SlideShare a Scribd company logo
Securing the Telco Cloud
June 2017
Ng Hwee Ming Abhilash S V
Principal Technologist Cloud Solution Architect, Red Hat
APAC Office of Technology, Red Hat
THE CHANGING LANDSCAPENETWORK
SONET/TDM
WIREDWIRELESS
Gig-E
IPv6
IP
5G
NFV
WiFi/WiMax
Video
SDN
Hosted&
managed
Longdistance
(IXC)
Local(LEC)
Data(LECorIXC)
Video(MSO)
Security Storage
Voice Music Payments
Video Gaming
HYBRID CLOUD ENVIRONMENT
APPLICATIONSDEVICES
Handset/RJ45/Modem
CELL PHONESMARTPHONE PC/TABLET IoT/M2M
OLD LANDSCAPE
NEW LANDSCAPE
TELCO CLOUD SERVICES - PATHWAY TO NEW SERVICES
Enterprise
Telco Cloud
IaaS / PAAS
Branch Office
vCPE
Business Network
Services
V-EPC
GiLan
Cloud RAN / vRAN
MPN
Mobile Private
Network (MPN)
Media &
Gaming
Services
vCDN
IoT
SD-WAN
SD-WAN
SD-WAN
Internet
Mobile
Users
Devices
- NFV & SDN are disrupting the way telecom networks are going to be
built and managed becoming the foundation of modern networking
- Virtualization & Cloudification are key technologies to enable NFV
- Sharing resources is a major concern for security
- Cybersecurity national agencies want to define guidelines to ensure this
new foundation is secure before allowing mass roll-out of sensible
network functions e.g. Lawful Intercept capable VNFs
- NFV & SDN can also be a way to mitigate more efficiently security threats
- Bottom line is that security can slow down or even block NFV deployment
TELCO CLOUD INFRASTRUCTURE - RISKS
RISKS
POLICY
RISKS
GENERAL
RISKS
VIRTUALIZATION
RISKS
NON-CLOUD
SPECIFIC
RISKS
CLOUD
SPECIFIC
RISKS
LEGAL
RISKS
WHO IS LOOKING AT IT ? THE MAJOR NFV SECURITY
STAKEHOLDERS
FRAMEWORKS FOR CLOUD COMPUTING
• ISO/IEC 27017:2015 Information Technology-Security Techniques-Code of
Practice for Information Security Controls Based on ISO/IEC 27002 for Cloud
Services
• Organization for Economic Cooperation and Development-Privacy and Security
Guidelines
• Asia-Pacific Economic Cooperation Privacy Framework
• EU Data Protection Directive
BUILD CLOUD WITH SECURITY STANDARDS
• ISO/IEC 27001:2013
• ISO/IEC 27002:2013
• ISO/IEC 27017:2015
• SOC 1/SOC 2/SOC 3
• NIST SP 800-53
• PCI DSS
KEY SECURE CLOUD DESIGN PRINCIPLES
Protections to enable trust
Cross Platform Capabilities
Access, Administration,
Resiliency
Delegate or Federated Access
Secure and Ease of Access &
Adoption
Identification, Authentication,
Authorization, Administration,
Auditability
Elastic, Flexible, and Resilient,
supporting multitenant platforms
Multi level protection- Network, OS,
Application Security
1
2
3
4
5
6
8
7
CLOUD SECURITY - A LAYERED APPROACH - WHY ?
• Multitenancy
• Loss of Control
• Network Topology
• Logical Network Segmentation
• No physical endpoints
• Single Point of Access
PERIMETER NETWORK
PHYSICAL RESOURCES
HYPERVISOR
TENANT NETWORK
HOST OS
APPLICATION
DATA
CLOUD SECURITY - A LAYERED APPROACH -
INFRASTRUCTURE
• Infrastructure Layer
• VM attacks, Virtual network, Hypervisor attacks, VM-based rootkits
• Virtual switch attacks
• DoS attacks, Colocation
• Insecure Interfaces and APIs
• Denial of Service
CLOUD SECURITY - A LAYERED APPROACH -
APPLICATION PLATFORM
• System and resource isolation
• User level permissions
• User access management
• Protection against Malware, Backdoors and Trojans
CLOUD SECURITY - A LAYERED APPROACH -
SOFTWARE
• Data segregation
• Data Access and Policies
OWASP Top 10 Security Threats
• A1- Injection
• A2- Broken Authentication and Session Management
• A3- Cross-site Scripting(XSS)
• A4- Insecure Direct Object References
• A5- Security Misconfiguration
• A6- Sensitive Data Exposure
• A7- Missing Function Level Access Control
• A8-Cross-Site Request Forgery
• A9- Using Components with Known Vulnerabilities
• A10- Unvalidated Redirects and Forwards
COMMON PITFALLS - CLOUD SECURITY APPLICATION DEPLOYMENT
• On-Premises Does Not Always Transfer(and Vice Versa)
• Not All Apps are "Cloud-Ready"
• Lack of Training and Awareness
• Lack of Documentation and Guidelines
• Complexities of Integration
• Overarching Challenges
CLOUD DATA STORAGE, SECURITY & THREATS
TYPES OF STORAGE
• Volume Storage, Object Storage, Structured, Unstructured, Information Storage and
Management, Content and file storage, Ephemeral storage, Content Delivery Network, Raw
Storage, Long-Term Storage
DATA SECURITY
• DLP: Data Leakage Prevention or Data Loss Protection, Encryption, Obfuscation,
Anonymization, Tokenization, Masking
THREATS
• Unauthorized usage/access, Liability due to regulatory noncompliance, Denial of Service and
Distributed denial of service, Corruption, modification and destruction of data, Data leakage
and breaches, Theft or accidental loss of media, Malware attack or introduction, Improper
treatment or sanitization after end of use
CLOUD DATA STORAGE - ENCRYPTION &
SANITIZATION
• Data In Transit (Data In Motion)
• Data at Rest
• Cryptographic Erasure
• Data Overwriting
CLOUD DATA STORAGE - KEY MANAGEMENT &
ACCESS CONTROLS
Common Approaches to Key Management
• Remote Key Management Service(KMS)
• Client Side Key Management
IAM and Access Control
• Provisioning and deprovisioning
• Centralized directory services
• Privileged user management
• Authentication and access management
AUTOMATION USE CASES - SECURE CLOUD
Automation Starts with Notifications. When a vulnerability is detected:
• Its severity is assessed
• A security patch or an interim solution is provided
• This information is entered into a system
• Automated email notifications are sent to predefined accounts in a straightforward process
Areas for automation:
• Telco Cloud Orchestration
• Predicting failures
• Analysing Service Failures & Protecting SLAs
• Security Patch applicability
• Creation of tracking records and their assignment to predefined resolver groups, in-case of
matching
• Change record creation, change approval, change implementation
ANSIBLE
AUTOMATE
PROCESSES &
DEPLOYMENTS
ManageIQ
DELIVER SERVICES
ACROSS HYBRID
CLOUD
AUDITING THE CLOUD INFRA/SERVICES
• Internal Audit
• External Audit
CLOUDFO
DELIVER SERVICES ACROSS
YOUR HYBRID CLOUD
Hybrid Cloud Management
Self-Service Provisioning
Policy-driven Compliance
Summary
• Telco cloud is complex in terms of security
• Take a holistic layered approach towards security
• Automation is key
• Security is a continuous exercise
Thank You
Questions ?
hwng@redhat.com
nhweemin
asv@redhat.com
amAbhilash

