Sie sind auf Seite 1von 10

Cloud Security Trends Hype

Cycle 2012
Felix Enescu

This presentation, including any supporting materials, is owned by Gartner, Inc. and/or its affiliates and is for the sole use of the intended Gartner audience or other
authorized recipients. This presentation may contain information that is confidential, proprietary or otherwise legally protected, and it may not be further copied,
distributed or publicly displayed without the express written permission of Gartner, Inc. or its affiliates.
2011 Gartner, Inc. and/or its affiliates. All rights reserved.

Hype Cycle Methodolgy

Hype Cycle for Cloud Security, 2012

Priority Matrix for Cloud Security, 2012

Three Styles of Securing


Public/Private Cloud
Security "Pressure"
Low
Security built into
cloud is used

Public
Cloud

SAS 70 sufficient

Security built into


VM is used

Private
Cloud

Accept vendor
security claims

Medium

High

Third-party security
running in cloud is
used

Security is
performed
outside the cloud

Custom/industry
security assessment

No trust of the
cloud

Third-party security
running on VM is
used

Security is
performed
outside the VM

Certification/
accreditation of
system

Security product
certification

Trust of the Cloud

Use Security Built Into the Cloud


Public Cloud
- Certification/assessment
SAS 70 is minimum gate, ISO 27001, FISMA
Community standards/shared assessments

- Security overlays

Private Cloud
- Virtualization infrastructure security
features/acquisitions
- Common Criteria certification

Use Security Running in Cloud


Public Cloud
- Security workloads

- Native cloud security breakthroughs


- Hybrid models

Private Cloud
- Virtualized security products
- Separation of duties

Keep Security Separate From the Cloud


Public Cloud
- Security as a service

- Security in the "other" Cloud telecom


- Trusted intermediaries

Private Cloud
- VMsafe API, other externalization approaches
- Virtual network integration

Cloud Security Trends Hype


Cycle 2012
Felix Enescu

This presentation, including any supporting materials, is owned by Gartner, Inc. and/or its affiliates and is for the sole use of the intended Gartner audience or other
authorized recipients. This presentation may contain information that is confidential, proprietary or otherwise legally protected, and it may not be further copied,
distributed or publicly displayed without the express written permission of Gartner, Inc. or its affiliates.
2011 Gartner, Inc. and/or its affiliates. All rights reserved.

Cloud Security Trends Hype


Cycle 2012
Felix Enescu

This presentation, including any supporting materials, is owned by Gartner, Inc. and/or its affiliates and is for the sole use of the intended Gartner audience or other
authorized recipients. This presentation may contain information that is confidential, proprietary or otherwise legally protected, and it may not be further copied,
distributed or publicly displayed without the express written permission of Gartner, Inc. or its affiliates.
2011 Gartner, Inc. and/or its affiliates. All rights reserved.

Das könnte Ihnen auch gefallen