Cyber Security and Privacy in Cloud Computing: Multidisciplinary Research Problems in Business
|
|
|
- April Woods
- 10 years ago
- Views:
Transcription
1 Cyber Security and Privacy in Cloud Computing: Multidisciplinary Research Problems in Business Ross A. Lumley The George Washington University Report GW-CSPRI December 18, 2010 Abstract Cloud computing has hit the information technology landscape like a tsunami. But is it safe? Is it the right strategy? Is it the right time? These are questions that enterprise executives must answer because security is management s number one concern. We will examine these questions from various security perspectives. All of the best practice processes for securing the enterprise still apply with cloud computing. We will explore eight multidisciplinary issues affecting security management from a business perspective: 1) who is responsible for security, 2) Cloud services provider transparency, 3) how penetration tests are conducted, 4) what happens when a cloud computing service provider goes bankrupt or is acquired by another company, 5) how we gather forensic evidence in the case of a breach, 6) what are the hypervisor vulnerabilities, 7) what problems derive from a layered cloud architecture, and 8) lack of direct experience. We will examine the many security issues involved with cloud computing and offer insight into how to deal with these issues. Work supported by the Office of the Vice President for Academic Affairs and the School of Engineering and Applied Science of The George Washington University
2
3 Cyber Security and Privacy in Cloud Computing: Multidisciplinary Research Problems in Business Ross A. Lumley The George Washington University Introduction We are now in the midst of a classic technology hype cycle called cloud computing. In the vocabulary of the Gartner Group [1] we are at the peak of inflated expectations. Despite the media hyping cloud computing, there can still be tremendous benefit to many who adopt a cloud computing strategy. This benefit exists for industry, government and the general public alike. We already see the consumer extensively using cloud computing with such services as Google Mail, YouTube, Flickr and many others. A widespread concern regarding cloud computing is security. People s initial reaction is to avoid having private data in the cloud. While this represents a general lack of understanding, it can be a valid concern. This paper will focus on the issues, solution strategies, and areas for potential research. Cloud Computing Defined Before addressing the issues, it is important to understand what cloud computing means, the different types of cloud computing, and the various delivery mechanisms. The National Institute of Standards and Technology (NIST) has been very involved in setting a framework for cloud computing use by the government. A mission statement on the NIST Cloud Computing website tells us what NIST sees as their role: [2] NIST s role in cloud computing is to promote the effective and secure use of the technology within government and industry by providing technical guidance and promoting standards of cloud computing. While the NIST definition is by no means the only definition in industry, it offers one that is clear, concise and well thought out. A Working Definition of Cloud Computing from Mell [3] of NIST is as follows: Cloud computing is a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction. This cloud model promotes availability and is defined in terms of 1) essential characteristics, 2) service models and 3) deployment models. Cyber Security and Privacy in Cloud Computing: Multidisciplinary Research Problems in Business 1
4 1. The Essential Cloud Characteristics are: On-demand self-service Broad network access Resource pooling Location independence Rapid elasticity Measured service 2. The Cloud Service Models are: Software as a Service (SaaS) Use provider s applications over a network Platform as a Service (PaaS) Deploy customer-created applications to a cloud Infrastructure as a Service (IaaS) Rent processing, storage, network capacity, and other fundamental computing resources 3. The Cloud Deployment Models are: Private cloud: enterprise owned or leased Community cloud: shared infrastructure for specific community Public cloud: sold to the public, mega-scale infrastructure Hybrid cloud: composition of two or more cloud types Focusing on the Cloud Service Models, as shown in Figure 1, NIST [2] highlights a shared security management responsibility that we discuss further in Issue #1 below. The figure illustrates the security control responsibilities between the cloud provider and the cloud customer. Figure 1. NIST Cloud Service Model Definition (source: NIST [2]) Cyber Security and Privacy in Cloud Computing: Multidisciplinary Research Problems in Business 2
5 The cloud service models in Figure 1 are not merely three independent approaches to cloud computing. In Figure 2, Briscoe and Marinos [4] show the many interrelationships between these service models and the actors. Later in this paper, we will see that this concept adds new security issues. Gartner [5] refers to this as the layered cloud architecture. Cloud Computing Issues How does the simple security model known as the CIA (Confidentiality, Integrity, and Availability) triad for security pertaining to cloud computing? We will discuss eight key issues with cloud computing and explore where these issues fit within CIA. Figure 2. Cloud Computing Layer Interrelationships (source: Briscoe and Marinos [4]) Recently, Congress conducted a hearing to probe the potential issues that might be facing the Federal Government as it moves aggressively into cloud computing.[6] Federal Chief Information Officer (CIO) Vivek Kundra said the government spends a quarter of its $80 billion annual IT budget on basic infrastructure such as hardware, software, electricity, and personnel. He said shifting to the cloud could significantly lower those costs. Kundra had a long track record of leveraging cloud computing when he was CIO for the District of Columbia. Cyber Security and Privacy in Cloud Computing: Multidisciplinary Research Problems in Business 3