More Related Content

What's hot

Adopting A Zero-Trust Model. Google Did It, Can You?
Adopting A Zero-Trust Model. Google Did It, Can You?Adopting A Zero-Trust Model. Google Did It, Can You?
Adopting A Zero-Trust Model. Google Did It, Can You?
Zscaler
 
Azure Security and Management
Azure Security and ManagementAzure Security and Management
Azure Security and Management
Allen Brokken
 
Microsoft Defender for Endpoint
Microsoft Defender for EndpointMicrosoft Defender for Endpoint
Microsoft Defender for Endpoint
Cheah Eng Soon
 
SCCM Intune Windows 10 Co Management Architecture Decisions
SCCM Intune Windows 10 Co Management Architecture DecisionsSCCM Intune Windows 10 Co Management Architecture Decisions
SCCM Intune Windows 10 Co Management Architecture Decisions
Anoop Nair
 
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
IBM Security
 
SOC and SIEM.pptx
SOC and SIEM.pptxSOC and SIEM.pptx
SOC and SIEM.pptx
SandeshUprety4
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
Devyani Vaidya
 
b_siem_deployment.pdf
b_siem_deployment.pdfb_siem_deployment.pdf
b_siem_deployment.pdf
MiguelAlva22
 
Microsoft Defender and Azure Sentinel
Microsoft Defender and Azure SentinelMicrosoft Defender and Azure Sentinel
Microsoft Defender and Azure Sentinel
David J Rosenthal
 
Security operations center 5 security controls
 Security operations center 5 security controls Security operations center 5 security controls
Security operations center 5 security controls
AlienVault
 
Cloud Computing Security
Cloud Computing SecurityCloud Computing Security
Cloud Computing Security
Ninh Nguyen
 
Fortinet k
Fortinet kFortinet k
Fortinet k
mrehan2k2
 
Azure Security Overview
Azure Security OverviewAzure Security Overview
Azure Security Overview
Allen Brokken
 
SOC Architecture Workshop - Part 1
SOC Architecture Workshop - Part 1SOC Architecture Workshop - Part 1
SOC Architecture Workshop - Part 1
Priyanka Aash
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
AWS User Group Bengaluru
 
Lecture5
Lecture5Lecture5
Lecture5
josephineusha
 
Cloud Computing - Security Benefits and Risks
Cloud Computing - Security Benefits and RisksCloud Computing - Security Benefits and Risks
Cloud Computing - Security Benefits and Risks
William McBorrough
 
Security and Compliance
Security and ComplianceSecurity and Compliance
Security and Compliance
Amazon Web Services
 
SEIM-Microsoft Sentinel.pptx
SEIM-Microsoft Sentinel.pptxSEIM-Microsoft Sentinel.pptx
SEIM-Microsoft Sentinel.pptx
AmrMousa51
 
Cyber Security Emerging Threats
Cyber Security Emerging ThreatsCyber Security Emerging Threats
Cyber Security Emerging Threats
isc2dfw
 

What's hot (20)

Adopting A Zero-Trust Model. Google Did It, Can You?
Adopting A Zero-Trust Model. Google Did It, Can You?Adopting A Zero-Trust Model. Google Did It, Can You?
Adopting A Zero-Trust Model. Google Did It, Can You?
 
Azure Security and Management
Azure Security and ManagementAzure Security and Management
Azure Security and Management
 
Microsoft Defender for Endpoint
Microsoft Defender for EndpointMicrosoft Defender for Endpoint
Microsoft Defender for Endpoint
 
SCCM Intune Windows 10 Co Management Architecture Decisions
SCCM Intune Windows 10 Co Management Architecture DecisionsSCCM Intune Windows 10 Co Management Architecture Decisions
SCCM Intune Windows 10 Co Management Architecture Decisions
 
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
 
SOC and SIEM.pptx
SOC and SIEM.pptxSOC and SIEM.pptx
SOC and SIEM.pptx
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
 
b_siem_deployment.pdf
b_siem_deployment.pdfb_siem_deployment.pdf
b_siem_deployment.pdf
 
Microsoft Defender and Azure Sentinel
Microsoft Defender and Azure SentinelMicrosoft Defender and Azure Sentinel
Microsoft Defender and Azure Sentinel
 
Security operations center 5 security controls
 Security operations center 5 security controls Security operations center 5 security controls
Security operations center 5 security controls
 
Cloud Computing Security
Cloud Computing SecurityCloud Computing Security
Cloud Computing Security
 
Fortinet k
Fortinet kFortinet k
Fortinet k
 
Azure Security Overview
Azure Security OverviewAzure Security Overview
Azure Security Overview
 
SOC Architecture Workshop - Part 1
SOC Architecture Workshop - Part 1SOC Architecture Workshop - Part 1
SOC Architecture Workshop - Part 1
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
 
Lecture5
Lecture5Lecture5
Lecture5
 
Cloud Computing - Security Benefits and Risks
Cloud Computing - Security Benefits and RisksCloud Computing - Security Benefits and Risks
Cloud Computing - Security Benefits and Risks
 
Security and Compliance
Security and ComplianceSecurity and Compliance
Security and Compliance
 
SEIM-Microsoft Sentinel.pptx
SEIM-Microsoft Sentinel.pptxSEIM-Microsoft Sentinel.pptx
SEIM-Microsoft Sentinel.pptx
 
Cyber Security Emerging Threats
Cyber Security Emerging ThreatsCyber Security Emerging Threats
Cyber Security Emerging Threats
 

Viewers also liked

Summit 16: ARM Mini-Summit - OpenDataPlane Monarch Release - Linaro
Summit 16: ARM Mini-Summit -   OpenDataPlane Monarch Release - LinaroSummit 16: ARM Mini-Summit -   OpenDataPlane Monarch Release - Linaro
Summit 16: ARM Mini-Summit - OpenDataPlane Monarch Release - Linaro
OPNFV
 
Summit 16: ARM Mini-Summit - Intro & Overview
Summit 16: ARM Mini-Summit - Intro & OverviewSummit 16: ARM Mini-Summit - Intro & Overview
Summit 16: ARM Mini-Summit - Intro & Overview
OPNFV
 
Openstack Tacker - Moving into Pike
Openstack Tacker - Moving into PikeOpenstack Tacker - Moving into Pike
Openstack Tacker - Moving into Pike
OPNFV
 
Challenges in positioning open stack for nf-vi_ are we biting off more than w...
Challenges in positioning open stack for nf-vi_ are we biting off more than w...Challenges in positioning open stack for nf-vi_ are we biting off more than w...
Challenges in positioning open stack for nf-vi_ are we biting off more than w...
OPNFV
 
Crossing the river by feeling the stones from legacy to cloud native applica...
Crossing the river by feeling the stones  from legacy to cloud native applica...Crossing the river by feeling the stones  from legacy to cloud native applica...
Crossing the river by feeling the stones from legacy to cloud native applica...
OPNFV
 
