SlideShare a Scribd company logo
Cloud Security Issues andCloud Security Issues andCloud Security Issues andCloud Security Issues and
Adoption Guideline for ThaiAdoption Guideline for ThaiAdoption Guideline for ThaiAdoption Guideline for Thai
Government AgenciesGovernment AgenciesGovernment AgenciesGovernment Agencies
July 26, 2016
Dr. Sudsanguan Ngamsuriyaroj
Faculty of ICT, Mahidol University
About Me
Assistant Professor
Faculty of ICT, Mahidol University
Teaching
Parallel computing, Cloud computing
Security
Computer Ethics
Research
Security (network, cloud, database)
Parallel computing
Healthcare applications
SIPA TECHNOLOGY MEETUP 2016 - HIGH PERFORMANCE COMPUTING TRENDS AND TECHNOLOGY 2
sudsanguan.nga@mahidol.ac.th
Agenda
Cloud Adoption
General Security Concepts
Cloud Security Model
Cloud Security Issues
3SIPA TECHNOLOGY MEETUP 2016 - HIGH PERFORMANCE COMPUTING TRENDS AND TECHNOLOGY
Cloud Adoption
from Data Center to Cloud
4
http://www.stratoscale.com/blog/cloud/the-journey-from-virtualization-to-cloud-computing/
SIPA TECHNOLOGY MEETUP 2016 - HIGH PERFORMANCE COMPUTING TRENDS AND TECHNOLOGY
Cloud Adoption – Why?
5SIPA TECHNOLOGY MEETUP 2016 - HIGH PERFORMANCE COMPUTING TRENDS AND TECHNOLOGY
Cloud Adoption – Why?
Cost Reduction
6
http://www.opengroup.org/cloud/whitepapers/ccroi/roi.htm
SIPA TECHNOLOGY MEETUP 2016 - HIGH PERFORMANCE COMPUTING TRENDS AND TECHNOLOGY
Are you ready for Cloud?
Which applications will be moved to cloud
Readiness of existing infrastructure
Development of IT personnel (infrastructure and
developers)
How to migrate to cloud
◦ Which cloud model/platform (public, private, hybrid) to use
Budget / ROI
Application users
Schedule to deliver products/services
7SIPA TECHNOLOGY MEETUP 2016 - HIGH PERFORMANCE COMPUTING TRENDS AND TECHNOLOGY
Categories of Applications
1. Public applications: for everyone: web sites
2. External based applications: for customers/ partners
3. Internal based applications: for staff only - emails
4. Private applications: for administration: ERP, HR
8
Which applications will be
moved to Cloud
SIPA TECHNOLOGY MEETUP 2016 - HIGH PERFORMANCE COMPUTING TRENDS AND TECHNOLOGY
Network infrastructure
System infrastructure
Application platforms
BCP – Business Continuity Plan
Infrastructure Maintenance
Audit process
9
Readiness of Existing Infrastructure
SIPA TECHNOLOGY MEETUP 2016 - HIGH PERFORMANCE COMPUTING TRENDS AND TECHNOLOGY
Physical / Logical network diagram (latest update?)
All existing equipment and their capacity
Report of network usage
◦ Bandwidth enough?
◦ Any usage abuse?
What links needed to be updated
10
Readiness of Existing Infrastructure:
Network Ready?
SIPA TECHNOLOGY MEETUP 2016 - HIGH PERFORMANCE COMPUTING TRENDS AND TECHNOLOGY
List of all servers and the applications running
List of all servers no longer used
How long a server will be used
Is there any maintenance?
What workload running and how much the
utilization is?
If there is a new server, a plan to use VM ?
11
Readiness of Existing Infrastructure:
System Ready?
SIPA TECHNOLOGY MEETUP 2016 - HIGH PERFORMANCE COMPUTING TRENDS AND TECHNOLOGY
Workload Forecasted
12
http://www.americanis.net/2013/shift-your-risk-in-the-cloud/
SIPA TECHNOLOGY MEETUP 2016 - HIGH PERFORMANCE COMPUTING TRENDS AND TECHNOLOGY
Workload Analysis
13SIPA TECHNOLOGY MEETUP 2016 - HIGH PERFORMANCE COMPUTING TRENDS AND TECHNOLOGY
What would be Barriers?
Data security and privacy
People with effective skills
Different cloud service providers and platforms
Vendor lock-in
Cloud providers’ reliability and availability
Risks
14
http://www.slideshare.net/ISS-NUS/security-in-smart-city-implementation-
infrastructure-and-people
SIPA TECHNOLOGY MEETUP 2016 - HIGH PERFORMANCE COMPUTING TRENDS AND TECHNOLOGY
General Security Concept
15
http://www.slideshare.net/dr_edw777/chapter-1-overview-11741038
SIPA TECHNOLOGY MEETUP 2016 - HIGH PERFORMANCE COMPUTING TRENDS AND TECHNOLOGY
NIST Reference Architecture
16
