12
Visit Researcher’s Blog - http://clean-cloud http://clean-clouds.com HOW IS CLOUD SECURITY DIFFERENT FROM ON-PREMISE SECURITY

HOW IS CLOUD SECURITY DIFFERENT FROM ON-PREMISE SECURITY

Embed Size (px)

DESCRIPTION

HOW IS CLOUD SECURITY DIFFERENT FROM ON-PREMISE SECURITY

Citation preview

Page 1: HOW IS CLOUD SECURITY DIFFERENT FROM ON-PREMISE SECURITY

Visit Researcher’s Blog - http://clean-clouds.com

http://clean-clouds.com

HOW IS CLOUD SECURITY DIFFERENT FROM ON-PREMISE SECURITY

Page 2: HOW IS CLOUD SECURITY DIFFERENT FROM ON-PREMISE SECURITY

Visit Researcher’s Blog - http://clean-clouds.com

• The typical entry point for the customers to the Cloud will be migration of their existing applications to the Cloud, initially as a proof-of-concept and later in production.

• Customer will have the following questions:– How does the migrated application exploit the

Performance, Scalability, Robustness models for Public Clouds?

– How does the migrated application exploit the Security, Systems and Applications Management models for Public Clouds?

Page 3: HOW IS CLOUD SECURITY DIFFERENT FROM ON-PREMISE SECURITY

Visit Researcher’s Blog - http://clean-clouds.com

The following security measures represent general best practice implementations for cloud security.

• Implement and maintain a security program.• Implement strong access and identity

management.• Ensure confidential data protection.• Build and maintain a secure cloud infrastructure.

– Implement N/W security– Implement virtualization security– Ensure physical security

Page 4: HOW IS CLOUD SECURITY DIFFERENT FROM ON-PREMISE SECURITY

Visit Researcher’s Blog - http://clean-clouds.com

Security Concerns for Cloud Computing

Page 5: HOW IS CLOUD SECURITY DIFFERENT FROM ON-PREMISE SECURITY

Visit Researcher’s Blog - http://clean-clouds.com

Security Concerns for Cloud Computing

Identity and Access Management• Who has access? • Can the existing authentication

implementation be ported to cloud?• How trust is maintained across cloud

and on premise domain?• How to enable single sign on for

applications on cloud and on premise?

Data Security• How CIA is maintained and ensured?• How key credentials are managed?• Do you have the right to audit? • How location related jurisdictional

requirement is addressed?

Network Security• How can I ensure data security in

transit? Is data on disk is encrypted?• What are the preventive and detective

controls for the N/W attacks?

OS & Virtualization Security• What are the measures we need to

consider for virtualization security? How is your data and application isolated from other customers? Is this a logical isolation or physical isolation?

• How to protect Host Operating System?

• How OS level security like OS hardening are maintained?

Page 6: HOW IS CLOUD SECURITY DIFFERENT FROM ON-PREMISE SECURITY

Visit Researcher’s Blog - http://clean-clouds.com

Security Concerns for Cloud Computing

Physical Security• What are the DR mechanism in place? • What are the controls applied to secure physical data centre?

Application• What is the possibility of availability of an application? • Is there any assurance provided by the CSP? How to make sure that

Application code is what it should be?

Page 12: HOW IS CLOUD SECURITY DIFFERENT FROM ON-PREMISE SECURITY

Thank You