26
- The Technology which Rules the Future .

Cloud computing

Embed Size (px)

DESCRIPTION

cloud computing with different perspective of security analysis and a detailed basic understanding of the concepts.

Citation preview

Page 1: Cloud computing

- The Technology which Rules the Future .

Page 2: Cloud computing

Outline:What is Cloud Computing?How Cloud Computing Works?Types Of Clouds?Types of Cloud Services?Cloud Computing Security:Cloud Security Analysis: Balancing the Threat Exposure:Working Of Fed RAMP:Fed RAMP Authorization Process:Benefits Of Fed RAMP:Final word:

Page 3: Cloud computing

What is cloud computing?

Cloud Computing is a technology that uses the internet and central remote servers to maintain data and applications.

Simple applications of Cloud Computing is yahoo email, Gmail or hotmail etc.

Page 4: Cloud computing

How cloud computing works?Cloud computing consists of two layers, namely

BACK END

FRONT END

Page 5: Cloud computing

Two layers:Front end - Is the part seen by the client,i.e. the computer user. this includes the client’s network (or computer) and the applications used to access the cloud via user interface such as a web browser.

Back end – Is the ‘cloud’ itself, comprising various computers, servers and data storage devices..

Page 6: Cloud computing

Types of clouds:

Page 7: Cloud computing

Public Clouds Computing environment are open for used to anyone who wants to sign up and use them.

(Eg:Amazon Web services,google Apennine).

Private Cloud is a Cloud Computing infrastructure created by an organization for its own internal use rather than using someone else’s infrastructure.

(Eg:Amazon EC2)

Hybrid Cloud is a composition of at least one private cloud and at least one public cloud.

(Eg.IBM)

Page 8: Cloud computing

Types of cloud services:

SAAS END CUSTOMERS

PAAS DEVELOPERS

IAAS SYS ADMINS

Page 9: Cloud computing

What is IAAS?Infrastructure as a service is provisional in which an

organization outsources the equipment used to support operations, including storage,hardware,servers and networking components

Characteristics and components of IAAS include:o utility computing service and billing model.o Automation of administrative tasks.o Dynamic scaling.o Desktop virualization.o Policy-based services.o Internet connectivity.

Page 10: Cloud computing

What is PAAS?Platform as a service (PAAS) is the deliverance of a computer platform and resolution stack as a service.It regularly goes extra with the inclusion of a software progress platform, that is designed for cloud computing at the top of the cloud stack.

Characteristics of PAAS:o PAAS includes workflow amenities for application

propositions.o PAAS is app progress, testing use and hosting as well as

proposition services such as group partnership.o PAAS is web service amalgamation,app

versioning,security,storage,persistence,scalability,state administration and app instrumentation.

Page 11: Cloud computing

What is SAAS? Applications or software is delivered as a service to the customer who can access the program from any online device who can access the program from any online device ,eliminating the need to install and run the applications on the customer’s own computers and simplifying maintenance and support.

Characteristics of SAAS:

o Multi tenant Infrastructure.

o Easy Customization.

o Better Access.

Page 12: Cloud computing

CLOUD SECURITY:

Page 13: Cloud computing

Cloud Security Analysis:Some key issues:

o Trust ,multi-tenancy,encryption,compliance.

Cloud Security is a tractable problem.

o There are both

ADVANTAGES

CHALLENGES

Page 14: Cloud computing

Security Advantage:Shifting public data to a external clod reduces the exposure of the internal sensitive data.

Cloud homogeneity makes security auditing/testing simpler.

Clouds enable automated security management.

Redundancy/disaster recovery.

Page 15: Cloud computing

Some of the Security Challenges:Trusting vendor’s security model.

Customer inability to respond to audit findings.

Obtaining support for investigations.

Proprietary implementations can’t be examined.

Loss of physical control.

Page 16: Cloud computing

Security Related Cloud services:Cloud Provisioning Services.

Cloud Data Storage Services.

Cloud Processing Infrastructure.

Cloud Support Services.

Cloud Network and Premier Security.

Elastic Elements :Storage Processing.

Page 17: Cloud computing

Balancing Threat Exposure:Private Clouds may have less threat exposure than community clouds which have threat exposure than public clouds.

Massive Public Clouds may be cost effective than large community clouds which may be more effective than small private clouds.

Page 18: Cloud computing

Putting it Together:

Most clouds will require very strong security controls.

All models of cloud may be used for differing tradeoffs

between threat exposure bad efficiency.

There is no one “cloud “.there are many models and architectures.

Federated Risk Management of Cloud Systems.

Page 19: Cloud computing

Working Process of Fed RAMP:Fed RAMP is the result of close collaboration with security and cloud experts from the federal council and its working as well as private industry.

Fed ramp will authorize cloud systems in a four step process:

o INITIATING:

o ASSESSING:

o AUTHORIZING:

o LEVERAGING:

Page 20: Cloud computing

INITIATING: The Fed RAMP assessment process is initiated by agencies or Cloud Service Provider (CSPs) beginning a security authorization using the Fed RAMP requirements.

ASSESSING: CSPs must implement the Fed RAMP security requirements on their environment and hire a Fed RAMP approved third party assessment organization (3PAO) to perform an independent assessment to audit the cloud system and provide a security assessment package for review.

AUTHORIZING: The Fed RAMP Joint Authorization Board(JAB) will review the security assessment package based on a prioritized approach and may grant a provisional authorization.

LEVERAGING: Federal agencies can leverage CSP authorization packages for review when granting an agency Authority To Operate (ATO) saving time and money.

Page 21: Cloud computing

Agency x has a need for a new cloud based IT

system

Fed RAMP Authorization process:

Agency x gets security requirements for the new IT system from Fed RAMP and

adds requirements if necessary

Agency x releases REP for new IT System and

awards contract to cloud service provider

(CSP)

Agency X submits request to Fed RAMP office for CSP to be

Fed RAMP authorized to operate

CSP is put into Fed RAMP priority queue (prioritization occurs based on factors such as multi-agency use, number of

expected users,etc.)

Page 22: Cloud computing

Fed RAMP AUTHORIZATION PROCESS (CONT):

CSP and agency sponsor begin authorization

process with Fed RAMP office.

CSP agency sponsor and Fed RAMP office review security requirements

and any alternative implementation.

Fed RAMP office coordinators with CSP for creation of system

security plan(SSP).

CSP has independent assessment of security

controls and developers appropriate reports for

submission for Fed RAMP office.

Fed RAMP office reviews and

assembles the final authorization

package for the JAB

JAB reviews final certification package

and authorization CSP to operate

Fed RAMP office adds CSP to authorized system inventory to be reviewed and leveraged

by all Federal agencies

Fed RAMP provide continuous monitoring of CSP

Page 23: Cloud computing

Benefits of Fed RAMP:Saves significant cost, time and resources “Do once use many times”

Improves real-time security visibility.

Provides a uniform approach to risk-based management.

Enhance transparency between government and cloud service providers (CSPs)

Improves the trustworthiness,reliability,consistency and quality of the Federal security authorization process.

Page 24: Cloud computing

Final Word:Without a doubt, Cloud Computing is Truly a

Revolutionary Concept for many Business Organization.

Because of the …,

Technology's Ease of Adoption,

Significantly Lower Maintenance Costs and

Greater Workflow Efficiency.

There is no doubt that Cloud Computing will gain wide Spread Popularity Going Forward…

Page 25: Cloud computing
Page 26: Cloud computing

BY ,

N.HARIKRISHNAN 3RD YEAR ,B.TECH ITSRIRAM ENGINNERING COLLLEGE,PERMAPATTU,

THIRUVALLUR.