Opnfv testing + opnfv pharos + opnfv xci
Opnfv testing + opnfv pharos + opnfv xciOpnfv testing + opnfv pharos + opnfv xci
Opnfv testing + opnfv pharos + opnfv xci
OPNFV
 
Challenges in testing for composite vim platforms
Challenges in testing for composite vim platformsChallenges in testing for composite vim platforms
Challenges in testing for composite vim platforms
OPNFV
 
Accelerated dataplanes integration and deployment
Accelerated dataplanes integration and deploymentAccelerated dataplanes integration and deployment
Accelerated dataplanes integration and deployment
OPNFV
 
Fast datastacks - fast and flexible nfv solution stacks leveraging fd.io
Fast datastacks - fast and flexible nfv solution stacks leveraging fd.ioFast datastacks - fast and flexible nfv solution stacks leveraging fd.io
Fast datastacks - fast and flexible nfv solution stacks leveraging fd.io
OPNFV
 
Smart Testing: Catching More Bugs with Less Code Through Topology Shuffler
Smart Testing: Catching More Bugs with Less Code Through Topology ShufflerSmart Testing: Catching More Bugs with Less Code Through Topology Shuffler
Smart Testing: Catching More Bugs with Less Code Through Topology Shuffler
OPNFV
 
My network functions are virtualized, but are they cloud-ready
My network functions are virtualized, but are they cloud-readyMy network functions are virtualized, but are they cloud-ready
My network functions are virtualized, but are they cloud-ready
OPNFV
 
Faster, Higher, Stronger – Accelerating Fault Management to the Next Level
Faster, Higher, Stronger – Accelerating Fault Management to the Next LevelFaster, Higher, Stronger – Accelerating Fault Management to the Next Level
Faster, Higher, Stronger – Accelerating Fault Management to the Next Level
OPNFV
 
Building the carrier grade nfv infrastructure
Building the carrier grade nfv infrastructureBuilding the carrier grade nfv infrastructure
Building the carrier grade nfv infrastructure
OPNFV
 
ONAP integration with opnfv via opera
ONAP integration with opnfv via opera ONAP integration with opnfv via opera
ONAP integration with opnfv via opera
OPNFV
 
OPNFV with 5G Applications
OPNFV with 5G ApplicationsOPNFV with 5G Applications
OPNFV with 5G Applications
OPNFV
 
Summit 16: Keynote: Huawei - Road to All- Cloud Carrier Network
Summit 16: Keynote: Huawei - Road to All- Cloud Carrier NetworkSummit 16: Keynote: Huawei - Road to All- Cloud Carrier Network
Summit 16: Keynote: Huawei - Road to All- Cloud Carrier Network
OPNFV
 
Summit 16: Open-O Mini-Summit - OPNFV & Open-O
Summit 16: Open-O Mini-Summit - OPNFV & Open-OSummit 16: Open-O Mini-Summit - OPNFV & Open-O
Summit 16: Open-O Mini-Summit - OPNFV & Open-O
OPNFV
 
NFV interoperability, for the success of commercial deployments
NFV interoperability, for the success of commercial deploymentsNFV interoperability, for the success of commercial deployments
NFV interoperability, for the success of commercial deployments
OPNFV
 
OPNFV scenarios challenges and opportunities
OPNFV scenarios  challenges and opportunitiesOPNFV scenarios  challenges and opportunities
OPNFV scenarios challenges and opportunities
OPNFV
 
Test and perspectives on nfvi from china unicom sdn nfv lab
Test and perspectives on nfvi from china unicom sdn nfv labTest and perspectives on nfvi from china unicom sdn nfv lab
Test and perspectives on nfvi from china unicom sdn nfv lab
OPNFV
 

Viewers also liked (20)

Summit 16: ARM Mini-Summit - OpenDataPlane Monarch Release - Linaro
Summit 16: ARM Mini-Summit -   OpenDataPlane Monarch Release - LinaroSummit 16: ARM Mini-Summit -   OpenDataPlane Monarch Release - Linaro
Summit 16: ARM Mini-Summit - OpenDataPlane Monarch Release - Linaro
 
Summit 16: ARM Mini-Summit - Intro & Overview
Summit 16: ARM Mini-Summit - Intro & OverviewSummit 16: ARM Mini-Summit - Intro & Overview
Summit 16: ARM Mini-Summit - Intro & Overview
 
Openstack Tacker - Moving into Pike
Openstack Tacker - Moving into PikeOpenstack Tacker - Moving into Pike
Openstack Tacker - Moving into Pike
 
Challenges in positioning open stack for nf-vi_ are we biting off more than w...
Challenges in positioning open stack for nf-vi_ are we biting off more than w...Challenges in positioning open stack for nf-vi_ are we biting off more than w...
Challenges in positioning open stack for nf-vi_ are we biting off more than w...
 
Crossing the river by feeling the stones from legacy to cloud native applica...
Crossing the river by feeling the stones  from legacy to cloud native applica...Crossing the river by feeling the stones  from legacy to cloud native applica...
Crossing the river by feeling the stones from legacy to cloud native applica...
 
Opnfv testing + opnfv pharos + opnfv xci
Opnfv testing + opnfv pharos + opnfv xciOpnfv testing + opnfv pharos + opnfv xci
Opnfv testing + opnfv pharos + opnfv xci
 
Challenges in testing for composite vim platforms
Challenges in testing for composite vim platformsChallenges in testing for composite vim platforms
Challenges in testing for composite vim platforms
 
Accelerated dataplanes integration and deployment
Accelerated dataplanes integration and deploymentAccelerated dataplanes integration and deployment
Accelerated dataplanes integration and deployment
 
Fast datastacks - fast and flexible nfv solution stacks leveraging fd.io
Fast datastacks - fast and flexible nfv solution stacks leveraging fd.ioFast datastacks - fast and flexible nfv solution stacks leveraging fd.io
Fast datastacks - fast and flexible nfv solution stacks leveraging fd.io
 
Smart Testing: Catching More Bugs with Less Code Through Topology Shuffler
Smart Testing: Catching More Bugs with Less Code Through Topology ShufflerSmart Testing: Catching More Bugs with Less Code Through Topology Shuffler
Smart Testing: Catching More Bugs with Less Code Through Topology Shuffler
 
My network functions are virtualized, but are they cloud-ready
My network functions are virtualized, but are they cloud-readyMy network functions are virtualized, but are they cloud-ready
My network functions are virtualized, but are they cloud-ready
 
Faster, Higher, Stronger – Accelerating Fault Management to the Next Level
Faster, Higher, Stronger – Accelerating Fault Management to the Next LevelFaster, Higher, Stronger – Accelerating Fault Management to the Next Level
Faster, Higher, Stronger – Accelerating Fault Management to the Next Level
 
Building the carrier grade nfv infrastructure
Building the carrier grade nfv infrastructureBuilding the carrier grade nfv infrastructure
Building the carrier grade nfv infrastructure
 
ONAP integration with opnfv via opera
ONAP integration with opnfv via opera ONAP integration with opnfv via opera
ONAP integration with opnfv via opera
 
