security with cloud computing

12
MARTIN BIOH MARTIN BIOH RES-531 RES-531 PROF. DOUGH EARHART PROF. DOUGH EARHART SECURITY ISSUES THAT SECURITY ISSUES THAT AFFECT CLOUD COMPUTING AFFECT CLOUD COMPUTING DATA STORAGE DATA STORAGE

Upload: martin-bioh

Post on 18-Nov-2014

771 views

Category:

Documents


6 download

DESCRIPTION

Security Issues Affacting Cloud Computing

TRANSCRIPT

Page 1: Security with Cloud Computing

MARTIN BIOHMARTIN BIOHRES-531RES-531

PROF. DOUGH EARHARTPROF. DOUGH EARHART

SECURITY ISSUES THAT SECURITY ISSUES THAT AFFECT CLOUD AFFECT CLOUD

COMPUTING DATA COMPUTING DATA STORAGESTORAGE

Page 2: Security with Cloud Computing

SECURITY PROBLEM SECURITY PROBLEM WITH CLOUD WITH CLOUD COMPUTINGCOMPUTING

What is cloud computing in the What is cloud computing in the first place?first place?

Cloud Computing is a metaphor for Cloud Computing is a metaphor for the internet “the Cloud”, Cloud the internet “the Cloud”, Cloud

computing is virtual servers available computing is virtual servers available over the internet over the internet

Cloud computing is also known as Cloud computing is also known as SaaS SaaS (Software as a Service). (Software as a Service).

Page 3: Security with Cloud Computing

Problems with Cloud Problems with Cloud Computing StorageComputing Storage

I.I. How do companies make informed How do companies make informed decisions about data storage in the decisions about data storage in the cloud? cloud?

II.II. How do companies protect the How do companies protect the privacy of the stored data in the privacy of the stored data in the cloud?cloud?

III.III. How is compliance and quality How is compliance and quality controlled in the cloud?controlled in the cloud?

Page 4: Security with Cloud Computing

Purpose of My ResearchPurpose of My Research

The purpose of this research is to The purpose of this research is to examine the basic security examine the basic security protection method, compliance and protection method, compliance and how companies can make informed how companies can make informed decisions and determine whether decisions and determine whether data stored in the cloud have data stored in the cloud have sufficient privacy protection for sufficient privacy protection for customers and meet technical and customers and meet technical and regulatory issues. regulatory issues.

Page 5: Security with Cloud Computing

What Companies needs to What Companies needs to know Before saving in the know Before saving in the

CloudCloud What service are we contracting for and What service are we contracting for and

what are the vendor’s records what are the vendor’s records management and compliance obligations?management and compliance obligations?

How is information destroyed?How is information destroyed? What are the vendor’s policies for What are the vendor’s policies for

backups, replication, or failover?backups, replication, or failover? What is the provider’s internal audit What is the provider’s internal audit

process?process? Is the vendor open to being audited Is the vendor open to being audited

for compliance? for compliance?

Page 6: Security with Cloud Computing

Recommendations to Recommendations to Consider Before any Consider Before any

companies contract a Cloud companies contract a Cloud providerprovider

How secure is the solution you're How secure is the solution you're considering considering

Is your data available from anywhere Is your data available from anywhere so that you can use it as a means of so that you can use it as a means of disaster recovery? Does the provider disaster recovery? Does the provider have a disaster recovery plan of its have a disaster recovery plan of its own? own?

Page 7: Security with Cloud Computing

CONT’ 5CONT’ 5

Are there limits on the scalability? What Are there limits on the scalability? What happens if you grow beyond whathappens if you grow beyond what

you originally planned and contracted you originally planned and contracted for?”for?”

Does the provider have a track record Does the provider have a track record and enough customers to be and enough customers to be considered stable? considered stable?

Is the provider's storage located in a Is the provider's storage located in a real data center?real data center?

Page 8: Security with Cloud Computing

Privacy and SecurityPrivacy and Security

First among cloud computing data First among cloud computing data storage issues is security and privacy storage issues is security and privacy

In fact, a Software as a Services In fact, a Software as a Services (SaaS) provider may be relying on (SaaS) provider may be relying on other external providers for its other external providers for its backbone, infrastructure, and data backbone, infrastructure, and data storage. storage.

Page 9: Security with Cloud Computing

ComplianceCompliance

Cloud computing storage places Cloud computing storage places business data into the hands of an business data into the hands of an outside provider, cloud computing outside provider, cloud computing makes regulatory compliance makes regulatory compliance inherently riskier and more complex inherently riskier and more complex than it is when systems are maintained than it is when systems are maintained in-house. Loss of direct oversight in-house. Loss of direct oversight means that the client company must means that the client company must verify that the service provider is verify that the service provider is working to ensure that data security working to ensure that data security and integrity are ironclad.and integrity are ironclad.

Page 10: Security with Cloud Computing

ComplianceCompliance

Cloud compliance is difficult because Cloud compliance is difficult because you do not know where you data are you do not know where you data are located.located.

Not only does an organization not know Not only does an organization not know what is being done with its data, it may what is being done with its data, it may not even know who the providers are. not even know who the providers are. Cloud computing models ignore these Cloud computing models ignore these problems and make compliance and problems and make compliance and verification of compliance difficult, if not verification of compliance difficult, if not impossible. impossible.

Page 11: Security with Cloud Computing

ConclusionConclusion

Cloud computing storage has Cloud computing storage has become a hot term in the last few become a hot term in the last few years, but a clear description of what years, but a clear description of what it is, what it can do, and why it is, what it can do, and why companies might use it is often companies might use it is often difficult to find difficult to find

Cloud computing storage may not be Cloud computing storage may not be suitable for all businesses. suitable for all businesses. Security/privacy and Compliance are Security/privacy and Compliance are a major concern. a major concern.

Page 12: Security with Cloud Computing

Cont’ ConclusionCont’ Conclusion

Cloud computing storage may be Cloud computing storage may be affordable and suitable for small affordable and suitable for small businesses but certainly can not businesses but certainly can not replace the traditional way of storing replace the traditional way of storing customer data.customer data.