cloud computingarchitecturesecurityreliability
DESCRIPTION
A faculty development program on Cloud Architecture Security and Reliability.TRANSCRIPT
![Page 1: Cloud computingarchitecturesecurityreliability](https://reader033.vdocuments.us/reader033/viewer/2022060115/557bf40cd8b42aab048b53a8/html5/thumbnails/1.jpg)
Cloud Architecture Security & Reliability
Prasad Chittahttp://www.linkedin.com/in/prasadchitta
“Faculty Development Program”
![Page 2: Cloud computingarchitecturesecurityreliability](https://reader033.vdocuments.us/reader033/viewer/2022060115/557bf40cd8b42aab048b53a8/html5/thumbnails/2.jpg)
Definition & Essential Characteristics
“Cloud computing is a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction. This cloud model promotes availability and is composed of five essential characteristics, three service models, and four deployment models.” - (NIST)
![Page 3: Cloud computingarchitecturesecurityreliability](https://reader033.vdocuments.us/reader033/viewer/2022060115/557bf40cd8b42aab048b53a8/html5/thumbnails/3.jpg)
![Page 4: Cloud computingarchitecturesecurityreliability](https://reader033.vdocuments.us/reader033/viewer/2022060115/557bf40cd8b42aab048b53a8/html5/thumbnails/4.jpg)
NIST - Conceptual Reference Model
http://www.nist.gov/itl/cloud/upload/NIST_SP-500-291_Version-2_2013_June18_FINAL.pd
![Page 5: Cloud computingarchitecturesecurityreliability](https://reader033.vdocuments.us/reader033/viewer/2022060115/557bf40cd8b42aab048b53a8/html5/thumbnails/5.jpg)
Security Threats
Notorious Nine
Threats
Translate To
protecting
• 1. Data Breaches • 2. Data Loss • 3. Account Hijacking • 4. Insecure APIs • 5. Denial of Service • 6. Malicious Insiders • 7. Abuse of Cloud Services • 8. Insufficient Due Diligence • 9. Shared Technology Issues
• Application Access• Separation of Concerns• Key – Management• Data at Rest
https://downloads.cloudsecurityalliance.org/initiatives/top_threats/The_Notorious_Nine_Cloud_Computing_Top_Threats_in_2013.pdf
![Page 6: Cloud computingarchitecturesecurityreliability](https://reader033.vdocuments.us/reader033/viewer/2022060115/557bf40cd8b42aab048b53a8/html5/thumbnails/6.jpg)
Threat Landscape
http://op.bna.com/pl.nsf/id/dapn-9ebrtg/$File/ENISA%20Threat%20Landscape%202013.pdf
![Page 7: Cloud computingarchitecturesecurityreliability](https://reader033.vdocuments.us/reader033/viewer/2022060115/557bf40cd8b42aab048b53a8/html5/thumbnails/7.jpg)
Threat Management
https://knome.ultimatix.net/r?url=http%3A%2F%2Fwww.booz.com%2Fmedia%2Ffile%2FBoozCo-Cloud-Computing.pdf
![Page 8: Cloud computingarchitecturesecurityreliability](https://reader033.vdocuments.us/reader033/viewer/2022060115/557bf40cd8b42aab048b53a8/html5/thumbnails/8.jpg)
Reliability and Redundancy
Reliability Redundancy
Discussion on: how do we achieve better reliability of a complex IT system consisting of multiple components across multiple layers (i.e., web, application, database) to make best utility of non failing components to share the load while isolating the failure component and decoupling it from the cluster and seamlessly re-balancing the workload to the rest of the working components.
![Page 9: Cloud computingarchitecturesecurityreliability](https://reader033.vdocuments.us/reader033/viewer/2022060115/557bf40cd8b42aab048b53a8/html5/thumbnails/9.jpg)
Recap & Discussion
Cloud Providers Cloud Brokers Cloud Deployment
Models Cloud Characteristics Cloud Concerns Hardware / Software /
Network
Cloud Consumers Cloud Service
Models Cloud Isolation
Models
Grid and Cloud Cloud and
Virtualization SOA and Cloud
![Page 10: Cloud computingarchitecturesecurityreliability](https://reader033.vdocuments.us/reader033/viewer/2022060115/557bf40cd8b42aab048b53a8/html5/thumbnails/10.jpg)