A 2010 presentation on NASA Nebula that makes no reference to OpenStack (or pinet) dated a month after OpenStack was released to the public as open source. There is no link between Nebula and OpenStack.
This document summarizes experiences implementing workload management goals for CICS and IMS transactions as well as DB2 stored procedures. It describes converting two critical CICS systems to WLM transaction management to meet an SLA of 98% of transactions completing within 2 seconds. This improved the response time distribution. IMS regions were later converted to WLM transaction management as well, which provided more consistent response times during resource shortages. Managing DB2 stored procedures with WLM initially caused problems due to dependent and independent enclaves performing the same tasks, which was later addressed.
This presentation will give complete information regarding security issues related to cloud computing. To learn cloud computing fill up a simple form.
http://bit.ly/aDegGN
Introduction to Cloud Computing and SecurityOran Epelbaum
The goal of this talk is to introduce people with some IT knowledge to cloud computing and security.
We discuss:
- Benefits of using compute resources in the cloud
- Public cloud providers and some adoption statistics
- Drill down a bit into core AWS IaaS services
- Brief discussion of some security concerns and suggested security practices
Cloud computing that provides cheap and pay-as-you-go computing resources is rapidly gaining momentum as an alternative to traditional IT Infrastructure. As more and more consumers delegate their tasks to cloud providers, Service Level Agreements(SLA) between consumers and providers emerge as a key aspect. Due to the dynamic nature of the cloud, continuous monitoring on Quality of Service (QoS)
attributes is necessary to enforce SLAs. Also numerous other factors such as trust (on the cloud provider) come into consideration, particularly for enterprise customers that may outsource its critical data. This complex nature of the cloud landscape warrants a sophisticated means of managing SLAs. This paper proposes a mechanism for managing SLAs in a cloud computing environment using the Web Service Level Agreement(WSLA) framework, developed for SLA monitoring and SLA enforcement
in a Service Oriented Architecture (SOA). We use the third
party support feature of WSLA to delegate monitoring and enforcement tasks to other entities in order to solve the trust issues. We also present a real world use case to validate our proposal.
Evaluation Of The Data Security Methods In Cloud Computing Environmentsijfcstjournal
This document discusses methods for ensuring data security in cloud computing environments. It begins by introducing cloud computing models including infrastructure as a service (IaaS), platform as a service (PaaS), and software as a service (SaaS). The main goals of data security - confidentiality, integrity, and availability - are then described. Several methods for data security are proposed, including data fragmentation where sensitive data is divided and distributed across different domains. Encryption techniques are also discussed as ways to protect confidential data during storage and transmission. Overall, the document aims to evaluate approaches for addressing key issues around securing user data in cloud systems.
This document provides an overview of cloud computing, including its definition, characteristics, architecture, services, service layers, types, how it works, data controller responsibilities, contractual issues, data protection, and privacy concerns. Cloud computing is defined as IT services provided over a network on a leased basis that can scale up or down as needed. It involves deploying remote servers and software that allow centralized data storage and access. The document outlines the various components, services, and service layers involved in cloud computing.
Security issue in cloud by himanshu tiwaribhanu krishna
The document discusses security issues in cloud computing. It begins with an overview of cloud computing models and characteristics. It then identifies three main problems associated with cloud security - loss of control, lack of trust, and multi-tenancy issues that arise from sharing resources. Several approaches are proposed to help address these issues, including minimizing loss of control through monitoring, utilizing multiple clouds, and improved access control management. Strong isolation techniques and policy specification are suggested to help minimize multi-tenancy problems.
Cloud Computing Security Issues in Infrastructure as a Service” reportVivek Maurya
This document provides an introduction to cloud computing security issues in infrastructure as a service (IaaS). It discusses how cloud computing works and the service models of software as a service, platform as a service, and IaaS. IaaS provides processing power, data storage, and other shared resources on a pay-as-you-go basis. The document focuses on security issues related to the IaaS model, examining security for service level agreements, utility computing, platform virtualization, networks and connectivity, and computer hardware. It also discusses how security issues with cloud software can impact IaaS and cloud computing overall.
The document discusses cloud computing and security issues. It defines cloud computing as dynamically scalable shared resources accessed over a network. Examples are given of companies using cloud computing like Mogulus, Animoto, and the New York Times. Security risks of cloud computing include failures in the provider's security, attacks from other customers, availability issues, legal/regulatory problems, and the challenge of integrating security between the provider and customer. The document advocates using risk management processes to analyze security and considers when cloud computing may improve security for some organizations.
Cloud Security - Security Aspects of Cloud ComputingJim Geovedi
The document discusses security aspects of cloud computing. It outlines the essential characteristics of cloud computing including on-demand service, broad network access, resource pooling and others. It also describes different service models, deployment models and common cloud examples. The document then discusses top security concerns for cloud computing including threats from abuse and nefarious use, insecure interfaces, malicious insiders, shared technology issues and others. It provides guidance on security best practices when operating in the cloud.
This document discusses cloud computing security and outlines several key points:
1. It introduces cloud computing and discusses how it has reduced upfront costs for companies while allowing resources to scale as needed.
2. It then outlines some of the major security concerns for cloud computing, including whether cloud providers can securely manage large numbers of customers and sensitive data.
3. The document proposes several cloud computing models and architectures aimed at improving security, governance, compliance and establishing trust in cloud systems.
Cloud computing security issues and challengesDheeraj Negi
This document discusses security issues and challenges in cloud computing. It outlines the three main cloud deployment models (private, public, hybrid cloud) and three service delivery models (IaaS, PaaS, SaaS). Key challenges discussed include costing and charging models, service level agreements, interoperability issues, and security concerns such as data loss and unauthorized access. While cloud computing provides benefits, the document cautions that security risks must be carefully understood and addressed for its safe adoption.
Cloud architectures can be thought of in layers, with each layer providing services to the next. There are three main layers: virtualization of resources, services layer, and server management processes. Virtualization abstracts hardware and provides flexibility. The services layer provides OS and application services. Management processes support service delivery through image management, deployment, scheduling, reporting, etc. When providing compute and storage services, considerations include hardware selection, virtualization, failover/redundancy, and reporting. Network services require capacity planning, redundancy, and reporting.
This document discusses cloud computing characteristics, service models, deployment models, risks, and security benefits. It defines cloud computing as on-demand access to configurable computing resources over a network. Key characteristics include rapid elasticity, broad network access, resource pooling, measured service, and self-service. Common models are Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS). Risks include vendor lock-in, loss of governance, and isolation failures, but cloud security can also be improved through large-scale implementation.
Cloud Computing Security Issues in Infrastructure as a Service”Vivek Maurya
This document summarizes a technical seminar presentation on security issues in cloud computing infrastructure as a service (IaaS). The presentation covers IaaS components and security drawbacks, literature reviewing approaches to monitoring service level agreements and strengthening network isolation, and the conclusions that each IaaS component poses security risks, cloud requires balancing cost, security and privacy, and changes in trust increase challenges.
Sukumar Nayak-Detailed-Cloud Risk Management and AuditSukumar Nayak
The document provides an overview of cloud risk management and auditing. It discusses cloud fundamentals, models, and frameworks such as OpenStack, CSA Cloud Control Matrix, and DMTF Cloud Auditing Data Federation. It also covers risks, challenges, and the 10 steps to manage cloud security from CSCC. The objective is to introduce cloud risk management and audit topics.
The document proposes an OpenNASA portal using an open source/social architecture to provide a unified platform for NASA's online resources. It would transition external and internal sites/data to standardized gadgets and applications. This would improve access, efficiency and innovation through crowdsourcing development. The goals are to minimize redundancy, provide services via an enterprise catalog, and leverage new technologies like cloud computing through partnerships with other federal agencies.
SOME SECURITY CHALLENGES IN CLOUD COMPUTINGHoang Nguyen
There are several security challenges with cloud computing including issues of trust, broad attacking surfaces, and data breaches. Ensuring data integrity and privacy is difficult when data is outsourced to cloud storage. Techniques like encryption, secure auditing, and proofs of data redundancy can help address some of these challenges, but protecting access patterns and enabling secure computation outsourcing remain open problems.
This document discusses security challenges and solutions related to cloud computing. It begins by outlining common business and IT challenges, then defines cloud computing and reviews security concerns such as data privacy, reliability, and loss of control. The document proposes that identity and access management, data security, and regulatory compliance are top security risks for cloud computing. It presents IBM solutions for privileged user access control, identity federation, and application isolation that aim to address these risks.
