Security and Compliance in the
Cloud
Cloud
Computing
Introduction
Security and Compliance in the Cloud : Cloud Computing Introduction 1
Objectives Overview
How it works and Architecture and
Cloud Computing
Sharing Key
and its Definition
Comparison Characteristics
Service Model –
Why use Cloud Adoption Modes,
Layers and
Computing? Pros Selection Factors
Deployment
& Cons and Concern
Models
Security and Compliance in the Cloud : Cloud Computing Introduction 2
Cloud Computing
Security and Compliance in the Cloud : Cloud Computing Introduction 3
Definition
The National Institute of Standards and
Technology (NIST) provides a concise and
specific definition:
Cloud computing is a model for enabling convenient,
on-demand network access to a shared pool of
configurable computing resources (e.g., networks,
servers, storage, applications, and services) that can be
rapidly provisioned and released with minimal
management effort or service provider interaction.
Security and Compliance in the Cloud : Cloud Computing Introduction 4
How it Works
Utilizes the network as a means to connect user end
point to resources that are centralized in a data center.
The data center may by accessed via the internet or a
company network, or both.
Allows access from a variety of end points such as a
mobile phone, a PC or a tablet.
Cloud services may be designed to be vendor agnostic,
working equally well with Linux, Mac and PC platforms.
Security and Compliance in the Cloud : Cloud Computing 5
Introduction
How it Works continue…
Allows access from any internet connected location,
allowing Telecommuting, and Outsourcing.
A user endpoint with minimal software requirements
may submit a task for processing. The service provider
may pool the processing power of multiple remote
computers in "the cloud" to achieve the task, such as
data warehousing of hundreds of terabytes, managing
and synchronizing multiple documents online, or
computationally intensive work.
Security and Compliance in the Cloud : Cloud Computing 6
Introduction
Comparison
Cloud computing shares characteristics with:
Autonomic computing
Client–server model
Smart Grid Computing
Mainframe computer
Utility computing
Peer-to-peer
Service-oriented computing
Grid Computing
Security and Compliance in the Cloud : Cloud Computing Introduction 7
Architecture
Involves multiple components communicating with
each other over application programming interfaces,
usually web services and 3-tier architecture.
Multiple programs each doing one thing well and
working together over universal interfaces.
Complexity is controlled and the resulting systems are
more manageable than their monolithic counterparts.
Security and Compliance in the Cloud : Cloud Computing Introduction 8
Architecture continue…
The two most significant components of cloud
computing architecture are known as the front end
and the back end.
The front end is the part seen by the client, i.e. the
computer user. This includes the client’s network and
applications used to access the cloud via a user interface
such as a web browser.
The back end of the cloud computing architecture is the
‘cloud’ itself, comprising various computers, servers and
data storage devices.
Security and Compliance in the Cloud : Cloud Computing Introduction 9
Architecture continue…
Security and Compliance in the Cloud : Cloud Computing Introduction 10
Key characteristics
Agility improves with users' ability to rapidly and
inexpensively re-provision technological infrastructure
resources.
Application Programming Interface (API) accessibility to
software that enables machines to interact with cloud
software in the same way the user interface facilitates
interaction between humans and computers.
Cost is claimed to be greatly reduced and in a public
cloud delivery model capital expenditure is converted
to operational expenditure.
Security and Compliance in the Cloud : Cloud Computing Introduction 11
Key characteristics continue…
Device and location independence enable users to
access systems using a web browser regardless of their
location or what device they are using
Multi-tenancy enables sharing of resources and costs
across a large pool of users thus allowing for:
Centralization of infrastructure in locations with
lower costs
Peak-load capacity increases
Utilization and efficiency improvements for systems
that are often only 10–20% utilized.
Security and Compliance in the Cloud : Cloud Computing Introduction 12
Key characteristics continue…
Reliability is improved if multiple redundant sites are
used, which makes cloud computing suitable for
business continuity and disaster recovery.
Scalability via dynamic "on-demand" provisioning of
resources on a fine-grained, self-service basis near
real-time.
Performance is monitored, and consistent and loosely
coupled architectures are constructed using web
services as the system interface.
Security could improve due to centralization of data.
Security and Compliance in the Cloud : Cloud Computing Introduction 13
Service Models
• There are three types of the cloud:
Infrastructure as a Service (IaaS)
Platform as a Service (PaaS)
Software as a Service (SaaS)
Security and Compliance in the Cloud : Cloud Computing Introduction 14
Layers
Client
Application
Platform
Infrastructure
Server
Security and Compliance in the Cloud : Cloud Computing Introduction 15
Deployment Methods
Public cloud
Community cloud
Hybrid cloud and hybrid IT delivery
Combined cloud
Private cloud
Security and Compliance in the Cloud : Cloud Computing Introduction 16
Why use cloud computing??
Website traffic fluctuates.
Visitors expect steady, fast performance regardless.
An infrastructure able to handle peak traffic requires capital
investment.
No matter how big you build it, it still may not be enough.
Having to choose between overspending or under-provisioning is a
classic dilemma.
By deploying your web application in the cloud, you can avoid this
dilemma. You can eliminate the upfront fixed investment, and still gain
access to compute resources to meet peak loads with on demand
scalability, while still paying only for the compute time you actually
use.
Security and Compliance in the Cloud : Cloud Computing Introduction 17
Why use cloud computing
Security and Compliance in the Cloud : Cloud Computing Introduction 18
Why use cloud computing continue…
Security and Compliance in the Cloud : Cloud Computing Introduction 19
Pros and Cons
Security and Compliance in the Cloud : Cloud Computing Introduction 20
Adoption of Cloud Computing
Security and Compliance in the Cloud : Cloud Computing Introduction 21
Selection Factors
Security and Compliance in the Cloud : Cloud Computing Introduction 22
Main Concerns
Security and Compliance in the Cloud : Cloud Computing Introduction 23
Questions?
Security and Compliance in the Cloud : Cloud Computing Introduction 24
Reading & Reference Material
• Guide to Security Assurance for Cloud Computing
(2015), by Shao Ying Zhu, Richard Hill and
Marcello Travoti
– Chapter ***
Security and Compliance in the Cloud : Cloud Computing Introduction 25