NIST Cloud Computing Forensic Science Working Group

Size: px
Start display at page:

Download "NIST Cloud Computing Forensic Science Working Group"

Transcription

1 NIST Cloud Computing Forensic Science Working Group Dr. Martin Herman Information Technology Laboratory (ITL) National Institute of Standards and Technology

2 NIST Cloud Computing Forensic Science Working Group (NCC-FSWG): Who We are NIST Public Working Group -- Established in November 2012 Voluntary open membership (international) Active participants meet bi-weekly by conference call Cloud Forensics Practitioners Cloud Providers Academia US Government User Community International Participants NIST Leadership (Co-chairs Dr. Michaela Iorga and Eric Simmon, and Dr. Martin Herman, NIST Senior Advisor) About 190 members in mailing list, with about 10 bi-weekly participants Twiki Website: 4/15/ :59 PM 2

3 NCC-FSWG - Goals Gather inputs dealing with cloud forensic challenges Identify and aggregate published cloud forensic challenges Analyze challenges Prioritize the challenges Based on importance, urgency Based on whether solutions involve technology, standards, or measurement methods Choose the highest priority challenges and determine gaps in technology, standards and measurements to address these challenges Develop a roadmap to address these gaps 4/15/ :59 PM 3

4 NCC-FSWG Current Status Challenges spreadsheet aggregation of published challenges (~65) and analysis White paper describing preliminary analysis of cloud forensic challenges progress report NIST Cloud Computing Forensic Science Challenges First draft almost complete and will be released very shortly for public comments Authored collectively by NCC-FSWG bi-weekly participants 4/15/ :59 PM 4

5 Contributors to White Paper Michaela Iorga Martin Herman Eric Simmon Keyun Ruan Mike Salim Josiah Dykstra Kenneth Zatyko Bob Jackson Lon Gowen Ernesto Rojas Laura Taylor Scot Reemelin Ken Stavinoha Karla Holm Kristy Westphal Tony Rutkowski Fred Cohen Nancy Landreville Anil Karmel Pw Carey Mark Potter Ragib Hasan 4/15/ :59 PM 5

6 Cloud Computing Forensic Science Challenges Actor/Stakeholder identifies the stakeholder(s) who is affected by the challenge Action/Operation - identifies the activity that the stakeholder would like to perform Object of This Action identifies the specific item upon which the action is to be performed Reason identifies the primary challenges that the stakeholder faces in order to perform the specified action on the object 4/15/ :59 PM 6

7 Cloud Computing Forensic Science Challenges Each challenge needs to be relevant to the essential characteristics of the NIST Definition of Cloud Computing* Each challenge labeled with one or more relevant characteristic OD = On-demand self-service BNA = Broad network access RP = Resource pooling RE = Rapid elasticity MS = Measured service * Peter Mell, Timothy Grance, The NIST Definition of Cloud Computing. NIST SP , September /15/ :59 PM 7

8 Cloud Computing Forensic Science Challenges Patterns of aggregation (or categories ) emerged Challenges related to: Architecture Data collection Analysis of cloud forensic data Anti-forensics Incident first responders Role management Legal issues Standards Training 4/15/ :59 PM 8

9

10 Architecture Challenges Issues include diversity, complexity, provenance, multitenancy, data segregation, etc. Challenge examples Dealing with variability in cloud architectures between providers Tenant data compartmentalization and isolation during resource provisioning Proliferation of system, locations and endpoints that can store data Accurate and secure provenance for maintaining and preserving chain of custody Infrastructure to support seizure of cloud resources without disrupting other tenants 4/15/ :59 PM 10

11 Data Collection Challenges Issues include data integrity, data recovery, data location, imaging, etc. Challenge examples Locating forensic artifacts in large, distributed and dynamic systems Locating and collecting volatile data Data collection from virtual machines Data integrity in a multi-tenant environment where data are shared among multiple computers in multiple locations and accessible by multiple parties Inability to image all the forensic artifacts in the cloud Accessing the data of one tenant without breaching the confidentiality of other tenants Recovery of deleted data in a shared and distributed virtual environment 4/15/ :59 PM 11

12 Analysis Challenges Issues include correlation, reconstruction, time synchronization, logs, metadata, timelines, etc. Challenge examples Correlation of forensic artifacts across and within cloud providers Reconstruction of events from virtual images or storage Integrity of metadata Timeline analysis of log data including synchronization of timestamps 4/15/ :59 PM 12

13 Anti-forensics Challenges Issues include obfuscation, data hiding, malware, etc. Anti-forensics are a set of techniques used specifically to prevent or mislead forensic analysis Challenge examples The use of obfuscation, malware, data hiding, or other techniques to compromise the integrity of evidence Malware may circumvent virtual machine isolation methods 4/15/ :59 PM 13

14 Incident First Responder Challenges Issues include trustworthiness of cloud providers, response time, reconstruction, etc. Challenge examples Confidence, competence, and trustworthiness of the cloud providers to act as first-responders and perform data collection Difficulty in performing initial triage Processing a large volume of forensic artifacts collected 4/15/ :59 PM 14

15 Role Management Challenges Issues include data owners, identity management, users, access control, etc. Challenge examples Uniquely identifying the owner of an account Decoupling between cloud user credentials and physical users Ease of anonymity and creating fictitious identities online Determining exact ownership of data Authentication and access control 4/15/ :59 PM 15

16 Legal Challenges Issues include jurisdictions, laws, service level agreements, contracts, subpoenas, international cooperation, privacy, ethics, etc. Challenge examples Identifying and addressing issues of jurisdictions for legal access to data Lack of effective channels for international communication and cooperation during an investigation Data acquisition that relies on the cooperation of cloud providers, as well as their competence and trustworthiness Missing terms in contracts and service level agreements Issuing subpoenas without knowledge of the physical location of data Seizure and confiscation of cloud resources may interrupt business continuity of other tenants 4/15/ :59 PM 16

