SlideShare a Scribd company logo
Prabath	
  Siriwardena	
  –	
  Software	
  Architect,	
  WSO2	
  
WHY	
  ?	
  
Cloud	
  Computing	
  
Cloud	
  Computing	
  
As	
  a	
  Service	
  ?	
  
As	
  a	
  Service	
  ?	
  

Pay	
  per	
  use	
                            Resource	
  Sharing	
  




Self	
  service	
  provisioning	
              Unlimited	
  Resource	
  
•    In	
  public	
  
       –    IaaS,	
  PaaS,	
  SaaS	
  available	
  on	
  the	
  Internet	
  
       –    Use	
  one	
  of	
  the	
  cloud	
  service	
  providers	
  
       –    Information	
  is	
  stored	
  and	
  managed	
  by	
  provider	
  under	
  SLA	
  

•    In	
  Private	
  
       –    Have	
  a	
  cloud,	
  in-­‐house	
  
       –    IaaS	
  provides	
  by	
  hardware	
  on	
  your	
  data	
  centers	
  
       –    PaaS	
  running	
  on	
  your	
  IaaS	
  
       –    SaaS	
  executing	
  on	
  your	
  PaaS	
  

•    Or	
  use	
  both	
  
       –    Hybrid	
  Cloud	
  
Enterprise	
  IT	
  in	
  2010	
  
Enterprise	
  IT	
  in	
  2015+	
  
What	
  do	
  you	
  expect	
  from	
  a	
  platform	
  ?	
  
•    Public	
  Cloud	
  
      –  Fast	
  time	
  to	
  market	
  
      –  Makes	
  it	
  easier	
  to	
  write	
  scalable	
  code	
  
•    Private	
  Cloud	
  
      –  Give	
  each	
  team	
  their	
  own	
  instant	
  infrastructure	
  
      –  Govern	
  centrally	
  but	
  code	
  and	
  deploy	
  by	
  team	
  
      –  Automated	
  governance,	
  registry,	
  identity	
  
      –  Instant	
  BAM	
  
•    Distributed	
  /	
  Dynamically	
  Wired	
  (works	
  properly	
  in	
  the	
  cloud)	
  
       –  Finds	
  services	
  across	
  applications	
  	
  
       –  Reuse	
  services	
  from	
  other	
  departments	
  e.g.	
  People	
  information	
  required	
  by	
  all	
  of	
  Finance,	
  
          Engineering	
  and	
  Sales	
  
•    Elastic	
  (uses	
  the	
  cloud	
  efficiently)	
  
       –  Scales	
  up	
  and	
  down	
  as	
  needed	
  
       –  Some	
  departments	
  might	
  want	
  varying	
  resources	
  with	
  varying	
  bandwidth	
  with	
  varying	
  
          priority	
  
•    Multi-­‐tenant	
  (only	
  costs	
  when	
  you	
  use	
  it)	
  
       –  Virtual	
  isolated	
  instances	
  to	
  facilitate	
  isolation	
  between	
  departments	
  etc.	
  
       –  e.g.	
  Sales	
  vs.	
  Finance	
  tenants.	
  Finance	
  want	
  complete	
  isolation	
  for	
  some	
  sensitive	
  services	
  
•    Self-­‐service	
  (in	
  the	
  hands	
  of	
  users)	
  
       –  De-­‐centralized	
  creation	
  and	
  management	
  of	
  tenants	
  
       –  No	
  need	
  to	
  come	
  to	
  IT	
  department	
  to	
  gain	
  access	
  –	
  served	
  via	
  portal	
  –	
  no	
  need	
  to	
  be	
  on	
  the	
  
          queue	
  or	
  waiting	
  list	
  
•    Granularly	
  Billed	
  and	
  Metered	
  (pay	
  for	
  just	
  what	
  you	
  use)	
  
       –  Allocate	
  costs	
  to	
  exactly	
  who	
  uses	
  them	
  
       –  Bill	
  and	
  cost	
  various	
  departments	
  per	
  use	
  	
  
       –  Get	
  rid	
  of	
  the	
  situations	
  where	
  unused	
  computing	
  assets	
  lying	
  in	
  one	
  department	
  while	
  the	
  
          other	
  departments	
  are	
  starving	
  for	
  the	
  same	
  
•    Incrementally	
  Deployed	
  and	
  Tested	
  (supports	
  seamless	
  live	
  upgrade)	
  
       –  Not	
  disrupt	
  other	
  operations	
  
Provider
IAAS	
  
                           N	
     F	
          Application	
  

                           N	
     F	
          Middleware	
  

                           N	
     F	
           Guest	
  OS	
  

                           F	
     N	
          Hypervisor	
  

                           F	
     N	
            Storage	
  

                           F	
     N	
           Hardware	
  


           Organization
   F	
     N	
           Network	
  
Provider
PAAS	
  
                           M	
     L	
          Application	
  

                           M	
     L	
          Middleware	
  

                           F	
     N	
           Guest	
  OS	
  

                           F	
     N	
          Hypervisor	
  

                           F	
     N	
            Storage	
  

                           F	
     N	
           Hardware	
  


           Organization
   F	
     N	
           Network	
  
Provider
SAAS	
  
                           M	
     L	
          Application	
  

                           F	
     N	
          Middleware	
  

                           F	
     N	
           Guest	
  OS	
  

                           F	
     N	
          Hypervisor	
  

                           F	
     N	
            Storage	
  

                           F	
     N	
           Hardware	
  


           Organization
   F	
     N	
           Network	
  
IaaS	
                   PaaS	
                    SaaS	
  
    Data	
           Organization	
            Organization	
            Organization	
  

Applications	
       Organization	
                Shared	
            Service	
  Provider	
  

  Systems	
        Service	
  Provider	
     Service	
  Provider	
     Service	
  Provider	
  

  Storage	
        Service	
  Provider	
     Service	
  Provider	
     Service	
  Provider	
  

  Network	
        Service	
  Provider	
     Service	
  Provider	
     Service	
  Provider	
  
