SlideShare uma empresa Scribd logo
1 de 46
Baixar para ler offline
webdev@rgu
Using cloud in an enterprise environment
Different cloud deployment models and their
characteristics
• Public Cloud
• Private Cloud
• Hybrid Cloud
The Data Protection Act and how it relates to Cloud
Computing
case study example of using a hybrid cloud model in
an enterprise environment
Today we are
covering…
Cloud
deployment
models
Public
Cloud
Private
Cloud
Public
Cloud
Private
Cloud
Hybrid
Cloud
Leadership Engineering
We want access to the
fastest and newest
cloud services straight
away
All of our data must
remain secure and we
want to remain in
control of it
National Institute of
Standards and Technology
Cloud computing is a model for enabling ubiquitous,
convenient, on-demand network access to a shared opal
of configurable computer resources that can be rapidly
provisioned and released with minimal
management effort or service provider interaction
Cloud Computing
National Institute of
Standards and Technology
The cloud infrastructure is provisioned for open use by the
general public. It may be owned, managed, and operated
by a business, academic, or government organisation, or
some combination of them. It exists on the premises of
the cloud provider.
Public Cloud
National Institute of
Standards and Technology
National Institute of
Standards and Technology
The cloud infrastructure is provisioned for exclusive use
by a single organisation comprising multiple consumers.
It may be owned, managed, and operated by the
organisation, a third parts, or some combination of them,
and it may exist on or off premises
Private Cloud
Elastic Capabilities
Opex economics (operational Expense)
Ease of operations
time to implement
data sovereignty
environmental control
cost predictability
capex economics (Capitol Expense)
Elastic Capabilities
Opex economics (operational Expense)
Ease of operations
time to implement
data sovereignty
environmental control
cost predictability
capex economics (Capitol Expense)
PrivateCloud
PublicCloud
Leadership Engineering
We want access to the
fastest and newest
cloud services straight
away
All of our data must
remain secure and we
want to remain in
control of it
National Institute of
Standards and Technology
The cloud infrastructure is a composition of two or more
distinct cloud infrastructures that remain unique
entities, but are bound together by a standardised or
proprietary technology that enables data and application
portability
Hybrid Cloud
Data
protection
act and cloud
computing
Data Protection Act 1998
http://www.legislation.gov.uk/ukpga/1998/29/contents
UK implementation of the 1995 EU
Directive on Data Protection 95/46/EC
The Data Protection Act applied to the processing of personal data. Data is
defined as information within:
• A relevant filing system (paper or electronic based)
• Any type of information held by a body subject to the freedom of
information act
• An accessible record (e.g. Health, Education, Housing)
• Equipment operating automatically in response to instructions (i.e. in a
computerised format
Data Protection Act 1998
The Data Subject The Data ProcessorThe Data Controller
An individual who is the
subject of personal data
A person or body which
decides what happens to the
personal data it processes
A person or body (other than
an employee of the data
controller) who process
personal data on behalf of the
data controller
If using a Data Processor a
written contract is needed
Data Protection Act 1998
Data must be:
1. Fairly and lawfully processed
2. Processed for limited purposes and not further purposes in a manner
which is incompatible with those purposes
3. Adequate, relevant, and not excessive
4. Accurate and up to date
5. Not kept longer than necessary
6. Processed in accordance with the individual’s rights
7. Secure
8. Not transferred to countries outside of the European Economic Area
unless adequate protection is provided
Data Controller
Responsibilities
Data Protection Act 1998
The Data Protection Act applied to the processing of personal data. Data
{can be} defined as information…in a computerised format.
Information is in the cloud…
therefore it is computerised
Data Protection Act 1998
The Data Protection Act applied to the processing of personal data. Data
{can be} defined as information…in a computerised format.
Information is in the cloud…
therefore it is computerised
Cloud information is
sometimes about living
identifiable people…so it is it
personal data
Data Protection Act 1998
The Data Protection Act applied to the processing of personal data.
Data {can be} defined as information…in a computerised format.
Information is in the cloud…
therefore it is computerised
Cloud information is
sometimes about living
identifiable people…so it is it
personal data
Something is happening to that
data…so it is being processed
Data Protection Act 1998
The Data Subject The Data ProcessorThe Data Controller
The person that you are
storing data about
A cloud service purchaser A cloud service provider
Data Protection Act 1998
The Data Subject
The Data Controller
The Data Processor
Has responsibility for
implementing 8 parts of DPA
Contracted to provide
adequate security
American Company
Uniting and Strengthening America by Providing Appropriate
Tools Required to Intercept and Obstruct Terrorism
Act of 2001
Data Protection Act 1998
The Data Subject
The Data Controller
The Data Processor
Has responsibility for
implementing 8 parts of DPA
Contracted to provide
adequate security
Contracted to maintain data
Using Cloud in an Enterprise Environment
Data Protection Act 1998
The Data Subject
The Data Controller
The Data Processor
Has responsibility for
implementing 8 parts of DPA
Contracted to provide
adequate security
Contracted to maintain data
Contracted to process in
accordance with rights
Here is a map of the world
Here is a map of the world
Here is a map of the world
that will potentially have the
same human rights law as us
in a few years time
Using Cloud in an Enterprise Environment
Anyone use Google Forms?
How many of these places are you comfortable in your data being?
case study of
an enterprise
hybrid cloud
model
rgu.
My Moodle Web
Application
Server
https://github.com/moodle/moodle
Can run on an AWS
T2-Micro
1 v CPU
0.5GB Memory
Application Data User DataContent Data
Boilerplate code for
moodle. Nothing really
confidential here
Material uploaded by
staff / students
Usernames & Passwords
Grade Profiles
Student Records
Application Data
Boilerplate code for
moodle. Nothing really
confidential here
Moodle Source Code
Application Data
Moodle Database
Application Data
Material uploaded by
staff / students
Moodle Source Code
Application Data
Moodle Database
Application Data
Content Data
Uploaded Lectures
Content Data
Uploaded Course
Submissions
Content Data
Uploaded Course
Information
Content Data
Usernames & Passwords
Grade Profiles
Student Records
Moodle Source Code
Application Data
Moodle Database
Application Data
Uploaded Lectures
Content Data
Uploaded Course
Submissions
Content Data
Uploaded Course
Information
Content Data
User Data
Usernames and
Passwords
User Data
Grade Profiles
User Data
Student Records
User Data
File Storage
Database
Storage
Code
storage
Moodle Source Code
Application Data
Moodle Database
Application Data
Uploaded Lectures
Content DataUploaded Course
Submissions
Content Data
Uploaded Course
Information
Content Data
Usernames and
Passwords
User Data
Grade Profiles
User Data
Student Records
User Data
File Storage
Database
Storage
Code
storage
Uploaded Lectures
Content DataUploaded Course
Submissions
Content Data
Uploaded Course
Information
Content Data
Usernames and
Passwords
User Data
Grade Profiles
User Data
Student Records
User Data
AWS EC2
Moodle Source Code
Application Data
AWS RDS
Moodle Database
Application Data
File Storage
Database
Storage
Code
storage
Uploaded Lectures
Content DataUploaded Course
Submissions
Content Data
Uploaded Course
Information
Content Data
Pr. C - File Storage
Student Records
User Data
Pr.C - Database
Passwords and Grade Profiles
User Data
AWS EC2
Moodle Source Code
Application Data
AWS RDS
Moodle Database
Application Data
File Storage
Database
Storage
Code
storage
Uploaded Lectures
Content DataUploaded Course
Submissions
Content Data
AWS RDS
Course Information
Application Data
Pr. C - File Storage
Student Records
User Data
Pr.C - Database
Passwords and Grade Profiles
User Data
AWS EC2
Moodle Source Code
Application Data
AWS RDS
Moodle Database
Application Data
File Storage
Database
Storage
Code
storage
AWS RDS
Course Information
Application Data
Pr. C - File Storage
Student Records
User Data
Pr.C - Database
Passwords and Grade Profiles
User Data
AWS EC2
Moodle Source Code
Application Data
AWS RDS
Moodle Database
Application Data
AWS D3
Uploaded Lectures
Application Data
Pr. C - File Storage
Course Submissions
Application Data
AWS RDS
Course Information
Application Data
Pr. C - File Storage
Student Records
User Data
Pr.C - Database
Passwords and Grade Profiles
User Data
AWS EC2
Moodle Source Code
Application Data
AWS RDS
Moodle Database
Application Data
AWS D3
Uploaded Lectures
Application Data
Pr. C - File Storage
Course Submissions
Application Data
Public Cloud Private Cloud
AWS RDS
Course Information
Application Data
Pr. C - File Storage
Student Records
User Data
Pr.C - Database
Passwords and Grade Profiles
User Data
AWS EC2
Moodle Source Code
Application Data
AWS RDS
Moodle Database
Application Data
AWS D3
Uploaded Lectures
Application Data
Pr. C - File Storage
Course Submissions
Application Data
Hybrid Cloud
Different cloud deployment models and their
characteristics
• Public Cloud
• Private Cloud
• Hybrid Cloud
The Data Protection Act and how it relates to
Cloud Computing
case study example of using a hybrid cloud model
in an enterprise environment

