网络安全,云计算,石油和天然气

P. Black
{"title":"网络安全,云计算,石油和天然气","authors":"P. Black","doi":"10.2118/191563-MS","DOIUrl":null,"url":null,"abstract":"\n The rapid acceleration in the adoption of cloud services has increased the focus on cyber security. While data protection and privacy have always been key concerns in the oil and gas industry, this has frequently been achieved by isolating networks and strengthening perimeter defences. However, the weaknesses in this approach have been demonstrated, and it has masked poor practices in many areas. This paper will argue that the advent of cloud technology should not be regarded as a further challenge to security, but an opportunity to dramatically revitalise and improve a company's defences.\n We will present a systematic overview of the kind of hybrid architecture that is increasingly common in many oil and gas companies, with on-premises and cloud systems. We will examine the key areas of authentication and authorisation and examine how these must evolve to address the cloud. We will also look at key pain points, like systems integration and legacy platforms, and examine how these are accommodated in a cloud-first architecture.\n In examining the issues involved, we will see that cloud does not really introduce new security challenges but tends to highlight problems with existing practices. Historic failures to implement federated identity, or to secure and patch individual systems, or to allow unencrypted and largely insecure SQL access to corporate databases, represent a clear and present danger. By returning the focus to system security, and moving on the conversation from perimeter defence, cloud is providing a valuable service. Interestingly, this new technology also provides a range of answers, as we'll discuss, but it cannot be a universal panacea.\n While adoption grows daily, cloud is still relatively novel to many companies. The lessons learned across multiple large-scale implementations of cloud technology in production data management allows us to derive general, vendor-independent guidance on cloud architectures, cyber security issues that must be addressed, and best practices that should be followed.","PeriodicalId":441169,"journal":{"name":"Day 3 Wed, September 26, 2018","volume":"3 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Cyber Security, the Cloud, and Oil and Gas\",\"authors\":\"P. Black\",\"doi\":\"10.2118/191563-MS\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"\\n The rapid acceleration in the adoption of cloud services has increased the focus on cyber security. While data protection and privacy have always been key concerns in the oil and gas industry, this has frequently been achieved by isolating networks and strengthening perimeter defences. However, the weaknesses in this approach have been demonstrated, and it has masked poor practices in many areas. This paper will argue that the advent of cloud technology should not be regarded as a further challenge to security, but an opportunity to dramatically revitalise and improve a company's defences.\\n We will present a systematic overview of the kind of hybrid architecture that is increasingly common in many oil and gas companies, with on-premises and cloud systems. We will examine the key areas of authentication and authorisation and examine how these must evolve to address the cloud. We will also look at key pain points, like systems integration and legacy platforms, and examine how these are accommodated in a cloud-first architecture.\\n In examining the issues involved, we will see that cloud does not really introduce new security challenges but tends to highlight problems with existing practices. Historic failures to implement federated identity, or to secure and patch individual systems, or to allow unencrypted and largely insecure SQL access to corporate databases, represent a clear and present danger. By returning the focus to system security, and moving on the conversation from perimeter defence, cloud is providing a valuable service. Interestingly, this new technology also provides a range of answers, as we'll discuss, but it cannot be a universal panacea.\\n While adoption grows daily, cloud is still relatively novel to many companies. The lessons learned across multiple large-scale implementations of cloud technology in production data management allows us to derive general, vendor-independent guidance on cloud architectures, cyber security issues that must be addressed, and best practices that should be followed.\",\"PeriodicalId\":441169,\"journal\":{\"name\":\"Day 3 Wed, September 26, 2018\",\"volume\":\"3 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2018-09-24\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Day 3 Wed, September 26, 2018\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.2118/191563-MS\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Day 3 Wed, September 26, 2018","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.2118/191563-MS","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

云服务采用的迅速加速增加了对网络安全的关注。虽然数据保护和隐私一直是油气行业的关键问题,但这通常是通过隔离网络和加强外围防御来实现的。然而,这种方法的弱点已经被证明,并且它掩盖了许多领域的不良实践。本文认为,云技术的出现不应被视为对安全的进一步挑战,而应被视为一个大幅振兴和提高公司防御能力的机会。我们将系统地概述在许多石油和天然气公司中越来越常见的混合架构,包括内部部署和云系统。我们将研究身份验证和授权的关键领域,并研究这些领域必须如何发展才能解决云问题。我们还将研究关键的痛点,如系统集成和遗留平台,并研究如何在云优先架构中容纳这些痛点。在检查所涉及的问题时,我们将看到云并没有真正引入新的安全挑战,而是倾向于突出现有实践中的问题。在实现联邦身份、保护和修补单个系统、或允许对公司数据库进行未加密且基本上不安全的SQL访问方面的历史失败,都代表了一个明确而现实的危险。通过将焦点从外围防御转移到系统安全上来,云提供了一种有价值的服务。有趣的是,这项新技术也提供了一系列的答案,正如我们将讨论的,但它不是万能的。虽然云的采用率每天都在增长,但对许多公司来说,云仍然是相对新鲜的事物。从生产数据管理中云技术的多个大规模实施中吸取的经验教训使我们能够得出关于云架构、必须解决的网络安全问题以及应该遵循的最佳实践的通用、独立于供应商的指导。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Cyber Security, the Cloud, and Oil and Gas
The rapid acceleration in the adoption of cloud services has increased the focus on cyber security. While data protection and privacy have always been key concerns in the oil and gas industry, this has frequently been achieved by isolating networks and strengthening perimeter defences. However, the weaknesses in this approach have been demonstrated, and it has masked poor practices in many areas. This paper will argue that the advent of cloud technology should not be regarded as a further challenge to security, but an opportunity to dramatically revitalise and improve a company's defences. We will present a systematic overview of the kind of hybrid architecture that is increasingly common in many oil and gas companies, with on-premises and cloud systems. We will examine the key areas of authentication and authorisation and examine how these must evolve to address the cloud. We will also look at key pain points, like systems integration and legacy platforms, and examine how these are accommodated in a cloud-first architecture. In examining the issues involved, we will see that cloud does not really introduce new security challenges but tends to highlight problems with existing practices. Historic failures to implement federated identity, or to secure and patch individual systems, or to allow unencrypted and largely insecure SQL access to corporate databases, represent a clear and present danger. By returning the focus to system security, and moving on the conversation from perimeter defence, cloud is providing a valuable service. Interestingly, this new technology also provides a range of answers, as we'll discuss, but it cannot be a universal panacea. While adoption grows daily, cloud is still relatively novel to many companies. The lessons learned across multiple large-scale implementations of cloud technology in production data management allows us to derive general, vendor-independent guidance on cloud architectures, cyber security issues that must be addressed, and best practices that should be followed.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信