SlideShare a Scribd company logo
Cloud Computing:
                                          Finding the Silver Lining
                                             Steve Hanna, Juniper Networks




Copyright Š 2009 Juniper Networks, Inc.                                      1
Agenda
           What is Cloud Computing?
           Security Analysis of Cloud Computing
           Conclusions




Copyright Š 2009 Juniper Networks, Inc.            2
Agenda
           What is Cloud Computing?
           Security Analysis of Cloud Computing
           Conclusions




Copyright Š 2009 Juniper Networks, Inc.            3
Cloud Computing Defined
           Dynamically scalable shared resources
            accessed over a network
                •  Only pay for what you use
                •  Shared internally or with other customers
                •  Resources = storage, computing, services, etc.
                •  Internal network or Internet

           Notes
                •  Similar to Timesharing
                           •  Rent IT resources vs. buy
                •  New term – definition still being developed

Copyright Š 2009 Juniper Networks, Inc.                             4
Conventional Data Center

                                                                 Data
                                                                Center
                                          Data
                                                 Applications


                                          Enterprise
                                             LAN


       Office User
                                                                         Internet




                                           Remote User


Copyright Š 2009 Juniper Networks, Inc.                                             5
Cloud Computing Model                                        Enterprise 2

                                                                                             Cloud
                                                                                            Provider
              Enterprise 1                               Enterprise
                                                            LAN

                                                                                     Data
                                                                                            Applications
                                          Enterprise
                                             LAN


       Office User
                                                                 Internet




                                           Remote User


Copyright Š 2009 Juniper Networks, Inc.                                                                    6
Many Flavors of Cloud Computing
           SaaS – Software as a Service
                •  Network-hosted application

           DaaS – Data as a Service
                •  Customer queries against provider’s database

           PaaS– Platform as a Service
                •  Network-hosted software development platform

           IaaS – Infrastructure as a Service
                •  Provider hosts customer VMs or provides network storage

           IPMaaS – Identity and Policy Management as a Service
                •  Provider manages identity and/or access control policy for customer

           NaaS – Network as a Service
                •  Provider offers virtualized networks (e.g. VPNs)


Copyright Š 2009 Juniper Networks, Inc.                                                  7
Cloud Computing Providers
                           DaaS           SaaS                   PaaS
  IPM Software & Data




                                          IPMaaS
     Infrastructure




                                 NaaS                IaaS (DC/server)
Copyright Š 2009 Juniper Networks, Inc.                                 8
Cloud Computing Pros and Cons


                                                                    Compliance/regulatory
                                                                    laws mandate on-site
                                                  Pros                ownership of data
                                              Reduced costs

                                    Resource sharing is more         Security and privacy
                                           efficient                 Latency & bandwidth
                                                                          guarantees
                                          Management moves to       Absence of robust SLAs
                                             cloud provider
                                                                      Uncertainty around
                                     Consumption based cost             interoperability,
                                                                      portability & lock in
                                           Faster time to roll
                                            out new services        Availability & reliability
                                            Dynamic resource
                                          availability for crunch         Inhibitors
                                                  periods


Copyright Š 2009 Juniper Networks, Inc.                                                          9
Who’s using Clouds today?




Copyright Š 2009 Juniper Networks, Inc.   10
Example: Mogulus
           Mogulus is a live broadcast platform on the internet.
            (cloud customer)
                •  Producers can use the Mogulus browser-based Studio application
                   to create LIVE, scheduled and on-demand internet television to
                   broadcast anywhere on the web through a single player widget.

           Mogulus is entirely hosted on cloud (cloud provider)

           On Election night Mogulus ramped to:
                •  87000 videos @500kbps = 43.5 Gbps
                •  http://www.mogulus.com




Copyright Š 2009 Juniper Networks, Inc.                                             11
Example: Animoto
           Animoto is a video rendering & production house with
            service available over the Internet
             (cloud customer)
              •  With their patent-pending technology and high-end motion design,
                 each video is a fully customized orchestration of user-selected
                 images and music in several formats, including DVD.
           Animoto is entirely hosted on cloud
             (cloud provider)

           Released Facebook App: users were able to easily render
            their photos into MTV like videos
                •    Ramped from 25,000 users to 250,000 users in three days
                •    Signing up 20,000 new users per hour at peak
                •    Went from 50 to 3500 servers in 5 days
                •    Two weeks later scaled back to 100 servers
                •  http://www.animoto.com


Copyright Š 2009 Juniper Networks, Inc.                                             12
Example: New York Times
           Timesmachine is a news archive of the
            NY Times available in pdf over the
            Internet to newspaper subscribers
            (cloud customer)

           Timesmachine is entirely hosted on
            cloud (cloud provider)

           Timesmachine needed infrastructure
            to host several terabits of data
             •  Internal IT rejected due to cost
             •  Business owners got the data up on
                cloud for $50 over one weekend
             •  http://timesmachine.nytimes.com

Copyright Š 2009 Juniper Networks, Inc.              13
Example: Eli Lilly
           Eli Lilly is the 10th largest pharmaceutical
            company in the world
            (cloud customer)

           Moved entire R&D environment to
            cloud (cloud provider)

           Results:
                •  Reduced costs
                •  Global access to R&D applications
                •  Rapid transition due to VM hosting

                •  Time to deliver new services greatly reduced:
                           •  New server: 7.5 weeks down to 3 minutes
                           •  New collaboration: 8 weeks down to 5
                              minutes
                           •  64 node linux cluster: 12 weeks down to 5
                              minutes




