Copyright © 2009 Juniper Networks, Inc. 1 Cloud Computing: Finding the Silver Lining Steve Hanna, Juniper Networks.

Slides:



Advertisements
Similar presentations
Chapter 22: Cloud Computing and Related Security Issues Guide to Computer Network Security.
Advertisements

INTRODUCTION TO CLOUD COMPUTING CS 595 LECTURE 6 2/13/2015.
Public cloud definition Public cloud is a cloud in which Cloud infrastructure is available to the general public. Public cloud define cloud computing.
Cloud Computing (101).
Cloud Computing Will Crowley Monica Lopez Jaimie Morrison.
Cloud Computing Security
Cloud Usability Framework
Wally Kowal, President and Founder Canadian Cloud Computing Inc.
M.A.Doman Model for enabling the delivery of computing as a SERVICE.
Engineering the Cloud Andrew McCombs March 10th, 2011.
Cloud Computing Stuart Dillon-Roberts. “In the simplest terms, cloud computing means storing & accessing data & programs over the Internet instead of.
Addition to Networking.  There is no unique and standard definition out there  Cloud Computing is a general term used to describe a new class of network.
Securing and Auditing Cloud Computing Jason Alexander Chief Information Security Officer.
INTRODUCTION TO CLOUD COMPUTING Cs 595 Lecture 5 2/11/2015.
SOFTWARE AS A SERVICE PLATFORM AS A SERVICE INFRASTRUCTURE AS A SERVICE.
Plan Introduction What is Cloud Computing?
VAP What is a Virtual Application ? A virtual application is an application that has been optimized to run on virtual infrastructure. The application software.
1 © 2009 Cisco Systems, Inc. All rights reserved.Cisco PublicC Cloud Computing: What’s on the Horizon Daniel Bogda Channel SE.
Introduction to Cloud Computing
“ Does Cloud Computing Offer a Viable Option for the Control of Statistical Data: How Safe Are Clouds” Federal Committee for Statistical Methodology (FCSM)
Effectively Explaining the Cloud to Your Colleagues.
Cloud Computing Cloud Computing Class-1. Introduction to Cloud Computing In cloud computing, the word cloud (also phrased as "the cloud") is used as a.
Treasury in the Cloud Bob Stark – Vice President, Strategy September 17, 2014.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
No one questions that Microsoft can write great software. Customers want to know if we can be innovative, scalable, reliable in the cloud. (1996) 450M+
Adam Leidigh Brandon Pyle Bernardo Ruiz Daniel Nakamura Arianna Campos.
SECURITY IN CLOUD COMPUTING By Bina Bhaskar Anand Mukundan.
Cloud Computing Prof.dr Veljko Milutinović
Cloud Computing Saneel Bidaye uni-slb2181. What is Cloud Computing? Cloud Computing refers to both the applications delivered as services over the Internet.
Cloud Computing Kwangyun Cho v=8AXk25TUSRQ.
Lecture 6: Cloud Computing By D. Najla Al-Nabhan 1.
Dell Connected Security Solutions Simplify & unify.
Computer Science and Engineering 1 Cloud ComputingSecurity.
M.A.Doman Short video intro Model for enabling the delivery of computing as a SERVICE.
ISO17799 Maturity. Confidentiality Confidentiality relates to the protection of sensitive data from unauthorized use and distribution. Examples include:
Cloud Computing Issues. Why Is "Security" Everywhere on That Slide? Security is generally perceived as a huge issue for the cloud: During a keynote.
Plan  Introduction  What is Cloud Computing?  Why is it called ‘’Cloud Computing’’?  Characteristics of Cloud Computing  Advantages of Cloud Computing.
Chapter 1 Overview The NIST Computer Security Handbook defines the term Computer Security as:
What is the cloud ? IT as a service Cloud allows access to services without user technical knowledge or control of supporting infrastructure Best described.
Cloud Computing Security Keep Your Head and Other Data Secure in the Cloud Lynne Pizzini, CISSP, CISM, CIPP Information Systems Security Officer Information.
Lecture slides prepared for “Computer Security: Principles and Practice”, 3/e, by William Stallings and Lawrie Brown, Chapter 1 “Overview”. © 2016 Pearson.
Company small business cloud solution Client UNIVERSITY OF BEDFORDSHIRE.
Lecture XIV: Cloud Software Security CS 4593 Cloud-Oriented Big Data and Software Engineering.
PRIVACYRELIABILIT Y SECURITY Secures against attacks Protects confidentiality, integrity, and availability of data and systems Helps manage risk Protects.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
1 TCS Confidential. 2 Objective : In this session we will be able to learn:  What is Cloud Computing?  Characteristics  Cloud Flavors  Cloud Deployment.
Dr. Hussein Al-Bahadili Faculty of Information Technology Petra University Securing E-Transaction 1/24.
RANDY MODOWSKI COSC Cloud Computing. Road Map What is Cloud Computing? History of “The Cloud” Cloud Milestones How Cloud Computing is being used.
PRESENTED BY– IRAM KHAN ISHITA TRIPATHI GAURAV AGRAWAL GAURAV SINGH HIMANSHU AWASTHI JAISWAR VIJAY KUMAR JITENDRA KUMAR VERMA JITENDRA SINGH KAMAL KUMAR.
Cloud, big data, and mobility Your phone today probably meets the minimum requirements to run Windows Server 2003 Transformational change up.
© 2012 Eucalyptus Systems, Inc. Cloud Computing Introduction Eucalyptus Education Services 2.
Agenda  What is Cloud Computing?  Milestone of Cloud Computing  Common Attributes of Cloud Computing  Cloud Service Layers  Cloud Implementation.
Clouding with Microsoft Azure
CS457 Introduction to Information Security Systems
Lecture 6: Cloud Computing
Understanding The Cloud
Platform as a Service (PaaS)
Cloud adoption NECOOST Advisory | June 2017.
VIRTUALIZATION & CLOUD COMPUTING
Chapter 21: Cloud Computing and Related Security Issues
Chapter 22: Cloud Computing Technology and Security
CLOUD COMPUTING Presented By:- EduTechlearners
EIS Fast-track Revision Om Trivedi Enterprise Information Systems
Datacastle RED Delivers a Proven, Enterprise-Class Endpoint Data Protection Solution that Is Scalable to Millions of Devices on the Microsoft Azure Platform.
Cloud Computing Cloud computing refers to “a model of computing that provides access to a shared pool of computing resources (computers, storage, applications,
Computer Science and Engineering
Cloud Computing for Wireless Networks
Presentation transcript:

Copyright © 2009 Juniper Networks, Inc. 1 Cloud Computing: Finding the Silver Lining Steve Hanna, Juniper Networks

Copyright © 2009 Juniper Networks, Inc. 2 Agenda  What is Cloud Computing?  Security Analysis of Cloud Computing  Conclusions

Copyright © 2009 Juniper Networks, Inc. 3 Agenda  What is Cloud Computing?  Security Analysis of Cloud Computing  Conclusions

Copyright © 2009 Juniper Networks, Inc. 4 Cloud Computing Defined  Dynamically scalable shared resources accessed over a network Only pay for what you use Shared internally or with other customers Resources = storage, computing, services, etc. Internal network or Internet  Notes Similar to Timesharing Rent IT resources vs. buy New term – definition still being developed

Copyright © 2009 Juniper Networks, Inc. 5 Office User Enterprise LAN Conventional Data Center Internet Remote User Data Center Data Applications

Copyright © 2009 Juniper Networks, Inc. 6 Office User Enterprise LAN Cloud Computing Model Internet Cloud Provider Remote User Applications Data Enterprise 1 Enterprise LAN Enterprise 2

Copyright © 2009 Juniper Networks, Inc. 7 Many Flavors of Cloud Computing  SaaS – Software as a Service Network-hosted application  DaaS – Data as a Service Customer queries against provider’s database  PaaS– Platform as a Service Network-hosted software development platform  IaaS – Infrastructure as a Service Provider hosts customer VMs or provides network storage  IPMaaS – Identity and Policy Management as a Service Provider manages identity and/or access control policy for customer  NaaS – Network as a Service Provider offers virtualized networks (e.g. VPNs)

Copyright © 2009 Juniper Networks, Inc. 8 Cloud Computing Providers NaaS IaaS (DC/server) DaaSSaaSPaaS IPMaaS IPM Software\ & Data Infrastructure

Copyright © 2009 Juniper Networks, Inc. 9 Security and privacy Compliance/regulatory laws mandate on-site ownership of data Availability & reliability Inhibitors Uncertainty around interoperability, portability & lock in Latency & bandwidth guarantees Absence of robust SLAs Cloud Computing Pros and Cons Management moves to cloud provider Dynamic resource availability for crunch periods Consumption based cost Resource sharing is more efficient Pros Faster time to roll out new services Reduced costs

Copyright © 2009 Juniper Networks, Inc. 10 Who’s using Clouds today?