17 Standards Challenges Issues include standard operating procedures, interoperability, testing, validation, etc. Challenge examples Standards challenges in cloud forensics include lack of even minimum/basic SOPs, practices, and tools Lack of interoperability among cloud providers Lack of test and validation procedures 4/15/ :59 PM 17

18 Training Challenges Issues include forensic investigators, cloud providers, qualification, certification, etc. Challenge examples Misuse of digital forensic training materials that are not applicable to cloud forensics Lack of cloud forensic training and expertise for both investigators and instructors Limited knowledge by record-keeping personnel in cloud providers about evidence 4/15/ :59 PM 18

19 Cloud Computing Forensic Science Challenges Aggregation led to Mind Map Visual representation of Groups of challenges Relationships between challenges Categories and sub-categories of challenges E.g., Category: data collection Subcategories: Data Integrity and Data Recovery Primary and related categories Every challenge could be placed into a primary category Many challenges could also be placed in related categories 4/15/ :59 PM 19

20 Mindmap (PRIMARY) 4/15/ :59 PM 20

21 Mindmap (RELATED) 4/15/ :59 PM 21

22 Complete Mindmap 4/15/ :59 PM 22

23 Future WG Activity Publish White Paper draft very shortly for public comment Further analyze the cloud forensics challenges Prioritize the challenges Choose the highest priority challenges and determine gaps in technology, standards and measurements to address these challenges Develop a roadmap to address these gaps 4/15/ :59 PM 23

24 We welcome new members to the WG! Send me if interested. Dr. Martin Herman NIST Working Group Twiki web site: 4/15/ :59 PM 24

Draft NISTIR 8006 NIST Cloud Computing Forensic Science Challenges

Draft NISTIR 8006 NIST Cloud Computing Forensic Science Challenges 1 Draft NISTIR 8006 2 NIST Cloud Computing Forensic Science Challenges 3 4 NIST Cloud Computing Forensic Science Working Group Information Technology Laboratory 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19

More information

When Security, Privacy and Forensics Meet in the Cloud

When Security, Privacy and Forensics Meet in the Cloud When Security, Privacy and Forensics Meet in the Cloud Dr. Michaela Iorga, Senior Security Technical Lead for Cloud Computing Co-Chair, Cloud Security WG Co-Chair, Cloud Forensics Science WG March 26,

More information

Cloud Computing A NIST Perspective and Beyond. Robert Bohn, PhD Advanced Network Technologies Division

Cloud Computing A NIST Perspective and Beyond. Robert Bohn, PhD Advanced Network Technologies Division Cloud Computing A NIST Perspective and Beyond Robert Bohn, PhD Advanced Network Technologies Division CASC Fall Meeting 2014 17 September 2014 Federal IT Strategies 2 The NIST Cloud Computing Program Goal

More information

KEY TERMS FOR SERVICE LEVEL AGREEMENTS TO SUPPORT CLOUD FORENSICS

KEY TERMS FOR SERVICE LEVEL AGREEMENTS TO SUPPORT CLOUD FORENSICS Chapter 12 KEY TERMS FOR SERVICE LEVEL AGREEMENTS TO SUPPORT CLOUD FORENSICS Keyun Ruan, Joshua James, Joe Carthy and Tahar Kechadi Abstract As the adoption of cloud services increases, the importance

More information

Cloud Computing A NIST Perspective & Beyond. Robert Bohn, PhD Advanced Network Technologies Division

Cloud Computing A NIST Perspective & Beyond. Robert Bohn, PhD Advanced Network Technologies Division Cloud Computing A NIST Perspective & Beyond Robert Bohn, PhD Advanced Network Technologies Division ISACA National Capital Area Chapter Arlington, VA, USA 17 March 2015 Cloud Program Overview Launch &

More information

Incident Management & Forensics Working Group. Charter

Incident Management & Forensics Working Group. Charter Incident Management & Forensics Working Group Charter February 2013 2013 Cloud Security Alliance All Rights Reserved All rights reserved. You may download, store, display on your computer, view, print,

More information

Cybersecurity. Cloud. and the. 4TH Annual NICE Workshop Navigating the National Cybersecurity Education InterState Highway September 2013

Cybersecurity. Cloud. and the. 4TH Annual NICE Workshop Navigating the National Cybersecurity Education InterState Highway September 2013 Cybersecurity and the Cloud 4TH Annual NICE Workshop Navigating the National Cybersecurity Education InterState Highway September 2013 Well, I'll hazard I can do more damage on my laptop sitting in my

More information

Key Management Challenges in a Cloud Ecosystem

Key Management Challenges in a Cloud Ecosystem Key Management Challenges in a Cloud Ecosystem A Discussion Starter Based on the Cloud Security WG s Research - Dr. Michaela Iorga, NIST (presenting) Anil Karmel, C2 Lab, Inc. (presenting) Juanita Koilpilai,

More information

Survey on cloud forensics and critical criteria for cloud forensic capability: A preliminary analysis

Survey on cloud forensics and critical criteria for cloud forensic capability: A preliminary analysis Survey on cloud forensics and critical criteria for cloud forensic capability: A preliminary analysis Keyun Ruan, Ibrahim Baggili (PhD), Prof Joe Carthy, Prof Tahar Kechadi University College Dublin, Zayed

