When Security, Privacy and Forensics Meet in the Cloud
|
|
|
- Emil Parrish
- 10 years ago
- Views:
Transcription
1 When Security, Privacy and Forensics Meet in the Cloud Dr. Michaela Iorga, Senior Security Technical Lead for Cloud Computing Co-Chair, Cloud Security WG Co-Chair, Cloud Forensics Science WG March 26, 2015
2 NIST MISSION: To promote U.S. innovation and industrial competitiveness by advancing measurement 2 science, standards, and technology in ways that enhance economic security and improve our quality of life Privacy Engineering Project *Standards Acceleration to Jumpstart the Adoption of Cloud Computing (SAJACC) in transition to private sector
3 Standards for Security Categorization of Federal Information and Information Systems (FIPS 199); Feb 2004 Guide for Mapping Types of Information and Information Systems to Security Categories (SP Rev. 1); Aug 2008 Minimum Security Requirements for Federal Information and Information Systems (FIPS 200); Mar 2006 Security Considerations in the System Development Life Cycle (SP Rev. 2); Oct 2008 Guide for Applying the Risk Management Framework to Federal Information Systems: A Security Life Cycle Approach (SP , Rev. 1); Feb 2010 Managing Information Security Risk: Organization, Mission, and Information System View (SP ); Mar 2011 Guide for Conducting Risk Assessments (SP Rev. 1); Sep 2012 Security and Privacy Controls for Federal Information Systems and Organizations (SP Rev. 4); Apr 2013
4 4 Performance Measurement Guide for Information Security (SP Rev. 1); Jul 2008 Contingency Planning Guide for Federal Information Systems (SP Rev. 1); May 2010 Information Security Continuous Monitoring for Federal Information Systems and Organizations (SP ); Sep 2011 Computer Security Incident Handling Guide (SP Rev. 2); Aug 2012 DRAFT Systems Security Engineering: An Integrated Approach to Building Trustworthy Resilient Systems (SP Draft); May 12, 2014 DRAFT Supply Chain Risk Management Practices for Federal Information Systems and Organizations SP (Second Draft); Jun. 3, 2014 Cloud-Adapted Risk Management Framework: Guide for Applying the Risk Management Framework to Cloud-based Federal Information Systems (SP ); work in progress Security and Privacy Controls for Cloud-based Federal Information Systems (SP ); work in progress
5 Slide courtesy of Bill Murray, AWS, Amazon 5
6 What Privacy means to you? Cybersecurity Information Sharing Act : Senator Richard Burr argued that it successfully balanced security and privacy Critics still have two fundamental problems : a) Proposed cybersecurity act won t boost security; b) information sharing it {CISA) describes sounds more than ever like a backchannel for surveillance. The bill, as worded, lets a private company share with the Department of Homeland Security any information construed as a cybersecurity threat notwithstanding any other provision of law.
7
8 Why Do We Fear the Clouds? - Searching For an Answer - NIST: Research Challenging Security Requirement for the USG Cloud Adoption, (whitepaper) MeriTalk: 1... If I like it, it's mine If it's in my hand, it's mine If I can take it from you, it's mine If I had it a little while ago, it is mine If it's mine, it must never appear to be yours in any way If I'm doing or building something, all the pieces are mine If it looks just like mine, it's mine If I saw it first, it's mine If you are playing with something and you put it down, it automatically becomes mine If it is broken, it's yours.
9 Trust & Trustworthiness (NIST SP *) Trust is an important concept related to risk management. How organizations approach trust influences their behaviors and their internal and external trust relationships. [ ] The reliance on IS services results in the need for trust relationships among organizations * 1 Validated Trust. One organization obtains a body of evidence regarding the actions of another organization and uses that evidence to establish a level of trust with the other organization. 2 Direct Historical. The track record exhibited by an organization in the past is used to establish a level of trust with other organizations. 3 Mediated Trust. An organization establishes a level of trust with another organization based on assurances provided by some mutually trusted third party. 4 Mandated Trust. An organization establishes a level of trust with another organization based on a specific mandate issued by a third party in a position of authority. 5Hybrid Trust. An organization uses one of the previously described models in conjunction with another model(s). *NIST SP : Managing Information Security Risk; Organization, Mission, and Information System View
10 Predictability Manageability Unlinkability (or) Obscurity Predictability: Enabling reliable assumptions by individuals and system participants about what personal information is being processed, by whom, and why. Manageability: Providing the capability for granular administration of personal information including alteration, deletion, and selective disclosure. Obscurity/ Unlinkability- Enabling the processing of personal information or events in an information system without association to individuals beyond the operational requirements of the system.