Copyright Š 2009 Juniper Networks, Inc.                                   14
Who’s using Clouds today?
           Startups & Small businesses
                •  Can use clouds for everything
                           •  SaaS, IaaS, collaboration services, online presence


           Mid-Size Enterprises
                •  Can use clouds for many things
                           •  Compute cycles for R&D projects, online collaboration, partner
                              integration, social networking, new business tools


           Large Enterprises
                •  More likely to have hybrid models where they keep some things in
                   house
                           •  On premises data for legal and risk management reasons

Copyright Š 2009 Juniper Networks, Inc.                                                        15
Agenda
           What is Cloud Computing?
           Security Analysis of Cloud Computing
           Conclusions




Copyright Š 2009 Juniper Networks, Inc.            16
Information Security Risk Management
         Process (ISO 27005)
           Establish Context
           Risk Assessment
                •  Identify Risks
                           •    Identify Assets
                           •    Identify Threats
                           •    Identify Existing Controls
                           •    Identify Vulnerabilities
                           •    Identify Consequences
                •  Estimate Risks
                •  Evaluate Risks
           Develop Risk Treatment Plan
                •  Reduce, Retain, Avoid, or Transfer Risks
           Risk Acceptance
           Implement Risk Treatment Plan
           Monitor and Review Risks

Copyright Š 2009 Juniper Networks, Inc.                       17
Streamlined Security Analysis Process
           Identify Assets
                •  Which assets are we trying to protect?
                •  What properties of these assets must be maintained?

           Identify Threats
                •  What attacks can be mounted?
                •  What other threats are there (natural disasters, etc.)?

           Identify Countermeasures
                •  How can we counter those attacks?

           Appropriate for Organization-Independent Analysis
                •  We have no organizational context or policies


Copyright Š 2009 Juniper Networks, Inc.                                      18
Identify Assets




Copyright Š 2009 Juniper Networks, Inc.   19
Conventional Data Center

                                                                 Data
                                                                Center
                                          Data
                                                 Applications


                                          Enterprise
                                             LAN


       Office User
                                                                         Internet




                                           Remote User


Copyright Š 2009 Juniper Networks, Inc.                                             20
Cloud Computing Model                                        Enterprise 2

                                                                                             Cloud
                                                                                            Provider
              Enterprise 1                               Enterprise
                                                            LAN

                                                                                     Data
                                                                                            Applications
                                          Enterprise
                                             LAN


       Office User
                                                                 Internet




                                           Remote User


Copyright Š 2009 Juniper Networks, Inc.                                                                    21
Identify Assets
           Customer Data


           Customer Applications


           Client Computing Devices




Copyright Š 2009 Juniper Networks, Inc.   22
Information Security Principles (Triad)
           C I A

                •  Confidentiality
                           •  Prevent unauthorized disclosure

                •  Integrity
                           •  Preserve information integrity

                •  Availability
                           •  Ensure information is available when needed



Copyright Š 2009 Juniper Networks, Inc.                                     23
Identify Assets & Principles
           Customer Data
                •  Confidentiality, integrity, and availability

           Customer Applications
                •  Confidentiality, integrity, and availability

           Client Computing Devices
                •  Confidentiality, integrity, and availability




Copyright Š 2009 Juniper Networks, Inc.                           24
Identify Threats




Copyright Š 2009 Juniper Networks, Inc.   25
Cloud Computing Model                                        Enterprise 2

                                                                                             Cloud
                                                                                            Provider
              Enterprise 1                               Enterprise
                                                            LAN

                                                                                     Data
                                                                                            Applications
                                          Enterprise
                                             LAN


       Office User
                                                                 Internet




                                           Remote User


Copyright Š 2009 Juniper Networks, Inc.                                                                    26
Identify Threats
           Failures in Provider Security

           Attacks by Other Customers

           Availability and Reliability Issues

           Legal and Regulatory Issues

           Perimeter Security Model Broken

           Integrating Provider and Customer Security Systems


Copyright Š 2009 Juniper Networks, Inc.                          27
Failures in Provider Security
           Explanation
                •  Provider controls servers, network, etc.
                •  Customer must trust provider’s security
                •  Failures may violate CIA principles

           Countermeasures
                •  Verify and monitor provider’s security

           Notes
                •  Outside verification may suffice
                •  For SMB, provider security may exceed customer
                   security
Copyright Š 2009 Juniper Networks, Inc.                             28
Attacks by Other Customers
           Threats
                •  Provider resources shared with untrusted parties
                           •  CPU, storage, network
                •  Customer data and applications must be separated
                •  Failures will violate CIA principles

           Countermeasures
                •  Hypervisors for compute separation
                •  MPLS, VPNs, VLANs, firewalls for network separation
                •  Cryptography (strong)
                •  Application-layer separation (less strong)
Copyright Š 2009 Juniper Networks, Inc.                                  29
Availability and Reliability Issues
           Threats
                •  Clouds may be less available than in-house IT
                           •    Complexity increases chance of failure
                           •    Clouds are prominent attack targets
                           •    Internet reliability is spotty
                           •    Shared resources may provide attack vectors
                           •    BUT cloud providers focus on availability

