28
Evolution of Cloud Computing Delivering assurance into the world of tomorrow Raj Samani EMEA CTO McAfee, CIO Cloud Security Alliance

Evolution of Cloud Computing · Extending the McAfee 3x3 model we see multiple layers of data types which may not only traverse the multiple zones but also rest or transmit through

  • Upload
    others

  • View
    1

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Evolution of Cloud Computing · Extending the McAfee 3x3 model we see multiple layers of data types which may not only traverse the multiple zones but also rest or transmit through

Evolution of Cloud Computing Delivering assurance into the world of tomorrow

Raj Samani

EMEA CTO McAfee, CIO Cloud Security Alliance

Page 2: Evolution of Cloud Computing · Extending the McAfee 3x3 model we see multiple layers of data types which may not only traverse the multiple zones but also rest or transmit through

Overview

SOA is Cloud Computing?

End customers for cloud will

demand an SOA approach

Demands for greater assurance

Page 3: Evolution of Cloud Computing · Extending the McAfee 3x3 model we see multiple layers of data types which may not only traverse the multiple zones but also rest or transmit through

The Connected Home – The Last Decade

3

Page 4: Evolution of Cloud Computing · Extending the McAfee 3x3 model we see multiple layers of data types which may not only traverse the multiple zones but also rest or transmit through

Typical Connected Home, Year 2000

4

2000

Page 5: Evolution of Cloud Computing · Extending the McAfee 3x3 model we see multiple layers of data types which may not only traverse the multiple zones but also rest or transmit through

Typical Connected Home, Year 2000

5

Page 6: Evolution of Cloud Computing · Extending the McAfee 3x3 model we see multiple layers of data types which may not only traverse the multiple zones but also rest or transmit through

Typical Connected Home, Year 2000

6

Page 7: Evolution of Cloud Computing · Extending the McAfee 3x3 model we see multiple layers of data types which may not only traverse the multiple zones but also rest or transmit through

Typical Connected Home, Year 2000

7

Page 8: Evolution of Cloud Computing · Extending the McAfee 3x3 model we see multiple layers of data types which may not only traverse the multiple zones but also rest or transmit through

Typical Connected Home, Year 2000

8

2010

Page 9: Evolution of Cloud Computing · Extending the McAfee 3x3 model we see multiple layers of data types which may not only traverse the multiple zones but also rest or transmit through

Typical Connected Home, Year 2000

9

Page 10: Evolution of Cloud Computing · Extending the McAfee 3x3 model we see multiple layers of data types which may not only traverse the multiple zones but also rest or transmit through

Typical Connected Home, Year 2000

10

Page 11: Evolution of Cloud Computing · Extending the McAfee 3x3 model we see multiple layers of data types which may not only traverse the multiple zones but also rest or transmit through

Typical Connected Home, Year 2000

11

Page 14: Evolution of Cloud Computing · Extending the McAfee 3x3 model we see multiple layers of data types which may not only traverse the multiple zones but also rest or transmit through

Typical Connected Home, Year 2000

14

Page 15: Evolution of Cloud Computing · Extending the McAfee 3x3 model we see multiple layers of data types which may not only traverse the multiple zones but also rest or transmit through

Typical Connected Home, Year 2000

15

Page 16: Evolution of Cloud Computing · Extending the McAfee 3x3 model we see multiple layers of data types which may not only traverse the multiple zones but also rest or transmit through

In fact the cloud will be MORE!

...forget just using it for ‘dumb’ storage

it has to be MUCH more...

Page 17: Evolution of Cloud Computing · Extending the McAfee 3x3 model we see multiple layers of data types which may not only traverse the multiple zones but also rest or transmit through

M-Cloud services usage by public authorities

17

REHOST

REFACTOR

REVISE

REBUILD

REPLACE

SaaS

IaaS

PaaS Mostly This

Not Much of

These Yet Lots of This

Page 18: Evolution of Cloud Computing · Extending the McAfee 3x3 model we see multiple layers of data types which may not only traverse the multiple zones but also rest or transmit through

Some applications

251M smart meters installed - 535M by 2015...