Veena Venugopal presented on cloud security and proposed an efficient and secure protocol for data storage in cloud computing. The protocol has three phases - setup, verification, and dynamic operations and verification. In the setup phase, the user encrypts and generates metadata for the file. A third party auditor verifies the integrity of the stored data by generating challenges and checking proofs from the cloud server. The protocol also supports dynamic operations like modification, insertion, and deletion of blocks while maintaining security. It provides confidentiality, public verifiability, and supports efficient dynamic operations on outsourced data in the cloud.
Presentation on cloud computing security issues using HADOOP and HDFS ARCHITE...Pushpa
we discuss security issues for cloud computing and present a layered framework for secure clouds and then focus on two of the layers, i.e., the storage layer and the data layer. In particular, we discuss a scheme for secure third party publications of documents in a cloud. Next, we will converse secure federated query processing with map Reduce and Hadoop, and discuss the use of secure co-processors for cloud computing. Finally, we discuss XACML implementation for Hadoop and discuss their beliefs that building trusted applications from untrusted components will be a major aspect of secure
cloud computing.
I want to thank everyone who attended this presentation at AFCOM Data Center World Fall 2011 in Orlando, FL.
Studies show the number of data centers deploying virtual cloud computing will rapidly increase in the next five years. Other studies show that the number of Internet attacks and their level of sophistication will also grow significantly. This session identifies approaches to reduce the risk of business disruptions resulting from inadequate virtual security controls in a data center. It will cover utilizing best practices for security configurations, measuring information security status, and making rational decisions about security investments.
Connect with me if you have any questions or need additional information.
Please favorite this if you like it. I look forward to seeing you again soon.
Regards,
Hector Del Castillo
http://linkd.in/hdelcastillo
Cloud Computing Security Organization Assessments Service Categories Responsi...SlideTeam
This complete deck covers various topics and highlights important concepts. It has PPT slides which cater to your business needs. This complete deck presentation emphasizes Cloud Computing Security Organisation Assessments Service Categories Responsibility and has templates with professional background images and relevant content. This deck consists of total of twelve slides. Our designers have created customizable templates, keeping your convenience in mind. You can edit the colour, text and font size with ease. Not just this, you can also add or delete the content if needed. Get access to this fully editable complete presentation by clicking the download button below. https://bit.ly/3cmXz7E
This document discusses security issues related to cloud computing. It defines cloud computing and outlines the essential characteristics, service models, and deployment models. It also addresses key security concerns including governance, legal issues, compliance, information lifecycle management, and risks associated with loss of control over data and applications in the cloud. The document emphasizes that security responsibilities are shared between cloud providers and users, and both parties need to understand their roles.
This document discusses current security issues for cloud computing. It begins by defining cloud computing and describing its key characteristics and delivery models. It then outlines the main security problems which stem from loss of control, lack of trust, and multi-tenancy in cloud environments. Specifically, it examines issues relating to network security, data security, virtualization, interfaces, and governance in cloud computing. It concludes that while cloud computing provides scalable resources, it also introduces both traditional and new security threats for users.
This document discusses authentication issues in cloud computing. It outlines that authentication is the top security concern for businesses migrating to the cloud. The document examines different cloud deployment models and their issues, particularly the lack of control and transparency with public clouds. It also analyzes the challenges of managing users and synchronizing authentication data between internal and external cloud systems. Specific issues covered include privacy risks from cloud providers accessing customer information, and security risks from storing the same passwords across multiple cloud services.
The introduction of cloud computing and cloud sourcing requires an appropriate cloud governance strcuture to ensure a secured computing environment and to comply with all relevant organizational information technology policies. As such, organizations need a set of cloud governance capabilities that are essential when effectively implementing and managing cloud services.
This document discusses security architecture in cloud computing. It provides an overview of cloud risk assessments and how they differ from traditional assessments. It also compares cloud security architectures to traditional security architectures. Finally, it outlines the key domains covered by the Cloud Security Alliance, including governance, operations, and others.
The document discusses a draft cloud computing initiative vision and strategy for the federal government. It aims to establish secure, easy-to-use IT services through cloud computing. The goals are to drive adoption of cost-effective cloud solutions and provide services like infrastructure, platform, and software as a service. Various considerations around delivery models, security, and governance are also outlined.
The document discusses cloud computing and security issues. It defines cloud computing as dynamically scalable shared resources accessed over a network. Examples are given of companies using cloud computing like Mogulus, Animoto, and the New York Times. Security risks of cloud computing include failures in the provider's security, attacks from other customers, availability issues, legal/regulatory problems, and the challenge of integrating security between the provider and customer. The document advocates using risk management processes to analyze security and considers when cloud computing may improve security for some organizations.
Cloud Security - Security Aspects of Cloud ComputingJim Geovedi
The document discusses security aspects of cloud computing. It outlines the essential characteristics of cloud computing including on-demand service, broad network access, resource pooling and others. It also describes different service models, deployment models and common cloud examples. The document then discusses top security concerns for cloud computing including threats from abuse and nefarious use, insecure interfaces, malicious insiders, shared technology issues and others. It provides guidance on security best practices when operating in the cloud.
This document discusses cloud computing security and outlines several key points:
1. It introduces cloud computing and discusses how it has reduced upfront costs for companies while allowing resources to scale as needed.
2. It then outlines some of the major security concerns for cloud computing, including whether cloud providers can securely manage large numbers of customers and sensitive data.
3. The document proposes several cloud computing models and architectures aimed at improving security, governance, compliance and establishing trust in cloud systems.
Cloud computing security issues and challengesDheeraj Negi
This document discusses security issues and challenges in cloud computing. It outlines the three main cloud deployment models (private, public, hybrid cloud) and three service delivery models (IaaS, PaaS, SaaS). Key challenges discussed include costing and charging models, service level agreements, interoperability issues, and security concerns such as data loss and unauthorized access. While cloud computing provides benefits, the document cautions that security risks must be carefully understood and addressed for its safe adoption.
Cloud architectures can be thought of in layers, with each layer providing services to the next. There are three main layers: virtualization of resources, services layer, and server management processes. Virtualization abstracts hardware and provides flexibility. The services layer provides OS and application services. Management processes support service delivery through image management, deployment, scheduling, reporting, etc. When providing compute and storage services, considerations include hardware selection, virtualization, failover/redundancy, and reporting. Network services require capacity planning, redundancy, and reporting.
This document discusses cloud computing characteristics, service models, deployment models, risks, and security benefits. It defines cloud computing as on-demand access to configurable computing resources over a network. Key characteristics include rapid elasticity, broad network access, resource pooling, measured service, and self-service. Common models are Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS). Risks include vendor lock-in, loss of governance, and isolation failures, but cloud security can also be improved through large-scale implementation.
Cloud Computing Security Issues in Infrastructure as a Service”Vivek Maurya
This document summarizes a technical seminar presentation on security issues in cloud computing infrastructure as a service (IaaS). The presentation covers IaaS components and security drawbacks, literature reviewing approaches to monitoring service level agreements and strengthening network isolation, and the conclusions that each IaaS component poses security risks, cloud requires balancing cost, security and privacy, and changes in trust increase challenges.
Sukumar Nayak-Detailed-Cloud Risk Management and AuditSukumar Nayak
The document provides an overview of cloud risk management and auditing. It discusses cloud fundamentals, models, and frameworks such as OpenStack, CSA Cloud Control Matrix, and DMTF Cloud Auditing Data Federation. It also covers risks, challenges, and the 10 steps to manage cloud security from CSCC. The objective is to introduce cloud risk management and audit topics.
The document proposes an OpenNASA portal using an open source/social architecture to provide a unified platform for NASA's online resources. It would transition external and internal sites/data to standardized gadgets and applications. This would improve access, efficiency and innovation through crowdsourcing development. The goals are to minimize redundancy, provide services via an enterprise catalog, and leverage new technologies like cloud computing through partnerships with other federal agencies.
SOME SECURITY CHALLENGES IN CLOUD COMPUTINGHoang Nguyen
There are several security challenges with cloud computing including issues of trust, broad attacking surfaces, and data breaches. Ensuring data integrity and privacy is difficult when data is outsourced to cloud storage. Techniques like encryption, secure auditing, and proofs of data redundancy can help address some of these challenges, but protecting access patterns and enabling secure computation outsourcing remain open problems.