6 During the hearing, it was noted that 22 of 24 agencies have concerns about security in the cloud computing deployment model. Fortunately, the vendor community assured the Congress that the providers have resolved the security issues. The vendor community may be overly optimistic. In a survey, Microsoft [7] found that while 58 percent of the general population and 86 percent of senior business leaders are excited about the potential of cloud computing, more than 90 percent of these same people are concerned about the security, access, and privacy of their own data in the cloud. In addition, the survey found that the majority of all audiences believe the U.S. government should establish laws, rules, and policies for cloud computing. Change Drivers So why the sudden rush into cloud computing? Haven t we seen unsuccessful attempts at grid computing and utility computing which share many characteristics of cloud computing, most recently Application Service Providers (ASPs)? Several key factors are driving the current stampede. Technology congruence is a major factor as previous attempts into similar infrastructures have fallen short and failed. Many intertwined technologies must be ready to support the infrastructure concurrently, such as broadband availability and virtualization technologies. As the convergence of technologies approaches a feasible level for developing products and service, innovation rapidly leads to practical solutions. That is exactly what we ve been seeing from Google, Amazon, Microsoft and many others. Next, in periods of economic challenges we often see radical shifts in infrastructure solutions as businesses look to cut costs and open up possibilities to gain competitive advantages. Governments also see an opportunity to cut costs and add to their agility. Key Issues with Cloud Computing Security Following is a discussion of key security issues, which are somewhat unique when considering cloud computing. Issue #1: Who is responsible for security? Figure 1 identifies the various cloud computing service models and provides some insight into the responsibilities for security administration. One thing is clear: the responsibility for securing the infrastructure is a shared responsibility between the cloud services provider and the cloud services customer. The distribution of that responsibility between the two participants depends on the deployment model as shown in Figure 1. This issue involves the responsibility for the entire CIA triad. A significant problem from a security management perspective is: how do we conduct security audits and establish that assurances are in place? This clearly calls for cooperation between the cloud computing services provider and cloud computing services customer and is discussed in Issue #2. Cyber Security and Privacy in Cloud Computing: Multidisciplinary Research Problems in Business 4
7 Issue #2: How do we gain transparency into cloud services provider security management? In a speech [8] to the Brookings Institute, Microsoft General Counsel Brad Smith urged the cloud computing vendor community to band together to create rules on privacy and security or face the prospect of having the U.S. Congress pass regulations. Security requirements of government customers cannot be met without this vendor/customer cooperation. Heiser [5] addresses the issue of transparency by positing, the ability to thoroughly analyze the security and continuity risks of many of today s Internet-based commercial services is much reduced compared with traditional computing. He also points out that third-party certifications are immature and unable to address all aspects of cloud computing risk. He identifies three key risk factors in digital implementations as Accessibility, Complexity, and Extensibility. One solution put forth by the U.S. Federal Government is the creation of the Federal Risk and Authorization Management Program (FedRAMP) which is an interagency effort led by the General Services Administration (GSA), under the authority of the Federal Chief Information Officer (CIO), and with joint authorization support from the Department of Homeland Security (DHS), Department of Defense (DOD), and GSA. [9] FedRAMP defines their mission as follows: FedRAMP has been established to provide a standard approach to Assessing and Authorizing (A&A) cloud computing services and products. FedRAMP allows joint authorizations and continuous security monitoring services for Government and Commercial cloud computing systems intended for multiagency use. Joint authorization of cloud providers results in a common security risk model that can be leveraged across the Federal Government. The use of this common security risk model provides a consistent baseline for Cloud based technologies. This common baseline ensures that the benefits of cloud-based technologies are effectively integrated across the various cloud computing solutions currently proposed within the government. The risk model will also enable the government to "approve once, and use often" by ensuring multiple agencies gain the benefit and insight of the FedRAMP's Authorization and access to service provider s authorization packages. It is becoming clear at this point that there are many potential benefits to the wide array of computing paradigms but the real security concern is how to verify the security measures and processes in place. The work of NIST and FEDRAMP provides a major step forward in addressing these issues since the Federal government has enormous power to ensure that the cloud providers will work with the community. Issue #3: How do we conduct penetration tests? Penetration testing (pentest), a key part of vulnerability management, is an approach for evaluating the security of a computer system or network. We must be able to conduct a pentest in Cyber Security and Privacy in Cloud Computing: Multidisciplinary Research Problems in Business 5
8 a cloud computing environment without triggering a response from the provider or causing loss of service for our company as well and any of the multitenant customers. The provider will try to prevent this from happening. This would affect the availability tenet of CIA. Amazon [10] has published a policy that includes a procedure for customers to conduct a pentest. An Amazon Elastic Compute Cloud (EC2) customer that wants to simulate a real-world attack without violating that policy is required to request permission to do a pentest. Amazon keeps this request confidential and answers within 24 hours in a non-automated fashion. While Amazon s recent policy provides a workable methodology for conducting a pentest, there are many other cloud service models that need a similar solution. Issue #4: What happens when a cloud computing service provider goes bankrupt or is acquired by another company? With any outsourcing strategy, it is standard practice to have many performance terms defined in a Service Level Agreement (SLA). In addition to an SLA, some unique issues must be dealt with such as ownership of the data, the right to audit, and the location of the data (at least from a country perspective). One critical issue is caused by the potential for vendor lock-in due to the proprietary nature of many cloud provider services. The proprietary nature combined with the potential for a cloud provider to go out of business or be acquired by a company with different policies poses a serious potential problem. SLAs and other contractual arrangements can provide effective protection. There are also strategies for minimizing the impact of proprietary services such as basing services on open source and industry standard based products. This is an example of the availability in the CIA triad. Planning for the possible event falls into the business continuity and disaster planning process. Issue #5: How do we gather forensic evidence in the case of a breach? Computer forensic investigations are based on quantitative analysis of computer systems searching for evidence that can be used in legal proceedings. How do we gather forensic evidence when the cloud instance becomes a