You are on page 1of 37

SIIA Cloud Webinars

“Cloud Security Introduction”


Organizers:
Lars Ewe, Chief Technology Officer & VP Engineering, Cenzic
Irfan Saif, Principal, Deloitte
Panelists:
Deb Banerjee, Director of Engineering, Symantec
Jim Cavalieri, Chief Security Officer, Salesforce
Steve Riley, Sr. Technical Program Manager, Amazon Web Services
“SIIA pioneered the government cloud computing dialogue with its SaaS Gov
conference. Now in its fourth year, the SIIA conference has consistently attracted
top government speakers, cloud computing experts, and public sector customers
to show how government agencies can take advantage of the cloud…”
-Daniel Burton, Senior Vice President, Global Public Policy,
Salesforce.com

SIIA & INPUT Members: $495


Non-Members: $695
Gov IT Purchasers (with Fed ID): Free

http://www.siia.net/saasgov
Medium-sized, EBITDA-positive companies are invited to
apply to present before an audience of middle-market-
focused senior lenders, private equity investors, and
strategic partner prospects.

Deadline to Apply: 1/29/2010

March 3, 2010
New York City

http://siia.net/investmentconference
www.AllAboutTheCloud.net
SIIA OnDemand & OpSource SaaS Summit have joined forces to bring you…

All About The Cloud


May 10-12, 2010
The Westin St. Francis, San Francisco, CA
Today’s Moderator
Lars Ewe, CTO & VP of Engineering, Cenzic
Lars is a technology executive with broad background in
(web) application development and security, middleware
infrastructure, software development and
application/system manageability technologies.
Throughout his career Lars has held key positions in
engineering, product management/marketing, and sales in
a variety of different markets. Prior to Cenzic, Lars was
software development director at Advanced Micro
Devices, Inc., responsible for AMD's overall systems
manageability and related security strategy and all related
engineering efforts.
Introduction
Irfan Saif, Principal, Deloitte
Irfan Saif is a Principal with Deloitte’s Security & Privacy
practice. He also serves as the national Technology,
Media, and Telecommunications industry leader for the
practice. Irfan has over fifteen years of security consulting
experience, helping many major US and global technology
clients address their information security, data privacy,
and technology risk challenges. He is also one of the
leaders responsible for Deloitte’s cloud computing
initiative. Irfan holds the CISSP, CISM, and CSSLP
information security certifications.
Cloud Computing – definitions
Service Type
People + Process + Technology bundled into completed business services provided as a subscription
“Business”-as-a-Service
with cloud characteristics

Software-as-a-Service On-demand licensing of software services

Platform-as-a-Service Tools and environments (middleware) to build and operate cloud applications and services

Compute, storage, network, and /or data center facility and operations resources as a service from the
Infrastructure-as-a-Service
cloud

Service Source
Cloud computing services from vendors that can be accessed across the Internet or a private network,
Public cloud (External) using one or more data centers, shared among multiple customers, with varying degrees of data privacy
control. Sometimes called “vendor” cloud computing.
Computing architectures modeled after vendor clouds, yet built, managed, and used internally by an
Private cloud (Internal) enterprise; uses a shared services model with variable usage of a common pool of virtualized computing
resources. Data is controlled within the enterprise.
A mix of vendor cloud services, internal cloud computing architectures, and classic IT infrastructure,
Hybrid cloud
forming a hybrid model that uses the best-of-breed technologies to meet specific needs.
Community clouds are used across organizations that have similar objectives and concerns, allowing for
Community cloud shared infrastructure and services. Community clouds can be deployed using any of the three methods
outlined above, simplifying cross-functional IT governance.

Business Model
Business model driven by revenue from cloud subscriptions or from licensing of technologies to
Cloud Service Provider
subscription service providers

Cloud Service Subscriber Business case is based on improved capability, agility, cost, etc. through the use of cloud services.

Copyright © 2009 Deloitte Development LLC. All rights reserved.


Cloud Computing – Risk and Control
• Many organizations are concerned about the security impacts of cloud computing, not only
as it is adopted by their own companies, but also as their business partners move sensitive
applications and data to the cloud. Level of risk also depends on the complexity of the
cloud service type and service source

. Across numerous surveys of CIOs and other executives over the last 18 months, security
consistently ranks as the top concern
(e.g. in CIO magazine’s survey 59% of respondents thought that vendors have not
adequately addressed security concerns related to on-demand offerings)

Do the Cloud vendor’s


Who will own the data? retention/destruction timelines
How might it be used? and practices meet your
requirements?

Data controls and ownership Backup, retention, disposal

Where will your data How is reliability, access,


reside? Who can access and availability assured by
your data? Cloud vendors?

