1 / 12

34.HOW IS CLOUD SECURITY DIFFERENT FROM ON-PREMISE SECURITY

34.HOW IS CLOUD SECURITY DIFFERENT FROM ON-PREMISE SECURITY

MitSoni
Télécharger la présentation

34.HOW IS CLOUD SECURITY DIFFERENT FROM ON-PREMISE SECURITY

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. HOW IS CLOUD SECURITY DIFFERENT FROM ON-PREMISE SECURITY

  2. The typical entry point for the customers to the Cloud will be migration of their existing applications to the Cloud, initially as a proof-of-concept and later in production. • Customer will have the following questions: • How does the migrated application exploit the Performance, Scalability, Robustness models for Public Clouds? • How does the migrated application exploit the Security, Systems and Applications Management models for Public Clouds?

  3. The following security measures represent general best practice implementations for cloud security. • Implement and maintain a security program. • Implement strong access and identity management. • Ensure confidential data protection. • Build and maintain a secure cloud infrastructure. • Implement N/W security • Implement virtualization security • Ensure physical security

  4. Security Concerns for Cloud Computing

  5. Security Concerns for Cloud Computing Identity and Access Management • Who has access? • Can the existing authentication implementation be ported to cloud? • How trust is maintained across cloud and on premise domain? • How to enable single sign on for applications on cloud and on premise? Data Security • How CIA is maintained and ensured? • How key credentials are managed? • Do you have the right to audit? • How location related jurisdictional requirement is addressed? Network Security • How can I ensure data security in transit? Is data on disk is encrypted? • What are the preventive and detective controls for the N/W attacks? OS & Virtualization Security • What are the measures we need to consider for virtualization security? How is your data and application isolated from other customers? Is this a logical isolation or physical isolation? • How to protect Host Operating System? • How OS level security like OS hardening are maintained?

  6. Security Concerns for Cloud Computing Physical Security • What are the DR mechanism in place? • What are the controls applied to secure physical data centre? Application • What is the possibility of availability of an application? • Is there any assurance provided by the CSP? How to make sure that Application code is what it should be?

  7. Download with Linkedin Username/Password

  8. Download with Linkedin Username/Password

  9. Download with Linkedin Username/Password

  10. Download with Linkedin Username/Password

  11. Download with Linkedin Username/Password

More Related