SAAS	
  


More	
  Control	
  
                                 PAAS	
  


                                            IAAS	
  
Private	
                  Public	
  
  Compliance	
                 Organization	
          Service	
  Provider	
  

 Governance	
                  Organization	
          Service	
  Provider	
  

     Security	
                Organization	
          Service	
  Provider	
  

  Operations	
                 Organization	
          Service	
  Provider	
  

         Risk	
                Organization	
                Shared	
  

 Cloud	
  Owner	
              Organization	
          Service	
  Provider	
  
                                	
  or	
  leased	
  

Use	
  limited	
  to	
  	
     Organization	
                Public	
  
Public	
  


Ownership	
  
                             Hybrid	
  


                                          Private	
  
Multi-­‐tenancy	
  
•    Can	
  be	
  used	
  to	
  give	
  departments	
  their	
  own	
  
     PaaS	
  world	
  to	
  operate	
  in	
  
•    Yet	
  all	
  share	
  same	
  hardware	
  resources	
  
      –    Not	
  all	
  departments	
  need	
  resources	
  at	
  the	
  same	
  time	
  
      –    Really	
  pay	
  per	
  use	
  
      –    Opportunity	
  to	
  unify	
  	
  departmental	
  level	
  small	
  server	
  pools	
  	
  
•    Drastically	
  reduce	
  admin/management	
  costs	
  
      –    One	
  software	
  installation	
  to	
  maintain	
  
•    Use	
  differentiated	
  QoS	
  
Multi-­‐tenancy	
  

¡  Three	
  possible	
  ways	
  
    §  Machine	
  per	
  tenant	
  
    §  VM	
  per	
  tenant	
  
    §  Share	
  machine/VM	
  across	
  tenants	
  

¡  Challenges	
  
    §  Data	
  isolation	
  
    §  Logic	
  isolation	
  	
  
    §  Security	
  
Data	
  Isolation	
  –	
  Separated	
  DB	
  
                                                Multi-­‐tenancy	
  
Data	
  Isolation	
  –	
  Shared	
  DB	
  /	
  Separate	
  Schema	
  

                                                                        Multi-­‐tenancy	
  
Data	
  Isolation	
  –	
  Shared	
  DB	
  /	
  Shared	
  Schema	
  

                                                                      Multi-­‐tenancy	
  
Data	
  Access	
  -­‐	
  Security	
  Patterns	
  
Trusted	
  Database	
  Connections	
  
Data	
  Access	
  -­‐	
  Security	
  Patterns	
  
Trusted	
  Database	
  Connections	
  
Data	
  Access	
  -­‐	
  Security	
  Patterns	
  
Trusted	
  Database	
  Connections	
  
Data	
  Access	
  -­‐	
  Security	
  Patterns	
  
Secure	
  Database	
  Tables	
  




                                        GRANT SELECT, UPDATE, INSERT, DELETE ON
                                              [TableName] FOR [UserName]
Data	
  Access	
  -­‐	
  Security	
  Patterns	
  
Tenant	
  View	
  Filter	
  




                                    CREATE	
  VIEW	
  TenantEmployees	
  AS	
  	
  
                               SELECT	
  *	
  FROM	
  Employees	
  WHERE	
  TenantID	
  =	
  
                                                      SUSER_SID()
•    Data	
  Confidentiality/Integrity/Availability	
  
•    Data	
  Lineage	
  
•    Data	
  Provenance	
  
•    Data	
  Remanence	
  
 	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  Data	
  Confidentiality/Integrity/Availability	
  




                                                                                                                       Storage	
       Processing	
     Transmission	
  
                                                                                                Confidentiality	
     Symmetric	
      Homomorphic	
          SSL	
  
                                                                                                                     Encryption	
      Encryption	
  
                                                                                                   Integrity	
           MAC	
        Homomorphic	
          SSL	
  
                                                                                                                                       Encryption	
  
                                                                                                  Availability	
     Redundancy	
      Redundancy	
     Redundancy	
  
cloud	
  security	
  	
      forxg	
  vhfxulwb	
  	
  
Homomorphic	
  Encryption	
  




                                cloud	
                      forxg	
  
                                security	
  	
               vhfxulwb	
  	
  

                                cloud	
   security	
  	
     forxg	
   vhfxulwb	
  	
  
Vendor	
                      CVE	
  
            KVM	
                          32	
  
           QEMU	
                          23	
  
          VMWare	
                        126	
  
            XEN	
                         86	
  




•  VM	
  Escape	
  (Host	
  code	
  execution)	
  
•  Guest	
  code	
  execution	
  with	
  privilege	
  
•    Identity	
  Management	
  
•    Access	
  Management	
  
•    Key	
  Management	
  
•    System	
  &	
  Network	
  Auditing	
  
•    Security	
  Monitoring	
  
•    Security	
  Testing	
  &	
  Vulnerability	
  Remediation	
  
•    System	
  &	
  Network	
  Controls	
  
•  Controls	
  over	
  identity	
  information	
  
Identity	
  Management	
  




                             •  Strong	
  Identity	
  Management	
  system	
  for	
  cloud	
  
                                personnel	
  
                             •  Large	
  scale	
  needs	
  for	
  authenticating	
  cloud	
  
                                tenants	
  and	
  users	
  
                             •  Federated	
  Identity	
  
                             •  Audits	
  for	
  legal	
  activities	
  
                             •  Identity	
  Recycle?	
  
                             •  Means	
  to	
  verify	
  assertions	
  of	
  identity	
  by	
  cloud	
  
                                provider	
  personnel	
  
•  Cloud	
  personnel	
  shall	
  have	
  restricted	
  access	
  to	
  
Access	
  Management	
  




                              the	
  customer	
  data	
  
                           •  Multifactor	
  authentication	
  for	
  highly	
  privileged	
  
                              operations	
  
                           •  Large	
  scale	
  needs	
  for	
  authenticating	
  cloud	
  
                              tenants	
  and	
  users	
  
                           •  Least	
  privileged	
  principal	
  and	
  RBAC	
  
                           •  White-­‐listed	
  IPs	
  for	
  remote	
  access	
  by	
  cloud	
  
                              personnel	
  
                           	
  
•  Encryption	
  the	
  key	
  to	
  protect	
  data	
  in	
  transit	
  and	
  
                           at	
  rest	
  
Key	
  Management	
  




                        •  All	
  keys	
  secured	
  properly	
  
                        •  Effective	
  procedures	
  to	
  recover	
  from	
  
                           compromised	
  keys	
  
                        •  Effective	
  procedures	
  for	
  key	
  revocation	
  	
  
                        	
  
System	
  &	
  Network	
  Auditing	
  




                                         •  All	
  security	
  related	
  events	
  must	
  be	
  recorded	
  with	
  
                                            all	
  relevant	
  information	
  
                                         •  Generated	
  audit	
  events	
  must	
  be	
  logged	
  in	
  near	
  
                                            real-­‐time	
  manner	
  
                                         •  Integrity	
  &	
  confidentiality	
  of	
  audit	
  logs	
  should	
  be	
  
                                            protected	
  
                                         •  Audit	
  logs	
  needs	
  to	
  be	
  securely	
  archived	
  
                                         	
  
•  Generation	
  of	
  alerts	
  in	
  recognition	
  of	
  a	
  critical	
  
Security	
  Monitoring	
  




                                security	
  breach	
  
                             •  Delivery	
  of	
  security	
  alerts	
  in	
  deferent	
  means	
  
                                securely	
  
                             •  Cloud	
  wide	
  intrusion	
  and	
  anomaly	
  detection	
  
                             •  Periodic	
  checks	
  to	
  make	
  sure	
  monitoring	
  system	
  
                                runs	
  healthy	
  
                             	
  
•  Well	
  defined	
  set	
  of	
  security	
  test	
  cases	
  
                          •  Separate	
  environments	
  for	
  development,	
  
Security	
  Testing	
  




                             testing,	
  staging	
  and	
  production	
  
                          •  Patch	
  management	
  
System	
  &	
  Network	
  	
  Controls	
  




                                             •  Should	
  be	
  implemented	
  for	
  infrastructure	
  
                                                systems	
  
                                             •  Network	
  isolation	
  in	
  between	
  different	
  functional	
  
                                                areas	
  in	
  the	
  cloud	
  
                                             •  Assure	
  the	
  integrity	
  of	
  OSes,	
  VM	
  images	
  and	
  
                                                infrastructure	
  applications	
  
                                             •  Isolation	
  between	
  different	
  VMs	
  
                                             	
  