Risk and Control Issues


Data location and access Availability and reliability

Can Cloud vendors


comply with your What are operational
regulatory / compliance continuity measures and
requirements? recovery timelines?

Legal / Regulatory compliance Disaster recovery

Copyright © 2009 Deloitte Development LLC. All rights reserved.


Enterprises must manage important operational
risks on the road to cloud computing adoption
Key operational and governance issues must be resolved as cloud computing
architectures are deployed in the enterprise, requiring new approaches

Data controls
and ownership
Who will own the data? How might it be used?

Backup,
Do data retention/destruction timelines and practices
retention,
disposal meet your requirements, internal and otherwise?

Availability and How is reliability, access, and availability assured by


reliability cloud services providers?
What are operational continuity measures and
Disaster recovery
recovery timelines?
Can your cloud provider assist in identifying needs for
Legal compliance
compliance expertise? Can you address tax issues?

Copyright © 2009 Deloitte Development LLC. All rights reserved.


Enterprises must manage important operational
risks on the road to cloud computing adoption
Key operational and governance issues must be resolved as cloud computing
architectures are deployed in the enterprise, requiring new approaches

How will you satisfy your own customers’ concerns


Assurance
about the cloud?

Scalability Can your service provider meet growing demands?

Security and How is security achieved? What level of encryption is


encryption required? How will this impact operations?
Auditing and Are you ready to apply risk management controls to
monitoring applications and data in cloud environments?
Does the provider’s technology or business model
Vendor “lock-in”
limit your access to your data or intellectual property?

Copyright © 2009 Deloitte Development LLC. All rights reserved.


Layers of security and privacy in a cloud
environment

1. SaaS controls
1 Software as a
2. PaaS controls 5 Service (SaaS)
3. IaaS controls Application Application

4. Virtualization
controls 2
5. Data management
and storage Platform as a
Application Application
controls Service (PaaS)

6. ACLs
7. Communication
channels 6
Application Application
3
8. Supporting Application
Application
Application
Application
Operating Operating
infrastructure system
Operating system
Operating
system
Operating system
Operating Infrastructure as a
VIRTUALsystem VIRTUALsystem Service (IaaS)
VIRTUAL
computer VIRTUAL
computer
VIRTUAL
computer VIRTUAL
computer
computer computer

End users, laptops, 7


cell phones, etc. Virtualization 4 Virtual layer

Supporting infrastructure 8 Cloud supporting


infrastructure
(physical hardware, network devices)

Draft— For discussion purposes only


11 Copyright © 2009 Deloitte Development LLC. All rights reserved.
Deb Banerjee
Director of Engineering
Symantec
Dr Deb Banerjee is responsible for technology and
strategy for Symantec's enterprise security products.
Formerly, he was involved in designing Symantec's award
winning portfolio of messaging security products. Prior to
Symantec, Deb worked on designing applications and
platforms for enterprises while at IBM and Vitria, and
holds a patent in business process modeling. Deb has a
B.Tech. in Computer Science from IIT-Delhi and a Ph.D.
in Computer Science from Dartmouth College.
Confidence in the Cloud
Deb Banerjee
Director of Engineering, Symantec
What’s different in the cloud?

• Loss of control & visibility


• maintain accountability
• Technology shifts
• Virtualization
• Multi-tenancy

Confidence in the Cloud 14


Transparency and Cloud Models

Visual model of NIST Working Definition of


Cloud Computing
Cloud Technology: Virtualization

Virtualization Security Issues


•Hypervisor Security
•Virtual network visibility
•VM Sprawl
Cloud Technology: Multi-tenancy

• Shared
–Infrastructure, data, services, applications
• Use Cases
–Single Instance: Single Database and Code
–Partitioned. Separate DB per tenant
–Virtualized. Shared Hardware and Network
• Security Challenges
–Infrastructure, data, services, applications
Cloud Security Solutions

Delivers hosted services for securing and


SaaS
managing information to consumers and
Offerings enterprises.

Enable users to deploy security software in


Cloud-Enabled public clouds and to optimize existing
Software infrastructure through interoperability between
on-premise Symantec software and cloud
services.

Provide information security and


Infrastructure for management software and expertise to
Cloud Computing public and private service providers
building cloud computing environments.