Copyright © 2009 Juniper Networks, Inc. 11 Example: Mogulus  Mogulus is a live broadcast platform on the internet. (cloud customer) Producers can use the Mogulus browser-based Studio application to create LIVE, scheduled and on-demand internet television to broadcast anywhere on the web through a single player widget.  Mogulus is entirely hosted on cloud (cloud provider)  On Election night Mogulus ramped to: = 43.5 Gbps

Copyright © 2009 Juniper Networks, Inc. 12 Example: Animoto  Animoto is a video rendering & production house with service available over the Internet (cloud customer) With their patent-pending technology and high-end motion design, each video is a fully customized orchestration of user-selected images and music in several formats, including DVD.  Animoto is entirely hosted on cloud (cloud provider)  Released Facebook App: users were able to easily render their photos into MTV like videos Ramped from 25,000 users to 250,000 users in three days Signing up 20,000 new users per hour at peak Went from 50 to 3500 servers in 5 days Two weeks later scaled back to 100 servers

Copyright © 2009 Juniper Networks, Inc. 13 Example: New York Times  Timesmachine is a news archive of the NY Times available in pdf over the Internet to newspaper subscribers (cloud customer)  Timesmachine is entirely hosted on cloud (cloud provider)  Timesmachine needed infrastructure to host several terabits of data Internal IT rejected due to cost Business owners got the data up on cloud for $50 over one weekend

Copyright © 2009 Juniper Networks, Inc. 14 Example: Eli Lilly  Eli Lilly is the 10th largest pharmaceutical company in the world (cloud customer)  Moved entire R&D environment to cloud (cloud provider)  Results: Reduced costs Global access to R&D applications Rapid transition due to VM hosting Time to deliver new services greatly reduced: New server: 7.5 weeks down to 3 minutes New collaboration: 8 weeks down to 5 minutes 64 node linux cluster: 12 weeks down to 5 minutes

Copyright © 2009 Juniper Networks, Inc. 15 Who’s using Clouds today?  Startups & Small businesses Can use clouds for everything SaaS, IaaS, collaboration services, online presence  Mid-Size Enterprises Can use clouds for many things Compute cycles for R&D projects, online collaboration, partner integration, social networking, new business tools  Large Enterprises More likely to have hybrid models where they keep some things in house On premises data for legal and risk management reasons

Copyright © 2009 Juniper Networks, Inc. 16 Agenda  What is Cloud Computing?  Security Analysis of Cloud Computing  Conclusions

Copyright © 2009 Juniper Networks, Inc. 17 Information Security Risk Management Process (ISO 27005)  Establish Context  Risk Assessment Identify Risks Identify Assets Identify Threats Identify Existing Controls Identify Vulnerabilities Identify Consequences Estimate Risks Evaluate Risks  Develop Risk Treatment Plan Reduce, Retain, Avoid, or Transfer Risks  Risk Acceptance  Implement Risk Treatment Plan  Monitor and Review Risks

Copyright © 2009 Juniper Networks, Inc. 18 Streamlined Security Analysis Process  Identify Assets Which assets are we trying to protect? What properties of these assets must be maintained?  Identify Threats What attacks can be mounted? What other threats are there (natural disasters, etc.)?  Identify Countermeasures How can we counter those attacks?  Appropriate for Organization-Independent Analysis We have no organizational context or policies

Copyright © 2009 Juniper Networks, Inc. 19 Identify Assets

Copyright © 2009 Juniper Networks, Inc. 20 Office User Enterprise LAN Conventional Data Center Internet Remote User Data Center Data Applications

Copyright © 2009 Juniper Networks, Inc. 21 Office User Enterprise LAN Cloud Computing Model Internet Cloud Provider Remote User Applications Data Enterprise LAN Enterprise 1 Enterprise 2

Copyright © 2009 Juniper Networks, Inc. 22 Identify Assets  Customer Data  Customer Applications  Client Computing Devices

Copyright © 2009 Juniper Networks, Inc. 23 Information Security Principles (Triad)  C I A Confidentiality Prevent unauthorized disclosure Integrity Preserve information integrity Availability Ensure information is available when needed

Copyright © 2009 Juniper Networks, Inc. 24 Identify Assets & Principles  Customer Data Confidentiality, integrity, and availability  Customer Applications Confidentiality, integrity, and availability  Client Computing Devices Confidentiality, integrity, and availability