•  Abuse	
  &	
  nefarious	
  use	
  of	
  cloud	
  computing	
  
    •  Password/key	
  cracking,	
  DDOS,	
  CAPTCH	
  
       solving	
  farms,	
  building	
  rainbow	
  tables	
  
•  Insecure	
  interfaces	
  and	
  APIs	
  
•  Malicious	
  insiders	
  
•  Shared	
  technology	
  issues	
  
•  Data	
  loss	
  and	
  leakage	
  
•  Account	
  or	
  service	
  hijacking	
  
•  Unknown	
  risk	
  profile	
  
Security in the Cloud

More Related Content

What's hot

5 dani künzli citrix networking news 1
5 dani künzli citrix networking news 15 dani künzli citrix networking news 1
5 dani künzli citrix networking news 1
Digicomp Academy AG
 
Windows Azure Platform
Windows Azure PlatformWindows Azure Platform
Windows Azure Platform
AsmTrash
 
Aras PLM Software Leveraging the Cloud
Aras PLM Software Leveraging the CloudAras PLM Software Leveraging the Cloud
Aras PLM Software Leveraging the Cloud
Aras
 
Deja vu.idc.solutions
Deja vu.idc.solutionsDeja vu.idc.solutions
Deja vu.idc.solutions
dejavusolutions
 
Extending your Data Centre with AWS Sydney Customer Appreciation Day
Extending your Data Centre with AWS Sydney Customer Appreciation DayExtending your Data Centre with AWS Sydney Customer Appreciation Day
Extending your Data Centre with AWS Sydney Customer Appreciation Day
Amazon Web Services
 
Layer 7 & Oracle: Cyber Defense for SOA & REST
Layer 7 & Oracle: Cyber Defense for SOA & RESTLayer 7 & Oracle: Cyber Defense for SOA & REST
Layer 7 & Oracle: Cyber Defense for SOA & REST
CA API Management
 
Deadly Sins Bcs Elite
Deadly Sins Bcs EliteDeadly Sins Bcs Elite
Deadly Sins Bcs Elite
Jon G. Hall
 
Oracle Cloud Computing
Oracle Cloud ComputingOracle Cloud Computing
Oracle Cloud Computing
Freelance PR
 
Layer 7 and Oracle -
Layer 7 and Oracle - Layer 7 and Oracle -
Layer 7 and Oracle -
CA API Management
 
3 customer presentation
3 customer presentation3 customer presentation
3 customer presentation
StarTeamTVChannel
 
Build Resilient Private Cloud
Build Resilient Private CloudBuild Resilient Private Cloud
Build Resilient Private Cloud
Symantec APJ
 
comparative study of Cloud computing tools
comparative study of Cloud computing tools comparative study of Cloud computing tools
comparative study of Cloud computing tools
Aditya Trivedi
 
GTL RIM Offerings
GTL RIM OfferingsGTL RIM Offerings
GTL RIM Offerings
dheerajkureel
 
Aras Leveraging the Cloud for PLM
Aras Leveraging the Cloud for PLMAras Leveraging the Cloud for PLM
Aras Leveraging the Cloud for PLM
Aras
 
KVH Customer Case Study - Aplix Corporatin
KVH Customer Case Study - Aplix CorporatinKVH Customer Case Study - Aplix Corporatin
KVH Customer Case Study - Aplix Corporatin
KVH Co. Ltd.
 
Towards a Federated Cloud Ecosystem
Towards a Federated Cloud EcosystemTowards a Federated Cloud Ecosystem
Towards a Federated Cloud Ecosystem
Clovis Chapman
 
Rfs4000 spec sheet
Rfs4000 spec sheetRfs4000 spec sheet
Rfs4000 spec sheet
Advantec Distribution
 
How to Choose A SOA Gateway from Layer 7
How to Choose A SOA Gateway from Layer 7How to Choose A SOA Gateway from Layer 7
How to Choose A SOA Gateway from Layer 7
CA API Management
 

What's hot (18)

5 dani künzli citrix networking news 1
5 dani künzli citrix networking news 15 dani künzli citrix networking news 1
5 dani künzli citrix networking news 1
 
Windows Azure Platform
Windows Azure PlatformWindows Azure Platform
Windows Azure Platform
 
Aras PLM Software Leveraging the Cloud
Aras PLM Software Leveraging the CloudAras PLM Software Leveraging the Cloud
Aras PLM Software Leveraging the Cloud
 
Deja vu.idc.solutions
Deja vu.idc.solutionsDeja vu.idc.solutions
Deja vu.idc.solutions
 
Extending your Data Centre with AWS Sydney Customer Appreciation Day
Extending your Data Centre with AWS Sydney Customer Appreciation DayExtending your Data Centre with AWS Sydney Customer Appreciation Day
Extending your Data Centre with AWS Sydney Customer Appreciation Day
 
Layer 7 & Oracle: Cyber Defense for SOA & REST
Layer 7 & Oracle: Cyber Defense for SOA & RESTLayer 7 & Oracle: Cyber Defense for SOA & REST
Layer 7 & Oracle: Cyber Defense for SOA & REST
 
Deadly Sins Bcs Elite
Deadly Sins Bcs EliteDeadly Sins Bcs Elite
Deadly Sins Bcs Elite
 
Oracle Cloud Computing
Oracle Cloud ComputingOracle Cloud Computing
Oracle Cloud Computing
 
Layer 7 and Oracle -
Layer 7 and Oracle - Layer 7 and Oracle -
Layer 7 and Oracle -
 
3 customer presentation
3 customer presentation3 customer presentation
3 customer presentation
 
Build Resilient Private Cloud
Build Resilient Private CloudBuild Resilient Private Cloud
Build Resilient Private Cloud
 
comparative study of Cloud computing tools
comparative study of Cloud computing tools comparative study of Cloud computing tools
comparative study of Cloud computing tools
 
GTL RIM Offerings
GTL RIM OfferingsGTL RIM Offerings
GTL RIM Offerings
 
Aras Leveraging the Cloud for PLM
Aras Leveraging the Cloud for PLMAras Leveraging the Cloud for PLM
Aras Leveraging the Cloud for PLM
 
KVH Customer Case Study - Aplix Corporatin
KVH Customer Case Study - Aplix CorporatinKVH Customer Case Study - Aplix Corporatin
KVH Customer Case Study - Aplix Corporatin
 
Towards a Federated Cloud Ecosystem
Towards a Federated Cloud EcosystemTowards a Federated Cloud Ecosystem
Towards a Federated Cloud Ecosystem
 
Rfs4000 spec sheet
Rfs4000 spec sheetRfs4000 spec sheet
Rfs4000 spec sheet
 
How to Choose A SOA Gateway from Layer 7
How to Choose A SOA Gateway from Layer 7How to Choose A SOA Gateway from Layer 7
How to Choose A SOA Gateway from Layer 7
 

Viewers also liked

How to Build, Manage, and Promote APIs
How to Build, Manage, and Promote APIsHow to Build, Manage, and Promote APIs
How to Build, Manage, and Promote APIs
WSO2
 
Rxt demo-part3
Rxt demo-part3Rxt demo-part3
Rxt demo-part3
WSO2
 
人文無學籍行動高中2009第一學期學習計畫
人文無學籍行動高中2009第一學期學習計畫人文無學籍行動高中2009第一學期學習計畫
人文無學籍行動高中2009第一學期學習計畫Adler Yang
 
