Download - Cloud computing security
![Page 1: Cloud computing security](https://reader033.vdocuments.us/reader033/viewer/2022060107/554bd194b4c905ac708b4afa/html5/thumbnails/1.jpg)
Cloud Computing & Security: Are there clouds in our sky ?
![Page 2: Cloud computing security](https://reader033.vdocuments.us/reader033/viewer/2022060107/554bd194b4c905ac708b4afa/html5/thumbnails/2.jpg)
> Antonio Sanz
> I3A - IT Manager
> Security Expert
> http://i3a.unizar.es
> @antoniosanzalc
![Page 3: Cloud computing security](https://reader033.vdocuments.us/reader033/viewer/2022060107/554bd194b4c905ac708b4afa/html5/thumbnails/3.jpg)
Cloud Computing
![Page 4: Cloud computing security](https://reader033.vdocuments.us/reader033/viewer/2022060107/554bd194b4c905ac708b4afa/html5/thumbnails/4.jpg)
Tema 1: Diseño de software seguro
4
Cloud Computing Security
Index
> Cloud Computing
> Opportunities
> Cloud Computing risks
> Migrating to a Cloud Infraestructure
![Page 5: Cloud computing security](https://reader033.vdocuments.us/reader033/viewer/2022060107/554bd194b4c905ac708b4afa/html5/thumbnails/5.jpg)
“Cloud computing is a model for enabling ubiquitous, convenient, on-demand network access to a
shared pool of configurable computing resources (e.g., networks, servers, storage,
applications, and services) that can be rapidly provisioned and
released with minimal management effort or service provider
interaction”
[*First & last boring slide. Promise]
![Page 6: Cloud computing security](https://reader033.vdocuments.us/reader033/viewer/2022060107/554bd194b4c905ac708b4afa/html5/thumbnails/6.jpg)
Tema 1: Diseño de software seguro
6
Cloud Computing Security
Cloud Computing: Main point
>On demand
>Ubiquous
>Resource pool
>Elastic
>Measureable
![Page 7: Cloud computing security](https://reader033.vdocuments.us/reader033/viewer/2022060107/554bd194b4c905ac708b4afa/html5/thumbnails/7.jpg)
Service Types
![Page 8: Cloud computing security](https://reader033.vdocuments.us/reader033/viewer/2022060107/554bd194b4c905ac708b4afa/html5/thumbnails/8.jpg)
Tema 1: Diseño de software seguro
8
Cloud Computing Security
IaaS – Infrastructure as a Service
> Raw infrastructure
> Storage, network & servers
> We do the rest
> Flexible but costly
> Ej: Amazon AWS
![Page 9: Cloud computing security](https://reader033.vdocuments.us/reader033/viewer/2022060107/554bd194b4c905ac708b4afa/html5/thumbnails/9.jpg)
Tema 1: Diseño de software seguro
9
Cloud Computing Security
PaaS – Platform as a Service
> You’ve got the OS but no apps
> IaaS + OS + Base services
> App deploying ok (.jar)
> Less control but less cost
> Ej: Google App Engine
![Page 10: Cloud computing security](https://reader033.vdocuments.us/reader033/viewer/2022060107/554bd194b4c905ac708b4afa/html5/thumbnails/10.jpg)
Tema 1: Diseño de software seguro
10
Cloud Computing Security
SaaS – Software as a Service
> You’ve got everything
> Iaas + Paas + Apps
> Ready to go
> Minimal control / Minimaleffort
> Ej: Salesforce.com (CRM)
![Page 11: Cloud computing security](https://reader033.vdocuments.us/reader033/viewer/2022060107/554bd194b4c905ac708b4afa/html5/thumbnails/11.jpg)
Tema 1: Diseño de software seguro
11
Cloud Computing Security
Public, Private Clouds
>Públic: Public access, sharedresources, (-security, -cost)
Ej: Amazon AWS
>Private: Private access, dedicated resources (+security, +cost)
Ej: NASA Nebula � OpenStack
![Page 12: Cloud computing security](https://reader033.vdocuments.us/reader033/viewer/2022060107/554bd194b4c905ac708b4afa/html5/thumbnails/12.jpg)
Tema 1: Diseño de software seguro
12
Cloud Computing Security
Community , Hybrid
>Community: Group that shares a private cloud
Ej: Business holding
>Hybrid: Mix some of the others
