Episode 6: The Cloud Octagon Model Framework for Cloud Adoption

Attendees Guest: Olaf Streutker Guest title: CISO Advisor Company: ABN Amro Abstract The Cloud Octagon Model is a new framework for cloud adoption (mostly SaaS adoption). The model was designed in cooperation between ABN-Amro and the Cloud Security Alliance and assists organizations to identify, represent, and assess risks in the context of their cloud implementation across multiple factors by introducing a logical approach to holistically dealing with security aspects involved in moving to the cloud. Link to CSA Cloud Octagon Model: https://cloudsecurityalliance.org/artifacts/cloud-octagon-model/   Timing   0:00 Intro and introducing the guest and ABN Amro cloud adoption methodology 12:10 The evolution of the Cloud Octagon Model and basic concepts 11:28  How ABN-Amro are dealing with IaaS/PaaS vs. SaaS 15:30 The different phases of the Cloud Octagon Model: Classification 20.30 Core banking applications in the cloud 24.20 The different phases of the Cloud Octagon Model 31.20 Summary and conclusions  

Om Podcasten

The podcast for Security Architecture Hosted by Moshe Ferber and Ariel Munafo. The world of software development has changed rapidly in the last years due to various factors – Cloud Computing, Digital Transformation, CI/CD & DevOps – they all changed the way we build new applications. Young startups today got access to enterprise-grade infrastructure enabling them to produce scalable, robust applications faster and cheaper. But as companies innovate faster, security challenges arise. The security community has not mastered yet the full art of developing software fast, at scale, and secure and variety of companies still struggle to found the right foundation for their security posture. SilverLining podcast was created to help you do just that – find the right combination of people, processes, and technologies to build more secure and reliable services. We will focus on the latest development in infrastructure and software development and talk with people who mastered how to secure those. In each episode, we will host an expert for discussion on the security aspects of new technologies and provide insights, best practices, and knowledge in creating more secure software architecture.