36
Last Updated: Nov 2014 Prabath Siriwardena Isura Karunaratne Security in the Cloud

Cloud security

  • Upload
    wso2

  • View
    609

  • Download
    1

Embed Size (px)

Citation preview

Page 1: Cloud security

Last Updated: Nov 2014

Prabath  Siriwardena  Isura  Karunaratne  

Security  in  the  Cloud  

Page 2: Cloud security

*  

Page 3: Cloud security

Virtualiza:on  

Page 4: Cloud security

Virtualiza:on  

Page 5: Cloud security

Service  Oriented  Architecture  

Page 6: Cloud security

Grid  Compu:ng    

Page 7: Cloud security

Infrastructure  

•  Hypervisor  •  Management  So3ware  •  Deployment  So3ware  •  Network  •  Server  •  Storage    •KDC,  Kerberos  support  

•  Cassandra  (experimental)  

•  Extensible:  IS  can  be  configured  to  leverage  any  user  store,  extending  exisGng  user  stores  or  implemenGng  from  scratch  

Page 8: Cloud security

Deployment  Models  •  Private  Cloud  Model  

   -­‐  Enterprise  owned  or  leased  •  Public  Cloud  Model  

   -­‐  Accessible  to  general  public  •  Hybrid  Cloud  Model  

   -­‐  Composi6on  of  private  and  public  cloud  •  Community  Cloud  Model  

   -­‐  Shared  infrastructure  for  specific  community    

Page 9: Cloud security

Cloud  Service  Models  

•  SaaS  •  PaaS  •  IaaS    •KDC,  Kerberos  support  

•  Cassandra  (experimental)  

•  Extensible:  IS  can  be  configured  to  leverage  any  user  store,  extending  exisGng  user  stores  or  implemenGng  from  scratch  

Page 10: Cloud security

Service  Delivery  by  Provider  

Page 11: Cloud security

Service  Delivery  by  Provider  

Page 12: Cloud security

Service  Delivery  by  Provider  

Page 13: Cloud security

Service  Delivery  by  Provider  

Page 14: Cloud security

Service  Delivery  by  Provider  

Page 15: Cloud security

Service  Delivery  by  Deployment  

Page 16: Cloud security

Service  Delivery  by  Deployment  

Page 17: Cloud security

Cloud  Under  AFack  

Page 18: Cloud security

AFacks  from  the  Cloud  

Page 19: Cloud security

Weakest  Link  

Page 20: Cloud security

Mul:-­‐tenancy  

Page 21: Cloud security

Mul:-­‐tenancy  within    an  Organiza:on  

Page 22: Cloud security

Mul:-­‐tenancy  

Page 23: Cloud security

Data  Isola:on  –  Separated  DBs  

Page 24: Cloud security

Data  Isola:on    Shared  DB/Separate  Schema  

Page 25: Cloud security

Data  Isola:on    Shared  DB/Shared  Schema  

Page 26: Cloud security

Data  Access  PaFerns  

Page 27: Cloud security

Data  Access  PaFerns  

Page 28: Cloud security

Data  Access  PaFerns  

Page 29: Cloud security

Data  Access  PaFerns  

Page 30: Cloud security

Data  Access  PaFerns  

Page 31: Cloud security

Data  Security  

Page 32: Cloud security

Data  Security  

Page 33: Cloud security

Homomorphic  Encryp:on  

Page 34: Cloud security

Cloud  Security  Requirements  

Page 35: Cloud security

Top  Threats  to  Cloud  Compu:ng  •  Data  Breaches  •  Data  Loss  •  Account  Hijacking  •  Insecure  APIs  •  DoS  •  Malicious  Insiders  •  Abuse  of  Cloud  Service  •  Insufficient  Due  Diligence  •  Shared  Technology  Issues

Page 36: Cloud security

Contact  us  !