11 Data Actions Likelihood of Problematic Data Actions Personal Information Context AIMING AT MORE THAN WHAT ISO/IEC OFFERS! Impact Privacy Risk
12 You manage Consumer s Level of Control & SP RMF RMF Cloud-adapted RMF RMF Cloud-adapted RMF RMF RMF Cloud-adapted RMF IaaS PaaS SaaS Stack image source: Cloud Security Alliance specification, 2009 Trustworthiness requires visibility into Provider s practices and risk/information security decisions to understand risk tolerance. But level of trust can vary & the accepted risk depends on the established trust relation.
13 NIST s Work Helps Consumers Deal With an Iceberg Architecture SP NIST SP : Cloud-adapted Risk Management Framework RMF Risk Management Framework (SP ) Step 1: Categorize Information System Step 2: Select Security Controls Step 3: Implement Security Controls Step 4: Assess Security Controls Step 5: Authorize Information System Step 6: Monitor Security Controls (Repeat process as necessary) CRM F consumer nsumer co Cloud-adapted Risk Management Framework (SP ) Step 1: Categorize Federal Information System Step 2: Identify Security Requirements, perform a Risk Assessment & select Security Controls Step 3: Select best-fitting Cloud Architecture Step 4: Assess Service Provider(s) & Controls Step 5: Authorize Use of Service Step 6: Monitor Service Provider (on-going, nearreal- time); Repeat process as necessary RMF provider provider Stack -- image image source: source: Cloud Cloud Security Security Alliance Alliance Stack specification, specification,
14 CRMF Cloud-adapted Risk Management Framework cont. 1. Follows NIST RMF (SP Rev1) structure 2. Discusses the impact of cloud computing architecture (deployment model & service type), and cloud characteristics (multi-tenancy, resource-pooling, elasticity, etc.) on Information System Boundary. 3. Introduces the Security Conservation Principle & Privacy Conservation Principle 4. Discusses the notion of TRUST in a cloud ecosystem, and introduces the notion of TRUST BOUNDARY
15 CRMF Cloud-adapted Risk Management Framework cont. RMF consumer RMF provider Risk Management Framework (SP Rev1) : Step 1: Categorize Information System Step 2: Select Security Controls Step 3: Implement Security Controls Step 4: Assess Security Controls Step 5: Authorize Information System Step 6: Monitor Security Controls (Repeat process as necessary) Cloud-adapted Risk Management Framework (SP , draft): Step 1: Categorize System to be migrated Step 2: Identify Security Requirements, perform a Risk Assessment & select Security Controls Step 3: Select best-fitting Cloud Architecture Step 4: Assess Service Provider(s) & Controls Step 5: Authorize Use of Service Step 6: Monitor Service Provider [on-going, near-realtime ] (Repeat process as necessary) Stack - image source: Cloud Security Alliance specification, 2009
16 Cloud-adapted Risk Management Framework cont. Step 1 : Categorize Federal Information System Step 2 : Identify Security Requirements, perform a Risk Assessment & select Security Controls deemed necessary. Step 3 : Select best-fitting Cloud Architecture
17 User-data Boundary User-data Boundary Cloud-adapted Risk Management Framework cont. Step 4: Assess Service Provider(s) & Broker (if applicable) leverage FedRAMP P-ATOs or Agency-ATOs, or assess the controls build necessary TRUST that the residual risk is acceptable Step 5: Authorize Use of Service negotiate SLAs & Security SLA Step 6: Monitor Service Provider(s) (on-going, near- real- time); Repeat process as necessary
18 Distributed Architecture = Split Control & Responsibilities Security Conservation Principle CLOUD ECOSYSTEM Cloud Clients (Browsers, Mobile Apps, etc.) CLOUD ENVIRONMENT Software as a Service (SaaS) (Application, Services) Platform as a Service (PaaS) (APIs, Pre-built components) Infrastructure as a Service (VMs, Load Balancers, DB, etc.) Physical Hardware (Servers, Storage, Networking)
