Vous êtes sur la page 1sur 26

10 Security Concerns For Cloud Computing

Submitted To: Prof Ashok Wahi

Submitted By: Aprajay Minocha (11609137)

4/9/2011

10 Security Concerns For Cloud Computing

Page 1

Introduction
What is cloud computing? Gets its name from the drawings typically used to describe the internet It is a new consumption and delivery model for IT services The concept of cloud computing represents a shift in thought End users need not know the details of a specific technology
4/9/2011 10 Security Concerns For Cloud Computing Page 2

Contd.

Introduction

Service fully managed by the provider. Users can consume services according to needs. This on demand service can be provided at any time.

4/9/2011

10 Security Concerns For Cloud Computing

Page 3

Cloud Computing Models


Can be broken into three basic designs: Infastructure-as-a-Service(IaaS) Companies buy infrastructure They own the software and purchase virtual power to execute as needed Similar to a utility company model as you pay for what you see. Example: Amazon Services
4/9/2011 10 Security Concerns For Cloud Computing Page 4

Platform-as-a-Service(PaaS) 1. Provider provides a platform for company use 2. Services provided include all phases of the SDLC and can use APIs, website portals or gateway software 3. Buyers do need to look closely at specific solutions 4. This is because some providers do not allow software created by their customers to be moved off the platform 5. Example: GoogleApps
4/9/2011 10 Security Concerns For Cloud Computing Page 5

Software-as-a-Service(SaaS) 1. Designed to provide everything and simply rent out the software to the user 2. Usually provided through some type of front end or web portal 3. While the end user is free to use the service from anywhere, the company pays a per user fee 4. Example: Salesforce.com

4/9/2011

10 Security Concerns For Cloud Computing

Page 6

4/9/2011

10 Security Concerns For Cloud Computing

Page 7

Cloud Computing Providers



4/9/2011

Amazon Citrix Google IBM Microsoft Salesforce.com Sun Icloud


10 Security Concerns For Cloud Computing Page 8

Benefits of Cloud Computing


Reduced Cost pertaining to maintenance of Data ( handling voluptuous amount of information at a reduced price , i.e. pay as you go) Portability of application that extends the comfort of working from home or different client locations.
4/9/2011 10 Security Concerns For Cloud Computing

Contd.

Benefits of Cloud Computing

Increased mobility(information access from anywhere There is also ability of the cloud computing to free-up IT workers who may have been occupied performing updates, installing patches, or providing application support Gartner predicts that cloud computing will surge to 150 billion dollars by 2013

4/9/2011

10 Security Concerns For Cloud Computing

Page 10

Security Concerns of Cloud Computing


there are significant security concerns that need to be addressed when considering moving critical applications and sensitive data to public and shared cloud environments the cloud provider must develop sufficient controls to provide the same or a greater level of security than the organization would have if the cloud were not used
4/9/2011 10 Security Concerns For Cloud Computing Page 11

Security Concerns of Cloud Computing


1. Wheres the data? Different countries have different requirements and controls placed on access Because your data is in the cloud, you may not realize that the data must reside in a physical location cloud provider should agree in writing to provide the level of security required for the companys customers
4/9/2011 10 Security Concerns For Cloud Computing
Page 12

Security Concerns of Cloud Computing


2. Who has access? Access control is a key concern Insider attacks are a huge risk A potential hacker is someone who has been entrusted with approved access to the cloud Companies considering using the cloud need to look at who is managing their data and what types of controls are applied to these individuals
4/9/2011 10 Security Concerns For Cloud Computing Page 13

Security Concerns of Cloud Computing


3. What are your regulatory requirements? Organizations operating in the US, Canada, or the European Union have many regulatory requirements that they must abide by Example: ISO 27002, Safe Harbor, ITIL and COBIT Ensure that the cloud provider is able to meet these requirements and is willing to undergo certification, accreditation, and review
4/9/2011 10 Security Concerns For Cloud Computing Page 14

Security Concerns of Cloud Computing


4. Do you have the right to audit? The cloud provider should agree in writing to the terms of audit

4/9/2011

10 Security Concerns For Cloud Computing

Page 15

Security Concerns of Cloud Computing


5. What type of training does the provider offer their employees? People will always be the weakest link in security Knowing how your provider trains their employees is an important item to review

4/9/2011

10 Security Concerns For Cloud Computing

Page 16

Security Concerns of Cloud Computing


6. What type of data classification system does the provider use? Is the data classified? How is your data separated from other users? Encryption should also be discussed. Is it being used while the data is at rest and in transit? Type of encryption

4/9/2011

10 Security Concerns For Cloud Computing

Page 17

Security Concerns of Cloud Computing


7. What are the service level agreement (SLA) terms? SLA serves as a contracted level of guaranteed service between the cloud provider and the customer Specifies what level of services will be provided

4/9/2011

10 Security Concerns For Cloud Computing

Page 18

Security Concerns of Cloud Computing


8. What is the long-term viability of the provider? How long has the cloud provider been in business and what is their track record If they go out of business, what happens to your data? Will your data be returned, and if so, in what format? Example: MediaMax
4/9/2011 10 Security Concerns For Cloud Computing Page 19

Security Concerns of Cloud Computing


9. What happens if there is a security breach?

Though

cloud

computing

service

providers

promote their services as being unhackable, cloud based services are an attractive target to the hackers

4/9/2011

10 Security Concerns For Cloud Computing

Page 20

Security Concerns of Cloud Computing


10. What is the disaster recovery/business

continuity plan (DR/BCP)? While you may not know the physical location of your services, it is physically located somewhere. All physical locations face threat such as fire, storms, natural disasters, and loss of power
In case of any of these events, how will the cloud provider respond, and what guarantee of continued services are they promising?
4/9/2011 10 Security Concerns For Cloud Computing Page 21

Cloud Computing Attacks


Denial of Service (DoS) attacks Side Channel attacks Authentication attacks Man-in-the-middle cryptographic attacks
4/9/2011 10 Security Concerns For Cloud Computing Page 22

4/9/2011

10 Security Concerns For Cloud Computing

Page 23

Conclusion
Cloud Computing offers real benefits to companies seeking a competitive edge. Attractive pricing, the ability to free up staff for other duties , and ability to pay for as needed services will continue to drive businesses to consider cloud computing.

4/9/2011

10 Security Concerns For Cloud Computing

Page 24

contd..
However, there are several key issues to be kept in mind , one such concern is that cloud computing the natural perimeter b/w protected inside the hostile outside. Thus security of any cloud based service must be closely reviewed to understand what protections the information has.
4/9/2011 10 Security Concerns For Cloud Computing Page 25

Vous aimerez peut-être aussi