Flying Through Federal Thunder Clouds Navigating FedRAMP, DoD Cloud Guidance, & Cloud Cybersecurity Issues

Size: px
Start display at page:

Download "Flying Through Federal Thunder Clouds Navigating FedRAMP, DoD Cloud Guidance, & Cloud Cybersecurity Issues"

Transcription

1 Flying Through Federal Thunder Clouds Navigating FedRAMP, DoD Cloud Guidance, & Cloud Cybersecurity Issues M. Peter Adler (SRA International, Inc.) David Z. Bodenheimer (Crowell & Moring LLP) Annejanette Heckman Pickens (General Dynamics Advanced Information Systems) WMACCA Government Contractors Forum April 23, :30 2 pm 2014 Crowell & Moring LLP

2 Overview Annejanette Heckman Pickens is Assistant General Counsel for General Dynamics Advanced Information Systems where she supports the Cyber and Intelligence Solutions Division, and serves as lead counsel for General Dynamics FidelisCybersecurity Solutions, which provides network defense and digital forensics products and services to commercial enterprise and government customers. Before joining General Dynamics, Ms. Pickens served as Senior Counsel for the U.S. Public Sector region of Hewlett-Packard Company, the world s largest technology company. Ms. Pickens is a Council Member of the American Bar Association Public Contract Law Section, and the founding Chair of the Section s Cybersecurity, Privacy and Data Protection Committee. 2

3 Overview M. Peter Adler is a Vice President at SRA International, Inc., where he serves as the company s Chief Privacy Officer, Senior Counsel, Cybersecurity and Health, and leads the Government Affairs Office. In these capacities, he advises the company on compliance with legal and contractual requirements under privacy and cybersecurity laws, regulations and standards. Peter has responsibility for corporate policies, procedures and compliance for data privacy and cybersecurity. He is also the lead attorney for the SRA s Health Group, and guides the company concerning legislative and regulatory trends and developments. Peter previously served as a partner in various law firms located in Washington DC, where he advised clients on U.S. and international cybersecurity and privacy law and regulations. Immediately prior to joining SRA, Peter was the Chief Privacy Officer for UnitedHealth Group. 3

4 Overview David Z. Bodenheimer is Partner at Crowell & Moring LLP in Washington, DC. where he litigates Government Contracts disputes, including defective pricing, protests, and fraud matters. See, e.g., Supreme Foodservice GmbH v. United States, 109 Fed. Cl. 369 (2013) (won stay on $8 billion contract award); Wynne v. UTC, 463 F.3d 1261 (Fed. Cir. 2006) (defeated $299 million defective pricing claim). He has advised, trained, and defended Fortune 500 clients on public sector cybersecurity, data breach, and privacy issues (e.g., FISMA, NIST, FedRAMP, DoD) and written and lectured extensively on cloud computing and cybersecurity ( For the American Bar Association (ABA), he serves as Division Co-Chair (Security, Privacy & Information Law), Committee Co-Chair (Cybersecurity), and a member of the ABA President s Cybersecurity Legal Task Force. 4

5 Overview Cloud Computing Overview Defining the Cloud Definitions & Characteristics Service & Deployment Models Driving the Cloud IT Spending & Cost Savings Federal Cloud First Policy Other Cloud Issues Export Controls (ITAR) Global Privacy ediscovery Electronic Records & Archives Securing the Cloud NIST Standards FedRAMP DoD Cloud Guidance Acquiring the Cloud Security Issues Acquisition Challenges 5

6 Defining the Cloud Federal Definition Cloud computing is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction. 6

7 Defining the Cloud Cloud Essentials On-Demand Self-Service Broad Network Access Resource Pooling Rapid Elasticity Measured Service NIST/GAO 7

8 Defining the Cloud Service Models Cloud Software as a Service Platform as a Service Infrastructure as a Service NIST/GAO 8

9 Defining the Cloud Deployment Models Private Community Public Hybrid NIST/GAO Risk vs. Cost: Private vs. Public Cloud 9

10 Controlling the Cloud Environment Dedicated IT Hosting Provider Public IaaS Public PaaS Public SaaS Data App VM Server Storage Network Data App VM Server Storage Network Data App VM Server Storage Network Data App VM Server Storage Network Data App VM Server Storage Network Organization has Control Legend Organization and Cloud Provider Share Control Cloud Provider Has Control 10

11 Driving the Cloud Key Cloud Drivers IT Spending Trends Federal Cloud First Policy IT Spending & Cost Savings IT Spending: $45B to $79B (FY2001 to 2012) $20 Billion Federal Cloud Budget Pressures Federal pressure on IT spending 25-90% cost savings 11

12 Driving the Cloud Commerciality Drivers FASA of 1994 Agency duty to acquire commercial items to maximum extent practicable 10 U.S.C. 2377(b) FAR Maximizing the use of commercial products and services in federal acquisitions. FAR 1.102(b)(1)(i) FAR Part 12 Limited list of required clauses T&Cs governed by standard commercial practices Commercial Trends Similarly, a McKinsey survey of 250 chief information officers (CIOs) of large companies across different industries found that they expect over two-thirds of corporate applications to be virtualized by Virtualization cuts the cost of computing by up to 50 percent with savings gains from lower infrastructure operational costs. Not only are legacy applications being virtualized, new IT investments are predominantly in cloud computing. IDC estimates that 80 percent of new commercial applications deployed this year will be on cloud computing platforms House Judiciary Comm. Hearings (Castro) 12

13 Securing the Cloud Overview of Cybersecurity Threats 1. Cloud Security Threats 2. Federal Cloud Security Standards 3. FedRAMP Program 4. DoD Cloud Security Guidance 13

14 Securing the Cloud (Threats) Security Concerns 22 of 24 major federal agencies reported that they were either concerned or very concerned about the potential information security risks associated with cloud computing. Epsilon Breach Epsilon, an service provider for companies, reported a breach that affected approximately 75 client companies. addresses and customer names were affected. Epsilon has not disclosed the names of the companies affected or the total number of names stolen. However, millions of customers received notices from a growing list of of companies, making this the largest security breach ever. Conservative estimates place the number of customer addresses breached at 50 to 60 million. The number of customer s exposed may have reached 250 million.... The Epsilon breach is also significant because it highlights the risk of cloud-based computing systems and the need for greater cloud security measures. [Privacy Rights Clearinghouse, Data Breaches, Apr. 16, 2012). 14

15 Securing the Cloud (Threats) Red Cloud Rising Chinese industry analysis projects that China s cloud computing industry will continue to grow, with the overall value chain reaching between 750 billion and 1 trillion renminbi(rmb) ($122 to $163 billion USD) by Key Security Risks Surveillance. China s primary foreign intelligence collection organization... has taken an oversight role in projects for Chinese cloud computing. Security. International joint ventures may jeopardize the foreign firms information security arrangements. Offensive Operations. Chinese cloud computing infrastructure could be used for offensive cyber operations... 15

16 Securing the Cloud OMB Security Factors Carefully define security & privacy requirements Determine extent to which negotiated service agreements are required to satisfy security Assess the extent to which the server and client-side computing environment meets security needs Continue to maintain security management practices, controls, and accountability OMB Security Policy The Federal Government will create a transparent security environment between cloud providers and cloud consumers. The environment will move us to a level where the Federal Government s understanding and ability to assess its security posture will be superior to what is provided within agencies today. 16