![Page 13: Cloud computing security](https://reader033.vdocuments.us/reader033/viewer/2022060107/554bd194b4c905ac708b4afa/html5/thumbnails/13.jpg)
Technology
![Page 14: Cloud computing security](https://reader033.vdocuments.us/reader033/viewer/2022060107/554bd194b4c905ac708b4afa/html5/thumbnails/14.jpg)
Tema 1: Diseño de software seguro
14
Cloud Computing Security
Technologies
> Virtualization
> Shared storage
> High speed networks
> Multidevice access
> Advanced Middleware (access, monitoring, provisioning)
![Page 15: Cloud computing security](https://reader033.vdocuments.us/reader033/viewer/2022060107/554bd194b4c905ac708b4afa/html5/thumbnails/15.jpg)
Advantages
![Page 16: Cloud computing security](https://reader033.vdocuments.us/reader033/viewer/2022060107/554bd194b4c905ac708b4afa/html5/thumbnails/16.jpg)
Tema 1: Diseño de software seguro
16
Cloud Computing Security
Cloud Computing Pros
> Elasticity / Scalability
> Availability
> Performance
> Ubiquous access
> Very low CAPEX
> OPEX savings
![Page 17: Cloud computing security](https://reader033.vdocuments.us/reader033/viewer/2022060107/554bd194b4c905ac708b4afa/html5/thumbnails/17.jpg)
Success Case
![Page 18: Cloud computing security](https://reader033.vdocuments.us/reader033/viewer/2022060107/554bd194b4c905ac708b4afa/html5/thumbnails/18.jpg)
Tema 1: Diseño de software seguro
18
Cloud Computing Security
Amazon AWS - http://aws.amazon.com/
> Amazon Web Services
> EC2 (Elastic Cloud Computing)
> S3 (Simple Storage Service)
> You can do … almost everything
> Others: Rackspace, vCloud, Azure, IBM (great, too)
![Page 19: Cloud computing security](https://reader033.vdocuments.us/reader033/viewer/2022060107/554bd194b4c905ac708b4afa/html5/thumbnails/19.jpg)
Tema 1: Diseño de software seguro
19
Cloud Computing Security
NetFlix - http://www.netflix.com/
> Video streaming (Films, serials, shows)
> Almost 20% of EEUU bandwidth
> Uses Amazon AWS
> Benefits: Escalability + Availability
> Video transcoding “on the fly” with EC2
> Video storage in EC3 with S3
> Usage data analysis with EC2
![Page 20: Cloud computing security](https://reader033.vdocuments.us/reader033/viewer/2022060107/554bd194b4c905ac708b4afa/html5/thumbnails/20.jpg)
Tema 1: Diseño de software seguro
20
Cloud Computing Security
Dropbox - http://www.dropbox.com/
> Backup in the cloud
> Around 12Pb (12.000 Tb)
> Uses Amazon S3
> Benefit: Escalability
> Business model (VIP): http://www.w2lessons.com/2011/04/economics-of-dropbox.html
![Page 21: Cloud computing security](https://reader033.vdocuments.us/reader033/viewer/2022060107/554bd194b4c905ac708b4afa/html5/thumbnails/21.jpg)
Technology
Cloud Is
Good!
![Page 22: Cloud computing security](https://reader033.vdocuments.us/reader033/viewer/2022060107/554bd194b4c905ac708b4afa/html5/thumbnails/22.jpg)
Cloud Computing Risks
![Page 23: Cloud computing security](https://reader033.vdocuments.us/reader033/viewer/2022060107/554bd194b4c905ac708b4afa/html5/thumbnails/23.jpg)
Business Risks
![Page 24: Cloud computing security](https://reader033.vdocuments.us/reader033/viewer/2022060107/554bd194b4c905ac708b4afa/html5/thumbnails/24.jpg)
Vendor Lock-In
![Page 25: Cloud computing security](https://reader033.vdocuments.us/reader033/viewer/2022060107/554bd194b4c905ac708b4afa/html5/thumbnails/25.jpg)
Vendor Lock-In
= To have you
by the balls
![Page 26: Cloud computing security](https://reader033.vdocuments.us/reader033/viewer/2022060107/554bd194b4c905ac708b4afa/html5/thumbnails/26.jpg)
Vendor Lock-In
![Page 27: Cloud computing security](https://reader033.vdocuments.us/reader033/viewer/2022060107/554bd194b4c905ac708b4afa/html5/thumbnails/27.jpg)
Tema 1: Diseño de software seguro
27