This document discusses security challenges and solutions related to cloud computing. It begins by outlining common business and IT challenges, then defines cloud computing and reviews security concerns such as data privacy, reliability, and loss of control. The document proposes that identity and access management, data security, and regulatory compliance are top security risks for cloud computing. It presents IBM solutions for privileged user access control, identity federation, and application isolation that aim to address these risks.
Veena Venugopal presented on cloud security and proposed an efficient and secure protocol for data storage in cloud computing. The protocol has three phases - setup, verification, and dynamic operations and verification. In the setup phase, the user encrypts and generates metadata for the file. A third party auditor verifies the integrity of the stored data by generating challenges and checking proofs from the cloud server. The protocol also supports dynamic operations like modification, insertion, and deletion of blocks while maintaining security. It provides confidentiality, public verifiability, and supports efficient dynamic operations on outsourced data in the cloud.
Presentation on cloud computing security issues using HADOOP and HDFS ARCHITE...Pushpa
we discuss security issues for cloud computing and present a layered framework for secure clouds and then focus on two of the layers, i.e., the storage layer and the data layer. In particular, we discuss a scheme for secure third party publications of documents in a cloud. Next, we will converse secure federated query processing with map Reduce and Hadoop, and discuss the use of secure co-processors for cloud computing. Finally, we discuss XACML implementation for Hadoop and discuss their beliefs that building trusted applications from untrusted components will be a major aspect of secure
cloud computing.
I want to thank everyone who attended this presentation at AFCOM Data Center World Fall 2011 in Orlando, FL.
Studies show the number of data centers deploying virtual cloud computing will rapidly increase in the next five years. Other studies show that the number of Internet attacks and their level of sophistication will also grow significantly. This session identifies approaches to reduce the risk of business disruptions resulting from inadequate virtual security controls in a data center. It will cover utilizing best practices for security configurations, measuring information security status, and making rational decisions about security investments.
Connect with me if you have any questions or need additional information.
Please favorite this if you like it. I look forward to seeing you again soon.
Regards,
Hector Del Castillo
http://linkd.in/hdelcastillo
Cloud Computing Security Organization Assessments Service Categories Responsi...SlideTeam
This complete deck covers various topics and highlights important concepts. It has PPT slides which cater to your business needs. This complete deck presentation emphasizes Cloud Computing Security Organisation Assessments Service Categories Responsibility and has templates with professional background images and relevant content. This deck consists of total of twelve slides. Our designers have created customizable templates, keeping your convenience in mind. You can edit the colour, text and font size with ease. Not just this, you can also add or delete the content if needed. Get access to this fully editable complete presentation by clicking the download button below. https://bit.ly/3cmXz7E
This document discusses security issues related to cloud computing. It defines cloud computing and outlines the essential characteristics, service models, and deployment models. It also addresses key security concerns including governance, legal issues, compliance, information lifecycle management, and risks associated with loss of control over data and applications in the cloud. The document emphasizes that security responsibilities are shared between cloud providers and users, and both parties need to understand their roles.
This document discusses current security issues for cloud computing. It begins by defining cloud computing and describing its key characteristics and delivery models. It then outlines the main security problems which stem from loss of control, lack of trust, and multi-tenancy in cloud environments. Specifically, it examines issues relating to network security, data security, virtualization, interfaces, and governance in cloud computing. It concludes that while cloud computing provides scalable resources, it also introduces both traditional and new security threats for users.
This document discusses authentication issues in cloud computing. It outlines that authentication is the top security concern for businesses migrating to the cloud. The document examines different cloud deployment models and their issues, particularly the lack of control and transparency with public clouds. It also analyzes the challenges of managing users and synchronizing authentication data between internal and external cloud systems. Specific issues covered include privacy risks from cloud providers accessing customer information, and security risks from storing the same passwords across multiple cloud services.
The introduction of cloud computing and cloud sourcing requires an appropriate cloud governance strcuture to ensure a secured computing environment and to comply with all relevant organizational information technology policies. As such, organizations need a set of cloud governance capabilities that are essential when effectively implementing and managing cloud services.
This document discusses security architecture in cloud computing. It provides an overview of cloud risk assessments and how they differ from traditional assessments. It also compares cloud security architectures to traditional security architectures. Finally, it outlines the key domains covered by the Cloud Security Alliance, including governance, operations, and others.
The document discusses a draft cloud computing initiative vision and strategy for the federal government. It aims to establish secure, easy-to-use IT services through cloud computing. The goals are to drive adoption of cost-effective cloud solutions and provide services like infrastructure, platform, and software as a service. Various considerations around delivery models, security, and governance are also outlined.
This document provides an overview of cloud computing concepts including definitions, characteristics, business value, management, security, deployment models, and legal issues. It defines cloud computing as a model for enabling network access to configurable computing resources that can be rapidly provisioned with minimal management effort. The key characteristics of cloud computing are on-demand self-service, broad network access, resource pooling, rapid elasticity, and measured service. The document discusses the cost and agility benefits of cloud computing for businesses. It also covers topics such as cloud service models, network architecture, adoption strategy, the role of a cloud officer, and legal issues regarding data location.
The document discusses security issues related to cloud computing. It provides an introduction to cloud computing, discussing its evolution and key concepts. The majority of the document focuses on security challenges in cloud computing, addressing issues such as administrative access to servers and applications, virtual machine vulnerabilities, encryption and data protection, and identity management. It also discusses security advantages and disadvantages of cloud environments.
This document discusses cloud security and provides an overview of McAfee's cloud security solutions. It summarizes McAfee's cloud security program, strengths, weaknesses, opportunities, threats, and competitors in the cloud security market. It also discusses Netflix's migration to the cloud for its infrastructure and content delivery and outlines Netflix's cloud security strategy.
This document discusses the history and definitions of cloud computing. It begins with various definitions of cloud computing from Wikipedia between 2007-2009 which evolved to emphasize dynamically scalable virtual resources provided over the internet. It then covers common characteristics of cloud computing like multi-tenancy, location independence, pay-per-use pricing and rapid scalability. The rest of the document details cloud computing models including public, private and hybrid clouds. It also outlines the different architectural layers of cloud computing from Software as a Service to Infrastructure as a Service. The document concludes with a discussion of security issues in cloud computing and a case study of security features in Amazon Web Services.
This document compares different approaches for performing zero downtime upgrades of applications hosted on Microsoft Azure: Web Deploy, VIP-swap, load balanced endpoints, and Traffic Manager. Web Deploy allows automatic updates of web roles with minor changes but requires an RDP connection. VIP-swap uses DNS swapping to test upgrades on a staging environment with fast redirection. Load balanced endpoints provides easy scaling but requires manual upgrades and running multiple versions simultaneously. Traffic Manager also uses DNS for isolated testing and fast redirection between environments, but incurs additional costs.
Subscribed 2015: Architecture, Security, ScalabilityZuora, Inc.
In an era of stolen credit card information, polymorphic malware and website downtime, security and scalability are of the utmost importance. Come join Zuora's Technical Operations & Security team to hear about the measures we've taken to ensure your business can scale with us and your customer data is protected.
This document discusses how technology and digital transformation are driving a focus on customer experience in banking. It notes that as computing power increases, experience will matter more. Smartphones were an inflection point that lifted barriers and made experience a key differentiator. The document advocates transforming customer experience by focusing on reliability, knowing customers, small details, future-ready platforms, data analytics, design thinking, partnering with fintechs, and developing a learning culture.
Pervasive digital technology is fundamentally changing the retail banking business model. Here's how banking Chief Information Officers (CIOs) need to change in order to lead the digital charge, according to our recent study.
Security architecture and cloud computing are not mutually exclusive according to Vladimir Jirasek, Director of Research at CSA UK. There is a direct map between cloud models (IaaS, PaaS, SaaS) and areas of security models (identity and access management, encryption, firewalls etc.). Responsibilities for security areas depend on the cloud model, with providers taking more responsibility in IaaS and customers taking more in SaaS. The document provides guidance on developing cloud security standards and managing security risks when using cloud computing.
New processing technology for agri fiber stalksDavid James
The We need to go beyond mere bio composites. If we can take the lignin, bio-polymer, and most importantly GIVE IT ITS OWN AESTHETIC SIGNATURE, only then can we truly compete with the Hard Woods being mowed down.
The Cloud has become an everyday resource that helps enable our daily routines. Consider how things such
as electricity, water, natural gas, telephone service, and television are provided by companies that specialize
in delivering those services, and you can begin to wrap your mind around the parallels with cloud computing.