Ss Wrap Up Session 13 Aug
Ss Wrap Up Session 13 AugSs Wrap Up Session 13 Aug
Ss Wrap Up Session 13 Aug
WSO2
 
Advanced use cases and approaches with stratos paa s
Advanced use cases and approaches with stratos paa sAdvanced use cases and approaches with stratos paa s
Advanced use cases and approaches with stratos paa s
WSO2
 
Private cloud-webinar
Private cloud-webinarPrivate cloud-webinar
Private cloud-webinar
WSO2
 
Quality - The key to successful SOA
Quality - The key to successful SOAQuality - The key to successful SOA
Quality - The key to successful SOA
WSO2
 

Viewers also liked (7)

How to Build, Manage, and Promote APIs
How to Build, Manage, and Promote APIsHow to Build, Manage, and Promote APIs
How to Build, Manage, and Promote APIs
 
Rxt demo-part3
Rxt demo-part3Rxt demo-part3
Rxt demo-part3
 
人文無學籍行動高中2009第一學期學習計畫
人文無學籍行動高中2009第一學期學習計畫人文無學籍行動高中2009第一學期學習計畫
人文無學籍行動高中2009第一學期學習計畫
 
Ss Wrap Up Session 13 Aug
Ss Wrap Up Session 13 AugSs Wrap Up Session 13 Aug
Ss Wrap Up Session 13 Aug
 
Advanced use cases and approaches with stratos paa s
Advanced use cases and approaches with stratos paa sAdvanced use cases and approaches with stratos paa s
Advanced use cases and approaches with stratos paa s
 
Private cloud-webinar
Private cloud-webinarPrivate cloud-webinar
Private cloud-webinar
 
Quality - The key to successful SOA
Quality - The key to successful SOAQuality - The key to successful SOA
Quality - The key to successful SOA
 

Similar to Security in the Cloud

SaaS Challenges & Security Concerns
SaaS Challenges & Security ConcernsSaaS Challenges & Security Concerns
SaaS Challenges & Security Concerns
Kannan Subbiah
 
Kentucky gis
Kentucky gisKentucky gis
Kentucky gis
edsai
 
How to Implement Cloud Security: The Nuts and Bolts of Novell Cloud Security ...
How to Implement Cloud Security: The Nuts and Bolts of Novell Cloud Security ...How to Implement Cloud Security: The Nuts and Bolts of Novell Cloud Security ...
How to Implement Cloud Security: The Nuts and Bolts of Novell Cloud Security ...
Novell
 
How to Implement Cloud Security: The Nuts and Bolts of Novell Cloud Security ...
How to Implement Cloud Security: The Nuts and Bolts of Novell Cloud Security ...How to Implement Cloud Security: The Nuts and Bolts of Novell Cloud Security ...
How to Implement Cloud Security: The Nuts and Bolts of Novell Cloud Security ...
Novell
 
BayThreat Why The Cloud Changes Everything
BayThreat Why The Cloud Changes EverythingBayThreat Why The Cloud Changes Everything
BayThreat Why The Cloud Changes Everything
CloudPassage
 
How Cloud Providers' Business Needs Drive Enterprise Identity & Security
How Cloud Providers' Business Needs Drive Enterprise Identity & SecurityHow Cloud Providers' Business Needs Drive Enterprise Identity & Security
How Cloud Providers' Business Needs Drive Enterprise Identity & Security
Novell
 
Be Prepared for Tomorrow's IT Forecast Great Chance of Hybrid Clouds
Be Prepared for Tomorrow's IT Forecast Great Chance of Hybrid CloudsBe Prepared for Tomorrow's IT Forecast Great Chance of Hybrid Clouds
Be Prepared for Tomorrow's IT Forecast Great Chance of Hybrid Clouds
Eucalyptus Systems, Inc.
 
Be Prepared for Tomorrow's IT Forecast: Great Chance of Hybrid Clouds
Be Prepared for Tomorrow's IT Forecast: Great Chance of Hybrid CloudsBe Prepared for Tomorrow's IT Forecast: Great Chance of Hybrid Clouds
Be Prepared for Tomorrow's IT Forecast: Great Chance of Hybrid Clouds
Eucalyptus Systems, Inc.
 
The Move to the Cloud for Regulated Industries
The Move to the Cloud for Regulated IndustriesThe Move to the Cloud for Regulated Industries
The Move to the Cloud for Regulated Industries
dirkbeth
 
Collaborating with Extranet Partners on SharePoint 2010 - SharePoint Connecti...
Collaborating with Extranet Partners on SharePoint 2010 - SharePoint Connecti...Collaborating with Extranet Partners on SharePoint 2010 - SharePoint Connecti...
Collaborating with Extranet Partners on SharePoint 2010 - SharePoint Connecti...
Michael Noel
 
Windows Azure Overview
Windows Azure OverviewWindows Azure Overview
Windows Azure Overview
Stefano Paluello
 
CLD306 pptx en web
CLD306   pptx en webCLD306   pptx en web
CloudPassage Overview
CloudPassage OverviewCloudPassage Overview
CloudPassage Overview
CloudPassage
 
Patterns of Cloud Applications Using Microsoft Azure Services Platform
Patterns of Cloud Applications Using Microsoft Azure Services PlatformPatterns of Cloud Applications Using Microsoft Azure Services Platform
Patterns of Cloud Applications Using Microsoft Azure Services Platform
David Chou
 
Azure Services Platform
Azure Services PlatformAzure Services Platform
Azure Services Platform
David Chou
 
Smartronix - Building Secure Applications on the AWS Cloud
Smartronix - Building Secure Applications on the AWS CloudSmartronix - Building Secure Applications on the AWS Cloud
Smartronix - Building Secure Applications on the AWS Cloud
Amazon Web Services
 
Cloud Computing : Security and Forensics
Cloud Computing : Security and ForensicsCloud Computing : Security and Forensics
Cloud Computing : Security and Forensics
Govind Maheswaran
 
Moving Web Apps to the Cloud - Iowa User Group Tour, Feb 2012
Moving Web Apps to the Cloud - Iowa User Group Tour, Feb 2012Moving Web Apps to the Cloud - Iowa User Group Tour, Feb 2012
Moving Web Apps to the Cloud - Iowa User Group Tour, Feb 2012
Eric D. Boyd
 
HAD05: Collaborating with Extranet Partners on SharePoint 2010
HAD05: Collaborating with Extranet Partners on SharePoint 2010HAD05: Collaborating with Extranet Partners on SharePoint 2010
HAD05: Collaborating with Extranet Partners on SharePoint 2010
Michael Noel
 
Windows Azure: Is Azure right for you?
Windows Azure: Is Azure right for you?Windows Azure: Is Azure right for you?
Windows Azure: Is Azure right for you?
Intergen
 

Similar to Security in the Cloud (20)

SaaS Challenges & Security Concerns
SaaS Challenges & Security ConcernsSaaS Challenges & Security Concerns
SaaS Challenges & Security Concerns
 
Kentucky gis
Kentucky gisKentucky gis
Kentucky gis
 
How to Implement Cloud Security: The Nuts and Bolts of Novell Cloud Security ...
How to Implement Cloud Security: The Nuts and Bolts of Novell Cloud Security ...How to Implement Cloud Security: The Nuts and Bolts of Novell Cloud Security ...
How to Implement Cloud Security: The Nuts and Bolts of Novell Cloud Security ...
 