Cloud Computing Security
Vendor lock-in
> It’s hard to say goodbye
> SaaS : No “export” option
> PaaS : API interoperability
> IaaS : Different technologies
> Defsense: Right CP (Cloud Provider) choice
![Page 28: Cloud computing security](https://reader033.vdocuments.us/reader033/viewer/2022060107/554bd194b4c905ac708b4afa/html5/thumbnails/28.jpg)
Lack of IT Governance
![Page 29: Cloud computing security](https://reader033.vdocuments.us/reader033/viewer/2022060107/554bd194b4c905ac708b4afa/html5/thumbnails/29.jpg)
Tema 1: Diseño de software seguro
29
Cloud Computing Security
Lack of IT Governance
> IT Governance != Cloud ComputingGovernance
> Limited funcionalities / High costs
> Loss of Control of our IT
> Defense: Clear objectives & design, Right CP choice
![Page 30: Cloud computing security](https://reader033.vdocuments.us/reader033/viewer/2022060107/554bd194b4c905ac708b4afa/html5/thumbnails/30.jpg)
Compliance & Laws
![Page 31: Cloud computing security](https://reader033.vdocuments.us/reader033/viewer/2022060107/554bd194b4c905ac708b4afa/html5/thumbnails/31.jpg)
Tema 1: Diseño de software seguro
31
Cloud Computing Security
Compliance & Laws
> We need to comply with all theregulations (PCI DSS, LOPD)
> Imposes transitive compliance onthe CP
> Legal lapses
> Defense: Good analysis, right CP choice
![Page 32: Cloud computing security](https://reader033.vdocuments.us/reader033/viewer/2022060107/554bd194b4c905ac708b4afa/html5/thumbnails/32.jpg)
SLAs
![Page 33: Cloud computing security](https://reader033.vdocuments.us/reader033/viewer/2022060107/554bd194b4c905ac708b4afa/html5/thumbnails/33.jpg)
Tema 1: Diseño de software seguro
33
Cloud Computing Security
SLA (Service Level Agreements)
> Contract signed with CP
> Services offered
> Warranties offered
> Service metrics & compensations/penalties
> Defense: SLA study & tuning
![Page 34: Cloud computing security](https://reader033.vdocuments.us/reader033/viewer/2022060107/554bd194b4c905ac708b4afa/html5/thumbnails/34.jpg)
Provider Failures
![Page 35: Cloud computing security](https://reader033.vdocuments.us/reader033/viewer/2022060107/554bd194b4c905ac708b4afa/html5/thumbnails/35.jpg)
Tema 1: Diseño de software seguro
35
Cloud Computing Security
Provider failures
> “Errare machina est”
> Starting security standards
> CP Business Continuity plan
> OUR Business Continuity plan
> Defense: Business continuitydefinition, right CP choice
![Page 36: Cloud computing security](https://reader033.vdocuments.us/reader033/viewer/2022060107/554bd194b4c905ac708b4afa/html5/thumbnails/36.jpg)
Third party failures
![Page 37: Cloud computing security](https://reader033.vdocuments.us/reader033/viewer/2022060107/554bd194b4c905ac708b4afa/html5/thumbnails/37.jpg)
Tema 1: Diseño de software seguro
37
Cloud Computing Security
Third party failures
> CP = Service & Technologies Integrator
> But … what about electricity, connectivity, HVAC ?
> We have to take care of ourfacilities too
> Defense: Right CP choice, third party evaluation (CP and proper)
![Page 38: Cloud computing security](https://reader033.vdocuments.us/reader033/viewer/2022060107/554bd194b4c905ac708b4afa/html5/thumbnails/38.jpg)
Technical risks
![Page 39: Cloud computing security](https://reader033.vdocuments.us/reader033/viewer/2022060107/554bd194b4c905ac708b4afa/html5/thumbnails/39.jpg)
Resource Starvation
![Page 40: Cloud computing security](https://reader033.vdocuments.us/reader033/viewer/2022060107/554bd194b4c905ac708b4afa/html5/thumbnails/40.jpg)
Tema 1: Diseño de software seguro
40
Cloud Computing Security
Resource starvation
> Resources are assigned on demand
> CP scales up … but how ?
> Situation: No more resourcesavailable when they were mostneeded !!