19 Privacy Conservation Principle - Privacy Coin -
20 User-data Boundary User-data Boundary User s Privacy vs. Data Privacy What is the difference?
21 Privacy Enhanced User & Data Protection Sharing raw sensitive data beyond the original trusted entity (system owner) introduces the risk of a variety of harms to individual s privacy: Stigmatization Power Imbalance Loss of Liberty Economic Loss (identity theft) [NIST Privacy Engineering Objectives and Risk Model Discussion Draft] Defense mechanisms: 1. Encryption Concerns: Key management Synthetic 2. Simple anonymization Meta-Data Concerns: Deanonymization when auxiliary data is available, Limited applicability (statistical datasets). 3. Differentially-privatized data Concerns: Limited applicability (statistical datasets). Accuracy concerns. Can differential privacy protect Consumers against nosey cloud Providers?
22 Privacy Enhanced User-Data Protection
23 When Things Go Wrong in the Cloud 1. Segregation of potential evidence 5. Ease of anonymity and creating in a multi-tenant system 2. Locating and collecting volatile data 3. Evidence correlation across multiple cloud Providers 4. Malicious code may circumvent virtual machine isolation methods false personas online 6. e-discovery 7. Evidence correlation of multiple copies at different geo-locations 8. Data deletion - a) deleted when needed for investigations. b) often reveals information about others (overwritten)
24 Highest Priority Challenges & Scores 10 Confidentiality and PII 9 Root of trust 9 E-discovery 8 Deletion in the cloud 8 Lack of transparency 7 Timestamp synchronization 7 Use of metadata 7 Multiple venues and geolocations 7 Data integrity and evidence preservation 6 Recovering overwritten data 6 Cloud confiscation and resource seizure 6 Potential evidence segregation 6 Secure provenance 6 Data chain of custody 6 Chain of dependencies 6 Locating evidence 6 Locating storage media 6 Evidence identification 6 Dynamic storage 6 Live forensics 6 Resource abstraction 6 Ambiguous trust boundaries 6 Cloud training for investigators From NIST IR 8006: DRAFT NIST Cloud Computing Forensic Science Challenges
25 Questions? Thank you! Additional Information NIST Cloud Home Page: NIST Cloud Computing Collaborative Twiki: 25
Cloudy with Showers of Business Opportunities and a Good Chance of. Security. Transforming the government IT landscape through cloud technology
Dr. Michaela Iorga, Senior Security Technical Lead for Cloud Computing Co-Chair, Cloud Security WG Co-Chair, Cloud Forensics Science WG Cloudy with Showers of Business Opportunities and a Good Chance of
NIST Cloud Computing Security Reference Architecture (SP 500-299 draft)
NIST Cloud Computing Security Reference Architecture (SP 500-299 draft) NIST Cloud Computing Security Working Group Dr. Michaela Iorga, NIST Senior Security Technical Lead for Cloud Computing Chair, NIST
NIST Cloud Computing Forensic Science Working Group
NIST Cloud Computing Forensic Science Working Group Dr. Martin Herman Information Technology Laboratory (ITL) National Institute of Standards and Technology [email protected] NIST Cloud Computing
Purpose. Service Model SaaS (Applications) PaaS (APIs) IaaS (Virtualization) Use Case 1: Public Use Case 2: Use Case 3: Public.