More information

ITL BULLETIN FOR MARCH 2012 GUIDELINES FOR IMPROVING SECURITY AND PRIVACY IN PUBLIC CLOUD COMPUTING

ITL BULLETIN FOR MARCH 2012 GUIDELINES FOR IMPROVING SECURITY AND PRIVACY IN PUBLIC CLOUD COMPUTING ITL BULLETIN FOR MARCH 2012 GUIDELINES FOR IMPROVING SECURITY AND PRIVACY IN PUBLIC CLOUD COMPUTING Shirley Radack, Editor Computer Security Division Information Technology Laboratory National Institute

More information

Standardizing Cloud Services for Financial Institutions through the provisioning of Service Level Agreements (SLAs)

Standardizing Cloud Services for Financial Institutions through the provisioning of Service Level Agreements (SLAs) Standardizing Cloud Services for Financial Institutions through the provisioning of Service Level Agreements (SLAs) Robert Bohn, PhD Advanced Network Technologies Division Cloud FS Americas 2015 New York,

More information

Keyun Ruan, Joe Carthy, Tahar Kechadi and Mark Crosbie

Keyun Ruan, Joe Carthy, Tahar Kechadi and Mark Crosbie Chapter 2 CLOUD FORENSICS Keyun Ruan, Joe Carthy, Tahar Kechadi and Mark Crosbie Abstract Cloud computing may well become one of the most transformative technologies in the history of computing. Cloud

More information

Cloud Computing, and REST-based Architectures Reid Holmes

Cloud Computing, and REST-based Architectures Reid Holmes Material and some slide content from: - Software Architecture: Foundations, Theory, and Practice - Krzysztof Czarnecki Cloud Computing, and REST-based Architectures Reid Holmes Cloud precursors Grid Computing:

More information

Cloud Forensics: an Overview. Keyun Ruan Center for Cyber Crime Investigation University College Dublin

Cloud Forensics: an Overview. Keyun Ruan Center for Cyber Crime Investigation University College Dublin Cloud Forensics: an Overview Keyun Ruan Center for Cyber Crime Investigation University College Dublin Cloud Futures 2011, Microsoft Research Redmond, June 3, 2011 Co-authors Mark Crosbie, IBM Ireland

More information

NIST Cloud Computing Security Reference Architecture (SP 500-299 draft)

NIST Cloud Computing Security Reference Architecture (SP 500-299 draft) NIST Cloud Computing Security Reference Architecture (SP 500-299 draft) NIST Cloud Computing Security Working Group Dr. Michaela Iorga, NIST Senior Security Technical Lead for Cloud Computing Chair, NIST

More information

Computer Security Incident Response Plan. Date of Approval: 23- FEB- 2015

Computer Security Incident Response Plan. Date of Approval: 23- FEB- 2015 Name of Approver: Mary Ann Blair Date of Approval: 23- FEB- 2015 Date of Review: 22- FEB- 2015 Effective Date: 23- FEB- 2015 Name of Reviewer: John Lerchey Table of Contents Table of Contents... 2 Introduction...

More information

Cloud Computing Architecture and Forensic Investigation Challenges

Cloud Computing Architecture and Forensic Investigation Challenges Cloud Computing Architecture and Forensic Investigation Challenges Ghania Al Sadi Sohar University, Computing Department Sohar, University Rd, 311 Sultanate of Oman ABSTRACT Contrasting to traditional

More information

EXTRACTING LEGALLY DEFENSIBLE EVIDENCE FROM THE CLOUD

EXTRACTING LEGALLY DEFENSIBLE EVIDENCE FROM THE CLOUD White Paper EXTRACTING LEGALLY DEFENSIBLE EVIDENCE FROM THE CLOUD Explaining UFED Cloud Analyzer Extraction and Analysis Processes With data privacy a major topic of discussion among consumers and service

More information

Security Issues in Cloud Computing

Security Issues in Cloud Computing Security Issues in Computing CSCI 454/554 Computing w Definition based on NIST: A model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources

More information

ITL BULLETIN FOR JUNE 2012 CLOUD COMPUTING: A REVIEW OF FEATURES, BENEFITS, AND RISKS, AND RECOMMENDATIONS FOR SECURE, EFFICIENT IMPLEMENTATIONS

ITL BULLETIN FOR JUNE 2012 CLOUD COMPUTING: A REVIEW OF FEATURES, BENEFITS, AND RISKS, AND RECOMMENDATIONS FOR SECURE, EFFICIENT IMPLEMENTATIONS ITL BULLETIN FOR JUNE 2012 CLOUD COMPUTING: A REVIEW OF FEATURES, BENEFITS, AND RISKS, AND RECOMMENDATIONS FOR SECURE, EFFICIENT IMPLEMENTATIONS Shirley Radack, Editor Computer Security Division Information

More information

The NIST Definition of Cloud Computing (Draft)

The NIST Definition of Cloud Computing (Draft) Special Publication 800-145 (Draft) The NIST Definition of Cloud Computing (Draft) Recommendations of the National Institute of Standards and Technology Peter Mell Timothy Grance NIST Special Publication

More information

Security & Trust in the Cloud

Security & Trust in the Cloud Security & Trust in the Cloud Ray Trygstad Director of Information Technology, IIT School of Applied Technology Associate Director, Information Technology & Management Degree Programs Cloud Computing Primer

More information

Mike Smart Cyber Strategist & Enterprise Security Solutions, EMEA. Cyber: The Catalyst to Transform the Security Program

Mike Smart Cyber Strategist & Enterprise Security Solutions, EMEA. Cyber: The Catalyst to Transform the Security Program Cyber: The Catalyst to Transform the Security Program Mike Smart Cyber Strategist & Enterprise Security Solutions, EMEA A Common Language? Hyper Connected World Rapid IT Evolution Agile Targeted Threat

