Challenge in C...
Cloud Computing: Its Applications and Security Issues (A Major Challenge in C...IRJET Journal
 
Control on Remote Sensing Network using Cloud Computing Services
Control on Remote Sensing Network using Cloud Computing ServicesControl on Remote Sensing Network using Cloud Computing Services
Control on Remote Sensing Network using Cloud Computing ServicesIRJET Journal
 
An efficient and secure data storage in cloud computing using modified RSA pu...
An efficient and secure data storage in cloud computing using modified RSA pu...An efficient and secure data storage in cloud computing using modified RSA pu...
An efficient and secure data storage in cloud computing using modified RSA pu...IJECEIAES
 
Automatized Application Services for Android Devices Using Apache Ant in Clou...
Automatized Application Services for Android Devices Using Apache Ant in Clou...Automatized Application Services for Android Devices Using Apache Ant in Clou...
Automatized Application Services for Android Devices Using Apache Ant in Clou...IRJET Journal
 
Horizontal Requirement Engineering in Integration of Multiple IoT Use Cases o...
Horizontal Requirement Engineering in Integration of Multiple IoT Use Cases o...Horizontal Requirement Engineering in Integration of Multiple IoT Use Cases o...
Horizontal Requirement Engineering in Integration of Multiple IoT Use Cases o...Toshihiko Yamakami
 

Similar to Opportunities of Cross-Asia Collaboration on Secure Containers & Microservices (20)

Advance security in cloud computing for military weapons
Advance security in cloud computing for military weaponsAdvance security in cloud computing for military weapons
Advance security in cloud computing for military weapons
 
System Approach for Single Keyword Search for Encrypted Data Files Guarantees...
System Approach for Single Keyword Search for Encrypted Data Files Guarantees...System Approach for Single Keyword Search for Encrypted Data Files Guarantees...
System Approach for Single Keyword Search for Encrypted Data Files Guarantees...
 
IRJET- Comparison Among RSA, AES and DES
IRJET-  	  Comparison Among RSA, AES and DESIRJET-  	  Comparison Among RSA, AES and DES
IRJET- Comparison Among RSA, AES and DES
 
IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...
IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...
IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...
 
Incredible Compute Density: Cisco DNA Center Platform: Digging Deeper with APIs
Incredible Compute Density: Cisco DNA Center Platform: Digging Deeper with APIsIncredible Compute Density: Cisco DNA Center Platform: Digging Deeper with APIs
Incredible Compute Density: Cisco DNA Center Platform: Digging Deeper with APIs
 
Assurance of Security and Privacy Requirements for Cloud Deployment Model
Assurance of Security and Privacy Requirements for Cloud Deployment ModelAssurance of Security and Privacy Requirements for Cloud Deployment Model
Assurance of Security and Privacy Requirements for Cloud Deployment Model
 
Introduction to cloud security
Introduction to cloud securityIntroduction to cloud security
Introduction to cloud security
 
TUW-ASE Summer 2015: IoT Cloud Systems
TUW-ASE Summer 2015:  IoT Cloud SystemsTUW-ASE Summer 2015:  IoT Cloud Systems
TUW-ASE Summer 2015: IoT Cloud Systems
 
MESSENGER: ANDROID MESSENGER WITH END TO END ENCRYPTION
MESSENGER: ANDROID MESSENGER WITH END TO END ENCRYPTIONMESSENGER: ANDROID MESSENGER WITH END TO END ENCRYPTION
MESSENGER: ANDROID MESSENGER WITH END TO END ENCRYPTION
 
A secure cloud service deployment framework for DevOps
A secure cloud service deployment framework for DevOpsA secure cloud service deployment framework for DevOps
A secure cloud service deployment framework for DevOps
 
IRJET- Efficient and Secure Data Storage in Cloud Computing
IRJET- Efficient and Secure Data Storage in Cloud ComputingIRJET- Efficient and Secure Data Storage in Cloud Computing
IRJET- Efficient and Secure Data Storage in Cloud Computing
 
Dagiuklas collaborate 2019
Dagiuklas collaborate 2019Dagiuklas collaborate 2019
Dagiuklas collaborate 2019
 