17 Securing the Cloud NIST Key Security Issues NIST Security Governance Compliance Data Location Trust Architecture Identity & Access Management Data Protection Availability Incident Response NIST SP ,Guidelines on Security and Privacy in Public Cloud Computing (Dec. 2011) 17

18 Securing the Cloud FedRAMP Cloud Security FedRAMP Program Government-wide cloud program Standardized authorization process Purpose: approve once and use often Avoid inconsistent agency standards FedRAMP Responsibilities GSA Lead Responsibility FedRAMP Program & Definition Agency Responsibilities Agency-Level Implementation Continuous Monitoring Configuration mgmt. Change analysis Periodic monitoring Security Controls NIST FIPS

19 Securing the Cloud FedRAMP Templates Initial Documentation System Security Plan (SSP) Template Contingency Plan Template FIPS 199 Template Privacy Threshold Analysis & Privacy Impact Control Implementation Summary Template Control Tailoring Workbook (CTW) Template e-authentication Template Rules of Behavior (RoB) Template SAP/SAR Security Assessment Plan (SAP) Template Security Assessment Test Cases Security Assessment Report (SAR) Template Continuous Monitoring Security Assessment Plan (Annual Assessment) Annual Security Assessment Report (SAR) Self-Attestation Template FedRAMP Key Documents Branding Guidance Cloud Best Practices White Paper Concept of Operations (CONOPS) Continuous Monitoring Strategy Guide Control Quick Guide Control-Specific Contract Clauses Guide to Understanding FedRAMP Incident Communications Procedure JAB Charter Package Request Form Policy Memo (OMB) Security Controls Significant Change Form Standard Contract Clauses 19

20 Securing the Cloud FedRAMP Security Process Security Control Selection NIST , Rev. 3 NIST , Rev. 4 (soon) Security Control Implementation System Security Plan (SSP) Security Assessment Plan (SAP) Security Assessment Report (SAR) Third Party Assessments (3PAO) Independent verification/validation List of approved 3PAOs Contract Clauses Standard clauses Special clauses (data location, audit, encryption, incident reporting, etc.) FedRAMP Process 20

21 Securing the Cloud FedRAMP Security Controls (Part 1) 21

22 Securing the Cloud FedRAMP Security Controls (Part 2) 22

23 Securing the Cloud FedRAMP 2.0 Security Controls Low & Moderate impact only Not High impact (only 20% = high) Changes Add additional security controls Update to NIST , Rev. 4 Federal Agencies & FedRAMP DoD adding controls Other agencies not adding controls FedRAMP Changes The General Services Administration is updating governmentwide standards for securing cloud solutions and expects to release those changes within the next three months. The 298 security controls under FedRAMP are based on National Institute of Standards and Technology guidelines, which govern how agencies should secure their information technology systems. NIST updated those guidelines last year. GSA will release plans in the coming weeks for cloud providers under FedRAMP to transition to the new standards, said Matt Goodrich, program manager for FedRAMP. GSA to Update Federal Cloud Standards, Federal Times (Apr. 2, 2014) 23

24 Securing the Cloud FedRAMPATOs AINS, Inc. SaaS ecasessaas Amazon Web Services IaaS AWS East/West Public Cloud Amazon Web Services IaaS AWS Gov. Community Cloud U.S. Dept. of Agriculture IaaS USDA Na. Information Technology Center IaaS FedRAMP Website: Cloud Service Provider Authority to Operate (3/31/14) Provisional ATOs Akamai (Iaas) AT&T (Iaas) Autonomic Resources LLC (IaaS) CGI Federal (IaaS) Concurrent Technologies (SaaS) Hewlett Packard (Iaas) IBM (IaaS) Lockheed Martin (IaaS) Microsoft (IaaS & PaaS) Oracle (PaaS) 24

25 Securing the Cloud DoD Cloud Controls Summary of DoD Controls 25

26 Securing the Public Cloud DoD Cloud Controls DoD Policy Memo Centralized Control DISA as Cloud Service Broker Scope Commercial Cloud Services Low Impact only DISN GIG Flag panel (Moderate) Security Controls Over & above FedRAMP Matrix List of controls 26

27 Securing the Public Cloud DoD Cloud Matrix Physical Access DoD IG access to CSP data center Personnel Access U.S. citizens only Nondisclosure Agreements NDAs for all CSP personnel Data Breach Notification to DoD within 60 minutes Indemnification CSPs indemnify DoD Insurance CSPs must have cyber insurance Acquisition Issues Commercial Items Standard commercial practices Competition Unduly restrictive specifications FedRAMP Government-wide program Executive Order Harmonization of standards Public Notice & Comment APAstandards 27

28 Acquiring the Cloud Key Acquisition Issues Selection: Service/Deployment Model Provider/End-User Agreement Service-Level Agreement Roles & Responsibilities Standards (e.g., NIST) Security Privacy e-discovery FOIA e-records (e.g., Federal Records Act) Acquisition Challenges Obtaining guidance: Existing federal guidance for using cloud services may be insufficient or incomplete. Agencies cited a number of areas where additional guidance is needed such as purchasing commodity IT and assessing Federal Information Security Management Act security levels.... Acquiring knowledge and expertise: Agencies may not have the necessary tools or resources, such as expertise among staff, to implement cloud solutions. DHS officials explained that delivering cloud services without direct knowledge of the technologies has been difficult. Similarly, an HHS official stated that teaching their staff an entirely new set of processes and tools such as monitoring performance in the cloud environment has been a challenge. Ensuring data portability and interoperability: To preserve their ability to change vendors in the future, agencies may attempt to avoid platforms or technologies that lock customers into a particular product. For example, a Treasury official explained that it is challenging to separate from a vendor, in part due to a lack of visibility into the vendor s infrastructure and data. [GAO ] 28

29 Acquiring the Cloud Best Practice Topics Acquisition Best Practices 29

30 Acquiring the Cloud Security Questions Privacy Questions 30

31 Acquiring the Cloud Other Acquisition Issues Security Restrictions for Particular Countries o Trade Agreement Countries Okay (Yemen, Somalia, Afghanistan) o Non-Trade Agreement Countries Barred (e.g., Brazil, India) Security Restrictions for Cloud Type o Government Community Cloud o Greater security upheld Sample RFP Problems Insufficient Federal Cloud Guidance (GAO Report , 2012) Organizational Conflicts of Interest (Cloud Services vs. Oversight) Solicitation Ambiguities (e.g., DOI) Technosource Info Sys., B , 2011 CPD

32 Governing the Cloud Data Governance Approach to Managing Risks in the Cloud Moving from an Operational to a Governance View 32

33 Governing the Cloud Trend Toward Shared Responsibility Cloud services necessitate a move from taking direct control to setting organizational objectives and requirements Trust but verify Metrics and measures and key performance indicators and some degrees of monitoring Verify what is going on a regular basis Meet this as a joint responsibility Requires some shared responsibilities between the CSP and Customer Work with CSP to help them understand mission and goals Tell CSP they cannot indemnify themselves from every liability FFIEC, FedRAMP, EU Opinion all acknowledge or suggest shared responsibilities for compliance in the cloud 33

