Presentation is loading. Please wait.

Presentation is loading. Please wait.

Agenda Who needs an Architect? Cloud and Security Key Security Differences in Private Cloud Cloud Security Challenges Secondary to Essential Characteristics.

Similar presentations


Presentation on theme: "Agenda Who needs an Architect? Cloud and Security Key Security Differences in Private Cloud Cloud Security Challenges Secondary to Essential Characteristics."— Presentation transcript:

1

2 Agenda Who needs an Architect? Cloud and Security Key Security Differences in Private Cloud Cloud Security Challenges Secondary to Essential Characteristics Private Cloud Reference Model Private Cloud Security Model Private Cloud Security Principles

3

4 Is Knowing Architecture Useful? “Architects are space cadets” “Architects draw star charts” “Architects don’t have demos or HOLs” “Architects can’t do anything (don’t know how to do anything)” “I don’t know any architects” “I’ve never needed an architect” “What’s an architect?”

5 What’s in it for me?

6

7

8 Reviewing the Cloud Impact REDUCED MANAGEMENTNEW ECONOMICS INCREASED PRODUCTIVITY

9 Cloud Security Challenges

10 Defense in Depth Approach Multiple Layers of Protection

11

12 Security Responsibility

13 Shared Tenant Model Multiple orgs and divisions Multitenancy in private cloud Authentication Authorization Access controls Requires logical separation VMVM VMVM VMVM VMVM VMVM VMVM VMVM VMVM VMVM VMVM VMVM

14 Virtualization Platform Mobile Workloads Automated Mobility Unlinked from Px Security Tools Playing catch-up Virtualization of Security Controls Integrate with the private cloud fabric Provide separate configuration interfaces Provide programmable elastic, on- demand services Support policies governing logical attributes Enable trust zones separating multiple tenants in a dynamic environment

15

16 Principles provide general rules and guidelines to support the evolution of a secure cloud infrastructure. They are enduring, seldom amended, and inform and support the way you secure the private cloud. These principles form the basis on which a secure cloud infrastructure is planned, designed and created The Eleven Private Cloud Security Principles Limit “routing” Use strong cryptography Minimize attack service Audit extensively Strong GRC Automate security operations Security is a wrapper All data locations accessible Attackers are AuthN and AuthZ Enforce Isolation Apply generic security best practices

17

18 Resource Pooling As a consumer (tenant) of the services offered by a private cloud in my enterprise, I require that application data is secure, no one else can access it, and that the data is safe if something untoward occurs Prevent leakage between tenants AAA Also applies to administrators Role Based Access Control

19 On-Demand Self-Service As the architect, designer, or operator of a private cloud solution, how do I control who has access to my private cloud services and how do I monitor and audit the use of my services? Who has authority to: DemandProvisionUseRelease

20 Rapid Elasticity I am concerned that a rogue application, client, or denial of service (DoS) attack might destabilize the data center by requesting a large amount of resources. How do I reconcile the perception of infinite resources with reality?

21 Broad Network Access As an architect of a private cloud solution, I want to be sure that an appropriate level of security applies regardless of client location and regardless of form factor. This requirement applies to both cloud management and application security. Bring Your Own Device Assess device stateApplication access controlData on device

22 Broad Network Access - Reperimeterization Driven By: IPv6 Porous borders “Tail Chasing” Cost/benefit

23

24 Reference Model

25

26 Security Model

27 Virtualization Security Windows Kernel Server Core Virtualization Stack Device Drivers Windows hypervisor VM Worker Processes Guest Partitions Ring 0 Ring 3 OS Kernel VMBus Guest Applications Root Partition CPU Storage NIC Ring 0 Ring 3 “Ring “-1”

28 Physical Network Isolation

29 Data Center’s Physical Servers Guest OS Data-Center Network Logical Network Isolation

30 Next Steps http://social.technet.microsoft.com/wiki/contents/articles/6642.a-solution-for-private- cloud-security.aspx

31 Questions

32 We have some books for you!!


Download ppt "Agenda Who needs an Architect? Cloud and Security Key Security Differences in Private Cloud Cloud Security Challenges Secondary to Essential Characteristics."

Similar presentations


Ads by Google