> Defense: Resource reservation, rightCP choice
![Page 41: Cloud computing security](https://reader033.vdocuments.us/reader033/viewer/2022060107/554bd194b4c905ac708b4afa/html5/thumbnails/41.jpg)
Isolation Faults
![Page 42: Cloud computing security](https://reader033.vdocuments.us/reader033/viewer/2022060107/554bd194b4c905ac708b4afa/html5/thumbnails/42.jpg)
Tema 1: Diseño de software seguro
42
Cloud Computing Security
Isolation Faults
> Cloud = Shared Resources = Shared flat
> How secure is your neighbour ?
> Third party security failure � Everybodyis compromised
> Defense: Private Clouds, right CP choice
![Page 43: Cloud computing security](https://reader033.vdocuments.us/reader033/viewer/2022060107/554bd194b4c905ac708b4afa/html5/thumbnails/43.jpg)
Data leaks
![Page 44: Cloud computing security](https://reader033.vdocuments.us/reader033/viewer/2022060107/554bd194b4c905ac708b4afa/html5/thumbnails/44.jpg)
Tema 1: Diseño de software seguro
44
Cloud Computing Security
Data leaks
> Lots of sensitive info in our CP
> Disgruntled employees
> Wrong service configuration
> Defense: Right CP choice, cipher use, log reviews
![Page 45: Cloud computing security](https://reader033.vdocuments.us/reader033/viewer/2022060107/554bd194b4c905ac708b4afa/html5/thumbnails/45.jpg)
Data Transit
![Page 46: Cloud computing security](https://reader033.vdocuments.us/reader033/viewer/2022060107/554bd194b4c905ac708b4afa/html5/thumbnails/46.jpg)
Tema 1: Diseño de software seguro
46
Cloud Computing Security
Data Transit
> Network � Information flows
> Local interception
> On transit interception
> In-Cloud Intercepcion
> Defense: SSL, cipher use
![Page 47: Cloud computing security](https://reader033.vdocuments.us/reader033/viewer/2022060107/554bd194b4c905ac708b4afa/html5/thumbnails/47.jpg)
Cloud Provider Compromise
![Page 48: Cloud computing security](https://reader033.vdocuments.us/reader033/viewer/2022060107/554bd194b4c905ac708b4afa/html5/thumbnails/48.jpg)
Tema 1: Diseño de software seguro
48
Cloud Computing Security
CP Compromise
> Cloud = Technology mesh = Lots ofpossible security flaws
> Cloud interface management attacks
> Cloud user management attacks
> Infrastructure attacks
> Defense: Right CP choice, SLAs, incidentresponse planning
![Page 49: Cloud computing security](https://reader033.vdocuments.us/reader033/viewer/2022060107/554bd194b4c905ac708b4afa/html5/thumbnails/49.jpg)
DDOS
![Page 50: Cloud computing security](https://reader033.vdocuments.us/reader033/viewer/2022060107/554bd194b4c905ac708b4afa/html5/thumbnails/50.jpg)
Tema 1: Diseño de software seguro
50
Cloud Computing Security
DDOS / EDOS
> DDOS (Distributed Denial Of Service)
> Intended to take down an infrastructure �
Attack to availability
> Cloud � Neighbour are collateral damage
> EDOS (Economic Denial of Service)
> Intended to cause economic damage
> Defense: SLAs, charge limits, incidentresponse
![Page 51: Cloud computing security](https://reader033.vdocuments.us/reader033/viewer/2022060107/554bd194b4c905ac708b4afa/html5/thumbnails/51.jpg)
Cipher & Backup
![Page 52: Cloud computing security](https://reader033.vdocuments.us/reader033/viewer/2022060107/554bd194b4c905ac708b4afa/html5/thumbnails/52.jpg)
Tema 1: Diseño de software seguro
52
Cloud Computing Security
Cipher
> Sensible info � Cipher
> Secure information deletion (wipe)
> Defensas: Strong ciphers, guardar claves, SLA
![Page 53: Cloud computing security](https://reader033.vdocuments.us/reader033/viewer/2022060107/554bd194b4c905ac708b4afa/html5/thumbnails/53.jpg)
Tema 1: Diseño de software seguro
53
Cloud Computing Security
Backups
> Info is EVERYTHING � Backups
> Don’t forget your backups (even ifthe CP does … you too)
> Automated procedure
> Defensa: Procedure design, right CP choice
![Page 54: Cloud computing security](https://reader033.vdocuments.us/reader033/viewer/2022060107/554bd194b4c905ac708b4afa/html5/thumbnails/54.jpg)
Tema 1: Diseño de software seguro
54
Cloud Computing Security
Logs Access
> Logs = Activity of our IT
> Needed to do debugging
> Critic if a security incident arises
> How can access my logs ?