34 Shared Approach: Trust but Verify Plan Learn as much as possible about the entire IT environment for data being placed into the cloud Identify and document compliance requirements Create roadmap of controls with clear roles and responsibilities for the organization and cloud provider (and include in contract) Implement Implement controls to meet enterprise compliance requirements Identify and document controls owned by cloud provider Include additional requirements in Service Level Agreements Verify Verify that all control objectives are met Verify that all key controls are designed and operating effectively 34

35 Data Governance Model Applied to the Cloud Organizational Roles p Data Stakeholders q Data Governance Office (DGO) r Data Stewards Rules of Engagement and Control j MISSION Shared Responsibility Focus Areas k Compliance Metrics/Success Factors Verification Decision Rights m Accountabilities Controls n o Processes To achieve Develop a value statement Prepare a Roadmap l Data Rules and Definitions Plan and fund Design the program Deploy the Program Govern the Data Montor, measure, report s Data Governance Processes Business/IT processes that touch data Rules of Engagement 1. Mission (Org) 2. Goals, governance, metrics and success measures and verification (Org/CSP) 3. Data Rules and Definitions (Org/CSP) 4. Decisions Rights (Org/CSP) 5. Accountabilities (Org/CSP) 6. Controls (Org/CSP) People and Organizational Bodies 7. Data Stakeholders (Org) 8. Data Governance Office (Org) 9. Data Stewards (Org/CSP) Processes 10. Proactive, reactive and continuous data governance processes (Org) Source: Data Governance Institute 35

36 Negotiating Cloud Provider Contract Terms under a Data Governance Model Service Contract Due Diligence Service Level Agreements Moving toward Shared Responsibility 36

37 Due Diligence Transparency Old Way CSP s were wary about providing information on how information is protected inside the cloud What controls are being used? What standards are being followed and how are they being met? What documentation will you share? Claimed that they couldn t give tremendous transparency because it may affect other customers Adversaries may use the information against other customers Emerging Way Cloud providers are providing documentation of controls and compliance based on third party validation e.g., Amazon Web Services: Risk and Compliance White Paper, November 2013, CarpathiaHosting Other cloud providers will work with their customers to satisfy their customers additional needs for additional cost 37

38 Contract Terms and Difficult Areas Key Contract Terms Scope of Information Protected Definition of Security Restrictions on Use and Disclosure Audit Rights Security Breach/Incident Repose Access to Information Return and Disposal Business Continuity/Disaster Recovery Indemnification Insurance Limitations of Liability Compliance Difficult Areas Data Location Identity and the use of subcontractors The absence of meaningful penalties Data retention or data disposal Portability 38

39 Contract Negotiations Start with the premise of shared responsibility The CSP s standard contract terms may need to changes to support a model of shared responsibility Include operational metrics, security metrics in dashboard reports and in more detail upon request Don t only list these in their terms of service of what you are purchasing, because the CSP unilaterally can change them. Include them in the contract and reference their inclusion in later SLAs Maintain these terms for the life of the agreement unless modifications are agreed in writing by both parties Keep these terms at the operational or governing level so that governance is made part of the contract Incorporate by reference written representations of compliance 39

40 Service Level Agreements Service Level Agreements (SLAs) are agreements under the overall cloud computing contract between a CSP and Customer SLAs define acceptable service levels to be provided by the CSP to its customers in measurable terms SLA performance clauses should be consistent with the performance clauses within the contract. As a best practice, SLAs should: clearly define how performance is guaranteed (such as response time resolution/mitigation time, availability, etc.) require CSPs to monitor and periodically report their service levels Provide a dashboard where customer can continuously verify that service levels are being met provide timely notification of a failure to meet the SLAs provide documented evidence that problems have been resolved or mitigated include rights and remedies for nonperformance 40

41 Encryption: Extend it to the Cloud In transit, at rest. Just encrypt If they are providing storage only, then it makes sense, but planning is necessary Key management Have a key escrow Archive keys Crypto at rest Evaluate against a standard such as NIST

42 Practical Lessons Learned Practical Tips for the Federal Cloud 1. Prepare for the Cloud It s coming. 2. Think commercial first. 3. Define agency needs. 4. Scrub the requirements. 5. Build in security. 6. Use available guidance (OMB, NIST, FedRAMP). 7. Prepare for lessons learned. 42

43 Questions? David Z. Bodenheimer M. Peter Adler Crowell & Moring LLP SRA International, Inc. (202) (703) crowell.com

Overview. FedRAMP CONOPS

Overview. FedRAMP CONOPS Concept of Operations (CONOPS) Version 1.0 February 7, 2012 Overview Cloud computing technology allows the Federal Government to address demand from citizens for better, faster services and to save resources,

More information

Seeing Though the Clouds

Seeing Though the Clouds Seeing Though the Clouds A PM Primer on Cloud Computing and Security NIH Project Management Community Meeting Mark L Silverman Are You Smarter Than a 5 Year Old? 1 Cloud First Policy Cloud First When evaluating

More information

December 8, 2011. Security Authorization of Information Systems in Cloud Computing Environments

December 8, 2011. Security Authorization of Information Systems in Cloud Computing Environments December 8, 2011 MEMORANDUM FOR CHIEF INFORMATION OFFICERS FROM: SUBJECT: Steven VanRoekel Federal Chief Information Officer Security Authorization of Information Systems in Cloud Computing Environments

More information

Federal Risk and Authorization Management Program (FedRAMP)

Federal Risk and Authorization Management Program (FedRAMP) Federal Risk and Authorization Management Program (FedRAMP) NIST June 5, 2013 Matt Goodrich, JD FedRAMP, Program Manager Federal Cloud Computing Initiative OCSIT GSA What is FedRAMP? FedRAMP is a government-wide

More information

CRISIS MANAGEMENT AND FIRST AID: WHEN GOVERNMENT CONTRACTORS ARE THE HEADLINERS WELCOME

CRISIS MANAGEMENT AND FIRST AID: WHEN GOVERNMENT CONTRACTORS ARE THE HEADLINERS WELCOME CRISIS MANAGEMENT AND FIRST AID: WHEN GOVERNMENT CONTRACTORS ARE THE HEADLINERS WELCOME CYBER CRISIS MANAGEMENT: ARE YOU PREPARED? Evan Wolff David Bodenheimer Kelly Currie Kate Growley Overview Cybersecurity

More information

FedRAMP Government Discussion Matt Goodrich, FedRAMP Director

FedRAMP Government Discussion Matt Goodrich, FedRAMP Director FedRAMP Government Discussion Matt Goodrich, FedRAMP Director January 14, 2015 [classification marking] PAGE FedRAMP Overview Ensuring Secure Cloud Computing FedRAMP was established via OMB Memo in December

More information

Allison Stanton Director of E-Discovery U.S. Department of Justice, Civil Division

Allison Stanton Director of E-Discovery U.S. Department of Justice, Civil Division Allison Stanton Director of E-Discovery U.S. Department of Justice, Civil Division Jason R. Baron Director of Litigation National Archives and Records Administration 1 Overview Cloud Computing Defined

More information

Creating Effective Cloud Computing Contracts for the Federal Government

Creating Effective Cloud Computing Contracts for the Federal Government Creating Effective Cloud Computing Contracts for the Federal Government Best Practices for Acquiring IT as a Service A joint publication of the In coordination with the Federal Cloud Compliance Committee

More information

The Cloud Seen from the U.S.A.