IRJET- Data and Technical Security Issues in Cloud Computing Databases
IRJET- Data and Technical Security Issues in Cloud Computing DatabasesIRJET- Data and Technical Security Issues in Cloud Computing Databases
IRJET- Data and Technical Security Issues in Cloud Computing Databases
 
Review on Security Aspects for Cloud Architecture
Review on Security Aspects for Cloud Architecture Review on Security Aspects for Cloud Architecture
Review on Security Aspects for Cloud Architecture
 
IRJET- Execution of Privacy - Preserving Multi-Keyword Positioned Search Over...
IRJET- Execution of Privacy - Preserving Multi-Keyword Positioned Search Over...IRJET- Execution of Privacy - Preserving Multi-Keyword Positioned Search Over...
IRJET- Execution of Privacy - Preserving Multi-Keyword Positioned Search Over...
 
Cloud Computing: Its Applications and Security Issues (A Major Challenge in C...
Cloud Computing: Its Applications and Security Issues (A Major Challenge in C...Cloud Computing: Its Applications and Security Issues (A Major Challenge in C...
Cloud Computing: Its Applications and Security Issues (A Major Challenge in C...
 
Control on Remote Sensing Network using Cloud Computing Services
Control on Remote Sensing Network using Cloud Computing ServicesControl on Remote Sensing Network using Cloud Computing Services
Control on Remote Sensing Network using Cloud Computing Services
 
An efficient and secure data storage in cloud computing using modified RSA pu...
An efficient and secure data storage in cloud computing using modified RSA pu...An efficient and secure data storage in cloud computing using modified RSA pu...
An efficient and secure data storage in cloud computing using modified RSA pu...
 
Automatized Application Services for Android Devices Using Apache Ant in Clou...
Automatized Application Services for Android Devices Using Apache Ant in Clou...Automatized Application Services for Android Devices Using Apache Ant in Clou...
Automatized Application Services for Android Devices Using Apache Ant in Clou...
 
Horizontal Requirement Engineering in Integration of Multiple IoT Use Cases o...
Horizontal Requirement Engineering in Integration of Multiple IoT Use Cases o...Horizontal Requirement Engineering in Integration of Multiple IoT Use Cases o...
Horizontal Requirement Engineering in Integration of Multiple IoT Use Cases o...
 

More from Eiji Sasahara, Ph.D., MBA 笹原英司

米国大統領令を起点とする医療機器のゼロトラストとSBOM
米国大統領令を起点とする医療機器のゼロトラストとSBOM米国大統領令を起点とする医療機器のゼロトラストとSBOM
米国大統領令を起点とする医療機器のゼロトラストとSBOMEiji Sasahara, Ph.D., MBA 笹原英司
 
SDGs達成に向けたデジタルヘルスを支えるクラウドネイティブセキュリティ
SDGs達成に向けたデジタルヘルスを支えるクラウドネイティブセキュリティSDGs達成に向けたデジタルヘルスを支えるクラウドネイティブセキュリティ
SDGs達成に向けたデジタルヘルスを支えるクラウドネイティブセキュリティEiji Sasahara, Ph.D., MBA 笹原英司
 
ロボット支援手術(RAS)システムの脅威モデリング ~医療ロボットから自動車への横展開~
ロボット支援手術(RAS)システムの脅威モデリング ~医療ロボットから自動車への横展開~ロボット支援手術(RAS)システムの脅威モデリング ~医療ロボットから自動車への横展開~
ロボット支援手術(RAS)システムの脅威モデリング ~医療ロボットから自動車への横展開~Eiji Sasahara, Ph.D., MBA 笹原英司
 
ゲノムデータのサイバーセキュリティとアクセス制御
ゲノムデータのサイバーセキュリティとアクセス制御ゲノムデータのサイバーセキュリティとアクセス制御
ゲノムデータのサイバーセキュリティとアクセス制御Eiji Sasahara, Ph.D., MBA 笹原英司
 
プライバシーエンジニアリング技術標準化の欧米比較
プライバシーエンジニアリング技術標準化の欧米比較プライバシーエンジニアリング技術標準化の欧米比較
プライバシーエンジニアリング技術標準化の欧米比較Eiji Sasahara, Ph.D., MBA 笹原英司
 
