does your cloud solution look like a mushroom 1 asset
play

Does Your Cloud Solution Look Like a Mushroom? 1: Asset - PowerPoint PPT Presentation

Does Your Cloud Solution Look Like a Mushroom? 1: Asset Identification 2: Identify Risks 3: Countermeasures 4: What risks does solution cause? 5: Costs and Trade-offs 1: Asset Identification 5: Identify Risks? 1: Asset Identification 5:


  1. Does Your Cloud Solution Look Like a Mushroom?

  2. 1: Asset Identification 2: Identify Risks 3: Countermeasures 4: What risks does solution cause? 5: Costs and Trade-offs

  3. 1: Asset Identification 5: Identify Risks?

  4. 1: Asset Identification 5: Identify Risks?

  5. 1: Asset Identification 5: Identify Risks?

  6. 1: Asset Identification 5: Identify Risks? Python Script by François Marier

  7. 1: Asset Identification 5: Identify Risks?

  8. 1: Asset Identification 2: Identify Risks 3: Countermeasures 4: What risks does solution cause? 5: Costs and Trade-offs

  9. 2: Identify Risks 5: Identify Risks?

  10. 2: Identify Risks Risk = Likelihood * Impact 5: Identify Risks?

  11. 2: Identify Risks 5: Identify Risks? Dependency

  12. 2: Identify Risks Likelihood Threat Agent Factors 5: Identify Risks? ● Skill level ● Motive ● Opportunity ● Size

  13. 2: Identify Risks Likelihood Vulnerability Factors 5: Identify Risks? ● Ease of discovery ● Ease of exploit ● Awareness ● Intrusion detection

  14. 2: Identify Risks Impact Technical Factors 5: Identify Risks? ● Loss of confidentiality ● Loss of integrity ● Loss of availability ● Loss of accountability

  15. 2: Identify Risks Impact Business Factors 5: Identify Risks? ● Financial damage ● Reputation damage ● Non-compliance ● Privacy violation

  16. 2: Identify Risks The Cloud vs In-House Security Comparisons

  17. 2: Identify Risks The Cloud vs In-House Security Comparisons

  18. 2: Identify Risks The Cloud vs In-House Security Comparisons

  19. 2: Identify Risks Control Lost

  20. 2: Identify Risks 5: Identify Risks?

  21. 1: Asset Identification 2: Identify Risks 3: Countermeasures 4: What risks does solution cause? 5: Costs and Trade-offs

  22. 3: Countermeasures

  23. 3: Countermeasures ● Avoid Commercial ● Use Public-Domain

  24. 3: Countermeasures

  25. 3: Countermeasures Hardening VPS's ● Create Multiple Partitions ● Review Password Strategies ● Disable Remote Root Logins ● Harden SSH

  26. 3: Countermeasures Hardening VPS's ● Disable or Remove Services ● Schedule Backups ● Keep Systems Up to date ● Logging to Off-site

  27. 3: Countermeasures Hardening VPS's

  28. 3: Countermeasures Hardening VPS's

  29. 3: Countermeasures Hardening VPS's

  30. 3: Countermeasures Break Your System

  31. 1: Asset Identification 2: Identify Risks 3: Countermeasures 4: Risks that solution causes 5: Costs and Trade-offs

  32. 4: Risks that solution causes New Risks

  33. 4: Risks that solution causes New Risks

  34. 4: Risks that solution causes New Risks >

  35. 4: Risks that solution causes New Mitigated

  36. 1: Asset Identification 2: Identify Risks 3: Countermeasures 4: Risks that solution causes 5: Costs and Trade-offs

  37. 5: Costs and Trade-offs Establish Value Loss of Convenience

  38. 5: Costs and Trade-offs Staying on Top

  39. Resource Compilation ● Cloud Security Assessment ● Automation ● Security Focused Facility ● In-house Cloud Planning

Recommend


More recommend