The Cloud Seen from the U.S.A. The Cloud Seen from the U.S.A. Stephen R. Bell, Counselor to the U.S. Coordinator, International Communications and Information Policy, U.S. Department of State OUTLINE Commercial drivers of Cloud services

More information

The Council of the Inspectors General on Integrity and Efficiency s Cloud Computing Initiative

The Council of the Inspectors General on Integrity and Efficiency s Cloud Computing Initiative The Council of the Inspectors General on Integrity and Efficiency s Cloud Computing Initiative September 2014 Council of the Inspectors General on Integrity and Efficiency Cloud Computing Initiative Executive

More information

Cloud Security. A Sales Guy Talks About DoD s Cautious Journey to the Public Cloud. Sean Curry Sales Executive, Aquilent

Cloud Security. A Sales Guy Talks About DoD s Cautious Journey to the Public Cloud. Sean Curry Sales Executive, Aquilent Cloud Security A Sales Guy Talks About DoD s Cautious Journey to the Public Cloud Sean Curry Sales Executive, Aquilent The first in a series of audits DoD did not fully execute elements of the July 2012

More information

GAO INFORMATION TECHNOLOGY REFORM. Progress Made but Future Cloud Computing Efforts Should be Better Planned

GAO INFORMATION TECHNOLOGY REFORM. Progress Made but Future Cloud Computing Efforts Should be Better Planned GAO July 2012 United States Government Accountability Office Report to the Subcommittee on Federal Financial Management, Government Information, Federal Services, and International Security, Committee

More information

CLOUD COMPUTING. Agencies Need to Incorporate Key Practices to Ensure Effective Performance

CLOUD COMPUTING. Agencies Need to Incorporate Key Practices to Ensure Effective Performance United States Government Accountability Office Report to Congressional Requesters April 2016 CLOUD COMPUTING Agencies Need to Incorporate Key Practices to Ensure Effective Performance GAO-16-325 April

More information

Allison Stanton, Director of E-Discovery U.S. Department of Justice, Civil Division. U.S. Department of Agriculture

Allison Stanton, Director of E-Discovery U.S. Department of Justice, Civil Division. U.S. Department of Agriculture Allison Stanton, Director of E-Discovery U.S. Department of Justice, Civil Division Benjamin Young, Assistant General Counsel U.S. Department of Agriculture 1 Disclaimer The views expressed in this presentation

More information

How To Use Cloud Computing For Federal Agencies

How To Use Cloud Computing For Federal Agencies Cloud Computing Briefing Scott Renda Office of Management and Budget www.whitehouse.gov/omb/egov Cloud Computing Basics Style of computing Cloud Computing: What Does it Mean? Close public/private sector

More information

Cloud Computing Best Practices. Creating Effective Cloud Computing Contracts for the Federal Government: Best Practices for Acquiring IT as a Service

Cloud Computing Best Practices. Creating Effective Cloud Computing Contracts for the Federal Government: Best Practices for Acquiring IT as a Service Cloud Computing Best Practices Cloud Computing Best Practices Creating Effective Cloud Computing Contracts for the Federal Government: Best Practices for Acquiring IT as a Service Overview Cloud Computing

More information

Written Testimony. Mark Kneidinger. Director, Federal Network Resilience. Office of Cybersecurity and Communications

Written Testimony. Mark Kneidinger. Director, Federal Network Resilience. Office of Cybersecurity and Communications Written Testimony of Mark Kneidinger Director, Federal Network Resilience Office of Cybersecurity and Communications U.S. Department of Homeland Security Before the U.S. House of Representatives Committee

More information

The Keys to the Cloud: The Essentials of Cloud Contracting

The Keys to the Cloud: The Essentials of Cloud Contracting The Keys to the Cloud: The Essentials of Cloud Contracting September 30, 2014 Bert Kaminski Assistant General Counsel, Oracle North America Ken Adler Partner, Loeb & Loeb LLP Akiba Stern Partner, Loeb

More information

Cloud Security for Federal Agencies

Cloud Security for Federal Agencies Experience the commitment ISSUE BRIEF Rev. April 2014 Cloud Security for Federal Agencies This paper helps federal agency executives evaluate security and privacy features when choosing a cloud service

More information

Esri Managed Cloud Services and FedRAMP

Esri Managed Cloud Services and FedRAMP Federal GIS Conference February 9 10, 2015 Washington, DC Esri Managed Cloud Services and FedRAMP Erin Ross & Michael Young Agenda Esri Managed Services Program Overview Example Deployments New FedRAMP

More information

A COALFIRE PERSPECTIVE. Moving to the Cloud. NCHELP Spring Convention Panel May 2012

A COALFIRE PERSPECTIVE. Moving to the Cloud. NCHELP Spring Convention Panel May 2012 A COALFIRE PERSPECTIVE Moving to the Cloud A Summary of Considerations for Implementing Cloud Migration Plans into New Business Platforms NCHELP Spring Convention Panel May 2012 DALLAS DENVER LOS ANGELES

More information

CLOUD COMPUTING. Additional Opportunities and Savings Need to Be Pursued

CLOUD COMPUTING. Additional Opportunities and Savings Need to Be Pursued United States Government Accountability Office Report to Congressional Requesters September 2014 CLOUD COMPUTING Additional Opportunities and Savings Need to Be Pursued GAO-14-753 September 2014 CLOUD

More information

Audit of the CFPB s Acquisition and Contract Management of Select Cloud Computing Services

Audit of the CFPB s Acquisition and Contract Management of Select Cloud Computing Services O F F I C E O F IN S P E C TO R GENERAL Audit Report 2014-IT-C-016 Audit of the CFPB s Acquisition and Contract Management of Select Cloud Computing Services September 30, 2014 B O A R D O F G O V E R

More information

Management of Cloud Computing Contracts and Environment

Management of Cloud Computing Contracts and Environment Management of Cloud Computing Contracts and Environment Audit Report Report Number IT-AR-14-009 September 4, 2014 Cloud computing contracts did not comply with Postal Service standards. Background The

More information

How to Use the Federal Risk and Authorization Management Program (FedRAMP) for Cloud Computing

How to Use the Federal Risk and Authorization Management Program (FedRAMP) for Cloud Computing How to Use the Federal Risk and Authorization Management Program (FedRAMP) for Cloud Computing Warren S. Udy, CISSP Senior Cyber Security Advisor Office of Cyber Security 301-903-5515 warren.udy@hq.doe.gov

More information

STATEMENT OF. Dr. David McClure Associate Administrator Office of Citizen Services and Innovative Technologies General Services Administration

STATEMENT OF. Dr. David McClure Associate Administrator Office of Citizen Services and Innovative Technologies General Services Administration STATEMENT OF Dr. David McClure Associate Administrator Office of Citizen Services and Innovative Technologies General Services Administration BEFORE THE HOUSE COMMITTEE ON HOMELAND SECURITY SUBCOMMITTEE

More information

OFFICE OF AUDITS & ADVISORY SERVICES CLOUD COMPUTING AUDIT FINAL REPORT

OFFICE OF AUDITS & ADVISORY SERVICES CLOUD COMPUTING AUDIT FINAL REPORT County of San Diego Auditor and Controller OFFICE OF AUDITS & ADVISORY SERVICES CLOUD COMPUTING AUDIT FINAL REPORT Chief of Audits: Juan R. Perez Audit Manager: Lynne Prizzia, CISA, CRISC Senior Auditor:

More information

Cloud Services The Path Forward. Mr. Stan Kaczmarczyk Acting Director - Strategic Solutions and Security Services FAS/ ITS, GSA

Cloud Services The Path Forward. Mr. Stan Kaczmarczyk Acting Director - Strategic Solutions and Security Services FAS/ ITS, GSA Cloud Services The Path Forward Mr. Stan Kaczmarczyk Acting Director - Strategic Solutions and Security Services FAS/ ITS, GSA November 1, 2012 Agenda Integrated Technology Services (ITS) Cloud Acquisition

More information

Cloud Computing Contract Clauses

Cloud Computing Contract Clauses Cloud Computing Contract Clauses Management Advisory Report Report Number SM-MA-14-005-DR April 30, 2014 Highlights The 13 cloud computing contracts did not address information accessibility and data security

More information

U.S. HOUSE OF REPRESENTATIVES SUBCOMMITTEE ON TECHNOLOGY AND INNOVATION COMMITTEE ON SCIENCE, SPACE, AND TECHNOLOGY HEARING CHARTER

U.S. HOUSE OF REPRESENTATIVES SUBCOMMITTEE ON TECHNOLOGY AND INNOVATION COMMITTEE ON SCIENCE, SPACE, AND TECHNOLOGY HEARING CHARTER U.S. HOUSE OF REPRESENTATIVES SUBCOMMITTEE ON TECHNOLOGY AND INNOVATION COMMITTEE ON SCIENCE, SPACE, AND TECHNOLOGY HEARING CHARTER The Next IT Revolution?: Cloud Computing Opportunities and Challenges

More information

Cloud Assessments. Federal Computer Security Managers Forum. John Connor, IT Security Specialist, OISM, NIST. Meeting.

Cloud Assessments. Federal Computer Security Managers Forum. John Connor, IT Security Specialist, OISM, NIST. Meeting. Cloud Assessments SaaS Email Working Group John Connor, IT Security Specialist, OISM, NIST Meeting August, 2015 Background Photo - JILA strontium atomic clock (a joint institute of NIST and the University

More information

ITL BULLETIN FOR JUNE 2012 CLOUD COMPUTING: A REVIEW OF FEATURES, BENEFITS, AND RISKS, AND RECOMMENDATIONS FOR SECURE, EFFICIENT IMPLEMENTATIONS

ITL BULLETIN FOR JUNE 2012 CLOUD COMPUTING: A REVIEW OF FEATURES, BENEFITS, AND RISKS, AND RECOMMENDATIONS FOR SECURE, EFFICIENT IMPLEMENTATIONS ITL BULLETIN FOR JUNE 2012 CLOUD COMPUTING: A REVIEW OF FEATURES, BENEFITS, AND RISKS, AND RECOMMENDATIONS FOR SECURE, EFFICIENT IMPLEMENTATIONS Shirley Radack, Editor Computer Security Division Information

More information

Cloud Computing in the Federal Sector: What is it, what to worry about, and what to negotiate.

Cloud Computing in the Federal Sector: What is it, what to worry about, and what to negotiate. Cloud Computing in the Federal Sector: What is it, what to worry about, and what to negotiate. Presented by: Sabrina M. Segal, USITC, Counselor to the Inspector General, Sabrina.segal@usitc.gov Reference

More information

Cloud Computing. Report No. OIG-AMR-74-14-03. UNITED STATES GOVERNMENT National Labor Relations Board Office of Inspector General.

Cloud Computing. Report No. OIG-AMR-74-14-03. UNITED STATES GOVERNMENT National Labor Relations Board Office of Inspector General. UNITED STATES GOVERNMENT National Labor Relations Board Office of Inspector General Cloud Computing Report No. OIG-AMR-74-14-03 October 21, 2014 CONTENTS EXECUTIVE SUMMARY... 1 BACKGROUND... 2 OBJECTIVE,

More information

Cloud Computing: Legal Risks and Best Practices

Cloud Computing: Legal Risks and Best Practices Cloud Computing: Legal Risks and Best Practices A Bennett Jones Presentation Toronto, Ontario Lisa Abe-Oldenburg, Partner Bennett Jones LLP November 7, 2012 Introduction Security and Data Privacy Recent

More information

Health + Government in the

Health + Government in the Health + Government in the Cloud Legal / Regulatory Framework + Developments Presented by Kaiser Wahab, Wahab & Medenica LLC Benefits of Cloud are Now Well Known What is cloud computing?: From the FL State

More information

I. U.S. Government Privacy Laws

I. U.S. Government Privacy Laws I. U.S. Government Privacy Laws A. Privacy Definitions and Principles a. Privacy Definitions i. Privacy and personally identifiable information (PII) b. Privacy Basics Definition of PII 1. Office of Management

More information

Security Authorization Process Guide

Security Authorization Process Guide Security Authorization Process Guide Office of the Chief Information Security Officer (CISO) Version 11.1 March 16, 2015 TABLE OF CONTENTS Introduction... 1 1.1 Background... 1 1.2 Purpose... 2 1.3 Scope...

More information

Federal Aviation Administration. efast. Cloud Computing Services. 25 October 2012. Federal Aviation Administration

Federal Aviation Administration. efast. Cloud Computing Services. 25 October 2012. Federal Aviation Administration efast Cloud Computing Services 25 October 2012 1 Bottom Line Up Front The FAA Cloud Computing Vision released in 2012 identified the agency's road map to meet the Cloud First Policy efast must provide

More information

Top 10 Tips and Tools for Meeting Regulatory Requirements and Managing Cloud Computing Providers in the United States and Around the World

Top 10 Tips and Tools for Meeting Regulatory Requirements and Managing Cloud Computing Providers in the United States and Around the World Top 10 Tips and Tools for Meeting Regulatory Requirements and Managing Cloud Computing Providers in the United States and Around the World Web Hull Privacy, Data Protection, & Compliance Advisor Society

More information

Data Privacy, Security, and Risk Management in the Cloud

Data Privacy, Security, and Risk Management in the Cloud Data Privacy, Security, and Risk Management in the Cloud Diana S. Hare, Associate General Counsel and Chief Privacy Counsel, Drexel University David W. Opderbeck, Counsel, Gibbons P.C. Robin Rosenberg,

More information

FedRAMP Standard Contract Language

FedRAMP Standard Contract Language FedRAMP Standard Contract Language FedRAMP has developed a security contract clause template to assist federal agencies in procuring cloud-based services. This template should be reviewed by a Federal

More information

When Security, Privacy and Forensics Meet in the Cloud

When Security, Privacy and Forensics Meet in the Cloud When Security, Privacy and Forensics Meet in the Cloud Dr. Michaela Iorga, Senior Security Technical Lead for Cloud Computing Co-Chair, Cloud Security WG Co-Chair, Cloud Forensics Science WG March 26,

More information

GAO. INFORMATION SECURITY Governmentwide Guidance Needed to Assist Agencies in Implementing Cloud Computing

GAO. INFORMATION SECURITY Governmentwide Guidance Needed to Assist Agencies in Implementing Cloud Computing GAO For Release on Delivery Expected at 10:00 a.m. EDT Thursday, July 1, 2010 United States Government Accountability Office Testimony Before the Committee on Oversight and Government Reform and Its Subcommittee