OPNFV with 5G Applications
OPNFV with 5G ApplicationsOPNFV with 5G Applications
OPNFV with 5G Applications
 
Summit 16: Keynote: Huawei - Road to All- Cloud Carrier Network
Summit 16: Keynote: Huawei - Road to All- Cloud Carrier NetworkSummit 16: Keynote: Huawei - Road to All- Cloud Carrier Network
Summit 16: Keynote: Huawei - Road to All- Cloud Carrier Network
 
Summit 16: Open-O Mini-Summit - OPNFV & Open-O
Summit 16: Open-O Mini-Summit - OPNFV & Open-OSummit 16: Open-O Mini-Summit - OPNFV & Open-O
Summit 16: Open-O Mini-Summit - OPNFV & Open-O
 
NFV interoperability, for the success of commercial deployments
NFV interoperability, for the success of commercial deploymentsNFV interoperability, for the success of commercial deployments
NFV interoperability, for the success of commercial deployments
 
OPNFV scenarios challenges and opportunities
OPNFV scenarios  challenges and opportunitiesOPNFV scenarios  challenges and opportunities
OPNFV scenarios challenges and opportunities
 
Test and perspectives on nfvi from china unicom sdn nfv lab
Test and perspectives on nfvi from china unicom sdn nfv labTest and perspectives on nfvi from china unicom sdn nfv lab
Test and perspectives on nfvi from china unicom sdn nfv lab
 

Similar to Securing your telco cloud

Hyper Secure Converged Infrastructure solves architectural challenges
Hyper Secure Converged Infrastructure solves architectural challengesHyper Secure Converged Infrastructure solves architectural challenges
Hyper Secure Converged Infrastructure solves architectural challenges
Kim Bookout
 
SD-WAN - comSpark 2019
SD-WAN - comSpark 2019SD-WAN - comSpark 2019
SD-WAN - comSpark 2019
Advanced Technology Consulting (ATC)
 
TechWiseTV Workshop: SD-WAN Security
TechWiseTV Workshop: SD-WAN SecurityTechWiseTV Workshop: SD-WAN Security
TechWiseTV Workshop: SD-WAN Security
Robb Boyd
 
Cisco Connect 2018 Thailand - Security automation and programmability mr. kho...
Cisco Connect 2018 Thailand - Security automation and programmability mr. kho...Cisco Connect 2018 Thailand - Security automation and programmability mr. kho...
Cisco Connect 2018 Thailand - Security automation and programmability mr. kho...
NetworkCollaborators
 
Cisco Connect 2018 Thailand - Telco service provider network analytics
Cisco Connect 2018 Thailand - Telco service provider network analytics Cisco Connect 2018 Thailand - Telco service provider network analytics
Cisco Connect 2018 Thailand - Telco service provider network analytics
NetworkCollaborators
 
Cyber Security Ingram 2022.pptx
Cyber Security Ingram 2022.pptxCyber Security Ingram 2022.pptx
Cyber Security Ingram 2022.pptx
ZalamSudisno
 
Jak využít cloudu pro zvýšení bezpečnosti vašeho IT
Jak využít cloudu pro zvýšení bezpečnosti vašeho ITJak využít cloudu pro zvýšení bezpečnosti vašeho IT
Jak využít cloudu pro zvýšení bezpečnosti vašeho IT
MarketingArrowECS_CZ
 
Polymorphic Attacks on Data-in-Motion Require a New Security Approach From Bo...
Polymorphic Attacks on Data-in-Motion Require a New Security Approach From Bo...Polymorphic Attacks on Data-in-Motion Require a New Security Approach From Bo...
Polymorphic Attacks on Data-in-Motion Require a New Security Approach From Bo...
ADVA
 
security and compliance in the cloud
security and compliance in the cloudsecurity and compliance in the cloud
security and compliance in the cloudAjay Rathi
 
SSL & TLS Architecture short
SSL & TLS Architecture shortSSL & TLS Architecture short
SSL & TLS Architecture short
Avirot Mitamura
 
Information Security
Information SecurityInformation Security
Information SecurityMohit8780
 
Enterprise Security in Cloud
Enterprise Security in CloudEnterprise Security in Cloud
Enterprise Security in CloudLenin Aboagye
 
Enterprise Security in Hybrid Cloud ISACA-SV 2012
Enterprise Security in Hybrid Cloud ISACA-SV 2012Enterprise Security in Hybrid Cloud ISACA-SV 2012
Enterprise Security in Hybrid Cloud ISACA-SV 2012
Symosis Security (Previously C-Level Security)
 
The day when 3rd party security providers disappear into cloud bright talk se...
The day when 3rd party security providers disappear into cloud bright talk se...The day when 3rd party security providers disappear into cloud bright talk se...
The day when 3rd party security providers disappear into cloud bright talk se...
Ulf Mattsson
 
Rik Ferguson
Rik FergusonRik Ferguson
Rik Ferguson
CloudExpoEurope
 
Crush Cloud Complexity, Simplify Security - Shield X
Crush Cloud Complexity, Simplify Security - Shield XCrush Cloud Complexity, Simplify Security - Shield X
Crush Cloud Complexity, Simplify Security - Shield X
Prime Infoserv
 
Plnog13 2014 security intelligence_pkedra_v1
Plnog13 2014 security intelligence_pkedra_v1Plnog13 2014 security intelligence_pkedra_v1
Plnog13 2014 security intelligence_pkedra_v1
PROIDEA
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
AWS User Group Bengaluru
 
Azure 101: Shared responsibility in the Azure Cloud
Azure 101: Shared responsibility in the Azure CloudAzure 101: Shared responsibility in the Azure Cloud
Azure 101: Shared responsibility in the Azure Cloud
Paulo Renato
 

Similar to Securing your telco cloud (20)

Hyper Secure Converged Infrastructure solves architectural challenges
Hyper Secure Converged Infrastructure solves architectural challengesHyper Secure Converged Infrastructure solves architectural challenges
Hyper Secure Converged Infrastructure solves architectural challenges
 
SD-WAN - comSpark 2019
SD-WAN - comSpark 2019SD-WAN - comSpark 2019
SD-WAN - comSpark 2019
 
TechWiseTV Workshop: SD-WAN Security
TechWiseTV Workshop: SD-WAN SecurityTechWiseTV Workshop: SD-WAN Security
TechWiseTV Workshop: SD-WAN Security
 
Cisco Connect 2018 Thailand - Security automation and programmability mr. kho...
Cisco Connect 2018 Thailand - Security automation and programmability mr. kho...Cisco Connect 2018 Thailand - Security automation and programmability mr. kho...
Cisco Connect 2018 Thailand - Security automation and programmability mr. kho...
 
