0% found this document useful (0 votes)
14 views17 pages

LM 12 Slides

The document discusses the security aspects of cloud computing, emphasizing the importance of effective risk management and the need for organizations to adopt a comprehensive cloud security strategy. It outlines various security risks associated with cloud services, including data location, provider scrutiny, and shared environments. Additionally, it provides a simplified framework for cloud security management, operations, and technology considerations.

Uploaded by

babayagaboss7
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
14 views17 pages

LM 12 Slides

The document discusses the security aspects of cloud computing, emphasizing the importance of effective risk management and the need for organizations to adopt a comprehensive cloud security strategy. It outlines various security risks associated with cloud services, including data location, provider scrutiny, and shared environments. Additionally, it provides a simplified framework for cloud security management, operations, and technology considerations.

Uploaded by

babayagaboss7
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 17

LM12 Cloud (Computing) Security

Dr. Liang Zhao


Road Map
Security
WLAN Mobile
Introduction Auditing & Risk
Security Security
Analysis

Evolution of WLAN Mobile Network


Overview Evolution of Cloud
Wireless Network Overview (optional)

Infor. Security WLAN Threats Cellular Network Confidentiality and


Essentials & Vulnerabilities Security (optional) Integrity of Cloud

WLAN Mobile Security Cloud Threats &


Security Threats Vulnerabilities

WLAN Mobile Devices


Security Tools Security (optional) Cloud Security

2
Outline
Is Cloud Computing Secure?

Security Characteristics

Security Risks

Cloud Security Simplified

3
Is Cloud Computing Secure?
For most organizations, the journey to cloud is no longer a
question of “if” but rather “when”, and a large number of
enterprises have already travelled some way down this path.
Is cloud computing secure?
A simple answer is: Yes, if you approach cloud in the right
way, with the correct checks and balances to ensure all
necessary security and risk management measures are
covered.

4
Is Cloud Computing Secure?
Companies ready to adopt cloud services are right to place security

at the top of their agendas.


the consequences of getting your cloud security strategy wrong could

not be more serious.


As many unwary businesses have found to their cost in recent high-

profile cases, a single cloud-related security breach can result in an


organization severely damaging its reputation – or, worse, the entire
business being put at risk.
5
Is Cloud Computing Secure?
Those further along their cloud path are finding that, like all
forms of information security, the question boils down to
effective risk management.
we outlined the different layers in the cloud services stack:
Infrastructure-as-a-Service (IaaS)
Platform-as-a-Service (PaaS)
Software-as-a-Service (SaaS)
Business Process-as-a-Service (BPaaS).
These layers – and their associated standards, requirements
and solutions – are all at different levels of maturity.
6
Is Cloud Computing Secure?
The world of business is becoming more uncertain, as with new
system architectures come new cyber threats. No longer can the
mechanisms deployed in the past be relied on for protection”
--Nick Gaines, Group IS Director, Volkswagen UK

Different types of cloud have different security characteristics. The


table in next page shows a simple comparison. (The number of stars
indicates how suitable each type of cloud is for each area.)
We choose to characterize these types as private, public and
community clouds – or “hybrid” to refer to a combination of
approaches.

7
Security Characteristics

8
Security Risks
 Organizations with defined controls for externally sourced services or access to IT risk-

assessment capabilities should still apply these to aspects of cloud services where
appropriate.
 But while many of the security risks of cloud overlap with those of outsourcing and

offshoring, there are also differences that organizations need to understand and manage.

“When adopting cloud services, there are four key considerations:


1. Where is my data?
2. How does it integrate?
3. What is my exit strategy?
4. What are the new security issues?”
--Tony Mather, CIO, Clear Channel International
9
Security Risks
 Processing sensitive or business-critical data outside the enterprise
introduces a level of risk because any outsourced service bypasses an
organization's in-house security controls. With cloud, however, it is possible to
establish compatible controls if the provider offers a dedicated service. An
organisation should ascertain a provider’s position by asking for information about
the control and supervision of privileged administrators.
 Organizations using cloud services remain responsible for the security and
integrity of their own data, even when it is held by a service provider. Traditional
service providers are subject to external audits and security certifications. Cloud
providers may not be prepared to undergo the same level of scrutiny.
 When an organisation uses a cloud service, it may not know exactly where its
data resides or have any ability to influence changes to the location of data.
10
Security Risks
 Most providers store data in a shared environment. Although this may be
segregated from other customers’ data while it’s in that environment, it may be
combined in backup and archive copies. This could especially be the case in multi-
tenanted environments.
 Companies should not assume service providers will be able to support
electronic discovery, or internal investigations of inappropriate or illegal activity.
Cloud services are especially difficult to investigate because logs and data for multiple
customers may be either co-located or spread across an ill-defined and changing set of
hosts.
 Organisations need to evaluate the long-term viability of any cloud provider.
They should consider the consequences to service should the provider fail or be
acquired, since there will be far fewer readily identifiable assets that can easily be
transferred in-house or to another provider.
11
Cloud Security Simplified
 As with all coherent security strategies, cloud security can seem dauntingly complex,

involving many different aspects that touch all parts of an organization.

 CIOs and their teams need to plot effective management strategies as well as understand

the implications for operations and technology.

 we outline the key considerations.

 Management

 Operation

 Technology
12
Cloud Security Simplified
Management
1. Updated security policy
2. Cloud security strategy
3. Cloud security governance
4. Cloud security processes
5. Security roles & responsibilities
6. Cloud security guidelines
7. Cloud security assessment
8. Service integration
9. IT & procurement security requirements
10. Cloud security management
13
Cloud Security Simplified
Operation
1. Awareness & training
2. Incident management
3. Configuration management
4. Contingency planning
5. Maintenance
6. Media protection
7. Environmental protection
8. System integrity
9. Information integrity
10. Personnel security
14
Cloud Security Simplified
Technology
1. Access control
2. System protection
3. Identification
4. Authentication
5. Cloud security audits
6. Identity & key management
7. Physical security protection
8. Backup, recovery & archive
9. Core infrastructure protection
10. Network protection
15
Acknowledgement
This course is developed in non-textbook mode.

We acknowledge the idea, content, and structure from:


 The white book of cloud Adoption

 The white book of cloud Security

 Mobile security for the rest of us

 Mobile Security for Dummies


https://www.sfh-tr.nhs.uk/media/4866/information-security-mobile-se
curity-for-dummies-ebook.pdf
16
17

You might also like