Federal CIO Council Information Security and Identity Management Committee (ISIMC) Guidelines for the Secure Use of Cloud Computing by Federal Departments and Agencies DRAFT V0.41 Earl Crane, CISSP, CISM
Clouds on the Horizon Cloud Security in Today s DoD Environment. Bill Musson Security Analyst
Clouds on the Horizon Cloud Security in Today s DoD Environment Bill Musson Security Analyst Agenda O Overview of Cloud architectures O Essential characteristics O Cloud service models O Cloud deployment
STORAGE SECURITY TUTORIAL With a focus on Cloud Storage. Gordon Arnold, IBM
STORAGE SECURITY TUTORIAL With a focus on Cloud Storage Gordon Arnold, IBM SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and individual members
How To Manage Cloud Data Safely
Information Governance In The Cloud Galina Datskovsky, Ph. D., CRM President of ARMA International SVP Information Governance Solutions Topics Cloud Characteristics And Risks Information Management In
Security Issues in Cloud Computing
Security Issues in Computing CSCI 454/554 Computing w Definition based on NIST: A model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources
Cloud Computing A NIST Perspective & Beyond. Robert Bohn, PhD Advanced Network Technologies Division
Cloud Computing A NIST Perspective & Beyond Robert Bohn, PhD Advanced Network Technologies Division ISACA National Capital Area Chapter Arlington, VA, USA 17 March 2015 Cloud Program Overview Launch &
[email protected] [email protected]
1 The following is merely a collection of notes taken during works, study and just-for-fun activities No copyright infringements intended: all sources are duly listed at the end of the document This work
DISTRIBUTED SYSTEMS [COMP9243] Lecture 9a: Cloud Computing WHAT IS CLOUD COMPUTING? 2
DISTRIBUTED SYSTEMS [COMP9243] Lecture 9a: Cloud Computing Slide 1 Slide 3 A style of computing in which dynamically scalable and often virtualized resources are provided as a service over the Internet.
The NIST Cloud Computing Program
The NIST Cloud Computing Program Robert Bohn Information Technology Laboratory National Institute of Standards and Technology October 12, 2011 Information Technology Laboratory Cloud 1 Computing Program
Emerging Approaches in a Cloud-Connected Enterprise: Containers and Microservices
Emerging Approaches in a -Connected Enterprise: Containers and Microservices Anil Karmel Co-Founder and CEO, C2 Labs Co-Chair, NIST Security Working Group [email protected] @anilkarmel Emerging Technologies
Cloud Security for Federal Agencies
Experience the commitment ISSUE BRIEF Rev. April 2014 Cloud Security for Federal Agencies This paper helps federal agency executives evaluate security and privacy features when choosing a cloud service
Cloud Security considerations for business adoption. Ricci IEONG CSA-HK&M Chapter
Cloud Security considerations for business adoption Ricci IEONG CSA-HK&M Chapter What is Cloud Computing? Slide 2 What is Cloud Computing? My Cloud @ Internet Pogoplug What is Cloud Computing? Compute
CLOUD STORAGE SECURITY INTRODUCTION. Gordon Arnold, IBM
CLOUD STORAGE SECURITY INTRODUCTION Gordon Arnold, IBM SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and individual members may use this material
Storage Clouds. Enterprise Architecture and the Cloud. Author and Presenter: Marty Stogsdill, Oracle
Deploying PRESENTATION Public, TITLE Private, GOES HERE and Hybrid Storage Clouds Enterprise Architecture and the Cloud Author and Presenter: Marty Stogsdill, Oracle SNIA Legal Notice The material contained
IBM Cloud Security Draft for Discussion September 12, 2011. 2011 IBM Corporation
IBM Cloud Security Draft for Discussion September 12, 2011 IBM Point of View: Cloud can be made secure for business As with most new technology paradigms, security concerns surrounding cloud computing
HIPAA CRITICAL AREAS TECHNICAL SECURITY FOCUS FOR CLOUD DEPLOYMENT
HIPAA CRITICAL AREAS TECHNICAL SECURITY FOCUS FOR CLOUD DEPLOYMENT A Review List This paper was put together with Security in mind, ISO, and HIPAA, for guidance as you move into a cloud deployment Dr.
Cloud Computing; What is it, How long has it been here, and Where is it going?