Mais conteúdo relacionado

Mais procurados

Trivadis TechEvent 2016 Big Data Privacy and Security Fundamentals by Florian...
Trivadis TechEvent 2016 Big Data Privacy and Security Fundamentals by Florian...Trivadis TechEvent 2016 Big Data Privacy and Security Fundamentals by Florian...
Trivadis TechEvent 2016 Big Data Privacy and Security Fundamentals by Florian...Trivadis
 
Beyond Privacy: Learning Data Ethics - European Big Data Community Forum 2019...
Beyond Privacy: Learning Data Ethics - European Big Data Community Forum 2019...Beyond Privacy: Learning Data Ethics - European Big Data Community Forum 2019...
Beyond Privacy: Learning Data Ethics - European Big Data Community Forum 2019...IDC4EU
 
Research Report on Preserving Data Confidentiality & Data Integrity in ...
Research Report on Preserving  Data  Confidentiality  &  Data  Integrity  in ...Research Report on Preserving  Data  Confidentiality  &  Data  Integrity  in ...
Research Report on Preserving Data Confidentiality & Data Integrity in ...Manish Sahani
 
The principles of the Data Protection Act in detail - uk
The principles of the Data Protection Act in detail - ukThe principles of the Data Protection Act in detail - uk
The principles of the Data Protection Act in detail - uk- Mark - Fullbright
 
A systematic mapping study of security, trust and privacy in clouds
A systematic mapping study of security, trust and privacy in cloudsA systematic mapping study of security, trust and privacy in clouds
A systematic mapping study of security, trust and privacy in cloudsjournalBEEI
 
The rise of big data on cloud computing
The rise of big data on cloud computing The rise of big data on cloud computing
The rise of big data on cloud computing Muhammad Maaz Irfan
 
Paperless Lab Academy 'legal aspects of big data analytics'
Paperless Lab Academy 'legal aspects of big data analytics' Paperless Lab Academy 'legal aspects of big data analytics'
Paperless Lab Academy 'legal aspects of big data analytics' Axon Lawyers
 
Big data security and privacy issues in the
Big data security and privacy issues in theBig data security and privacy issues in the
Big data security and privacy issues in theIJNSA Journal
 
Privacy Preserving Ranked Multi-Keyword Search for Multiple Data Owners in Cl...
Privacy Preserving Ranked Multi-Keyword Search for Multiple Data Owners in Cl...Privacy Preserving Ranked Multi-Keyword Search for Multiple Data Owners in Cl...
Privacy Preserving Ranked Multi-Keyword Search for Multiple Data Owners in Cl...1crore projects
 
Associates quick guide to gdpr v 1.0
Associates quick guide to gdpr v 1.0Associates quick guide to gdpr v 1.0
Associates quick guide to gdpr v 1.0Aaron Banham
 
GDPR Basics - General Data Protection Regulation
GDPR Basics - General Data Protection RegulationGDPR Basics - General Data Protection Regulation
GDPR Basics - General Data Protection RegulationVicky Dallas
 
