Download presentation
Presentation is loading. Please wait.
Published byBlaise Osborne Modified over 9 years ago
2
Security Could Ruin Everything!
4
Source: 451 Research, Dec 2012
6
Cloud Operations Hypervisor Cloud Service APIs DevOps Deployer DC Ops Private Network Attacker Enterprise Consumer Enterprise Private Network Internet Datacenter Cloud Service Provider
7
https://cloudsecurityalliance.org/research/top-threats/
8
Cloud Service APIs Datacenter Hypervisor
10
Enterprise Multi-tenancy
11
Hypervisor Attacker Customer B Customer A
12
http://www.zdnet.com/hypervisors-the-clouds-potential-security-achilles-heel-7000027846/
13
Hostile Multi-tenancy
14
My assessment CSA assessment
16
“Bring Your Own IT” (BYOIT)
18
Hypervisor Attacker Enterprise Attacker Friend AWS
19
For Cloud Service Providers Only
21
Cloud Operations Hypervisor Cloud Service APIs DevOps Deployer DC Ops Private Network Datacenter Cloud Service Provider
26
well, public
27
Hypervisor Cloud Service APIs Attacker Enterprise Internet Datacenter
29
Source: CSA - Cloud Computing Vulnerability Incidents: A Statistical Overview
32
Cloud Operations Hypervisor Attacker Cloud Service APIs
35
US North (primary)US South (secondary)
37
DC Ops
38
Cloud Service APIs Attacker Enterprise
40
Hypervisor https://www.cs.unc.edu/~reiter/papers/2012/CCS.pdf
42
Cloud Service APIs Attacker
44
Cloud Operations Hypervisor Cloud Service APIs DevOps Deployer DC Ops Private Network Attacker Enterprise Consumer Enterprise Private Network Internet Datacenter Cloud Service Provider http://cser.org
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.