crime scene? [11] From a CIA perspective this would be an investigation into a breach of all three tenets. In December 2009, Amazon introduced Elastic Block Storage (EBS) boot volumes allowing the launching of a virtual machine image from a virtual storage area network (SAN). This is similar to attaching an external drive to a physical computer. John Reese [12] describes a process for gathering forensics at the IaaS level of cloud computing. He points out that with the new EBS-based server in the Amazon cloud, you have the ability to take a snapshot of the running virtual system the moment you learn of a compromise. A snapshot takes just a few seconds and then you can take the compromised server offline. With the compromised server offline, you can begin the forensics process by attaching copies of the snapshot you took prior to taking the server offline to separate cloud-based servers. You can even run investigative tests against the data with the knowledge that you have a snapshot of a pristine copy of the compromise state. Cyber Security and Privacy in Cloud Computing: Multidisciplinary Research Problems in Business 6
9 This approach offers a sound solution in the case of the Amazon IaaS offerings, but things get more complicated as we move up to the PaaS and SaaS levels. At these levels, we see in Figure 1 that the shared security management responsibilities between the provider and customer move up into the development platform level and even the application itself with SaaS. Issue #6: Hypervisor vulnerabilities A key technology introduced with cloud computing is the hypervisor, i.e. the low-level operating system layer (sometimes known as a virtual machine monitor) which allows multiple operating systems (called guests) to run concurrently on a host computer. The hypervisor function exists whenever we are using virtualization. It essentially presents virtual hardware to the software running above the hypervisor layer. As can be seen in Figure 1 at the IaaS level, the hypervisor separates the layers that the cloud service provider controls from the layers controlled by the customer. As always happens when we introduce new technology to gain a new capability, we also add new risks, vulnerabilities. and the potential for exploits. In the public cloud it is common that these guest operating systems will belong to totally different customers, a concept referred to as multi-tenancy. The introduction of the hypervisor, along with the paradigm of public cloud computing, can result in a new type of threat of a hypervisor breach allowing one virtual machine customer to gain access to the data of different customer. Because the hypervisor handles multiple virtual machines within a physical machine, an attack against the hypervisor could compromise multiple applications and, in the case of public cloud computing services, multiple customers' systems and applications could be compromised. The attacker then could steal user information, spread malware, or deploy the cloud's computing resources for other attacks. Hypervisor vulnerabilities are certainly patched quickly once discovered, but as a intrusion detection capability, NC State and IBM [13] researchers have developed a prototype security tool that operates in stealth mode to determine the security of a hypervisor so as not to tip off attackers. The so-called HyperSentry software runs outside the hypervisor to verify in real time whether malware or an attacker has compromised it. Issue #7: Layered cloud architecture Cloud computing enables a decoupling of the layers, with both the customer and service provider taking on whatever level of value-added services with which they are most comfortable. In an increasing number of cases, the provider is itself the buyer of a lower-level service, such as a platform, infrastructure, or physical rack space. While the PaaS model is less popular today as a service for end users, a growing number of SaaS offerings are hosted within some other vendor's PaaS or IaaS service. Such a nested hosting arrangement increases the platform risks and especially the network risks associated with a multi-tenanted environment, and it adds layers between the customer and the Cyber Security and Privacy in Cloud Computing: Multidisciplinary Research Problems in Business 7
10 actual point of operations. This, combined with lack of transparency, increases the complexity and thus the security risks. Figure 3. Complexity and Accessibility Increase Risk (source: Heiser [5]) Issue #8: Lack of direct experience We are now asking inexperienced bureaucrats and non-technical policy makers to set regulations on cloud computing use. At a conference in 2010, Balding [14], founder of cloudsecurity.org, asked a room of 100 security professionals how many had actually used the cloud for data storage and how many have actually launched an instance of an Amazon Elastic Compute Cloud (EC2) virtual machine. The response was that twenty had used cloud data storage and six had launched an EC2 instance. These are security professionals so one can imagine the folklore that influences the bulk of the community. In Figure 3, Heiser [5] provides an interesting view of cloud computing technologies and from this a roadmap for the enterprise to move from the familiar corporate data center to a fully shared cloud environment. The characterization of the regions represents different levels of maturity and competence in situating data and applications in the same deployment models identified by NIST as mentioned earlier. The level of risk is lowest for the corporate data center because complexity is lower. He states that services in the upper right are complex and highly exposed with reduced transparency and thus the most challenging for conducting risk management. The maturity level in dealing with these issues should dictate the type of cloud computing service appropriate for a given organization. Cyber Security and Privacy in Cloud Computing: Multidisciplinary Research Problems in Business 8
11 The Bottom Line on the Issues Beyond the issues of analysis and verification, the security issues largely become those we are already familiar, at least from a procedural standpoint. Issues are being identified, but in most cases we have solutions given appropriate access and cooperation. Cloud computing presents new challenges but the problems are familiar and all fall under the CIA triad. These are familiar risk management problems of risk analysis and mitigation. Outsourcing is not new and as always with outsourcing, transparency is a problem. But the U.S. Federal Government is addressing many of these vendor transparency issues through FedRAMP and the NIST efforts. Application software vulnerabilities do and will exist but these typically are the same as with traditional computing (especially at the SaaS level). Above all, we need to develop and tailor policies, procedures, standards, and tools specifically to address the above issues. In the next section, we will outline research endeavors that also will combine with other processes mentioned above to address these issues. Research Areas of Interest for Cloud Computing