バイオ/医療サプライチェーンのサイバーセキュリティリスク管理
バイオ/医療サプライチェーンのサイバーセキュリティリスク管理バイオ/医療サプライチェーンのサイバーセキュリティリスク管理
バイオ/医療サプライチェーンのサイバーセキュリティリスク管理Eiji Sasahara, Ph.D., MBA 笹原英司
 
最新事例に学ぶクラウドネイティブな医療AIのセキュリティ
最新事例に学ぶクラウドネイティブな医療AIのセキュリティ最新事例に学ぶクラウドネイティブな医療AIのセキュリティ
最新事例に学ぶクラウドネイティブな医療AIのセキュリティEiji Sasahara, Ph.D., MBA 笹原英司
 
Landscape of Cloud-Driven Digital Health Platform Market in Japan 2023
Landscape of Cloud-Driven Digital Health Platform Market in Japan 2023Landscape of Cloud-Driven Digital Health Platform Market in Japan 2023
Landscape of Cloud-Driven Digital Health Platform Market in Japan 2023Eiji Sasahara, Ph.D., MBA 笹原英司
 
バイオエコノミー産業の サイバーセキュリティ最新動向
バイオエコノミー産業の サイバーセキュリティ最新動向バイオエコノミー産業の サイバーセキュリティ最新動向
バイオエコノミー産業の サイバーセキュリティ最新動向Eiji Sasahara, Ph.D., MBA 笹原英司
 
[ハードウェア編] クラウドネイティブアーキテクチャとIoTセキュリティ・バイ・デザイン
[ハードウェア編] クラウドネイティブアーキテクチャとIoTセキュリティ・バイ・デザイン[ハードウェア編] クラウドネイティブアーキテクチャとIoTセキュリティ・バイ・デザイン
[ハードウェア編] クラウドネイティブアーキテクチャとIoTセキュリティ・バイ・デザインEiji Sasahara, Ph.D., MBA 笹原英司
 
「NISTIR 8320B ハードウェア対応セキュリティ:信頼されたコンテナプラットフォームにおけるポリシーベースのガバナンス」概説
「NISTIR 8320B ハードウェア対応セキュリティ:信頼されたコンテナプラットフォームにおけるポリシーベースのガバナンス」概説「NISTIR 8320B ハードウェア対応セキュリティ:信頼されたコンテナプラットフォームにおけるポリシーベースのガバナンス」概説
「NISTIR 8320B ハードウェア対応セキュリティ:信頼されたコンテナプラットフォームにおけるポリシーベースのガバナンス」概説Eiji Sasahara, Ph.D., MBA 笹原英司
 
「NIST SP 800-204C サービスメッシュを利用したマイクロサービスベースのアプリケーション向けDevSecOpsの展開」概説
「NIST SP 800-204C  サービスメッシュを利用したマイクロサービスベースのアプリケーション向けDevSecOpsの展開」概説「NIST SP 800-204C  サービスメッシュを利用したマイクロサービスベースのアプリケーション向けDevSecOpsの展開」概説
「NIST SP 800-204C サービスメッシュを利用したマイクロサービスベースのアプリケーション向けDevSecOpsの展開」概説Eiji Sasahara, Ph.D., MBA 笹原英司
 
情報プラットフォーム構築に必要なこと~欧州のユースケースに学ぶ医療・介護・健康情報連携基盤~
情報プラットフォーム構築に必要なこと~欧州のユースケースに学ぶ医療・介護・健康情報連携基盤~情報プラットフォーム構築に必要なこと~欧州のユースケースに学ぶ医療・介護・健康情報連携基盤~
情報プラットフォーム構築に必要なこと~欧州のユースケースに学ぶ医療・介護・健康情報連携基盤~Eiji Sasahara, Ph.D., MBA 笹原英司
 
セキュアなサーバーレスアーキテクチャ設計手法の概説 (v0)
セキュアなサーバーレスアーキテクチャ設計手法の概説 (v0)セキュアなサーバーレスアーキテクチャ設計手法の概説 (v0)
セキュアなサーバーレスアーキテクチャ設計手法の概説 (v0)Eiji Sasahara, Ph.D., MBA 笹原英司
 

More from Eiji Sasahara, Ph.D., MBA 笹原英司 (20)

