CLOUD ENCRYPTION - UniTrentosala/events2016/2016_Brennercom_Crypto.pdf · CLOUD ENCRYPTION: BEHIND...

Preview:

Citation preview

CLOUD ENCRYPTION: BEHIND THE SCENES

Pietro Giovannini - Cloud Security Specialist -

• Brennercom Cloud Service Provider • Our use of Encryption in the Cloud • Dos & Don’ts in the approach of

cloud computing

IT-AS-A-SERVICE SECURITY COMMUNICATION & COLLABORATION CONNECTIVITY

SYSTEM INTEGRATION

BRENNERCOM

3.0

Our Certifications

OUR CLOUD

CLOUD INFRASTRUCTURE

BACK UP AS A SERVICE

DISASTER RECOVERY

SERVICE DESIGN PROFESSIONAL SERVICES PROJECT MANAGEMENT

3.0

OUR APPROACH TO CLOUD ENCRIPTION

CUSTOMER

DATA IN TRANSIT

BRENNERCOM CLOUD

• Transport Layer Security TLS

CUSTOMER

DATA AT REST

BRENNERCOM CLOUD

OUR APPROACH TO CLOUD ENCRIPTION

• Except from archived Data, confidentiality & segregation of data is granted from the multi-tenant architecture

How a Cloud Infrastructure works

Storage Area Network

Server

Network

How a Cloud Backup works Data Domain

How a Cloud Managment works

DOs & DON’Ts Hypervisor Admin Hypervisor Admin

TIPS FOR THE STUDENTS

TRENTO BOLZANO

DO

Encrypt your VM

Encrypt your Sensitive Data

Plan carefully the CIA of your Data

Evaluate the ‘‘Shadow IT’’ security

DON’T

Delegate the protection of your Data

Fully trust your ISP ; )

Under estimate Murphy

Over Encrypt

Thank you pietro.giovannini@brennercom.it

Recommended