More information

Cloud Computing Cluster Introduction to Cloud Computing. Rick Martin, Co-chair, Cloud Computing Cluster August 26, 2013

Cloud Computing Cluster Introduction to Cloud Computing. Rick Martin, Co-chair, Cloud Computing Cluster August 26, 2013 From Science to Solutions Cloud Computing Cluster Introduction to Cloud Computing Rick Martin, Co-chair, Cloud Computing Cluster August 26, 2013 Senior IT Strategist SAIC What is Cloud Computing? Cloud

More information

Security Issues in Cloud Computing

Security Issues in Cloud Computing Security Issues in Computing CSCI 454/554 Computing w Definition based on NIST: A model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources

More information

WRITTEN TESTIMONY OF NICKLOUS COMBS CHIEF TECHNOLOGY OFFICER, EMC FEDERAL ON CLOUD COMPUTING: BENEFITS AND RISKS MOVING FEDERAL IT INTO THE CLOUD

WRITTEN TESTIMONY OF NICKLOUS COMBS CHIEF TECHNOLOGY OFFICER, EMC FEDERAL ON CLOUD COMPUTING: BENEFITS AND RISKS MOVING FEDERAL IT INTO THE CLOUD WRITTEN TESTIMONY OF NICKLOUS COMBS CHIEF TECHNOLOGY OFFICER, EMC FEDERAL ON CLOUD COMPUTING: BENEFITS AND RISKS MOVING FEDERAL IT INTO THE CLOUD BEFORE THE COMMITTEE ON OVERSIGHT AND GOVERNMENT REFORM

More information

IT-CNP, Inc. Capability Statement

IT-CNP, Inc. Capability Statement Securing America s Infrastructure Security Compliant IT Operations Hosting Cyber Security Information FISMA Cloud Management Hosting Security Compliant IT Logistics Hosting 1 IT-CNP, Inc. is a Government

More information

The Cloud Computing Revolution: Beyond the Hype

The Cloud Computing Revolution: Beyond the Hype The Cloud Computing Revolution: Beyond the Hype KEN ADLER Partner and Chair, Technology and Outsourcing Practice Group Loeb & Loeb LLP Outsourcing in Financial Services Program October 19, 2010 Overview

More information

ITL BULLETIN FOR MARCH 2012 GUIDELINES FOR IMPROVING SECURITY AND PRIVACY IN PUBLIC CLOUD COMPUTING

ITL BULLETIN FOR MARCH 2012 GUIDELINES FOR IMPROVING SECURITY AND PRIVACY IN PUBLIC CLOUD COMPUTING ITL BULLETIN FOR MARCH 2012 GUIDELINES FOR IMPROVING SECURITY AND PRIVACY IN PUBLIC CLOUD COMPUTING Shirley Radack, Editor Computer Security Division Information Technology Laboratory National Institute

More information

Software as a Service: Guiding Principles

Software as a Service: Guiding Principles Software as a Service: Guiding Principles As the Office of Information Technology (OIT) works in partnership with colleges and business units across the University, its common goals are to: substantially

More information

Cloud Computing. Mike Bourgeois Platform as a Service Point of View September 17, 2015

Cloud Computing. Mike Bourgeois Platform as a Service Point of View September 17, 2015 Cloud Computing Mike Bourgeois Platform as a Service Point of View September 17, 2015 Agenda Cloud Computing Definition Platform as a Service Business Drivers and Benefits Technology Drivers and Benefits

More information

Cloud Computing A NIST Perspective & Beyond. Robert Bohn, PhD Advanced Network Technologies Division

Cloud Computing A NIST Perspective & Beyond. Robert Bohn, PhD Advanced Network Technologies Division Cloud Computing A NIST Perspective & Beyond Robert Bohn, PhD Advanced Network Technologies Division ISACA National Capital Area Chapter Arlington, VA, USA 17 March 2015 Cloud Program Overview Launch &

More information

Cloud Computing; What is it, How long has it been here, and Where is it going?

Cloud Computing; What is it, How long has it been here, and Where is it going? Cloud Computing; What is it, How long has it been here, and Where is it going? David Losacco, CPA, CIA, CISA Principal January 10, 2013 Agenda The Cloud WHAT IS THE CLOUD? How long has it been here? Where

More information

John Essner, CISO Office of Information Technology State of New Jersey

John Essner, CISO Office of Information Technology State of New Jersey John Essner, CISO Office of Information Technology State of New Jersey http://csrc.nist.gov/publications/nistpubs/800-144/sp800-144.pdf Governance Compliance Trust Architecture Identity and Access Management

More information

Cloud computing has been described by some as evolutionary. Others have called it revolutionary. Either

Cloud computing has been described by some as evolutionary. Others have called it revolutionary. Either This material from Briefing Papers has been reproduced with the permission of the publisher, Thomson Reuters. Further use without the permission of the publisher is prohibited. For additional information

More information

Cloud Computing In a Post Snowden World. Guy Wiggins, Kelley Drye & Warren LLP Alicia Lowery Rosenbaum, Microsoft Legal and Corporate Affairs

Cloud Computing In a Post Snowden World. Guy Wiggins, Kelley Drye & Warren LLP Alicia Lowery Rosenbaum, Microsoft Legal and Corporate Affairs Cloud Computing In a Post Snowden World Guy Wiggins, Kelley Drye & Warren LLP Alicia Lowery Rosenbaum, Microsoft Legal and Corporate Affairs Guy Wiggins Director of Practice Management Kelley Drye & Warren

More information

Cloud Service Rollout. Chapter 9

Cloud Service Rollout. Chapter 9 Cloud Service Rollout Chapter 9 Cloud Service Topics Cloud service rollout plans vary depending on the type of cloud service SaaS, PaaS, or IaaS and the vendor. Unit Topics Identifying vendor roles and

More information

Cloud Computing and Security Risk Analysis Qing Liu Technology Architect STREAM Technology Lab Qing.Liu@chi.frb.org

Cloud Computing and Security Risk Analysis Qing Liu Technology Architect STREAM Technology Lab Qing.Liu@chi.frb.org Cloud Computing and Security Risk Analysis Qing Liu Technology Architect STREAM Technology Lab Qing.Liu@chi.frb.org 1 Disclaimers This presentation provides education on Cloud Computing and its security

More information

DoD ENTERPRISE CLOUD SERVICE BROKER CLOUD SECURITY MODEL

DoD ENTERPRISE CLOUD SERVICE BROKER CLOUD SECURITY MODEL DoD ENTERPRISE CLOUD SERVICE BROKER CLOUD SECURITY MODEL Version 1.0 Developed by the Defense Information Systems Agency (DISA) for the Department of Defense (DoD) EXECUTIVE SUMMARY The 26 June 2012 DoD

More information

How To Manage Cloud Data Safely

How To Manage Cloud Data Safely Information Governance In The Cloud Galina Datskovsky, Ph. D., CRM President of ARMA International SVP Information Governance Solutions Topics Cloud Characteristics And Risks Information Management In

More information

DoD Cloud Computing Security Requirements Guide (SRG) Overview

DoD Cloud Computing Security Requirements Guide (SRG) Overview DoD Cloud Computing Security Requirements Guide (SRG) Overview 1 General SRG Information Released 12 January 2015 Version 1, release 1 Provides comprehensive security guidance for components (missions)

