©2012 Check Point Software Technologies Ltd. Cloud Security Tamir Zegman Architect.

Slides:



Advertisements
Similar presentations
Gold Sponsors Bronze Sponsors Silver Sponsors Taking SharePoint to the Cloud Aaron Saikovski Readify – Software Solution Specialist.
Advertisements

1 Cloud Computing with Amazon and Oracle Lewis Cunningham TUSC, Sr Datawarehouse Consultant
Dr. Bhavani Thuraisingham June 2013
INTRODUCTION TO CLOUD COMPUTING CS 595 LECTURE 6 2/13/2015.
Security in the Cloud: Can You Trust What You Can’t Touch? Rob Johnson Security Architect, Cloud Engineering Unisys Corp.
Security Issues and Challenges in Cloud Computing
Public cloud definition Public cloud is a cloud in which Cloud infrastructure is available to the general public. Public cloud define cloud computing.
What is Cloud Computing? o Cloud computing:- is a style of computing in which dynamically scalable and often virtualized resources are provided as a service.
© 2010 VMware Inc. All rights reserved Confidential VMware Vision Jarod Martin Senior Solutions Engineer.
Finalize RESTful Application Programming Interface (API) Security Recommendations Transport & Security Standards Workgroup January 28, 2014.
Cloud Computing Will Crowley Monica Lopez Jaimie Morrison.
Presented by Sujit Tilak. Evolution of Client/Server Architecture Clients & Server on different computer systems Local Area Network for Server and Client.
SaaS, PaaS & TaaS By: Raza Usmani
M.A.Doman Model for enabling the delivery of computing as a SERVICE.
Securing and Auditing Cloud Computing Jason Alexander Chief Information Security Officer.
INTRODUCTION TO CLOUD COMPUTING Cs 595 Lecture 5 2/11/2015.
Software Engineering for Cloud Computing Rao, Feng 04/27/2011.
Health IT RESTful Application Programming Interface (API) Security Considerations Transport & Security Standards Workgroup March 18, 2015.
Travis, Stephanie, Alex.  Cloud computing is a general term for anything that involves delivering hosted services over the Internet.  These services.
Plan Introduction What is Cloud Computing?
Real Security for Server Virtualization Rajiv Motwani 2 nd October 2010.
 Cloud computing is one of the more recent technologies that many businesses, individuals and other industry organizations believe to by one of the keys.
Cloud Computing Cloud Security– an overview Keke Chen.
Introduction to Cloud Computing
Cloud Computing All Copyrights reserved to Talal Abu-Ghazaleh Organization
Osama Shahid ( ) Vishal ( ) BSCS-5B
Cloud computing is the use of computing resources (hardware and software) that are delivered as a service over the Internet. Cloud is the metaphor for.
Cloud Computing. What is Cloud Computing? Cloud computing is a model for enabling convenient, on-demand network access to a shared pool of configurable.
Using the Powerful Microsoft Azure Platform, e-SUAP Properly and Securely Manages All Steps for Customizable Business Activities Permissions MICROSOFT.
Introduction to Cloud Computing
In the name of God :).
M.A.Doman Short video intro Model for enabling the delivery of computing as a SERVICE.
Cloud Computing & Amazon Web Services – EC2 Arpita Patel Software Engineer.
1 © 2009 Cisco Systems, Inc. All rights reserved.Cisco Confidential Cloud Computing – The Value Proposition Wayne Clark Architect, Intelligent Network.
For Testbeds TM. Secure, multi-tenant cloud orchestration platform –Turnkey platform for delivering IaaS clouds –Hypervisor agnostic –Massively scalable,
What is the cloud ? IT as a service Cloud allows access to services without user technical knowledge or control of supporting infrastructure Best described.
Corent’s SurPaaS Transforms Your Software into Scalable SaaS on Windows Azure – in Days! COMPANY PROFILE: CORENT TECHNOLOGY INC. Corent’s SurPaaS is a.
Enterprise Cloud Computing
Speaker: Meng-Ting Tsai Date:2010/11/25 The Information Assurance Practices of Cloud Computing Vendors IEEE Communications Society.
Nov 22/26 Tech Forum 2015 Roberto Trinconi Cloud the New Path to the Business Leadership.
Chapter 8 – Cloud Computing
CLOUD COMPUTING RICH SANGPROM. What is cloud computing? “Cloud computing is a model for enabling ubiquitous, convenient, on-demand network access to a.
Web Technologies Lecture 13 Introduction to cloud computing.
Information Systems in Organizations 5.2 Cloud Computing.
Flight is a SaaS Solution that Accelerates the Secure Transfer of Large Files and Data Sets Into and Out of Microsoft Azure Blob Storage MICROSOFT AZURE.
1 TCS Confidential. 2 Objective : In this session we will be able to learn:  What is Cloud Computing?  Characteristics  Cloud Flavors  Cloud Deployment.
Information Systems in Organizations 5.2 Cloud Computing.
RANDY MODOWSKI COSC Cloud Computing. Road Map What is Cloud Computing? History of “The Cloud” Cloud Milestones How Cloud Computing is being used.
PRESENTED BY– IRAM KHAN ISHITA TRIPATHI GAURAV AGRAWAL GAURAV SINGH HIMANSHU AWASTHI JAISWAR VIJAY KUMAR JITENDRA KUMAR VERMA JITENDRA SINGH KAMAL KUMAR.
Technical Security Issues in Cloud Computing By: Meiko Jensen, Jorg Schwenk, Nils Gruschka, Luigi Lo Lacono Presentation by: Winston Tong 2009 IEEE.
What is Cloud Computing 1. Cloud computing is a service that helps you to perform the tasks over the Internet. The users can access resources as they.
CS 6027 Advanced Networking FINAL PROJECT ​. Cloud Computing KRANTHI ​ CHENNUPATI PRANEETHA VARIGONDA ​ SANGEETHA LAXMAN ​ VARUN ​ DENDUKURI.
Web 2.0: Concepts and Applications 6 Linking Data.
Prof. Jong-Moon Chung’s Lecture Notes at Yonsei University
Unit 3 Virtualization.
Chapter 6: Securing the Cloud
Understanding The Cloud
By: Raza Usmani SaaS, PaaS & TaaS By: Raza Usmani
Cloud Security– an overview Keke Chen
Recommendation 6: Using ‘cloud computing’ to meet the societal need ‘Faster and transparent access to public sector services’ Cloud computing Faster and.
Network Services, Cloud Computing, and Virtualization
Cloud Computing ISY143.
Cloud Computing Cloud computing refers to “a model of computing that provides access to a shared pool of computing resources (computers, storage, applications,
Chapter 9 An Introduction and Overview of Cloud Computing
Brandon Hixon Jonathan Moore
Cloud computing Technology: innovation. Points  Cloud Computing and Social Network Sites have become major trends not only in business but also in various.
Cloud computing Technology: innovation. Points  Cloud Computing and Social Network Sites have become major trends not only in business but also in various.
Information Systems in Organizations 5.2 Cloud Computing
Lecture 03.5: Cloud Computing ( SAAS )
Cloud Computing for Wireless Networks
Presentation transcript:

©2012 Check Point Software Technologies Ltd. Cloud Security Tamir Zegman Architect

2©2012 Check Point Software Technologies Ltd. Security as a Service  Not the topic of this presentation  Many types of security services: –Mail Security (Postini) –Web Security (ZScaler) –DDoS (Prolexic) –Anti-Virus (VirusTotal)  Many security offerings rely on Cloud Services (e.g. signature updates, reputation services etc.)

3©2012 Check Point Software Technologies Ltd.  Cloud can mean many things: –IaaS (AWS EC2, Google Compute Engine) –PaaS (Facebook Apps, AWS BeanStalk) –SaaS (SalesForce, Facebook) –Private / Public / Community clouds –Enterprise / Consumer

4©2012 Check Point Software Technologies Ltd. Public cloud - new Security concerns  Physical security  Data lifecycle  Foreign governments  Multi-tenants: –Hypervisor attacks –Network attacks: –Sniffing –Spoofing –DDoS

5©2012 Check Point Software Technologies Ltd. Security Built-in?  The big cloud providers are taking security into consideration: – center/security/ center/security/ – –  Seems like economies of scale play in favor of both parties: –The cloud provider is likely to have better security knowhow –Improved resiliency under attacks (DDoS & DR)

6©2012 Check Point Software Technologies Ltd. Separation of Responsibilities

7©2012 Check Point Software Technologies Ltd. Separation of Responsibilities  Customers can only manage security at the tiers they are responsible for  Customers must manage security at the tiers they are responsible for  Example: –In a PaaS Enviornment: –The cloud provider is responsible for patching the OS layer –The customer needs to make sure there are no vulnerabilities in his application code

8©2012 Check Point Software Technologies Ltd. S3  A “Simple Storage Service”  Upload and download of data objects  Data in motion: –SSL/TLS  Data at rest: –Client side encryption + key management –Server side encryption  A simple service with little security implications

9©2012 Check Point Software Technologies Ltd. SalesForce  The de-facto standard in CRM (customer relationship management)  Enjoy a big corporates install base  Stores very sensitive corporate data (list of customers, potential deals etc.)  Security concerns: –Authorization and access control –Data Loss Prevention

10©2012 Check Point Software Technologies Ltd. Authentication to cloud Apps  Requirements (enterprise) –Strong authentication –Single sign on –Automatic User de-provisioning –Support office, remote and mobile users –Support multiple SaaS providers  Solutions: –SAML- for corporate –OpenID- mostly for consumer –OAuth - “machine to machine”

11©2012 Check Point Software Technologies Ltd. SAML source: Google

12©2012 Check Point Software Technologies Ltd. Data at rest – SalesForce (and others)  Solution: –A proxy + tokenization/encryption service (e.g. CipherCloud) –Difficulty around ‘search’ functionality: –compromise security –Homomorphic encryption? –Fragile and limited

13©2012 Check Point Software Technologies Ltd. Network architecture  Network architectures: –Blurred perimeter: –Limited network topologies –Multiple cloud providers - similar but different –Limited or no control over tiers managed by the cloud provider –SDN  Overlay of security management: – –Cross vendor / region –Dynamically close/open ACLs –Dynamically close/open host FWs

14©2012 Check Point Software Technologies Ltd. Question  Thank you