Overview - ESBs and IBM Integration BusJuarez Junior
This document provides an overview of enterprise service buses (ESBs) and IBM Integration Bus (IIB). It defines what an ESB is and its main purposes, such as acting as a message broker and performing transformations between services. It also describes IIB specifically, noting it is IBM's product for integration and that it includes components like the integration server, bus web interface, and toolkit. Finally, it mentions there will be a demonstration of the integration console, toolkit, web interface, basic commands, and debugging using the toolkit.
Cloud is not an option, but is security?Jody Keyser
The document discusses cloud computing trends and security concerns. It begins with common definitions of cloud computing and examines growth projections for the cloud market. It then explores various cloud computing models and deployment options. The document also analyzes cloud security risks and recommendations for securing data and applications in the cloud.
Security & Governance for the Cloud: a Savvis Case Study (Presented at Cloud ...CA API Management
Presentation from Cloud Expo on Securing and Governing Cloud Service featuring Layer7's Scott Morrison and Savvis' Bill Forsyth
Learn More Fro Layer 7: http://www.layer7tech.com/solutions/cloud-single-sign-on
www.facebook.layer7
42 Voices About Open Government - English versionMegan Eskey
The English-language translation of the Open Government project by XIP (Public Innovation Network) in Barcelona, Spain. The articles written by 42 experts are an important source of knowledge for the worldwide Open Government community, and are already the context for debate in administrations and governments in Spanish- and Catalan-speaking communities. Many of the experts are from Spain and remember Franco, so there is a clear anti-fascist subtext, in addition to the primary pro-democracy, pro-OpenGov message. The translation was funded via an Indiegogo crowdfunding campaign that was synched with ISS Expedition 42. 42 is a reference to the Hitchhiker's Guide to the Galaxy, and is the answer to life, the universe, and everything.. https://www.indiegogo.com/projects/42-voices-about-open-government--43#/story
This document summarizes 10 key security concerns for cloud computing: 1) data location; 2) access controls; 3) regulatory requirements; 4) audit rights; 5) employee training; 6) data classification; 7) service level agreements; 8) long-term viability; 9) security breach response; and 10) disaster recovery plans. It also briefly outlines cloud computing models and benefits, as well as potential security attacks against cloud systems like denial of service attacks and authentication attacks.
UNLEASH NO FEAR: HOLD PUBLIC OFFICIALS ACCOUNTABLE FOR BREAKING CIVIL RIGHTS...Tanya Ward Jordan
The Coalition For Change, Inc. (C4C) advocates for protecting federal employees from workplace abuse and discrimination. The No FEAR Act of 2002 was passed to increase accountability for discrimination and retaliation, but federal officials continue violating civil rights laws without consequences. Several cases are described where officials found guilty of discrimination and misconduct faced no discipline, undermining the goal of the No FEAR Act to protect employees and ensure accountability. C4C calls on the President to close loopholes and mandate discipline for officials who violate civil rights.
This document discusses cloud bursting, which is an extreme amount of precipitation over a short period of time capable of causing flash flooding. It defines cloud bursting as rainfall of over 100 mm per hour and explains that the rapid growth of large raindrops falling from convective clouds up to 15 km high can cause these events. The document also notes that hilly areas are more prone to cloud bursting when water flows down steep slopes quickly. While cloud bursts are difficult to predict precisely, areas likely to experience heavy rain can be identified. The impacts of cloud bursting include floods, damage, deforestation, and loss of life. An example of a devastating cloud burst is described from Leh, Ladakh in 2010 that killed 300 people.
How Cloud Computing will change how you and your team will run ITPeter HJ van Eijk
This document discusses the future of IT and cloud computing. It describes how cloud computing is the latest in a series of disruptive innovations in IT, following mainframes, client-server systems, and the internet. The document outlines how cloud computing enables new capabilities like automated deployment, massive scale through resource pooling, and access from anywhere through broad networks. It also discusses how cloud supply chains have become more complex and how security must be managed throughout these extended ecosystems. Finally, it summarizes that cloud computing is driving the industrialization of IT and that automated testing and quality control are essential to improve productivity.
This is the extract of all the good presentation of cloud computing which we made easier for beginners who want to understand cloud computing from basic and easy and it is impressive too.
This document provides an overview of cloud computing. It defines cloud computing as storing information permanently on servers accessed over the internet while caching it temporarily on local devices. The document then discusses the history and evolution of cloud computing concepts. It outlines the main architectural layers (SaaS, PaaS, IaaS) and types of clouds (public, private, hybrid). Reasons for migrating to the cloud include the pay-per-use model and reduced costs, runtimes, and response times. The effectiveness and issues/concerns of cloud computing are also summarized before concluding that cloud computing is a viable solution for businesses.
The document discusses the financial impacts of cloud computing. It defines various cloud service models like SaaS, PaaS, IaaS and provides examples. Moving workloads to the cloud can significantly reduce IT costs by eliminating upfront hardware/software costs and allowing companies to pay based on usage and scale resources up or down as needed. This flexible "opex model" of the cloud can save companies 30-40% of annual IT costs on average compared to maintaining infrastructure on-premises. The cloud also enables faster innovation by making it easier to deploy applications and experiments without large capital investments.
Are you facing some, or all, of these challenges?
-Host Mobility (w/o stretching VLANs)
-Network Segmentation (w/o implementing MPLS)
-Roles-based Access Control (w/o end-to-end TrustSec)
-Common Policy for Wired and Wireless (w/o multiple tools)
Using Cisco technologies already available today, you can overcome these challenges and build an evolved Campus network to better meet your business objectives.
Moving to cloud computing step by step linthicumDavid Linthicum
The document discusses cloud computing and its relationship to service-oriented architecture (SOA). It defines the three layers of cloud computing: infrastructure as a service (IaaS), platform as a service (PaaS), and software as a service (SaaS). It also discusses considerations for moving applications and services to public, private or hybrid clouds.
This is my presentation on CLOUD COMPUTING IN NASA prepared by me for the NATIONAL SYMPOSIUM ON EMERGING TRENDS IN CLOUD COMPUTING held in my college named R.B.C.E.T bareilly...........
This document provides an overview of AWS networking services including Virtual Private Cloud, Amazon Route 53, AWS Direct Connect, VPN, and Elastic Load Balancing. It describes each service's purpose such as Virtual Private Cloud allowing users to launch AWS resources in a virtual private network and Amazon Route 53 providing scalable and available cloud DNS. The document also defines networking terminology like scalability, fault tolerance, elasticity, durability, and availability.
Cloud computing is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources that can be rapidly provisioned and released with minimal management effort or service provider interaction. Key characteristics of cloud computing include on-demand self-service, broad network access, resource pooling, rapid elasticity, and measured service. Common uses of cloud computing involve hosting applications and services through major cloud platforms like Amazon Web Services, Microsoft Azure, and Google Cloud.
Hope, fear, and the data center time machineCisco Canada
The document discusses Cisco's vision for application-centric infrastructure (ACI) which provides policy-driven automation across networks, compute, storage and security to enable agility. ACI uses concepts like endpoint groups, policies and profiles to simplify management and deliver applications securely on premises or across hybrid clouds. The document also highlights Cisco technologies that integrate with ACI like Tetration for network analytics, Cisco CloudCenter for hybrid cloud orchestration, and Cisco UCS for converged infrastructure.
Oracle's cloud computing strategy is to support both public and private clouds to give customers choice. Oracle offers the technology to build private clouds or run workloads in public clouds. It also offers applications deployed in private shared services environments or via public SaaS. The strategy is based on Oracle's existing virtualization, grid computing, shared services, and management technologies and provides customers the most complete, open, and integrated cloud vision and offerings.
This document outlines Oracle's cloud computing strategy and products. It discusses:
1) The definitions and models of cloud computing including SaaS, PaaS, IaaS, public vs private clouds.
2) Oracle's cloud offerings including public cloud services, private cloud platform, and support for running Oracle software on Amazon EC2.
3) Key technologies like Exadata, Exalogic, server virtualization, and lifecycle management tools to enable elastic and efficient cloud deployments.
Manage Microservices & Fast Data Systems on One Platform w/ DC/OSMesosphere Inc.