Lots of Data to be analysed...

Page 19: Evolution of Cloud Computing · Extending the McAfee 3x3 model we see multiple layers of data types which may not only traverse the multiple zones but also rest or transmit through

Wealth of Data

June 19,

2014

1

9

Page 20: Evolution of Cloud Computing · Extending the McAfee 3x3 model we see multiple layers of data types which may not only traverse the multiple zones but also rest or transmit through

Everything is Connected!

Page 21: Evolution of Cloud Computing · Extending the McAfee 3x3 model we see multiple layers of data types which may not only traverse the multiple zones but also rest or transmit through

Further stakeholders include

those that exert pressure on

security and privacy within

Grid

Supply Chain

June 19,

2014

2

1

Implementation of an end-to-end secure solution within the modern energy infrastructure

is complicated with the number of natural and technical participants and system

components within the ‘Grid’. At appropriate levels, standards need to be “Smart Grid”

ready in order to ensure, that remaining SGIS related risks are acceptable at all times.

Grid Operators

Stakeholders that facilitate the broader

metering infrastructure

Stakeholders that comprise of the

advanced metering infrastructure

Responsible for installation of meters,

managing the network and ensuring

security and privacy requirements set by

broader stakeholders

Page 22: Evolution of Cloud Computing · Extending the McAfee 3x3 model we see multiple layers of data types which may not only traverse the multiple zones but also rest or transmit through

Stakeholder Complexity (Identity)

June 19, 2014 22

Extending the McAfee 3x3 model we see multiple layers of data types which may not

only traverse the multiple zones but also rest or transmit through multiple stakeholders

enforcing the need for strong data control.

Business Data OSI 6-7

Functional Data

Personal Data

Communications Data OSI 1-5

Corporate IT SCADA Device Network

RG1

RG2

RG3

Page 23: Evolution of Cloud Computing · Extending the McAfee 3x3 model we see multiple layers of data types which may not only traverse the multiple zones but also rest or transmit through

Cloud will become a system of systems

June 19, 2014 23

Objective: To protect confidential, and personal information

establishing trust relationships with third parties.

• Identity across deployment platforms

• End-to-end message security required as messages can may

traverse across trust zones.

• Access to be provided to information (and systems) based on

business drivers.

• Various aspects of security need to be enforced at the ESB to

ensure valid and secure access to systems and data.

• To consider the appropriate governance, risk, and compliance

measures to address a variety of legal and regulatory aspects.

Page 24: Evolution of Cloud Computing · Extending the McAfee 3x3 model we see multiple layers of data types which may not only traverse the multiple zones but also rest or transmit through

Future requirements

24 Source: IBM

Page 25: Evolution of Cloud Computing · Extending the McAfee 3x3 model we see multiple layers of data types which may not only traverse the multiple zones but also rest or transmit through

Future Security

Dynamic Attestation

3rd Party Access

Real-time assurance

End to End validation

CSP

CSP

Internal

Page 26: Evolution of Cloud Computing · Extending the McAfee 3x3 model we see multiple layers of data types which may not only traverse the multiple zones but also rest or transmit through

Whose role is it?

Page 27: Evolution of Cloud Computing · Extending the McAfee 3x3 model we see multiple layers of data types which may not only traverse the multiple zones but also rest or transmit through

Contact

•Help us secure cloud computing

•www.cloudsecurityalliance.org

[email protected]

•LinkedIn: www.linkedin.com/groups?gid=1864210

•Twitter: @cloudsa

•Twitter: @Raj_Samani @CyberGridBook

Page 28: Evolution of Cloud Computing · Extending the McAfee 3x3 model we see multiple layers of data types which may not only traverse the multiple zones but also rest or transmit through

www.mcafee.com/CI