Building the Trustworthy Cloud Ecosystem www.cloudsecurityalliance.org Global, not-for-profit organization Building security best practices for next generation IT Research and Educational Programs Cloud Provider Certification User Certification The globally authoritative source for Trust in the Cloud “To promote the use of best practices for providing security assurance within Cloud Computing, and provide education on the uses of Cloud Computing to help secure all other forms of computing.” Copyright © 2013 Cloud Security Alliance www.cloudsecurityalliance.org Founded in 2009 Membership stats as of Nov 2013 51,000 individual members, 70 chapters globally 190 corporate members Major cloud providers, tech companies, infosec leaders, governments, financial institutions, retail, healthcare and more Offices in Seattle USA, Singapore, Heraklion Greece Over 30 research projects in 25 working groups Strategic partnerships with governments, research institutions, professional associations and industry Copyright © 2013 Cloud Security Alliance www.cloudsecurityalliance.org Lack of transparency from providers & gov’t Lack of visibility complicates compliance efforts Incompatible laws across jurisdictions Incomplete standards Still lacking true multi-tenant technologies & architecture Risk concentration concerns Maintaining logical control while losing physical control Copyright © 2013 Cloud Security Alliance www.cloudsecurityalliance.org 1. Data Breaches 2. Data Loss 3. Account Hijacking 4. Insecure APIs 5. Denial of Service 6. Malicious Insiders 7. Abuse of Cloud Services 8. Insufficient Due Diligence 9. Shared Technology Issues https://cloudsecurityalliance.org/research/top-threats/ Copyright © 2013 Cloud Security Alliance www.cloudsecurityalliance.org Copyright © 2013 Cloud Security Alliance www.cloudsecurityalliance.org Copyright © 2013 Cloud Security Alliance www.cloudsecurityalliance.org Industry standard catalog of cloud security issues and best practices Widespread adoption Translated into 6 languages 14 domains Use to help shape your cloud policies and security strategy https://cloudsecurityalliance.org/research/ security-guidance/ Copyright © 2013 Cloud Security Alliance www.cloudsecurityalliance.org Security as a Service Research for gaining greater understanding for how to deliver security solutions via cloud models. Implementation Guidance for each SecaaS Category SIEM Identity & Access Mgt Data Loss Prevention Web Security Email Security Security Assessments Intrusion Mgt Encryption Business Continuity & Disaster Recovery Network Security https://cloudsecurityalliance.org/research/secaas/ Copyright © 2013 Cloud Security Alliance www.cloudsecurityalliance.org Big Data Identifying scalable techniques for data-centric security and privacy problems Lead to crystallization of best practices for security and privacy in big data Help industry and government on adoption of best practices Establish liaisons with other organizations in order to coordinate the development of big data security and privacy standards Accelerate the adoption of novel research aimed to address security and privacy issues Close coordination with NIST Open Review: Big Data Analytics for Security Intelligence Expanded Top Ten Big Data Security and Privacy Challenges • Secure Computations in Distributed Programming Frameworks • Security Best Practices for NonRelational Data Stores • Secure Data Storage and Transactions Logs • End-Point Input Validation/Filtering • Real-Time Security Monitoring • Scalable and Composable PrivacyPreserving Data Mining and Analytics • Cryptographically Enforced DataCentric Security • Granular Access Control • Granular Audits • Data Provenance https://cloudsecurityalliance.org/research/big-data/ Copyright © 2013 Cloud Security Alliance www.cloudsecurityalliance.org Mobile Securing application stores and other public entities deploying software to mobile devices Analysis of mobile security capabilities and features of key mobile operating systems Cloud-based management, provisioning, policy, and data management of mobile devices to achieve security objectives Guidelines for the mobile device security framework and mobile cloud architectures Solutions for resolving multiple usage roles related to BYOD, e.g. personal and business use of a common device Best practices for secure mobile application development https://cloudsecurityalliance.org/research/mobile/ Copyright © 2013 Cloud Se

pdf文档 2013-《第四届云安全联盟高峰论坛-CSA-Jim Reavis-Cloud Security Alliance》

安全研究库 > 网络论坛材料 > 第四届云安全联盟高峰论坛 > 文档预览
35 页 0 下载 40 浏览 0 评论 0 收藏 3.0分
温馨提示:如果当前文档出现乱码或未能正常浏览,请先下载原文档进行浏览。
2013-《第四届云安全联盟高峰论坛-CSA-Jim Reavis-Cloud Security Alliance》 第 1 页 2013-《第四届云安全联盟高峰论坛-CSA-Jim Reavis-Cloud Security Alliance》 第 2 页 2013-《第四届云安全联盟高峰论坛-CSA-Jim Reavis-Cloud Security Alliance》 第 3 页 2013-《第四届云安全联盟高峰论坛-CSA-Jim Reavis-Cloud Security Alliance》 第 4 页 2013-《第四届云安全联盟高峰论坛-CSA-Jim Reavis-Cloud Security Alliance》 第 5 页
下载文档到电脑,方便使用
还有 30 页可预览,继续阅读
本文档由 张玉竹2022-04-07 17:34:57上传分享
给文档打分
您好可以输入 255 个字符
安信天行文库的中文名是什么?( 答案:安信天行 )
评论列表
  • 暂时还没有评论,期待您的金玉良言