120 likes | 329 Views
34.HOW IS CLOUD SECURITY DIFFERENT FROM ON-PREMISE SECURITY
E N D
The typical entry point for the customers to the Cloud will be migration of their existing applications to the Cloud, initially as a proof-of-concept and later in production. • Customer will have the following questions: • How does the migrated application exploit the Performance, Scalability, Robustness models for Public Clouds? • How does the migrated application exploit the Security, Systems and Applications Management models for Public Clouds?
The following security measures represent general best practice implementations for cloud security. • Implement and maintain a security program. • Implement strong access and identity management. • Ensure confidential data protection. • Build and maintain a secure cloud infrastructure. • Implement N/W security • Implement virtualization security • Ensure physical security
Security Concerns for Cloud Computing Identity and Access Management • Who has access? • Can the existing authentication implementation be ported to cloud? • How trust is maintained across cloud and on premise domain? • How to enable single sign on for applications on cloud and on premise? Data Security • How CIA is maintained and ensured? • How key credentials are managed? • Do you have the right to audit? • How location related jurisdictional requirement is addressed? Network Security • How can I ensure data security in transit? Is data on disk is encrypted? • What are the preventive and detective controls for the N/W attacks? OS & Virtualization Security • What are the measures we need to consider for virtualization security? How is your data and application isolated from other customers? Is this a logical isolation or physical isolation? • How to protect Host Operating System? • How OS level security like OS hardening are maintained?
Security Concerns for Cloud Computing Physical Security • What are the DR mechanism in place? • What are the controls applied to secure physical data centre? Application • What is the possibility of availability of an application? • Is there any assurance provided by the CSP? How to make sure that Application code is what it should be?