rostelecom “information society” projects

15
www.rt.ru GRID and Cloud: alternative security approaches Ilya Trifalenkov, head of IT security for “Information society” projects

Upload: rebekkah-clay

Post on 30-Dec-2015

35 views

Category:

Documents


4 download

DESCRIPTION

GRID and Cloud: alternative security approaches Ilya Trifalenkov, head of IT security for “Information society” projects. Rostelecom “Information society” projects. National Cloud Platform “O7” – field of occupation. PaaS cloud. Training. Source-code management. Business analytics. SOAP. - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: Rostelecom “Information society” projects

www.rt.ru

GRID and Cloud:alternative security approaches

Ilya Trifalenkov, head of IT security for “Information society” projects

Page 2: Rostelecom “Information society” projects

www.rt.ru2

Rostelecom “Information society” projects

Information society project

Electronic government

infrastructure

National Cloud platform “O7”

National identification and authentification

service

Digital and interactive TV

Mobile IT services

National search and indexing

Page 3: Rostelecom “Information society” projects

www.rt.ru

National Cloud Platform “O7” – field of occupation

3

IaaS cloudVirtual Datastore

Virtual Datacenter Virtual server

Personal data security services Confidential information Security services

SaaS cloud

E-Goverment Electronic region Management solutions

Social services Medicine Education

Culture applications Energetics

Ecological monitoring

Territorial planningTransportation and logistics

Safe CityHousing management Special solutions

Unified communications

Office solutions

Enterprise management

Source-code managementPaaS cloud

DBMS

Training Business analytics

SOAP

Page 4: Rostelecom “Information society” projects

www.rt.ru

National platform “O7” - architecture

4

Page 5: Rostelecom “Information society” projects

www.rt.ru5

Cloud technologies as result of IT evolution

Single custom solutions

Integration for enterprises and industry branches

IT services as dedicated activity

“Mass production” for IT services

Page 6: Rostelecom “Information society” projects

www.rt.ru

GRID and Cloud technologies: who is who

GRID

Technological priorities

SLA for IT-resources

Scientific solutions

Multi-operators model

Varying set of applications

Security as value-add

Clouds

Business priorities

SLA for IT-services

Business and society oriented

Single operator model

Fixed set of applications

Security as critical requirement

6

Page 7: Rostelecom “Information society” projects

www.rt.ru

Cloud participants: who is who

Page 8: Rostelecom “Information society” projects

www.rt.ru8

GRID and Cloud: common threats but different riscs

Traditional threads

Sharing resources threats

Outsourcing threats

Threats from service operator

Threats from sharing of resources between different organizations

Page 9: Rostelecom “Information society” projects

www.rt.ru

Cloud security approach: from risks to measures

IT processes Risks Requirements Measures Compilance

9

General Standards: ISO27001

Cloud security standards: NIST SP800-128, NIST SP800-146

• Security guidance for critical areas of focus in cloud computing• Cloud control matrix• Cloud data governance

Best practices: Cloud security alliance recommendations

Page 10: Rostelecom “Information society” projects

www.rt.ru10

Why cloud security is attracitve

Data storage and processing from independent operator

Security management and control by requirements

Real-time security incident management

Short (zero) time for data restoring

Honey-Net possibilities

Smart security staff

Information security infrastructure investment

Page 11: Rostelecom “Information society” projects

www.rt.ru11

Practical Cloud security in “O7”

Security as a

service

Field-oriented clouds

Separation for application and infrastructure

administration

Special domain for security

infrastructure services

Scaled solution for end-user

Security audit & compliance as very important

mechanisms

Cryptography as a service –

separated part

Page 12: Rostelecom “Information society” projects

www.rt.ru

GRID security: view from cloud

Processes not described formally for risks analysis

Requirements not unified and not standartized

Security mechanisms localized within operator

No formal process for compliance

Security “as it is convinient for system admin”

Page 13: Rostelecom “Information society” projects

www.rt.ru

GRID access control: phantom menace

Access control

based on sertificates

identification of users

private key unavailability

Strong security requirements for each CA, best – independent CA

Users have long-term rights

Page 14: Rostelecom “Information society” projects

www.rt.ru

Conclusion

GRID is not cloud. GRID only can be one case for Cloud

Security in cloud essentially stronger than in GRID

GRID without security have no chances as business GRID and can be source of emergency for IT infrastructure

Cloud security approaches applicable for GRID but not in use

Page 15: Rostelecom “Information society” projects

www.rt.ru

СПАСИБО

15