Copyright © 2009 Juniper Networks, Inc. 25 Identify Threats

Copyright © 2009 Juniper Networks, Inc. 26 Office User Enterprise LAN Cloud Computing Model Internet Cloud Provider Remote User Applications Data Enterprise LAN Enterprise 1 Enterprise 2

Copyright © 2009 Juniper Networks, Inc. 27 Identify Threats  Failures in Provider Security  Attacks by Other Customers  Availability and Reliability Issues  Legal and Regulatory Issues  Perimeter Security Model Broken  Integrating Provider and Customer Security Systems

Copyright © 2009 Juniper Networks, Inc. 28 Failures in Provider Security  Explanation Provider controls servers, network, etc. Customer must trust provider’s security Failures may violate CIA principles  Countermeasures Verify and monitor provider’s security  Notes Outside verification may suffice For SMB, provider security may exceed customer security

Copyright © 2009 Juniper Networks, Inc. 29 Attacks by Other Customers  Threats Provider resources shared with untrusted parties CPU, storage, network Customer data and applications must be separated Failures will violate CIA principles  Countermeasures Hypervisors for compute separation MPLS, VPNs, VLANs, firewalls for network separation Cryptography (strong) Application-layer separation (less strong)

Copyright © 2009 Juniper Networks, Inc. 30 Availability and Reliability Issues  Threats Clouds may be less available than in-house IT Complexity increases chance of failure Clouds are prominent attack targets Internet reliability is spotty Shared resources may provide attack vectors BUT cloud providers focus on availability  Countermeasures Evaluate provider measures to ensure availability Monitor availability carefully Plan for downtime Use public clouds for less essential applications

Copyright © 2009 Juniper Networks, Inc. 31 Legal and Regulatory Issues  Threats Laws and regulations may prevent cloud computing Requirements to retain control Certification requirements not met by provider Geographical limitations – EU Data Privacy New locations may trigger new laws and regulations  Countermeasures Evaluate legal issues Require provider compliance with laws and regulations Restrict geography as needed

Copyright © 2009 Juniper Networks, Inc. 32 Perimeter Security Model Broken

Copyright © 2009 Juniper Networks, Inc. 33 Office User Enterprise LAN Perimeter Security Model Internet Remote User Data Center Data Applications Safe Zone

Copyright © 2009 Juniper Networks, Inc. 34 Office User Enterprise LAN Perimeter Security with Cloud Computing? Internet Cloud Provider Remote User Applications Data Enterprise LAN Enterprise 1 Enterprise 2

Copyright © 2009 Juniper Networks, Inc. 35 Perimeter Security Model Broken  Threats Including the cloud in your perimeter Lets attackers inside the perimeter Prevents mobile users from accessing the cloud directly Not including the cloud in your perimeter Essential services aren’t trusted No access controls on cloud  Countermeasures Drop the perimeter model!

Copyright © 2009 Juniper Networks, Inc. 36 Integrating Provider and Customer Security  Threat Disconnected provider and customer security systems Fired employee retains access to cloud Misbehavior in cloud not reported to customer  Countermeasures At least, integrate identity management Consistent access controls Better, integrate monitoring and notifications  Notes Can use SAML, LDAP, RADIUS, XACML, IF-MAP, etc.

Copyright © 2009 Juniper Networks, Inc. 37 Agenda  What is Cloud Computing?  Security Analysis of Cloud Computing  Conclusions

Copyright © 2009 Juniper Networks, Inc. 38 Bottom Line on Cloud Computing Security  Engage in full risk management process for each case  For small and medium organizations Cloud security may be a big improvement! Cost savings may be large (economies of scale)  For large organizations Already have large, secure data centers Main sweet spots: Elastic services Internet-facing services  Employ countermeasures listed above

Copyright © 2009 Juniper Networks, Inc. 39 Security Analysis Skills Reviewed Today  Information Security Risk Management Process Variations used throughout IT industry ISO 27005, NIST SP , etc. Requires thorough knowledge of threats and controls Bread and butter of InfoSec – Learn it! Time-consuming but not difficult  Streamlined Security Analysis Process Many variations RFC 3552, etc. Requires thorough knowledge of threats and controls Useful for organization-independent analysis Practice this on any RFC or other standard Become able to do it in 10 minutes

Copyright © 2009 Juniper Networks, Inc. 40 Copyright © 2009 Juniper Networks, Inc. 40 Discussion

Copyright © 2009 Juniper Networks, Inc. 41 Copyright © 2009 Juniper Networks, Inc. 41