46
Cloud Security Design Considerations Kavis Technology Consulting

Cloud security design considerations

Embed Size (px)

Citation preview

Page 1: Cloud security design considerations

Cloud SecurityDesign Considerations

Kavis Technology Consulting

Page 2: Cloud security design considerations
Page 3: Cloud security design considerations
Page 4: Cloud security design considerations
Page 5: Cloud security design considerations
Page 6: Cloud security design considerations

What level of security is required

Page 7: Cloud security design considerations

What level of security is required

Page 8: Cloud security design considerations

What level of security is required

Page 9: Cloud security design considerations

What level of security is required

Page 10: Cloud security design considerations

What level of security is required

Page 11: Cloud security design considerations

Security and Cloud Service Models

Page 12: Cloud security design considerations
Page 13: Cloud security design considerations

Private Cloudshttp://designyoutrust.com

Page 14: Cloud security design considerations

It’s allYou!

Page 15: Cloud security design considerations

Public Clouds

Page 16: Cloud security design considerations

Vendor supplies …- Infrastructure security

You do this

Page 17: Cloud security design considerations

Vendor supplies …- Application Stack Security- Infrastructure Security

You do this

Page 18: Cloud security design considerations

Vendor supplies …- Application Security- Application Stack Security- Infrastructure Security

You do this

Page 19: Cloud security design considerations

Infrastructure Security

Page 20: Cloud security design considerations

Applications Stack Security

Page 21: Cloud security design considerations

Application Security

•••••

Page 22: Cloud security design considerations

User security

Page 23: Cloud security design considerations

Security across all service models

Source:https://cloudsecurityalliance.org/guidance/csaguide.v3.0.pdf

Page 24: Cloud security design considerations

Key Security Areas of Focus

Page 25: Cloud security design considerations

Security Strategies

Centralize

Standardize

Automate

Page 26: Cloud security design considerations

Security Actions

Application

Detection

Prevention

Page 27: Cloud security design considerations

Policy Enforcement

”Golden” Image

Cloud Servers

Deploy

••

Page 28: Cloud security design considerations

Policy Enforcement

Page 29: Cloud security design considerations

Policy Enforcement

••

Client Server

Data Store

Deploy

Admin Console

Policies

Page 30: Cloud security design considerations

Encryption

••

••

••

Encryption

• Compliance

• Security

Usability

• Complexity

• Performance

Page 31: Cloud security design considerations

Encryption

•••••

••••

••

Encryption

• Compliance

• Security

Usability

• Complexity

• Performance

Page 32: Cloud security design considerations

Key Management

••

Applications

Users

Organizations

Account

Page 33: Cloud security design considerations

Web Security

Page 34: Cloud security design considerations
Page 35: Cloud security design considerations

API Token Management

Do Not Roll Your Own

Page 36: Cloud security design considerations

API Token Management

Page 37: Cloud security design considerations

API Token Management

Page 38: Cloud security design considerations

API Token Management

••

Page 39: Cloud security design considerations

Patch Management

••

••

Page 40: Cloud security design considerations

Monitoring

Security

Performance

Capacity

Uptime

Throughput

SLA

User metrics

Kpis

Log file analysis

Page 41: Cloud security design considerations

IntrusionDetection

TroubleShooting

Logging

Page 42: Cloud security design considerations

Source: http://www.thoughtworks.com/continuous-delivery

Continuous Deployments

Page 43: Cloud security design considerations

Maintaining Consistent Environments

AutomationManage

TrackAdminister

• Self Provision

• Charge Back

• Access Control

• Policies

• Audits

Page 44: Cloud security design considerations

ID Management

Centralized

LDAP

Facade

Entity 1 Entity 2 Entity n

CSP 1 CSP 2 CSP 3

USE CASEs Business to Business

Internal costumers

Known Customers

Advantages Central control

Roles, and groups

termination

Page 45: Cloud security design considerations

ID Management

deCentralizedUSE CASEs Business to Consumer

Open registration

Large Number of

enrollees

Advantages Must accept terms

Simple integration

with Partners

Source: http://static.springsource.org/spring-social/docs/1.0.x/reference/html/serviceprovider.html

Page 46: Cloud security design considerations

Thank You

For details on this topic and others go to my blog

www Kavistechnology com

Images courtesy of www.thinkstockphotos.com