Cloud Computing; What is it, How long has it been here, and Where is it going? David Losacco, CPA, CIA, CISA Principal January 10, 2013 Agenda The Cloud WHAT IS THE CLOUD? How long has it been here? Where
DEPARTMENT OF VETERANS AFFAIRS VA DIRECTIVE 6517 CLOUD COMPUTING SERVICES
DEPARTMENT OF VETERANS AFFAIRS VA DIRECTIVE 6517 Washington, DC 20420 Transmittal Sheet February 28, 2012 CLOUD COMPUTING SERVICES 1. REASON FOR ISSUE: This Directive establishes the Department of Veterans
Cloud Security Introduction and Overview
Introduction and Overview Klaus Gribi Senior Security Consultant [email protected] May 6, 2015 Agenda 2 1. Cloud Security Cloud Evolution, Service and Deployment models Overview and the Notorious
OWASP Chapter Meeting June 2010. Presented by: Brayton Rider, SecureState Chief Architect
OWASP Chapter Meeting June 2010 Presented by: Brayton Rider, SecureState Chief Architect Agenda What is Cloud Computing? Cloud Service Models Cloud Deployment Models Cloud Computing Security Security Cloud
Cloud Computing: Opportunities, Challenges, and Solutions. Jungwoo Ryoo, Ph.D., CISSP, CISA The Pennsylvania State University
Cloud Computing: Opportunities, Challenges, and Solutions Jungwoo Ryoo, Ph.D., CISSP, CISA The Pennsylvania State University What is cloud computing? What are some of the keywords? How many of you cannot
Securing The Cloud. Foundational Best Practices For Securing Cloud Computing. Scott Clark. Insert presenter logo here on slide master
Securing The Cloud Foundational Best Practices For Securing Cloud Computing Scott Clark Agenda Introduction to Cloud Computing What is Different in the Cloud? CSA Guidance Additional Resources 2 What is
Esri Managed Cloud Services and FedRAMP
Federal GIS Conference February 9 10, 2015 Washington, DC Esri Managed Cloud Services and FedRAMP Erin Ross & Michael Young Agenda Esri Managed Services Program Overview Example Deployments New FedRAMP
Compliance and the Cloud: What You Can and What You Can t Outsource
Compliance and the Cloud: What You Can and What You Can t Outsource Presented By: Kate Donofrio Security Assessor Fortrex Technologies Instructor Biography Background On Fortrex What s In A Cloud? Pick
PCI Compliance and the Cloud: What You Can and What You Can t Outsource Presented By:
PCI Compliance and the Cloud: What You Can and What You Can t Outsource Presented By: Peter Spier Managing Director PCI and Risk Assurance Fortrex Technologies Agenda Instructor Biography Background On
Dispelling the Myths about Cloud Computing Security
Dispelling the Myths about Cloud Computing Security security is no longer an hinderance to the cloud! Leo F. Howell, CISSP CISA CCSK Knowledge MYTH we are all talking about the same cloud Discussion cloud
Fundamental Concepts and Models
Chapter 4: Fundamental Concepts and Models Nora Almezeini MIS Department, CBA, KSU From Cloud Computing by Thomas Erl, Zaigham Mahmood, and Ricardo Puttini(ISBN: 0133387526) Copyright 2013 Arcitura Education,
ITL BULLETIN FOR JUNE 2012 CLOUD COMPUTING: A REVIEW OF FEATURES, BENEFITS, AND RISKS, AND RECOMMENDATIONS FOR SECURE, EFFICIENT IMPLEMENTATIONS
ITL BULLETIN FOR JUNE 2012 CLOUD COMPUTING: A REVIEW OF FEATURES, BENEFITS, AND RISKS, AND RECOMMENDATIONS FOR SECURE, EFFICIENT IMPLEMENTATIONS Shirley Radack, Editor Computer Security Division Information
Security Considerations for the Cloud
June 6, 2012 Security Considerations for the Cloud Presented by: Mac McMillan CEO CynergisTek, Inc. Chair, HIMSS Privacy & Security Policy Task Force 1 2012 NIST/OCR Conference Agenda Threat Implications
Managing Cloud Computing Risk
Managing Cloud Computing Risk Presented By: Dan Desko; Manager, Internal IT Audit & Risk Advisory Services Schneider Downs & Co. Inc. [email protected] Learning Objectives Understand how to identify
Assessing Risks in the Cloud
Assessing Risks in the Cloud Jim Reavis Executive Director Cloud Security Alliance Agenda Definitions of Cloud & Cloud Usage Key Cloud Risks About CSA CSA Guidance approach to Addressing Risks Research
Cloud security architecture
ericsson White paper Uen 284 23-3244 January 2015 Cloud security architecture from process to deployment The Trust Engine concept and logical cloud security architecture presented in this paper provide
Federal CIO: Cloud Selection Toolkit. Georgetown University: Chris Radich Dana Christiansen Doyle Zhang India Donald