           Countermeasures
                •  Evaluate provider measures to ensure availability
                •  Monitor availability carefully
                •  Plan for downtime
                •  Use public clouds for less essential applications
Copyright Š 2009 Juniper Networks, Inc.                                       30
Legal and Regulatory Issues
           Threats
                •  Laws and regulations may prevent cloud computing
                           •  Requirements to retain control
                           •  Certification requirements not met by provider
                           •  Geographical limitations – EU Data Privacy
                •  New locations may trigger new laws and regulations

           Countermeasures
                •  Evaluate legal issues
                •  Require provider compliance with laws and regulations
                •  Restrict geography as needed

Copyright Š 2009 Juniper Networks, Inc.                                        31
Perimeter Security Model Broken




Copyright Š 2009 Juniper Networks, Inc.    32
Perimeter Security Model

                                                                 Data
                                                                Center
                                          Data
                                                 Applications
               Safe Zone
                                          Enterprise
                                             LAN


                         Office User
                                                                         Internet




                                           Remote User


Copyright Š 2009 Juniper Networks, Inc.                                             33
Perimeter Security with Cloud Computing?
                                                                      Enterprise 2

                                                                                             Cloud
                                                                                            Provider
              Enterprise 1                               Enterprise
                                                            LAN

                                                                                     Data
                                                                                            Applications
                                          Enterprise
                                             LAN


       Office User
                                                                 Internet




                                           Remote User


Copyright Š 2009 Juniper Networks, Inc.                                                                    34
Perimeter Security Model Broken
           Threats
                •  Including the cloud in your perimeter
                           •  Lets attackers inside the perimeter
                           •  Prevents mobile users from accessing the cloud directly
                •  Not including the cloud in your perimeter
                           •  Essential services aren’t trusted
                           •  No access controls on cloud


           Countermeasures
                •  Drop the perimeter model!


Copyright Š 2009 Juniper Networks, Inc.                                                 35
Integrating Provider and Customer Security
           Threat
                •  Disconnected provider and customer security systems
                           •  Fired employee retains access to cloud
                           •  Misbehavior in cloud not reported to customer

           Countermeasures
                •  At least, integrate identity management
                           •  Consistent access controls
                •  Better, integrate monitoring and notifications

           Notes
                •  Can use SAML, LDAP, RADIUS, XACML, IF-MAP, etc.

Copyright Š 2009 Juniper Networks, Inc.                                       36
Agenda
           What is Cloud Computing?
           Security Analysis of Cloud Computing
           Conclusions




Copyright Š 2009 Juniper Networks, Inc.            37
Bottom Line on Cloud Computing Security
           Engage in full risk management process for each case

           For small and medium organizations
                •  Cloud security may be a big improvement!
                •  Cost savings may be large (economies of scale)

           For large organizations
                •  Already have large, secure data centers
                •  Main sweet spots:
                           •  Elastic services
                           •  Internet-facing services

           Employ countermeasures listed above


Copyright Š 2009 Juniper Networks, Inc.                             38
Security Analysis Skills Reviewed Today
           Information Security Risk Management Process
                •  Variations used throughout IT industry
                           •  ISO 27005, NIST SP 800-30, etc.
                •  Requires thorough knowledge of threats and controls
                •  Bread and butter of InfoSec – Learn it!
                •  Time-consuming but not difficult

           Streamlined Security Analysis Process
                •  Many variations
                           •  RFC 3552, etc.
                •    Requires thorough knowledge of threats and controls
                •    Useful for organization-independent analysis
                •    Practice this on any RFC or other standard
                •    Become able to do it in 10 minutes

Copyright Š 2009 Juniper Networks, Inc.                                    39
Discussion




Copyright Š 2009 Juniper Networks, Inc.                40
Copyright Š 2009 Juniper Networks, Inc.   41

More Related Content

PPT
Cloud Security
Rashmi Agale
 
PPTX
cloud security ppt
Devyani Vaidya
 
PDF
Cloud Computing Architecture
Animesh Chaturvedi
 
PPT
Cloud computing
Aditya Dwivedi
 
PPTX
Microsoft Cloud Computing - Windows Azure Platform
David Chou
 
PDF
Cloud Security Governance
Shankar Subramaniyan
 
PDF
The essential role of AI in the 5G future
Qualcomm Research
 
Cloud Security
Rashmi Agale
 
cloud security ppt
Devyani Vaidya
 
Cloud Computing Architecture
Animesh Chaturvedi
 
Cloud computing
Aditya Dwivedi
 
Microsoft Cloud Computing - Windows Azure Platform
David Chou
 
Cloud Security Governance
Shankar Subramaniyan
 
The essential role of AI in the 5G future
Qualcomm Research
 

What's hot (20)