Metaverse and NFTs on the Healthcare Cloud
Metaverse and NFTs on the Healthcare CloudMetaverse and NFTs on the Healthcare Cloud
Metaverse and NFTs on the Healthcare Cloud
 
米国大統領令を起点とする医療機器のゼロトラストとSBOM
米国大統領令を起点とする医療機器のゼロトラストとSBOM米国大統領令を起点とする医療機器のゼロトラストとSBOM
米国大統領令を起点とする医療機器のゼロトラストとSBOM
 
SDGs達成に向けたデジタルヘルスを支えるクラウドネイティブセキュリティ
SDGs達成に向けたデジタルヘルスを支えるクラウドネイティブセキュリティSDGs達成に向けたデジタルヘルスを支えるクラウドネイティブセキュリティ
SDGs達成に向けたデジタルヘルスを支えるクラウドネイティブセキュリティ
 
ロボット支援手術(RAS)システムの脅威モデリング ~医療ロボットから自動車への横展開~
ロボット支援手術(RAS)システムの脅威モデリング ~医療ロボットから自動車への横展開~ロボット支援手術(RAS)システムの脅威モデリング ~医療ロボットから自動車への横展開~
ロボット支援手術(RAS)システムの脅威モデリング ~医療ロボットから自動車への横展開~
 
ゲノムデータのサイバーセキュリティとアクセス制御
ゲノムデータのサイバーセキュリティとアクセス制御ゲノムデータのサイバーセキュリティとアクセス制御
ゲノムデータのサイバーセキュリティとアクセス制御
 
プライバシーエンジニアリング技術標準化の欧米比較
プライバシーエンジニアリング技術標準化の欧米比較プライバシーエンジニアリング技術標準化の欧米比較
プライバシーエンジニアリング技術標準化の欧米比較
 
医療におけるサードパーティベンダーリスク管理
医療におけるサードパーティベンダーリスク管理医療におけるサードパーティベンダーリスク管理
医療におけるサードパーティベンダーリスク管理
 
バイオ/医療サプライチェーンのサイバーセキュリティリスク管理
バイオ/医療サプライチェーンのサイバーセキュリティリスク管理バイオ/医療サプライチェーンのサイバーセキュリティリスク管理
バイオ/医療サプライチェーンのサイバーセキュリティリスク管理
 
最新事例に学ぶクラウドネイティブな医療AIのセキュリティ
最新事例に学ぶクラウドネイティブな医療AIのセキュリティ最新事例に学ぶクラウドネイティブな医療AIのセキュリティ
最新事例に学ぶクラウドネイティブな医療AIのセキュリティ
 
医療クラウドにおけるランサムウェア攻撃予防対策
医療クラウドにおけるランサムウェア攻撃予防対策医療クラウドにおけるランサムウェア攻撃予防対策
医療クラウドにおけるランサムウェア攻撃予防対策
 
遠隔医療のクラウド利用とリスク管理
遠隔医療のクラウド利用とリスク管理遠隔医療のクラウド利用とリスク管理
遠隔医療のクラウド利用とリスク管理
 
Landscape of Cloud-Driven Digital Health Platform Market in Japan 2023
Landscape of Cloud-Driven Digital Health Platform Market in Japan 2023Landscape of Cloud-Driven Digital Health Platform Market in Japan 2023
Landscape of Cloud-Driven Digital Health Platform Market in Japan 2023
 
バイオエコノミー産業の サイバーセキュリティ最新動向
バイオエコノミー産業の サイバーセキュリティ最新動向バイオエコノミー産業の サイバーセキュリティ最新動向
バイオエコノミー産業の サイバーセキュリティ最新動向
 
[ハードウェア編] クラウドネイティブアーキテクチャとIoTセキュリティ・バイ・デザイン
[ハードウェア編] クラウドネイティブアーキテクチャとIoTセキュリティ・バイ・デザイン[ハードウェア編] クラウドネイティブアーキテクチャとIoTセキュリティ・バイ・デザイン
[ハードウェア編] クラウドネイティブアーキテクチャとIoTセキュリティ・バイ・デザイン
 