More information

Ten Deadly Sins of Computer Forensics

Ten Deadly Sins of Computer Forensics Ten Deadly Sins of Computer Forensics Cyber criminals take advantage of the anonymity of the Internet to escape punishment. Computer Forensics has emerged as a new discipline to counter cyber crime. This

More information

Perspectives on Cloud Computing and Standards. Peter Mell, Tim Grance NIST, Information Technology Laboratory

Perspectives on Cloud Computing and Standards. Peter Mell, Tim Grance NIST, Information Technology Laboratory Perspectives on Cloud Computing and Standards Peter Mell, Tim Grance NIST, Information Technology Laboratory Standardization and Cloud Computing Cloud computing is a convergence of many technologies Some

More information

Cloud Forensic Investigation using Digital Provenance Scheme

Cloud Forensic Investigation using Digital Provenance Scheme Cloud Forensic Investigation using Digital Provenance Scheme Nay Aung Aung, and Myat Myat Min Abstract In recent year, Cloud computing has become popular as a cost-effective and efficient computing paradigm.

More information

Perspectives on Cloud Computing and Standards. Peter Mell, Tim Grance NIST, Information Technology Laboratory

Perspectives on Cloud Computing and Standards. Peter Mell, Tim Grance NIST, Information Technology Laboratory Perspectives on Cloud Computing and Standards Peter Mell, Tim Grance NIST, Information Technology Laboratory Caveats and Disclaimers This presentation provides education on cloud technology and its benefits

More information

Cloud Security Introduction and Overview

Cloud Security Introduction and Overview Introduction and Overview Klaus Gribi Senior Security Consultant klaus.gribi@swisscom.com May 6, 2015 Agenda 2 1. Cloud Security Cloud Evolution, Service and Deployment models Overview and the Notorious

More information

Cloudy with Showers of Business Opportunities and a Good Chance of. Security. Transforming the government IT landscape through cloud technology

Cloudy with Showers of Business Opportunities and a Good Chance of. Security. Transforming the government IT landscape through cloud technology Dr. Michaela Iorga, Senior Security Technical Lead for Cloud Computing Co-Chair, Cloud Security WG Co-Chair, Cloud Forensics Science WG Cloudy with Showers of Business Opportunities and a Good Chance of

More information

Securing The Cloud. Foundational Best Practices For Securing Cloud Computing. Scott Clark. Insert presenter logo here on slide master

Securing The Cloud. Foundational Best Practices For Securing Cloud Computing. Scott Clark. Insert presenter logo here on slide master Securing The Cloud Foundational Best Practices For Securing Cloud Computing Scott Clark Agenda Introduction to Cloud Computing What is Different in the Cloud? CSA Guidance Additional Resources 2 What is

More information

US Government Cloud Computing Technology Roadmap Volume II Release 1.0 (Draft)

US Government Cloud Computing Technology Roadmap Volume II Release 1.0 (Draft) Special Publication 500-293 (Draft) US Government Cloud Computing Technology Roadmap Volume II Release 1.0 (Draft) Useful Information for Cloud Adopters Lee Badger, Robert Bohn, Shilong Chu, Mike Hogan,

More information

Information Security Guideline: Cloud Computing Services. Information Security and Privacy Committee Draft version 8/1/2012

Information Security Guideline: Cloud Computing Services. Information Security and Privacy Committee Draft version 8/1/2012 Information Security Guideline: Cloud Computing Services Information Security and Privacy Committee Draft version 8/1/2012 Table of Contents Introduction... 1 Purpose... 2 Scope... 2 Risks and Concerns

More information

SECURITY IN SERVICE LEVEL AGREEMENTS FOR CLOUD COMPUTING

SECURITY IN SERVICE LEVEL AGREEMENTS FOR CLOUD COMPUTING SECURITY IN SERVICE LEVEL AGREEMENTS FOR CLOUD COMPUTING Karin Bernsmed, Martin Gilje Jaatun SINTEF Information and Communication Technology, Trondheim, Norway Karin.Bernsmed@sintef.no, Martin.G.Jaatun@sintef.no

More information

Legal Issues of Forensics in the Cloud

Legal Issues of Forensics in the Cloud Legal Issues of Forensics in the Cloud About Me Owner, Titan Info Security Group, LLC A Risk Management and Cyber Security Law Firm Partner, OnlineIntell, LLC Protecting online brands and reputation while

More information

Clouds on the Horizon Cloud Security in Today s DoD Environment. Bill Musson Security Analyst

Clouds on the Horizon Cloud Security in Today s DoD Environment. Bill Musson Security Analyst Clouds on the Horizon Cloud Security in Today s DoD Environment Bill Musson Security Analyst Agenda O Overview of Cloud architectures O Essential characteristics O Cloud service models O Cloud deployment

More information

ADRI. Advice on managing the recordkeeping risks associated with cloud computing. ADRI-2010-1-v1.0

ADRI. Advice on managing the recordkeeping risks associated with cloud computing. ADRI-2010-1-v1.0 ADRI Advice on managing the recordkeeping risks associated with cloud computing ADRI-2010-1-v1.0 Version 1.0 29 July 2010 Advice on managing the recordkeeping risks associated with cloud computing 2 Copyright

More information

Cloud Computing Governance & Security. Security Risks in the Cloud

Cloud Computing Governance & Security. Security Risks in the Cloud Cloud Computing Governance & Security The top ten questions you have to ask Mike Small CEng, FBCS, CITP Fellow Analyst, KuppingerCole This Webinar is supported by Agenda What is the Problem? Ten Cloud

More information

NIST Cloud Computing Program Activities

NIST Cloud Computing Program Activities NIST Cloud Computing Program Overview The NIST Cloud Computing Program includes Strategic and Tactical efforts which were initiated in parallel, and are integrated as shown below: NIST Cloud Computing