Security As discussed above, many of the issues we have raised are addressed with established security management techniques or changes that have already been put forth to deal with unique challenges. This is only the beginning in addressing security concerns with cloud computing. Much work and research needs to be done to answer all the issues. Research into cloud computing security issues includes the following: Specific intrusion detection tools for the cloud (e.g. OSSEC Open Source Host-based Intrusion Detection System) Forensic tools for cloud services models Paas and SaaS. The EBS Volumes on Amazon s cloud services offer a very effective way to snapshot a running virtual server on IaaS. The safety of SaaS cloud offerings is a broad and very important area. We need all manner of research into the safety of popular cloud SaaS offerings. The Open Web Application Security Project (OWASP) guidelines focus on improving the security of application software. Similar guidelines should be identified for SaaS applications. Policy research that may shape new laws The hybrid deployment model identified by the NIST definitions offers a good strategy for having a common infrastructure where a part resides behind the firewall. This approach needs further research but has the potential to address concerns about moving private data into the cloud. The research topics described above are part of the agenda for the Cloud Computing Research Laboratory at The George Washington University Science and Technology Campus in Ashburn, Virginia. As we enter a new era of global business, with proper security management in place, cloud computing offers much more than just another computing platform. Instead, greater business Cyber Security and Privacy in Cloud Computing: Multidisciplinary Research Problems in Business 9
12 agility and flexibility becomes possible in defining new business models and formulating enterprise strategy. Cyber Security and Privacy in Cloud Computing: Multidisciplinary Research Problems in Business 10
13 [1] David Mitchell Smith. Hype Cycle for Cloud Computing. Gartner Research Group, , Web. 3 Dec [2] Presentation on Effectively and Securely Using the Cloud Computing Paradigm. csrc.nist.gov. Web. 18, December [3] Peter Mell and Tim Grance. The NIST Definition of Cloud Computing. National Institute of Standards and Technology, Information Technology Laboratory. Version 15, [4] Gerald Briscoe and Alexandros Marinos. Digital Ecosystems in the Clouds: Towards Community Cloud Computing, 2009, [5] Jay Heiser. Analyzing the Risk Dimensions of Cloud and SaaS Computing. Gartner Research Publication G , [6] Oversight Daily--Committee Examines Government-wide Transition to Cloud Computing. Committee on Oversight and Government Reform. N.p., 1 July Web. 19 Dec [7] Grant Gross. Microsoft Calls for Cloud Computing Transparency. IDG News, Jan [8] Microsoft Urges Government and Industry to Work Together to Build Confidence in the Cloud. Microsoft News Center, January [9] cio.gov. Web. 18 Dec Authorization-Management-Program-FedRAMP [10] Amazon.com. Web. 18, Dec [11] Webb Hobson. Securing the Cloud: Digital Investigations for the Cloud. Sans, November [12] George Reese. Cloud Forensics Using EBS Boot Volumes. Oreilly.com,. Web. 18, January [13] Kelly Jackson Higgins. NC State, IBM Researchers Create Stealth Hypervisor Security Tool Will Ultimately Be Offered as Open Source. Darkreading.com. Web. 18, September index.html [14] Craig Balding. Cloud Security Threats Survey. Cloudsecurity.org/blog. Web. 18, February [15] owasp.org. Web. Cyber Security and Privacy in Cloud Computing: Multidisciplinary Research Problems in Business 11
14 Ross A. Lumley Information Systems and Technology Management Department School of Business The George Washington University Washington, D.C. Dr. Ross Lumley is an Assistant Professor of Information Systems and Technology Management in the School of Business at the George Washington University. He received a PhD in Management Science from the University of Texas at Dallas, a Master of Science in Management Science from the University of Texas at Dallas and a Bachelor of Science in Electrical Engineering and Computer Science from the University of California at Berkeley. Dr. Lumley s 40 years of experience in industry spans a wide variety of roles involving all aspects of information systems development as a developer, consultant, research fellow, and project manager. His areas of expertise are in security, performance engineering, enterprise architecture, advanced networking, mobile network applications, large scale computing for Internet applications, virtualization, cloud computing, and virtual environments for collaboration. Dr. Lumley has published articles on performance engineering, high availability applications, Internet technologies, and multiprocessor systems. His most recent research efforts are in the areas of virtualization with open source technologies and building private cloud computing platforms directed toward the classroom and new paradigms in technology curriculum. Dr. Lumley has created the Cloud Computing Research Laboratory at The George Washington University Science and Technology campus in Ashburn, VA. He has presented his research outcomes in major regional, national and international conferences.
Perspectives on Moving to the Cloud Paradigm and the Need for Standards. Peter Mell, Tim Grance NIST, Information Technology Laboratory 7-11-2009
Perspectives on Moving to the Cloud Paradigm and the Need for Standards Peter Mell, Tim Grance NIST, Information Technology Laboratory 7-11-2009 2 NIST Cloud Computing Resources NIST Draft Definition of
Security & Trust in the Cloud
Security & Trust in the Cloud Ray Trygstad Director of Information Technology, IIT School of Applied Technology Associate Director, Information Technology & Management Degree Programs Cloud Computing Primer
Cloud Computing; What is it, How long has it been here, and Where is it going?
Cloud Computing; What is it, How long has it been here, and Where is it going? David Losacco, CPA, CIA, CISA Principal January 10, 2013 Agenda The Cloud WHAT IS THE CLOUD? How long has it been here? Where
Perspectives on Cloud Computing and Standards. Peter Mell, Tim Grance NIST, Information Technology Laboratory
Perspectives on Cloud Computing and Standards Peter Mell, Tim Grance NIST, Information Technology Laboratory Caveats and Disclaimers This presentation provides education on cloud technology and its benefits
ITL BULLETIN FOR JUNE 2012 CLOUD COMPUTING: A REVIEW OF FEATURES, BENEFITS, AND RISKS, AND RECOMMENDATIONS FOR SECURE, EFFICIENT IMPLEMENTATIONS
ITL BULLETIN FOR JUNE 2012 CLOUD COMPUTING: A REVIEW OF FEATURES, BENEFITS, AND RISKS, AND RECOMMENDATIONS FOR SECURE, EFFICIENT IMPLEMENTATIONS Shirley Radack, Editor Computer Security Division Information
Seeing Though the Clouds
Seeing Though the Clouds A PM Primer on Cloud Computing and Security NIH Project Management Community Meeting Mark L Silverman Are You Smarter Than a 5 Year Old? 1 Cloud First Policy Cloud First When evaluating
The Elephant in the Room: What s the Buzz Around Cloud Computing?