More information

Concurrent Technologies Corporation (CTC) is an independent, nonprofit, applied scientific research and development professional services

Concurrent Technologies Corporation (CTC) is an independent, nonprofit, applied scientific research and development professional services Concurrent Technologies Corporation (CTC) is an independent, nonprofit, applied scientific research and development professional services organization providing innovative management and technology-based

More information

Federal Cloud Computing Initiative Overview

Federal Cloud Computing Initiative Overview Federal Cloud Computing Initiative Overview Program Status To support the Federal Cloud Computing Direction and Deployment Approach, the ITI Line of Business PMO has been refocused as the Cloud Computing

More information

Cloud Computing Contracts. October 11, 2012

Cloud Computing Contracts. October 11, 2012 Cloud Computing Contracts October 11, 2012 Lorene Novakowski Karam Bayrakal Covering Cloud Computing Cloud Computing Defined Models Manage Cloud Computing Risk Mitigation Strategy Privacy Contracts Best

More information

Securing Government Clouds Preparing for the Rainy Days

Securing Government Clouds Preparing for the Rainy Days Securing Government Clouds Preparing for the Rainy Days Majed Saadi Director, Cloud Computing Practice Agenda 1. The Cloud: Opportunities and Challenges 2. Cloud s Potential for Providing Government Services

More information

Key Considerations of Regulatory Compliance in the Public Cloud

Key Considerations of Regulatory Compliance in the Public Cloud Key Considerations of Regulatory Compliance in the Public Cloud W. Noel Haskins-Hafer CRMA, CISA, CISM, CFE, CGEIT, CRISC 10 April, 2013 w_haskins-hafer@intuit.com Disclaimer Unless otherwise specified,

More information

Cloud Computing Security Issues

Cloud Computing Security Issues Copyright Marchany 2010 Cloud Computing Security Issues Randy Marchany, VA Tech IT Security, marchany@vt.edu Something Old, Something New New: Cloud describes the use of a collection of services, applications,

More information

TESTIMONY OF MR. RICHARD SPIRES CHIEF INFORMATION OFFICER U.S. DEPARTMENT OF HOMELAND SECURITY BEFORE THE COMMITTEE ON HOMELAND SECURITY

TESTIMONY OF MR. RICHARD SPIRES CHIEF INFORMATION OFFICER U.S. DEPARTMENT OF HOMELAND SECURITY BEFORE THE COMMITTEE ON HOMELAND SECURITY TESTIMONY OF MR. RICHARD SPIRES CHIEF INFORMATION OFFICER U.S. DEPARTMENT OF HOMELAND SECURITY BEFORE THE COMMITTEE ON HOMELAND SECURITY SUBCOMMITTEE ON CYBERSECURITY, INFRASTRUCTURE PROTECTION, AND SECURITY

More information

Why Migrate to the Cloud. ABSS Solutions, Inc. 2014

Why Migrate to the Cloud. ABSS Solutions, Inc. 2014 Why Migrate to the Cloud ABSS Solutions, Inc. 2014 ASI Cloud Services Information Systems Basics Cloud Fundamentals Cloud Options Why Move to the Cloud Our Service Providers Our Process Information System

More information

Federal Cloud Security

Federal Cloud Security Federal Cloud Security The views, opinions and/or findings contained in this report are those of The MITRE Corporation and should not be construed as an official government position, policy, or decision,

More information

Securing and Auditing Cloud Computing. Jason Alexander Chief Information Security Officer

Securing and Auditing Cloud Computing. Jason Alexander Chief Information Security Officer Securing and Auditing Cloud Computing Jason Alexander Chief Information Security Officer What is Cloud Computing A model for enabling convenient, on-demand network access to a shared pool of configurable

More information

Protec'ng Data and Privacy in a World of Clouds and Third Par'es Vincent Campitelli

Protec'ng Data and Privacy in a World of Clouds and Third Par'es Vincent Campitelli Protec'ng Data and Privacy in a World of Clouds and Third Par'es Vincent Campitelli Vice President, IT Risk Management McKesson Corpora-on What is Your Business Model? Economic Moats In business, I look

More information

I&IT Strategy & Cyber Security

I&IT Strategy & Cyber Security I&IT Strategy & Cyber Security Cloud Computing: Finding the Silver Lining AMCTO Information, Access, & Privacy Forum, Oct. 29 th 2015 UNCLASSIFIED Topic Why do I care about security in the Cloud? How do

More information

Anatomy of a Cloud Computing Data Breach

Anatomy of a Cloud Computing Data Breach Anatomy of a Cloud Computing Data Breach Sheryl Falk Mike Olive ACC Houston Chapter ITPEC Practice Group September 18, 2014 1 Agenda Ø Cloud 101 Welcome to Cloud Computing Ø Cloud Agreement Considerations

More information

Cloud Computing: Background, Risks and Audit Recommendations

Cloud Computing: Background, Risks and Audit Recommendations Cloud Computing: Background, Risks and Audit Recommendations October 30, 2014 Table of Contents Cloud Computing: Overview 3 Multiple Models of Cloud Computing 11 Deployment Models 16 Considerations For

More information

LEGAL ISSUES IN CLOUD COMPUTING

LEGAL ISSUES IN CLOUD COMPUTING LEGAL ISSUES IN CLOUD COMPUTING RITAMBHARA AGRAWAL INTELLIGERE 1 CLOUD COMPUTING Cloud computing is a model for enabling convenient, on-demand network access to a shared pool of configurable computing

More information

Best Practices for Sourcing Cloud Computing Services

Best Practices for Sourcing Cloud Computing Services Best Practices for Sourcing Cloud Computing Services Marc Lindsey Partner Levine, Blaszak, Block & Boothby, LLP MLindsey@LB3Law.com Disclaimer This presentation is for informational purposes only and does

More information

GAO. INFORMATION SECURITY Persistent Weaknesses Highlight Need for Further Improvement

GAO. INFORMATION SECURITY Persistent Weaknesses Highlight Need for Further Improvement GAO For Release on Delivery Expected at time 1:00 p.m. EDT Thursday, April 19, 2007 United States Government Accountability Office Testimony Before the Subcommittee on Emerging Threats, Cybersecurity,

More information

Refresher on cloud computing

Refresher on cloud computing Refresher on cloud computing Cloud computing is a form of outsourcing where the organization outsources data processing to computers owned by the vendor. Outsourcing may also include utilizing the vendor

More information

STATEMENT OF. Dr. David McClure Associate Administrator Office of Citizen Services and Innovative Technologies General Services Administration

STATEMENT OF. Dr. David McClure Associate Administrator Office of Citizen Services and Innovative Technologies General Services Administration STATEMENT OF Dr. David McClure Associate Administrator Office of Citizen Services and Innovative Technologies General Services Administration BEFORE THE HOUSE SCIENCE, SPACE AND TECHNOLOGY COMMITTEE SUBCOMMITTEE

More information

IT Cloud / Data Security Vendor Risk Management Associated with Data Security. September 9, 2014

IT Cloud / Data Security Vendor Risk Management Associated with Data Security. September 9, 2014 IT Cloud / Data Security Vendor Risk Management Associated with Data Security September 9, 2014 Speakers Brian Thomas, CISA, CISSP In charge of Weaver s IT Advisory Services, broad focus on IT risk, security

