Readers can download high-resolution, full-color versions of all this book’s fi gures at www.informit.com/title/9780133387520 and www.servicetechbooks.com/cloud
There are multiple ways to look at the security risks for cloud computing. ... and images in/from Cloud ... has given cloud computing use of shared files and
Download There is no universally accepted definition of cloud computing. For the purpose of this leaflet, it is referred to as a pool of on-demand, shared and configurable computing resources that can be rapidly provided to customers with minimal
Download Komputansi Awan atau Cloud Computing telah mengubah segalanya, mulai dari cara layanan TI diantarkan, sampai dengan caranya dipakai dalam sebuah organisasi. Namun, masalah keamanan merupakan masalah Utama yang Timbul dengan adanya tekn
Download Komputansi Awan atau Cloud Computing telah mengubah segalanya, mulai dari cara layanan TI diantarkan, sampai dengan caranya dipakai dalam sebuah organisasi. Namun, masalah keamanan merupakan masalah Utama yang Timbul dengan adanya tekn
Download There is no universally accepted definition of cloud computing. For the purpose of this leaflet, it is referred to as a pool of on-demand, shared and configurable computing resources that can be rapidly provided to customers with minimal
Download Sebelum kita membahas lebih jauh mengenai Cloud Computing,terlebih ..... akademis, jurnal-jurnal yang membahas tentang hal ini baru bermunculan di tiga ...
Capacity Planning and Disaster Recovery in Cloud Computing. TOTAL: 44. PERIODS. REFERENCES: 1. KailashJayaswal,JagannathKallakurchi,Donald J. Houde, Dr. DevenShahCloud Computing. Black Book Kogent Learning. 2. Dr. Kumar Saurabh , Cloud Computing , Wi
Download Cloud Computing. Abstract. Cloud computing has come of age since Amazon's rollout of the first of its kind of cloud services in. 2006. It is particularly relevant to Hong Kong because of the tremendous amounts of data that are being
Download Cloud Computing. Abstract. Cloud computing has come of age since Amazon's rollout of the first of its kind of cloud services in. 2006. It is particularly relevant to Hong Kong because of the tremendous amounts of data that are being
Defining cloud computing 6. Essential characteristics 7. Three service models 10. Four deployment models 16. When is a cloud not a cloud? 17. Twelve adoption scenarios 18. Quick technology tips 18. Summary 22. Key summary points 23. Question and acti
Download There is no universally accepted definition of cloud computing. For the purpose of this leaflet, it is referred to as a pool of on-demand, shared and configurable computing resources that can be rapidly provided to customers with minimal
Download Komputansi Awan atau Cloud Computing telah mengubah segalanya, mulai dari cara layanan TI diantarkan, sampai dengan caranya dipakai dalam sebuah organisasi. Namun, masalah keamanan merupakan masalah Utama yang Timbul dengan adanya tekn
Download Komputansi Awan atau Cloud Computing telah mengubah segalanya, mulai dari cara layanan TI diantarkan, sampai dengan caranya dipakai dalam sebuah organisasi. Namun, masalah keamanan merupakan masalah Utama yang Timbul dengan adanya tekn
Cloud computing Black Book Dreamtech Publication. References: 1. Using Goolgle Apps engine O'reilly Publication. 2. Programming Amazon EC2, O'reilly Publication. 3. Cloud security, Ronald L. Wiley Publication. 4. Cloud computing Dr. Kumar Saurabh, wi
Download There is no universally accepted definition of cloud computing. For the purpose of this leaflet, it is referred to as a pool of on-demand, shared and configurable computing resources that can be rapidly provided to customers with minimal
Download Komputansi Awan atau Cloud Computing telah mengubah segalanya, mulai dari cara layanan TI diantarkan, sampai dengan caranya dipakai dalam sebuah organisasi. Namun, masalah keamanan merupakan masalah Utama yang Timbul dengan adanya tekn
Download long awaited dream of utility computing. We at Luminis are convinced that Cloud Computing is a disruptive innovation where the full potential of it is much more than a cost-focused return-on- investment model. Not only will the cloud jou
Download Cloud Computing. Abstract. Cloud computing has come of age since Amazon's rollout of the first of its kind of cloud services in. 2006. It is particularly relevant to Hong Kong because of the tremendous amounts of data that are being
Download There is no universally accepted definition of cloud computing. For the purpose of this leaflet, it is referred to as a pool of on-demand, shared and configurable computing resources that can be rapidly provided to customers with minimal
Download Komputansi Awan atau Cloud Computing telah mengubah segalanya, mulai dari cara layanan TI diantarkan, sampai dengan caranya dipakai dalam sebuah organisasi. Namun, masalah keamanan merupakan masalah Utama yang Timbul dengan adanya tekn
Download Komputansi Awan atau Cloud Computing telah mengubah segalanya, mulai dari cara layanan TI diantarkan, sampai dengan caranya dipakai dalam sebuah organisasi. Namun, masalah keamanan merupakan masalah Utama yang Timbul dengan adanya tekn