JAVA 2013 IEEE PARALLELDISTRIBUTION PROJECT A privacy leakage upper bound con...
JAVA 2013 IEEE PARALLELDISTRIBUTION PROJECT A privacy leakage upper bound con...JAVA 2013 IEEE PARALLELDISTRIBUTION PROJECT A privacy leakage upper bound con...
JAVA 2013 IEEE PARALLELDISTRIBUTION PROJECT A privacy leakage upper bound con...IEEEGLOBALSOFTTECHNOLOGIES
 
Understanding the EU's new General Data Protection Regulation (GDPR)
Understanding the EU's new General Data Protection Regulation (GDPR)Understanding the EU's new General Data Protection Regulation (GDPR)
Understanding the EU's new General Data Protection Regulation (GDPR)Acquia
 
Getting to grips with General Data Protection Regulation (GDPR)
Getting to grips with General Data Protection Regulation (GDPR)Getting to grips with General Data Protection Regulation (GDPR)
Getting to grips with General Data Protection Regulation (GDPR)Zoodikers
 
DATA INTEGRITY PROOF (DIP) IN CLOUD STORAGE
DATA INTEGRITY PROOF (DIP) IN CLOUD STORAGEDATA INTEGRITY PROOF (DIP) IN CLOUD STORAGE
DATA INTEGRITY PROOF (DIP) IN CLOUD STORAGEijiert bestjournal
 
A privacy leakage upper bound constraint based approach for cost-effective pr...
A privacy leakage upper bound constraint based approach for cost-effective pr...A privacy leakage upper bound constraint based approach for cost-effective pr...
A privacy leakage upper bound constraint based approach for cost-effective pr...JPINFOTECH JAYAPRAKASH
 
General Data Protection Regulation (GDPR) - Moving from confusion to readiness
General Data Protection Regulation (GDPR) - Moving from confusion to readinessGeneral Data Protection Regulation (GDPR) - Moving from confusion to readiness
General Data Protection Regulation (GDPR) - Moving from confusion to readinessOmo Osagiede
 

Mais procurados (19)

Trivadis TechEvent 2016 Big Data Privacy and Security Fundamentals by Florian...
Trivadis TechEvent 2016 Big Data Privacy and Security Fundamentals by Florian...Trivadis TechEvent 2016 Big Data Privacy and Security Fundamentals by Florian...
Trivadis TechEvent 2016 Big Data Privacy and Security Fundamentals by Florian...
 
Beyond Privacy: Learning Data Ethics - European Big Data Community Forum 2019...
Beyond Privacy: Learning Data Ethics - European Big Data Community Forum 2019...Beyond Privacy: Learning Data Ethics - European Big Data Community Forum 2019...
Beyond Privacy: Learning Data Ethics - European Big Data Community Forum 2019...
 
Research Report on Preserving Data Confidentiality & Data Integrity in ...
Research Report on Preserving  Data  Confidentiality  &  Data  Integrity  in ...Research Report on Preserving  Data  Confidentiality  &  Data  Integrity  in ...
Research Report on Preserving Data Confidentiality & Data Integrity in ...
 
The principles of the Data Protection Act in detail - uk
The principles of the Data Protection Act in detail - ukThe principles of the Data Protection Act in detail - uk
The principles of the Data Protection Act in detail - uk
 
A systematic mapping study of security, trust and privacy in clouds
A systematic mapping study of security, trust and privacy in cloudsA systematic mapping study of security, trust and privacy in clouds
A systematic mapping study of security, trust and privacy in clouds
 
The rise of big data on cloud computing
The rise of big data on cloud computing The rise of big data on cloud computing
The rise of big data on cloud computing
 
J017547478
J017547478J017547478
J017547478
 
Paperless Lab Academy 'legal aspects of big data analytics'
Paperless Lab Academy 'legal aspects of big data analytics' Paperless Lab Academy 'legal aspects of big data analytics'
Paperless Lab Academy 'legal aspects of big data analytics'
 
Big data security and privacy issues in the
Big data security and privacy issues in theBig data security and privacy issues in the
Big data security and privacy issues in the
 
Privacy Preserving Ranked Multi-Keyword Search for Multiple Data Owners in Cl...
Privacy Preserving Ranked Multi-Keyword Search for Multiple Data Owners in Cl...Privacy Preserving Ranked Multi-Keyword Search for Multiple Data Owners in Cl...
Privacy Preserving Ranked Multi-Keyword Search for Multiple Data Owners in Cl...
 
Associates quick guide to gdpr v 1.0
Associates quick guide to gdpr v 1.0Associates quick guide to gdpr v 1.0
Associates quick guide to gdpr v 1.0
 
GDPR Basics - General Data Protection Regulation
GDPR Basics - General Data Protection RegulationGDPR Basics - General Data Protection Regulation
GDPR Basics - General Data Protection Regulation
 
JAVA 2013 IEEE PARALLELDISTRIBUTION PROJECT A privacy leakage upper bound con...
JAVA 2013 IEEE PARALLELDISTRIBUTION PROJECT A privacy leakage upper bound con...JAVA 2013 IEEE PARALLELDISTRIBUTION PROJECT A privacy leakage upper bound con...
JAVA 2013 IEEE PARALLELDISTRIBUTION PROJECT A privacy leakage upper bound con...
 
Understanding the EU's new General Data Protection Regulation (GDPR)
Understanding the EU's new General Data Protection Regulation (GDPR)Understanding the EU's new General Data Protection Regulation (GDPR)
Understanding the EU's new General Data Protection Regulation (GDPR)
 
Getting to grips with General Data Protection Regulation (GDPR)
Getting to grips with General Data Protection Regulation (GDPR)Getting to grips with General Data Protection Regulation (GDPR)
Getting to grips with General Data Protection Regulation (GDPR)
 
DATA INTEGRITY PROOF (DIP) IN CLOUD STORAGE
DATA INTEGRITY PROOF (DIP) IN CLOUD STORAGEDATA INTEGRITY PROOF (DIP) IN CLOUD STORAGE
DATA INTEGRITY PROOF (DIP) IN CLOUD STORAGE
 
A privacy leakage upper bound constraint based approach for cost-effective pr...
A privacy leakage upper bound constraint based approach for cost-effective pr...A privacy leakage upper bound constraint based approach for cost-effective pr...
A privacy leakage upper bound constraint based approach for cost-effective pr...
 