> Defense: SLA, right CP choice
![Page 55: Cloud computing security](https://reader033.vdocuments.us/reader033/viewer/2022060107/554bd194b4c905ac708b4afa/html5/thumbnails/55.jpg)
Disaster Recovery
![Page 56: Cloud computing security](https://reader033.vdocuments.us/reader033/viewer/2022060107/554bd194b4c905ac708b4afa/html5/thumbnails/56.jpg)
Tema 1: Diseño de software seguro
56
Cloud Computing Security
Disaster Recovery
> Shit happens (Murphy’s Law)
> Earthquakes, fires, floods, alien invasions…
> Our CP must have a Business Continuityplan
> We must have ours !!
> Defense: Business Continuity plan
![Page 57: Cloud computing security](https://reader033.vdocuments.us/reader033/viewer/2022060107/554bd194b4c905ac708b4afa/html5/thumbnails/57.jpg)
Tema 1: Diseño de software seguro
57
Cloud Computing Security
Legal Risks
![Page 58: Cloud computing security](https://reader033.vdocuments.us/reader033/viewer/2022060107/554bd194b4c905ac708b4afa/html5/thumbnails/58.jpg)
Tema 1: Diseño de software seguro
58
Cloud Computing Security
Compliance & Laws
> Lots of laws & regulations
> Is our CP compliant ?
> National & International laws
> Defense: Preliminary analysis, right CP choice
![Page 59: Cloud computing security](https://reader033.vdocuments.us/reader033/viewer/2022060107/554bd194b4c905ac708b4afa/html5/thumbnails/59.jpg)
Tema 1: Diseño de software seguro
59
Cloud Computing Security
Data protection
> LOPD (Ley Orgánica de Protecciónde Datos)
> Cloud implies sometimes international data transfers �Complicated issues
> Safe Harbour � Amazon, Google
> Defense: Preliminary analysis, right CP choice
![Page 60: Cloud computing security](https://reader033.vdocuments.us/reader033/viewer/2022060107/554bd194b4c905ac708b4afa/html5/thumbnails/60.jpg)
Tema 1: Diseño de software seguro
60
Cloud Computing Security
Computer Forensic
> Security incident in our CP �Someone has set up a child pornography site
> Maybe anyone in our cloud !!
> Possible result = Server seizure
> Defense: Right CP choice, SLA, Business Continuity plan
![Page 61: Cloud computing security](https://reader033.vdocuments.us/reader033/viewer/2022060107/554bd194b4c905ac708b4afa/html5/thumbnails/61.jpg)
Using Cloud Computing
![Page 62: Cloud computing security](https://reader033.vdocuments.us/reader033/viewer/2022060107/554bd194b4c905ac708b4afa/html5/thumbnails/62.jpg)
Analyze
![Page 63: Cloud computing security](https://reader033.vdocuments.us/reader033/viewer/2022060107/554bd194b4c905ac708b4afa/html5/thumbnails/63.jpg)
Tema 1: Diseño de software seguro
63
Cloud Computing Security
Identify Services
> Services that can benefit most fromCloud Computing
> Main benefits: Scalability, Availability & Elasticity
> Intermitent but heavy resource use services (Ej: Sports newspapers onmondays)
![Page 64: Cloud computing security](https://reader033.vdocuments.us/reader033/viewer/2022060107/554bd194b4c905ac708b4afa/html5/thumbnails/64.jpg)
Tema 1: Diseño de software seguro
64
Cloud Computing Security
Evaluate CC models
> IaaS, PaaS, SaaS ?
> ¿Public, Private, Hybrid, Community?