Cisco Connect 2018 Thailand - Telco service provider network analytics
Cisco Connect 2018 Thailand - Telco service provider network analytics Cisco Connect 2018 Thailand - Telco service provider network analytics
Cisco Connect 2018 Thailand - Telco service provider network analytics
 
Cyber Security Ingram 2022.pptx
Cyber Security Ingram 2022.pptxCyber Security Ingram 2022.pptx
Cyber Security Ingram 2022.pptx
 
Jak využít cloudu pro zvýšení bezpečnosti vašeho IT
Jak využít cloudu pro zvýšení bezpečnosti vašeho ITJak využít cloudu pro zvýšení bezpečnosti vašeho IT
Jak využít cloudu pro zvýšení bezpečnosti vašeho IT
 
Polymorphic Attacks on Data-in-Motion Require a New Security Approach From Bo...
Polymorphic Attacks on Data-in-Motion Require a New Security Approach From Bo...Polymorphic Attacks on Data-in-Motion Require a New Security Approach From Bo...
Polymorphic Attacks on Data-in-Motion Require a New Security Approach From Bo...
 
security and compliance in the cloud
security and compliance in the cloudsecurity and compliance in the cloud
security and compliance in the cloud
 
SSL & TLS Architecture short
SSL & TLS Architecture shortSSL & TLS Architecture short
SSL & TLS Architecture short
 
Information Security
Information SecurityInformation Security
Information Security
 
Enterprise Security in Cloud
Enterprise Security in CloudEnterprise Security in Cloud
Enterprise Security in Cloud
 
Enterprise Security in Hybrid Cloud ISACA-SV 2012
Enterprise Security in Hybrid Cloud ISACA-SV 2012Enterprise Security in Hybrid Cloud ISACA-SV 2012
Enterprise Security in Hybrid Cloud ISACA-SV 2012
 
The day when 3rd party security providers disappear into cloud bright talk se...
The day when 3rd party security providers disappear into cloud bright talk se...The day when 3rd party security providers disappear into cloud bright talk se...
The day when 3rd party security providers disappear into cloud bright talk se...
 
Spo1 w25 spo1-w25
Spo1 w25 spo1-w25Spo1 w25 spo1-w25
Spo1 w25 spo1-w25
 
Rik Ferguson
Rik FergusonRik Ferguson
Rik Ferguson
 
Crush Cloud Complexity, Simplify Security - Shield X
Crush Cloud Complexity, Simplify Security - Shield XCrush Cloud Complexity, Simplify Security - Shield X
Crush Cloud Complexity, Simplify Security - Shield X
 
Plnog13 2014 security intelligence_pkedra_v1
Plnog13 2014 security intelligence_pkedra_v1Plnog13 2014 security intelligence_pkedra_v1
Plnog13 2014 security intelligence_pkedra_v1
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
 
Azure 101: Shared responsibility in the Azure Cloud
Azure 101: Shared responsibility in the Azure CloudAzure 101: Shared responsibility in the Azure Cloud
Azure 101: Shared responsibility in the Azure Cloud
 

More from OPNFV

How to Reuse OPNFV Testing Components in Telco Validation Chain
How to Reuse OPNFV Testing Components in Telco Validation ChainHow to Reuse OPNFV Testing Components in Telco Validation Chain
How to Reuse OPNFV Testing Components in Telco Validation Chain
OPNFV
 
Energy Audit aaS with OPNFV
Energy Audit aaS with OPNFVEnergy Audit aaS with OPNFV
Energy Audit aaS with OPNFV
OPNFV
 
Hands-On Testing: How to Integrate Tests in OPNFV
Hands-On Testing: How to Integrate Tests in OPNFVHands-On Testing: How to Integrate Tests in OPNFV
Hands-On Testing: How to Integrate Tests in OPNFV
OPNFV
 
Storage Performance Indicators - Powered by StorPerf and QTIP
Storage Performance Indicators - Powered by StorPerf and QTIPStorage Performance Indicators - Powered by StorPerf and QTIP
Storage Performance Indicators - Powered by StorPerf and QTIP
OPNFV
 
Big Data for Testing - Heading for Post Process and Analytics
Big Data for Testing - Heading for Post Process and AnalyticsBig Data for Testing - Heading for Post Process and Analytics
Big Data for Testing - Heading for Post Process and Analytics
OPNFV
 
Testing, CI Gating & Community Fast Feedback: The Challenge of Integration Pr...
Testing, CI Gating & Community Fast Feedback: The Challenge of Integration Pr...Testing, CI Gating & Community Fast Feedback: The Challenge of Integration Pr...
Testing, CI Gating & Community Fast Feedback: The Challenge of Integration Pr...
OPNFV
 
How Many Ohs? (An Integration Guide to Apex & Triple-o)
How Many Ohs? (An Integration Guide to Apex & Triple-o)How Many Ohs? (An Integration Guide to Apex & Triple-o)
How Many Ohs? (An Integration Guide to Apex & Triple-o)
OPNFV
 
Being Brave: Deploying OpenStack from Master
Being Brave: Deploying OpenStack from MasterBeing Brave: Deploying OpenStack from Master
Being Brave: Deploying OpenStack from Master
OPNFV
 
Upstream Testing Collaboration
Upstream Testing Collaboration Upstream Testing Collaboration
Upstream Testing Collaboration
OPNFV
 
Enabling Carrier-Grade Availability Within a Cloud Infrastructure
Enabling Carrier-Grade Availability Within a Cloud InfrastructureEnabling Carrier-Grade Availability Within a Cloud Infrastructure
Enabling Carrier-Grade Availability Within a Cloud Infrastructure
OPNFV
 
Learnings From the First Year of the OPNFV Internship Program
Learnings From the First Year of the OPNFV Internship ProgramLearnings From the First Year of the OPNFV Internship Program
Learnings From the First Year of the OPNFV Internship Program
OPNFV
 
OPNFV and OCP: Perfect Together
OPNFV and OCP: Perfect TogetherOPNFV and OCP: Perfect Together
OPNFV and OCP: Perfect Together
OPNFV
 
The Return of QTIP, from Brahmaputra to Danube
The Return of QTIP, from Brahmaputra to DanubeThe Return of QTIP, from Brahmaputra to Danube
The Return of QTIP, from Brahmaputra to Danube
OPNFV
 
Improving POD Usage in Labs, CI and Testing
Improving POD Usage in Labs, CI and TestingImproving POD Usage in Labs, CI and Testing
Improving POD Usage in Labs, CI and Testing
OPNFV
 
Run OPNFV Danube on ODCC Scorpio Multi-node Server - Open Software on Open Ha...
Run OPNFV Danube on ODCC Scorpio Multi-node Server - Open Software on Open Ha...Run OPNFV Danube on ODCC Scorpio Multi-node Server - Open Software on Open Ha...
Run OPNFV Danube on ODCC Scorpio Multi-node Server - Open Software on Open Ha...
OPNFV
 
Distributed vnf management architecture and use-cases
Distributed vnf management  architecture and use-casesDistributed vnf management  architecture and use-cases
Distributed vnf management architecture and use-cases
OPNFV
 
Software-defined migration how to migrate bunch of v-ms and volumes within a...
Software-defined migration  how to migrate bunch of v-ms and volumes within a...Software-defined migration  how to migrate bunch of v-ms and volumes within a...
Software-defined migration how to migrate bunch of v-ms and volumes within a...
OPNFV
 
Securing your nfv and sdn integrated open stack cloud- challenges, use-cases ...
Securing your nfv and sdn integrated open stack cloud- challenges, use-cases ...Securing your nfv and sdn integrated open stack cloud- challenges, use-cases ...
Securing your nfv and sdn integrated open stack cloud- challenges, use-cases ...
OPNFV
 