General Data Protection Regulation (GDPR) - Moving from confusion to readiness
General Data Protection Regulation (GDPR) - Moving from confusion to readinessGeneral Data Protection Regulation (GDPR) - Moving from confusion to readiness
General Data Protection Regulation (GDPR) - Moving from confusion to readiness
 
Ms3422732277
Ms3422732277Ms3422732277
Ms3422732277
 

Destaque

Recsys 2016 tutorial: Lessons learned from building real-life recommender sys...
Recsys 2016 tutorial: Lessons learned from building real-life recommender sys...Recsys 2016 tutorial: Lessons learned from building real-life recommender sys...
Recsys 2016 tutorial: Lessons learned from building real-life recommender sys...Xavier Amatriain
 
Hacking the Web
Hacking the WebHacking the Web
Hacking the WebMike Crabb
 
How to Make Awesome SlideShares: Tips & Tricks
How to Make Awesome SlideShares: Tips & TricksHow to Make Awesome SlideShares: Tips & Tricks
How to Make Awesome SlideShares: Tips & TricksSlideShare
 
Getting Started With SlideShare
Getting Started With SlideShareGetting Started With SlideShare
Getting Started With SlideShareSlideShare
 
Introduction to Information Architecture
Introduction to Information ArchitectureIntroduction to Information Architecture
Introduction to Information ArchitectureMike Crabb
 
11 Stats You Didn’t Know About Employee Recognition
11 Stats You Didn’t Know About Employee Recognition11 Stats You Didn’t Know About Employee Recognition
11 Stats You Didn’t Know About Employee RecognitionOfficevibe
 
Visual Design with Data
Visual Design with DataVisual Design with Data
Visual Design with DataSeth Familian
 
Pré teste
Pré testePré teste
Pré testeisa
 
A Guide to SlideShare Analytics - Excerpts from Hubspot's Step by Step Guide ...
A Guide to SlideShare Analytics - Excerpts from Hubspot's Step by Step Guide ...A Guide to SlideShare Analytics - Excerpts from Hubspot's Step by Step Guide ...
A Guide to SlideShare Analytics - Excerpts from Hubspot's Step by Step Guide ...SlideShare
 
Memorial Day Pps
Memorial Day PpsMemorial Day Pps
Memorial Day PpsBeckys47201
 
Since...
Since...Since...
Since...Anna *
 
node-db: La excusa perfecta para hablar de C++ y Node.js
node-db: La excusa perfecta para hablar de C++ y Node.jsnode-db: La excusa perfecta para hablar de C++ y Node.js
node-db: La excusa perfecta para hablar de C++ y Node.jsMariano Iglesias
 
Turning a Thousand or so Words into a Map
Turning a Thousand or so Words into a MapTurning a Thousand or so Words into a Map
Turning a Thousand or so Words into a MapCharlie Greenbacker
 
LinkedIn Information Security Talent Pool Research - Black Hat CISO Summit 20...
LinkedIn Information Security Talent Pool Research - Black Hat CISO Summit 20...LinkedIn Information Security Talent Pool Research - Black Hat CISO Summit 20...
LinkedIn Information Security Talent Pool Research - Black Hat CISO Summit 20...Cory Scott
 
Free Webinar: The Art of Converting Strategy into Projects
Free Webinar: The Art of Converting Strategy into ProjectsFree Webinar: The Art of Converting Strategy into Projects
Free Webinar: The Art of Converting Strategy into ProjectsStanfordProfessionalDevelopment
 
Crossing the Chasm from On-prem to Cloud: Managing Identities in a Hybrid World
Crossing the Chasm from On-prem to Cloud: Managing Identities in a Hybrid WorldCrossing the Chasm from On-prem to Cloud: Managing Identities in a Hybrid World
Crossing the Chasm from On-prem to Cloud: Managing Identities in a Hybrid WorldOneLogin
 

Destaque (20)

Build Features, Not Apps
Build Features, Not AppsBuild Features, Not Apps
Build Features, Not Apps
 
Recsys 2016 tutorial: Lessons learned from building real-life recommender sys...
Recsys 2016 tutorial: Lessons learned from building real-life recommender sys...Recsys 2016 tutorial: Lessons learned from building real-life recommender sys...
Recsys 2016 tutorial: Lessons learned from building real-life recommender sys...
 
Hacking the Web
Hacking the WebHacking the Web
Hacking the Web
 
How to Make Awesome SlideShares: Tips & Tricks
How to Make Awesome SlideShares: Tips & TricksHow to Make Awesome SlideShares: Tips & Tricks
How to Make Awesome SlideShares: Tips & Tricks
 
Getting Started With SlideShare
Getting Started With SlideShareGetting Started With SlideShare
Getting Started With SlideShare
 
Introduction to Information Architecture
Introduction to Information ArchitectureIntroduction to Information Architecture
Introduction to Information Architecture
 
Enabling Autonomy
Enabling AutonomyEnabling Autonomy
Enabling Autonomy
 
11 Stats You Didn’t Know About Employee Recognition
11 Stats You Didn’t Know About Employee Recognition11 Stats You Didn’t Know About Employee Recognition
11 Stats You Didn’t Know About Employee Recognition
 
Visual Design with Data
Visual Design with DataVisual Design with Data
Visual Design with Data
 
Pré teste
Pré testePré teste
Pré teste
 
A Guide to SlideShare Analytics - Excerpts from Hubspot's Step by Step Guide ...
A Guide to SlideShare Analytics - Excerpts from Hubspot's Step by Step Guide ...A Guide to SlideShare Analytics - Excerpts from Hubspot's Step by Step Guide ...
A Guide to SlideShare Analytics - Excerpts from Hubspot's Step by Step Guide ...
 