This document provides an overview of Mesosphere DC/OS and its benefits. It begins with an introduction to the challenges of building data-intensive applications at scale. It then outlines how Mesosphere DC/OS provides a unified platform for containers and data services across infrastructure with automation and architectural control. Key benefits highlighted include speed, cost savings, and ensuring necessary skills. The document concludes with examples of how Mesosphere is powering industry leaders and a demo.
This is a 2 hour strategy workshop developed by Predrag Mitrovic (http://mynethouse.se and http://cloudadvisor.se).
The workshop is intended for CIOs and roles close to business strategy formulation around technology. Feel free to use the material and develop it further, as long as you give me access to the updated materials.
Any questions can be directed to my e-mail: predrag[at]mynethouse.se
I hope that you enjoy this material and find it useful.
/Predrag a.k.a Cloud Advisor
The document provides background information on the instructor for a cloud computing course. It introduces Tudor Marius Cosmin as the instructor and outlines his professional experience in cloud delivery and IT management. It also reviews the course timetable and provides an overview of topics to be covered in the first session, including a history of cloud computing, fundamental concepts and terminology, cloud characteristics and delivery models, and benefits and challenges of cloud computing.
1. Networking is undergoing a third major transition driven by cloud computing, mobile devices, and software-defined networking.
2. Applications are becoming distributed across private and public clouds, making the application the new network as IT departments lose control over hardware.
3. The rise of containers is pushing networking down to the application level, requiring new approaches for provisioning, troubleshooting, and security at this more granular level.
The First Roads in Space at the 2024 International Space Development ConferenceMegan Eskey
Reloquence is charting maps of the Moon and Mars that include a network of rover traverses based on a planetary address framework called the Eskey System. To date, Reloquence has named and located 24 roads on the Moon and 8 roads on Mars. We hope to accelerate the advent of space mining and sustained human presence on the Moon and Mars by at least a decade. Longer term, we see the maps as forming the foundation for a space logistics platform, codenamed "Uber Space."
Infrastructure is the backbone of civilization. A multi-planetary civilization needs interplanetary infrastructure to support its expansion, facilitate trade, and keep its citizens and their societies connected. The Interplanetary Infrastructure session at the ISDC considers whether investments in infrastructure, especially two-way transportation infrastructure, can address some of the most pressing problems associated with humanity’s initial efforts to expand into the solar system.
Historically, infrastructure has facilitated human expansion. It increased accessibility and reduced the personal sacrifices that adventurous settlers and their families had to make. Infrastructure projects tend to be somewhat conservative in nature. They generally use technologies and materials that have been applied in other industries and that are already well-understood and well-characterized by engineers. Successful infrastructure projects are economically viable because their long-term benefit to society exceeds their upfront cost, even when the upfront cost is significant. The speakers presenting concepts in this session adhere to these fundamental principles and can demonstrate that their proposals do indeed pencil out.
Reloquence_2024_version - Launch Pad Lightning TalkMegan Eskey
Reloquence is charting maps of the Moon and Mars that include a network of rover traverses based on a planetary address framework called the Eskey System. To date, Reloquence has named and located 24 roads on the Moon and 8 roads on Mars. We hope to accelerate the advent of space mining and sustained human presence on the Moon and Mars by at least a decade. Longer term, we see the maps as forming the foundation for a space logistics platform, codenamed "Uber Space."
Join us at the ISDC LaunchPad Lightning Talks. Not all space-related topics demand a full hour to explain, and some emerging ideas at the ISDC are simply so new and unique that they have not yet been fully explored and developed. The Launch Pad Talks are home to some of the newest and most exciting ideas in space exploration, development, and settlement, by some of the newest voices in the field.
Drop in for one or stay for a dozen—the Launch Pad Talks contain some of the most exciting new ideas you will hear this year!
42 Voices About Open Government - Spanish versionMegan Eskey
I am part of an international project called "42 Voices About Open Government". The Catalan version was presented at the Mobile World Centre in Barcelona on April 10, 2014, with the participation of the Catalan writer Màrius Serra, who conducted the event. The English version will be coming (before summer). The Catalan and Spanish versions are available for download.
"The Hitchhiker's Guide to the Galaxy": In the radio series and the first novel, a group of hyper-intelligent pan-dimensional beings demand to learn the Answer to the Ultimate Question of Life, The Universe, and Everything from the supercomputer, Deep Thought, specially built for this purpose. It takes Deep Thought 7.5 million years to compute and check the answer, which turns out to be 42. Deep Thought points out that the answer seems meaningless because the beings who instructed it never actually knew what the Question was.
NASA is focused on open government through open data, open innovation, open leadership, and citizen engagement. It aims to embed these principles in its governance structure and create a culture of continuous learning and experimentation. In August, NASA will host Maker Camps across the agency to promote open innovation and inclusion. The camps will teach skills like programming, electronics, and 3D printing.
OpenGov v2.0: How do we get from here to there?Megan Eskey
The document discusses moving government towards more open and collaborative "OpenGov 2.0" practices, including developing social media strategies, collaborative platforms, and engaging citizens. It outlines challenges in overcoming cultural barriers to participation and measuring success, and provides examples of recent White House initiatives in open government like releasing data and using idea-sharing platforms.
The document discusses the Open Government Directive issued by the White House in December 2009 that establishes principles of transparency, participation, and collaboration for open government. It then provides information about the OpenNASA v2.0 portal, an open source web portal for the federal community cloud, and links for the Open Government Directive and OpenNASA/OpenGov.
OpenNASA v2.0 is a new version of an internal NASA collaboration platform that allows users to sign in, access profiles and social features like friends and groups, view calendars and wikis, add applications, see images, and manage pages with multilingual support. It also includes Twitter integration and a workspace area.
This document discusses cloud computing and provides examples of different cloud models. It defines cloud computing as data and applications existing on remote servers accessed over the internet. It outlines various cloud service models like software as a service. The document also cautions that while cloud computing offers benefits, it can also exacerbate organizational issues and conflict with outdated policies if not implemented carefully. It concludes by presenting different models for how organizations can leverage and own cloud resources.
The document discusses Yahoo!'s open strategy and technologies. It highlights Yahoo!'s use of open source technologies like FreeBSD, Linux, Apache, PHP, and MySQL. It also discusses Yahoo!'s embrace of open standards, contributions to open source projects like YUI, and hiring of open source developers. Finally, it provides overviews of several Yahoo! open technologies including the Yahoo! Developer Network, OAuth, OpenID, YQL, and Yahoo! social APIs.
Sunita Williams took photos of the Earth at night from the International Space Station. The photos show night falling across different regions of the world, with city lights appearing as countries enter the nighttime hours. Key areas pictured include North Africa, the Iberian Peninsula, the Alps, Iceland, the Black Sea, Red Sea, Europe, Africa, Brazil, and the eastern United States. The document urges sharing the photos widely so future generations can appreciate the spectacular views of Earth at night from space.
2025 - JSchaus & Associates in Washington DC present a complimentary webinar series covering The DFARS, Defense Federal Acquisition Regulation Supplement. Learn about US Federal Government Contracting with The Department of Defense, DoD. Defense Contracting. Defense Acquisition. Federal Contracting.
Link To Video:
https://youtu.be/OWi5ao-Li44
Subscribe to Our YouTube Channel for complimentary access to US Federal Government Contracting videos:
https://www.youtube.com/@jenniferschaus/videos
The Polish presentation, created for the educational purposes of the Erasmus+ project "Rhapsody in Green", an international educational project connecting young people from Czechia, Romania, Lithuania, Poland, Serbia and Hungary with aim to educate them in the fields of financial literacy, sustainability and entrepreneurship. The project was funded by the Erasmus+ Programme of the European Union.
Find more information about the Erasmus+ Youth Exchanges:
https://erasmus-plus.ec.europa.eu/opportunities/opportunities-for-individuals/youth-exchanges
The Czech presentation, created for the educational purposes of the Erasmus+ project "Rhapsody in Green", an international educational project connecting young people from Czechia, Romania, Lithuania, Poland, Serbia and Hungary with aim to educate them in the fields of financial literacy, sustainability and entrepreneurship. The project was funded by the Erasmus+ Programme of the European Union.
Find more information about the Erasmus+ Youth Exchanges:
https://erasmus-plus.ec.europa.eu/opportunities/opportunities-for-individuals/youth-exchanges
2025 - JSchaus & Associates in Washington DC present a complimentary webinar series covering The DFARS, Defense Federal Acquisition Regulation Supplement. Learn about US Federal Government Contracting with The Department of Defense, DoD. Defense Contracting. Defense Acquisition. Federal Contracting.
