Economy of scale and flexibility are the most important aspects of cloud computing even from a security standpoint, since cloud-based defenses can be more robust, scalable and cost-effective. However, all the data and resources available at a single point present a very attractive target for unauthorized access.
Since cloud security requires a multi-layered defense which includes hardening, access control and encryption into the cloud / virtualization layer, it is essential to have a firm understanding of security and compliance requirements prior to moving to the cloud.
Two factors will determine the type and amount of security controls needed and who is responsible for them.
Type of Cloud: | Public, Private, Hybrid |
Service Model: | Software-As-A-Service (SAAS) Platform-As-A-Service (PAAS) Infrastructure-As-A-Service (IAAS) |
Cloud Security should be implemented after an informed assessment of the security risks and benefits of using cloud computing.
About this workshop
Security issues / concerns associated with cloud computing fall broadly into two categories:
This workshop helps participants understand cloud computing fundamentals and the requirements of cloud security covering all the domains outlined by the Cloud Security Alliance (CSA) and the recommendations given by the European Network and Information Security Agency (ENISA).
Participants work on a set of exercises involving scenarios where they need to assess, build and secure a cloud infrastructure and understand how an organization can effectively transition securely into a cloud computing environment.
Benefits
The objective of the workshop is to educate participants how to do an informed assessment of the security risks and benefits of using cloud computing and providing security guidance for potential and existing users of cloud computing.
This workshop covers the essential concepts of cloud security and ensures that the candidate has the fundamental knowledge and skills required to manage cloud computing in a secure environment.
Upon successful completion of this workshop, the participants will be able to:
This workshop is especially useful for those responsible for managing information security within the organization.
Who should attend
This workshop will significantly benefit professionals responsible for security in a cloud computing environment.
The program is restricted to participants who have basic understanding of security fundamentals, firewalls, secure development, encryption, and identity management.
Workshop Outline
CSA Guidance for Critical Areas of Focus in Cloud Computing
ENISA Cloud Computing: Benefits, Risks and Recommendations for Information Security