Cloud-Native Security on Digital Health-Telehealth Use Case
Cloud-Native Security on Digital Health-Telehealth Use CaseCloud-Native Security on Digital Health-Telehealth Use Case
Cloud-Native Security on Digital Health-Telehealth Use Case
 
「NISTIR 8320B ハードウェア対応セキュリティ:信頼されたコンテナプラットフォームにおけるポリシーベースのガバナンス」概説
「NISTIR 8320B ハードウェア対応セキュリティ:信頼されたコンテナプラットフォームにおけるポリシーベースのガバナンス」概説「NISTIR 8320B ハードウェア対応セキュリティ:信頼されたコンテナプラットフォームにおけるポリシーベースのガバナンス」概説
「NISTIR 8320B ハードウェア対応セキュリティ:信頼されたコンテナプラットフォームにおけるポリシーベースのガバナンス」概説
 
「NIST SP 800-204C サービスメッシュを利用したマイクロサービスベースのアプリケーション向けDevSecOpsの展開」概説
「NIST SP 800-204C  サービスメッシュを利用したマイクロサービスベースのアプリケーション向けDevSecOpsの展開」概説「NIST SP 800-204C  サービスメッシュを利用したマイクロサービスベースのアプリケーション向けDevSecOpsの展開」概説
「NIST SP 800-204C サービスメッシュを利用したマイクロサービスベースのアプリケーション向けDevSecOpsの展開」概説
 
情報プラットフォーム構築に必要なこと~欧州のユースケースに学ぶ医療・介護・健康情報連携基盤~
情報プラットフォーム構築に必要なこと~欧州のユースケースに学ぶ医療・介護・健康情報連携基盤~情報プラットフォーム構築に必要なこと~欧州のユースケースに学ぶ医療・介護・健康情報連携基盤~
情報プラットフォーム構築に必要なこと~欧州のユースケースに学ぶ医療・介護・健康情報連携基盤~
 
医療におけるブロックチェーン利用
医療におけるブロックチェーン利用医療におけるブロックチェーン利用
医療におけるブロックチェーン利用
 
セキュアなサーバーレスアーキテクチャ設計手法の概説 (v0)
セキュアなサーバーレスアーキテクチャ設計手法の概説 (v0)セキュアなサーバーレスアーキテクチャ設計手法の概説 (v0)
セキュアなサーバーレスアーキテクチャ設計手法の概説 (v0)
 

Recently uploaded

ERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctBrainSell Technologies
 
TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024Stephen Perrenod
 
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The InsideCollecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The InsideStefan Dietze
 
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...FIDO Alliance
 
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...ScyllaDB
 
Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxFIDO Alliance
 
2024 May Patch Tuesday
2024 May Patch Tuesday2024 May Patch Tuesday
2024 May Patch TuesdayIvanti
 
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPTiSEO AI
 
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...panagenda
 
Structuring Teams and Portfolios for Success
Structuring Teams and Portfolios for SuccessStructuring Teams and Portfolios for Success
Structuring Teams and Portfolios for SuccessUXDXConf
 
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...FIDO Alliance
 
ADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxFIDO Alliance
 
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...marcuskenyatta275
 
Design Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxDesign Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxFIDO Alliance
 
Using IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & IrelandUsing IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & IrelandIES VE
 
State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!Memoori
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfSrushith Repakula
 
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...FIDO Alliance
 
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdfThe Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdfFIDO Alliance
 

Recently uploaded (20)

ERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage Intacct
 
TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024
 
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The InsideCollecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
 
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
 
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
 
Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptx
 
2024 May Patch Tuesday
2024 May Patch Tuesday2024 May Patch Tuesday
2024 May Patch Tuesday
 
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT
 
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
 
Structuring Teams and Portfolios for Success
Structuring Teams and Portfolios for SuccessStructuring Teams and Portfolios for Success
Structuring Teams and Portfolios for Success
 
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
 
ADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptx
 
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
 
Design Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxDesign Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptx
 
Overview of Hyperledger Foundation
Overview of Hyperledger FoundationOverview of Hyperledger Foundation
Overview of Hyperledger Foundation
 
Using IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & IrelandUsing IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & Ireland
 
State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdf
 
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
 
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdfThe Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
 