Memorial Day Pps
Memorial Day PpsMemorial Day Pps
Memorial Day Pps
 
Since...
Since...Since...
Since...
 
node-db: La excusa perfecta para hablar de C++ y Node.js
node-db: La excusa perfecta para hablar de C++ y Node.jsnode-db: La excusa perfecta para hablar de C++ y Node.js
node-db: La excusa perfecta para hablar de C++ y Node.js
 
Brand Identity
Brand IdentityBrand Identity
Brand Identity
 
Turning a Thousand or so Words into a Map
Turning a Thousand or so Words into a MapTurning a Thousand or so Words into a Map
Turning a Thousand or so Words into a Map
 
LinkedIn Information Security Talent Pool Research - Black Hat CISO Summit 20...
LinkedIn Information Security Talent Pool Research - Black Hat CISO Summit 20...LinkedIn Information Security Talent Pool Research - Black Hat CISO Summit 20...
LinkedIn Information Security Talent Pool Research - Black Hat CISO Summit 20...
 
Manual de geología
Manual de geología  Manual de geología
Manual de geología
 
Free Webinar: The Art of Converting Strategy into Projects
Free Webinar: The Art of Converting Strategy into ProjectsFree Webinar: The Art of Converting Strategy into Projects
Free Webinar: The Art of Converting Strategy into Projects
 
Crossing the Chasm from On-prem to Cloud: Managing Identities in a Hybrid World
Crossing the Chasm from On-prem to Cloud: Managing Identities in a Hybrid WorldCrossing the Chasm from On-prem to Cloud: Managing Identities in a Hybrid World
Crossing the Chasm from On-prem to Cloud: Managing Identities in a Hybrid World
 

Semelhante a Using Cloud in an Enterprise Environment

Enabling Compliance with the GDPR on AWS
Enabling Compliance with the GDPR on AWSEnabling Compliance with the GDPR on AWS
Enabling Compliance with the GDPR on AWSAmazon Web Services
 
GDPR: Raising the Bar for Security & Compliance Across the EU
GDPR: Raising the Bar for Security & Compliance Across the EUGDPR: Raising the Bar for Security & Compliance Across the EU
GDPR: Raising the Bar for Security & Compliance Across the EUAmazon Web Services
 
A proposed Solution: Data Availability and Error Correction in Cloud Computing
A proposed Solution: Data Availability and Error Correction in Cloud ComputingA proposed Solution: Data Availability and Error Correction in Cloud Computing
A proposed Solution: Data Availability and Error Correction in Cloud ComputingCSCJournals
 
Cloud computing and its security issues
Cloud computing and its security issuesCloud computing and its security issues
Cloud computing and its security issuesJyoti Srivastava
 
Security and privacy approach of cloud computing
Security and privacy approach of cloud computingSecurity and privacy approach of cloud computing
Security and privacy approach of cloud computingJahangeer Qadiree
 
Navigating GDPR Compliance on AWS
Navigating GDPR Compliance on AWSNavigating GDPR Compliance on AWS
Navigating GDPR Compliance on AWSAmazon Web Services
 
Encryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentEncryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentIOSR Journals
 
Encryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentEncryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentIOSR Journals
 
Encryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentEncryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentIOSR Journals
 
Secure Data Sharing In an Untrusted Cloud
Secure Data Sharing In an Untrusted CloudSecure Data Sharing In an Untrusted Cloud
Secure Data Sharing In an Untrusted CloudIJERA Editor
 
04 - VMUGIT - Lecce 2018 - Giampiero Petrosi, Rubrik
04 - VMUGIT - Lecce 2018 - Giampiero Petrosi, Rubrik04 - VMUGIT - Lecce 2018 - Giampiero Petrosi, Rubrik
04 - VMUGIT - Lecce 2018 - Giampiero Petrosi, RubrikVMUG IT
 
Cloud computing
Cloud computingCloud computing
Cloud computingHira Zahan
 
Navigating GDPR Compliance on AWS - AWS Online Tech Talks
Navigating GDPR Compliance on AWS - AWS Online Tech TalksNavigating GDPR Compliance on AWS - AWS Online Tech Talks
Navigating GDPR Compliance on AWS - AWS Online Tech TalksAmazon Web Services
 
Navigating GDPR Compliance on AWS
Navigating GDPR Compliance on AWS Navigating GDPR Compliance on AWS
Navigating GDPR Compliance on AWS Amazon Web Services
 
GDPR and NIS Compliance - How HyTrust Can Help
GDPR and NIS Compliance - How HyTrust Can HelpGDPR and NIS Compliance - How HyTrust Can Help
GDPR and NIS Compliance - How HyTrust Can HelpJason Lackey
 
Aes based secured framework for cloud databases
Aes based secured framework for cloud databasesAes based secured framework for cloud databases
Aes based secured framework for cloud databasesIJARIIT
 
Enabling Compliance with GDPR on AWS.pdf
Enabling Compliance with GDPR on AWS.pdfEnabling Compliance with GDPR on AWS.pdf
Enabling Compliance with GDPR on AWS.pdfAmazon Web Services
 
Kawser Hamid : ICO and Data Protection in the Cloud
Kawser Hamid : ICO and Data Protection in the CloudKawser Hamid : ICO and Data Protection in the Cloud
Kawser Hamid : ICO and Data Protection in the CloudGurbir Singh
 

Semelhante a Using Cloud in an Enterprise Environment (20)

Enabling Compliance with the GDPR on AWS
Enabling Compliance with the GDPR on AWSEnabling Compliance with the GDPR on AWS
Enabling Compliance with the GDPR on AWS
 
GDPR: Raising the Bar for Security & Compliance Across the EU
GDPR: Raising the Bar for Security & Compliance Across the EUGDPR: Raising the Bar for Security & Compliance Across the EU
GDPR: Raising the Bar for Security & Compliance Across the EU
 
A proposed Solution: Data Availability and Error Correction in Cloud Computing
A proposed Solution: Data Availability and Error Correction in Cloud ComputingA proposed Solution: Data Availability and Error Correction in Cloud Computing
A proposed Solution: Data Availability and Error Correction in Cloud Computing
 