Challenge in asia region connecting each testbed and poc of distributed nfv ...
Challenge in asia region  connecting each testbed and poc of distributed nfv ...Challenge in asia region  connecting each testbed and poc of distributed nfv ...
Challenge in asia region connecting each testbed and poc of distributed nfv ...
OPNFV
 
Demo how to efficiently evaluate nf-vi performance by leveraging opnfv testi...
Demo  how to efficiently evaluate nf-vi performance by leveraging opnfv testi...Demo  how to efficiently evaluate nf-vi performance by leveraging opnfv testi...
Demo how to efficiently evaluate nf-vi performance by leveraging opnfv testi...
OPNFV
 

More from OPNFV (20)

How to Reuse OPNFV Testing Components in Telco Validation Chain
How to Reuse OPNFV Testing Components in Telco Validation ChainHow to Reuse OPNFV Testing Components in Telco Validation Chain
How to Reuse OPNFV Testing Components in Telco Validation Chain
 
Energy Audit aaS with OPNFV
Energy Audit aaS with OPNFVEnergy Audit aaS with OPNFV
Energy Audit aaS with OPNFV
 
Hands-On Testing: How to Integrate Tests in OPNFV
Hands-On Testing: How to Integrate Tests in OPNFVHands-On Testing: How to Integrate Tests in OPNFV
Hands-On Testing: How to Integrate Tests in OPNFV
 
Storage Performance Indicators - Powered by StorPerf and QTIP
Storage Performance Indicators - Powered by StorPerf and QTIPStorage Performance Indicators - Powered by StorPerf and QTIP
Storage Performance Indicators - Powered by StorPerf and QTIP
 
Big Data for Testing - Heading for Post Process and Analytics
Big Data for Testing - Heading for Post Process and AnalyticsBig Data for Testing - Heading for Post Process and Analytics
Big Data for Testing - Heading for Post Process and Analytics
 
Testing, CI Gating & Community Fast Feedback: The Challenge of Integration Pr...
Testing, CI Gating & Community Fast Feedback: The Challenge of Integration Pr...Testing, CI Gating & Community Fast Feedback: The Challenge of Integration Pr...
Testing, CI Gating & Community Fast Feedback: The Challenge of Integration Pr...
 
How Many Ohs? (An Integration Guide to Apex & Triple-o)
How Many Ohs? (An Integration Guide to Apex & Triple-o)How Many Ohs? (An Integration Guide to Apex & Triple-o)
How Many Ohs? (An Integration Guide to Apex & Triple-o)
 
Being Brave: Deploying OpenStack from Master
Being Brave: Deploying OpenStack from MasterBeing Brave: Deploying OpenStack from Master
Being Brave: Deploying OpenStack from Master
 
Upstream Testing Collaboration
Upstream Testing Collaboration Upstream Testing Collaboration
Upstream Testing Collaboration
 
Enabling Carrier-Grade Availability Within a Cloud Infrastructure
Enabling Carrier-Grade Availability Within a Cloud InfrastructureEnabling Carrier-Grade Availability Within a Cloud Infrastructure
Enabling Carrier-Grade Availability Within a Cloud Infrastructure
 
Learnings From the First Year of the OPNFV Internship Program
Learnings From the First Year of the OPNFV Internship ProgramLearnings From the First Year of the OPNFV Internship Program
Learnings From the First Year of the OPNFV Internship Program
 
OPNFV and OCP: Perfect Together
OPNFV and OCP: Perfect TogetherOPNFV and OCP: Perfect Together
OPNFV and OCP: Perfect Together
 
The Return of QTIP, from Brahmaputra to Danube
The Return of QTIP, from Brahmaputra to DanubeThe Return of QTIP, from Brahmaputra to Danube
The Return of QTIP, from Brahmaputra to Danube
 
Improving POD Usage in Labs, CI and Testing
Improving POD Usage in Labs, CI and TestingImproving POD Usage in Labs, CI and Testing
Improving POD Usage in Labs, CI and Testing
 
Run OPNFV Danube on ODCC Scorpio Multi-node Server - Open Software on Open Ha...
Run OPNFV Danube on ODCC Scorpio Multi-node Server - Open Software on Open Ha...Run OPNFV Danube on ODCC Scorpio Multi-node Server - Open Software on Open Ha...
Run OPNFV Danube on ODCC Scorpio Multi-node Server - Open Software on Open Ha...
 
Distributed vnf management architecture and use-cases
Distributed vnf management  architecture and use-casesDistributed vnf management  architecture and use-cases
Distributed vnf management architecture and use-cases
 
Software-defined migration how to migrate bunch of v-ms and volumes within a...
Software-defined migration  how to migrate bunch of v-ms and volumes within a...Software-defined migration  how to migrate bunch of v-ms and volumes within a...
Software-defined migration how to migrate bunch of v-ms and volumes within a...
 
Securing your nfv and sdn integrated open stack cloud- challenges, use-cases ...
Securing your nfv and sdn integrated open stack cloud- challenges, use-cases ...Securing your nfv and sdn integrated open stack cloud- challenges, use-cases ...
Securing your nfv and sdn integrated open stack cloud- challenges, use-cases ...
 
Challenge in asia region connecting each testbed and poc of distributed nfv ...
Challenge in asia region  connecting each testbed and poc of distributed nfv ...Challenge in asia region  connecting each testbed and poc of distributed nfv ...
Challenge in asia region connecting each testbed and poc of distributed nfv ...
 
Demo how to efficiently evaluate nf-vi performance by leveraging opnfv testi...
Demo  how to efficiently evaluate nf-vi performance by leveraging opnfv testi...Demo  how to efficiently evaluate nf-vi performance by leveraging opnfv testi...
Demo how to efficiently evaluate nf-vi performance by leveraging opnfv testi...
 

Recently uploaded

A Study of Variable-Role-based Feature Enrichment in Neural Models of Code
A Study of Variable-Role-based Feature Enrichment in Neural Models of CodeA Study of Variable-Role-based Feature Enrichment in Neural Models of Code
A Study of Variable-Role-based Feature Enrichment in Neural Models of Code
Aftab Hussain
 
GOING AOT WITH GRAALVM FOR SPRING BOOT (SPRING IO)
GOING AOT WITH GRAALVM FOR  SPRING BOOT (SPRING IO)GOING AOT WITH GRAALVM FOR  SPRING BOOT (SPRING IO)
GOING AOT WITH GRAALVM FOR SPRING BOOT (SPRING IO)
Alina Yurenko
 
Top Features to Include in Your Winzo Clone App for Business Growth (4).pptx
Top Features to Include in Your Winzo Clone App for Business Growth (4).pptxTop Features to Include in Your Winzo Clone App for Business Growth (4).pptx
Top Features to Include in Your Winzo Clone App for Business Growth (4).pptx
rickgrimesss22
 
Navigating the Metaverse: A Journey into Virtual Evolution"
Navigating the Metaverse: A Journey into Virtual Evolution"Navigating the Metaverse: A Journey into Virtual Evolution"
Navigating the Metaverse: A Journey into Virtual Evolution"
Donna Lenk
 