The Elephant in the Room: What s the Buzz Around Cloud Computing? Warren W. Stippich, Jr. Partner and National Governance, Risk and Compliance Solution Leader Business Advisory Services Grant Thornton
Cloud Computing for SCADA
Cloud Computing for SCADA Moving all or part of SCADA applications to the cloud can cut costs significantly while dramatically increasing reliability and scalability. A White Paper from InduSoft Larry
Awareness, Trust and Security to Shape Government Cloud Adoption
Awareness, Trust and Security to Shape Government Adoption Awareness Trust Security A white paper by: April 1 1 Executive Summary The awareness, trust and security issues that have limited federal government
Flying into the Cloud: Do You Need a Navigator? Services. Colin R. Chasler Vice President Solutions Architecture Dell Services Federal Government
Services Flying into the Cloud: Do You Need a Navigator? Colin R. Chasler Vice President Solutions Architecture Dell Services Federal Government Table of Contents Executive Summary... 3 Current IT Challenges...
WRITTEN TESTIMONY OF NICKLOUS COMBS CHIEF TECHNOLOGY OFFICER, EMC FEDERAL ON CLOUD COMPUTING: BENEFITS AND RISKS MOVING FEDERAL IT INTO THE CLOUD
WRITTEN TESTIMONY OF NICKLOUS COMBS CHIEF TECHNOLOGY OFFICER, EMC FEDERAL ON CLOUD COMPUTING: BENEFITS AND RISKS MOVING FEDERAL IT INTO THE CLOUD BEFORE THE COMMITTEE ON OVERSIGHT AND GOVERNMENT REFORM
A COALFIRE PERSPECTIVE. Moving to the Cloud. NCHELP Spring Convention Panel May 2012
A COALFIRE PERSPECTIVE Moving to the Cloud A Summary of Considerations for Implementing Cloud Migration Plans into New Business Platforms NCHELP Spring Convention Panel May 2012 DALLAS DENVER LOS ANGELES
ISSUE BRIEF. Cloud Security for Federal Agencies. Achieving greater efficiency and better security through federally certified cloud services
ISSUE BRIEF Cloud Security for Federal Agencies Achieving greater efficiency and better security through federally certified cloud services This paper is intended to help federal agency executives to better
[email protected] [email protected]
1 The following is merely a collection of notes taken during works, study and just-for-fun activities No copyright infringements intended: all sources are duly listed at the end of the document This work
Expert Reference Series of White Papers. Understanding NIST s Cloud Computing Reference Architecture: Part II
Expert Reference Series of White Papers Understanding NIST s Cloud Computing Reference Architecture: Part II [email protected] www.globalknowledge.net Understanding NIST s Cloud Computing Reference
Cloud Computing and Security Risk Analysis Qing Liu Technology Architect STREAM Technology Lab [email protected]
Cloud Computing and Security Risk Analysis Qing Liu Technology Architect STREAM Technology Lab [email protected] 1 Disclaimers This presentation provides education on Cloud Computing and its security
Written Testimony. Mark Kneidinger. Director, Federal Network Resilience. Office of Cybersecurity and Communications
Written Testimony of Mark Kneidinger Director, Federal Network Resilience Office of Cybersecurity and Communications U.S. Department of Homeland Security Before the U.S. House of Representatives Committee
IT Risk and Security Cloud Computing Mike Thomas Erie Insurance May 2011
IT Risk and Security Cloud Computing Mike Thomas Erie Insurance May 2011 Cloud Basics Cloud Basics The interesting thing about cloud computing is that we've redefined cloud computing to include everything
Keeping up with the World of Cloud Computing: What Should Internal Audit be Thinking About?
Keeping up with the World of Cloud Computing: What Should Internal Audit be Thinking About? IIA San Francisco Chapter October 11, 2011 Agenda Introductions Cloud computing overview Risks and audit strategies
Cloud Computing 159.735. Submitted By : Fahim Ilyas (08497461) Submitted To : Martin Johnson Submitted On: 31 st May, 2009
Cloud Computing 159.735 Submitted By : Fahim Ilyas (08497461) Submitted To : Martin Johnson Submitted On: 31 st May, 2009 Table of Contents Introduction... 3 What is Cloud Computing?... 3 Key Characteristics...