Opportunities of Cross-Asia Collaboration on Secure Containers & Microservices

  • 1. https://www.cloudsecurityalliance.jp/Copyright © 2017 Cloud Security Alliance Japan Chapter Eiji Sasahara, Ph.D., MBA Cloud Security Alliance Japan Chapter – Kansai Region Opportunities of Cross-Asia Collaboration on Secure Containers & Microservices 14th September, 2019
  • 2. https://www.cloudsecurityalliance.jp/Copyright © 2017 Cloud Security Alliance Japan Chapter 2 1. Introduction of Cloud Security Alliance Japan Chapter – Kansai Region 2. Utilization of Secure Application Containers 3. Utilization of Secure Microservices 4. Opportunities of Cross-Asia Collaboration on Secure Containers & Microservices
  • 3. https://www.cloudsecurityalliance.jp/Copyright © 2017 Cloud Security Alliance Japan Chapter 3 1. Introduction of Cloud Security Alliance Japan Chapter – Kansai Region
  • 4. https://www.cloudsecurityalliance.jp/Copyright © 2017 Cloud Security Alliance Japan Chapter 4 Cloud Security Alliance Japan Chapter # of local members(as of May 31, 2019) • Corp: 34 companies • Individual: 132 people Cloud Security Alliance Japan Chapter –Kansai Region Officially Established in June 1, 2019 Kick-off seminar on July 11, 2019 • Key Note by the Ministry of Economy, Trade and Industry Regional WGs, including Application Containers & Microservices WG, SLA Innovation WG, and Health WG
  • 5. https://www.cloudsecurityalliance.jp/Copyright © 2017 Cloud Security Alliance Japan Chapter 5 Japan-India Talent Development and Exchange Initiative @CSA Japan – Kansai Region Co-Chairs: Eiji Sasahara, Jin Arita Encouraging international talent development and exchange activities between CSA Japan Chapter Health Information Management (HIM) User WG/SLA Innovation WG/Application Containers & Microservices (ACM) WG and CSA Regional Chapters in India. Actively collaborating with relevant stakeholder communities (i.e. universities & educational institutions, research institutes, industry associations, cluster collaboration platform, and regional government agencies) inside/outside Japan on Japan-India talent development and exchange activities in the fields of health/wellness, cloud SLA and containers/microservices security.
  • 6. https://www.cloudsecurityalliance.jp/Copyright © 2017 Cloud Security Alliance Japan Chapter 6 Perspectives to Attract Non-Japanese Enterprises in Kansai, including Kyoto, Kobe and Osaka
  • 7. https://www.cloudsecurityalliance.jp/Copyright © 2017 Cloud Security Alliance Japan Chapter 7 2. Utilization of Secure Application Containers 2-1. Use Case of Application Containers: Industry 4.0 2-2. Security Standards for Application Containers
  • 8. https://www.cloudsecurityalliance.jp/Copyright © 2017 Cloud Security Alliance Japan Chapter 8 Tim Bayer et al. “A Fog-Cloud Computing Infrastructure for Condition Monitoring and Distributing Industry 4.0 Services”(May 2-4, 2019) https://opus.hs-furtwangen.de/frontdoor/index/index/docId/5418 Architecture & Containerization Infrastructure Services. Kubernetes Master. Kubernetes Nodes. Networking and Communication Source: Tim Bayer et al. “A Fog-Cloud Computing Infrastructure for Condition Monitoring and Distributing Industry 4.0 Services”(May 2-4, 2019)
  • 9. https://www.cloudsecurityalliance.jp/Copyright © 2017 Cloud Security Alliance Japan Chapter 9 Requirements for Architecture Source: Tim Bayer et al. “A Fog-Cloud Computing Infrastructure for Condition Monitoring and Distributing Industry 4.0 Services”(May 2-4, 2019) Items Requirements Develop a Industry 4.0 Service R1: Support distributed data processing tasks between Cloud and Fog nodes R2: Provide all required functionalities to provide suitable node management, inter-node communication, and task execution Integrating Measurement Probes R3: Determine node conditions by integrating and deploying measurement probes on the nodes R4: Provide support for centralized and decentralized measurement probes R5: Provide a uniform way to execute the measurement probes and services on all nodes regardless of the actual technology they use R6: Provide a consistent execution environment that is suitable to migrate measurement probes and services during runtime Integrate Distribution Algorithms R7: Integration of distribution algorithms that make use of the measurement results to deploy an application service accordingly R8: Provide a common interface to apply and configure different distribution algorithms