More information

Information Security for Managers

Information Security for Managers Fiscal Year 2015 Information Security for Managers Introduction Information Security Overview Enterprise Performance Life Cycle Enterprise Performance Life Cycle and the Risk Management Framework Categorize

More information

FedRAMP Master Acronym List. Version 1.0

FedRAMP Master Acronym List. Version 1.0 FedRAMP Master Acronym List Version 1.0 September 10, 2015 Revision History Date Version Page(s) Description Author Sept. 10, 2014 1.0 All Initial issue. FedRAMP PMO How to Contact Us For questions about

More information

Recent Data Security Developments for Government Contractors

Recent Data Security Developments for Government Contractors Recent Data Security Developments for Government Contractors November 4, 2015 Attorney Advertising Speakers Jonathan Cedarbaum Partner WilmerHale Barry Hurewitz Partner WilmerHale Ben Powell Partner WilmerHale

More information

Report via OMB s Integrated Data Collection (IDC), https://community.max.gov/x/lhtgjw 10

Report via OMB s Integrated Data Collection (IDC), https://community.max.gov/x/lhtgjw 10 EXECUTIVE OFFICE OF THE PRESIDENT OFFICE OF MANAGEMENT AND BUDGET WASHINGTON, D.C. 20503 June 2, 2016 M-16-12 MEMORANDUM FOR THE HEADS OF DEPARTMENTS AND AGENCIES FROM: Anne E. Rung United States Chief

More information

Contracting for Cloud Computing

Contracting for Cloud Computing Contracting for Cloud Computing Geofrey L Master Mayer Brown JSM Partner +852 2843 4320 geofrey.master@mayerbrownjsm.com April 5th 2011 Mayer Brown is a global legal services organization comprising legal

More information

2011 Morrison & Foerster LLP All Rights Reserved mofo.com. Risk, Governance and Negotiation in the Cloud: Capture Benefits and Reduce Risks

2011 Morrison & Foerster LLP All Rights Reserved mofo.com. Risk, Governance and Negotiation in the Cloud: Capture Benefits and Reduce Risks 2011 Morrison & Foerster LLP All Rights Reserved mofo.com Risk, Governance and Negotiation in the Cloud: Capture Benefits and Reduce Risks 14 September 2011 Presenters Alistair Maughan Morrison & Foerster

More information

Sikkerhet i skytjenester; hva bør en tenke på? Ole Tom Seierstad National Security Officer Microsoft Norway oles@microsoft.com

Sikkerhet i skytjenester; hva bør en tenke på? Ole Tom Seierstad National Security Officer Microsoft Norway oles@microsoft.com Sikkerhet i skytjenester; hva bør en tenke på? Ole Tom Seierstad National Security Officer Microsoft Norway oles@microsoft.com Cloud is becoming integral to business transformation The secure pathway to

More information

Purpose. Service Model SaaS (Applications) PaaS (APIs) IaaS (Virtualization) Use Case 1: Public Use Case 2: Use Case 3: Public.

Purpose. Service Model SaaS (Applications) PaaS (APIs) IaaS (Virtualization) Use Case 1: Public Use Case 2: Use Case 3: Public. Federal CIO Council Information Security and Identity Management Committee (ISIMC) Guidelines for the Secure Use of Cloud Computing by Federal Departments and Agencies DRAFT V0.41 Earl Crane, CISSP, CISM

More information

AUDIT REPORT. The Energy Information Administration s Information Technology Program

AUDIT REPORT. The Energy Information Administration s Information Technology Program U.S. Department of Energy Office of Inspector General Office of Audits and Inspections AUDIT REPORT The Energy Information Administration s Information Technology Program DOE-OIG-16-04 November 2015 Department

More information

Briefing Outline. Overview of the CUI Program. CUI and IT Implementation

Briefing Outline. Overview of the CUI Program. CUI and IT Implementation Briefing Outline Overview of the CUI Program Establishment of the Program Elements of the CUI Executive Order Categories and Registry Handling CUI Current Efforts Implementation Plan CUI and IT Implementation

More information

DoD Needs an Effective Process to Identify Cloud Computing Service Contracts

DoD Needs an Effective Process to Identify Cloud Computing Service Contracts Inspector General U.S. Department of Defense Report No. DODIG-2016-038 DECEMBER 28, 2015 DoD Needs an Effective Process to Identify Cloud Computing Service Contracts INTEGRITY EFFICIENCY ACCOUNTABILITY

More information

Clouds on the Horizon Cloud Security in Today s DoD Environment. Bill Musson Security Analyst

Clouds on the Horizon Cloud Security in Today s DoD Environment. Bill Musson Security Analyst Clouds on the Horizon Cloud Security in Today s DoD Environment Bill Musson Security Analyst Agenda O Overview of Cloud architectures O Essential characteristics O Cloud service models O Cloud deployment

More information

DoD Pathway to the Cloud

DoD Pathway to the Cloud Headquarters U.S. Air Force DoD Pathway to the Cloud Jodi Cramer AF/JAA 1 5/30/14 Desktops Application Tablets Monitoring Content Collaboration Platform Messaging Identity Database Runtime Infrastructure

More information

GAO. INFORMATION SECURITY Additional Guidance Needed to Address Cloud Computing Concerns

GAO. INFORMATION SECURITY Additional Guidance Needed to Address Cloud Computing Concerns GAO For Release on Delivery Expected at 10:00 a.m. EDT Thursday, October 6, 2011 United States Government Accountability Office Testimony Before the Subcommittee on Cybersecurity, Infrastructure Protection,

More information

NARA s Information Security Program. OIG Audit Report No. 15-01. October 27, 2014

NARA s Information Security Program. OIG Audit Report No. 15-01. October 27, 2014 NARA s Information Security Program OIG Audit Report No. 15-01 October 27, 2014 Table of Contents Executive Summary... 3 Background... 4 Objectives, Scope, Methodology... 7 Audit Results... 8 Appendix

More information

Risk Management Framework (RMF): The Future of DoD Cyber Security is Here

Risk Management Framework (RMF): The Future of DoD Cyber Security is Here Risk Management Framework (RMF): The Future of DoD Cyber Security is Here Authors: Rebecca Onuskanich William Peterson 3300 N Fairfax Drive, Suite 308 Arlington, VA 22201 Phone: 571-481-9300 Fax: 202-315-3003

More information

GAO INFORMATION SECURITY. Federal Guidance Needed to Address Control Issues with Implementing Cloud Computing. Report to Congressional Requesters

GAO INFORMATION SECURITY. Federal Guidance Needed to Address Control Issues with Implementing Cloud Computing. Report to Congressional Requesters GAO United States Government Accountability Office Report to Congressional Requesters May 2010 INFORMATION SECURITY Federal Guidance Needed to Address Control Issues with Implementing Cloud Computing GAO-10-513

More information

NIST Cloud Computing Security Reference Architecture (SP 500-299 draft)

NIST Cloud Computing Security Reference Architecture (SP 500-299 draft) NIST Cloud Computing Security Reference Architecture (SP 500-299 draft) NIST Cloud Computing Security Working Group Dr. Michaela Iorga, NIST Senior Security Technical Lead for Cloud Computing Chair, NIST

More information