Introduction to Cloud Security

51
The Cloud Beckons, But is it Safe?

description

From LSNTAP's webinar of 7 August 2013, "Introduction to Cloud Security." Stay tuned for "Advanced Cloud Security" on August 28th!

Transcript of Introduction to Cloud Security

Page 1: Introduction to Cloud Security

The Cloud Beckons, But is it Safe?

Page 2: Introduction to Cloud Security

What We’ll Cover Today

Page 3: Introduction to Cloud Security

Introductions

Page 4: Introduction to Cloud Security

Introductions

Page 5: Introduction to Cloud Security

What is The Cloud?

Page 6: Introduction to Cloud Security

LSC Grantees are Using It

Page 7: Introduction to Cloud Security

The Lure of the Cloud

Page 8: Introduction to Cloud Security

Why the Concern?

Page 9: Introduction to Cloud Security

Cloud Security in the News

Page 10: Introduction to Cloud Security

Technology and Legal Ethics

Page 11: Introduction to Cloud Security

Under Siege

Page 12: Introduction to Cloud Security

But We Do Lots of Things on the Internet

Page 13: Introduction to Cloud Security

How Secure is Your On-Site Data?

Page 14: Introduction to Cloud Security

Myth

Page 15: Introduction to Cloud Security

Fact

Page 16: Introduction to Cloud Security

Myth

Page 17: Introduction to Cloud Security

A Cloud Data Center

Page 18: Introduction to Cloud Security

Is This Your Server Closet?

Page 19: Introduction to Cloud Security

What Does Security Mean?

Page 20: Introduction to Cloud Security

The Three Pillars of Information Security

Page 21: Introduction to Cloud Security

Confidentiality

Page 22: Introduction to Cloud Security

Integrity

Page 23: Introduction to Cloud Security

Availability

Page 24: Introduction to Cloud Security

Also: Physical Possession

Page 25: Introduction to Cloud Security

What Does Security Mean for You?

Page 26: Introduction to Cloud Security

Rules for Absolute Safety

Page 27: Introduction to Cloud Security

Know What You’re Protecting

Page 28: Introduction to Cloud Security

Red Flags

Page 29: Introduction to Cloud Security

Privilege and Waiver

Page 30: Introduction to Cloud Security

What’s Your Exposure?

Page 31: Introduction to Cloud Security

What’s The Impact of an Outage?

Page 32: Introduction to Cloud Security

Testing Your On-Site Security

Page 33: Introduction to Cloud Security

A Multi-Level Security Model

Page 34: Introduction to Cloud Security

Multi-Level Security is the Ideal

Page 35: Introduction to Cloud Security

Physical Security

Page 36: Introduction to Cloud Security

Network Security

Page 37: Introduction to Cloud Security

Transmission Security

Page 38: Introduction to Cloud Security

Access Controls

Page 39: Introduction to Cloud Security

Data Protection

Page 40: Introduction to Cloud Security

What to Look For in a Vendor

Page 41: Introduction to Cloud Security

Description of Security Mechanisms

Page 42: Introduction to Cloud Security

Uptime

Page 43: Introduction to Cloud Security

Terms of Service

Page 44: Introduction to Cloud Security

Regulatory Compliance: HIPAA

Page 45: Introduction to Cloud Security

Regulatory Compliance: SAS70 and SSAE16

Page 46: Introduction to Cloud Security

Regulatory Compliance: PCI DSS Compliance

Page 47: Introduction to Cloud Security

In Summary

Page 48: Introduction to Cloud Security

Understand the Value of Your Data

Page 49: Introduction to Cloud Security

Your Data Is No Safer Than You Make It

Page 50: Introduction to Cloud Security

But Many Vendors Make Your Data Really Safe

Page 51: Introduction to Cloud Security

Questions?