Download There is no universally accepted definition of cloud computing. For the purpose of this leaflet, it is referred to as a pool of on-demand, shared and configurable computing resources that can be rapidly provided to customers with minimal
Download Komputansi Awan atau Cloud Computing telah mengubah segalanya, mulai dari cara layanan TI diantarkan, sampai dengan caranya dipakai dalam sebuah organisasi. Namun, masalah keamanan merupakan masalah Utama yang Timbul dengan adanya tekn
UNCLASSIFIED
Secure Cloud Computing Architecture (SCCA) Susan Casson PM, SCCA December 12, 2017
UNCLASSIFIED
UNITED UNITEDININSERVICE SERVICE TO TOOUR OURNATION NATION
1
UNCLASSIFIED
Unclassified DoD Commercial Cloud Deployment Approach Cyber Command C2 Operations Off Premise Level 2 Approved Vendors
On Premise Level 1-5 Cloud Providers Internet-based User
Meet-Me Point Central Location for DoD and Cloud Connections
Salesforce
Oracle
O365
Commercial Controlled Environment w/DoD Oversight UNITED IN SERVICE TO OUR NATION
2
UNCLASSIFIED
Secure Cloud Computing Architecture (SCCA) •
Session Objectives Define the SCCA portfolio and requirements to obtain services Outline how SCCA can enable cloud migration Connect attendees with technical and functional DISA experts Collect attendee feedback to influence future roadmap priorities
Connect: Access DoD approved level 4/5 cloud services Secure: Extend application and data-level security services to cloud environments
Manage: Consume custom analytics and intelligence data along with host based security and access control capabilities
Vendors named within are approved or under contract to provide specified services to DISA or DOD
UNCLASSIFIED
UNITED IN SERVICE TO OUR NATION
3
UNCLASSIFIED
Capability Overview •
Cloud Access Points: Provides connectivity to approved cloud providers, and protects the DISN from cloud originating attacks
•
Virtual Data Center Security Stack: Virtual Network Enclave Security to protect application and data
•
Virtual Data Center Managed Services: Application Host Security, including HBSS/ACAS, patching, configuration, and management
•
Trusted Cloud Credential Manager: Cloud Credential Manager for Role Based Access Control (RBAC) and least privileged access
Vendors named within are approved or under contract to provide specified services to DISA or DOD
UNCLASSIFIED
UNITED IN SERVICE TO OUR NATION
4
UNCLASSIFIED
Cloud Management Roles and Responsibilities DISA Cloud Connection Approval Onboarding Checklist
Approved cloud vendor System Network Approval Process (SNAP) Registration Internet Protocol Registration Cybersecurity Service Provider Authority to Operate
DISA or Mission Partner Managed
Cloud Service Provider Managed
Infrastructure
Software
Applications
Applications
Data
Data
Runtime
Runtime
Middleware
Middleware
O/S
O/S
Virtualization
Virtualization
Servers
Servers
Storage
Storage
Networking
Networking
Shared Management
Cloud Service Provider Managed
Vendors named within are approved or under contract to provide specified services to DISA or DOD
UNCLASSIFIED
UNITED IN SERVICE TO OUR NATION
5
UNCLASSIFIED
Cloud Access Points; Accessibility Versus Application Security •
SCCA Boundary CAP (BCAP)
•
Support IaaS and SaaS clouds Protect DoD Networks from cloud originated attacks Scale up to 10G capacity per site Strategically located Included in DISN subscription rate
BCAPs Do Not Break and inspect Provide application level security
Vendors named within are approved or under contract to provide specified services to DISA or DOD
UNCLASSIFIED
UNITED IN SERVICE TO OUR NATION
6
UNCLASSIFIED
Cloud Security and Managed Services VDSS
Traditional network security features for public facing web applications Next Generation Firewall for protecting cloud hosted workloads
Web Application Firewall Next Generation Firewall
VDMS
Cloud connected management and security tools Cloud privileged user access and account management Central search and display of CAP and Cloud logs via Splunk
HBSS ACAS Operating System Patching Recursive DNS Caching Cloud Visibility
Vendors named within are approved or under contract to provide specified services to DISA or DOD
UNCLASSIFIED
UNITED IN SERVICE TO OUR NATION
7
UNCLASSIFIED
Boundary CAP (BCAP) 1.0 Overview
Level 4/5 Approved Vendors
Vendors named within are approved or under contract to provide specified services to DISA or DOD
UNCLASSIFIED
UNITED IN SERVICE TO OUR NATION
8
UNCLASSIFIED
VDSS and VDMS
CSP
VDSS
VDMS Extension VDMS Core CSP
VDSS VDMS Core VDMS Extension
Vendors named within are approved or under contract to provide specified services to DISA or DOD
UNCLASSIFIED
UNITED IN SERVICE TO OUR NATION
9
UNCLASSIFIED
Our Evolution of Cloud Security Does Not End With SCCA • • •
Leaner and faster Templates, tools, and integration points Hybrid security solutions
Automation
Optimization Migration Security Vendors named within are approved or under contract to provide specified services to DISA or DOD