More information

Cloud Computing Reference Architecture and its Forensic Implications: A Preliminary Analysis

Cloud Computing Reference Architecture and its Forensic Implications: A Preliminary Analysis Cloud Computing Reference Architecture and its Forensic Implications: A Preliminary Analysis Keyun Ruan, Joe Carthy Center for Cybersecurity and Cybercrime Investigation University College Dublin {keyun.ruan,

More information

ISACA Presentation. Cloud, Forensics and Cloud Forensics

ISACA Presentation. Cloud, Forensics and Cloud Forensics ISACA Presentation Cloud, Forensics and Cloud Forensics Agenda What is the Cloud What is Forensics Challenges Cloud poses to Information Security and Forensic Investigations Using Cloud technologies to

More information

Information and Infrastructure Viewpoints

Information and Infrastructure Viewpoints National Human Services Interoperability Architecture (NHSIA) NHSIA Webinar Series Overview Key Concepts Capability & Business Viewpoints Information & Infrastructure Viewpoints Systems Viewpoint and Wrap-Up

More information

PCI Compliance and the Cloud: What You Can and What You Can t Outsource Presented By:

PCI Compliance and the Cloud: What You Can and What You Can t Outsource Presented By: PCI Compliance and the Cloud: What You Can and What You Can t Outsource Presented By: Peter Spier Managing Director PCI and Risk Assurance Fortrex Technologies Agenda Instructor Biography Background On

More information

Strategic Compliance & Securing the Cloud. Annalea Sharack-Ilg, CISSP, AMBCI Technical Director of Information Security

Strategic Compliance & Securing the Cloud. Annalea Sharack-Ilg, CISSP, AMBCI Technical Director of Information Security Strategic Compliance & Securing the Cloud Annalea Sharack-Ilg, CISSP, AMBCI Technical Director of Information Security Complexity and Challenges 2 Complexity and Challenges Compliance Regulatory entities

More information

IBM Cloud Security Draft for Discussion September 12, 2011. 2011 IBM Corporation

IBM Cloud Security Draft for Discussion September 12, 2011. 2011 IBM Corporation IBM Cloud Security Draft for Discussion September 12, 2011 IBM Point of View: Cloud can be made secure for business As with most new technology paradigms, security concerns surrounding cloud computing

More information

Cloud Computing Security Considerations

Cloud Computing Security Considerations Cloud Computing Security Considerations Roger Halbheer, Chief Security Advisor, Public Sector, EMEA Doug Cavit, Principal Security Strategist Lead, Trustworthy Computing, USA January 2010 1 Introduction

More information

Cloud Computing and Security Risk Analysis Qing Liu Technology Architect STREAM Technology Lab Qing.Liu@chi.frb.org

Cloud Computing and Security Risk Analysis Qing Liu Technology Architect STREAM Technology Lab Qing.Liu@chi.frb.org Cloud Computing and Security Risk Analysis Qing Liu Technology Architect STREAM Technology Lab Qing.Liu@chi.frb.org 1 Disclaimers This presentation provides education on Cloud Computing and its security

More information

Top 10 Cloud Risks That Will Keep You Awake at Night

Top 10 Cloud Risks That Will Keep You Awake at Night Top 10 Cloud Risks That Will Keep You Awake at Night Shankar Babu Chebrolu Ph.D., Vinay Bansal, Pankaj Telang Photo Source flickr.com .. Amazon EC2 (Cloud) to host Eng. Lab testing. We want to use SalesForce.com

More information

John Essner, CISO Office of Information Technology State of New Jersey

John Essner, CISO Office of Information Technology State of New Jersey John Essner, CISO Office of Information Technology State of New Jersey http://csrc.nist.gov/publications/nistpubs/800-144/sp800-144.pdf Governance Compliance Trust Architecture Identity and Access Management

More information

How To Manage Cloud Data Safely

How To Manage Cloud Data Safely Information Governance In The Cloud Galina Datskovsky, Ph. D., CRM President of ARMA International SVP Information Governance Solutions Topics Cloud Characteristics And Risks Information Management In

More information

The Next Generation of Security Leaders

The Next Generation of Security Leaders The Next Generation of Security Leaders In an increasingly complex cyber world, there is a growing need for information security leaders who possess the breadth and depth of expertise necessary to establish

More information

SECURITY MODELS FOR CLOUD 2012. Kurtis E. Minder, CISSP

SECURITY MODELS FOR CLOUD 2012. Kurtis E. Minder, CISSP SECURITY MODELS FOR CLOUD 2012 Kurtis E. Minder, CISSP INTRODUCTION Kurtis E. Minder, Technical Sales Professional Companies: Roles: Security Design Engineer Systems Engineer Sales Engineer Salesperson

More information

Perspectives on Moving to the Cloud Paradigm and the Need for Standards. Peter Mell, Tim Grance NIST, Information Technology Laboratory 7-11-2009

Perspectives on Moving to the Cloud Paradigm and the Need for Standards. Peter Mell, Tim Grance NIST, Information Technology Laboratory 7-11-2009 Perspectives on Moving to the Cloud Paradigm and the Need for Standards Peter Mell, Tim Grance NIST, Information Technology Laboratory 7-11-2009 2 NIST Cloud Computing Resources NIST Draft Definition of

More information

Session 334 Incident Management. Jeff Roth, CISA, CGEIT, CISSP

Session 334 Incident Management. Jeff Roth, CISA, CGEIT, CISSP Session 334 Incident Management Jeff Roth, CISA, CGEIT, CISSP SPEAKER BIOGRAPHY Jeff Roth, CISA, CGEIT Jeff Roth has over 25 years experience in IT audit, security, risk management and IT Governance experience