PDF
Cloud computing
Shiva Prasad
 
PDF
Splunk-Presentation
PrasadThorat23
 
PDF
Azure Security Overview
David J Rosenthal
 
PPTX
Cloud Privacy & Security compliance
Bryan Starbuck
 
PPTX
Cloud Security
AWS User Group Bengaluru
 
PPTX
Cloud Security
AWS User Group Bengaluru
 
PPTX
VisiQuate: Azure cloud migration case study
Leonid Nekhymchuk
 
PDF
Cloud Security: A New Perspective
Wen-Pai Lu
 
PPTX
Cloud Computing Security
Ninh Nguyen
 
PDF
Upgrade Your SOC with Cortex XSOAR & Elastic SIEM
Elasticsearch
 
PDF
AI in security
Subrat Panda, PhD
 
PPTX
Cloud Computing Fundamentals
Sonia Nagpal
 
PDF
Migrate to Microsoft Azure with Confidence
David J Rosenthal
 
PDF
Emerging Trends in Hybrid-Cloud & Multi-Cloud Strategies
Chaitanya Atreya
 
PPTX
Endpoint Protection
Sophos
 
PPTX
Identity and Access Management Introduction
Aidy Tificate
 
PPTX
Cloud computing and Cloud security fundamentals
Viresh Suri
 
PDF
How To Present Cyber Security To Senior Management Complete Deck
SlideTeam
 
PPTX
Cloud Oracle
Fran Navarro
 
PPTX
Zero Trust Model
Yash
 
Cloud computing
Shiva Prasad
 
Splunk-Presentation
PrasadThorat23
 
Azure Security Overview
David J Rosenthal
 
Cloud Privacy & Security compliance
Bryan Starbuck
 
Cloud Security
AWS User Group Bengaluru
 
Cloud Security
AWS User Group Bengaluru
 
VisiQuate: Azure cloud migration case study
Leonid Nekhymchuk
 
Cloud Security: A New Perspective
Wen-Pai Lu
 
Cloud Computing Security
Ninh Nguyen
 
Upgrade Your SOC with Cortex XSOAR & Elastic SIEM
Elasticsearch
 
AI in security
Subrat Panda, PhD
 
Cloud Computing Fundamentals
Sonia Nagpal
 
Migrate to Microsoft Azure with Confidence
David J Rosenthal
 
Emerging Trends in Hybrid-Cloud & Multi-Cloud Strategies
Chaitanya Atreya
 
Endpoint Protection
Sophos
 
Identity and Access Management Introduction
Aidy Tificate
 
Cloud computing and Cloud security fundamentals
Viresh Suri
 
How To Present Cyber Security To Senior Management Complete Deck
SlideTeam
 
Cloud Oracle
Fran Navarro
 
Zero Trust Model
Yash
 
Ad

Viewers also liked (20)

PPT
Cloud computing security - Insights
giorgiacaleffi
 
PDF
Cloud computing & Security presentation
Parveen Yadav
 
PPT
Cloud Computing - Security Benefits and Risks
William McBorrough
 
PDF
Cloud computing security
Antonio Sanz Alcober
 
PPT
Cloud computing security
Akhila Param
 
PPTX
Security in cloud computing
Abhishek Kumar Sinha
 
PPTX
Cloud computing security
Aung Thu Rha Hein
 
PDF
Cloud Computing and Security - ISACA Hyderabad Chapter Presentation
Venkateswar Reddy Melachervu
 
PPT
Cloud computing-security-issues
Aleem Mohammed
 
PPT
Cloud Computing Security Issues
Discover Cloud Computing
 
PDF
Cloud Security - Security Aspects of Cloud Computing
Jim Geovedi
 
PDF
2013 State of Cloud Survey SMB Results
Symantec
 
PDF
Breaking through the Clouds
Andy Piper
 
PPTX
2013 Future of Cloud Computing - 3rd Annual Survey Results
Michael Skok
 
PDF
Intro to cloud computing — MegaCOMM 2013, Jerusalem
Reuven Lerner
 
PPTX
Cloud security ppt
Venkatesh Chary
 
PDF
Can we hack open source #cloud platforms to help reduce emissions?
Tom Raftery
 
PDF
Summer School Scale Cloud Across the Enterprise
WSO2
 
PPTX
Simplifying The Cloud Top 10 Questions By SMBs
Sun Digital, Inc.
 
PPTX
Penetrating the Cloud: Opportunities & Challenges for Businesses
CompTIA
 
Cloud computing security - Insights
giorgiacaleffi
 
Cloud computing & Security presentation
Parveen Yadav
 
Cloud Computing - Security Benefits and Risks
William McBorrough
 
Cloud computing security
Antonio Sanz Alcober
 
Cloud computing security
Akhila Param
 
Security in cloud computing
Abhishek Kumar Sinha
 
Cloud computing security
Aung Thu Rha Hein
 
Cloud Computing and Security - ISACA Hyderabad Chapter Presentation
Venkateswar Reddy Melachervu
 
Cloud computing-security-issues
Aleem Mohammed
 
Cloud Computing Security Issues
Discover Cloud Computing
 
Cloud Security - Security Aspects of Cloud Computing
Jim Geovedi
 
2013 State of Cloud Survey SMB Results
Symantec
 
Breaking through the Clouds
Andy Piper
 
2013 Future of Cloud Computing - 3rd Annual Survey Results
Michael Skok
 
Intro to cloud computing — MegaCOMM 2013, Jerusalem
Reuven Lerner
 
Cloud security ppt
Venkatesh Chary
 
Can we hack open source #cloud platforms to help reduce emissions?
Tom Raftery
 
Summer School Scale Cloud Across the Enterprise
WSO2
 
Simplifying The Cloud Top 10 Questions By SMBs
Sun Digital, Inc.
 