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
Shahin Sheidaei
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Enhancing Research Orchestration Capabilities at ORNL.pdf
Enhancing Research Orchestration Capabilities at ORNL.pdfEnhancing Research Orchestration Capabilities at ORNL.pdf
Enhancing Research Orchestration Capabilities at ORNL.pdf
Globus
 
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
Globus
 
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
Globus
 
AI Fusion Buddy Review: Brand New, Groundbreaking Gemini-Powered AI App
AI Fusion Buddy Review: Brand New, Groundbreaking Gemini-Powered AI AppAI Fusion Buddy Review: Brand New, Groundbreaking Gemini-Powered AI App
AI Fusion Buddy Review: Brand New, Groundbreaking Gemini-Powered AI App
Google
 
First Steps with Globus Compute Multi-User Endpoints
First Steps with Globus Compute Multi-User EndpointsFirst Steps with Globus Compute Multi-User Endpoints
First Steps with Globus Compute Multi-User Endpoints
Globus
 
BoxLang: Review our Visionary Licenses of 2024
BoxLang: Review our Visionary Licenses of 2024BoxLang: Review our Visionary Licenses of 2024
BoxLang: Review our Visionary Licenses of 2024
Ortus Solutions, Corp
 
OpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoam
OpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoamOpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoam
OpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoam
takuyayamamoto1800
 
Introducing Crescat - Event Management Software for Venues, Festivals and Eve...
Introducing Crescat - Event Management Software for Venues, Festivals and Eve...Introducing Crescat - Event Management Software for Venues, Festivals and Eve...
Introducing Crescat - Event Management Software for Venues, Festivals and Eve...
Crescat
 
Orion Context Broker introduction 20240604
Orion Context Broker introduction 20240604Orion Context Broker introduction 20240604
Orion Context Broker introduction 20240604
Fermin Galan
 
How to Position Your Globus Data Portal for Success Ten Good Practices
How to Position Your Globus Data Portal for Success Ten Good PracticesHow to Position Your Globus Data Portal for Success Ten Good Practices
How to Position Your Globus Data Portal for Success Ten Good Practices
Globus
 
May Marketo Masterclass, London MUG May 22 2024.pdf
May Marketo Masterclass, London MUG May 22 2024.pdfMay Marketo Masterclass, London MUG May 22 2024.pdf
May Marketo Masterclass, London MUG May 22 2024.pdf
Adele Miller
 
Providing Globus Services to Users of JASMIN for Environmental Data Analysis
Providing Globus Services to Users of JASMIN for Environmental Data AnalysisProviding Globus Services to Users of JASMIN for Environmental Data Analysis
Providing Globus Services to Users of JASMIN for Environmental Data Analysis
Globus
 
Globus Compute Introduction - GlobusWorld 2024
Globus Compute Introduction - GlobusWorld 2024Globus Compute Introduction - GlobusWorld 2024
Globus Compute Introduction - GlobusWorld 2024
Globus
 
Understanding Globus Data Transfers with NetSage
Understanding Globus Data Transfers with NetSageUnderstanding Globus Data Transfers with NetSage
Understanding Globus Data Transfers with NetSage
Globus
 

Recently uploaded (20)

A Study of Variable-Role-based Feature Enrichment in Neural Models of Code
A Study of Variable-Role-based Feature Enrichment in Neural Models of CodeA Study of Variable-Role-based Feature Enrichment in Neural Models of Code
A Study of Variable-Role-based Feature Enrichment in Neural Models of Code
 
GOING AOT WITH GRAALVM FOR SPRING BOOT (SPRING IO)
GOING AOT WITH GRAALVM FOR  SPRING BOOT (SPRING IO)GOING AOT WITH GRAALVM FOR  SPRING BOOT (SPRING IO)
GOING AOT WITH GRAALVM FOR SPRING BOOT (SPRING IO)
 
Top Features to Include in Your Winzo Clone App for Business Growth (4).pptx
Top Features to Include in Your Winzo Clone App for Business Growth (4).pptxTop Features to Include in Your Winzo Clone App for Business Growth (4).pptx
Top Features to Include in Your Winzo Clone App for Business Growth (4).pptx
 
Navigating the Metaverse: A Journey into Virtual Evolution"
Navigating the Metaverse: A Journey into Virtual Evolution"Navigating the Metaverse: A Journey into Virtual Evolution"
Navigating the Metaverse: A Journey into Virtual Evolution"
 
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Enhancing Research Orchestration Capabilities at ORNL.pdf
Enhancing Research Orchestration Capabilities at ORNL.pdfEnhancing Research Orchestration Capabilities at ORNL.pdf
Enhancing Research Orchestration Capabilities at ORNL.pdf
 
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
 
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
 
AI Fusion Buddy Review: Brand New, Groundbreaking Gemini-Powered AI App
AI Fusion Buddy Review: Brand New, Groundbreaking Gemini-Powered AI AppAI Fusion Buddy Review: Brand New, Groundbreaking Gemini-Powered AI App
AI Fusion Buddy Review: Brand New, Groundbreaking Gemini-Powered AI App
 
First Steps with Globus Compute Multi-User Endpoints
First Steps with Globus Compute Multi-User EndpointsFirst Steps with Globus Compute Multi-User Endpoints
First Steps with Globus Compute Multi-User Endpoints
 
BoxLang: Review our Visionary Licenses of 2024
BoxLang: Review our Visionary Licenses of 2024BoxLang: Review our Visionary Licenses of 2024
BoxLang: Review our Visionary Licenses of 2024
 
OpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoam
OpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoamOpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoam
OpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoam
 
Introducing Crescat - Event Management Software for Venues, Festivals and Eve...
Introducing Crescat - Event Management Software for Venues, Festivals and Eve...Introducing Crescat - Event Management Software for Venues, Festivals and Eve...
Introducing Crescat - Event Management Software for Venues, Festivals and Eve...
 
Orion Context Broker introduction 20240604
Orion Context Broker introduction 20240604Orion Context Broker introduction 20240604
Orion Context Broker introduction 20240604
 
How to Position Your Globus Data Portal for Success Ten Good Practices
How to Position Your Globus Data Portal for Success Ten Good PracticesHow to Position Your Globus Data Portal for Success Ten Good Practices
How to Position Your Globus Data Portal for Success Ten Good Practices
 
May Marketo Masterclass, London MUG May 22 2024.pdf
May Marketo Masterclass, London MUG May 22 2024.pdfMay Marketo Masterclass, London MUG May 22 2024.pdf
May Marketo Masterclass, London MUG May 22 2024.pdf
 
Providing Globus Services to Users of JASMIN for Environmental Data Analysis
Providing Globus Services to Users of JASMIN for Environmental Data AnalysisProviding Globus Services to Users of JASMIN for Environmental Data Analysis
Providing Globus Services to Users of JASMIN for Environmental Data Analysis
 
Globus Compute Introduction - GlobusWorld 2024
Globus Compute Introduction - GlobusWorld 2024Globus Compute Introduction - GlobusWorld 2024
Globus Compute Introduction - GlobusWorld 2024
 
Understanding Globus Data Transfers with NetSage
Understanding Globus Data Transfers with NetSageUnderstanding Globus Data Transfers with NetSage
Understanding Globus Data Transfers with NetSage
 