More information

The Keys to the Cloud: The Essentials of Cloud Contracting

The Keys to the Cloud: The Essentials of Cloud Contracting The Keys to the Cloud: The Essentials of Cloud Contracting September 30, 2014 Bert Kaminski Assistant General Counsel, Oracle North America Ken Adler Partner, Loeb & Loeb LLP Akiba Stern Partner, Loeb

More information

An Overview of Information Security Frameworks. Presented to TIF September 25, 2013

An Overview of Information Security Frameworks. Presented to TIF September 25, 2013 An Overview of Information Security Frameworks Presented to TIF September 25, 2013 What is a framework? A framework helps define an approach to implementing, maintaining, monitoring, and improving information

More information

Cybersecurity in the Utilities Sector Best Practices and Implementation 2014 Canadian Utilities IT & Telecom Conference September 24, 2014

Cybersecurity in the Utilities Sector Best Practices and Implementation 2014 Canadian Utilities IT & Telecom Conference September 24, 2014 Cybersecurity in the Utilities Sector Best Practices and Implementation 2014 Canadian Utilities IT & Telecom Conference September 24, 2014 Victoria Yan Pillitteri Advisor for Information Systems Security

More information

Cyber Security Incident Handling Policy. Information Technology Services Center (ITSC) of The Hong Kong University of Science and Technology

Cyber Security Incident Handling Policy. Information Technology Services Center (ITSC) of The Hong Kong University of Science and Technology Cyber Security Incident Handling Policy Information Technology Services Center (ITSC) of The Hong Kong University of Science and Technology Date: Oct 9, 2015 i Document Control Document Owner Classification

More information

6 Cloud computing overview

6 Cloud computing overview 6 Cloud computing overview 6.1 General ISO/IEC 17788:2014 (E) Cloud Computing Overview Page 1 of 6 Cloud computing is a paradigm for enabling network access to a scalable and elastic pool of shareable

More information

Big Data, Big Risk, Big Rewards. Hussein Syed

Big Data, Big Risk, Big Rewards. Hussein Syed Big Data, Big Risk, Big Rewards Hussein Syed Discussion Topics Information Security in healthcare Cyber Security Big Data Security Security and Privacy concerns Security and Privacy Governance Big Data

More information

Concurrent Technologies Corporation (CTC) is an independent, nonprofit, applied scientific research and development professional services

Concurrent Technologies Corporation (CTC) is an independent, nonprofit, applied scientific research and development professional services Concurrent Technologies Corporation (CTC) is an independent, nonprofit, applied scientific research and development professional services organization providing innovative management and technology-based

More information

Top 10 Risks in the Cloud

Top 10 Risks in the Cloud A COALFIRE PERSPECTIVE Top 10 Risks in the Cloud by Balaji Palanisamy, VCP, QSA, Coalfire March 2012 DALLAS DENVER LOS ANGELES NEW YORK SEATTLE Introduction Business leaders today face a complex risk question

More information

A New Era of Cybersecurity Neil Mohammed, Sales Engineer

A New Era of Cybersecurity Neil Mohammed, Sales Engineer A New Era of Cybersecurity Neil Mohammed, Sales Engineer Copyright 2015 Raytheon Company. All rights reserved. R W Market Advantages Strong Financial Backing Accelerated Innovation Increased Breadth and

More information

Cloud Computing. What is Cloud Computing?

Cloud Computing. What is Cloud Computing? Cloud Computing What is Cloud Computing? Cloud computing is where the organization outsources data processing to computers owned by the vendor. Primarily the vendor hosts the equipment while the audited

More information

CLOUD COMPUTING ISSUES FOR SCHOOL DISTRICTS. Presented to the 2013 BRADLEY F. KIDDER LAW CONFERENCE. October 2, 2013

CLOUD COMPUTING ISSUES FOR SCHOOL DISTRICTS. Presented to the 2013 BRADLEY F. KIDDER LAW CONFERENCE. October 2, 2013 CLOUD COMPUTING ISSUES FOR SCHOOL DISTRICTS Presented to the 2013 BRADLEY F. KIDDER LAW CONFERENCE October 2, 2013 By: Diane M. Gorrow Soule, Leslie, Kidder, Sayward & Loughman, P.L.L.C. 220 Main Street

More information

What Every User Needs To Know Before Moving To The Cloud. LawyerDoneDeal Corp.

What Every User Needs To Know Before Moving To The Cloud. LawyerDoneDeal Corp. What Every User Needs To Know Before Moving To The Cloud LawyerDoneDeal Corp. What Every User Needs To Know Before Moving To The Cloud 1 What is meant by Cloud Computing, or Going To The Cloud? A model

More information

The problem of cloud data governance

The problem of cloud data governance The problem of cloud data governance Vasilis Tountopoulos, Athens Technology Center S.A. (ATC) CSP EU Forum 2014 - Thursday, 22 nd May, 2014 Focus on data protection in the cloud Why data governance in

More information

Hands-On How-To Computer Forensics Training

Hands-On How-To Computer Forensics Training j8fm6pmlnqq3ghdgoucsm/ach5zvkzett7guroaqtgzbz8+t+8d2w538ke3c7t 02jjdklhaMFCQHihQAECwMCAQIZAQAKCRDafWsAOnHzRmAeAJ9yABw8v2fGxaq skeu29sdxrpb25zidxpbmznogtheories...ofhilz9e1xthvqxbb0gknrc1ng OKLbRXF/j5jJQPxXaNUu/It1TQHSiyEumrHNsnn65aUMPnrbVOVJ8hV8NQvsUE