Penetrating the Cloud: Opportunities & Challenges for Businesses
CompTIA
 
Ad

Similar to Cloud Computing Security (20)

PDF
Cccc net app_wallacefung
Cloud Congress
 
PDF
CCCC NetApp Wallace Fung
Cloud Congress
 
PDF
An enterprise journey in the Cloud
Raghuraman Balachandran
 
PPT
Cloud Computing for Beginners
Suman Singh
 
PPTX
The Ever Changing Cloud, CloudExpo 2012
Lew Tucker
 
PDF
Opportunites and Challenges in Cloud COmputing
ACMBangalore
 
PDF
How Cloud Providers' Business Needs Drive Enterprise Identity & Security
Novell
 
PDF
Build 4 The Cloud By Cisco V Mware2
Azlan NL
 
PDF
Cloud Computing at UTM Shillong
Capgemini
 
PPT
Cloud Networking: Network aspects of the cloud
SAIL
 
PDF
Programmable WAN Networking is SFW
Juniper Developer Resources Cooney
 
PDF
Programmable WAN Networking is SFW (Open Networking Summit version)
Juniper Networks
 
PDF
IBM Global Technology Services - Resilience - The Silver Lining to Cloud Comp...
Vincent Kwon
 
PPT
Chris millercloud
Chris Miller
 
PDF
Day 3 p4 - cloud strategy
Lilian Schaffer
 
PDF
Day 3 p4 - cloud strategy
Lilian Schaffer
 
PPTX
Monetizing the Enterprise: Borderless Networks
Cisco Service Provider Mobility
 
PDF
Ronny haraldsvik new managed services
Pranowo Budi Sulistyo
 
PDF
Who owns security in the cloud
Trend Micro
 
PPTX
Optimizing Cloud Computing with IPv6
John Rhoton
 
Cccc net app_wallacefung
Cloud Congress
 
CCCC NetApp Wallace Fung
Cloud Congress
 
An enterprise journey in the Cloud
Raghuraman Balachandran
 
Cloud Computing for Beginners
Suman Singh
 
The Ever Changing Cloud, CloudExpo 2012
Lew Tucker
 
Opportunites and Challenges in Cloud COmputing
ACMBangalore
 
How Cloud Providers' Business Needs Drive Enterprise Identity & Security
Novell
 
Build 4 The Cloud By Cisco V Mware2
Azlan NL
 
Cloud Computing at UTM Shillong
Capgemini
 
Cloud Networking: Network aspects of the cloud
SAIL
 
Programmable WAN Networking is SFW
Juniper Developer Resources Cooney
 
Programmable WAN Networking is SFW (Open Networking Summit version)
Juniper Networks
 
IBM Global Technology Services - Resilience - The Silver Lining to Cloud Comp...
Vincent Kwon
 
Chris millercloud
Chris Miller
 
Day 3 p4 - cloud strategy
Lilian Schaffer
 
Day 3 p4 - cloud strategy
Lilian Schaffer
 
Monetizing the Enterprise: Borderless Networks
Cisco Service Provider Mobility
 
Ronny haraldsvik new managed services
Pranowo Budi Sulistyo
 
Who owns security in the cloud
Trend Micro
 
Optimizing Cloud Computing with IPv6
John Rhoton
 

More from Piyush Mittal (20)

PPTX
Power mock
Piyush Mittal
 
PDF
Design pattern tutorial
Piyush Mittal
 
PPT
Reflection
Piyush Mittal
 
PPTX
Gpu archi
Piyush Mittal
 
PPTX
Cuda Architecture
Piyush Mittal
 
PDF
Intel open mp
Piyush Mittal
 
PDF
Intro to parallel computing
Piyush Mittal
 
PDF
Cuda toolkit reference manual
Piyush Mittal
 
PDF
Matrix multiplication using CUDA
Piyush Mittal
 
PPT
Channel coding
Piyush Mittal
 
PPT
Basics of Coding Theory
Piyush Mittal
 
PDF
Java cheat sheet
Piyush Mittal
 
PDF
Google app engine cheat sheet
Piyush Mittal
 
PDF
Git cheat sheet
Piyush Mittal
 
PDF
Vi cheat sheet
Piyush Mittal
 
PDF
Css cheat sheet
Piyush Mittal
 
PDF
Cpp cheat sheet
Piyush Mittal
 
PDF
Ubuntu cheat sheet
Piyush Mittal
 
PDF
Php cheat sheet
Piyush Mittal
 
PDF
oracle 9i cheat sheet
Piyush Mittal
 
Power mock
Piyush Mittal
 
Design pattern tutorial
Piyush Mittal
 
Reflection
Piyush Mittal
 
Gpu archi
Piyush Mittal
 
Cuda Architecture
Piyush Mittal
 
Intel open mp
Piyush Mittal
 
Intro to parallel computing
Piyush Mittal
 
Cuda toolkit reference manual
Piyush Mittal
 
Matrix multiplication using CUDA
Piyush Mittal
 
Channel coding
Piyush Mittal
 
Basics of Coding Theory
Piyush Mittal
 
Java cheat sheet
Piyush Mittal
 
Google app engine cheat sheet
Piyush Mittal
 
Git cheat sheet
Piyush Mittal
 
Vi cheat sheet
Piyush Mittal
 
Css cheat sheet
Piyush Mittal
 
Cpp cheat sheet
Piyush Mittal
 
Ubuntu cheat sheet
Piyush Mittal
 
Php cheat sheet
Piyush Mittal
 
oracle 9i cheat sheet
Piyush Mittal
 

Recently uploaded (20)

PPTX
OA presentation.pptx OA presentation.pptx
pateldhruv002338
 
PDF
Get More from Fiori Automation - What’s New, What Works, and What’s Next.pdf
Precisely
 
PDF
OFFOFFBOX™ – A New Era for African Film | Startup Presentation
ambaicciwalkerbrian
 
PDF
Brief History of Internet - Early Days of Internet
sutharharshit158
 
PDF
How ETL Control Logic Keeps Your Pipelines Safe and Reliable.pdf
Stryv Solutions Pvt. Ltd.
 