Federal CIO: Cloud Selection Toolkit Georgetown University: Chris Radich Dana Christiansen Doyle Zhang India Donald Agenda Project Introduction Agency Cloud Challenges Toolkit Solution Overview Step 1:
A Strawman Model. NIST Cloud Computing Reference Architecture and Taxonomy Working Group. January 3, 2011
A Strawman Model NIST Cloud Computing Reference Architecture and Taxonomy Working Group January 3, 2011 Objective Our objective is to define a neutral architecture consistent with NIST definition of cloud
Key Management Issues in the Cloud Infrastructure
Key Management Issues in the Cloud Infrastructure Dr. R. Chandramouli (Mouli) [email protected] Dr. Michaela Iorga [email protected] (Information Technology Lab, NIST, USA) ARO Workshop on Cloud Computing
Concurrent Technologies Corporation (CTC) is an independent, nonprofit, applied scientific research and development professional services
Concurrent Technologies Corporation (CTC) is an independent, nonprofit, applied scientific research and development professional services organization providing innovative management and technology-based
Security & Trust in the Cloud
Security & Trust in the Cloud Ray Trygstad Director of Information Technology, IIT School of Applied Technology Associate Director, Information Technology & Management Degree Programs Cloud Computing Primer
Deploying Public, Private, and Hybrid Storage Clouds. Marty Stogsdill, Oracle
Deploying Public, Private, and Hybrid Storage Clouds Marty Stogsdill, Oracle SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA unless otherwise noted. Member companies
Standardizing Cloud Services for Financial Institutions through the provisioning of Service Level Agreements (SLAs)
Standardizing Cloud Services for Financial Institutions through the provisioning of Service Level Agreements (SLAs) Robert Bohn, PhD Advanced Network Technologies Division Cloud FS Americas 2015 New York,
Future of Cloud Computing. Irena Bojanova, Ph.D. UMUC, NIST
Future of Cloud Computing Irena Bojanova, Ph.D. UMUC, NIST No Longer On The Horizon Essential Characteristics On-demand Self-Service Broad Network Access Resource Pooling Rapid Elasticity Measured Service
Public Cloud Workshop Offerings
Cloud Perspectives a division of Woodward Systems Inc. Public Cloud Workshop Offerings Cloud Computing Measurement and Governance in the Cloud Duration: 1 Day Purpose: This workshop will benefit those
Enterprise Architecture and the Cloud. Marty Stogsdill, Oracle
Marty Stogsdill, Oracle SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA unless otherwise noted. Member companies and individual members may use this material in presentations
6 Cloud computing overview
6 Cloud computing overview 6.1 General ISO/IEC 17788:2014 (E) Cloud Computing Overview Page 1 of 6 Cloud computing is a paradigm for enabling network access to a scalable and elastic pool of shareable
A COALFIRE PERSPECTIVE. Moving to the Cloud. NCHELP Spring Convention Panel May 2012
A COALFIRE PERSPECTIVE Moving to the Cloud A Summary of Considerations for Implementing Cloud Migration Plans into New Business Platforms NCHELP Spring Convention Panel May 2012 DALLAS DENVER LOS ANGELES
ISSN: 2321-7782 (Online) Volume 2, Issue 5, May 2014 International Journal of Advance Research in Computer Science and Management Studies
ISSN: 2321-7782 (Online) Volume 2, Issue 5, May 2014 International Journal of Advance Research in Computer Science and Management Studies Research Paper Available online at: www.ijarcsms.com Analogous
Cloud Security. Peter Jopling [email protected] IBM UK Ltd Software Group Hursley Labs. peterjopling. 2011 IBM Corporation
Cloud Security Peter Jopling [email protected] IBM UK Ltd Software Group Hursley Labs peterjopling 2011 IBM Corporation Cloud computing impacts the implementation of security in fundamentally new ways
NIST Cloud Computing Program
NIST Program USG Roadmap Top 10 high priority requirements to accelerate USG adoption of the model NIST Mission: To promote U.S. innovation and industrial competitiveness by advancing measurement science,
Technology & Business Overview of Cloud Computing
Your Place or Mine? In-House e-discovery Platform vs. Software as a Service Technology & Business Overview of Cloud Computing Janine Anthony Bowen, Esq. Jack Attorneys & Advisors www.jack-law.com Atlanta,