> See what others like us are doing
> Decide which model fits our needsbest
![Page 65: Cloud computing security](https://reader033.vdocuments.us/reader033/viewer/2022060107/554bd194b4c905ac708b4afa/html5/thumbnails/65.jpg)
Know
![Page 66: Cloud computing security](https://reader033.vdocuments.us/reader033/viewer/2022060107/554bd194b4c905ac708b4afa/html5/thumbnails/66.jpg)
Tema 1: Diseño de software seguro
66
Cloud Computing Security
Defining security needs
> Know our service throughly
> Define the information flows
> Identify sensitive info
> Measure how critical the service is
> Assign a value to the srevice
![Page 67: Cloud computing security](https://reader033.vdocuments.us/reader033/viewer/2022060107/554bd194b4c905ac708b4afa/html5/thumbnails/67.jpg)
Tema 1: Diseño de software seguro
67
Cloud Computing Security
Risk Analysis
> Know the existing risks when usingcloud computing
> Apply them to our service
> Define a maximum risk level
> Important!: Be utterly objective
![Page 68: Cloud computing security](https://reader033.vdocuments.us/reader033/viewer/2022060107/554bd194b4c905ac708b4afa/html5/thumbnails/68.jpg)
Plan
![Page 69: Cloud computing security](https://reader033.vdocuments.us/reader033/viewer/2022060107/554bd194b4c905ac708b4afa/html5/thumbnails/69.jpg)
Tema 1: Diseño de software seguro
69
Cloud Computing Security
Evaluate cloud providers
> Read carefully the SLA (ServiceLevel Agreements)
> Read it again
> Evaluate security compliance
> Added value services
> Price !
![Page 70: Cloud computing security](https://reader033.vdocuments.us/reader033/viewer/2022060107/554bd194b4c905ac708b4afa/html5/thumbnails/70.jpg)
Tema 1: Diseño de software seguro
70
Cloud Computing Security
Security controls
> Define security controls
> Controls in the cloud & our IT
> Technical & procedural control
> Target: Lower our real risk
![Page 71: Cloud computing security](https://reader033.vdocuments.us/reader033/viewer/2022060107/554bd194b4c905ac708b4afa/html5/thumbnails/71.jpg)
Decide
![Page 72: Cloud computing security](https://reader033.vdocuments.us/reader033/viewer/2022060107/554bd194b4c905ac708b4afa/html5/thumbnails/72.jpg)
Tema 1: Diseño de software seguro
72
Cloud Computing Security
Bean counting …
> Migration costs
> Cloud operation costs
> Current operation costs
> Troubleshooting costs (both cloud& current)
> Make money talk …
![Page 73: Cloud computing security](https://reader033.vdocuments.us/reader033/viewer/2022060107/554bd194b4c905ac708b4afa/html5/thumbnails/73.jpg)
Tema 1: Diseño de software seguro
73
Cloud Computing Security
Make a decision
> Evaluate pros & cons of our currentIT model & cloud computing
> It’s not all about money …
> Informed decision taking
> You always should have a plan B
![Page 74: Cloud computing security](https://reader033.vdocuments.us/reader033/viewer/2022060107/554bd194b4c905ac708b4afa/html5/thumbnails/74.jpg)
CC offers great
opportunities
CC has risks
There has to
be a planplanplanplan
![Page 75: Cloud computing security](https://reader033.vdocuments.us/reader033/viewer/2022060107/554bd194b4c905ac708b4afa/html5/thumbnails/75.jpg)
Tema 1: Diseño de software seguro
75
Cloud Computing Security
Conclusiones
>Cloud computing is here
>Lots of business models & opportunities
>Must know all the risks
>Must have a sensible business plan
![Page 76: Cloud computing security](https://reader033.vdocuments.us/reader033/viewer/2022060107/554bd194b4c905ac708b4afa/html5/thumbnails/76.jpg)
Conclusiones
I love itwhen a
cloudplan
comes together
![Page 77: Cloud computing security](https://reader033.vdocuments.us/reader033/viewer/2022060107/554bd194b4c905ac708b4afa/html5/thumbnails/77.jpg)
Don’t be under a cloud !
![Page 78: Cloud computing security](https://reader033.vdocuments.us/reader033/viewer/2022060107/554bd194b4c905ac708b4afa/html5/thumbnails/78.jpg)
Tema 1: Diseño de software seguro
78
Cloud Computing Security
More info?. Press here !
Cloud Security Alliance
https://cloudsecurityalliance.org/
Cloud Computing Security Guide - CSA
http://cloudsecurityalliance.org/guidance/csaguide.v2.1.pdf
ENISA – Cloud Computing Security Risks
http://www.enisa.europa.eu/act/rm/files/deliverables/cloud-computing-risk-assessment
Australia Gov. - Cloud Computing Risk Analysis Report
http://www.dsd.gov.au/publications/Cloud_Computing_Security_Considerations.pdf
![Page 79: Cloud computing security](https://reader033.vdocuments.us/reader033/viewer/2022060107/554bd194b4c905ac708b4afa/html5/thumbnails/79.jpg)
Antonio Sanz / [email protected] / @antoniosanzalc
Have a plan and jump into the sky !
$slides = http://www.slideshare.net/ansanz