Confidence in the Cloud 18


Steve Riley
Sr. Technical Program Manager
Amazon Web Services
Steve Riley is an evangelist and strategist for cloud computing at Amazon Web
Services, working to help organizations understand how to integrate their
environments with the cloud to extend reach, increase utilization, and respond to
rapid business changes. His specialties include information security, compliance,
reliability, privacy, and policy. Steve is a popular speaker at conferences worldwide,
meets regularly with user groups of all sizes, and seeks opportunities to engage with
customers as often as possible. Born with an Ethernet cable attached to his belly
button, Steve grew up in networking and telecommunications. Besides lurking in the
Internet's dark alleys and secret passages, he enjoys freely sharing his opinions about
the intersection of technology and culture. He writes at http://stvrly.wordpress.com,
tweets as @steveriley, and emails from steriley@amazon.com.
SIIA cloud security webinar
Amazon Web Services
Steve Riley
Sr. Technical Program Manager
steriley@amazon.com
http://stvrly.wordpress.com
@steveriley
Traditional security model
Layers of trust

Perimeters separate trusted (owned, local)
from untrusted (other, remote)
The model is breaking
Seriously?
New security model
Ownership vs. control
Security at Amazon Web Services
Jim Cavalieri
SVP & Chief Trust Officer
salesforce.com
Jim Cavalieri joined salesforce.com in 1999 and has held a number of roles including VP
of Systems Engineering, SVP of Service Delivery, Chief Information Officer, and Chief
Security and Risk Officer. In 2008, Cavalieri created the role of Chief Trust Officer, as
salesforce.com recognized the need for a Trust Office that encompassed information
and products security, privacy, corporate & physical security, enterprise risk
management and technology audit & compliance. Prior to salesforce.com, Cavalieri
spent four and a half years at Oracle Corporation where he worked in various
technical and management roles spanning both Oracle Consulting Services and Oracle
Development. Prior to that, he worked as a consultant and systems engineer for
Electronic Data Systems (EDS) where he worked in the high-tech, CAD/CAM/CAE,
and automotive industries. Cavalieri holds a B.S. in Electrical Engineering from Cornell
University.
Cloud Computing and Trust

Jim Cavalieri
SVP & Chief Trust Officer
salesforce.com
Safe Harbor
Safe harbor statement under the Private Securities Litigation Reform Act of 1995: This presentation may contain forward-
looking statements that involve risks, uncertainties, and assumptions. If any such uncertainties materialize or if any of the
assumptions proves incorrect, the results of salesforce.com, inc. could differ materially from the results expressed or
implied by the forward-looking statements we make. All statements other than statements of historical fact could be
deemed forward-looking, including any projections of subscriber growth, earnings, revenues, or other financial items and
any statements regarding strategies or plans of management for future operations, statements of belief, any statements
concerning new, planned, or upgraded services or technology developments and customer contracts or use of our
services.

The risks and uncertainties referred to above include – but are not limited to – risks associated with developing and
delivering new functionality for our service, our new business model, our past operating losses, possible fluctuations in
our operating results and rate of growth, interruptions or delays in our Web hosting, breach of our security measures, the
immature market in which we operate, our relatively limited operating history, our ability to expand, retain, and motivate
our employees and manage our growth, new releases of our service and successful customer deployment, our limited
history reselling non-salesforce.com products, and utilization and selling to larger enterprise customers. Further
information on potential factors that could affect the financial results of salesforce.com, inc. is included in our quarterly
report on Form 10-Q for the fiscal year ended October 31, 2009 and our other filings. These documents are available on
the SEC Filings section of the Investor Information section of our Web site.

Any unreleased services or features referenced in this or other press releases or public statements are not currently
available and may not be delivered on time or at all. Customers who purchase our services should make the purchase
decisions based upon features that are currently available. Salesforce.com, inc. assumes no obligation and does not
intend to update these forward-looking statements.
Salesforce.com Cloud Computing Model

ƒ Software-as-a-Service and Platform-


as-a-Service offerings

ƒ Enterprise-facing model with


business customers in most
geographies and sectors

ƒ Public cloud model delivered over


secure connections

ƒ Multi-tenant architecture with


security achieved through the logical
separation of data
Trust is the sum of privacy and security

• Transparency
• Confidence
Privacy Security
• Reliance

• Collection Limitation
• Notice/Choice
• Use
• Transfer
• Security

• Confidentiality
• Integrity
• Availability
How salesforce.com achieves Trust

ƒ Great Infrastructure Security


ƒ Strong Operational Security
ƒ Robust Customer Controlled Security
Features
ƒ Partnership with our Customers
ƒ Transparency:
ƒ Achieving External Certifications
Salesforce.com believes Cloud Computing can
Improve Security
Jim Cavalieri
SVP & Chief Trust officer Q&A
jcavalieri@salesforce.com
415-901-7013
Q&A
Irfan Saif Jim Cavalieri
Principal SVP & Chief Trust Officer
Deloitte & Touche LLP salesforce.com
isaif@deloitte.com jcavalieri@salesforce.com

Lars Ewe Steve Riley


CTO & VP Engineering Sr. Technical Program Manager
Cenzic Amazon Web Services
Lars@cenzic.com steriley@amazon.com
Blog: http://stvrly.wordpress.com
Twitter: @steveriley

Deb Banerjee
Director of Engineering
Symantec

You might also like