How to Implement Cloud Security: The Nuts and Bolts of Novell Cloud Security ...
How to Implement Cloud Security: The Nuts and Bolts of Novell Cloud Security ...How to Implement Cloud Security: The Nuts and Bolts of Novell Cloud Security ...
How to Implement Cloud Security: The Nuts and Bolts of Novell Cloud Security ...
 
BayThreat Why The Cloud Changes Everything
BayThreat Why The Cloud Changes EverythingBayThreat Why The Cloud Changes Everything
BayThreat Why The Cloud Changes Everything
 
How Cloud Providers' Business Needs Drive Enterprise Identity & Security
How Cloud Providers' Business Needs Drive Enterprise Identity & SecurityHow Cloud Providers' Business Needs Drive Enterprise Identity & Security
How Cloud Providers' Business Needs Drive Enterprise Identity & Security
 
Be Prepared for Tomorrow's IT Forecast Great Chance of Hybrid Clouds
Be Prepared for Tomorrow's IT Forecast Great Chance of Hybrid CloudsBe Prepared for Tomorrow's IT Forecast Great Chance of Hybrid Clouds
Be Prepared for Tomorrow's IT Forecast Great Chance of Hybrid Clouds
 
Be Prepared for Tomorrow's IT Forecast: Great Chance of Hybrid Clouds
Be Prepared for Tomorrow's IT Forecast: Great Chance of Hybrid CloudsBe Prepared for Tomorrow's IT Forecast: Great Chance of Hybrid Clouds
Be Prepared for Tomorrow's IT Forecast: Great Chance of Hybrid Clouds
 
The Move to the Cloud for Regulated Industries
The Move to the Cloud for Regulated IndustriesThe Move to the Cloud for Regulated Industries
The Move to the Cloud for Regulated Industries
 
Collaborating with Extranet Partners on SharePoint 2010 - SharePoint Connecti...
Collaborating with Extranet Partners on SharePoint 2010 - SharePoint Connecti...Collaborating with Extranet Partners on SharePoint 2010 - SharePoint Connecti...
Collaborating with Extranet Partners on SharePoint 2010 - SharePoint Connecti...
 
Windows Azure Overview
Windows Azure OverviewWindows Azure Overview
Windows Azure Overview
 
CLD306 pptx en web
CLD306   pptx en webCLD306   pptx en web
CLD306 pptx en web
 
CloudPassage Overview
CloudPassage OverviewCloudPassage Overview
CloudPassage Overview
 
Patterns of Cloud Applications Using Microsoft Azure Services Platform
Patterns of Cloud Applications Using Microsoft Azure Services PlatformPatterns of Cloud Applications Using Microsoft Azure Services Platform
Patterns of Cloud Applications Using Microsoft Azure Services Platform
 
Azure Services Platform
Azure Services PlatformAzure Services Platform
Azure Services Platform
 
Smartronix - Building Secure Applications on the AWS Cloud
Smartronix - Building Secure Applications on the AWS CloudSmartronix - Building Secure Applications on the AWS Cloud
Smartronix - Building Secure Applications on the AWS Cloud
 
Cloud Computing : Security and Forensics
Cloud Computing : Security and ForensicsCloud Computing : Security and Forensics
Cloud Computing : Security and Forensics
 
Moving Web Apps to the Cloud - Iowa User Group Tour, Feb 2012
Moving Web Apps to the Cloud - Iowa User Group Tour, Feb 2012Moving Web Apps to the Cloud - Iowa User Group Tour, Feb 2012
Moving Web Apps to the Cloud - Iowa User Group Tour, Feb 2012
 
HAD05: Collaborating with Extranet Partners on SharePoint 2010
HAD05: Collaborating with Extranet Partners on SharePoint 2010HAD05: Collaborating with Extranet Partners on SharePoint 2010
HAD05: Collaborating with Extranet Partners on SharePoint 2010
 
Windows Azure: Is Azure right for you?
Windows Azure: Is Azure right for you?Windows Azure: Is Azure right for you?
Windows Azure: Is Azure right for you?
 

More from WSO2

Accelerate Enterprise Software Engineering with Platformless
Accelerate Enterprise Software Engineering with PlatformlessAccelerate Enterprise Software Engineering with Platformless
Accelerate Enterprise Software Engineering with Platformless
WSO2
 
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital TransformationWSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2
 
architecting-ai-in-the-enterprise-apis-and-applications.pdf
architecting-ai-in-the-enterprise-apis-and-applications.pdfarchitecting-ai-in-the-enterprise-apis-and-applications.pdf
architecting-ai-in-the-enterprise-apis-and-applications.pdf
WSO2
 
Driving Innovation: Scania's API Revolution with WSO2
Driving Innovation: Scania's API Revolution with WSO2Driving Innovation: Scania's API Revolution with WSO2
Driving Innovation: Scania's API Revolution with WSO2
WSO2
 
Less Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data PlatformLess Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data Platform
WSO2
 
Modernizing Legacy Systems Using Ballerina
Modernizing Legacy Systems Using BallerinaModernizing Legacy Systems Using Ballerina
Modernizing Legacy Systems Using Ballerina
WSO2
 
WSO2CON 2024 - Unlocking the Identity: Embracing CIAM 2.0 for a Competitive A...
WSO2CON 2024 - Unlocking the Identity: Embracing CIAM 2.0 for a Competitive A...WSO2CON 2024 - Unlocking the Identity: Embracing CIAM 2.0 for a Competitive A...
WSO2CON 2024 - Unlocking the Identity: Embracing CIAM 2.0 for a Competitive A...
WSO2
 
WSO2CON 2024 Slides - Unlocking Value with AI
WSO2CON 2024 Slides - Unlocking Value with AIWSO2CON 2024 Slides - Unlocking Value with AI
WSO2CON 2024 Slides - Unlocking Value with AI
WSO2
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
WSO2
 
Quantum Leap in Next-Generation Computing
Quantum Leap in Next-Generation ComputingQuantum Leap in Next-Generation Computing
Quantum Leap in Next-Generation Computing
WSO2
 
WSO2CON 2024 - Elevating the Integration Game to the Cloud
WSO2CON 2024 - Elevating the Integration Game to the CloudWSO2CON 2024 - Elevating the Integration Game to the Cloud
WSO2CON 2024 - Elevating the Integration Game to the Cloud
WSO2
 
WSO2CON 2024 - OSU & WSO2: A Decade Journey in Integration & Innovation
WSO2CON 2024 - OSU & WSO2: A Decade Journey in Integration & InnovationWSO2CON 2024 - OSU & WSO2: A Decade Journey in Integration & Innovation
WSO2CON 2024 - OSU & WSO2: A Decade Journey in Integration & Innovation
WSO2
 
WSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open Source
WSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open SourceWSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open Source
WSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open Source
WSO2
 
WSO2CON 2024 Slides - Open Source to SaaS
WSO2CON 2024 Slides - Open Source to SaaSWSO2CON 2024 Slides - Open Source to SaaS
WSO2CON 2024 Slides - Open Source to SaaS
WSO2
 
