1 / 36

A Private Story...

A Private Story. Cost of time in Pharma Research and Discovery. $150/Sec For a Block Buster Project. Imagine a Scientist. Who wants 25 servers. Now!!!. To crunch some numbers!. IT Dept. Try 3 Months!!!. “You want it when?”. He finds a friendly IT Guy.

denim
Télécharger la présentation

A Private Story...

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. A Private Story... Cost of time in Pharma Research and Discovery $150/Sec For a Block Buster Project

  2. Imagine a Scientist...

  3. Who wants 25 servers... Now!!! To crunch some numbers!

  4. IT Dept.... Try 3 Months!!! “You want it when?”

  5. He finds a friendly IT Guy Who’s being playing in the Clouds!

  6. So he built 25 virtual servers ... ...in about an hour

  7. But he built them wrong!

  8. He built them faster next time!

  9. He built them faster next time!

  10. He loaded up the data! And started the crunching

  11. Drat it won’t finish today!

  12. So they built 250 virtual servers!

  13. The processing completed... And the scientist was happy!

  14. The Cost? ? $89

  15. The Benefits of the CloudsorAvoiding The Cloud Trap! Adrian Seccombe

  16. F I R S T C L A S S I F Y Y O U R D A T A !!! Determine what rules MUST apply to it. Must it only exist in specific trust levels? For example can it leave Europe? Does it have to stay in Safe Harbours? Must it stay in Europe? ? Then decide to which type of Cloud you want to move We need a universal data classification model that is simple (cf G8 TLP) We need a recognised trust level standard for all aspects of computing We need standardised meta data that signals to “cloud security” the data’s security needs

  17. Then decide do you want to move to the Clouds

  18. To Cloud or Not to Cloud? Traditional Clouds

  19. Then decide what data you want to allow in the Clouds

  20. With what degree of translucency

  21. <<<< Same old TraditionalApproach For all Clouds are not equal... Fully automated System Redundancy Manual System Recovery Fully automated Data Backup and Recovery Tapes sent by Truck Data Backup and Recovery variable risk Fully automated Data Redundancy Self owned Disk Storage Data Redundancy ...sometimes Fully automated Disaster Recovery Warmish Back up Data Centre For Disaster Recovery Significant switching impact And testing costs Full on Clouds this way >>>>>

  22. Then decide what level you want to operate in the Clouds

  23. Cloud Layers Outcome / Value Last! Process 3rd Orchestration Security and IdAM Software A b s t r a c t I o n o c c u r s h e r e ! 2nd Platform 1st Infrastructure

  24. Then decide to which type of Cloud you want to move

  25. Cloud Patterns External Internal

  26. Cloud Patterns Proprietary Open

  27. Cloud Patterns External Internal Proprietary Open

  28. Cloud Patterns To get through here You need theC O A Deperimeterised Perimeterised

  29. Cloud Patterns External Deperimeterised Internal Perimeterised Proprietary Open

  30. Cloud Patterns External Deperimeterised Internal Perimeterised Proprietary Open We need inter cloud “IPI” standards... especially those that enable Collaboration.

  31. Cloud Patterns External Deperimeterised Internal Perimeterised Proprietary Open Recognise that some interfaces will be easier to enable than others!.

  32. Cloud Patterns External Deperimeterised Internal Perimeterised Proprietary Open

  33. ...and ”then” ensure the controls you require are available in the Clouds... ...Oops!!!You mean “Cloud Security Central”doesn’t exist?

  34. Cloud Layers Outcome / Value Last! Process 3rd Orchestration Security and IdAM Software A b s t r a c t I o n o c c u r s h e r e ! 2nd Platform 1st Infrastructure Cloud Maturity Scale

  35. We haven’t even identified all the needs yet. Bread Crumb DetectorBread Crumb HooverCloud Identity Services and their ProvidersWhat about Trust Levels?

  36. Proposed Individual Trust Levels Trust Intent Impact Trust Level Authentication Physical Level Label Activity World equiv T0 Stay None Anonymous None - Unidentified T1 Self Insignificant Self Asserted None Pseudonym Assertion* T2 Proof Minor Document Verified Authenticated: Proof of Abode of Identity Name, Address, Age Electricity Bill T3 T2+ Ability Major Legally/ Financially Authenticate Credit Credit Card to Commit Verified Worthiness and / Pay Payment Method Pay Ability to Pay Varied Single use Authenticate Credit Financially Worthiness and Single Cash Verified Use Payment Method T4 T2+ Material Government Government Passport Gov Id Verified T5 Protect Catastrophic Military Grade Positive Vetting Security Lives Clearance

More Related