PDF
Orbitly Pitch Deck|A Mission-Driven Platform for Side Project Collaboration (...
zz41354899
 
PDF
Security features in Dell, HP, and Lenovo PC systems: A research-based compar...
Principled Technologies
 
PPTX
IT Runs Better with ThousandEyes AI-driven Assurance
ThousandEyes
 
PDF
Automating ArcGIS Content Discovery with FME: A Real World Use Case
Safe Software
 
PDF
Make GenAI investments go further with the Dell AI Factory
Principled Technologies
 
PDF
Tea4chat - another LLM Project by Kerem Atam
a0m0rajab1
 
PDF
NewMind AI Weekly Chronicles - July'25 - Week IV
NewMind AI
 
PDF
Google I/O Extended 2025 Baku - all ppts
HusseinMalikMammadli
 
PDF
Responsible AI and AI Ethics - By Sylvester Ebhonu
Sylvester Ebhonu
 
PDF
Presentation about Hardware and Software in Computer
snehamodhawadiya
 
PDF
MASTERDECK GRAPHSUMMIT SYDNEY (Public).pdf
Neo4j
 
PDF
Data_Analytics_vs_Data_Science_vs_BI_by_CA_Suvidha_Chaplot.pdf
CA Suvidha Chaplot
 
PDF
Structs to JSON: How Go Powers REST APIs
Emily Achieng
 
PDF
Research-Fundamentals-and-Topic-Development.pdf
ayesha butalia
 
PDF
A Strategic Analysis of the MVNO Wave in Emerging Markets.pdf
IPLOOK Networks
 
OA presentation.pptx OA presentation.pptx
pateldhruv002338
 
Get More from Fiori Automation - What’s New, What Works, and What’s Next.pdf
Precisely
 
OFFOFFBOX™ – A New Era for African Film | Startup Presentation
ambaicciwalkerbrian
 
Brief History of Internet - Early Days of Internet
sutharharshit158
 
How ETL Control Logic Keeps Your Pipelines Safe and Reliable.pdf
Stryv Solutions Pvt. Ltd.
 
Orbitly Pitch Deck|A Mission-Driven Platform for Side Project Collaboration (...
zz41354899
 
Security features in Dell, HP, and Lenovo PC systems: A research-based compar...
Principled Technologies
 
IT Runs Better with ThousandEyes AI-driven Assurance
ThousandEyes
 
Automating ArcGIS Content Discovery with FME: A Real World Use Case
Safe Software
 
Make GenAI investments go further with the Dell AI Factory
Principled Technologies
 
Tea4chat - another LLM Project by Kerem Atam
a0m0rajab1
 
NewMind AI Weekly Chronicles - July'25 - Week IV
NewMind AI
 
Google I/O Extended 2025 Baku - all ppts
HusseinMalikMammadli
 
Responsible AI and AI Ethics - By Sylvester Ebhonu
Sylvester Ebhonu
 
Presentation about Hardware and Software in Computer
snehamodhawadiya
 
MASTERDECK GRAPHSUMMIT SYDNEY (Public).pdf
Neo4j
 
Data_Analytics_vs_Data_Science_vs_BI_by_CA_Suvidha_Chaplot.pdf
CA Suvidha Chaplot
 