How to Use the Federal Risk and Authorization Management Program (FedRAMP) for Cloud Computing
How to Use the Federal Risk and Authorization Management Program (FedRAMP) for Cloud Computing Warren S. Udy, CISSP Senior Cyber Security Advisor Office of Cyber Security 301-903-5515 [email protected]
John Essner, CISO Office of Information Technology State of New Jersey
John Essner, CISO Office of Information Technology State of New Jersey http://csrc.nist.gov/publications/nistpubs/800-144/sp800-144.pdf Governance Compliance Trust Architecture Identity and Access Management
Eucalyptus: An Open-source Infrastructure for Cloud Computing. Rich Wolski Eucalyptus Systems Inc. www.eucalyptus.com
Eucalyptus: An Open-source Infrastructure for Cloud Computing Rich Wolski Eucalyptus Systems Inc. www.eucalyptus.com Exciting Weather Forecasts Commercial Cloud Formation Eucalyptus - Confidential What
SECURE CLOUD COMPUTING
Outline SECURE CLOUD COMPUTING Introduction (of many buzz words) References What is Cloud Computing Cloud Computing Infrastructure Security Cloud Storage and Data Security Identity Management in the Cloud
DoD Cloud Computing Security Requirements Guide (SRG) Overview
DoD Cloud Computing Security Requirements Guide (SRG) Overview 1 General SRG Information Released 12 January 2015 Version 1, release 1 Provides comprehensive security guidance for components (missions)
Tufts University. Department of Computer Science. COMP 116 Introduction to Computer Security Fall 2014 Final Project. Guocui Gao Guocui.gao@tufts.
Tufts University Department of Computer Science COMP 116 Introduction to Computer Security Fall 2014 Final Project Investigating Security Issues in Cloud Computing Guocui Gao [email protected] Mentor:
Protecting Data and Privacy in the Cloud
Protecting Data and Privacy in the Cloud Contents 1 3 6 9 12 13 Protecting Data and Privacy in the Cloud an Introduction Building Services to Protect Data Protecting Data in Service Operations Empowering
Cloud Security. Nantawan Wongkachonkitti Electronic Government Agency, Thailand Cloud Security Alliance, Thailand Chapter October 2014
Cloud Security Nantawan Wongkachonkitti Electronic Government Agency, Thailand Cloud Security Alliance, Thailand Chapter October 2014 Agenda Introduction Security Assessment for Cloud Secure Cloud Infrastructure
Cybersecurity. Cloud. and the. 4TH Annual NICE Workshop Navigating the National Cybersecurity Education InterState Highway September 2013
Cybersecurity and the Cloud 4TH Annual NICE Workshop Navigating the National Cybersecurity Education InterState Highway September 2013 Well, I'll hazard I can do more damage on my laptop sitting in my
ISSUE BRIEF. Cloud Security for Federal Agencies. Achieving greater efficiency and better security through federally certified cloud services
ISSUE BRIEF Cloud Security for Federal Agencies Achieving greater efficiency and better security through federally certified cloud services This paper is intended to help federal agency executives to better
Top 10 Cloud Risks That Will Keep You Awake at Night
Top 10 Cloud Risks That Will Keep You Awake at Night Shankar Babu Chebrolu Ph.D., Vinay Bansal, Pankaj Telang Photo Source flickr.com .. Amazon EC2 (Cloud) to host Eng. Lab testing. We want to use SalesForce.com
journey to a hybrid cloud
journey to a hybrid cloud Virtualization and Automation VI015SN journey to a hybrid cloud Jim Sweeney, CTO GTSI about the speaker Jim Sweeney GTSI, Chief Technology Officer 35 years of engineering experience
Federal Cloud Computing Initiative Overview
Federal Cloud Computing Initiative Overview Program Status To support the Federal Cloud Computing Direction and Deployment Approach, the ITI Line of Business PMO has been refocused as the Cloud Computing
Assessing, Evaluating and Managing Cloud Computing Security
Assessing, Evaluating and Managing Cloud Computing Security S.SENTHIL KUMAR 1, R.KANAKARAJ 2 1,2 ASSISTANT PROESSOR, DEPARTMENT OF COMMERCE WITH COMPUTER APPLICATIONS Dr.SNS RAJALAKSHMI COLLEGE OF ARTS
Eucalyptus: An Open-source Infrastructure for Cloud Computing. Rich Wolski Eucalyptus Systems Inc. www.eucalyptus.com
Eucalyptus: An Open-source Infrastructure for Cloud Computing Rich Wolski Eucalyptus Systems Inc. www.eucalyptus.com Exciting Weather Forecasts Commercial Cloud Formation Eucalyptus - Confidential What
Data In The Cloud: Who Owns It, and How Do You Get it Back?