More information

Working Group on. First Working Group Meeting 29.5.2012

Working Group on. First Working Group Meeting 29.5.2012 Working Group on Cloud Security and Privacy (WGCSP) First Working Group Meeting 29.5.2012 1 Review of fexisting i Standards d and Best Practices on Cloud Security Security Standards and Status List of

More information

Assessing Risks in the Cloud

Assessing Risks in the Cloud Assessing Risks in the Cloud Jim Reavis Executive Director Cloud Security Alliance Agenda Definitions of Cloud & Cloud Usage Key Cloud Risks About CSA CSA Guidance approach to Addressing Risks Research

More information

Allison Stanton, Director of E-Discovery U.S. Department of Justice, Civil Division. U.S. Department of Agriculture

Allison Stanton, Director of E-Discovery U.S. Department of Justice, Civil Division. U.S. Department of Agriculture Allison Stanton, Director of E-Discovery U.S. Department of Justice, Civil Division Benjamin Young, Assistant General Counsel U.S. Department of Agriculture 1 Disclaimer The views expressed in this presentation

More information

The NIST Cloud Computing Program

The NIST Cloud Computing Program The NIST Cloud Computing Program Robert Bohn Information Technology Laboratory National Institute of Standards and Technology October 12, 2011 Information Technology Laboratory Cloud 1 Computing Program

More information

Cybersecurity Framework. Executive Order 13636 Improving Critical Infrastructure Cybersecurity

Cybersecurity Framework. Executive Order 13636 Improving Critical Infrastructure Cybersecurity Cybersecurity Framework Executive Order 13636 Improving Critical Infrastructure Cybersecurity National Institute of Standards and Technology (NIST) Mission To promote U.S. innovation and industrial competitiveness

More information

Overview of Computer Forensics

Overview of Computer Forensics Overview of Computer Forensics Don Mason, Associate Director National Center for Justice and the Rule of Law University of Mississippi School of Law [These materials are based on 4.3.1-4.3.3 in the National

More information

Compliance Guide ISO 27002. Compliance Guide. September 2015. Contents. Introduction 1. Detailed Controls Mapping 2.

Compliance Guide ISO 27002. Compliance Guide. September 2015. Contents. Introduction 1. Detailed Controls Mapping 2. ISO 27002 Compliance Guide September 2015 Contents Compliance Guide 01 02 03 Introduction 1 Detailed Controls Mapping 2 About Rapid7 7 01 INTRODUCTION If you re looking for a comprehensive, global framework

More information

Identity in the Cloud Use Cases Version 1.0

Identity in the Cloud Use Cases Version 1.0 Identity in the Cloud Use Cases Version 1.0 Committee Note 01 08 May 2012 Specification URIs This version: http://docs.oasis-open.org/id-cloud/idcloud-usecases/v1.0/cn01/idcloudusecases-v1.0-cn01.pdf (Authoritative)

More information

Cloud Security Who do you trust?

Cloud Security Who do you trust? Thought Leadership White Paper Cloud Computing Cloud Security Who do you trust? Nick Coleman, IBM Cloud Security Leader Martin Borrett, IBM Lead Security Architect 2 Cloud Security Who do you trust? Cloud

More information

Supporting FISMA and NIST SP 800-53 with Secure Managed File Transfer

Supporting FISMA and NIST SP 800-53 with Secure Managed File Transfer IPSWITCH FILE TRANSFER WHITE PAPER Supporting FISMA and NIST SP 800-53 with Secure Managed File Transfer www.ipswitchft.com Adherence to United States government security standards can be complex to plan

More information

Delivery date: 18 October 2014

Delivery date: 18 October 2014 Genomic and Clinical Data Sharing Policy Questions with Technology and Security Implications: Consensus s from the Data Safe Havens Task Team Delivery date: 18 October 2014 When the Security Working Group

More information

A Survey on Cloud Security Issues and Techniques

A Survey on Cloud Security Issues and Techniques A Survey on Cloud Security Issues and Techniques Garima Gupta 1, P.R.Laxmi 2 and Shubhanjali Sharma 3 1 Department of Computer Engineering, Government Engineering College, Ajmer Guptagarima09@gmail.com

More information

Archival Approach to IaaS Cloud Services

Archival Approach to IaaS Cloud Services Central Page 216 of 344 Archival Approach to IaaS Cloud Services Hrvoje Stančić, Adam Al-Hariri Faculty of Humanities and Social Sciences University of Zagreb Ivana Lučića 3, 10000 Zagreb, Croatia {hstancic,

More information

Cloud Computing. Cloud Computing An insight in the Governance & Security aspects

Cloud Computing. Cloud Computing An insight in the Governance & Security aspects Cloud Computing An insight in the Governance & Security aspects AGENDA Introduction Security Governance Risks Compliance Recommendations References 1 Cloud Computing Peter Hinssen, The New Normal, 2010

More information

Residual risk. 3 Compliance challenges (i.e. right to examine, exit clause, privacy acy etc.)

Residual risk. 3 Compliance challenges (i.e. right to examine, exit clause, privacy acy etc.) Organizational risks 1 Lock-in Risk of not being able to migrate easily from one provider to another 2 Loss of Governance Control and influence on the cloud providers, and conflicts between customer hardening

More information

Compliance and the Cloud: What You Can and What You Can t Outsource

Compliance and the Cloud: What You Can and What You Can t Outsource Compliance and the Cloud: What You Can and What You Can t Outsource Presented By: Kate Donofrio Security Assessor Fortrex Technologies Instructor Biography Background On Fortrex What s In A Cloud? Pick

More information

IBM Security Privileged Identity Manager helps prevent insider threats

IBM Security Privileged Identity Manager helps prevent insider threats IBM Security Privileged Identity Manager helps prevent insider threats Securely provision, manage, automate and track privileged access to critical enterprise resources Highlights Centrally manage privileged

More information

Digital Forensics for IaaS Cloud Computing

Digital Forensics for IaaS Cloud Computing Digital Forensics for IaaS Cloud Computing June 26, 2012 The views expressed in this presentation are mine alone. Reference to any specific products, process, or service do not necessarily constitute or

More information

SELECTING AN ENTERPRISE-READY CLOUD SERVICE

SELECTING AN ENTERPRISE-READY CLOUD SERVICE 21 Point Checklist for SELECTING AN ENTERPRISE-READY CLOUD SERVICE Brought to you by Introduction The journey to the cloud is well underway, and it s easy to see why when 84% of CIOs report cutting application

More information

Retention & Disposition in the Cloud Do you really have control?

