how is cloud security different from on-premise security
DESCRIPTION
HOW IS CLOUD SECURITY DIFFERENT FROM ON-PREMISE SECURITYTRANSCRIPT
Visit Researcher’s Blog - http://clean-clouds.com
http://clean-clouds.com
HOW IS CLOUD SECURITY DIFFERENT FROM ON-PREMISE SECURITY
Visit Researcher’s Blog - http://clean-clouds.com
• The typical entry point for the customers to the Cloud will be migration of their existing applications to the Cloud, initially as a proof-of-concept and later in production.
• Customer will have the following questions:– How does the migrated application exploit the
Performance, Scalability, Robustness models for Public Clouds?
– How does the migrated application exploit the Security, Systems and Applications Management models for Public Clouds?
Visit Researcher’s Blog - http://clean-clouds.com
The following security measures represent general best practice implementations for cloud security.
• Implement and maintain a security program.• Implement strong access and identity
management.• Ensure confidential data protection.• Build and maintain a secure cloud infrastructure.
– Implement N/W security– Implement virtualization security– Ensure physical security
Visit Researcher’s Blog - http://clean-clouds.com
Security Concerns for Cloud Computing
Visit Researcher’s Blog - http://clean-clouds.com
Security Concerns for Cloud Computing
Identity and Access Management• Who has access? • Can the existing authentication
implementation be ported to cloud?• How trust is maintained across cloud
and on premise domain?• How to enable single sign on for
applications on cloud and on premise?
Data Security• How CIA is maintained and ensured?• How key credentials are managed?• Do you have the right to audit? • How location related jurisdictional
requirement is addressed?
Network Security• How can I ensure data security in
transit? Is data on disk is encrypted?• What are the preventive and detective
controls for the N/W attacks?
OS & Virtualization Security• What are the measures we need to
consider for virtualization security? How is your data and application isolated from other customers? Is this a logical isolation or physical isolation?
• How to protect Host Operating System?
• How OS level security like OS hardening are maintained?
Visit Researcher’s Blog - http://clean-clouds.com
Security Concerns for Cloud Computing
Physical Security• What are the DR mechanism in place? • What are the controls applied to secure physical data centre?
Application• What is the possibility of availability of an application? • Is there any assurance provided by the CSP? How to make sure that
Application code is what it should be?
Download with Linkedin Username/Password
Download with Linkedin Username/Password
Download with Linkedin Username/Password
Download with Linkedin Username/Password
Download with Linkedin Username/Password
Thank You