Privacy Reputation … essentially you secure Your Life Assets Apps Services Machines Configuration … essentially you secure Your Customers’ Trust 6 In Real Life In the Cloud
things (places/people/procedures) Use fence/boundary/barrier Use burglar alarm systems Use lock/key Change locks periodically Use dogs/guards (Dragon ? ) Audit Follow the rules/the law Create plan B ( & C & D) Use JEOS Principle of least privilege Deploy firewall Detect intrusion Use public key cryptography Rotate keys Monitor Keep a log Ensure compliance Plan for disaster (redundancy/backup/restore) 7 In Real Life In the Cloud