Link To Video:
https://youtu.be/pMJnm3pb_Xo
Subscribe to Our YouTube Channel for complimentary access to US Federal Government Contracting videos:
https://www.youtube.com/@jenniferschaus/videos
eefd-expert-commentary---production-outlook-2025-ma-final (1).pdfEnergy for One World
GECF Publication
On Africa, June 2025
Amid global energy evolutions, natural gas has emerged as a cornerstone in
addressing rising energy demands, underpinned by population expansion, economic
growth, and the urgent development priorities of emerging economies striving to
achieve the Sustainable Development Goals (SDGs). Its dual advantages as a
dependable energy source and a comparatively lower-carbon alternative to traditional
fuels underscore its pivotal role in reconciling energy security with climate imperatives.
Yet, fulfilling this demand hinges on the stability and diversification of global supply—
a challenge shaped by intricate dynamics, including uneven reserve distribution,
infrastructure investments, competing regional energy policies, and disparities in
technological innovation.
2025 - JSchaus & Associates in Washington DC present a complimentary webinar series covering The DFARS, Defense Federal Acquisition Regulation Supplement. Learn about US Federal Government Contracting with The Department of Defense, DoD. Defense Contracting. Defense Acquisition. Federal Contracting.
Link To Video:
https://youtu.be/tcvQqFqjKNA
Subscribe to Our YouTube Channel for complimentary access to US Federal Government Contracting videos:
https://www.youtube.com/@jenniferschaus/videos
Cloud Computing: Architecture, IT Security and Operational Perspectives
1. Cloud Computing
Architecture, IT Security, & Operational Perspectives
Steven R. Hunt
ARC IT Governance Manager
Ames Research Center
Matt Linton
IT Security Specialist
Ames Research Center
Matt Chew Spence
IT Security Compliance Consultant
Dell Services Federal Government
Ames Research Center
August 17, 2010
2. Agenda
Introductions
» Steve Hunt
What is cloud computing?
» Matt Chew Spence
How can NASA benefit from cloud computing?
» Matt Chew Spence
How is NASA implementing cloud computing?
» Matt Linton
How does NASA secure cloud computing?
» Matt Linton
Q&A
» Presentation Team
Extended Presentation
FISMA & Clouds
» Matt Chew Spence
» Steve Hunt
Assessment, Authorization, & FedRAMP
» Steve Hunt
3. OBJECTIVE: Overview of cloud
computing and share vocabulary
OBJECTIVE: Overview of cloud
computing and share vocabulary
Agenda
Introductions
» Steve Hunt
What is cloud computing?
» Matt Chew Spence
How can NASA benefit from cloud computing?
» Matt Chew Spence
How is NASA implementing cloud computing?
» Matt Linton
How does NASA secure cloud computing?
» Matt Linton
Q&A
» Presentation Team
Extended Presentation
FISMA & Clouds
» Matt Chew Spence
» Steve Hunt
Assessment, Authorization, & FedRAMP
» Steve Hunt
4. Cloud Computing – NIST
Definition:
“A model for enabling convenient, on-
demand network access to a shared
pool of configurable computing
resources (e.g., networks, servers,
storage, applications, and services) that
can be rapidly provisioned and released
with minimal management effort or
service provider interaction”
What is Cloud Computing?
5. Conventional
Manually Provisioned
Dedicated Hardware
Fixed Capacity
Pay for Capacity
Capital & Operational
Expenses
Managed via Sysadmins
Cloud
Self-provisioned
Shared Hardware
Elastic Capacity
Pay for Use
Operational Expenses
Managed via APIs
Conventional Computing
vs.
Cloud Computing
What is Cloud Computing?
6. Five Key Cloud Attributes:
1. Shared / pooled resources
2. Broad network access
3. On-demand self-service
4. Scalable and elastic
5. Metered by use
What is Cloud Computing?
7. Shared / Pooled Resources:
Resources are drawn from a common pool
Common resources build economies of scale
Common infrastructure runs at high efficiency
What is Cloud Computing?
8. Broad Network Access:
Open standards and APIs
Almost always IP, HTTP, and REST
Available from anywhere with an internet
connection
What is Cloud Computing?
9. On-Demand Self-Service:
Completely automated
Users abstracted from the implementation
Near real-time delivery (seconds or minutes)
Services accessed through a self-serve
web interface
What is Cloud Computing?
10. Scalable and Elastic:
Resources dynamically-allocated between
users
Additional resources dynamically-released
when needed
Fully automated
What is Cloud Computing?
11. Metered by Use:
Services are metered, like a utility
Users pay only for services used
Services can be cancelled at any time
What is Cloud Computing?
12. Three Service Delivery
Models
IaaS: Infrastructure as a Service
Consumer can provision computing resources within
provider's infrastructure upon which they can deploy and
run arbitrary software, including OS and applications
PaaS: Platform as Service
Consumer can create custom applications using
programming tools supported by the provider and deploy
them onto the provider's cloud infrastructure
SaaS: Software as Service
Consumer uses provider’s applications running on
provider's cloud infrastructure
What is Cloud Computing?
13. What is Cloud Computing?
SaaS
PaaS
IaaS
Amazon Google Microsoft Salesforce
Service Delivery Model
Examples
Products and companies shown for illustrative purposes only and should not
be construed as an endorsement
14. Cost efficiencies
Time efficiencies
Power efficiencies
Improved process
control
Improved security
“Unlimited” capacity
Cloud efficiencies and
improvements
• Burst capacity (over-
provisioning)
• Short-duration projects
• Cancelled or failed missions
• Burst capacity (over-
provisioning)
• Short-duration projects
• Cancelled or failed missions
$
• Procurement
• Network connectivity
• Procurement
• Network connectivity
• Standardized, updated base images
• Centrally auditable log servers
• Centralized authentication systems
• Improved forensics (w/ drive image)
• Standardized, updated base images
• Centrally auditable log servers
• Centralized authentication systems
• Improved forensics (w/ drive image)
What is Cloud Computing?
15. OBJECTIVE: Discuss requirements,
use cases, and ROI
OBJECTIVE: Discuss requirements,
use cases, and ROI
Agenda
Introductions
» Steve Hunt
What is cloud computing?
» Matt Chew Spence
How can NASA benefit from cloud computing?
» Matt Chew Spence
How is NASA implementing cloud computing?
» Matt Linton
How does NASA secure cloud computing?
» Matt Linton
Q&A
» Presentation Team
Extended Presentation
FISMA & Clouds
» Matt Chew Spence
» Steve Hunt
Assessment, Authorization, & FedRAMP
» Steve Hunt
16. How can NASA benefit from cloud computing?
Current IT options for Scientists
Current Options*Requirements*
* Requirements and Options documented in over 30+ interviews
with Ames scientists as part 2009 NASA Workstation project.
17. Mission Objectives
Explore, Understand, and Share
Exploration Space OpsScienceAeronautics
High Compute Vast Storage
High Speed
Networking
Process
Large
Data
Sets
Scale-out for
one-time
events
Require
infrastructure
on-demand
Store
mission &
science
data
Share
information
with the
public
Run
Compute
Intensive
Workloads
Shared Resource
Mission Support
How can NASA benefit from cloud computing?
Scientists direct access to Nebula cloud computing
19. *15% utilization based on two reports from Gartner Group, Cost of
Traditional Data Centers (2009), and Data Center Efficiency (2010).
ROI and ARC Case Study
How can NASA benefit from cloud computing?
POWER: Computers typically require 70% of their total
power requirements to run at just 15% utilization.
20. Operational Enhancements:
» Strict standardization of hardware and infrastructure
software components
» Small numbers of system administrators due to the
cookie-cutter design of cloud components and
support processes
» Failure of any single component within the Nebula
cloud will not become reason for alarm
» Application operations will realize similar efficiencies
once application developers learn how to properly
deploy applications so that they are not reliant on any
particular cloud component.
ROI and ARC Case Study
How can NASA benefit from cloud computing?
21. OBJECTIVE: Overview of how NASA
is implementing cloud computing
OBJECTIVE: Overview of how NASA
is implementing cloud computingAgenda
Introductions
» Steve Hunt
What is cloud computing?
» Matt Chew Spence
How can NASA benefit from cloud computing?
» Matt Chew Spence
How is NASA implementing cloud computing?
» Matt Linton
How does NASA secure cloud computing?