Source: NIST Special Publication 500-292, NIST Cloud Computing Reference Architecture
SIPA TECHNOLOGY MEETUP 2016 - HIGH PERFORMANCE COMPUTING TRENDS AND TECHNOLOGY
Cloud Security Model
17
http://www.softwaretestpro.com/ItemAssets/5590/Fig4.jpg
SIPA TECHNOLOGY MEETUP 2016 - HIGH PERFORMANCE COMPUTING TRENDS AND TECHNOLOGY
1. Data breaches/ leaks
2. Data loss
3. Account or service traffic hijacking
4. Insecure interfaces and APIs
5. Denial of services
6. Malicious Insiders
7. Cloud abuse
8. Insufficient due diligence
9. Shared technology vulnerabilities
CSA Notorious 9CSA Notorious 9CSA Notorious 9CSA Notorious 9
Cloud Top Threats in 2013
18
https://downloads.cloudsecurityalliance.org/initiatives/top_
threats/The_Notorious_Nine_Cloud_Computing_Top_Threa
ts_in_2013.pdf
SIPA TECHNOLOGY MEETUP 2016 - HIGH PERFORMANCE COMPUTING TRENDS AND TECHNOLOGY
CSA TreacherousCSA TreacherousCSA TreacherousCSA Treacherous 12121212
Cloud Top Threats in 2016
1. Data Breaches
2. Weak Identity,
Credential and Access
Management
3. Insecure APIs
4. System and Application
Vulnerabilities
5. Account Hijacking
6. Malicious Insiders
19
7. Advanced Persistent
Threats (APTs)
8. Data Loss
9. Insufficient Due Diligence
10.Abuse and Nefarious Use
of Cloud Services
11.Denial of Service
12.Shared Technology Issues
https://cloudsecurityalliance.org/download/the-treacherous-twelve-cloud-
computing-top-threats-in-2016/
SIPA TECHNOLOGY MEETUP 2016 - HIGH PERFORMANCE COMPUTING TRENDS AND TECHNOLOGY
Data Breaches
World's Biggest Data Breaches
Selected losses greater than 30,000 records (updated 11th July 2016)
20
http://www.informationisbeautiful.net/visualizations/worlds-biggest-data-breaches-hacks/
SIPA TECHNOLOGY MEETUP 2016 - HIGH PERFORMANCE COMPUTING TRENDS AND TECHNOLOGY
Data Loss
21
http://www.theregister.co.uk
/2016/05/13/salesforcecom_
crash_caused_data_loss/
http://www.computerworld.com/a
rticle/2973600/cloud-
computing/google-cloud-loses-
data-belgium-itbwcw.html
SIPA TECHNOLOGY MEETUP 2016 - HIGH PERFORMANCE COMPUTING TRENDS AND TECHNOLOGY
Data Security on Cloud
How to protect your data from being observed?
Data Encryption
what about KEY? and Key Management?
encryption algorithm?
How about “homomorphic encryption”?
Data Masking for Sensitive data like bank accounts
maintain a mapping between real and
masked data
22SIPA TECHNOLOGY MEETUP 2016 - HIGH PERFORMANCE COMPUTING TRENDS AND TECHNOLOGY
Data Life Cycle
23
https://securosis.com/tag/data+security+lifecycle
SIPA TECHNOLOGY MEETUP 2016 - HIGH PERFORMANCE COMPUTING TRENDS AND TECHNOLOGY
Cloud Threats and Vulnerabilities
24
Adopted from “Realizing the Benefits of Vulnerability Management in the Cloud” by Gordon MacKay, CTO, Digital
Defense, Inc.
SIPA TECHNOLOGY MEETUP 2016 - HIGH PERFORMANCE COMPUTING TRENDS AND TECHNOLOGY
Cloud Security Issues
25
https://www.eitdigital.eu/fileadmin/files/docs/documents_helsinki/TheoDimitrakos-
EIT_ICT_Labs_Symposium_on_Trusted_Cloud_and_Future_Enterprises-email-no-demo.pdf
SIPA TECHNOLOGY MEETUP 2016 - HIGH PERFORMANCE COMPUTING TRENDS AND TECHNOLOGY
Cloud Security Issues
26
https://www.eitdigital.eu/fileadmin/files/docs/documents_helsinki/TheoDimitrakos-
EIT_ICT_Labs_Symposium_on_Trusted_Cloud_and_Future_Enterprises-email-no-demo.pdf
SIPA TECHNOLOGY MEETUP 2016 - HIGH PERFORMANCE COMPUTING TRENDS AND TECHNOLOGY
Cloud Security Issues
27
https://www.eitdigital.eu/fileadmin/files/docs/documents_helsinki/TheoDimitrakos-
EIT_ICT_Labs_Symposium_on_Trusted_Cloud_and_Future_Enterprises-email-no-demo.pdf
SIPA TECHNOLOGY MEETUP 2016 - HIGH PERFORMANCE COMPUTING TRENDS AND TECHNOLOGY
Cloud Security Issues
28
https://www.eitdigital.eu/fileadmin/files/docs/documents_helsinki/TheoDimitrakos-
EIT_ICT_Labs_Symposium_on_Trusted_Cloud_and_Future_Enterprises-email-no-demo.pdf
SIPA TECHNOLOGY MEETUP 2016 - HIGH PERFORMANCE COMPUTING TRENDS AND TECHNOLOGY
Q&A
Thank you
SIPA TECHNOLOGY MEETUP 2016 - HIGH PERFORMANCE COMPUTING TRENDS AND TECHNOLOGY 29