Data In The Cloud: Who Owns It, and How Do You Get it Back? Presented by Dave Millier, Soban Bhatti, and Oleg Sotnikov 2013 Sentry Metrics Inc. Agenda Reasons for Cloud Adoption How Did My Data Get There?
Unmasking Virtualization Security. Eric A. Hibbard, CISSP, CISA Hitachi Data Systems
Eric A. Hibbard, CISSP, CISA Hitachi Data Systems SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA unless otherwise noted. Member companies and individual members may
Cloud Security. DLT Solutions LLC June 2011. #DLTCloud
Cloud Security DLT Solutions LLC June 2011 Contact Information DLT Cloud Advisory Group 1-855-CLOUD01 (256-8301) [email protected] www.dlt.com/cloud Your Hosts Van Ristau Chief Technology Officer, DLT Solutions
East African Information Conference 13-14 th August, 2013, Kampala, Uganda. Security and Privacy: Can we trust the cloud?
East African Information Conference 13-14 th August, 2013, Kampala, Uganda Security and Privacy: Can we trust the cloud? By Dr. David Turahi Director, Information Technology and Information Management
IT Security Risk Management Model for Cloud Computing: A Need for a New Escalation Approach.
IT Security Risk Management Model for Cloud Computing: A Need for a New Escalation Approach. Gunnar Wahlgren 1, Stewart Kowalski 2 Stockholm University 1: ([email protected]), 2: ([email protected]) ABSTRACT
What REALLY matters in Cloud Security? RE: Internet of things sensors, data, security and beyond!
What REALLY matters in Cloud Security? RE: Internet of things sensors, data, security and beyond! HOW to best integrate security into the office AND the cloud? And what is a thing is that MORE we have
Cloud Computing. What is Cloud Computing?
Cloud Computing What is Cloud Computing? Cloud computing is where the organization outsources data processing to computers owned by the vendor. Primarily the vendor hosts the equipment while the audited
Storage Clouds. Karthik Ramarao. Director of Strategy and Technology and CTO Asia Pacific, NetApp Board Director SNIA South Asia
Deploying PRESENTATION Public, TITLE Private, GOES HERE and Hybrid Storage Clouds Karthik Ramarao Director of Strategy and Technology and CTO Asia Pacific, NetApp Board Director SNIA South Asia SNIA Legal
Public Clouds. Krishnan Subramanian Analyst & Researcher Krishworld.com. A whitepaper sponsored by Trend Micro Inc.
Public Clouds Krishnan Subramanian Analyst & Researcher Krishworld.com A whitepaper sponsored by Trend Micro Inc. Introduction Public clouds are the latest evolution of computing, offering tremendous value
Overview of Cloud Computing and Cloud Computing s Use in Government Justin Heyman CGCIO, Information Technology Specialist, Township of Franklin
Overview of Cloud Computing and Cloud Computing s Use in Government Justin Heyman CGCIO, Information Technology Specialist, Township of Franklin Best Practices for Security in the Cloud John Essner, Director
Written Testimony. Mark Kneidinger. Director, Federal Network Resilience. Office of Cybersecurity and Communications
Written Testimony of Mark Kneidinger Director, Federal Network Resilience Office of Cybersecurity and Communications U.S. Department of Homeland Security Before the U.S. House of Representatives Committee
Secure Identity in Cloud Computing
Secure Identity in Cloud Computing Michelle Carter The Aerospace Corporation March 20, 2013 The Aerospace Corporation 2013 All trademarks, service marks, and trade names are the property of their respective