  • 10. https://www.cloudsecurityalliance.jp/Copyright © 2017 Cloud Security Alliance Japan Chapter 10 Architecture Overview: Management Layer Worker Layer Source: Tim Bayer et al. “A Fog-Cloud Computing Infrastructure for Condition Monitoring and Distributing Industry 4.0 Services”(May 2-4, 2019)
  • 11. https://www.cloudsecurityalliance.jp/Copyright © 2017 Cloud Security Alliance Japan Chapter 11 Application Example: Source: Tim Bayer et al. “A Fog-Cloud Computing Infrastructure for Condition Monitoring and Distributing Industry 4.0 Services”(May 2-4, 2019)
  • 12. https://www.cloudsecurityalliance.jp/Copyright © 2017 Cloud Security Alliance Japan Chapter 12 National Institute of Standards and Technology (NIST), “SP 800-190: Application Container Security Guide” (September 25, 2017) https://csrc.nist.gov/publications/detail/sp/800-190/final Container Technology Architecture Tiers and Components Source: NIST , “SP 800-190: Application Container Security Guide” (September 25, 2017)
  • 13. https://www.cloudsecurityalliance.jp/Copyright © 2017 Cloud Security Alliance Japan Chapter 13 Major Risks for Core Components of Container Technologies(1) Source: NIST , “SP 800-190: Application Container Security Guide” (September 25, 2017) Component Risk Image Image vulnerabilities Image configuration defects Embedded malware Embedded clear text secrets Use of untrusted images Registry Insecure connections to registries Stale images in registries Insufficient authentication and authorization restrictions Orchestrator Unbounded administrative access Unauthorized access Poorly separated inter-container network traffic Mixing of workload sensitivity levels Orchestrator node trust
  • 14. https://www.cloudsecurityalliance.jp/Copyright © 2017 Cloud Security Alliance Japan Chapter 14 Major Risks for Core Components of Container Technologies(2) Source: NIST , “SP 800-190: Application Container Security Guide” (September 25, 2017) Component Risk Container Vulnerabilities within the runtime software Unbounded network access from containers Insecure container runtime configurations App vulnerabilities Rogue containers Host OS Large attack surface Shared kernel Host OS component vulnerabilities Improper user access rights Host OS file system tampering
  • 15. https://www.cloudsecurityalliance.jp/Copyright © 2017 Cloud Security Alliance Japan Chapter 15 3. Utilization of Microservices and Security 3-1. Use Case of Microservices: Connected Cars 3-2. Security Standards for Microservices
  • 16. https://www.cloudsecurityalliance.jp/Copyright © 2017 Cloud Security Alliance Japan Chapter 16 Salman Taherizadeh et al. “A Capillary Computing Architecture for Dynamic Internet of Things: Orchestration of Microservices from Edge Devices to Fog and Cloud Providers.” https://www.ncbi.nlm.nih.gov/pmc/articles/PMC6164252/ Applications structure of monolithic versus Microservices architecture. Source: Sensors (Basel). 2018 Sep 4;18(9). pii: E2938. doi: 10.3390/s18092938.
  • 17. https://www.cloudsecurityalliance.jp/Copyright © 2017 Cloud Security Alliance Japan Chapter 17 Onloading or offloading Microservices between different layers (Edge, Fog and Cloud) in the proposed capillary distributed computing architecture. Source: Sensors (Basel). 2018 Sep 4;18(9). pii: E2938. doi: 10.3390/s18092938. Cloud Layer Fog Layer Edge Layer
  • 18. https://www.cloudsecurityalliance.jp/Copyright © 2017 Cloud Security Alliance Japan Chapter 18 The proposed capillary distributed computing architecture for smart IoT applications. Source: Sensors (Basel). 2018 Sep 4;18(9). pii: E2938. doi: 10.3390/s18092938.