Security Issues in Cloud Computing
Security Issues in Computing CSCI 454/554 Computing w Definition based on NIST: A model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources
Open Source and Cloud. Ramesh Kumar
Open Source and Cloud Ramesh Kumar Agenda Introduction to Open Source Potential Benefits Potential Disadvantages/ Risks Costs vis a vis Business Needs What is Cloud technology? Benefits V/s Risks of Cloud
Cloud Security: Evaluating Risks within IAAS/PAAS/SAAS
Cloud Security: Evaluating Risks within IAAS/PAAS/SAAS Char Sample Security Engineer, Carnegie Mellon University CERT Information Security Decisions TechTarget Disclaimer Standard Disclaimer - This talk
DEPARTMENT OF VETERANS AFFAIRS VA DIRECTIVE 6517 CLOUD COMPUTING SERVICES
DEPARTMENT OF VETERANS AFFAIRS VA DIRECTIVE 6517 Washington, DC 20420 Transmittal Sheet February 28, 2012 CLOUD COMPUTING SERVICES 1. REASON FOR ISSUE: This Directive establishes the Department of Veterans
CLOUD COMPUTING. Agencies Need to Incorporate Key Practices to Ensure Effective Performance
United States Government Accountability Office Report to Congressional Requesters April 2016 CLOUD COMPUTING Agencies Need to Incorporate Key Practices to Ensure Effective Performance GAO-16-325 April
Public Clouds. Krishnan Subramanian Analyst & Researcher Krishworld.com. A whitepaper sponsored by Trend Micro Inc.
Public Clouds Krishnan Subramanian Analyst & Researcher Krishworld.com A whitepaper sponsored by Trend Micro Inc. Introduction Public clouds are the latest evolution of computing, offering tremendous value
OWASP Chapter Meeting June 2010. Presented by: Brayton Rider, SecureState Chief Architect
OWASP Chapter Meeting June 2010 Presented by: Brayton Rider, SecureState Chief Architect Agenda What is Cloud Computing? Cloud Service Models Cloud Deployment Models Cloud Computing Security Security Cloud
Cloud Computing: The Next Computing Paradigm
Cloud Computing: The Next Computing Paradigm Ronnie D. Caytiles 1, Sunguk Lee and Byungjoo Park 1 * 1 Department of Multimedia Engineering, Hannam University 133 Ojeongdong, Daeduk-gu, Daejeon, Korea [email protected],
Managing Cloud Computing Risk
Managing Cloud Computing Risk Presented By: Dan Desko; Manager, Internal IT Audit & Risk Advisory Services Schneider Downs & Co. Inc. [email protected] Learning Objectives Understand how to identify
Cloud Essentials for Architects using OpenStack
Cloud Essentials for Architects using OpenStack Course Overview Start Date 18th December 2014 Duration 2 Days Location Dublin Course Code SS906 Programme Overview Cloud Computing is gaining increasing
Guidelines for Successful Cloud Investments by deborah collier Technology Policy Director
Cloud Computing 201: Guidelines for Successful Cloud Investments issue brief #2 / 2011 Cloud Computing 201: Guidelines for Successful Cloud Investments by deborah collier Technology Policy Director 1301
White Paper on CLOUD COMPUTING
White Paper on CLOUD COMPUTING INDEX 1. Introduction 2. Features of Cloud Computing 3. Benefits of Cloud computing 4. Service models of Cloud Computing 5. Deployment models of Cloud Computing 6. Examples
GAO. INFORMATION SECURITY Governmentwide Guidance Needed to Assist Agencies in Implementing Cloud Computing
GAO For Release on Delivery Expected at 10:00 a.m. EDT Thursday, July 1, 2010 United States Government Accountability Office Testimony Before the Committee on Oversight and Government Reform and Its Subcommittee
Cloud Security Implications for Financial Institutions By Scott Galyk Director of Software Development FIMAC Solutions, LLC
Cloud Security Implications for Financial Institutions By Scott Galyk Director of Software Development FIMAC Solutions, LLC www.fmsinc.org 1 2015 Financial Managers Society, Inc. Cloud Security Implications
IT Security Risk Management Model for Cloud Computing: A Need for a New Escalation Approach.
IT Security Risk Management Model for Cloud Computing: A Need for a New Escalation Approach. Gunnar Wahlgren 1, Stewart Kowalski 2 Stockholm University 1: ([email protected]), 2: ([email protected]) ABSTRACT
Cloud Computing Technology
Cloud Computing Technology The Architecture Overview Danairat T. Certified Java Programmer, TOGAF Silver [email protected], +66-81-559-1446 1 Agenda What is Cloud Computing? Case Study Service Model Architectures
Security Considerations for Public Mobile Cloud Computing
Security Considerations for Public Mobile Cloud Computing Ronnie D. Caytiles 1 and Sunguk Lee 2* 1 Society of Science and Engineering Research Support, Korea [email protected] 2 Research Institute of
Information Security in the Clouds
Systems Engineering at MITRE CLOUD COMPUTING SERIES Information Security in the Clouds Donald Faatz Lawrence Pizette Executive Summary Deploying data and applications to a cloud computing environment,
Daren Kinser Auditor, UCSD Jennifer McDonald Auditor, UCSD
Daren Kinser Auditor, UCSD Jennifer McDonald Auditor, UCSD Agenda Cloud Computing Technical Overview Cloud Related Applications Identified Risks Assessment Criteria Cloud Computing What Is It? National
Building an AWS-Compatible Hybrid Cloud with OpenStack
Building an AWS-Compatible Hybrid Cloud with OpenStack AWS is Transforming IT Amazon Web Services (AWS) commands a significant lead in the public cloud services market, with revenue estimated to grow from
Tamanna Roy Rayat & Bahra Institute of Engineering & Technology, Punjab, India [email protected]
IJCSIT, Volume 1, Issue 5 (October, 2014) e-issn: 1694-2329 p-issn: 1694-2345 A STUDY OF CLOUD COMPUTING MODELS AND ITS FUTURE Tamanna Roy Rayat & Bahra Institute of Engineering & Technology, Punjab, India
Cloud Computing. Bringing the Cloud into Focus
Cloud Computing Bringing the Cloud into Focus November 2011 Introduction Ken Cochrane CEO, IT/NET Partner, KPGM Performance and Technology National co-leader IT Advisory Services KPMG Andrew Brewin Vice
How to Use the Federal Risk and Authorization Management Program (FedRAMP) for Cloud Computing
How to Use the Federal Risk and Authorization Management Program (FedRAMP) for Cloud Computing Warren S. Udy, CISSP Senior Cyber Security Advisor Office of Cyber Security 301-903-5515 [email protected]