Cloud computing and its security issues
Cloud computing and its security issuesCloud computing and its security issues
Cloud computing and its security issues
 
Security and privacy approach of cloud computing
Security and privacy approach of cloud computingSecurity and privacy approach of cloud computing
Security and privacy approach of cloud computing
 
Navigating GDPR Compliance on AWS
Navigating GDPR Compliance on AWSNavigating GDPR Compliance on AWS
Navigating GDPR Compliance on AWS
 
H017155360
H017155360H017155360
H017155360
 
Encryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentEncryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing Environment
 
Encryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentEncryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing Environment
 
Encryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentEncryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing Environment
 
Secure Data Sharing In an Untrusted Cloud
Secure Data Sharing In an Untrusted CloudSecure Data Sharing In an Untrusted Cloud
Secure Data Sharing In an Untrusted Cloud
 
04 - VMUGIT - Lecce 2018 - Giampiero Petrosi, Rubrik
04 - VMUGIT - Lecce 2018 - Giampiero Petrosi, Rubrik04 - VMUGIT - Lecce 2018 - Giampiero Petrosi, Rubrik
04 - VMUGIT - Lecce 2018 - Giampiero Petrosi, Rubrik
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Navigating GDPR Compliance on AWS - AWS Online Tech Talks
Navigating GDPR Compliance on AWS - AWS Online Tech TalksNavigating GDPR Compliance on AWS - AWS Online Tech Talks
Navigating GDPR Compliance on AWS - AWS Online Tech Talks
 
Navigating GDPR Compliance on AWS
Navigating GDPR Compliance on AWS Navigating GDPR Compliance on AWS
Navigating GDPR Compliance on AWS
 
GDPR and NIS Compliance - How HyTrust Can Help
GDPR and NIS Compliance - How HyTrust Can HelpGDPR and NIS Compliance - How HyTrust Can Help
GDPR and NIS Compliance - How HyTrust Can Help
 
Aes based secured framework for cloud databases
Aes based secured framework for cloud databasesAes based secured framework for cloud databases
Aes based secured framework for cloud databases
 
Enabling Compliance with GDPR on AWS.pdf
Enabling Compliance with GDPR on AWS.pdfEnabling Compliance with GDPR on AWS.pdf
Enabling Compliance with GDPR on AWS.pdf
 
B1802041217
B1802041217B1802041217
B1802041217
 
Kawser Hamid : ICO and Data Protection in the Cloud
Kawser Hamid : ICO and Data Protection in the CloudKawser Hamid : ICO and Data Protection in the Cloud
Kawser Hamid : ICO and Data Protection in the Cloud
 

Mais de Mike Crabb

Hard to Reach Users in Easy to Reach Places
Hard to Reach Users in Easy to Reach PlacesHard to Reach Users in Easy to Reach Places
Hard to Reach Users in Easy to Reach PlacesMike Crabb
 
Accessible and Assistive Interfaces
Accessible and Assistive InterfacesAccessible and Assistive Interfaces
Accessible and Assistive InterfacesMike Crabb
 
Accessible Everyone
Accessible EveryoneAccessible Everyone
Accessible EveryoneMike Crabb
 
The Peer Review Process
The Peer Review ProcessThe Peer Review Process
The Peer Review ProcessMike Crabb
 
Managing Quality In Qualitative Research
Managing Quality In Qualitative ResearchManaging Quality In Qualitative Research
Managing Quality In Qualitative ResearchMike Crabb
 
Analysing Qualitative Data
Analysing Qualitative DataAnalysing Qualitative Data
Analysing Qualitative DataMike Crabb
 
Conversation Discourse and Document Analysis
Conversation Discourse and Document AnalysisConversation Discourse and Document Analysis
Conversation Discourse and Document AnalysisMike Crabb
 
Ethnographic and Observational Research
Ethnographic and Observational ResearchEthnographic and Observational Research
Ethnographic and Observational ResearchMike Crabb
 
Doing Focus Groups
Doing Focus GroupsDoing Focus Groups
Doing Focus GroupsMike Crabb
 
Doing Interviews
Doing InterviewsDoing Interviews
Doing InterviewsMike Crabb
 
Designing Qualitative Research
Designing Qualitative ResearchDesigning Qualitative Research
Designing Qualitative ResearchMike Crabb
 
Introduction to Accessible Design
Introduction to Accessible DesignIntroduction to Accessible Design
Introduction to Accessible DesignMike Crabb
 
Accessible Everyone
Accessible EveryoneAccessible Everyone
Accessible EveryoneMike Crabb
 
Texture and Glyph Design
Texture and Glyph DesignTexture and Glyph Design
Texture and Glyph DesignMike Crabb
 
Pattern Perception and Map Design
Pattern Perception and Map DesignPattern Perception and Map Design
Pattern Perception and Map DesignMike Crabb
 
Dealing with Enterprise Level Data
Dealing with Enterprise Level DataDealing with Enterprise Level Data
Dealing with Enterprise Level DataMike Crabb
 
Teaching Cloud to the Programmers of Tomorrow
Teaching Cloud to the Programmers of TomorrowTeaching Cloud to the Programmers of Tomorrow
Teaching Cloud to the Programmers of TomorrowMike Crabb
 
Sql Injection and XSS
Sql Injection and XSSSql Injection and XSS
Sql Injection and XSSMike Crabb
 
Forms and Databases in PHP
Forms and Databases in PHPForms and Databases in PHP
Forms and Databases in PHPMike Crabb
 
Using mySQL in PHP
Using mySQL in PHPUsing mySQL in PHP
Using mySQL in PHPMike Crabb
 

Mais de Mike Crabb (20)

Hard to Reach Users in Easy to Reach Places
Hard to Reach Users in Easy to Reach PlacesHard to Reach Users in Easy to Reach Places
Hard to Reach Users in Easy to Reach Places
 
Accessible and Assistive Interfaces
Accessible and Assistive InterfacesAccessible and Assistive Interfaces
Accessible and Assistive Interfaces
 