» Matt Linton
Q&A
» Presentation Team
Extended Presentation
FISMA & Clouds
» Matt Chew Spence
» Steve Hunt
Assessment, Authorization, & FedRAMP
» Steve Hunt
25. Nebula Principles
Open and Public APIs, everywhere
Open-source platform, apps, and data
Full transparency
» Open source code and documentation
releases
Reference platform
» Cloud model for Federal Government
How is NASA implementing cloud computing?
26. Nebula User Experience
Nebula IaaS user will have an experience
similar to Amazon EC2:
Dedicated private VLAN for instances
Dedicated VPN for access to private VLAN
Public IPs to assign to instances
Launch VM instances
Dashboard for instance control and API access
Able to import/export bundled instances to AWS
and other clouds
How is NASA implementing cloud computing?
Products and companies named for illustrative purposes only and should not be
construed as an endorsement
28. Shared Nothing
Messaging Queue
State Discovery
Standard Protocols
Automated
• IPMI
• PXEBoot
• Puppet
How is NASA implementing cloud computing?
33. Object Node
Ubuntu OSUbuntu OS
PuppetPuppet
Nova
Object
Node
Nova
Object
Node
PXEPXE
NginxNginx
How is NASA implementing cloud computing?
34. Network Node
Ubuntu OSUbuntu OS
PuppetPuppet
Nova
Networ
k
Node
Nova
Networ
k
Node
802.1(q)802.1(q)
BrctlBrctl
PXEPXE
Project
VLAN
Project
VLAN
IPTablesIPTables
Public
Internet
Public
Internet
How is NASA implementing cloud computing?
35. Pilot Lessons Learned
- Automate Everything
No SysAdmin is perfect
99% is not good enough
NEVER make direct system changes
When in doubt - PXEBoot
How is NASA implementing cloud computing?
36. Pilot Lessons Learned
- Test Everything
KVM + Jumbo Frames
Grinder
Unit Tests / Cyclometric Complexity
TransactionID Insertion (Universal Proxy)
How is NASA implementing cloud computing?
37. Pilot Lessons Learned
- Monitor Everything
Ganglia
Munin
Syslog-NG + PHPSyslog-NG
Nagios
Custom Log Parsing (Instance-centric)
How is NASA implementing cloud computing?
38. OBJECTIVE: Overview of technical
security mechanisms built into Nebula
OBJECTIVE: Overview of technical
security mechanisms built into NebulaAgenda
Introductions
» Steve Hunt
What is cloud computing?
» Matt Chew Spence
How can NASA benefit from cloud computing?
» Matt Chew Spence
How is NASA implementing cloud computing?
» Matt Linton
How does NASA secure cloud computing?
» Matt Linton
Q&A
» Presentation Team
Extended Presentation
FISMA & Clouds
» Matt Chew Spence
» Steve Hunt
Assessment, Authorization, & FedRAMP
» Steve Hunt
39. Technical Security Overview
• Issues with Commercial Cloud Providers
• Overview of Current Security Mechanisms
• Innovations
OBJECTIVE: Overview of technical
security mechanisms built into Nebula
OBJECTIVE: Overview of technical
security mechanisms built into Nebula
40. How does NASA secure cloud computing?
Commercial Cloud Provider Security
Concerns
» IT Security not brought into decision of how & when
NASA orgs use clouds
» IT Security may not know NASA orgs are using
clouds until an incident has occurred
» Without insight into monitoring/IDS/logs, NASA
may not find out that an incident has occurred
» No assurances of sufficient cloud infrastructure
access to perform proper forensics/investigations
» These issues are less likely with a private cloud like
Nebula
41. How does NASA secure cloud computing?
IT Security is built into Nebula
User Isolation from Nebula Infrastructure
Users only have access to APIs and Dashboards
» No user direct access to Nebula infrastructure
Project-based separation
» A project is a set of compute resources
accessible by one or more users
» Each project has separate:
• VLAN for project instances
• VPN for project users to launch, terminate,
and access instances
• Image library of instances
42. How does NASA secure cloud computing?
Networking
RFC1918 address space internal to Nebula
» NAT is used for those hosts within Nebula
needing visibility outside a cluster
Three core types of networks within Nebula:
» Customer
• Customer VLANs are isolated from each
other
» DMZ
• Services available to all Nebula such as
NTP, DNS, etc
» Administrative
43. Security Groups
Combination of VLANs and Subnetting
Can be extended to use physical
network/node separation as well (future)
How does NASA secure cloud computing?
44. C
L
O
U
D
A
P
I
S
S
M
R
Project A
(10.1.1/24)
Project B
(10.1.2/24)
Operations Console
(custom)
Security Scanners
(Nessus, Hydra, etc)
Log Aggregation,
SOC Tap
RFC1918
Space
(LAN_X)
B
R
I
D
G
E
Public IP
Space
I
N
T
E
R
N
E
T
External
Scanner
DMZ
Services
Event Correlation
Engine
How does NASA secure cloud computing?
45. How does NASA secure cloud computing?
Firewalls
Multiple levels of firewalling
» Hardware firewall at site border
» Firewall on cluster network head-ends
» Host-based firewalls on key hosts
» Project based rule sets based on Amazon
security groups
46. How does NASA secure cloud computing?
Remote User Access
Remote access is only through VPN (openVPN)
Separate administrative VPN and user VPNs
Each project has own VPN server
47. How does NASA secure cloud computing?
Intrusion Detection
OSSEC on key infrastructure hosts
» Open source Host-based Intrusion Detection
Mirror port to NASA SOC tap
Building 10Gb/sec IDS/IPS/Forensics device
with vendor partners
48. How does NASA secure cloud computing?
Configuration Management
Puppet used to automatically push out
configuration changes to infrastructure
Automatic reversion of unauthorized changes
to system
49. How does NASA secure cloud computing?
Vulnerability Scanning
Nebula uses both internal and external
vulnerability scanners
Correlate findings between internal and
external scans
50. How does NASA secure cloud computing?
Incident Response
Procedures for isolating individual VMs,
compute nodes, and clusters, including:
» Taking snapshot of suspect VMs, including
memory dump
» Quarantining a VM within a compute node
» Disabling VM images so new instances
can’t be launched
» Quarantining a compute node within a
cluster
» Quarantining a cluster
51. How does NASA secure cloud computing?
Role Based Access Control
Multiple defined roles within a project
Role determines which API calls can be
invoked
» Only network admin can request non-1918
addresses
» Only system admin can bundle new images
» etc
52. How does NASA secure cloud computing?
Innovation - Security Gates
API calls can be intercepted and security
gates can be imposed on function being called
When an instance is launched, it can be
scanned automatically for vulnerabilities
Long term vision is to have a pass/fail launch
gate based on scan/monitoring results
53. How does NASA secure cloud computing?
Vision - Security as a Service
Goal - Automate compliance through security
services provided by cloud provider
Security APIs/tools mapped to specific controls
» Customers could subscribe to tools/services to
meet compliance requirements
When setting up new project in cloud
» Customers assert nature of data they will use
» Cloud responds with list of APIs/tools for
customers to use
Currently gathering requirements but funding
needed to realize vision
54. How does NASA secure cloud computing?
Vision - Security Service Bus
Goal - FISMA compliance through continuous
real-time monitoring and situational awareness
» Security service bus with event driven
messaging engine
» Correlate events across provider and multiple
customers
» Dashboard view for security providers and
customers
» Allows customers to make risk-based security
decisions based on events experienced by
other customers
Funding Needed to Realize Vision
55. Nebula Open Source Progress
Significant progress in embracing the value of
open source software release
» Agreements with SourceForge and Github
» Open source identified as an essential component of
NASA’s open government plan
Elements of Nebula in open source release
pipeline
» Started Feb 2010. Hope for release in June.
» Working toward continual incremental releases.
» Exploring avenues to contribute code to external
projects and to accept external contributions to the
Nebula code base.
How does NASA secure cloud computing?
56. Agenda
Introductions
» Steve Hunt
What is cloud computing?
» Matt Chew Spence
How can NASA benefit from cloud computing?
» Matt Chew Spence
How is NASA implementing cloud computing?
» Matt Linton
How does NASA secure cloud computing?
» Matt Linton
Q&A
» Presentation Team
Extended Presentation
FISMA & Clouds
» Matt Chew Spence
» Steve Hunt
Assessment, Authorization, & FedRAMP
» Steve Hunt
59. OBJECTIVE: Overview of Nebula C&A
with Lessons Learned
OBJECTIVE: Overview of Nebula C&A
with Lessons Learned
Agenda
Introductions
» Steve Hunt
What is cloud computing?
