cloud computing security

18
Leron Zinatullin Cloud Computing Security www.zinatullin.com

Upload: neicher

Post on 13-Dec-2014

805 views

Category:

Technology


1 download

DESCRIPTION

http://www.zinatullin.com

TRANSCRIPT

Page 1: Cloud Computing Security

Leron Zinatullin

Cloud Computing Security

www.zinatullin.com

Page 2: Cloud Computing Security

Summary

• Overview• Benefits• Concerns• Threats• Vulnerabilities• Countermeasures• Conclusion

Page 3: Cloud Computing Security
Page 4: Cloud Computing Security

Typical Network Security Threats

Page 5: Cloud Computing Security

“I don’t understand what we would do differently in the light of cloud computing other than change the wording of some of our ads. ” Larry Ellison, CEO, Oracle

Page 6: Cloud Computing Security

Cloud computing is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction.Mell, Peter, and Timothy Grance. "The NIST definition of cloud computing." NIST special publication 800 (2011): 145.

Page 7: Cloud Computing Security

Cloud Definition Framework

Page 8: Cloud Computing Security

Benefits of Cloud Computing

• Minimized capital expenditure• Location and device independence• Utilization and efficiency

improvement• Very high scalability• High computing power

Page 9: Cloud Computing Security

Concerns in using Cloud Computing

Page 10: Cloud Computing Security

Aspects of Cloud Computing Security

Pronemon Institute – April 2011 – Survey of 127 US and EU cloud service providers

Page 11: Cloud Computing Security

Threats-Vulnerabilities-Countermeasures

Page 12: Cloud Computing Security

Threats

• Data Breaches• Data Loss • Account or Service Traffic Hijacking• Insecure APIs• Denial of Service (DoS)• Malicious insiders • Abuse of Nefarious Use • Insufficient due diligence • Shared Technology Vulnerabilities

Page 13: Cloud Computing Security

Vulnerabilities

• Session Riding and Hijacking • Reliability and Availability of Service • Insecure Cryptography • Data Protection and Portability • Virtual Machine Escape • Vendor Lock-in • Internet Dependency

Page 14: Cloud Computing Security

Countermeasures

• Policies and procedures• Software configurations• Encryption• Separation of duties • Identity management • Good Service Level Agreement

Page 15: Cloud Computing Security

Pros and Cons

NIST Guidelines on Security and Privacy in Public Cloud Computing

Page 16: Cloud Computing Security

Summary

• Overview• Benefits• Concerns• Threats• Vulnerabilities• Countermeasures• Conclusion

Page 17: Cloud Computing Security

Thank you!

Page 18: Cloud Computing Security

Questions?