Accessible Everyone
Accessible EveryoneAccessible Everyone
Accessible Everyone
 
The Peer Review Process
The Peer Review ProcessThe Peer Review Process
The Peer Review Process
 
Managing Quality In Qualitative Research
Managing Quality In Qualitative ResearchManaging Quality In Qualitative Research
Managing Quality In Qualitative Research
 
Analysing Qualitative Data
Analysing Qualitative DataAnalysing Qualitative Data
Analysing Qualitative Data
 
Conversation Discourse and Document Analysis
Conversation Discourse and Document AnalysisConversation Discourse and Document Analysis
Conversation Discourse and Document Analysis
 
Ethnographic and Observational Research
Ethnographic and Observational ResearchEthnographic and Observational Research
Ethnographic and Observational Research
 
Doing Focus Groups
Doing Focus GroupsDoing Focus Groups
Doing Focus Groups
 
Doing Interviews
Doing InterviewsDoing Interviews
Doing Interviews
 
Designing Qualitative Research
Designing Qualitative ResearchDesigning Qualitative Research
Designing Qualitative Research
 
Introduction to Accessible Design
Introduction to Accessible DesignIntroduction to Accessible Design
Introduction to Accessible Design
 
Accessible Everyone
Accessible EveryoneAccessible Everyone
Accessible Everyone
 
Texture and Glyph Design
Texture and Glyph DesignTexture and Glyph Design
Texture and Glyph Design
 
Pattern Perception and Map Design
Pattern Perception and Map DesignPattern Perception and Map Design
Pattern Perception and Map Design
 
Dealing with Enterprise Level Data
Dealing with Enterprise Level DataDealing with Enterprise Level Data
Dealing with Enterprise Level Data
 
Teaching Cloud to the Programmers of Tomorrow
Teaching Cloud to the Programmers of TomorrowTeaching Cloud to the Programmers of Tomorrow
Teaching Cloud to the Programmers of Tomorrow
 
Sql Injection and XSS
Sql Injection and XSSSql Injection and XSS
Sql Injection and XSS
 
Forms and Databases in PHP
Forms and Databases in PHPForms and Databases in PHP
Forms and Databases in PHP
 
Using mySQL in PHP
Using mySQL in PHPUsing mySQL in PHP
Using mySQL in PHP
 

Último

Computer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsComputer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsSeth Reyes
 
OpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability AdventureOpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability AdventureEric D. Schabell
 
Videogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdfVideogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdfinfogdgmi
 
20230202 - Introduction to tis-py
20230202 - Introduction to tis-py20230202 - Introduction to tis-py
20230202 - Introduction to tis-pyJamie (Taka) Wang
 
Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024D Cloud Solutions
 
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCostKubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCostMatt Ray
 
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1DianaGray10
 
Machine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfMachine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfAijun Zhang
 
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve DecarbonizationUsing IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve DecarbonizationIES VE
 
Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)Commit University
 
Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024SkyPlanner
 
Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )Brian Pichman
 
Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Adtran
 
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...Aggregage
 
AI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity WebinarAI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity WebinarPrecisely
 
UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7DianaGray10
 
Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.YounusS2
 
Bird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystemBird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystemAsko Soukka
 
How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?IES VE
 

Último (20)

Computer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsComputer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and Hazards
 
OpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability AdventureOpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability Adventure
 
Videogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdfVideogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdf
 
20230202 - Introduction to tis-py
20230202 - Introduction to tis-py20230202 - Introduction to tis-py
20230202 - Introduction to tis-py
 
Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024
 
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCostKubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
 
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
 
Machine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfMachine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdf
 
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve DecarbonizationUsing IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
 
20230104 - machine vision
20230104 - machine vision20230104 - machine vision
20230104 - machine vision
 
Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)
 
Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024
 
Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )
 
Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™
 
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
 
AI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity WebinarAI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity Webinar
 
UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7
 
Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.
 
Bird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystemBird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystem
 
How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?
 