Structs to JSON: How Go Powers REST APIs
Emily Achieng
 
Research-Fundamentals-and-Topic-Development.pdf
ayesha butalia
 
A Strategic Analysis of the MVNO Wave in Emerging Markets.pdf
IPLOOK Networks
 

Cloud Computing Security

  • 1. Cloud Computing: Finding the Silver Lining Steve Hanna, Juniper Networks Copyright Š 2009 Juniper Networks, Inc. 1
  • 2. Agenda   What is Cloud Computing?   Security Analysis of Cloud Computing   Conclusions Copyright Š 2009 Juniper Networks, Inc. 2
  • 3. Agenda   What is Cloud Computing?   Security Analysis of Cloud Computing   Conclusions Copyright Š 2009 Juniper Networks, Inc. 3
  • 4. Cloud Computing Defined   Dynamically scalable shared resources accessed over a network •  Only pay for what you use •  Shared internally or with other customers •  Resources = storage, computing, services, etc. •  Internal network or Internet   Notes •  Similar to Timesharing •  Rent IT resources vs. buy •  New term – definition still being developed Copyright Š 2009 Juniper Networks, Inc. 4
  • 5. Conventional Data Center Data Center Data Applications Enterprise LAN Office User Internet Remote User Copyright Š 2009 Juniper Networks, Inc. 5
  • 6. Cloud Computing Model Enterprise 2 Cloud Provider Enterprise 1 Enterprise LAN Data Applications Enterprise LAN Office User Internet Remote User Copyright Š 2009 Juniper Networks, Inc. 6
  • 7. Many Flavors of Cloud Computing   SaaS – Software as a Service •  Network-hosted application   DaaS – Data as a Service •  Customer queries against provider’s database   PaaS– Platform as a Service •  Network-hosted software development platform   IaaS – Infrastructure as a Service •  Provider hosts customer VMs or provides network storage   IPMaaS – Identity and Policy Management as a Service •  Provider manages identity and/or access control policy for customer   NaaS – Network as a Service •  Provider offers virtualized networks (e.g. VPNs) Copyright Š 2009 Juniper Networks, Inc. 7
  • 8. Cloud Computing Providers DaaS SaaS PaaS IPM Software & Data IPMaaS Infrastructure NaaS IaaS (DC/server) Copyright Š 2009 Juniper Networks, Inc. 8
  • 9. Cloud Computing Pros and Cons Compliance/regulatory laws mandate on-site Pros ownership of data Reduced costs Resource sharing is more Security and privacy efficient Latency & bandwidth guarantees Management moves to Absence of robust SLAs cloud provider Uncertainty around Consumption based cost interoperability, portability & lock in Faster time to roll out new services Availability & reliability Dynamic resource availability for crunch Inhibitors periods Copyright Š 2009 Juniper Networks, Inc. 9
  • 10. Who’s using Clouds today? Copyright Š 2009 Juniper Networks, Inc. 10
  • 11. Example: Mogulus   Mogulus is a live broadcast platform on the internet. (cloud customer) •  Producers can use the Mogulus browser-based Studio application to create LIVE, scheduled and on-demand internet television to broadcast anywhere on the web through a single player widget.   Mogulus is entirely hosted on cloud (cloud provider)   On Election night Mogulus ramped to: •  87000 videos @500kbps = 43.5 Gbps •  http://www.mogulus.com Copyright Š 2009 Juniper Networks, Inc. 11
  • 12. Example: Animoto   Animoto is a video rendering & production house with service available over the Internet (cloud customer) •  With their patent-pending technology and high-end motion design, each video is a fully customized orchestration of user-selected images and music in several formats, including DVD.   Animoto is entirely hosted on cloud (cloud provider)   Released Facebook App: users were able to easily render their photos into MTV like videos •  Ramped from 25,000 users to 250,000 users in three days •  Signing up 20,000 new users per hour at peak •  Went from 50 to 3500 servers in 5 days •  Two weeks later scaled back to 100 servers •  http://www.animoto.com Copyright Š 2009 Juniper Networks, Inc. 12
  • 13. Example: New York Times   Timesmachine is a news archive of the NY Times available in pdf over the Internet to newspaper subscribers (cloud customer)   Timesmachine is entirely hosted on cloud (cloud provider)   Timesmachine needed infrastructure to host several terabits of data •  Internal IT rejected due to cost •  Business owners got the data up on cloud for $50 over one weekend •  http://timesmachine.nytimes.com Copyright Š 2009 Juniper Networks, Inc. 13
  • 14. Example: Eli Lilly   Eli Lilly is the 10th largest pharmaceutical company in the world (cloud customer)   Moved entire R&D environment to cloud (cloud provider)   Results: •  Reduced costs •  Global access to R&D applications •  Rapid transition due to VM hosting •  Time to deliver new services greatly reduced: •  New server: 7.5 weeks down to 3 minutes •  New collaboration: 8 weeks down to 5 minutes •  64 node linux cluster: 12 weeks down to 5 minutes Copyright Š 2009 Juniper Networks, Inc. 14
  • 15. Who’s using Clouds today?   Startups & Small businesses •  Can use clouds for everything •  SaaS, IaaS, collaboration services, online presence   Mid-Size Enterprises •  Can use clouds for many things •  Compute cycles for R&D projects, online collaboration, partner integration, social networking, new business tools   Large Enterprises •  More likely to have hybrid models where they keep some things in house •  On premises data for legal and risk management reasons Copyright Š 2009 Juniper Networks, Inc. 15
  • 16. Agenda   What is Cloud Computing?   Security Analysis of Cloud Computing   Conclusions Copyright Š 2009 Juniper Networks, Inc. 16
  • 17. Information Security Risk Management Process (ISO 27005)   Establish Context   Risk Assessment •  Identify Risks •  Identify Assets •  Identify Threats •  Identify Existing Controls •  Identify Vulnerabilities •  Identify Consequences •  Estimate Risks •  Evaluate Risks   Develop Risk Treatment Plan •  Reduce, Retain, Avoid, or Transfer Risks   Risk Acceptance   Implement Risk Treatment Plan   Monitor and Review Risks Copyright Š 2009 Juniper Networks, Inc. 17
  • 18. Streamlined Security Analysis Process   Identify Assets •  Which assets are we trying to protect? •  What properties of these assets must be maintained?   Identify Threats •  What attacks can be mounted? •  What other threats are there (natural disasters, etc.)?   Identify Countermeasures •  How can we counter those attacks?   Appropriate for Organization-Independent Analysis •  We have no organizational context or policies Copyright Š 2009 Juniper Networks, Inc. 18