WSO2CON 2024 - Does Open Source Still Matter?
WSO2CON 2024 - Does Open Source Still Matter?WSO2CON 2024 - Does Open Source Still Matter?
WSO2CON 2024 - Does Open Source Still Matter?
WSO2
 
WSO2CON 2024 - IoT Needs CIAM: The Importance of Centralized IAM in a Growing...
WSO2CON 2024 - IoT Needs CIAM: The Importance of Centralized IAM in a Growing...WSO2CON 2024 - IoT Needs CIAM: The Importance of Centralized IAM in a Growing...
WSO2CON 2024 - IoT Needs CIAM: The Importance of Centralized IAM in a Growing...
WSO2
 
WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...
WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...
WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...
WSO2
 
WSO2CON 2024 - Software Engineering for Digital Businesses
WSO2CON 2024 - Software Engineering for Digital BusinessesWSO2CON 2024 - Software Engineering for Digital Businesses
WSO2CON 2024 - Software Engineering for Digital Businesses
WSO2
 
WSO2CON 2024 - Navigating API Complexity: REST, GraphQL, gRPC, Websocket, Web...
WSO2CON 2024 - Navigating API Complexity: REST, GraphQL, gRPC, Websocket, Web...WSO2CON 2024 - Navigating API Complexity: REST, GraphQL, gRPC, Websocket, Web...
WSO2CON 2024 - Navigating API Complexity: REST, GraphQL, gRPC, Websocket, Web...
WSO2
 
WSO2CON 2024 - Designing Event-Driven Enterprises: Stories of Transformation
WSO2CON 2024 - Designing Event-Driven Enterprises: Stories of TransformationWSO2CON 2024 - Designing Event-Driven Enterprises: Stories of Transformation
WSO2CON 2024 - Designing Event-Driven Enterprises: Stories of Transformation
WSO2
 

More from WSO2 (20)

Accelerate Enterprise Software Engineering with Platformless
Accelerate Enterprise Software Engineering with PlatformlessAccelerate Enterprise Software Engineering with Platformless
Accelerate Enterprise Software Engineering with Platformless
 
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital TransformationWSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
 
architecting-ai-in-the-enterprise-apis-and-applications.pdf
architecting-ai-in-the-enterprise-apis-and-applications.pdfarchitecting-ai-in-the-enterprise-apis-and-applications.pdf
architecting-ai-in-the-enterprise-apis-and-applications.pdf
 
Driving Innovation: Scania's API Revolution with WSO2
Driving Innovation: Scania's API Revolution with WSO2Driving Innovation: Scania's API Revolution with WSO2
Driving Innovation: Scania's API Revolution with WSO2
 
Less Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data PlatformLess Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data Platform
 
Modernizing Legacy Systems Using Ballerina
Modernizing Legacy Systems Using BallerinaModernizing Legacy Systems Using Ballerina
Modernizing Legacy Systems Using Ballerina
 
WSO2CON 2024 - Unlocking the Identity: Embracing CIAM 2.0 for a Competitive A...
WSO2CON 2024 - Unlocking the Identity: Embracing CIAM 2.0 for a Competitive A...WSO2CON 2024 - Unlocking the Identity: Embracing CIAM 2.0 for a Competitive A...
WSO2CON 2024 - Unlocking the Identity: Embracing CIAM 2.0 for a Competitive A...
 
WSO2CON 2024 Slides - Unlocking Value with AI
WSO2CON 2024 Slides - Unlocking Value with AIWSO2CON 2024 Slides - Unlocking Value with AI
WSO2CON 2024 Slides - Unlocking Value with AI
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
Quantum Leap in Next-Generation Computing
Quantum Leap in Next-Generation ComputingQuantum Leap in Next-Generation Computing
Quantum Leap in Next-Generation Computing
 
WSO2CON 2024 - Elevating the Integration Game to the Cloud
WSO2CON 2024 - Elevating the Integration Game to the CloudWSO2CON 2024 - Elevating the Integration Game to the Cloud
WSO2CON 2024 - Elevating the Integration Game to the Cloud
 
WSO2CON 2024 - OSU & WSO2: A Decade Journey in Integration & Innovation
WSO2CON 2024 - OSU & WSO2: A Decade Journey in Integration & InnovationWSO2CON 2024 - OSU & WSO2: A Decade Journey in Integration & Innovation
WSO2CON 2024 - OSU & WSO2: A Decade Journey in Integration & Innovation
 
WSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open Source
WSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open SourceWSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open Source
WSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open Source
 
WSO2CON 2024 Slides - Open Source to SaaS
WSO2CON 2024 Slides - Open Source to SaaSWSO2CON 2024 Slides - Open Source to SaaS
WSO2CON 2024 Slides - Open Source to SaaS
 
WSO2CON 2024 - Does Open Source Still Matter?
WSO2CON 2024 - Does Open Source Still Matter?WSO2CON 2024 - Does Open Source Still Matter?
WSO2CON 2024 - Does Open Source Still Matter?
 
WSO2CON 2024 - IoT Needs CIAM: The Importance of Centralized IAM in a Growing...
WSO2CON 2024 - IoT Needs CIAM: The Importance of Centralized IAM in a Growing...WSO2CON 2024 - IoT Needs CIAM: The Importance of Centralized IAM in a Growing...
WSO2CON 2024 - IoT Needs CIAM: The Importance of Centralized IAM in a Growing...
 
WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...
WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...
WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...
 
WSO2CON 2024 - Software Engineering for Digital Businesses
WSO2CON 2024 - Software Engineering for Digital BusinessesWSO2CON 2024 - Software Engineering for Digital Businesses
WSO2CON 2024 - Software Engineering for Digital Businesses
 
WSO2CON 2024 - Navigating API Complexity: REST, GraphQL, gRPC, Websocket, Web...
WSO2CON 2024 - Navigating API Complexity: REST, GraphQL, gRPC, Websocket, Web...WSO2CON 2024 - Navigating API Complexity: REST, GraphQL, gRPC, Websocket, Web...
WSO2CON 2024 - Navigating API Complexity: REST, GraphQL, gRPC, Websocket, Web...
 
WSO2CON 2024 - Designing Event-Driven Enterprises: Stories of Transformation
WSO2CON 2024 - Designing Event-Driven Enterprises: Stories of TransformationWSO2CON 2024 - Designing Event-Driven Enterprises: Stories of Transformation
WSO2CON 2024 - Designing Event-Driven Enterprises: Stories of Transformation
 

Recently uploaded

JavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green MasterplanJavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green Masterplan
Miro Wengner
 
AWS Certified Solutions Architect Associate (SAA-C03)
AWS Certified Solutions Architect Associate (SAA-C03)AWS Certified Solutions Architect Associate (SAA-C03)
AWS Certified Solutions Architect Associate (SAA-C03)
HarpalGohil4
 
"Scaling RAG Applications to serve millions of users", Kevin Goedecke
"Scaling RAG Applications to serve millions of users",  Kevin Goedecke"Scaling RAG Applications to serve millions of users",  Kevin Goedecke
"Scaling RAG Applications to serve millions of users", Kevin Goedecke
Fwdays
 
Discover the Unseen: Tailored Recommendation of Unwatched Content
Discover the Unseen: Tailored Recommendation of Unwatched ContentDiscover the Unseen: Tailored Recommendation of Unwatched Content
Discover the Unseen: Tailored Recommendation of Unwatched Content
ScyllaDB
 