Securing your telco cloud

  • 1.
  • 2. Securing the Telco Cloud June 2017 Ng Hwee Ming Abhilash S V Principal Technologist Cloud Solution Architect, Red Hat APAC Office of Technology, Red Hat
  • 3. THE CHANGING LANDSCAPENETWORK SONET/TDM WIREDWIRELESS Gig-E IPv6 IP 5G NFV WiFi/WiMax Video SDN Hosted& managed Longdistance (IXC) Local(LEC) Data(LECorIXC) Video(MSO) Security Storage Voice Music Payments Video Gaming HYBRID CLOUD ENVIRONMENT APPLICATIONSDEVICES Handset/RJ45/Modem CELL PHONESMARTPHONE PC/TABLET IoT/M2M OLD LANDSCAPE NEW LANDSCAPE
  • 4. TELCO CLOUD SERVICES - PATHWAY TO NEW SERVICES Enterprise Telco Cloud IaaS / PAAS Branch Office vCPE Business Network Services V-EPC GiLan Cloud RAN / vRAN MPN Mobile Private Network (MPN) Media & Gaming Services vCDN IoT SD-WAN SD-WAN SD-WAN Internet Mobile Users Devices
  • 5. - NFV & SDN are disrupting the way telecom networks are going to be built and managed becoming the foundation of modern networking - Virtualization & Cloudification are key technologies to enable NFV - Sharing resources is a major concern for security - Cybersecurity national agencies want to define guidelines to ensure this new foundation is secure before allowing mass roll-out of sensible network functions e.g. Lawful Intercept capable VNFs - NFV & SDN can also be a way to mitigate more efficiently security threats - Bottom line is that security can slow down or even block NFV deployment
  • 6. TELCO CLOUD INFRASTRUCTURE - RISKS RISKS POLICY RISKS GENERAL RISKS VIRTUALIZATION RISKS NON-CLOUD SPECIFIC RISKS CLOUD SPECIFIC RISKS LEGAL RISKS
  • 7. WHO IS LOOKING AT IT ? THE MAJOR NFV SECURITY STAKEHOLDERS
  • 8. FRAMEWORKS FOR CLOUD COMPUTING • ISO/IEC 27017:2015 Information Technology-Security Techniques-Code of Practice for Information Security Controls Based on ISO/IEC 27002 for Cloud Services • Organization for Economic Cooperation and Development-Privacy and Security Guidelines • Asia-Pacific Economic Cooperation Privacy Framework • EU Data Protection Directive
  • 9. BUILD CLOUD WITH SECURITY STANDARDS • ISO/IEC 27001:2013 • ISO/IEC 27002:2013 • ISO/IEC 27017:2015 • SOC 1/SOC 2/SOC 3 • NIST SP 800-53 • PCI DSS
  • 10. KEY SECURE CLOUD DESIGN PRINCIPLES Protections to enable trust Cross Platform Capabilities Access, Administration, Resiliency Delegate or Federated Access Secure and Ease of Access & Adoption Identification, Authentication, Authorization, Administration, Auditability Elastic, Flexible, and Resilient, supporting multitenant platforms Multi level protection- Network, OS, Application Security 1 2 3 4 5 6 8 7
  • 11. CLOUD SECURITY - A LAYERED APPROACH - WHY ? • Multitenancy • Loss of Control • Network Topology • Logical Network Segmentation • No physical endpoints • Single Point of Access PERIMETER NETWORK PHYSICAL RESOURCES HYPERVISOR TENANT NETWORK HOST OS APPLICATION DATA
  • 12. CLOUD SECURITY - A LAYERED APPROACH - INFRASTRUCTURE • Infrastructure Layer • VM attacks, Virtual network, Hypervisor attacks, VM-based rootkits • Virtual switch attacks • DoS attacks, Colocation • Insecure Interfaces and APIs • Denial of Service
  • 13. CLOUD SECURITY - A LAYERED APPROACH - APPLICATION PLATFORM • System and resource isolation • User level permissions • User access management • Protection against Malware, Backdoors and Trojans
  • 14. CLOUD SECURITY - A LAYERED APPROACH - SOFTWARE • Data segregation • Data Access and Policies OWASP Top 10 Security Threats • A1- Injection • A2- Broken Authentication and Session Management • A3- Cross-site Scripting(XSS) • A4- Insecure Direct Object References • A5- Security Misconfiguration • A6- Sensitive Data Exposure • A7- Missing Function Level Access Control • A8-Cross-Site Request Forgery • A9- Using Components with Known Vulnerabilities • A10- Unvalidated Redirects and Forwards
  • 15. COMMON PITFALLS - CLOUD SECURITY APPLICATION DEPLOYMENT • On-Premises Does Not Always Transfer(and Vice Versa) • Not All Apps are "Cloud-Ready" • Lack of Training and Awareness • Lack of Documentation and Guidelines • Complexities of Integration • Overarching Challenges
  • 16. CLOUD DATA STORAGE, SECURITY & THREATS TYPES OF STORAGE • Volume Storage, Object Storage, Structured, Unstructured, Information Storage and Management, Content and file storage, Ephemeral storage, Content Delivery Network, Raw Storage, Long-Term Storage DATA SECURITY • DLP: Data Leakage Prevention or Data Loss Protection, Encryption, Obfuscation, Anonymization, Tokenization, Masking THREATS • Unauthorized usage/access, Liability due to regulatory noncompliance, Denial of Service and Distributed denial of service, Corruption, modification and destruction of data, Data leakage and breaches, Theft or accidental loss of media, Malware attack or introduction, Improper treatment or sanitization after end of use
  • 17. CLOUD DATA STORAGE - ENCRYPTION & SANITIZATION • Data In Transit (Data In Motion) • Data at Rest • Cryptographic Erasure • Data Overwriting
  • 18. CLOUD DATA STORAGE - KEY MANAGEMENT & ACCESS CONTROLS Common Approaches to Key Management • Remote Key Management Service(KMS) • Client Side Key Management IAM and Access Control • Provisioning and deprovisioning • Centralized directory services • Privileged user management • Authentication and access management
  • 19. AUTOMATION USE CASES - SECURE CLOUD Automation Starts with Notifications. When a vulnerability is detected: • Its severity is assessed • A security patch or an interim solution is provided • This information is entered into a system • Automated email notifications are sent to predefined accounts in a straightforward process Areas for automation: • Telco Cloud Orchestration • Predicting failures • Analysing Service Failures & Protecting SLAs • Security Patch applicability • Creation of tracking records and their assignment to predefined resolver groups, in-case of matching • Change record creation, change approval, change implementation ANSIBLE AUTOMATE PROCESSES & DEPLOYMENTS ManageIQ DELIVER SERVICES ACROSS HYBRID CLOUD
  • 20. AUDITING THE CLOUD INFRA/SERVICES • Internal Audit • External Audit CLOUDFO DELIVER SERVICES ACROSS YOUR HYBRID CLOUD Hybrid Cloud Management Self-Service Provisioning Policy-driven Compliance
  • 21. Summary • Telco cloud is complex in terms of security • Take a holistic layered approach towards security • Automation is key • Security is a continuous exercise