Using Cloud in an Enterprise Environment

  • 1. webdev@rgu Using cloud in an enterprise environment
  • 2. Different cloud deployment models and their characteristics • Public Cloud • Private Cloud • Hybrid Cloud The Data Protection Act and how it relates to Cloud Computing case study example of using a hybrid cloud model in an enterprise environment Today we are covering…
  • 6. Leadership Engineering We want access to the fastest and newest cloud services straight away All of our data must remain secure and we want to remain in control of it
  • 7. National Institute of Standards and Technology Cloud computing is a model for enabling ubiquitous, convenient, on-demand network access to a shared opal of configurable computer resources that can be rapidly provisioned and released with minimal management effort or service provider interaction Cloud Computing
  • 8. National Institute of Standards and Technology The cloud infrastructure is provisioned for open use by the general public. It may be owned, managed, and operated by a business, academic, or government organisation, or some combination of them. It exists on the premises of the cloud provider. Public Cloud
  • 10. National Institute of Standards and Technology The cloud infrastructure is provisioned for exclusive use by a single organisation comprising multiple consumers. It may be owned, managed, and operated by the organisation, a third parts, or some combination of them, and it may exist on or off premises Private Cloud
  • 11. Elastic Capabilities Opex economics (operational Expense) Ease of operations time to implement data sovereignty environmental control cost predictability capex economics (Capitol Expense)
  • 12. Elastic Capabilities Opex economics (operational Expense) Ease of operations time to implement data sovereignty environmental control cost predictability capex economics (Capitol Expense) PrivateCloud PublicCloud
  • 13. Leadership Engineering We want access to the fastest and newest cloud services straight away All of our data must remain secure and we want to remain in control of it
  • 14. National Institute of Standards and Technology The cloud infrastructure is a composition of two or more distinct cloud infrastructures that remain unique entities, but are bound together by a standardised or proprietary technology that enables data and application portability Hybrid Cloud
  • 16. Data Protection Act 1998 http://www.legislation.gov.uk/ukpga/1998/29/contents UK implementation of the 1995 EU Directive on Data Protection 95/46/EC The Data Protection Act applied to the processing of personal data. Data is defined as information within: • A relevant filing system (paper or electronic based) • Any type of information held by a body subject to the freedom of information act • An accessible record (e.g. Health, Education, Housing) • Equipment operating automatically in response to instructions (i.e. in a computerised format
  • 17. Data Protection Act 1998 The Data Subject The Data ProcessorThe Data Controller An individual who is the subject of personal data A person or body which decides what happens to the personal data it processes A person or body (other than an employee of the data controller) who process personal data on behalf of the data controller If using a Data Processor a written contract is needed
  • 18. Data Protection Act 1998 Data must be: 1. Fairly and lawfully processed 2. Processed for limited purposes and not further purposes in a manner which is incompatible with those purposes 3. Adequate, relevant, and not excessive 4. Accurate and up to date 5. Not kept longer than necessary 6. Processed in accordance with the individual’s rights 7. Secure 8. Not transferred to countries outside of the European Economic Area unless adequate protection is provided Data Controller Responsibilities
  • 19. Data Protection Act 1998 The Data Protection Act applied to the processing of personal data. Data {can be} defined as information…in a computerised format. Information is in the cloud… therefore it is computerised
  • 20. Data Protection Act 1998 The Data Protection Act applied to the processing of personal data. Data {can be} defined as information…in a computerised format. Information is in the cloud… therefore it is computerised Cloud information is sometimes about living identifiable people…so it is it personal data
  • 21. Data Protection Act 1998 The Data Protection Act applied to the processing of personal data. Data {can be} defined as information…in a computerised format. Information is in the cloud… therefore it is computerised Cloud information is sometimes about living identifiable people…so it is it personal data Something is happening to that data…so it is being processed
  • 22. Data Protection Act 1998 The Data Subject The Data ProcessorThe Data Controller The person that you are storing data about A cloud service purchaser A cloud service provider
  • 23. Data Protection Act 1998 The Data Subject The Data Controller The Data Processor Has responsibility for implementing 8 parts of DPA Contracted to provide adequate security American Company
  • 24. Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism Act of 2001
  • 25. Data Protection Act 1998 The Data Subject The Data Controller The Data Processor Has responsibility for implementing 8 parts of DPA Contracted to provide adequate security Contracted to maintain data
  • 27. Data Protection Act 1998 The Data Subject The Data Controller The Data Processor Has responsibility for implementing 8 parts of DPA Contracted to provide adequate security Contracted to maintain data Contracted to process in accordance with rights
  • 28. Here is a map of the world
  • 29. Here is a map of the world
  • 30. Here is a map of the world that will potentially have the same human rights law as us in a few years time
  • 32. Anyone use Google Forms? How many of these places are you comfortable in your data being?
  • 33. case study of an enterprise hybrid cloud model
  • 35. Application Data User DataContent Data Boilerplate code for moodle. Nothing really confidential here Material uploaded by staff / students Usernames & Passwords Grade Profiles Student Records
  • 36. Application Data Boilerplate code for moodle. Nothing really confidential here Moodle Source Code Application Data Moodle Database Application Data
  • 37. Material uploaded by staff / students Moodle Source Code Application Data Moodle Database Application Data Content Data Uploaded Lectures Content Data Uploaded Course Submissions Content Data Uploaded Course Information Content Data
  • 38. Usernames & Passwords Grade Profiles Student Records Moodle Source Code Application Data Moodle Database Application Data Uploaded Lectures Content Data Uploaded Course Submissions Content Data Uploaded Course Information Content Data User Data Usernames and Passwords User Data Grade Profiles User Data Student Records User Data
  • 39. File Storage Database Storage Code storage Moodle Source Code Application Data Moodle Database Application Data Uploaded Lectures Content DataUploaded Course Submissions Content Data Uploaded Course Information Content Data Usernames and Passwords User Data Grade Profiles User Data Student Records User Data
  • 40. File Storage Database Storage Code storage Uploaded Lectures Content DataUploaded Course Submissions Content Data Uploaded Course Information Content Data Usernames and Passwords User Data Grade Profiles User Data Student Records User Data AWS EC2 Moodle Source Code Application Data AWS RDS Moodle Database Application Data
  • 41. File Storage Database Storage Code storage Uploaded Lectures Content DataUploaded Course Submissions Content Data Uploaded Course Information Content Data Pr. C - File Storage Student Records User Data Pr.C - Database Passwords and Grade Profiles User Data AWS EC2 Moodle Source Code Application Data AWS RDS Moodle Database Application Data
  • 42. File Storage Database Storage Code storage Uploaded Lectures Content DataUploaded Course Submissions Content Data AWS RDS Course Information Application Data Pr. C - File Storage Student Records User Data Pr.C - Database Passwords and Grade Profiles User Data AWS EC2 Moodle Source Code Application Data AWS RDS Moodle Database Application Data
  • 43. File Storage Database Storage Code storage AWS RDS Course Information Application Data Pr. C - File Storage Student Records User Data Pr.C - Database Passwords and Grade Profiles User Data AWS EC2 Moodle Source Code Application Data AWS RDS Moodle Database Application Data AWS D3 Uploaded Lectures Application Data Pr. C - File Storage Course Submissions Application Data
  • 44. AWS RDS Course Information Application Data Pr. C - File Storage Student Records User Data Pr.C - Database Passwords and Grade Profiles User Data AWS EC2 Moodle Source Code Application Data AWS RDS Moodle Database Application Data AWS D3 Uploaded Lectures Application Data Pr. C - File Storage Course Submissions Application Data Public Cloud Private Cloud
  • 45. AWS RDS Course Information Application Data Pr. C - File Storage Student Records User Data Pr.C - Database Passwords and Grade Profiles User Data AWS EC2 Moodle Source Code Application Data AWS RDS Moodle Database Application Data AWS D3 Uploaded Lectures Application Data Pr. C - File Storage Course Submissions Application Data Hybrid Cloud
  • 46. Different cloud deployment models and their characteristics • Public Cloud • Private Cloud • Hybrid Cloud The Data Protection Act and how it relates to Cloud Computing case study example of using a hybrid cloud model in an enterprise environment