QR Secure: A Hybrid Approach Using Machine Learning and Security Validation F...
QR Secure: A Hybrid Approach Using Machine Learning and Security Validation F...QR Secure: A Hybrid Approach Using Machine Learning and Security Validation F...
QR Secure: A Hybrid Approach Using Machine Learning and Security Validation F...
AlexanderRichford
 
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptxPRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
christinelarrosa
 
Mutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented ChatbotsMutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented Chatbots
Pablo Gómez Abajo
 
Lee Barnes - Path to Becoming an Effective Test Automation Engineer.pdf
Lee Barnes - Path to Becoming an Effective Test Automation Engineer.pdfLee Barnes - Path to Becoming an Effective Test Automation Engineer.pdf
Lee Barnes - Path to Becoming an Effective Test Automation Engineer.pdf
leebarnesutopia
 
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsConnector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
DianaGray10
 
Day 2 - Intro to UiPath Studio Fundamentals
Day 2 - Intro to UiPath Studio FundamentalsDay 2 - Intro to UiPath Studio Fundamentals
Day 2 - Intro to UiPath Studio Fundamentals
UiPathCommunity
 
Leveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and StandardsLeveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and Standards
Neo4j
 
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeckPoznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
FilipTomaszewski5
 
GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)
Javier Junquera
 
Dandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity serverDandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity server
Antonios Katsarakis
 
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
DanBrown980551
 
Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |
AstuteBusiness
 
QA or the Highway - Component Testing: Bridging the gap between frontend appl...
QA or the Highway - Component Testing: Bridging the gap between frontend appl...QA or the Highway - Component Testing: Bridging the gap between frontend appl...
QA or the Highway - Component Testing: Bridging the gap between frontend appl...
zjhamm304
 
Northern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving | Modern Metal Trim, Nameplates and Appliance PanelsNorthern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving
 
Session 1 - Intro to Robotic Process Automation.pdf
Session 1 - Intro to Robotic Process Automation.pdfSession 1 - Intro to Robotic Process Automation.pdf
Session 1 - Intro to Robotic Process Automation.pdf
UiPathCommunity
 
A Deep Dive into ScyllaDB's Architecture
A Deep Dive into ScyllaDB's ArchitectureA Deep Dive into ScyllaDB's Architecture
A Deep Dive into ScyllaDB's Architecture
ScyllaDB
 

Recently uploaded (20)

JavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green MasterplanJavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green Masterplan
 
AWS Certified Solutions Architect Associate (SAA-C03)
AWS Certified Solutions Architect Associate (SAA-C03)AWS Certified Solutions Architect Associate (SAA-C03)
AWS Certified Solutions Architect Associate (SAA-C03)
 
"Scaling RAG Applications to serve millions of users", Kevin Goedecke
"Scaling RAG Applications to serve millions of users",  Kevin Goedecke"Scaling RAG Applications to serve millions of users",  Kevin Goedecke
"Scaling RAG Applications to serve millions of users", Kevin Goedecke
 
Discover the Unseen: Tailored Recommendation of Unwatched Content
Discover the Unseen: Tailored Recommendation of Unwatched ContentDiscover the Unseen: Tailored Recommendation of Unwatched Content
Discover the Unseen: Tailored Recommendation of Unwatched Content
 
QR Secure: A Hybrid Approach Using Machine Learning and Security Validation F...
QR Secure: A Hybrid Approach Using Machine Learning and Security Validation F...QR Secure: A Hybrid Approach Using Machine Learning and Security Validation F...
QR Secure: A Hybrid Approach Using Machine Learning and Security Validation F...
 
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptxPRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
 
Mutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented ChatbotsMutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented Chatbots
 
Lee Barnes - Path to Becoming an Effective Test Automation Engineer.pdf
Lee Barnes - Path to Becoming an Effective Test Automation Engineer.pdfLee Barnes - Path to Becoming an Effective Test Automation Engineer.pdf
Lee Barnes - Path to Becoming an Effective Test Automation Engineer.pdf
 
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsConnector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
 
Day 2 - Intro to UiPath Studio Fundamentals
Day 2 - Intro to UiPath Studio FundamentalsDay 2 - Intro to UiPath Studio Fundamentals
Day 2 - Intro to UiPath Studio Fundamentals
 
Leveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and StandardsLeveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and Standards
 
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeckPoznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
 
GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)
 
Dandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity serverDandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity server
 
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
 
Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |
 
QA or the Highway - Component Testing: Bridging the gap between frontend appl...
QA or the Highway - Component Testing: Bridging the gap between frontend appl...QA or the Highway - Component Testing: Bridging the gap between frontend appl...
QA or the Highway - Component Testing: Bridging the gap between frontend appl...
 
Northern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving | Modern Metal Trim, Nameplates and Appliance PanelsNorthern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
 
Session 1 - Intro to Robotic Process Automation.pdf
Session 1 - Intro to Robotic Process Automation.pdfSession 1 - Intro to Robotic Process Automation.pdf
Session 1 - Intro to Robotic Process Automation.pdf
 
A Deep Dive into ScyllaDB's Architecture
A Deep Dive into ScyllaDB's ArchitectureA Deep Dive into ScyllaDB's Architecture
A Deep Dive into ScyllaDB's Architecture
 