CSO Cloud Computing Study. January 2012
CSO Cloud Computing Study January 2012 Purpose and Methodology Survey Sample Survey Method Fielded Dec 20, 2011-Jan 8, 2012 Total Respondents Margin of Error +/- 7.3% Audience Base Survey Goal 178 security
International Journal of Scientific & Engineering Research, Volume 6, Issue 5, May-2015 1681 ISSN 2229-5518
International Journal of Scientific & Engineering Research, Volume 6, Issue 5, May-2015 1681 Software as a Model for Security in Cloud over Virtual Environments S.Vengadesan, B.Muthulakshmi PG Student,
Cloud Computing Characteristics Are Key
White Paper by Christopher Olive Chief Architect www.gpworldwide.com 2011 What is cloud computing? Cloud computing remains the buzzword winner of the current technology paradigm. The National Institute
Cloud Services Overview
Cloud Services Overview John Hankins Global Offering Executive Ricoh Production Print Solutions May 23, 2012 Cloud Services Agenda Definitions Types of Clouds The Role of Virtualization Cloud Architecture
Trust but Verify. Vincent Campitelli. VP IT Risk Management
Trust but Verify Vincent Campitelli VP IT Risk Management McKesson Corporation Trust but Verify Cloud Security 3 Agenda Cloud Defined Cloud Opportunities Cloud Challenges What s Different? How to Verify
Architectural Implications of Cloud Computing
Architectural Implications of Cloud Computing Grace Lewis Research, Technology and Systems Solutions (RTSS) Program Lewis is a senior member of the technical staff at the SEI in the Research, Technology,
ITSM in the Cloud. An Overview of Why IT Service Management is Critical to The Cloud. Presented By: Rick Leopoldi RL Information Consulting LLC
ITSM in the Cloud An Overview of Why IT Service Management is Critical to The Cloud Presented By: Rick Leopoldi RL Information Consulting LLC What s Driving the Move to Cloud Computing Greater than 70%
Perspectives on Cloud Computing and Standards. Peter Mell, Tim Grance NIST, Information Technology Laboratory
Perspectives on Cloud Computing and Standards Peter Mell, Tim Grance NIST, Information Technology Laboratory Standardization and Cloud Computing Cloud computing is a convergence of many technologies Some
Technology & Business Overview of Cloud Computing
Your Place or Mine? In-House e-discovery Platform vs. Software as a Service Technology & Business Overview of Cloud Computing Janine Anthony Bowen, Esq. Jack Attorneys & Advisors www.jack-law.com Atlanta,
The NIST Definition of Cloud Computing
Special Publication 800-145 The NIST Definition of Cloud Computing Recommendations of the National Institute of Standards and Technology Peter Mell Timothy Grance NIST Special Publication 800-145 The NIST
SECURITY MODELS FOR CLOUD 2012. Kurtis E. Minder, CISSP
SECURITY MODELS FOR CLOUD 2012 Kurtis E. Minder, CISSP INTRODUCTION Kurtis E. Minder, Technical Sales Professional Companies: Roles: Security Design Engineer Systems Engineer Sales Engineer Salesperson
Cloud Computing. Key Initiative Overview
David W. Cearley Research Vice President and Gartner Fellow This overview provides a high-level description of the Cloud Computing Key Initiative. IT leaders can use this guide to understand what they
Overview. FedRAMP CONOPS
Concept of Operations (CONOPS) Version 1.0 February 7, 2012 Overview Cloud computing technology allows the Federal Government to address demand from citizens for better, faster services and to save resources,
The NIST Definition of Cloud Computing (Draft)
Special Publication 800-145 (Draft) The NIST Definition of Cloud Computing (Draft) Recommendations of the National Institute of Standards and Technology Peter Mell Timothy Grance NIST Special Publication
Capability Paper. Today, aerospace and defense (A&D) companies find
Today, aerospace and defense (A&D) companies find Today, aerospace and defense (A&D) companies find themselves at potentially perplexing crossroads. On one hand, shrinking defense budgets, an increasingly
Capturing the New Frontier:
Capturing the New Frontier: How Software Security Unlocks the Power of Cloud Computing Executive Summary Cloud computing is garnering a vast share of IT interest. Its promise of revolutionary cost savings
The cloud - ULTIMATE GAME CHANGER ===========================================
The cloud - ULTIMATE GAME CHANGER =========================================== When it comes to emerging technologies, there is one word that has drawn more controversy than others: The Cloud. With cloud
INTRODUCTION TO CLOUD COMPUTING CEN483 PARALLEL AND DISTRIBUTED SYSTEMS
INTRODUCTION TO CLOUD COMPUTING CEN483 PARALLEL AND DISTRIBUTED SYSTEMS CLOUD COMPUTING Cloud computing is a model for enabling convenient, ondemand network access to a shared pool of configurable computing
CHAPTER 8 CLOUD COMPUTING
CHAPTER 8 CLOUD COMPUTING SE 458 SERVICE ORIENTED ARCHITECTURE Assist. Prof. Dr. Volkan TUNALI Faculty of Engineering and Natural Sciences / Maltepe University Topics 2 Cloud Computing Essential Characteristics
Architecting the Cloud
Architecting the Cloud Sumanth Tarigopula Director, India Center, Best Shore Applications Services 2011Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without
Cloud Computing Best Practices. Creating Effective Cloud Computing Contracts for the Federal Government: Best Practices for Acquiring IT as a Service
Cloud Computing Best Practices Cloud Computing Best Practices Creating Effective Cloud Computing Contracts for the Federal Government: Best Practices for Acquiring IT as a Service Overview Cloud Computing
How To Understand Cloud Computing
Cloud Computing Today David Hirsch April 2013 Outline What is the Cloud? Types of Cloud Computing Why the interest in Cloud computing today? Business Uses for the Cloud Consumer Uses for the Cloud PCs
How To Protect Your Cloud From Attack
A Trend Micro White Paper August 2015 Trend Micro Cloud Protection Security for Your Unique Cloud Infrastructure Contents Introduction...3 Private Cloud...4 VM-Level Security...4 Agentless Security to
The Magical Cloud. Lennart Franked. Department for Information and Communicationsystems (ICS), Mid Sweden University, Sundsvall.