More Related Content

PDF
Microsoft 365 eEnterprise E5 Overview
PPT
Cloud Security
PDF
Cloud Security Strategy
PDF
Cloud Security: A New Perspective
PDF
Zero Trust Model Presentation
PDF
Pegasus, A spyware
PPTX
Cloud Migration Strategy Framework
PPTX
Reference Architecture for Data Loss Prevention in the Cloud
Microsoft 365 eEnterprise E5 Overview
Cloud Security
Cloud Security Strategy
Cloud Security: A New Perspective
Zero Trust Model Presentation
Pegasus, A spyware
Cloud Migration Strategy Framework
Reference Architecture for Data Loss Prevention in the Cloud

What's hot (20)

PDF
Cloud governance - theory and tools
PPTX
Cloud Access Security Brokers - CASB
PDF
API Security Best Practices and Guidelines
PPTX
FortiGate_Sec_02_Security Fabric (1).pptx
PPTX
4_Session 1- Universal ZTNA.pptx
PDF
Tom Grey - Google Cloud Platform
PPTX
Cloud computing
PDF
Application Security - Your Success Depends on it
PPTX
Ethical hacking
PPTX
Cloud Computing Security
PDF
Secure your Application with Google cloud armor
PDF
The fundamentals of Android and iOS app security
PDF
Microsoft Azure Active Directory
PDF
Cloud-Enabled: The Future of Endpoint Security
PPTX
Cloud security
DOCX
Zero-Day Vulnerability and Heuristic Analysis
PPTX
STUDY JAM ON GOOGLE CLOUD PROGRAM
PPTX
Cloud Security Architecture.pptx
PPTX
5 Highest-Impact CASB Use Cases
PDF
Spring Batch - Lessons Learned out of a real life banking system.
Cloud governance - theory and tools
Cloud Access Security Brokers - CASB
API Security Best Practices and Guidelines
FortiGate_Sec_02_Security Fabric (1).pptx
4_Session 1- Universal ZTNA.pptx
Tom Grey - Google Cloud Platform
Cloud computing
Application Security - Your Success Depends on it
Ethical hacking
Cloud Computing Security
Secure your Application with Google cloud armor
The fundamentals of Android and iOS app security
Microsoft Azure Active Directory
Cloud-Enabled: The Future of Endpoint Security
Cloud security
Zero-Day Vulnerability and Heuristic Analysis
STUDY JAM ON GOOGLE CLOUD PROGRAM
Cloud Security Architecture.pptx
5 Highest-Impact CASB Use Cases
Spring Batch - Lessons Learned out of a real life banking system.
Ad