  • 19. https://www.cloudsecurityalliance.jp/Copyright © 2017 Cloud Security Alliance Japan Chapter 19 Motorhome Artificial Intelligence Communication Hardware(MACH) Edge node developed in one of our ongoing projects called OPTIMUM is settled in the vehicle. Source: Sensors (Basel). 2018 Sep 4;18(9). pii: E2938. doi: 10.3390/s18092938.
  • 20. https://www.cloudsecurityalliance.jp/Copyright © 2017 Cloud Security Alliance Japan Chapter 20 Node Selection Rank (NSR) values offered by two Fog nodes in a specific part of the trip. Source: Sensors (Basel). 2018 Sep 4;18(9). pii: E2938. doi: 10.3390/s18092938.
  • 21. https://www.cloudsecurityalliance.jp/Copyright © 2017 Cloud Security Alliance Japan Chapter 21 National Institute of Standards and Technology (NIST), “SP 800-204: Security Strategies for Microservices- based Application Systems” (August 7, 2019) https://www.nist.gov/publications/security-strategies-microservices-based-application-systems Monolithic Architecture Vs. Microservices Architecture Source: NIST , “SP 800-204: Security Strategies for Microservices-based Application Systems ” (August 7, 2019)
  • 22. https://www.cloudsecurityalliance.jp/Copyright © 2017 Cloud Security Alliance Japan Chapter 22 Security strategies for the design and deployment of microservices-based application systems Source: NIST , “SP 800-204: Security Strategies for Microservices-based Application Systems ” (August 7, 2019) Threats Security Strategies Identity and access management -Authentication (MS-SS-1) -Access Management (MS-SS-2) Service Discovery Mechanism -Service Registry Configuration (MS-SS-3) Secure Communication Protocols -Secure Communication (MS-SS-4) Security Monitoring -Security Monitoring (MS-SS-5) Circuit Breaker implementation -Implementing Circuit Breakers (MS-SS-6) Load Balancing -Load Balancing(MS-SS-7) Rate Limiting (Throttling) -Late Limiting(MS-SS-8)
  • 23. https://www.cloudsecurityalliance.jp/Copyright © 2017 Cloud Security Alliance Japan Chapter 23 Security strategies for the design and deployment of microservices-based application systems (Continue.) Source: NIST , “SP 800-204: Security Strategies for Microservices-based Application Systems ” (August 7, 2019) Threats Security Strategies Integrity Assurance -Induction of New Versions of Microservices (MS-SS-9) -Handling Session Persistence (MS-SS-10) Countering Internet-based Attacks -Preventing Credential Abuse and Stuffing Attacks (MS-SS-11) Architectural Frameworks in Microservices -API Gateway Implementation (MS-SS-12) -Service Mesh Implementation (MS-SS-13)
  • 24. https://www.cloudsecurityalliance.jp/Copyright © 2017 Cloud Security Alliance Japan Chapter 24 4. Opportunities of Cross-Asia Collaboration on Secure Containers & Microservices
  • 25. https://www.cloudsecurityalliance.jp/Copyright © 2017 Cloud Security Alliance Japan Chapter 25 Source:Cabinet Office, Government of Japan, “Society 5.0” (https://www8.cao.go.jp/cstp/english/society5_0/index.html) “Society 5.0” Initiative by the Japanese Government “Cloud by Default” Principle
  • 26. https://www.cloudsecurityalliance.jp/Copyright © 2017 Cloud Security Alliance Japan Chapter 26 Source: IT Strategic Headquarters, “Declaration to Be the World’s Most Advanced IT Nation Basic Plan for the Advancement of Public and Private Sector Data Utilization “ (May, 2017) “Cloud by Default” Principle Cloud-native Tech for Integrated Medical Care & Nursing Care, Anytime &Anywhere
  • 27. https://www.cloudsecurityalliance.jp/Copyright © 2017 Cloud Security Alliance Japan Chapter 27 Why don’t you join CSA’s Application Containers & Microservices WG from APAC? (https://cloudsecurityalliance.org/research/working-groups/containerization/)
  • 28. https://www.cloudsecurityalliance.jp/Copyright © 2017 Cloud Security Alliance Japan Chapter 28 https://www.linkedin.com/in/esasahara https://www.facebook.com/esasahara https://twitter.com/esasahara Cloud Security Alliance Japan Chapter http://www.cloudsecurityalliance.jp/