Security in the Cloud

  • 1. Prabath  Siriwardena  –  Software  Architect,  WSO2  
  • 6. As  a  Service  ?   Pay  per  use   Resource  Sharing   Self  service  provisioning   Unlimited  Resource  
  • 7. •  In  public   –  IaaS,  PaaS,  SaaS  available  on  the  Internet   –  Use  one  of  the  cloud  service  providers   –  Information  is  stored  and  managed  by  provider  under  SLA   •  In  Private   –  Have  a  cloud,  in-­‐house   –  IaaS  provides  by  hardware  on  your  data  centers   –  PaaS  running  on  your  IaaS   –  SaaS  executing  on  your  PaaS   •  Or  use  both   –  Hybrid  Cloud  
  • 9. Enterprise  IT  in  2015+  
  • 10. What  do  you  expect  from  a  platform  ?  
  • 11. •  Public  Cloud   –  Fast  time  to  market   –  Makes  it  easier  to  write  scalable  code   •  Private  Cloud   –  Give  each  team  their  own  instant  infrastructure   –  Govern  centrally  but  code  and  deploy  by  team   –  Automated  governance,  registry,  identity   –  Instant  BAM  
  • 12.
  • 13. •  Distributed  /  Dynamically  Wired  (works  properly  in  the  cloud)   –  Finds  services  across  applications     –  Reuse  services  from  other  departments  e.g.  People  information  required  by  all  of  Finance,   Engineering  and  Sales   •  Elastic  (uses  the  cloud  efficiently)   –  Scales  up  and  down  as  needed   –  Some  departments  might  want  varying  resources  with  varying  bandwidth  with  varying   priority   •  Multi-­‐tenant  (only  costs  when  you  use  it)   –  Virtual  isolated  instances  to  facilitate  isolation  between  departments  etc.   –  e.g.  Sales  vs.  Finance  tenants.  Finance  want  complete  isolation  for  some  sensitive  services   •  Self-­‐service  (in  the  hands  of  users)   –  De-­‐centralized  creation  and  management  of  tenants   –  No  need  to  come  to  IT  department  to  gain  access  –  served  via  portal  –  no  need  to  be  on  the   queue  or  waiting  list   •  Granularly  Billed  and  Metered  (pay  for  just  what  you  use)   –  Allocate  costs  to  exactly  who  uses  them   –  Bill  and  cost  various  departments  per  use     –  Get  rid  of  the  situations  where  unused  computing  assets  lying  in  one  department  while  the   other  departments  are  starving  for  the  same   •  Incrementally  Deployed  and  Tested  (supports  seamless  live  upgrade)   –  Not  disrupt  other  operations  
  • 14.
  • 15.
  • 16. Provider IAAS   N   F   Application   N   F   Middleware   N   F   Guest  OS   F   N   Hypervisor   F   N   Storage   F   N   Hardware   Organization F   N   Network  
  • 17. Provider PAAS   M   L   Application   M   L   Middleware   F   N   Guest  OS   F   N   Hypervisor   F   N   Storage   F   N   Hardware   Organization F   N   Network  
  • 18. Provider SAAS   M   L   Application   F   N   Middleware   F   N   Guest  OS   F   N   Hypervisor   F   N   Storage   F   N   Hardware   Organization F   N   Network  
  • 19. IaaS   PaaS   SaaS   Data   Organization   Organization   Organization   Applications   Organization   Shared   Service  Provider   Systems   Service  Provider   Service  Provider   Service  Provider   Storage   Service  Provider   Service  Provider   Service  Provider   Network   Service  Provider   Service  Provider   Service  Provider  
  • 20. SAAS   More  Control   PAAS   IAAS  
  • 21. Private   Public   Compliance   Organization   Service  Provider   Governance   Organization   Service  Provider   Security   Organization   Service  Provider   Operations   Organization   Service  Provider   Risk   Organization   Shared   Cloud  Owner   Organization   Service  Provider    or  leased   Use  limited  to     Organization   Public  
  • 22. Public   Ownership   Hybrid   Private  
  • 23.
  • 24.
  • 25.
  • 27. •  Can  be  used  to  give  departments  their  own   PaaS  world  to  operate  in   •  Yet  all  share  same  hardware  resources   –  Not  all  departments  need  resources  at  the  same  time   –  Really  pay  per  use   –  Opportunity  to  unify    departmental  level  small  server  pools     •  Drastically  reduce  admin/management  costs   –  One  software  installation  to  maintain   •  Use  differentiated  QoS  
  • 28. Multi-­‐tenancy   ¡  Three  possible  ways   §  Machine  per  tenant   §  VM  per  tenant   §  Share  machine/VM  across  tenants   ¡  Challenges   §  Data  isolation   §  Logic  isolation     §  Security  
  • 29. Data  Isolation  –  Separated  DB   Multi-­‐tenancy  
  • 30. Data  Isolation  –  Shared  DB  /  Separate  Schema   Multi-­‐tenancy  
  • 31. Data  Isolation  –  Shared  DB  /  Shared  Schema   Multi-­‐tenancy  
  • 32. Data  Access  -­‐  Security  Patterns   Trusted  Database  Connections  
  • 33. Data  Access  -­‐  Security  Patterns   Trusted  Database  Connections  
  • 34. Data  Access  -­‐  Security  Patterns   Trusted  Database  Connections  
  • 35. Data  Access  -­‐  Security  Patterns   Secure  Database  Tables   GRANT SELECT, UPDATE, INSERT, DELETE ON [TableName] FOR [UserName]
  • 36. Data  Access  -­‐  Security  Patterns   Tenant  View  Filter   CREATE  VIEW  TenantEmployees  AS     SELECT  *  FROM  Employees  WHERE  TenantID  =   SUSER_SID()
  • 37. •  Data  Confidentiality/Integrity/Availability   •  Data  Lineage   •  Data  Provenance   •  Data  Remanence  
  • 38.                      Data  Confidentiality/Integrity/Availability   Storage   Processing   Transmission   Confidentiality   Symmetric   Homomorphic   SSL   Encryption   Encryption   Integrity   MAC   Homomorphic   SSL   Encryption   Availability   Redundancy   Redundancy   Redundancy  
  • 39. cloud  security     forxg  vhfxulwb     Homomorphic  Encryption   cloud   forxg   security     vhfxulwb     cloud   security     forxg   vhfxulwb    
  • 40.
  • 41. Vendor   CVE   KVM   32   QEMU   23   VMWare   126   XEN   86   •  VM  Escape  (Host  code  execution)   •  Guest  code  execution  with  privilege  
  • 42. •  Identity  Management   •  Access  Management   •  Key  Management   •  System  &  Network  Auditing   •  Security  Monitoring   •  Security  Testing  &  Vulnerability  Remediation   •  System  &  Network  Controls  
  • 43. •  Controls  over  identity  information   Identity  Management   •  Strong  Identity  Management  system  for  cloud   personnel   •  Large  scale  needs  for  authenticating  cloud   tenants  and  users   •  Federated  Identity   •  Audits  for  legal  activities   •  Identity  Recycle?   •  Means  to  verify  assertions  of  identity  by  cloud   provider  personnel  
  • 44. •  Cloud  personnel  shall  have  restricted  access  to   Access  Management   the  customer  data   •  Multifactor  authentication  for  highly  privileged   operations   •  Large  scale  needs  for  authenticating  cloud   tenants  and  users   •  Least  privileged  principal  and  RBAC   •  White-­‐listed  IPs  for  remote  access  by  cloud   personnel    
  • 45. •  Encryption  the  key  to  protect  data  in  transit  and   at  rest   Key  Management   •  All  keys  secured  properly   •  Effective  procedures  to  recover  from   compromised  keys   •  Effective  procedures  for  key  revocation      
  • 46. System  &  Network  Auditing   •  All  security  related  events  must  be  recorded  with   all  relevant  information   •  Generated  audit  events  must  be  logged  in  near   real-­‐time  manner   •  Integrity  &  confidentiality  of  audit  logs  should  be   protected   •  Audit  logs  needs  to  be  securely  archived    
  • 47. •  Generation  of  alerts  in  recognition  of  a  critical   Security  Monitoring   security  breach   •  Delivery  of  security  alerts  in  deferent  means   securely   •  Cloud  wide  intrusion  and  anomaly  detection   •  Periodic  checks  to  make  sure  monitoring  system   runs  healthy    
  • 48. •  Well  defined  set  of  security  test  cases   •  Separate  environments  for  development,   Security  Testing   testing,  staging  and  production   •  Patch  management  
  • 49. System  &  Network    Controls   •  Should  be  implemented  for  infrastructure   systems   •  Network  isolation  in  between  different  functional   areas  in  the  cloud   •  Assure  the  integrity  of  OSes,  VM  images  and   infrastructure  applications   •  Isolation  between  different  VMs    
  • 50. •  Abuse  &  nefarious  use  of  cloud  computing   •  Password/key  cracking,  DDOS,  CAPTCH   solving  farms,  building  rainbow  tables   •  Insecure  interfaces  and  APIs   •  Malicious  insiders   •  Shared  technology  issues   •  Data  loss  and  leakage   •  Account  or  service  hijacking   •  Unknown  risk  profile