Viewers also liked (6)

PPTX
Cloud computing and its security issues
PDF
Keep Calm and CF Push on Azure
PDF
Cloud Security
PDF
Financial Risk Management: Integrated Solutions to Help Financial Institution...
PPTX
cloud scheduling
PPTX
Cloud security and security architecture
Cloud computing and its security issues
Keep Calm and CF Push on Azure
Cloud Security
Financial Risk Management: Integrated Solutions to Help Financial Institution...
cloud scheduling
Cloud security and security architecture
Ad

Similar to Cloud security and adoption (20)

PPTX
CSA Atlanta Q1'2016 Chapter Meeting
PDF
The Types of Cyber Security - Digitdefence
PPTX
Charting the Course Through Disruption with CSA Research
DOCX
Schoology cloud assignment
PDF
Forecast 2012 Panel: Cloud Security Christofer Hoff
DOCX
Trends in Cloud Computing
PPTX
The Cloud 9 - Threat & Solutions 2016 by Bobby Dominguez
PDF
Security in the cloud planning guide
PDF
Himss 2011 securing health information in the cloud -- feisal nanji
PDF
Peering Through the Cloud Forrester EMEA 2010
PPTX
talk6securingcloudamarprusty-191030091632.pptx
PPTX
Cloud security innovation - Cloud Security Alliance East Europe Congress 2013
PDF
How Secure Is Cloud
PPTX
Windstream Cloud Security Presentation
DOCX
What is the future of cloud security linked in
PDF
THE ESSENTIAL ELEMENT OF YOUR SECURITY
PPTX
CSO CXO Series Breakfast
PPT
Cloud computing security - Insights
PPTX
Cloud Security
PPTX
Cloud Security
CSA Atlanta Q1'2016 Chapter Meeting
The Types of Cyber Security - Digitdefence
Charting the Course Through Disruption with CSA Research
Schoology cloud assignment
Forecast 2012 Panel: Cloud Security Christofer Hoff
Trends in Cloud Computing
The Cloud 9 - Threat & Solutions 2016 by Bobby Dominguez
Security in the cloud planning guide
Himss 2011 securing health information in the cloud -- feisal nanji
Peering Through the Cloud Forrester EMEA 2010
talk6securingcloudamarprusty-191030091632.pptx
Cloud security innovation - Cloud Security Alliance East Europe Congress 2013
How Secure Is Cloud
Windstream Cloud Security Presentation
What is the future of cloud security linked in
THE ESSENTIAL ELEMENT OF YOUR SECURITY
CSO CXO Series Breakfast
Cloud computing security - Insights
Cloud Security
Cloud Security

Recently uploaded (20)

PDF
MIND Revenue Release Quarter 2 2025 Press Release
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PPTX
Group 1 Presentation -Planning and Decision Making .pptx
PPTX
Spectroscopy.pptx food analysis technology
PPTX
A Presentation on Artificial Intelligence
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
Accuracy of neural networks in brain wave diagnosis of schizophrenia
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Getting Started with Data Integration: FME Form 101
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Machine learning based COVID-19 study performance prediction
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Univ-Connecticut-ChatGPT-Presentaion.pdf
PDF
Encapsulation theory and applications.pdf
PDF
Assigned Numbers - 2025 - Bluetooth® Document
PDF
Empathic Computing: Creating Shared Understanding
PPT
Teaching material agriculture food technology
PDF
A comparative study of natural language inference in Swahili using monolingua...
MIND Revenue Release Quarter 2 2025 Press Release
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Group 1 Presentation -Planning and Decision Making .pptx
Spectroscopy.pptx food analysis technology
A Presentation on Artificial Intelligence
Programs and apps: productivity, graphics, security and other tools
Accuracy of neural networks in brain wave diagnosis of schizophrenia
Digital-Transformation-Roadmap-for-Companies.pptx
Getting Started with Data Integration: FME Form 101
Spectral efficient network and resource selection model in 5G networks
Unlocking AI with Model Context Protocol (MCP)
Machine learning based COVID-19 study performance prediction
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Univ-Connecticut-ChatGPT-Presentaion.pdf
Encapsulation theory and applications.pdf
Assigned Numbers - 2025 - Bluetooth® Document
Empathic Computing: Creating Shared Understanding
Teaching material agriculture food technology
A comparative study of natural language inference in Swahili using monolingua...

Cloud security and adoption