» Matt Chew Spence
How can NASA benefit from cloud computing?
» Matt Chew Spence
How is NASA implementing cloud computing?
» Matt Linton
How does NASA secure cloud computing?
» Matt Linton
Q&A
» Presentation Team
Extended Presentation
FISMA & Clouds
» Matt Chew Spence
» Steve Hunt
Assessment, Authorization, & FedRAMP
» Steve Hunt
60. FISMA & Clouds
FISMA Overview
Federal Information Security Management Act
– Requires all Gov’t computers to be under a security plan
–Mandates following NIST security guidance
–Required controls depend on FIPS-199 sensitivity level
–Requires periodic assessments of security controls
–Extremely documentation heavy
–Assumes one organization has responsibility for majority of
identified security controls
FISMA is burdensome to cloud customers
–Customers want to outsource IT Security to cloud provider
61. FISMA & Clouds
FISMA Responsibilities in Clouds
Clouds are a “Highly Dynamic Shared Management
Environment”
» Customers retain FISMA responsibilities for aspects of a
cloud under their control
» Responsibilities vary depending on level of control maintained
by customer
» Customer control varies relative to service delivery model
(SaaS, PaaS, or IaaS)
Need to define & document responsibilities
» We parsed 800-53 Rev3 controls per service delivery model
Nebula currently only offers IaaS
» We parsed all three service models for future planning
62. Identifying data types
Ensuring data appropriate to system
User/Account Management
Personnel Controls
Identifying data types
Ensuring data appropriate to system
User/Account Management
Personnel Controls
Software Licenses
Developer Testing
App Configuration Management
Software Development Lifecycle
Software Licenses
Developer Testing
App Configuration Management
Software Development Lifecycle
OS Config Mgmt
Anti-Malware
SW Install Controls
OS specific Controls
etc
OS Config Mgmt
Anti-Malware
SW Install Controls
OS specific Controls
etc
SaaS
IaaS
PaaS
Cloud
Customer
Security
Responsibility
Customer FISMA Responsibilities for Cloud
Customer FISMA
responsibilities Increase
as Customers have more
control over security
measures
62
FISMA & Clouds
63. FISMA & Clouds
IaaS Customer Security Plan Coverage Options
At inception little guidance existed on cloud computing control
responsibilities & security plan coverage
FedRAMP primarily addresses cloud provider responsibilities
» Other than control parsing definitions Customers are given little
guidance on implementing and managing FISMA requirements in a
highly dynamic shared management environment
We have developed the following options:
Option Description Issues
Customer Owned Customer responsible for
own security plan with no
assistance from provider
• None to Providers
• Burdensome to
customers
Facilitated Customer responsible for
own security plan using
NASA template
• May still be burdensome
to customers.
• Not scalable unless
automated.
Agency Owned Agency or Center level
“Group” security plans
associated with Cloud
providers serve as
aggregation point for
customer.
• May be burdensome to
Agency or Center.
• Requires technology to
automate input and
aggregation of customer
data.
64. FISMA & Clouds
Current NASA Requirements/Tools may Impede
Cloud Implementation
Default security categorization of Scientific and Space Science
data as “Moderate”
» Independent assessment required for every major change
• Currently requires 3rd
party document-centric audit
• Not scalable to cloud environments
e-Authentication/AD integration required for all NASA Apps
» NASA implementations don’t currently support LDAP/SAML-
based federated identity management
Function-specific stove-piped compliance tools
» STRAW/PIA tool/A&A Repository/NASA electronic forms
» Can’t easily automate compliance process for new apps
64
65. FISMA & Clouds
Emerging Developments in FISMA & Clouds
Interagency Cloud Computing Security Working Group
is developing additional baseline security requirements
for cloud computing providers
NIST Cloud Computing guidance forthcoming?
Move towards automated risk models and security
management tools over documentation
On the bleeding edge - changing guidance &
requirements are a key risk factor (and opportunity)
65
66. FISMA & Clouds
Nebula is Contributing to CloudNebula is Contributing to Cloud
StandardsStandards
Federal Cloud Standards Working Group
Fed Cloud Computing Security Working
Group
» Federal Risk & Authorization Management
Program (FedRAMP)
Cloud Audit project
» Automated Audit Assertion Assessment &
Assurance API
Providing Feedback to NIST and GAO
GSA Cloud PMO
66
67. OBJECTIVE: Overview of how Nebula
concepts may integrate with FedRAMP
OBJECTIVE: Overview of how Nebula
concepts may integrate with FedRAMPAgenda
Introductions
» Steve Hunt
What is cloud computing?
» Matt Chew Spence
How can NASA benefit from cloud computing?
» Matt Chew Spence
How is NASA implementing cloud computing?
» Matt Linton
How does NASA secure cloud computing?
» Matt Linton
Q&A
» Presentation Team
Extended Presentation
FISMA & Clouds
» Matt Chew Spence
» Steve Hunt
Assessment, Authorization, & FedRAMP
» Steve Hunt
68. A Federal Government-Wide program to provide
“Joint Authorizations” and Continuous Monitoring
» Unified Government-Wide risk management
» Authorizations can be leveraged throughout
Federal Government
This is to be an optional service provided to
Agencies that does not supplant existing
Agency authority
Federal Risk and Authorization
Management Program
Federal Risk and Authorization
Management Program
FedRAMP
69. Independent Agency Risk Management of Cloud Services
…
Federal Agencies
Cloud Service Providers (CSP)
…
: Duplicative risk
management efforts
: Incompatible agency
policies
: Potential for inconsistent
application of Federal
security requirements
: Acquisition slowed by
lengthy compliance
processes
FedRAMP
70. Federated Risk Management of Cloud Systems
: Risk management cost
savings and increased
effectiveness
: Interagency vetted
approach
: Consistent
application of Federal
security requirements
Federal Agencies
: Rapid acquisition
through consolidated
risk management
Cloud Service Providers (CSP)
FedRAMPFedRAMP
Risk Management
• Authorization
• Continuous
Monitoring
• Federal Security
Requirements
…
…
FedRAMP
71. FedRAMP Authorization process
Agency X has a need
for a new cloud based
IT system
Agency X gets
security requirements
for the new IT system
from FedRAMP and
adds requirements if
necessary
Agency X releases
RFP for new IT
system and awards
contract to cloud
service provider
(CSP)
Agency X submits
request to FedRAMP
office for CSP To be
FedRAMP authorized
to operate
CSP is put into FedRAMP
priority queue
(prioritization occurs
based on factors such as
multi-agency use,
number of expected
users, etc.)
FedRAMP
72. FedRAMP Authorization process (cont)
FedRAMP
CSP and agency
sponsor begin
authorization
process with
FedRAMP office
CSP, agency
sponsor and
FedRAMP office
review security
requirements and
any alternative
implementations
FedRAMP office
coordinates with
CSP for creation
of system security
plan (SSP)
CSP has independent
assessment of
security controls and
develops appropriate
reports for submission
to FedRAMP office
FedRAMP office
reviews and
assembles the
final authorization
package for the
JAB
JAB reviews final
certification
package and
authorizes CSP to
operate
FedRAMP office adds
CSP to authorized
system inventory to
be reviewed and
leveraged by all
Federal agencies
FedRAMP
provides
continuous
monitoring of CSP
73. Issues & Concerns
FedRAMP doesn’t provide much guidance for customer
side … e.g. Agency users of cloud services
Current NIST guidance oriented primarily towards “Static
Single System Owner” environments
Lack of NIST guidance for “Highly Dynamic Shared
Owner” environments … e.g. Virtualized Data Centers &
Clouds
» SSP generation & maintenance
» Application of SP 800-53 (security controls)
» Application of SP 800-37 (assessment & ATO)
» Continuous Monitoring
Guidance may be forthcoming but NIST is resource
constrained
FedRAMP
74. Potential Solution
Agency/Center level Aggregated SSPs:
» Plan per CSP … e.g. Nebula, Amazon,
Google, Microsoft … etc.
» Plan covers all customers of a specific CSP
» Technology integration may be needed with
SSP repository to dynamically update SSP
content via Web Registration site.
» Or … SSP may be able to point to dynamic
content entered and housed on Web
Registration site ... maintained in Wiki type
doc.
Presentation Title
—74—
March 5, 2010
FedRAMP