cloud encryption - unitrentosala/events2016/2016_brennercom_crypto.pdf · cloud encryption: behind...
TRANSCRIPT
CLOUD ENCRYPTION: BEHIND THE SCENES
Pietro Giovannini - Cloud Security Specialist -
• Brennercom Cloud Service Provider • Our use of Encryption in the Cloud • Dos & Don’ts in the approach of
cloud computing
IT-AS-A-SERVICE SECURITY COMMUNICATION & COLLABORATION CONNECTIVITY
SYSTEM INTEGRATION
BRENNERCOM
3.0
Our Certifications
OUR CLOUD
CLOUD INFRASTRUCTURE
BACK UP AS A SERVICE
DISASTER RECOVERY
SERVICE DESIGN PROFESSIONAL SERVICES PROJECT MANAGEMENT
3.0
OUR APPROACH TO CLOUD ENCRIPTION
CUSTOMER
DATA IN TRANSIT
BRENNERCOM CLOUD
• Transport Layer Security TLS
CUSTOMER
DATA AT REST
BRENNERCOM CLOUD
OUR APPROACH TO CLOUD ENCRIPTION
• Except from archived Data, confidentiality & segregation of data is granted from the multi-tenant architecture
How a Cloud Infrastructure works
Storage Area Network
Server
Network
How a Cloud Backup works Data Domain
How a Cloud Managment works
DOs & DON’Ts Hypervisor Admin Hypervisor Admin
TIPS FOR THE STUDENTS
TRENTO BOLZANO
DO
Encrypt your VM
Encrypt your Sensitive Data
Plan carefully the CIA of your Data
Evaluate the ‘‘Shadow IT’’ security
DON’T
Delegate the protection of your Data
Fully trust your ISP ; )
Under estimate Murphy
Over Encrypt
Thank you [email protected]