Retention & Disposition in the Cloud Do you really have control? InterPARES Trust Retention & Disposition in the Cloud Do you really have control? Franks Patricia, San Jose State University, San Jose, USA and Alan Doyle, University of British Columbia, Canada October

More information

DOE Cyber Security Policy Perspectives

DOE Cyber Security Policy Perspectives DOE Cyber Security Policy Perspectives Mike Smith Senior Cyber Policy Advisor to the Assistant Secretary Department of Energy Overview of DOE Cybersecurity Priorities Protecting the DOE Enterprise from

More information

HIPAA CRITICAL AREAS TECHNICAL SECURITY FOCUS FOR CLOUD DEPLOYMENT

HIPAA CRITICAL AREAS TECHNICAL SECURITY FOCUS FOR CLOUD DEPLOYMENT HIPAA CRITICAL AREAS TECHNICAL SECURITY FOCUS FOR CLOUD DEPLOYMENT A Review List This paper was put together with Security in mind, ISO, and HIPAA, for guidance as you move into a cloud deployment Dr.

More information

East African Information Conference 13-14 th August, 2013, Kampala, Uganda. Security and Privacy: Can we trust the cloud?

East African Information Conference 13-14 th August, 2013, Kampala, Uganda. Security and Privacy: Can we trust the cloud? East African Information Conference 13-14 th August, 2013, Kampala, Uganda Security and Privacy: Can we trust the cloud? By Dr. David Turahi Director, Information Technology and Information Management

More information

Feature. How to Maximize Evidential Weight of Electronically Stored Information Recommendations of BS 10008

Feature. How to Maximize Evidential Weight of Electronically Stored Information Recommendations of BS 10008 Feature Haris Hamidovic, CIA, ISMS IA, ITIL, IT Project+, is chief information security officer at Microcredit Foundation EKI Sarajevo, Bosnia and Herzegovina. Prior to his current assignment, Hamidovic

More information

Security Considerations for Public Mobile Cloud Computing

Security Considerations for Public Mobile Cloud Computing Security Considerations for Public Mobile Cloud Computing Ronnie D. Caytiles 1 and Sunguk Lee 2* 1 Society of Science and Engineering Research Support, Korea rdcaytiles@gmail.com 2 Research Institute of

More information

Securing Big Data in the Cloud: Towards a More Focused and Data Driven Approach. Ragib Hasan, UAB Anthony Skjellum, Auburn 2014 NSF Big Data Workshop

Securing Big Data in the Cloud: Towards a More Focused and Data Driven Approach. Ragib Hasan, UAB Anthony Skjellum, Auburn 2014 NSF Big Data Workshop Securing Big Data in the Cloud: Towards a More Focused and Data Driven Approach Ragib Hasan, UAB Anthony Skjellum, Auburn 2014 NSF Big Data Workshop [Cloud Computing] is a security nightmare and it can't

More information

Strategies for assessing cloud security

Strategies for assessing cloud security IBM Global Technology Services Thought Leadership White Paper November 2010 Strategies for assessing cloud security 2 Securing the cloud: from strategy development to ongoing assessment Executive summary

More information

Purpose. Service Model SaaS (Applications) PaaS (APIs) IaaS (Virtualization) Use Case 1: Public Use Case 2: Use Case 3: Public.

Purpose. Service Model SaaS (Applications) PaaS (APIs) IaaS (Virtualization) Use Case 1: Public Use Case 2: Use Case 3: Public. Federal CIO Council Information Security and Identity Management Committee (ISIMC) Guidelines for the Secure Use of Cloud Computing by Federal Departments and Agencies DRAFT V0.41 Earl Crane, CISSP, CISM

More information

HKITPC Competency Definition

HKITPC Competency Definition HKITPC Competency Definition for the Certification copyright 2011 HKITPC HKITPC Competency Definition Document Number: HKCS-CD-L1L2 Version: 1.0 Date: June 2011 Prepared by Hong Kong IT Professional Certification

More information

The NIST Definition of Cloud Computing

The NIST Definition of Cloud Computing Special Publication 800-145 The NIST Definition of Cloud Computing Recommendations of the National Institute of Standards and Technology Peter Mell Timothy Grance NIST Special Publication 800-145 The NIST

More information

Breakfast Meeting: Securing your Secured Data Digital Forensics, Fraud and Forensic Advancements

Breakfast Meeting: Securing your Secured Data Digital Forensics, Fraud and Forensic Advancements Breakfast Meeting: Securing your Secured Data Digital Forensics, Fraud and Forensic Advancements 9 April 2013 Facilitator: Dr. Sheau-Dong Lang, Coordinator Master of Science in Digital Forensics University

More information

NIST Cloud Computing Reference Architecture & Taxonomy Working Group

NIST Cloud Computing Reference Architecture & Taxonomy Working Group NIST Cloud Computing Reference Architecture & Taxonomy Working Group Robert Bohn Information Technology Laboratory June 21, 2011 2 Outline Cloud Background Objective Working Group background NIST Cloud

More information