Upgrade to Pro — share decks privately, control downloads, hide ads and more …

Introduction to Cloud Security : Agile India 2018

Introduction to Cloud Security : Agile India 2018

A short talk introducing some concepts around cloud security, starting with the fact that our focus needs to be on security generally before we can dive in to things specific to "cloud".

jystewart

March 09, 2018
Tweet

More Decks by jystewart

Other Decks in Technology

Transcript

  1. Software developer and product manager Co-founded UK Government Digital Service

    Deputy CTO, UK Government Digital leadership, technology and security advisor James Stewart |@jystewart | [email protected]
  2. @jystewart “Hackers stole a total of £130bn from consumers in

    2017, including £4.6bn from British internet users, according to a new report from cybersecurity firm Norton. The most common crimes were generally low- tech, such as attempts to trick individuals into revealing their personal information through bogus emails with generally low costs to victims.” https://www.theguardian.com/technology/2018/jan/23/cybercrime-130bn-stolen- consumers-2017-report-victims-phishing-ransomware-online-hacking https://us.norton.com/cyber-security-insights-2017
  3. @jystewart "the risk of the new should seem negligible compared

    to the urgency of change” https://www.linkedin.com/pulse/reducing-risk-cloud-overcoming- status-quo-bias-mark-schwartz
  4. GDS

  5. @jystewart 1. Data in transit protection 2. Asset protection and

    resilience 3. Separation between users 4. Governance framework 5. Operational security 6. Personnel security 7. Secure development 8. Supply chain security 9. Secure user management 10. Identity and authentication 11. External interface protection 12. Secure service administration 13. Audit information for users 14. Secure use of the service
  6. @jystewart 1. Data in transit protection 2. Asset protection and

    resilience 3. Separation between users 4. Governance framework 5. Operational security 6. Personnel security 7. Secure development 8. Supply chain security 9. Secure user management 10. Identity and authentication 11. External interface protection 12. Secure service administration 13. Audit information for users 14. Secure use of the service
  7. @jystewart “If security doesn't work for people, it doesn't work”

    - Emma W from NCSC https://www.ncsc.gov.uk/blog-post/cyberuk-2017-people-strongest-link