The Magical Cloud Lennart Franked Department for Information and Communicationsystems (ICS), Mid Sweden University, Sundsvall. 2014-10-20 Lennart Franked (MIUN IKS) The Magical Cloud 2014-10-20 1 / 35
6 Cloud strategy formation. 6.1 Towards cloud solutions
6 Cloud strategy formation 6.1 Towards cloud solutions Based on the comprehensive set of information, collected and analysed during the strategic analysis process, the next step in cloud strategy formation
Commercial Software Licensing
Commercial Software Licensing CHAPTER 12: Prepared by DoD ESI January 2013 Chapter Overview Most software licenses today are either perpetual or subscription. Perpetual licenses involve software possession
Cloud Computing - Overview of Information Assurance Concerns and Opportunities
Cloud Computing - Overview of Information Assurance Concerns and Opportunities NSA's Systems and Network Analysis Center, Version 1.02 18 December 2009 Cloud Technology Introduction Cloud computing is
CLOUD COMPUTING. A Primer
CLOUD COMPUTING A Primer A Mix of Voices The incredible shrinking CIO CIO Magazine, 2004 IT Doesn t Matter, The cloud will ship service outside the institution and ship power from central IT groups to
STATEMENT OF SYLVIA BURNS CHIEF INFORMATION OFFICER U.S. DEPARTMENT OF THE INTERIOR BEFORE THE
STATEMENT OF SYLVIA BURNS CHIEF INFORMATION OFFICER U.S. DEPARTMENT OF THE INTERIOR BEFORE THE HOUSE COMMITTEE ON OVERSIGHT AND GOVERNMENT REFORM SUBCOMMITTEE ON INFORMATION TECHNOLOGY AND SUBCOMMITTE
The Hybrid Cloud: Bringing Cloud-Based IT Services to State Government
The Hybrid Cloud: Bringing Cloud-Based IT Services to State Government October 4, 2009 Prepared By: Robert Woolley and David Fletcher Introduction Provisioning Information Technology (IT) services to enterprises
CLOUD COMPUTING SECURITY ISSUES
CLOUD COMPUTING SECURITY ISSUES Florin OGIGAU-NEAMTIU IT Specialist The Regional Department of Defense Resources Management Studies, Brasov, Romania The term cloud computing has been in the spotlights
Cloud Computing An Elephant In The Dark
Cloud Computing An Elephant In The Dark Amir H. Payberah [email protected] Amirkabir University of Technology (Tehran Polytechnic) Amir H. Payberah (Tehran Polytechnic) Cloud Computing 1394/2/7 1 / 60 Amir
Cloud Computing in a Regulated Environment
Computing in a Regulated Environment White Paper by David Stephenson CTG Regulatory Compliance Subject Matter Expert February 2014 CTG (UK) Limited, 11 Beacontree Plaza, Gillette Way, READING, Berks RG2
Cloud Computing in Higher Education: A Guide to Evaluation and Adoption
Cloud Computing in Higher Education: A Guide to Evaluation and Adoption Executive Summary Public cloud computing delivering infrastructure, services, and software on demand through the network offers attractive
Cloud Computing Safe Harbor or Wild West?
IT Best Practices Series Cloud Computing Safe Harbor or Wild West? With IT expenditures coming under increasing scrutiny, the cloud is being sold as an oasis of practical solutions. It s true that many
Strategic Compliance & Securing the Cloud. Annalea Sharack-Ilg, CISSP, AMBCI Technical Director of Information Security
Strategic Compliance & Securing the Cloud Annalea Sharack-Ilg, CISSP, AMBCI Technical Director of Information Security Complexity and Challenges 2 Complexity and Challenges Compliance Regulatory entities
Strategies for assessing cloud security
IBM Global Technology Services Thought Leadership White Paper November 2010 Strategies for assessing cloud security 2 Securing the cloud: from strategy development to ongoing assessment Executive summary
Essential Characteristics of Cloud Computing: On-Demand Self-Service Rapid Elasticity Location Independence Resource Pooling Measured Service
Cloud Computing Although cloud computing is quite a recent term, elements of the concept have been around for years. It is the maturation of Internet. Cloud Computing is the fine end result of a long chain;
East African Information Conference 13-14 th August, 2013, Kampala, Uganda. Security and Privacy: Can we trust the cloud?
East African Information Conference 13-14 th August, 2013, Kampala, Uganda Security and Privacy: Can we trust the cloud? By Dr. David Turahi Director, Information Technology and Information Management