  • 19. Identify Assets Copyright Š 2009 Juniper Networks, Inc. 19
  • 20. Conventional Data Center Data Center Data Applications Enterprise LAN Office User Internet Remote User Copyright Š 2009 Juniper Networks, Inc. 20
  • 21. Cloud Computing Model Enterprise 2 Cloud Provider Enterprise 1 Enterprise LAN Data Applications Enterprise LAN Office User Internet Remote User Copyright Š 2009 Juniper Networks, Inc. 21
  • 22. Identify Assets   Customer Data   Customer Applications   Client Computing Devices Copyright Š 2009 Juniper Networks, Inc. 22
  • 23. Information Security Principles (Triad)   C I A •  Confidentiality •  Prevent unauthorized disclosure •  Integrity •  Preserve information integrity •  Availability •  Ensure information is available when needed Copyright Š 2009 Juniper Networks, Inc. 23
  • 24. Identify Assets & Principles   Customer Data •  Confidentiality, integrity, and availability   Customer Applications •  Confidentiality, integrity, and availability   Client Computing Devices •  Confidentiality, integrity, and availability Copyright Š 2009 Juniper Networks, Inc. 24
  • 25. Identify Threats Copyright Š 2009 Juniper Networks, Inc. 25
  • 26. Cloud Computing Model Enterprise 2 Cloud Provider Enterprise 1 Enterprise LAN Data Applications Enterprise LAN Office User Internet Remote User Copyright Š 2009 Juniper Networks, Inc. 26
  • 27. Identify Threats   Failures in Provider Security   Attacks by Other Customers   Availability and Reliability Issues   Legal and Regulatory Issues   Perimeter Security Model Broken   Integrating Provider and Customer Security Systems Copyright Š 2009 Juniper Networks, Inc. 27
  • 28. Failures in Provider Security   Explanation •  Provider controls servers, network, etc. •  Customer must trust provider’s security •  Failures may violate CIA principles   Countermeasures •  Verify and monitor provider’s security   Notes •  Outside verification may suffice •  For SMB, provider security may exceed customer security Copyright Š 2009 Juniper Networks, Inc. 28
  • 29. Attacks by Other Customers   Threats •  Provider resources shared with untrusted parties •  CPU, storage, network •  Customer data and applications must be separated •  Failures will violate CIA principles   Countermeasures •  Hypervisors for compute separation •  MPLS, VPNs, VLANs, firewalls for network separation •  Cryptography (strong) •  Application-layer separation (less strong) Copyright Š 2009 Juniper Networks, Inc. 29
  • 30. Availability and Reliability Issues   Threats •  Clouds may be less available than in-house IT •  Complexity increases chance of failure •  Clouds are prominent attack targets •  Internet reliability is spotty •  Shared resources may provide attack vectors •  BUT cloud providers focus on availability   Countermeasures •  Evaluate provider measures to ensure availability •  Monitor availability carefully •  Plan for downtime •  Use public clouds for less essential applications Copyright Š 2009 Juniper Networks, Inc. 30
  • 31. Legal and Regulatory Issues   Threats •  Laws and regulations may prevent cloud computing •  Requirements to retain control •  Certification requirements not met by provider •  Geographical limitations – EU Data Privacy •  New locations may trigger new laws and regulations   Countermeasures •  Evaluate legal issues •  Require provider compliance with laws and regulations •  Restrict geography as needed Copyright Š 2009 Juniper Networks, Inc. 31
  • 32. Perimeter Security Model Broken Copyright Š 2009 Juniper Networks, Inc. 32
  • 33. Perimeter Security Model Data Center Data Applications Safe Zone Enterprise LAN Office User Internet Remote User Copyright Š 2009 Juniper Networks, Inc. 33
  • 34. Perimeter Security with Cloud Computing? Enterprise 2 Cloud Provider Enterprise 1 Enterprise LAN Data Applications Enterprise LAN Office User Internet Remote User Copyright Š 2009 Juniper Networks, Inc. 34
  • 35. Perimeter Security Model Broken   Threats •  Including the cloud in your perimeter •  Lets attackers inside the perimeter •  Prevents mobile users from accessing the cloud directly •  Not including the cloud in your perimeter •  Essential services aren’t trusted •  No access controls on cloud   Countermeasures •  Drop the perimeter model! Copyright Š 2009 Juniper Networks, Inc. 35
  • 36. Integrating Provider and Customer Security   Threat •  Disconnected provider and customer security systems •  Fired employee retains access to cloud •  Misbehavior in cloud not reported to customer   Countermeasures •  At least, integrate identity management •  Consistent access controls •  Better, integrate monitoring and notifications   Notes •  Can use SAML, LDAP, RADIUS, XACML, IF-MAP, etc. Copyright Š 2009 Juniper Networks, Inc. 36
  • 37. Agenda   What is Cloud Computing?   Security Analysis of Cloud Computing   Conclusions Copyright Š 2009 Juniper Networks, Inc. 37
  • 38. Bottom Line on Cloud Computing Security   Engage in full risk management process for each case   For small and medium organizations •  Cloud security may be a big improvement! •  Cost savings may be large (economies of scale)   For large organizations •  Already have large, secure data centers •  Main sweet spots: •  Elastic services •  Internet-facing services   Employ countermeasures listed above Copyright Š 2009 Juniper Networks, Inc. 38
  • 39. Security Analysis Skills Reviewed Today   Information Security Risk Management Process •  Variations used throughout IT industry •  ISO 27005, NIST SP 800-30, etc. •  Requires thorough knowledge of threats and controls •  Bread and butter of InfoSec – Learn it! •  Time-consuming but not difficult   Streamlined Security Analysis Process •  Many variations •  RFC 3552, etc. •  Requires thorough knowledge of threats and controls •  Useful for organization-independent analysis •  Practice this on any RFC or other standard •  Become able to do it in 10 minutes Copyright Š 2009 Juniper Networks, Inc. 39
  • 40. Discussion Copyright Š 2009 Juniper Networks, Inc. 40
  • 41. Copyright Š 2009 Juniper Networks, Inc. 41